From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mp0 ([2001:41d0:2:4a6f::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by ms11 with LMTPS id sHu7E2MDM2AXDQAA0tVLHw (envelope-from ) for ; Mon, 22 Feb 2021 01:05:39 +0000 Received: from aspmx1.migadu.com ([2001:41d0:2:4a6f::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by mp0 with LMTPS id eINyD2MDM2ByJQAA1q6Kng (envelope-from ) for ; Mon, 22 Feb 2021 01:05:39 +0000 Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by aspmx1.migadu.com (Postfix) with ESMTPS id 9E22511DB6 for ; Mon, 22 Feb 2021 02:05:38 +0100 (CET) Received: from localhost ([::1]:46986 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1lDzfN-0007Kh-A9 for larch@yhetil.org; Sun, 21 Feb 2021 20:05:37 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]:35642) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1lDzdN-0005p9-O0; Sun, 21 Feb 2021 20:03:33 -0500 Received: from dd26836.kasserver.com ([85.13.145.193]:58296) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1lDzdK-0007kg-Kt; Sun, 21 Feb 2021 20:03:33 -0500 Received: from localhost (80-110-127-104.cgn.dynamic.surfer.at [80.110.127.104]) by dd26836.kasserver.com (Postfix) with ESMTPSA id 44B6E336206B; Mon, 22 Feb 2021 02:03:24 +0100 (CET) Date: Mon, 22 Feb 2021 02:03:21 +0100 From: Danny Milosavljevic To: Jan Nieuwenhuizen Subject: Re: Update on wip-arm-bootstrap Message-ID: <20210222020321.6b47ad8b@scratchpost.org> In-Reply-To: <874ki5then.fsf@gnu.org> References: <87blco9v58.fsf@gnu.org> <874ki9qocf.fsf@gnu.org> <874ki5then.fsf@gnu.org> X-Mailer: Claws Mail 3.17.8 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: multipart/signed; boundary="Sig_/aab.Jka1e35u6Cd3mp.8+KF"; protocol="application/pgp-signature"; micalg=pgp-sha512 Received-SPF: none client-ip=85.13.145.193; envelope-from=dannym@scratchpost.org; helo=dd26836.kasserver.com X-Spam_score_int: -25 X-Spam_score: -2.6 X-Spam_bar: -- X-Spam_report: (-2.6 / 5.0 requ) BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_NONE=0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: guix-devel@gnu.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "Development of GNU Guix and the GNU System distribution." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: guix-devel@gnu.org, bug-mes@gnu.org Errors-To: guix-devel-bounces+larch=yhetil.org@gnu.org Sender: "Guix-devel" X-Migadu-Flow: FLOW_IN X-Migadu-Spam-Score: -4.47 Authentication-Results: aspmx1.migadu.com; dkim=none; dmarc=none; spf=pass (aspmx1.migadu.com: domain of guix-devel-bounces@gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=guix-devel-bounces@gnu.org X-Migadu-Queue-Id: 9E22511DB6 X-Spam-Score: -4.47 X-Migadu-Scanner: scn1.migadu.com X-TUID: NuaqkSs00W3O --Sig_/aab.Jka1e35u6Cd3mp.8+KF Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: quoted-printable > > Does that mean there are no old reference binaries known to work on > > Novena? =20 >=20 > Not if they are binaries from before Lenny (2009), unless we compile the > kernel with OABI support, which as I understand from Danny, is a bad > idea. Weird. It backdoors https://en.wikipedia.org/wiki/Seccomp if you enable the kernel option CONFIG_OABI_COMPAT (it also breaks syscall auditing). And it's very easy to just change the syscall facility in glibc to emit EABI syscalls (load one new register with constant, and the swi number is differ= ent). Also, binaries compiled with gcc already [say they] are EABI (while using OABI syscalls :P). So I think just using EABI syscalls is easier than figuring out how to get gcc to emit OABI executables--which otherwise are an obsolete format. GNU Mes for ARM does not use OABI for its own system calls either. I mean as a test we could totally enable that kernel option and see whether the bootstrap works. But it's of limited long-term use. If we want regular people to be able to build our bootstrap binaries, we probably shouldn't rely on them enabling obscure kernel options where the kernel docs say you shouldn't enable those. --Sig_/aab.Jka1e35u6Cd3mp.8+KF Content-Type: application/pgp-signature Content-Description: OpenPGP digital signature -----BEGIN PGP SIGNATURE----- iQEzBAEBCgAdFiEEds7GsXJ0tGXALbPZ5xo1VCwwuqUFAmAzAtkACgkQ5xo1VCww uqV1UQf9Ggi6vs82gXED7YTxA76TUZTx4cwhoduyVEY4BpGoWYbmolYVaxIVsB33 s8+exjapQIT9iiYLyDmZ15Ir3xHCpJLGTGjbrDW+dQULFBy+haTSXxIBD6OgYhRd lxIvkl6ld+py7TS9CNeed/Fr4xt1lAa3zZuarkvnYODr0GvfQe2QjMIki6dRain+ 4UoRYTkQSknHbRtpMTw+p50MF2XCrM26k7jGHKrkDgWqqsZarffepJfSFmyLTF5m /TJyySQC9pJKbIoyHGP/1TzDR6+jHnFw0+3dDt73QU5Y/hMz/c+LjJ37FVqB7L+V 39s45ljJ4r3U1CuGLr73mvESImNUSg== =PwA6 -----END PGP SIGNATURE----- --Sig_/aab.Jka1e35u6Cd3mp.8+KF--