diff options
author | Janosch Frank <[email protected]> | 2019-04-01 10:54:09 +0200 |
---|---|---|
committer | Christian Borntraeger <[email protected]> | 2020-02-27 19:47:11 +0100 |
commit | 49710db081699a14f4ba49cb0c02d0571a341449 (patch) | |
tree | cf3ffc5bd523eca72ea068476dde1b3edf2fdaa2 /scripts/bpf_helpers_doc.py | |
parent | 1274800792dced8e5b6d54c71ec049c4d1e34189 (diff) |
KVM: s390: protvirt: Handle SE notification interceptions
Since there is no interception for load control and load psw
instruction in the protected mode, we need a new way to get notified
whenever we can inject an IRQ right after the guest has just enabled
the possibility for receiving them.
The new interception codes solve that problem by providing a
notification for changes to IRQ enablement relevant bits in CRs 0, 6
and 14, as well a the machine check mask bit in the PSW.
No special handling is needed for these interception codes, the KVM
pre-run code will consult all necessary CRs and PSW bits and inject
IRQs the guest is enabled for.
Signed-off-by: Janosch Frank <[email protected]>
Reviewed-by: David Hildenbrand <[email protected]>
Reviewed-by: Thomas Huth <[email protected]>
Reviewed-by: Cornelia Huck <[email protected]>
[[email protected]: patch merging, splitting, fixing]
Signed-off-by: Christian Borntraeger <[email protected]>
Diffstat (limited to 'scripts/bpf_helpers_doc.py')
0 files changed, 0 insertions, 0 deletions