public inbox for gentoo-commits@lists.gentoo.org
 help / color / mirror / Atom feed
From: "Yixun Lan" <dlan@gentoo.org>
To: gentoo-commits@lists.gentoo.org
Subject: [gentoo-commits] repo/gentoo:master commit in: app-emulation/xen/
Date: Wed, 12 Jul 2017 07:25:58 +0000 (UTC)	[thread overview]
Message-ID: <1499844355.7a8fc554850ee501e1ad705b4154874adf102947.dlan@gentoo> (raw)

commit:     7a8fc554850ee501e1ad705b4154874adf102947
Author:     Yixun Lan <dlan <AT> gentoo <DOT> org>
AuthorDate: Wed Jul 12 07:15:52 2017 +0000
Commit:     Yixun Lan <dlan <AT> gentoo <DOT> org>
CommitDate: Wed Jul 12 07:25:55 2017 +0000
URL:        https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=7a8fc554

app-emulation/xen: security bump

fix XSA-217,218,219,220,221,222,223,224,225

Gentoo-Bug: 624112,624114,624116,624118,624120,624122,624124,624126,624130
Package-Manager: Portage-2.3.6, Repoman-2.3.2

 app-emulation/xen/Manifest            |   3 +
 app-emulation/xen/xen-4.7.3.ebuild    | 192 ++++++++++++++++++++++++++++++++++
 app-emulation/xen/xen-4.8.1-r2.ebuild | 192 ++++++++++++++++++++++++++++++++++
 3 files changed, 387 insertions(+)

diff --git a/app-emulation/xen/Manifest b/app-emulation/xen/Manifest
index 6534404116c..49df2654a33 100644
--- a/app-emulation/xen/Manifest
+++ b/app-emulation/xen/Manifest
@@ -1,4 +1,7 @@
 DIST xen-4.7.2-upstream-patches-0.tar.xz 45944 SHA256 e7783bc9adc939167eaef91e96fda506d2d52815f709b31952229891357e6b67 SHA512 6d4e23fb5a63fd191f893e31194b6397a394956846f356ae0119c656a92e7e22296e728286a98109b64a5736241b2317969f54915e7b487b4d7a64aae534614c WHIRLPOOL e185ce40085559d00a302eae8814b4c013817a5e4c0a2a9c56a6b4983b38e7103e44d0407fa78ea79fdbe8eefde346b994812851d8b4bad0bf08cb5721507c37
 DIST xen-4.7.2.tar.gz 20714281 SHA256 61494a56d9251e2108080f95b0dc8e3d175f1ba4da34603fc07b91cfebf358d5 SHA512 8f447e7feffec81fea5b5a4098968b8b8cebc6989e7b6a845413317644d5d328d6f12181d09266366200878ab6a29ab34c7235c1af7b55463a3fdaea40ee1500 WHIRLPOOL 27f3fd88846724e03bf9bb53133046cb79139950c9162dd9c9a85798e169259f73dc2fe4212e750ce9a8fd1d0abd99f1f76108faceb7bf1934ce0495377ee756
+DIST xen-4.7.3.tar.gz 20722625 SHA256 5b5385b476e59e4cf31ecc6dd605df38814b83432b8e8d917f18c8edfdfb708f SHA512 df596bef7f0f0e7f35246fb025913721dae5aa91da27f1b47a49256e9faa8f7dcb80e8c4679345c19614093c02059b6ced54fc51e6900a372b0e76b4ad827126 WHIRLPOOL 9e88db149e216651711cd56830fba33d587de60d57d53fd3ab3db231319f74e4e88222bf1b2bb9b20fea68739bccd4b26304c73a0ae25aad6dbbac64681e3a62
+DIST xen-4.8.1-upstream-patches-0.tar.xz 57132 SHA256 6a6d466e74b28e50cc8ffcf56f6e3853dff73a5d936374404a2aab9dadb54566 SHA512 bcf43f7f9c15016576f225146a34e26122a6e35d953ca8df05d6d3b6b2465bd8e237e824d3d84dfd892f440b40d6e6b3bb7c16c3c79b8e04534b2bed60877f53 WHIRLPOOL 4470d244bed58f9b71a031da19cfe38a79badf426300637211c3e8dfdab02f2b87ed21d9a5340af267685aafd627451f8750b85d9afc73ed2a550c52b43c31ab
 DIST xen-4.8.1.tar.gz 22516631 SHA256 1d69153b94561429293015f66463ee17c26404d1c014e646ecbcca6078581395 SHA512 9f535b4bb57d285dfb92c974d55513505cf485b2d7218fe8f6ed62768e2cee7f225b08adf6706590b2c0a04feca16e10915297c33b98e1b110f8ea7035f46c15 WHIRLPOOL ea367d4d08eaa464417f6c5e7143a52e085a8d0e515c99cbb49ac3ccd5c189aa79947d233754177698a076c28abf7a32c83ae29019ca70c6300839b09ca67bad
 DIST xen-security-patches-26.tar.xz 8276 SHA256 2a21ec429f8952875f7d95f24697600e606326f1a16d5622cee73628cd0401c1 SHA512 f54fc7e720a70258263d29cc482b8269386818ad75792de87b0d0357fdb6af81f2102e5983100db47563435fa28f875a84e8c6d73d44797aadaf0c469d9fb0ec WHIRLPOOL b31667d8415dc1fbcd60160fdbc2fe0ad4de9bd2171fda875f5585b8d7821c4c035b029dbf382abacf4b6be745aeeb708f419fdcabdd86f78ff1c13703802e3f
+DIST xen-security-patches-27.tar.xz 2604 SHA256 a8d01bc309894cb1bbde7a264003b873b77d1b4a1cb5c917b25a51e1b068f85b SHA512 ed9ef5ca3a39635a5ebbdc88663ea32f48c12e8ac1f193b8a66486bb62da692add38c5a89051753c992294528b4b4e92d121997317032a864f46776cb91d1897 WHIRLPOOL 07e2321959664083000a6cc90f30fa2365e206e8c1cc22e74afb085760e2c6378ba51f4ebcbf2b433c0d7a8ad9d98d0f43adb423b1bffc6a00eade362e1c59f5

diff --git a/app-emulation/xen/xen-4.7.3.ebuild b/app-emulation/xen/xen-4.7.3.ebuild
new file mode 100644
index 00000000000..f66bd1b70f8
--- /dev/null
+++ b/app-emulation/xen/xen-4.7.3.ebuild
@@ -0,0 +1,192 @@
+# Copyright 1999-2017 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=5
+
+PYTHON_COMPAT=( python2_7 )
+
+inherit eutils multilib mount-boot flag-o-matic python-any-r1 toolchain-funcs
+
+MY_PV=${PV/_/-}
+MY_P=${PN}-${PV/_/-}
+
+if [[ $PV == *9999 ]]; then
+	inherit git-r3
+	KEYWORDS="amd64 x86"
+	EGIT_REPO_URI="git://xenbits.xen.org/xen.git"
+	SRC_URI=""
+else
+	KEYWORDS="~amd64 ~arm ~x86"
+	UPSTREAM_VER=
+	SECURITY_VER=
+	GENTOO_VER=
+
+	[[ -n ${UPSTREAM_VER} ]] && \
+		UPSTREAM_PATCHSET_URI="https://dev.gentoo.org/~dlan/distfiles/${P}-upstream-patches-${UPSTREAM_VER}.tar.xz"
+	[[ -n ${SECURITY_VER} ]] && \
+		SECURITY_PATCHSET_URI="https://dev.gentoo.org/~dlan/distfiles/${PN}-security-patches-${SECURITY_VER}.tar.xz"
+	[[ -n ${GENTOO_VER} ]] && \
+		GENTOO_PATCHSET_URI="https://dev.gentoo.org/~dlan/distfiles/${PN}-gentoo-patches-${GENTOO_VER}.tar.xz"
+	SRC_URI="https://downloads.xenproject.org/release/xen/${MY_PV}/${MY_P}.tar.gz
+		${UPSTREAM_PATCHSET_URI}
+		${SECURITY_PATCHSET_URI}
+		${GENTOO_PATCHSET_URI}"
+fi
+
+DESCRIPTION="The Xen virtual machine monitor"
+HOMEPAGE="http://xen.org/"
+LICENSE="GPL-2"
+SLOT="0"
+IUSE="custom-cflags debug efi flask"
+
+DEPEND="${PYTHON_DEPS}
+	efi? ( >=sys-devel/binutils-2.22[multitarget] )
+	!efi? ( >=sys-devel/binutils-2.22 )"
+RDEPEND=""
+PDEPEND="~app-emulation/xen-tools-${PV}"
+
+# no tests are available for the hypervisor
+# prevent the silliness of /usr/lib/debug/usr/lib/debug files
+# prevent stripping of the debug info from the /usr/lib/debug/xen-syms
+RESTRICT="test splitdebug strip"
+
+# Approved by QA team in bug #144032
+QA_WX_LOAD="boot/xen-syms-${PV}"
+
+REQUIRED_USE="arm? ( debug )"
+
+S="${WORKDIR}/${MY_P}"
+
+pkg_setup() {
+	python-any-r1_pkg_setup
+	if [[ -z ${XEN_TARGET_ARCH} ]]; then
+		if use amd64; then
+			export XEN_TARGET_ARCH="x86_64"
+		elif use arm; then
+			export XEN_TARGET_ARCH="arm32"
+		elif use arm64; then
+			export XEN_TARGET_ARCH="arm64"
+		else
+			die "Unsupported architecture!"
+		fi
+	fi
+
+	if use flask ; then
+		export "XSM_ENABLE=y"
+		export "FLASK_ENABLE=y"
+	fi
+}
+
+src_prepare() {
+	# Upstream's patchset
+	if [[ -n ${UPSTREAM_VER} ]]; then
+		EPATCH_SUFFIX="patch" \
+		EPATCH_FORCE="yes" \
+		EPATCH_OPTS="-p1" \
+			epatch "${WORKDIR}"/patches-upstream
+	fi
+
+	# Security patchset
+	if [[ -n ${SECURITY_VER} ]]; then
+	einfo "Try to apply Xen Security patch set"
+		# apply main xen patches
+		# Two parallel systems, both work side by side
+		# Over time they may concdense into one. This will suffice for now
+		EPATCH_SUFFIX="patch"
+		EPATCH_FORCE="yes"
+
+		source "${WORKDIR}"/patches-security/${PV}.conf
+
+		for i in ${XEN_SECURITY_MAIN}; do
+			epatch "${WORKDIR}"/patches-security/xen/$i
+		done
+	fi
+
+	# Gentoo's patchset
+	if [[ -n ${GENTOO_VER} ]]; then
+		EPATCH_SUFFIX="patch" \
+		EPATCH_FORCE="yes" \
+			epatch "${WORKDIR}"/patches-gentoo
+	fi
+
+	epatch "${FILESDIR}"/${PN}-4.6-efi.patch
+
+	# Drop .config
+	sed -e '/-include $(XEN_ROOT)\/.config/d' -i Config.mk || die "Couldn't	drop"
+
+	if use efi; then
+		export EFI_VENDOR="gentoo"
+		export EFI_MOUNTPOINT="boot"
+	fi
+
+	# if the user *really* wants to use their own custom-cflags, let them
+	if use custom-cflags; then
+		einfo "User wants their own CFLAGS - removing defaults"
+		# try and remove all the default custom-cflags
+		find "${S}" -name Makefile -o -name Rules.mk -o -name Config.mk -exec sed \
+			-e 's/CFLAGS\(.*\)=\(.*\)-O3\(.*\)/CFLAGS\1=\2\3/' \
+			-e 's/CFLAGS\(.*\)=\(.*\)-march=i686\(.*\)/CFLAGS\1=\2\3/' \
+			-e 's/CFLAGS\(.*\)=\(.*\)-fomit-frame-pointer\(.*\)/CFLAGS\1=\2\3/' \
+			-e 's/CFLAGS\(.*\)=\(.*\)-g3*\s\(.*\)/CFLAGS\1=\2 \3/' \
+			-e 's/CFLAGS\(.*\)=\(.*\)-O2\(.*\)/CFLAGS\1=\2\3/' \
+			-i {} \; || die "failed to re-set custom-cflags"
+	fi
+
+	# remove -Werror for gcc-4.6's sake
+	find "${S}" -name 'Makefile*' -o -name '*.mk' -o -name 'common.make' | \
+		xargs sed -i 's/ *-Werror */ /'
+	# not strictly necessary to fix this
+	sed -i 's/, "-Werror"//' "${S}/tools/python/setup.py" || die "failed to re-set setup.py"
+
+	# Bug #575868 converted to a sed statement, typo of one char
+	sed -e "s:granter’s:granter's:" -i xen/include/public/grant_table.h || die
+
+	epatch_user
+}
+
+src_configure() {
+	use arm && myopt="${myopt} CONFIG_EARLY_PRINTK=sun7i"
+
+	use debug && myopt="${myopt} debug=y"
+
+	if use custom-cflags; then
+		filter-flags -fPIE -fstack-protector
+		replace-flags -O3 -O2
+	else
+		unset CFLAGS
+		unset LDFLAGS
+		unset ASFLAGS
+	fi
+}
+
+src_compile() {
+	# Send raw LDFLAGS so that --as-needed works
+	emake V=1 CC="$(tc-getCC)" LDFLAGS="$(raw-ldflags)" LD="$(tc-getLD)" -C xen ${myopt}
+}
+
+src_install() {
+	local myopt
+	use debug && myopt="${myopt} debug=y"
+
+	# The 'make install' doesn't 'mkdir -p' the subdirs
+	if use efi; then
+		mkdir -p "${D}"${EFI_MOUNTPOINT}/efi/${EFI_VENDOR} || die
+	fi
+
+	emake LDFLAGS="$(raw-ldflags)" DESTDIR="${D}" -C xen ${myopt} install
+
+	# make install likes to throw in some extra EFI bits if it built
+	use efi || rm -rf "${D}/usr/$(get_libdir)/efi"
+}
+
+pkg_postinst() {
+	elog "Official Xen Guide and the unoffical wiki page:"
+	elog " https://wiki.gentoo.org/wiki/Xen"
+	elog " http://en.gentoo-wiki.com/wiki/Xen/"
+
+	use efi && einfo "The efi executable is installed in boot/efi/gentoo"
+
+	elog "You can optionally block the installation of /boot/xen-syms by an entry"
+	elog "in folder /etc/portage/env using the portage's feature INSTALL_MASK"
+	elog "e.g. echo ${msg} > /etc/portage/env/xen.conf"
+}

diff --git a/app-emulation/xen/xen-4.8.1-r2.ebuild b/app-emulation/xen/xen-4.8.1-r2.ebuild
new file mode 100644
index 00000000000..bf73951bc39
--- /dev/null
+++ b/app-emulation/xen/xen-4.8.1-r2.ebuild
@@ -0,0 +1,192 @@
+# Copyright 1999-2017 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=5
+
+PYTHON_COMPAT=( python2_7 )
+
+inherit eutils multilib mount-boot flag-o-matic python-any-r1 toolchain-funcs
+
+MY_PV=${PV/_/-}
+MY_P=${PN}-${PV/_/-}
+
+if [[ $PV == *9999 ]]; then
+	inherit git-r3
+	KEYWORDS=""
+	EGIT_REPO_URI="git://xenbits.xen.org/xen.git"
+	SRC_URI=""
+else
+	KEYWORDS="~amd64 ~arm -x86"
+	UPSTREAM_VER=0
+	SECURITY_VER=27
+	GENTOO_VER=
+
+	[[ -n ${UPSTREAM_VER} ]] && \
+		UPSTREAM_PATCHSET_URI="https://dev.gentoo.org/~dlan/distfiles/${P}-upstream-patches-${UPSTREAM_VER}.tar.xz"
+	[[ -n ${SECURITY_VER} ]] && \
+		SECURITY_PATCHSET_URI="https://dev.gentoo.org/~dlan/distfiles/${PN}-security-patches-${SECURITY_VER}.tar.xz"
+	[[ -n ${GENTOO_VER} ]] && \
+		GENTOO_PATCHSET_URI="https://dev.gentoo.org/~dlan/distfiles/${PN}-gentoo-patches-${GENTOO_VER}.tar.xz"
+	SRC_URI="http://bits.xensource.com/oss-xen/release/${MY_PV}/${MY_P}.tar.gz
+		${UPSTREAM_PATCHSET_URI}
+		${SECURITY_PATCHSET_URI}
+		${GENTOO_PATCHSET_URI}"
+fi
+
+DESCRIPTION="The Xen virtual machine monitor"
+HOMEPAGE="http://xen.org/"
+LICENSE="GPL-2"
+SLOT="0"
+IUSE="custom-cflags debug efi flask"
+
+DEPEND="${PYTHON_DEPS}
+	efi? ( >=sys-devel/binutils-2.22[multitarget] )
+	!efi? ( >=sys-devel/binutils-2.22 )"
+RDEPEND=""
+PDEPEND="~app-emulation/xen-tools-${PV}"
+
+# no tests are available for the hypervisor
+# prevent the silliness of /usr/lib/debug/usr/lib/debug files
+# prevent stripping of the debug info from the /usr/lib/debug/xen-syms
+RESTRICT="test splitdebug strip"
+
+# Approved by QA team in bug #144032
+QA_WX_LOAD="boot/xen-syms-${PV}"
+
+REQUIRED_USE="arm? ( debug )"
+
+S="${WORKDIR}/${MY_P}"
+
+pkg_setup() {
+	python-any-r1_pkg_setup
+	if [[ -z ${XEN_TARGET_ARCH} ]]; then
+		if use amd64; then
+			export XEN_TARGET_ARCH="x86_64"
+		elif use arm; then
+			export XEN_TARGET_ARCH="arm32"
+		elif use arm64; then
+			export XEN_TARGET_ARCH="arm64"
+		else
+			die "Unsupported architecture!"
+		fi
+	fi
+
+	if use flask ; then
+		export "XSM_ENABLE=y"
+		export "FLASK_ENABLE=y"
+	fi
+}
+
+src_prepare() {
+	# Upstream's patchset
+	if [[ -n ${UPSTREAM_VER} ]]; then
+		EPATCH_SUFFIX="patch" \
+		EPATCH_FORCE="yes" \
+		EPATCH_OPTS="-p1" \
+			epatch "${WORKDIR}"/patches-upstream
+	fi
+
+	# Security patchset
+	if [[ -n ${SECURITY_VER} ]]; then
+	einfo "Try to apply Xen Security patch set"
+		# apply main xen patches
+		# Two parallel systems, both work side by side
+		# Over time they may concdense into one. This will suffice for now
+		EPATCH_SUFFIX="patch"
+		EPATCH_FORCE="yes"
+
+		source "${WORKDIR}"/patches-security/${PV}.conf
+
+		for i in ${XEN_SECURITY_MAIN}; do
+			epatch "${WORKDIR}"/patches-security/xen/$i
+		done
+	fi
+
+	# Gentoo's patchset
+	if [[ -n ${GENTOO_VER} ]]; then
+		EPATCH_SUFFIX="patch" \
+		EPATCH_FORCE="yes" \
+			epatch "${WORKDIR}"/patches-gentoo
+	fi
+
+	epatch "${FILESDIR}"/${PN}-4.6-efi.patch
+
+	# Drop .config
+	sed -e '/-include $(XEN_ROOT)\/.config/d' -i Config.mk || die "Couldn't	drop"
+
+	if use efi; then
+		export EFI_VENDOR="gentoo"
+		export EFI_MOUNTPOINT="boot"
+	fi
+
+	# if the user *really* wants to use their own custom-cflags, let them
+	if use custom-cflags; then
+		einfo "User wants their own CFLAGS - removing defaults"
+		# try and remove all the default custom-cflags
+		find "${S}" -name Makefile -o -name Rules.mk -o -name Config.mk -exec sed \
+			-e 's/CFLAGS\(.*\)=\(.*\)-O3\(.*\)/CFLAGS\1=\2\3/' \
+			-e 's/CFLAGS\(.*\)=\(.*\)-march=i686\(.*\)/CFLAGS\1=\2\3/' \
+			-e 's/CFLAGS\(.*\)=\(.*\)-fomit-frame-pointer\(.*\)/CFLAGS\1=\2\3/' \
+			-e 's/CFLAGS\(.*\)=\(.*\)-g3*\s\(.*\)/CFLAGS\1=\2 \3/' \
+			-e 's/CFLAGS\(.*\)=\(.*\)-O2\(.*\)/CFLAGS\1=\2\3/' \
+			-i {} \; || die "failed to re-set custom-cflags"
+	fi
+
+	# remove -Werror for gcc-4.6's sake
+	find "${S}" -name 'Makefile*' -o -name '*.mk' -o -name 'common.make' | \
+		xargs sed -i 's/ *-Werror */ /'
+	# not strictly necessary to fix this
+	sed -i 's/, "-Werror"//' "${S}/tools/python/setup.py" || die "failed to re-set setup.py"
+
+	# Bug #575868 converted to a sed statement, typo of one char
+	sed -e "s:granter’s:granter's:" -i xen/include/public/grant_table.h || die
+
+	epatch_user
+}
+
+src_configure() {
+	use arm && myopt="${myopt} CONFIG_EARLY_PRINTK=sun7i"
+
+	use debug && myopt="${myopt} debug=y"
+
+	if use custom-cflags; then
+		filter-flags -fPIE -fstack-protector
+		replace-flags -O3 -O2
+	else
+		unset CFLAGS
+		unset LDFLAGS
+		unset ASFLAGS
+	fi
+}
+
+src_compile() {
+	# Send raw LDFLAGS so that --as-needed works
+	emake V=1 CC="$(tc-getCC)" LDFLAGS="$(raw-ldflags)" LD="$(tc-getLD)" -C xen ${myopt}
+}
+
+src_install() {
+	local myopt
+	use debug && myopt="${myopt} debug=y"
+
+	# The 'make install' doesn't 'mkdir -p' the subdirs
+	if use efi; then
+		mkdir -p "${D}"${EFI_MOUNTPOINT}/efi/${EFI_VENDOR} || die
+	fi
+
+	emake LDFLAGS="$(raw-ldflags)" DESTDIR="${D}" -C xen ${myopt} install
+
+	# make install likes to throw in some extra EFI bits if it built
+	use efi || rm -rf "${D}/usr/$(get_libdir)/efi"
+}
+
+pkg_postinst() {
+	elog "Official Xen Guide and the unoffical wiki page:"
+	elog " https://wiki.gentoo.org/wiki/Xen"
+	elog " http://en.gentoo-wiki.com/wiki/Xen/"
+
+	use efi && einfo "The efi executable is installed in boot/efi/gentoo"
+
+	elog "You can optionally block the installation of /boot/xen-syms by an entry"
+	elog "in folder /etc/portage/env using the portage's feature INSTALL_MASK"
+	elog "e.g. echo ${msg} > /etc/portage/env/xen.conf"
+}


             reply	other threads:[~2017-07-12  7:26 UTC|newest]

Thread overview: 312+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-07-12  7:25 Yixun Lan [this message]
  -- strict thread matches above, loose matches on Subject: below --
2024-11-21 10:57 [gentoo-commits] repo/gentoo:master commit in: app-emulation/xen/ Florian Schmaus
2024-10-14 17:50 Sam James
2024-10-14  7:16 Florian Schmaus
2024-10-14  7:16 Florian Schmaus
2024-08-02  8:02 Florian Schmaus
2024-08-02  8:02 Florian Schmaus
2024-06-04 18:23 Arthur Zamarin
2024-05-29  8:32 Florian Schmaus
2024-05-29  8:32 Florian Schmaus
2024-04-11  3:38 Joonas Niilola
2024-04-10  6:43 Florian Schmaus
2024-04-10  6:43 Florian Schmaus
2024-04-06  6:05 Joonas Niilola
2024-04-05 15:59 Florian Schmaus
2024-04-05 15:59 Florian Schmaus
2024-03-28 17:18 Sam James
2024-03-28 11:21 Florian Schmaus
2024-03-28 11:21 Florian Schmaus
2024-01-13 20:46 Conrad Kostecki
2024-01-13 20:45 Sam James
2024-01-09  8:53 Florian Schmaus
2024-01-07 17:19 Andrew Ammerlaan
2023-10-25 18:47 Florian Schmaus
2023-10-20 16:54 Sam James
2023-10-19  8:22 Florian Schmaus
2023-10-19  8:22 Florian Schmaus
2023-09-09 18:01 Arthur Zamarin
2023-09-05 10:01 Sam James
2023-09-03  9:40 Florian Schmaus
2023-09-03  9:40 Florian Schmaus
2023-08-17  7:49 Andrew Ammerlaan
2023-05-16  9:30 Florian Schmaus
2023-05-16  7:33 Florian Schmaus
2023-04-17 20:13 Sam James
2023-04-17  8:32 Florian Schmaus
2023-04-17  8:32 Florian Schmaus
2023-01-25 16:24 Florian Schmaus
2023-01-25 16:24 Florian Schmaus
2022-12-17 16:55 Arthur Zamarin
2022-12-07 17:05 Florian Schmaus
2022-11-09  9:37 Florian Schmaus
2022-11-09  9:37 Florian Schmaus
2022-10-26 14:27 John Helmert III
2022-10-25 17:55 Sam James
2022-10-19  9:16 Florian Schmaus
2022-10-19  8:51 Florian Schmaus
2022-09-03 13:09 Florian Schmaus
2022-09-02 13:46 Florian Schmaus
2022-09-02  9:41 Florian Schmaus
2022-07-14  8:36 Florian Schmaus
2022-07-13  7:31 Florian Schmaus
2022-07-13  7:08 Florian Schmaus
2022-07-13  7:08 Florian Schmaus
2022-07-12 19:48 Florian Schmaus
2022-07-11  6:47 Florian Schmaus
2022-07-11  6:45 Florian Schmaus
2022-07-10  6:17 Agostino Sarubbo
2022-07-07  6:56 Florian Schmaus
2022-07-05 16:25 Florian Schmaus
2022-07-05 16:23 Florian Schmaus
2022-07-05 16:23 Florian Schmaus
2022-05-06  9:51 Florian Schmaus
2022-05-04  2:48 Sam James
2022-05-03 18:41 Sam James
2022-04-21 19:21 Florian Schmaus
2022-04-21  9:33 Florian Schmaus
2022-04-18  9:20 Florian Schmaus
2022-04-17 22:16 Florian Schmaus
2022-04-17 22:16 Florian Schmaus
2022-04-17 14:04 Florian Schmaus
2022-04-14  5:54 Florian Schmaus
2022-04-14  5:54 Florian Schmaus
2022-03-14 11:28 Florian Schmaus
2022-03-14 11:28 Florian Schmaus
2022-02-20  0:31 Sam James
2022-02-20  0:31 Sam James
2022-02-19  6:37 Arthur Zamarin
2022-02-18  3:06 Sam James
2022-02-18  3:06 Sam James
2022-01-09  1:10 Sam James
2021-12-21  1:37 Sam James
2021-11-25 20:07 Sam James
2021-11-24  7:44 Florian Schmaus
2021-11-24  7:44 Florian Schmaus
2021-11-12 13:04 Joonas Niilola
2021-10-21 23:28 Sam James
2021-10-20  9:59 Sam James
2021-10-20  9:59 Sam James
2021-09-21  6:35 Agostino Sarubbo
2021-07-15  5:31 Joonas Niilola
2021-06-12 14:00 Sam James
2021-06-11 12:53 Thomas Deutschmann
2021-06-11 12:53 Thomas Deutschmann
2021-06-11 12:53 Thomas Deutschmann
2021-05-11 15:47 Thomas Deutschmann
2021-05-11 15:47 Thomas Deutschmann
2021-04-18  1:44 Sam James
2021-04-17  7:49 Joonas Niilola
2021-03-22 15:33 Joonas Niilola
2021-03-18 20:30 Thomas Deutschmann
2021-03-18 20:30 Thomas Deutschmann
2021-02-25  6:39 Sam James
2021-02-21 16:08 Thomas Deutschmann
2021-02-21 16:08 Thomas Deutschmann
2021-02-04 22:27 Thomas Deutschmann
2021-02-04 14:09 Sam James
2021-02-01 19:24 Thomas Deutschmann
2021-02-01 19:24 Thomas Deutschmann
2020-12-21 18:26 Sam James
2020-12-20 19:21 Thomas Deutschmann
2020-12-03 20:34 Thomas Deutschmann
2020-12-03  7:59 Sam James
2020-11-27 16:55 Thomas Deutschmann
2020-11-27 16:55 Thomas Deutschmann
2020-11-12 14:03 Sam James
2020-11-11 22:37 Thomas Deutschmann
2020-11-11  0:47 Sam James
2020-11-10 15:29 Thomas Deutschmann
2020-11-10 15:29 Thomas Deutschmann
2020-11-10 15:29 Thomas Deutschmann
2020-11-01  2:20 Sam James
2020-10-26 14:13 Joonas Niilola
2020-10-26 14:13 Joonas Niilola
2020-10-09  8:31 Agostino Sarubbo
2020-09-29 20:01 Sam James
2020-09-19  8:04 Michał Górny
2020-09-18 15:05 Agostino Sarubbo
2020-09-12 18:39 Thomas Deutschmann
2020-07-26 16:22 Thomas Deutschmann
2020-07-18  0:01 Sam James
2020-07-17  7:21 Agostino Sarubbo
2020-07-09 13:47 Yixun Lan
2020-07-09 13:47 Yixun Lan
2020-06-26 23:00 Thomas Deutschmann
2020-06-18  3:22 Aaron Bauman
2020-06-12  7:51 Agostino Sarubbo
2020-06-11  9:54 Yixun Lan
2020-05-25 14:21 Yixun Lan
2020-05-25 14:21 Yixun Lan
2020-05-25 14:21 Yixun Lan
2020-04-30 14:46 Yixun Lan
2020-04-30 14:46 Yixun Lan
2020-04-22 14:06 Mikle Kolyada
2020-04-15 15:51 Yixun Lan
2020-04-15 15:51 Yixun Lan
2020-04-15 15:51 Yixun Lan
2020-03-13 15:10 Yixun Lan
2020-03-12 16:21 Agostino Sarubbo
2020-03-10 23:10 Yixun Lan
2020-03-10 23:10 Yixun Lan
2020-03-06 22:34 Yixun Lan
2020-03-01 23:59 Yixun Lan
2020-03-01 23:59 Yixun Lan
2019-12-20 10:08 Yixun Lan
2019-12-17 16:36 Yixun Lan
2019-12-17 16:36 Yixun Lan
2019-12-15 14:05 Yixun Lan
2019-12-15 13:43 Agostino Sarubbo
2019-12-13  9:53 Yixun Lan
2019-12-10  9:43 Yixun Lan
2019-12-10  9:43 Yixun Lan
2019-11-29 14:51 Yixun Lan
2019-11-29 14:51 Yixun Lan
2019-11-29 14:51 Yixun Lan
2019-11-14 15:18 Yixun Lan
2019-11-14 12:30 Agostino Sarubbo
2019-11-13 14:11 Yixun Lan
2019-11-13 14:11 Yixun Lan
2019-11-13 14:11 Yixun Lan
2019-11-04 11:51 Yixun Lan
2019-11-02  8:42 Agostino Sarubbo
2019-10-31 21:48 Thomas Deutschmann
2019-10-31 21:48 Thomas Deutschmann
2019-10-27  7:44 Yixun Lan
2019-10-24  3:07 Yixun Lan
2019-10-24  3:07 Yixun Lan
2019-10-23 12:30 Agostino Sarubbo
2019-10-06 12:45 Thomas Deutschmann
2019-06-20 18:04 Mikle Kolyada
2019-05-17  8:48 Yixun Lan
2019-04-17 13:10 Yixun Lan
2019-04-03  4:55 Yixun Lan
2019-03-28  5:44 Yixun Lan
2019-03-25  5:11 Aaron Bauman
2019-03-24 20:33 Aaron Bauman
2019-03-15 22:49 Thomas Deutschmann
2019-03-08 12:39 Mikle Kolyada
2019-03-07 13:35 Yixun Lan
2019-03-07 13:35 Yixun Lan
2019-03-07 13:35 Yixun Lan
2019-03-07 13:35 Yixun Lan
2019-02-16 13:59 Yixun Lan
2019-02-16 13:59 Yixun Lan
2019-02-13 13:41 Thomas Deutschmann
2019-01-19  3:22 Thomas Deutschmann
2018-12-15 14:13 Yixun Lan
2018-11-23 10:14 Agostino Sarubbo
2018-11-21 22:55 Yixun Lan
2018-11-21 22:55 Yixun Lan
2018-11-21 22:55 Yixun Lan
2018-11-11 10:55 Mikle Kolyada
2018-11-10 20:57 Thomas Deutschmann
2018-11-10 20:57 Thomas Deutschmann
2018-11-10 20:57 Thomas Deutschmann
2018-10-02 11:03 Thomas Deutschmann
2018-10-02 11:03 Thomas Deutschmann
2018-09-18  7:24 Agostino Sarubbo
2018-09-10 11:09 Thomas Deutschmann
2018-09-10  9:36 Thomas Deutschmann
2018-09-09 20:41 Thomas Deutschmann
2018-08-14  1:20 Yixun Lan
2018-08-14  1:20 Yixun Lan
2018-08-14  1:20 Yixun Lan
2018-07-17 11:07 Mikle Kolyada
2018-04-26 21:07 Mikle Kolyada
2018-04-20  5:54 Yixun Lan
2018-04-09  0:03 Aaron Bauman
2018-03-13  4:12 Yixun Lan
2018-03-13  4:12 Yixun Lan
2018-01-14 15:30 Agostino Sarubbo
2017-12-05  2:24 Yixun Lan
2017-12-05  2:24 Yixun Lan
2017-12-05  2:24 Yixun Lan
2017-11-22  1:45 Yixun Lan
2017-11-22  1:45 Yixun Lan
2017-11-08 13:38 Agostino Sarubbo
2017-11-03 18:05 Yixun Lan
2017-11-03 10:08 Yixun Lan
2017-10-13  8:05 Yixun Lan
2017-10-13  8:05 Yixun Lan
2017-09-30  5:40 Yixun Lan
2017-09-30  5:40 Yixun Lan
2017-09-04  1:37 Yixun Lan
2017-07-31  9:01 Tobias Klausmann
2017-05-11 10:26 Yixun Lan
2017-05-10 15:44 Agostino Sarubbo
2017-05-10  9:32 Agostino Sarubbo
2017-05-03  1:41 Yixun Lan
2017-05-02  9:01 Yixun Lan
2017-04-09  0:10 Yixun Lan
2017-02-24  9:35 Yixun Lan
2017-02-16 18:35 Yixun Lan
2017-02-16 17:16 Agostino Sarubbo
2017-02-15  7:54 Yixun Lan
2016-12-28  9:06 Yixun Lan
2016-12-24  9:47 Agostino Sarubbo
2016-12-21 15:32 Yixun Lan
2016-12-13 15:23 Yixun Lan
2016-12-13 15:23 Yixun Lan
2016-12-13 15:09 Yixun Lan
2016-12-13 11:05 Agostino Sarubbo
2016-12-08  3:19 Yixun Lan
2016-12-07  1:45 Yixun Lan
2016-11-28  4:13 Yixun Lan
2016-11-26 10:36 Agostino Sarubbo
2016-11-22 12:41 Yixun Lan
2016-11-15 10:12 Yixun Lan
2016-11-11  7:23 Yixun Lan
2016-11-04 10:15 Yixun Lan
2016-11-04  8:21 Agostino Sarubbo
2016-10-05  9:48 Yixun Lan
2016-09-12  5:20 Yixun Lan
2016-09-10 12:48 Agostino Sarubbo
2016-09-09  1:17 Yixun Lan
2016-07-28 14:51 Agostino Sarubbo
2016-07-27  1:21 Yixun Lan
2016-06-27  7:38 Yixun Lan
2016-06-07  5:47 Yixun Lan
2016-05-20  4:41 Ian Delaney
2016-05-18  5:31 Patrick Lauer
2016-05-15  3:13 Ian Delaney
2016-04-26 12:33 Ian Delaney
2016-04-26  8:01 Patrice Clement
2016-04-26  7:15 Patrice Clement
2016-04-23 10:05 Ian Delaney
2016-04-14 12:07 Ian Delaney
2016-03-15 13:39 Ian Delaney
2016-03-15  8:11 Agostino Sarubbo
2016-02-19 16:08 Ian Delaney
2016-02-18  3:17 Yixun Lan
2016-02-18  3:17 Yixun Lan
2016-01-22  9:31 Agostino Sarubbo
2016-01-21 14:16 Ian Delaney
2016-01-12 14:24 Ian Delaney
2016-01-12 13:21 Ian Delaney
2016-01-08 21:23 Doug Goldstein
2016-01-07  2:33 Doug Goldstein
2016-01-05 11:23 Agostino Sarubbo
2016-01-03  0:20 Ian Delaney
2015-12-27  1:23 Ian Delaney
2015-12-23  2:21 Ian Delaney
2015-12-17 13:59 Ian Delaney
2015-12-14 14:12 Agostino Sarubbo
2015-12-09  7:06 Ian Delaney
2015-12-09  6:40 Ian Delaney
2015-12-09  5:31 Ian Delaney
2015-12-09  5:31 Ian Delaney
2015-12-06 23:27 Doug Goldstein
2015-12-06  5:35 Doug Goldstein
2015-12-06  5:35 Doug Goldstein
2015-12-06  5:35 Doug Goldstein
2015-12-06  5:35 Doug Goldstein
2015-12-06  5:35 Doug Goldstein
2015-12-04 19:38 Doug Goldstein
2015-12-03 13:13 Ian Delaney
2015-11-29  7:57 Ian Delaney
2015-11-11  8:54 Agostino Sarubbo
2015-11-10 10:07 Ian Delaney
2015-11-10  8:56 Agostino Sarubbo
2015-11-10  8:50 Agostino Sarubbo
2015-11-05  7:54 Yixun Lan

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1499844355.7a8fc554850ee501e1ad705b4154874adf102947.dlan@gentoo \
    --to=dlan@gentoo.org \
    --cc=gentoo-commits@lists.gentoo.org \
    --cc=gentoo-dev@lists.gentoo.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox