!pbdtvoHxUGLhcEvnlu:nixos.org

Exotic Nix Targets

328 Members
105 Servers

Load older messages


SenderMessageTime
13 Oct 2021
@piper:lutris.engineeringPiper McCorkle (they/them or she/her)In other news, with this commit you should be able to build a new bootstrap-tools just by building a derivation: https://github.com/NixOS/nixpkgs/pull/141448/commits/422076f81423e6f163669737bb70d7824653ea5d06:05:56
@sternenseemann:systemli.orgsterni
In reply to @piper:lutris.engineering
True, we could do that! Though that means we need to get a NixOS system working before being able to add that platform.
to start out it could be any linux distribution running a nix-daemon
08:33:52
@qyliss:fairydust.spaceAlyssa Rossalthough then trust is expanded to that distro08:35:53
@sternenseemann:systemli.orgsterniif there just was binfmt_misc for macOS huh :p09:28:50
@qyliss:fairydust.spaceAlyssa Rossain't that what Darling is trying to do?09:31:24
@sternenseemann:systemli.orgsterniI just wanted to make a joke about darwin being trusted technically :)09:33:36
@sternenseemann:systemli.orgsterniI wouldn't like trusting macOS for building NixOS/Linux stuff though; it's fine for building darwin ofc09:33:58
14 Oct 2021
@piper:lutris.engineeringPiper McCorkle (they/them or she/her)

I'm getting some really strange test failures on coreutils for ppc64le https://termbin.com/s4vc

Example:

FAIL: tests/du/no-x
===================

--- exp	2021-10-14 16:02:44.259294987 +0000
+++ out	2021-10-14 16:02:44.206294528 +0000
@@ -1 +1 @@
-du: 'd/no-x': Permission denied
+/build/coreutils-8.32/./src/du: cannot access 'd/no-x': Permission denied
FAIL tests/du/no-x.sh (exit status: 1)

Anyone seen anything like this before?

17:06:48
@piper:lutris.engineeringPiper McCorkle (they/them or she/her)This is part of the multi-stage bootstrap tools build, and I'm sadly not sure which stage it's part of - is it possible to show the dependency tree of a derivation?17:07:59
@piper:lutris.engineeringPiper McCorkle (they/them or she/her) Never mind, found nix-tree 17:10:30
@piper:lutris.engineeringPiper McCorkle (they/them or she/her)Ha, turns out I screwed up and it wasn't actually doing a multi-stage build (wasn't propagating an attr), guess I'm glad it didn't succeed and leave me with a cross bootstrap tools17:30:05
17 Oct 2021
@yuka:yuka.devYuka (she/her) joined the room.13:28:51
@mars:jupiterbroadcasting.commars joined the room.19:02:47
21 Oct 2021
@qyliss:fairydust.spaceAlyssa RossJust in case anybody missed it, we can build systemd with musl now thanks to yuka! https://nixpk.gs/pr-tracker.html?pr=14198008:29:22
23 Oct 2021
@sternenseemann:systemli.orgsterni Ryan Burns: ghc disables pie hardening for musl can this be dropped now? 10:05:04
@r-burns:matrix.orgRyan Burns sterni: Not sure - weren't people running into segfaults or smth before it was disabled? 17:37:16
@r-burns:matrix.orgRyan Burnsmy pie hardening fixes only addressed build-time failures so if anything was funky at runtime it might still need to be disabled17:37:49
@sternenseemann:systemli.orgsterniI'm not sure, maybe worth to try to blame the file18:44:51
@qyliss:fairydust.spaceAlyssa Ross i often check out the commit before the hardeningDisable was added and try building — if it failed then but now succeeds without, it's probably safe to remove. If it did build before, it was probably added to fix a runtime issue and should be retained pending further investigation. 18:51:12
@qyliss:fairydust.spaceAlyssa Rossanother thing you can do is check hardened gentoo (who've had pie for ages) or pkgsrc (who have just enabled it, so have fresh info on what packages need it)18:51:48
@hexa:lossy.networkhexa joined the room.23:42:19
26 Oct 2021
@grahamc:nixos.org@grahamc:nixos.orgchanged room power levels.01:15:52
@mjolnir:nixos.orgNixOS Moderation Bot changed their display name from mjolnir to NixOS Moderation Bot.02:00:00
@mjolnir:nixos.orgNixOS Moderation Bot set a profile picture.02:00:20
@mjolnir:nixos.orgNixOS Moderation Bot changed their profile picture.02:23:33
@mjolnir:nixos.orgNixOS Moderation Bot changed their profile picture.02:33:03
27 Oct 2021
@alxanyae:matrix.orgalyaeanyx joined the room.21:42:32
6 Nov 2021
@test:boba.bestTseb (Old) joined the room.09:18:51
10 May 2022
@piper:lutris.engineeringPiper McCorkle (they/them or she/her) changed their display name from Piper McCorkle (she/her or they/them) to Piper McCorkle (they/them or she/her).05:25:49
8 Nov 2021
@trofi:matrix.orgtrofi

ghc being a code generator used to generate non-pie code, then it was taught to generate -fPIC on explicit option and use -fno-pie at link time otherwise by "fixing" linker errors people see on pie-by-default toolchains. Mismatches should lead to link time failures on x86_64.

For some targets (x86_64-darwin) ghc just hardcodes -fPIC: https://github.com/ghc/ghc/blob/master/compiler/GHC/Driver/Session.hs#L3695

Chances are you don't need to explicitly disable "pie" (-fPIC) for ghc nowadays. The ideal fix would probably be to deault-enable -fPIC on ghc itself (similar to how nixpkgs enables it for gcc).

22:04:41

Show newer messages


Back to Room ListRoom Version: 6