]> xenbits.xensource.com Git - people/andrewcoop/xen.git/commit
hypercall_xlat_continuation: Replace BUG_ON with domain_crash
authorBjoern Doebel <doebel@amazon.de>
Wed, 27 Mar 2024 17:31:38 +0000 (17:31 +0000)
committerAndrew Cooper <andrew.cooper3@citrix.com>
Tue, 9 Apr 2024 11:49:40 +0000 (12:49 +0100)
commit9926e692c4afc40bcd66f8416ff6a1e93ce402f6
treef4e1385e578a9e6bcd2ff1b42cc4e1d17146ce2c
parent6a98383b0877bb66ebfe189da43bf81abe3d7909
hypercall_xlat_continuation: Replace BUG_ON with domain_crash

Instead of crashing the host in case of unexpected hypercall parameters,
resort to only crashing the calling domain.

This is part of XSA-454 / CVE-2023-46842.

Fixes: b8a7efe8528a ("Enable compatibility mode operation for HYPERVISOR_memory_op")
Reported-by: Manuel Andreas <manuel.andreas@tum.de>
Signed-off-by: Bjoern Doebel <doebel@amazon.de>
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Roger Pau Monné <roger.pau@citrix.com>
xen/arch/x86/hypercall.c