From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on ip-172-31-74-118.ec2.internal X-Spam-Level: X-Spam-Status: No, score=-1.9 required=3.0 tests=BAYES_00,FREEMAIL_FROM autolearn=ham autolearn_force=no version=3.4.4 X-Received: by 2002:aed:2b82:: with SMTP id e2mr48588871qtd.143.1594024599789; Mon, 06 Jul 2020 01:36:39 -0700 (PDT) X-Received: by 2002:a05:6830:61a:: with SMTP id w26mr40486091oti.178.1594024599560; Mon, 06 Jul 2020 01:36:39 -0700 (PDT) Path: eternal-september.org!reader01.eternal-september.org!feeder.eternal-september.org!news.gegeweb.eu!gegeweb.org!usenet-fr.net!proxad.net!feeder1-2.proxad.net!209.85.160.216.MISMATCH!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail Newsgroups: comp.lang.ada Date: Mon, 6 Jul 2020 01:36:39 -0700 (PDT) In-Reply-To: Complaints-To: groups-abuse@google.com Injection-Info: google-groups.googlegroups.com; posting-host=79.19.129.183; posting-account=JRF_-woAAABYlsAtkCl_CUxBuQy2SsaQ NNTP-Posting-Host: 79.19.129.183 References: <242465de-0171-44b1-9618-752b22c3604co@googlegroups.com> <11c21c57-69de-4fcb-9193-71a98ca93ecao@googlegroups.com> <126727e4-3108-46cd-acc6-e42dbdb9dd6bo@googlegroups.com> <011aef92-84e3-47e5-a558-a8c2c6504161o@googlegroups.com> <8959b86d-ec38-4e0b-a272-384751914732o@googlegroups.com> <16b49b03-8657-425d-bad5-67cc5fe725d2o@googlegroups.com> <891fe070-40a4-4ba2-a7be-a7e9c4c036a4o@googlegroups.com> <04195e55-a82f-4035-a05d-5078ea2e6259o@googlegroups.com> <2790711b-d169-4a19-b666-5853eb0f5268o@googlegroups.com> <7052e60c-33ad-4961-9a2c-76014bd6c516o@googlegroups.com> User-Agent: G2/1.0 MIME-Version: 1.0 Message-ID: <6efbebf3-8dd2-4909-ab48-d57ba39dc309o@googlegroups.com> Subject: Re: SweetAda 0.1 released From: gabriele.galeotti.xyz@gmail.com Injection-Date: Mon, 06 Jul 2020 08:36:39 +0000 Content-Type: text/plain; charset="UTF-8" Xref: reader01.eternal-september.org comp.lang.ada:59358 List-Id: On Monday, July 6, 2020 at 5:03:24 AM UTC+2, Roger wrote: > On Monday, July 6, 2020 at 7:41:29 AM UTC+10, gabriele....@gmail.com wrote: > > > Please re-download the x86_64-sweetada-elf-20200417M.tar.gz toolchain and overwrite the old one. Now the support executables like elftool are statically linked against the problematic library. > > > > Hope this helps. If QEMU runs, I've prepared a new ioemu.cfg script that allows output to the Terminal app. > > > /opt/sweetada/bin/make run > runs through to > runsweetada: loading: /System/Volumes/Data/Ada_Source/sweetada-0.1/platforms/PC-x86-64/qemu.cfg > runsweetada: working directory: /System/Volumes/Data/Ada_Source/sweetada-0.1/platforms/PC-x86-64 > runsweetada: executing: /opt/sweetada/bin/qemu-system-x86_64 > then OK through to > > IOEMU: initializing > IOEMU: PPID = 69722 > IOEMU: PID = 69723 > qemu-system-x86_64: -device ne2k_pci,netdev=qemu,mac=02:00:00:11:22:33: Property 'ne2k_pci.netdev' can't find value 'qemu' > IOEMU: shutdown > runsweetada: execute_exec(): child pid 69723 exited with status: 1. > runsweetada: *** Error: exec_command() exit status: 1. Re-download http://www.sweetada.org/packages/qemu.cfg As a general advice, you can comment problematic lines in that file with a "#". The new version should allow to run a terminal and see the characters "XYZ" appear. Let me know.