On Thu, 24 Oct 2019 07:40:34 -0400 Janosch Frank <frankja@xxxxxxxxxxxxx> wrote: > Since KVM doesn't emulate any form of load control and load psw > instructions anymore, we wouldn't get an interception if PSWs or CRs > are changed in the guest. That means we can't inject IRQs right after > the guest is enabled for them. > > The new interception codes solve that problem by being a notification > for changes to IRQ enablement relevant bits in CRs 0, 6 and 14, as > well a the machine check mask bit in the PSW. > > No special handling is needed for these interception codes, the KVM > pre-run code will consult all necessary CRs and PSW bits and inject > IRQs the guest is enabled for. Just to clarify: The hypervisor can still access the relevant bits for pv guests, this is only about the notification, right? > > Signed-off-by: Janosch Frank <frankja@xxxxxxxxxxxxx> > --- > arch/s390/include/asm/kvm_host.h | 2 ++ > arch/s390/kvm/intercept.c | 18 ++++++++++++++++++ > 2 files changed, 20 insertions(+)