diff --git a/dka64/patches/binutils-2.41.patch b/dka64/patches/binutils-2.41.patch deleted file mode 100644 index be00dd2..0000000 --- a/dka64/patches/binutils-2.41.patch +++ /dev/null @@ -1,507 +0,0 @@ -diff --git a/bfd/elf-bfd.h b/bfd/elf-bfd.h -index ec856764519..436098cbcc2 100644 ---- a/bfd/elf-bfd.h -+++ b/bfd/elf-bfd.h -@@ -1966,6 +1966,14 @@ struct output_elf_obj_tdata - asection *sec; - } package_metadata; - -+ /* Data for .nx-module-name. */ -+ struct -+ { -+ bool (*after_write_object_contents) (bfd *); -+ const char *name; -+ asection *sec; -+ } nx_module_name; -+ - /* Records the result of `get_program_header_size'. */ - bfd_size_type program_header_size; - -diff --git a/bfd/elf.c b/bfd/elf.c -index d38e0afff2e..372e6615931 100644 ---- a/bfd/elf.c -+++ b/bfd/elf.c -@@ -7321,6 +7321,14 @@ _bfd_elf_write_object_contents (bfd *abfd) - if (!bed->s->write_shdrs_and_ehdr (abfd)) - return false; - -+ /* Write out the NX module name. */ -+ if (t->o->nx_module_name.after_write_object_contents != NULL) -+ { -+ failed = !(*t->o->nx_module_name.after_write_object_contents) (abfd); -+ if (failed) -+ return false; -+ } -+ - /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */ - if (t->o->build_id.after_write_object_contents != NULL - && !(*t->o->build_id.after_write_object_contents) (abfd)) -diff --git a/bfd/elfnn-aarch64.c b/bfd/elfnn-aarch64.c -index 4592bd6da27..dc27042cfe2 100644 ---- a/bfd/elfnn-aarch64.c -+++ b/bfd/elfnn-aarch64.c -@@ -2441,6 +2441,12 @@ enum elf_aarch64_stub_type - aarch64_stub_erratum_843419_veneer, - }; - -+/* Is an undefined weak symbol resolved to 0 ? */ -+#define UNDEFINED_WEAK_RESOLVED_TO_ZERO(INFO, EH) \ -+ ((EH)->root.root.type == bfd_link_hash_undefweak \ -+ && bfd_link_executable (INFO) \ -+ && !(INFO)->dynamic_undefined_weak) -+ - struct elf_aarch64_stub_hash_entry - { - /* Base hash table entry structure. */ -@@ -6916,11 +6922,13 @@ elfNN_aarch64_relocate_section (bfd *output_bfd, - Elf_Internal_Sym *sym; - asection *sec; - struct elf_link_hash_entry *h; -+ struct elf_aarch64_link_hash_entry *eh; - bfd_vma relocation; - bfd_reloc_status_type r; - arelent bfd_reloc; - char sym_type; - bool unresolved_reloc = false; -+ bool resolved_to_zero = false; - char *error_message = NULL; - - r_symndx = ELFNN_R_SYM (rel->r_info); -@@ -7060,6 +7068,10 @@ elfNN_aarch64_relocate_section (bfd *output_bfd, - h, &unresolved_reloc, - save_addend, &addend, sym); - -+ eh = (struct elf_aarch64_link_hash_entry *) h; -+ resolved_to_zero = (eh != NULL -+ && UNDEFINED_WEAK_RESOLVED_TO_ZERO (info, eh)); -+ - switch (elfNN_aarch64_bfd_reloc_from_type (input_bfd, r_type)) - { - case BFD_RELOC_AARCH64_TLSGD_ADD_LO12_NC: -@@ -7083,7 +7095,7 @@ elfNN_aarch64_relocate_section (bfd *output_bfd, - need_relocs = - (!bfd_link_executable (info) || indx != 0) && - (h == NULL -- || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT -+ || (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT && !resolved_to_zero) - || h->root.type != bfd_link_hash_undefweak); - - BFD_ASSERT (globals->root.srelgot != NULL); -@@ -7178,7 +7190,7 @@ elfNN_aarch64_relocate_section (bfd *output_bfd, - need_relocs = - (!bfd_link_executable (info) || indx != 0) && - (h == NULL -- || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT -+ || (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT && !resolved_to_zero) - || h->root.type != bfd_link_hash_undefweak); - - BFD_ASSERT (globals->root.srelgot != NULL); -@@ -7227,7 +7239,7 @@ elfNN_aarch64_relocate_section (bfd *output_bfd, - bfd_vma off = symbol_tlsdesc_got_offset (input_bfd, h, r_symndx); - - need_relocs = (h == NULL -- || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT -+ || (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT && !resolved_to_zero) - || h->root.type != bfd_link_hash_undefweak); - - BFD_ASSERT (globals->root.srelgot != NULL); -@@ -7553,6 +7565,23 @@ need_copy_relocation_p (struct elf_aarch64_link_hash_entry *eh) - return false; - } - -+/* Remove undefined weak symbol from the dynamic symbol table if it -+ is resolved to 0. */ -+ -+static bool -+elfNN_aarch64_elf_fixup_symbol (struct bfd_link_info *info, -+ struct elf_link_hash_entry *h) -+{ -+ if (h->dynindx != -1 -+ && UNDEFINED_WEAK_RESOLVED_TO_ZERO (info, elf_aarch64_hash_entry (h))) -+ { -+ h->dynindx = -1; -+ _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr, -+ h->dynstr_index); -+ } -+ return true; -+} -+ - /* Adjust a symbol defined by a dynamic object and referenced by a - regular object. The current definition is in some section of the - dynamic object, but we're not including those sections. We have to -@@ -8771,6 +8800,7 @@ elfNN_aarch64_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf) - struct elf_aarch64_link_hash_table *htab; - struct elf_aarch64_link_hash_entry *eh; - struct elf_dyn_relocs *p; -+ bool resolved_to_zero; - - /* An example of a bfd_link_hash_indirect symbol is versioned - symbol. For example: __gxx_personality_v0(bfd_link_hash_indirect) -@@ -8790,6 +8820,10 @@ elfNN_aarch64_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf) - info = (struct bfd_link_info *) inf; - htab = elf_aarch64_hash_table (info); - -+ eh = (struct elf_aarch64_link_hash_entry *) h; -+ eh->tlsdesc_got_jump_table_offset = (bfd_vma) - 1; -+ resolved_to_zero = UNDEFINED_WEAK_RESOLVED_TO_ZERO (info, eh); -+ - /* Since STT_GNU_IFUNC symbol must go through PLT, we handle it - here if it is defined and referenced in a non-shared object. */ - if (h->type == STT_GNU_IFUNC -@@ -8799,7 +8833,7 @@ elfNN_aarch64_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf) - { - /* Make sure this symbol is output as a dynamic symbol. - Undefined weak syms won't yet be marked as dynamic. */ -- if (h->dynindx == -1 && !h->forced_local -+ if (h->dynindx == -1 && !h->forced_local && !resolved_to_zero - && h->root.type == bfd_link_hash_undefweak) - { - if (!bfd_elf_link_record_dynamic_symbol (info, h)) -@@ -8833,6 +8867,11 @@ elfNN_aarch64_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf) - of relaxing into these from the large model PLT entries. */ - s->size += htab->plt_entry_size; - -+ /* There should be no PLT relocations against resolved undefined -+ weak symbols in the executable. */ -+ if (!resolved_to_zero) -+ { -+ - /* We also need to make an entry in the .got.plt section, which - will be placed in the .got section by the linker script. */ - htab->root.sgotplt->size += GOT_ENTRY_SIZE; -@@ -8861,6 +8900,7 @@ elfNN_aarch64_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf) - htab->variant_pcs = 1; - - } -+ } - else - { - h->plt.offset = (bfd_vma) - 1; -@@ -8873,9 +8913,6 @@ elfNN_aarch64_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf) - h->needs_plt = 0; - } - -- eh = (struct elf_aarch64_link_hash_entry *) h; -- eh->tlsdesc_got_jump_table_offset = (bfd_vma) - 1; -- - if (h->got.refcount > 0) - { - bool dyn; -@@ -8887,7 +8924,7 @@ elfNN_aarch64_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf) - - /* Make sure this symbol is output as a dynamic symbol. - Undefined weak syms won't yet be marked as dynamic. */ -- if (dyn && h->dynindx == -1 && !h->forced_local -+ if (dyn && h->dynindx == -1 && !h->forced_local && !resolved_to_zero - && h->root.type == bfd_link_hash_undefweak) - { - if (!bfd_elf_link_record_dynamic_symbol (info, h)) -@@ -8901,7 +8938,7 @@ elfNN_aarch64_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf) - { - h->got.offset = htab->root.sgot->size; - htab->root.sgot->size += GOT_ENTRY_SIZE; -- if ((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT -+ if (((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT && !resolved_to_zero) - || h->root.type != bfd_link_hash_undefweak) - && (bfd_link_pic (info) - || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h)) -@@ -8937,7 +8974,7 @@ elfNN_aarch64_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf) - } - - indx = h && h->dynindx != -1 ? h->dynindx : 0; -- if ((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT -+ if (((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT && !resolved_to_zero) - || h->root.type != bfd_link_hash_undefweak) - && (!bfd_link_executable (info) - || indx != 0 -@@ -9019,7 +9056,7 @@ elfNN_aarch64_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf) - visibility. */ - if (h->dyn_relocs != NULL && h->root.type == bfd_link_hash_undefweak) - { -- if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT -+ if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT || resolved_to_zero - || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)) - h->dyn_relocs = NULL; - -@@ -9039,7 +9076,9 @@ elfNN_aarch64_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf) - symbols which turn out to need copy relocs or are not - dynamic. */ - -- if (!h->non_got_ref -+ if (!(h->non_got_ref -+ || (h->root.type == bfd_link_hash_undefweak -+ && !resolved_to_zero)) - && ((h->def_dynamic - && !h->def_regular) - || (htab->root.dynamic_sections_created -@@ -9050,6 +9089,7 @@ elfNN_aarch64_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf) - Undefined weak syms won't yet be marked as dynamic. */ - if (h->dynindx == -1 - && !h->forced_local -+ && !resolved_to_zero - && h->root.type == bfd_link_hash_undefweak - && !bfd_elf_link_record_dynamic_symbol (info, h)) - return false; -@@ -9607,8 +9647,17 @@ elfNN_aarch64_finish_dynamic_symbol (bfd *output_bfd, - Elf_Internal_Sym *sym) - { - struct elf_aarch64_link_hash_table *htab; -+ struct elf_aarch64_link_hash_entry *eh; -+ bool local_undefweak; - htab = elf_aarch64_hash_table (info); - -+ eh = (struct elf_aarch64_link_hash_entry *) h; -+ -+ /* We keep PLT/GOT entries without dynamic PLT/GOT relocations for -+ resolved undefined weak symbols in executable so that their -+ references have value 0 at run-time. */ -+ local_undefweak = UNDEFINED_WEAK_RESOLVED_TO_ZERO (info, eh); -+ - if (h->plt.offset != (bfd_vma) - 1) - { - asection *plt, *gotplt, *relplt; -@@ -9643,7 +9692,7 @@ elfNN_aarch64_finish_dynamic_symbol (bfd *output_bfd, - return false; - - elfNN_aarch64_create_small_pltn_entry (h, htab, output_bfd, info); -- if (!h->def_regular) -+ if (!local_undefweak && !h->def_regular) - { - /* Mark the symbol as undefined, rather than as defined in - the .plt section. */ -@@ -9665,7 +9714,8 @@ elfNN_aarch64_finish_dynamic_symbol (bfd *output_bfd, - && elf_aarch64_hash_entry (h)->got_type == GOT_NORMAL - /* Undefined weak symbol in static PIE resolves to 0 without - any dynamic relocations. */ -- && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)) -+ && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h) -+ && !local_undefweak) - { - Elf_Internal_Rela rela; - bfd_byte *loc; -@@ -10312,6 +10362,9 @@ const struct elf_size_info elfNN_aarch64_size_info = - #define elf_backend_init_index_section \ - _bfd_elf_init_2_index_sections - -+#define elf_backend_fixup_symbol \ -+ elfNN_aarch64_elf_fixup_symbol -+ - #define elf_backend_finish_dynamic_sections \ - elfNN_aarch64_finish_dynamic_sections - -diff --git a/ld/emulparams/aarch64elf.sh b/ld/emulparams/aarch64elf.sh -index 8f68e517b45..260a590e69e 100644 ---- a/ld/emulparams/aarch64elf.sh -+++ b/ld/emulparams/aarch64elf.sh -@@ -1,3 +1,5 @@ -+source_sh ${srcdir}/emulparams/dynamic_undefined_weak.sh -+ - ARCH=aarch64 - MACHINE= - NOP=0x1f2003d5 -diff --git a/ld/emulparams/aarch64elf32.sh b/ld/emulparams/aarch64elf32.sh -index 5a08d9e29f1..e4c9abf85a1 100644 ---- a/ld/emulparams/aarch64elf32.sh -+++ b/ld/emulparams/aarch64elf32.sh -@@ -1,3 +1,5 @@ -+source_sh ${srcdir}/emulparams/dynamic_undefined_weak.sh -+ - ARCH="aarch64:ilp32" - MACHINE= - NOP=0x1f2003d5 -diff --git a/ld/emultempl/aarch64elf.em b/ld/emultempl/aarch64elf.em -index d47bdbf9937..b6f76d5c8d7 100644 ---- a/ld/emultempl/aarch64elf.em -+++ b/ld/emultempl/aarch64elf.em -@@ -378,7 +378,7 @@ PARSE_AND_LIST_LONGOPTS=' - { "no-apply-dynamic-relocs", no_argument, NULL, OPTION_NO_APPLY_DYNAMIC_RELOCS}, - ' - --PARSE_AND_LIST_OPTIONS=' -+PARSE_AND_LIST_OPTIONS=${PARSE_AND_LIST_OPTIONS}' - fprintf (file, _(" --no-enum-size-warning Don'\''t warn about objects with incompatible\n" - " enum sizes\n")); - fprintf (file, _(" --no-wchar-size-warning Don'\''t warn about objects with incompatible\n" -diff --git a/ld/emultempl/elf.em b/ld/emultempl/elf.em -index 3f67f8b09d9..eb8e8e1596e 100644 ---- a/ld/emultempl/elf.em -+++ b/ld/emultempl/elf.em -@@ -572,6 +572,7 @@ enum elf_options - OPTION_EXCLUDE_LIBS, - OPTION_HASH_STYLE, - OPTION_BUILD_ID, -+ OPTION_NX_MODULE_NAME, - OPTION_PACKAGE_METADATA, - OPTION_AUDIT, - OPTION_COMPRESS_DEBUG -@@ -603,6 +604,7 @@ EOF - fi - fragment <o->nx_module_name.name; -+ asec = t->o->nx_module_name.sec; -+ if (bfd_is_abs_section (asec->output_section)) -+ { -+ einfo (_("%P: warning: .nx-module-name section discarded," -+ " --build-id ignored\n")); -+ return true; -+ } -+ i_shdr = &elf_section_data (asec->output_section)->this_hdr; -+ -+ if (i_shdr->contents == NULL) -+ { -+ if (asec->contents == NULL) -+ asec->contents = (unsigned char *) xmalloc (asec->size); -+ contents = asec->contents; -+ } -+ else -+ contents = i_shdr->contents + asec->output_offset; -+ -+ size = asec->size; -+ bfd_h_put_32 (abfd, 0, &contents[0]); -+ bfd_h_put_32 (abfd, size - 9, &contents[4]); -+ memcpy (&contents[8], name, size - 9); -+ contents[size - 1] = 0; /* ensure null termination for AMS */ -+ -+ position = i_shdr->sh_offset + asec->output_offset; -+ -+ return (bfd_seek (abfd, position, SEEK_SET) == 0 -+ && bfd_bwrite (contents, size, abfd) == size); -+} -+ -+/* Make .nx-module-name section, and set up elf_tdata->nx_module_name. */ -+ -+static bool -+setup_nx_module_name (bfd *ibfd, bfd *obfd) -+{ -+ asection *s; -+ bfd_size_type size; -+ flagword flags; -+ -+ if (ldelf_emit_nx_module_name[0] == '\0') -+ { -+ /* Extract the basename of the output bfd and use it as the module name. */ -+ char *dot_pos; -+ free ((char *) ldelf_emit_nx_module_name); -+ ldelf_emit_nx_module_name = (char *) lbasename (bfd_get_filename (obfd)); -+ ldelf_emit_nx_module_name = xstrdup (ldelf_emit_nx_module_name); -+ dot_pos = strrchr (ldelf_emit_nx_module_name, '.'); -+ if (dot_pos != NULL) -+ { -+ /* Remove extension. */ -+ *dot_pos = 0; -+ } -+ } -+ -+ size = 8 + strlen(ldelf_emit_nx_module_name) + 1; /* extra null terminator for AMS */ -+ flags = (SEC_ALLOC | SEC_LOAD | SEC_IN_MEMORY -+ | SEC_LINKER_CREATED | SEC_READONLY | SEC_DATA); -+ s = bfd_make_section_with_flags (ibfd, ".nx-module-name", flags); -+ if (s != NULL && bfd_set_section_alignment (s, 4)) -+ { -+ struct elf_obj_tdata *t = elf_tdata (link_info.output_bfd); -+ t->o->nx_module_name.after_write_object_contents = &write_nx_module_name; -+ t->o->nx_module_name.name = ldelf_emit_nx_module_name; -+ t->o->nx_module_name.sec = s; -+ elf_section_type (s) = SHT_PROGBITS; -+ s->size = size; -+ return true; -+ } -+ -+ einfo (_("%P: warning: cannot create .nx-module-name section," -+ " --nx-module-name ignored\n")); -+ return false; -+} -+ -+/* This is called before calling plugin 'all symbols read' hook. */ - void - ldelf_before_plugin_all_symbols_read (int use_libpath, int native, - int is_linux, int is_freebsd, -@@ -1286,6 +1374,24 @@ ldelf_after_open (int use_libpath, int native, int is_linux, int is_freebsd, - } - } - -+ if (ldelf_emit_nx_module_name != NULL) -+ { -+ /* Find an ELF input. */ -+ for (abfd = link_info.input_bfds; -+ abfd != (bfd *) NULL; abfd = abfd->link.next) -+ if (bfd_get_flavour (abfd) == bfd_target_elf_flavour -+ && bfd_count_sections (abfd) != 0 -+ && !((lang_input_statement_type *) abfd->usrdata)->flags.just_syms) -+ break; -+ -+ /* If there are no ELF input files do not try to create a .nx-module-name section. */ -+ if (abfd == NULL || !setup_nx_module_name (abfd, link_info.output_bfd)) -+ { -+ free ((char *) ldelf_emit_nx_module_name); -+ ldelf_emit_nx_module_name = NULL; -+ } -+ } -+ - get_elf_backend_data (link_info.output_bfd)->setup_gnu_properties (&link_info); - - /* Do not allow executable files to be used as inputs to the link. */ -diff --git a/ld/ldelf.h b/ld/ldelf.h -index f82bd9234a7..96173dcd671 100644 ---- a/ld/ldelf.h -+++ b/ld/ldelf.h -@@ -20,6 +20,7 @@ - - extern const char *ldelf_emit_note_gnu_build_id; - extern const char *ldelf_emit_note_fdo_package_metadata; -+extern const char *ldelf_emit_nx_module_name; - - extern void ldelf_after_parse (void); - extern bool ldelf_load_symbols (lang_input_statement_type *); diff --git a/dka64/patches/binutils-2.42.patch b/dka64/patches/binutils-2.42.patch deleted file mode 100644 index 39334d0..0000000 --- a/dka64/patches/binutils-2.42.patch +++ /dev/null @@ -1,507 +0,0 @@ -diff --git a/bfd/elf-bfd.h b/bfd/elf-bfd.h -index 3ed22fa6c52..16cec309746 100644 ---- a/bfd/elf-bfd.h -+++ b/bfd/elf-bfd.h -@@ -1984,6 +1984,14 @@ struct output_elf_obj_tdata - asection *sec; - } package_metadata; - -+ /* Data for .nx-module-name. */ -+ struct -+ { -+ bool (*after_write_object_contents) (bfd *); -+ const char *name; -+ asection *sec; -+ } nx_module_name; -+ - /* Records the result of `get_program_header_size'. */ - bfd_size_type program_header_size; - -diff --git a/bfd/elf.c b/bfd/elf.c -index 88c75ae3ce0..c4b5cda59a7 100644 ---- a/bfd/elf.c -+++ b/bfd/elf.c -@@ -7359,6 +7359,14 @@ _bfd_elf_write_object_contents (bfd *abfd) - if (!bed->s->write_shdrs_and_ehdr (abfd)) - return false; - -+ /* Write out the NX module name. */ -+ if (t->o->nx_module_name.after_write_object_contents != NULL) -+ { -+ failed = !(*t->o->nx_module_name.after_write_object_contents) (abfd); -+ if (failed) -+ return false; -+ } -+ - /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */ - if (t->o->build_id.after_write_object_contents != NULL - && !(*t->o->build_id.after_write_object_contents) (abfd)) -diff --git a/bfd/elfnn-aarch64.c b/bfd/elfnn-aarch64.c -index 109517db4aa..36ea8726544 100644 ---- a/bfd/elfnn-aarch64.c -+++ b/bfd/elfnn-aarch64.c -@@ -2441,6 +2441,12 @@ enum elf_aarch64_stub_type - aarch64_stub_erratum_843419_veneer, - }; - -+/* Is an undefined weak symbol resolved to 0 ? */ -+#define UNDEFINED_WEAK_RESOLVED_TO_ZERO(INFO, EH) \ -+ ((EH)->root.root.type == bfd_link_hash_undefweak \ -+ && bfd_link_executable (INFO) \ -+ && !(INFO)->dynamic_undefined_weak) -+ - struct elf_aarch64_stub_hash_entry - { - /* Base hash table entry structure. */ -@@ -6947,11 +6953,13 @@ elfNN_aarch64_relocate_section (bfd *output_bfd, - Elf_Internal_Sym *sym; - asection *sec; - struct elf_link_hash_entry *h; -+ struct elf_aarch64_link_hash_entry *eh; - bfd_vma relocation; - bfd_reloc_status_type r; - arelent bfd_reloc; - char sym_type; - bool unresolved_reloc = false; -+ bool resolved_to_zero = false; - char *error_message = NULL; - - r_symndx = ELFNN_R_SYM (rel->r_info); -@@ -7091,6 +7099,10 @@ elfNN_aarch64_relocate_section (bfd *output_bfd, - h, &unresolved_reloc, - save_addend, &addend, sym); - -+ eh = (struct elf_aarch64_link_hash_entry *) h; -+ resolved_to_zero = (eh != NULL -+ && UNDEFINED_WEAK_RESOLVED_TO_ZERO (info, eh)); -+ - switch (elfNN_aarch64_bfd_reloc_from_type (input_bfd, r_type)) - { - case BFD_RELOC_AARCH64_TLSGD_ADD_LO12_NC: -@@ -7114,7 +7126,7 @@ elfNN_aarch64_relocate_section (bfd *output_bfd, - need_relocs = - (!bfd_link_executable (info) || indx != 0) && - (h == NULL -- || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT -+ || (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT && !resolved_to_zero) - || h->root.type != bfd_link_hash_undefweak); - - BFD_ASSERT (globals->root.srelgot != NULL); -@@ -7209,7 +7221,7 @@ elfNN_aarch64_relocate_section (bfd *output_bfd, - need_relocs = - (!bfd_link_executable (info) || indx != 0) && - (h == NULL -- || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT -+ || (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT && !resolved_to_zero) - || h->root.type != bfd_link_hash_undefweak); - - BFD_ASSERT (globals->root.srelgot != NULL); -@@ -7258,7 +7270,7 @@ elfNN_aarch64_relocate_section (bfd *output_bfd, - bfd_vma off = symbol_tlsdesc_got_offset (input_bfd, h, r_symndx); - - need_relocs = (h == NULL -- || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT -+ || (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT && !resolved_to_zero) - || h->root.type != bfd_link_hash_undefweak); - - BFD_ASSERT (globals->root.srelgot != NULL); -@@ -7584,6 +7596,23 @@ need_copy_relocation_p (struct elf_aarch64_link_hash_entry *eh) - return false; - } - -+/* Remove undefined weak symbol from the dynamic symbol table if it -+ is resolved to 0. */ -+ -+static bool -+elfNN_aarch64_elf_fixup_symbol (struct bfd_link_info *info, -+ struct elf_link_hash_entry *h) -+{ -+ if (h->dynindx != -1 -+ && UNDEFINED_WEAK_RESOLVED_TO_ZERO (info, elf_aarch64_hash_entry (h))) -+ { -+ h->dynindx = -1; -+ _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr, -+ h->dynstr_index); -+ } -+ return true; -+} -+ - /* Adjust a symbol defined by a dynamic object and referenced by a - regular object. The current definition is in some section of the - dynamic object, but we're not including those sections. We have to -@@ -8802,6 +8831,7 @@ elfNN_aarch64_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf) - struct elf_aarch64_link_hash_table *htab; - struct elf_aarch64_link_hash_entry *eh; - struct elf_dyn_relocs *p; -+ bool resolved_to_zero; - - /* An example of a bfd_link_hash_indirect symbol is versioned - symbol. For example: __gxx_personality_v0(bfd_link_hash_indirect) -@@ -8821,6 +8851,10 @@ elfNN_aarch64_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf) - info = (struct bfd_link_info *) inf; - htab = elf_aarch64_hash_table (info); - -+ eh = (struct elf_aarch64_link_hash_entry *) h; -+ eh->tlsdesc_got_jump_table_offset = (bfd_vma) - 1; -+ resolved_to_zero = UNDEFINED_WEAK_RESOLVED_TO_ZERO (info, eh); -+ - /* Since STT_GNU_IFUNC symbol must go through PLT, we handle it - here if it is defined and referenced in a non-shared object. */ - if (h->type == STT_GNU_IFUNC -@@ -8830,7 +8864,7 @@ elfNN_aarch64_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf) - { - /* Make sure this symbol is output as a dynamic symbol. - Undefined weak syms won't yet be marked as dynamic. */ -- if (h->dynindx == -1 && !h->forced_local -+ if (h->dynindx == -1 && !h->forced_local && !resolved_to_zero - && h->root.type == bfd_link_hash_undefweak) - { - if (!bfd_elf_link_record_dynamic_symbol (info, h)) -@@ -8864,6 +8898,11 @@ elfNN_aarch64_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf) - of relaxing into these from the large model PLT entries. */ - s->size += htab->plt_entry_size; - -+ /* There should be no PLT relocations against resolved undefined -+ weak symbols in the executable. */ -+ if (!resolved_to_zero) -+ { -+ - /* We also need to make an entry in the .got.plt section, which - will be placed in the .got section by the linker script. */ - htab->root.sgotplt->size += GOT_ENTRY_SIZE; -@@ -8892,6 +8931,7 @@ elfNN_aarch64_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf) - htab->variant_pcs = 1; - - } -+ } - else - { - h->plt.offset = (bfd_vma) - 1; -@@ -8904,9 +8944,6 @@ elfNN_aarch64_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf) - h->needs_plt = 0; - } - -- eh = (struct elf_aarch64_link_hash_entry *) h; -- eh->tlsdesc_got_jump_table_offset = (bfd_vma) - 1; -- - if (h->got.refcount > 0) - { - bool dyn; -@@ -8918,7 +8955,7 @@ elfNN_aarch64_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf) - - /* Make sure this symbol is output as a dynamic symbol. - Undefined weak syms won't yet be marked as dynamic. */ -- if (dyn && h->dynindx == -1 && !h->forced_local -+ if (dyn && h->dynindx == -1 && !h->forced_local && !resolved_to_zero - && h->root.type == bfd_link_hash_undefweak) - { - if (!bfd_elf_link_record_dynamic_symbol (info, h)) -@@ -8932,7 +8969,7 @@ elfNN_aarch64_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf) - { - h->got.offset = htab->root.sgot->size; - htab->root.sgot->size += GOT_ENTRY_SIZE; -- if ((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT -+ if (((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT && !resolved_to_zero) - || h->root.type != bfd_link_hash_undefweak) - && (bfd_link_pic (info) - || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h)) -@@ -8968,7 +9005,7 @@ elfNN_aarch64_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf) - } - - indx = h && h->dynindx != -1 ? h->dynindx : 0; -- if ((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT -+ if (((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT && !resolved_to_zero) - || h->root.type != bfd_link_hash_undefweak) - && (!bfd_link_executable (info) - || indx != 0 -@@ -9050,7 +9087,7 @@ elfNN_aarch64_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf) - visibility. */ - if (h->dyn_relocs != NULL && h->root.type == bfd_link_hash_undefweak) - { -- if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT -+ if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT || resolved_to_zero - || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)) - h->dyn_relocs = NULL; - -@@ -9070,7 +9107,9 @@ elfNN_aarch64_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf) - symbols which turn out to need copy relocs or are not - dynamic. */ - -- if (!h->non_got_ref -+ if (!(h->non_got_ref -+ || (h->root.type == bfd_link_hash_undefweak -+ && !resolved_to_zero)) - && ((h->def_dynamic - && !h->def_regular) - || (htab->root.dynamic_sections_created -@@ -9081,6 +9120,7 @@ elfNN_aarch64_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf) - Undefined weak syms won't yet be marked as dynamic. */ - if (h->dynindx == -1 - && !h->forced_local -+ && !resolved_to_zero - && h->root.type == bfd_link_hash_undefweak - && !bfd_elf_link_record_dynamic_symbol (info, h)) - return false; -@@ -9638,8 +9678,17 @@ elfNN_aarch64_finish_dynamic_symbol (bfd *output_bfd, - Elf_Internal_Sym *sym) - { - struct elf_aarch64_link_hash_table *htab; -+ struct elf_aarch64_link_hash_entry *eh; -+ bool local_undefweak; - htab = elf_aarch64_hash_table (info); - -+ eh = (struct elf_aarch64_link_hash_entry *) h; -+ -+ /* We keep PLT/GOT entries without dynamic PLT/GOT relocations for -+ resolved undefined weak symbols in executable so that their -+ references have value 0 at run-time. */ -+ local_undefweak = UNDEFINED_WEAK_RESOLVED_TO_ZERO (info, eh); -+ - if (h->plt.offset != (bfd_vma) - 1) - { - asection *plt, *gotplt, *relplt; -@@ -9674,7 +9723,7 @@ elfNN_aarch64_finish_dynamic_symbol (bfd *output_bfd, - return false; - - elfNN_aarch64_create_small_pltn_entry (h, htab, output_bfd, info); -- if (!h->def_regular) -+ if (!local_undefweak && !h->def_regular) - { - /* Mark the symbol as undefined, rather than as defined in - the .plt section. */ -@@ -9696,7 +9745,8 @@ elfNN_aarch64_finish_dynamic_symbol (bfd *output_bfd, - && elf_aarch64_hash_entry (h)->got_type == GOT_NORMAL - /* Undefined weak symbol in static PIE resolves to 0 without - any dynamic relocations. */ -- && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)) -+ && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h) -+ && !local_undefweak) - { - Elf_Internal_Rela rela; - bfd_byte *loc; -@@ -10343,6 +10393,9 @@ const struct elf_size_info elfNN_aarch64_size_info = - #define elf_backend_init_index_section \ - _bfd_elf_init_2_index_sections - -+#define elf_backend_fixup_symbol \ -+ elfNN_aarch64_elf_fixup_symbol -+ - #define elf_backend_finish_dynamic_sections \ - elfNN_aarch64_finish_dynamic_sections - -diff --git a/ld/emulparams/aarch64elf.sh b/ld/emulparams/aarch64elf.sh -index 8f68e517b45..260a590e69e 100644 ---- a/ld/emulparams/aarch64elf.sh -+++ b/ld/emulparams/aarch64elf.sh -@@ -1,3 +1,5 @@ -+source_sh ${srcdir}/emulparams/dynamic_undefined_weak.sh -+ - ARCH=aarch64 - MACHINE= - NOP=0x1f2003d5 -diff --git a/ld/emulparams/aarch64elf32.sh b/ld/emulparams/aarch64elf32.sh -index 5a08d9e29f1..e4c9abf85a1 100644 ---- a/ld/emulparams/aarch64elf32.sh -+++ b/ld/emulparams/aarch64elf32.sh -@@ -1,3 +1,5 @@ -+source_sh ${srcdir}/emulparams/dynamic_undefined_weak.sh -+ - ARCH="aarch64:ilp32" - MACHINE= - NOP=0x1f2003d5 -diff --git a/ld/emultempl/aarch64elf.em b/ld/emultempl/aarch64elf.em -index b647909ae63..3e2d7a171b9 100644 ---- a/ld/emultempl/aarch64elf.em -+++ b/ld/emultempl/aarch64elf.em -@@ -378,7 +378,7 @@ PARSE_AND_LIST_LONGOPTS=' - { "no-apply-dynamic-relocs", no_argument, NULL, OPTION_NO_APPLY_DYNAMIC_RELOCS}, - ' - --PARSE_AND_LIST_OPTIONS=' -+PARSE_AND_LIST_OPTIONS=${PARSE_AND_LIST_OPTIONS}' - fprintf (file, _(" --no-enum-size-warning Don'\''t warn about objects with incompatible\n" - " enum sizes\n")); - fprintf (file, _(" --no-wchar-size-warning Don'\''t warn about objects with incompatible\n" -diff --git a/ld/emultempl/elf.em b/ld/emultempl/elf.em -index 71cec19fdc6..3fd0585dee6 100644 ---- a/ld/emultempl/elf.em -+++ b/ld/emultempl/elf.em -@@ -574,6 +574,7 @@ enum elf_options - OPTION_EXCLUDE_LIBS, - OPTION_HASH_STYLE, - OPTION_BUILD_ID, -+ OPTION_NX_MODULE_NAME, - OPTION_PACKAGE_METADATA, - OPTION_AUDIT, - OPTION_COMPRESS_DEBUG -@@ -605,6 +606,7 @@ EOF - fi - fragment <o->nx_module_name.name; -+ asec = t->o->nx_module_name.sec; -+ if (bfd_is_abs_section (asec->output_section)) -+ { -+ einfo (_("%P: warning: .nx-module-name section discarded," -+ " --build-id ignored\n")); -+ return true; -+ } -+ i_shdr = &elf_section_data (asec->output_section)->this_hdr; -+ -+ if (i_shdr->contents == NULL) -+ { -+ if (asec->contents == NULL) -+ asec->contents = (unsigned char *) xmalloc (asec->size); -+ contents = asec->contents; -+ } -+ else -+ contents = i_shdr->contents + asec->output_offset; -+ -+ size = asec->size; -+ bfd_h_put_32 (abfd, 0, &contents[0]); -+ bfd_h_put_32 (abfd, size - 9, &contents[4]); -+ memcpy (&contents[8], name, size - 9); -+ contents[size - 1] = 0; /* ensure null termination for AMS */ -+ -+ position = i_shdr->sh_offset + asec->output_offset; -+ -+ return (bfd_seek (abfd, position, SEEK_SET) == 0 -+ && bfd_write (contents, size, abfd) == size); -+} -+ -+/* Make .nx-module-name section, and set up elf_tdata->nx_module_name. */ -+ -+static bool -+setup_nx_module_name (bfd *ibfd, bfd *obfd) -+{ -+ asection *s; -+ bfd_size_type size; -+ flagword flags; -+ -+ if (ldelf_emit_nx_module_name[0] == '\0') -+ { -+ /* Extract the basename of the output bfd and use it as the module name. */ -+ char *dot_pos; -+ free ((char *) ldelf_emit_nx_module_name); -+ ldelf_emit_nx_module_name = (char *) lbasename (bfd_get_filename (obfd)); -+ ldelf_emit_nx_module_name = xstrdup (ldelf_emit_nx_module_name); -+ dot_pos = strrchr (ldelf_emit_nx_module_name, '.'); -+ if (dot_pos != NULL) -+ { -+ /* Remove extension. */ -+ *dot_pos = 0; -+ } -+ } -+ -+ size = 8 + strlen(ldelf_emit_nx_module_name) + 1; /* extra null terminator for AMS */ -+ flags = (SEC_ALLOC | SEC_LOAD | SEC_IN_MEMORY -+ | SEC_LINKER_CREATED | SEC_READONLY | SEC_DATA); -+ s = bfd_make_section_with_flags (ibfd, ".nx-module-name", flags); -+ if (s != NULL && bfd_set_section_alignment (s, 4)) -+ { -+ struct elf_obj_tdata *t = elf_tdata (link_info.output_bfd); -+ t->o->nx_module_name.after_write_object_contents = &write_nx_module_name; -+ t->o->nx_module_name.name = ldelf_emit_nx_module_name; -+ t->o->nx_module_name.sec = s; -+ elf_section_type (s) = SHT_PROGBITS; -+ s->size = size; -+ return true; -+ } -+ -+ einfo (_("%P: warning: cannot create .nx-module-name section," -+ " --nx-module-name ignored\n")); -+ return false; -+} -+ -+/* This is called before calling plugin 'all symbols read' hook. */ - void - ldelf_before_plugin_all_symbols_read (int use_libpath, int native, - int is_linux, int is_freebsd, -@@ -1289,6 +1377,24 @@ ldelf_after_open (int use_libpath, int native, int is_linux, int is_freebsd, - } - } - -+ if (ldelf_emit_nx_module_name != NULL) -+ { -+ /* Find an ELF input. */ -+ for (abfd = link_info.input_bfds; -+ abfd != (bfd *) NULL; abfd = abfd->link.next) -+ if (bfd_get_flavour (abfd) == bfd_target_elf_flavour -+ && bfd_count_sections (abfd) != 0 -+ && !((lang_input_statement_type *) abfd->usrdata)->flags.just_syms) -+ break; -+ -+ /* If there are no ELF input files do not try to create a .nx-module-name section. */ -+ if (abfd == NULL || !setup_nx_module_name (abfd, link_info.output_bfd)) -+ { -+ free ((char *) ldelf_emit_nx_module_name); -+ ldelf_emit_nx_module_name = NULL; -+ } -+ } -+ - get_elf_backend_data (link_info.output_bfd)->setup_gnu_properties (&link_info); - - /* Do not allow executable files to be used as inputs to the link. */ -diff --git a/ld/ldelf.h b/ld/ldelf.h -index 239194772c4..68516dbf45e 100644 ---- a/ld/ldelf.h -+++ b/ld/ldelf.h -@@ -20,6 +20,7 @@ - - extern const char *ldelf_emit_note_gnu_build_id; - extern const char *ldelf_emit_note_fdo_package_metadata; -+extern const char *ldelf_emit_nx_module_name; - - extern void ldelf_after_parse (void); - extern bool ldelf_load_symbols (lang_input_statement_type *); diff --git a/dka64/patches/gcc-14.1.0.patch b/dka64/patches/gcc-14.1.0.patch deleted file mode 100644 index 87439ce..0000000 --- a/dka64/patches/gcc-14.1.0.patch +++ /dev/null @@ -1,363 +0,0 @@ -diff --git a/gcc/config.gcc b/gcc/config.gcc -index 95c91ee02be..4711542eee5 100644 ---- a/gcc/config.gcc -+++ b/gcc/config.gcc -@@ -1195,7 +1195,14 @@ aarch64*-*-elf | aarch64*-*-fuchsia* | aarch64*-*-rtems*) - tmake_file="${tmake_file} aarch64/t-aarch64" - case $target in - aarch64-*-elf*) -+ default_use_cxa_atexit=yes - use_gcc_stdint=wrap -+ tm_file="${tm_file} devkitpro.h" -+ tm_defines="${tm_defines} TARGET_DEFAULT_ASYNC_UNWIND_TABLES=1" -+ extra_options="${extra_options} devkitpro.opt" -+ case ${enable_threads} in -+ "" | yes | posix) thread_file='posix' ;; -+ esac - ;; - aarch64-*-fuchsia*) - tm_file="${tm_file} fuchsia.h" -diff --git a/gcc/config/aarch64/aarch64-elf-raw.h b/gcc/config/aarch64/aarch64-elf-raw.h -index 5396da9b2d6..87235d680ad 100644 ---- a/gcc/config/aarch64/aarch64-elf-raw.h -+++ b/gcc/config/aarch64/aarch64-elf-raw.h -@@ -22,6 +22,7 @@ - #ifndef GCC_AARCH64_ELF_RAW_H - #define GCC_AARCH64_ELF_RAW_H - -+#define LINK_GCC_C_SEQUENCE_SPEC "--start-group %G %L %(libgloss) --end-group" - #define STARTFILE_SPEC " crti%O%s crtbegin%O%s crt0%O%s" - #define ENDFILE_SPEC \ - " crtend%O%s crtn%O%s " \ -diff --git a/gcc/config/aarch64/aarch64-opts.h b/gcc/config/aarch64/aarch64-opts.h -index a05c0d3ded1..5551807e4c6 100644 ---- a/gcc/config/aarch64/aarch64-opts.h -+++ b/gcc/config/aarch64/aarch64-opts.h -@@ -80,7 +80,8 @@ enum aarch64_tp_reg { - AARCH64_TPIDR_EL1 = 1, - AARCH64_TPIDR_EL2 = 2, - AARCH64_TPIDR_EL3 = 3, -- AARCH64_TPIDRRO_EL0 = 4 -+ AARCH64_TPIDRRO_EL0 = 4, -+ AARCH64_TP_SOFT = 5 - }; - - /* SVE vector register sizes. */ -diff --git a/gcc/config/aarch64/aarch64.cc b/gcc/config/aarch64/aarch64.cc -index 1beec94629d..90a9ec580f8 100644 ---- a/gcc/config/aarch64/aarch64.cc -+++ b/gcc/config/aarch64/aarch64.cc -@@ -21060,8 +21060,24 @@ aarch64_load_tp (rtx target) - || !register_operand (target, Pmode)) - target = gen_reg_rtx (Pmode); - -- /* Can return in any reg. */ -- emit_insn (gen_aarch64_load_tp_hard (target)); -+ if (TARGET_HARD_TP) -+ { -+ /* Can return in any reg. */ -+ emit_insn (gen_aarch64_load_tp_hard (target)); -+ } -+ else -+ { -+ /* Always returned in r0. Immediately copy the result into a pseudo, -+ otherwise other uses of r0 (e.g. setting up function arguments) may -+ clobber the value. */ -+ -+ rtx tmp; -+ -+ emit_insn (gen_aarch64_load_tp_soft ()); -+ -+ tmp = gen_rtx_REG (DImode, R0_REGNUM); -+ emit_move_insn (target, tmp); -+ } - return target; - } - -diff --git a/gcc/config/aarch64/aarch64.h b/gcc/config/aarch64/aarch64.h -index 4fa1dfc7906..43a01fe3d56 100644 ---- a/gcc/config/aarch64/aarch64.h -+++ b/gcc/config/aarch64/aarch64.h -@@ -1377,6 +1377,10 @@ typedef struct - /* Check TLS Descriptors mechanism is selected. */ - #define TARGET_TLS_DESC (aarch64_tls_dialect == TLS_DESCRIPTORS) - -+/* Check selected thread pointer access sequence to use. */ -+#define TARGET_HARD_TP (aarch64_tpidr_reg != AARCH64_TP_SOFT) -+#define TARGET_SOFT_TP (aarch64_tpidr_reg == AARCH64_TP_SOFT) -+ - extern enum aarch64_code_model aarch64_cmodel; - - /* When using the tiny addressing model conditional and unconditional branches -diff --git a/gcc/config/aarch64/aarch64.md b/gcc/config/aarch64/aarch64.md -index dbde066f747..3e3198bf52f 100644 ---- a/gcc/config/aarch64/aarch64.md -+++ b/gcc/config/aarch64/aarch64.md -@@ -7436,11 +7436,22 @@ - (define_insn "aarch64_load_tp_hard" - [(set (match_operand:DI 0 "register_operand" "=r") - (unspec:DI [(const_int 0)] UNSPEC_TLS))] -- "" -+ "TARGET_HARD_TP" - "* return aarch64_output_load_tp (operands[0]);" - [(set_attr "type" "mrs")] - ) - -+(define_insn "aarch64_load_tp_soft" -+ [(set (reg:DI 0) (unspec:DI [(const_int 0)] UNSPEC_TLS)) -+ (clobber (reg:DI IP0_REGNUM)) -+ (clobber (reg:DI IP1_REGNUM)) -+ (clobber (reg:DI LR_REGNUM)) -+ (clobber (reg:CC CC_REGNUM))] -+ "TARGET_SOFT_TP" -+ "bl\\t__aarch64_read_tp\\t// aarch64_load_tp_soft" -+ [(set_attr "type" "branch")] -+) -+ - ;; The TLS ABI specifically requires that the compiler does not schedule - ;; instructions in the TLS stubs, in order to enable linker relaxation. - ;; Therefore we treat the stubs as an atomic sequence. -diff --git a/gcc/config/aarch64/aarch64.opt b/gcc/config/aarch64/aarch64.opt -index 6356c419399..a6907ed0a0b 100644 ---- a/gcc/config/aarch64/aarch64.opt -+++ b/gcc/config/aarch64/aarch64.opt -@@ -128,6 +128,9 @@ Enum(tp_reg) String(tpidr_el3) Value(AARCH64_TPIDR_EL3) - EnumValue - Enum(tp_reg) String(tpidrro_el0) Value(AARCH64_TPIDRRO_EL0) - -+EnumValue -+Enum(tp_reg) String(soft) Value(AARCH64_TP_SOFT) -+ - mtp= - Target RejectNegative Joined Enum(tp_reg) Var(aarch64_tpidr_reg) Init(AARCH64_TPIDR_EL0) Save - Specify the thread pointer register. -@@ -329,7 +332,7 @@ TargetVariable - long aarch64_stack_protector_guard_offset = 0 - - moutline-atomics --Target Var(aarch64_flag_outline_atomics) Init(2) Save -+Target Var(aarch64_flag_outline_atomics) Save - Generate local calls to out-of-line atomic operations. - - -param=aarch64-vect-compare-costs= -diff --git a/gcc/config/aarch64/t-aarch64 b/gcc/config/aarch64/t-aarch64 -index 78713558e7d..76c0914d8ce 100644 ---- a/gcc/config/aarch64/t-aarch64 -+++ b/gcc/config/aarch64/t-aarch64 -@@ -208,8 +208,10 @@ aarch64-ldp-fusion.o: $(srcdir)/config/aarch64/aarch64-ldp-fusion.cc \ - $(srcdir)/config/aarch64/aarch64-ldp-fusion.cc - - comma=, --MULTILIB_OPTIONS = $(subst $(comma),/, $(patsubst %, mabi=%, $(subst $(comma),$(comma)mabi=,$(TM_MULTILIB_CONFIG)))) --MULTILIB_DIRNAMES = $(subst $(comma), ,$(TM_MULTILIB_CONFIG)) -+MULTILIB_OPTIONS = mcmodel=large fPIC -+MULTILIB_DIRNAMES = large pic -+MULTILIB_REQUIRED = mcmodel=large fPIC -+MULTILIB_MATCHES = fPIC=fpic fPIC=fpie fPIC=fPIE - - insn-conditions.md: s-check-sve-md - s-check-sve-md: $(srcdir)/config/aarch64/check-sve-md.awk \ -diff --git a/gcc/config/devkitpro.h b/gcc/config/devkitpro.h -new file mode 100644 -index 00000000000..a25459e4352 ---- /dev/null -+++ b/gcc/config/devkitpro.h -@@ -0,0 +1,32 @@ -+/* Definitions for devkitPro toolchains. -+ Copyright (C) 2016-2018 Free Software Foundation, Inc. -+ -+ This file is part of GCC. -+ -+ GCC is free software; you can redistribute it and/or modify it -+ under the terms of the GNU General Public License as published -+ by the Free Software Foundation; either version 3, or (at your -+ option) any later version. -+ -+ GCC is distributed in the hope that it will be useful, but WITHOUT -+ ANY WARRANTY; without even the implied warranty of MERCHANTABILITY -+ or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public -+ License for more details. -+ -+ Under Section 7 of GPL version 3, you are granted additional -+ permissions described in the GCC Runtime Library Exception, version -+ 3.1, as published by the Free Software Foundation. -+ -+ You should have received a copy of the GNU General Public License and -+ a copy of the GCC Runtime Library Exception along with this program; -+ see the files COPYING3 and COPYING.RUNTIME respectively. If not, see -+ . */ -+ -+#undef TARGET_OS_CPP_BUILTINS -+#define TARGET_OS_CPP_BUILTINS() \ -+ do { \ -+ builtin_define ("__DEVKITA64__"); \ -+ builtin_define ("__DEVKITPRO__"); \ -+ } while (0) -+ -+ -diff --git a/gcc/config/devkitpro.opt b/gcc/config/devkitpro.opt -new file mode 100644 -index 00000000000..9acbbf9d27c ---- /dev/null -+++ b/gcc/config/devkitpro.opt -@@ -0,0 +1,29 @@ -+; Options for devkitPro toolchains. -+ -+; Copyright (C) 2011-2018 Free Software Foundation, Inc. -+; -+; This file is part of GCC. -+; -+; GCC is free software; you can redistribute it and/or modify it under -+; the terms of the GNU General Public License as published by the Free -+; Software Foundation; either version 3, or (at your option) any later -+; version. -+; -+; GCC is distributed in the hope that it will be useful, but WITHOUT ANY -+; WARRANTY; without even the implied warranty of MERCHANTABILITY or -+; FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License -+; for more details. -+; -+; You should have received a copy of the GNU General Public License -+; along with GCC; see the file COPYING3. If not see -+; . -+ -+; See the GCC internals manual (options.texi) for a description of -+; this file's format. -+ -+; Please try to keep this file in ASCII collating order. -+ -+pthread -+Driver -+ -+; This comment is to ensure we retain the blank line above. -diff --git a/gcc/config/devkitpro.opt.urls b/gcc/config/devkitpro.opt.urls -new file mode 100644 -index 00000000000..ab7b466aa71 ---- /dev/null -+++ b/gcc/config/devkitpro.opt.urls -@@ -0,0 +1 @@ -+; Autogenerated by regenerate-opt-urls.py from gcc/config/devkitpro.opt and generated HTML -diff --git a/gcc/config/i386/host-mingw32.cc b/gcc/config/i386/host-mingw32.cc -index 42563982e42..923dc198a7e 100644 ---- a/gcc/config/i386/host-mingw32.cc -+++ b/gcc/config/i386/host-mingw32.cc -@@ -93,7 +93,10 @@ mingw32_gt_pch_get_address (size_t size, int) - for NT system dlls is in 0x70000000 to 0x78000000 range. - If we allocate at bottom we need to reserve the address as early - as possible and at the same point in each invocation. */ -- -+ -+#if __MINGW64__ -+ size = UINT64_C(64 * 1024 * 1024 * 1024); -+#endif - res = VirtualAlloc (NULL, size, - MEM_RESERVE | MEM_TOP_DOWN, - PAGE_NOACCESS); -diff --git a/gcc/gcc.cc b/gcc/gcc.cc -index 728332b8153..47fc03eb8c8 100644 ---- a/gcc/gcc.cc -+++ b/gcc/gcc.cc -@@ -881,6 +881,11 @@ proper position among the other output files. */ - #endif - #endif - -+#ifndef LIBGLOSS_SPEC -+# define LIBGLOSS_SPEC "-lsysbase" -+#endif -+ -+ - /* config.h can define STARTFILE_SPEC to override the default crt0 files. */ - #ifndef STARTFILE_SPEC - #define STARTFILE_SPEC \ -@@ -1208,6 +1213,7 @@ static const char *link_spec = LINK_SPEC; - static const char *lib_spec = LIB_SPEC; - static const char *link_gomp_spec = ""; - static const char *libgcc_spec = LIBGCC_SPEC; -+static const char *libgloss_spec = LIBGLOSS_SPEC; - static const char *endfile_spec = ENDFILE_SPEC; - static const char *startfile_spec = STARTFILE_SPEC; - static const char *linker_name_spec = LINKER_NAME; -@@ -1720,6 +1726,7 @@ static struct spec_list static_specs[] = - INIT_STATIC_SPEC ("lib", &lib_spec), - INIT_STATIC_SPEC ("link_gomp", &link_gomp_spec), - INIT_STATIC_SPEC ("libgcc", &libgcc_spec), -+ INIT_STATIC_SPEC ("libgloss", &libgloss_spec), - INIT_STATIC_SPEC ("startfile", &startfile_spec), - INIT_STATIC_SPEC ("cross_compile", &cross_compile), - INIT_STATIC_SPEC ("version", &compiler_version), -diff --git a/libcc1/configure b/libcc1/configure -index ea689a353c8..98f9d9b21b7 100755 ---- a/libcc1/configure -+++ b/libcc1/configure -@@ -5119,7 +5119,7 @@ else - # Adding the `sed 1q' prevents false positives on HP-UX, which says: - # nm: unknown option "B" ignored - case `"$tmp_nm" -B "$tmp_nm_to_nm" 2>&1 | grep -v '^ *$' | sed '1q'` in -- *$tmp_nm*) lt_cv_path_NM="$tmp_nm -B" -+ $tmp_nm*) lt_cv_path_NM="$tmp_nm -B" - break - ;; - *) -diff --git a/libgcc/crtstuff.c b/libgcc/crtstuff.c -index 38d3859a73c..f97358d9787 100644 ---- a/libgcc/crtstuff.c -+++ b/libgcc/crtstuff.c -@@ -326,7 +326,7 @@ register_tm_clones (void) - - #ifdef OBJECT_FORMAT_ELF - --#if DEFAULT_USE_CXA_ATEXIT -+#if 1 /* DEFAULT_USE_CXA_ATEXIT */ - /* Declare the __dso_handle variable. It should have a unique value - in every shared-object; in a main program its value is zero. The - object should in any case be protected. This means the instance -diff --git a/libgcc/gthr.h b/libgcc/gthr.h -index 33c2d8ff630..2a0a9c1e87e 100644 ---- a/libgcc/gthr.h -+++ b/libgcc/gthr.h -@@ -136,7 +136,7 @@ see the files COPYING3 and COPYING.RUNTIME respectively. If not, see - /* The pe-coff weak support isn't fully compatible to ELF's weak. - For static libraries it might would work, but as we need to deal - with shared versions too, we disable it for mingw-targets. */ --#ifdef __MINGW32__ -+#if defined(__MINGW32__) || defined(__DEVKITA64__) - #undef GTHREAD_USE_WEAK - #define GTHREAD_USE_WEAK 0 - #endif -diff --git a/libstdc++-v3/include/Makefile.am b/libstdc++-v3/include/Makefile.am -index 422a0f4bd0a..ee09ada9170 100644 ---- a/libstdc++-v3/include/Makefile.am -+++ b/libstdc++-v3/include/Makefile.am -@@ -1429,6 +1429,7 @@ ${host_builddir}/gthr.h: ${toplevel_srcdir}/libgcc/gthr.h stamp-${host_alias} - -e '/^#/s/\(${uppercase}${uppercase}*\)/_GLIBCXX_\1/g' \ - -e 's/_GLIBCXX_SUPPORTS_WEAK/__GXX_WEAK__/g' \ - -e 's/_GLIBCXX___MINGW32_GLIBCXX___/__MINGW32__/g' \ -+ -e 's/_GLIBCXX___DEVKITA64_GLIBCXX___/__DEVKITA64__/g' \ - -e 's,^#include "\(.*\)",#include ,g' \ - < $< > $@ - -diff --git a/libstdc++-v3/include/Makefile.in b/libstdc++-v3/include/Makefile.in -index 9fd4ab4848c..beea48941a3 100644 ---- a/libstdc++-v3/include/Makefile.in -+++ b/libstdc++-v3/include/Makefile.in -@@ -1903,6 +1903,7 @@ ${host_builddir}/gthr.h: ${toplevel_srcdir}/libgcc/gthr.h stamp-${host_alias} - -e '/^#/s/\(${uppercase}${uppercase}*\)/_GLIBCXX_\1/g' \ - -e 's/_GLIBCXX_SUPPORTS_WEAK/__GXX_WEAK__/g' \ - -e 's/_GLIBCXX___MINGW32_GLIBCXX___/__MINGW32__/g' \ -+ -e 's/_GLIBCXX___DEVKITA64_GLIBCXX___/__DEVKITA64__/g' \ - -e 's,^#include "\(.*\)",#include ,g' \ - < $< > $@ - -diff --git a/lto-plugin/configure b/lto-plugin/configure -index 28f5dd79cd7..a79f318a4d6 100755 ---- a/lto-plugin/configure -+++ b/lto-plugin/configure -@@ -6469,7 +6469,7 @@ else - # Adding the `sed 1q' prevents false positives on HP-UX, which says: - # nm: unknown option "B" ignored - case `"$tmp_nm" -B "$tmp_nm_to_nm" 2>&1 | grep -v '^ *$' | sed '1q'` in -- *$tmp_nm*) lt_cv_path_NM="$tmp_nm -B" -+ $tmp_nm*) lt_cv_path_NM="$tmp_nm -B" - break - ;; - *)