diff options
author | James Hogan <james.hogan@imgtec.com> | 2016-09-16 13:14:09 +0100 |
---|---|---|
committer | James Hogan <james.hogan@imgtec.com> | 2016-09-29 12:40:12 +0100 |
commit | bf18db4e7bd99f3a65bcc43225790b16af733321 (patch) | |
tree | db35036476c169d02aa95fa891b79b1863e4a382 /arch | |
parent | 25b08c7fb0e410bdf7c42ea1faff816eb0451bbc (diff) | |
download | linux-stable-bf18db4e7bd99f3a65bcc43225790b16af733321.tar.gz linux-stable-bf18db4e7bd99f3a65bcc43225790b16af733321.tar.bz2 linux-stable-bf18db4e7bd99f3a65bcc43225790b16af733321.zip |
KVM: MIPS: Drop dubious EntryHi optimisation
There exists a slightly dubious optimisation in the implementation of
the MIPS KVM EntryHi emulation which skips TLB invalidation if the
EntryHi points to an address in the guest KSeg0 region, intended to
catch guest TLB invalidations where the ASID is almost immediately
restored to the previous value.
Now that we perform lazy host ASID regeneration for guest user mode when
the guest ASID changes we should be able to drop the optimisation
without a significant impact (only the extra TLB refills for the small
amount of code while the TLB is being invalidated).
Signed-off-by: James Hogan <james.hogan@imgtec.com>
Cc: Paolo Bonzini <pbonzini@redhat.com>
Cc: "Radim Krčmář" <rkrcmar@redhat.com>
Cc: Ralf Baechle <ralf@linux-mips.org>
Cc: linux-mips@linux-mips.org
Cc: kvm@vger.kernel.org
Diffstat (limited to 'arch')
-rw-r--r-- | arch/mips/kvm/emulate.c | 3 |
1 files changed, 1 insertions, 2 deletions
diff --git a/arch/mips/kvm/emulate.c b/arch/mips/kvm/emulate.c index 8dc9e64346e6..4db4c0370859 100644 --- a/arch/mips/kvm/emulate.c +++ b/arch/mips/kvm/emulate.c @@ -1162,8 +1162,7 @@ enum emulation_result kvm_mips_emulate_CP0(union mips_instruction inst, } else if (rd == MIPS_CP0_TLB_HI && sel == 0) { u32 nasid = vcpu->arch.gprs[rt] & KVM_ENTRYHI_ASID; - if ((KSEGX(vcpu->arch.gprs[rt]) != CKSEG0) && - ((kvm_read_c0_guest_entryhi(cop0) & + if (((kvm_read_c0_guest_entryhi(cop0) & KVM_ENTRYHI_ASID) != nasid)) { trace_kvm_asid_change(vcpu, kvm_read_c0_guest_entryhi(cop0) |