i use the version 24.05.
error: 1 dependencies of derivation ‘/nix/store/r6kifx8kacxa89r9c4cxi0bcpfqs7x6n-linux-6.14.3-modules.drv’ failed to build
error: 1 dependencies of derivation ‘/nix/store/q3pcm0n98wdxidiid6c5hgpyfwfincmr-linux-6.14.3-modules-shrunk.drv’ failed to build
error: 1 dependencies of derivation ‘/nix/store/bn7c7hpwgsqinjladididpy8n4hlw8jg-initrd-linux-6.14.3.drv’ failed to build
building ‘/nix/store/m95fz88r84gdcwqk5ainbq8rbxksm7n7-user-units.drv’…
error: 1 dependencies of derivation ‘/nix/store/03g53a86m4hxbmvh9p90ia0id5xy5vcj-boot.json.drv’ failed to build
error: 1 dependencies of derivation ‘/nix/store/wnv197x2aiawimw2fjgs0zljyx1y1zfg-system-units.drv’ failed to build
error: 3 dependencies of derivation ‘/nix/store/djdlpk5rjjyf94svagh043g99vynfv3c-etc.drv’ failed to build
error: 4 dependencies of derivation ‘/nix/store/5sbj3jsbqajgvi9x0nz5gfhkdlm7psh7-nixos-system-nixos-24.11.717296.5630cf13ccea.drv’ failed to build
no help
I did a misktake in the description, i’m on the 24.11 version of Nixos
nobody has the problem ?

Hello
Can you post your config?
thanks for your time.
configuration.nix :
# Edit this configuration file to define what should be installed on
# your system. Help is available in the configuration.nix(5) man page
# and in the NixOS manual (accessible by running ‘nixos-help’).
{ config, pkgs, ... }:
{
imports =
[ # Include the results of the hardware scan.
./hardware-configuration.nix
];
# Bootloader.
# boot.kernelPackages = pkgs.linuxPackages_latest;
boot.kernelPackages = pkgs.linuxPackages_6_13;
boot.loader.systemd-boot.enable = true;
boot.loader.efi.canTouchEfiVariables = true;
nix.settings = {
download-buffer-size = 100000000; # Set to 100MB
};
boot.initrd.luks.devices."luks-029378ea-1130-4e9b-9404-df85f0c3ebea".device = "/dev/disk/by-uuid/029378ea-1130-4e9b-9404-df85f0c3ebea";
environment.etc.crypttab.text = ''
luks-BACKUP4T_SSD UUID=4891218f-a065-4485-acc4-692b6e2d8de2 /root/tribdisk.bin
luks-BACKUP4T_HDD UUID=7813d2bc-ad40-4f5c-8834-a8a6e7c827af /root/tribdisk.bin
luks-BACKUP8T_HDD UUID=3ec687a1-873d-4259-aefa-3d85dbf0bff5 /root/tribdisk.bin
'';
fileSystems."/BACKUP4T_SSD" =
{
#device = "/dev/disk/by-uuid/adbbb6c7-2401-4c5d-9895-250b3b51ebad"; # LUKS mapped device
device = "/dev/mapper/luks-BACKUP4T_SSD";
fsType = "ext4";
options = [ "rw" "noatime" "nodiratime" ];
};
fileSystems."/BACKUP4T_HDD" =
{
#device = "/dev/disk/by-uuid/1b0510c5-f0fb-4af2-b1f3-91dc24cdb25d"; # LUKS mapped device
device = "/dev/mapper/luks-BACKUP4T_HDD";
fsType = "ext4";
options = [ "rw" "noatime" "nodiratime" ];
};
fileSystems."/BACKUP8T_HDD" =
{
#device = "/dev/disk/by-uuid/f2969fa6-6aab-4050-a68c-74482355dba2"; # LUKS mapped device
device = "/dev/mapper/luks-BACKUP8T_HDD";
fsType = "ext4";
options = [ "rw" "noatime" "nodiratime" ];
};
#sudo cryptsetup luksOpen --key-file /root/tribdisk.bin /dev/sda luks-BACKUP8T_HDD
networking.hostName = "nixos"; # Define your hostname.
# networking.wireless.enable = true; # Enables wireless support via wpa_supplicant.
# Configure network proxy if necessary
# networking.proxy.default = "http://user:password@proxy:port/";
# networking.proxy.noProxy = "127.0.0.1,localhost,internal.domain";
# Enable networking
networking.networkmanager.enable = true;
# Set your time zone.
time.timeZone = "Europe/Paris";
# Select internationalisation properties.
i18n.defaultLocale = "fr_FR.UTF-8";
i18n.extraLocaleSettings = {
LC_ADDRESS = "fr_FR.UTF-8";
LC_IDENTIFICATION = "fr_FR.UTF-8";
LC_MEASUREMENT = "fr_FR.UTF-8";
LC_MONETARY = "fr_FR.UTF-8";
LC_NAME = "fr_FR.UTF-8";
LC_NUMERIC = "fr_FR.UTF-8";
LC_PAPER = "fr_FR.UTF-8";
LC_TELEPHONE = "fr_FR.UTF-8";
LC_TIME = "fr_FR.UTF-8";
};
# Enable the X11 windowing system.
# You can disable this if you're only using the Wayland session.
services.xserver.enable = true;
# Enable the KDE Plasma Desktop Environment.
services.displayManager.sddm.enable = true;
services.desktopManager.plasma6.enable = true;
# Configure keymap in X11
services.xserver.xkb = {
layout = "fr";
variant = "azerty";
};
# Configure console keymap
console.keyMap = "fr";
hardware.logitech.wireless.enable = true;
hardware.logitech.wireless.enableGraphical = true;
#hardware.opengl.enable = true;
hardware.graphics.enable = true;
hardware.openrazer.enable = true;
hardware.openrazer.users = ["david"];
# enables support for SANE scanners
hardware.sane.enable = true;
hardware.sane.extraBackends = [ pkgs.utsushi ];
services.udev.packages = [ pkgs.utsushi ];
# Enable sound with pipewire.
hardware.pulseaudio.enable = false;
security.rtkit.enable = true;
services = {
# Enable CUPS to print documents.
printing = {
enable = true;
drivers = [ pkgs.epson-escpr ];
browsing = true;
defaultShared = true;
};
pipewire = {
enable = true;
wireplumber = {
enable = true;
};
alsa = {
enable = true;
support32Bit = true;
};
audio.enable = true;
pulse.enable = true;
# If you want to use JACK applications, uncomment this
jack.enable = true;
# use the example session manager (no others are packaged yet so this is enabled by default,
# no need to redefine it in your config for now)
#media-session.enable = true;
};
# Network shares
samba = {
package = pkgs.samba4Full;
# ^^ `samba4Full` is compiled with avahi, ldap, AD etc support (compared to the default package, `samba`
# Required for samba to register mDNS records for auto discovery
# See https://github.com/NixOS/nixpkgs/blob/592047fc9e4f7b74a4dc85d1b9f5243dfe4899e3/pkgs/top-level/all-packages.nix#L27268
enable = true;
openFirewall = true;
#shares.testshare = {
# path = "/path/to/share";
# writable = "true";
# comment = "Hello World!";
#};
#extraConfig = ''
# server smb encrypt = required
# # ^^ Note: Breaks `smbclient -L <ip/host> -U%` by default, might require the client to set `client min protocol`?
# server min protocol = SMB3_00
#'';
};
avahi = {
publish.enable = true;
publish.userServices = true;
# ^^ Needed to allow samba to automatically register mDNS records (without the need for an `extraServiceFile`
nssmdns4 = true;
# ^^ Not one hundred percent sure if this is needed- if it aint broke, don't fix it
enable = true;
openFirewall = true;
};
samba-wsdd = {
# This enables autodiscovery on windows since SMB1 (and thus netbios) support was discontinued
enable = true;
openFirewall = true;
};
gvfs.enable = true;
};
virtualisation.libvirtd = {
enable = true;
qemu = {
package = pkgs.qemu_kvm;
runAsRoot = true;
swtpm.enable = true;
ovmf = {
enable = true;
packages = [(pkgs.OVMF.override {
secureBoot = true;
tpmSupport = true;
}).fd];
};
};
};
programs.virt-manager.enable = true;
virtualisation.virtualbox.host.enable = true;
users.extraGroups.vboxusers.members = [ "david" ];
virtualisation.virtualbox.host.enableExtensionPack = true;
#virtualisation.virtualbox.guest.enable = true;
#virtualisation.virtualbox.guest.dragAndDrop = true;
# Enable touchpad support (enabled default in most desktopManager).
# services.xserver.libinput.enable = true;
# Define a user account. Don't forget to set a password with ‘passwd’.
users.users.david = {
isNormalUser = true;
description = "david";
extraGroups = [ "networkmanager" "wheel" "libvirtd" "scanner" "lp" ];
packages = with pkgs; [
kdePackages.kate
# thunderbird
];
};
# Install firefox.
programs.firefox.enable = true;
# Allow unfree packages
nixpkgs.config.allowUnfree = true;
programs.gnupg.agent = {
settings = {
no-allow-external-cache = "";
};
};
# List packages installed in system profile. To search, run:
# $ nix search wget
environment.systemPackages = with pkgs; [
# vim # Do not forget to add an editor to edit configuration.nix! The Nano editor is also installed by default.
# wget
libsForQt5.qt5.qtwayland
htop
#vivaldi
# ((pkgs.vivaldi.overrideAttrs (oldAttrs: {
# buildPhase = builtins.replaceStrings
# ["for f in libGLESv2.so libqt5_shim.so ; do"]
# ["for f in libGLESv2.so libqt6_shim.so ; do"]
# oldAttrs.buildPhase;
# })).override {
# qt5 = pkgs.qt6;
# commandLineArgs = [ "--ozone-platform=wayland" ];
# # The following two are just my preference, feel free to leave them out
# proprietaryCodecs = true;
# enableWidevine = true;
# })
(vivaldi.overrideAttrs
(oldAttrs: {
dontWrapQtApps = false;
dontPatchELF = true;
nativeBuildInputs = oldAttrs.nativeBuildInputs ++ [pkgs.kdePackages.wrapQtAppsHook];
}))
keepassxc
#cinnamon.nemo-with-extensions
nemo-with-extensions
teams-for-linux
libreoffice
chromium
vscode
remmina
rdesktop
libsForQt5.filelight
btrfs-progs
baobab
gparted
#gnome.gnome-disk-utility
gnome-disk-utility
ncdu
zsh
wezterm
lvm2
fira-code
nerdfonts
powerline-fonts
gnupg
gpg-mdp
pam_gnupg
snapper
snapper-gui
pinentry-all
neofetch
gimp
#virtualbox
virt-viewer
hdparm
virt-manager
qemu_kvm
qemu
cifs-utils
nfs-utils
jdk
android-tools
#gnome.nautilus
nautilus
font-manager
geeqie
mpv
smplayer
vlc
celluloid
clapper
openrazer-daemon
razergenie
polychromatic
signal-desktop
whatsapp-for-linux
telegram-desktop
usbutils
wgnord
qbittorrent
freecad
blender
gnugrep
gnome-calculator
epsonscan2
epson-escpr
bruno
#epson-escpr2
pv
file
toybox
sleuthkit
f2fs-tools
discord
];
services.flatpak.enable = true;
systemd.services.flatpak-repo = {
wantedBy = [ "multi-user.target" ];
path = [ pkgs.flatpak ];
script = ''
flatpak remote-add --if-not-exists flathub https://flathub.org/repo/flathub.flatpakrepo
'';
};
fonts.packages = with pkgs; [
#(nerdfonts.override { fonts = [ "FiraCode" "DroidSansMono" ]; })
corefonts
dejavu_fonts
dina-font
fira-code
fira-code-nerdfont
fira-code-symbols
google-fonts
inconsolata
inconsolata-nerdfont
liberation_ttf
libertine
mononoki
mplus-outline-fonts.githubRelease
nerdfonts
noto-fonts
noto-fonts-cjk-sans
noto-fonts-emoji
open-sans
paratype-pt-sans
powerline-fonts
proggyfonts
roboto-mono
source-code-pro
source-sans-pro
source-serif-pro
ttf_bitstream_vera
];
fonts = {
fontconfig = {
cache32Bit = true;
# Fixes pixelation
antialias = true;
# Fixes antialiasing blur
hinting = {
enable = true;
#style = "full"; # no difference
autohint = true; # no difference
};
subpixel = {
# Makes it bolder
rgba = "rgb";
lcdfilter = "default"; # no difference
};
#defaultFonts = {
# monospace = [ "Source Code Pro" ];
# sansSerif = [ "Source Sans Pro" ];
# serif = [ "Source Serif Pro" ];
#};
};
};
# Some programs need SUID wrappers, can be configured further or are
# started in user sessions.
# programs.mtr.enable = true;
# programs.gnupg.agent = {
# enable = true;
# enableSSHSupport = true;
# };
programs.gnupg.agent = {
enable = true;
pinentryPackage = pkgs.pinentry-qt;
enableSSHSupport = true;
#no-allow-external-cache = true;
};
#services.gpg-agent.extraConfig.no-allow-external-cache = true;
security.pam.services.sddm.enableKwallet = true;
security.pam.services.kwallet = {
name = "kwallet";
enableKwallet = true;
};
# List services that you want to enable:
# Enable the OpenSSH daemon.
# services.openssh.enable = true;
# Open ports in the firewall.
# networking.firewall.allowedTCPPorts = [ ... ];
# networking.firewall.allowedUDPPorts = [ ... ];
# Or disable the firewall altogether.
# networking.firewall.enable = false;
# This value determines the NixOS release from which the default
# settings for stateful data, like file locations and database versions
# on your system were taken. It‘s perfectly fine and recommended to leave
# this value at the release version of the first install of this system.
# Before changing this value read the documentation for this option
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
system.stateVersion = "24.05"; # Did you read the comment?
}
hardware-configuration.nix :
# Do not modify this file! It was generated by ‘nixos-generate-config’
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{ config, lib, pkgs, modulesPath, ... }:
{
imports =
[ (modulesPath + "/installer/scan/not-detected.nix")
];
boot.initrd.availableKernelModules = [ "nvme" "xhci_pci" "ahci" "usbhid" "usb_storage" "sd_mod" "hid_cherry" ];
boot.initrd.kernelModules = [ ];
boot.kernelModules = [ "kvm-amd" ];
boot.extraModulePackages = [ ];
boot.initrd.luks.reusePassphrases = true;
boot.initrd.luks = {
devices = {
luks-ROOT = {
device = "/dev/disk/by-uuid/b21675cd-83a5-4899-9684-e799cb0e3c4d";
allowDiscards = true;
};
#luks-SWAP = {
# device = "/dev/disk/by-uuid/029378ea-1130-4e9b-9404-df85f0c3ebea";
# allowDiscards = true;
# };
#luks-BACKUP4T_SSD = {
# device = "/dev/disk/by-uuid/4891218f-a065-4485-acc4-692b6e2d8de2";
# preLVM = false;
# allowDiscards = true;
# };
#luks-BACKUP4T_HDD = {
# device = "/dev/disk/by-uuid/7813d2bc-ad40-4f5c-8834-a8a6e7c827af";
# preLVM = false;
# };
#luks-BACKUP8T_HDD = {
# device = "/dev/disk/by-uuid/3ec687a1-873d-4259-aefa-3d85dbf0bff5";
# preLVM = false;
# };
};
#reusePassphrases = true;
};
fileSystems."/" =
{
#device = "/dev/disk/by-uuid/a4ec9a50-f5f6-4f2b-8b71-23b12e2db7e7";
device = "/dev/mapper/luks-ROOT";
fsType = "ext4";
};
#fileSystems."/BACKUP4T_SSD" =
# {
# #device = "/dev/disk/by-uuid/adbbb6c7-2401-4c5d-9895-250b3b51ebad"; # LUKS mapped device
# device = "/dev/mapper/luks-BACKUP4T_SSD";
# fsType = "ext4";
# options = [ "rw" "noatime" "nodiratime" ];
# };
#fileSystems."/BACKUP4T_HDD" =
# {
# #device = "/dev/disk/by-uuid/1b0510c5-f0fb-4af2-b1f3-91dc24cdb25d"; # LUKS mapped device
# device = "/dev/mapper/luks-BACKUP4T_HDD";
# fsType = "ext4";
# options = [ "rw" "noatime" "nodiratime" ];
# };
#fileSystems."/BACKUP8T_HDD" =
# {
# #device = "/dev/disk/by-uuid/f2969fa6-6aab-4050-a68c-74482355dba2"; # LUKS mapped device
# device = "/dev/mapper/luks-BACKUP8T_HDD";
# fsType = "ext4";
# options = [ "rw" "noatime" "nodiratime" ];
# };
fileSystems."/boot" =
{ device = "/dev/disk/by-uuid/C401-BF9E";
fsType = "vfat";
options = [ "fmask=0077" "dmask=0077" ];
};
swapDevices =
[ { device = "/dev/disk/by-uuid/4cd0f2f5-0e3e-43e4-93db-12a4bd409db9";
#deviceName = "luks-SWAP";
}
];
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's
# still possible to use this option, but it's recommended to use it in conjunction
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
networking.useDHCP = lib.mkDefault true;
# networking.interfaces.enp11s0f0.useDHCP = lib.mkDefault true;
# networking.interfaces.enp11s0f1.useDHCP = lib.mkDefault true;
# networking.interfaces.enp14s0f3u4u2.useDHCP = lib.mkDefault true;
# networking.interfaces.enp7s0.useDHCP = lib.mkDefault true;
# networking.interfaces.wlp6s0.useDHCP = lib.mkDefault true;
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
}
Ok so first of all have you changed your config after the errors? Because the errors say you use kernel 6.14.3 but in your config you use 6.13.
Also could you post the entire log of nixos-rebuild switch --show-trace
.
hello, yes i changed it because i was unable to build otherwise !
the problem come from the openrazer driver that changed and was not backport !
i change of channel to unstable and had the correction!