forked from rarias/jungle
Compare commits
9 Commits
c5563ab111
...
remove-inp
| Author | SHA1 | Date | |
|---|---|---|---|
|
08c6af06ef
|
|||
| 1fba0a14a8 | |||
| d6621e939a | |||
| 67726c1d44 | |||
| a971ed6a54 | |||
| 06581e455c | |||
| dd7f24f455 | |||
| 64e2c39582 | |||
| 98d17b19d3 |
@@ -12,4 +12,9 @@ jobs:
|
|||||||
runs-on: native
|
runs-on: native
|
||||||
steps:
|
steps:
|
||||||
- uses: https://gitea.com/ScMi1/checkout@v1.4
|
- uses: https://gitea.com/ScMi1/checkout@v1.4
|
||||||
- run: nix build -L --no-link --print-out-paths .#bsc-ci.all
|
- run: nix build -L --no-link --print-out-paths .#bsc.ci.all
|
||||||
|
build:cross:
|
||||||
|
runs-on: native
|
||||||
|
steps:
|
||||||
|
- uses: https://gitea.com/ScMi1/checkout@v1.4
|
||||||
|
- run: nix build -L --no-link --print-out-paths .#bsc.ci.cross
|
||||||
|
|||||||
71
flake.lock
generated
71
flake.lock
generated
@@ -2,12 +2,14 @@
|
|||||||
"nodes": {
|
"nodes": {
|
||||||
"agenix": {
|
"agenix": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"darwin": "darwin",
|
"darwin": [],
|
||||||
"home-manager": "home-manager",
|
"home-manager": [],
|
||||||
"nixpkgs": [
|
"nixpkgs": [
|
||||||
"nixpkgs"
|
"nixpkgs"
|
||||||
],
|
],
|
||||||
"systems": "systems"
|
"systems": [
|
||||||
|
"systems"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1750173260,
|
"lastModified": 1750173260,
|
||||||
@@ -23,49 +25,6 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"darwin": {
|
|
||||||
"inputs": {
|
|
||||||
"nixpkgs": [
|
|
||||||
"agenix",
|
|
||||||
"nixpkgs"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"locked": {
|
|
||||||
"lastModified": 1744478979,
|
|
||||||
"narHash": "sha256-dyN+teG9G82G+m+PX/aSAagkC+vUv0SgUw3XkPhQodQ=",
|
|
||||||
"owner": "lnl7",
|
|
||||||
"repo": "nix-darwin",
|
|
||||||
"rev": "43975d782b418ebf4969e9ccba82466728c2851b",
|
|
||||||
"type": "github"
|
|
||||||
},
|
|
||||||
"original": {
|
|
||||||
"owner": "lnl7",
|
|
||||||
"ref": "master",
|
|
||||||
"repo": "nix-darwin",
|
|
||||||
"type": "github"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"home-manager": {
|
|
||||||
"inputs": {
|
|
||||||
"nixpkgs": [
|
|
||||||
"agenix",
|
|
||||||
"nixpkgs"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"locked": {
|
|
||||||
"lastModified": 1745494811,
|
|
||||||
"narHash": "sha256-YZCh2o9Ua1n9uCvrvi5pRxtuVNml8X2a03qIFfRKpFs=",
|
|
||||||
"owner": "nix-community",
|
|
||||||
"repo": "home-manager",
|
|
||||||
"rev": "abfad3d2958c9e6300a883bd443512c55dfeb1be",
|
|
||||||
"type": "github"
|
|
||||||
},
|
|
||||||
"original": {
|
|
||||||
"owner": "nix-community",
|
|
||||||
"repo": "home-manager",
|
|
||||||
"type": "github"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"nixpkgs": {
|
"nixpkgs": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1752436162,
|
"lastModified": 1752436162,
|
||||||
@@ -85,23 +44,21 @@
|
|||||||
"root": {
|
"root": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"agenix": "agenix",
|
"agenix": "agenix",
|
||||||
"nixpkgs": "nixpkgs"
|
"nixpkgs": "nixpkgs",
|
||||||
|
"systems": "systems"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"systems": {
|
"systems": {
|
||||||
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1681028828,
|
"path": "./pkgs/systems.nix",
|
||||||
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
|
"type": "path"
|
||||||
"owner": "nix-systems",
|
|
||||||
"repo": "default",
|
|
||||||
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
|
|
||||||
"type": "github"
|
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "nix-systems",
|
"path": "./pkgs/systems.nix",
|
||||||
"repo": "default",
|
"type": "path"
|
||||||
"type": "github"
|
},
|
||||||
}
|
"parent": []
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"root": "root",
|
"root": "root",
|
||||||
|
|||||||
11
flake.nix
11
flake.nix
@@ -1,8 +1,15 @@
|
|||||||
{
|
{
|
||||||
inputs = {
|
inputs = {
|
||||||
nixpkgs.url = "github:NixOS/nixpkgs/nixos-25.05";
|
nixpkgs.url = "github:NixOS/nixpkgs/nixos-25.05";
|
||||||
|
|
||||||
|
systems.url = "path:./pkgs/systems.nix";
|
||||||
|
systems.flake = false;
|
||||||
|
|
||||||
agenix.url = "github:ryantm/agenix";
|
agenix.url = "github:ryantm/agenix";
|
||||||
agenix.inputs.nixpkgs.follows = "nixpkgs";
|
agenix.inputs.nixpkgs.follows = "nixpkgs";
|
||||||
|
agenix.inputs.systems.follows = "systems";
|
||||||
|
agenix.inputs.darwin.follows = "";
|
||||||
|
agenix.inputs.home-manager.follows = "";
|
||||||
};
|
};
|
||||||
|
|
||||||
outputs = { self, nixpkgs, agenix, ... }:
|
outputs = { self, nixpkgs, agenix, ... }:
|
||||||
@@ -42,9 +49,7 @@ in
|
|||||||
# full nixpkgs with our overlay applied
|
# full nixpkgs with our overlay applied
|
||||||
legacyPackages.${system} = pkgs;
|
legacyPackages.${system} = pkgs;
|
||||||
|
|
||||||
hydraJobs = {
|
hydraJobs = self.legacyPackages.${system}.bsc.hydraJobs;
|
||||||
inherit (self.legacyPackages.${system}.bsc-ci) tests pkgs cross;
|
|
||||||
};
|
|
||||||
|
|
||||||
# propagate nixpkgs lib, so we can do bscpkgs.lib
|
# propagate nixpkgs lib, so we can do bscpkgs.lib
|
||||||
inherit (nixpkgs) lib;
|
inherit (nixpkgs) lib;
|
||||||
|
|||||||
@@ -11,6 +11,7 @@
|
|||||||
./base/hw.nix
|
./base/hw.nix
|
||||||
./base/net.nix
|
./base/net.nix
|
||||||
./base/nix.nix
|
./base/nix.nix
|
||||||
|
./base/sys-devices.nix
|
||||||
./base/ntp.nix
|
./base/ntp.nix
|
||||||
./base/rev.nix
|
./base/rev.nix
|
||||||
./base/ssh.nix
|
./base/ssh.nix
|
||||||
|
|||||||
9
m/common/base/sys-devices.nix
Normal file
9
m/common/base/sys-devices.nix
Normal file
@@ -0,0 +1,9 @@
|
|||||||
|
{
|
||||||
|
nix.settings.system-features = [ "sys-devices" ];
|
||||||
|
|
||||||
|
programs.nix-required-mounts.enable = true;
|
||||||
|
programs.nix-required-mounts.allowedPatterns.sys-devices.paths = [
|
||||||
|
"/sys/devices/system/cpu"
|
||||||
|
"/sys/devices/system/node"
|
||||||
|
];
|
||||||
|
}
|
||||||
53
overlay.nix
53
overlay.nix
@@ -62,7 +62,7 @@ let
|
|||||||
};
|
};
|
||||||
|
|
||||||
tests = rec {
|
tests = rec {
|
||||||
#hwloc = callPackage ./test/bugs/hwloc.nix { }; # Broken, no /sys
|
hwloc = callPackage ./test/bugs/hwloc.nix { };
|
||||||
#sigsegv = callPackage ./test/reproducers/sigsegv.nix { };
|
#sigsegv = callPackage ./test/reproducers/sigsegv.nix { };
|
||||||
hello-c = callPackage ./test/compilers/hello-c.nix { };
|
hello-c = callPackage ./test/compilers/hello-c.nix { };
|
||||||
hello-cpp = callPackage ./test/compilers/hello-cpp.nix { };
|
hello-cpp = callPackage ./test/compilers/hello-cpp.nix { };
|
||||||
@@ -94,12 +94,18 @@ let
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
pkgs = filterAttrs (_: isDerivation) bscPkgs;
|
# For now, only build toplevel packages in CI/Hydra
|
||||||
|
pkgsTopLevel = filterAttrs (_: isDerivation) bscPkgs;
|
||||||
|
|
||||||
crossTargets = [ "riscv64" ];
|
# Native build in that platform doesn't imply cross build works
|
||||||
cross = prev.lib.genAttrs crossTargets (target:
|
canCrossCompile = platform: pkg:
|
||||||
final.pkgsCross.${target}.bsc-ci.pkgs
|
(isDerivation pkg) &&
|
||||||
);
|
# Must be defined explicitly
|
||||||
|
(pkg.meta.cross or false) &&
|
||||||
|
(meta.availableOn platform pkg);
|
||||||
|
|
||||||
|
# For now only RISC-V
|
||||||
|
crossSet = { riscv64 = final.pkgsCross.riscv64.bsc.pkgsTopLevel; };
|
||||||
|
|
||||||
buildList = name: paths:
|
buildList = name: paths:
|
||||||
final.runCommandLocal name { } ''
|
final.runCommandLocal name { } ''
|
||||||
@@ -113,22 +119,31 @@ let
|
|||||||
printf '%s\n' $deps >$out
|
printf '%s\n' $deps >$out
|
||||||
'';
|
'';
|
||||||
|
|
||||||
crossList = builtins.mapAttrs (t: v: buildList t (builtins.attrValues v)) cross;
|
pkgsList = buildList "ci-pkgs" (builtins.attrValues pkgsTopLevel);
|
||||||
|
testsList = buildList "ci-tests" (collect isDerivation tests);
|
||||||
pkgsList = buildList "ci-pkgs" (builtins.attrValues pkgs);
|
allList = buildList' "ci-all" [ pkgsList testsList ];
|
||||||
testList = buildList "ci-tests" (collect isDerivation tests);
|
# For now only RISC-V
|
||||||
|
crossList = buildList "ci-cross"
|
||||||
all = buildList' "ci-all" [ pkgsList testList ];
|
(filter
|
||||||
|
(canCrossCompile final.pkgsCross.riscv64.stdenv.hostPlatform)
|
||||||
|
(builtins.attrValues crossSet.riscv64));
|
||||||
|
|
||||||
in bscPkgs // {
|
in bscPkgs // {
|
||||||
# Prevent accidental usage of bsc attribute
|
# Prevent accidental usage of bsc-ci attribute
|
||||||
bsc = throw "the bsc attribute is deprecated, packages are now in the root";
|
bsc-ci = throw "the bsc-ci attribute is deprecated, use bsc.ci";
|
||||||
|
|
||||||
# Internal for our CI tests
|
# Internal for our CI tests
|
||||||
bsc-ci = {
|
bsc = {
|
||||||
inherit pkgs pkgsList;
|
# CI targets for nix build
|
||||||
inherit tests testList;
|
ci = { pkgs = pkgsList; tests = testsList; all = allList; cross = crossList; };
|
||||||
inherit cross crossList;
|
|
||||||
inherit all;
|
# Direct access to package sets
|
||||||
|
tests = tests;
|
||||||
|
pkgs = bscPkgs;
|
||||||
|
pkgsTopLevel = pkgsTopLevel;
|
||||||
|
cross = crossSet;
|
||||||
|
|
||||||
|
# Hydra uses attribute sets of pkgs
|
||||||
|
hydraJobs = { tests = tests; pkgs = pkgsTopLevel; cross = crossSet; };
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -22,11 +22,7 @@ stdenv.mkDerivation rec {
|
|||||||
'';
|
'';
|
||||||
|
|
||||||
buildInputs = [ libtirpc ];
|
buildInputs = [ libtirpc ];
|
||||||
patches = [
|
patches = [ ./fix-install.patch ./gcc-14.patch ];
|
||||||
./fix-install.patch
|
|
||||||
./gcc-14.patch
|
|
||||||
./fix-cross.patch
|
|
||||||
];
|
|
||||||
|
|
||||||
hardeningDisable = [ "all" ];
|
hardeningDisable = [ "all" ];
|
||||||
|
|
||||||
@@ -39,8 +35,8 @@ stdenv.mkDerivation rec {
|
|||||||
CFLAGS=-Wno-implicit-int
|
CFLAGS=-Wno-implicit-int
|
||||||
CPPFLAGS=-I${libtirpc.dev}/include/tirpc
|
CPPFLAGS=-I${libtirpc.dev}/include/tirpc
|
||||||
LDFLAGS=-ltirpc
|
LDFLAGS=-ltirpc
|
||||||
CC=${stdenv.cc.targetPrefix}cc
|
CC=$CC
|
||||||
AR=${stdenv.cc.targetPrefix}ar
|
AR=$AR
|
||||||
)
|
)
|
||||||
'';
|
'';
|
||||||
|
|
||||||
|
|||||||
@@ -1,13 +0,0 @@
|
|||||||
diff --git a/src/Makefile b/src/Makefile
|
|
||||||
index 2555014..356eeb3 100644
|
|
||||||
--- a/src/Makefile
|
|
||||||
+++ b/src/Makefile
|
|
||||||
@@ -36,7 +36,7 @@ SHELL=/bin/sh
|
|
||||||
|
|
||||||
CC=`../scripts/compiler`
|
|
||||||
MAKE=`../scripts/make`
|
|
||||||
-AR=ar
|
|
||||||
+AR?=ar
|
|
||||||
ARCREATE=cr
|
|
||||||
|
|
||||||
# base of installation location
|
|
||||||
@@ -78,6 +78,8 @@ in
|
|||||||
] ++
|
] ++
|
||||||
(optional enableJemalloc "--with-jemalloc=${jemallocNanos6}") ++
|
(optional enableJemalloc "--with-jemalloc=${jemallocNanos6}") ++
|
||||||
(optional enableGlibcxxDebug "CXXFLAGS=-D_GLIBCXX_DEBUG") ++
|
(optional enableGlibcxxDebug "CXXFLAGS=-D_GLIBCXX_DEBUG") ++
|
||||||
|
# Most nanos6 api symbols are resolved at runtime, so prefer
|
||||||
|
# ifunc by default
|
||||||
(optional isCross "--with-symbol-resolution=ifunc");
|
(optional isCross "--with-symbol-resolution=ifunc");
|
||||||
|
|
||||||
postConfigure = lib.optionalString (!enableDebug) ''
|
postConfigure = lib.optionalString (!enableDebug) ''
|
||||||
|
|||||||
@@ -55,4 +55,7 @@ in
|
|||||||
doCheck = true;
|
doCheck = true;
|
||||||
checkTarget = "test";
|
checkTarget = "test";
|
||||||
hardeningDisable = [ "all" ];
|
hardeningDisable = [ "all" ];
|
||||||
|
meta = {
|
||||||
|
cross = true;
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
4
pkgs/systems.nix
Normal file
4
pkgs/systems.nix
Normal file
@@ -0,0 +1,4 @@
|
|||||||
|
# See https://github.com/nix-systems/nix-systems
|
||||||
|
[
|
||||||
|
"x86_64-linux"
|
||||||
|
]
|
||||||
@@ -6,6 +6,7 @@
|
|||||||
|
|
||||||
stdenv.mkDerivation {
|
stdenv.mkDerivation {
|
||||||
name = "hwloc-test";
|
name = "hwloc-test";
|
||||||
|
requiredSystemFeatures = [ "sys-devices" ];
|
||||||
|
|
||||||
src = ./.;
|
src = ./.;
|
||||||
|
|
||||||
@@ -14,7 +15,7 @@ stdenv.mkDerivation {
|
|||||||
buildPhase = ''
|
buildPhase = ''
|
||||||
ls -l /sys
|
ls -l /sys
|
||||||
gcc -lhwloc hwloc.c -o hwloc
|
gcc -lhwloc hwloc.c -o hwloc
|
||||||
strace ./hwloc
|
strace ./hwloc > $out
|
||||||
'';
|
'';
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -23,9 +23,8 @@ in stdenv.mkDerivation {
|
|||||||
dontUnpack = true;
|
dontUnpack = true;
|
||||||
dontConfigure = true;
|
dontConfigure = true;
|
||||||
|
|
||||||
# nOS-V requires access to /sys/devices to request NUMA information. It will
|
# nOS-V requires access to /sys/devices to request NUMA information
|
||||||
# fail to run otherwise, so we disable the sandbox for this test.
|
requiredSystemFeatures = [ "sys-devices" ];
|
||||||
__noChroot = true;
|
|
||||||
|
|
||||||
buildInputs = [ openmp ];
|
buildInputs = [ openmp ];
|
||||||
|
|
||||||
|
|||||||
@@ -36,9 +36,8 @@ in stdenv.mkDerivation {
|
|||||||
dontUnpack = true;
|
dontUnpack = true;
|
||||||
dontConfigure = true;
|
dontConfigure = true;
|
||||||
|
|
||||||
# nOS-V requires access to /sys/devices to request NUMA information. It will
|
# nOS-V requires access to /sys/devices to request NUMA information
|
||||||
# fail to run otherwise, so we disable the sandbox for this test.
|
requiredSystemFeatures = [ "sys-devices" ];
|
||||||
__noChroot = true;
|
|
||||||
|
|
||||||
buildInputs = [ nosv ];
|
buildInputs = [ nosv ];
|
||||||
|
|
||||||
|
|||||||
@@ -24,9 +24,8 @@ in stdenv.mkDerivation {
|
|||||||
dontUnpack = true;
|
dontUnpack = true;
|
||||||
dontConfigure = true;
|
dontConfigure = true;
|
||||||
|
|
||||||
# nOS-V requires access to /sys/devices to request NUMA information. It will
|
# nOS-V requires access to /sys/devices to request NUMA information
|
||||||
# fail to run otherwise, so we disable the sandbox for this test.
|
requiredSystemFeatures = [ "sys-devices" ];
|
||||||
__noChroot = true;
|
|
||||||
|
|
||||||
buildPhase = ''
|
buildPhase = ''
|
||||||
set -x
|
set -x
|
||||||
|
|||||||
@@ -25,9 +25,10 @@ stdenv.mkDerivation rec {
|
|||||||
hardeningDisable = [ "all" ];
|
hardeningDisable = [ "all" ];
|
||||||
#NIX_DEBUG = 1;
|
#NIX_DEBUG = 1;
|
||||||
buildInputs = [ ]; #strace gdb;
|
buildInputs = [ ]; #strace gdb;
|
||||||
# NODES requires access to /sys/devices to request NUMA information. It will
|
|
||||||
# fail to run otherwise, so we disable the sandbox for this test.
|
# NODES requires access to /sys/devices to request NUMA information
|
||||||
__noChroot = true;
|
requiredSystemFeatures = [ "sys-devices" ];
|
||||||
|
|
||||||
buildPhase = ''
|
buildPhase = ''
|
||||||
set -x
|
set -x
|
||||||
#$CC -v
|
#$CC -v
|
||||||
|
|||||||
Reference in New Issue
Block a user