Xen Virtualization: Hypervisor (aka VMM aka Microkernel)

Edit Package xen

Xen is a virtual machine monitor for x86 that supports execution of
multiple guest operating systems with unprecedented levels of
performance and resource isolation.

This package contains the Xen Hypervisor. (tm)

Modern computers are sufficiently powerful to use virtualization to
present the illusion of many smaller virtual machines (VMs), each
running a separate operating system instance. Successful partitioning
of a machine to support the concurrent execution of multiple operating
systems poses several challenges. Firstly, virtual machines must be
isolated from one another: It is not acceptable for the execution of
one to adversely affect the performance of another. This is
particularly true when virtual machines are owned by mutually
untrusting users. Secondly, it is necessary to support a variety of
different operating systems to accommodate the heterogeneity of popular
applications. Thirdly, the performance overhead introduced by
virtualization should be small.

Xen uses a technique called paravirtualization: The guest OS is
modified, mainly to enhance performance.

The Xen hypervisor (microkernel) does not provide device drivers for
your hardware (except for CPU and memory). This job is left to the
kernel that's running in domain 0. Thus the domain 0 kernel is
privileged; it has full hardware access. It's started immediately after
Xen starts up. Other domains have no access to the hardware; instead
they use virtual interfaces that are provided by Xen (with the help of
the domain 0 kernel).

In addition to this package you need to install the kernel-xen, xen-libs
and xen-tools packages to use Xen. Xen version 3 and newer also supports
running unmodified guests using full virtualization, if appropriate hardware
is present.

[Hypervisor is a trademark of IBM]

Refresh
Refresh
Source Files
Filename Size Changed
0001-net-move-the-tap-buffer-into-TAPState.patch 0000001793 1.75 KB
0002-net-increase-tap-buffer-size.patch 0000001383 1.35 KB
0003-e1000-fix-access-4-bytes-beyond-buffer-end.patch 0000001690 1.65 KB
0004-e1000-secrc-support.patch 0000001778 1.74 KB
0005-e1000-multi-buffer-packet-support.patch 0000004051 3.96 KB
0006-e1000-clear-EOP-for-multi-buffer-descriptors.patch 0000002393 2.34 KB
0007-e1000-verify-we-have-buffers-upfront.patch 0000003055 2.98 KB
0008-e1000-check-buffer-availability.patch 0000001585 1.55 KB
55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch 0000004102 4.01 KB
5604f239-x86-PV-properly-populate-descriptor-tables.patch 0000003716 3.63 KB
561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 0000001908 1.86 KB
561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 0000004156 4.06 KB
561d20a0-x86-hide-MWAITX-from-PV-domains.patch 0000001432 1.4 KB
561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 0000003911 3.82 KB
5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 0000001481 1.45 KB
5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 0000001791 1.75 KB
56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 0000001234 1.21 KB
56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 0000001628 1.59 KB
5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 0000001914 1.87 KB
5632129c-free-domain-s-vcpu-array.patch 0000000741 741 Bytes
563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 0000006944 6.78 KB
563212e4-xenoprof-free-domain-s-vcpu-array.patch 0000000951 951 Bytes
563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 0000002588 2.53 KB
56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 0000003117 3.04 KB
56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 0000002542 2.48 KB
5641ceec-x86-HVM-always-intercept-AC-and-DB.patch 0000005159 5.04 KB
5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 0000000723 723 Bytes
5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch 0000005076 4.96 KB
56549f24-x86-vPMU-document-as-unsupported.patch 0000000995 995 Bytes
5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch 0000001455 1.42 KB
CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch 0000001647 1.61 KB
CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch 0000001679 1.64 KB
CVE-2015-4037-qemut-smb-config-dir-name.patch 0000001554 1.52 KB
CVE-2015-4037-qemuu-smb-config-dir-name.patch 0000001852 1.81 KB
CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch 0000003333 3.25 KB
CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch 0000001416 1.38 KB
CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch 0000001403 1.37 KB
CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch 0000001137 1.11 KB
CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch 0000001072 1.05 KB
CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch 0000001321 1.29 KB
CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch 0000003056 2.98 KB
README.SUSE 0000030178 29.5 KB
VNC-Support-for-ExtendedKeyEvent-client-message.patch 0000005002 4.88 KB
aarch64-rename-PSR_MODE_ELxx-to-match-linux-headers.patch 0000001368 1.34 KB
altgr_2.patch 0000001869 1.83 KB
baselibs.conf 0000000009 9 Bytes
bdrv_default_rwflag.patch 0000001092 1.07 KB
bdrv_open2_fix_flags.patch 0000005021 4.9 KB
bdrv_open2_flags_2.patch 0000002185 2.13 KB
blktap.patch 0000001466 1.43 KB
blktap2-no-uninit.patch 0000000423 423 Bytes
block-dmmd 0000004632 4.52 KB
block-npiv 0000003588 3.5 KB
block-npiv-common.sh 0000007967 7.78 KB
block-npiv-vport 0000002101 2.05 KB
boot.local.xenU 0000001987 1.94 KB
boot.xen 0000002385 2.33 KB
capslock_enable.patch 0000000632 632 Bytes
cdrom-removable.patch 0000003489 3.41 KB
etc_pam.d_xen-api 0000000265 265 Bytes
hibernate.patch 0000001420 1.39 KB
hotplug-Linux-block-performance-fix.patch 0000006532 6.38 KB
init.pciback 0000002530 2.47 KB
init.xen_loop 0000000093 93 Bytes
ioemu-disable-emulated-ide-if-pv.patch 0000002734 2.67 KB
ioemu-disable-scsi.patch 0000003510 3.43 KB
ioemu-hvm-pv-support.patch 0000003007 2.94 KB
ioemu-vnc-resize.patch 0000001145 1.12 KB
ioemu-watchdog-ib700-timer.patch 0000001439 1.41 KB
ioemu-watchdog-linkage.patch 0000002901 2.83 KB
ioemu-watchdog-support.patch 0000031665 30.9 KB
ipxe-enable-nics.patch 0000000371 371 Bytes
ipxe-no-error-logical-not-parentheses.patch 0000001078 1.05 KB
ipxe.tar.bz2 0002877217 2.74 MB
kernel-boot-hvm.patch 0000008688 8.48 KB
kmp_filelist 0000000042 42 Bytes
libxl.add-option-to-disable-disk-cache-flushes-in-qdisk.patch 0000003864 3.77 KB
libxl.pvscsi.patch 0000045123 44.1 KB
log-guest-console.patch 0000004248 4.15 KB
logrotate.conf 0000000259 259 Bytes
magic_ioport_compat.patch 0000000746 746 Bytes
mini-os.tar.bz2 0000250896 245 KB
pvdrv_emulation_control.patch 0000001066 1.04 KB
pygrub-boot-legacy-sles.patch 0000002500 2.44 KB
pygrub-netware-xnloader.patch 0000000722 722 Bytes
qemu-dm-segfault.patch 0000002639 2.58 KB
qemu-ifup-set-mtu.patch 0000000556 556 Bytes
qemu-security-etch1.patch 0000001450 1.42 KB
qemu-xen-dir-remote.tar.bz2 0008995267 8.58 MB
qemu-xen-enable-spice-support.patch 0000000442 442 Bytes
qemu-xen-traditional-dir-remote.tar.bz2 0003214075 3.07 MB
qemu-xen-upstream-qdisk-cache-unsafe.patch 0000001739 1.7 KB
seabios-dir-remote.tar.bz2 0000445943 435 KB
set-mtu-from-bridge-for-tap-interface.patch 0000001443 1.41 KB
stdvga-cache.patch 0000000750 750 Bytes
stubdom-have-iovec.patch 0000000800 800 Bytes
stubdom.tar.bz2 0017477041 16.7 MB
supported_module.patch 0000000420 420 Bytes
suspend_evtchn_lock.patch 0000002107 2.06 KB
sysconfig.pciback 0000000237 237 Bytes
tigervnc-long-press.patch 0000001243 1.21 KB
tmp_build.patch 0000001336 1.3 KB
vif-bridge-no-iptables.patch 0000000350 350 Bytes
vif-bridge-tap-fix.patch 0000000969 969 Bytes
x86-cpufreq-report.patch 0000002854 2.79 KB
x86-ioapic-ack-default.patch 0000000757 757 Bytes
xen-4.6.0-testing-src.tar.bz2 0004085311 3.9 MB
xen-c99-fix.patch 0000000681 681 Bytes
xen-destdir.patch 0000002265 2.21 KB
xen-disable-qemu-monitor.patch 0000003064 2.99 KB
xen-dom0-modules.service 0000000468 468 Bytes
xen-hvm-default-bridge.patch 0000003491 3.41 KB
xen-qemu-iscsi-fix.patch 0000002843 2.78 KB
xen-utils-0.1.tar.bz2 0000006171 6.03 KB
xen.build-compare.doc_html.patch 0000001203 1.17 KB
xen.build-compare.man.patch 0000000645 645 Bytes
xen.build-compare.seabios.patch 0000000828 828 Bytes
xen.changes 0000360400 352 KB
xen.spec 0000036857 36 KB
xen.stubdom.newlib.patch 0000004437 4.33 KB
xen2libvirt.py 0000004835 4.72 KB
xen_pvonhvm.xen_emul_unplug.patch 0000001496 1.46 KB
xenapiusers 0000000005 5 Bytes
xencommons.service 0000000912 912 Bytes
xenconsole-no-multiple-connections.patch 0000000929 929 Bytes
xendomains-libvirtd-conflict.patch 0000000732 732 Bytes
xenpaging.doc.patch 0000002658 2.6 KB
xenpaging.qemu.flush-cache.patch 0000001332 1.3 KB
xl-conf-default-bridge.patch 0000000537 537 Bytes
xnloader.py 0000001875 1.83 KB
xsa155-qemut-qdisk-double-access.patch 0000001921 1.88 KB
xsa155-qemut-xenfb.patch 0000001762 1.72 KB
xsa155-qemuu-qdisk-double-access.patch 0000001464 1.43 KB
xsa155-qemuu-xenfb.patch 0000001479 1.44 KB
xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch 0000002150 2.1 KB
xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch 0000002529 2.47 KB
xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch 0000001592 1.55 KB
xsa159.patch 0000001763 1.72 KB
xsa160.patch 0000002669 2.61 KB
xsa162-qemut.patch 0000001782 1.74 KB
xsa162-qemuu.patch 0000001535 1.5 KB
xsa164.patch 0000001450 1.42 KB
xsa165.patch 0000002576 2.52 KB
xsa166.patch 0000001892 1.85 KB
Revision 4 (latest revision is 5)
Oleksandr Chumachenko's avatar Oleksandr Chumachenko (Ledest) committed (revision 4)
- bsc#960093 - VUL-0: CVE-2015-8615: xen: x86: unintentional
  logging upon guest changing callback method (XSA-169)
  5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch

- Adjust xen-dom0-modules.service to run Before xenstored.service
  instead of proc-xen.mount to workaround a bug in systemd "design"
  (bnc#959845)

- bsc#959387 - VUL-0: CVE-2015-8568 CVE-2015-8567: xen: qemu: net:
  vmxnet3: host memory leakage
  CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch

- bsc#957988 - VUL-0: CVE-2015-8550: xen: paravirtualized drivers
  incautious about shared memory contents (XSA-155)
  xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch
  xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch
  xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch
  xsa155-qemuu-qdisk-double-access.patch
  xsa155-qemut-qdisk-double-access.patch
  xsa155-qemuu-xenfb.patch
  xsa155-qemut-xenfb.patch
- bsc#959006 - VUL-0: CVE-2015-8558: xen: qemu: usb: infinite loop
  in ehci_advance_state results in DoS
  CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch
- bsc#958918 - VUL-0: CVE-2015-7549: xen: qemu pci: null pointer
  dereference issue
  CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch
- bsc#958493 - VUL-0: CVE-2015-8504: xen: qemu: ui: vnc: avoid
  floating point exception
  CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch
  CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch
- bsc#958007 - VUL-0: CVE-2015-8554: xen: qemu-dm buffer overrun in
  MSI-X handling (XSA-164)
  xsa164.patch
- bsc#958009 - VUL-0: CVE-2015-8555: xen: information leak in
  legacy x86 FPU/XMM initialization (XSA-165)
  xsa165.patch
- bsc#958523 - VUL-0: xen: ioreq handling possibly susceptible to
  multiple read issue (XSA-166)
  xsa166.patch

- bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100:
  infinite loop in processing command block list
  CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch
  CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch
- Upstream patches from Jan
  56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch
  5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch)
  5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch
  56544a57-VMX-fix-adjust-trap-injection.patch
  56546ab2-sched-fix-insert_vcpu-locking.patch

- bsc#956592 - VUL-0: xen: virtual PMU is unsupported (XSA-163)
  56549f24-x86-vPMU-document-as-unsupported.patch
- bsc#956408 - VUL-0: CVE-2015-8339, CVE-2015-8340: xen:
  XENMEM_exchange error handling issues (XSA-159)
  xsa159.patch
- bsc#956409 - VUL-0: CVE-2015-8341: xen: libxl leak of pv kernel
  and initrd on error (XSA-160)
  xsa160.patch
- bsc#956411 - VUL-0: CVE-2015-7504: xen: heap buffer overflow
  vulnerability in pcnet emulator (XSA-162)
  xsa162-qemuu.patch
  xsa162-qemut.patch
- bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour
  readonly flag on disks with qemu-xen (xsa-142)
  5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch
  5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch
Comments 0
openSUSE Build Service is sponsored by