2 * PowerPC MMU, TLB, SLB and BAT emulation helpers for QEMU.
4 * Copyright (c) 2003-2007 Jocelyn Mayer
5 * Copyright (c) 2013 David Gibson, IBM Corporation
7 * This library is free software; you can redistribute it and/or
8 * modify it under the terms of the GNU Lesser General Public
9 * License as published by the Free Software Foundation; either
10 * version 2 of the License, or (at your option) any later version.
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * Lesser General Public License for more details.
17 * You should have received a copy of the GNU Lesser General Public
18 * License along with this library; if not, see <http://www.gnu.org/licenses/>.
20 #include "qemu/osdep.h"
21 #include "qapi/error.h"
23 #include "exec/exec-all.h"
24 #include "exec/helper-proto.h"
25 #include "qemu/error-report.h"
26 #include "sysemu/kvm.h"
27 #include "qemu/error-report.h"
29 #include "mmu-hash64.h"
35 # define LOG_SLB(...) qemu_log_mask(CPU_LOG_MMU, __VA_ARGS__)
37 # define LOG_SLB(...) do { } while (0)
41 * Used to indicate that a CPU has its hash page table (HPT) managed
42 * within the host kernel
44 #define MMU_HASH64_KVM_MANAGED_HPT ((void *)-1)
50 static ppc_slb_t
*slb_lookup(PowerPCCPU
*cpu
, target_ulong eaddr
)
52 CPUPPCState
*env
= &cpu
->env
;
53 uint64_t esid_256M
, esid_1T
;
56 LOG_SLB("%s: eaddr " TARGET_FMT_lx
"\n", __func__
, eaddr
);
58 esid_256M
= (eaddr
& SEGMENT_MASK_256M
) | SLB_ESID_V
;
59 esid_1T
= (eaddr
& SEGMENT_MASK_1T
) | SLB_ESID_V
;
61 for (n
= 0; n
< env
->slb_nr
; n
++) {
62 ppc_slb_t
*slb
= &env
->slb
[n
];
64 LOG_SLB("%s: slot %d %016" PRIx64
" %016"
65 PRIx64
"\n", __func__
, n
, slb
->esid
, slb
->vsid
);
66 /* We check for 1T matches on all MMUs here - if the MMU
67 * doesn't have 1T segment support, we will have prevented 1T
68 * entries from being inserted in the slbmte code. */
69 if (((slb
->esid
== esid_256M
) &&
70 ((slb
->vsid
& SLB_VSID_B
) == SLB_VSID_B_256M
))
71 || ((slb
->esid
== esid_1T
) &&
72 ((slb
->vsid
& SLB_VSID_B
) == SLB_VSID_B_1T
))) {
80 void dump_slb(FILE *f
, fprintf_function cpu_fprintf
, PowerPCCPU
*cpu
)
82 CPUPPCState
*env
= &cpu
->env
;
86 cpu_synchronize_state(CPU(cpu
));
88 cpu_fprintf(f
, "SLB\tESID\t\t\tVSID\n");
89 for (i
= 0; i
< env
->slb_nr
; i
++) {
90 slbe
= env
->slb
[i
].esid
;
91 slbv
= env
->slb
[i
].vsid
;
92 if (slbe
== 0 && slbv
== 0) {
95 cpu_fprintf(f
, "%d\t0x%016" PRIx64
"\t0x%016" PRIx64
"\n",
100 void helper_slbia(CPUPPCState
*env
)
104 /* XXX: Warning: slbia never invalidates the first segment */
105 for (n
= 1; n
< env
->slb_nr
; n
++) {
106 ppc_slb_t
*slb
= &env
->slb
[n
];
108 if (slb
->esid
& SLB_ESID_V
) {
109 slb
->esid
&= ~SLB_ESID_V
;
110 /* XXX: given the fact that segment size is 256 MB or 1TB,
111 * and we still don't have a tlb_flush_mask(env, n, mask)
112 * in QEMU, we just invalidate all TLBs
114 env
->tlb_need_flush
= 1;
119 void helper_slbie(CPUPPCState
*env
, target_ulong addr
)
121 PowerPCCPU
*cpu
= ppc_env_get_cpu(env
);
124 slb
= slb_lookup(cpu
, addr
);
129 if (slb
->esid
& SLB_ESID_V
) {
130 slb
->esid
&= ~SLB_ESID_V
;
132 /* XXX: given the fact that segment size is 256 MB or 1TB,
133 * and we still don't have a tlb_flush_mask(env, n, mask)
134 * in QEMU, we just invalidate all TLBs
136 env
->tlb_need_flush
= 1;
140 int ppc_store_slb(PowerPCCPU
*cpu
, target_ulong slot
,
141 target_ulong esid
, target_ulong vsid
)
143 CPUPPCState
*env
= &cpu
->env
;
144 ppc_slb_t
*slb
= &env
->slb
[slot
];
145 const struct ppc_one_seg_page_size
*sps
= NULL
;
148 if (slot
>= env
->slb_nr
) {
149 return -1; /* Bad slot number */
151 if (esid
& ~(SLB_ESID_ESID
| SLB_ESID_V
)) {
152 return -1; /* Reserved bits set */
154 if (vsid
& (SLB_VSID_B
& ~SLB_VSID_B_1T
)) {
155 return -1; /* Bad segment size */
157 if ((vsid
& SLB_VSID_B
) && !(env
->mmu_model
& POWERPC_MMU_1TSEG
)) {
158 return -1; /* 1T segment on MMU that doesn't support it */
161 for (i
= 0; i
< PPC_PAGE_SIZES_MAX_SZ
; i
++) {
162 const struct ppc_one_seg_page_size
*sps1
= &env
->sps
.sps
[i
];
164 if (!sps1
->page_shift
) {
168 if ((vsid
& SLB_VSID_LLP_MASK
) == sps1
->slb_enc
) {
175 error_report("Bad page size encoding in SLB store: slot "TARGET_FMT_lu
176 " esid 0x"TARGET_FMT_lx
" vsid 0x"TARGET_FMT_lx
,
185 LOG_SLB("%s: %d " TARGET_FMT_lx
" - " TARGET_FMT_lx
" => %016" PRIx64
186 " %016" PRIx64
"\n", __func__
, slot
, esid
, vsid
,
187 slb
->esid
, slb
->vsid
);
192 static int ppc_load_slb_esid(PowerPCCPU
*cpu
, target_ulong rb
,
195 CPUPPCState
*env
= &cpu
->env
;
196 int slot
= rb
& 0xfff;
197 ppc_slb_t
*slb
= &env
->slb
[slot
];
199 if (slot
>= env
->slb_nr
) {
207 static int ppc_load_slb_vsid(PowerPCCPU
*cpu
, target_ulong rb
,
210 CPUPPCState
*env
= &cpu
->env
;
211 int slot
= rb
& 0xfff;
212 ppc_slb_t
*slb
= &env
->slb
[slot
];
214 if (slot
>= env
->slb_nr
) {
222 static int ppc_find_slb_vsid(PowerPCCPU
*cpu
, target_ulong rb
,
225 CPUPPCState
*env
= &cpu
->env
;
228 if (!msr_is_64bit(env
, env
->msr
)) {
231 slb
= slb_lookup(cpu
, rb
);
233 *rt
= (target_ulong
)-1ul;
240 void helper_store_slb(CPUPPCState
*env
, target_ulong rb
, target_ulong rs
)
242 PowerPCCPU
*cpu
= ppc_env_get_cpu(env
);
244 if (ppc_store_slb(cpu
, rb
& 0xfff, rb
& ~0xfffULL
, rs
) < 0) {
245 helper_raise_exception_err(env
, POWERPC_EXCP_PROGRAM
,
250 target_ulong
helper_load_slb_esid(CPUPPCState
*env
, target_ulong rb
)
252 PowerPCCPU
*cpu
= ppc_env_get_cpu(env
);
255 if (ppc_load_slb_esid(cpu
, rb
, &rt
) < 0) {
256 helper_raise_exception_err(env
, POWERPC_EXCP_PROGRAM
,
262 target_ulong
helper_find_slb_vsid(CPUPPCState
*env
, target_ulong rb
)
264 PowerPCCPU
*cpu
= ppc_env_get_cpu(env
);
267 if (ppc_find_slb_vsid(cpu
, rb
, &rt
) < 0) {
268 helper_raise_exception_err(env
, POWERPC_EXCP_PROGRAM
,
274 target_ulong
helper_load_slb_vsid(CPUPPCState
*env
, target_ulong rb
)
276 PowerPCCPU
*cpu
= ppc_env_get_cpu(env
);
279 if (ppc_load_slb_vsid(cpu
, rb
, &rt
) < 0) {
280 helper_raise_exception_err(env
, POWERPC_EXCP_PROGRAM
,
287 * 64-bit hash table MMU handling
289 void ppc_hash64_set_sdr1(PowerPCCPU
*cpu
, target_ulong value
,
292 CPUPPCState
*env
= &cpu
->env
;
293 target_ulong htabsize
= value
& SDR_64_HTABSIZE
;
295 env
->spr
[SPR_SDR1
] = value
;
298 "Invalid HTABSIZE 0x" TARGET_FMT_lx
" stored in SDR1",
302 env
->htab_mask
= (1ULL << (htabsize
+ 18 - 7)) - 1;
303 env
->htab_base
= value
& SDR_64_HTABORG
;
306 void ppc_hash64_set_external_hpt(PowerPCCPU
*cpu
, void *hpt
, int shift
,
309 CPUPPCState
*env
= &cpu
->env
;
310 Error
*local_err
= NULL
;
313 env
->external_htab
= hpt
;
315 env
->external_htab
= MMU_HASH64_KVM_MANAGED_HPT
;
317 ppc_hash64_set_sdr1(cpu
, (target_ulong
)(uintptr_t)hpt
| (shift
- 18),
320 error_propagate(errp
, local_err
);
324 /* Not strictly necessary, but makes it clearer that an external
325 * htab is in use when debugging */
329 if (kvmppc_put_books_sregs(cpu
) < 0) {
330 error_setg(errp
, "Unable to update SDR1 in KVM");
335 static int ppc_hash64_pte_prot(PowerPCCPU
*cpu
,
336 ppc_slb_t
*slb
, ppc_hash_pte64_t pte
)
338 CPUPPCState
*env
= &cpu
->env
;
340 /* Some pp bit combinations have undefined behaviour, so default
341 * to no access in those cases */
344 key
= !!(msr_pr
? (slb
->vsid
& SLB_VSID_KP
)
345 : (slb
->vsid
& SLB_VSID_KS
));
346 pp
= (pte
.pte1
& HPTE64_R_PP
) | ((pte
.pte1
& HPTE64_R_PP0
) >> 61);
353 prot
= PAGE_READ
| PAGE_WRITE
;
374 prot
= PAGE_READ
| PAGE_WRITE
;
379 /* No execute if either noexec or guarded bits set */
380 if (!(pte
.pte1
& HPTE64_R_N
) || (pte
.pte1
& HPTE64_R_G
)
381 || (slb
->vsid
& SLB_VSID_N
)) {
388 static int ppc_hash64_amr_prot(PowerPCCPU
*cpu
, ppc_hash_pte64_t pte
)
390 CPUPPCState
*env
= &cpu
->env
;
392 int prot
= PAGE_READ
| PAGE_WRITE
| PAGE_EXEC
;
394 /* Only recent MMUs implement Virtual Page Class Key Protection */
395 if (!(env
->mmu_model
& POWERPC_MMU_AMR
)) {
399 key
= HPTE64_R_KEY(pte
.pte1
);
400 amrbits
= (env
->spr
[SPR_AMR
] >> 2*(31 - key
)) & 0x3;
402 /* fprintf(stderr, "AMR protection: key=%d AMR=0x%" PRIx64 "\n", key, */
403 /* env->spr[SPR_AMR]); */
406 * A store is permitted if the AMR bit is 0. Remove write
407 * protection if it is set.
413 * A load is permitted if the AMR bit is 0. Remove read
414 * protection if it is set.
423 uint64_t ppc_hash64_start_access(PowerPCCPU
*cpu
, target_ulong pte_index
)
428 pte_offset
= pte_index
* HASH_PTE_SIZE_64
;
429 if (cpu
->env
.external_htab
== MMU_HASH64_KVM_MANAGED_HPT
) {
431 * HTAB is controlled by KVM. Fetch the PTEG into a new buffer.
433 token
= kvmppc_hash64_read_pteg(cpu
, pte_index
);
434 } else if (cpu
->env
.external_htab
) {
436 * HTAB is controlled by QEMU. Just point to the internally
439 token
= (uint64_t)(uintptr_t) cpu
->env
.external_htab
+ pte_offset
;
440 } else if (cpu
->env
.htab_base
) {
441 token
= cpu
->env
.htab_base
+ pte_offset
;
446 void ppc_hash64_stop_access(PowerPCCPU
*cpu
, uint64_t token
)
448 if (cpu
->env
.external_htab
== MMU_HASH64_KVM_MANAGED_HPT
) {
449 kvmppc_hash64_free_pteg(token
);
453 static hwaddr
ppc_hash64_pteg_search(PowerPCCPU
*cpu
, hwaddr hash
,
454 bool secondary
, target_ulong ptem
,
455 ppc_hash_pte64_t
*pte
)
457 CPUPPCState
*env
= &cpu
->env
;
460 target_ulong pte0
, pte1
;
461 target_ulong pte_index
;
463 pte_index
= (hash
& env
->htab_mask
) * HPTES_PER_GROUP
;
464 token
= ppc_hash64_start_access(cpu
, pte_index
);
468 for (i
= 0; i
< HPTES_PER_GROUP
; i
++) {
469 pte0
= ppc_hash64_load_hpte0(cpu
, token
, i
);
470 pte1
= ppc_hash64_load_hpte1(cpu
, token
, i
);
472 if ((pte0
& HPTE64_V_VALID
)
473 && (secondary
== !!(pte0
& HPTE64_V_SECONDARY
))
474 && HPTE64_V_COMPARE(pte0
, ptem
)) {
477 ppc_hash64_stop_access(cpu
, token
);
478 return (pte_index
+ i
) * HASH_PTE_SIZE_64
;
481 ppc_hash64_stop_access(cpu
, token
);
483 * We didn't find a valid entry.
488 static hwaddr
ppc_hash64_htab_lookup(PowerPCCPU
*cpu
,
489 ppc_slb_t
*slb
, target_ulong eaddr
,
490 ppc_hash_pte64_t
*pte
)
492 CPUPPCState
*env
= &cpu
->env
;
495 uint64_t vsid
, epnmask
, epn
, ptem
;
497 /* The SLB store path should prevent any bad page size encodings
498 * getting in there, so: */
501 epnmask
= ~((1ULL << slb
->sps
->page_shift
) - 1);
503 if (slb
->vsid
& SLB_VSID_B
) {
505 vsid
= (slb
->vsid
& SLB_VSID_VSID
) >> SLB_VSID_SHIFT_1T
;
506 epn
= (eaddr
& ~SEGMENT_MASK_1T
) & epnmask
;
507 hash
= vsid
^ (vsid
<< 25) ^ (epn
>> slb
->sps
->page_shift
);
510 vsid
= (slb
->vsid
& SLB_VSID_VSID
) >> SLB_VSID_SHIFT
;
511 epn
= (eaddr
& ~SEGMENT_MASK_256M
) & epnmask
;
512 hash
= vsid
^ (epn
>> slb
->sps
->page_shift
);
514 ptem
= (slb
->vsid
& SLB_VSID_PTEM
) | ((epn
>> 16) & HPTE64_V_AVPN
);
516 /* Page address translation */
517 qemu_log_mask(CPU_LOG_MMU
,
518 "htab_base " TARGET_FMT_plx
" htab_mask " TARGET_FMT_plx
519 " hash " TARGET_FMT_plx
"\n",
520 env
->htab_base
, env
->htab_mask
, hash
);
522 /* Primary PTEG lookup */
523 qemu_log_mask(CPU_LOG_MMU
,
524 "0 htab=" TARGET_FMT_plx
"/" TARGET_FMT_plx
525 " vsid=" TARGET_FMT_lx
" ptem=" TARGET_FMT_lx
526 " hash=" TARGET_FMT_plx
"\n",
527 env
->htab_base
, env
->htab_mask
, vsid
, ptem
, hash
);
528 pte_offset
= ppc_hash64_pteg_search(cpu
, hash
, 0, ptem
, pte
);
530 if (pte_offset
== -1) {
531 /* Secondary PTEG lookup */
532 qemu_log_mask(CPU_LOG_MMU
,
533 "1 htab=" TARGET_FMT_plx
"/" TARGET_FMT_plx
534 " vsid=" TARGET_FMT_lx
" api=" TARGET_FMT_lx
535 " hash=" TARGET_FMT_plx
"\n", env
->htab_base
,
536 env
->htab_mask
, vsid
, ptem
, ~hash
);
538 pte_offset
= ppc_hash64_pteg_search(cpu
, ~hash
, 1, ptem
, pte
);
544 static unsigned hpte_page_shift(const struct ppc_one_seg_page_size
*sps
,
545 uint64_t pte0
, uint64_t pte1
)
549 if (!(pte0
& HPTE64_V_LARGE
)) {
550 if (sps
->page_shift
!= 12) {
551 /* 4kiB page in a non 4kiB segment */
554 /* Normal 4kiB page */
558 for (i
= 0; i
< PPC_PAGE_SIZES_MAX_SZ
; i
++) {
559 const struct ppc_one_page_size
*ps
= &sps
->enc
[i
];
562 if (!ps
->page_shift
) {
566 if (ps
->page_shift
== 12) {
567 /* L bit is set so this can't be a 4kiB page */
571 mask
= ((1ULL << ps
->page_shift
) - 1) & HPTE64_R_RPN
;
573 if ((pte1
& mask
) == (ps
->pte_enc
<< HPTE64_R_RPN_SHIFT
)) {
574 return ps
->page_shift
;
578 return 0; /* Bad page size encoding */
581 unsigned ppc_hash64_hpte_page_shift_noslb(PowerPCCPU
*cpu
,
582 uint64_t pte0
, uint64_t pte1
,
583 unsigned *seg_page_shift
)
585 CPUPPCState
*env
= &cpu
->env
;
588 if (!(pte0
& HPTE64_V_LARGE
)) {
589 *seg_page_shift
= 12;
594 * The encodings in env->sps need to be carefully chosen so that
595 * this gives an unambiguous result.
597 for (i
= 0; i
< PPC_PAGE_SIZES_MAX_SZ
; i
++) {
598 const struct ppc_one_seg_page_size
*sps
= &env
->sps
.sps
[i
];
601 if (!sps
->page_shift
) {
605 shift
= hpte_page_shift(sps
, pte0
, pte1
);
607 *seg_page_shift
= sps
->page_shift
;
616 static void ppc_hash64_set_isi(CPUState
*cs
, CPUPPCState
*env
,
622 vpm
= !!(env
->spr
[SPR_LPCR
] & LPCR_VPM1
);
624 vpm
= !!(env
->spr
[SPR_LPCR
] & LPCR_VPM0
);
626 if (vpm
&& !msr_hv
) {
627 cs
->exception_index
= POWERPC_EXCP_HISI
;
629 cs
->exception_index
= POWERPC_EXCP_ISI
;
631 env
->error_code
= error_code
;
634 static void ppc_hash64_set_dsi(CPUState
*cs
, CPUPPCState
*env
, uint64_t dar
,
640 vpm
= !!(env
->spr
[SPR_LPCR
] & LPCR_VPM1
);
642 vpm
= !!(env
->spr
[SPR_LPCR
] & LPCR_VPM0
);
644 if (vpm
&& !msr_hv
) {
645 cs
->exception_index
= POWERPC_EXCP_HDSI
;
646 env
->spr
[SPR_HDAR
] = dar
;
647 env
->spr
[SPR_HDSISR
] = dsisr
;
649 cs
->exception_index
= POWERPC_EXCP_DSI
;
650 env
->spr
[SPR_DAR
] = dar
;
651 env
->spr
[SPR_DSISR
] = dsisr
;
657 int ppc_hash64_handle_mmu_fault(PowerPCCPU
*cpu
, vaddr eaddr
,
658 int rwx
, int mmu_idx
)
660 CPUState
*cs
= CPU(cpu
);
661 CPUPPCState
*env
= &cpu
->env
;
665 ppc_hash_pte64_t pte
;
666 int pp_prot
, amr_prot
, prot
;
667 uint64_t new_pte1
, dsisr
;
668 const int need_prot
[] = {PAGE_READ
, PAGE_WRITE
, PAGE_EXEC
};
671 assert((rwx
== 0) || (rwx
== 1) || (rwx
== 2));
673 /* 1. Handle real mode accesses */
674 if (((rwx
== 2) && (msr_ir
== 0)) || ((rwx
!= 2) && (msr_dr
== 0))) {
675 /* Translation is off */
676 /* In real mode the top 4 effective address bits are ignored */
677 raddr
= eaddr
& 0x0FFFFFFFFFFFFFFFULL
;
678 tlb_set_page(cs
, eaddr
& TARGET_PAGE_MASK
, raddr
& TARGET_PAGE_MASK
,
679 PAGE_READ
| PAGE_WRITE
| PAGE_EXEC
, mmu_idx
,
684 /* 2. Translation is on, so look up the SLB */
685 slb
= slb_lookup(cpu
, eaddr
);
689 cs
->exception_index
= POWERPC_EXCP_ISEG
;
692 cs
->exception_index
= POWERPC_EXCP_DSEG
;
694 env
->spr
[SPR_DAR
] = eaddr
;
699 /* 3. Check for segment level no-execute violation */
700 if ((rwx
== 2) && (slb
->vsid
& SLB_VSID_N
)) {
701 ppc_hash64_set_isi(cs
, env
, 0x10000000);
705 /* 4. Locate the PTE in the hash table */
706 pte_offset
= ppc_hash64_htab_lookup(cpu
, slb
, eaddr
, &pte
);
707 if (pte_offset
== -1) {
710 ppc_hash64_set_isi(cs
, env
, dsisr
);
715 ppc_hash64_set_dsi(cs
, env
, eaddr
, dsisr
);
719 qemu_log_mask(CPU_LOG_MMU
,
720 "found PTE at offset %08" HWADDR_PRIx
"\n", pte_offset
);
722 /* Validate page size encoding */
723 apshift
= hpte_page_shift(slb
->sps
, pte
.pte0
, pte
.pte1
);
725 error_report("Bad page size encoding in HPTE 0x%"PRIx64
" - 0x%"PRIx64
726 " @ 0x%"HWADDR_PRIx
, pte
.pte0
, pte
.pte1
, pte_offset
);
727 /* Not entirely sure what the right action here, but machine
728 * check seems reasonable */
729 cs
->exception_index
= POWERPC_EXCP_MCHECK
;
734 /* 5. Check access permissions */
736 pp_prot
= ppc_hash64_pte_prot(cpu
, slb
, pte
);
737 amr_prot
= ppc_hash64_amr_prot(cpu
, pte
);
738 prot
= pp_prot
& amr_prot
;
740 if ((need_prot
[rwx
] & ~prot
) != 0) {
741 /* Access right violation */
742 qemu_log_mask(CPU_LOG_MMU
, "PTE access rejected\n");
744 ppc_hash64_set_isi(cs
, env
, 0x08000000);
747 if (need_prot
[rwx
] & ~pp_prot
) {
753 if (need_prot
[rwx
] & ~amr_prot
) {
756 ppc_hash64_set_dsi(cs
, env
, eaddr
, dsisr
);
761 qemu_log_mask(CPU_LOG_MMU
, "PTE access granted !\n");
763 /* 6. Update PTE referenced and changed bits if necessary */
765 new_pte1
= pte
.pte1
| HPTE64_R_R
; /* set referenced bit */
767 new_pte1
|= HPTE64_R_C
; /* set changed (dirty) bit */
769 /* Treat the page as read-only for now, so that a later write
770 * will pass through this function again to set the C bit */
774 if (new_pte1
!= pte
.pte1
) {
775 ppc_hash64_store_hpte(cpu
, pte_offset
/ HASH_PTE_SIZE_64
,
779 /* 7. Determine the real address from the PTE */
781 raddr
= deposit64(pte
.pte1
& HPTE64_R_RPN
, 0, apshift
, eaddr
);
783 tlb_set_page(cs
, eaddr
& TARGET_PAGE_MASK
, raddr
& TARGET_PAGE_MASK
,
784 prot
, mmu_idx
, 1ULL << apshift
);
789 hwaddr
ppc_hash64_get_phys_page_debug(PowerPCCPU
*cpu
, target_ulong addr
)
791 CPUPPCState
*env
= &cpu
->env
;
794 ppc_hash_pte64_t pte
;
798 /* In real mode the top 4 effective address bits are ignored */
799 return addr
& 0x0FFFFFFFFFFFFFFFULL
;
802 slb
= slb_lookup(cpu
, addr
);
807 pte_offset
= ppc_hash64_htab_lookup(cpu
, slb
, addr
, &pte
);
808 if (pte_offset
== -1) {
812 apshift
= hpte_page_shift(slb
->sps
, pte
.pte0
, pte
.pte1
);
817 return deposit64(pte
.pte1
& HPTE64_R_RPN
, 0, apshift
, addr
)
821 void ppc_hash64_store_hpte(PowerPCCPU
*cpu
,
822 target_ulong pte_index
,
823 target_ulong pte0
, target_ulong pte1
)
825 CPUPPCState
*env
= &cpu
->env
;
827 if (env
->external_htab
== MMU_HASH64_KVM_MANAGED_HPT
) {
828 kvmppc_hash64_write_pte(env
, pte_index
, pte0
, pte1
);
832 pte_index
*= HASH_PTE_SIZE_64
;
833 if (env
->external_htab
) {
834 stq_p(env
->external_htab
+ pte_index
, pte0
);
835 stq_p(env
->external_htab
+ pte_index
+ HASH_PTE_SIZE_64
/ 2, pte1
);
837 stq_phys(CPU(cpu
)->as
, env
->htab_base
+ pte_index
, pte0
);
838 stq_phys(CPU(cpu
)->as
,
839 env
->htab_base
+ pte_index
+ HASH_PTE_SIZE_64
/ 2, pte1
);
843 void ppc_hash64_tlb_flush_hpte(PowerPCCPU
*cpu
,
844 target_ulong pte_index
,
845 target_ulong pte0
, target_ulong pte1
)
848 * XXX: given the fact that there are too many segments to
849 * invalidate, and we still don't have a tlb_flush_mask(env, n,
850 * mask) in QEMU, we just invalidate all TLBs
852 tlb_flush(CPU(cpu
), 1);