]> xenbits.xensource.com Git - xen.git/commitdiff
x86/HVM: properly reject "indirect" VRAM writes
authorJan Beulich <jbeulich@suse.com>
Tue, 12 Nov 2024 13:06:53 +0000 (14:06 +0100)
committerJan Beulich <jbeulich@suse.com>
Tue, 12 Nov 2024 13:06:53 +0000 (14:06 +0100)
While ->count will only be different from 1 for "indirect" (data in
guest memory) accesses, it being 1 does not exclude the request being an
"indirect" one. Check both to be on the safe side, and bring the ->count
part also in line with what ioreq_send_buffered() actually refuses to
handle.

This is part of XSA-463 / CVE-2024-45818

Fixes: 3bbaaec09b1b ("x86/hvm: unify stdvga mmio intercept with standard mmio intercept")
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
(cherry picked from commit eb7cd0593d88c4b967a24bca8bd30591966676cd)

xen/arch/x86/hvm/stdvga.c

index bed25e3cff629b990aea42f51236f6b74ac37f5c..f5a4b1cfe9c230b26db318f42e2106a23943221c 100644 (file)
@@ -499,13 +499,13 @@ static bool cf_check stdvga_mem_accept(
 
     spin_lock(&s->lock);
 
-    if ( p->dir == IOREQ_WRITE && p->count > 1 )
+    if ( p->dir == IOREQ_WRITE && (p->data_is_ptr || p->count != 1) )
     {
         /*
          * We cannot return X86EMUL_UNHANDLEABLE on anything other then the
          * first cycle of an I/O. So, since we cannot guarantee to always be
          * able to send buffered writes, we have to reject any multi-cycle
-         * I/O.
+         * or "indirect" I/O.
          */
         goto reject;
     }