]> xenbits.xensource.com Git - xen.git/commitdiff
xen: fix non-debug and 32-bit builds after nested HVM series
authorTim Deegan <Tim.Deegan@citrix.com>
Wed, 6 Apr 2011 10:22:39 +0000 (11:22 +0100)
committerTim Deegan <Tim.Deegan@citrix.com>
Wed, 6 Apr 2011 10:22:39 +0000 (11:22 +0100)
Signed-off-by: Tim Deegan <Tim.Deegan@citrix.com>
xen/arch/x86/hvm/svm/nestedsvm.c
xen/arch/x86/mm/hap/guest_walk.c

index d0ce4ddf24b710dad44a2ac2a4946d5be5f1d664..7c9f2d0bba1ed3a4b51755db82ca280a0dca921b 100644 (file)
@@ -1164,9 +1164,8 @@ nestedsvm_check_intercepts(struct vcpu *v, struct cpu_user_regs *regs,
     uint64_t exitcode)
 {
     bool_t is_intercepted;
-    struct nestedvcpu *nv = &vcpu_nestedhvm(v);
 
-    ASSERT(nv->nv_vmexit_pending == 0);
+    ASSERT(vcpu_nestedhvm(v).nv_vmexit_pending == 0);
     is_intercepted = nsvm_vmcb_guest_intercepts_exitcode(v, regs, exitcode);
 
     switch (exitcode) {
index 30306fcab79df390b5e6622e9f30e0cd3c0e39f1..8bbf9dbf957f35c198ce4ee841ac26336a578d8e 100644 (file)
@@ -122,7 +122,7 @@ unsigned long hap_p2m_ga_to_gfn(GUEST_PAGING_LEVELS)(
 #else
 
 unsigned long hap_gva_to_gfn(GUEST_PAGING_LEVELS)(
-    struct vcpu *v, unsigned long gva, uint32_t *pfec)
+    struct vcpu *v, struct p2m_domain *p2m, unsigned long gva, uint32_t *pfec)
 {
     gdprintk(XENLOG_ERR,
              "Guest paging level is greater than host paging level!\n");