lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 6 Dec 2006 00:22:26 +0000
From:	Russell King <rmk+lkml@....linux.org.uk>
To:	"Michael K. Edwards" <medwards.linux@...il.com>
Cc:	Linux Kernel List <linux-kernel@...r.kernel.org>,
	Sam Ravnborg <sam@...nborg.org>,
	linux-arm-toolchain@...ts.arm.linux.org.uk,
	linux-arm-kernel@...ts.arm.linux.org.uk, crossgcc@...rceware.org
Subject: Re: More ARM binutils fuckage

On Tue, Dec 05, 2006 at 03:29:22PM -0800, Michael K. Edwards wrote:
> On 12/5/06, Russell King <rmk+lkml@....linux.org.uk> wrote:
> >There's not much to say about this, other than scream and go hide in the
> >corner.  ARM toolchains are just basically fscked.
> 
> And while we're on the topic of ARM linux toolchain fsckage, it would
> be nice to know what patches and incantations are currently
> recommended when configuring gcc for building various modern ARM
> kernel/ABI configurations (OABI + soft VFP, EABI, etc.).

There is no such thing as soft VFP.

I can only talk from the requirements of the kernel.  gcc 3.4.3 is
the minimum for ARM, which with binutils 2.17 will allow you to build
the kernel as OABI in *any* configuration.  No patches required for
either.

Enabling EABI needs a compiler which supports EABI.  That's where I
get fuzzy but recent gcc 4 should be suitable.  I have had it suggested
to me that EABI support in the toolchain isn't all that stable at the
moment.

As for userspace... and NPTL, that's a different matter.

-- 
Russell King
 Linux kernel    2.6 ARM Linux   - http://www.arm.linux.org.uk/
 maintainer of:
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ