can't find file to patch at input line 110 Perhaps you used the wrong -p or --strip option? The text leading up to this was: -------------------------- |From patchwork Mon Jul 19 16:45:33 2021 |Content-Type: text/plain; charset="utf-8" |MIME-Version: 1.0 |Content-Transfer-Encoding: 7bit |X-Patchwork-Submitter: Mark Brown |X-Patchwork-Id: 44409 |Return-Path: |X-Original-To: patchwork@sourceware.org |Delivered-To: patchwork@sourceware.org |Received: from server2.sourceware.org (localhost [IPv6:::1]) | by sourceware.org (Postfix) with ESMTP id 3A2D9395C064 | for ; Mon, 19 Jul 2021 16:47:15 +0000 (GMT) |DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org 3A2D9395C064 |DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sourceware.org; | s=default; t=1626713235; | bh=42mB+92uhgueHkpDgqbtgAjAjyiHVWo/RZPj0AazmUw=; | h=To:Subject:Date:In-Reply-To:References:List-Id:List-Unsubscribe: | List-Archive:List-Post:List-Help:List-Subscribe:From:Reply-To:Cc: | From; | b=SxfDwbjVCtj1vfR9Z7vfyO/fbcuX9knw2DtOwuzUtEktI1CnLz8gFjO7UhBzmvXG2 | 5SG1exTrICHlNu3Xq91istvV1Gqzd8ZRf8lGg8Ss0w6idWITZChfMuekCqBI1rq33W | v77+d9rRgqO/Un3jN2fq1qYGMjdRM/tBMJSdLQeU= |X-Original-To: libc-alpha@sourceware.org |Delivered-To: libc-alpha@sourceware.org |Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) | by sourceware.org (Postfix) with ESMTPS id CE67B395B81A | for ; Mon, 19 Jul 2021 16:46:11 +0000 (GMT) |DMARC-Filter: OpenDMARC Filter v1.4.1 sourceware.org CE67B395B81A |Received: by mail.kernel.org (Postfix) with ESMTPSA id 6993C61181; | Mon, 19 Jul 2021 16:46:10 +0000 (UTC) |To: Catalin Marinas , | Will Deacon |Subject: [PATCH v5 1/4] elf: Allow architectures to parse properties on the | main executable |Date: Mon, 19 Jul 2021 17:45:33 +0100 |Message-Id: <20210719164536.19143-2-broonie@kernel.org> |X-Mailer: git-send-email 2.20.1 |In-Reply-To: <20210719164536.19143-1-broonie@kernel.org> |References: <20210719164536.19143-1-broonie@kernel.org> |MIME-Version: 1.0 |X-Developer-Signature: v=1; a=openpgp-sha256; l=5824; h=from:subject; | bh=IhycsgjmVKMlkgcdiYd3hXgzAa0APlBc1qcD37+tygU=; | b=owEBbQGS/pANAwAKASTWi3JdVIfQAcsmYgBg9awtXfJzSF2l/0MqP+yAodwhBcaR2rXkhAhZ9GMs | wCRPN7yJATMEAAEKAB0WIQSt5miqZ1cYtZ/in+ok1otyXVSH0AUCYPWsLQAKCRAk1otyXVSH0PLwB/ | 9TAIEBsnhvB9I3qT/atDGg7KeZH0N05P4xeapTq9JDsRa/V9qeEDIX6CsQu1DU2P8yzywfdzNKZxNq | U5Gc2Cj3SqvO80H4zyocl1qZtNJt1G8RABeMnpmJqw/B52ngN25sh1o2GT+MsEv2zNXPLU/lG0M6pM | iI2i5K40JHucnqJ81cohK6caxeVBTdLQKbbHaAIsoPpaG5N3v9e8mC6fWEb9D1mKzE6DZqEGZt0Tmg | cQ2uozgG4rAIdLJzvidntKgK+6ndham84Vw+l3gYYZ6UwCgZ+r+H/RZiMgEoUfIkfUt1TjD5NSBAWc | Mi21NIJLbGa9DVbdSelBlKX+gTk5k+ |X-Developer-Key: i=broonie@kernel.org; a=openpgp; | fpr=3F2568AAC26998F9E813A1C5C3F436CA30F5D8EB |X-Spam-Status: No, score=-11.7 required=5.0 tests=BAYES_00, DKIMWL_WL_HIGH, | DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, GIT_PATCH_0, | SPF_HELO_NONE, SPF_PASS, TXREP autolearn=ham autolearn_force=no version=3.4.4 |X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on | server2.sourceware.org |X-BeenThere: libc-alpha@sourceware.org |X-Mailman-Version: 2.1.29 |Precedence: list |List-Id: Libc-alpha mailing list |List-Unsubscribe: , | |List-Archive: |List-Post: |List-Help: |List-Subscribe: , | |X-Patchwork-Original-From: Mark Brown via Libc-alpha | |From: Mark Brown |Reply-To: Mark Brown |Cc: linux-arch@vger.kernel.org, Yu-cheng Yu , | libc-alpha@sourceware.org, Szabolcs Nagy , | Jeremy Linton , Mark Brown , | Dave Martin , linux-arm-kernel@lists.infradead.org |Errors-To: libc-alpha-bounces+patchwork=sourceware.org@sourceware.org |Sender: "Libc-alpha" | | |Currently the ELF code only attempts to parse properties on the image |that will start execution, either the interpreter or for statically linked |executables the main executable. The expectation is that any property |handling for the main executable will be done by the interpreter. This is |a bit inconsistent since we do map the executable and is causing problems |for the arm64 BTI support when used in conjunction with systemd's use of |seccomp to implement MemoryDenyWriteExecute which stops the dynamic linker |adjusting the permissions of executable segments. | |Allow architectures to handle properties for both the dynamic linker and |main executable, adjusting arch_parse_elf_properties() to have a new |flag is_interp flag as with arch_elf_adjust_prot() and calling it for |both the main executable and any intepreter. | |The user of this code, arm64, is adapted to ensure that there is no |functional change. | |Signed-off-by: Mark Brown |Tested-by: Jeremy Linton |Reviewed-by: Dave Martin |--- | arch/arm64/include/asm/elf.h | 3 ++- | fs/binfmt_elf.c | 27 +++++++++++++++++++-------- | include/linux/elf.h | 4 +++- | 3 files changed, 24 insertions(+), 10 deletions(-) | |diff --git a/arch/arm64/include/asm/elf.h b/arch/arm64/include/asm/elf.h |index 8d1c8dcb87fd..a488a1329b16 100644 |--- a/arch/arm64/include/asm/elf.h |+++ b/arch/arm64/include/asm/elf.h -------------------------- No file to patch. Skipping patch. 2 out of 2 hunks ignored can't find file to patch at input line 131 Perhaps you used the wrong -p or --strip option? The text leading up to this was: -------------------------- |diff --git a/fs/binfmt_elf.c b/fs/binfmt_elf.c |index 439ed81e755a..28eaf36f145b 100644 |--- a/fs/binfmt_elf.c |+++ b/fs/binfmt_elf.c -------------------------- No file to patch. Skipping patch. 7 out of 7 hunks ignored can't find file to patch at input line 217 Perhaps you used the wrong -p or --strip option? The text leading up to this was: -------------------------- |diff --git a/include/linux/elf.h b/include/linux/elf.h |index c9a46c4e183b..1c45ecf29147 100644 |--- a/include/linux/elf.h |+++ b/include/linux/elf.h -------------------------- No file to patch. Skipping patch. 1 out of 1 hunk ignored