Commit graph

73 commits

Author SHA1 Message Date
roy
efac81bf62 Move to the curses framework. 2017-01-03 18:55:43 +00:00
wiz
7f84153239 Add python-3.6 to incompatible versions. 2017-01-01 14:43:22 +00:00
jaapb
11a6e0d383 Recursive revbump associated with ocaml update to 4.04. 2016-12-30 11:16:56 +00:00
bouyer
ddfd3579ca Apply upstream patch for XSA-199, XSA-200 and XSA-204.
Bump PKGREVISIONs
2016-12-20 10:22:28 +00:00
bouyer
76261625f6 Backport upstream patches, fixing today's XSA 191, 192, 195, 197, 198.
Bump PKGREVISIONs
2016-11-22 20:53:40 +00:00
joerg
819ecd5e0f OCAML has switched to using normal uint32_t, so follow here. 2016-10-01 13:07:23 +00:00
wiz
ad0031c15e Remove python33: adapt all packages that refer to it. 2016-07-09 13:03:30 +00:00
wiz
73716d23de Bump PKGREVISION for perl-5.24.0 for everything mentioning perl. 2016-07-09 06:38:30 +00:00
abs
4fe8cbe34a Update pkgsrc pod2man usage for perl v5.24.
No pkgrevision bump as no functional change if package built
2016-06-12 18:49:43 +00:00
bad
f6b41cc9d7 Use "stat -L" to determine the physical device. Now one can use lvm's
/dev/vgXXlvolYY symlinks in domU config files.
PKGREVISION++
2016-05-21 20:11:21 +00:00
jaapb
9718550454 Recursive revbump associated with ocaml update. 2016-05-05 11:45:36 +00:00
bad
a79d9cac74 Bump PKGREVISON for previous. 2016-04-04 15:17:33 +00:00
bad
225cf75d98 Lock only the minimal critical section in the block hotplug script.
Patch provided my Manuel Bouyer. Thanks!
2016-04-04 15:16:03 +00:00
bad
b90885ea05 Guard the NetBSD block device hotplug script against concurrent execution.
xl(1) runs the hotplug scripts in parallel.  This causes failures when the
next free vnd device is selected.

Locking modeled after the Linux block hotplug script.
2016-04-04 15:13:15 +00:00
bad
b504ef3769 Honor PKG_SYSCONFDIR.
While here drop know unnecessary XEN_CONFIG_DIR from MAKE_ENV.
2016-04-04 15:03:14 +00:00
rillig
b67b3c3524 Removed CVS conflict lines from distinfo. 2016-03-19 00:32:10 +00:00
jperkin
36eaaf6066 Use OPSYSVARS. 2016-02-26 10:24:10 +00:00
bouyer
cbfec52636 pply patches from Xen repository, fixing:
CVE-2015-5307 and CVE-2015-8104 aka XSA-156
CVE-2015-8339 and CVE-2015-8340 aka XSA-159
CVE-2015-8555 aka XSA-165
XSA-166
CVE-2015-8550 aka XSA-155
CVE-2015-8554 aka XSA-164
Bump pkgrevision
2016-01-07 17:53:58 +00:00
adam
7f3b4730ad Extend PYTHON_VERSIONS_INCOMPATIBLE to 35 2015-12-05 21:25:27 +00:00
agc
17886c78da Add SHA512 digests for distfiles for sysutils category
Problems found with existing digests:
	Package memconf distfile memconf-2.16/memconf.gz
	b6f4b736cac388dddc5070670351cf7262aba048 [recorded]
	95748686a5ad8144232f4d4abc9bf052721a196f [calculated]

Problems found locating distfiles:
	Package dc-tools: missing distfile dc-tools/abs0-dc-burn-netbsd-1.5-0-gae55ec9
	Package ipw-firmware: missing distfile ipw2100-fw-1.2.tgz
	Package iwi-firmware: missing distfile ipw2200-fw-2.3.tgz
	Package nvnet: missing distfile nvnet-netbsd-src-20050620.tgz
	Package syslog-ng: missing distfile syslog-ng-3.7.2.tar.gz

Otherwise, existing SHA1 digests verified and found to be the same on
the machine holding the existing distfiles (morden).  All existing
SHA1 digests retained for now as an audit trail.
2015-11-04 01:32:05 +00:00
jnemeth
0c03bdf7f3 Tweak test for SHM. Build fix, so no PKGREVISION bump. 2015-10-22 05:05:22 +00:00
joerg
71c3d4d1b6 Bump revision for the libxl fix. 2015-10-19 16:40:57 +00:00
joerg
c60638c70b Don't depend on the compiler to optimize ffsll away, explicitly use the
builtin. Fix obvious logic error in libxl. Disable the use of global
register variables for clang. Lesser evil, HVM users should use newer
xentools or GCC.
2015-10-19 16:40:41 +00:00
jnemeth
29d7de2f99 This failed to build during bulk builds due to /var/shm missing.
Instead of looking for /var/shm, check to see if the version of
NetBSD is new enough to have SHM.
2015-10-03 00:56:02 +00:00
spz
fcf436606c Apply patches for XSA-128 to XSA-140 from upstream
do a patch refresh in xentools42

rather than split the patches for pass-through.c over 5 files, delete
xentools42/patches/patch-CVE-2015-2756 and assemble all in
xentools42/patches/patch-qemu-xen-traditional_hw_pass-through.c
2015-08-23 16:17:12 +00:00
wiz
c7383780db Bump all packages that depend on curses.bui* or terminfo.bui* since they
might incur ncurses dependencies on some platforms, and ncurses just bumped
its shlib.
Some packages were bumped twice now, sorry for that.
2015-08-18 07:31:00 +00:00
wiz
0eb141f110 Bump PKGREVISION for ncurses shlib bump. 2015-08-17 17:11:19 +00:00
jaapb
7ea12ebae7 Recursive revbump associated with lang/ocaml update. 2015-08-07 11:20:32 +00:00
jaapb
61266c4fa1 Recursive revbump associated with update of lang/ocaml to 4.02.2 2015-06-30 11:51:41 +00:00
wiz
2e65d464e8 Recursive PKGREVISION bump for all packages mentioning 'perl',
having a PKGNAME of p5-*, or depending such a package,
for perl-5.22.0.
2015-06-12 10:50:58 +00:00
bouyer
ce70ad40f1 For disks larger than 128GB, the LBA capacity reported by IDE disks
should be limited to 128GB, the real size being reported in
LBA48 capacity.
Should fix disk corrution reported by Reinoud Zandijk.
Bump PKGREVISION
2015-06-11 17:42:43 +00:00
khorben
426766eec3 Apply fixes from upstream for XSA-133
XXX pull-ups
2015-06-05 18:41:18 +00:00
spz
3cfbbfbd64 apply fixes from upstream for
XSA-125 Long latency MMIO mapping operations are not preemptible
XSA-126 Unmediated PCI command register access in qemu
2015-04-19 13:13:20 +00:00
spz
ce195f0fed xsa119-4.2.patch from upstream:
From b6e327fde6c365086594e2b46edf435aa1671b1a Mon Sep 17 00:00:00 2001
From: Ian Campbell <ian.campbell@citrix.com>
Date: Fri, 20 Feb 2015 14:41:09 +0000
Subject: [PATCH] tools: libxl: Explicitly disable graphics backends on qemu
 cmdline

By default qemu will try to create some sort of backend for the
emulated VGA device, either SDL or VNC.

However when the user specifies sdl=0 and vnc=0 in their configuration
libxl was not explicitly disabling either backend, which could lead to
one unexpectedly running.

If either sdl=1 or vnc=1 is configured then both before and after this
change only the backends which are explicitly enabled are configured,
i.e. this issue only occurs when all backends are supposed to have
been disabled.

This affects qemu-xen and qemu-xen-traditional differently.

If qemu-xen was compiled with SDL support then this would result in an
SDL window being opened if $DISPLAY is valid, or a failure to start
the guest if not. Passing "-display none" to qemu before any further
-sdl options disables this default behaviour and ensures that SDL is
only started if the libxl configuration demands it.

If qemu-xen was compiled without SDL support then qemu would instead
start a VNC server listening on ::1 (IPv6 localhost) or 127.0.0.1
(IPv4 localhost) with IPv6 preferred if available. Explicitly pass
"-vnc none" when vnc is not enabled in the libxl configuration to
remove this possibility.

qemu-xen-traditional would never start a vnc backend unless asked.
However by default it will start an SDL backend, the way to disable
this is to pass a -vnc option. In other words passing "-vnc none" will
disable both vnc and sdl by default. sdl can then be reenabled if
configured by subsequent use of the -sdl option.

Tested with both qemu-xen and qemu-xen-traditional built with SDL
support and:
        xl cr # defaults
        xl cr sdl=0 vnc=0
        xl cr sdl=1 vnc=0
        xl cr sdl=0 vnc=1
        xl cr sdl=0 vnc=0 vga=\"none\"
        xl cr sdl=0 vnc=0 nographic=1
with both valid and invalid $DISPLAY.

This is XSA-119.
2015-03-13 09:43:41 +00:00
joerg
68a3dfbde6 Fix rpath-link use. 2015-01-29 21:31:39 +00:00
jaapb
714f854d4d Revbump associated with update of lang/ocaml. 2015-01-20 14:24:34 +00:00
msaitoh
0b979d2aa3 Fix compile error on amd64-current. 2014-12-08 05:06:52 +00:00
jaapb
1e2c6eff15 Revbump for ocaml 4.02.0.
(Some packages omitted because they will be updated to new versions)
2014-10-09 19:14:03 +00:00
bouyer
a4e5e15a83 Update xentools42 and xenkernel42 to Xen 4.2.5, fixing:
CVE-2014-2599 / XSA-89 HVMOP_set_mem_access is not preemptible
CVE-2014-3124 / XSA-92 HVMOP_set_mem_type allows invalid P2M entries to be
  created
CVE-2014-3967,CVE-2014-3968 / XSA-96 Vulnerabilities in HVM MSI injection
CVE-2014-4021 / XSA-100 Hypervisor heap contents leaked to guests

pkgsrc also includes patches from the Xen Security Advisory:
XSA-104 (CVE-2014-7154) - Race condition in HVMOP_track_dirty_vram
XSA-105 (CVE-2014-7155) - Missing privilege level checks in x86 HLT, LGDT,
  LIDT, and LMSW emulation
XSA-106 (CVE-2014-7156) - Missing privilege level checks in x86 emulation
  of software interrupts
2014-09-26 10:39:31 +00:00
bouyer
581ce3284b Apply a fix similar to
http://mail-index.netbsd.org/pkgsrc-changes/2014/08/28/msg110551.html:
Don't redefine MAP_ANONYMOUS is already defined. Fixes build on netbsd-7

pointed out by Mustafa Dogan in private mail
2014-09-17 20:32:36 +00:00
schnoebe
1beea8e34f Add buildlink3.mk so libvirt can link against xentools 4.2 2014-07-26 20:27:47 +00:00
wiz
7eeb51b534 Bump for perl-5.20.0.
Do it for all packages that
* mention perl, or
* have a directory name starting with p5-*, or
* depend on a package starting with p5-
like last time, for 5.18, where this didn't lead to complaints.
Let me know if you have any this time.
2014-05-29 23:35:13 +00:00
gdt
79f3b8de6a Use -f in ${CP} to place files into the source tree.
This resolves failures when rerunning make after a build failure when
one's source tree is mode 444.
2014-05-14 12:43:39 +00:00
wiz
c1b44346cd Mark packages that are not ready for python-3.3 also not ready for 3.4,
until proven otherwise.
2014-05-09 07:36:53 +00:00
prlw1
4a4c082b66 Fix build with gcc 4.8. 2014-03-29 09:05:51 +00:00
jperkin
45bc40abb4 Remove example rc.d scripts from PLISTs.
These are now handled dynamically if INIT_SYSTEM is set to "rc.d", or
ignored otherwise.
2014-03-11 14:04:57 +00:00
jperkin
374dfca2a5 Fix dependency pattern. 2014-03-03 16:42:00 +00:00
wiz
f14c525815 Add dependency on py-lxml, used by xenapi_create.py.
Dependency reported missing by Kamil Rytarowski <n54@gmx.com> on
pkgsrc-users.

Bump PKGREVISION.
2014-03-02 13:53:18 +00:00
prlw1
39e89a5b6d Update xentools42 to 4.2.4
Removed patch-libxc_xc_dom_h: commited as cb08944a

This fixes the following critical vulnerabilities:

- CVE-2013-2212 / XSA-60 Excessive time to disable caching with HVM guests with
PCI passthrough
- CVE-2013-1442 / XSA-62 Information leak on AVX and/or LWP capable CPUs
- CVE-2013-4355 / XSA-63 Information leaks through I/O instruction emulation
- CVE-2013-4361 / XSA-66 Information leak through fbld instruction emulation
- CVE-2013-4368 / XSA-67 Information leak through outs instruction emulation
- CVE-2013-4369 / XSA-68 possible null dereference when parsing vif ratelimiting
 info
- CVE-2013-4370 / XSA-69 misplaced free in ocaml xc_vcpu_getaffinity stub
- CVE-2013-4371 / XSA-70 use-after-free in libxl_list_cpupool under memory press
ure
- CVE-2013-4375 / XSA-71 qemu disk backend (qdisk) resource leak
- CVE-2013-4416 / XSA-72 ocaml xenstored mishandles oversized message replies
- CVE-2013-4494 / XSA-73 Lock order reversal between page allocation and grant t
able locks
- CVE-2013-4553 / XSA-74 Lock order reversal between page_alloc_lock and mm_rwlo
ck
- CVE-2013-4551 / XSA-75 Host crash due to guest VMX instruction execution
- CVE-2013-4554 / XSA-76 Hypercalls exposed to privilege rings 1 and 2 of HVM gu
ests
- CVE-2013-6375 / XSA-78 Insufficient TLB flushing in VT-d (iommu) code
- CVE-2013-6400 / XSA-80 IOMMU TLB flushing may be inadvertently suppressed
- CVE-2013-6885 / XSA-82 Guest triggerable AMD CPU erratum may cause host hang
- CVE-2014-1642 / XSA-83 Out-of-memory condition yielding memory corruption duri
ng IRQ setup
- CVE-2014-1891 / XSA-84 integer overflow in several XSM/Flask hypercalls
- CVE-2014-1895 / XSA-85 Off-by-one error in FLASK_AVC_CACHESTAT hypercall
- CVE-2014-1896 / XSA-86 libvchan failure handling malicious ring indexes
- CVE-2014-1666 / XSA-87 PHYSDEVOP_{prepare,release}_msix exposed to unprivilege
d guests
- CVE-2014-1950 / XSA-88 use-after-free in xc_cpupool_getinfo() under memory pre
ssure

Apart from those there are many further bug fixes and improvements.
2014-02-22 01:28:23 +00:00
wiz
a1f0ff3f67 No need to have two variables for the same logic.
Replace PYTHON_PATCH_SCRIPTS with REPLACE_PYTHON.
2014-01-25 10:45:15 +00:00