[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [RFO] Action when bad address passed in hypercall by guest
Request for opinions: In tmem, for most hypercalls the (PV only) guest passes a gfn (guest machine frame number). What is the appropriate action if the gfn is "bad" (specifically fails the p2m_ram_rw test from gfn_to_mfn)? A) Ignore it (but return an error from the hypercall) B) __domain_crash() as the guest is surely broken or malicious C) ??? So far I haven't seen this, but the existing code I have for this case -- ASSERT(0) -- is certainly wrong ;-) Thanks, Dan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |