x86: CFI hardening for request_irq()
authorAndrew Cooper <andrew.cooper3@citrix.com>
Fri, 29 Oct 2021 13:08:31 +0000 (14:08 +0100)
committerAndrew Cooper <andrew.cooper3@citrix.com>
Wed, 23 Feb 2022 15:33:43 +0000 (15:33 +0000)
commite88a591461a8a590a391378a6b24221d6ce09f95
treedcbf119619941e9783287e88190599212689f79f
parent66342fb5de2ffa7f26d5cabb4f7524bdb72be8b7
x86: CFI hardening for request_irq()

... and friends; alloc_direct_apic_vector() and set_direct_apic_vector().

Control Flow Integrity schemes use toolchain and optionally hardware support
to help protect against call/jump/return oriented programming attacks.

Use cf_check to annotate function pointer targets for the toolchain.

Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Acked-by: Jan Beulich <jbeulich@suse.com>
xen/arch/x86/apic.c
xen/arch/x86/cpu/mcheck/mce_intel.c
xen/arch/x86/guest/xen/xen.c
xen/arch/x86/hpet.c
xen/arch/x86/hvm/vmx/vmx.c
xen/arch/x86/include/asm/irq.h
xen/arch/x86/irq.c
xen/arch/x86/smp.c
xen/arch/x86/time.c
xen/drivers/passthrough/amd/iommu_init.c
xen/drivers/passthrough/vtd/iommu.c