>>> On 28.08.17 at 11:38, <aisa...@bitdefender.com> wrote: > In some introspection usecases, an in-guest agent needs to communicate > with the external introspection agent. An existing mechanism is > HVMOP_guest_request_vm_event, but this is restricted to kernel usecases > like all other hypercalls. > > Introduce a mechanism whereby the introspection agent can whitelist the > use of HVMOP_guest_request_vm_event directly from userspace. > > Signed-off-by: Alexandru Isaila <aisa...@bitdefender.com>
For the parts it is applicable to: Acked-by: Jan Beulich <jbeul...@suse.com> I'd like to note though that I find it a little odd for &d->arch to be passed to a hook, instead of just d. But it'll be the maintainers of that code to approve (or not) of that. Jan _______________________________________________ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel