summary refs log tree commit diff
path: root/nixos/modules/system/boot/modprobe.nix
Commit message (Collapse)AuthorAge
* modprobe activation: Order after specialfsEelco Dolstra2018-02-05
| | | | It requires the existence of /proc.
* nixos treewide: don't set MODULE_DIRNikolay Amiantov2016-08-19
|
* modprobe service: drop kmod wrapperNikolay Amiantov2016-08-19
|
* Revert "Merge branch 'modprobe-fix' of git://github.com/abbradar/nixpkgs"Shea Levy2016-08-15
| | | | | | | Was meant to go into staging, sorry This reverts commit 57b2d1e9b0dcdd1d25bd2d450174764b9417ffc1, reversing changes made to 760b2b9048ea775c319cb348d74447a20dea513e.
* nixos treewide: don't set MODULE_DIRNikolay Amiantov2016-08-16
|
* modprobe service: drop kmod wrapperNikolay Amiantov2016-08-16
|
* kmod-debian-aliases: init at 21-1Mathnerd3142015-09-13
|
* buildEnv: Support package priorities like nix-envEelco Dolstra2015-08-25
| | | | This gets rid of a bunch of collision warnings.
* nixos: move environment.{variables => sessionVariables}.MODULE_DIRBjørn Forsman2015-06-14
| | | | | | | | | | | | | | | | | | This solves the problem that modprobe does not know about $MODULE_DIR when run via sudo, and instead wrongly tries to read /lib/modules/: $ sudo strace -efile modprobe foo |& grep modules open("/lib/modules/3.14.37/modules.softdep", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) open("/lib/modules/3.14.37/modules.dep.bin", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) open("/lib/modules/3.14.37/modules.dep.bin", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) open("/lib/modules/3.14.37/modules.alias.bin", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) Without this patch, one would have to use sudo -E (preserves environment vars). But that option is reserved for sudo users with extra rights (SETENV), so it's not a solution. environment.sessionVariables are set by PAM, so they are included in the environment used by sudo.
* nixos/modprobe: wrap all of kmodNikolay Amiantov2015-01-06
|
* Load EHCI befor OHCI and UHCI; from patch by Mathnerd314Michael Raskin2014-09-02
|
* modprobe.nix: Use modern environment.etc syntaxEelco Dolstra2014-07-31
|
* Rewrite ‘with pkgs.lib’ -> ‘with lib’Eelco Dolstra2014-04-14
| | | | | | | | Using pkgs.lib on the spine of module evaluation is problematic because the pkgs argument depends on the result of module evaluation. To prevent an infinite recursion, pkgs and some of the modules are evaluated twice, which is inefficient. Using ‘with lib’ prevents this problem.
* pull module blacklist from Ubuntu and use it by defaultVladimír Čunát2014-01-28
| | | | People often have serious problems due to bogus modules like *fb.
* Add support for lightweight NixOS containersEelco Dolstra2013-11-27
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | You can now say: systemd.containers.foo.config = { services.openssh.enable = true; services.openssh.ports = [ 2022 ]; users.extraUsers.root.openssh.authorizedKeys.keys = [ "ssh-dss ..." ]; }; which defines a NixOS instance with the given configuration running inside a lightweight container. You can also manage the configuration of the container independently from the host: systemd.containers.foo.path = "/nix/var/nix/profiles/containers/foo"; where "path" is a NixOS system profile. It can be created/updated by doing: $ nix-env --set -p /nix/var/nix/profiles/containers/foo \ -f '<nixos>' -A system -I nixos-config=foo.nix The container configuration (foo.nix) should define boot.isContainer = true; to optimise away the building of a kernel and initrd. This is done automatically when using the "config" route. On the host, a lightweight container appears as the service "container-<name>.service". The container is like a regular NixOS (virtual) machine, except that it doesn't have its own kernel. It has its own root file system (by default /var/lib/containers/<name>), but shares the Nix store of the host (as a read-only bind mount). It also has access to the network devices of the host. Currently, if the configuration of the container changes, running "nixos-rebuild switch" on the host will cause the container to be rebooted. In the future we may want to send some message to the container so that it can activate the new container configuration without rebooting. Containers are not perfectly isolated yet. In particular, the host's /sys/fs/cgroup is mounted (writable!) in the guest.
* Add lots of missing option typesEelco Dolstra2013-10-30
|
* Move all of NixOS to nixos/ in preparation of the repository mergeEelco Dolstra2013-10-10