File 545364ef-VMX-MSR_IA32_SYSENTER-values-should-be-canonical.patch of Package xen.openSUSE_13.1_Update
# Commit 93cc5c6f1641e90eb120826d42f103b7726efb8e
# Date 2014-10-31 11:31:11 +0100
# Author Jan Beulich <jbeulich@suse.com>
# Committer Jan Beulich <jbeulich@suse.com>
VMX: values written to MSR_IA32_SYSENTER_E[IS]P should be canonical
A recent KVM change by Nadav Amit <namit@cs.technion.ac.il> helped spot
that we have the same issue as they did.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Tim Deegan <tim@xen.org>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
Acked-by: Kevin Tian <kevin.tian@intel.com>
master commit: 93cc5c6f1641e90eb120826d42f103b7726efb8e
master date: 2014-10-31 11:31:11 +0100
Index: xen-4.3.3-testing/xen/arch/x86/hvm/vmx/vmx.c
===================================================================
--- xen-4.3.3-testing.orig/xen/arch/x86/hvm/vmx/vmx.c
+++ xen-4.3.3-testing/xen/arch/x86/hvm/vmx/vmx.c
@@ -2159,9 +2159,13 @@ static int vmx_msr_write_intercept(unsig
__vmwrite(GUEST_SYSENTER_CS, msr_content);
break;
case MSR_IA32_SYSENTER_ESP:
+ if ( !is_canonical_address(msr_content) )
+ goto gp_fault;
__vmwrite(GUEST_SYSENTER_ESP, msr_content);
break;
case MSR_IA32_SYSENTER_EIP:
+ if ( !is_canonical_address(msr_content) )
+ goto gp_fault;
__vmwrite(GUEST_SYSENTER_EIP, msr_content);
break;
case MSR_IA32_DEBUGCTLMSR: {