Xen Virtualization: Hypervisor (aka VMM aka Microkernel)

Edit Package xen.21121

Xen is a virtual machine monitor for x86 that supports execution of
multiple guest operating systems with unprecedented levels of
performance and resource isolation.

This package contains the Xen Hypervisor. (tm)

Modern computers are sufficiently powerful to use virtualization to
present the illusion of many smaller virtual machines (VMs), each
running a separate operating system instance. Successful partitioning
of a machine to support the concurrent execution of multiple operating
systems poses several challenges. Firstly, virtual machines must be
isolated from one another: It is not acceptable for the execution of
one to adversely affect the performance of another. This is
particularly true when virtual machines are owned by mutually
untrusting users. Secondly, it is necessary to support a variety of
different operating systems to accommodate the heterogeneity of popular
applications. Thirdly, the performance overhead introduced by
virtualization should be small.

Xen uses a technique called paravirtualization: The guest OS is
modified, mainly to enhance performance.

The Xen hypervisor (microkernel) does not provide device drivers for
your hardware (except for CPU and memory). This job is left to the
kernel that's running in domain 0. Thus the domain 0 kernel is
privileged; it has full hardware access. It's started immediately after
Xen starts up. Other domains have no access to the hardware; instead
they use virtual interfaces that are provided by Xen (with the help of
the domain 0 kernel).

Xen does support booting other Operating Systems; ports of NetBSD
(Christian Limpach), FreeBSD (Kip Macy), and Plan 9 (Ron Minnich)
exist. A port of Windows XP was developed for an earlier version of
Xen, but is not available for release due to license restrictions.

In addition to this package you need to install the kernel-xen and
xen-tools to use Xen. Xen 3 also supports running unmodified guests
using full virtualization, if appropriate hardware is present. Install
xen-tools-ioemu if you want to use this.

[Hypervisor is a trademark of IBM]

Refresh
Refresh
Source Files
Filename Size Changed
0001-net-move-the-tap-buffer-into-TAPState.patch 0000001793 1.75 KB
0002-net-increase-tap-buffer-size.patch 0000001383 1.35 KB
0003-e1000-fix-access-4-bytes-beyond-buffer-end.patch 0000001690 1.65 KB
0004-e1000-secrc-support.patch 0000001778 1.74 KB
0005-e1000-multi-buffer-packet-support.patch 0000004051 3.96 KB
0006-e1000-clear-EOP-for-multi-buffer-descriptors.patch 0000002393 2.34 KB
0007-e1000-verify-we-have-buffers-upfront.patch 0000003055 2.98 KB
0008-e1000-check-buffer-availability.patch 0000001585 1.55 KB
5b8fae26-xen-fill-topology-info-for-all-present-cpus.patch 0000001631 1.59 KB
5b8fb5af-tools-xl-refuse-to-set-number-of-vcpus-to-0-via-xl-vcpu-set.patch 0000002792 2.73 KB
5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch 0000006524 6.37 KB
5b9784d2-x86-HVM-add-known_gla-helper.patch 0000003858 3.77 KB
5b9784f2-x86-HVM-split-page-straddling-accesses.patch 0000008488 8.29 KB
5ba5188c-libxl-keep-assigned-pci-devices-across-domain-reboots.patch 0000001811 1.77 KB
5c0f786c-parse_size_and_unit-percent.patch 0000000897 897 Bytes
5c0f7894-x86-dom0_mem-variants.patch 0000009338 9.12 KB
5c8fb92d-x86-HVM-split-linear-reads-and-writes.patch 0000004660 4.55 KB
5c8fb951-x86-HVM-finish-IOREQs-correctly-on-completion.patch 0000004862 4.75 KB
5d976da3-libxl-attach-PCI-device-to-qemu-only-after-setting-pciback-pcifront.patch 0000001747 1.71 KB
5ddfd62b-x86-internal-IRQs-honor-PEOI-stack.patch 0000006695 6.54 KB
5e876b0f-tools-xenstore-fix-use-after-free-in-xenstored.patch 0000002032 1.98 KB
5e958573-x86-EFI-always-fill-boot_tsc_stamp.patch 0000001273 1.24 KB
5e981e46-hvmloader-defer-enabling-MMIO-and-IO-decode.patch 0000004821 4.71 KB
5eaa8f1b-x86-pt-avoid-double-IRQ-unbind.patch 0000003159 3.08 KB
5eb182a8-x86-traps-show_guest_stack-off-by-1.patch 0000002672 2.61 KB
5eb1bbfb-x86-ucode-intel-WBINVD-before-updating.patch 0000001388 1.36 KB
5ec2a760-x86-determine-MXCSR-mask-always.patch 0000002233 2.18 KB
5ec50b05-x86-idle-rework-C6-EOI-workaround.patch 0000003737 3.65 KB
5ec7dcaa-x86-dont-enter-C6-with-in-service-intr.patch 0000003729 3.64 KB
5ec7dcf6-x86-dont-enter-C3-C6-with-errata.patch 0000002219 2.17 KB
5ec82237-x86-extend-ISR-C6-workaround-to-Haswell.patch 0000001397 1.36 KB
5ece1b91-x86-clear-RDRAND-CPUID-bit-on-AMD-fam-15-16.patch 0000005336 5.21 KB
5ece8ac4-x86-load_system_tables-NMI-MC-safe.patch 0000003340 3.26 KB
5eda60cb-SVM-split-recalc-NPT-fault-handling.patch 0000004010 3.92 KB
5edf6ad8-ioreq-pending-emulation-server-destruction-race.patch 0000002209 2.16 KB
5edfbbea-x86-spec-ctrl-CPUID-MSR-defs-for-SRBDS.patch 0000004939 4.82 KB
5edfbbea-x86-spec-ctrl-mitigate-SRBDS.patch 0000006761 6.6 KB
5ee24d0e-x86-spec-ctrl-document-SRBDS-workaround.patch 0000002025 1.98 KB
5f76caaf-evtchn-FIFO-use-stable-fields.patch 0000001355 1.32 KB
5faa974f-evtchn-rework-per-channel-lock.patch 0000017465 17.1 KB
5fbcdf2e-evtchn-FIFO-access-last.patch 0000002987 2.92 KB
5fc4ee23-evtchn-FIFO-queue-locking.patch 0000008100 7.91 KB
5fca3b32-tools-libs-ctrl-fix-dumping-of-ballooned-guest.patch 0000003637 3.55 KB
CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch 0000001794 1.75 KB
CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch 0000001899 1.85 KB
CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch 0000001377 1.34 KB
CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch 0000001038 1.01 KB
CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch 0000001665 1.63 KB
CVE-2014-0222-blktap-qcow1-validate-l2-table-size.patch 0000001545 1.51 KB
CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch 0000001647 1.61 KB
CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch 0000001601 1.56 KB
CVE-2015-4037-qemut-smb-config-dir-name.patch 0000001554 1.52 KB
CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch 0000002028 1.98 KB
CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch 0000001204 1.18 KB
CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch 0000001184 1.16 KB
CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch 0000001091 1.07 KB
CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch 0000002383 2.33 KB
CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch 0000001137 1.11 KB
CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch 0000002031 1.98 KB
CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch 0000004302 4.2 KB
CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch 0000001841 1.8 KB
CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch 0000001136 1.11 KB
CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch 0000001246 1.22 KB
CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch 0000001843 1.8 KB
CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch 0000001301 1.27 KB
CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch 0000002575 2.51 KB
CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch 0000002555 2.5 KB
CVE-2016-7908-qemut-net-Infinite-loop-in-mcf_fec_do_tx.patch 0000001803 1.76 KB
CVE-2016-7909-qemut-net-pcnet-infinite-loop-in-pcnet_rdra_addr.patch 0000001098 1.07 KB
CVE-2016-8667-qemut-dma-rc4030-divide-by-zero-error-in-set_next_tick.patch 0000001044 1.02 KB
CVE-2016-8669-qemut-char-divide-by-zero-error-in-serial_update_parameters.patch 0000001185 1.16 KB
CVE-2016-8910-qemut-net-rtl8139-infinite-loop-while-transmit-in-Cplus-mode.patch 0000001201 1.17 KB
CVE-2016-9921-qemut-display-cirrus_vga-divide-by-zero-in-cirrus_do_copy.patch 0000002703 2.64 KB
CVE-2017-10664-qemut-nbd-ignore-sigpipe.patch 0000001751 1.71 KB
CVE-2017-11434-qemut-slirp-out-of-bounds-read-while-parsing-dhcp-options.patch 0000000957 957 Bytes
CVE-2017-15289-qemut-cirrus-OOB-access-issue-in-mode4and5-write-functions.patch 0000001804 1.76 KB
CVE-2017-18030-qemut-out-of-bounds-access-in-cirrus_invalidate_region-routine.patch 0000001805 1.76 KB
CVE-2017-5526-qemut-audio-memory-leakage-in-es1370-device.patch 0000001497 1.46 KB
CVE-2017-6505-qemut-usb-an-infinite-loop-issue-in-ohci_service_ed_list.patch 0000001480 1.45 KB
CVE-2017-8309-qemut-audio-host-memory-leakage-via-capture-buffer.patch 0000001360 1.33 KB
CVE-2017-9330-qemut-usb-ohci-infinite-loop-due-to-incorrect-return-value.patch 0000000606 606 Bytes
CVE-2018-11806-qemut-slirp-correct-size-computation-while-concatenating-mbuf.patch 0000001631 1.59 KB
CVE-2018-17963-qemut-net-ignore-packets-with-large-size.patch 0000001183 1.16 KB
CVE-2018-18849-qemut-lsi53c895a-OOB-msg-buffer-access-leads-to-DoS.patch 0000001924 1.88 KB
CVE-2018-19665-qemut-Integer-overflow-in-Bluetooth-routines-allows-memory-corruption.patch 0000014111 13.8 KB
CVE-2018-20815-qemut-Dont-use-load_image.patch 0000001403 1.37 KB
CVE-2018-5683-qemut-out-of-bounds-read-in-vga_draw_text-routine.patch 0000001577 1.54 KB
CVE-2019-12068-qemut-lsi53c895a-infinite-loop-while-executing-script.patch 0000003971 3.88 KB
CVE-2019-14378-qemut-heap-buffer-overflow-during-packet-reassembly-in-slirp.patch 0000000854 854 Bytes
CVE-2019-15890-qemut-slirp-use-after-free-during-packet-reassembly.patch 0000001404 1.37 KB
CVE-2019-6778-qemut-A-heap-buffer-overflow-in-tcp_emu-found-in-slirp.patch 0000001086 1.06 KB
CVE-2019-9824-qemut-slirp-check-sscanf-result-when-emulating-id.patch 0000001657 1.62 KB
CVE-2020-14364-xsa335-qemut.patch 0000001683 1.64 KB
CVE-2020-29130-qemut-out-of-bounds-access-while-processing-ARP-packets.patch 0000000998 998 Bytes
CVE-2020-7211-qemut-slirp-potential-directory-traversal-using-relative-paths.patch 0000001353 1.32 KB
CVE-2020-8608-qemut-tcp_emu-fix-unsafe-snprintf-usages.patch 0000007952 7.77 KB
CVE-2021-20255-qemut-eepro100-stack-overflow-via-infinite-recursion.patch 0000002124 2.07 KB
CVE-2021-20257-qemut-infinite-loop-issue-in-the-e1000-NIC-emulator.patch 0000002506 2.45 KB
CVE-2021-3592-3594-3595-qemut-prereq1.patch 0000003347 3.27 KB
CVE-2021-3592-3594-3595-qemut-prereq2.patch 0000001756 1.71 KB
CVE-2021-3592-qemut-slirp-bootp-1.patch 0000005325 5.2 KB
CVE-2021-3592-qemut-slirp-bootp-2.patch 0000001204 1.18 KB
CVE-2021-3594-qemut-slirp-udp.patch 0000001121 1.09 KB
CVE-2021-3595-qemut-slirp-tcp.patch 0000001164 1.14 KB
README.SUSE 0000032573 31.8 KB
VNC-Support-for-ExtendedKeyEvent-client-message.patch 0000005002 4.88 KB
aarch64-rename-PSR_MODE_ELxx-to-match-linux-headers.patch 0000001371 1.34 KB
altgr_2.patch 0000001869 1.83 KB
baselibs.conf 0000000009 9 Bytes
bdrv_default_rwflag.patch 0000001092 1.07 KB
bdrv_open2_fix_flags.patch 0000005021 4.9 KB
bdrv_open2_flags_2.patch 0000002185 2.13 KB
blktap.patch 0000001466 1.43 KB
blktap2-no-uninit.patch 0000000423 423 Bytes
block-dmmd 0000009571 9.35 KB
block-npiv 0000003588 3.5 KB
block-npiv-common.sh 0000007967 7.78 KB
block-npiv-vport 0000002101 2.05 KB
boot.local.xenU 0000001987 1.94 KB
boot.xen 0000002385 2.33 KB
capslock_enable.patch 0000000632 632 Bytes
cdrom-removable.patch 0000003489 3.41 KB
disable-building-pv-shim.patch 0000000432 432 Bytes
etc_pam.d_xen-api 0000000265 265 Bytes
hibernate.patch 0000001324 1.29 KB
init.pciback 0000002530 2.47 KB
init.xen_loop 0000000093 93 Bytes
ioemu-devicemodel-include.patch 0000001148 1.12 KB
ioemu-disable-emulated-ide-if-pv.patch 0000002734 2.67 KB
ioemu-disable-scsi.patch 0000004049 3.95 KB
ioemu-hvm-pv-support.patch 0000003298 3.22 KB
ioemu-vnc-resize.patch 0000001145 1.12 KB
ioemu-watchdog-ib700-timer.patch 0000001439 1.41 KB
ioemu-watchdog-linkage.patch 0000002901 2.83 KB
ioemu-watchdog-support.patch 0000031665 30.9 KB
ipxe-enable-nics.patch 0000000371 371 Bytes
ipxe-no-error-logical-not-parentheses.patch 0000001025 1 KB
ipxe-use-rpm-opt-flags.patch 0000001125 1.1 KB
ipxe.tar.bz2 0003669734 3.5 MB
kernel-boot-hvm.patch 0000008627 8.42 KB
kmp_filelist 0000000042 42 Bytes
libxc.migrate_tracking.patch 0000006680 6.52 KB
libxc.sr.superpage.patch 0000028779 28.1 KB
libxl.LIBXL_DESTROY_TIMEOUT.patch 0000000695 695 Bytes
libxl.LIBXL_HOTPLUG_TIMEOUT.patch 0000011850 11.6 KB
libxl.add-option-to-disable-disk-cache-flushes-in-qdisk.patch 0000009140 8.93 KB
libxl.helper_done-crash.patch 0000002090 2.04 KB
libxl.prepare-environment-for-domcreate_stream_done.patch 0000001384 1.35 KB
libxl.pv-qemu-migration.patch 0000004798 4.69 KB
libxl.pvscsi.patch 0000083477 81.5 KB
libxl.set-migration-constraints-from-cmdline.patch 0000024079 23.5 KB
log-guest-console.patch 0000004247 4.15 KB
logrotate.conf 0000000259 259 Bytes
mini-os.tar.bz2 0000303955 297 KB
pvdrv_emulation_control.patch 0000001066 1.04 KB
pygrub-boot-legacy-sles.patch 0000002506 2.45 KB
pygrub-handle-one-line-menu-entries.patch 0000002474 2.42 KB
pygrub-netware-xnloader.patch 0000000722 722 Bytes
qemu-dm-segfault.patch 0000001803 1.76 KB
qemu-ifup-set-mtu.patch 0000000556 556 Bytes
qemu-security-etch1.patch 0000001450 1.42 KB
qemu-xen-traditional-dir-remote.tar.bz2 0003240684 3.09 MB
qemut-add-support-for-cpuid-MSR_IA32_SPEC_CTRL.patch 0000008119 7.93 KB
stdvga-cache.patch 0000000750 750 Bytes
stubdom-have-iovec.patch 0000000800 800 Bytes
stubdom.tar.bz2 0019599422 18.7 MB
supported_module.patch 0000000420 420 Bytes
suse-xendomains-service.patch 0000000806 806 Bytes
suspend_evtchn_lock.patch 0000002115 2.07 KB
sysconfig.pciback 0000000237 237 Bytes
tmp_build.patch 0000001866 1.82 KB
vif-bridge-no-iptables.patch 0000000350 350 Bytes
vif-bridge-tap-fix.patch 0000000969 969 Bytes
vif-route.patch 0000000530 530 Bytes
x86-cpufreq-report.patch 0000002860 2.79 KB
x86-ioapic-ack-default.patch 0000000604 604 Bytes
xen-4.11.4-testing-src.tar.bz2 0005029654 4.8 MB
xen-arch-kconfig-nr_cpus.patch 0000000399 399 Bytes
xen-destdir.patch 0000002185 2.13 KB
xen-disable-qemu-monitor.patch 0000003064 2.99 KB
xen-dom0-modules.service 0000000468 468 Bytes
xen-hvm-default-bridge.patch 0000003500 3.42 KB
xen-qemu-iscsi-fix.patch 0000002900 2.83 KB
xen-utils-0.1.tar.bz2 0000006272 6.13 KB
xen.bug1026236.suse_vtsc_tolerance.patch 0000002410 2.35 KB
xen.build-compare.doc_html.patch 0000001207 1.18 KB
xen.build-compare.man.patch 0000000677 677 Bytes
xen.changes 0000513799 502 KB
xen.libxl.dmmd.patch 0000005830 5.69 KB
xen.spec 0000053469 52.2 KB
xen.stubdom.newlib.patch 0000004443 4.34 KB
xen.sysconfig-fillup.patch 0000002817 2.75 KB
xen2libvirt.py 0000004835 4.72 KB
xen_pvonhvm.xen_emul_unplug.patch 0000001496 1.46 KB
xenapiusers 0000000005 5 Bytes
xencommons.service 0000001052 1.03 KB
xenconsole-no-multiple-connections.patch 0000000931 931 Bytes
xenpaging.doc.patch 0000002658 2.6 KB
xenpaging.qemu.flush-cache.patch 0000001332 1.3 KB
xenstore-launch.patch 0000001168 1.14 KB
xenstored-run-in-stubdomain.patch 0000002323 2.27 KB
xl-conf-default-bridge.patch 0000000537 537 Bytes
xnloader.py 0000001875 1.83 KB
xsa115-1.patch 0000005356 5.23 KB
xsa115-10.patch 0000012213 11.9 KB
xsa115-2.patch 0000003325 3.25 KB
xsa115-3.patch 0000003449 3.37 KB
xsa115-4.patch 0000001609 1.57 KB
xsa115-5.patch 0000004278 4.18 KB
xsa115-6.patch 0000007012 6.85 KB
xsa115-7.patch 0000004374 4.27 KB
xsa115-8.patch 0000009130 8.92 KB
xsa115-9.patch 0000007184 7.02 KB
xsa286-1.patch 0000002159 2.11 KB
xsa286-2.patch 0000006829 6.67 KB
xsa317.patch 0000001776 1.73 KB
xsa319.patch 0000000928 928 Bytes
xsa321-1.patch 0000001323 1.29 KB
xsa321-2.patch 0000006389 6.24 KB
xsa321-3.patch 0000002989 2.92 KB
xsa321-4.patch 0000001184 1.16 KB
xsa321-5.patch 0000000795 795 Bytes
xsa321-6.patch 0000003128 3.05 KB
xsa321-7.patch 0000006153 6.01 KB
xsa322.patch 0000015541 15.2 KB
xsa324.patch 0000001564 1.53 KB
xsa325.patch 0000006012 5.87 KB
xsa328-1.patch 0000003903 3.81 KB
xsa328-2.patch 0000001616 1.58 KB
xsa333.patch 0000001119 1.09 KB
xsa336.patch 0000007873 7.69 KB
xsa337-1.patch 0000002939 2.87 KB
xsa337-2.patch 0000006271 6.12 KB
xsa338.patch 0000001689 1.65 KB
xsa339.patch 0000002652 2.59 KB
xsa340.patch 0000002332 2.28 KB
xsa342.patch 0000005607 5.48 KB
xsa343-1.patch 0000006148 6 KB
xsa343-2.patch 0000008170 7.98 KB
xsa343-3.patch 0000013719 13.4 KB
xsa344-1.patch 0000004065 3.97 KB
xsa344-2.patch 0000006812 6.65 KB
xsa345-1.patch 0000002291 2.24 KB
xsa345-2.patch 0000001784 1.74 KB
xsa345-3.patch 0000007852 7.67 KB
xsa346-1.patch 0000001999 1.95 KB
xsa346-2.patch 0000006907 6.75 KB
xsa347-1.patch 0000001761 1.72 KB
xsa347-2.patch 0000003411 3.33 KB
xsa348.patch 0000005922 5.78 KB
xsa351-1.patch 0000005590 5.46 KB
xsa351-2.patch 0000004199 4.1 KB
xsa351-3.patch 0000002236 2.18 KB
xsa355.patch 0000000821 821 Bytes
xsa358.patch 0000002162 2.11 KB
xsa359.patch 0000001181 1.15 KB
xsa360.patch 0000003318 3.24 KB
xsa366.patch 0000001512 1.48 KB
xsa373-1.patch 0000004647 4.54 KB
xsa373-2.patch 0000004333 4.23 KB
xsa373-3.patch 0000007110 6.94 KB
xsa373-4.patch 0000002841 2.77 KB
xsa373-5.patch 0000005536 5.41 KB
xsa375.patch 0000002186 2.13 KB
xsa377.patch 0000000805 805 Bytes
xsa378-0a.patch 0000002478 2.42 KB
xsa378-0b.patch 0000002039 1.99 KB
xsa378-0c.patch 0000002339 2.28 KB
xsa378-1.patch 0000005112 4.99 KB
xsa378-2.patch 0000008863 8.66 KB
xsa378-3.patch 0000005424 5.3 KB
xsa378-4.patch 0000012488 12.2 KB
xsa378-5.patch 0000006969 6.81 KB
xsa378-6.patch 0000015628 15.3 KB
xsa378-7.patch 0000003353 3.27 KB
xsa378-8.patch 0000005923 5.78 KB
xsa379.patch 0000003048 2.98 KB
xsa380-1.patch 0000004757 4.65 KB
xsa380-2.patch 0000015225 14.9 KB
xsa382.patch 0000001378 1.35 KB
xsa384.patch 0000002806 2.74 KB
xsa385.patch 0000002596 2.54 KB
xsa388-1.patch 0000005832 5.7 KB
xsa388-2.patch 0000001384 1.35 KB
xsa389.patch 0000005815 5.68 KB
Latest Revision
Martin Rey's avatar Martin Rey (mrey) committed (revision 1)
Release from SUSE:Maintenance:21121 / xen.SUSE_SLE-12-SP4_Update
Comments 0
openSUSE Build Service is sponsored by