aboutsummaryrefslogtreecommitdiff
path: root/bfd/aoutx.h
diff options
context:
space:
mode:
authorAlan Modra <amodra@gmail.com>2024-02-28 18:53:52 +1030
committerAlan Modra <amodra@gmail.com>2024-02-28 21:24:39 +1030
commit4b72a278f46245635ca03ffc8179570c07e3531a (patch)
tree7eb6aecba05182c1014f039e0f2e3d1e60717f5a /bfd/aoutx.h
parent4e0d61241012e3ae0c79603d6b6871b3407a976f (diff)
downloadgdb-4b72a278f46245635ca03ffc8179570c07e3531a.zip
gdb-4b72a278f46245635ca03ffc8179570c07e3531a.tar.gz
gdb-4b72a278f46245635ca03ffc8179570c07e3531a.tar.bz2
PR23881, pdp11 binutils fails if too much debug data
The PR testcase overflows one of the exec header fields, e_syms (the size of the symbol table), leading to the string table offset being wrong. Things go downhill from there. Fixed by checking for overflow. This happens to trigger in the ld testsuite, so xfail that test. PR 23881 bfd/ * libaout.h (swap_exec_header_out): Return a bool. * aoutx.h (swap_exec_header_out): Check for overflow in exec header. * pdp11.c (swap_exec_header_out): Likewise. * i386lynx.c (WRITE_HEADERS): Adjust. ld/ * testsuite/ld-scripts/map-address.exp: xfail pdp11.
Diffstat (limited to 'bfd/aoutx.h')
-rw-r--r--bfd/aoutx.h31
1 files changed, 29 insertions, 2 deletions
diff --git a/bfd/aoutx.h b/bfd/aoutx.h
index 545285c..c8aaa14 100644
--- a/bfd/aoutx.h
+++ b/bfd/aoutx.h
@@ -407,7 +407,7 @@ FUNCTION
aout_@var{size}_swap_exec_header_out
SYNOPSIS
- void aout_@var{size}_swap_exec_header_out
+ bool aout_@var{size}_swap_exec_header_out
(bfd *abfd,
struct internal_exec *execp,
struct external_exec *raw_bytes);
@@ -416,11 +416,37 @@ DESCRIPTION
Swap the information in an internal exec header structure
@var{execp} into the buffer @var{raw_bytes} ready for writing to disk.
*/
-void
+bool
NAME (aout, swap_exec_header_out) (bfd *abfd,
struct internal_exec *execp,
struct external_exec *bytes)
{
+ const char *err = NULL;
+ uint64_t val;
+#define MAXVAL(x) ((UINT64_C (1) << (8 * sizeof (x) - 1) << 1) - 1)
+ if ((val = execp->a_text) > MAXVAL (bytes->e_text))
+ err = "e_text";
+ else if ((val = execp->a_data) > MAXVAL (bytes->e_data))
+ err = "e_data";
+ else if ((val = execp->a_bss) > MAXVAL (bytes->e_bss))
+ err = "e_bss";
+ else if ((val = execp->a_syms) > MAXVAL (bytes->e_syms))
+ err = "e_syms";
+ else if ((val = execp->a_entry) > MAXVAL (bytes->e_entry))
+ err = "e_entry";
+ else if ((val = execp->a_trsize) > MAXVAL (bytes->e_trsize))
+ err = "e_trsize";
+ else if ((val = execp->a_drsize) > MAXVAL (bytes->e_drsize))
+ err = "e_drsize";
+#undef MAXVAL
+ if (err)
+ {
+ _bfd_error_handler (_("%pB: %#" PRIx64 " overflows header %s field"),
+ abfd, val, err);
+ bfd_set_error (bfd_error_file_too_big);
+ return false;
+ }
+
/* Now fill in fields in the raw data, from the fields in the exec struct. */
H_PUT_32 (abfd, execp->a_info , bytes->e_info);
PUT_WORD (abfd, execp->a_text , bytes->e_text);
@@ -430,6 +456,7 @@ NAME (aout, swap_exec_header_out) (bfd *abfd,
PUT_WORD (abfd, execp->a_entry , bytes->e_entry);
PUT_WORD (abfd, execp->a_trsize, bytes->e_trsize);
PUT_WORD (abfd, execp->a_drsize, bytes->e_drsize);
+ return true;
}
/* Make all the section for an a.out file. */