diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/nova-agent/files/nova-agent.service b/sdk_container/src/third_party/coreos-overlay/app-emulation/nova-agent/files/nova-agent.service new file mode 100644 index 0000000000..b436a4be50 --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/nova-agent/files/nova-agent.service @@ -0,0 +1,10 @@ +[Unit] +Description=Rackspace Nova Agent + +[Service] +ExecStartPre=/bin/mount -t xenfs none /proc/xen +ExecStart=/usr/sbin/nova-agent -n -o - -l info /usr/share/nova-agent/nova-agent.py +ExecReload=/bin/kill -HUP $MAINPID + +[Install] +WantedBy=network.target diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/nova-agent/nova-agent-9999.ebuild b/sdk_container/src/third_party/coreos-overlay/app-emulation/nova-agent/nova-agent-9999.ebuild new file mode 100644 index 0000000000..fa6768eaa2 --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/nova-agent/nova-agent-9999.ebuild @@ -0,0 +1,36 @@ +# +# Copyright (c) 2011 The Chromium OS Authors. All rights reserved. +# Distributed under the terms of the GNU General Public License v2 +# $Header:$ +# + +EAPI=2 +EGIT_REPO_URI="https://github.com/coreos/openstack-guest-agents-unix" +inherit toolchain-funcs systemd git-2 + +DESCRIPTION="Rackspace Nova Agent" +HOMEPAGE="https://github.com/rackerlabs/openstack-guest-agents-unix" +SRC_URI="" + +LICENSE="MIT" +SLOT="0" +KEYWORDS="~amd64 ~arm ~x86" +IUSE="" + +DEPEND="dev-util/patchelf" +RDEPEND="dev-python/pyxenstore" + +src_configure() { + ./autogen.sh + econf +} + +src_compile() { + emake +} + +src_install() { + emake DESTDIR="${D}" install + systemd_dounit "${FILESDIR}"/${PN}.service + systemd_enable_service multi-user.target ${PN}.service +} diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/ChangeLog b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/ChangeLog new file mode 100644 index 0000000000..667f936fe3 --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/ChangeLog @@ -0,0 +1,843 @@ +# ChangeLog for app-emulation/xen-tools +# Copyright 1999-2013 Gentoo Foundation; Distributed under the GPL v2 +# $Header: /var/cvsroot/gentoo-x86/app-emulation/xen-tools/ChangeLog,v 1.145 2013/03/16 16:46:57 idella4 Exp $ + + 16 Mar 2013; Ian Delaney files/xenstored.initd: + update depend() in xenstored.initd, fixes Bug #461632 by a.m + + 05 Mar 2013; Ian Delaney xen-tools-4.2.0-r3.ebuild, + xen-tools-4.2.1-r2.ebuild: + Fix paths for qemu files, fixes Bug #458818 by Tomoatsu Shimada + + 24 Feb 2013; Ian Delaney files/xendomains.initd-r1, + files/xendomains.initd-r2: + Updated xendomains init scripts, ack to Tomas Mozes, fixes Bug #420067 + + 22 Feb 2013; Ian Delaney xen-tools-4.2.0-r3.ebuild, + xen-tools-4.2.1-r1.ebuild: + Update the dependency yajl to current version, thx to 'BT' from Bug #458576 + + 12 Feb 2013; Ian Delaney xen-tools-4.2.1-r2.ebuild: + Fixed copy header file, Bug #456884 + + 11 Feb 2013; Ian Delaney xen-tools-4.2.0-r3.ebuild, + xen-tools-4.2.1-r2.ebuild: + Removed redundant dep pyxml, closes Bug #45673 by Oleg + + 11 Feb 2013; Ian Delaney xen-tools-4.2.0-r3.ebuild, + xen-tools-4.2.1-r1.ebuild, xen-tools-4.2.1-r2.ebuild: + Reset REQUIRED_USE + + 11 Feb 2013; Ian Delaney xen-tools-4.2.0-r3.ebuild, + xen-tools-4.2.1-r1.ebuild, xen-tools-4.2.1-r2.ebuild: + Fix to install with use qemu + + 11 Feb 2013; Ian Delaney xen-tools-4.2.0-r3.ebuild: + the manifests + +*xen-tools-4.2.1-r2 (11 Feb 2013) + + 11 Feb 2013; Ian Delaney +files/stubs-32.h, + +xen-tools-4.2.1-r2.ebuild, xen-tools-4.2.0-r3.ebuild, + xen-tools-4.2.1-r1.ebuild: + revbump, added a header flag wrt Bug #351648 + + 09 Feb 2013; Ian Delaney files/xendomains-screen.confd, + files/xendomains.initd-r2, xen-tools-4.2.1-r1.ebuild: + Added xendomains.confd to start of xendomains-screen.confd suggested in Bug + #455622, edited xendomains.initd-r2 wrt suggestion from Bug #455626, fixes + both bugs by Tomas Mozes + + 03 Feb 2013; Agostino Sarubbo -xen-tools-4.1.1-r6.ebuild, + -xen-tools-4.1.2-r3.ebuild, -xen-tools-4.2.0-r2.ebuild: + Remove old + + 02 Feb 2013; Agostino Sarubbo xen-tools-4.2.0-r3.ebuild: + Stable for x86, wrt bug #454314 + + 02 Feb 2013; Agostino Sarubbo xen-tools-4.2.0-r3.ebuild: + Stable for amd64, wrt bug #454314 + + 01 Feb 2013; Ian Delaney xen-tools-4.2.0-r3.ebuild, + xen-tools-4.2.1-r1.ebuild: + Reversed/Re-added bin86 & dev86 to DEPEND in -4.2.0-r3 -4,2.2-r1 subsequent to + arch testing + + 31 Jan 2013; Ian Delaney files/ipxe-nopie.patch, + xen-tools-4.2.0-r2.ebuild, xen-tools-4.2.0-r3.ebuild, + xen-tools-4.2.1-r1.ebuild: + Re-setting/correcting ipxe-nopie.patch to match source content in 4.2.0-r3 and + disabling the patch in -4.2.1-r1 (pending further testing) consequent to Bug + #447716, removed redunadant 4-add-nopie.patch + +*xen-tools-4.2.0-r3 (30 Jan 2013) +*xen-tools-4.2.1-r1 (30 Jan 2013) + + 30 Jan 2013; Ian Delaney + +files/xen-4-CVE-2012-4544-XSA-25.patch, + +files/xen-4-CVE-2012-6075-XSA-41.patch, +files/xen-4-fix_dotconfig-gcc.patch, + +files/xen-tools-4-add-nopie.patch, +files/xen-tools-4-docfix.patch, + +xen-tools-4.2.0-r3.ebuild, +xen-tools-4.2.1-r1.ebuild, + -files/xen-tools-3.4.2-as-needed.patch, files/ipxe-nopie.patch, + xen-tools-4.2.0-r2.ebuild: + revbump;-4.2.0-r3; adjustments to DEPS, implementation of ocaml flag courtesy + of user known as 'a.m' wrt Bug #447716, reconstitution of ipxe-nopie with + subsequent add of -4-add-nopie.patch, new use ocaml added and implemented + (possible to rename), sed statements reduced to patches, 2 sec. patches + applied, build & install of docs corrected/upgrade. 4.2.1-r1; changes mirrored + those to 4.2.0-r3, add of 1 valid sec. patch. Drop un-needed -3.4.2-as- + needed.patch + + 24 Jan 2013; Ian Delaney -xen-tools-4.1.2-r2.ebuild, + -xen-tools-4.2.0-r1.ebuild, xen-tools-4.2.0-r2.ebuild, xen-tools-4.2.1.ebuild: + 4.2.0-r2, correct DEPS, thanks OP of Bug #447716, 4.2.1, rm white space, drop + old + +*xen-tools-4.2.1 (24 Jan 2013) + + 24 Jan 2013; Ian Delaney +xen-tools-4.2.1.ebuild, + metadata.xml: + bump + + 23 Jan 2013; Ian Delaney xen-tools-4.1.1-r6.ebuild: + patch from razamatan applied, fixes Bug #413493 + + 21 Jan 2013; Samuli Suominen + xen-tools-4.1.1-r6.ebuild, xen-tools-4.1.2-r2.ebuild, + xen-tools-4.1.2-r3.ebuild, xen-tools-4.2.0-r1.ebuild, + xen-tools-4.2.0-r2.ebuild: + Remove sys-apps/hotplug dependency from || () in favour of virtual/udev wrt + #145809 + + 20 Jan 2013; Michał Górny xen-tools-4.2.0-r2.ebuild: + Drop python2.5 because of lxml. + + 20 Dec 2012; Michał Górny xen-tools-4.2.0-r2.ebuild: + Use python_fix_shebang() to fix shebangs. + + 18 Dec 2012; Ian Delaney files/ipxe-nopie.patch: + patched patch ipxe-nopie.patch, thanks to patch submitted by user uen in Bug + #446022 + + 17 Dec 2012; Michał Górny xen-tools-4.2.0-r2.ebuild: + Bump to EAPI=5 to make Paludis happy, bug #447524. + +*xen-tools-4.2.0-r2 (16 Dec 2012) + + 16 Dec 2012; Michał Górny +xen-tools-4.2.0-r2.ebuild: + Migrate to python-r1, clean up a bit. Acked by idella4. + + 11 Dec 2012; Samuli Suominen + xen-tools-4.1.1-r6.ebuild, xen-tools-4.1.2-r3.ebuild, + xen-tools-4.2.0-r1.ebuild: + Move sys-power/iasl dependency from USE="hvm" to always required because + econf won't pass without it. Use udev.eclass to install udev rules into + correct directory. Convert to virtual/udev again after it was mistakenly + reverted 05 Dec 2012 by idella4. + + 04 Dec 2012; Jeroen Roovers metadata.xml: + Change maintainer tag (bug #390951). + + 04 Dec 2012; Tomáš Chvátal xen-tools-4.1.1-r6.ebuild: + This is supposed to be stable amd64 and x86. We do not remove stable keywords + just for fun. + + 05 Dec 2012; Ian Delaney xen-tools-4.1.1-r6.ebuild: + Correction to amd64 keyword in 4.4.4-r6 + +*xen-tools-4.2.0-r1 (05 Dec 2012) + + 05 Dec 2012; Ian Delaney + +files/xen-4.2.0-anti-download.patch, +files/xen-4.2.0-jserver.patch, + +files/xen-4.2.0-nostrip.patch, +xen-tools-4.2.0-r1.ebuild, + -files/xen-tools-3.3.1-sandbox-fix.patch, + -files/xen-tools-3.4.2-fix-definitions.patch, + -files/xen-tools-3.4.2-fix-include.patch, + -files/xen-tools-3.4.2-ldflags-respect.patch, + -files/xen-tools-3.4.2-remove-default-cflags.patch, + -files/xen-tools-3.4.2-werror-idiocy-v2.patch, + -files/xen-tools-4.1.1-upstream-23104-1976adbf2b80.patch, + -xen-tools-3.4.2-r3.ebuild, -xen-tools-3.4.2-r5.ebuild, + -xen-tools-4.1.1-r5.ebuild, metadata.xml, xen-tools-4.1.1-r6.ebuild, + xen-tools-4.1.2-r3.ebuild: + initial 4.2.0 found in virtual overlay, bump to 4.2.0-r1, added patches fixing + QA issues, added edits to build of external packages + + 02 Dec 2012; Samuli Suominen + xen-tools-3.4.2-r3.ebuild, xen-tools-3.4.2-r5.ebuild, + xen-tools-4.1.1-r5.ebuild, xen-tools-4.1.1-r6.ebuild, + xen-tools-4.1.2-r2.ebuild, xen-tools-4.1.2-r3.ebuild: + Use virtual/udev instead of sys-fs/udev wrt #444398 + +*xen-tools-4.1.2-r3 (10 Jul 2012) + + 10 Jul 2012; Matthew Thode + +xen-tools-4.1.2-r3.ebuild: + Updated ebuild for selinux dependancy xen-tools-4.1.2-r3.ebuild + + 29 May 2012; Kacper Kowalik metadata.xml: + Use field in order to provide more compact + + 08 May 2012; Kacper Kowalik xen-tools-3.4.2-r3.ebuild, + xen-tools-3.4.2-r5.ebuild, xen-tools-4.1.1-r5.ebuild, + xen-tools-4.1.1-r6.ebuild, xen-tools-4.1.2-r2.ebuild: + Fix building with app-text/texi2html-5, commited on behalf of Ian Delaney. + Fixes bug 409333. Thanks to Joerg Neikes for the + report and patch + + 12 Jan 2012; Alexey Shvetsov xen-tools-4.1.2-r2.ebuild, + files/xendomains.initd-r2: + re-expand newinitd, fixes Bug 392403, patch prepared by Ian Delaney + +*xen-tools-4.1.2-r2 (28 Nov 2011) + + 28 Nov 2011; Alexey Shvetsov +xen-tools-4.1.2-r2.ebuild, + -xen-tools-4.1.2-r1.ebuild, -xen-tools-9999.ebuild, files/xendomains.initd-r2: + Move -9999 to virtualization overlay and revbump xen-tools to EAPI4 + +*xen-tools-4.1.2-r1 (11 Nov 2011) + + 11 Nov 2011; Jesus Rivero -xen-tools-4.1.2.ebuild, + +xen-tools-4.1.2-r1.ebuild: + Revision bump wrt bug #311207 + + 11 Nov 2011; Jesus Rivero xen-tools-4.1.2.ebuild: + Fix for improving Python-related code (bug #311207). Proxying for idella4 + + 10 Nov 2011; Alexey Shvetsov + files/xen-tools-4.1.2-pyxml.patch: + Fix pyxml patch + + 07 Nov 2011; Alexey Shvetsov + +files/xen-tools-4.1.2-pyxml.patch, files/xen-tools-4.1.1-curl.patch, + xen-tools-4.1.2.ebuild: + Fix to pyxml, add dep pypam, fixes Bug 367735, patch by Arfrever, repair to + curl patch, Bug #386487, repiared by Ian Delaney aka idella4 + + 01 Nov 2011; Tony Vroon xen-tools-4.1.1-r6.ebuild: + Marked stable on AMD64 based on arch testing by Elijah "Armageddon" El + Lazkani & Ian "idella4" Delaney in bug #360621. + +*xen-tools-4.1.2 (25 Oct 2011) + + 25 Oct 2011; Alexey Shvetsov xen-tools-3.4.2-r5.ebuild, + +xen-tools-4.1.2.ebuild: + Version bump prepared by Ian Delaney aka idella4 + + 24 Oct 2011; Alexey Shvetsov xen-tools-4.1.1-r6.ebuild, + +files/xen-tools-4.1.1-bridge.patch, +files/xen-tools-4.1.1-curl.patch: + Patch to curl config, fixes Bug #386487, tiny change to bridging fixes Bug + #362575 by Klas Meder Boqvist, patch prepared by Ian Delaney aka idella4 + + 23 Oct 2011; Patrick Lauer xen-tools-9999.ebuild: + Bump for #386461, thanks to Ian Delaney + +*xen-tools-4.1.1-r6 (22 Oct 2011) + + 22 Oct 2011; Magnus Granberg +xen-tools-4.1.1-r6.ebuild, + +files/ipxe-nopie.patch: + Fix hardened compile failure #360805 don't compile ipxe with pie. + Thanks Ian Delaney and Ralf Glauberman + + 13 Oct 2011; Alexey Shvetsov -xen-tools-3.4.2.ebuild, + xen-tools-4.1.1-r5.ebuild, files/xendomains.initd-r1: + Sabayon Tinderbox build failuire, fixes bug #377557. patch by Tobias Heinlein + aka keytoaster, full diff prepared by Ian Delaney. Use toolchain function + instead of calling LD directly, copy fix from bug #384359, fix to invoke + correct compiler, copy from bug #383973, patches by Ian Delaney aka idella4 + + 05 Oct 2011; Alexey Shvetsov xen-tools-3.4.2-r5.ebuild, + xen-tools-4.1.1-r5.ebuild, metadata.xml: + Change use ioemu to qemu and edit metadata.xml, fixes Bug 383337, add rdep + packages for use flag doc, fixes Bug 384357, add elog meassage re /.config, + fixes Bug 376819. Pathces by by Ian Delaney aka idella4 + + 29 Sep 2011; Thomas Kahle xen-tools-3.4.2-r3.ebuild: + x86 stable per bug 379241 + + 27 Sep 2011; Tony Vroon xen-tools-3.4.2-r5.ebuild: + Patch by Ian "idella4" Delaney closes bug #384349 by Agostino "ago" Sarubbo. + +*xen-tools-3.4.2-r5 (27 Sep 2011) + + 27 Sep 2011; Tony Vroon -xen-tools-3.4.2-r4.ebuild, + +xen-tools-3.4.2-r5.ebuild, +files/xen-tools-3.4.2-ldflags-respect.patch: + Proxy commit for Ian "idella4" Delaney. LDFLAGS respect closes bug #384351. + Removal of static libraries closes bug #384355. Use toolchain function + instead of calling LD directly, closes bug #384359. + +*xen-tools-3.4.2-r4 (25 Sep 2011) + + 25 Sep 2011; Tony Vroon +xen-tools-3.4.2-r4.ebuild, + +files/xen-tools-3.4.2-remove-default-cflags.patch: + Proxy commit for Ian "idella4" Delaney. Be more thorough for custom-cflags + and use a diff instead of sed magic, closes bug #383975. Use toolchain-funcs + to invoke correct compiler, closes bug #383973. + + 25 Sep 2011; Tony Vroon xen-tools-3.4.2-r3.ebuild: + Marked stable on AMD64 based on arch testing by Agostino "ago" Sarubbo & Ian + "idella4" Delaney in security bug #379241. + + 25 Sep 2011; Pawel Hajdan jr + xen-tools-4.1.1-r5.ebuild: + x86 stable wrt bug #360621 + + 25 Sep 2011; Pawel Hajdan jr + xen-tools-4.1.1-r5.ebuild: + x86 stable wrt bug #360621 + +*xen-tools-3.4.2-r3 (24 Sep 2011) + + 24 Sep 2011; Tony Vroon -xen-tools-3.4.2-r2.ebuild, + +xen-tools-3.4.2-r3.ebuild, -files/xen-tools-3.4.2-werror-idiocy.patch, + +files/xen-tools-3.4.2-werror-idiocy-v2.patch: + Revised patch by Ian "idella4" Delaney resolves building on GCC 4.5 & 4.6; + closes bug #383977. + +*xen-tools-3.4.2-r2 (23 Sep 2011) + + 23 Sep 2011; Tony Vroon -xen-tools-3.4.2-r1.ebuild, + +xen-tools-3.4.2-r2.ebuild, +files/xen-tools-3.4.2-werror-idiocy.patch: + Patch by Ian "idella4" Delaney to clear -Werror, stopping GCC 4.5 build + failures. Closes bug #383977. Moved to using a PATCHES array and the base + eclass. + + 21 Sep 2011; Alexey Shvetsov + files/xen-tools-3.4.2-fix-definitions.patch, + files/xen-tools-3.4.2-fix-include.patch: + Fix xen3 patches by Ian Delaney aka idell4 + +*xen-tools-3.4.2-r1 (21 Sep 2011) + + 21 Sep 2011; Alexey Shvetsov +xen-tools-3.4.2-r1.ebuild, + +files/xen-tools-3.4.2-fix-definitions.patch, + +files/xen-tools-3.4.2-fix-include.patch: + Fix borken emerge due to system header changes; bug #379815. Input from Ian + Delaney aka idell4 + + 18 Sep 2011; Alexey Shvetsov xen-tools-4.1.1-r5.ebuild: + Fix patch name. Thanks to Sven Köhler + +*xen-tools-4.1.1-r5 (18 Sep 2011) + + 18 Sep 2011; Alexey Shvetsov -xen-tools-4.1.1-r4.ebuild, + +xen-tools-4.1.1-r5.ebuild, +files/xen-tools-4.1.1-libxl-tap.patch, + +files/xen-tools-4.1.1-upstream-23104-1976adbf2b80.patch: + Fix bugs #380343 and #382329 + +*xen-tools-4.1.1-r4 (12 Sep 2011) + + 12 Sep 2011; Alexey Shvetsov -xen-tools-4.1.1-r3.ebuild, + +xen-tools-4.1.1-r4.ebuild: + Prevent downloading during compile, fixes bug #366125; Thanks to Ian Delaney + aka idella4 + + 11 Sep 2011; Alexey Shvetsov xen-tools-4.1.1-r3.ebuild, + xen-tools-9999.ebuild: + Fix build + +*xen-tools-4.1.1-r3 (11 Sep 2011) + + 11 Sep 2011; Alexey Shvetsov -xen-tools-4.1.1-r2.ebuild, + +xen-tools-4.1.1-r3.ebuild, xen-tools-9999.ebuild, metadata.xml: + Sync live ebuild with 4.1.1, drop acm since its deprecated upstream. Make + xend optional. Input from Ian Delaney aka idell4 + +*xen-tools-4.1.1-r2 (10 Sep 2011) + + 10 Sep 2011; Alexey Shvetsov -xen-tools-4.1.1-r1.ebuild, + +xen-tools-4.1.1-r2.ebuild, files/xend.initd-r2, files/xendomains.initd-r2: + Uncomment xl settings, fix bug 370817, adjust init.d scripts to work for xl; + Thanks to Ian Delaney aka idella4 + + 05 Sep 2011; Alexey Shvetsov xen-tools-4.1.1-r1.ebuild, + metadata.xml: + Fix use doc #347942. Thanks to Ian Delaney aka idella4 + +*xen-tools-4.1.1-r1 (31 Aug 2011) + + 31 Aug 2011; Alexey Shvetsov -xen-tools-4.1.0-r1.ebuild, + -xen-tools-4.1.1.ebuild, +xen-tools-4.1.1-r1.ebuild: + Drop old version + + 23 Aug 2011; Fabio Erculiani xen-tools-4.1.1.ebuild: + fix src_install, remove rm -r + + 09 Aug 2011; Alexey Shvetsov xen-tools-9999.ebuild: + Drop patch + + 09 Aug 2011; Alexey Shvetsov xen-tools-9999.ebuild: + Sync 9999 and 4.1.1 + +*xen-tools-4.1.1 (29 Jul 2011) + + 29 Jul 2011; Patrick Lauer +xen-tools-4.1.1.ebuild: + Bump for #372259 + + 29 Jul 2011; Patrick Lauer xen-tools-4.1.0-r1.ebuild: + Dep fix for #363139 + +*xen-tools-9999 (06 Apr 2011) + + 06 Apr 2011; Alexey Shvetsov +xen-tools-9999.ebuild: + Add live version + + 05 Apr 2011; Alexey Shvetsov xen-tools-4.1.0-r1.ebuild, + +files/xend.initd-r2, +files/xendomains.initd-r2, -files/xend.initd, + -files/xendomains.initd, -files/xendomains.initd-xl, files/xenstored.initd: + Clean up and fix init script deps + +*xen-tools-4.1.0-r1 (05 Apr 2011) + + 05 Apr 2011; Alexey Shvetsov -xen-tools-4.1.0.ebuild, + +xen-tools-4.1.0-r1.ebuild, +files/xenconsoled.confd, + +files/xenconsoled.initd, +files/xendomains.initd-xl, +files/xenstored.confd, + +files/xenstored.initd: + Clean up. Add support for new xl framework. No need for xend + + 26 Mar 2011; Alexey Shvetsov xen-tools-4.1.0.ebuild: + Fix build on some platforms + + 26 Mar 2011; Alexey Shvetsov xen-tools-4.1.0.ebuild: + Fix bug #360561 + + 26 Mar 2011; Alexey Shvetsov -xen-tools-3.4.3.ebuild, + -files/xen-tools-4.0.0-asneeded.patch, -xen-tools-4.0.1.ebuild: + Clean up + + 26 Mar 2011; Alexey Shvetsov + -files/xen-tools-3.0.4_p1--as-needed.patch, + -files/xen-tools-3.0.4_p1-network-bridge-broadcast.patch, + -files/xen-tools-3.1.0-xen-detect-nopie-fix.patch, + -files/xen-tools-3.1.3-bzimage.patch, + -files/xen-tools-3.1.3-network-bridge-broadcast.patch: + Clean up + +*xen-tools-4.1.0 (26 Mar 2011) + + 26 Mar 2011; Alexey Shvetsov -xen-tools-3.1.3.ebuild, + -xen-tools-3.1.3-r1.ebuild, -xen-tools-3.2.1.ebuild, + -files/xen-tools-3.2.1-qemu-nodocs.patch, + -files/xen-tools-3.3.0--as-needed.patch, + -files/xen-tools-3.3.0-warning-fix.patch, + -files/xen-tools-3.3.0-xen-detect-nopie-fix.patch, -xen-tools-3.4.0.ebuild, + -xen-tools-3.4.0-r1.ebuild, -files/xen-tools-3.4.0-udevinfo.patch, + -xen-tools-3.4.1.ebuild, -xen-tools-3.4.1-r1.ebuild, + -files/xen-tools-3.4.1-xc_core-memset.patch, xen-tools-3.4.2.ebuild, + xen-tools-3.4.3.ebuild, -xen-tools-4.0.0.ebuild, xen-tools-4.0.1.ebuild, + +xen-tools-4.1.0.ebuild: + Version bump & clean up + +*xen-tools-4.0.1 (03 Dec 2010) + + 03 Dec 2010; Patrick Lauer +xen-tools-4.0.1.ebuild: + Bump + + 16 Oct 2010; Arfrever Frehtes Taifersar Arahesis + xen-tools-3.4.0.ebuild, xen-tools-3.4.0-r1.ebuild, xen-tools-3.4.1.ebuild, + xen-tools-3.4.1-r1.ebuild, xen-tools-3.4.2.ebuild, xen-tools-3.4.3.ebuild, + xen-tools-4.0.0.ebuild: + Update EAPI. Unset PYTHON_MODNAME variable, which is used only by + distutils.eclass, which isn't inherited here. Fix calls to + python_mod_optimize() and python_mod_cleanup() (bug #329141). + +*xen-tools-3.4.3 (11 Jul 2010) + + 11 Jul 2010; Patrick Lauer +xen-tools-3.4.3.ebuild: + Bump for #325091 + + 25 Jun 2010; Kacper Kowalik + xen-tools-4.0.0.ebuild, -files/xen-tools-4.0.0-as-needed.patch, + +files/xen-tools-4.0.0-asneeded.patch: + Fixing build with --as-neeed wrt bug 320339. Thanks to Diego for + reporting. + + 24 Jun 2010; Christoph Mende xen-tools-3.4.2.ebuild: + Stable on amd64 wrt bug #293714 + + 09 Jun 2010; Patrick Lauer xen-tools-4.0.0.ebuild: + Adding iasl dep for hvm useflag. Fixes #318471 + +*xen-tools-4.0.0 (12 Apr 2010) + + 12 Apr 2010; Alexey Shvetsov +xen-tools-4.0.0.ebuild, + +files/xen-tools-4.0.0-as-needed.patch: + Version bump per bug #313791 + + 07 Apr 2010; Patrick Lauer + files/xen-tools-3.4.0-network-bridge-broadcast.patch: + Fixing xen-tools-3.4.0-network-bridge-broadcast.patch for #258378 + + 16 Jan 2010; Christian Faulhammer + xen-tools-3.4.2.ebuild: + stable x86, bug 293714 + + 16 Jan 2010; Christian Faulhammer + xen-tools-3.4.2.ebuild, +files/xen-tools-3.4.2-as-needed.patch: + fix issues with --as-needed, patch by Kacper Kowalik in bug 296631 + +*xen-tools-3.4.2 (01 Dec 2009) + + 01 Dec 2009; Patrick Lauer +xen-tools-3.4.2.ebuild: + Bump + + 05 Nov 2009; Patrick Lauer xen-tools-3.4.1-r1.ebuild: + Adding gettext depend for #287935 + + 27 Oct 2009; Patrick Lauer -xen-tools-3.3.0.ebuild, + -xen-tools-3.3.1.ebuild: + Removing old versions for #287936 + + 11 Oct 2009; Petteri Räty + xen-tools-3.4.1-r1.ebuild: + Replace built_with_use with has_version. + +*xen-tools-3.4.1-r1 (01 Sep 2009) + + 01 Sep 2009; Wolfram Schlich +files/xend.initd-r1, + +files/xendomains.initd-r1, +xen-tools-3.4.1-r1.ebuild: + fix bugs 248771, 248797, 248917 + + 19 Aug 2009; Patrick Lauer xen-tools-3.4.1.ebuild: + Changing python dep (use=ssl) for #279917 + +*xen-tools-3.4.1 (17 Aug 2009) + + 17 Aug 2009; Patrick Lauer +xen-tools-3.4.1.ebuild, + +files/xen-tools-3.4.1-xc_core-memset.patch: + Bump to 3.4.1. Fixes #280773. Patch by Sergey Morozov + + 27 Jun 2009; Patrick Lauer xen-tools-3.1.3.ebuild, + xen-tools-3.1.3-r1.ebuild, xen-tools-3.2.1.ebuild, xen-tools-3.3.0.ebuild, + xen-tools-3.3.1.ebuild, xen-tools-3.4.0.ebuild, xen-tools-3.4.0-r1.ebuild: + Fixing link to gentoo-wiki.com, fixes #275219 + +*xen-tools-3.4.0-r1 (22 Jun 2009) + + 22 Jun 2009; Patrick Lauer + +xen-tools-3.4.0-r1.ebuild, +files/xen-tools-3.4.0-udevinfo.patch: + Udev rules fix, closes #236819. Thanks to Frank Ridderbusch for the shiny + patch + +*xen-tools-3.4.0 (22 Jun 2009) + + 22 Jun 2009; Patrick Lauer +xen-tools-3.4.0.ebuild, + +files/xen-tools-3.4.0-network-bridge-broadcast.patch: + Bump to 3.4.0. Closes #271173. Patch and ebuild fixes by Sergey Morozov + + 28 Apr 2009; Patrick Lauer + +files/xen-tools-3.3.1-sandbox-fix.patch, xen-tools-3.3.1: + Small sandbox fix, closes 253134. Patch originally from RB. + + 27 Apr 2009; Patrick Lauer xen-tools-3.3.1: + Bump to eapi2 for usedeps, fixing depends for use=doc, closes #199764 + +*xen-tools-3.3.1 (26 Apr 2009) + + 26 Apr 2009; Patrick Lauer +xen-tools-3.3.1.ebuild: + Bump to 3.3.1. Fixes half of #254931 + + 26 Apr 2009; Patrick Lauer + +files/xen-tools-3.3.0-warning-fix.patch, xen-tools-3.3.0: + Fix gcc 4.3 compile failure, part of #259670 + + 28 Feb 2009; Markus Meier metadata.xml: + custom-cflags is a global USE-flag + +*xen-tools-3.1.3-r1 (16 Jan 2009) + + 16 Jan 2009; Lance Albertson + +files/xen-tools-3.1.3-bzimage.patch, +xen-tools-3.1.3-r1.ebuild: + New patch for 3.1.3 which adds bzImage >=v2.08 support to xen. This allows + Fedora 10 to run as a DomU for this version. Patch is originally from + https://bugzilla.redhat.com/457199 + +*xen-tools-3.3.0 (01 Sep 2008) + + 01 Sep 2008; Robert Buchholz + +files/xen-tools-3.3.0--as-needed.patch, + +files/xen-tools-3.3.0-nostrip.patch, + +files/xen-tools-3.3.0-xen-detect-nopie-fix.patch, files/xendomains.confd, + files/xendomains.initd, metadata.xml, -xen-tools-3.2.0.ebuild, + +xen-tools-3.3.0.ebuild: + Version bump to Xen 3.3 (bug #201792). Fixes bugs: + * Add USE flags for ACM and FLASK Xen Security Modules + * Properly compile and uninstall python bytecode + * RDEPEND on pyxml (bug #201255) + * Remove libvncserver dependency + * Shutdown xendomains in reverse start order (bug #210445) + * Allow for parallel shutdown of xendomains (bug #162833) + * Check that python is built with threading (bug #236092) + + 30 Jul 2008; Robert Buchholz xen-tools-3.2.1.ebuild: + Set VARTEXFONTS so LaTeX does not try to write out of the sandbox (bug #233120) + + 28 Jul 2008; Doug Goldstein metadata.xml: + add GLEP 56 USE flag desc from use.local.desc + +*xen-tools-3.2.1 (04 May 2008) + + 04 May 2008; Robert Buchholz + +files/xen-tools-3.2.1-qemu-nodocs.patch, -xen-tools-3.1.2.ebuild, + +xen-tools-3.2.1.ebuild: + Version bump to the Xen 3.2.1 release (bug #219339), thanks to Troy Bowman + for testig. Disable magic building of QEMU documentation (bug #192427). + +*xen-tools-3.2.0 (08 Feb 2008) + + 08 Feb 2008; Michael Marineau + +xen-tools-3.2.0.ebuild: + Add version 3.2.0 + +*xen-tools-3.1.3 (03 Feb 2008) + + 03 Feb 2008; Michael Marineau + +files/xen-tools-3.1.3-network-bridge-broadcast.patch, + +xen-tools-3.1.3.ebuild: + Version bump to 3.1.3 + + 14 Dec 2007; Robert Buchholz xen-tools-3.1.2.ebuild: + Added a check for USE=ncurses in python in case we use pygrub + +*xen-tools-3.1.2 (17 Nov 2007) + + 17 Nov 2007; Michael Marineau + -files/xen-tools-3.0.4_p1-pygrub-security-fix.patch, + -files/xen-tools-3.0.4_p1-remove-monitor-mode-from-vnc.patch, + -files/xen-tools-3.0.4_p1-vnclisten.patch, + -files/xen-tools-3.1.0-pygrub-security-fix.patch, + -files/xen-tools-3.1.0-python-site-packages.patch, + -files/xen-tools-3.1.1-insecure-file-creation-fix.patch, + -xen-tools-3.0.4_p1-r2.ebuild, -xen-tools-3.1.0-r2.ebuild, + -xen-tools-3.1.1-r1.ebuild, +xen-tools-3.1.2.ebuild: + Bump to 3.1.2. Clean out old versions. + +*xen-tools-3.1.1-r1 (23 Oct 2007) +*xen-tools-3.1.0-r2 (23 Oct 2007) +*xen-tools-3.0.4_p1-r2 (23 Oct 2007) + + 23 Oct 2007; Michael Marineau + +files/xen-tools-3.1.1-insecure-file-creation-fix.patch, + -xen-tools-3.0.4_p1-r1.ebuild, +xen-tools-3.0.4_p1-r2.ebuild, + -xen-tools-3.1.0-r1.ebuild, +xen-tools-3.1.0-r2.ebuild, + -xen-tools-3.1.1.ebuild, +xen-tools-3.1.1-r1.ebuild: + Fix an insecure temp file creation, bug #196824, CVE-2007-3919 + +*xen-tools-3.1.1 (15 Oct 2007) + + 15 Oct 2007; Michael Marineau + +xen-tools-3.1.1.ebuild: + Version bump. + + 02 Oct 2007; Michael Marineau + xen-tools-3.1.0-r1.ebuild: + Fix build on gcc 4.2.0, fixes bug #191172. + Warn user if iproute2 was built with USE=minimal, fixes bug #194224. + Minor cleanups, etc. + +*xen-tools-3.1.0-r1 (26 Sep 2007) +*xen-tools-3.0.4_p1-r1 (26 Sep 2007) + + 26 Sep 2007; Michael Marineau + +files/xen-tools-3.0.4_p1-pygrub-security-fix.patch, + +files/xen-tools-3.1.0-pygrub-security-fix.patch, + -xen-tools-3.0.4_p1.ebuild, +xen-tools-3.0.4_p1-r1.ebuild, + -xen-tools-3.1.0.ebuild, +xen-tools-3.1.0-r1.ebuild: + Security Bump: Guest domains could execute code on Dom0 via pygrub. + Bug #193808 and CVE-2007-4993 + + 03 Sep 2007; Michael Marineau + xen-tools-3.0.4_p1.ebuild, xen-tools-3.1.0.ebuild: + Fix documentation dependencies. + + 27 Aug 2007; Michael Marineau + xen-tools-3.0.4_p1.ebuild, xen-tools-3.1.0.ebuild: + Die if both x86 and amd64 are set in USE. + + 26 Aug 2007; Michael Marineau + +files/xen-tools-3.1.0-xen-detect-nopie-fix.patch, xen-tools-3.1.0.ebuild: + Fix build on x86 hardened. + +*xen-tools-3.1.0 (24 Aug 2007) + + 24 Aug 2007; Michael Marineau + -files/xen-tools-3.0.2--as-needed.patch, + -files/xen-tools-3.0.2-bxclobber.patch, + -files/xen-tools-3.0.2-pushpop.patch, + -files/xen-tools-3.0.2-pygrub-progsreiserfs-0.3.1.patch, + -files/xen-tools-3.0.2-test-uuid.patch, + -files/xen-tools-3.0.2-test-xauthority.patch, + -files/xen-tools-3.0.2-xc_ptrace.patch, + +files/xen-tools-3.1.0-python-site-packages.patch, -files/xend-init, + -xen-tools-3.0.2-r4.ebuild, +xen-tools-3.1.0.ebuild: + Copy Xen 3.1.0 related ebuilds over from the Xen project overlay. + Remove Xen 3.0.2. + + 10 Jul 2007; Michael Marineau + xen-tools-3.0.4_p1.ebuild: + Remove unneeded hardened flag checking and add some more info to the post + install message. + + 25 Jun 2007; Michael Marineau + xen-tools-3.0.4_p1.ebuild: + Fix typo in -fno-pie flag. + + 16 May 2007; Michael Marineau + xen-tools-3.0.4_p1.ebuild: + Only depend on xproto when ioemu is enabled. Bug #177110. + +*xen-tools-3.0.4_p1 (02 May 2007) + + 02 May 2007; Michael Marineau + -files/3.0.2-r4/pygrub-progsreiserfs-0.3.1.patch, + -files/3.0.2-r4/xc_ptrace.patch, -files/3.0.2-r4/xend.initd, + -files/3.0.2-r4/xendomains.initd, +files/xen-tools-3.0.2-xc_ptrace.patch, + +files/xen-tools-3.0.2-pygrub-progsreiserfs-0.3.1.patch, + +files/xen-tools-3.0.4_p1--as-needed.patch, + +files/xen-tools-3.0.4_p1-network-bridge-broadcast.patch, + +files/xen-tools-3.0.4_p1-remove-monitor-mode-from-vnc.patch, + +files/xen-tools-3.0.4_p1-vnclisten.patch, +files/xend.initd, + +files/xendomains.initd, -files/xendomains-conf, -files/xendomains-init, + -xen-tools-3.0.2-r2.ebuild, -xen-tools-3.0.2-r3.ebuild, + xen-tools-3.0.2-r4.ebuild, +xen-tools-3.0.4_p1.ebuild: + Add Xen 3.0.4_1 from the marineam-xen overlay. + Clean out some old ebuilds and clean up the files dir. + + 13 Mar 2007; Andrew Ross xen-tools-3.0.2-r3.ebuild, + xen-tools-3.0.2-r4.ebuild: + Use "type" instead of "which", as per + http://archives.gentoo.org/gentoo-dev/msg_143424.xml + + 16 Dec 2006; Andrew Ross xen-tools-3.0.2-r4.ebuild: + Narrow dep on app-emulation/xen to match version of xen-tools. + +*xen-tools-3.0.2-r4 (13 Oct 2006) + + 13 Oct 2006; + +files/3.0.2-r4/pygrub-progsreiserfs-0.3.1.patch, + +files/3.0.2-r4/xc_ptrace.patch, +files/3.0.2-r4/xendomains.initd, + +files/3.0.2-r4/xend.initd, +xen-tools-3.0.2-r4.ebuild: + Fix a PTRACE_* compilation error, thanks to Thomas Veith + in #151014. + + Introduce the pygrub local USE flag and fix a compile error when + sys-fs/progsreiserfs is installed, thanks to M. Edward Borasky + and Mauricio Zambrano in + #137137. + + Make ntp-client start after xend, thanks to Harris Landgarten + in #144057. + + Make /etc/init.d/xendomains correctly handle domains with numbers, periods + and/or hyphens, thanks to Robert S in #148628. + + Fix a compile error with python-2.5, thanks to Charlie Shepherd + and Marien Zwart in #149138. + + Fix a compilation error on AMD64 with a 64 bit kernel and 32 bit userland, + thanks to tonich and Sven Wegener + in #143999. + + Make /etc/init.d/xend fail gracefully when started in a non-privileged + domain or unmodified kernel, thanks to Christian Hesse + and Robert S in #148486. + + Only warn instead of dying when python is build with stack smashing + protection (ssp), thanks to Tuan Van , Raimonds Cicans + , Brad Plant and Sven Wegener + in #141866. + + Replace the hardened USE flag with test-flag-CC from flag-o-matic.eclass to + avoid compile errors with gcc-4.1 and USE=hardened, thanks to Richard + Benjamin Voigt in #147876. + +*xen-tools-3.0.2-r3 (15 Aug 2006) + + 15 Aug 2006; Andrew Ross +files/xen-consoles.logrotate, + -files/xend-conf, +files/xendomains.confd, +files/xendomains.initd, + +files/xendomains-screen.confd, metadata.xml, -xen-tools-3.0.2-r1.ebuild, + xen-tools-3.0.2-r2.ebuild, +xen-tools-3.0.2-r3.ebuild: + Fix bugs #141981, #142011, #141866, and #137886. Thanks to Brad Plant + , Nedd Ludd , Nick Devito + , and Mike Williams . + + 10 Aug 2006; Sven Wegener + +files/xen-tools-3.0.2-bxclobber.patch, + +files/xen-tools-3.0.2-pushpop.patch, -files/hardened-bx-clobber.patch, + metadata.xml, xen-tools-3.0.2-r2.ebuild: + Fix push and pop usage for amd64, bug #142682. Disable the 32bit-only + vmxassist, if we can't compile x86 32bit code, bug #138314. + + 10 Aug 2006; Andrew Ross xen-tools-3.0.2-r2.ebuild: + Fix minor bug (debug USE flag ignored) introduced by the fix for bug #124361 + + 10 Aug 2006; Andrew Ross + +files/xen-tools-3.0.2-test-uuid.patch, + +files/xen-tools-3.0.2-test-xauthority.patch, metadata.xml, + xen-tools-3.0.2-r1.ebuild, xen-tools-3.0.2-r2.ebuild: + Fix bug #141233 and add myself as a maintainer. + +*xen-tools-3.0.2-r2 (04 Aug 2006) + + 04 Aug 2006; Chris Bainbridge + +xen-tools-3.0.2-r2.ebuild: + Add support for vnc and sdl - thanks to Nick Devito and Andrew Ross in bug + #124361 + +*xen-tools-3.0.2-r1 (09 Jun 2006) + + 09 Jun 2006; Chris Bainbridge -xen-tools-3.0.2.ebuild, + +xen-tools-3.0.2-r1.ebuild: + Clean up .pyc files, thanks to Andrew Ross, bug #136159 + + 02 Jun 2006; Roy Marples + +files/xen-tools-3.0.2--as-needed.patch, -xen-tools-3.0.1.ebuild, + -xen-tools-3.0.1_p9029.ebuild, xen-tools-3.0.2.ebuild: + Add patch to enable --as-needed LDFLAG, #135145 + + 26 Apr 2006; Aron Griffis xen-tools-3.0.1.ebuild, + xen-tools-3.0.1_p9029.ebuild, xen-tools-3.0.2.ebuild: + Remove ~ia64 since this ebuild deps on app-emulation/xen, which won't have + ia64 keywords for a while yet + + 11 Apr 2006; +files/hardened-bx-clobber.patch, + xen-tools-3.0.2.ebuild: + add hardened patch and IUSE flag, #129491 + + 10 Apr 2006; xen-tools-3.0.2.ebuild: + Fix hardened flags for hvmloader and vmxassist, #129491 + + 10 Apr 2006; xen-tools-3.0.2.ebuild: + removed the hardened stripping flags - now that the hypervisor is split out, + the tools should be compilable with hardened flags. There is currently a bug + with register clobbering which has been filed at bugzilla.xensource.com #609 + + 10 Apr 2006; xen-tools-3.0.2.ebuild: + add some extra man pages, #129189 + + 10 Apr 2006; xen-tools-3.0.2.ebuild: + remove sed fix, #129429 + + 10 Apr 2006; files/digest-xen-tools-3.0.2, Manifest: + new digest + +*xen-tools-3.0.2 (09 Apr 2006) + + 09 Apr 2006; +xen-tools-3.0.2.ebuild: + bump, #129191 + + 01 Apr 2006; Aron Griffis xen-tools-3.0.1.ebuild, + xen-tools-3.0.1_p9029.ebuild: + Add warning regarding dev-lang/python built without USE=ncurses #128175 + +*xen-tools-3.0.1_p9029 (24 Mar 2006) +*xen-tools-3.0.1 (24 Mar 2006) + + 24 Mar 2006; Aron Griffis +files/xend-conf, + +files/xend-init, +files/xendomains-conf, +files/xendomains-init, + +metadata.xml, +xen-tools-3.0.1.ebuild, +xen-tools-3.0.1_p9029.ebuild: + Split xen-tools from xen; this package installs xend and the tools, but not + the hypervisor or include files. Unify the release and snapshot ebuilds for + easier maintenance. Switch to a snapshot versioning scheme that keeps + release/snapshot versions in order. Add myself as an additional maintainer + in metadata.xml diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/Manifest b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/Manifest new file mode 100644 index 0000000000..788a6ab5a7 --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/Manifest @@ -0,0 +1,47 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA256 + +AUX ipxe-nopie.patch 964 SHA256 0b70407969735f36587fade77f524c1c2077f28585b9e0df4fe347ecc5e379bf SHA512 510f0d88cf08a9a963c0ccf32e795e98f89e749f746ea244b29d7af770608287d8218b215ee46d73ec4f727d6dfbdb316048c6b42df55a8e154aa952abb50c1d WHIRLPOOL 38ed76955d51e9c4603a487e34340df7392e3011e5b2ed550bd945727733cc3f02691c6e0a58ecbe0dd56377a5b6a955a1516647c49cb85dfc809c852ede9e38 +AUX stubs-32.h 537 SHA256 4c903162da80cefd394404cb8cd9963a6ef6e3ad6c7adcbaa450a002d929bfc5 SHA512 55308dbedaa91909a2213940f7a7b574cabe6b5a3104761a2a6f28d6aed00164544488c00cbf9d66a9a370a14c6b6d3a00434efd3ff0228cc8e4d81af19c0e68 WHIRLPOOL 9c006e266bea6bb9d623e76011a4eac07c5fe4fdf76a041cc42a2289a7e9163988bad0fb2f458e300e45aabf9fb864ec764a496d7f89d58e57a506bac206a5f1 +AUX xen-4-CVE-2012-4544-XSA-25.patch 12691 SHA256 2bbac6a09946722fc082124870d750a6b9ab93ea3166bf50faee717acf03d70b SHA512 e911636808ecb08510821bf18ba7807485f2b4b7288966349d40cb4091eeafbc5d9abbee5bc26f04dfe5f3157e9173d1820d1e3b2b25d1e678358ad8d5b2f901 WHIRLPOOL 48e08d9900536a65193290dd4e802a64c33033414ef55823ef21806905ba448bd4c57af4102752172035c0572c431f280f84cf362007911cb1ba2573d4379749 +AUX xen-4-CVE-2012-6075-XSA-41.patch 1393 SHA256 6aa21c02e94cb9b4f612c7a9d1a8f980967692b1f20346da9670abb1d7ec688c SHA512 547f63e7eaf0a6db1a9de267cc6f9aa0f28e2221f2c69ca463ada85edbc07ac84c276dcd3ee017ab8846d4e4129e182fb76be35b91ae9a0e0afecdc091e0c305 WHIRLPOOL 848359780edc15895a09bf76afeaa503f907ac98a856b52d64ef4dcb137e2319222a47cd7a2866e6f25731498f487cfca2a462fb6dfcda8404026d8acfff5bcc +AUX xen-4-fix_dotconfig-gcc.patch 9551 SHA256 93c8726fc3e0bd3f54d4162a3fdace45e3c3ea24fecf5f54270c6dc55c3924ab SHA512 64bfc2dd60bf5a7db593250f9da62cdea4daa458aa8c474ec47b065f6e19509555f48d49ec8624c484d873fe947b6f9cab98cdcd2c24ca8795eb1b64b378a004 WHIRLPOOL 341506ced55ae2ad30af1696434df25ba77c665042aa82dda35d0722f0cccbe567c8cebf51c2e20e0df3084f74f7eb7a69808dea2801f911b2d3c46a293b6ba2 +AUX xen-4.2.0-anti-download.patch 1028 SHA256 95ff7390d25eddf56af1d98b1310d2ebf97eebcad5c298c8320eb6ce9afd596e SHA512 8d84c3386764e2dd38bd0e93163c016b38d9e634cc4c9078138e593a887f3a9d2cecf391008004ae934a49b24af2a18051aab22b2a83b48fdad60ea50fc6120d WHIRLPOOL d95955f7236c1a4d9e23e5e4be1a8f8e9148511fc16b4fe0bba3854c02e24789c808739654684140d9900f22172b635c9af5bb6910f594b115b1eca4a7c907bc +AUX xen-4.2.0-jserver.patch 900 SHA256 a8f9c0517b7fa4d56f3125515d260e60c51ef2cfe3fc22223c54415a92ffa16e SHA512 7f9bb7189273ecc34b5c66aea8cc9567a15c3d7e0fbd44e0f49669b067d719c9d85d6758cc213145679cbb8c2224cb5704aabb3ed40925bb2529965a5238d411 WHIRLPOOL ed6bcf1135c7dcb58eb2219c02b002fb57b16f50bfb0161bc64319b78dd7f8b87bc6206952755af900245d13073408946e31a51f01e95517f7def072f4810e66 +AUX xen-4.2.0-nostrip.patch 1554 SHA256 3bab6078b59a086e214fa0786cb827eeeb009d6f7f9901f6a8f1a23b857259f9 SHA512 7fe44ac34a317fc2d1298cea5d26fdd778f8356f3ac9b4fc412c07ca471ea0b21e7fac29f456306681396dee835e4c18c35ce4b7ba47c47153989eeecfb96310 WHIRLPOOL 7701c5b521245ba0b66e9ff53c41ada8e216d36f7a92b2af45aaddc0bd210bbaf21cb9401036b995f2f8d2598edb9324ad50a91f71d08e427caca21b26f101bd +AUX xen-consoles.logrotate 63 SHA256 0da87a4b9094f934e3de937e8ef8d3afc752e76793aa3d730182d0241e118b19 SHA512 ab2105c75cfe01768aecd5bcbb56269d63666e8a44e42b6a83aee87df6c84ee2f9ab249171c21b2e09f8fec2cae8318f6e87d160989398a3e7dd68db8d52c426 WHIRLPOOL be108bf298202851de434af513ac8c03a533e7621623c2a7e8f26d498074b3eec81b85b2ae29ad2ec67f4fe9937c88bd78c5f5e260793e7e69ec964d4adb989e +AUX xen-tools-3.3.0-nostrip.patch 1021 SHA256 2debac718c01a7eac4daf3182a7ae04aa562137d791cd510ecf1848d7eaccebd SHA512 034a93c416af954a8976594ec91901d4bb4401e0798da3bb26f2b59c00ee2597282a50fbbce77490dc485317f7b701bbd7c3efa4bf0f0752d0c23d731f0e4b1b WHIRLPOOL 223a3579308d11f2792394d5b42a3df9c200b6e83dc91db6c75f58c28d58892dc56c48414980b1bb4751db6e74c2f89a63623f63cec14bf948e6eb75f1d1925c +AUX xen-tools-3.4.0-network-bridge-broadcast.patch 496 SHA256 d00a1954447fc29500ab2f1a8c7900310e0dee81942be5c922ad66b6b42dfb74 SHA512 496c61ec237506c77577e832828de923283f55ab07ad141718af1a719b1b5bcdb8152a8cffddc679ff4a3e389582e7b8de8aaf1b4c8b1124bf1563467bdf674f WHIRLPOOL f80a557ed62cc26a51f85bc8682a738ab29d4573e3261c440f6e66f50cd81263fa2c6898b1aa1b1c227a2d3923cc9fd718ffad2e123ee69c6d7929def7906433 +AUX xen-tools-4-add-nopie.patch 629 SHA256 9a84886118c22a926a1bc05ac8639d34dab76e0bc06348140d8d9622bf716347 SHA512 3a07f77d0ac810caf7501031a56208007e01cbf8cca0e1bd2b838c478aa429cdd5b5e120fce5dfdbfd9c22b5a6c32f7843bf277dc28c55d0076fd82a3c970f44 WHIRLPOOL 301c6f823cd9ec47618c3f78e7e9331bd0a124f289b83e4d01cd8a32a2ab16aef139ccf9dbf497b8edb2f7af24d47b1fd4ea617aa5e515185d101d6ae56a149a +AUX xen-tools-4-docfix.patch 438 SHA256 016120c2333667aa84861ac9289c48a072c4842fb517936570882e1fc4060de6 SHA512 0a67d703749df823f5223b555c6dc896420e73ed7eeb5e77a8f8b950fc8bafaf9e20d66c35b29883b3cee6f8ca5054af3b55f804d20ae20d676feeeabf92b489 WHIRLPOOL fed73bd521b4cbea804ef4bc3b4b3a4007e7765cf0ab67e700e95afd328181ab5fce246b53a5e2a462baf6029664b25f82ffeabc1aaeb45fa99af344ecc957a5 +AUX xen-tools-4.1.1-bridge.patch 449 SHA256 71eea5408e3600c3c6f7ce4e8363ea2c19db36c1882e20cf0ef8143af527782b SHA512 3e4021c363bae11874b13675a8ad6aaf5b733e42a18e0d1259dce1cf2c305440dde13a7a08a584213dd96fa4b0a788048f6cb87a0f5b3ce777a2048215dbd779 WHIRLPOOL 9363d615578696899ba84d6d2026d3cc5115756a9d0ca5a91071ac4db6e2fa425135bbf6db320e90daf78f89c6203b291dcb2cc25a6e5db82b7c094d3c940cde +AUX xen-tools-4.1.1-curl.patch 550 SHA256 4bdb2875b36e7dbb0bd8d61b697da78007bb22922f56e020795c91ebb9ddd50b SHA512 d59a89a29ac687340953f48742451dcfebd94b8ede409184154d32a2371214cd8eae799240ff8a04aa0627973ea604b1461c9d937bc5ac0c86009dfa2b0875fe WHIRLPOOL 26262524f0a5cb6cb827cf65e52b3fbf86c98ab8928aa077fdc5ce5d81ee6d9a3c69d1b2fdc019560a9b0c528b318e1a0ca5c70a403b7a2627e087d43f0d9618 +AUX xen-tools-4.1.1-libxl-tap.patch 1071 SHA256 ee03a5b68a9edf5d4fe78a322ff261e13f6ded879f3898b0ea72c407f678f885 SHA512 6ce2ab4240b90d8490458747b2cc9df71a722c11987b3fa4632a7f174e4111df623a50796bf37ef5b3864a84530305de8da923525a0a7ce416942efc13d0b950 WHIRLPOOL a4bde6ea31a116b92c929eac01ec7425ec9d32c05ed1675f2bf62d96897cb6876ea8f55455c9825e8e55670afe4c6c61a99ecb24925ac93d2825903dcb617050 +AUX xen-tools-4.1.2-pyxml.patch 408 SHA256 6a8d8ca5478bc68850fd930749ca22207807c87f8624c0c3596a8cd70bc06c65 SHA512 ce6bae69e7ab1ef3cf4d9996399e1b08becd7dc18abd84724bb5c64b232354634657e3fd1acfb7953f07be4fd80f4ff1445257864a65482c6b4825ff99580faf WHIRLPOOL 888f464a910ac458fc1009908634f113181b492935a9d7651df4a81beed6b277b7b2bbc33bee300e721457a9c09723001e63f2e14c823283b1c6039cd09a7868 +AUX xenconsoled.confd 44 SHA256 2a74be03eb74f6013242a4a5d721df6cb9b959b43c405de1e32813f52d749060 SHA512 30df69cc38d0bed26bc4d6e08a2b62cbdc654d5f663009a05cb3b83b3e3dc5e206362d3fd59abbb753ceb8d6d79eaa6e15d079bb8f4f35dc74667103faf4e85d WHIRLPOOL 503f7b48842724e69e7e4ae752d0570c339b7214b5a5fa1db51300e65470803bb383524f6de6c5c08849a961f628f6db7764e3eddcc19accbd209777a0f27d68 +AUX xenconsoled.initd 652 SHA256 1a5594e4e924b94490c5c942b1b63e5fe857b8ad8061060e5d8a3bdfc9f0f1b7 SHA512 7caba575ecc1bb7263539142fa087ec788c583128d7c5236c1fd342d06a238edbb0aaf0ea53ce6189e72cf4402dfc07205db477840e3fa7233b3a6f9a231c2e4 WHIRLPOOL bb58d60a7ee646b59fb1272143c8fcbef191d9f4d90fb933d8789c37f7c28d6b63e81c616f870456fe84f12402753edf3af637d4fa37e425049570824035d805 +AUX xend.initd-r1 1664 SHA256 6ea8848ca1203c5ef8490014ded86ec67100385c217660d393b25dc6519d254d SHA512 ec0b1728bf60427f28f5e649bb3e67f8aa3539a1681f0cdea33d021131a84c8eecbf4caec73eda32f3face610c46aaf3f4b0585129111670569405c2cc4d2843 WHIRLPOOL db4089bd831e2b1e1d2abe8ec07bcf6d229a50f06df16de836ad3b0d0a594fc7776f514cee14ee088172a2ea611f12ee16c1d02f30be48fc9ba9fc58482b9652 +AUX xend.initd-r2 1064 SHA256 b9dcd925856eb5213b9052169492492d686b5d1ccae65b1c94a8ac944708d155 SHA512 e5606c781927624bdbcbeac0b7fb2068078c15abcdc3fb38200ca5ad25d6cb928f6d3451822187c01397d32562c3b9b8a1ed680b4900fa2e07e5600b39ab9dc0 WHIRLPOOL 5fde6ecbe3db47d379f43714a66a45307c13f8aeac93efc026149b896c870cf76dcc01cbb2c41c2bb380830461da26dfae8053d8ae3e7e245ba1e51f6a500c09 +AUX xendomains-screen.confd 886 SHA256 12eb1c354c594e83bdc636d317aff6e84a0767c129a4498d8d2b82964151b534 SHA512 c1e3a5272b3b5624137e37d817247281965795432de0acc0fade9496abdbe918b52dc47dd460384a031d57bf77e39b4a0335f3de5804d415f08028b1e3f69140 WHIRLPOOL 98db1bfb9f87235e816133ce8afa9a9af74017ad75c07860a070bfdaf4bffaec7dac6a2890b5fe15b8f4cde5e79a5eded6135d12c50b51c3c7c8cd8309ea820f +AUX xendomains.confd 291 SHA256 2fac318bb96b357dd185f7729d83c0a0b941799cdb89c24ed83051bb085735dc SHA512 8ad255d39fc0b390c854a64ed82333b6a3041e1247b7a3934cd8274710c168c0017ef2dddbe32c120268d7ea946f8c1b148d7d06a3a4bf415a77eeec36dce2da WHIRLPOOL cea26f5b0c88d644a8906cb2cc9ea8fe5071d6dfd7fc1020d1ce795a389c01b26209cdde04f61e4755494455a1b60c4652e45734c8f5463f2108ea4700e4f336 +AUX xendomains.initd-r1 2922 SHA256 db121dc218ee8df984da60bb655d4a9b98526a35840225ff86e689363245bcce SHA512 dcbcdf05900493338f3945188bb1e88b61c67ab34861d130eb3146b46c390f76a18186fabd32295a27e49595ebb3bd1b9cff8457e00d90a991f9525bc4fd5693 WHIRLPOOL 247c37d5b3a874b4fea84b0d5a7b5ee790d6ca49307cfd546422441b16b9c32d257873d15a4ba36dec34c9a1b6d40def3ecc7aa11377cc0b0c6ee6cf1f6520ae +AUX xendomains.initd-r2 2940 SHA256 27480ea1269d988671968aa226ab15910d012e2be8af6ae744fd77baa375d9d2 SHA512 c8e0803191b448a170c72a1556161aa312428ee1685f3ca0991dee7f82667b4a7af48cf6c795a939fcf9c475d712046f8f9aaa6e890bbdbc05c790cc3f7b7b69 WHIRLPOOL acf6496f37664bc6103c2e98bc4c18ec4b9f2f3aec18af0058227f40c13537a91da7bba29d9e0dba71d95a63028dbb4211b4eefc339c52413033b2ea0d42189b +AUX xenstored.confd 42 SHA256 afcc14f014fe4ec478f85d230efefba9ffad024bf8c83b30074e8a3712cc7831 SHA512 0906cbcdc84935d07cf53bc4447a1f9a9dc4e4fb9fda9a7163f6982f1d8a3ada1f0650fcd254fb6f715a54f7971daf0a5e61c3de6db70dfd156156fd55b59fe4 WHIRLPOOL df46f3fde8b13c3427f445bcf08eb4c660f6000164a01e461cff85cf93ce1195009fc3b4457181788da8eef8dec9125b41ace233ec6f169919be64337a57ebb8 +AUX xenstored.initd 803 SHA256 d500160360b629c589d6c0d71e1d6cc4675b958b9f912c5e5739652cf780a4c9 SHA512 dcea5de1ee8f3e618c2d22074e90b2dfd22a42d93bc4d3c7654d8a29f63c1a6712b1ec077d0bd517648c8760b094b803ceee8889b5085d09d41a9c97d84d0fc1 WHIRLPOOL b87167c26bcafece07e39746257fd66ca47e3e317f5211bf73291c232434678a804c9304841b15f870bbf0204cb0d72c43a3c9f758d63f57edb2b37e6b69f5aa +DIST ipxe.tar.gz 2867999 SHA256 632ce8c193ccacc3012bd354bdb733a4be126f7c098e111930aa41dad537405c SHA512 c5cb1cdff40d2d71fd3e692a9d0efadf2aa17290daf5195391a1c81ddd9dfc913a8e44d5be2b12be85b2a5565ea31631c99c7053564f2fb2225c80ea0bb0e4a4 WHIRLPOOL 58b7459aaf7323968e2f4d1cdcb563a04a0ee40d7d0e8fc600495baf6914127fbbbcddfb66199cd9f462eb59565b3d1ae90a05b3c771b8f13c2d2dcb6070eebc +DIST seabios-0-20121121.tar.bz2 2199282 SHA256 f7f67181c6c0b4cea3a9db48e2569fdcbbc81b732a2f672079c42fb44153ee62 SHA512 4f886088ebaa911590b8cb19db5c5dbc8f1384d2d5a7c4bf04df083e177513b3123b1839dad744171670eded8b69ce092a774288aec1804d00aa32b1b6778599 WHIRLPOOL f2e62682d7213ee5eaecbc2590637ef36d9c86f746840c0ee758c0c153139f485032ea2cd098c87bb8a2b5f17f91375b8fb65599e3b71b45b1645df85a88887f +DIST xen-4.2.0.tar.gz 15587687 SHA256 43f4a086e4e0330145a27b7ace8365c42b5afbc95cefadafe067be91bd3e5cfb SHA512 4fb56c79d722fb307bc657f16d02079c6636427e7650c4354193632d38d2d1db8e588f844ff0ca6e757c108ed639a528565ec9fc7c00bb4d5b6fbc9d122d8a70 WHIRLPOOL 369a109375864cb61920b56cf501522051d28513e738f0fd0e7b76244c3e08a8a0a6ff6cf245872d9bbd9c0f22c7da76c9cbc0f852bad6108ca25fd42dc677c0 +DIST xen-4.2.1.tar.gz 15593695 SHA256 fb8df5827ce3e2d2d3b078d9e5afde502beb5e7ab9442e51a94087061bd450c6 SHA512 fe27a965e2b34035bd025482eda9fc4d4e82523c929323fd30813367d5ffbe2fa1ed3d7d4479f2632e8b5625972448b7bd6a7768e8dc1dcd1b6747d281cc1a9e WHIRLPOOL 226bbed059541e804f1a44e721023ffbc04bae43000653b1d7d6a9bfec0d9efbf7a48b1b0a7ad3fcb8e34f8b91e1c620c2a8eddf97baad487e9db37d49a58f37 +EBUILD xen-tools-4.2.0-r3.ebuild 10190 SHA256 759af2416598e871367071f7045cd4971659309459c5efd6541c4d4e920a69a0 SHA512 85cdbfc9abd901b14990b1f2952748aaa861adc9b21c6b8859a2523e8c3e62e2f677da9c20218675d3a1aedb3e70a48f5b48eeb3fb37c5389f8e091ff43c5e5e WHIRLPOOL c881d9929ab45be9baec55e863c54e32328c5f7650f6c469171e7efd10c6589d0c454afb7295b89ab7bd649de1d7c5f3d835ae527463217b56e6076c42728afb +EBUILD xen-tools-4.2.1-r1.ebuild 10122 SHA256 6e1a321db3b23db55aa250988722085d4d85675a658c569b36b083059e2842df SHA512 7e2b8e41735bc3dbb74020a17d57574cad56badc691b36173416922f8fefcae79d3b7d79c815c705da01ae0f65c2c9714a4566e2698ca8a2999d116f50ac292f WHIRLPOOL 1cc3157dbd2b2e78b8734b6b48ff597bf00c899675a968fc95d93e82b438881b305c8e236a0f2b57abaa8098cc23bb222d262fe8d5e50dd89c04edff14fde664 +EBUILD xen-tools-4.2.1-r2.ebuild 10256 SHA256 7a2eb13b5dce1cd71ea2ea45f6848d67e578fe531367480fbaa3ae18b3862af7 SHA512 0b79429e45747b6d1fd6da1f90807de3d97daee86b7ac76a288c6b5f08402c61f44a5f22064d749560a7decdf747114e92dcdaef1e7b0c236a59c59a4f54eddf WHIRLPOOL 5d3e42614d241fca5f2fa898c8bef6e527cd0e2967ea1a993ddb43d719158c9fe7646c1e67278c6a3444dced0be48090fb126262bcfee35baaf075d7d5251ebd +EBUILD xen-tools-4.2.1.ebuild 10279 SHA256 763ee5f7cce3cc7e55b7e3bab4d271c03115000053c809793ec30a14ad6681a4 SHA512 c91f648bce05a476780267cf2839431e200944bb4d9379f8cd9370b91ec241df2c29d119e4b4160f4802949a03bc2b93f2c837187325d9b72f0a573d3a951e03 WHIRLPOOL 88aa1ec2beb59fa5b62f88cd711a3823dbeebfca22395d12445e587c87e1de11333c07f9e0535b0e61ccb5403d75ea562f4e4759fc7f1a81489634061e22f852 +MISC ChangeLog 34750 SHA256 37636a7fe49f8f64316e39c5269cd6d26154d79081b8d6553ec2959bf0aaa1fa SHA512 89193d0811fe1fe3c1cab7ea67730428c1d5d1e9f8d30287d719cfea59b3269065e4039193b7dab49aafa8dd2928b028122074f61fc1e3559e2a25aef86af4bc WHIRLPOOL 494a91e2fee08808dc1f402d2e8d41d79a93ec976422d8d0068e6c1ebe25541d8c35126d5c66032b525fc74a8ff1e4194e1e09b0b6a81d7af13a25bd40586c5f +MISC metadata.xml 881 SHA256 52d19c65a78ed979b0d6df2f83fc281e8622296e2686c199dbc58cb76a70a57b SHA512 3e2400037f840272c38b0a7b9d46f9975d512bea13e6dc21bf8458fb68b1c741f4458a9eaf18aa53c3183ef4f83e70e8ae50e28132e563fc4a1d6463c77a586d WHIRLPOOL 3b030061503f4c2beec7f51d3bf790f358a4837d78d7a0faf0eee5214832fe888445a53c0b09b94bf8dd811e44523e0bb05535d58583499df97b32280f722312 +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v2.0.19 (GNU/Linux) + +iEYEAREIAAYFAlFEohMACgkQso7CE7gHKw05RwCg0lOEE0qKIU1kD/zSiGwNrwgR +upoAoM3hvnviaCre/t+bZHnAtQ6RlDPF +=2OX9 +-----END PGP SIGNATURE----- diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/disable-tests.patch b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/disable-tests.patch new file mode 100644 index 0000000000..b92dba3b94 --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/disable-tests.patch @@ -0,0 +1,24 @@ +From d14311e08510529d6dba110a47364d35bf50f94f Mon Sep 17 00:00:00 2001 +From: Brandon Philips +Date: Fri, 10 May 2013 19:03:15 -0700 +Subject: [PATCH] disable tests + +--- + tools/Makefile | 1 - + 1 file changed, 1 deletion(-) + +diff --git a/tools/Makefile b/tools/Makefile +index d8c8cc0..2d41a81 100644 +--- a/tools/Makefile ++++ b/tools/Makefile +@@ -44,7 +44,6 @@ SUBDIRS-y += remus + SUBDIRS-$(CONFIG_X86) += xenpaging + SUBDIRS-$(CONFIG_X86) += debugger/gdbsx + SUBDIRS-$(CONFIG_X86) += debugger/kdd +-SUBDIRS-$(CONFIG_TESTS) += tests + + # These don't cross-compile + ifeq ($(XEN_COMPILE_ARCH),$(XEN_TARGET_ARCH)) +-- +1.8.1.4 + diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/fix-map-file-ld-errors.patch b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/fix-map-file-ld-errors.patch new file mode 100644 index 0000000000..bf07daeb8e --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/fix-map-file-ld-errors.patch @@ -0,0 +1,109 @@ +From 4ad271e83c1936a50899403cbdfc91f29f2e1d5c Mon Sep 17 00:00:00 2001 +From: Brandon Philips +Date: Fri, 10 May 2013 18:32:12 -0700 +Subject: [PATCH] fix map file ld errors + +--- + tools/libfsimage/common/Makefile | 2 +- + tools/libfsimage/common/mapfile-GNU | 78 ++++++++++++++++++------------------- + 2 files changed, 39 insertions(+), 41 deletions(-) + +diff --git a/tools/libfsimage/common/Makefile b/tools/libfsimage/common/Makefile +index f0ee3ab..cb9ed2d 100644 +--- a/tools/libfsimage/common/Makefile ++++ b/tools/libfsimage/common/Makefile +@@ -5,7 +5,7 @@ MAJOR = 1.0 + MINOR = 0 + + LDFLAGS-$(CONFIG_SunOS) = -Wl,-M -Wl,mapfile-SunOS +-LDFLAGS-$(CONFIG_Linux) = -Wl,mapfile-GNU ++LDFLAGS-$(CONFIG_Linux) = -Wl,--version-script=mapfile-GNU + LDFLAGS = $(LDFLAGS-y) + + CFLAGS += $(PTHREAD_CFLAGS) +diff --git a/tools/libfsimage/common/mapfile-GNU b/tools/libfsimage/common/mapfile-GNU +index 26d4d7a..525ac93 100644 +--- a/tools/libfsimage/common/mapfile-GNU ++++ b/tools/libfsimage/common/mapfile-GNU +@@ -1,40 +1,38 @@ +-VERSION { +- libfsimage.so.1.0 { +- global: +- fsi_open_fsimage; +- fsi_close_fsimage; +- fsi_file_exists; +- fsi_open_file; +- fsi_close_file; +- fsi_read_file; +- fsi_pread_file; +- fsi_bootstring_alloc; +- fsi_bootstring_free; +- fsi_fs_bootstring; +- +- fsip_fs_set_data; +- fsip_file_alloc; +- fsip_file_free; +- fsip_fs; +- fsip_fs_offset; +- fsip_fs_data; +- fsip_file_data; +- +- fsig_init; +- fsig_devread; +- fsig_substring; +- fsig_log2; +- fsig_fs_buf; +- fsig_file_alloc; +- fsig_file_buf; +- fsig_filepos; +- fsig_filemax; +- fsig_int1; +- fsig_int2; +- fsig_errnum; +- fsig_disk_read_junk; +- +- local: +- *; +- }; +-} ++{ ++ global: ++ fsi_open_fsimage; ++ fsi_close_fsimage; ++ fsi_file_exists; ++ fsi_open_file; ++ fsi_close_file; ++ fsi_read_file; ++ fsi_pread_file; ++ fsi_bootstring_alloc; ++ fsi_bootstring_free; ++ fsi_fs_bootstring; ++ ++ fsip_fs_set_data; ++ fsip_file_alloc; ++ fsip_file_free; ++ fsip_fs; ++ fsip_fs_offset; ++ fsip_fs_data; ++ fsip_file_data; ++ ++ fsig_init; ++ fsig_devread; ++ fsig_substring; ++ fsig_log2; ++ fsig_fs_buf; ++ fsig_file_alloc; ++ fsig_file_buf; ++ fsig_filepos; ++ fsig_filemax; ++ fsig_int1; ++ fsig_int2; ++ fsig_errnum; ++ fsig_disk_read_junk; ++ ++ local: ++ *; ++}; +-- +1.8.1.4 + diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/ipxe-nopie.patch b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/ipxe-nopie.patch new file mode 100644 index 0000000000..c5be735f1e --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/ipxe-nopie.patch @@ -0,0 +1,29 @@ +2011-10-22 Ralf Glauberman + + #360805 Don't compile ipxe with pie on hardened. + * /tools/firmware/etherboot/patches/ipxe-nopie.patche New patch + * /tools/firmware/etherboot/patches/series Add ipxe-nopie.patch + +--- a/tools/firmware/etherboot/patches/ipxe-nopie.patch 1970-01-01 01:00:00.000000000 +0100 ++++ b/tools/firmware/etherboot/patches/ipxe-nopie.patch 2011-03-27 17:45:13.929697782 +0200 +@@ -0,0 +1,11 @@ ++--- ipxe/src/Makefile~ 2011-03-27 17:41:52.000000000 +0200 +++++ ipxe/src/Makefile 2011-03-27 17:43:20.869446433 +0200 ++@@ -4,7 +4,7 @@ ++ # ++ ++ CLEANUP := ++-CFLAGS := +++CFLAGS := -nopie ++ ASFLAGS := ++ LDFLAGS := ++ MAKEDEPS := Makefile +--- a/tools/firmware/etherboot/patches/series 2011-03-25 11:42:50.000000000 +0100 ++++ b/tools/firmware/etherboot/patches/series 2011-03-27 17:45:45.140446216 +0200 +@@ -1,4 +1,5 @@ + boot_prompt_option.patch + build_fix_1.patch + build_fix_2.patch + build_fix_3.patch ++ipxe-nopie.patch + diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/stubs-32.h b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/stubs-32.h new file mode 100644 index 0000000000..a421528deb --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/stubs-32.h @@ -0,0 +1,20 @@ +/* This file is automatically generated. + It defines a symbol `__stub_FUNCTION' for each function + in the C library which is a stub, meaning it will fail + every time called, usually setting errno to ENOSYS. */ + +#ifdef _LIBC + #error Applications may not define the macro _LIBC +#endif + +#define __stub_chflags +#define __stub_fattach +#define __stub_fchflags +#define __stub_fdetach +#define __stub_gtty +#define __stub_lchmod +#define __stub_revoke +#define __stub_setlogin +#define __stub_sigreturn +#define __stub_sstk +#define __stub_stty diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-4-CVE-2012-4544-XSA-25.patch b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-4-CVE-2012-4544-XSA-25.patch new file mode 100644 index 0000000000..35b9338341 --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-4-CVE-2012-4544-XSA-25.patch @@ -0,0 +1,369 @@ + +# HG changeset patch +# User Ian Jackson +# Date 1351264255 -3600 +# Node ID 537776f51f79c5789d06f97b363596a197c3e71c +# Parent 40ccbee890e1fc053de3046bbc3d13b8ff6f5d63 +libxc: builder: limit maximum size of kernel/ramdisk. + +Allowing user supplied kernels of arbitrary sizes, especially during +decompression, can swallow up dom0 memory leading to either virtual +address space exhaustion in the builder process or allocation +failures/OOM killing of both toolstack and unrelated processes. + +We disable these checks when building in a stub domain for pvgrub +since this uses the guest's own memory and is isolated. + +Decompression of gzip compressed kernels and ramdisks has been safe +since 14954:58205257517d (Xen 3.1.0 onwards). + +This is XSA-25 / CVE-2012-4544. + +Also make explicit checks for buffer overflows in various +decompression routines. These were already ruled out due to other +properties of the code but check them as a belt-and-braces measure. + +Signed-off-by: Ian Campbell +Acked-by: Ian Jackson + +diff -r 40ccbee890e1 -r 537776f51f79 stubdom/grub/kexec.c +--- stubdom/grub/kexec.c Thu Oct 25 15:36:32 2012 +0200 ++++ stubdom/grub/kexec.c Fri Oct 26 16:10:55 2012 +0100 +@@ -137,6 +137,10 @@ void kexec(void *kernel, long kernel_siz + dom = xc_dom_allocate(xc_handle, cmdline, features); + dom->allocate = kexec_allocate; + ++ /* We are using guest owned memory, therefore no limits. */ ++ xc_dom_kernel_max_size(dom, 0); ++ xc_dom_ramdisk_max_size(dom, 0); ++ + dom->kernel_blob = kernel; + dom->kernel_size = kernel_size; + +diff -r 40ccbee890e1 -r 537776f51f79 tools/libxc/xc_dom.h +--- tools/libxc/xc_dom.h Thu Oct 25 15:36:32 2012 +0200 ++++ tools/libxc/xc_dom.h Fri Oct 26 16:10:55 2012 +0100 +@@ -55,6 +55,9 @@ struct xc_dom_image { + void *ramdisk_blob; + size_t ramdisk_size; + ++ size_t max_kernel_size; ++ size_t max_ramdisk_size; ++ + /* arguments and parameters */ + char *cmdline; + uint32_t f_requested[XENFEAT_NR_SUBMAPS]; +@@ -180,6 +183,23 @@ void xc_dom_release_phys(struct xc_dom_i + void xc_dom_release(struct xc_dom_image *dom); + int xc_dom_mem_init(struct xc_dom_image *dom, unsigned int mem_mb); + ++/* Set this larger if you have enormous ramdisks/kernels. Note that ++ * you should trust all kernels not to be maliciously large (e.g. to ++ * exhaust all dom0 memory) if you do this (see CVE-2012-4544 / ++ * XSA-25). You can also set the default independently for ++ * ramdisks/kernels in xc_dom_allocate() or call ++ * xc_dom_{kernel,ramdisk}_max_size. ++ */ ++#ifndef XC_DOM_DECOMPRESS_MAX ++#define XC_DOM_DECOMPRESS_MAX (1024*1024*1024) /* 1GB */ ++#endif ++ ++int xc_dom_kernel_check_size(struct xc_dom_image *dom, size_t sz); ++int xc_dom_kernel_max_size(struct xc_dom_image *dom, size_t sz); ++ ++int xc_dom_ramdisk_check_size(struct xc_dom_image *dom, size_t sz); ++int xc_dom_ramdisk_max_size(struct xc_dom_image *dom, size_t sz); ++ + size_t xc_dom_check_gzip(xc_interface *xch, + void *blob, size_t ziplen); + int xc_dom_do_gunzip(xc_interface *xch, +@@ -240,7 +260,8 @@ void xc_dom_log_memory_footprint(struct + void *xc_dom_malloc(struct xc_dom_image *dom, size_t size); + void *xc_dom_malloc_page_aligned(struct xc_dom_image *dom, size_t size); + void *xc_dom_malloc_filemap(struct xc_dom_image *dom, +- const char *filename, size_t * size); ++ const char *filename, size_t * size, ++ const size_t max_size); + char *xc_dom_strdup(struct xc_dom_image *dom, const char *str); + + /* --- alloc memory pool ------------------------------------------- */ +diff -r 40ccbee890e1 -r 537776f51f79 tools/libxc/xc_dom_bzimageloader.c +--- tools/libxc/xc_dom_bzimageloader.c Thu Oct 25 15:36:32 2012 +0200 ++++ tools/libxc/xc_dom_bzimageloader.c Fri Oct 26 16:10:55 2012 +0100 +@@ -47,13 +47,19 @@ static int xc_try_bzip2_decode( + char *out_buf; + char *tmp_buf; + int retval = -1; +- int outsize; ++ unsigned int outsize; + uint64_t total; + + stream.bzalloc = NULL; + stream.bzfree = NULL; + stream.opaque = NULL; + ++ if ( dom->kernel_size == 0) ++ { ++ DOMPRINTF("BZIP2: Input is 0 size"); ++ return -1; ++ } ++ + ret = BZ2_bzDecompressInit(&stream, 0, 0); + if ( ret != BZ_OK ) + { +@@ -66,6 +72,17 @@ static int xc_try_bzip2_decode( + * the input buffer to start, and we'll realloc as needed. + */ + outsize = dom->kernel_size; ++ ++ /* ++ * stream.avail_in and outsize are unsigned int, while kernel_size ++ * is a size_t. Check we aren't overflowing. ++ */ ++ if ( outsize != dom->kernel_size ) ++ { ++ DOMPRINTF("BZIP2: Input too large"); ++ goto bzip2_cleanup; ++ } ++ + out_buf = malloc(outsize); + if ( out_buf == NULL ) + { +@@ -98,13 +115,20 @@ static int xc_try_bzip2_decode( + if ( stream.avail_out == 0 ) + { + /* Protect against output buffer overflow */ +- if ( outsize > INT_MAX / 2 ) ++ if ( outsize > UINT_MAX / 2 ) + { + DOMPRINTF("BZIP2: output buffer overflow"); + free(out_buf); + goto bzip2_cleanup; + } + ++ if ( xc_dom_kernel_check_size(dom, outsize * 2) ) ++ { ++ DOMPRINTF("BZIP2: output too large"); ++ free(out_buf); ++ goto bzip2_cleanup; ++ } ++ + tmp_buf = realloc(out_buf, outsize * 2); + if ( tmp_buf == NULL ) + { +@@ -172,9 +196,15 @@ static int _xc_try_lzma_decode( + unsigned char *out_buf; + unsigned char *tmp_buf; + int retval = -1; +- int outsize; ++ size_t outsize; + const char *msg; + ++ if ( dom->kernel_size == 0) ++ { ++ DOMPRINTF("%s: Input is 0 size", what); ++ return -1; ++ } ++ + /* sigh. We don't know up-front how much memory we are going to need + * for the output buffer. Allocate the output buffer to be equal + * the input buffer to start, and we'll realloc as needed. +@@ -244,13 +274,20 @@ static int _xc_try_lzma_decode( + if ( stream->avail_out == 0 ) + { + /* Protect against output buffer overflow */ +- if ( outsize > INT_MAX / 2 ) ++ if ( outsize > SIZE_MAX / 2 ) + { + DOMPRINTF("%s: output buffer overflow", what); + free(out_buf); + goto lzma_cleanup; + } + ++ if ( xc_dom_kernel_check_size(dom, outsize * 2) ) ++ { ++ DOMPRINTF("%s: output too large", what); ++ free(out_buf); ++ goto lzma_cleanup; ++ } ++ + tmp_buf = realloc(out_buf, outsize * 2); + if ( tmp_buf == NULL ) + { +@@ -359,6 +396,12 @@ static int xc_try_lzo1x_decode( + 0x89, 0x4c, 0x5a, 0x4f, 0x00, 0x0d, 0x0a, 0x1a, 0x0a + }; + ++ /* ++ * lzo_uint should match size_t. Check that this is the case to be ++ * sure we won't overflow various lzo_uint fields. ++ */ ++ XC_BUILD_BUG_ON(sizeof(lzo_uint) != sizeof(size_t)); ++ + ret = lzo_init(); + if ( ret != LZO_E_OK ) + { +@@ -438,6 +481,14 @@ static int xc_try_lzo1x_decode( + if ( src_len <= 0 || src_len > dst_len || src_len > left ) + break; + ++ msg = "Output buffer overflow"; ++ if ( *size > SIZE_MAX - dst_len ) ++ break; ++ ++ msg = "Decompressed image too large"; ++ if ( xc_dom_kernel_check_size(dom, *size + dst_len) ) ++ break; ++ + msg = "Failed to (re)alloc memory"; + tmp_buf = realloc(out_buf, *size + dst_len); + if ( tmp_buf == NULL ) +diff -r 40ccbee890e1 -r 537776f51f79 tools/libxc/xc_dom_core.c +--- tools/libxc/xc_dom_core.c Thu Oct 25 15:36:32 2012 +0200 ++++ tools/libxc/xc_dom_core.c Fri Oct 26 16:10:55 2012 +0100 +@@ -159,7 +159,8 @@ void *xc_dom_malloc_page_aligned(struct + } + + void *xc_dom_malloc_filemap(struct xc_dom_image *dom, +- const char *filename, size_t * size) ++ const char *filename, size_t * size, ++ const size_t max_size) + { + struct xc_dom_mem *block = NULL; + int fd = -1; +@@ -171,6 +172,13 @@ void *xc_dom_malloc_filemap(struct xc_do + lseek(fd, 0, SEEK_SET); + *size = lseek(fd, 0, SEEK_END); + ++ if ( max_size && *size > max_size ) ++ { ++ xc_dom_panic(dom->xch, XC_OUT_OF_MEMORY, ++ "tried to map file which is too large"); ++ goto err; ++ } ++ + block = malloc(sizeof(*block)); + if ( block == NULL ) + goto err; +@@ -222,6 +230,40 @@ char *xc_dom_strdup(struct xc_dom_image + } + + /* ------------------------------------------------------------------------ */ ++/* decompression buffer sizing */ ++int xc_dom_kernel_check_size(struct xc_dom_image *dom, size_t sz) ++{ ++ /* No limit */ ++ if ( !dom->max_kernel_size ) ++ return 0; ++ ++ if ( sz > dom->max_kernel_size ) ++ { ++ xc_dom_panic(dom->xch, XC_INVALID_KERNEL, ++ "kernel image too large"); ++ return 1; ++ } ++ ++ return 0; ++} ++ ++int xc_dom_ramdisk_check_size(struct xc_dom_image *dom, size_t sz) ++{ ++ /* No limit */ ++ if ( !dom->max_ramdisk_size ) ++ return 0; ++ ++ if ( sz > dom->max_ramdisk_size ) ++ { ++ xc_dom_panic(dom->xch, XC_INVALID_KERNEL, ++ "ramdisk image too large"); ++ return 1; ++ } ++ ++ return 0; ++} ++ ++/* ------------------------------------------------------------------------ */ + /* read files, copy memory blocks, with transparent gunzip */ + + size_t xc_dom_check_gzip(xc_interface *xch, void *blob, size_t ziplen) +@@ -235,7 +277,7 @@ size_t xc_dom_check_gzip(xc_interface *x + + gzlen = blob + ziplen - 4; + unziplen = gzlen[3] << 24 | gzlen[2] << 16 | gzlen[1] << 8 | gzlen[0]; +- if ( (unziplen < 0) || (unziplen > (1024*1024*1024)) ) /* 1GB limit */ ++ if ( (unziplen < 0) || (unziplen > XC_DOM_DECOMPRESS_MAX) ) + { + xc_dom_printf + (xch, +@@ -288,6 +330,9 @@ int xc_dom_try_gunzip(struct xc_dom_imag + if ( unziplen == 0 ) + return 0; + ++ if ( xc_dom_kernel_check_size(dom, unziplen) ) ++ return 0; ++ + unzip = xc_dom_malloc(dom, unziplen); + if ( unzip == NULL ) + return -1; +@@ -588,6 +633,9 @@ struct xc_dom_image *xc_dom_allocate(xc_ + memset(dom, 0, sizeof(*dom)); + dom->xch = xch; + ++ dom->max_kernel_size = XC_DOM_DECOMPRESS_MAX; ++ dom->max_ramdisk_size = XC_DOM_DECOMPRESS_MAX; ++ + if ( cmdline ) + dom->cmdline = xc_dom_strdup(dom, cmdline); + if ( features ) +@@ -608,10 +656,25 @@ struct xc_dom_image *xc_dom_allocate(xc_ + return NULL; + } + ++int xc_dom_kernel_max_size(struct xc_dom_image *dom, size_t sz) ++{ ++ DOMPRINTF("%s: kernel_max_size=%zx", __FUNCTION__, sz); ++ dom->max_kernel_size = sz; ++ return 0; ++} ++ ++int xc_dom_ramdisk_max_size(struct xc_dom_image *dom, size_t sz) ++{ ++ DOMPRINTF("%s: ramdisk_max_size=%zx", __FUNCTION__, sz); ++ dom->max_ramdisk_size = sz; ++ return 0; ++} ++ + int xc_dom_kernel_file(struct xc_dom_image *dom, const char *filename) + { + DOMPRINTF("%s: filename=\"%s\"", __FUNCTION__, filename); +- dom->kernel_blob = xc_dom_malloc_filemap(dom, filename, &dom->kernel_size); ++ dom->kernel_blob = xc_dom_malloc_filemap(dom, filename, &dom->kernel_size, ++ dom->max_kernel_size); + if ( dom->kernel_blob == NULL ) + return -1; + return xc_dom_try_gunzip(dom, &dom->kernel_blob, &dom->kernel_size); +@@ -621,7 +684,9 @@ int xc_dom_ramdisk_file(struct xc_dom_im + { + DOMPRINTF("%s: filename=\"%s\"", __FUNCTION__, filename); + dom->ramdisk_blob = +- xc_dom_malloc_filemap(dom, filename, &dom->ramdisk_size); ++ xc_dom_malloc_filemap(dom, filename, &dom->ramdisk_size, ++ dom->max_ramdisk_size); ++ + if ( dom->ramdisk_blob == NULL ) + return -1; + // return xc_dom_try_gunzip(dom, &dom->ramdisk_blob, &dom->ramdisk_size); +@@ -781,7 +846,11 @@ int xc_dom_build_image(struct xc_dom_ima + void *ramdiskmap; + + unziplen = xc_dom_check_gzip(dom->xch, dom->ramdisk_blob, dom->ramdisk_size); ++ if ( xc_dom_ramdisk_check_size(dom, unziplen) != 0 ) ++ unziplen = 0; ++ + ramdisklen = unziplen ? unziplen : dom->ramdisk_size; ++ + if ( xc_dom_alloc_segment(dom, &dom->ramdisk_seg, "ramdisk", 0, + ramdisklen) != 0 ) + goto err; + + diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-4-CVE-2012-6075-XSA-41.patch b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-4-CVE-2012-6075-XSA-41.patch new file mode 100644 index 0000000000..7513ac3d5c --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-4-CVE-2012-6075-XSA-41.patch @@ -0,0 +1,39 @@ +authorMichael Contreras + Mon, 3 Dec 2012 04:11:22 +0000 (20:11 -0800) +committerAnthony Liguori + Mon, 3 Dec 2012 14:14:10 +0000 (08:14 -0600) + +The e1000_receive function for the e1000 needs to discard packets longer than +1522 bytes if the SBP and LPE flags are disabled. The linux driver assumes +this behavior and allocates memory based on this assumption. + +Signed-off-by: Michael Contreras +Signed-off-by: Anthony Liguori +hw/e1000.c + +--- tools/qemu-xen/hw/e1000.c ++++ tools/qemu-xen/hw/e1000.c +@@ -59,6 +59,9 @@ static int debugflags = DBGBIT(TXERR) | DBGBIT(GENERAL); + #define PNPMMIO_SIZE 0x20000 + #define MIN_BUF_SIZE 60 /* Min. octets in an ethernet frame sans FCS */ + ++/* this is the size past which hardware will drop packets when setting LPE=0 */ ++#define MAXIMUM_ETHERNET_VLAN_SIZE 1522 ++ + /* + * HW models: + * E1000_DEV_ID_82540EM works with Windows and Linux +@@ -805,6 +808,13 @@ e1000_receive(NetClientState *nc, const uint8_t *buf, size_t size) + size = sizeof(min_buf); + } + ++ /* Discard oversized packets if !LPE and !SBP. */ ++ if (size > MAXIMUM_ETHERNET_VLAN_SIZE ++ && !(s->mac_reg[RCTL] & E1000_RCTL_LPE) ++ && !(s->mac_reg[RCTL] & E1000_RCTL_SBP)) { ++ return size; ++ } ++ + if (!receive_filter(s, buf, size)) + return size; + diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-4-fix_dotconfig-gcc.patch b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-4-fix_dotconfig-gcc.patch new file mode 100644 index 0000000000..4e08a30f32 --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-4-fix_dotconfig-gcc.patch @@ -0,0 +1,245 @@ +# Fix gcc-4.6 +diff -ur xen-4.2.0.orig/extras/mini-os/minios.mk xen-4.2.0/extras/mini-os/minios.mk +--- extras/mini-os/minios.mk 2012-09-17 18:21:17.000000000 +0800 ++++ extras/mini-os/minios.mk 2012-12-05 14:01:10.653260260 +0800 +@@ -6,7 +6,7 @@ + + # Define some default flags. + # NB. '-Wcast-qual' is nasty, so I omitted it. +-DEF_CFLAGS += -fno-builtin -Wall -Werror -Wredundant-decls -Wno-format -Wno-redundant-decls ++DEF_CFLAGS += -fno-builtin -Wall -Wredundant-decls -Wno-format -Wno-redundant-decls + DEF_CFLAGS += $(call cc-option,$(CC),-fno-stack-protector,) + DEF_CFLAGS += $(call cc-option,$(CC),-fgnu89-inline) + DEF_CFLAGS += -Wstrict-prototypes -Wnested-externs -Wpointer-arith -Winline +diff -ur xen-4.2.0.orig/tools/libxc/Makefile xen-4.2.0/tools/libxc/Makefile +--- tools/libxc/Makefile 2012-09-17 18:21:18.000000000 +0800 ++++ tools/libxc/Makefile 2012-12-05 14:01:10.653260260 +0800 +@@ -73,7 +73,7 @@ + + -include $(XEN_TARGET_ARCH)/Makefile + +-CFLAGS += -Werror -Wmissing-prototypes ++CFLAGS += -Wmissing-prototypes + CFLAGS += -I. $(CFLAGS_xeninclude) + + # Needed for posix_fadvise64() in xc_linux.c +# Drop .config +diff -ur xen-4.2.0.orig/Config.mk xen-4.2.0/Config.mk +--- Config.mk 2012-09-17 18:23:12.000000000 +0800 ++++ Config.mk 2012-12-05 14:01:10.641260261 +0800 +@@ -7,7 +7,6 @@ Drop .config + # fallback for older make + realpath = $(wildcard $(foreach file,$(1),$(shell cd -P $(dir $(file)) && echo "$$PWD/$(notdir $(file))"))) + +--include $(XEN_ROOT)/.config + + # A debug build of Xen and tools? + debug ?= n +@@ -24,7 +24,7 @@ + + # Tools to run on system hosting the build + HOSTCC = gcc +-HOSTCFLAGS = -Wall -Werror -Wstrict-prototypes -O2 -fomit-frame-pointer ++HOSTCFLAGS = -Wstrict-prototypes -O2 -fomit-frame-pointer + HOSTCFLAGS += -fno-strict-aliasing + + DISTDIR ?= $(XEN_ROOT)/dist +@@ -156,7 +156,7 @@ + + CFLAGS += -std=gnu99 + +-CFLAGS += -Wall -Wstrict-prototypes ++CFLAGS += -Wstrict-prototypes + + # Clang complains about macros that expand to 'if ( ( foo == bar ) ) ...' + # and is over-zealous with the printf format lint +diff -ur xen-4.2.1.orig/tools/blktap2/drivers/Makefile xen-4.2.1/tools/blktap2/drivers/Makefile +--- tools/blktap2/drivers/Makefile 2012-12-17 23:00:11.000000000 +0800 ++++ tools/blktap2/drivers/Makefile 2013-01-30 12:31:43.539941099 +0800 +@@ -9,7 +9,7 @@ + LOCK_UTIL = lock-util + INST_DIR = $(SBINDIR) + +-CFLAGS += -Werror -g ++CFLAGS += -g + CFLAGS += -Wno-unused + CFLAGS += -fno-strict-aliasing + CFLAGS += -I$(BLKTAP_ROOT)/include -I$(BLKTAP_ROOT)/drivers +diff -ur xen-4.2.1.orig/tools/debugger/gdbsx/Rules.mk xen-4.2.1/tools/debugger/gdbsx/Rules.mk +--- tools/debugger/gdbsx/Rules.mk 2012-12-17 23:00:22.000000000 +0800 ++++ tools/debugger/gdbsx/Rules.mk 2013-01-30 12:31:43.516941098 +0800 +@@ -1,4 +1,4 @@ + include $(XEN_ROOT)/tools/Rules.mk + +-CFLAGS += -Werror -Wmissing-prototypes ++CFLAGS += -Wmissing-prototypes + # (gcc 4.3x and later) -Wconversion -Wno-sign-conversion +diff -ur xen-4.2.1.orig/tools/debugger/xenitp/Makefile xen-4.2.1/tools/debugger/xenitp/Makefile +--- tools/debugger/xenitp/Makefile 2012-12-17 23:00:22.000000000 +0800 ++++ tools/debugger/xenitp/Makefile 2013-01-30 12:31:43.516941098 +0800 +@@ -1,7 +1,7 @@ + XEN_ROOT=$(CURDIR)/../../.. + include $(XEN_ROOT)/tools/Rules.mk + +-#CFLAGS += -Werror -g -O0 ++#CFLAGS += -g -O0 + + CFLAGS += $(CFLAGS_libxenctrl) + +diff -ur xen-4.2.1.orig/tools/libaio/harness/Makefile xen-4.2.1/tools/libaio/harness/Makefile +--- tools/libaio/harness/Makefile 2012-12-17 23:00:35.000000000 +0800 ++++ tools/libaio/harness/Makefile 2013-01-30 12:31:43.541941099 +0800 +@@ -4,7 +4,7 @@ + HARNESS_SRCS:=main.c + # io_queue.c + +-CFLAGS=-Wall -Werror -g -O -laio ++CFLAGS=-Wall -g -O -laio + #-lpthread -lrt + + all: $(PROGS) +diff -ur xen-4.2.1.orig/tools/libfsimage/Rules.mk xen-4.2.1/tools/libfsimage/Rules.mk +--- tools/libfsimage/Rules.mk 2012-12-17 23:00:36.000000000 +0800 ++++ tools/libfsimage/Rules.mk 2013-01-30 12:31:43.515941097 +0800 +@@ -1,7 +1,7 @@ + include $(XEN_ROOT)/tools/Rules.mk + + CFLAGS += -Wno-unknown-pragmas -I$(XEN_ROOT)/tools/libfsimage/common/ -DFSIMAGE_FSDIR=\"$(FSDIR)\" +-CFLAGS += -Werror -D_GNU_SOURCE ++CFLAGS += -D_GNU_SOURCE + LDFLAGS += -L../common/ + + PIC_OBJS := $(patsubst %.c,%.opic,$(LIB_SRCS-y)) +diff -ur xen-4.2.1.orig/tools/libxl/Makefile xen-4.2.1/tools/libxl/Makefile +--- tools/libxl/Makefile 2012-12-17 23:01:08.000000000 +0800 ++++ tools/libxl/Makefile 2013-01-30 12:31:43.541941099 +0800 +@@ -11,7 +11,7 @@ + XLUMAJOR = 1.0 + XLUMINOR = 1 + +-CFLAGS += -Werror -Wno-format-zero-length -Wmissing-declarations \ ++CFLAGS += -Wno-format-zero-length -Wmissing-declarations \ + -Wno-declaration-after-statement -Wformat-nonliteral + CFLAGS += -I. -fPIC + +diff -ur xen-4.2.1.orig/tools/qemu-xen/pc-bios/optionrom/Makefile xen-4.2.1/tools/qemu-xen/pc-bios/optionrom/Makefile +--- tools/qemu-xen/pc-bios/optionrom/Makefile 2012-09-11 02:10:52.000000000 +0800 ++++ tools/qemu-xen/pc-bios/optionrom/Makefile 2013-01-30 12:31:43.528941098 +0800 +@@ -9,7 +9,7 @@ + + .PHONY : all clean build-all + +-CFLAGS := -Wall -Wstrict-prototypes -Werror -fomit-frame-pointer -fno-builtin ++CFLAGS := -Wall -Wstrict-prototypes -fomit-frame-pointer -fno-builtin + CFLAGS += -I$(SRC_PATH) + CFLAGS += $(call cc-option, $(CFLAGS), -fno-stack-protector) + QEMU_CFLAGS = $(CFLAGS) +diff -ur xen-4.2.1.orig/tools/vtpm/Rules.mk xen-4.2.1/tools/vtpm/Rules.mk +--- tools/vtpm/Rules.mk 2012-12-17 23:01:35.000000000 +0800 ++++ tools/vtpm/Rules.mk 2013-01-30 12:31:43.515941097 +0800 +@@ -6,7 +6,7 @@ + # + + # General compiler flags +-CFLAGS = -Werror -g3 ++CFLAGS = -g3 + + # Generic project files + HDRS = $(wildcard *.h) +diff -ur xen-4.2.1.orig/tools/vtpm_manager/Rules.mk xen-4.2.1/tools/vtpm_manager/Rules.mk +--- tools/vtpm_manager/Rules.mk 2012-12-17 23:01:35.000000000 +0800 ++++ tools/vtpm_manager/Rules.mk 2013-01-30 12:31:43.511941097 +0800 +@@ -6,7 +6,7 @@ + # + + # General compiler flags +-CFLAGS = -Werror -g3 ++CFLAGS = -g3 + + # Generic project files + HDRS = $(wildcard *.h) +diff -ur xen-4.2.1.orig/tools/xenstat/xentop/Makefile xen-4.2.1/tools/xenstat/xentop/Makefile +--- tools/xenstat/xentop/Makefile 2012-12-17 23:01:35.000000000 +0800 ++++ tools/xenstat/xentop/Makefile 2013-01-30 12:31:43.535941098 +0800 +@@ -18,7 +18,7 @@ + all install xentop: + else + +-CFLAGS += -DGCC_PRINTF -Wall -Werror $(CFLAGS_libxenstat) ++CFLAGS += -DGCC_PRINTF -Wall $(CFLAGS_libxenstat) + LDLIBS += $(LDLIBS_libxenstat) $(CURSES_LIBS) $(SOCKET_LIBS) + CFLAGS += -DHOST_$(XEN_OS) + +diff -ur xen-4.2.1.orig/xen/arch/arm/Rules.mk xen-4.2.1/xen/arch/arm/Rules.mk +--- xen/arch/arm/Rules.mk 2012-12-17 23:01:37.000000000 +0800 ++++ xen/arch/arm/Rules.mk 2013-01-30 12:31:43.498941097 +0800 +@@ -9,7 +9,7 @@ + HAS_DEVICE_TREE := y + + CFLAGS += -fno-builtin -fno-common -Wredundant-decls +-CFLAGS += -iwithprefix include -Werror -Wno-pointer-arith -pipe ++CFLAGS += -iwithprefix include -Wno-pointer-arith -pipe + CFLAGS += -I$(BASEDIR)/include + + # Prevent floating-point variables from creeping into Xen. +diff -ur xen-4.2.1.orig/xen/arch/x86/Rules.mk xen-4.2.1/xen/arch/x86/Rules.mk +--- xen/arch/x86/Rules.mk 2012-12-17 23:01:37.000000000 +0800 ++++ xen/arch/x86/Rules.mk 2013-01-30 12:31:43.490941096 +0800 +@@ -24,7 +24,7 @@ + endif + + CFLAGS += -fno-builtin -fno-common -Wredundant-decls +-CFLAGS += -iwithprefix include -Werror -Wno-pointer-arith -pipe ++CFLAGS += -iwithprefix include -Wno-pointer-arith -pipe + CFLAGS += -I$(BASEDIR)/include + CFLAGS += -I$(BASEDIR)/include/asm-x86/mach-generic + CFLAGS += -I$(BASEDIR)/include/asm-x86/mach-default +diff -ur xen-4.2.1.orig/xen/include/Makefile xen-4.2.1/xen/include/Makefile +--- xen/include/Makefile 2012-12-17 23:01:55.000000000 +0800 ++++ xen/include/Makefile 2013-01-30 12:31:43.502941097 +0800 +@@ -78,7 +78,7 @@ + all: headers.chk + + headers.chk: $(filter-out public/arch-% public/%ctl.h public/xsm/% public/%hvm/save.h, $(wildcard public/*.h public/*/*.h) $(public-y)) Makefile +- for i in $(filter %.h,$^); do $(CC) -ansi -include stdint.h -Wall -W -Werror -S -o /dev/null -xc $$i || exit 1; echo $$i; done >$@.new ++ for i in $(filter %.h,$^); do $(CC) -ansi -include stdint.h -Wall -W -S -o /dev/null -xc $$i || exit 1; echo $$i; done >$@.new + mv $@.new $@ + + endif +diff -ur xen-4.2.1.orig/tools/tests/mce-test/tools/Makefile xen-4.2.1/tools/tests/mce-test/tools/Makefile +--- tools/tests/mce-test/tools/Makefile 2012-12-17 23:01:35.000000000 +0800 ++++ tools/tests/mce-test/tools/Makefile 2013-01-30 13:01:44.890020152 +0800 +@@ -1,7 +1,7 @@ + XEN_ROOT=$(CURDIR)/../../../.. + include $(XEN_ROOT)/tools/Rules.mk + +-CFLAGS += -Werror ++CFLAGS += + CFLAGS += $(CFLAGS_libxenctrl) + CFLAGS += $(CFLAGS_libxenguest) + CFLAGS += $(CFLAGS_libxenstore) +diff -ur xen-4.2.1.orig/tools/tests/mem-sharing/Makefile xen-4.2.1/tools/tests/mem-sharing/Makefile +--- tools/tests/mem-sharing/Makefile 2012-12-17 23:01:35.000000000 +0800 ++++ tools/tests/mem-sharing/Makefile 2013-01-30 13:01:44.890020152 +0800 +@@ -1,7 +1,7 @@ + XEN_ROOT=$(CURDIR)/../../.. + include $(XEN_ROOT)/tools/Rules.mk + +-CFLAGS += -Werror ++CFLAGS += + + CFLAGS += $(CFLAGS_libxenctrl) + CFLAGS += $(CFLAGS_xeninclude) +diff -ur xen-4.2.1.orig/tools/tests/xen-access/Makefile xen-4.2.1/tools/tests/xen-access/Makefile +--- tools/tests/xen-access/Makefile 2012-12-17 23:01:35.000000000 +0800 ++++ tools/tests/xen-access/Makefile 2013-01-30 13:01:44.891020152 +0800 +@@ -1,7 +1,7 @@ + XEN_ROOT=$(CURDIR)/../../.. + include $(XEN_ROOT)/tools/Rules.mk + +-CFLAGS += -Werror ++CFLAGS += + + CFLAGS += $(CFLAGS_libxenctrl) + CFLAGS += $(CFLAGS_libxenguest) + diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-4.2.0-anti-download.patch b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-4.2.0-anti-download.patch new file mode 100644 index 0000000000..95a1ce6f06 --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-4.2.0-anti-download.patch @@ -0,0 +1,28 @@ +diff -ur xen-4.2.0.orig/tools/firmware/etherboot/Makefile xen-4.2.0/tools/firmware/etherboot/Makefile +--- tools/firmware/etherboot/Makefile 2012-09-17 18:21:18.000000000 +0800 ++++ tools/firmware/etherboot/Makefile 2012-11-21 14:12:54.389536642 +0800 +@@ -28,13 +28,6 @@ + $(MAKE) -C $D/src bin/$(*F).rom + + $T: +- if ! wget -O _$T $(IPXE_TARBALL_URL); then \ +- $(GIT) clone $(IPXE_GIT_URL) $D.git; \ +- (cd $D.git && $(GIT) archive --format=tar --prefix=$D/ \ +- $(IPXE_GIT_TAG) | gzip >../_$T); \ +- rm -rf $D.git; \ +- fi +- mv _$T $T + + $D/src/arch/i386/Makefile: $T Config + rm -rf $D +diff -ur xen-4.2.0.orig/tools/firmware/Makefile xen-4.2.0/tools/firmware/Makefile +--- tools/firmware/Makefile 2012-09-17 18:21:18.000000000 +0800 ++++ tools/firmware/Makefile 2012-11-21 16:14:21.974868539 +0800 +@@ -18,7 +18,6 @@ + cp ovmf-makefile ovmf/Makefile; + + seabios-dir: +- GIT=$(GIT) $(XEN_ROOT)/scripts/git-checkout.sh $(SEABIOS_UPSTREAM_URL) $(SEABIOS_UPSTREAM_TAG) seabios-dir + cp seabios-config seabios-dir/.config; + + .PHONY: all diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-4.2.0-jserver.patch b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-4.2.0-jserver.patch new file mode 100644 index 0000000000..d42080c767 --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-4.2.0-jserver.patch @@ -0,0 +1,20 @@ +diff -ur xen-4.2.0.orig/tools/tests/x86_emulator/Makefile xen-4.2.0/tools/tests/x86_emulator/Makefile +--- tools/tests/x86_emulator/Makefile 2012-09-17 18:21:19.000000000 +0800 ++++ tools/tests/x86_emulator/Makefile 2012-11-24 05:06:24.355778737 +0800 +@@ -14,13 +14,13 @@ + .PHONY: blowfish.h + blowfish.h: + rm -f blowfish.bin +- XEN_TARGET_ARCH=x86_32 make -f blowfish.mk all ++ XEN_TARGET_ARCH=x86_32 $(MAKE) -f blowfish.mk all + (echo "static unsigned int blowfish32_code[] = {"; \ + od -v -t x blowfish.bin | sed 's/^[0-9]* /0x/' | sed 's/ /, 0x/g' | sed 's/$$/,/';\ + echo "};") >$@ + rm -f blowfish.bin + ifeq ($(XEN_COMPILE_ARCH),x86_64) +- XEN_TARGET_ARCH=x86_64 make -f blowfish.mk all ++ XEN_TARGET_ARCH=x86_64 $(MAKE) -f blowfish.mk all + (echo "static unsigned int blowfish64_code[] = {"; \ + od -v -t x blowfish.bin | sed 's/^[0-9]* /0x/' | sed 's/ /, 0x/g' | sed 's/$$/,/';\ + echo "};") >>$@ + diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-4.2.0-nostrip.patch b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-4.2.0-nostrip.patch new file mode 100644 index 0000000000..de06279bd3 --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-4.2.0-nostrip.patch @@ -0,0 +1,37 @@ +diff -ur xen-4.2.0.orig/tools/qemu-xen-traditional/Makefile xen-4.2.0/tools/qemu-xen-traditional/Makefile +--- tools/qemu-xen-traditional/Makefile 2012-09-07 00:05:30.000000000 +0800 ++++ tools/qemu-xen-traditional/Makefile 2012-11-22 06:12:29.433599695 +0800 +@@ -243,7 +243,7 @@ + install: all $(if $(BUILD_DOCS),install-doc) + mkdir -p "$(DESTDIR)$(bindir)" + ifneq ($(TOOLS),) +- $(INSTALL) -m 755 -s $(TOOLS) "$(DESTDIR)$(bindir)" ++ $(INSTALL) -m 755 $(TOOLS) "$(DESTDIR)$(bindir)" + endif + ifneq ($(BLOBS),) + mkdir -p "$(DESTDIR)$(datadir)" +diff -ur xen-4.2.0.orig/tools/qemu-xen-traditional/Makefile.target xen-4.2.0/tools/qemu-xen-traditional/Makefile.target +--- tools/qemu-xen-traditional/Makefile.target 2012-09-07 00:05:30.000000000 +0800 ++++ tools/qemu-xen-traditional/Makefile.target 2012-11-22 06:26:45.302521231 +0800 +@@ -755,7 +755,7 @@ + + install: all install-hook + ifneq ($(PROGS),) +- $(INSTALL) -m 755 -s $(PROGS) "$(DESTDIR)$(bindir)" ++ $(INSTALL) -m 755 $(PROGS) "$(DESTDIR)$(bindir)" + endif + + # Include automatically generated dependency files +diff -ur xen-4.2.0.orig/tools/qemu-xen/Makefile.target xen-4.2.0/tools/qemu-xen/Makefile.target +--- tools/qemu-xen/Makefile.target 2012-09-11 02:10:52.000000000 +0800 ++++ tools/qemu-xen/Makefile.target 2012-11-22 07:13:38.894263291 +0800 +@@ -437,9 +437,6 @@ + install: all + ifneq ($(PROGS),) + $(INSTALL) -m 755 $(PROGS) "$(DESTDIR)$(bindir)" +-ifneq ($(STRIP),) +- $(STRIP) $(patsubst %,"$(DESTDIR)$(bindir)/%",$(PROGS)) +-endif + endif + ifdef CONFIG_TRACE_SYSTEMTAP + ifdef CONFIG_TRACE_SYSTEMTAP diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-consoles.logrotate b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-consoles.logrotate new file mode 100644 index 0000000000..c6445239b4 --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-consoles.logrotate @@ -0,0 +1,5 @@ +/var/log/xen-consoles/*.log { + rotate 7 + missingok + compress +} diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-tools-3.3.0-nostrip.patch b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-tools-3.3.0-nostrip.patch new file mode 100644 index 0000000000..48e7cd5778 --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-tools-3.3.0-nostrip.patch @@ -0,0 +1,26 @@ +Index: xen-3.3.0/tools/ioemu-qemu-xen/Makefile +=================================================================== +--- xen-3.3.0.orig/tools/ioemu-qemu-xen/Makefile ++++ xen-3.3.0/tools/ioemu-qemu-xen/Makefile +@@ -205,7 +205,7 @@ endif + install: all $(if $(BUILD_DOCS),install-doc) + mkdir -p "$(DESTDIR)$(bindir)" + ifneq ($(TOOLS),) +- $(INSTALL) -m 755 -s $(TOOLS) "$(DESTDIR)$(bindir)" ++ $(INSTALL) -m 755 $(TOOLS) "$(DESTDIR)$(bindir)" + endif + mkdir -p "$(DESTDIR)$(datadir)" + set -e; for x in bios.bin vgabios.bin vgabios-cirrus.bin ppc_rom.bin \ +Index: xen-3.3.0/tools/ioemu-qemu-xen/Makefile.target +=================================================================== +--- xen-3.3.0.orig/tools/ioemu-qemu-xen/Makefile.target ++++ xen-3.3.0/tools/ioemu-qemu-xen/Makefile.target +@@ -707,7 +707,7 @@ clean: + + install: all install-hook + ifneq ($(PROGS),) +- $(INSTALL) -m 755 -s $(PROGS) "$(DESTDIR)$(bindir)" ++ $(INSTALL) -m 755 $(PROGS) "$(DESTDIR)$(bindir)" + endif + + # Include automatically generated dependency files diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-tools-3.4.0-network-bridge-broadcast.patch b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-tools-3.4.0-network-bridge-broadcast.patch new file mode 100644 index 0000000000..c926510fa8 --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-tools-3.4.0-network-bridge-broadcast.patch @@ -0,0 +1,11 @@ +--- xen-3.4.0/tools/hotplug/Linux/network-bridge.orig 2009-05-18 15:05:38.000000000 +0400 ++++ xen-3.4.0/tools/hotplug/Linux/network-bridge 2009-06-09 23:16:05.000000000 +0400 +@@ -101,7 +101,7 @@ + tdev=tmpbridge + + get_ip_info() { +- addr_pfx=`ip addr show dev $1 | egrep '^ *inet' | sed -e 's/ *inet //' -e 's/ .*//'` ++ addr_pfx=`ip addr show dev $1 | egrep '^ *inet ' | sed -e 's/ *inet //' -e "s/$1//"` + gateway=`ip route show dev $1 | fgrep default | sed 's/default via //'` + } + diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-tools-4-add-nopie.patch b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-tools-4-add-nopie.patch new file mode 100644 index 0000000000..0d8f8237a7 --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-tools-4-add-nopie.patch @@ -0,0 +1,15 @@ +2011-10-22 Ralf Glauberman + + #360805 Don't compile ipxe with pie on hardened. + * /tools/firmware/etherboot/patches/ipxe-nopie.patche New patch +Reconstituted patch; Tue Jan 29 14:35:13 WST 2013 + +diff -ur xen-4.2.0.orig/tools/firmware/etherboot/patches/series xen-4.2.0/tools/firmware/etherboot/patches/series +--- tools/firmware/etherboot/patches/series 2013-01-29 14:34:10.773520921 +0800 ++++ tools/firmware/etherboot/patches/series 2013-01-29 14:33:31.781519209 +0800 +@@ -2,3 +2,4 @@ + build_fix_1.patch + build_fix_2.patch + build_fix_3.patch ++ipxe-nopie.patch + diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-tools-4-docfix.patch b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-tools-4-docfix.patch new file mode 100644 index 0000000000..c9205a4cab --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-tools-4-docfix.patch @@ -0,0 +1,12 @@ +diff -ur xen-4.2.0.orig/tools/qemu-xen-traditional/Makefile xen-4.2.0/tools/qemu-xen-traditional/Makefile +--- xen-4.2.0.orig/tools/qemu-xen-traditional/Makefile 2012-09-07 00:05:30.000000000 +0800 ++++ xen-4.2.0/tools/qemu-xen-traditional/Makefile 2013-01-29 11:12:20.502989453 +0800 +@@ -275,7 +275,7 @@ + + # documentation + %.html: %.texi +- texi2html -monolithic -number $< ++ texi2html -monolithic $< + + %.info: %.texi + makeinfo $< -o $@ diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-tools-4.1.1-bridge.patch b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-tools-4.1.1-bridge.patch new file mode 100644 index 0000000000..4b3a4bac1e --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-tools-4.1.1-bridge.patch @@ -0,0 +1,12 @@ +diff -ur xen-4.1.1.orig//tools/hotplug/Linux/network-bridge xen-4.1.1/tools/hotplug/Linux/network-bridge +--- xen-4.1.1.orig//tools/hotplug/Linux/network-bridge 2011-10-14 02:28:43.481714285 +0800 ++++ xen-4.1.1/tools/hotplug/Linux/network-bridge 2011-10-16 01:06:11.226673108 +0800 +@@ -216,7 +216,7 @@ + return + fi + +- if [ `brctl show | wc -l` != 1 ]; then ++ if [ `brctl show | grep $netdev | wc -l` != 0 ]; then + return + fi + diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-tools-4.1.1-curl.patch b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-tools-4.1.1-curl.patch new file mode 100644 index 0000000000..c3fd913869 --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-tools-4.1.1-curl.patch @@ -0,0 +1,10 @@ +diff -ur xen-4.1.1.orig//tools/check/check_curl xen-4.1.1/tools/check/check_curl +--- xen-4.1.1.orig//tools/check/check_curl 2011-06-15 00:03:44.000000000 +0800 ++++ xen-4.1.1/tools/check/check_curl 2011-10-14 00:42:08.189717078 +0800 +@@ -9,5 +9,6 @@ + fi + + has_or_fail curl-config + curl_libs=`curl-config --libs` || fail "curl-config --libs failed" ++curl_libs=`echo $curl_libs | sed -re 's/-(W|march|mtune|pipe)[^[:space:]]*[[:space:]]//g'` || fail "curl-config --libs failed" + test_link $curl_libs || fail "dependency libraries for curl are missing" diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-tools-4.1.1-libxl-tap.patch b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-tools-4.1.1-libxl-tap.patch new file mode 100644 index 0000000000..ba72c497aa --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-tools-4.1.1-libxl-tap.patch @@ -0,0 +1,37 @@ +Index: xen-tools-4.1.1/tools/libxl/libxl_dm.c +=================================================================== +--- xen-4.1.1.orig/tools/libxl/libxl_dm.c Tue Mar 15 10:14:27 2011 +0000 ++++ xen-4.1.1/tools/libxl/libxl_dm.c Tue Mar 15 18:19:47 2011 +0000 +@@ -828,8 +828,29 @@ + goto out; + } + +- if (nr_disks > 0 && !libxl__blktap_enabled(&gc)) +- ret = 1; ++ if (nr_disks > 0) { ++ int blktap_enabled = -1; ++ for (i = 0; i < nr_disks; i++) { ++ switch (disks[i].backend) { ++ case DISK_BACKEND_TAP: ++ if (blktap_enabled == -1) ++ blktap_enabled = libxl__blktap_enabled(&gc); ++ if (!blktap_enabled) { ++ ret = 1; ++ goto out; ++ } ++ break; ++ ++ case DISK_BACKEND_QDISK: ++ ret = 1; ++ goto out; ++ ++ case DISK_BACKEND_PHY: ++ case DISK_BACKEND_UNKNOWN: ++ break; ++ } ++ } ++ } + + out: + libxl__free_all(&gc); + diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-tools-4.1.2-pyxml.patch b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-tools-4.1.2-pyxml.patch new file mode 100644 index 0000000000..5b14e4c410 --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xen-tools-4.1.2-pyxml.patch @@ -0,0 +1,12 @@ +--- tools/python/xen/xm/create.py ++++ tools/python/xen/xm/create.py +@@ -1538,6 +1538,9 @@ + SXPPrettyPrint.prettyprint(config) + + if opts.vals.xmldryrun and serverType == SERVER_XEN_API: ++ import xml ++ if hasattr(xml, "use_pyxml"): ++ xml.use_pyxml() + from xml.dom.ext import PrettyPrint as XMLPrettyPrint + XMLPrettyPrint(doc) + diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xenconsoled.confd b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xenconsoled.confd new file mode 100644 index 0000000000..b2e194bde4 --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xenconsoled.confd @@ -0,0 +1,2 @@ +# /etc/conf.d/xenstored +XENCONSOLED_OPTS="" diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xenconsoled.initd b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xenconsoled.initd new file mode 100644 index 0000000000..12e4381529 --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xenconsoled.initd @@ -0,0 +1,25 @@ +#!/sbin/runscript +# Copyright 1999-2011 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/app-emulation/xen-tools/files/xenconsoled.initd,v 1.1 2011/04/05 19:23:05 alexxy Exp $ + +depend() { + need xenstored +} + +start() { + ebegin "Starting xenconsoled daemon" + start-stop-daemon --start --exec /usr/sbin/xenconsoled \ + --pidfile /var/run/xenconsoled.pid \ + -- --pid-file=/var/run/xenconsoled.pid \ + ${XENCONSOLED_OPTS} + eend $* +} + +stop() { + ebegin "Stoping xenconsoled daemon" + start-stop-daemon --stop --exec /usr/sbin/xenconsoled \ + --pidfile /var/run/xenconsoled.pid + eend $* +} + diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xend.initd-r1 b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xend.initd-r1 new file mode 100644 index 0000000000..d1e49b0bed --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xend.initd-r1 @@ -0,0 +1,71 @@ +#!/sbin/runscript +# Copyright 1999-2005 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/app-emulation/xen-tools/files/xend.initd-r1,v 1.1 2009/09/01 09:56:36 wschlich Exp $ + +opts="start stop status restart" + +depend() { + need net + before xendomains sshd ntp-client ntpd nfs nfsmount rsyncd portmap dhcp +} + +await_daemons_up() { + for ((i=0; i<5; i++)); do + /usr/sbin/xend status && return 0 + sleep 1 + done + return 1 +} + +is_privileged_domain() { + grep -qsE '^control_d$' /proc/xen/capabilities + return $? +} + +start() { + if is_privileged_domain ; then + ebegin "Starting Xen control daemon" + /usr/sbin/xend start && await_daemons_up + eend $? + else + eerror "Can't start xend - this is not a privileged domain." + return 1 + fi +} + +stop() { + if [ "$(xm list 2>/dev/null | wc -l)" -gt 2 ]; then + ebegin "Stopping all Xen domains" + /usr/sbin/xm shutdown --all --wait >/dev/null + eend $? + fi + + ebegin "Stopping Xen control daemon" + /usr/sbin/xend stop + eend $? + + #ebegin "Stopping xenconsoled" + #kill $(/dev/null + eend $? + fi + + ebegin "Stopping Xen control daemon" + /usr/sbin/xend stop + eend $? +} + +status() { + is_privileged_domain && /usr/sbin/xend status +} diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xendomains-screen.confd b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xendomains-screen.confd new file mode 100644 index 0000000000..a180c13d85 --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xendomains-screen.confd @@ -0,0 +1,25 @@ +# /etc/conf.d/xendomains + +# Directory of domains to boot. AUTODIR should contain one or more symlinks +# to domain config files in /etc/xen +AUTODIR=/etc/xen/auto + +# Send shutdown commands to all domains in parallel instead of waiting for +# each to shutdown individually +PARALLEL_SHUTDOWN=yes + +# When SCREEN="yes", domains in AUTODIR have their consoles connected to a +# screen session named SCREEN_NAME, with output logged to individual files +# named after each domain and written to /var/log/xen-consoles/ . These files +# are rotated (using app-admin/logrotate) every time xendomains is started. + +SCREEN="yes" +SCREEN_NAME="xen" + +# Number of seconds between writes to screen's logfiles. +# +# Lower values mean more disk activity and hence a possible performance +# impact, but higher values mean a greater chance of loosing some output +# in the event of a crash. + +SCREEN_LOG_INTERVAL="1" diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xendomains.confd b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xendomains.confd new file mode 100644 index 0000000000..90c1f5256c --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xendomains.confd @@ -0,0 +1,9 @@ +# /etc/conf.d/xendomains + +# Directory of domains to boot. AUTODIR should contain one or more symlinks +# to domain config files in /etc/xen +AUTODIR=/etc/xen/auto + +# Send shutdown commands to all domains in parallel instead of waiting for +# each to shutdown individually +PARALLEL_SHUTDOWN=yes diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xendomains.initd-r1 b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xendomains.initd-r1 new file mode 100755 index 0000000000..248cf6cd2a --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xendomains.initd-r1 @@ -0,0 +1,117 @@ +#!/sbin/runscript +# Copyright 1999-2013 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/app-emulation/xen-tools/files/xendomains.initd-r1,v 1.3 2013/02/24 10:39:11 idella4 Exp $ + +extra_commands="status" + +depend() { + need xend + after dhcp +} + +get_domname() { + local name_from_file=$(sed -rn 's/^name\W*=\W*\"?([[:alnum:]_\.-]+)\"?\W*;?/\1/p' "${1}" | tail -n 1) + + if [[ -z ${name_from_file} ]] ; then + basename "${1}" + else + echo ${name_from_file} + fi +} + +is_running() { + /usr/sbin/xm list "${1}" >/dev/null 2>&1 +} + +using_screen() { + [[ "${SCREEN}" == "yes" || "${SCREEN}" == "YES" ]] +} + +set_screen_cmd() { + screen_cmd="screen -c ${SCREENRC:-/dev/null} -q -r ${SCREEN_NAME:=xen} -X" +} + +start() { + set_screen_cmd + + einfo "Starting Xen domains from ${AUTODIR:=/etc/xen/auto}" + if using_screen ; then + ebegin "Creating screen session to hold domain consoles" + ( screen -c ${SCREENRC:-/dev/null} -d -m -S ${SCREEN_NAME} -t dom0 && sleep 3 \ + && ${screen_cmd} zombie dr \ + && logrotate -f /etc/xen/xen-consoles.logrotate \ + && ${screen_cmd} logfile /var/log/xen-consoles/%t.log \ + && ${screen_cmd} logfile flush ${SCREEN_LOG_INTERVAL:-1} \ + && ${screen_cmd} log on \ + && ${screen_cmd} deflog on ) >/dev/null + if [[ $? -ne 0 ]] ; then + eend 1 + return 1 + else + eend + fi + fi + # Create all domains with config files in AUTODIR. + for dom in $(ls "${AUTODIR:=/etc/xen/auto}/"* 2>/dev/null | sort); do + name=$(get_domname ${dom}) + if ! is_running ${name} ; then + ebegin " Starting domain ${name}" + if using_screen ; then + ${screen_cmd} screen -t ${name} xm create ${dom} -c + else + xm create --quiet ${dom} + fi + eend $? + else + einfo " Not starting domain ${name} - already running" + fi + done +} + +stop() { + set_screen_cmd + + einfo "Shutting down Xen domains from ${AUTODIR:=/etc/xen/auto}" + # Stop all domains with config files in AUTODIR. + DOMAINS="$(ls "${AUTODIR:=/etc/xen/auto}/"* 2>/dev/null | sort -r)" + + if [[ "$PARALLEL_SHUTDOWN" = "yes" ]] ; then + for dom in $DOMAINS ; do + name=$(get_domname ${dom}) + if is_running ${name} ; then + ebegin " Asking domain ${name} to shutdown in the background..." + xm shutdown --wait ${name} >/dev/null & + else + einfo " Not stopping domain ${name} - not running" + fi + done + einfo " Waiting for shutdown of domains that are still running" + wait + eend $? + else + for dom in $DOMAINS ; do + name=$(get_domname ${dom}) + if is_running ${name} ; then + ebegin " Waiting for domain ${name} to shutdown" + xm shutdown --wait ${name} >/dev/null + eend $? + else + einfo " Not stopping domain ${name} - not running" + fi + done + fi + if using_screen ; then + if ${screen_cmd} sleep 0 >/dev/null 2>&1 ; then + ebegin "Closing screen session ${SCREEN_NAME}" + ${screen_cmd} quit + eend $? + else + eend 0 + fi + fi +} + +status() { + /usr/sbin/xm list +} diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xendomains.initd-r2 b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xendomains.initd-r2 new file mode 100644 index 0000000000..e225b76ba5 --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xendomains.initd-r2 @@ -0,0 +1,118 @@ +#!/sbin/runscript +# Copyright 1999-2013 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/app-emulation/xen-tools/files/xendomains.initd-r2,v 1.6 2013/02/24 10:39:11 idella4 Exp $ + +extra_commands="status" + +depend() { + need xenstored + after dhcp xend xenconsoled +} + +get_domname() { + local name_from_file=$(sed -rn 's/^name\W*=\W*\"?([[:alnum:]_\.-]+)\"?\W*;?/\1/p' "${1}" | tail -n 1) + + if [[ -z ${name_from_file} ]] ; then + basename "${1}" + else + echo ${name_from_file} + fi +} + +is_running() { + /usr/sbin/xl list "${1}" >/dev/null 2>&1 +} + +using_screen() { + [[ "${SCREEN}" == "yes" || "${SCREEN}" == "YES" ]] +} + +set_screen_cmd() { + screen_cmd="screen -c ${SCREENRC:-/dev/null} -q -r ${SCREEN_NAME:=xen} -X" +} + +start() { + set_screen_cmd + + einfo "Starting Xen domains from ${AUTODIR:=/etc/xen/auto}" + if using_screen ; then + ebegin "Creating screen session to hold domain consoles" + ( screen -c ${SCREENRC:-/dev/null} -d -m -S ${SCREEN_NAME} -t dom0 \ + && sleep 5 \ + && ${screen_cmd} zombie dr \ + && logrotate -f /etc/xen/xen-consoles.logrotate \ + && ${screen_cmd} logfile /var/log/xen-consoles/%t.log \ + && ${screen_cmd} logfile flush ${SCREEN_LOG_INTERVAL:-1} \ + && ${screen_cmd} log on \ + && ${screen_cmd} deflog on ) >/dev/null + if [[ $? -ne 0 ]] ; then + eend 1 + return 1 + else + eend + fi + fi + # Create all domains with config files in AUTODIR. + for dom in $(ls "${AUTODIR:=/etc/xen/auto}/"* 2>/dev/null | sort); do + name=$(get_domname ${dom}) + if ! is_running ${name} ; then + ebegin " Starting domain ${name}" + if using_screen ; then + ${screen_cmd} screen -t ${name} xl create ${dom} -c + else + xl create --quiet ${dom} + fi + eend $? + else + einfo " Not starting domain ${name} - already running" + fi + done +} + +stop() { + set_screen_cmd + + einfo "Shutting down Xen domains from ${AUTODIR:=/etc/xen/auto}" + # Stop all domains with config files in AUTODIR. + DOMAINS="$(ls "${AUTODIR:=/etc/xen/auto}/"* 2>/dev/null | sort -r)" + + if [[ "$PARALLEL_SHUTDOWN" = "yes" ]] ; then + for dom in $DOMAINS ; do + name=$(get_domname ${dom}) + if is_running ${name} ; then + ebegin " Asking domain ${name} to shutdown in the background..." + xl shutdown -w ${name} >/dev/null & + else + einfo " Not stopping domain ${name} - not running" + fi + done + einfo " Waiting for shutdown of domains that are still running" + wait + eend $? + else + for dom in $DOMAINS ; do + name=$(get_domname ${dom}) + if is_running ${name} ; then + ebegin " Waiting for domain ${name} to shutdown" + xl shutdown -w ${name} >/dev/null + eend $? + else + einfo " Not stopping domain ${name} - not running" + fi + done + fi + if using_screen ; then + if ${screen_cmd} sleep 0 >/dev/null 2>&1 ; then + ebegin "Closing screen session ${SCREEN_NAME}" + ${screen_cmd} quit + eend $? + else + eend 0 + fi + fi +} + +status() { + /usr/sbin/xl list +} diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xenstored.confd b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xenstored.confd new file mode 100644 index 0000000000..31b9293aa3 --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xenstored.confd @@ -0,0 +1,2 @@ +# /etc/conf.d/xenstored +XENSTORED_OPTS="" diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xenstored.initd b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xenstored.initd new file mode 100755 index 0000000000..fa31efd7c8 --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/files/xenstored.initd @@ -0,0 +1,28 @@ +#!/sbin/runscript +# Copyright 1999-2013 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/app-emulation/xen-tools/files/xenstored.initd,v 1.3 2013/03/16 16:46:57 idella4 Exp $ + +depend() { + before xendomains xend sshd ntp-client ntpd nfs nfsmount rsyncd portmap dhcp +} + +start() { + ebegin "Starting xenstored daemon" + start-stop-daemon --start --exec /usr/sbin/xenstored \ + --pidfile /var/run/xenstored.pid \ + -- --pid-file=/var/run/xenstored.pid \ + $XENSTORED_OPTS + sleep 15 + einfo "Setting domain0 name record" + /usr/bin/xenstore-write "/local/domain/0/name" "Domain-0" + eend $* +} + +stop() { + ebegin "Stopping xenstored daemon" + start-stop-daemon --stop --exec /usr/sbin/xenstored \ + --pidfile /var/run/xenstored.pid + eend $? +} + diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/metadata.xml b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/metadata.xml new file mode 100644 index 0000000000..581b2b88ec --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/metadata.xml @@ -0,0 +1,19 @@ + + + + xen + + idella4@gentoo.org + Ian 'idella4' Delaney + + + Build the C libxenapi bindings + Enable the Flask XSM module from NSA + Enable support for hardware based virtualization (VT-x,AMD-v) + Enable IOEMU support via the use of qemu-dm + Install the pygrub boot loader + Enable support for running domain U console in an app-misc/screen session + Enable support the xend and xm to manage xen + Enable support for the ocaml language + + diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/xen-tools-4.2.0-r3.ebuild b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/xen-tools-4.2.0-r3.ebuild new file mode 100644 index 0000000000..e50ebf1c4a --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/xen-tools-4.2.0-r3.ebuild @@ -0,0 +1,345 @@ +# Copyright 1999-2013 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/app-emulation/xen-tools/xen-tools-4.2.0-r3.ebuild,v 1.10 2013/03/05 18:05:35 idella4 Exp $ + +EAPI=5 + +PYTHON_COMPAT=( python{2_6,2_7} ) +PYTHON_REQ_USE='xml,threads' + +IPXE_TARBALL_URL="http://dev.gentoo.org/~idella4/tarballs/ipxe.tar.gz" +XEN_SEABIOS_URL="http://dev.gentoo.org/~idella4/tarballs/seabios-0-20121121.tar.bz2" + +if [[ $PV == *9999 ]]; then + KEYWORDS="" + REPO="xen-unstable.hg" + EHG_REPO_URI="http://xenbits.xensource.com/${REPO}" + S="${WORKDIR}/${REPO}" + live_eclass="mercurial" +else + KEYWORDS="amd64 x86" + SRC_URI="http://bits.xensource.com/oss-xen/release/${PV}/xen-${PV}.tar.gz + $IPXE_TARBALL_URL + $XEN_SEABIOS_URL" + S="${WORKDIR}/xen-${PV}" +fi + +inherit flag-o-matic eutils multilib python-single-r1 toolchain-funcs udev ${live_eclass} + +DESCRIPTION="Xend daemon and tools" +HOMEPAGE="http://xen.org/" +DOCS=( README docs/README.xen-bugtool ) + +LICENSE="GPL-2" +SLOT="0" +# TODO soon; ocaml up for a potential name change +IUSE="api custom-cflags debug doc flask hvm ocaml qemu pygrub screen static-libs xend" + +REQUIRED_USE="hvm? ( qemu )" + +CDEPEND="dev-libs/yajl + dev-python/lxml[${PYTHON_USEDEP}] + dev-python/pypam[${PYTHON_USEDEP}] + sys-libs/zlib + sys-power/iasl + ocaml? ( dev-ml/findlib ) + hvm? ( media-libs/libsdl ) + ${PYTHON_DEPS} + api? ( dev-libs/libxml2 + net-misc/curl ) + ${PYTHON_DEPS} + pygrub? ( ${PYTHON_DEPS//${PYTHON_REQ_USE}/ncurses} )" +DEPEND="${CDEPEND} + sys-devel/bin86 + sys-devel/dev86 + dev-lang/perl + app-misc/pax-utils + doc? ( + app-doc/doxygen + dev-tex/latex2html[png,gif] + media-gfx/transfig + media-gfx/graphviz + dev-tex/xcolor + dev-texlive/texlive-latexextra + virtual/latex-base + dev-tex/latexmk + dev-texlive/texlive-latex + dev-texlive/texlive-pictures + dev-texlive/texlive-latexrecommended + ) + hvm? ( x11-proto/xproto + )" +RDEPEND="${CDEPEND} + sys-apps/iproute2 + net-misc/bridge-utils + ocaml? ( >=dev-lang/ocaml-3.12.0 ) + screen? ( + app-misc/screen + app-admin/logrotate + ) + virtual/udev" + +# hvmloader is used to bootstrap a fully virtualized kernel +# Approved by QA team in bug #144032 +QA_WX_LOAD="usr/lib/xen/boot/hvmloader" + +RESTRICT="test" + +pkg_setup() { + python-single-r1_pkg_setup + export "CONFIG_LOMOUNT=y" + + if has_version dev-libs/libgcrypt; then + export "CONFIG_GCRYPT=y" + fi + + if use qemu; then + export "CONFIG_IOEMU=y" + else + export "CONFIG_IOEMU=n" + fi + + if ! use x86 && ! has x86 $(get_all_abis) && use hvm; then + eerror "HVM (VT-x and AMD-v) cannot be built on this system. An x86 or" + eerror "an amd64 multilib profile is required. Remove the hvm use flag" + eerror "to build xen-tools on your current profile." + die "USE=hvm is unsupported on this system." + fi + + if [[ -z ${XEN_TARGET_ARCH} ]] ; then + if use x86 && use amd64; then + die "Confusion! Both x86 and amd64 are set in your use flags!" + elif use x86; then + export XEN_TARGET_ARCH="x86_32" + elif use amd64 ; then + export XEN_TARGET_ARCH="x86_64" + else + die "Unsupported architecture!" + fi + fi + + use api && export "LIBXENAPI_BINDINGS=y" + use flask && export "FLASK_ENABLE=y" +} + +src_prepare() { + # Drop .config, fixes to gcc-4.6 + epatch "${FILESDIR}"/${PN/-tools/}-4-fix_dotconfig-gcc.patch + + # Xend + if ! use xend; then + sed -e 's:xm xen-bugtool xen-python-path xend:xen-bugtool xen-python-path:' \ + -i tools/misc/Makefile || die "Disabling xend failed" + sed -e 's:^XEND_INITD:#XEND_INITD:' \ + -i tools/examples/Makefile || die "Disabling xend failed" + fi + + # if the user *really* wants to use their own custom-cflags, let them + if use custom-cflags; then + einfo "User wants their own CFLAGS - removing defaults" + + # try and remove all the default cflags + find "${S}" \( -name Makefile -o -name Rules.mk -o -name Config.mk \) \ + -exec sed \ + -e 's/CFLAGS\(.*\)=\(.*\)-O3\(.*\)/CFLAGS\1=\2\3/' \ + -e 's/CFLAGS\(.*\)=\(.*\)-march=i686\(.*\)/CFLAGS\1=\2\3/' \ + -e 's/CFLAGS\(.*\)=\(.*\)-fomit-frame-pointer\(.*\)/CFLAGS\1=\2\3/' \ + -e 's/CFLAGS\(.*\)=\(.*\)-g3*\s\(.*\)/CFLAGS\1=\2 \3/' \ + -e 's/CFLAGS\(.*\)=\(.*\)-O2\(.*\)/CFLAGS\1=\2\3/' \ + -i {} + || die "failed to re-set custom-cflags" + fi + + if ! use pygrub; then + sed -e '/^SUBDIRS-$(PYTHON_TOOLS) += pygrub$/d' -i tools/Makefile || die + fi + + # Disable hvm support on systems that don't support x86_32 binaries. + if ! use hvm; then + sed -e '/^CONFIG_IOEMU := y$/d' -i config/*.mk || die + sed -e '/SUBDIRS-$(CONFIG_X86) += firmware/d' -i tools/Makefile || die + fi + + # Don't bother with qemu, only needed for fully virtualised guests + if ! use qemu; then + sed -e "/^CONFIG_IOEMU := y$/d" -i config/*.mk || die + sed -e "s:install-tools\: tools/ioemu-dir:install-tools\: :g" -i Makefile || die + fi + + # Fix texi2html build error with new texi2html + epatch "${FILESDIR}"/${PN}-4-docfix.patch + + # Fix network broadcast on bridged networks + epatch "${FILESDIR}/${PN}-3.4.0-network-bridge-broadcast.patch" + + # Prevent the downloading of ipxe, seabios + epatch "${FILESDIR}"/${P/-tools/}-anti-download.patch + cp "${DISTDIR}"/ipxe.tar.gz tools/firmware/etherboot/ || die + mv ../seabios-dir-remote tools/firmware/ || die + pushd tools/firmware/ > /dev/null + ln -s seabios-dir-remote seabios-dir || die + popd > /dev/null + + # Fix bridge by idella4, bug #362575 + epatch "${FILESDIR}/${PN}-4.1.1-bridge.patch" + + # Don't build ipxe with pie on hardened, Bug #360805 + if gcc-specs-pie; then + epatch "${FILESDIR}"/ipxe-nopie.patch + fi + + # Prevent double stripping of files at install + epatch "${FILESDIR}"/${P/-tools/}-nostrip.patch + + epatch "${FILESDIR}"/fix-map-file-ld-errors.patch + epatch "${FILESDIR}"/disable-tests.patch + + #Sec patches + epatch "${FILESDIR}"/xen-4-CVE-2012-4544-XSA-25.patch \ + "${FILESDIR}"/xen-4-CVE-2012-6075-XSA-41.patch +} + +src_compile() { + export VARTEXFONTS="${T}/fonts" + local myopt + use debug && myopt="${myopt} debug=y" + + use custom-cflags || unset CFLAGS + if test-flag-CC -fno-strict-overflow; then + append-flags -fno-strict-overflow + fi + + unset LDFLAGS + unset CFLAGS + emake CC="$(tc-getCC)" LD="$(tc-getLD)" -C tools ${myopt} + + use doc && emake -C docs txt html + emake -C docs man-pages +} + +src_install() { + # Override auto-detection in the build system, bug #382573 + export INITD_DIR=/tmp/init.d + export CONFIG_LEAF_DIR=../tmp/default + + # Let the build system compile installed Python modules. + local PYTHONDONTWRITEBYTECODE + export PYTHONDONTWRITEBYTECODE + + emake DESTDIR="${D}" DOCDIR="/usr/share/doc/${PF}" \ + install-tools + + # Fix the remaining Python shebangs. + python_fix_shebang "${D}" + + # Remove RedHat-specific stuff + rm -rf "${D}"tmp || die + + # uncomment lines in xl.conf + sed -e 's:^#autoballoon=1:autoballoon=1:' \ + -e 's:^#lockfile="/var/lock/xl":lockfile="/var/lock/xl":' \ + -e 's:^#vifscript="vif-bridge":vifscript="vif-bridge":' \ + -i tools/examples/xl.conf || die + + if use doc; then + emake DESTDIR="${D}" DOCDIR="/usr/share/doc/${PF}" install-docs + + dohtml -r docs/html/ + docinto pdf + dodoc ${DOCS[@]} + [ -d "${D}"/usr/share/doc/xen ] && mv "${ED}"/usr/share/doc/xen/* "${ED}"/usr/share/doc/${PF}/html + fi + + rm -rf "${D}"/usr/share/doc/xen/ + doman docs/man?/* + + if use xend; then + newinitd "${FILESDIR}"/xend.initd-r2 xend || die "Couldn't install xen.initd" + fi + newconfd "${FILESDIR}"/xendomains.confd xendomains + newconfd "${FILESDIR}"/xenstored.confd xenstored + newconfd "${FILESDIR}"/xenconsoled.confd xenconsoled + newinitd "${FILESDIR}"/xendomains.initd-r2 xendomains + newinitd "${FILESDIR}"/xenstored.initd xenstored + newinitd "${FILESDIR}"/xenconsoled.initd xenconsoled + + if use screen; then + cat "${FILESDIR}"/xendomains-screen.confd >> "${D}"/etc/conf.d/xendomains || die + cp "${FILESDIR}"/xen-consoles.logrotate "${D}"/etc/xen/ || die + keepdir /var/log/xen-consoles + fi + + # Set dirs for qemu files,; Bug #458818 + if use qemu; then + if use x86; then + dodir /usr/lib/xen/bin + elif use amd64; then + mv "${D}"usr/lib/xen/bin/qemu* "${D}"usr/$(get_libdir)/xen/bin/ || die + fi + fi + + # For -static-libs wrt Bug 384355 + if ! use static-libs; then + rm -f "${D}"usr/$(get_libdir)/*.a "${ED}"usr/$(get_libdir)/ocaml/*/*.a + fi + + # xend expects these to exist + keepdir /var/run/xenstored /var/lib/xenstored /var/xen/dump /var/lib/xen /var/log/xen + + # for xendomains + keepdir /etc/xen/auto + + # Temp QA workaround + dodir "$(udev_get_udevdir)" + mv "${D}"/etc/udev/* "${ED}/$(udev_get_udevdir)" + rm -rf "${D}"/etc/udev + + # Remove files failing QA AFTER emake installs them, avoiding seeking absent files + find "${D}" \( -name openbios-sparc32 -o -name openbios-sparc64 \ + -o -name openbios-ppc -o -name palcode-clipper \) -delete || die +} + +pkg_postinst() { + elog "Official Xen Guide and the unoffical wiki page:" + elog " http://www.gentoo.org/doc/en/xen-guide.xml" + elog " http://gentoo-wiki.com/HOWTO_Xen_and_Gentoo" + + if [[ "$(scanelf -s __guard -q "${PYTHON}")" ]] ; then + echo + ewarn "xend may not work when python is built with stack smashing protection (ssp)." + ewarn "If 'xm create' fails with '', see bug #141866" + ewarn "This problem may be resolved as of Xen 3.0.4, if not post in the bug." + fi + + # TODO: we need to have the current Python slot here. + if ! has_version "dev-lang/python[ncurses]"; then + echo + ewarn "NB: Your dev-lang/python is built without USE=ncurses." + ewarn "Please rebuild python with USE=ncurses to make use of xenmon.py." + fi + + if has_version "sys-apps/iproute2[minimal]"; then + echo + ewarn "Your sys-apps/iproute2 is built with USE=minimal. Networking" + ewarn "will not work until you rebuild iproute2 without USE=minimal." + fi + + if ! use hvm; then + echo + elog "HVM (VT-x and AMD-V) support has been disabled. If you need hvm" + elog "support enable the hvm use flag." + elog "An x86 or amd64 multilib system is required to build HVM support." + echo + elog "The qemu use flag has been removed and replaced with hvm." + fi + + if use xend; then + echo + elog "xend capability has been enabled and installed" + fi + + if grep -qsF XENSV= "${ROOT}/etc/conf.d/xend"; then + echo + elog "xensv is broken upstream (Gentoo bug #142011)." + elog "Please remove '${ROOT%/}/etc/conf.d/xend', as it is no longer needed." + fi +} diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/xen-tools-4.2.1-r1.ebuild b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/xen-tools-4.2.1-r1.ebuild new file mode 100644 index 0000000000..7a45893082 --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/xen-tools-4.2.1-r1.ebuild @@ -0,0 +1,340 @@ +# Copyright 1999-2013 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/app-emulation/xen-tools/xen-tools-4.2.1-r1.ebuild,v 1.8 2013/02/22 10:36:08 idella4 Exp $ + +EAPI=5 + +PYTHON_COMPAT=( python{2_6,2_7} ) +PYTHON_REQ_USE='xml,threads' + +IPXE_TARBALL_URL="http://dev.gentoo.org/~idella4/tarballs/ipxe.tar.gz" +XEN_SEABIOS_URL="http://dev.gentoo.org/~idella4/tarballs/seabios-0-20121121.tar.bz2" + +if [[ $PV == *9999 ]]; then + KEYWORDS="" + REPO="xen-unstable.hg" + EHG_REPO_URI="http://xenbits.xensource.com/${REPO}" + S="${WORKDIR}/${REPO}" + live_eclass="mercurial" +else + KEYWORDS="~amd64 ~x86" + SRC_URI="http://bits.xensource.com/oss-xen/release/${PV}/xen-${PV}.tar.gz + $IPXE_TARBALL_URL + $XEN_SEABIOS_URL" + S="${WORKDIR}/xen-${PV}" +fi + +inherit flag-o-matic eutils multilib python-single-r1 toolchain-funcs udev ${live_eclass} + +DESCRIPTION="Xend daemon and tools" +HOMEPAGE="http://xen.org/" +DOCS=( README docs/README.xen-bugtool ) + +LICENSE="GPL-2" +SLOT="0" +IUSE="api custom-cflags debug doc flask hvm qemu ocaml pygrub screen static-libs xend" + +REQUIRED_USE="hvm? ( qemu )" + +CDEPEND="dev-libs/yajl + dev-python/lxml[${PYTHON_USEDEP}] + dev-python/pypam[${PYTHON_USEDEP}] + dev-python/pyxml[${PYTHON_USEDEP}] + sys-libs/zlib + sys-power/iasl + ocaml? ( dev-ml/findlib ) + hvm? ( media-libs/libsdl ) + ${PYTHON_DEPS} + api? ( dev-libs/libxml2 + net-misc/curl ) + ${PYTHON_DEPS} + pygrub? ( ${PYTHON_DEPS//${PYTHON_REQ_USE}/ncurses} )" +DEPEND="${CDEPEND} + sys-devel/bin86 + sys-devel/dev86 + dev-lang/perl + app-misc/pax-utils + doc? ( + app-doc/doxygen + dev-tex/latex2html[png,gif] + media-gfx/transfig + media-gfx/graphviz + dev-tex/xcolor + dev-texlive/texlive-latexextra + virtual/latex-base + dev-tex/latexmk + dev-texlive/texlive-latex + dev-texlive/texlive-pictures + dev-texlive/texlive-latexrecommended + ) + hvm? ( x11-proto/xproto + )" +RDEPEND="${CDEPEND} + sys-apps/iproute2 + net-misc/bridge-utils + ocaml? ( >=dev-lang/ocaml-3.12.0 ) + screen? ( + app-misc/screen + app-admin/logrotate + ) + virtual/udev" + +# hvmloader is used to bootstrap a fully virtualized kernel +# Approved by QA team in bug #144032 +QA_WX_LOAD="usr/lib/xen/boot/hvmloader" + +RESTRICT="test" + +pkg_setup() { + python-single-r1_pkg_setup + export "CONFIG_LOMOUNT=y" + + if has_version dev-libs/libgcrypt; then + export "CONFIG_GCRYPT=y" + fi + + if use qemu; then + export "CONFIG_IOEMU=y" + else + export "CONFIG_IOEMU=n" + fi + + if ! use x86 && ! has x86 $(get_all_abis) && use hvm; then + eerror "HVM (VT-x and AMD-v) cannot be built on this system. An x86 or" + eerror "an amd64 multilib profile is required. Remove the hvm use flag" + eerror "to build xen-tools on your current profile." + die "USE=hvm is unsupported on this system." + fi + + if [[ -z ${XEN_TARGET_ARCH} ]] ; then + if use x86 && use amd64; then + die "Confusion! Both x86 and amd64 are set in your use flags!" + elif use x86; then + export XEN_TARGET_ARCH="x86_32" + elif use amd64 ; then + export XEN_TARGET_ARCH="x86_64" + else + die "Unsupported architecture!" + fi + fi + + use api && export "LIBXENAPI_BINDINGS=y" + use flask && export "FLASK_ENABLE=y" +} + +src_prepare() { + # Drop .config, fixes to gcc-4.6 + epatch "${FILESDIR}"/${PN/-tools/}-4-fix_dotconfig-gcc.patch + + # Xend + if ! use xend; then + sed -e 's:xm xen-bugtool xen-python-path xend:xen-bugtool xen-python-path:' \ + -i tools/misc/Makefile || die "Disabling xend failed" + sed -e 's:^XEND_INITD:#XEND_INITD:' \ + -i tools/examples/Makefile || die "Disabling xend failed" + fi + + # if the user *really* wants to use their own custom-cflags, let them + if use custom-cflags; then + einfo "User wants their own CFLAGS - removing defaults" + + # try and remove all the default cflags + find "${S}" \( -name Makefile -o -name Rules.mk -o -name Config.mk \) \ + -exec sed \ + -e 's/CFLAGS\(.*\)=\(.*\)-O3\(.*\)/CFLAGS\1=\2\3/' \ + -e 's/CFLAGS\(.*\)=\(.*\)-march=i686\(.*\)/CFLAGS\1=\2\3/' \ + -e 's/CFLAGS\(.*\)=\(.*\)-fomit-frame-pointer\(.*\)/CFLAGS\1=\2\3/' \ + -e 's/CFLAGS\(.*\)=\(.*\)-g3*\s\(.*\)/CFLAGS\1=\2 \3/' \ + -e 's/CFLAGS\(.*\)=\(.*\)-O2\(.*\)/CFLAGS\1=\2\3/' \ + -i {} + || die "failed to re-set custom-cflags" + fi + + if ! use pygrub; then + sed -e '/^SUBDIRS-$(PYTHON_TOOLS) += pygrub$/d' -i tools/Makefile || die + fi + + # Disable hvm support on systems that don't support x86_32 binaries. + if ! use hvm; then + sed -e '/^CONFIG_IOEMU := y$/d' -i config/*.mk || die + sed -e '/SUBDIRS-$(CONFIG_X86) += firmware/d' -i tools/Makefile || die + fi + + # Don't bother with qemu, only needed for fully virtualised guests + if ! use qemu; then + sed -e "/^CONFIG_IOEMU := y$/d" -i config/*.mk || die + sed -e "s:install-tools\: tools/ioemu-dir:install-tools\: :g" -i Makefile || die + fi + + # Fix texi2html build error with new texi2html + epatch "${FILESDIR}"/${PN}-4-docfix.patch + + # Fix network broadcast on bridged networks + epatch "${FILESDIR}/${PN}-3.4.0-network-bridge-broadcast.patch" + + # Prevent the downloading of ipxe, seabios + epatch "${FILESDIR}"/${PN/-tools/}-4.2.0-anti-download.patch + cp "${DISTDIR}"/ipxe.tar.gz tools/firmware/etherboot/ || die + mv ../seabios-dir-remote tools/firmware/ || die + pushd tools/firmware/ > /dev/null + ln -s seabios-dir-remote seabios-dir || die + popd > /dev/null + + # Fix bridge by idella4, bug #362575 + epatch "${FILESDIR}/${PN}-4.1.1-bridge.patch" + + # Don't build ipxe with pie on hardened, Bug #360805 +# if gcc-specs-pie; then +# epatch "${FILESDIR}"/ipxe-nopie.patch +# fi + + # Prevent double stripping of files at install + epatch "${FILESDIR}"/${PN/-tools/}-4.2.0-nostrip.patch + + # fix jobserver in Makefile + epatch "${FILESDIR}"/${PN/-tools/}-4.2.0-jserver.patch + + #Sec patch, currently valid + epatch "${FILESDIR}"/xen-4-CVE-2012-6075-XSA-41.patch +} + +src_compile() { + export VARTEXFONTS="${T}/fonts" + local myopt + use debug && myopt="${myopt} debug=y" + + use custom-cflags || unset CFLAGS + if test-flag-CC -fno-strict-overflow; then + append-flags -fno-strict-overflow + fi + + unset LDFLAGS + unset CFLAGS + emake CC="$(tc-getCC)" LD="$(tc-getLD)" -C tools ${myopt} + + use doc && emake -C docs txt html + emake -C docs man-pages +} + +src_install() { + # Override auto-detection in the build system, bug #382573 + export INITD_DIR=/tmp/init.d + export CONFIG_LEAF_DIR=../tmp/default + + # Let the build system compile installed Python modules. + local PYTHONDONTWRITEBYTECODE + export PYTHONDONTWRITEBYTECODE + + emake DESTDIR="${ED}" DOCDIR="/usr/share/doc/${PF}" \ + XEN_PYTHON_NATIVE_INSTALL=y install-tools + + # Fix the remaining Python shebangs. + python_fix_shebang "${ED}" + + # Remove RedHat-specific stuff + rm -rf "${ED}"tmp || die + + # uncomment lines in xl.conf + sed -e 's:^#autoballoon=1:autoballoon=1:' \ + -e 's:^#lockfile="/var/lock/xl":lockfile="/var/lock/xl":' \ + -e 's:^#vifscript="vif-bridge":vifscript="vif-bridge":' \ + -i tools/examples/xl.conf || die + + if use doc; then + emake DESTDIR="${ED}" DOCDIR="/usr/share/doc/${PF}" install-docs + + dohtml -r docs/ + docinto pdf + dodoc ${DOCS[@]} + [ -d "${ED}"/usr/share/doc/xen ] && mv "${ED}"/usr/share/doc/xen/* "${ED}"/usr/share/doc/${PF}/html + fi + + rm -rf "${ED}"/usr/share/doc/xen/ + doman docs/man?/* + + if use xend; then + newinitd "${FILESDIR}"/xend.initd-r2 xend || die "Couldn't install xen.initd" + fi + newconfd "${FILESDIR}"/xendomains.confd xendomains + newconfd "${FILESDIR}"/xenstored.confd xenstored + newconfd "${FILESDIR}"/xenconsoled.confd xenconsoled + newinitd "${FILESDIR}"/xendomains.initd-r2 xendomains + newinitd "${FILESDIR}"/xenstored.initd xenstored + newinitd "${FILESDIR}"/xenconsoled.initd xenconsoled + + if use screen; then + cat "${FILESDIR}"/xendomains-screen.confd >> "${ED}"/etc/conf.d/xendomains || die + cp "${FILESDIR}"/xen-consoles.logrotate "${ED}"/etc/xen/ || die + keepdir /var/log/xen-consoles + fi + + if use qemu; then + mkdir -p "${D}"usr/lib64/xen/bin || die + mv "${D}"usr/lib/xen/bin/qemu* "${D}"usr/lib64/xen/bin/ || die + fi + + # For -static-libs wrt Bug 384355 + if ! use static-libs; then + rm -f "${ED}"usr/$(get_libdir)/*.a "${ED}"usr/$(get_libdir)/ocaml/*/*.a + fi + + # xend expects these to exist + keepdir /var/run/xenstored /var/lib/xenstored /var/xen/dump /var/lib/xen /var/log/xen + + # for xendomains + keepdir /etc/xen/auto + + # Temp QA workaround + dodir "$(udev_get_udevdir)" + mv "${ED}"/etc/udev/* "${ED}/$(udev_get_udevdir)" + rm -rf "${ED}"/etc/udev + + # Remove files failing QA AFTER emake installs them, avoiding seeking absent files + find "${ED}" \( -name openbios-sparc32 -o -name openbios-sparc64 \ + -o -name openbios-ppc -o -name palcode-clipper \) -delete || die +} + +pkg_postinst() { + elog "Official Xen Guide and the unoffical wiki page:" + elog " http://www.gentoo.org/doc/en/xen-guide.xml" + elog " http://gentoo-wiki.com/HOWTO_Xen_and_Gentoo" + + if [[ "$(scanelf -s __guard -q "${PYTHON}")" ]] ; then + echo + ewarn "xend may not work when python is built with stack smashing protection (ssp)." + ewarn "If 'xm create' fails with '', see bug #141866" + ewarn "This problem may be resolved as of Xen 3.0.4, if not post in the bug." + fi + + # TODO: we need to have the current Python slot here. + if ! has_version "dev-lang/python[ncurses]"; then + echo + ewarn "NB: Your dev-lang/python is built without USE=ncurses." + ewarn "Please rebuild python with USE=ncurses to make use of xenmon.py." + fi + + if has_version "sys-apps/iproute2[minimal]"; then + echo + ewarn "Your sys-apps/iproute2 is built with USE=minimal. Networking" + ewarn "will not work until you rebuild iproute2 without USE=minimal." + fi + + if ! use hvm; then + echo + elog "HVM (VT-x and AMD-V) support has been disabled. If you need hvm" + elog "support enable the hvm use flag." + elog "An x86 or amd64 multilib system is required to build HVM support." + echo + elog "The qemu use flag has been removed and replaced with hvm." + fi + + if use xend; then + echo + elog "xend capability has been enabled and installed" + fi + + if grep -qsF XENSV= "${ROOT}/etc/conf.d/xend"; then + echo + elog "xensv is broken upstream (Gentoo bug #142011)." + elog "Please remove '${ROOT%/}/etc/conf.d/xend', as it is no longer needed." + fi +} diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/xen-tools-4.2.1-r2.ebuild b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/xen-tools-4.2.1-r2.ebuild new file mode 100644 index 0000000000..a1c3581c60 --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/xen-tools-4.2.1-r2.ebuild @@ -0,0 +1,347 @@ +# Copyright 1999-2013 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/app-emulation/xen-tools/xen-tools-4.2.1-r2.ebuild,v 1.6 2013/03/05 18:05:35 idella4 Exp $ + +EAPI=5 + +PYTHON_COMPAT=( python{2_6,2_7} ) +PYTHON_REQ_USE='xml,threads' + +IPXE_TARBALL_URL="http://dev.gentoo.org/~idella4/tarballs/ipxe.tar.gz" +XEN_SEABIOS_URL="http://dev.gentoo.org/~idella4/tarballs/seabios-0-20121121.tar.bz2" + +if [[ $PV == *9999 ]]; then + KEYWORDS="" + REPO="xen-unstable.hg" + EHG_REPO_URI="http://xenbits.xensource.com/${REPO}" + S="${WORKDIR}/${REPO}" + live_eclass="mercurial" +else + KEYWORDS="~amd64 ~x86" + SRC_URI="http://bits.xensource.com/oss-xen/release/${PV}/xen-${PV}.tar.gz + $IPXE_TARBALL_URL + $XEN_SEABIOS_URL" + S="${WORKDIR}/xen-${PV}" +fi + +inherit flag-o-matic eutils multilib python-single-r1 toolchain-funcs udev ${live_eclass} + +DESCRIPTION="Xend daemon and tools" +HOMEPAGE="http://xen.org/" +DOCS=( README docs/README.xen-bugtool ) + +LICENSE="GPL-2" +SLOT="0" +IUSE="api custom-cflags debug doc flask hvm qemu ocaml pygrub screen static-libs xend" + +REQUIRED_USE="hvm? ( qemu )" + +CDEPEND=" /dev/null + ln -s seabios-dir-remote seabios-dir || die + popd > /dev/null + + # Fix bridge by idella4, bug #362575 + epatch "${FILESDIR}/${PN}-4.1.1-bridge.patch" + + # Don't build ipxe with pie on hardened, Bug #360805 + if gcc-specs-pie; then + epatch "${FILESDIR}"/ipxe-nopie.patch + fi + + # Prevent double stripping of files at install + epatch "${FILESDIR}"/${PN/-tools/}-4.2.0-nostrip.patch + + # fix jobserver in Makefile + epatch "${FILESDIR}"/${PN/-tools/}-4.2.0-jserver.patch + + #Sec patch, currently valid + epatch "${FILESDIR}"/xen-4-CVE-2012-6075-XSA-41.patch + + if use hvm; then + cp -r "${FILESDIR}"/stubs-32.h xen/tools/include || die "copy of header file failed" + einfo "stubs-32.h added" + fi +} + +src_compile() { + export VARTEXFONTS="${T}/fonts" + local myopt + use debug && myopt="${myopt} debug=y" + + use custom-cflags || unset CFLAGS + if test-flag-CC -fno-strict-overflow; then + append-flags -fno-strict-overflow + fi + + unset LDFLAGS + unset CFLAGS + emake CC="$(tc-getCC)" LD="$(tc-getLD)" -C tools ${myopt} + + use doc && emake -C docs txt html + emake -C docs man-pages +} + +src_install() { + # Override auto-detection in the build system, bug #382573 + export INITD_DIR=/tmp/init.d + export CONFIG_LEAF_DIR=../tmp/default + + # Let the build system compile installed Python modules. + local PYTHONDONTWRITEBYTECODE + export PYTHONDONTWRITEBYTECODE + + emake DESTDIR="${D}" DOCDIR="/usr/share/doc/${PF}" install-tools + + # Fix the remaining Python shebangs. + python_fix_shebang "${D}" + + # Remove RedHat-specific stuff + rm -rf "${D}"tmp || die + + # uncomment lines in xl.conf + sed -e 's:^#autoballoon=1:autoballoon=1:' \ + -e 's:^#lockfile="/var/lock/xl":lockfile="/var/lock/xl":' \ + -e 's:^#vifscript="vif-bridge":vifscript="vif-bridge":' \ + -i tools/examples/xl.conf || die + + if use doc; then + emake DESTDIR="${D}" DOCDIR="/usr/share/doc/${PF}" install-docs + + dohtml -r docs/ + docinto pdf + dodoc ${DOCS[@]} + [ -d "${D}"/usr/share/doc/xen ] && mv "${D}"/usr/share/doc/xen/* "${D}"/usr/share/doc/${PF}/html + fi + + rm -rf "${D}"/usr/share/doc/xen/ + doman docs/man?/* + + if use xend; then + newinitd "${FILESDIR}"/xend.initd-r2 xend || die "Couldn't install xen.initd" + fi + newconfd "${FILESDIR}"/xendomains.confd xendomains + newconfd "${FILESDIR}"/xenstored.confd xenstored + newconfd "${FILESDIR}"/xenconsoled.confd xenconsoled + newinitd "${FILESDIR}"/xendomains.initd-r2 xendomains + newinitd "${FILESDIR}"/xenstored.initd xenstored + newinitd "${FILESDIR}"/xenconsoled.initd xenconsoled + + if use screen; then + cat "${FILESDIR}"/xendomains-screen.confd >> "${D}"/etc/conf.d/xendomains || die + cp "${FILESDIR}"/xen-consoles.logrotate "${D}"/etc/xen/ || die + keepdir /var/log/xen-consoles + fi + + # Set dirs for qemu files,; Bug #458818 + if use qemu; then + if use x86; then + dodir /usr/lib/xen/bin + elif use amd64; then + mv "${D}"usr/lib/xen/bin/qemu* "${D}"usr/$(get_libdir)/xen/bin/ || die + fi + fi + + # For -static-libs wrt Bug 384355 + if ! use static-libs; then + rm -f "${D}"usr/$(get_libdir)/*.a "${D}"usr/$(get_libdir)/ocaml/*/*.a + fi + + # xend expects these to exist + keepdir /var/run/xenstored /var/lib/xenstored /var/xen/dump /var/lib/xen /var/log/xen + + # for xendomains + keepdir /etc/xen/auto + + # Temp QA workaround + dodir "$(udev_get_udevdir)" + mv "${D}"/etc/udev/* "${D}/$(udev_get_udevdir)" + rm -rf "${D}"/etc/udev + + # Remove files failing QA AFTER emake installs them, avoiding seeking absent files + find "${D}" \( -name openbios-sparc32 -o -name openbios-sparc64 \ + -o -name openbios-ppc -o -name palcode-clipper \) -delete || die +} + +pkg_postinst() { + elog "Official Xen Guide and the unoffical wiki page:" + elog " http://www.gentoo.org/doc/en/xen-guide.xml" + elog " http://gentoo-wiki.com/HOWTO_Xen_and_Gentoo" + + if [[ "$(scanelf -s __guard -q "${PYTHON}")" ]] ; then + echo + ewarn "xend may not work when python is built with stack smashing protection (ssp)." + ewarn "If 'xm create' fails with '', see bug #141866" + ewarn "This problem may be resolved as of Xen 3.0.4, if not post in the bug." + fi + + # TODO: we need to have the current Python slot here. + if ! has_version "dev-lang/python[ncurses]"; then + echo + ewarn "NB: Your dev-lang/python is built without USE=ncurses." + ewarn "Please rebuild python with USE=ncurses to make use of xenmon.py." + fi + + if has_version "sys-apps/iproute2[minimal]"; then + echo + ewarn "Your sys-apps/iproute2 is built with USE=minimal. Networking" + ewarn "will not work until you rebuild iproute2 without USE=minimal." + fi + + if ! use hvm; then + echo + elog "HVM (VT-x and AMD-V) support has been disabled. If you need hvm" + elog "support enable the hvm use flag." + elog "An x86 or amd64 multilib system is required to build HVM support." + echo + elog "The qemu use flag has been removed and replaced with hvm." + fi + + if use xend; then + echo + elog "xend capability has been enabled and installed" + fi + + if grep -qsF XENSV= "${ROOT}/etc/conf.d/xend"; then + echo + elog "xensv is broken upstream (Gentoo bug #142011)." + elog "Please remove '${ROOT%/}/etc/conf.d/xend', as it is no longer needed." + fi +} diff --git a/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/xen-tools-4.2.1.ebuild b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/xen-tools-4.2.1.ebuild new file mode 100644 index 0000000000..b61b1d2641 --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/app-emulation/xen-tools/xen-tools-4.2.1.ebuild @@ -0,0 +1,347 @@ +# Copyright 1999-2013 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/app-emulation/xen-tools/xen-tools-4.2.1.ebuild,v 1.2 2013/01/24 08:53:49 idella4 Exp $ + +EAPI=5 + +PYTHON_COMPAT=( python{2_6,2_7} ) +PYTHON_REQ_USE='xml,threads' + +IPXE_TARBALL_URL="http://dev.gentoo.org/~idella4/tarballs/ipxe.tar.gz" +XEN_SEABIOS_URL="http://dev.gentoo.org/~idella4/tarballs/seabios-0-20121121.tar.bz2" + +if [[ $PV == *9999 ]]; then + KEYWORDS="" + REPO="xen-unstable.hg" + EHG_REPO_URI="http://xenbits.xensource.com/${REPO}" + S="${WORKDIR}/${REPO}" + live_eclass="mercurial" +else + KEYWORDS="~amd64 ~x86" + SRC_URI="http://bits.xensource.com/oss-xen/release/${PV}/xen-${PV}.tar.gz + $IPXE_TARBALL_URL + $XEN_SEABIOS_URL" + S="${WORKDIR}/xen-${PV}" +fi +inherit flag-o-matic eutils multilib python-single-r1 toolchain-funcs udev ${live_eclass} + +DESCRIPTION="Xend daemon and tools" +HOMEPAGE="http://xen.org/" +DOCS=( README docs/README.xen-bugtool ) + +LICENSE="GPL-2" +SLOT="0" +# TODO soon;ocaml +IUSE="api custom-cflags debug doc flask hvm qemu ocaml pygrub screen static-libs xend" + +REQUIRED_USE="hvm? ( qemu )" + +CDEPEND=" /dev/null + ln -s seabios-dir-remote seabios-dir || die + popd > /dev/null + + # Fix bridge by idella4, bug #362575 + epatch "${FILESDIR}/${PN}-4.1.1-bridge.patch" + + # Don't build ipxe with pie on hardened, Bug #360805 + if gcc-specs-pie; then + epatch "${FILESDIR}/ipxe-nopie.patch" + fi + + # Prevent double stripping of files at install + epatch "${FILESDIR}"/${PN/-tools/}-4.2.0-nostrip.patch + + # fix jobserver in Makefile + epatch "${FILESDIR}"/${PN/-tools/}-4.2.0-jserver.patch +} + +src_compile() { + export VARTEXFONTS="${T}/fonts" + local myopt + use debug && myopt="${myopt} debug=y" + + use custom-cflags || unset CFLAGS + if test-flag-CC -fno-strict-overflow; then + append-flags -fno-strict-overflow + fi + + unset LDFLAGS + unset CFLAGS + emake CC="$(tc-getCC)" LD="$(tc-getLD)" -C tools ${myopt} + + if use doc; then + sh ./docs/check_pkgs || die "package check failed" + emake docs + emake dev-docs + fi + + emake -C docs man-pages +} + +src_install() { + # Override auto-detection in the build system, bug #382573 + export INITD_DIR=/tmp/init.d + export CONFIG_LEAF_DIR=../tmp/default + + # Let the build system compile installed Python modules. + local PYTHONDONTWRITEBYTECODE + export PYTHONDONTWRITEBYTECODE + + emake DESTDIR="${ED}" DOCDIR="/usr/share/doc/${PF}" \ + XEN_PYTHON_NATIVE_INSTALL=y install-tools + + # Fix the remaining Python shebangs. + python_fix_shebang "${ED}" + + # Remove RedHat-specific stuff + rm -rf "${ED}"tmp || die + + # uncomment lines in xl.conf + sed -e 's:^#autoballoon=1:autoballoon=1:' \ + -e 's:^#lockfile="/var/lock/xl":lockfile="/var/lock/xl":' \ + -e 's:^#vifscript="vif-bridge":vifscript="vif-bridge":' \ + -i tools/examples/xl.conf || die + + if use doc; then + emake DESTDIR="${ED}" DOCDIR="/usr/share/doc/${PF}" install-docs + + dohtml -r docs/api/ + docinto pdf + dodoc ${DOCS[@]} + [ -d "${ED}"/usr/share/doc/xen ] && mv "${ED}"/usr/share/doc/xen/* "${ED}"/usr/share/doc/${PF}/html + fi + + rm -rf "${ED}"/usr/share/doc/xen/ + doman docs/man?/* + + if use xend; then + newinitd "${FILESDIR}"/xend.initd-r2 xend || die "Couldn't install xen.initd" + fi + newconfd "${FILESDIR}"/xendomains.confd xendomains + newconfd "${FILESDIR}"/xenstored.confd xenstored + newconfd "${FILESDIR}"/xenconsoled.confd xenconsoled + newinitd "${FILESDIR}"/xendomains.initd-r2 xendomains + newinitd "${FILESDIR}"/xenstored.initd xenstored + newinitd "${FILESDIR}"/xenconsoled.initd xenconsoled + + if use screen; then + cat "${FILESDIR}"/xendomains-screen.confd >> "${ED}"/etc/conf.d/xendomains || die + cp "${FILESDIR}"/xen-consoles.logrotate "${ED}"/etc/xen/ || die + keepdir /var/log/xen-consoles + fi + + # For -static-libs wrt Bug 384355 + if ! use static-libs; then + rm -f "${ED}"usr/$(get_libdir)/*.a "${ED}"usr/$(get_libdir)/ocaml/*/*.a + fi + + # xend expects these to exist + keepdir /var/run/xenstored /var/lib/xenstored /var/xen/dump /var/lib/xen /var/log/xen + + # for xendomains + keepdir /etc/xen/auto + + # Temp QA workaround + dodir "$(udev_get_udevdir)" + mv "${ED}"/etc/udev/* "${ED}/$(udev_get_udevdir)" + rm -rf "${ED}"/etc/udev + + # Remove files failing QA AFTER emake installs them, avoiding seeking absent files + find "${ED}" \( -name openbios-sparc32 -o -name openbios-sparc64 \ + -o -name openbios-ppc -o -name palcode-clipper \) -delete || die +} + +pkg_postinst() { + elog "Official Xen Guide and the unoffical wiki page:" + elog " http://www.gentoo.org/doc/en/xen-guide.xml" + elog " http://gentoo-wiki.com/HOWTO_Xen_and_Gentoo" + + if [[ "$(scanelf -s __guard -q "${PYTHON}")" ]] ; then + echo + ewarn "xend may not work when python is built with stack smashing protection (ssp)." + ewarn "If 'xm create' fails with '', see bug #141866" + ewarn "This problem may be resolved as of Xen 3.0.4, if not post in the bug." + fi + + # TODO: we need to have the current Python slot here. + if ! has_version "dev-lang/python[ncurses]"; then + echo + ewarn "NB: Your dev-lang/python is built without USE=ncurses." + ewarn "Please rebuild python with USE=ncurses to make use of xenmon.py." + fi + + if has_version "sys-apps/iproute2[minimal]"; then + echo + ewarn "Your sys-apps/iproute2 is built with USE=minimal. Networking" + ewarn "will not work until you rebuild iproute2 without USE=minimal." + fi + + if ! use hvm; then + echo + elog "HVM (VT-x and AMD-V) support has been disabled. If you need hvm" + elog "support enable the hvm use flag." + elog "An x86 or amd64 multilib system is required to build HVM support." + echo + elog "The qemu use flag has been removed and replaced with hvm." + fi + + if use xend; then + echo + elog "xend capability has been enabled and installed" + fi + + if grep -qsF XENSV= "${ROOT}/etc/conf.d/xend"; then + echo + elog "xensv is broken upstream (Gentoo bug #142011)." + elog "Please remove '${ROOT%/}/etc/conf.d/xend', as it is no longer needed." + fi +} diff --git a/sdk_container/src/third_party/coreos-overlay/dev-python/pyxenstore/Manifest b/sdk_container/src/third_party/coreos-overlay/dev-python/pyxenstore/Manifest new file mode 100644 index 0000000000..419f1d4377 --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/dev-python/pyxenstore/Manifest @@ -0,0 +1,2 @@ +EBUILD pyxenstore-9999.ebuild 514 SHA256 01166494f2879620f256a2ad42ad040d8950fef394f9f843f2dc628fcf58a8c7 SHA512 a30c64bbb759a2f139e7b69faa06000dcd00701c3329f28de585a773054a45a651906c92d513c1bd723dc1e49e3ef08107a631059bac8bc71542e4d57680251d WHIRLPOOL 1b0b64314a365db9c8c940f5eeb6bd539b1da904946c8a8e99a407eb90f0b9f81ba2b48be38714b9b296ac26382f8e48f5ec1fe994372a92ebb7b07e3f6c909b +MISC metadata.xml 189 SHA256 3c34d13913d23a2d7669fe1e294b7a026e204eff7c701461646f4d7db25d9d0c SHA512 fe3ac50d70b7d95b9488f1af5dcd8dad0b3f9e344f4f56ba58b7812e4e17e0d90540c446882c8c5d11f32b89976d6e1b3d10846acf6ef75849daa4e163139213 WHIRLPOOL e85232acc2cd9452fcaa9e49b23e6980e224d79a23a48c43be38dea3d3a60d1b4cfce56ffe2e193b7c5d6100fef927da9c8d5a5b085e7849d1bd65cb104ce715 diff --git a/sdk_container/src/third_party/coreos-overlay/dev-python/pyxenstore/metadata.xml b/sdk_container/src/third_party/coreos-overlay/dev-python/pyxenstore/metadata.xml new file mode 100644 index 0000000000..199da9a0bd --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/dev-python/pyxenstore/metadata.xml @@ -0,0 +1,7 @@ + + + + + + + diff --git a/sdk_container/src/third_party/coreos-overlay/dev-python/pyxenstore/pyxenstore-9999.ebuild b/sdk_container/src/third_party/coreos-overlay/dev-python/pyxenstore/pyxenstore-9999.ebuild new file mode 100644 index 0000000000..801f0e855a --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/dev-python/pyxenstore/pyxenstore-9999.ebuild @@ -0,0 +1,26 @@ +# Copyright 1999-2012 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: $ + +EAPI=4 +PYTHON_DEPEND="2" +SUPPORT_PYTHON_ABIS="1" +RESTRICT_PYTHON_ABIS="" + +inherit distutils bzr + +EBZR_REPO_URI="https://code.launchpad.net/~cbehrens/pyxenstore/trunk" + +DESCRIPTION="Provides Python interfaces for Xen's XenStore." +HOMEPAGE="https://launchpad.net/pyxenstore" +SRC_URI="" + +LICENSE="Apache-2.0" +SLOT="0" +KEYWORDS="~amd64 ~arm ~x86" +IUSE="" + +DEPEND=" + app-emulation/xen-tools + " +RDEPEND="${DEPEND}" diff --git a/sdk_container/src/third_party/coreos-overlay/profiles/default/linux/package.use b/sdk_container/src/third_party/coreos-overlay/profiles/default/linux/package.use index 159efbcac1..cc11a72f86 100644 --- a/sdk_container/src/third_party/coreos-overlay/profiles/default/linux/package.use +++ b/sdk_container/src/third_party/coreos-overlay/profiles/default/linux/package.use @@ -49,6 +49,7 @@ sys-apps/pciutils static-libs # and may be executed outside chroot. app-arch/xz-utils static-libs +app-emulation/xen-tools -ocaml -hvm -xend -pygrub -qemu -flask -screen -doc amd64 =sys-libs/gdbm-1.8.3-r4 berkdb >=sys-libs/libseccomp-1.0.1 static-libs diff --git a/sdk_container/src/third_party/coreos-overlay/profiles/targets/coreos/package.accept_keywords b/sdk_container/src/third_party/coreos-overlay/profiles/targets/coreos/package.accept_keywords index 9a526c0c22..d9e7f363bf 100644 --- a/sdk_container/src/third_party/coreos-overlay/profiles/targets/coreos/package.accept_keywords +++ b/sdk_container/src/third_party/coreos-overlay/profiles/targets/coreos/package.accept_keywords @@ -129,6 +129,7 @@ =sys-apps/keyutils-1.1 ~amd64 =net-dialup/ppp-2.4.5-r3 ~amd64 =app-admin/systemd-rest-9999 ~amd64 ~x86 +=dev-python/pyxenstore-9999 ~amd64 ~x86 =coreos-base/motd-http-9999 ~amd64 ~x86 =app-emulation/docker-9999 ~amd64 ~x86 =app-emulation/lxc-0.8.0-r1 ~amd64 ~x86 diff --git a/sdk_container/src/third_party/coreos-overlay/profiles/targets/coreos/package.provided b/sdk_container/src/third_party/coreos-overlay/profiles/targets/coreos/package.provided index 434f867956..abb87d9cfa 100644 --- a/sdk_container/src/third_party/coreos-overlay/profiles/targets/coreos/package.provided +++ b/sdk_container/src/third_party/coreos-overlay/profiles/targets/coreos/package.provided @@ -39,9 +39,6 @@ dev-java/ant-core-1.7.1-r4 dev-java/xalan-2.7.1 dev-java/xerces-2.9.1 -# Needed for the xsltproc command line tool -dev-libs/libxslt-1.1.24-r1 - dev-perl/Crypt-PasswdMD5-1.3 dev-perl/Digest-SHA1-2.11 dev-perl/XML-Parser-2.36