Revision 6927d352380797ddbee18631491ec428741696e2 authored by Yang Yingliang on 01 December 2022, 04:01:25 UTC, committed by Joerg Roedel on 02 December 2022, 10:45:32 UTC
As comment of pci_get_domain_bus_and_slot() says, it returns a pci device with refcount increment, when finish using it, the caller must decrease the reference count by calling pci_dev_put(). So call pci_dev_put() after using the 'pdev' to avoid refcount leak. Besides, if the 'pdev' is null or intel_svm_prq_report() returns error, there is no need to trace this fault. Fixes: 06f4b8d09dba ("iommu/vt-d: Remove unnecessary SVA data accesses in page fault path") Suggested-by: Lu Baolu <baolu.lu@linux.intel.com> Signed-off-by: Yang Yingliang <yangyingliang@huawei.com> Link: https://lore.kernel.org/r/20221119144028.2452731-1-yangyingliang@huawei.com Signed-off-by: Lu Baolu <baolu.lu@linux.intel.com> Signed-off-by: Joerg Roedel <jroedel@suse.de>
1 parent e65a689
File | Mode | Size |
---|---|---|
.gitignore | -rw-r--r-- | 120 bytes |
Kconfig | -rw-r--r-- | 5.4 KB |
Makefile | -rw-r--r-- | 3.2 KB |
blacklist.c | -rw-r--r-- | 9.4 KB |
blacklist.h | -rw-r--r-- | 135 bytes |
blacklist_hashes.c | -rw-r--r-- | 147 bytes |
check-blacklist-hashes.awk | -rwxr-xr-x | 1.0 KB |
default_x509.genkey | -rw-r--r-- | 407 bytes |
extract-cert.c | -rw-r--r-- | 3.6 KB |
revocation_certificates.S | -rw-r--r-- | 495 bytes |
system_certificates.S | -rw-r--r-- | 1017 bytes |
system_keyring.c | -rw-r--r-- | 9.9 KB |
![swh spinner](/static/img/swh-spinner.gif)
Computing file changes ...