Commit graph

7 commits

Author SHA1 Message Date
khorben
489fe04613 Typos in MESSAGE
Bumps PKGREVISION.
2022-04-30 00:21:15 +00:00
bouyer
0c62612836 Update xenkernel415 and xentools415 to 4.15.2
Changes from 4.15.1 are bugfixes, some performance improvements and
some security hardening. It also includes all fixes for XSA up to 395.
2022-03-04 17:54:08 +00:00
nia
d75334de07 sysutils: Replace RMD160 checksums with BLAKE2s checksums
All checksums have been double-checked against existing RMD160 and
SHA512 hashes
2021-10-26 11:19:17 +00:00
nia
67e36f8dd3 sysutils: Remove SHA1 hashes for distfiles 2021-10-07 14:57:31 +00:00
bouyer
d5eff63c09 Update xenkernel415 and xentools415 to 4.15.1.
32bits PV guests are now unsupported security-wise, and upstream disables
them by default. This packages keep the support enabled for transition, but
this will change for the next quarter branch. It is recommended to switch to
pvh+pvshim for PV guests (or pvh if you run netbsd-current).
Other changes are bugfixes, including fixes for XSA up to XSA-384
2021-09-21 12:23:49 +00:00
wiz
7a1283626c *: Remove PKGREVISION=0 2021-08-12 07:36:39 +00:00
bouyer
5f5022daee Add xenkernel415 and xentools415 version 4.15.0
Xen is a hypervisor which supports running multiple guest operating
systems on a single machine. Guest OSes (also called "domains")
can be either paravirtualised (i.e. make hypercalls in order to
access hardware), run in HVM (Hardware Virtualisation Mode) where
they will be presented with virtual devices, or a combination where
they use hypercalls to access hardware but manage memory themselves.
At boot, the xen kernel is loaded along with the guest kernel for
the first domain (called domain0). domain0 has privileges to access
the physical hardware (PCI and ISA devices), administrate other
domains and provide virtual devices (disks and network) to other
domains.
2021-04-18 12:31:26 +00:00