NetBSD-Bugs archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: port-arm32/50218: ARM executables linked with native linker on cortex-a9 raises SIGILL



The following reply was made to PR port-arm32/50218; it has been noted by GNATS.

From: Martin Husemann <martin%duskware.de@localhost>
To: Zaid Ibrahime <mzaidibrahime%gmail.com@localhost>
Cc: gnats-bugs%netbsd.org@localhost
Subject: Re: port-arm32/50218: ARM executables linked with native linker on cortex-a9 raises SIGILL
Date: Tue, 8 Sep 2015 08:58:29 +0200

 On Tue, Sep 08, 2015 at 11:12:40AM +0530, Zaid Ibrahime wrote:
 >  > Small programs(<6K size) does not result in SIGILL as all the
 > instruction are properly swapped for endianness by the linker.
 > 
 >  > Are you sure that it depends on size of the program?
 
 Are you building from a single c source, or from libs?
 My bet is the swapping happens fine for c source or "normal" objects,
 but you are using some lib that has been partially stripped, which kills
 the $t/$a markers. libgcc was one of those libraries (untill fixed)
 
 Martin
 


Home | Main Index | Thread Index | Old Index