Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp123169imm; Wed, 22 Aug 2018 01:01:05 -0700 (PDT) X-Google-Smtp-Source: AA+uWPyltL9/p9wMtKE/WfPwmaP+SoInDc/x/5zvI4lhNBgGG5mdSni18oJGwMETKQY+DdjCC342 X-Received: by 2002:a62:e511:: with SMTP id n17-v6mr56740911pff.210.1534924865322; Wed, 22 Aug 2018 01:01:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1534924865; cv=none; d=google.com; s=arc-20160816; b=gFcpntIW7xzg7fdQpu3MGa5/+QPNXCsfP2Z2sNpu/ysaOynkTRcH1aqXzHAf+3perL pvuA2TI4Fri7n0yk8X0R3qjSWDtr64UHZv9sBLwVX1VTSTewy8LxuqxizI+S2k4P+c1B C2HzssfsipxXYhbPxB1wgxx/vEAb8jUdIS53Fo4tPmfThSSDeMtS5laiosnEJquXi1n7 1qq/6bng7esJCgpebYd9kGMFDTBt45QXFqbEiOSnNVVOu3rIIEQE97VvtcawLeyNtms2 MUgkiZMntXMrJQdv8/f6VNqw/bHhuLMKoL/wqmPjZsDZYkocUT3OiHwW2cEIv3eYdPW7 DlxQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date:arc-authentication-results; bh=ALVw17Y3f/NpSGijUDBQ8SdlRJp8sUx9ZQGZ4s6KaGA=; b=UM3U4nuLqWKlgq0aoF9L4NCExeq9gI/ew4Ow+p920uKvZSIQkwH1ENp4LVRpAgYxmd WbsapcewSnglT8G4DXIVB/WUucBFkTqfGXg58O4ZjQDdztQgtXdr2aM2ymYXVr7hALlC FojhC/dibwNGqQhkIsh+cLizQ3QvmmbAw8zXfXVqOK1vZp+MD4/FgZIaYYl4AdRVkCez 1r6LHml5urpDvBCp6D5XV2QUUGvjZMUzjfjNCz53SdP3p1xispAFhQfU9DVrIZVbgesh SnD/SwF/1b3qeRBFHopmwcSn8SgFMIBH35nYnqYrMfIpntcI9LBWTx21FToMcrgbzZBK OHQw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e17-v6si996646pgv.615.2018.08.22.01.00.37; Wed, 22 Aug 2018 01:01:05 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728538AbeHVLCU convert rfc822-to-8bit (ORCPT + 99 others); Wed, 22 Aug 2018 07:02:20 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:48298 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1728521AbeHVLCT (ORCPT ); Wed, 22 Aug 2018 07:02:19 -0400 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.rdu2.redhat.com [10.11.54.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 07276804BAAC; Wed, 22 Aug 2018 07:38:38 +0000 (UTC) Received: from gondolin (dhcp-192-222.str.redhat.com [10.33.192.222]) by smtp.corp.redhat.com (Postfix) with ESMTP id 5D1B42166BA1; Wed, 22 Aug 2018 07:38:32 +0000 (UTC) Date: Wed, 22 Aug 2018 09:38:30 +0200 From: Cornelia Huck To: Halil Pasic Cc: Tony Krowiak , Tony Krowiak , linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, freude@de.ibm.com, schwidefsky@de.ibm.com, heiko.carstens@de.ibm.com, borntraeger@de.ibm.com, kwankhede@nvidia.com, bjsdjshi@linux.vnet.ibm.com, pbonzini@redhat.com, alex.williamson@redhat.com, pmorel@linux.vnet.ibm.com, alifm@linux.vnet.ibm.com, mjrosato@linux.vnet.ibm.com, jjherne@linux.vnet.ibm.com, thuth@redhat.com, pasic@linux.vnet.ibm.com, berrange@redhat.com, fiuczy@linux.vnet.ibm.com, buendgen@de.ibm.com, frankja@linux.ibm.com Subject: Re: [PATCH v9 22/22] s390: doc: detailed specifications for AP virtualization Message-ID: <20180822093830.185998c2.cohuck@redhat.com> In-Reply-To: References: <1534196899-16987-1-git-send-email-akrowiak@linux.vnet.ibm.com> <1534196899-16987-23-git-send-email-akrowiak@linux.vnet.ibm.com> <20180820180359.38cc4af3.cohuck@redhat.com> Organization: Red Hat GmbH MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8BIT X-Scanned-By: MIMEDefang 2.78 on 10.11.54.6 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.8]); Wed, 22 Aug 2018 07:38:38 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.8]); Wed, 22 Aug 2018 07:38:38 +0000 (UTC) for IP:'10.11.54.6' DOMAIN:'int-mx06.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'cohuck@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 21 Aug 2018 20:54:49 +0200 Halil Pasic wrote: > On 08/20/2018 10:16 PM, Tony Krowiak wrote: > >> Does the SIE complain if you specify a control > >> domain that the host does not have access to (I'd guess so)? > > > > The SIE does not complain if you specify a domain to which the host - or a > > lower level guest - does not have access. The firmware performs a logical > > AND of the guest's and hosts's - or lower level guest's - APMs, AQMs and ADMs > > Rather a bit-wise AND, I guess (of the same type masks corresponding to Guest 1 and > Guest 2). The result of a logical AND is a logical value (true or false) as > far as I remember. > > > to create effective masks EAPM, EAQM and EADM. Only devices corresponding to > > the bits set in the EAPM, EAQM and EADM will be accessible by the guest. > > I'm not sure what is the intended meaning of 'the SIE complains'. If it means > getting out of (SIE when interpreting lets say an NQAP under the discussed > circumstances) with some sort of error code, I think Tony's answer, ' SIE does not complain' > makes a lot of sense. It's the guest that's is trying to stretch further than > the blanket reaches, and it's the guest that needs to be educated on this fact. Yep, that's what I meant. If the hypervisor can call the SIE with that config, but the guest gets an error if it tries to use something that it cannot use, that's fine.