summary refs log tree commit diff
path: root/nixos
diff options
context:
space:
mode:
authorLuke Granger-Brown <git@lukegb.com>2021-07-25 10:33:39 +0100
committerGitHub <noreply@github.com>2021-07-25 10:33:39 +0100
commita0b7bd69ac1ff18f6cfc501700b4607b8a47bed9 (patch)
treec3a7f09b7bee7ac3afda8f8886216b4a622d0711 /nixos
parent6d7243a8b971e54b78cc54d4695d77d5271a941a (diff)
parentaf871f619ca3ae8c162436e723241e995b088dd6 (diff)
downloadnixpkgs-a0b7bd69ac1ff18f6cfc501700b4607b8a47bed9.tar
nixpkgs-a0b7bd69ac1ff18f6cfc501700b4607b8a47bed9.tar.gz
nixpkgs-a0b7bd69ac1ff18f6cfc501700b4607b8a47bed9.tar.bz2
nixpkgs-a0b7bd69ac1ff18f6cfc501700b4607b8a47bed9.tar.lz
nixpkgs-a0b7bd69ac1ff18f6cfc501700b4607b8a47bed9.tar.xz
nixpkgs-a0b7bd69ac1ff18f6cfc501700b4607b8a47bed9.tar.zst
nixpkgs-a0b7bd69ac1ff18f6cfc501700b4607b8a47bed9.zip
Merge pull request #124431 from hyperfekt/systemd-pstore
nixos/filesystems: mount-pstore.service improvements
Diffstat (limited to 'nixos')
-rw-r--r--nixos/modules/tasks/filesystems.nix25
1 files changed, 15 insertions, 10 deletions
diff --git a/nixos/modules/tasks/filesystems.nix b/nixos/modules/tasks/filesystems.nix
index 2f17608560f..d9f7ce5d2c3 100644
--- a/nixos/modules/tasks/filesystems.nix
+++ b/nixos/modules/tasks/filesystems.nix
@@ -324,28 +324,33 @@ in
       in listToAttrs (map formatDevice (filter (fs: fs.autoFormat) fileSystems)) // {
     # Mount /sys/fs/pstore for evacuating panic logs and crashdumps from persistent storage onto the disk using systemd-pstore.
     # This cannot be done with the other special filesystems because the pstore module (which creates the mount point) is not loaded then.
-    # Since the pstore filesystem is usually empty right after mounting because the backend isn't registered yet, and a path unit cannot detect files inside of it, the same service waits for that to happen. systemd's restart mechanism can't be used here because the first failure also fails all dependent units.
         "mount-pstore" = {
           serviceConfig = {
             Type = "oneshot";
-            ExecStart = "${pkgs.util-linux}/bin/mount -t pstore -o nosuid,noexec,nodev pstore /sys/fs/pstore";
-            ExecStartPost = pkgs.writeShellScript "wait-for-pstore.sh" ''
+            # skip on kernels without the pstore module
+            ExecCondition = "${pkgs.kmod}/bin/modprobe -b pstore";
+            ExecStart = pkgs.writeShellScript "mount-pstore.sh" ''
               set -eu
-              TRIES=0
-              while [ $TRIES -lt 20 ] && [ "$(cat /sys/module/pstore/parameters/backend)" = "(null)" ]; do
-                sleep 0.1
-                TRIES=$((TRIES+1))
+              # if the pstore module is builtin it will have mounted the persistent store automatically. it may also be already mounted for other reasons.
+              ${pkgs.util-linux}/bin/mountpoint -q /sys/fs/pstore || ${pkgs.util-linux}/bin/mount -t pstore -o nosuid,noexec,nodev pstore /sys/fs/pstore
+              # wait up to five seconds (arbitrary, happened within one in testing) for the backend to be registered and the files to appear. a systemd path unit cannot detect this happening; and succeeding after a restart would not start dependent units.
+              TRIES=50
+              while [ "$(cat /sys/module/pstore/parameters/backend)" = "(null)" ]; do
+                if (( $TRIES )); then
+                  sleep 0.1
+                  TRIES=$((TRIES-1))
+                else
+                  echo "Persistent Storage backend was not registered in time." >&2
+                  exit 1
+                fi
               done
             '';
             RemainAfterExit = true;
           };
           unitConfig = {
-            ConditionPathIsMountPoint = "!/sys/fs/pstore";
             ConditionVirtualization = "!container";
             DefaultDependencies = false; # needed to prevent a cycle
           };
-          after = [ "modprobe@pstore.service" ];
-          requires = [ "modprobe@pstore.service" ];
           before = [ "systemd-pstore.service" ];
           wantedBy = [ "systemd-pstore.service" ];
         };