From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 112499 invoked by alias); 11 Jun 2018 20:32:26 -0000 Mailing-List: contact elfutils-devel-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Post: List-Help: List-Subscribe: Sender: elfutils-devel-owner@sourceware.org Received: (qmail 112435 invoked by uid 89); 11 Jun 2018 20:32:25 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Checked: by ClamAV 0.99.4 on sourceware.org X-Virus-Found: No X-Spam-SWARE-Status: No, score=-1.9 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_NONE,SPF_PASS autolearn=ham version=3.3.2 spammy= X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_NONE,SPF_PASS autolearn=ham version=3.3.2 X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on sourceware.org X-Spam-Level: X-HELO: gnu.wildebeest.org Received: from wildebeest.demon.nl (HELO gnu.wildebeest.org) (212.238.236.112) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Mon, 11 Jun 2018 20:32:23 +0000 Received: from tarox.wildebeest.org (tarox.wildebeest.org [172.31.17.39]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by gnu.wildebeest.org (Postfix) with ESMTPSA id 7699C300072F for ; Mon, 11 Jun 2018 22:32:21 +0200 (CEST) Received: by tarox.wildebeest.org (Postfix, from userid 1000) id 2B0ED413CAAC; Mon, 11 Jun 2018 22:32:21 +0200 (CEST) Message-ID: <1528749140.12946.101.camel@klomp.org> Subject: elfutils 0.172 released From: Mark Wielaard To: elfutils-devel@sourceware.org Date: Mon, 11 Jun 2018 20:32:00 -0000 Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="=-OBQECyUNdQypanxTbTO9" X-Mailer: Evolution 3.22.6 (3.22.6-14.el7) Mime-Version: 1.0 X-Spam-Flag: NO X-IsSubscribed: yes X-SW-Source: 2018-q2/txt/msg00209.txt.bz2 --=-OBQECyUNdQypanxTbTO9 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Content-length: 2829 ELFUTILS 0.172 - http://elfutils.org/ A new release of elfutils is available at: ftp://sourceware.org/pub/elfutils/0.172/ or https://sourceware.org/elfutils/ftp/0.172/ * NEWS * No functional changes compared to 0.171. Various bug fixes in libdw and eu-readelf dealing with bad DWARF5 data. Thanks to running the afl fuzzer on eu-readelf and various testcases. eu-readelf -N is ~15% faster. * GIT SHORTLOG * Mark Wielaard (31): =C2=A0 tests: Drop shared libraries from self_test_files_exe. =C2=A0 readelf: Call __fsetlocking (stdout, FSETLOCKING_BYCALLER). =C2=A0 readelf: Lookup gettext "yes" and "no" only once. =C2=A0 readelf: Don't allocate string with asprintf, but reuse buffer with sprintf. =C2=A0 readelf: Lookup "no" translation for no_str, not "yes". =C2=A0 libdwfl: Make __libdwfl_addrsym a static function in =20=20=20=20=20=20=20 dwfl_module_addrsym.c =C2=A0 readelf: Make room for DW_MACRO_hi_user opcode if used. =C2=A0 libdw: Make sure id_path can contain max number of build id bytes. =C2=A0 readelf: Don't leak lengths array when detecting an invalid hash chain. =C2=A0 libdw: Make sure dirarray is always properly freed in dwarf_getsrclines. =C2=A0 libdw: Don't leak arange if we cannot figure out which CU it belongs. =C2=A0 readelf: Set begin properly for DW_LLE_GNU_start_end_entry on addrx failure. =C2=A0 readelf: Always initialize .debug_addr unit_length, even without =20=20=20=20=20=20=20 header. =C2=A0 libdw: Explicitly check we could decode diridx in dwarf_getsrclines. =C2=A0 tests: Use error, not assert, when trying to print a non-base type DIE. =C2=A0 libdw: Report error in dwarf_getlocation_die for bogus opcode offset. =C2=A0 libdw: Check DIE address fall inside the CU before reading abbrev. =C2=A0 libdw: Make sure that address_size and offset_size are 4 or 8 bytes. =C2=A0 readelf: Turn format_print_dwarf into print_dwarf_addr. =C2=A0 libdw: Return an error in dwarf_getlocation_attr for missing .debug_addr. =C2=A0 readelf, libdw: Handle too many directories or files in the line =20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20 table better. =C2=A0 tests: Fix cfi_debug_bias assert in varlocs. =C2=A0 libdw: Detect bad DWARF in store_implicit_value. =C2=A0 libdw: dwarf_get_units should handle existing failure to open Dwarf. =C2=A0 libdw: Check validity of dwarf_getabbrev arguments. =C2=A0 tests: Don't assert on bad DW_OP_GNU_parameter_ref target in varlocs. =C2=A0 readelf: Calculate max_entries instead of needed bytes (and overflowing). =C2=A0 libdw: Break long or circular DIE ref chains in =20=20=20=20=20=20=20=20 dwarf_[has]attr_integrate. =C2=A0 readelf: Fix bounds check in print_form_data. =C2=A0 readelf: Return correct readp (or readendp) from print_form_data. =C2=A0 Prepare for 0.172. --=-OBQECyUNdQypanxTbTO9 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: This is a digitally signed message part Content-length: 490 -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQEcBAABCAAGBQJbHtxVAAoJEINwZltXgWpq0qgH/iHW0+ZZLOFz1q3EgVcgvSQc 8URV9xzyGUExbn6erkt7RHMaYKTMyRSqjDhnkba+tM8nCULamQCQoBnntZJF9Thx 1n6Wg+Zw1VvXQBXRissfCQliHLmZmLoB7aVzEeze6wI8A/1mnwZNg6aHZvDrioPi GuGoodsD5dLVQkE4k1+ZuVZIEPcTjY+XYDziSvr/rmoVQuAQGaeTsuE2Afoo3+Dw KESBzMdeUaexGKHbB/51O1R+1aXBKaM/9KF1k5iGOyt6sv4aC+Q1i5b9I8nB1Oe1 wfXZMGPhltoHmZbUYMryClVysMquYZFTbOw2ek14a8aC5riqeQ9bwVpmIK1JmNY= =wUt9 -----END PGP SIGNATURE----- --=-OBQECyUNdQypanxTbTO9--