| swapDevices.*.device | Path of the device or swap file.
|
| services.ebusd.device | Use DEV as eBUS device [/dev/ttyUSB0]
|
| fileSystems.<name>.device | The device as passed to mount
|
| services.bcg.device | Device name to configure gateway to use.
|
| boot.initrd.luks.devices.<name>.device | Path of the underlying encrypted block device.
|
| services.rshim.device | Specify the device name to attach
|
| services.tp-auto-kbbl.device | Device watched for activities.
|
| boot.initrd.systemd.repart.device | The device to operate on
|
| services.smartd.devices.*.device | Location of the device.
|
| boot.loader.grub.device | The device on which the GRUB boot loader will be installed
|
| services.logkeys.device | Use the given device as keyboard input event device instead of /dev/input/eventX default.
|
| services.bacula-sd.device | This option defines Device resources in Bacula Storage Daemon.
|
| services.rauc.slots.<name>.*.device | The device to update.
|
| services.deconz.device | Force deCONZ to use a specific USB device (e.g. /dev/ttyACM0)
|
| services.gammu-smsd.device.path | Device node or address of the phone
|
| boot.specialFileSystems.<name>.device | The device as passed to mount
|
| services.gammu-smsd.device.group | Owner group of the device
|
| services.ebusd.logs.device | Only write log for matching AREAs (all|main|network|bus|device|update|other) below or equal to LEVEL (none|error|notice|info|debug)
|
| systemd.watchdog.device | The path to a hardware watchdog device which will be managed by systemd
|
| services.gammu-smsd.device.pin | PIN code for the simcard
|
| boot.initrd.luks.devices.<name>.yubikey.storage.device | An unencrypted device that will temporarily be mounted in stage-1
|
| services.ustreamer.device | The v4l2 device to stream.
|
| services.bacula-sd.device.<name>.archiveDevice | The specified name-string gives the system file name of the storage
device managed by this storage daemon
|
| hardware.deviceTree.enable | Build device tree files
|
| hardware.alsa.controls.<name>.device | Name of the PCM device to control (slave).
|
| services.resilio.deviceName | Name of the Resilio Sync device.
|
| hardware.deviceTree.dtbSource | Path to dtb directory that overlays and other processing will be applied to
|
| services.nebula.networks.<name>.tun.device | Name of the tun device
|
| hardware.deviceTree.overlays | List of overlays to apply to base device-tree (.dtb) files.
|
| hardware.trackpoint.device | The device name of the trackpoint
|
| hardware.uni-sync.devices.*.device_id | Unique device ID displayed at each startup.
|
| services.linux-enable-ir-emitter.device | IR camera device to depend on
|
| services.kmonad.keyboards.<name>.device | Path to the keyboard's device file.
|
| services.bacula-sd.device.<name>.extraDeviceConfig | Extra configuration to be passed in Device directive.
|
| hardware.deviceTree.name | The name of an explicit dtb to be loaded, relative to the dtb base
|
| security.tpm2.tctiEnvironment.deviceConf | Configuration part of the device TCTI, e.g. the path to the TPM device
|
| services.xserver.deviceSection | Contents of the first Device section of the X server configuration file.
|
| hardware.deviceTree.filter | Only include .dtb files matching glob expression.
|
| services.gpsd.devices | List of devices that gpsd should subscribe to
|
| boot.initrd.luks.devices.<name>.header | The name of the file or block device that
should be used as header for the encrypted device.
|
| boot.initrd.luks.devices.<name>.keyFile | The name of the file (can be a raw device or a partition) that
should be used as the decryption key for the encrypted device
|
| boot.initrd.luks.devices.<name>.gpgCard | The option to use this LUKS device with a GPG encrypted luks password by the GPG Smartcard
|
| hardware.deviceTree.kernelPackage | Kernel package where device tree include directory is from
|
| virtualisation.fileSystems.<name>.device | The device as passed to mount
|
| services.usbguard.deviceRulesWithPort | Generate device specific rules including the "via-port" attribute.
|
| hardware.alsa.deviceAliases | Assign custom names to sound cards.
|
| networking.wlanInterfaces.<name>.device | The name of the underlying hardware WLAN device as assigned by udev.
|
| services.bacula-sd.device.<name>.mediaType | The specified name-string names the type of media supported by this
device, for example, DLT7000
|
| boot.loader.grub.devices | The devices on which the boot loader, GRUB, will be
installed
|
| boot.initrd.luks.devices.<name>.yubikey | The options to use for this LUKS device in YubiKey-PBA
|
| services.gammu-smsd.device.connection | Protocol which will be used to talk to the phone
|
| hardware.deviceTree.overlays.*.name | Name of this overlay
|
| services.beszel.agent.smartmon.deviceAllow | List of device paths to allow access to for SMART monitoring
|
| hardware.deviceTree.overlays.*.dtboFile | Path to .dtbo compiled overlay file.
|
| swapDevices | The swap devices and swap files
|
| hardware.deviceTree.overlays.*.dtsText | Literal DTS contents, overlay is applied to
each .dtb file matching "compatible" of the overlay.
|
| hardware.printers.ensurePrinters.*.deviceUri | How to reach the printer.
lpinfo -v shows a list of supported device URIs and schemes.
|
| hardware.deviceTree.overlays.*.dtsFile | Path to .dts overlay file, overlay is applied to
each .dtb file matching "compatible" of the overlay.
|
| services.rosenpass.settings.peers.*.device | Name of the local WireGuard interface to use for this peer.
|
| hardware.deviceTree.overlays.*.filter | Only apply to .dtb files matching glob expression.
|
| hardware.nvidia-container-toolkit.device-name-strategy | Specify the strategy for generating device names,
passed to nvidia-ctk cdi generate
|
| services.gammu-smsd.device.synchronizeTime | Whether to set time from computer to the phone during starting connection
|
| virtualisation.kvmgt.device | PCI ID of graphics card
|
| virtualisation.tpm.deviceModel | QEMU device model for the TPM, uses the appropriate default based on th guest platform system and the package passed.
|
| services.freefall.devices | Device paths to all internal spinning hard drives.
|
| swapDevices.*.label | Label of the device
|
| services.wyoming.faster-whisper.servers.<name>.device | Determines the platform faster-whisper is run on
|
| hardware.deviceTree.dtboBuildExtraIncludePaths | Additional include paths that will be passed to the preprocessor when creating the final .dts to compile into .dtbo
|
| services.upower.enableWattsUpPro | Enable the Watts Up Pro device
|
| services.jellyfin.hardwareAcceleration.device | Path to the hardware acceleration device that Jellyfin should use
|
| services.smartd.devices.*.options | Options that determine how smartd monitors the device.
|
| hardware.logitech.lcd.devices | List of USB device ids supported by g15daemon
|
| boot.initrd.luks.devices.<name>.keyFileSize | The size of the key file
|
| virtualisation.qemu.drives.*.deviceExtraOpts | Extra options passed to device flag.
|
| services.syncthing.settings.folders.<name>.devices | The devices this folder should be shared with
|
| boot.tmp.useZram | Whether to mount a zram device on /tmp during boot.
Large Nix builds can fail if the mounted zram device is not large enough
|
| boot.initrd.clevis.devices.<name>.secretFile | Clevis JWE file used to decrypt the device at boot, in concert with the chosen pin (one of TPM2, Tang server, or SSS).
|
| boot.loader.grub.mirroredBoots.*.devices | The path to the devices which will have the GRUB MBR written
|
| boot.initrd.luks.devices.<name>.keyFileOffset | The offset of the key file
|
| boot.initrd.luks.devices.<name>.postOpenCommands | Commands that should be run right after we have mounted our LUKS device.
|
| services.evremap.settings.device_name | The name of the device that should be remapped
|
| hardware.uni-sync.devices | List of controllers with their configurations.
|
| services.evremap.settings.phys | The physical device name to listen on
|
| boot.initrd.luks.devices.<name>.preOpenCommands | Commands that should be run right before we try to mount our LUKS device
|
| services.persistent-evdev.devices | A set of virtual proxy device labels with backing physical device ids
|
| boot.initrd.clevis.devices | Encrypted devices that need to be unlocked at boot using Clevis
|
| boot.initrd.luks.devices | The encrypted disk that should be opened before the root
filesystem is mounted
|
| boot.initrd.luks.devices.<name>.yubikey.storage.path | Absolute path of the salt on the unencrypted device with
that device's root directory as "/".
|
| boot.initrd.luks.devices.<name>.yubikey.storage.fsType | The filesystem of the unencrypted device.
|
| boot.initrd.luks.devices.<name>.fido2.passwordLess | Defines whatever to use an empty string as a default salt
|
| boot.initrd.luks.devices.<name>.preLVM | Whether the luksOpen will be attempted before LVM scan or after it.
|
| swapDevices.*.encrypted.label | Label of the unlocked encrypted device
|
| boot.initrd.luks.devices.<name>.allowDiscards | Whether to allow TRIM requests to the underlying device
|
| services.smartd.devices | List of devices to monitor.
|
| virtualisation.emptyDiskImages.*.driveConfig.deviceExtraOpts | Extra options passed to device flag.
|
| services.prometheus.exporters.py-air-control.deviceHostname | The hostname of the air purification device from which to scrape the metrics.
|
| hardware.alsa.enableRecorder | Whether to set up a loopback device that continuously records and
allows to play back audio from the computer
|
| fileSystems.<name>.encrypted.label | Label of the unlocked encrypted device
|
| services.multipath.devices.*.features | Specify any device-mapper features to be used
|
| boot.resumeDevice | Device for manual resume attempt during boot
|
| fileSystems.<name>.label | Label of the device
|
| hardware.deviceTree.dtboBuildExtraPreprocessorFlags | Additional flags to pass to the preprocessor during dtbo compilations
|
| services.multipath.devices.*.detect_prio | If set to "yes", multipath will try to detect if the device supports
SCSI-3 ALUA
|
| services.syncthing.settings.devices.<name>.id | The device ID
|
| services.syncthing.settings.devices.<name>.name | The name of the device.
|
| boot.loader.systemd-boot.windows.<name>.efiDeviceHandle | The device handle of the EFI System Partition (ESP) where the Windows bootloader is
located
|
| boot.initrd.luks.devices.<name>.fido2.credentials | List of FIDO2 credential IDs
|
| services.bacula-sd.autochanger.<name>.changerDevice | The specified name-string must be the generic SCSI device name of the
autochanger that corresponds to the normal read/write Archive Device
specified in the Device resource
|
| services.multipath.devices.*.deferred_remove | If set to "yes", multipathd will do a deferred remove instead of a
regular remove when the last path device has been deleted
|
| boot.initrd.luks.devices.<name>.gpgCard.publicKey | Path to the Public Key.
|
| boot.initrd.luks.devices.<name>.yubikey.slot | Which slot on the YubiKey to challenge.
|
| services.multipath.devices.*.max_sectors_kb | Sets the max_sectors_kb device parameter on all path devices and the multipath device to the specified value
|
| services.esphome.allowedDevices | A list of device nodes to which esphome has access to
|
| boot.initrd.luks.devices.<name>.keyFileTimeout | The amount of time in seconds for a keyFile to appear before
timing out and trying passwords.
|
| services.rshim.backend | Specify the backend to attach
|
| hardware.uni-sync.devices.*.sync_rgb | Enable ARGB header sync.
|
| hardware.uni-sync.devices.*.channels | List of channels connected to the controller.
|
| services.multipath.devices.*.detect_checker | If set to "yes", multipath will try to detect if the device supports
SCSI-3 ALUA
|
| boot.initrd.luks.devices.<name>.fido2.gracePeriod | Time in seconds to wait for the FIDO2 key.
|
| boot.initrd.luks.devices.<name>.gpgCard.gracePeriod | Time in seconds to wait for the GPG Smartcard.
|
| services.multipath.devices.*.skip_kpartx | If set to yes, kpartx will not automatically create partitions on the device
|
| services.multipath.devices | This option allows you to define arrays for use in multipath
groups.
|
| networking.wlanInterfaces | Creating multiple WLAN interfaces on top of one physical WLAN device (NIC)
|
| services.multipath.devices.*.ghost_delay | Sets the number of seconds that multipath will wait after creating a device with only ghost paths before marking it ready for use in systemd
|
| services.multipath.devices.*.prio | The name of the path priority routine
|
| boot.tmp.zramSettings.zram-size | The size of the zram device, as a function of MemTotal, both in MB
|
| boot.initrd.luks.devices.<name>.yubikey.twoFactor | Whether to use a passphrase and a YubiKey (true), or only a YubiKey (false).
|
| boot.initrd.luks.devices.<name>.yubikey.keyLength | Length of the LUKS slot key derived with PBKDF2 in byte.
|
| hardware.uni-sync.devices.*.channels.*.mode | "PWM" to enable PWM sync. "Manual" to set speed.
|
| services.multipath.devices.*.alias_prefix | The user_friendly_names prefix to use for this device type, instead of the default mpath
|
| services.tp-auto-kbbl.arguments | List of arguments appended to ./tp-auto-kbbl --device [device] [arguments]
|
| swapDevices.*.encrypted.enable | The block device is backed by an encrypted one, adds this device as a initrd luks entry.
|
| boot.initrd.luks.devices.<name>.yubikey.saltLength | Length of the new salt in byte (64 is the effective maximum).
|
| hardware.uni-sync.devices.*.channels.*.speed | Fan speed as percentage (clamped between 0 and 100).
|
| services.syncthing.settings.devices.<name>.autoAcceptFolders | Automatically create or share folders that this device advertises at the default path
|
| boot.initrd.luks.devices.<name>.yubikey.gracePeriod | Time in seconds to wait for the YubiKey.
|
| fileSystems | The file systems to be mounted
|
| services.multipath.devices.*.vendor | Regular expression to match the vendor name
|
| fileSystems.<name>.encrypted.enable | The block device is backed by an encrypted one, adds this device as a initrd luks entry.
|
| boot.zfs.devNodes | Name of directory from which to import ZFS device, this is passed to zpool import
as the value of the -d option
|
| boot.initrd.luks.devices.<name>.gpgCard.encryptedPass | Path to the GPG encrypted passphrase.
|
| services.prometheus.exporters.fritz.settings.devices.*.name | Name to use for the device.
|
| services.multipath.devices.*.product | Regular expression to match the product name
|
| boot.initrd.luks.devices.<name>.fido2.credential | The FIDO2 credential ID.
|
| services.unpoller.poller.debug | Turns on line numbers, microsecond logging, and a per-device log
|
| services.kanata.keyboards.<name>.devices | Paths to keyboard devices
|
| swapDevices.*.size | If this option is set, ‘device’ is interpreted as the
path of a swapfile that will be created automatically
with the indicated size in MiB (1024×1024 bytes).
|
| boot.initrd.luks.devices.<name>.tryEmptyPassphrase | If keyFile fails then try an empty passphrase first before
prompting for password.
|
| services.multipath.devices.*.revision | Regular expression to match the product revision
|
| swapDevices.*.randomEncryption | Encrypt swap device with a random key
|
| systemd.mounts.*.what | Absolute path of device node, file or other resource. (Mandatory)
|
| boot.initrd.luks.devices.<name>.fallbackToPassword | Whether to fallback to interactive passphrase prompt if the keyfile
cannot be found
|
| services.multipath.devices.*.failback | Tell multipathd how to manage path group failback
|
| boot.initrd.luks.devices.<name>.yubikey.iterationStep | How much the iteration count for PBKDF2 is increased at each successful authentication.
|
| swapDevices.*.randomEncryption.enable | Encrypt swap device with a random key
|
| services.prometheus.exporters.fritz.settings.devices.*.username | Username to authenticate with the target device.
|
| services.prometheus.exporters.fritz.settings.devices.*.hostname | Hostname under which the target device is reachable.
|
| services.dendrite.settings.user_api.device_database.connection_string | Database for the User API, devices.
|
| services.gammu-smsd.user | User that has access to the device
|
| security.tpm2.tssUser | Name of the tpm device-owner and service user, set if applyUdevRules is
set.
|
| hardware.cpu.amd.sev.user | Owner to assign to the SEV device.
|
| hardware.cpu.amd.sev.mode | Mode to set for the SEV device.
|
| services.multipath.devices.*.prio_args | Arguments to pass to to the prio function
|
| users.users.<name>.cryptHomeLuks | Path to encrypted luks device that contains
the user's home directory.
|
| services.bacula-sd.autochanger.<name>.devices | |
| services.syncthing.settings.devices | Peers/devices which Syncthing should communicate with
|
| services.multipath.devices.*.all_tg_pt | Set the 'all targets ports' flag when registering keys with mpathpersist
|
| boot.initrd.luks.devices.<name>.bypassWorkqueues | Whether to bypass dm-crypt's internal read and write workqueues
|
| programs.nbd.enable | Whether to enable Network Block Device (nbd) support.
|
| services.multipath.devices.*.rr_weight | If set to priorities the multipath configurator will assign path weights
as "path prio * rr_min_io".
|
| hardware.cpu.amd.sev.group | Group to assign to the SEV device.
|
| hardware.alsa.defaultDevice.capture | The default capture device (i.e. microphone)
|
| services.prometheus.exporters.fritz.settings.devices.*.host_info | Enable extended host info for this device. Warning: This will heavily increase scrape time.
|
| services.multipath.devices.*.hardware_handler | The hardware handler to use for this device type
|
| services.udev.enable | Whether to enable udev, a device manager for the Linux kernel.
|
| services.multipath.devices.*.rr_min_io | Number of I/O requests to route to a path before switching to the next in the
same path group
|
| hardware.alsa.defaultDevice.playback | The default playback device
|
| boot.tmp.zramSettings.fs-type | The file system to put on the device
|
| security.tpm2.tssGroup | Group of the tpm kernel resource manager (tpmrm) device-group, set if
applyUdevRules is set.
|
| services.drbd.enable | Whether to enable support for DRBD, the Distributed Replicated
Block Device.
|
| services.multipath.devices.*.vpd_vendor | The vendor specific vpd page information, using the vpd page abbreviation
|
| boot.zfs.pools.<name>.devNodes | Name of directory from which to import ZFS device, this is passed to zpool import
as the value of the -d option
|
| services.tayga.tunDevice | Name of the nat64 tun device.
|
| services.rauc.slots.<name>.*.type | The type of the device.
|
| virtualisation.fileSystems.<name>.encrypted.label | Label of the unlocked encrypted device
|
| boot.loader.grub.fsIdentifier | Determines how GRUB will identify devices when generating the
configuration file
|
| hardware.flirc.enable | Whether to enable software to configure a Flirc USB device.
|
| hardware.openrazer.devicesOffOnScreensaver | Turn off the devices when the systems screensaver kicks in.
|
| swapDevices.*.randomEncryption.sectorSize | Set the sector size for the plain encrypted device type
|
| hardware.cpu.amd.sevGuest.user | Owner to assign to the SEV guest device.
|
| boot.loader.limine.biosDevice | Device to install the BIOS version of limine on.
|
| hardware.cpu.amd.sevGuest.mode | Mode to set for the SEV guest device.
|
| users.extraUsers.<name>.cryptHomeLuks | Path to encrypted luks device that contains
the user's home directory.
|
| boot.initrd.availableKernelModules | The set of kernel modules in the initial ramdisk used during the
boot process
|
| networking.wlanInterfaces.<name>.mac | MAC address to use for the device
|
| services.multipath.devices.*.flush_on_last_del | If set to "yes" multipathd will disable queueing when the last path to a
device has been deleted.
|
| hardware.cpu.amd.sev.enable | Whether to enable access to the AMD SEV device.
|
| services.bcg.name | Name for the device
|
| services.usbguard.presentDevicePolicy | How to treat USB devices that are already connected when the daemon
starts
|
| services.hardware.lcd.server.usbPermissions | Set group-write permissions on a USB device
|
| hardware.cpu.amd.sevGuest.group | Group to assign to the SEV guest device.
|
| services.devmon.enable | Whether to enable devmon, an automatic device mounting daemon.
|
| security.pam.u2f.settings.interactive | Set to prompt a message and wait before testing the presence of a U2F device
|
| networking.sits.<name>.dev | The underlying network device on which the tunnel resides.
|
| services.lvm.enable | Whether to enable lvm2.
The lvm2 package contains device-mapper udev rules and without those tools like cryptsetup do not fully function!
|
| services.zwave-js.serialPort | Serial port device path for Z-Wave controller.
|
| fileSystems.<name>.autoFormat | If the device does not currently contain a filesystem (as
determined by blkid), then automatically
format it with the filesystem type specified in
fsType
|
| zramSwap.writebackDevice | Write incompressible pages to this device,
as there's no gain from keeping them in RAM.
|
| services.mpd.settings | Configuration for MPD
|
| services.multipath.devices.*.path_checker | The default method used to determine the paths state
|
| services.prometheus.exporters.fritz.settings.devices.*.password_file | Path to a file which contains the password to authenticate with the target device
|
| programs.mdevctl.enable | Whether to enable Mediated Device Management.
|
| services.ebusd.logs.bus | Only write log for matching AREAs (all|main|network|bus|device|update|other) below or equal to LEVEL (none|error|notice|info|debug)
|
| hardware.onlykey.enable | Enable OnlyKey device (https://crp.to/p/) support.
|
| services.ebusd.logs.all | Only write log for matching AREAs (all|main|network|bus|device|update|other) below or equal to LEVEL (none|error|notice|info|debug)
|
| services.syslogd.tty | The tty device on which syslogd will print important log
messages
|
| services.kmonad.keyboards.<name>.extraGroups | Extra permission groups to attach to the KMonad instance for
this keyboard
|
| networking.ipips.<name>.dev | The underlying network device on which the tunnel resides.
|
| services.ebusd.readonly | Only read from device, never write to it
|
| services.nbd.server.enable | Whether to enable the Network Block Device (nbd) server.
|
| services.ebusd.logs.main | Only write log for matching AREAs (all|main|network|bus|device|update|other) below or equal to LEVEL (none|error|notice|info|debug)
|
| services.multipath.devices.*.rr_min_io_rq | Number of I/O requests to route to a path before switching to the next in the
same path group
|
| services.prometheus.exporters.smartctl.devices | Paths to the disks that will be monitored
|
| hardware.cpu.amd.sevGuest.enable | Whether to enable access to the AMD SEV guest device.
|
| swapDevices.*.encrypted.blkDev | Location of the backing encrypted device.
|
| boot.initrd.preDeviceCommands | Shell commands to be executed before udev is started to create
device nodes.
|
| services.rshim.index | Specify the index to create device path /dev/rshim<index>
|
| services.multipath.devices.*.no_path_retry | Specify what to do when all paths are down
|
| services.multipath.devices.*.uid_attribute | The udev attribute providing a unique path identifier (WWID)
|
| services.boinc.extraEnvPackages | Additional packages to make available in the environment in which
BOINC will run
|
| services.ebusd.logs.other | Only write log for matching AREAs (all|main|network|bus|device|update|other) below or equal to LEVEL (none|error|notice|info|debug)
|
| services.zwave-js-ui.serialPort | Serial port for the Z-Wave controller
|
| services.prometheus.exporters.fritz.settings.devices | Fritz!-devices to monitor using the exporter.
|
| services.multipath.devices.*.path_selector | The default path selector algorithm to use; they are offered by the kernel multipath target
|
| services.hostapd.radios | This option allows you to define APs for one or multiple physical radios
|
| services.syncthing.settings.options.relaysEnabled | When true, relays will be connected to and potentially used for device to device connections.
|
| virtualisation.fileSystems.<name>.label | Label of the device
|
| services.jack.loopback.index | Index of an ALSA loopback device.
|
| boot.initrd.luks.cryptoModules | A list of cryptographic kernel modules needed to decrypt the root device(s)
|
| fileSystems.<name>.encrypted.blkDev | Location of the backing encrypted device.
|
| boot.nixStoreMountOpts | Defines the mount options used on a bind mount for the /nix/store
|
| services.rathole.role | Select whether rathole needs to be run as a client or a server
|
| swapDevices.*.priority | Specify the priority of the swap device
|
| virtualisation.kvmgt.enable | Whether to enable KVMGT (iGVT-g) VGPU support
|
| networking.fooOverUDP.<name>.local.dev | Network device to bind to.
|
| services.ebusd.logs.update | Only write log for matching AREAs (all|main|network|bus|device|update|other) below or equal to LEVEL (none|error|notice|info|debug)
|
| programs.k40-whisperer.group | Group assigned to the device when connected.
|
| services.libinput.mouse.dev | Path for mouse device
|
| networking.fooOverUDP.<name>.local | Local address (and optionally device) to bind to using the given port.
|
| services.xserver.enableTearFree | Whether to enable the TearFree option in the first Device section.
|
| services.zfs.expandOnBoot | After importing, expand each device in the specified pools
|
| services.jack.loopback.config | ALSA config for loopback device.
|
| zramSwap.algorithm | Compression algorithm. lzo has good compression,
but is slow. lz4 has bad compression, but is fast.
zstd is both good compression and fast, but requires newer kernel
|
| services.libinput.mouse.buttonMapping | Sets the logical button mapping for this device, see XSetPointerMapping(3)
|
| hardware.display.edid.linuxhw | Exposes EDID files from users-sourced database at https://github.com/linuxhw/EDID
Attribute names will be mapped to EDID filenames <NAME>.bin
|
| security.tpm2.fapi.tcti | The TCTI which will be used
|
| networking.greTunnels.<name>.dev | The underlying network device on which the tunnel resides.
|
| services.samba-wsdd.enable | Whether to enable Web Services Dynamic Discovery host daemon
|
| services.hylafax.modems.<name>.name | Name of modem device,
will be searched for in /dev.
|
| services.multipath.devices.*.dev_loss_tmo | Specify the number of seconds the SCSI layer will wait after a problem has
been detected on a FC remote port before removing it from the system
|
| services.multipath.devices.*.getuid_callout | (Superseded by uid_attribute) The default program and args to callout
to obtain a unique path identifier
|
| hardware.alsa.controls | Virtual volume controls (softvols) to add to a sound card
|
| hardware.alsa.controls.<name>.name | Name of the control, as it appears in alsamixer
|
| boot.initrd.postDeviceCommands | Shell commands to be executed immediately after stage 1 of the
boot has loaded kernel modules and created device nodes in
/dev.
|
| services.quicktun.<name>.upScript | Run specified command or script after the tunnel device has been opened.
|
| services.nbd.server.exports.<name>.path | File or block device to export.
|
| services.journald.console | If non-empty, write log messages to the specified TTY device.
|
| services.ebusd.logs.network | Only write log for matching AREAs (all|main|network|bus|device|update|other) below or equal to LEVEL (none|error|notice|info|debug)
|
| boot.initrd.luks.yubikeySupport | Enables support for authenticating with a YubiKey on LUKS devices
|
| services.tabby.acceleration | Specifies the device to use for hardware acceleration.
cpu: no acceleration just use the CPU
rocm: supported by modern AMD GPUs
cuda: supported by modern NVIDIA GPUs
metal: supported on darwin aarch64 machines
Tabby will try and determine what type of acceleration that is
already enabled in your configuration when acceleration = null.
- nixpkgs.config.cudaSupport
- nixpkgs.config.rocmSupport
- if stdenv.hostPlatform.isDarwin && stdenv.hostPlatform.isAarch64
IFF multiple acceleration methods are found to be enabled or if you
haven't set either cudaSupport or rocmSupport you will have to
specify the device type manually here otherwise it will default to
the first from the list above or to cpu.
|
| services.keyd.keyboards.<name>.ids | Device identifiers, as shown by keyd(1).
|
| networking.macvlans.<name>.mode | The mode of the macvlan device.
|
| services.hardware.lcd.server.usbPid | The product ID of the USB device to claim.
|
| security.pam.u2f.control | This option sets pam "control"
|
| services.hardware.lcd.server.usbVid | The vendor ID of the USB device to claim.
|
| security.pam.p11.control | This option sets pam "control"
|
| services.multipath.enable | Whether to enable the device mapper multipath (DM-MP) daemon.
|
| services.keepalived.vrrpInstances.<name>.virtualIps.*.label | Each address may be tagged with a label string
|
| services.keyd.keyboards | Configuration for one or more device IDs
|
| networking.dhcpcd.enable | Whether to enable dhcpcd for device configuration
|
| services.pipewire.extraConfig.pipewire | Additional configuration for the PipeWire server
|
| services.jack.loopback.session | Additional commands to run to setup loopback device.
|
| services.libinput.touchpad.buttonMapping | Sets the logical button mapping for this device, see XSetPointerMapping(3)
|
| virtualisation.fileSystems | The file systems to be mounted
|
| swapDevices.*.discardPolicy | Specify the discard policy for the swap device
|
| virtualisation.fileSystems.<name>.encrypted.enable | The block device is backed by an encrypted one, adds this device as a initrd luks entry.
|
| services.input-remapper.enable | Whether to enable input-remapper, an easy to use tool to change the mapping of your input device buttons.
|
| hardware.sane.brscan5.netDevices.<name>.ip | The ip address of the device
|
| hardware.sane.brscan4.netDevices.<name>.ip | The ip address of the device
|
| services.multipath.pathGroups.*.wwid | The identifier for the multipath device
|
| services.unifi.openFirewall | Whether or not to open the minimum required ports on the firewall
|
| services.cjdns.ETHInterface.bind | Bind to this device for native ethernet operation.
all is a pseudo-name which will try to connect to all devices.
|
| services.usbmuxd.enable | Enable the usbmuxd ("USB multiplexing daemon") service
|
| hardware.logitech.lcd.startWhenNeeded | Only run the service when an actual supported device is plugged.
|
| containers.<name>.allowedDevices | A list of device nodes to which the containers has access to.
|
| virtualisation.oci-containers.containers.<name>.devices | List of devices to attach to this container.
|
| hardware.kryoflux.enable | Enables kryoflux udev rules, ensures 'floppy' group exists
|
| services.bitbox-bridge.runOnMount | Run bitbox-bridge.service only when hardware wallet is plugged, also registers the systemd device unit
|
| hardware.cpu.intel.sgx.provision.mode | Mode to set for the SGX provisioning device.
|
| hardware.cpu.intel.sgx.provision.user | Owner to assign to the SGX provisioning device.
|
| hardware.sane.brscan4.netDevices.<name>.model | The model of the network device.
|
| hardware.sane.brscan5.netDevices.<name>.model | The model of the network device.
|
| programs.projecteur.enable | Whether to enable projecteur, an application for the Logitech Spotlight device (and similar).
|
| services.multipath.pathGroups.*.alias | The name of the multipath device
|
| services.libinput.touchpad.dev | Path for touchpad device
|
| fileSystems.<name>.depends | List of paths that should be mounted before this one
|
| programs.feedbackd.theme-package | The feedbackd-device-themes package to use.
|
| programs.i3lock.u2fSupport | Whether to enable U2F support in the i3lock program
|
| hardware.trackpoint.ext_dev | Disable or enable external pointing device.
|
| hardware.cpu.intel.sgx.provision.group | Group to assign to the SGX provisioning device.
|
| programs.noisetorch.enable | Whether to enable noisetorch (+ setcap wrapper), a virtual microphone device with noise suppression.
|
| services.xserver.synaptics.dev | Path for touchpad device
|
| containers.<name>.allowedDevices.*.node | Path to device node
|
| hardware.sane.brscan5.netDevices.<name>.name | The friendly name you give to the network device
|
| services.jack.loopback.dmixConfig | For music production software that still doesn't support JACK natively you
would like to put buffer/period adjustments here
to decrease dmix device latency.
|
| security.pam.u2f.settings.cue | By default pam-u2f module does not inform user
that he needs to use the u2f device, it just waits without a prompt
|
| hardware.sane.brscan4.netDevices.<name>.name | The friendly name you give to the network device
|
| networking.bonds.<name>.miimon | DEPRECATED, use driverOptions
|
| boot.loader.generic-extlinux-compatible.useGenerationDeviceTree | Whether to generate Device Tree-related directives in the
extlinux configuration
|
| services.multipath.devices.*.fast_io_fail_tmo | Specify the number of seconds the SCSI layer will wait after a problem has been
detected on a FC remote port before failing I/O to devices on that remote port
|
| services.multipath.devices.*.delay_wait_checks | This option is deprecated, and mapped to san_path_err_recovery_time
|
| systemd.watchdog.runtimeTime | The amount of time which can elapse before a watchdog hardware device
will automatically reboot the system
|
| services.jack.loopback.enable | Create ALSA loopback device, instead of using PCM plugin
|
| services.multipath.devices.*.product_blacklist | Products with the given vendor matching this string are blacklisted
|
| services.persistent-evdev.enable | Whether to enable virtual input devices that persist even if the backing device is hotplugged.
|
| systemd.watchdog.kexecTime | The amount of time which can elapse when kexec is being executed before
a watchdog hardware device will automatically reboot the system
|
| hardware.cpu.intel.sgx.provision.enable | Whether to enable access to the Intel SGX provisioning device.
|
| services.multipath.defaults | This section defines default values for attributes which are used
whenever no values are given in the appropriate device or multipath
sections.
|
| services.libinput.mouse.clickMethod | Enables a click method
|
| services.multipath.overrides | This section defines values for attributes that should override the
device-specific settings for all devices.
|
| networking.networkmanager.wifi.macAddress | Set the MAC address of the interface.
"XX:XX:XX:XX:XX:XX": MAC address of the interface
"permanent": Use the permanent MAC address of the device
"preserve": Don’t change the MAC address of the device upon activation
"random": Generate a randomized value upon each connect
"stable": Generate a stable, hashed MAC address
"stable-ssid": Generate a stable MAC addressed based on Wi-Fi network
|
| services.multipath.devices.*.delay_watch_checks | This option is deprecated, and mapped to san_path_err_forget_rate
|
| services.hostapd.radios.<name>.channel | The channel to operate on
|
| services.xserver.wacom.enable | Whether to enable the Wacom touchscreen/digitizer/tablet
|
| networking.networkmanager.ethernet.macAddress | Set the MAC address of the interface.
"XX:XX:XX:XX:XX:XX": MAC address of the interface
"permanent": Use the permanent MAC address of the device
"preserve": Don’t change the MAC address of the device upon activation
"random": Generate a randomized value upon each connect
"stable": Generate a stable, hashed MAC address
|
| hardware.openrazer.batteryNotifier | Settings for device battery notifications.
|
| systemd.watchdog.rebootTime | The amount of time which can elapse after a reboot has been triggered
before a watchdog hardware device will automatically reboot the system
|
| networking.wlanInterfaces.<name>.type | The type of the WLAN interface
|
| networking.enableIntel2200BGFirmware | Turn on this option if you want firmware for the Intel
PRO/Wireless 2200BG to be loaded automatically
|
| swapDevices.*.randomEncryption.keySize | Set the encryption key size for the plain device
|
| services.gpsd.readonly | Whether to enable the broken-device-safety, otherwise
known as read-only mode
|
| boot.initrd.luks.mitigateDMAAttacks | Unless enabled, encryption keys can be easily recovered by an attacker with physical
access to any machine with PCMCIA, ExpressCard, ThunderBolt or FireWire port
|
| hardware.sane.brscan4.netDevices.<name>.nodename | The node name of the device
|
| hardware.sane.brscan5.netDevices.<name>.nodename | The node name of the device
|
| services.shellhub-agent.keepAliveInterval | Determine the interval to send the keep alive message to
the server
|
| services.vwifi.client.serverAddress | The address of the server
|
| hardware.nvidia.prime.intelBusId | Bus ID of the Intel GPU
|
| services.gmediarender.audioDevice | The audio device to use.
|
| virtualisation.rootDevice | The path (inside the VM) to the device containing the root filesystem.
|
| swapDevices.*.encrypted.keyFile | Path to a keyfile used to unlock the backing encrypted
device
|
| boot.specialFileSystems.<name>.depends | List of paths that should be mounted before this one
|
| virtualisation.tpm.enable | Whether to enable a TPM device in the virtual machine with a driver, using swtpm.
|
| services.btrfs.autoScrub.fileSystems | List of paths to btrfs filesystems to regularly call btrfs scrub on
|
| hardware.nvidia.prime.nvidiaBusId | Bus ID of the NVIDIA GPU
|
| hardware.nvidia.prime.amdgpuBusId | Bus ID of the AMD APU
|
| services.libinput.touchpad.clickMethod | Enables a click method
|
| services.usbguard.implicitPolicyTarget | How to treat USB devices that don't match any rule in the policy
|
| fileSystems.<name>.encrypted.keyFile | Path to a keyfile used to unlock the backing encrypted
device
|
| boot.loader.systemd-boot.consoleMode | The resolution of the console
|
| services.multipath.devices.*.user_friendly_names | If set to "yes", using the bindings file /etc/multipath/bindings
to assign a persistent and unique alias to the multipath, in the
form of mpath
|
| services.nbd.server.exports.<name>.allowAddresses | IPs and subnets that are authorized to connect for this device
|
| services.fwupd.daemonSettings.DisabledDevices | List of device GUIDs to be disabled.
|
| services.multipath.devices.*.path_grouping_policy | The default path grouping policy to apply to unspecified multipaths
|
| boot.loader.limine.secureBoot.enable | Whether to use sign the limine binary with sbctl.
This requires you to already have generated the keys and enrolled them with sbctl
|
| hardware.nvidia.prime.offload.offloadCmdMainProgram | Specifies the CLI name of the hardware.nvidia.prime.offload.enableOffloadCmd
convenience script for offloading programs to an nvidia device.
|
| boot.initrd.luks.reusePassphrases | When opening a new LUKS device try reusing last successful
passphrase
|
| swapDevices.*.randomEncryption.allowDiscards | Whether to allow TRIM requests to the underlying device
|
| virtualisation.kvmgt.vgpus.<name>.uuid | UUID(s) of VGPU device
|
| virtualisation.bootLoaderDevice | The path (inside th VM) to the device to boot from when legacy booting.
|
| services.shellhub-agent.preferredHostname | Set the device preferred hostname
|
| services.plex.accelerationDevices | A list of device paths to hardware acceleration devices that Plex should
have access to
|
| networking.interfaces.<name>.virtualOwner | In case of a virtual device, the user who owns it.
null will not set owner, allowing access to any user.
|
| services.neard.settings.General.ConstantPoll | Enable constant polling
|
| services.buffyboard.settings.input.pointer | Enable or disable the use of a hardware mouse or other pointing device.
|
| services.borgbackup.jobs.<name>.removableDevice | Whether the repo (which must be local) is a removable device.
|
| programs.tuxclocker.enabledNVIDIADevices | Enable NVIDIA GPU controls for a device by index
|
| containers.<name>.allowedDevices.*.modifier | Device node access modifier
|
| boot.tmp.zramSettings.compression-algorithm | The compression algorithm to use for the zram device
|
| hardware.block.defaultSchedulerExclude | Device name pattern to exclude from default scheduler assignment
through config.hardware.block.defaultScheduler and
config.hardware.block.defaultSchedulerRotational
|
| virtualisation.kvmgt.vgpus | Virtual GPUs to be used in Qemu
|
| hardware.nvidia.prime.offload.enableOffloadCmd | Whether to enable adding a nvidia-offload convenience script to environment.systemPackages
for offloading programs to an nvidia device
|
| virtualisation.qemu.virtioKeyboard | Enable the virtio-keyboard device.
|
| services.syncthing.overrideFolders | Whether to delete the folders which are not configured via the
folders option
|
| services.easytier.instances.<name>.settings.ipv4 | IPv4 cidr address of this peer in the virtual network
|
| services.keepalived.vrrpInstances.<name>.virtualIps.*.dev | The name of the device to add the address to.
|
| security.allowUserNamespaces | Whether to allow creation of user namespaces
|
| services.immich.accelerationDevices | A list of device paths to hardware acceleration devices that immich should
have access to
|
| networking.interfaces.<name>.ipv4.routes.*.type | Type of the route
|
| networking.interfaces.<name>.ipv6.routes.*.type | Type of the route
|
| virtualisation.bootPartition | The path (inside the VM) to the device containing the EFI System Partition (ESP)
|
| networking.interfaces.<name>.wakeOnLan.policy | The Wake-on-LAN policy
to set for the device
|
| services.libinput.mouse.accelProfile | Sets the pointer acceleration profile to the given profile
|
| hardware.openrazer.batteryNotifier.percentage | At what battery percentage the device should reach before
sending notifications.
|
| virtualisation.fileSystems.<name>.autoFormat | If the device does not currently contain a filesystem (as
determined by blkid), then automatically
format it with the filesystem type specified in
fsType
|
| services.multipath.devices.*.san_path_err_threshold | If set to a value greater than 0, multipathd will watch paths and check
how many times a path has been failed due to errors
|
| hardware.nvidia.modesetting.enable | Whether to enable kernel modesetting when using the NVIDIA proprietary driver
|
| programs.nix-required-mounts.presets.nvidia-gpu.enable | Whether to enable Declare the support for derivations that require an Nvidia GPU to be
available, e.g. derivations with requiredSystemFeatures = [ "cuda" ]
|
| services.prometheus.exporters.unpoller.log.debug | Whether to enable debug logging including line numbers, high resolution timestamps, per-device logs.
|
| services.syncthing.settings.options.limitBandwidthInLan | Whether to apply bandwidth limits to devices in the same broadcast domain as the local device.
|
| services.usbguard.restoreControllerDeviceState | The USBGuard daemon modifies some attributes of controller
devices like the default authorization state of new child device
instances
|
| networking.supplicant | Interfaces for which to start wpa_supplicant
|
| services.xserver.desktopManager.surf-display.pointerButtonMap | Disable right and middle pointer device click in browser sessions
while keeping scrolling wheels' functionality intact
|
| virtualisation.fileSystems.<name>.encrypted.blkDev | Location of the backing encrypted device.
|
| services.prometheus.exporters.py-air-control.protocol | The protocol to use when communicating with the air purification device
|
| networking.interfaces.<name>.proxyARP | Turn on proxy_arp for this device
|
| services.hostapd.radios.<name>.countryCode | Country code (ISO/IEC 3166-1)
|
| services.libinput.touchpad.accelProfile | Sets the pointer acceleration profile to the given profile
|
| services.multipath.devices.*.san_path_err_forget_rate | If set to a value greater than 0, multipathd will check whether the path
failures has exceeded the san_path_err_threshold within this many checks
i.e san_path_err_forget_rate
|
| networking.networkmanager.wifi.backend | Specify the Wi-Fi backend used for the device
|
| services.your_spotify.settings.API_ENDPOINT | The endpoint of your server
This api has to be reachable from the device you use the website from not from the server
|
| networking.networkmanager.wifi.scanRandMacAddress | Whether to enable MAC address randomization of a Wi-Fi device
during scanning.
|
| virtualisation.fileSystems.<name>.depends | List of paths that should be mounted before this one
|
| networking.networkmanager.unmanaged | List of interfaces that will not be managed by NetworkManager
|
| services.tailscale.authKeyParameters.preauthorized | Whether to skip manual device approval.
|
| services.multipath.devices.*.san_path_err_recovery_time | If set to a value greater than 0, multipathd will make sure that when
path failures has exceeded the san_path_err_threshold within
san_path_err_forget_rate then the path will be placed in failed state
for san_path_err_recovery_time duration
|
| services.prometheus.exporters.mqtt.zigbee2MqttAvailability | Whether to enable Normalize sensor name for device availability metric added by Zigbee2MQTT..
|
| virtualisation.fileSystems.<name>.encrypted.keyFile | Path to a keyfile used to unlock the backing encrypted
device
|
| hardware.block.scheduler | Assign block I/O scheduler by device name pattern
|
| virtualisation.virtualbox.host.enableHardening | Enable hardened VirtualBox, which ensures that only the binaries in the
system path get access to the devices exposed by the kernel modules
instead of all users in the vboxusers group.
Disabling this can put your system's security at risk, as local users
in the vboxusers group can tamper with the VirtualBox device files.
|
| services.bacula-sd.autochanger.<name>.changerCommand | The name-string specifies an external program to be called that will
automatically change volumes as required by Bacula
|
| services.jellyfin.transcoding.enableSubtitleExtraction | Embedded subtitles can be extracted from videos and delivered to clients in plain text, in order to help prevent video transcoding
|
| services.multipath.devices.*.marginal_path_err_sample_time | One of the four parameters of supporting path check based on accounting IO error such as intermittent error
|
| services.prometheus.exporters.ecoflow.ecoflowDevicesPrettyNamesFile | File must contain one line, example: {"R3300000":"Delta 2","R3400000":"Delta Pro",...}
The key/value map of custom names for your devices
|
| services.prometheus.exporters.ecoflow.mqttDeviceOfflineThreshold | The threshold in seconds which indicates how long we should wait for a metric message from MQTT broker
|
| services.multipath.devices.*.marginal_path_err_rate_threshold | The error rate threshold as a permillage (1/1000)
|
| services.multipath.devices.*.marginal_path_double_failed_time | One of the four parameters of supporting path check based on accounting IO error such as intermittent error
|
| services.multipath.devices.*.marginal_path_err_recheck_gap_time | One of the four parameters of supporting path check based on accounting IO error such as intermittent error
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.hw_offload | Enable hardware offload for this CHILD_SA, if supported by the IPsec
implementation
|
| services.prometheus.exporters.ecoflow.ecoflowDevicesFile | File must contain one line, example: R3300000,R3400000,NC430000,...
|
| services.pipewire.wireplumber.extraConfig | Additional configuration for the WirePlumber daemon when run in
single-instance mode (the default in nixpkgs and currently the only
supported way to run WirePlumber configured via extraConfig)
|
| boot.loader.systemd-boot.installDeviceTree | Install the devicetree blob specified by config.hardware.deviceTree.name
to the ESP and instruct systemd-boot to pass this DTB to linux.
|
| zramSwap.priority | Priority of the zram swap devices
|
| zramSwap.memoryMax | Maximum total amount of memory (in bytes) that can be stored in the zram
swap devices
|
| power.ups.ups | This is where you configure all the UPSes that this system will be
monitoring directly
|
| services.rshim.config | Structural setting for the rshim configuration file
(/etc/rshim.conf)
|
| zramSwap.memoryPercent | Maximum total amount of memory that can be stored in the zram swap devices
(as a percentage of your total memory)
|
| zramSwap.enable | Enable in-memory compressed devices and swap space provided by the zram
kernel module
|
| services.syncthing.overrideDevices | Whether to delete the devices which are not configured via the
devices option
|
| power.ups.enable | Whether to enable support for Power Devices, such as Uninterruptible Power
Supplies, Power Distribution Units and Solar Controllers
.
|
| zramSwap.swapDevices | Number of zram devices to be used as swap, recommended is 1.
|
| services.smartd.autodetect | Whenever smartd should monitor all devices connected to the
machine at the time it's being started (the default)
|
| hardware.i2c.group | Grant access to i2c devices (/dev/i2c-*) to users in this group.
|
| hardware.cpu.x86.msr.mode | Mode to set for devices of the msr kernel subsystem.
|
| hardware.cpu.x86.msr.owner | Owner to set for devices of the msr kernel subsystem.
|
| hardware.cpu.x86.msr.group | Group to set for devices of the msr kernel subsystem.
|
| boot.initrd.clevis.useTang | Whether the Clevis JWE file used to decrypt the devices uses a Tang server as a pin.
|
| boot.initrd.luks.fido2Support | Enables support for authenticating with FIDO2 devices.
|
| hardware.ledger.enable | Whether to enable udev rules for Ledger devices.
|
| services.esphome.usePing | Use ping to check online status of devices instead of mDNS
|
| systemd.network.netdevs | Definition of systemd network devices.
|
| hardware.i2c.enable | Whether to enable i2c devices support
|
| hardware.libftdi.enable | Whether to enable udev rules for devices supported by libftdi.
|
| hardware.bladeRF.enable | Enables udev rules for BladeRF devices
|
| services.hdapsd.enable | Whether to enable Hard Drive Active Protection System Daemon,
devices are detected and managed automatically by udev and systemd
.
|
| hardware.saleae-logic.enable | Whether to enable udev rules for Saleae Logic devices.
|
| programs.pmount.enable | Whether to enable pmount, a tool that allows normal users to mount removable devices
without requiring root privileges
.
|
| security.tpm2.applyUdevRules | Whether to make the /dev/tpm[0-9] devices accessible by the tssUser, or
the /dev/tpmrm[0-9] by tssGroup respectively
|
| hardware.cpu.x86.msr.enable | Whether to enable the msr (Model-Specific Registers) kernel module and configure udev rules for its devices (usually /dev/cpu/*/msr).
|
| services.udisks2.enable | Whether to enable udisks2, a DBus service that allows applications to query and manipulate storage devices.
|
| services.nbd.server.exports | Files or block devices to make available over the network.
|
| hardware.nitrokey.enable | Enables udev rules for Nitrokey devices.
|
| boot.loader.grub.mirroredBoots | Mirror the boot configuration to multiple partitions and install grub
to the respective devices corresponding to those partitions.
|
| services.novacomd.enable | Whether to enable Novacom service for connecting to WebOS devices.
|
| services.fanout.fanoutDevices | Number of /dev/fanout devices
|
| networking.vlans | This option allows you to define vlan devices that tag packets
on top of a physical interface
|
| networking.wireless.enableHardening | Whether to apply security hardening measures to wpa_supplicant
|
| hardware.sensor.iio.enable | Enable this option to support IIO sensors with iio-sensor-proxy
|
| hardware.logitech.lcd.enable | Whether to enable support for Logitech LCD Devices.
|
| services.pcscd.readerConfigs | Configuration for devices that aren't hotpluggable
|
| networking.bonds | This option allows you to define bond devices that aggregate multiple,
underlying networking interfaces together
|
| hardware.rtl-sdr.enable | Enables rtl-sdr udev rules, ensures 'plugdev' group exists, and blacklists DVB kernel modules
|
| boot.initrd.systemd.repart.empty | Controls how to operate on empty devices that contain no partition table yet
|
| services.avahi.openFirewall | Whether to open the firewall for UDP port 5353
|
| hardware.spacenavd.enable | Whether to enable spacenavd to support 3DConnexion devices.
|
| hardware.sane.brscan4.netDevices | The list of network devices that will be registered against the brscan4
sane backend.
|
| hardware.sane.brscan5.netDevices | The list of network devices that will be registered against the brscan5
sane backend.
|
| boot.initrd.systemd.network.netdevs | Definition of systemd network devices.
|
| hardware.hackrf.enable | Enables hackrf udev rules and ensures 'plugdev' group exists
|
| services.zram-generator.enable | Whether to enable Systemd unit generator for zram devices.
|
| boot.initrd.systemd.dmVerity.enable | Mount verity-protected block devices in the initrd
|
| networking.bridges | This option allows you to define Ethernet bridge devices
that connect physical networks together
|
| hardware.hid-fanatecff.enable | Whether to enable hid-fanatecff, a Linux kernel driver that aims to add support for Fanatec devices.
|
| services.airsonic.jvmOptions | Extra command line options for the JVM running AirSonic
|
| hardware.sane.extraBackends | Packages providing extra SANE backends to enable.
The example contains the package for HP scanners, and the package for
Apple AirScan and Microsoft WSD support (supports many
vendors/devices).
|
| services.mediamtx.allowVideoAccess | Whether to enable access to video devices like cameras on the system
.
|
| services.rustdesk-server.enable | Whether to enable RustDesk, a remote access and remote control software, allowing maintenance of computers and other devices.
|
| virtualisation.spiceUSBRedirection.enable | Install the SPICE USB redirection helper with setuid
privileges
|
| programs.joycond-cemuhook.enable | Whether to enable joycond-cemuhook, a program to enable support for cemuhook's UDP protocol for joycond devices.
|
| hardware.libjaylink.enable | Whether to enable udev rules for devices supported by libjaylink
|
| hardware.logitech.wireless.enable | Whether to enable support for Logitech Wireless Devices.
|
| hardware.flipperzero.enable | Whether to enable udev rules and software for Flipper Zero devices.
|
| hardware.block.defaultScheduler | Default block I/O scheduler
|
| services.multipath.blacklist | This section defines which devices should be excluded from the
multipath topology discovery.
|
| services.input-remapper.enableUdevRules | Whether to enable udev rules added by input-remapper to handle hotplugged devices
|
| services.hostapd.radios.<name>.wifi4.enable | Enables support for IEEE 802.11n (WiFi 4, HT)
|
| hardware.cpu.intel.sgx.enableDcapCompat | Whether to enable backward compatibility for SGX software build for the
out-of-tree Intel SGX DCAP driver
|
| services.mirakurun.allowSmartCardAccess | Install polkit rules to allow Mirakurun to access smart card readers
which is commonly used along with tuner devices.
|
| services.usbguard.rules | The USBGuard daemon will load this as the policy rule set
|
| programs.wireshark.usbmon.enable | Whether to allow users in the 'wireshark' group to capture USB traffic
|
| hardware.openrazer.syncEffectsEnabled | Set the sync effects flag to true so any assignment of
effects will work across devices.
|
| hardware.nvidia-container-toolkit.enable | Enable dynamic CDI configuration for Nvidia devices by running
nvidia-container-toolkit on boot.
|
| services.usbguard.insertedDevicePolicy | How to treat USB devices that are already connected after the daemon
starts
|
| services.kanata.keyboards.<name>.extraDefCfg | Configuration of defcfg other than linux-dev (generated
from the devices option) and
linux-continue-if-no-devs-found (hardcoded to be yes)
|
| services.syncthing.settings.folders.<name>.id | The ID of the folder
|
| security.pam.services.<name>.startSession | If set, the service will register a new session with
systemd's login manager
|
| services.chrony.enableRTCTrimming | Enable tracking of the RTC offset to the system clock and automatic trimming
|
| hardware.digitalbitbox.enable | Enables udev rules for Digital Bitbox devices.
|
| services.handheld-daemon.adjustor.loadAcpiCallModule | Whether to load the acpi_call kernel module
|
| i18n.inputMethod.type | Select the enabled input method
|
| services.smartd.defaults.autodetected | Like services.smartd.defaults.monitored, but for the
autodetected devices.
|
| hardware.facter.detected.fingerprint.enable | Whether to enable Fingerprint devices.
|
| services.evdevremapkeys.enable | Whether to enable evdevremapkeys, a daemon to remap events on linux input devices.
|
| services.smartd.defaults.monitored | Common default options for explicitly monitored (listed in
services.smartd.devices) devices
|
| services.usbguard.presentControllerPolicy | How to treat USB controller devices that are already connected when
the daemon starts
|
| powerManagement.powertop.postStart | Shell commands executed after powertop is started
|
| services.hostapd.radios.<name>.networks.<name>.authentication.pairwiseCiphers | Set of accepted cipher suites (encryption algorithms) for pairwise keys (unicast packets)
|
| networking.modemmanager.enable | Whether to use ModemManager to manage modem devices
|
| services.openafsClient.startDisconnected | Start up in disconnected mode
|
| services.beesd.filesystems.<name>.spec | Description of how to identify the filesystem to be duplicated by this
instance of bees
|
| virtualisation.qemu.consoles | The output console devices to pass to the kernel command line via the
console parameter, the primary console is the last
item of this list
|
| hardware.block.defaultSchedulerRotational | Default block I/O scheduler for rotational drives (e.g. hard disks)
|
| virtualisation.libvirtd.allowedBridges | List of bridge devices that can be used by qemu:///session
|
| virtualisation.virtualbox.host.enable | Whether to enable VirtualBox.
In order to pass USB devices from the host to the guests, the user
needs to be in the vboxusers group.
|
| services.syncthing.settings.options.localAnnounceEnabled | Whether to send announcements to the local LAN, also use such announcements to find other devices.
|
| virtualisation.useDefaultFilesystems | If enabled, the boot disk of the virtual machine will be
formatted and mounted with the default filesystems for
testing
|
| services.prometheus.exporters.ecoflow.exporterType | The type of exporter you'd like to use
|
| services.auto-epp.settings.Settings.epp_state_for_AC | energy_performance_preference when on plugged in
See available epp states by running:
cat /sys/devices/system/cpu/cpu0/cpufreq/energy_performance_available_preferences
|
| services.auto-epp.settings.Settings.epp_state_for_BAT | energy_performance_preference when on battery
See available epp states by running:
cat /sys/devices/system/cpu/cpu0/cpufreq/energy_performance_available_preferences
|
| services.multipath.blacklist_exceptions | This section defines which devices should be included in the
multipath topology discovery, despite being listed in the
blacklist section.
|
| services.hostapd.radios.<name>.networks.<name>.authentication.wpaPassword | Sets the password for WPA-PSK that will be converted to the pre-shared key
|