-
Notifications
You must be signed in to change notification settings - Fork 379
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add thumbv7neon-*
targets.
#745
Conversation
bors try --target thumbv7neon-unknown-linux-gnueabihf |
That they correctly use Thumb-2 mode and have ARMv7 architecture with NEON support can be checked by the following: $ objdump --syms /path/to/binary | grep '$a'
...
000028b4 l .plt 00000000 $a
...
$ objdump --syms /path/to/binary | grep '$t'
...
00002ac0 l .plt 00000000 $t
...
$ readelf -A /path/to/binary
Attribute Section: aeabi
File Attributes
Tag_CPU_name: "7-A"
Tag_CPU_arch: v7
Tag_CPU_arch_profile: Application
Tag_ARM_ISA_use: Yes
Tag_THUMB_ISA_use: Thumb-2
Tag_FP_arch: VFPv4
Tag_Advanced_SIMD_arch: NEONv1 with Fused-MAC
Tag_ABI_PCS_GOT_use: GOT-indirect
Tag_ABI_PCS_wchar_t: 4
Tag_ABI_FP_rounding: Needed
Tag_ABI_FP_denormal: Needed
Tag_ABI_FP_exceptions: Needed
Tag_ABI_FP_number_model: IEEE 754
Tag_ABI_align_needed: 8-byte
Tag_ABI_enum_size: int
Tag_ABI_VFP_args: VFP registers
Tag_CPU_unaligned_access: v6
Tag_ABI_FP_16bit_format: IEEE 754 Which is our expected output: HF (as detected by VFP registers), 7-a architecture, Thumb-2, and NEONv1 SIMD instructions. The binaries also run in qemu. I'll try to work on Not sure if we have to specify |
UPDATE: Turns out this is a docker issue. Adding Adding the following seccomp profile should work: {
"names": [
"personality"
],
"action": "SCMP_ACT_ALLOW"
} But then we need to provide this properly, which means we might need a data directory or something so we can write the seccomp profile and then use it when passing to the container. |
tryBuild succeeded: |
thumbv7neon-unknown-linux-gnueabihf
target.thumbv7neon-*
targets.
bors try --target thumbv7neon-linux-androideabi --target thumbv7neon-unknown-linux-gnueabihf --target thumbv7neon-unknown-linux-musleabihf |
…-unknown-linux-gnueabihf --target thumbv7neon-unknown-linux-musleabihf
bors cancel |
tryAlready running a review |
Update: Forgot that |
bors try --target thumbv7neon-linux-androideabi --target thumbv7neon-unknown-linux-gnueabihf |
tryAlready running a review |
tryBuild succeeded: |
781c3d9
to
10304dc
Compare
Add the `thumbv7neon-linux-androideabi` and `thumbv7neon-unknown-linux-gnueabihf` targets. Closes cross-rs#254.
Anything still pending for this? |
@otavio Don't believe so, if the changes look good we should be able to merge. I've checked the readelf architecture output and it looks good. |
bors r+ |
745: Add `thumbv7neon-*` targets. r=otavio a=Alexhuszagh Add the `thumbv7neon-linux-androideabi` and `thumbv7neon-unknown-linux-gnueabihf` targets. Closes #254. 746: Limit permissions for Android images. r=otavio,emilgardis a=Alexhuszagh Remove the use of the `--privileged` flag for Android images and instead use an seccomp permissions. The provided profile is derived from the docker documentation, with slight modifications to allow `clone` and `clone3`. The documentation is [docker seccomp](https://docs.docker.com/engine/security/seccomp/#significant-syscalls-blocked-by-the-default-profile), which details the syscalls blocked by docker. The same is true for podman. We merely modified these settings to allow `personality` syscall, which then allows us to use our Android images. Co-authored-by: Alex Huszagh <[email protected]>
bors r- This is going to conflict with #746, going to have to rebase it slightly. I'll merge this with |
Canceled. |
EDIT: I may be wrong. My mistake, I think I undid those issues. I guess the seccomp isn't going to conflict. bors r=Otavio |
Build succeeded: |
Add the
thumbv7neon-linux-androideabi
andthumbv7neon-unknown-linux-gnueabihf
targets.Closes #254.