diff options
author | Suraj Jitindar Singh | 2018-10-08 07:31:11 +0200 |
---|---|---|
committer | Michael Ellerman | 2018-10-09 07:04:27 +0200 |
commit | 9d0b048da788c1df927d808bb60e7fd4f19a3a12 (patch) | |
tree | a1816ab82decc9721aa6339f6530481169c59522 /include/dt-bindings | |
parent | KVM: PPC: Book3S HV: Use hypercalls for TLB invalidation when nested (diff) | |
download | kernel-qcow2-linux-9d0b048da788c1df927d808bb60e7fd4f19a3a12.tar.gz kernel-qcow2-linux-9d0b048da788c1df927d808bb60e7fd4f19a3a12.tar.xz kernel-qcow2-linux-9d0b048da788c1df927d808bb60e7fd4f19a3a12.zip |
KVM: PPC: Book3S HV: Invalidate TLB when nested vcpu moves physical cpu
This is only done at level 0, since only level 0 knows which physical
CPU a vcpu is running on. This does for nested guests what L0 already
did for its own guests, which is to flush the TLB on a pCPU when it
goes to run a vCPU there, and there is another vCPU in the same VM
which previously ran on this pCPU and has now started to run on another
pCPU. This is to handle the situation where the other vCPU touched
a mapping, moved to another pCPU and did a tlbiel (local-only tlbie)
on that new pCPU and thus left behind a stale TLB entry on this pCPU.
This introduces a limit on the the vcpu_token values used in the
H_ENTER_NESTED hcall -- they must now be less than NR_CPUS.
[paulus@ozlabs.org - made prev_cpu array be short[] to reduce
memory consumption.]
Reviewed-by: David Gibson <david@gibson.dropbear.id.au>
Signed-off-by: Suraj Jitindar Singh <sjitindarsingh@gmail.com>
Signed-off-by: Paul Mackerras <paulus@ozlabs.org>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
Diffstat (limited to 'include/dt-bindings')
0 files changed, 0 insertions, 0 deletions