binutils-gdb/ld/emultempl
Alan Modra f420c9c84e bit-rot in target before_parse function
Copy initialisation over from the elf.em before_parse.  Commit
ba951afb99 2022-05-03 changed behaviour on arm and score regarding
exec stack.  This patch restores the previous behaviour.

	* emultempl/aarch64elf.em (before_parse): Init separate_code,
	warn_execstack, no_warn_rwx_segments and default_execstack.
	* emultempl/armelf.em (before_parse): Likewise.
	* emultempl/scoreelf.em (before_parse): Likewise.
	* testsuite/ld-elf/elf.exp (target_defaults_to_execstack): Return
	true for arm and nacl.
2022-05-26 20:34:32 +09:30
..
aarch64elf.em bit-rot in target before_parse function 2022-05-26 20:34:32 +09:30
aix.em xcoff: implement linker relaxation 2022-04-20 15:11:47 +01:00
alphaelf.em
arclinux.em
armelf.em bit-rot in target before_parse function 2022-05-26 20:34:32 +09:30
astring.sed
avrelf.em Add linker warning for when it creates an executable stack. 2022-04-20 13:39:05 +01:00
beos.em
bfin.em
cr16elf.em
crxelf.em
cskyelf.em
elf-generic.em
elf-x86.em Revert "PR28824, relro security issues, x86 keep COMMONPAGESIZE relro" 2022-02-14 17:39:34 -08:00
elf.em ld: add --package-metadata 2022-05-26 12:56:12 +09:30
emulation.em ld: Add a before_plugin_all_symbols_read hook 2022-03-09 18:23:43 -08:00
epiphanyelf_4x4.em
genelf.em
generic.em
hppaelf.em
ia64elf.em
irix.em
loongarchelf.em
m68hc1xelf.em
m68kelf.em
metagelf.em
mipself.em
mmix-elfnmmo.em
mmixelf.em
mmo.em
msp430.em
nds32elf.em
needrelax.em
netbsd.em
nios2elf.em
ostring.sed
pdp11.em
pe.em
pep.em
ppc32elf.em
ppc64elf.em
pruelf.em
README
riscvelf.em
rxelf.em
rxlinux.em
s390.em
scoreelf.em bit-rot in target before_parse function 2022-05-26 20:34:32 +09:30
solaris2-x86.em
solaris2.em
spu_icache.o_c
spu_icache.S
spu_ovl.o_c
spu_ovl.S
spuelf.em
tic6xdsbt.em
ticoff.em
v850elf.em
vanilla.em
vms.em
vxworks.em
xtensaelf.em
z80.em

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

The files in this directory are sourced by genscripts.sh, after
setting some variables to substitute in, to produce
C source files that contain jump tables for each emulation.

Copyright (C) 2012-2022 Free Software Foundation, Inc.

Copying and distribution of this file, with or without modification,
are permitted in any medium without royalty provided the copyright
notice and this notice are preserved.