Xen Virtualization: Hypervisor (aka VMM aka Microkernel)

Edit Package xen.3878

Xen is a virtual machine monitor for x86 that supports execution of
multiple guest operating systems with unprecedented levels of
performance and resource isolation.

This package contains the Xen Hypervisor. (tm)

Modern computers are sufficiently powerful to use virtualization to
present the illusion of many smaller virtual machines (VMs), each
running a separate operating system instance. Successful partitioning
of a machine to support the concurrent execution of multiple operating
systems poses several challenges. Firstly, virtual machines must be
isolated from one another: It is not acceptable for the execution of
one to adversely affect the performance of another. This is
particularly true when virtual machines are owned by mutually
untrusting users. Secondly, it is necessary to support a variety of
different operating systems to accommodate the heterogeneity of popular
applications. Thirdly, the performance overhead introduced by
virtualization should be small.

Xen uses a technique called paravirtualization: The guest OS is
modified, mainly to enhance performance.

The Xen hypervisor (microkernel) does not provide device drivers for
your hardware (except for CPU and memory). This job is left to the
kernel that's running in domain 0. Thus the domain 0 kernel is
privileged; it has full hardware access. It's started immediately after
Xen starts up. Other domains have no access to the hardware; instead
they use virtual interfaces that are provided by Xen (with the help of
the domain 0 kernel).

Xen does support booting other Operating Systems; ports of NetBSD
(Christian Limpach), FreeBSD (Kip Macy), and Plan 9 (Ron Minnich)
exist. A port of Windows XP was developed for an earlier version of
Xen, but is not available for release due to license restrictions.

In addition to this package you need to install the kernel-xen and
xen-tools to use Xen. Xen 3 also supports running unmodified guests
using full virtualization, if appropriate hardware is present. Install
xen-tools-ioemu if you want to use this.

[Hypervisor is a trademark of IBM]

Refresh
Refresh
Source Files
Filename Size Changed
0001-libxc-Rework-extra-module-initialisation.patch 0000006245 6.1 KB
0001-net-move-the-tap-buffer-into-TAPState.patch 0000001793 1.75 KB
0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch 0000009540 9.32 KB
0002-net-increase-tap-buffer-size.patch 0000001383 1.35 KB
0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch 0000001418 1.38 KB
0003-e1000-fix-access-4-bytes-beyond-buffer-end.patch 0000001690 1.65 KB
0004-e1000-secrc-support.patch 0000001778 1.74 KB
0004-firmware-makefile-install-BIOS-blob.patch 0000001393 1.36 KB
0005-e1000-multi-buffer-packet-support.patch 0000004051 3.96 KB
0005-libxl-Load-guest-BIOS-from-file.patch 0000008075 7.89 KB
0006-e1000-clear-EOP-for-multi-buffer-descriptors.patch 0000002393 2.34 KB
0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch 0000004890 4.78 KB
0007-e1000-verify-we-have-buffers-upfront.patch 0000003055 2.98 KB
0007-hvmloader-Grab-the-hvm_start_info-pointer.patch 0000002104 2.05 KB
0008-e1000-check-buffer-availability.patch 0000001585 1.55 KB
0008-hvmloader-Locate-the-BIOS-blob.patch 0000004960 4.84 KB
0009-hvmloader-Check-modules-whereabouts-in-perform_tests.patch 0000001674 1.63 KB
0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch 0000003705 3.62 KB
0011-hvmloader-Load-OVMF-from-modules.patch 0000004244 4.14 KB
0012-hvmloader-Specific-bios_load-function-required.patch 0000001813 1.77 KB
0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch 0000001980 1.93 KB
0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch 0000002836 2.77 KB
57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch 0000005851 5.71 KB
576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 0000001946 1.9 KB
5769106e-x86-generate-assembler-equates-for-synthesized.patch 0000005751 5.62 KB
57a1e603-x86-time-adjust-local-system-time-initialization.patch 0000003708 3.62 KB
57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 0000008733 8.53 KB
57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch 0000009314 9.1 KB
57a30261-x86-support-newer-Intel-CPU-models.patch 0000006506 6.35 KB
5810a9cc-x86-emul-Correct-decoding-of-SReg3-operands.patch 0000005833 5.7 KB
581b2c3b-x86-emul-reject-LGDT-LIDT-with-non-canonical-addresses.patch 0000000975 975 Bytes
581b647a-x86emul-L-S-G-I-DT-ignore-opsz-overrides-in-64-bit-mode.patch 0000002026 1.98 KB
58249392-x86-svm-dont-clobber-eax-edx-if-RDMSR-intercept-fails.patch 0000002680 2.62 KB
582c35d6-x86-vmx-correct-long-mode-check-in-vmx_cpuid_intercept.patch 0000001438 1.4 KB
582c35ee-x86-traps-dont-call-hvm_hypervisor_cpuid_leaf-for-PV.patch 0000000907 907 Bytes
58343dc2-x86-hvm-Fix-the-handling-of-non-present-segments.patch 0000005906 5.77 KB
58343df8-x86-HVM-dont-load-LDTR-with-VM86-mode-attrs-during-task-switch.patch 0000002650 2.59 KB
58343e24-x86-PV-writes-of-fs-and-gs-base-MSRs-require-canonical-addresses.patch 0000003493 3.41 KB
58343e9e-libelf-fix-stack-memory-leak-when-loading-32-bit-symbol-tables.patch 0000005610 5.48 KB
58343ec2-x86emul-fix-huge-bit-offset-handling.patch 0000002127 2.08 KB
58343f29-x86-emul-correct-the-IDT-entry-calculation-in-inject_swint.patch 0000002949 2.88 KB
58343f44-x86-svm-fix-injection-of-software-interrupts.patch 0000003551 3.47 KB
58343f79-pygrub-Properly-quote-results-when-returning-them-to-the-caller.patch 0000002211 2.16 KB
CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch 0000001794 1.75 KB
CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch 0000001899 1.85 KB
CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch 0000001377 1.34 KB
CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch 0000001038 1.01 KB
CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch 0000001665 1.63 KB
CVE-2014-0222-blktap-qcow1-validate-l2-table-size.patch 0000001545 1.51 KB
CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch 0000001647 1.61 KB
CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch 0000001601 1.56 KB
CVE-2015-4037-qemut-smb-config-dir-name.patch 0000001554 1.52 KB
CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch 0000002028 1.98 KB
CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch 0000001204 1.18 KB
CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch 0000001184 1.16 KB
CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch 0000001091 1.07 KB
CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch 0000002383 2.33 KB
CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch 0000001137 1.11 KB
CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch 0000002031 1.98 KB
CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch 0000004302 4.2 KB
CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch 0000001841 1.8 KB
CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch 0000001136 1.11 KB
CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch 0000001246 1.22 KB
CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch 0000001843 1.8 KB
CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch 0000001301 1.27 KB
CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch 0000002575 2.51 KB
CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch 0000002555 2.5 KB
CVE-2016-7908-qemut-net-Infinite-loop-in-mcf_fec_do_tx.patch 0000001803 1.76 KB
CVE-2016-7909-qemut-net-pcnet-infinite-loop-in-pcnet_rdra_addr.patch 0000001098 1.07 KB
CVE-2016-8667-qemut-dma-rc4030-divide-by-zero-error-in-set_next_tick.patch 0000001044 1.02 KB
CVE-2016-8669-qemut-char-divide-by-zero-error-in-serial_update_parameters.patch 0000001185 1.16 KB
CVE-2016-8910-qemut-net-rtl8139-infinite-loop-while-transmit-in-Cplus-mode.patch 0000001201 1.17 KB
CVE-2016-9381-xsa197-qemut.patch 0000002173 2.12 KB
CVE-2016-9637-xsa199-qemut.patch 0000003209 3.13 KB
README.SUSE 0000030178 29.5 KB
VNC-Support-for-ExtendedKeyEvent-client-message.patch 0000005002 4.88 KB
aarch64-rename-PSR_MODE_ELxx-to-match-linux-headers.patch 0000001368 1.34 KB
altgr_2.patch 0000001869 1.83 KB
baselibs.conf 0000000009 9 Bytes
bdrv_default_rwflag.patch 0000001092 1.07 KB
bdrv_open2_fix_flags.patch 0000005021 4.9 KB
bdrv_open2_flags_2.patch 0000002185 2.13 KB
blktap.patch 0000001466 1.43 KB
blktap2-no-uninit.patch 0000000423 423 Bytes
block-dmmd 0000008941 8.73 KB
block-npiv 0000003588 3.5 KB
block-npiv-common.sh 0000007967 7.78 KB
block-npiv-vport 0000002101 2.05 KB
boot.local.xenU 0000001987 1.94 KB
boot.xen 0000002385 2.33 KB
capslock_enable.patch 0000000632 632 Bytes
cdrom-removable.patch 0000003489 3.41 KB
etc_pam.d_xen-api 0000000265 265 Bytes
hibernate.patch 0000001420 1.39 KB
init.pciback 0000002530 2.47 KB
init.xen_loop 0000000093 93 Bytes
ioemu-disable-emulated-ide-if-pv.patch 0000002734 2.67 KB
ioemu-disable-scsi.patch 0000004049 3.95 KB
ioemu-hvm-pv-support.patch 0000003305 3.23 KB
ioemu-vnc-resize.patch 0000001145 1.12 KB
ioemu-watchdog-ib700-timer.patch 0000001439 1.41 KB
ioemu-watchdog-linkage.patch 0000002901 2.83 KB
ioemu-watchdog-support.patch 0000031665 30.9 KB
ipxe-enable-nics.patch 0000000371 371 Bytes
ipxe-no-error-logical-not-parentheses.patch 0000001078 1.05 KB
ipxe-use-rpm-opt-flags.patch 0000001118 1.09 KB
ipxe.tar.bz2 0002877627 2.74 MB
kernel-boot-hvm.patch 0000008627 8.42 KB
kmp_filelist 0000000042 42 Bytes
libxl.add-option-to-disable-disk-cache-flushes-in-qdisk.patch 0000003912 3.82 KB
libxl.pvscsi.patch 0000086051 84 KB
libxl.set-migration-constraints-from-cmdline.patch 0000021566 21.1 KB
log-guest-console.patch 0000004247 4.15 KB
logrotate.conf 0000000259 259 Bytes
mini-os.tar.bz2 0000255793 250 KB
pvdrv_emulation_control.patch 0000001066 1.04 KB
pygrub-boot-legacy-sles.patch 0000002506 2.45 KB
pygrub-handle-one-line-menu-entries.patch 0000002474 2.42 KB
pygrub-netware-xnloader.patch 0000000722 722 Bytes
qemu-dm-segfault.patch 0000001803 1.76 KB
qemu-ifup-set-mtu.patch 0000000556 556 Bytes
qemu-security-etch1.patch 0000001450 1.42 KB
qemu-xen-traditional-dir-remote.tar.bz2 0003237634 3.09 MB
stdvga-cache.patch 0000000750 750 Bytes
stubdom-have-iovec.patch 0000000800 800 Bytes
stubdom.tar.bz2 0017476993 16.7 MB
supported_module.patch 0000000420 420 Bytes
suspend_evtchn_lock.patch 0000002107 2.06 KB
sysconfig.pciback 0000000237 237 Bytes
tmp_build.patch 0000001336 1.3 KB
vif-bridge-no-iptables.patch 0000000350 350 Bytes
vif-bridge-tap-fix.patch 0000000969 969 Bytes
vif-route.patch 0000000527 527 Bytes
x86-cpufreq-report.patch 0000002854 2.79 KB
x86-ioapic-ack-default.patch 0000000757 757 Bytes
xen-4.7.1-testing-src.tar.bz2 0004472772 4.27 MB
xen-arch-kconfig-nr_cpus.patch 0000000399 399 Bytes
xen-destdir.patch 0000002160 2.11 KB
xen-disable-qemu-monitor.patch 0000003064 2.99 KB
xen-dom0-modules.service 0000000468 468 Bytes
xen-hvm-default-bridge.patch 0000003491 3.41 KB
xen-qemu-iscsi-fix.patch 0000002843 2.78 KB
xen-utils-0.1.tar.bz2 0000006272 6.13 KB
xen.build-compare.doc_html.patch 0000001203 1.17 KB
xen.build-compare.man.patch 0000000645 645 Bytes
xen.changes 0000394142 385 KB
xen.libxl.dmmd.patch 0000004675 4.57 KB
xen.spec 0000044536 43.5 KB
xen.stubdom.newlib.patch 0000004437 4.33 KB
xen2libvirt.py 0000004835 4.72 KB
xen_pvonhvm.xen_emul_unplug.patch 0000001496 1.46 KB
xenapiusers 0000000005 5 Bytes
xencommons.service 0000000912 912 Bytes
xenconsole-no-multiple-connections.patch 0000000931 931 Bytes
xenpaging.doc.patch 0000002658 2.6 KB
xenpaging.qemu.flush-cache.patch 0000001332 1.3 KB
xl-conf-default-bridge.patch 0000000537 537 Bytes
xnloader.py 0000001875 1.83 KB
xsa200.patch 0000002240 2.19 KB
xsa202.patch 0000002909 2.84 KB
xsa203.patch 0000000712 712 Bytes
xsa204.patch 0000002800 2.73 KB
Latest Revision
Peter Simons's avatar Peter Simons (psimons) committed (revision 1)
Release from SUSE:Maintenance:3878 / xen.SUSE_SLE-12-SP2_Update
Comments 0
openSUSE Build Service is sponsored by