rust-for-linux.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Richard Purdie <richard.purdie@linuxfoundation.org>
To: gtucker@gtucker.io, Nick Desaulniers <ndesaulniers@google.com>,
	Miguel Ojeda <ojeda@kernel.org>,
	Alexei Starovoitov <ast@kernel.org>,
	Arnd Bergmann <arnd@arndb.de>
Cc: llvm@lists.linux.dev, rust-for-linux@vger.kernel.org,
	yurinnick@meta.com,  bpf@vger.kernel.org,
	Sasha Levin <sashal@kernel.org>,
	Shuah Khan <skhan@linuxfoundation.org>,
	automated-testing@lists.yoctoproject.org
Subject: Re: [Automated-testing] Plumbers Testing MC potential topic: specialised toolchains
Date: Mon, 08 Jul 2024 23:22:09 +0100	[thread overview]
Message-ID: <141a4ba7c3645594de636985d3300f3914a160f1.camel@linuxfoundation.org> (raw)
In-Reply-To: <f80acb84-1d98-44d3-84b7-d976de77d8ce@gtucker.io>

On Tue, 2024-07-09 at 00:10 +0200, Guillaume Tucker via
lists.yoctoproject.org wrote:
> Based on these assumptions, the issue is about reproducibility -
> yet alone setting up a toolchain that can build the code at all.
> For an automated system to cover these use-cases, or for any
> developer wanting to work on these particular areas of the
> kernel, having the ability to reliably build it in a reproducible
> way using a reference toolchain adds a lot of value.  It means
> better quality control, less scope for errors and unexpected
> behaviour with different code paths being executed or built
> differently.
> 
> The current state of the art are the kernel.org toolchains:
> 
>   https://mirrors.edge.kernel.org/pub/tools/
> 
> These are for LLVM and cross-compilers, and they already solve a
> large part of the issue described above.  However, they don't
> include Rust (yet), and all the dependencies need to be installed
> manually which can have a significant impact on the build
> result (gcc, binutils...).  One step further are the Linaro
> TuxMake Docker images[2] which got some very recent blog
> coverage[3].  The issues then are that not all the toolchains are
> necessarily available in Docker images, they're tailored to
> TuxMake use-cases, and I'm not sure to which extent upstream
> kernel maintainers rely on them.
> 
> 
> Now, I might have missed some other important aspects so please
> correct me if this reasoning seems flawed in any way.  I have
> however seen how hard it can be for automated systems to build
> kernels correctly and in a way that developers can reproduce, so
> this is no trivial issue.  Then for the Testing MC, I would be
> very interested to hear whether people feel it would be
> beneficial to work towards a more exhaustive solution supported
> upstream: kernel.org Docker images or something close such as
> Dockerfiles in Git or another type of images with all the
> dependencies included.  How does that sound?

Sadly I can't be at plumbers however I wanted to mention that Yocto
Project's SDKs are effectively standalone toolchains. They can be
configured to contain all their dependencies and whatever tools are
desirable (e.g. git, python etc.), are fully reproducible, installable
at any location and we have working rust compilers in the SDKs if
configured to include them.

I just want to make sure people know that capability exists!

Cheers,

Richard


  reply	other threads:[~2024-07-08 22:22 UTC|newest]

Thread overview: 8+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-07-08 22:10 Plumbers Testing MC potential topic: specialised toolchains Guillaume Tucker
2024-07-08 22:22 ` Richard Purdie [this message]
2024-07-08 23:07 ` Miguel Ojeda
2024-07-13 21:25   ` Guillaume Tucker
2024-07-09  5:30 ` Nathan Chancellor
2024-07-13 23:03   ` Guillaume Tucker
2024-09-18  7:33     ` Guillaume Tucker
     [not found]     ` <17F6464FBF21FF99.27464@lists.yoctoproject.org>
2024-09-30 20:07       ` [Automated-testing] " Guillaume Tucker

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=141a4ba7c3645594de636985d3300f3914a160f1.camel@linuxfoundation.org \
    --to=richard.purdie@linuxfoundation.org \
    --cc=arnd@arndb.de \
    --cc=ast@kernel.org \
    --cc=automated-testing@lists.yoctoproject.org \
    --cc=bpf@vger.kernel.org \
    --cc=gtucker@gtucker.io \
    --cc=llvm@lists.linux.dev \
    --cc=ndesaulniers@google.com \
    --cc=ojeda@kernel.org \
    --cc=rust-for-linux@vger.kernel.org \
    --cc=sashal@kernel.org \
    --cc=skhan@linuxfoundation.org \
    --cc=yurinnick@meta.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).