Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

zfs: Make sure copyKernels enabled if you're using zfs #78721

Closed
wants to merge 1 commit into from

Conversation

Frostman
Copy link
Member

@Frostman Frostman commented Jan 28, 2020

Motivation for this change

The boot.loader.grub.copyKernels option should be enabled if you're using ZFS. It's recommended in https://nixos.wiki/wiki/NixOS_on_ZFS anyways.

Fix #60902

Things done
  • Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS linux)
  • Built on platform(s)
    • NixOS
    • macOS
    • other Linux distributions
  • Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
  • Tested compilation of all pkgs that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review wip"
  • Tested execution of all binary files (usually in ./result/bin/)
  • Determined the impact on package closure size (by running nix path-info -S before and after)
  • Ensured that relevant documentation is up to date
  • Fits CONTRIBUTING.md.

This change is Reviewable

{
assertion = !config.boot.loader.grub.enable || config.boot.loader.grub.copyKernels;
message = "ZFS requires boot.loader.grub.copyKernels to be enabled";
}
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't think this needs to be an assertion. Just setting copyKernels to true if grub is enabled shouldn't be a problem.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It could be potentially a breaking change for existing users with small boot partitions - do you think it's okay?

As a kinda data point, I have only 110M used on /boot* with boot.loader.grub.configurationLimit = 50; (while default is 100). So, it's a very small amount of data.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ah yeah an assertion sounds good then. Though I'd change the condition to

assertion = config.boot.loader.grub.enable -> config.boot.loader.grub.copyKernels

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@infinisil @Ma27
It seems that due to the zfs enabled by default, there is no way to do a safe assertion (or I understand it in a wrong way). Right now, this assertion will basically mean that anyone who's using grub will need copyKernels to be enabled as well.

On the other hand, I searched a bit dipper and found that copyKernels will be effectively forced if /nix/store and boot path are on different filesystems [0]. Seems like it should be enough, but it makes copyKernels kind of impure.

[0] https://github.com/NixOS/nixpkgs/blob/master/nixos/modules/system/boot/loader/grub/install-grub.pl#L83-L88

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Would it work to check the actual fsType of /boot (or / if there is no separate /boot)?

(config.fileSystems."/boot" or config.fileSystems."/").fsType == "zfs"

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@chkno that's a good idea. Probably checking the root fs is enough as if it's zfs we should be already copying kernels as well as /boot doesn't always exist (for example, I have /boot[1-6]). I'll try a few different options and see how it'll work.

@stale
Copy link

stale bot commented Aug 11, 2020

Hello, I'm a bot and I thank you in the name of the community for your contributions.

Nixpkgs is a busy repository, and unfortunately sometimes PRs get left behind for too long. Nevertheless, we'd like to help committers reach the PRs that are still important. This PR has had no activity for 180 days, and so I marked it as stale, but you can rest assured it will never be closed by a non-human.

If this is still important to you and you'd like to remove the stale label, we ask that you leave a comment. Your comment can be as simple as "still important to me". But there's a bit more you can do:

If you received an approval by an unprivileged maintainer and you are just waiting for a merge, you can @ mention someone with merge permissions and ask them to help. You might be able to find someone relevant by using Git blame on the relevant files, or via GitHub's web interface. You can see if someone's a member of the nixpkgs-committers team, by hovering with the mouse over their username on the web interface, or by searching them directly on the list.

If your PR wasn't reviewed at all, it might help to find someone who's perhaps a user of the package or module you are changing, or alternatively, ask once more for a review by the maintainer of the package/module this is about. If you don't know any, you can use Git blame on the relevant files, or GitHub's web interface to find someone who touched the relevant files in the past.

If your PR has had reviews and nevertheless got stale, make sure you've responded to all of the reviewer's requests / questions. Usually when PR authors show responsibility and dedication, reviewers (privileged or not) show dedication as well. If you've pushed a change, it's possible the reviewer wasn't notified about your push via email, so you can always officially request them for a review, or just @ mention them and say you've addressed their comments.

Lastly, you can always ask for help at our Discourse Forum, or more specifically, at this thread or at #nixos' IRC channel.

@stale stale bot added the 2.status: stale https://github.com/NixOS/nixpkgs/blob/master/.github/STALE-BOT.md label Aug 11, 2020
@Frostman Frostman closed this Aug 21, 2020
@magnetophon
Copy link
Member

I would love to see this merged.
@Frostman Why did you close it?

@magnetophon magnetophon reopened this Apr 18, 2021
@stale stale bot removed the 2.status: stale https://github.com/NixOS/nixpkgs/blob/master/.github/STALE-BOT.md label Apr 18, 2021
@stale
Copy link

stale bot commented Oct 22, 2021

I marked this as stale due to inactivity. → More info

@stale stale bot added the 2.status: stale https://github.com/NixOS/nixpkgs/blob/master/.github/STALE-BOT.md label Oct 22, 2021
@maydayv7
Copy link

Bumping...

@stale stale bot removed the 2.status: stale https://github.com/NixOS/nixpkgs/blob/master/.github/STALE-BOT.md label Jan 11, 2022
@stale stale bot added the 2.status: stale https://github.com/NixOS/nixpkgs/blob/master/.github/STALE-BOT.md label Jul 10, 2022
@Atemu
Copy link
Member

Atemu commented Nov 19, 2022

@magnetophon @maydayv7 if you want to see this merged, please create a new PR. The original author obviously doesn't want to pursue it anymore.

@Atemu Atemu closed this Nov 19, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

copyKernels should be enabled with ZFS or else grub can break
6 participants