]> xenbits.xensource.com Git - xen.git/commitdiff
VMX: values written to MSR_IA32_SYSENTER_E[IS]P should be canonical
authorJan Beulich <jbeulich@suse.com>
Thu, 13 Nov 2014 08:48:13 +0000 (09:48 +0100)
committerJan Beulich <jbeulich@suse.com>
Thu, 13 Nov 2014 08:48:13 +0000 (09:48 +0100)
A recent KVM change by Nadav Amit <namit@cs.technion.ac.il> helped spot
that we have the same issue as they did.

Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Tim Deegan <tim@xen.org>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
Acked-by: Kevin Tian <kevin.tian@intel.com>
master commit: 93cc5c6f1641e90eb120826d42f103b7726efb8e
master date: 2014-10-31 11:31:11 +0100

xen/arch/x86/hvm/vmx/vmx.c

index a6a850dd1afb79c7ac655ac751eca407ee64dcd1..d56e5ff89cf7d59f55feaec20705aea6237420b7 100644 (file)
@@ -2184,9 +2184,13 @@ static int vmx_msr_write_intercept(unsigned int msr, uint64_t msr_content)
         __vmwrite(GUEST_SYSENTER_CS, msr_content);
         break;
     case MSR_IA32_SYSENTER_ESP:
+        if ( !is_canonical_address(msr_content) )
+            goto gp_fault;
         __vmwrite(GUEST_SYSENTER_ESP, msr_content);
         break;
     case MSR_IA32_SYSENTER_EIP:
+        if ( !is_canonical_address(msr_content) )
+            goto gp_fault;
         __vmwrite(GUEST_SYSENTER_EIP, msr_content);
         break;
     case MSR_IA32_DEBUGCTLMSR: {