!PSmBFWNKoXmlQBzUQf:helsinki-systems.de

Stage 1 systemd

76 Members
systemd in NixOs's stage 1, replacing the current bash tooling https://github.com/NixOS/nixpkgs/projects/5125 Servers

Load older messages


SenderMessageTime
30 Jun 2023
@lily:lily.flowers@lily:lily.flowers
In reply to @aloisw:kde.org
Is it required? My system always worked without it.
The LUKS module enables it, if you are using that
10:12:20
@aloisw:kde.org@aloisw:kde.org I do use boot.initrd.luks.devices.*, but I find it surprising that this one enables LVM, given that the only thing LUKS does is to encrypt partitions. 13:56:16
@lily:lily.flowers@lily:lily.flowers
In reply to @aloisw:kde.org
I do use boot.initrd.luks.devices.*, but I find it surprising that this one enables LVM, given that the only thing LUKS does is to encrypt partitions.
It needs the udev rules for devicemapper
14:06:53
@lily:lily.flowers@lily:lily.flowers So it enables them I guess. At least the implicit cryptsetup -> lvm2 dependency is less dumb than plymouth relying on systemd to tell it to quit in emergency shells (why does systemd do that instead of an override file or extra unit/dep to handle that not just in the plymouth project??) 14:08:25
@elvishjerricco:matrix.org@elvishjerricco:matrix.org Lily Foster: Something weird happened in your force push to the unhide PR. https://github.com/NixOS/nixpkgs/compare/799a114821032cdc3490e3415b13ea389a476026..11d11093849fc45e574e1dce5520ee982c162cd8 16:22:01
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgno changes present16:22:06
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgso bjornfor's suggestion isn't in there16:22:17
@lily:lily.flowers@lily:lily.flowers
In reply to @elvishjerricco:matrix.org
so bjornfor's suggestion isn't in there
It's in commit message
17:01:55
@lily:lily.flowers@lily:lily.flowersThere were no diff changes17:02:01
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgoh whoops my bad; thought there was meant to be a comment19:53:15
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgall good19:53:17
@elvishjerricco:matrix.org@elvishjerricco:matrix.org * oh whoops my bad; thought there was meant to be a comment in the descriptions19:54:10
@elvishjerricco:matrix.org@elvishjerricco:matrix.org * oh whoops my bad; thought there was meant to be a comment in the option descriptions19:54:15
@elvishjerricco:matrix.org@elvishjerricco:matrix.org though, actually, maybe it should be in the option descriptions, since they actually aren't relevant to scripted stage 1? I dunno, up to you Lily Foster 19:55:25
@lily:lily.flowers@lily:lily.flowers
In reply to @elvishjerricco:matrix.org
though, actually, maybe it should be in the option descriptions, since they actually aren't relevant to scripted stage 1? I dunno, up to you Lily Foster
I can add them after my next flight, since that is admittedly probably a good idea. It's not like I'll have much else to do waiting in an airport for a few hours
20:24:51
1 Jul 2023
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgi wonder if the nixos test framework should be able to run the backdoor unit in stage 123:02:10
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgit could be like plymouth and survive across stages23:02:29
2 Jul 2023
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgSweet. Extremely rough terrible proof of concept actually works. Can backdoor into stage 1 now. But I'm just starting a different shell in stage 1, killing it, and reconnecting the machine to the stage 2 shell later. I wonder if there's value in maintaining one shell process across stages and chroot'ing like plymouth does though.21:18:41
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgLike maybe there's things you could do to supervise the transition that might be useful?21:18:53
3 Jul 2023
@nikstur:matrix.org@nikstur:matrix.org
In reply to @elvishjerricco:matrix.org
i wonder if the nixos test framework should be able to run the backdoor unit in stage 1
That sounds lovely
14:34:19
7 Jul 2023
@oddlama:matrix.orgoddlama I've run into a race condition when starting vms (microvm.nix), where guests have a filesystem declared as neededForBoot = true; type = "virtiofs";. It looks like the kernel module required to load these filesystems is just inserted via systemd-modules-load which has no defined ordering with regards to the file system mount units. Thus, it sometimes happens to late and the mounting fails. 00:38:55
@oddlama:matrix.orgoddlamaThe module is available in the initramfs though, so I'm not sure whether this is a misconfiguration in microvm.nix or whether there is a missing dependency here.00:38:57
@oddlama:matrix.orgoddlamaAny ideas?00:39:02
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgWell that's especially odd because mounting an FS should implicitly load its kernel module if it isn't loaded already00:40:00
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgso ordering with systemd-modules-load shouldn't matter00:40:15
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgin fact I don't even think we load FS drivers with that00:40:24
@oddlama:matrix.orgoddlamaI had a similar thought, but it's definitely an issue with the modules. If you enter the emergency shell you can just mount them without any issue00:40:52
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgHm. Would love to see a minimal repro nixos tests00:41:08
@elvishjerricco:matrix.org@elvishjerricco:matrix.org * Hm. Would love to see a minimal repro nixos test00:41:09
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgregardless00:41:14

Show newer messages


Back to Room ListRoom Version: 6