Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

e2fsprogs: 1.46.6 -> 1.47.0 #229454

Merged
merged 1 commit into from
May 18, 2023
Merged

e2fsprogs: 1.46.6 -> 1.47.0 #229454

merged 1 commit into from
May 18, 2023

Conversation

lucky9-cyou
Copy link
Contributor

@lucky9-cyou lucky9-cyou commented May 2, 2023

Changelog: https://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.47.0

Things done
  • Built on platform(s)
    • x86_64-linux
    • aarch64-linux
    • x86_64-darwin
    • aarch64-darwin
  • For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual)
  • Tested, as applicable:
  • Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
  • Tested basic functionality of all binary files (usually in ./result/bin/)
  • 23.05 Release Notes (or backporting 22.11 Release notes)
    • (Package updates) Added a release notes entry if the change is major or breaking
    • (Module updates) Added a release notes entry if the change is significant
    • (Module addition) Added a release notes entry if adding a new NixOS module
  • Fits CONTRIBUTING.md.

@lucky9-cyou
Copy link
Contributor Author

Related issue: #229450 (comment)

@lucky9-cyou lucky9-cyou closed this May 2, 2023
@lucky9-cyou lucky9-cyou reopened this May 2, 2023
@vcunat vcunat changed the base branch from nixos-unstable to staging May 2, 2023 14:27
@vcunat
Copy link
Member

vcunat commented May 2, 2023

@ofborg eval

@risicle
Copy link
Contributor

risicle commented May 5, 2023

These should be squashed into a single commit with the commit message e2fsprogs: 1.46.6 -> 1.47.0

@vcunat vcunat changed the title update e2fsprogs version from 1.46.6 to 1.47.0 e2fsprogs: 1.46.6 -> 1.47.0 May 18, 2023
@vcunat vcunat merged commit 3186ed6 into NixOS:staging May 18, 2023
1 check passed
@lucky9-cyou lucky9-cyou deleted the nixos-unstable branch May 18, 2023 12:42
@pkern
Copy link
Contributor

pkern commented Jun 21, 2023

I think it'd be good to queue this up for backporting. It looks like if you create a filesystem on unstable, e2fsck will refuse to check it on stable:

[    7.164612] stage-1-init: [Wed Jun 21 21:16:08 UTC 2023] /dev/disk/by-label/nixos has unsupported feature(s): FEATURE_C12
[    7.172009] stage-1-init: [Wed Jun 21 21:16:08 UTC 2023] e2fsck: Get a newer version of e2fsck!

And that's blocking boot. To be fair, I used the kexec method to install nixos and that did not use the release branch of my Flake, so there's that.

@vcunat
Copy link
Member

vcunat commented Jun 21, 2023

Man, I'd expect at least a bit of compatibility 🤦🏽

@vcunat
Copy link
Member

vcunat commented Jun 21, 2023

But I'm afraid that simply backporting this upgrade might just propagate the breakage further.

@pkern
Copy link
Contributor

pkern commented Jun 21, 2023

So in Debian we stopped the bleeding by disabling the offending features by default. :/

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031622

@pkern
Copy link
Contributor

pkern commented Jun 21, 2023

So one solution might be to backport the version and also disable the setting of the options. That would fix e2fsck to work with newer ext4 filesystems but not generate new incompatible filesystems.

@alyssais
Copy link
Member

Is there any urgency in getting these features enabled by default? The safe thing to do would be to disable these new features by default, and then enable them after 23.11 branches off.

@vcunat
Copy link
Member

vcunat commented Jun 22, 2023

As for kernels, the feature (orphan_file) is said to be first supported in 5.15. We default to 6.1 in NixOS 23.05 already, but I'm still a little afraid for usability of older kernels we have, especially as this thing behaves relatively impurely.

@pkern
Copy link
Contributor

pkern commented Jun 22, 2023

For what it's worth: If you are lucky enough that you can unmount the filesystem, you can do tune2fs -O ^orphan_file <fs> with the new e2fsprogs and undo the damage.

vcunat added a commit that referenced this pull request Jun 23, 2023
by a patch taken from Debian's 1.47.0-2.  Discussion:
#229454 (comment)
@vlaci
Copy link
Contributor

vlaci commented Jun 25, 2023

It looks like x86_64 darwin builds are failing after this https://hydra.nixos.org/build/225290219
c311c7c5cc5

@alyssais
Copy link
Member

It looks like x86_64 darwin builds are failing after this

Previous discussion in #236656 (comment).

@emilazy
Copy link
Member

emilazy commented Jun 25, 2023

See #238791, will hopefully be fixed soon. I have a workaround I can PR if the need is urgent though.

mccurdyc pushed a commit to mccurdyc/nixpkgs that referenced this pull request Jul 3, 2023
by a patch taken from Debian's 1.47.0-2.  Discussion:
NixOS#229454 (comment)
@nixos-discourse
Copy link

This pull request has been mentioned on NixOS Discourse. There might be relevant details there:

https://discourse.nixos.org/t/removing-the-need-for-a-password-with-internal-drives/35848/11

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

9 participants