>>> On 10.02.16 at 17:00, <cz...@bitdefender.com> wrote:
> --- a/xen/include/xen/sched.h
> +++ b/xen/include/xen/sched.h
> @@ -464,6 +464,22 @@ struct domain
>      /* vNUMA topology accesses are protected by rwlock. */
>      rwlock_t vnuma_rwlock;
>      struct vnuma_info *vnuma;
> +
> +    /* Common monitor vm-events options */
> +    struct {
> +#if CONFIG_HAS_VM_EVENT_SINGLESTEP
> +        uint8_t singlestep_enabled          : 1;
> +#endif // HAS_VM_EVENT_SINGLESTEP
> +
> +#if CONFIG_HAS_VM_EVENT_SOFTWARE_BREAKPOINT
> +        uint8_t software_breakpoint_enabled : 1;
> +#endif // HAS_VM_EVENT_SOFTWARE_BREAKPOINT
> +
> +#if CONFIG_HAS_VM_EVENT_GUEST_REQUEST
> +        uint8_t guest_request_enabled       : 1;
> +        uint8_t guest_request_sync          : 1;
> +#endif // HAS_VM_EVENT_GUEST_REQUEST
> +    } monitor;
>  };

Please use C-style comments only (see ./CODING_STYLE).

Jan


_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel

Reply via email to