1. 28 8月, 2017 1 次提交
  2. 21 6月, 2016 1 次提交
  3. 09 5月, 2016 1 次提交
  4. 19 11月, 2015 1 次提交
  5. 29 7月, 2015 2 次提交
  6. 17 3月, 2015 1 次提交
  7. 06 3月, 2015 1 次提交
  8. 23 1月, 2015 4 次提交
  9. 28 11月, 2014 1 次提交
  10. 28 10月, 2014 6 次提交
  11. 30 7月, 2014 1 次提交
  12. 21 7月, 2014 2 次提交
  13. 10 7月, 2014 1 次提交
  14. 30 5月, 2014 1 次提交
  15. 16 5月, 2014 1 次提交
    • D
      KVM: s390: interpretive execution of SIGP EXTERNAL CALL · 4953919f
      David Hildenbrand 提交于
      If the sigp interpretation facility is installed, most SIGP EXTERNAL CALL
      operations will be interpreted instead of intercepted. A partial execution
      interception will occurr at the sending cpu only if the target cpu is in the
      wait state ("W" bit in the cpuflags set). Instruction interception will only
      happen in error cases (e.g. cpu addr invalid).
      
      As a sending cpu might set the external call interrupt pending flags at the
      target cpu at every point in time, we can't handle this kind of interrupt using
      our kvm interrupt injection mechanism. The injection will be done automatically
      by the SIE when preparing the start of the target cpu.
      Signed-off-by: NDavid Hildenbrand <dahi@linux.vnet.ibm.com>
      Reviewed-by: NCornelia Huck <cornelia.huck@de.ibm.com>
      CC: Thomas Huth <thuth@linux.vnet.ibm.com>
      [Adopt external call injection to check for sigp interpretion]
      Signed-off-by: NChristian Borntraeger <borntraeger@de.ibm.com>
      4953919f
  16. 22 4月, 2014 1 次提交
  17. 25 3月, 2014 1 次提交
  18. 04 3月, 2014 2 次提交
  19. 30 1月, 2014 1 次提交
  20. 12 12月, 2013 4 次提交
  21. 28 11月, 2013 3 次提交
  22. 21 6月, 2013 1 次提交
  23. 17 6月, 2013 1 次提交
  24. 17 1月, 2013 1 次提交