Commit graph

18 commits

Author SHA1 Message Date
gdt
472299c9bb sysutils/xen: Explain security/recommended status in DESCR 2019-12-17 20:26:04 +00:00
bouyer
e0e59dddc8 Update Xen 4.8 packages to 4.8.5. Changes since 4.8.3:
- security patch up to and including XSA-282
- others bug fixes, code cleanup and minor improvements

Note that this includes a patch to xen/arch/x86/mm.c which removes
a new ASSERT() firing when shutting down a 64bit NetBSD guest.
2019-08-30 13:23:09 +00:00
nia
0ccb7a47bf Use https for xenproject.org. 2019-07-15 16:24:18 +00:00
maya
f34a8c24a3 PKGREVISION bump for anything using python without a PYPKGPREFIX.
This is a semi-manual PKGREVISION bump.
2019-04-25 07:32:34 +00:00
maya
45787ad608 sysutils/xen*: invert python version logic, only 2.7 is ok.
Mostly so we don't match python37 on xen 4.11, but also because python3
is a moving target and this saves us having to add the next version.
2018-07-24 17:29:08 +00:00
adam
a31bce9748 extend PYTHON_VERSIONS_ for Python 3.7 2018-07-03 05:03:01 +00:00
bouyer
a22bf64f8d Update xen 4.8 packages to 4.8.3. Changes since 4.8.2: include patches from
all security advisory up to and including XSA254.

While there pass XEN_VENDORVERSION=nb${PKGREVISION} to make so that
'xl info' shows the NetBSD PKGREVISION. If PKGREVISION is not available,
define this as 'nb0'.
2018-01-24 23:29:32 +00:00
bouyer
e43adb8e07 Add patches from upstream, from xsa254/README.pti :
> This README gives references for one of three mitigation strategies
> for Meltdown.

> This series is a first-class migitation pagetable isolation series for
> Xen.  It is available for Xen 4.6 to Xen 4.10 and later.

bump PKGREVISION
2018-01-18 10:28:13 +00:00
jperkin
4942f4e537 xen*: Use SSP_SUPPORTED=no instead of PKGSRC_USE_SSP=no. 2018-01-15 09:47:54 +00:00
bouyer
f73734a7f4 Apply patches from upstream, fixing security issues XSA246 up to XSA251.
Also update patch-XSA240 from upstream, fixing issues in linear page table
handling introduced by the original XSA240 patch.
Bump PKGREVISION
2017-12-15 14:00:44 +00:00
bouyer
4731e7e49e Put back PKGREVISION=1. It was there on purpose, to make it clear that
there are extra (security) patches and it's not the stock 4.6.6 or 4.8.2
2017-10-17 11:10:35 +00:00
wiz
f5539e649d xen*[46]*: reset PKGREVISION after update 2017-10-17 11:02:06 +00:00
bouyer
17b19337bc Update xentools48 and xenkernel48 to 4.8.2, and apply security patches up
to XSA244. Keep PKGREVISION to 1 to account for the fact that it's
not a stock Xen 4.8.2.

Note that, unlike upstream, pv-linear-pt defaults to true, so that
NetBSD PV guests (including dom0) will continue to boot without changes
to boot.cfg
2017-10-17 08:42:30 +00:00
maya
18d0394264 Don't force enable ssp on xenkernel packages. fixes build 2017-07-24 08:53:45 +00:00
joerg
8177feba64 Restrict -falign-functions to GCC. 2017-06-17 19:53:10 +00:00
bouyer
a3b41ba940 Change http://bits.xensource.com/oss-xen/release/ to
https://downloads.xenproject.org/release/xen/, as new releases won't
be uploaded to bits.xensource.com
2017-04-13 13:08:33 +00:00
spz
eb10b3a907 adding patch for XSA-212 from upstream
(http://xenbits.xen.org/xsa/advisory-212.html)
2017-04-08 12:30:42 +00:00
bouyer
85b996c375 Add xenkerne48 and xentools48, version 4.8.0.
This includes stub domains support, but it should be considered
experimental at this time. Stub domains hangs with serial ports,
or more more than one virual disk (multiple virtual ethernet have not been
tested).
2017-03-30 09:15:09 +00:00