From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from xry111.site (xry111.site [IPv6:2001:470:683e::1]) by sourceware.org (Postfix) with ESMTPS id 6B8343858D1E for ; Sat, 1 Oct 2022 13:07:53 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.1 sourceware.org 6B8343858D1E Authentication-Results: sourceware.org; dmarc=pass (p=reject dis=none) header.from=xry111.site Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=xry111.site DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=xry111.site; s=default; t=1664629670; bh=1Gy8K4Yrif0z1b3Z/85GVQwfDpKk+rMkzwz2q/smozc=; h=Subject:From:To:Cc:Date:In-Reply-To:References:From; b=gKw5E7FP2B0H2ZS9gMmiHimhfj+Fn1Z6rn4ZWXsWIpezHWnfnvYHxRKgKfrm1FaCk TDGPshMq3eV41qYnuQUBgn6IolVB9XVvff1nzQcZAkG5bXvNInQkNrb0ua//dTTpTJ 2EetDsjsu7BPVZQhQl41BC7vj/IuP5HlBPSeqj/I= Received: from [IPv6:240e:358:1175:c700:dc73:854d:832e:3] (unknown [IPv6:240e:358:1175:c700:dc73:854d:832e:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature ECDSA (P-384) server-digest SHA384) (Client did not present a certificate) (Authenticated sender: xry111@xry111.site) by xry111.site (Postfix) with ESMTPSA id 0186165C9C; Sat, 1 Oct 2022 09:07:42 -0400 (EDT) Message-ID: <04dfd5e79a0fa36458dc720d08095fec4ba737dc.camel@xry111.site> Subject: Re: [PATCH v3 1/1] LoongArch: Add static PIE support From: Xi Ruoyao To: Joseph Myers , Adhemerval Zanella Netto Cc: caiyinyu , libc-alpha@sourceware.org, Chenghua Xu , Lulu Cheng , Wang Xuerui , liuzhensong Date: Sat, 01 Oct 2022 21:07:34 +0800 In-Reply-To: References: <20220924074534.1566173-1-xry111@xry111.site> <20220924074534.1566173-2-xry111@xry111.site> <3848ed3c5915a2363ffa8bdd43f74152da125885.camel@xry111.site> <4538abfd-ec05-bab5-1759-e3b12c6f1eed@linaro.org> Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable User-Agent: Evolution 3.46.0 MIME-Version: 1.0 X-Spam-Status: No, score=-2.2 required=5.0 tests=BAYES_00,DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FROM_SUSPICIOUS_NTLD,LIKELY_SPAM_FROM,SPF_HELO_PASS,SPF_PASS,TXREP,T_PDS_OTHER_BAD_TLD autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org List-Id: On Fri, 2022-09-30 at 20:10 +0000, Joseph Myers wrote: > It appears this has broken the build with binutils 2.39 branch, the=20 > default used by build-many-glibcs.py.=C2=A0 Either the configure test sho= uld be=20 > made stricter so it doesn't pass for binutils 2.39, or some relevant bug= =20 > fix should be backported to binutils 2.39 branch. >=20 > Building the glibc testsuite, the error is: >=20 > collect2: fatal error: ld terminated with signal 11 [Segmentation fault],= core dumped > compilation terminated. > ../Rules:301: recipe for target '/scratch/jmyers/glibc-bot/build/glibcs/l= oongarch64-linux-gnu-lp64d/glibc/elf/ifuncmain1static' failed >=20 > But it also causes the second GCC build in the build-many-glibcs.py=20 > "compilers" build to fail, if such a build is run with glibc including > this change. On my system I get a better error message: /home/xry111/git-repos/glibc-t/install/compilers/loongarch64-linux-gnu-lp64= d/sysroot/usr/lib64/crt1.o(.text+0x30): error: R_LARCH_SOP_PUSH_PCREL again= st `__libc_start_main@@GLIBC_2.36': PLT shouldn't be with r_addend. collect2: error: ld returned 1 exit status Looks like crt1.o contains a PCREL relocation to __libc_start_main, despite it's not supported by binutils-2.39 and I expected that such a relocation should be only generated in rcrt1.o... Will investigate. --=20 Xi Ruoyao School of Aerospace Science and Technology, Xidian University