https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=153243
Kristoffer Eriksson <[email protected]> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |[email protected] --- Comment #2 from Kristoffer Eriksson <[email protected]> --- This sounds to me like the same problem that was later solved in the following discussion in 2013: https://lists.freebsd.org/pipermail/freebsd-hackers/2013-October/043615.html The solution was to run "sysctl security.bsd.map_at_zero=1” or add “security.bsd.map_at_zero=1“ to /etc/sysctl.conf. The problem was that COFF files want to load at address 0, which is no longer allowed by default. The executable code ends up on the wrong address, and crashes. So it is not really a bug, just difficult to use. There was some follow-up discussion that this setting is documented in aout(4), but that some more documentation and clearer messages might be added for COFF (or iBCS2) too. Or make the COFF loader allow this automatically. Most people would probably never find this out for themselves, and would just conclude that iBCS2 is broken, so I think some of those suggestions should be undertaken. It took me a long time to find this by googling too. -- You are receiving this mail because: You are the assignee for the bug. _______________________________________________ [email protected] mailing list https://lists.freebsd.org/mailman/listinfo/freebsd-emulation To unsubscribe, send any mail to "[email protected]"
