!eWOErHSaiddIbsUNsJ:nixos.org

NixOS CUDA

290 Members
CUDA packages maintenance and support in nixpkgs | https://github.com/orgs/NixOS/projects/27/ | https://nixos.org/manual/nixpkgs/unstable/#cuda57 Servers

Load older messages


SenderMessageTime
20 Dec 2024
@matthewcroughan:defenestrate.itmatthewcroughan SomeoneSerge (utc+3): Ah here it was https://discuss.pytorch.org/t/runtimeerror-could-not-create-a-primitive/117519 14:03:07
@matthewcroughan:defenestrate.itmatthewcroughan Oh wow.. I made it work SomeoneSerge (utc+3) 14:22:02
@matthewcroughan:defenestrate.itmatthewcroughanit was some systemd hardening feature causing it14:22:10
@matthewcroughan:defenestrate.itmatthewcroughan

It is one of these, but we do not know which one it is

          DevicePolicy = "closed";
          LockPersonality = true;
          MemoryDenyWriteExecute = true;
          NoNewPrivileges = true;
          PrivateDevices = false; # hides acceleration devices
          PrivateTmp = true;
          PrivateUsers = true;
          ProcSubset = "all"; # /proc/meminfo
          ProtectClock = true;
          ProtectControlGroups = true;
          ProtectHome = true;
          ProtectHostname = true;
          ProtectKernelLogs = true;
          ProtectKernelModules = true;
          ProtectKernelTunables = true;
          ProtectProc = "invisible";
          ProtectSystem = "strict";
          RemoveIPC = true;
          RestrictNamespaces = true;
          RestrictRealtime = true;
          RestrictSUIDSGID = true;
          RestrictAddressFamilies = [
            "AF_INET"
            "AF_INET6"
            "AF_UNIX"
          ];
          SupplementaryGroups = [ "render" ]; # for rocm to access /dev/dri/renderD* devices
          SystemCallArchitectures = "native";
          SystemCallFilter = [
            "@system-service @resources"
            "~@privileged"
          ];
          UMask = "0077";

14:24:04
@matthewcroughan:defenestrate.itmatthewcroughannow comes the bisecting14:28:29
@matthewcroughan:defenestrate.itmatthewcroughan It appears it was WriteMemoryDenyExecute causing it 14:35:34
@matthewcroughan:defenestrate.itmatthewcroughanhttps://github.com/pytorch/pytorch/issues/14365114:54:06
@matthewcroughan:defenestrate.itmatthewcroughanMade an issue in pytorch anyway 14:54:10
@ss:someonex.netSomeoneSerge (back on matrix)Nice. Maybe it's some kind of JIT stuff?14:54:41
@matthewcroughan:defenestrate.itmatthewcroughanYeah, I disabled JIT I thought with a var14:54:52
@matthewcroughan:defenestrate.itmatthewcroughanwho knows 14:54:53
@matthewcroughan:defenestrate.itmatthewcroughan PYTORCH_JIT = "0"; 14:55:08
@matthewcroughan:defenestrate.itmatthewcroughanI thought this had worked, maybe it had no impact for another reason 14:55:15
@matthewcroughan:defenestrate.itmatthewcroughanit seems to completely work with this turned off though14:56:43
@matthewcroughan:defenestrate.itmatthewcroughan Oh this is *so good SomeoneSerge (utc+3) 15:03:04
@matthewcroughan:defenestrate.itmatthewcroughan * Oh this is so good SomeoneSerge (utc+3) 15:03:11
@matthewcroughan:defenestrate.itmatthewcroughanimage.png
Download image.png
15:03:34
@matthewcroughan:defenestrate.itmatthewcroughanStable Diffusion Comfyui Pytorch CPU based fast VMtest achieved15:03:49
@matthewcroughan:defenestrate.itmatthewcroughanWho wants to build this kitty?15:34:53
@matthewcroughan:defenestrate.itmatthewcroughan nix build github:nixified-ai/flake/comfyui-unwrapped#checks.x86_64-linux.comfyui -L 15:35:08
@matthewcroughan:defenestrate.itmatthewcroughanbuild this kitty!15:35:10
@matthewcroughan:defenestrate.itmatthewcroughan@post yfw this works on aarch6415:46:42
@matthewcroughan:defenestrate.itmatthewcroughan * post yfw this works on aarch6415:46:45
@glepage:matrix.orgGaétan Lepage#Reproduced17:52:23
@glepage:matrix.orgGaétan Lepageclipboard.png
Download clipboard.png
17:52:29
@connorbaker:matrix.orgconnor (he/him) If you all wanted to run a NixOS VM test in which a VM actually ran nix build, how would you prepopulate the VM store so it has all the necessary build dependencies (sources, etc.).
Alternatively, if you wanted to run NixOS VM tests without the sandbox (so the test itself wouldn’t produce a store path on successful run) how would you do that?
22:08:40
@hacker1024:matrix.orghacker1024
In reply to @connorbaker:matrix.org
If you all wanted to run a NixOS VM test in which a VM actually ran nix build, how would you prepopulate the VM store so it has all the necessary build dependencies (sources, etc.).
Alternatively, if you wanted to run NixOS VM tests without the sandbox (so the test itself wouldn’t produce a store path on successful run) how would you do that?

1. You can add the inputDerivation of whatever you want to build to the VM, IIRC there's an option to add paths to copy into the VM's Nix database

2. You can use the driverInteractive version and run run_tests() (or maybe there's even just driver?)

22:11:49
@hacker1024:matrix.orghacker1024https://github.com/NixOS/nixpkgs/blob/316d2c82570270e90536e5a8a8947d5ac6159b5f/nixos/modules/virtualisation/qemu-vm.nix#L51322:12:49
@hacker1024:matrix.orghacker1024https://nixos.org/manual/nixos/stable/#sec-running-nixos-tests-interactively22:13:36
@ss:someonex.netSomeoneSerge (back on matrix) This isn't all that pretty but it works https://github.com/sinanmohd/evanix/blob/master/nixos/tests/dsl.nix 22:20:30

Show newer messages


Back to Room ListRoom Version: 9