-
-
Notifications
You must be signed in to change notification settings - Fork 15.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
firefox: 67.0.1 -> 67.0.2 #63016
firefox: 67.0.1 -> 67.0.2 #63016
Conversation
I suppose noone has an idea why I'm repeatedly getting |
@vcunat Is that on Hydra? Might be related to NixOS/nix#2878. |
No, it's just |
It is an upstream issue: https://bugzilla.mozilla.org/show_bug.cgi?id=1500436 Try building with at most 10 cores. Sometimes I have to go as low as 4. It really seems like a timing issues with some concurrent jobs. The workaround mentioned in the bugzilla report (adding |
I have a wild suspicion that when many processes write into a shared stream (stdout+stderr), they might sometimes get an EAGAIN or something... but generally this is so rare that much SW can't handle the error. |
I had similar thought just never tried to debug it.. On hydra it seems to work just fine (most of the time) since the hosts either are busy enough or are not running a high amount of parallel builds. I am wondering if we can just increase some amount of buffer space on the sockets (from within GNU make)? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Both seem to work fine on a quick test. The NEWS sound safe, and minor FF updates tend to be rather problem-free. Surprisingly I can't see any security fixes in there.
They are lacking behind these days. Sometimes it takes them hours/days to publish them and then a bit more time to crosslink: https://www.mozilla.org/en-US/security/advisories/mfsa2019-16/ |
I don't know... also I wonder why we haven't experienced this with other packages so far, right? For example, I was building the kernel on this 32-threaded machine (that was otherwise idle). |
(cherry picked from commit 3e54aaa) There are also some less sever security fixes: https://www.mozilla.org/en-US/security/advisories/mfsa2019-16/
Upstream ticket has figured it out. One way that works for me is df6a6cc but there are various other approaches. It's just temporary anyway and should disappear after next nodejs release. WDYT? |
For reference, this should now be OK on both branches: df1d27a, fe797e0. |
Motivation for this change
I believe this is updated by someone else regularly,
but noticed and was curious so submitting in case
it's useful. Simple the result of running the updateScript's
for these :).
https://www.mozilla.org/en-US/firefox/67.0.2/releasenotes/
Things done
sandbox
innix.conf
on non-NixOS)nix-shell -p nix-review --run "nix-review wip"
./result/bin/
)nix path-info -S
before and after)