Message ID | 20250124160840.3114-1-roman@riabenko.com |
---|---|
State | New |
Headers |
Return-Path: <guix-patches-bounces+patchwork=mira.cbaines.net@gnu.org> X-Original-To: patchwork@mira.cbaines.net Delivered-To: patchwork@mira.cbaines.net Received: by mira.cbaines.net (Postfix, from userid 113) id 5BAAE27BBE2; Fri, 24 Jan 2025 16:13:29 +0000 (GMT) X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on mira.cbaines.net X-Spam-Level: X-Spam-Status: No, score=-6.4 required=5.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,MAILING_LIST_MULTI,RCVD_IN_DNSWL_BLOCKED, RCVD_IN_VALIDITY_CERTIFIED,RCVD_IN_VALIDITY_RPBL,RCVD_IN_VALIDITY_SAFE, SPF_HELO_PASS,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mira.cbaines.net (Postfix) with ESMTPS id E560927BC16 for <patchwork@mira.cbaines.net>; Fri, 24 Jan 2025 16:11:23 +0000 (GMT) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from <guix-patches-bounces@gnu.org>) id 1tbMGe-0007IV-VS; Fri, 24 Jan 2025 11:10:48 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from <Debian-debbugs@debbugs.gnu.org>) id 1tbMFu-0005ui-NG for guix-patches@gnu.org; Fri, 24 Jan 2025 11:10:02 -0500 Received: from debbugs.gnu.org ([2001:470:142:5::43]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from <Debian-debbugs@debbugs.gnu.org>) id 1tbMFu-0001ia-BV for guix-patches@gnu.org; Fri, 24 Jan 2025 11:10:02 -0500 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debbugs.gnu.org; s=debbugs-gnu-org; h=MIME-Version:Date:From:To:Subject; bh=kX6nvIctRt2PZ7t9Mm67exYo+A4qIAqE2K0Z1x/6R/M=; b=Q6XFg/50mXd0APRH1GEnMnscFWqXZ5r6npV4h4TeFv11qp/mb78UEQT6AVu3y87gkesVKQma7TU+qsMPxpevxirhvs0r25aXC3KAdmVsUWE9uSOLnTru6/Grp+5RwO/1M/x39TCFSyUxGrJdBqMusKnizRoBHPnuLQDxovgZY/mtclhZxUXaRXHCW+8dvuc2l+Y4Ey1mWyVEt5tkunpkhQXBwhYJI2Je/zqT1mASB1C76ne3xGh3wrPMcoopitKPFQKdHlIeTJA6cIDwmqqEQi0fTCOvFNltx1NCzKBRa94EVP82pntzxh817ehDkvfofYGvGq66IgFMi+HEVKGGlQ==; Received: from Debian-debbugs by debbugs.gnu.org with local (Exim 4.84_2) (envelope-from <Debian-debbugs@debbugs.gnu.org>) id 1tbMFt-00080U-Vj for guix-patches@gnu.org; Fri, 24 Jan 2025 11:10:02 -0500 X-Loop: help-debbugs@gnu.org Subject: [bug#75808] [PATCH] [PATCH] gnu: system: Disable EFI pstore backend by default Resent-From: Roman Riabenko <roman@riabenko.com> Original-Sender: "Debbugs-submit" <debbugs-submit-bounces@debbugs.gnu.org> Resent-CC: guix-patches@gnu.org Resent-Date: Fri, 24 Jan 2025 16:10:01 +0000 Resent-Message-ID: <handler.75808.B.173773497730732@debbugs.gnu.org> Resent-Sender: help-debbugs@gnu.org X-GNU-PR-Message: report 75808 X-GNU-PR-Package: guix-patches X-GNU-PR-Keywords: patch To: 75808@debbugs.gnu.org Cc: Roman Riabenko <roman@riabenko.com> X-Debbugs-Original-To: guix-patches@gnu.org Received: via spool by submit@debbugs.gnu.org id=B.173773497730732 (code B ref -1); Fri, 24 Jan 2025 16:10:01 +0000 Received: (at submit) by debbugs.gnu.org; 24 Jan 2025 16:09:37 +0000 Received: from localhost ([127.0.0.1]:46657 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from <debbugs-submit-bounces@debbugs.gnu.org>) id 1tbMFU-0007zc-JK for submit@debbugs.gnu.org; Fri, 24 Jan 2025 11:09:37 -0500 Received: from lists.gnu.org ([2001:470:142::17]:36796) by debbugs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.84_2) (envelope-from <roman@riabenko.com>) id 1tbMFA-0007yF-5z for submit@debbugs.gnu.org; Fri, 24 Jan 2025 11:09:17 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from <roman@riabenko.com>) id 1tbMEs-0005E9-Hw for guix-patches@gnu.org; Fri, 24 Jan 2025 11:08:58 -0500 Received: from lab.riabenko.com ([185.143.146.30]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from <roman@riabenko.com>) id 1tbMEo-0001Pp-88 for guix-patches@gnu.org; Fri, 24 Jan 2025 11:08:56 -0500 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=riabenko.com; s=selector; h=Content-Transfer-Encoding:MIME-Version: Message-ID:Date:Subject:Cc:To:From:From:Sender:Reply-To:Subject:Date: Message-ID:To:Cc:MIME-Version:Content-Type:Content-Transfer-Encoding: Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender: Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=kX6nvIctRt2PZ7t9Mm67exYo+A4qIAqE2K0Z1x/6R/M=; b=yKTPht49LOqxyhFVlkDZ1cXX5G eAHE5O1C9uIVVvg0ekzGBP4f6afpkDnpD9oaM3l71RCoYNTD7eNifm9+HLVaBKn5ZGOWOp6qF8tQQ rziJKEFTMMVElwWcme77lonZ9F4h0mCwZtIL5zwrsNzinsWWvyJ3voz4u5Cf4dar15fBNLiizRpT+ eWDAmkxXPS4jT7EJPa99p09jXH8KcceKQVZyJsaF7hbBkSI/g7GH5GSYXq31kVUAwvQ7KiQ4CjAAQ VweMc6ChE6Pg/ahhXHPC++HEXDQwqyiuGTKodhQIFYQlfFAtmapIEwmALtNaQwEX5D6nmOWHfNUvH 3x7x5s3A==; Received: from librecmc.lan ([192.168.10.1] helo=localhost.localdomain) by lab.riabenko.com with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.98) (envelope-from <roman@riabenko.com>) id 1tbMEg-000000000pv-0u00; Fri, 24 Jan 2025 18:08:46 +0200 Date: Fri, 24 Jan 2025 18:01:54 +0200 Message-ID: <20250124160840.3114-1-roman@riabenko.com> X-Mailer: git-send-email 2.47.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Received-SPF: pass client-ip=185.143.146.30; envelope-from=roman@riabenko.com; helo=lab.riabenko.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list X-BeenThere: guix-patches@gnu.org List-Id: <guix-patches.gnu.org> List-Unsubscribe: <https://lists.gnu.org/mailman/options/guix-patches>, <mailto:guix-patches-request@gnu.org?subject=unsubscribe> List-Archive: <https://lists.gnu.org/archive/html/guix-patches> List-Post: <mailto:guix-patches@gnu.org> List-Help: <mailto:guix-patches-request@gnu.org?subject=help> List-Subscribe: <https://lists.gnu.org/mailman/listinfo/guix-patches>, <mailto:guix-patches-request@gnu.org?subject=subscribe> Reply-to: Roman Riabenko <roman@riabenko.com> X-ACL-Warn: , Roman Riabenko via Guix-patches <guix-patches@gnu.org> From: Roman Riabenko via Guix-patches via <guix-patches@gnu.org> Errors-To: guix-patches-bounces+patchwork=mira.cbaines.net@gnu.org Sender: guix-patches-bounces+patchwork=mira.cbaines.net@gnu.org X-getmail-retrieved-from-mailbox: Patches |
Series |
[bug#75808] gnu: system: Disable EFI pstore backend by default
|
|
Commit Message
Roman Riabenko
Jan. 24, 2025, 4:01 p.m. UTC
* gnu/system.scm (%default-kernel-arguments): Add efi_pstore.pstore_disable=1. Change-Id: Id0294fa90ccbf3bacbb55a22aeb4f0a863efe22c --- This patch disables one of the backends for the persistent storage driver pstore in the Linux kernel, in particular the backend which allows it to save data to EFI variables storage in UEFI NVRAM, such as error log "dump" files. This reduces writes to UEFI to reduce the chances of it wearing out or malfunctioning for other reasons, as well as prevents situations when the efivar is full and cannot take new variables, which is known to cause "Could not prepare Boot variable: No space left on device" errors on computers with some UEFI implementations which are susceptible to such problems, typically on relatively older machines. The user is confronted by the issue at the later stages of guix system reconfiguration when the new boot entry is created. It may be difficult to recover from because the exact cause depends on UEFI. Sometimes it is enough to remove dumps from efivars. Disabling the EFI pstore backend is expected to reduce the chances of unaware users running into issues with UEFI and failing to boot their Guix Systems. Sophisticated users may still enable the backend by removing the option from the kernel arguments, either in the system configuration or in GRUB. The above is my summary of what was previously discussed in guix-help mailing list: <https://lists.gnu.org/archive/html/help-guix/2025-01/msg00173.html>. Disclosure: I have ran into this issue recently. I am a guix user who researched the topic but not a developer. To be sure, I reconfigured the system with this patch and it worked as expected by adding the kernel argument. gnu/system.scm | 3 +++ 1 file changed, 3 insertions(+) base-commit: 13367c6c47f5a4962dde6fab480ea14cd0ac536c
diff --git a/gnu/system.scm b/gnu/system.scm index 8df871f255..5785cfdd9a 100644 --- a/gnu/system.scm +++ b/gnu/system.scm @@ -761,6 +761,9 @@ (define %default-kernel-arguments ;; Default arguments passed to the kernel. (list (string-append "modprobe.blacklist=" (string-join %default-modprobe-blacklist ",")) + ;; Avoiding susceptible UEFIs failures from efivars used for pstore, see + ;; <https://lists.gnu.org/archive/html/help-guix/2025-01/msg00173.html>. + "efi_pstore.pstore_disable=1" "quiet")) (define* (operating-system-directory-base-entries os)