From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mp0 ([2001:41d0:2:4a6f::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by ms11 with LMTPS id IHzqMt4mr16IaAAA0tVLHw (envelope-from ) for ; Sun, 03 May 2020 20:17:34 +0000 Received: from aspmx1.migadu.com ([2001:41d0:2:4a6f::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by mp0 with LMTPS id yHNnL+gmr17hAwAA1q6Kng (envelope-from ) for ; Sun, 03 May 2020 20:17:44 +0000 Received: from lists.gnu.org (lists.gnu.org [IPv6:2001:470:142::17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by aspmx1.migadu.com (Postfix) with ESMTPS id D0684943F78 for ; Sun, 3 May 2020 20:17:43 +0000 (UTC) Received: from localhost ([::1]:55490 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1jVL3Y-0006Yb-8j for larch@yhetil.org; Sun, 03 May 2020 16:17:44 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:40848) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1jVL3H-0006YD-90 for guix-devel@gnu.org; Sun, 03 May 2020 16:17:27 -0400 Received: from dd26836.kasserver.com ([85.13.145.193]:49992) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1jVL3F-00019X-Fc; Sun, 03 May 2020 16:17:26 -0400 Received: from localhost (80-110-127-207.cgn.dynamic.surfer.at [80.110.127.207]) by dd26836.kasserver.com (Postfix) with ESMTPSA id 5F4F43362ADC; Sun, 3 May 2020 22:17:22 +0200 (CEST) Date: Sun, 3 May 2020 22:17:19 +0200 From: Danny Milosavljevic To: Ludovic =?ISO-8859-1?Q?Court=E8s?= Subject: Re: branch master updated: gnu: Add musl-cross. Message-ID: <20200503221719.06f58042@scratchpost.org> In-Reply-To: <87ftcgzuow.fsf@gnu.org> References: <20200502155209.18737.35721@vcs0.savannah.gnu.org> <87ftcgzuow.fsf@gnu.org> X-Mailer: Claws Mail 3.17.5 (GTK+ 2.24.32; x86_64-unknown-linux-gnu) MIME-Version: 1.0 Content-Type: multipart/signed; boundary="Sig_/8JPxVmQk.jzuXUyY/0I80k2"; protocol="application/pgp-signature"; micalg=pgp-sha256 Received-SPF: none client-ip=85.13.145.193; envelope-from=dannym@scratchpost.org; helo=dd26836.kasserver.com X-detected-operating-system: by eggs.gnu.org: First seen = 2020/05/03 16:17:22 X-ACL-Warn: Detected OS = Linux 3.11 and newer [fuzzy] X-Spam_score_int: -25 X-Spam_score: -2.6 X-Spam_bar: -- X-Spam_report: (-2.6 / 5.0 requ) BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, URIBL_BLOCKED=0.001 autolearn=_AUTOLEARN X-Spam_action: no action X-BeenThere: guix-devel@gnu.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "Development of GNU Guix and the GNU System distribution." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: guix-devel@gnu.org Errors-To: guix-devel-bounces+larch=yhetil.org@gnu.org Sender: "Guix-devel" X-Scanner: scn0 X-Spam-Score: -1.11 Authentication-Results: aspmx1.migadu.com; dkim=none; dmarc=none; spf=pass (aspmx1.migadu.com: domain of guix-devel-bounces@gnu.org designates 2001:470:142::17 as permitted sender) smtp.mailfrom=guix-devel-bounces@gnu.org X-Scan-Result: default: False [-1.11 / 13.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; GENERIC_REPUTATION(0.00)[-0.49391023151144]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2001:470:142::/48:c]; IP_REPUTATION_HAM(0.00)[asn: 22989(0.14), country: US(-0.00), ip: 2001:470:142::17(-0.49)]; DWL_DNSWL_FAIL(0.00)[2001:470:142::17:server fail]; MX_GOOD(-0.50)[cached: eggs.gnu.org]; RCPT_COUNT_TWO(0.00)[2]; MAILLIST(-0.20)[mailman]; FORGED_RECIPIENTS_MAILLIST(0.00)[]; RCVD_IN_DNSWL_FAIL(0.00)[2001:470:142::17:server fail]; RCVD_TLS_LAST(0.00)[]; R_DKIM_NA(0.00)[]; ASN(0.00)[asn:22989, ipnet:2001:470:142::/48, country:US]; MID_RHS_MATCH_FROM(0.00)[]; TAGGED_FROM(0.00)[larch=yhetil.org]; ARC_NA(0.00)[]; RCVD_COUNT_FIVE(0.00)[5]; FROM_NEQ_ENVFROM(0.00)[dannym@scratchpost.org,guix-devel-bounces@gnu.org]; FROM_HAS_DN(0.00)[]; URIBL_BLOCKED(0.00)[gnu.org:email]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; MIME_TRACE(0.00)[0:+,1:+,2:~]; DMARC_NA(0.00)[scratchpost.org]; HAS_LIST_UNSUB(-0.01)[]; RECEIVED_SPAMHAUS_PBL(0.00)[80.110.127.207:received]; FORGED_SENDER_MAILLIST(0.00)[] X-TUID: hbW8x+Z6mMaE --Sig_/8JPxVmQk.jzuXUyY/0I80k2 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Hi Ludo, On Sun, 03 May 2020 21:26:23 +0200 Ludovic Court=C3=A8s wrote: > I understand cross-base.scm is becoming messy and we would need an > abstraction to facilitate its use. Still, to me it sounds like a better > option over big monolithic packages. >=20 > WDYT? In general I'm all for using our cross toolchain mechanism. However, this is the toolchain used by heads[1]--and they have reproducible builds. The use case is to be able to build heads in Guix without modification. Their attestation of secure boot actually verifies (and asks the user and documents the correct hashes in their README) whether the output hashes are correct--so the toolchain doesn't need to be just similar, it needs to make exactly the same executables. Also, they are using musl instead of glibc. I don't think we have a musl-g= cc yet and I've never done a musl gcc before. Could be easy, could be hard--who knows. That said, I'm all for it. However, I need heads for work--and one way or another it has to actually build the official version :) [1] https://github.com/osresearch/heads/ , basically a Linux that goes on t= he BIOS flash ROM. [2] https://github.com/osresearch/heads/pull/710 --Sig_/8JPxVmQk.jzuXUyY/0I80k2 Content-Type: application/pgp-signature Content-Description: OpenPGP digital signature -----BEGIN PGP SIGNATURE----- iQEzBAEBCAAdFiEEds7GsXJ0tGXALbPZ5xo1VCwwuqUFAl6vJs8ACgkQ5xo1VCww uqXwKQf/enjmMBdLuULzEk6NNF1E+UvGFHgDF+vOMVReComelOlnM7zLlh8YMi6i 00doRH99FeWFwuCEs5Pt+9k8AWQFhUWD86Piguiy1Ld0MYnKE6pTUa8Fj7dwSsMF l/xZmhzHnSoGABAYBNk2VH5b1Mxq4neVKQHs9wvS82zJ+QOfU80I0a/S0f2Klx3B KTafJ1E/qXSO1pPCRZwoLOUuDtpOm8531tliLd9qARZFpL5vvQI5s5qevxwlfm4b i/REVJqdonjv27jYW2bgJ+erH1aF7rkSYUBBaLWNI40Z22bWc1ii6bBGbCJV0F8x VHnIfr9XCwSW1Jutkei/vN8wSvcD0g== =KCpt -----END PGP SIGNATURE----- --Sig_/8JPxVmQk.jzuXUyY/0I80k2--