[uClibc] PATCH: My patches adapted to current cvs

Peter S. Mazinger ps.m at gmx.net
Mon Nov 8 15:17:26 UTC 2004


On Mon, 8 Nov 2004, Joakim Tjernlund wrote:

> > On Behalf Of Peter S. Mazinger
> > Hello!
> > 
> > The attached tarball includes all the patches I consider going into 0.9.27
> > Apply them in the following order.
> > 1. asflags
> > Replaces all CFLAGS w/ ASFLAGS, if an object is built from assembler code.
> > The current functionality is not changed in any way.
> > I have left the usage of SFLAGS as it was (in context), these should be 
> > considered to be replaced w/ ASFLAGS+= and use ASFLAGS instead as compile 
> > option
> > 
> > 2. pie-correction
> > Removes the conditions to create the Scrt1.o file (the files are created 
> > on x86/ppc/frv all the time), and use the option only to build ldd/iconv 
> > as PIE executables.
> > The current functionality is not changed in any way.
> > 
> > 3. pie_support-has_pie
> > Renames UCLIBC_PIE_SUPPORT option to UCLIBC_BUILD_PIE
> > The current functionality is not changed, but due to the option name 
> > change, buildroot's configs have to adapted
> > 
> > 4. ssp-correction
> > Corrects the usage of the SSP_FLAGS
> > If UCLIBC_PROPOLICE is not enabled, the current functionality is not 
> > changed in any way. If the option is enabled, all libs and execs are built 
> > w/ -fstack-protector and -fstack-protector-all enabling full protection, 
> > unless it is not possible for some reason (libc/ldso)
> > 
> > 5. propolice-has_ssp
> > The UCLIBC_PROPOLICE option is splitted to UCLIBC_HAS_SSP and 
> > UCLIBC_BUILD_SSP, meaning:
> > HAS_SSP: add ssp.c to libc
> > BUILD_SSP: build all the libs/execs w/ max. ssp protection
> > Current functionality is not changed, but due to the option name change, 
> > buildroot's configs have to be adapted
> > 
> > 6. sec
> > Adds a security submenu to menuconfig, moving PIE and SSP related options 
> > there and adds UCLIBC_BUILD_RELRO and UCLIBC_BUILD_NOW options, meaning 
> > build all w/ -z relro, resp. build all w/ -z now.
> > The new options default to n.
> > The current functionality is not changed.
> > Maybe it would be better to also add a common security option, and if that 
> > one is disabled, all the others in the submenu are disabled as well (if 
> > future changes are done within this submenu, those not setting the common 
> > security option won't see any change, the build systems won't have to 
> > change/adapt configs)
> > 
> > 7. main
> > Part of Jocke's .protected main patch
> > 
> > 8. zdefs
> > Adds zdefs commonly to all LDFLAGS (can only be used in conjunction 
> > w/ patch 7. 
> > on x86, else libc will fail to build)
> > 
> > 9. fgets_unlocked
> > adds extern fgets_unlocked where needed
> > 
> > 10. no_dl_do_copy_reloc
> > disables dl_do_copy_reloc, it's not used
> > 
> > 11. nocache
> > This patch was already sent to the list, and was not accepted, because it 
> > has too many ifdefs, it makes ld.so smaller if ld.so.cache support is 
> > disabled. Maybe someone can reorganize it, so that fewer ifdefs are used.
> > Does not influence the current functionality.
> > 
> > 12. getent
> > Shell script that simulates glibc's getent binary where possible. Please 
> > consider adding it to docs or debian.
> > 
> > Peter
> 
> After a quick look I think 1-6 are OK and could probably go in. Need Eriks
> blessing first though.
> 
> 7 and 8: OK, if Erik is OK with this. I am not sure that nothing bad will happen.
> 
> 9. No comment, I have no idea as to why this is needed.

only to get rid of a warning about implicit use, when the .c file is 
compiled.

> 
> 10. Sure, will do.

what about 11 ;)

> 
> 12. No comment, I have no idea as to why this is needed.

many packages make use of getent instead of grepping passwd/group to check 
for existence of a user/group in post-install-scripts 
(rpms/debs/tbz2/tgz). 
They use it because the user/group db could be located on an ldap or 
nis server and getent from glibc is ldap/nis aware. uclibc does not 
support (yet) ldap and won't support nis, so this simulates the glibc 
getent binary based on passwd/group/aliases/hosts/networks and so on... 
and allows it to be used as drop in replacement. Currently gentoo makes 
use of it, and I am using it w/ my rpms.

Peter

-- 
Peter S. Mazinger <ps dot m at gmx dot net>           ID: 0xA5F059F2
Key fingerprint = 92A4 31E1 56BC 3D5A 2D08  BB6E C389 975E A5F0 59F2




More information about the uClibc mailing list