File: aarch64elf.em

package info (click to toggle)
binutils 2.46-3
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 417,728 kB
  • sloc: ansic: 1,487,513; asm: 829,455; cpp: 216,692; exp: 80,527; makefile: 73,165; sh: 24,213; yacc: 15,060; lisp: 13,632; perl: 13,404; lex: 1,714; ada: 1,681; pascal: 1,446; cs: 879; python: 638; java: 478; sed: 191; xml: 95; awk: 25
file content (654 lines) | stat: -rw-r--r-- 23,141 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
# This shell script emits a C file. -*- C -*-
#   Copyright (C) 2009-2026 Free Software Foundation, Inc.
#   Contributed by ARM Ltd.
#
# This file is part of the GNU Binutils.
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 3 of the license, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; see the file COPYING3. If not,
# see <http://www.gnu.org/licenses/>.
#

# This file is sourced from elf.em, and defines extra aarch64-elf
# specific routines.
#
fragment <<EOF

#include "ldctor.h"
#include "elf/aarch64.h"
#include "elfxx-aarch64.h"

static int no_enum_size_warning = 0;
static int no_wchar_size_warning = 0;
static int pic_veneer = 0;
static int fix_erratum_835769 = 0;
static erratum_84319_opts fix_erratum_843419 = ERRAT_NONE;
static int no_apply_dynamic_relocs = 0;
static aarch64_protection_opts sw_protections = {
  .plt_type = PLT_NORMAL,
  .bti_report = MARKING_WARN,
  .gcs_type = GCS_IMPLICIT,
  .gcs_report = MARKING_UNSET,
  .gcs_report_dynamic = MARKING_UNSET,
};

static aarch64_memtag_opts memtag_opts = {
  .memtag_mode = AARCH64_MEMTAG_MODE_NONE,
  .memtag_stack = 0,
};

#define COMPILE_TIME_STRLEN(s) \
  (sizeof(s) - 1)

static void
gld${EMULATION_NAME}_before_parse (void)
{
#ifndef TARGET_			/* I.e., if not generic.  */
  ldfile_set_output_arch ("`echo ${ARCH}`", bfd_arch_unknown);
#endif /* not TARGET_ */
  input_flags.dynamic = ${DYNAMIC_LINK-true};
  config.has_shared = `if test -n "$GENERATE_SHLIB_SCRIPT" ; then echo true ; else echo false ; fi`;
  config.separate_code = `if test "x${SEPARATE_CODE}" = xyes ; then echo true ; else echo false ; fi`;
  link_info.check_relocs_after_open_input = true;
EOF
if test -n "$COMMONPAGESIZE"; then
fragment <<EOF
  link_info.relro = DEFAULT_LD_Z_RELRO;
EOF
fi
fragment <<EOF
  link_info.separate_code = DEFAULT_LD_Z_SEPARATE_CODE;
  link_info.warn_execstack = DEFAULT_LD_WARN_EXECSTACK;
  link_info.no_warn_rwx_segments = ! DEFAULT_LD_WARN_RWX_SEGMENTS;
  link_info.default_execstack = DEFAULT_LD_EXECSTACK;
}

static void
aarch64_elf_before_allocation (void)
{
  /* We should be able to set the size of the interworking stub section.  We
     can't do it until later if we have dynamic sections, though.  */
  if (! elf_hash_table (&link_info)->dynamic_sections_created)
    {
      /* Here we rummage through the found bfds to collect information.  */
      LANG_FOR_EACH_INPUT_STATEMENT (is)
      {
	/* Initialise mapping tables for code/data.  */
	bfd_elf${ELFSIZE}_aarch64_init_maps (is->the_bfd);
      }
    }

  /* Call the standard elf routine.  */
  gld${EMULATION_NAME}_before_allocation ();
}

/* Fake input file for stubs.  */
static lang_input_statement_type *stub_file;

/* Whether we need to call gldarm_layout_sections_again.  */
static int need_laying_out = 0;

/* Maximum size of a group of input sections that can be handled by
   one stub section.  A value of +/-1 indicates the bfd back-end
   should use a suitable default size.  */
static bfd_signed_vma group_size = 1;

struct hook_stub_info
{
  lang_statement_list_type add;
  asection *input_section;
};

/* Traverse the linker tree to find the spot where the stub goes.  */

static bool
hook_in_stub (struct hook_stub_info *info, lang_statement_union_type **lp)
{
  lang_statement_union_type *l;
  bool ret;

  for (; (l = *lp) != NULL; lp = &l->header.next)
    {
      switch (l->header.type)
	{
	case lang_constructors_statement_enum:
	  ret = hook_in_stub (info, &constructor_list.head);
	  if (ret)
	    return ret;
	  break;

	case lang_output_section_statement_enum:
	  ret = hook_in_stub (info,
			      &l->output_section_statement.children.head);
	  if (ret)
	    return ret;
	  break;

	case lang_wild_statement_enum:
	  ret = hook_in_stub (info, &l->wild_statement.children.head);
	  if (ret)
	    return ret;
	  break;

	case lang_group_statement_enum:
	  ret = hook_in_stub (info, &l->group_statement.children.head);
	  if (ret)
	    return ret;
	  break;

	case lang_input_section_enum:
	  if (l->input_section.section == info->input_section)
	    {
	      /* We've found our section.  Insert the stub immediately
		 after its associated input section.  */
	      *(info->add.tail) = l->header.next;
	      l->header.next = info->add.head;
	      return true;
	    }
	  break;

	case lang_data_statement_enum:
	case lang_reloc_statement_enum:
	case lang_object_symbols_statement_enum:
	case lang_output_statement_enum:
	case lang_target_statement_enum:
	case lang_input_statement_enum:
	case lang_assignment_statement_enum:
	case lang_padding_statement_enum:
	case lang_address_statement_enum:
	case lang_fill_statement_enum:
	  break;

	default:
	  FAIL ();
	  break;
	}
    }
  return false;
}


/* Call-back for elf${ELFSIZE}_aarch64_size_stubs.  */

/* Create a new stub section, and arrange for it to be linked
   immediately after INPUT_SECTION.  */

static asection *
elf${ELFSIZE}_aarch64_add_stub_section (const char *stub_sec_name,
					asection *input_section)
{
  asection *stub_sec;
  flagword flags;
  asection *output_section;
  lang_output_section_statement_type *os;
  struct hook_stub_info info;

  flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_CODE
	   | SEC_HAS_CONTENTS | SEC_RELOC | SEC_IN_MEMORY | SEC_KEEP);
  stub_sec = bfd_make_section_anyway_with_flags (stub_file->the_bfd,
						 stub_sec_name, flags);
  if (stub_sec == NULL)
    goto err_ret;

  /* Long branch stubs contain a 64-bit address, so the section requires
     8 byte alignment.  */
  bfd_set_section_alignment (stub_sec, 3);

  output_section = input_section->output_section;
  os = lang_output_section_get (output_section);

  info.input_section = input_section;
  lang_list_init (&info.add);
  lang_add_section (&info.add, stub_sec, NULL, NULL, os);

  if (info.add.head == NULL)
    goto err_ret;

  if (hook_in_stub (&info, &os->children.head))
    return stub_sec;

 err_ret:
  einfo (_("%X%P: can not make stub section: %E\n"));
  return NULL;
}

/* Another call-back for elf${ELFSIZE}_aarch64_size_stubs.  */

static void
gldaarch64_layout_sections_again (void)
{
  /* If we have changed sizes of the stub sections, then we need
     to recalculate all the section offsets.  This may mean we need to
     add even more stubs.  */
  ldelf_map_segments (true);
  need_laying_out = -1;
}

static void
build_section_lists (lang_statement_union_type *statement)
{
  if (statement->header.type == lang_input_section_enum)
    {
      asection *i = statement->input_section.section;

      if (!bfd_input_just_syms (i->owner)
	  && (i->flags & SEC_EXCLUDE) == 0
	  && i->output_section != NULL
	  && i->output_section->owner == link_info.output_bfd)
	elf${ELFSIZE}_aarch64_next_input_section (& link_info, i);
    }
}

static void
gld${EMULATION_NAME}_after_allocation (void)
{
  int ret;

  /* bfd_elf32_discard_info just plays with debugging sections,
     ie. doesn't affect any code, so we can delay resizing the
     sections.  It's likely we'll resize everything in the process of
     adding stubs.  */
  ret = bfd_elf_discard_info (link_info.output_bfd, & link_info);
  if (ret < 0)
    {
      einfo (_("%X%P: .eh_frame/.stab edit: %E\n"));
      return;
    }
  else if (ret > 0)
    need_laying_out = 1;

  /* If generating a relocatable output file, then we don't
     have to examine the relocs.  */
  if (stub_file != NULL && !bfd_link_relocatable (&link_info))
    {
      ret = elf${ELFSIZE}_aarch64_setup_section_lists (link_info.output_bfd,
						       &link_info);
      if (ret != 0)
	{
	  if (ret < 0)
	    {
	      einfo (_("%X%P: could not compute sections lists "
		       "for stub generation: %E\n"));
	      return;
	    }

	  lang_for_each_statement (build_section_lists);

	  /* Call into the BFD backend to do the real work.  */
	  if (! elf${ELFSIZE}_aarch64_size_stubs (link_info.output_bfd,
					  stub_file->the_bfd,
					  & link_info,
					  group_size,
					  & elf${ELFSIZE}_aarch64_add_stub_section,
					  & gldaarch64_layout_sections_again))
	    {
	      einfo (_("%X%P: can not size stub section: %E\n"));
	      return;
	    }
	}
    }

  if (need_laying_out != -1)
    ldelf_map_segments (need_laying_out);
}

static void
gld${EMULATION_NAME}_finish (void)
{
  if (!bfd_link_relocatable (&link_info))
    {
      /* Now build the linker stubs.  */
      if (stub_file->the_bfd->sections != NULL)
	{
	  if (! elf${ELFSIZE}_aarch64_build_stubs (& link_info))
	    einfo (_("%X%P: can not build stubs: %E\n"));
	}
    }

  ldelf_finish ();
}

/* This is a convenient point to tell BFD about target specific flags.
   After the output has been created, but before inputs are read.  */
static void
aarch64_elf_create_output_section_statements (void)
{
  if (strstr (bfd_get_target (link_info.output_bfd), "aarch64") == NULL)
    {
      /* The AArch64 backend needs special fields in the output hash structure.
	 These will only be created if the output format is an AArch64 format,
	 hence we do not support linking and changing output formats at the
	 same time.  Use a link followed by objcopy to change output formats.  */
      fatal (_("%P: error: cannot change output format "
	       "whilst linking %s binaries\n"), "AArch64");
      return;
    }

  bfd_elf${ELFSIZE}_aarch64_set_options (link_info.output_bfd, &link_info,
				 no_enum_size_warning,
				 no_wchar_size_warning,
				 pic_veneer,
				 fix_erratum_835769, fix_erratum_843419,
				 no_apply_dynamic_relocs,
				 &sw_protections,
				 &memtag_opts);

  stub_file = lang_add_input_file ("linker stubs",
				   lang_input_file_is_fake_enum,
				   NULL);
  stub_file->the_bfd = bfd_create ("linker stubs", link_info.output_bfd);
  if (stub_file->the_bfd == NULL
      || ! bfd_set_arch_mach (stub_file->the_bfd,
			      bfd_get_arch (link_info.output_bfd),
			      bfd_get_mach (link_info.output_bfd)))
    {
      fatal (_("%P: can not create BFD: %E\n"));
      return;
    }

  stub_file->the_bfd->flags |= BFD_LINKER_CREATED;
  ldlang_add_file (stub_file);
}

static bool
aarch64_parse_feature_report_option (const char *_optarg,
				     const char *report_opt,
				     const size_t report_opt_len,
				     bool allow_empty_value,
				     aarch64_feature_marking_report *level)
{
  if (strncmp (_optarg, report_opt, report_opt_len) != 0)
    return false;

  if (strcmp (_optarg + report_opt_len, "=warning") == 0)
    *level = MARKING_WARN;
  else if (strcmp (_optarg + report_opt_len, "=none") == 0)
    *level = MARKING_NONE;
  else if (strcmp (_optarg + report_opt_len, "=error") == 0)
    *level = MARKING_ERROR;
  else if (allow_empty_value && strlen (_optarg) == report_opt_len)
    *level = MARKING_WARN;
  else
    einfo (_("%X%P: error: unrecognized value '-z %s'\n"), _optarg);

  return true;
}

static bool
aarch64_parse_bti_report_option (const char *_optarg)
{
  #define BTI_REPORT      "bti-report"
  #define BTI_REPORT_LEN  COMPILE_TIME_STRLEN (BTI_REPORT)

  return aarch64_parse_feature_report_option (_optarg, BTI_REPORT,
    BTI_REPORT_LEN, true, &sw_protections.bti_report);

  #undef BTI_REPORT
  #undef BTI_REPORT_LEN
}

static bool
aarch64_parse_gcs_report_option (const char *_optarg)
{
  #define GCS_REPORT      "gcs-report"
  #define GCS_REPORT_LEN  COMPILE_TIME_STRLEN (GCS_REPORT)

  return aarch64_parse_feature_report_option (_optarg, GCS_REPORT,
    GCS_REPORT_LEN, true, &sw_protections.gcs_report);

  #undef GCS_REPORT
  #undef GCS_REPORT_LEN
}

static bool
aarch64_parse_gcs_report_dynamic_option (const char *_optarg)
{
  #define GCS_REPORT_DYNAMIC      "gcs-report-dynamic"
  #define GCS_REPORT_DYNAMIC_LEN  COMPILE_TIME_STRLEN (GCS_REPORT_DYNAMIC)

  return aarch64_parse_feature_report_option (_optarg, GCS_REPORT_DYNAMIC,
    GCS_REPORT_DYNAMIC_LEN, true, &sw_protections.gcs_report_dynamic);

  #undef GCS_REPORT_DYNAMIC
  #undef GCS_REPORT_DYNAMIC_LEN
}

static bool
aarch64_parse_gcs_option (const char *_optarg)
{
  #define GCS      "gcs"
  #define GCS_LEN  COMPILE_TIME_STRLEN (GCS)

  if (strncmp (_optarg, GCS, GCS_LEN) != 0)
    return false;

  if (strcmp (_optarg + GCS_LEN, "=always") == 0)
    sw_protections.gcs_type = GCS_ALWAYS;
  else if (strcmp (_optarg + GCS_LEN, "=never") == 0)
    sw_protections.gcs_type = GCS_NEVER;
  else if (strcmp (_optarg + GCS_LEN, "=implicit") == 0)
    sw_protections.gcs_type = GCS_IMPLICIT;
  else
    einfo (_("%X%P: error: unrecognized value '-z %s'\n"), _optarg);

  return true;

  #undef GCS
  #undef GCS_LEN
}

static bool
aarch64_parse_memtag_mode_option (const char *_optarg)
{
  #define MEMTAG_MODE      "memtag-mode"
  #define MEMTAG_MODE_LEN  COMPILE_TIME_STRLEN (MEMTAG_MODE)

  if (strncmp (_optarg, MEMTAG_MODE, MEMTAG_MODE_LEN) != 0)
    return false;

  if (strcmp (_optarg + MEMTAG_MODE_LEN, "=none") == 0)
    memtag_opts.memtag_mode = AARCH64_MEMTAG_MODE_NONE;
  else if (strcmp (_optarg + MEMTAG_MODE_LEN, "=sync") == 0)
    memtag_opts.memtag_mode = AARCH64_MEMTAG_MODE_SYNC;
  else if (strcmp (_optarg + MEMTAG_MODE_LEN, "=async") == 0)
    memtag_opts.memtag_mode = AARCH64_MEMTAG_MODE_ASYNC;
  else
    einfo (_("%X%P: error: unrecognized value '-z %s'\n"), _optarg);

  return true;

  #undef MEMTAG_MODE
  #undef MEMTAG_MODE_LEN
}

EOF

# Define some shell vars to insert bits of code into the standard elf
# parse_args and list_options functions.
#
PARSE_AND_LIST_SHORTOPTS=p

PARSE_AND_LIST_LONGOPTS='
  { "no-pipeline-knowledge", no_argument, NULL, '\'p\''},
  { "no-enum-size-warning", no_argument, NULL, OPTION_NO_ENUM_SIZE_WARNING},
  { "pic-veneer", no_argument, NULL, OPTION_PIC_VENEER},
  { "stub-group-size", required_argument, NULL, OPTION_STUBGROUP_SIZE },
  { "no-wchar-size-warning", no_argument, NULL, OPTION_NO_WCHAR_SIZE_WARNING},
  { "fix-cortex-a53-835769", no_argument, NULL, OPTION_FIX_ERRATUM_835769},
  { "fix-cortex-a53-843419", optional_argument, NULL, OPTION_FIX_ERRATUM_843419},
  { "no-apply-dynamic-relocs", no_argument, NULL, OPTION_NO_APPLY_DYNAMIC_RELOCS},
  { "discard-sframe", no_argument, NULL, OPTION_DISCARD_SFRAME},
'

PARSE_AND_LIST_OPTIONS='
  fprintf (file, _("  --no-enum-size-warning      Don'\''t warn about objects with incompatible\n"
		   "                                enum sizes\n"));
  fprintf (file, _("  --no-wchar-size-warning     Don'\''t warn about objects with incompatible\n"
		   "                                wchar_t sizes\n"));
  fprintf (file, _("  --pic-veneer                Always generate PIC interworking veneers\n"));
  fprintf (file, _("  --discard-sframe            Don'\''t generate SFrame stack trace info in output\n"));
  fprintf (file, _("\
  --stub-group-size=N         Maximum size of a group of input sections that\n\
                                can be handled by one stub section.  A negative\n\
                                value locates all stubs after their branches\n\
                                (with a group size of -N), while a positive\n\
                                value allows two groups of input sections, one\n\
                                before, and one after each stub section.\n\
                                Values of +/-1 indicate the linker should\n\
                                choose suitable defaults.\n"));
  fprintf (file, _("  --fix-cortex-a53-835769      Fix erratum 835769\n"));
  fprintf (file, _("\
  --fix-cortex-a53-843419[=full|adr|adrp]      Fix erratum 843419 and optionally specify which workaround to use.\n\
                                               full (default): Use both ADRP and ADR workaround, this will \n\
                                                 increase the size of your binaries.\n\
                                               adr: Only use the ADR workaround, this will not cause any increase\n\
                                                 in binary size but linking will fail if the referenced address is\n\
                                                 out of range of an ADR instruction.  This will remove the need of using\n\
                                                 a veneer and results in both performance and size benefits.\n\
                                               adrp: Use only the ADRP workaround, this will never rewrite your ADRP\n\
                                                 instruction into an ADR.  As such the workaround will always use a\n\
                                                 veneer and this will give you both a performance and size overhead.\n"));
  fprintf (file, _("  --no-apply-dynamic-relocs    Do not apply link-time values for dynamic relocations\n"));
  fprintf (file, _("\
  -z force-bti                         Turn on Branch Target Identification mechanism and generate PLTs with BTI.\n\
                                         Generate warnings for missing BTI markings on inputs\n"));
  fprintf (file, _("\
  -z bti-report[=none|warning|error]   Emit warning/error on mismatch of BTI marking between input objects and ouput.\n\
                                         none: Does not emit any warning/error messages.\n\
                                         warning (default): Emit warning when the input objects are missing BTI markings\n\
                                           and output has BTI marking.\n\
                                         error: Emit error when the input objects are missing BTI markings\n\
                                           and output has BTI marking.\n"));
  fprintf (file, _("\
  -z pac-plt                           Protect PLTs with Pointer Authentication.\n"));
  fprintf (file, _("\
  -z gcs=[always|never|implicit]       Controls whether the output supports the Guarded Control Stack (GCS) mechanism.\n\
                                         implicit (default if '\''-z gcs'\'' is omitted): deduce GCS from input objects.\n\
                                         always: always marks the output with GCS.\n\
                                         never: never marks the output with GCS.\n"));
  fprintf (file, _("\
  -z gcs-report[=none|warning|error]   Emit warning/error on mismatch of GCS marking between input objects and ouput.\n\
                                         none: Does not emit any warning/error messages.\n\
                                         warning (default): Emit warning when the input objects are missing GCS markings\n\
                                           and output have GCS marking.\n\
                                         error: Emit error when the input objects are missing GCS markings\n\
                                           and output have GCS marking.\n"));
  fprintf (file, _("\
  -z gcs-report-dynamic=none|warning|error   Emit warning/error on mismatch of GCS marking between the current link\n\
                                             unit and input dynamic objects.\n\
                                               none: Does not emit any warning/error messages.\n\
                                               warning: Emit warning when the input objects are missing GCS markings\n\
                                                 and output have GCS marking.\n\
                                               error: Emit error when the input objects are missing GCS markings\n\
                                                 and output have GCS marking.\n"));
  fprintf (file, _("\
  -z memtag-mode[=none|sync|async]     Select Memory Tagging Extension mode of operation to use.\n\
                                       Emits a DT_AARCH64_MEMTAG_MODE dynamic tag for the binary.\n\
                                       This entry is only valid on the main executable.  It is\n\
                                       ignored in the dynamically loaded objects by the loader.\n\
                                         none (default): Disable MTE checking of memory reads and writes.\n\
                                         sync: Enable precise exceptions when mismatched address and\n\
                                               allocation tags detected on load/store operations.\n\
                                         async: Enable imprecise exceptions.\n"));
  fprintf (file, _("\
  -z memtag-stack               Mark program stack with MTE protection.\n"));
'

PARSE_AND_LIST_ARGS_CASE_Z_AARCH64='
     else if (strcmp (optarg, "force-bti") == 0)
	sw_protections.plt_type |= PLT_BTI;
     else if (aarch64_parse_bti_report_option (optarg))
	{}
     else if (strcmp (optarg, "pac-plt") == 0)
	sw_protections.plt_type |= PLT_PAC;
     else if (aarch64_parse_gcs_report_dynamic_option (optarg))
	{}
     else if (aarch64_parse_gcs_report_option (optarg))
	{}
     else if (aarch64_parse_gcs_option (optarg))
	{}
     else if (aarch64_parse_memtag_mode_option (optarg))
	{}
     else if (strcmp (optarg, "memtag-stack") == 0)
	memtag_opts.memtag_stack = 1;
'
PARSE_AND_LIST_ARGS_CASE_Z="$PARSE_AND_LIST_ARGS_CASE_Z $PARSE_AND_LIST_ARGS_CASE_Z_AARCH64"

PARSE_AND_LIST_ARGS_CASES='
    case '\'p\'':
      /* Only here for backwards compatibility.  */
      break;

    case OPTION_NO_ENUM_SIZE_WARNING:
      no_enum_size_warning = 1;
      break;

    case OPTION_NO_WCHAR_SIZE_WARNING:
      no_wchar_size_warning = 1;
      break;

    case OPTION_PIC_VENEER:
      pic_veneer = 1;
      break;

    case OPTION_FIX_ERRATUM_835769:
      fix_erratum_835769 = 1;
      break;

    case OPTION_FIX_ERRATUM_843419:
      fix_erratum_843419 = ERRAT_ADR | ERRAT_ADRP;
      if (optarg && *optarg)
	{
	  if (strcmp ("full", optarg) == 0)
	    fix_erratum_843419 = ERRAT_ADR | ERRAT_ADRP;
	  else if (strcmp ("adrp", optarg) == 0)
	    fix_erratum_843419 = ERRAT_ADRP;
	  else if (strcmp ("adr", optarg) == 0)
	    fix_erratum_843419 = ERRAT_ADR;
	  else
	    einfo (_("%P: error: unrecognized option for "
		     "--fix-cortex-a53-843419: %s\n"), optarg);
	}
      break;

    case OPTION_NO_APPLY_DYNAMIC_RELOCS:
      no_apply_dynamic_relocs = 1;
      break;

    case OPTION_STUBGROUP_SIZE:
      {
	const char *end;

	group_size = bfd_scan_vma (optarg, &end, 0);
	if (*end)
	  fatal (_("%P: invalid number `%s'\''\n"), optarg);
      }
      break;

    case OPTION_DISCARD_SFRAME:
      link_info.discard_sframe = true;
      break;

'

# We have our own before_allocation etc. functions, but they call
# the standard routines, so give them a different name.
LDEMUL_BEFORE_ALLOCATION=aarch64_elf_before_allocation
LDEMUL_AFTER_ALLOCATION=gld${EMULATION_NAME}_after_allocation
LDEMUL_CREATE_OUTPUT_SECTION_STATEMENTS=aarch64_elf_create_output_section_statements

# Replace the elf before_parse function with our own.
LDEMUL_BEFORE_PARSE=gld"${EMULATION_NAME}"_before_parse

# Call the extra arm-elf function
LDEMUL_FINISH=gld${EMULATION_NAME}_finish