Merge commit 'ad83979e5986fa3bb0d254c2be9482c12a8743b9' from staging
This commit is contained in:
commit
145be4e340
@ -141,11 +141,12 @@ sub addPkg {
|
|||||||
my $propagatedFN = "$pkgDir/nix-support/propagated-user-env-packages";
|
my $propagatedFN = "$pkgDir/nix-support/propagated-user-env-packages";
|
||||||
if (-e $propagatedFN) {
|
if (-e $propagatedFN) {
|
||||||
open PROP, "<$propagatedFN" or die;
|
open PROP, "<$propagatedFN" or die;
|
||||||
while (my $p = <PROP>) {
|
my $propagated = <PROP>;
|
||||||
chomp $p;
|
close PROP;
|
||||||
|
my @propagated = split ' ', $propagated;
|
||||||
|
foreach my $p (@propagated) {
|
||||||
$postponed{$p} = 1 unless defined $done{$p};
|
$postponed{$p} = 1 unless defined $done{$p};
|
||||||
}
|
}
|
||||||
close PROP;
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -1,4 +1,5 @@
|
|||||||
#! @shell@ -e
|
#! @shell@ -e
|
||||||
|
shopt -s nullglob
|
||||||
path_backup="$PATH"
|
path_backup="$PATH"
|
||||||
if [ -n "@coreutils_bin@" ]; then
|
if [ -n "@coreutils_bin@" ]; then
|
||||||
PATH="@coreutils_bin@/bin"
|
PATH="@coreutils_bin@/bin"
|
||||||
@ -20,18 +21,19 @@ expandResponseParams "$@"
|
|||||||
if [ "$NIX_ENFORCE_PURITY" = 1 -a -n "$NIX_STORE" \
|
if [ "$NIX_ENFORCE_PURITY" = 1 -a -n "$NIX_STORE" \
|
||||||
-a \( -z "$NIX_IGNORE_LD_THROUGH_GCC" -o -z "$NIX_LDFLAGS_SET" \) ]; then
|
-a \( -z "$NIX_IGNORE_LD_THROUGH_GCC" -o -z "$NIX_LDFLAGS_SET" \) ]; then
|
||||||
rest=()
|
rest=()
|
||||||
n=0
|
nParams=${#params[@]}
|
||||||
while [ $n -lt ${#params[*]} ]; do
|
declare -i n=0
|
||||||
|
while [ $n -lt $nParams ]; do
|
||||||
p=${params[n]}
|
p=${params[n]}
|
||||||
p2=${params[$((n+1))]}
|
p2=${params[$((n+1))]}
|
||||||
if [ "${p:0:3}" = -L/ ] && badPath "${p:2}"; then
|
if [ "${p:0:3}" = -L/ ] && badPath "${p:2}"; then
|
||||||
skip $p
|
skip "${p:2}"
|
||||||
elif [ "$p" = -L ] && badPath "$p2"; then
|
elif [ "$p" = -L ] && badPath "$p2"; then
|
||||||
n=$((n + 1)); skip $p2
|
n+=1; skip "$p2"
|
||||||
elif [ "$p" = -rpath ] && badPath "$p2"; then
|
elif [ "$p" = -rpath ] && badPath "$p2"; then
|
||||||
n=$((n + 1)); skip $p2
|
n+=1; skip "$p2"
|
||||||
elif [ "$p" = -dynamic-linker ] && badPath "$p2"; then
|
elif [ "$p" = -dynamic-linker ] && badPath "$p2"; then
|
||||||
n=$((n + 1)); skip $p2
|
n+=1; skip "$p2"
|
||||||
elif [ "${p:0:1}" = / ] && badPath "$p"; then
|
elif [ "${p:0:1}" = / ] && badPath "$p"; then
|
||||||
# We cannot skip this; barf.
|
# We cannot skip this; barf.
|
||||||
echo "impure path \`$p' used in link" >&2
|
echo "impure path \`$p' used in link" >&2
|
||||||
@ -40,9 +42,9 @@ if [ "$NIX_ENFORCE_PURITY" = 1 -a -n "$NIX_STORE" \
|
|||||||
# Our ld is not built with sysroot support (Can we fix that?)
|
# Our ld is not built with sysroot support (Can we fix that?)
|
||||||
:
|
:
|
||||||
else
|
else
|
||||||
rest=("${rest[@]}" "$p")
|
rest+=("$p")
|
||||||
fi
|
fi
|
||||||
n=$((n + 1))
|
n+=1
|
||||||
done
|
done
|
||||||
params=("${rest[@]}")
|
params=("${rest[@]}")
|
||||||
fi
|
fi
|
||||||
@ -50,7 +52,7 @@ fi
|
|||||||
LD=@prog@
|
LD=@prog@
|
||||||
source @out@/nix-support/add-hardening.sh
|
source @out@/nix-support/add-hardening.sh
|
||||||
|
|
||||||
extra=(${hardeningLDFlags[@]})
|
extra=("${hardeningLDFlags[@]}")
|
||||||
extraBefore=()
|
extraBefore=()
|
||||||
|
|
||||||
if [ -z "$NIX_LDFLAGS_SET" ]; then
|
if [ -z "$NIX_LDFLAGS_SET" ]; then
|
||||||
@ -60,122 +62,92 @@ fi
|
|||||||
|
|
||||||
extra+=($NIX_LDFLAGS_AFTER $NIX_LDFLAGS_HARDEN)
|
extra+=($NIX_LDFLAGS_AFTER $NIX_LDFLAGS_HARDEN)
|
||||||
|
|
||||||
|
declare -a libDirs
|
||||||
|
declare -A libs
|
||||||
|
relocatable=
|
||||||
|
|
||||||
|
# Find all -L... switches for rpath, and relocatable flags for build id.
|
||||||
|
if [ "$NIX_DONT_SET_RPATH" != 1 ] || [ "$NIX_SET_BUILD_ID" = 1 ]; then
|
||||||
|
prev=
|
||||||
|
for p in "${params[@]}" "${extra[@]}"; do
|
||||||
|
case "$prev" in
|
||||||
|
-L)
|
||||||
|
libDirs+=("$p")
|
||||||
|
;;
|
||||||
|
-l)
|
||||||
|
libs["lib${p}.so"]=1
|
||||||
|
;;
|
||||||
|
-dynamic-linker | -plugin)
|
||||||
|
# Ignore this argument, or it will match *.so and be added to rpath.
|
||||||
|
;;
|
||||||
|
*)
|
||||||
|
case "$p" in
|
||||||
|
-L/*)
|
||||||
|
libDirs+=("${p:2}")
|
||||||
|
;;
|
||||||
|
-l?*)
|
||||||
|
libs["lib${p:2}.so"]=1
|
||||||
|
;;
|
||||||
|
"$NIX_STORE"/*.so | "$NIX_STORE"/*.so.*)
|
||||||
|
# This is a direct reference to a shared library.
|
||||||
|
libDirs+=("${p%/*}")
|
||||||
|
libs["${p##*/}"]=1
|
||||||
|
;;
|
||||||
|
-r | --relocatable | -i)
|
||||||
|
relocatable=1
|
||||||
|
esac
|
||||||
|
;;
|
||||||
|
esac
|
||||||
|
prev="$p"
|
||||||
|
done
|
||||||
|
fi
|
||||||
|
|
||||||
|
|
||||||
# Add all used dynamic libraries to the rpath.
|
# Add all used dynamic libraries to the rpath.
|
||||||
if [ "$NIX_DONT_SET_RPATH" != 1 ]; then
|
if [ "$NIX_DONT_SET_RPATH" != 1 ]; then
|
||||||
|
# For each directory in the library search path (-L...),
|
||||||
declare -A libDirsSeen
|
|
||||||
declare -a libDirs
|
|
||||||
|
|
||||||
addToLibPath() {
|
|
||||||
local path="$1"
|
|
||||||
if [ "${path:0:1}" != / ]; then return 0; fi
|
|
||||||
case "$path" in
|
|
||||||
*..*|*./*|*/.*|*//*)
|
|
||||||
local path2
|
|
||||||
if path2=$(readlink -f "$path"); then
|
|
||||||
path="$path2"
|
|
||||||
fi
|
|
||||||
;;
|
|
||||||
esac
|
|
||||||
if [[ -z ${libDirsSeen[$path]} ]]; then
|
|
||||||
libDirs+=("$path")
|
|
||||||
libDirsSeen[$path]=1
|
|
||||||
fi
|
|
||||||
}
|
|
||||||
|
|
||||||
declare -A rpathsSeen
|
|
||||||
declare -a rpaths
|
|
||||||
|
|
||||||
addToRPath() {
|
|
||||||
# If the path is not in the store, don't add it to the rpath.
|
|
||||||
# This typically happens for libraries in /tmp that are later
|
|
||||||
# copied to $out/lib. If not, we're screwed.
|
|
||||||
if [ "${1:0:${#NIX_STORE}}" != "$NIX_STORE" ]; then return 0; fi
|
|
||||||
if [[ -z ${rpathsSeen[$1]} ]]; then
|
|
||||||
rpaths+=("$1")
|
|
||||||
rpathsSeen[$1]=1
|
|
||||||
fi
|
|
||||||
}
|
|
||||||
|
|
||||||
declare -a libs
|
|
||||||
|
|
||||||
# First, find all -L... switches.
|
|
||||||
allParams=("${params[@]}" ${extra[@]})
|
|
||||||
n=0
|
|
||||||
while [ $n -lt ${#allParams[*]} ]; do
|
|
||||||
p=${allParams[n]}
|
|
||||||
p2=${allParams[$((n+1))]}
|
|
||||||
if [ "${p:0:3}" = -L/ ]; then
|
|
||||||
addToLibPath ${p:2}
|
|
||||||
elif [ "$p" = -L ]; then
|
|
||||||
addToLibPath ${p2}
|
|
||||||
n=$((n + 1))
|
|
||||||
elif [ "$p" = -l ]; then
|
|
||||||
libs+=(${p2})
|
|
||||||
n=$((n + 1))
|
|
||||||
elif [ "${p:0:2}" = -l ]; then
|
|
||||||
libs+=(${p:2})
|
|
||||||
elif [ "$p" = -dynamic-linker ]; then
|
|
||||||
# Ignore the dynamic linker argument, or it
|
|
||||||
# will get into the next 'elif'. We don't want
|
|
||||||
# the dynamic linker path rpath to go always first.
|
|
||||||
n=$((n + 1))
|
|
||||||
elif [[ "$p" =~ ^[^-].*\.so($|\.) ]]; then
|
|
||||||
# This is a direct reference to a shared library, so add
|
|
||||||
# its directory to the rpath.
|
|
||||||
path="$(dirname "$p")";
|
|
||||||
addToRPath "${path}"
|
|
||||||
fi
|
|
||||||
n=$((n + 1))
|
|
||||||
done
|
|
||||||
|
|
||||||
# Second, for each directory in the library search path (-L...),
|
|
||||||
# see if it contains a dynamic library used by a -l... flag. If
|
# see if it contains a dynamic library used by a -l... flag. If
|
||||||
# so, add the directory to the rpath.
|
# so, add the directory to the rpath.
|
||||||
# It's important to add the rpath in the order of -L..., so
|
# It's important to add the rpath in the order of -L..., so
|
||||||
# the link time chosen objects will be those of runtime linking.
|
# the link time chosen objects will be those of runtime linking.
|
||||||
for i in ${libDirs[@]}; do
|
declare -A rpaths
|
||||||
for j in ${libs[@]}; do
|
for dir in "${libDirs[@]}"; do
|
||||||
if [ -f "$i/lib$j.so" ]; then
|
if [[ "$dir" =~ [/.][/.] ]] && dir2=$(readlink -f "$dir"); then
|
||||||
addToRPath $i
|
dir="$dir2"
|
||||||
break
|
fi
|
||||||
|
if [ "${rpaths[$dir]}" ] || [[ "$dir" != "$NIX_STORE"/* ]]; then
|
||||||
|
# If the path is not in the store, don't add it to the rpath.
|
||||||
|
# This typically happens for libraries in /tmp that are later
|
||||||
|
# copied to $out/lib. If not, we're screwed.
|
||||||
|
continue
|
||||||
|
fi
|
||||||
|
for path in "$dir"/lib*.so; do
|
||||||
|
file="${path##*/}"
|
||||||
|
if [ "${libs[$file]}" ]; then
|
||||||
|
libs["$file"]=
|
||||||
|
if [ ! "${rpaths[$dir]}" ]; then
|
||||||
|
rpaths["$dir"]=1
|
||||||
|
extra+=(-rpath "$dir")
|
||||||
|
fi
|
||||||
fi
|
fi
|
||||||
done
|
done
|
||||||
done
|
done
|
||||||
|
|
||||||
# Finally, add `-rpath' switches.
|
|
||||||
for i in ${rpaths[@]}; do
|
|
||||||
extra+=(-rpath "$i")
|
|
||||||
done
|
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
|
||||||
# Only add --build-id if this is a final link. FIXME: should build gcc
|
# Only add --build-id if this is a final link. FIXME: should build gcc
|
||||||
# with --enable-linker-build-id instead?
|
# with --enable-linker-build-id instead?
|
||||||
if [ "$NIX_SET_BUILD_ID" = 1 ]; then
|
if [ "$NIX_SET_BUILD_ID" = 1 ] && [ ! "$relocatable" ]; then
|
||||||
for p in "${params[@]}"; do
|
extra+=(--build-id)
|
||||||
if [ "$p" = "-r" -o "$p" = "--relocatable" -o "$p" = "-i" ]; then
|
|
||||||
relocatable=1
|
|
||||||
break
|
|
||||||
fi
|
|
||||||
done
|
|
||||||
if [ -z "$relocatable" ]; then
|
|
||||||
extra+=(--build-id)
|
|
||||||
fi
|
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
|
||||||
# Optionally print debug info.
|
# Optionally print debug info.
|
||||||
if [ -n "$NIX_DEBUG" ]; then
|
if [ -n "$NIX_DEBUG" ]; then
|
||||||
echo "original flags to @prog@:" >&2
|
echo "original flags to @prog@:" >&2
|
||||||
for i in "${params[@]}"; do
|
printf " %q\n" "${params[@]}" >&2
|
||||||
echo " $i" >&2
|
echo "extra flags to @prog@:" >&2
|
||||||
done
|
printf " %q\n" "${extraBefore[@]}" "${extra[@]}" >&2
|
||||||
echo "extra flags to @prog@:" >&2
|
|
||||||
for i in ${extra[@]}; do
|
|
||||||
echo " $i" >&2
|
|
||||||
done
|
|
||||||
fi
|
fi
|
||||||
|
|
||||||
if [ -n "$NIX_LD_WRAPPER_EXEC_HOOK" ]; then
|
if [ -n "$NIX_LD_WRAPPER_EXEC_HOOK" ]; then
|
||||||
@ -183,4 +155,4 @@ if [ -n "$NIX_LD_WRAPPER_EXEC_HOOK" ]; then
|
|||||||
fi
|
fi
|
||||||
|
|
||||||
PATH="$path_backup"
|
PATH="$path_backup"
|
||||||
exec @prog@ ${extraBefore[@]} "${params[@]}" ${extra[@]}
|
exec @prog@ "${extraBefore[@]}" "${params[@]}" "${extra[@]}"
|
||||||
|
@ -5,10 +5,11 @@ let mirrors = import ./mirrors.nix; in
|
|||||||
{ url ? builtins.head urls
|
{ url ? builtins.head urls
|
||||||
, urls ? []
|
, urls ? []
|
||||||
, sha256
|
, sha256
|
||||||
|
, name ? baseNameOf (toString url)
|
||||||
}:
|
}:
|
||||||
|
|
||||||
import <nix/fetchurl.nix> {
|
import <nix/fetchurl.nix> {
|
||||||
inherit system sha256;
|
inherit system sha256 name;
|
||||||
|
|
||||||
url =
|
url =
|
||||||
# Handle mirror:// URIs. Since <nix/fetchurl.nix> currently
|
# Handle mirror:// URIs. Since <nix/fetchurl.nix> currently
|
||||||
|
@ -26,6 +26,7 @@ rec {
|
|||||||
, text
|
, text
|
||||||
, executable ? false # run chmod +x ?
|
, executable ? false # run chmod +x ?
|
||||||
, destination ? "" # relative path appended to $out eg "/bin/foo"
|
, destination ? "" # relative path appended to $out eg "/bin/foo"
|
||||||
|
, checkPhase ? "" # syntax checks, e.g. for scripts
|
||||||
}:
|
}:
|
||||||
runCommand name
|
runCommand name
|
||||||
{ inherit text executable;
|
{ inherit text executable;
|
||||||
@ -44,6 +45,8 @@ rec {
|
|||||||
echo -n "$text" > "$n"
|
echo -n "$text" > "$n"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
${checkPhase}
|
||||||
|
|
||||||
(test -n "$executable" && chmod +x "$n") || true
|
(test -n "$executable" && chmod +x "$n") || true
|
||||||
'';
|
'';
|
||||||
|
|
||||||
@ -54,6 +57,20 @@ rec {
|
|||||||
writeScript = name: text: writeTextFile {inherit name text; executable = true;};
|
writeScript = name: text: writeTextFile {inherit name text; executable = true;};
|
||||||
writeScriptBin = name: text: writeTextFile {inherit name text; executable = true; destination = "/bin/${name}";};
|
writeScriptBin = name: text: writeTextFile {inherit name text; executable = true; destination = "/bin/${name}";};
|
||||||
|
|
||||||
|
# Create a Shell script, check its syntax
|
||||||
|
writeShellScriptBin = name : text :
|
||||||
|
writeTextFile {
|
||||||
|
inherit name;
|
||||||
|
executable = true;
|
||||||
|
destination = "/bin/${name}";
|
||||||
|
text = ''
|
||||||
|
#!${stdenv.shell}
|
||||||
|
${text}
|
||||||
|
'';
|
||||||
|
checkPhase = ''
|
||||||
|
${stdenv.shell} -n $out
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
# Create a forest of symlinks to the files in `paths'.
|
# Create a forest of symlinks to the files in `paths'.
|
||||||
symlinkJoin =
|
symlinkJoin =
|
||||||
|
@ -66,7 +66,9 @@ wrapPythonProgramsIn() {
|
|||||||
# above. The script will set PYTHONPATH and PATH variables.!
|
# above. The script will set PYTHONPATH and PATH variables.!
|
||||||
# (see pkgs/build-support/setup-hooks/make-wrapper.sh)
|
# (see pkgs/build-support/setup-hooks/make-wrapper.sh)
|
||||||
local -a wrap_args=("$f"
|
local -a wrap_args=("$f"
|
||||||
--prefix PATH ':' "$program_PATH")
|
--prefix PATH ':' "$program_PATH"
|
||||||
|
--set PYTHONNOUSERSITE "true"
|
||||||
|
)
|
||||||
|
|
||||||
# Add any additional arguments provided by makeWrapperArgs
|
# Add any additional arguments provided by makeWrapperArgs
|
||||||
# argument to buildPythonPackage.
|
# argument to buildPythonPackage.
|
||||||
|
@ -6,8 +6,7 @@
|
|||||||
# Create a python executable that knows about additional packages.
|
# Create a python executable that knows about additional packages.
|
||||||
let
|
let
|
||||||
recursivePthLoader = import ../../python-modules/recursive-pth-loader/default.nix { stdenv = stdenv; python = python; };
|
recursivePthLoader = import ../../python-modules/recursive-pth-loader/default.nix { stdenv = stdenv; python = python; };
|
||||||
env = (
|
env = let
|
||||||
let
|
|
||||||
paths = stdenv.lib.closePropagation (extraLibs ++ [ python recursivePthLoader ] ) ;
|
paths = stdenv.lib.closePropagation (extraLibs ++ [ python recursivePthLoader ] ) ;
|
||||||
in buildEnv {
|
in buildEnv {
|
||||||
name = "${python.name}-env";
|
name = "${python.name}-env";
|
||||||
@ -29,26 +28,29 @@ let
|
|||||||
for prg in *; do
|
for prg in *; do
|
||||||
if [ -f "$prg" ]; then
|
if [ -f "$prg" ]; then
|
||||||
rm -f "$out/bin/$prg"
|
rm -f "$out/bin/$prg"
|
||||||
makeWrapper "$path/bin/$prg" "$out/bin/$prg" --set PYTHONHOME "$out"
|
makeWrapper "$path/bin/$prg" "$out/bin/$prg" --set PYTHONHOME "$out" --set PYTHONNOUSERSITE "true"
|
||||||
fi
|
fi
|
||||||
done
|
done
|
||||||
fi
|
fi
|
||||||
done
|
done
|
||||||
'' + postBuild;
|
'' + postBuild;
|
||||||
|
|
||||||
passthru.env = stdenv.mkDerivation {
|
|
||||||
name = "interactive-${python.name}-environment";
|
|
||||||
nativeBuildInputs = [ env ];
|
|
||||||
|
|
||||||
buildCommand = ''
|
|
||||||
echo >&2 ""
|
|
||||||
echo >&2 "*** Python 'env' attributes are intended for interactive nix-shell sessions, not for building! ***"
|
|
||||||
echo >&2 ""
|
|
||||||
exit 1
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
}) // {
|
|
||||||
inherit python;
|
|
||||||
inherit (python) meta;
|
inherit (python) meta;
|
||||||
|
|
||||||
|
passthru = python.passthru // {
|
||||||
|
interpreter = "${env}/bin/${python.executable}";
|
||||||
|
inherit python;
|
||||||
|
env = stdenv.mkDerivation {
|
||||||
|
name = "interactive-${python.name}-environment";
|
||||||
|
nativeBuildInputs = [ env ];
|
||||||
|
|
||||||
|
buildCommand = ''
|
||||||
|
echo >&2 ""
|
||||||
|
echo >&2 "*** Python 'env' attributes are intended for interactive nix-shell sessions, not for building! ***"
|
||||||
|
echo >&2 ""
|
||||||
|
exit 1
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
};
|
||||||
};
|
};
|
||||||
in env
|
in env
|
||||||
|
@ -8,11 +8,11 @@ assert qt4Support -> qt4 != null;
|
|||||||
|
|
||||||
stdenv.mkDerivation rec {
|
stdenv.mkDerivation rec {
|
||||||
name = "avahi-${version}";
|
name = "avahi-${version}";
|
||||||
version = "0.6.32";
|
version = "0.7";
|
||||||
|
|
||||||
src = fetchurl {
|
src = fetchurl {
|
||||||
url = "https://github.com/lathiat/avahi/releases/download/v${version}/avahi-${version}.tar.gz";
|
url = "https://github.com/lathiat/avahi/releases/download/v${version}/avahi-${version}.tar.gz";
|
||||||
sha256 = "0m5l3ny9i2z1l27y4wm731c0zdkmfn6l1szbajx0ljjiblc92jfm";
|
sha256 = "0128n7jlshw4bpx0vg8lwj8qwdisjxi7mvniwfafgnkzzrfrpaap";
|
||||||
};
|
};
|
||||||
|
|
||||||
patches = [ ./no-mkdir-localstatedir.patch ];
|
patches = [ ./no-mkdir-localstatedir.patch ];
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
Don't "mkdir $(localstatedir)" since we can't do it (/var).
|
Don't "mkdir $(localstatedir)" since we can't do it (/var).
|
||||||
|
|
||||||
--- avahi-0.6.27/avahi-daemon/Makefile.in 2010-07-13 05:06:35.000000000 +0200
|
--- a/avahi-daemon/Makefile.in
|
||||||
+++ avahi-0.6.27/avahi-daemon/Makefile.in 2010-07-13 18:03:45.000000000 +0200
|
+++ b/avahi-daemon/Makefile.in
|
||||||
@@ -1554,7 +1554,6 @@ xmllint:
|
@@ -1625,7 +1625,6 @@ xmllint:
|
||||||
done
|
done
|
||||||
|
|
||||||
install-data-local:
|
install-data-local:
|
||||||
- test -z "$(localstatedir)/run" || $(MKDIR_P) "$(DESTDIR)$(localstatedir)/run"
|
- test -z "$(avahi_runtime_dir)" || $(MKDIR_P) "$(DESTDIR)$(avahi_runtime_dir)"
|
||||||
|
|
||||||
update-systemd:
|
update-systemd:
|
||||||
curl http://cgit.freedesktop.org/systemd/plain/src/sd-daemon.c > sd-daemon.c
|
curl http://cgit.freedesktop.org/systemd/plain/src/sd-daemon.c > sd-daemon.c
|
||||||
|
@ -0,0 +1,65 @@
|
|||||||
|
From 0edeadc0d396aa713b808ae50a0058aca5d3837e Mon Sep 17 00:00:00 2001
|
||||||
|
From: "H.J. Lu" <hjl.tools@gmail.com>
|
||||||
|
Date: Wed, 26 Jul 2017 10:08:46 -0700
|
||||||
|
Subject: [PATCH] Avoid .symver on common symbols [BZ #21666]
|
||||||
|
|
||||||
|
The .symver directive on common symbol just creates a new common symbol,
|
||||||
|
not an alias and the newer assembler with the bug fix for
|
||||||
|
|
||||||
|
https://sourceware.org/bugzilla/show_bug.cgi?id=21661
|
||||||
|
|
||||||
|
will issue an error. Before the fix, we got
|
||||||
|
|
||||||
|
$ readelf -sW libc.so | grep "loc[12s]"
|
||||||
|
5109: 00000000003a0608 8 OBJECT LOCAL DEFAULT 36 loc1
|
||||||
|
5188: 00000000003a0610 8 OBJECT LOCAL DEFAULT 36 loc2
|
||||||
|
5455: 00000000003a0618 8 OBJECT LOCAL DEFAULT 36 locs
|
||||||
|
6575: 00000000003a05f0 8 OBJECT GLOBAL DEFAULT 36 locs@GLIBC_2.2.5
|
||||||
|
7156: 00000000003a05f8 8 OBJECT GLOBAL DEFAULT 36 loc1@GLIBC_2.2.5
|
||||||
|
7312: 00000000003a0600 8 OBJECT GLOBAL DEFAULT 36 loc2@GLIBC_2.2.5
|
||||||
|
|
||||||
|
in libc.so. The versioned loc1, loc2 and locs have the wrong addresses.
|
||||||
|
After the fix, we got
|
||||||
|
|
||||||
|
$ readelf -sW libc.so | grep "loc[12s]"
|
||||||
|
6570: 000000000039e3b8 8 OBJECT GLOBAL DEFAULT 34 locs@GLIBC_2.2.5
|
||||||
|
7151: 000000000039e3c8 8 OBJECT GLOBAL DEFAULT 34 loc1@GLIBC_2.2.5
|
||||||
|
7307: 000000000039e3c0 8 OBJECT GLOBAL DEFAULT 34 loc2@GLIBC_2.2.5
|
||||||
|
|
||||||
|
[BZ #21666]
|
||||||
|
* misc/regexp.c (loc1): Add __attribute__ ((nocommon));
|
||||||
|
(loc2): Likewise.
|
||||||
|
(locs): Likewise.
|
||||||
|
|
||||||
|
(cherry picked from commit 388b4f1a02f3a801965028bbfcd48d905638b797)
|
||||||
|
---
|
||||||
|
ChangeLog | 7 +++++++
|
||||||
|
misc/regexp.c | 9 +++++----
|
||||||
|
2 files changed, 12 insertions(+), 4 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/misc/regexp.c b/misc/regexp.c
|
||||||
|
index 19d76c0..eaea7c3 100644
|
||||||
|
--- a/misc/regexp.c
|
||||||
|
+++ b/misc/regexp.c
|
||||||
|
@@ -29,14 +29,15 @@
|
||||||
|
|
||||||
|
#if SHLIB_COMPAT (libc, GLIBC_2_0, GLIBC_2_23)
|
||||||
|
|
||||||
|
-/* Define the variables used for the interface. */
|
||||||
|
-char *loc1;
|
||||||
|
-char *loc2;
|
||||||
|
+/* Define the variables used for the interface. Avoid .symver on common
|
||||||
|
+ symbol, which just creates a new common symbol, not an alias. */
|
||||||
|
+char *loc1 __attribute__ ((nocommon));
|
||||||
|
+char *loc2 __attribute__ ((nocommon));
|
||||||
|
compat_symbol (libc, loc1, loc1, GLIBC_2_0);
|
||||||
|
compat_symbol (libc, loc2, loc2, GLIBC_2_0);
|
||||||
|
|
||||||
|
/* Although we do not support the use we define this variable as well. */
|
||||||
|
-char *locs;
|
||||||
|
+char *locs __attribute__ ((nocommon));
|
||||||
|
compat_symbol (libc, locs, locs, GLIBC_2_0);
|
||||||
|
|
||||||
|
|
||||||
|
--
|
||||||
|
2.9.3
|
@ -64,6 +64,9 @@ stdenv.mkDerivation ({
|
|||||||
./CVE-2017-1000366-rtld-LD_LIBRARY_PATH.patch
|
./CVE-2017-1000366-rtld-LD_LIBRARY_PATH.patch
|
||||||
./CVE-2017-1000366-rtld-LD_PRELOAD.patch
|
./CVE-2017-1000366-rtld-LD_PRELOAD.patch
|
||||||
./CVE-2017-1000366-rtld-LD_AUDIT.patch
|
./CVE-2017-1000366-rtld-LD_AUDIT.patch
|
||||||
|
|
||||||
|
/* https://sourceware.org/bugzilla/show_bug.cgi?id=21666 */
|
||||||
|
./avoid-semver-on-common.patch
|
||||||
]
|
]
|
||||||
++ lib.optionals stdenv.isi686 [
|
++ lib.optionals stdenv.isi686 [
|
||||||
./fix-i686-memchr.patch
|
./fix-i686-memchr.patch
|
||||||
|
@ -1,18 +1,18 @@
|
|||||||
{ stdenv, fetchurl, perl, texinfo }:
|
{ stdenv, fetchurl, perl, texinfo }:
|
||||||
|
|
||||||
stdenv.mkDerivation rec {
|
stdenv.mkDerivation rec {
|
||||||
name = "libtasn1-4.10";
|
name = "libtasn1-4.12";
|
||||||
|
|
||||||
src = fetchurl {
|
src = fetchurl {
|
||||||
url = "mirror://gnu/libtasn1/${name}.tar.gz";
|
url = "mirror://gnu/libtasn1/${name}.tar.gz";
|
||||||
sha256 = "00jsix5hny0g768zv4hk78dib7w0qmk5fbizf4jj37r51nd4s6k8";
|
sha256 = "0ls7jdq3y5fnrwg0pzhq11m21r8pshac2705bczz6mqjc8pdllv7";
|
||||||
};
|
};
|
||||||
|
|
||||||
patches = [
|
patches = [
|
||||||
(fetchurl {
|
(fetchurl {
|
||||||
name = "CVE-2017-6891.patch";
|
name = "CVE-2017-9310.patch";
|
||||||
url = "https://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=patch;h=5520704d075802df25ce4ffccc010ba1641bd484";
|
url = "https://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=patch;h=d8d805e1f2e6799bb2dff4871a8598dc83088a39";
|
||||||
sha256 = "000r6wb87zkx8yhzkf1c3h7p5akwhjw51cv8f1yjnplrqqrr7h2k";
|
sha256 = "1v5w0dazp9qc2v7pc8b6g7s4dz5ak10hzrn35hx66q76yzrrzp7i";
|
||||||
})
|
})
|
||||||
];
|
];
|
||||||
|
|
||||||
|
@ -1,22 +1,32 @@
|
|||||||
{ stdenv, fetchurl, libiconv, pkgconfig, libffi, libtasn1 }:
|
{ stdenv, fetchFromGitHub, autoreconfHook, which, pkgconfig, libiconv
|
||||||
|
, libffi, libtasn1, gtk_doc, libxslt, docbook_xsl }:
|
||||||
|
|
||||||
stdenv.mkDerivation rec {
|
stdenv.mkDerivation rec {
|
||||||
name = "p11-kit-0.23.2";
|
name = "p11-kit-${version}";
|
||||||
|
version = "0.23.7";
|
||||||
|
|
||||||
src = fetchurl {
|
src = fetchFromGitHub {
|
||||||
url = "${meta.homepage}releases/${name}.tar.gz";
|
owner = "p11-glue";
|
||||||
sha256 = "1w7szm190phlkg7qx05ychlj2dbvkgkhx9gw6dx4d5rw62l6wwms";
|
repo = "p11-kit";
|
||||||
|
rev = version;
|
||||||
|
sha256 = "1l8sg0g74k2mk0y6vz19hc103dzizxa0h579gdhvxifckglb01hy";
|
||||||
};
|
};
|
||||||
|
|
||||||
outputs = [ "out" "dev" "devdoc" ];
|
outputs = [ "out" "dev" "devdoc" ];
|
||||||
outputBin = "dev";
|
outputBin = "dev";
|
||||||
|
|
||||||
buildInputs = [ pkgconfig libffi libtasn1 libiconv ];
|
nativeBuildInputs = [ autoreconfHook which pkgconfig gtk_doc libxslt docbook_xsl ];
|
||||||
|
buildInputs = [ libffi libtasn1 libiconv ];
|
||||||
|
|
||||||
|
autoreconfPhase = ''
|
||||||
|
NOCONFIGURE=1 ./autogen.sh
|
||||||
|
'';
|
||||||
|
|
||||||
configureFlags = [
|
configureFlags = [
|
||||||
"--sysconfdir=/etc"
|
"--sysconfdir=/etc"
|
||||||
"--localstatedir=/var"
|
"--localstatedir=/var"
|
||||||
"--without-trust-paths"
|
"--without-trust-paths"
|
||||||
|
"--enable-doc"
|
||||||
];
|
];
|
||||||
|
|
||||||
installFlags = [ "exampledir=\${out}/etc/pkcs11" ];
|
installFlags = [ "exampledir=\${out}/etc/pkcs11" ];
|
||||||
|
@ -5,7 +5,7 @@
|
|||||||
}:
|
}:
|
||||||
|
|
||||||
let
|
let
|
||||||
version = "2.28";
|
version = "2.29";
|
||||||
basename = "binutils-${version}";
|
basename = "binutils-${version}";
|
||||||
inherit (stdenv.lib) optional optionals optionalString;
|
inherit (stdenv.lib) optional optionals optionalString;
|
||||||
# The prefix prepended to binary names to allow multiple binuntils on the
|
# The prefix prepended to binary names to allow multiple binuntils on the
|
||||||
@ -18,7 +18,7 @@ stdenv.mkDerivation rec {
|
|||||||
|
|
||||||
src = fetchurl {
|
src = fetchurl {
|
||||||
url = "mirror://gnu/binutils/${basename}.tar.bz2";
|
url = "mirror://gnu/binutils/${basename}.tar.bz2";
|
||||||
sha256 = "0wiasgns7i8km8nrxas265sh2dfpsw93b3qw195ipc90w4z475v2";
|
sha256 = "1gqfyksdnj3iir5gzyvlp785mnk60g1pll6zbzbslfchhr4rb8i9";
|
||||||
};
|
};
|
||||||
|
|
||||||
patches = [
|
patches = [
|
||||||
@ -45,6 +45,15 @@ stdenv.mkDerivation rec {
|
|||||||
# there) and causes a cycle between the lib and bin outputs, so
|
# there) and causes a cycle between the lib and bin outputs, so
|
||||||
# get rid of it.
|
# get rid of it.
|
||||||
./no-plugins.patch
|
./no-plugins.patch
|
||||||
|
|
||||||
|
# remove after 2.29.1/2.30
|
||||||
|
(fetchurl {
|
||||||
|
url = "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;a=patch;h=c6b78c965a96fb152fbd58926edccb5dee2707a5";
|
||||||
|
sha256 = "0rkbq5pf7ffgcggfk4czkxin1091bqjj92an9wxnqkgqwq6cx5yr";
|
||||||
|
name = "readelf-empty-sections.patch";
|
||||||
|
})
|
||||||
|
./elf-check-orphan-input.patch
|
||||||
|
./elf-check-orphan-placement.patch
|
||||||
];
|
];
|
||||||
|
|
||||||
# TODO: all outputs on all platform
|
# TODO: all outputs on all platform
|
||||||
|
@ -0,0 +1,99 @@
|
|||||||
|
From a388b7afeffad6411686d39dc1c62294da48a814 Mon Sep 17 00:00:00 2001
|
||||||
|
From: "H.J. Lu" <hjl.tools@gmail.com>
|
||||||
|
Date: Wed, 2 Aug 2017 05:10:29 -0700
|
||||||
|
Subject: [PATCH] Check ELF section header only for ELF output
|
||||||
|
|
||||||
|
When placing an orphan input section, check ELF section header only for
|
||||||
|
ELF output.
|
||||||
|
|
||||||
|
PR ld/21884
|
||||||
|
* emultempl/elf32.em (gld${EMULATION_NAME}_place_orphan): Check
|
||||||
|
ELF section header only for ELF output.
|
||||||
|
* testsuite/ld-elf/pr21884.d: New test.
|
||||||
|
* testsuite/ld-elf/pr21884.t: Likewise.
|
||||||
|
* testsuite/ld-elf/pr21884a.s: Likewise.
|
||||||
|
* testsuite/ld-elf/pr21884b.s: Likewise.
|
||||||
|
|
||||||
|
(cherry picked from commit db99ecc08f5b66fbe9cb72e90352c7f77ec71a6e)
|
||||||
|
---
|
||||||
|
ld/ChangeLog | 10 ++++++++++
|
||||||
|
ld/emultempl/elf32.em | 3 ++-
|
||||||
|
ld/testsuite/ld-elf/pr21884.d | 11 +++++++++++
|
||||||
|
ld/testsuite/ld-elf/pr21884.t | 7 +++++++
|
||||||
|
ld/testsuite/ld-elf/pr21884a.s | 5 +++++
|
||||||
|
ld/testsuite/ld-elf/pr21884b.s | 5 +++++
|
||||||
|
6 files changed, 40 insertions(+), 1 deletion(-)
|
||||||
|
create mode 100644 ld/testsuite/ld-elf/pr21884.d
|
||||||
|
create mode 100644 ld/testsuite/ld-elf/pr21884.t
|
||||||
|
create mode 100644 ld/testsuite/ld-elf/pr21884a.s
|
||||||
|
create mode 100644 ld/testsuite/ld-elf/pr21884b.s
|
||||||
|
|
||||||
|
diff --git a/ld/emultempl/elf32.em b/ld/emultempl/elf32.em
|
||||||
|
index d2551b6..75ded12 100644
|
||||||
|
--- a/ld/emultempl/elf32.em
|
||||||
|
+++ b/ld/emultempl/elf32.em
|
||||||
|
@@ -2136,7 +2136,8 @@ gld${EMULATION_NAME}_place_orphan (asection *s,
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Look through the script to see where to place this section. */
|
||||||
|
- if (constraint == 0)
|
||||||
|
+ if (constraint == 0
|
||||||
|
+ && link_info.output_bfd->xvec->flavour == bfd_target_elf_flavour)
|
||||||
|
for (os = lang_output_section_find (secname);
|
||||||
|
os != NULL;
|
||||||
|
os = next_matching_output_section_statement (os, 0))
|
||||||
|
diff --git a/ld/testsuite/ld-elf/pr21884.d b/ld/testsuite/ld-elf/pr21884.d
|
||||||
|
new file mode 100644
|
||||||
|
index 0000000..52cd2c1
|
||||||
|
--- /dev/null
|
||||||
|
+++ b/ld/testsuite/ld-elf/pr21884.d
|
||||||
|
@@ -0,0 +1,11 @@
|
||||||
|
+#source: pr21884a.s
|
||||||
|
+#source: pr21884b.s
|
||||||
|
+#ld: -T pr21884.t
|
||||||
|
+#objdump: -b binary -s
|
||||||
|
+#notarget: aarch64*-*-* arm*-*-* nds32*-*-*
|
||||||
|
+# Skip targets which can't change output format to binary.
|
||||||
|
+
|
||||||
|
+.*: file format binary
|
||||||
|
+
|
||||||
|
+Contents of section .data:
|
||||||
|
+#pass
|
||||||
|
diff --git a/ld/testsuite/ld-elf/pr21884.t b/ld/testsuite/ld-elf/pr21884.t
|
||||||
|
new file mode 100644
|
||||||
|
index 0000000..d483911
|
||||||
|
--- /dev/null
|
||||||
|
+++ b/ld/testsuite/ld-elf/pr21884.t
|
||||||
|
@@ -0,0 +1,7 @@
|
||||||
|
+OUTPUT_FORMAT("binary")
|
||||||
|
+
|
||||||
|
+ENTRY(_main);
|
||||||
|
+SECTIONS {
|
||||||
|
+ . = 0;
|
||||||
|
+ .setup : { *(.setup) }
|
||||||
|
+}
|
||||||
|
diff --git a/ld/testsuite/ld-elf/pr21884a.s b/ld/testsuite/ld-elf/pr21884a.s
|
||||||
|
new file mode 100644
|
||||||
|
index 0000000..a3361b2
|
||||||
|
--- /dev/null
|
||||||
|
+++ b/ld/testsuite/ld-elf/pr21884a.s
|
||||||
|
@@ -0,0 +1,5 @@
|
||||||
|
+ .text
|
||||||
|
+ .globl _main
|
||||||
|
+ .type _main,%function
|
||||||
|
+_main:
|
||||||
|
+ .dc.a bar
|
||||||
|
diff --git a/ld/testsuite/ld-elf/pr21884b.s b/ld/testsuite/ld-elf/pr21884b.s
|
||||||
|
new file mode 100644
|
||||||
|
index 0000000..e533837
|
||||||
|
--- /dev/null
|
||||||
|
+++ b/ld/testsuite/ld-elf/pr21884b.s
|
||||||
|
@@ -0,0 +1,5 @@
|
||||||
|
+ .text
|
||||||
|
+ .globl bar
|
||||||
|
+ .type bar,%function
|
||||||
|
+bar:
|
||||||
|
+ .byte 0
|
||||||
|
--
|
||||||
|
2.9.3
|
||||||
|
|
@ -0,0 +1,161 @@
|
|||||||
|
From 36088682f447540fd8666a2c437fa232064044a7 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Alan Modra <amodra@gmail.com>
|
||||||
|
Date: Thu, 3 Aug 2017 14:01:34 +0930
|
||||||
|
Subject: [PATCH] ELF checks for orphan placement
|
||||||
|
|
||||||
|
The loop checking for previous orphan placement should run even when
|
||||||
|
the output is non-ELF.
|
||||||
|
|
||||||
|
PR ld/21884
|
||||||
|
* emultempl/elf32.em (gld${EMULATION_NAME}_place_orphan): Revert
|
||||||
|
last change. Rename iself to elfinput. Expand comments. Condition
|
||||||
|
ELF checks on having both input and output ELF files. Extract..
|
||||||
|
(elf_orphan_compatible): ..this new function.
|
||||||
|
---
|
||||||
|
ld/ChangeLog | 8 ++++++
|
||||||
|
ld/emultempl/elf32.em | 76 +++++++++++++++++++++++++++++++--------------------
|
||||||
|
2 files changed, 55 insertions(+), 29 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/ld/emultempl/elf32.em b/ld/emultempl/elf32.em
|
||||||
|
index 75ded12..9ac1840 100644
|
||||||
|
--- a/ld/emultempl/elf32.em
|
||||||
|
+++ b/ld/emultempl/elf32.em
|
||||||
|
@@ -2008,6 +2008,29 @@ output_rel_find (asection *sec, int isdyn)
|
||||||
|
return last;
|
||||||
|
}
|
||||||
|
|
||||||
|
+/* Return whether IN is suitable to be part of OUT. */
|
||||||
|
+
|
||||||
|
+static bfd_boolean
|
||||||
|
+elf_orphan_compatible (asection *in, asection *out)
|
||||||
|
+{
|
||||||
|
+ /* Non-zero sh_info implies a section with SHF_INFO_LINK with
|
||||||
|
+ unknown semantics for the generic linker, or a SHT_REL/SHT_RELA
|
||||||
|
+ section where sh_info specifies a symbol table. (We won't see
|
||||||
|
+ SHT_GROUP, SHT_SYMTAB or SHT_DYNSYM sections here.) We clearly
|
||||||
|
+ can't merge SHT_REL/SHT_RELA using differing symbol tables, and
|
||||||
|
+ shouldn't merge sections with differing unknown semantics. */
|
||||||
|
+ if (elf_section_data (out)->this_hdr.sh_info
|
||||||
|
+ != elf_section_data (in)->this_hdr.sh_info)
|
||||||
|
+ return FALSE;
|
||||||
|
+ /* We can't merge two sections with differing SHF_EXCLUDE when doing
|
||||||
|
+ a relocatable link. */
|
||||||
|
+ if (bfd_link_relocatable (&link_info)
|
||||||
|
+ && ((elf_section_flags (out) ^ elf_section_flags (in)) & SHF_EXCLUDE) != 0)
|
||||||
|
+ return FALSE;
|
||||||
|
+ return _bfd_elf_match_sections_by_type (link_info.output_bfd, out,
|
||||||
|
+ in->owner, in);
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
/* Place an orphan section. We use this to put random SHF_ALLOC
|
||||||
|
sections in the right segment. */
|
||||||
|
|
||||||
|
@@ -2064,8 +2087,9 @@ gld${EMULATION_NAME}_place_orphan (asection *s,
|
||||||
|
lang_output_section_statement_type *os;
|
||||||
|
lang_output_section_statement_type *match_by_name = NULL;
|
||||||
|
int isdyn = 0;
|
||||||
|
- int iself = s->owner->xvec->flavour == bfd_target_elf_flavour;
|
||||||
|
- unsigned int sh_type = iself ? elf_section_type (s) : SHT_NULL;
|
||||||
|
+ int elfinput = s->owner->xvec->flavour == bfd_target_elf_flavour;
|
||||||
|
+ int elfoutput = link_info.output_bfd->xvec->flavour == bfd_target_elf_flavour;
|
||||||
|
+ unsigned int sh_type = elfinput ? elf_section_type (s) : SHT_NULL;
|
||||||
|
flagword flags;
|
||||||
|
asection *nexts;
|
||||||
|
|
||||||
|
@@ -2073,7 +2097,7 @@ gld${EMULATION_NAME}_place_orphan (asection *s,
|
||||||
|
&& link_info.combreloc
|
||||||
|
&& (s->flags & SEC_ALLOC))
|
||||||
|
{
|
||||||
|
- if (iself)
|
||||||
|
+ if (elfinput)
|
||||||
|
switch (sh_type)
|
||||||
|
{
|
||||||
|
case SHT_RELA:
|
||||||
|
@@ -2095,6 +2119,8 @@ gld${EMULATION_NAME}_place_orphan (asection *s,
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!bfd_link_relocatable (&link_info)
|
||||||
|
+ && elfinput
|
||||||
|
+ && elfoutput
|
||||||
|
&& (s->flags & SEC_ALLOC) != 0
|
||||||
|
&& (elf_section_flags (s) & SHF_GNU_MBIND) != 0)
|
||||||
|
{
|
||||||
|
@@ -2135,9 +2161,11 @@ gld${EMULATION_NAME}_place_orphan (asection *s,
|
||||||
|
secname = ".mbind.text";
|
||||||
|
}
|
||||||
|
|
||||||
|
- /* Look through the script to see where to place this section. */
|
||||||
|
- if (constraint == 0
|
||||||
|
- && link_info.output_bfd->xvec->flavour == bfd_target_elf_flavour)
|
||||||
|
+ /* Look through the script to see where to place this section. The
|
||||||
|
+ script includes entries added by previous lang_insert_orphan
|
||||||
|
+ calls, so this loop puts multiple compatible orphans of the same
|
||||||
|
+ name into a single output section. */
|
||||||
|
+ if (constraint == 0)
|
||||||
|
for (os = lang_output_section_find (secname);
|
||||||
|
os != NULL;
|
||||||
|
os = next_matching_output_section_statement (os, 0))
|
||||||
|
@@ -2146,29 +2174,19 @@ gld${EMULATION_NAME}_place_orphan (asection *s,
|
||||||
|
lang_insert_orphan to create a new output section. */
|
||||||
|
constraint = SPECIAL;
|
||||||
|
|
||||||
|
- /* SEC_EXCLUDE is cleared when doing a relocatable link. But
|
||||||
|
- we can't merge 2 input sections with the same name when only
|
||||||
|
- one of them has SHF_EXCLUDE. Don't merge 2 sections with
|
||||||
|
- different sh_info. */
|
||||||
|
+ /* Check to see if we already have an output section statement
|
||||||
|
+ with this name, and its bfd section has compatible flags.
|
||||||
|
+ If the section already exists but does not have any flags
|
||||||
|
+ set, then it has been created by the linker, possibly as a
|
||||||
|
+ result of a --section-start command line switch. */
|
||||||
|
if (os->bfd_section != NULL
|
||||||
|
- && (elf_section_data (os->bfd_section)->this_hdr.sh_info
|
||||||
|
- == elf_section_data (s)->this_hdr.sh_info)
|
||||||
|
&& (os->bfd_section->flags == 0
|
||||||
|
- || ((!bfd_link_relocatable (&link_info)
|
||||||
|
- || (iself && (((elf_section_flags (s)
|
||||||
|
- ^ elf_section_flags (os->bfd_section))
|
||||||
|
- & SHF_EXCLUDE) == 0)))
|
||||||
|
- && ((s->flags ^ os->bfd_section->flags)
|
||||||
|
+ || (((s->flags ^ os->bfd_section->flags)
|
||||||
|
& (SEC_LOAD | SEC_ALLOC)) == 0
|
||||||
|
- && _bfd_elf_match_sections_by_type (link_info.output_bfd,
|
||||||
|
- os->bfd_section,
|
||||||
|
- s->owner, s))))
|
||||||
|
+ && (!elfinput
|
||||||
|
+ || !elfoutput
|
||||||
|
+ || elf_orphan_compatible (s, os->bfd_section)))))
|
||||||
|
{
|
||||||
|
- /* We already have an output section statement with this
|
||||||
|
- name, and its bfd section has compatible flags.
|
||||||
|
- If the section already exists but does not have any flags
|
||||||
|
- set, then it has been created by the linker, probably as a
|
||||||
|
- result of a --section-start command line switch. */
|
||||||
|
lang_add_section (&os->children, s, NULL, os);
|
||||||
|
return os;
|
||||||
|
}
|
||||||
|
@@ -2244,8 +2262,8 @@ gld${EMULATION_NAME}_place_orphan (asection *s,
|
||||||
|
else if ((flags & SEC_ALLOC) == 0)
|
||||||
|
;
|
||||||
|
else if ((flags & SEC_LOAD) != 0
|
||||||
|
- && ((iself && sh_type == SHT_NOTE)
|
||||||
|
- || (!iself && CONST_STRNEQ (secname, ".note"))))
|
||||||
|
+ && ((elfinput && sh_type == SHT_NOTE)
|
||||||
|
+ || (!elfinput && CONST_STRNEQ (secname, ".note"))))
|
||||||
|
place = &hold[orphan_interp];
|
||||||
|
else if ((flags & (SEC_LOAD | SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) == 0)
|
||||||
|
place = &hold[orphan_bss];
|
||||||
|
@@ -2255,8 +2273,8 @@ gld${EMULATION_NAME}_place_orphan (asection *s,
|
||||||
|
place = &hold[orphan_tdata];
|
||||||
|
else if ((flags & SEC_READONLY) == 0)
|
||||||
|
place = &hold[orphan_data];
|
||||||
|
- else if (((iself && (sh_type == SHT_RELA || sh_type == SHT_REL))
|
||||||
|
- || (!iself && CONST_STRNEQ (secname, ".rel")))
|
||||||
|
+ else if (((elfinput && (sh_type == SHT_RELA || sh_type == SHT_REL))
|
||||||
|
+ || (!elfinput && CONST_STRNEQ (secname, ".rel")))
|
||||||
|
&& (flags & SEC_LOAD) != 0)
|
||||||
|
place = &hold[orphan_rel];
|
||||||
|
else if ((flags & SEC_CODE) == 0)
|
||||||
|
--
|
||||||
|
2.9.3
|
||||||
|
|
Loading…
x
Reference in New Issue
Block a user