sysutils/xenkernel415 - The NetBSD Packages Collection

Xen 4.15.x Kernel

Xen is a hypervisor which supports running multiple guest operating
systems on a single machine. Guest OSes (also called "domains")
can be either paravirtualised (i.e. make hypercalls in order to
access hardware), run in HVM (Hardware Virtualisation Mode) where
they will be presented with virtual devices, or a combination where
they use hypercalls to access hardware but manage memory themselves.
At boot, the xen kernel is loaded along with the guest kernel for
the first domain (called domain0). domain0 has privileges to access
the physical hardware (PCI and ISA devices), administrate other
domains and provide virtual devices (disks and network) to other
domains.

This package contains the 4.15 Xen kernel itself.  PCI passthrough is
not supported.  PAE is mandatory; on i386 one must use XEN3PAE_DOM[0U].

This is the recommended Xen version in pkgsrc.

Build dependencies

lang/python311 lang/python311 pkgtools/mktools devel/bison devel/gmake pkgtools/cwrappers

Runtime dependencies

(none)

Binary packages

OSArchitectureVersion
NetBSD 10.0x86_64xenkernel415-4.15.5nb2.tgz
NetBSD 10.0_BETAx86_64xenkernel415-4.15.5nb1.tgz
NetBSD 8.0x86_64xenkernel415-4.15.5nb2.tgz
NetBSD 8.0x86_64xenkernel415-4.15.4.tgz
NetBSD 8.0x86_64xenkernel415-4.15.5nb2.tgz
NetBSD 9.0x86_64xenkernel415-4.15.5nb2.tgz
NetBSD 9.0x86_64xenkernel415-4.15.5nb1.tgz
NetBSD 9.0x86_64xenkernel415-4.15.5nb2.tgz
NetBSD 9.3x86_64xenkernel415-4.15.4.tgz
NetBSD 9.3x86_64xenkernel415-4.15.5nb2.tgz

Binary packages can be installed with the high-level tool pkgin (which can be installed with pkg_add) or pkg_add(1) (installed by default). The NetBSD packages collection is also designed to permit easy installation from source.

Available build options

(none)

Known vulnerabilities

The pkg_admin audit command locates any installed package which has been mentioned in security advisories as having vulnerabilities.

Please note the vulnerabilities database might not be fully accurate, and not every bug is exploitable with every configuration.


Problem reports, updates or suggestions for this package should be reported with send-pr.