blob: 6f1902af915b95184b12c7f69af18d48f7950705 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
|
Error building with BOX32 option on Neoverse-N1 aarch64/Oracle Cloud (error: ‘FUTEX_LOCK_PI2’ undeclared (first use in this function); did you mean ‘FUTEX_LOCK_PI’?)
Tried building using various options combinations with cmake .. -D **BOX32=1** and it all returned this specific error no matter what I try.
`/home/ubuntu/box64/src/emu/x86syscall_32.c:350:26: error: ‘FUTEX_LOCK_PI2’ undeclared (first use in this function); did you mean ‘FUTEX_LOCK_PI’?
350 | case FUTEX_LOCK_PI2:
| ^~~~~~~~~~~~~~
| FUTEX_LOCK_PI
/home/ubuntu/box64/src/emu/x86syscall_32.c:350:26: note: each undeclared identifier is reported only once for each function it appears in
/home/ubuntu/box64/src/emu/x86syscall_32.c: In function ‘my32_syscall’:
/home/ubuntu/box64/src/emu/x86syscall_32.c:533:26: error: ‘FUTEX_LOCK_PI2’ undeclared (first use in this function); did you mean ‘FUTEX_LOCK_PI’?
533 | case FUTEX_LOCK_PI2:
| ^~~~~~~~~~~~~~
| FUTEX_LOCK_PI
make[2]: *** [CMakeFiles/box64.dir/build.make:1297: CMakeFiles/box64.dir/src/emu/x86syscall_32.c.o] Error 1
`
Cpu info (if relevant):
Architecture: aarch64
CPU op-mode(s): 32-bit, 64-bit
Byte Order: Little Endian
CPU(s): 4
On-line CPU(s) list: 0-3
Thread(s) per core: 1
Core(s) per socket: 4
Socket(s): 1
NUMA node(s): 1
Vendor ID: ARM
Model: 1
Model name: Neoverse-N1
Stepping: r3p1
BogoMIPS: 50.00
NUMA node0 CPU(s): 0-3
Vulnerability Gather data sampling: Not affected
Vulnerability Itlb multihit: Not affected
Vulnerability L1tf: Not affected
Vulnerability Mds: Not affected
Vulnerability Meltdown: Not affected
Vulnerability Mmio stale data: Not affected
Vulnerability Reg file data sampling: Not affected
Vulnerability Retbleed: Not affected
Vulnerability Spec rstack overflow: Not affected
Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl
Vulnerability Spectre v1: Mitigation; __user pointer sanitization
Vulnerability Spectre v2: Mitigation; CSV2, BHB
Vulnerability Srbds: Not affected
Vulnerability Tsx async abort: Not affected
Flags: fp asimd evtstrm aes pmull sha1 sha2 crc32 atomics fphp asimdhp cpuid asimdrdm lrcpc dcpop asimddp
OS details:
Description: Ubuntu 20.04.6 LTS
Release: 20.04
Codename: focal
Sorry if this is a bad report as I'm kinda new to this.
Possibly offtopic: Forced to builld as the GitHub runner is using GLIBC 2.32 while my Ubuntu is using 2.31
/usr/local/bin/box32: /lib/aarch64-linux-gnu/libm.so.6: version `GLIBC_2.32' not found (required by /usr/local/bin/box32)
|