can't find file to patch at input line 106 Perhaps you used the wrong -p or --strip option? The text leading up to this was: -------------------------- |From patchwork Mon Jul 12 11:52:56 2021 |Content-Type: text/plain; charset="utf-8" |MIME-Version: 1.0 |Content-Transfer-Encoding: 7bit |X-Patchwork-Submitter: Mark Brown |X-Patchwork-Id: 44314 |Return-Path: |X-Original-To: patchwork@sourceware.org |Delivered-To: patchwork@sourceware.org |Received: from server2.sourceware.org (localhost [IPv6:::1]) | by sourceware.org (Postfix) with ESMTP id B4674388801C | for ; Mon, 12 Jul 2021 11:58:11 +0000 (GMT) |DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org B4674388801C |DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sourceware.org; | s=default; t=1626091091; | bh=JKzgg5ZWE3Dhbr5GT4DdSYBJ5EisTHZsEFYazM1/7D4=; | h=To:Subject:Date:In-Reply-To:References:List-Id:List-Unsubscribe: | List-Archive:List-Post:List-Help:List-Subscribe:From:Reply-To:Cc: | From; | b=ZVD6lhz1W4kgBFKVfl+B18z5lyyecr8E9fN+hCsUU3mTmG1n+IAkqX5fJh8DOnsG4 | YkGALWnJKI0e07bWvEgUGQCWWa/HPu9IOFCRXxRKH70SP+YXdrUiP3g66t0KXcxgw+ | zv95dpJFMV7CFnxJSwPpqSqs40WXty+PkUIFZkZw= |X-Original-To: libc-alpha@sourceware.org |Delivered-To: libc-alpha@sourceware.org |Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) | by sourceware.org (Postfix) with ESMTPS id 03303388880E | for ; Mon, 12 Jul 2021 11:56:59 +0000 (GMT) |DMARC-Filter: OpenDMARC Filter v1.4.1 sourceware.org 03303388880E |Received: by mail.kernel.org (Postfix) with ESMTPSA id 93CC561106; | Mon, 12 Jul 2021 11:56:57 +0000 (UTC) |To: Catalin Marinas , | Will Deacon |Subject: [PATCH v4 1/4] elf: Allow architectures to parse properties on the | main executable |Date: Mon, 12 Jul 2021 12:52:56 +0100 |Message-Id: <20210712115259.29547-2-broonie@kernel.org> |X-Mailer: git-send-email 2.20.1 |In-Reply-To: <20210712115259.29547-1-broonie@kernel.org> |References: <20210712115259.29547-1-broonie@kernel.org> |MIME-Version: 1.0 |X-Developer-Signature: v=1; a=openpgp-sha256; l=6014; h=from:subject; | bh=UuQT7MuELYKmhnUM/9E0W1LTcaYRAh38M3lJ7n5Epv8=; | b=owEBbQGS/pANAwAKASTWi3JdVIfQAcsmYgBg7C0XKSWKoWKSPHkFHbhY+rhHSEcUKON/1AdxApOU | nvYqkrSJATMEAAEKAB0WIQSt5miqZ1cYtZ/in+ok1otyXVSH0AUCYOwtFwAKCRAk1otyXVSH0GJxB/ | 9mSG7Xe92bWYUDIopC1+wKTpxWK4nG+sycce8CuhIXxW8QLi8ooPOVa1Qs4izOFt9X9AeegUHpVGYE | u0E+xku3/B+eANTaX6S3gZ2OAWfsDG6bRcwYzbB6vyEaD+TDrb7IZBEfv+1VQMlM7FEvEZDOMJ7ozA | yqXvs/f5+YKwAVy1VXVEOGeP/LRVq9cfp+F6Bm/3MuVlDyEKUPGw2wDdZ4ml8ejvkVkwu9/KPxpYKi | 5KyuZ31x6nqLxE5l39GIXf3UXV59BmrVHW2NVKywqWk6gTkg0GpBcUmn9VvDex+mTYo073rtEJAvGE | rg5Pp70euJ182MNT1Nc5xl9f6rFq1R |X-Developer-Key: i=broonie@kernel.org; a=openpgp; | fpr=3F2568AAC26998F9E813A1C5C3F436CA30F5D8EB |X-Spam-Status: No, score=-11.1 required=5.0 tests=BAYES_00, DKIMWL_WL_HIGH, | DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, GIT_PATCH_0, | SPF_HELO_NONE, SPF_PASS, TXREP autolearn=ham autolearn_force=no version=3.4.4 |X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on | server2.sourceware.org |X-BeenThere: libc-alpha@sourceware.org |X-Mailman-Version: 2.1.29 |Precedence: list |List-Id: Libc-alpha mailing list |List-Unsubscribe: , | |List-Archive: |List-Post: |List-Help: |List-Subscribe: , | |X-Patchwork-Original-From: Mark Brown via Libc-alpha | |From: Mark Brown |Reply-To: Mark Brown |Cc: linux-arch@vger.kernel.org, Yu-cheng Yu , | libc-alpha@sourceware.org, Szabolcs Nagy , | Jeremy Linton , Mark Brown , | Dave Martin , linux-arm-kernel@lists.infradead.org |Errors-To: libc-alpha-bounces+patchwork=sourceware.org@sourceware.org |Sender: "Libc-alpha" | | |Currently the ELF code only attempts to parse properties on the image |that will start execution, either the interpreter or for statically linked |executables the main executable. The expectation is that any property |handling for the main executable will be done by the interpreter. This is |a bit inconsistent since we do map the executable and is causing problems |for the arm64 BTI support when used in conjunction with systemd's use of |seccomp to implement MemoryDenyWriteExecute which stops the dynamic linker |adjusting the permissions of executable segments. | |Allow architectures to handle properties for both the dynamic linker and |main executable, adjusting arch_parse_elf_properties() to have an is_interp |flag as with arch_elf_adjust_prot() and calling it for both the main |executable and any intepreter. | |Signed-off-by: Mark Brown |Tested-by: Jeremy Linton |--- | arch/arm64/include/asm/elf.h | 3 ++- | fs/binfmt_elf.c | 31 +++++++++++++++++++++++-------- | include/linux/elf.h | 4 +++- | 3 files changed, 28 insertions(+), 10 deletions(-) | |diff --git a/arch/arm64/include/asm/elf.h b/arch/arm64/include/asm/elf.h |index 8d1c8dcb87fd..a488a1329b16 100644 |--- a/arch/arm64/include/asm/elf.h |+++ b/arch/arm64/include/asm/elf.h -------------------------- No file to patch. Skipping patch. 2 out of 2 hunks ignored can't find file to patch at input line 127 Perhaps you used the wrong -p or --strip option? The text leading up to this was: -------------------------- |diff --git a/fs/binfmt_elf.c b/fs/binfmt_elf.c |index 439ed81e755a..81e151a57df2 100644 |--- a/fs/binfmt_elf.c |+++ b/fs/binfmt_elf.c -------------------------- No file to patch. Skipping patch. 8 out of 8 hunks ignored can't find file to patch at input line 224 Perhaps you used the wrong -p or --strip option? The text leading up to this was: -------------------------- |diff --git a/include/linux/elf.h b/include/linux/elf.h |index c9a46c4e183b..1c45ecf29147 100644 |--- a/include/linux/elf.h |+++ b/include/linux/elf.h -------------------------- No file to patch. Skipping patch. 1 out of 1 hunk ignored