diff options
| author | Paolo Bonzini <pbonzini@redhat.com> | 2024-04-04 08:13:13 -0400 |
|---|---|---|
| committer | Paolo Bonzini <pbonzini@redhat.com> | 2024-04-11 13:08:22 -0400 |
| commit | 8d2aec3b2d7937ed77d2daa8f29c6dfc01100953 (patch) | |
| tree | 4b0e6b44a918b7e23675e960636799753ae3097a /drivers/usb/cdns3/cdns3-debug.h | |
| parent | 0d7bf5e5b00a131cc02ecadbbf42563c0721aaeb (diff) | |
KVM: x86: use u64_to_user_ptr()
There is no danger to the kernel if 32-bit userspace provides a 64-bit
value that has the high bits set, but for whatever reason happens to
resolve to an address that has something mapped there. KVM uses the
checked version of get_user() and put_user(), so any faults are caught
properly.
Suggested-by: Sean Christopherson <seanjc@google.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Message-ID: <20240404121327.3107131-4-pbonzini@redhat.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'drivers/usb/cdns3/cdns3-debug.h')
0 files changed, 0 insertions, 0 deletions
