From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from phobos.denx.de (phobos.denx.de [85.214.62.61]) by sourceware.org (Postfix) with ESMTPS id 43CA43858D39 for ; Tue, 26 Oct 2021 13:52:37 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.1 sourceware.org 43CA43858D39 Authentication-Results: sourceware.org; dmarc=none (p=none dis=none) header.from=denx.de Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=denx.de Received: from ktm (85-222-111-42.dynamic.chello.pl [85.222.111.42]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) (Authenticated sender: lukma@denx.de) by phobos.denx.de (Postfix) with ESMTPSA id 02DDC80F1A; Tue, 26 Oct 2021 15:52:34 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=denx.de; s=phobos-20191101; t=1635256355; bh=f0Y4SQtYlJS5W+rhBVIstqzy5GCt99q8/eV5OuTUBSc=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=pPeI7aft1a5u/whFI4Uyv2ECmsibAGHQcD2yAAZiqkz8pYjQdtVY1D0J7DZEh2HQS dkX13Mgy6HtO+Bo1a+wYkZRdfE4nl38e7Ix4+oXV2nG73m2cmjhgIPrlJsTjdIO5zS q4+1Wb4x3c8iwoYJYYOksoSmS0AL+HoftMgpYNJgfNxMAxZx8c3GFGxT0gjD3TPCP/ Tqf9CPpHiTZOkqWzXGNWGKIEXV396mJ8FvJof6K4r9finYJU0e5n63X+1m4yBGYBD8 CjpvlEtv0FrOjj3fEKdGQOqc+XDikF9gCn9ElrSx0rcvDL2dSA2nkNrH29R7NuHWM1 0mhy7v2+SyOXw== Date: Tue, 26 Oct 2021 15:52:27 +0200 From: Lukasz Majewski To: Joseph Myers , Szabolcs Nagy Cc: Florian Weimer , "libc-alpha@sourceware.org" , Patches and discussions about the oe-core layer , Andreas Schwab Subject: Re: [PATCH v2] dl: Use "adr" assembler command to get proper load address on ARM Message-ID: <20211026155227.302d53b3@ktm> In-Reply-To: References: <20211015145831.5d0fafcd@ktm> <20211018110818.GE1982710@arm.com> <871r4iftvc.fsf@oldenburg.str.redhat.com> <20211025121819.16f63048@ktm> <878ryhwgd7.fsf@oldenburg.str.redhat.com> <20211025125307.1fa34445@ktm> <20211025133425.GN1982710@arm.com> <20211025160444.09f0c5e0@ktm> <20211025150904.GO1982710@arm.com> Organization: denx.de X-Mailer: Claws Mail 3.18.0 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; boundary="Sig_/OKRpRjSuhwGhP8Vkx1O5S5P"; protocol="application/pgp-signature" X-Virus-Scanned: clamav-milter 0.103.2 at phobos.denx.de X-Virus-Status: Clean X-Spam-Status: No, score=-2.3 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, RCVD_IN_BARRACUDACENTRAL, SPF_HELO_NONE, SPF_PASS, TXREP autolearn=no autolearn_force=no version=3.4.4 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on server2.sourceware.org X-BeenThere: libc-alpha@sourceware.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Libc-alpha mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 26 Oct 2021 13:52:39 -0000 --Sig_/OKRpRjSuhwGhP8Vkx1O5S5P Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: quoted-printable Hi Joseph, Szabolcs=20 > On Mon, 25 Oct 2021, Szabolcs Nagy via Libc-alpha wrote: >=20 > > ok, i think we need the patches upstream for that like > > https://sourceware.org/pipermail/libc-alpha/2015-November/066153.html > > =20 >=20 > The AArch64 prelink support isn't in the upstream Yocto > cross-prelink, and the version written by Samsung in 2015 and on the > cross_prelink_aarch64 branch has various problems resulting in test > failures, in my experience. Ok. >=20 > I sent patches (on top of a merge of the upstream cross_prelink and=20 > cross_prelink_aarch64 branches) to the maintainer in May 2020 (the > Yocto project mailing list doesn't accept email from non-subscribers, > so won't have seen those patches), which made it work well enough to > get clean prelink test results, but so far they haven't been > committed to the upstream cross_prelink branch (or any other upstream > branch). I've now made those available at > https://github.com/jsm28/prelink (cross_prelink_aarch64_fixes branch). >=20 So this branch shall be pulled by yocto's cross-prelink maintainer. Without it the cross-prelink doesn't support aarch64? > Note however that, like the original patches from Samsung, this > version does indeed depend on a hack in _dl_tlsdesc_undefweak to work > with TLS descriptors. >=20 To properly solve this issue we shall: 1. For arm - Fix the cross-prelink (no patches available) or - Fix glibc (as proposed by Szabolcs) 2. For aarch64 - Try to upstream patches from Joseph to OE/Yocto's cross-prelink or - Fix glibc (if required) or - Do nothing (aarch64 will not be prelinked in OE/Yocto, which means that it will work correctly) Best regards, Lukasz Majewski -- DENX Software Engineering GmbH, Managing Director: Wolfgang Denk HRB 165235 Munich, Office: Kirchenstr.5, D-82194 Groebenzell, Germany Phone: (+49)-8142-66989-59 Fax: (+49)-8142-66989-80 Email: lukma@denx.de --Sig_/OKRpRjSuhwGhP8Vkx1O5S5P Content-Type: application/pgp-signature Content-Description: OpenPGP digital signature -----BEGIN PGP SIGNATURE----- iQEzBAEBCgAdFiEEgAyFJ+N6uu6+XupJAR8vZIA0zr0FAmF4CBsACgkQAR8vZIA0 zr107wf/bA7wg2o8ACjRP7shmfgGHpJgTmYGw6NZwXrtrs7o4u6eKVkfRsVx64X/ Cm6k7cZxVhtXzF2Jn6CRkR4yu1aRPrbP0433Vm8S0hojp33T2bVwFbzPguWAfc9b gsjPOPvX8nFyK3PMOZWlJDZtJKo2PmdSuYGuEJiV86ZHwbaO/RSa7CWiA77DtAHl Rj8BEOn2l94imnNFJJl+cvVDUZhncv8hriuIK9YgVibeqSkyyCtEh6YVZ9lL7sfb xc2Tsyy//PSDL48ZqJ5XGc4Vo2qUdLO6nFca4j8y7Q5EiB0peZPUEbkuCUWuh4qu l6rk3MdZMjYqbOJT0CYxxPtfptKyYA== =R0di -----END PGP SIGNATURE----- --Sig_/OKRpRjSuhwGhP8Vkx1O5S5P--