diff options
author | Andre Przywara <andre.przywara@arm.com> | 2016-08-09 10:54:29 +0100 |
---|---|---|
committer | Christoffer Dall <christoffer.dall@linaro.org> | 2016-08-15 23:00:22 +0200 |
commit | 505a19eec49ab36b314a05bc062749ebdfb0aa90 (patch) | |
tree | e33e93567ccb3da6236f281a892915fcf622b496 /Documentation/hwmon/tmp401 | |
parent | c7735769d5dd79afb07254532fabd9ccbd85b1fa (diff) |
KVM: arm64: check for ITS device on MSI injection
When userspace provides the doorbell address for an MSI to be
injected into the guest, we find a KVM device which feels responsible.
Lets check that this device is really an emulated ITS before we make
real use of the container_of-ed pointer.
[ Moved NULL-pointer check to caller of static function
- Christoffer ]
Signed-off-by: Andre Przywara <andre.przywara@arm.com>
Reviewed-by: Christoffer Dall <christoffer.dall@linaro.org>
Signed-off-by: Christoffer Dall <christoffer.dall@linaro.org>
Diffstat (limited to 'Documentation/hwmon/tmp401')
0 files changed, 0 insertions, 0 deletions