diff options
author | David Hildenbrand <dahi@linux.vnet.ibm.com> | 2016-01-27 17:18:41 +0100 |
---|---|---|
committer | Christian Borntraeger <borntraeger@de.ibm.com> | 2016-06-20 09:54:34 +0200 |
commit | 7a6741576b268820c8bd2b66288e6ff3bc57d4a7 (patch) | |
tree | 305b26510f3c526c03f2cc0ab0bc35b7b71a813b /arch/s390/kvm/gaccess.h | |
parent | e52f8b6112353e9e8eac64f082bfbc65e64bb2dd (diff) | |
download | op-kernel-dev-7a6741576b268820c8bd2b66288e6ff3bc57d4a7.zip op-kernel-dev-7a6741576b268820c8bd2b66288e6ff3bc57d4a7.tar.gz |
s390/mm: protection exceptions are corrrectly shadowed
As gmap shadows contains correct protection permissions, protection
exceptons can directly be forwarded to guest 3. If we would encounter
a protection exception while faulting, the next guest 3 run will
automatically handle that for us.
Keep the dat_protection logic in place, as it will be helpful later.
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: David Hildenbrand <dahi@linux.vnet.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Diffstat (limited to 'arch/s390/kvm/gaccess.h')
-rw-r--r-- | arch/s390/kvm/gaccess.h | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/arch/s390/kvm/gaccess.h b/arch/s390/kvm/gaccess.h index e5ec473..0d044d0 100644 --- a/arch/s390/kvm/gaccess.h +++ b/arch/s390/kvm/gaccess.h @@ -361,6 +361,6 @@ void ipte_unlock(struct kvm_vcpu *vcpu); int ipte_lock_held(struct kvm_vcpu *vcpu); int kvm_s390_check_low_addr_prot_real(struct kvm_vcpu *vcpu, unsigned long gra); -int kvm_s390_shadow_fault(struct gmap *shadow, unsigned long saddr, int write); +int kvm_s390_shadow_fault(struct gmap *shadow, unsigned long saddr); #endif /* __KVM_S390_GACCESS_H */ |