From 8e5aac421200a014bb6a0bcb908820dba81f6e0c Mon Sep 17 00:00:00 2001 From: CentOS Sources Date: Tue, 7 May 2019 05:34:42 -0400 Subject: [PATCH] import elfutils-0.174-6.el8 --- .elfutils.metadata | 1 + .gitignore | 1 + SOURCES/elfutils-0.173-new-notes-hack.patch | 17 + .../elfutils-0.174-ar-sh_entsize-zero.patch | 27 + .../elfutils-0.174-gnu-attribute-note.patch | 373 +++++ .../elfutils-0.174-gnu-property-note.patch | 820 ++++++++++ SOURCES/elfutils-0.174-gnu-props-32.patch | 58 + ....174-libdwfl-sanity-check-core-reads.patch | 51 + SOURCES/elfutils-0.174-size-rec-ar.patch | 31 + .../elfutils-0.174-strip-unstrip-group.patch | 226 +++ SOURCES/elfutils-0.174-version-note.patch | 156 ++ SOURCES/elfutils-0.174-x86_64_unwind.patch | 127 ++ SPECS/elfutils.spec | 1374 +++++++++++++++++ 13 files changed, 3262 insertions(+) create mode 100644 .elfutils.metadata create mode 100644 .gitignore create mode 100644 SOURCES/elfutils-0.173-new-notes-hack.patch create mode 100644 SOURCES/elfutils-0.174-ar-sh_entsize-zero.patch create mode 100644 SOURCES/elfutils-0.174-gnu-attribute-note.patch create mode 100644 SOURCES/elfutils-0.174-gnu-property-note.patch create mode 100644 SOURCES/elfutils-0.174-gnu-props-32.patch create mode 100644 SOURCES/elfutils-0.174-libdwfl-sanity-check-core-reads.patch create mode 100644 SOURCES/elfutils-0.174-size-rec-ar.patch create mode 100644 SOURCES/elfutils-0.174-strip-unstrip-group.patch create mode 100644 SOURCES/elfutils-0.174-version-note.patch create mode 100644 SOURCES/elfutils-0.174-x86_64_unwind.patch create mode 100644 SPECS/elfutils.spec diff --git a/.elfutils.metadata b/.elfutils.metadata new file mode 100644 index 0000000..c3c4d0e --- /dev/null +++ b/.elfutils.metadata @@ -0,0 +1 @@ +95899ce5fa55002e46bf4e02d01a249516e296fd SOURCES/elfutils-0.174.tar.bz2 diff --git a/.gitignore b/.gitignore new file mode 100644 index 0000000..f5938a4 --- /dev/null +++ b/.gitignore @@ -0,0 +1 @@ +SOURCES/elfutils-0.174.tar.bz2 diff --git a/SOURCES/elfutils-0.173-new-notes-hack.patch b/SOURCES/elfutils-0.173-new-notes-hack.patch new file mode 100644 index 0000000..8e607fa --- /dev/null +++ b/SOURCES/elfutils-0.173-new-notes-hack.patch @@ -0,0 +1,17 @@ +diff --git a/src/elflint.c b/src/elflint.c +index eec799b2..31092f2e 100644 +--- a/src/elflint.c ++++ b/src/elflint.c +@@ -3905,10 +3905,11 @@ section [%2zu] '%s': size not multiple of entry size\n"), + cnt, section_name (ebl, cnt), + (int) shdr->sh_type); + ++#define SHF_GNU_BUILD_NOTE (1 << 20) + #define ALL_SH_FLAGS (SHF_WRITE | SHF_ALLOC | SHF_EXECINSTR | SHF_MERGE \ + | SHF_STRINGS | SHF_INFO_LINK | SHF_LINK_ORDER \ + | SHF_OS_NONCONFORMING | SHF_GROUP | SHF_TLS \ +- | SHF_COMPRESSED) ++ | SHF_COMPRESSED | SHF_GNU_BUILD_NOTE) + if (shdr->sh_flags & ~(GElf_Xword) ALL_SH_FLAGS) + { + GElf_Xword sh_flags = shdr->sh_flags & ~(GElf_Xword) ALL_SH_FLAGS; diff --git a/SOURCES/elfutils-0.174-ar-sh_entsize-zero.patch b/SOURCES/elfutils-0.174-ar-sh_entsize-zero.patch new file mode 100644 index 0000000..0040033 --- /dev/null +++ b/SOURCES/elfutils-0.174-ar-sh_entsize-zero.patch @@ -0,0 +1,27 @@ +commit 2b16a9be69939822dcafe075413468daac98b327 +Author: Mark Wielaard +Date: Thu Oct 18 19:01:52 2018 +0200 + + arlib: Check that sh_entsize isn't zero. + + A bogus ELF file could have sh_entsize as zero. Don't divide by zero, + but just assume there are no symbols in the section. + + https://sourceware.org/bugzilla/show_bug.cgi?id=23786 + + Signed-off-by: Mark Wielaard + +diff --git a/src/arlib.c b/src/arlib.c +index 778e087..a6521e3 100644 +--- a/src/arlib.c ++++ b/src/arlib.c +@@ -252,6 +252,9 @@ arlib_add_symbols (Elf *elf, const char *arfname, const char *membername, + if (data == NULL) + continue; + ++ if (shdr->sh_entsize == 0) ++ continue; ++ + int nsyms = shdr->sh_size / shdr->sh_entsize; + for (int ndx = shdr->sh_info; ndx < nsyms; ++ndx) + { diff --git a/SOURCES/elfutils-0.174-gnu-attribute-note.patch b/SOURCES/elfutils-0.174-gnu-attribute-note.patch new file mode 100644 index 0000000..ae884a6 --- /dev/null +++ b/SOURCES/elfutils-0.174-gnu-attribute-note.patch @@ -0,0 +1,373 @@ +commit 72e30c2e0cb49a9a300667fdd5ff09082f717950 +Author: Mark Wielaard +Date: Mon Nov 12 23:34:24 2018 +0100 + + Handle GNU Build Attribute ELF Notes. + + GNU Build Attribute ELF Notes are generated by the GCC annobin plugin + and described at https://fedoraproject.org/wiki/Toolchain/Watermark + + Unfortunately the constants aren't yet described in the standard glibc + elf.h so they have been added to the elfutils specific elf-knowledge.h. + + The notes abuse the name owner field to encode some data not in the + description. This makes it a bit hard to parse. We have to match the + note owner name prefix (to "GA") to be sure the type is valid. We also + cannot rely on the owner name being a valid C string since the attribute + name and value can contain zero (terminators). So pass around namesz + to the ebl note parsing functions. + + eu-elflint will recognize and eu-readelf -n will now show the notes: + + Note section [27] '.gnu.build.attributes' of 56080 bytes at offset 0x114564: + Owner Data size Type + GA 16 GNU Build Attribute OPEN + Address Range: 0x2f30f - 0x2f30f + VERSION: "3p8" + GA 0 GNU Build Attribute OPEN + TOOL: "gcc 8.2.1 20180801" + GA 0 GNU Build Attribute OPEN + "GOW": 45 + GA 0 GNU Build Attribute OPEN + STACK_PROT: 0 + GA 0 GNU Build Attribute OPEN + "stack_clash": TRUE + GA 0 GNU Build Attribute OPEN + "cf_protection": 0 + GA 0 GNU Build Attribute OPEN + "GLIBCXX_ASSERTIONS": TRUE + GA 0 GNU Build Attribute OPEN + "FORTIFY": 0 + GA 0 GNU Build Attribute OPEN + PIC: 3 + GA 0 GNU Build Attribute OPEN + SHORT_ENUM: FALSE + GA 0 GNU Build Attribute OPEN + ABI: c001100000012 + GA 0 GNU Build Attribute OPEN + "stack_realign": FALSE + + A new test was added to run-readelf -n for the existing annobin file. + + Signed-off-by: Mark Wielaard + +diff --git a/libebl/eblobjnote.c b/libebl/eblobjnote.c +index 8fda7d9..58ac86d 100644 +--- a/libebl/eblobjnote.c ++++ b/libebl/eblobjnote.c +@@ -37,11 +37,14 @@ + #include + #include + ++#include "common.h" + #include "libelfP.h" ++#include "libdwP.h" ++#include "memory-access.h" + + + void +-ebl_object_note (Ebl *ebl, const char *name, uint32_t type, ++ebl_object_note (Ebl *ebl, uint32_t namesz, const char *name, uint32_t type, + uint32_t descsz, const char *desc) + { + if (! ebl->object_note (name, type, descsz, desc)) +@@ -135,6 +138,152 @@ ebl_object_note (Ebl *ebl, const char *name, uint32_t type, + return; + } + ++ if (strncmp (name, ELF_NOTE_GNU_BUILD_ATTRIBUTE_PREFIX, ++ strlen (ELF_NOTE_GNU_BUILD_ATTRIBUTE_PREFIX)) == 0 ++ && (type == NT_GNU_BUILD_ATTRIBUTE_OPEN ++ || type == NT_GNU_BUILD_ATTRIBUTE_FUNC)) ++ { ++ /* There might or might not be a pair of addresses in the desc. */ ++ if (descsz > 0) ++ { ++ printf (" Address Range: "); ++ ++ union ++ { ++ Elf64_Addr a64[2]; ++ Elf32_Addr a32[2]; ++ } addrs; ++ ++ size_t addr_size = gelf_fsize (ebl->elf, ELF_T_ADDR, ++ 2, EV_CURRENT); ++ if (descsz != addr_size) ++ printf ("\n"); ++ else ++ { ++ Elf_Data src = ++ { ++ .d_type = ELF_T_ADDR, .d_version = EV_CURRENT, ++ .d_buf = (void *) desc, .d_size = descsz ++ }; ++ ++ Elf_Data dst = ++ { ++ .d_type = ELF_T_ADDR, .d_version = EV_CURRENT, ++ .d_buf = &addrs, .d_size = descsz ++ }; ++ ++ if (gelf_xlatetom (ebl->elf, &dst, &src, ++ elf_getident (ebl->elf, ++ NULL)[EI_DATA]) == NULL) ++ printf ("%s\n", elf_errmsg (-1)); ++ else ++ { ++ if (addr_size == 4) ++ printf ("%#" PRIx32 " - %#" PRIx32 "\n", ++ addrs.a32[0], addrs.a32[1]); ++ else ++ printf ("%#" PRIx64 " - %#" PRIx64 "\n", ++ addrs.a64[0], addrs.a64[1]); ++ } ++ } ++ } ++ ++ /* Most data actually is inside the name. ++ https://fedoraproject.org/wiki/Toolchain/Watermark */ ++ ++ /* We need at least 2 chars of data to describe the ++ attribute and value encodings. */ ++ const char *data = (name ++ + strlen (ELF_NOTE_GNU_BUILD_ATTRIBUTE_PREFIX)); ++ if (namesz < 2) ++ { ++ printf ("\n"); ++ return; ++ } ++ ++ printf (" "); ++ ++ /* In most cases the value comes right after the encoding bytes. */ ++ const char *value = &data[2]; ++ switch (data[1]) ++ { ++ case GNU_BUILD_ATTRIBUTE_VERSION: ++ printf ("VERSION: "); ++ break; ++ case GNU_BUILD_ATTRIBUTE_STACK_PROT: ++ printf ("STACK_PROT: "); ++ break; ++ case GNU_BUILD_ATTRIBUTE_RELRO: ++ printf ("RELRO: "); ++ break; ++ case GNU_BUILD_ATTRIBUTE_STACK_SIZE: ++ printf ("STACK_SIZE: "); ++ break; ++ case GNU_BUILD_ATTRIBUTE_TOOL: ++ printf ("TOOL: "); ++ break; ++ case GNU_BUILD_ATTRIBUTE_ABI: ++ printf ("ABI: "); ++ break; ++ case GNU_BUILD_ATTRIBUTE_PIC: ++ printf ("PIC: "); ++ break; ++ case GNU_BUILD_ATTRIBUTE_SHORT_ENUM: ++ printf ("SHORT_ENUM: "); ++ break; ++ case 32 ... 126: ++ printf ("\"%s\": ", &data[1]); ++ value += strlen (&data[1]) + 1; ++ break; ++ default: ++ printf (": "); ++ break; ++ } ++ ++ switch (data[0]) ++ { ++ case GNU_BUILD_ATTRIBUTE_TYPE_NUMERIC: ++ { ++ /* Any numbers are always in (unsigned) little endian. */ ++ static const Dwarf dbg ++ = { .other_byte_order = MY_ELFDATA != ELFDATA2LSB }; ++ size_t bytes = namesz - (value - name); ++ uint64_t val; ++ if (bytes == 1) ++ val = *(unsigned char *) value; ++ else if (bytes == 2) ++ val = read_2ubyte_unaligned (&dbg, value); ++ else if (bytes == 4) ++ val = read_4ubyte_unaligned (&dbg, value); ++ else if (bytes == 8) ++ val = read_8ubyte_unaligned (&dbg, value); ++ else ++ goto unknown; ++ printf ("%" PRIx64, val); ++ } ++ break; ++ case GNU_BUILD_ATTRIBUTE_TYPE_STRING: ++ printf ("\"%s\"", value); ++ break; ++ case GNU_BUILD_ATTRIBUTE_TYPE_BOOL_TRUE: ++ printf ("TRUE"); ++ break; ++ case GNU_BUILD_ATTRIBUTE_TYPE_BOOL_FALSE: ++ printf ("FALSE"); ++ break; ++ default: ++ { ++ unknown: ++ printf (""); ++ } ++ break; ++ } ++ ++ printf ("\n"); ++ ++ return; ++ } ++ + /* NT_VERSION doesn't have any info. All data is in the name. */ + if (descsz == 0 && type == NT_VERSION) + return; +diff --git a/libebl/eblobjnotetypename.c b/libebl/eblobjnotetypename.c +index 8cdd781..29a5391 100644 +--- a/libebl/eblobjnotetypename.c ++++ b/libebl/eblobjnotetypename.c +@@ -1,5 +1,5 @@ + /* Return note type name. +- Copyright (C) 2002, 2007, 2009, 2011, 2016 Red Hat, Inc. ++ Copyright (C) 2002, 2007, 2009, 2011, 2016, 2018 Red Hat, Inc. + This file is part of elfutils. + Written by Ulrich Drepper , 2002. + +@@ -79,6 +79,29 @@ ebl_object_note_type_name (Ebl *ebl, const char *name, uint32_t type, + } + } + ++ if (strncmp (name, ELF_NOTE_GNU_BUILD_ATTRIBUTE_PREFIX, ++ strlen (ELF_NOTE_GNU_BUILD_ATTRIBUTE_PREFIX)) == 0) ++ { ++ /* GNU Build Attribute notes (ab)use the owner name to store ++ most of their data. Don't decode everything here. Just ++ the type.*/ ++ char *t = buf; ++ const char *gba = "GNU Build Attribute"; ++ int w = snprintf (t, len, "%s ", gba); ++ t += w; ++ len -= w; ++ if (type == NT_GNU_BUILD_ATTRIBUTE_OPEN) ++ w = snprintf (t, len, "OPEN"); ++ else if (type == NT_GNU_BUILD_ATTRIBUTE_FUNC) ++ w = snprintf (t, len, "FUNC"); ++ else ++ w = snprintf (t, len, "%x", type); ++ t += w; ++ len -= w; ++ ++ return buf; ++ } ++ + if (strcmp (name, "GNU") != 0) + { + /* NT_VERSION is special, all data is in the name. */ +diff --git a/libebl/libebl.h b/libebl/libebl.h +index 5830654..ca9b9fe 100644 +--- a/libebl/libebl.h ++++ b/libebl/libebl.h +@@ -179,8 +179,8 @@ extern const char *ebl_object_note_type_name (Ebl *ebl, const char *name, + char *buf, size_t len); + + /* Print information about object note if available. */ +-extern void ebl_object_note (Ebl *ebl, const char *name, uint32_t type, +- uint32_t descsz, const char *desc); ++extern void ebl_object_note (Ebl *ebl, uint32_t namesz, const char *name, ++ uint32_t type, uint32_t descsz, const char *desc); + + /* Check whether an attribute in a .gnu_attributes section is recognized. + Fills in *TAG_NAME with the name for this tag. +diff --git a/libelf/elf-knowledge.h b/libelf/elf-knowledge.h +index 64f5887..9d3be0f 100644 +--- a/libelf/elf-knowledge.h ++++ b/libelf/elf-knowledge.h +@@ -77,4 +77,25 @@ + || ((Ehdr)->e_machine == EM_S390 \ + && (Ehdr)->e_ident[EI_CLASS] == ELFCLASS64) ? 8 : 4) + ++/* GNU Annobin notes are not fully standardized and abuses the owner name. */ ++ ++#define ELF_NOTE_GNU_BUILD_ATTRIBUTE_PREFIX "GA" ++ ++#define NT_GNU_BUILD_ATTRIBUTE_OPEN 0x100 ++#define NT_GNU_BUILD_ATTRIBUTE_FUNC 0x101 ++ ++#define GNU_BUILD_ATTRIBUTE_TYPE_NUMERIC '*' ++#define GNU_BUILD_ATTRIBUTE_TYPE_STRING '$' ++#define GNU_BUILD_ATTRIBUTE_TYPE_BOOL_TRUE '+' ++#define GNU_BUILD_ATTRIBUTE_TYPE_BOOL_FALSE '!' ++ ++#define GNU_BUILD_ATTRIBUTE_VERSION 1 ++#define GNU_BUILD_ATTRIBUTE_STACK_PROT 2 ++#define GNU_BUILD_ATTRIBUTE_RELRO 3 ++#define GNU_BUILD_ATTRIBUTE_STACK_SIZE 4 ++#define GNU_BUILD_ATTRIBUTE_TOOL 5 ++#define GNU_BUILD_ATTRIBUTE_ABI 6 ++#define GNU_BUILD_ATTRIBUTE_PIC 7 ++#define GNU_BUILD_ATTRIBUTE_SHORT_ENUM 8 ++ + #endif /* elf-knowledge.h */ +diff --git a/src/elflint.c b/src/elflint.c +index dff74ee..184ca12 100644 +--- a/src/elflint.c ++++ b/src/elflint.c +@@ -4344,6 +4344,19 @@ section [%2d] '%s': unknown core file note type %" PRIu32 + } + goto unknown_note; + ++ case NT_GNU_BUILD_ATTRIBUTE_OPEN: ++ case NT_GNU_BUILD_ATTRIBUTE_FUNC: ++ /* GNU Build Attributes store most data in the owner ++ name, which must start with the ++ ELF_NOTE_GNU_BUILD_ATTRIBUTE_PREFIX "GA". */ ++ if (nhdr.n_namesz >= sizeof ELF_NOTE_GNU_BUILD_ATTRIBUTE_PREFIX ++ && strncmp (data->d_buf + name_offset, ++ ELF_NOTE_GNU_BUILD_ATTRIBUTE_PREFIX, ++ strlen (ELF_NOTE_GNU_BUILD_ATTRIBUTE_PREFIX)) == 0) ++ break; ++ else ++ goto unknown_note; ++ + case 0: + /* Linux vDSOs use a type 0 note for the kernel version word. */ + if (nhdr.n_namesz == sizeof "Linux" +diff --git a/src/readelf.c b/src/readelf.c +index 659e34f..3a73710 100644 +--- a/src/readelf.c ++++ b/src/readelf.c +@@ -12193,10 +12193,21 @@ handle_notes_data (Ebl *ebl, const GElf_Ehdr *ehdr, + const char *name = nhdr.n_namesz == 0 ? "" : data->d_buf + name_offset; + const char *desc = data->d_buf + desc_offset; + ++ /* GNU Build Attributes are weird, they store most of their data ++ into the owner name field. Extract just the owner name ++ prefix here, then use the rest later as data. */ ++ bool is_gnu_build_attr ++ = strncmp (name, ELF_NOTE_GNU_BUILD_ATTRIBUTE_PREFIX, ++ strlen (ELF_NOTE_GNU_BUILD_ATTRIBUTE_PREFIX)) == 0; ++ const char *print_name = (is_gnu_build_attr ++ ? ELF_NOTE_GNU_BUILD_ATTRIBUTE_PREFIX : name); ++ size_t print_namesz = (is_gnu_build_attr ++ ? strlen (print_name) : nhdr.n_namesz); ++ + char buf[100]; + char buf2[100]; + printf (gettext (" %-13.*s %9" PRId32 " %s\n"), +- (int) nhdr.n_namesz, name, nhdr.n_descsz, ++ (int) print_namesz, print_name, nhdr.n_descsz, + ehdr->e_type == ET_CORE + ? ebl_core_note_type_name (ebl, nhdr.n_type, + buf, sizeof (buf)) +@@ -12237,7 +12248,8 @@ handle_notes_data (Ebl *ebl, const GElf_Ehdr *ehdr, + handle_core_note (ebl, &nhdr, name, desc); + } + else +- ebl_object_note (ebl, name, nhdr.n_type, nhdr.n_descsz, desc); ++ ebl_object_note (ebl, nhdr.n_namesz, name, nhdr.n_type, ++ nhdr.n_descsz, desc); + } + } + diff --git a/SOURCES/elfutils-0.174-gnu-property-note.patch b/SOURCES/elfutils-0.174-gnu-property-note.patch new file mode 100644 index 0000000..e511ed0 --- /dev/null +++ b/SOURCES/elfutils-0.174-gnu-property-note.patch @@ -0,0 +1,820 @@ +commit 5199e15870e05e5b0b9f98c20fc9b5427aa6dd6a +Author: Mark Wielaard +Date: Mon Oct 15 23:35:47 2018 +0200 + + Recognize and parse GNU Property notes. + + GNU Property notes are different from normal notes because they use + variable alignment/padding of their fields. They are 8 byte aligned, + but use 4 byte fields. The name is aligned at 4 bytes and padded so + that, the desc is aligned at 8 bytes. The whole note is padded to + 8 bytes again. For normal notes all fields are both 4 bytes wide and + 4 bytes aligned. + + To recognize these new kind of ELF Notes a new Elf_Type is introduced, + ELF_T_NHDR8. This type is used in the xlate functions to determine + how to align and pad the various fields. Since the fields themselves + can now have different alignments we will have to keep track of the + current alignement and use either NOTE_ALIGN4 or NOTE_ALIGN8 to + determine the padding. + + To set the correct Elf_Type on the Elf_Data we use either the section + sh_addralign or the segment p_align values. Assuming 8 means the + section or segment contains the new style notes, otherwise normal + notes. + + When we cannot determine the "alignment" directly, like when parsing + special kernel sys files, we check the name "GNU" and type + "GNU_PROPERTY_TYPE_0" fields. + + ebl_object_note now parses the new NT_GNU_PROPERTY_TYPE_0 and can + extract the GNU_PROPERTY_STACK_SIZE, GNU_PROPERTY_NO_COPY_ON_PROTECTED + and GNU_PROPERTY_X86_FEATURE_1_AND types GNU_PROPERTY_X86_FEATURE_1_IBT + and GNU_PROPERTY_X86_FEATURE_1_SHSTK. + + Tests are added for extracting the note from sections or segments + as set by gcc -fcf-protection. + + Signed-off-by: Mark Wielaard + +diff --git a/libdwelf/dwelf_elf_gnu_build_id.c b/libdwelf/dwelf_elf_gnu_build_id.c +index 8c78c70..dbcfc82 100644 +--- a/libdwelf/dwelf_elf_gnu_build_id.c ++++ b/libdwelf/dwelf_elf_gnu_build_id.c +@@ -88,7 +88,9 @@ find_elf_build_id (Dwfl_Module *mod, int e_type, Elf *elf, + result = check_notes (elf_getdata_rawchunk (elf, + phdr->p_offset, + phdr->p_filesz, +- ELF_T_NHDR), ++ (phdr->p_align == 8 ++ ? ELF_T_NHDR8 ++ : ELF_T_NHDR)), + phdr->p_vaddr, + build_id_bits, + build_id_elfaddr, +diff --git a/libdwfl/core-file.c b/libdwfl/core-file.c +index 84cb89a..01109f4 100644 +--- a/libdwfl/core-file.c ++++ b/libdwfl/core-file.c +@@ -496,7 +496,9 @@ dwfl_core_file_report (Dwfl *dwfl, Elf *elf, const char *executable) + Elf_Data *notes = elf_getdata_rawchunk (elf, + notes_phdr.p_offset, + notes_phdr.p_filesz, +- ELF_T_NHDR); ++ (notes_phdr.p_align == 8 ++ ? ELF_T_NHDR8 ++ : ELF_T_NHDR)); + if (likely (notes != NULL)) + { + size_t pos = 0; +diff --git a/libdwfl/dwfl_segment_report_module.c b/libdwfl/dwfl_segment_report_module.c +index 8749884..0d633ff 100644 +--- a/libdwfl/dwfl_segment_report_module.c ++++ b/libdwfl/dwfl_segment_report_module.c +@@ -27,7 +27,7 @@ + not, see . */ + + #include +-#include "../libelf/libelfP.h" /* For NOTE_ALIGN. */ ++#include "../libelf/libelfP.h" /* For NOTE_ALIGN4 and NOTE_ALIGN8. */ + #undef _ + #include "libdwflP.h" + #include "common.h" +@@ -451,7 +451,8 @@ dwfl_segment_report_module (Dwfl *dwfl, int ndx, const char *name, + GElf_Addr build_id_vaddr = 0; + + /* Consider a PT_NOTE we've found in the image. */ +- inline void consider_notes (GElf_Addr vaddr, GElf_Xword filesz) ++ inline void consider_notes (GElf_Addr vaddr, GElf_Xword filesz, ++ GElf_Xword align) + { + /* If we have already seen a build ID, we don't care any more. */ + if (build_id != NULL || filesz == 0) +@@ -478,7 +479,8 @@ dwfl_segment_report_module (Dwfl *dwfl, int ndx, const char *name, + notes = malloc (filesz); + if (unlikely (notes == NULL)) + return; +- xlatefrom.d_type = xlateto.d_type = ELF_T_NHDR; ++ xlatefrom.d_type = xlateto.d_type = (align == 8 ++ ? ELF_T_NHDR8 : ELF_T_NHDR); + xlatefrom.d_buf = (void *) data; + xlatefrom.d_size = filesz; + xlateto.d_buf = notes; +@@ -489,15 +491,23 @@ dwfl_segment_report_module (Dwfl *dwfl, int ndx, const char *name, + } + + const GElf_Nhdr *nh = notes; +- while ((const void *) nh < (const void *) notes + filesz) +- { +- const void *note_name = nh + 1; +- const void *note_desc = note_name + NOTE_ALIGN (nh->n_namesz); +- if (unlikely ((size_t) ((const void *) notes + filesz +- - note_desc) < nh->n_descsz)) ++ size_t len = 0; ++ while (filesz > len + sizeof (*nh)) ++ { ++ const void *note_name; ++ const void *note_desc; ++ ++ len += sizeof (*nh); ++ note_name = notes + len; ++ ++ len += nh->n_namesz; ++ len = align == 8 ? NOTE_ALIGN8 (len) : NOTE_ALIGN4 (len); ++ note_desc = notes + len; ++ ++ if (unlikely (filesz < len + nh->n_descsz)) + break; + +- if (nh->n_type == NT_GNU_BUILD_ID ++ if (nh->n_type == NT_GNU_BUILD_ID + && nh->n_descsz > 0 + && nh->n_namesz == sizeof "GNU" + && !memcmp (note_name, "GNU", sizeof "GNU")) +@@ -510,7 +520,9 @@ dwfl_segment_report_module (Dwfl *dwfl, int ndx, const char *name, + break; + } + +- nh = note_desc + NOTE_ALIGN (nh->n_descsz); ++ len += nh->n_descsz; ++ len = align == 8 ? NOTE_ALIGN8 (len) : NOTE_ALIGN4 (len); ++ nh = (void *) notes + len; + } + + done: +@@ -535,7 +547,7 @@ dwfl_segment_report_module (Dwfl *dwfl, int ndx, const char *name, + case PT_NOTE: + /* We calculate from the p_offset of the note segment, + because we don't yet know the bias for its p_vaddr. */ +- consider_notes (start + offset, filesz); ++ consider_notes (start + offset, filesz, align); + break; + + case PT_LOAD: +diff --git a/libdwfl/linux-core-attach.c b/libdwfl/linux-core-attach.c +index 9f05f72..6c99b9e 100644 +--- a/libdwfl/linux-core-attach.c ++++ b/libdwfl/linux-core-attach.c +@@ -355,7 +355,9 @@ dwfl_core_file_attach (Dwfl *dwfl, Elf *core) + if (phdr != NULL && phdr->p_type == PT_NOTE) + { + note_data = elf_getdata_rawchunk (core, phdr->p_offset, +- phdr->p_filesz, ELF_T_NHDR); ++ phdr->p_filesz, (phdr->p_align == 8 ++ ? ELF_T_NHDR8 ++ : ELF_T_NHDR)); + break; + } + } +diff --git a/libdwfl/linux-kernel-modules.c b/libdwfl/linux-kernel-modules.c +index 9d0fef2..360e4ee 100644 +--- a/libdwfl/linux-kernel-modules.c ++++ b/libdwfl/linux-kernel-modules.c +@@ -39,6 +39,7 @@ + #include + #include + ++#include "libelfP.h" + #include "libdwflP.h" + #include + #include +@@ -554,15 +555,41 @@ check_notes (Dwfl_Module *mod, const char *notesfile, + return 1; + + unsigned char *p = buf.data; ++ size_t len = 0; + while (p < &buf.data[n]) + { + /* No translation required since we are reading the native kernel. */ + GElf_Nhdr *nhdr = (void *) p; +- p += sizeof *nhdr; ++ len += sizeof *nhdr; ++ p += len; + unsigned char *name = p; +- p += (nhdr->n_namesz + 3) & -4U; +- unsigned char *bits = p; +- p += (nhdr->n_descsz + 3) & -4U; ++ unsigned char *bits; ++ /* This is somewhat ugly, GNU Property notes use different padding, ++ but all we have is the file content, so we have to actually check ++ the name and type. */ ++ if (nhdr->n_type == NT_GNU_PROPERTY_TYPE_0 ++ && nhdr->n_namesz == sizeof "GNU" ++ && name + nhdr->n_namesz < &buf.data[n] ++ && !memcmp (name, "GNU", sizeof "GNU")) ++ { ++ len += nhdr->n_namesz; ++ len = NOTE_ALIGN8 (len); ++ p = buf.data + len; ++ bits = p; ++ len += nhdr->n_descsz; ++ len = NOTE_ALIGN8 (len); ++ p = buf.data + len; ++ } ++ else ++ { ++ len += nhdr->n_namesz; ++ len = NOTE_ALIGN4 (len); ++ p = buf.data + len; ++ bits = p; ++ len += nhdr->n_descsz; ++ len = NOTE_ALIGN4 (len); ++ p = buf.data + len; ++ } + + if (p <= &buf.data[n] + && nhdr->n_type == NT_GNU_BUILD_ID +diff --git a/libebl/eblobjnote.c b/libebl/eblobjnote.c +index ca4f155..57e9f52 100644 +--- a/libebl/eblobjnote.c ++++ b/libebl/eblobjnote.c +@@ -1,5 +1,5 @@ + /* Print contents of object file note. +- Copyright (C) 2002, 2007, 2009, 2011, 2015, 2016 Red Hat, Inc. ++ Copyright (C) 2002, 2007, 2009, 2011, 2015, 2016, 2018 Red Hat, Inc. + This file is part of elfutils. + Written by Ulrich Drepper , 2002. + +@@ -37,6 +37,8 @@ + #include + #include + ++#include "libelfP.h" ++ + + void + ebl_object_note (Ebl *ebl, const char *name, uint32_t type, +@@ -153,6 +155,187 @@ ebl_object_note (Ebl *ebl, const char *name, uint32_t type, + (int) descsz, desc); + break; + ++ case NT_GNU_PROPERTY_TYPE_0: ++ if (strcmp (name, "GNU") == 0 && descsz > 0) ++ { ++ /* There are at least 2 words. type and datasz. */ ++ while (descsz >= 8) ++ { ++ struct pr_prop ++ { ++ GElf_Word pr_type; ++ GElf_Word pr_datasz; ++ } prop; ++ ++ Elf_Data in = ++ { ++ .d_version = EV_CURRENT, ++ .d_type = ELF_T_WORD, ++ .d_size = 8, ++ .d_buf = (void *) desc ++ }; ++ Elf_Data out = ++ { ++ .d_version = EV_CURRENT, ++ .d_type = ELF_T_WORD, ++ .d_size = descsz, ++ .d_buf = (void *) &prop ++ }; ++ ++ if (gelf_xlatetom (ebl->elf, &out, &in, ++ elf_getident (ebl->elf, ++ NULL)[EI_DATA]) == NULL) ++ { ++ printf ("%s\n", elf_errmsg (-1)); ++ return; ++ } ++ ++ desc += 8; ++ descsz -= 8; ++ ++ int elfclass = gelf_getclass (ebl->elf); ++ char *elfident = elf_getident (ebl->elf, NULL); ++ GElf_Ehdr ehdr; ++ gelf_getehdr (ebl->elf, &ehdr); ++ ++ /* Prefix. */ ++ printf (" "); ++ if (prop.pr_type == GNU_PROPERTY_STACK_SIZE) ++ { ++ printf ("STACK_SIZE "); ++ if (prop.pr_datasz == 4 || prop.pr_datasz == 8) ++ { ++ GElf_Addr addr; ++ in.d_type = ELF_T_ADDR; ++ out.d_type = ELF_T_ADDR; ++ in.d_size = prop.pr_datasz; ++ out.d_size = sizeof (addr); ++ in.d_buf = (void *) desc; ++ out.d_buf = (void *) &addr; ++ ++ if (gelf_xlatetom (ebl->elf, &out, &in, ++ elfident[EI_DATA]) == NULL) ++ { ++ printf ("%s\n", elf_errmsg (-1)); ++ return; ++ } ++ printf ("%#" PRIx64 "\n", addr); ++ } ++ else ++ printf (" (garbage datasz: %" PRIx32 ")\n", ++ prop.pr_datasz); ++ } ++ else if (prop.pr_type == GNU_PROPERTY_NO_COPY_ON_PROTECTED) ++ { ++ printf ("NO_COPY_ON_PROTECTION"); ++ if (prop.pr_datasz == 0) ++ printf ("\n"); ++ else ++ printf (" (garbage datasz: %" PRIx32 ")\n", ++ prop.pr_datasz); ++ } ++ else if (prop.pr_type >= GNU_PROPERTY_LOPROC ++ && prop.pr_type <= GNU_PROPERTY_HIPROC ++ && (ehdr.e_machine == EM_386 ++ || ehdr.e_machine == EM_X86_64)) ++ { ++ printf ("X86 "); ++ if (prop.pr_type == GNU_PROPERTY_X86_FEATURE_1_AND) ++ { ++ printf ("FEATURE_1_AND: "); ++ ++ if (prop.pr_datasz == 4) ++ { ++ GElf_Word data; ++ in.d_type = ELF_T_WORD; ++ out.d_type = ELF_T_WORD; ++ in.d_size = 4; ++ out.d_size = 4; ++ in.d_buf = (void *) desc; ++ out.d_buf = (void *) &data; ++ ++ if (gelf_xlatetom (ebl->elf, &out, &in, ++ elfident[EI_DATA]) == NULL) ++ { ++ printf ("%s\n", elf_errmsg (-1)); ++ return; ++ } ++ printf ("%08" PRIx32 " ", data); ++ ++ if ((data & GNU_PROPERTY_X86_FEATURE_1_IBT) ++ != 0) ++ { ++ printf ("IBT"); ++ data &= ~GNU_PROPERTY_X86_FEATURE_1_IBT; ++ if (data != 0) ++ printf (" "); ++ } ++ ++ if ((data & GNU_PROPERTY_X86_FEATURE_1_SHSTK) ++ != 0) ++ { ++ printf ("SHSTK"); ++ data &= ~GNU_PROPERTY_X86_FEATURE_1_SHSTK; ++ if (data != 0) ++ printf (" "); ++ } ++ ++ if (data != 0) ++ printf ("UNKNOWN"); ++ } ++ else ++ printf ("", ++ prop.pr_datasz); ++ ++ printf ("\n"); ++ } ++ else ++ { ++ printf ("%#" PRIx32, prop.pr_type); ++ if (prop.pr_datasz > 0) ++ { ++ printf (" data: "); ++ size_t i; ++ for (i = 0; i < prop.pr_datasz - 1; i++) ++ printf ("%02" PRIx8 " ", (uint8_t) desc[i]); ++ printf ("%02" PRIx8 "\n", (uint8_t) desc[i]); ++ } ++ } ++ } ++ else ++ { ++ if (prop.pr_type >= GNU_PROPERTY_LOPROC ++ && prop.pr_type <= GNU_PROPERTY_HIPROC) ++ printf ("proc_type %#" PRIx32, prop.pr_type); ++ else if (prop.pr_type >= GNU_PROPERTY_LOUSER ++ && prop.pr_type <= GNU_PROPERTY_HIUSER) ++ printf ("app_type %#" PRIx32, prop.pr_type); ++ else ++ printf ("unknown_type %#" PRIx32, prop.pr_type); ++ ++ if (prop.pr_datasz > 0) ++ { ++ printf (" data: "); ++ size_t i; ++ for (i = 0; i < prop.pr_datasz - 1; i++) ++ printf ("%02" PRIx8 " ", (uint8_t) desc[i]); ++ printf ("%02" PRIx8 "\n", (uint8_t) desc[i]); ++ } ++ } ++ if (elfclass == ELFCLASS32) ++ { ++ desc += NOTE_ALIGN4 (prop.pr_datasz); ++ descsz -= NOTE_ALIGN4 (prop.pr_datasz); ++ } ++ else ++ { ++ desc += NOTE_ALIGN8 (prop.pr_datasz); ++ descsz -= NOTE_ALIGN8 (prop.pr_datasz); ++ } ++ } ++ } ++ break; ++ + case NT_GNU_ABI_TAG: + if (strcmp (name, "GNU") == 0 && descsz >= 8 && descsz % 4 == 0) + { +diff --git a/libebl/eblobjnotetypename.c b/libebl/eblobjnotetypename.c +index db040d2..af23cae 100644 +--- a/libebl/eblobjnotetypename.c ++++ b/libebl/eblobjnotetypename.c +@@ -91,6 +91,7 @@ ebl_object_note_type_name (Ebl *ebl, const char *name, uint32_t type, + KNOWNSTYPE (GNU_HWCAP), + KNOWNSTYPE (GNU_BUILD_ID), + KNOWNSTYPE (GNU_GOLD_VERSION), ++ KNOWNSTYPE (GNU_PROPERTY_TYPE_0), + }; + + /* Handle standard names. */ +diff --git a/libelf/elf32_xlatetom.c b/libelf/elf32_xlatetom.c +index 13cd485..3b94cac 100644 +--- a/libelf/elf32_xlatetom.c ++++ b/libelf/elf32_xlatetom.c +@@ -60,7 +60,7 @@ elfw2(LIBELFBITS, xlatetom) (Elf_Data *dest, const Elf_Data *src, + /* We shouldn't require integer number of records when processing + notes. Payload bytes follow the header immediately, it's not an + array of records as is the case otherwise. */ +- if (src->d_type != ELF_T_NHDR ++ if (src->d_type != ELF_T_NHDR && src->d_type != ELF_T_NHDR8 + && src->d_size % recsize != 0) + { + __libelf_seterrno (ELF_E_INVALID_DATA); +diff --git a/libelf/elf_compress.c b/libelf/elf_compress.c +index 711be59..fd412e8 100644 +--- a/libelf/elf_compress.c ++++ b/libelf/elf_compress.c +@@ -513,7 +513,8 @@ elf_compress (Elf_Scn *scn, int type, unsigned int flags) + + __libelf_reset_rawdata (scn, scn->zdata_base, + scn->zdata_size, scn->zdata_align, +- __libelf_data_type (elf, sh_type)); ++ __libelf_data_type (elf, sh_type, ++ scn->zdata_align)); + + return 1; + } +diff --git a/libelf/elf_compress_gnu.c b/libelf/elf_compress_gnu.c +index dfa7c57..198dc7d 100644 +--- a/libelf/elf_compress_gnu.c ++++ b/libelf/elf_compress_gnu.c +@@ -196,7 +196,7 @@ elf_compress_gnu (Elf_Scn *scn, int inflate, unsigned int flags) + } + + __libelf_reset_rawdata (scn, buf_out, size, sh_addralign, +- __libelf_data_type (elf, sh_type)); ++ __libelf_data_type (elf, sh_type, sh_addralign)); + + scn->zdata_base = buf_out; + +diff --git a/libelf/elf_getdata.c b/libelf/elf_getdata.c +index 278dfa8..4f80aaf 100644 +--- a/libelf/elf_getdata.c ++++ b/libelf/elf_getdata.c +@@ -65,7 +65,7 @@ static const Elf_Type shtype_map[EV_NUM - 1][TYPEIDX (SHT_HISUNW) + 1] = + [SHT_PREINIT_ARRAY] = ELF_T_ADDR, + [SHT_GROUP] = ELF_T_WORD, + [SHT_SYMTAB_SHNDX] = ELF_T_WORD, +- [SHT_NOTE] = ELF_T_NHDR, ++ [SHT_NOTE] = ELF_T_NHDR, /* Need alignment to guess ELF_T_NHDR8. */ + [TYPEIDX (SHT_GNU_verdef)] = ELF_T_VDEF, + [TYPEIDX (SHT_GNU_verneed)] = ELF_T_VNEED, + [TYPEIDX (SHT_GNU_versym)] = ELF_T_HALF, +@@ -106,6 +106,7 @@ const uint_fast8_t __libelf_type_aligns[EV_NUM - 1][ELFCLASSNUM - 1][ELF_T_NUM] + [ELF_T_GNUHASH] = __alignof__ (Elf32_Word), \ + [ELF_T_AUXV] = __alignof__ (ElfW2(Bits,auxv_t)), \ + [ELF_T_CHDR] = __alignof__ (ElfW2(Bits,Chdr)), \ ++ [ELF_T_NHDR8] = 8 /* Special case for GNU Property note. */ \ + } + [EV_CURRENT - 1] = + { +@@ -118,7 +119,7 @@ const uint_fast8_t __libelf_type_aligns[EV_NUM - 1][ELFCLASSNUM - 1][ELF_T_NUM] + + Elf_Type + internal_function +-__libelf_data_type (Elf *elf, int sh_type) ++__libelf_data_type (Elf *elf, int sh_type, GElf_Xword align) + { + /* Some broken ELF ABI for 64-bit machines use the wrong hash table + entry size. See elf-knowledge.h for more information. */ +@@ -129,7 +130,13 @@ __libelf_data_type (Elf *elf, int sh_type) + return (SH_ENTSIZE_HASH (ehdr) == 4 ? ELF_T_WORD : ELF_T_XWORD); + } + else +- return shtype_map[LIBELF_EV_IDX][TYPEIDX (sh_type)]; ++ { ++ Elf_Type t = shtype_map[LIBELF_EV_IDX][TYPEIDX (sh_type)]; ++ /* Special case for GNU Property notes. */ ++ if (t == ELF_T_NHDR && align == 8) ++ t = ELF_T_NHDR8; ++ return t; ++ } + } + + /* Convert the data in the current section. */ +@@ -272,7 +279,9 @@ __libelf_set_rawdata_wrlock (Elf_Scn *scn) + else + { + Elf_Type t = shtype_map[LIBELF_EV_IDX][TYPEIDX (type)]; +- if (t == ELF_T_VDEF || t == ELF_T_NHDR ++ if (t == ELF_T_NHDR && align == 8) ++ t = ELF_T_NHDR8; ++ if (t == ELF_T_VDEF || t == ELF_T_NHDR || t == ELF_T_NHDR8 + || (t == ELF_T_GNUHASH && elf->class == ELFCLASS64)) + entsize = 1; + else +@@ -357,7 +366,7 @@ __libelf_set_rawdata_wrlock (Elf_Scn *scn) + if ((flags & SHF_COMPRESSED) != 0) + scn->rawdata.d.d_type = ELF_T_CHDR; + else +- scn->rawdata.d.d_type = __libelf_data_type (elf, type); ++ scn->rawdata.d.d_type = __libelf_data_type (elf, type, align); + scn->rawdata.d.d_off = 0; + + /* Make sure the alignment makes sense. d_align should be aligned both +diff --git a/libelf/gelf_fsize.c b/libelf/gelf_fsize.c +index 0c50926..d04ec5d 100644 +--- a/libelf/gelf_fsize.c ++++ b/libelf/gelf_fsize.c +@@ -64,6 +64,8 @@ const size_t __libelf_type_sizes[EV_NUM - 1][ELFCLASSNUM - 1][ELF_T_NUM] = + [ELF_T_VNEED] = sizeof (ElfW2(LIBELFBITS, Ext_Verneed)), \ + [ELF_T_VNAUX] = sizeof (ElfW2(LIBELFBITS, Ext_Vernaux)), \ + [ELF_T_NHDR] = sizeof (ElfW2(LIBELFBITS, Ext_Nhdr)), \ ++ /* Note the header size is the same, but padding is different. */ \ ++ [ELF_T_NHDR8] = sizeof (ElfW2(LIBELFBITS, Ext_Nhdr)), \ + [ELF_T_SYMINFO] = sizeof (ElfW2(LIBELFBITS, Ext_Syminfo)), \ + [ELF_T_MOVE] = sizeof (ElfW2(LIBELFBITS, Ext_Move)), \ + [ELF_T_LIB] = sizeof (ElfW2(LIBELFBITS, Ext_Lib)), \ +diff --git a/libelf/gelf_getnote.c b/libelf/gelf_getnote.c +index c75edda..6d33b35 100644 +--- a/libelf/gelf_getnote.c ++++ b/libelf/gelf_getnote.c +@@ -1,5 +1,5 @@ + /* Get note information at the supplied offset. +- Copyright (C) 2007, 2014, 2015 Red Hat, Inc. ++ Copyright (C) 2007, 2014, 2015, 2018 Red Hat, Inc. + This file is part of elfutils. + + This file is free software; you can redistribute it and/or modify +@@ -43,7 +43,7 @@ gelf_getnote (Elf_Data *data, size_t offset, GElf_Nhdr *result, + if (data == NULL) + return 0; + +- if (unlikely (data->d_type != ELF_T_NHDR)) ++ if (unlikely (data->d_type != ELF_T_NHDR && data->d_type != ELF_T_NHDR8)) + { + __libelf_seterrno (ELF_E_INVALID_HANDLE); + return 0; +@@ -69,27 +69,42 @@ gelf_getnote (Elf_Data *data, size_t offset, GElf_Nhdr *result, + const GElf_Nhdr *n = data->d_buf + offset; + offset += sizeof *n; + +- /* Include padding. Check below for overflow. */ +- GElf_Word namesz = NOTE_ALIGN (n->n_namesz); +- GElf_Word descsz = NOTE_ALIGN (n->n_descsz); +- +- if (unlikely (offset > data->d_size +- || data->d_size - offset < namesz +- || (namesz == 0 && n->n_namesz != 0))) ++ if (offset > data->d_size) + offset = 0; + else + { ++ /* This is slightly tricky, offset is guaranteed to be 4 ++ byte aligned, which is what we need for the name_offset. ++ And normally desc_offset is also 4 byte aligned, but not ++ for GNU Property notes, then it should be 8. So align ++ the offset, after adding the namesz, and include padding ++ in descsz to get to the end. */ + *name_offset = offset; +- offset += namesz; +- if (unlikely (offset > data->d_size +- || data->d_size - offset < descsz +- || (descsz == 0 && n->n_descsz != 0))) ++ offset += n->n_namesz; ++ if (offset > data->d_size) + offset = 0; + else + { +- *desc_offset = offset; +- offset += descsz; +- *result = *n; ++ /* Include padding. Check below for overflow. */ ++ GElf_Word descsz = (data->d_type == ELF_T_NHDR8 ++ ? NOTE_ALIGN8 (n->n_descsz) ++ : NOTE_ALIGN4 (n->n_descsz)); ++ ++ if (data->d_type == ELF_T_NHDR8) ++ offset = NOTE_ALIGN8 (offset); ++ else ++ offset = NOTE_ALIGN4 (offset); ++ ++ if (unlikely (offset > data->d_size ++ || data->d_size - offset < descsz ++ || (descsz == 0 && n->n_descsz != 0))) ++ offset = 0; ++ else ++ { ++ *desc_offset = offset; ++ offset += descsz; ++ *result = *n; ++ } + } + } + } +diff --git a/libelf/gelf_xlate.c b/libelf/gelf_xlate.c +index 479f143..b5d6ef3 100644 +--- a/libelf/gelf_xlate.c ++++ b/libelf/gelf_xlate.c +@@ -195,7 +195,8 @@ const xfct_t __elf_xfctstom[EV_NUM - 1][EV_NUM - 1][ELFCLASSNUM - 1][ELF_T_NUM] + [ELF_T_VDAUX] = elf_cvt_Verdef, \ + [ELF_T_VNEED] = elf_cvt_Verneed, \ + [ELF_T_VNAUX] = elf_cvt_Verneed, \ +- [ELF_T_NHDR] = elf_cvt_note, \ ++ [ELF_T_NHDR] = elf_cvt_note4, \ ++ [ELF_T_NHDR8] = elf_cvt_note8, \ + [ELF_T_SYMINFO] = ElfW2(Bits, cvt_Syminfo), \ + [ELF_T_MOVE] = ElfW2(Bits, cvt_Move), \ + [ELF_T_LIB] = ElfW2(Bits, cvt_Lib), \ +diff --git a/libelf/libelf.h b/libelf/libelf.h +index d11358c..1ff11c9 100644 +--- a/libelf/libelf.h ++++ b/libelf/libelf.h +@@ -117,6 +117,8 @@ typedef enum + ELF_T_GNUHASH, /* GNU-style hash section. */ + ELF_T_AUXV, /* Elf32_auxv_t, Elf64_auxv_t, ... */ + ELF_T_CHDR, /* Compressed, Elf32_Chdr, Elf64_Chdr, ... */ ++ ELF_T_NHDR8, /* Special GNU Properties note. Same as Nhdr, ++ except padding. */ + /* Keep this the last entry. */ + ELF_T_NUM + } Elf_Type; +diff --git a/libelf/libelfP.h b/libelf/libelfP.h +index ed216c8..fa6d55d 100644 +--- a/libelf/libelfP.h ++++ b/libelf/libelfP.h +@@ -452,7 +452,8 @@ extern const uint_fast8_t __libelf_type_aligns[EV_NUM - 1][ELFCLASSNUM - 1][ELF_ + /* Given an Elf handle and a section type returns the Elf_Data d_type. + Should not be called when SHF_COMPRESSED is set, the d_type should + be ELF_T_BYTE. */ +-extern Elf_Type __libelf_data_type (Elf *elf, int sh_type) internal_function; ++extern Elf_Type __libelf_data_type (Elf *elf, int sh_type, GElf_Xword align) ++ internal_function; + + /* The libelf API does not have such a function but it is still useful. + Get the memory size for the given type. +@@ -624,8 +625,13 @@ extern void __libelf_reset_rawdata (Elf_Scn *scn, void *buf, size_t size, + } \ + } while (0) + +-/* Align offset to 4 bytes as needed for note name and descriptor data. */ +-#define NOTE_ALIGN(n) (((n) + 3) & -4U) ++/* Align offset to 4 bytes as needed for note name and descriptor data. ++ This is almost always used, except for GNU Property notes, which use ++ 8 byte padding... */ ++#define NOTE_ALIGN4(n) (((n) + 3) & -4U) ++ ++/* Special note padding rule for GNU Property notes. */ ++#define NOTE_ALIGN8(n) (((n) + 7) & -8U) + + /* Convenience macro. */ + #define INVALID_NDX(ndx, type, data) \ +diff --git a/libelf/note_xlate.h b/libelf/note_xlate.h +index 62c6f63..9bdc3e2 100644 +--- a/libelf/note_xlate.h ++++ b/libelf/note_xlate.h +@@ -1,5 +1,5 @@ + /* Conversion functions for notes. +- Copyright (C) 2007, 2009, 2014 Red Hat, Inc. ++ Copyright (C) 2007, 2009, 2014, 2018 Red Hat, Inc. + This file is part of elfutils. + + This file is free software; you can redistribute it and/or modify +@@ -27,38 +27,60 @@ + not, see . */ + + static void +-elf_cvt_note (void *dest, const void *src, size_t len, int encode) ++elf_cvt_note (void *dest, const void *src, size_t len, int encode, ++ bool nhdr8) + { ++ /* Note that the header is always the same size, but the padding ++ differs for GNU Property notes. */ + assert (sizeof (Elf32_Nhdr) == sizeof (Elf64_Nhdr)); + + while (len >= sizeof (Elf32_Nhdr)) + { ++ /* Convert the header. */ + (1 ? Elf32_cvt_Nhdr : Elf64_cvt_Nhdr) (dest, src, sizeof (Elf32_Nhdr), + encode); + const Elf32_Nhdr *n = encode ? src : dest; +- Elf32_Word namesz = NOTE_ALIGN (n->n_namesz); +- Elf32_Word descsz = NOTE_ALIGN (n->n_descsz); + +- len -= sizeof *n; +- src += sizeof *n; +- dest += sizeof *n; ++ size_t note_len = sizeof *n; + +- if (namesz > len) ++ /* desc needs to be aligned. */ ++ note_len += n->n_namesz; ++ note_len = nhdr8 ? NOTE_ALIGN8 (note_len) : NOTE_ALIGN4 (note_len); ++ if (note_len > len || note_len < 8) + break; +- len -= namesz; +- if (descsz > len) ++ ++ /* data as a whole needs to be aligned. */ ++ note_len += n->n_descsz; ++ note_len = nhdr8 ? NOTE_ALIGN8 (note_len) : NOTE_ALIGN4 (note_len); ++ if (note_len > len || note_len < 8) + break; +- len -= descsz; + ++ /* Copy or skip the note data. */ ++ size_t note_data_len = note_len - sizeof *n; ++ src += sizeof *n; ++ dest += sizeof *n; + if (src != dest) +- memcpy (dest, src, namesz + descsz); ++ memcpy (dest, src, note_data_len); + +- src += namesz + descsz; +- dest += namesz + descsz; ++ src += note_data_len; ++ dest += note_data_len; ++ len -= note_len; + } + +- /* Copy opver any leftover data unconcerted. Probably part of ++ /* Copy over any leftover data unconverted. Probably part of + truncated name/desc data. */ + if (unlikely (len > 0) && src != dest) + memcpy (dest, src, len); + } ++ ++static void ++elf_cvt_note4 (void *dest, const void *src, size_t len, int encode) ++{ ++ elf_cvt_note (dest, src, len, encode, false); ++} ++ ++static void ++elf_cvt_note8 (void *dest, const void *src, size_t len, int encode) ++{ ++ elf_cvt_note (dest, src, len, encode, true); ++} +diff --git a/src/elflint.c b/src/elflint.c +index 3d44595..fa3af4c 100644 +--- a/src/elflint.c ++++ b/src/elflint.c +@@ -4331,6 +4331,7 @@ section [%2d] '%s': unknown core file note type %" PRIu32 + case NT_GNU_HWCAP: + case NT_GNU_BUILD_ID: + case NT_GNU_GOLD_VERSION: ++ case NT_GNU_PROPERTY_TYPE_0: + break; + + case 0: +@@ -4376,7 +4377,8 @@ phdr[%d]: no note entries defined for the type of file\n"), + GElf_Off notes_size = 0; + Elf_Data *data = elf_getdata_rawchunk (ebl->elf, + phdr->p_offset, phdr->p_filesz, +- ELF_T_NHDR); ++ (phdr->p_align == 8 ++ ? ELF_T_NHDR8 : ELF_T_NHDR)); + if (data != NULL && data->d_buf != NULL) + notes_size = check_note_data (ebl, ehdr, data, 0, cnt, phdr->p_offset); + +diff --git a/src/readelf.c b/src/readelf.c +index 72ae04e..ccd07eb 100644 +--- a/src/readelf.c ++++ b/src/readelf.c +@@ -12300,7 +12300,8 @@ handle_notes (Ebl *ebl, GElf_Ehdr *ehdr) + handle_notes_data (ebl, ehdr, phdr->p_offset, + elf_getdata_rawchunk (ebl->elf, + phdr->p_offset, phdr->p_filesz, +- ELF_T_NHDR)); ++ (phdr->p_align == 8 ++ ? ELF_T_NHDR8 : ELF_T_NHDR))); + } + } + diff --git a/SOURCES/elfutils-0.174-gnu-props-32.patch b/SOURCES/elfutils-0.174-gnu-props-32.patch new file mode 100644 index 0000000..ff9305b --- /dev/null +++ b/SOURCES/elfutils-0.174-gnu-props-32.patch @@ -0,0 +1,58 @@ +commit e8b9832af19e5975fb2a9dbe729eaba0373c781f +Author: Mark Wielaard +Date: Mon Dec 3 00:03:39 2018 +0100 + + libebl: Fix reading GNU_PROPERTY_STACK_SIZE reading from 32bit notes. + + When reading a GNU_PROPERTY_STACK_SIZE we need to use the proper data + type. GElf_Addr is 64bit always and when reading a 32bit size part of + it would not be initialized. Use either Elf32_Addr or Elf64_Addr to + read and print the data. + + Add 32bit and 64bit, little and big endian testcases. + + Signed-off-by: Mark Wielaard + +diff --git a/libebl/eblobjnote.c b/libebl/eblobjnote.c +index 58ac86d..c19ea37 100644 +--- a/libebl/eblobjnote.c ++++ b/libebl/eblobjnote.c +@@ -360,15 +360,22 @@ ebl_object_note (Ebl *ebl, uint32_t namesz, const char *name, uint32_t type, + if (prop.pr_type == GNU_PROPERTY_STACK_SIZE) + { + printf ("STACK_SIZE "); +- if (prop.pr_datasz == 4 || prop.pr_datasz == 8) ++ union ++ { ++ Elf64_Addr a64; ++ Elf32_Addr a32; ++ } addr; ++ if ((elfclass == ELFCLASS32 && prop.pr_datasz == 4) ++ || (elfclass == ELFCLASS64 && prop.pr_datasz == 8)) + { +- GElf_Addr addr; + in.d_type = ELF_T_ADDR; + out.d_type = ELF_T_ADDR; + in.d_size = prop.pr_datasz; +- out.d_size = sizeof (addr); ++ out.d_size = prop.pr_datasz; + in.d_buf = (void *) desc; +- out.d_buf = (void *) &addr; ++ out.d_buf = (elfclass == ELFCLASS32 ++ ? (void *) &addr.a32 ++ : (void *) &addr.a64); + + if (gelf_xlatetom (ebl->elf, &out, &in, + elfident[EI_DATA]) == NULL) +@@ -376,7 +383,10 @@ ebl_object_note (Ebl *ebl, uint32_t namesz, const char *name, uint32_t type, + printf ("%s\n", elf_errmsg (-1)); + return; + } +- printf ("%#" PRIx64 "\n", addr); ++ if (elfclass == ELFCLASS32) ++ printf ("%#" PRIx32 "\n", addr.a32); ++ else ++ printf ("%#" PRIx64 "\n", addr.a64); + } + else + printf (" (garbage datasz: %" PRIx32 ")\n", diff --git a/SOURCES/elfutils-0.174-libdwfl-sanity-check-core-reads.patch b/SOURCES/elfutils-0.174-libdwfl-sanity-check-core-reads.patch new file mode 100644 index 0000000..19dda87 --- /dev/null +++ b/SOURCES/elfutils-0.174-libdwfl-sanity-check-core-reads.patch @@ -0,0 +1,51 @@ +commit 20f9de9b5f704cec55df92406a50bcbcfca96acd +Author: Mark Wielaard +Date: Sun Oct 14 16:45:48 2018 +0200 + + libdwfl: Sanity check partial core file data reads. + + There were two issues when reading note data from a core file. + We didn't check if the data we already had in a buffer was big + enough. And if we did get the data, we should check if we got + everything, or just a part of the data. + + https://sourceware.org/bugzilla/show_bug.cgi?id=23752 + + Signed-off-by: Mark Wielaard + +diff --git a/libdwfl/dwfl_segment_report_module.c b/libdwfl/dwfl_segment_report_module.c +index 36e5c82..8749884 100644 +--- a/libdwfl/dwfl_segment_report_module.c ++++ b/libdwfl/dwfl_segment_report_module.c +@@ -1,5 +1,5 @@ + /* Sniff out modules from ELF headers visible in memory segments. +- Copyright (C) 2008-2012, 2014, 2015 Red Hat, Inc. ++ Copyright (C) 2008-2012, 2014, 2015, 2018 Red Hat, Inc. + This file is part of elfutils. + + This file is free software; you can redistribute it and/or modify +@@ -301,7 +301,10 @@ dwfl_segment_report_module (Dwfl *dwfl, int ndx, const char *name, + inline bool read_portion (void **data, size_t *data_size, + GElf_Addr vaddr, size_t filesz) + { +- if (vaddr - start + filesz > buffer_available ++ /* Check whether we will have to read the segment data, or if it ++ can be returned from the existing buffer. */ ++ if (filesz > buffer_available ++ || vaddr - start > buffer_available - filesz + /* If we're in string mode, then don't consider the buffer we have + sufficient unless it contains the terminator of the string. */ + || (filesz == 0 && memchr (vaddr - start + buffer, '\0', +@@ -459,6 +462,12 @@ dwfl_segment_report_module (Dwfl *dwfl, int ndx, const char *name, + if (read_portion (&data, &data_size, vaddr, filesz)) + return; + ++ /* data_size will be zero if we got everything from the initial ++ buffer, otherwise it will be the size of the new buffer that ++ could be read. */ ++ if (data_size != 0) ++ filesz = data_size; ++ + assert (sizeof (Elf32_Nhdr) == sizeof (Elf64_Nhdr)); + + void *notes; diff --git a/SOURCES/elfutils-0.174-size-rec-ar.patch b/SOURCES/elfutils-0.174-size-rec-ar.patch new file mode 100644 index 0000000..091fa49 --- /dev/null +++ b/SOURCES/elfutils-0.174-size-rec-ar.patch @@ -0,0 +1,31 @@ +commit 22d2d082d57a7470fadc0eae67179553f4919209 +Author: Mark Wielaard +Date: Thu Oct 18 23:15:48 2018 +0200 + + size: Handle recursive ELF ar files. + + eu-size didn't handle an ELF ar file that contained an ar file itself + correctly. handle_ar would recursively call itself but close the ELF + file before returning. Only close the ELF file at the top-level. + + https://sourceware.org/bugzilla/show_bug.cgi?id=23787 + + Signed-off-by: Mark Wielaard + +diff --git a/src/size.c b/src/size.c +index 5ff3f2a..f01fd88 100644 +--- a/src/size.c ++++ b/src/size.c +@@ -374,8 +374,10 @@ handle_ar (int fd, Elf *elf, const char *prefix, const char *fname) + INTERNAL_ERROR (fname); + } + +- if (unlikely (elf_end (elf) != 0)) +- INTERNAL_ERROR (fname); ++ /* Only close ELF handle if this was a "top level" ar file. */ ++ if (prefix == NULL) ++ if (unlikely (elf_end (elf) != 0)) ++ INTERNAL_ERROR (fname); + + return result; + } diff --git a/SOURCES/elfutils-0.174-strip-unstrip-group.patch b/SOURCES/elfutils-0.174-strip-unstrip-group.patch new file mode 100644 index 0000000..2fd9919 --- /dev/null +++ b/SOURCES/elfutils-0.174-strip-unstrip-group.patch @@ -0,0 +1,226 @@ +commit c06ab0bbb4761a69d2f188675d21d1a9131e9ecb +Author: Mark Wielaard +Date: Sat Oct 13 10:27:47 2018 +0200 + + strip, unstrip: Handle SHT_GROUP correctly. + + The usage of annobin in Fedora showed a couple of bugs when using + eu-strip and eu-unstrip on ET_REL files that contain multiple group + sections. + + When stripping we should not remove the SHF_GROUP flag from sections + even if the group section itself might be removed. Either the section + itself gets removed, and so the flag doesn't matter. Or it gets moved + together with the group section into the debug file, and then it still + needs to have the flag set. Also we would "renumber" the section group + flag field (which isn't a section index, and so shouldn't be changed). + + Often the group sections have the exact same name (".group"), flags + (none) and sometimes the same sizes. Which makes matching them hard. + Extract the group signature and compare those when comparing two + group sections. + + Signed-off-by: Mark Wielaard + +diff --git a/src/strip.c b/src/strip.c +index 1f7b3ca..fdebc5e 100644 +--- a/src/strip.c ++++ b/src/strip.c +@@ -792,9 +792,13 @@ handle_elf (int fd, Elf *elf, const char *prefix, const char *fname, + + if (shdr_info[shdr_info[cnt].group_idx].idx == 0) + { +- /* The section group section will be removed. */ ++ /* The section group section might be removed. ++ Don't remove the SHF_GROUP flag. The section is ++ either also removed, in which case the flag doesn't matter. ++ Or it moves with the group into the debug file, then ++ it will be reconnected with the new group and should ++ still have the flag set. */ + shdr_info[cnt].group_idx = 0; +- shdr_info[cnt].shdr.sh_flags &= ~SHF_GROUP; + } + } + +@@ -1368,7 +1372,9 @@ handle_elf (int fd, Elf *elf, const char *prefix, const char *fname, + && shdr_info[cnt].data->d_buf != NULL); + + Elf32_Word *grpref = (Elf32_Word *) shdr_info[cnt].data->d_buf; +- for (size_t inner = 0; ++ /* First word is the section group flag. ++ Followed by section indexes, that need to be renumbered. */ ++ for (size_t inner = 1; + inner < shdr_info[cnt].data->d_size / sizeof (Elf32_Word); + ++inner) + if (grpref[inner] < shnum) +diff --git a/src/unstrip.c b/src/unstrip.c +index e6f0947..03a0346 100644 +--- a/src/unstrip.c ++++ b/src/unstrip.c +@@ -696,6 +696,7 @@ struct section + { + Elf_Scn *scn; + const char *name; ++ const char *sig; + Elf_Scn *outscn; + Dwelf_Strent *strent; + GElf_Shdr shdr; +@@ -720,7 +721,8 @@ compare_alloc_sections (const struct section *s1, const struct section *s2, + + static int + compare_unalloc_sections (const GElf_Shdr *shdr1, const GElf_Shdr *shdr2, +- const char *name1, const char *name2) ++ const char *name1, const char *name2, ++ const char *sig1, const char *sig2) + { + /* Sort by sh_flags as an arbitrary ordering. */ + if (shdr1->sh_flags < shdr2->sh_flags) +@@ -734,6 +736,10 @@ compare_unalloc_sections (const GElf_Shdr *shdr1, const GElf_Shdr *shdr2, + if (shdr1->sh_size > shdr2->sh_size) + return 1; + ++ /* Are they both SHT_GROUP sections? Then compare signatures. */ ++ if (sig1 != NULL && sig2 != NULL) ++ return strcmp (sig1, sig2); ++ + /* Sort by name as last resort. */ + return strcmp (name1, name2); + } +@@ -751,7 +757,8 @@ compare_sections (const void *a, const void *b, bool rel) + return ((s1->shdr.sh_flags & SHF_ALLOC) + ? compare_alloc_sections (s1, s2, rel) + : compare_unalloc_sections (&s1->shdr, &s2->shdr, +- s1->name, s2->name)); ++ s1->name, s2->name, ++ s1->sig, s2->sig)); + } + + static int +@@ -986,6 +993,44 @@ get_section_name (size_t ndx, const GElf_Shdr *shdr, const Elf_Data *shstrtab) + return shstrtab->d_buf + shdr->sh_name; + } + ++/* Returns the signature of a group section, or NULL if the given ++ section isn't a group. */ ++static const char * ++get_group_sig (Elf *elf, GElf_Shdr *shdr) ++{ ++ if (shdr->sh_type != SHT_GROUP) ++ return NULL; ++ ++ Elf_Scn *symscn = elf_getscn (elf, shdr->sh_link); ++ if (symscn == NULL) ++ error (EXIT_FAILURE, 0, _("bad sh_link for group section: %s"), ++ elf_errmsg (-1)); ++ ++ GElf_Shdr symshdr_mem; ++ GElf_Shdr *symshdr = gelf_getshdr (symscn, &symshdr_mem); ++ if (symshdr == NULL) ++ error (EXIT_FAILURE, 0, _("couldn't get shdr for group section: %s"), ++ elf_errmsg (-1)); ++ ++ Elf_Data *symdata = elf_getdata (symscn, NULL); ++ if (symdata == NULL) ++ error (EXIT_FAILURE, 0, _("bad data for group symbol section: %s"), ++ elf_errmsg (-1)); ++ ++ GElf_Sym sym_mem; ++ GElf_Sym *sym = gelf_getsym (symdata, shdr->sh_info, &sym_mem); ++ if (sym == NULL) ++ error (EXIT_FAILURE, 0, _("couldn't get symbol for group section: %s"), ++ elf_errmsg (-1)); ++ ++ const char *sig = elf_strptr (elf, symshdr->sh_link, sym->st_name); ++ if (sig == NULL) ++ error (EXIT_FAILURE, 0, _("bad symbol name for group section: %s"), ++ elf_errmsg (-1)); ++ ++ return sig; ++} ++ + /* Fix things up when prelink has moved some allocated sections around + and the debuginfo file's section headers no longer match up. + This fills in SECTIONS[0..NALLOC-1].outscn or exits. +@@ -1111,6 +1156,7 @@ find_alloc_sections_prelink (Elf *debug, Elf_Data *debug_shstrtab, + sec->scn = elf_getscn (main, i + 1); /* Really just for ndx. */ + sec->outscn = NULL; + sec->strent = NULL; ++ sec->sig = get_group_sig (main, &sec->shdr); + ++undo_nalloc; + } + } +@@ -1336,6 +1382,7 @@ more sections in stripped file than debug file -- arguments reversed?")); + sections[i].scn = scn; + sections[i].outscn = NULL; + sections[i].strent = NULL; ++ sections[i].sig = get_group_sig (stripped, shdr); + } + + const struct section *stripped_symtab = NULL; +@@ -1354,7 +1401,8 @@ more sections in stripped file than debug file -- arguments reversed?")); + + /* Locate a matching unallocated section in SECTIONS. */ + inline struct section *find_unalloc_section (const GElf_Shdr *shdr, +- const char *name) ++ const char *name, ++ const char *sig) + { + size_t l = nalloc, u = stripped_shnum - 1; + while (l < u) +@@ -1362,7 +1410,8 @@ more sections in stripped file than debug file -- arguments reversed?")); + size_t i = (l + u) / 2; + struct section *sec = §ions[i]; + int cmp = compare_unalloc_sections (shdr, &sec->shdr, +- name, sec->name); ++ name, sec->name, ++ sig, sec->sig); + if (cmp < 0) + u = i; + else if (cmp > 0) +@@ -1435,7 +1484,8 @@ more sections in stripped file than debug file -- arguments reversed?")); + else + { + /* Look for the section that matches. */ +- sec = find_unalloc_section (shdr, name); ++ sec = find_unalloc_section (shdr, name, ++ get_group_sig (unstripped, shdr)); + if (sec == NULL) + { + /* An additional unallocated section is fine if not SHT_NOBITS. + +commit eee4269e53154daaf0251371aacd91ec5db3eb30 +Author: Mark Wielaard +Date: Sat Oct 13 10:27:47 2018 +0200 + + unstrip: Renumber the group section indexes. + + When unstripping we might need to renumber the group section indexes. + Just like we do when stripping. + + Signed-off-by: Mark Wielaard + +diff --git a/src/unstrip.c b/src/unstrip.c +index 03a0346..2cfd3b3 100644 +--- a/src/unstrip.c ++++ b/src/unstrip.c +@@ -1708,6 +1708,20 @@ more sections in stripped file than debug file -- arguments reversed?")); + if (shdr_mem.sh_type == SHT_DYNSYM) + stripped_dynsym = sec; + } ++ ++ if (shdr_mem.sh_type == SHT_GROUP) ++ { ++ /* We must adjust all the section indices in the group. ++ Skip the first word, which is the section group flag. ++ Everything else is a section index. */ ++ Elf32_Word *shndx = (Elf32_Word *) outdata->d_buf; ++ for (size_t i = 1; i < shdr_mem.sh_size / sizeof (Elf32_Word); ++i) ++ if (shndx[i] == SHN_UNDEF || shndx[i] >= stripped_shnum) ++ error (EXIT_FAILURE, 0, ++ _("group has invalid section index [%zd]"), i); ++ else ++ shndx[i] = ndx_section[shndx[i] - 1]; ++ } + } + + /* We may need to update the symbol table. */ diff --git a/SOURCES/elfutils-0.174-version-note.patch b/SOURCES/elfutils-0.174-version-note.patch new file mode 100644 index 0000000..fb33d83 --- /dev/null +++ b/SOURCES/elfutils-0.174-version-note.patch @@ -0,0 +1,156 @@ +commit 7a3f6fe60b8519b5372f5a5521ccbac59411f33f +Author: Mark Wielaard +Date: Sun Nov 11 23:50:41 2018 +0100 + + Recognize NT_VERSION notes. + + NT_VERSION notes are emitted by the gas .version directive. + They have an empty description and (ab)use the owner name to store the + version data string. + + Signed-off-by: Mark Wielaard + +diff --git a/libebl/eblobjnote.c b/libebl/eblobjnote.c +index 57e9f52..8fda7d9 100644 +--- a/libebl/eblobjnote.c ++++ b/libebl/eblobjnote.c +@@ -135,6 +135,14 @@ ebl_object_note (Ebl *ebl, const char *name, uint32_t type, + return; + } + ++ /* NT_VERSION doesn't have any info. All data is in the name. */ ++ if (descsz == 0 && type == NT_VERSION) ++ return; ++ ++ /* Everything else should have the "GNU" owner name. */ ++ if (strcmp ("GNU", name) != 0) ++ return; ++ + switch (type) + { + case NT_GNU_BUILD_ID: +@@ -337,7 +345,7 @@ ebl_object_note (Ebl *ebl, const char *name, uint32_t type, + break; + + case NT_GNU_ABI_TAG: +- if (strcmp (name, "GNU") == 0 && descsz >= 8 && descsz % 4 == 0) ++ if (descsz >= 8 && descsz % 4 == 0) + { + Elf_Data in = + { +diff --git a/libebl/eblobjnotetypename.c b/libebl/eblobjnotetypename.c +index af23cae..8cdd781 100644 +--- a/libebl/eblobjnotetypename.c ++++ b/libebl/eblobjnotetypename.c +@@ -39,6 +39,7 @@ + + const char * + ebl_object_note_type_name (Ebl *ebl, const char *name, uint32_t type, ++ GElf_Word descsz, + char *buf, size_t len) + { + const char *res = ebl->object_note_type_name (name, type, buf, len); +@@ -80,14 +81,19 @@ ebl_object_note_type_name (Ebl *ebl, const char *name, uint32_t type, + + if (strcmp (name, "GNU") != 0) + { ++ /* NT_VERSION is special, all data is in the name. */ ++ if (descsz == 0 && type == NT_VERSION) ++ return "VERSION"; ++ + snprintf (buf, len, "%s: %" PRIu32, gettext (""), type); + return buf; + } + ++ /* And finally all the "GNU" note types. */ + static const char *knowntypes[] = + { + #define KNOWNSTYPE(name) [NT_##name] = #name +- KNOWNSTYPE (VERSION), ++ KNOWNSTYPE (GNU_ABI_TAG), + KNOWNSTYPE (GNU_HWCAP), + KNOWNSTYPE (GNU_BUILD_ID), + KNOWNSTYPE (GNU_GOLD_VERSION), +diff --git a/libebl/libebl.h b/libebl/libebl.h +index a34fe48..5830654 100644 +--- a/libebl/libebl.h ++++ b/libebl/libebl.h +@@ -175,8 +175,8 @@ extern const char *ebl_core_note_type_name (Ebl *ebl, uint32_t type, char *buf, + + /* Return name of the note section type for an object file. */ + extern const char *ebl_object_note_type_name (Ebl *ebl, const char *name, +- uint32_t type, char *buf, +- size_t len); ++ uint32_t type, GElf_Word descsz, ++ char *buf, size_t len); + + /* Print information about object note if available. */ + extern void ebl_object_note (Ebl *ebl, const char *name, uint32_t type, +diff --git a/src/elflint.c b/src/elflint.c +index fa3af4c..dff74ee 100644 +--- a/src/elflint.c ++++ b/src/elflint.c +@@ -1,5 +1,5 @@ + /* Pedantic checking of ELF files compliance with gABI/psABI spec. +- Copyright (C) 2001-2015, 2017 Red Hat, Inc. ++ Copyright (C) 2001-2015, 2017, 2018 Red Hat, Inc. + This file is part of elfutils. + Written by Ulrich Drepper , 2001. + +@@ -4332,7 +4332,17 @@ section [%2d] '%s': unknown core file note type %" PRIu32 + case NT_GNU_BUILD_ID: + case NT_GNU_GOLD_VERSION: + case NT_GNU_PROPERTY_TYPE_0: +- break; ++ if (nhdr.n_namesz == sizeof ELF_NOTE_GNU ++ && strcmp (data->d_buf + name_offset, ELF_NOTE_GNU) == 0) ++ break; ++ else ++ { ++ /* NT_VERSION is 1, same as NT_GNU_ABI_TAG. It has no ++ descriptor and (ab)uses the name as version string. */ ++ if (nhdr.n_descsz == 0 && nhdr.n_type == NT_VERSION) ++ break; ++ } ++ goto unknown_note; + + case 0: + /* Linux vDSOs use a type 0 note for the kernel version word. */ +@@ -4341,16 +4351,21 @@ section [%2d] '%s': unknown core file note type %" PRIu32 + break; + FALLTHROUGH; + default: ++ { ++ unknown_note: + if (shndx == 0) + ERROR (gettext ("\ +-phdr[%d]: unknown object file note type %" PRIu32 " at offset %zu\n"), +- phndx, (uint32_t) nhdr.n_type, offset); ++phdr[%d]: unknown object file note type %" PRIu32 " with owner name '%s' at offset %zu\n"), ++ phndx, (uint32_t) nhdr.n_type, ++ (char *) data->d_buf + name_offset, offset); + else + ERROR (gettext ("\ + section [%2d] '%s': unknown object file note type %" PRIu32 +- " at offset %zu\n"), ++ " with owner name '%s' at offset %zu\n"), + shndx, section_name (ebl, shndx), +- (uint32_t) nhdr.n_type, offset); ++ (uint32_t) nhdr.n_type, ++ (char *) data->d_buf + name_offset, offset); ++ } + } + } + +diff --git a/src/readelf.c b/src/readelf.c +index c6c3fb3..659e34f 100644 +--- a/src/readelf.c ++++ b/src/readelf.c +@@ -12201,6 +12201,7 @@ handle_notes_data (Ebl *ebl, const GElf_Ehdr *ehdr, + ? ebl_core_note_type_name (ebl, nhdr.n_type, + buf, sizeof (buf)) + : ebl_object_note_type_name (ebl, name, nhdr.n_type, ++ nhdr.n_descsz, + buf2, sizeof (buf2))); + + /* Filter out invalid entries. */ diff --git a/SOURCES/elfutils-0.174-x86_64_unwind.patch b/SOURCES/elfutils-0.174-x86_64_unwind.patch new file mode 100644 index 0000000..b766517 --- /dev/null +++ b/SOURCES/elfutils-0.174-x86_64_unwind.patch @@ -0,0 +1,127 @@ +commit 825e48c4e942e3cbdab1b75c04b8c014867d66ab +Author: Milian Wolff +Date: Mon Oct 29 16:21:26 2018 +0100 + + Also find CFI in sections of type SHT_X86_64_UNWIND + + On my system with g++ (GCC) 8.2.1 20180831 with GNU gold (GNU Binutils + 2.31.1) 1.16, the .eh_frame section does not have type PROGBITS + but rather is using X86_64_UNWIND nowadays: + + ``` + $ echo "int main(){ return 0; }" > test.c + $ gcc test.c + $ readelf --sections a.out | grep .eh_frame + [14] .eh_frame X86_64_UNWIND 0000000000000670 00000670 + [15] .eh_frame_hdr X86_64_UNWIND 0000000000000724 00000724 + ``` + + Without this patch, libdw refuses to use the available unwind + information, leading to broken backtraces while unwinding. With the + patch applied, unwinding works once more in such situations. + + Signed-off-by: Milian Wolff + Signed-off-by: Mark Wielaard + Tested-by: Milian Wolff + +diff --git a/libdw/dwarf_getcfi_elf.c b/libdw/dwarf_getcfi_elf.c +index 315cc02..adcaea0 100644 +--- a/libdw/dwarf_getcfi_elf.c ++++ b/libdw/dwarf_getcfi_elf.c +@@ -298,7 +298,7 @@ getcfi_shdr (Elf *elf, const GElf_Ehdr *ehdr) + } + else if (!strcmp (name, ".eh_frame")) + { +- if (shdr->sh_type == SHT_PROGBITS) ++ if (shdr->sh_type != SHT_NOBITS) + return getcfi_scn_eh_frame (elf, ehdr, scn, shdr, + hdr_scn, hdr_vaddr); + else + +commit 4b0342b85b5b1a3d3636e06e3b5320954828dfb1 +Author: Mark Wielaard +Date: Tue Nov 6 12:01:25 2018 +0100 + + backends: Add x86_64 section_type_name for SHT_X86_64_UNWIND. + + Makes sure that eu-readelf and eu-elflint recognize and show the + x86_64 specific section type correctly. + + Signed-off-by: Mark Wielaard + Tested-by: Milian Wolff + +diff --git a/backends/x86_64_init.c b/backends/x86_64_init.c +index adfa479..49f6c6c 100644 +--- a/backends/x86_64_init.c ++++ b/backends/x86_64_init.c +@@ -1,5 +1,5 @@ + /* Initialization of x86-64 specific backend library. +- Copyright (C) 2002-2009, 2013 Red Hat, Inc. ++ Copyright (C) 2002-2009, 2013, 2018 Red Hat, Inc. + Copyright (C) H.J. Lu , 2015. + This file is part of elfutils. + Written by Ulrich Drepper , 2002. +@@ -55,6 +55,7 @@ x86_64_init (Elf *elf __attribute__ ((unused)), + eh->name = "AMD x86-64"; + x86_64_init_reloc (eh); + HOOK (eh, reloc_simple_type); ++ HOOK (eh, section_type_name); + if (eh->class == ELFCLASS32) + eh->core_note = x32_core_note; + else +diff --git a/backends/x86_64_symbol.c b/backends/x86_64_symbol.c +index e07b180..98457bc 100644 +--- a/backends/x86_64_symbol.c ++++ b/backends/x86_64_symbol.c +@@ -1,5 +1,5 @@ + /* x86_64 specific symbolic name handling. +- Copyright (C) 2002, 2005 Red Hat, Inc. ++ Copyright (C) 2002, 2005, 2018 Red Hat, Inc. + This file is part of elfutils. + Written by Ulrich Drepper , 2002. + +@@ -59,3 +59,15 @@ x86_64_reloc_simple_type (Ebl *ebl __attribute__ ((unused)), int type, + return ELF_T_NUM; + } + } ++ ++/* Return symbolic representation of section type. */ ++const char * ++x86_64_section_type_name (int type, ++ char *buf __attribute__ ((unused)), ++ size_t len __attribute__ ((unused))) ++{ ++ if (type == SHT_X86_64_UNWIND) ++ return "X86_64_UNWIND"; ++ ++ return NULL; ++} + +commit 22ec8efc1dd87cdc7892523457eb55990b967224 +Author: Mark Wielaard +Date: Sat Nov 10 23:33:03 2018 +0100 + + elflint: Allow PT_GNU_EH_FRAME segment to match SHT_X86_64_UNWIND section. + + The gold linker might generate an .eh_frame_hdr with a SHT_X86_64_UNWIND + type instead of a SHT_PROGBITS type. + + Signed-off-by: Mark Wielaard + +diff --git a/src/elflint.c b/src/elflint.c +index 184ca12..810c8bd 100644 +--- a/src/elflint.c ++++ b/src/elflint.c +@@ -4633,8 +4633,10 @@ program header offset in ELF header and PHDR entry do not match")); + any = true; + shdr = gelf_getshdr (scn, &shdr_mem); + if (shdr != NULL +- && shdr->sh_type == (is_debuginfo +- ? SHT_NOBITS : SHT_PROGBITS) ++ && ((is_debuginfo && shdr->sh_type == SHT_NOBITS) ++ || (! is_debuginfo ++ && (shdr->sh_type == SHT_PROGBITS ++ || shdr->sh_type == SHT_X86_64_UNWIND))) + && elf_strptr (ebl->elf, shstrndx, shdr->sh_name) != NULL + && ! strcmp (".eh_frame_hdr", + elf_strptr (ebl->elf, shstrndx, shdr->sh_name))) diff --git a/SPECS/elfutils.spec b/SPECS/elfutils.spec new file mode 100644 index 0000000..7ef9abb --- /dev/null +++ b/SPECS/elfutils.spec @@ -0,0 +1,1374 @@ +Name: elfutils +Summary: A collection of utilities and DSOs to handle ELF files and DWARF data +Version: 0.174 +%global baserelease 6 +URL: http://elfutils.org/ +%global source_url ftp://sourceware.org/pub/elfutils/%{version}/ +License: GPLv3+ and (GPLv2+ or LGPLv3+) +Group: Development/Tools + +Release: %{baserelease}%{?dist} + +%global provide_yama_scope 0 + +%if 0%{?fedora} >= 22 || 0%{?rhel} >= 7 +%global provide_yama_scope 1 +%endif + +%global depsuffix %{?_isa}%{!?_isa:-%{_arch}} + +Source: %{?source_url}%{name}-%{version}.tar.bz2 + +# Patches +Patch1: elfutils-0.173-new-notes-hack.patch +Patch2: elfutils-0.174-strip-unstrip-group.patch +Patch3: elfutils-0.174-libdwfl-sanity-check-core-reads.patch +Patch4: elfutils-0.174-size-rec-ar.patch +Patch5: elfutils-0.174-ar-sh_entsize-zero.patch +Patch6: elfutils-0.174-x86_64_unwind.patch +Patch7: elfutils-0.174-gnu-property-note.patch +Patch8: elfutils-0.174-version-note.patch +Patch9: elfutils-0.174-gnu-attribute-note.patch +Patch10: elfutils-0.174-gnu-props-32.patch + +Requires: elfutils-libelf%{depsuffix} = %{version}-%{release} +Requires: elfutils-libs%{depsuffix} = %{version}-%{release} + +BuildRequires: gettext +BuildRequires: bison >= 1.875 +BuildRequires: flex >= 2.5.4a +BuildRequires: bzip2 +BuildRequires: gcc >= 4.4 +# For libstdc++ demangle support +BuildRequires: gcc-c++ + +BuildRequires: zlib-devel >= 1.2.2.3 +BuildRequires: bzip2-devel +BuildRequires: xz-devel + +%global _gnu %{nil} +%global _program_prefix eu- + +# The lib[64]/elfutils directory contains the private ebl backend +# libraries. They must not be exposed as global provides. We don't +# need to filter the requires since they are only loaded with dlopen. +%if 0%{?fedora} >= 15 || 0%{?rhel} >= 7 +%global __provides_exclude ^libebl_.*\\.so.*$ +%endif + +%description +Elfutils is a collection of utilities, including stack (to show +backtraces), nm (for listing symbols from object files), size +(for listing the section sizes of an object or archive file), +strip (for discarding symbols), readelf (to see the raw ELF file +structures), elflint (to check for well-formed ELF files) and +elfcompress (to compress or decompress ELF sections). + + +%package libs +Summary: Libraries to handle compiled objects +Group: Development/Tools +License: GPLv2+ or LGPLv3+ +%if 0%{!?_isa:1} +Provides: elfutils-libs%{depsuffix} = %{version}-%{release} +%endif +Requires: elfutils-libelf%{depsuffix} = %{version}-%{release} +%if %{provide_yama_scope} +Requires: default-yama-scope +%endif + +%description libs +The elfutils-libs package contains libraries which implement DWARF, ELF, +and machine-specific ELF handling. These libraries are used by the programs +in the elfutils package. The elfutils-devel package enables building +other programs using these libraries. + +%package devel +Summary: Development libraries to handle compiled objects +Group: Development/Tools +License: GPLv2+ or LGPLv3+ +%if 0%{!?_isa:1} +Provides: elfutils-devel%{depsuffix} = %{version}-%{release} +%endif +Requires: elfutils-libs%{depsuffix} = %{version}-%{release} +Requires: elfutils-libelf-devel%{depsuffix} = %{version}-%{release} + +%description devel +The elfutils-devel package contains the libraries to create +applications for handling compiled objects. libebl provides some +higher-level ELF access functionality. libdw provides access to +the DWARF debugging information. libasm provides a programmable +assembler interface. + +%package devel-static +Summary: Static archives to handle compiled objects +Group: Development/Tools +License: GPLv2+ or LGPLv3+ +%if 0%{!?_isa:1} +Provides: elfutils-devel-static%{depsuffix} = %{version}-%{release} +%endif +Requires: elfutils-devel%{depsuffix} = %{version}-%{release} +Requires: elfutils-libelf-devel-static%{depsuffix} = %{version}-%{release} + +%description devel-static +The elfutils-devel-static package contains the static archives +with the code to handle compiled objects. + +%package libelf +Summary: Library to read and write ELF files +Group: Development/Tools +License: GPLv2+ or LGPLv3+ +%if 0%{!?_isa:1} +Provides: elfutils-libelf%{depsuffix} = %{version}-%{release} +%endif +Obsoletes: libelf <= 0.8.2-2 + +%description libelf +The elfutils-libelf package provides a DSO which allows reading and +writing ELF files on a high level. Third party programs depend on +this package to read internals of ELF files. The programs of the +elfutils package use it also to generate new ELF files. + +%package libelf-devel +Summary: Development support for libelf +Group: Development/Tools +License: GPLv2+ or LGPLv3+ +%if 0%{!?_isa:1} +Provides: elfutils-libelf-devel%{depsuffix} = %{version}-%{release} +%endif +Requires: elfutils-libelf%{depsuffix} = %{version}-%{release} +Obsoletes: libelf-devel <= 0.8.2-2 + +%description libelf-devel +The elfutils-libelf-devel package contains the libraries to create +applications for handling compiled objects. libelf allows you to +access the internals of the ELF object file format, so you can see the +different sections of an ELF file. + +%package libelf-devel-static +Summary: Static archive of libelf +Group: Development/Tools +License: GPLv2+ or LGPLv3+ +%if 0%{!?_isa:1} +Provides: elfutils-libelf-devel-static%{depsuffix} = %{version}-%{release} +%endif +Requires: elfutils-libelf-devel%{depsuffix} = %{version}-%{release} + +%description libelf-devel-static +The elfutils-libelf-static package contains the static archive +for libelf. + +%if %{provide_yama_scope} +%package default-yama-scope +Summary: Default yama attach scope sysctl setting +Group: Development/Tools +License: GPLv2+ or LGPLv3+ +Provides: default-yama-scope +BuildArch: noarch +# For the sysctl_apply macro we need systemd as build requires. +# We also need systemd-sysctl in post to apply the default kernel config. +# But this creates a circular requirement (see below). And it would always +# pull in systemd even in build containers that don't really need it. +# Luckily systemd is normally always installed already. The only times it +# might not is when we do an initial install (and the cyclic dependency +# chain might be broken) or when installing into a container. In the first +# case we'll reboot soon to apply the default kernel config. In the second +# case we really require that the host has the correct kernel config so it +# also is available inside the container. So if we have weak dependencies +# use Recommends (sadly Recommends(post) doesn't exist). This works because +# in all cases that really matter systemd will already be installed. #1599083 +BuildRequires: systemd >= 215 +%if 0%{?fedora} > 24 || 0%{?rhel} > 7 +Recommends: systemd +%else +Requires(post): systemd +%endif + +%description default-yama-scope +Yama sysctl setting to enable default attach scope settings +enabling programs to use ptrace attach, access to +/proc/PID/{mem,personality,stack,syscall}, and the syscalls +process_vm_readv and process_vm_writev which are used for +interprocess services, communication and introspection +(like synchronisation, signaling, debugging, tracing and +profiling) of processes. +%endif + +%prep +%setup -q + +# Apply patches +%patch1 -p1 -b .notes_hack +%patch2 -p1 -b .strip_unstrip_group +%patch3 -p1 -b .sanity_check_core_reads +%patch4 -p1 -b .size_rec_ar +%patch5 -p1 -b .ar_sh_entsize_zero +%patch6 -p1 -b .x86_64_unwind +%patch7 -p1 -b .gnu_prop_note +%patch8 -p1 -b .version_note +%patch9 -p1 -b .gnu_attr_note +%patch10 -p1 -b .gnu_prop_32 + +# In case the above patches added any new test scripts, make sure they +# are executable. +find . -name \*.sh ! -perm -0100 -print | xargs chmod +x + +%build +# Remove -Wall from default flags. The makefiles enable enough warnings +# themselves, and they use -Werror. Appending -Wall defeats the cases where +# the makefiles disable some specific warnings for specific code. +# But add -Wformat explicitly for use with -Werror=format-security which +# doesn't work without -Wformat (enabled by -Wall). +RPM_OPT_FLAGS="${RPM_OPT_FLAGS/-Wall/}" +RPM_OPT_FLAGS="${RPM_OPT_FLAGS} -Wformat" + +trap 'cat config.log' EXIT +%configure CFLAGS="$RPM_OPT_FLAGS -fexceptions" +trap '' EXIT +make -s %{?_smp_mflags} + +%install +rm -rf ${RPM_BUILD_ROOT} +make -s install DESTDIR=${RPM_BUILD_ROOT} + +chmod +x ${RPM_BUILD_ROOT}%{_prefix}/%{_lib}/lib*.so* +chmod +x ${RPM_BUILD_ROOT}%{_prefix}/%{_lib}/elfutils/lib*.so* + +%find_lang %{name} + +%if %{provide_yama_scope} +install -Dm0644 config/10-default-yama-scope.conf ${RPM_BUILD_ROOT}%{_sysctldir}/10-default-yama-scope.conf +%endif + +%check +# Record some build root versions in build.log +uname -r; rpm -q glibc + +make -s %{?_smp_mflags} check || (cat tests/test-suite.log; false) + +# Only the latest Fedora and EPEL have these scriptlets, +# older Fedora and plain RHEL don't. +%if 0%{?ldconfig_scriptlets:1} +%ldconfig_scriptlets libs +%ldconfig_scriptlets libelf +%else +%post libs -p /sbin/ldconfig +%postun libs -p /sbin/ldconfig +%post libelf -p /sbin/ldconfig +%postun libelf -p /sbin/ldconfig +%endif + +%if %{provide_yama_scope} +%post default-yama-scope +# Due to circular dependencies might not be installed yet, so double check. +# (systemd -> elfutils-libs -> default-yama-scope -> systemd) +if [ -x /usr/lib/systemd/systemd-sysctl ] ; then +%sysctl_apply 10-default-yama-scope.conf +fi +%endif + +%files +%{!?_licensedir:%global license %%doc} +%license COPYING COPYING-GPLV2 COPYING-LGPLV3 +%doc README TODO CONTRIBUTING +%{_bindir}/eu-addr2line +%{_bindir}/eu-ar +%{_bindir}/eu-elfcmp +%{_bindir}/eu-elflint +%{_bindir}/eu-findtextrel +%{_bindir}/eu-nm +%{_bindir}/eu-objdump +%{_bindir}/eu-ranlib +%{_bindir}/eu-readelf +%{_bindir}/eu-size +%{_bindir}/eu-stack +%{_bindir}/eu-strings +%{_bindir}/eu-strip +%{_bindir}/eu-unstrip +%{_bindir}/eu-make-debug-archive +%{_bindir}/eu-elfcompress + +%files libs +%{!?_licensedir:%global license %%doc} +%license COPYING-GPLV2 COPYING-LGPLV3 +%{_libdir}/libasm-%{version}.so +%{_libdir}/libasm.so.* +%{_libdir}/libdw-%{version}.so +%{_libdir}/libdw.so.* +%dir %{_libdir}/elfutils +%{_libdir}/elfutils/lib*.so + +%files devel +%{_includedir}/dwarf.h +%dir %{_includedir}/elfutils +%{_includedir}/elfutils/elf-knowledge.h +%{_includedir}/elfutils/known-dwarf.h +%{_includedir}/elfutils/libasm.h +%{_includedir}/elfutils/libebl.h +%{_includedir}/elfutils/libdw.h +%{_includedir}/elfutils/libdwfl.h +%{_includedir}/elfutils/libdwelf.h +%{_includedir}/elfutils/version.h +%{_libdir}/libebl.a +%{_libdir}/libasm.so +%{_libdir}/libdw.so +%{_libdir}/pkgconfig/libdw.pc + +%files devel-static +%{_libdir}/libasm.a +%{_libdir}/libdw.a + +%files -f %{name}.lang libelf +%{!?_licensedir:%global license %%doc} +%license COPYING-GPLV2 COPYING-LGPLV3 +%{_libdir}/libelf-%{version}.so +%{_libdir}/libelf.so.* + +%files libelf-devel +%{_includedir}/libelf.h +%{_includedir}/gelf.h +%{_includedir}/nlist.h +%{_libdir}/libelf.so +%{_libdir}/pkgconfig/libelf.pc + +%files libelf-devel-static +%{_libdir}/libelf.a + +%if %{provide_yama_scope} +%files default-yama-scope +%{_sysctldir}/10-default-yama-scope.conf +%endif + +%changelog +* Mon Dec 3 2018 Mark Wielaard - 0.174-6 +- Add elfutils-0.174-gnu-props-32.patch. + +* Thu Nov 15 2018 Mark Wielaard - 0.174-5 +- Add elfutils-0.174-x86_64_unwind.patch (#1650114). +- Add elfutils-0.174-gnu-property-note.patch (#1650120). +- Add elfutils-0.174-version-note.patch. +- Add elfutils-0.174-gnu-attribute-note.patch (#1650125). + +* Tue Nov 6 2018 Mark Wielaard - 0.174-4 +- Add elfutils-0.174-size-rec-ar.patch + CVE-2018-18520 (#1646479) +- Add elfutils-0.174-ar-sh_entsize-zero.patch + CVE-2018-18521 (#1646484) + +* Fri Nov 2 2018 Mark Wielaard - 0.174-3 +- Add elfutils-0.174-libdwfl-sanity-check-core-reads.patch + CVE-2018-18310 (#1642606) + +* Fri Oct 19 2018 Mark Wielaard - 0.174-2 +- Add elfutils-0.174-strip-unstrip-group.patch (#1638248). + +* Tue Sep 18 2018 Mark Wielaard - 0.174-1 +- New upstream release (#1614972) + - libelf, libdw and all tools now handle extended shnum and shstrndx + correctly + - elfcompress: Don't rewrite input file if no section data needs + updating. Try harder to keep same file mode bits (suid) on rewrite. + - strip: Handle mixed (out of order) allocated/non-allocated sections. + - unstrip: Handle SHT_GROUP sections. + - backends: RISCV and M68K now have backend implementations to + generate CFI based backtraces. + - Fixes CVE-2018-16062, CVE-2018-16402 and CVE-2018-16403 + (#1623754, #1625052, #1625057). + +* Mon Jul 30 2018 Florian Weimer - 0.173-8 +- Rebuild with fixed binutils + +* Sun Jul 29 2018 Mark Wielaard - 0.173-7 +- Add elfutils-0.173-strip-alloc-nonalloc.patch (#1609577) + +* Tue Jul 24 2018 Mark Wielaard +- Drop libstdc++-devel BuildRequires. gcc-c++ will pull it in. + +* Tue Jul 24 2018 Mark Wielaard - 0.173-6 +- Update elfutils-0.173-annobingroup.patch. + +* Sat Jul 21 2018 Mark Wielaard - 0.173-5 +- Add BuildRequires gcc-c++ for demangle support. +- Add elfutils-0.173-annobingroup.patch. + +* Sat Jul 21 2018 Mark Wielaard - 0.173-4 +- Add elfutils-0.173-elfcompress.patch (#1607044) + +* Thu Jul 12 2018 Fedora Release Engineering - 0.173-3 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild + +* Mon Jul 9 2018 Mark Wielaard - 0.173-2 +- Update elfutils-0.173-new-notes-hack.patch for new annobin note. +- Unbreak cyclic systemd dependency for buildroot container (#1599083) + +* Fri Jun 29 2018 Mark Wielaard - 0.173-1 +- New upstream release + - More fixes for crashes and hangs found by afl-fuzz. In particular + various functions now detect and break infinite loops caused by bad + DIE tree cycles. + - readelf: Will now lookup the size and signedness of constant value + types to display them correctly (and not just how they were encoded). + - libdw: New function dwarf_next_lines to read CU-less .debug_line data. + dwarf_begin_elf now accepts ELF files containing just .debug_line + or .debug_frame sections (which can be read without needing a DIE + tree from the .debug_info section). + Removed dwarf_getscn_info, which was never implemented. + - backends: Handle BPF simple relocations. + The RISCV backends now handles ABI specific CFI and knows about + RISCV register types and names. + +* Wed Jun 20 2018 Mark Wielaard - 0.172-2 +- Add elfutils-0.172-robustify.patch. + +* Mon Jun 11 2018 Mark Wielaard - 0.172-1 +- New upstream release. + - No functional changes compared to 0.171. + - Various bug fixes in libdw and eu-readelf dealing with bad DWARF5 + data. Thanks to running the afl fuzzer on eu-readelf and various + testcases. + - eu-readelf -N is ~15% faster. + +* Fri Jun 01 2018 Mark Wielaard - 0.171-1 +- New upstream release. + - DWARF5 and split dwarf, including GNU DebugFission, support. + - readelf: Handle all new DWARF5 sections. + --debug-dump=info+ will show split unit DIEs when found. + --dwarf-skeleton can be used when inspecting a .dwo file. + Recognizes GNU locviews with --debug-dump=loc. + - libdw: New functions dwarf_die_addr_die, dwarf_get_units, + dwarf_getabbrevattr_data and dwarf_cu_info. + libdw will now try to resolve the alt file on first use + when not set yet with dwarf_set_alt. + dwarf_aggregate_size() now works with multi-dimensional arrays. + - libdwfl: Use process_vm_readv when available instead of ptrace. + - backends: Add a RISC-V backend. + +* Wed Apr 11 2018 Mark Wielaard - 0.170-11 +- Add explict libstdc++-devel BuildRequires for demangle support. +- Add elfutils-0.170-unwind.patch. (#1555726) + +* Thu Mar 01 2018 Mark Wielaard - 0.170-10 +- Add elfutils-0.170-GNU_variable_value.patch +- Add elfutils-0.170-locviews.patch + +* Fri Feb 16 2018 Mark Wielaard - 0.170-9 +- Add elfutils-0.170-core-pid.patch +- Add elfutils-0.170-elf_sync.patch +- Add elfutils-0.170-new-notes-hack.patch + +* Thu Feb 15 2018 Mark Wielaard - 0.170-8 +- Add elfutils-0.170-sys-ptrace.patch +- Make sure spec can be build even when ldconfig_scriplets aren't defined. +- Add elfutils-0.170-m68k-packed-not-aligned.patch + +* Fri Feb 09 2018 Igor Gnatenko - 0.170-7 +- Escape macros in %%changelog + +* Wed Feb 07 2018 Fedora Release Engineering - 0.170-6 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild + +* Sat Feb 03 2018 Igor Gnatenko - 0.170-5 +- Switch to %%ldconfig_scriptlets + +* Wed Dec 20 2017 Mark Wielaard - 0.170-4 +- Add elfutils-0.170-dwarf_aggregate_size.patch. + +* Wed Nov 8 2017 Mark Wielaard - 0.170-3 +- Rely on (and check) systemd_requires for sysctl_apply default-yama-scope. + +* Thu Nov 2 2017 Mark Wielaard - 0.170-2 +- Config files under /usr/lib/sysctl.d (_sysctldir) aren't %%config (#1506660) + Admin can place the real config file under /etc/sysctl.d as override. + +* Thu Aug 3 2017 Mark Wielaard - 0.170-1 +- New upstream release. Remove upstreamed patches. +- provide_yama_scope for either fedora >= 22 and rhel >= 7. + +* Wed Aug 02 2017 Fedora Release Engineering - 0.169-8 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Binutils_Mass_Rebuild + +* Wed Jul 26 2017 Fedora Release Engineering - 0.169-7 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild + +* Fri Jul 21 2017 Mark Wielaard - 0.169-6 +- Add elfutils-0.169-strip-data-marker-symbols.patch. + +* Mon Jul 17 2017 Mark Wielaard - 0.169-5 +- Fix build on s390 (ptrace.h). Add elfutils-0.169-s390x-ptrace.patch. + +* Mon Jul 17 2017 Mark Wielaard - 0.169-4 +- Add elfutils-0.169-strip-keep-remove-section.patch (#1465997) + +* Wed Jun 7 2017 Mark Wielaard - 0.169-3 +- Add elfutils-0.169-dup-shstrtab.patch +- Add elfutils-0.169-strip-empty.patch + +* Tue May 30 2017 Mark Wielaard - 0.169-2 +- Add ppc64 fallback unwinder. + +* Fri May 5 2017 Mark Wielaard - 0.169-1 +- New upstream release. Removed upstreamed patches. + +* Wed Feb 15 2017 Mark Wielaard - 0.168-5 +- Add patches for new gcc warnings and new binutils ppc64 attributes. + - elfutils-0.168-libasm-truncation.patch + - elfutils-0.168-ppc64-attrs.patch + +* Fri Feb 10 2017 Fedora Release Engineering - 0.168-4 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_26_Mass_Rebuild + +* Mon Jan 16 2017 Mark Wielaard - 0.168-3 +- Never use old, deprecated, filter_provides_in, it really is too broken. + +* Fri Jan 13 2017 Mark Wielaard - 0.168-2 +- Filter out private libebl backends from provides. + +* Wed Dec 28 2016 Mark Wielaard - 0.168-1 +- New upstream release from new home https://sourceware.org/elfutils/ +- Resolves: + - #1396092 Please implement eu-readelf --symbols[=SECTION] + - #1388057 memory allocation failure in allocate_elf + - #1387584 memory allocation failure in __libelf_set_rawdata_wrlock + +* Fri Oct 7 2016 Mark Wielaard - 0.167-2 +- Add elfutils-0.167-strip-alloc-symbol.patch (#1380961) + +* Fri Aug 26 2016 Mark Wielaard - 0.167-1 +- Upgrade to elfutils-0.167 + Drop upstream elfutils-0.166-elfcmp-comp-gcc6.patch + Fixes: #1365812, #1352232. + +* Thu Apr 14 2016 Mark Wielaard - 0.166-2 +- Add elfutils-0.166-elfcmp-comp-gcc6.patch + +* Thu Mar 31 2016 Mark Wielaard - 0.166-1 +- Upgrade to elfutils-0.166 + Drop upstreamed patches: + - elfutils-0.165-nobitsalign-strip.patch. + - elfutils-0.165-reloc.patch. + - elfutils-0.165-elf-libelf.patch. + +* Thu Feb 04 2016 Mark Wielaard - 0.165-5 +- Add elfutils-0.165-nobitsalign-strip.patch. + +* Wed Feb 03 2016 Fedora Release Engineering - 0.165-4 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_24_Mass_Rebuild + +* Thu Jan 28 2016 Mark Wielaard - 0.165-3 +- Add elfutils-0.165-reloc.patch. + +* Thu Jan 14 2016 Mark Wielaard - 0.165-2 +- Add elfutils-0.165-elf-libelf.patch. + +* Mon Jan 11 2016 Mark Wielaard - 0.165-1 +- Update to elfutils-0.165 (#1294079, #1236699, #807053) + - Add eu-elfcompress + - Add pkg-config files for libelf and libdw. + +* Fri Oct 16 2015 Mark Wielaard - 0.164-1 +- Update to elfutils-0.164 +- Drop old compat stuff + +* Mon Sep 07 2015 Mark Wielaard - 0.163-4 +- Add elfutils-0.163-readelf-n-undefined-shift.patch (#1259259) + +* Tue Aug 04 2015 Mark Wielaard - 0.163-3 +- Add elfutils-0.163-default-yama-conf.patch (#1250079) + Provides: default-yama-scope + +* Mon Aug 03 2015 Mark Wielaard - 0.163-2 +- Add elfutils-0.163-unstrip-shf_info_link.patch + +* Fri Jun 19 2015 Mark Wielaard - 0.163-1 +- Update to 0.163 + - Drop elfutils-0.162-ftruncate-allocate.patch + +* Tue Jun 16 2015 Mark Wielaard - 0.162-2 +- Add elfutils-0.162-ftruncate-allocate.patch (#1232206) + +* Thu Jun 11 2015 Mark Wielaard - 0.162-1 +- Update to 0.162 (#1170810, #1139815, #1129756, #1020842) +- Include elfutils/known-dwarf.h +- Drop BuildRequires glibc-headers (#1230468) +- Removed integrated upstream patches: + - elfutils-0.161-aarch64relro.patch + - elfutils-0.161-copyreloc.patch + - elfutils-0.161-addralign.patch + - elfutils-0.161-ar-long-name.patch + - elfutils-0.161-formref-type.patch + +* Sat May 02 2015 Kalev Lember - 0.161-8 +- Rebuilt for GCC 5 C++11 ABI change + +* Mon Mar 23 2015 Mark Wielaard - 0.161-7 +- Add elfutils-0.161-aarch64relro.patch (#1201778) + +* Mon Mar 09 2015 Mark Wielaard - 0.161-6 +- Add elfutils-0.161-copyreloc.patch. + +* Sat Feb 21 2015 Till Maas - 0.161-5 +- Rebuilt for Fedora 23 Change + https://fedoraproject.org/wiki/Changes/Harden_all_packages_with_position-independent_code + +* Sat Feb 07 2015 Mark Wielaard - 0.161-4 +- Add elfutils-0.161-addralign.patch (#1189928) + +* Thu Feb 05 2015 Mark Wielaard - 0.161-3 +- Add elfutils-0.161-formref-type.patch + +* Tue Jan 13 2015 Mark Wielaard - 0.161-2 +- Add elfutils-0.161-ar-long-name.patch (#1181525 CVE-2014-9447) + +* Fri Dec 19 2014 Mark Wielaard - 0.161-1 +- Update to 0.161. + +* Wed Aug 27 2014 Mark Wielaard - 0.160-1 +- Update to 0.160. + - Remove integrated upstream patches: + elfutils-aarch64-user_regs_struct.patch + elfutils-0.159-argp-attach.patch + elfutils-0.159-aarch64-bool-ret.patch + elfutils-0.159-elf-h.patch + elfutils-0.159-ppc64le-elfv2-abi.patch + elfutils-0.159-report_r_debug.patch + elfutils-0.159-ko_xz.patch + +* Sat Aug 16 2014 Mark Wielaard - 0.159-10 +- Add elfutils-0.159-ko_xz.patch + +* Sat Aug 16 2014 Fedora Release Engineering - 0.159-9 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild + +* Mon Jul 28 2014 Mark Wielaard - 0.159-8 +- Add elfutils-0.159-report_r_debug.patch (#1112610) + +* Fri Jul 18 2014 Mark Wielaard - 0.159-7 +- Add configure check to elfutils-aarch64-user_regs_struct.patch. + +* Sat Jul 12 2014 Tom Callaway - 0.159-6 +- fix license handling + +* Fri Jul 4 2014 Mark Wielaard - 0.159-5 +- Add elfutils-0.159-aarch64-bool-ret.patch +- Add elfutils-0.159-elf-h.patch +- Add elfutils-0.159-ppc64le-elfv2-abi.patch (#1110249) + +* Tue Jun 10 2014 Mark Wielaard - 0.159-4 +- Add elfutils-0.159-argp-attach.patch (#1107654) + +* Mon Jun 09 2014 Kyle McMartin - 0.159-3 +- AArch64: handle new glibc-headers which provides proper GETREGSET structs. + +* Sat Jun 07 2014 Fedora Release Engineering - 0.159-2.1 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild + +* Mon May 19 2014 Mark Wielaard - 0.159-1 +- Update to 0.159. + - Remove integrated upstream patches: + robustify.patch, mod-e_type.patch and CVE-2014-0172.patch. + - Remove special handling of now default compile and configure flags: + Don't remove -Werror=format-security, don't configure --enable-dwz. + +* Thu Apr 10 2014 Mark Wielaard - 0.158-3 +- Add elfutils-0.158-CVE-2014-0172.patch (#1085729) + +* Tue Mar 11 2014 Mark Wielaard - 0.158-2 +- Add elfutils-0.158-mod-e_type.patch. + +* Mon Jan 6 2014 Mark Wielaard - 0.158-1 +- Update to 0.158. Remove all patches now upstream. Add eu-stack. + +* Thu Dec 19 2013 Mark Wielaard - 0.157-4 +- Add elfutils-0.157-aarch64-got-special-symbol.patch. +- Remove -Werror=format-security from RPM_OPT_FLAGS. + +* Fri Dec 13 2013 Petr Machata - 0.157-3 +- Add upstream support for aarch64 + +* Wed Oct 9 2013 Mark Wielaard 0.157-2 +- Show tests/test-suite.log in build.log when make check fails. + +* Mon Sep 30 2013 Mark Wielaard 0.157-1 +- Update to 0.157. +- Remove elfutils-0.156-abi_cfi-ppc-s390-arm.patch. +- Remove elfutils-0.156-et_dyn-kernels.patch. + +* Fri Sep 06 2013 Mark Wielaard 0.156-5 +- Add elfutils-0.156-abi_cfi-ppc-s390-arm.patch. + Sets up initial CFI return register, CFA location expression and + register rules for PPC, S390 and ARM (dwarf_cfi_addrframe support). + +* Mon Aug 26 2013 Mark Wielaard 0.156-4 +- Add elfutils-0.156-et_dyn-kernels.patch. + Fixes an issue on ppc64 with systemtap kernel address placement. + +* Thu Aug 8 2013 Mark Wielaard 0.156-3 +- Make check can now also be ran in parallel. + +* Thu Jul 25 2013 Jan Kratochvil 0.156-2 +- Update the %%configure command for compatibility with fc20 Koji. + +* Thu Jul 25 2013 Jan Kratochvil 0.156-1 +- Update to 0.156. + - #890447 - Add __bss_start and __TMC_END__ to elflint. + - #909481 - Only try opening files with installed compression libraries. + - #914908 - Add __bss_start__ to elflint. + - #853757 - Updated Polish translation. + - #985438 - Incorrect prototype of __libdwfl_find_elf_build_id. + - Drop upstreamed elfutils-0.155-binutils-pr-ld-13621.patch. + - Drop upstreamed elfutils-0.155-mem-align.patch. + - Drop upstreamed elfutils-0.155-sizeof-pointer-memaccess.patch. + +* Tue Jul 02 2013 Karsten Hopp 0.155-6 +- bump release and rebuild to fix dependencies on PPC + +* Sun Feb 24 2013 Mark Wielaard - 0.155-5 +- Add ARM variant to elfutils-0.155-binutils-pr-ld-13621.patch rhbz#914908. +- rhel >= 5 has xz-devel + +* Fri Feb 22 2013 Mark Wielaard - 0.155-4 +- Replace elfutils-0.155-binutils-pr-ld-13621.patch with upstream fix. + +* Thu Jan 24 2013 Mark Wielaard - 0.155-3 +- Backport sizeof-pointer-memaccess upstream fixes. + +* Thu Jan 10 2013 Mark Wielaard - 0.155-2 +- #891553 - unaligned memory access issues. + +* Mon Aug 27 2012 Mark Wielaard - 0.155-1 +- Update to 0.155. + - #844270 - eu-nm invalid %%N$ use detected. + - #847454 - Ukrainian translation update. + - Removed local ar 64-bit symbol patch, dwz support patch and xlatetom fix. + +* Tue Aug 14 2012 Petr Machata - 0.154-4 +- Add support for archives with 64-bit symbol tables (#843019) + +* Wed Aug 01 2012 Mark Wielaard 0.154-3 +- Add dwz support + +* Wed Jul 18 2012 Mark Wielaard 0.154-2 +- Add upstream xlatetom fix (#835877) + +* Mon Jul 02 2012 Karsten Hopp 0.154-1.1 +- disable unstrip-n check for now (835877) + +* Fri Jun 22 2012 Mark Wielaard - 0.154-1 +- Update to 0.154 + - elflint doesn't recognize SHF_INFO_LINK on relocation sections (#807823) + - Update license to GPLv3+ and (GPLv2+ or LGPLv3+) + - Remove elfutils-0.153-dwfl_segment_report_module.patch +- Add elfutils-0.154-binutils-pr-ld-13621.patch + +* Mon Apr 02 2012 Mark Wielaard - 0.153-2 +- Fix for eu-unstrip emits garbage for librt.so.1 (#805447) + +* Thu Feb 23 2012 Mark Wielaard - 0.153-1 +- Update to 0.153 + - New --disable-werror for portability. + - Support for .zdebug sections (#679777) + - type_units and DW_AT_GNU_odr_signature support (#679815) + - low level support DW_OP_GNU_entry_value and DW_TAG_GNU_call_site (#688090) + - FTBFS on rawhide with gcc 4.7 (#783506) + - Remove gcc-4.7 patch + +* Fri Jan 20 2012 Mark Wielaard - 0.152-3 +- Fixes for gcc-4.7 based on upstream commit 32899a (#783506). + +* Fri Jan 13 2012 Fedora Release Engineering - 0.152-2 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_17_Mass_Rebuild + +* Tue Feb 15 2011 Roland McGrath - 0.152-1 +- Update to 0.152 + - Various build and warning nits fixed for newest GCC and Autoconf. + - libdwfl: Yet another prelink-related fix for another regression. (#674465) + - eu-elfcmp: New flag --ignore-build-id to ignore differing build ID bits. + - eu-elfcmp: New flag -l/--verbose to print all differences. + +* Tue Feb 08 2011 Fedora Release Engineering - 0.151-2 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild + +* Wed Jan 12 2011 Roland McGrath - 0.151-1 +- Update to 0.151 + - libdwfl: Fix for more prelink cases with separate debug file. + - eu-strip: New flag --strip-sections to remove section headers entirely. + +* Thu Dec 2 2010 Roland McGrath - 0.150-2 +- libdwfl: Remove bogus assert. (#658268) + +* Tue Nov 23 2010 Roland McGrath - 0.150-1 +- Update to 0.150 + - libdw: Fix for handling huge .debug_aranges section. (#638432) + - libdwfl: Fix for handling prelinked DSO with separate debug file. (#652857) + - findtextrel: Fix diagnostics to work with usual section ordering. + +* Wed Sep 29 2010 jkeating - 0.149-2 +- Rebuilt for gcc bug 634757 + +* Mon Sep 13 2010 Roland McGrath - 0.149-1 +- Update to 0.149 + - libdw: Decode new DW_OP_GNU_implicit_pointer operation; + new function dwarf_getlocation_implicit_pointer. + - libdwfl: New function dwfl_dwarf_line. + - eu-addr2line: New flag -F/--flags to print more DWARF line info details. + - eu-readelf: better .debug_loc processing (#627729) + - eu-strings: Fix non-mmap file reading. (#609468) + - eu-strip: -g recognizes .gdb_index as a debugging section. (#631997) + +* Mon Jun 28 2010 Roland McGrath - 0.148-1 +- Update to 0.148 + - libdw: Accept DWARF 4 format: new functions dwarf_next_unit, + dwarf_offdie_types. + New functions dwarf_lineisa, dwarf_linediscriminator, + dwarf_lineop_index. + - libdwfl: Fixes in core-file handling, support cores from PIEs. (#588818) + When working from build IDs, don't open a named file + that mismatches. + - readelf: Handle DWARF 4 formats. + +* Mon May 3 2010 Roland McGrath - 0.147-1 +- Update to 0.147 + +* Wed Apr 21 2010 Roland McGrath - 0.146-1 +- Update to 0.146 + - libdwfl: New function dwfl_core_file_report. + - libelf: Fix handling of phdrs in truncated file. (#577310) + - libdwfl: Fix infinite loop handling clobbered link_map. (#576379) +- Package translations. + +* Tue Feb 23 2010 Roland McGrath - 0.145-1 +- Update to 0.145 + - Fix build with --disable-dependency-tracking. (#564646) + - Fix build with most recent glibc headers. + - libdw: Fix CFI decoding. (#563528) + - libdwfl: Fix address bias returned by CFI accessors. (#563528) + Fix core file module layout identification. (#559836) + - readelf: Fix CFI decoding. + +* Fri Jan 15 2010 Roland McGrath - 0.144-2 +- Fix sloppy #include's breaking build with F-13 glibc. + +* Thu Jan 14 2010 Roland McGrath - 0.144-1 +- Update to 0.144 + - libdw: New function dwarf_aggregate_size for computing (constant) type + sizes, including array_type cases with nontrivial calculation. + - readelf: Don't give errors for missing info under -a. + Handle Linux "VMCOREINFO" notes under -n. +- Resolves: RHBZ #527004, RHBZ #530704, RHBZ #550858 + +* Mon Sep 21 2009 Roland McGrath - 0.143-1 +- Update to 0.143 + - libdw: Various convenience functions for individual attributes now use + dwarf_attr_integrate to look up indirect inherited attributes. + Location expression handling now supports DW_OP_implicit_value. + - libdwfl: Support automatic decompression of files in XZ format, + and of Linux kernel images made with bzip2 or LZMA + (as well as gzip). + +* Tue Jul 28 2009 Roland McGrath - 0.142-1 +- Update to 0.142 + - libelf: Bug fix in filling gaps between sections. (#512840) + - libelf: Add elf_getshdrnum alias for elf_getshnum and elf_getshdrstrndx + alias for elf_getshstrndx and deprecate original names. + - libebl, elflint: Add support for STB_GNU_UNIQUE. (#511436) + - readelf: Add -N option, speeds up DWARF printing + without address->name lookups. (#505347) + - libdw: Add support for decoding DWARF CFI into location description form. + Handle some new DWARF 3 expression operations previously omitted. + Basic handling of some new encodings slated for DWARF 4. + +* Thu Apr 23 2009 Roland McGrath - 0.141-1 +- Update to 0.141 + - libebl: sparc backend fixes (#490585) + some more arm backend support + - libdwfl: fix dwfl_module_build_id for prelinked DSO case (#489439) + fixes in core file support (#494858) + dwfl_module_getsym interface improved for non-address symbols + - eu-strip: fix infinite loop on strange inputs with -f + - eu-addr2line: take -j/--section=NAME option for binutils compatibility + (same effect as '(NAME)0x123' syntax already supported) +- Resolves: RHBZ #495213, RHBZ #465872, RHBZ #470055, RHBZ #484623 + +* Tue Feb 24 2009 Fedora Release Engineering - 0.140-2 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild + +* Sun Feb 15 2009 Roland McGrath - 0.140-1 +- Update to 0.140 + - libelf: Fix regression in creation of section header. (#484946) + +* Fri Jan 23 2009 Roland McGrath - 0.139-1 +- Update to 0.139 + - libcpu: Add Intel SSE4 disassembler support + - readelf: Implement call frame information and exception handling dumping. + Add -e option. Enable it implicitly for -a. + - elflint: Check PT_GNU_EH_FRAME program header entry. + - libdwfl: Support automatic gzip/bzip2 decompression of ELF files. (#472136) + +* Thu Jan 1 2009 Roland McGrath - 0.138-2 +- Fix libelf regression. + +* Wed Dec 31 2008 Roland McGrath - 0.138-1 +- Update to 0.138 + - Install header file for applications to use in + source version compatibility checks. + - libebl: backend fixes for i386 TLS relocs; backend support for NT_386_IOPERM + - libcpu: disassembler fixes (#469739) + - libdwfl: bug fixes (#465878) + - libelf: bug fixes + - eu-nm: bug fixes for handling corrupt input files (#476136) + +* Wed Oct 1 2008 Roland McGrath - 0.137-3 +- fix libdwfl regression (#462689) + +* Thu Aug 28 2008 Roland McGrath - 0.137-2 +- Update to 0.137 + - libdwfl: bug fixes; new segment interfaces; + all the libdwfl-based tools now support --core=COREFILE option +- Resolves: RHBZ #325021, RHBZ #447416 + +* Mon Jul 7 2008 Tom "spot" Callaway - 0.135-2 +- fix conditional comparison + +* Mon May 12 2008 Roland McGrath - 0.135-1 +- Update to 0.135 + - libdwfl: bug fixes + - eu-strip: changed handling of ET_REL files wrt symbol tables and relocs + +* Wed Apr 9 2008 Roland McGrath - 0.134-1 +- Update to 0.134 + - elflint: backend improvements for sparc, alpha (#204170) + - libdwfl, libelf: bug fixes (#439344, #438867, #438263, #438190) +- Remove Conflicts: libelf-devel from elfutils-libelf-devel. (#435742) + +* Sun Mar 2 2008 Roland McGrath - 0.133-2 +- Update to 0.133 + - readelf, elflint, libebl: SHT_GNU_ATTRIBUTE section handling (readelf -A) + - readelf: core note handling for NT_386_TLS, NT_PPC_SPE, Alpha NT_AUXV + - libdwfl: bug fixes and optimization in relocation handling + - elfcmp: bug fix for non-allocated section handling + - ld: implement newer features of binutils linker. +- Install eu-objdump and libasm, now has limited disassembler support. + +* Mon Jan 21 2008 Roland McGrath - 0.132-3 +- Update to 0.132 + - libelf: Use loff_t instead of off64_t in libelf.h header. (#377241) + - eu-readelf: Fix handling of ET_REL files in archives. + - libcpu: Implement x86 and x86-64 disassembler. + - libasm: Add interface for disassembler. + - all programs: add debugging of branch prediction. + - libelf: new function elf_scnshndx. + +* Sun Nov 11 2007 Roland McGrath - 0.131-1 +- Update to 0.131 + - libdw: DW_FORM_ref_addr support; dwarf_formref entry point now deprecated; + bug fixes for oddly-formatted DWARF + - libdwfl: bug fixes in offline archive support, symbol table handling; + apply partial relocations for dwfl_module_address_section on ET_REL + - libebl: powerpc backend support for Altivec registers + +* Wed Oct 17 2007 Roland McGrath - 0.130-3 +- Fix ET_REL support. +- Fix odd indentation in eu-readelf -x output. + +* Tue Oct 16 2007 Roland McGrath - 0.130-1 +- Update to 0.130 + - eu-readelf -p option can take an argument like -x for one section + - eu-readelf --archive-index (or -c) + - eu-readelf -n improved output for core dumps + - eu-readelf: handle SHT_NOTE sections without requiring phdrs (#249467) + - eu-elflint: ditto + - eu-elflint: stricter checks on debug sections + - eu-unstrip: new options, --list (or -n), --relocate (or -R) + - libelf: new function elf_getdata_rawchunk, replaces gelf_rawchunk; + new functions gelf_getnote, gelf_getauxv, gelf_update_auxv + - libebl: backend improvements (#324031) + - libdwfl: build_id support, new functions for it + - libdwfl: dwfl_module_addrsym fixes (#268761, #268981) + - libdwfl offline archive support, new script eu-make-debug-archive + +* Mon Aug 20 2007 Roland McGrath - 0.129-2 +- Fix false-positive eu-elflint failure on ppc -mbss-plt binaries. + +* Tue Aug 14 2007 Roland McGrath - 0.129-1 +- Update to 0.129 + - readelf: new options --hex-dump (or -x), --strings (or -p) (#250973) + - addr2line: new option --symbols (or -S) + - libdw: dwarf_getscopes fixes (#230235) + - libdwfl: dwfl_module_addrsym fixes (#249490) + +* Fri Jun 8 2007 Roland McGrath - 0.128-2 +- Update to 0.128 + - new program: unstrip + - elfcmp: new option --hash-inexact +- Replace Conflicts: with Provides/Requires using -arch + +* Wed Apr 18 2007 Roland McGrath - 0.127-1 +- Update to 0.127 + - libdw: new function dwarf_getsrcdirs + - libdwfl: new functions dwfl_module_addrsym, dwfl_report_begin_add, + dwfl_module_address_section + +* Mon Feb 5 2007 Roland McGrath - 0.126-1 +- Update to 0.126 + - New program eu-ar. + - libdw: fix missing dwarf_getelf (#227206) + - libdwfl: dwfl_module_addrname for st_size=0 symbols (#227167, #227231) + +* Wed Jan 10 2007 Roland McGrath - 0.125-3 +- Fix overeager warn_unused_result build failures. + +* Wed Jan 10 2007 Roland McGrath - 0.125-1 +- Update to 0.125 + - elflint: Compare DT_GNU_HASH tests. + - move archives into -static RPMs + - libelf, elflint: better support for core file handling + - Really fix libdwfl sorting of modules with 64-bit addresses (#220817). +- Resolves: RHBZ #220817, RHBZ #213792 + +* Tue Oct 10 2006 Roland McGrath - 0.124-1 +- eu-strip -f: copy symtab into debuginfo file when relocs use it (#203000) +- Update to 0.124 + - libebl: fix ia64 reloc support (#206981) + - libebl: sparc backend support for return value location + - libebl, libdwfl: backend register name support extended with more info + - libelf, libdw: bug fixes for unaligned accesses on machines that care + - readelf, elflint: trivial bugs fixed + +* Mon Aug 14 2006 Roland McGrath 0.123-1 +- Update to 0.123 + - libebl: Backend build fixes, thanks to Stepan Kasal. + - libebl: ia64 backend support for register names, return value location + - libdwfl: Handle truncated linux kernel module section names. + - libdwfl: Look for linux kernel vmlinux files with .debug suffix. + - elflint: Fix checks to permit --hash-style=gnu format. + +* Mon Jul 17 2006 Roland McGrath - 0.122-4 +- Fix warnings in elflint compilation. + +* Wed Jul 12 2006 Roland McGrath - 0.122-3 +- Update to 0.122 + - Fix libdwfl sorting of modules with 64-bit addresses (#198225). + - libebl: add function to test for relative relocation + - elflint: fix and extend DT_RELCOUNT/DT_RELACOUNT checks + - elflint, readelf: add support for DT_GNU_HASH + - libelf: add elf_gnu_hash + - elflint, readelf: add support for 64-bit SysV-style hash tables + - libdwfl: new functions dwfl_module_getsymtab, dwfl_module_getsym. + +* Thu Jun 15 2006 Roland McGrath - 0.121-1 +- Update to 0.121 + - libelf: bug fixes for rewriting existing files when using mmap (#187618). + - make all installed headers usable in C++ code (#193153). + - eu-readelf: better output format. + - eu-elflint: fix tests of dynamic section content. + - libdw, libdwfl: handle files without aranges info. + +* Thu May 25 2006 Jeremy Katz - 0.120-3 +- rebuild to pick up -devel deps + +* Tue Apr 4 2006 Roland McGrath - 0.120-2 +- Update to 0.120 + - License changed to GPL, with some exceptions for using + the libelf, libebl, libdw, and libdwfl library interfaces. + Red Hat elfutils is an included package of the Open Invention Network. + - dwarf.h updated for DWARF 3.0 final specification. + - libelf: Fix corruption in ELF_C_RDWR uses (#187618). + - libdwfl: New function dwfl_version; fixes for offline. + +* Fri Feb 10 2006 Jesse Keating - 0.119-1.2.1 +- bump again for double-long bug on ppc(64) + +* Tue Feb 07 2006 Jesse Keating - 0.119-1.2 +- rebuilt for new gcc4.1 snapshot and glibc changes + +* Fri Jan 13 2006 Roland McGrath - 0.119-1 +- update to 0.119 + +* Fri Dec 09 2005 Jesse Keating +- rebuilt + +* Sun Nov 27 2005 Roland McGrath - 0.118-1 +- update to 0.118 + - elflint: more tests. + - libdwfl: New function dwfl_module_register_names. + - libebl: New backend hook for register names. +- Make sure -fexceptions is always in CFLAGS. + +* Tue Nov 22 2005 Roland McGrath - 0.117-2 +- update to 0.117 + - libdwfl: New function dwfl_module_return_value_location (#166118) + - libebl: Backend improvements for several CPUs + +* Mon Oct 31 2005 Roland McGrath - 0.116-1 +- update to 0.116 + - libdw fixes, API changes and additions + - libdwfl fixes (#169672) + - eu-strip/libelf fix to preserve setuid/setgid permission bits (#167745) + +* Fri Sep 9 2005 Roland McGrath - 0.115-3 +- Update requires/conflicts for better biarch update behavior. + +* Mon Sep 5 2005 Roland McGrath - 0.115-2 +- update to 0.115 + - New program eu-strings. + - libdw: New function dwarf_getscopes_die. + - libelf: speed-ups of non-mmap reading. + - Implement --enable-gcov option for configure. + +* Wed Aug 24 2005 Roland McGrath - 0.114-1 +- update to 0.114 + - new program eu-ranlib + - libdw: new calls for inlines + - libdwfl: new calls for offline modules + +* Sat Aug 13 2005 Roland McGrath - 0.113-2 +- update to 0.113 + - elflint: relax a bit. Allow version definitions for defined symbols + against DSO versions also for symbols in nobits sections. + Allow .rodata section to have STRINGS and MERGE flag set. + - strip: add some more compatibility with binutils. + - libdwfl: bug fixes. +- Separate libdw et al into elfutils-libs subpackage. + +* Sat Aug 6 2005 Roland McGrath - 0.112-1 +- update to 0.112 + - elfcmp: some more relaxation. + - elflint: many more tests, especially regarding to symbol versioning. + - libelf: Add elfXX_offscn and gelf_offscn. + - libasm: asm_begin interface changes. + - libebl: Add three new interfaces to directly access machine, class, + and data encoding information. + +* Fri Jul 29 2005 Roland McGrath - 0.111-2 +- update portability patch + +* Thu Jul 28 2005 Roland McGrath - 0.111-1 +- update to 0.111 + - libdwfl library now merged into libdw + +* Sun Jul 24 2005 Roland McGrath - 0.110-1 +- update to 0.110 + +* Fri Jul 22 2005 Roland McGrath - 0.109-2 +- update to 0.109 + - verify that libebl modules are from the same build + - new eu-elflint checks on copy relocations + - new program eu-elfcmp + - new experimental libdwfl library + +* Thu Jun 9 2005 Roland McGrath - 0.108-5 +- robustification of eu-strip and eu-readelf + +* Wed May 25 2005 Roland McGrath - 0.108-3 +- more robustification + +* Mon May 16 2005 Roland McGrath - 0.108-2 +- robustification + +* Mon May 9 2005 Roland McGrath - 0.108-1 +- update to 0.108 + - merge strip fixes + - sort records in dwarf_getsrclines, fix dwarf_getsrc_die searching + - update elf.h from glibc + +* Sun May 8 2005 Roland McGrath - 0.107-2 +- fix strip -f byte-swapping bug + +* Sun May 8 2005 Roland McGrath - 0.107-1 +- update to 0.107 + - readelf: improve DWARF output format + - elflint: -d option to support checking separate debuginfo files + - strip: fix ET_REL debuginfo files (#156341) + +* Mon Apr 4 2005 Roland McGrath - 0.106-3 +- fix some bugs in new code, reenable make check + +* Mon Apr 4 2005 Roland McGrath - 0.106-2 +- disable make check for most arches, for now + +* Mon Apr 4 2005 Roland McGrath - 0.106-1 +- update to 0.106 + +* Mon Mar 28 2005 Roland McGrath - 0.104-2 +- update to 0.104 + +* Wed Mar 23 2005 Jakub Jelinek 0.103-2 +- update to 0.103 + +* Wed Feb 16 2005 Jakub Jelinek 0.101-2 +- update to 0.101. +- use %%configure macro to get CFLAGS etc. right + +* Sat Feb 5 2005 Jeff Johnson 0.99-2 +- upgrade to 0.99. + +* Sun Sep 26 2004 Jeff Johnson 0.97-3 +- upgrade to 0.97. + +* Tue Aug 17 2004 Jakub Jelinek 0.95-5 +- upgrade to 0.96. + +* Mon Jul 5 2004 Jakub Jelinek 0.95-4 +- rebuilt with GCC 3.4.x, workaround VLA + alloca mixing + warning + +* Tue Jun 15 2004 Elliot Lee +- rebuilt + +* Fri Apr 2 2004 Jeff Johnson 0.95-2 +- upgrade to 0.95. + +* Tue Mar 02 2004 Elliot Lee +- rebuilt + +* Fri Feb 13 2004 Elliot Lee +- rebuilt + +* Fri Jan 16 2004 Jakub Jelinek 0.94-1 +- upgrade to 0.94 + +* Fri Jan 16 2004 Jakub Jelinek 0.93-1 +- upgrade to 0.93 + +* Thu Jan 8 2004 Jakub Jelinek 0.92-1 +- full version +- macroized spec file for GPL or OSL builds +- include only libelf under GPL plus wrapper scripts + +* Wed Jan 7 2004 Jakub Jelinek 0.91-2 +- macroized spec file for GPL or OSL builds + +* Wed Jan 7 2004 Ulrich Drepper +- split elfutils-devel into two packages. + +* Wed Jan 7 2004 Jakub Jelinek 0.91-1 +- include only libelf under GPL plus wrapper scripts + +* Tue Dec 23 2003 Jeff Johnson 0.89-3 +- readelf, not readline, in %%description (#111214). + +* Fri Sep 26 2003 Bill Nottingham 0.89-1 +- update to 0.89 (fix eu-strip) + +* Tue Sep 23 2003 Jakub Jelinek 0.86-3 +- update to 0.86 (fix eu-strip on s390x/alpha) +- libebl is an archive now; remove references to DSO + +* Mon Jul 14 2003 Jeff Johnson 0.84-3 +- upgrade to 0.84 (readelf/elflint improvements, rawhide bugs fixed). + +* Fri Jul 11 2003 Jeff Johnson 0.83-3 +- upgrade to 0.83 (fix invalid ELf handle on *.so strip, more). + +* Wed Jul 9 2003 Jeff Johnson 0.82-3 +- upgrade to 0.82 (strip tests fixed on big-endian). + +* Tue Jul 8 2003 Jeff Johnson 0.81-3 +- upgrade to 0.81 (strip excludes unused symtable entries, test borked). + +* Thu Jun 26 2003 Jeff Johnson 0.80-3 +- upgrade to 0.80 (debugedit changes for kernel in progress). + +* Wed Jun 04 2003 Elliot Lee +- rebuilt + +* Wed May 21 2003 Jeff Johnson 0.79-2 +- upgrade to 0.79 (correct formats for size_t, more of libdw "works"). + +* Mon May 19 2003 Jeff Johnson 0.78-2 +- upgrade to 0.78 (libdwarf bugfix, libdw additions). + +* Mon Feb 24 2003 Elliot Lee +- debuginfo rebuild + +* Thu Feb 20 2003 Jeff Johnson 0.76-2 +- use the correct way of identifying the section via the sh_info link. + +* Sat Feb 15 2003 Jakub Jelinek 0.75-2 +- update to 0.75 (eu-strip -g fix) + +* Tue Feb 11 2003 Jakub Jelinek 0.74-2 +- update to 0.74 (fix for writing with some non-dirty sections) + +* Thu Feb 6 2003 Jeff Johnson 0.73-3 +- another -0.73 update (with sparc fixes). +- do "make check" in %%check, not %%install, section. + +* Mon Jan 27 2003 Jeff Johnson 0.73-2 +- update to 0.73 (with s390 fixes). + +* Wed Jan 22 2003 Tim Powers +- rebuilt + +* Wed Jan 22 2003 Jakub Jelinek 0.72-4 +- fix arguments to gelf_getsymshndx and elf_getshstrndx +- fix other warnings +- reenable checks on s390x + +* Sat Jan 11 2003 Karsten Hopp 0.72-3 +- temporarily disable checks on s390x, until someone has + time to look at it + +* Thu Dec 12 2002 Jakub Jelinek 0.72-2 +- update to 0.72 + +* Wed Dec 11 2002 Jakub Jelinek 0.71-2 +- update to 0.71 + +* Wed Dec 11 2002 Jeff Johnson 0.69-4 +- update to 0.69. +- add "make check" and segfault avoidance patch. +- elfutils-libelf needs to run ldconfig. + +* Tue Dec 10 2002 Jeff Johnson 0.68-2 +- update to 0.68. + +* Fri Dec 6 2002 Jeff Johnson 0.67-2 +- update to 0.67. + +* Tue Dec 3 2002 Jeff Johnson 0.65-2 +- update to 0.65. + +* Mon Dec 2 2002 Jeff Johnson 0.64-2 +- update to 0.64. + +* Sun Dec 1 2002 Ulrich Drepper 0.64 +- split packages further into elfutils-libelf + +* Sat Nov 30 2002 Jeff Johnson 0.63-2 +- update to 0.63. + +* Fri Nov 29 2002 Ulrich Drepper 0.62 +- Adjust for dropping libtool + +* Sun Nov 24 2002 Jeff Johnson 0.59-2 +- update to 0.59 + +* Thu Nov 14 2002 Jeff Johnson 0.56-2 +- update to 0.56 + +* Thu Nov 7 2002 Jeff Johnson 0.54-2 +- update to 0.54 + +* Sun Oct 27 2002 Jeff Johnson 0.53-2 +- update to 0.53 +- drop x86_64 hack, ICE fixed in gcc-3.2-11. + +* Sat Oct 26 2002 Jeff Johnson 0.52-3 +- get beehive to punch a rhpkg generated package. + +* Wed Oct 23 2002 Jeff Johnson 0.52-2 +- build in 8.0.1. +- x86_64: avoid gcc-3.2 ICE on x86_64 for now. + +* Tue Oct 22 2002 Ulrich Drepper 0.52 +- Add libelf-devel to conflicts for elfutils-devel + +* Mon Oct 21 2002 Ulrich Drepper 0.50 +- Split into runtime and devel package + +* Fri Oct 18 2002 Ulrich Drepper 0.49 +- integrate into official sources + +* Wed Oct 16 2002 Jeff Johnson 0.46-1 +- Swaddle.