Commit graph

5169 commits

Author SHA1 Message Date
Vladimír Čunát
e757404555 Merge branch 'master' into staging
Hydra nixpkgs: ?compare=1279790
2016-06-19 12:33:04 +02:00
Vladimír Čunát
97c484a10f treewide: fix #include errors after gcc-5.4
They were mostly missing <cmath> or <math.h>.
2016-06-19 10:18:30 +02:00
Aristid Breitkreuz
6a3dcb70bc Merge pull request #16112 from abuibrahim/master
odp-dpdk: init at 1.8.0.0
2016-06-18 17:09:13 +02:00
Joachim Fasting
875fd5af73
grsecurity: 4.5.7-201606110914 -> 4.5.7-201606142010 2016-06-16 14:29:12 +02:00
Ruslan Babayev
de67e77e3f odp-dpdk: init at 1.8.0.0
Signed-off-by: Ruslan Babayev <ruslan@babayev.com>
2016-06-15 22:17:03 -07:00
Joachim Fasting
130b06eb0b
grsecurity: 4.5.7-201606080852 -> 4.5.7-201606110914 2016-06-14 14:18:01 +02:00
Joachim Fasting
886c03ad2e Merge pull request #16107 from joachifm/grsec-ng
Rework grsecurity support
2016-06-14 03:52:50 +02:00
Joachim Fasting
75b9a7beac
grsecurity: implement a single NixOS kernel
This patch replaces the old grsecurity kernels with a single NixOS
specific grsecurity kernel.  This kernel is intended as a general
purpose kernel, tuned for casual desktop use.

Providing only a single kernel may seem like a regression compared to
offering a multitude of flavors.  It is impossible, however, to
effectively test and support that many options.  This is amplified by
the reality that very few seem to actually use grsecurity on NixOS,
meaning that bugs go unnoticed for long periods of time, simply because
those code paths end up never being exercised.  More generally, it is
hopeless to anticipate imagined needs.  It is better to start from a
solid foundation and possibly add more flavours on demand.

While the generic kernel is intended to cover a wide range of use cases,
it cannot cover everything.  For some, the configuration will be either
too restrictive or too lenient.  In those cases, the recommended
solution is to build a custom kernel --- this is *strongly* recommended
for security sensitive deployments.

Building a custom grsec kernel should be as simple as
```nix
linux_grsec_nixos.override {
  extraConfig = ''
    GRKERNSEC y
    PAX y
    # and so on ...
  '';
}
```

The generic kernel should be usable both as a KVM guest and host.  When
running as a host, the kernel assumes hardware virtualisation support.
Virtualisation systems other than KVM are *unsupported*: users of
non-KVM systems are better served by compiling a custom kernel.

Unlike previous Grsecurity kernels, this configuration disables `/proc`
restrictions in favor of `security.hideProcessInformation`.

Known incompatibilities:
- ZFS: can't load spl and zfs kernel modules; claims incompatibility
  with KERNEXEC method `or` and RAP; changing to `bts` does not fix the
  problem, which implies we'd have to disable RAP as well for ZFS to
  work
- `kexec()`: likely incompatible with KERNEXEC (unverified)
- Xen: likely incompatible with KERNEXEC and UDEREF (unverified)
- Virtualbox: likely incompatible with UDEREF (unverified)
2016-06-14 00:08:20 +02:00
zimbatm
ae34904ee9 Merge pull request #16160 from vrthra/mupdf
mupdf: 1.8 -> 1.9
2016-06-12 23:26:34 +01:00
Christoph Hrdinka
473062c9a7 kmod-debian-aliases: 21-1 -> 22-1.1 2016-06-12 20:15:42 +02:00
Rahul Gopinath
b8a525a8b6 jfbview: update mupdf 1.8 -> 1.9 2016-06-12 09:48:34 -07:00
Joachim Fasting
4ae5eb97f1
kernel: set virtualization options regardless of grsec
Per my own testing, the NixOS grsecurity kernel works both as a
KVM-based virtualisation host and guest; there appears to be no good
reason to making these conditional on `features.grsecurity`.

More generally, it's unclear what `features.grsecurity` *means*. If
someone configures a grsecurity kernel in such a fashion that it breaks
KVM support, they should know to disable KVM themselves.
2016-06-10 19:27:59 +02:00
Joachim Fasting
d8e4432fe2
kernel: unconditionally disable /dev/kmem
This was presumably set for grsecurity compatibility, but now appears
redundant.  Grsecurity does not expect nor require /dev/kmem to be
present and so it makes little sense to continue making its inclusion in
the standard kernel dependent on grsecurity.

More generally, given the large number of possible grsecurity
configurations, it is unclear what `features.grsecurity` even
*means* and its use should be discouraged.
2016-06-10 19:27:41 +02:00
Shea Levy
4fbafb2395 linux 4.6.1 -> 4.6.2 2016-06-10 09:30:11 -04:00
Joachim Fasting
edc36a0091
grsecurity: 4.5.6-201606051644 -> 4.5.7-201606080852 2016-06-09 15:40:06 +02:00
Vladimír Čunát
20c2ce4954 Merge #16045: kernel: 4.6.0 -> 4.6.1 2016-06-09 14:37:32 +02:00
Vladimír Čunát
c0895be3ee Merge #16044: kernel: 4.1.20 -> 4.1.25 2016-06-09 14:36:31 +02:00
Vladimír Čunát
f9310c2eee Merge #16043: kernel: 4.4.11 -> 4.4.12 2016-06-09 14:34:50 +02:00
Joachim Fasting
7a29c403fd Merge pull request #16046 from NeQuissimus/kernel456
kernel: 4.5.5 -> 4.5.6
2016-06-09 13:56:13 +02:00
Ruslan Babayev
ff8362aeb4 pktgen: build with the same CFLAGS as dpdk 2016-06-07 20:11:50 -07:00
Tuomas Tynkkynen
f2e6c25dc9 fusionio: Use makeLibraryPath 2016-06-07 21:18:10 +03:00
Tim Steinbach
269b7d30a7 kernel: 4.6.0 -> 4.6.1 2016-06-07 09:59:19 -04:00
Tim Steinbach
8f4755a0ae kernel: 4.5.5 -> 4.5.6 2016-06-07 09:58:24 -04:00
Tim Steinbach
a57cbf6546 kernel: 4.4.11 -> 4.4.12 2016-06-07 09:57:47 -04:00
Tim Steinbach
f3ebf13762 kernel: 4.1.20 -> 4.1.25 2016-06-07 09:57:07 -04:00
Joachim Fasting
72899d92d0
grsecurity: 4.5.5-201605291201 -> 4.5.6-201606051644 2016-06-07 15:04:24 +02:00
Tobias Geerinckx-Rice
0264d34058
mcelog: 137 -> 138 2016-06-07 12:49:26 +02:00
Tuomas Tynkkynen
bac26e08db Fix lots of fetchgit hashes (fallout from #15469) 2016-06-03 17:17:08 +03:00
Alexander Kjeldaas
4c99d22f19 kernel: set nx bit on module ro segments
Fixes #4757.
2016-06-03 15:41:47 +02:00
Joachim Fasting
45c6dee427 Merge pull request #15884 from grahamc/nvidia-x11
nvidia-x11: 361.42 -> 361.45.11
2016-06-02 23:26:39 +02:00
Domen Kožar
55b8868baf Merge pull request #15919 from abuibrahim/master
dpdk: refactor to allow building extapps
2016-06-02 17:25:53 +01:00
Tuomas Tynkkynen
06c0209d53 systemd: Disable systemd-boot on ARM
Temporary workaround for the EFI stuff not working.
2016-06-02 14:54:44 +03:00
Ruslan Babayev
6d3fcd33d7 pktgen: init at 3.0.00 2016-06-02 02:12:06 -07:00
Ruslan Babayev
49b985b241 dpdk: make primary output usable as RTE_SDK 2016-06-02 02:12:06 -07:00
Ruslan Babayev
7334e925b4 dpdk: separate kernel modules 2016-06-02 02:12:06 -07:00
Ruslan Babayev
9f3c0f9716 dpdk: move apps to examples output 2016-06-02 02:12:06 -07:00
Ruslan Babayev
6a7f257e88 dpdk: install examples to bin 2016-06-02 02:12:06 -07:00
Ruslan Babayev
e54ef8bb16 dpdk: add dependencies for vm_power_mgr example 2016-06-02 02:12:06 -07:00
Graham Christensen
180417f385
nvidia-x11: 361.42 -> 361.45.11 2016-05-31 22:23:54 -05:00
Tobias Pflug
68b0f2f500 reattach-to-user-namespace: fix sha (#15871) 2016-06-01 01:40:50 +02:00
Franz Pletz
d3e0849785 batman-adv: 2016.0 -> 2016.1 2016-05-31 20:10:26 +02:00
Eelco Dolstra
66d5ca6f42 systemd: Build EFI image 2016-05-31 17:02:33 +02:00
Bjørn Forsman
2661511cdb bluez: 5.39 -> 5.40
A bugfix release:
http://www.bluez.org/release-of-bluez-5-40/

(I've tested this with nox-review; no new breakage.)
2016-05-30 20:56:59 +02:00
Joachim Fasting
bfefc54bc5
grsecurity: 4.5.5-201605211442 -> 4.5.5-201605291201 2016-05-29 20:34:24 +02:00
Marius Bakke
4561a649f4 openvswitch: 2.3.1 -> 2.5.0 (#15729) 2016-05-28 16:02:04 +02:00
rnhmjoj
862ccab89c
btfs: 2.8 -> 2.9 2016-05-28 15:21:15 +02:00
Thomas Tuegel
fe57d54992 Merge pull request #15733 from mbakke/bluez-5.39
bluez5: 5.37 -> 5.39
2016-05-28 07:24:44 -05:00
Vladimír Čunát
e4832c7541 Merge branch 'staging'
Includes a security update of libxml2.
2016-05-27 15:58:40 +02:00
Luca Bruno
663beaa79f Revert "Revert "systemd: 229 -> 230""
This reverts commit 11894782ed.

cc @edolstra, re-reverting. Looks like it's an intended systemd change.
2016-05-27 11:07:29 +02:00
Luca Bruno
11894782ed Revert "systemd: 229 -> 230"
This reverts commit a2f21a54a1.

cc @edolstra the new version does not install many .pc files
like login, journal, daemon, ...
2016-05-27 11:06:21 +02:00