lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <ea8cda8a-bda1-c227-6bd2-d8c3bb2f5681@codeaurora.org> Date: Sun, 7 Apr 2019 00:47:40 +0530 From: Mukesh Ojha <mojha@...eaurora.org> To: Hariprasad Kelam <hariprasad.kelam@...il.com>, Paolo Bonzini <pbonzini@...hat.com>, Radim Krčmář <rkrcmar@...hat.com>, Thomas Gleixner <tglx@...utronix.de>, Ingo Molnar <mingo@...hat.com>, Borislav Petkov <bp@...en8.de>, "H. Peter Anvin" <hpa@...or.com>, x86@...nel.org, kvm@...r.kernel.org, linux-kernel@...r.kernel.org Subject: Re: [PATCH] KVM: x86: fix warning Using plain integer as NULL pointer On 4/6/2019 3:06 PM, Hariprasad Kelam wrote: > Changed passing argument as "0 to NULL" which resolves below sparse warning > > arch/x86/kvm/x86.c:3096:61: warning: Using plain integer as NULL pointer > > Signed-off-by: Hariprasad Kelam <hariprasad.kelam@...il.com> Reviewed-by: Mukesh Ojha <mojha@...eaurora.org> Cheers, -Mukesh > --- > arch/x86/kvm/x86.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c > index 099b851..39034ec 100644 > --- a/arch/x86/kvm/x86.c > +++ b/arch/x86/kvm/x86.c > @@ -3093,7 +3093,7 @@ int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext) > break; > case KVM_CAP_NESTED_STATE: > r = kvm_x86_ops->get_nested_state ? > - kvm_x86_ops->get_nested_state(NULL, 0, 0) : 0; > + kvm_x86_ops->get_nested_state(NULL, NULL, 0) : 0; > break; > default: > break;
Powered by blists - more mailing lists