Xen Virtualization: Hypervisor (aka VMM aka Microkernel)

Edit Package xen.8426

Xen is a virtual machine monitor for x86 that supports execution of
multiple guest operating systems with unprecedented levels of
performance and resource isolation.

This package contains the Xen Hypervisor. (tm)

Modern computers are sufficiently powerful to use virtualization to
present the illusion of many smaller virtual machines (VMs), each
running a separate operating system instance. Successful partitioning
of a machine to support the concurrent execution of multiple operating
systems poses several challenges. Firstly, virtual machines must be
isolated from one another: It is not acceptable for the execution of
one to adversely affect the performance of another. This is
particularly true when virtual machines are owned by mutually
untrusting users. Secondly, it is necessary to support a variety of
different operating systems to accommodate the heterogeneity of popular
applications. Thirdly, the performance overhead introduced by
virtualization should be small.

Xen uses a technique called paravirtualization: The guest OS is
modified, mainly to enhance performance.

The Xen hypervisor (microkernel) does not provide device drivers for
your hardware (except for CPU and memory). This job is left to the
kernel that's running in domain 0. Thus the domain 0 kernel is
privileged; it has full hardware access. It's started immediately after
Xen starts up. Other domains have no access to the hardware; instead
they use virtual interfaces that are provided by Xen (with the help of
the domain 0 kernel).

Xen does support booting other Operating Systems; ports of NetBSD
(Christian Limpach), FreeBSD (Kip Macy), and Plan 9 (Ron Minnich)
exist. A port of Windows XP was developed for an earlier version of
Xen, but is not available for release due to license restrictions.

In addition to this package you need to install the kernel-xen and
xen-tools to use Xen. Xen 3 also supports running unmodified guests
using full virtualization, if appropriate hardware is present. Install
xen-tools-ioemu if you want to use this.

[Hypervisor is a trademark of IBM]

Refresh
Refresh
Source Files
Filename Size Changed
0001-net-move-the-tap-buffer-into-TAPState.patch 0000001793 1.75 KB
0001-xenstore-let-write_node-and-some-callers-return-errn.patch 0000004294 4.19 KB
0002-net-increase-tap-buffer-size.patch 0000001383 1.35 KB
0002-xenstore-undo-function-rename.patch 0000003699 3.61 KB
0003-e1000-fix-access-4-bytes-beyond-buffer-end.patch 0000001690 1.65 KB
0003-xenstore-rework-of-transaction-handling.patch 0000030535 29.8 KB
0004-e1000-secrc-support.patch 0000001778 1.74 KB
0005-e1000-multi-buffer-packet-support.patch 0000004051 3.96 KB
0006-e1000-clear-EOP-for-multi-buffer-descriptors.patch 0000002393 2.34 KB
0007-e1000-verify-we-have-buffers-upfront.patch 0000003055 2.98 KB
0008-e1000-check-buffer-availability.patch 0000001585 1.55 KB
54b3f023-xenstored-log-tdb-messages.patch 0000003347 3.27 KB
54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 0000001810 1.77 KB
54c27c6d-vmx-merge-MSR-management-routines.patch 0000005348 5.22 KB
54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 0000012232 11.9 KB
54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch 0000005013 4.9 KB
54f4985f-libxl-fix-libvirtd-double-free.patch 0000002681 2.62 KB
55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 0000004814 4.7 KB
55111ee4-x86-support-newer-Intel-CPU-models.patch 0000005095 4.98 KB
551ac326-xentop-add-support-for-qdisk.patch 0000019315 18.9 KB
552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 0000001154 1.13 KB
552d0fe8-x86-mtrr-include-asm-atomic.h.patch 0000000651 651 Bytes
552d293b-x86-vMSI-X-honor-all-mask-requests.patch 0000001962 1.92 KB
552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 0000002174 2.12 KB
5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch 0000000934 934 Bytes
5537a7ea-libxl-fd-events1.patch 0000004442 4.34 KB
5537a7eb-libxl-fd-events2.patch 0000001899 1.85 KB
5537a81d-libxl-fd-events3.patch 0000003310 3.23 KB
5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 0000001318 1.29 KB
5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch 0000011618 11.3 KB
554c7aee-x86-provide-arch_fetch_and_add.patch 0000002161 2.11 KB
554c7b00-arm-provide-arch_fetch_and_add.patch 0000000884 884 Bytes
554cc211-libxl-add-qxl.patch 0000006477 6.33 KB
55534b0a-x86-provide-add_sized.patch 0000002753 2.69 KB
55534b25-arm-provide-add_sized.patch 0000002858 2.79 KB
5555a4f8-use-ticket-locks-for-spin-locks.patch 0000009021 8.81 KB
5555a5b9-x86-arm-remove-asm-spinlock-h.patch 0000007048 6.88 KB
5555a8ec-introduce-non-contiguous-allocation.patch 0000004606 4.5 KB
555de7bb-xl-migrate-live.patch 0000002181 2.13 KB
556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch 0000000865 865 Bytes
5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 0000006237 6.09 KB
55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 0000003179 3.1 KB
557eb55f-gnttab-per-active-entry-locking.patch 0000018022 17.6 KB
557eb5b6-gnttab-introduce-maptrack-lock.patch 0000003364 3.29 KB
557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 0000023163 22.6 KB
557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 0000001543 1.51 KB
5582bf43-evtchn-simplify-port_is_valid.patch 0000002281 2.23 KB
5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 0000001191 1.16 KB
5583d9c5-x86-MSI-X-cleanup.patch 0000010669 10.4 KB
5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 0000015270 14.9 KB
5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch 0000009554 9.33 KB
5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch 0000004498 4.39 KB
5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch 0000003269 3.19 KB
5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch 0000003245 3.17 KB
5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch 0000006781 6.62 KB
5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch 0000000909 909 Bytes
55b0a218-x86-PCI-CFG-write-intercept.patch 0000004561 4.45 KB
55b0a255-x86-MSI-X-maskall.patch 0000002671 2.61 KB
55b0a283-x86-MSI-X-teardown.patch 0000012458 12.2 KB
55b0a2ab-x86-MSI-X-enable.patch 0000013604 13.3 KB
55b0a2db-x86-MSI-track-guest-masking.patch 0000001795 1.75 KB
55c322f9-VT-d-add-iommu-igfx-option-to-workaround-graphics-issues.patch 0000004321 4.22 KB
55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch 0000004102 4.01 KB
5604f239-x86-PV-properly-populate-descriptor-tables.patch 0000003716 3.63 KB
561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 0000004156 4.06 KB
5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch 0000003949 3.86 KB
56a0f4f2-x86-constrain-MFN-range-Dom0-may-access.patch 0000001821 1.78 KB
56b1fca0-x86-PV-m2p-strict-vs-migration-v2.patch 0000005306 5.18 KB
5708158d-x86-vMSI-X-fix-qword-write-covering-vector-control-field.patch 0000000828 828 Bytes
571e0bb9-x86-MSI-handle-both-MSI-X-and-MSI-in-cfg-space-write-intercept.patch 0000001649 1.61 KB
571e0c2b-x86-MSI-X-correctly-track-interrupt-masking-state.patch 0000001471 1.44 KB
571f3a56-x86-vMSI-X-avoid-missing-first-unmask-of-vectors.patch 0000005827 5.69 KB
57220bd5-x86-vMSI-X-also-snoop-qword-writes.patch 0000002142 2.09 KB
57238bb9-x86-vMSI-X-also-snoop-REP-MOVS.patch 0000005560 5.43 KB
57238c1e-x86-fix-domain-cleanup.patch 0000001364 1.33 KB
57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch 0000005217 5.09 KB
576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 0000001946 1.9 KB
57a1e603-x86-time-adjust-local-system-time-initialization.patch 0000003705 3.62 KB
57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 0000007319 7.15 KB
57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch 0000009314 9.1 KB
57a30261-x86-support-newer-Intel-CPU-models.patch 0000006913 6.75 KB
57da8883-credit1-fix-mask-to-be-used-for-tickling.patch 0000001529 1.49 KB
57da8883-credit2-properly-schedule-migration-of-running-vcpu.patch 0000001003 1003 Bytes
57dfb1c5-x86-Intel-hide-CPUID-faulting-capability-from-guests.patch 0000002747 2.68 KB
57e93e1d-x86emul-correct-loading-of-ss.patch 0000002726 2.66 KB
57e93e4a-x86emul-don-t-allow-null-selector-for-LTR.patch 0000001099 1.07 KB
57e93e89-x86-AMD-apply-erratum-665-workaround.patch 0000001947 1.9 KB
57ee6cbc-credit1-return-time-remaining-to-limit-as-next-timeslice.patch 0000002222 2.17 KB
57f3a8ee-x86emul-honor-guest-CR0-TS-and-CR0-EM.patch 0000005417 5.29 KB
57fb6a91-x86-defer-not-present-segment-checks.patch 0000006221 6.08 KB
5800c51d-x86-hvm-Clobber-cs-L-when-LME-becomes-set.patch 0000001493 1.46 KB
5800caec-x86emul-fix-pushing-of-selector-registers.patch 0000002642 2.58 KB
5800cb06-x86-Viridian-don-t-depend-on-undefined-register-state.patch 0000001624 1.59 KB
5810a9cc-x86-emul-Correct-decoding-of-SReg3-operands.patch 0000005830 5.69 KB
58249392-x86-svm-dont-clobber-eax-edx-if-RDMSR-intercept-fails.patch 0000002674 2.61 KB
582c35d6-x86-vmx-correct-long-mode-check-in-vmx_cpuid_intercept.patch 0000001438 1.4 KB
582c35ee-x86-traps-dont-call-hvm_hypervisor_cpuid_leaf-for-PV.patch 0000000903 903 Bytes
58343dc2-x86-hvm-Fix-the-handling-of-non-present-segments.patch 0000006015 5.87 KB
58343df8-x86-HVM-dont-load-LDTR-with-VM86-mode-attrs-during-task-switch.patch 0000002687 2.62 KB
58343e24-x86-PV-writes-of-fs-and-gs-base-MSRs-require-canonical-addresses.patch 0000003110 3.04 KB
58343ec2-x86emul-fix-huge-bit-offset-handling.patch 0000002127 2.08 KB
58343f29-x86-emul-correct-the-IDT-entry-calculation-in-inject_swint.patch 0000002949 2.88 KB
58343f44-x86-svm-fix-injection-of-software-interrupts.patch 0000003545 3.46 KB
58343f79-pygrub-Properly-quote-results-when-returning-them-to-the-caller.patch 0000002211 2.16 KB
58343fa5-x86-EFI-meet-further-spec-requirements-for-runtime-calls.patch 0000012851 12.5 KB
5837fa68-x86-SVM-don-t-deliver-GP-without-error-code.patch 0000003157 3.08 KB
583816f4-x86-vmx-Don-t-deliver-MC-with-an-error-code.patch 0000000825 825 Bytes
58383d46-x86emul-CMOVcc-always-writes-its-destination.patch 0000001675 1.64 KB
58510cac-x86emul-MOVNTI-no-REP-prefixes.patch 0000000759 759 Bytes
5853ed37-VT-d-correct-dma_msi_set_affinity.patch 0000003831 3.74 KB
5853ee07-x86emul-CMPXCHG16B-aligned-operand.patch 0000001745 1.7 KB
58580060-x86-emul-correct-SYSCALL-eflags-handling.patch 0000002658 2.6 KB
585aa3c5-x86-force-EFLAGS-IF-on-upon-exit-to-PV.patch 0000002728 2.66 KB
587de4a9-x86emul-VEX-B-ignored-in-compat-mode.patch 0000003060 2.99 KB
5882129d-x86emul-LOCK-check-adjustments.patch 0000000811 811 Bytes
58821300-x86-segment-attribute-handling.patch 0000000904 904 Bytes
58873c80-x86-hvm-do-not-set-msr_tsc_adjust-on-.patch 0000003851 3.76 KB
5888b1b3-x86-emulate-dont-assume-addr_size-32-implies-protmode.patch 0000001897 1.85 KB
5899cbd9-EPT-allow-wrcomb-MMIO-mappings-again.patch 0000004185 4.09 KB
58a44771-IOMMU-always-call-teardown-callback.patch 0000001157 1.13 KB
58a48ccc-x86-fix-p2m_flush_table-for-non-nested.patch 0000001438 1.4 KB
58a70d94-VMX-fix-VMCS-race-on-cswitch-paths.patch 0000003503 3.42 KB
58ac1f3f-VMX-dont-leak-host-syscall-MSRs.patch 0000003693 3.61 KB
58cbf682-x86-EFI-avoid-overrunning-mb_modules.patch 0000000821 821 Bytes
58cf9260-x86-EFI-avoid-Xen-when-looking-for-mod-kexec-pos.patch 0000002934 2.87 KB
58cf9277-x86-time-dont-use-vTSC-if-host-guest-freqs-match.patch 0000004040 3.95 KB
58d25ea2-xenstore-add-missing-checks-for-allocation-failure.patch 0000001811 1.77 KB
58da51e7-xenstored-Log-when-the-write-transaction-rate-limit.patch 0000003665 3.58 KB
58da51e7-xenstored-apply-a-write-transaction-rate-limit.patch 0000013401 13.1 KB
58dd03fc-x86-use-64-bit-mask-on-mfn.patch 0000001142 1.12 KB
58e368c1-kexec-clear-kexec_image-slot-when-unloading.patch 0000001200 1.17 KB
58e395f2-XENMEM_exchange-properly-check-guest-ranges.patch 0000003576 3.49 KB
58e50194-memory-exit-early-from-memory_exchange.patch 0000001197 1.17 KB
58e501b9-memory-dont-hand-MFN-to-translated-guests.patch 0000001741 1.7 KB
58e79a56-x86-mce-make-severity_cpu-private.patch 0000001505 1.47 KB
58e79a79-x86-mce-always-reinit-severity_cpu.patch 0000000882 882 Bytes
58f78b61-x86-move-ucode-loading-earlier.patch 0000008940 8.73 KB
59087f4e-multicall-deal-with-early-exit-conditions.patch 0000005914 5.78 KB
59087fc2-x86-discard-type-info-when-stealing-pages.patch 0000001936 1.89 KB
5a140ba6-x86-hvm-dont-corrupt-context-stream-writing-MSRs.patch 0000002022 1.97 KB
5a313972-x86-microcode-add-support-for-AMD-Fam17.patch 0000001378 1.35 KB
5a4fd893-1-x86-break-out-alternative-asm-into-separate-header.patch 0000002034 1.99 KB
5a4fd893-2-x86-introduce-ALTERNATIVE_2-macros.patch 0000002158 2.11 KB
5a4fd893-x86-entry-remove-partial-cpu_user_regs.patch 0000011624 11.4 KB
5a4fd894-1-x86-rearrange-RESTORE_ALL-to-restore-in-stack-order.patch 0000001091 1.07 KB
5a4fd894-2-x86-hvm-use-SAVE_ALL-after-VMExit.patch 0000001869 1.83 KB
5a4fd894-3-x86-erase-guest-GPRs-on-entry-to-Xen.patch 0000003999 3.91 KB
5a4fd894-4-clarifications-to-wait-infrastructure.patch 0000002564 2.5 KB
5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4-updates.patch 0000001576 1.54 KB
5a5e2cff-x86-Meltdown-band-aid.patch 0000022277 21.8 KB
5a5e2d73-x86-Meltdown-band-aid-conditional.patch 0000004527 4.42 KB
5a5e3a4e-1-x86-support-compiling-with-indirect-branch-thunks.patch 0000002689 2.63 KB
5a5e3a4e-2-x86-support-indirect-thunks-from-asm.patch 0000012373 12.1 KB
5a5e3a4e-3-x86-report-speculative-mitigation-details.patch 0000004692 4.58 KB
5a5e3a4e-4-x86-AMD-set-lfence-as-Dispatch-Serialising.patch 0000003405 3.33 KB
5a5e3a4e-5-x86-introduce-alternative-indirect-thunks.patch 0000007171 7 KB
5a5e3a4e-6-x86-definitions-for-Indirect-Branch-Controls.patch 0000009145 8.93 KB
5a5e3a4e-7-x86-cmdline-opt-to-disable-IBRS-IBPB-STIBP.patch 0000004701 4.59 KB
5a6b36cd-1-x86-cpuid-handling-of-IBRS-IBPB-STIBP-and-IBRS-for-guests.patch 0000006219 6.07 KB
5a6b36cd-2-x86-msr-emulation-of-SPEC_CTRL-PRED_CMD.patch 0000007464 7.29 KB
5a6b36cd-3-x86-migrate-MSR_SPEC_CTRL.patch 0000004264 4.16 KB
5a6b36cd-4-x86-hvm-permit-direct-access-to-SPEC_CTRL-PRED_CMD.patch 0000003400 3.32 KB
5a6b36cd-5-x86-use-SPEC_CTRL-on-entry.patch 0000020985 20.5 KB
5a6b36cd-6-x86-clobber-RSB-RAS-on-entry.patch 0000005136 5.02 KB
5a6b36cd-7-x86-no-alternatives-in-NMI-MC-paths.patch 0000006303 6.16 KB
5a6b36cd-8-x86-boot-calculate-best-BTI-mitigation.patch 0000011137 10.9 KB
5a6b36cd-9-x86-issue-speculation-barrier.patch 0000005943 5.8 KB
5a6b36cd-A-x86-clear-SPEC_CTRL-while-idle.patch 0000006316 6.17 KB
5a7b1bdd-x86-Meltdown-band-aid-less-IPI.patch 0000001832 1.79 KB
5a843807-x86-spec_ctrl-fix-bugs-in-SPEC_CTRL_ENTRY_FROM_INTR_IST.patch 0000002671 2.61 KB
5ad4948b-x86-correct-MSR_PRED_CMD-emulation.patch 0000002730 2.67 KB
5ad8c3a7-x86-spec_ctrl-update-retpoline-decision-making.patch 0000002719 2.66 KB
5afc13ae-2-x86-express-Xen-SPEC_CTRL-choice-as-variable.patch 0000004144 4.05 KB
5afc13ae-3-x86-merge-bti_ist_info-use_shadow_spec_ctrl.patch 0000011398 11.1 KB
5afc13ae-4-x86-fold-XEN_IBRS-ALTERNATIVES.patch 0000010686 10.4 KB
5afc13ae-5-x86-rename-bits-of-spec_ctrl-infrastructure.patch 0000011754 11.5 KB
5afc13ae-6-x86-elide-MSR_SPEC_CTRL-handling-in-idle.patch 0000002963 2.89 KB
5afc13ae-7-x86-split-X86_FEATURE_SC_MSR.patch 0000006032 5.89 KB
5afc13ae-8-x86-explicitly-set-Xen-default-SPEC_CTRL.patch 0000004139 4.04 KB
5afc13ae-9-x86-cpuid-improve-guest-policies-for-speculative.patch 0000002569 2.51 KB
5afc13ae-A-x86-introduce-spec-ctrl-cmdline-opt.patch 0000014235 13.9 KB
5b0d2dbc-x86-correct-default_xen_spec_ctrl.patch 0000002586 2.53 KB
5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch 0000001617 1.58 KB
5b3cab8e-1-VMX-improve-MSR-load-save-API.patch 0000006825 6.67 KB
5b3cab8e-2-VMX-cleanup-MSR-load-save-infra.patch 0000005213 5.09 KB
5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch 0000002964 2.89 KB
5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch 0000011714 11.4 KB
5b3cab8f-3-VMX-load-only-guest-MSR-entries.patch 0000006532 6.38 KB
5b3f8fa5-port-array_index_nospec-from-Linux.patch 0000006226 6.08 KB
5b4488e7-x86-spec-ctrl-cmdline-handling.patch 0000001172 1.14 KB
5b4c9a60-allow-cpu_down-to-be-called-earlier.patch 0000001667 1.63 KB
5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch 0000001919 1.87 KB
5b5040f2-x86-AMD-distinguish-CU-from-HT.patch 0000004132 4.04 KB
5b505fe5-VMX-fix-find-msr-build.patch 0000001755 1.71 KB
5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch 0000012251 12 KB
5b508775-2-x86-possibly-bring-up-all-CPUs.patch 0000004861 4.75 KB
5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch 0000003655 3.57 KB
CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch 0000001794 1.75 KB
CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch 0000001899 1.85 KB
CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch 0000001377 1.34 KB
CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch 0000001038 1.01 KB
CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch 0000001665 1.63 KB
CVE-2014-0222-blktap-qcow1-validate-l2-table-size.patch 0000002214 2.16 KB
CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch 0000001647 1.61 KB
CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch 0000001601 1.56 KB
CVE-2014-3689-qemut-vmware-vga-turn-off-hw-accel.patch 0000001211 1.18 KB
CVE-2014-3689-qemuu-vmware-vga-vmsvga_copy_rect.patch 0000002366 2.31 KB
CVE-2014-3689-qemuu-vmware-vga-vmsvga_fill_rect.patch 0000002177 2.13 KB
CVE-2014-3689-qemuu-vmware-vga-vmsvga_update_rect.patch 0000002192 2.14 KB
CVE-2014-3689-qemuu-vmware-vga-vmsvga_verify_rect.patch 0000002667 2.6 KB
CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch 0000001398 1.37 KB
CVE-2014-9718-qemuu-PRDT-overflow-from-guest-to-host.patch 0000012308 12 KB
CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch 0000008503 8.3 KB
CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch 0000002407 2.35 KB
CVE-2015-4037-qemut-smb-config-dir-name.patch 0000001554 1.52 KB
CVE-2015-4037-qemuu-smb-config-dir-name.patch 0000001852 1.81 KB
CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch 0000002028 1.98 KB
CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch 0000001204 1.18 KB
CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch 0000001184 1.16 KB
CVE-2015-6855-qemuu-ide-divide-by-zero-issue.patch 0000007016 6.85 KB
CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch 0000001091 1.07 KB
CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch 0000003333 3.25 KB
CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch 0000002383 2.33 KB
CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch 0000002145 2.09 KB
CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch 0000001137 1.11 KB
CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch 0000004404 4.3 KB
CVE-2015-8743-qemut-ne2000-OOB-memory-access-in-ioport-rw-functions.patch 0000001554 1.52 KB
CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch 0000002826 2.76 KB
CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch 0000001369 1.34 KB
CVE-2015-8817-qemuu-OOB-access-in-address_space_rw-leads-to-segmentation-fault.patch 0000002211 2.16 KB
CVE-2015-8818-qemuu-OOB-access-in-address_space_rw-leads-to-segmentation-fault.patch 0000004011 3.92 KB
CVE-2016-10155-qemuu-watchdog-memory-leakage-in-virtual-hardware-watchdog-wdt_i6300esb.patch 0000001328 1.3 KB
CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch 0000001730 1.69 KB
CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch 0000002031 1.98 KB
CVE-2016-1922-qemuu-i386-null-pointer-dereference-in-vapic_write.patch 0000002184 2.13 KB
CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch 0000004302 4.2 KB
CVE-2016-2198-qemuu-usb-ehci-null-pointer-dereference-in-ehci_caps_write.patch 0000001344 1.31 KB
CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch 0000001841 1.8 KB
CVE-2016-2391-qemuu-usb-null-pointer-dereference-in-ohci-module.patch 0000001771 1.73 KB
CVE-2016-2392-qemuu-usb-null-pointer-dereference-in-NDIS-message-handling.patch 0000001086 1.06 KB
CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch 0000002444 2.39 KB
CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch 0000001136 1.11 KB
CVE-2016-2841-qemuu-ne2000-infinite-loop-in-ne2000_receive.patch 0000001112 1.09 KB
CVE-2016-4001-qemut-net-buffer-overflow-in-stellaris_enet-emulator.patch 0000001615 1.58 KB
CVE-2016-4001-qemuu-net-buffer-overflow-in-stellaris_enet-emulator.patch 0000001594 1.56 KB
CVE-2016-4002-qemut-net-buffer-overflow-in-MIPSnet-emulator.patch 0000000942 942 Bytes
CVE-2016-4002-qemuu-net-buffer-overflow-in-MIPSnet-emulator.patch 0000000917 917 Bytes
CVE-2016-4020-qemuu-leakage-of-stack-memory-to-guest.patch 0000000942 942 Bytes
CVE-2016-4037-qemuu-usb-Infinite-loop-vulnerability-in-usb_ehci-using-siTD-process.patch 0000001742 1.7 KB
CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch 0000001246 1.22 KB
CVE-2016-4439-qemuu-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch 0000001231 1.2 KB
CVE-2016-4453-qemuu-vmware-vga-vmsvga-infinite-loop.patch 0000001278 1.25 KB
CVE-2016-4454-qemuu-vmware-vga-vmsvga-out-of-bounds-read.patch 0000002140 2.09 KB
CVE-2016-4952-qemuu-pvscsi-out-of-bounds-access-issue-in-pvsci_ring_init_msg.patch 0000002935 2.87 KB
CVE-2016-5105-qemuu-scsi-megasas-stack-information-leakage-while-reading-configuration.patch 0000001096 1.07 KB
CVE-2016-5106-qemuu-scsi-megasas-out-of-bounds-write-while-setting-controller-properties.patch 0000001078 1.05 KB
CVE-2016-5107-qemuu-scsi-megasas-out-of-bounds-read-in-megasas_lookup_frame-function.patch 0000001338 1.31 KB
CVE-2016-5126-qemuu-buffer-overflow-in-iscsi_aio_ioctl.patch 0000001177 1.15 KB
CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch 0000001301 1.27 KB
CVE-2016-5238-qemuu-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch 0000001288 1.26 KB
CVE-2016-5337-qemuu-scsi-megasas-information-leakage-in-megasas_ctrl_get_info.patch 0000001072 1.05 KB
CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch 0000002575 2.51 KB
CVE-2016-5338-qemuu-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch 0000002616 2.55 KB
CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch 0000002555 2.5 KB
CVE-2016-6351-qemuu-scsi-esp-fix-migration.patch 0000002459 2.4 KB
CVE-2016-6351-qemuu-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch 0000002665 2.6 KB
CVE-2016-6833-qemuu-net-vmxnet3-use-after-free-while-writing.patch 0000001095 1.07 KB
CVE-2016-6834-qemuu-net-vmxnet3-an-infinite-loop-during-packet-fragmentation.patch 0000001239 1.21 KB
CVE-2016-6835-qemuu-net-vmxnet3-buffer-overflow-in-vmxnet_tx_pkt_parse_headers.patch 0000001057 1.03 KB
CVE-2016-6836-qemuu-net-vmxnet3-information-leakage-in-vmxnet3_complete_packet.patch 0000000990 990 Bytes
CVE-2016-6888-qemuu-net-vmxnet3-integer-overflow-in-packet-initialisation-in-vmxnet3.patch 0000001302 1.27 KB
CVE-2016-7908-qemut-net-Infinite-loop-in-mcf_fec_do_tx.patch 0000001803 1.76 KB
CVE-2016-7908-qemuu-net-Infinite-loop-in-mcf_fec_do_tx.patch 0000001775 1.73 KB
CVE-2016-7909-qemut-net-pcnet-infinite-loop-in-pcnet_rdra_addr.patch 0000001098 1.07 KB
CVE-2016-7909-qemuu-net-pcnet-infinite-loop-in-pcnet_rdra_addr.patch 0000001074 1.05 KB
CVE-2016-7995-qemuu-usb-hcd-ehci-memory-leak-in-ehci_process_itd.patch 0000001031 1.01 KB
CVE-2016-8576-qemuu-usb-xHCI-infinite-loop-vulnerability-in-xhci_ring_fetch.patch 0000002371 2.32 KB
CVE-2016-8667-qemut-dma-rc4030-divide-by-zero-error-in-set_next_tick.patch 0000001044 1.02 KB
CVE-2016-8667-qemuu-dma-rc4030-divide-by-zero-error-in-set_next_tick.patch 0000001020 1020 Bytes
CVE-2016-8669-qemut-char-divide-by-zero-error-in-serial_update_parameters.patch 0000001185 1.16 KB
CVE-2016-8669-qemuu-char-divide-by-zero-error-in-serial_update_parameters.patch 0000001160 1.13 KB
CVE-2016-8909-qemuu-audio-intel-hda-infinite-loop-in-processing-dma-buffer-stream.patch 0000001395 1.36 KB
CVE-2016-8910-qemut-net-rtl8139-infinite-loop-while-transmit-in-Cplus-mode.patch 0000001201 1.17 KB
CVE-2016-8910-qemuu-net-rtl8139-infinite-loop-while-transmit-in-Cplus-mode.patch 0000001177 1.15 KB
CVE-2016-9101-qemuu-net-eepro100-memory-leakage-at-device-unplug.patch 0000000903 903 Bytes
CVE-2016-9381-xsa197-qemut.patch 0000002162 2.11 KB
CVE-2016-9381-xsa197-qemuu.patch 0000001976 1.93 KB
CVE-2016-9603-qemut-xsa211.patch 0000008462 8.26 KB
CVE-2016-9603-qemuu-xsa211.patch 0000010219 9.98 KB
CVE-2016-9637-xsa199-qemut.patch 0000003209 3.13 KB
CVE-2016-9776-qemut-net-mcf_fec-infinite-loop-while-receiving-data-in-mcf_fec_receive.patch 0000001124 1.1 KB
CVE-2016-9776-qemuu-net-mcf_fec-infinite-loop-while-receiving-data-in-mcf_fec_receive.patch 0000001095 1.07 KB
CVE-2016-9907-qemuu-usb-redirector-memory-leakage-when-destroying-redirector.patch 0000001558 1.52 KB
CVE-2016-9911-qemuu-usb-ehci-memory-leakage-in-ehci_init_transfer.patch 0000001106 1.08 KB
CVE-2016-9921-qemut-display-cirrus_vga-divide-by-zero-in-cirrus_do_copy.patch 0000002655 2.59 KB
CVE-2016-9921-qemuu-display-cirrus_vga-divide-by-zero-in-cirrus_do_copy.patch 0000002353 2.3 KB
CVE-2017-10664-qemut-nbd-ignore-sigpipe.patch 0000001751 1.71 KB
CVE-2017-10664-qemuu-nbd-ignore-sigpipe.patch 0000001805 1.76 KB
CVE-2017-10806-qemuu-usb-redirect-stack-buffer-overflow-in-debug-logging.patch 0000001408 1.38 KB
CVE-2017-11434-qemut-slirp-out-of-bounds-read-while-parsing-dhcp-options.patch 0000000957 957 Bytes
CVE-2017-11434-qemuu-slirp-out-of-bounds-read-while-parsing-dhcp-options.patch 0000000917 917 Bytes
CVE-2017-13672-qemuu-vga-OOB-read-access-during-display-update.patch 0000015276 14.9 KB
CVE-2017-13672-qemuu-vga-helper.patch 0000002707 2.64 KB
CVE-2017-15289-qemut-cirrus-OOB-access-issue-in-mode4and5-write-functions.patch 0000001804 1.76 KB
CVE-2017-15289-qemuu-cirrus-OOB-access-issue-in-mode4and5-write-functions.patch 0000001680 1.64 KB
CVE-2017-18030-qemut-out-of-bounds-access-in-cirrus_invalidate_region-routine.patch 0000001805 1.76 KB
CVE-2017-18030-qemuu-out-of-bounds-access-in-cirrus_invalidate_region-routine.patch 0000001785 1.74 KB
CVE-2017-2615-qemut-display-cirrus-oob-access-while-doing-bitblt-copy-backward-mode.patch 0000001561 1.52 KB
CVE-2017-2615-qemuu-display-cirrus-oob-access-while-doing-bitblt-copy-backward-mode.patch 0000001553 1.52 KB
CVE-2017-2620-xsa209-qemut-cirrus_bitblt_cputovideo-does-not-check-if-memory-region-safe.patch 0000001962 1.92 KB
CVE-2017-2620-xsa209-qemuu-cirrus_bitblt_cputovideo-does-not-check-if-memory-region-safe.patch 0000002022 1.97 KB
CVE-2017-2633-qemuu-VNC-memory-corruption-due-to-unchecked-resolution-limit.patch 0000015673 15.3 KB
CVE-2017-5526-qemut-audio-memory-leakage-in-es1370-device.patch 0000001497 1.46 KB
CVE-2017-5579-qemuu-serial-host-memory-leakage-in-16550A-UART-emulation.patch 0000001081 1.06 KB
CVE-2017-5856-qemuu-scsi-megasas-host-memory-leakage-in-megasas_handle_dcmd.patch 0000002282 2.23 KB
CVE-2017-5898-qemuu-usb-integer-overflow-in-emulated_apdu_from_guest.patch 0000001444 1.41 KB
CVE-2017-5973-qemuu-usb-infinite-loop-while-doing-control-transfer-in-xhci_kick_epctx.patch 0000002987 2.92 KB
CVE-2017-6414-qemuu-libcacard-host-memory-leakage-while-creating-new-APDU.patch 0000001072 1.05 KB
CVE-2017-6505-qemut-usb-an-infinite-loop-issue-in-ohci_service_ed_list.patch 0000001480 1.45 KB
CVE-2017-6505-qemuu-usb-an-infinite-loop-issue-in-ohci_service_ed_list.patch 0000001486 1.45 KB
CVE-2017-7718-qemut-display-cirrus-OOB-read-access-issue.patch 0000001696 1.66 KB
CVE-2017-7718-qemuu-display-cirrus-OOB-read-access-issue.patch 0000001631 1.59 KB
CVE-2017-7980-qemuu-cirrus-stop-passing-around-dst-pointers-in-the-blitter.patch 0000021393 20.9 KB
CVE-2017-7980-qemuu-cirrus-stop-passing-around-src-pointers-in-the-blitter.patch 0000016699 16.3 KB
CVE-2017-8112-qemuu-scsi-vmw_pvscsi-infinite-loop-in-pvscsi_log2.patch 0000001075 1.05 KB
CVE-2017-8309-qemut-audio-host-memory-leakage-via-capture-buffer.patch 0000001360 1.33 KB
CVE-2017-8309-qemuu-audio-host-memory-leakage-via-capture-buffer.patch 0000001316 1.29 KB
CVE-2017-9330-qemut-usb-ohci-infinite-loop-due-to-incorrect-return-value.patch 0000000606 606 Bytes
CVE-2017-9330-qemuu-usb-ohci-infinite-loop-due-to-incorrect-return-value.patch 0000000610 610 Bytes
CVE-2017-9374-qemuu-usb-ehci-host-memory-leakage-during-hotunplug.patch 0000002724 2.66 KB
CVE-2017-9503-qemuu-megasas-always-store-SCSIRequest-into-MegasasCmd.patch 0000004820 4.71 KB
CVE-2017-9503-qemuu-megasas-do-not-read-DCMD-opcode-more-than-once-from-frame.patch 0000003897 3.81 KB
CVE-2018-11806-qemut-slirp-correct-size-computation-while-concatenating-mbuf.patch 0000001631 1.59 KB
CVE-2018-11806-qemuu-slirp-correct-size-computation-while-concatenating-mbuf.patch 0000001594 1.56 KB
CVE-2018-12617-qemuu-guest-agent-integer-overflow-causes-segmentation-fault.patch 0000001020 1020 Bytes
CVE-2018-5683-qemut-out-of-bounds-read-in-vga_draw_text-routine.patch 0000001577 1.54 KB
CVE-2018-5683-qemuu-out-of-bounds-read-in-vga_draw_text-routine.patch 0000001586 1.55 KB
CVE-2018-7550-qemuu-multiboot-OOB-access-while-loading-kernel-image.patch 0000001323 1.29 KB
README.SUSE 0000030178 29.5 KB
VNC-Support-for-ExtendedKeyEvent-client-message.patch 0000005002 4.88 KB
aarch64-rename-PSR_MODE_ELxx-to-match-linux-headers.patch 0000001313 1.28 KB
altgr_2.patch 0000001869 1.83 KB
baselibs.conf 0000000009 9 Bytes
bdrv_default_rwflag.patch 0000001092 1.07 KB
bdrv_open2_fix_flags.patch 0000005021 4.9 KB
bdrv_open2_flags_2.patch 0000003062 2.99 KB
blktap-no-uninit.patch 0000000889 889 Bytes
blktap-pv-cdrom.patch 0000024008 23.4 KB
blktap.patch 0000001466 1.43 KB
blktapctrl-close-fifos.patch 0000000648 648 Bytes
blktapctrl-default-to-ioemu.patch 0000000944 944 Bytes
blktapctrl-disable-debug-printf.patch 0000001014 1014 Bytes
block-dmmd 0000009571 9.35 KB
block-iscsi 0000002109 2.06 KB
block-nbd 0000000673 673 Bytes
block-npiv 0000003588 3.5 KB
block-npiv-common.sh 0000007967 7.78 KB
block-npiv-vport 0000002101 2.05 KB
boot.local.xenU 0000001987 1.94 KB
boot.xen 0000002385 2.33 KB
build-tapdisk-ioemu.patch 0000005376 5.25 KB
capslock_enable.patch 0000000632 632 Bytes
cdrom-removable.patch 0000003489 3.41 KB
etc_pam.d_xen-api 0000000265 265 Bytes
hibernate.patch 0000001420 1.39 KB
hotplug-Linux-block-performance-fix.patch 0000006532 6.38 KB
init.50-hvm-xen_conf 0000001561 1.52 KB
init.pciback 0000002530 2.47 KB
init.xen_loop 0000000093 93 Bytes
ioemu-bdrv-open-CACHE_WB.patch 0000000818 818 Bytes
ioemu-blktap-barriers.patch 0000002227 2.17 KB
ioemu-blktap-fv-init.patch 0000000738 738 Bytes
ioemu-blktap-image-format.patch 0000003002 2.93 KB
ioemu-blktap-zero-size.patch 0000001146 1.12 KB
ioemu-disable-emulated-ide-if-pv.patch 0000002734 2.67 KB
ioemu-disable-scsi.patch 0000004049 3.95 KB
ioemu-hvm-pv-support.patch 0000002519 2.46 KB
ioemu-vnc-resize.patch 0000001145 1.12 KB
ioemu-watchdog-ib700-timer.patch 0000001439 1.41 KB
ioemu-watchdog-linkage.patch 0000002901 2.83 KB
ioemu-watchdog-support.patch 0000031665 30.9 KB
ipxe-enable-nics.patch 0000000371 371 Bytes
ipxe-no-error-logical-not-parentheses.patch 0000000902 902 Bytes
ipxe.tar.bz2 0002877515 2.74 MB
kernel-boot-hvm.patch 0000008688 8.48 KB
kmp_filelist 0000000093 93 Bytes
libxc-suppress-ramdisk-unzip.patch 0000003128 3.05 KB
libxl.LIBXL_DESTROY_TIMEOUT.patch 0000000692 692 Bytes
libxl.add-option-to-disable-disk-cache-flushes-in-qdisk.patch 0000003868 3.78 KB
libxl.pvscsi.patch 0000045102 44 KB
libxl.set-migration-constraints-from-cmdline.patch 0000021232 20.7 KB
local_attach_support_for_phy.patch 0000002387 2.33 KB
log-guest-console.patch 0000004248 4.15 KB
logrotate.conf 0000000259 259 Bytes
magic_ioport_compat.patch 0000000746 746 Bytes
pci-attach-fix.patch 0000001036 1.01 KB
pvdrv-blkfront-build-upstream.patch 0000001323 1.29 KB
pvdrv_emulation_control.patch 0000001066 1.04 KB
pygrub-boot-legacy-sles.patch 0000002506 2.45 KB
pygrub-handle-one-line-menu-entries.patch 0000002474 2.42 KB
pygrub-netware-xnloader.patch 0000000722 722 Bytes
qemu-dm-segfault.patch 0000002639 2.58 KB
qemu-ifup-set-mtu.patch 0000000556 556 Bytes
qemu-security-etch1.patch 0000001450 1.42 KB
qemu-xen-dir-remote.tar.bz2 0008196793 7.82 MB
qemu-xen-enable-spice-support.patch 0000000442 442 Bytes
qemu-xen-traditional-dir-remote.tar.bz2 0003239328 3.09 MB
qemu-xen-upstream-allow-every-discard-range.patch 0000001627 1.59 KB
qemu-xen-upstream-hvm-pv-support.patch 0000001488 1.45 KB
qemu-xen-upstream-megasas-buildtime.patch 0000001025 1 KB
qemu-xen-upstream-qdisk-cache-unsafe.patch 0000001739 1.7 KB
qemu-xen-upstream-xen_platform-unplug-also-SCSI-disks.patch 0000002530 2.47 KB
qemut-add-support-for-cpuid-MSR_IA32_SPEC_CTRL.patch 0000008119 7.93 KB
qemuu-add-support-for-cpuid-MSR_IA32_SPEC_CTRL.patch 0000006048 5.91 KB
seabios-dir-remote.tar.bz2 0000429805 420 KB
set-mtu-from-bridge-for-tap-interface.patch 0000001443 1.41 KB
stdvga-cache.patch 0000000750 750 Bytes
stubdom.tar.bz2 0017477269 16.7 MB
supported_module.patch 0000000420 420 Bytes
suspend_evtchn_lock.patch 0000002107 2.06 KB
sysconfig.pciback 0000000237 237 Bytes
tapdisk-ioemu-logfile.patch 0000001389 1.36 KB
tapdisk-ioemu-shutdown-fix.patch 0000002943 2.87 KB
tigervnc-long-press.patch 0000001243 1.21 KB
tmp_build.patch 0000001533 1.5 KB
udev-rules.patch 0000000844 844 Bytes
vif-bridge-no-iptables.patch 0000000350 350 Bytes
vif-bridge-tap-fix.patch 0000000969 969 Bytes
vif-route.patch 0000000476 476 Bytes
x86-cpufreq-report.patch 0000002514 2.46 KB
x86-ioapic-ack-default.patch 0000000757 757 Bytes
xen-4.5.5-testing-src.tar.bz2 0004133947 3.94 MB
xen-c99-fix.patch 0000000681 681 Bytes
xen-destdir.patch 0000001856 1.81 KB
xen-disable-qemu-monitor.patch 0000003064 2.99 KB
xen-dom0-modules.service 0000000467 467 Bytes
xen-hvm-default-bridge.patch 0000003491 3.41 KB
xen-qemu-iscsi-fix.patch 0000002843 2.78 KB
xen-utils-0.1.tar.bz2 0000006171 6.03 KB
xen.build-compare.doc_html.patch 0000001200 1.17 KB
xen.build-compare.ipxe.patch 0000001523 1.49 KB
xen.build-compare.man.patch 0000000645 645 Bytes
xen.build-compare.mini-os.patch 0000001208 1.18 KB
xen.build-compare.seabios.patch 0000000732 732 Bytes
xen.build-compare.smbiosdate.patch 0000000930 930 Bytes
xen.build-compare.vgabios.patch 0000000585 585 Bytes
xen.build-compare.xen_compile_h.patch 0000001261 1.23 KB
xen.changes 0000444621 434 KB
xen.libxl.dmmd.patch 0000005174 5.05 KB
xen.spec 0000072490 70.8 KB
xen.stubdom.newlib.patch 0000004388 4.29 KB
xen2libvirt.py 0000004835 4.72 KB
xen_pvonhvm.unplug_at_resume.patch 0000002235 2.18 KB
xen_pvonhvm.xen_emul_unplug.patch 0000001496 1.46 KB
xenalyze.hg.tar.bz2 0000126674 124 KB
xenapiusers 0000000005 5 Bytes
xencommons.service 0000001052 1.03 KB
xenconsole-no-multiple-connections.patch 0000000929 929 Bytes
xenpaging.doc.patch 0000002658 2.6 KB
xenpaging.qemu.flush-cache.patch 0000001334 1.3 KB
xl-conf-default-bridge.patch 0000000537 537 Bytes
xl-coredump-file-location.patch 0000000873 873 Bytes
xnloader.py 0000001875 1.83 KB
xs-01-temporary-context.patch 0000010003 9.77 KB
xs-02-get_parent-context.patch 0000002854 2.79 KB
xs-03-read_node-context.patch 0000004605 4.5 KB
xs-04-get_node-context.patch 0000006787 6.63 KB
xs-05-watch-firing-context.patch 0000006680 6.52 KB
xs-06-talloc-report.patch 0000003482 3.4 KB
xs-07-do_mkdir-error.patch 0000001182 1.15 KB
xs-08-add_change_node-fix.patch 0000001478 1.44 KB
xs-09-add_change_node-params.patch 0000005569 5.44 KB
xs-10-call-add_change_node.patch 0000002354 2.3 KB
xs-11-tdb-record-header.patch 0000004224 4.13 KB
xs-12-node-gen-count.patch 0000004534 4.43 KB
xs-13-read-directory-part-support.patch 0000004546 4.44 KB
xs-14-command-array.patch 0000006740 6.58 KB
xs-15-command-return-val.patch 0000026827 26.2 KB
xs-16-function-static.patch 0000011639 11.4 KB
xs-17-arg-parsing.patch 0000007952 7.77 KB
xs-18-default-buffer.patch 0000011425 11.2 KB
xs-19-handle-alloc-failures.patch 0000018349 17.9 KB
xs-20-tdb-version.patch 0000000980 980 Bytes
xs-21-empty-tdb-database.patch 0000003537 3.45 KB
xs-22-reopen_log-fix.patch 0000000886 886 Bytes
xs-23-XS_DEBUG-rename.patch 0000004013 3.92 KB
xs-24-xenstored_control.patch 0000006123 5.98 KB
xs-25-control-enhance.patch 0000005403 5.28 KB
xs-26-log-control.patch 0000004080 3.98 KB
xs-27-memory-report.patch 0000003192 3.12 KB
xs-28-remove-talloc-report.patch 0000003923 3.83 KB
xs-29-define-off_t.patch 0000000616 616 Bytes
xsa200.patch 0000002279 2.23 KB
xsa215.patch 0000001764 1.72 KB
xsa216-qemuu.patch 0000004488 4.38 KB
xsa217.patch 0000001249 1.22 KB
xsa218-0.patch 0000002083 2.03 KB
xsa218-1.patch 0000003418 3.34 KB
xsa218-2.patch 0000006891 6.73 KB
xsa218-3.patch 0000000710 710 Bytes
xsa219.patch 0000005462 5.33 KB
xsa220.patch 0000003176 3.1 KB
xsa221.patch 0000007437 7.26 KB
xsa222-1.patch 0000004103 4.01 KB
xsa222-2.patch 0000015502 15.1 KB
xsa224-1.patch 0000003585 3.5 KB
xsa224-2.patch 0000001009 1009 Bytes
xsa224-3.patch 0000005757 5.62 KB
xsa224-4.patch 0000010219 9.98 KB
xsa226-1.patch 0000005176 5.05 KB
xsa226-2.patch 0000011334 11.1 KB
xsa227.patch 0000002037 1.99 KB
xsa230.patch 0000001420 1.39 KB
xsa231.patch 0000003694 3.61 KB
xsa232.patch 0000000824 824 Bytes
xsa233.patch 0000001724 1.68 KB
xsa234.patch 0000007183 7.01 KB
xsa235.patch 0000001526 1.49 KB
xsa236.patch 0000002129 2.08 KB
xsa237-1.patch 0000000808 808 Bytes
xsa237-2.patch 0000002126 2.08 KB
xsa237-3.patch 0000002074 2.03 KB
xsa237-4.patch 0000003852 3.76 KB
xsa237-5.patch 0000001266 1.24 KB
xsa238.patch 0000001371 1.34 KB
xsa239.patch 0000001995 1.95 KB
xsa240-1.patch 0000019969 19.5 KB
xsa240-2.patch 0000003924 3.83 KB
xsa240-3.patch 0000003016 2.95 KB
xsa240-4.patch 0000001214 1.19 KB
xsa241.patch 0000004804 4.69 KB
xsa242.patch 0000001607 1.57 KB
xsa243-1.patch 0000001120 1.09 KB
xsa243-2.patch 0000004189 4.09 KB
xsa243-3.patch 0000002538 2.48 KB
xsa244.patch 0000002069 2.02 KB
xsa246.patch 0000003022 2.95 KB
xsa247-1.patch 0000006335 6.19 KB
xsa247-2.patch 0000004143 4.05 KB
xsa248.patch 0000006699 6.54 KB
xsa249.patch 0000001974 1.93 KB
xsa250.patch 0000002465 2.41 KB
xsa251.patch 0000000760 760 Bytes
xsa252.patch 0000000766 766 Bytes
xsa255-1.patch 0000004184 4.09 KB
xsa255-2.patch 0000006490 6.34 KB
xsa258.patch 0000004901 4.79 KB
xsa259.patch 0000001386 1.35 KB
xsa260-1.patch 0000002768 2.7 KB
xsa260-2.patch 0000003945 3.85 KB
xsa260-3.patch 0000003409 3.33 KB
xsa260-4.patch 0000002807 2.74 KB
xsa261.patch 0000009366 9.15 KB
xsa262.patch 0000002308 2.25 KB
xsa263-1.patch 0000003643 3.56 KB
xsa263-2.patch 0000007949 7.76 KB
xsa263-3.patch 0000003483 3.4 KB
xsa264.patch 0000001967 1.92 KB
xsa265.patch 0000004471 4.37 KB
xsa267-1.patch 0000001748 1.71 KB
xsa267-2.patch 0000007683 7.5 KB
xsa267-3.patch 0000002601 2.54 KB
xsa267-4.patch 0000003048 2.98 KB
xsa267-5.patch 0000003670 3.58 KB
xsa273-1.patch 0000010312 10.1 KB
xsa273-2.patch 0000005549 5.42 KB
xsa273-3.patch 0000007398 7.22 KB
xsa273-4.patch 0000007629 7.45 KB
xsa273-5.patch 0000008127 7.94 KB
xsa273-6.patch 0000005581 5.45 KB
xsa273-7.patch 0000002720 2.66 KB
xsa273-8.patch 0000007195 7.03 KB
xsa273-9.patch 0000002654 2.59 KB
Latest Revision
Marcus Meissner's avatar Marcus Meissner (msmeissn) committed (revision 1)
Release from SUSE:Maintenance:8426 / xen.SUSE_SLE-12-SP1_Update
Comments 0
openSUSE Build Service is sponsored by