In preparation for adding stack protector support, we need to start marking functions run before the C environment is completely set up. Introduce a __prereloc attribute for this use case and an even stronger no noinstr (no instrumentation) attribute and start adding it at enough places for bareboxproper to start up with -fstack-protector-all. Signed-off-by: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx> --- arch/arm/cpu/common.c | 2 +- arch/arm/cpu/start.c | 4 ++-- arch/arm/include/asm/reloc.h | 2 +- arch/arm/lib64/string.c | 2 +- include/linux/compiler_types.h | 7 +++++++ lib/string.c | 2 +- 6 files changed, 13 insertions(+), 6 deletions(-) diff --git a/arch/arm/cpu/common.c b/arch/arm/cpu/common.c index 47da9fbe494f..e9118b450d3f 100644 --- a/arch/arm/cpu/common.c +++ b/arch/arm/cpu/common.c @@ -59,7 +59,7 @@ void pbl_barebox_break(void) /* * relocate binary to the currently running address */ -void relocate_to_current_adr(void) +void __prereloc relocate_to_current_adr(void) { unsigned long offset; unsigned long __maybe_unused *dynsym, *dynend; diff --git a/arch/arm/cpu/start.c b/arch/arm/cpu/start.c index 2e987ec41d1e..15f5b2937227 100644 --- a/arch/arm/cpu/start.c +++ b/arch/arm/cpu/start.c @@ -137,7 +137,7 @@ static int barebox_memory_areas_init(void) } device_initcall(barebox_memory_areas_init); -__noreturn __no_sanitize_address void barebox_non_pbl_start(unsigned long membase, +__noreturn __prereloc void barebox_non_pbl_start(unsigned long membase, unsigned long memsize, void *boarddata) { unsigned long endmem = membase + memsize; @@ -245,7 +245,7 @@ void start(unsigned long membase, unsigned long memsize, void *boarddata); * First function in the uncompressed image. We get here from * the pbl. The stack already has been set up by the pbl. */ -void NAKED __no_sanitize_address __section(.text_entry) start(unsigned long membase, +void NAKED __prereloc __section(.text_entry) start(unsigned long membase, unsigned long memsize, void *boarddata) { barebox_non_pbl_start(membase, memsize, boarddata); diff --git a/arch/arm/include/asm/reloc.h b/arch/arm/include/asm/reloc.h index 0002c96c014c..95b4ef0af88b 100644 --- a/arch/arm/include/asm/reloc.h +++ b/arch/arm/include/asm/reloc.h @@ -12,7 +12,7 @@ unsigned long get_runtime_offset(void); * Get the offset of global variables when not running at the address we are * linked at. */ -static inline unsigned long global_variable_offset(void) +static inline __prereloc unsigned long global_variable_offset(void) { #ifdef CONFIG_CPU_V8 unsigned long text; diff --git a/arch/arm/lib64/string.c b/arch/arm/lib64/string.c index 26a284be5a77..938790e1a9b2 100644 --- a/arch/arm/lib64/string.c +++ b/arch/arm/lib64/string.c @@ -7,7 +7,7 @@ void *__arch_memset(void *dst, int c, __kernel_size_t size); void *__arch_memcpy(void * dest, const void *src, size_t count); -static void *_memset(void *dst, int c, __kernel_size_t size) +static __prereloc void *_memset(void *dst, int c, __kernel_size_t size) { if (likely(get_cr() & CR_M)) return __arch_memset(dst, c, size); diff --git a/include/linux/compiler_types.h b/include/linux/compiler_types.h index bc1b43aab0dc..9ce272bba5f3 100644 --- a/include/linux/compiler_types.h +++ b/include/linux/compiler_types.h @@ -305,4 +305,11 @@ struct ftrace_likely_data { */ #define noinline_for_stack noinline +/* code that can't be instrumented at all */ +#define noinstr \ + noinline notrace __no_sanitize_address + +#define __prereloc \ + notrace __no_sanitize_address + #endif /* __LINUX_COMPILER_TYPES_H */ diff --git a/lib/string.c b/lib/string.c index 8ea68044cc0a..166ef190d6aa 100644 --- a/lib/string.c +++ b/lib/string.c @@ -534,7 +534,7 @@ void *__default_memset(void * s, int c, size_t count) } EXPORT_SYMBOL(__default_memset); -void __no_sanitize_address *__nokasan_default_memset(void * s, int c, size_t count) +void __prereloc __no_sanitize_address *__nokasan_default_memset(void * s, int c, size_t count) { char *xs = (char *) s; -- 2.39.2