Skip to content

[Backport release-25.05] nano: 8.4 -> 8.6; unbreak on darwin#438701

Merged
fabianhjr merged 3 commits intoNixOS:release-25.05from
mdaniels5757:backport-435653-to-release-25.05
Sep 15, 2025
Merged

[Backport release-25.05] nano: 8.4 -> 8.6; unbreak on darwin#438701
fabianhjr merged 3 commits intoNixOS:release-25.05from
mdaniels5757:backport-435653-to-release-25.05

Conversation

@mdaniels5757
Copy link
Member

@mdaniels5757 mdaniels5757 commented Aug 30, 2025

Manual backport of #416220, #417500, #435653 to release-25.05.

  • Before merging, ensure that this backport is acceptable for the release.
    • Even as a non-committer, if you find that it is not acceptable, leave a comment.

trofi and others added 3 commits August 30, 2025 14:51
Fixes an issue with `format string is not a string literal` breaking nano on Darwin.
https://hydra.nixos.org/build/300187289/nixlog/1

(cherry picked from commit acfc0b3)
@ofborg ofborg bot added the 6.topic: darwin Running or building packages on Darwin label Aug 30, 2025
@nixpkgs-ci nixpkgs-ci bot added 10.rebuild-linux: 101-500 This PR causes between 101 and 500 packages to rebuild on Linux. 10.rebuild-darwin: 11-100 This PR causes between 11 and 100 packages to rebuild on Darwin. 4.workflow: backport This targets a stable branch labels Aug 30, 2025
@nixpkgs-ci nixpkgs-ci bot added the 12.approvals: 1 This PR was reviewed and approved by one person. label Aug 30, 2025
@mdaniels5757
Copy link
Member Author

nixpkgs-review result for #438701

Generated using nixpkgs-review-gha

Command: nixpkgs-review pr 438701
Commit: 16e96ec29c43be8d45e066641c5210e9f4eb89f7 (subsequent changes)
Merge: 076853e77c0942fb92a1b17aa0164025f0afe763

Logs: https://github.com/mdaniels5757/nixpkgs-review-gha/actions/runs/17347402124


x86_64-linux

⏩ 1 package blacklisted:
  • tests.nixos-functions.nixos-test
❌ 27 packages failed to build:
  • tests.hardeningFlags-clang.bindNowExplicitEnabled
  • tests.hardeningFlags-clang.fortify1ExplicitDisabledCmdlineEnabled
  • tests.hardeningFlags-clang.fortify1ExplicitEnabledCmdlineDisabled
  • tests.hardeningFlags-clang.fortify3EnabledEnvEnablesFortify1
  • tests.hardeningFlags-clang.fortify3ExplicitDisabledDoesntDisableFortify
  • tests.hardeningFlags-clang.fortify3StdenvUnsuppDoesntUnsuppFortify1
  • tests.hardeningFlags-clang.fortifyExplicitEnabled
  • tests.hardeningFlags-clang.pieExplicitEnabled
  • tests.hardeningFlags-clang.pieExplicitEnabledStructuredAttrs
  • tests.hardeningFlags-clang.relROExplicitEnabled
  • tests.hardeningFlags-clang.stackProtectorExplicitEnabled
  • tests.hardeningFlags-clang.stackProtectorReenabledEnv
  • tests.hardeningFlags-clang.stackProtectorReenabledFromAllEnv
  • tests.hardeningFlags.bindNowExplicitEnabled (tests.hardeningFlags-gcc.bindNowExplicitEnabled)
  • tests.hardeningFlags.fortify1ExplicitDisabledCmdlineEnabled (tests.hardeningFlags-gcc.fortify1ExplicitDisabledCmdlineEnabled)
  • tests.hardeningFlags.fortify1ExplicitEnabledCmdlineDisabled (tests.hardeningFlags-gcc.fortify1ExplicitEnabledCmdlineDisabled)
  • tests.hardeningFlags.fortify3EnabledEnvEnablesFortify1 (tests.hardeningFlags-gcc.fortify3EnabledEnvEnablesFortify1)
  • tests.hardeningFlags.fortify3ExplicitDisabledDoesntDisableFortify (tests.hardeningFlags-gcc.fortify3ExplicitDisabledDoesntDisableFortify)
  • tests.hardeningFlags.fortify3ExplicitEnabled (tests.hardeningFlags-gcc.fortify3ExplicitEnabled)
  • tests.hardeningFlags.fortify3StdenvUnsuppDoesntUnsuppFortify1 (tests.hardeningFlags-gcc.fortify3StdenvUnsuppDoesntUnsuppFortify1)
  • tests.hardeningFlags.fortifyExplicitEnabled (tests.hardeningFlags-gcc.fortifyExplicitEnabled)
  • tests.hardeningFlags.pieExplicitEnabled (tests.hardeningFlags-gcc.pieExplicitEnabled)
  • tests.hardeningFlags.pieExplicitEnabledStructuredAttrs (tests.hardeningFlags-gcc.pieExplicitEnabledStructuredAttrs)
  • tests.hardeningFlags.relROExplicitEnabled (tests.hardeningFlags-gcc.relROExplicitEnabled)
  • tests.hardeningFlags.stackProtectorExplicitEnabled (tests.hardeningFlags-gcc.stackProtectorExplicitEnabled)
  • tests.hardeningFlags.stackProtectorReenabledEnv (tests.hardeningFlags-gcc.stackProtectorReenabledEnv)
  • tests.hardeningFlags.stackProtectorReenabledFromAllEnv (tests.hardeningFlags-gcc.stackProtectorReenabledFromAllEnv)
✅ 65 packages built:
  • cabal2nix
  • crip
  • cvs
  • cvs-fast-export
  • cvs2svn
  • cvs2svn.dist
  • cvsps
  • cvsq
  • debian-devscripts
  • haskellPackages.cabal2nix-unstable
  • ikiwiki-full
  • luarocks-packages-updater
  • luarocks-packages-updater.dist
  • nano
  • nano.info
  • nix-prefetch-cvs
  • nix-prefetch-scripts
  • nix-update-source
  • nix-update-source.dist
  • tests.devShellTools.nixos
  • tests.hardeningFlags-clang.allExplicitDisabledBindNow
  • tests.hardeningFlags-clang.allExplicitDisabledFortify
  • tests.hardeningFlags-clang.allExplicitDisabledPie
  • tests.hardeningFlags-clang.allExplicitDisabledStackClashProtection
  • tests.hardeningFlags-clang.allExplicitDisabledStackProtector
  • tests.hardeningFlags-clang.bindNowExplicitDisabled
  • tests.hardeningFlags-clang.fortify3ExplicitDisabled
  • tests.hardeningFlags-clang.fortify3StdenvUnsupp
  • tests.hardeningFlags-clang.fortifyEnabledEnvDoesntEnableFortify3
  • tests.hardeningFlags-clang.fortifyExplicitDisabled
  • tests.hardeningFlags-clang.fortifyExplicitDisabledDisablesFortify3
  • tests.hardeningFlags-clang.fortifyStdenvUnsupp
  • tests.hardeningFlags-clang.fortifyStdenvUnsuppUnsupportsFortify3
  • tests.hardeningFlags-clang.pieExplicitDisabled
  • tests.hardeningFlags-clang.stackClashProtectionExplicitDisabled
  • tests.hardeningFlags-clang.stackClashProtectionStdenvUnsupp
  • tests.hardeningFlags-clang.stackProtectorExplicitDisabled
  • tests.hardeningFlags-clang.stackProtectorRedisabledEnv
  • tests.hardeningFlags-clang.stackProtectorStdenvUnsupp
  • tests.hardeningFlags-clang.stackProtectorUnsupportedEnabledEnv
  • tests.hardeningFlags.allExplicitDisabledBindNow (tests.hardeningFlags-gcc.allExplicitDisabledBindNow)
  • tests.hardeningFlags.allExplicitDisabledFortify (tests.hardeningFlags-gcc.allExplicitDisabledFortify)
  • tests.hardeningFlags.allExplicitDisabledPie (tests.hardeningFlags-gcc.allExplicitDisabledPie)
  • tests.hardeningFlags.allExplicitDisabledStackClashProtection (tests.hardeningFlags-gcc.allExplicitDisabledStackClashProtection)
  • tests.hardeningFlags.allExplicitDisabledStackProtector (tests.hardeningFlags-gcc.allExplicitDisabledStackProtector)
  • tests.hardeningFlags.bindNowExplicitDisabled (tests.hardeningFlags-gcc.bindNowExplicitDisabled)
  • tests.hardeningFlags.fortify3ExplicitDisabled (tests.hardeningFlags-gcc.fortify3ExplicitDisabled)
  • tests.hardeningFlags.fortify3StdenvUnsupp (tests.hardeningFlags-gcc.fortify3StdenvUnsupp)
  • tests.hardeningFlags.fortifyEnabledEnvDoesntEnableFortify3 (tests.hardeningFlags-gcc.fortifyEnabledEnvDoesntEnableFortify3)
  • tests.hardeningFlags.fortifyExplicitDisabled (tests.hardeningFlags-gcc.fortifyExplicitDisabled)
  • tests.hardeningFlags.fortifyExplicitDisabledDisablesFortify3 (tests.hardeningFlags-gcc.fortifyExplicitDisabledDisablesFortify3)
  • tests.hardeningFlags.fortifyStdenvUnsupp (tests.hardeningFlags-gcc.fortifyStdenvUnsupp)
  • tests.hardeningFlags.fortifyStdenvUnsuppUnsupportsFortify3 (tests.hardeningFlags-gcc.fortifyStdenvUnsuppUnsupportsFortify3)
  • tests.hardeningFlags.pieExplicitDisabled (tests.hardeningFlags-gcc.pieExplicitDisabled)
  • tests.hardeningFlags.stackClashProtectionExplicitDisabled (tests.hardeningFlags-gcc.stackClashProtectionExplicitDisabled)
  • tests.hardeningFlags.stackClashProtectionExplicitEnabled (tests.hardeningFlags-gcc.stackClashProtectionExplicitEnabled)
  • tests.hardeningFlags.stackClashProtectionStdenvUnsupp (tests.hardeningFlags-gcc.stackClashProtectionStdenvUnsupp)
  • tests.hardeningFlags.stackProtectorExplicitDisabled (tests.hardeningFlags-gcc.stackProtectorExplicitDisabled)
  • tests.hardeningFlags.stackProtectorRedisabledEnv (tests.hardeningFlags-gcc.stackProtectorRedisabledEnv)
  • tests.hardeningFlags.stackProtectorStdenvUnsupp (tests.hardeningFlags-gcc.stackProtectorStdenvUnsupp)
  • tests.hardeningFlags.stackProtectorUnsupportedEnabledEnv (tests.hardeningFlags-gcc.stackProtectorUnsupportedEnabledEnv)
  • tests.testers.lycheeLinkCheck.network
  • tests.testers.nixosTest-example
  • tests.testers.runNixOSTest-example
  • tests.trivial-builders.references

Error logs: `x86_64-linux`
tests.hardeningFlags-clang.bindNowExplicitEnabled
/nix/store/w6c77ii5z31g50brdljwnqfrvlv0cbdb-test-bin/bin/test-bin:
 Position Independent Executable: yes
 Stack protected: yes
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags-clang.fortify1ExplicitDisabledCmdlineEnabled
/nix/store/29by8xajzihsys3y5dynzadjxxdk3rh0-test-bin/bin/test-bin:
 Position Independent Executable: yes
 Stack protected: no, not found! (ignored)
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags-clang.fortify1ExplicitEnabledCmdlineDisabled
/nix/store/g6mxw2n7gd00kjdrz6f2bix3qxli9zhw-test-bin/bin/test-bin:
 Position Independent Executable: yes
 Stack protected: no, not found! (ignored)
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags-clang.fortify3EnabledEnvEnablesFortify1
/nix/store/gm877xsxfz4w0vvwbnb54rfjhcbjkin3-test-bin/bin/test-bin:
 Position Independent Executable: yes
 Stack protected: no, not found! (ignored)
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: no, not found! (ignored)
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags-clang.fortify3ExplicitDisabledDoesntDisableFortify
/nix/store/qlf2jjfly2b3h7cysxbw3abgsv6ip9pf-test-bin/bin/test-bin:
 Position Independent Executable: yes
 Stack protected: yes
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags-clang.fortify3StdenvUnsuppDoesntUnsuppFortify1
/nix/store/ibagxmpl9zf74x7gr5m2ks6jnscs7fap-test-bin/bin/test-bin:
 Position Independent Executable: yes
 Stack protected: no, not found! (ignored)
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags-clang.fortifyExplicitEnabled
/nix/store/72cwrfhgmwd8ggkhj3h8im2hiyz52mpi-test-bin/bin/test-bin:
 Position Independent Executable: yes
 Stack protected: yes
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags-clang.pieExplicitEnabled
/nix/store/8j2zdvlj4y1z71qc9xf7ajwiqxyk06sa-test-bin/bin/test-bin:
 Position Independent Executable: yes
 Stack protected: yes
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags-clang.pieExplicitEnabledStructuredAttrs
/nix/store/w96361pgpv182pln4x131kldwcpnbr0f-test-bin/bin/test-bin:
 Position Independent Executable: yes
 Stack protected: yes
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags-clang.relROExplicitEnabled
/nix/store/3fsgj1a455cjfyzysk7xlapkfkcxvq25-test-bin/bin/test-bin:
 Position Independent Executable: yes
 Stack protected: yes
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags-clang.stackProtectorExplicitEnabled
/nix/store/k8ibcd1af3685b6n5jx9s1jxz6df8sbp-test-bin/bin/test-bin:
 Position Independent Executable: yes
 Stack protected: yes
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags-clang.stackProtectorReenabledEnv
/nix/store/bf7rrrabr66r8h1rsf8zd16ma6y6qf2k-test-bin/bin/test-bin:
 Position Independent Executable: yes
 Stack protected: yes
 Fortify Source functions: no, only unprotected functions found! (ignored)
 Read-only relocations: yes
 Immediate binding: no, not found! (ignored)
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags-clang.stackProtectorReenabledFromAllEnv
/nix/store/macdvq54lwg1j1f4lc4dwijzrcm9k3dy-test-bin/bin/test-bin:
 Position Independent Executable: yes
 Stack protected: yes
 Fortify Source functions: no, only unprotected functions found! (ignored)
 Read-only relocations: yes
 Immediate binding: no, not found! (ignored)
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags.bindNowExplicitEnabled
/nix/store/6xvxyaw1da4a2gjdnifw5ksalrl14zjw-test-bin/bin/test-bin:
 Position Independent Executable: no, normal executable! (ignored)
 Stack protected: yes
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags.fortify1ExplicitDisabledCmdlineEnabled
/nix/store/5467k18ql0bk2bjg392zgrblavabfaf1-test-bin/bin/test-bin:
 Position Independent Executable: no, normal executable! (ignored)
 Stack protected: no, not found! (ignored)
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags.fortify1ExplicitEnabledCmdlineDisabled
/nix/store/kj8ndyqk3871mg92inw5bxdshmdr9rdp-test-bin/bin/test-bin:
 Position Independent Executable: no, normal executable! (ignored)
 Stack protected: no, not found! (ignored)
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags.fortify3EnabledEnvEnablesFortify1
/nix/store/3lninhd3ms63injm739fjxisfwak8ph2-test-bin/bin/test-bin:
 Position Independent Executable: no, normal executable! (ignored)
 Stack protected: no, not found! (ignored)
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: no, not found! (ignored)
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags.fortify3ExplicitDisabledDoesntDisableFortify
/nix/store/c6gl7b33jn1dypl85jhywmfj8lv8jhss-test-bin/bin/test-bin:
 Position Independent Executable: no, normal executable! (ignored)
 Stack protected: yes
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags.fortify3ExplicitEnabled
/nix/store/r8k8dnhbs3qx5g3qryc4r97s62vbmy20-test-bin/bin/test-bin:
 Position Independent Executable: no, normal executable! (ignored)
 Stack protected: no, not found! (ignored)
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags.fortify3StdenvUnsuppDoesntUnsuppFortify1
/nix/store/rdc5jbv24a8zym5nzifvhj2mrhh02jif-test-bin/bin/test-bin:
 Position Independent Executable: no, normal executable! (ignored)
 Stack protected: no, not found! (ignored)
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags.fortifyExplicitEnabled
/nix/store/b0d7l4xkp1276za48hlrvcdba34k9xgh-test-bin/bin/test-bin:
 Position Independent Executable: no, normal executable! (ignored)
 Stack protected: yes
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags.pieExplicitEnabled
/nix/store/dnqs9jzrc6dyj508rf0hzyzs4xll90gn-test-bin/bin/test-bin:
 Position Independent Executable: yes
 Stack protected: yes
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags.pieExplicitEnabledStructuredAttrs
/nix/store/6x8yhncipxa5f4skzdjlzfrq6v56j1gj-test-bin/bin/test-bin:
 Position Independent Executable: yes
 Stack protected: yes
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags.relROExplicitEnabled
/nix/store/p6xmhi46g6v05d37z5j7d0b671yfmzj4-test-bin/bin/test-bin:
 Position Independent Executable: no, normal executable! (ignored)
 Stack protected: yes
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags.stackProtectorExplicitEnabled
/nix/store/ijvn8h47nz6cnnc37x7d62gq30rcaiz4-test-bin/bin/test-bin:
 Position Independent Executable: no, normal executable! (ignored)
 Stack protected: yes
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags.stackProtectorReenabledEnv
/nix/store/l93780n5nbzj0ga65xzq57lay69zwzy3-test-bin/bin/test-bin:
 Position Independent Executable: no, normal executable! (ignored)
 Stack protected: yes
 Fortify Source functions: no, only unprotected functions found! (ignored)
 Read-only relocations: yes
 Immediate binding: no, not found! (ignored)
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags.stackProtectorReenabledFromAllEnv
/nix/store/sabqv127x81l9j1929ml4j90n437nmx9-test-bin/bin/test-bin:
 Position Independent Executable: no, normal executable! (ignored)
 Stack protected: yes
 Fortify Source functions: no, only unprotected functions found! (ignored)
 Read-only relocations: yes
 Immediate binding: no, not found! (ignored)
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!

aarch64-linux

⏩ 1 package blacklisted:
  • tests.nixos-functions.nixos-test
❌ 32 packages failed to build:
  • tests.devShellTools.nixos
  • tests.hardeningFlags-clang.bindNowExplicitEnabled
  • tests.hardeningFlags-clang.fortify1ExplicitDisabledCmdlineEnabled
  • tests.hardeningFlags-clang.fortify1ExplicitEnabledCmdlineDisabled
  • tests.hardeningFlags-clang.fortify3EnabledEnvEnablesFortify1
  • tests.hardeningFlags-clang.fortify3ExplicitDisabledDoesntDisableFortify
  • tests.hardeningFlags-clang.fortify3StdenvUnsuppDoesntUnsuppFortify1
  • tests.hardeningFlags-clang.fortifyExplicitEnabled
  • tests.hardeningFlags-clang.pieExplicitEnabled
  • tests.hardeningFlags-clang.pieExplicitEnabledStructuredAttrs
  • tests.hardeningFlags-clang.relROExplicitEnabled
  • tests.hardeningFlags-clang.stackProtectorExplicitEnabled
  • tests.hardeningFlags-clang.stackProtectorReenabledEnv
  • tests.hardeningFlags-clang.stackProtectorReenabledFromAllEnv
  • tests.hardeningFlags.bindNowExplicitEnabled (tests.hardeningFlags-gcc.bindNowExplicitEnabled)
  • tests.hardeningFlags.fortify1ExplicitDisabledCmdlineEnabled (tests.hardeningFlags-gcc.fortify1ExplicitDisabledCmdlineEnabled)
  • tests.hardeningFlags.fortify1ExplicitEnabledCmdlineDisabled (tests.hardeningFlags-gcc.fortify1ExplicitEnabledCmdlineDisabled)
  • tests.hardeningFlags.fortify3EnabledEnvEnablesFortify1 (tests.hardeningFlags-gcc.fortify3EnabledEnvEnablesFortify1)
  • tests.hardeningFlags.fortify3ExplicitDisabledDoesntDisableFortify (tests.hardeningFlags-gcc.fortify3ExplicitDisabledDoesntDisableFortify)
  • tests.hardeningFlags.fortify3ExplicitEnabled (tests.hardeningFlags-gcc.fortify3ExplicitEnabled)
  • tests.hardeningFlags.fortify3StdenvUnsuppDoesntUnsuppFortify1 (tests.hardeningFlags-gcc.fortify3StdenvUnsuppDoesntUnsuppFortify1)
  • tests.hardeningFlags.fortifyExplicitEnabled (tests.hardeningFlags-gcc.fortifyExplicitEnabled)
  • tests.hardeningFlags.pieExplicitEnabled (tests.hardeningFlags-gcc.pieExplicitEnabled)
  • tests.hardeningFlags.pieExplicitEnabledStructuredAttrs (tests.hardeningFlags-gcc.pieExplicitEnabledStructuredAttrs)
  • tests.hardeningFlags.relROExplicitEnabled (tests.hardeningFlags-gcc.relROExplicitEnabled)
  • tests.hardeningFlags.stackProtectorExplicitEnabled (tests.hardeningFlags-gcc.stackProtectorExplicitEnabled)
  • tests.hardeningFlags.stackProtectorReenabledEnv (tests.hardeningFlags-gcc.stackProtectorReenabledEnv)
  • tests.hardeningFlags.stackProtectorReenabledFromAllEnv (tests.hardeningFlags-gcc.stackProtectorReenabledFromAllEnv)
  • tests.testers.lycheeLinkCheck.network
  • tests.testers.nixosTest-example
  • tests.testers.runNixOSTest-example
  • tests.trivial-builders.references
✅ 53 packages built:
  • cabal2nix
  • crip
  • cvs
  • cvs-fast-export
  • cvs2svn
  • cvs2svn.dist
  • cvsps
  • cvsq
  • debian-devscripts
  • haskellPackages.cabal2nix-unstable
  • ikiwiki-full
  • luarocks-packages-updater
  • luarocks-packages-updater.dist
  • nano
  • nano.info
  • nix-prefetch-cvs
  • nix-prefetch-scripts
  • nix-update-source
  • nix-update-source.dist
  • tests.hardeningFlags-clang.allExplicitDisabledBindNow
  • tests.hardeningFlags-clang.allExplicitDisabledFortify
  • tests.hardeningFlags-clang.allExplicitDisabledPie
  • tests.hardeningFlags-clang.allExplicitDisabledStackProtector
  • tests.hardeningFlags-clang.bindNowExplicitDisabled
  • tests.hardeningFlags-clang.fortify3ExplicitDisabled
  • tests.hardeningFlags-clang.fortify3StdenvUnsupp
  • tests.hardeningFlags-clang.fortifyEnabledEnvDoesntEnableFortify3
  • tests.hardeningFlags-clang.fortifyExplicitDisabled
  • tests.hardeningFlags-clang.fortifyExplicitDisabledDisablesFortify3
  • tests.hardeningFlags-clang.fortifyStdenvUnsupp
  • tests.hardeningFlags-clang.fortifyStdenvUnsuppUnsupportsFortify3
  • tests.hardeningFlags-clang.pieExplicitDisabled
  • tests.hardeningFlags-clang.stackProtectorExplicitDisabled
  • tests.hardeningFlags-clang.stackProtectorRedisabledEnv
  • tests.hardeningFlags-clang.stackProtectorStdenvUnsupp
  • tests.hardeningFlags-clang.stackProtectorUnsupportedEnabledEnv
  • tests.hardeningFlags.allExplicitDisabledBindNow (tests.hardeningFlags-gcc.allExplicitDisabledBindNow)
  • tests.hardeningFlags.allExplicitDisabledFortify (tests.hardeningFlags-gcc.allExplicitDisabledFortify)
  • tests.hardeningFlags.allExplicitDisabledPie (tests.hardeningFlags-gcc.allExplicitDisabledPie)
  • tests.hardeningFlags.allExplicitDisabledStackProtector (tests.hardeningFlags-gcc.allExplicitDisabledStackProtector)
  • tests.hardeningFlags.bindNowExplicitDisabled (tests.hardeningFlags-gcc.bindNowExplicitDisabled)
  • tests.hardeningFlags.fortify3ExplicitDisabled (tests.hardeningFlags-gcc.fortify3ExplicitDisabled)
  • tests.hardeningFlags.fortify3StdenvUnsupp (tests.hardeningFlags-gcc.fortify3StdenvUnsupp)
  • tests.hardeningFlags.fortifyEnabledEnvDoesntEnableFortify3 (tests.hardeningFlags-gcc.fortifyEnabledEnvDoesntEnableFortify3)
  • tests.hardeningFlags.fortifyExplicitDisabled (tests.hardeningFlags-gcc.fortifyExplicitDisabled)
  • tests.hardeningFlags.fortifyExplicitDisabledDisablesFortify3 (tests.hardeningFlags-gcc.fortifyExplicitDisabledDisablesFortify3)
  • tests.hardeningFlags.fortifyStdenvUnsupp (tests.hardeningFlags-gcc.fortifyStdenvUnsupp)
  • tests.hardeningFlags.fortifyStdenvUnsuppUnsupportsFortify3 (tests.hardeningFlags-gcc.fortifyStdenvUnsuppUnsupportsFortify3)
  • tests.hardeningFlags.pieExplicitDisabled (tests.hardeningFlags-gcc.pieExplicitDisabled)
  • tests.hardeningFlags.stackProtectorExplicitDisabled (tests.hardeningFlags-gcc.stackProtectorExplicitDisabled)
  • tests.hardeningFlags.stackProtectorRedisabledEnv (tests.hardeningFlags-gcc.stackProtectorRedisabledEnv)
  • tests.hardeningFlags.stackProtectorStdenvUnsupp (tests.hardeningFlags-gcc.stackProtectorStdenvUnsupp)
  • tests.hardeningFlags.stackProtectorUnsupportedEnabledEnv (tests.hardeningFlags-gcc.stackProtectorUnsupportedEnabledEnv)

Error logs: `aarch64-linux`
tests.hardeningFlags-clang.bindNowExplicitEnabled
/nix/store/zlfqnkkx445kz77viwh9lvc9djr17y68-test-bin/bin/test-bin:
 Position Independent Executable: yes
 Stack protected: yes
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags-clang.fortify1ExplicitDisabledCmdlineEnabled
/nix/store/6xg56a8wfc03bykrx5id3xbrw8v2f09k-test-bin/bin/test-bin:
 Position Independent Executable: yes
 Stack protected: no, not found! (ignored)
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags-clang.fortify1ExplicitEnabledCmdlineDisabled
/nix/store/5dv8p3bnjssq6s47pvis6km574ffigsl-test-bin/bin/test-bin:
 Position Independent Executable: yes
 Stack protected: no, not found! (ignored)
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags-clang.fortify3EnabledEnvEnablesFortify1
/nix/store/rb0a7qr1rr2d5m5farnzihpa5h9kpj8a-test-bin/bin/test-bin:
 Position Independent Executable: yes
 Stack protected: no, not found! (ignored)
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: no, not found! (ignored)
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags-clang.fortify3ExplicitDisabledDoesntDisableFortify
/nix/store/3xxb35z48pgd2jfrqygbxw20v6i9vz9m-test-bin/bin/test-bin:
 Position Independent Executable: yes
 Stack protected: yes
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags-clang.fortify3StdenvUnsuppDoesntUnsuppFortify1
/nix/store/brz5m8xzkwimlv8j98fv5cdsd89jbmlj-test-bin/bin/test-bin:
 Position Independent Executable: yes
 Stack protected: no, not found! (ignored)
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags-clang.fortifyExplicitEnabled
/nix/store/rybdi04xnmqwffxlb2sgqidk3j59i8xl-test-bin/bin/test-bin:
 Position Independent Executable: yes
 Stack protected: yes
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags-clang.pieExplicitEnabled
/nix/store/367ir33qlrhplr0xr1ca37yj508lnxzl-test-bin/bin/test-bin:
 Position Independent Executable: yes
 Stack protected: yes
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags-clang.pieExplicitEnabledStructuredAttrs
/nix/store/iysj0my7fxhbcrkp3hgmpa7xzhsg4834-test-bin/bin/test-bin:
 Position Independent Executable: yes
 Stack protected: yes
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags-clang.relROExplicitEnabled
/nix/store/cfih4cl3l2ba7y4i4cnar0j0gizsiwax-test-bin/bin/test-bin:
 Position Independent Executable: yes
 Stack protected: yes
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags-clang.stackProtectorExplicitEnabled
/nix/store/8l3klx3cchm57c0hdc4hnydfgxgccgn0-test-bin/bin/test-bin:
 Position Independent Executable: yes
 Stack protected: yes
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags-clang.stackProtectorReenabledEnv
/nix/store/2zvgbrli1p9dpyxnvam24yk2nzr753s1-test-bin/bin/test-bin:
 Position Independent Executable: yes
 Stack protected: yes
 Fortify Source functions: no, only unprotected functions found! (ignored)
 Read-only relocations: yes
 Immediate binding: no, not found! (ignored)
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags-clang.stackProtectorReenabledFromAllEnv
/nix/store/cfaww2nls7bmpdpyvna7390x079p34h6-test-bin/bin/test-bin:
 Position Independent Executable: yes
 Stack protected: yes
 Fortify Source functions: no, only unprotected functions found! (ignored)
 Read-only relocations: yes
 Immediate binding: no, not found! (ignored)
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags.bindNowExplicitEnabled
/nix/store/i3yhpcn4zk8k65gkbzhzllh0ghhp7z3b-test-bin/bin/test-bin:
 Position Independent Executable: no, normal executable! (ignored)
 Stack protected: yes
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags.fortify1ExplicitDisabledCmdlineEnabled
/nix/store/4vpccbbqy9k44jl4prf8n5b4vnwnpb1j-test-bin/bin/test-bin:
 Position Independent Executable: no, normal executable! (ignored)
 Stack protected: no, not found! (ignored)
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags.fortify1ExplicitEnabledCmdlineDisabled
/nix/store/i4mbqm6hmhkc3j9kbk422wb7imlb4qic-test-bin/bin/test-bin:
 Position Independent Executable: no, normal executable! (ignored)
 Stack protected: no, not found! (ignored)
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags.fortify3EnabledEnvEnablesFortify1
/nix/store/m5fzwny8z9iyhzbrgmy0hjdiczh5k3m2-test-bin/bin/test-bin:
 Position Independent Executable: no, normal executable! (ignored)
 Stack protected: no, not found! (ignored)
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: no, not found! (ignored)
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags.fortify3ExplicitDisabledDoesntDisableFortify
/nix/store/350n2kbmsj3w2iqkmql4gadynw5ym517-test-bin/bin/test-bin:
 Position Independent Executable: no, normal executable! (ignored)
 Stack protected: yes
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags.fortify3ExplicitEnabled
/nix/store/wxvlygwpdv0qxw4bgq29d756dl73yp12-test-bin/bin/test-bin:
 Position Independent Executable: no, normal executable! (ignored)
 Stack protected: no, not found! (ignored)
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags.fortify3StdenvUnsuppDoesntUnsuppFortify1
/nix/store/l2qgsf4y2i4c7ap80jl05yvdxx8y740f-test-bin/bin/test-bin:
 Position Independent Executable: no, normal executable! (ignored)
 Stack protected: no, not found! (ignored)
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags.fortifyExplicitEnabled
/nix/store/cdr9qhqr6pvxz5hw0iimlqsq5awxs44a-test-bin/bin/test-bin:
 Position Independent Executable: no, normal executable! (ignored)
 Stack protected: yes
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags.pieExplicitEnabled
/nix/store/cpvhfc3im91ljyr1bnlkr3pvxg19yy87-test-bin/bin/test-bin:
 Position Independent Executable: yes
 Stack protected: yes
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags.pieExplicitEnabledStructuredAttrs
/nix/store/gapb65c8qa8ai4m8nq2i5l4kvhiv61kp-test-bin/bin/test-bin:
 Position Independent Executable: yes
 Stack protected: yes
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags.relROExplicitEnabled
/nix/store/0v8qx9gdr5w4y3nv4qi22dx91sy4dcia-test-bin/bin/test-bin:
 Position Independent Executable: no, normal executable! (ignored)
 Stack protected: yes
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags.stackProtectorExplicitEnabled
/nix/store/n8rxkfa6z3n4h88clncr9ljqrvm43idw-test-bin/bin/test-bin:
 Position Independent Executable: no, normal executable! (ignored)
 Stack protected: yes
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags.stackProtectorReenabledEnv
/nix/store/vcbwhzbdhww3rn79wg4gijyw60k6lzia-test-bin/bin/test-bin:
 Position Independent Executable: no, normal executable! (ignored)
 Stack protected: yes
 Fortify Source functions: no, only unprotected functions found! (ignored)
 Read-only relocations: yes
 Immediate binding: no, not found! (ignored)
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!
tests.hardeningFlags.stackProtectorReenabledFromAllEnv
/nix/store/5n2ysv63mfgw3bkpax4sdc19r0fyszbk-test-bin/bin/test-bin:
 Position Independent Executable: no, normal executable! (ignored)
 Stack protected: yes
 Fortify Source functions: no, only unprotected functions found! (ignored)
 Read-only relocations: yes
 Immediate binding: no, not found! (ignored)
 Stack clash protection: unknown, no -fstack-clash-protection instructions found
 Control flow integrity: no, not found! (ignored)
 Branch Protection: no, not found!

x86_64-darwin (sandbox = true)

❌ 1 package failed to build:
  • darwin.linux-builder (darwin.linux-builder-x86_64)
✅ 17 packages built:
  • cabal2nix
  • cvs
  • cvs-fast-export
  • cvs2svn
  • cvs2svn.dist
  • cvsps
  • cvsq
  • debian-devscripts
  • haskellPackages.cabal2nix-unstable
  • luarocks-packages-updater
  • luarocks-packages-updater.dist
  • nano
  • nano.info
  • nix-prefetch-cvs
  • nix-prefetch-scripts
  • nix-update-source
  • nix-update-source.dist

aarch64-darwin (sandbox = true)

❌ 2 packages failed to build:
  • darwin.linux-builder
  • darwin.linux-builder-x86_64
✅ 17 packages built:
  • cabal2nix
  • cvs
  • cvs-fast-export
  • cvs2svn
  • cvs2svn.dist
  • cvsps
  • cvsq
  • debian-devscripts
  • haskellPackages.cabal2nix-unstable
  • luarocks-packages-updater
  • luarocks-packages-updater.dist
  • nano
  • nano.info
  • nix-prefetch-cvs
  • nix-prefetch-scripts
  • nix-update-source
  • nix-update-source.dist

@mdaniels5757
Copy link
Member Author

The hardeningFlags failures look to be pre-existing (i.e. fail on Hydra), from the ones I spot-checked. But the failures of tests.devShellTools.nixos, tests.testers.lycheeLinkCheck.network, tests.testers.nixosTest-example, tests.testers.runNixOSTest-example, and tests.trivial-builders.references on aarch64-linux seem new (i.e. not currently on Hydra), as do the darwin linux-builder failures.

@fabianhjr fabianhjr merged commit 28634d0 into NixOS:release-25.05 Sep 15, 2025
38 of 39 checks passed
@mdaniels5757 mdaniels5757 deleted the backport-435653-to-release-25.05 branch September 15, 2025 01:24
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

4.workflow: backport This targets a stable branch 6.topic: darwin Running or building packages on Darwin 10.rebuild-darwin: 11-100 This PR causes between 11 and 100 packages to rebuild on Darwin. 10.rebuild-linux: 101-500 This PR causes between 101 and 500 packages to rebuild on Linux. 12.approvals: 1 This PR was reviewed and approved by one person.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants