diff options
author | Jordan Niethe <jniethe5@gmail.com> | 2023-09-14 13:05:58 +1000 |
---|---|---|
committer | Michael Ellerman <mpe@ellerman.id.au> | 2023-09-14 22:04:24 +1000 |
commit | dfcaacc8f970c6b4ea4e32d2186f2bea4a1d5255 (patch) | |
tree | 846e2a2d51390e5e21cf4baa58fcac0f68d0bb96 /arch/powerpc/kvm/guest-state-buffer.c | |
parent | 6ccbbc33f06adaf79acde18571c6543ad1cb4be6 (diff) | |
download | linux-dfcaacc8f970c6b4ea4e32d2186f2bea4a1d5255.tar.gz linux-dfcaacc8f970c6b4ea4e32d2186f2bea4a1d5255.tar.bz2 linux-dfcaacc8f970c6b4ea4e32d2186f2bea4a1d5255.zip |
KVM: PPC: Book3s HV: Hold LPIDs in an unsigned long
The LPID register is 32 bits long. The host keeps the lpids for each
guest in an unsigned word struct kvm_arch. Currently, LPIDs are already
limited by mmu_lpid_bits and KVM_MAX_NESTED_GUESTS_SHIFT.
The nestedv2 API returns a 64 bit "Guest ID" to be used be the L1 host
for each L2 guest. This value is used as an lpid, e.g. it is the
parameter used by H_RPT_INVALIDATE. To minimize needless special casing
it makes sense to keep this "Guest ID" in struct kvm_arch::lpid.
This means that struct kvm_arch::lpid is too small so prepare for this
and make it an unsigned long. This is not a problem for the KVM-HV and
nestedv1 cases as their lpid values are already limited to valid ranges
so in those contexts the lpid can be used as an unsigned word safely as
needed.
In the PAPR, the H_RPT_INVALIDATE pid/lpid parameter is already
specified as an unsigned long so change pseries_rpt_invalidate() to
match that. Update the callers of pseries_rpt_invalidate() to also take
an unsigned long if they take an lpid value.
Signed-off-by: Jordan Niethe <jniethe5@gmail.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
Link: https://msgid.link/20230914030600.16993-10-jniethe5@gmail.com
Diffstat (limited to 'arch/powerpc/kvm/guest-state-buffer.c')
0 files changed, 0 insertions, 0 deletions