|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v10] x86/hvm: Allow guest_request vm_events coming from userspace
On Tue, Aug 29, 2017 at 3:36 AM, Jan Beulich <JBeulich@xxxxxxxx> wrote:
>>>> On 29.08.17 at 11:23, <aisaila@xxxxxxxxxxxxxxx> wrote:
>> In some introspection usecases, an in-guest agent needs to communicate
>> with the external introspection agent. An existing mechanism is
>> HVMOP_guest_request_vm_event, but this is restricted to kernel usecases
>> like all other hypercalls.
>>
>> Introduce a mechanism whereby the introspection agent can whitelist the
>> use of HVMOP_guest_request_vm_event directly from userspace.
>>
>> Signed-off-by: Alexandru Isaila <aisaila@xxxxxxxxxxxxxxx>
>> Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx>
>
> For the pieces it applies to
> Acked-by: Jan Beulich <jbeulich@xxxxxxxx>
>
> However, as I keep looking at pieces which shouldn't really require
> my attention, I've noticed one more cosmetic issue:
>
>> --- a/xen/include/asm-arm/monitor.h
>> +++ b/xen/include/asm-arm/monitor.h
>> @@ -26,6 +26,12 @@
>> #include <public/domctl.h>
>>
>> static inline
>> +void arch_monitor_allow_userspace(struct domain *d, bool allow_userspace)
>> +{
>> + return;
>> +}
>
> I don't see the point of the return statement here. But I'll leave
> it to the ARM maintainers, and it would be easy to drop while
> committing if no other issues are going to arise.
>
I would bet that a sane compiler wouldn't generate anything for that
with or without return in there but sure, if we can drop it then why
not.
Tamas
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |