KVM: x86: Protect MSR-based index computations in fixed_msr_to_seg_unit() from Spectr...
authorMarios Pomonis <pomonis@google.com>
Wed, 11 Dec 2019 20:47:47 +0000 (12:47 -0800)
committerPaolo Bonzini <pbonzini@redhat.com>
Mon, 27 Jan 2020 18:59:39 +0000 (19:59 +0100)
commit25a5edea71b7c154b6a0b8cec14c711cafa31d26
tree202e992a8d119b2f56e4db179ccafaed2e14621a
parent4bf79cb089f6b1c6c632492c0271054ce52ad766
KVM: x86: Protect MSR-based index computations in fixed_msr_to_seg_unit() from Spectre-v1/L1TF attacks

This fixes a Spectre-v1/L1TF vulnerability in fixed_msr_to_seg_unit().
This function contains index computations based on the
(attacker-controlled) MSR number.

Fixes: de9aef5e1ad6 ("KVM: MTRR: introduce fixed_mtrr_segment table")
Signed-off-by: Nick Finco <nifi@google.com>
Signed-off-by: Marios Pomonis <pomonis@google.com>
Reviewed-by: Andrew Honig <ahonig@google.com>
Cc: stable@vger.kernel.org
Reviewed-by: Jim Mattson <jmattson@google.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
arch/x86/kvm/mtrr.c