patches/glibc/ports-2.10.1/350-pre20040117-pt_pax.patch
author Johannes Stezenbach <js@sig21.net>
Thu Jul 29 19:47:16 2010 +0200 (2010-07-29)
changeset 2045 fdaa6c7f6dea
permissions -rw-r--r--
cc/gcc: add option to compile against static libstdc++, for gcc-4.4 and newer

Idea and know-how taken from CodeSourcery build script.

Normal build:
$ ldd arm-unknown-linux-uclibcgnueabi-gcc
linux-gate.so.1 => (0xb77f3000)
libstdc++.so.6 => /usr/lib/libstdc++.so.6 (0xb76e8000)
libc.so.6 => /lib/i686/cmov/libc.so.6 (0xb75a1000)
libm.so.6 => /lib/i686/cmov/libm.so.6 (0xb757a000)
/lib/ld-linux.so.2 (0xb77f4000)
libgcc_s.so.1 => /lib/libgcc_s.so.1 (0xb755c000)

CC_STATIC_LIBSTDCXX=y:
$ ldd arm-unknown-linux-uclibcgnueabi-gcc
linux-gate.so.1 => (0xb7843000)
libc.so.6 => /lib/i686/cmov/libc.so.6 (0xb76e6000)
/lib/ld-linux.so.2 (0xb7844000)

I made CC_STATIC_LIBSTDCXX default=y since I think
it is always desirable.

Signed-off-by: Johannes Stezenbach <js@sig21.net>
     1 
     2 
     3 diff -durN glibc-2.10.1.orig/elf/elf.h glibc-2.10.1/elf/elf.h
     4 --- glibc-2.10.1.orig/elf/elf.h	2009-04-15 02:15:54.000000000 +0200
     5 +++ glibc-2.10.1/elf/elf.h	2009-11-13 00:50:35.000000000 +0100
     6 @@ -572,6 +572,7 @@
     7  #define PT_GNU_EH_FRAME	0x6474e550	/* GCC .eh_frame_hdr segment */
     8  #define PT_GNU_STACK	0x6474e551	/* Indicates stack executability */
     9  #define PT_GNU_RELRO	0x6474e552	/* Read-only after relocation */
    10 +#define PT_PAX_FLAGS	0x65041580	/* Indicates PaX flag markings */
    11  #define PT_LOSUNW	0x6ffffffa
    12  #define PT_SUNWBSS	0x6ffffffa	/* Sun Specific segment */
    13  #define PT_SUNWSTACK	0x6ffffffb	/* Stack segment */
    14 @@ -585,6 +586,18 @@
    15  #define PF_X		(1 << 0)	/* Segment is executable */
    16  #define PF_W		(1 << 1)	/* Segment is writable */
    17  #define PF_R		(1 << 2)	/* Segment is readable */
    18 +#define PF_PAGEEXEC	(1 << 4)	/* Enable  PAGEEXEC */
    19 +#define PF_NOPAGEEXEC	(1 << 5)	/* Disable PAGEEXEC */
    20 +#define PF_SEGMEXEC	(1 << 6)	/* Enable  SEGMEXEC */
    21 +#define PF_NOSEGMEXEC	(1 << 7)	/* Disable SEGMEXEC */
    22 +#define PF_MPROTECT	(1 << 8)	/* Enable  MPROTECT */
    23 +#define PF_NOMPROTECT	(1 << 9)	/* Disable MPROTECT */
    24 +#define PF_RANDEXEC	(1 << 10)	/* Enable  RANDEXEC */
    25 +#define PF_NORANDEXEC	(1 << 11)	/* Disable RANDEXEC */
    26 +#define PF_EMUTRAMP	(1 << 12)	/* Enable  EMUTRAMP */
    27 +#define PF_NOEMUTRAMP	(1 << 13)	/* Disable EMUTRAMP */
    28 +#define PF_RANDMMAP	(1 << 14)	/* Enable  RANDMMAP */
    29 +#define PF_NORANDMMAP	(1 << 15)	/* Disable RANDMMAP */
    30  #define PF_MASKOS	0x0ff00000	/* OS-specific */
    31  #define PF_MASKPROC	0xf0000000	/* Processor-specific */
    32