[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [RFO] Action when bad address passed in hypercall by guest



Request for opinions:

In tmem, for most hypercalls the (PV only) guest passes a gfn
(guest machine frame number).

What is the appropriate action if the gfn is "bad" (specifically
fails the p2m_ram_rw test from gfn_to_mfn)?

A) Ignore it (but return an error from the hypercall)
B) __domain_crash() as the guest is surely broken or malicious
C) ???

So far I haven't seen this, but the existing code I have for
this case -- ASSERT(0) -- is certainly wrong ;-)

Thanks,
Dan

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.