about summary refs log tree commit diff
path: root/pkgs/applications/virtualization/qemu
AgeCommit message (Collapse)AuthorFilesLines
2021-02-08qemu: rename VERSION to QEMU_VERSION to avoid name clashIvan Babrou1-0/+4
In libc++ starting with LLVM8 there's `<version>` include in `cstddef`: The following things also align: * QEMU has a file called `VERSION` in repo root * QEMU prepends repo root to include path in build * macOS has a case-insensetive filesystem All of this combined means that `VERSION` file is included as a header. Working around this be renaming `VERSION` -> `QEMU_VERSION` to resolve ambiguity. The problem really only appears on `aarch64-darwin`, since on `x86_64-darwin` there are no C++ files to compile. The workaround is harmless enough to apply.
2021-02-08qemu: do not force x86_64 cpu on darwinIvan Babrou1-2/+0
This change produces the following warning: ``` ... configure: line 619: sysctl: command not found ``` It's benign and sysctl is only useful on MacOS X Leopard: * https://github.com/qemu/qemu/blob/v5.2.0/configure#L615-L621 Leopard is 13 years old and is not supported by Nix. The sysctl check is removed in qemu master branch already. Plus aarch64-darwin is coming in #105026, so there's no reason to force x86_64.
2021-01-25qemu: fix build when desktop file does not exist (#110721)Milan1-1/+1
The qemu-user variants as used by binfmt emulation through `(lib.systems.elaborate lib.systems.examples.aarch64-multiplatform).emulator pkgs` does not install a .desktop file since qemu 5.2.0. This change allows the build to continue if deletion of the desktop file fails.
2021-01-19qemu: 5.1.0 -> 5.2.0Drew Risinger3-81/+12
Updates to latest version of QEMU. The build system has changed to ninja. There are several configuration flags that aren't enabled. I will defer to maintainers on those. Adds autoPatchelfHook for patching output dynamically linked binaries. qemu: use Nix's meson vs bundled qemu: remove custom directory locations It appears that these directories are no longer automatically prefixed with $out/, so they are now trying to write to the system /etc/, /var/ directories, which is not permitted in sandbox. The default directories seem to work OK, so using those.
2021-01-17Merge pull request #95274 from misuzu/qemu-iscsiSandro1-0/+3
2021-01-16pkgs/applications: pkgconfig -> pkg-configBen Siraphob1-2/+2
2021-01-15pkgs/applications: stdenv.lib -> libBen Siraphob1-5/+5
2021-01-11treewide: with stdenv.lib; in meta -> with lib;Profpatsch1-4/+4
Part of: https://github.com/NixOS/nixpkgs/issues/108938 meta = with stdenv.lib; is a widely used pattern. We want to slowly remove the `stdenv.lib` indirection and encourage people to use `lib` directly. Thus let’s start with the meta field. This used a rewriting script to mostly automatically replace all occurances of this pattern, and add the `lib` argument to the package header if it doesn’t exist yet. The script in its current form is available at https://cs.tvl.fyi/depot@2f807d7f141068d2d60676a89213eaa5353ca6e0/-/blob/users/Profpatsch/nixpkgs-rewriter/default.nix
2020-12-29qemu: libiscsi supportmisuzu1-0/+3
2020-12-01qemu: fix CVE-2020-28916Martin Weinelt1-0/+6
While receiving packets via e1000e_write_packet_to_guest an infinite loop could be triggered if the receive descriptor had a NULL buffer address. A privileged guest user could use this to induce a DoS Scenario. Fixes: CVE-2020-28916
2020-11-28qemu: fix CVE-2020-29129, CVE-2020-29130 in vendored libslirpMartin Weinelt1-0/+9
Fixes out-of-bounds access in libslirp while processing ARP/NCSI packets. Fixes: CVE-2020-29129, CVE-2020-29130
2020-11-02qemu: apply patch for CVE-2020-27617Martin Weinelt2-0/+44
An assert(3) failure issue was found in the networking helper functions of QEMU. It could occur in the eth_get_gso_type() routine, if a packet does not have a valid networking L3 protocol (ex. IPv4, IPv6) value. A guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario. Fixes: CVE-2020-27617
2020-10-19qemu: make ncurses optional for the test runnerAndreas Rammhold1-2/+4
This shaves another 3MB off the closure size of QEMU.
2020-10-19qemu: strip down the features for the test runnerAndreas Rammhold1-7/+8
This allows much faster VM-test based systemd testing as the closure of qemu suddenly shrinks to reasonable sizes again.
2020-08-23qemu: adds tpm supportArthur Gautier1-0/+2
2020-08-16qemu: 5.0.0 -> 5.1.0misuzu1-2/+2
2020-08-11Merge pull request #95203 from alyssais/qemuworldofpeace1-1/+5
qemu-utils: install man pages
2020-08-11qemu-utils: install man pagesAlyssa Ross1-1/+5
2020-07-22qemu: drop invalid and redundant qemu.desktopPeter Hoeg1-9/+12
2020-06-11qemu-utils: inherit meta data from qemuMarkus Kowalewski1-0/+2
2020-06-04Merge master into staging-nextFrederik Rietdijk1-4/+10
2020-06-01qemu: wrap GTK binariesFlorian Klink1-4/+10
Applications using a different GTK version than the user session don't work well, and people often run NixOS VM tests on different channels. Wrapping these GTK binaries is a common way to fix this. Fixes #69158
2020-05-19qemu: 4.2.0 -> 5.0.0Scott Worley2-49/+27
2020-04-10treewide: Per RFC45, remove all unquoted URLsMichael Reilly1-4/+4
2020-02-01qemu: add patches for CVE-2020-7039 and CVE-2020-7211Andrew Dunham1-0/+31
Fixes #78762
2019-12-19qemu: add patch for CVE-2019-15890Robert Scott1-0/+7
2019-12-18qemu: 4.1.0 -> 4.2.0Robert Scott2-8/+7
2019-11-05qemu: name -> pnamehyperfekt1-5/+4
2019-10-02Merge pull request #58471 from colemickens/cuJoachim F1-0/+16
cloud-utils: use `qemu-utils` instead of `qemu`
2019-08-17qemu: 4.0.0 -> 4.1.0Izorkin2-25/+8
2019-07-03qemu: fix documentationNikolay Amiantov1-2/+3
2019-06-17Merge pull request #62167 from matthewbauer/alias-libglMatthew Bauer1-2/+2
Add libGL* aliases
2019-06-17treewide: mesa_noglu, mesa_drivers, libGL_driver -> mesaMatthew Bauer1-2/+2
Just use mesa for these to be more clear. Move these to aliases.nix
2019-06-15qemu: CVE-2019-12155Marek Mahut1-0/+5
2019-05-21Merge pull request #60133 from dtzWill/update/qemu-4.0.0Will Dietz3-44/+19
qemu: 3.1.0 -> 4.0.0
2019-04-27qemu: fix cross (#60261)volth1-2/+3
2019-04-23qemu: drop fix-hda-recording.patch, appears applied upstreamWill Dietz2-35/+0
(across multiple commits, maybe?)
2019-04-23qemu: fix patch, drop CVE patch includedWill Dietz2-7/+17
2019-04-23qemu: 3.1.0 -> 4.0.0Will Dietz1-2/+2
2019-03-27qemu-utils: initCole Mickens1-0/+16
2019-03-20qemu: apply CVE-2019-3812 patchAndreas Rammhold1-0/+5
2019-03-18qemu: Apply interim fix for overlayfs + O_NOATIMEaszlig2-0/+45
Our VM tests and everything related to our virtualisation infrastructure is currently broken if used with kernel 4.19 or later. The reason for this is that since 4.19, overlayfs uses the O_NOATIME flag when opening files in lowerdir and this doesn't play nice with the way we pass the Nix store to our QEMU guests. On a NixOS system, paths in the Nix store are typically owned by root but the QEMU process is usually run by an ordinary user. Using O_NOATIME on a file where you're not the owner (or superuser) will return with EPERM (Operation not permitted). This is exactly what happens in our VM tests, because we're using overlayfs in the guests to allow writes to the store. Another implication of this is that the default kernel version for NixOS 19.03 has been reverted to Linux 4.14. Work on getting this upstream is still ongoing and the patch I posted previously was incomplete, needs rework and also some more review from upstream maintainers - in summary: This will take a while. So instead of rushing in a kernel patch to nixpkgs, which will affect all users of overlayfs, not just NixOS VM tests, I opted to patch QEMU for now to ignore the O_NOATIME flag in 9p. I think this is also the least impacting change, because even if you care about whether access times are written or not, you get the same behaviour as with Linux 4.19 in conjunction with QEMU. Signed-off-by: aszlig <aszlig@nix.build> Fixes: https://github.com/NixOS/nixpkgs/issues/54509
2019-02-12qemu: Add support for the Hypervisor framework on DarwinMarcus Geiger1-2/+3
This provides macOS native hardware acceleration to Qemu.
2019-02-06qemu: Add argument to enable support for ceph rbd storageDaniel Kuehn1-0/+3
2018-12-25vte, vte_290, vte-ng: rename frome gnome3.vte*worldofpeace1-2/+2
2018-12-22treewide: remove paxutils from stdenvJörg Thalheim1-3/+0
More then one year ago we removed grsecurity kernels from nixpkgs: https://github.com/NixOS/nixpkgs/pull/25277 This removes now also paxutils from stdenv.
2018-12-15qemu: 3.0.0 -> 3.1.0volth1-2/+2
2018-11-29treewide: add emulator to platformMatthew Bauer1-12/+12
You can use stdenv.hostPlatform.emulator to get an executable that runs cross-built binaries. This could be any emulator. For instance, we use QEMU to emulate Linux targets and Wine to emulate Windows targets. To work with qemu, we need to support custom targets. I’ve reworked the cross tests in pkgs/test/cross to use this functionality. Also, I’ve used talloc to cross-execute with the emulator. There appears to be a cross-execute for all waf builds. In the future, it would be nice to set this for all waf builds. Adds stdenv.hostPlatform.qemuArch attrbute to get the qemuArch for each platform.
2018-10-12qemu: enable smartcard supportYegor Timoshenko1-0/+3
2018-09-10qemu: port musl patch to new version (#46449)Will Dietz2-4/+31