From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-10.3 required=3.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,MENTIONS_GIT_HOSTING, NICE_REPLY_A,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_AGENT_SANE_1 autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 55552C433E0 for ; Tue, 12 Jan 2021 00:10:11 +0000 (UTC) Received: from lists.ozlabs.org (lists.ozlabs.org [203.11.71.2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id B6A8C22D2C for ; Tue, 12 Jan 2021 00:10:10 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org B6A8C22D2C Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=linux.intel.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=openbmc-bounces+openbmc=archiver.kernel.org@lists.ozlabs.org Received: from bilbo.ozlabs.org (lists.ozlabs.org [IPv6:2401:3900:2:1::3]) by lists.ozlabs.org (Postfix) with ESMTP id 4DF9v45Dx2zDqXC for ; Tue, 12 Jan 2021 11:10:08 +1100 (AEDT) Authentication-Results: lists.ozlabs.org; spf=none (no SPF record) smtp.mailfrom=linux.intel.com (client-ip=134.134.136.100; helo=mga07.intel.com; envelope-from=jason.m.bills@linux.intel.com; receiver=) Authentication-Results: lists.ozlabs.org; dmarc=fail (p=none dis=none) header.from=linux.intel.com Received: from mga07.intel.com (mga07.intel.com [134.134.136.100]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by lists.ozlabs.org (Postfix) with ESMTPS id 4DF9sJ0wnhzDqX9 for ; Tue, 12 Jan 2021 11:08:34 +1100 (AEDT) IronPort-SDR: ECxnb4bOe1YcziuguuTFA3GBmECexVm4Gbs8Q1HEqtAsVRQiVRcs270Th+7qvuGxQACWy7SiCp ihVYmSNEFoKg== X-IronPort-AV: E=McAfee;i="6000,8403,9861"; a="242028210" X-IronPort-AV: E=Sophos;i="5.79,339,1602572400"; d="scan'208";a="242028210" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 11 Jan 2021 16:08:31 -0800 IronPort-SDR: QwyGQYbmiyCQBLn1MVrulPo6uZqDxqycmtldsAUiwVcOLluhjbSKfGa4B6RgDSudfPlafp3Rgf PTSNEGTDJPtQ== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.79,339,1602572400"; d="scan'208";a="399987622" Received: from linux.intel.com ([10.54.29.200]) by fmsmga002.fm.intel.com with ESMTP; 11 Jan 2021 16:08:31 -0800 Received: from [10.209.69.170] (jmbills-MOBL.amr.corp.intel.com [10.209.69.170]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by linux.intel.com (Postfix) with ESMTPS id 103D3580910 for ; Mon, 11 Jan 2021 16:08:29 -0800 (PST) Subject: Re: peci-pcie CI issues To: openbmc@lists.ozlabs.org References: <6c2c44435e704f6eee95b7e35cbc39ccfae32b62.camel@yadro.com> <0759e6524c910c8d24f1453dbbe226bc3460e588.camel@yadro.com> From: "Bills, Jason M" Message-ID: <50d6828a-3460-884e-c107-4b0fe5f1396d@linux.intel.com> Date: Mon, 11 Jan 2021 16:08:27 -0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit X-BeenThere: openbmc@lists.ozlabs.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Development list for OpenBMC List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: openbmc-bounces+openbmc=archiver.kernel.org@lists.ozlabs.org Sender: "openbmc" On 12/24/2020 10:53 AM, Ed Tanous wrote: > On Thu, Dec 24, 2020 at 10:34 AM Andrei Kartashev wrote: >> >> Well, then probably we can wait. >> How far this could happens? > > Whenever the work gets done. Someone needs to: > Send a patch to yocto upgrading the boost recipe. > Wait for the meta-layer bump to run (I think Andrew runs the job once a week). > Resolve any issues with the bump when it gets merged to OpenBMC. > > There's no exact timelines on the above, but you can certainly > accelerate it by doing step 1, after which you're probably looking at > a couple weeks before we get it in OpenBMC. It looks like upstream Yocto picked up boost 1.75: https://git.yoctoproject.org/cgit/cgit.cgi/poky/tree/meta/recipes-support/boost. > >> >> On Thu, 2020-12-24 at 10:23 -0800, Ed Tanous wrote: >>> On Thu, Dec 24, 2020 at 10:07 AM Patrick Williams >>> wrote: >>>> We have had this issue with a number of repositories lately. The >>>> most recent version of boost::asio does not allow -fno-rtti. The >>>> makefile needs to be changed to no longer force this option. >>> >>> Or, as another option, just wait until boost 1.75.0 lands in yocto >>> master and subsequent openbmc bump. It was released a couple weeks >>> ago and fixes this issue. We'll likely be adding the no-rtti flags >>> back to most of the repos shortly after that. >>> >>>> Sent from my iPhone >>>> >>>>> On Dec 24, 2020, at 9:48 AM, Andrei Kartashev < >>>>> a.kartashev@yadro.com> wrote: >>>>> >>>>> Hello Jason, >>>>> >>>>> I push several patches to peci-pcie repo, but looks like CI >>>>> broken >>>>> there. Could you take a look on how to fix CI? >>>>> >>>>> [ 90%] Building CXX object CMakeFiles/peci- >>>>> pcie.dir/src/peci_pcie.cpp.o >>>>> In file included from >>>>> /usr/local/include/boost/asio/execution.hpp:19, >>>>> from >>>>> /usr/local/include/boost/asio/system_executor.hpp:20, >>>>> from >>>>> /usr/local/include/boost/asio/associated_executor.hpp:22, >>>>> from >>>>> /usr/local/include/boost/asio/detail/bind_handler.hpp:20, >>>>> from >>>>> /usr/local/include/boost/asio/detail/wrapped_handler.hpp:18, >>>>> from >>>>> /usr/local/include/boost/asio/io_context.hpp:23, >>>>> from >>>>> /usr/local/include/boost/asio/io_service.hpp:18, >>>>> from /home/jenkins-op/workspace/ci- >>>>> repository/openbmc/peci-pcie/src/peci_pcie.cpp:22: >>>>> /usr/local/include/boost/asio/execution/any_executor.hpp: In >>>>> static member function ‘static const std::type_info& >>>>> boost::asio::execution::detail::any_executor_base::target_type_vo >>>>> id()’: >>>>> /usr/local/include/boost/asio/execution/any_executor.hpp:811:23: >>>>> error: cannot use ‘typeid’ with ‘-fno-rtti’ >>>>> 811 | return typeid(void); >>>>> | ^ >>>>> /usr/local/include/boost/asio/execution/any_executor.hpp: In >>>>> static member function ‘static const std::type_info& >>>>> boost::asio::execution::detail::any_executor_base::target_type_ex >>>>> ()’: >>>>> /usr/local/include/boost/asio/execution/any_executor.hpp:851:21: >>>>> error: cannot use ‘typeid’ with ‘-fno-rtti’ >>>>> 851 | return typeid(Ex); >>>>> | ^ >>>>> >>>>> -- >>>>> Best regards, >>>>> Andrei Kartashev >>>>> >>>>> >> -- >> Best regards, >> Andrei Kartashev >> >>