Issue building system with 6.14 kernel

i use the version 24.05.

error: 1 dependencies of derivation ‘/nix/store/r6kifx8kacxa89r9c4cxi0bcpfqs7x6n-linux-6.14.3-modules.drv’ failed to build
error: 1 dependencies of derivation ‘/nix/store/q3pcm0n98wdxidiid6c5hgpyfwfincmr-linux-6.14.3-modules-shrunk.drv’ failed to build
error: 1 dependencies of derivation ‘/nix/store/bn7c7hpwgsqinjladididpy8n4hlw8jg-initrd-linux-6.14.3.drv’ failed to build
building ‘/nix/store/m95fz88r84gdcwqk5ainbq8rbxksm7n7-user-units.drv’…
error: 1 dependencies of derivation ‘/nix/store/03g53a86m4hxbmvh9p90ia0id5xy5vcj-boot.json.drv’ failed to build
error: 1 dependencies of derivation ‘/nix/store/wnv197x2aiawimw2fjgs0zljyx1y1zfg-system-units.drv’ failed to build
error: 3 dependencies of derivation ‘/nix/store/djdlpk5rjjyf94svagh043g99vynfv3c-etc.drv’ failed to build
error: 4 dependencies of derivation ‘/nix/store/5sbj3jsbqajgvi9x0nz5gfhkdlm7psh7-nixos-system-nixos-24.11.717296.5630cf13ccea.drv’ failed to build

no help

I did a misktake in the description, i’m on the 24.11 version of Nixos
nobody has the problem ?

:frowning:

Hello
Can you post your config?

thanks for your time.

configuration.nix :

# Edit this configuration file to define what should be installed on
# your system.  Help is available in the configuration.nix(5) man page
# and in the NixOS manual (accessible by running ‘nixos-help’).

{ config, pkgs, ... }:

{
  imports =
    [ # Include the results of the hardware scan.
      ./hardware-configuration.nix
    ];

  # Bootloader.
  # boot.kernelPackages = pkgs.linuxPackages_latest;
  boot.kernelPackages = pkgs.linuxPackages_6_13;
  boot.loader.systemd-boot.enable = true;
  boot.loader.efi.canTouchEfiVariables = true;

  nix.settings = {
    download-buffer-size = 100000000;  # Set to 100MB
  };

  boot.initrd.luks.devices."luks-029378ea-1130-4e9b-9404-df85f0c3ebea".device = "/dev/disk/by-uuid/029378ea-1130-4e9b-9404-df85f0c3ebea";

  environment.etc.crypttab.text = ''
  luks-BACKUP4T_SSD UUID=4891218f-a065-4485-acc4-692b6e2d8de2 /root/tribdisk.bin
  luks-BACKUP4T_HDD UUID=7813d2bc-ad40-4f5c-8834-a8a6e7c827af /root/tribdisk.bin
  luks-BACKUP8T_HDD UUID=3ec687a1-873d-4259-aefa-3d85dbf0bff5 /root/tribdisk.bin
  '';

  fileSystems."/BACKUP4T_SSD" =
    {
      #device = "/dev/disk/by-uuid/adbbb6c7-2401-4c5d-9895-250b3b51ebad";  # LUKS mapped device
      device = "/dev/mapper/luks-BACKUP4T_SSD";
      fsType = "ext4";
      options = [ "rw" "noatime" "nodiratime" ];
    };

  fileSystems."/BACKUP4T_HDD" =
    {
      #device = "/dev/disk/by-uuid/1b0510c5-f0fb-4af2-b1f3-91dc24cdb25d";  # LUKS mapped device
      device = "/dev/mapper/luks-BACKUP4T_HDD";
      fsType = "ext4";
      options = [ "rw" "noatime" "nodiratime" ];
    };

  fileSystems."/BACKUP8T_HDD" =
    {
      #device = "/dev/disk/by-uuid/f2969fa6-6aab-4050-a68c-74482355dba2";  # LUKS mapped device
      device = "/dev/mapper/luks-BACKUP8T_HDD";
      fsType = "ext4";
      options = [ "rw" "noatime" "nodiratime" ];
    };


  #sudo cryptsetup luksOpen --key-file /root/tribdisk.bin /dev/sda luks-BACKUP8T_HDD

  networking.hostName = "nixos"; # Define your hostname.
  # networking.wireless.enable = true;  # Enables wireless support via wpa_supplicant.

  # Configure network proxy if necessary
  # networking.proxy.default = "http://user:password@proxy:port/";
  # networking.proxy.noProxy = "127.0.0.1,localhost,internal.domain";

  # Enable networking
  networking.networkmanager.enable = true;

  # Set your time zone.
  time.timeZone = "Europe/Paris";

  # Select internationalisation properties.
  i18n.defaultLocale = "fr_FR.UTF-8";

  i18n.extraLocaleSettings = {
    LC_ADDRESS = "fr_FR.UTF-8";
    LC_IDENTIFICATION = "fr_FR.UTF-8";
    LC_MEASUREMENT = "fr_FR.UTF-8";
    LC_MONETARY = "fr_FR.UTF-8";
    LC_NAME = "fr_FR.UTF-8";
    LC_NUMERIC = "fr_FR.UTF-8";
    LC_PAPER = "fr_FR.UTF-8";
    LC_TELEPHONE = "fr_FR.UTF-8";
    LC_TIME = "fr_FR.UTF-8";
  };

  # Enable the X11 windowing system.
  # You can disable this if you're only using the Wayland session.
  services.xserver.enable = true;

  # Enable the KDE Plasma Desktop Environment.
  services.displayManager.sddm.enable = true;
  services.desktopManager.plasma6.enable = true;

  # Configure keymap in X11
  services.xserver.xkb = {
    layout = "fr";
    variant = "azerty";
  };

  # Configure console keymap
  console.keyMap = "fr";

  hardware.logitech.wireless.enable = true;
  hardware.logitech.wireless.enableGraphical = true;

  #hardware.opengl.enable = true;
  hardware.graphics.enable = true;

  hardware.openrazer.enable = true;
  hardware.openrazer.users = ["david"];

  # enables support for SANE scanners
  hardware.sane.enable = true;
  hardware.sane.extraBackends = [ pkgs.utsushi ];
  services.udev.packages = [ pkgs.utsushi ];



  # Enable sound with pipewire.
  hardware.pulseaudio.enable = false;
  security.rtkit.enable = true;
  services = {
      # Enable CUPS to print documents.
      printing = {
        enable = true;
        drivers = [ pkgs.epson-escpr ];
        browsing = true;
        defaultShared = true;
      };
      pipewire = {
        enable = true;
        wireplumber = {
          enable = true;
          };
        alsa = {
          enable = true;
          support32Bit = true;
          };
        audio.enable = true;
        pulse.enable = true;
        # If you want to use JACK applications, uncomment this
        jack.enable = true;


        # use the example session manager (no others are packaged yet so this is enabled by default,
        # no need to redefine it in your config for now)
        #media-session.enable = true;
    };
    # Network shares
    samba = {
      package = pkgs.samba4Full;
      # ^^ `samba4Full` is compiled with avahi, ldap, AD etc support (compared to the default package, `samba`
      # Required for samba to register mDNS records for auto discovery
      # See https://github.com/NixOS/nixpkgs/blob/592047fc9e4f7b74a4dc85d1b9f5243dfe4899e3/pkgs/top-level/all-packages.nix#L27268
      enable = true;
      openFirewall = true;
      #shares.testshare = {
      #  path = "/path/to/share";
      #  writable = "true";
      #  comment = "Hello World!";
      #};
      #extraConfig = ''
      #  server smb encrypt = required
      #  # ^^ Note: Breaks `smbclient -L <ip/host> -U%` by default, might require the client to set `client min protocol`?
      #  server min protocol = SMB3_00
      #'';
    };
    avahi = {
      publish.enable = true;
      publish.userServices = true;
      # ^^ Needed to allow samba to automatically register mDNS records (without the need for an `extraServiceFile`
      nssmdns4 = true;
      # ^^ Not one hundred percent sure if this is needed- if it aint broke, don't fix it
      enable = true;
      openFirewall = true;
    };
    samba-wsdd = {
    # This enables autodiscovery on windows since SMB1 (and thus netbios) support was discontinued
      enable = true;
      openFirewall = true;
    };

    gvfs.enable = true;
  };


  virtualisation.libvirtd = {
    enable = true;
    qemu = {
      package = pkgs.qemu_kvm;
      runAsRoot = true;
      swtpm.enable = true;
      ovmf = {
        enable = true;
        packages = [(pkgs.OVMF.override {
          secureBoot = true;
          tpmSupport = true;
        }).fd];
      };
    };
  };

  programs.virt-manager.enable = true;


  virtualisation.virtualbox.host.enable = true;
  users.extraGroups.vboxusers.members = [ "david" ];
  virtualisation.virtualbox.host.enableExtensionPack = true;
  #virtualisation.virtualbox.guest.enable = true;
  #virtualisation.virtualbox.guest.dragAndDrop = true;

  # Enable touchpad support (enabled default in most desktopManager).
  # services.xserver.libinput.enable = true;

  # Define a user account. Don't forget to set a password with ‘passwd’.
  users.users.david = {
    isNormalUser = true;
    description = "david";
    extraGroups = [ "networkmanager" "wheel" "libvirtd" "scanner" "lp" ];
    packages = with pkgs; [
      kdePackages.kate
    #  thunderbird
    ];
  };

  # Install firefox.
  programs.firefox.enable = true;

  # Allow unfree packages
  nixpkgs.config.allowUnfree = true;

  programs.gnupg.agent = {
      settings = {
        no-allow-external-cache = "";
      };
    };


  # List packages installed in system profile. To search, run:
  # $ nix search wget
  environment.systemPackages = with pkgs; [
  #  vim # Do not forget to add an editor to edit configuration.nix! The Nano editor is also installed by default.
  #  wget
    libsForQt5.qt5.qtwayland
	htop
	#vivaldi
	#  ((pkgs.vivaldi.overrideAttrs (oldAttrs: {
    #                                            buildPhase = builtins.replaceStrings
    #                                              ["for f in libGLESv2.so libqt5_shim.so ; do"]
    #                                              ["for f in libGLESv2.so libqt6_shim.so ; do"]
    #                                              oldAttrs.buildPhase;
    #                                            })).override {
    #                                              qt5 = pkgs.qt6;
    #                                              commandLineArgs = [ "--ozone-platform=wayland" ];
    #                                              # The following two are just my preference, feel free to leave them out
    #                                              proprietaryCodecs = true;
    #                                              enableWidevine = true;
    #                                            })
    (vivaldi.overrideAttrs
      (oldAttrs: {
        dontWrapQtApps = false;
        dontPatchELF = true;
        nativeBuildInputs = oldAttrs.nativeBuildInputs ++ [pkgs.kdePackages.wrapQtAppsHook];
      }))
	keepassxc
	#cinnamon.nemo-with-extensions
	nemo-with-extensions
	teams-for-linux
	libreoffice
	chromium
	vscode
	remmina
	rdesktop
	libsForQt5.filelight
	btrfs-progs
	baobab
	gparted
	#gnome.gnome-disk-utility
	gnome-disk-utility
	ncdu
	zsh
	wezterm
	lvm2
	fira-code
	nerdfonts
	powerline-fonts
	gnupg
	gpg-mdp
	pam_gnupg
	snapper
	snapper-gui
	pinentry-all
	neofetch
	gimp
	#virtualbox
	virt-viewer
	hdparm
	virt-manager
	qemu_kvm
	qemu
	cifs-utils
	nfs-utils
	jdk
	android-tools
	#gnome.nautilus
	nautilus
	font-manager
    geeqie
    mpv
    smplayer
    vlc
    celluloid
    clapper
    openrazer-daemon
    razergenie
    polychromatic
    signal-desktop
    whatsapp-for-linux
    telegram-desktop
    usbutils
    wgnord
    qbittorrent
    freecad
    blender
    gnugrep
    gnome-calculator
    epsonscan2
    epson-escpr
    bruno
    #epson-escpr2
    pv
    file
    toybox
    sleuthkit
    f2fs-tools
    discord
	];

  services.flatpak.enable = true;
  systemd.services.flatpak-repo = {
    wantedBy = [ "multi-user.target" ];
    path = [ pkgs.flatpak ];
    script = ''
      flatpak remote-add --if-not-exists flathub https://flathub.org/repo/flathub.flatpakrepo
    '';
  };

  fonts.packages = with pkgs; [
    #(nerdfonts.override { fonts = [ "FiraCode" "DroidSansMono" ]; })
    corefonts
    dejavu_fonts
    dina-font
    fira-code
    fira-code-nerdfont
    fira-code-symbols
    google-fonts
    inconsolata
    inconsolata-nerdfont
    liberation_ttf
    libertine
    mononoki
    mplus-outline-fonts.githubRelease
    nerdfonts
    noto-fonts
    noto-fonts-cjk-sans
    noto-fonts-emoji
    open-sans
    paratype-pt-sans
    powerline-fonts
    proggyfonts
    roboto-mono
    source-code-pro
    source-sans-pro
    source-serif-pro
    ttf_bitstream_vera
  ];


  fonts = {
    fontconfig = {
      cache32Bit = true;
      # Fixes pixelation
      antialias = true;

      # Fixes antialiasing blur
      hinting = {
        enable = true;
        #style = "full"; # no difference
        autohint = true; # no difference
      };

      subpixel = {
        # Makes it bolder
        rgba = "rgb";
        lcdfilter = "default"; # no difference
      };
      #defaultFonts = {
      #  monospace = [ "Source Code Pro" ];
      #  sansSerif = [ "Source Sans Pro" ];
      #  serif = [ "Source Serif Pro" ];
      #};
    };
  };



  # Some programs need SUID wrappers, can be configured further or are
  # started in user sessions.
  # programs.mtr.enable = true;
  # programs.gnupg.agent = {
  #   enable = true;
  #   enableSSHSupport = true;
  # };
   programs.gnupg.agent = {
     enable = true;
     pinentryPackage = pkgs.pinentry-qt;
     enableSSHSupport = true;
     #no-allow-external-cache = true;
  };

  #services.gpg-agent.extraConfig.no-allow-external-cache = true;

  security.pam.services.sddm.enableKwallet = true;
  security.pam.services.kwallet = {
    name = "kwallet";
    enableKwallet = true;
  };

  # List services that you want to enable:

  # Enable the OpenSSH daemon.
  # services.openssh.enable = true;

  # Open ports in the firewall.
  # networking.firewall.allowedTCPPorts = [ ... ];
  # networking.firewall.allowedUDPPorts = [ ... ];
  # Or disable the firewall altogether.
  # networking.firewall.enable = false;

  # This value determines the NixOS release from which the default
  # settings for stateful data, like file locations and database versions
  # on your system were taken. It‘s perfectly fine and recommended to leave
  # this value at the release version of the first install of this system.
  # Before changing this value read the documentation for this option
  # (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
  system.stateVersion = "24.05"; # Did you read the comment?

}

hardware-configuration.nix :

# Do not modify this file!  It was generated by ‘nixos-generate-config’
# and may be overwritten by future invocations.  Please make changes
# to /etc/nixos/configuration.nix instead.
{ config, lib, pkgs, modulesPath, ... }:

{
  imports =
    [ (modulesPath + "/installer/scan/not-detected.nix")
    ];

  boot.initrd.availableKernelModules = [ "nvme" "xhci_pci" "ahci" "usbhid" "usb_storage" "sd_mod" "hid_cherry" ];
  boot.initrd.kernelModules = [ ];
  boot.kernelModules = [ "kvm-amd" ];
  boot.extraModulePackages = [ ];


  boot.initrd.luks.reusePassphrases = true;
  boot.initrd.luks = {
    devices = {
      luks-ROOT = {
                    device = "/dev/disk/by-uuid/b21675cd-83a5-4899-9684-e799cb0e3c4d";
                    allowDiscards = true;
        };

      #luks-SWAP = {
      #              device = "/dev/disk/by-uuid/029378ea-1130-4e9b-9404-df85f0c3ebea";
      #              allowDiscards = true;
      #  };

      #luks-BACKUP4T_SSD = {
      #              device = "/dev/disk/by-uuid/4891218f-a065-4485-acc4-692b6e2d8de2";
      #              preLVM = false;
      #              allowDiscards = true;
      #  };
      #luks-BACKUP4T_HDD = {
      #              device = "/dev/disk/by-uuid/7813d2bc-ad40-4f5c-8834-a8a6e7c827af";
      #              preLVM = false;
      #  };
      #luks-BACKUP8T_HDD = {
      #              device = "/dev/disk/by-uuid/3ec687a1-873d-4259-aefa-3d85dbf0bff5";
      #              preLVM = false;
      #  };
    };
    #reusePassphrases = true;
  };

  fileSystems."/" =
    {
      #device = "/dev/disk/by-uuid/a4ec9a50-f5f6-4f2b-8b71-23b12e2db7e7";
      device = "/dev/mapper/luks-ROOT";
      fsType = "ext4";
    };

  #fileSystems."/BACKUP4T_SSD" =
  #  {
  #    #device = "/dev/disk/by-uuid/adbbb6c7-2401-4c5d-9895-250b3b51ebad";  # LUKS mapped device
  #    device = "/dev/mapper/luks-BACKUP4T_SSD";
  #    fsType = "ext4";
  #    options = [ "rw" "noatime" "nodiratime" ];
  #  };


  #fileSystems."/BACKUP4T_HDD" =
  #  {
  #    #device = "/dev/disk/by-uuid/1b0510c5-f0fb-4af2-b1f3-91dc24cdb25d";  # LUKS mapped device
  #    device = "/dev/mapper/luks-BACKUP4T_HDD";
  #    fsType = "ext4";
  #    options = [ "rw" "noatime" "nodiratime" ];
  #  };

  #fileSystems."/BACKUP8T_HDD" =
  #  {
  #    #device = "/dev/disk/by-uuid/f2969fa6-6aab-4050-a68c-74482355dba2";  # LUKS mapped device
  #    device = "/dev/mapper/luks-BACKUP8T_HDD";
  #    fsType = "ext4";
  #    options = [ "rw" "noatime" "nodiratime" ];
  #  };


  fileSystems."/boot" =
    { device = "/dev/disk/by-uuid/C401-BF9E";
      fsType = "vfat";
      options = [ "fmask=0077" "dmask=0077" ];
    };

  swapDevices =
    [ { device = "/dev/disk/by-uuid/4cd0f2f5-0e3e-43e4-93db-12a4bd409db9";
        #deviceName  = "luks-SWAP";
      }
    ];

  # Enables DHCP on each ethernet and wireless interface. In case of scripted networking
  # (the default) this is the recommended approach. When using systemd-networkd it's
  # still possible to use this option, but it's recommended to use it in conjunction
  # with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
  networking.useDHCP = lib.mkDefault true;
  # networking.interfaces.enp11s0f0.useDHCP = lib.mkDefault true;
  # networking.interfaces.enp11s0f1.useDHCP = lib.mkDefault true;
  # networking.interfaces.enp14s0f3u4u2.useDHCP = lib.mkDefault true;
  # networking.interfaces.enp7s0.useDHCP = lib.mkDefault true;
  # networking.interfaces.wlp6s0.useDHCP = lib.mkDefault true;

  nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
  hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
}

Ok so first of all have you changed your config after the errors? Because the errors say you use kernel 6.14.3 but in your config you use 6.13.
Also could you post the entire log of nixos-rebuild switch --show-trace.

hello, yes i changed it because i was unable to build otherwise !

the problem come from the openrazer driver that changed and was not backport !

i change of channel to unstable and had the correction!