OSDN Git Service

KVM: x86: Protect MSR-based index computations in fixed_msr_to_seg_unit() from Spectr...
authorMarios Pomonis <pomonis@google.com>
Wed, 11 Dec 2019 20:47:47 +0000 (12:47 -0800)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Fri, 14 Feb 2020 21:29:58 +0000 (16:29 -0500)
commit1510279e2a0ca4c870123b066e83135f2a3ac5c1
treed4d2d08f426476b1e9ccc03a69e2cbd2eef957e8
parentd216f65c74ddf8ae6547f8a9325f9ad15f688c97
KVM: x86: Protect MSR-based index computations in fixed_msr_to_seg_unit() from Spectre-v1/L1TF attacks

commit 25a5edea71b7c154b6a0b8cec14c711cafa31d26 upstream.

This fixes a Spectre-v1/L1TF vulnerability in fixed_msr_to_seg_unit().
This function contains index computations based on the
(attacker-controlled) MSR number.

Fixes: de9aef5e1ad6 ("KVM: MTRR: introduce fixed_mtrr_segment table")

Signed-off-by: Nick Finco <nifi@google.com>
Signed-off-by: Marios Pomonis <pomonis@google.com>
Reviewed-by: Andrew Honig <ahonig@google.com>
Cc: stable@vger.kernel.org
Reviewed-by: Jim Mattson <jmattson@google.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
arch/x86/kvm/mtrr.c