Commit graph

29 commits

Author SHA1 Message Date
prlw1
4a4c082b66 Fix build with gcc 4.8. 2014-03-29 09:05:51 +00:00
jperkin
45bc40abb4 Remove example rc.d scripts from PLISTs.
These are now handled dynamically if INIT_SYSTEM is set to "rc.d", or
ignored otherwise.
2014-03-11 14:04:57 +00:00
jperkin
374dfca2a5 Fix dependency pattern. 2014-03-03 16:42:00 +00:00
wiz
f14c525815 Add dependency on py-lxml, used by xenapi_create.py.
Dependency reported missing by Kamil Rytarowski <n54@gmx.com> on
pkgsrc-users.

Bump PKGREVISION.
2014-03-02 13:53:18 +00:00
prlw1
39e89a5b6d Update xentools42 to 4.2.4
Removed patch-libxc_xc_dom_h: commited as cb08944a

This fixes the following critical vulnerabilities:

- CVE-2013-2212 / XSA-60 Excessive time to disable caching with HVM guests with
PCI passthrough
- CVE-2013-1442 / XSA-62 Information leak on AVX and/or LWP capable CPUs
- CVE-2013-4355 / XSA-63 Information leaks through I/O instruction emulation
- CVE-2013-4361 / XSA-66 Information leak through fbld instruction emulation
- CVE-2013-4368 / XSA-67 Information leak through outs instruction emulation
- CVE-2013-4369 / XSA-68 possible null dereference when parsing vif ratelimiting
 info
- CVE-2013-4370 / XSA-69 misplaced free in ocaml xc_vcpu_getaffinity stub
- CVE-2013-4371 / XSA-70 use-after-free in libxl_list_cpupool under memory press
ure
- CVE-2013-4375 / XSA-71 qemu disk backend (qdisk) resource leak
- CVE-2013-4416 / XSA-72 ocaml xenstored mishandles oversized message replies
- CVE-2013-4494 / XSA-73 Lock order reversal between page allocation and grant t
able locks
- CVE-2013-4553 / XSA-74 Lock order reversal between page_alloc_lock and mm_rwlo
ck
- CVE-2013-4551 / XSA-75 Host crash due to guest VMX instruction execution
- CVE-2013-4554 / XSA-76 Hypercalls exposed to privilege rings 1 and 2 of HVM gu
ests
- CVE-2013-6375 / XSA-78 Insufficient TLB flushing in VT-d (iommu) code
- CVE-2013-6400 / XSA-80 IOMMU TLB flushing may be inadvertently suppressed
- CVE-2013-6885 / XSA-82 Guest triggerable AMD CPU erratum may cause host hang
- CVE-2014-1642 / XSA-83 Out-of-memory condition yielding memory corruption duri
ng IRQ setup
- CVE-2014-1891 / XSA-84 integer overflow in several XSM/Flask hypercalls
- CVE-2014-1895 / XSA-85 Off-by-one error in FLASK_AVC_CACHESTAT hypercall
- CVE-2014-1896 / XSA-86 libvchan failure handling malicious ring indexes
- CVE-2014-1666 / XSA-87 PHYSDEVOP_{prepare,release}_msix exposed to unprivilege
d guests
- CVE-2014-1950 / XSA-88 use-after-free in xc_cpupool_getinfo() under memory pre
ssure

Apart from those there are many further bug fixes and improvements.
2014-02-22 01:28:23 +00:00
wiz
a1f0ff3f67 No need to have two variables for the same logic.
Replace PYTHON_PATCH_SCRIPTS with REPLACE_PYTHON.
2014-01-25 10:45:15 +00:00
wiz
aa67e11089 Mark packages as not ready for python-3.x where applicable;
either because they themselves are not ready or because a
dependency isn't. This is annotated by
PYTHON_VERSIONS_INCOMPATIBLE=  33 # not yet ported as of x.y.z
or
PYTHON_VERSIONS_INCOMPATIBLE=  33 # py-foo, py-bar
respectively, please use the same style for other packages,
and check during updates.

Use versioned_dependencies.mk where applicable.
Use REPLACE_PYTHON instead of handcoded alternatives, where applicable.
Reorder Makefile sections into standard order, where applicable.

Remove PYTHON_VERSIONS_INCLUDE_3X lines since that will be default
with the next commit.

Whitespace cleanups and other nits corrected, where necessary.
2014-01-25 10:29:56 +00:00
prlw1
cd14e22ceb Use native shm_open on newer NetBSD/current. As per joerg@'s fix for
xentools41.
2014-01-07 12:59:35 +00:00
riz
d6c75ae159 add patch from upstream to fix a regression which made that the symbol
table of NetBSD domU kernels was not loaded correctly, see
http://mail-index.netbsd.org/port-xen/2013/11/29/msg008157.html
for details
bump PKGREV
2013-12-08 19:17:56 +00:00
jnemeth
ea60818c85 The xendomains rc.d script should only depend on xencommons. 2013-12-02 20:38:12 +00:00
joerg
3d4dd76d69 Catch up with Clang ToT when it comes to various warnings and
unsupported options.
2013-11-07 00:47:39 +00:00
joerg
91b8232876 Fix header guard. 2013-11-07 00:46:39 +00:00
jaapb
15a89b35db Revision bump associated with the update of lang/ocaml to version 4.01. 2013-11-01 11:30:21 +00:00
prlw1
ae8a049aec Update xen to 4.2.3
- Add warning if /kern/xen/privcmd is not readable

Fixes the following critical vulnerabilities:
 * CVE-2013-1918 / XSA-45:
    Several long latency operations are not preemptible
 * CVE-2013-1952 / XSA-49:
    VT-d interrupt remapping source validation flaw for bridges
 * CVE-2013-2076 / XSA-52:
    Information leak on XSAVE/XRSTOR capable AMD CPUs
 * CVE-2013-2077 / XSA-53:
    Hypervisor crash due to missing exception recovery on XRSTOR
 * CVE-2013-2078 / XSA-54:
    Hypervisor crash due to missing exception recovery on XSETBV
 * CVE-2013-2194, CVE-2013-2195, CVE-2013-2196 / XSA-55:
    Multiple vulnerabilities in libelf PV kernel handling
 * CVE-2013-2072 / XSA-56:
    Buffer overflow in xencontrol Python bindings affecting xend
 * CVE-2013-2211 / XSA-57:
    libxl allows guest write access to sensitive console related xenstore keys
 * CVE-2013-1432 / XSA-58:
    Page reference counting error due to XSA-45/CVE-2013-1918 fixes
 * XSA-61:
    libxl partially sets up HVM passthrough even with disabled iommu

The following minor vulnerability is also being addressed:
 * CVE-2013-2007 / XSA-51
    qemu guest agent (qga) insecure file permissions

Among many bug fixes and improvements:
 * addressing a regression from the fix for XSA-46
 * bug fixes to low level system state handling, including certain
    hardware errata workarounds
2013-09-12 23:37:18 +00:00
jklos
958958b1f2 Revert PLIST. Problem is caused by PKG_DEVELOPER. 2013-07-08 17:49:32 +00:00
jklos
b7772cc6bf Added files missing from PLIST. 2013-07-08 07:53:11 +00:00
wiz
8c85ca2647 Fix paths for some perl scripts. 2013-06-17 13:55:38 +00:00
wiz
89872abd89 Fix remaining issue with perl-5.18's pod2man. 2013-06-17 13:54:02 +00:00
wiz
c4f2fe8435 Fix some fallout with perl-5.18's pod2man.
qemu.pod is still broken, but it's generated with texinfo somehow.
2013-06-17 13:47:20 +00:00
wiz
b4dd710e80 Replace py-curses/buildlink3.mk with DEPENDS.
There are no buildlink3-relevant files here, just a loadable module.
2013-06-04 07:38:49 +00:00
wiz
d2ca14a3f1 Bump all packages for perl-5.18, that
a) refer 'perl' in their Makefile, or
b) have a directory name of p5-*, or
c) have any dependency on any p5-* package

Like last time, where this caused no complaints.
2013-05-31 12:39:57 +00:00
prlw1
519f284b7b Build fixes 2013-05-27 22:26:27 +00:00
bouyer
13af998808 Build and install HVM-related files. Good enough to boot the NetBSD 6.1
i386 CD and do a network install.
Bump PKGREVISION
2013-05-26 20:27:43 +00:00
jnemeth
f22b95f732 no need to mkdir -p X and X/Y 2013-05-26 06:52:38 +00:00
jnemeth
fc32d6e6dd add /var/run/xen to list of directories to create 2013-05-26 06:52:13 +00:00
jnemeth
108103aad1 Some general package cleanups:
- added to MESSAGE advising of rc.d script changes
- added BASH as a tool
- fixed pygrub install so that it doesn't get overwritten with a symlink
- turned oxenstored.conf into a proper config file
2013-05-25 05:19:17 +00:00
jnemeth
e4a66043cb Add bash to TOOLS, but hold off on PKGREVISION as another bug fix should
be going in very soon.
2013-05-22 05:32:43 +00:00
jnemeth
872b74145b add a note about rc.d scripts being updated 2013-05-19 22:18:05 +00:00
jnemeth
c5ee69a5c1 Initial import of Xen 4.2: this is the tools part. This is mostly
functional for PV domains.  Support for HVM domains and grant tables
is still to come.  Note that xm/xend is deprecated in this version.
You should switch to using xl (which is tested to be working) if
you can.

----- 4.2.2

Xen 4.2.2 is a maintenance release in the 4.2 series and contains:
We recommend that all users of Xen 4.2.1 upgrade to Xen 4.2.2.

    This release fixes the following critical vulnerabilities:
        CVE-2012-5634 / XSA-33: VT-d interrupt remapping source
            validation flaw
        CVE-2013-0151 / XSA-34: nested virtualization on 32-bit
            exposes host crash
        CVE-2013-0152 / XSA-35: Nested HVM exposes host to being
            driven out of memory by guest
        CVE-2013-0153 / XSA-36: interrupt remap entries shared and
            old ones not cleared on AMD IOMMUs
        CVE-2013-0154 / XSA-37: Hypervisor crash due to incorrect
            ASSERT (debug build only)
        CVE-2013-0215 / XSA-38: oxenstored incorrect handling of
            certain Xenbus ring states
        CVE-2012-6075 / XSA-41: qemu (e1000 device driver): Buffer
            overflow when processing large packets
        CVE-2013-1917 / XSA-44: Xen PV DoS vulnerability with SYSENTER
        CVE-2013-1919 / XSA-46: Several access permission issues with
            IRQs for unprivileged guests
        CVE-2013-1920 / XSA-47: Potential use of freed memory in event
            channel operations
        CVE-2013-1922 / XSA-48: qemu-nbd format-guessing due to missing
            format specification

    This release contains many bug fixes and improvements (around
    100 since Xen 4.2.1). The highlights are:

        ACPI APEI/ERST finally working on production systems
        Bug fixes for other low level system state handling
        Bug fixes and improvements to the libxl tool stack
        Bug fixes to nested virtualization

----- 4.2.1

Xen 4.2.1 is a maintenance release in the 4.2 series and contains:
We recommend that all users of Xen 4.2.0 upgrade to Xen 4.2.1.

    The release fixes the following critical vulnerabilities:
        CVE-2012-4535 / XSA-20: Timer overflow DoS vulnerability
        CVE-2012-4537 / XSA-22: Memory mapping failure DoS
            vulnerability
        CVE-2012-4538 / XSA-23: Unhooking empty PAE entries DoS
            vulnerability
        CVE-2012-4539 / XSA-24: Grant table hypercall infinite
            loop DoS vulnerability
        CVE-2012-4544, CVE-2012-2625 / XSA-25: Xen domain builder
            Out-of-memory due to malicious kernel/ramdisk
        CVE-2012-5510 / XSA-26: Grant table version switch list
            corruption vulnerability
        CVE-2012-5511 / XSA-27: Several HVM operations do not
            validate the range of their inputs
        CVE-2012-5513 / XSA-29: XENMEM_exchange may overwrite
            hypervisor memory
        CVE-2012-5514 / XSA-30: Broken error handling in
            guest_physmap_mark_populate_on_demand()
        CVE-2012-5515 / XSA-31: Several memory hypercall operations
            allow invalid extent order values
        CVE-2012-5525 / XSA-32: several hypercalls do not validate
            input GFNs

    Among many bug fixes and improvements (around 100 since Xen 4.2.0):
        A fix for a long standing time management issue
        Bug fixes for S3 (suspend to RAM) handling
        Bug fixes for other low level system state handling
        Bug fixes and improvements to the libxl tool stack
        Bug fixes to nested virtualization

----- 4.2.0

The Xen 4.2 release contains a number of important new features
and updates including:

The release incorporates many new features and improvements to
existing features. There are improvements across the board including
to Security, Scalability, Performance and Documentation.

    XL is now the default toolstack: Significant effort has gone
in to the XL tool toolstack in this release and it is now feature
complete and robust enough that we have made it the default. This
toolstack can now replace xend in the majority of deployments, see
XL vs Xend Feature Comparison. As well as improving XL the underlying
libxl library has been significantly improved and supports the
majority of the most common toolstack features. In addition the
API has been declared stable which should make it even easier for
external toolstack such as libvirt and XCP's xapi to make full use
of this functionality in the future.

    Large Systems: Following on from the improvements made in 4.1
Xen now supports even larger systems, with up to 4095 host CPUs
and up to 512 guest CPUs. In addition toolstack feature like the
ability to automatically create a CPUPOOL per NUMA node and more
intelligent placement of guest VCPUs on NUMA nodes have further
improved the Xen experience on large systems.  Other new features,
such as multiple PCI segment support have also made a positive
impact on such systems.

    Improved security:  The XSM/Flask subsystem has seen several
enhancements, including improved support for disaggregated systems
and a rewritten example policy which is clearer and simpler to
modify to suit local requirements.

    Documentation: The Xen documentation has been much improved,
both the in-tree documentation and the wiki. This is in no small
part down to the success of the Xen Document Days so thanks to all
who have taken part.
2013-05-15 06:58:50 +00:00