summary refs log tree commit diff
path: root/nixos/modules/system/boot
Commit message (Collapse)AuthorAge
...
* | | nixos/logind: Add option for HandleLidSwitchExternalPowerMateusz Gołębiewski2019-02-16
| | | | | | | | | | | | | | | The default according to `man logind.conf` is to perform the same action as in HandleLidSwitch.
* | | nixos/systemd: update max line length in systemd unitsSharif Olorin2019-02-10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The length check was introduced[0] to match systemd's max line length. This limit has been increased[1][2] to 1MiB, starting with systemd v235. [0] https://github.com/nixos/nixpkgs/issues/3403 [1] https://github.com/systemd/systemd/commit/e6dde451a51dc5aaa7f4d98d39b8fe735f73d2af (relevant systemd commit) [2] https://github.com/systemd/systemd/issues/3302 (more context on systemd change)
* | | boot/raspberrypi: replace deprecated configuration optionJeff Slight2019-02-08
| | |
* | | types.optionSet: deprecate and remove last usagesdanbst2019-01-31
| | |
* | | Merge pull request #42838 from teto/kernel_autoconfSilvan Mosberger2019-01-28
|\ \ \ | | | | | | | | [RFC] add ability to merge structured configs
| * | | linux: ability to merge structured configsMatthieu Coudron2019-01-28
| |/ / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This should make the composability of kernel configurations more straigthforward. - now distinguish freeform options from tristate ones - will look for a structured config in kernelPatches too one can now access the structuredConfig from a kernel via linux_test.configfile.structuredConfig in order to reinject it into another kernel, no need to rewrite the config from scratch The following merge strategies are used in case of conflict: -- freeform items must be equal or they conflict (mergeEqualOption) -- for tristate (y/m/n) entries, I use the mergeAnswer strategy which takes the best available value, "best" being defined by the user (by default "y" > "m" > "n", e.g. if one entry is both marked "y" and "n", "y" wins) -- if one item is both marked optional/mandatory, mandatory wins (mergeFalseByDefault)
* / / nixos/systemd: add StartLimitIntervalSec to unit configCraig Younkins2019-01-28
|/ /
* | Merge pull request #42183 from kisik21/masterJörg Thalheim2019-01-17
|\ \ | | | | | | nixos/stage-1, nixos/f2fs: added F2FS resizing
| * | nixos/stage-1, nixos/f2fs: moved f2fs resizing tools include in f2fs moduleVictor Shlein2018-06-19
| | |
| * | nixos/stage-1: new separate conditionals for ext4 and f2fs resizing toolsVictor Shlein2018-06-19
| | |
| * | nixos/stage-1: implemented separate check for f2fs filesystems in need of ↵Victor Shlein2018-06-19
| | | | | | | | | | | | resizing
| * | nixos/stage-1: fixed if-else blockkisik212018-06-19
| | |
| * | nixos/stage-1: added f2fs-tools' tools for resizingVictor Shlein2018-06-19
| | |
| * | nixos/stage-1: added F2FS resizingVictor Shlein2018-06-19
| | | | | | | | | | | | F2FS is used on Raspberry Pi-like devices to enhance SD card performance. Allowing F2FS resizing would help in automatic deploying of SD card images without a Linux box to resize the file system offline.
* | | Merge branch 'master' into staging-nextVladimír Čunát2019-01-10
|\ \ \
| * | | nixos/luksroot: Fix typo `Verifiying` -> `Verifying`Claudio Bley2019-01-08
| | | |
| * | | Merge pull request #53446 from Mic92/systemd-udev-settleJörg Thalheim2019-01-08
| |\ \ \ | | | | | | | | | | nixos/systemd-udev-settle: don't restart on upgrades
| | * | | nixos/systemd-udev-settle: don't restart on upgradesJörg Thalheim2019-01-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The idea is that we only need this target during boot, however there is no point on restarting it on every upgrade. This hopefully fixes #21954
| * | | | Merge pull request #47665 from erikarvstedt/initrd-improvementsMatthew Bauer2019-01-06
| |\ \ \ \ | | | | | | | | | | | | Minor initrd improvements
| | * | | | nixos/initrd: improve descriptionsErik Arvstedt2018-10-02
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The improved lspci command shows all available ethernet controllers and their kernel modules. Previously, the user had to provide the slot name of a specific device.
* | | | | | treewide: remove cross assertionsMatthew Bauer2019-01-02
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | sd-image-raspberrypi, sd-image-aarch64, and sd-image-armv7l-multiplatform can all be cross compiled now.
* | | | | | treewide: use buildPackages for config buildersMatthew Bauer2019-01-02
|/ / / / /
* | | | | Merge pull request #51600 from eburimu/fix/cross-extlinux-conf-builderMatthew Bauer2018-12-19
|\ \ \ \ \ | | | | | | | | | | | | extlinux-conf: fix cross compilation
| * | | | | extlinux-conf: fix cross compilationeburimu2018-12-06
| | | | | |
* | | | | | Merge branch 'staging' into make-perl-pathdvolth2018-12-18
|\ \ \ \ \ \ | | |_|/ / / | |/| | | |
| * | | | | logind: make killUserProcesses an option (#51426)Benjamin Staffin2018-12-11
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Right now it's not at all obvious that one can override this option using `services.logind.extraConfig`; we might as well add an option for `killUserProcesses` directly so it's clear and documented.
| * | | | | nixos/systemd-nspawn: accept all Exec and Files optionsRenaud2018-12-08
| | | | | | | | | | | | | | | | | | | | | | | | See: https://www.freedesktop.org/software/systemd/man/systemd.nspawn.html Closes #49712
| * | | | | Revert "nixos/luksroot: Check whether the device already exists"Jörg Thalheim2018-12-02
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This reverts commit 9cd4ce98bfc11292fbebc6b85d14bb386e82c9a8. This might be broken for some people: https://github.com/NixOS/nixpkgs/pull/50281#issuecomment-443516289
| * | | | | nixos/luksroot: Check whether the device already existsJanne Heß2018-12-01
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The new reuse behaviour is cool and really useful but it breaks one of my use cases. When using kexec, I have a script which will unlock the disks in my initrd. However, do_open_passphrase will fail if the disk is already unlocked.
* | | | | | lib.makePerlPath -> perlPackages.makePerlPathvolth2018-12-15
|/ / / / /
* / / / / nixos/nspawn: Fix small typo (#51077)Arian van Putten2018-11-26
|/ / / / | | | | | | | | This has slipped through review in my previous PR it seems
* | | | nixos/bcachefs: remove superfluous fsck from initrdhyperfekt2018-11-03
| | | | | | | | | | | | | | | | bcachefs checks the filesystem at mount time, therefore no separate fsck binary is needed in initrd.
* | | | Merge pull request #48771 from arianvp/container-tweaksJörg Thalheim2018-10-31
|\ \ \ \ | | | | | | | | | | nixos/containers: Introduce several tweaks to systemd-nspawn from upstream systemd
| * | | | nixos/containers: Introduce several tweaks to systemd-nspawn from upstream ↵Arian van Putten2018-10-22
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | systemd * Lets container@.service be activated by machines.target instead of multi-user.target According to the systemd manpages, all containers that are registered by machinectl, should be inside machines.target for easy stopping and starting container units altogether * make sure container@.service and container.slice instances are actually located in machine.slice https://plus.google.com/112206451048767236518/posts/SYAueyXHeEX See original commit: https://github.com/NixOS/systemd/commit/45d383a3b8 * Enable Cgroup delegation for nixos-containers Delegate=yes should be set for container scopes where a systemd instance inside the container shall manage the hierarchies below its own cgroup and have access to all controllers. This is equivalent to enabling all accounting options on the systemd process inside the system container. This means that systemd inside the container is responsible for managing Cgroup resources for unit files that enable accounting options inside. Without this option, units that make use of cgroup features within system containers might misbehave See original commit: https://github.com/NixOS/systemd/commit/a931ad47a8 from the manpage: Turns on delegation of further resource control partitioning to processes of the unit. Units where this is enabled may create and manage their own private subhierarchy of control groups below the control group of the unit itself. For unprivileged services (i.e. those using the User= setting) the unit's control group will be made accessible to the relevant user. When enabled the service manager will refrain from manipulating control groups or moving processes below the unit's control group, so that a clear concept of ownership is established: the control group tree above the unit's control group (i.e. towards the root control group) is owned and managed by the service manager of the host, while the control group tree below the unit's control group is owned and managed by the unit itself. Takes either a boolean argument or a list of control group controller names. If true, delegation is turned on, and all supported controllers are enabled for the unit, making them available to the unit's processes for management. If false, delegation is turned off entirely (and no additional controllers are enabled). If set to a list of controllers, delegation is turned on, and the specified controllers are enabled for the unit. Note that additional controllers than the ones specified might be made available as well, depending on configuration of the containing slice unit or other units contained in it. Note that assigning the empty string will enable delegation, but reset the list of controllers, all assignments prior to this will have no effect. Defaults to false. Note that controller delegation to less privileged code is only safe on the unified control group hierarchy. Accordingly, access to the specified controllers will not be granted to unprivileged services on the legacy hierarchy, even when requested. The following controller names may be specified: cpu, cpuacct, io, blkio, memory, devices, pids. Not all of these controllers are available on all kernels however, and some are specific to the unified hierarchy while others are specific to the legacy hierarchy. Also note that the kernel might support further controllers, which aren't covered here yet as delegation is either not supported at all for them or not defined cleanly.
* | | | | stage1 boot: use stdenv.cc.libcWill Dietz2018-10-30
| | | | | | | | | | | | | | | | | | | | (cherry picked from commit d3ae884c9eeb4a6f66ac4e57764c04db16ea7c71)
* | | | | Merge pull request #49360 from tadfisher/logind-suspend-then-hibernateSilvan Mosberger2018-10-28
|\ \ \ \ \ | | | | | | | | | | | | nixos/systemd: support "suspend-then-hibernate" logind option
| * | | | | nixos/systemd: support "suspend-then-hibernate" logind optionTad Fisher2018-10-28
| | | | | |
* | | | | | nixos/rsyslogd & nixos/syslog-ng: fix broken module (#47306)aanderse2018-10-27
| |/ / / / |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * journald: forward message to syslog by default if a syslog implementation is installed * added a test to ensure rsyslog is receiving messages when expected * added rsyslogd tests to release.nix
* | | | | nixos/systemd-nspawn: Remove dependency on bogus "machine.target"Arian van Putten2018-10-21
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | "machine.target" doesn't actually exist, it's misspelled version of "machines.target". However, the "systemd-nspawn@.service" unit already has a default dependency on "machines.target"
* | | | | raspberrypi-bootloader: pass initrd to kernelBen Wolsieffer2018-10-21
| | | | | | | | | | | | | | | | | | | | | | | | | NixOS is unable to boot using the RPi bootloader (w/o U-Boot) unless the initrd is configured.
* | | | | raspberrypi-bootloader: uboot: allow specification of target directoryBen Wolsieffer2018-10-21
| | | | |
* | | | | raspberrypi-bootloader: support Raspberry Pi 3 w/o U-Boot and explicitly supportBen Wolsieffer2018-10-21
| | | | | | | | | | | | | | | | | | | | Raspberry Pi Zero
* | | | | raspberrypi-bootloader: allow specification of target directoryBen Wolsieffer2018-10-21
| |_|_|/ |/| | |
* | | | bootStage1: fix cross build (@matthewbauer's solution)volth2018-10-12
| | | |
* | | | bootStage1: fix cross buildvolth2018-10-12
| | | |
* | | | nixos: initrd/luks: fix detection of devices by UUIDBen Wolsieffer2018-10-11
| | | |
* | | | nixos: initrd/luks: make script indentation consistentBen Wolsieffer2018-10-11
|/ / /
* | | Merge pull request #46964 from florianjacob/systemd-assert-value-tostringMatthew Bauer2018-10-05
|\ \ \ | | | | | | | | nixos/systemd-lib: fix assertValueOneOf
| * | | nixos/systemd-lib: fix assertValueOneOfFlorian Jacob2018-09-20
| |/ / | | | | | | | | | when value is not a string
* | | Merge pull request #46459 from volth/volth-patch-3Matthew Bauer2018-10-05
|\ \ \ | | | | | | | | nixos/initrd-network: multiple DHCP fixes