From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from us-smtp-1.mimecast.com ([205.139.110.61]:30615 "EHLO us-smtp-delivery-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727035AbgBYLLS (ORCPT ); Tue, 25 Feb 2020 06:11:18 -0500 Date: Tue, 25 Feb 2020 12:11:05 +0100 From: Cornelia Huck Subject: Re: [PATCH v4 12/36] KVM: s390: protvirt: Handle SE notification interceptions Message-ID: <20200225121105.0274cbb0.cohuck@redhat.com> In-Reply-To: <20200224114107.4646-13-borntraeger@de.ibm.com> References: <20200224114107.4646-1-borntraeger@de.ibm.com> <20200224114107.4646-13-borntraeger@de.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-s390-owner@vger.kernel.org List-ID: To: Christian Borntraeger Cc: Janosch Frank , KVM , David Hildenbrand , Thomas Huth , Ulrich Weigand , Claudio Imbrenda , linux-s390 , Michael Mueller , Vasily Gorbik , Janosch Frank On Mon, 24 Feb 2020 06:40:43 -0500 Christian Borntraeger wrote: > From: Janosch Frank > > Since there is no interception for load control and load psw > instruction in the protected mode, we need a new way to get notified > whenever we can inject an IRQ right after the guest has just enabled > the possibility for receiving them. > > The new interception codes solve that problem by providing a > notification for changes to IRQ enablement relevant bits in CRs 0, 6 > and 14, as well a the machine check mask bit in the PSW. > > No special handling is needed for these interception codes, the KVM > pre-run code will consult all necessary CRs and PSW bits and inject > IRQs the guest is enabled for. > > Signed-off-by: Janosch Frank > Reviewed-by: David Hildenbrand > Reviewed-by: Thomas Huth > [borntraeger@de.ibm.com: patch merging, splitting, fixing] > Signed-off-by: Christian Borntraeger > --- > arch/s390/include/asm/kvm_host.h | 2 ++ > arch/s390/kvm/intercept.c | 11 ++++++++++- > 2 files changed, 12 insertions(+), 1 deletion(-) Reviewed-by: Cornelia Huck