From owner-freebsd-ports-bugs@freebsd.org Fri Feb 26 04:54:33 2021 Return-Path: Delivered-To: freebsd-ports-bugs@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id DAAC2554B42 for ; Fri, 26 Feb 2021 04:54:33 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4Dmy4T5fd7z4lQM for ; Fri, 26 Feb 2021 04:54:33 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id C2130554F97; Fri, 26 Feb 2021 04:54:33 +0000 (UTC) Delivered-To: ports-bugs@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id C1DC7554B41 for ; Fri, 26 Feb 2021 04:54:33 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Dmy4T539Nz4lVs for ; Fri, 26 Feb 2021 04:54:33 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id A0BE6246CB for ; Fri, 26 Feb 2021 04:54:33 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 11Q4sXaF086867 for ; Fri, 26 Feb 2021 04:54:33 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from bugzilla@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 11Q4sXau086866 for ports-bugs@FreeBSD.org; Fri, 26 Feb 2021 04:54:33 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: bugzilla set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 253375] emulators/qemu-user-static: causes build failure in games/dobutsu while running xz(1) Date: Fri, 26 Feb 2021 04:54:33 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: commit-hook@FreeBSD.org X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: kevans@freebsd.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 26 Feb 2021 04:54:33 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D253375 --- Comment #2 from commit-hook@FreeBSD.org --- A commit references this bug: Author: kevans Date: Fri Feb 26 04:54:03 UTC 2021 New revision: 566579 URL: https://svnweb.freebsd.org/changeset/ports/566579 Log: MFH: r566578 emulators/qemu-user-static: update to f7fd10d7677c This features a number of fixes; highlights: - Handle aarch64 YIELD instructions - Bump ARG_MAX to match the FreeBSD default on LP64 platforms - Implement __specialfd(2) and copy_file_range(2) - Style fixes - Fix an issue with binary execution[0] - Fix page fault handling for self-modifying binaries[1] - Suppress noise from CIOGSESSION usage and restore CRIOGET handling - Patch _umtx_op(2) through to the kernel where possible[2] [0] Attempting to execute a binary by name was broken when there was an unrelated entry by the same name in PWD. The report below observed it in= the cluster while building games/dobutsu, which tried to execute `xz` in a directory that had an `xz` directory inside of it. [1] From the fixing commit, qemu mprotect()s pages contained translated c= ode to PROT_READ | PROT_EXEC and upgrades protections as needed upon page fau= lt. This was broken in a previous commit that misidentified by the trap # that should have been observed. The observed issue a broken JIT compiler in libpcre. [2] _umtx_op can now be handled by the kernel in cases where the target l= ong size is not longer than the host, and the target and host are the same endianness. This is much more reliable than our previous emulation of th= ese operations, and should reduce hangs sometimes observed in threaded applications. Note that this requires a recent stable/12 or 13.x/-CURRENT. PR: 253375 [0] PR: 253335 [1] Changes: _U branches/2021Q1/ branches/2021Q1/emulators/qemu-user-static/Makefile branches/2021Q1/emulators/qemu-user-static/distinfo --=20 You are receiving this mail because: You are on the CC list for the bug.=