[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: port-arm32/50218: ARM executables linked with native linker on cortex-a9 raises SIGILL
The following reply was made to PR port-arm32/50218; it has been noted by GNATS.
From: Martin Husemann <martin%duskware.de@localhost>
To: Zaid Ibrahime <mzaidibrahime%gmail.com@localhost>
Subject: Re: port-arm32/50218: ARM executables linked with native linker on cortex-a9 raises SIGILL
Date: Tue, 8 Sep 2015 08:58:29 +0200
On Tue, Sep 08, 2015 at 11:12:40AM +0530, Zaid Ibrahime wrote:
> > Small programs(<6K size) does not result in SIGILL as all the
> instruction are properly swapped for endianness by the linker.
> > Are you sure that it depends on size of the program?
Are you building from a single c source, or from libs?
My bet is the swapping happens fine for c source or "normal" objects,
but you are using some lib that has been partially stripped, which kills
the $t/$a markers. libgcc was one of those libraries (untill fixed)
Main Index |
Thread Index |