diff --git a/build-devkit.sh b/build-devkit.sh index f8a4313..5e9f6f3 100755 --- a/build-devkit.sh +++ b/build-devkit.sh @@ -2,7 +2,7 @@ #--------------------------------------------------------------------------------- # devkitARM release 63 # devkitPPC release 45 -# devkitA64 release 24 +# devkitA64 release 25 #--------------------------------------------------------------------------------- if [ 0 -eq 1 ] ; then diff --git a/dka64/patches/binutils-2.42.patch b/dka64/patches/binutils-2.42.patch new file mode 100644 index 0000000..39334d0 --- /dev/null +++ b/dka64/patches/binutils-2.42.patch @@ -0,0 +1,507 @@ +diff --git a/bfd/elf-bfd.h b/bfd/elf-bfd.h +index 3ed22fa6c52..16cec309746 100644 +--- a/bfd/elf-bfd.h ++++ b/bfd/elf-bfd.h +@@ -1984,6 +1984,14 @@ struct output_elf_obj_tdata + asection *sec; + } package_metadata; + ++ /* Data for .nx-module-name. */ ++ struct ++ { ++ bool (*after_write_object_contents) (bfd *); ++ const char *name; ++ asection *sec; ++ } nx_module_name; ++ + /* Records the result of `get_program_header_size'. */ + bfd_size_type program_header_size; + +diff --git a/bfd/elf.c b/bfd/elf.c +index 88c75ae3ce0..c4b5cda59a7 100644 +--- a/bfd/elf.c ++++ b/bfd/elf.c +@@ -7359,6 +7359,14 @@ _bfd_elf_write_object_contents (bfd *abfd) + if (!bed->s->write_shdrs_and_ehdr (abfd)) + return false; + ++ /* Write out the NX module name. */ ++ if (t->o->nx_module_name.after_write_object_contents != NULL) ++ { ++ failed = !(*t->o->nx_module_name.after_write_object_contents) (abfd); ++ if (failed) ++ return false; ++ } ++ + /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */ + if (t->o->build_id.after_write_object_contents != NULL + && !(*t->o->build_id.after_write_object_contents) (abfd)) +diff --git a/bfd/elfnn-aarch64.c b/bfd/elfnn-aarch64.c +index 109517db4aa..36ea8726544 100644 +--- a/bfd/elfnn-aarch64.c ++++ b/bfd/elfnn-aarch64.c +@@ -2441,6 +2441,12 @@ enum elf_aarch64_stub_type + aarch64_stub_erratum_843419_veneer, + }; + ++/* Is an undefined weak symbol resolved to 0 ? */ ++#define UNDEFINED_WEAK_RESOLVED_TO_ZERO(INFO, EH) \ ++ ((EH)->root.root.type == bfd_link_hash_undefweak \ ++ && bfd_link_executable (INFO) \ ++ && !(INFO)->dynamic_undefined_weak) ++ + struct elf_aarch64_stub_hash_entry + { + /* Base hash table entry structure. */ +@@ -6947,11 +6953,13 @@ elfNN_aarch64_relocate_section (bfd *output_bfd, + Elf_Internal_Sym *sym; + asection *sec; + struct elf_link_hash_entry *h; ++ struct elf_aarch64_link_hash_entry *eh; + bfd_vma relocation; + bfd_reloc_status_type r; + arelent bfd_reloc; + char sym_type; + bool unresolved_reloc = false; ++ bool resolved_to_zero = false; + char *error_message = NULL; + + r_symndx = ELFNN_R_SYM (rel->r_info); +@@ -7091,6 +7099,10 @@ elfNN_aarch64_relocate_section (bfd *output_bfd, + h, &unresolved_reloc, + save_addend, &addend, sym); + ++ eh = (struct elf_aarch64_link_hash_entry *) h; ++ resolved_to_zero = (eh != NULL ++ && UNDEFINED_WEAK_RESOLVED_TO_ZERO (info, eh)); ++ + switch (elfNN_aarch64_bfd_reloc_from_type (input_bfd, r_type)) + { + case BFD_RELOC_AARCH64_TLSGD_ADD_LO12_NC: +@@ -7114,7 +7126,7 @@ elfNN_aarch64_relocate_section (bfd *output_bfd, + need_relocs = + (!bfd_link_executable (info) || indx != 0) && + (h == NULL +- || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT ++ || (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT && !resolved_to_zero) + || h->root.type != bfd_link_hash_undefweak); + + BFD_ASSERT (globals->root.srelgot != NULL); +@@ -7209,7 +7221,7 @@ elfNN_aarch64_relocate_section (bfd *output_bfd, + need_relocs = + (!bfd_link_executable (info) || indx != 0) && + (h == NULL +- || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT ++ || (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT && !resolved_to_zero) + || h->root.type != bfd_link_hash_undefweak); + + BFD_ASSERT (globals->root.srelgot != NULL); +@@ -7258,7 +7270,7 @@ elfNN_aarch64_relocate_section (bfd *output_bfd, + bfd_vma off = symbol_tlsdesc_got_offset (input_bfd, h, r_symndx); + + need_relocs = (h == NULL +- || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT ++ || (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT && !resolved_to_zero) + || h->root.type != bfd_link_hash_undefweak); + + BFD_ASSERT (globals->root.srelgot != NULL); +@@ -7584,6 +7596,23 @@ need_copy_relocation_p (struct elf_aarch64_link_hash_entry *eh) + return false; + } + ++/* Remove undefined weak symbol from the dynamic symbol table if it ++ is resolved to 0. */ ++ ++static bool ++elfNN_aarch64_elf_fixup_symbol (struct bfd_link_info *info, ++ struct elf_link_hash_entry *h) ++{ ++ if (h->dynindx != -1 ++ && UNDEFINED_WEAK_RESOLVED_TO_ZERO (info, elf_aarch64_hash_entry (h))) ++ { ++ h->dynindx = -1; ++ _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr, ++ h->dynstr_index); ++ } ++ return true; ++} ++ + /* Adjust a symbol defined by a dynamic object and referenced by a + regular object. The current definition is in some section of the + dynamic object, but we're not including those sections. We have to +@@ -8802,6 +8831,7 @@ elfNN_aarch64_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf) + struct elf_aarch64_link_hash_table *htab; + struct elf_aarch64_link_hash_entry *eh; + struct elf_dyn_relocs *p; ++ bool resolved_to_zero; + + /* An example of a bfd_link_hash_indirect symbol is versioned + symbol. For example: __gxx_personality_v0(bfd_link_hash_indirect) +@@ -8821,6 +8851,10 @@ elfNN_aarch64_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf) + info = (struct bfd_link_info *) inf; + htab = elf_aarch64_hash_table (info); + ++ eh = (struct elf_aarch64_link_hash_entry *) h; ++ eh->tlsdesc_got_jump_table_offset = (bfd_vma) - 1; ++ resolved_to_zero = UNDEFINED_WEAK_RESOLVED_TO_ZERO (info, eh); ++ + /* Since STT_GNU_IFUNC symbol must go through PLT, we handle it + here if it is defined and referenced in a non-shared object. */ + if (h->type == STT_GNU_IFUNC +@@ -8830,7 +8864,7 @@ elfNN_aarch64_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf) + { + /* Make sure this symbol is output as a dynamic symbol. + Undefined weak syms won't yet be marked as dynamic. */ +- if (h->dynindx == -1 && !h->forced_local ++ if (h->dynindx == -1 && !h->forced_local && !resolved_to_zero + && h->root.type == bfd_link_hash_undefweak) + { + if (!bfd_elf_link_record_dynamic_symbol (info, h)) +@@ -8864,6 +8898,11 @@ elfNN_aarch64_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf) + of relaxing into these from the large model PLT entries. */ + s->size += htab->plt_entry_size; + ++ /* There should be no PLT relocations against resolved undefined ++ weak symbols in the executable. */ ++ if (!resolved_to_zero) ++ { ++ + /* We also need to make an entry in the .got.plt section, which + will be placed in the .got section by the linker script. */ + htab->root.sgotplt->size += GOT_ENTRY_SIZE; +@@ -8892,6 +8931,7 @@ elfNN_aarch64_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf) + htab->variant_pcs = 1; + + } ++ } + else + { + h->plt.offset = (bfd_vma) - 1; +@@ -8904,9 +8944,6 @@ elfNN_aarch64_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf) + h->needs_plt = 0; + } + +- eh = (struct elf_aarch64_link_hash_entry *) h; +- eh->tlsdesc_got_jump_table_offset = (bfd_vma) - 1; +- + if (h->got.refcount > 0) + { + bool dyn; +@@ -8918,7 +8955,7 @@ elfNN_aarch64_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf) + + /* Make sure this symbol is output as a dynamic symbol. + Undefined weak syms won't yet be marked as dynamic. */ +- if (dyn && h->dynindx == -1 && !h->forced_local ++ if (dyn && h->dynindx == -1 && !h->forced_local && !resolved_to_zero + && h->root.type == bfd_link_hash_undefweak) + { + if (!bfd_elf_link_record_dynamic_symbol (info, h)) +@@ -8932,7 +8969,7 @@ elfNN_aarch64_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf) + { + h->got.offset = htab->root.sgot->size; + htab->root.sgot->size += GOT_ENTRY_SIZE; +- if ((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT ++ if (((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT && !resolved_to_zero) + || h->root.type != bfd_link_hash_undefweak) + && (bfd_link_pic (info) + || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h)) +@@ -8968,7 +9005,7 @@ elfNN_aarch64_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf) + } + + indx = h && h->dynindx != -1 ? h->dynindx : 0; +- if ((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT ++ if (((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT && !resolved_to_zero) + || h->root.type != bfd_link_hash_undefweak) + && (!bfd_link_executable (info) + || indx != 0 +@@ -9050,7 +9087,7 @@ elfNN_aarch64_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf) + visibility. */ + if (h->dyn_relocs != NULL && h->root.type == bfd_link_hash_undefweak) + { +- if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT ++ if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT || resolved_to_zero + || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)) + h->dyn_relocs = NULL; + +@@ -9070,7 +9107,9 @@ elfNN_aarch64_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf) + symbols which turn out to need copy relocs or are not + dynamic. */ + +- if (!h->non_got_ref ++ if (!(h->non_got_ref ++ || (h->root.type == bfd_link_hash_undefweak ++ && !resolved_to_zero)) + && ((h->def_dynamic + && !h->def_regular) + || (htab->root.dynamic_sections_created +@@ -9081,6 +9120,7 @@ elfNN_aarch64_allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf) + Undefined weak syms won't yet be marked as dynamic. */ + if (h->dynindx == -1 + && !h->forced_local ++ && !resolved_to_zero + && h->root.type == bfd_link_hash_undefweak + && !bfd_elf_link_record_dynamic_symbol (info, h)) + return false; +@@ -9638,8 +9678,17 @@ elfNN_aarch64_finish_dynamic_symbol (bfd *output_bfd, + Elf_Internal_Sym *sym) + { + struct elf_aarch64_link_hash_table *htab; ++ struct elf_aarch64_link_hash_entry *eh; ++ bool local_undefweak; + htab = elf_aarch64_hash_table (info); + ++ eh = (struct elf_aarch64_link_hash_entry *) h; ++ ++ /* We keep PLT/GOT entries without dynamic PLT/GOT relocations for ++ resolved undefined weak symbols in executable so that their ++ references have value 0 at run-time. */ ++ local_undefweak = UNDEFINED_WEAK_RESOLVED_TO_ZERO (info, eh); ++ + if (h->plt.offset != (bfd_vma) - 1) + { + asection *plt, *gotplt, *relplt; +@@ -9674,7 +9723,7 @@ elfNN_aarch64_finish_dynamic_symbol (bfd *output_bfd, + return false; + + elfNN_aarch64_create_small_pltn_entry (h, htab, output_bfd, info); +- if (!h->def_regular) ++ if (!local_undefweak && !h->def_regular) + { + /* Mark the symbol as undefined, rather than as defined in + the .plt section. */ +@@ -9696,7 +9745,8 @@ elfNN_aarch64_finish_dynamic_symbol (bfd *output_bfd, + && elf_aarch64_hash_entry (h)->got_type == GOT_NORMAL + /* Undefined weak symbol in static PIE resolves to 0 without + any dynamic relocations. */ +- && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)) ++ && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h) ++ && !local_undefweak) + { + Elf_Internal_Rela rela; + bfd_byte *loc; +@@ -10343,6 +10393,9 @@ const struct elf_size_info elfNN_aarch64_size_info = + #define elf_backend_init_index_section \ + _bfd_elf_init_2_index_sections + ++#define elf_backend_fixup_symbol \ ++ elfNN_aarch64_elf_fixup_symbol ++ + #define elf_backend_finish_dynamic_sections \ + elfNN_aarch64_finish_dynamic_sections + +diff --git a/ld/emulparams/aarch64elf.sh b/ld/emulparams/aarch64elf.sh +index 8f68e517b45..260a590e69e 100644 +--- a/ld/emulparams/aarch64elf.sh ++++ b/ld/emulparams/aarch64elf.sh +@@ -1,3 +1,5 @@ ++source_sh ${srcdir}/emulparams/dynamic_undefined_weak.sh ++ + ARCH=aarch64 + MACHINE= + NOP=0x1f2003d5 +diff --git a/ld/emulparams/aarch64elf32.sh b/ld/emulparams/aarch64elf32.sh +index 5a08d9e29f1..e4c9abf85a1 100644 +--- a/ld/emulparams/aarch64elf32.sh ++++ b/ld/emulparams/aarch64elf32.sh +@@ -1,3 +1,5 @@ ++source_sh ${srcdir}/emulparams/dynamic_undefined_weak.sh ++ + ARCH="aarch64:ilp32" + MACHINE= + NOP=0x1f2003d5 +diff --git a/ld/emultempl/aarch64elf.em b/ld/emultempl/aarch64elf.em +index b647909ae63..3e2d7a171b9 100644 +--- a/ld/emultempl/aarch64elf.em ++++ b/ld/emultempl/aarch64elf.em +@@ -378,7 +378,7 @@ PARSE_AND_LIST_LONGOPTS=' + { "no-apply-dynamic-relocs", no_argument, NULL, OPTION_NO_APPLY_DYNAMIC_RELOCS}, + ' + +-PARSE_AND_LIST_OPTIONS=' ++PARSE_AND_LIST_OPTIONS=${PARSE_AND_LIST_OPTIONS}' + fprintf (file, _(" --no-enum-size-warning Don'\''t warn about objects with incompatible\n" + " enum sizes\n")); + fprintf (file, _(" --no-wchar-size-warning Don'\''t warn about objects with incompatible\n" +diff --git a/ld/emultempl/elf.em b/ld/emultempl/elf.em +index 71cec19fdc6..3fd0585dee6 100644 +--- a/ld/emultempl/elf.em ++++ b/ld/emultempl/elf.em +@@ -574,6 +574,7 @@ enum elf_options + OPTION_EXCLUDE_LIBS, + OPTION_HASH_STYLE, + OPTION_BUILD_ID, ++ OPTION_NX_MODULE_NAME, + OPTION_PACKAGE_METADATA, + OPTION_AUDIT, + OPTION_COMPRESS_DEBUG +@@ -605,6 +606,7 @@ EOF + fi + fragment <o->nx_module_name.name; ++ asec = t->o->nx_module_name.sec; ++ if (bfd_is_abs_section (asec->output_section)) ++ { ++ einfo (_("%P: warning: .nx-module-name section discarded," ++ " --build-id ignored\n")); ++ return true; ++ } ++ i_shdr = &elf_section_data (asec->output_section)->this_hdr; ++ ++ if (i_shdr->contents == NULL) ++ { ++ if (asec->contents == NULL) ++ asec->contents = (unsigned char *) xmalloc (asec->size); ++ contents = asec->contents; ++ } ++ else ++ contents = i_shdr->contents + asec->output_offset; ++ ++ size = asec->size; ++ bfd_h_put_32 (abfd, 0, &contents[0]); ++ bfd_h_put_32 (abfd, size - 9, &contents[4]); ++ memcpy (&contents[8], name, size - 9); ++ contents[size - 1] = 0; /* ensure null termination for AMS */ ++ ++ position = i_shdr->sh_offset + asec->output_offset; ++ ++ return (bfd_seek (abfd, position, SEEK_SET) == 0 ++ && bfd_write (contents, size, abfd) == size); ++} ++ ++/* Make .nx-module-name section, and set up elf_tdata->nx_module_name. */ ++ ++static bool ++setup_nx_module_name (bfd *ibfd, bfd *obfd) ++{ ++ asection *s; ++ bfd_size_type size; ++ flagword flags; ++ ++ if (ldelf_emit_nx_module_name[0] == '\0') ++ { ++ /* Extract the basename of the output bfd and use it as the module name. */ ++ char *dot_pos; ++ free ((char *) ldelf_emit_nx_module_name); ++ ldelf_emit_nx_module_name = (char *) lbasename (bfd_get_filename (obfd)); ++ ldelf_emit_nx_module_name = xstrdup (ldelf_emit_nx_module_name); ++ dot_pos = strrchr (ldelf_emit_nx_module_name, '.'); ++ if (dot_pos != NULL) ++ { ++ /* Remove extension. */ ++ *dot_pos = 0; ++ } ++ } ++ ++ size = 8 + strlen(ldelf_emit_nx_module_name) + 1; /* extra null terminator for AMS */ ++ flags = (SEC_ALLOC | SEC_LOAD | SEC_IN_MEMORY ++ | SEC_LINKER_CREATED | SEC_READONLY | SEC_DATA); ++ s = bfd_make_section_with_flags (ibfd, ".nx-module-name", flags); ++ if (s != NULL && bfd_set_section_alignment (s, 4)) ++ { ++ struct elf_obj_tdata *t = elf_tdata (link_info.output_bfd); ++ t->o->nx_module_name.after_write_object_contents = &write_nx_module_name; ++ t->o->nx_module_name.name = ldelf_emit_nx_module_name; ++ t->o->nx_module_name.sec = s; ++ elf_section_type (s) = SHT_PROGBITS; ++ s->size = size; ++ return true; ++ } ++ ++ einfo (_("%P: warning: cannot create .nx-module-name section," ++ " --nx-module-name ignored\n")); ++ return false; ++} ++ ++/* This is called before calling plugin 'all symbols read' hook. */ + void + ldelf_before_plugin_all_symbols_read (int use_libpath, int native, + int is_linux, int is_freebsd, +@@ -1289,6 +1377,24 @@ ldelf_after_open (int use_libpath, int native, int is_linux, int is_freebsd, + } + } + ++ if (ldelf_emit_nx_module_name != NULL) ++ { ++ /* Find an ELF input. */ ++ for (abfd = link_info.input_bfds; ++ abfd != (bfd *) NULL; abfd = abfd->link.next) ++ if (bfd_get_flavour (abfd) == bfd_target_elf_flavour ++ && bfd_count_sections (abfd) != 0 ++ && !((lang_input_statement_type *) abfd->usrdata)->flags.just_syms) ++ break; ++ ++ /* If there are no ELF input files do not try to create a .nx-module-name section. */ ++ if (abfd == NULL || !setup_nx_module_name (abfd, link_info.output_bfd)) ++ { ++ free ((char *) ldelf_emit_nx_module_name); ++ ldelf_emit_nx_module_name = NULL; ++ } ++ } ++ + get_elf_backend_data (link_info.output_bfd)->setup_gnu_properties (&link_info); + + /* Do not allow executable files to be used as inputs to the link. */ +diff --git a/ld/ldelf.h b/ld/ldelf.h +index 239194772c4..68516dbf45e 100644 +--- a/ld/ldelf.h ++++ b/ld/ldelf.h +@@ -20,6 +20,7 @@ + + extern const char *ldelf_emit_note_gnu_build_id; + extern const char *ldelf_emit_note_fdo_package_metadata; ++extern const char *ldelf_emit_nx_module_name; + + extern void ldelf_after_parse (void); + extern bool ldelf_load_symbols (lang_input_statement_type *); diff --git a/dka64/scripts/build-gcc.sh b/dka64/scripts/build-gcc.sh index 0efdb1f..3bace2c 100755 --- a/dka64/scripts/build-gcc.sh +++ b/dka64/scripts/build-gcc.sh @@ -62,7 +62,7 @@ then --enable-lto \ --disable-tm-clone-registry \ --disable-__cxa_atexit \ - --with-bugurl="https://github.com/devkitPro/buildscripts/issues" --with-pkgversion="devkitA64 release 24" \ + --with-bugurl="https://github.com/devkitPro/buildscripts/issues" --with-pkgversion="devkitA64 release 25" \ $CROSS_PARAMS \ $CROSS_GCC_PARAMS \ $EXTRA_GCC_PARAMS \ diff --git a/select_toolchain.sh b/select_toolchain.sh index c3877f3..b8abcae 100755 --- a/select_toolchain.sh +++ b/select_toolchain.sh @@ -50,7 +50,7 @@ case "$VERSION" in ;; "3" ) GCC_VER=13.2.0 - BINUTILS_VER=2.41 + BINUTILS_VER=2.42 NEWLIB_VER=4.3.0.20230120 basedir='dka64' package=devkitA64