summaryrefslogtreecommitdiffstats
path: root/block
diff options
context:
space:
mode:
authorDavid Hildenbrand <dahi@linux.vnet.ibm.com>2015-06-23 22:49:36 +0200
committerChristian Borntraeger <borntraeger@de.ibm.com>2015-07-29 10:36:22 +0200
commit0df30abcd69b61d8163282c157f15ed3b0f1ac85 (patch)
treebfc085b7899b38fc8ee70b1a72607fbc0ea62bb6 /block
parentKVM: s390: propagate error from enable storage key (diff)
downloadlinux-0df30abcd69b61d8163282c157f15ed3b0f1ac85.tar.xz
linux-0df30abcd69b61d8163282c157f15ed3b0f1ac85.zip
KVM: s390: filter space-switch events when PER is enforced
When guest debugging is active, space-switch events might be enforced by PER. While the PER events are correctly filtered out, space-switch-events could be forwarded to the guest, although from a guest point of view, they should not have been reported. Therefore we have to filter out space-switch events being concurrently reported with a PER event, if the PER event got filtered out. To do so, we theoretically have to know which instruction was responsible for the event. As the applicable instructions modify the PSW address, the address space set in the PSW and even the address space in cr1, we can't figure out the instruction that way. For this reason, we have to rely on the information about the old and new address space, in order to guess the responsible instruction type and do appropriate checks for space-switch events. Signed-off-by: David Hildenbrand <dahi@linux.vnet.ibm.com> Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Diffstat (limited to 'block')
0 files changed, 0 insertions, 0 deletions