Xen Virtualization: Hypervisor (aka VMM aka Microkernel)

Edit Package xen

Xen is a virtual machine monitor for x86 that supports execution of
multiple guest operating systems with unprecedented levels of
performance and resource isolation.

This package contains the Xen Hypervisor. (tm)

Modern computers are sufficiently powerful to use virtualization to
present the illusion of many smaller virtual machines (VMs), each
running a separate operating system instance. Successful partitioning
of a machine to support the concurrent execution of multiple operating
systems poses several challenges. Firstly, virtual machines must be
isolated from one another: It is not acceptable for the execution of
one to adversely affect the performance of another. This is
particularly true when virtual machines are owned by mutually
untrusting users. Secondly, it is necessary to support a variety of
different operating systems to accommodate the heterogeneity of popular
applications. Thirdly, the performance overhead introduced by
virtualization should be small.

Xen uses a technique called paravirtualization: The guest OS is
modified, mainly to enhance performance.

The Xen hypervisor (microkernel) does not provide device drivers for
your hardware (except for CPU and memory). This job is left to the
kernel that's running in domain 0. Thus the domain 0 kernel is
privileged; it has full hardware access. It's started immediately after
Xen starts up. Other domains have no access to the hardware; instead
they use virtual interfaces that are provided by Xen (with the help of
the domain 0 kernel).

Xen does support booting other Operating Systems; ports of NetBSD
(Christian Limpach), FreeBSD (Kip Macy), and Plan 9 (Ron Minnich)
exist. A port of Windows XP was developed for an earlier version of
Xen, but is not available for release due to license restrictions.

In addition to this package you need to install the kernel-xen and
xen-tools to use Xen. Xen 3 also supports running unmodified guests
using full virtualization, if appropriate hardware is present. Install
xen-tools-ioemu if you want to use this.

[Hypervisor is a trademark of IBM]

Refresh
Refresh
Source Files
Filename Size Changed
5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch 0000001765 1.72 KB
5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch 0000009290 9.07 KB
5b3cab8e-2-VMX-improve-MSR-load-save-API.patch 0000008970 8.76 KB
5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch 0000005417 5.29 KB
5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch 0000003344 3.27 KB
5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch 0000012896 12.6 KB
5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch 0000007025 6.86 KB
5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch 0000005431 5.3 KB
5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch 0000007341 7.17 KB
5b3f8fa5-port-array_index_nospec-from-Linux.patch 0000006230 6.08 KB
5b4321f6-x86-correctly-set-nonlazy_xstate_used-when-loading-full-state.patch 0000001918 1.87 KB
5b4488e7-x86-spec-ctrl-cmdline-handling.patch 0000001194 1.17 KB
5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch 0000002410 2.35 KB
5b4c9a60-allow-cpu_down-to-be-called-earlier.patch 0000001670 1.63 KB
5b4db308-SVM-fix-cleanup-svm_inject_event.patch 0000004274 4.17 KB
5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch 0000001919 1.87 KB
5b5040f2-x86-AMD-distinguish-CU-from-HT.patch 0000004223 4.12 KB
5b505fe5-VMX-fix-find-msr-build.patch 0000001989 1.94 KB
5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch 0000012954 12.7 KB
5b508775-2-x86-possibly-bring-up-all-CPUs.patch 0000004761 4.65 KB
5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch 0000003259 3.18 KB
5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch 0000001091 1.07 KB
5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch 0000004394 4.29 KB
5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch 0000001873 1.83 KB
5b56feb1-hvm-Disallow-unknown-MSR_EFER-bits.patch 0000001539 1.5 KB
5b56feb2-spec-ctrl-Fix-the-parsing-of-xpti--on-fixed-Intel-hardware.patch 0000002811 2.75 KB
5b62ca93-VMX-avoid-hitting-BUG_ON.patch 0000001107 1.08 KB
5b6d84ac-x86-fix-improve-vlapic-read-write.patch 0000007615 7.44 KB
5b6d8ce2-x86-XPTI-parsing.patch 0000002862 2.79 KB
5b72fbbe-ARM-disable-grant-table-v2.patch 0000001713 1.67 KB
5b72fbbe-oxenstored-eval-order.patch 0000001289 1.26 KB
5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch 0000004928 4.81 KB
5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch 0000011288 11 KB
5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch 0000007647 7.47 KB
5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch 0000008406 8.21 KB
5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch 0000008985 8.77 KB
5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch 0000009297 9.08 KB
5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch 0000005896 5.76 KB
5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch 0000003959 3.87 KB
5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch 0000006675 6.52 KB
5b72fbbf-x86-Make-spec-ctrl-no-a-global-disable-of-all-mitigations.patch 0000002337 2.28 KB
5b72fbbf-xl.conf-Add-global-affinity-masks.patch 0000014878 14.5 KB
5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch 0000001922 1.88 KB
5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch 0000001940 1.89 KB
5b75afef-x86-setup-avoid-OoB-E820-lookup.patch 0000001105 1.08 KB
5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch 0000001139 1.11 KB
5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch 0000000720 720 Bytes
5b8d5832-x86-assorted-array_index_nospec-insertions.patch 0000004999 4.88 KB
5b8fae26-tools-libxl-correct-vcpu-affinity-output-with-sparse-physical-cpu-map.patch 0000001230 1.2 KB
5b8fae26-xen-fill-topology-info-for-all-present-cpus.patch 0000001631 1.59 KB
5b8fb5af-tools-xl-refuse-to-set-number-of-vcpus-to-0-via-xl-vcpu-set.patch 0000002764 2.7 KB
5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch 0000006368 6.22 KB
5b9784d2-x86-HVM-add-known_gla-helper.patch 0000003698 3.61 KB
5b9784f2-x86-HVM-split-page-straddling-accesses.patch 0000008328 8.13 KB
5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch 0000009618 9.39 KB
5bacae4b-x86-boot-allocate-extra-module-slot.patch 0000001298 1.27 KB
5bae44ce-x86-silence-false-log-messages.patch 0000001423 1.39 KB
5bb60c12-x86-split-opt_xpti.patch 0000005307 5.18 KB
5bb60c4f-x86-split-opt_pv_l1tf.patch 0000005488 5.36 KB
5bb60c74-x86-fix-xpti-and-pv-l1tf.patch 0000001700 1.66 KB
5bcf0722-x86-boot-enable-NMIs.patch 0000001415 1.38 KB
5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch 0000002202 2.15 KB
5bd076e9-x86-boot-init-debug-regs-correctly.patch 0000002687 2.62 KB
5bd076e9-x86-init-vcpu-debug-regs-correctly.patch 0000003230 3.15 KB
5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch 0000010198 9.96 KB
5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch 0000004294 4.19 KB
5bdc31d5-VMX-fix-vmx_handle_eoi.patch 0000003444 3.36 KB
5be2a308-x86-extend-get_platform_badpages.patch 0000005171 5.05 KB
5be2a354-x86-work-around-HLE-host-lockup-erratum.patch 0000001642 1.6 KB
CVE-2014-0222-blktap-qcow1-validate-l2-table-size.patch 0000001545 1.51 KB
README.SUSE 0000030178 29.5 KB
aarch64-maybe-uninitialized.patch 0000000756 756 Bytes
aarch64-rename-PSR_MODE_ELxx-to-match-linux-headers.patch 0000001371 1.34 KB
baselibs.conf 0000000009 9 Bytes
bin-python3-conversion.patch 0000021905 21.4 KB
blktap2-no-uninit.patch 0000000423 423 Bytes
block-dmmd 0000009571 9.35 KB
block-npiv 0000003588 3.5 KB
block-npiv-common.sh 0000007967 7.78 KB
block-npiv-vport 0000002101 2.05 KB
boot.local.xenU 0000001987 1.94 KB
boot.xen 0000002385 2.33 KB
build-python3-conversion.patch 0000035841 35 KB
disable-building-pv-shim.patch 0000000386 386 Bytes
etc_pam.d_xen-api 0000000265 265 Bytes
gcc8-fix-array-warning-on-i586.patch 0000001166 1.14 KB
gcc8-fix-format-warning-on-i586.patch 0000001844 1.8 KB
gcc8-inlining-failed.patch 0000000974 974 Bytes
hibernate.patch 0000001324 1.29 KB
init.pciback 0000002530 2.47 KB
init.xen_loop 0000000093 93 Bytes
ipxe-enable-nics.patch 0000000371 371 Bytes
ipxe-no-error-logical-not-parentheses.patch 0000001025 1 KB
ipxe-use-rpm-opt-flags.patch 0000001125 1.1 KB
ipxe.tar.bz2 0002877846 2.74 MB
libxc.sr.superpage.patch 0000028278 27.6 KB
libxl.add-option-to-disable-disk-cache-flushes-in-qdisk.patch 0000009140 8.93 KB
libxl.pvscsi.patch 0000083477 81.5 KB
libxl.set-migration-constraints-from-cmdline.patch 0000024082 23.5 KB
logrotate.conf 0000000259 259 Bytes
migration-python3-conversion.patch 0000005004 4.89 KB
mini-os.tar.bz2 0000303955 297 KB
pygrub-boot-legacy-sles.patch 0000002506 2.45 KB
pygrub-handle-one-line-menu-entries.patch 0000002474 2.42 KB
pygrub-netware-xnloader.patch 0000000722 722 Bytes
pygrub-python3-conversion.patch 0000025867 25.3 KB
replace-obsolete-network-configuration-commands-in-s.patch 0000009610 9.38 KB
reproducible.patch 0000001716 1.68 KB
stdvga-cache.patch 0000000750 750 Bytes
stubdom-have-iovec.patch 0000000800 800 Bytes
stubdom.tar.bz2 0019598623 18.7 MB
suse-xendomains-service.patch 0000000806 806 Bytes
suspend_evtchn_lock.patch 0000002115 2.07 KB
sysconfig.pciback 0000000237 237 Bytes
tmp_build.patch 0000001866 1.82 KB
vif-bridge-no-iptables.patch 0000000350 350 Bytes
vif-bridge-tap-fix.patch 0000000969 969 Bytes
vif-route.patch 0000000530 530 Bytes
x86-cpufreq-report.patch 0000002860 2.79 KB
x86-ioapic-ack-default.patch 0000000760 760 Bytes
xen-4.11.0-testing-src.tar.bz2 0004980715 4.75 MB
xen-arch-kconfig-nr_cpus.patch 0000000399 399 Bytes
xen-destdir.patch 0000002185 2.13 KB
xen-dom0-modules.service 0000000468 468 Bytes
xen-supportconfig 0000002968 2.9 KB
xen-utils-0.1.tar.bz2 0000006272 6.13 KB
xen.2b50cdbc444c637575580dcfa6c9525a84d5cc62.patch 0000001002 1002 Bytes
xen.b8f33431f3dd23fb43a879f4bdb4283fdc9465ad.patch 0000001269 1.24 KB
xen.bug1079730.patch 0000007396 7.22 KB
xen.build-compare.doc_html.patch 0000001207 1.18 KB
xen.build-compare.man.patch 0000000677 677 Bytes
xen.changes 0000462093 451 KB
xen.libxl.dmmd.patch 0000005830 5.69 KB
xen.spec 0000042856 41.9 KB
xen.stubdom.newlib.patch 0000004443 4.34 KB
xen2libvirt.py 0000004837 4.72 KB
xenapiusers 0000000005 5 Bytes
xencommons.service 0000001052 1.03 KB
xenconsole-no-multiple-connections.patch 0000000931 931 Bytes
xenpaging.doc.patch 0000002658 2.6 KB
xenstore-run-in-studomain.patch 0000002470 2.41 KB
xl-conf-default-bridge.patch 0000000537 537 Bytes
xnloader.py 0000001903 1.86 KB
xsa275-1.patch 0000004110 4.01 KB
xsa275-2.patch 0000002321 2.27 KB
xsa276-1.patch 0000003280 3.2 KB
xsa276-2.patch 0000002715 2.65 KB
xsa277.patch 0000001688 1.65 KB
xsa279.patch 0000001101 1.08 KB
xsa280-1.patch 0000004345 4.24 KB
xsa280-2.patch 0000005404 5.28 KB
Revision 257 (latest revision is 344)
Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 652068 from Charles Arnold's avatar Charles Arnold (charlesa) (revision 257)
Security and maintenance update
Comments 0
openSUSE Build Service is sponsored by