diff options
| author | Sean Christopherson <[email protected]> | 2021-04-21 19:21:26 -0700 |
|---|---|---|
| committer | Paolo Bonzini <[email protected]> | 2021-04-26 05:27:12 -0400 |
| commit | 6b48fd4cb206485c357420d91ea766ef81b20dc3 (patch) | |
| tree | 0b659aa59f2b32e3b336e1601d08671b6461d218 /tools/testing/selftests/bpf/prog_tests/access_variable_array.c | |
| parent | 82277eeed65eed6c6ee5b8f97bd978763eab148f (diff) | |
KVM: x86/xen: Drop RAX[63:32] when processing hypercall
Truncate RAX to 32 bits, i.e. consume EAX, when retrieving the hypecall
index for a Xen hypercall. Per Xen documentation[*], the index is EAX
when the vCPU is not in 64-bit mode.
[*] http://xenbits.xenproject.org/docs/sphinx-unstable/guest-guide/x86/hypercall-abi.html
Fixes: 23200b7a30de ("KVM: x86/xen: intercept xen hypercalls if enabled")
Cc: Joao Martins <[email protected]>
Cc: David Woodhouse <[email protected]>
Cc: [email protected]
Signed-off-by: Sean Christopherson <[email protected]>
Message-Id: <[email protected]>
Signed-off-by: Paolo Bonzini <[email protected]>
Diffstat (limited to 'tools/testing/selftests/bpf/prog_tests/access_variable_array.c')
0 files changed, 0 insertions, 0 deletions