* [bug#41350] [PATCH 0/3] Use native qemu to build vm-image.
@ 2020-05-17 10:01 Jan Nieuwenhuizen
2020-05-17 10:03 ` [bug#41350] [PATCH 1/3] utils: Move 'reset-timestamps' out of database Jan (janneke) Nieuwenhuizen
` (5 more replies)
0 siblings, 6 replies; 50+ messages in thread
From: Jan Nieuwenhuizen @ 2020-05-17 10:01 UTC (permalink / raw)
To: 41350
Hi!
Cross-building a vm-image used to be done using a cross-qemu, e.g, qemu-ARM.
That does not work for the Hurd, as there is no qemu-HURD.
This patch switches to cross building vm-images using a native qemu vm. If
there a reason for using qemu-TARGET we may want to make this switch
conditional for cross building to the Hurd?
There is a tricky aspect to this: the "user-builder" includes all the
cross-built packages for TARGET, but we need to hard the native qemu a
native #+LOADER, loading native #+LINUX and #+INITRD.
To accomplish this NATIVE/CROSS mixt, the builder is then run with a native
guile, like so
--8<---------------cut here---------------start------------->8---
(system* #+(file-append (default-guile) "/bin/guile")
"--no-auto-compile"
#$(preserve-target user-builder))
--8<---------------cut here---------------end--------------->8---
while the packages in USER-BUILDER will still be cross-built. However,
because the builder has
(with-extensions gcrypt-sqlite3&co
(use-modules (gnu store database))
...)
this makes the native guile "see" the cross-built .GO files. That would
"only" be a secondary problem except that loading (sqlite3) throws an
exception when dynamic-loading the .SO fails. Seeing it like this I am not so
sure anymore this is a bug, WDYT? ...so instead
...the problem is now avoided by removing the sqlite dependency when
cross-building by not registering closures and postponing the loading of (gnu
store database) and thus (sqlite3).
I have reset wip-hurd-vm onto these changes, so you can also look there.
Doing
./pre-inst-env guix system vm-image --target=i586-pc-gnu --no-grafts \
gnu/system/examples/bare-hurd.tmpl
now produces a pretty nice hurd VM :-)
Greetings,
Janneke
Jan (janneke) Nieuwenhuizen (3):
utils: Move 'reset-timestamps' out of database.
system: vm: Do not register-closures when cross-building.
system: vm: Build vm-image using native qemu.
gnu/bootloader/grub.scm | 4 +--
gnu/build/vm.scm | 3 ++-
gnu/system/vm.scm | 54 ++++++++++++++++++++++++++---------------
guix/store/database.scm | 41 +++----------------------------
guix/utils.scm | 41 ++++++++++++++++++++++++++++---
5 files changed, 79 insertions(+), 64 deletions(-)
--
2.26.0
--
Jan Nieuwenhuizen <janneke@gnu.org> | GNU LilyPond http://lilypond.org
Freelance IT http://JoyofSource.com | Avatar® http://AvatarAcademy.com
^ permalink raw reply [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH 1/3] utils: Move 'reset-timestamps' out of database.
2020-05-17 10:01 [bug#41350] [PATCH 0/3] Use native qemu to build vm-image Jan Nieuwenhuizen
@ 2020-05-17 10:03 ` Jan (janneke) Nieuwenhuizen
2020-05-17 10:03 ` [bug#41350] [PATCH 2/3] system: vm: Do not register-closures when cross-building Jan (janneke) Nieuwenhuizen
2020-05-17 10:03 ` [bug#41350] [PATCH 3/3] system: vm: Build vm-image using native qemu Jan (janneke) Nieuwenhuizen
2020-05-18 9:10 ` [bug#41350] [PATCH 0/3] Use native qemu to build vm-image Mathieu Othacehe
` (4 subsequent siblings)
5 siblings, 2 replies; 50+ messages in thread
From: Jan (janneke) Nieuwenhuizen @ 2020-05-17 10:03 UTC (permalink / raw)
To: 41350
This supports calling reset-timestamps without loading sqlite3.
* guix/store/database.scm (reset-timestamps): Move to...
* guix/utils.scm (reset-timestamps): ... here.
* gnu/build/vm.scm: Include it.
---
gnu/build/vm.scm | 1 +
guix/store/database.scm | 41 +++--------------------------------------
guix/utils.scm | 41 ++++++++++++++++++++++++++++++++++++++---
3 files changed, 42 insertions(+), 41 deletions(-)
diff --git a/gnu/build/vm.scm b/gnu/build/vm.scm
index 433b5a7e8d..c751e6b0e2 100644
--- a/gnu/build/vm.scm
+++ b/gnu/build/vm.scm
@@ -26,6 +26,7 @@
#:use-module (guix build utils)
#:use-module (guix build store-copy)
#:use-module (guix build syscalls)
+ #:use-module ((guix utils) #:select (reset-timestamps))
#:use-module (guix store database)
#:use-module (gnu build bootloader)
#:use-module (gnu build linux-boot)
diff --git a/guix/store/database.scm b/guix/store/database.scm
index ef52036ede..b8fe313c3d 100644
--- a/guix/store/database.scm
+++ b/guix/store/database.scm
@@ -24,9 +24,8 @@
#:use-module (guix store deduplication)
#:use-module (guix base16)
#:use-module (guix progress)
- #:use-module (guix build syscalls)
- #:use-module ((guix build utils)
- #:select (mkdir-p executable-file?))
+ #:use-module ((guix build utils) #:select (mkdir-p))
+ #:use-module ((guix utils) #:select (reset-timestamps))
#:use-module (guix build store-copy)
#:use-module (srfi srfi-1)
#:use-module (srfi srfi-11)
@@ -42,8 +41,7 @@
sqlite-register
register-path
register-items
- %epoch
- reset-timestamps))
+ %epoch))
;;; Code for working with the store database directly.
@@ -227,39 +225,6 @@ Every store item in REFERENCES must already be registered."
;;;
;;; High-level interface.
;;;
-
-(define* (reset-timestamps file #:key preserve-permissions?)
- "Reset the modification time on FILE and on all the files it contains, if
-it's a directory. Canonicalize file permissions unless PRESERVE-PERMISSIONS?
-is true."
- ;; Note: We're resetting to one second after the Epoch like 'guix-daemon'
- ;; has always done.
- (let loop ((file file)
- (type (stat:type (lstat file))))
- (case type
- ((directory)
- (unless preserve-permissions?
- (chmod file #o555))
- (utime file 1 1 0 0)
- (let ((parent file))
- (for-each (match-lambda
- (("." . _) #f)
- ((".." . _) #f)
- ((file . properties)
- (let ((file (string-append parent "/" file)))
- (loop file
- (match (assoc-ref properties 'type)
- ((or 'unknown #f)
- (stat:type (lstat file)))
- (type type))))))
- (scandir* parent))))
- ((symlink)
- (utime file 1 1 0 0 AT_SYMLINK_NOFOLLOW))
- (else
- (unless preserve-permissions?
- (chmod file (if (executable-file? file) #o555 #o444)))
- (utime file 1 1 0 0)))))
-
(define* (register-path path
#:key (references '()) deriver prefix
state-directory (deduplicate? #t)
diff --git a/guix/utils.scm b/guix/utils.scm
index d7b197fa44..812617dd61 100644
--- a/guix/utils.scm
+++ b/guix/utils.scm
@@ -35,8 +35,10 @@
#:use-module (rnrs io ports) ;need 'port-position' etc.
#:use-module ((rnrs bytevectors) #:select (bytevector-u8-set!))
#:use-module (guix memoization)
- #:use-module ((guix build utils) #:select (dump-port mkdir-p delete-file-recursively))
- #:use-module ((guix build syscalls) #:select (mkdtemp! fdatasync))
+ #:use-module ((guix build utils)
+ #:select (dump-port mkdir-p delete-file-recursively
+ executable-file?))
+ #:use-module ((guix build syscalls) #:select (mkdtemp! fdatasync scandir*))
#:use-module (ice-9 format)
#:use-module (ice-9 regex)
#:use-module (ice-9 match)
@@ -109,7 +111,8 @@
call-with-decompressed-port
compressed-output-port
call-with-compressed-output-port
- canonical-newline-port))
+ canonical-newline-port
+ reset-timestamps))
\f
;;;
@@ -843,6 +846,38 @@ a location object."
fix-hint?
(hint condition-fix-hint)) ;string
+(define* (reset-timestamps file #:key preserve-permissions?)
+ "Reset the modification time on FILE and on all the files it contains, if
+it's a directory. Canonicalize file permissions unless PRESERVE-PERMISSIONS?
+is true."
+ ;; Note: We're resetting to one second after the Epoch like 'guix-daemon'
+ ;; has always done.
+ (let loop ((file file)
+ (type (stat:type (lstat file))))
+ (case type
+ ((directory)
+ (unless preserve-permissions?
+ (chmod file #o555))
+ (utime file 1 1 0 0)
+ (let ((parent file))
+ (for-each (match-lambda
+ (("." . _) #f)
+ ((".." . _) #f)
+ ((file . properties)
+ (let ((file (string-append parent "/" file)))
+ (loop file
+ (match (assoc-ref properties 'type)
+ ((or 'unknown #f)
+ (stat:type (lstat file)))
+ (type type))))))
+ (scandir* parent))))
+ ((symlink)
+ (utime file 1 1 0 0 AT_SYMLINK_NOFOLLOW))
+ (else
+ (unless preserve-permissions?
+ (chmod file (if (executable-file? file) #o555 #o444)))
+ (utime file 1 1 0 0)))))
+
;;; Local Variables:
;;; eval: (put 'call-with-progress-reporter 'scheme-indent-function 1)
;;; End:
--
2.26.0
^ permalink raw reply related [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH 2/3] system: vm: Do not register-closures when cross-building.
2020-05-17 10:03 ` [bug#41350] [PATCH 1/3] utils: Move 'reset-timestamps' out of database Jan (janneke) Nieuwenhuizen
@ 2020-05-17 10:03 ` Jan (janneke) Nieuwenhuizen
2020-05-17 10:03 ` [bug#41350] [PATCH 3/3] system: vm: Build vm-image using native qemu Jan (janneke) Nieuwenhuizen
1 sibling, 0 replies; 50+ messages in thread
From: Jan (janneke) Nieuwenhuizen @ 2020-05-17 10:03 UTC (permalink / raw)
To: 41350
This supports cross-building building a vm-image, running a native qemu.
* gnu/system/vm.scm (qemu-image)[register-closures?]: Default to #f when
cross-compiling. Only create sql-schema when actually registering closures.
---
gnu/build/vm.scm | 2 +-
gnu/system/vm.scm | 8 +++++---
2 files changed, 6 insertions(+), 4 deletions(-)
diff --git a/gnu/build/vm.scm b/gnu/build/vm.scm
index c751e6b0e2..2b36dd29ce 100644
--- a/gnu/build/vm.scm
+++ b/gnu/build/vm.scm
@@ -27,7 +27,7 @@
#:use-module (guix build store-copy)
#:use-module (guix build syscalls)
#:use-module ((guix utils) #:select (reset-timestamps))
- #:use-module (guix store database)
+ #:autoload (guix store database) (%epoch register-items sql-schema)
#:use-module (gnu build bootloader)
#:use-module (gnu build linux-boot)
#:use-module (gnu build install)
diff --git a/gnu/system/vm.scm b/gnu/system/vm.scm
index 3e483fd86c..97b0bf461b 100644
--- a/gnu/system/vm.scm
+++ b/gnu/system/vm.scm
@@ -286,7 +286,8 @@ substitutable."
os
bootcfg-drv
bootloader
- (register-closures? (has-guix-service-type? os))
+ (register-closures? (and (has-guix-service-type? os)
+ (not target)))
(inputs '())
copy-inputs?
(substitutable? #t))
@@ -333,12 +334,13 @@ system that is passed to 'populate-root-file-system'."
((gnu build linux-boot)
#:select (make-essential-device-nodes
make-hurd-device-nodes))
- (guix store database)
(guix build utils)
(srfi srfi-26)
(ice-9 binary-ports))
- (sql-schema #$schema)
+ (when #$register-closures?
+ (use-modules (guix store database))
+ (sql-schema #$schema))
;; Allow non-ASCII file names--e.g., 'nss-certs'--to be decoded.
(setenv "GUIX_LOCPATH"
--
2.26.0
^ permalink raw reply related [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH 3/3] system: vm: Build vm-image using native qemu.
2020-05-17 10:03 ` [bug#41350] [PATCH 1/3] utils: Move 'reset-timestamps' out of database Jan (janneke) Nieuwenhuizen
2020-05-17 10:03 ` [bug#41350] [PATCH 2/3] system: vm: Do not register-closures when cross-building Jan (janneke) Nieuwenhuizen
@ 2020-05-17 10:03 ` Jan (janneke) Nieuwenhuizen
1 sibling, 0 replies; 50+ messages in thread
From: Jan (janneke) Nieuwenhuizen @ 2020-05-17 10:03 UTC (permalink / raw)
To: 41350; +Cc: Ludovic Courtès
Cross-building a vm-image used to be done using a cross-qemu, e.g, qemu-ARM.
That does not work for the Hurd, as there is no qemu-HURD.
This patch switches to cross building vm-images using a native qemu vm.
* gnu/system/vm.scm (expression->derivation-in-linux-vm): Run native
qemu-command; use native linux, initrd, bootloader-package and
bootloader-installer.
[preserve-target]: New helper to install cross-packages into the native vm.
* gnu/bootloader/grub.scm (eye-candy): Use native font.
Co-authored-by: Ludovic Courtès <ludo@gnu.org>
---
gnu/bootloader/grub.scm | 4 ++--
gnu/system/vm.scm | 46 ++++++++++++++++++++++++++---------------
2 files changed, 31 insertions(+), 19 deletions(-)
diff --git a/gnu/bootloader/grub.scm b/gnu/bootloader/grub.scm
index 8c5b5eac0c..842592ccc9 100644
--- a/gnu/bootloader/grub.scm
+++ b/gnu/bootloader/grub.scm
@@ -211,8 +211,8 @@ else
set menu_color_highlight=white/blue
fi~%"
#$setup-gfxterm-body
- #$(grub-root-search store-device font-file)
- #$(setup-gfxterm config font-file)
+ #+(grub-root-search store-device font-file)
+ #+(setup-gfxterm config font-file)
#$(grub-setup-io config)
#$(strip-mount-point store-mount-point image)
diff --git a/gnu/system/vm.scm b/gnu/system/vm.scm
index 97b0bf461b..aa094b0a06 100644
--- a/gnu/system/vm.scm
+++ b/gnu/system/vm.scm
@@ -5,6 +5,7 @@
;;; Copyright © 2017 Mathieu Othacehe <m.othacehe@gmail.com>
;;; Copyright © 2017 Marius Bakke <mbakke@fastmail.com>
;;; Copyright © 2018 Chris Marusich <cmmarusich@gmail.com>
+;;; Copyright © 2020 Jan (janneke) Nieuwenhuizen <janneke@gnu.org>
;;;
;;; This file is part of GNU Guix.
;;;
@@ -180,19 +181,30 @@ made available under the /xchg CIFS share.
SUBSTITUTABLE? determines whether the returned derivation should be marked as
substitutable."
(define user-builder
- (program-file "builder-in-linux-vm" exp))
+ (scheme-file "builder-in-linux-vm" exp))
+
+ (define (preserve-target obj)
+ (if target
+ (with-parameters ((%current-target-system target))
+ obj)
+ obj))
(define loader
- ;; Invoke USER-BUILDER instead using 'primitive-load'. The reason for
- ;; this is to allow USER-BUILDER to dlopen stuff by using a full-featured
- ;; Guile, which it couldn't do using the statically-linked guile used in
- ;; the initrd. See example at
+ ;; Instead of using 'primitive-load', evaluate USER-BUILDER in a
+ ;; full-featured Guile so it can use dlopen stuff, which it couldn't do
+ ;; using the statically-linked guile used in the initrd. See example at
;; <https://lists.gnu.org/archive/html/guix-devel/2017-10/msg00233.html>.
(program-file "linux-vm-loader"
- ;; Communicate USER-BUILDER's exit status via /xchg so that
- ;; the host can distinguish between success, failure, and
- ;; kernel panic.
- #~(let ((status (system* #$user-builder)))
+ ;; When cross-compiling, USER-BUILDER refers to the target
+ ;; (cross-compiled) system. Preserve that, even though
+ ;; LOADER itself is executed as a native program.
+ #~(let ((status (system* #+(file-append (default-guile)
+ "/bin/guile")
+ "--no-auto-compile"
+ #$(preserve-target user-builder))))
+ ;; Communicate USER-BUILDER's exit status via /xchg so
+ ;; that the host can distinguish between success,
+ ;; failure, and kernel panic.
(call-with-output-file "/xchg/.exit-status"
(lambda (port)
(write status port)))
@@ -226,10 +238,10 @@ substitutable."
(let* ((native-inputs
'#+(list qemu (canonical-package coreutils)))
- (linux (string-append #$linux "/"
- #$(system-linux-image-file-name)))
- (initrd #$initrd)
- (loader #$loader)
+ (linux (string-append #+linux "/"
+ #+(system-linux-image-file-name)))
+ (initrd #+initrd)
+ (loader #+loader)
(graphs '#$(match references-graphs
(((graph-files . _) ...) graph-files)
(_ #f)))
@@ -245,7 +257,7 @@ substitutable."
(load-in-linux-vm loader
#:output #$output
#:linux linux #:initrd initrd
- #:qemu (qemu-command target)
+ #:qemu (qemu-command)
#:memory-size #$memory-size
#:make-disk-image? #$make-disk-image?
#:single-file-output? #$single-file-output?
@@ -348,7 +360,7 @@ system that is passed to 'populate-root-file-system'."
(setlocale LC_ALL "en_US.utf8")
(let ((inputs
- '#$(append (list parted e2fsprogs dosfstools)
+ '#+(append (list parted e2fsprogs dosfstools)
(map canonical-package
(list sed grep coreutils findutils gawk))))
@@ -425,12 +437,12 @@ system that is passed to 'populate-root-file-system'."
#:partitions partitions
#:grub-efi grub-efi
#:bootloader-package
- #$(bootloader-package bootloader)
+ #+(bootloader-package bootloader)
#:bootcfg #$bootcfg-drv
#:bootcfg-location
#$(bootloader-configuration-file bootloader)
#:bootloader-installer
- #$(bootloader-installer bootloader)))))))
+ #+(bootloader-installer bootloader)))))))
#:system system
#:target target
#:make-disk-image? #t
--
2.26.0
^ permalink raw reply related [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH 0/3] Use native qemu to build vm-image.
2020-05-17 10:01 [bug#41350] [PATCH 0/3] Use native qemu to build vm-image Jan Nieuwenhuizen
2020-05-17 10:03 ` [bug#41350] [PATCH 1/3] utils: Move 'reset-timestamps' out of database Jan (janneke) Nieuwenhuizen
@ 2020-05-18 9:10 ` Mathieu Othacehe
2020-05-19 7:22 ` Jan Nieuwenhuizen
2020-05-19 7:23 ` [bug#41350] [PATCH v2 1/3] utils: Move 'reset-timestamps' out of database Jan (janneke) Nieuwenhuizen
` (3 subsequent siblings)
5 siblings, 1 reply; 50+ messages in thread
From: Mathieu Othacehe @ 2020-05-18 9:10 UTC (permalink / raw)
To: Jan Nieuwenhuizen; +Cc: 41350
Hello Jan,
> Cross-building a vm-image used to be done using a cross-qemu, e.g, qemu-ARM.
> That does not work for the Hurd, as there is no qemu-HURD.
Yes that's an issue.
>
> This patch switches to cross building vm-images using a native qemu vm. If
> there a reason for using qemu-TARGET we may want to make this switch
> conditional for cross building to the Hurd?
Well first this 'vm-image' thing should be done in (gnu system image) as
soon as I have sorted out the bootloader issue. So the solution we will
find to overcome this Hurd issue will be temporary I hope.
About using qemu-TARGET, let say you are on an armhf machine and you
want to cross-build an x86-64 image. I fear that using a native, armhf
Grub to install an x86-64 Grub won't work.
So maybe, it would be better to do that only for the architectures
without an available qemu-TARGET (only the Hurd for now)?
> ...the problem is now avoided by removing the sqlite dependency when
> cross-building by not registering closures and postponing the loading of (gnu
> store database) and thus (sqlite3).
When I produce a system without register closures, once booted, "guix
build" something does not work. I don't know if its possible for
guix-daemon to work without its database. An option could be to generate
this database if its absent, at first boot?
> ./pre-inst-env guix system vm-image --target=i586-pc-gnu --no-grafts \
> gnu/system/examples/bare-hurd.tmpl
>
> now produces a pretty nice hurd VM :-)
Great to see you so close :)
Thanks,
Mathieu
^ permalink raw reply [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH 0/3] Use native qemu to build vm-image.
2020-05-18 9:10 ` [bug#41350] [PATCH 0/3] Use native qemu to build vm-image Mathieu Othacehe
@ 2020-05-19 7:22 ` Jan Nieuwenhuizen
2020-05-19 10:02 ` Mathieu Othacehe
0 siblings, 1 reply; 50+ messages in thread
From: Jan Nieuwenhuizen @ 2020-05-19 7:22 UTC (permalink / raw)
To: Mathieu Othacehe; +Cc: 41350
Mathieu Othacehe writes:
Hello Mathieu,
Thanks for chiming in, I meant to CC you... :-)
>> Cross-building a vm-image used to be done using a cross-qemu, e.g, qemu-ARM.
>> That does not work for the Hurd, as there is no qemu-HURD.
>
> Yes that's an issue.
Yes...luckily I think we found a way to use qemu-NATIVE to build
packages for the Hurd. Now to see if this can be put into digestible
form.
>> This patch switches to cross building vm-images using a native qemu vm. If
>> there a reason for using qemu-TARGET we may want to make this switch
>> conditional for cross building to the Hurd?
>
> Well first this 'vm-image' thing should be done in (gnu system image) as
> soon as I have sorted out the bootloader issue. So the solution we will
> find to overcome this Hurd issue will be temporary I hope.
Can you elaborate a bit on that? Do you think it makes sense to continue
this temporary path some more (as it starts to work right now), or can we
better abandon it and work the permanent solution? How could I contribute?
> About using qemu-TARGET, let say you are on an armhf machine and you
> want to cross-build an x86-64 image. I fear that using a native, armhf
> Grub to install an x86-64 Grub won't work.
Ah...right, that's helpful information.
> So maybe, it would be better to do that only for the architectures
> without an available qemu-TARGET (only the Hurd for now)?
OK -- I have changed patch 2 and 3, and am sending a new patch set.
>> ...the problem is now avoided by removing the sqlite dependency when
>> cross-building by not registering closures and postponing the loading of (gnu
>> store database) and thus (sqlite3).
>
> When I produce a system without register closures, once booted, "guix
> build" something does not work. I don't know if its possible for
> guix-daemon to work without its database. An option could be to generate
> this database if its absent, at first boot?
Ah, OK. I'm using this "solution" to use #:register-closures? #f now
for the Hurd only and we'll hit the problem that causes later. We can
then, s discussed on IRC, sqlite3 databases are indeed platform
independent and we could use something like guix/scripts/pack.scm's
store-database. WDYT?
>> ./pre-inst-env guix system vm-image --target=i586-pc-gnu --no-grafts \
>> gnu/system/examples/bare-hurd.tmpl
>>
>> now produces a pretty nice hurd VM :-)
>
> Great to see you so close :)
Yes...
Greetings,
janneke
--
Jan Nieuwenhuizen <janneke@gnu.org> | GNU LilyPond http://lilypond.org
Freelance IT http://JoyofSource.com | Avatar® http://AvatarAcademy.com
^ permalink raw reply [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v2 1/3] utils: Move 'reset-timestamps' out of database.
2020-05-17 10:01 [bug#41350] [PATCH 0/3] Use native qemu to build vm-image Jan Nieuwenhuizen
2020-05-17 10:03 ` [bug#41350] [PATCH 1/3] utils: Move 'reset-timestamps' out of database Jan (janneke) Nieuwenhuizen
2020-05-18 9:10 ` [bug#41350] [PATCH 0/3] Use native qemu to build vm-image Mathieu Othacehe
@ 2020-05-19 7:23 ` Jan (janneke) Nieuwenhuizen
2020-05-19 7:23 ` [bug#41350] [PATCH v2 2/3] system: vm: Do not register-closures when cross-building to the Hurd Jan (janneke) Nieuwenhuizen
2020-05-19 7:23 ` [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for " Jan (janneke) Nieuwenhuizen
2020-05-22 19:24 ` Mathieu Othacehe
` (2 subsequent siblings)
5 siblings, 2 replies; 50+ messages in thread
From: Jan (janneke) Nieuwenhuizen @ 2020-05-19 7:23 UTC (permalink / raw)
To: 41350, Mathieu Othacehe
This supports calling reset-timestamps without loading sqlite3.
* guix/store/database.scm (reset-timestamps): Move to...
* guix/utils.scm (reset-timestamps): ... here.
* gnu/build/vm.scm: Include it.
---
gnu/build/vm.scm | 1 +
guix/store/database.scm | 41 +++--------------------------------------
guix/utils.scm | 41 ++++++++++++++++++++++++++++++++++++++---
3 files changed, 42 insertions(+), 41 deletions(-)
diff --git a/gnu/build/vm.scm b/gnu/build/vm.scm
index 433b5a7e8d..c751e6b0e2 100644
--- a/gnu/build/vm.scm
+++ b/gnu/build/vm.scm
@@ -26,6 +26,7 @@
#:use-module (guix build utils)
#:use-module (guix build store-copy)
#:use-module (guix build syscalls)
+ #:use-module ((guix utils) #:select (reset-timestamps))
#:use-module (guix store database)
#:use-module (gnu build bootloader)
#:use-module (gnu build linux-boot)
diff --git a/guix/store/database.scm b/guix/store/database.scm
index ef52036ede..b8fe313c3d 100644
--- a/guix/store/database.scm
+++ b/guix/store/database.scm
@@ -24,9 +24,8 @@
#:use-module (guix store deduplication)
#:use-module (guix base16)
#:use-module (guix progress)
- #:use-module (guix build syscalls)
- #:use-module ((guix build utils)
- #:select (mkdir-p executable-file?))
+ #:use-module ((guix build utils) #:select (mkdir-p))
+ #:use-module ((guix utils) #:select (reset-timestamps))
#:use-module (guix build store-copy)
#:use-module (srfi srfi-1)
#:use-module (srfi srfi-11)
@@ -42,8 +41,7 @@
sqlite-register
register-path
register-items
- %epoch
- reset-timestamps))
+ %epoch))
;;; Code for working with the store database directly.
@@ -227,39 +225,6 @@ Every store item in REFERENCES must already be registered."
;;;
;;; High-level interface.
;;;
-
-(define* (reset-timestamps file #:key preserve-permissions?)
- "Reset the modification time on FILE and on all the files it contains, if
-it's a directory. Canonicalize file permissions unless PRESERVE-PERMISSIONS?
-is true."
- ;; Note: We're resetting to one second after the Epoch like 'guix-daemon'
- ;; has always done.
- (let loop ((file file)
- (type (stat:type (lstat file))))
- (case type
- ((directory)
- (unless preserve-permissions?
- (chmod file #o555))
- (utime file 1 1 0 0)
- (let ((parent file))
- (for-each (match-lambda
- (("." . _) #f)
- ((".." . _) #f)
- ((file . properties)
- (let ((file (string-append parent "/" file)))
- (loop file
- (match (assoc-ref properties 'type)
- ((or 'unknown #f)
- (stat:type (lstat file)))
- (type type))))))
- (scandir* parent))))
- ((symlink)
- (utime file 1 1 0 0 AT_SYMLINK_NOFOLLOW))
- (else
- (unless preserve-permissions?
- (chmod file (if (executable-file? file) #o555 #o444)))
- (utime file 1 1 0 0)))))
-
(define* (register-path path
#:key (references '()) deriver prefix
state-directory (deduplicate? #t)
diff --git a/guix/utils.scm b/guix/utils.scm
index d7b197fa44..812617dd61 100644
--- a/guix/utils.scm
+++ b/guix/utils.scm
@@ -35,8 +35,10 @@
#:use-module (rnrs io ports) ;need 'port-position' etc.
#:use-module ((rnrs bytevectors) #:select (bytevector-u8-set!))
#:use-module (guix memoization)
- #:use-module ((guix build utils) #:select (dump-port mkdir-p delete-file-recursively))
- #:use-module ((guix build syscalls) #:select (mkdtemp! fdatasync))
+ #:use-module ((guix build utils)
+ #:select (dump-port mkdir-p delete-file-recursively
+ executable-file?))
+ #:use-module ((guix build syscalls) #:select (mkdtemp! fdatasync scandir*))
#:use-module (ice-9 format)
#:use-module (ice-9 regex)
#:use-module (ice-9 match)
@@ -109,7 +111,8 @@
call-with-decompressed-port
compressed-output-port
call-with-compressed-output-port
- canonical-newline-port))
+ canonical-newline-port
+ reset-timestamps))
\f
;;;
@@ -843,6 +846,38 @@ a location object."
fix-hint?
(hint condition-fix-hint)) ;string
+(define* (reset-timestamps file #:key preserve-permissions?)
+ "Reset the modification time on FILE and on all the files it contains, if
+it's a directory. Canonicalize file permissions unless PRESERVE-PERMISSIONS?
+is true."
+ ;; Note: We're resetting to one second after the Epoch like 'guix-daemon'
+ ;; has always done.
+ (let loop ((file file)
+ (type (stat:type (lstat file))))
+ (case type
+ ((directory)
+ (unless preserve-permissions?
+ (chmod file #o555))
+ (utime file 1 1 0 0)
+ (let ((parent file))
+ (for-each (match-lambda
+ (("." . _) #f)
+ ((".." . _) #f)
+ ((file . properties)
+ (let ((file (string-append parent "/" file)))
+ (loop file
+ (match (assoc-ref properties 'type)
+ ((or 'unknown #f)
+ (stat:type (lstat file)))
+ (type type))))))
+ (scandir* parent))))
+ ((symlink)
+ (utime file 1 1 0 0 AT_SYMLINK_NOFOLLOW))
+ (else
+ (unless preserve-permissions?
+ (chmod file (if (executable-file? file) #o555 #o444)))
+ (utime file 1 1 0 0)))))
+
;;; Local Variables:
;;; eval: (put 'call-with-progress-reporter 'scheme-indent-function 1)
;;; End:
--
2.26.2
^ permalink raw reply related [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v2 2/3] system: vm: Do not register-closures when cross-building to the Hurd.
2020-05-19 7:23 ` [bug#41350] [PATCH v2 1/3] utils: Move 'reset-timestamps' out of database Jan (janneke) Nieuwenhuizen
@ 2020-05-19 7:23 ` Jan (janneke) Nieuwenhuizen
2020-05-19 7:23 ` [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for " Jan (janneke) Nieuwenhuizen
1 sibling, 0 replies; 50+ messages in thread
From: Jan (janneke) Nieuwenhuizen @ 2020-05-19 7:23 UTC (permalink / raw)
To: 41350, Mathieu Othacehe
This supports cross-building building a vm-image for the Hurd, running a
native qemu.
* gnu/system/vm.scm (qemu-image)[register-closures?]: Default to #f when
cross-compiling to the Hurd. Only create sql-schema when actually registering
closures.
---
gnu/build/vm.scm | 2 +-
gnu/system/vm.scm | 9 ++++++---
2 files changed, 7 insertions(+), 4 deletions(-)
diff --git a/gnu/build/vm.scm b/gnu/build/vm.scm
index c751e6b0e2..2b36dd29ce 100644
--- a/gnu/build/vm.scm
+++ b/gnu/build/vm.scm
@@ -27,7 +27,7 @@
#:use-module (guix build store-copy)
#:use-module (guix build syscalls)
#:use-module ((guix utils) #:select (reset-timestamps))
- #:use-module (guix store database)
+ #:autoload (guix store database) (%epoch register-items sql-schema)
#:use-module (gnu build bootloader)
#:use-module (gnu build linux-boot)
#:use-module (gnu build install)
diff --git a/gnu/system/vm.scm b/gnu/system/vm.scm
index 3e483fd86c..b343141c18 100644
--- a/gnu/system/vm.scm
+++ b/gnu/system/vm.scm
@@ -51,6 +51,7 @@
#:use-module (gnu packages zile)
#:use-module (gnu packages linux)
#:use-module (gnu packages admin)
+ #:use-module (gnu packages hurd)
#:use-module (gnu bootloader)
#:use-module (gnu bootloader grub)
@@ -286,7 +287,8 @@ substitutable."
os
bootcfg-drv
bootloader
- (register-closures? (has-guix-service-type? os))
+ (register-closures? (and (has-guix-service-type? os)
+ (not (hurd-target?))))
(inputs '())
copy-inputs?
(substitutable? #t))
@@ -333,12 +335,13 @@ system that is passed to 'populate-root-file-system'."
((gnu build linux-boot)
#:select (make-essential-device-nodes
make-hurd-device-nodes))
- (guix store database)
(guix build utils)
(srfi srfi-26)
(ice-9 binary-ports))
- (sql-schema #$schema)
+ (when #$register-closures?
+ (use-modules (guix store database))
+ (sql-schema #$schema))
;; Allow non-ASCII file names--e.g., 'nss-certs'--to be decoded.
(setenv "GUIX_LOCPATH"
--
2.26.2
^ permalink raw reply related [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for the Hurd.
2020-05-19 7:23 ` [bug#41350] [PATCH v2 1/3] utils: Move 'reset-timestamps' out of database Jan (janneke) Nieuwenhuizen
2020-05-19 7:23 ` [bug#41350] [PATCH v2 2/3] system: vm: Do not register-closures when cross-building to the Hurd Jan (janneke) Nieuwenhuizen
@ 2020-05-19 7:23 ` Jan (janneke) Nieuwenhuizen
2020-05-19 9:14 ` Mathieu Othacehe
2020-05-20 21:58 ` Ludovic Courtès
1 sibling, 2 replies; 50+ messages in thread
From: Jan (janneke) Nieuwenhuizen @ 2020-05-19 7:23 UTC (permalink / raw)
To: 41350, Mathieu Othacehe; +Cc: Ludovic Courtès
Cross-building a vm-image is usually done using a cross-qemu, e.g, qemu-ARM,
because, e.g., a native, x86_64 Grub cannot install an armhf-Grub. That
solution does not work for the Hurd, as there is no qemu-HURD.
This patch enables cross building vm-images for the Hurd using a native qemu
vm.
* gnu/system/vm.scm (expression->derivation-in-linux-vm): Run native
qemu-command; use native linux, initrd, bootloader-package and
bootloader-installer, for the Hurd.
[preserve-target]: New helper to install cross-packages into the native vm.
* gnu/bootloader/grub.scm (eye-candy): Use native font, for the Hurd.
Co-authored-by: Ludovic Courtès <ludo@gnu.org>
---
gnu/bootloader/grub.scm | 9 +++--
gnu/system/vm.scm | 78 +++++++++++++++++++++++++++++++----------
2 files changed, 66 insertions(+), 21 deletions(-)
diff --git a/gnu/bootloader/grub.scm b/gnu/bootloader/grub.scm
index 8c5b5eac0c..cee4c9f6c5 100644
--- a/gnu/bootloader/grub.scm
+++ b/gnu/bootloader/grub.scm
@@ -31,6 +31,7 @@
#:use-module (gnu system file-systems)
#:use-module (gnu system keyboard)
#:use-module (gnu packages bootloaders)
+ #:use-module (gnu packages hurd)
#:autoload (gnu packages gtk) (guile-cairo guile-rsvg)
#:autoload (gnu packages xorg) (xkeyboard-config)
#:use-module (ice-9 match)
@@ -211,8 +212,12 @@ else
set menu_color_highlight=white/blue
fi~%"
#$setup-gfxterm-body
- #$(grub-root-search store-device font-file)
- #$(setup-gfxterm config font-file)
+ #$(if (hurd-target?)
+ #~#+(grub-root-search store-device font-file)
+ (grub-root-search store-device font-file))
+ #$(if (hurd-target?)
+ #~#+(setup-gfxterm config font-file)
+ (setup-gfxterm config font-file))
#$(grub-setup-io config)
#$(strip-mount-point store-mount-point image)
diff --git a/gnu/system/vm.scm b/gnu/system/vm.scm
index b343141c18..527596421d 100644
--- a/gnu/system/vm.scm
+++ b/gnu/system/vm.scm
@@ -5,6 +5,7 @@
;;; Copyright © 2017 Mathieu Othacehe <m.othacehe@gmail.com>
;;; Copyright © 2017 Marius Bakke <mbakke@fastmail.com>
;;; Copyright © 2018 Chris Marusich <cmmarusich@gmail.com>
+;;; Copyright © 2020 Jan (janneke) Nieuwenhuizen <janneke@gnu.org>
;;;
;;; This file is part of GNU Guix.
;;;
@@ -181,19 +182,36 @@ made available under the /xchg CIFS share.
SUBSTITUTABLE? determines whether the returned derivation should be marked as
substitutable."
(define user-builder
- (program-file "builder-in-linux-vm" exp))
+ (scheme-file "builder-in-linux-vm" exp))
+
+ (define (preserve-target obj)
+ (if target
+ (with-parameters ((%current-target-system target))
+ obj)
+ obj))
(define loader
- ;; Invoke USER-BUILDER instead using 'primitive-load'. The reason for
- ;; this is to allow USER-BUILDER to dlopen stuff by using a full-featured
- ;; Guile, which it couldn't do using the statically-linked guile used in
- ;; the initrd. See example at
+ ;; Instead of using 'primitive-load', evaluate USER-BUILDER in a
+ ;; full-featured Guile so it can use dlopen stuff, which it couldn't do
+ ;; using the statically-linked guile used in the initrd. See example at
;; <https://lists.gnu.org/archive/html/guix-devel/2017-10/msg00233.html>.
(program-file "linux-vm-loader"
- ;; Communicate USER-BUILDER's exit status via /xchg so that
- ;; the host can distinguish between success, failure, and
- ;; kernel panic.
- #~(let ((status (system* #$user-builder)))
+ ;; When cross-compiling, USER-BUILDER refers to the target
+ ;; (cross-compiled) system. Preserve that, even though
+ ;; LOADER itself is executed as a native program.
+ #~(let* ((guile #$(if (hurd-target?)
+ #~#+(file-append (default-guile)
+ "/bin/guile")
+ (file-append (default-guile)
+ "/bin/guile")))
+ (status (system* guile "--no-auto-compile"
+ #$(if (hurd-target?)
+ (preserve-target user-builder)
+ user-builder))))
+
+ ;; Communicate USER-BUILDER's exit status via /xchg so
+ ;; that the host can distinguish between success,
+ ;; failure, and kernel panic.
(call-with-output-file "/xchg/.exit-status"
(lambda (port)
(write status port)))
@@ -227,10 +245,16 @@ substitutable."
(let* ((native-inputs
'#+(list qemu (canonical-package coreutils)))
- (linux (string-append #$linux "/"
- #$(system-linux-image-file-name)))
- (initrd #$initrd)
- (loader #$loader)
+
+ (loader #$(if (hurd-target?) #~#+loader loader))
+ (linux #$(if (hurd-target?)
+ #~(string-append
+ #+linux "/"
+ #+(system-linux-image-file-name))
+ #~(string-append
+ #$linux "/"
+ #$(system-linux-image-file-name))))
+ (initrd #$(if (hurd-target?) #~#+initrd initrd))
(graphs '#$(match references-graphs
(((graph-files . _) ...) graph-files)
(_ #f)))
@@ -246,7 +270,9 @@ substitutable."
(load-in-linux-vm loader
#:output #$output
#:linux linux #:initrd initrd
- #:qemu (qemu-command target)
+ #:qemu #$(if (hurd-target?)
+ (qemu-command)
+ (qemu-command target))
#:memory-size #$memory-size
#:make-disk-image? #$make-disk-image?
#:single-file-output? #$single-file-output?
@@ -288,7 +314,9 @@ substitutable."
bootcfg-drv
bootloader
(register-closures? (and (has-guix-service-type? os)
- (not (hurd-target?))))
+ (not target)
+ ;(not (hurd-target?))
+ ))
(inputs '())
copy-inputs?
(substitutable? #t))
@@ -349,9 +377,17 @@ system that is passed to 'populate-root-file-system'."
(setlocale LC_ALL "en_US.utf8")
(let ((inputs
- '#$(append (list parted e2fsprogs dosfstools)
+ '#+(append (list parted e2fsprogs dosfstools)
(map canonical-package
- (list sed grep coreutils findutils gawk))))
+ (list sed grep coreutils findutils gawk)))
+ ;; (if #$(hurd-target?)
+ ;; '#+(append (list parted e2fsprogs dosfstools)
+ ;; (map canonical-package
+ ;; (list sed grep coreutils findutils gawk)))
+ ;; '#$(append (list parted e2fsprogs dosfstools)
+ ;; (map canonical-package
+ ;; (list sed grep coreutils findutils gawk))))
+ )
;; This variable is unused but allows us to add INPUTS-TO-COPY
;; as inputs.
@@ -426,12 +462,16 @@ system that is passed to 'populate-root-file-system'."
#:partitions partitions
#:grub-efi grub-efi
#:bootloader-package
- #$(bootloader-package bootloader)
+ (if #$(hurd-target?)
+ #+(bootloader-package bootloader)
+ #$(bootloader-package bootloader))
#:bootcfg #$bootcfg-drv
#:bootcfg-location
#$(bootloader-configuration-file bootloader)
#:bootloader-installer
- #$(bootloader-installer bootloader)))))))
+ (if #$(hurd-target?)
+ #+(bootloader-installer bootloader)
+ #$(bootloader-installer bootloader))))))))
#:system system
#:target target
#:make-disk-image? #t
--
2.26.2
^ permalink raw reply related [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for the Hurd.
2020-05-19 7:23 ` [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for " Jan (janneke) Nieuwenhuizen
@ 2020-05-19 9:14 ` Mathieu Othacehe
2020-05-20 21:49 ` Ludovic Courtès
2020-05-23 9:28 ` Jan Nieuwenhuizen
2020-05-20 21:58 ` Ludovic Courtès
1 sibling, 2 replies; 50+ messages in thread
From: Mathieu Othacehe @ 2020-05-19 9:14 UTC (permalink / raw)
To: Jan (janneke) Nieuwenhuizen; +Cc: Ludovic Courtès, 41350
Hello Janneke,
> + #$(if (hurd-target?)
> + #~#+(grub-root-search store-device font-file)
> + (grub-root-search store-device font-file))
> + #$(if (hurd-target?)
> + #~#+(setup-gfxterm config font-file)
> + (setup-gfxterm config font-file))
I'm not certain that hurd-target? always return the expected answer
here. Now that we have let-system, the safer way to check for the target
system could be to write:
--8<---------------cut here---------------start------------->8---
#$(let-system (system target)
(hurd-target? system target))
--8<---------------cut here---------------end--------------->8---
Ludo, is this correct? Furthermore, if you make sure that
"grub-root-search" and "setup-gfxterm" return #+, you could maybe drop
this part?
> +
> + (loader #$(if (hurd-target?) #~#+loader loader))
> + (linux #$(if (hurd-target?)
> + #~(string-append
> + #+linux "/"
> + #+(system-linux-image-file-name))
> + #~(string-append
> + #$linux "/"
> + #$(system-linux-image-file-name))))
Same concern as above about "hurd-target?".
> + ;; (if #$(hurd-target?)
> + ;; '#+(append (list parted e2fsprogs dosfstools)
> + ;; (map canonical-package
> + ;; (list sed grep coreutils findutils gawk)))
> + ;; '#$(append (list parted e2fsprogs dosfstools)
> + ;; (map canonical-package
> + ;; (list sed grep coreutils findutils gawk))))
> + )
Is this needed?
Thanks,
Mathieu
^ permalink raw reply [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH 0/3] Use native qemu to build vm-image.
2020-05-19 7:22 ` Jan Nieuwenhuizen
@ 2020-05-19 10:02 ` Mathieu Othacehe
2020-05-20 14:03 ` Mathieu Othacehe
0 siblings, 1 reply; 50+ messages in thread
From: Mathieu Othacehe @ 2020-05-19 10:02 UTC (permalink / raw)
To: Jan Nieuwenhuizen; +Cc: 41350
Hello Jan,
>> Well first this 'vm-image' thing should be done in (gnu system image) as
>> soon as I have sorted out the bootloader issue. So the solution we will
>> find to overcome this Hurd issue will be temporary I hope.
>
> Can you elaborate a bit on that? Do you think it makes sense to continue
> this temporary path some more (as it starts to work right now), or can we
> better abandon it and work the permanent solution? How could I contribute?
Yes. Besides offering a more modular image creation API, the vocation of
(gnu system image) is to offer a way to generate all kind of Guix system
images (raw disk-images, ISO9660 images, Qemu images) without resorting
to VM for image creation.
Dropping VM, means that the image need to be build on the host, without
root permissions. This brings several limitations. If is no longer
possible to use "mount" for instance, or to call "grub-install".
To get around these limitations, I used the same strategy as Buildroot,
Yocto and OpenWrt that do not require root permissions to generate
disk-images.
For ISO9660 images:
* I first build the "image-root" derivation. It's a store directory that
contains the root file-system.
* Then, I call make-iso9660-image that, run GNU Xorriso on this
directory.
For raw disk-images:
* For each partition, I build the "partition-image-root"
derivation. This is very similar to "image-root" but for the specified
partition.
* For each partition root directory, I create the corresponding
partition image, using tools such as mke2fs or mkdosfs depending on
the partition file-system type.
* Then, I need to "assemble" the partitions in a disk-image. For that, I
use "genimage" that will roughly use 'dd' to create a final disk-image
with the partitions copied at the right offsets.
* The missing part here is the bootloader installation. As I mentioned,
grub-install refuses to take a disk-image as argument (it requires a
mounted partition). For EFI systems there's a work-around. The idea is
to call grub-mkstandalone to create a Grub binary in the ESP
partition. This Grub is configured to load the Grub configuration file
located on the root file-system at /boot/grub/grub.cfg path.
Now back to the Hurd. I see that Debian is producing Hurd ISO images. We
could try to call `guix system disk-image --target=i586-pc-gnu
--file-system-type=iso9660 hurd.scm` and see if it works.
Regarding raw disk-image, I think we could try to produce EFI compatible
Hurd images. We could set the bootloader to grub-efi-bootloader in
%hurd-default-operating-system.
Finally, to produce raw disk-images with grub-minimal-bootloader or
grub-bootloader (what you are trying to do), we need to find a way to
make grub-install work on disk-images (MBR installation and so on). That
true for the Hurd but that's also true for Linux.
Sorry for the long explanation. Please tell me if something is not
clear.
The conclusion here is that, I think that we very few adaptations to
your branch, we should be able to produce Hurd ISO images or Hurd EFI
compatible disk-images. Maybe it would be a first step.
Then, we could find a way to create "MBR compatible" Hurd and Linux
disk-images in (gnu system image).
WDYT?
Thanks,
Mathieu
^ permalink raw reply [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH 0/3] Use native qemu to build vm-image.
2020-05-19 10:02 ` Mathieu Othacehe
@ 2020-05-20 14:03 ` Mathieu Othacehe
2020-05-20 15:09 ` Jan Nieuwenhuizen
0 siblings, 1 reply; 50+ messages in thread
From: Mathieu Othacehe @ 2020-05-20 14:03 UTC (permalink / raw)
To: Jan Nieuwenhuizen; +Cc: 41350
Hey,
> The conclusion here is that, I think that we very few adaptations to
> your branch, we should be able to produce Hurd ISO images or Hurd EFI
> compatible disk-images. Maybe it would be a first step.
>
> Then, we could find a way to create "MBR compatible" Hurd and Linux
> disk-images in (gnu system image).
Ok, I made further progress. Turns out the Hurd EFI solution was a
dead-end, because I have a "no console will be available to os" message
in Qemu, instead of Hurd console output. I don't feel like debugging
this.
So, back to the MBR solution. I had another look to what OpenWrt is
doing. They found a really nice work-around! As I stated, we cannot use
"grub-install", but this command is in reality a wrapper around
"grub-mkimage" and "grub-bios-setup".
--8<---------------cut here---------------start------------->8---
#######################################
# # # #
# MBR # MBR-GAP # FIRST PARTITION #
# # # #
#######################################
--8<---------------cut here---------------end--------------->8---
grub-mkimage generates a Grub image, small enough so that it can fit in
the MBR-GAP (the space between the MBR and the first partition).
It cannot contain all Grub modules, but that's not an issue, because
Grub will be able to find missing modules from the first partition when
started.
They also patched grub-bios-setup[1] so that it can work on a raw
disk-image, and install the previously generated "grub.img".
So with the following commands:
--8<---------------cut here---------------start------------->8---
grub-mkimage -O i386-pc -o core.img biosdisk part_msdos ext2
echo "(hd0) /tmp/my-disk-image" > device.map
grub-bios-setup -m device.map -r "hd0,msdos1" -d tmp /tmp/qemu-image2
--8<---------------cut here---------------end--------------->8---
I'm able to make a Guix system image bootable, without root
permissions. It then starts the Hurd kernel and crashes, but that's
another story :p
So, if it's ok for you, I can integrate this stuff cleanly, and we won't
need the vm-image stuff anymore.
WDYT?
Thanks,
Mathieu
[1]:
https://github.com/openwrt/openwrt/blob/master/package/boot/grub2/patches/100-grub_setup_root.patch
^ permalink raw reply [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH 0/3] Use native qemu to build vm-image.
2020-05-20 14:03 ` Mathieu Othacehe
@ 2020-05-20 15:09 ` Jan Nieuwenhuizen
0 siblings, 0 replies; 50+ messages in thread
From: Jan Nieuwenhuizen @ 2020-05-20 15:09 UTC (permalink / raw)
To: Mathieu Othacehe; +Cc: Ludovic Courtès, 41350
[-- Attachment #1: Type: text/plain, Size: 2783 bytes --]
Mathieu Othacehe writes:
Hello Mathieu!
>> The conclusion here is that, I think that we very few adaptations to
>> your branch, we should be able to produce Hurd ISO images or Hurd EFI
>> compatible disk-images. Maybe it would be a first step.
>>
>> Then, we could find a way to create "MBR compatible" Hurd and Linux
>> disk-images in (gnu system image).
>
> Ok, I made further progress. Turns out the Hurd EFI solution was a
> dead-end, because I have a "no console will be available to os" message
> in Qemu, instead of Hurd console output. I don't feel like debugging
> this.
Ah, well that's the only result that I also came up with and wanted to
share. Maybe Ludo has an idea how to fix that; I could not find
anything helpful yet.
> So, back to the MBR solution. I had another look to what OpenWrt is
> doing. They found a really nice work-around! As I stated, we cannot use
> "grub-install", but this command is in reality a wrapper around
> "grub-mkimage" and "grub-bios-setup".
Ah! That's good to know.
> #######################################
> # # # #
> # MBR # MBR-GAP # FIRST PARTITION #
> # # # #
> #######################################
>
>
> grub-mkimage generates a Grub image, small enough so that it can fit in
> the MBR-GAP (the space between the MBR and the first partition).
Okay...
> It cannot contain all Grub modules, but that's not an issue, because
> Grub will be able to find missing modules from the first partition when
> started.
aha...
> They also patched grub-bios-setup[1] so that it can work on a raw
> disk-image, and install the previously generated "grub.img".
So, this is one aspect of what we're avoiding by running grub-install
in a qemu vm, right? Any idea on the upstream status of this patch?
(I don't think it matters all that much for us, let's use it :-)
> So with the following commands:
>
> grub-mkimage -O i386-pc -o core.img biosdisk part_msdos ext2
> echo "(hd0) /tmp/my-disk-image" > device.map
> grub-bios-setup -m device.map -r "hd0,msdos1" -d tmp /tmp/qemu-image2
>
> I'm able to make a Guix system image bootable, without root
> permissions. It then starts the Hurd kernel and crashes, but that's
> another story :p
Thats *great*, no really!
> So, if it's ok for you, I can integrate this stuff cleanly, and we won't
> need the vm-image stuff anymore.
>
> WDYT?
That seems a very good idea, I'm cc'ing Ludo to ping him about this.
I'm attaching some hacky work that I did on the patch that you paste'd
to me via IRC, adding som Hurd'y things. Maybe the pointers are
helpful, but it's all pretty obvious.
Greetings,
Janneke
> [1]:
> https://github.com/openwrt/openwrt/blob/master/package/boot/grub2/patches/100-grub_setup_root.patch
[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: 0001-WIP-disk-image.patch --]
[-- Type: text/x-patch, Size: 5931 bytes --]
From 9bd218f4d91f79b26ad32cc6c4c1f479febd28de Mon Sep 17 00:00:00 2001
From: "Jan (janneke) Nieuwenhuizen" <janneke@gnu.org>
Date: Tue, 19 May 2020 16:01:42 +0200
Subject: [PATCH] WIP: disk-image
qemu-system-i386 -enable-kvm
-bios $(guix build ovmf)/share/firmware/ovmf_ia32.bin -hda
/tmp/qemu-image -m 1024
<mothacehe> janneke: With this patch on top of your branch:
https://paste.debian.net/1147629/, I'm able to generate an EFI
disk-image. [15:54]
<mothacehe> That I start with this command: qemu-system-i386 -enable-kvm
-bios $(guix build ovmf)/share/firmware/ovmf_ia32.bin -hda
/tmp/qemu-image -m 1024
<mothacehe> janneke: Sadly, just after Grub, the virtual machine restarts,
nothing is printed. [15:55]
---
gnu/build/bootloader.scm | 2 +-
gnu/build/image.scm | 18 ++++++++++--------
gnu/system/examples/bare-hurd.tmpl | 2 +-
gnu/system/image.scm | 10 ++++++----
4 files changed, 18 insertions(+), 14 deletions(-)
diff --git a/gnu/build/bootloader.scm b/gnu/build/bootloader.scm
index 498022f6db..68b68c4b47 100644
--- a/gnu/build/bootloader.scm
+++ b/gnu/build/bootloader.scm
@@ -56,7 +56,7 @@
(efi-directory (string-append esp "/EFI/BOOT"))
;; Map grub target names to boot file names.
(efi-targets (cond ((string-prefix? "x86_64" system)
- '("x86_64-efi" . "BOOTX64.EFI"))
+ '("i386-efi" . "BOOTIA32.EFI"))
((string-prefix? "i686" system)
'("i386-efi" . "BOOTIA32.EFI"))
((string-prefix? "armhf" system)
diff --git a/gnu/build/image.scm b/gnu/build/image.scm
index fe8e11aa1b..23fc56571f 100644
--- a/gnu/build/image.scm
+++ b/gnu/build/image.scm
@@ -63,16 +63,18 @@
take the partition metadata size into account, take a 25% margin."
(* 1.25 (file-size root)))
-(define* (make-ext4-image partition target root
- #:key
- (owner-uid 0)
- (owner-gid 0))
- "Handle the creation of EXT4 partition images. See 'make-partition-image'."
+(define* (make-ext-image partition target root
+ #:key
+ (owner-uid 0)
+ (owner-gid 0))
+ "Handle the creation of EXT2/3/4 partition images. See
+'make-partition-image'."
(let ((size (partition-size partition))
+ (fs (partition-file-system partition))
(label (partition-label partition))
(uuid (partition-uuid partition))
(options "lazy_itable_init=1,lazy_journal_init=1"))
- (invoke "mke2fs" "-t" "ext4" "-d" root
+ (invoke "mke2fs" "-t" fs "-d" root
"-L" label "-U" (uuid->string uuid)
"-E" (format #f "root_owner=~a:~a,~a"
owner-uid owner-gid options)
@@ -105,8 +107,8 @@ ROOT directory to populate the image."
(let* ((partition (sexp->partition partition-sexp))
(type (partition-file-system partition)))
(cond
- ((string=? type "ext4")
- (make-ext4-image partition target root))
+ ((string-prefix? "ext" type)
+ (make-ext-image partition target root))
((string=? type "vfat")
(make-vfat-image partition target root))
(else
diff --git a/gnu/system/examples/bare-hurd.tmpl b/gnu/system/examples/bare-hurd.tmpl
index d4c40e6841..c3adf03a7f 100644
--- a/gnu/system/examples/bare-hurd.tmpl
+++ b/gnu/system/examples/bare-hurd.tmpl
@@ -11,7 +11,7 @@
(operating-system
(inherit %hurd-default-operating-system)
(bootloader (bootloader-configuration
- (bootloader grub-minimal-bootloader)
+ (bootloader grub-efi-bootloader)
(target "/dev/sdX")))
(file-systems (cons (file-system
(device (file-system-label "my-root"))
diff --git a/gnu/system/image.scm b/gnu/system/image.scm
index 571b7af5f3..888099dae5 100644
--- a/gnu/system/image.scm
+++ b/gnu/system/image.scm
@@ -79,7 +79,7 @@
(partition
(size 'guess)
(label "Guix_image")
- (file-system "ext4")
+ (file-system "ext2")
(flags '(boot))
(initializer (gexp initialize-root-partition))))
@@ -222,7 +222,9 @@ used in the image."
#:deduplicate? #f
#:system-directory #$os
#:bootloader-package
- #$(bootloader-package bootloader)
+ #+(with-parameters
+ ((%current-system "i686-linux"))
+ (bootloader-package bootloader))
#:bootcfg #$bootcfg
#:bootcfg-location
#$(bootloader-configuration-file bootloader)))))
@@ -232,7 +234,7 @@ used in the image."
(type (partition-file-system partition))
(image-builder
(with-imported-modules*
- (let ((inputs '#$(list e2fsprogs dosfstools mtools)))
+ (let ((inputs '#+(list e2fsprogs dosfstools mtools)))
(set-path-environment-variable "PATH" '("bin" "sbin") inputs)
(make-partition-image #$(partition->gexp partition)
#$output
@@ -269,7 +271,7 @@ image ~a {
(let* ((substitutable? (image-substitutable? image))
(builder
(with-imported-modules*
- (let ((inputs '#$(list genimage coreutils findutils)))
+ (let ((inputs '#+(list genimage coreutils findutils)))
(set-path-environment-variable "PATH" '("bin" "sbin") inputs)
(genimage #$(image->genimage-cfg image) #$output))))
(image-dir (computed-file "image-dir" builder)))
--
2.26.2
[-- Attachment #3: Type: text/plain, Size: 152 bytes --]
--
Jan Nieuwenhuizen <janneke@gnu.org> | GNU LilyPond http://lilypond.org
Freelance IT http://JoyofSource.com | Avatar® http://AvatarAcademy.com
^ permalink raw reply related [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for the Hurd.
2020-05-19 9:14 ` Mathieu Othacehe
@ 2020-05-20 21:49 ` Ludovic Courtès
2020-05-23 9:28 ` Jan Nieuwenhuizen
1 sibling, 0 replies; 50+ messages in thread
From: Ludovic Courtès @ 2020-05-20 21:49 UTC (permalink / raw)
To: Mathieu Othacehe; +Cc: 41350, Jan (janneke) Nieuwenhuizen
Hi,
Mathieu Othacehe <othacehe@gnu.org> skribis:
>> + #$(if (hurd-target?)
>> + #~#+(grub-root-search store-device font-file)
>> + (grub-root-search store-device font-file))
>> + #$(if (hurd-target?)
>> + #~#+(setup-gfxterm config font-file)
>> + (setup-gfxterm config font-file))
>
> I'm not certain that hurd-target? always return the expected answer
> here. Now that we have let-system, the safer way to check for the target
> system could be to write:
>
> #$(let-system (system target)
> (hurd-target? system target))
>
> Ludo, is this correct?
Definitely! Well, modulo indentation. ;-)
Thanks,
Ludo’.
^ permalink raw reply [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for the Hurd.
2020-05-19 7:23 ` [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for " Jan (janneke) Nieuwenhuizen
2020-05-19 9:14 ` Mathieu Othacehe
@ 2020-05-20 21:58 ` Ludovic Courtès
1 sibling, 0 replies; 50+ messages in thread
From: Ludovic Courtès @ 2020-05-20 21:58 UTC (permalink / raw)
To: Jan (janneke) Nieuwenhuizen; +Cc: Mathieu Othacehe, 41350
Howdy!
"Jan (janneke) Nieuwenhuizen" <janneke@gnu.org> skribis:
> Cross-building a vm-image is usually done using a cross-qemu, e.g, qemu-ARM,
> because, e.g., a native, x86_64 Grub cannot install an armhf-Grub. That
> solution does not work for the Hurd, as there is no qemu-HURD.
>
> This patch enables cross building vm-images for the Hurd using a native qemu
> vm.
>
> * gnu/system/vm.scm (expression->derivation-in-linux-vm): Run native
> qemu-command; use native linux, initrd, bootloader-package and
> bootloader-installer, for the Hurd.
> [preserve-target]: New helper to install cross-packages into the native vm.
> * gnu/bootloader/grub.scm (eye-candy): Use native font, for the Hurd.
>
> Co-authored-by: Ludovic Courtès <ludo@gnu.org>
I think the big question here, not Hurd-specific, is about the
abstractions:
1. When cross-compiling, can the ‘qemu-image’ procedure to its job by
running exclusively native software (in particular using a native
QEMU, native kernel, etc.)?
2. What should ‘expression->derivation-in-linux-vm’ do when
cross-compiling?
I think the answer to (1) is yes, right? That is, we can build a QEMU
image for AArch64/EFI from an x86_64 box. That means we’d run the
x86_64/EFI ‘grub-install’ in the final step, an x86_64 ‘mke2fs’ and
‘parted’ to create the partitions, and so on. Likewise, we can create a
QEMU GNU/Hurd image without entirely on GNU/Linux.
As for (2), I’d say that when cross-compiling, it should just run native
software but simply preserve references to cross-compiled software,
which is what janneke’s patch does.
How does that sound? Mathieu?
(I guess I’m rewording what janneke wrote, but my mind became fuzzy last
time I looked at it, so I thought it’s best to double-check. :-))
Thanks!
Ludo’.
^ permalink raw reply [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for the Hurd.
2020-05-17 10:01 [bug#41350] [PATCH 0/3] Use native qemu to build vm-image Jan Nieuwenhuizen
` (2 preceding siblings ...)
2020-05-19 7:23 ` [bug#41350] [PATCH v2 1/3] utils: Move 'reset-timestamps' out of database Jan (janneke) Nieuwenhuizen
@ 2020-05-22 19:24 ` Mathieu Othacehe
2020-05-27 22:54 ` Ludovic Courtès
2020-05-23 9:30 ` [bug#41350] [PATCH v3 1/3] utils: Move 'reset-timestamps' out of database Jan (janneke) Nieuwenhuizen
2020-05-24 18:11 ` [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for the Hurd Mathieu Othacehe
5 siblings, 1 reply; 50+ messages in thread
From: Mathieu Othacehe @ 2020-05-22 19:24 UTC (permalink / raw)
To: Ludovic Courtès; +Cc: 41350, Jan (janneke) Nieuwenhuizen
Hey Ludo!
> 1. When cross-compiling, can the ‘qemu-image’ procedure to its job by
> running exclusively native software (in particular using a native
> QEMU, native kernel, etc.)?
I think the answer is yes, but I raised a concern about being able to
run grub-install from an ARM system to build a cross-compiled x86-64
system (for instance).
For now, running this command shows:
--8<---------------cut here---------------start------------->8---
ls $(guix build --system=aarch64-linux grub)/lib/grub/
arm64-efi
--8<---------------cut here---------------end--------------->8---
So, the native aarch64-linux is only able to install itself on the same
system. I think can be fixed though (same as for grub-hybrid package).
> As for (2), I’d say that when cross-compiling, it should just run native
> software but simply preserve references to cross-compiled software,
> which is what janneke’s patch does.
Yes, I agree.
However, I think I found a way to install Grub, without root
permissions, from the host system (see:
https://lists.gnu.org/archive/html/guix-patches/2020-05/msg00988.html).
This should allow to deprecate the whole (gnu system vm) module.
Thanks for having a look :)
Mathieu
^ permalink raw reply [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for the Hurd.
2020-05-19 9:14 ` Mathieu Othacehe
2020-05-20 21:49 ` Ludovic Courtès
@ 2020-05-23 9:28 ` Jan Nieuwenhuizen
2020-05-23 17:45 ` Mathieu Othacehe
1 sibling, 1 reply; 50+ messages in thread
From: Jan Nieuwenhuizen @ 2020-05-23 9:28 UTC (permalink / raw)
To: Mathieu Othacehe; +Cc: Ludovic Courtès, 41350
Mathieu Othacehe writes:
Hello Mathieu,
>> + #$(if (hurd-target?)
>> + #~#+(grub-root-search store-device font-file)
>> + (grub-root-search store-device font-file))
>> + #$(if (hurd-target?)
>> + #~#+(setup-gfxterm config font-file)
>> + (setup-gfxterm config font-file))
>
> I'm not certain that hurd-target? always return the expected answer
> here. Now that we have let-system, the safer way to check for the target
> system could be to write:
>
> #$(let-system (system target)
> (hurd-target? system target))
Okay...
> Ludo, is this correct? Furthermore, if you make sure that
> "grub-root-search" and "setup-gfxterm" return #+, you could maybe drop
> this part?
...used #+ and dropped the IFs here, but used this insight below.
>> +
>> + (loader #$(if (hurd-target?) #~#+loader loader))
>> + (linux #$(if (hurd-target?)
>> + #~(string-append
>> + #+linux "/"
>> + #+(system-linux-image-file-name))
>> + #~(string-append
>> + #$linux "/"
>> + #$(system-linux-image-file-name))))
>
> Same concern as above about "hurd-target?".
...Ah, that makes sense...that's of course why Ludo already introduced
(define-syntax-rule (check predicate)
(let-system (system target)
(predicate (or target system))))
here. So, using "(check hurd-triplet?)", as Ludo was already doing in
some other places here.
>> + ;; (if #$(hurd-target?)
>> + ;; '#+(append (list parted e2fsprogs dosfstools)
>> + ;; (map canonical-package
>> + ;; (list sed grep coreutils findutils gawk)))
>> + ;; '#$(append (list parted e2fsprogs dosfstools)
>> + ;; (map canonical-package
>> + ;; (list sed grep coreutils findutils gawk))))
>> + )
>
> Is this needed?
Oops -- that was unfinished business; that IF did not work yet; possibly
because of not going through LET-SYSTEM.
This helps a lot, I'm now again able to do both
./pre-inst-env guix system vm-image --target=i586-pc-gnu --no-grafts gnu/system/examples/bare-bones.tmpl
./pre-inst-env guix system vm-image gnu/system/examples/bare-bones.tmpl
again! Phew... And that's also because I learned to include the full
list of exported symbols in the autoload of (gnu store database).
Mathieu, if it turns out that you are dropping qemu-image next week
altogether then great!, and I have no problem whatsoever dropping this
patch set as well.
For now, I have reset wip-hurd-vm and put your commits towards the
bottom of the wip-hurd-vm stack too.
Sending an updated v3 patch set just because I'm so pleased with this
result.
Greetings,
janneke
--
Jan Nieuwenhuizen <janneke@gnu.org> | GNU LilyPond http://lilypond.org
Freelance IT http://JoyofSource.com | Avatar® http://AvatarAcademy.com
^ permalink raw reply [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v3 1/3] utils: Move 'reset-timestamps' out of database.
2020-05-17 10:01 [bug#41350] [PATCH 0/3] Use native qemu to build vm-image Jan Nieuwenhuizen
` (3 preceding siblings ...)
2020-05-22 19:24 ` Mathieu Othacehe
@ 2020-05-23 9:30 ` Jan (janneke) Nieuwenhuizen
2020-05-23 9:30 ` [bug#41350] [PATCH v3 2/3] system: vm: Do not register-closures when cross-building to the Hurd Jan (janneke) Nieuwenhuizen
` (2 more replies)
2020-05-24 18:11 ` [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for the Hurd Mathieu Othacehe
5 siblings, 3 replies; 50+ messages in thread
From: Jan (janneke) Nieuwenhuizen @ 2020-05-23 9:30 UTC (permalink / raw)
To: 41350
This supports calling reset-timestamps without loading sqlite3.
* guix/store/database.scm (reset-timestamps): Move to...
* guix/utils.scm (reset-timestamps): ... here.
* gnu/build/vm.scm: Include it.
---
gnu/build/vm.scm | 1 +
guix/store/database.scm | 41 +++--------------------------------------
guix/utils.scm | 41 ++++++++++++++++++++++++++++++++++++++---
3 files changed, 42 insertions(+), 41 deletions(-)
diff --git a/gnu/build/vm.scm b/gnu/build/vm.scm
index 433b5a7e8d..c751e6b0e2 100644
--- a/gnu/build/vm.scm
+++ b/gnu/build/vm.scm
@@ -26,6 +26,7 @@
#:use-module (guix build utils)
#:use-module (guix build store-copy)
#:use-module (guix build syscalls)
+ #:use-module ((guix utils) #:select (reset-timestamps))
#:use-module (guix store database)
#:use-module (gnu build bootloader)
#:use-module (gnu build linux-boot)
diff --git a/guix/store/database.scm b/guix/store/database.scm
index ef52036ede..b8fe313c3d 100644
--- a/guix/store/database.scm
+++ b/guix/store/database.scm
@@ -24,9 +24,8 @@
#:use-module (guix store deduplication)
#:use-module (guix base16)
#:use-module (guix progress)
- #:use-module (guix build syscalls)
- #:use-module ((guix build utils)
- #:select (mkdir-p executable-file?))
+ #:use-module ((guix build utils) #:select (mkdir-p))
+ #:use-module ((guix utils) #:select (reset-timestamps))
#:use-module (guix build store-copy)
#:use-module (srfi srfi-1)
#:use-module (srfi srfi-11)
@@ -42,8 +41,7 @@
sqlite-register
register-path
register-items
- %epoch
- reset-timestamps))
+ %epoch))
;;; Code for working with the store database directly.
@@ -227,39 +225,6 @@ Every store item in REFERENCES must already be registered."
;;;
;;; High-level interface.
;;;
-
-(define* (reset-timestamps file #:key preserve-permissions?)
- "Reset the modification time on FILE and on all the files it contains, if
-it's a directory. Canonicalize file permissions unless PRESERVE-PERMISSIONS?
-is true."
- ;; Note: We're resetting to one second after the Epoch like 'guix-daemon'
- ;; has always done.
- (let loop ((file file)
- (type (stat:type (lstat file))))
- (case type
- ((directory)
- (unless preserve-permissions?
- (chmod file #o555))
- (utime file 1 1 0 0)
- (let ((parent file))
- (for-each (match-lambda
- (("." . _) #f)
- ((".." . _) #f)
- ((file . properties)
- (let ((file (string-append parent "/" file)))
- (loop file
- (match (assoc-ref properties 'type)
- ((or 'unknown #f)
- (stat:type (lstat file)))
- (type type))))))
- (scandir* parent))))
- ((symlink)
- (utime file 1 1 0 0 AT_SYMLINK_NOFOLLOW))
- (else
- (unless preserve-permissions?
- (chmod file (if (executable-file? file) #o555 #o444)))
- (utime file 1 1 0 0)))))
-
(define* (register-path path
#:key (references '()) deriver prefix
state-directory (deduplicate? #t)
diff --git a/guix/utils.scm b/guix/utils.scm
index d7b197fa44..812617dd61 100644
--- a/guix/utils.scm
+++ b/guix/utils.scm
@@ -35,8 +35,10 @@
#:use-module (rnrs io ports) ;need 'port-position' etc.
#:use-module ((rnrs bytevectors) #:select (bytevector-u8-set!))
#:use-module (guix memoization)
- #:use-module ((guix build utils) #:select (dump-port mkdir-p delete-file-recursively))
- #:use-module ((guix build syscalls) #:select (mkdtemp! fdatasync))
+ #:use-module ((guix build utils)
+ #:select (dump-port mkdir-p delete-file-recursively
+ executable-file?))
+ #:use-module ((guix build syscalls) #:select (mkdtemp! fdatasync scandir*))
#:use-module (ice-9 format)
#:use-module (ice-9 regex)
#:use-module (ice-9 match)
@@ -109,7 +111,8 @@
call-with-decompressed-port
compressed-output-port
call-with-compressed-output-port
- canonical-newline-port))
+ canonical-newline-port
+ reset-timestamps))
\f
;;;
@@ -843,6 +846,38 @@ a location object."
fix-hint?
(hint condition-fix-hint)) ;string
+(define* (reset-timestamps file #:key preserve-permissions?)
+ "Reset the modification time on FILE and on all the files it contains, if
+it's a directory. Canonicalize file permissions unless PRESERVE-PERMISSIONS?
+is true."
+ ;; Note: We're resetting to one second after the Epoch like 'guix-daemon'
+ ;; has always done.
+ (let loop ((file file)
+ (type (stat:type (lstat file))))
+ (case type
+ ((directory)
+ (unless preserve-permissions?
+ (chmod file #o555))
+ (utime file 1 1 0 0)
+ (let ((parent file))
+ (for-each (match-lambda
+ (("." . _) #f)
+ ((".." . _) #f)
+ ((file . properties)
+ (let ((file (string-append parent "/" file)))
+ (loop file
+ (match (assoc-ref properties 'type)
+ ((or 'unknown #f)
+ (stat:type (lstat file)))
+ (type type))))))
+ (scandir* parent))))
+ ((symlink)
+ (utime file 1 1 0 0 AT_SYMLINK_NOFOLLOW))
+ (else
+ (unless preserve-permissions?
+ (chmod file (if (executable-file? file) #o555 #o444)))
+ (utime file 1 1 0 0)))))
+
;;; Local Variables:
;;; eval: (put 'call-with-progress-reporter 'scheme-indent-function 1)
;;; End:
--
2.26.2
^ permalink raw reply related [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v3 2/3] system: vm: Do not register-closures when cross-building to the Hurd.
2020-05-23 9:30 ` [bug#41350] [PATCH v3 1/3] utils: Move 'reset-timestamps' out of database Jan (janneke) Nieuwenhuizen
@ 2020-05-23 9:30 ` Jan (janneke) Nieuwenhuizen
2020-05-27 8:45 ` Ludovic Courtès
2020-05-23 9:30 ` [bug#41350] [PATCH v3 3/3] system: vm: Build vm-image using native qemu, for " Jan (janneke) Nieuwenhuizen
2020-05-27 8:43 ` [bug#41350] [PATCH v3 1/3] utils: Move 'reset-timestamps' out of database Ludovic Courtès
2 siblings, 1 reply; 50+ messages in thread
From: Jan (janneke) Nieuwenhuizen @ 2020-05-23 9:30 UTC (permalink / raw)
To: 41350
This supports cross-building building a vm-image for the Hurd, running a
native qemu.
* gnu/system/vm.scm (qemu-image)[register-closures?]: Default to #f when
cross-compiling to the Hurd. Only create sql-schema when actually registering
closures.
---
gnu/build/vm.scm | 9 ++++++++-
gnu/system/vm.scm | 9 ++++++---
2 files changed, 14 insertions(+), 4 deletions(-)
diff --git a/gnu/build/vm.scm b/gnu/build/vm.scm
index c751e6b0e2..a1b193134a 100644
--- a/gnu/build/vm.scm
+++ b/gnu/build/vm.scm
@@ -27,7 +27,14 @@
#:use-module (guix build store-copy)
#:use-module (guix build syscalls)
#:use-module ((guix utils) #:select (reset-timestamps))
- #:use-module (guix store database)
+ #:autoload (guix store database) (sql-schema ;must list all exported symbols
+ %default-database-file
+ with-database
+ path-id
+ sqlite-register
+ register-path
+ register-items
+ %epoch)
#:use-module (gnu build bootloader)
#:use-module (gnu build linux-boot)
#:use-module (gnu build install)
diff --git a/gnu/system/vm.scm b/gnu/system/vm.scm
index 3e483fd86c..b343141c18 100644
--- a/gnu/system/vm.scm
+++ b/gnu/system/vm.scm
@@ -51,6 +51,7 @@
#:use-module (gnu packages zile)
#:use-module (gnu packages linux)
#:use-module (gnu packages admin)
+ #:use-module (gnu packages hurd)
#:use-module (gnu bootloader)
#:use-module (gnu bootloader grub)
@@ -286,7 +287,8 @@ substitutable."
os
bootcfg-drv
bootloader
- (register-closures? (has-guix-service-type? os))
+ (register-closures? (and (has-guix-service-type? os)
+ (not (hurd-target?))))
(inputs '())
copy-inputs?
(substitutable? #t))
@@ -333,12 +335,13 @@ system that is passed to 'populate-root-file-system'."
((gnu build linux-boot)
#:select (make-essential-device-nodes
make-hurd-device-nodes))
- (guix store database)
(guix build utils)
(srfi srfi-26)
(ice-9 binary-ports))
- (sql-schema #$schema)
+ (when #$register-closures?
+ (use-modules (guix store database))
+ (sql-schema #$schema))
;; Allow non-ASCII file names--e.g., 'nss-certs'--to be decoded.
(setenv "GUIX_LOCPATH"
--
2.26.2
^ permalink raw reply related [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v3 3/3] system: vm: Build vm-image using native qemu, for the Hurd.
2020-05-23 9:30 ` [bug#41350] [PATCH v3 1/3] utils: Move 'reset-timestamps' out of database Jan (janneke) Nieuwenhuizen
2020-05-23 9:30 ` [bug#41350] [PATCH v3 2/3] system: vm: Do not register-closures when cross-building to the Hurd Jan (janneke) Nieuwenhuizen
@ 2020-05-23 9:30 ` Jan (janneke) Nieuwenhuizen
2020-05-27 8:43 ` [bug#41350] [PATCH v3 1/3] utils: Move 'reset-timestamps' out of database Ludovic Courtès
2 siblings, 0 replies; 50+ messages in thread
From: Jan (janneke) Nieuwenhuizen @ 2020-05-23 9:30 UTC (permalink / raw)
To: 41350; +Cc: Ludovic Courtès
Cross-building a vm-image is usually done using a cross-qemu, e.g, qemu-ARM,
because, e.g., a native, x86_64 Grub cannot install an armhf-Grub. That
solution does not work for the Hurd, as there is no qemu-HURD.
This patch enables cross building vm-images for the Hurd using a native qemu
vm.
* gnu/system/vm.scm (expression->derivation-in-linux-vm): Run native
qemu-command; use native linux, initrd, bootloader-package and
bootloader-installer, for the Hurd.
[preserve-target]: New helper to install cross-packages into the native vm.
* gnu/bootloader/grub.scm (eye-candy): Use native font.
Co-authored-by: Ludovic Courtès <ludo@gnu.org>
---
gnu/bootloader/grub.scm | 4 +-
gnu/system/vm.scm | 81 +++++++++++++++++++++++++++++------------
2 files changed, 60 insertions(+), 25 deletions(-)
diff --git a/gnu/bootloader/grub.scm b/gnu/bootloader/grub.scm
index bb40c551a7..ccf70b3785 100644
--- a/gnu/bootloader/grub.scm
+++ b/gnu/bootloader/grub.scm
@@ -207,8 +207,8 @@ else
set menu_color_highlight=white/blue
fi~%"
#$setup-gfxterm-body
- #$(grub-root-search store-device font-file)
- #$(setup-gfxterm config font-file)
+ #+(grub-root-search store-device font-file)
+ #+(setup-gfxterm config font-file)
#$(grub-setup-io config)
#$image
diff --git a/gnu/system/vm.scm b/gnu/system/vm.scm
index b343141c18..245ecc73b3 100644
--- a/gnu/system/vm.scm
+++ b/gnu/system/vm.scm
@@ -5,6 +5,7 @@
;;; Copyright © 2017 Mathieu Othacehe <m.othacehe@gmail.com>
;;; Copyright © 2017 Marius Bakke <mbakke@fastmail.com>
;;; Copyright © 2018 Chris Marusich <cmmarusich@gmail.com>
+;;; Copyright © 2020 Jan (janneke) Nieuwenhuizen <janneke@gnu.org>
;;;
;;; This file is part of GNU Guix.
;;;
@@ -181,29 +182,46 @@ made available under the /xchg CIFS share.
SUBSTITUTABLE? determines whether the returned derivation should be marked as
substitutable."
(define user-builder
- (program-file "builder-in-linux-vm" exp))
+ (scheme-file "builder-in-linux-vm" exp))
+
+ (define (preserve-target obj)
+ (if target
+ (with-parameters ((%current-target-system target))
+ obj)
+ obj))
+
+ (define-syntax-rule (check predicate)
+ (let-system (system target)
+ (predicate (or target system))))
(define loader
- ;; Invoke USER-BUILDER instead using 'primitive-load'. The reason for
- ;; this is to allow USER-BUILDER to dlopen stuff by using a full-featured
- ;; Guile, which it couldn't do using the statically-linked guile used in
- ;; the initrd. See example at
+ ;; Instead of using 'primitive-load', evaluate USER-BUILDER in a
+ ;; full-featured Guile so it can use dlopen stuff, which it couldn't do
+ ;; using the statically-linked guile used in the initrd. See example at
;; <https://lists.gnu.org/archive/html/guix-devel/2017-10/msg00233.html>.
(program-file "linux-vm-loader"
- ;; Communicate USER-BUILDER's exit status via /xchg so that
- ;; the host can distinguish between success, failure, and
- ;; kernel panic.
- #~(let ((status (system* #$user-builder)))
+ ;; When cross-compiling, USER-BUILDER refers to the target
+ ;; (cross-compiled) system. Preserve that, even though
+ ;; LOADER itself is executed as a native program.
+ #~(let* ((guile #$(if (check hurd-triplet?)
+ #~#+(file-append (default-guile)
+ "/bin/guile")
+ (file-append (default-guile)
+ "/bin/guile")))
+ (status (system* guile "--no-auto-compile"
+ #$(if (check hurd-triplet?)
+ (preserve-target user-builder)
+ user-builder))))
+
+ ;; Communicate USER-BUILDER's exit status via /xchg so
+ ;; that the host can distinguish between success,
+ ;; failure, and kernel panic.
(call-with-output-file "/xchg/.exit-status"
(lambda (port)
(write status port)))
(sync)
(reboot))))
- (define-syntax-rule (check predicate)
- (let-system (system target)
- (predicate (or target system))))
-
(let ((initrd (or initrd
(base-initrd file-systems
#:on-error 'backtrace
@@ -227,10 +245,16 @@ substitutable."
(let* ((native-inputs
'#+(list qemu (canonical-package coreutils)))
- (linux (string-append #$linux "/"
- #$(system-linux-image-file-name)))
- (initrd #$initrd)
- (loader #$loader)
+
+ (loader #$(if (check hurd-triplet?) #~#+loader loader))
+ (linux #$(if (check hurd-triplet?)
+ #~(string-append
+ #+linux "/"
+ #+(system-linux-image-file-name))
+ #~(string-append
+ #$linux "/"
+ #$(system-linux-image-file-name))))
+ (initrd #$(if (check hurd-triplet?) #~#+initrd initrd))
(graphs '#$(match references-graphs
(((graph-files . _) ...) graph-files)
(_ #f)))
@@ -246,7 +270,10 @@ substitutable."
(load-in-linux-vm loader
#:output #$output
#:linux linux #:initrd initrd
- #:qemu (qemu-command target)
+ #:qemu #$(if (or (not target)
+ (check hurd-triplet?))
+ (qemu-command)
+ (qemu-command target))
#:memory-size #$memory-size
#:make-disk-image? #$make-disk-image?
#:single-file-output? #$single-file-output?
@@ -349,9 +376,13 @@ system that is passed to 'populate-root-file-system'."
(setlocale LC_ALL "en_US.utf8")
(let ((inputs
- '#$(append (list parted e2fsprogs dosfstools)
- (map canonical-package
- (list sed grep coreutils findutils gawk))))
+ '#$(if (hurd-target?)
+ #~#+(append (list parted e2fsprogs dosfstools)
+ (map canonical-package
+ (list sed grep coreutils findutils gawk)))
+ (append (list parted e2fsprogs dosfstools)
+ (map canonical-package
+ (list sed grep coreutils findutils gawk)))))
;; This variable is unused but allows us to add INPUTS-TO-COPY
;; as inputs.
@@ -426,12 +457,16 @@ system that is passed to 'populate-root-file-system'."
#:partitions partitions
#:grub-efi grub-efi
#:bootloader-package
- #$(bootloader-package bootloader)
+ #$(if (hurd-target?)
+ #~#+(bootloader-package bootloader)
+ (bootloader-package bootloader))
#:bootcfg #$bootcfg-drv
#:bootcfg-location
#$(bootloader-configuration-file bootloader)
#:bootloader-installer
- #$(bootloader-installer bootloader)))))))
+ #$(if (hurd-target?)
+ #~#+(bootloader-installer bootloader)
+ (bootloader-installer bootloader))))))))
#:system system
#:target target
#:make-disk-image? #t
--
2.26.2
^ permalink raw reply related [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for the Hurd.
2020-05-23 9:28 ` Jan Nieuwenhuizen
@ 2020-05-23 17:45 ` Mathieu Othacehe
2020-05-23 19:07 ` Jan Nieuwenhuizen
0 siblings, 1 reply; 50+ messages in thread
From: Mathieu Othacehe @ 2020-05-23 17:45 UTC (permalink / raw)
To: Jan Nieuwenhuizen; +Cc: Ludovic Courtès, 41350
Hello Jan,
> Mathieu, if it turns out that you are dropping qemu-image next week
> altogether then great!, and I have no problem whatsoever dropping this
> patch set as well.
>
> For now, I have reset wip-hurd-vm and put your commits towards the
> bottom of the wip-hurd-vm stack too.
I just pushed a few commits to your branch. I'm now able to run:
--8<---------------cut here---------------start------------->8---
guix system disk-image --target=i586-pc-gnu gnu/system/examples/bare-hurd.tmpl
--8<---------------cut here---------------end--------------->8---
no VM inside.
We now have to backport some of your work to (gnu system image), but
the good news is that closure registration is now working, and the Hurd
boots.
> Sending an updated v3 patch set just because I'm so pleased with this
> result.
I'll have a look :)
Thanks,
Mathieu
^ permalink raw reply [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for the Hurd.
2020-05-23 17:45 ` Mathieu Othacehe
@ 2020-05-23 19:07 ` Jan Nieuwenhuizen
2020-05-24 9:18 ` Mathieu Othacehe
` (2 more replies)
0 siblings, 3 replies; 50+ messages in thread
From: Jan Nieuwenhuizen @ 2020-05-23 19:07 UTC (permalink / raw)
To: Mathieu Othacehe; +Cc: Ludovic Courtès, 41350
Mathieu Othacehe writes:
> Hello Jan,
>
>> Mathieu, if it turns out that you are dropping qemu-image next week
>> altogether then great!, and I have no problem whatsoever dropping this
>> patch set as well.
>>
>> For now, I have reset wip-hurd-vm and put your commits towards the
>> bottom of the wip-hurd-vm stack too.
>
> I just pushed a few commits to your branch. I'm now able to run:
>
> guix system disk-image --target=i586-pc-gnu gnu/system/examples/bare-hurd.tmpl
>
> no VM inside.
Whoa, that's 10 commits -- great! I do need to use --no-grafts, if I
don't I get
guix system: error: gnu/packages/glib.scm:406:2: gobject-introspection@1.62.0: build system `meson' does not support cross builds
Do you see that too?
> We now have to backport some of your work to (gnu system image), but
Just build and started it -- beautiful. I'll have a stab later
tomorrow, unless someone beats me to it ;)
> the good news is that closure registration is now working, and the Hurd
> boots.
very nice, that's already one ahead!
> I'll have a look :)
Thanks :-)
Greetings,
Janneke
--
Jan Nieuwenhuizen <janneke@gnu.org> | GNU LilyPond http://lilypond.org
Freelance IT http://JoyofSource.com | Avatar® http://AvatarAcademy.com
^ permalink raw reply [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for the Hurd.
2020-05-23 19:07 ` Jan Nieuwenhuizen
@ 2020-05-24 9:18 ` Mathieu Othacehe
2020-05-27 9:30 ` Ludovic Courtès
2020-05-24 11:19 ` Jan Nieuwenhuizen
2020-05-24 16:36 ` Ludovic Courtès
2 siblings, 1 reply; 50+ messages in thread
From: Mathieu Othacehe @ 2020-05-24 9:18 UTC (permalink / raw)
To: Jan Nieuwenhuizen; +Cc: Ludovic Courtès, 41350
Hey!
> guix system: error: gnu/packages/glib.scm:406:2: gobject-introspection@1.62.0: build system `meson' does not support cross builds
>
> Do you see that too?
Yes, same issue. When grafting is enabled, we try to cross-built the
native extension "guile-rsvg" in (gnu bootloader grub).
Taking inspiration from f52fbf709, I tried:
--8<---------------cut here---------------start------------->8---
diff --git a/guix/packages.scm b/guix/packages.scm
index 3d9988d836..e74ac882cb 100644
--- a/guix/packages.scm
+++ b/guix/packages.scm
@@ -1276,13 +1276,14 @@ to (see 'graft-derivation'.)"
(define target (bag-target bag))
(define native-grafts
- (let ((->graft (input-graft store system)))
- (fold-bag-dependencies (lambda (package grafts)
- (match (->graft package)
- (#f grafts)
- (graft (cons graft grafts))))
- '()
- bag)))
+ (parameterize ((%current-target-system target))
+ (let ((->graft (input-graft store system)))
+ (fold-bag-dependencies (lambda (package grafts)
+ (match (->graft package)
+ (#f grafts)
+ (graft (cons graft grafts))))
+ '()
+ bag))))
--8<---------------cut here---------------end--------------->8---
which, by pure luck, fixes the issue for me. Maybe, I should also do
that for "target-grafts". Ludo, WDYT?
Thanks,
Mathieu
^ permalink raw reply related [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for the Hurd.
2020-05-23 19:07 ` Jan Nieuwenhuizen
2020-05-24 9:18 ` Mathieu Othacehe
@ 2020-05-24 11:19 ` Jan Nieuwenhuizen
2020-05-24 12:07 ` Mathieu Othacehe
2020-05-24 16:36 ` Ludovic Courtès
2 siblings, 1 reply; 50+ messages in thread
From: Jan Nieuwenhuizen @ 2020-05-24 11:19 UTC (permalink / raw)
To: Mathieu Othacehe; +Cc: Ludovic Courtès, 41350
Jan Nieuwenhuizen writes:
Hello Mathieu,
> Mathieu Othacehe writes:
>> We now have to backport some of your work to (gnu system image), but
>
> Just build and started it -- beautiful. I'll have a stab later
> tomorrow, unless someone beats me to it ;)
I have just pushed a few commits to wip-hurd-vm.
b0df9b0c6b squash! bootloader: grub: Add support for '<hurd-menu-entry>'.
We were using a cross-built gnumach, which does not work. This did not
happen with "vm-image" because "qemu-image" of how qemu-image built
grub. Best to squash that later.
6169cb6396 Revert "system: hurd: Remove bash from boot process."
As mentioned in the commit, where we used to run patched linux in the
VM, the "Remove bash from boot process" patch would now rely on the
host's linux being patched. It's a bit early times/inconvenient to
demand this, I suppose...
c378a2beec linux-boot: Update 'make-hurd-device-nodes'.
Moved a part of the Hurd stuff here, and the rest
b605a36031 WIP hurd-directives
here. It does not work and I don't understand that I had to add a call
to make-device-nodes...that's probably not how you want it to work?
Anyway...no real luck yet. I'm stuck at:
start ext2fs: Hurd server bootstrap: ext2fs[device:hd0s1] exec startup proc auth
/hurd/startup: Failed to bind to /servers/startup: Device or resource busy
.
/gnu/store/5m6m1ic2m4m43nv4wl7nfa5ab9p76b2g-hurd-0.9-1.91a5167/hurd/exec: main.c:358: S_exec_init: Unexpected error: (ipc/mig) bad request message ID.
Ideas? ... Ludo perhaps?
Greetings,
janneke
--
Jan Nieuwenhuizen <janneke@gnu.org> | GNU LilyPond http://lilypond.org
Freelance IT http://JoyofSource.com | Avatar® http://AvatarAcademy.com
^ permalink raw reply [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for the Hurd.
2020-05-24 11:19 ` Jan Nieuwenhuizen
@ 2020-05-24 12:07 ` Mathieu Othacehe
2020-05-24 14:20 ` Jan Nieuwenhuizen
0 siblings, 1 reply; 50+ messages in thread
From: Mathieu Othacehe @ 2020-05-24 12:07 UTC (permalink / raw)
To: Jan Nieuwenhuizen; +Cc: Ludovic Courtès, 41350
Hello Jan,
> here. It does not work and I don't understand that I had to add a call
> to make-device-nodes...that's probably not how you want it to work?
No its more an omission, and for Linux, it seems that it works without
make-device-nodes call.
>
> Anyway...no real luck yet. I'm stuck at:
>
> start ext2fs: Hurd server bootstrap: ext2fs[device:hd0s1] exec startup proc auth
> /hurd/startup: Failed to bind to /servers/startup: Device or resource busy
> .
> /gnu/store/5m6m1ic2m4m43nv4wl7nfa5ab9p76b2g-hurd-0.9-1.91a5167/hurd/exec: main.c:358: S_exec_init: Unexpected error: (ipc/mig) bad request message ID.
>
> Ideas? ... Ludo perhaps?
Running the following commands:
--8<---------------cut here---------------start------------->8---
./pre-inst-env guix system disk-image --target=i586-pc-gnu gnu/system/examples/bare-hurd.tmpl
cp /gnu/store/the-image /tmp/img_ko
./pre-inst-env guix system vm-image --target=i586-pc-gnu gnu/system/examples/bare-hurd.tmpl
cp /gnu/store/the-vm-image /tmp/img_ok.qcow2
qemu-img convert -f qcow2 -O raw /tmp/img_ok.qcow2 /tmp/img_ok.raw
sudo losetup -P /dev/loop1 /tmp/img_ko
sudo losetup -P /dev/loop2 /tmp/img_ok.raw
sudo mount /dev/loop1p1 /mnt/img/
sudo mount /dev/loop2p1 /mnt/img2/
diff -r /mnt/img /mnt/img
--8<---------------cut here---------------end--------------->8---
I get:
--8<---------------cut here---------------start------------->8---
Only in /mnt/img2/dev: cons
Only in /mnt/img2/dev: console
Only in /mnt/img2/dev: fd
Only in /mnt/img2/dev: klog
Only in /mnt/img2/dev: kmsg
Only in /mnt/img2/dev: log
Only in /mnt/img2/dev: mem
Only in /mnt/img2/dev: ptyp0
Only in /mnt/img2/dev: ptyp1
Only in /mnt/img2/dev: ptyp2
Only in /mnt/img2/dev: shm
Only in /mnt/img2/dev: stderr
Only in /mnt/img2/dev: stdin
Only in /mnt/img2/dev: stdout
Only in /mnt/img2/dev: time
Only in /mnt/img2/dev: tty
Only in /mnt/img2/dev: tty1
Only in /mnt/img2/dev: tty12
Only in /mnt/img2/dev: tty2
Only in /mnt/img2/dev: tty3
Only in /mnt/img2/dev: tty4
Only in /mnt/img2/dev: tty5
Only in /mnt/img2/dev: tty6
Only in /mnt/img2/dev: ttyp0
Only in /mnt/img2/dev: ttyp1
Only in /mnt/img2/dev: ttyp2
diff: /mnt/img2/dev/urandom: Structure needs cleaning
Only in /mnt/img2/dev: vcs
Only in /mnt/img2/etc: fstab
Only in /mnt/img2/etc: group
Only in /mnt/img2/etc: hostname
Only in /mnt/img2/etc: login
Only in /mnt/img2/etc: motd
Only in /mnt/img2/etc: pam.d
Only in /mnt/img2/etc: passwd
Only in /mnt/img2/etc: profile
Only in /mnt/img2/etc: protocols
Only in /mnt/img2/etc: .pwd.lock
Only in /mnt/img2/etc: services
Only in /mnt/img2/etc: shadow
Only in /mnt/img2/etc: shells
Only in /mnt/img2/etc: skel
Only in /mnt/img2/etc: ssh
Only in /mnt/img2/etc: ssl
Only in /mnt/img2/etc: static
--8<---------------cut here---------------end--------------->8---
It seems that at least etc and dev directories are not correctly
populated using disk-image. To be continued!
Mathieu
^ permalink raw reply [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for the Hurd.
2020-05-24 12:07 ` Mathieu Othacehe
@ 2020-05-24 14:20 ` Jan Nieuwenhuizen
0 siblings, 0 replies; 50+ messages in thread
From: Jan Nieuwenhuizen @ 2020-05-24 14:20 UTC (permalink / raw)
To: Mathieu Othacehe; +Cc: Ludovic Courtès, 41350
[-- Attachment #1: Type: text/plain, Size: 2018 bytes --]
Mathieu Othacehe writes:
Helo Mathieu,
>> Ideas? ... Ludo perhaps?
>
> Running the following commands:
>
> ./pre-inst-env guix system disk-image --target=i586-pc-gnu gnu/system/examples/bare-hurd.tmpl
> cp /gnu/store/the-image /tmp/img_ko
>
> ./pre-inst-env guix system vm-image --target=i586-pc-gnu gnu/system/examples/bare-hurd.tmpl
> cp /gnu/store/the-vm-image /tmp/img_ok.qcow2
> qemu-img convert -f qcow2 -O raw /tmp/img_ok.qcow2 /tmp/img_ok.raw
Ah, qemu-img convert -- nice. So, we get different type of images.
Wonder if that could play some role?
> sudo losetup -P /dev/loop1 /tmp/img_ko
> sudo losetup -P /dev/loop2 /tmp/img_ok.raw
>
> sudo mount /dev/loop1p1 /mnt/img/
> sudo mount /dev/loop2p1 /mnt/img2/
>
> diff -r /mnt/img /mnt/img
>
>
> I get:
>
> Only in /mnt/img2/dev: cons
> Only in /mnt/img2/dev: console
> Only in /mnt/img2/dev: fd
> Only in /mnt/img2/dev: klog
> Only in /mnt/img2/dev: kmsg
That's weird; I only have
/mnt/dev/null
/mnt/dev/urandom
/mnt/dev/full
/mnt/dev/zero
/mnt/dev/random
on both...
> It seems that at least etc and dev directories are not correctly
> populated using disk-image. To be continued!
Hmm. I compared a file listing between these
./pre-inst-env guix system disk-image --no-grafts --target=i586-pc-gnu gnu/system/examples/bare-hurd.tmpl
./pre-inst-env guix system vm-image --no-grafts --target=i586-pc-gnu gnu/system/examples/bare-hurd.tmpl
and the differences are pretty minimal (see attached). The vm-image
fully works, the disk-image shows "/servers/startup: Device or resource
busy"
I used something like
--8<---------------cut here---------------start------------->8---
modprobe nbd max_part=63
qemu-nbd -c /dev/nbd0 vm-image.img
mount /dev/nbd0p1 /mnt
--8<---------------cut here---------------end--------------->8---
The most interesting differences I see are wrt Grub, e.g.
-/mnt/boot/grub/fonts
-/mnt/boot/grub/fonts/unicode.pf2
could that still play a role? I'm having a look why this could be missing.
Greetings,
janneke
[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: vm-to-disk.diff --]
[-- Type: text/x-patch, Size: 31176 bytes --]
--- vm-image.lst-s 2020-05-24 15:41:02.051314009 +0200
+++ disk-image.lst-s 2020-05-24 15:41:08.407414141 +0200
@@ -3,293 +3,577 @@
/mnt/boot
/mnt/boot/activation
/mnt/boot/grub
-/mnt/boot/grub/fonts
-/mnt/boot/grub/fonts/unicode.pf2
/mnt/boot/grub/grub.cfg
-/mnt/boot/grub/grubenv
/mnt/boot/grub/i386-pc
/mnt/boot/grub/i386-pc/acpi.mod
+/mnt/boot/grub/i386-pc/acpi.module
/mnt/boot/grub/i386-pc/adler32.mod
+/mnt/boot/grub/i386-pc/adler32.module
/mnt/boot/grub/i386-pc/affs.mod
+/mnt/boot/grub/i386-pc/affs.module
/mnt/boot/grub/i386-pc/afs.mod
+/mnt/boot/grub/i386-pc/afs.module
/mnt/boot/grub/i386-pc/ahci.mod
+/mnt/boot/grub/i386-pc/ahci.module
/mnt/boot/grub/i386-pc/all_video.mod
+/mnt/boot/grub/i386-pc/all_video.module
/mnt/boot/grub/i386-pc/aout.mod
+/mnt/boot/grub/i386-pc/aout.module
/mnt/boot/grub/i386-pc/archelp.mod
+/mnt/boot/grub/i386-pc/archelp.module
/mnt/boot/grub/i386-pc/ata.mod
+/mnt/boot/grub/i386-pc/ata.module
/mnt/boot/grub/i386-pc/at_keyboard.mod
+/mnt/boot/grub/i386-pc/at_keyboard.module
/mnt/boot/grub/i386-pc/backtrace.mod
+/mnt/boot/grub/i386-pc/backtrace.module
/mnt/boot/grub/i386-pc/bfs.mod
+/mnt/boot/grub/i386-pc/bfs.module
/mnt/boot/grub/i386-pc/biosdisk.mod
+/mnt/boot/grub/i386-pc/biosdisk.module
/mnt/boot/grub/i386-pc/bitmap.mod
+/mnt/boot/grub/i386-pc/bitmap.module
/mnt/boot/grub/i386-pc/bitmap_scale.mod
+/mnt/boot/grub/i386-pc/bitmap_scale.module
/mnt/boot/grub/i386-pc/blocklist.mod
+/mnt/boot/grub/i386-pc/blocklist.module
+/mnt/boot/grub/i386-pc/boot_hybrid.image
+/mnt/boot/grub/i386-pc/boot_hybrid.img
+/mnt/boot/grub/i386-pc/boot.image
/mnt/boot/grub/i386-pc/boot.img
/mnt/boot/grub/i386-pc/boot.mod
+/mnt/boot/grub/i386-pc/boot.module
/mnt/boot/grub/i386-pc/bsd.mod
+/mnt/boot/grub/i386-pc/bsd.module
/mnt/boot/grub/i386-pc/bswap_test.mod
+/mnt/boot/grub/i386-pc/bswap_test.module
/mnt/boot/grub/i386-pc/btrfs.mod
+/mnt/boot/grub/i386-pc/btrfs.module
/mnt/boot/grub/i386-pc/bufio.mod
+/mnt/boot/grub/i386-pc/bufio.module
/mnt/boot/grub/i386-pc/cat.mod
+/mnt/boot/grub/i386-pc/cat.module
/mnt/boot/grub/i386-pc/cbfs.mod
+/mnt/boot/grub/i386-pc/cbfs.module
/mnt/boot/grub/i386-pc/cbls.mod
+/mnt/boot/grub/i386-pc/cbls.module
/mnt/boot/grub/i386-pc/cbmemc.mod
+/mnt/boot/grub/i386-pc/cbmemc.module
/mnt/boot/grub/i386-pc/cbtable.mod
+/mnt/boot/grub/i386-pc/cbtable.module
/mnt/boot/grub/i386-pc/cbtime.mod
+/mnt/boot/grub/i386-pc/cbtime.module
+/mnt/boot/grub/i386-pc/cdboot.image
+/mnt/boot/grub/i386-pc/cdboot.img
/mnt/boot/grub/i386-pc/chain.mod
+/mnt/boot/grub/i386-pc/chain.module
/mnt/boot/grub/i386-pc/cmdline_cat_test.mod
+/mnt/boot/grub/i386-pc/cmdline_cat_test.module
/mnt/boot/grub/i386-pc/cmosdump.mod
+/mnt/boot/grub/i386-pc/cmosdump.module
/mnt/boot/grub/i386-pc/cmostest.mod
+/mnt/boot/grub/i386-pc/cmostest.module
/mnt/boot/grub/i386-pc/cmp.mod
+/mnt/boot/grub/i386-pc/cmp.module
/mnt/boot/grub/i386-pc/cmp_test.mod
+/mnt/boot/grub/i386-pc/cmp_test.module
/mnt/boot/grub/i386-pc/command.lst
/mnt/boot/grub/i386-pc/configfile.mod
-/mnt/boot/grub/i386-pc/core.img
+/mnt/boot/grub/i386-pc/configfile.module
+/mnt/boot/grub/i386-pc/config.h
/mnt/boot/grub/i386-pc/cpio_be.mod
+/mnt/boot/grub/i386-pc/cpio_be.module
/mnt/boot/grub/i386-pc/cpio.mod
+/mnt/boot/grub/i386-pc/cpio.module
/mnt/boot/grub/i386-pc/cpuid.mod
+/mnt/boot/grub/i386-pc/cpuid.module
/mnt/boot/grub/i386-pc/crc64.mod
+/mnt/boot/grub/i386-pc/crc64.module
/mnt/boot/grub/i386-pc/cryptodisk.mod
+/mnt/boot/grub/i386-pc/cryptodisk.module
/mnt/boot/grub/i386-pc/crypto.lst
/mnt/boot/grub/i386-pc/crypto.mod
+/mnt/boot/grub/i386-pc/crypto.module
/mnt/boot/grub/i386-pc/cs5536.mod
+/mnt/boot/grub/i386-pc/cs5536.module
/mnt/boot/grub/i386-pc/ctz_test.mod
+/mnt/boot/grub/i386-pc/ctz_test.module
/mnt/boot/grub/i386-pc/datehook.mod
+/mnt/boot/grub/i386-pc/datehook.module
/mnt/boot/grub/i386-pc/date.mod
+/mnt/boot/grub/i386-pc/date.module
/mnt/boot/grub/i386-pc/datetime.mod
+/mnt/boot/grub/i386-pc/datetime.module
+/mnt/boot/grub/i386-pc/diskboot.image
+/mnt/boot/grub/i386-pc/diskboot.img
/mnt/boot/grub/i386-pc/diskfilter.mod
+/mnt/boot/grub/i386-pc/diskfilter.module
/mnt/boot/grub/i386-pc/disk.mod
+/mnt/boot/grub/i386-pc/disk.module
/mnt/boot/grub/i386-pc/div.mod
+/mnt/boot/grub/i386-pc/div.module
/mnt/boot/grub/i386-pc/div_test.mod
+/mnt/boot/grub/i386-pc/div_test.module
/mnt/boot/grub/i386-pc/dm_nv.mod
+/mnt/boot/grub/i386-pc/dm_nv.module
/mnt/boot/grub/i386-pc/drivemap.mod
+/mnt/boot/grub/i386-pc/drivemap.module
/mnt/boot/grub/i386-pc/echo.mod
+/mnt/boot/grub/i386-pc/echo.module
/mnt/boot/grub/i386-pc/efiemu32.o
/mnt/boot/grub/i386-pc/efiemu64.o
/mnt/boot/grub/i386-pc/efiemu.mod
+/mnt/boot/grub/i386-pc/efiemu.module
/mnt/boot/grub/i386-pc/ehci.mod
+/mnt/boot/grub/i386-pc/ehci.module
/mnt/boot/grub/i386-pc/elf.mod
+/mnt/boot/grub/i386-pc/elf.module
/mnt/boot/grub/i386-pc/eval.mod
+/mnt/boot/grub/i386-pc/eval.module
/mnt/boot/grub/i386-pc/exfat.mod
+/mnt/boot/grub/i386-pc/exfat.module
/mnt/boot/grub/i386-pc/exfctest.mod
+/mnt/boot/grub/i386-pc/exfctest.module
/mnt/boot/grub/i386-pc/ext2.mod
+/mnt/boot/grub/i386-pc/ext2.module
/mnt/boot/grub/i386-pc/extcmd.mod
+/mnt/boot/grub/i386-pc/extcmd.module
/mnt/boot/grub/i386-pc/f2fs.mod
+/mnt/boot/grub/i386-pc/f2fs.module
/mnt/boot/grub/i386-pc/fat.mod
+/mnt/boot/grub/i386-pc/fat.module
+/mnt/boot/grub/i386-pc/fdt.lst
/mnt/boot/grub/i386-pc/file.mod
+/mnt/boot/grub/i386-pc/file.module
/mnt/boot/grub/i386-pc/font.mod
+/mnt/boot/grub/i386-pc/font.module
/mnt/boot/grub/i386-pc/freedos.mod
+/mnt/boot/grub/i386-pc/freedos.module
/mnt/boot/grub/i386-pc/fshelp.mod
+/mnt/boot/grub/i386-pc/fshelp.module
/mnt/boot/grub/i386-pc/fs.lst
/mnt/boot/grub/i386-pc/functional_test.mod
+/mnt/boot/grub/i386-pc/functional_test.module
/mnt/boot/grub/i386-pc/gcry_arcfour.mod
+/mnt/boot/grub/i386-pc/gcry_arcfour.module
/mnt/boot/grub/i386-pc/gcry_blowfish.mod
+/mnt/boot/grub/i386-pc/gcry_blowfish.module
/mnt/boot/grub/i386-pc/gcry_camellia.mod
+/mnt/boot/grub/i386-pc/gcry_camellia.module
/mnt/boot/grub/i386-pc/gcry_cast5.mod
+/mnt/boot/grub/i386-pc/gcry_cast5.module
/mnt/boot/grub/i386-pc/gcry_crc.mod
+/mnt/boot/grub/i386-pc/gcry_crc.module
/mnt/boot/grub/i386-pc/gcry_des.mod
+/mnt/boot/grub/i386-pc/gcry_des.module
/mnt/boot/grub/i386-pc/gcry_dsa.mod
+/mnt/boot/grub/i386-pc/gcry_dsa.module
/mnt/boot/grub/i386-pc/gcry_idea.mod
+/mnt/boot/grub/i386-pc/gcry_idea.module
/mnt/boot/grub/i386-pc/gcry_md4.mod
+/mnt/boot/grub/i386-pc/gcry_md4.module
/mnt/boot/grub/i386-pc/gcry_md5.mod
+/mnt/boot/grub/i386-pc/gcry_md5.module
/mnt/boot/grub/i386-pc/gcry_rfc2268.mod
+/mnt/boot/grub/i386-pc/gcry_rfc2268.module
/mnt/boot/grub/i386-pc/gcry_rijndael.mod
+/mnt/boot/grub/i386-pc/gcry_rijndael.module
/mnt/boot/grub/i386-pc/gcry_rmd160.mod
+/mnt/boot/grub/i386-pc/gcry_rmd160.module
/mnt/boot/grub/i386-pc/gcry_rsa.mod
+/mnt/boot/grub/i386-pc/gcry_rsa.module
/mnt/boot/grub/i386-pc/gcry_seed.mod
+/mnt/boot/grub/i386-pc/gcry_seed.module
/mnt/boot/grub/i386-pc/gcry_serpent.mod
+/mnt/boot/grub/i386-pc/gcry_serpent.module
/mnt/boot/grub/i386-pc/gcry_sha1.mod
+/mnt/boot/grub/i386-pc/gcry_sha1.module
/mnt/boot/grub/i386-pc/gcry_sha256.mod
+/mnt/boot/grub/i386-pc/gcry_sha256.module
/mnt/boot/grub/i386-pc/gcry_sha512.mod
+/mnt/boot/grub/i386-pc/gcry_sha512.module
/mnt/boot/grub/i386-pc/gcry_tiger.mod
+/mnt/boot/grub/i386-pc/gcry_tiger.module
/mnt/boot/grub/i386-pc/gcry_twofish.mod
+/mnt/boot/grub/i386-pc/gcry_twofish.module
/mnt/boot/grub/i386-pc/gcry_whirlpool.mod
+/mnt/boot/grub/i386-pc/gcry_whirlpool.module
+/mnt/boot/grub/i386-pc/gdb_grub
/mnt/boot/grub/i386-pc/gdb.mod
+/mnt/boot/grub/i386-pc/gdb.module
/mnt/boot/grub/i386-pc/geli.mod
+/mnt/boot/grub/i386-pc/geli.module
/mnt/boot/grub/i386-pc/gettext.mod
+/mnt/boot/grub/i386-pc/gettext.module
/mnt/boot/grub/i386-pc/gfxmenu.mod
+/mnt/boot/grub/i386-pc/gfxmenu.module
/mnt/boot/grub/i386-pc/gfxterm_background.mod
+/mnt/boot/grub/i386-pc/gfxterm_background.module
/mnt/boot/grub/i386-pc/gfxterm_menu.mod
+/mnt/boot/grub/i386-pc/gfxterm_menu.module
/mnt/boot/grub/i386-pc/gfxterm.mod
+/mnt/boot/grub/i386-pc/gfxterm.module
+/mnt/boot/grub/i386-pc/gmodule.pl
/mnt/boot/grub/i386-pc/gptsync.mod
+/mnt/boot/grub/i386-pc/gptsync.module
/mnt/boot/grub/i386-pc/gzio.mod
+/mnt/boot/grub/i386-pc/gzio.module
/mnt/boot/grub/i386-pc/halt.mod
+/mnt/boot/grub/i386-pc/halt.module
/mnt/boot/grub/i386-pc/hashsum.mod
+/mnt/boot/grub/i386-pc/hashsum.module
/mnt/boot/grub/i386-pc/hdparm.mod
+/mnt/boot/grub/i386-pc/hdparm.module
/mnt/boot/grub/i386-pc/hello.mod
+/mnt/boot/grub/i386-pc/hello.module
/mnt/boot/grub/i386-pc/help.mod
+/mnt/boot/grub/i386-pc/help.module
/mnt/boot/grub/i386-pc/hexdump.mod
+/mnt/boot/grub/i386-pc/hexdump.module
/mnt/boot/grub/i386-pc/hfs.mod
+/mnt/boot/grub/i386-pc/hfs.module
/mnt/boot/grub/i386-pc/hfspluscomp.mod
+/mnt/boot/grub/i386-pc/hfspluscomp.module
/mnt/boot/grub/i386-pc/hfsplus.mod
+/mnt/boot/grub/i386-pc/hfsplus.module
/mnt/boot/grub/i386-pc/http.mod
+/mnt/boot/grub/i386-pc/http.module
/mnt/boot/grub/i386-pc/iorw.mod
+/mnt/boot/grub/i386-pc/iorw.module
/mnt/boot/grub/i386-pc/iso9660.mod
+/mnt/boot/grub/i386-pc/iso9660.module
/mnt/boot/grub/i386-pc/jfs.mod
+/mnt/boot/grub/i386-pc/jfs.module
/mnt/boot/grub/i386-pc/jpeg.mod
+/mnt/boot/grub/i386-pc/jpeg.module
+/mnt/boot/grub/i386-pc/kernel.exec
+/mnt/boot/grub/i386-pc/kernel.img
/mnt/boot/grub/i386-pc/keylayouts.mod
+/mnt/boot/grub/i386-pc/keylayouts.module
/mnt/boot/grub/i386-pc/keystatus.mod
+/mnt/boot/grub/i386-pc/keystatus.module
/mnt/boot/grub/i386-pc/ldm.mod
+/mnt/boot/grub/i386-pc/ldm.module
/mnt/boot/grub/i386-pc/legacycfg.mod
+/mnt/boot/grub/i386-pc/legacycfg.module
/mnt/boot/grub/i386-pc/legacy_password_test.mod
+/mnt/boot/grub/i386-pc/legacy_password_test.module
/mnt/boot/grub/i386-pc/linux16.mod
+/mnt/boot/grub/i386-pc/linux16.module
/mnt/boot/grub/i386-pc/linux.mod
+/mnt/boot/grub/i386-pc/linux.module
+/mnt/boot/grub/i386-pc/lnxboot.image
+/mnt/boot/grub/i386-pc/lnxboot.img
/mnt/boot/grub/i386-pc/loadenv.mod
+/mnt/boot/grub/i386-pc/loadenv.module
/mnt/boot/grub/i386-pc/loopback.mod
+/mnt/boot/grub/i386-pc/loopback.module
/mnt/boot/grub/i386-pc/lsacpi.mod
+/mnt/boot/grub/i386-pc/lsacpi.module
/mnt/boot/grub/i386-pc/lsapm.mod
+/mnt/boot/grub/i386-pc/lsapm.module
/mnt/boot/grub/i386-pc/lsmmap.mod
+/mnt/boot/grub/i386-pc/lsmmap.module
/mnt/boot/grub/i386-pc/ls.mod
+/mnt/boot/grub/i386-pc/ls.module
/mnt/boot/grub/i386-pc/lspci.mod
+/mnt/boot/grub/i386-pc/lspci.module
/mnt/boot/grub/i386-pc/luks.mod
+/mnt/boot/grub/i386-pc/luks.module
/mnt/boot/grub/i386-pc/lvm.mod
+/mnt/boot/grub/i386-pc/lvm.module
+/mnt/boot/grub/i386-pc/lzma_decompress.image
+/mnt/boot/grub/i386-pc/lzma_decompress.img
/mnt/boot/grub/i386-pc/lzopio.mod
+/mnt/boot/grub/i386-pc/lzopio.module
/mnt/boot/grub/i386-pc/macbless.mod
+/mnt/boot/grub/i386-pc/macbless.module
/mnt/boot/grub/i386-pc/macho.mod
+/mnt/boot/grub/i386-pc/macho.module
/mnt/boot/grub/i386-pc/mda_text.mod
+/mnt/boot/grub/i386-pc/mda_text.module
/mnt/boot/grub/i386-pc/mdraid09_be.mod
+/mnt/boot/grub/i386-pc/mdraid09_be.module
/mnt/boot/grub/i386-pc/mdraid09.mod
+/mnt/boot/grub/i386-pc/mdraid09.module
/mnt/boot/grub/i386-pc/mdraid1x.mod
+/mnt/boot/grub/i386-pc/mdraid1x.module
/mnt/boot/grub/i386-pc/memdisk.mod
+/mnt/boot/grub/i386-pc/memdisk.module
/mnt/boot/grub/i386-pc/memrw.mod
+/mnt/boot/grub/i386-pc/memrw.module
/mnt/boot/grub/i386-pc/minicmd.mod
+/mnt/boot/grub/i386-pc/minicmd.module
/mnt/boot/grub/i386-pc/minix2_be.mod
+/mnt/boot/grub/i386-pc/minix2_be.module
/mnt/boot/grub/i386-pc/minix2.mod
+/mnt/boot/grub/i386-pc/minix2.module
/mnt/boot/grub/i386-pc/minix3_be.mod
+/mnt/boot/grub/i386-pc/minix3_be.module
/mnt/boot/grub/i386-pc/minix3.mod
+/mnt/boot/grub/i386-pc/minix3.module
/mnt/boot/grub/i386-pc/minix_be.mod
+/mnt/boot/grub/i386-pc/minix_be.module
/mnt/boot/grub/i386-pc/minix.mod
+/mnt/boot/grub/i386-pc/minix.module
/mnt/boot/grub/i386-pc/mmap.mod
+/mnt/boot/grub/i386-pc/mmap.module
/mnt/boot/grub/i386-pc/moddep.lst
/mnt/boot/grub/i386-pc/modinfo.sh
/mnt/boot/grub/i386-pc/morse.mod
+/mnt/boot/grub/i386-pc/morse.module
/mnt/boot/grub/i386-pc/mpi.mod
+/mnt/boot/grub/i386-pc/mpi.module
/mnt/boot/grub/i386-pc/msdospart.mod
+/mnt/boot/grub/i386-pc/msdospart.module
/mnt/boot/grub/i386-pc/mul_test.mod
+/mnt/boot/grub/i386-pc/mul_test.module
/mnt/boot/grub/i386-pc/multiboot2.mod
+/mnt/boot/grub/i386-pc/multiboot2.module
/mnt/boot/grub/i386-pc/multiboot.mod
+/mnt/boot/grub/i386-pc/multiboot.module
/mnt/boot/grub/i386-pc/nativedisk.mod
+/mnt/boot/grub/i386-pc/nativedisk.module
/mnt/boot/grub/i386-pc/net.mod
+/mnt/boot/grub/i386-pc/net.module
/mnt/boot/grub/i386-pc/newc.mod
+/mnt/boot/grub/i386-pc/newc.module
/mnt/boot/grub/i386-pc/nilfs2.mod
+/mnt/boot/grub/i386-pc/nilfs2.module
/mnt/boot/grub/i386-pc/normal.mod
+/mnt/boot/grub/i386-pc/normal.module
/mnt/boot/grub/i386-pc/ntfscomp.mod
+/mnt/boot/grub/i386-pc/ntfscomp.module
/mnt/boot/grub/i386-pc/ntfs.mod
+/mnt/boot/grub/i386-pc/ntfs.module
/mnt/boot/grub/i386-pc/ntldr.mod
+/mnt/boot/grub/i386-pc/ntldr.module
/mnt/boot/grub/i386-pc/odc.mod
+/mnt/boot/grub/i386-pc/odc.module
/mnt/boot/grub/i386-pc/offsetio.mod
+/mnt/boot/grub/i386-pc/offsetio.module
/mnt/boot/grub/i386-pc/ohci.mod
+/mnt/boot/grub/i386-pc/ohci.module
/mnt/boot/grub/i386-pc/part_acorn.mod
+/mnt/boot/grub/i386-pc/part_acorn.module
/mnt/boot/grub/i386-pc/part_amiga.mod
+/mnt/boot/grub/i386-pc/part_amiga.module
/mnt/boot/grub/i386-pc/part_apple.mod
+/mnt/boot/grub/i386-pc/part_apple.module
/mnt/boot/grub/i386-pc/part_bsd.mod
+/mnt/boot/grub/i386-pc/part_bsd.module
/mnt/boot/grub/i386-pc/part_dfly.mod
+/mnt/boot/grub/i386-pc/part_dfly.module
/mnt/boot/grub/i386-pc/part_dvh.mod
+/mnt/boot/grub/i386-pc/part_dvh.module
/mnt/boot/grub/i386-pc/part_gpt.mod
+/mnt/boot/grub/i386-pc/part_gpt.module
/mnt/boot/grub/i386-pc/partmap.lst
/mnt/boot/grub/i386-pc/part_msdos.mod
+/mnt/boot/grub/i386-pc/part_msdos.module
/mnt/boot/grub/i386-pc/part_plan.mod
+/mnt/boot/grub/i386-pc/part_plan.module
/mnt/boot/grub/i386-pc/part_sun.mod
+/mnt/boot/grub/i386-pc/part_sun.module
/mnt/boot/grub/i386-pc/part_sunpc.mod
+/mnt/boot/grub/i386-pc/part_sunpc.module
/mnt/boot/grub/i386-pc/parttool.lst
/mnt/boot/grub/i386-pc/parttool.mod
+/mnt/boot/grub/i386-pc/parttool.module
/mnt/boot/grub/i386-pc/password.mod
+/mnt/boot/grub/i386-pc/password.module
/mnt/boot/grub/i386-pc/password_pbkdf2.mod
+/mnt/boot/grub/i386-pc/password_pbkdf2.module
/mnt/boot/grub/i386-pc/pata.mod
+/mnt/boot/grub/i386-pc/pata.module
/mnt/boot/grub/i386-pc/pbkdf2.mod
+/mnt/boot/grub/i386-pc/pbkdf2.module
/mnt/boot/grub/i386-pc/pbkdf2_test.mod
+/mnt/boot/grub/i386-pc/pbkdf2_test.module
/mnt/boot/grub/i386-pc/pcidump.mod
+/mnt/boot/grub/i386-pc/pcidump.module
/mnt/boot/grub/i386-pc/pci.mod
+/mnt/boot/grub/i386-pc/pci.module
/mnt/boot/grub/i386-pc/pgp.mod
+/mnt/boot/grub/i386-pc/pgp.module
/mnt/boot/grub/i386-pc/plan9.mod
+/mnt/boot/grub/i386-pc/plan9.module
/mnt/boot/grub/i386-pc/play.mod
+/mnt/boot/grub/i386-pc/play.module
/mnt/boot/grub/i386-pc/png.mod
+/mnt/boot/grub/i386-pc/png.module
/mnt/boot/grub/i386-pc/priority_queue.mod
+/mnt/boot/grub/i386-pc/priority_queue.module
/mnt/boot/grub/i386-pc/probe.mod
+/mnt/boot/grub/i386-pc/probe.module
/mnt/boot/grub/i386-pc/procfs.mod
+/mnt/boot/grub/i386-pc/procfs.module
/mnt/boot/grub/i386-pc/progress.mod
+/mnt/boot/grub/i386-pc/progress.module
+/mnt/boot/grub/i386-pc/pxeboot.image
+/mnt/boot/grub/i386-pc/pxeboot.img
/mnt/boot/grub/i386-pc/pxechain.mod
+/mnt/boot/grub/i386-pc/pxechain.module
/mnt/boot/grub/i386-pc/pxe.mod
+/mnt/boot/grub/i386-pc/pxe.module
/mnt/boot/grub/i386-pc/raid5rec.mod
+/mnt/boot/grub/i386-pc/raid5rec.module
/mnt/boot/grub/i386-pc/raid6rec.mod
+/mnt/boot/grub/i386-pc/raid6rec.module
/mnt/boot/grub/i386-pc/random.mod
+/mnt/boot/grub/i386-pc/random.module
/mnt/boot/grub/i386-pc/rdmsr.mod
+/mnt/boot/grub/i386-pc/rdmsr.module
/mnt/boot/grub/i386-pc/read.mod
+/mnt/boot/grub/i386-pc/read.module
/mnt/boot/grub/i386-pc/reboot.mod
+/mnt/boot/grub/i386-pc/reboot.module
/mnt/boot/grub/i386-pc/regexp.mod
+/mnt/boot/grub/i386-pc/regexp.module
/mnt/boot/grub/i386-pc/reiserfs.mod
+/mnt/boot/grub/i386-pc/reiserfs.module
/mnt/boot/grub/i386-pc/relocator.mod
+/mnt/boot/grub/i386-pc/relocator.module
/mnt/boot/grub/i386-pc/romfs.mod
+/mnt/boot/grub/i386-pc/romfs.module
/mnt/boot/grub/i386-pc/scsi.mod
+/mnt/boot/grub/i386-pc/scsi.module
/mnt/boot/grub/i386-pc/search_fs_file.mod
+/mnt/boot/grub/i386-pc/search_fs_file.module
/mnt/boot/grub/i386-pc/search_fs_uuid.mod
+/mnt/boot/grub/i386-pc/search_fs_uuid.module
/mnt/boot/grub/i386-pc/search_label.mod
+/mnt/boot/grub/i386-pc/search_label.module
/mnt/boot/grub/i386-pc/search.mod
+/mnt/boot/grub/i386-pc/search.module
/mnt/boot/grub/i386-pc/sendkey.mod
+/mnt/boot/grub/i386-pc/sendkey.module
/mnt/boot/grub/i386-pc/serial.mod
+/mnt/boot/grub/i386-pc/serial.module
/mnt/boot/grub/i386-pc/setjmp.mod
+/mnt/boot/grub/i386-pc/setjmp.module
/mnt/boot/grub/i386-pc/setjmp_test.mod
+/mnt/boot/grub/i386-pc/setjmp_test.module
/mnt/boot/grub/i386-pc/setpci.mod
+/mnt/boot/grub/i386-pc/setpci.module
/mnt/boot/grub/i386-pc/sfs.mod
+/mnt/boot/grub/i386-pc/sfs.module
/mnt/boot/grub/i386-pc/shift_test.mod
+/mnt/boot/grub/i386-pc/shift_test.module
/mnt/boot/grub/i386-pc/signature_test.mod
+/mnt/boot/grub/i386-pc/signature_test.module
/mnt/boot/grub/i386-pc/sleep.mod
+/mnt/boot/grub/i386-pc/sleep.module
/mnt/boot/grub/i386-pc/sleep_test.mod
+/mnt/boot/grub/i386-pc/sleep_test.module
/mnt/boot/grub/i386-pc/spkmodem.mod
+/mnt/boot/grub/i386-pc/spkmodem.module
/mnt/boot/grub/i386-pc/squash4.mod
+/mnt/boot/grub/i386-pc/squash4.module
/mnt/boot/grub/i386-pc/strtoull_test.mod
+/mnt/boot/grub/i386-pc/strtoull_test.module
/mnt/boot/grub/i386-pc/syslinuxcfg.mod
+/mnt/boot/grub/i386-pc/syslinuxcfg.module
/mnt/boot/grub/i386-pc/tar.mod
+/mnt/boot/grub/i386-pc/tar.module
/mnt/boot/grub/i386-pc/terminal.lst
/mnt/boot/grub/i386-pc/terminal.mod
+/mnt/boot/grub/i386-pc/terminal.module
/mnt/boot/grub/i386-pc/terminfo.mod
+/mnt/boot/grub/i386-pc/terminfo.module
/mnt/boot/grub/i386-pc/test_blockarg.mod
+/mnt/boot/grub/i386-pc/test_blockarg.module
/mnt/boot/grub/i386-pc/testload.mod
+/mnt/boot/grub/i386-pc/testload.module
/mnt/boot/grub/i386-pc/test.mod
+/mnt/boot/grub/i386-pc/test.module
/mnt/boot/grub/i386-pc/testspeed.mod
+/mnt/boot/grub/i386-pc/testspeed.module
/mnt/boot/grub/i386-pc/tftp.mod
+/mnt/boot/grub/i386-pc/tftp.module
/mnt/boot/grub/i386-pc/tga.mod
+/mnt/boot/grub/i386-pc/tga.module
/mnt/boot/grub/i386-pc/time.mod
+/mnt/boot/grub/i386-pc/time.module
/mnt/boot/grub/i386-pc/trig.mod
+/mnt/boot/grub/i386-pc/trig.module
/mnt/boot/grub/i386-pc/tr.mod
+/mnt/boot/grub/i386-pc/tr.module
/mnt/boot/grub/i386-pc/truecrypt.mod
+/mnt/boot/grub/i386-pc/truecrypt.module
/mnt/boot/grub/i386-pc/true.mod
+/mnt/boot/grub/i386-pc/true.module
/mnt/boot/grub/i386-pc/udf.mod
+/mnt/boot/grub/i386-pc/udf.module
/mnt/boot/grub/i386-pc/ufs1_be.mod
+/mnt/boot/grub/i386-pc/ufs1_be.module
/mnt/boot/grub/i386-pc/ufs1.mod
+/mnt/boot/grub/i386-pc/ufs1.module
/mnt/boot/grub/i386-pc/ufs2.mod
+/mnt/boot/grub/i386-pc/ufs2.module
/mnt/boot/grub/i386-pc/uhci.mod
+/mnt/boot/grub/i386-pc/uhci.module
/mnt/boot/grub/i386-pc/usb_keyboard.mod
+/mnt/boot/grub/i386-pc/usb_keyboard.module
/mnt/boot/grub/i386-pc/usb.mod
+/mnt/boot/grub/i386-pc/usb.module
/mnt/boot/grub/i386-pc/usbms.mod
+/mnt/boot/grub/i386-pc/usbms.module
/mnt/boot/grub/i386-pc/usbserial_common.mod
+/mnt/boot/grub/i386-pc/usbserial_common.module
/mnt/boot/grub/i386-pc/usbserial_ftdi.mod
+/mnt/boot/grub/i386-pc/usbserial_ftdi.module
/mnt/boot/grub/i386-pc/usbserial_pl2303.mod
+/mnt/boot/grub/i386-pc/usbserial_pl2303.module
/mnt/boot/grub/i386-pc/usbserial_usbdebug.mod
+/mnt/boot/grub/i386-pc/usbserial_usbdebug.module
/mnt/boot/grub/i386-pc/usbtest.mod
+/mnt/boot/grub/i386-pc/usbtest.module
/mnt/boot/grub/i386-pc/vbe.mod
+/mnt/boot/grub/i386-pc/vbe.module
/mnt/boot/grub/i386-pc/verifiers.mod
+/mnt/boot/grub/i386-pc/verifiers.module
/mnt/boot/grub/i386-pc/vga.mod
+/mnt/boot/grub/i386-pc/vga.module
/mnt/boot/grub/i386-pc/vga_text.mod
+/mnt/boot/grub/i386-pc/vga_text.module
/mnt/boot/grub/i386-pc/video_bochs.mod
+/mnt/boot/grub/i386-pc/video_bochs.module
/mnt/boot/grub/i386-pc/video_cirrus.mod
+/mnt/boot/grub/i386-pc/video_cirrus.module
/mnt/boot/grub/i386-pc/video_colors.mod
+/mnt/boot/grub/i386-pc/video_colors.module
/mnt/boot/grub/i386-pc/video_fb.mod
+/mnt/boot/grub/i386-pc/video_fb.module
/mnt/boot/grub/i386-pc/videoinfo.mod
+/mnt/boot/grub/i386-pc/videoinfo.module
/mnt/boot/grub/i386-pc/video.lst
/mnt/boot/grub/i386-pc/video.mod
+/mnt/boot/grub/i386-pc/video.module
/mnt/boot/grub/i386-pc/videotest_checksum.mod
+/mnt/boot/grub/i386-pc/videotest_checksum.module
/mnt/boot/grub/i386-pc/videotest.mod
+/mnt/boot/grub/i386-pc/videotest.module
/mnt/boot/grub/i386-pc/wrmsr.mod
+/mnt/boot/grub/i386-pc/wrmsr.module
/mnt/boot/grub/i386-pc/xfs.mod
+/mnt/boot/grub/i386-pc/xfs.module
/mnt/boot/grub/i386-pc/xnu.mod
+/mnt/boot/grub/i386-pc/xnu.module
/mnt/boot/grub/i386-pc/xnu_uuid.mod
+/mnt/boot/grub/i386-pc/xnu_uuid.module
/mnt/boot/grub/i386-pc/xnu_uuid_test.mod
+/mnt/boot/grub/i386-pc/xnu_uuid_test.module
/mnt/boot/grub/i386-pc/xzio.mod
+/mnt/boot/grub/i386-pc/xzio.module
/mnt/boot/grub/i386-pc/zfscrypt.mod
+/mnt/boot/grub/i386-pc/zfscrypt.module
/mnt/boot/grub/i386-pc/zfsinfo.mod
+/mnt/boot/grub/i386-pc/zfsinfo.module
/mnt/boot/grub/i386-pc/zfs.mod
+/mnt/boot/grub/i386-pc/zfs.module
/mnt/boot/grub/i386-pc/zstd.mod
+/mnt/boot/grub/i386-pc/zstd.module
/mnt/dev
/mnt/dev/full
/mnt/dev/null
@@ -3870,7 +4154,7 @@
/mnt/gnu/store/0xkbwx77kpf3m703xb3a4dw5ymgrbb9l-ncurses-6.2/share/terminfo/z/ztx
/mnt/gnu/store/0xkbwx77kpf3m703xb3a4dw5ymgrbb9l-ncurses-6.2/share/terminfo/z/ztx11
/mnt/gnu/store/0xkbwx77kpf3m703xb3a4dw5ymgrbb9l-ncurses-6.2/share/terminfo/z/ztx-1-a
-/mnt/gnu/store/14wx42560538zrfgcfzpfrb1amc5sd5n-fstab
+/mnt/gnu/store/1a4kjfrz3b2irlhqxwqc247yb112y9ay-grub.cfg
/mnt/gnu/store/1qiic9c00a3aipsfpvs207q52kxzidc0-inetutils-1.9.4
/mnt/gnu/store/1qiic9c00a3aipsfpvs207q52kxzidc0-inetutils-1.9.4/bin
/mnt/gnu/store/1qiic9c00a3aipsfpvs207q52kxzidc0-inetutils-1.9.4/bin/dnsdomainname
@@ -3975,6 +4259,17 @@
/mnt/gnu/store/2f4kl55cinl8wf9m6rsxaknahk4kmnip-libffi-3.3/share/man/man3/ffi_prep_cif.3.gz
/mnt/gnu/store/2f4kl55cinl8wf9m6rsxaknahk4kmnip-libffi-3.3/share/man/man3/ffi_prep_cif_var.3.gz
/mnt/gnu/store/2mkc12b9rc0agcvdx41jghpqak37xia9-shells
+/mnt/gnu/store/2pld8ls6k6xlp1mncgcwsny1q6a72k7f-etc
+/mnt/gnu/store/2pld8ls6k6xlp1mncgcwsny1q6a72k7f-etc/fstab
+/mnt/gnu/store/2pld8ls6k6xlp1mncgcwsny1q6a72k7f-etc/hostname
+/mnt/gnu/store/2pld8ls6k6xlp1mncgcwsny1q6a72k7f-etc/login
+/mnt/gnu/store/2pld8ls6k6xlp1mncgcwsny1q6a72k7f-etc/motd
+/mnt/gnu/store/2pld8ls6k6xlp1mncgcwsny1q6a72k7f-etc/pam.d
+/mnt/gnu/store/2pld8ls6k6xlp1mncgcwsny1q6a72k7f-etc/profile
+/mnt/gnu/store/2pld8ls6k6xlp1mncgcwsny1q6a72k7f-etc/protocols
+/mnt/gnu/store/2pld8ls6k6xlp1mncgcwsny1q6a72k7f-etc/services
+/mnt/gnu/store/2pld8ls6k6xlp1mncgcwsny1q6a72k7f-etc/shells
+/mnt/gnu/store/2pld8ls6k6xlp1mncgcwsny1q6a72k7f-etc/skel
/mnt/gnu/store/2qgfx97gf619ihwg0rb640cyf76nyhcm-shadow-4.8.1
/mnt/gnu/store/2qgfx97gf619ihwg0rb640cyf76nyhcm-shadow-4.8.1/bin
/mnt/gnu/store/2qgfx97gf619ihwg0rb640cyf76nyhcm-shadow-4.8.1/bin/chage
@@ -6371,10 +6666,6 @@
/mnt/gnu/store/62jv6ba69vmscdnkaj1699pqk9s2g7pv-findutils-4.7.0/share/man/man1/xargs.1.gz
/mnt/gnu/store/62jv6ba69vmscdnkaj1699pqk9s2g7pv-findutils-4.7.0/share/man/man5
/mnt/gnu/store/62jv6ba69vmscdnkaj1699pqk9s2g7pv-findutils-4.7.0/share/man/man5/locatedb.5.gz
-/mnt/gnu/store/6aivs06ky003v3r9rzvqqmdmk5ydcr12-system
-/mnt/gnu/store/6aivs06ky003v3r9rzvqqmdmk5ydcr12-system/boot
-/mnt/gnu/store/6aivs06ky003v3r9rzvqqmdmk5ydcr12-system/etc
-/mnt/gnu/store/6aivs06ky003v3r9rzvqqmdmk5ydcr12-system/profile
/mnt/gnu/store/6j8k26az3603pabrkgq5rilj07jmvxy9-libaio-0.3.112
/mnt/gnu/store/6j8k26az3603pabrkgq5rilj07jmvxy9-libaio-0.3.112/include
/mnt/gnu/store/6j8k26az3603pabrkgq5rilj07jmvxy9-libaio-0.3.112/include/libaio.h
@@ -6392,7 +6683,6 @@
/mnt/gnu/store/6knhh53rv28b6vijp84fa2czghb4cskw-module-import/guix/build
/mnt/gnu/store/6knhh53rv28b6vijp84fa2czghb4cskw-module-import/guix/build/syscalls.scm
/mnt/gnu/store/6knhh53rv28b6vijp84fa2czghb4cskw-module-import/guix/build/utils.scm
-/mnt/gnu/store/6pwj43n207yvmzpgihkhw8h7yvm7660x-activate.scm
/mnt/gnu/store/6v1dngaaylg4zddyccfrsq5krm2s55cd-guile-3.0.2
/mnt/gnu/store/6v1dngaaylg4zddyccfrsq5krm2s55cd-guile-3.0.2/bin
/mnt/gnu/store/6v1dngaaylg4zddyccfrsq5krm2s55cd-guile-3.0.2/bin/guild
@@ -8174,17 +8464,7 @@
/mnt/gnu/store/776vkvaqd1583y3zcaj41j37irnqvfb5-libtirpc-hurd-1.2.5/share/man/man3/rtime.3t
/mnt/gnu/store/776vkvaqd1583y3zcaj41j37irnqvfb5-libtirpc-hurd-1.2.5/share/man/man5
/mnt/gnu/store/776vkvaqd1583y3zcaj41j37irnqvfb5-libtirpc-hurd-1.2.5/share/man/man5/netconfig.5.gz
-/mnt/gnu/store/7g8029j8xg6v1jg28cml79dm7698klwn-etc
-/mnt/gnu/store/7g8029j8xg6v1jg28cml79dm7698klwn-etc/fstab
-/mnt/gnu/store/7g8029j8xg6v1jg28cml79dm7698klwn-etc/hostname
-/mnt/gnu/store/7g8029j8xg6v1jg28cml79dm7698klwn-etc/login
-/mnt/gnu/store/7g8029j8xg6v1jg28cml79dm7698klwn-etc/motd
-/mnt/gnu/store/7g8029j8xg6v1jg28cml79dm7698klwn-etc/pam.d
-/mnt/gnu/store/7g8029j8xg6v1jg28cml79dm7698klwn-etc/profile
-/mnt/gnu/store/7g8029j8xg6v1jg28cml79dm7698klwn-etc/protocols
-/mnt/gnu/store/7g8029j8xg6v1jg28cml79dm7698klwn-etc/services
-/mnt/gnu/store/7g8029j8xg6v1jg28cml79dm7698klwn-etc/shells
-/mnt/gnu/store/7g8029j8xg6v1jg28cml79dm7698klwn-etc/skel
+/mnt/gnu/store/7h53d16508m2p3008pgln27ly940nfw4-activate-service.scm
/mnt/gnu/store/7kpj306l4rhksk4cqxs1acbpgqi666yv-activate-service.scm
/mnt/gnu/store/821ibr4gx0p0jaccm1dykvkrxyd7jgx0-grub-image.png
/mnt/gnu/store/84drw74x1za6pspp9xhncbdkw072xvfy-shepherd-ssh-daemon-ssh-sshd.scm
@@ -11619,7 +11899,6 @@
/mnt/gnu/store/a4vdhbfflmbpc346lsvl3v0plplmg5ma-attr-2.4.48/share/man/man3/attr_removef.3
/mnt/gnu/store/a4vdhbfflmbpc346lsvl3v0plplmg5ma-attr-2.4.48/share/man/man3/attr_set.3.gz
/mnt/gnu/store/a4vdhbfflmbpc346lsvl3v0plplmg5ma-attr-2.4.48/share/man/man3/attr_setf.3
-/mnt/gnu/store/ag32klvln9v9dwxizjv08fizd8v46ml7-activate-service.scm
/mnt/gnu/store/allmlpclnmwwd9i8bpiflczzb4l5snwz-grep-3.4
/mnt/gnu/store/allmlpclnmwwd9i8bpiflczzb4l5snwz-grep-3.4/bin
/mnt/gnu/store/allmlpclnmwwd9i8bpiflczzb4l5snwz-grep-3.4/bin/egrep
@@ -11962,6 +12241,10 @@
/mnt/gnu/store/bmzm0438zg3b5lzfii88g3mvfi1j9nrp-acl-2.2.53/share/man/man3/acl_valid.3.gz
/mnt/gnu/store/bmzm0438zg3b5lzfii88g3mvfi1j9nrp-acl-2.2.53/share/man/man5
/mnt/gnu/store/bmzm0438zg3b5lzfii88g3mvfi1j9nrp-acl-2.2.53/share/man/man5/acl.5.gz
+/mnt/gnu/store/byi1lqv7vg53r9j3wza7hz2irygyphq1-system
+/mnt/gnu/store/byi1lqv7vg53r9j3wza7hz2irygyphq1-system/boot
+/mnt/gnu/store/byi1lqv7vg53r9j3wza7hz2irygyphq1-system/etc
+/mnt/gnu/store/byi1lqv7vg53r9j3wza7hz2irygyphq1-system/profile
/mnt/gnu/store/ciqw141srsmdl8mdiia002rpsmy1k60f-profile
/mnt/gnu/store/cp5kmw9rs8ix2glhcvfs8kkj7pz603rq-shepherd-user-processes.scm
/mnt/gnu/store/cxg27gj26rh3as8x03zm1b1iybaqga4q-linux-pam-1.3.1
@@ -12480,7 +12763,6 @@
/mnt/gnu/store/cxg27gj26rh3as8x03zm1b1iybaqga4q-linux-pam-1.3.1/share/man/man8/pam_xauth.8.gz
/mnt/gnu/store/cxg27gj26rh3as8x03zm1b1iybaqga4q-linux-pam-1.3.1/share/man/man8/unix_chkpwd.8.gz
/mnt/gnu/store/cxg27gj26rh3as8x03zm1b1iybaqga4q-linux-pam-1.3.1/share/man/man8/unix_update.8.gz
-/mnt/gnu/store/d9n46xfrk1cvzbsqzrqns652pdx5afhs-grub.cfg
/mnt/gnu/store/dg1ng9q9gphg0h84fv6jjcl6hdl4kvy9-module-import-compiled
/mnt/gnu/store/dg1ng9q9gphg0h84fv6jjcl6hdl4kvy9-module-import-compiled/guix
/mnt/gnu/store/dg1ng9q9gphg0h84fv6jjcl6hdl4kvy9-module-import-compiled/guix/build
@@ -12600,7 +12882,6 @@
/mnt/gnu/store/drpbfxxhxz6zzbailf0p61ky3aixc7lq-gnumach-headers-1.8-1.097f9cf/share/info/mach.info-1.gz
/mnt/gnu/store/drpbfxxhxz6zzbailf0p61ky3aixc7lq-gnumach-headers-1.8-1.097f9cf/share/info/mach.info-2.gz
/mnt/gnu/store/drpbfxxhxz6zzbailf0p61ky3aixc7lq-gnumach-headers-1.8-1.097f9cf/share/info/mach.info.gz
-/mnt/gnu/store/fa2d2dprkchyk6f2ary1h9ifvykq0i6m-boot
/mnt/gnu/store/fa6wj5bxkj5ll1d7292a70knmyl7a0cr-glibc-2.31
/mnt/gnu/store/fa6wj5bxkj5ll1d7292a70knmyl7a0cr-glibc-2.31/bin
/mnt/gnu/store/fa6wj5bxkj5ll1d7292a70knmyl7a0cr-glibc-2.31/bin/catchsegv
@@ -17665,7 +17946,6 @@
/mnt/gnu/store/jj6xg0msv87m0w17xad54h6c2djbm1iw-libatomic-ops-7.6.10/share/doc/libatomic_ops/README_stack.txt
/mnt/gnu/store/jj6xg0msv87m0w17xad54h6c2djbm1iw-libatomic-ops-7.6.10/share/doc/libatomic_ops/README_win32.txt
/mnt/gnu/store/jr97p9mbk4xvvgjzw8b3h1gv5s0kdgnn-shepherd-term-tty1.go
-/mnt/gnu/store/jscsrg9xvnxg2wi8a6k1fmrs2byjfc51-activate.scm
/mnt/gnu/store/k25ghz69j9p3k40zdb06sp5l1h3fjvjj-pkg-config-i586-pc-gnu-0.29.2
/mnt/gnu/store/k25ghz69j9p3k40zdb06sp5l1h3fjvjj-pkg-config-i586-pc-gnu-0.29.2/bin
/mnt/gnu/store/k25ghz69j9p3k40zdb06sp5l1h3fjvjj-pkg-config-i586-pc-gnu-0.29.2/bin/i586-pc-gnu-pkg-config
@@ -18327,6 +18607,8 @@
/mnt/gnu/store/pd044fvg5il8gj44280bzlcc4ha1sxgn-libgcrypt-1.8.5/share/man
/mnt/gnu/store/pd044fvg5il8gj44280bzlcc4ha1sxgn-libgcrypt-1.8.5/share/man/man1
/mnt/gnu/store/pd044fvg5il8gj44280bzlcc4ha1sxgn-libgcrypt-1.8.5/share/man/man1/hmac256.1.gz
+/mnt/gnu/store/pdilh7rf8h9rp8pfla90xdmbs4dq61ma-boot
+/mnt/gnu/store/pj7dgbfhwf6j3i642hqmxbalbd4399x8-activate.scm
/mnt/gnu/store/pr9l9w6d3jg5sq7gvxhb25kg356fzvam-hurd-headers-cross-i586-pc-gnu-0.9-1.91a5167
/mnt/gnu/store/pr9l9w6d3jg5sq7gvxhb25kg356fzvam-hurd-headers-cross-i586-pc-gnu-0.9-1.91a5167/include
/mnt/gnu/store/pr9l9w6d3jg5sq7gvxhb25kg356fzvam-hurd-headers-cross-i586-pc-gnu-0.9-1.91a5167/include/assert-backtrace.h
@@ -18898,6 +19180,7 @@
/mnt/gnu/store/qggj6a3f1iyhb7hrkqi6a7582qcj39y5-module-import-compiled/gnu/system/accounts.go
/mnt/gnu/store/qggj6a3f1iyhb7hrkqi6a7582qcj39y5-module-import-compiled/guix
/mnt/gnu/store/qggj6a3f1iyhb7hrkqi6a7582qcj39y5-module-import-compiled/guix/records.go
+/mnt/gnu/store/qqr3c122ph5ib97ji1ryv4gxl283c4wq-activate.scm
/mnt/gnu/store/qrxci5gzdklc3qv9wpa3vvpz7wl7xmj5-module-import
/mnt/gnu/store/qrxci5gzdklc3qv9wpa3vvpz7wl7xmj5-module-import/gnu
/mnt/gnu/store/qrxci5gzdklc3qv9wpa3vvpz7wl7xmj5-module-import/gnu/build
@@ -19227,6 +19510,7 @@
/mnt/gnu/store/s9gkbbf9wd2smdngx1p0shg7q24ijb9w-file-5.38/share/man/man5
/mnt/gnu/store/s9gkbbf9wd2smdngx1p0shg7q24ijb9w-file-5.38/share/misc
/mnt/gnu/store/s9gkbbf9wd2smdngx1p0shg7q24ijb9w-file-5.38/share/misc/magic.mgc
+/mnt/gnu/store/sfpl6f74yvyln7pz1fqgplnfv830f67i-fstab
/mnt/gnu/store/sqc2k5chiyjm63mpdja0b5cin9c7czvq-shepherd-loopback.go
/mnt/gnu/store/sr2j5gnlzygpqgvwbk6z0qdgi08sqpgx-libpciaccess-0.16
/mnt/gnu/store/sr2j5gnlzygpqgvwbk6z0qdgi08sqpgx-libpciaccess-0.16/include
@@ -24349,8 +24633,9 @@
/mnt/var/db
/mnt/var/empty
/mnt/var/guix
+/mnt/var/guix/db
+/mnt/var/guix/db/db.sqlite
/mnt/var/guix/gcroots
-/mnt/var/guix/gcroots/bootcfg
/mnt/var/guix/gcroots/booted-system
/mnt/var/guix/gcroots/current-system
/mnt/var/guix/gcroots/profiles
[-- Attachment #3: Type: text/plain, Size: 152 bytes --]
--
Jan Nieuwenhuizen <janneke@gnu.org> | GNU LilyPond http://lilypond.org
Freelance IT http://JoyofSource.com | Avatar® http://AvatarAcademy.com
^ permalink raw reply [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for the Hurd.
2020-05-23 19:07 ` Jan Nieuwenhuizen
2020-05-24 9:18 ` Mathieu Othacehe
2020-05-24 11:19 ` Jan Nieuwenhuizen
@ 2020-05-24 16:36 ` Ludovic Courtès
2 siblings, 0 replies; 50+ messages in thread
From: Ludovic Courtès @ 2020-05-24 16:36 UTC (permalink / raw)
To: Jan Nieuwenhuizen; +Cc: Mathieu Othacehe, 41350
Hi!
Jan Nieuwenhuizen <janneke@gnu.org> skribis:
> Mathieu Othacehe writes:
>
>> Hello Jan,
>>
>>> Mathieu, if it turns out that you are dropping qemu-image next week
>>> altogether then great!, and I have no problem whatsoever dropping this
>>> patch set as well.
>>>
>>> For now, I have reset wip-hurd-vm and put your commits towards the
>>> bottom of the wip-hurd-vm stack too.
>>
>> I just pushed a few commits to your branch. I'm now able to run:
>>
>> guix system disk-image --target=i586-pc-gnu gnu/system/examples/bare-hurd.tmpl
>>
>> no VM inside.
>
> Whoa, that's 10 commits -- great!
Woow, excellent! Thumbs up!
(I’ll take a look at the graft issue, I feel a repulsion for dynamic
binding growing every day…)
Ludo’.
^ permalink raw reply [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for the Hurd.
2020-05-17 10:01 [bug#41350] [PATCH 0/3] Use native qemu to build vm-image Jan Nieuwenhuizen
` (4 preceding siblings ...)
2020-05-23 9:30 ` [bug#41350] [PATCH v3 1/3] utils: Move 'reset-timestamps' out of database Jan (janneke) Nieuwenhuizen
@ 2020-05-24 18:11 ` Mathieu Othacehe
2020-05-24 18:40 ` Jan Nieuwenhuizen
5 siblings, 1 reply; 50+ messages in thread
From: Mathieu Othacehe @ 2020-05-24 18:11 UTC (permalink / raw)
To: Jan Nieuwenhuizen; +Cc: Ludovic Courtès, 41350
> Ah, qemu-img convert -- nice. So, we get different type of images.
> Wonder if that could play some role?
Hope not!
> The most interesting differences I see are wrt Grub, e.g.
>
> -/mnt/boot/grub/fonts
> -/mnt/boot/grub/fonts/unicode.pf2
>
> could that still play a role? I'm having a look why this could be missing.
It's because I just copy "lib/grub" folder in (gnu bootloader grub). I
should also do that for the fonts I guess. But I doubt the issue comes
from here.
> --- vm-image.lst-s 2020-05-24 15:41:02.051314009 +0200
> +++ disk-image.lst-s 2020-05-24 15:41:08.407414141 +0200
> @@ -3,293 +3,577 @@
> /mnt/boot
> /mnt/boot/activation
> /mnt/boot/grub
> -/mnt/boot/grub/fonts
At some point, if we have the same files inside, it should work :p I
noticed that doing a cfdisk on the raw converted, vm-image root
partition reports:
Attributes: 80
which doesn't appear on the disk-image.
However, tune2fs does not show any noticeable difference (both ext_attr
and Hurd OS type are set).
Mathieu
^ permalink raw reply [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for the Hurd.
2020-05-24 18:11 ` [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for the Hurd Mathieu Othacehe
@ 2020-05-24 18:40 ` Jan Nieuwenhuizen
2020-05-25 15:46 ` Jan Nieuwenhuizen
0 siblings, 1 reply; 50+ messages in thread
From: Jan Nieuwenhuizen @ 2020-05-24 18:40 UTC (permalink / raw)
To: Mathieu Othacehe; +Cc: Ludovic Courtès, 41350
Mathieu Othacehe writes:
>> Ah, qemu-img convert -- nice. So, we get different type of images.
>> Wonder if that could play some role?
>
> Hope not!
Okay...let's continue searching elsewhere then.
>> The most interesting differences I see are wrt Grub, e.g.
>>
>> -/mnt/boot/grub/fonts
>> -/mnt/boot/grub/fonts/unicode.pf2
>>
>> could that still play a role? I'm having a look why this could be missing.
>
> It's because I just copy "lib/grub" folder in (gnu bootloader grub). I
> should also do that for the fonts I guess. But I doubt the issue comes
> from here.
Meanwhile I tried adding that by hand; indeed that's not it.
>> --- vm-image.lst-s 2020-05-24 15:41:02.051314009 +0200
>> +++ disk-image.lst-s 2020-05-24 15:41:08.407414141 +0200
>> @@ -3,293 +3,577 @@
>> /mnt/boot
>> /mnt/boot/activation
>> /mnt/boot/grub
>> -/mnt/boot/grub/fonts
>
> At some point, if we have the same files inside, it should work :p I
> noticed that doing a cfdisk on the raw converted, vm-image root
> partition reports:
>
> Attributes: 80
>
> which doesn't appear on the disk-image.
I am not aware that we would be using attributes, at least I reverted
the xattr trick on wip-hurd-vm for the /servers. Can we find out where
and what they are?
> However, tune2fs does not show any noticeable difference (both ext_attr
> and Hurd OS type are set).
Indeed, I looked at that too. This may be so obvious once we find it...
Janneke
--
Jan Nieuwenhuizen <janneke@gnu.org> | GNU LilyPond http://lilypond.org
Freelance IT http://JoyofSource.com | Avatar® http://AvatarAcademy.com
^ permalink raw reply [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for the Hurd.
2020-05-24 18:40 ` Jan Nieuwenhuizen
@ 2020-05-25 15:46 ` Jan Nieuwenhuizen
0 siblings, 0 replies; 50+ messages in thread
From: Jan Nieuwenhuizen @ 2020-05-25 15:46 UTC (permalink / raw)
To: Mathieu Othacehe; +Cc: Ludovic Courtès, 41350
Jan Nieuwenhuizen writes:
Hello Mathieu, Ludo',
>>> The most interesting differences I see are wrt Grub, e.g.
>>>
>>> -/mnt/boot/grub/fonts
>>> -/mnt/boot/grub/fonts/unicode.pf2
>>>
>>> could that still play a role? I'm having a look why this could be missing.
>>
>> It's because I just copy "lib/grub" folder in (gnu bootloader grub). I
>> should also do that for the fonts I guess. But I doubt the issue comes
>> from here.
>
> Meanwhile I tried adding that by hand; indeed that's not it.
As discussed on IRC (thanks!!), I bisected it down to a problem with the
file /servers/exec. I suspected translator magic...but luckily Ludo
insisted he thinks that /servers/exec only needs to exist.
So, using current wip-hurd-vm, I tried this script:
--8<---------------cut here---------------start------------->8---
set -ex
cp -f $(./pre-inst-env guix system disk-image --no-grafts --target=i586-pc-gnu gnu/system/examples/bare-hurd.tmpl) /tmp/disk-image.img
sudo losetup -P /dev/loop0 /tmp/disk-image.img
sudo mount /dev/loop0p1 /mnt
ls -l /mnt/servers/exec
sudo rm -f /mnt/servers/exec
sudo touch /mnt/servers/exec
ls -l /mnt/servers/exec
sudo umount /mnt
sudo losetup -d /dev/loop0
--8<---------------cut here---------------end--------------->8---
...which indeed produces a working VM!
Turns out that creating /servers/exec in the store gets
hard-linked/deduplicated or something...look:
--8<---------------cut here---------------start------------->8---
+ ls -l /mnt/servers/exec
-r--r--r-- 17 root root 0 Jan 1 1970 /mnt/servers/exec
+ sudo rm -f /mnt/servers/exec
+ sudo touch /mnt/servers/exec
+ ls -l /mnt/servers/exec
-rw-r--r-- 1 root root 0 May 25 17:16 /mnt/servers/exec
--8<---------------cut here---------------end--------------->8---
The "fix" is just going from 17 to 1 link. Doh'
So, another "fix" is the diff below but I did not want to commit and
push that yet. Can we prevent creation of hard links in another way?
Greetings,
Janneke
$ git diff
diff --git a/gnu/build/linux-boot.scm b/gnu/build/linux-boot.scm
index 7dd509d0d9..dfad83aa05 100644
--- a/gnu/build/linux-boot.scm
+++ b/gnu/build/linux-boot.scm
@@ -337,6 +337,7 @@ one specific hardware device. These we have to create."
(for-each (lambda (file)
(call-with-output-file (scope file)
(lambda (port)
+ (display file port) ;hack to avoid hard-linking
(chmod port #o666))))
'("dev/null"
"dev/zero"
@@ -350,6 +351,7 @@ one specific hardware device. These we have to create."
(for-each (lambda (file)
(call-with-output-file (scope (string-append "servers/" file))
(lambda (port)
+ (display file port) ;hack to avoid hard-linking
(chmod port #o444))))
'("startup"
"exec"
--
Jan Nieuwenhuizen <janneke@gnu.org> | GNU LilyPond http://lilypond.org
Freelance IT http://JoyofSource.com | Avatar® http://AvatarAcademy.com
^ permalink raw reply related [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v3 1/3] utils: Move 'reset-timestamps' out of database.
2020-05-23 9:30 ` [bug#41350] [PATCH v3 1/3] utils: Move 'reset-timestamps' out of database Jan (janneke) Nieuwenhuizen
2020-05-23 9:30 ` [bug#41350] [PATCH v3 2/3] system: vm: Do not register-closures when cross-building to the Hurd Jan (janneke) Nieuwenhuizen
2020-05-23 9:30 ` [bug#41350] [PATCH v3 3/3] system: vm: Build vm-image using native qemu, for " Jan (janneke) Nieuwenhuizen
@ 2020-05-27 8:43 ` Ludovic Courtès
2020-05-27 8:59 ` Ludovic Courtès
2020-05-27 9:10 ` Jan Nieuwenhuizen
2 siblings, 2 replies; 50+ messages in thread
From: Ludovic Courtès @ 2020-05-27 8:43 UTC (permalink / raw)
To: Jan (janneke) Nieuwenhuizen; +Cc: 41350
Hi!
"Jan (janneke) Nieuwenhuizen" <janneke@gnu.org> skribis:
> This supports calling reset-timestamps without loading sqlite3.
>
> * guix/store/database.scm (reset-timestamps): Move to...
> * guix/utils.scm (reset-timestamps): ... here.
> * gnu/build/vm.scm: Include it.
Please open different issues for different patch series so that each one
is visible. :-)
> --- a/gnu/build/vm.scm
> +++ b/gnu/build/vm.scm
> @@ -26,6 +26,7 @@
> #:use-module (guix build utils)
> #:use-module (guix build store-copy)
> #:use-module (guix build syscalls)
> + #:use-module ((guix utils) #:select (reset-timestamps))
We shouldn’t include (guix utils) on the build side because it pulls in
the host (guix config), which is bad because it’s user-specific:
--8<---------------cut here---------------start------------->8---
scheme@(guile-user)> ,use(guix modules)
scheme@(guile-user)> ,pp (source-module-closure '((guix utils)))
$7 = ((guix utils)
(guix config)
(guix memoization)
(guix profiling)
(guix build utils)
(guix build syscalls))
--8<---------------cut here---------------end--------------->8---
Or we have to remember to do the ((guix config) => ,(make-config.scm))
dance.
What’s the problem with loading sqlite3?
Thanks,
Ludo’.
^ permalink raw reply [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v3 2/3] system: vm: Do not register-closures when cross-building to the Hurd.
2020-05-23 9:30 ` [bug#41350] [PATCH v3 2/3] system: vm: Do not register-closures when cross-building to the Hurd Jan (janneke) Nieuwenhuizen
@ 2020-05-27 8:45 ` Ludovic Courtès
2020-05-27 9:13 ` Jan Nieuwenhuizen
0 siblings, 1 reply; 50+ messages in thread
From: Ludovic Courtès @ 2020-05-27 8:45 UTC (permalink / raw)
To: Jan (janneke) Nieuwenhuizen; +Cc: 41350
"Jan (janneke) Nieuwenhuizen" <janneke@gnu.org> skribis:
> This supports cross-building building a vm-image for the Hurd, running a
> native qemu.
>
> * gnu/system/vm.scm (qemu-image)[register-closures?]: Default to #f when
> cross-compiling to the Hurd. Only create sql-schema when actually registering
> closures.
[...]
> - (register-closures? (has-guix-service-type? os))
> + (register-closures? (and (has-guix-service-type? os)
> + (not (hurd-target?))))
What’s the problem here? (Sorry if I missed earlier discussions!)
Intuitively, I think there shouldn’t be system-specific bits here:
registering closures has nothing to do with the OS we’re targeting.
Thanks,
Ludo’.
^ permalink raw reply [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v3 1/3] utils: Move 'reset-timestamps' out of database.
2020-05-27 8:43 ` [bug#41350] [PATCH v3 1/3] utils: Move 'reset-timestamps' out of database Ludovic Courtès
@ 2020-05-27 8:59 ` Ludovic Courtès
2020-05-27 9:10 ` Jan Nieuwenhuizen
1 sibling, 0 replies; 50+ messages in thread
From: Ludovic Courtès @ 2020-05-27 8:59 UTC (permalink / raw)
To: Jan (janneke) Nieuwenhuizen; +Cc: 41350
Ludovic Courtès <ludo@gnu.org> skribis:
> Please open different issues for different patch series so that each one
> is visible. :-)
Silly me, forget about that, I was just confused. Apologies!
/me goes back to the beginning of the thread…
^ permalink raw reply [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v3 1/3] utils: Move 'reset-timestamps' out of database.
2020-05-27 8:43 ` [bug#41350] [PATCH v3 1/3] utils: Move 'reset-timestamps' out of database Ludovic Courtès
2020-05-27 8:59 ` Ludovic Courtès
@ 2020-05-27 9:10 ` Jan Nieuwenhuizen
1 sibling, 0 replies; 50+ messages in thread
From: Jan Nieuwenhuizen @ 2020-05-27 9:10 UTC (permalink / raw)
To: Ludovic Courtès; +Cc: 41350
Ludovic Courtès writes:
Hi!
> "Jan (janneke) Nieuwenhuizen" <janneke@gnu.org> skribis:
>
>> This supports calling reset-timestamps without loading sqlite3.
>>
>> * guix/store/database.scm (reset-timestamps): Move to...
>> * guix/utils.scm (reset-timestamps): ... here.
>> * gnu/build/vm.scm: Include it.
>
> Please open different issues for different patch series so that each one
> is visible. :-)
Okay...yes this "grew" out of the wip-hurd-vm => qemu-cross => etc. :-/
>> --- a/gnu/build/vm.scm
>> +++ b/gnu/build/vm.scm
>> @@ -26,6 +26,7 @@
>> #:use-module (guix build utils)
>> #:use-module (guix build store-copy)
>> #:use-module (guix build syscalls)
>> + #:use-module ((guix utils) #:select (reset-timestamps))
>
> We shouldn’t include (guix utils) on the build side because it pulls in
> the host (guix config), which is bad because it’s user-specific:
>
> scheme@(guile-user)> ,use(guix modules)
> scheme@(guile-user)> ,pp (source-module-closure '((guix utils)))
> $7 = ((guix utils)
> (guix config)
> (guix memoization)
> (guix profiling)
> (guix build utils)
> (guix build syscalls))
Oh, crap!
> Or we have to remember to do the ((guix config) => ,(make-config.scm))
> dance.
>
> What’s the problem with loading sqlite3?
When running a native qemu-image with cross-built content, any .GO files
for TARGET are skipped and .SCM load fine, except for sqlite. It fails
trying to load the sqlite3.so
Greetings,
Janneke
--
Jan Nieuwenhuizen <janneke@gnu.org> | GNU LilyPond http://lilypond.org
Freelance IT http://JoyofSource.com | Avatar® http://AvatarAcademy.com
^ permalink raw reply [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v3 2/3] system: vm: Do not register-closures when cross-building to the Hurd.
2020-05-27 8:45 ` Ludovic Courtès
@ 2020-05-27 9:13 ` Jan Nieuwenhuizen
0 siblings, 0 replies; 50+ messages in thread
From: Jan Nieuwenhuizen @ 2020-05-27 9:13 UTC (permalink / raw)
To: Ludovic Courtès; +Cc: 41350
Ludovic Courtès writes:
> "Jan (janneke) Nieuwenhuizen" <janneke@gnu.org> skribis:
>
>> This supports cross-building building a vm-image for the Hurd, running a
>> native qemu.
>>
>> * gnu/system/vm.scm (qemu-image)[register-closures?]: Default to #f when
>> cross-compiling to the Hurd. Only create sql-schema when actually registering
>> closures.
>
> [...]
>
>> - (register-closures? (has-guix-service-type? os))
>> + (register-closures? (and (has-guix-service-type? os)
>> + (not (hurd-target?))))
>
> What’s the problem here? (Sorry if I missed earlier discussions!)
register-closures is being done inside the VM and needs sqlite, which we
don't have because it's for the wrong architecture. So as long as we
avoid sqlite, we can cross-build a working VM.
> Intuitively, I think there shouldn’t be system-specific bits here:
> registering closures has nothing to do with the OS we’re targeting.
True...but currently Hurd is the only image that we are trying to build
in this weird way, i.e., using a native qemu! Other cross-builds of
vm-images are done using qemu-TARGET, only for the Hurd that does
not work.
Greetings,
Janneke
--
Jan Nieuwenhuizen <janneke@gnu.org> | GNU LilyPond http://lilypond.org
Freelance IT http://JoyofSource.com | Avatar® http://AvatarAcademy.com
^ permalink raw reply [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for the Hurd.
2020-05-24 9:18 ` Mathieu Othacehe
@ 2020-05-27 9:30 ` Ludovic Courtès
2020-05-28 7:00 ` Mathieu Othacehe
0 siblings, 1 reply; 50+ messages in thread
From: Ludovic Courtès @ 2020-05-27 9:30 UTC (permalink / raw)
To: Mathieu Othacehe; +Cc: 41350, Jan Nieuwenhuizen
Hi!
Mathieu Othacehe <othacehe@gnu.org> skribis:
>> guix system: error: gnu/packages/glib.scm:406:2: gobject-introspection@1.62.0: build system `meson' does not support cross builds
>>
>> Do you see that too?
>
> Yes, same issue. When grafting is enabled, we try to cross-built the
> native extension "guile-rsvg" in (gnu bootloader grub).
>
> Taking inspiration from f52fbf709, I tried:
>
> diff --git a/guix/packages.scm b/guix/packages.scm
> index 3d9988d836..e74ac882cb 100644
> --- a/guix/packages.scm
> +++ b/guix/packages.scm
> @@ -1276,13 +1276,14 @@ to (see 'graft-derivation'.)"
> (define target (bag-target bag))
>
> (define native-grafts
> - (let ((->graft (input-graft store system)))
> - (fold-bag-dependencies (lambda (package grafts)
> - (match (->graft package)
> - (#f grafts)
> - (graft (cons graft grafts))))
> - '()
> - bag)))
> + (parameterize ((%current-target-system target))
> + (let ((->graft (input-graft store system)))
> + (fold-bag-dependencies (lambda (package grafts)
> + (match (->graft package)
> + (#f grafts)
> + (graft (cons graft grafts))))
> + '()
> + bag))))
>
>
> which, by pure luck, fixes the issue for me. Maybe, I should also do
> that for "target-grafts". Ludo, WDYT?
Could you boil the problem down to a “guix build --target” command?
I’d like to make sure we understand the issue so we can add a test when
we fix it.
Thanks,
Ludo’.
^ permalink raw reply [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for the Hurd.
2020-05-22 19:24 ` Mathieu Othacehe
@ 2020-05-27 22:54 ` Ludovic Courtès
2020-05-28 6:36 ` Mathieu Othacehe
0 siblings, 1 reply; 50+ messages in thread
From: Ludovic Courtès @ 2020-05-27 22:54 UTC (permalink / raw)
To: Mathieu Othacehe; +Cc: 41350, Jan (janneke) Nieuwenhuizen
[-- Attachment #1: Type: text/plain, Size: 2115 bytes --]
Hi!
Mathieu Othacehe <othacehe@gnu.org> skribis:
>> 1. When cross-compiling, can the ‘qemu-image’ procedure to its job by
>> running exclusively native software (in particular using a native
>> QEMU, native kernel, etc.)?
>
> I think the answer is yes, but I raised a concern about being able to
> run grub-install from an ARM system to build a cross-compiled x86-64
> system (for instance).
>
> For now, running this command shows:
>
> ls $(guix build --system=aarch64-linux grub)/lib/grub/
> arm64-efi
>
> So, the native aarch64-linux is only able to install itself on the same
> system. I think can be fixed though (same as for grub-hybrid package).
>
>> As for (2), I’d say that when cross-compiling, it should just run native
>> software but simply preserve references to cross-compiled software,
>> which is what janneke’s patch does.
>
> Yes, I agree.
So it took me the whole day, but I ended up with the following patches
addressing these two points. With that on master, I can do:
guix system vm --target=arm-linux-gnueabihf --no-grafts \
gnu/system/examples/bare-bones.tmpl
and get a usable script that spawns an ARM VM (I still need to add ‘-M
virt -nographic’ and remove ‘-enable-kvm’, but that’s a secondary
issue.)
Likewise, this produces what looks like a valid image, except probably
for the bootloader (I used GRUB in bare-bones, which didn’t complain,
but the result doesn’t work):
guix system vm-image --target=arm-linux-gnueabihf …
Thoughts?
I’ll see if I can test it with ‘wip-hurd-vm’ on top but I’m not sure
I’ll do it before the week-end.
> However, I think I found a way to install Grub, without root
> permissions, from the host system (see:
> https://lists.gnu.org/archive/html/guix-patches/2020-05/msg00988.html).
Yay!
> This should allow to deprecate the whole (gnu system vm) module.
Yeah, using the new image API will be nicer. We still need to keep some
of the API in (guix system vm), at least for the ‘guix system vm’
command.
Thanks,
Ludo’.
[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: 0001-system-system-linux-image-file-name-takes-an-optiona.patch --]
[-- Type: text/x-patch, Size: 1704 bytes --]
From 1ccd6f8e853be17fa4ec244a660fa53ffcec979f Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Ludovic=20Court=C3=A8s?= <ludo@gnu.org>
Date: Wed, 27 May 2020 17:40:14 +0200
Subject: [PATCH 1/7] system: 'system-linux-image-file-name' takes an optional
parameter.
* gnu/system.scm (system-linux-image-file-name): Make 'target' an
optional parameter.
---
gnu/system.scm | 18 +++++++++---------
1 file changed, 9 insertions(+), 9 deletions(-)
diff --git a/gnu/system.scm b/gnu/system.scm
index d929187695..ab0a6dfc33 100644
--- a/gnu/system.scm
+++ b/gnu/system.scm
@@ -466,15 +466,15 @@ from the initrd."
"Return the list of swap services for OS."
(map swap-service (operating-system-swap-devices os)))
-(define* (system-linux-image-file-name)
- "Return the basename of the kernel image file for SYSTEM."
- ;; FIXME: Evaluate the conditional based on the actual current system.
- (let ((target (or (%current-target-system) (%current-system))))
- (cond
- ((string-prefix? "arm" target) "zImage")
- ((string-prefix? "mips" target) "vmlinuz")
- ((string-prefix? "aarch64" target) "Image")
- (else "bzImage"))))
+(define* (system-linux-image-file-name #:optional
+ (target (or (%current-target-system)
+ (%current-system))))
+ "Return the basename of the kernel image file for TARGET."
+ (cond
+ ((string-prefix? "arm" target) "zImage")
+ ((string-prefix? "mips" target) "vmlinuz")
+ ((string-prefix? "aarch64" target) "Image")
+ (else "bzImage")))
(define (operating-system-kernel-file os)
"Return an object representing the absolute file name of the kernel image of
--
2.26.2
[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #3: 0002-vm-expression-derivation-in-linux-vm-always-returns-.patch --]
[-- Type: text/x-patch, Size: 4672 bytes --]
From 56d8d921199bfdf151d899639052f579f24fdd00 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Ludovic=20Court=C3=A8s?= <ludo@gnu.org>
Date: Wed, 27 May 2020 23:04:48 +0200
Subject: [PATCH 2/7] vm: 'expression->derivation-in-linux-vm' always returns a
native build.
* gnu/system/vm.scm (expression->derivation-in-linux-vm): Remove #:target.
[builder]: Use #+. Don't pass #:target-arm32? and #:target-aarch64? to
'load-in-linux-vm'.
Pass #:target #f to 'gexp->derivation'.
(qemu-image): Adjust accordingly.
* gnu/build/vm.scm (load-in-linux-vm): Remove #:target-aarch64?
and #:target-arm32?. Define them as local variables.
---
gnu/build/vm.scm | 11 ++++++++---
gnu/system/vm.scm | 16 +++++++---------
2 files changed, 15 insertions(+), 12 deletions(-)
diff --git a/gnu/build/vm.scm b/gnu/build/vm.scm
index 433b5a7e8d..0f0ceae18f 100644
--- a/gnu/build/vm.scm
+++ b/gnu/build/vm.scm
@@ -84,8 +84,6 @@
linux initrd
make-disk-image?
single-file-output?
- target-arm32?
- target-aarch64?
(disk-image-size (* 100 (expt 2 20)))
(disk-image-format "qcow2")
(references-graphs '()))
@@ -101,7 +99,14 @@ access it via /dev/hda.
REFERENCES-GRAPHS can specify a list of reference-graph files as produced by
the #:references-graphs parameter of 'derivation'."
- (define target-arm? (or target-arm32? target-aarch64?))
+ (define target-arm32?
+ (string-prefix? "arm-" %host-type))
+
+ (define target-aarch64?
+ (string-prefix? "aarch64-" %host-type))
+
+ (define target-arm?
+ (or target-arm32? target-aarch64?))
(define arch-specific-flags
`(;; On ARM, a machine has to be specified. Use "virt" machine to avoid
diff --git a/gnu/system/vm.scm b/gnu/system/vm.scm
index 3e483fd86c..d737a5e4ec 100644
--- a/gnu/system/vm.scm
+++ b/gnu/system/vm.scm
@@ -141,7 +141,7 @@
(define* (expression->derivation-in-linux-vm name exp
#:key
- (system (%current-system)) target
+ (system (%current-system))
(linux linux-libre)
initrd
(qemu qemu-minimal)
@@ -226,10 +226,11 @@ substitutable."
(let* ((native-inputs
'#+(list qemu (canonical-package coreutils)))
- (linux (string-append #$linux "/"
- #$(system-linux-image-file-name)))
- (initrd #$initrd)
- (loader #$loader)
+ (linux (string-append
+ #+linux "/"
+ #+(system-linux-image-file-name system)))
+ (initrd #+initrd)
+ (loader #+loader)
(graphs '#$(match references-graphs
(((graph-files . _) ...) graph-files)
(_ #f)))
@@ -249,8 +250,6 @@ substitutable."
#:memory-size #$memory-size
#:make-disk-image? #$make-disk-image?
#:single-file-output? #$single-file-output?
- #:target-arm32? #$(check target-arm32?)
- #:target-aarch64? #$(check target-aarch64?)
#:disk-image-format #$disk-image-format
#:disk-image-size size
#:references-graphs graphs))))))
@@ -258,7 +257,7 @@ substitutable."
(gexp->derivation name builder
;; TODO: Require the "kvm" feature.
#:system system
- #:target target
+ #:target #f ;EXP is always executed natively
#:env-vars env-vars
#:guile-for-build guile-for-build
#:references-graphs references-graphs
@@ -430,7 +429,6 @@ system that is passed to 'populate-root-file-system'."
#:bootloader-installer
#$(bootloader-installer bootloader)))))))
#:system system
- #:target target
#:make-disk-image? #t
#:disk-image-size disk-image-size
#:disk-image-format disk-image-format
--
2.26.2
[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #4: 0003-vm-qemu-image-uses-the-native-partitioning-tools-and.patch --]
[-- Type: text/x-patch, Size: 1879 bytes --]
From a2b70d97aa80f70cba56d419470ee8d2221dcc1e Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Ludovic=20Court=C3=A8s?= <ludo@gnu.org>
Date: Wed, 27 May 2020 23:08:15 +0200
Subject: [PATCH 3/7] vm: 'qemu-image' uses the native partitioning tools and
bootloader.
* gnu/system/vm.scm (qemu-image): Use #+ for Parted, the bootloader, etc.
---
gnu/system/vm.scm | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/gnu/system/vm.scm b/gnu/system/vm.scm
index d737a5e4ec..c7767db9df 100644
--- a/gnu/system/vm.scm
+++ b/gnu/system/vm.scm
@@ -345,7 +345,7 @@ system that is passed to 'populate-root-file-system'."
(setlocale LC_ALL "en_US.utf8")
(let ((inputs
- '#$(append (list parted e2fsprogs dosfstools)
+ '#+(append (list parted e2fsprogs dosfstools)
(map canonical-package
(list sed grep coreutils findutils gawk))))
@@ -422,12 +422,12 @@ system that is passed to 'populate-root-file-system'."
#:partitions partitions
#:grub-efi grub-efi
#:bootloader-package
- #$(bootloader-package bootloader)
+ #+(bootloader-package bootloader)
#:bootcfg #$bootcfg-drv
#:bootcfg-location
#$(bootloader-configuration-file bootloader)
#:bootloader-installer
- #$(bootloader-installer bootloader)))))))
+ #+(bootloader-installer bootloader)))))))
#:system system
#:make-disk-image? #t
#:disk-image-size disk-image-size
--
2.26.2
[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #5: 0004-vm-qemu-image-preserves-the-cross-compilation-target.patch --]
[-- Type: text/x-patch, Size: 3229 bytes --]
From db7a12bf54585c8979602956a03fbb6502381dcd Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Ludovic=20Court=C3=A8s?= <ludo@gnu.org>
Date: Thu, 28 May 2020 00:37:33 +0200
Subject: [PATCH 4/7] vm: 'qemu-image' preserves the cross-compilation target
of the OS.
* gnu/system/vm.scm (qemu-image)[preserve-target, inputs*]: New variables.
In gexp, use INPUTS* instead of INPUTS. Wrap OS and BOOTCFG-DRV in
'preserve-target'. Pass INPUTS* instead of INPUTS as the #:references-graphs.
---
gnu/system/vm.scm | 23 +++++++++++++++++++----
1 file changed, 19 insertions(+), 4 deletions(-)
diff --git a/gnu/system/vm.scm b/gnu/system/vm.scm
index c7767db9df..991ea2d837 100644
--- a/gnu/system/vm.scm
+++ b/gnu/system/vm.scm
@@ -317,6 +317,21 @@ system that is passed to 'populate-root-file-system'."
(local-file (search-path %load-path
"guix/store/schema.sql"))))
+ (define preserve-target
+ (if target
+ (lambda (obj)
+ (with-parameters ((%current-target-system target))
+ obj))
+ identity))
+
+ (define inputs*
+ (map (match-lambda
+ ((name thing)
+ `(,name ,(preserve-target thing)))
+ ((name thing output)
+ `(,name ,(preserve-target thing) ,output)))
+ inputs))
+
(expression->derivation-in-linux-vm
name
(with-extensions gcrypt-sqlite3&co
@@ -355,7 +370,7 @@ system that is passed to 'populate-root-file-system'."
'#$(map (match-lambda
((name thing) thing)
((name thing output) `(,thing ,output)))
- inputs)))
+ inputs*)))
(set-path-environment-variable "PATH" '("bin" "sbin") inputs)
@@ -367,7 +382,7 @@ system that is passed to 'populate-root-file-system'."
#:closures graphs
#:copy-closures? #$copy-inputs?
#:register-closures? #$register-closures?
- #:system-directory #$os
+ #:system-directory #$(preserve-target os)
#:make-device-nodes
#$(match device-nodes
@@ -423,7 +438,7 @@ system that is passed to 'populate-root-file-system'."
#:grub-efi grub-efi
#:bootloader-package
#+(bootloader-package bootloader)
- #:bootcfg #$bootcfg-drv
+ #:bootcfg #$(preserve-target bootcfg-drv)
#:bootcfg-location
#$(bootloader-configuration-file bootloader)
#:bootloader-installer
@@ -432,7 +447,7 @@ system that is passed to 'populate-root-file-system'."
#:make-disk-image? #t
#:disk-image-size disk-image-size
#:disk-image-format disk-image-format
- #:references-graphs inputs
+ #:references-graphs inputs*
#:substitutable? substitutable?))
(define* (system-docker-image os
--
2.26.2
[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #6: 0005-vm-virtual-machine-compiler-honors-system-and-target.patch --]
[-- Type: text/x-patch, Size: 3907 bytes --]
From a9270c1261b747dc9a82b52d1ce38314862c51cd Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Ludovic=20Court=C3=A8s?= <ludo@gnu.org>
Date: Wed, 27 May 2020 23:09:49 +0200
Subject: [PATCH 5/7] vm: <virtual-machine> compiler honors system and target.
* gnu/system/vm.scm (system-qemu-image/shared-store): Add #:system
and #:target. Pass it down.
(system-qemu-image/shared-store-script): Likewise.
(virtual-machine-compiler): Likewise.
---
gnu/system/vm.scm | 13 ++++++++++++-
1 file changed, 12 insertions(+), 1 deletion(-)
diff --git a/gnu/system/vm.scm b/gnu/system/vm.scm
index 991ea2d837..05f3986aca 100644
--- a/gnu/system/vm.scm
+++ b/gnu/system/vm.scm
@@ -764,6 +764,8 @@ environment with the store shared with the host. MAPPINGS is a list of
(define* (system-qemu-image/shared-store
os
#:key
+ (system (%current-system))
+ (target (%current-target-system))
full-boot?
(disk-image-size (* (if full-boot? 500 30) (expt 2 20))))
"Return a derivation that builds a QEMU image of OS that shares its store
@@ -784,6 +786,8 @@ bootloader refers to: OS kernel, initrd, bootloader data, etc."
;; This is more than needed (we only need the kernel, initrd, GRUB for its
;; font, and the background image), but it's hard to filter that.
(qemu-image #:os os
+ #:system system
+ #:target target
#:bootcfg-drv bootcfg
#:bootloader (bootloader-configuration-bootloader
(operating-system-bootloader os))
@@ -824,6 +828,8 @@ with '-virtfs' options for the host file systems listed in SHARED-FS."
(define* (system-qemu-image/shared-store-script os
#:key
+ (system (%current-system))
+ (target (%current-target-system))
(qemu qemu)
(graphic? #t)
(memory-size 256)
@@ -847,6 +853,8 @@ it is mostly useful when FULL-BOOT? is true."
(mlet* %store-monad ((os -> (virtualized-operating-system os mappings full-boot?))
(image (system-qemu-image/shared-store
os
+ #:system system
+ #:target target
#:full-boot? full-boot?
#:disk-image-size disk-image-size)))
(define kernel-arguments
@@ -920,10 +928,11 @@ FORWARDINGS is a list of host-port/guest-port pairs."
(define-gexp-compiler (virtual-machine-compiler (vm <virtual-machine>)
system target)
- ;; XXX: SYSTEM and TARGET are ignored.
(match vm
(($ <virtual-machine> os qemu graphic? memory-size disk-image-size ())
(system-qemu-image/shared-store-script os
+ #:system system
+ #:target target
#:qemu qemu
#:graphic? graphic?
#:memory-size memory-size
@@ -936,6 +945,8 @@ FORWARDINGS is a list of host-port/guest-port pairs."
"user,model=virtio-net-pci,"
(port-forwardings->qemu-options forwardings)))))
(system-qemu-image/shared-store-script os
+ #:system system
+ #:target target
#:qemu qemu
#:graphic? graphic?
#:memory-size memory-size
--
2.26.2
[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #7: 0006-vm-Shared-store-script-runs-that-native-QEMU-and-Bas.patch --]
[-- Type: text/x-patch, Size: 1422 bytes --]
From dc3f04a9f412045a85ac810f9436648368c36adc Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Ludovic=20Court=C3=A8s?= <ludo@gnu.org>
Date: Wed, 27 May 2020 23:11:14 +0200
Subject: [PATCH 6/7] vm: Shared-store script runs that native QEMU and Bash.
* gnu/system/vm.scm (system-qemu-image/shared-store-script): Use #+ for
QEMU and BASH.
---
gnu/system/vm.scm | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
diff --git a/gnu/system/vm.scm b/gnu/system/vm.scm
index 05f3986aca..038cce19b6 100644
--- a/gnu/system/vm.scm
+++ b/gnu/system/vm.scm
@@ -862,7 +862,8 @@ it is mostly useful when FULL-BOOT? is true."
#+@(operating-system-kernel-arguments os "/dev/vda1")))
(define qemu-exec
- #~(list (string-append #$qemu "/bin/" #$(qemu-command (%current-system)))
+ #~(list #+(file-append qemu "/bin/"
+ (qemu-command (or target system)))
#$@(if full-boot?
#~()
#~("-kernel" #$(operating-system-kernel-file os)
@@ -879,7 +880,7 @@ it is mostly useful when FULL-BOOT? is true."
#~(call-with-output-file #$output
(lambda (port)
(format port "#!~a~% exec ~a \"$@\"~%"
- #$(file-append bash "/bin/sh")
+ #+(file-append bash "/bin/sh")
(string-join #$qemu-exec " "))
(chmod port #o555))))
--
2.26.2
[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #8: 0007-gnu-guile-static-Disable-JIT-on-ARMv7.patch --]
[-- Type: text/x-patch, Size: 1281 bytes --]
From 6e936131ca85aba24f82d35c4616afe835ac7da5 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Ludovic=20Court=C3=A8s?= <ludo@gnu.org>
Date: Wed, 27 May 2020 23:57:41 +0200
Subject: [PATCH 7/7] gnu: guile-static: Disable JIT on ARMv7.
* gnu/packages/make-bootstrap.scm (make-guile-static): Pass
"--disable-jit" when 'target-arm32?' is true.
---
gnu/packages/make-bootstrap.scm | 7 ++++++-
1 file changed, 6 insertions(+), 1 deletion(-)
diff --git a/gnu/packages/make-bootstrap.scm b/gnu/packages/make-bootstrap.scm
index fe86f810bf..b2d3e2a326 100644
--- a/gnu/packages/make-bootstrap.scm
+++ b/gnu/packages/make-bootstrap.scm
@@ -706,7 +706,12 @@ for `sh' in $PATH, and without nscd, and with static NSS modules."
;; When `configure' checks for ltdl availability, it
;; doesn't try to link using libtool, and thus fails
;; because of a missing -ldl. Work around that.
- ''("LDFLAGS=-ldl"))
+
+ ;; XXX: On ARMv7, disable JIT: it causes crashes with 3.0.2,
+ ;; possibly related to <https://bugs.gnu.org/40737>.
+ (if (target-arm32?)
+ ''("LDFLAGS=-ldl" "--disable-jit")
+ ''("LDFLAGS=-ldl")))
((#:phases phases '%standard-phases)
`(modify-phases ,phases
--
2.26.2
^ permalink raw reply related [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for the Hurd.
2020-05-27 22:54 ` Ludovic Courtès
@ 2020-05-28 6:36 ` Mathieu Othacehe
2020-05-28 12:29 ` Jan Nieuwenhuizen
0 siblings, 1 reply; 50+ messages in thread
From: Mathieu Othacehe @ 2020-05-28 6:36 UTC (permalink / raw)
To: Ludovic Courtès; +Cc: 41350, Jan (janneke) Nieuwenhuizen
> So it took me the whole day, but I ended up with the following patches
Hey Ludo,
> addressing these two points. With that on master, I can do:
>
> guix system vm --target=arm-linux-gnueabihf --no-grafts \
> gnu/system/examples/bare-bones.tmpl
Nice! Many thanks for helping us on that :)
> Likewise, this produces what looks like a valid image, except probably
> for the bootloader (I used GRUB in bare-bones, which didn’t complain,
> but the result doesn’t work):
>
> guix system vm-image --target=arm-linux-gnueabihf …
>
> Thoughts?
qemu-system-arm supports a whole range of machine. You can type:
--8<---------------cut here---------------start------------->8---
qemu-system-arm -M machine help
--8<---------------cut here---------------end--------------->8---
for the complete list. Depending on the selected machine, the required
bootloader differs. For the "virt" machine, it seems that we could pass
the bootloader as Qemu "bios" argument[1], but I'm not sure we can do
much better.
> Yeah, using the new image API will be nicer. We still need to keep some
> of the API in (guix system vm), at least for the ‘guix system vm’
> command.
Yes, you are right.
> From 6e936131ca85aba24f82d35c4616afe835ac7da5 Mon Sep 17 00:00:00 2001
> From: =?UTF-8?q?Ludovic=20Court=C3=A8s?= <ludo@gnu.org>
> Date: Wed, 27 May 2020 23:57:41 +0200
> Subject: [PATCH 7/7] gnu: guile-static: Disable JIT on ARMv7.
The whole serie LGTM. It's nice to have cross-compilation working for
both disk-images and vm-images!
Mathieu
[1]:
https://github.com/ARM-software/u-boot/blob/master/doc/README.qemu-arm
^ permalink raw reply [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for the Hurd.
2020-05-27 9:30 ` Ludovic Courtès
@ 2020-05-28 7:00 ` Mathieu Othacehe
0 siblings, 0 replies; 50+ messages in thread
From: Mathieu Othacehe @ 2020-05-28 7:00 UTC (permalink / raw)
To: Ludovic Courtès; +Cc: 41350, Jan Nieuwenhuizen
Hey Ludo,
> Could you boil the problem down to a “guix build --target” command?
No, but I just found a small reproducer:
--8<---------------cut here---------------start------------->8---
(use-modules (gnu)
(gnu packages gtk)
(guix)
(guix store))
(run-with-store (open-connection)
(mlet* %store-monad ((target (set-current-target "aarch64-linux-gnu"))
(drv (lower-object
(computed-file "test"
#~(begin
(mkdir #$output)
#+guile-rsvg))))
(out -> (derivation->output-path drv)))
(mbegin %store-monad
(built-derivations (list drv))
(return out))))
--8<---------------cut here---------------end--------------->8---
This should fail with:
--8<---------------cut here---------------start------------->8---
In guix/packages.scm:
1072:16 5 (package-derivation _ #<package guile-rsvg@2.18.1-0.05…> …)
1393:16 4 (thunk)
1280:6 3 (bag-grafts #<store-connection 256.99 7f484d450780> #<<…>)
1260:45 2 (fold-bag-dependencies #<procedure 7f484b8bd5e0 at gui…> …)
1072:16 1 (package->bag _ _ _ #:graft? _)
1183:21 0 (thunk)
guix/packages.scm:1183:21: In procedure thunk:
ERROR:
1. &package-cross-build-system-error: #<package gobject-introspection@1.62.0 gnu/packages/glib.scm:406 7f48407ec460>
--8<---------------cut here---------------end--------------->8---
Thanks,
Mathieu
^ permalink raw reply [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for the Hurd.
2020-05-28 6:36 ` Mathieu Othacehe
@ 2020-05-28 12:29 ` Jan Nieuwenhuizen
2020-05-28 15:39 ` Ludovic Courtès
0 siblings, 1 reply; 50+ messages in thread
From: Jan Nieuwenhuizen @ 2020-05-28 12:29 UTC (permalink / raw)
To: Mathieu Othacehe; +Cc: Ludovic Courtès, 41350
Mathieu Othacehe writes:
Hello!
>> So it took me the whole day, but I ended up with the following patches
>
> Hey Ludo,
Thanks so much for helping out!
>> addressing these two points. With that on master, I can do:
>>
>> guix system vm --target=arm-linux-gnueabihf --no-grafts \
>> gnu/system/examples/bare-bones.tmpl
>
> Nice! Many thanks for helping us on that :)
+1
>> Likewise, this produces what looks like a valid image, except probably
>> for the bootloader (I used GRUB in bare-bones, which didn’t complain,
>> but the result doesn’t work):
>>
>> guix system vm-image --target=arm-linux-gnueabihf …
>>
>> Thoughts?
I have locally rebased wip-hurd-vm and wip-disk-image (working title for
wip-hurd-vm minus vm-image support) on it: it looks nice and works for
me building a disk-impage.
Building a vm-image still needs quite some work: I tried building a
vm-image without hurd-specific vm-image patches (bisecting a bit:
register-closures/grub/qemu-image preserve-target stuff)...but in the
end I still needed all these
--8<---------------cut here---------------start------------->8---
0547e4c251 * wip-hurd-vm system: vm: Activate the Hurd.
8c28ab91a5 * system: vm: Initial vm-image support for the Hurd.
d9b84d03bc * system: vm: Add defaults for the Hurd.
29281d053f * system: vm: Build vm-image using native qemu, for the Hurd.
86edea90c4 * system: vm: Do not register-closures when cross-building to the Hurd.
a29437ad82 * utils: Move 'reset-timestamps' out of database.
--8<---------------cut here---------------end--------------->8---
(especially the "using native qemu" patch was greatly reduced now)
as well as --no-grafts to get a vm-image.
So..as discussed on IRC yesterday I'm voting to drop/pause the vm-image
work for the Hurd and reset wip-hurd-vm to my current gitlab
wip-hurd-disk (or possibly push wip-hurd-disk...) WDYT?
>> From 6e936131ca85aba24f82d35c4616afe835ac7da5 Mon Sep 17 00:00:00 2001
>> From: =?UTF-8?q?Ludovic=20Court=C3=A8s?= <ludo@gnu.org>
>> Date: Wed, 27 May 2020 23:57:41 +0200
>> Subject: [PATCH 7/7] gnu: guile-static: Disable JIT on ARMv7.
>
> The whole serie LGTM. It's nice to have cross-compilation working for
> both disk-images and vm-images!
I agree...although as noted above: how much effort do we want to put in
for the Hurd?
Greetings,
Janneke
--
Jan Nieuwenhuizen <janneke@gnu.org> | GNU LilyPond http://lilypond.org
Freelance IT http://JoyofSource.com | Avatar® http://AvatarAcademy.com
^ permalink raw reply [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for the Hurd.
2020-05-28 12:29 ` Jan Nieuwenhuizen
@ 2020-05-28 15:39 ` Ludovic Courtès
2020-05-28 17:07 ` Jan Nieuwenhuizen
2020-05-28 17:10 ` Mathieu Othacehe
0 siblings, 2 replies; 50+ messages in thread
From: Ludovic Courtès @ 2020-05-28 15:39 UTC (permalink / raw)
To: Jan Nieuwenhuizen; +Cc: Mathieu Othacehe, 41350
Hi!
Jan Nieuwenhuizen <janneke@gnu.org> skribis:
> Building a vm-image still needs quite some work: I tried building a
> vm-image without hurd-specific vm-image patches (bisecting a bit:
> register-closures/grub/qemu-image preserve-target stuff)...but in the
> end I still needed all these
How does it fail exactly? (I’ll give it a spin as time permits.)
> So..as discussed on IRC yesterday I'm voting to drop/pause the vm-image
> work for the Hurd and reset wip-hurd-vm to my current gitlab
> wip-hurd-disk (or possibly push wip-hurd-disk...) WDYT?
Sure, whatever works best!
>>> From 6e936131ca85aba24f82d35c4616afe835ac7da5 Mon Sep 17 00:00:00 2001
>>> From: =?UTF-8?q?Ludovic=20Court=C3=A8s?= <ludo@gnu.org>
>>> Date: Wed, 27 May 2020 23:57:41 +0200
>>> Subject: [PATCH 7/7] gnu: guile-static: Disable JIT on ARMv7.
>>
>> The whole serie LGTM. It's nice to have cross-compilation working for
>> both disk-images and vm-images!
>
> I agree...although as noted above: how much effort do we want to put in
> for the Hurd?
I was looking at what needs to be fixed there, independently of the
Hurd.
But maybe we can just rebase ‘system-qemu-image’ & co. on top of (gnu
image)? What prevents us from doing that, Mathieu?
If we can do that, then indeed, there’s no point in insisting on fixing
cross-compilation support in (gnu system vm).
Thanks for your feedback!
Ludo’.
^ permalink raw reply [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for the Hurd.
2020-05-28 15:39 ` Ludovic Courtès
@ 2020-05-28 17:07 ` Jan Nieuwenhuizen
2020-05-28 17:10 ` Mathieu Othacehe
1 sibling, 0 replies; 50+ messages in thread
From: Jan Nieuwenhuizen @ 2020-05-28 17:07 UTC (permalink / raw)
To: Ludovic Courtès; +Cc: Mathieu Othacehe, 41350
Ludovic Courtès writes:
Hello!
> Jan Nieuwenhuizen <janneke@gnu.org> skribis:
>
>> Building a vm-image still needs quite some work: I tried building a
>> vm-image without hurd-specific vm-image patches (bisecting a bit:
>> register-closures/grub/qemu-image preserve-target stuff)...but in the
>> end I still needed all these
>
> How does it fail exactly? (I’ll give it a spin as time permits.)
As discussed on IRC: same errors as before, mostly (sqlite loading,
meson cross build using --no-grafts, linux build for i586-pc-gnu).
>> So..as discussed on IRC yesterday I'm voting to drop/pause the vm-image
>> work for the Hurd and reset wip-hurd-vm to my current gitlab
>> wip-hurd-disk (or possibly push wip-hurd-disk...) WDYT?
>
> Sure, whatever works best!
Done! I have just reset wip-hurd-vm, let the review+merge begin \o/
>>>> From 6e936131ca85aba24f82d35c4616afe835ac7da5 Mon Sep 17 00:00:00 2001
>>>> From: =?UTF-8?q?Ludovic=20Court=C3=A8s?= <ludo@gnu.org>
>>>> Date: Wed, 27 May 2020 23:57:41 +0200
>>>> Subject: [PATCH 7/7] gnu: guile-static: Disable JIT on ARMv7.
>>>
>>> The whole serie LGTM. It's nice to have cross-compilation working for
>>> both disk-images and vm-images!
>>
>> I agree...although as noted above: how much effort do we want to put in
>> for the Hurd?
>
> I was looking at what needs to be fixed there, independently of the
> Hurd.
Yes, so I kept your commits at the bottom of the new wip-hurd-vm, they
are clean and there's some value in them, I think.
> But maybe we can just rebase ‘system-qemu-image’ & co. on top of (gnu
> image)? What prevents us from doing that, Mathieu?
+1
> If we can do that, then indeed, there’s no point in insisting on fixing
> cross-compilation support in (gnu system vm).
possibly, modulo s/no/litte/ s/point/urgency/
but yeah. A bit sad, between us we put quite some effort into that...
Janneke
--
Jan Nieuwenhuizen <janneke@gnu.org> | GNU LilyPond http://lilypond.org
Freelance IT http://JoyofSource.com | Avatar® http://AvatarAcademy.com
^ permalink raw reply [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for the Hurd.
2020-05-28 15:39 ` Ludovic Courtès
2020-05-28 17:07 ` Jan Nieuwenhuizen
@ 2020-05-28 17:10 ` Mathieu Othacehe
2020-05-28 18:19 ` Jan Nieuwenhuizen
2020-05-29 8:18 ` Ludovic Courtès
1 sibling, 2 replies; 50+ messages in thread
From: Mathieu Othacehe @ 2020-05-28 17:10 UTC (permalink / raw)
To: Ludovic Courtès; +Cc: 41350, Jan Nieuwenhuizen
Hey Ludo & Jan,
> But maybe we can just rebase ‘system-qemu-image’ & co. on top of (gnu
> image)? What prevents us from doing that, Mathieu?
>
> If we can do that, then indeed, there’s no point in insisting on fixing
> cross-compilation support in (gnu system vm).
I think we could proceed that way:
* Merge Ludo's serie on master.
* Then we could review & merge Jan's wip-hurd-disk.
* Finally, there's the wip-hurd-vm. I believe that some of stuff there
is fixed in Ludo's serie. So we would need to rebase it on top of
everything & finally push it.
Do you think that makes sense?
Thanks,
Mathieu
^ permalink raw reply [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for the Hurd.
2020-05-28 17:10 ` Mathieu Othacehe
@ 2020-05-28 18:19 ` Jan Nieuwenhuizen
2020-05-29 8:18 ` Ludovic Courtès
1 sibling, 0 replies; 50+ messages in thread
From: Jan Nieuwenhuizen @ 2020-05-28 18:19 UTC (permalink / raw)
To: Mathieu Othacehe; +Cc: Ludovic Courtès, 41350
Mathieu Othacehe writes:
Hi Mathieu, Ludo
> Hey Ludo & Jan,
>
>> But maybe we can just rebase ‘system-qemu-image’ & co. on top of (gnu
>> image)? What prevents us from doing that, Mathieu?
>>
>> If we can do that, then indeed, there’s no point in insisting on fixing
>> cross-compilation support in (gnu system vm).
>
> I think we could proceed that way:
>
> * Merge Ludo's serie on master.
>
> * Then we could review & merge Jan's wip-hurd-disk.
Oops, you sent your mail just a few minutes before mine; just reading it
now :-)
I push a fresh wip-hurd-vm, which is the above: wip-hurd-disk rebase
onto Ludo's series...almost the same.
> * Finally, there's the wip-hurd-vm. I believe that some of stuff there
> is fixed in Ludo's serie. So we would need to rebase it on top of
> everything & finally push it.
>
> Do you think that makes sense?
Yes, I think this is more or less my idea too and what I did...except
for leaving my hurd-specific qemu-image/vm-image work rest.
Hope that's OK!
Janneke
--
Jan Nieuwenhuizen <janneke@gnu.org> | GNU LilyPond http://lilypond.org
Freelance IT http://JoyofSource.com | Avatar® http://AvatarAcademy.com
^ permalink raw reply [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for the Hurd.
2020-05-28 17:10 ` Mathieu Othacehe
2020-05-28 18:19 ` Jan Nieuwenhuizen
@ 2020-05-29 8:18 ` Ludovic Courtès
2020-05-29 9:06 ` Jan Nieuwenhuizen
1 sibling, 1 reply; 50+ messages in thread
From: Ludovic Courtès @ 2020-05-29 8:18 UTC (permalink / raw)
To: Mathieu Othacehe; +Cc: 41350, Jan Nieuwenhuizen
Hi,
Mathieu Othacehe <othacehe@gnu.org> skribis:
>> But maybe we can just rebase ‘system-qemu-image’ & co. on top of (gnu
>> image)? What prevents us from doing that, Mathieu?
>>
>> If we can do that, then indeed, there’s no point in insisting on fixing
>> cross-compilation support in (gnu system vm).
>
> I think we could proceed that way:
>
> * Merge Ludo's serie on master.
I think that can wait because on IRC Janneke explained that it doesn’t
fix anything for GNU/Hurd (to my surprise). So I’ll maybe check again
once the relevant Hurd bits are on master, instead of checking ARM
cross-compilation.
Anyway it’s much less important now that (gnu image) can be used for the
task!
> * Then we could review & merge Jan's wip-hurd-disk.
Do I get it right that we first need
<https://issues.guix.gnu.org/41560>?
The ‘wip-hurd-vm’ branch contains many things:
1. (gnu system hurd) with the Hurd services etc.
2. The ‘hurd’ field of <operating-system>.
3. <menu-entry> with multiboot support.
4. Hacks to work around vm.scm defects: uses of ‘with-parameters’,
‘hurd-target?’, disabling sqlite3, and #~#$ tricks.
I think part of the reason this cycle has been so long is that it’s been
kind of a big bang; big bangs are great because they lead to something
new and exciting, but they’re also intimidating. :-) For me personally,
looking at all these aspects at once was just too much.
For merging, I think it’d be great to see #1 and #2 as a first step, and
then #3.
I do not want any of #4 :-), because I really think it could lead to
maintenance headaches down the road, which would make the kind of
changes we’re making today practically impossible in the future.
Thoughts?
Ludo’.
^ permalink raw reply [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for the Hurd.
2020-05-29 8:18 ` Ludovic Courtès
@ 2020-05-29 9:06 ` Jan Nieuwenhuizen
2020-05-30 10:08 ` Jan Nieuwenhuizen
0 siblings, 1 reply; 50+ messages in thread
From: Jan Nieuwenhuizen @ 2020-05-29 9:06 UTC (permalink / raw)
To: Ludovic Courtès; +Cc: Mathieu Othacehe, 41350
Ludovic Courtès writes:
> Hi,
>
> Mathieu Othacehe <othacehe@gnu.org> skribis:
>
>>> But maybe we can just rebase ‘system-qemu-image’ & co. on top of (gnu
>>> image)? What prevents us from doing that, Mathieu?
>>>
>>> If we can do that, then indeed, there’s no point in insisting on fixing
>>> cross-compilation support in (gnu system vm).
>>
>> I think we could proceed that way:
>>
>> * Merge Ludo's serie on master.
>
> I think that can wait because on IRC Janneke explained that it doesn’t
> fix anything for GNU/Hurd (to my surprise).
Well, that's too black/white. Of course this:
- (linux (string-append #$linux "/"
- #$(system-linux-image-file-name)))
- (initrd #$initrd)
- (loader #$loader)
+ (linux (string-append
+ #+linux "/"
+ #+(system-linux-image-file-name system)))
+ (initrd #+initrd)
+ (loader #+loader)
is an essential fix. Only, that used to be on wip-hurd-vm -- so from
that perspective this fix only got reviewed and moved.
Pretty similarly for this
+ (define preserve-target
+ (if target
+ (lambda (obj)
+ (with-parameters ((%current-target-system target))
+ obj))
+ identity))
also an essential bit. So, seen from master it fixes quite some bits!
What I meant to say is that I haven't seen /additional/ fixes to what
we had on wip-hurd-vm...
Because your fixes look clean and don't break anything, I think we
should maybe apply them to master -- and that's why I kept them at
the bottom of "wip-hurd-vm" for now.
> So I’ll maybe check again once the relevant Hurd bits are on master,
> instead of checking ARM cross-compilation.
>
> Anyway it’s much less important now that (gnu image) can be used for the
> task!
Yes, so from the Hurd perspective this patch set has shifted from
top-priority to probably not going to be used for the Hurd ;)
>> * Then we could review & merge Jan's wip-hurd-disk.
>
> Do I get it right that we first need
> <https://issues.guix.gnu.org/41560>?
>
> The ‘wip-hurd-vm’ branch contains many things:
>
> 1. (gnu system hurd) with the Hurd services etc.
>
> 2. The ‘hurd’ field of <operating-system>.
>
> 3. <menu-entry> with multiboot support.
Yes.
> 4. Hacks to work around vm.scm defects: uses of ‘with-parameters’,
Together with dropping qemu-image support for the Hurd, I have removed
most of this; what remains is in
--8<---------------cut here---------------start------------->8---
system: Add 'multiboot-modules' field to <boot-parameters>.
+ (mach (if (%current-target-system)
+ ;; A cross-built GNUmach does not work
+ (with-parameters ((%current-system "i686-linux")
+ (%current-target-system #f))
+ mach)
+ mach)))
[..]
+ (libc (if target
+ (with-parameters ((%current-target-system #f))
+ (cross-libc target))
+ glibc))
--8<---------------cut here---------------end--------------->8---
> ‘hurd-target?’, disabling sqlite3, and #~#$ tricks.
I think this is mostly gone, two instances of hurd-target? remain. I'll
look more sharply at that too!
> I think part of the reason this cycle has been so long is that it’s been
> kind of a big bang; big bangs are great because they lead to something
> new and exciting, but they’re also intimidating. :-) For me personally,
> looking at all these aspects at once was just too much.
Yes...
> For merging, I think it’d be great to see #1 and #2 as a first step, and
> then #3.
Yes, that would be an amazing feat.
> I do not want any of #4 :-), because I really think it could lead to
> maintenance headaches down the road, which would make the kind of
> changes we’re making today practically impossible in the future.
> Thoughts?
I fully agree, thanks!
Greetings,
Janneke
--
Jan Nieuwenhuizen <janneke@gnu.org> | GNU LilyPond http://lilypond.org
Freelance IT http://JoyofSource.com | Avatar® http://AvatarAcademy.com
^ permalink raw reply [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for the Hurd.
2020-05-29 9:06 ` Jan Nieuwenhuizen
@ 2020-05-30 10:08 ` Jan Nieuwenhuizen
2020-05-30 13:54 ` Ludovic Courtès
0 siblings, 1 reply; 50+ messages in thread
From: Jan Nieuwenhuizen @ 2020-05-30 10:08 UTC (permalink / raw)
To: Ludovic Courtès; +Cc: Mathieu Othacehe, 41350
Jan Nieuwenhuizen writes:
Hi!
A quick headsup for /boot/activation; I have found how to do without
/boot/activation, using the regular (I think) path using kernel
arguments --system=, --load=, and system/boot.
I'll be pushing a couple of squash commits onto wip-hurd-vm for
that.
Janneke
--
Jan Nieuwenhuizen <janneke@gnu.org> | GNU LilyPond http://lilypond.org
Freelance IT http://JoyofSource.com | Avatar® http://AvatarAcademy.com
^ permalink raw reply [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for the Hurd.
2020-05-30 10:08 ` Jan Nieuwenhuizen
@ 2020-05-30 13:54 ` Ludovic Courtès
2022-09-28 20:18 ` [bug#41350] [PATCH 0/3] Use native qemu to build vm-image Maxim Cournoyer
0 siblings, 1 reply; 50+ messages in thread
From: Ludovic Courtès @ 2020-05-30 13:54 UTC (permalink / raw)
To: Jan Nieuwenhuizen; +Cc: Mathieu Othacehe, 41350
Hi,
Jan Nieuwenhuizen <janneke@gnu.org> skribis:
> A quick headsup for /boot/activation; I have found how to do without
> /boot/activation, using the regular (I think) path using kernel
> arguments --system=, --load=, and system/boot.
Yay!
Ludo’.
^ permalink raw reply [flat|nested] 50+ messages in thread
* [bug#41350] [PATCH 0/3] Use native qemu to build vm-image.
2020-05-30 13:54 ` Ludovic Courtès
@ 2022-09-28 20:18 ` Maxim Cournoyer
2022-09-29 14:17 ` bug#41350: " Mathieu Othacehe
0 siblings, 1 reply; 50+ messages in thread
From: Maxim Cournoyer @ 2022-09-28 20:18 UTC (permalink / raw)
Cc: Mathieu Othacehe, Ludovic Courtès, 41350, Jan Nieuwenhuizen
Hello,
Ludovic Courtès <ludo@gnu.org> writes:
> Hi,
>
> Jan Nieuwenhuizen <janneke@gnu.org> skribis:
>
>> A quick headsup for /boot/activation; I have found how to do without
>> /boot/activation, using the regular (I think) path using kernel
>> arguments --system=, --load=, and system/boot.
I was trying to see if there were any pending changes not yet committed
to our tree in this interesting but long thread? Please help me out by
closing it if not, or pointing which changes remain :-).
Thanks,
Maxim
^ permalink raw reply [flat|nested] 50+ messages in thread
* bug#41350: [PATCH 0/3] Use native qemu to build vm-image.
2022-09-28 20:18 ` [bug#41350] [PATCH 0/3] Use native qemu to build vm-image Maxim Cournoyer
@ 2022-09-29 14:17 ` Mathieu Othacehe
0 siblings, 0 replies; 50+ messages in thread
From: Mathieu Othacehe @ 2022-09-29 14:17 UTC (permalink / raw)
To: Maxim Cournoyer; +Cc: Ludovic Courtès, 41350-done, Jan Nieuwenhuizen
Hey Maxim,
Building 'vm-image' does not involve QEMU anymore so we can close this
one.
Thanks,
Mathieu
^ permalink raw reply [flat|nested] 50+ messages in thread
end of thread, other threads:[~2022-09-29 15:54 UTC | newest]
Thread overview: 50+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2020-05-17 10:01 [bug#41350] [PATCH 0/3] Use native qemu to build vm-image Jan Nieuwenhuizen
2020-05-17 10:03 ` [bug#41350] [PATCH 1/3] utils: Move 'reset-timestamps' out of database Jan (janneke) Nieuwenhuizen
2020-05-17 10:03 ` [bug#41350] [PATCH 2/3] system: vm: Do not register-closures when cross-building Jan (janneke) Nieuwenhuizen
2020-05-17 10:03 ` [bug#41350] [PATCH 3/3] system: vm: Build vm-image using native qemu Jan (janneke) Nieuwenhuizen
2020-05-18 9:10 ` [bug#41350] [PATCH 0/3] Use native qemu to build vm-image Mathieu Othacehe
2020-05-19 7:22 ` Jan Nieuwenhuizen
2020-05-19 10:02 ` Mathieu Othacehe
2020-05-20 14:03 ` Mathieu Othacehe
2020-05-20 15:09 ` Jan Nieuwenhuizen
2020-05-19 7:23 ` [bug#41350] [PATCH v2 1/3] utils: Move 'reset-timestamps' out of database Jan (janneke) Nieuwenhuizen
2020-05-19 7:23 ` [bug#41350] [PATCH v2 2/3] system: vm: Do not register-closures when cross-building to the Hurd Jan (janneke) Nieuwenhuizen
2020-05-19 7:23 ` [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for " Jan (janneke) Nieuwenhuizen
2020-05-19 9:14 ` Mathieu Othacehe
2020-05-20 21:49 ` Ludovic Courtès
2020-05-23 9:28 ` Jan Nieuwenhuizen
2020-05-23 17:45 ` Mathieu Othacehe
2020-05-23 19:07 ` Jan Nieuwenhuizen
2020-05-24 9:18 ` Mathieu Othacehe
2020-05-27 9:30 ` Ludovic Courtès
2020-05-28 7:00 ` Mathieu Othacehe
2020-05-24 11:19 ` Jan Nieuwenhuizen
2020-05-24 12:07 ` Mathieu Othacehe
2020-05-24 14:20 ` Jan Nieuwenhuizen
2020-05-24 16:36 ` Ludovic Courtès
2020-05-20 21:58 ` Ludovic Courtès
2020-05-22 19:24 ` Mathieu Othacehe
2020-05-27 22:54 ` Ludovic Courtès
2020-05-28 6:36 ` Mathieu Othacehe
2020-05-28 12:29 ` Jan Nieuwenhuizen
2020-05-28 15:39 ` Ludovic Courtès
2020-05-28 17:07 ` Jan Nieuwenhuizen
2020-05-28 17:10 ` Mathieu Othacehe
2020-05-28 18:19 ` Jan Nieuwenhuizen
2020-05-29 8:18 ` Ludovic Courtès
2020-05-29 9:06 ` Jan Nieuwenhuizen
2020-05-30 10:08 ` Jan Nieuwenhuizen
2020-05-30 13:54 ` Ludovic Courtès
2022-09-28 20:18 ` [bug#41350] [PATCH 0/3] Use native qemu to build vm-image Maxim Cournoyer
2022-09-29 14:17 ` bug#41350: " Mathieu Othacehe
2020-05-23 9:30 ` [bug#41350] [PATCH v3 1/3] utils: Move 'reset-timestamps' out of database Jan (janneke) Nieuwenhuizen
2020-05-23 9:30 ` [bug#41350] [PATCH v3 2/3] system: vm: Do not register-closures when cross-building to the Hurd Jan (janneke) Nieuwenhuizen
2020-05-27 8:45 ` Ludovic Courtès
2020-05-27 9:13 ` Jan Nieuwenhuizen
2020-05-23 9:30 ` [bug#41350] [PATCH v3 3/3] system: vm: Build vm-image using native qemu, for " Jan (janneke) Nieuwenhuizen
2020-05-27 8:43 ` [bug#41350] [PATCH v3 1/3] utils: Move 'reset-timestamps' out of database Ludovic Courtès
2020-05-27 8:59 ` Ludovic Courtès
2020-05-27 9:10 ` Jan Nieuwenhuizen
2020-05-24 18:11 ` [bug#41350] [PATCH v2 3/3] system: vm: Build vm-image using native qemu, for the Hurd Mathieu Othacehe
2020-05-24 18:40 ` Jan Nieuwenhuizen
2020-05-25 15:46 ` Jan Nieuwenhuizen
Code repositories for project(s) associated with this public inbox
https://git.savannah.gnu.org/cgit/guix.git
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).