aboutsummaryrefslogtreecommitdiff
path: root/bfd/elfcode.h
diff options
context:
space:
mode:
authorAlan Modra <amodra@gmail.com>2020-02-19 13:14:05 +1030
committerAlan Modra <amodra@gmail.com>2020-02-19 13:14:05 +1030
commit7c5fa58ea907c46817b915ec8b9b35a180e0e74c (patch)
treed5c326c134a432d499251b2e71e0f42b807adc89 /bfd/elfcode.h
parent96d3b80f5498c0aa40099f37f6384f2041df045f (diff)
downloadbinutils-7c5fa58ea907c46817b915ec8b9b35a180e0e74c.zip
binutils-7c5fa58ea907c46817b915ec8b9b35a180e0e74c.tar.gz
binutils-7c5fa58ea907c46817b915ec8b9b35a180e0e74c.tar.bz2
bfd_get_file_size calls
bfd_get_file_size can return 0, meaning the file size is unknown. * coffgen.c (_bfd_coff_get_external_symbols): Don't call bfd_get_file_size twice. (_bfd_coff_read_string_table): Allow for bfd_get_file_size zero, ie. unknown, return. * elf-attrs.c (_bfd_elf_parse_attributes): Likewise. * elfcode.h (elf_swap_shdr_in): Likewise. (elf_object_p): Don't call bfd_get_file_size twice and correct file size check.
Diffstat (limited to 'bfd/elfcode.h')
-rw-r--r--bfd/elfcode.h23
1 files changed, 15 insertions, 8 deletions
diff --git a/bfd/elfcode.h b/bfd/elfcode.h
index e1e89cf..a6b0c61 100644
--- a/bfd/elfcode.h
+++ b/bfd/elfcode.h
@@ -317,11 +317,16 @@ elf_swap_shdr_in (bfd *abfd,
/* PR 23657. Check for invalid section size, in sections with contents.
Note - we do not set an error value here because the contents
of this particular section might not be needed by the consumer. */
- if (dst->sh_type != SHT_NOBITS
- && dst->sh_size > bfd_get_file_size (abfd))
- _bfd_error_handler
- (_("warning: %pB has a corrupt section with a size (%" BFD_VMA_FMT "x) larger than the file size"),
- abfd, dst->sh_size);
+ if (dst->sh_type != SHT_NOBITS)
+ {
+ ufile_ptr filesize = bfd_get_file_size (abfd);
+
+ if (filesize != 0 && dst->sh_size > filesize)
+ _bfd_error_handler
+ (_("warning: %pB has a corrupt section with a size (%"
+ BFD_VMA_FMT "x) larger than the file size"),
+ abfd, dst->sh_size);
+ }
dst->sh_link = H_GET_32 (abfd, src->sh_link);
dst->sh_info = H_GET_32 (abfd, src->sh_info);
dst->sh_addralign = H_GET_WORD (abfd, src->sh_addralign);
@@ -775,6 +780,7 @@ elf_object_p (bfd *abfd)
{
Elf_Internal_Phdr *i_phdr;
unsigned int i;
+ ufile_ptr filesize;
#ifndef BFD64
if (i_ehdrp->e_phnum > ((bfd_size_type) -1) / sizeof (*i_phdr))
@@ -782,9 +788,10 @@ elf_object_p (bfd *abfd)
#endif
/* Check for a corrupt input file with an impossibly large number
of program headers. */
- if (bfd_get_file_size (abfd) > 0
- && i_ehdrp->e_phnum > bfd_get_file_size (abfd))
- goto got_no_match;
+ filesize = bfd_get_file_size (abfd);
+ if (filesize != 0
+ && i_ehdrp->e_phnum > filesize / sizeof (Elf_External_Phdr))
+ goto got_wrong_format_error;
elf_tdata (abfd)->phdr
= (Elf_Internal_Phdr *) bfd_alloc2 (abfd, i_ehdrp->e_phnum,
sizeof (*i_phdr));