Xen Virtualization: Hypervisor (aka VMM aka Microkernel)

Edit Package xen.23721

Xen is a virtual machine monitor for x86 that supports execution of
multiple guest operating systems with unprecedented levels of
performance and resource isolation.

This package contains the Xen Hypervisor. (tm)

Modern computers are sufficiently powerful to use virtualization to
present the illusion of many smaller virtual machines (VMs), each
running a separate operating system instance. Successful partitioning
of a machine to support the concurrent execution of multiple operating
systems poses several challenges. Firstly, virtual machines must be
isolated from one another: It is not acceptable for the execution of
one to adversely affect the performance of another. This is
particularly true when virtual machines are owned by mutually
untrusting users. Secondly, it is necessary to support a variety of
different operating systems to accommodate the heterogeneity of popular
applications. Thirdly, the performance overhead introduced by
virtualization should be small.

Xen uses a technique called paravirtualization: The guest OS is
modified, mainly to enhance performance.

The Xen hypervisor (microkernel) does not provide device drivers for
your hardware (except for CPU and memory). This job is left to the
kernel that's running in domain 0. Thus the domain 0 kernel is
privileged; it has full hardware access. It's started immediately after
Xen starts up. Other domains have no access to the hardware; instead
they use virtual interfaces that are provided by Xen (with the help of
the domain 0 kernel).

Xen does support booting other Operating Systems; ports of NetBSD
(Christian Limpach), FreeBSD (Kip Macy), and Plan 9 (Ron Minnich)
exist. A port of Windows XP was developed for an earlier version of
Xen, but is not available for release due to license restrictions.

In addition to this package you need to install the kernel-xen and
xen-tools to use Xen. Xen 3 also supports running unmodified guests
using full virtualization, if appropriate hardware is present. Install
xen-tools-ioemu if you want to use this.

[Hypervisor is a trademark of IBM]

Refresh
Refresh
Source Files
Filename Size Changed
0001-libxc-Rework-extra-module-initialisation.patch 0000006245 6.1 KB
0001-net-move-the-tap-buffer-into-TAPState.patch 0000001793 1.75 KB
0001-xenstore-let-write_node-and-some-callers-return-errn.patch 0000004294 4.19 KB
0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch 0000009540 9.32 KB
0002-net-increase-tap-buffer-size.patch 0000001383 1.35 KB
0002-xenstore-undo-function-rename.patch 0000003699 3.61 KB
0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch 0000001418 1.38 KB
0003-e1000-fix-access-4-bytes-beyond-buffer-end.patch 0000001690 1.65 KB
0003-xenstore-rework-of-transaction-handling.patch 0000030748 30 KB
0004-e1000-secrc-support.patch 0000001778 1.74 KB
0004-firmware-makefile-install-BIOS-blob.patch 0000001393 1.36 KB
0005-e1000-multi-buffer-packet-support.patch 0000004051 3.96 KB
0005-libxl-Load-guest-BIOS-from-file.patch 0000008075 7.89 KB
0006-e1000-clear-EOP-for-multi-buffer-descriptors.patch 0000002393 2.34 KB
0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch 0000004890 4.78 KB
0007-e1000-verify-we-have-buffers-upfront.patch 0000003055 2.98 KB
0007-hvmloader-Grab-the-hvm_start_info-pointer.patch 0000002104 2.05 KB
0008-e1000-check-buffer-availability.patch 0000001585 1.55 KB
0008-hvmloader-Locate-the-BIOS-blob.patch 0000004960 4.84 KB
0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch 0000003705 3.62 KB
0011-hvmloader-Load-OVMF-from-modules.patch 0000004244 4.14 KB
0012-hvmloader-Specific-bios_load-function-required.patch 0000001813 1.77 KB
0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch 0000001980 1.93 KB
0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch 0000002836 2.77 KB
57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch 0000005895 5.76 KB
576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 0000002096 2.05 KB
5769106e-x86-generate-assembler-equates-for-synthesized.patch 0000006961 6.8 KB
57a1e603-x86-time-adjust-local-system-time-initialization.patch 0000004256 4.16 KB
57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 0000007712 7.53 KB
57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch 0000009615 9.39 KB
57a30261-x86-support-newer-Intel-CPU-models.patch 0000006984 6.82 KB
57da6e87-libxl-qemu-moncmd.patch 0000008573 8.37 KB
583816f4-x86-vmx-Don-t-deliver-MC-with-an-error-code.patch 0000000982 982 Bytes
5842eaf7-stubdom-remove-EXTRA_CFLAGS-meant-for-building-tools.patch 0000001085 1.06 KB
58cf9277-x86-time-dont-use-vTSC-if-host-guest-freqs-match.patch 0000004426 4.32 KB
58d25ea2-xenstore-add-missing-checks-for-allocation-failure.patch 0000001811 1.77 KB
591efb76-hvmloader-dont-clobber-memory-with-tests.patch 0000006208 6.06 KB
594a718b-xen-detect-try-sysfs-node-for-obtaining-guest-type.patch 0000005404 5.28 KB
594d2ef8-xen-detect-handle-asprintf-error.patch 0000001528 1.49 KB
59a98d3e-libxc-increase-maximum-migration-stream-record-length.patch 0000001265 1.24 KB
59f31268-libxc-remove-stale-error-check-for-domain-size.patch 0000002189 2.14 KB
5a33a12f-domctl-improve-locking-during-domain-destruction.patch 0000001919 1.87 KB
5a79d7ed-libxc-packed-initrd-dont-fail-domain-creation.patch 0000003889 3.8 KB
5aeaeae4-introduce-vcpu_sleep_nosync_locked.patch 0000001768 1.73 KB
5aeaeaf0-sched-fix-races-in-vcpu-migration.patch 0000006111 5.97 KB
5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch 0000001667 1.63 KB
5b3cab8e-1-VMX-improve-MSR-load-save-API.patch 0000006961 6.8 KB
5b3cab8e-2-VMX-cleanup-MSR-load-save-infra.patch 0000005213 5.09 KB
5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch 0000002964 2.89 KB
5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch 0000011311 11 KB
5b3cab8f-3-VMX-load-only-guest-MSR-entries.patch 0000006532 6.38 KB
5b3f8fa5-port-array_index_nospec-from-Linux.patch 0000006226 6.08 KB
5b4488e7-x86-spec-ctrl-cmdline-handling.patch 0000001172 1.14 KB
5b4c9a60-allow-cpu_down-to-be-called-earlier.patch 0000001667 1.63 KB
5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch 0000001919 1.87 KB
5b5040f2-x86-AMD-distinguish-CU-from-HT.patch 0000004223 4.12 KB
5b505fe5-VMX-fix-find-msr-build.patch 0000001755 1.71 KB
5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch 0000012634 12.3 KB
5b508775-2-x86-possibly-bring-up-all-CPUs.patch 0000004851 4.74 KB
5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch 0000003095 3.02 KB
5b56feb2-x86-XPTI-parsing-on-fixed-Intel-HW.patch 0000002634 2.57 KB
5b6d8ce2-x86-XPTI-parsing.patch 0000002588 2.53 KB
5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch 0000007491 7.32 KB
5b9784d2-x86-HVM-add-known_gla-helper.patch 0000002941 2.87 KB
5b9784f2-x86-HVM-split-page-straddling-accesses.patch 0000006131 5.99 KB
5bae44ce-x86-silence-false-log-messages.patch 0000001421 1.39 KB
5bb60c12-x86-split-opt_xpti.patch 0000005279 5.16 KB
5bb60c4f-x86-split-opt_pv_l1tf.patch 0000005397 5.27 KB
5bb60c74-x86-fix-xpti-and-pv-l1tf.patch 0000001711 1.67 KB
5c7e9d9c-x86-mm-fix-GP-0-in-switch_cr3_cr4.patch 0000001811 1.77 KB
5c87e6d1-x86-TSX-controls-for-RTM-force-abort-mode.patch 0000007050 6.88 KB
5e876b0f-tools-xenstore-fix-a-use-after-free-problem-in-xenstored.patch 0000002304 2.25 KB
5f76caaf-evtchn-FIFO-use-stable-fields.patch 0000001355 1.32 KB
5faa974f-evtchn-rework-per-channel-lock.patch 0000016676 16.3 KB
5fbcdf2e-evtchn-FIFO-access-last.patch 0000002987 2.92 KB
5fc4ee23-evtchn-FIFO-queue-locking.patch 0000008029 7.84 KB
5fca3b32-tools-libs-ctrl-fix-dumping-of-ballooned-guest.patch 0000003635 3.55 KB
624ebcef-VT-d-dont-needlessly-look-up-DID.patch 0000001413 1.38 KB
624ebd3b-VT-d-avoid-NULL-deref-on-dcmo-error-paths.patch 0000006258 6.11 KB
CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch 0000001794 1.75 KB
CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch 0000001899 1.85 KB
CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch 0000001377 1.34 KB
CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch 0000001038 1.01 KB
CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch 0000001665 1.63 KB
CVE-2014-0222-blktap-qcow1-validate-l2-table-size.patch 0000001545 1.51 KB
CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch 0000001647 1.61 KB
CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch 0000001601 1.56 KB
CVE-2015-4037-qemut-smb-config-dir-name.patch 0000001554 1.52 KB
CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch 0000002028 1.98 KB
CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch 0000001204 1.18 KB
CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch 0000001184 1.16 KB
CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch 0000001091 1.07 KB
CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch 0000002383 2.33 KB
CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch 0000001137 1.11 KB
CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch 0000002031 1.98 KB
CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch 0000004302 4.2 KB
CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch 0000001841 1.8 KB
CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch 0000001136 1.11 KB
CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch 0000001246 1.22 KB
CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch 0000001843 1.8 KB
CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch 0000001301 1.27 KB
CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch 0000002575 2.51 KB
CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch 0000002555 2.5 KB
CVE-2016-7908-qemut-net-Infinite-loop-in-mcf_fec_do_tx.patch 0000001803 1.76 KB
CVE-2016-7909-qemut-net-pcnet-infinite-loop-in-pcnet_rdra_addr.patch 0000001098 1.07 KB
CVE-2016-8667-qemut-dma-rc4030-divide-by-zero-error-in-set_next_tick.patch 0000001044 1.02 KB
CVE-2016-8669-qemut-char-divide-by-zero-error-in-serial_update_parameters.patch 0000001185 1.16 KB
CVE-2016-8910-qemut-net-rtl8139-infinite-loop-while-transmit-in-Cplus-mode.patch 0000001201 1.17 KB
CVE-2016-9921-qemut-display-cirrus_vga-divide-by-zero-in-cirrus_do_copy.patch 0000002703 2.64 KB
CVE-2017-10664-qemut-nbd-ignore-sigpipe.patch 0000001751 1.71 KB
CVE-2017-11434-qemut-slirp-out-of-bounds-read-while-parsing-dhcp-options.patch 0000000957 957 Bytes
CVE-2017-15289-qemut-cirrus-OOB-access-issue-in-mode4and5-write-functions.patch 0000001804 1.76 KB
CVE-2017-18030-qemut-out-of-bounds-access-in-cirrus_invalidate_region-routine.patch 0000001805 1.76 KB
CVE-2017-5526-qemut-audio-memory-leakage-in-es1370-device.patch 0000001497 1.46 KB
CVE-2017-6505-qemut-usb-an-infinite-loop-issue-in-ohci_service_ed_list.patch 0000001480 1.45 KB
CVE-2017-7718-qemut-display-cirrus-OOB-read-access-issue.patch 0000001696 1.66 KB
CVE-2017-8309-qemut-audio-host-memory-leakage-via-capture-buffer.patch 0000001360 1.33 KB
CVE-2017-9330-qemut-usb-ohci-infinite-loop-due-to-incorrect-return-value.patch 0000000606 606 Bytes
CVE-2018-11806-qemut-slirp-correct-size-computation-while-concatenating-mbuf.patch 0000001631 1.59 KB
CVE-2018-17963-qemut-net-ignore-packets-with-large-size.patch 0000001180 1.15 KB
CVE-2018-18849-qemut-lsi53c895a-OOB-msg-buffer-access-leads-to-DoS.patch 0000001921 1.88 KB
CVE-2018-19665-qemut-Integer-overflow-in-Bluetooth-routines-allows-memory-corruption.patch 0000014090 13.8 KB
CVE-2018-20815-qemut-Dont-use-load_image.patch 0000001400 1.37 KB
CVE-2018-5683-qemut-out-of-bounds-read-in-vga_draw_text-routine.patch 0000001577 1.54 KB
CVE-2019-12068-qemut-lsi53c895a-infinite-loop-while-executing-script.patch 0000003968 3.88 KB
CVE-2019-14378-qemut-heap-buffer-overflow-during-packet-reassembly-in-slirp.patch 0000000851 851 Bytes
CVE-2019-15890-qemut-slirp-use-after-free-during-packet-reassembly.patch 0000001401 1.37 KB
CVE-2019-6778-qemut-A-heap-buffer-overflow-in-tcp_emu-found-in-slirp.patch 0000001083 1.06 KB
CVE-2019-9824-qemut-slirp-check-sscanf-result-when-emulating-id.patch 0000001654 1.62 KB
CVE-2020-14364-xsa335-qemut.patch 0000001680 1.64 KB
CVE-2020-29130-qemut-out-of-bounds-access-while-processing-ARP-packets.patch 0000000995 995 Bytes
CVE-2020-7211-qemut-slirp-potential-directory-traversal-using-relative-paths.patch 0000001350 1.32 KB
CVE-2020-8608-qemut-tcp_emu-fix-unsafe-snprintf-usages.patch 0000007949 7.76 KB
CVE-2021-20255-qemut-eepro100-stack-overflow-via-infinite-recursion.patch 0000002121 2.07 KB
CVE-2021-20257-qemut-infinite-loop-issue-in-the-e1000-NIC-emulator.patch 0000002503 2.44 KB
CVE-2021-3592-3594-3595-qemut-prereq1.patch 0000003342 3.26 KB
CVE-2021-3592-3594-3595-qemut-prereq2.patch 0000001750 1.71 KB
CVE-2021-3592-qemut-slirp-bootp-1.patch 0000005313 5.19 KB
CVE-2021-3592-qemut-slirp-bootp-2.patch 0000001201 1.17 KB
CVE-2021-3594-qemut-slirp-udp.patch 0000001118 1.09 KB
CVE-2021-3595-qemut-slirp-tcp.patch 0000001161 1.13 KB
README.SUSE 0000030178 29.5 KB
VMX-migrate-with-SSBD.patch 0000000844 844 Bytes
VNC-Support-for-ExtendedKeyEvent-client-message.patch 0000005002 4.88 KB
aarch64-rename-PSR_MODE_ELxx-to-match-linux-headers.patch 0000001368 1.34 KB
altgr_2.patch 0000001869 1.83 KB
baselibs.conf 0000000009 9 Bytes
bdrv_default_rwflag.patch 0000001092 1.07 KB
bdrv_open2_fix_flags.patch 0000005021 4.9 KB
bdrv_open2_flags_2.patch 0000002185 2.13 KB
blktap.patch 0000001466 1.43 KB
blktap2-no-uninit.patch 0000000423 423 Bytes
block-dmmd 0000009571 9.35 KB
block-npiv 0000003588 3.5 KB
block-npiv-common.sh 0000007967 7.78 KB
block-npiv-vport 0000002101 2.05 KB
boot.local.xenU 0000001987 1.94 KB
boot.xen 0000002385 2.33 KB
capslock_enable.patch 0000000632 632 Bytes
cdrom-removable.patch 0000003489 3.41 KB
etc_pam.d_xen-api 0000000265 265 Bytes
hibernate.patch 0000001420 1.39 KB
init.pciback 0000002530 2.47 KB
init.xen_loop 0000000093 93 Bytes
ioemu-disable-emulated-ide-if-pv.patch 0000002734 2.67 KB
ioemu-disable-scsi.patch 0000004049 3.95 KB
ioemu-hvm-pv-support.patch 0000003305 3.23 KB
ioemu-vnc-resize.patch 0000001145 1.12 KB
ioemu-watchdog-ib700-timer.patch 0000001439 1.41 KB
ioemu-watchdog-linkage.patch 0000002901 2.83 KB
ioemu-watchdog-support.patch 0000031665 30.9 KB
ipxe-enable-nics.patch 0000000371 371 Bytes
ipxe-no-error-logical-not-parentheses.patch 0000001078 1.05 KB
ipxe-use-rpm-opt-flags.patch 0000001118 1.09 KB
ipxe.tar.bz2 0002877525 2.74 MB
kernel-boot-hvm.patch 0000008627 8.42 KB
kmp_filelist 0000000042 42 Bytes
libxc.do_domctl.EFAULT-retry.patch 0000001944 1.9 KB
libxc.migrate_tracking.patch 0000006625 6.47 KB
libxc.sr.superpage.patch 0000028758 28.1 KB
libxl.LIBXL_DESTROY_TIMEOUT.patch 0000000533 533 Bytes
libxl.add-option-to-disable-disk-cache-flushes-in-qdisk.patch 0000003924 3.83 KB
libxl.pvscsi.patch 0000086051 84 KB
libxl.set-migration-constraints-from-cmdline.patch 0000021566 21.1 KB
log-guest-console.patch 0000004247 4.15 KB
logrotate.conf 0000000259 259 Bytes
mini-os.tar.bz2 0000255930 250 KB
parse_boolean-NULL-end.patch 0000000875 875 Bytes
pvdrv_emulation_control.patch 0000001066 1.04 KB
pygrub-boot-legacy-sles.patch 0000002506 2.45 KB
pygrub-handle-one-line-menu-entries.patch 0000002474 2.42 KB
pygrub-netware-xnloader.patch 0000000722 722 Bytes
qemu-dm-segfault.patch 0000001803 1.76 KB
qemu-ifup-set-mtu.patch 0000000556 556 Bytes
qemu-security-etch1.patch 0000001450 1.42 KB
qemu-xen-traditional-dir-remote.tar.bz2 0003239586 3.09 MB
qemut-add-support-for-cpuid-MSR_IA32_SPEC_CTRL.patch 0000008119 7.93 KB
stdvga-cache.patch 0000000750 750 Bytes
stubdom-have-iovec.patch 0000000800 800 Bytes
stubdom.tar.bz2 0019598900 18.7 MB
supported_module.patch 0000000420 420 Bytes
suse-xendomains-service.patch 0000000806 806 Bytes
suspend_evtchn_lock.patch 0000002107 2.06 KB
sysconfig.pciback 0000000237 237 Bytes
tmp_build.patch 0000001336 1.3 KB
vif-bridge-no-iptables.patch 0000000350 350 Bytes
vif-bridge-tap-fix.patch 0000000969 969 Bytes
vif-route.patch 0000000527 527 Bytes
x86-cpufreq-report.patch 0000002854 2.79 KB
x86-ioapic-ack-default.patch 0000000757 757 Bytes
xen-4.7.6-testing-src.tar.bz2 0004536777 4.33 MB
xen-arch-kconfig-nr_cpus.patch 0000000399 399 Bytes
xen-destdir.patch 0000002160 2.11 KB
xen-disable-qemu-monitor.patch 0000003064 2.99 KB
xen-dom0-modules.service 0000000468 468 Bytes
xen-hvm-default-bridge.patch 0000003491 3.41 KB
xen-qemu-iscsi-fix.patch 0000002843 2.78 KB
xen-utils-0.1.tar.bz2 0000006272 6.13 KB
xen.bug1026236.suse_vtsc_tolerance.patch 0000002272 2.22 KB
xen.build-compare.doc_html.patch 0000001203 1.17 KB
xen.build-compare.man.patch 0000000645 645 Bytes
xen.changes 0000467898 457 KB
xen.libxl.dmmd.patch 0000004656 4.55 KB
xen.spec 0000062966 61.5 KB
xen.stubdom.newlib.patch 0000004010 3.92 KB
xen2libvirt.py 0000004835 4.72 KB
xen_pvonhvm.xen_emul_unplug.patch 0000001496 1.46 KB
xenapiusers 0000000005 5 Bytes
xencommons.service 0000001052 1.03 KB
xenconsole-no-multiple-connections.patch 0000000931 931 Bytes
xenpaging.doc.patch 0000002658 2.6 KB
xenpaging.qemu.flush-cache.patch 0000001332 1.3 KB
xl-conf-default-bridge.patch 0000000537 537 Bytes
xnloader.py 0000001875 1.83 KB
xs-01-temporary-context.patch 0000010003 9.77 KB
xs-02-get_parent-context.patch 0000002854 2.79 KB
xs-03-read_node-context.patch 0000004605 4.5 KB
xs-04-get_node-context.patch 0000006787 6.63 KB
xs-05-watch-firing-context.patch 0000006680 6.52 KB
xs-06-talloc-report.patch 0000003520 3.44 KB
xs-07-do_mkdir-error.patch 0000001182 1.15 KB
xs-08-add_change_node-fix.patch 0000001478 1.44 KB
xs-09-add_change_node-params.patch 0000005569 5.44 KB
xs-10-call-add_change_node.patch 0000002354 2.3 KB
xs-11-tdb-record-header.patch 0000004224 4.13 KB
xs-12-node-gen-count.patch 0000004533 4.43 KB
xs-13-read-directory-part-support.patch 0000004541 4.43 KB
xs-14-command-array.patch 0000006740 6.58 KB
xs-15-command-return-val.patch 0000026827 26.2 KB
xs-16-function-static.patch 0000011639 11.4 KB
xs-17-arg-parsing.patch 0000007952 7.77 KB
xs-18-default-buffer.patch 0000011425 11.2 KB
xs-19-handle-alloc-failures.patch 0000018349 17.9 KB
xs-20-tdb-version.patch 0000000916 916 Bytes
xs-21-empty-tdb-database.patch 0000003537 3.45 KB
xs-22-reopen_log-fix.patch 0000000859 859 Bytes
xs-23-XS_DEBUG-rename.patch 0000004013 3.92 KB
xs-24-xenstored_control.patch 0000006125 5.98 KB
xs-25-control-enhance.patch 0000005403 5.28 KB
xs-26-log-control.patch 0000004080 3.98 KB
xs-27-memory-report.patch 0000003048 2.98 KB
xs-28-remove-talloc-report.patch 0000004003 3.91 KB
xs-29-define-off_t.patch 0000000619 619 Bytes
xsa115-1.patch 0000005342 5.22 KB
xsa115-10.patch 0000012195 11.9 KB
xsa115-2.patch 0000003121 3.05 KB
xsa115-3.patch 0000003224 3.15 KB
xsa115-4.patch 0000001506 1.47 KB
xsa115-5.patch 0000004328 4.23 KB
xsa115-6.patch 0000006606 6.45 KB
xsa115-7.patch 0000003967 3.87 KB
xsa115-8.patch 0000009124 8.91 KB
xsa115-9.patch 0000007172 7 KB
xsa269.patch 0000005222 5.1 KB
xsa273-1.patch 0000010405 10.2 KB
xsa273-2.patch 0000006883 6.72 KB
xsa273-3.patch 0000007396 7.22 KB
xsa273-4.patch 0000007610 7.43 KB
xsa273-5.patch 0000008676 8.47 KB
xsa273-6.patch 0000004763 4.65 KB
xsa273-7.patch 0000003451 3.37 KB
xsa273-8.patch 0000007229 7.06 KB
xsa273-9.patch 0000002023 1.98 KB
xsa275-1.patch 0000004654 4.54 KB
xsa275-2.patch 0000004472 4.37 KB
xsa279.patch 0000001559 1.52 KB
xsa280-1.patch 0000005242 5.12 KB
xsa280-2.patch 0000006345 6.2 KB
xsa282-1.patch 0000002943 2.87 KB
xsa282-2.patch 0000001819 1.78 KB
xsa284.patch 0000001225 1.2 KB
xsa285.patch 0000002077 2.03 KB
xsa286-1.patch 0000002227 2.17 KB
xsa286-2.patch 0000006541 6.39 KB
xsa287.patch 0000011425 11.2 KB
xsa288.patch 0000011850 11.6 KB
xsa290-1.patch 0000006898 6.74 KB
xsa290-2.patch 0000002309 2.25 KB
xsa292.patch 0000004013 3.92 KB
xsa293-0.patch 0000003235 3.16 KB
xsa293-1.patch 0000011045 10.8 KB
xsa293-2.patch 0000008800 8.59 KB
xsa294.patch 0000003176 3.1 KB
xsa296.patch 0000007877 7.69 KB
xsa297-0a.patch 0000004088 3.99 KB
xsa297-0b.patch 0000001801 1.76 KB
xsa297-0c.patch 0000004106 4.01 KB
xsa297-0d.patch 0000002107 2.06 KB
xsa297-1.patch 0000006372 6.22 KB
xsa297-2.patch 0000005817 5.68 KB
xsa297-3.patch 0000013611 13.3 KB
xsa298.patch 0000003275 3.2 KB
xsa299-1.patch 0000017545 17.1 KB
xsa299-10.patch 0000003737 3.65 KB
xsa299-11.patch 0000007228 7.06 KB
xsa299-12.patch 0000015451 15.1 KB
xsa299-2.patch 0000003598 3.51 KB
xsa299-3.patch 0000003790 3.7 KB
xsa299-4.patch 0000022693 22.2 KB
xsa299-5.patch 0000004062 3.97 KB
xsa299-6.patch 0000003038 2.97 KB
xsa299-7.patch 0000003979 3.89 KB
xsa299-8.patch 0000015448 15.1 KB
xsa299-9.patch 0000009046 8.83 KB
xsa302.patch 0000016490 16.1 KB
xsa304-1.patch 0000002488 2.43 KB
xsa304-2.patch 0000009430 9.21 KB
xsa304-3.patch 0000004272 4.17 KB
xsa305-1.patch 0000008305 8.11 KB
xsa305-2.patch 0000008308 8.11 KB
xsa306.patch 0000004253 4.15 KB
xsa307.patch 0000004105 4.01 KB
xsa308.patch 0000003098 3.03 KB
xsa309.patch 0000001763 1.72 KB
xsa310-1.patch 0000004988 4.87 KB
xsa310-2.patch 0000003822 3.73 KB
xsa310-3.patch 0000002903 2.83 KB
xsa311-1.patch 0000003579 3.5 KB
xsa311-2.patch 0000007268 7.1 KB
xsa313-1.patch 0000000778 778 Bytes
xsa313-2.patch 0000006136 5.99 KB
xsa314.patch 0000003894 3.8 KB
xsa318.patch 0000001809 1.77 KB
xsa320-1.patch 0000005383 5.26 KB
xsa320-2.patch 0000006789 6.63 KB
xsa321-1.patch 0000001420 1.39 KB
xsa321-2.patch 0000006359 6.21 KB
xsa321-3.patch 0000002965 2.9 KB
xsa321-4.patch 0000001184 1.16 KB
xsa321-5.patch 0000000793 793 Bytes
xsa321-6.patch 0000003141 3.07 KB
xsa321-7.patch 0000006532 6.38 KB
xsa322.patch 0000015507 15.1 KB
xsa324.patch 0000001560 1.52 KB
xsa325.patch 0000006006 5.87 KB
xsa328-1.patch 0000003959 3.87 KB
xsa328-2.patch 0000001616 1.58 KB
xsa336.patch 0000007756 7.57 KB
xsa337-1.patch 0000002843 2.78 KB
xsa337-2.patch 0000006229 6.08 KB
xsa338.patch 0000001650 1.61 KB
xsa339.patch 0000002646 2.58 KB
xsa340.patch 0000002218 2.17 KB
xsa342.patch 0000005340 5.21 KB
xsa343-1.patch 0000006394 6.24 KB
xsa343-2.patch 0000008142 7.95 KB
xsa343-3.patch 0000013656 13.3 KB
xsa344-1.patch 0000003948 3.86 KB
xsa344-2.patch 0000006547 6.39 KB
xsa345-1.patch 0000002269 2.22 KB
xsa345-2.patch 0000001745 1.7 KB
xsa345-3.patch 0000007902 7.72 KB
xsa346-1.patch 0000002007 1.96 KB
xsa346-2.patch 0000006451 6.3 KB
xsa347-1.patch 0000001759 1.72 KB
xsa347-2.patch 0000003411 3.33 KB
xsa348.patch 0000005503 5.37 KB
xsa351.patch 0000005638 5.51 KB
xsa355.patch 0000000821 821 Bytes
xsa358.patch 0000001784 1.74 KB
xsa359.patch 0000001198 1.17 KB
xsa366.patch 0000001512 1.48 KB
xsa373-0.patch 0000003007 2.94 KB
xsa373-1.patch 0000004752 4.64 KB
xsa373-2.patch 0000004331 4.23 KB
xsa373-3.patch 0000006867 6.71 KB
xsa373-4.patch 0000002911 2.84 KB
xsa373-5.patch 0000003318 3.24 KB
xsa375.patch 0000002546 2.49 KB
xsa377.patch 0000000867 867 Bytes
xsa378-0a.patch 0000005225 5.1 KB
xsa378-0b.patch 0000002592 2.53 KB
xsa378-0c.patch 0000002070 2.02 KB
xsa378-0d.patch 0000002076 2.03 KB
xsa378-0e.patch 0000002409 2.35 KB
xsa378-1.patch 0000005060 4.94 KB
xsa378-2.patch 0000008799 8.59 KB
xsa378-3.patch 0000005430 5.3 KB
xsa378-4.patch 0000012070 11.8 KB
xsa378-5.patch 0000007022 6.86 KB
xsa378-6.patch 0000016456 16.1 KB
xsa378-7.patch 0000003310 3.23 KB
xsa378-8.patch 0000005919 5.78 KB
xsa379.patch 0000003070 3 KB
xsa380-0.patch 0000004344 4.24 KB
xsa380-1.patch 0000004641 4.53 KB
xsa380-2.patch 0000015347 15 KB
xsa384.patch 0000003276 3.2 KB
xsa385.patch 0000002508 2.45 KB
xsa388-1.patch 0000005987 5.85 KB
xsa388-2.patch 0000001384 1.35 KB
xsa389.patch 0000005680 5.55 KB
xsa394.patch 0000001780 1.74 KB
xsa395.patch 0000001081 1.06 KB
xsa397.patch 0000003714 3.63 KB
xsa398.patch 0000002340 2.29 KB
xsa399.patch 0000001693 1.65 KB
xsa400-00a.patch 0000009391 9.17 KB
xsa400-00b.patch 0000002375 2.32 KB
xsa400-00c.patch 0000004056 3.96 KB
xsa400-00d.patch 0000003122 3.05 KB
xsa400-01.patch 0000003689 3.6 KB
xsa400-02.patch 0000002168 2.12 KB
xsa400-03.patch 0000003275 3.2 KB
xsa400-04.patch 0000019692 19.2 KB
xsa400-05.patch 0000018230 17.8 KB
xsa400-06.patch 0000010889 10.6 KB
xsa400-07.patch 0000004547 4.44 KB
xsa400-08.patch 0000015109 14.8 KB
xsa400-09.patch 0000001575 1.54 KB
xsa400-10.patch 0000001524 1.49 KB
xsa400-11.patch 0000031009 30.3 KB
Latest Revision
Thomas Leroy's avatar Thomas Leroy (tleroy) committed (revision 1)
Release from SUSE:Maintenance:23721 / xen.SUSE_SLE-12-SP2_Update
Comments 0
openSUSE Build Service is sponsored by