From: "Ian Delaney" <idella4@gentoo.org>
To: gentoo-commits@lists.gentoo.org
Subject: [gentoo-commits] repo/gentoo:master commit in: app-emulation/xen/
Date: Thu, 17 Dec 2015 13:59:12 +0000 (UTC) [thread overview]
Message-ID: <1450360738.73ce06fe905a06fa25f71fc49cb063d547b6a3f0.idella4@gentoo> (raw)
commit: 73ce06fe905a06fa25f71fc49cb063d547b6a3f0
Author: Ian Delaney <idella4 <AT> gentoo <DOT> org>
AuthorDate: Thu Dec 17 13:40:04 2015 +0000
Commit: Ian Delaney <idella4 <AT> gentoo <DOT> org>
CommitDate: Thu Dec 17 13:58:58 2015 +0000
URL: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=73ce06fe
app-emulation/xen: revbumps to vns. 4.5.2-r3, 4.6.0-r4
security patches added of xsa 164,165,166 re security Bug 567962
Gentoo bug: #567962
Package-Manager: portage-2.2.24
app-emulation/xen/Manifest | 2 +
app-emulation/xen/xen-4.5.2-r3.ebuild | 188 ++++++++++++++++++++++++++++++++++
app-emulation/xen/xen-4.6.0-r4.ebuild | 186 +++++++++++++++++++++++++++++++++
3 files changed, 376 insertions(+)
diff --git a/app-emulation/xen/Manifest b/app-emulation/xen/Manifest
index f95769e..9e27b4f 100644
--- a/app-emulation/xen/Manifest
+++ b/app-emulation/xen/Manifest
@@ -6,6 +6,8 @@ DIST xen-4.6.0-upstream-patches-0.tar.xz 19280 SHA256 8ef2d139f86cb52d2208a17c97
DIST xen-4.6.0.tar.gz 19694350 SHA256 6fa1c2431df55aa5950d248e6093b8c8c0f11c357a0adbd348a2186478e80909 SHA512 b4b02f306ffea360f539dd8c231b2f58c00c3638fdb665cb659c7291b475b40f1075bc59d49a6144767729e57b8bc40a1cfd9030d61de2b8fa4ac97d43655c2b WHIRLPOOL d3f01183440ca1875b6e850bd116db0c382383433e50c0902d3268e9e36b39d184fc65e925bdb5363ef4ca7a232fee15b4749c89baf789137b8a8248565c75a8
DIST xen-security-patches-0.tar.xz 5944 SHA256 c0456793064185f0781668264a09a2412a25e2ff8c4ce0d332204e37b94d7e96 SHA512 de812e66563e608548b220aa00c8fd71973af748a00cea79959f46a5b6893a38248d2ea455026af43f47e3f5e566d08b5a6f3d18f22e940d75d2a2ca76cec3d3 WHIRLPOOL 3e18d32798bdfe584ee8d102963090b569ec3660fd5723d8c608091e5c7d935c1edced5e258d92bf51fe06975455a3ae33dfedd01702c6076aedf97ea61f2d1b
DIST xen-security-patches-1.tar.gz 7040 SHA256 30733e9ca71bf4291ff212eb191afb22687ccd9b2579767fe0ee013152980c76 SHA512 89c72897f18a86c2060bb76a182e7cca72ad2f33a3aab964ecae66e057aeecafee2e9986204d6feb98f81ccb740460ee2cb37663b1ab79f47adc1dd73e0091bc WHIRLPOOL c27e612b87b4a30abbf59e6be019e2c21a78bfbdf1715da5498d95607d390d616251768d419ac5ce76087bbf7cdfc410dd0088ba48e425082cea971efcb64346
+DIST xen-security-patches-2.tar.gz 7370 SHA256 f24bf4b0cba29b51ee71f6ef82654cddf157c63d62fc1119f17255b2388e03ab SHA512 209dea670467ff1df18428c15b25229c05d676d1a2f646cddb221544ae888241ade48a22be037f97dce249ac322c1f30bb477675e5e2cc04a2fbd839e02f1f57 WHIRLPOOL ae66a2fbc0d0f0a555d407ebd3198fa58ee043515fb9821d7b9eda46d088bc87b3de16fe015fd1142294429dd2c1c7826e414a55980e27123185c1a86fb0a8a6
+DIST xen-security-patches-3.tar.gz 7349 SHA256 a1876b918c0a608618f349deed11b547a65c5909c31d72a89340d4908c572f46 SHA512 f5e8e7ab5d9be6aa036e52627931f1b2648de642664b2922f9cab64f44d19ac8682f5beb7fdbcb842ee19346202093fade3f10e39ba60fcb12a101deb4408818 WHIRLPOOL 14ee65babe4edd901914c8b8ddb5d7b54e6738d77642514fe611bf84541ae0a932bcb48f86179d5e7a6741135b9c7b129e8244cc22922c4e592604a696b6082f
DIST xen-security-patches-3.tar.xz 17028 SHA256 fb6301beb9a5c2d1e5d4de8783d8670e382b1bef48ec61e73d2d9be6901d289f SHA512 787fee8f7822577c6de91c4cf4d56d0e73ce46bac5524537ff66a718b6d7eae9d362265515743e8577b2c75f2841baed9837f71467b3b7b91a3111220da5f236 WHIRLPOOL 5c136289e654776bf918fe125fbecba7dac0929b236f7ae8158026a6bd6be12bc786a5ec96cb4022c18a5e7ffde82155deb57eb9639600e4c42c9c209f4a2ed6
DIST xen-security-patches-7.tar.xz 22604 SHA256 e831c71f830316f452eb8645a5e7ca497264587aa8b353945fd9535f485166e3 SHA512 051769f4118f5c6d5d961759f547526d3fb0e86a4c1dee265a7f0224f10a88e2217b5b5fcf8dbfc706a1ec3c8d1632ab688d3f70dfd89d830261dc7391dd41c2 WHIRLPOOL 8e6dfb4e1700a07e3e3207b67afaddc5d6aa6fd84db9b3e76bd9ff54f682740fed01070e5860bb5378d50903d5777b55dff88eb3444d45bdd63dba657889393d
DIST xen-security-patches.tar.gz 2105 SHA256 19409f15fdbfbfe41b86627dd929a362563610999fc4b73ab2a9165df0ba8182 SHA512 2733e77b6a9ba25e704e0a15a32a20efe7c74873cabc5e6490f41e8d1b96d9efa83c0d16bbda6169d4bab3f5e9e9a8d7f3400f63e6b2d11cf0c63711a858cc34 WHIRLPOOL 21dda4417d938c45bf46c41f2e9aba524f484b6526fcf59a840ca30aa270148990ffc66536431b2a4b8db6f1a761b02f2266b5935e68e85935ec8dd5511dc892
diff --git a/app-emulation/xen/xen-4.5.2-r3.ebuild b/app-emulation/xen/xen-4.5.2-r3.ebuild
new file mode 100644
index 0000000..2bd75da
--- /dev/null
+++ b/app-emulation/xen/xen-4.5.2-r3.ebuild
@@ -0,0 +1,188 @@
+# Copyright 1999-2015 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+# $Id$
+
+EAPI=5
+
+PYTHON_COMPAT=( python2_7 )
+
+inherit eutils multilib mount-boot flag-o-matic python-any-r1 toolchain-funcs
+
+MY_PV=${PV/_/-}
+MY_P=${PN}-${PV/_/-}
+
+if [[ $PV == *9999 ]]; then
+ inherit git-r3
+ KEYWORDS=""
+ EGIT_REPO_URI="git://xenbits.xen.org/${PN}.git"
+ SRC_URI=""
+else
+ KEYWORDS="~amd64 ~arm ~arm64 -x86"
+ UPSTREAM_VER=
+ SECURITY_VER=0
+ # var set to reflect https://dev.gentoo.org/~idella4/
+ SEC_VER=2
+ GENTOO_VER=
+
+ [[ -n ${UPSTREAM_VER} ]] && \
+ UPSTREAM_PATCHSET_URI="https://dev.gentoo.org/~dlan/distfiles/${P}-upstream-patches-${UPSTREAM_VER}.tar.xz"
+ [[ -n ${SECURITY_VER} ]] && \
+ SECURITY_PATCHSET_URI="https://dev.gentoo.org/~idella4/distfiles/${PN/-tools}-security-patches-${SECURITY_VER}.tar.xz
+ https://dev.gentoo.org/~idella4/distfiles/${PN/-tools}-security-patches-${SEC_VER}.tar.gz"
+ [[ -n ${GENTOO_VER} ]] && \
+ GENTOO_PATCHSET_URI="https://dev.gentoo.org/~dlan/distfiles/${PN}-gentoo-patches-${GENTOO_VER}.tar.xz"
+ SRC_URI="http://bits.xensource.com/oss-xen/release/${MY_PV}/${MY_P}.tar.gz
+ ${UPSTREAM_PATCHSET_URI}
+ ${SECURITY_PATCHSET_URI}
+ ${GENTOO_PATCHSET_URI}"
+
+fi
+
+DESCRIPTION="The Xen virtual machine monitor"
+HOMEPAGE="http://xen.org/"
+LICENSE="GPL-2"
+SLOT="0"
+IUSE="custom-cflags debug efi flask xsm"
+
+DEPEND="${PYTHON_DEPS}
+ efi? ( >=sys-devel/binutils-2.22[multitarget] )
+ !efi? ( >=sys-devel/binutils-2.22[-multitarget] )"
+RDEPEND=""
+PDEPEND="~app-emulation/xen-tools-${PV}"
+
+RESTRICT="test"
+
+# Approved by QA team in bug #144032
+QA_WX_LOAD="boot/xen-syms-${PV}"
+
+REQUIRED_USE="flask? ( xsm )
+ arm? ( debug )"
+
+S="${WORKDIR}/${MY_P}"
+
+pkg_setup() {
+ python-any-r1_pkg_setup
+ if [[ -z ${XEN_TARGET_ARCH} ]]; then
+ if use x86 && use amd64; then
+ die "Confusion! Both x86 and amd64 are set in your use flags!"
+ elif use x86; then
+ export XEN_TARGET_ARCH="x86_32"
+ elif use amd64; then
+ export XEN_TARGET_ARCH="x86_64"
+ elif use arm; then
+ export XEN_TARGET_ARCH="arm32"
+ elif use arm64; then
+ export XEN_TARGET_ARCH="arm64"
+ else
+ die "Unsupported architecture!"
+ fi
+ fi
+
+ if use flask ; then
+ export "XSM_ENABLE=y"
+ export "FLASK_ENABLE=y"
+ elif use xsm ; then
+ export "XSM_ENABLE=y"
+ fi
+}
+
+src_prepare() {
+ # Upstream's patchset
+ if [[ -n ${UPSTREAM_VER} ]]; then
+ EPATCH_SUFFIX="patch" \
+ EPATCH_FORCE="yes" \
+ EPATCH_OPTS="-p1" \
+ epatch "${WORKDIR}"/patches-upstream
+ fi
+
+ if [[ -n ${SECURITY_VER} ]]; then
+ einfo "Try to apply Xen Security patcheset"
+ # apply main xen patches
+ # Two parallel systems, both work side by side
+ # Over time they may concdense into one. This will suffice for now
+ EPATCH_SUFFIX="patch"
+ EPATCH_FORCE="yes"
+ for i in ${XEN_SECURITY_MAIN}; do
+ epatch "${WORKDIR}"/patches-security/xen/$i
+ done
+
+ for i in "${WORKDIR}"/xen-sec/xsa*.patch; do
+ epatch $i
+ done
+ fi
+
+ # Gentoo's patchset
+ if [[ -n ${GENTOO_VER} ]]; then
+ EPATCH_SUFFIX="patch" \
+ EPATCH_FORCE="yes" \
+ epatch "${WORKDIR}"/patches-gentoo
+ fi
+
+ # Drop .config
+ sed -e '/-include $(XEN_ROOT)\/.config/d' -i Config.mk || die "Couldn't drop"
+
+ if use efi; then
+ epatch "${FILESDIR}"/${PN}-4.5-efi.patch
+ export EFI_VENDOR="gentoo"
+ export EFI_MOUNTPOINT="boot"
+ fi
+
+ # if the user *really* wants to use their own custom-cflags, let them
+ if use custom-cflags; then
+ einfo "User wants their own CFLAGS - removing defaults"
+ # try and remove all the default custom-cflags
+ find "${S}" -name Makefile -o -name Rules.mk -o -name Config.mk -exec sed \
+ -e 's/CFLAGS\(.*\)=\(.*\)-O3\(.*\)/CFLAGS\1=\2\3/' \
+ -e 's/CFLAGS\(.*\)=\(.*\)-march=i686\(.*\)/CFLAGS\1=\2\3/' \
+ -e 's/CFLAGS\(.*\)=\(.*\)-fomit-frame-pointer\(.*\)/CFLAGS\1=\2\3/' \
+ -e 's/CFLAGS\(.*\)=\(.*\)-g3*\s\(.*\)/CFLAGS\1=\2 \3/' \
+ -e 's/CFLAGS\(.*\)=\(.*\)-O2\(.*\)/CFLAGS\1=\2\3/' \
+ -i {} \; || die "failed to re-set custom-cflags"
+ fi
+
+ # remove -Werror for gcc-4.6's sake
+ find "${S}" -name 'Makefile*' -o -name '*.mk' -o -name 'common.make' | \
+ xargs sed -i 's/ *-Werror */ /'
+ # not strictly necessary to fix this
+ sed -i 's/, "-Werror"//' "${S}/tools/python/setup.py" || die "failed to re-set setup.py"
+
+ epatch_user
+}
+
+src_configure() {
+ use arm && myopt="${myopt} CONFIG_EARLY_PRINTK=sun7i"
+
+ use debug && myopt="${myopt} debug=y"
+
+ if use custom-cflags; then
+ filter-flags -fPIE -fstack-protector
+ replace-flags -O3 -O2
+ else
+ unset CFLAGS
+ fi
+}
+
+src_compile() {
+ # Send raw LDFLAGS so that --as-needed works
+ emake V=1 CC="$(tc-getCC)" LDFLAGS="$(raw-ldflags)" LD="$(tc-getLD)" -C xen ${myopt}
+}
+
+src_install() {
+ local myopt
+ use debug && myopt="${myopt} debug=y"
+
+ # The 'make install' doesn't 'mkdir -p' the subdirs
+ if use efi; then
+ mkdir -p "${D}"${EFI_MOUNTPOINT}/efi/${EFI_VENDOR} || die
+ fi
+
+ emake LDFLAGS="$(raw-ldflags)" DESTDIR="${D}" -C xen ${myopt} install
+}
+
+pkg_postinst() {
+ elog "Official Xen Guide and the unoffical wiki page:"
+ elog " https://wiki.gentoo.org/wiki/Xen"
+ elog " http://en.gentoo-wiki.com/wiki/Xen/"
+
+ use efi && einfo "The efi executable is installed in boot/efi/gentoo"
+}
diff --git a/app-emulation/xen/xen-4.6.0-r4.ebuild b/app-emulation/xen/xen-4.6.0-r4.ebuild
new file mode 100644
index 0000000..c1c7fa0
--- /dev/null
+++ b/app-emulation/xen/xen-4.6.0-r4.ebuild
@@ -0,0 +1,186 @@
+# Copyright 1999-2015 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+# $Id$
+
+EAPI=5
+
+PYTHON_COMPAT=( python2_7 )
+
+inherit eutils multilib mount-boot flag-o-matic python-any-r1 toolchain-funcs
+
+MY_PV=${PV/_/-}
+MY_P=${PN}-${PV/_/-}
+
+if [[ $PV == *9999 ]]; then
+ inherit git-r3
+ KEYWORDS=""
+ EGIT_REPO_URI="git://xenbits.xen.org/xen.git"
+ SRC_URI=""
+else
+ KEYWORDS="~amd64 ~arm ~arm64 -x86"
+ UPSTREAM_VER=0
+ SECURITY_VER=0
+ # var set to reflect https://dev.gentoo.org/~idella4/
+ SEC_VER=3
+ GENTOO_VER=
+
+ [[ -n ${UPSTREAM_VER} ]] && \
+ UPSTREAM_PATCHSET_URI="https://dev.gentoo.org/~dlan/distfiles/${P}-upstream-patches-${UPSTREAM_VER}.tar.xz"
+ [[ -n ${SECURITY_VER} ]] && \
+ SECURITY_PATCHSET_URI="https://dev.gentoo.org/~idella4/distfiles/${PN/-tools}-security-patches-${SECURITY_VER}.tar.xz
+ https://dev.gentoo.org/~idella4/distfiles/${PN/-tools}-security-patches-${SEC_VER}.tar.gz"
+ [[ -n ${GENTOO_VER} ]] && \
+ GENTOO_PATCHSET_URI="https://dev.gentoo.org/~dlan/distfiles/${PN}-gentoo-patches-${GENTOO_VER}.tar.xz"
+ SRC_URI="http://bits.xensource.com/oss-xen/release/${MY_PV}/${MY_P}.tar.gz
+ ${UPSTREAM_PATCHSET_URI}
+ ${SECURITY_PATCHSET_URI}
+ ${GENTOO_PATCHSET_URI}"
+fi
+
+DESCRIPTION="The Xen virtual machine monitor"
+HOMEPAGE="http://xen.org/"
+LICENSE="GPL-2"
+SLOT="0"
+IUSE="custom-cflags debug efi flask"
+
+DEPEND="${PYTHON_DEPS}
+ efi? ( >=sys-devel/binutils-2.22[multitarget] )
+ !efi? ( >=sys-devel/binutils-2.22 )"
+RDEPEND=""
+PDEPEND="~app-emulation/xen-tools-${PV}"
+
+RESTRICT="test"
+
+# Approved by QA team in bug #144032
+QA_WX_LOAD="boot/xen-syms-${PV}"
+
+REQUIRED_USE="arm? ( debug )"
+
+S="${WORKDIR}/${MY_P}"
+
+pkg_setup() {
+ python-any-r1_pkg_setup
+ if [[ -z ${XEN_TARGET_ARCH} ]]; then
+ if use amd64; then
+ export XEN_TARGET_ARCH="x86_64"
+ elif use arm; then
+ export XEN_TARGET_ARCH="arm32"
+ elif use arm64; then
+ export XEN_TARGET_ARCH="arm64"
+ else
+ die "Unsupported architecture!"
+ fi
+ fi
+
+ if use flask ; then
+ export "XSM_ENABLE=y"
+ export "FLASK_ENABLE=y"
+ fi
+}
+
+src_prepare() {
+ # Upstream's patchset
+ if [[ -n ${UPSTREAM_VER} ]]; then
+ EPATCH_SUFFIX="patch" \
+ EPATCH_FORCE="yes" \
+ EPATCH_OPTS="-p1" \
+ epatch "${WORKDIR}"/patches-upstream
+ fi
+
+ if [[ -n ${SECURITY_VER} ]]; then
+ einfo "Try to apply Xen Security patcheset"
+ # apply main xen patches
+ # Two parallel systems, both work side by side
+ # Over time they may concdense into one. This will suffice for now
+ EPATCH_SUFFIX="patch"
+ EPATCH_FORCE="yes"
+ for i in ${XEN_SECURITY_MAIN}; do
+ epatch "${WORKDIR}"/patches-security/xen/$i
+ done
+
+ for i in "${WORKDIR}"/xen-sec/xsa*.patch; do
+ epatch $i
+ done
+ fi
+
+ # Gentoo's patchset
+ if [[ -n ${GENTOO_VER} ]]; then
+ EPATCH_SUFFIX="patch" \
+ EPATCH_FORCE="yes" \
+ epatch "${WORKDIR}"/patches-gentoo
+ fi
+
+ epatch "${FILESDIR}"/${PN}-4.6-efi.patch
+
+ # Drop .config
+ sed -e '/-include $(XEN_ROOT)\/.config/d' -i Config.mk || die "Couldn't drop"
+
+ if use efi; then
+ export EFI_VENDOR="gentoo"
+ export EFI_MOUNTPOINT="boot"
+ fi
+
+ # if the user *really* wants to use their own custom-cflags, let them
+ if use custom-cflags; then
+ einfo "User wants their own CFLAGS - removing defaults"
+ # try and remove all the default custom-cflags
+ find "${S}" -name Makefile -o -name Rules.mk -o -name Config.mk -exec sed \
+ -e 's/CFLAGS\(.*\)=\(.*\)-O3\(.*\)/CFLAGS\1=\2\3/' \
+ -e 's/CFLAGS\(.*\)=\(.*\)-march=i686\(.*\)/CFLAGS\1=\2\3/' \
+ -e 's/CFLAGS\(.*\)=\(.*\)-fomit-frame-pointer\(.*\)/CFLAGS\1=\2\3/' \
+ -e 's/CFLAGS\(.*\)=\(.*\)-g3*\s\(.*\)/CFLAGS\1=\2 \3/' \
+ -e 's/CFLAGS\(.*\)=\(.*\)-O2\(.*\)/CFLAGS\1=\2\3/' \
+ -i {} \; || die "failed to re-set custom-cflags"
+ fi
+
+ # remove -Werror for gcc-4.6's sake
+ find "${S}" -name 'Makefile*' -o -name '*.mk' -o -name 'common.make' | \
+ xargs sed -i 's/ *-Werror */ /'
+ # not strictly necessary to fix this
+ sed -i 's/, "-Werror"//' "${S}/tools/python/setup.py" || die "failed to re-set setup.py"
+
+ epatch_user
+}
+
+src_configure() {
+ use arm && myopt="${myopt} CONFIG_EARLY_PRINTK=sun7i"
+
+ use debug && myopt="${myopt} debug=y"
+
+ if use custom-cflags; then
+ filter-flags -fPIE -fstack-protector
+ replace-flags -O3 -O2
+ else
+ unset CFLAGS
+ unset LDFLAGS
+ unset ASFLAGS
+ fi
+}
+
+src_compile() {
+ # Send raw LDFLAGS so that --as-needed works
+ emake V=1 CC="$(tc-getCC)" LDFLAGS="$(raw-ldflags)" LD="$(tc-getLD)" -C xen ${myopt}
+}
+
+src_install() {
+ local myopt
+ use debug && myopt="${myopt} debug=y"
+
+ # The 'make install' doesn't 'mkdir -p' the subdirs
+ if use efi; then
+ mkdir -p "${D}"${EFI_MOUNTPOINT}/efi/${EFI_VENDOR} || die
+ fi
+
+ emake LDFLAGS="$(raw-ldflags)" DESTDIR="${D}" -C xen ${myopt} install
+
+ # make install likes to throw in some extra EFI bits if it built
+ use efi || rm -rf "${D}/usr/$(get_libdir)/efi"
+}
+
+pkg_postinst() {
+ elog "Official Xen Guide and the unoffical wiki page:"
+ elog " https://wiki.gentoo.org/wiki/Xen"
+ elog " http://en.gentoo-wiki.com/wiki/Xen/"
+
+ use efi && einfo "The efi executable is installed in boot/efi/gentoo"
+}
next reply other threads:[~2015-12-17 13:59 UTC|newest]
Thread overview: 311+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-12-17 13:59 Ian Delaney [this message]
-- strict thread matches above, loose matches on Subject: below --
2024-10-14 17:50 [gentoo-commits] repo/gentoo:master commit in: app-emulation/xen/ Sam James
2024-10-14 7:16 Florian Schmaus
2024-10-14 7:16 Florian Schmaus
2024-08-02 8:02 Florian Schmaus
2024-08-02 8:02 Florian Schmaus
2024-06-04 18:23 Arthur Zamarin
2024-05-29 8:32 Florian Schmaus
2024-05-29 8:32 Florian Schmaus
2024-04-11 3:38 Joonas Niilola
2024-04-10 6:43 Florian Schmaus
2024-04-10 6:43 Florian Schmaus
2024-04-06 6:05 Joonas Niilola
2024-04-05 15:59 Florian Schmaus
2024-04-05 15:59 Florian Schmaus
2024-03-28 17:18 Sam James
2024-03-28 11:21 Florian Schmaus
2024-03-28 11:21 Florian Schmaus
2024-01-13 20:46 Conrad Kostecki
2024-01-13 20:45 Sam James
2024-01-09 8:53 Florian Schmaus
2024-01-07 17:19 Andrew Ammerlaan
2023-10-25 18:47 Florian Schmaus
2023-10-20 16:54 Sam James
2023-10-19 8:22 Florian Schmaus
2023-10-19 8:22 Florian Schmaus
2023-09-09 18:01 Arthur Zamarin
2023-09-05 10:01 Sam James
2023-09-03 9:40 Florian Schmaus
2023-09-03 9:40 Florian Schmaus
2023-08-17 7:49 Andrew Ammerlaan
2023-05-16 9:30 Florian Schmaus
2023-05-16 7:33 Florian Schmaus
2023-04-17 20:13 Sam James
2023-04-17 8:32 Florian Schmaus
2023-04-17 8:32 Florian Schmaus
2023-01-25 16:24 Florian Schmaus
2023-01-25 16:24 Florian Schmaus
2022-12-17 16:55 Arthur Zamarin
2022-12-07 17:05 Florian Schmaus
2022-11-09 9:37 Florian Schmaus
2022-11-09 9:37 Florian Schmaus
2022-10-26 14:27 John Helmert III
2022-10-25 17:55 Sam James
2022-10-19 9:16 Florian Schmaus
2022-10-19 8:51 Florian Schmaus
2022-09-03 13:09 Florian Schmaus
2022-09-02 13:46 Florian Schmaus
2022-09-02 9:41 Florian Schmaus
2022-07-14 8:36 Florian Schmaus
2022-07-13 7:31 Florian Schmaus
2022-07-13 7:08 Florian Schmaus
2022-07-13 7:08 Florian Schmaus
2022-07-12 19:48 Florian Schmaus
2022-07-11 6:47 Florian Schmaus
2022-07-11 6:45 Florian Schmaus
2022-07-10 6:17 Agostino Sarubbo
2022-07-07 6:56 Florian Schmaus
2022-07-05 16:25 Florian Schmaus
2022-07-05 16:23 Florian Schmaus
2022-07-05 16:23 Florian Schmaus
2022-05-06 9:51 Florian Schmaus
2022-05-04 2:48 Sam James
2022-05-03 18:41 Sam James
2022-04-21 19:21 Florian Schmaus
2022-04-21 9:33 Florian Schmaus
2022-04-18 9:20 Florian Schmaus
2022-04-17 22:16 Florian Schmaus
2022-04-17 22:16 Florian Schmaus
2022-04-17 14:04 Florian Schmaus
2022-04-14 5:54 Florian Schmaus
2022-04-14 5:54 Florian Schmaus
2022-03-14 11:28 Florian Schmaus
2022-03-14 11:28 Florian Schmaus
2022-02-20 0:31 Sam James
2022-02-20 0:31 Sam James
2022-02-19 6:37 Arthur Zamarin
2022-02-18 3:06 Sam James
2022-02-18 3:06 Sam James
2022-01-09 1:10 Sam James
2021-12-21 1:37 Sam James
2021-11-25 20:07 Sam James
2021-11-24 7:44 Florian Schmaus
2021-11-24 7:44 Florian Schmaus
2021-11-12 13:04 Joonas Niilola
2021-10-21 23:28 Sam James
2021-10-20 9:59 Sam James
2021-10-20 9:59 Sam James
2021-09-21 6:35 Agostino Sarubbo
2021-07-15 5:31 Joonas Niilola
2021-06-12 14:00 Sam James
2021-06-11 12:53 Thomas Deutschmann
2021-06-11 12:53 Thomas Deutschmann
2021-06-11 12:53 Thomas Deutschmann
2021-05-11 15:47 Thomas Deutschmann
2021-05-11 15:47 Thomas Deutschmann
2021-04-18 1:44 Sam James
2021-04-17 7:49 Joonas Niilola
2021-03-22 15:33 Joonas Niilola
2021-03-18 20:30 Thomas Deutschmann
2021-03-18 20:30 Thomas Deutschmann
2021-02-25 6:39 Sam James
2021-02-21 16:08 Thomas Deutschmann
2021-02-21 16:08 Thomas Deutschmann
2021-02-04 22:27 Thomas Deutschmann
2021-02-04 14:09 Sam James
2021-02-01 19:24 Thomas Deutschmann
2021-02-01 19:24 Thomas Deutschmann
2020-12-21 18:26 Sam James
2020-12-20 19:21 Thomas Deutschmann
2020-12-03 20:34 Thomas Deutschmann
2020-12-03 7:59 Sam James
2020-11-27 16:55 Thomas Deutschmann
2020-11-27 16:55 Thomas Deutschmann
2020-11-12 14:03 Sam James
2020-11-11 22:37 Thomas Deutschmann
2020-11-11 0:47 Sam James
2020-11-10 15:29 Thomas Deutschmann
2020-11-10 15:29 Thomas Deutschmann
2020-11-10 15:29 Thomas Deutschmann
2020-11-01 2:20 Sam James
2020-10-26 14:13 Joonas Niilola
2020-10-26 14:13 Joonas Niilola
2020-10-09 8:31 Agostino Sarubbo
2020-09-29 20:01 Sam James
2020-09-19 8:04 Michał Górny
2020-09-18 15:05 Agostino Sarubbo
2020-09-12 18:39 Thomas Deutschmann
2020-07-26 16:22 Thomas Deutschmann
2020-07-18 0:01 Sam James
2020-07-17 7:21 Agostino Sarubbo
2020-07-09 13:47 Yixun Lan
2020-07-09 13:47 Yixun Lan
2020-06-26 23:00 Thomas Deutschmann
2020-06-18 3:22 Aaron Bauman
2020-06-12 7:51 Agostino Sarubbo
2020-06-11 9:54 Yixun Lan
2020-05-25 14:21 Yixun Lan
2020-05-25 14:21 Yixun Lan
2020-05-25 14:21 Yixun Lan
2020-04-30 14:46 Yixun Lan
2020-04-30 14:46 Yixun Lan
2020-04-22 14:06 Mikle Kolyada
2020-04-15 15:51 Yixun Lan
2020-04-15 15:51 Yixun Lan
2020-04-15 15:51 Yixun Lan
2020-03-13 15:10 Yixun Lan
2020-03-12 16:21 Agostino Sarubbo
2020-03-10 23:10 Yixun Lan
2020-03-10 23:10 Yixun Lan
2020-03-06 22:34 Yixun Lan
2020-03-01 23:59 Yixun Lan
2020-03-01 23:59 Yixun Lan
2019-12-20 10:08 Yixun Lan
2019-12-17 16:36 Yixun Lan
2019-12-17 16:36 Yixun Lan
2019-12-15 14:05 Yixun Lan
2019-12-15 13:43 Agostino Sarubbo
2019-12-13 9:53 Yixun Lan
2019-12-10 9:43 Yixun Lan
2019-12-10 9:43 Yixun Lan
2019-11-29 14:51 Yixun Lan
2019-11-29 14:51 Yixun Lan
2019-11-29 14:51 Yixun Lan
2019-11-14 15:18 Yixun Lan
2019-11-14 12:30 Agostino Sarubbo
2019-11-13 14:11 Yixun Lan
2019-11-13 14:11 Yixun Lan
2019-11-13 14:11 Yixun Lan
2019-11-04 11:51 Yixun Lan
2019-11-02 8:42 Agostino Sarubbo
2019-10-31 21:48 Thomas Deutschmann
2019-10-31 21:48 Thomas Deutschmann
2019-10-27 7:44 Yixun Lan
2019-10-24 3:07 Yixun Lan
2019-10-24 3:07 Yixun Lan
2019-10-23 12:30 Agostino Sarubbo
2019-10-06 12:45 Thomas Deutschmann
2019-06-20 18:04 Mikle Kolyada
2019-05-17 8:48 Yixun Lan
2019-04-17 13:10 Yixun Lan
2019-04-03 4:55 Yixun Lan
2019-03-28 5:44 Yixun Lan
2019-03-25 5:11 Aaron Bauman
2019-03-24 20:33 Aaron Bauman
2019-03-15 22:49 Thomas Deutschmann
2019-03-08 12:39 Mikle Kolyada
2019-03-07 13:35 Yixun Lan
2019-03-07 13:35 Yixun Lan
2019-03-07 13:35 Yixun Lan
2019-03-07 13:35 Yixun Lan
2019-02-16 13:59 Yixun Lan
2019-02-16 13:59 Yixun Lan
2019-02-13 13:41 Thomas Deutschmann
2019-01-19 3:22 Thomas Deutschmann
2018-12-15 14:13 Yixun Lan
2018-11-23 10:14 Agostino Sarubbo
2018-11-21 22:55 Yixun Lan
2018-11-21 22:55 Yixun Lan
2018-11-21 22:55 Yixun Lan
2018-11-11 10:55 Mikle Kolyada
2018-11-10 20:57 Thomas Deutschmann
2018-11-10 20:57 Thomas Deutschmann
2018-11-10 20:57 Thomas Deutschmann
2018-10-02 11:03 Thomas Deutschmann
2018-10-02 11:03 Thomas Deutschmann
2018-09-18 7:24 Agostino Sarubbo
2018-09-10 11:09 Thomas Deutschmann
2018-09-10 9:36 Thomas Deutschmann
2018-09-09 20:41 Thomas Deutschmann
2018-08-14 1:20 Yixun Lan
2018-08-14 1:20 Yixun Lan
2018-08-14 1:20 Yixun Lan
2018-07-17 11:07 Mikle Kolyada
2018-04-26 21:07 Mikle Kolyada
2018-04-20 5:54 Yixun Lan
2018-04-09 0:03 Aaron Bauman
2018-03-13 4:12 Yixun Lan
2018-03-13 4:12 Yixun Lan
2018-01-14 15:30 Agostino Sarubbo
2017-12-05 2:24 Yixun Lan
2017-12-05 2:24 Yixun Lan
2017-12-05 2:24 Yixun Lan
2017-11-22 1:45 Yixun Lan
2017-11-22 1:45 Yixun Lan
2017-11-08 13:38 Agostino Sarubbo
2017-11-03 18:05 Yixun Lan
2017-11-03 10:08 Yixun Lan
2017-10-13 8:05 Yixun Lan
2017-10-13 8:05 Yixun Lan
2017-09-30 5:40 Yixun Lan
2017-09-30 5:40 Yixun Lan
2017-09-04 1:37 Yixun Lan
2017-07-31 9:01 Tobias Klausmann
2017-07-12 7:25 Yixun Lan
2017-05-11 10:26 Yixun Lan
2017-05-10 15:44 Agostino Sarubbo
2017-05-10 9:32 Agostino Sarubbo
2017-05-03 1:41 Yixun Lan
2017-05-02 9:01 Yixun Lan
2017-04-09 0:10 Yixun Lan
2017-02-24 9:35 Yixun Lan
2017-02-16 18:35 Yixun Lan
2017-02-16 17:16 Agostino Sarubbo
2017-02-15 7:54 Yixun Lan
2016-12-28 9:06 Yixun Lan
2016-12-24 9:47 Agostino Sarubbo
2016-12-21 15:32 Yixun Lan
2016-12-13 15:23 Yixun Lan
2016-12-13 15:23 Yixun Lan
2016-12-13 15:09 Yixun Lan
2016-12-13 11:05 Agostino Sarubbo
2016-12-08 3:19 Yixun Lan
2016-12-07 1:45 Yixun Lan
2016-11-28 4:13 Yixun Lan
2016-11-26 10:36 Agostino Sarubbo
2016-11-22 12:41 Yixun Lan
2016-11-15 10:12 Yixun Lan
2016-11-11 7:23 Yixun Lan
2016-11-04 10:15 Yixun Lan
2016-11-04 8:21 Agostino Sarubbo
2016-10-05 9:48 Yixun Lan
2016-09-12 5:20 Yixun Lan
2016-09-10 12:48 Agostino Sarubbo
2016-09-09 1:17 Yixun Lan
2016-07-28 14:51 Agostino Sarubbo
2016-07-27 1:21 Yixun Lan
2016-06-27 7:38 Yixun Lan
2016-06-07 5:47 Yixun Lan
2016-05-20 4:41 Ian Delaney
2016-05-18 5:31 Patrick Lauer
2016-05-15 3:13 Ian Delaney
2016-04-26 12:33 Ian Delaney
2016-04-26 8:01 Patrice Clement
2016-04-26 7:15 Patrice Clement
2016-04-23 10:05 Ian Delaney
2016-04-14 12:07 Ian Delaney
2016-03-15 13:39 Ian Delaney
2016-03-15 8:11 Agostino Sarubbo
2016-02-19 16:08 Ian Delaney
2016-02-18 3:17 Yixun Lan
2016-02-18 3:17 Yixun Lan
2016-01-22 9:31 Agostino Sarubbo
2016-01-21 14:16 Ian Delaney
2016-01-12 14:24 Ian Delaney
2016-01-12 13:21 Ian Delaney
2016-01-08 21:23 Doug Goldstein
2016-01-07 2:33 Doug Goldstein
2016-01-05 11:23 Agostino Sarubbo
2016-01-03 0:20 Ian Delaney
2015-12-27 1:23 Ian Delaney
2015-12-23 2:21 Ian Delaney
2015-12-14 14:12 Agostino Sarubbo
2015-12-09 7:06 Ian Delaney
2015-12-09 6:40 Ian Delaney
2015-12-09 5:31 Ian Delaney
2015-12-09 5:31 Ian Delaney
2015-12-06 23:27 Doug Goldstein
2015-12-06 5:35 Doug Goldstein
2015-12-06 5:35 Doug Goldstein
2015-12-06 5:35 Doug Goldstein
2015-12-06 5:35 Doug Goldstein
2015-12-06 5:35 Doug Goldstein
2015-12-04 19:38 Doug Goldstein
2015-12-03 13:13 Ian Delaney
2015-11-29 7:57 Ian Delaney
2015-11-11 8:54 Agostino Sarubbo
2015-11-10 10:07 Ian Delaney
2015-11-10 8:56 Agostino Sarubbo
2015-11-10 8:50 Agostino Sarubbo
2015-11-05 7:54 Yixun Lan
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1450360738.73ce06fe905a06fa25f71fc49cb063d547b6a3f0.idella4@gentoo \
--to=idella4@gentoo.org \
--cc=gentoo-commits@lists.gentoo.org \
--cc=gentoo-dev@lists.gentoo.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox