Skip to content

Commit

Permalink
feat(profiles): apply additional hardware mods on nuc-12,thinkpas-x1-…
Browse files Browse the repository at this point in the history
…carbon
  • Loading branch information
piyoki committed Mar 5, 2024
1 parent dc9648b commit 5c5a96a
Show file tree
Hide file tree
Showing 3 changed files with 34 additions and 8 deletions.
8 changes: 4 additions & 4 deletions flake.lock

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

17 changes: 15 additions & 2 deletions profiles/nuc-12/hardware-configuration.nix
Original file line number Diff line number Diff line change
Expand Up @@ -17,9 +17,22 @@
loader.efi.canTouchEfiVariables = true;

initrd = {
availableKernelModules = [ "xhci_pci" "thunderbolt" "nvme" "usbhid" "usb_storage" "sd_mod" "rtsx_pci_sdmmc" ];
availableKernelModules = [ "xhci_pci" "thunderbolt" "nvme" "usbhid" "usb_storage" "sd_mod" "rtsx_pci_sdmmc" "lz4" ];
kernelModules = [ "i2c-dev" ];
luks.devices."root".device = "/dev/disk/by-uuid/6cf8230d-0ddf-44b2-9be0-c24ce47072e3";
luks.devices."root" = {
device = "/dev/disk/by-uuid/6cf8230d-0ddf-44b2-9be0-c24ce47072e3";
# the keyfile(or device partition) that should be used as the decryption key for the encrypted device.
# if not specified, you will be prompted for a passphrase instead.
#keyFile = "/root-part.key";

# whether to allow TRIM requests to the underlying device.
# it's less secure, but faster.
allowDiscards = true;
# Whether to bypass dm-crypt’s internal read and write workqueues.
# Enabling this should improve performance on SSDs;
# https://wiki.archlinux.org/index.php/Dm-crypt/Specialties#Disable_workqueue_for_increased_solid_state_drive_(SSD)_performance
bypassWorkqueues = true;
};
};

kernelModules = [ "kvm-intel" ];
Expand Down
17 changes: 15 additions & 2 deletions profiles/thinkpad-x1-carbon/hardware-configuration.nix
Original file line number Diff line number Diff line change
Expand Up @@ -22,9 +22,22 @@
loader.efi.canTouchEfiVariables = true;

initrd = {
availableKernelModules = [ "xhci_pci" "thunderbolt" "nvme" "usbhid" "usb_storage" "sd_mod" ];
availableKernelModules = [ "xhci_pci" "thunderbolt" "nvme" "usbhid" "usb_storage" "sd_mod" "lz4" ];
kernelModules = [ "i2c-dev" ];
luks.devices."root".device = "/dev/disk/by-uuid/79869bdd-49a1-44d5-b57c-0ca9fa89c4c9";
luks.devices."root" = {
device = "/dev/disk/by-uuid/79869bdd-49a1-44d5-b57c-0ca9fa89c4c9";
# the keyfile(or device partition) that should be used as the decryption key for the encrypted device.
# if not specified, you will be prompted for a passphrase instead.
#keyFile = "/root-part.key";

# whether to allow TRIM requests to the underlying device.
# it's less secure, but faster.
allowDiscards = true;
# Whether to bypass dm-crypt’s internal read and write workqueues.
# Enabling this should improve performance on SSDs;
# https://wiki.archlinux.org/index.php/Dm-crypt/Specialties#Disable_workqueue_for_increased_solid_state_drive_(SSD)_performance
bypassWorkqueues = true;
};
};

kernelModules = [ "kvm-intel" ];
Expand Down

0 comments on commit 5c5a96a

Please sign in to comment.