diff options
author | 2021-02-08 12:15:02 -0800 | |
---|---|---|
committer | 2021-02-09 08:16:31 -0500 | |
commit | 448841f0b7b50f1b8d7a40138dfb0d882435c8bd (patch) | |
tree | 19941f9174cf57ad644d31758d9192dc34248745 /tools/perf/scripts/python/export-to-postgresql.py | |
parent | KVM: x86/xen: Remove extra unlock in kvm_xen_hvm_set_attr() (diff) | |
download | linux-dev-448841f0b7b50f1b8d7a40138dfb0d882435c8bd.tar.xz linux-dev-448841f0b7b50f1b8d7a40138dfb0d882435c8bd.zip |
KVM: x86/xen: Use hva_t for holding hypercall page address
Use hva_t, a.k.a. unsigned long, for the local variable that holds the
hypercall page address. On 32-bit KVM, gcc complains about using a u64
due to the implicit cast from a 64-bit value to a 32-bit pointer.
arch/x86/kvm/xen.c: In function ‘kvm_xen_write_hypercall_page’:
arch/x86/kvm/xen.c:300:22: error: cast to pointer from integer of
different size [-Werror=int-to-pointer-cast]
300 | page = memdup_user((u8 __user *)blob_addr, PAGE_SIZE);
Cc: Joao Martins <joao.m.martins@oracle.com>
Cc: David Woodhouse <dwmw@amazon.co.uk>
Fixes: 23200b7a30de ("KVM: x86/xen: intercept xen hypercalls if enabled")
Signed-off-by: Sean Christopherson <seanjc@google.com>
Message-Id: <20210208201502.1239867-1-seanjc@google.com>
Acked-by: David Woodhouse <dwmw@amazon.co.uk>
Reviewed-by: Joao Martins <joao.m.martins@oracle.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'tools/perf/scripts/python/export-to-postgresql.py')
0 files changed, 0 insertions, 0 deletions