diff --git a/.elfutils.metadata b/.elfutils.metadata
new file mode 100644
index 0000000..c3c4d0e
--- /dev/null
+++ b/.elfutils.metadata
@@ -0,0 +1 @@
+95899ce5fa55002e46bf4e02d01a249516e296fd SOURCES/elfutils-0.174.tar.bz2
diff --git a/.gitignore b/.gitignore
new file mode 100644
index 0000000..f5938a4
--- /dev/null
+++ b/.gitignore
@@ -0,0 +1 @@
+SOURCES/elfutils-0.174.tar.bz2
diff --git a/SOURCES/elfutils-0.173-new-notes-hack.patch b/SOURCES/elfutils-0.173-new-notes-hack.patch
new file mode 100644
index 0000000..8e607fa
--- /dev/null
+++ b/SOURCES/elfutils-0.173-new-notes-hack.patch
@@ -0,0 +1,17 @@
+diff --git a/src/elflint.c b/src/elflint.c
+index eec799b2..31092f2e 100644
+--- a/src/elflint.c
++++ b/src/elflint.c
+@@ -3905,10 +3905,11 @@ section [%2zu] '%s': size not multiple of entry size\n"),
+ 	       cnt, section_name (ebl, cnt),
+ 	       (int) shdr->sh_type);
+ 
++#define SHF_GNU_BUILD_NOTE    (1 << 20)
+ #define ALL_SH_FLAGS (SHF_WRITE | SHF_ALLOC | SHF_EXECINSTR | SHF_MERGE \
+ 		      | SHF_STRINGS | SHF_INFO_LINK | SHF_LINK_ORDER \
+ 		      | SHF_OS_NONCONFORMING | SHF_GROUP | SHF_TLS \
+-		      | SHF_COMPRESSED)
++		      | SHF_COMPRESSED | SHF_GNU_BUILD_NOTE)
+       if (shdr->sh_flags & ~(GElf_Xword) ALL_SH_FLAGS)
+ 	{
+ 	  GElf_Xword sh_flags = shdr->sh_flags & ~(GElf_Xword) ALL_SH_FLAGS;
diff --git a/SOURCES/elfutils-0.174-ar-sh_entsize-zero.patch b/SOURCES/elfutils-0.174-ar-sh_entsize-zero.patch
new file mode 100644
index 0000000..0040033
--- /dev/null
+++ b/SOURCES/elfutils-0.174-ar-sh_entsize-zero.patch
@@ -0,0 +1,27 @@
+commit 2b16a9be69939822dcafe075413468daac98b327
+Author: Mark Wielaard <mark@klomp.org>
+Date:   Thu Oct 18 19:01:52 2018 +0200
+
+    arlib: Check that sh_entsize isn't zero.
+    
+    A bogus ELF file could have sh_entsize as zero. Don't divide by zero,
+    but just assume there are no symbols in the section.
+    
+    https://sourceware.org/bugzilla/show_bug.cgi?id=23786
+    
+    Signed-off-by: Mark Wielaard <mark@klomp.org>
+
+diff --git a/src/arlib.c b/src/arlib.c
+index 778e087..a6521e3 100644
+--- a/src/arlib.c
++++ b/src/arlib.c
+@@ -252,6 +252,9 @@ arlib_add_symbols (Elf *elf, const char *arfname, const char *membername,
+       if (data == NULL)
+ 	continue;
+ 
++      if (shdr->sh_entsize == 0)
++	continue;
++
+       int nsyms = shdr->sh_size / shdr->sh_entsize;
+       for (int ndx = shdr->sh_info; ndx < nsyms; ++ndx)
+ 	{
diff --git a/SOURCES/elfutils-0.174-gnu-attribute-note.patch b/SOURCES/elfutils-0.174-gnu-attribute-note.patch
new file mode 100644
index 0000000..ae884a6
--- /dev/null
+++ b/SOURCES/elfutils-0.174-gnu-attribute-note.patch
@@ -0,0 +1,373 @@
+commit 72e30c2e0cb49a9a300667fdd5ff09082f717950
+Author: Mark Wielaard <mark@klomp.org>
+Date:   Mon Nov 12 23:34:24 2018 +0100
+
+    Handle GNU Build Attribute ELF Notes.
+    
+    GNU Build Attribute ELF Notes are generated by the GCC annobin plugin
+    and described at https://fedoraproject.org/wiki/Toolchain/Watermark
+    
+    Unfortunately the constants aren't yet described in the standard glibc
+    elf.h so they have been added to the elfutils specific elf-knowledge.h.
+    
+    The notes abuse the name owner field to encode some data not in the
+    description. This makes it a bit hard to parse. We have to match the
+    note owner name prefix (to "GA") to be sure the type is valid. We also
+    cannot rely on the owner name being a valid C string since the attribute
+    name and value can contain zero (terminators). So pass around namesz
+    to the ebl note parsing functions.
+    
+    eu-elflint will recognize and eu-readelf -n will now show the notes:
+    
+    Note section [27] '.gnu.build.attributes' of 56080 bytes at offset 0x114564:
+      Owner          Data size  Type
+      GA                    16  GNU Build Attribute OPEN
+        Address Range: 0x2f30f - 0x2f30f
+        VERSION: "3p8"
+      GA                     0  GNU Build Attribute OPEN
+        TOOL: "gcc 8.2.1 20180801"
+      GA                     0  GNU Build Attribute OPEN
+        "GOW": 45
+      GA                     0  GNU Build Attribute OPEN
+        STACK_PROT: 0
+      GA                     0  GNU Build Attribute OPEN
+        "stack_clash": TRUE
+      GA                     0  GNU Build Attribute OPEN
+        "cf_protection": 0
+      GA                     0  GNU Build Attribute OPEN
+        "GLIBCXX_ASSERTIONS": TRUE
+      GA                     0  GNU Build Attribute OPEN
+        "FORTIFY": 0
+      GA                     0  GNU Build Attribute OPEN
+        PIC: 3
+      GA                     0  GNU Build Attribute OPEN
+        SHORT_ENUM: FALSE
+      GA                     0  GNU Build Attribute OPEN
+        ABI: c001100000012
+      GA                     0  GNU Build Attribute OPEN
+        "stack_realign": FALSE
+    
+    A new test was added to run-readelf -n for the existing annobin file.
+    
+    Signed-off-by: Mark Wielaard <mark@klomp.org>
+
+diff --git a/libebl/eblobjnote.c b/libebl/eblobjnote.c
+index 8fda7d9..58ac86d 100644
+--- a/libebl/eblobjnote.c
++++ b/libebl/eblobjnote.c
+@@ -37,11 +37,14 @@
+ #include <string.h>
+ #include <libeblP.h>
+ 
++#include "common.h"
+ #include "libelfP.h"
++#include "libdwP.h"
++#include "memory-access.h"
+ 
+ 
+ void
+-ebl_object_note (Ebl *ebl, const char *name, uint32_t type,
++ebl_object_note (Ebl *ebl, uint32_t namesz, const char *name, uint32_t type,
+ 		 uint32_t descsz, const char *desc)
+ {
+   if (! ebl->object_note (name, type, descsz, desc))
+@@ -135,6 +138,152 @@ ebl_object_note (Ebl *ebl, const char *name, uint32_t type,
+ 	  return;
+ 	}
+ 
++      if (strncmp (name, ELF_NOTE_GNU_BUILD_ATTRIBUTE_PREFIX,
++		   strlen (ELF_NOTE_GNU_BUILD_ATTRIBUTE_PREFIX)) == 0
++	  && (type == NT_GNU_BUILD_ATTRIBUTE_OPEN
++	      || type == NT_GNU_BUILD_ATTRIBUTE_FUNC))
++	{
++	  /* There might or might not be a pair of addresses in the desc.  */
++	  if (descsz > 0)
++	    {
++	      printf ("    Address Range: ");
++
++	      union
++	      {
++		Elf64_Addr a64[2];
++		Elf32_Addr a32[2];
++	      } addrs;
++
++	      size_t addr_size = gelf_fsize (ebl->elf, ELF_T_ADDR,
++					     2, EV_CURRENT);
++	      if (descsz != addr_size)
++		printf ("<unknown data>\n");
++	      else
++		{
++		  Elf_Data src =
++		    {
++		     .d_type = ELF_T_ADDR, .d_version = EV_CURRENT,
++		     .d_buf = (void *) desc, .d_size = descsz
++		    };
++
++		  Elf_Data dst =
++		    {
++		     .d_type = ELF_T_ADDR, .d_version = EV_CURRENT,
++		     .d_buf = &addrs, .d_size = descsz
++		    };
++
++		  if (gelf_xlatetom (ebl->elf, &dst, &src,
++				     elf_getident (ebl->elf,
++						   NULL)[EI_DATA]) == NULL)
++		    printf ("%s\n", elf_errmsg (-1));
++		  else
++		    {
++		      if (addr_size == 4)
++			printf ("%#" PRIx32 " - %#" PRIx32 "\n",
++				addrs.a32[0], addrs.a32[1]);
++		      else
++			printf ("%#" PRIx64 " - %#" PRIx64 "\n",
++				addrs.a64[0], addrs.a64[1]);
++		    }
++		}
++	    }
++
++	  /* Most data actually is inside the name.
++	     https://fedoraproject.org/wiki/Toolchain/Watermark  */
++
++	  /* We need at least 2 chars of data to describe the
++	     attribute and value encodings.  */
++	  const char *data = (name
++			      + strlen (ELF_NOTE_GNU_BUILD_ATTRIBUTE_PREFIX));
++	  if (namesz < 2)
++	    {
++	      printf ("<insufficient data>\n");
++	      return;
++	    }
++
++	  printf ("    ");
++
++	  /* In most cases the value comes right after the encoding bytes.  */
++	  const char *value = &data[2];
++	  switch (data[1])
++	    {
++	    case GNU_BUILD_ATTRIBUTE_VERSION:
++	      printf ("VERSION: ");
++	      break;
++	    case GNU_BUILD_ATTRIBUTE_STACK_PROT:
++	      printf ("STACK_PROT: ");
++	      break;
++	    case GNU_BUILD_ATTRIBUTE_RELRO:
++	      printf ("RELRO: ");
++	      break;
++	    case GNU_BUILD_ATTRIBUTE_STACK_SIZE:
++	      printf ("STACK_SIZE: ");
++	      break;
++	    case GNU_BUILD_ATTRIBUTE_TOOL:
++	      printf ("TOOL: ");
++	      break;
++	    case GNU_BUILD_ATTRIBUTE_ABI:
++	      printf ("ABI: ");
++	      break;
++	    case GNU_BUILD_ATTRIBUTE_PIC:
++	      printf ("PIC: ");
++	      break;
++	    case GNU_BUILD_ATTRIBUTE_SHORT_ENUM:
++	      printf ("SHORT_ENUM: ");
++	      break;
++	    case 32 ... 126:
++	      printf ("\"%s\": ", &data[1]);
++	      value += strlen (&data[1]) + 1;
++	      break;
++	    default:
++	      printf ("<unknown>: ");
++	      break;
++	    }
++
++	  switch (data[0])
++	    {
++	    case GNU_BUILD_ATTRIBUTE_TYPE_NUMERIC:
++	      {
++		/* Any numbers are always in (unsigned) little endian.  */
++		static const Dwarf dbg
++		  = { .other_byte_order = MY_ELFDATA != ELFDATA2LSB };
++		size_t bytes = namesz - (value - name);
++		uint64_t val;
++		if (bytes == 1)
++		  val = *(unsigned char *) value;
++		else if (bytes == 2)
++		  val = read_2ubyte_unaligned (&dbg, value);
++		else if (bytes == 4)
++		  val = read_4ubyte_unaligned (&dbg, value);
++		else if (bytes == 8)
++		  val = read_8ubyte_unaligned (&dbg, value);
++		else
++		  goto unknown;
++		printf ("%" PRIx64, val);
++	      }
++	      break;
++	    case GNU_BUILD_ATTRIBUTE_TYPE_STRING:
++	      printf ("\"%s\"", value);
++	      break;
++	    case GNU_BUILD_ATTRIBUTE_TYPE_BOOL_TRUE:
++	      printf ("TRUE");
++	      break;
++	    case GNU_BUILD_ATTRIBUTE_TYPE_BOOL_FALSE:
++	      printf ("FALSE");
++	      break;
++	    default:
++	      {
++	      unknown:
++		printf ("<unknown>");
++	      }
++	      break;
++	    }
++
++	  printf ("\n");
++
++	  return;
++	}
++
+       /* NT_VERSION doesn't have any info.  All data is in the name.  */
+       if (descsz == 0 && type == NT_VERSION)
+ 	return;
+diff --git a/libebl/eblobjnotetypename.c b/libebl/eblobjnotetypename.c
+index 8cdd781..29a5391 100644
+--- a/libebl/eblobjnotetypename.c
++++ b/libebl/eblobjnotetypename.c
+@@ -1,5 +1,5 @@
+ /* Return note type name.
+-   Copyright (C) 2002, 2007, 2009, 2011, 2016 Red Hat, Inc.
++   Copyright (C) 2002, 2007, 2009, 2011, 2016, 2018 Red Hat, Inc.
+    This file is part of elfutils.
+    Written by Ulrich Drepper <drepper@redhat.com>, 2002.
+ 
+@@ -79,6 +79,29 @@ ebl_object_note_type_name (Ebl *ebl, const char *name, uint32_t type,
+ 	    }
+ 	}
+ 
++      if (strncmp (name, ELF_NOTE_GNU_BUILD_ATTRIBUTE_PREFIX,
++		   strlen (ELF_NOTE_GNU_BUILD_ATTRIBUTE_PREFIX)) == 0)
++	{
++	  /* GNU Build Attribute notes (ab)use the owner name to store
++	     most of their data.  Don't decode everything here.  Just
++	     the type.*/
++	  char *t = buf;
++	  const char *gba = "GNU Build Attribute";
++	  int w = snprintf (t, len, "%s ", gba);
++	  t += w;
++	  len -= w;
++	  if (type == NT_GNU_BUILD_ATTRIBUTE_OPEN)
++	    w = snprintf (t, len, "OPEN");
++	  else if (type == NT_GNU_BUILD_ATTRIBUTE_FUNC)
++	    w = snprintf (t, len, "FUNC");
++	  else
++	    w = snprintf (t, len, "%x", type);
++	  t += w;
++	  len -= w;
++
++	  return buf;
++	}
++
+       if (strcmp (name, "GNU") != 0)
+ 	{
+ 	  /* NT_VERSION is special, all data is in the name.  */
+diff --git a/libebl/libebl.h b/libebl/libebl.h
+index 5830654..ca9b9fe 100644
+--- a/libebl/libebl.h
++++ b/libebl/libebl.h
+@@ -179,8 +179,8 @@ extern const char *ebl_object_note_type_name (Ebl *ebl, const char *name,
+ 					      char *buf, size_t len);
+ 
+ /* Print information about object note if available.  */
+-extern void ebl_object_note (Ebl *ebl, const char *name, uint32_t type,
+-			     uint32_t descsz, const char *desc);
++extern void ebl_object_note (Ebl *ebl, uint32_t namesz, const char *name,
++			     uint32_t type, uint32_t descsz, const char *desc);
+ 
+ /* Check whether an attribute in a .gnu_attributes section is recognized.
+    Fills in *TAG_NAME with the name for this tag.
+diff --git a/libelf/elf-knowledge.h b/libelf/elf-knowledge.h
+index 64f5887..9d3be0f 100644
+--- a/libelf/elf-knowledge.h
++++ b/libelf/elf-knowledge.h
+@@ -77,4 +77,25 @@
+    || ((Ehdr)->e_machine == EM_S390					      \
+        && (Ehdr)->e_ident[EI_CLASS] == ELFCLASS64) ? 8 : 4)
+ 
++/* GNU Annobin notes are not fully standardized and abuses the owner name.  */
++
++#define ELF_NOTE_GNU_BUILD_ATTRIBUTE_PREFIX "GA"
++
++#define NT_GNU_BUILD_ATTRIBUTE_OPEN 0x100
++#define NT_GNU_BUILD_ATTRIBUTE_FUNC 0x101
++
++#define GNU_BUILD_ATTRIBUTE_TYPE_NUMERIC	'*'
++#define GNU_BUILD_ATTRIBUTE_TYPE_STRING		'$'
++#define GNU_BUILD_ATTRIBUTE_TYPE_BOOL_TRUE	'+'
++#define GNU_BUILD_ATTRIBUTE_TYPE_BOOL_FALSE	'!'
++
++#define GNU_BUILD_ATTRIBUTE_VERSION	1
++#define GNU_BUILD_ATTRIBUTE_STACK_PROT	2
++#define GNU_BUILD_ATTRIBUTE_RELRO	3
++#define GNU_BUILD_ATTRIBUTE_STACK_SIZE	4
++#define GNU_BUILD_ATTRIBUTE_TOOL	5
++#define GNU_BUILD_ATTRIBUTE_ABI		6
++#define GNU_BUILD_ATTRIBUTE_PIC		7
++#define GNU_BUILD_ATTRIBUTE_SHORT_ENUM	8
++
+ #endif	/* elf-knowledge.h */
+diff --git a/src/elflint.c b/src/elflint.c
+index dff74ee..184ca12 100644
+--- a/src/elflint.c
++++ b/src/elflint.c
+@@ -4344,6 +4344,19 @@ section [%2d] '%s': unknown core file note type %" PRIu32
+ 	      }
+ 	      goto unknown_note;
+ 
++	  case NT_GNU_BUILD_ATTRIBUTE_OPEN:
++	  case NT_GNU_BUILD_ATTRIBUTE_FUNC:
++	    /* GNU Build Attributes store most data in the owner
++	       name, which must start with the
++	       ELF_NOTE_GNU_BUILD_ATTRIBUTE_PREFIX "GA".  */
++	    if (nhdr.n_namesz >= sizeof ELF_NOTE_GNU_BUILD_ATTRIBUTE_PREFIX
++		&& strncmp (data->d_buf + name_offset,
++			    ELF_NOTE_GNU_BUILD_ATTRIBUTE_PREFIX,
++			    strlen (ELF_NOTE_GNU_BUILD_ATTRIBUTE_PREFIX)) == 0)
++	      break;
++	    else
++	      goto unknown_note;
++
+ 	  case 0:
+ 	    /* Linux vDSOs use a type 0 note for the kernel version word.  */
+ 	    if (nhdr.n_namesz == sizeof "Linux"
+diff --git a/src/readelf.c b/src/readelf.c
+index 659e34f..3a73710 100644
+--- a/src/readelf.c
++++ b/src/readelf.c
+@@ -12193,10 +12193,21 @@ handle_notes_data (Ebl *ebl, const GElf_Ehdr *ehdr,
+       const char *name = nhdr.n_namesz == 0 ? "" : data->d_buf + name_offset;
+       const char *desc = data->d_buf + desc_offset;
+ 
++      /* GNU Build Attributes are weird, they store most of their data
++	 into the owner name field.  Extract just the owner name
++	 prefix here, then use the rest later as data.  */
++      bool is_gnu_build_attr
++	= strncmp (name, ELF_NOTE_GNU_BUILD_ATTRIBUTE_PREFIX,
++		   strlen (ELF_NOTE_GNU_BUILD_ATTRIBUTE_PREFIX)) == 0;
++      const char *print_name = (is_gnu_build_attr
++				? ELF_NOTE_GNU_BUILD_ATTRIBUTE_PREFIX : name);
++      size_t print_namesz = (is_gnu_build_attr
++			     ? strlen (print_name) : nhdr.n_namesz);
++
+       char buf[100];
+       char buf2[100];
+       printf (gettext ("  %-13.*s  %9" PRId32 "  %s\n"),
+-	      (int) nhdr.n_namesz, name, nhdr.n_descsz,
++	      (int) print_namesz, print_name, nhdr.n_descsz,
+ 	      ehdr->e_type == ET_CORE
+ 	      ? ebl_core_note_type_name (ebl, nhdr.n_type,
+ 					 buf, sizeof (buf))
+@@ -12237,7 +12248,8 @@ handle_notes_data (Ebl *ebl, const GElf_Ehdr *ehdr,
+ 		handle_core_note (ebl, &nhdr, name, desc);
+ 	    }
+ 	  else
+-	    ebl_object_note (ebl, name, nhdr.n_type, nhdr.n_descsz, desc);
++	    ebl_object_note (ebl, nhdr.n_namesz, name, nhdr.n_type,
++			     nhdr.n_descsz, desc);
+ 	}
+     }
+ 
diff --git a/SOURCES/elfutils-0.174-gnu-property-note.patch b/SOURCES/elfutils-0.174-gnu-property-note.patch
new file mode 100644
index 0000000..e511ed0
--- /dev/null
+++ b/SOURCES/elfutils-0.174-gnu-property-note.patch
@@ -0,0 +1,820 @@
+commit 5199e15870e05e5b0b9f98c20fc9b5427aa6dd6a
+Author: Mark Wielaard <mark@klomp.org>
+Date:   Mon Oct 15 23:35:47 2018 +0200
+
+    Recognize and parse GNU Property notes.
+    
+    GNU Property notes are different from normal notes because they use
+    variable alignment/padding of their fields. They are 8 byte aligned,
+    but use 4 byte fields. The name is aligned at 4 bytes and padded so
+    that, the desc is aligned at 8 bytes. The whole note is padded to
+    8 bytes again. For normal notes all fields are both 4 bytes wide and
+    4 bytes aligned.
+    
+    To recognize these new kind of ELF Notes a new Elf_Type is introduced,
+    ELF_T_NHDR8. This type is used in the xlate functions to determine
+    how to align and pad the various fields. Since the fields themselves
+    can now have different alignments we will have to keep track of the
+    current alignement and use either NOTE_ALIGN4 or NOTE_ALIGN8 to
+    determine the padding.
+    
+    To set the correct Elf_Type on the Elf_Data we use either the section
+    sh_addralign or the segment p_align values. Assuming 8 means the
+    section or segment contains the new style notes, otherwise normal
+    notes.
+    
+    When we cannot determine the "alignment" directly, like when parsing
+    special kernel sys files, we check the name "GNU" and type
+    "GNU_PROPERTY_TYPE_0" fields.
+    
+    ebl_object_note now parses the new NT_GNU_PROPERTY_TYPE_0 and can
+    extract the GNU_PROPERTY_STACK_SIZE, GNU_PROPERTY_NO_COPY_ON_PROTECTED
+    and GNU_PROPERTY_X86_FEATURE_1_AND types GNU_PROPERTY_X86_FEATURE_1_IBT
+    and GNU_PROPERTY_X86_FEATURE_1_SHSTK.
+    
+    Tests are added for extracting the note from sections or segments
+    as set by gcc -fcf-protection.
+    
+    Signed-off-by: Mark Wielaard <mark@klomp.org>
+
+diff --git a/libdwelf/dwelf_elf_gnu_build_id.c b/libdwelf/dwelf_elf_gnu_build_id.c
+index 8c78c70..dbcfc82 100644
+--- a/libdwelf/dwelf_elf_gnu_build_id.c
++++ b/libdwelf/dwelf_elf_gnu_build_id.c
+@@ -88,7 +88,9 @@ find_elf_build_id (Dwfl_Module *mod, int e_type, Elf *elf,
+ 	    result = check_notes (elf_getdata_rawchunk (elf,
+ 							phdr->p_offset,
+ 							phdr->p_filesz,
+-							ELF_T_NHDR),
++							(phdr->p_align == 8
++							 ? ELF_T_NHDR8
++							 : ELF_T_NHDR)),
+ 				  phdr->p_vaddr,
+ 				  build_id_bits,
+ 				  build_id_elfaddr,
+diff --git a/libdwfl/core-file.c b/libdwfl/core-file.c
+index 84cb89a..01109f4 100644
+--- a/libdwfl/core-file.c
++++ b/libdwfl/core-file.c
+@@ -496,7 +496,9 @@ dwfl_core_file_report (Dwfl *dwfl, Elf *elf, const char *executable)
+       Elf_Data *notes = elf_getdata_rawchunk (elf,
+ 					      notes_phdr.p_offset,
+ 					      notes_phdr.p_filesz,
+-					      ELF_T_NHDR);
++					      (notes_phdr.p_align == 8
++					       ? ELF_T_NHDR8
++					       : ELF_T_NHDR));
+       if (likely (notes != NULL))
+ 	{
+ 	  size_t pos = 0;
+diff --git a/libdwfl/dwfl_segment_report_module.c b/libdwfl/dwfl_segment_report_module.c
+index 8749884..0d633ff 100644
+--- a/libdwfl/dwfl_segment_report_module.c
++++ b/libdwfl/dwfl_segment_report_module.c
+@@ -27,7 +27,7 @@
+    not, see <http://www.gnu.org/licenses/>.  */
+ 
+ #include <config.h>
+-#include "../libelf/libelfP.h"	/* For NOTE_ALIGN.  */
++#include "../libelf/libelfP.h"	/* For NOTE_ALIGN4 and NOTE_ALIGN8.  */
+ #undef	_
+ #include "libdwflP.h"
+ #include "common.h"
+@@ -451,7 +451,8 @@ dwfl_segment_report_module (Dwfl *dwfl, int ndx, const char *name,
+   GElf_Addr build_id_vaddr = 0;
+ 
+   /* Consider a PT_NOTE we've found in the image.  */
+-  inline void consider_notes (GElf_Addr vaddr, GElf_Xword filesz)
++  inline void consider_notes (GElf_Addr vaddr, GElf_Xword filesz,
++			      GElf_Xword align)
+   {
+     /* If we have already seen a build ID, we don't care any more.  */
+     if (build_id != NULL || filesz == 0)
+@@ -478,7 +479,8 @@ dwfl_segment_report_module (Dwfl *dwfl, int ndx, const char *name,
+ 	notes = malloc (filesz);
+ 	if (unlikely (notes == NULL))
+ 	  return;
+-	xlatefrom.d_type = xlateto.d_type = ELF_T_NHDR;
++	xlatefrom.d_type = xlateto.d_type = (align == 8
++					     ? ELF_T_NHDR8 : ELF_T_NHDR);
+ 	xlatefrom.d_buf = (void *) data;
+ 	xlatefrom.d_size = filesz;
+ 	xlateto.d_buf = notes;
+@@ -489,15 +491,23 @@ dwfl_segment_report_module (Dwfl *dwfl, int ndx, const char *name,
+       }
+ 
+     const GElf_Nhdr *nh = notes;
+-    while ((const void *) nh < (const void *) notes + filesz)
+-     {
+-	const void *note_name = nh + 1;
+-	const void *note_desc = note_name + NOTE_ALIGN (nh->n_namesz);
+-	if (unlikely ((size_t) ((const void *) notes + filesz
+-				- note_desc) < nh->n_descsz))
++    size_t len = 0;
++    while (filesz > len + sizeof (*nh))
++      {
++	const void *note_name;
++	const void *note_desc;
++
++	len += sizeof (*nh);
++	note_name = notes + len;
++
++	len += nh->n_namesz;
++	len = align == 8 ? NOTE_ALIGN8 (len) : NOTE_ALIGN4 (len);
++	note_desc = notes + len;
++
++	if (unlikely (filesz < len + nh->n_descsz))
+ 	  break;
+ 
+-	if (nh->n_type == NT_GNU_BUILD_ID
++        if (nh->n_type == NT_GNU_BUILD_ID
+ 	    && nh->n_descsz > 0
+ 	    && nh->n_namesz == sizeof "GNU"
+ 	    && !memcmp (note_name, "GNU", sizeof "GNU"))
+@@ -510,7 +520,9 @@ dwfl_segment_report_module (Dwfl *dwfl, int ndx, const char *name,
+ 	    break;
+ 	  }
+ 
+-	nh = note_desc + NOTE_ALIGN (nh->n_descsz);
++	len += nh->n_descsz;
++	len = align == 8 ? NOTE_ALIGN8 (len) : NOTE_ALIGN4 (len);
++	nh = (void *) notes + len;
+       }
+ 
+   done:
+@@ -535,7 +547,7 @@ dwfl_segment_report_module (Dwfl *dwfl, int ndx, const char *name,
+       case PT_NOTE:
+ 	/* We calculate from the p_offset of the note segment,
+ 	   because we don't yet know the bias for its p_vaddr.  */
+-	consider_notes (start + offset, filesz);
++	consider_notes (start + offset, filesz, align);
+ 	break;
+ 
+       case PT_LOAD:
+diff --git a/libdwfl/linux-core-attach.c b/libdwfl/linux-core-attach.c
+index 9f05f72..6c99b9e 100644
+--- a/libdwfl/linux-core-attach.c
++++ b/libdwfl/linux-core-attach.c
+@@ -355,7 +355,9 @@ dwfl_core_file_attach (Dwfl *dwfl, Elf *core)
+       if (phdr != NULL && phdr->p_type == PT_NOTE)
+ 	{
+ 	  note_data = elf_getdata_rawchunk (core, phdr->p_offset,
+-					    phdr->p_filesz, ELF_T_NHDR);
++					    phdr->p_filesz, (phdr->p_align == 8
++							     ? ELF_T_NHDR8
++							     : ELF_T_NHDR));
+ 	  break;
+ 	}
+     }
+diff --git a/libdwfl/linux-kernel-modules.c b/libdwfl/linux-kernel-modules.c
+index 9d0fef2..360e4ee 100644
+--- a/libdwfl/linux-kernel-modules.c
++++ b/libdwfl/linux-kernel-modules.c
+@@ -39,6 +39,7 @@
+ #include <config.h>
+ #include <system.h>
+ 
++#include "libelfP.h"
+ #include "libdwflP.h"
+ #include <inttypes.h>
+ #include <errno.h>
+@@ -554,15 +555,41 @@ check_notes (Dwfl_Module *mod, const char *notesfile,
+     return 1;
+ 
+   unsigned char *p = buf.data;
++  size_t len = 0;
+   while (p < &buf.data[n])
+     {
+       /* No translation required since we are reading the native kernel.  */
+       GElf_Nhdr *nhdr = (void *) p;
+-      p += sizeof *nhdr;
++      len += sizeof *nhdr;
++      p += len;
+       unsigned char *name = p;
+-      p += (nhdr->n_namesz + 3) & -4U;
+-      unsigned char *bits = p;
+-      p += (nhdr->n_descsz + 3) & -4U;
++      unsigned char *bits;
++      /* This is somewhat ugly, GNU Property notes use different padding,
++	 but all we have is the file content, so we have to actually check
++	 the name and type.  */
++      if (nhdr->n_type == NT_GNU_PROPERTY_TYPE_0
++          && nhdr->n_namesz == sizeof "GNU"
++          && name + nhdr->n_namesz < &buf.data[n]
++          && !memcmp (name, "GNU", sizeof "GNU"))
++	{
++	  len += nhdr->n_namesz;
++	  len = NOTE_ALIGN8 (len);
++	  p = buf.data + len;
++	  bits = p;
++	  len += nhdr->n_descsz;
++	  len = NOTE_ALIGN8 (len);
++	  p = buf.data + len;
++	}
++      else
++	{
++	  len += nhdr->n_namesz;
++	  len = NOTE_ALIGN4 (len);
++	  p = buf.data + len;
++	  bits = p;
++	  len += nhdr->n_descsz;
++	  len = NOTE_ALIGN4 (len);
++	  p = buf.data + len;
++	}
+ 
+       if (p <= &buf.data[n]
+ 	  && nhdr->n_type == NT_GNU_BUILD_ID
+diff --git a/libebl/eblobjnote.c b/libebl/eblobjnote.c
+index ca4f155..57e9f52 100644
+--- a/libebl/eblobjnote.c
++++ b/libebl/eblobjnote.c
+@@ -1,5 +1,5 @@
+ /* Print contents of object file note.
+-   Copyright (C) 2002, 2007, 2009, 2011, 2015, 2016 Red Hat, Inc.
++   Copyright (C) 2002, 2007, 2009, 2011, 2015, 2016, 2018 Red Hat, Inc.
+    This file is part of elfutils.
+    Written by Ulrich Drepper <drepper@redhat.com>, 2002.
+ 
+@@ -37,6 +37,8 @@
+ #include <string.h>
+ #include <libeblP.h>
+ 
++#include "libelfP.h"
++
+ 
+ void
+ ebl_object_note (Ebl *ebl, const char *name, uint32_t type,
+@@ -153,6 +155,187 @@ ebl_object_note (Ebl *ebl, const char *name, uint32_t type,
+ 		    (int) descsz, desc);
+ 	  break;
+ 
++	case NT_GNU_PROPERTY_TYPE_0:
++	  if (strcmp (name, "GNU") == 0 && descsz > 0)
++	    {
++	      /* There are at least 2 words. type and datasz.  */
++	      while (descsz >= 8)
++		{
++		  struct pr_prop
++		  {
++		    GElf_Word pr_type;
++		    GElf_Word pr_datasz;
++		  } prop;
++
++		  Elf_Data in =
++		    {
++		      .d_version = EV_CURRENT,
++		      .d_type = ELF_T_WORD,
++		      .d_size = 8,
++		      .d_buf = (void *) desc
++		    };
++		  Elf_Data out =
++		    {
++		      .d_version = EV_CURRENT,
++		      .d_type = ELF_T_WORD,
++		      .d_size = descsz,
++		      .d_buf = (void *) &prop
++		    };
++
++		  if (gelf_xlatetom (ebl->elf, &out, &in,
++				     elf_getident (ebl->elf,
++						   NULL)[EI_DATA]) == NULL)
++		    {
++		      printf ("%s\n", elf_errmsg (-1));
++		      return;
++		    }
++
++		  desc += 8;
++		  descsz -= 8;
++
++		  int elfclass = gelf_getclass (ebl->elf);
++		  char *elfident = elf_getident (ebl->elf, NULL);
++		  GElf_Ehdr ehdr;
++		  gelf_getehdr (ebl->elf, &ehdr);
++
++		  /* Prefix.  */
++		  printf ("    ");
++		  if (prop.pr_type == GNU_PROPERTY_STACK_SIZE)
++		    {
++		      printf ("STACK_SIZE ");
++		      if (prop.pr_datasz == 4 || prop.pr_datasz == 8)
++			{
++			  GElf_Addr addr;
++			  in.d_type = ELF_T_ADDR;
++			  out.d_type = ELF_T_ADDR;
++			  in.d_size = prop.pr_datasz;
++			  out.d_size = sizeof (addr);
++			  in.d_buf = (void *) desc;
++			  out.d_buf = (void *) &addr;
++
++			  if (gelf_xlatetom (ebl->elf, &out, &in,
++					     elfident[EI_DATA]) == NULL)
++			    {
++			      printf ("%s\n", elf_errmsg (-1));
++			      return;
++			    }
++			  printf ("%#" PRIx64 "\n", addr);
++			}
++		      else
++			printf (" (garbage datasz: %" PRIx32 ")\n",
++				prop.pr_datasz);
++		    }
++		  else if (prop.pr_type == GNU_PROPERTY_NO_COPY_ON_PROTECTED)
++		    {
++		      printf ("NO_COPY_ON_PROTECTION");
++		      if (prop.pr_datasz == 0)
++			printf ("\n");
++		      else
++			printf (" (garbage datasz: %" PRIx32 ")\n",
++				prop.pr_datasz);
++		    }
++		  else if (prop.pr_type >= GNU_PROPERTY_LOPROC
++		      && prop.pr_type <= GNU_PROPERTY_HIPROC
++		      && (ehdr.e_machine == EM_386
++			  || ehdr.e_machine == EM_X86_64))
++		    {
++		      printf ("X86 ");
++		      if (prop.pr_type == GNU_PROPERTY_X86_FEATURE_1_AND)
++			{
++			  printf ("FEATURE_1_AND: ");
++
++			  if (prop.pr_datasz == 4)
++			    {
++			      GElf_Word data;
++			      in.d_type = ELF_T_WORD;
++			      out.d_type = ELF_T_WORD;
++			      in.d_size = 4;
++			      out.d_size = 4;
++			      in.d_buf = (void *) desc;
++			      out.d_buf = (void *) &data;
++
++			      if (gelf_xlatetom (ebl->elf, &out, &in,
++						 elfident[EI_DATA]) == NULL)
++				{
++				  printf ("%s\n", elf_errmsg (-1));
++				  return;
++				}
++			      printf ("%08" PRIx32 " ", data);
++
++			      if ((data & GNU_PROPERTY_X86_FEATURE_1_IBT)
++				  != 0)
++				{
++				  printf ("IBT");
++				  data &= ~GNU_PROPERTY_X86_FEATURE_1_IBT;
++				  if (data != 0)
++				    printf (" ");
++				}
++
++			      if ((data & GNU_PROPERTY_X86_FEATURE_1_SHSTK)
++				  != 0)
++				{
++				  printf ("SHSTK");
++				  data &= ~GNU_PROPERTY_X86_FEATURE_1_SHSTK;
++				  if (data != 0)
++				    printf (" ");
++				}
++
++			      if (data != 0)
++				printf ("UNKNOWN");
++			    }
++			  else
++			    printf ("<bad datasz: %" PRId32 ">",
++				    prop.pr_datasz);
++
++			  printf ("\n");
++			}
++		      else
++			{
++			  printf ("%#" PRIx32, prop.pr_type);
++			  if (prop.pr_datasz > 0)
++			    {
++			      printf (" data: ");
++			      size_t i;
++			      for (i = 0; i < prop.pr_datasz - 1; i++)
++				printf ("%02" PRIx8 " ", (uint8_t) desc[i]);
++			      printf ("%02" PRIx8 "\n", (uint8_t) desc[i]);
++			    }
++			}
++		    }
++		  else
++		    {
++		      if (prop.pr_type >= GNU_PROPERTY_LOPROC
++			  && prop.pr_type <= GNU_PROPERTY_HIPROC)
++			printf ("proc_type %#" PRIx32, prop.pr_type);
++		      else if (prop.pr_type >= GNU_PROPERTY_LOUSER
++			  && prop.pr_type <= GNU_PROPERTY_HIUSER)
++			printf ("app_type %#" PRIx32, prop.pr_type);
++		      else
++			printf ("unknown_type %#" PRIx32, prop.pr_type);
++
++		      if (prop.pr_datasz > 0)
++			{
++			  printf (" data: ");
++			  size_t i;
++			  for (i = 0; i < prop.pr_datasz - 1; i++)
++			    printf ("%02" PRIx8 " ", (uint8_t) desc[i]);
++			  printf ("%02" PRIx8 "\n", (uint8_t) desc[i]);
++			}
++		    }
++		  if (elfclass == ELFCLASS32)
++		    {
++		      desc += NOTE_ALIGN4 (prop.pr_datasz);
++		      descsz -= NOTE_ALIGN4 (prop.pr_datasz);
++		    }
++		  else
++		    {
++		      desc += NOTE_ALIGN8 (prop.pr_datasz);
++		      descsz -= NOTE_ALIGN8 (prop.pr_datasz);
++		    }
++		}
++	    }
++	  break;
++
+ 	case NT_GNU_ABI_TAG:
+ 	  if (strcmp (name, "GNU") == 0 && descsz >= 8 && descsz % 4 == 0)
+ 	    {
+diff --git a/libebl/eblobjnotetypename.c b/libebl/eblobjnotetypename.c
+index db040d2..af23cae 100644
+--- a/libebl/eblobjnotetypename.c
++++ b/libebl/eblobjnotetypename.c
+@@ -91,6 +91,7 @@ ebl_object_note_type_name (Ebl *ebl, const char *name, uint32_t type,
+ 	  KNOWNSTYPE (GNU_HWCAP),
+ 	  KNOWNSTYPE (GNU_BUILD_ID),
+ 	  KNOWNSTYPE (GNU_GOLD_VERSION),
++	  KNOWNSTYPE (GNU_PROPERTY_TYPE_0),
+ 	};
+ 
+       /* Handle standard names.  */
+diff --git a/libelf/elf32_xlatetom.c b/libelf/elf32_xlatetom.c
+index 13cd485..3b94cac 100644
+--- a/libelf/elf32_xlatetom.c
++++ b/libelf/elf32_xlatetom.c
+@@ -60,7 +60,7 @@ elfw2(LIBELFBITS, xlatetom) (Elf_Data *dest, const Elf_Data *src,
+   /* We shouldn't require integer number of records when processing
+      notes.  Payload bytes follow the header immediately, it's not an
+      array of records as is the case otherwise.  */
+-  if (src->d_type != ELF_T_NHDR
++  if (src->d_type != ELF_T_NHDR && src->d_type != ELF_T_NHDR8
+       && src->d_size % recsize != 0)
+     {
+       __libelf_seterrno (ELF_E_INVALID_DATA);
+diff --git a/libelf/elf_compress.c b/libelf/elf_compress.c
+index 711be59..fd412e8 100644
+--- a/libelf/elf_compress.c
++++ b/libelf/elf_compress.c
+@@ -513,7 +513,8 @@ elf_compress (Elf_Scn *scn, int type, unsigned int flags)
+ 
+       __libelf_reset_rawdata (scn, scn->zdata_base,
+ 			      scn->zdata_size, scn->zdata_align,
+-			      __libelf_data_type (elf, sh_type));
++			      __libelf_data_type (elf, sh_type,
++						  scn->zdata_align));
+ 
+       return 1;
+     }
+diff --git a/libelf/elf_compress_gnu.c b/libelf/elf_compress_gnu.c
+index dfa7c57..198dc7d 100644
+--- a/libelf/elf_compress_gnu.c
++++ b/libelf/elf_compress_gnu.c
+@@ -196,7 +196,7 @@ elf_compress_gnu (Elf_Scn *scn, int inflate, unsigned int flags)
+ 	}
+ 
+       __libelf_reset_rawdata (scn, buf_out, size, sh_addralign,
+-			      __libelf_data_type (elf, sh_type));
++			      __libelf_data_type (elf, sh_type, sh_addralign));
+ 
+       scn->zdata_base = buf_out;
+ 
+diff --git a/libelf/elf_getdata.c b/libelf/elf_getdata.c
+index 278dfa8..4f80aaf 100644
+--- a/libelf/elf_getdata.c
++++ b/libelf/elf_getdata.c
+@@ -65,7 +65,7 @@ static const Elf_Type shtype_map[EV_NUM - 1][TYPEIDX (SHT_HISUNW) + 1] =
+       [SHT_PREINIT_ARRAY] = ELF_T_ADDR,
+       [SHT_GROUP] = ELF_T_WORD,
+       [SHT_SYMTAB_SHNDX] = ELF_T_WORD,
+-      [SHT_NOTE] = ELF_T_NHDR,
++      [SHT_NOTE] = ELF_T_NHDR, /* Need alignment to guess ELF_T_NHDR8.  */
+       [TYPEIDX (SHT_GNU_verdef)] = ELF_T_VDEF,
+       [TYPEIDX (SHT_GNU_verneed)] = ELF_T_VNEED,
+       [TYPEIDX (SHT_GNU_versym)] = ELF_T_HALF,
+@@ -106,6 +106,7 @@ const uint_fast8_t __libelf_type_aligns[EV_NUM - 1][ELFCLASSNUM - 1][ELF_T_NUM]
+       [ELF_T_GNUHASH] = __alignof__ (Elf32_Word),			      \
+       [ELF_T_AUXV] = __alignof__ (ElfW2(Bits,auxv_t)),			      \
+       [ELF_T_CHDR] = __alignof__ (ElfW2(Bits,Chdr)),			      \
++      [ELF_T_NHDR8] = 8 /* Special case for GNU Property note.  */	      \
+     }
+     [EV_CURRENT - 1] =
+     {
+@@ -118,7 +119,7 @@ const uint_fast8_t __libelf_type_aligns[EV_NUM - 1][ELFCLASSNUM - 1][ELF_T_NUM]
+ 
+ Elf_Type
+ internal_function
+-__libelf_data_type (Elf *elf, int sh_type)
++__libelf_data_type (Elf *elf, int sh_type, GElf_Xword align)
+ {
+   /* Some broken ELF ABI for 64-bit machines use the wrong hash table
+      entry size.  See elf-knowledge.h for more information.  */
+@@ -129,7 +130,13 @@ __libelf_data_type (Elf *elf, int sh_type)
+       return (SH_ENTSIZE_HASH (ehdr) == 4 ? ELF_T_WORD : ELF_T_XWORD);
+     }
+   else
+-    return shtype_map[LIBELF_EV_IDX][TYPEIDX (sh_type)];
++    {
++      Elf_Type t = shtype_map[LIBELF_EV_IDX][TYPEIDX (sh_type)];
++      /* Special case for GNU Property notes.  */
++      if (t == ELF_T_NHDR && align == 8)
++	t = ELF_T_NHDR8;
++      return t;
++    }
+ }
+ 
+ /* Convert the data in the current section.  */
+@@ -272,7 +279,9 @@ __libelf_set_rawdata_wrlock (Elf_Scn *scn)
+       else
+ 	{
+ 	  Elf_Type t = shtype_map[LIBELF_EV_IDX][TYPEIDX (type)];
+-	  if (t == ELF_T_VDEF || t == ELF_T_NHDR
++	  if (t == ELF_T_NHDR && align == 8)
++	    t = ELF_T_NHDR8;
++	  if (t == ELF_T_VDEF || t == ELF_T_NHDR || t == ELF_T_NHDR8
+ 	      || (t == ELF_T_GNUHASH && elf->class == ELFCLASS64))
+ 	    entsize = 1;
+ 	  else
+@@ -357,7 +366,7 @@ __libelf_set_rawdata_wrlock (Elf_Scn *scn)
+   if ((flags & SHF_COMPRESSED) != 0)
+     scn->rawdata.d.d_type = ELF_T_CHDR;
+   else
+-    scn->rawdata.d.d_type = __libelf_data_type (elf, type);
++    scn->rawdata.d.d_type = __libelf_data_type (elf, type, align);
+   scn->rawdata.d.d_off = 0;
+ 
+   /* Make sure the alignment makes sense.  d_align should be aligned both
+diff --git a/libelf/gelf_fsize.c b/libelf/gelf_fsize.c
+index 0c50926..d04ec5d 100644
+--- a/libelf/gelf_fsize.c
++++ b/libelf/gelf_fsize.c
+@@ -64,6 +64,8 @@ const size_t __libelf_type_sizes[EV_NUM - 1][ELFCLASSNUM - 1][ELF_T_NUM] =
+       [ELF_T_VNEED]	= sizeof (ElfW2(LIBELFBITS, Ext_Verneed)),	      \
+       [ELF_T_VNAUX]	= sizeof (ElfW2(LIBELFBITS, Ext_Vernaux)),	      \
+       [ELF_T_NHDR]	= sizeof (ElfW2(LIBELFBITS, Ext_Nhdr)),		      \
++      /* Note the header size is the same, but padding is different.  */      \
++      [ELF_T_NHDR8]	= sizeof (ElfW2(LIBELFBITS, Ext_Nhdr)),		      \
+       [ELF_T_SYMINFO]	= sizeof (ElfW2(LIBELFBITS, Ext_Syminfo)),	      \
+       [ELF_T_MOVE]	= sizeof (ElfW2(LIBELFBITS, Ext_Move)),		      \
+       [ELF_T_LIB]	= sizeof (ElfW2(LIBELFBITS, Ext_Lib)),		      \
+diff --git a/libelf/gelf_getnote.c b/libelf/gelf_getnote.c
+index c75edda..6d33b35 100644
+--- a/libelf/gelf_getnote.c
++++ b/libelf/gelf_getnote.c
+@@ -1,5 +1,5 @@
+ /* Get note information at the supplied offset.
+-   Copyright (C) 2007, 2014, 2015 Red Hat, Inc.
++   Copyright (C) 2007, 2014, 2015, 2018 Red Hat, Inc.
+    This file is part of elfutils.
+ 
+    This file is free software; you can redistribute it and/or modify
+@@ -43,7 +43,7 @@ gelf_getnote (Elf_Data *data, size_t offset, GElf_Nhdr *result,
+   if (data == NULL)
+     return 0;
+ 
+-  if (unlikely (data->d_type != ELF_T_NHDR))
++  if (unlikely (data->d_type != ELF_T_NHDR && data->d_type != ELF_T_NHDR8))
+     {
+       __libelf_seterrno (ELF_E_INVALID_HANDLE);
+       return 0;
+@@ -69,27 +69,42 @@ gelf_getnote (Elf_Data *data, size_t offset, GElf_Nhdr *result,
+       const GElf_Nhdr *n = data->d_buf + offset;
+       offset += sizeof *n;
+ 
+-      /* Include padding.  Check below for overflow.  */
+-      GElf_Word namesz = NOTE_ALIGN (n->n_namesz);
+-      GElf_Word descsz = NOTE_ALIGN (n->n_descsz);
+-
+-      if (unlikely (offset > data->d_size
+-		    || data->d_size - offset < namesz
+-		    || (namesz == 0 && n->n_namesz != 0)))
++      if (offset > data->d_size)
+ 	offset = 0;
+       else
+ 	{
++	  /* This is slightly tricky, offset is guaranteed to be 4
++	     byte aligned, which is what we need for the name_offset.
++	     And normally desc_offset is also 4 byte aligned, but not
++	     for GNU Property notes, then it should be 8.  So align
++	     the offset, after adding the namesz, and include padding
++	     in descsz to get to the end.  */
+ 	  *name_offset = offset;
+-	  offset += namesz;
+-	  if (unlikely (offset > data->d_size
+-			|| data->d_size - offset < descsz
+-			|| (descsz == 0 && n->n_descsz != 0)))
++	  offset += n->n_namesz;
++	  if (offset > data->d_size)
+ 	    offset = 0;
+ 	  else
+ 	    {
+-	      *desc_offset = offset;
+-	      offset += descsz;
+-	      *result = *n;
++	      /* Include padding.  Check below for overflow.  */
++	      GElf_Word descsz = (data->d_type == ELF_T_NHDR8
++				  ? NOTE_ALIGN8 (n->n_descsz)
++				  : NOTE_ALIGN4 (n->n_descsz));
++
++	      if (data->d_type == ELF_T_NHDR8)
++		offset = NOTE_ALIGN8 (offset);
++	      else
++		offset = NOTE_ALIGN4 (offset);
++
++	      if (unlikely (offset > data->d_size
++			    || data->d_size - offset < descsz
++			    || (descsz == 0 && n->n_descsz != 0)))
++		offset = 0;
++	      else
++		{
++		  *desc_offset = offset;
++		  offset += descsz;
++		  *result = *n;
++		}
+ 	    }
+ 	}
+     }
+diff --git a/libelf/gelf_xlate.c b/libelf/gelf_xlate.c
+index 479f143..b5d6ef3 100644
+--- a/libelf/gelf_xlate.c
++++ b/libelf/gelf_xlate.c
+@@ -195,7 +195,8 @@ const xfct_t __elf_xfctstom[EV_NUM - 1][EV_NUM - 1][ELFCLASSNUM - 1][ELF_T_NUM]
+ 	[ELF_T_VDAUX]	= elf_cvt_Verdef,				      \
+ 	[ELF_T_VNEED]	= elf_cvt_Verneed,				      \
+ 	[ELF_T_VNAUX]	= elf_cvt_Verneed,				      \
+-	[ELF_T_NHDR]	= elf_cvt_note,					      \
++	[ELF_T_NHDR]	= elf_cvt_note4,				      \
++	[ELF_T_NHDR8]	= elf_cvt_note8,				      \
+ 	[ELF_T_SYMINFO] = ElfW2(Bits, cvt_Syminfo),			      \
+ 	[ELF_T_MOVE]	= ElfW2(Bits, cvt_Move),			      \
+ 	[ELF_T_LIB]	= ElfW2(Bits, cvt_Lib),				      \
+diff --git a/libelf/libelf.h b/libelf/libelf.h
+index d11358c..1ff11c9 100644
+--- a/libelf/libelf.h
++++ b/libelf/libelf.h
+@@ -117,6 +117,8 @@ typedef enum
+   ELF_T_GNUHASH,		/* GNU-style hash section.  */
+   ELF_T_AUXV,			/* Elf32_auxv_t, Elf64_auxv_t, ... */
+   ELF_T_CHDR,			/* Compressed, Elf32_Chdr, Elf64_Chdr, ... */
++  ELF_T_NHDR8,			/* Special GNU Properties note.  Same as Nhdr,
++				   except padding.  */
+   /* Keep this the last entry.  */
+   ELF_T_NUM
+ } Elf_Type;
+diff --git a/libelf/libelfP.h b/libelf/libelfP.h
+index ed216c8..fa6d55d 100644
+--- a/libelf/libelfP.h
++++ b/libelf/libelfP.h
+@@ -452,7 +452,8 @@ extern const uint_fast8_t __libelf_type_aligns[EV_NUM - 1][ELFCLASSNUM - 1][ELF_
+ /* Given an Elf handle and a section type returns the Elf_Data d_type.
+    Should not be called when SHF_COMPRESSED is set, the d_type should
+    be ELF_T_BYTE.  */
+-extern Elf_Type __libelf_data_type (Elf *elf, int sh_type) internal_function;
++extern Elf_Type __libelf_data_type (Elf *elf, int sh_type, GElf_Xword align)
++  internal_function;
+ 
+ /* The libelf API does not have such a function but it is still useful.
+    Get the memory size for the given type.
+@@ -624,8 +625,13 @@ extern void __libelf_reset_rawdata (Elf_Scn *scn, void *buf, size_t size,
+       }									      \
+   } while (0)
+ 
+-/* Align offset to 4 bytes as needed for note name and descriptor data.  */
+-#define NOTE_ALIGN(n)	(((n) + 3) & -4U)
++/* Align offset to 4 bytes as needed for note name and descriptor data.
++   This is almost always used, except for GNU Property notes, which use
++   8 byte padding...  */
++#define NOTE_ALIGN4(n)	(((n) + 3) & -4U)
++
++/* Special note padding rule for GNU Property notes.  */
++#define NOTE_ALIGN8(n)	(((n) + 7) & -8U)
+ 
+ /* Convenience macro.  */
+ #define INVALID_NDX(ndx, type, data) \
+diff --git a/libelf/note_xlate.h b/libelf/note_xlate.h
+index 62c6f63..9bdc3e2 100644
+--- a/libelf/note_xlate.h
++++ b/libelf/note_xlate.h
+@@ -1,5 +1,5 @@
+ /* Conversion functions for notes.
+-   Copyright (C) 2007, 2009, 2014 Red Hat, Inc.
++   Copyright (C) 2007, 2009, 2014, 2018 Red Hat, Inc.
+    This file is part of elfutils.
+ 
+    This file is free software; you can redistribute it and/or modify
+@@ -27,38 +27,60 @@
+    not, see <http://www.gnu.org/licenses/>.  */
+ 
+ static void
+-elf_cvt_note (void *dest, const void *src, size_t len, int encode)
++elf_cvt_note (void *dest, const void *src, size_t len, int encode,
++	      bool nhdr8)
+ {
++  /* Note that the header is always the same size, but the padding
++     differs for GNU Property notes.  */
+   assert (sizeof (Elf32_Nhdr) == sizeof (Elf64_Nhdr));
+ 
+   while (len >= sizeof (Elf32_Nhdr))
+     {
++      /* Convert the header.  */
+       (1 ? Elf32_cvt_Nhdr : Elf64_cvt_Nhdr) (dest, src, sizeof (Elf32_Nhdr),
+ 					     encode);
+       const Elf32_Nhdr *n = encode ? src : dest;
+-      Elf32_Word namesz = NOTE_ALIGN (n->n_namesz);
+-      Elf32_Word descsz = NOTE_ALIGN (n->n_descsz);
+ 
+-      len -= sizeof *n;
+-      src += sizeof *n;
+-      dest += sizeof *n;
++      size_t note_len = sizeof *n;
+ 
+-      if (namesz > len)
++      /* desc needs to be aligned.  */
++      note_len += n->n_namesz;
++      note_len = nhdr8 ? NOTE_ALIGN8 (note_len) : NOTE_ALIGN4 (note_len);
++      if (note_len > len || note_len < 8)
+ 	break;
+-      len -= namesz;
+-      if (descsz > len)
++
++      /* data as a whole needs to be aligned.  */
++      note_len += n->n_descsz;
++      note_len = nhdr8 ? NOTE_ALIGN8 (note_len) : NOTE_ALIGN4 (note_len);
++      if (note_len > len || note_len < 8)
+ 	break;
+-      len -= descsz;
+ 
++      /* Copy or skip the note data.  */
++      size_t note_data_len = note_len - sizeof *n;
++      src += sizeof *n;
++      dest += sizeof *n;
+       if (src != dest)
+-	memcpy (dest, src, namesz + descsz);
++	memcpy (dest, src, note_data_len);
+ 
+-      src += namesz + descsz;
+-      dest += namesz + descsz;
++      src += note_data_len;
++      dest += note_data_len;
++      len -= note_len;
+     }
+ 
+-    /* Copy opver any leftover data unconcerted.  Probably part of
++    /* Copy over any leftover data unconverted.  Probably part of
+        truncated name/desc data.  */
+     if (unlikely (len > 0) && src != dest)
+       memcpy (dest, src, len);
+ }
++
++static void
++elf_cvt_note4 (void *dest, const void *src, size_t len, int encode)
++{
++  elf_cvt_note (dest, src, len, encode, false);
++}
++
++static void
++elf_cvt_note8 (void *dest, const void *src, size_t len, int encode)
++{
++  elf_cvt_note (dest, src, len, encode, true);
++}
+diff --git a/src/elflint.c b/src/elflint.c
+index 3d44595..fa3af4c 100644
+--- a/src/elflint.c
++++ b/src/elflint.c
+@@ -4331,6 +4331,7 @@ section [%2d] '%s': unknown core file note type %" PRIu32
+ 	  case NT_GNU_HWCAP:
+ 	  case NT_GNU_BUILD_ID:
+ 	  case NT_GNU_GOLD_VERSION:
++	  case NT_GNU_PROPERTY_TYPE_0:
+ 	    break;
+ 
+ 	  case 0:
+@@ -4376,7 +4377,8 @@ phdr[%d]: no note entries defined for the type of file\n"),
+   GElf_Off notes_size = 0;
+   Elf_Data *data = elf_getdata_rawchunk (ebl->elf,
+ 					 phdr->p_offset, phdr->p_filesz,
+-					 ELF_T_NHDR);
++					 (phdr->p_align == 8
++					  ? ELF_T_NHDR8 : ELF_T_NHDR));
+   if (data != NULL && data->d_buf != NULL)
+     notes_size = check_note_data (ebl, ehdr, data, 0, cnt, phdr->p_offset);
+ 
+diff --git a/src/readelf.c b/src/readelf.c
+index 72ae04e..ccd07eb 100644
+--- a/src/readelf.c
++++ b/src/readelf.c
+@@ -12300,7 +12300,8 @@ handle_notes (Ebl *ebl, GElf_Ehdr *ehdr)
+       handle_notes_data (ebl, ehdr, phdr->p_offset,
+ 			 elf_getdata_rawchunk (ebl->elf,
+ 					       phdr->p_offset, phdr->p_filesz,
+-					       ELF_T_NHDR));
++					       (phdr->p_align == 8
++						? ELF_T_NHDR8 : ELF_T_NHDR)));
+     }
+ }
+ 
diff --git a/SOURCES/elfutils-0.174-gnu-props-32.patch b/SOURCES/elfutils-0.174-gnu-props-32.patch
new file mode 100644
index 0000000..ff9305b
--- /dev/null
+++ b/SOURCES/elfutils-0.174-gnu-props-32.patch
@@ -0,0 +1,58 @@
+commit e8b9832af19e5975fb2a9dbe729eaba0373c781f
+Author: Mark Wielaard <mark@klomp.org>
+Date:   Mon Dec 3 00:03:39 2018 +0100
+
+    libebl: Fix reading GNU_PROPERTY_STACK_SIZE reading from 32bit notes.
+    
+    When reading a GNU_PROPERTY_STACK_SIZE we need to use the proper data
+    type. GElf_Addr is 64bit always and when reading a 32bit size part of
+    it would not be initialized. Use either Elf32_Addr or Elf64_Addr to
+    read and print the data.
+    
+    Add 32bit and 64bit, little and big endian testcases.
+    
+    Signed-off-by: Mark Wielaard <mark@klomp.org>
+
+diff --git a/libebl/eblobjnote.c b/libebl/eblobjnote.c
+index 58ac86d..c19ea37 100644
+--- a/libebl/eblobjnote.c
++++ b/libebl/eblobjnote.c
+@@ -360,15 +360,22 @@ ebl_object_note (Ebl *ebl, uint32_t namesz, const char *name, uint32_t type,
+ 		  if (prop.pr_type == GNU_PROPERTY_STACK_SIZE)
+ 		    {
+ 		      printf ("STACK_SIZE ");
+-		      if (prop.pr_datasz == 4 || prop.pr_datasz == 8)
++		      union
++			{
++			  Elf64_Addr a64;
++			  Elf32_Addr a32;
++			} addr;
++		      if ((elfclass == ELFCLASS32 && prop.pr_datasz == 4)
++			  || (elfclass == ELFCLASS64 && prop.pr_datasz == 8))
+ 			{
+-			  GElf_Addr addr;
+ 			  in.d_type = ELF_T_ADDR;
+ 			  out.d_type = ELF_T_ADDR;
+ 			  in.d_size = prop.pr_datasz;
+-			  out.d_size = sizeof (addr);
++			  out.d_size = prop.pr_datasz;
+ 			  in.d_buf = (void *) desc;
+-			  out.d_buf = (void *) &addr;
++			  out.d_buf = (elfclass == ELFCLASS32
++				       ? (void *) &addr.a32
++				       : (void *) &addr.a64);
+ 
+ 			  if (gelf_xlatetom (ebl->elf, &out, &in,
+ 					     elfident[EI_DATA]) == NULL)
+@@ -376,7 +383,10 @@ ebl_object_note (Ebl *ebl, uint32_t namesz, const char *name, uint32_t type,
+ 			      printf ("%s\n", elf_errmsg (-1));
+ 			      return;
+ 			    }
+-			  printf ("%#" PRIx64 "\n", addr);
++			  if (elfclass == ELFCLASS32)
++			    printf ("%#" PRIx32 "\n", addr.a32);
++			  else
++			    printf ("%#" PRIx64 "\n", addr.a64);
+ 			}
+ 		      else
+ 			printf (" (garbage datasz: %" PRIx32 ")\n",
diff --git a/SOURCES/elfutils-0.174-libdwfl-sanity-check-core-reads.patch b/SOURCES/elfutils-0.174-libdwfl-sanity-check-core-reads.patch
new file mode 100644
index 0000000..19dda87
--- /dev/null
+++ b/SOURCES/elfutils-0.174-libdwfl-sanity-check-core-reads.patch
@@ -0,0 +1,51 @@
+commit 20f9de9b5f704cec55df92406a50bcbcfca96acd
+Author: Mark Wielaard <mark@klomp.org>
+Date:   Sun Oct 14 16:45:48 2018 +0200
+
+    libdwfl: Sanity check partial core file data reads.
+    
+    There were two issues when reading note data from a core file.
+    We didn't check if the data we already had in a buffer was big
+    enough. And if we did get the data, we should check if we got
+    everything, or just a part of the data.
+    
+    https://sourceware.org/bugzilla/show_bug.cgi?id=23752
+    
+    Signed-off-by: Mark Wielaard <mark@klomp.org>
+
+diff --git a/libdwfl/dwfl_segment_report_module.c b/libdwfl/dwfl_segment_report_module.c
+index 36e5c82..8749884 100644
+--- a/libdwfl/dwfl_segment_report_module.c
++++ b/libdwfl/dwfl_segment_report_module.c
+@@ -1,5 +1,5 @@
+ /* Sniff out modules from ELF headers visible in memory segments.
+-   Copyright (C) 2008-2012, 2014, 2015 Red Hat, Inc.
++   Copyright (C) 2008-2012, 2014, 2015, 2018 Red Hat, Inc.
+    This file is part of elfutils.
+ 
+    This file is free software; you can redistribute it and/or modify
+@@ -301,7 +301,10 @@ dwfl_segment_report_module (Dwfl *dwfl, int ndx, const char *name,
+   inline bool read_portion (void **data, size_t *data_size,
+ 			    GElf_Addr vaddr, size_t filesz)
+   {
+-    if (vaddr - start + filesz > buffer_available
++    /* Check whether we will have to read the segment data, or if it
++       can be returned from the existing buffer.  */
++    if (filesz > buffer_available
++	|| vaddr - start > buffer_available - filesz
+ 	/* If we're in string mode, then don't consider the buffer we have
+ 	   sufficient unless it contains the terminator of the string.  */
+ 	|| (filesz == 0 && memchr (vaddr - start + buffer, '\0',
+@@ -459,6 +462,12 @@ dwfl_segment_report_module (Dwfl *dwfl, int ndx, const char *name,
+     if (read_portion (&data, &data_size, vaddr, filesz))
+       return;
+ 
++    /* data_size will be zero if we got everything from the initial
++       buffer, otherwise it will be the size of the new buffer that
++       could be read.  */
++    if (data_size != 0)
++      filesz = data_size;
++
+     assert (sizeof (Elf32_Nhdr) == sizeof (Elf64_Nhdr));
+ 
+     void *notes;
diff --git a/SOURCES/elfutils-0.174-size-rec-ar.patch b/SOURCES/elfutils-0.174-size-rec-ar.patch
new file mode 100644
index 0000000..091fa49
--- /dev/null
+++ b/SOURCES/elfutils-0.174-size-rec-ar.patch
@@ -0,0 +1,31 @@
+commit 22d2d082d57a7470fadc0eae67179553f4919209
+Author: Mark Wielaard <mark@klomp.org>
+Date:   Thu Oct 18 23:15:48 2018 +0200
+
+    size: Handle recursive ELF ar files.
+    
+    eu-size didn't handle an ELF ar file that contained an ar file itself
+    correctly. handle_ar would recursively call itself but close the ELF
+    file before returning. Only close the ELF file at the top-level.
+    
+    https://sourceware.org/bugzilla/show_bug.cgi?id=23787
+    
+    Signed-off-by: Mark Wielaard <mark@klomp.org>
+
+diff --git a/src/size.c b/src/size.c
+index 5ff3f2a..f01fd88 100644
+--- a/src/size.c
++++ b/src/size.c
+@@ -374,8 +374,10 @@ handle_ar (int fd, Elf *elf, const char *prefix, const char *fname)
+ 	INTERNAL_ERROR (fname);
+     }
+ 
+-  if (unlikely (elf_end (elf) != 0))
+-    INTERNAL_ERROR (fname);
++  /* Only close ELF handle if this was a "top level" ar file.  */
++  if (prefix == NULL)
++    if (unlikely (elf_end (elf) != 0))
++      INTERNAL_ERROR (fname);
+ 
+   return result;
+ }
diff --git a/SOURCES/elfutils-0.174-strip-unstrip-group.patch b/SOURCES/elfutils-0.174-strip-unstrip-group.patch
new file mode 100644
index 0000000..2fd9919
--- /dev/null
+++ b/SOURCES/elfutils-0.174-strip-unstrip-group.patch
@@ -0,0 +1,226 @@
+commit c06ab0bbb4761a69d2f188675d21d1a9131e9ecb
+Author: Mark Wielaard <mark@klomp.org>
+Date:   Sat Oct 13 10:27:47 2018 +0200
+
+    strip, unstrip: Handle SHT_GROUP correctly.
+    
+    The usage of annobin in Fedora showed a couple of bugs when using
+    eu-strip and eu-unstrip on ET_REL files that contain multiple group
+    sections.
+    
+    When stripping we should not remove the SHF_GROUP flag from sections
+    even if the group section itself might be removed. Either the section
+    itself gets removed, and so the flag doesn't matter. Or it gets moved
+    together with the group section into the debug file, and then it still
+    needs to have the flag set. Also we would "renumber" the section group
+    flag field (which isn't a section index, and so shouldn't be changed).
+    
+    Often the group sections have the exact same name (".group"), flags
+    (none) and sometimes the same sizes. Which makes matching them hard.
+    Extract the group signature and compare those when comparing two
+    group sections.
+    
+    Signed-off-by: Mark Wielaard <mark@klomp.org>
+
+diff --git a/src/strip.c b/src/strip.c
+index 1f7b3ca..fdebc5e 100644
+--- a/src/strip.c
++++ b/src/strip.c
+@@ -792,9 +792,13 @@ handle_elf (int fd, Elf *elf, const char *prefix, const char *fname,
+ 
+ 	  if (shdr_info[shdr_info[cnt].group_idx].idx == 0)
+ 	    {
+-	      /* The section group section will be removed.  */
++	      /* The section group section might be removed.
++		 Don't remove the SHF_GROUP flag.  The section is
++		 either also removed, in which case the flag doesn't matter.
++		 Or it moves with the group into the debug file, then
++		 it will be reconnected with the new group and should
++		 still have the flag set.  */
+ 	      shdr_info[cnt].group_idx = 0;
+-	      shdr_info[cnt].shdr.sh_flags &= ~SHF_GROUP;
+ 	    }
+ 	}
+ 
+@@ -1368,7 +1372,9 @@ handle_elf (int fd, Elf *elf, const char *prefix, const char *fname,
+ 			&& shdr_info[cnt].data->d_buf != NULL);
+ 
+ 	    Elf32_Word *grpref = (Elf32_Word *) shdr_info[cnt].data->d_buf;
+-	    for (size_t inner = 0;
++	    /* First word is the section group flag.
++	       Followed by section indexes, that need to be renumbered.  */
++	    for (size_t inner = 1;
+ 		 inner < shdr_info[cnt].data->d_size / sizeof (Elf32_Word);
+ 		 ++inner)
+ 	      if (grpref[inner] < shnum)
+diff --git a/src/unstrip.c b/src/unstrip.c
+index e6f0947..03a0346 100644
+--- a/src/unstrip.c
++++ b/src/unstrip.c
+@@ -696,6 +696,7 @@ struct section
+ {
+   Elf_Scn *scn;
+   const char *name;
++  const char *sig;
+   Elf_Scn *outscn;
+   Dwelf_Strent *strent;
+   GElf_Shdr shdr;
+@@ -720,7 +721,8 @@ compare_alloc_sections (const struct section *s1, const struct section *s2,
+ 
+ static int
+ compare_unalloc_sections (const GElf_Shdr *shdr1, const GElf_Shdr *shdr2,
+-			  const char *name1, const char *name2)
++			  const char *name1, const char *name2,
++			  const char *sig1, const char *sig2)
+ {
+   /* Sort by sh_flags as an arbitrary ordering.  */
+   if (shdr1->sh_flags < shdr2->sh_flags)
+@@ -734,6 +736,10 @@ compare_unalloc_sections (const GElf_Shdr *shdr1, const GElf_Shdr *shdr2,
+   if (shdr1->sh_size > shdr2->sh_size)
+     return 1;
+ 
++  /* Are they both SHT_GROUP sections? Then compare signatures.  */
++  if (sig1 != NULL && sig2 != NULL)
++    return strcmp (sig1, sig2);
++
+   /* Sort by name as last resort.  */
+   return strcmp (name1, name2);
+ }
+@@ -751,7 +757,8 @@ compare_sections (const void *a, const void *b, bool rel)
+   return ((s1->shdr.sh_flags & SHF_ALLOC)
+ 	  ? compare_alloc_sections (s1, s2, rel)
+ 	  : compare_unalloc_sections (&s1->shdr, &s2->shdr,
+-				      s1->name, s2->name));
++				      s1->name, s2->name,
++				      s1->sig, s2->sig));
+ }
+ 
+ static int
+@@ -986,6 +993,44 @@ get_section_name (size_t ndx, const GElf_Shdr *shdr, const Elf_Data *shstrtab)
+   return shstrtab->d_buf + shdr->sh_name;
+ }
+ 
++/* Returns the signature of a group section, or NULL if the given
++   section isn't a group.  */
++static const char *
++get_group_sig (Elf *elf, GElf_Shdr *shdr)
++{
++  if (shdr->sh_type != SHT_GROUP)
++    return NULL;
++
++  Elf_Scn *symscn = elf_getscn (elf, shdr->sh_link);
++  if (symscn == NULL)
++    error (EXIT_FAILURE, 0, _("bad sh_link for group section: %s"),
++	   elf_errmsg (-1));
++
++  GElf_Shdr symshdr_mem;
++  GElf_Shdr *symshdr = gelf_getshdr (symscn, &symshdr_mem);
++  if (symshdr == NULL)
++    error (EXIT_FAILURE, 0, _("couldn't get shdr for group section: %s"),
++	   elf_errmsg (-1));
++
++  Elf_Data *symdata = elf_getdata (symscn, NULL);
++  if (symdata == NULL)
++    error (EXIT_FAILURE, 0, _("bad data for group symbol section: %s"),
++	   elf_errmsg (-1));
++
++  GElf_Sym sym_mem;
++  GElf_Sym *sym = gelf_getsym (symdata, shdr->sh_info, &sym_mem);
++  if (sym == NULL)
++    error (EXIT_FAILURE, 0, _("couldn't get symbol for group section: %s"),
++	   elf_errmsg (-1));
++
++  const char *sig = elf_strptr (elf, symshdr->sh_link, sym->st_name);
++  if (sig == NULL)
++    error (EXIT_FAILURE, 0, _("bad symbol name for group section: %s"),
++	   elf_errmsg (-1));
++
++  return sig;
++}
++
+ /* Fix things up when prelink has moved some allocated sections around
+    and the debuginfo file's section headers no longer match up.
+    This fills in SECTIONS[0..NALLOC-1].outscn or exits.
+@@ -1111,6 +1156,7 @@ find_alloc_sections_prelink (Elf *debug, Elf_Data *debug_shstrtab,
+ 	      sec->scn = elf_getscn (main, i + 1); /* Really just for ndx.  */
+ 	      sec->outscn = NULL;
+ 	      sec->strent = NULL;
++	      sec->sig = get_group_sig (main, &sec->shdr);
+ 	      ++undo_nalloc;
+ 	    }
+ 	}
+@@ -1336,6 +1382,7 @@ more sections in stripped file than debug file -- arguments reversed?"));
+       sections[i].scn = scn;
+       sections[i].outscn = NULL;
+       sections[i].strent = NULL;
++      sections[i].sig = get_group_sig (stripped, shdr);
+     }
+ 
+   const struct section *stripped_symtab = NULL;
+@@ -1354,7 +1401,8 @@ more sections in stripped file than debug file -- arguments reversed?"));
+ 
+   /* Locate a matching unallocated section in SECTIONS.  */
+   inline struct section *find_unalloc_section (const GElf_Shdr *shdr,
+-					       const char *name)
++					       const char *name,
++					       const char *sig)
+     {
+       size_t l = nalloc, u = stripped_shnum - 1;
+       while (l < u)
+@@ -1362,7 +1410,8 @@ more sections in stripped file than debug file -- arguments reversed?"));
+ 	  size_t i = (l + u) / 2;
+ 	  struct section *sec = &sections[i];
+ 	  int cmp = compare_unalloc_sections (shdr, &sec->shdr,
+-					      name, sec->name);
++					      name, sec->name,
++					      sig, sec->sig);
+ 	  if (cmp < 0)
+ 	    u = i;
+ 	  else if (cmp > 0)
+@@ -1435,7 +1484,8 @@ more sections in stripped file than debug file -- arguments reversed?"));
+       else
+ 	{
+ 	  /* Look for the section that matches.  */
+-	  sec = find_unalloc_section (shdr, name);
++	  sec = find_unalloc_section (shdr, name,
++				      get_group_sig (unstripped, shdr));
+ 	  if (sec == NULL)
+ 	    {
+ 	      /* An additional unallocated section is fine if not SHT_NOBITS.
+
+commit eee4269e53154daaf0251371aacd91ec5db3eb30
+Author: Mark Wielaard <mark@klomp.org>
+Date:   Sat Oct 13 10:27:47 2018 +0200
+
+    unstrip: Renumber the group section indexes.
+    
+    When unstripping we might need to renumber the group section indexes.
+    Just like we do when stripping.
+    
+    Signed-off-by: Mark Wielaard <mark@klomp.org>
+
+diff --git a/src/unstrip.c b/src/unstrip.c
+index 03a0346..2cfd3b3 100644
+--- a/src/unstrip.c
++++ b/src/unstrip.c
+@@ -1708,6 +1708,20 @@ more sections in stripped file than debug file -- arguments reversed?"));
+ 	    if (shdr_mem.sh_type == SHT_DYNSYM)
+ 	      stripped_dynsym = sec;
+ 	  }
++
++	if (shdr_mem.sh_type == SHT_GROUP)
++	  {
++	    /* We must adjust all the section indices in the group.
++	       Skip the first word, which is the section group flag.
++	       Everything else is a section index.  */
++	    Elf32_Word *shndx = (Elf32_Word *) outdata->d_buf;
++	    for (size_t i = 1; i < shdr_mem.sh_size / sizeof (Elf32_Word); ++i)
++	      if (shndx[i]  == SHN_UNDEF || shndx[i] >= stripped_shnum)
++		error (EXIT_FAILURE, 0,
++		       _("group has invalid section index [%zd]"), i);
++	      else
++		shndx[i] = ndx_section[shndx[i] - 1];
++	  }
+       }
+ 
+   /* We may need to update the symbol table.  */
diff --git a/SOURCES/elfutils-0.174-version-note.patch b/SOURCES/elfutils-0.174-version-note.patch
new file mode 100644
index 0000000..fb33d83
--- /dev/null
+++ b/SOURCES/elfutils-0.174-version-note.patch
@@ -0,0 +1,156 @@
+commit 7a3f6fe60b8519b5372f5a5521ccbac59411f33f
+Author: Mark Wielaard <mark@klomp.org>
+Date:   Sun Nov 11 23:50:41 2018 +0100
+
+    Recognize NT_VERSION notes.
+    
+    NT_VERSION notes are emitted by the gas .version directive.
+    They have an empty description and (ab)use the owner name to store the
+    version data string.
+    
+    Signed-off-by: Mark Wielaard <mark@klomp.org>
+
+diff --git a/libebl/eblobjnote.c b/libebl/eblobjnote.c
+index 57e9f52..8fda7d9 100644
+--- a/libebl/eblobjnote.c
++++ b/libebl/eblobjnote.c
+@@ -135,6 +135,14 @@ ebl_object_note (Ebl *ebl, const char *name, uint32_t type,
+ 	  return;
+ 	}
+ 
++      /* NT_VERSION doesn't have any info.  All data is in the name.  */
++      if (descsz == 0 && type == NT_VERSION)
++	return;
++
++      /* Everything else should have the "GNU" owner name.  */
++      if (strcmp ("GNU", name) != 0)
++	return;
++
+       switch (type)
+ 	{
+ 	case NT_GNU_BUILD_ID:
+@@ -337,7 +345,7 @@ ebl_object_note (Ebl *ebl, const char *name, uint32_t type,
+ 	  break;
+ 
+ 	case NT_GNU_ABI_TAG:
+-	  if (strcmp (name, "GNU") == 0 && descsz >= 8 && descsz % 4 == 0)
++	  if (descsz >= 8 && descsz % 4 == 0)
+ 	    {
+ 	      Elf_Data in =
+ 		{
+diff --git a/libebl/eblobjnotetypename.c b/libebl/eblobjnotetypename.c
+index af23cae..8cdd781 100644
+--- a/libebl/eblobjnotetypename.c
++++ b/libebl/eblobjnotetypename.c
+@@ -39,6 +39,7 @@
+ 
+ const char *
+ ebl_object_note_type_name (Ebl *ebl, const char *name, uint32_t type,
++			   GElf_Word descsz,
+ 			   char *buf, size_t len)
+ {
+   const char *res = ebl->object_note_type_name (name, type, buf, len);
+@@ -80,14 +81,19 @@ ebl_object_note_type_name (Ebl *ebl, const char *name, uint32_t type,
+ 
+       if (strcmp (name, "GNU") != 0)
+ 	{
++	  /* NT_VERSION is special, all data is in the name.  */
++	  if (descsz == 0 && type == NT_VERSION)
++	    return "VERSION";
++
+ 	  snprintf (buf, len, "%s: %" PRIu32, gettext ("<unknown>"), type);
+ 	  return buf;
+ 	}
+ 
++      /* And finally all the "GNU" note types.  */
+       static const char *knowntypes[] =
+ 	{
+ #define KNOWNSTYPE(name) [NT_##name] = #name
+-	  KNOWNSTYPE (VERSION),
++	  KNOWNSTYPE (GNU_ABI_TAG),
+ 	  KNOWNSTYPE (GNU_HWCAP),
+ 	  KNOWNSTYPE (GNU_BUILD_ID),
+ 	  KNOWNSTYPE (GNU_GOLD_VERSION),
+diff --git a/libebl/libebl.h b/libebl/libebl.h
+index a34fe48..5830654 100644
+--- a/libebl/libebl.h
++++ b/libebl/libebl.h
+@@ -175,8 +175,8 @@ extern const char *ebl_core_note_type_name (Ebl *ebl, uint32_t type, char *buf,
+ 
+ /* Return name of the note section type for an object file.  */
+ extern const char *ebl_object_note_type_name (Ebl *ebl, const char *name,
+-					      uint32_t type, char *buf,
+-					      size_t len);
++					      uint32_t type, GElf_Word descsz,
++					      char *buf, size_t len);
+ 
+ /* Print information about object note if available.  */
+ extern void ebl_object_note (Ebl *ebl, const char *name, uint32_t type,
+diff --git a/src/elflint.c b/src/elflint.c
+index fa3af4c..dff74ee 100644
+--- a/src/elflint.c
++++ b/src/elflint.c
+@@ -1,5 +1,5 @@
+ /* Pedantic checking of ELF files compliance with gABI/psABI spec.
+-   Copyright (C) 2001-2015, 2017 Red Hat, Inc.
++   Copyright (C) 2001-2015, 2017, 2018 Red Hat, Inc.
+    This file is part of elfutils.
+    Written by Ulrich Drepper <drepper@redhat.com>, 2001.
+ 
+@@ -4332,7 +4332,17 @@ section [%2d] '%s': unknown core file note type %" PRIu32
+ 	  case NT_GNU_BUILD_ID:
+ 	  case NT_GNU_GOLD_VERSION:
+ 	  case NT_GNU_PROPERTY_TYPE_0:
+-	    break;
++	    if (nhdr.n_namesz == sizeof ELF_NOTE_GNU
++		&& strcmp (data->d_buf + name_offset, ELF_NOTE_GNU) == 0)
++	      break;
++	    else
++	      {
++		/* NT_VERSION is 1, same as NT_GNU_ABI_TAG.  It has no
++		   descriptor and (ab)uses the name as version string.  */
++		if (nhdr.n_descsz == 0 && nhdr.n_type == NT_VERSION)
++		  break;
++	      }
++	      goto unknown_note;
+ 
+ 	  case 0:
+ 	    /* Linux vDSOs use a type 0 note for the kernel version word.  */
+@@ -4341,16 +4351,21 @@ section [%2d] '%s': unknown core file note type %" PRIu32
+ 	      break;
+ 	    FALLTHROUGH;
+ 	  default:
++	    {
++	    unknown_note:
+ 	    if (shndx == 0)
+ 	      ERROR (gettext ("\
+-phdr[%d]: unknown object file note type %" PRIu32 " at offset %zu\n"),
+-		     phndx, (uint32_t) nhdr.n_type, offset);
++phdr[%d]: unknown object file note type %" PRIu32 " with owner name '%s' at offset %zu\n"),
++		     phndx, (uint32_t) nhdr.n_type,
++		     (char *) data->d_buf + name_offset, offset);
+ 	    else
+ 	      ERROR (gettext ("\
+ section [%2d] '%s': unknown object file note type %" PRIu32
+-			      " at offset %zu\n"),
++			      " with owner name '%s' at offset %zu\n"),
+ 		     shndx, section_name (ebl, shndx),
+-		     (uint32_t) nhdr.n_type, offset);
++		     (uint32_t) nhdr.n_type,
++		     (char *) data->d_buf + name_offset, offset);
++	    }
+ 	  }
+     }
+ 
+diff --git a/src/readelf.c b/src/readelf.c
+index c6c3fb3..659e34f 100644
+--- a/src/readelf.c
++++ b/src/readelf.c
+@@ -12201,6 +12201,7 @@ handle_notes_data (Ebl *ebl, const GElf_Ehdr *ehdr,
+ 	      ? ebl_core_note_type_name (ebl, nhdr.n_type,
+ 					 buf, sizeof (buf))
+ 	      : ebl_object_note_type_name (ebl, name, nhdr.n_type,
++					   nhdr.n_descsz,
+ 					   buf2, sizeof (buf2)));
+ 
+       /* Filter out invalid entries.  */
diff --git a/SOURCES/elfutils-0.174-x86_64_unwind.patch b/SOURCES/elfutils-0.174-x86_64_unwind.patch
new file mode 100644
index 0000000..b766517
--- /dev/null
+++ b/SOURCES/elfutils-0.174-x86_64_unwind.patch
@@ -0,0 +1,127 @@
+commit 825e48c4e942e3cbdab1b75c04b8c014867d66ab
+Author: Milian Wolff <milian.wolff@kdab.com>
+Date:   Mon Oct 29 16:21:26 2018 +0100
+
+    Also find CFI in sections of type SHT_X86_64_UNWIND
+    
+    On my system with g++ (GCC) 8.2.1 20180831 with GNU gold (GNU Binutils
+    2.31.1) 1.16, the .eh_frame section does not have type PROGBITS
+    but rather is using X86_64_UNWIND nowadays:
+    
+    ```
+    $ echo "int main(){ return 0; }" > test.c
+    $ gcc test.c
+    $ readelf --sections a.out | grep .eh_frame
+      [14] .eh_frame         X86_64_UNWIND    0000000000000670  00000670
+      [15] .eh_frame_hdr     X86_64_UNWIND    0000000000000724  00000724
+    ```
+    
+    Without this patch, libdw refuses to use the available unwind
+    information, leading to broken backtraces while unwinding. With the
+    patch applied, unwinding works once more in such situations.
+    
+    Signed-off-by: Milian Wolff <milian.wolff@kdab.com>
+    Signed-off-by: Mark Wielaard <mark@klomp.org>
+    Tested-by: Milian Wolff <milian.wolff@kdab.com>
+
+diff --git a/libdw/dwarf_getcfi_elf.c b/libdw/dwarf_getcfi_elf.c
+index 315cc02..adcaea0 100644
+--- a/libdw/dwarf_getcfi_elf.c
++++ b/libdw/dwarf_getcfi_elf.c
+@@ -298,7 +298,7 @@ getcfi_shdr (Elf *elf, const GElf_Ehdr *ehdr)
+ 	    }
+ 	  else if (!strcmp (name, ".eh_frame"))
+ 	    {
+-	      if (shdr->sh_type == SHT_PROGBITS)
++	      if (shdr->sh_type != SHT_NOBITS)
+ 		return getcfi_scn_eh_frame (elf, ehdr, scn, shdr,
+ 					    hdr_scn, hdr_vaddr);
+ 	      else
+
+commit 4b0342b85b5b1a3d3636e06e3b5320954828dfb1
+Author: Mark Wielaard <mark@klomp.org>
+Date:   Tue Nov 6 12:01:25 2018 +0100
+
+    backends: Add x86_64 section_type_name for SHT_X86_64_UNWIND.
+    
+    Makes sure that eu-readelf and eu-elflint recognize and show the
+    x86_64 specific section type correctly.
+    
+    Signed-off-by: Mark Wielaard <mark@klomp.org>
+    Tested-by: Milian Wolff <milian.wolff@kdab.com>
+
+diff --git a/backends/x86_64_init.c b/backends/x86_64_init.c
+index adfa479..49f6c6c 100644
+--- a/backends/x86_64_init.c
++++ b/backends/x86_64_init.c
+@@ -1,5 +1,5 @@
+ /* Initialization of x86-64 specific backend library.
+-   Copyright (C) 2002-2009, 2013 Red Hat, Inc.
++   Copyright (C) 2002-2009, 2013, 2018 Red Hat, Inc.
+    Copyright (C) H.J. Lu <hjl.tools@gmail.com>, 2015.
+    This file is part of elfutils.
+    Written by Ulrich Drepper <drepper@redhat.com>, 2002.
+@@ -55,6 +55,7 @@ x86_64_init (Elf *elf __attribute__ ((unused)),
+   eh->name = "AMD x86-64";
+   x86_64_init_reloc (eh);
+   HOOK (eh, reloc_simple_type);
++  HOOK (eh, section_type_name);
+   if (eh->class == ELFCLASS32)
+     eh->core_note = x32_core_note;
+   else
+diff --git a/backends/x86_64_symbol.c b/backends/x86_64_symbol.c
+index e07b180..98457bc 100644
+--- a/backends/x86_64_symbol.c
++++ b/backends/x86_64_symbol.c
+@@ -1,5 +1,5 @@
+ /* x86_64 specific symbolic name handling.
+-   Copyright (C) 2002, 2005 Red Hat, Inc.
++   Copyright (C) 2002, 2005, 2018 Red Hat, Inc.
+    This file is part of elfutils.
+    Written by Ulrich Drepper <drepper@redhat.com>, 2002.
+ 
+@@ -59,3 +59,15 @@ x86_64_reloc_simple_type (Ebl *ebl __attribute__ ((unused)), int type,
+       return ELF_T_NUM;
+     }
+ }
++
++/* Return symbolic representation of section type.  */
++const char *
++x86_64_section_type_name (int type,
++			  char *buf __attribute__ ((unused)),
++			  size_t len __attribute__ ((unused)))
++{
++  if (type == SHT_X86_64_UNWIND)
++    return "X86_64_UNWIND";
++
++  return NULL;
++}
+
+commit 22ec8efc1dd87cdc7892523457eb55990b967224
+Author: Mark Wielaard <mark@klomp.org>
+Date:   Sat Nov 10 23:33:03 2018 +0100
+
+    elflint: Allow PT_GNU_EH_FRAME segment to match SHT_X86_64_UNWIND section.
+    
+    The gold linker might generate an .eh_frame_hdr with a SHT_X86_64_UNWIND
+    type instead of a SHT_PROGBITS type.
+    
+    Signed-off-by: Mark Wielaard <mark@klomp.org>
+
+diff --git a/src/elflint.c b/src/elflint.c
+index 184ca12..810c8bd 100644
+--- a/src/elflint.c
++++ b/src/elflint.c
+@@ -4633,8 +4633,10 @@ program header offset in ELF header and PHDR entry do not match"));
+ 	      any = true;
+ 	      shdr = gelf_getshdr (scn, &shdr_mem);
+ 	      if (shdr != NULL
+-		  && shdr->sh_type == (is_debuginfo
+-				       ? SHT_NOBITS : SHT_PROGBITS)
++		  && ((is_debuginfo && shdr->sh_type == SHT_NOBITS)
++		      || (! is_debuginfo
++			  && (shdr->sh_type == SHT_PROGBITS
++			      || shdr->sh_type == SHT_X86_64_UNWIND)))
+ 		  && elf_strptr (ebl->elf, shstrndx, shdr->sh_name) != NULL
+ 		  && ! strcmp (".eh_frame_hdr",
+ 			       elf_strptr (ebl->elf, shstrndx, shdr->sh_name)))
diff --git a/SPECS/elfutils.spec b/SPECS/elfutils.spec
new file mode 100644
index 0000000..7ef9abb
--- /dev/null
+++ b/SPECS/elfutils.spec
@@ -0,0 +1,1374 @@
+Name: elfutils
+Summary: A collection of utilities and DSOs to handle ELF files and DWARF data
+Version: 0.174
+%global baserelease 6
+URL: http://elfutils.org/
+%global source_url ftp://sourceware.org/pub/elfutils/%{version}/
+License: GPLv3+ and (GPLv2+ or LGPLv3+)
+Group: Development/Tools
+
+Release: %{baserelease}%{?dist}
+
+%global provide_yama_scope	0
+
+%if 0%{?fedora} >= 22 || 0%{?rhel} >= 7
+%global provide_yama_scope	1
+%endif
+
+%global depsuffix %{?_isa}%{!?_isa:-%{_arch}}
+
+Source: %{?source_url}%{name}-%{version}.tar.bz2
+
+# Patches
+Patch1: elfutils-0.173-new-notes-hack.patch
+Patch2: elfutils-0.174-strip-unstrip-group.patch
+Patch3: elfutils-0.174-libdwfl-sanity-check-core-reads.patch
+Patch4: elfutils-0.174-size-rec-ar.patch
+Patch5: elfutils-0.174-ar-sh_entsize-zero.patch
+Patch6: elfutils-0.174-x86_64_unwind.patch
+Patch7: elfutils-0.174-gnu-property-note.patch
+Patch8: elfutils-0.174-version-note.patch
+Patch9: elfutils-0.174-gnu-attribute-note.patch
+Patch10: elfutils-0.174-gnu-props-32.patch
+
+Requires: elfutils-libelf%{depsuffix} = %{version}-%{release}
+Requires: elfutils-libs%{depsuffix} = %{version}-%{release}
+
+BuildRequires: gettext
+BuildRequires: bison >= 1.875
+BuildRequires: flex >= 2.5.4a
+BuildRequires: bzip2
+BuildRequires: gcc >= 4.4
+# For libstdc++ demangle support
+BuildRequires: gcc-c++
+
+BuildRequires: zlib-devel >= 1.2.2.3
+BuildRequires: bzip2-devel
+BuildRequires: xz-devel
+
+%global _gnu %{nil}
+%global _program_prefix eu-
+
+# The lib[64]/elfutils directory contains the private ebl backend
+# libraries. They must not be exposed as global provides. We don't
+# need to filter the requires since they are only loaded with dlopen.
+%if 0%{?fedora} >= 15 || 0%{?rhel} >= 7
+%global __provides_exclude ^libebl_.*\\.so.*$
+%endif
+
+%description
+Elfutils is a collection of utilities, including stack (to show
+backtraces), nm (for listing symbols from object files), size
+(for listing the section sizes of an object or archive file),
+strip (for discarding symbols), readelf (to see the raw ELF file
+structures), elflint (to check for well-formed ELF files) and
+elfcompress (to compress or decompress ELF sections).
+
+
+%package libs
+Summary: Libraries to handle compiled objects
+Group: Development/Tools
+License: GPLv2+ or LGPLv3+
+%if 0%{!?_isa:1}
+Provides: elfutils-libs%{depsuffix} = %{version}-%{release}
+%endif
+Requires: elfutils-libelf%{depsuffix} = %{version}-%{release}
+%if %{provide_yama_scope}
+Requires: default-yama-scope
+%endif
+
+%description libs
+The elfutils-libs package contains libraries which implement DWARF, ELF,
+and machine-specific ELF handling.  These libraries are used by the programs
+in the elfutils package.  The elfutils-devel package enables building
+other programs using these libraries.
+
+%package devel
+Summary: Development libraries to handle compiled objects
+Group: Development/Tools
+License: GPLv2+ or LGPLv3+
+%if 0%{!?_isa:1}
+Provides: elfutils-devel%{depsuffix} = %{version}-%{release}
+%endif
+Requires: elfutils-libs%{depsuffix} = %{version}-%{release}
+Requires: elfutils-libelf-devel%{depsuffix} = %{version}-%{release}
+
+%description devel
+The elfutils-devel package contains the libraries to create
+applications for handling compiled objects.  libebl provides some
+higher-level ELF access functionality.  libdw provides access to
+the DWARF debugging information.  libasm provides a programmable
+assembler interface.
+
+%package devel-static
+Summary: Static archives to handle compiled objects
+Group: Development/Tools
+License: GPLv2+ or LGPLv3+
+%if 0%{!?_isa:1}
+Provides: elfutils-devel-static%{depsuffix} = %{version}-%{release}
+%endif
+Requires: elfutils-devel%{depsuffix} = %{version}-%{release}
+Requires: elfutils-libelf-devel-static%{depsuffix} = %{version}-%{release}
+
+%description devel-static
+The elfutils-devel-static package contains the static archives
+with the code to handle compiled objects.
+
+%package libelf
+Summary: Library to read and write ELF files
+Group: Development/Tools
+License: GPLv2+ or LGPLv3+
+%if 0%{!?_isa:1}
+Provides: elfutils-libelf%{depsuffix} = %{version}-%{release}
+%endif
+Obsoletes: libelf <= 0.8.2-2
+
+%description libelf
+The elfutils-libelf package provides a DSO which allows reading and
+writing ELF files on a high level.  Third party programs depend on
+this package to read internals of ELF files.  The programs of the
+elfutils package use it also to generate new ELF files.
+
+%package libelf-devel
+Summary: Development support for libelf
+Group: Development/Tools
+License: GPLv2+ or LGPLv3+
+%if 0%{!?_isa:1}
+Provides: elfutils-libelf-devel%{depsuffix} = %{version}-%{release}
+%endif
+Requires: elfutils-libelf%{depsuffix} = %{version}-%{release}
+Obsoletes: libelf-devel <= 0.8.2-2
+
+%description libelf-devel
+The elfutils-libelf-devel package contains the libraries to create
+applications for handling compiled objects.  libelf allows you to
+access the internals of the ELF object file format, so you can see the
+different sections of an ELF file.
+
+%package libelf-devel-static
+Summary: Static archive of libelf
+Group: Development/Tools
+License: GPLv2+ or LGPLv3+
+%if 0%{!?_isa:1}
+Provides: elfutils-libelf-devel-static%{depsuffix} = %{version}-%{release}
+%endif
+Requires: elfutils-libelf-devel%{depsuffix} = %{version}-%{release}
+
+%description libelf-devel-static
+The elfutils-libelf-static package contains the static archive
+for libelf.
+
+%if %{provide_yama_scope}
+%package default-yama-scope
+Summary: Default yama attach scope sysctl setting
+Group: Development/Tools
+License: GPLv2+ or LGPLv3+
+Provides: default-yama-scope
+BuildArch: noarch
+# For the sysctl_apply macro we need systemd as build requires.
+# We also need systemd-sysctl in post to apply the default kernel config.
+# But this creates a circular requirement (see below). And it would always
+# pull in systemd even in build containers that don't really need it.
+# Luckily systemd is normally always installed already. The only times it
+# might not is when we do an initial install (and the cyclic dependency
+# chain might be broken) or when installing into a container. In the first
+# case we'll reboot soon to apply the default kernel config. In the second
+# case we really require that the host has the correct kernel config so it
+# also is available inside the container. So if we have weak dependencies
+# use Recommends (sadly Recommends(post) doesn't exist). This works because
+# in all cases that really matter systemd will already be installed. #1599083
+BuildRequires: systemd >= 215
+%if 0%{?fedora} > 24 || 0%{?rhel} > 7
+Recommends: systemd
+%else
+Requires(post): systemd
+%endif
+
+%description default-yama-scope
+Yama sysctl setting to enable default attach scope settings
+enabling programs to use ptrace attach, access to
+/proc/PID/{mem,personality,stack,syscall}, and the syscalls
+process_vm_readv and process_vm_writev which are used for
+interprocess services, communication and introspection
+(like synchronisation, signaling, debugging, tracing and
+profiling) of processes.
+%endif
+
+%prep
+%setup -q
+
+# Apply patches
+%patch1 -p1 -b .notes_hack
+%patch2 -p1 -b .strip_unstrip_group
+%patch3 -p1 -b .sanity_check_core_reads
+%patch4 -p1 -b .size_rec_ar
+%patch5 -p1 -b .ar_sh_entsize_zero
+%patch6 -p1 -b .x86_64_unwind
+%patch7 -p1 -b .gnu_prop_note
+%patch8 -p1 -b .version_note
+%patch9 -p1 -b .gnu_attr_note
+%patch10 -p1 -b .gnu_prop_32
+
+# In case the above patches added any new test scripts, make sure they
+# are executable.
+find . -name \*.sh ! -perm -0100 -print | xargs chmod +x
+
+%build
+# Remove -Wall from default flags.  The makefiles enable enough warnings
+# themselves, and they use -Werror.  Appending -Wall defeats the cases where
+# the makefiles disable some specific warnings for specific code.
+# But add -Wformat explicitly for use with -Werror=format-security which
+# doesn't work without -Wformat (enabled by -Wall).
+RPM_OPT_FLAGS="${RPM_OPT_FLAGS/-Wall/}"
+RPM_OPT_FLAGS="${RPM_OPT_FLAGS} -Wformat"
+
+trap 'cat config.log' EXIT
+%configure CFLAGS="$RPM_OPT_FLAGS -fexceptions"
+trap '' EXIT
+make -s %{?_smp_mflags}
+
+%install
+rm -rf ${RPM_BUILD_ROOT}
+make -s install DESTDIR=${RPM_BUILD_ROOT}
+
+chmod +x ${RPM_BUILD_ROOT}%{_prefix}/%{_lib}/lib*.so*
+chmod +x ${RPM_BUILD_ROOT}%{_prefix}/%{_lib}/elfutils/lib*.so*
+
+%find_lang %{name}
+
+%if %{provide_yama_scope}
+install -Dm0644 config/10-default-yama-scope.conf ${RPM_BUILD_ROOT}%{_sysctldir}/10-default-yama-scope.conf
+%endif
+
+%check
+# Record some build root versions in build.log
+uname -r; rpm -q glibc
+
+make -s %{?_smp_mflags} check || (cat tests/test-suite.log; false)
+
+# Only the latest Fedora and EPEL have these scriptlets,
+# older Fedora and plain RHEL don't.
+%if 0%{?ldconfig_scriptlets:1}
+%ldconfig_scriptlets libs
+%ldconfig_scriptlets libelf
+%else
+%post libs -p /sbin/ldconfig
+%postun libs -p /sbin/ldconfig
+%post libelf -p /sbin/ldconfig
+%postun libelf -p /sbin/ldconfig
+%endif
+
+%if %{provide_yama_scope}
+%post default-yama-scope
+# Due to circular dependencies might not be installed yet, so double check.
+# (systemd -> elfutils-libs -> default-yama-scope -> systemd)
+if [ -x /usr/lib/systemd/systemd-sysctl ] ; then
+%sysctl_apply 10-default-yama-scope.conf
+fi
+%endif
+
+%files
+%{!?_licensedir:%global license %%doc}
+%license COPYING COPYING-GPLV2 COPYING-LGPLV3
+%doc README TODO CONTRIBUTING
+%{_bindir}/eu-addr2line
+%{_bindir}/eu-ar
+%{_bindir}/eu-elfcmp
+%{_bindir}/eu-elflint
+%{_bindir}/eu-findtextrel
+%{_bindir}/eu-nm
+%{_bindir}/eu-objdump
+%{_bindir}/eu-ranlib
+%{_bindir}/eu-readelf
+%{_bindir}/eu-size
+%{_bindir}/eu-stack
+%{_bindir}/eu-strings
+%{_bindir}/eu-strip
+%{_bindir}/eu-unstrip
+%{_bindir}/eu-make-debug-archive
+%{_bindir}/eu-elfcompress
+
+%files libs
+%{!?_licensedir:%global license %%doc}
+%license COPYING-GPLV2 COPYING-LGPLV3
+%{_libdir}/libasm-%{version}.so
+%{_libdir}/libasm.so.*
+%{_libdir}/libdw-%{version}.so
+%{_libdir}/libdw.so.*
+%dir %{_libdir}/elfutils
+%{_libdir}/elfutils/lib*.so
+
+%files devel
+%{_includedir}/dwarf.h
+%dir %{_includedir}/elfutils
+%{_includedir}/elfutils/elf-knowledge.h
+%{_includedir}/elfutils/known-dwarf.h
+%{_includedir}/elfutils/libasm.h
+%{_includedir}/elfutils/libebl.h
+%{_includedir}/elfutils/libdw.h
+%{_includedir}/elfutils/libdwfl.h
+%{_includedir}/elfutils/libdwelf.h
+%{_includedir}/elfutils/version.h
+%{_libdir}/libebl.a
+%{_libdir}/libasm.so
+%{_libdir}/libdw.so
+%{_libdir}/pkgconfig/libdw.pc
+
+%files devel-static
+%{_libdir}/libasm.a
+%{_libdir}/libdw.a
+
+%files -f %{name}.lang libelf
+%{!?_licensedir:%global license %%doc}
+%license COPYING-GPLV2 COPYING-LGPLV3
+%{_libdir}/libelf-%{version}.so
+%{_libdir}/libelf.so.*
+
+%files libelf-devel
+%{_includedir}/libelf.h
+%{_includedir}/gelf.h
+%{_includedir}/nlist.h
+%{_libdir}/libelf.so
+%{_libdir}/pkgconfig/libelf.pc
+
+%files libelf-devel-static
+%{_libdir}/libelf.a
+
+%if %{provide_yama_scope}
+%files default-yama-scope
+%{_sysctldir}/10-default-yama-scope.conf
+%endif
+
+%changelog
+* Mon Dec  3 2018 Mark Wielaard <mjw@redhat.com> - 0.174-6
+- Add elfutils-0.174-gnu-props-32.patch.
+
+* Thu Nov 15 2018 Mark Wielaard <mjw@redhat.com> - 0.174-5
+- Add elfutils-0.174-x86_64_unwind.patch (#1650114).
+- Add elfutils-0.174-gnu-property-note.patch (#1650120).
+- Add elfutils-0.174-version-note.patch.
+- Add elfutils-0.174-gnu-attribute-note.patch (#1650125).
+
+* Tue Nov  6 2018 Mark Wielaard <mjw@redhat.com> - 0.174-4
+- Add elfutils-0.174-size-rec-ar.patch
+  CVE-2018-18520 (#1646479)
+- Add elfutils-0.174-ar-sh_entsize-zero.patch
+  CVE-2018-18521 (#1646484)
+
+* Fri Nov  2 2018 Mark Wielaard <mjw@redhat.com> - 0.174-3
+- Add elfutils-0.174-libdwfl-sanity-check-core-reads.patch
+  CVE-2018-18310 (#1642606)
+
+* Fri Oct 19 2018 Mark Wielaard <mjw@redhat.com> - 0.174-2
+- Add elfutils-0.174-strip-unstrip-group.patch (#1638248).
+
+* Tue Sep 18 2018 Mark Wielaard <mjw@redhat.com> - 0.174-1
+- New upstream release (#1614972)
+  - libelf, libdw and all tools now handle extended shnum and shstrndx
+    correctly
+  - elfcompress: Don't rewrite input file if no section data needs
+    updating.  Try harder to keep same file mode bits (suid) on rewrite.
+  - strip: Handle mixed (out of order) allocated/non-allocated sections.
+  - unstrip: Handle SHT_GROUP sections.
+  - backends: RISCV and M68K now have backend implementations to
+    generate CFI based backtraces.
+  - Fixes CVE-2018-16062, CVE-2018-16402 and CVE-2018-16403
+    (#1623754, #1625052, #1625057).
+
+* Mon Jul 30 2018 Florian Weimer <fweimer@redhat.com> - 0.173-8
+- Rebuild with fixed binutils
+
+* Sun Jul 29 2018 Mark Wielaard <mjw@fedoraproject.org> - 0.173-7
+- Add elfutils-0.173-strip-alloc-nonalloc.patch (#1609577)
+
+* Tue Jul 24 2018 Mark Wielaard <mjw@fedoraproject.org>
+- Drop libstdc++-devel BuildRequires. gcc-c++ will pull it in.
+
+* Tue Jul 24 2018 Mark Wielaard <mjw@fedoraproject.org> - 0.173-6
+- Update elfutils-0.173-annobingroup.patch.
+
+* Sat Jul 21 2018 Mark Wielaard <mjw@fedoraproject.org> - 0.173-5
+- Add BuildRequires gcc-c++ for demangle support.
+- Add elfutils-0.173-annobingroup.patch.
+
+* Sat Jul 21 2018 Mark Wielaard <mjw@fedoraproject.org> - 0.173-4
+- Add elfutils-0.173-elfcompress.patch (#1607044)
+
+* Thu Jul 12 2018 Fedora Release Engineering <releng@fedoraproject.org> - 0.173-3
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild
+
+* Mon Jul  9 2018 Mark Wielaard <mjw@fedoraproject.org> - 0.173-2
+- Update elfutils-0.173-new-notes-hack.patch for new annobin note.
+- Unbreak cyclic systemd dependency for buildroot container (#1599083)
+
+* Fri Jun 29 2018 Mark Wielaard <mjw@fedoraproject.org> - 0.173-1
+- New upstream release
+  - More fixes for crashes and hangs found by afl-fuzz. In particular
+    various functions now detect and break infinite loops caused by bad
+    DIE tree cycles.
+  - readelf: Will now lookup the size and signedness of constant value
+    types to display them correctly (and not just how they were encoded).
+  - libdw: New function dwarf_next_lines to read CU-less .debug_line data.
+    dwarf_begin_elf now accepts ELF files containing just .debug_line
+    or .debug_frame sections (which can be read without needing a DIE
+    tree from the .debug_info section).
+    Removed dwarf_getscn_info, which was never implemented.
+  - backends: Handle BPF simple relocations.
+    The RISCV backends now handles ABI specific CFI and knows about
+    RISCV register types and names.
+
+* Wed Jun 20 2018 Mark Wielaard <mjw@fedoraproject.org> - 0.172-2
+- Add elfutils-0.172-robustify.patch.
+
+* Mon Jun 11 2018 Mark Wielaard <mjw@fedoraproject.org> - 0.172-1
+- New upstream release.
+  - No functional changes compared to 0.171.
+  - Various bug fixes in libdw and eu-readelf dealing with bad DWARF5
+    data. Thanks to running the afl fuzzer on eu-readelf and various
+    testcases.
+  - eu-readelf -N is ~15% faster.
+
+* Fri Jun 01 2018 Mark Wielaard <mjw@fedoraproject.org> - 0.171-1
+- New upstream release.
+  - DWARF5 and split dwarf, including GNU DebugFission, support.
+  - readelf: Handle all new DWARF5 sections.
+    --debug-dump=info+ will show split unit DIEs when found.
+    --dwarf-skeleton can be used when inspecting a .dwo file.
+    Recognizes GNU locviews with --debug-dump=loc.
+  - libdw: New functions dwarf_die_addr_die, dwarf_get_units,
+    dwarf_getabbrevattr_data and dwarf_cu_info.
+    libdw will now try to resolve the alt file on first use
+    when not set yet with dwarf_set_alt.
+    dwarf_aggregate_size() now works with multi-dimensional arrays.
+  - libdwfl: Use process_vm_readv when available instead of ptrace.
+  - backends: Add a RISC-V backend.
+
+* Wed Apr 11 2018 Mark Wielaard <mjw@fedoraproject.org> - 0.170-11
+- Add explict libstdc++-devel BuildRequires for demangle support.
+- Add elfutils-0.170-unwind.patch. (#1555726)
+
+* Thu Mar 01 2018 Mark Wielaard <mjw@fedoraproject.org> - 0.170-10
+- Add elfutils-0.170-GNU_variable_value.patch
+- Add elfutils-0.170-locviews.patch
+
+* Fri Feb 16 2018 Mark Wielaard <mjw@fedoraproject.org> - 0.170-9
+- Add elfutils-0.170-core-pid.patch
+- Add elfutils-0.170-elf_sync.patch
+- Add elfutils-0.170-new-notes-hack.patch
+
+* Thu Feb 15 2018 Mark Wielaard <mjw@fedoraproject.org> - 0.170-8
+- Add elfutils-0.170-sys-ptrace.patch
+- Make sure spec can be build even when ldconfig_scriplets aren't defined.
+- Add elfutils-0.170-m68k-packed-not-aligned.patch
+
+* Fri Feb 09 2018 Igor Gnatenko <ignatenkobrain@fedoraproject.org> - 0.170-7
+- Escape macros in %%changelog
+
+* Wed Feb 07 2018 Fedora Release Engineering <releng@fedoraproject.org> - 0.170-6
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild
+
+* Sat Feb 03 2018 Igor Gnatenko <ignatenkobrain@fedoraproject.org> - 0.170-5
+- Switch to %%ldconfig_scriptlets
+
+* Wed Dec 20 2017 Mark Wielaard <mjw@fedoraproject.org> - 0.170-4
+- Add elfutils-0.170-dwarf_aggregate_size.patch.
+
+* Wed Nov  8 2017 Mark Wielaard <mjw@fedoraproject.org> - 0.170-3
+- Rely on (and check) systemd_requires for sysctl_apply default-yama-scope.
+
+* Thu Nov  2 2017 Mark Wielaard <mjw@redhat.com> - 0.170-2
+- Config files under /usr/lib/sysctl.d (_sysctldir) aren't %%config (#1506660)
+  Admin can place the real config file under /etc/sysctl.d as override.
+
+* Thu Aug  3 2017 Mark Wielaard <mjw@fedoraproject.org> - 0.170-1
+- New upstream release. Remove upstreamed patches.
+- provide_yama_scope for either fedora >= 22 and rhel >= 7.
+
+* Wed Aug 02 2017 Fedora Release Engineering <releng@fedoraproject.org> - 0.169-8
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Binutils_Mass_Rebuild
+
+* Wed Jul 26 2017 Fedora Release Engineering <releng@fedoraproject.org> - 0.169-7
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild
+
+* Fri Jul 21 2017 Mark Wielaard <mjw@fedoraproject.org> - 0.169-6
+- Add elfutils-0.169-strip-data-marker-symbols.patch.
+
+* Mon Jul 17 2017 Mark Wielaard <mjw@fedoraproject.org> - 0.169-5
+- Fix build on s390 (ptrace.h). Add elfutils-0.169-s390x-ptrace.patch.
+
+* Mon Jul 17 2017 Mark Wielaard <mjw@fedoraproject.org> - 0.169-4
+- Add elfutils-0.169-strip-keep-remove-section.patch (#1465997)
+
+* Wed Jun  7 2017 Mark Wielaard <mjw@fedoraproject.org> - 0.169-3
+- Add elfutils-0.169-dup-shstrtab.patch
+- Add elfutils-0.169-strip-empty.patch
+
+* Tue May 30 2017 Mark Wielaard <mjw@fedoraproject.org> - 0.169-2
+- Add ppc64 fallback unwinder.
+
+* Fri May  5 2017 Mark Wielaard <mjw@fedoraproject.org> - 0.169-1
+- New upstream release. Removed upstreamed patches.
+
+* Wed Feb 15 2017 Mark Wielaard <mark@klomp.org> - 0.168-5
+- Add patches for new gcc warnings and new binutils ppc64 attributes.
+  - elfutils-0.168-libasm-truncation.patch
+  - elfutils-0.168-ppc64-attrs.patch
+
+* Fri Feb 10 2017 Fedora Release Engineering <releng@fedoraproject.org> - 0.168-4
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_26_Mass_Rebuild
+
+* Mon Jan 16 2017 Mark Wielaard <mark@klomp.org> - 0.168-3
+- Never use old, deprecated, filter_provides_in, it really is too broken.
+
+* Fri Jan 13 2017 Mark Wielaard <mark@klomp.org> - 0.168-2
+- Filter out private libebl backends from provides.
+
+* Wed Dec 28 2016 Mark Wielaard <mark@klomp.org> - 0.168-1
+- New upstream release from new home https://sourceware.org/elfutils/
+- Resolves:
+  - #1396092 Please implement eu-readelf --symbols[=SECTION]
+  - #1388057 memory allocation failure in allocate_elf
+  - #1387584 memory allocation failure in __libelf_set_rawdata_wrlock
+
+* Fri Oct  7 2016 Mark Wielaard <mjw@redhat.com> - 0.167-2
+- Add elfutils-0.167-strip-alloc-symbol.patch (#1380961)
+
+* Fri Aug 26 2016 Mark Wielaard <mjw@redhat.com> - 0.167-1
+- Upgrade to elfutils-0.167
+  Drop upstream elfutils-0.166-elfcmp-comp-gcc6.patch
+  Fixes: #1365812, #1352232.
+
+* Thu Apr 14 2016 Mark Wielaard <mjw@redhat.com> - 0.166-2
+- Add elfutils-0.166-elfcmp-comp-gcc6.patch
+
+* Thu Mar 31 2016 Mark Wielaard <mjw@redhat.com> - 0.166-1
+- Upgrade to elfutils-0.166
+  Drop upstreamed patches:
+    - elfutils-0.165-nobitsalign-strip.patch.
+    - elfutils-0.165-reloc.patch.
+    - elfutils-0.165-elf-libelf.patch.
+
+* Thu Feb 04 2016 Mark Wielaard <mjw@redhat.com> - 0.165-5
+- Add elfutils-0.165-nobitsalign-strip.patch.
+
+* Wed Feb 03 2016 Fedora Release Engineering <releng@fedoraproject.org> - 0.165-4
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_24_Mass_Rebuild
+
+* Thu Jan 28 2016 Mark Wielaard <mjw@redhat.com> - 0.165-3
+- Add elfutils-0.165-reloc.patch.
+
+* Thu Jan 14 2016 Mark Wielaard <mjw@redhat.com> - 0.165-2
+- Add elfutils-0.165-elf-libelf.patch.
+
+* Mon Jan 11 2016 Mark Wielaard <mjw@redhat.com> - 0.165-1
+- Update to elfutils-0.165 (#1294079, #1236699, #807053)
+  - Add eu-elfcompress
+  - Add pkg-config files for libelf and libdw.
+
+* Fri Oct 16 2015 Mark Wielaard <mjw@redhat.com> - 0.164-1
+- Update to elfutils-0.164
+- Drop old compat stuff
+
+* Mon Sep 07 2015 Mark Wielaard <mjw@redhat.com> - 0.163-4
+- Add elfutils-0.163-readelf-n-undefined-shift.patch (#1259259)
+
+* Tue Aug 04 2015 Mark Wielaard <mjw@redhat.com> - 0.163-3
+- Add elfutils-0.163-default-yama-conf.patch (#1250079)
+  Provides: default-yama-scope
+
+* Mon Aug 03 2015 Mark Wielaard <mjw@redhat.com> - 0.163-2
+- Add elfutils-0.163-unstrip-shf_info_link.patch
+
+* Fri Jun 19 2015 Mark Wielaard <mjw@redhat.com> - 0.163-1
+- Update to 0.163
+  - Drop elfutils-0.162-ftruncate-allocate.patch
+
+* Tue Jun 16 2015 Mark Wielaard <mjw@redhat.com> - 0.162-2
+- Add elfutils-0.162-ftruncate-allocate.patch (#1232206)
+
+* Thu Jun 11 2015 Mark Wielaard <mjw@redhat.com> - 0.162-1
+- Update to 0.162 (#1170810, #1139815, #1129756, #1020842)
+- Include elfutils/known-dwarf.h
+- Drop BuildRequires glibc-headers (#1230468)
+- Removed integrated upstream patches:
+  - elfutils-0.161-aarch64relro.patch
+  - elfutils-0.161-copyreloc.patch
+  - elfutils-0.161-addralign.patch
+  - elfutils-0.161-ar-long-name.patch
+  - elfutils-0.161-formref-type.patch
+
+* Sat May 02 2015 Kalev Lember <kalevlember@gmail.com> - 0.161-8
+- Rebuilt for GCC 5 C++11 ABI change
+
+* Mon Mar 23 2015 Mark Wielaard <mjw@redhat.com> - 0.161-7
+- Add elfutils-0.161-aarch64relro.patch (#1201778)
+
+* Mon Mar 09 2015 Mark Wielaard <mjw@redhat.com> - 0.161-6
+- Add elfutils-0.161-copyreloc.patch.
+
+* Sat Feb 21 2015 Till Maas <opensource@till.name> - 0.161-5
+- Rebuilt for Fedora 23 Change
+  https://fedoraproject.org/wiki/Changes/Harden_all_packages_with_position-independent_code
+
+* Sat Feb 07 2015 Mark Wielaard <mjw@redhat.com> - 0.161-4
+- Add elfutils-0.161-addralign.patch (#1189928)
+
+* Thu Feb 05 2015 Mark Wielaard <mjw@redhat.com> - 0.161-3
+- Add elfutils-0.161-formref-type.patch
+
+* Tue Jan 13 2015 Mark Wielaard <mjw@redhat.com> - 0.161-2
+- Add elfutils-0.161-ar-long-name.patch (#1181525 CVE-2014-9447)
+
+* Fri Dec 19 2014 Mark Wielaard <mjw@redhat.com> - 0.161-1
+- Update to 0.161.
+
+* Wed Aug 27 2014 Mark Wielaard <mjw@redhat.com> - 0.160-1
+- Update to 0.160.
+  - Remove integrated upstream patches:
+    elfutils-aarch64-user_regs_struct.patch
+    elfutils-0.159-argp-attach.patch
+    elfutils-0.159-aarch64-bool-ret.patch
+    elfutils-0.159-elf-h.patch
+    elfutils-0.159-ppc64le-elfv2-abi.patch
+    elfutils-0.159-report_r_debug.patch
+    elfutils-0.159-ko_xz.patch
+
+* Sat Aug 16 2014 Mark Wielaard <mjw@redhat.com> - 0.159-10
+- Add elfutils-0.159-ko_xz.patch
+
+* Sat Aug 16 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.159-9
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild
+
+* Mon Jul 28 2014 Mark Wielaard <mjw@redhat.com> - 0.159-8
+- Add elfutils-0.159-report_r_debug.patch (#1112610)
+
+* Fri Jul 18 2014 Mark Wielaard <mjw@redhat.com> - 0.159-7
+- Add configure check to elfutils-aarch64-user_regs_struct.patch.
+
+* Sat Jul 12 2014 Tom Callaway <spot@fedoraproject.org> - 0.159-6
+- fix license handling
+
+* Fri Jul  4 2014 Mark Wielaard <mjw@redhat.com> - 0.159-5
+- Add elfutils-0.159-aarch64-bool-ret.patch
+- Add elfutils-0.159-elf-h.patch
+- Add elfutils-0.159-ppc64le-elfv2-abi.patch (#1110249)
+
+* Tue Jun 10 2014 Mark Wielaard <mjw@redhat.com> - 0.159-4
+- Add elfutils-0.159-argp-attach.patch (#1107654)
+
+* Mon Jun 09 2014 Kyle McMartin <kyle@fedoraproject.org> - 0.159-3
+- AArch64: handle new glibc-headers which provides proper GETREGSET structs.
+
+* Sat Jun 07 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.159-2.1
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
+
+* Mon May 19 2014 Mark Wielaard <mjw@redhat.com> - 0.159-1
+- Update to 0.159.
+  - Remove integrated upstream patches:
+    robustify.patch, mod-e_type.patch and CVE-2014-0172.patch.
+  - Remove special handling of now default compile and configure flags:
+    Don't remove -Werror=format-security, don't configure --enable-dwz.
+
+* Thu Apr 10 2014 Mark Wielaard <mjw@redhat.com> - 0.158-3
+- Add elfutils-0.158-CVE-2014-0172.patch (#1085729)
+
+* Tue Mar 11 2014 Mark Wielaard <mjw@redhat.com> - 0.158-2
+- Add elfutils-0.158-mod-e_type.patch.
+
+* Mon Jan  6 2014 Mark Wielaard <mjw@redhat.com> - 0.158-1
+- Update to 0.158. Remove all patches now upstream. Add eu-stack.
+
+* Thu Dec 19 2013 Mark Wielaard <mjw@redhat.com> - 0.157-4
+- Add elfutils-0.157-aarch64-got-special-symbol.patch.
+- Remove -Werror=format-security from RPM_OPT_FLAGS.
+
+* Fri Dec 13 2013 Petr Machata <pmachata@redhat.com> - 0.157-3
+- Add upstream support for aarch64
+
+* Wed Oct  9 2013 Mark Wielaard <mjw@redhat.com> 0.157-2
+- Show tests/test-suite.log in build.log when make check fails.
+
+* Mon Sep 30 2013 Mark Wielaard <mjw@redhat.com> 0.157-1
+- Update to 0.157.
+- Remove elfutils-0.156-abi_cfi-ppc-s390-arm.patch.
+- Remove elfutils-0.156-et_dyn-kernels.patch.
+
+* Fri Sep 06 2013 Mark Wielaard <mjw@redhat.com> 0.156-5
+- Add elfutils-0.156-abi_cfi-ppc-s390-arm.patch.
+  Sets up initial CFI return register, CFA location expression and
+  register rules for PPC, S390 and ARM (dwarf_cfi_addrframe support).
+
+* Mon Aug 26 2013 Mark Wielaard <mjw@redhat.com> 0.156-4
+- Add elfutils-0.156-et_dyn-kernels.patch.
+  Fixes an issue on ppc64 with systemtap kernel address placement.
+
+* Thu Aug  8 2013 Mark Wielaard <mjw@redhat.com> 0.156-3
+- Make check can now also be ran in parallel.
+
+* Thu Jul 25 2013 Jan Kratochvil <jan.kratochvil@redhat.com> 0.156-2
+- Update the %%configure command for compatibility with fc20 Koji.
+
+* Thu Jul 25 2013 Jan Kratochvil <jan.kratochvil@redhat.com> 0.156-1
+- Update to 0.156.
+  - #890447 - Add __bss_start and __TMC_END__ to elflint.
+  - #909481 - Only try opening files with installed compression libraries.
+  - #914908 - Add __bss_start__ to elflint.
+  - #853757 - Updated Polish translation.
+  - #985438 - Incorrect prototype of __libdwfl_find_elf_build_id.
+  - Drop upstreamed elfutils-0.155-binutils-pr-ld-13621.patch.
+  - Drop upstreamed elfutils-0.155-mem-align.patch.
+  - Drop upstreamed elfutils-0.155-sizeof-pointer-memaccess.patch.
+
+* Tue Jul 02 2013 Karsten Hopp <karsten@redhat.com> 0.155-6
+- bump release and rebuild to fix dependencies on PPC
+
+* Sun Feb 24 2013 Mark Wielaard <mjw@redhat.com> - 0.155-5
+- Add ARM variant to elfutils-0.155-binutils-pr-ld-13621.patch rhbz#914908.
+- rhel >= 5 has xz-devel
+
+* Fri Feb 22 2013 Mark Wielaard <mjw@redhat.com> - 0.155-4
+- Replace elfutils-0.155-binutils-pr-ld-13621.patch with upstream fix.
+
+* Thu Jan 24 2013 Mark Wielaard <mjw@redhat.com> - 0.155-3
+- Backport sizeof-pointer-memaccess upstream fixes.
+
+* Thu Jan 10 2013 Mark Wielaard <mjw@redhat.com> - 0.155-2
+- #891553 - unaligned memory access issues.
+
+* Mon Aug 27 2012 Mark Wielaard <mjw@redhat.com> - 0.155-1
+- Update to 0.155.
+  - #844270 - eu-nm invalid %%N$ use detected.
+  - #847454 - Ukrainian translation update.
+  - Removed local ar 64-bit symbol patch, dwz support patch and xlatetom fix.
+
+* Tue Aug 14 2012 Petr Machata <pmachata@redhat.com> - 0.154-4
+- Add support for archives with 64-bit symbol tables (#843019)
+
+* Wed Aug 01 2012 Mark Wielaard <mjw@redhat.com> 0.154-3
+- Add dwz support
+
+* Wed Jul 18 2012 Mark Wielaard <mjw@redhat.com> 0.154-2
+- Add upstream xlatetom fix (#835877)
+
+* Mon Jul 02 2012 Karsten Hopp <karsten@redhat.com> 0.154-1.1
+- disable unstrip-n check for now (835877)
+
+* Fri Jun 22 2012 Mark Wielaard <mjw@redhat.com> - 0.154-1
+- Update to 0.154
+  - elflint doesn't recognize SHF_INFO_LINK on relocation sections (#807823)
+  - Update license to GPLv3+ and (GPLv2+ or LGPLv3+)
+  - Remove elfutils-0.153-dwfl_segment_report_module.patch
+- Add elfutils-0.154-binutils-pr-ld-13621.patch
+
+* Mon Apr 02 2012 Mark Wielaard <mark@klomp.org> - 0.153-2
+- Fix for eu-unstrip emits garbage for librt.so.1 (#805447)
+
+* Thu Feb 23 2012 Mark Wielaard <mjw@redhat.com> - 0.153-1
+- Update to 0.153
+  - New --disable-werror for portability.
+  - Support for .zdebug sections (#679777)
+  - type_units and DW_AT_GNU_odr_signature support (#679815)
+  - low level support DW_OP_GNU_entry_value and DW_TAG_GNU_call_site (#688090)
+  - FTBFS on rawhide with gcc 4.7 (#783506)
+    - Remove gcc-4.7 patch
+
+* Fri Jan 20 2012 Mark Wielaard <mjw@redhat.com> - 0.152-3
+- Fixes for gcc-4.7 based on upstream commit 32899a (#783506).
+
+* Fri Jan 13 2012 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.152-2
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_17_Mass_Rebuild
+
+* Tue Feb 15 2011 Roland McGrath <roland@redhat.com> - 0.152-1
+- Update to 0.152
+  - Various build and warning nits fixed for newest GCC and Autoconf.
+  - libdwfl: Yet another prelink-related fix for another regression. (#674465)
+  - eu-elfcmp: New flag --ignore-build-id to ignore differing build ID bits.
+  - eu-elfcmp: New flag -l/--verbose to print all differences.
+
+* Tue Feb 08 2011 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.151-2
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild
+
+* Wed Jan 12 2011 Roland McGrath <roland@redhat.com> - 0.151-1
+- Update to 0.151
+  - libdwfl: Fix for more prelink cases with separate debug file.
+  - eu-strip: New flag --strip-sections to remove section headers entirely.
+
+* Thu Dec  2 2010 Roland McGrath <roland@redhat.com> - 0.150-2
+- libdwfl: Remove bogus assert. (#658268)
+
+* Tue Nov 23 2010 Roland McGrath <roland@redhat.com> - 0.150-1
+- Update to 0.150
+  - libdw: Fix for handling huge .debug_aranges section. (#638432)
+  - libdwfl: Fix for handling prelinked DSO with separate debug file. (#652857)
+  - findtextrel: Fix diagnostics to work with usual section ordering.
+
+* Wed Sep 29 2010 jkeating - 0.149-2
+- Rebuilt for gcc bug 634757
+
+* Mon Sep 13 2010 Roland McGrath <roland@redhat.com> - 0.149-1
+- Update to 0.149
+  - libdw: Decode new DW_OP_GNU_implicit_pointer operation;
+           new function dwarf_getlocation_implicit_pointer.
+  - libdwfl: New function dwfl_dwarf_line.
+  - eu-addr2line: New flag -F/--flags to print more DWARF line info details.
+  - eu-readelf: better .debug_loc processing (#627729)
+  - eu-strings: Fix non-mmap file reading. (#609468)
+  - eu-strip: -g recognizes .gdb_index as a debugging section. (#631997)
+
+* Mon Jun 28 2010 Roland McGrath <roland@redhat.com> - 0.148-1
+- Update to 0.148
+  - libdw: Accept DWARF 4 format: new functions dwarf_next_unit,
+           dwarf_offdie_types.
+           New functions dwarf_lineisa, dwarf_linediscriminator,
+           dwarf_lineop_index.
+  - libdwfl: Fixes in core-file handling, support cores from PIEs. (#588818)
+             When working from build IDs, don't open a named file
+             that mismatches.
+  - readelf: Handle DWARF 4 formats.
+
+* Mon May  3 2010 Roland McGrath <roland@redhat.com> - 0.147-1
+- Update to 0.147
+
+* Wed Apr 21 2010 Roland McGrath <roland@redhat.com> - 0.146-1
+- Update to 0.146
+  - libdwfl: New function dwfl_core_file_report.
+  - libelf: Fix handling of phdrs in truncated file. (#577310)
+  - libdwfl: Fix infinite loop handling clobbered link_map. (#576379)
+- Package translations.
+
+* Tue Feb 23 2010 Roland McGrath <roland@redhat.com> - 0.145-1
+- Update to 0.145
+  - Fix build with --disable-dependency-tracking. (#564646)
+  - Fix build with most recent glibc headers.
+  - libdw: Fix CFI decoding. (#563528)
+  - libdwfl: Fix address bias returned by CFI accessors. (#563528)
+             Fix core file module layout identification. (#559836)
+  - readelf: Fix CFI decoding.
+
+* Fri Jan 15 2010 Roland McGrath <roland@redhat.com> - 0.144-2
+- Fix sloppy #include's breaking build with F-13 glibc.
+
+* Thu Jan 14 2010 Roland McGrath <roland@redhat.com> - 0.144-1
+- Update to 0.144
+  - libdw: New function dwarf_aggregate_size for computing (constant) type
+           sizes, including array_type cases with nontrivial calculation.
+  - readelf: Don't give errors for missing info under -a.
+             Handle Linux "VMCOREINFO" notes under -n.
+- Resolves: RHBZ #527004, RHBZ #530704, RHBZ #550858
+
+* Mon Sep 21 2009 Roland McGrath <roland@redhat.com> - 0.143-1
+- Update to 0.143
+  - libdw: Various convenience functions for individual attributes now use
+           dwarf_attr_integrate to look up indirect inherited attributes.
+           Location expression handling now supports DW_OP_implicit_value.
+  - libdwfl: Support automatic decompression of files in XZ format,
+             and of Linux kernel images made with bzip2 or LZMA
+             (as well as gzip).
+
+* Tue Jul 28 2009 Roland McGrath <roland@redhat.com> - 0.142-1
+- Update to 0.142
+  - libelf: Bug fix in filling gaps between sections. (#512840)
+  - libelf: Add elf_getshdrnum alias for elf_getshnum and elf_getshdrstrndx
+            alias for elf_getshstrndx and deprecate original names.
+  - libebl, elflint: Add support for STB_GNU_UNIQUE. (#511436)
+  - readelf: Add -N option, speeds up DWARF printing
+             without address->name lookups. (#505347)
+  - libdw: Add support for decoding DWARF CFI into location description form.
+           Handle some new DWARF 3 expression operations previously omitted.
+           Basic handling of some new encodings slated for DWARF 4.
+
+* Thu Apr 23 2009 Roland McGrath <roland@redhat.com> - 0.141-1
+- Update to 0.141
+  - libebl: sparc backend fixes (#490585)
+            some more arm backend support
+  - libdwfl: fix dwfl_module_build_id for prelinked DSO case (#489439)
+             fixes in core file support (#494858)
+             dwfl_module_getsym interface improved for non-address symbols
+  - eu-strip: fix infinite loop on strange inputs with -f
+  - eu-addr2line: take -j/--section=NAME option for binutils compatibility
+                  (same effect as '(NAME)0x123' syntax already supported)
+- Resolves: RHBZ #495213, RHBZ #465872, RHBZ #470055, RHBZ #484623
+
+* Tue Feb 24 2009 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.140-2
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild
+
+* Sun Feb 15 2009 Roland McGrath <roland@redhat.com> - 0.140-1
+- Update to 0.140
+  - libelf: Fix regression in creation of section header. (#484946)
+
+* Fri Jan 23 2009 Roland McGrath <roland@redhat.com> - 0.139-1
+- Update to 0.139
+  - libcpu: Add Intel SSE4 disassembler support
+  - readelf: Implement call frame information and exception handling dumping.
+             Add -e option.  Enable it implicitly for -a.
+  - elflint: Check PT_GNU_EH_FRAME program header entry.
+  - libdwfl: Support automatic gzip/bzip2 decompression of ELF files. (#472136)
+
+* Thu Jan  1 2009 Roland McGrath <roland@redhat.com> - 0.138-2
+- Fix libelf regression.
+
+* Wed Dec 31 2008 Roland McGrath <roland@redhat.com> - 0.138-1
+- Update to 0.138
+  - Install <elfutils/version.h> header file for applications to use in
+    source version compatibility checks.
+  - libebl: backend fixes for i386 TLS relocs; backend support for NT_386_IOPERM
+  - libcpu: disassembler fixes (#469739)
+  - libdwfl: bug fixes (#465878)
+  - libelf: bug fixes
+  - eu-nm: bug fixes for handling corrupt input files (#476136)
+
+* Wed Oct  1 2008 Roland McGrath <roland@redhat.com> - 0.137-3
+- fix libdwfl regression (#462689)
+
+* Thu Aug 28 2008 Roland McGrath <roland@redhat.com> - 0.137-2
+- Update to 0.137
+  - libdwfl: bug fixes; new segment interfaces;
+             all the libdwfl-based tools now support --core=COREFILE option
+- Resolves: RHBZ #325021, RHBZ #447416
+
+* Mon Jul  7 2008 Tom "spot" Callaway <tcallawa@redhat.com> - 0.135-2
+- fix conditional comparison
+
+* Mon May 12 2008 Roland McGrath <roland@redhat.com> - 0.135-1
+- Update to 0.135
+  - libdwfl: bug fixes
+  - eu-strip: changed handling of ET_REL files wrt symbol tables and relocs
+
+* Wed Apr  9 2008 Roland McGrath <roland@redhat.com> - 0.134-1
+- Update to 0.134
+  - elflint: backend improvements for sparc, alpha (#204170)
+  - libdwfl, libelf: bug fixes (#439344, #438867, #438263, #438190)
+- Remove Conflicts: libelf-devel from elfutils-libelf-devel. (#435742)
+
+* Sun Mar  2 2008 Roland McGrath <roland@redhat.com> - 0.133-2
+- Update to 0.133
+  - readelf, elflint, libebl: SHT_GNU_ATTRIBUTE section handling (readelf -A)
+  - readelf: core note handling for NT_386_TLS, NT_PPC_SPE, Alpha NT_AUXV
+  - libdwfl: bug fixes and optimization in relocation handling
+  - elfcmp: bug fix for non-allocated section handling
+  - ld: implement newer features of binutils linker.
+- Install eu-objdump and libasm, now has limited disassembler support.
+
+* Mon Jan 21 2008 Roland McGrath <roland@redhat.com> - 0.132-3
+- Update to 0.132
+  - libelf: Use loff_t instead of off64_t in libelf.h header. (#377241)
+  - eu-readelf: Fix handling of ET_REL files in archives.
+  - libcpu: Implement x86 and x86-64 disassembler.
+  - libasm: Add interface for disassembler.
+  - all programs: add debugging of branch prediction.
+  - libelf: new function elf_scnshndx.
+
+* Sun Nov 11 2007 Roland McGrath <roland@redhat.com> - 0.131-1
+- Update to 0.131
+  - libdw: DW_FORM_ref_addr support; dwarf_formref entry point now deprecated;
+           bug fixes for oddly-formatted DWARF
+  - libdwfl: bug fixes in offline archive support, symbol table handling;
+             apply partial relocations for dwfl_module_address_section on ET_REL
+  - libebl: powerpc backend support for Altivec registers
+
+* Wed Oct 17 2007 Roland McGrath <roland@redhat.com> - 0.130-3
+- Fix ET_REL support.
+- Fix odd indentation in eu-readelf -x output.
+
+* Tue Oct 16 2007 Roland McGrath <roland@redhat.com> - 0.130-1
+- Update to 0.130
+  - eu-readelf -p option can take an argument like -x for one section
+  - eu-readelf --archive-index (or -c)
+  - eu-readelf -n improved output for core dumps
+  - eu-readelf: handle SHT_NOTE sections without requiring phdrs (#249467)
+  - eu-elflint: ditto
+  - eu-elflint: stricter checks on debug sections
+  - eu-unstrip: new options, --list (or -n), --relocate (or -R)
+  - libelf: new function elf_getdata_rawchunk, replaces gelf_rawchunk;
+            new functions gelf_getnote, gelf_getauxv, gelf_update_auxv
+  - libebl: backend improvements (#324031)
+  - libdwfl: build_id support, new functions for it
+  - libdwfl: dwfl_module_addrsym fixes (#268761, #268981)
+  - libdwfl offline archive support, new script eu-make-debug-archive
+
+* Mon Aug 20 2007 Roland McGrath <roland@redhat.com> - 0.129-2
+- Fix false-positive eu-elflint failure on ppc -mbss-plt binaries.
+
+* Tue Aug 14 2007 Roland McGrath <roland@redhat.com> - 0.129-1
+- Update to 0.129
+  - readelf: new options --hex-dump (or -x), --strings (or -p) (#250973)
+  - addr2line: new option --symbols (or -S)
+  - libdw: dwarf_getscopes fixes (#230235)
+  - libdwfl: dwfl_module_addrsym fixes (#249490)
+
+* Fri Jun  8 2007 Roland McGrath <roland@redhat.com> - 0.128-2
+- Update to 0.128
+  - new program: unstrip
+  - elfcmp: new option --hash-inexact
+- Replace Conflicts: with Provides/Requires using -arch
+
+* Wed Apr 18 2007 Roland McGrath <roland@redhat.com> - 0.127-1
+- Update to 0.127
+  - libdw: new function dwarf_getsrcdirs
+  - libdwfl: new functions dwfl_module_addrsym, dwfl_report_begin_add,
+             dwfl_module_address_section
+
+* Mon Feb  5 2007 Roland McGrath <roland@redhat.com> - 0.126-1
+- Update to 0.126
+  - New program eu-ar.
+  - libdw: fix missing dwarf_getelf (#227206)
+  - libdwfl: dwfl_module_addrname for st_size=0 symbols (#227167, #227231)
+
+* Wed Jan 10 2007 Roland McGrath <roland@redhat.com> - 0.125-3
+- Fix overeager warn_unused_result build failures.
+
+* Wed Jan 10 2007 Roland McGrath <roland@redhat.com> - 0.125-1
+- Update to 0.125
+  - elflint: Compare DT_GNU_HASH tests.
+  - move archives into -static RPMs
+  - libelf, elflint: better support for core file handling
+  - Really fix libdwfl sorting of modules with 64-bit addresses (#220817).
+- Resolves: RHBZ #220817, RHBZ #213792
+
+* Tue Oct 10 2006 Roland McGrath <roland@redhat.com> - 0.124-1
+- eu-strip -f: copy symtab into debuginfo file when relocs use it (#203000)
+- Update to 0.124
+  - libebl: fix ia64 reloc support (#206981)
+  - libebl: sparc backend support for return value location
+  - libebl, libdwfl: backend register name support extended with more info
+  - libelf, libdw: bug fixes for unaligned accesses on machines that care
+  - readelf, elflint: trivial bugs fixed
+
+* Mon Aug 14 2006 Roland McGrath <roland@redhat.com> 0.123-1
+- Update to 0.123
+  - libebl: Backend build fixes, thanks to Stepan Kasal.
+  - libebl: ia64 backend support for register names, return value location
+  - libdwfl: Handle truncated linux kernel module section names.
+  - libdwfl: Look for linux kernel vmlinux files with .debug suffix.
+  - elflint: Fix checks to permit --hash-style=gnu format.
+
+* Mon Jul 17 2006 Roland McGrath <roland@redhat.com> - 0.122-4
+- Fix warnings in elflint compilation.
+
+* Wed Jul 12 2006 Roland McGrath <roland@redhat.com> - 0.122-3
+- Update to 0.122
+  - Fix libdwfl sorting of modules with 64-bit addresses (#198225).
+  - libebl: add function to test for relative relocation
+  - elflint: fix and extend DT_RELCOUNT/DT_RELACOUNT checks
+  - elflint, readelf: add support for DT_GNU_HASH
+  - libelf: add elf_gnu_hash
+  - elflint, readelf: add support for 64-bit SysV-style hash tables
+  - libdwfl: new functions dwfl_module_getsymtab, dwfl_module_getsym.
+
+* Thu Jun 15 2006 Roland McGrath <roland@redhat.com> - 0.121-1
+- Update to 0.121
+  - libelf: bug fixes for rewriting existing files when using mmap (#187618).
+  - make all installed headers usable in C++ code (#193153).
+  - eu-readelf: better output format.
+  - eu-elflint: fix tests of dynamic section content.
+  - libdw, libdwfl: handle files without aranges info.
+
+* Thu May 25 2006 Jeremy Katz <katzj@redhat.com> - 0.120-3
+- rebuild to pick up -devel deps
+
+* Tue Apr  4 2006 Roland McGrath <roland@redhat.com> - 0.120-2
+- Update to 0.120
+  - License changed to GPL, with some exceptions for using
+    the libelf, libebl, libdw, and libdwfl library interfaces.
+    Red Hat elfutils is an included package of the Open Invention Network.
+  - dwarf.h updated for DWARF 3.0 final specification.
+  - libelf: Fix corruption in ELF_C_RDWR uses (#187618).
+  - libdwfl: New function dwfl_version; fixes for offline.
+
+* Fri Feb 10 2006 Jesse Keating <jkeating@redhat.com> - 0.119-1.2.1
+- bump again for double-long bug on ppc(64)
+
+* Tue Feb 07 2006 Jesse Keating <jkeating@redhat.com> - 0.119-1.2
+- rebuilt for new gcc4.1 snapshot and glibc changes
+
+* Fri Jan 13 2006 Roland McGrath <roland@redhat.com> - 0.119-1
+- update to 0.119
+
+* Fri Dec 09 2005 Jesse Keating <jkeating@redhat.com>
+- rebuilt
+
+* Sun Nov 27 2005 Roland McGrath <roland@redhat.com> - 0.118-1
+- update to 0.118
+  - elflint: more tests.
+  - libdwfl: New function dwfl_module_register_names.
+  - libebl: New backend hook for register names.
+- Make sure -fexceptions is always in CFLAGS.
+
+* Tue Nov 22 2005 Roland McGrath <roland@redhat.com> - 0.117-2
+- update to 0.117
+  - libdwfl: New function dwfl_module_return_value_location (#166118)
+  - libebl: Backend improvements for several CPUs
+
+* Mon Oct 31 2005 Roland McGrath <roland@redhat.com> - 0.116-1
+- update to 0.116
+  - libdw fixes, API changes and additions
+  - libdwfl fixes (#169672)
+  - eu-strip/libelf fix to preserve setuid/setgid permission bits (#167745)
+
+* Fri Sep  9 2005 Roland McGrath <roland@redhat.com> - 0.115-3
+- Update requires/conflicts for better biarch update behavior.
+
+* Mon Sep  5 2005 Roland McGrath <roland@redhat.com> - 0.115-2
+- update to 0.115
+  - New program eu-strings.
+  - libdw: New function dwarf_getscopes_die.
+  - libelf: speed-ups of non-mmap reading.
+  - Implement --enable-gcov option for configure.
+
+* Wed Aug 24 2005 Roland McGrath <roland@redhat.com> - 0.114-1
+- update to 0.114
+  - new program eu-ranlib
+  - libdw: new calls for inlines
+  - libdwfl: new calls for offline modules
+
+* Sat Aug 13 2005 Roland McGrath <roland@redhat.com> - 0.113-2
+- update to 0.113
+  - elflint: relax a bit.  Allow version definitions for defined symbols
+    against DSO versions also for symbols in nobits sections.
+    Allow .rodata section to have STRINGS and MERGE flag set.
+  - strip: add some more compatibility with binutils.
+  - libdwfl: bug fixes.
+- Separate libdw et al into elfutils-libs subpackage.
+
+* Sat Aug  6 2005 Roland McGrath <roland@redhat.com> - 0.112-1
+- update to 0.112
+  - elfcmp: some more relaxation.
+  - elflint: many more tests, especially regarding to symbol versioning.
+  - libelf: Add elfXX_offscn and gelf_offscn.
+  - libasm: asm_begin interface changes.
+  - libebl: Add three new interfaces to directly access machine, class,
+    and data encoding information.
+
+* Fri Jul 29 2005 Roland McGrath <roland@redhat.com> - 0.111-2
+- update portability patch
+
+* Thu Jul 28 2005 Roland McGrath <roland@redhat.com> - 0.111-1
+- update to 0.111
+  - libdwfl library now merged into libdw
+
+* Sun Jul 24 2005 Roland McGrath <roland@redhat.com> - 0.110-1
+- update to 0.110
+
+* Fri Jul 22 2005 Roland McGrath <roland@redhat.com> - 0.109-2
+- update to 0.109
+  - verify that libebl modules are from the same build
+  - new eu-elflint checks on copy relocations
+  - new program eu-elfcmp
+  - new experimental libdwfl library
+
+* Thu Jun  9 2005 Roland McGrath <roland@redhat.com> - 0.108-5
+- robustification of eu-strip and eu-readelf
+
+* Wed May 25 2005 Roland McGrath <roland@redhat.com> - 0.108-3
+- more robustification
+
+* Mon May 16 2005 Roland McGrath <roland@redhat.com> - 0.108-2
+- robustification
+
+* Mon May  9 2005 Roland McGrath <roland@redhat.com> - 0.108-1
+- update to 0.108
+  - merge strip fixes
+  - sort records in dwarf_getsrclines, fix dwarf_getsrc_die searching
+  - update elf.h from glibc
+
+* Sun May  8 2005 Roland McGrath <roland@redhat.com> - 0.107-2
+- fix strip -f byte-swapping bug
+
+* Sun May  8 2005 Roland McGrath <roland@redhat.com> - 0.107-1
+- update to 0.107
+  - readelf: improve DWARF output format
+  - elflint: -d option to support checking separate debuginfo files
+  - strip: fix ET_REL debuginfo files (#156341)
+
+* Mon Apr  4 2005 Roland McGrath <roland@redhat.com> - 0.106-3
+- fix some bugs in new code, reenable make check
+
+* Mon Apr  4 2005 Roland McGrath <roland@redhat.com> - 0.106-2
+- disable make check for most arches, for now
+
+* Mon Apr  4 2005 Roland McGrath <roland@redhat.com> - 0.106-1
+- update to 0.106
+
+* Mon Mar 28 2005 Roland McGrath <roland@redhat.com> - 0.104-2
+- update to 0.104
+
+* Wed Mar 23 2005 Jakub Jelinek <jakub@redhat.com> 0.103-2
+- update to 0.103
+
+* Wed Feb 16 2005 Jakub Jelinek <jakub@redhat.com> 0.101-2
+- update to 0.101.
+- use %%configure macro to get CFLAGS etc. right
+
+* Sat Feb  5 2005 Jeff Johnson <jbj@redhat.com> 0.99-2
+- upgrade to 0.99.
+
+* Sun Sep 26 2004 Jeff Johnson <jbj@redhat.com> 0.97-3
+- upgrade to 0.97.
+
+* Tue Aug 17 2004 Jakub Jelinek <jakub@redhat.com> 0.95-5
+- upgrade to 0.96.
+
+* Mon Jul  5 2004 Jakub Jelinek <jakub@redhat.com> 0.95-4
+- rebuilt with GCC 3.4.x, workaround VLA + alloca mixing
+  warning
+
+* Tue Jun 15 2004 Elliot Lee <sopwith@redhat.com>
+- rebuilt
+
+* Fri Apr  2 2004 Jeff Johnson <jbj@redhat.com> 0.95-2
+- upgrade to 0.95.
+
+* Tue Mar 02 2004 Elliot Lee <sopwith@redhat.com>
+- rebuilt
+
+* Fri Feb 13 2004 Elliot Lee <sopwith@redhat.com>
+- rebuilt
+
+* Fri Jan 16 2004 Jakub Jelinek <jakub@redhat.com> 0.94-1
+- upgrade to 0.94
+
+* Fri Jan 16 2004 Jakub Jelinek <jakub@redhat.com> 0.93-1
+- upgrade to 0.93
+
+* Thu Jan  8 2004 Jakub Jelinek <jakub@redhat.com> 0.92-1
+- full version
+- macroized spec file for GPL or OSL builds
+- include only libelf under GPL plus wrapper scripts
+
+* Wed Jan  7 2004 Jakub Jelinek <jakub@redhat.com> 0.91-2
+- macroized spec file for GPL or OSL builds
+
+* Wed Jan  7 2004 Ulrich Drepper <drepper@redhat.com>
+- split elfutils-devel into two packages.
+
+* Wed Jan  7 2004 Jakub Jelinek <jakub@redhat.com> 0.91-1
+- include only libelf under GPL plus wrapper scripts
+
+* Tue Dec 23 2003 Jeff Johnson <jbj@redhat.com> 0.89-3
+- readelf, not readline, in %%description (#111214).
+
+* Fri Sep 26 2003 Bill Nottingham <notting@redhat.com> 0.89-1
+- update to 0.89 (fix eu-strip)
+
+* Tue Sep 23 2003 Jakub Jelinek <jakub@redhat.com> 0.86-3
+- update to 0.86 (fix eu-strip on s390x/alpha)
+- libebl is an archive now; remove references to DSO
+
+* Mon Jul 14 2003 Jeff Johnson <jbj@redhat.com> 0.84-3
+- upgrade to 0.84 (readelf/elflint improvements, rawhide bugs fixed).
+
+* Fri Jul 11 2003 Jeff Johnson <jbj@redhat.com> 0.83-3
+- upgrade to 0.83 (fix invalid ELf handle on *.so strip, more).
+
+* Wed Jul  9 2003 Jeff Johnson <jbj@redhat.com> 0.82-3
+- upgrade to 0.82 (strip tests fixed on big-endian).
+
+* Tue Jul  8 2003 Jeff Johnson <jbj@redhat.com> 0.81-3
+- upgrade to 0.81 (strip excludes unused symtable entries, test borked).
+
+* Thu Jun 26 2003 Jeff Johnson <jbj@redhat.com> 0.80-3
+- upgrade to 0.80 (debugedit changes for kernel in progress).
+
+* Wed Jun 04 2003 Elliot Lee <sopwith@redhat.com>
+- rebuilt
+
+* Wed May 21 2003 Jeff Johnson <jbj@redhat.com> 0.79-2
+- upgrade to 0.79 (correct formats for size_t, more of libdw "works").
+
+* Mon May 19 2003 Jeff Johnson <jbj@redhat.com> 0.78-2
+- upgrade to 0.78 (libdwarf bugfix, libdw additions).
+
+* Mon Feb 24 2003 Elliot Lee <sopwith@redhat.com>
+- debuginfo rebuild
+
+* Thu Feb 20 2003 Jeff Johnson <jbj@redhat.com> 0.76-2
+- use the correct way of identifying the section via the sh_info link.
+
+* Sat Feb 15 2003 Jakub Jelinek <jakub@redhat.com> 0.75-2
+- update to 0.75 (eu-strip -g fix)
+
+* Tue Feb 11 2003 Jakub Jelinek <jakub@redhat.com> 0.74-2
+- update to 0.74 (fix for writing with some non-dirty sections)
+
+* Thu Feb  6 2003 Jeff Johnson <jbj@redhat.com> 0.73-3
+- another -0.73 update (with sparc fixes).
+- do "make check" in %%check, not %%install, section.
+
+* Mon Jan 27 2003 Jeff Johnson <jbj@redhat.com> 0.73-2
+- update to 0.73 (with s390 fixes).
+
+* Wed Jan 22 2003 Tim Powers <timp@redhat.com>
+- rebuilt
+
+* Wed Jan 22 2003 Jakub Jelinek <jakub@redhat.com> 0.72-4
+- fix arguments to gelf_getsymshndx and elf_getshstrndx
+- fix other warnings
+- reenable checks on s390x
+
+* Sat Jan 11 2003 Karsten Hopp <karsten@redhat.de> 0.72-3
+- temporarily disable checks on s390x, until someone has
+  time to look at it
+
+* Thu Dec 12 2002 Jakub Jelinek <jakub@redhat.com> 0.72-2
+- update to 0.72
+
+* Wed Dec 11 2002 Jakub Jelinek <jakub@redhat.com> 0.71-2
+- update to 0.71
+
+* Wed Dec 11 2002 Jeff Johnson <jbj@redhat.com> 0.69-4
+- update to 0.69.
+- add "make check" and segfault avoidance patch.
+- elfutils-libelf needs to run ldconfig.
+
+* Tue Dec 10 2002 Jeff Johnson <jbj@redhat.com> 0.68-2
+- update to 0.68.
+
+* Fri Dec  6 2002 Jeff Johnson <jbj@redhat.com> 0.67-2
+- update to 0.67.
+
+* Tue Dec  3 2002 Jeff Johnson <jbj@redhat.com> 0.65-2
+- update to 0.65.
+
+* Mon Dec  2 2002 Jeff Johnson <jbj@redhat.com> 0.64-2
+- update to 0.64.
+
+* Sun Dec 1 2002 Ulrich Drepper <drepper@redhat.com> 0.64
+- split packages further into elfutils-libelf
+
+* Sat Nov 30 2002 Jeff Johnson <jbj@redhat.com> 0.63-2
+- update to 0.63.
+
+* Fri Nov 29 2002 Ulrich Drepper <drepper@redhat.com> 0.62
+- Adjust for dropping libtool
+
+* Sun Nov 24 2002 Jeff Johnson <jbj@redhat.com> 0.59-2
+- update to 0.59
+
+* Thu Nov 14 2002 Jeff Johnson <jbj@redhat.com> 0.56-2
+- update to 0.56
+
+* Thu Nov  7 2002 Jeff Johnson <jbj@redhat.com> 0.54-2
+- update to 0.54
+
+* Sun Oct 27 2002 Jeff Johnson <jbj@redhat.com> 0.53-2
+- update to 0.53
+- drop x86_64 hack, ICE fixed in gcc-3.2-11.
+
+* Sat Oct 26 2002 Jeff Johnson <jbj@redhat.com> 0.52-3
+- get beehive to punch a rhpkg generated package.
+
+* Wed Oct 23 2002 Jeff Johnson <jbj@redhat.com> 0.52-2
+- build in 8.0.1.
+- x86_64: avoid gcc-3.2 ICE on x86_64 for now.
+
+* Tue Oct 22 2002 Ulrich Drepper <drepper@redhat.com> 0.52
+- Add libelf-devel to conflicts for elfutils-devel
+
+* Mon Oct 21 2002 Ulrich Drepper <drepper@redhat.com> 0.50
+- Split into runtime and devel package
+
+* Fri Oct 18 2002 Ulrich Drepper <drepper@redhat.com> 0.49
+- integrate into official sources
+
+* Wed Oct 16 2002 Jeff Johnson <jbj@redhat.com> 0.46-1
+- Swaddle.