On Tue, Oct 16, 2018 at 11:11:36AM -0700, Khem Raj wrote: > On Tue, Oct 16, 2018 at 9:42 AM Tom Rini <[email protected]> wrote: > > > > On Sun, Oct 14, 2018 at 10:07:45PM -0700, Khem Raj wrote: > > > On Sun, Oct 14, 2018 at 12:24 PM Denys Dmytriyenko <[email protected]> wrote: > > > > > > > > On Sat, Oct 13, 2018 at 01:17:12AM -0700, Khem Raj wrote: > > > > > On Fri, Oct 12, 2018 at 8:00 PM Denys Dmytriyenko <[email protected]> > > > > > wrote: > > > > > > > > > > > > There have been reports recently that am335x_beaglebone_config > > > > > > generates bad SPL. > > > > > > Until that is debugged and fixed, use generic am335x_evm_config > > > > > > that covers all > > > > > > AM335x platforms, including BeagleBone variants. > > > > > > > > > > > > > > > > it fails to link > > > > > > > > > > | arm-yoe-linux-gnueabi-ld.bfd: u-boot-spl section `.rodata' will not > > > > > fit in region `.sram' > > > > > | arm-yoe-linux-gnueabi-ld.bfd: region `.sram' overflowed by 5772 > > > > > bytes > > > > > | make[2]: *** > > > > > [/mnt/a/yoe/build/tmp/work/beaglebone-yoe-linux-gnueabi/u-boot-ti-staging/2018.01+gitAUTOINC+2cc52408bf-r24/git/scripts/Makefile.spl:349: > > > > > spl/u-boot-spl] Error 1 > > > > > > > > FWIW, just built u-boot-ti-staging with gcc7 and gcc8 from oe-core, as > > > > well as > > > > Linaro gcc7 - no problems. > > > > > > My distro inherits poky policies, and on master it now inherits > > > hardening policies ( security flags) by defaults > > > do you happen to test poky ? > > > > I think we want to take a look at which of the security flags really > > make sense to use in this context. Thanks! > > there could be more to it, since the distro uses thumb2 ISA by > default, I am not sure > if u-boot overrides that and builds using arm mode ISA always but > something to consider, I saw several reports about u-boot overflowing > sram sections and most of > the solutions were "oh it works for me" or at the best your toolchain > is different then mine. here is mine use it and move on.
Yes, we enforce an ISA in U-Boot, depending on how things are configured and have been doing thumb2 for a long time on these targets. But, if we have some issues here, I'd really like to root cause them. I'm honestly surprised the security flags are even being passed, but I guess they end up put into TOOLCHAIN_OPTIONS not CFLAGS directly? And what/when/how do we reliably get an overflow? Thanks! -- Tom
signature.asc
Description: PGP signature
-- _______________________________________________ meta-ti mailing list [email protected] https://lists.yoctoproject.org/listinfo/meta-ti
