From nobody Fri Feb 04 22:44:01 2022 X-Original-To: freebsd-arm@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 7A75D19B3F65 for ; Fri, 4 Feb 2022 22:44:15 +0000 (UTC) (envelope-from marklmi@yahoo.com) Received: from sonic308-55.consmr.mail.gq1.yahoo.com (sonic308-55.consmr.mail.gq1.yahoo.com [98.137.68.31]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4Jr9ZQ0GP8z3tm2 for ; Fri, 4 Feb 2022 22:44:13 +0000 (UTC) (envelope-from marklmi@yahoo.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1644014646; bh=a61cxHmX8H/0tHV6qO+N24qd97SudQAGDfEkjU1Blr4=; h=Subject:From:In-Reply-To:Date:Cc:References:To:From:Subject:Reply-To; b=F35KAkOjhTcoJn0xB/i//D73SBMNrxDl9cpK17KJhcG/n7tA94VVi9VttLFQ5eoaE8W0KlZbb+Gla4ennGo0VF5BarqBitBLLswGBBNE/JYBADI/N3pipur9I6fryLqxZiG75Nq+XiZl7LDBDaj5JUmQ6fJIdvYcEZfgk5xTg+q+V3iY8qJdAgNsrf8LqRXex+GGC5DasAlsutlSIH4JnmeURTHTcH+QfiuVXWte/SZJl03hKtz8FfzARwyf7e8BEuisKv4HDIoJb6FIyQPoiS9/fhZE3gtzwi+jOWtctQCl22RF/m4/4E1pSzFqcnqgC1ClVC6geOhJ9GfZqvff3g== X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1644014646; bh=u/dL2r+QUOwPGHFvIsUtUoxhGxGO1/yobZw9bLsg2/K=; h=X-Sonic-MF:Subject:From:Date:To:From:Subject; b=sSsWmqv3E3AhHqFW8DhfWfEaoYzjaZo8BvYJ+0zNCWKBpqH4Bov4qAbeEHUyj7dLc8AGU8qhRl8aXoAXPJhBcBl3pjRr9u6tvS9j6R4f+3MruN2Xl8m3LAcyqvfnzZBb1Lf2SXIfZBIiIrfyNMLdsRf2p8gycuuC1hZdgcpqyLddyv/PXExPDtQyW7wZIV9NU+nD1QJPhD5clcwEaF1l9aI7x+FtOKQPoSXiZSUcm5JbA/5rE/M13zlkAf3JYb1fhh1fOJGKfI3oU3Sz6pu0c41QCAhVe8AjEgCkelAgeXxxcWD8hMQ2XEqVI3NRl1vsY/kNQBpMlgEl+R6ZA2Gz4g== X-YMail-OSG: XWPGFJsVM1llQXF2vv5gCfZ8ZkG_ybaPsm7FvBFlQqE3aZTcLglbHg3QkpVKJct _f7VhItXEMlnoHGtouxwuXV581j9luzZutnPv80SY8_JatGIrtaH3JLJufBGcvf7xrRIqLucUZnK UlUicPYyPS1urK35D5r5fkKnXzrbYcKUPZFqpKa7_eBfShMVsyLyRcyVCw6tGizblt3wodE6JPoM kUrFcfax0d008sVnhjK.0aEUOwK_5mUMU1bgYx6alvxAbW9_c4GO3243NZYZbyXrenveo28RHBfF 1kKmdst92i7sV181t_QOu_c41BC_mkgbS2I0YIb.sTCpbi1WjxwcDhnbCerPmZcn5fN4bs1k_kNl KYGHl9PdoQbekf9oZEg7aXtzhbiBERgB8kNvznpWscbwH..Ud7jMt..sa58i5QShImuwgnIVf0VE PaacOofjowxmons3Uz63ZRKm6mzGV3vqnTmMGXg8uroJxI79W06UIlcpZEfiy8pSUrJr0uGUpfT7 nr4W9jD2dN673iKLgmHw3YFn1slmOBQcvqPV0JfYhYi3PLW54V3XNWOuMDNAqbVpvj9cEyHSVB2r 01EUb9zgitZA6bGR6WaNN9sxyzSETUS0r_goqS7j7Ma1.blKrsX3xLGjRUF0e.Aahly9jsphlziA sDQC5rw5MH7bY.Yfx.Eaw1.robOHp8e2o5wferoKN92yJDtAPx4s2qs2i8IwNHrRt5UCOXV1MTyt 5h_GhxZPpn0vB4qEx549iUZBT3cLEQIX7lAhPh9l1ilTz0myW4amKZmYrayaNo3cC3kjpyWQ1TF7 2ayQK7tF.GzbCoakh_UWKKmM9tvgmHN3QJHj2U2eQMW4kmiIJZeJb6CMn0HSvNB_Dke7GyLYPM1v YH8UDDwvAcUz7688ud6xkRy5z8bw1vCimm662Yh.WgyiecIdFoQH0ROTyE5z.w3sS9F79znM7No5 YNH5ZU244WGWsU1QMaJlJkWSp0kx1ggctRCmU.n22aBOLX_K5JZuGySL0kT4GaANRpTUDkGvuu_I I_SJph.eL_2v3zhjcTxxdyLIsrXNJ1ksh6mZjUju8V.uq9CkJy13V6AC6UWXR2.Scg5hOl8yr8dd 731nmuA_H0t06gTalaMMh0OIYMxIo67AHOgSs5nFmNB7mb16cW3qJ8DtukdWMltu_m7z3qGjT7fB kSvdwp7zBJMKzzPobC6TdbfVVds_9hLoeq5LsTldvIbGJzcTOmyL07QbwF0.SsOT_KOu02NV9FYw oM2XVRo24rvPxl3xrWhwM3vUXYmKCPk2h5M5JygWdso5Irk09DIBbJNoOB.1UQhS9UkoDr07oDVc VRZ9zN2Z_v4rh6_tj.vanhYsRGe_q_syYO8aE_WywfW_QnBCMdc3tDZdWXpRE1FYncKr7tf7l9OB pUF_XoWJl7S41kqPqFNCMPK5xVBEYpiH4zXfxMblriRseyytE2nA2N.URsSPgJLL42XffEZmnNlw G6DMhCmPM07xpIWAdeGEqDG2E3HrWcB4d5_TGMNupGFbQrHtuFkepFr250DeMmpoLHz8tB7HLCeW HlVpg7M020_AlFOOHfMU3.4bNmxBa4QNKdyCgMnyATseTA2PWLYlH1Se3H94m2mUFcy5JPLbmkJO _xNPDPJwwqV9.XsCiSDM60OLqstip95ei55GSM2xgVE.Hg.xpfgWbqel31jiprZZ184Wf9R5iwYc 7dqee239vYnKaphmxCyk8__dIphRd1MV507DLFT3HtXWNUB_sUQf_BwL_XRvyG5NXmYensA9spz9 dr04VBQ8pgfvZ8RMHItHx4FeAEt80hzDtXuwExOxOV5eGXySscfh.1stGt0YMhGZJbSwlZXs_bmj hAS8sMGbvzoFd5A6CTHjo10bsoBKcDNPQ96JcVeH87ywkD52qyIL63f7PdBh7ZgMWwmjwsLZShrE bDnao1h2ZjYvUx6PeNDiwTUHNB5k689Cr4asaqIkxkSC731aH2N0mLtbyO.IljyM7Jk0n9NH1gF9 TIduv.JoywUAHCww5wTOOoSZY55Vu.igU_uSiw70dhO3abYXVJsOlbAJGaKOh18qfMUPETAM34Ed V8Aa.K5txNUUugRLm_d9ctGT75qSUGBRThZ3092COGPWlPIAQ5MqVAr7fbEcFr0Q_0evx3fgyoGJ f6FFx2F__yV21BJ.d5tT6xFMAHmNXs_ZL.SR5m_n7_mmmCopcvVP.N8qFvscPReyqAqkd17.iyY5 bxf3TNZY75mhUYn3OVnWPmZzDJKDu0W.RRKi6x_OMvFzNDlEhQfqSOxRdxwRcOsESsxLsfvuOGqV E2LmxhFpkCoSc X-Sonic-MF: Received: from sonic.gate.mail.ne1.yahoo.com by sonic308.consmr.mail.gq1.yahoo.com with HTTP; Fri, 4 Feb 2022 22:44:06 +0000 Received: by kubenode512.mail-prod1.omega.gq1.yahoo.com (VZM Hermes SMTP Server) with ESMTPA ID 6d7f601eedce32458d9a81000d5f5590; Fri, 04 Feb 2022 22:44:02 +0000 (UTC) Content-Type: text/plain; charset=us-ascii List-Id: Porting FreeBSD to ARM processors List-Archive: https://lists.freebsd.org/archives/freebsd-arm List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-arm@freebsd.org Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.120.0.1.13\)) Subject: Re: Troubles building world on stable/13 [an experiment-environment that leaves existing things alone] From: Mark Millard In-Reply-To: <20220204214403.GA85107@www.zefox.net> Date: Fri, 4 Feb 2022 14:44:01 -0800 Cc: freebsd-arm@freebsd.org Content-Transfer-Encoding: 7bit Message-Id: References: <8595CFBD-DC65-4472-A0A1-8A7BE1C031D6@yahoo.com> <20220124165449.GA39982@www.zefox.net> <5FAC2B2C-7740-435E-A183-FB3EF1FCE7F9@yahoo.com> <20220202223208.GA78110@www.zefox.net> <70550346-BC53-458F-B01B-68559E5C9847@yahoo.com> <20220203015149.GA78722@www.zefox.net> <8A85F917-F4E8-4382-B777-15AF7401E616@yahoo.com> <20220204214403.GA85107@www.zefox.net> To: bob prohaska X-Mailer: Apple Mail (2.3654.120.0.1.13) X-Rspamd-Queue-Id: 4Jr9ZQ0GP8z3tm2 X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=yahoo.com header.s=s2048 header.b=F35KAkOj; dmarc=pass (policy=reject) header.from=yahoo.com; spf=pass (mx1.freebsd.org: domain of marklmi@yahoo.com designates 98.137.68.31 as permitted sender) smtp.mailfrom=marklmi@yahoo.com X-Spamd-Result: default: False [-3.50 / 15.00]; TO_DN_SOME(0.00)[]; FREEMAIL_FROM(0.00)[yahoo.com]; MV_CASE(0.50)[]; R_SPF_ALLOW(-0.20)[+ptr:yahoo.com]; DKIM_TRACE(0.00)[yahoo.com:+]; RCPT_COUNT_TWO(0.00)[2]; DMARC_POLICY_ALLOW(-0.50)[yahoo.com,reject]; NEURAL_HAM_SHORT(-1.00)[-1.000]; FROM_EQ_ENVFROM(0.00)[]; RCVD_TLS_LAST(0.00)[]; MIME_TRACE(0.00)[0:+]; FREEMAIL_ENVFROM(0.00)[yahoo.com]; ASN(0.00)[asn:36647, ipnet:98.137.64.0/20, country:US]; MID_RHS_MATCH_FROM(0.00)[]; DWL_DNSWL_NONE(0.00)[yahoo.com:dkim]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; R_DKIM_ALLOW(-0.20)[yahoo.com:s=s2048]; FROM_HAS_DN(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000]; MIME_GOOD(-0.10)[text/plain]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[98.137.68.31:from]; MLMMJ_DEST(0.00)[freebsd-arm]; RWL_MAILSPIKE_POSSIBLE(0.00)[98.137.68.31:from]; RCVD_COUNT_TWO(0.00)[2] X-ThisMailContainsUnwantedMimeParts: N On 2022-Feb-4, at 13:44, bob prohaska wrote: > On Thu, Feb 03, 2022 at 02:05:38PM -0800, Mark Millard wrote: > [chroot setup snipped] >> >> It would be good to know what experiments produce relative to >> failures vs. successes: all one? the other? a mix? Part of the >> point here is to test builds from official FreeBSD build >> servers instead of personal builds. >> > > I placed the chroot directory under a regular (wheel group) login, > but otherwise followed the instructions successfully, I think. > Since all the installed files were owned by root, I used the > root login to work in the chroot. > > Five attempts to run the .sh/.cpp file produced all successful > results. Interesting. Currently it looks like your specific compiler build and the ASLR (Address Space Layout Randomization) somehow interact, leading to sometimes getting the SIGSEGV's. I have only reproduced the problem with the copy of your c++ -- but it stops reproducing in my environment when I disable the system's ASLR mode of operation. You got later messages about the ASLR disabling experiments that I did. > Next I tried to use lldb. That produced the usual > preliminary output. However, on issuing the run command I got > > error: DupDescriptor-open failed: No such file or directory > That message happens when devfs has not been set up for the dev directory inside the chroot. In my instructions, before the chroot command, there was: # mount -tdevfs devfs ~/13S-chroot/dev that set up the dev that was in 13S-chroot/ . It does not survive reboots and needs to be done again after a reboot --from outside any chroot session. In my context, the following shows some checkable consequences of a correct, active devfs mount: # df -m Filesystem 1M-blocks Used Avail Capacity Mounted on /dev/gpt/Rock64root 823229 194087 563283 26% / devfs 0 0 0 100% /dev # mount -t devfs devfs ~/13S-chroot/dev # df -m Filesystem 1M-blocks Used Avail Capacity Mounted on /dev/gpt/Rock64root 823229 194087 563283 26% / devfs 0 0 0 100% /dev devfs 0 0 0 100% /root/13S-chroot/dev Of course, you did not use a /root/ base for where you put your equivalent of 13S-chroot/ and may not have had a context where ~/ referenced where you put your equivalent of 13S-chroot/ . So adjust notation as possibly required. You can use df -m to confirm the devfs status before doing the chroot command into the chroot area. I do not know if there are any consequences to the ownership of your equivalent of 13S-chroot/ . === Mark Millard marklmi at yahoo.com