Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp5312171imm; Tue, 21 Aug 2018 09:35:08 -0700 (PDT) X-Google-Smtp-Source: AA+uWPwV/X+hOVlMC1r0V+8XHTNfPTrKRCy9YCtZm2231wKDZx7YTPfxhBd6Y9NbdhSaaIPYMxJi X-Received: by 2002:a63:5055:: with SMTP id q21-v6mr46995709pgl.397.1534869308565; Tue, 21 Aug 2018 09:35:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1534869308; cv=none; d=google.com; s=arc-20160816; b=CzdUVgscawavu7h8hYorTsBP4Lv2AIQ4YJyqlKZQNsU38AK8vHkmisE57N0AU9KFbn wL5g7a0hOVgT8Rvae+aKvM6aZPFZS6yeDY1rJKbQ0SWojDINLgL2CfSaFEjn7js7twxn KlSVPMohozGRielnAtXTjRYKbkrqTWYMYBgDmQbBYFE7BffKRIOUjmJjeQ9TjV2sydPx X/UP/JEbgPqDRzpYhhCQH9bufD3oCEBV2cYlSlOKvXGvdlaXVl8Q0Lmf9PX8mR/XftOl xtDda+aPDZk1GyFg2QFbcOJvrP4OL01vl78kDDo1Iu5gpJAjb3djs3HS+u5VVrYx0xup 1s3Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date:arc-authentication-results; bh=Znxxz9BCRsgqjXmzwkJCzXzqUW2bej1uBrYF3tpTEW0=; b=ykVJXI0ScXFeWrcXVFR/2EWtHp0pwBbM/X4Aszlb7kJ010LUwKWfwgxIy6X25HfdFx jTT7FQiOMiKZqlFklxj/4BdB0IVF5SZPamJjAXdADhiUDqtajIrUvYvvDumzALuSIP0o EjoedhirCXD/g7Kv1kEr3HhkxGLGpKgkzgkkWaio2nBArcPbZPPaiZvbs7gGowmpXdzT JJZ5rSSu3Jm986WRjIuE0N+nKp7Ov44aXnsXfo5BFDmw6gXfmEV1ADrkQkxb6lOLP1Aa E8dyqR4Hy7hOyV6UbWoAdmLbo2eQBEdlztsUwocEchaYshIwJ9YjjwnKi9rUpYRLjWtj NsxA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h17-v6si12924130pgj.214.2018.08.21.09.34.53; Tue, 21 Aug 2018 09:35:08 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727829AbeHUSqc (ORCPT + 99 others); Tue, 21 Aug 2018 14:46:32 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:58736 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726743AbeHUSqc (ORCPT ); Tue, 21 Aug 2018 14:46:32 -0400 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.rdu2.redhat.com [10.11.54.4]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 17F6C4000783; Tue, 21 Aug 2018 15:25:55 +0000 (UTC) Received: from gondolin (dhcp-192-222.str.redhat.com [10.33.192.222]) by smtp.corp.redhat.com (Postfix) with ESMTP id 5234C2026D64; Tue, 21 Aug 2018 15:25:50 +0000 (UTC) Date: Tue, 21 Aug 2018 17:25:48 +0200 From: Cornelia Huck To: Tony Krowiak Cc: Tony Krowiak , linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, freude@de.ibm.com, schwidefsky@de.ibm.com, heiko.carstens@de.ibm.com, borntraeger@de.ibm.com, kwankhede@nvidia.com, bjsdjshi@linux.vnet.ibm.com, pbonzini@redhat.com, alex.williamson@redhat.com, pmorel@linux.vnet.ibm.com, alifm@linux.vnet.ibm.com, mjrosato@linux.vnet.ibm.com, jjherne@linux.vnet.ibm.com, thuth@redhat.com, pasic@linux.vnet.ibm.com, berrange@redhat.com, fiuczy@linux.vnet.ibm.com, buendgen@de.ibm.com, frankja@linux.ibm.com Subject: Re: [PATCH v9 12/22] s390: vfio-ap: sysfs interfaces to configure control domains Message-ID: <20180821172548.57a6c758.cohuck@redhat.com> In-Reply-To: <660de00a-c403-28c1-4df4-82a973ab3ad5@linux.ibm.com> References: <1534196899-16987-1-git-send-email-akrowiak@linux.vnet.ibm.com> <1534196899-16987-13-git-send-email-akrowiak@linux.vnet.ibm.com> <20180820162317.08bd7d23.cohuck@redhat.com> <660de00a-c403-28c1-4df4-82a973ab3ad5@linux.ibm.com> Organization: Red Hat GmbH MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.78 on 10.11.54.4 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.6]); Tue, 21 Aug 2018 15:25:55 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.6]); Tue, 21 Aug 2018 15:25:55 +0000 (UTC) for IP:'10.11.54.4' DOMAIN:'int-mx04.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'cohuck@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 20 Aug 2018 13:41:32 -0400 Tony Krowiak wrote: > On 08/20/2018 10:23 AM, Cornelia Huck wrote: > > On Mon, 13 Aug 2018 17:48:09 -0400 > > Tony Krowiak wrote: > > > >> From: Tony Krowiak > >> > >> Provides the sysfs interfaces for: > >> > >> 1. Assigning AP control domains to the mediated matrix device > >> > >> 2. Unassigning AP control domains from a mediated matrix device > >> > >> 3. Displaying the control domains assigned to a mediated matrix > >> device > >> > >> The IDs of the AP control domains assigned to the mediated matrix > >> device are stored in an AP domain mask (ADM). The bits in the ADM, > >> from most significant to least significant bit, correspond to > >> AP domain numbers 0 to 255. On some systems, the maximum allowable > >> domain number may be less than 255 - depending upon the host's > >> AP configuration - and assignment may be rejected if the input > >> domain ID exceeds the limit. > > Please remind me of the relationship between control domains and usage > > domains... IIRC, usage domains allow both requests and configuration, > > while control domains allow only configuration, and are by convention a > > superset of usage domains. > > A usage domain is a domain to which an AP command-request message can be > submitted for processing. A control domain is a domain that can > be changed by an AP command request message submitted to a usage domain. > AP command request messages to configure a domain will contain the domain > number of the domain to be modified. The AP firmware will check the > control domain mask (ADM) and will allow the request to proceed only if > the corresponding bit in the ADM is set. Thanks to you and Halil for the explanation. > > > > > Is there a hard requirement somewhere in there, or can the admin > > cheerfully use different masks for usage domains and control domains > > without the SIE choking on it? > > There is no hard requirement that control domains must be a superset of > the usage domains, it is merely an architectural convention. AFAIK, > SIE doesn't enforce this and will not break if the convention is not > enforced externally. Having said that, you should note that the AQM > and ADM masks configured for the mediated matrix device will be logically > OR'd together to create the ADM stored in the CRYCB referenced from the > guest's SIE state description. In other words, we are enforcing the > convention in our software. Hm, that's interesting, as Halil argued that we should not enforce it in the kernel. Might be somewhat surprising as well. If that is really the way to do it, this needs to be documented clearly.