diff options
Diffstat (limited to 'main/xen/APKBUILD')
-rw-r--r-- | main/xen/APKBUILD | 249 |
1 files changed, 176 insertions, 73 deletions
diff --git a/main/xen/APKBUILD b/main/xen/APKBUILD index 3a0c87a2994..1810b054d63 100644 --- a/main/xen/APKBUILD +++ b/main/xen/APKBUILD @@ -1,11 +1,11 @@ # Contributor: Roger Pau Monne <roger.pau@entel.upc.edu> # Maintainer: Natanael Copa <ncopa@alpinelinux.org> pkgname=xen -pkgver=4.16.0 +pkgver=4.18.2 pkgrel=1 pkgdesc="Xen hypervisor" url="https://www.xenproject.org/" -arch="x86_64 armv7 aarch64" # enable armv7 when builds with gcc8 +arch="x86_64 armv7 aarch64" license="GPL-2.0-only" depends="bash iproute2 logrotate" depends_dev=" @@ -16,8 +16,6 @@ depends_dev=" dev86 e2fsprogs-dev flex - gettext - glib-dev gnutls-dev libaio-dev libcap-ng-dev @@ -25,10 +23,11 @@ depends_dev=" linux-headers lzo-dev ncurses-dev - openssl1.1-compat-dev + openssl-dev>3 pciutils-dev perl perl-dev + py3-setuptools python3-dev spice-dev texinfo @@ -47,6 +46,8 @@ options="!strip" # 0: # - CVE-2020-29568 XSA-349 # - CVE-2020-29569 XSA-350 +# - CVE-2022-21127 +# - CVE-2023-46840 XSA-450 # 4.7.0-r0: # - CVE-2016-6258 XSA-182 # - CVE-2016-6259 XSA-183 @@ -145,35 +146,35 @@ options="!strip" # 4.10.1-r0: # - CVE-2018-10472 XSA-258 # - CVE-2018-10471 XSA-259 -# 4.10-1-r1: +# 4.10.1-r1: # - CVE-2018-8897 XSA-260 # - CVE-2018-10982 XSA-261 # - CVE-2018-10981 XSA-262 # 4.11.0-r0: -# - CVE-2018-3639 XSA-263 -# - CVE-2018-12891 XSA-264 -# - CVE-2018-12893 XSA-265 -# - CVE-2018-12892 XSA-266 -# - CVE-2018-3665 XSA-267 +# - CVE-2018-3639 XSA-263 +# - CVE-2018-12891 XSA-264 +# - CVE-2018-12893 XSA-265 +# - CVE-2018-12892 XSA-266 +# - CVE-2018-3665 XSA-267 # 4.11.1-r0: -# - CVE-2018-15469 XSA-268 -# - CVE-2018-15468 XSA-269 -# - CVE-2018-15470 XSA-272 -# - CVE-2018-3620 XSA-273 -# - CVE-2018-3646 XSA-273 -# - CVE-2018-19961 XSA-275 -# - CVE-2018-19962 XSA-275 -# - CVE-2018-19963 XSA-276 -# - CVE-2018-19964 XSA-277 -# - CVE-2018-18883 XSA-278 -# - CVE-2018-19965 XSA-279 -# - CVE-2018-19966 XSA-280 -# - CVE-2018-19967 XSA-282 +# - CVE-2018-15469 XSA-268 +# - CVE-2018-15468 XSA-269 +# - CVE-2018-15470 XSA-272 +# - CVE-2018-3620 XSA-273 +# - CVE-2018-3646 XSA-273 +# - CVE-2018-19961 XSA-275 +# - CVE-2018-19962 XSA-275 +# - CVE-2018-19963 XSA-276 +# - CVE-2018-19964 XSA-277 +# - CVE-2018-18883 XSA-278 +# - CVE-2018-19965 XSA-279 +# - CVE-2018-19966 XSA-280 +# - CVE-2018-19967 XSA-282 # 4.12.0-r2: -# - CVE-2018-12126 XSA-297 -# - CVE-2018-12127 XSA-297 -# - CVE-2018-12130 XSA-297 -# - CVE-2019-11091 XSA-297 +# - CVE-2018-12126 XSA-297 +# - CVE-2018-12127 XSA-297 +# - CVE-2018-12130 XSA-297 +# - CVE-2019-11091 XSA-297 # 4.12.1-r0: # - CVE-2019-17349 CVE-2019-17350 XSA-295 # 4.13.0-r0: @@ -196,9 +197,9 @@ options="!strip" # - CVE-2020-11743 XSA-316 # - CVE-2020-11742 XSA-318 # 4.13.1-r0: -# - CVE-????-????? XSA-312 +# - XSA-312 # 4.13.1-r3: -# - CVE-2020-0543 XSA-320 +# - CVE-2020-0543 XSA-320 # 4.13.1-r4: # - CVE-2020-15566 XSA-317 # - CVE-2020-15563 XSA-319 @@ -240,7 +241,7 @@ options="!strip" # - CVE-2020-29570 XSA-358 # - CVE-2020-29571 XSA-359 # 4.14.1-r2: -# - CVE-2021-3308 XSA-360 +# - CVE-2021-3308 XSA-360 # 4.14.1-r3: # - CVE-2021-26933 XSA-364 # 4.15.0-r0: @@ -248,7 +249,7 @@ options="!strip" # 4.15.0-r1: # - CVE-2021-28693 XSA-372 # - CVE-2021-28692 XSA-373 -# - CVE-2021-0089 XSA-375 +# - CVE-2021-0089 XSA-375 # - CVE-2021-28690 XSA-377 # 4.15.0-r2: # - CVE-2021-28694 XSA-378 @@ -262,6 +263,7 @@ options="!strip" # - CVE-2021-28701 XSA-384 # 4.15.1-r1: # - CVE-2021-28702 XSA-386 +# - CVE-2021-28703 XSA-387 # - CVE-2021-28710 XSA-390 # 4.15.1-r2: # - CVE-2021-28704 XSA-388 @@ -269,6 +271,107 @@ options="!strip" # - CVE-2021-28708 XSA-388 # - CVE-2021-28705 XSA-389 # - CVE-2021-28709 XSA-389 +# 4.16.1-r0: +# - CVE-2022-23033 XSA-393 +# - CVE-2022-23034 XSA-394 +# - CVE-2022-23035 XSA-395 +# - CVE-2022-26356 XSA-397 +# - XSA-398 +# - CVE-2022-26357 XSA-399 +# - CVE-2022-26358 XSA-400 +# - CVE-2022-26359 XSA-400 +# - CVE-2022-26360 XSA-400 +# - CVE-2022-26361 XSA-400 +# 4.16.1-r2: +# - CVE-2022-26362 XSA-401 +# - CVE-2022-26363 XSA-402 +# - CVE-2022-26364 XSA-402 +# 4.16.1-r3: +# - CVE-2022-21123 XSA-404 +# - CVE-2022-21125 XSA-404 +# - CVE-2022-21166 XSA-404 +# 4.16.1-r4: +# - CVE-2022-26365 XSA-403 +# - CVE-2022-33740 XSA-403 +# - CVE-2022-33741 XSA-403 +# - CVE-2022-33742 XSA-403 +# 4.16.1-r5: +# - CVE-2022-23816 XSA-407 +# - CVE-2022-23825 XSA-407 +# - CVE-2022-29900 XSA-407 +# 4.16.1-r6: +# - CVE-2022-33745 XSA-408 +# 4.16.2-r1: +# - CVE-2022-42327 XSA-412 +# - CVE-2022-42309 XSA-414 +# 4.16.2-r2: +# - CVE-2022-23824 XSA-422 +# 4.17.0-r0: +# - CVE-2022-42311 XSA-326 +# - CVE-2022-42312 XSA-326 +# - CVE-2022-42313 XSA-326 +# - CVE-2022-42314 XSA-326 +# - CVE-2022-42315 XSA-326 +# - CVE-2022-42316 XSA-326 +# - CVE-2022-42317 XSA-326 +# - CVE-2022-42318 XSA-326 +# - CVE-2022-33747 XSA-409 +# - CVE-2022-33746 XSA-410 +# - CVE-2022-33748 XSA-411 +# - CVE-2022-33749 XSA-413 +# - CVE-2022-42310 XSA-415 +# - CVE-2022-42319 XSA-416 +# - CVE-2022-42320 XSA-417 +# - CVE-2022-42321 XSA-418 +# - CVE-2022-42322 XSA-419 +# - CVE-2022-42323 XSA-419 +# - CVE-2022-42324 XSA-420 +# - CVE-2022-42325 XSA-421 +# - CVE-2022-42326 XSA-421 +# 4.17.0-r2: +# - CVE-2022-42330 XSA-425 +# - CVE-2022-27672 XSA-426 +# 4.17.0-r5: +# - CVE-2022-42332 XSA-427 +# - CVE-2022-42333 CVE-2022-43334 XSA-428 +# - CVE-2022-42331 XSA-429 +# - CVE-2022-42335 XSA-430 +# 4.17.1-r1: +# - CVE-2022-42336 XSA-431 +# 4.17.1-r3: +# - CVE-2023-20593 XSA-433 +# 4.17.1-r5: +# - CVE-2023-34320 XSA-436 +# 4.17.2-r0: +# - CVE-2023-20569 XSA-434 +# - CVE-2022-40982 XSA-435 +# 4.17.2-r1: +# - CVE-2023-34321 XSA-437 +# - CVE-2023-34322 XSA-438 +# 4.17.2-r2: +# - CVE-2023-20588 XSA-439 +# 4.17.2-r3: +# - CVE-2023-34323 XSA-440 +# - CVE-2023-34326 XSA-442 +# - CVE-2023-34325 XSA-443 +# - CVE-2023-34327 XSA-444 +# - CVE-2023-34328 XSA-444 +# 4.17.2-r4: +# - CVE-2023-46835 XSA-445 +# - CVE-2023-46836 XSA-446 +# 4.18.0-r2: +# - CVE-2023-46837 XSA-447 +# 4.18.0-r3: +# - CVE-2023-46839 XSA-449 +# 4.18.0-r4: +# - CVE-2023-46841 XSA-451 +# 4.18.0-r5: +# - CVE-2023-28746 XSA-452 +# - CVE-2024-2193 XSA-453 +# 4.18.2-r0: +# - CVE-2023-46842 XSA-454 +# - CVE-2024-31142 XSA-455 +# - CVE-2024-2201 XSA-456 case "$CARCH" in x86*) @@ -286,7 +389,9 @@ esac # subpackages="$pkgname-dbg" #fi subpackages="$subpackages $pkgname-doc $pkgname-dev $pkgname-libs - $pkgname-hypervisor $pkgname-bridge $pkgname-qemu" + $pkgname-hypervisor $pkgname-pyc $pkgname-bridge + $pkgname-bridge-openrc:bridge_openrc $pkgname-qemu + $pkgname-qemu-openrc:qemu_openrc $pkgname-bash-completion" # grep _VERSION= stubdom/configure _ZLIB_VERSION="1.2.3" @@ -299,8 +404,7 @@ _POLARSSL_VERSION="1.1.4" _TPMEMU_VERSION="0.7.4" # grep ^IPXE_GIT_TAG tools/firmware/etherboot/Makefile -_IPXE_GIT_TAG=3c040ad387099483102708bb1839110bc788cefb - +_IPXE_GIT_TAG=1d1cf74a5e58811822bee4b3da3cff7282fcdfca source="https://downloads.xenproject.org/release/xen/$pkgver/xen-$pkgver.tar.gz https://xenbits.xen.org/xen-extfiles/gmp-$_GMP_VERSION.tar.bz2 @@ -318,8 +422,6 @@ source="https://downloads.xenproject.org/release/xen/$pkgver/xen-$pkgver.tar.gz hotplug-vif-vtrill.patch - xenqemu-xattr-size-max.patch - hotplug-Linux-iscsi-block-handle-lun-1.patch stubdom-hack.patch @@ -347,7 +449,8 @@ aarch64) export XEN_TARGET_ARCH="arm64";; esac prepare() { - local i _failed='' + default_prepare + local i for i in $source; do case $i in @@ -358,9 +461,6 @@ prepare() { cp "$srcdir"/$p tools/firmware/etherboot/patches/ echo "$p" >> tools/firmware/etherboot/patches/series ;; - *.patch) msg $i; patch -s -N -p1 -i "$srcdir"/$i \ - || _failed="$_failed $i" - ;; */ipxe-git-*) ln -s "$srcdir"/${i##*/} \ tools/firmware/etherboot/ipxe.tar.gz @@ -370,13 +470,6 @@ prepare() { ;; esac done - if [ -n "$_failed" ]; then - error "Patches failed:" - for i in $_failed; do - echo $i - done - return 1 - fi # remove all -Werror msg "Eradicating -Werror..." @@ -404,11 +497,6 @@ munge_cflags() { unset LDFLAGS unset LANG unset LC_ALL - - case "$CARCH" in - arm*) export CFLAGS="-mcpu=cortex-a15";; - aarch64) export CFLAGS="-mcpu=cortex-a53";; - esac } # These tasks are added as separate tasks to enable a packager @@ -450,7 +538,7 @@ build_tools() { munge_cflags msg "Building tools..." - make tools + NO_WERROR=1 make tools } build_docs() { @@ -485,7 +573,9 @@ package() { x86*) _stubdom=install-stubdom;; esac - make DESTDIR="$pkgdir" EFI_DIR=/usr/lib/efi install-xen install-tools install-docs $_stubdom + make DESTDIR="$pkgdir" EFI_DIR=/usr/lib/efi \ + BASH_COMPLETION_DIR=/usr/share/bash-completion/completions \ + install-xen install-tools install-docs $_stubdom # remove default xencommons rm -rf "$pkgdir"/etc/init.d/xencommons @@ -540,9 +630,23 @@ hypervisor() { bridge() { depends="dnsmasq" pkgdesc="Bridge interface for XEN with dhcp" + + mkdir -p "$subpkgdir"/etc/xen + + cat ->>"$subpkgdir"/etc/xen/dnsmasq.conf <<EOF + #dhcp-host=somehost,10.0.4.3 + #dhcp-host=otherhost,10.0.4.4 +EOF + +} + +bridge_openrc() { + depends= + pkgdesc="Bridge interface for XEN with dhcp (OpenRC init scripts)" + install_if="openrc ${subpkgname%-openrc}=$pkgver-r$pkgrel" + mkdir -p "$subpkgdir"/etc/conf.d \ - "$subpkgdir"/etc/init.d \ - "$subpkgdir"/etc/xen + "$subpkgdir"/etc/init.d ln -s dnsmasq "$subpkgdir"/etc/init.d/dnsmasq.xenbr0 cat ->>"$subpkgdir"/etc/conf.d/dnsmasq.xenbr0 <<EOF @@ -554,11 +658,6 @@ bridge() { BRIDGE_MAC="00:16:3f:00:00:00" DNSMASQ_CONFFILE="/etc/xen/dnsmasq.conf" EOF - cat ->>"$subpkgdir"/etc/xen/dnsmasq.conf <<EOF - #dhcp-host=somehost,10.0.4.3 - #dhcp-host=otherhost,10.0.4.4 -EOF - } qemu() { @@ -568,13 +667,9 @@ qemu() { depends="$depends seabios-bin" ;; esac - mkdir -p "$subpkgdir"/etc/conf.d \ - "$subpkgdir"/etc/init.d \ - "$subpkgdir"/usr/lib/xen/bin \ + mkdir -p "$subpkgdir"/usr/lib/xen/bin \ "$subpkgdir"/usr/share/applications - amove etc/conf.d/xenqemu - amove etc/init.d/xenqemu amove usr/lib/xen/bin/qemu* mv "$pkgdir"/usr/share/qemu-xen/applications/qemu.desktop \ "$subpkgdir"/usr/share/applications/qemu-xen.desktop @@ -598,8 +693,17 @@ qemu() { esac } +qemu_openrc() { + depends= + pkgdesc="QEMU for XEN (OpenRC init scripts)" + install_if="openrc ${subpkgname%-openrc}=$pkgver-r$pkgrel" + + amove etc/conf.d/xenqemu + amove etc/init.d/xenqemu +} + sha512sums=" -2869ed90d1779c9754d7f2397f5fc67a655304d9c32953ac20655ef96cb154521d8fce9f23915ac0c91f984dc54f72c67e5e619e2da318b5997748f44cf21b87 xen-4.16.0.tar.gz +c5feb450155883b5d2e7f43b05a64e7215b661b7d2f438d8f5a0896bd57283379ee11ca8e2e7a1d8787813cc6f1a260253fcb8688ed7d61a2bfb636db1626941 xen-4.18.2.tar.gz 2e0b0fd23e6f10742a5517981e5171c6e88b0a93c83da701b296f5c0861d72c19782daab589a7eac3f9032152a0fc7eff7f5362db8fccc4859564a9aa82329cf gmp-4.3.2.tar.bz2 c2bc9ffc8583aeae71cee9ddcc4418969768d4e3764d47307da54f93981c0109fb07d84b061b3a3628bd00ba4d14a54742bc04848110eb3ae8ca25dbfbaabadb grub-0.97.tar.gz 1465b58279af1647f909450e394fe002ca165f0ff4a0254bfa9fe0e64316f50facdde2729d79a4e632565b4500cf4d6c74192ac0dd3bc9fe09129bbd67ba089d lwip-1.3.0.tar.gz @@ -608,14 +712,13 @@ c2bc9ffc8583aeae71cee9ddcc4418969768d4e3764d47307da54f93981c0109fb07d84b061b3a36 88da614e4d3f4409c4fd3bb3e44c7587ba051e3fed4e33d526069a67e8180212e1ea22da984656f50e290049f60ddca65383e5983c0f8884f648d71f698303ad polarssl-1.1.4-gpl.tgz 4928b5b82f57645be9408362706ff2c4d9baa635b21b0d41b1c82930e8c60a759b1ea4fa74d7e6c7cae1b7692d006aa5cb72df0c3b88bf049779aa2b566f9d35 tpm_emulator-0.7.4.tar.gz 021b958fcd0d346c4ba761bcf0cc40f3522de6186cf5a0a6ea34a70504ce9622b1c2626fce40675bc8282cf5f5ade18473656abc38050f72f5d6480507a2106e zlib-1.2.3.tar.gz -4ac1d07ce879a3a8c6c260380258c37f5e4ecddc880b27fb59afc38fbf3718e81b04a4dda2b58fe7a438a23175e00b6179fc067acbc4a75e33d93c4b85ff5d68 ipxe-git-3c040ad387099483102708bb1839110bc788cefb.tar.gz +e27644cbb030c43e2841058003bedea6deb979ba71591f967e01312527ed869bb863f9a03fc7b5a266752433d30164929ea1b935953a245600ad713c9fb25cb5 ipxe-git-1d1cf74a5e58811822bee4b3da3cff7282fcdfca.tar.gz b9c754220187955d01ffbb6e030dace9d9aaae755db1765d07e407858c71a2cb0de04e0ab2099cd121d9e1bc1978af06c7dbd2fd805e06eca12ac5d527f15a52 mini-os-__divmoddi4.patch -fe3c253d03e1962ca4dd6bccd2e51817075450f51aa66e8ab9673bdd5a530dc08f1ed7817a1271ada028b0c34162f37cd6b24d84334403767caacd8206284cbb qemu-xen_paths.patch +15de6a62394ef9f338fbe25a434fe5c3725abef5fd98966b863e14a58dc447014c49ed890c4d469f60d63a0db763f3e84f0407201d71eb9bfe42a00054eee1d8 qemu-xen_paths.patch 1c9cb24bf67a2e84466572198315d5501627addf1ccd55d8d83df8d77d269a6696cd45e4a55601495168284e3bff58fb39853f56c46aaddd14f6191821678cf6 hotplug-vif-vtrill.patch -2094ea964fa610b2bf72fd2c7ede7e954899a75c0f5b08030cf1d74460fb759ade84866176e32f8fe29c921dfdc6dafd2b31e23ab9b0a3874d3dceeabdd1913b xenqemu-xattr-size-max.patch 8c9cfc6afca325df1d8026e21ed03fa8cd2c7e1a21a56cc1968301c5ab634bfe849951899e75d328951d7a41273d1e49a2448edbadec0029ed410c43c0549812 hotplug-Linux-iscsi-block-handle-lun-1.patch -6c28470dab368ce94d94db9e66954e4d915394ea730f6d4abb198ae122dbd7412453d6d8054f0a348d43d7f807fb13294363162f8b19f47311e802ffa9a40a90 stubdom-hack.patch -a8dda349cab62febf2ef506eb26d2ba494a649b1c37206519ae23f02a36f600b19996bb8a148e5f21a240ec53ecfcf971a07686b9ddcdad417563fdf39b2215f xenstored.initd +ed0ab25cd1966df7df503d285c17ede434033665d1569f8fb28172f37a10222b30d662e2ea867519eb40843de58dc3a56883d6f66a4fafa0a6ee1056ba72c25d stubdom-hack.patch +9430940692d6bfb58b1438e0f5f84cb703fbca9ce9cc157a1313ab1ceff63222a1ae31c991543b20c8fc84300df2b22f4614b27bbff32f82e17f27fcd953143c xenstored.initd 093f7fbd43faf0a16a226486a0776bade5dc1681d281c5946a3191c32d74f9699c6bf5d0ab8de9d1195a2461165d1660788e92a3156c9b3c7054d7b2d52d7ff0 xenstored.confd 1dd04f4bf1890771aa7eef0b6e46f7139487da0907d28dcdbef9fbe335dcf731ca391cfcb175dd82924f637a308de00a69ae981f67348c34f04489ec5e5dc3b7 xenconsoled.initd 30df69cc38d0bed26bc4d6e08a2b62cbdc654d5f663009a05cb3b83b3e3dc5e206362d3fd59abbb753ceb8d6d79eaa6e15d079bb8f4f35dc74667103faf4e85d xenconsoled.confd |