Commit graph

22 commits

Author SHA1 Message Date
maya
f34a8c24a3 PKGREVISION bump for anything using python without a PYPKGPREFIX.
This is a semi-manual PKGREVISION bump.
2019-04-25 07:32:34 +00:00
maya
45787ad608 sysutils/xen*: invert python version logic, only 2.7 is ok.
Mostly so we don't match python37 on xen 4.11, but also because python3
is a moving target and this saves us having to add the next version.
2018-07-24 17:29:08 +00:00
adam
a31bce9748 extend PYTHON_VERSIONS_ for Python 3.7 2018-07-03 05:03:01 +00:00
jperkin
4942f4e537 xen*: Use SSP_SUPPORTED=no instead of PKGSRC_USE_SSP=no. 2018-01-15 09:47:54 +00:00
bouyer
f73734a7f4 Apply patches from upstream, fixing security issues XSA246 up to XSA251.
Also update patch-XSA240 from upstream, fixing issues in linear page table
handling introduced by the original XSA240 patch.
Bump PKGREVISION
2017-12-15 14:00:44 +00:00
bouyer
4731e7e49e Put back PKGREVISION=1. It was there on purpose, to make it clear that
there are extra (security) patches and it's not the stock 4.6.6 or 4.8.2
2017-10-17 11:10:35 +00:00
wiz
f5539e649d xen*[46]*: reset PKGREVISION after update 2017-10-17 11:02:06 +00:00
bouyer
b014cb462c Update xen*46 to 4.6.6, including fixes up to XSA244.
changes since Xen 4.6.5: mostly bug fixes, including security fixes
for XSA206, XSA211 to XSA244.
PKGREVISION set to 1 to account for the fact that it's not a stock Xen 4.6.6.

Note that, unlike upstream, pv-linear-pt defaults to true, so that
NetBSD PV guests (including dom0) will continue to boot without changes
to boot.cfg
2017-10-17 10:57:34 +00:00
maya
18d0394264 Don't force enable ssp on xenkernel packages. fixes build 2017-07-24 08:53:45 +00:00
joerg
5b9503a263 Merge upstream patches for fixing the build with clang. 2017-05-07 21:21:01 +00:00
bouyer
a3b41ba940 Change http://bits.xensource.com/oss-xen/release/ to
https://downloads.xenproject.org/release/xen/, as new releases won't
be uploaded to bits.xensource.com
2017-04-13 13:08:33 +00:00
spz
400668276a add patch for XSA-212 from upstream
(http://xenbits.xen.org/xsa/advisory-212.html)
2017-04-08 12:17:58 +00:00
bouyer
7a91f7507b Update xenkernel46 and xentools46 to 4.6.5. Changes since 4.6.3:
various bug fixes. Includes all security patches up to and including
XSA-209
2017-03-20 18:17:12 +00:00
joerg
9ed6e87ef5 Disable a couple more warnings for the clang build and merge some
patches from Git to fix another set of issues.
2017-02-14 21:38:34 +00:00
wiz
7f84153239 Add python-3.6 to incompatible versions. 2017-01-01 14:43:22 +00:00
bouyer
876d01aa0b Add patches from upstream fixing XSA-202 and XSA-203
Bump PKGREVISION
2016-12-21 15:36:39 +00:00
gdt
c51d33ba60 Drop i386 from ONLY_FOR_PLATFORM
Xen 4.5 and 4.6 no longer support i386.  Thus, don't try to build
there.

ok bouyer@
2016-12-20 18:15:09 +00:00
bouyer
ddfd3579ca Apply upstream patch for XSA-199, XSA-200 and XSA-204.
Bump PKGREVISIONs
2016-12-20 10:22:28 +00:00
bouyer
92b422d727 Backport upstream patches, fixing today's XSA 191, 192, 193, 195, 197, 198.
Bump PKGREVISIONs
2016-11-22 20:59:01 +00:00
bouyer
f0e3c54177 Apply upstream patches for:
XSA-185: x86: Disallow L3 recursive pagetable for 32-bit PV guests
XSA-186: x86: Mishandling of instruction pointer truncation during emulation
XSA-187: x86 HVM: Overflow of sh_ctxt->seg_reg[]
bump PKGREVISION
2016-09-08 15:44:07 +00:00
wiz
ad0031c15e Remove python33: adapt all packages that refer to it. 2016-07-09 13:03:30 +00:00
jnemeth
a01e6c7670 Xen is a hypervisor which supports running multiple guest operating
systems on a single machine. Guest OSes (also called "domains")
can be either paravirtualised (i.e. make hypercalls in order to
access hardware), run in HVM (Hardware Virtualisation Mode) where
they will be presented with virtual devices, or a combination where
they use hypercalls to access hardware but manage memory themselves.
At boot, the xen kernel is loaded along with the guest kernel for
the first domain (called domain0). domain0 has privileges to access
the physical hardware (PCI and ISA devices), administrate other
domains and provide virtual devices (disks and network) to other
domains.

This package contains the 4.6 Xen kernel itself.  PCI passthrough is
not supported.  PAE is mandatory; on i386 one must use XEN3PAE_DOM[0U].
2016-07-04 07:25:13 +00:00