|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 2/2] arm: kill a guest which uses hvc with an immediate operand != XEN_HYPERCALL_TAG
On Mon, 23 Jul 2012, Ian Campbell wrote:
> At best these guests are confused/broken and at worse they are malicious.
>
> Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
> ---
> xen/arch/arm/traps.c | 6 +-----
> 1 files changed, 1 insertions(+), 5 deletions(-)
>
> diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c
> index 52ab943..50b62c0 100644
> --- a/xen/arch/arm/traps.c
> +++ b/xen/arch/arm/traps.c
> @@ -472,11 +472,7 @@ static void do_trap_hypercall(struct cpu_user_regs
> *regs, unsigned long iss)
> arm_hypercall_fn_t call = NULL;
>
> if ( iss != XEN_HYPERCALL_TAG )
> - {
> - printk("%s %d: received an alien hypercall iss=%lx\n", __func__ ,
> - __LINE__ , iss);
> - regs->r0 = -EINVAL;
> - }
> + domain_crash_synchronous();
>
> if ( regs->r12 > ARRAY_SIZE(arm_hypercall_table) )
> {
Are we sure that this is actually necessary?
I think that the old behaviour of returning -EINVAL is sufficient.
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |