lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 9 Feb 2023 02:23:58 +0000 From: "Tian, Kevin" <kevin.tian@...el.com> To: Lu Baolu <baolu.lu@...ux.intel.com>, "iommu@...ts.linux.dev" <iommu@...ts.linux.dev> CC: Joerg Roedel <joro@...tes.org>, Will Deacon <will@...nel.org>, "Robin Murphy" <robin.murphy@....com>, "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org> Subject: RE: [PATCH 1/1] iommu/vt-d: Fix error handling in sva enable/disable paths > From: Lu Baolu <baolu.lu@...ux.intel.com> > Sent: Wednesday, February 8, 2023 1:16 PM > > Roll back all previous actions in error paths of intel_iommu_enable_sva() > and intel_iommu_disable_sva(). > > Fixes: d5b9e4bfe0d8 ("iommu/vt-d: Report prq to io-pgfault framework") > Signed-off-by: Lu Baolu <baolu.lu@...ux.intel.com> Reviewed-by: Kevin Tian <kevin.tian@...el.com>
Powered by blists - more mailing lists