patches/glibc/ports-2.10.1/350-pre20040117-pt_pax.patch
author Anthony Foiani <anthony.foiani@gmail.com>
Thu May 19 23:09:43 2011 +0200 (2011-05-19)
branch1.11
changeset 2465 5f98b7a90fbc
permissions -rw-r--r--
complibs/ppl: fix 0.11-0.11.2 to compile with --disable-shared

PPL 0.11 (through 0.11.2) had a small bug where it still tried to build
and test its Java interface even when shared libraries are disabled.
Since that's exactly what ct-ng does, it explodes.

This is the patch from the PPL authors (see final link below).

More information can be found in these messages/threads:

Anthony's initial report and analysis with Yann:
http://www.cygwin.com/ml/crossgcc/2011-05/msg00046.html

Ron Flory hit the same problem:
http://www.cygwin.com/ml/crossgcc/2011-05/msg00054.html

Anthony's report to the ppl-devel list:
http://www.cs.unipr.it/pipermail/ppl-devel/2011-May/017450.html

Roberto's reply with a link to the fix in the PPL git repo:
http://www.cs.unipr.it/pipermail/ppl-devel/2011-May/017455.html

Signed-Off-By: Anthony Foiani <anthony.foiani@gmail.com>
(transplanted from 139b85d70b623e51f7585e7c64ecb8c6a6cf4567)
yann@1625
     1
yann@1625
     2
yann@1625
     3
diff -durN glibc-2.10.1.orig/elf/elf.h glibc-2.10.1/elf/elf.h
yann@1625
     4
--- glibc-2.10.1.orig/elf/elf.h	2009-04-15 02:15:54.000000000 +0200
yann@1625
     5
+++ glibc-2.10.1/elf/elf.h	2009-11-13 00:50:35.000000000 +0100
yann@1625
     6
@@ -572,6 +572,7 @@
yann@1625
     7
 #define PT_GNU_EH_FRAME	0x6474e550	/* GCC .eh_frame_hdr segment */
yann@1625
     8
 #define PT_GNU_STACK	0x6474e551	/* Indicates stack executability */
yann@1625
     9
 #define PT_GNU_RELRO	0x6474e552	/* Read-only after relocation */
yann@1625
    10
+#define PT_PAX_FLAGS	0x65041580	/* Indicates PaX flag markings */
yann@1625
    11
 #define PT_LOSUNW	0x6ffffffa
yann@1625
    12
 #define PT_SUNWBSS	0x6ffffffa	/* Sun Specific segment */
yann@1625
    13
 #define PT_SUNWSTACK	0x6ffffffb	/* Stack segment */
yann@1625
    14
@@ -585,6 +586,18 @@
yann@1625
    15
 #define PF_X		(1 << 0)	/* Segment is executable */
yann@1625
    16
 #define PF_W		(1 << 1)	/* Segment is writable */
yann@1625
    17
 #define PF_R		(1 << 2)	/* Segment is readable */
yann@1625
    18
+#define PF_PAGEEXEC	(1 << 4)	/* Enable  PAGEEXEC */
yann@1625
    19
+#define PF_NOPAGEEXEC	(1 << 5)	/* Disable PAGEEXEC */
yann@1625
    20
+#define PF_SEGMEXEC	(1 << 6)	/* Enable  SEGMEXEC */
yann@1625
    21
+#define PF_NOSEGMEXEC	(1 << 7)	/* Disable SEGMEXEC */
yann@1625
    22
+#define PF_MPROTECT	(1 << 8)	/* Enable  MPROTECT */
yann@1625
    23
+#define PF_NOMPROTECT	(1 << 9)	/* Disable MPROTECT */
yann@1625
    24
+#define PF_RANDEXEC	(1 << 10)	/* Enable  RANDEXEC */
yann@1625
    25
+#define PF_NORANDEXEC	(1 << 11)	/* Disable RANDEXEC */
yann@1625
    26
+#define PF_EMUTRAMP	(1 << 12)	/* Enable  EMUTRAMP */
yann@1625
    27
+#define PF_NOEMUTRAMP	(1 << 13)	/* Disable EMUTRAMP */
yann@1625
    28
+#define PF_RANDMMAP	(1 << 14)	/* Enable  RANDMMAP */
yann@1625
    29
+#define PF_NORANDMMAP	(1 << 15)	/* Disable RANDMMAP */
yann@1625
    30
 #define PF_MASKOS	0x0ff00000	/* OS-specific */
yann@1625
    31
 #define PF_MASKPROC	0xf0000000	/* Processor-specific */
yann@1625
    32