depot/third_party/nixpkgs/nixos/modules/system/boot/modprobe.nix

89 lines
2.2 KiB
Nix

{
config,
lib,
pkgs,
...
}:
with lib;
{
###### interface
options = {
boot.modprobeConfig.enable =
mkEnableOption "modprobe config. This is useful for systems like containers which do not require a kernel"
// {
default = true;
};
boot.modprobeConfig.useUbuntuModuleBlacklist =
mkEnableOption "Ubuntu distro's module blacklist"
// {
default = true;
};
boot.blacklistedKernelModules = mkOption {
type = types.listOf types.str;
default = [ ];
example = [
"cirrusfb"
"i2c_piix4"
];
description = ''
List of names of kernel modules that should not be loaded
automatically by the hardware probing code.
'';
};
boot.extraModprobeConfig = mkOption {
default = "";
example = ''
options parport_pc io=0x378 irq=7 dma=1
'';
description = ''
Any additional configuration to be appended to the generated
{file}`modprobe.conf`. This is typically used to
specify module options. See
{manpage}`modprobe.d(5)` for details.
'';
type = types.lines;
};
};
###### implementation
config = mkIf config.boot.modprobeConfig.enable {
environment.etc."modprobe.d/ubuntu.conf" =
mkIf config.boot.modprobeConfig.useUbuntuModuleBlacklist
{
source = "${pkgs.kmod-blacklist-ubuntu}/modprobe.conf";
};
environment.etc."modprobe.d/nixos.conf".text = ''
${flip concatMapStrings config.boot.blacklistedKernelModules (name: ''
blacklist ${name}
'')}
${config.boot.extraModprobeConfig}
'';
environment.etc."modprobe.d/debian.conf".source = pkgs.kmod-debian-aliases;
environment.etc."modprobe.d/systemd.conf".source =
"${config.systemd.package}/lib/modprobe.d/systemd.conf";
environment.systemPackages = [ pkgs.kmod ];
system.activationScripts.modprobe = stringAfter [ "specialfs" ] ''
# Allow the kernel to find our wrapped modprobe (which searches
# in the right location in the Nix store for kernel modules).
# We need this when the kernel (or some module) auto-loads a
# module.
echo ${pkgs.kmod}/bin/modprobe > /proc/sys/kernel/modprobe
'';
};
}