Received: by 2002:a05:6358:53a8:b0:117:f937:c515 with SMTP id z40csp5725077rwe; Tue, 18 Apr 2023 10:31:33 -0700 (PDT) X-Google-Smtp-Source: AKy350a8u+xniRjv3NKWH26h0QjKcSY5Bd02lKhz63bmT354rhpFCwTdEW+e8dSvvT+weL1LrjFz X-Received: by 2002:a17:90b:4b87:b0:23f:ebf2:d3e9 with SMTP id lr7-20020a17090b4b8700b0023febf2d3e9mr460662pjb.6.1681839092808; Tue, 18 Apr 2023 10:31:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1681839092; cv=none; d=google.com; s=arc-20160816; b=Pz8/tAck2m8yjjmVrzgQyXmeGOhaya4ti18HqYNcW+ntpOjbzavnArIauWi9uQCyXq FeDWul6Ev0qB+dlREw7qGtLg885cf91C/bUH1cBFuuhywKKUiPjxTnXAs/ms+9cSD9lm 6T7o2zKK5k34jmx8UuLdZ6xe/UkyzHL0na4wc3vLeRWG7zJHpjUPawta6ERTnuXiD0wH EPu0jwDugkDj3dkSwVDcSTc8WlC275WGxBEh0JflZd206+7Yrv5gIZWybfYBFeEKL8L/ uQXxGLwHfEvi/N29dc/Yx7V0y20MBCAcLv9dyTieQQ+nM+OXkX9kLb2gZgGscfuyMtoV XflQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=mm4rDgF9F1gNlzPKDBlmtmuQsH+G+Iec5LLUSsl8/8k=; b=j7rZ152WX4kEwEbZfOEeWb030P6I54IIQZ//X4qwQurAOpge39cIM3WvcyNJyPHw8a rn43pIZln5nCWIFGWJLGvJHYFRZNcNunBF8dTwMm1k8m0cPzFiYhRbHbUORCCvweVYaQ u0A0i547He/n6LAn1s9bjwmpJiJLtP9oNllt8UX0TVfj4nHVCPRn73hjDFVVTSe42D2X 7soLCrwjdLyE3b9WmXrnVAa4rG31ywAIneRHHe9OLidxL2C90wyial6br8aNGrj2wD9E soHHeYofBEiTmxF4WDVU/u4aGfFbfUotfFqXi0a6Km92i/fClcya5HdaBzjM/FOg3aKh fKFg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=Xotw5aso; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id nh10-20020a17090b364a00b002467e72af54si14052131pjb.43.2023.04.18.10.31.17; Tue, 18 Apr 2023 10:31:32 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=Xotw5aso; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232602AbjDRRaN (ORCPT + 99 others); Tue, 18 Apr 2023 13:30:13 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39190 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232558AbjDRR3v (ORCPT ); Tue, 18 Apr 2023 13:29:51 -0400 Received: from mga07.intel.com (mga07.intel.com [134.134.136.100]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E802F26BC; Tue, 18 Apr 2023 10:29:50 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1681838990; x=1713374990; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=QtN+Gn8m6GoE1K9sHr26L3K3cEPPiJQ24QAc56BarA0=; b=Xotw5asohSB3xO2dxfHqcfTxSI0pBPb1cB1WVDbVz2HCY50egUGZznEq jZGaX3M3T9i9dPyAe8xGsjc25fNp/COexxWIpDX9SMLvG9Q5vIXElxpqj IeZlnlaQAGE2wbucNpJm2Yy8DvLAj7H4NfG9+PbELCxRmmcgRAEXcg8ar Lr94DNt9E6C2Lueeu3HckEiGQjJ7/zVCk9bkoTE3TERxUTcLcwex7BHP1 jUul28UcFFaj8mDvfIPibxnYErW5da+7Pvx4mAeXyeiXMUHqR3d/8h0LO Y+T/XqJ4DNQhAwQriMB4t4WuiP8JjEmHgRPJaj85Z8uYcJPawEtm6unrJ Q==; X-IronPort-AV: E=McAfee;i="6600,9927,10684"; a="410466481" X-IronPort-AV: E=Sophos;i="5.99,207,1677571200"; d="scan'208";a="410466481" Received: from orsmga005.jf.intel.com ([10.7.209.41]) by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 18 Apr 2023 10:29:42 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10684"; a="865503487" X-IronPort-AV: E=Sophos;i="5.99,207,1677571200"; d="scan'208";a="865503487" Received: from rchatre-ws.ostc.intel.com ([10.54.69.144]) by orsmga005-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 18 Apr 2023 10:29:42 -0700 From: Reinette Chatre To: jgg@nvidia.com, yishaih@nvidia.com, shameerali.kolothum.thodi@huawei.com, kevin.tian@intel.com, alex.williamson@redhat.com Cc: tglx@linutronix.de, darwi@linutronix.de, kvm@vger.kernel.org, dave.jiang@intel.com, jing2.liu@intel.com, ashok.raj@intel.com, fenghua.yu@intel.com, tom.zanussi@linux.intel.com, reinette.chatre@intel.com, linux-kernel@vger.kernel.org Subject: [PATCH V3 07/10] vfio/pci: Update stale comment Date: Tue, 18 Apr 2023 10:29:18 -0700 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE, URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In preparation for surrounding code change it is helpful to ensure that existing comments are accurate. Remove inaccurate comment about direct access and update the rest of the comment to reflect the purpose of writing the cached MSI message to the device. Suggested-by: Alex Williamson Link: https://lore.kernel.org/lkml/20230330164050.0069e2a5.alex.williamson@redhat.com/ Signed-off-by: Reinette Chatre --- Changes since V2: - New patch. drivers/vfio/pci/vfio_pci_intrs.c | 8 +++----- 1 file changed, 3 insertions(+), 5 deletions(-) diff --git a/drivers/vfio/pci/vfio_pci_intrs.c b/drivers/vfio/pci/vfio_pci_intrs.c index 5e3de004f4cb..bdda7f46c2be 100644 --- a/drivers/vfio/pci/vfio_pci_intrs.c +++ b/drivers/vfio/pci/vfio_pci_intrs.c @@ -419,11 +419,9 @@ static int vfio_msi_set_vector_signal(struct vfio_pci_core_device *vdev, } /* - * The MSIx vector table resides in device memory which may be cleared - * via backdoor resets. We don't allow direct access to the vector - * table so even if a userspace driver attempts to save/restore around - * such a reset it would be unsuccessful. To avoid this, restore the - * cached value of the message prior to enabling. + * If the vector was previously allocated, refresh the on-device + * message data before enabling in case it had been cleared or + * corrupted since writing. */ cmd = vfio_pci_memory_lock_and_enable(vdev); if (msix) { -- 2.34.1