From nobody Sat Oct 22 06:09:53 2022 X-Original-To: dev-commits-src-main@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4MvWCH0h5Tz4g2Jy for ; Sat, 22 Oct 2022 06:10:03 +0000 (UTC) (envelope-from marklmi@yahoo.com) Received: from sonic317-22.consmr.mail.gq1.yahoo.com (sonic317-22.consmr.mail.gq1.yahoo.com [98.137.66.148]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4MvWCF5mHyz48tb for ; Sat, 22 Oct 2022 06:10:01 +0000 (UTC) (envelope-from marklmi@yahoo.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1666418999; bh=tttpB4c5pdjkt4IZ/L1KFhdAKgbMTkl394pEujK1ECI=; h=From:Subject:Date:To:References:From:Subject:Reply-To; b=V2BZ99yFHIbEF+boN1P0hDWhlLI0JqYxrkCRNcqMosXvT+iEvlb32lCW0c4d0uQSN+M04HxBHHify9eRfrW5sHyha+Z7dLkCD8RLewqy4akSEGdT8ebk1Gvjfn3sGC427GHOB04VO5gaOob8/62t6YhLBaxJRFAt4cJLj+u+dOMY0/yRKt9yymQ27TFsfjsAFBADre4sTRi2DyI2lmA/f1oIHPNDigfH7xkaENGxABzBLF12swZBmhSVGmnSf9mB3lMhgNQ7j1TdtTOqwrXgmprYrSNP1QZnKVSgO1V5NGlRzN8IB7dHaBQG4XIWkMXAelDogzp9kkAMcrrmfbX++Q== X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1666418999; bh=LiMHOq5MCdlgiJYeIcyFb7PkrcG0kgGaaiU1kS8hsIM=; h=X-Sonic-MF:From:Subject:Date:To:From:Subject; b=HsO13/tujoTi+06xhk/aV5B+YdBFKPwGkrJivNdYNOZllMDCHhGB0nqOWAXLdLu3mjohX7p9KwilzYv6ayFRrICpY/s/nMlNKG8A8wZvkNrS4Cs0rDtDZ1nK2tBlgnx5kzbv1Agg8A0F5nyoci5FreqYtgyS8WpxxWDQzPCysH2OSj3vjrXbODA/k/iQoAkGWFCX2Dv57+xqZqTQqi5An0gr/7KVMGVErGv7Qo8e7IYGhKghvdMEgzWg8EODzKBjLqjKei4p+e08a/1oD12bEqenmXG4rHbwlhLlju2ORF/s4oT6g/5S8n6c9JAeKlaQ9KALcQLcvuC26HKCsj4lCA== X-YMail-OSG: ldghYRUVM1nbOe49S6e2WSMd2duSpr4HuZh2z8zt495VI_wD7feuczEWYB49EC7 TJPJUnmG67G_rjkX7XhMsbx7FY8OVzBKSS8Jtr70vTTm6I3t2Kb8kInORmF08ekVKgOj26lA3qjR EfYw.JJoDi24_9ZcyQnnUILhpbwETbKfXCWvwEfC_zE1cB38Y0HgKwsLYbhiEAAK7TuYM62DCT_s 5yAs9bvnzELM2wZ_3NMgmO6o3UjlomQJH8qMbbGrwwWCrk.0726YfGB1Db0jJu.hyztGzKfPeODb cr77qXUskACW82YtSck9tfXf5LzJ_iDE9qJYBMlt5enOH8TEsY1HKZssmzMc2ayL_fLhusW6gI3Q tdq_CWEwrYktFSkCyiG2Dkr7VZrkDvpqueMyHkba0WwKkZbN6yZiNWtddIw7ofz5Tk2058cJFLZo Pnu9_F8NoUMD96GMBnO9vUZCTt0Hq2CkAnyDf8dJxxoI3osYdHeH18h4Y1km3lnhLdu.rrutxYxB F2or3lQjIqbQd.6IXX_v5vAnBvmfeFu9o04Qlawh5pMobcQJkzXLIs4W9xhko090hX4dJl5htvfW 4H3MEyBgecLnoPWSnpp9WK3Y.9mjIv2uEEkPOYmKRzLh7RzzWxhIjcr9.cNFYKDBvCojjWwtmfEr qtZDexngxk8YWxpD1TCwE9ztAaKTvJFvbAuRX2x4DtGSDknVw.eDGBa0jXuTN_MJuJs1PqD3fcqb .Fcxz2.kT5K5bYX60ieIs3fFzOctz4zpsW5PfnceMQlVNKd71To4HOg8_0ftAlKIcFXeWguNvhQ7 wlPu6_UBonm8cVinQUcWU8BEUflf0XxWLO0AYlAlRSGgtKXVnYHmGHwwCLGUEZpJH1JUR2FVlawI YKdlI6xJdK6gK.SMP6rMewr1L4R1TiBeTJDxb_CugMm5R914nF2qDVsXB9cKWUV0sLmuMFUWIjqW Z9IeQMjPoRYMoClEWb90GhrIdN1JVuwn4mogaP.LwXyPO23_WE_pqgfNAl9ZP67gwlK2ht6eZ97r Lc74eRNj2eOfL3Jz1iS_SfeFGToPJYvM5rG1hz8SAYQb4zU5_jYpdFK3aIQ8cphfaHMB7ZPlsBxI 6FG3MXDGcqTJIIRJxPch86HZ2IRhvcsVf6N3i58InDthkK4e7HujwL_ymKRf39rQSILQ6I8AdwVm NkMrXyC3sgRTM3GNhTTpUCVyswi0HWlaCI.67Iaz9jLs0AmrJfDJ256j5gWKGlsCiDlwh1jzXavk lOzWAZGDhrSDsOm0ZhZbDnoUZoEUqXR2S7liu1VrIS.pCXwjlaRQpPyOMOn_wMsG5dU0nMoFS2Ye 3_fXCpPksGmJpJZ6.KoY1UtJd9lolsRgLlK_BNwuz5v0ECGQRH92HlS1Ac26bV.QdgaqsXosObKU xHdXFsDKrILN.doT7knjY5GP2z70VVQgLdHuHDFpLmrOQ6A9CxzfESE9F.v_krGC.5nOQg0KdPBb .rCyAqe7rIW933mmSm92iRutKFVhUtYz9v5Joh6QWss1wNyLleGfODpeRkEe0xNhQvOH5zGjgjca 8wEuQJPuVo1ujj_yRFqs68SVBKdkZdxpQc4SI2ospphw.vRgFMh1LhrpNxiMCO.LSADSI5L1A3j1 oJVVtz.3lzVnbTM8E1QVOxNPecV_5Ocl4GgoWwO6SWSoIIP3OGdKWrpXJiJeylaOe6oHbCHIbRaG vpso8Ny99ePnBghgw5euHpH32D63kwKElW0j92xIoDQsz.5Zk3n81HI1TMk4kqx6kTo0JDJk93BZ xeShxmtL3LKE8cw0Y3L6pzMfKt02JZWoqsLAIYLB7hzNPZLez7xuxxxJmdeZI_dcluhIC4W8Tc5D VTMnLFlvHqzryqjVodPavwzFuarcFSnWbiu4OJTMtEvi3gvGvfXaEoan4Fj1KaIESb0Lj.JBxX2Q j7P9dopMvtjn4qKGGHhQ9sIzSTO61DD1V58BkKvS8LG243ktKq48AOJmIefULK5q49S3I6syXZFW 6Eo2AXM4FlS4K8wsHSNt4hNLNkKZ3eeBh5FtCSHCIS6O7m8m7dOuMAE77WaJYViX6Hl0F2ZH4mP_ N8icP3s7mOMvEqdKZpn5ibtMFk5YGMtuhgC5YZbp52bq4jQNl0BHMa12TlpBPS31KtGnJgBVoJqC JO4u9bOKP4HtDF2pvj3HNYj7RjqERSMrDU8TzcsPwjwGB6qtWITBFWYRYX7Hi9ZL3fFqXRfaxcd_ 2Ddl4eXupbrU0smcnWI8.l5dUGSsxufuqGpvqydgruMFSbrPjACTYqF9GtlL2.fBo0CxHESHoWCM - X-Sonic-MF: Received: from sonic.gate.mail.ne1.yahoo.com by sonic317.consmr.mail.gq1.yahoo.com with HTTP; Sat, 22 Oct 2022 06:09:59 +0000 Received: by hermes--production-gq1-754cb59848-gq6wq (Yahoo Inc. Hermes SMTP Server) with ESMTPA ID cf48a02f4f282d8bb477570f426d5ba4; Sat, 22 Oct 2022 06:09:53 +0000 (UTC) From: Mark Millard Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: quoted-printable List-Id: Commit messages for the main branch of the src repository List-Archive: https://lists.freebsd.org/archives/dev-commits-src-main List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-dev-commits-src-main@freebsd.org X-BeenThere: dev-commits-src-main@freebsd.org Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3696.120.41.1.1\)) Subject: Re: git: 9cabef3d146e - main - ldd: use direct exec mode unconditionally Message-Id: <0D5A9F6F-C19B-487D-BD61-F40F02E38873@yahoo.com> Date: Fri, 21 Oct 2022 23:09:53 -0700 To: Konstantin Belousov , dev-commits-src-main@freebsd.org X-Mailer: Apple Mail (2.3696.120.41.1.1) References: <0D5A9F6F-C19B-487D-BD61-F40F02E38873.ref@yahoo.com> X-Rspamd-Queue-Id: 4MvWCF5mHyz48tb X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=yahoo.com header.s=s2048 header.b=V2BZ99yF; dmarc=pass (policy=reject) header.from=yahoo.com; spf=pass (mx1.freebsd.org: domain of marklmi@yahoo.com designates 98.137.66.148 as permitted sender) smtp.mailfrom=marklmi@yahoo.com X-Spamd-Result: default: False [-3.50 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_SHORT(-1.00)[-1.000]; NEURAL_HAM_LONG(-1.00)[-1.000]; MV_CASE(0.50)[]; DMARC_POLICY_ALLOW(-0.50)[yahoo.com,reject]; R_SPF_ALLOW(-0.20)[+ptr:yahoo.com]; R_DKIM_ALLOW(-0.20)[yahoo.com:s=s2048]; MIME_GOOD(-0.10)[text/plain]; DWL_DNSWL_NONE(0.00)[yahoo.com:dkim]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; FROM_HAS_DN(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_TLS_LAST(0.00)[]; FREEMAIL_ENVFROM(0.00)[yahoo.com]; RCVD_IN_DNSWL_NONE(0.00)[98.137.66.148:from]; RCVD_COUNT_THREE(0.00)[3]; FREEMAIL_FROM(0.00)[yahoo.com]; TO_DN_SOME(0.00)[]; ASN(0.00)[asn:36647, ipnet:98.137.64.0/20, country:US]; DKIM_TRACE(0.00)[yahoo.com:+]; FREEMAIL_TO(0.00)[gmail.com,freebsd.org]; RCPT_COUNT_TWO(0.00)[2]; MIME_TRACE(0.00)[0:+]; FROM_EQ_ENVFROM(0.00)[]; MLMMJ_DEST(0.00)[dev-commits-src-main@freebsd.org] X-ThisMailContainsUnwantedMimeParts: N Konstantin Belousov wrote on Date: Sat, 22 Oct 2022 01:13:49 UTC : > . . . > Please try something along this lines: >=20 > diff --git a/sys/arm64/include/elf.h b/sys/arm64/include/elf.h > index 3f7c3964d428..22e968c632bf 100644 > --- a/sys/arm64/include/elf.h > +++ b/sys/arm64/include/elf.h > @@ -86,7 +86,7 @@ __ElfType(Auxinfo); > #endif > =20 > #if __ELF_WORD_SIZE =3D=3D 32 > -#define ET_DYN_LOAD_ADDR 0x12000 > +#define ET_DYN_LOAD_ADDR 0x01001000 > #else > #define ET_DYN_LOAD_ADDR 0x100000 > #endif [Summary: that made it work.] First I did some as-is testing . . . Testing for the problem is easy on the Cortex-A72 system . . . # ~/do-chroot-main-CA7.sh # ldd /bin/date /bin/date: ld-elf.so.1: /bin/date: mmap of entire address space failed: Cannot = allocate memory /bin/date: exit status 1 # ldd -a /bin/date ld-elf.so.1: /bin/date: mmap of entire address space failed: Cannot = allocate memory /bin/date: exit status 1 By contrast, on a 2 GiByte RAM Cortex-A7 (armv7) Orange Pi Plus 2 Ed, the result is different: # ldd /bin/date /bin/date: libgcc_s.so.1 =3D> /lib/libgcc_s.so.1 (0x2056e000) libc.so.7 =3D> /lib/libc.so.7 (0x205a8000) # ldd -a /bin/date /bin/date: libgcc_s.so.1 =3D> /lib/libgcc_s.so.1 (0x2056e000) libc.so.7 =3D> /lib/libc.so.7 (0x205a8000) /lib/libgcc_s.so.1: libc.so.7 =3D> /lib/libc.so.7 (0x205a8000) For reference (long output line split for readability): # uname -apKU FreeBSD OPiP2E_RPI2v1p1 14.0-CURRENT FreeBSD 14.0-CURRENT #49 main-n258610-ba7319e9091b-dirty: Fri Oct 14 18:27:46 PDT 2022 = root@CA72_16Gp_ZFS:/usr/obj/BUILDs/main-CA7-nodbg-clang/usr/main-src/arm.a= rmv7/sys/GENERIC-NODBG-CA7 arm armv7 1400072 1400072 (It was installed from the same buildworld buildkernel as tree used to set up the chroot tree on the Cortex-A72 system.) Same boot media, but booting a 1 GiByte RAM Cortex-A7 (armv7) RPi2B v1.1: # ldd /bin/date /bin/date: libgcc_s.so.1 =3D> /lib/libgcc_s.so.1 (0x2056e000) libc.so.7 =3D> /lib/libc.so.7 (0x205a8000) # ldd -a /bin/date /bin/date: libgcc_s.so.1 =3D> /lib/libgcc_s.so.1 (0x2056e000) libc.so.7 =3D> /lib/libc.so.7 (0x205a8000) /lib/libgcc_s.so.1: libc.so.7 =3D> /lib/libc.so.7 (0x205a8000) In case it matters, these Cortex-A7's have LPAE (RPi2B v1.1 shown): CPU Features:=20 Multiprocessing, Thumb2, Security, Virtualization, Generic Timer, = VMSAv7, PXN, LPAE, Coherent Walk So only the aarch64 context that allows armv7 shows the problem. Then I did the requested aarch64 test with the patch . . . So, for that aarch64 context, the patch test requested: # git -C /usr/main-src/ diff /usr/main-src/sys/arm64/include/ diff --git a/sys/arm64/include/elf.h b/sys/arm64/include/elf.h index 3f7c3964d428..22e968c632bf 100644 --- a/sys/arm64/include/elf.h +++ b/sys/arm64/include/elf.h @@ -86,7 +86,7 @@ __ElfType(Auxinfo); #endif =20 #if __ELF_WORD_SIZE =3D=3D 32 -#define ET_DYN_LOAD_ADDR 0x12000 +#define ET_DYN_LOAD_ADDR 0x01001000 #else #define ET_DYN_LOAD_ADDR 0x100000 #endif Then: builworld buildkernel installkernel installworld reboot login. The results in that new context were: # ~/do-chroot-main-CA7.sh # ldd /bin/date /bin/date: libgcc_s.so.1 =3D> /lib/libgcc_s.so.1 (0x4106f000) libc.so.7 =3D> /lib/libc.so.7 (0x410a9000) # ldd -a /bin/date /bin/date: libgcc_s.so.1 =3D> /lib/libgcc_s.so.1 (0x4106f000) libc.so.7 =3D> /lib/libc.so.7 (0x410a9000) /lib/libgcc_s.so.1: libc.so.7 =3D> /lib/libc.so.7 (0x410a9000) So: works. NOTES: I do not have any armv6, i386, or 32-bit powerpc contexts set up to test, not that the specific patch targets the i386 or targets any powerpc's. (armv6 requires adjusting the kernel to instead not target armv7 chroot/jail support. Long ago I helped someone work out having an alternate kernel to boot for such armv6 chroot/jail use, not that I remember any detail at this point. The detail should be in my E-mail archive and/or in comments for a bugzilla submittal that the person had used to report the lack of armv6 chroot/jail support.) =3D=3D=3D Mark Millard marklmi at yahoo.com