NetBSD Problem Report #59364
From www@netbsd.org Sat Apr 26 20:57:32 2025
Return-Path: <www@netbsd.org>
Received: from mail.netbsd.org (mail.netbsd.org [199.233.217.200])
(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256
client-signature RSA-PSS (2048 bits) client-digest SHA256)
(Client CN "mail.NetBSD.org", Issuer "mail.NetBSD.org CA" (not verified))
by mollari.NetBSD.org (Postfix) with ESMTPS id 0CDC91A923C
for <gnats-bugs@gnats.NetBSD.org>; Sat, 26 Apr 2025 20:57:32 +0000 (UTC)
Message-Id: <20250426205730.C34161A923E@mollari.NetBSD.org>
Date: Sat, 26 Apr 2025 20:57:30 +0000 (UTC)
From: campbell+netbsd@mumble.net
Reply-To: campbell+netbsd@mumble.net
To: gnats-bugs@NetBSD.org
Subject: ctf tools needs update
X-Send-Pr-Version: www-1.0
>Number: 59364
>Category: toolchain
>Synopsis: ctf tools needs update
>Confidential: no
>Severity: serious
>Priority: medium
>Responsible: toolchain-manager
>State: open
>Class: sw-bug
>Submitter-Id: net
>Arrival-Date: Sat Apr 26 21:00:01 +0000 2025
>Last-Modified: Wed Jun 04 19:35:01 +0000 2025
>Originator: Taylor R Campbell
>Release: current
>Organization:
The NetCTF Updation
>Environment:
>Description:
I tried using -Wl,-z,pack-relative-relocs (see PR bin/59360: ld.elf_so(8): missing RELR support, https://gnats.NetBSD.org/59360) and nbctfmerge failed with:
ERROR: nbctfmerge: h_r_relative_pack: Cannot get sect .relr.dyn data: Invalid section descriptor
ctf upstream probably also supports >32k types these days (not verified) which will help us avoid hitting limits in the kernel that break dtrace type information too.
>How-To-Repeat:
enable newfangled linker toys like -Wl,-z,pack-relative-relocs in a MKCTF=yes build
>Fix:
Yes, please!
>Audit-Trail:
From: matthew green <mrg@eterna23.net>
To: gnats-bugs@netbsd.org
Cc: toolchain-manager@netbsd.org, gnats-admin@netbsd.org,
netbsd-bugs@netbsd.org
Subject: re: toolchain/59364: ctf tools needs update
Date: Mon, 28 Apr 2025 07:15:04 +1000
yes please.
also see PR#57664: ctf tools don't handle DWARF version 5.
our in-tree GCC has a patch to default to version 4.
.mrg.
From: Christos Zoulas <christos@zoulas.com>
To: matthew green <mrg@eterna23.net>
Cc: gnats-bugs@netbsd.org,
toolchain-manager@netbsd.org,
gnats-admin@netbsd.org,
netbsd-bugs@netbsd.org
Subject: Re: toolchain/59364: ctf tools needs update
Date: Wed, 4 Jun 2025 15:34:15 -0400
--Apple-Mail=_D1F413C5-5867-48E0-BCE6-D10041F36561
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
charset=us-ascii
This is not a problem with CTF. It just calls elf_getdata() from =
elftoolchain and libelf does
not support reading the .relr.dyn section. I suspect the same issue with =
DWARF 4 vs 5.
libdwarf in elftoolchain needs updating....
christos=
--Apple-Mail=_D1F413C5-5867-48E0-BCE6-D10041F36561
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment;
filename=signature.asc
Content-Type: application/pgp-signature;
name=signature.asc
Content-Description: Message signed with OpenPGP
-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org
iF0EARECAB0WIQS+BJlbqPkO0MDBdsRxESqxbLM7OgUCaECftwAKCRBxESqxbLM7
Ohc+AKCpfESctW1Qb8yhSvJDe+3cfbpTtQCgu1i04OkzgYJFxJBQoIK9qehB10M=
=5woL
-----END PGP SIGNATURE-----
--Apple-Mail=_D1F413C5-5867-48E0-BCE6-D10041F36561--
(Contact us)
$NetBSD: query-full-pr,v 1.47 2022/09/11 19:34:41 kim Exp $
$NetBSD: gnats_config.sh,v 1.9 2014/08/02 14:16:04 spz Exp $
Copyright © 1994-2025
The NetBSD Foundation, Inc. ALL RIGHTS RESERVED.