lib/earlycpio: Mark find_cpio_data() __no_stack_protector

Message ID 20230816100221.12209-1-bp@alien8.de
State New
Headers
Series lib/earlycpio: Mark find_cpio_data() __no_stack_protector |

Commit Message

Borislav Petkov Aug. 16, 2023, 10:02 a.m. UTC
  From: "Borislav Petkov (AMD)" <bp@alien8.de>

find_cpio_data() is called by the 32-bit x86 microcode loader while
paging is not yet enabled and the CPU is running off physical addresses.
However, when stack protector is enabled, the compiler adds the stack
protection check for this function:

  c1846480 <find_cpio_data>:
  c1846480:       55                      push   %ebp
  c1846481:       89 e5                   mov    %esp,%ebp
  c1846483:       57                      push   %edi
  ...

  c1846676:       e9 85 fe ff ff          jmp    c1846500 <find_cpio_data+0x80>
  c184667b:       e8 20 9e 02 00          call   c18704a0 <__stack_chk_fail>

which cannot work yet.

Prevent that from happening.

Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de>
---
 lib/earlycpio.c | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)
  

Patch

diff --git a/lib/earlycpio.c b/lib/earlycpio.c
index d2c37d64fd0c..d3efe707c3f7 100644
--- a/lib/earlycpio.c
+++ b/lib/earlycpio.c
@@ -56,8 +56,8 @@  enum cpio_fields {
  *              the match returned an empty filename string.
  */
 
-struct cpio_data find_cpio_data(const char *path, void *data,
-				size_t len,  long *nextoff)
+struct cpio_data __no_stack_protector find_cpio_data(const char *path, void *data,
+						     size_t len,  long *nextoff)
 {
 	const size_t cpio_header_len = 8*C_NFIELDS - 2;
 	struct cpio_data cd = { NULL, 0, "" };