Commit graph

7 commits

Author SHA1 Message Date
bouyer
7a91f7507b Update xenkernel46 and xentools46 to 4.6.5. Changes since 4.6.3:
various bug fixes. Includes all security patches up to and including
XSA-209
2017-03-20 18:17:12 +00:00
joerg
9ed6e87ef5 Disable a couple more warnings for the clang build and merge some
patches from Git to fix another set of issues.
2017-02-14 21:38:34 +00:00
bouyer
876d01aa0b Add patches from upstream fixing XSA-202 and XSA-203
Bump PKGREVISION
2016-12-21 15:36:39 +00:00
bouyer
ddfd3579ca Apply upstream patch for XSA-199, XSA-200 and XSA-204.
Bump PKGREVISIONs
2016-12-20 10:22:28 +00:00
bouyer
92b422d727 Backport upstream patches, fixing today's XSA 191, 192, 193, 195, 197, 198.
Bump PKGREVISIONs
2016-11-22 20:59:01 +00:00
bouyer
f0e3c54177 Apply upstream patches for:
XSA-185: x86: Disallow L3 recursive pagetable for 32-bit PV guests
XSA-186: x86: Mishandling of instruction pointer truncation during emulation
XSA-187: x86 HVM: Overflow of sh_ctxt->seg_reg[]
bump PKGREVISION
2016-09-08 15:44:07 +00:00
jnemeth
a01e6c7670 Xen is a hypervisor which supports running multiple guest operating
systems on a single machine. Guest OSes (also called "domains")
can be either paravirtualised (i.e. make hypercalls in order to
access hardware), run in HVM (Hardware Virtualisation Mode) where
they will be presented with virtual devices, or a combination where
they use hypercalls to access hardware but manage memory themselves.
At boot, the xen kernel is loaded along with the guest kernel for
the first domain (called domain0). domain0 has privileges to access
the physical hardware (PCI and ISA devices), administrate other
domains and provide virtual devices (disks and network) to other
domains.

This package contains the 4.6 Xen kernel itself.  PCI passthrough is
not supported.  PAE is mandatory; on i386 one must use XEN3PAE_DOM[0U].
2016-07-04 07:25:13 +00:00