Commit graph

27 commits

Author SHA1 Message Date
riastradh
5dddf990fc Partially back out change to PYTHON_FOR_BUILD_ONLY.
This broke packages that needed a target Python at build-time.
Instead, change it from defined/undefined to yes/no/tool.  Most cases
of defined used `yes' anyway; fix the few stragglers do that instead.
New case `tool' is for TOOL_DEPENDS rather than buildlink3.
2013-05-10 20:07:33 +00:00
drochner
1e646464a4 update to 4.1.5
This integrates fixes for all vulnerabilities which were patched
in pkgsrc before.
Among many bug fixes and improvements (around 50 since Xen 4.1.4):
 * ACPI APEI/ERST finally working on production systems
 * Bug fixes for other low level system state handling
 * Support for xz compressed Dom0 and DomU kernels
2013-05-03 16:48:37 +00:00
bouyer
d8b95de64b Add patches from Xen security advisory:
http://lists.xen.org/archives/html/xen-announce/2013-04/msg00000.html
http://lists.xen.org/archives/html/xen-announce/2013-04/msg00005.html
http://lists.xen.org/archives/html/xen-announce/2013-04/msg00006.html

bump PKGREVISION
2013-04-19 14:02:45 +00:00
joerg
8f28de81a1 Allow building Xen infrastructure with Clang. Fix various bugs in
xenkernel3, xenkernel41, xentools3 and xentools41 exposed by Clang
default warnings. Bump revisions for those.
2013-04-11 19:57:51 +00:00
rodent
6b46c62d2e Edited DESCR in the case of:
File too long (should be no more than 24 lines).
 Line too long (should be no more than 80 characters).
 Trailing empty lines.
 Trailing white-space.
Trucated the long files as best as possible while preserving the most info
contained in them.
2013-04-07 20:49:31 +00:00
rodent
44c94b38c6 'EXTRACT_SUFX is ".tar.gz" by default, so this definition may be
redundant.' - It was. Removed.
2013-04-06 13:01:26 +00:00
drochner
e04bd3afcc oops, a patch was in the wrong sub-pkg
bump PKGREV
2013-01-20 15:21:54 +00:00
drochner
fa0afb823c update to 4.1.4
changes:
-fixes for many vulnerabilities (were mostly patched in pkgsrc)
-bug fixes and improvements (almost 100 since Xen 4.1.3). Highlights are:
 -A fix for a long standing time management issue
 -Bug fixes for S3 (suspend to RAM) handling
 -Bug fixes for other low level system state handling

pkgsrc note:
fixes for CVE-2012-5634 (interrupt issue on IOMMU systems)
and CVE-2012-6075 (oversized packets from e1000 driver)
are already included
2013-01-17 19:37:54 +00:00
drochner
49bb8fdd76 add another batch of security patches from upstream
bump PKGREV
2012-12-05 19:16:26 +00:00
drochner
b651b8e497 add patches from Xen SA 20..24 to fix various security problems
(CVE-2012-4535..4539)
bump PKGREV
2012-11-14 13:42:41 +00:00
asau
54c5cd959e Drop superfluous PKG_DESTDIR_SUPPORT, "user-destdir" is default these days. 2012-10-23 19:50:50 +00:00
dholland
ca048324de Fix COMMENT, noted by Mayuresh on pkgsrc-users. 2012-09-16 19:46:02 +00:00
drochner
f4c08d6fc4 update to 4.1.3
also add security patches from upstream (for CVE-2012-3497, no patches
are available yet)

changes:
-fixes for vulnerabilities were integrated
-many bug fixes and improvements, Highlights are:
 -Updates for the latest Intel/AMD CPU revisions
 -Bug fixes for IOMMU handling (device passthrough to HVM guests)

approved by maintainer
2012-09-12 11:04:17 +00:00
drochner
50b3fedd58 add patch from upstream to fix a possible DOS by HVM guests on teardown
(CVE-2012-3433)
bump PKGREV
2012-08-10 09:59:47 +00:00
asau
cfc040d419 Slightly simplify build process. 2012-08-01 12:28:18 +00:00
asau
5e2b87bbdf Use default WRKSRC. 2012-08-01 12:22:28 +00:00
drochner
0f96d180e7 add patch from upstream to fix bug in MMIO emulation which can cause
guest crashes by unprivileged users, only for HVM guests, and if
MMIO is granted to the user process (CVE-2012-3432)
bump PKGREV
2012-07-27 18:50:34 +00:00
bouyer
deabd44c27 Move patches to the right place. Bump PKGREVISION 2012-06-19 20:17:06 +00:00
bouyer
37d2e56472 pull up patches from upstream, fixing XSA7, XSA8 and XSA9.
PKGREVISION++
2012-06-12 15:59:04 +00:00
jym
7d4811e631 Add a MESSAGE so that we can point to the right location for Xen kernels. 2011-11-20 03:12:44 +00:00
cegger
1027369895 Update to Xen 4.1.2
Fixes/features include:
 * New XL toolstack
 * kexec/kdump
 * Remus
 * Device passthrough to HVM guests
 * Interrupt handling
 * Support for Supervisor Mode Execution Protection (SMEP)
2011-10-21 18:26:58 +00:00
bouyer
eebd533e00 This builds fine on netbsd-5, so relax ONLY_FOR_PLATFORM 2011-10-16 20:32:44 +00:00
abs
07a67b46ed Fix build with gcc 4.5.3 under NetBSD 2011-08-14 20:42:40 +00:00
cegger
6a0079666e Apply build fix about redefining va_list.
Failure has been reported to get fixed upstream.
2011-06-16 13:02:50 +00:00
cegger
302844c581 Xen 4.1.1 (maintenance release)
*   Security fixes including CVE-2011-1583 CVE-2011-1898
 *   Enhancements to guest introspection (VM single stepping support for very fine-grained access control)
 *   Many stability improvements, such as: PV-on-HVM stability fixes (fixing some IRQ issues), XSAVE cpu feature support for PV guests (allows safe use of latest multimedia instructions), RAS fixes for high availability, fixes for offlining bad pages and changes to libxc, mainly of benefit to libvirt
 *   Compatibility fixes for newer Linux guests, newer compilers, some old guest savefiles, newer Python, grub2, some hardware/BIOS bugs.
2011-06-16 10:28:47 +00:00
tnn
779063a84e xenkernel41 didn't build on current/amd64.
It uses -nostdinc and tries to use #include <stdarg.h> through
a local copy of stdarg.h, which can't work.
Fixed this by putting the relevant builtin stdarg definitions for
NetBSD in the local copy.
2011-05-07 07:11:22 +00:00
cegger
30bf917389 Xen is a virtual machine monitor which supports running multiple
guests operating systems on a single machine.  Guest OSes (also called "domains"
)
require a modified kernel which supports Xen hypercalls in replacement
to access to the physical hardware.  At boot, the xen kernel is loaded
along with the guest kernel for the first domain (called domain0).
domain0 has privileges to access the physical hardware (PCI
and ISA devices), administrate other domains and provide virtual
devices (disks and network) to other domains.

This package contains the Xen4 kernel itself.

Release notes:
The Xen team is pleased to announce the release of Xen 4.1.

The result of nearly 12 months of development, new features include:
  * A re-architected and improved XL toolstack replacing XM/XEND
  * Prototype credit2 scheduler designed for latency-sensitive workloads and
    very large systems.
  * CPU Pools for advanced partitioning.
  * Support for large systems (>255 processors)
  * Support for x86 Advanced Vector eXtension (AVX).
  * New Memory Access API enabling integration of 3rd party security
    solutions into Xen virtualized environments.
  * Many IOMMU fixes (both Intel VT-d IOMMU and AMD IOMMU).
  * Many toolstack and buildsystem fixes for Linux and NetBSD hosts.
  * Thirdparty libs: libvirt driver for libxl has been merged to upstream
    libvirt.
  * HVM guest PXE boot enhancements, replacing gPXE with iPXE.
  * Even better stability through our new automated regression tests.

Detailed release notes, including a more extensive feature list:
   http://wiki.xen.org/xenwiki/Xen4.1

To download tarballs:
   http://xen.org/products/xen_source.html
Or the Mercurial source repository (tag 'RELEASE-4.1.0'):
   http://xenbits.xen.org/xen-unstable.hg

And the announcement on the Xen blog:
   http://blog.xen.org/index.php/2011/03/25/xen-4-1-releases/

Thanks to the many people who have contributed to this release!

  Regards,
  The Xen Team
2011-04-06 09:05:53 +00:00