Nix Hackers | 962 Members | |
| For people hacking on the Nix package manager itself | 204 Servers |
| Sender | Message | Time |
|---|---|---|
| 20 Aug 2021 | ||
| Yeah, its simple and flexible | 22:06:36 | |
| I was thinking more along the lines of in addition to what we currently have add few more derivation builders | 22:07:09 | |
| random comment; in the course of doing Summer of Nix, it has been extremely helpful to be able to help people with issues due to the effectiveness of "show me the flake.nix repo and we can reproduce the problem". Thanks niksnut ! | 22:46:36 | |
| 21 Aug 2021 | ||
| 22:21:27 | ||
| 22:21:41 | ||
| 22 Aug 2021 | ||
In a flake, nixConfig.bash-prompt works when entering a nix develop, but not for nix shell. Is this on purpose? I've noticed some issues where people end up in nested nix develop or nix shell which ends up causing confusion. Is this a bug? thoughts? | 05:57:38 | |
| I'm trying to figure out why/how bash-prompt affects nix develop, but not nix shell. I'm not finding the right way to access the right settings objects in run.cc I thought that I can add a bit around here: https://github.com/NixOS/nix/blob/master/src/nix/run.cc#L122 that would modify PS1 in the same way as: https://github.com/NixOS/nix/blob/master/src/nix/develop.cc#L467-L471 | 08:30:54 | |
| 16:16:29 | ||
| for ^^^^: https://github.com/NixOS/nix/pull/5162 | 20:16:13 | |
| 23 Aug 2021 | ||
| Redacted or Malformed Event | 19:56:49 | |
| 24 Aug 2021 | ||
Running nix-build as a regular user right now does eval + drives the build in a single process, correct? I was thinking of doing the eval in a forked child such that we can (safely?) discard all the memory from the eval that we don't have to hold on to anymore. Are there any obvious roadblocks that I'd run into? | 15:13:51 | |
AFAICT, yes; And it uses threads for parallelism. | 18:51:57 | |
andi-: FYI, I considered doing something similar to be able to fuzz the parsing / evaluation part of nix (because it's not reentrant - i.e. mutates a global state)I don't remember exactly why I abandoned this, but speed was definitely a problem (fork/exec is much slower - but it might not be problematic in your use case). | 18:55:03 | |
| (it kinda defeated the purposed of having an "in-memory" fuzzer) | 18:55:31 | |
| Yeah for fuzzing you probably want something much faster even thought you could fuzz multiple cases in one process (as long as you keep the history of invocations to minimize the case afterwards) | 18:56:05 | |
In reply to @andi:kack.itThe problem is that it raises a lot of false positives this way in practice; Every "next" run is corrupted by dangling global state left by the previous... | 19:02:40 | |
(I am really talking about nix specifically here) | 19:03:01 | |
| Yeah, I'd only run like 3-5 or so per fork. That is still a 5x speedup? | 21:08:42 | |
Another thing that we talked about earlier in #infrastructure:nixos.org : Could we tell the kernel / emulate the load in the sandbox so it only covers the load produced from the contained jobs? That topic came up as running many builds with a small number of cores might always be limited by load if the build system is load aware (e.g. ninja & gnumake with -l). lxc apparently does something like that. The open question was if the kernel is able to do that or else if we could/should do that in userspace (in the nix-daemon). | 22:11:22 | |
| 25 Aug 2021 | ||
| I'm actually not sure it's a good idea. If the CPU is shared, strictly partitioning it doesn't sound like a good approach for overall efficiency... though it depends how exactly we'd use it. | 18:55:00 | |
| 21:42:44 | ||
| 22:19:15 | ||
| 26 Aug 2021 | ||
| 07:41:05 | ||
| Does anyone know why Recursive Nix is experimental? | 08:58:54 | |
| prob due to RFC 92 | 17:06:45 | |
| it implements similar feature but it all is approached differently | 17:07:04 | |
| (i could be wrong here) I think there is an issue about being in a build, and then starting another one which blocks the original build until the internal one completes. | 17:07:56 | |
| If you have overuse of recursive nix, this means you will have long chains of blocked builds. This is compared to the normal situation where a dependency can complete, tear down the sandbox, store results into cache, etc, and then start the next build whenever you want. | 17:09:29 | |
| My mental model for this is similar to "tail-recursion optimization". That if you know that the recursion is a tail call, you can do avoid blowing up the stack by turning a function call into a jump. Recursive-nix allows for arbitrary recursion, RFC92 tries to enforce the "tail-call" style. | 17:11:56 | |
| * My mental model for this is similar to "tail call optimization". That if you know that the recursion is a tail call, you can do avoid blowing up the stack by turning a function call into a jump. Recursive-nix allows for arbitrary recursion, RFC92 tries to enforce the "tail-call" style. | 17:12:23 | |