File 545364ef-VMX-MSR_IA32_SYSENTER-values-should-be-canonical.patch of Package xen.openSUSE_13.1_Update

# Commit 93cc5c6f1641e90eb120826d42f103b7726efb8e
# Date 2014-10-31 11:31:11 +0100
# Author Jan Beulich <jbeulich@suse.com>
# Committer Jan Beulich <jbeulich@suse.com>
VMX: values written to MSR_IA32_SYSENTER_E[IS]P should be canonical

A recent KVM change by Nadav Amit <namit@cs.technion.ac.il> helped spot
that we have the same issue as they did.

Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Tim Deegan <tim@xen.org>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
Acked-by: Kevin Tian <kevin.tian@intel.com>
master commit: 93cc5c6f1641e90eb120826d42f103b7726efb8e
master date: 2014-10-31 11:31:11 +0100

Index: xen-4.3.3-testing/xen/arch/x86/hvm/vmx/vmx.c
===================================================================
--- xen-4.3.3-testing.orig/xen/arch/x86/hvm/vmx/vmx.c
+++ xen-4.3.3-testing/xen/arch/x86/hvm/vmx/vmx.c
@@ -2159,9 +2159,13 @@ static int vmx_msr_write_intercept(unsig
         __vmwrite(GUEST_SYSENTER_CS, msr_content);
         break;
     case MSR_IA32_SYSENTER_ESP:
+        if ( !is_canonical_address(msr_content) )
+            goto gp_fault;
         __vmwrite(GUEST_SYSENTER_ESP, msr_content);
         break;
     case MSR_IA32_SYSENTER_EIP:
+        if ( !is_canonical_address(msr_content) )
+            goto gp_fault;
         __vmwrite(GUEST_SYSENTER_EIP, msr_content);
         break;
     case MSR_IA32_DEBUGCTLMSR: {
openSUSE Build Service is sponsored by