[packages/xen] - updated to 4.3.0 (note: new sonames; x86_32 hypervisor is gone, only x86_64 and ARM left); Xen 4

qboosh qboosh at pld-linux.org
Sat Aug 24 20:07:31 CEST 2013


commit 695d15a0fdef2f7655c820ba8c1efb39ae886efc
Author: Jakub Bogusz <qboosh at pld-linux.org>
Date:   Sat Aug 24 20:06:50 2013 +0200

    - updated to 4.3.0 (note: new sonames; x86_32 hypervisor is gone, only x86_64 and ARM left);
      Xen 4.2.x left on xen-4.2 branch
    - updated doc,python_scripts,qemu patches
    - removed obsolete quemu-softfloat-c99,close_lockfd_after_lock_attempt,scripts-locking,librt and all CVE patches
    - added paths patch (adjusts libexecdir for qemu)

 0001-libelf-abolish-libelf-relocate.c.patch        |  417 -------
 0002-libxc-introduce-xc_dom_seg_to_ptr_pages.patch |   56 -
 ...x-range-checking-in-xc_dom_pfn_to_ptr-etc.patch |  156 ---
 ...struct-elf_binary-parameter-to-elf_load_i.patch |   55 -
 ...lf-abolish-elf_sval-and-elf_access_signed.patch |   86 --
 ...-include-of-asm-guest_access.h-to-top-of-.patch |   50 -
 ...om_load_elf_symtab-Do-not-use-syms-uninit.patch |   41 -
 ...oduce-macros-for-memory-access-and-pointe.patch | 1196 --------------------
 ...ls-readnotes-adjust-print_l1_mfn_valid_no.patch |   58 -
 ...elf-check-nul-terminated-strings-properly.patch |  204 ----
 0011-libelf-check-all-pointer-accesses.patch       |  788 -------------
 ...ck-pointer-references-in-elf_is_elfbinary.patch |  114 --
 ...lf-Make-all-callers-call-elf_check_broken.patch |  257 -----
 0014-libelf-use-C99-bool-for-booleans.patch        |  252 -----
 0015-libelf-use-only-unsigned-integers.patch       |  759 -------------
 0016-libelf-check-loops-for-running-away.patch     |  409 -------
 0017-libelf-abolish-obsolete-macros.patch          |  406 -------
 ...xc-Add-range-checking-to-xc_dom_binloader.patch |   69 --
 ...-failure-of-xc_dom_-_to_ptr-xc_map_foreig.patch |  382 -------
 0020-libxc-check-return-values-from-malloc.patch   |  272 -----
 ...ange-checks-in-xc_dom_p2m_host-and-_guest.patch |   47 -
 ...-blob-size-before-proceeding-in-xc_dom_ch.patch |   31 -
 ...etter-range-check-in-xc_dom_alloc_segment.patch |   33 -
 CVE-2013-1432                                      |  129 ---
 CVE-2013-1918-1                                    |  249 ----
 CVE-2013-1918-2                                    |  168 ---
 CVE-2013-1918-3                                    |   71 --
 CVE-2013-1918-4                                    |  197 ----
 CVE-2013-1918-5                                    |  201 ----
 CVE-2013-1918-6                                    |  124 --
 CVE-2013-1918-7                                    |  252 -----
 CVE-2013-1952                                      |   46 -
 CVE-2013-2072                                      |   46 -
 CVE-2013-2076                                      |   44 -
 CVE-2013-2077                                      |   54 -
 CVE-2013-2078                                      |   21 -
 CVE-2013-2211                                      |  333 ------
 xen-close_lockfd_after_lock_attempt.patch          |   37 -
 xen-doc.patch                                      |   59 -
 xen-librt.patch                                    |   25 -
 xen-paths.patch                                    |   11 +
 xen-python_scripts.patch                           |    9 -
 xen-qemu.patch                                     |   75 +-
 xen-quemu-softloat-c99.patch                       |   57 -
 xen-scripts-locking.patch                          |   28 -
 xen.spec                                           |  189 +---
 46 files changed, 92 insertions(+), 8471 deletions(-)
---
diff --git a/xen.spec b/xen.spec
index f3ed041..febabde 100644
--- a/xen.spec
+++ b/xen.spec
@@ -9,18 +9,25 @@
 #  - now the build dependencies are insane (because of what qemu can use)
 #    we should make them optional or get rid of them all properly
 #
-#
 # Conditional build:
-%bcond_without	opengl		# disable OpenGL support in Xen qemu
-%bcond_without	sdl		# disable SDL support in Xen qemu
-%bcond_without	bluetooth	# disable bluetooth support in Xen qemu
-%bcond_without	brlapi		# disable brlapi support in Xen qemu
-%bcond_without	ocaml		# build Ocaml libraries for Xen tools
-%bcond_without	efi		# build the EFI hypervisor
-
+%bcond_without	opengl		# OpenGL support in Xen qemu
+%bcond_without	sdl		# SDL support in Xen qemu
+%bcond_without	bluetooth	# bluetooth support in Xen qemu
+%bcond_without	brlapi		# brlapi support in Xen qemu
+%bcond_without	ocaml		# Ocaml libraries for Xen tools
+%bcond_without	efi		# EFI hypervisor
+%bcond_without	hypervisor	# Xen hypervisor build
+%bcond_without	stubdom		# stubdom build
+
+%ifnarch %{x8664} arm
+%undefine	with_hypervisor
+%endif
 %ifnarch %{x8664}
 %undefine	with_efi
 %endif
+%ifnarch %{ix86} %{x8664}
+%undefine	with_stubdom
+%endif
 
 # from Config.mk:
 %define	seabios_version		1.6.3.2
@@ -29,12 +36,12 @@
 Summary:	Xen - a virtual machine monitor
 Summary(pl.UTF-8):	Xen - monitor maszyny wirtualnej
 Name:		xen
-Version:	4.2.2
-Release:	4
+Version:	4.3.0
+Release:	1
 License:	GPL v2, interface parts on BSD-like
 Group:		Applications/System
 Source0:	http://bits.xensource.com/oss-xen/release/%{version}/%{name}-%{version}.tar.gz
-# Source0-md5:	f7362b19401a47826f2d8fd603a1782a
+# Source0-md5:	7b18cfb58f1ac2ce39cf35a1867f0c0a
 # used by stubdoms
 Source10:	%{xen_extfiles_url}/lwip-1.3.0.tar.gz
 # Source10-md5:	36cc57650cffda9a0269493be2a169bb
@@ -91,59 +98,17 @@ Patch6:		%{name}-dumpdir.patch
 Patch7:		%{name}-net-disable-iptables-on-bridge.patch
 Patch8:		%{name}-configure-xend.patch
 Patch9:		%{name}-initscript.patch
-Patch10:	%{name}-quemu-softloat-c99.patch
-Patch11:	%{name}-qemu.patch
-Patch12:	%{name}-scripts-locking.patch
-Patch13:	%{name}-close_lockfd_after_lock_attempt.patch
-Patch14:	%{name}-librt.patch
-Patch15:	%{name}-ulong.patch
-Patch16:	%{name}-doc.patch
-Patch100:	CVE-2013-1918-1
-Patch101:	CVE-2013-1918-2
-Patch102:	CVE-2013-1918-3
-Patch103:	CVE-2013-1918-4
-Patch104:	CVE-2013-1918-5
-Patch105:	CVE-2013-1918-6
-Patch106:	CVE-2013-1918-7
-Patch107:	CVE-2013-1952
-Patch108:	CVE-2013-2072
-Patch109:	CVE-2013-2076
-Patch110:	CVE-2013-2077
-Patch111:	CVE-2013-2078
-#CVE-2013-2194 XEN XSA-55 integer overflows
-#CVE-2013-2195 XEN XSA-55 pointer dereferences
-#CVE-2013-2196 XEN XSA-55 other problems
-Patch112:	0001-libelf-abolish-libelf-relocate.c.patch
-Patch113:	0002-libxc-introduce-xc_dom_seg_to_ptr_pages.patch
-Patch114:	0003-libxc-Fix-range-checking-in-xc_dom_pfn_to_ptr-etc.patch
-Patch115:	0004-libelf-add-struct-elf_binary-parameter-to-elf_load_i.patch
-Patch116:	0005-libelf-abolish-elf_sval-and-elf_access_signed.patch
-Patch117:	0006-libelf-move-include-of-asm-guest_access.h-to-top-of-.patch
-Patch118:	0007-libelf-xc_dom_load_elf_symtab-Do-not-use-syms-uninit.patch
-Patch119:	0008-libelf-introduce-macros-for-memory-access-and-pointe.patch
-Patch120:	0009-tools-xcutils-readnotes-adjust-print_l1_mfn_valid_no.patch
-Patch121:	0010-libelf-check-nul-terminated-strings-properly.patch
-Patch122:	0011-libelf-check-all-pointer-accesses.patch
-Patch123:	0012-libelf-Check-pointer-references-in-elf_is_elfbinary.patch
-Patch124:	0013-libelf-Make-all-callers-call-elf_check_broken.patch
-Patch125:	0014-libelf-use-C99-bool-for-booleans.patch
-Patch126:	0015-libelf-use-only-unsigned-integers.patch
-Patch127:	0016-libelf-check-loops-for-running-away.patch
-Patch128:	0017-libelf-abolish-obsolete-macros.patch
-Patch129:	0018-libxc-Add-range-checking-to-xc_dom_binloader.patch
-Patch130:	0019-libxc-check-failure-of-xc_dom_-_to_ptr-xc_map_foreig.patch
-Patch131:	0020-libxc-check-return-values-from-malloc.patch
-Patch132:	0021-libxc-range-checks-in-xc_dom_p2m_host-and-_guest.patch
-Patch133:	0022-libxc-check-blob-size-before-proceeding-in-xc_dom_ch.patch
-Patch134:	0023-libxc-Better-range-check-in-xc_dom_alloc_segment.patch
-Patch135:	CVE-2013-2211
-Patch136:	CVE-2013-1432
+Patch10:	%{name}-qemu.patch
+Patch11:	%{name}-ulong.patch
+Patch12:	%{name}-doc.patch
+Patch13:	%{name}-paths.patch
 URL:		http://www.xen.org/products/xenhyp.html
 %{?with_opengl:BuildRequires:	OpenGL-devel}
 %{?with_sdl:BuildRequires:	SDL-devel >= 1.2.1}
 %ifarch %{ix86} %{x8664}
 BuildRequires:	acpica
 BuildRequires:	bcc
+BuildRequires:	bin86
 %endif
 %{?with_bluetooth:BuildRequires:	bluez-libs-devel}
 %{?with_brlapi:BuildRequires:	brlapi-devel}
@@ -153,15 +118,19 @@ BuildRequires:	ceph-devel
 BuildRequires:	curl-devel
 BuildRequires:	cyrus-sasl-devel >= 2
 BuildRequires:	e2fsprogs-devel
-BuildRequires:	gcc >= 5:3.4
+BuildRequires:	gcc >= 6:4.1
 BuildRequires:	gettext-devel
 BuildRequires:	glib2-devel >= 1:2.12
+BuildRequires:	glusterfs-devel >= 3.4
 BuildRequires:	gnutls-devel
 BuildRequires:	latex2html >= 2008
 BuildRequires:	libaio-devel
+BuildRequires:	libcap-devel
+BuildRequires:	libcap-ng-devel
 BuildRequires:	libiscsi-devel
 BuildRequires:	libjpeg-devel
 BuildRequires:	libpng-devel
+BuildRequires:	libseccomp-devel >= 1.0.0
 BuildRequires:	libuuid-devel
 BuildRequires:	lzo-devel >= 2
 BuildRequires:	ncurses-devel
@@ -173,17 +142,20 @@ BuildRequires:	nss-devel >= 3.12.8
 BuildRequires:	openssl-devel
 BuildRequires:	pciutils-devel
 BuildRequires:	perl-base
+BuildRequires:	perl-tools-pod
+BuildRequires:	pixman-devel
 BuildRequires:	pkgconfig
 BuildRequires:	python-devel
 BuildRequires:	rpm-pythonprov
 BuildRequires:	rpmbuild(macros) >= 1.647
-BuildRequires:	spice-protocol >= 0.6.0
-BuildRequires:	spice-server-devel >= 0.6.0
+BuildRequires:	spice-protocol >= 0.12.2
+BuildRequires:	spice-server-devel >= 0.12.0
 BuildRequires:	texi2html
 BuildRequires:	texlive-dvips
 BuildRequires:	texlive-latex-psnfss
 BuildRequires:	texlive-xetex
-BuildRequires:	usbredir-devel
+BuildRequires:	transfig
+BuildRequires:	usbredir-devel >= 0.5.3
 BuildRequires:	vde2-devel
 BuildRequires:	which
 # for xfsctl (<xfs/xfs.h>)
@@ -219,11 +191,11 @@ Requires:	which
 Requires:	%{name}-guest = %{version}-%{release}
 Obsoletes:	xen-doc
 Obsoletes:	xen-udev
-ExclusiveArch:	%{ix86} %{x8664}
+ExclusiveArch:	%{ix86} %{x8664} arm
 BuildRoot:	%{tmpdir}/%{name}-%{version}-root-%(id -u -n)
 
 # some PPC/SPARC boot images in ELF format
-%define         _noautostrip    .*%{_datadir}/\\(xen/qemu\\|qemu-xen\\)/\\(openbios-.*\\|palcode-clipper\\)
+%define         _noautostrip    .*%{_datadir}/\\(xen\\|qemu-xen\\)/qemu/\\(openbios-.*\\|palcode-clipper\\)
 
 %description
 This package contains the Xen hypervisor and Xen tools, needed to run
@@ -424,47 +396,6 @@ Nadzorca Xen w postaci, która może być uruchomiona wprost z firmware
 %patch11 -p1
 %patch12 -p1
 %patch13 -p1
-%patch14 -p1
-%patch15 -p1
-%patch16 -p1
-# CVE
-%patch100 -p1
-%patch101 -p1
-%patch102 -p1
-%patch103 -p1
-%patch104 -p1
-%patch105 -p1
-%patch106 -p1
-%patch107 -p1
-%patch108 -p1
-%patch109 -p1
-%patch110 -p1
-%patch111 -p1
-%patch112 -p1
-%patch113 -p1
-%patch114 -p1
-%patch115 -p1
-%patch116 -p1
-%patch117 -p1
-%patch118 -p1
-%patch119 -p1
-%patch120 -p1
-%patch121 -p1
-%patch122 -p1
-%patch123 -p1
-%patch124 -p1
-%patch125 -p1
-%patch126 -p1
-%patch127 -p1
-%patch128 -p1
-%patch129 -p1
-%patch130 -p1
-%patch131 -p1
-%patch132 -p1
-%patch133 -p1
-%patch134 -p1
-%patch135 -p1
-%patch136 -p1
 
 # stubdom sources
 ln -s %{SOURCE10} %{SOURCE11} %{SOURCE12} %{SOURCE13} %{SOURCE14} stubdom
@@ -487,16 +418,13 @@ export CXXFLAGS="%{rpmcflags} -I/usr/include/ncurses"
 #   openssl is used instead of gcrypt; that's OK, openssl is obligatory
 #   anyway (see configure), gcrypt is optional
 # - prevent libiconv from being detected (not needed with glibc)
-cd tools
 %configure \
 	CPPFLAGS="%{rpmcppflags} -I/usr/include/ncurses" \
 	ac_cv_lib_iconv_libiconv_open=no \
 	--disable-debug
-cd ..
 
 %{__make} dist-xen dist-tools dist-docs \
 	%{!?with_ocaml:OCAML_TOOLS=n} \
-	prefix=%{_prefix} \
 	CC="%{__cc}" \
 	CXX="%{__cxx}" \
 	V=1
@@ -504,21 +432,25 @@ cd ..
 unset CFLAGS
 unset CXXFLAGS
 
+%if %{with stubdom}
 %{__make} -j1 dist-stubdom \
 	%{!?with_ocaml:OCAML_TOOLS=n} \
 	CC="%{__cc}" \
 	CXX="%{__cxx}" \
 	V=1
+%endif
 
 %install
 rm -rf $RPM_BUILD_ROOT
 install -d $RPM_BUILD_ROOT/etc/{xen/examples,modules-load.d,logrotate.d} \
-	$RPM_BUILD_ROOT{%{systemdtmpfilesdir},%{systemdunitdir},/var/log/xen/console} \
-	$RPM_BUILD_ROOT/etc/efi-boot/update.d
+	$RPM_BUILD_ROOT{%{systemdtmpfilesdir},%{systemdunitdir},/var/log/xen/console}
 
-%{__make} -j1 install-xen install-tools install-stubdom install-docs \
+%if %{with efi}
+install -d $RPM_BUILD_ROOT/etc/efi-boot/update.d
+%endif
+
+%{__make} -j1 install-xen install-tools %{?with_stubdom:install-stubdom} install-docs \
 	%{!?with_ocaml:OCAML_TOOLS=n} \
-	prefix=%{_prefix} \
 	DESTDIR=$RPM_BUILD_ROOT \
 	HOTPLUGS=install-udev
 
@@ -576,17 +508,15 @@ cp -al tools/qemu-xen/docs _doc/qemu-xen
 
 %py_postclean
 
-%{__rm} $RPM_BUILD_ROOT%{_mandir}/man1/qemu.1
-mv $RPM_BUILD_ROOT%{_mandir}/man1/qemu-img{,-xen}.1
-mv $RPM_BUILD_ROOT%{_mandir}/man8/qemu-nbd{,-xen}.8
 # seems not needed, the path is wrong anyway
 %{__rm} $RPM_BUILD_ROOT%{_prefix}/etc/qemu/target-x86_64.conf
 
 # remove unneeded files
-%{__rm} $RPM_BUILD_ROOT/boot/xen-4.2.gz
+%if %{with hypervisor}
+%{__rm} $RPM_BUILD_ROOT/boot/xen-4.3.gz
 %{__rm} $RPM_BUILD_ROOT/boot/xen-4.gz
+%endif
 %{__rm} -r $RPM_BUILD_ROOT%{_docdir}/xen
-%{__rm} -r $RPM_BUILD_ROOT%{_docdir}/qemu
 %{__rm} $RPM_BUILD_ROOT%{_includedir}/%{name}/COPYING
 
 %clean
@@ -644,13 +574,12 @@ fi
 
 %files
 %defattr(644,root,root,755)
-%doc COPYING README* docs/misc/*
-%doc docs/html/*
-%doc tools/qemu-xen-dir/*.html
-%doc _doc/*
+%doc COPYING README* docs/misc/* docs/html/* _doc/*
+%if %{with hypervisor}
 /boot/%{name}-syms-%{version}
 /boot/%{name}-%{version}.gz
 /boot/%{name}.gz
+%endif
 %attr(640,root,root) %config(noreplace) %verify(not md5 mtime size) /etc/sysconfig/xenconsoled
 %attr(640,root,root) %config(noreplace) %verify(not md5 mtime size) /etc/sysconfig/xenstored
 %attr(640,root,root) %config(noreplace) %verify(not md5 mtime size) /etc/sysconfig/xendomains
@@ -682,6 +611,7 @@ fi
 %attr(755,root,root) %{_bindir}/qemu-nbd-xen
 %attr(755,root,root) %{_bindir}/remus
 %attr(755,root,root) %{_bindir}/xencons
+%attr(755,root,root) %{_bindir}/xencov_split
 %attr(755,root,root) %{_bindir}/xentrace*
 %attr(755,root,root) %{_sbindir}/blktapctrl
 %attr(755,root,root) %{_sbindir}/flask-*
@@ -699,6 +629,7 @@ fi
 %attr(755,root,root) %{_sbindir}/xen-*
 %attr(755,root,root) %{_sbindir}/xenbaked
 %attr(755,root,root) %{_sbindir}/xenconsoled
+%attr(755,root,root) %{_sbindir}/xencov
 %attr(755,root,root) %{_sbindir}/xenlockprof
 %attr(755,root,root) %{_sbindir}/xenmon.py
 %attr(755,root,root) %{_sbindir}/xenperf
@@ -719,15 +650,20 @@ fi
 %attr(755,root,root) %{_prefix}/lib/%{name}/bin/*
 %endif
 %dir %{_prefix}/lib/%{name}/boot
+%if %{with stubdom}
 %{_prefix}/lib/%{name}/boot/ioemu-stubdom.gz
+%ifarch %{ix86} %{x8664}
 %{_prefix}/lib/%{name}/boot/pv-grub-x86_32.gz
+%endif
 %ifarch %{x8664}
 %{_prefix}/lib/%{name}/boot/pv-grub-x86_64.gz
 %endif
+%{_prefix}/lib/%{name}/boot/vtpm-stubdom.gz
+%{_prefix}/lib/%{name}/boot/vtpmmgr-stubdom.gz
 %{_prefix}/lib/%{name}/boot/xenstore-stubdom.gz
+%endif
 %attr(744,root,root) %{_prefix}/lib/%{name}/boot/hvmloader
 %{_datadir}/xen
-%{_mandir}/man1/qemu-img-xen.1*
 %{_mandir}/man1/xentop.1*
 %{_mandir}/man1/xentrace_format.1*
 %{_mandir}/man1/xl.1*
@@ -737,7 +673,6 @@ fi
 %{_mandir}/man5/xl.conf.5*
 %{_mandir}/man5/xlcpupool.cfg.5*
 %{_mandir}/man5/xmdomain.cfg.5*
-%{_mandir}/man8/qemu-nbd-xen.8*
 %{_mandir}/man8/xentrace.8*
 %{_sharedstatedir}/xen
 %{_sharedstatedir}/xenstored
@@ -764,17 +699,17 @@ fi
 %attr(755,root,root) %{_libdir}/libvhd.so.*.*.*
 %attr(755,root,root) %ghost %{_libdir}/libvhd.so.1.0
 %attr(755,root,root) %{_libdir}/libxenctrl.so.*.*.*
-%attr(755,root,root) %ghost %{_libdir}/libxenctrl.so.4.2
+%attr(755,root,root) %ghost %{_libdir}/libxenctrl.so.4.3
 %attr(755,root,root) %{_libdir}/libxenguest.so.*.*.*
-%attr(755,root,root) %ghost %{_libdir}/libxenguest.so.4.2
+%attr(755,root,root) %ghost %{_libdir}/libxenguest.so.4.3
 %attr(755,root,root) %{_libdir}/libxenlight.so.*.*.*
-%attr(755,root,root) %ghost %{_libdir}/libxenlight.so.2.0
+%attr(755,root,root) %ghost %{_libdir}/libxenlight.so.4.3
 %attr(755,root,root) %{_libdir}/libxenstat.so.*.*
 %attr(755,root,root) %ghost %{_libdir}/libxenstat.so.0
 %attr(755,root,root) %{_libdir}/libxenvchan.so.*.*.*
 %attr(755,root,root) %ghost %{_libdir}/libxenvchan.so.1.0
 %attr(755,root,root) %{_libdir}/libxlutil.so.*.*.*
-%attr(755,root,root) %ghost %{_libdir}/libxlutil.so.1.0
+%attr(755,root,root) %ghost %{_libdir}/libxlutil.so.4.3
 %dir %{_libdir}/fs
 %dir %{_libdir}/fs/ext2fs-lib
 %dir %{_libdir}/fs/fat
diff --git a/0001-libelf-abolish-libelf-relocate.c.patch b/0001-libelf-abolish-libelf-relocate.c.patch
deleted file mode 100644
index 315735d..0000000
--- a/0001-libelf-abolish-libelf-relocate.c.patch
+++ /dev/null
@@ -1,417 +0,0 @@
-From 9737484becab4a25159f1e985700eaee89690d34 Mon Sep 17 00:00:00 2001
-From: Ian Jackson <ian.jackson at eu.citrix.com>
-Date: Fri, 14 Jun 2013 16:43:15 +0100
-Subject: [PATCH 01/23] libelf: abolish libelf-relocate.c
-
-This file is not actually used.  It's not built in Xen's instance of
-libelf; in libxc's it's built but nothing in it is called.  Do not
-compile it in libxc, and delete it.
-
-This reduces the amount of work we need to do in forthcoming patches
-to libelf (particularly since as libelf-relocate.c is not used it is
-probably full of bugs).
-
-This is part of the fix to a security issue, XSA-55.
-
-Signed-off-by: Ian Jackson <ian.jackson at eu.citrix.com>
-Acked-by: Ian Campbell <ian.campbell at citrix.com>
----
- tools/libxc/Makefile                |    2 +-
- xen/common/libelf/libelf-relocate.c |  372 -----------------------------------
- 2 files changed, 1 insertions(+), 373 deletions(-)
- delete mode 100644 xen/common/libelf/libelf-relocate.c
-
-diff --git a/tools/libxc/Makefile b/tools/libxc/Makefile
-index ca38cbd..d8c6a60 100644
---- a/tools/libxc/Makefile
-+++ b/tools/libxc/Makefile
-@@ -53,7 +53,7 @@ vpath %.c ../../xen/common/libelf
- CFLAGS += -I../../xen/common/libelf
- 
- GUEST_SRCS-y += libelf-tools.c libelf-loader.c
--GUEST_SRCS-y += libelf-dominfo.c libelf-relocate.c
-+GUEST_SRCS-y += libelf-dominfo.c
- 
- # new domain builder
- GUEST_SRCS-y                 += xc_dom_core.c xc_dom_boot.c
-diff --git a/xen/common/libelf/libelf-relocate.c b/xen/common/libelf/libelf-relocate.c
-deleted file mode 100644
-index 7ef4b01..0000000
---- a/xen/common/libelf/libelf-relocate.c
-+++ /dev/null
-@@ -1,372 +0,0 @@
--/*
-- * ELF relocation code (not used by xen kernel right now).
-- *
-- * This library is free software; you can redistribute it and/or
-- * modify it under the terms of the GNU Lesser General Public
-- * License as published by the Free Software Foundation;
-- * version 2.1 of the License.
-- *
-- * This library is distributed in the hope that it will be useful,
-- * but WITHOUT ANY WARRANTY; without even the implied warranty of
-- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
-- * Lesser General Public License for more details.
-- *
-- * You should have received a copy of the GNU Lesser General Public
-- * License along with this library; if not, write to the Free Software
-- * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA  02110-1301  USA
-- */
--
--#include "libelf-private.h"
--
--/* ------------------------------------------------------------------------ */
--
--static const char *rel_names_i386[] = {
--    "R_386_NONE",
--    "R_386_32",
--    "R_386_PC32",
--    "R_386_GOT32",
--    "R_386_PLT32",
--    "R_386_COPY",
--    "R_386_GLOB_DAT",
--    "R_386_JMP_SLOT",
--    "R_386_RELATIVE",
--    "R_386_GOTOFF",
--    "R_386_GOTPC",
--    "R_386_32PLT",
--    "R_386_TLS_TPOFF",
--    "R_386_TLS_IE",
--    "R_386_TLS_GOTIE",
--    "R_386_TLS_LE",
--    "R_386_TLS_GD",
--    "R_386_TLS_LDM",
--    "R_386_16",
--    "R_386_PC16",
--    "R_386_8",
--    "R_386_PC8",
--    "R_386_TLS_GD_32",
--    "R_386_TLS_GD_PUSH",
--    "R_386_TLS_GD_CALL",
--    "R_386_TLS_GD_POP",
--    "R_386_TLS_LDM_32",
--    "R_386_TLS_LDM_PUSH",
--    "R_386_TLS_LDM_CALL",
--    "R_386_TLS_LDM_POP",
--    "R_386_TLS_LDO_32",
--    "R_386_TLS_IE_32",
--    "R_386_TLS_LE_32",
--    "R_386_TLS_DTPMOD32",
--    "R_386_TLS_DTPOFF32",
--    "R_386_TLS_TPOFF32",
--};
--
--static int elf_reloc_i386(struct elf_binary *elf, int type,
--                          uint64_t addr, uint64_t value)
--{
--    void *ptr = elf_get_ptr(elf, addr);
--    uint32_t *u32;
--
--    switch ( type )
--    {
--    case 1 /* R_386_32 */ :
--        u32 = ptr;
--        *u32 += elf->reloc_offset;
--        break;
--    case 2 /* R_386_PC32 */ :
--        /* nothing */
--        break;
--    default:
--        return -1;
--    }
--    return 0;
--}
--
--/* ------------------------------------------------------------------------ */
--
--static const char *rel_names_x86_64[] = {
--    "R_X86_64_NONE",
--    "R_X86_64_64",
--    "R_X86_64_PC32",
--    "R_X86_64_GOT32",
--    "R_X86_64_PLT32",
--    "R_X86_64_COPY",
--    "R_X86_64_GLOB_DAT",
--    "R_X86_64_JUMP_SLOT",
--    "R_X86_64_RELATIVE",
--    "R_X86_64_GOTPCREL",
--    "R_X86_64_32",
--    "R_X86_64_32S",
--    "R_X86_64_16",
--    "R_X86_64_PC16",
--    "R_X86_64_8",
--    "R_X86_64_PC8",
--    "R_X86_64_DTPMOD64",
--    "R_X86_64_DTPOFF64",
--    "R_X86_64_TPOFF64",
--    "R_X86_64_TLSGD",
--    "R_X86_64_TLSLD",
--    "R_X86_64_DTPOFF32",
--    "R_X86_64_GOTTPOFF",
--    "R_X86_64_TPOFF32",
--};
--
--static int elf_reloc_x86_64(struct elf_binary *elf, int type,
--                            uint64_t addr, uint64_t value)
--{
--    void *ptr = elf_get_ptr(elf, addr);
--    uint64_t *u64;
--    uint32_t *u32;
--    int32_t *s32;
--
--    switch ( type )
--    {
--    case 1 /* R_X86_64_64 */ :
--        u64 = ptr;
--        value += elf->reloc_offset;
--        *u64 = value;
--        break;
--    case 2 /* R_X86_64_PC32 */ :
--        u32 = ptr;
--        *u32 = value - addr;
--        if ( *u32 != (uint32_t)(value - addr) )
--        {
--            elf_err(elf, "R_X86_64_PC32 overflow: 0x%" PRIx32
--                    " != 0x%" PRIx32 "\n",
--                    *u32, (uint32_t) (value - addr));
--            return -1;
--        }
--        break;
--    case 10 /* R_X86_64_32 */ :
--        u32 = ptr;
--        value += elf->reloc_offset;
--        *u32 = value;
--        if ( *u32 != value )
--        {
--            elf_err(elf, "R_X86_64_32 overflow: 0x%" PRIx32
--                    " != 0x%" PRIx64 "\n",
--                    *u32, value);
--            return -1;
--        }
--        break;
--    case 11 /* R_X86_64_32S */ :
--        s32 = ptr;
--        value += elf->reloc_offset;
--        *s32 = value;
--        if ( *s32 != (int64_t) value )
--        {
--            elf_err(elf, "R_X86_64_32S overflow: 0x%" PRIx32
--                    " != 0x%" PRIx64 "\n",
--                    *s32, (int64_t) value);
--            return -1;
--        }
--        break;
--    default:
--        return -1;
--    }
--    return 0;
--}
--
--/* ------------------------------------------------------------------------ */
--
--static struct relocs {
--    const char **names;
--    int count;
--    int (*func) (struct elf_binary * elf, int type, uint64_t addr,
--                 uint64_t value);
--} relocs[] =
--/* *INDENT-OFF* */
--{
--    [EM_386] = {
--        .names = rel_names_i386,
--        .count = sizeof(rel_names_i386) / sizeof(rel_names_i386[0]),
--        .func = elf_reloc_i386,
--    },
--    [EM_X86_64] = {
--        .names = rel_names_x86_64,
--        .count = sizeof(rel_names_x86_64) / sizeof(rel_names_x86_64[0]),
--        .func = elf_reloc_x86_64,
--    }
--};
--/* *INDENT-ON* */
--
--/* ------------------------------------------------------------------------ */
--
--static const char *rela_name(int machine, int type)
--{
--    if ( machine > sizeof(relocs) / sizeof(relocs[0]) )
--        return "unknown mach";
--    if ( !relocs[machine].names )
--        return "unknown mach";
--    if ( type > relocs[machine].count )
--        return "unknown rela";
--    return relocs[machine].names[type];
--}
--
--static int elf_reloc_section(struct elf_binary *elf,
--                             const elf_shdr * rels,
--                             const elf_shdr * sect, const elf_shdr * syms)
--{
--    const void *ptr, *end;
--    const elf_shdr *shdr;
--    const elf_rela *rela;
--    const elf_rel *rel;
--    const elf_sym *sym;
--    uint64_t s_type;
--    uint64_t r_offset;
--    uint64_t r_info;
--    uint64_t r_addend;
--    int r_type, r_sym;
--    size_t rsize;
--    uint64_t shndx, sbase, addr, value;
--    const char *sname;
--    int machine;
--
--    machine = elf_uval(elf, elf->ehdr, e_machine);
--    if ( (machine >= (sizeof(relocs) / sizeof(relocs[0]))) ||
--         (relocs[machine].func == NULL) )
--    {
--        elf_err(elf, "%s: can't handle machine %d\n",
--                __FUNCTION__, machine);
--        return -1;
--    }
--    if ( elf_swap(elf) )
--    {
--        elf_err(elf, "%s: non-native byte order, relocation not supported\n",
--                __FUNCTION__);
--        return -1;
--    }
--
--    s_type = elf_uval(elf, rels, sh_type);
--    rsize = (SHT_REL == s_type) ? elf_size(elf, rel) : elf_size(elf, rela);
--    ptr = elf_section_start(elf, rels);
--    end = elf_section_end(elf, rels);
--
--    for ( ; ptr < end; ptr += rsize )
--    {
--        switch ( s_type )
--        {
--        case SHT_REL:
--            rel = ptr;
--            r_offset = elf_uval(elf, rel, r_offset);
--            r_info = elf_uval(elf, rel, r_info);
--            r_addend = 0;
--            break;
--        case SHT_RELA:
--            rela = ptr;
--            r_offset = elf_uval(elf, rela, r_offset);
--            r_info = elf_uval(elf, rela, r_info);
--            r_addend = elf_uval(elf, rela, r_addend);
--            break;
--        default:
--            /* can't happen */
--            return -1;
--        }
--        if ( elf_64bit(elf) )
--        {
--            r_type = ELF64_R_TYPE(r_info);
--            r_sym = ELF64_R_SYM(r_info);
--        }
--        else
--        {
--            r_type = ELF32_R_TYPE(r_info);
--            r_sym = ELF32_R_SYM(r_info);
--        }
--
--        sym = elf_sym_by_index(elf, r_sym);
--        shndx = elf_uval(elf, sym, st_shndx);
--        switch ( shndx )
--        {
--        case SHN_UNDEF:
--            sname = "*UNDEF*";
--            sbase = 0;
--            break;
--        case SHN_COMMON:
--            elf_err(elf, "%s: invalid section: %" PRId64 "\n",
--                    __FUNCTION__, shndx);
--            return -1;
--        case SHN_ABS:
--            sname = "*ABS*";
--            sbase = 0;
--            break;
--        default:
--            shdr = elf_shdr_by_index(elf, shndx);
--            if ( shdr == NULL )
--            {
--                elf_err(elf, "%s: invalid section: %" PRId64 "\n",
--                        __FUNCTION__, shndx);
--                return -1;
--            }
--            sname = elf_section_name(elf, shdr);
--            sbase = elf_uval(elf, shdr, sh_addr);
--        }
--
--        addr = r_offset;
--        value = elf_uval(elf, sym, st_value);
--        value += r_addend;
--
--        if ( elf->log_callback && (elf->verbose > 1) )
--        {
--            uint64_t st_name = elf_uval(elf, sym, st_name);
--            const char *name = st_name ? elf->sym_strtab + st_name : "*NONE*";
--
--            elf_msg(elf,
--                    "%s: type %s [%d], off 0x%" PRIx64 ", add 0x%" PRIx64 ","
--                    " sym %s [0x%" PRIx64 "], sec %s [0x%" PRIx64 "]"
--                    "  ->  addr 0x%" PRIx64 " value 0x%" PRIx64 "\n",
--                    __FUNCTION__, rela_name(machine, r_type), r_type, r_offset,
--                    r_addend, name, elf_uval(elf, sym, st_value), sname, sbase,
--                    addr, value);
--        }
--
--        if ( relocs[machine].func(elf, r_type, addr, value) == -1 )
--        {
--            elf_err(elf, "%s: unknown/unsupported reloc type %s [%d]\n",
--                    __FUNCTION__, rela_name(machine, r_type), r_type);
--            return -1;
--        }
--    }
--    return 0;
--}
--
--int elf_reloc(struct elf_binary *elf)
--{
--    const elf_shdr *rels, *sect, *syms;
--    uint64_t i, count, type;
--
--    count = elf_shdr_count(elf);
--    for ( i = 0; i < count; i++ )
--    {
--        rels = elf_shdr_by_index(elf, i);
--        type = elf_uval(elf, rels, sh_type);
--        if ( (type != SHT_REL) && (type != SHT_RELA) )
--            continue;
--
--        sect = elf_shdr_by_index(elf, elf_uval(elf, rels, sh_info));
--        syms = elf_shdr_by_index(elf, elf_uval(elf, rels, sh_link));
--        if ( NULL == sect || NULL == syms )
--            continue;
--
--        if ( !(elf_uval(elf, sect, sh_flags) & SHF_ALLOC) )
--        {
--            elf_msg(elf, "%s: relocations for %s, skipping\n",
--                    __FUNCTION__, elf_section_name(elf, sect));
--            continue;
--        }
--
--        elf_msg(elf, "%s: relocations for %s @ 0x%" PRIx64 "\n",
--                __FUNCTION__, elf_section_name(elf, sect),
--                elf_uval(elf, sect, sh_addr));
--        if ( elf_reloc_section(elf, rels, sect, syms) != 0 )
--            return -1;
--    }
--    return 0;
--}
--
--/*
-- * Local variables:
-- * mode: C
-- * c-set-style: "BSD"
-- * c-basic-offset: 4
-- * tab-width: 4
-- * indent-tabs-mode: nil
-- * End:
-- */
--- 
-1.7.2.5
-
diff --git a/0002-libxc-introduce-xc_dom_seg_to_ptr_pages.patch b/0002-libxc-introduce-xc_dom_seg_to_ptr_pages.patch
deleted file mode 100644
index c26605f..0000000
--- a/0002-libxc-introduce-xc_dom_seg_to_ptr_pages.patch
+++ /dev/null
@@ -1,56 +0,0 @@
-From a672da4b2d58ef12be9d7407160e9fb43cac75d9 Mon Sep 17 00:00:00 2001
-From: Ian Jackson <ian.jackson at eu.citrix.com>
-Date: Fri, 14 Jun 2013 16:43:16 +0100
-Subject: [PATCH 02/23] libxc: introduce xc_dom_seg_to_ptr_pages
-
-Provide a version of xc_dom_seg_to_ptr which returns the number of
-guest pages it has actually mapped.  This is useful for callers who
-want to do range checking; we will use this later in this series.
-
-This is part of the fix to a security issue, XSA-55.
-
-Signed-off-by: Ian Jackson <ian.jackson at eu.citrix.com>
-Acked-by: Ian Campbell <ian.campbell at citrix.com>
-Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk at oracle.com>
----
- tools/libxc/xc_dom.h |   19 ++++++++++++++++---
- 1 files changed, 16 insertions(+), 3 deletions(-)
-
-diff --git a/tools/libxc/xc_dom.h b/tools/libxc/xc_dom.h
-index 6a72aa9..9af2195 100644
---- a/tools/libxc/xc_dom.h
-+++ b/tools/libxc/xc_dom.h
-@@ -278,14 +278,27 @@ void *xc_dom_pfn_to_ptr(struct xc_dom_image *dom, xen_pfn_t first,
- void xc_dom_unmap_one(struct xc_dom_image *dom, xen_pfn_t pfn);
- void xc_dom_unmap_all(struct xc_dom_image *dom);
- 
--static inline void *xc_dom_seg_to_ptr(struct xc_dom_image *dom,
--                                      struct xc_dom_seg *seg)
-+static inline void *xc_dom_seg_to_ptr_pages(struct xc_dom_image *dom,
-+                                      struct xc_dom_seg *seg,
-+                                      xen_pfn_t *pages_out)
- {
-     xen_vaddr_t segsize = seg->vend - seg->vstart;
-     unsigned int page_size = XC_DOM_PAGE_SIZE(dom);
-     xen_pfn_t pages = (segsize + page_size - 1) / page_size;
-+    void *retval;
-+
-+    retval = xc_dom_pfn_to_ptr(dom, seg->pfn, pages);
-+
-+    *pages_out = retval ? pages : 0;
-+    return retval;
-+}
-+
-+static inline void *xc_dom_seg_to_ptr(struct xc_dom_image *dom,
-+                                      struct xc_dom_seg *seg)
-+{
-+    xen_pfn_t dummy;
- 
--    return xc_dom_pfn_to_ptr(dom, seg->pfn, pages);
-+    return xc_dom_seg_to_ptr_pages(dom, seg, &dummy);
- }
- 
- static inline void *xc_dom_vaddr_to_ptr(struct xc_dom_image *dom,
--- 
-1.7.2.5
-
diff --git a/0003-libxc-Fix-range-checking-in-xc_dom_pfn_to_ptr-etc.patch b/0003-libxc-Fix-range-checking-in-xc_dom_pfn_to_ptr-etc.patch
deleted file mode 100644
index 5930321..0000000
--- a/0003-libxc-Fix-range-checking-in-xc_dom_pfn_to_ptr-etc.patch
+++ /dev/null
@@ -1,156 +0,0 @@
-From 8c738fa5c1f3cfcd935b6191b3526f7ac8b2a5bd Mon Sep 17 00:00:00 2001
-From: Ian Jackson <ian.jackson at eu.citrix.com>
-Date: Fri, 14 Jun 2013 16:43:16 +0100
-Subject: [PATCH 03/23] libxc: Fix range checking in xc_dom_pfn_to_ptr etc.
-
-* Ensure that xc_dom_pfn_to_ptr (when called with count==0) does not
-  return a previously-allocated block which is entirely before the
-  requested pfn (!)
-
-* Provide a version of xc_dom_pfn_to_ptr, xc_dom_pfn_to_ptr_retcount,
-  which provides the length of the mapped region via an out parameter.
-
-* Change xc_dom_vaddr_to_ptr to always provide the length of the
-  mapped region and change the call site in xc_dom_binloader.c to
-  check it.  The call site in xc_dom_load_elf_symtab will be corrected
-  in a forthcoming patch, and for now ignores the returned length.
-
-This is part of the fix to a security issue, XSA-55.
-
-Signed-off-by: Ian Jackson <ian.jackson at eu.citrix.com>
----
- tools/libxc/xc_dom.h           |   16 +++++++++++++---
- tools/libxc/xc_dom_binloader.c |   11 ++++++++++-
- tools/libxc/xc_dom_core.c      |   13 +++++++++++++
- tools/libxc/xc_dom_elfloader.c |    3 ++-
- 4 files changed, 38 insertions(+), 5 deletions(-)
-
-diff --git a/tools/libxc/xc_dom.h b/tools/libxc/xc_dom.h
-index 9af2195..9f8037e 100644
---- a/tools/libxc/xc_dom.h
-+++ b/tools/libxc/xc_dom.h
-@@ -275,6 +275,8 @@ int xc_dom_alloc_segment(struct xc_dom_image *dom,
- 
- void *xc_dom_pfn_to_ptr(struct xc_dom_image *dom, xen_pfn_t first,
-                         xen_pfn_t count);
-+void *xc_dom_pfn_to_ptr_retcount(struct xc_dom_image *dom, xen_pfn_t first,
-+                                 xen_pfn_t count, xen_pfn_t *count_out);
- void xc_dom_unmap_one(struct xc_dom_image *dom, xen_pfn_t pfn);
- void xc_dom_unmap_all(struct xc_dom_image *dom);
- 
-@@ -302,13 +304,21 @@ static inline void *xc_dom_seg_to_ptr(struct xc_dom_image *dom,
- }
- 
- static inline void *xc_dom_vaddr_to_ptr(struct xc_dom_image *dom,
--                                        xen_vaddr_t vaddr)
-+                                        xen_vaddr_t vaddr,
-+                                        size_t *safe_region_out)
- {
-     unsigned int page_size = XC_DOM_PAGE_SIZE(dom);
-     xen_pfn_t page = (vaddr - dom->parms.virt_base) / page_size;
-     unsigned int offset = (vaddr - dom->parms.virt_base) % page_size;
--    void *ptr = xc_dom_pfn_to_ptr(dom, page, 0);
--    return (ptr ? (ptr + offset) : NULL);
-+    xen_pfn_t safe_region_count;
-+    void *ptr;
-+
-+    *safe_region_out = 0;
-+    ptr = xc_dom_pfn_to_ptr_retcount(dom, page, 0, &safe_region_count);
-+    if ( ptr == NULL )
-+        return ptr;
-+    *safe_region_out = (safe_region_count << XC_DOM_PAGE_SHIFT(dom)) - offset;
-+    return ptr;
- }
- 
- static inline int xc_dom_feature_translated(struct xc_dom_image *dom)
-diff --git a/tools/libxc/xc_dom_binloader.c b/tools/libxc/xc_dom_binloader.c
-index 769e97d..bde93f7 100644
---- a/tools/libxc/xc_dom_binloader.c
-+++ b/tools/libxc/xc_dom_binloader.c
-@@ -249,6 +249,7 @@ static int xc_dom_load_bin_kernel(struct xc_dom_image *dom)
-     char *image = dom->kernel_blob;
-     char *dest;
-     size_t image_size = dom->kernel_size;
-+    size_t dest_size;
-     uint32_t start_addr;
-     uint32_t load_end_addr;
-     uint32_t bss_end_addr;
-@@ -272,7 +273,15 @@ static int xc_dom_load_bin_kernel(struct xc_dom_image *dom)
-     DOMPRINTF("  text_size: 0x%" PRIx32 "", text_size);
-     DOMPRINTF("  bss_size:  0x%" PRIx32 "", bss_size);
- 
--    dest = xc_dom_vaddr_to_ptr(dom, dom->kernel_seg.vstart);
-+    dest = xc_dom_vaddr_to_ptr(dom, dom->kernel_seg.vstart, &dest_size);
-+
-+    if ( dest_size < text_size ||
-+         dest_size - text_size < bss_size )
-+    {
-+        DOMPRINTF("%s: mapped region is too small for image", __FUNCTION__);
-+        return -EINVAL;
-+    }
-+
-     memcpy(dest, image + skip, text_size);
-     memset(dest + text_size, 0, bss_size);
- 
-diff --git a/tools/libxc/xc_dom_core.c b/tools/libxc/xc_dom_core.c
-index 2a01d7c..8913e41 100644
---- a/tools/libxc/xc_dom_core.c
-+++ b/tools/libxc/xc_dom_core.c
-@@ -351,10 +351,19 @@ int xc_dom_try_gunzip(struct xc_dom_image *dom, void **blob, size_t * size)
- void *xc_dom_pfn_to_ptr(struct xc_dom_image *dom, xen_pfn_t pfn,
-                         xen_pfn_t count)
- {
-+    xen_pfn_t count_out_dummy;
-+    return xc_dom_pfn_to_ptr_retcount(dom, pfn, count, &count_out_dummy);
-+}
-+
-+void *xc_dom_pfn_to_ptr_retcount(struct xc_dom_image *dom, xen_pfn_t pfn,
-+                                 xen_pfn_t count, xen_pfn_t *count_out)
-+{
-     struct xc_dom_phys *phys;
-     unsigned int page_shift = XC_DOM_PAGE_SHIFT(dom);
-     char *mode = "unset";
- 
-+    *count_out = 0;
-+
-     if ( pfn > dom->total_pages ||    /* multiple checks to avoid overflows */
-          count > dom->total_pages ||
-          pfn > dom->total_pages - count )
-@@ -384,6 +393,7 @@ void *xc_dom_pfn_to_ptr(struct xc_dom_image *dom, xen_pfn_t pfn,
-                           phys->count);
-                 return NULL;
-             }
-+            *count_out = count;
-         }
-         else
-         {
-@@ -391,6 +401,9 @@ void *xc_dom_pfn_to_ptr(struct xc_dom_image *dom, xen_pfn_t pfn,
-                just hand out a pointer to it */
-             if ( pfn < phys->first )
-                 continue;
-+            if ( pfn >= phys->first + phys->count )
-+                continue;
-+            *count_out = phys->count - (pfn - phys->first);
-         }
-         return phys->ptr + ((pfn - phys->first) << page_shift);
-     }
-diff --git a/tools/libxc/xc_dom_elfloader.c b/tools/libxc/xc_dom_elfloader.c
-index 2e69559..031b5b6 100644
---- a/tools/libxc/xc_dom_elfloader.c
-+++ b/tools/libxc/xc_dom_elfloader.c
-@@ -130,10 +130,11 @@ static int xc_dom_load_elf_symtab(struct xc_dom_image *dom,
- 
-     if ( load )
-     {
-+        size_t allow_size; /* will be used in a forthcoming XSA-55 patch */
-         if ( !dom->bsd_symtab_start )
-             return 0;
-         size = dom->kernel_seg.vend - dom->bsd_symtab_start;
--        hdr  = xc_dom_vaddr_to_ptr(dom, dom->bsd_symtab_start);
-+        hdr  = xc_dom_vaddr_to_ptr(dom, dom->bsd_symtab_start, &allow_size);
-         *(int *)hdr = size - sizeof(int);
-     }
-     else
--- 
-1.7.2.5
-
diff --git a/0004-libelf-add-struct-elf_binary-parameter-to-elf_load_i.patch b/0004-libelf-add-struct-elf_binary-parameter-to-elf_load_i.patch
deleted file mode 100644
index 6eb2bac..0000000
--- a/0004-libelf-add-struct-elf_binary-parameter-to-elf_load_i.patch
+++ /dev/null
@@ -1,55 +0,0 @@
-From 035634047d10c678cbb8801c4263747bdaf4e5b1 Mon Sep 17 00:00:00 2001
-From: Ian Jackson <ian.jackson at eu.citrix.com>
-Date: Fri, 14 Jun 2013 16:43:16 +0100
-Subject: [PATCH 04/23] libelf: add `struct elf_binary*' parameter to elf_load_image
-
-The meat of this function is going to need a copy of the elf pointer,
-in forthcoming patches.
-
-No functional change in this patch.
-
-This is part of the fix to a security issue, XSA-55.
-
-Signed-off-by: Ian Jackson <ian.jackson at eu.citrix.com>
-Acked-by: Ian Campbell <ian.campbell at citrix.com>
-Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk at oracle.com>
----
- xen/common/libelf/libelf-loader.c |    8 +++++---
- 1 files changed, 5 insertions(+), 3 deletions(-)
-
-diff --git a/xen/common/libelf/libelf-loader.c b/xen/common/libelf/libelf-loader.c
-index ab58b8b..0559d88 100644
---- a/xen/common/libelf/libelf-loader.c
-+++ b/xen/common/libelf/libelf-loader.c
-@@ -108,7 +108,8 @@ void elf_set_log(struct elf_binary *elf, elf_log_callback *log_callback,
-     elf->verbose = verbose;
- }
- 
--static int elf_load_image(void *dst, const void *src, uint64_t filesz, uint64_t memsz)
-+static int elf_load_image(struct elf_binary *elf,
-+                          void *dst, const void *src, uint64_t filesz, uint64_t memsz)
- {
-     memcpy(dst, src, filesz);
-     memset(dst + filesz, 0, memsz - filesz);
-@@ -122,7 +123,8 @@ void elf_set_verbose(struct elf_binary *elf)
-     elf->verbose = 1;
- }
- 
--static int elf_load_image(void *dst, const void *src, uint64_t filesz, uint64_t memsz)
-+static int elf_load_image(struct elf_binary *elf,
-+                          void *dst, const void *src, uint64_t filesz, uint64_t memsz)
- {
-     int rc;
-     if ( filesz > ULONG_MAX || memsz > ULONG_MAX )
-@@ -279,7 +281,7 @@ int elf_load_binary(struct elf_binary *elf)
-         dest = elf_get_ptr(elf, paddr);
-         elf_msg(elf, "%s: phdr %" PRIu64 " at 0x%p -> 0x%p\n",
-                 __func__, i, dest, dest + filesz);
--        if ( elf_load_image(dest, elf->image + offset, filesz, memsz) != 0 )
-+        if ( elf_load_image(elf, dest, elf->image + offset, filesz, memsz) != 0 )
-             return -1;
-     }
- 
--- 
-1.7.2.5
-
diff --git a/0005-libelf-abolish-elf_sval-and-elf_access_signed.patch b/0005-libelf-abolish-elf_sval-and-elf_access_signed.patch
deleted file mode 100644
index 3f315c6..0000000
--- a/0005-libelf-abolish-elf_sval-and-elf_access_signed.patch
+++ /dev/null
@@ -1,86 +0,0 @@
-From 83ec905922b496e1a5756e3a88405eb6c2c6ba88 Mon Sep 17 00:00:00 2001
-From: Ian Jackson <ian.jackson at eu.citrix.com>
-Date: Fri, 14 Jun 2013 16:43:16 +0100
-Subject: [PATCH 05/23] libelf: abolish elf_sval and elf_access_signed
-
-These are not used anywhere.
-
-This is part of the fix to a security issue, XSA-55.
-
-Signed-off-by: Ian Jackson <ian.jackson at eu.citrix.com>
-Acked-by: Ian Campbell <ian.campbell at citrix.com>
----
- xen/common/libelf/libelf-tools.c |   28 ----------------------------
- xen/include/xen/libelf.h         |   11 -----------
- 2 files changed, 0 insertions(+), 39 deletions(-)
-
-diff --git a/xen/common/libelf/libelf-tools.c b/xen/common/libelf/libelf-tools.c
-index cb97908..2f54142 100644
---- a/xen/common/libelf/libelf-tools.c
-+++ b/xen/common/libelf/libelf-tools.c
-@@ -48,34 +48,6 @@ uint64_t elf_access_unsigned(struct elf_binary * elf, const void *ptr,
-     }
- }
- 
--int64_t elf_access_signed(struct elf_binary *elf, const void *ptr,
--                          uint64_t offset, size_t size)
--{
--    int need_swap = elf_swap(elf);
--    const int8_t *s8;
--    const int16_t *s16;
--    const int32_t *s32;
--    const int64_t *s64;
--
--    switch ( size )
--    {
--    case 1:
--        s8 = ptr + offset;
--        return *s8;
--    case 2:
--        s16 = ptr + offset;
--        return need_swap ? bswap_16(*s16) : *s16;
--    case 4:
--        s32 = ptr + offset;
--        return need_swap ? bswap_32(*s32) : *s32;
--    case 8:
--        s64 = ptr + offset;
--        return need_swap ? bswap_64(*s64) : *s64;
--    default:
--        return 0;
--    }
--}
--
- uint64_t elf_round_up(struct elf_binary *elf, uint64_t addr)
- {
-     int elf_round = (elf_64bit(elf) ? 8 : 4) - 1;
-diff --git a/xen/include/xen/libelf.h b/xen/include/xen/libelf.h
-index e8f6508..38e490c 100644
---- a/xen/include/xen/libelf.h
-+++ b/xen/include/xen/libelf.h
-@@ -136,23 +136,12 @@ struct elf_binary {
-                            offsetof(typeof(*(str)),e32.elem),           \
-                            sizeof((str)->e32.elem)))
- 
--#define elf_sval(elf, str, elem)                                        \
--    ((ELFCLASS64 == (elf)->class)                                       \
--     ? elf_access_signed((elf), (str),                                  \
--                         offsetof(typeof(*(str)),e64.elem),             \
--                         sizeof((str)->e64.elem))                       \
--     : elf_access_signed((elf), (str),                                  \
--                         offsetof(typeof(*(str)),e32.elem),             \
--                         sizeof((str)->e32.elem)))
--
- #define elf_size(elf, str)                              \
-     ((ELFCLASS64 == (elf)->class)                       \
-      ? sizeof((str)->e64) : sizeof((str)->e32))
- 
- uint64_t elf_access_unsigned(struct elf_binary *elf, const void *ptr,
-                              uint64_t offset, size_t size);
--int64_t elf_access_signed(struct elf_binary *elf, const void *ptr,
--                          uint64_t offset, size_t size);
- 
- uint64_t elf_round_up(struct elf_binary *elf, uint64_t addr);
- 
--- 
-1.7.2.5
-
diff --git a/0006-libelf-move-include-of-asm-guest_access.h-to-top-of-.patch b/0006-libelf-move-include-of-asm-guest_access.h-to-top-of-.patch
deleted file mode 100644
index adbd32a..0000000
--- a/0006-libelf-move-include-of-asm-guest_access.h-to-top-of-.patch
+++ /dev/null
@@ -1,50 +0,0 @@
-From 682a04488e7b3bd6c3448ab60599566eb7c6177a Mon Sep 17 00:00:00 2001
-From: Ian Jackson <ian.jackson at eu.citrix.com>
-Date: Fri, 14 Jun 2013 16:43:16 +0100
-Subject: [PATCH 06/23] libelf: move include of <asm/guest_access.h> to top of file
-
-libelf-loader.c #includes <asm/guest_access.h>, when being compiled
-for Xen.  Currently it does this in the middle of the file.
-
-Move this #include to the top of the file, before libelf-private.h.
-This is necessary because in forthcoming patches we will introduce
-private #defines of memcpy etc. which would interfere with definitions
-in headers #included from guest_access.h.
-
-No semantic or functional change in this patch.
-
-This is part of the fix to a security issue, XSA-55.
-
-Signed-off-by: Ian Jackson <ian.jackson at eu.citrix.com>
-Acked-by: Ian Campbell <ian.campbell at citrix.com>
-Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk at oracle.com>
----
- xen/common/libelf/libelf-loader.c |    5 ++++-
- 1 files changed, 4 insertions(+), 1 deletions(-)
-
-diff --git a/xen/common/libelf/libelf-loader.c b/xen/common/libelf/libelf-loader.c
-index 0559d88..ec0706b 100644
---- a/xen/common/libelf/libelf-loader.c
-+++ b/xen/common/libelf/libelf-loader.c
-@@ -16,6 +16,10 @@
-  * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA  02110-1301  USA
-  */
- 
-+#ifdef __XEN__
-+#include <asm/guest_access.h>
-+#endif
-+
- #include "libelf-private.h"
- 
- /* ------------------------------------------------------------------------ */
-@@ -116,7 +120,6 @@ static int elf_load_image(struct elf_binary *elf,
-     return 0;
- }
- #else
--#include <asm/guest_access.h>
- 
- void elf_set_verbose(struct elf_binary *elf)
- {
--- 
-1.7.2.5
-
diff --git a/0007-libelf-xc_dom_load_elf_symtab-Do-not-use-syms-uninit.patch b/0007-libelf-xc_dom_load_elf_symtab-Do-not-use-syms-uninit.patch
deleted file mode 100644
index 25425d0..0000000
--- a/0007-libelf-xc_dom_load_elf_symtab-Do-not-use-syms-uninit.patch
+++ /dev/null
@@ -1,41 +0,0 @@
-From de9089b449d2508b1ba05590905c7ebaee00c8c4 Mon Sep 17 00:00:00 2001
-From: Ian Jackson <ian.jackson at eu.citrix.com>
-Date: Fri, 14 Jun 2013 16:43:16 +0100
-Subject: [PATCH 07/23] libelf/xc_dom_load_elf_symtab: Do not use "syms" uninitialised
-
-xc_dom_load_elf_symtab (with load==0) calls elf_round_up, but it
-mistakenly used the uninitialised variable "syms" when calculating
-dom->bsd_symtab_start.  This should be a reference to "elf".
-
-This change might have the effect of rounding the value differently.
-Previously if the uninitialised value (a single byte on the stack) was
-ELFCLASS64 (ie, 2), the alignment would be to 8 bytes, otherwise to 4.
-
-However, the value is calculated from dom->kernel_seg.vend so this
-could only make a difference if that value wasn't already aligned to 8
-bytes.
-
-This is part of the fix to a security issue, XSA-55.
-
-Signed-off-by: Ian Jackson <ian.jackson at eu.citrix.com>
-Acked-by: Ian Campbell <ian.campbell at citrix.com>
----
- tools/libxc/xc_dom_elfloader.c |    2 +-
- 1 files changed, 1 insertions(+), 1 deletions(-)
-
-diff --git a/tools/libxc/xc_dom_elfloader.c b/tools/libxc/xc_dom_elfloader.c
-index 031b5b6..e82f6e9 100644
---- a/tools/libxc/xc_dom_elfloader.c
-+++ b/tools/libxc/xc_dom_elfloader.c
-@@ -144,7 +144,7 @@ static int xc_dom_load_elf_symtab(struct xc_dom_image *dom,
-         hdr = xc_dom_malloc(dom, size);
-         if ( hdr == NULL )
-             return 0;
--        dom->bsd_symtab_start = elf_round_up(&syms, dom->kernel_seg.vend);
-+        dom->bsd_symtab_start = elf_round_up(elf, dom->kernel_seg.vend);
-     }
- 
-     memcpy(hdr + sizeof(int),
--- 
-1.7.2.5
-
diff --git a/0008-libelf-introduce-macros-for-memory-access-and-pointe.patch b/0008-libelf-introduce-macros-for-memory-access-and-pointe.patch
deleted file mode 100644
index a9256b5..0000000
--- a/0008-libelf-introduce-macros-for-memory-access-and-pointe.patch
+++ /dev/null
@@ -1,1196 +0,0 @@
-From 40020ab55a1e9a1674ddecdb70299fab4fe8579d Mon Sep 17 00:00:00 2001
-From: Ian Jackson <ian.jackson at eu.citrix.com>
-Date: Fri, 14 Jun 2013 16:43:17 +0100
-Subject: [PATCH 08/23] libelf: introduce macros for memory access and pointer handling
-
-We introduce a collection of macros which abstract away all the
-pointer arithmetic and dereferences used for accessing the input ELF
-and the output area(s).  We use the new macros everywhere.
-
-For now, these macros are semantically identical to the code they
-replace, so this patch has no functional change.
-
-elf_is_elfbinary is an exception: since it doesn't take an elf*, we
-need to handle it differently.  In a future patch we will change it to
-take, and check, a length parameter.  For now we just mark it with a
-fixme.
-
-That this patch has no functional change can be verified as follows:
-
-  0. Copy the scripts "comparison-generate" and "function-filter"
-     out of this commit message.
-  1. Check out the tree before this patch.
-  2. Run the script ../comparison-generate .... ../before
-  3. Check out the tree after this patch.
-  4. Run the script ../comparison-generate .... ../after
-  5. diff --exclude=\*.[soi] -ruN before/ after/ |less
-
-Expect these differences:
-  * stubdom/zlib-x86_64/ztest*.s2
-      The filename of this test file apparently contains the pid.
-  * xen/common/version.s2
-      The xen build timestamp appears in two diff hunks.
-
-Verification that this is all that's needed:
-  In a completely built xen.git,
-     find * -name .*.d -type f | xargs grep -l libelf\.h
-  Expect results in:
-     xen/arch/x86:            Checked above.
-     tools/libxc:             Checked above.
-     tools/xcutils/readnotes: Checked above.
-     tools/xenstore:          Checked above.
-     xen/common/libelf:
-       This is the build for the hypervisor; checked in B above.
-     stubdom:
-       We have one stubdom which reads ELFs using our libelf,
-       pvgrub, which is checked above.
-
-I have not done this verification for ARM.
-
-This is part of the fix to a security issue, XSA-55.
-
-Signed-off-by: Ian Jackson <ian.jackson at eu.citrix.com>
-Acked-by: Ian Campbell <ian.campbell at citrix.com>
-Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk at oracle.com>
-
--8<- comparison-generate -8<-
- #!/bin/bash
- # usage:
- #  cd xen.git
- #  .../comparison-generate OUR-CONFIG BUILD-RUNE-PREFIX ../before|../after
- # eg:
- #  .../comparison-generate ~/work/.config 'schroot -pc64 --' ../before
- set -ex
-
- test $# = 3 || need-exactly-three-arguments
-
- our_config=$1
- build_rune_prefix=$2
- result_dir=$3
-
- git clean -x -d -f
-
- cp "$our_config" .
-
- cat <<END >>.config
-         debug_symbols=n
-         CFLAGS += -save-temps
- END
-
- perl -i~ -pe 's/ -g / -g0 / if m/^CFLAGS/' xen/Rules.mk
-
- if [ -f ./configure ]; then
-         $build_rune_prefix ./configure
- fi
-
- $build_rune_prefix make -C xen
- $build_rune_prefix make -C tools/include
- $build_rune_prefix make -C stubdom grub
- $build_rune_prefix make -C tools/libxc
- $build_rune_prefix make -C tools/xenstore
- $build_rune_prefix make -C tools/xcutils
-
- rm -rf "$result_dir"
- mkdir "$result_dir"
-
- set +x
- for f in `find xen tools stubdom -name \*.[soi]`; do
-         mkdir -p "$result_dir"/`dirname $f`
-         cp $f "$result_dir"/${f}
-         case $f in
-         *.s)
-                 ../function-filter <$f >"$result_dir"/${f}2
-                 ;;
-         esac
- done
-
- echo ok.
--8<-
-
--8<- function-filter -8<-
- #!/usr/bin/perl -w
- # function-filter
- # script for massaging gcc-generated labels to be consistent
- use strict;
- our @lines;
- my $sedderybody = "sub seddery () {\n";
- while (<>) {
-     push @lines, $_;
-     if (m/^(__FUNCTION__|__func__)\.(\d+)\:/) {
-         $sedderybody .= "    s/\\b$1\\.$2\\b/__XSA55MANGLED__$1.$./g;\n";
-     }
- }
- $sedderybody .= "}\n1;\n";
- eval $sedderybody or die $@;
- foreach (@lines) {
-     seddery();
-     print or die $!;
- }
--8<-
----
- tools/libxc/xc_dom_elfloader.c     |   30 +++---
- tools/libxc/xc_hvm_build_x86.c     |    2 +-
- tools/xcutils/readnotes.c          |   26 +++---
- xen/common/libelf/libelf-dominfo.c |   51 +++++-----
- xen/common/libelf/libelf-loader.c  |   84 +++++++++--------
- xen/common/libelf/libelf-tools.c   |   94 +++++++++---------
- xen/include/xen/libelf.h           |  188 +++++++++++++++++++++++++++++++-----
- 7 files changed, 312 insertions(+), 163 deletions(-)
-
-diff --git a/tools/libxc/xc_dom_elfloader.c b/tools/libxc/xc_dom_elfloader.c
-index e82f6e9..cc0f206 100644
---- a/tools/libxc/xc_dom_elfloader.c
-+++ b/tools/libxc/xc_dom_elfloader.c
-@@ -115,9 +115,9 @@ static int xc_dom_load_elf_symtab(struct xc_dom_image *dom,
-                                   struct elf_binary *elf, int load)
- {
-     struct elf_binary syms;
--    const elf_shdr *shdr, *shdr2;
-+    ELF_HANDLE_DECL_NONCONST(elf_shdr) shdr; ELF_HANDLE_DECL(elf_shdr) shdr2;
-     xen_vaddr_t symtab, maxaddr;
--    char *hdr;
-+    ELF_PTRVAL_CHAR hdr;
-     size_t size;
-     int h, count, type, i, tables = 0;
- 
-@@ -147,11 +147,11 @@ static int xc_dom_load_elf_symtab(struct xc_dom_image *dom,
-         dom->bsd_symtab_start = elf_round_up(elf, dom->kernel_seg.vend);
-     }
- 
--    memcpy(hdr + sizeof(int),
--           elf->image,
-+    elf_memcpy_safe(elf, hdr + sizeof(int),
-+           ELF_IMAGE_BASE(elf),
-            elf_size(elf, elf->ehdr));
--    memcpy(hdr + sizeof(int) + elf_size(elf, elf->ehdr),
--           elf->image + elf_uval(elf, elf->ehdr, e_shoff),
-+    elf_memcpy_safe(elf, hdr + sizeof(int) + elf_size(elf, elf->ehdr),
-+           ELF_IMAGE_BASE(elf) + elf_uval(elf, elf->ehdr, e_shoff),
-            elf_shdr_count(elf) * elf_size(elf, shdr));
-     if ( elf_64bit(elf) )
-     {
-@@ -189,7 +189,7 @@ static int xc_dom_load_elf_symtab(struct xc_dom_image *dom,
-     count = elf_shdr_count(&syms);
-     for ( h = 0; h < count; h++ )
-     {
--        shdr = elf_shdr_by_index(&syms, h);
-+        shdr = ELF_OBSOLETE_VOIDP_CAST elf_shdr_by_index(&syms, h);
-         type = elf_uval(&syms, shdr, sh_type);
-         if ( type == SHT_STRTAB )
-         {
-@@ -205,9 +205,9 @@ static int xc_dom_load_elf_symtab(struct xc_dom_image *dom,
-             if ( i == count )
-             {
-                 if ( elf_64bit(&syms) )
--                    *(Elf64_Off*)(&shdr->e64.sh_offset) = 0;
-+                    elf_store_field(elf, shdr, e64.sh_offset, 0);
-                 else
--                    *(Elf32_Off*)(&shdr->e32.sh_offset) = 0;
-+                    elf_store_field(elf, shdr, e32.sh_offset, 0);
-                 continue;
-             }
-         }
-@@ -216,9 +216,9 @@ static int xc_dom_load_elf_symtab(struct xc_dom_image *dom,
-         {
-             /* Mangled to be based on ELF header location. */
-             if ( elf_64bit(&syms) )
--                *(Elf64_Off*)(&shdr->e64.sh_offset) = maxaddr - symtab;
-+                elf_store_field(elf, shdr, e64.sh_offset, maxaddr - symtab);
-             else
--                *(Elf32_Off*)(&shdr->e32.sh_offset) = maxaddr - symtab;
-+                elf_store_field(elf, shdr, e32.sh_offset, maxaddr - symtab);
-             size = elf_uval(&syms, shdr, sh_size);
-             maxaddr = elf_round_up(&syms, maxaddr + size);
-             tables++;
-@@ -230,7 +230,7 @@ static int xc_dom_load_elf_symtab(struct xc_dom_image *dom,
-             if ( load )
-             {
-                 shdr2 = elf_shdr_by_index(elf, h);
--                memcpy((void*)elf_section_start(&syms, shdr),
-+                elf_memcpy_safe(elf, ELF_OBSOLETE_VOIDP_CAST elf_section_start(&syms, shdr),
-                        elf_section_start(elf, shdr2),
-                        size);
-             }
-@@ -238,9 +238,9 @@ static int xc_dom_load_elf_symtab(struct xc_dom_image *dom,
- 
-         /* Name is NULL. */
-         if ( elf_64bit(&syms) )
--            *(Elf64_Word*)(&shdr->e64.sh_name) = 0;
-+            elf_store_field(elf, shdr, e64.sh_name, 0);
-         else
--            *(Elf32_Word*)(&shdr->e32.sh_name) = 0;
-+            elf_store_field(elf, shdr, e32.sh_name, 0);
-     }
- 
-     if ( tables == 0 )
-@@ -275,7 +275,7 @@ static int xc_dom_parse_elf_kernel(struct xc_dom_image *dom)
-     }
- 
-     /* Find the section-header strings table. */
--    if ( elf->sec_strtab == NULL )
-+    if ( ELF_PTRVAL_INVALID(elf->sec_strtab) )
-     {
-         xc_dom_panic(dom->xch, XC_INVALID_KERNEL, "%s: ELF image"
-                      " has no shstrtab", __FUNCTION__);
-diff --git a/tools/libxc/xc_hvm_build_x86.c b/tools/libxc/xc_hvm_build_x86.c
-index cf5d7fb..15b603d 100644
---- a/tools/libxc/xc_hvm_build_x86.c
-+++ b/tools/libxc/xc_hvm_build_x86.c
-@@ -110,7 +110,7 @@ static int loadelfimage(
-     if ( elf->dest == NULL )
-         goto err;
- 
--    elf->dest += elf->pstart & (PAGE_SIZE - 1);
-+    ELF_ADVANCE_DEST(elf, elf->pstart & (PAGE_SIZE - 1));
- 
-     /* Load the initial elf image. */
-     rc = elf_load_binary(elf);
-diff --git a/tools/xcutils/readnotes.c b/tools/xcutils/readnotes.c
-index c926186..2af047d 100644
---- a/tools/xcutils/readnotes.c
-+++ b/tools/xcutils/readnotes.c
-@@ -61,13 +61,13 @@ struct setup_header {
- } __attribute__((packed));
- 
- static void print_string_note(const char *prefix, struct elf_binary *elf,
--			      const elf_note *note)
-+			      ELF_HANDLE_DECL(elf_note) note)
- {
- 	printf("%s: %s\n", prefix, (char*)elf_note_desc(elf, note));
- }
- 
- static void print_numeric_note(const char *prefix, struct elf_binary *elf,
--			       const elf_note *note)
-+			       ELF_HANDLE_DECL(elf_note) note)
- {
- 	uint64_t value = elf_note_numeric(elf, note);
- 	int descsz = elf_uval(elf, note, descsz);
-@@ -98,12 +98,12 @@ static void print_l1_mfn_valid_note(const char *prefix, struct elf_binary *elf,
- 
- }
- 
--static int print_notes(struct elf_binary *elf, const elf_note *start, const elf_note *end)
-+static int print_notes(struct elf_binary *elf, ELF_HANDLE_DECL(elf_note) start, ELF_HANDLE_DECL(elf_note) end)
- {
--	const elf_note *note;
-+	ELF_HANDLE_DECL(elf_note) note;
- 	int notes_found = 0;
- 
--	for ( note = start; note < end; note = elf_note_next(elf, note) )
-+	for ( note = start; ELF_HANDLE_PTRVAL(note) < ELF_HANDLE_PTRVAL(end); note = elf_note_next(elf, note) )
- 	{
- 		if (0 != strcmp(elf_note_name(elf, note), "Xen"))
- 			continue;
-@@ -170,7 +170,7 @@ int main(int argc, char **argv)
- 	void *image,*tmp;
- 	struct stat st;
- 	struct elf_binary elf;
--	const elf_shdr *shdr;
-+	ELF_HANDLE_DECL(elf_shdr) shdr;
- 	int notes_found = 0;
- 
- 	struct setup_header *hdr;
-@@ -257,7 +257,7 @@ int main(int argc, char **argv)
- 	count = elf_phdr_count(&elf);
- 	for ( h=0; h < count; h++)
- 	{
--		const elf_phdr *phdr;
-+		ELF_HANDLE_DECL(elf_phdr) phdr;
- 		phdr = elf_phdr_by_index(&elf, h);
- 		if (elf_uval(&elf, phdr, p_type) != PT_NOTE)
- 			continue;
-@@ -269,8 +269,8 @@ int main(int argc, char **argv)
- 			continue;
- 
- 		notes_found = print_notes(&elf,
--					  elf_segment_start(&elf, phdr),
--					  elf_segment_end(&elf, phdr));
-+					  ELF_MAKE_HANDLE(elf_note, elf_segment_start(&elf, phdr)),
-+					  ELF_MAKE_HANDLE(elf_note, elf_segment_end(&elf, phdr)));
- 	}
- 
- 	if ( notes_found == 0 )
-@@ -278,13 +278,13 @@ int main(int argc, char **argv)
- 		count = elf_shdr_count(&elf);
- 		for ( h=0; h < count; h++)
- 		{
--			const elf_shdr *shdr;
-+			ELF_HANDLE_DECL(elf_shdr) shdr;
- 			shdr = elf_shdr_by_index(&elf, h);
- 			if (elf_uval(&elf, shdr, sh_type) != SHT_NOTE)
- 				continue;
- 			notes_found = print_notes(&elf,
--						  elf_section_start(&elf, shdr),
--						  elf_section_end(&elf, shdr));
-+						  ELF_MAKE_HANDLE(elf_note, elf_section_start(&elf, shdr)),
-+						  ELF_MAKE_HANDLE(elf_note, elf_section_end(&elf, shdr)));
- 			if ( notes_found )
- 				fprintf(stderr, "using notes from SHT_NOTE section\n");
- 
-@@ -292,7 +292,7 @@ int main(int argc, char **argv)
- 	}
- 
- 	shdr = elf_shdr_by_name(&elf, "__xen_guest");
--	if (shdr)
-+	if (ELF_HANDLE_VALID(shdr))
- 		printf("__xen_guest: %s\n", (char*)elf_section_start(&elf, shdr));
- 
- 	return 0;
-diff --git a/xen/common/libelf/libelf-dominfo.c b/xen/common/libelf/libelf-dominfo.c
-index 523837f..7140d59 100644
---- a/xen/common/libelf/libelf-dominfo.c
-+++ b/xen/common/libelf/libelf-dominfo.c
-@@ -44,7 +44,7 @@ int elf_xen_parse_features(const char *features,
- 
-     for ( pos = 0; features[pos] != '\0'; pos += len )
-     {
--        memset(feature, 0, sizeof(feature));
-+        elf_memset_unchecked(feature, 0, sizeof(feature));
-         for ( len = 0;; len++ )
-         {
-             if ( len >= sizeof(feature)-1 )
-@@ -96,7 +96,7 @@ int elf_xen_parse_features(const char *features,
- 
- int elf_xen_parse_note(struct elf_binary *elf,
-                        struct elf_dom_parms *parms,
--                       const elf_note *note)
-+                       ELF_HANDLE_DECL(elf_note) note)
- {
- /* *INDENT-OFF* */
-     static const struct {
-@@ -215,15 +215,16 @@ int elf_xen_parse_note(struct elf_binary *elf,
- 
- static int elf_xen_parse_notes(struct elf_binary *elf,
-                                struct elf_dom_parms *parms,
--                               const void *start, const void *end)
-+                               ELF_PTRVAL_CONST_VOID start,
-+                               ELF_PTRVAL_CONST_VOID end)
- {
-     int xen_elfnotes = 0;
--    const elf_note *note;
-+    ELF_HANDLE_DECL(elf_note) note;
- 
-     parms->elf_note_start = start;
-     parms->elf_note_end   = end;
--    for ( note = parms->elf_note_start;
--          (void *)note < parms->elf_note_end;
-+    for ( note = ELF_MAKE_HANDLE(elf_note, parms->elf_note_start);
-+          ELF_HANDLE_PTRVAL(note) < parms->elf_note_end;
-           note = elf_note_next(elf, note) )
-     {
-         if ( strcmp(elf_note_name(elf, note), "Xen") )
-@@ -241,45 +242,46 @@ static int elf_xen_parse_notes(struct elf_binary *elf,
- int elf_xen_parse_guest_info(struct elf_binary *elf,
-                              struct elf_dom_parms *parms)
- {
--    const char *h;
-+    ELF_PTRVAL_CONST_CHAR h;
-     char name[32], value[128];
-     int len;
- 
-     h = parms->guest_info;
--    while ( *h )
-+#define STAR(h) (*(h))
-+    while ( STAR(h) )
-     {
--        memset(name, 0, sizeof(name));
--        memset(value, 0, sizeof(value));
-+        elf_memset_unchecked(name, 0, sizeof(name));
-+        elf_memset_unchecked(value, 0, sizeof(value));
-         for ( len = 0;; len++, h++ )
-         {
-             if ( len >= sizeof(name)-1 )
-                 break;
--            if ( *h == '\0' )
-+            if ( STAR(h) == '\0' )
-                 break;
--            if ( *h == ',' )
-+            if ( STAR(h) == ',' )
-             {
-                 h++;
-                 break;
-             }
--            if ( *h == '=' )
-+            if ( STAR(h) == '=' )
-             {
-                 h++;
-                 for ( len = 0;; len++, h++ )
-                 {
-                     if ( len >= sizeof(value)-1 )
-                         break;
--                    if ( *h == '\0' )
-+                    if ( STAR(h) == '\0' )
-                         break;
--                    if ( *h == ',' )
-+                    if ( STAR(h) == ',' )
-                     {
-                         h++;
-                         break;
-                     }
--                    value[len] = *h;
-+                    value[len] = STAR(h);
-                 }
-                 break;
-             }
--            name[len] = *h;
-+            name[len] = STAR(h);
-         }
-         elf_msg(elf, "%s: %s=\"%s\"\n", __FUNCTION__, name, value);
- 
-@@ -328,7 +330,8 @@ int elf_xen_parse_guest_info(struct elf_binary *elf,
- static int elf_xen_note_check(struct elf_binary *elf,
-                               struct elf_dom_parms *parms)
- {
--    if ( (parms->elf_note_start == NULL) && (parms->guest_info == NULL) )
-+    if ( (ELF_PTRVAL_INVALID(parms->elf_note_start)) &&
-+         (ELF_PTRVAL_INVALID(parms->guest_info)) )
-     {
-         int machine = elf_uval(elf, elf->ehdr, e_machine);
-         if ( (machine == EM_386) || (machine == EM_X86_64) )
-@@ -457,12 +460,12 @@ static int elf_xen_addr_calc_check(struct elf_binary *elf,
- int elf_xen_parse(struct elf_binary *elf,
-                   struct elf_dom_parms *parms)
- {
--    const elf_shdr *shdr;
--    const elf_phdr *phdr;
-+    ELF_HANDLE_DECL(elf_shdr) shdr;
-+    ELF_HANDLE_DECL(elf_phdr) phdr;
-     int xen_elfnotes = 0;
-     int i, count, rc;
- 
--    memset(parms, 0, sizeof(*parms));
-+    elf_memset_unchecked(parms, 0, sizeof(*parms));
-     parms->virt_base = UNSET_ADDR;
-     parms->virt_entry = UNSET_ADDR;
-     parms->virt_hypercall = UNSET_ADDR;
-@@ -532,11 +535,11 @@ int elf_xen_parse(struct elf_binary *elf,
-         for ( i = 0; i < count; i++ )
-         {
-             shdr = elf_shdr_by_name(elf, "__xen_guest");
--            if ( shdr )
-+            if ( ELF_HANDLE_VALID(shdr) )
-             {
-                 parms->guest_info = elf_section_start(elf, shdr);
--                parms->elf_note_start = NULL;
--                parms->elf_note_end   = NULL;
-+                parms->elf_note_start = ELF_INVALID_PTRVAL;
-+                parms->elf_note_end   = ELF_INVALID_PTRVAL;
-                 elf_msg(elf, "%s: __xen_guest: \"%s\"\n", __FUNCTION__,
-                         parms->guest_info);
-                 elf_xen_parse_guest_info(elf, parms);
-diff --git a/xen/common/libelf/libelf-loader.c b/xen/common/libelf/libelf-loader.c
-index ec0706b..0fef84c 100644
---- a/xen/common/libelf/libelf-loader.c
-+++ b/xen/common/libelf/libelf-loader.c
-@@ -26,7 +26,7 @@
- 
- int elf_init(struct elf_binary *elf, const char *image, size_t size)
- {
--    const elf_shdr *shdr;
-+    ELF_HANDLE_DECL(elf_shdr) shdr;
-     uint64_t i, count, section, offset;
- 
-     if ( !elf_is_elfbinary(image) )
-@@ -35,7 +35,7 @@ int elf_init(struct elf_binary *elf, const char *image, size_t size)
-         return -1;
-     }
- 
--    memset(elf, 0, sizeof(*elf));
-+    elf_memset_unchecked(elf, 0, sizeof(*elf));
-     elf->image = image;
-     elf->size = size;
-     elf->ehdr = (elf_ehdr *)image;
-@@ -65,7 +65,7 @@ int elf_init(struct elf_binary *elf, const char *image, size_t size)
-     /* Find section string table. */
-     section = elf_uval(elf, elf->ehdr, e_shstrndx);
-     shdr = elf_shdr_by_index(elf, section);
--    if ( shdr != NULL )
-+    if ( ELF_HANDLE_VALID(shdr) )
-         elf->sec_strtab = elf_section_start(elf, shdr);
- 
-     /* Find symbol table and symbol string table. */
-@@ -77,9 +77,9 @@ int elf_init(struct elf_binary *elf, const char *image, size_t size)
-             continue;
-         elf->sym_tab = shdr;
-         shdr = elf_shdr_by_index(elf, elf_uval(elf, shdr, sh_link));
--        if ( shdr == NULL )
-+        if ( !ELF_HANDLE_VALID(shdr) )
-         {
--            elf->sym_tab = NULL;
-+            elf->sym_tab = ELF_INVALID_HANDLE(elf_shdr);
-             continue;
-         }
-         elf->sym_strtab = elf_section_start(elf, shdr);
-@@ -113,10 +113,11 @@ void elf_set_log(struct elf_binary *elf, elf_log_callback *log_callback,
- }
- 
- static int elf_load_image(struct elf_binary *elf,
--                          void *dst, const void *src, uint64_t filesz, uint64_t memsz)
-+                          ELF_PTRVAL_VOID dst, ELF_PTRVAL_CONST_VOID src,
-+                          uint64_t filesz, uint64_t memsz)
- {
--    memcpy(dst, src, filesz);
--    memset(dst + filesz, 0, memsz - filesz);
-+    elf_memcpy_safe(elf, dst, src, filesz);
-+    elf_memset_safe(elf, dst + filesz, 0, memsz - filesz);
-     return 0;
- }
- #else
-@@ -126,16 +127,17 @@ void elf_set_verbose(struct elf_binary *elf)
-     elf->verbose = 1;
- }
- 
--static int elf_load_image(struct elf_binary *elf,
--                          void *dst, const void *src, uint64_t filesz, uint64_t memsz)
-+static int elf_load_image(struct elf_binary *elf, ELF_PTRVAL_VOID dst, ELF_PTRVAL_CONST_VOID src, uint64_t filesz, uint64_t memsz)
- {
-     int rc;
-     if ( filesz > ULONG_MAX || memsz > ULONG_MAX )
-         return -1;
--    rc = raw_copy_to_guest(dst, src, filesz);
-+    /* We trust the dom0 kernel image completely, so we don't care
-+     * about overruns etc. here. */
-+    rc = raw_copy_to_guest(ELF_UNSAFE_PTR(dst), ELF_UNSAFE_PTR(src), filesz);
-     if ( rc != 0 )
-         return -1;
--    rc = raw_clear_guest(dst + filesz, memsz - filesz);
-+    rc = raw_clear_guest(ELF_UNSAFE_PTR(dst + filesz), memsz - filesz);
-     if ( rc != 0 )
-         return -1;
-     return 0;
-@@ -146,10 +148,10 @@ static int elf_load_image(struct elf_binary *elf,
- void elf_parse_bsdsyms(struct elf_binary *elf, uint64_t pstart)
- {
-     uint64_t sz;
--    const elf_shdr *shdr;
-+    ELF_HANDLE_DECL(elf_shdr) shdr;
-     int i, type;
- 
--    if ( !elf->sym_tab )
-+    if ( !ELF_HANDLE_VALID(elf->sym_tab) )
-         return;
- 
-     pstart = elf_round_up(elf, pstart);
-@@ -166,7 +168,7 @@ void elf_parse_bsdsyms(struct elf_binary *elf, uint64_t pstart)
-     for ( i = 0; i < elf_shdr_count(elf); i++ )
-     {
-         shdr = elf_shdr_by_index(elf, i);
--        type = elf_uval(elf, (elf_shdr *)shdr, sh_type);
-+        type = elf_uval(elf, shdr, sh_type);
-         if ( (type == SHT_STRTAB) || (type == SHT_SYMTAB) )
-             sz = elf_round_up(elf, sz + elf_uval(elf, shdr, sh_size));
-     }
-@@ -177,10 +179,12 @@ void elf_parse_bsdsyms(struct elf_binary *elf, uint64_t pstart)
- 
- static void elf_load_bsdsyms(struct elf_binary *elf)
- {
--    elf_ehdr *sym_ehdr;
-+    ELF_HANDLE_DECL_NONCONST(elf_ehdr) sym_ehdr;
-     unsigned long sz;
--    char *maxva, *symbase, *symtab_addr;
--    elf_shdr *shdr;
-+    ELF_PTRVAL_VOID maxva;
-+    ELF_PTRVAL_VOID symbase;
-+    ELF_PTRVAL_VOID symtab_addr;
-+    ELF_HANDLE_DECL_NONCONST(elf_shdr) shdr;
-     int i, type;
- 
-     if ( !elf->bsd_symtab_pstart )
-@@ -189,18 +193,18 @@ static void elf_load_bsdsyms(struct elf_binary *elf)
- #define elf_hdr_elm(_elf, _hdr, _elm, _val)     \
- do {                                            \
-     if ( elf_64bit(_elf) )                      \
--        (_hdr)->e64._elm = _val;                \
-+        elf_store_field(_elf, _hdr, e64._elm, _val);  \
-     else                                        \
--        (_hdr)->e32._elm = _val;                \
-+        elf_store_field(_elf, _hdr, e32._elm, _val);  \
- } while ( 0 )
- 
-     symbase = elf_get_ptr(elf, elf->bsd_symtab_pstart);
-     symtab_addr = maxva = symbase + sizeof(uint32_t);
- 
-     /* Set up Elf header. */
--    sym_ehdr = (elf_ehdr *)symtab_addr;
-+    sym_ehdr = ELF_MAKE_HANDLE(elf_ehdr, symtab_addr);
-     sz = elf_uval(elf, elf->ehdr, e_ehsize);
--    memcpy(sym_ehdr, elf->ehdr, sz);
-+    elf_memcpy_safe(elf, ELF_HANDLE_PTRVAL(sym_ehdr), ELF_HANDLE_PTRVAL(elf->ehdr), sz);
-     maxva += sz; /* no round up */
- 
-     elf_hdr_elm(elf, sym_ehdr, e_phoff, 0);
-@@ -209,37 +213,39 @@ do {                                            \
-     elf_hdr_elm(elf, sym_ehdr, e_phnum, 0);
- 
-     /* Copy Elf section headers. */
--    shdr = (elf_shdr *)maxva;
-+    shdr = ELF_MAKE_HANDLE(elf_shdr, maxva);
-     sz = elf_shdr_count(elf) * elf_uval(elf, elf->ehdr, e_shentsize);
--    memcpy(shdr, elf->image + elf_uval(elf, elf->ehdr, e_shoff), sz);
--    maxva = (char *)(long)elf_round_up(elf, (long)maxva + sz);
-+    elf_memcpy_safe(elf, ELF_HANDLE_PTRVAL(shdr),
-+                    ELF_IMAGE_BASE(elf) + elf_uval(elf, elf->ehdr, e_shoff),
-+                    sz);
-+    maxva = ELF_OBSOLETE_VOIDP_CAST elf_round_up(elf, (long)maxva + sz);
- 
-     for ( i = 0; i < elf_shdr_count(elf); i++ )
-     {
-         type = elf_uval(elf, shdr, sh_type);
-         if ( (type == SHT_STRTAB) || (type == SHT_SYMTAB) )
-         {
--             elf_msg(elf, "%s: shdr %i at 0x%p -> 0x%p\n", __func__, i,
-+             elf_msg(elf, "%s: shdr %i at 0x%"ELF_PRPTRVAL" -> 0x%"ELF_PRPTRVAL"\n", __func__, i,
-                      elf_section_start(elf, shdr), maxva);
-              sz = elf_uval(elf, shdr, sh_size);
--             memcpy(maxva, elf_section_start(elf, shdr), sz);
-+             elf_memcpy_safe(elf, maxva, elf_section_start(elf, shdr), sz);
-              /* Mangled to be based on ELF header location. */
-              elf_hdr_elm(elf, shdr, sh_offset, maxva - symtab_addr);
--             maxva = (char *)(long)elf_round_up(elf, (long)maxva + sz);
-+             maxva = ELF_OBSOLETE_VOIDP_CAST elf_round_up(elf, (long)maxva + sz);
-         }
--        shdr = (elf_shdr *)((long)shdr +
-+        shdr = ELF_MAKE_HANDLE(elf_shdr, ELF_HANDLE_PTRVAL(shdr) +
-                             (long)elf_uval(elf, elf->ehdr, e_shentsize));
-     }
- 
-     /* Write down the actual sym size. */
--    *(uint32_t *)symbase = maxva - symtab_addr;
-+    elf_store_val(elf, uint32_t, symbase, maxva - symtab_addr);
- 
- #undef elf_ehdr_elm
- }
- 
- void elf_parse_binary(struct elf_binary *elf)
- {
--    const elf_phdr *phdr;
-+    ELF_HANDLE_DECL(elf_phdr) phdr;
-     uint64_t low = -1;
-     uint64_t high = 0;
-     uint64_t i, count, paddr, memsz;
-@@ -267,9 +273,9 @@ void elf_parse_binary(struct elf_binary *elf)
- 
- int elf_load_binary(struct elf_binary *elf)
- {
--    const elf_phdr *phdr;
-+    ELF_HANDLE_DECL(elf_phdr) phdr;
-     uint64_t i, count, paddr, offset, filesz, memsz;
--    char *dest;
-+    ELF_PTRVAL_VOID dest;
- 
-     count = elf_uval(elf, elf->ehdr, e_phnum);
-     for ( i = 0; i < count; i++ )
-@@ -282,9 +288,9 @@ int elf_load_binary(struct elf_binary *elf)
-         filesz = elf_uval(elf, phdr, p_filesz);
-         memsz = elf_uval(elf, phdr, p_memsz);
-         dest = elf_get_ptr(elf, paddr);
--        elf_msg(elf, "%s: phdr %" PRIu64 " at 0x%p -> 0x%p\n",
--                __func__, i, dest, dest + filesz);
--        if ( elf_load_image(elf, dest, elf->image + offset, filesz, memsz) != 0 )
-+        elf_msg(elf, "%s: phdr %" PRIu64 " at 0x%"ELF_PRPTRVAL" -> 0x%"ELF_PRPTRVAL"\n",
-+                __func__, i, dest, (ELF_PTRVAL_VOID)(dest + filesz));
-+        if ( elf_load_image(elf, dest, ELF_IMAGE_BASE(elf) + offset, filesz, memsz) != 0 )
-             return -1;
-     }
- 
-@@ -292,18 +298,18 @@ int elf_load_binary(struct elf_binary *elf)
-     return 0;
- }
- 
--void *elf_get_ptr(struct elf_binary *elf, unsigned long addr)
-+ELF_PTRVAL_VOID elf_get_ptr(struct elf_binary *elf, unsigned long addr)
- {
-     return elf->dest + addr - elf->pstart;
- }
- 
- uint64_t elf_lookup_addr(struct elf_binary * elf, const char *symbol)
- {
--    const elf_sym *sym;
-+    ELF_HANDLE_DECL(elf_sym) sym;
-     uint64_t value;
- 
-     sym = elf_sym_by_name(elf, symbol);
--    if ( sym == NULL )
-+    if ( !ELF_HANDLE_VALID(sym) )
-     {
-         elf_err(elf, "%s: not found: %s\n", __FUNCTION__, symbol);
-         return -1;
-diff --git a/xen/common/libelf/libelf-tools.c b/xen/common/libelf/libelf-tools.c
-index 2f54142..f1fd886 100644
---- a/xen/common/libelf/libelf-tools.c
-+++ b/xen/common/libelf/libelf-tools.c
-@@ -67,10 +67,10 @@ int elf_phdr_count(struct elf_binary *elf)
-     return elf_uval(elf, elf->ehdr, e_phnum);
- }
- 
--const elf_shdr *elf_shdr_by_name(struct elf_binary *elf, const char *name)
-+ELF_HANDLE_DECL(elf_shdr) elf_shdr_by_name(struct elf_binary *elf, const char *name)
- {
-     uint64_t count = elf_shdr_count(elf);
--    const elf_shdr *shdr;
-+    ELF_HANDLE_DECL(elf_shdr) shdr;
-     const char *sname;
-     int i;
- 
-@@ -81,76 +81,80 @@ const elf_shdr *elf_shdr_by_name(struct elf_binary *elf, const char *name)
-         if ( sname && !strcmp(sname, name) )
-             return shdr;
-     }
--    return NULL;
-+    return ELF_INVALID_HANDLE(elf_shdr);
- }
- 
--const elf_shdr *elf_shdr_by_index(struct elf_binary *elf, int index)
-+ELF_HANDLE_DECL(elf_shdr) elf_shdr_by_index(struct elf_binary *elf, int index)
- {
-     uint64_t count = elf_shdr_count(elf);
--    const void *ptr;
-+    ELF_PTRVAL_CONST_VOID ptr;
- 
-     if ( index >= count )
--        return NULL;
-+        return ELF_INVALID_HANDLE(elf_shdr);
- 
--    ptr = (elf->image
-+    ptr = (ELF_IMAGE_BASE(elf)
-            + elf_uval(elf, elf->ehdr, e_shoff)
-            + elf_uval(elf, elf->ehdr, e_shentsize) * index);
--    return ptr;
-+    return ELF_MAKE_HANDLE(elf_shdr, ptr);
- }
- 
--const elf_phdr *elf_phdr_by_index(struct elf_binary *elf, int index)
-+ELF_HANDLE_DECL(elf_phdr) elf_phdr_by_index(struct elf_binary *elf, int index)
- {
-     uint64_t count = elf_uval(elf, elf->ehdr, e_phnum);
--    const void *ptr;
-+    ELF_PTRVAL_CONST_VOID ptr;
- 
-     if ( index >= count )
--        return NULL;
-+        return ELF_INVALID_HANDLE(elf_phdr);
- 
--    ptr = (elf->image
-+    ptr = (ELF_IMAGE_BASE(elf)
-            + elf_uval(elf, elf->ehdr, e_phoff)
-            + elf_uval(elf, elf->ehdr, e_phentsize) * index);
--    return ptr;
-+    return ELF_MAKE_HANDLE(elf_phdr, ptr);
- }
- 
--const char *elf_section_name(struct elf_binary *elf, const elf_shdr * shdr)
-+
-+const char *elf_section_name(struct elf_binary *elf,
-+                             ELF_HANDLE_DECL(elf_shdr) shdr)
- {
--    if ( elf->sec_strtab == NULL )
-+    if ( ELF_PTRVAL_INVALID(elf->sec_strtab) )
-         return "unknown";
-+
-     return elf->sec_strtab + elf_uval(elf, shdr, sh_name);
- }
- 
--const void *elf_section_start(struct elf_binary *elf, const elf_shdr * shdr)
-+ELF_PTRVAL_CONST_VOID elf_section_start(struct elf_binary *elf, ELF_HANDLE_DECL(elf_shdr) shdr)
- {
--    return elf->image + elf_uval(elf, shdr, sh_offset);
-+    return ELF_IMAGE_BASE(elf) + elf_uval(elf, shdr, sh_offset);
- }
- 
--const void *elf_section_end(struct elf_binary *elf, const elf_shdr * shdr)
-+ELF_PTRVAL_CONST_VOID elf_section_end(struct elf_binary *elf, ELF_HANDLE_DECL(elf_shdr) shdr)
- {
--    return elf->image
-+    return ELF_IMAGE_BASE(elf)
-         + elf_uval(elf, shdr, sh_offset) + elf_uval(elf, shdr, sh_size);
- }
- 
--const void *elf_segment_start(struct elf_binary *elf, const elf_phdr * phdr)
-+ELF_PTRVAL_CONST_VOID elf_segment_start(struct elf_binary *elf, ELF_HANDLE_DECL(elf_phdr) phdr)
- {
--    return elf->image + elf_uval(elf, phdr, p_offset);
-+    return ELF_IMAGE_BASE(elf)
-+        + elf_uval(elf, phdr, p_offset);
- }
- 
--const void *elf_segment_end(struct elf_binary *elf, const elf_phdr * phdr)
-+ELF_PTRVAL_CONST_VOID elf_segment_end(struct elf_binary *elf, ELF_HANDLE_DECL(elf_phdr) phdr)
- {
--    return elf->image
-+    return ELF_IMAGE_BASE(elf)
-         + elf_uval(elf, phdr, p_offset) + elf_uval(elf, phdr, p_filesz);
- }
- 
--const elf_sym *elf_sym_by_name(struct elf_binary *elf, const char *symbol)
-+ELF_HANDLE_DECL(elf_sym) elf_sym_by_name(struct elf_binary *elf, const char *symbol)
- {
--    const void *ptr = elf_section_start(elf, elf->sym_tab);
--    const void *end = elf_section_end(elf, elf->sym_tab);
--    const elf_sym *sym;
-+    ELF_PTRVAL_CONST_VOID ptr = elf_section_start(elf, elf->sym_tab);
-+    ELF_PTRVAL_CONST_VOID end = elf_section_end(elf, elf->sym_tab);
-+    ELF_HANDLE_DECL(elf_sym) sym;
-     uint64_t info, name;
- 
-     for ( ; ptr < end; ptr += elf_size(elf, sym) )
-     {
--        sym = ptr;
-+        sym = ELF_MAKE_HANDLE(elf_sym, ptr);
-         info = elf_uval(elf, sym, st_info);
-         name = elf_uval(elf, sym, st_name);
-         if ( ELF32_ST_BIND(info) != STB_GLOBAL )
-@@ -159,33 +163,33 @@ const elf_sym *elf_sym_by_name(struct elf_binary *elf, const char *symbol)
-             continue;
-         return sym;
-     }
--    return NULL;
-+    return ELF_INVALID_HANDLE(elf_sym);
- }
- 
--const elf_sym *elf_sym_by_index(struct elf_binary *elf, int index)
-+ELF_HANDLE_DECL(elf_sym) elf_sym_by_index(struct elf_binary *elf, int index)
- {
--    const void *ptr = elf_section_start(elf, elf->sym_tab);
--    const elf_sym *sym;
-+    ELF_PTRVAL_CONST_VOID ptr = elf_section_start(elf, elf->sym_tab);
-+    ELF_HANDLE_DECL(elf_sym) sym;
- 
--    sym = ptr + index * elf_size(elf, sym);
-+    sym = ELF_MAKE_HANDLE(elf_sym, ptr + index * elf_size(elf, sym));
-     return sym;
- }
- 
--const char *elf_note_name(struct elf_binary *elf, const elf_note * note)
-+const char *elf_note_name(struct elf_binary *elf, ELF_HANDLE_DECL(elf_note) note)
- {
--    return (void *)note + elf_size(elf, note);
-+    return ELF_HANDLE_PTRVAL(note) + elf_size(elf, note);
- }
- 
--const void *elf_note_desc(struct elf_binary *elf, const elf_note * note)
-+ELF_PTRVAL_CONST_VOID elf_note_desc(struct elf_binary *elf, ELF_HANDLE_DECL(elf_note) note)
- {
-     int namesz = (elf_uval(elf, note, namesz) + 3) & ~3;
- 
--    return (void *)note + elf_size(elf, note) + namesz;
-+    return ELF_HANDLE_PTRVAL(note) + elf_size(elf, note) + namesz;
- }
- 
--uint64_t elf_note_numeric(struct elf_binary *elf, const elf_note * note)
-+uint64_t elf_note_numeric(struct elf_binary *elf, ELF_HANDLE_DECL(elf_note) note)
- {
--    const void *desc = elf_note_desc(elf, note);
-+    ELF_PTRVAL_CONST_VOID desc = elf_note_desc(elf, note);
-     int descsz = elf_uval(elf, note, descsz);
- 
-     switch (descsz)
-@@ -200,10 +204,10 @@ uint64_t elf_note_numeric(struct elf_binary *elf, const elf_note * note)
-     }
- }
- 
--uint64_t elf_note_numeric_array(struct elf_binary *elf, const elf_note *note,
-+uint64_t elf_note_numeric_array(struct elf_binary *elf, ELF_HANDLE_DECL(elf_note) note,
-                                 unsigned int unitsz, unsigned int idx)
- {
--    const void *desc = elf_note_desc(elf, note);
-+    ELF_PTRVAL_CONST_VOID desc = elf_note_desc(elf, note);
-     int descsz = elf_uval(elf, note, descsz);
- 
-     if ( descsz % unitsz || idx >= descsz / unitsz )
-@@ -220,12 +224,12 @@ uint64_t elf_note_numeric_array(struct elf_binary *elf, const elf_note *note,
-     }
- }
- 
--const elf_note *elf_note_next(struct elf_binary *elf, const elf_note * note)
-+ELF_HANDLE_DECL(elf_note) elf_note_next(struct elf_binary *elf, ELF_HANDLE_DECL(elf_note) note)
- {
-     int namesz = (elf_uval(elf, note, namesz) + 3) & ~3;
-     int descsz = (elf_uval(elf, note, descsz) + 3) & ~3;
- 
--    return (void *)note + elf_size(elf, note) + namesz + descsz;
-+    return ELF_MAKE_HANDLE(elf_note, ELF_HANDLE_PTRVAL(note) + elf_size(elf, note) + namesz + descsz);
- }
- 
- /* ------------------------------------------------------------------------ */
-@@ -234,10 +238,10 @@ int elf_is_elfbinary(const void *image)
- {
-     const Elf32_Ehdr *ehdr = image;
- 
--    return IS_ELF(*ehdr);
-+    return IS_ELF(*ehdr); /* fixme unchecked */
- }
- 
--int elf_phdr_is_loadable(struct elf_binary *elf, const elf_phdr * phdr)
-+int elf_phdr_is_loadable(struct elf_binary *elf, ELF_HANDLE_DECL(elf_phdr) phdr)
- {
-     uint64_t p_type = elf_uval(elf, phdr, p_type);
-     uint64_t p_flags = elf_uval(elf, phdr, p_flags);
-diff --git a/xen/include/xen/libelf.h b/xen/include/xen/libelf.h
-index 38e490c..cefd3d3 100644
---- a/xen/include/xen/libelf.h
-+++ b/xen/include/xen/libelf.h
-@@ -48,6 +48,97 @@ typedef void elf_log_callback(struct elf_binary*, void *caller_data,
- 
- /* ------------------------------------------------------------------------ */
- 
-+/* Macros for accessing the input image and output area. */
-+
-+/*
-+ * We abstract away the pointerness of these pointers, replacing
-+ * various void*, char* and struct* with the following:
-+ *   PTRVAL      A pointer to a byte; one can do pointer arithmetic
-+ *               on this.
-+ *               This replaces variables which were char*,void*
-+ *               and their const versions, so we provide four
-+ *               different declaration macros:
-+ *                   ELF_PTRVAL_{,CONST}{VOID,CHAR}
-+ *   HANDLE      A pointer to a struct.  There is one of these types
-+ *               for each pointer type - that is, for each "structname".
-+ *               In the arguments to the various HANDLE macros, structname
-+ *               must be a single identifier which is a typedef.
-+ *               It is not permitted to do arithmetic on these
-+ *               pointers.  In the current code attempts to do so will
-+ *               compile, but in the next patch this will become a
-+ *               compile error.
-+ *               We provide two declaration macros for const and
-+ *               non-const pointers.
-+ */
-+
-+#define ELF_REALPTR2PTRVAL(realpointer) (realpointer)
-+  /* Converts an actual C pointer into a PTRVAL */
-+
-+#define ELF_HANDLE_DECL_NONCONST(structname)  structname *
-+#define ELF_HANDLE_DECL(structname)           const structname *
-+  /* Provides a type declaration for a HANDLE. */
-+  /* May only be used to declare ONE variable at a time */
-+
-+#define ELF_PTRVAL_VOID         void *
-+#define ELF_PTRVAL_CHAR         char *
-+#define ELF_PTRVAL_CONST_VOID   const void *
-+#define ELF_PTRVAL_CONST_CHAR   const char *
-+  /* Provides a type declaration for a PTRVAL. */
-+  /* May only be used to declare ONE variable at a time */
-+
-+#define ELF_DEFINE_HANDLE(structname) /* empty */
-+  /*
-+   * This must be invoked for each HANDLE type to define
-+   * the actual C type used for that kind of HANDLE.
-+   */
-+
-+#define ELF_PRPTRVAL "p"
-+  /* printf format a la PRId... for a PTRVAL */
-+
-+#define ELF_MAKE_HANDLE(structname, ptrval) (ptrval)
-+  /* Converts a PTRVAL to a HANDLE */
-+
-+#define ELF_IMAGE_BASE(elf) ((elf)->image)
-+  /* Returns the base of the image as a PTRVAL. */
-+
-+#define ELF_HANDLE_PTRVAL(handleval) ((void*)(handleval))
-+  /* Converts a HANDLE to a PTRVAL. */
-+
-+#define ELF_OBSOLETE_VOIDP_CAST (void*)(uintptr_t)
-+  /*
-+   * In some places the existing code needs to
-+   *  - cast away const (the existing code uses const a fair
-+   *    bit but actually sometimes wants to write to its input)
-+   *    from a PTRVAL.
-+   *  - convert an integer representing a pointer to a PTRVAL
-+   * This macro provides a suitable cast.
-+   */
-+
-+#define ELF_UNSAFE_PTR(ptrval) ((void*)(uintptr_t)(ptrval))
-+  /*
-+   * Turns a PTRVAL into an actual C pointer.  Before this is done
-+   * the caller must have ensured that the PTRVAL does in fact point
-+   * to a permissible location.
-+   */
-+
-+/* PTRVALs can be INVALID (ie, NULL). */
-+#define ELF_INVALID_PTRVAL            (NULL)        /* returns NULL PTRVAL */
-+#define ELF_INVALID_HANDLE(structname)		    /* returns NULL handle */ \
-+    ELF_MAKE_HANDLE(structname, ELF_INVALID_PTRVAL)
-+#define ELF_PTRVAL_VALID(ptrval)      (ptrval)            /* }            */
-+#define ELF_HANDLE_VALID(handleval)   (handleval)         /* } predicates */
-+#define ELF_PTRVAL_INVALID(ptrval)    ((ptrval) == NULL)  /* }            */
-+
-+/* For internal use by other macros here */
-+#define ELF__HANDLE_FIELD_TYPE(handleval, elm) \
-+  typeof((handleval)->elm)
-+#define ELF__HANDLE_FIELD_OFFSET(handleval, elm) \
-+  offsetof(typeof(*(handleval)),elm)
-+
-+
-+/* ------------------------------------------------------------------------ */
-+
-+
- typedef union {
-     Elf32_Ehdr e32;
-     Elf64_Ehdr e64;
-@@ -83,6 +174,12 @@ typedef union {
-     Elf64_Note e64;
- } elf_note;
- 
-+ELF_DEFINE_HANDLE(elf_ehdr)
-+ELF_DEFINE_HANDLE(elf_shdr)
-+ELF_DEFINE_HANDLE(elf_phdr)
-+ELF_DEFINE_HANDLE(elf_sym)
-+ELF_DEFINE_HANDLE(elf_note)
-+
- struct elf_binary {
-     /* elf binary */
-     const char *image;
-@@ -90,10 +187,10 @@ struct elf_binary {
-     char class;
-     char data;
- 
--    const elf_ehdr *ehdr;
--    const char *sec_strtab;
--    const elf_shdr *sym_tab;
--    const char *sym_strtab;
-+    ELF_HANDLE_DECL(elf_ehdr) ehdr;
-+    ELF_PTRVAL_CONST_CHAR sec_strtab;
-+    ELF_HANDLE_DECL(elf_shdr) sym_tab;
-+    ELF_PTRVAL_CONST_CHAR sym_strtab;
- 
-     /* loaded to */
-     char *dest;
-@@ -135,45 +232,72 @@ struct elf_binary {
-      : elf_access_unsigned((elf), (str),                                \
-                            offsetof(typeof(*(str)),e32.elem),           \
-                            sizeof((str)->e32.elem)))
-+  /*
-+   * Reads an unsigned field in a header structure in the ELF.
-+   * str is a HANDLE, and elem is the field name in it.
-+   */
- 
- #define elf_size(elf, str)                              \
-     ((ELFCLASS64 == (elf)->class)                       \
-      ? sizeof((str)->e64) : sizeof((str)->e32))
-+  /*
-+   * Returns the size of the substructure for the appropriate 32/64-bitness.
-+   * str should be a HANDLE.
-+   */
- 
--uint64_t elf_access_unsigned(struct elf_binary *elf, const void *ptr,
-+uint64_t elf_access_unsigned(struct elf_binary *elf, ELF_PTRVAL_CONST_VOID ptr,
-                              uint64_t offset, size_t size);
-+  /* Reads a field at arbitrary offset and alignemnt */
- 
- uint64_t elf_round_up(struct elf_binary *elf, uint64_t addr);
- 
-+
-+#define elf_memcpy_safe(elf, dst, src, sz) memcpy((dst),(src),(sz))
-+#define elf_memset_safe(elf, dst, c, sz)   memset((dst),(c),(sz))
-+  /*
-+   * Versions of memcpy and memset which will (in the next patch)
-+   * arrange never to write outside permitted areas.
-+   */
-+
-+#define elf_store_val(elf, type, ptr, val)   (*(type*)(ptr) = (val))
-+  /* Stores a value at a particular PTRVAL. */
-+
-+#define elf_store_field(elf, hdr, elm, val)                     \
-+    (elf_store_val((elf), ELF__HANDLE_FIELD_TYPE(hdr, elm),     \
-+                   &((hdr)->elm),                               \
-+                   (val)))
-+  /* Stores a 32/64-bit field.  hdr is a HANDLE and elm is the field name. */
-+
-+
- /* ------------------------------------------------------------------------ */
- /* xc_libelf_tools.c                                                        */
- 
- int elf_shdr_count(struct elf_binary *elf);
- int elf_phdr_count(struct elf_binary *elf);
- 
--const elf_shdr *elf_shdr_by_name(struct elf_binary *elf, const char *name);
--const elf_shdr *elf_shdr_by_index(struct elf_binary *elf, int index);
--const elf_phdr *elf_phdr_by_index(struct elf_binary *elf, int index);
-+ELF_HANDLE_DECL(elf_shdr) elf_shdr_by_name(struct elf_binary *elf, const char *name);
-+ELF_HANDLE_DECL(elf_shdr) elf_shdr_by_index(struct elf_binary *elf, int index);
-+ELF_HANDLE_DECL(elf_phdr) elf_phdr_by_index(struct elf_binary *elf, int index);
- 
--const char *elf_section_name(struct elf_binary *elf, const elf_shdr * shdr);
--const void *elf_section_start(struct elf_binary *elf, const elf_shdr * shdr);
--const void *elf_section_end(struct elf_binary *elf, const elf_shdr * shdr);
-+const char *elf_section_name(struct elf_binary *elf, ELF_HANDLE_DECL(elf_shdr) shdr);
-+ELF_PTRVAL_CONST_VOID elf_section_start(struct elf_binary *elf, ELF_HANDLE_DECL(elf_shdr) shdr);
-+ELF_PTRVAL_CONST_VOID elf_section_end(struct elf_binary *elf, ELF_HANDLE_DECL(elf_shdr) shdr);
- 
--const void *elf_segment_start(struct elf_binary *elf, const elf_phdr * phdr);
--const void *elf_segment_end(struct elf_binary *elf, const elf_phdr * phdr);
-+ELF_PTRVAL_CONST_VOID elf_segment_start(struct elf_binary *elf, ELF_HANDLE_DECL(elf_phdr) phdr);
-+ELF_PTRVAL_CONST_VOID elf_segment_end(struct elf_binary *elf, ELF_HANDLE_DECL(elf_phdr) phdr);
- 
--const elf_sym *elf_sym_by_name(struct elf_binary *elf, const char *symbol);
--const elf_sym *elf_sym_by_index(struct elf_binary *elf, int index);
-+ELF_HANDLE_DECL(elf_sym) elf_sym_by_name(struct elf_binary *elf, const char *symbol);
-+ELF_HANDLE_DECL(elf_sym) elf_sym_by_index(struct elf_binary *elf, int index);
- 
--const char *elf_note_name(struct elf_binary *elf, const elf_note * note);
--const void *elf_note_desc(struct elf_binary *elf, const elf_note * note);
--uint64_t elf_note_numeric(struct elf_binary *elf, const elf_note * note);
--uint64_t elf_note_numeric_array(struct elf_binary *, const elf_note *,
-+const char *elf_note_name(struct elf_binary *elf, ELF_HANDLE_DECL(elf_note) note);
-+ELF_PTRVAL_CONST_VOID elf_note_desc(struct elf_binary *elf, ELF_HANDLE_DECL(elf_note) note);
-+uint64_t elf_note_numeric(struct elf_binary *elf, ELF_HANDLE_DECL(elf_note) note);
-+uint64_t elf_note_numeric_array(struct elf_binary *, ELF_HANDLE_DECL(elf_note),
-                                 unsigned int unitsz, unsigned int idx);
--const elf_note *elf_note_next(struct elf_binary *elf, const elf_note * note);
-+ELF_HANDLE_DECL(elf_note) elf_note_next(struct elf_binary *elf, ELF_HANDLE_DECL(elf_note) note);
- 
- int elf_is_elfbinary(const void *image);
--int elf_phdr_is_loadable(struct elf_binary *elf, const elf_phdr * phdr);
-+int elf_phdr_is_loadable(struct elf_binary *elf, ELF_HANDLE_DECL(elf_phdr) phdr);
- 
- /* ------------------------------------------------------------------------ */
- /* xc_libelf_loader.c                                                       */
-@@ -189,7 +313,7 @@ void elf_set_log(struct elf_binary *elf, elf_log_callback*,
- void elf_parse_binary(struct elf_binary *elf);
- int elf_load_binary(struct elf_binary *elf);
- 
--void *elf_get_ptr(struct elf_binary *elf, unsigned long addr);
-+ELF_PTRVAL_VOID elf_get_ptr(struct elf_binary *elf, unsigned long addr);
- uint64_t elf_lookup_addr(struct elf_binary *elf, const char *symbol);
- 
- void elf_parse_bsdsyms(struct elf_binary *elf, uint64_t pstart); /* private */
-@@ -221,9 +345,9 @@ struct xen_elfnote {
- 
- struct elf_dom_parms {
-     /* raw */
--    const char *guest_info;
--    const void *elf_note_start;
--    const void *elf_note_end;
-+    ELF_PTRVAL_CONST_CHAR guest_info;
-+    ELF_PTRVAL_CONST_VOID elf_note_start;
-+    ELF_PTRVAL_CONST_VOID elf_note_end;
-     struct xen_elfnote elf_notes[XEN_ELFNOTE_MAX + 1];
- 
-     /* parsed */
-@@ -262,10 +386,22 @@ int elf_xen_parse_features(const char *features,
-                            uint32_t *required);
- int elf_xen_parse_note(struct elf_binary *elf,
-                        struct elf_dom_parms *parms,
--                       const elf_note *note);
-+                       ELF_HANDLE_DECL(elf_note) note);
- int elf_xen_parse_guest_info(struct elf_binary *elf,
-                              struct elf_dom_parms *parms);
- int elf_xen_parse(struct elf_binary *elf,
-                   struct elf_dom_parms *parms);
- 
-+#define elf_memcpy_unchecked memcpy
-+#define elf_memset_unchecked memset
-+  /*
-+   * Unsafe versions of memcpy and memset which take actual C
-+   * pointers.  These are just like real memcpy and memset.
-+   */
-+
-+
-+#define ELF_ADVANCE_DEST(elf, amount)  elf->dest += (amount)
-+  /* Advances past amount bytes of the current destination area. */
-+
-+
- #endif /* __XEN_LIBELF_H__ */
--- 
-1.7.2.5
-
diff --git a/0009-tools-xcutils-readnotes-adjust-print_l1_mfn_valid_no.patch b/0009-tools-xcutils-readnotes-adjust-print_l1_mfn_valid_no.patch
deleted file mode 100644
index 707c570..0000000
--- a/0009-tools-xcutils-readnotes-adjust-print_l1_mfn_valid_no.patch
+++ /dev/null
@@ -1,58 +0,0 @@
-From 59f66d58180832af6b99a9e4489031b5c2f627ab Mon Sep 17 00:00:00 2001
-From: Ian Jackson <ian.jackson at eu.citrix.com>
-Date: Fri, 14 Jun 2013 16:43:17 +0100
-Subject: [PATCH 09/23] tools/xcutils/readnotes: adjust print_l1_mfn_valid_note
-
-Use the new PTRVAL macros and elf_access_unsigned in
-print_l1_mfn_valid_note.
-
-No functional change unless the input is wrong, or we are reading a
-file for a different endianness.
-
-Separated out from the previous patch because this change does produce
-a difference in the generated code.
-
-This is part of the fix to a security issue, XSA-55.
-
-Signed-off-by: Ian Jackson <ian.jackson at eu.citrix.com>
-Acked-by: Ian Campbell <ian.campbell at citrix.com>
----
- tools/xcutils/readnotes.c |   11 ++++++-----
- 1 files changed, 6 insertions(+), 5 deletions(-)
-
-diff --git a/tools/xcutils/readnotes.c b/tools/xcutils/readnotes.c
-index 2af047d..7ff2530 100644
---- a/tools/xcutils/readnotes.c
-+++ b/tools/xcutils/readnotes.c
-@@ -77,22 +77,23 @@ static void print_numeric_note(const char *prefix, struct elf_binary *elf,
- }
- 
- static void print_l1_mfn_valid_note(const char *prefix, struct elf_binary *elf,
--				    const elf_note *note)
-+				    ELF_HANDLE_DECL(elf_note) note)
- {
- 	int descsz = elf_uval(elf, note, descsz);
--	const uint32_t *desc32 = elf_note_desc(elf, note);
--	const uint64_t *desc64 = elf_note_desc(elf, note);
-+	ELF_PTRVAL_CONST_VOID desc = elf_note_desc(elf, note);
- 
- 	/* XXX should be able to cope with a list of values. */
- 	switch ( descsz / 2 )
- 	{
- 	case 8:
- 		printf("%s: mask=%#"PRIx64" value=%#"PRIx64"\n", prefix,
--		       desc64[0], desc64[1]);
-+		       elf_access_unsigned(elf, desc, 0, 8),
-+		       elf_access_unsigned(elf, desc, 8, 8));
- 		break;
- 	case 4:
- 		printf("%s: mask=%#"PRIx32" value=%#"PRIx32"\n", prefix,
--		       desc32[0],desc32[1]);
-+		       (uint32_t)elf_access_unsigned(elf, desc, 0, 4),
-+		       (uint32_t)elf_access_unsigned(elf, desc, 4, 4));
- 		break;
- 	}
- 
--- 
-1.7.2.5
-
diff --git a/0010-libelf-check-nul-terminated-strings-properly.patch b/0010-libelf-check-nul-terminated-strings-properly.patch
deleted file mode 100644
index b782936..0000000
--- a/0010-libelf-check-nul-terminated-strings-properly.patch
+++ /dev/null
@@ -1,204 +0,0 @@
-From db14d5bd9b6508adfcd2b910f454fae12fa4ba00 Mon Sep 17 00:00:00 2001
-From: Ian Jackson <ian.jackson at eu.citrix.com>
-Date: Fri, 14 Jun 2013 16:43:17 +0100
-Subject: [PATCH 10/23] libelf: check nul-terminated strings properly
-
-It is not safe to simply take pointers into the ELF and use them as C
-pointers.  They might not be properly nul-terminated (and the pointers
-might be wild).
-
-So we are going to introduce a new function elf_strval for safely
-getting strings.  This will check that the addresses are in range and
-that there is a proper nul-terminated string.  Of course it might
-discover that there isn't.  In that case, it will be made to fail.
-This means that elf_note_name might fail, too.
-
-For the benefit of call sites which are just going to pass the value
-to a printf-like function, we provide elf_strfmt which returns
-"(invalid)" on failure rather than NULL.
-
-In this patch we introduce dummy definitions of these functions.  We
-introduce calls to elf_strval and elf_strfmt everywhere, and update
-all the call sites with appropriate error checking.
-
-There is not yet any semantic change, since before this patch all the
-places where we introduce elf_strval dereferenced the value anyway, so
-it mustn't have been NULL.
-
-In future patches, when elf_strval is made able return NULL, when it
-does so it will mark the elf "broken" so that an appropriate
-diagnostic can be printed.
-
-This is part of the fix to a security issue, XSA-55.
-
-Signed-off-by: Ian Jackson <ian.jackson at eu.citrix.com>
-Acked-by: Ian Campbell <ian.campbell at citrix.com>
-Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk at oracle.com>
----
- tools/xcutils/readnotes.c          |   11 ++++++++---
- xen/common/libelf/libelf-dominfo.c |   13 ++++++++++---
- xen/common/libelf/libelf-tools.c   |   10 +++++++---
- xen/include/xen/libelf.h           |    7 +++++--
- 4 files changed, 30 insertions(+), 11 deletions(-)
-
-diff --git a/tools/xcutils/readnotes.c b/tools/xcutils/readnotes.c
-index 7ff2530..cfae994 100644
---- a/tools/xcutils/readnotes.c
-+++ b/tools/xcutils/readnotes.c
-@@ -63,7 +63,7 @@ struct setup_header {
- static void print_string_note(const char *prefix, struct elf_binary *elf,
- 			      ELF_HANDLE_DECL(elf_note) note)
- {
--	printf("%s: %s\n", prefix, (char*)elf_note_desc(elf, note));
-+	printf("%s: %s\n", prefix, elf_strfmt(elf, elf_note_desc(elf, note)));
- }
- 
- static void print_numeric_note(const char *prefix, struct elf_binary *elf,
-@@ -103,10 +103,14 @@ static int print_notes(struct elf_binary *elf, ELF_HANDLE_DECL(elf_note) start,
- {
- 	ELF_HANDLE_DECL(elf_note) note;
- 	int notes_found = 0;
-+	const char *this_note_name;
- 
- 	for ( note = start; ELF_HANDLE_PTRVAL(note) < ELF_HANDLE_PTRVAL(end); note = elf_note_next(elf, note) )
- 	{
--		if (0 != strcmp(elf_note_name(elf, note), "Xen"))
-+		this_note_name = elf_note_name(elf, note);
-+		if (NULL == this_note_name)
-+			continue;
-+		if (0 != strcmp(this_note_name, "Xen"))
- 			continue;
- 
- 		notes_found++;
-@@ -294,7 +298,8 @@ int main(int argc, char **argv)
- 
- 	shdr = elf_shdr_by_name(&elf, "__xen_guest");
- 	if (ELF_HANDLE_VALID(shdr))
--		printf("__xen_guest: %s\n", (char*)elf_section_start(&elf, shdr));
-+		printf("__xen_guest: %s\n",
-+                       elf_strfmt(&elf, elf_section_start(&elf, shdr)));
- 
- 	return 0;
- }
-diff --git a/xen/common/libelf/libelf-dominfo.c b/xen/common/libelf/libelf-dominfo.c
-index 7140d59..b217f8f 100644
---- a/xen/common/libelf/libelf-dominfo.c
-+++ b/xen/common/libelf/libelf-dominfo.c
-@@ -137,7 +137,10 @@ int elf_xen_parse_note(struct elf_binary *elf,
- 
-     if ( note_desc[type].str )
-     {
--        str = elf_note_desc(elf, note);
-+        str = elf_strval(elf, elf_note_desc(elf, note));
-+        if (str == NULL)
-+            /* elf_strval will mark elf broken if it fails so no need to log */
-+            return 0;
-         elf_msg(elf, "%s: %s = \"%s\"\n", __FUNCTION__,
-                 note_desc[type].name, str);
-         parms->elf_notes[type].type = XEN_ENT_STR;
-@@ -220,6 +223,7 @@ static int elf_xen_parse_notes(struct elf_binary *elf,
- {
-     int xen_elfnotes = 0;
-     ELF_HANDLE_DECL(elf_note) note;
-+    const char *note_name;
- 
-     parms->elf_note_start = start;
-     parms->elf_note_end   = end;
-@@ -227,7 +231,10 @@ static int elf_xen_parse_notes(struct elf_binary *elf,
-           ELF_HANDLE_PTRVAL(note) < parms->elf_note_end;
-           note = elf_note_next(elf, note) )
-     {
--        if ( strcmp(elf_note_name(elf, note), "Xen") )
-+        note_name = elf_note_name(elf, note);
-+        if ( note_name == NULL )
-+            continue;
-+        if ( strcmp(note_name, "Xen") )
-             continue;
-         if ( elf_xen_parse_note(elf, parms, note) )
-             return -1;
-@@ -541,7 +548,7 @@ int elf_xen_parse(struct elf_binary *elf,
-                 parms->elf_note_start = ELF_INVALID_PTRVAL;
-                 parms->elf_note_end   = ELF_INVALID_PTRVAL;
-                 elf_msg(elf, "%s: __xen_guest: \"%s\"\n", __FUNCTION__,
--                        parms->guest_info);
-+                        elf_strfmt(elf, parms->guest_info));
-                 elf_xen_parse_guest_info(elf, parms);
-                 break;
-             }
-diff --git a/xen/common/libelf/libelf-tools.c b/xen/common/libelf/libelf-tools.c
-index f1fd886..3a0cde1 100644
---- a/xen/common/libelf/libelf-tools.c
-+++ b/xen/common/libelf/libelf-tools.c
-@@ -119,7 +119,7 @@ const char *elf_section_name(struct elf_binary *elf,
-     if ( ELF_PTRVAL_INVALID(elf->sec_strtab) )
-         return "unknown";
- 
--    return elf->sec_strtab + elf_uval(elf, shdr, sh_name);
-+    return elf_strval(elf, elf->sec_strtab + elf_uval(elf, shdr, sh_name));
- }
- 
- ELF_PTRVAL_CONST_VOID elf_section_start(struct elf_binary *elf, ELF_HANDLE_DECL(elf_shdr) shdr)
-@@ -151,6 +151,7 @@ ELF_HANDLE_DECL(elf_sym) elf_sym_by_name(struct elf_binary *elf, const char *sym
-     ELF_PTRVAL_CONST_VOID end = elf_section_end(elf, elf->sym_tab);
-     ELF_HANDLE_DECL(elf_sym) sym;
-     uint64_t info, name;
-+    const char *sym_name;
- 
-     for ( ; ptr < end; ptr += elf_size(elf, sym) )
-     {
-@@ -159,7 +160,10 @@ ELF_HANDLE_DECL(elf_sym) elf_sym_by_name(struct elf_binary *elf, const char *sym
-         name = elf_uval(elf, sym, st_name);
-         if ( ELF32_ST_BIND(info) != STB_GLOBAL )
-             continue;
--        if ( strcmp(elf->sym_strtab + name, symbol) )
-+        sym_name = elf_strval(elf, elf->sym_strtab + name);
-+        if ( sym_name == NULL ) /* out of range, oops */
-+            return ELF_INVALID_HANDLE(elf_sym);
-+        if ( strcmp(sym_name, symbol) )
-             continue;
-         return sym;
-     }
-@@ -177,7 +181,7 @@ ELF_HANDLE_DECL(elf_sym) elf_sym_by_index(struct elf_binary *elf, int index)
- 
- const char *elf_note_name(struct elf_binary *elf, ELF_HANDLE_DECL(elf_note) note)
- {
--    return ELF_HANDLE_PTRVAL(note) + elf_size(elf, note);
-+    return elf_strval(elf, ELF_HANDLE_PTRVAL(note) + elf_size(elf, note));
- }
- 
- ELF_PTRVAL_CONST_VOID elf_note_desc(struct elf_binary *elf, ELF_HANDLE_DECL(elf_note) note)
-diff --git a/xen/include/xen/libelf.h b/xen/include/xen/libelf.h
-index cefd3d3..af5b5c5 100644
---- a/xen/include/xen/libelf.h
-+++ b/xen/include/xen/libelf.h
-@@ -252,6 +252,9 @@ uint64_t elf_access_unsigned(struct elf_binary *elf, ELF_PTRVAL_CONST_VOID ptr,
- uint64_t elf_round_up(struct elf_binary *elf, uint64_t addr);
- 
- 
-+#define elf_strval(elf,x) ((const char*)(x)) /* may return NULL in the future */
-+#define elf_strfmt(elf,x) ((const char*)(x)) /* will return (invalid) instead */
-+
- #define elf_memcpy_safe(elf, dst, src, sz) memcpy((dst),(src),(sz))
- #define elf_memset_safe(elf, dst, c, sz)   memset((dst),(c),(sz))
-   /*
-@@ -279,7 +282,7 @@ ELF_HANDLE_DECL(elf_shdr) elf_shdr_by_name(struct elf_binary *elf, const char *n
- ELF_HANDLE_DECL(elf_shdr) elf_shdr_by_index(struct elf_binary *elf, int index);
- ELF_HANDLE_DECL(elf_phdr) elf_phdr_by_index(struct elf_binary *elf, int index);
- 
--const char *elf_section_name(struct elf_binary *elf, ELF_HANDLE_DECL(elf_shdr) shdr);
-+const char *elf_section_name(struct elf_binary *elf, ELF_HANDLE_DECL(elf_shdr) shdr); /* might return NULL if inputs are invalid */
- ELF_PTRVAL_CONST_VOID elf_section_start(struct elf_binary *elf, ELF_HANDLE_DECL(elf_shdr) shdr);
- ELF_PTRVAL_CONST_VOID elf_section_end(struct elf_binary *elf, ELF_HANDLE_DECL(elf_shdr) shdr);
- 
-@@ -289,7 +292,7 @@ ELF_PTRVAL_CONST_VOID elf_segment_end(struct elf_binary *elf, ELF_HANDLE_DECL(el
- ELF_HANDLE_DECL(elf_sym) elf_sym_by_name(struct elf_binary *elf, const char *symbol);
- ELF_HANDLE_DECL(elf_sym) elf_sym_by_index(struct elf_binary *elf, int index);
- 
--const char *elf_note_name(struct elf_binary *elf, ELF_HANDLE_DECL(elf_note) note);
-+const char *elf_note_name(struct elf_binary *elf, ELF_HANDLE_DECL(elf_note) note); /* may return NULL */
- ELF_PTRVAL_CONST_VOID elf_note_desc(struct elf_binary *elf, ELF_HANDLE_DECL(elf_note) note);
- uint64_t elf_note_numeric(struct elf_binary *elf, ELF_HANDLE_DECL(elf_note) note);
- uint64_t elf_note_numeric_array(struct elf_binary *, ELF_HANDLE_DECL(elf_note),
--- 
-1.7.2.5
-
diff --git a/0011-libelf-check-all-pointer-accesses.patch b/0011-libelf-check-all-pointer-accesses.patch
deleted file mode 100644
index 5ad7827..0000000
--- a/0011-libelf-check-all-pointer-accesses.patch
+++ /dev/null
@@ -1,788 +0,0 @@
-From cc8761371aac432318530c2ddfe2c8234bc0621f Mon Sep 17 00:00:00 2001
-From: Ian Jackson <ian.jackson at eu.citrix.com>
-Date: Fri, 14 Jun 2013 16:43:17 +0100
-Subject: [PATCH 11/23] libelf: check all pointer accesses
-
-We change the ELF_PTRVAL and ELF_HANDLE types and associated macros:
-
- * PTRVAL becomes a uintptr_t, for which we provide a typedef
-   elf_ptrval.  This means no arithmetic done on it can overflow so
-   the compiler cannot do any malicious invalid pointer arithmetic
-   "optimisations".  It also means that any places where we
-   dereference one of these pointers without using the appropriate
-   macros or functions become a compilation error.
-
-   So we can be sure that we won't miss any memory accesses.
-
-   All the PTRVAL variables were previously void* or char*, so
-   the actual address calculations are unchanged.
-
- * ELF_HANDLE becomes a union, one half of which keeps the pointer
-   value and the other half of which is just there to record the
-   type.
-
-   The new type is not a pointer type so there can be no address
-   calculations on it whose meaning would change.  Every assignment or
-   access has to go through one of our macros.
-
- * The distinction between const and non-const pointers and char*s
-   and void*s in libelf goes away.  This was not important (and
-   anyway libelf tended to cast away const in various places).
-
- * The fields elf->image and elf->dest are renamed.  That proves
-   that we haven't missed any unchecked uses of these actual
-   pointer values.
-
- * The caller may fill in elf->caller_xdest_base and _size to
-   specify another range of memory which is safe for libelf to
-   access, besides the input and output images.
-
- * When accesses fail due to being out of range, we mark the elf
-   "broken".  This will be checked and used for diagnostics in
-   a following patch.
-
-   We do not check for write accesses to the input image.  This is
-   because libelf actually does this in a number of places.  So we
-   simply permit that.
-
- * Each caller of libelf which used to set dest now sets
-   dest_base and dest_size.
-
- * In xc_dom_load_elf_symtab we provide a new actual-pointer
-   value hdr_ptr which we get from mapping the guest's kernel
-   area and use (checking carefully) as the caller_xdest area.
-
- * The STAR(h) macro in libelf-dominfo.c now uses elf_access_unsigned.
-
- * elf-init uses the new elf_uval_3264 accessor to access the 32-bit
-   fields, rather than an unchecked field access (ie, unchecked
-   pointer access).
-
- * elf_uval has been reworked to use elf_uval_3264.  Both of these
-   macros are essentially new in this patch (although they are derived
-   from the old elf_uval) and need careful review.
-
- * ELF_ADVANCE_DEST is now safe in the sense that you can use it to
-   chop parts off the front of the dest area but if you chop more than
-   is available, the dest area is simply set to be empty, preventing
-   future accesses.
-
- * We introduce some #defines for memcpy, memset, memmove and strcpy:
-    - We provide elf_memcpy_safe and elf_memset_safe which take
-      PTRVALs and do checking on the supplied pointers.
-    - Users inside libelf must all be changed to either
-      elf_mem*_unchecked (which are just like mem*), or
-      elf_mem*_safe (which take PTRVALs) and are checked.  Any
-      unchanged call sites become compilation errors.
-
- * We do _not_ at this time fix elf_access_unsigned so that it doesn't
-   make unaligned accesses.  We hope that unaligned accesses are OK on
-   every supported architecture.  But it does check the supplied
-   pointer for validity.
-
-This is part of the fix to a security issue, XSA-55.
-
-Signed-off-by: Ian Jackson <ian.jackson at eu.citrix.com>
----
- tools/libxc/xc_dom_elfloader.c     |   49 ++++++++--
- tools/libxc/xc_hvm_build_x86.c     |   10 +-
- xen/arch/x86/domain_build.c        |    3 +-
- xen/common/libelf/libelf-dominfo.c |    2 +-
- xen/common/libelf/libelf-loader.c  |   16 ++--
- xen/common/libelf/libelf-private.h |   13 +++
- xen/common/libelf/libelf-tools.c   |  106 ++++++++++++++++++-
- xen/include/xen/libelf.h           |  198 +++++++++++++++++++++++++-----------
- 8 files changed, 312 insertions(+), 85 deletions(-)
-
-diff --git a/tools/libxc/xc_dom_elfloader.c b/tools/libxc/xc_dom_elfloader.c
-index cc0f206..b82a08c 100644
---- a/tools/libxc/xc_dom_elfloader.c
-+++ b/tools/libxc/xc_dom_elfloader.c
-@@ -130,20 +130,30 @@ static int xc_dom_load_elf_symtab(struct xc_dom_image *dom,
- 
-     if ( load )
-     {
--        size_t allow_size; /* will be used in a forthcoming XSA-55 patch */
-+        char *hdr_ptr;
-+        size_t allow_size;
-+
-         if ( !dom->bsd_symtab_start )
-             return 0;
-         size = dom->kernel_seg.vend - dom->bsd_symtab_start;
--        hdr  = xc_dom_vaddr_to_ptr(dom, dom->bsd_symtab_start, &allow_size);
--        *(int *)hdr = size - sizeof(int);
-+        hdr_ptr = xc_dom_vaddr_to_ptr(dom, dom->bsd_symtab_start, &allow_size);
-+        elf->caller_xdest_base = hdr_ptr;
-+        elf->caller_xdest_size = allow_size;
-+        hdr = ELF_REALPTR2PTRVAL(hdr_ptr);
-+        elf_store_val(elf, int, hdr, size - sizeof(int));
-     }
-     else
-     {
-+        char *hdr_ptr;
-+
-         size = sizeof(int) + elf_size(elf, elf->ehdr) +
-             elf_shdr_count(elf) * elf_size(elf, shdr);
--        hdr = xc_dom_malloc(dom, size);
--        if ( hdr == NULL )
-+        hdr_ptr = xc_dom_malloc(dom, size);
-+        if ( hdr_ptr == NULL )
-             return 0;
-+        elf->caller_xdest_base = hdr_ptr;
-+        elf->caller_xdest_size = size;
-+        hdr = ELF_REALPTR2PTRVAL(hdr_ptr);
-         dom->bsd_symtab_start = elf_round_up(elf, dom->kernel_seg.vend);
-     }
- 
-@@ -171,9 +181,32 @@ static int xc_dom_load_elf_symtab(struct xc_dom_image *dom,
-         ehdr->e_shoff = elf_size(elf, elf->ehdr);
-         ehdr->e_shstrndx = SHN_UNDEF;
-     }
--    if ( elf_init(&syms, hdr + sizeof(int), size - sizeof(int)) )
-+    if ( elf->caller_xdest_size < sizeof(int) )
-+    {
-+        DOMPRINTF("%s/%s: header size %"PRIx64" too small",
-+                  __FUNCTION__, load ? "load" : "parse",
-+                  (uint64_t)elf->caller_xdest_size);
-+        return -1;
-+    }
-+    if ( elf_init(&syms, elf->caller_xdest_base + sizeof(int),
-+                  elf->caller_xdest_size - sizeof(int)) )
-         return -1;
- 
-+    /*
-+     * The caller_xdest_{base,size} and dest_{base,size} need to
-+     * remain valid so long as each struct elf_image does.  The
-+     * principle we adopt is that these values are set when the
-+     * memory is allocated or mapped, and cleared when (and if)
-+     * they are unmapped.
-+     *
-+     * Mappings of the guest are normally undone by xc_dom_unmap_all
-+     * (directly or via xc_dom_release).  We do not explicitly clear
-+     * these because in fact that happens only at the end of
-+     * xc_dom_boot_image, at which time all of these ELF loading
-+     * functions have returned.  No relevant struct elf_binary*
-+     * escapes this file.
-+     */
-+
-     xc_elf_set_logfile(dom->xch, &syms, 1);
- 
-     symtab = dom->bsd_symtab_start + sizeof(int);
-@@ -312,8 +345,10 @@ static int xc_dom_load_elf_kernel(struct xc_dom_image *dom)
- {
-     struct elf_binary *elf = dom->private_loader;
-     int rc;
-+    xen_pfn_t pages;
- 
--    elf->dest = xc_dom_seg_to_ptr(dom, &dom->kernel_seg);
-+    elf->dest_base = xc_dom_seg_to_ptr_pages(dom, &dom->kernel_seg, &pages);
-+    elf->dest_size = pages * XC_DOM_PAGE_SIZE(dom);
-     rc = elf_load_binary(elf);
-     if ( rc < 0 )
-     {
-diff --git a/tools/libxc/xc_hvm_build_x86.c b/tools/libxc/xc_hvm_build_x86.c
-index 15b603d..ccfd8b5 100644
---- a/tools/libxc/xc_hvm_build_x86.c
-+++ b/tools/libxc/xc_hvm_build_x86.c
-@@ -104,11 +104,12 @@ static int loadelfimage(
-     for ( i = 0; i < pages; i++ )
-         entries[i].mfn = parray[(elf->pstart >> PAGE_SHIFT) + i];
- 
--    elf->dest = xc_map_foreign_ranges(
-+    elf->dest_base = xc_map_foreign_ranges(
-         xch, dom, pages << PAGE_SHIFT, PROT_READ | PROT_WRITE, 1 << PAGE_SHIFT,
-         entries, pages);
--    if ( elf->dest == NULL )
-+    if ( elf->dest_base == NULL )
-         goto err;
-+    elf->dest_size = pages * PAGE_SIZE;
- 
-     ELF_ADVANCE_DEST(elf, elf->pstart & (PAGE_SIZE - 1));
- 
-@@ -117,8 +118,9 @@ static int loadelfimage(
-     if ( rc < 0 )
-         PERROR("Failed to load elf binary\n");
- 
--    munmap(elf->dest, pages << PAGE_SHIFT);
--    elf->dest = NULL;
-+    munmap(elf->dest_base, pages << PAGE_SHIFT);
-+    elf->dest_base = NULL;
-+    elf->dest_size = 0;
- 
-  err:
-     free(entries);
-diff --git a/xen/arch/x86/domain_build.c b/xen/arch/x86/domain_build.c
-index 469d363..a655b21 100644
---- a/xen/arch/x86/domain_build.c
-+++ b/xen/arch/x86/domain_build.c
-@@ -908,7 +908,8 @@ int __init construct_dom0(
-     write_ptbase(v);
- 
-     /* Copy the OS image and free temporary buffer. */
--    elf.dest = (void*)vkern_start;
-+    elf.dest_base = (void*)vkern_start;
-+    elf.dest_size = vkern_end - vkern_start;
-     rc = elf_load_binary(&elf);
-     if ( rc < 0 )
-     {
-diff --git a/xen/common/libelf/libelf-dominfo.c b/xen/common/libelf/libelf-dominfo.c
-index b217f8f..98c80dc 100644
---- a/xen/common/libelf/libelf-dominfo.c
-+++ b/xen/common/libelf/libelf-dominfo.c
-@@ -254,7 +254,7 @@ int elf_xen_parse_guest_info(struct elf_binary *elf,
-     int len;
- 
-     h = parms->guest_info;
--#define STAR(h) (*(h))
-+#define STAR(h) (elf_access_unsigned(elf, (h), 0, 1))
-     while ( STAR(h) )
-     {
-         elf_memset_unchecked(name, 0, sizeof(name));
-diff --git a/xen/common/libelf/libelf-loader.c b/xen/common/libelf/libelf-loader.c
-index 0fef84c..a3310e7 100644
---- a/xen/common/libelf/libelf-loader.c
-+++ b/xen/common/libelf/libelf-loader.c
-@@ -24,23 +24,25 @@
- 
- /* ------------------------------------------------------------------------ */
- 
--int elf_init(struct elf_binary *elf, const char *image, size_t size)
-+int elf_init(struct elf_binary *elf, const char *image_input, size_t size)
- {
-     ELF_HANDLE_DECL(elf_shdr) shdr;
-     uint64_t i, count, section, offset;
- 
--    if ( !elf_is_elfbinary(image) )
-+    if ( !elf_is_elfbinary(image_input) )
-     {
-         elf_err(elf, "%s: not an ELF binary\n", __FUNCTION__);
-         return -1;
-     }
- 
-     elf_memset_unchecked(elf, 0, sizeof(*elf));
--    elf->image = image;
-+    elf->image_base = image_input;
-     elf->size = size;
--    elf->ehdr = (elf_ehdr *)image;
--    elf->class = elf->ehdr->e32.e_ident[EI_CLASS];
--    elf->data = elf->ehdr->e32.e_ident[EI_DATA];
-+    elf->ehdr = ELF_MAKE_HANDLE(elf_ehdr, (elf_ptrval)image_input);
-+    elf->class = elf_uval_3264(elf, elf->ehdr, e32.e_ident[EI_CLASS]);
-+    elf->data = elf_uval_3264(elf, elf->ehdr, e32.e_ident[EI_DATA]);
-+    elf->caller_xdest_base = NULL;
-+    elf->caller_xdest_size = 0;
- 
-     /* Sanity check phdr. */
-     offset = elf_uval(elf, elf->ehdr, e_phoff) +
-@@ -300,7 +302,7 @@ int elf_load_binary(struct elf_binary *elf)
- 
- ELF_PTRVAL_VOID elf_get_ptr(struct elf_binary *elf, unsigned long addr)
- {
--    return elf->dest + addr - elf->pstart;
-+    return ELF_REALPTR2PTRVAL(elf->dest_base) + addr - elf->pstart;
- }
- 
- uint64_t elf_lookup_addr(struct elf_binary * elf, const char *symbol)
-diff --git a/xen/common/libelf/libelf-private.h b/xen/common/libelf/libelf-private.h
-index 3ef753c..280dfd1 100644
---- a/xen/common/libelf/libelf-private.h
-+++ b/xen/common/libelf/libelf-private.h
-@@ -86,6 +86,19 @@ do { strncpy((d),(s),sizeof((d))-1);            \
- 
- #endif
- 
-+#undef memcpy
-+#undef memset
-+#undef memmove
-+#undef strcpy
-+
-+#define memcpy  MISTAKE_unspecified_memcpy
-+#define memset  MISTAKE_unspecified_memset
-+#define memmove MISTAKE_unspecified_memmove
-+#define strcpy  MISTAKE_unspecified_strcpy
-+  /* This prevents libelf from using these undecorated versions
-+   * of memcpy, memset, memmove and strcpy.  Every call site
-+   * must either use elf_mem*_unchecked, or elf_mem*_safe. */
-+
- #endif /* __LIBELF_PRIVATE_H_ */
- 
- /*
-diff --git a/xen/common/libelf/libelf-tools.c b/xen/common/libelf/libelf-tools.c
-index 3a0cde1..46ca553 100644
---- a/xen/common/libelf/libelf-tools.c
-+++ b/xen/common/libelf/libelf-tools.c
-@@ -20,28 +20,100 @@
- 
- /* ------------------------------------------------------------------------ */
- 
--uint64_t elf_access_unsigned(struct elf_binary * elf, const void *ptr,
--                             uint64_t offset, size_t size)
-+void elf_mark_broken(struct elf_binary *elf, const char *msg)
- {
-+    if ( elf->broken == NULL )
-+        elf->broken = msg;
-+}
-+
-+const char *elf_check_broken(const struct elf_binary *elf)
-+{
-+    return elf->broken;
-+}
-+
-+static int elf_ptrval_in_range(elf_ptrval ptrval, uint64_t size,
-+                               const void *region, uint64_t regionsize)
-+    /*
-+     * Returns true if the putative memory area [ptrval,ptrval+size>
-+     * is completely inside the region [region,region+regionsize>.
-+     *
-+     * ptrval and size are the untrusted inputs to be checked.
-+     * region and regionsize are trusted and must be correct and valid,
-+     * although it is OK for region to perhaps be maliciously NULL
-+     * (but not some other malicious value).
-+     */
-+{
-+    elf_ptrval regionp = (elf_ptrval)region;
-+
-+    if ( (region == NULL) ||
-+         (ptrval < regionp) ||              /* start is before region */
-+         (ptrval > regionp + regionsize) || /* start is after region */
-+         (size > regionsize - (ptrval - regionp)) ) /* too big */
-+        return 0;
-+    return 1;
-+}
-+
-+int elf_access_ok(struct elf_binary * elf,
-+                  uint64_t ptrval, size_t size)
-+{
-+    if ( elf_ptrval_in_range(ptrval, size, elf->image_base, elf->size) )
-+        return 1;
-+    if ( elf_ptrval_in_range(ptrval, size, elf->dest_base, elf->dest_size) )
-+        return 1;
-+    if ( elf_ptrval_in_range(ptrval, size,
-+                             elf->caller_xdest_base, elf->caller_xdest_size) )
-+        return 1;
-+    elf_mark_broken(elf, "out of range access");
-+    return 0;
-+}
-+
-+void elf_memcpy_safe(struct elf_binary *elf, elf_ptrval dst,
-+                     elf_ptrval src, size_t size)
-+{
-+    if ( elf_access_ok(elf, dst, size) &&
-+         elf_access_ok(elf, src, size) )
-+    {
-+        /* use memmove because these checks do not prove that the
-+         * regions don't overlap and overlapping regions grant
-+         * permission for compiler malice */
-+        elf_memmove_unchecked(ELF_UNSAFE_PTR(dst), ELF_UNSAFE_PTR(src), size);
-+    }
-+}
-+
-+void elf_memset_safe(struct elf_binary *elf, elf_ptrval dst, int c, size_t size)
-+{
-+    if ( elf_access_ok(elf, dst, size) )
-+    {
-+        elf_memset_unchecked(ELF_UNSAFE_PTR(dst), c, size);
-+    }
-+}
-+
-+uint64_t elf_access_unsigned(struct elf_binary * elf, elf_ptrval base,
-+                             uint64_t moreoffset, size_t size)
-+{
-+    elf_ptrval ptrval = base + moreoffset;
-     int need_swap = elf_swap(elf);
-     const uint8_t *u8;
-     const uint16_t *u16;
-     const uint32_t *u32;
-     const uint64_t *u64;
- 
-+    if ( !elf_access_ok(elf, ptrval, size) )
-+        return 0;
-+
-     switch ( size )
-     {
-     case 1:
--        u8 = ptr + offset;
-+        u8 = (const void*)ptrval;
-         return *u8;
-     case 2:
--        u16 = ptr + offset;
-+        u16 = (const void*)ptrval;
-         return need_swap ? bswap_16(*u16) : *u16;
-     case 4:
--        u32 = ptr + offset;
-+        u32 = (const void*)ptrval;
-         return need_swap ? bswap_32(*u32) : *u32;
-     case 8:
--        u64 = ptr + offset;
-+        u64 = (const void*)ptrval;
-         return need_swap ? bswap_64(*u64) : *u64;
-     default:
-         return 0;
-@@ -122,6 +194,28 @@ const char *elf_section_name(struct elf_binary *elf,
-     return elf_strval(elf, elf->sec_strtab + elf_uval(elf, shdr, sh_name));
- }
- 
-+const char *elf_strval(struct elf_binary *elf, elf_ptrval start)
-+{
-+    uint64_t length;
-+
-+    for ( length = 0; ; length++ ) {
-+        if ( !elf_access_ok(elf, start + length, 1) )
-+            return NULL;
-+        if ( !elf_access_unsigned(elf, start, length, 1) )
-+            /* ok */
-+            return ELF_UNSAFE_PTR(start);
-+    }
-+}
-+
-+const char *elf_strfmt(struct elf_binary *elf, elf_ptrval start)
-+{
-+    const char *str = elf_strval(elf, start);
-+
-+    if ( str == NULL )
-+        return "(invalid)";
-+    return str;
-+}
-+
- ELF_PTRVAL_CONST_VOID elf_section_start(struct elf_binary *elf, ELF_HANDLE_DECL(elf_shdr) shdr)
- {
-     return ELF_IMAGE_BASE(elf) + elf_uval(elf, shdr, sh_offset);
-diff --git a/xen/include/xen/libelf.h b/xen/include/xen/libelf.h
-index af5b5c5..ddc3ed7 100644
---- a/xen/include/xen/libelf.h
-+++ b/xen/include/xen/libelf.h
-@@ -57,8 +57,9 @@ typedef void elf_log_callback(struct elf_binary*, void *caller_data,
-  *               on this.
-  *               This replaces variables which were char*,void*
-  *               and their const versions, so we provide four
-- *               different declaration macros:
-+ *               different obsolete declaration macros:
-  *                   ELF_PTRVAL_{,CONST}{VOID,CHAR}
-+ *               New code can simply use the elf_ptrval typedef.
-  *   HANDLE      A pointer to a struct.  There is one of these types
-  *               for each pointer type - that is, for each "structname".
-  *               In the arguments to the various HANDLE macros, structname
-@@ -67,54 +68,66 @@ typedef void elf_log_callback(struct elf_binary*, void *caller_data,
-  *               pointers.  In the current code attempts to do so will
-  *               compile, but in the next patch this will become a
-  *               compile error.
-- *               We provide two declaration macros for const and
-- *               non-const pointers.
-+ *               We also provide a second declaration macro for
-+ *               pointers which were to const; this is obsolete.
-  */
- 
--#define ELF_REALPTR2PTRVAL(realpointer) (realpointer)
-+typedef uintptr_t elf_ptrval;
-+
-+#define ELF_REALPTR2PTRVAL(realpointer) ((elf_ptrval)(realpointer))
-   /* Converts an actual C pointer into a PTRVAL */
- 
--#define ELF_HANDLE_DECL_NONCONST(structname)  structname *
--#define ELF_HANDLE_DECL(structname)           const structname *
-+#define ELF_HANDLE_DECL_NONCONST(structname) structname##_handle /*obsolete*/
-+#define ELF_HANDLE_DECL(structname)          structname##_handle
-   /* Provides a type declaration for a HANDLE. */
--  /* May only be used to declare ONE variable at a time */
- 
--#define ELF_PTRVAL_VOID         void *
--#define ELF_PTRVAL_CHAR         char *
--#define ELF_PTRVAL_CONST_VOID   const void *
--#define ELF_PTRVAL_CONST_CHAR   const char *
--  /* Provides a type declaration for a PTRVAL. */
--  /* May only be used to declare ONE variable at a time */
-+#define ELF_PTRVAL_VOID              elf_ptrval /*obsolete*/
-+#define ELF_PTRVAL_CHAR              elf_ptrval /*obsolete*/
-+#define ELF_PTRVAL_CONST_VOID        elf_ptrval /*obsolete*/
-+#define ELF_PTRVAL_CONST_CHAR        elf_ptrval /*obsolete*/
-+
-+#ifdef __XEN__
-+# define ELF_PRPTRVAL "lu"
-+  /*
-+   * PRIuPTR is misdefined in xen/include/xen/inttypes.h, on 32-bit,
-+   * to "u", when in fact uintptr_t is an unsigned long.
-+   */
-+#else
-+# define ELF_PRPTRVAL PRIuPTR
-+#endif
-+  /* printf format a la PRId... for a PTRVAL */
- 
--#define ELF_DEFINE_HANDLE(structname) /* empty */
-+#define ELF_DEFINE_HANDLE(structname)                                   \
-+    typedef union {                                                     \
-+        elf_ptrval ptrval;                                              \
-+        const structname *typeonly; /* for sizeof, offsetof, &c only */ \
-+    } structname##_handle;
-   /*
-    * This must be invoked for each HANDLE type to define
-    * the actual C type used for that kind of HANDLE.
-    */
- 
--#define ELF_PRPTRVAL "p"
--  /* printf format a la PRId... for a PTRVAL */
--
--#define ELF_MAKE_HANDLE(structname, ptrval) (ptrval)
-+#define ELF_MAKE_HANDLE(structname, ptrval)    ((structname##_handle){ ptrval })
-   /* Converts a PTRVAL to a HANDLE */
- 
--#define ELF_IMAGE_BASE(elf) ((elf)->image)
-+#define ELF_IMAGE_BASE(elf)    ((elf_ptrval)(elf)->image_base)
-   /* Returns the base of the image as a PTRVAL. */
- 
--#define ELF_HANDLE_PTRVAL(handleval) ((void*)(handleval))
-+#define ELF_HANDLE_PTRVAL(handleval)      ((handleval).ptrval)
-   /* Converts a HANDLE to a PTRVAL. */
- 
--#define ELF_OBSOLETE_VOIDP_CAST (void*)(uintptr_t)
-+#define ELF_OBSOLETE_VOIDP_CAST /*empty*/
-   /*
--   * In some places the existing code needs to
-+   * In some places the old code used to need to
-    *  - cast away const (the existing code uses const a fair
-    *    bit but actually sometimes wants to write to its input)
-    *    from a PTRVAL.
-    *  - convert an integer representing a pointer to a PTRVAL
--   * This macro provides a suitable cast.
-+   * Nowadays all of these re uintptr_ts so there is no const problem
-+   * and no need for any casting.
-    */
- 
--#define ELF_UNSAFE_PTR(ptrval) ((void*)(uintptr_t)(ptrval))
-+#define ELF_UNSAFE_PTR(ptrval) ((void*)(elf_ptrval)(ptrval))
-   /*
-    * Turns a PTRVAL into an actual C pointer.  Before this is done
-    * the caller must have ensured that the PTRVAL does in fact point
-@@ -122,18 +135,21 @@ typedef void elf_log_callback(struct elf_binary*, void *caller_data,
-    */
- 
- /* PTRVALs can be INVALID (ie, NULL). */
--#define ELF_INVALID_PTRVAL            (NULL)        /* returns NULL PTRVAL */
-+#define ELF_INVALID_PTRVAL    ((elf_ptrval)0)       /* returns NULL PTRVAL */
- #define ELF_INVALID_HANDLE(structname)		    /* returns NULL handle */ \
-     ELF_MAKE_HANDLE(structname, ELF_INVALID_PTRVAL)
--#define ELF_PTRVAL_VALID(ptrval)      (ptrval)            /* }            */
--#define ELF_HANDLE_VALID(handleval)   (handleval)         /* } predicates */
--#define ELF_PTRVAL_INVALID(ptrval)    ((ptrval) == NULL)  /* }            */
-+#define ELF_PTRVAL_VALID(ptrval)    (!!(ptrval))            /* }            */
-+#define ELF_HANDLE_VALID(handleval) (!!(handleval).ptrval)  /* } predicates */
-+#define ELF_PTRVAL_INVALID(ptrval)  (!ELF_PTRVAL_VALID((ptrval))) /* }      */
-+
-+#define ELF_MAX_PTRVAL        (~(elf_ptrval)0)
-+  /* PTRVAL value guaranteed to compare > to any valid PTRVAL */
- 
- /* For internal use by other macros here */
- #define ELF__HANDLE_FIELD_TYPE(handleval, elm) \
--  typeof((handleval)->elm)
-+  typeof((handleval).typeonly->elm)
- #define ELF__HANDLE_FIELD_OFFSET(handleval, elm) \
--  offsetof(typeof(*(handleval)),elm)
-+  offsetof(typeof(*(handleval).typeonly),elm)
- 
- 
- /* ------------------------------------------------------------------------ */
-@@ -182,7 +198,7 @@ ELF_DEFINE_HANDLE(elf_note)
- 
- struct elf_binary {
-     /* elf binary */
--    const char *image;
-+    const void *image_base;
-     size_t size;
-     char class;
-     char data;
-@@ -190,10 +206,16 @@ struct elf_binary {
-     ELF_HANDLE_DECL(elf_ehdr) ehdr;
-     ELF_PTRVAL_CONST_CHAR sec_strtab;
-     ELF_HANDLE_DECL(elf_shdr) sym_tab;
--    ELF_PTRVAL_CONST_CHAR sym_strtab;
-+    uint64_t sym_strtab;
- 
-     /* loaded to */
--    char *dest;
-+    /*
-+     * dest_base and dest_size are trusted and must be correct;
-+     * whenever dest_size is not 0, both of these must be valid
-+     * so long as the struct elf_binary is in use.
-+     */
-+    char *dest_base;
-+    size_t dest_size;
-     uint64_t pstart;
-     uint64_t pend;
-     uint64_t reloc_offset;
-@@ -201,12 +223,22 @@ struct elf_binary {
-     uint64_t bsd_symtab_pstart;
-     uint64_t bsd_symtab_pend;
- 
-+    /*
-+     * caller's other acceptable destination
-+     *
-+     * Again, these are trusted and must be valid (or 0) so long
-+     * as the struct elf_binary is in use.
-+     */
-+    void *caller_xdest_base;
-+    uint64_t caller_xdest_size;
-+
- #ifndef __XEN__
-     /* misc */
-     elf_log_callback *log_callback;
-     void *log_caller_data;
- #endif
-     int verbose;
-+    const char *broken;
- };
- 
- /* ------------------------------------------------------------------------ */
-@@ -224,22 +256,27 @@ struct elf_binary {
- #define elf_lsb(elf)   (ELFDATA2LSB == (elf)->data)
- #define elf_swap(elf)  (NATIVE_ELFDATA != (elf)->data)
- 
--#define elf_uval(elf, str, elem)                                        \
--    ((ELFCLASS64 == (elf)->class)                                       \
--     ? elf_access_unsigned((elf), (str),                                \
--                           offsetof(typeof(*(str)),e64.elem),           \
--                           sizeof((str)->e64.elem))                     \
--     : elf_access_unsigned((elf), (str),                                \
--                           offsetof(typeof(*(str)),e32.elem),           \
--                           sizeof((str)->e32.elem)))
-+#define elf_uval_3264(elf, handle, elem)                                \
-+    elf_access_unsigned((elf), (handle).ptrval,                         \
-+                           offsetof(typeof(*(handle).typeonly),elem),    \
-+                           sizeof((handle).typeonly->elem))
-+
-+#define elf_uval(elf, handle, elem)             \
-+    ((ELFCLASS64 == (elf)->class)               \
-+     ? elf_uval_3264(elf, handle, e64.elem)     \
-+     : elf_uval_3264(elf, handle, e32.elem))
-   /*
-    * Reads an unsigned field in a header structure in the ELF.
-    * str is a HANDLE, and elem is the field name in it.
-    */
- 
--#define elf_size(elf, str)                              \
-+
-+#define elf_size(elf, handle_or_handletype) ({          \
-+    typeof(handle_or_handletype) elf_size__dummy;       \
-     ((ELFCLASS64 == (elf)->class)                       \
--     ? sizeof((str)->e64) : sizeof((str)->e32))
-+     ? sizeof(elf_size__dummy.typeonly->e64)             \
-+     : sizeof(elf_size__dummy.typeonly->e32));           \
-+})
-   /*
-    * Returns the size of the substructure for the appropriate 32/64-bitness.
-    * str should be a HANDLE.
-@@ -251,23 +288,37 @@ uint64_t elf_access_unsigned(struct elf_binary *elf, ELF_PTRVAL_CONST_VOID ptr,
- 
- uint64_t elf_round_up(struct elf_binary *elf, uint64_t addr);
- 
-+const char *elf_strval(struct elf_binary *elf, elf_ptrval start);
-+  /* may return NULL if the string is out of range etc. */
- 
--#define elf_strval(elf,x) ((const char*)(x)) /* may return NULL in the future */
--#define elf_strfmt(elf,x) ((const char*)(x)) /* will return (invalid) instead */
-+const char *elf_strfmt(struct elf_binary *elf, elf_ptrval start);
-+  /* like elf_strval but returns "(invalid)" instead of NULL */
- 
--#define elf_memcpy_safe(elf, dst, src, sz) memcpy((dst),(src),(sz))
--#define elf_memset_safe(elf, dst, c, sz)   memset((dst),(c),(sz))
-+void elf_memcpy_safe(struct elf_binary*, elf_ptrval dst, elf_ptrval src, size_t);
-+void elf_memset_safe(struct elf_binary*, elf_ptrval dst, int c, size_t);
-   /*
--   * Versions of memcpy and memset which will (in the next patch)
--   * arrange never to write outside permitted areas.
-+   * Versions of memcpy and memset which arrange never to write
-+   * outside permitted areas.
-    */
- 
--#define elf_store_val(elf, type, ptr, val)   (*(type*)(ptr) = (val))
-+int elf_access_ok(struct elf_binary * elf,
-+                  uint64_t ptrval, size_t size);
-+
-+#define elf_store_val(elf, type, ptr, val)                              \
-+    ({                                                                  \
-+        typeof(type) elf_store__val = (val);                            \
-+        elf_ptrval elf_store__targ = ptr;                               \
-+        if (elf_access_ok((elf), elf_store__targ,                       \
-+                          sizeof(elf_store__val))) {			\
-+            elf_memcpy_unchecked((void*)elf_store__targ, &elf_store__val, \
-+                             sizeof(elf_store__val));                   \
-+        }                                                               \
-+    })									\
-   /* Stores a value at a particular PTRVAL. */
- 
--#define elf_store_field(elf, hdr, elm, val)                     \
--    (elf_store_val((elf), ELF__HANDLE_FIELD_TYPE(hdr, elm),     \
--                   &((hdr)->elm),                               \
-+#define elf_store_field(elf, hdr, elm, val)                             \
-+    (elf_store_val((elf), ELF__HANDLE_FIELD_TYPE(hdr, elm),                   \
-+                   ELF_HANDLE_PTRVAL(hdr) + ELF__HANDLE_FIELD_OFFSET(hdr, elm), \
-                    (val)))
-   /* Stores a 32/64-bit field.  hdr is a HANDLE and elm is the field name. */
- 
-@@ -306,6 +357,10 @@ int elf_phdr_is_loadable(struct elf_binary *elf, ELF_HANDLE_DECL(elf_phdr) phdr)
- /* xc_libelf_loader.c                                                       */
- 
- int elf_init(struct elf_binary *elf, const char *image, size_t size);
-+  /*
-+   * image and size must be correct.  They will be recorded in
-+   * *elf, and must remain valid while the elf is in use.
-+   */
- #ifdef __XEN__
- void elf_set_verbose(struct elf_binary *elf);
- #else
-@@ -321,6 +376,9 @@ uint64_t elf_lookup_addr(struct elf_binary *elf, const char *symbol);
- 
- void elf_parse_bsdsyms(struct elf_binary *elf, uint64_t pstart); /* private */
- 
-+void elf_mark_broken(struct elf_binary *elf, const char *msg);
-+const char *elf_check_broken(const struct elf_binary *elf); /* NULL means OK */
-+
- /* ------------------------------------------------------------------------ */
- /* xc_libelf_relocate.c                                                     */
- 
-@@ -395,16 +453,38 @@ int elf_xen_parse_guest_info(struct elf_binary *elf,
- int elf_xen_parse(struct elf_binary *elf,
-                   struct elf_dom_parms *parms);
- 
--#define elf_memcpy_unchecked memcpy
--#define elf_memset_unchecked memset
-+static inline void *elf_memcpy_unchecked(void *dest, const void *src, size_t n)
-+    { return memcpy(dest, src, n); }
-+static inline void *elf_memmove_unchecked(void *dest, const void *src, size_t n)
-+    { return memmove(dest, src, n); }
-+static inline void *elf_memset_unchecked(void *s, int c, size_t n)
-+    { return memset(s, c, n); }
-   /*
--   * Unsafe versions of memcpy and memset which take actual C
--   * pointers.  These are just like real memcpy and memset.
-+   * Unsafe versions of memcpy, memmove memset which take actual C
-+   * pointers.  These are just like the real functions.
-+   * We provide these so that in libelf-private.h we can #define
-+   * memcpy, memset and memmove to undefined MISTAKE things.
-    */
- 
- 
--#define ELF_ADVANCE_DEST(elf, amount)  elf->dest += (amount)
--  /* Advances past amount bytes of the current destination area. */
-+/* Advances past amount bytes of the current destination area. */
-+static inline void ELF_ADVANCE_DEST(struct elf_binary *elf, uint64_t amount)
-+{
-+    if ( elf->dest_base == NULL )
-+    {
-+        elf_mark_broken(elf, "advancing in null image");
-+    }
-+    else if ( elf->dest_size >= amount )
-+    {
-+        elf->dest_base += amount;
-+        elf->dest_size -= amount;
-+    }
-+    else
-+    {
-+        elf->dest_size = 0;
-+        elf_mark_broken(elf, "advancing past end (image very short?)");
-+    }
-+}
- 
- 
- #endif /* __XEN_LIBELF_H__ */
--- 
-1.7.2.5
-
diff --git a/0012-libelf-Check-pointer-references-in-elf_is_elfbinary.patch b/0012-libelf-Check-pointer-references-in-elf_is_elfbinary.patch
deleted file mode 100644
index cefb4cb..0000000
--- a/0012-libelf-Check-pointer-references-in-elf_is_elfbinary.patch
+++ /dev/null
@@ -1,114 +0,0 @@
-From d0790bdad7496e720416b2d4a04563c4c27e7b95 Mon Sep 17 00:00:00 2001
-From: Ian Jackson <ian.jackson at eu.citrix.com>
-Date: Fri, 14 Jun 2013 16:43:17 +0100
-Subject: [PATCH 12/23] libelf: Check pointer references in elf_is_elfbinary
-
-elf_is_elfbinary didn't take a length parameter and could potentially
-access out of range when provided with a very short image.
-
-We only need to check the size is enough for the actual dereference in
-elf_is_elfbinary; callers are just using it to check the magic number
-and do their own checks (usually via the new elf_ptrval system) before
-dereferencing other parts of the header.
-
-This is part of the fix to a security issue, XSA-55.
-
-Signed-off-by: Ian Jackson <ian.jackson at eu.citrix.com>
-Acked-by: Ian Campbell <ian.campbell at citrix.com>
-Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk at oracle.com>
----
- tools/libxc/xc_dom_elfloader.c    |    2 +-
- xen/arch/x86/bzimage.c            |    4 ++--
- xen/common/libelf/libelf-loader.c |    2 +-
- xen/common/libelf/libelf-tools.c  |    9 ++++++---
- xen/include/xen/libelf.h          |    4 +++-
- 5 files changed, 13 insertions(+), 8 deletions(-)
-
-diff --git a/tools/libxc/xc_dom_elfloader.c b/tools/libxc/xc_dom_elfloader.c
-index b82a08c..ea45886 100644
---- a/tools/libxc/xc_dom_elfloader.c
-+++ b/tools/libxc/xc_dom_elfloader.c
-@@ -95,7 +95,7 @@ static int check_elf_kernel(struct xc_dom_image *dom, int verbose)
-         return -EINVAL;
-     }
- 
--    if ( !elf_is_elfbinary(dom->kernel_blob) )
-+    if ( !elf_is_elfbinary(dom->kernel_blob, dom->kernel_size) )
-     {
-         if ( verbose )
-             xc_dom_panic(dom->xch,
-diff --git a/xen/arch/x86/bzimage.c b/xen/arch/x86/bzimage.c
-index 5adc223..3600dca 100644
---- a/xen/arch/x86/bzimage.c
-+++ b/xen/arch/x86/bzimage.c
-@@ -220,7 +220,7 @@ unsigned long __init bzimage_headroom(char *image_start,
-         image_length = hdr->payload_length;
-     }
- 
--    if ( elf_is_elfbinary(image_start) )
-+    if ( elf_is_elfbinary(image_start, image_length) )
-         return 0;
- 
-     orig_image_len = image_length;
-@@ -251,7 +251,7 @@ int __init bzimage_parse(char *image_base, char **image_start, unsigned long *im
-         *image_len = hdr->payload_length;
-     }
- 
--    if ( elf_is_elfbinary(*image_start) )
-+    if ( elf_is_elfbinary(*image_start, *image_len) )
-         return 0;
- 
-     BUG_ON(!(image_base < *image_start));
-diff --git a/xen/common/libelf/libelf-loader.c b/xen/common/libelf/libelf-loader.c
-index a3310e7..f8be635 100644
---- a/xen/common/libelf/libelf-loader.c
-+++ b/xen/common/libelf/libelf-loader.c
-@@ -29,7 +29,7 @@ int elf_init(struct elf_binary *elf, const char *image_input, size_t size)
-     ELF_HANDLE_DECL(elf_shdr) shdr;
-     uint64_t i, count, section, offset;
- 
--    if ( !elf_is_elfbinary(image_input) )
-+    if ( !elf_is_elfbinary(image_input, size) )
-     {
-         elf_err(elf, "%s: not an ELF binary\n", __FUNCTION__);
-         return -1;
-diff --git a/xen/common/libelf/libelf-tools.c b/xen/common/libelf/libelf-tools.c
-index 46ca553..744027e 100644
---- a/xen/common/libelf/libelf-tools.c
-+++ b/xen/common/libelf/libelf-tools.c
-@@ -332,11 +332,14 @@ ELF_HANDLE_DECL(elf_note) elf_note_next(struct elf_binary *elf, ELF_HANDLE_DECL(
- 
- /* ------------------------------------------------------------------------ */
- 
--int elf_is_elfbinary(const void *image)
-+int elf_is_elfbinary(const void *image_start, size_t image_size)
- {
--    const Elf32_Ehdr *ehdr = image;
-+    const Elf32_Ehdr *ehdr = image_start;
- 
--    return IS_ELF(*ehdr); /* fixme unchecked */
-+    if ( image_size < sizeof(*ehdr) )
-+        return 0;
-+
-+    return IS_ELF(*ehdr);
- }
- 
- int elf_phdr_is_loadable(struct elf_binary *elf, ELF_HANDLE_DECL(elf_phdr) phdr)
-diff --git a/xen/include/xen/libelf.h b/xen/include/xen/libelf.h
-index ddc3ed7..ac93858 100644
---- a/xen/include/xen/libelf.h
-+++ b/xen/include/xen/libelf.h
-@@ -350,7 +350,9 @@ uint64_t elf_note_numeric_array(struct elf_binary *, ELF_HANDLE_DECL(elf_note),
-                                 unsigned int unitsz, unsigned int idx);
- ELF_HANDLE_DECL(elf_note) elf_note_next(struct elf_binary *elf, ELF_HANDLE_DECL(elf_note) note);
- 
--int elf_is_elfbinary(const void *image);
-+/* (Only) checks that the image has the right magic number. */
-+int elf_is_elfbinary(const void *image_start, size_t image_size);
-+
- int elf_phdr_is_loadable(struct elf_binary *elf, ELF_HANDLE_DECL(elf_phdr) phdr);
- 
- /* ------------------------------------------------------------------------ */
--- 
-1.7.2.5
-
diff --git a/0013-libelf-Make-all-callers-call-elf_check_broken.patch b/0013-libelf-Make-all-callers-call-elf_check_broken.patch
deleted file mode 100644
index 43fe7f0..0000000
--- a/0013-libelf-Make-all-callers-call-elf_check_broken.patch
+++ /dev/null
@@ -1,257 +0,0 @@
-From a965b8f80388603d439ae2b8ee7b9b018a079f90 Mon Sep 17 00:00:00 2001
-From: Ian Jackson <ian.jackson at eu.citrix.com>
-Date: Fri, 14 Jun 2013 16:43:17 +0100
-Subject: [PATCH 13/23] libelf: Make all callers call elf_check_broken
-
-This arranges that if the new pointer reference error checking
-tripped, we actually get a message about it.  In this patch these
-messages do not change the actual return values from the various
-functions: so pointer reference errors do not prevent loading.  This
-is for fear that some existing kernels might cause the code to make
-these wild references, which would then break, which is not a good
-thing in a security patch.
-
-In xen/arch/x86/domain_build.c we have to introduce an "out" label and
-change all of the "return rc" beyond the relevant point into "goto
-out".
-
-Difference in the 4.2 series, compared to unstable:
-
-* tools/libxc/xc_hvm_build_x86.c:setup_guest and
-  xen/arch/arm/kernel.c:kernel_try_elf_prepare have different
-  error handling in 4.2 to unstable; patch adjusted accordingly.
-
-This is part of the fix to a security issue, XSA-55.
-
-Signed-off-by: Ian Jackson <ian.jackson at eu.citrix.com>
-
-xen-unstable version Reviewed-by: George Dunlap <george.dunlap at eu.citrix.com>
----
- tools/libxc/xc_dom_elfloader.c |   25 +++++++++++++++++++++----
- tools/libxc/xc_hvm_build_x86.c |    5 +++++
- tools/xcutils/readnotes.c      |    3 +++
- xen/arch/arm/kernel.c          |   15 ++++++++++++++-
- xen/arch/x86/domain_build.c    |   28 +++++++++++++++++++++-------
- 5 files changed, 64 insertions(+), 12 deletions(-)
-
-diff --git a/tools/libxc/xc_dom_elfloader.c b/tools/libxc/xc_dom_elfloader.c
-index ea45886..4fb4da2 100644
---- a/tools/libxc/xc_dom_elfloader.c
-+++ b/tools/libxc/xc_dom_elfloader.c
-@@ -276,6 +276,13 @@ static int xc_dom_load_elf_symtab(struct xc_dom_image *dom,
-             elf_store_field(elf, shdr, e32.sh_name, 0);
-     }
- 
-+    if ( elf_check_broken(&syms) )
-+        DOMPRINTF("%s: symbols ELF broken: %s", __FUNCTION__,
-+                  elf_check_broken(&syms));
-+    if ( elf_check_broken(elf) )
-+        DOMPRINTF("%s: ELF broken: %s", __FUNCTION__,
-+                  elf_check_broken(elf));
-+
-     if ( tables == 0 )
-     {
-         DOMPRINTF("%s: no symbol table present", __FUNCTION__);
-@@ -312,19 +319,23 @@ static int xc_dom_parse_elf_kernel(struct xc_dom_image *dom)
-     {
-         xc_dom_panic(dom->xch, XC_INVALID_KERNEL, "%s: ELF image"
-                      " has no shstrtab", __FUNCTION__);
--        return -EINVAL;
-+        rc = -EINVAL;
-+        goto out;
-     }
- 
-     /* parse binary and get xen meta info */
-     elf_parse_binary(elf);
-     if ( (rc = elf_xen_parse(elf, &dom->parms)) != 0 )
--        return rc;
-+    {
-+        goto out;
-+    }
- 
-     if ( elf_xen_feature_get(XENFEAT_dom0, dom->parms.f_required) )
-     {
-         xc_dom_panic(dom->xch, XC_INVALID_KERNEL, "%s: Kernel does not"
-                      " support unprivileged (DomU) operation", __FUNCTION__);
--        return -EINVAL;
-+        rc = -EINVAL;
-+        goto out;
-     }
- 
-     /* find kernel segment */
-@@ -338,7 +349,13 @@ static int xc_dom_parse_elf_kernel(struct xc_dom_image *dom)
-     DOMPRINTF("%s: %s: 0x%" PRIx64 " -> 0x%" PRIx64 "",
-               __FUNCTION__, dom->guest_type,
-               dom->kernel_seg.vstart, dom->kernel_seg.vend);
--    return 0;
-+    rc = 0;
-+out:
-+    if ( elf_check_broken(elf) )
-+        DOMPRINTF("%s: ELF broken: %s", __FUNCTION__,
-+                  elf_check_broken(elf));
-+
-+    return rc;
- }
- 
- static int xc_dom_load_elf_kernel(struct xc_dom_image *dom)
-diff --git a/tools/libxc/xc_hvm_build_x86.c b/tools/libxc/xc_hvm_build_x86.c
-index ccfd8b5..8165287 100644
---- a/tools/libxc/xc_hvm_build_x86.c
-+++ b/tools/libxc/xc_hvm_build_x86.c
-@@ -403,11 +403,16 @@ static int setup_guest(xc_interface *xch,
-         munmap(page0, PAGE_SIZE);
-     }
- 
-+    if ( elf_check_broken(&elf) )
-+        ERROR("HVM ELF broken: %s", elf_check_broken(&elf));
-+
-     free(page_array);
-     return 0;
- 
-  error_out:
-     free(page_array);
-+    if ( elf_check_broken(&elf) )
-+        ERROR("HVM ELF broken, failing: %s", elf_check_broken(&elf));
-     return -1;
- }
- 
-diff --git a/tools/xcutils/readnotes.c b/tools/xcutils/readnotes.c
-index cfae994..d1f7a30 100644
---- a/tools/xcutils/readnotes.c
-+++ b/tools/xcutils/readnotes.c
-@@ -301,6 +301,9 @@ int main(int argc, char **argv)
- 		printf("__xen_guest: %s\n",
-                        elf_strfmt(&elf, elf_section_start(&elf, shdr)));
- 
-+	if (elf_check_broken(&elf))
-+		printf("warning: broken ELF: %s\n", elf_check_broken(&elf));
-+
- 	return 0;
- }
- 
-diff --git a/xen/arch/arm/kernel.c b/xen/arch/arm/kernel.c
-index 2d56130..dec0519 100644
---- a/xen/arch/arm/kernel.c
-+++ b/xen/arch/arm/kernel.c
-@@ -146,6 +146,8 @@ static int kernel_try_elf_prepare(struct kernel_info *info)
- {
-     int rc;
- 
-+    memset(&info->elf.elf, 0, sizeof(info->elf.elf));
-+
-     info->kernel_order = get_order_from_bytes(KERNEL_FLASH_SIZE);
-     info->kernel_img = alloc_xenheap_pages(info->kernel_order, 0);
-     if ( info->kernel_img == NULL )
-@@ -160,7 +162,7 @@ static int kernel_try_elf_prepare(struct kernel_info *info)
- #endif
-     elf_parse_binary(&info->elf.elf);
-     if ( (rc = elf_xen_parse(&info->elf.elf, &info->elf.parms)) != 0 )
--        return rc;
-+        goto err;
- 
-     /*
-      * TODO: can the ELF header be used to find the physical address
-@@ -169,7 +171,18 @@ static int kernel_try_elf_prepare(struct kernel_info *info)
-     info->entry = info->elf.parms.virt_entry;
-     info->load = kernel_elf_load;
- 
-+    if ( elf_check_broken(&info->elf.elf) )
-+        printk("Xen: warning: ELF kernel broken: %s\n",
-+               elf_check_broken(&info->elf.elf));
-+
-     return 0;
-+
-+err:
-+    if ( elf_check_broken(&info->elf.elf) )
-+        printk("Xen: ELF kernel broken: %s\n",
-+               elf_check_broken(&info->elf.elf));
-+
-+    return rc;
- }
- 
- int kernel_prepare(struct kernel_info *info)
-diff --git a/xen/arch/x86/domain_build.c b/xen/arch/x86/domain_build.c
-index a655b21..0dbec96 100644
---- a/xen/arch/x86/domain_build.c
-+++ b/xen/arch/x86/domain_build.c
-@@ -374,7 +374,7 @@ int __init construct_dom0(
- #endif
-     elf_parse_binary(&elf);
-     if ( (rc = elf_xen_parse(&elf, &parms)) != 0 )
--        return rc;
-+        goto out;
- 
-     /* compatibility check */
-     compatible = 0;
-@@ -413,14 +413,16 @@ int __init construct_dom0(
-     if ( !compatible )
-     {
-         printk("Mismatch between Xen and DOM0 kernel\n");
--        return -EINVAL;
-+        rc = -EINVAL;
-+        goto out;
-     }
- 
-     if ( parms.elf_notes[XEN_ELFNOTE_SUPPORTED_FEATURES].type != XEN_ENT_NONE &&
-          !test_bit(XENFEAT_dom0, parms.f_supported) )
-     {
-         printk("Kernel does not support Dom0 operation\n");
--        return -EINVAL;
-+        rc = -EINVAL;
-+        goto out;
-     }
- 
- #if defined(__x86_64__)
-@@ -734,7 +736,8 @@ int __init construct_dom0(
-          (v_end > HYPERVISOR_COMPAT_VIRT_START(d)) )
-     {
-         printk("DOM0 image overlaps with Xen private area.\n");
--        return -EINVAL;
-+        rc = -EINVAL;
-+        goto out;
-     }
- 
-     if ( is_pv_32on64_domain(d) )
-@@ -914,7 +917,7 @@ int __init construct_dom0(
-     if ( rc < 0 )
-     {
-         printk("Failed to load the kernel binary\n");
--        return rc;
-+        goto out;
-     }
-     bootstrap_map(NULL);
- 
-@@ -925,7 +928,8 @@ int __init construct_dom0(
-         {
-             write_ptbase(current);
-             printk("Invalid HYPERCALL_PAGE field in ELF notes.\n");
--            return -1;
-+            rc = -1;
-+            goto out;
-         }
-         hypercall_page_initialise(
-             d, (void *)(unsigned long)parms.virt_hypercall);
-@@ -1272,9 +1276,19 @@ int __init construct_dom0(
- 
-     BUG_ON(rc != 0);
- 
--    iommu_dom0_init(dom0);
-+    if ( elf_check_broken(&elf) )
-+        printk(" Xen warning: dom0 kernel broken ELF: %s\n",
-+               elf_check_broken(&elf));
- 
-+    iommu_dom0_init(dom0);
-     return 0;
-+
-+out:
-+    if ( elf_check_broken(&elf) )
<Skipped 5112 lines>
================================================================

---- gitweb:

http://git.pld-linux.org/gitweb.cgi/packages/xen.git/commitdiff/695d15a0fdef2f7655c820ba8c1efb39ae886efc



More information about the pld-cvs-commit mailing list