|
|
|
|
|
|
|
|
|
|
xen-devel
[Xen-devel] [RFO] Action when bad address passed in hypercall by guest
Request for opinions:
In tmem, for most hypercalls the (PV only) guest passes a gfn
(guest machine frame number).
What is the appropriate action if the gfn is "bad" (specifically
fails the p2m_ram_rw test from gfn_to_mfn)?
A) Ignore it (but return an error from the hypercall)
B) __domain_crash() as the guest is surely broken or malicious
C) ???
So far I haven't seen this, but the existing code I have for
this case -- ASSERT(0) -- is certainly wrong ;-)
Thanks,
Dan
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
<Prev in Thread] |
Current Thread |
[Next in Thread>
|
- [Xen-devel] [RFO] Action when bad address passed in hypercall by guest,
Dan Magenheimer <=
|
|
|
|
|