diff options
author | Janosch Frank <[email protected]> | 2019-12-13 08:26:06 -0500 |
---|---|---|
committer | Christian Borntraeger <[email protected]> | 2020-02-27 19:47:12 +0100 |
commit | 3adae0b4ca64c08a6c05a54be0becf9d127d39dc (patch) | |
tree | ee66a487002db63dda207e6228c9a7c8da69181c /scripts/bpf_helpers_doc.py | |
parent | 7c36a3fcf444ced8efc3da106cc7215227d60fde (diff) |
KVM: s390: protvirt: Mask PSW interrupt bits for interception 104 and 112
We're not allowed to inject interrupts on intercepts that leave the
guest state in an "in-between" state where the next SIE entry will do a
continuation, namely secure instruction interception (104) and secure
prefix interception (112).
As our PSW is just a copy of the real one that will be replaced on the
next exit, we can mask out the interrupt bits in the PSW to make sure
that we do not inject anything.
Signed-off-by: Janosch Frank <[email protected]>
Reviewed-by: Thomas Huth <[email protected]>
Reviewed-by: Cornelia Huck <[email protected]>
Reviewed-by: David Hildenbrand <[email protected]>
[[email protected]: patch merging, splitting, fixing]
Signed-off-by: Christian Borntraeger <[email protected]>
Diffstat (limited to 'scripts/bpf_helpers_doc.py')
0 files changed, 0 insertions, 0 deletions