Xen Virtualization: Hypervisor (aka VMM aka Microkernel)

Edit Package xen.2142

Xen is a virtual machine monitor for x86 that supports execution of
multiple guest operating systems with unprecedented levels of
performance and resource isolation.

This package contains the Xen Hypervisor. (tm)

Modern computers are sufficiently powerful to use virtualization to
present the illusion of many smaller virtual machines (VMs), each
running a separate operating system instance. Successful partitioning
of a machine to support the concurrent execution of multiple operating
systems poses several challenges. Firstly, virtual machines must be
isolated from one another: It is not acceptable for the execution of
one to adversely affect the performance of another. This is
particularly true when virtual machines are owned by mutually
untrusting users. Secondly, it is necessary to support a variety of
different operating systems to accommodate the heterogeneity of popular
applications. Thirdly, the performance overhead introduced by
virtualization should be small.

Xen uses a technique called paravirtualization: The guest OS is
modified, mainly to enhance performance.

The Xen hypervisor (microkernel) does not provide device drivers for
your hardware (except for CPU and memory). This job is left to the
kernel that's running in domain 0. Thus the domain 0 kernel is
privileged; it has full hardware access. It's started immediately after
Xen starts up. Other domains have no access to the hardware; instead
they use virtual interfaces that are provided by Xen (with the help of
the domain 0 kernel).

Xen does support booting other Operating Systems; ports of NetBSD
(Christian Limpach), FreeBSD (Kip Macy), and Plan 9 (Ron Minnich)
exist. A port of Windows XP was developed for an earlier version of
Xen, but is not available for release due to license restrictions.

In addition to this package you need to install the kernel-xen and
xen-tools to use Xen. Xen 3 also supports running unmodified guests
using full virtualization, if appropriate hardware is present. Install
xen-tools-ioemu if you want to use this.

[Hypervisor is a trademark of IBM]

Refresh
Refresh
Source Files
Filename Size Changed
0001-net-move-the-tap-buffer-into-TAPState.patch 0000001793 1.75 KB
0002-net-increase-tap-buffer-size.patch 0000001383 1.35 KB
0003-e1000-fix-access-4-bytes-beyond-buffer-end.patch 0000001690 1.65 KB
0004-e1000-secrc-support.patch 0000001778 1.74 KB
0005-e1000-multi-buffer-packet-support.patch 0000004051 3.96 KB
0006-e1000-clear-EOP-for-multi-buffer-descriptors.patch 0000002393 2.34 KB
0007-e1000-verify-we-have-buffers-upfront.patch 0000003055 2.98 KB
0008-e1000-check-buffer-availability.patch 0000001585 1.55 KB
54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 0000001810 1.77 KB
54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 0000011896 11.6 KB
54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch 0000004857 4.74 KB
54f4985f-libxl-fix-libvirtd-double-free.patch 0000002681 2.62 KB
55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 0000004814 4.7 KB
551ac326-xentop-add-support-for-qdisk.patch 0000019315 18.9 KB
552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 0000001153 1.13 KB
552d0fe8-x86-mtrr-include-asm-atomic.h.patch 0000000651 651 Bytes
552d293b-x86-vMSI-X-honor-all-mask-requests.patch 0000001962 1.92 KB
552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 0000002174 2.12 KB
5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch 0000000934 934 Bytes
5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 0000001168 1.14 KB
5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch 0000011618 11.3 KB
554c7aee-x86-provide-arch_fetch_and_add.patch 0000002002 1.96 KB
554c7b00-arm-provide-arch_fetch_and_add.patch 0000000884 884 Bytes
554cc211-libxl-add-qxl.patch 0000006477 6.33 KB
55534b0a-x86-provide-add_sized.patch 0000002753 2.69 KB
55534b25-arm-provide-add_sized.patch 0000002858 2.79 KB
5555a4f8-use-ticket-locks-for-spin-locks.patch 0000009043 8.83 KB
5555a5b9-x86-arm-remove-asm-spinlock-h.patch 0000007048 6.88 KB
5555a8ec-introduce-non-contiguous-allocation.patch 0000004606 4.5 KB
556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch 0000000865 865 Bytes
5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 0000006237 6.09 KB
55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 0000003179 3.1 KB
557eb55f-gnttab-per-active-entry-locking.patch 0000018694 18.3 KB
557eb5b6-gnttab-introduce-maptrack-lock.patch 0000003071 3 KB
557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 0000023485 22.9 KB
557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 0000001386 1.35 KB
5582bf43-evtchn-simplify-port_is_valid.patch 0000002281 2.23 KB
5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 0000001034 1.01 KB
5583d9c5-x86-MSI-X-cleanup.patch 0000010669 10.4 KB
5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 0000015270 14.9 KB
5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch 0000009392 9.17 KB
5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch 0000004739 4.63 KB
5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch 0000003113 3.04 KB
5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch 0000003088 3.02 KB
5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch 0000006781 6.62 KB
5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch 0000000909 909 Bytes
55b0a218-x86-PCI-CFG-write-intercept.patch 0000004561 4.45 KB
55b0a255-x86-MSI-X-maskall.patch 0000002671 2.61 KB
55b0a283-x86-MSI-X-teardown.patch 0000012458 12.2 KB
55b0a2ab-x86-MSI-X-enable.patch 0000013604 13.3 KB
55b0a2db-x86-MSI-track-guest-masking.patch 0000001795 1.75 KB
55c322f9-VT-d-add-iommu-igfx-option-to-workaround-graphics-issues.patch 0000003672 3.59 KB
55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch 0000004102 4.01 KB
5604f239-x86-PV-properly-populate-descriptor-tables.patch 0000003716 3.63 KB
561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 0000003679 3.59 KB
5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 0000001425 1.39 KB
56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 0000002542 2.48 KB
5641ceec-x86-HVM-always-intercept-AC-and-DB.patch 0000005192 5.07 KB
5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 0000000723 723 Bytes
5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch 0000004429 4.33 KB
56544a57-VMX-fix-adjust-trap-injection.patch 0000003224 3.15 KB
56546ab2-sched-fix-insert_vcpu-locking.patch 0000003411 3.33 KB
56549f24-x86-vPMU-document-as-unsupported.patch 0000000829 829 Bytes
565efe09-x86-ept-remove-unnecessary-sync-after-resolving-misconfigured-entries.patch 0000002942 2.87 KB
566052a6-VT-d-drop-unneeded-Ivybridge-quirk-workaround.patch 0000000996 996 Bytes
566698e6-x86-time-fix-domain-type-check-in-tsc_set_info.patch 0000000846 846 Bytes
5666d471-memory-split-and-tighten-maximum-order-permitted-in-memops.patch 0000008384 8.19 KB
5666d4b7-memory-fix-XENMEM_exchange-error-handling.patch 0000001926 1.88 KB
5672b705-x86-don-t-leak-ST-n-XMMn-values-to-domains-first-using-them.patch 0000002530 2.47 KB
5672b726-x86-HVM-avoid-reading-ioreq-state-more-than-once.patch 0000001898 1.85 KB
568ba8f8-x86-vmx-Fix-injection-of-DB-traps-following-XSA-156.patch 0000002715 2.65 KB
569f8253-x86-mm-PV-superpage-handling-lacks-sanity-checks.patch 0000002580 2.52 KB
569f8282-x86-VMX-prevent-INVVPID-failure-due-to-non-canonical-guest-addr.patch 0000001189 1.16 KB
56a0f4a2-x86-mmuext-tighten-TLB-flush-address-checks.patch 0000002384 2.33 KB
56a0f4f2-x86-constrain-MFN-range-Dom0-may-access.patch 0000001515 1.48 KB
56a0f508-x86-fix-and-simplify-MTRR-overlap-checking.patch 0000005844 5.71 KB
56b0a884-x86-vmx-don-t-clobber-exception_bitmap-for-emulated-real-mode.patch 0000002903 2.83 KB
56b0a90a-credit-update-timeslice-under-lock.patch 0000001454 1.42 KB
56b0a92c-recalculate-cpupool-credits-when-updating-timeslice.patch 0000001053 1.03 KB
56b1fca0-x86-PV-m2p-strict-vs-migration-v2.patch 0000004692 4.58 KB
56b9d9f5-x86-nHVM-avoid-NULL-deref-during-INVLPG-intercept.patch 0000001602 1.56 KB
56bb3f45-hvmloader-fix-scratch_alloc-to-avoid-overlaps.patch 0000000920 920 Bytes
CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch 0000001794 1.75 KB
CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch 0000001899 1.85 KB
CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch 0000001377 1.34 KB
CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch 0000001038 1.01 KB
CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch 0000001665 1.63 KB
CVE-2014-0222-blktap-qcow1-validate-l2-table-size.patch 0000002214 2.16 KB
CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch 0000001647 1.61 KB
CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch 0000001601 1.56 KB
CVE-2014-3689-qemut-vmware-vga-turn-off-hw-accel.patch 0000001211 1.18 KB
CVE-2014-3689-qemuu-vmware-vga-vmsvga_copy_rect.patch 0000002366 2.31 KB
CVE-2014-3689-qemuu-vmware-vga-vmsvga_fill_rect.patch 0000002177 2.13 KB
CVE-2014-3689-qemuu-vmware-vga-vmsvga_update_rect.patch 0000002192 2.14 KB
CVE-2014-3689-qemuu-vmware-vga-vmsvga_verify_rect.patch 0000002667 2.6 KB
CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch 0000001398 1.37 KB
CVE-2014-9718-qemuu-PRDT-overflow-from-guest-to-host.patch 0000012308 12 KB
CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch 0000008503 8.3 KB
CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch 0000002407 2.35 KB
CVE-2015-4037-qemut-smb-config-dir-name.patch 0000001554 1.52 KB
CVE-2015-4037-qemuu-smb-config-dir-name.patch 0000001852 1.81 KB
CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch 0000002028 1.98 KB
CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch 0000001204 1.18 KB
CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch 0000001184 1.16 KB
CVE-2015-6855-qemuu-ide-divide-by-zero-issue.patch 0000007016 6.85 KB
CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch 0000001091 1.07 KB
CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch 0000001068 1.04 KB
CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch 0000003333 3.25 KB
CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch 0000002383 2.33 KB
CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch 0000002145 2.09 KB
CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch 0000001137 1.11 KB
CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch 0000001072 1.05 KB
CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch 0000001321 1.29 KB
CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch 0000003056 2.98 KB
CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch 0000001155 1.13 KB
CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch 0000004404 4.3 KB
CVE-2015-8743-qemut-ne2000-OOB-memory-access-in-ioport-rw-functions.patch 0000001554 1.52 KB
CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch 0000001654 1.62 KB
CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch 0000002826 2.76 KB
CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch 0000001369 1.34 KB
CVE-2015-8817-qemuu-OOB-access-in-address_space_rw-leads-to-segmentation-fault.patch 0000002211 2.16 KB
CVE-2015-8818-qemuu-OOB-access-in-address_space_rw-leads-to-segmentation-fault.patch 0000004011 3.92 KB
CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch 0000001730 1.69 KB
CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch 0000002031 1.98 KB
CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch 0000002046 2 KB
CVE-2016-1922-qemuu-i386-null-pointer-dereference-in-vapic_write.patch 0000002184 2.13 KB
CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch 0000004302 4.2 KB
CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch 0000004320 4.22 KB
CVE-2016-2198-qemuu-usb-ehci-null-pointer-dereference-in-ehci_caps_write.patch 0000001344 1.31 KB
CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch 0000001841 1.8 KB
CVE-2016-2391-qemuu-usb-null-pointer-dereference-in-ohci-module.patch 0000001771 1.73 KB
CVE-2016-2392-qemuu-usb-null-pointer-dereference-in-NDIS-message-handling.patch 0000001086 1.06 KB
CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch 0000002444 2.39 KB
CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch 0000001136 1.11 KB
CVE-2016-2841-qemuu-ne2000-infinite-loop-in-ne2000_receive.patch 0000001112 1.09 KB
README.SUSE 0000030178 29.5 KB
VNC-Support-for-ExtendedKeyEvent-client-message.patch 0000005002 4.88 KB
aarch64-rename-PSR_MODE_ELxx-to-match-linux-headers.patch 0000001313 1.28 KB
altgr_2.patch 0000001869 1.83 KB
baselibs.conf 0000000009 9 Bytes
bdrv_default_rwflag.patch 0000001092 1.07 KB
bdrv_open2_fix_flags.patch 0000005021 4.9 KB
bdrv_open2_flags_2.patch 0000003062 2.99 KB
blktap-no-uninit.patch 0000000889 889 Bytes
blktap-pv-cdrom.patch 0000024008 23.4 KB
blktap.patch 0000001466 1.43 KB
blktapctrl-close-fifos.patch 0000000648 648 Bytes
blktapctrl-default-to-ioemu.patch 0000000944 944 Bytes
blktapctrl-disable-debug-printf.patch 0000001014 1014 Bytes
block-dmmd 0000005804 5.67 KB
block-iscsi 0000002109 2.06 KB
block-nbd 0000000673 673 Bytes
block-npiv 0000003588 3.5 KB
block-npiv-common.sh 0000007967 7.78 KB
block-npiv-vport 0000002101 2.05 KB
boot.local.xenU 0000001987 1.94 KB
boot.xen 0000002385 2.33 KB
build-tapdisk-ioemu.patch 0000005376 5.25 KB
capslock_enable.patch 0000000632 632 Bytes
cdrom-removable.patch 0000003489 3.41 KB
etc_pam.d_xen-api 0000000265 265 Bytes
hibernate.patch 0000001420 1.39 KB
hotplug-Linux-block-performance-fix.patch 0000006532 6.38 KB
init.pciback 0000002530 2.47 KB
init.xen_loop 0000000093 93 Bytes
ioemu-bdrv-open-CACHE_WB.patch 0000000818 818 Bytes
ioemu-blktap-barriers.patch 0000002227 2.17 KB
ioemu-blktap-fv-init.patch 0000000738 738 Bytes
ioemu-blktap-image-format.patch 0000003002 2.93 KB
ioemu-blktap-zero-size.patch 0000001146 1.12 KB
ioemu-disable-emulated-ide-if-pv.patch 0000002734 2.67 KB
ioemu-disable-scsi.patch 0000003510 3.43 KB
ioemu-hvm-pv-support.patch 0000002519 2.46 KB
ioemu-vnc-resize.patch 0000001145 1.12 KB
ioemu-watchdog-ib700-timer.patch 0000001439 1.41 KB
ioemu-watchdog-linkage.patch 0000002901 2.83 KB
ioemu-watchdog-support.patch 0000031665 30.9 KB
ipxe-enable-nics.patch 0000000371 371 Bytes
ipxe-no-error-logical-not-parentheses.patch 0000000902 902 Bytes
ipxe.tar.bz2 0002877798 2.74 MB
kernel-boot-hvm.patch 0000008688 8.48 KB
kmp_filelist 0000000042 42 Bytes
libxl.add-option-to-disable-disk-cache-flushes-in-qdisk.patch 0000003868 3.78 KB
libxl.pvscsi.patch 0000045102 44 KB
libxl.set-migration-constraints-from-cmdline.patch 0000021158 20.7 KB
local_attach_support_for_phy.patch 0000002387 2.33 KB
log-guest-console.patch 0000004248 4.15 KB
logrotate.conf 0000000259 259 Bytes
magic_ioport_compat.patch 0000000746 746 Bytes
pci-attach-fix.patch 0000001036 1.01 KB
pvdrv_emulation_control.patch 0000001066 1.04 KB
pygrub-boot-legacy-sles.patch 0000002500 2.44 KB
pygrub-netware-xnloader.patch 0000000722 722 Bytes
qemu-dm-segfault.patch 0000002639 2.58 KB
qemu-ifup-set-mtu.patch 0000000556 556 Bytes
qemu-security-etch1.patch 0000001450 1.42 KB
qemu-xen-dir-remote.tar.bz2 0008176355 7.8 MB
qemu-xen-enable-spice-support.patch 0000000442 442 Bytes
qemu-xen-traditional-dir-remote.tar.bz2 0003231045 3.08 MB
qemu-xen-upstream-megasas-buildtime.patch 0000001025 1 KB
qemu-xen-upstream-qdisk-cache-unsafe.patch 0000001739 1.7 KB
seabios-dir-remote.tar.bz2 0000444597 434 KB
set-mtu-from-bridge-for-tap-interface.patch 0000001443 1.41 KB
stdvga-cache.patch 0000000750 750 Bytes
stubdom.tar.bz2 0017477301 16.7 MB
supported_module.patch 0000000420 420 Bytes
suspend_evtchn_lock.patch 0000002107 2.06 KB
sysconfig.pciback 0000000237 237 Bytes
tapdisk-ioemu-logfile.patch 0000001389 1.36 KB
tapdisk-ioemu-shutdown-fix.patch 0000002943 2.87 KB
tigervnc-long-press.patch 0000001243 1.21 KB
tmp_build.patch 0000001533 1.5 KB
udev-rules.patch 0000000844 844 Bytes
vif-bridge-no-iptables.patch 0000000350 350 Bytes
vif-bridge-tap-fix.patch 0000000969 969 Bytes
x86-cpufreq-report.patch 0000002838 2.77 KB
x86-ioapic-ack-default.patch 0000000757 757 Bytes
xen-4.5.2-testing-src.tar.bz2 0004124919 3.93 MB
xen-c99-fix.patch 0000000681 681 Bytes
xen-destdir.patch 0000001727 1.69 KB
xen-disable-qemu-monitor.patch 0000003064 2.99 KB
xen-dom0-modules.service 0000000467 467 Bytes
xen-hvm-default-bridge.patch 0000003491 3.41 KB
xen-qemu-iscsi-fix.patch 0000002843 2.78 KB
xen-utils-0.1.tar.bz2 0000006171 6.03 KB
xen.build-compare.doc_html.patch 0000001200 1.17 KB
xen.build-compare.ipxe.patch 0000001523 1.49 KB
xen.build-compare.man.patch 0000000645 645 Bytes
xen.build-compare.mini-os.patch 0000001208 1.18 KB
xen.build-compare.seabios.patch 0000000732 732 Bytes
xen.build-compare.smbiosdate.patch 0000000930 930 Bytes
xen.build-compare.vgabios.patch 0000000585 585 Bytes
xen.build-compare.xen_compile_h.patch 0000001261 1.23 KB
xen.changes 0000377659 369 KB
xen.libxl.dmmd.patch 0000005276 5.15 KB
xen.spec 0000047416 46.3 KB
xen.stubdom.newlib.patch 0000004388 4.29 KB
xen2libvirt.py 0000004835 4.72 KB
xen_pvonhvm.xen_emul_unplug.patch 0000001496 1.46 KB
xenalyze.hg.tar.bz2 0000126674 124 KB
xenapiusers 0000000005 5 Bytes
xencommons.service 0000000912 912 Bytes
xenconsole-no-multiple-connections.patch 0000000929 929 Bytes
xendomains-libvirtd-conflict.patch 0000000732 732 Bytes
xenpaging.doc.patch 0000002658 2.6 KB
xenpaging.qemu.flush-cache.patch 0000001334 1.3 KB
xl-conf-default-bridge.patch 0000000537 537 Bytes
xl-coredump-file-location.patch 0000000873 873 Bytes
xnloader.py 0000001875 1.83 KB
xsa154.patch 0000013417 13.1 KB
xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch 0000002150 2.1 KB
xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch 0000002529 2.47 KB
xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch 0000001592 1.55 KB
xsa162-qemuu.patch 0000001535 1.5 KB
xsa164.patch 0000001450 1.42 KB
xsa170.patch 0000003392 3.31 KB
Latest Revision
Marcus Meissner's avatar Marcus Meissner (msmeissn) committed (revision 1)
Release from SUSE:Maintenance:2142 / xen.SUSE_SLE-12-SP1_Update
Comments 0
openSUSE Build Service is sponsored by