Managing translations across multiple contexts using a TLB with entries directed to multiple privilege levels and to multiple types of address spaces

ABSTRACT

For a current context in control of a processor requesting access to a particular address, a translation lookaside buffer (TLB) controller specifies a virtual address with a logical partition identifier value indicating a privilege setting of the current context, a process identifier value indicating whether the address is within shared address space, and an effective address comprising at least a portion of the particular address. In response to the virtual address not matching at least one entry within a TLB comprising at least one entry stored for at least one previous translation of at least one previous address, the TLB controller translates the virtual address into a real page number using at least one page table and adding a new entry to the TLB with the virtual address and the real page number, wherein each at least one entry within the TLB identifies a separate privilege setting from among a plurality of privilege settings and a separate indicator of whether the address is within the shared address space.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of commonly assigned U.S. patentapplication Ser. No. 14/255,457, filed Apr. 17, 2014, which is herebyincorporated herein by reference.

BACKGROUND

1. Technical Field

This invention relates in general to managing translations using atranslation lookaside buffer (TLB) and more particularly to managingtranslations across multiple contexts using a TLB including entriesdirected to multiple privilege levels and to multiple types of addressspaces.

2. Description of the Related Art

Modern computer systems typically utilize a virtual memory system toaddress very large amounts of memory in one or more virtual addressspaces, even though the main memory of the system populates a muchsmaller portion of physical memory address space. To map a virtualaddress to an address within the virtual address space to a physicalmemory address space, an operating system (OS) maps the virtual addressspace for each process to the actual physical address space for thesystem. The OS may maintain page tables to use for mapping a virtualaddress to a physical address.

Some virtual memory systems implement a specialized cache to store thelast translation of a virtual address to physical address accessed froma page table. For example, a translation lookaside buffer (TLB), withina small section of memory in a processor pipeline, easily accessible tothe processor, caches part of the system's virtual address to physicaladdress translation. By storing recently mapped virtual address tophysical address translations in a TLB, upon a next request for the samevirtual address, a processor can quickly access a translation of thevirtual address into a physical address from a previously stored entryin the TLB. If a translation for a particular virtual address is notpresent in the TLB, a “translation miss” occurs and the addresstranslation is resolved from page tables.

Many computer systems implement a virtualization layer, such as ahypervisor, which manages one or more logical partitions (LPARs) on aserver system, each LPAR functioning as self-contained platforms andeach LPAR running its own instance of an operating system and othersoftware. In one example, the operating system run by an LPAR isreferred to as a guest operating system (OS) and the software run by anLPAR is referred to as guest software. The virtualization layer managescontrol over events and hardware resources on the underlying platform tointerface between LPARs and the resources for protection from andbetween guest software running on different LPARs.

Within a system that supports multiple processes, operating on multipleLPARs, context switches may occur when a multi-tasking guest OS on anLPAR stops running one process and begins running another. Similarly, ina system that supports multiple LPARs, context switches occur when aprocessor shifts a control level of a hypervisor on or off.

BRIEF SUMMARY

In a system supporting context switches between multiple contexts, if aTLB is not flushed for each context switch, the TLB may include entriesadded to the TLB from virtual address look ups for contexts operatingunder different privilege levels and directed by different processes toboth shared and not shared address spaces in one or more LPARs.Therefore, in view of the foregoing, there is a need for a method,system, and computer program product for managing translations acrossmultiple contexts using a TLB including entries directed to multipleprivilege levels and to multiple types of address spaces.

In one embodiment, a method for managing translations is directed to,for a current context in control of a processor requesting access to aparticular address, specifying a virtual address with a logicalpartition identifier value indicating a privilege setting of the currentcontext, a process identifier value indicating whether the address iswithin shared address space, and an effective address comprising atleast a portion of the particular address. The method is directed, inresponse to the virtual address not matching at least one entry within atranslation lookaside buffer comprising at least one entry stored for atleast one previous translation of at least one previous address, totranslating the virtual address into a real page number using at leastone page table and adding a new entry to the translation lookasidebuffer with the virtual address and the real page number, wherein eachat least one entry within the translation lookaside buffer identifies aseparate privilege setting from among a plurality of privilege settingsand a separate indicator of whether the address is within the sharedaddress space.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

The novel features believed characteristic of one or more embodiments ofthe invention are set forth in the appended claims. The one or moreembodiments of the invention itself however, will best be understood byreference to the following detailed description of an illustrativeembodiment when read in conjunction with the accompanying drawings,wherein:

FIG. 1 is a block diagram illustrating one example of a TLB controllerin a computer system for managing translation of a same address acrossmultiple contexts using a same entry in a TLB and for managing TLBentries available to different privilege levels within a same TLB;

FIG. 2 is a block diagram illustrating one example of a TLB controllerfor managing translation of a same address across multiple contextsusing a same entry in a TLB and for managing TLB entries available todifferent privilege levels within a same TLB;

FIG. 3 is a block diagram illustrating one example of components of aTLB controller for managing translations using a TLB in a processor andmanaging a TLB with entries available for contexts with differentprivilege levels, in an example where address translation by the TLBcontroller may be turned off for hypervisor access to non-hypervisorpartitioned address space;

FIG. 4 is a high level logic flowchart illustrating one example of aprocess and program for managing translation of a same address acrossmultiple contexts using a same entry in a TLB and managing a TLB withentries available for contexts with different privilege levels, in anexample where address translation by the TLB controller may be turnedoff for hypervisor access to non-hypervisor partitioned address space;

FIG. 5 is a block diagram illustrating one example of a TLB controllermanaging translation of a same address across multiple contexts using asame entry in a TLB and managing a TLB with entries available forcontexts with different privilege levels and managing a TLB with entriesavailable for contexts with different privilege levels, in an examplewhere address translation by the TLB controller may be turned off forhypervisor access to non-hypervisor partitioned address space;

FIG. 6 is a block diagram illustrating one example of components of aTLB controller for managing translations using a TLB in a processor of asame address across multiple contexts using a same entry in a TLB andmanaging a TLB with entries available for contexts with differentprivilege levels, where address translations to non-hypervisor partitionaddress space are performed by the TLB controller independent of ahighest privilege mode setting;

FIG. 7 is a high level logic flowchart illustrating one example of aprocess and program for managing translation of a same address acrossmultiple contexts using a same entry in a TLB and managing a TLB withentries available for contexts with different privilege levels, whereaddress translations to non-hypervisor partition address space areperformed by the TLB controller independent of a highest privilege modesetting;

FIG. 8 is a block diagram illustrating one example of a TLB controllermanaging translation of a same address across multiple contexts using asame entry in a TLB and managing a TLB with entries available forcontexts with different privilege levels, where address translations tonon-hypervisor partition address space are performed by the TLBcontroller independent of a highest privilege mode setting;

FIG. 9 is a block diagram illustrating one example of components of aTLB controller for managing translations using a TLB in a processor,where for contexts set to a highest privilege mode the LPID comparisonvalue is automatically set.

FIG. 10 is a high level logic flowchart illustrating one example of aprocess and program for managing translation of a same address acrossmultiple contexts using a same entry in a TLB, where for contexts set toa highest privilege mode an LPID comparison is suppressed; and

FIG. 11 is a block diagram illustrating one example of a computer systemin which one embodiment of the invention may be implemented.

DETAILED DESCRIPTION

In the following description, for the purposes of explanation, numerousspecific details are set forth in order to provide a thoroughunderstanding of the present invention. It will be apparent, however, toone skilled in the art that the present invention may be practicedwithout these specific details. In other instances, well-knownstructures and devices are shown in block diagram form in order to avoidunnecessarily obscuring the present invention.

In addition, in the following description, for purposes of explanation,numerous systems are described. It is important to note, and it will beapparent to one skilled in the art, that the present invention mayexecute in a variety of systems, including a variety of computer systemsand electronic devices operating any number of different types ofoperating systems.

With reference now to the figures, and in particular, with reference nowto FIG. 1, a block diagram illustrates one example of a TLB controllerin a computer system for managing translation of a same address acrossmultiple contexts using a same entry in a TLB and for managing TLBentries available to different privilege levels within a same TLB.

In one example, a computer system 100 implements a virtualization layer,such as a hypervisor 166, which manages one or more logical partitions(LPARs) on computer system 100, such as LPAR 170 and LPAR 176. Logicalpartitioning may refer to the capability to subdivide a single systeminto multiple LPARs, where each LPAR functions as a self-containedplatform and each LPAR runs its own instance of an operating system andother software. In one example, LPAR 170 runs one or more applications,illustrated as applications 172, atop a guest operating system (OS) 174,and LPAR 176 runs one or more applications, illustrated as applications178, atop a guest OS 180. In one example, processes performed byapplications and the guest OS on each LPAR may perform as if they arerunning on a dedicated server system, rather than on one of multipleLPARs hosted by computer system 100. The processes running on each LPARmay expect to control events and have access to virtualized hardwareresources, including memory resources allocated from an address space154. In one example, hypervisor creates LPAR 170 and LPAR 176 byassigning portions of the total system virtual and physical resourcesand virtualizations of physical resources, including, but not limitedto, processor-element execution time, real memory, and I/O devices, toeach partition. Hypervisor 166 controls events and hardware resources onthe underlying platform of processor core 102 to interface between LPAR170 and LPAR 172 and processor core 102, to manage which resources areaccessed by each LPAR and to manage access to resources by processesrunning on different LPARs. The hypervisor, with hardware assistance,may ensure that the operating system and applications in one LPAR haveno knowledge of, or access to, the resources of another LPAR, unlessspecifically granted by the hypervisor, such as through the use ofshared memory resources.

Within computer system 100, events may occur that shift which LPAR, andwhich processes within an LPAR, are in control of threads of processorcore 102, where these shifts are referred to as a context switch. Acontext may represent one or more of an application, an operatingsystem, or a hypervisor, or a hypervisor application, sending a requestto processor core 102 that requires a memory access, while operating inone or more privileged modes. A context switch may occur, for example,when guest OS 174 stops running one application from among applications172 and begins running another application within applications 172 orwhen guest OS 174 stops running an application and runs a process of theoperating system. In another example, a context switch may occur whenhypervisor 166 switches control of processor core 102 from LPAR 170 toLPAR 176. In another example, a context switch may occur during a modeswitch that occurs when a machine state for processor core 102 isshifted to set processor core 102 to operate in a hypervisor mode, whichis a highest privilege mode that allows access to all of address space154, or not to operate in a hypervisor mode, in a less privileged modethat allows access to limited portions of address space 154. Inadditional or alternate embodiments, other shifts between the processrequesting control, the partition requesting controlling, and theprivilege mode of the processor may represent context switches withinprocessor core 102.

Context switches in a computer system that implements a virtualizedenvironment may cause additional overhead in processor core 102 formultiple reasons. In one example, for each context switch, one or moreregisters within processor core 102, including context registers 120,have to be reset, which may include buffering values for use when thesame context is next reloaded, and may include loading new values toidentify a current context. Hypervisor 166 may send instructions toprocessor core 102 for each context switch and processor core 102 mayinclude a context switching controller 104, implemented in hardware,software, or a combination of hardware and software, for managing andminimizing the overhead incurred by context switching within processorcore 102. In one example, context switching controller 104 maydetermine, upon a context switch, whether to flush one or more entrieswithin TLB 142, if entries within TLB 142 are not marked to identify theprocess that requested the entry, or whether entries in TLB 142 aremarked in a manner to allow for entries to remain within TLB 142 upon acontext switch. In another example, context switching controller 104 maydetermine whether other data loaded for one context needs to be flushedupon a context switch.

In the example illustrated, address space 154, represents the availablememory space managed by a memory management unit of processor core 102,which may be allocated by hypervisor 166 or other memory managementunit. In one example, a portion of address space 154 may be initiallyallocated as a partition for hypervisor 166, where hypervisor 166 andhypervisor applications operating under hypervisor 166, function withinthe hypervisor partition. For example, address space 154 may includeaddress space allocated for a hypervisor partition that may include ahypervisor space 156 and other application space 158. In one example,all or portions of hypervisor space 156 and other application space 158may only be accessible when the processor is operating in a highestprivilege mode, which may also be referred to as a hypervisor mode, andother application space 158 may refer to the address space allocated tothe applications running below the hypervisor. In another example, otherapplication space 158 may be space shared by multiple applicationsindependent of the privilege mode setting.

In addition, in one example, hypervisor 166 manages allocation ofseparate partitioned spaces within address space 154 to each of LPAR 170and LPAR 176. Within the partitioned spaces allocated to LPAR 170 andLPAR 176 within address space 154, the address space may be furtherallocated between a guest OS space 160 and an applications space 162. Inone example, all or portions of guest OS space 160 allocated to aparticular partition may be accessible by the multiple processes runningwithin the particular partition. In one example, all or portions ofguest OS space 160 may also be referred to as the address spaceallocated to the kernel. In one example, all or portions of applicationsspace 162 allocated to a particular portion are only accessible by aparticular process running within the particular partition. In oneexample, while hypervisor space 156 and other application space 158 mayonly be accessed by processes running in a highest privilege mode, guestOS space 160 and applications space 162 may be accessed by processesregardless of the setting of the highest privilege mode. In anotherexample, all or portions of both guest OS space 160 and otherapplication space 158 may be shared between applications independent ofthe privilege mode setting.

In one example, an address register 138 is loaded with an address,effective address (EA) 140 for the memory access request for the currentcontext. EA 140 may include, but is not limited to including, a signextended field, an effective page number field and an offset field. Aneffective page number field may include, but is not limited to, a pagemap level-4 offset field that maps into a page-map level 4 table, apage-directory pointer offset that maps into a page-directory-pointertable, a page-directory offset that maps into a page-directory table, apage-table offset that maps into a page table, and a physical-pageoffset that maps into a physical page. In additional or alternateexamples, EA 140 may include additional or alternate fields, such as avirtual segment identifier (VSID), and may represent a real address oran address that requires multiple levels of translation.

In one example, EA is an N bit effective address in a request by aprocess for access to address space 154. In one example, address space154 is partitioned such that the most significant, or top bit of EA,referred to as EA[0] throughout, identifies whether an address isdirected to a top half of the address space identified by EA[0]=1,including hypervisor space 156 and guest OS space 160, or directed to abottom half of the address space identified by EA[0]=0, including otherapplication space 158 and applications space 162. In addition,application space 154 may be partitioned such that the second mostsignificant bit of EA, referred to as EA[1] throughout, may identifyadditional characteristics of an address space. In one example,hypervisor space 156, may also be referred to as the most privilegedaddress space. In other examples, address space 154 may be partitionedin other ways, where other EA bits or other types of bit settingsidentify each of the address spaces. In addition, additional bits of theEA may be set for designating partitioned spaces within address space154. Different processors may use different bit ordering specifications.For example, while in the example illustrated, EA[0] is referred to asthe bit that refers to the top half of an address space, in otherembodiments, EA[N] may be the bit that refers to the top half of anaddress space, where bits are referred to from N to 0 or where theprocessor specifies the ordering of bits in reverse from the order ofbits illustrated in the example.

On a context switch, hypervisor 166 may load a PID register 122 ofprocessor core 102 with a value P 124 identifying the process for thecurrent context and may load a LPID register 126 of processor core 102with a value L 128 identifying the logical partition to which theprocessor is currently assigned for the current context. In addition, ona context switch, hypervisor 166 or context switching controller 104 mayload a machine state register (MSR) 130 with multiple bits including,but not limited to, HV 132. In the example, the setting of MSR[HV] 132represents the highest privilege mode setting. In one example, whenMSR[HV]=1, processor core 102 is set to operate in the highest privilegemode. Additional bit settings within MSR 130 may specify other layers ofprivilege states. For example, MSR 130 may also include a problem state(PR) bit, set with HV 132, for further specifying a privilege mode,where the PR bit indicates whether processor core 102 is set to operatein a supervisor mode (PR=0) or a problem state mode (PR=1). For example,a hypervisor state, which runs in the highest privilege mode, may beindicated by MSR[HV|PR]=10, an OS state that runs in a privileged modeless than the highest privilege mode, may be indicated by MSR[HV|PR]=00,and the applications running under the hypervisor and the applicationsrunning under the OS may run in a least privileged mode, and may beindicated by MSR[HV|PR|=11 and MSR[HV|PR]=01, respectively. In anotherexample, MSR 130 may also include IR/DR bits 133 which specify whetherto turn on or turn off translations by the TLB controller. In oneexample, the IR bit enables or disables instruction address translationand the DR bit enables or disables data address translations. In otherexamples, other settings within processor core 102 or hypervisor 166 maycontrol whether or not TLB controller 106 manages a translation. Inaddition, in the example, hypervisor 166 or context switching controller144 may load a page table 136 into table register 134, where page table136 is either a global page table or a specific page table, availablefor performing page level address conversions for the current context.In one example, hypervisor 166 provides each LPAR with its own hardwarepage table for loading into page table 136. Alternatively, tableregister 134 may represent a storage description register, such as SDR1,that specifies the real address and size of the hardware accessed pagetable for the current partition. In additional or alternate embodiments,the settings designated with MSR 130 may be set within processor core102 or within hypervisor 166 through additional or alternate components.

In the example, context switching controller 104 may support contextswitches between different privilege mode settings, such as a switchfrom a previous context with MSR[HV] 132 set to “1” to a current contextwith MSR[HV] 132 set to “0”. Context switching controller 104 may alsosupport context switches between different logical partitions, such as aswitch from a previous context with L 128 set to “LPAR1”, the identifierfor LPAR 170, to a current context with L 128 set to “LPAR2”, theidentifier for LPAR 176. In another example, context switchingcontroller may also support context switches between different processeswithin a logical partition, such as a switch from a previous contextwith P 124 set to a process identified as “2” to a current context withP 124 set to a process identified as “4”. Context switching controller104 may support context switches where one or more of P 124, L 128, andHV 132 change, along with changes to EA 140, page table 136, andadditional registers set within processor core 102.

In one example, each context may make requests that require a memoryaccess request to an address EA 140 loaded in address register 138,where the address requires one or more levels of translation using oneor more levels of page tables 136 and other functions, to identify thereal memory address associated with the address. In one example,computer system 100 may utilize a virtual memory system to virtuallyaddress very large amounts of memory, even though the main memory of thesystem encompasses a much smaller portion of physical memory addressspace. In addition, many computer systems use virtual memory systems tomanage and allocate memory to various processes running within thesystem, which allows each process running on the system to operate as ifit has control of the full range of addresses provided by the system.The virtual memory addresses may be mapped to physical memory addresses,requiring one or more levels of translation from a virtual addressmapping to a physical address using page table 136 and other tables.

In one example, for management of translations of virtual memory tophysical addresses, processor core 102 may implement a specialized cacheto store previous translations of virtual addresses to physicaladdresses accessed from a page table. For example, TLB 142, which may bepositioned within a small section of memory in a processor pipeline,easily accessible to the processor, caches part of the virtual addressto physical address translation within computer system 100. In oneexample, the specialized cache implemented for TLB 142 is separate fromthe L1 and L2 cache and only stores TLB 142. By storing recently mappedvirtual address to physical address translations in TLB 142, upon a nextrequest for the same virtual address, TLB controller 106 can quicklyaccess a translation of the virtual address into a physical address froma previously stored entry in the TLB. If a translation for a particularvirtual address is not present in the TLB, a “translation miss” occursand the address translation is resolved from page tables. In particular,in the example illustrated, TLB controller 106 generates a virtualaddress (VA) 112 for a current context requiring translation of EA 140into a real memory address. In one example, hypervisor 166 may be set tohandle translation of particular types of address requests into a realmemory address using functions independent of TLB controller 106, suchthat TLB controller 106 may not be required to perform addresstranslation for the particular types of address requests. For example,an optional setting of hypervisor 166 may be set such that whenMSR[HV]=1 and MSR[IR/DR]=0, translation through TLB controller 106 isturned off and the hypervisor real mode address mechanism controls theaddress translation and access. In the example illustrated, TLBcontroller 106 is illustrated as component of processor core 102,however, in alternate examples, the functions described herein asperformed by TLB controller 106 may be performed by other functionalunits including, but not limited to, hardware, software and firmware.

For the address translations handled by TLB controller 106, a firstcontext selection controller 108 selects a value for LPID 114 of VA 112and a second context selection controller 110 selects a value for PID116 of VA 112. In addition, TLB controller 106 selects all or a portionof EA 140, as EA 118 in VA 112, such as a portion EA[X:N], where X mayrepresent a bit other than the first bit of EA. EA 118 may alsorepresent a portion of EA where other portions of EA[N] are not includedin VA 112, such as EA[X:N−7]. In addition, EA 118 may be segmented intoone or more subfields.

In the example, TLB controller 106 compares VA 112 with one or moreentries within a TLB 142. In the example TLB 142 includes a TLB entry144 with multiple fields. In one example, the fields of TLB entry 144include, but are not limited to, TLB LPID 146, TLB PID 148, TLB EA 150,and a real page number 152. In the example, each TLB entry 144 withinTLB 142 includes the VA of the context during which real page number wastranslated for a particular address request. In particular, TLBcontroller 106 compares LPID 114 with TLB 146, PID 116 with TLB PID 148,and EA 118 with TLB EA 150. If each of the compared values matches, aTLB hit is triggered and real page number 152 is accessed as the realpage number translated for VA 112. In one example, real page number 152is further translated into a real memory address using page table 136.In the example, if one or more of the compared values do not match,after all the TLB entries are compared, a TLB miss is triggered and TLBcontroller 106 may call one or more hardware and software mechanisms fortranslating VA 112 into a real page number. TLB controller 106 thenstores a new TLB entry with VA 112 and the translated real page numberfor satisfying future translation requests.

In one example, each TLB entry 144 includes TLB LPID 146 and TLB PID148, which each identify characteristics of a context, such that for acontext switch, TLB entries may be maintained within TLB 142 and foreach TLB lookup within TLB 142, only those entries with the same contextcharacteristics selected within VA 112, will trigger a TLB hit. In theexample, first context selection controller 108 and second contextselection controller 110 may also specify LPID 114 and PID 116 withvalues that when included in a TLB entry as TLB LPID 146 and TLB LPID148 allow TLB controller 106 to manage TLB 142 with entries specifiedfor contexts with different highest privilege mode settings, entriesshareable by contexts with different processes accessing a same sharedaddress space, and entries specified for a particular LPAR and aparticular process.

In additional or alternate embodiments, additional areas of sharedaddress space may be specified within address space 154, additionalcurrent context characteristics may be specified based on one or moreadditional values set context registers 120, additional characteristicsmay be represented within first level current context characteristic 108and second level current context characteristic 110 based on additionaldata read from context registers 120, additional effective address spaceidentifiers may be set, and TLB entry 144 may include additional addressspace identifier fields. In one example, additional areas of sharedaddress space may be managed, such as additional address spacesidentified by other bits within EA, and additional privilege levels maybe managed. Those of ordinary skill in the art will appreciate thatwhile address space 154 is described with reference to EA[0] as the topbit that distinguishes the address spaces within address space 154, inother embodiments, other orderings or configurations of bits withinaddress space 154 may be implemented and therefore the top bit or bitsthat distinguish the address spaces within address space 154 may bereferenced as EA[N] or another bit of the address space addressing.

In one example, while TLB controller 106 creates and maintains entrieswithin TLB 142 for multiple contexts, to reduce or eliminate the need toflush TLB 142 on context switching and to eliminate redundant entriesdirected to shareable address space, one or more of hypervisor 166,context switching controller 104, TLB controller 106, or othercomponents may also determine and trigger caching of the contents of TLB142, flushing the contents of TLB 142, restoring TLB 142 with previouslycached contents, and performing other cache management functions for TLB142. In addition, in the example, while TLB controller 106 may createand maintain entries within TLB 142 to eliminate redundant entriesdirected to shareable address space by specifying LPID 114 through firstcontext selection controller 108 and by specifying PID through secondcontext selection controller 110, in another example, TLB controller 106may turn off one or more of first context selection controller 108 andsecond context selection controller 110 and automatically set one ormore of LPID 114 to L 128 and PID 116 to P 124 and VA 112 may be storedas an entry within TLB 142 that is specified for access by a particularcontext and not shareable across multiple contexts, regardless ofwhether the entry is directed to shareable address space.

Those of ordinary skill in the art will appreciate that computer system100 is representative of one computer environment in which the inventionmay be implemented. In additional or alternate embodiments, computersystem 100 may include additional or alternate network layers,additional or alternate LPARs or other groupings of physical andvirtualized resources implemented within additional or alternate networklayers, additional or alternate hypervisor or firmware layers,additional or alternate components within processor core 102, additionalprocessor cores accessing a same TLB, additional or alternate TLBs,additional or alternate context registers for performing additional oralternate functions and additional or alternate address space andclassifications of address space.

FIG. 2 illustrates a block diagram of a TLB controller for managingtranslation of a same address across multiple contexts using a sameentry in a TLB and for managing TLB entries available to differentprivilege levels within a same TLB.

In the example, first context selection controller 108 and secondcontext selection controller 110 of TLB controller 106 set values forLPID 114 and PID 116, respectively, to enable managing a TLB withentries available for multiple types of context switches. In oneexample, first context selection controller 108 and second contextselection controller 110 select values to support a range of types ofcontext switches illustrated at reference numeral 200. For example, asillustrated at reference numeral 200, the range of context switches mayinclude context switching between different privilege levels, such asswitching from a context 202 set to a highest privilege level to acontext 204 set to a privilege mode that is not the highest privilegelevel. In the example, context switching between different privilegelevels may also include switching between context requests to addressspace controlled by a highest privilege mode setting and context requestto address space not controlled by a highest privilege mode setting. Inaddition, as illustrated at reference numeral 200, the range of contextswitches may include context switching between applications requestingshared address space and applications requesting application specificaddress space, such as switching from a context 204 for an applicationrequest to a shared address space and a context 206 for an applicationrequest to an application specific address space. Context switches mayalso include switching between both privilege modes and types of addressspace. Context switches may include any change within processor core 102that requires an address lookup by TLB controller 106, includingswitching between accesses to different segments within a same addressspace or different address spaces.

In particular, in the example, first context selection controller 108and second context selection controller 110 may support the range oftypes of context switches by setting clamped values in LPID 114 and PID116, respectively, when the current context characteristics match aparticular selection of context characteristics. In addition, firstselection controller 108 and second selection controller 110 may requireone selection of context characteristics, labeled as case “1A”throughout, if the context is operating in the highest privilege modewith TLB controller translations turned off for non-hypervisor partitionaddress space, and another selection of context characteristics, labeledas case “1B” throughout if the hypervisor turns translations on and TLBcontroller 106 manages requests in the highest privilege mode tonon-hypervisor partition address space. In the example, FIGS. 3-5illustrate examples related to case “1A” and FIGS. 6-8 illustrateexamples related to case “1B”.

In one example, first context selection controller 108 may clamp theLPID by setting LPID 114 to a clamped value of “0” following the twoselections of context characteristics, depending on which controllerhandles requests in the highest privilege mode to non-hypervisorpartition space. A first selection of context characteristics labeledunder case “1A”, directs first context selection controller 108 to clampthe LPID if the current context request is set to the highest privilegemode. A second selection of context characteristics labeled under case“1B”, directs first context selection controller 108 to clamp the LPIDif the current context request is directed to the most protected addressspace. In another example, the clamped value for clamping LPID 114 maybe set to a value other than “0”. Effectively, by clamping LPID 114 to“0” for accesses for case “1A” or “1B”, the LPID for the hypervisorpartition is set to “0”.

In one example, second context selection controller 110 may clamp thePID by setting PID 116 to a clamped value of “0” if the current contextrequest is directed to a shared address space within hypervisor space156 or guest OS space 160. Effectively, by clamping PID 116 to “0” forrequests directed to a shared address space, requests to the kernelspace disregard the identifier of the process making the request. In analternate example, the clamped value for clamping PID for shared addressspace requests may be set to a value other than “0”. In addition, aswill be described with reference to FIGS. 6-8, for a second selection ofcontext characteristics labeled under “1B”, PID 116 may also be set to aclamped value of “1”, or another clamped value different from theclamped value for a shared address space within other application space158, in the example case where other application space 158 is providedas an additional application-shared address space.

In the example, if TLB controller 106 detects a TLB miss for aparticular VA, TLB controller 106 uses one or more functions to look upthe real page number for the VA using page tables and other tables andthen adds an entry to TLB 142 with the contents set in the VA. Forexample, TLB LPID 146 is set to LPID 114, TLB PID 148 is set to PID 116and TLB EA 150 is set to EA 118. By setting the TLB entry with a VAselected by first context selection controller 108 and second contextselection controller 110, the determination as to whether to set TLBLPID 146 or TLB PID 148 to a clamped value is effectively determinedprior to any TLB lookup and is effectively determined using the same setof context characteristics that also determine whether to clamp the samevalues in VA 112 for a subsequent context.

In the example, TLB 142 may include entries directed to multipleprivilege levels or different privilege based address space, entriesdirected to shared address spaces, and entries directed to applicationspecific space.

In one example, a first entry 220 shows an example of a TLB entry for acontext set to a highest privilege mode setting and hypervisor space 156for case “1A” or for a context directed to a most protected addressspace (hypervisor space 156) for case “1B”, where TLB LPID 146 and TLBPID 148 are both clamped. In the example, entry 220 may trigger a TLBhit for any subsequent context in which first context selectioncontroller 108 sets LPID 114 to a clamped value of “0” and in whichsecond context selection controller 110 sets PID 116 to a clamped valueof “0”. Effectively, a subsequent context that triggers a TLB hit toentry 220 will include context registers loaded with MSR[HV]=1 andEA[0]=1 and the values of LPID and PID are disregarded, such that thetranslation in entry 220 is shareable by multiple processes operatingunder MSR[HV]=1 and directed to hypervisor space 156.

In one example, a second entry 222 shows an example of a TLB entry for acontext directed to a general shared address space, such as guest OSspace 160, where TLB LPID 146 is set to a particular LPAR labeled “5”and TLB PID 148 is clamped to “0”. In the example, entry 222 may triggera TLB hit for any subsequent context in which first context selectioncontroller 108 does not clamp LPID 114, but sets LPID 114 to a value inan LPIDR that matches TLB LPID 146, and in which second contextselection controller 110 sets PID 116 to a clamped value of “0”.Effectively, a subsequent context that triggers a TLB hit to entry 222will include context registers loaded with LPIDR=5 and EA[0]=1 and thevalue of PID is disregarded, such that the translation in entry 222 isshareable by multiple processes within a particular logical partition.

In one example, a third entry 224 shows an example of a TLB entry for acontext directed to an application specific space, such as applicationsspace 162, where TLB LPID 146 is set to a particular LPAR labeled “5”and TLB PID 148 is set to a process labeled “2”. In the example, entry224 may trigger a TLB hit for any subsequent context in which firstcontext selection controller 108 does not clamp LPID 114, but sets LPID114 to a value in LPIDR that matches TLB LPID 146, and in which secondcontext selection controller 110 does not clamp PID 116, but sets PID116 to a value in PIDR that matches TLB PID 148. Effectively, asubsequent context that triggers a TLB hit to entry 224 will includecontext registers loaded with LPIDR=5, PIDR=2 and EA[0]=0.

In the example, while in other embodiments a TLB controller may supportsetting a clamped value of “0” within TLB LPID 146 or TLB PID 148 of aTLB entry, and a clamped value of “0” identifying a shared TLB entryregardless of the value set in the VA for LPID 114 or PID 116, forsubsequent comparisons to the TLB entry, the TLB controller willidentify a match between any value compared in the correlating field inthe VA with the clamped value of “0” in the TLB entry, the overheadplaced on the TLB controller to identify a match between any valuecompared with a clamped value of “0” in the TLB entry, and to performthis computation for each TLB entry comparison, exceeds the logicrequired to identify a match between a field set to “0” and anotherfield set to “0”, as described in the comparison performed in FIG. 2. Inthe example illustrated in FIG. 2, by setting clamped values in VA 112,the determination of whether a VA may access a shared TLB entry is setin VA 112.

FIG. 3 illustrates one example of a block diagram of components of a TLBcontroller for managing translations using a TLB in a processor andmanaging a TLB with entries available for contexts with differentprivilege levels, in an example where address translation by the TLBcontroller is turned off for hypervisor access to non-hypervisorpartitioned address space.

In the example, as illustrated at reference numeral 300, the exampleillustrated represents an option labeled as “1A” in FIG. 2, whichprovides clamping based on the highest privilege mode setting (MSR[HV])and clamping based on the shared address space setting (EA[0]). In theexample, for the current context, an address EA[0:N] requirestranslation into a real address (RA).

In one example, an address space 354 may be characterized both by thehighest privilege mode setting (MSR[HV]) and the shared address spacesetting (EA[0]). For example, within address space 354, a hypervisorpartition space that includes hypervisor space 302 and hypervisorapplications space 304 may be characterized by a highest privilege modesetting of MSR[HV]=1. In the example, hypervisor space 302 is furthercharacterized by a shared address space setting of EA[0]=1, indicatingshared space, and hypervisor applications space 304 is furthercharacterized by a shared address setting of EA[0]=0, indicating thatthe space is hypervisor application specific within the hypervisorpartition. In addition, within address space 354, a non-hypervisoraddress space allocated to one or more logical partitions, whichincludes OS space 306 and application space 308, may be characterized bynot being set to a highest privilege mode setting of MSR[HV]=1. In theexample, OS space 306 is further characterized by a shared address spacesetting of EA[0]=1, indicating shared space, and applications space 308is further characterized by a shared address setting of EA[0]=0,indicating that the space is application specific within a logicalpartition.

In the example, a clamp register 316 may logically represent bits ofother registers within a processor or may represent specific registersset for clamp register 316. In one example, clamp register 316 mayinclude a clamp register A 317 and a clamp register B 318. In theexample, both clamp register A 317 and clamp register B 318 are set to“0”, each of which represents a clamped value. In other examples, clampregister A 317 and clamp register B 318 may be implemented as a singleregister, rather than separate registers. In other examples, clampregister A 317 and clamp register B 318 may be set to values other than“0”.

In the example, first context selection controller logic 310 may includea switch or other selection controller that includes an value read fromthe MSR[HV] register as the control input for selecting between an inputof clamp register A 317, set to “0”, the clamped value, and L, the valueloaded into the LPID register for the current context. The output offirst context selection controller logic 310 sets the value within LPID114 of VA 112. In the example, if the value read from the MSR[HV]register is “1”, then first context selection controller logic 310outputs a “0”, a clamped value. In the example, if the value read fromthe MSR[HV] register is “0”, then first context selection controllerlogic 310 outputs “L”, the value read from the LPID register.

In the example, second context selection controller logic 312 mayinclude a switch or other selection controller that includes a valueread from the EA[0] bit of the EA[0:N] address register as the controlinput for selecting between an input of clamp register B 318, set to“0”, the clamped value, and P, the value loaded into the PID registerfor the current context. The output of second context selectioncontroller logic 312 sets the value within PID 116 of VA 112. In theexample, if the value read from EA[0] is “1”, then second contextselection controller logic 312 outputs a “0”, a clamped value. In theexample, if the value read from EA[0] is “0”, then second contextselection controller logic 312 outputs a “P”, the value read from thePID register.

In the example, address space 354 illustrates, for the logic applied infirst context selection controller logic 310 and second contextselection controller logic 312, the LPID and PID settings applied foreach type of address space, reflecting the MSR[HV] and EA[0]characteristics of each address space. For example, for address requestsreceived for a context operating with MSR[HV]=1, if EA[0]=1, asillustrated within hypervisor space 302, then the LPID and PID are bothclamped to “0” in a VA for the address request, and, if EA[0]=0, asillustrated within hypervisor applications space 304, then the LPID isclamped to “0” and the PID is set to the PID register value P for theaddress request. For example, for address requests received for acontext operating with MSR[HV]=0, if EA[0]=1, as illustrated within OSspace 306, then the LPID is set to the LPID register value L and the PIDis clamped to “0” in a VA for the address request, and, if EA[0]=0, asillustrated within applications space 308, then the LPID is set to theLPID register value L and the PID is set to the PID register value P forthe address request.

In the example illustrated, if the highest privilege mode setting for acurrent context is set to the highest privilege mode by settingMSR[HV]=1, but the address for a memory request is directed to theaddress space within OS space 306 or applications address space 308, thehypervisor may set MSR[IR/DR] to “0” to turn off translations by the TLBcontroller and perform translations of the address for a memory requestinto a real address, functioning in a real addressing mode controlled bythe hypervisor. In the example, effectively, if LPID 114 is set to aclamped value of “0”, the clamped value of “0” is effectively the LPIDfor the hypervisor partition of address space identified by hypervisorspace 302 and hypervisor applications space 304.

In the example, VA 112 is compared with each entry of TLB 142, such asan entry 314, by matching logic 324. In one example, matching logic 324includes a comparator gate 326, such as an AND gate or an XNOR gate, foroutputting a value indicating whether LPID 114 matches TLB PID 146 ofentry 314, a gate 328 for outputting a value indicating whether PID 116matches TLB PID 148 of entry 314, and a gate 330 for outputting a valueindicating whether EA 118 matches TLB EA 150. As illustrated atreference numeral 322, if all the outputs from gate 326, gate 328, andgate 330 indicate the compared fields of VA 112 match the comparedfields of entry 314, then a TLB hit signal is output and real pagenumber 152 from the entry triggering the TLB hit is read as the RAtranslation for the VA. In another example, matching logic 324 mayimplement logic to enable performing an overarching AND comparison ofthe XNOR comparison of the bits being compared through comparator gate324, compactor gate 326, and comparator gate 328. For example, todetermine whether VA matches TLB LPID 146, TLB PID 148, and TLB EA 150,matching logic 324 may include logic for performing “AND_REDUCE(NOT(VAXOR TLB LPID 146|TLB PID 148|TLB EA 150))”. While in the exampleillustrated, EA 118 is illustrated as including bits [1:N] of the totalbits EA [0:N] and TLB EA 150 may include bits [1:N], in additional oralternate examples, EA 118 may include bits [0:N], TLB EA 150 mayinclude bits [0:N], and VA 112 and TLB entry 314 may each includeadditional bits that are only selectively compared against one another,to enable a system in which clamping can be enabled or disabled. Forexample, when clamping is enabled, the additional bits may not becompared against one another when VA 112 is compared against the entrieswithin TLB 142.

In the example, if none of the entries in TLB 142 yield a TLB hit asillustrated at reference numeral 322, then as illustrated at referencenumeral 320, a TLB miss is triggered. If a TLB miss is triggered,mechanisms for tracing through page tables and other addressing tablesmay be triggered to trace an RA for a VA. In one example, mechanisms fortracing an RA to a VA may include raising a page fault exception, whichis handled by a guest OS or hypervisor. In one example, once an RA istraced for a VA, a TLB entry is added to TLB 142 with the VA and thereal page number for the RA identified for the VA. In the example, thetime required to search TLB 142 and determine that a miss has occurredmay be less than the time required to trace an RA for a VA through oneor more types of mechanisms, such that once an RA has been traced for aVA, maintaining a TLB entry with the traced RA for the VA within TLB 142across context switching eliminates redundant tracing of RA's for VA'sacross context switches.

In the example illustrated, TLB 142 may include TLB entries for contextsof different privilege levels, such that for context shifts betweendifferent privilege levels, the TLB entries for contexts of differentprivilege levels may all remain within TLB 142, but the current contextmay only receive a TLB hit to TLB entries entered for a previous contextof the same privilege level. For example, TLB 142 may include an entryfor an address translated from hypervisor space 302, added for a contextwith a highest privilege level setting of MSR[HV]=1, and an entry for anaddress translated from OS space 306, added for a context whereMSR[HV]=0. In the example, all the entries within TLB 142 with TLB LPID146 marked to “0” represent TLB entries for translating address spacerequests by contexts with MSR[HV]=1. In the example, all the entrieswithin TLB 142 with TLB LPID 146 marked to a value other than “0”represent TLB entries for an translating address space request for acurrent context not operating in the highest privilege level, but thecurrent context may only receive a TLB hit to TLB entries entered for aprevious context from a same LPAR, with a same value L loaded into theLPID register.

In the example illustrated, TLB 142 may also include TLB entries forcontexts of a same privilege level, with specific entries for anyapplication specific address space only accessible by a specific processoperating within a specific LPAR, but with a same, single entry for anyshared address space accessible by all processes operating within aspecific LPAR. For example, TLB 142 may manage a single entry for accessby multiple contexts operating at a same privilege level and accessing asame shared address space, independent of the PID register value of theprocess originally triggering the creation of the TLB entry. In theexample, all the entries within TLB 142 with TLB LPID 146 marked to avalue other than “0” and TLB PID 148 marked to “0” represent shared TLBentries for translating all process requests to OS space 306 for thedesignated LPID. In the example, all entries within TLB 142 with TLB PID148 marked to a value other than “0” represent TLB entries fortranslating an address space request for a current context that isrequesting access to an address space that is application specific.

In the example, by storing TLB entries within TLB 142 that may includeclamped values in TLB PID 148 and by also clamping PID 116 in VA 112 fora request to shared access space, a single, direct comparison, using asimple logic gate, may be made between PID 116 and TLB PID 148 todetermine a TLB hit to an entry within matching logic 324. In contrast,if TLB PID 148 were set to a clamped value of “0” to allow for sharingof the entry among processes, but clamping was not also performed in thevalue set for PID 116 when EA[0]=1, matching logic 324 would requirelogic for each comparison to first determine if PID 116 matched TLB PID148, as illustrated, but would also require additional logic forcomparing the TLB PID within each entry within TLB 142, to determinewhether TLB PID is equal to zero and output a match value. Additionallogic within matching logic 324 increases the computational overhead ofthe TLB controller for every entry compared for a TLB lookup of aparticular VA. In contrast, in the example illustrated in FIG. 3, bysetting PID 116 to a clamped value within VA 112 when EA[0]=1, secondcontext selection controller logic 312 effectively provides a singlecomputational step for determining whether the VA can have a TLB hit toa TLB entry with TLB PID 148 set to a clamped value of “0”, which ismore efficient than making this determination within matching logic 324for each TLB entry comparison. In addition, in the example illustratedin FIG. 3, by setting PID 116 to a clamped value within VA 112 whenEA[0]=1, second context selection controller logic 312 effectivelyprovides the single computational step for also setting TLB PID 148 ifthere is a TLB miss, prior to the TLB lookup starting, because TLB PID148 will be set to the clamped value in PID 116 if there is a TLB miss,which is more efficient than TLB controller logic determining whetherTLB PID 148 should include a clamped value after a TLB miss occurs.

In the example, by storing TLB entries within TLB 142 that may includeclamped values in TLB LPID 146 and by also clamping LPID 114 in the VAfor a context operating in the highest privilege mode, a single, directcomparison, using a simple logic gate, may be made between LPID 114 andTLB LPID 146 to determine a TLB hit to an entry within matching logic324. In contrast, if TLB LPID 146 were set to a clamped value of “0” todesignate an entry as only accessible to a context operating with in thehighest privilege mode, but clamping was not also performed in the valueset for LPID 114 when MSR[HV]=1, matching logic 324 would require logicfor each comparison to first determine if LPID 114 matched TLB LPID 146,as illustrated, but would also require additional logic for comparingthe value of MSR[HV] for a context with a flag value set to identify theprivilege level required for access to an entry, to determine whether tooutput a match value for an access. Additional logic within matchinglogic 324 increases the computational overhead of the TLB controller forevery entry compared for a TLB lookup of a particular VA. In contrast,in the example illustrated in FIG. 3, by setting LPID 114 to a clampedvalue within VA 112 when MSR[HV]=1, first context selection controllerlogic 310 effectively provides a single computational step for clampingthe LPID to “0”, to designate the LPID value of 0 for accesses tohypervisor space 302, which is more efficient than making thisdetermination within matching logic 324 for each TLB entry comparison.In addition, in the example illustrated in FIG. 3, by setting LPID 114to a clamped value within VA 112 when MSR[HV]=1, first context selectioncontroller logic 310 effectively provides the single computational stepfor also determining TLB LPID 148 clamping value to set a clamped valuein TLB PID 148 if there is a TLB miss and a TLB entry is added for therequest, prior to the TLB lookup starting, which is more efficient thanTLB controller logic determining whether TLB PID 148 should include aclamped value after a TLB miss occurs. In addition, in the exampleillustrated in FIG. 3, by setting LPID 114 within VA 112 to a clampedvalue when MSR[HV]=1, second context selection controller logic 312effectively provides the single computational step for also setting TLBLPID 146 if there is a TLB miss, prior to the TLB lookup starting,because TLB LPID 146 will be set to the clamped value in LPID 114 ifthere is a TLB miss, which is more efficient than TLB controller logicdetermining whether TLB LPID 146 should include a clamped value and aprivilege flag setting after a TLB miss occurs.

FIG. 4 illustrates one example of a high level logic flowchart of aprocess and program for managing translation of a same address acrossmultiple contexts using a same entry in a TLB and managing a TLB withentries available for contexts with different privilege levels, in anexample where address translation by the TLB controller is turned offfor hypervisor access to non-hypervisor partitioned address space.

In the example, the process and program starts at block 400 andthereafter proceed to block 402. Block 402 illustrates loading anaddress EA[0:N]. In the example, the address space described by addressEA[0:N] specifies a first bit EA[0] for designating whether the addressspace is considered within the kernel space of a logical partition.Next, block 404 illustrates a determination 0. whether TLB controllertranslation is turned off, such as by determining whether MSR[IR]=0 foran instruction-side access or whether MSR[DR]=0 for a data-side access.At block 404, if TLB controller translation is turned off, then theprocess passes to block 406. Block 406 illustrates accessing the realaddressing for the requested address by the hypervisor managing thetranslation in real mode, and the process ends. At block 404, if TLBcontroller translation is not turned off, then the process passes toblock 408. In another example, the determination performed by block 404may be performed by a different process, such that the processillustrated in FIG. 4, without block 404 and block 406, is onlytriggered if block 404 has been evaluated by another process and thecondition in block 404 is not true. For example, a hypervisor mayperform the function illustrated by block 404 as a software logicfunction, whereas a processor may perform other functions of FIG. 4 ashardware logic functions.

Block 408 illustrates selecting the LPID and PID values for a currentcontext by the process passing to block 410. Block 410 illustrates adetermination whether a context is set to a highest privilege mode, forexample if MSR[HV]=1. At block 410, if the context is set to a highestprivilege mode, then the process passes to block 412. Block 412illustrates clamping the LPID to the clamp value (0), and the processpasses to block 416. At block 410, if the context is not set to ahighest privilege mode, for example if MSR[HV]=0, then the processpasses to block 414. Block 414 illustrates setting the LPID to the LPIDregister value L, and the process passes to block 416.

Block 416 illustrates a determination whether the address request isdirected to a shared address space, for example if EA[0]=1. At block416, if the address request is directed to a shared address space, thenthe process passes to block 418. Block 418 illustrates clamping the PIDto the clamp value (0), and the process proceeds to block 422. At block416, if the address request is not directed to a shared address space,then the process passes to block 420. Block 420 illustrates setting thePID to the PID register value P, and the process passes to block 422.

Block 422 illustrates performing a TLB lookup for the VA set to theLPID, the PID, and all of or a portion of the EA, depending on theportion of the EA that is comparable to the TLB EA, such as EA[1:N].Next, block 424 illustrates a determination whether there is a TLB hit.At block 424, if there is a TLB hit, then the process passes to block426. Block 426 illustrates accessing the matching entry in the TLB, andthe process ends. At block 428, if there is not a TLB hit, then theprocess passes to block 428. Block 428 illustrates triggering acontroller, which may include a software or a hardware controller, todetermine the real address (RA) associated with the VA, such as bydetermining the real page number associated with the EA. In one example,a page fault exception may be triggered and a guest OS or hypervisorwill handle the page fault exception. Next, in the example, once an RAis determined, block 430 illustrates adding a new TLB entry to with theVA and RA to the TLB, where the VA is set to the LPID and PID valuescalculated for the current context.

FIG. 5 illustrates a block diagram of one example of a TLB controllermanaging translation of a same address across multiple contexts using asame entry in a TLB and managing a TLB with entries available forcontexts with different privilege levels in an example where addresstranslation by the TLB controller is turned off for hypervisor access tonon-hypervisor partitioned address space.

In the example, at each of multiple times, a current context 502 loadedinto a processor is described, including the LPID and PID values set fora VA by a TLB controller, a TLB controller action 504 is illustrated,and a TLB status 506 is illustrated, showing the current TLB entrieswithin a TLB. While in the example illustrated, the current statusillustrates TLB EA as including bits [1:N], and the VA at each of thetimes is illustrated with EA[1:N], in additional or alternate examples,each TLB EA may include bits [0:N], and each VA at each time may includebits [0:N], where the additional bits may be selectively comparedagainst one another. In the examples illustrated, the setting for theTLB translation control parameter MSR[IR:DR] is MSR[IR]=1 or MSR[DR]=1,except as noted in the example for time T=3 in current context 518.

In one example, at time T=1, TLB status 506 illustrates a TLB table withan entry 508, identified by an ID of “1”, with a TLB LPID of “1”, a TLBPID of “3”, a TLB EA of “0CC . . . ” and a TLB RA of “RPN1”. In theexample, TLB entry 508 is directed to an address within applicationsspace 308, specified within a space allocated for a LPAR with an L of“1” and for a process with a P of “3”.

In one example, at a time T=2, current context 510 illustratescharacteristics of a context and the LPID and PID values set in the VAfor the context. In the example of current context 510, the addressrequest EA[0:N]=“11AA . . . ”, MSR[HV]=1, LPIDR=L, and PIDR=P. Inaddition, in the example of current context 510, based on the setting ofMSR[HV]=1 and EA[0]=1, both the LPID and the PID are clamped to “0”. Inthe example, the TLB controller compares a VA of “0|0|1AA . . . ” intothe TLB entry and detects a TLB miss. As illustrated at action 514, inresponse to the TLB miss, an entry is added to the TLB for the VA. Inthe example, entry 516 is added to the TLB, with and ID of “2”, a TLBLPID of “0”, a TLB PID of “0”, a TLB EA of “1AA . . . ” and a TLB RA of“RPN2”.

In one example, at a time T=3, current context 518 illustratescharacteristics of a context, where the characteristics of the contextindicate that translation by the TLB controller is turned off. Inparticular, current context 518 includes EA[0:N]=“10BB . . . ”,MSR[HV]=1, LPIDR=2, and PIDR=8, with the TLB translation controlparameter set to MSR[IR:DR]=00. In the example, the addressing to “10BB”is an address that is within OS address space 306, however, in theexample, translation by the TLB controller is turned off and thehypervisor is set to translate requests to OS address space 306 when ina real mode. In the example, because translation by the TLB controlleris turned off, the TLB controller may not add an entry for the context.In another example, when translation by the TLB controller is turnedoff, the TLB controller may capture the address translation performed bya hypervisor and add a TLB entry for the context.

In one example, at a time T=4, current context 520 illustratescharacteristics of a context and the LPID and PID values set in the VAfor the context. In the example of current context 520, the addressrequest EA[0:N]=“10BB . . . ”, MSR[HV]=0, LPIDR=2, and PIDR=8. Inaddition, in the example of current context 520, based on the setting ofMSR[HV]=0 and EA[0]=1, the LPID is set to the value of LPIDR of “2” andthe PID is clamped to “0”. In the example, the TLB controller compares aVA of “2|0|0BB . . . ” into the TLB entry and detects a TLB miss. Asillustrated at action 522, in response to the TLB miss, an entry isadded to the TLB for the VA. In the example, entry 524 is added to theTLB, with and ID of “3”, a TLB LPID of “2”, a TLB PID of “0”, a TLB EAof “0BB . . . ” and a TLB RA of “RPN3”. In the example, while the sameaddress space was referenced at time T=3 and time T=4, the translationby the TLB controller at time T=4 is the first entry for the addressspace because translation was not handled by the TLB controller at timeT=3.

In one example, at a time T=5, current context 526 illustratescharacteristics of a context and the LPID and PID values set in the VAfor the context. In the example of current context 526, the addressrequest EA[0:N]=“00CC . . . ”, MSR[HV]=0, LPIDR=1, and PIDR=3. Inaddition, in the example of current context 526, based on the setting ofMSR[HV]=0 and EA[0]=0, the LPID is set to the value of LPIDR of “1” andthe PID is set to the PIDR value of “3”. In the example, the TLBcontroller compares a VA of “1|3|0CC . . . ” into the TLB entry anddetects a TLB hit into the TLB entry with an ID=1, which is entry 508.In the example, the TLB may include entry 508 directed to addressingwithin applications space 308, which is not shared between processes,and entry 508 only triggers a TLB hit for a current context when thecurrent context has the same context characteristics illustrated incurrent context 526.

In one example, at a time T=6, current context 530 illustratescharacteristics of a context and the LPID and PID values set in the VAfor the context. In the example of current context 530, the addressrequest EA[0:N]=“10BB . . . ”, MSR[HV]=0, LPIDR=2, and PIDR=3. Inaddition, in the example of current context 530, based on the setting ofMSR[HV]=0 and EA[0]=1, the LPID is set to the value of LPIDR of “2” andthe PID is clamped to “0”. In the example, the TLB controller compares aVA of “2|0|0BB . . . ” into the TLB entry and detects a TLB hit into theTLB entry with an ID=3, which is entry 524. In the example, the TLB mayinclude entry 524 directed to addressing within OS space 306, which isshared between processes within a particular LPAR, and entry 524 maytrigger a TLB hit for any current context with context characteristicsof EA[0:N]=“10BB . . . ”, MSR[HV]=0, LPIDR=2, regardless of the valueloaded into the PIDR for the context. For example, when entry 524 isadded to the TLB at time T=4, the PIDR in context 520 is set to “8” andat time T=6, when a TLB hit is detected to entry 524, the PIDR incontext 530 is set to “3”. In the example, by clamping the PID value inthe VA to match a stored clamped TLB PID value in TLB entry 524, TLBentry 524 rather than creating a separate TLB entry for context 530, thePID in the VA may be directly matched through a single gate match to theTLB PID value in TLB entry 524 and entry 524 shared by multipleprocesses.

In one example, at a time T=7, current context 534 illustratescharacteristics of a context and the LPID and PID values set in the VAfor the context. In the example of current context 534, the addressrequest EA[0:N]=“11AA . . . ”, MSR[HV]=1, LPIDR=L, and PIDR=P. Inaddition, in the example of current context 534, based on the setting ofMSR[HV]=1 and EA[0]=1, the LPID and PID are both clamped to “0”. In theexample, the TLB controller compares a VA of “0|0|1AA . . . ” into theTLB entry and detects a TLB hit into the TLB entry with an ID=2, whichis entry 516. In the example, the TLB may include entry 516 directed toaddressing within hypervisor space 302, which is only accessible whenMSR[HV]=1, and entry 516 may trigger a TLB hit for any current contextwith context characteristics of EA[0:N]=“11AA . . . ” and MSR[HV]=1,regardless of the values loaded into the LPIDR and PIDR for the context.Effectively, by clamping the LPID to “0” for a context in whichMSR[HV]=1, anytime the MSR[HV]=1 and the EA is directed to hypervisorspace 302, a same entry 516 may be accessed only when the contextswitches to the highest privileged mode setting.

In the example, TLB status 506 shows that a TLB may concurrentlymaintain TLB entries directed to multiple privilege levels, TLB entriesshared between multiple contexts of a same privilege level, and TLBentries specified for a particular context. For example, entry 516 willonly trigger a TLB match when compared to contexts set to the highestprivilege level by MSR[HV]=1, in contrast to entry 508 and entry 524,will only trigger a TLB match when compared to contexts not set to thehighest privileged level by MSR[HV]=0. On context switches betweencontexts with MSR[HV]=1 or 0, entry 508, entry 516, and entry 524 mayall remain in the TLB. Further, entry 508 and entry 524 are onlyapplicable to contexts set to a same privilege level of MSR[HV]=0, butentry 508 will only trigger a TLB match to a context with a same,specified set of context characteristics and entry 524 is shared totrigger a TLB match for contexts including multiple processes, withdifferent PID, but with a same LPID. On context switches betweencontexts with MSR[HV]=0, but addressed to shared address spaces andapplication specific address spaces, entry 508, entry 516, and entry 524may all remain in the TLB.

FIG. 6 illustrates one example of a block diagram of components of a TLBcontroller for managing translations using a TLB in a processor of asame address across multiple contexts using a same entry in a TLB andmanaging a TLB with entries available for contexts with differentprivilege levels, where address translations to non-hypervisor partitionaddress space are performed by the TLB controller independent of ahighest privilege mode setting;

In the example, as illustrated at reference numeral 600, the exampleillustrated represents an option labeled as “1B” in FIG. 2, whichprovides clamping based on the most privileged address space setting(EA[0:1]=11) and clamping based on the privilege level within a sharedaddress space setting (EA[0:1]=10 or 01). In the example, for thecurrent context, an address EA[0:N] requires translation into a realaddress (RA).

In one example, an address space 654 may be characterized by the mostprivileged address space setting (EA[0:1]=11), by an application-sharedaddress space setting (EA[0:1]=01), by a general shared address spacesetting (EA[0:1]=10), and by an application specific address spacesetting (EA[0:1]=00). For example, within address space 654, ahypervisor space 602 that may only be accessible when the processor isoperating in a highest privilege mode setting of MSR[HV]=1, ischaracterized by an address space setting of EA[0:1]=11, which is themost privileged address space. In addition, within address space 654, anon-hypervisor address space allocated to one or more logicalpartitions, which includes OS space 604, application-shared space 606,and applications space 608, may be accessible to contexts with a highestprivilege mode setting of MSR[HV]=0 or 1. In the example, OS space 604is further characterized by an address space setting of EA[0:1]=10,indicating general shared space within a non-hypervisor logicalpartition, and applications space 608 is further characterized by anaddress space setting of EA[0:1]=00, indicating that the space isapplication specific within a non-hypervisor logical partition. In theexample, application-shared address space 606 is a special, additionalshared application space, available for application sharing,characterized by an address space setting of EA[0:1]=01. One of ordinaryskill in the art will appreciate that while each of the spaces withinaddress space 654 is identified by a particular setting of EA[0:1], inother embodiments, the same types of address spaces may be identified byother settings of EA bits or other register bits. In additional oralternate embodiments, additional or alternate bits may be set andencoded to represent each of the types of address spaces.

In one example, each of the spaces within address space may be furthercharacterized by the problem state bit setting that may be associatedwith each address space. In one example, hypervisor space 602 an OSspace 604 may represent spaces that are accessed when the problem statesetting of a processor is set to operate in a supervisor mode(MSR[PR]=0) and application-shared space 606 and applications space 608may represent spaces that are accessed when the problem state setting ofa processor is set to operate in a problem state mode (MSR[PR]=1). Thus,in one example, hypervisor space 602 may represent a most privilegedaddress space accessible when MSR[HV:PR]=10, where EA[0:1]=11effectively represents a most privileged address space, OS space 604 mayrepresent a second level of privileged address space accessible whenMSR[HV:PR]=10 or 00, where EA[0:1]=10 effectively represents a secondlevel of privileged address space, and application-shared space 606 andapplications space 608 may represent a third level of privileged addressspace accessible when MSR[HV:PR]=10, 00, 01, or 11, where EA[0:1]=01 and00 effectively represents a third level of privileged address space. Inthe example, FIG. 6 illustrates one example of bits specified to encodeeach level of privilege within an address space. One of ordinary skillin the art will appreciate that additional or alternate encoding methodsmay be implemented to identify the privilege levels of address spacesand that address spaces may be encoded through with privilege levelinformation within additional or alternate EA bits or other settingswithin the processor. One of ordinary skill in the art will appreciatethat additional or alternate privilege layers may be specified within anaddress space and that the additional or alternate privileges layers maybe encoded into the address space through EA bit settings and othersettings within the processor.

In the example, a clamp register 616 may logically represent bits ofother registers within a processor or may represent specific registersset for clamp register 616. In one example, clamp register 616 mayinclude a clamp register A 617, a clamp register B 618, and a clampregister C 619. In the example, both clamp register A 617 and clampregister B 618 are set to “0” and clamp register C 619 is set to “1”,each of which represents a clamped value. In other examples, clampregister A 617 and clamp register B 618 may be implemented as a singleregister, rather than separate registers. In other examples, clampregister A 617 and clamp register B 618 may be set to values other than“0” and clamp register C 619 may be set to a value other than “1”.

In the example, first context selection controller logic 610 may includea switch or other selection controller that includes an value read fromthe EA[0:1] bits of EA[0:N] address register as the control input forselecting between an input of clamp register A 617, set to “0”, theclamped value, and L, the value loaded into the LPID register for thecurrent context. The output of first context selection controller logic610 sets the value within LPID 114 of VA 112. In the example, if thevalue read from the EA[0:1] is “11”, then first context selectioncontroller logic 610 outputs a “0”, a clamped value representing themost privileged address space. In the example, if the value read fromthe EA[0:1] is not “11”, then first context selection controller logic610 outputs “L”, the value read from the LPID register.

In the example, second context selection controller logic 612 mayinclude a switch or other selection controller that includes a valueread from the EA[0:1] bits of the EA[0:N] address register as thecontrol input for selecting between an first input of clamp register B618, set to “0”, the clamped value for processes accessing hypervisorspace 602 or OS space 604, a second input of clamp register C 619, setto “1”, the clamped value for processes accessing application-sharedaddress space 606 and a third input “P”, the value loaded into the PIDregister for the current context. The output of second context selectioncontroller logic 612 sets the value within PID 116 of VA 112. In theexample, if the value read from EA[0:1] is “11” or “10”, then secondcontext selection controller logic 612 outputs a “0”, a clamped valuefor processes accessing hypervisor space 602 or OS space 604. In theexample, if the value read from EA[0:1] is “01”, then second contextselection controller logic 612 outputs a “1”, a clamped value forprocesses accessing application-shared address space 606 In the example,if the value read from EA[0:1] is “00”, then second context selectioncontroller logic 612 outputs a “P”, the value read from the PIDregister.

In the example, address space 654 illustrates, for the logic applied infirst context selection controller logic 610 and second contextselection controller logic 612, the LPID and PID settings applied foreach type of address space, reflecting the EA[0:1] characteristics ofeach address space. For example, for address requests received for acontext operating with EA[0:1]=11, as illustrated within hypervisorspace 602, then the LPID and PID are both clamped to “0” in a VA for theaddress request. In the example, if EA[0:1]=01, as illustrated withinapplication-shared address space 606, then the LPID is set to the LPIDregister value L and the PID is set to a clamped value of “1” for theaddress request. In the example, if EA[0:1]=10, as illustrated within OSspace 604, then the LPID is set to the LPID register value L and the PIDis clamped to “0” in a VA for the address request, and, if EA[0:1]=00,as illustrated within applications space 608, then the LPID is set tothe LPID register value L and the PID is set to the PID register value Pfor the address request. In additional or alternate embodiments, firstcontext selection controller logic 610 and second context selectioncontroller logic 612 may handle additional or alternate EA encodingsettings and may receive additional or alternate data inputs indicativeof privilege and sharing settings for an address space. In additional oralternate embodiments, first context selection controller logic 610 maybe set to clamp LPID to additional clamp values for one or more EAencoding settings, such as a clamp value of “1” for an address spacewith a second level of privilege, or to set LPID to other valuesindicative of privilege levels of address spaces. In additional oralternate embodiments, second context selection controller logic 612 maybe set to clamp PID to additional clamp values for one or more EAencoding settings or to set PID to other values indicative of sharingsettings of address spaces.

In the example illustrated, regardless of the MSR[HV] setting, if anaddress for a memory request is directed to the address space within OSspace 604, application-shared address space 606, or applications addressspace 608, where address translations to non-hypervisor partitionaddress space are performed by the TLB controller, then TLB entries tonon-hypervisor partition address space may be shared across contextswith different privilege mode settings. In the example, effectively, ifLPID 114 is set to a clamped value of “0”, the clamped value of “0” iseffectively the logical partition identifier for the hypervisorpartition of address space identified by hypervisor space 602. In theexample, if PID 116 is set to a clamped valued of “0”, the clamped valueof “0” is effectively the identifier for all accesses to hypervisorspace 602 and OS space 604. In the example, effectively, if PID 116 isset to a clamped value of “1”, the clamped value of “1” is effectivelythe identifier for all accesses to application-shared address space 606.

In the example, VA 112 is compared with each entry of TLB 142, such asan entry 614 by matching logic 624. In one example, matching logic 624includes a comparator gate 626, such as an AND gate, for outputting avalue indicating whether LPID 114 matches TLB PID 146 of entry 614, agate 628 for outputting a value indicating whether PID 116 matches TLBPID 148 of entry 614, and a gate 630 for outputting a value indicatingwhether EA 118 matches TLB EA 150. As illustrated at reference numeral622, if all the outputs from gate 626, gate 628, and gate 630 indicatethe compared fields of VA 112 match the compared fields of entry 614,then a TLB hit signal is output and real page number 152 from the entrytriggering the TLB hit is read as the RA translation for the VA. In theexample, if none of the entries in TLB 142 yield a TLB hit asillustrated at reference numeral 622, then as illustrated at referencenumeral 620, a TLB miss is triggered. If a TLB miss is triggered,mechanisms for tracing through page tables and other addressing tablesto trace an RA for a VA are triggered, such as by triggering a pagefault exception that is handled by a guest OS or hypervisor. In oneexample, once an RA is traced for a VA, a TLB entry is added to TLB 142with the VA and the real page number for the RA identified for the VA.While in the example illustrated, EA 118 is illustrated as includingbits [2:N] of the total bits EA [0:N] and TLB EA 150 may include bits[2:N], in additional or alternate examples, EA 118 may include bits[0:N], TLB EA 150 may include bits [0:N], and VA 112 and TLB entry 614may each include additional bits that are only selectively comparedagainst one another, to enable a system in which clamping can be enabledor disabled. For example, when clamping is enabled, the additional bitsmay not be compared against one another when VA 112 is compared againstthe entries within TLB 142.

In the example illustrated, TLB 142 may include TLB entries for contextsof different privilege levels, such that for context shifts betweendifferent privilege levels, the TLB entries for contexts of differentprivilege levels may all remain within TLB 142, where the currentcontext may only receive a TLB hit on TLB entries entered for a previouscontext of the same privilege level to the most privileged addressspace, but the current context may receive a TLB hit on TLB entriesentered for a previous context of any privilege level to the otheraddress spaces. For example, TLB 142 may include an entry for an addresstranslated from hypervisor space 602, which effectively requires thecontext also operate with a highest privilege level setting ofMSR[HV]=1, and may include an entry for an address translated from OSspace 604, added for a context where MSR[HV]=0 or 1. In the example, allthe entries within TLB 142 with TLB_LPID marked to “0” represent TLBentries for translating address space requests by contexts withMSR[HV]=1 and EA[0:1]=11. In the example, all the entries within TLB 142with TLB_LPID marked to a value other than “0” represent TLB entries foran translating address space request for a current context not addressedto hypervisor space 602, where the current context may only receive aTLB hit to TLB entries entered for a previous context from a same LPAR,with a same value L loaded into the LPID register.

In one example, one or more additional components or functions may beimplemented to filter and restrict access to entries within the TLB orto restrict use of entries access from the TLB based on MSR[HV] andMSR[PR] setting requirements for each address space. In one example,each TLB entry may include a separate privilege flag that indicates therequired setting of one or more of HV or PR for a current context toaccess a particular entry. In another example, hypervisor 166 or otherlogic within processor core 102 may restrict access to hypervisor space602 or to entries within TLB 142 for hypervisor space 602 to only thoserequests with MSR[HV:PR]=10 and restrict access to OS space 604 or toentries within TLB 142 for OS space 604 to only those requests withMSR[HV:PR]=10 or 00. One of ordinary skill in the art will appreciatethat additional or alternate software and hardware functions may beimplemented to provide protected access to specific address spaces thatare designated as requiring certain privilege levels to access thespecific address space.

In the example illustrated, TLB 142 may also include TLB entries thatare shareable by multiple processes including a same, single entry forany shared address space accessible across multiple processes. Forexample, TLB 142 may manage a single entry for access by multiplecontexts accessing a same shared address space, independent of the PIDregister value of the process originally triggering the TLB entry. Inthe example, all the entries within TLB 142 with TLB_LPID 146 marked toa value other than “0” and TLB PID marked to “0” represent shared TLBentries for translating all process requests to OS space 604 for thedesignated LPID. In the example, all entries within TLB 142 with TLB PID146 marked to “1”, may represent shared TLB entries for translating allprocess requests to application-shared address space 606 In the example,all entries within TLB 142 with TLB_LPID 146 marked to a value otherthan “0” and TLB_PID marked to a value other than “0” or “1” representTLB entries for translating an address space request for a currentcontext that is requesting access to an address space that isapplication specific.

As previously described with reference to matching logic 324 in FIG. 3,in the example, by storing TLB entries within TLB 142 that may includeclamped values in TLB PID 148 and by also clamping PID 116 in the VA fora request to shared access space, a single, direct comparison, using asimple logic gate, may be made between PID 116 and TLB PID 148 todetermine a TLB hit to an entry within matching logic 624. In addition,as previously described with reference to matching logic 324 in FIG. 3,in the example, by storing TLB entries within TLB 142 that may includeclamped values in TLB LPID 146 and by also clamping LPID 114 in the VAfor a context operating in the highest privilege mode, a single, directcomparison, using a simple logic gate, may be made between LPID 114 andTLB LPID 146 to determine a TLB hit to an entry within matching logic624.

FIG. 7 illustrates one example of a high level logic flowchart of aprocess and program for managing translation of a same address acrossmultiple contexts using a same entry in a TLB, where addresstranslations to non-hypervisor partition address space are performed bythe TLB controller independent of a highest privilege mode setting.

In the example, the process and program starts at block 700 andthereafter proceed to block 702. Block 702 illustrates a loading anaddress EA[0:N].

Next, block 704 illustrates selecting the LPID and PID values for acurrent context by the process passing to block 706. Block 706illustrates a determination whether the address request for a context isdirected to a most privileged address space, for example if EA[0:1]=11for a hypervisor space. At block 706, if the address request for thecontext is directed to a most privileged address space, then the processpasses to block 708. Block 708 illustrates clamping the LPID to theclamp value (0), and the process passes to block 712. At block 706, ifthe address request or the context is not directed to a most privilegedaddress space, then the process passes to block 710. Block 710illustrates setting the LPID to the LPID register value L, and theprocess passes to block 712.

Block 712 illustrates a determination whether the address request isdirected to a general shared address space, for example if EA[0:1]=10.At block 712, if the address request is directed to a general sharedaddress space, then the process passes to block 714. Block 714illustrates clamping the PID to the clamp value (0), and the processproceeds to block 722. At block 712, if the address request is notdirected to a shared address space, then the process passes to block716.

Block 716 illustrates a determination whether the address request isdirected to application-shared space, for example if EA[0:1]=01. Atblock 716, if the address request is directed to an application sharedspace, then the process passes to block 718. Block 718 illustratesclamping the PID to “1”, and the process proceeds to block 722. At block716, if the address request is not directed to application-shared space,then the process passes to block 720. Block 720 illustrates setting thePID to the PID register value P, and the process passes to block 722.

Block 722 illustrates performing a TLB lookup for the VA set to theLPID, the PID, and all of or a portion of the EA, depending on theportion of the EA that is comparable to the TLB EA, such as EA[2:N].Next, block 724 illustrates a determination whether there is a TLB hit.At block 724, if there is a TLB hit, then the process passes to block726. Block 726 illustrates accessing the matching entry in the TLB, andthe process ends. At block 728, if there is not a TLB hit, then theprocess passes to block 728. Block 728 illustrates triggering acontroller, which may include a software or a hardware controller, todetermine the real address (RA) associated with the VA, such as bydetermining the real page number associated with the EA. Next, block 730illustrates adding a new TLB entry to with the VA and RA to the TLB,where the VA is set to the LPID and PID values calculated for thecurrent context.

FIG. 8 illustrates a block diagram of one example of a TLB controllermanaging translation of a same address across multiple contexts using asame entry in a TLB and managing a TLB with entries available forcontexts with different privilege levels, where address translations tonon-hypervisor partition address space are performed by the TLBcontroller independent of a highest privilege mode setting.

In the example, at each of multiple times, a current context 802 loadedinto a processor is described, including the LPID and PID values set fora VA by a TLB controller, a TLB controller action 804 is illustrated,and a TLB status 806 is illustrated, showing the current TLB entrieswithin a TLB. While in the example illustrated, the current statusillustrates TLB EA as including bits [2:N], and the VA at each of thetimes is illustrated with EA[2:N], in additional or alternate examples,each TLB EA may include bits [0:N], and each VA at each time may includebits [0:N], where the additional bits may be selectively comparedagainst one another.

In the examples illustrated, the setting for the TLB translation controlparameter MSR[IR:DR] is MSR[IR]=1 or MSR[DR]=1. In additional oralternate embodiments, MSR[IR:DR] may also switch to a setting of “00”for one or more requests and the hypervisor may manage translationswithout TLB lookups, for example, as illustrated at time T=3 in FIG. 5.

In one example, at time T=1, TLB status 806 illustrates a TLB table withan entry 808, identified by an ID of “1”, with a TLB LPID of “1”, a TLBPID of “3”, a TLB EA of “CC . . . ” and a TLB RA of “RPN1”. In theexample, TLB entry 808 is directed to an address within applicationsspace 608, specified within a space allocated for a LPAR with an L of“1” and for a process with a P of “3”.

In one example, at a time T=2, current context 810 illustratescharacteristics of a context and the LPID and PID values set in the VAfor the context. In the example of current context 810, the addressrequest EA[0:N]=“11AA . . . ”, MSR[HV]=1, LPIDR=L, and PIDR=P. Inaddition, in the example of current context 810, based on the setting ofEA[0:1]=11, both the LPID and the PID are clamped to “0”. In theexample, regardless of the values of L and P, the TLB controllercompares a VA of “0|0|AA . . . ” into the TLB entry and detects a TLBmiss. As illustrated at action 814, in response to the TLB miss, anentry is added to the TLB for the VA. In the example, entry 816 is addedto the TLB, with and ID of “2”, a TLB LPID of “0”, a TLB PID of “0”, aTLB EA of “AA . . . ” and a TLB RA of “RPN2”.

In one example, at a time T=3, current context 816 illustratescharacteristics of a context and the LPID and PID values set in the VAfor the context. In the example of current context 816, the addressrequest EA[0:N]=“10BB . . . ”, MSR[HV]=1, LPIDR=2, and PIDR=8. Inaddition, in the example of current context 816, based on the setting ofEA[0:1]=10, LPID is set to the value L in LPIDR of “2” and PID isclamped to “0”. In the example, the TLB controller compares a VA of“2|0|BB . . . ” into the TLB entry and detects a TLB miss. Asillustrated at action 818, in response to the TLB miss, an entry isadded to the TLB for the VA. In the example, entry 820 is added to theTLB, with and ID of “3”, a TLB LPID of “2”, a TLB PID of “0”, a TLB EAof “BB . . . ” and a TLB RA of “RPN3”.

In one example, at a time T=4, current context 822 illustratescharacteristics of a context and the LPID and PID values set in the VAfor the context. In the example of current context 822, the addressrequest EA[0:N]=“10BB . . . ”, MSR[HV]=0, LPIDR=2, and PIDR=7. Inaddition, in the example of current context 520, based on the setting ofEA[0:1]=10, the LPID is set to the value of LPIDR of “2” and the PID isclamped to “0”. In the example, the TLB controller compares a VA of“2|0|BB . . . ” into the TLB entry and detects a TLB hit into the TLBentry with an ID=3, which is entry 820. In the example, although theMSR[HV] and PIDR values for context 816, which triggered entry 820, aredifferent from the MSR[HV] and PIDR values for context 822, a same entry820, which is directed to shared OS space 604, may be shared acrosscontexts with different privilege levels and different processes,without adding a separate TLB entry for each privilege level or eachprocess, and independent of the MSR[HV] or PIDR value of the contextthat triggered entry 820.

In one example, at a time T=5, current context 826 illustratescharacteristics of a context and the LPID and PID values set in the VAfor the context. In the example of current context 826, the addressrequest EA[0:N]=“00CC . . . ”, MSR[HV]=0, LPIDR=1, and PIDR=3. Inaddition, in the example of current context 826, based on the setting ofEA[0:1]=00, the LPID is set to the value of LPIDR of “1” and the PID isset to the PIDR value of “3”. In the example, the TLB controllercompares a VA of “1|3|CC . . . ” into the TLB entry and detects a TLBhit into the TLB entry with an ID=1, which is entry 808. In the example,the TLB may include entry 808 directed to addressing within applicationsspace 608, which is not shared address space, and entry 808 onlytriggers a TLB hit for a current context when the current context hasthe same context characteristics for LPIDR, PIDR, and EA illustrated incurrent context 826.

In one example, at a time T=6, current context 830 illustratescharacteristics of a context and the LPID and PID values set in the VAfor the context. In the example of current context 830, the addressrequest EA[0:N]=“01BB . . . ”, MSR[HV]=0, LPIDR=8, and PIDR=3. Inaddition, in the example of current context 830, based on the setting ofEA[0:1]=01, directed to application-shared address space 606, the LPIDis set to the value of LPIDR of “8” and the PID is clamped to “1”. Inthe example, the TLB controller compares a VA of “8|1|BB . . . ” intothe TLB entry and detects a TLB miss. As illustrated at action 832, inresponse to the TLB miss, an entry is added to the TLB for the VA. Inthe example, entry 834 is added to the TLB, with and ID of “4”, a TLBLPID of “8”, a TLB PID of “1”, a TLB EA of “BB . . . ” and a TLB RA of“RPN4”.

In one example, at a time T=7, current context 836 illustratescharacteristics of a context and the LPID and PID values set in the VAfor the context. In the example of current context 836, the addressrequest EA[0:N]=“11AA . . . ”, MSR[HV]=1, LPIDR=L, and PIDR=P. Inaddition, in the example of current context 836, based on the setting ofEA[0:1]=11, regardless of the values of L and P, the LPID and PID areboth clamped to “0”. In the example, the TLB controller compares a VA of“0|0|AA . . . ” into the TLB entry and detects a TLB hit into the TLBentry with an ID=2, which is entry 816. In the example, the TLB mayinclude entry 816 directed to addressing within hypervisor space 602,which is only accessible when MSR[HV]=1, and entry 816 may trigger a TLBhit for any current context with context characteristics ofEA[0:N]=“11AA . . . ” and MSR[HV]=1, regardless of the values loadedinto the LPIDR and PIDR for the context. Effectively, by clamping theLPID to “0” for a context with an address request directed to the mostprivileged address space of EA[0:1]=11, anytime the MSR[HV]=1 and the EAis directed to hypervisor space 602, a same entry 816 may be accessedonly when the context switches to the highest privileged mode setting.

In one example, at a time T=8, current context 840 illustratescharacteristics of a context and the LPID and PID values set in the VAfor the context. In the example of current context 840, the addressrequest EA[0:N]=“01BB . . . ”, MSR[HV]=1, LPIDR=8, and PIDR=4. Inaddition, in the example of current context 840, based on the setting ofEA[0:1]=01, the LPID is set to the LPIDR value of “8” and the PID isclamped to “1”. In the example, the TLB controller compares a VA of“8|1|BB . . . ” into the TLB entry and detects a TLB hit into the TLBentry with an ID=4, which is entry 834. In the example, the TLB mayinclude entry 834 directed to addressing within application-shared space606, which may trigger a TLB hit for any current context with contextcharacteristics of EA[0:N]=“01BB . . . ”, regardless of the PIDR for thecontext. Effectively, by clamping the PID to “1” for a context with anaddress request directed to the application-shared space of EA[0:1]=01,anytime the EA is directed to application-shared space 606, a same entry834 may be accessed only when the same LPID is identified. In theexample, although the MSR[HV] and PIDR values for context 830, whichtriggered entry 834, are different from the MSR[HV] and PIDR values forcontext 840, a same entry 834, which is directed to application-sharedspace 606, may be shared across contexts with different privilege levelsand different processes, without adding a separate TLB entry for eachprivilege level or each process, and independent of the MSR[HV] or PIDRvalue of the context that triggered entry 834.

In the example, TLB status 806 shows that a TLB may concurrentlymaintain TLB entries directed to multiple privilege levels, TLB entriesfor shared address space shared between multiple contexts directed to asame logical partition and independent of privilege level, and TLBentries for application space shared between multiple contexts directedto a same logical partition and process and independent of privilegelevel. For example, entry 816 effectively will only trigger a TLB matchwhen compared to contexts authorized to address to EA[0:1]=11, which areset to the highest privilege level by MSR[HV]=1. In contrast, entry 808and entry 820, will trigger a TLB match regardless of the privilegelevel mode setting for other EA settings. On context switches betweencontexts with MSR[HV]=1 or 0 and on context switches between contextswith address request directed to EA[0:1]=11, 10, 01, or 00, entry 808,entry 816, entry 820, and entry 834 may all remain in the TLB.

FIG. 9 illustrates a block diagram of one example of a TLB controllerfor managing translations using a TLB in a processor, where for contextsset to a highest privilege mode the LPID comparison value isautomatically set.

The example in FIG. 9 illustrates an example with many elementsdescribed in FIG. 3, but implements first context selection controllerlogic 910 and an LPID gate 926. In the example illustrated in FIG. 9,clamping based on a highest privilege mode setting (MSR[HV]) isperformed by suppressing the matching of an LPID when MSR[HV]=1, alongwith clamping based on the shared address space setting (EA[0]). In theexample, for the current context, an address EA[0N] requires translationinto a real address (RA).

In the example, the address space is characterized as illustrated inaddress space 354, however, in other examples, the address space may becharacterized as illustrated in address space 654 or other address spacecharacterizations. In the example, first context selection controllerlogic 910 may include a switch or other selection controllers thatincludes a value read from the MSR[HV] register as the control input forselecting whether to set a logic gate output to high or low, and thatcontrols loading LPID 114 with the value L set in the LPID register. Inthe example, if the value read from the MSR[HV] register is “1”, thenfirst context selection controller logic 910 sets an LPID gate output toa matching value of “1” or sets an LPID gate flag. In the example, ifthe value read from the MSR[HV] register is “0”, then first contextselection controller logic 310 sets an LPID gate output to a value of“0” and outputs “L”, the value read from the LPID register, to set thevalue within LPID 114 of VA 112 to L.

In the example illustrated, matching logic 924 may implement acomparator gate 926, where gate 926 includes an input LPID gate 912,that when set to “1”, automatically sets the output of gate 926 toindicate a match between TLB LPID 146 and LPID 114. In one example, whenMSR[HV]=1, first context selection controller logic 910 sets an LPIDgate output to a matching value of “1”, such that when VA 112 iscompared with entry 314, the output from gate 926 indicates a match,regardless of the values within TLB LPID 146 or LPID 114. In anotherexample, when MSR[HV]=1, first context selection controller logic 910sets an LPID gate output to a value of “0”, where when LPID gate 912 isset to “0”, the gate requires a match between TLB LPID 146 and LPID 114to indicate a match. In the example, in the event of a TLB miss, the TLBentry loaded into TLB 142 for the context may include TLB LPID 146 setto LPID 114, where LPID 114 is loaded with “L”. In the example,effectively, by setting gate 926 to indicate a match for contexts whereMSR[HV]=1, comparison of LPID 114 and TLB LPID 146 is suppressed.

In another example, to suppress comparisons of LPID 114 and TLB LPID 146when MSR[HV]=1, the LPID gate setting by first context selectioncontroller logic 910 may set a value in a register that is comparedagainst the outputs of gate 926, gate 328, and gate 330 to indicatewhether the outputs of the gates set a TLB hit. In additional oralternate embodiments, where comparison suppression of a particularfield within a VA or TLB entry is enabled, first context selectioncontroller logic 910 and second context selection controller logic 312may be adapted to set control bits of existing field suppression logicfor a TLB controller to manage translation of a same address acrossmultiple contexts using a same entry in a TLB and manage a TLB withentries maintained for contexts with different privilege levels.

FIG. 10 illustrates one example of a high level logic flowchart of aprocess and program for managing translation of a same address acrossmultiple contexts using a same entry in a TLB, where for contexts set toa highest privilege mode an LPID comparison is suppressed.

In the example, the process and program starts at block 1000 andthereafter proceed to block 1002. Block 1002 illustrates loading anaddress EA[0:N]. In the example, the address space described by addressEA[0:N] specifies a first bit EA[0] for designating whether the addressspace is considered within the kernel space of a logical partition.Next, block 1004 illustrates a determination whether TLB controllertranslation is turned off, such as by determining whether MSR[IR]=0 orMSR[DR]=0. At block 1004, if the TLB controller translation is turnedoff, then the process passes to block 1006. Block 1006 illustrates thehypervisor accessing real addressing for the request in a real mode, andthe process ends. At block 1004, if TLB controller translation is notturned off, then the process passes to block 1008. In another example,the determination performed by block 1004 may be performed by adifferent process, such that the process illustrated in FIG. 10, withoutblock 1004 and block 1006, is only triggered if block 1004 has beenevaluated by another process and the condition in block 1004 is nottrue. For example, a hypervisor may perform the function illustrated byblock 1004 as a software logic function, whereas a processor may performother functions of FIG. 10 as hardware logic functions.

Block 1008 illustrates selecting the LPID and PID values for a currentcontext by the process passing to block 1010. Block 1010 illustrates adetermination whether a context is set to a highest privilege mode, forexample if MSR[HV]=1. At block 1010, if the context is set to a highestprivilege mode, then the process passes to block 1012. Block 1012illustrates suppressing LPID matching, such as by setting an LPID gatevalue to “1” to automatically set the gate that compares an LPID and aTLB LPID to “0”, or in software, by removing the LPID and TLB LPIDvalues from the comparison equation for a TLB hit, and the processpasses to block 1016. At block 1010, if the context is not set to ahighest privilege mode, for example if MSR[HV]=0, then the processpasses to block 1014. Block 1014 illustrates allowing LPID matching, andthe process passes to block 1016. Block 1016 illustrates setting theLPID to the LPID register value L, and the process passes to block 1018.

Block 1018 illustrates a determination whether the address request isdirected to a shared address space, for example if EA[0]=1. At block1018, if the address request is directed to a shared address space, thenthe process passes to block 1020. Block 1020 illustrates clamping thePID to the clamp value (0), and the process proceeds to block 1024. Atblock 1018, if the address request is not directed to a shared addressspace, then the process passes to block 1022. Block 1022 illustratessetting the PID to the PID register value P, and the process passes toblock 1024.

Block 1024 illustrates performing a TLB lookup for the VA set to theLPID, the PID, and all of or a portion of the EA, depending on theportion of the EA that is comparable to the TLB EA, such as EA[1:N].Next, block 1026 illustrates a determination whether there is a TLB hit.At block 1026, if there is a TLB hit, then the process passes to block1032. Block 1032 illustrates accessing the matching entry in the TLB,and the process ends. At block 1026, if there is not a TLB hit, then theprocess passes to block 1028. Block 1028 illustrates triggering acontroller, which may include a software or a hardware controller, todetermine the real address (RA) associated with the VA, such as bydetermining the real page number associated with the EA. Next, block1030 illustrates adding a new TLB entry to with the VA and RA to theTLB, where the VA is set to the LPID and PID values calculated for thecurrent context.

FIG. 11 illustrates a block diagram of one example of a computer systemin which one embodiment of the invention may be implemented. The presentinvention may be performed in a variety of systems and combinations ofsystems, made up of functional components, such as the functionalcomponents described with reference to a computer system 1100 and may becommunicatively connected to a network, such as network 1102.

Computer system 1100 includes a bus 1122 or other communication devicefor communicating information within computer system 1100, and at leastone hardware processing device, such as processor 1112, coupled to bus1122 for processing information. Bus 1122 preferably includeslow-latency and higher latency paths that are connected by bridges andadapters and controlled within computer system 1100 by multiple buscontrollers. When implemented as a server or node, computer system 1100may include multiple processors designed to improve network servicingpower. Where multiple processors share bus 1122, additional controllers(not depicted) for managing bus access and locks may be implemented.

Processor 1112 may be at least one general-purpose processor such asIBM® PowerPC® processor that, during normal operation, processes dataunder the control of software 1150, which may include at least one ofapplication software, an operating system, middleware, and other codeand computer executable programs accessible from a dynamic storagedevice such as random access memory (RAM) 1114, a static storage devicesuch as Read Only Memory (ROM) 1116, a data storage device, such as massstorage device 1118, or other data storage medium. Software 1150 mayinclude, but is not limited to, code, applications, protocols,interfaces, and processes for controlling one or more systems within anetwork including, but not limited to, an adapter, a switch, a server, acluster system, and a grid environment.

Computer system 1100 may communicate with a remote computer, such asserver 1140, or a remote client. In one example, server 1140 may beconnected to computer system 1100 through any type of network, such asnetwork 1102, through a communication interface, such as networkinterface 1132, or over a network link that may be connected, forexample, to network 1102.

In the example, multiple systems within a network environment may becommunicatively connected via network 1102, which is the medium used toprovide communications links between various devices and computersystems communicatively connected. Network 1102 may include permanentconnections such as wire or fiber optics cables and temporaryconnections made through telephone connections and wireless transmissionconnections, for example, and may include routers, switches, gatewaysand other hardware to enable a communication channel between the systemsconnected via network 1102. Network 1102 may represent one or more ofpacket-switching based networks, telephony based networks, broadcasttelevision networks, local area and wire area networks, public networks,and restricted networks.

Network 1102 and the systems communicatively connected to computer 1100via network 1102 may implement one or more layers of one or more typesof network protocol stacks which may include one or more of a physicallayer, a link layer, a network layer, a transport layer, a presentationlayer, and an application layer. For example, network 1102 may implementone or more of the Transmission Control Protocol/Internet Protocol(TCP/IP) protocol stack or an Open Systems Interconnection (OSI)protocol stack. In addition, for example, network 1102 may represent theworldwide collection of networks and gateways that use the TCP/IP suiteof protocols to communicate with one another. Network 1102 may implementa secure HTTP protocol layer or other security protocol for securingcommunications between systems.

In the example, network interface 1132 includes an adapter 1134 forconnecting computer system 1100 to network 1102 through a link and forcommunicatively connecting computer system 1100 to server 1140 or othercomputing systems via network 1102. Although not depicted, networkinterface 1132 may include additional software, such as device drivers,additional hardware and other controllers that enable communication.When implemented as a server, computer system 1100 may include multiplecommunication interfaces accessible via multiple peripheral componentinterconnect (PCI) bus bridges connected to an input/output controller,for example. In this manner, computer system 1100 allows connections tomultiple clients via multiple separate ports and each port may alsosupport multiple connections to multiple clients.

In one embodiment, the operations performed by processor 1112 maycontrol the operations of flowchart of FIGS. 4, 7, and 10 and otheroperations described herein. Operations performed by processor 1112 maybe requested by software 1150 or other code or the steps of oneembodiment of the invention might be performed by specific hardwarecomponents that contain hardwired logic for performing the steps, or byany combination of programmed computer components and custom hardwarecomponents. In one embodiment, one or more components of computer system1100, or other components, which may be integrated into one or morecomponents of computer system 1100, may contain hardwired logic forperforming the operations of flowcharts FIGS. 4, 7, and 10.

In addition, computer system 1100 may include multiple peripheralcomponents that facilitate input and output. These peripheral componentsare connected to multiple controllers, adapters, and expansion slots,such as input/output (I/O) interface 1126, coupled to one of themultiple levels of bus 1122. For example, input device 1124 may include,for example, a microphone, a video capture device, an image scanningsystem, a keyboard, a mouse, or other input peripheral device,communicatively enabled on bus 1122 via I/O interface 1126 controllinginputs. In addition, for example, output device 1120 communicativelyenabled on bus 1122 via I/O interface 1126 for controlling outputs mayinclude, for example, one or more graphical display devices, audiospeakers, and tactile detectable output interfaces, but may also includeother output interfaces. In alternate embodiments of the presentinvention, additional or alternate input and output peripheralcomponents may be added.

With respect to FIG. 11, the present invention may be a system, amethod, and/or a computer program product. The computer program productmay include a computer readable storage medium (or media) havingcomputer readable program instructions thereon for causing a processorto carry out aspects of the present invention.

The computer readable storage medium can be a tangible device that canretain and store instructions for use by an instruction executiondevice. The computer readable storage medium may be, for example, but isnot limited to, an electronic storage device, a magnetic storage device,an optical storage device, an electromagnetic storage device, asemiconductor storage device, or any suitable combination of theforegoing. A non-exhaustive list of more specific examples of thecomputer readable storage medium includes the following: a portablecomputer diskette, a hard disk, a random access memory (RAM), aread-only memory (ROM), an erasable programmable read-only memory (EPROMor Flash memory), a static random access memory (SRAM), a portablecompact disc read-only memory (CD-ROM), a digital versatile disk (DVD),a memory stick, a floppy disk, a mechanically encoded device such aspunch-cards or raised structures in a groove having instructionsrecorded thereon, and any suitable combination of the foregoing. Acomputer readable storage medium, as used herein, is not to be construedas being transitory signals per se, such as radio waves or other freelypropagating electromagnetic waves, electromagnetic waves propagatingthrough a waveguide or other transmission media (e.g., light pulsespassing through a fiber-optic cable), or electrical signals transmittedthrough a wire.

Computer readable program instructions described herein can bedownloaded to respective computing/processing devices from a computerreadable storage medium or to an external computer or external storagedevice via a network, for example, the Internet, a local area network, awide area network and/or a wireless network. The network may comprisecopper transmission cables, optical transmission fibers, wirelesstransmission, routers, firewalls, switches, gateway computers and/oredge servers. A network adapter card or network interface in eachcomputing/processing device receives computer readable programinstructions from the network and forwards the computer readable programinstructions for storage in a computer readable storage medium withinthe respective computing/processing device.

Computer readable program instructions for carrying out operations ofthe present invention may be assembler instructions,instruction-set-architecture (ISA) instructions, machine instructions,machine dependent instructions, microcode, firmware instructions,state-setting data, or either source code or object code written in anycombination of one or more programming languages, including an objectoriented programming language such as Smalltalk, C++ or the like, andconventional procedural programming languages, such as the “C”programming language or similar programming languages. The computerreadable program instructions may execute entirely on the user'scomputer, partly on the user's computer, as a stand-alone softwarepackage, partly on the user's computer and partly on a remote computeror entirely on the remote computer or server. In the latter scenario,the remote computer may be connected to the user's computer through anytype of network, including a local area network (LAN) or a wide areanetwork (WAN), or the connection may be made to an external computer(for example, through the Internet using an Internet Service Provider).In some embodiments, electronic circuitry including, for example,programmable logic circuitry, field-programmable gate arrays (FPGA), orprogrammable logic arrays (PLA) may execute the computer readableprogram instructions by utilizing state information of the computerreadable program instructions to personalize the electronic circuitry,in order to perform aspects of the present invention.

Aspects of the present invention are described herein with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems), and computer program products according to embodiments of theinvention. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer readable program instructions.

These computer readable program instructions may be provided to aprocessor of a general purpose computer, special purpose computer, orother programmable data processing apparatus to produce a machine, suchthat the instructions, which execute via the processor of the computeror other programmable data processing apparatus, create means forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks. These computer readable program instructionsmay also be stored in a computer readable storage medium that can directa computer, a programmable data processing apparatus, and/or otherdevices to function in a particular manner, such that the computerreadable storage medium having instructions stored therein comprises anarticle of manufacture including instructions which implement aspects ofthe function/act specified in the flowchart and/or block diagram blockor blocks.

The computer readable program instructions may also be loaded onto acomputer, other programmable data processing apparatus, or other deviceto cause a series of operational steps to be performed on the computer,other programmable apparatus or other device to produce a computerimplemented process, such that the instructions which execute on thecomputer, other programmable apparatus, or other device implement thefunctions/acts specified in the flowchart and/or block diagram block orblocks.

The flowchart and block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods, and computer program products according to variousembodiments of the present invention. In this regard, each block in theflowchart or block diagrams may represent a module, segment, or portionof instructions, which comprises one or more executable instructions forimplementing the specified logical function(s). In some alternativeimplementations, the functions noted in the block may occur out of theorder noted in the figures. For example, two blocks shown in successionmay, in fact, be executed substantially concurrently, or the blocks maysometimes be executed in the reverse order, depending upon thefunctionality involved. It will also be noted that each block of theblock diagrams and/or flowchart illustration, and combinations of blocksin the block diagrams and/or flowchart illustration, can be implementedby special purpose hardware-based systems that perform the specifiedfunctions or acts or carry out combinations of special purpose hardwareand computer instructions.

Those of ordinary skill in the art will appreciate that the hardwaredepicted in FIG. 11 may vary. Furthermore, those of ordinary skill inthe art will appreciate that the depicted example is not meant to implyarchitectural limitations with respect to the present invention.

The terminology used herein is for the purpose of describing particularembodiments only and is not intended to be limiting of the invention. Asused herein, the singular forms “a”, “an” and “the” are intended toinclude the plural forms as well, unless the context clearly indicatesotherwise. It will be further understood that the terms “comprises”and/or “comprising”, when used in this specification specify thepresence of stated features, integers, steps, operations, elements,and/or components, but not preclude the presence or addition of one ormore other features, integers, steps, operations, elements, components,and/or groups thereof.

The corresponding structures, materials, acts, and equivalents of allmeans or step plus function elements in the claims below are intended toinclude any structure, material, or act for performing the function incombination with other claimed elements as specifically claimed. Thedescription of the one or more embodiments of the invention has beenpresented for purposes of illustration and description, but is notintended to be exhaustive or limited to the invention in the formdisclosed. Many modifications and variations will be apparent to thoseof ordinary skill in the art without departing from the scope and spiritof the invention. The embodiment was chosen and described in order tobest explain the principles of the invention and the practicalapplication, and to enable others of ordinary skill in the art tounderstand the invention for various embodiments with variousmodifications as are suited to the particular use contemplated.

While the invention has been particularly shown and described withreference to one or more embodiments, it will be understood by thoseskilled in the art that various changes in form and detail may be madetherein without departing from the spirit and scope of the invention.

What is claimed is:
 1. A method for managing translations, comprising:for a current context in control of a processor requesting access to aparticular address, specifying a virtual address with a logicalpartition identifier value indicating a privilege setting of the currentcontext, a process identifier value indicating whether the address iswithin shared address space, and an effective address comprising atleast a portion of the particular address; and in response to thevirtual address not matching at least one entry within a translationlookaside buffer comprising at least one entry stored for at least oneprevious translation of at least one previous address, translating thevirtual address into a real page number using at least one page tableand adding a new entry to the translation lookaside buffer with thevirtual address and the real page number, wherein each at least oneentry within the translation lookaside buffer identifies a separateprivilege setting from among a plurality of privilege settings and aseparate indicator of whether the address is within the shared addressspace.
 2. The method according to claim 1, further comprising: comparingthe virtual address with each at least one entry within the translationlookaside buffer comprising the at least one entry stored for at leastone previous translation of at least one previous address, wherein eachentry comprises a translation logical partition identifier valueindicating a privilege setting of the at least one previous context, atranslation process identifier value indicating whether the addresswithin the at least one previous context is within shared address space,and a translation effective address comprising at least a portion of atleast one previous address for the at least one previous context.
 3. Themethod according to claim 1, wherein, for a current context currently incontrol of a processor requesting access to a particular address,specifying a virtual address with a logical partition identifier valueindicating a privilege setting of the current context, a processidentifier value indicating whether the address is within shared addressspace, and an effective address comprising at least a portion of theparticular address, further comprises: determining whether the privilegesetting of the current context is set to a selected highest privilegemode from among a plurality of privilege modes; responsive to theprivilege setting of the current context set to the selected highestprivilege mode, setting the logical partition identifier value to aclamped value, wherein the clamped value indicates that the privilegesetting is the selected highest privilege mode, wherein the highestprivilege mode allows the current context to access a total addressspace; and responsive to the privilege setting of the current contextnot set to the selected highest privilege mode, setting the logicalpartition identifier value to an identifier for a particular logicalpartition from among a plurality of logical partitions managed by ahypervisor, wherein if the privilege mode of the current context is notset to the selected highest privilege mode, the current context haslimited access to only a portion of the total address space allocated bythe hypervisor to the particular logical partition.
 4. The methodaccording to claim 3, wherein determining whether the privilege settingof the current context is set to a selected highest privilege mode fromamong a plurality of privilege modes further comprises: reading amachine state register setting for a hypervisor bit, wherein the machinestate register setting for the hypervisor bit is set by the hypervisorwhen switching access to the current context, wherein the hypervisor bitis set to a first value to set the privilege setting to the selectedhighest privilege mode.
 5. The method according to claim 1, wherein, fora current context currently in control of a processor requesting accessto a particular address, specifying a virtual address with a logicalpartition identifier value indicating a privilege setting of the currentcontext, a process identifier value indicating whether the address iswithin shared address space, and an effective address comprising atleast a portion of the particular address, further comprises:determining whether the address is within the shared address space basedon a setting of at least one bit within the effective address, whereinthe setting of the at least one bit is specified for the identifying theshared address space as a portion of the total address space; responsiveto the setting of the at least one bit set to the shared address space,setting the process identifier value to a clamped value, wherein theclamped value indicates that effective address is directed to the sharedaddress space, wherein a plurality of processes operating within aparticular logical partition share access to the shared address space;and responsive to the setting of the at least one bit not set to theshared address space, setting the process identifier value to anidentifier for a particular process from among the plurality ofprocesses operating within the particular logical partition.
 6. Themethod according to claim 1, wherein, for a current context currently incontrol of a processor requesting access to a particular address,specifying a virtual address with a logical partition identifier valueindicating a privilege setting of the current context, a processidentifier value indicating whether the address is within shared addressspace, and an effective address comprising at least a portion of theparticular address, further comprises: determining whether the privilegesetting of the current context is set to access a most protected addressspace from among a total address space, wherein the most protectedaddress space is only accessible if the current context is also set to aprivilege setting of a selected highest privilege mode from among aplurality of privilege modes; responsive to the privilege setting of thecurrent context set to the most protected access space, setting thelogical partition identifier value to a clamped value, wherein theclamped value indicates that the privilege setting is to the mostprotected address space; and responsive to the privilege setting of thecurrent context not set to the most protected address space, setting thelogical partition identifier value to an identifier for a particularlogical partition from among a plurality of logical partitions managedby a hypervisor, wherein the current context has limited access to onlya portion of the total address space allocated by the hypervisor to theparticular logical partition.
 7. The method according to claim 1,wherein, for a current context currently in control of a processorrequesting access to a particular address, specifying a virtual addresswith a logical partition identifier value indicating a privilege settingof the current context, a process identifier value indicating whetherthe address is within shared address space, and an effective addresscomprising at least a portion of the particular address, furthercomprises: determining whether the address is within the shared addressspace based on a setting of a first bit within the effective address,wherein the setting of the first bit is specified for the identifyingthe shared address space as a portion of the total address space;responsive to the setting of the first bit set to the shared addressspace, setting the process identifier value to a first clamped value,wherein the first clamped value indicates that effective address isdirected to the shared address space, wherein a plurality of processesoperating within a particular logical partition share access to theshared address space, wherein if the current context is operating in ahighest privilege setting the current context may access all of thetotal address space; responsive to the setting of the first bit not setto the shared address space, determining whether the address is withinhypervisor application space based on a setting of a second bit withinthe effective address, wherein the setting of the second bit isspecified for distinguishing the hypervisor application space within ahypervisor logical partition from among a plurality of logicalpartitions from application space allocated across a remaining selectionof the plurality of logical partitions; responsive to the setting of thesecond bit set to the hypervisor application space, setting the processidentifier value to a second clamped value different from the firstclamped value, wherein the second clamped value indicates that effectiveaddress is directed to the hypervisor application space; and responsiveto the setting of the second bit not set to the hypervisor applicationspace, setting the process identifier value to an identifier for aparticular process from among the plurality of processes operatingwithin the particular logical partition.
 8. The method according toclaim 1, further comprising: determining whether the privilege settingof the current context is set to a highest privilege mode; andresponsive to the privilege setting of the current context set to thehighest privilege mode, suppressing the logical partition identifiervalue from the virtual address, such that the logical partitionidentifier value is not compared with a translation logical partitionidentifier value within each entry within the translation lookasidebuffer.