!OqhvaDMJdKYUicLDiE:nixos.org

Nixpkgs Stdenv

230 Members
73 Servers

Load older messages


SenderMessageTime
10 Feb 2026
@grimmauld:m.grimmauld.deGrimmauld (any/all) left the room.19:58:48
@grimmauld:m.grimmauld.deGrimmauld (any/all) joined the room.19:58:59
@grimmauld:m.grimmauld.deGrimmauld (any/all) left the room.19:59:39
@tim:stratum0.orgdadada (er/ihm) changed their display name from dadada to dadada (er/ihm).20:02:37
12 Feb 2026
@amadaluzia:unredacted.orgamadaluzia changed their profile picture.17:47:53
@amadaluzia:unredacted.orgamadaluzia changed their profile picture.17:48:46
@amadaluzia:unredacted.orgamadaluzia changed their profile picture.18:00:07
@grizzlt:matrix.orgGrizzlT joined the room.20:36:26
@r_i_s:matrix.orgris_ive just spotted something surprising22:42:40
@r_i_s:matrix.orgris_when i merged https://github.com/NixOS/nixpkgs/pull/442945, i enabled them (both) by default22:43:20
@r_i_s:matrix.orgris_this was not intended22:43:24
@r_i_s:matrix.orgris_i should probably undo at least the extensive one22:44:08
@r_i_s:matrix.orgris_though it's weird 26.xx shipping without flags 25.11 had enabled22:44:37
@r_i_s:matrix.orgris_ i'm sure some packages must be seeing a performance impact 22:44:54
@me_and:matrix.orgAdam joined the room.23:15:38
13 Feb 2026
@emilazy:matrix.orgemilyare there numbers for the expected impact of the two?03:27:02
@emilazy:matrix.orgemily

Extensive mode, which contains all the checks from fast mode and some additional checks for undefined behavior that incur relatively little overhead but aren’t security-critical. Production builds requiring a broader set of checks than fast mode should consider enabling extensive mode. The additional rigour impacts performance more than fast mode: we recommend benchmarking to determine if that is acceptable for your program.

03:27:29
@emilazy:matrix.orgemily doesn't sound like it should be too bad 03:27:33
@emilazy:matrix.orgemilyspecifically marked as suitable for production at least03:27:56
@emilazy:matrix.orgemily fwiw the main user of libc++ in Nixpkgs is macOS and _LIBCPP_HARDENING_MODE_DEFAULT is already 2 (fast) on that platform 03:29:42
@emilazy:matrix.orgemily so libcxxhardeningfast is just a nop 03:30:04
@hoplophfeil:matrix.orghoplopf joined the room.10:25:27
@r_i_s:matrix.orgris_hmmmmmmmmmmmm21:51:10
@r_i_s:matrix.orgris_well.. open to opinions. i should at least update the documentation to correspond to reality21:51:54
@emilazy:matrix.orgemilyI like hardening, but I'm also okay with us matching the platform default here22:20:08
@emilazy:matrix.orgemilynot sure if nobody noticing means that the impact is minimal or that nobody is monitoring Nixpkgs package perf 🫣22:20:30
@r_i_s:matrix.orgris_i fear the latter22:33:54
@xokdvium:matrix.orgSergei Zimmerman (xokdvium)
In reply to @emilazy:matrix.org
not sure if nobody noticing means that the impact is minimal or that nobody is monitoring Nixpkgs package perf 🫣
I sure am monitoring nix perf :) glibcxx assertions absolutely tank inlining in the parser
23:54:31
@emilazy:matrix.orgemilyI don't think that cleanly maps to libc++ hardening though23:55:00
@emilazy:matrix.orgemily(and probably ~nobody is using Nix with libc++ on Linux)23:55:14

Show newer messages


Back to Room ListRoom Version: 9