Commit graph

8 commits

Author SHA1 Message Date
bouyer
4731e7e49e Put back PKGREVISION=1. It was there on purpose, to make it clear that
there are extra (security) patches and it's not the stock 4.6.6 or 4.8.2
2017-10-17 11:10:35 +00:00
wiz
f5539e649d xen*[46]*: reset PKGREVISION after update 2017-10-17 11:02:06 +00:00
bouyer
17b19337bc Update xentools48 and xenkernel48 to 4.8.2, and apply security patches up
to XSA244. Keep PKGREVISION to 1 to account for the fact that it's
not a stock Xen 4.8.2.

Note that, unlike upstream, pv-linear-pt defaults to true, so that
NetBSD PV guests (including dom0) will continue to boot without changes
to boot.cfg
2017-10-17 08:42:30 +00:00
maya
18d0394264 Don't force enable ssp on xenkernel packages. fixes build 2017-07-24 08:53:45 +00:00
joerg
8177feba64 Restrict -falign-functions to GCC. 2017-06-17 19:53:10 +00:00
bouyer
a3b41ba940 Change http://bits.xensource.com/oss-xen/release/ to
https://downloads.xenproject.org/release/xen/, as new releases won't
be uploaded to bits.xensource.com
2017-04-13 13:08:33 +00:00
spz
eb10b3a907 adding patch for XSA-212 from upstream
(http://xenbits.xen.org/xsa/advisory-212.html)
2017-04-08 12:30:42 +00:00
bouyer
85b996c375 Add xenkerne48 and xentools48, version 4.8.0.
This includes stub domains support, but it should be considered
experimental at this time. Stub domains hangs with serial ports,
or more more than one virual disk (multiple virtual ethernet have not been
tested).
2017-03-30 09:15:09 +00:00