Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

systemd-boot-manager: Cleanup series #317

Open
wants to merge 10 commits into
base: master
Choose a base branch
from

Conversation

ventureoo
Copy link
Member

Really need testing.

Signed-off-by: Vasiliy Stelmachenok <[email protected]>
discard=async is the default for 6.2+ kernels, so there is no need to
specify it  here.

Signed-off-by: Vasiliy Stelmachenok <[email protected]>
This is already automatically managed by systemd and resume hook in
initramfs.
I don't see any sense in rootfs that not having a UUID/PARTUUID. It's
also normal practice to specify a UUID as root, so make that the
default.

Signed-off-by: Vasiliy Stelmachenok <[email protected]>
For LUKS2 (which we use by default for systemd-boot installations), it's
possible to do without specifying kernel parameters using cryptsetup
(https://wiki.archlinux.org/title/Dm-crypt/Specialties#LUKS2) and fstab
flags. Also note that TRIM may not be desirable on encrypted partitions
and may pose potential security risks.

Signed-off-by: Vasiliy Stelmachenok <[email protected]>
Continuous TRIM is not recommended for use on many file systems and can
cause problems. Users should use fstrim service and fstrim.timer
instead.

[1] - https://wiki.archlinux.org/title/Solid_state_drive#TRIM

Signed-off-by: Vasiliy Stelmachenok <[email protected]>
@ventureoo ventureoo force-pushed the systemd-boot-manager-cleanups branch from 7263d1c to 2321c66 Compare August 29, 2024 15:43
@ventureoo ventureoo force-pushed the systemd-boot-manager-cleanups branch from 2321c66 to 9143388 Compare August 29, 2024 16:00
@ptr1337
Copy link
Member

ptr1337 commented Sep 5, 2024

Tested this so far on my system. No issues found.
Installation testing with ZFS/bcachefs and each also encrypted pending.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants