head 1.45; access; symbols pkgsrc-2016Q4:1.44.0.2 pkgsrc-2016Q4-base:1.44 pkgsrc-2016Q3:1.41.0.6 pkgsrc-2016Q3-base:1.41 pkgsrc-2016Q2:1.41.0.4 pkgsrc-2016Q2-base:1.41 pkgsrc-2016Q1:1.41.0.2 pkgsrc-2016Q1-base:1.41 pkgsrc-2015Q4:1.40.0.2 pkgsrc-2015Q4-base:1.40 pkgsrc-2015Q3:1.39.0.4 pkgsrc-2015Q3-base:1.39 pkgsrc-2015Q2:1.39.0.2 pkgsrc-2015Q2-base:1.39 pkgsrc-2015Q1:1.37.0.6 pkgsrc-2015Q1-base:1.37 pkgsrc-2014Q4:1.37.0.4 pkgsrc-2014Q4-base:1.37 pkgsrc-2014Q3:1.37.0.2 pkgsrc-2014Q3-base:1.37 pkgsrc-2014Q2:1.36.0.2 pkgsrc-2014Q2-base:1.36 pkgsrc-2014Q1:1.35.0.2 pkgsrc-2014Q1-base:1.35 pkgsrc-2013Q4:1.34.0.2 pkgsrc-2013Q4-base:1.34 pkgsrc-2013Q3:1.33.0.2 pkgsrc-2013Q3-base:1.33 pkgsrc-2013Q2:1.30.0.2 pkgsrc-2013Q2-base:1.30 pkgsrc-2013Q1:1.26.0.2 pkgsrc-2013Q1-base:1.26 pkgsrc-2012Q4:1.23.0.2 pkgsrc-2012Q4-base:1.23 pkgsrc-2012Q3:1.22.0.2 pkgsrc-2012Q3-base:1.22 pkgsrc-2012Q2:1.21.0.2 pkgsrc-2012Q2-base:1.21 pkgsrc-2012Q1:1.17.0.2 pkgsrc-2012Q1-base:1.17 pkgsrc-2011Q4:1.15.0.2 pkgsrc-2011Q4-base:1.15 pkgsrc-2011Q3:1.8.0.4 pkgsrc-2011Q3-base:1.8 pkgsrc-2011Q2:1.8.0.2 pkgsrc-2011Q2-base:1.8 pkgsrc-base:1.1.1.1 TNF:1.1.1; locks; strict; comment @# @; 1.45 date 2016.12.29.19.13.03; author wiz; state dead; branches; next 1.44; commitid kFYPk8EnajcmFUzz; 1.44 date 2016.12.20.10.22.29; author bouyer; state Exp; branches; next 1.43; commitid TxndvKOzkEv91Iyz; 1.43 date 2016.11.22.20.53.40; author bouyer; state Exp; branches; next 1.42; commitid o5sczsI7INv1pavz; 1.42 date 2016.10.01.13.07.23; author joerg; state Exp; branches; next 1.41; commitid PavvIazT8Wzevroz; 1.41 date 2016.01.07.17.55.55; author bouyer; state Exp; branches 1.41.6.1; next 1.40; commitid nI5CmqYKUfq6I1Qy; 1.40 date 2015.11.04.01.32.40; author agc; state Exp; branches 1.40.2.1; next 1.39; commitid 3edk4yRlu0C2kIHy; 1.39 date 2015.06.11.17.42.43; author bouyer; state Exp; branches; next 1.38; commitid 7ft3JKJJIgINn2py; 1.38 date 2015.04.19.13.13.21; author spz; state Exp; branches; next 1.37; commitid C4uc4kMktu1eBciy; 1.37 date 2014.08.28.14.30.03; author bouyer; state Exp; branches 1.37.6.1; next 1.36; commitid ijaExfeIXVp9y8Ox; 1.36 date 2014.05.14.20.22.41; author bouyer; state Exp; branches; next 1.35; commitid 7ea8CfKi54N5UxAx; 1.35 date 2014.02.13.11.12.58; author drochner; state Exp; branches 1.35.2.1; next 1.34; commitid n7IOahAGKIS2LVox; 1.34 date 2013.11.29.19.31.47; author drochner; state Exp; branches 1.34.2.1; next 1.33; commitid 28qqd4EqzFgiXcfx; 1.33 date 2013.09.11.18.00.33; author drochner; state Exp; branches; next 1.32; commitid 76aqq1Rgu8ITY25x; 1.32 date 2013.07.16.22.28.26; author joerg; state Exp; branches; next 1.31; commitid rtaetQWzra2ujKXw; 1.31 date 2013.07.13.19.43.21; author joerg; state Exp; branches; next 1.30; commitid XwDvCirERMONulXw; 1.30 date 2013.05.06.14.59.10; author joerg; state Exp; branches; next 1.29; 1.29 date 2013.05.03.16.48.38; author drochner; state Exp; branches; next 1.28; 1.28 date 2013.04.19.14.03.51; author bouyer; state Exp; branches; next 1.27; 1.27 date 2013.04.11.19.57.53; author joerg; state Exp; branches; next 1.26; 1.26 date 2013.03.15.16.10.57; author is; state Exp; branches 1.26.2.1; next 1.25; 1.25 date 2013.01.20.15.21.54; author drochner; state Exp; branches; next 1.24; 1.24 date 2013.01.18.11.27.43; author drochner; state Exp; branches; next 1.23; 1.23 date 2012.12.19.12.29.44; author is; state Exp; branches; next 1.22; 1.22 date 2012.09.12.11.09.32; author drochner; state Exp; branches; next 1.21; 1.21 date 2012.05.30.08.29.43; author bouyer; state Exp; branches; next 1.20; 1.20 date 2012.05.30.03.27.05; author taca; state Exp; branches; next 1.19; 1.19 date 2012.05.29.15.01.34; author bouyer; state Exp; branches; next 1.18; 1.18 date 2012.05.10.16.07.36; author abs; state Exp; branches; next 1.17; 1.17 date 2012.02.03.17.00.25; author bouyer; state Exp; branches; next 1.16; 1.16 date 2012.01.26.11.19.23; author cegger; state Exp; branches; next 1.15; 1.15 date 2011.12.14.04.01.37; author sbd; state Exp; branches 1.15.2.1; next 1.14; 1.14 date 2011.10.29.14.16.53; author jmcneill; state Exp; branches; next 1.13; 1.13 date 2011.10.29.10.20.52; author jmcneill; state Exp; branches; next 1.12; 1.12 date 2011.10.28.11.31.29; author bouyer; state Exp; branches; next 1.11; 1.11 date 2011.10.26.13.39.48; author bouyer; state Exp; branches; next 1.10; 1.10 date 2011.10.21.18.27.21; author cegger; state Exp; branches; next 1.9; 1.9 date 2011.10.03.16.58.58; author sborrill; state Exp; branches; next 1.8; 1.8 date 2011.06.16.13.40.06; author cegger; state Exp; branches; next 1.7; 1.7 date 2011.05.20.17.09.21; author bouyer; state Exp; branches; next 1.6; 1.6 date 2011.05.12.15.57.38; author bouyer; state Exp; branches; next 1.5; 1.5 date 2011.05.07.18.39.05; author tnn; state Exp; branches; next 1.4; 1.4 date 2011.05.07.16.55.58; author tnn; state Exp; branches; next 1.3; 1.3 date 2011.05.02.20.32.27; author abs; state Exp; branches; next 1.2; 1.2 date 2011.04.15.10.32.22; author bouyer; state Exp; branches; next 1.1; 1.1 date 2011.04.06.09.10.26; author cegger; state Exp; branches 1.1.1.1; next ; 1.41.6.1 date 2016.10.06.18.39.27; author bsiegert; state Exp; branches; next ; commitid DgbwUNhP9Drjb7pz; 1.40.2.1 date 2016.01.11.20.26.12; author bsiegert; state Exp; branches; next ; commitid wxtXbEOcW341qyQy; 1.37.6.1 date 2015.04.29.21.11.13; author tron; state Exp; branches; next ; commitid XOJeB58WDS2DVwjy; 1.35.2.1 date 2014.05.21.04.06.03; author schnoebe; state Exp; branches; next ; commitid vxhqphifmczvhmBx; 1.34.2.1 date 2014.02.18.11.34.25; author tron; state Exp; branches; next ; commitid sBtks0chTdEFIzpx; 1.26.2.1 date 2013.04.24.21.11.06; author tron; state Exp; branches; next ; 1.15.2.1 date 2012.02.04.12.42.20; author tron; state Exp; branches; next 1.15.2.2; 1.15.2.2 date 2012.02.04.14.21.29; author tron; state Exp; branches; next ; 1.1.1.1 date 2011.04.06.09.10.26; author cegger; state Exp; branches; next ; desc @@ 1.45 log @Remove xenkernel and tools versions 3, 33, and 41. As discussed on pkgsrc-users. @ text @$NetBSD: distinfo,v 1.44 2016/12/20 10:22:29 bouyer Exp $ SHA1 (ipxe-git-v1.0.0.tar.gz) = da052c8de5f3485fe0253c19cf52ed6d72528485 RMD160 (ipxe-git-v1.0.0.tar.gz) = dcd9b6eaafa1ce05c1ebf2a15f2f73ad7a8c5547 SHA512 (ipxe-git-v1.0.0.tar.gz) = 6921fb857ca615899a5912d5590ca36b6f46daf828b85edc75461c08a189d9fed71ee74a82e42724da7a1355e45070d28a0a61694b3a4872c3554390e4bb4147 Size (ipxe-git-v1.0.0.tar.gz) = 1996881 bytes SHA1 (xen-4.1.6.1.tar.gz) = e5f15feb0821578817a65ede16110c6eac01abd0 RMD160 (xen-4.1.6.1.tar.gz) = bff11421fc44a26f2cc3156713267abcb36d7a19 SHA512 (xen-4.1.6.1.tar.gz) = 5f6106514ffb57708009e3d6763824b13d9038699048d1a91fa09ad223e0391b92b6ea0f25714a0bbf8ac8373c58fc7871ca0bce9c3ff7873d41fb2eeae13ed8 Size (xen-4.1.6.1.tar.gz) = 10428485 bytes SHA1 (patch-.._.._ipxe_src_arch_i386_include_librm.h) = 4549ac641b112321b4731a918d85219c3fce6808 SHA1 (patch-.._.._ipxe_src_core_settings.c) = 240ff973757403b983f12b2cbed826584c4a8aba SHA1 (patch-.._.._ipxe_src_net_tls.c) = c0cfbc2ab2b92c659c146601c4f80d58c951ca62 SHA1 (patch-.._Config.mk) = 9b971a41f67bb3974d3a4459bb9d96fbbd636c96 SHA1 (patch-CVE-2014-1950) = b0d900722fd0f59a50f1e1eda1471105d5b557e5 SHA1 (patch-CVE-2015-2752) = f9bca0b8744233e20ff97c3e8e2e404522e87f49 SHA1 (patch-CVE-2015-2756) = 07aaac4bcd0dfc6d708c1823288b9fc789ebd125 SHA1 (patch-CVE-2015-8550) = dfd72a54d27211c1059579819b9b4c702399a0fc SHA1 (patch-CVE-2015-8554) = 7f444009519399038c657fa3e59fd2170f99bb70 SHA1 (patch-XSA-197) = 4980664bbb3f3d8277f888f6304a8552ec714a26 SHA1 (patch-XSA-198) = 98a18927de1e3427cb4fbcc5675fa608d1cd5ba8 SHA1 (patch-XSA-199) = 406f14cdb356f0d7abe3a843a5efa1dc398c77bd SHA1 (patch-aa) = 9b53ba4a809dad7a1de34c8fa0dbe493d7256ada SHA1 (patch-ab) = 0906a5ec3a7450fc987b01289e2560e60966d00d SHA1 (patch-ac) = c3cc5335a1d6b066307c5f03fe72f513a9eb2bdb SHA1 (patch-ad) = 5eb15470bff85d30b6d26d8fe094f59fc8e34175 SHA1 (patch-ae) = 400bd6cac23af1e75f45c3e4e88e3130a3517129 SHA1 (patch-af) = e866e7d96766b735a53432350275810803eeb510 SHA1 (patch-ag) = 90893326dcce4e3e2ef273f22ec5ddf5af0f7cd8 SHA1 (patch-ah) = ab91c41ef6bbdd7f7f3d992b9f81e43056a765e2 SHA1 (patch-ai) = 8da6bba38bd7677ea829ca35058f7d2d1d7acad4 SHA1 (patch-aj) = d0999d8dcbc1eef4de7037db0e54dcd8d2f706eb SHA1 (patch-ak) = 722a6b0541b036d84c703037134e25bc47f3eb65 SHA1 (patch-al) = d9a310c16db708dd86170a13946f87e4cd21eb7a SHA1 (patch-am) = b89785a97208454eb3f2e1e43ba4674ad0828aa6 SHA1 (patch-ba) = 2c65e4b4b85e91e92dfb3aa402ebc44694bdff06 SHA1 (patch-bb) = 64a61fb156bcb6a99ff0963063a0716b808e3b61 SHA1 (patch-bc) = 25c99a428fda6dee709888ddbcfdcfef5f654564 SHA1 (patch-ca) = 36afc7b063f83adfe5b927ed0be586b102684020 SHA1 (patch-cb) = 5563a72e203e789a86f4166c71ddb3fcff5215c6 SHA1 (patch-cc) = 24d71f68a93b59bd5c5441c257d34862e7302040 SHA1 (patch-cd) = 7b25b3b3a8d58effae395d776f2a4b94d79acfcb SHA1 (patch-ce) = 613f4c4605af860e5f88b68c49a0e7870ba6ecde SHA1 (patch-cf) = c8740b1c9cfac686f2e4e32c7613b5f02206459d SHA1 (patch-cg) = 119029fda1d4ecee90d0a108151596cb3ef0ec74 SHA1 (patch-ch) = 84e816c95167828314ef901e324772249a407c41 SHA1 (patch-config_StdGNU.mk) = bbded4d6da3fae55bfd8dad42ac9b45721ee1ebe SHA1 (patch-da) = 06c07b32d70f8259a762ebcdc738218cfad57ad4 SHA1 (patch-db) = 4766f9925462023332793bcea4321072758e289d SHA1 (patch-dc) = d860fe3725978227278d58f09e7d5157001e463e SHA1 (patch-dd) = e66d9cc0028ba922b050fc142862b4095cd018f3 SHA1 (patch-de) = fae94b61a430a1a7dd98c9a6a04e4513824c6d8d SHA1 (patch-df) = e7b41242fcb4a0d4fb9e22376af6a50d1081f96c SHA1 (patch-firmware_hvmloader_Makefile) = b2914e4988ba004d45403d67f1580b1f9725d006 SHA1 (patch-ioemu-qemu-xen_hw_pass-through.c) = 76185c239078f29cb42b953d6c2cd1f59e240989 SHA1 (patch-ioemu-qemu-xen_hw_pass-through.h) = 98c26798d1ad99d3eee8b33deb08f747c958c886 SHA1 (patch-ioemu-qemu-xen_hw_piix4acpi.c) = ca19457e9bde2d844a86a866960ac6de1f3d084c SHA1 (patch-ioemu-qemu-xen_hw_pt-graphics.c) = 3c03404f1d711c667559a1332e717a5f1b5ceda8 SHA1 (patch-ioemu-qemu-xen_hw_pt-msi.c) = 2dcebc65f591988bb95dea74c3b21f7066154a9f SHA1 (patch-ioemu-qemu-xen_hw_pt-msi.h) = d1bb1a8ad90d6577056f11df96f5469ffe74a3b0 SHA1 (patch-ioemu-qemu-xen_xen-hooks.mak) = a00d9a9fd0fbb9fd89788b9dfaf5b389a28d47e2 SHA1 (patch-libfsimage_ufs_ufs.h) = dc59f33cf3abd08a8cdee5977ca4168613327513 SHA1 (patch-libxl_libxl_create.c) = 02b661ca684609939c6ef762c0ddd1c5e62ad4d0 SHA1 (patch-libxl_libxl_internal.h) = e126e5e998117903f0c66cc370d350c504ed33d9 SHA1 (patch-libxl_xl__cmdimpl.c) = 0e038b9702e131ec527d49cb2c21e4acf581cbfe SHA1 (patch-ocaml_Makefile.rules) = 104f9d40186e5e4ca6a2e6359bbb369c3c91d1dc SHA1 (patch-ocaml_common.make) = c59d32301198d65691ab23529dd791de5ac40199 SHA1 (patch-ocaml_libs_xb_xs__ring__stubs.c) = 944ce96d18cefdc70babe83d3337ff94604b0f04 SHA1 (patch-ocaml_xenstored_define.ml) = f44841625554ceba6e83dbb41f688993c2a8d9a2 SHA1 (patch-ocaml_xenstored_utils.ml) = cc792a696743fa348b274b1c23783ea1a0d7da47 SHA1 (patch-qemu-phy-devices) = fef90e50ef0a58db2f2b49b6c23218f371791de5 SHA1 (patch-xenstat_libxenstat_Makefile) = 800dfa58e9f65cfc9694ff4ee8a85c96d6336cfe SHA1 (patch-xenstat_xentop_Makefile) = 6b59d1a8024f0b7f493a2205afd1d90495f01151 SHA1 (patch-xenstore_Makefile) = 4fa0ed7b76a96011c3cca9c5017be4b5151489f7 @ 1.44 log @Apply upstream patch for XSA-199, XSA-200 and XSA-204. Bump PKGREVISIONs @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.43 2016/11/22 20:53:40 bouyer Exp $ @ 1.43 log @Backport upstream patches, fixing today's XSA 191, 192, 195, 197, 198. Bump PKGREVISIONs @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.42 2016/10/01 13:07:23 joerg Exp $ d22 1 @ 1.42 log @OCAML has switched to using normal uint32_t, so follow here. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.41 2016/01/07 17:55:55 bouyer Exp $ d20 2 @ 1.41 log @Apply patches from Xen repository, fixing: CVE-2015-8339 and CVE-2015-8340 aka XSA-159 XSA-166 CVE-2015-8550 aka XSA-155 CVE-2015-8554 aka XSA-164 Bump pkgrevision @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.40 2015/11/04 01:32:40 agc Exp $ d65 1 @ 1.41.6.1 log @Pullup ticket #5121 - requested by joerg sysutils/xentools41: build fix sysutils/xentools42: build fix Revisions pulled up: - sysutils/xentools41/distinfo 1.42 - sysutils/xentools41/patches/patch-ocaml_libs_xb_xs__ring__stubs.c 1.1 - sysutils/xentools42/distinfo 1.28 - sysutils/xentools42/patches/patch-ocaml_libs_xb_xs__ring__stubs.c 1.1 --- Module Name: pkgsrc Committed By: joerg Date: Sat Oct 1 13:07:23 UTC 2016 Modified Files: pkgsrc/sysutils/xentools41: distinfo pkgsrc/sysutils/xentools42: distinfo Added Files: pkgsrc/sysutils/xentools41/patches: patch-ocaml_libs_xb_xs__ring__stubs.c pkgsrc/sysutils/xentools42/patches: patch-ocaml_libs_xb_xs__ring__stubs.c Log Message: OCAML has switched to using normal uint32_t, so follow here. @ text @d1 1 a1 1 $NetBSD$ a64 1 SHA1 (patch-ocaml_libs_xb_xs__ring__stubs.c) = 944ce96d18cefdc70babe83d3337ff94604b0f04 @ 1.40 log @Add SHA512 digests for distfiles for sysutils category Problems found with existing digests: Package memconf distfile memconf-2.16/memconf.gz b6f4b736cac388dddc5070670351cf7262aba048 [recorded] 95748686a5ad8144232f4d4abc9bf052721a196f [calculated] Problems found locating distfiles: Package dc-tools: missing distfile dc-tools/abs0-dc-burn-netbsd-1.5-0-gae55ec9 Package ipw-firmware: missing distfile ipw2100-fw-1.2.tgz Package iwi-firmware: missing distfile ipw2200-fw-2.3.tgz Package nvnet: missing distfile nvnet-netbsd-src-20050620.tgz Package syslog-ng: missing distfile syslog-ng-3.7.2.tar.gz Otherwise, existing SHA1 digests verified and found to be the same on the machine holding the existing distfiles (morden). All existing SHA1 digests retained for now as an audit trail. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.39 2015/06/11 17:42:43 bouyer Exp $ d18 2 @ 1.40.2.1 log @Pullup ticket #4887 - requested by bouyer sysutils/xenkernel41: security fix sysutils/xentools41: security fix Revisions pulled up: - sysutils/xenkernel41/Makefile 1.48 - sysutils/xenkernel41/distinfo 1.41 - sysutils/xenkernel41/patches/patch-CVE-2015-8339 1.1 - sysutils/xenkernel41/patches/patch-XSA-166 1.1 - sysutils/xentools41/Makefile 1.59 - sysutils/xentools41/distinfo 1.41 - sysutils/xentools41/patches/patch-CVE-2015-8550 1.1 - sysutils/xentools41/patches/patch-CVE-2015-8554 1.1 --- Module Name: pkgsrc Committed By: bouyer Date: Thu Jan 7 17:55:55 UTC 2016 Modified Files: pkgsrc/sysutils/xenkernel41: Makefile distinfo pkgsrc/sysutils/xentools41: Makefile distinfo Added Files: pkgsrc/sysutils/xenkernel41/patches: patch-CVE-2015-8339 patch-XSA-166 pkgsrc/sysutils/xentools41/patches: patch-CVE-2015-8550 patch-CVE-2015-8554 Log Message: Apply patches from Xen repository, fixing: CVE-2015-8339 and CVE-2015-8340 aka XSA-159 XSA-166 CVE-2015-8550 aka XSA-155 CVE-2015-8554 aka XSA-164 Bump pkgrevision @ text @d1 1 a1 1 $NetBSD$ a17 2 SHA1 (patch-CVE-2015-8550) = dfd72a54d27211c1059579819b9b4c702399a0fc SHA1 (patch-CVE-2015-8554) = 7f444009519399038c657fa3e59fd2170f99bb70 @ 1.39 log @For disks larger than 128GB, the LBA capacity reported by IDE disks should be limited to 128GB, the real size being reported in LBA48 capacity. Should fix disk corrution reported by Reinoud Zandijk. Bump PKGREVISION @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.38 2015/04/19 13:13:21 spz Exp $ d5 1 d9 1 @ 1.38 log @apply fixes from upstream for XSA-125 Long latency MMIO mapping operations are not preemptible XSA-126 Unmediated PCI command register access in qemu @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.37 2014/08/28 14:30:03 bouyer Exp $ d46 1 a46 1 SHA1 (patch-df) = d20bf9d3fd05f5334f77c9154bf0fb9944c1292c @ 1.37 log @Don't redefine MAP_ANONYMOUS is already defined. Fixes build on netbsd-7 @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.36 2014/05/14 20:22:41 bouyer Exp $ d14 2 @ 1.37.6.1 log @Pullup ticket #4698 - requested by spz Pullup ticket #4698 - requested by spz sysutils/xenkernel41: security patch sysutils/xenkernel42: security patch sysutils/xenkernel45: security patch Revisions pulled up: - sysutils/xenkernel41/Makefile 1.45 - sysutils/xenkernel41/distinfo 1.36 - sysutils/xenkernel41/patches/patch-CVE-2015-2752 1.1 - sysutils/xenkernel41/patches/patch-CVE-2015-2756 1.1 - sysutils/xenkernel42/Makefile 1.15 - sysutils/xenkernel42/distinfo 1.13 - sysutils/xenkernel42/patches/patch-CVE-2015-2752 1.1 - sysutils/xenkernel42/patches/patch-CVE-2015-2756 1.1 - sysutils/xenkernel45/Makefile 1.6 - sysutils/xenkernel45/distinfo 1.5 - sysutils/xenkernel45/patches/patch-CVE-2015-2752 1.1 - sysutils/xenkernel45/patches/patch-CVE-2015-2756 1.1 - sysutils/xentools41/Makefile 1.50 - sysutils/xentools41/distinfo 1.38 - sysutils/xentools41/patches/patch-CVE-2015-2752 1.1 - sysutils/xentools41/patches/patch-CVE-2015-2756 1.1 - sysutils/xentools42/Makefile 1.27 - sysutils/xentools42/distinfo 1.16 - sysutils/xentools42/patches/patch-CVE-2015-2752 1.1 - sysutils/xentools42/patches/patch-CVE-2015-2756 1.1 - sysutils/xentools45/Makefile 1.6 - sysutils/xentools45/distinfo 1.6 - sysutils/xentools45/patches/patch-CVE-2015-2752 1.1 - sysutils/xentools45/patches/patch-CVE-2015-2756 1.1 --- Module Name: pkgsrc Committed By: spz Date: Sun Apr 19 13:13:21 UTC 2015 Modified Files: pkgsrc/sysutils/xenkernel41: Makefile distinfo pkgsrc/sysutils/xenkernel42: Makefile distinfo pkgsrc/sysutils/xenkernel45: Makefile distinfo pkgsrc/sysutils/xentools41: Makefile distinfo pkgsrc/sysutils/xentools42: Makefile distinfo pkgsrc/sysutils/xentools45: Makefile distinfo Added Files: pkgsrc/sysutils/xenkernel41/patches: patch-CVE-2015-2752 patch-CVE-2015-2756 pkgsrc/sysutils/xenkernel42/patches: patch-CVE-2015-2752 patch-CVE-2015-2756 pkgsrc/sysutils/xenkernel45/patches: patch-CVE-2015-2752 patch-CVE-2015-2756 pkgsrc/sysutils/xentools41/patches: patch-CVE-2015-2752 patch-CVE-2015-2756 pkgsrc/sysutils/xentools42/patches: patch-CVE-2015-2752 patch-CVE-2015-2756 pkgsrc/sysutils/xentools45/patches: patch-CVE-2015-2752 patch-CVE-2015-2756 Log Message: apply fixes from upstream for XSA-125 Long latency MMIO mapping operations are not preemptible XSA-126 Unmediated PCI command register access in qemu @ text @d1 1 a1 1 $NetBSD$ a13 2 SHA1 (patch-CVE-2015-2752) = f9bca0b8744233e20ff97c3e8e2e404522e87f49 SHA1 (patch-CVE-2015-2756) = 07aaac4bcd0dfc6d708c1823288b9fc789ebd125 @ 1.36 log @Make it build on netbsd-6 (and maybe netbsd-5): Don't include other libraries in an archive, our ar seems to not support it. Instead, list all libraries at link time. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.35 2014/02/13 11:12:58 drochner Exp $ d39 1 a39 1 SHA1 (patch-da) = 1a7ecd9536340deac2945786b9faae55680525ca @ 1.35 log @add patch from upstream to fix use-after-free under memory pressure (CVE-2014-1950) bump PKGREV @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.34 2013/11/29 19:31:47 drochner Exp $ d62 2 a63 1 SHA1 (patch-xenstat_libxenstat_Makefile) = d797b824afd98ec3dd17c5f9ac1307f0eaab8214 @ 1.35.2.1 log @Pullup ticket #4412 - requested by bouer sysutils/xentools41: Fix build on NetBSD 6.x and NetBSD 5.x Revisions pulled up: - sysutils/xentools41/distinfo 1.36 - sysutils/xentools41/patches/patch-xenstat_libxenstat_Makefile 1.2 - sysutils/xentools41/patches/patch-xenstat_xentop_Makefile 1.1 --- Module Name: pkgsrc Committed By: bouyer Date: Wed May 14 20:22:41 UTC 2014 Modified Files: pkgsrc/sysutils/xentools41: distinfo pkgsrc/sysutils/xentools41/patches: patch-xenstat_libxenstat_Makefile Added Files: pkgsrc/sysutils/xentools41/patches: patch-xenstat_xentop_Makefile Log Message: Make it build on netbsd-6 (and maybe netbsd-5): Don't include other libraries in an archive, our ar seems to not support it. Instead, list all libraries at link time. @ text @d1 1 a1 1 $NetBSD$ d62 1 a62 2 SHA1 (patch-xenstat_libxenstat_Makefile) = 800dfa58e9f65cfc9694ff4ee8a85c96d6336cfe SHA1 (patch-xenstat_xentop_Makefile) = 6b59d1a8024f0b7f493a2205afd1d90495f01151 @ 1.34 log @add patch from upstream to fix a regression which made that the symbol table of NetBSD domU kernels was not loaded correctly, see http://mail-index.netbsd.org/port-xen/2013/11/29/msg008157.html for details bump PKGREV @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.33 2013/09/11 18:00:33 drochner Exp $ d13 1 @ 1.34.2.1 log @Pullup ticket #4329 - requested by drochner sysutils/xentools41: security patch Revisions pulled up: - sysutils/xentools41/Makefile 1.44 - sysutils/xentools41/distinfo 1.35 - sysutils/xentools41/patches/patch-CVE-2014-1950 1.1 --- Module Name: pkgsrc Committed By: drochner Date: Thu Feb 13 11:12:58 UTC 2014 Modified Files: pkgsrc/sysutils/xentools41: Makefile distinfo Added Files: pkgsrc/sysutils/xentools41/patches: patch-CVE-2014-1950 Log Message: add patch from upstream to fix use-after-free under memory pressure (CVE-2014-1950) bump PKGREV @ text @d1 1 a1 1 $NetBSD$ a12 1 SHA1 (patch-CVE-2014-1950) = b0d900722fd0f59a50f1e1eda1471105d5b557e5 @ 1.33 log @update to 4.1.6.1 This release fixes the following critical vulnerabilities: CVE-2013-1918 / XSA-45: Several long latency operations are not preemptible CVE-2013-1952 / XSA-49: VT-d interrupt remapping source validation flaw for bridges CVE-2013-2076 / XSA-52: Information leak on XSAVE/XRSTOR capable AMD CPUs CVE-2013-2077 / XSA-53: Hypervisor crash due to missing exception recovery on XRSTOR CVE-2013-2078 / XSA-54: Hypervisor crash due to missing exception recovery on XSETBV CVE-2013-2194, CVE-2013-2195, CVE-2013-2196 / XSA-55: Multiple vulnerabilities in libelf PV kernel handling CVE-2013-2072 / XSA-56: Buffer overflow in xencontrol Python bindings affecting xend CVE-2013-2211 / XSA-57: libxl allows guest write access to sensitive console related xenstore keys CVE-2013-1432 / XSA-58: Page reference counting error due to XSA-45/CVE-2013-1918 fixes XSA-61: libxl partially sets up HVM passthrough even with disabled iommu This release contains many bug fixes and improvements. The highlights are: addressing a regression from the fix for XSA-21 addressing a regression from the fix for XSA-46 bug fixes to low level system state handling, including certain hardware errata workarounds (CVE-2013-1918 and CVE-2013-1952 were patched in pkgsrc before) @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.32 2013/07/16 22:28:26 joerg Exp $ d25 1 a43 1 SHA1 (patch-examples_Makefile) = da39a3ee5e6b4b0d3255bfef95601890afd80709 a44 1 SHA1 (patch-hotplug_common_Makefile) = da39a3ee5e6b4b0d3255bfef95601890afd80709 @ 1.32 log @Fix header guard. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.31 2013/07/13 19:43:21 joerg Exp $ d6 3 a8 3 SHA1 (xen-4.1.5.tar.gz) = 38f098cdbcf4612a6e059e6ad332e68bbfc8bf4d RMD160 (xen-4.1.5.tar.gz) = 265d6a9faee6cf9314f4ed647604f7b43c327f52 Size (xen-4.1.5.tar.gz) = 10421420 bytes a12 1 SHA1 (patch-.._xen_patch-common_libelf_libelf-private.h) = b115b0118f932b15c653c131c0c9c9885e2480ff @ 1.31 log @Fix header guard. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.30 2013/05/06 14:59:10 joerg Exp $ d44 1 d46 1 d54 1 @ 1.30 log @Fix ctype use. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.29 2013/05/03 16:48:38 drochner Exp $ d13 1 a43 1 SHA1 (patch-examples_Makefile) = da39a3ee5e6b4b0d3255bfef95601890afd80709 a44 1 SHA1 (patch-hotplug_common_Makefile) = da39a3ee5e6b4b0d3255bfef95601890afd80709 @ 1.29 log @update to 4.1.5 This integrates fixes for all vulnerabilities which were patched in pkgsrc before. Among many bug fixes and improvements (around 50 since Xen 4.1.4): * ACPI APEI/ERST finally working on production systems * Bug fixes for other low level system state handling * Support for xz compressed Dom0 and DomU kernels @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.28 2013/04/19 14:03:51 bouyer Exp $ d43 1 d45 1 d55 1 @ 1.28 log @Add patch from Xen security advisory: http://lists.xen.org/archives/html/xen-announce/2013-02/msg00005.html @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.27 2013/04/11 19:57:53 joerg Exp $ d6 3 a8 3 SHA1 (xen-4.1.4.tar.gz) = d5f1e9c9eeb96202dd827c196750530ffc64baab RMD160 (xen-4.1.4.tar.gz) = e3cb379954c985354dfd7dfbed15eae43e73254d Size (xen-4.1.4.tar.gz) = 10387283 bytes a12 3 SHA1 (patch-CVE-2012-6075) = 9de84238489875d94245d4f6ce3689629bb318ee SHA1 (patch-CVE-2013-0215-1) = 61149c756c6b9314980368cadb09437c64205199 SHA1 (patch-CVE-2013-0215-2) = 44a86ef7fa85a212fda95e73ef8aefb98af1cc39 a50 1 SHA1 (patch-libcx_xc__dom__boot.c) = 0507c2d7fe194f2d11a367fb1840b5d36da66cb1 @ 1.27 log @Allow building Xen infrastructure with Clang. Fix various bugs in xenkernel3, xenkernel41, xentools3 and xentools41 exposed by Clang default warnings. Bump revisions for those. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.26 2013/03/15 16:10:57 is Exp $ d14 2 a45 1 SHA1 (patch-examples_Makefile) = da39a3ee5e6b4b0d3255bfef95601890afd80709 a46 1 SHA1 (patch-hotplug_common_Makefile) = da39a3ee5e6b4b0d3255bfef95601890afd80709 @ 1.26 log @Make oxenstored (more) usable, as originally researched by Aaron J. Grier, with implementation changes by myself: - rules to add the run-time path correctly when building shared versions of libraries. Using -dllpath to ocamlmklib for this - ',' would need to be clumsily escaped from gmake. (This also needs a patched ocamlmklib - from ocaml 4.00.1nb2 - that has -elfmode which prevents -L paths being added to the run-time path). - Path fixes, but not using fixed paths as originally proposed, but the SUBST framework. - Trim whitespace off a numeric string read out of the kernel. Instead of open coding the function, use String.trim, as the String library is used, anyway. (available in ocaml >= 4.00.1) @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.25 2013/01/20 15:21:54 drochner Exp $ d9 4 d44 3 d54 1 d62 1 @ 1.26.2.1 log @Pullup ticket #4124 - requested by bouyer sysutils/xentools41: security patch Revisions pulled up: - sysutils/xentools41/Makefile 1.30-1.31 - sysutils/xentools41/distinfo 1.27-1.28 - sysutils/xentools41/patches/patch-.._.._ipxe_src_arch_i386_include_librm.h 1.1 - sysutils/xentools41/patches/patch-.._.._ipxe_src_core_settings.c 1.1 - sysutils/xentools41/patches/patch-.._.._ipxe_src_net_tls.c 1.1 - sysutils/xentools41/patches/patch-.._Config.mk 1.1 - sysutils/xentools41/patches/patch-CVE-2013-0215-1 1.1 - sysutils/xentools41/patches/patch-CVE-2013-0215-2 1.1 - sysutils/xentools41/patches/patch-firmware_hvmloader_Makefile 1.1 - sysutils/xentools41/patches/patch-libcx_xc__dom__boot.c 1.1 - sysutils/xentools41/patches/patch-xenstat_libxenstat_Makefile 1.1 --- Module Name: pkgsrc Committed By: joerg Date: Thu Apr 11 19:57:53 UTC 2013 Modified Files: pkgsrc/sysutils/xenkernel3: Makefile distinfo pkgsrc/sysutils/xenkernel3/patches: patch-cw pkgsrc/sysutils/xenkernel33: Makefile distinfo pkgsrc/sysutils/xenkernel41: Makefile distinfo pkgsrc/sysutils/xentools3: Makefile distinfo pkgsrc/sysutils/xentools3-hvm: Makefile distinfo pkgsrc/sysutils/xentools3/patches: patch-.._patch-Config.mk patch-cg pkgsrc/sysutils/xentools33: Makefile distinfo pkgsrc/sysutils/xentools33/patches: patch-ab pkgsrc/sysutils/xentools41: Makefile distinfo Added Files: pkgsrc/sysutils/xenkernel3/patches: patch-xen_arch_x86_hvm_io.c patch-xen_arch_x86_string.c pkgsrc/sysutils/xenkernel33/patches: patch-Config.mk patch-xen_Makefile patch-xen_arch_x86_Rules.mk pkgsrc/sysutils/xenkernel41/patches: patch-Config.mk patch-xen_Makefile patch-xen_arch_x86_Rules.mk patch-xen_arch_x86_cpu_mcheck_vmce.c patch-xen_arch_x86_time.c pkgsrc/sysutils/xentools3-hvm/patches: patch-.._patch-Config.mk pkgsrc/sysutils/xentools3/patches: patch-libxc_xc__dom__x86.c pkgsrc/sysutils/xentools33/patches: patch-blktap_drivers_block-qcow.c patch-ioemu_block-vvfat.c pkgsrc/sysutils/xentools41/patches: patch-.._.._ipxe_src_arch_i386_include_librm.h patch-.._.._ipxe_src_core_settings.c patch-.._.._ipxe_src_net_tls.c patch-.._Config.mk patch-firmware_hvmloader_Makefile patch-libcx_xc__dom__boot.c patch-xenstat_libxenstat_Makefile Log Message: Allow building Xen infrastructure with Clang. Fix various bugs in xenkernel3, xenkernel41, xentools3 and xentools41 exposed by Clang default warnings. Bump revisions for those. --- Module Name: pkgsrc Committed By: bouyer Date: Fri Apr 19 14:03:52 UTC 2013 Modified Files: pkgsrc/sysutils/xentools41: Makefile distinfo Added Files: pkgsrc/sysutils/xentools41/patches: patch-CVE-2013-0215-1 patch-CVE-2013-0215-2 Log Message: Add patch from Xen security advisory: http://lists.xen.org/archives/html/xen-announce/2013-02/msg00005.html @ text @d1 1 a1 1 $NetBSD$ a8 4 SHA1 (patch-.._.._ipxe_src_arch_i386_include_librm.h) = 4549ac641b112321b4731a918d85219c3fce6808 SHA1 (patch-.._.._ipxe_src_core_settings.c) = 240ff973757403b983f12b2cbed826584c4a8aba SHA1 (patch-.._.._ipxe_src_net_tls.c) = c0cfbc2ab2b92c659c146601c4f80d58c951ca62 SHA1 (patch-.._Config.mk) = 9b971a41f67bb3974d3a4459bb9d96fbbd636c96 a9 2 SHA1 (patch-CVE-2013-0215-1) = 61149c756c6b9314980368cadb09437c64205199 SHA1 (patch-CVE-2013-0215-2) = 44a86ef7fa85a212fda95e73ef8aefb98af1cc39 a39 1 SHA1 (patch-firmware_hvmloader_Makefile) = b2914e4988ba004d45403d67f1580b1f9725d006 a46 1 SHA1 (patch-libcx_xc__dom__boot.c) = 0507c2d7fe194f2d11a367fb1840b5d36da66cb1 a53 1 SHA1 (patch-xenstat_libxenstat_Makefile) = d797b824afd98ec3dd17c5f9ac1307f0eaab8214 @ 1.25 log @oops, a patch was in the wrong sub-pkg bump PKGREV @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.24 2013/01/18 11:27:43 drochner Exp $ d49 4 @ 1.24 log @update to 4.1.4 changes: -fixes for vulnerabilities integrated (were patched in pkgsrc) -bug fixes and improvements @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.23 2012/12/19 12:29:44 is Exp $ d9 1 @ 1.23 log @Fix for DOS: XSA25 (CVE-2012-4544 / CVE-2012-2625) - dom0 memory exhaustion possibility by uncompressing of domU kernels. From upstream; only file paths changed to be relative to our WRKSRC. ok'd by cegger@@/wiz@@. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.22 2012/09/12 11:09:32 drochner Exp $ d6 3 a8 6 SHA1 (xen-4.1.3.tar.gz) = 0f688955262d08fba28361ca338f3ad0c0f53d74 RMD160 (xen-4.1.3.tar.gz) = a6296a16579fd628a1ff2aa64b6b800e4913eeae Size (xen-4.1.3.tar.gz) = 10382132 bytes SHA1 (patch-CVE-2012-3515) = ab861e94a23e87f6e2f1338c9b7b2c61818a6943 SHA1 (patch-CVE-2012-4411) = 4ede574c9d97a0553631ac94b48f2d7a5cb68628 SHA1 (patch-XSA25) = bdadcc2dfeef2a6afe000324fc08d5d3214c4f3b @ 1.22 log @update to 4.1.3 also add security patches from upstream changes: -fixes for vulnerabilities were integrated -many bug fixes and improvements, Highlights are: -Bug fixes and improvements to the libxl tool stack approved by maintainer @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.21 2012/05/30 08:29:43 bouyer Exp $ d11 1 @ 1.21 log @Fix build failure reported by David Holland. I don't know why gmake didn't stop for me on this error. Bump PKGREVISION, as despite the error the package did build fine for me. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.20 2012/05/30 03:27:05 taca Exp $ d6 5 a10 3 SHA1 (xen-4.1.2.tar.gz) = db584cb0a0cc614888d7df3b196d514fdb2edd6e RMD160 (xen-4.1.2.tar.gz) = 457797ec4be286afbbcad940a9ce04e44f3f40d6 Size (xen-4.1.2.tar.gz) = 10365786 bytes a49 2 SHA1 (patch-ocaml-include-path) = 959df25b0aae78d525b25f223190203d3c1185a6 SHA1 (patch-qemu-e1000-CVSE-2012-0029) = 064ba74795e7a1ceb863d1f7bc171f3841c81b8a @ 1.20 log @Fix path of the target file in patch files. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.19 2012/05/29 15:01:34 bouyer Exp $ d41 1 @ 1.19 log @Add support for PCI pass-through for HVM guests, based on patch sent by dukzcry on netbsd-users@@ on may 14. This supports only HVM guests, and only with the xl tool. bump pkgrevision. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.18 2012/05/10 16:07:36 abs Exp $ d39 1 a39 1 SHA1 (patch-ioemu-qemu-xen_hw_pass-through.c) = 7e295a7342e0fc7332fee9a516cebdffaa21766e @ 1.18 log @Correctly handle PKG_SYSCONFDIR - bump pkgrevision @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.17 2012/02/03 17:00:25 bouyer Exp $ d39 6 d46 1 @ 1.17 log @Pull up fix from Xen repository, fixing CVE-2012-0029: Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation allows the guest to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets. Bump PKGREVISION @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.16 2012/01/26 11:19:23 cegger Exp $ d32 1 @ 1.16 log @Apply patch 79d1d3311319f3390f540f547becaba9d957f84c from qemu upstream: Fill in word 64 of IDENTIFY data to indicate support for PIO modes 3 and 4. This allows NetBSD guests to use UltraDMA modes instead of just PIO mode 0. With this patch I can no longer reproduce PR 42455. Bump package revision. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.15 2011/12/14 04:01:37 sbd Exp $ d40 1 @ 1.15 log @Regenerate diffs for GNU patch. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.14 2011/10/29 14:16:53 jmcneill Exp $ d37 1 @ 1.15.2.1 log @Pullup ticket #3672 - requested by bouyer sysutils/xentools33: security patch sysutils/xentools41: security patch Revisions pulled up: - sysutils/xentools33/Makefile 1.29 via patch - sysutils/xentools33/distinfo 1.27 via patch - sysutils/xentools33/patches/patch-qemu-e1000-CVSE-2012-0029 1.1 - sysutils/xentools41/Makefile 1.15 via patch - sysutils/xentools41/distinfo 1.17 - sysutils/xentools41/patches/patch-qemu-e1000-CVSE-2012-0029 1.1 --- Module Name: pkgsrc Committed By: bouyer Date: Fri Feb 3 17:00:25 UTC 2012 Modified Files: pkgsrc/sysutils/xentools33: Makefile distinfo pkgsrc/sysutils/xentools41: Makefile distinfo Added Files: pkgsrc/sysutils/xentools33/patches: patch-qemu-e1000-CVSE-2012-0029 pkgsrc/sysutils/xentools41/patches: patch-qemu-e1000-CVSE-2012-0029 Log Message: Pull up fix from Xen repository, fixing CVE-2012-0029: Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation allows the guest to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets. Bump PKGREVISION @ text @d1 1 a1 1 $NetBSD$ a38 1 SHA1 (patch-qemu-e1000-CVSE-2012-0029) = 064ba74795e7a1ceb863d1f7bc171f3841c81b8a @ 1.15.2.2 log @Pullup ticket #3672 - requested by bouyer sysutils/xentools33: build fix sysutils/xentools41: bug fix Revisions pulled up: - sysutils/xentools33/Makefile 1.28 - sysutils/xentools33/distinfo 1.26 - sysutils/xentools33/patches/patch-blktaplib_h 1.1 - sysutils/xentools33/patches/patch-io_ring_h 1.1 - sysutils/xentools41/Makefile 1.14 - sysutils/xentools41/distinfo 1.16 - sysutils/xentools41/patches/patch-df 1.1 --- Module Name: pkgsrc Committed By: cegger Date: Mon Jan 9 14:06:35 UTC 2012 Modified Files: pkgsrc/sysutils/xentools33: Makefile distinfo Added Files: pkgsrc/sysutils/xentools33/patches: patch-blktaplib_h patch-io_ring_h Log Message: Apply fixes for gcc 4.5. I cannot reproduce the error message show in PR 45386. Bump revision. --- Module Name: pkgsrc Committed By: cegger Date: Thu Jan 26 11:19:24 UTC 2012 Modified Files: pkgsrc/sysutils/xentools41: Makefile distinfo Added Files: pkgsrc/sysutils/xentools41/patches: patch-df Log Message: Apply patch 79d1d3311319f3390f540f547becaba9d957f84c from qemu upstream: Fill in word 64 of IDENTIFY data to indicate support for PIO modes 3 and 4. This allows NetBSD guests to use UltraDMA modes instead of just PIO mode 0. With this patch I can no longer reproduce PR 42455. Bump package revision. @ text @a36 1 SHA1 (patch-df) = d20bf9d3fd05f5334f77c9154bf0fb9944c1292c @ 1.14 log @fix previous @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.13 2011/10/29 10:20:52 jmcneill Exp $ d13 1 a13 1 SHA1 (patch-ae) = 032f9bd48bbe7423d24ec8464ef6b626d7f1369a @ 1.13 log @Fix build for 32-bit hosts with a 64-bit time_t @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.12 2011/10/28 11:31:29 bouyer Exp $ d37 1 a39 1 SHA1 (patch-tools_libxl_libxl_create.c) = f53d195026f8268ec424508df351714477409dad @ 1.12 log @Do not hardcode /usr/pkg, use $PREFIX @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.11 2011/10/26 13:39:48 bouyer Exp $ d39 1 @ 1.11 log @Re-add patch-dd and patch-de, without them it doesn't package properly. Without these patches, config and sample files are installed in ${PREFIX}/etc/xen instead of ${PREFIX}/share/example/xen/ @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.10 2011/10/21 18:27:21 cegger Exp $ d37 1 @ 1.10 log @Update to Xen 4.1.2 Fixes/features include: * New XL toolstack * kexec/kdump * Remus * Device passthrough to HVM guests * Interrupt handling * Support for Supervisor Mode Execution Protection (SMEP) @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.9 2011/10/03 16:58:58 sborrill Exp $ d35 2 @ 1.9 log @Add patch to be used by xenstoretools to install a subset of the relevant tools. @ text @d1 1 a1 1 $NetBSD$ d6 3 a8 3 SHA1 (xen-4.1.1.tar.gz) = f1b5ef4b663c339faf9c77fc895327cfbcc9776c RMD160 (xen-4.1.1.tar.gz) = 4b3c0641b0f098889f627662aa6b8fea00c5b636 Size (xen-4.1.1.tar.gz) = 10355625 bytes a34 2 SHA1 (patch-dd) = b0c6253a77c09c8625bc9425742b395d1ce67010 SHA1 (patch-de) = b118ff85070cac7cd81375d2f59ad10b719ae263 @ 1.8 log @Xen 4.1.1 (maintenance release) * Security fixes including CVE-2011-1583 CVE-2011-1898 * Enhancements to guest introspection (VM single stepping support for very fine-grained access control) * Many stability improvements, such as: PV-on-HVM stability fixes (fixing some IRQ issues), XSAVE cpu feature support for PV guests (allows safe use of latest multimedia instructions), RAS fixes for high availability, fixes for offlining bad pages and changes to libxc, mainly of benefit to libvirt * Compatibility fixes for newer Linux guests, newer compilers, some old guest savefiles, newer Python, grub2, some hardware/BIOS bugs. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.7 2011/05/20 17:09:21 bouyer Exp $ d38 1 @ 1.7 log @Add a patch which fixes 2 problems: - use the correct way to get the size of a disk device or partition (from haad@@NetBSD.org) - if given a block device, use the character device instead (the block device is already in use by the backend driver). With this I could succeffully boot a HVMPV FreeBSD kernel using a phy: virtual disk. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.6 2011/05/12 15:57:38 bouyer Exp $ d6 3 a8 4 SHA1 (xen-4.1.0.tar.gz) = 4295e67524746ce155ff991db5fd2a611be27f67 RMD160 (xen-4.1.0.tar.gz) = e9ef987b24503d6c993bccfd203be5af9f104f48 Size (xen-4.1.0.tar.gz) = 10348539 bytes SHA1 (patch-CVE-2011-1583) = adbe2e6d2bc89cfdfb44ff8011e29f1d128fd820 a37 1 SHA1 (patch-xm-test_ramdisk_make-release.sh) = 0844f1e022182d91dc04df552828820f4c946b5f @ 1.6 log @Apply patch from xen repository, fixing CVE-2011-1583 @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.5 2011/05/07 18:39:05 tnn Exp $ d38 1 @ 1.5 log @Try to fix CONF_FILES handling and some pkglint warnings. Bump PKGREVISION. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.4 2011/05/07 16:55:58 tnn Exp $ d9 1 @ 1.4 log @Override texi2html & pod2man detection so that manpages belonging to emulators/qemu don't get spuriously overwritten during install. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.3 2011/05/02 20:32:27 abs Exp $ d9 1 a9 1 SHA1 (patch-aa) = 3c03ea5d22e2edecbfa10de79e88a330204a8a70 d35 2 @ 1.3 log @Avoid using == in /bin/sh script. Bump PKGREVISION @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.2 2011/04/15 10:32:22 bouyer Exp $ d32 1 a32 1 SHA1 (patch-da) = 80a609a9ae050122a6b5b65b9798f5e29bec13a4 @ 1.2 log @Install hotplug scripts (actually called by xenbackendd on NetBSD) in share/examples/xen/scripts, and copy them to etc/xen/scripts/. Bump pkgrevision @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.1.1.1 2011/04/06 09:10:26 cegger Exp $ d35 1 @ 1.1 log @Initial revision @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.19 2010/01/01 00:34:53 ver Exp $ d15 2 a16 2 SHA1 (patch-ag) = f1f58566b41922d661bbe6ea7e4c90d17cecd7fe SHA1 (patch-ah) = 1227ce79a9547464059f7de7a18bd342c4741280 d19 2 a20 1 SHA1 (patch-ak) = dee9673fd67f582da64e8f2c14b566032f162f6f @ 1.1.1.1 log @The Xen virtual machine monitor allows running several virtual machines on a single physical machine. The xentools41 package contains the tools to create, destroy and control the virtual machines. This package contains the tools for Xen 4.1.x Release notes: The Xen team is pleased to announce the release of Xen 4.1. The result of nearly 12 months of development, new features include: * A re-architected and improved XL toolstack replacing XM/XEND * Prototype credit2 scheduler designed for latency-sensitive workloads and very large systems. * CPU Pools for advanced partitioning. * Support for large systems (>255 processors) * Support for x86 Advanced Vector eXtension (AVX). * New Memory Access API enabling integration of 3rd party security solutions into Xen virtualized environments. * Many IOMMU fixes (both Intel VT-d IOMMU and AMD IOMMU). * Many toolstack and buildsystem fixes for Linux and NetBSD hosts. * Thirdparty libs: libvirt driver for libxl has been merged to upstream libvirt. * HVM guest PXE boot enhancements, replacing gPXE with iPXE. * Even better stability through our new automated regression tests. Detailed release notes, including a more extensive feature list: http://wiki.xen.org/xenwiki/Xen4.1 To download tarballs: http://xen.org/products/xen_source.html Or the Mercurial source repository (tag 'RELEASE-4.1.0'): http://xenbits.xen.org/xen-unstable.hg And the announcement on the Xen blog: http://blog.xen.org/index.php/2011/03/25/xen-4-1-releases/ Thanks to the many people who have contributed to this release! Regards, The Xen Team @ text @@