Carsten Otte wrote:
>
> /* for KVM_RUN, returned by mmap(vcpu_fd, offset=0) */
> struct kvm_run {
> @@ -138,6 +139,14 @@ struct kvm_run {
> __u32 is_write;
> __u32 pad;
> } tpr_access;
> + /* KVM_EXIT_S390_SIEIC */
> +
Avi Kivity wrote:
> Carsten Otte wrote:
>>
>> /* for KVM_RUN, returned by mmap(vcpu_fd, offset=0) */
>> struct kvm_run {
>> @@ -138,6 +139,14 @@ struct kvm_run {
>> __u32 is_write;
>> __u32 pad;
>> } tpr_access;
>> +/* KVM_EXIT_S390_SIEIC */
>> +
From: Carsten Otte <[EMAIL PROTECTED]>
From: Christian Borntraeger <[EMAIL PROTECTED]>
This path introduces handling of sie intercepts in three flavors: Intercepts
are either handled completely in-kernel by kvm_handle_sie_intercept(),
or passed to userspace with corresponding data in struct kvm_ru