patches/glibc/ports-2.12.1/350-pre20040117-pt_pax.patch
author "Yann E. MORIN" <yann.morin.1998@anciens.enib.fr>
Tue Dec 13 23:32:39 2011 +0100 (2011-12-13)
branch1.13
changeset 2847 c0bf2319af08
permissions -rw-r--r--
scripts: fix dumping execution backtrace

Dumping the backtrace has been broken since changeset #652e56d6d35a:
scripts: execute each steps in a subshell

We can spawn sub-sub-shells in some cases.

The way the fault handler works is to dump the backtrace, but to avoid
printing it once for every sub-shell (which could get quite confusing),
it simply exits when it detects that it is being run in a sub-shell,
leaving to the top-level shell the work to dump the backtrace.

Because each step is executed in its own sub-shell, the variable arrays
that contain the step name, the source file and line number, are lost
when exiting the per-step sub-shell.

Hence, the backtrace is currently limited to printing only the top-level
main procedure of the shell.

Fix this thus:
- when dumping the bckatraces for the steps & the functions, remember
it was dumped, and only dump it if it was not already dumped
- at the top-level shell, print the hints

Also, rename the top-level step label.

Reported-by: Benoît Thébaudeau <benoit.thebaudeau@advansee.com>
Signed-off-by: "Yann E. MORIN" <yann.morin.1998@anciens.enib.fr>
(transplanted from 4193d6e6a17430a177fa88c287879c2c35e319f3)
     1 
     2 
     3 diff -durN glibc-2.12.1.orig/elf/elf.h glibc-2.12.1/elf/elf.h
     4 --- glibc-2.12.1.orig/elf/elf.h	2009-04-15 02:15:54.000000000 +0200
     5 +++ glibc-2.12.1/elf/elf.h	2009-11-13 00:50:35.000000000 +0100
     6 @@ -580,6 +580,7 @@
     7  #define PT_GNU_EH_FRAME	0x6474e550	/* GCC .eh_frame_hdr segment */
     8  #define PT_GNU_STACK	0x6474e551	/* Indicates stack executability */
     9  #define PT_GNU_RELRO	0x6474e552	/* Read-only after relocation */
    10 +#define PT_PAX_FLAGS	0x65041580	/* Indicates PaX flag markings */
    11  #define PT_LOSUNW	0x6ffffffa
    12  #define PT_SUNWBSS	0x6ffffffa	/* Sun Specific segment */
    13  #define PT_SUNWSTACK	0x6ffffffb	/* Stack segment */
    14 @@ -593,6 +594,18 @@
    15  #define PF_X		(1 << 0)	/* Segment is executable */
    16  #define PF_W		(1 << 1)	/* Segment is writable */
    17  #define PF_R		(1 << 2)	/* Segment is readable */
    18 +#define PF_PAGEEXEC	(1 << 4)	/* Enable  PAGEEXEC */
    19 +#define PF_NOPAGEEXEC	(1 << 5)	/* Disable PAGEEXEC */
    20 +#define PF_SEGMEXEC	(1 << 6)	/* Enable  SEGMEXEC */
    21 +#define PF_NOSEGMEXEC	(1 << 7)	/* Disable SEGMEXEC */
    22 +#define PF_MPROTECT	(1 << 8)	/* Enable  MPROTECT */
    23 +#define PF_NOMPROTECT	(1 << 9)	/* Disable MPROTECT */
    24 +#define PF_RANDEXEC	(1 << 10)	/* Enable  RANDEXEC */
    25 +#define PF_NORANDEXEC	(1 << 11)	/* Disable RANDEXEC */
    26 +#define PF_EMUTRAMP	(1 << 12)	/* Enable  EMUTRAMP */
    27 +#define PF_NOEMUTRAMP	(1 << 13)	/* Disable EMUTRAMP */
    28 +#define PF_RANDMMAP	(1 << 14)	/* Enable  RANDMMAP */
    29 +#define PF_NORANDMMAP	(1 << 15)	/* Disable RANDMMAP */
    30  #define PF_MASKOS	0x0ff00000	/* OS-specific */
    31  #define PF_MASKPROC	0xf0000000	/* Processor-specific */
    32