!UNVBThoJtlIiVwiDjU:nixos.org

Staging

317 Members
Staging merges | Find currently open staging-next PRs: https://github.com/NixOS/nixpkgs/pulls?q=is%3Apr+sort%3Aupdated-desc+head%3Astaging-next+head%3Astaging-next-21.05+is%3Aopen109 Servers

Load older messages


SenderMessageTime
7 Oct 2025
@grimmauld:grapevine.grimmauld.deGrimmauld (any/all)
diff --git a/pkgs/by-name/au/audit/package.nix b/pkgs/by-name/au/audit/package.nix
index 215cda4ba459..f4dbb79518be 100644
--- a/pkgs/by-name/au/audit/package.nix
+++ b/pkgs/by-name/au/audit/package.nix
@@ -75,6 +75,9 @@ stdenv.mkDerivation (finalAttrs: {
     libcap_ng
   ];
 
+  # audit is built with asan, and asan breaks with pie on some kernels
+  env.NIX_CFLAGS_COMPILE = "-no-pie";
+
   configureFlags = [
     # z/OS plugin is not useful on Linux, and pulls in an extra openldap
     # dependency otherwise

try this one then, i guess

16:48:13
@dramforever:matrix.orgdramforeverwell i guess you've thought about pkgsStatic and pkgsMusl so it's probably okay16:48:32
@dramforever:matrix.orgdramforeveri just thought it was dysfunctional before as well16:48:40
@dramforever:matrix.orgdramforeverwhich doesn't make sense16:48:50
@grimmauld:grapevine.grimmauld.deGrimmauld (any/all)but tbh i am at the end of my knowledge, i can't repro and i am lost with pie/asan, so this is just throwing shit at the wall and seeing what sticks16:49:01
@lt1379:matrix.orgLunthe dysfunction was in hardeningflags infra rather than just turning it on by default using the toolchain flags everyone else has been using for a decade16:49:04
@lt1379:matrix.orgLunis this some cursed issue where the hardened kernel widens the number of bits used for layout randomization and ASAN assumes it can store info in them?16:49:31
@reckenrode:matrix.orgRandy EckenrodeAre they releasing a new SDK?16:55:15
@willi:butz.cloudWilli Butz (just to confirm, the tests do indeed no longer pass after switching the local machine to 6_12_hardened) 16:56:56
@grimmauld:grapevine.grimmauld.deGrimmauld (any/all)oh thats amazing info!!16:57:16
@lt1379:matrix.orgLun What's in /proc/sys/vm/mmap_rnd_bits after that swap? 16:57:30
@k900:0upti.meK900 They literally did 16:57:41
@k900:0upti.meK900A few hours ago16:57:49
@k900:0upti.meK9001.4.32816:57:59
@k900:0upti.meK900No KosmicKrisp AFAICT16:58:06
@willi:butz.cloudWilli Butz3216:58:15
@lt1379:matrix.orgLunalright probably that's the issue :/16:58:30
@reckenrode:matrix.orgRandy EckenrodeIt was mentioned on the MoltenVK issue tracker that it’s coming in December.16:58:43
@willi:butz.cloudWilli Butz28 on the other local machine without _hardened16:59:00
@lt1379:matrix.orgLunIs this broken at runtime too? If it's just check fails during build we could skip then when mmap_rnd_bits > 2816:59:04
@grimmauld:grapevine.grimmauld.deGrimmauld (any/all)i am surprised audit is the first thing to run into that16:59:12
@k900:0upti.meK900 Oof please don't 16:59:24
@grimmauld:grapevine.grimmauld.deGrimmauld (any/all)i believe all of audit is currently built with asan16:59:33
@grimmauld:grapevine.grimmauld.deGrimmauld (any/all)which would make this fail runtime too16:59:45
@reckenrode:matrix.orgRandy EckenrodeThe MR for KosmicKrisp is out there. Someone on r/macgaming tested it. It’s unsurprisingly slower and missing some extensions.16:59:50
@reckenrode:matrix.orgRandy Eckenrode(Optional ones, presumably.)16:59:59
@lt1379:matrix.orgLunReportedly llvm 20+'s ASAN should work with mmap_rnd_bits 32 though, what asan is audit getting?17:00:13
@reckenrode:matrix.orgRandy EckenrodeIIRC that’s how Honeykrisp landed.17:00:27
@k900:0upti.meK900 Well yes 17:00:39
@k900:0upti.meK900But it's not like17:00:42

Show newer messages


Back to Room ListRoom Version: 6