Xen Virtualization: Hypervisor (aka VMM aka Microkernel)

Edit Package xen.openSUSE_13.2_Update

Xen is a virtual machine monitor for x86 that supports execution of
multiple guest operating systems with unprecedented levels of
performance and resource isolation.

This package contains the Xen Hypervisor. (tm)

Modern computers are sufficiently powerful to use virtualization to
present the illusion of many smaller virtual machines (VMs), each
running a separate operating system instance. Successful partitioning
of a machine to support the concurrent execution of multiple operating
systems poses several challenges. Firstly, virtual machines must be
isolated from one another: It is not acceptable for the execution of
one to adversely affect the performance of another. This is
particularly true when virtual machines are owned by mutually
untrusting users. Secondly, it is necessary to support a variety of
different operating systems to accommodate the heterogeneity of popular
applications. Thirdly, the performance overhead introduced by
virtualization should be small.

Xen uses a technique called paravirtualization: The guest OS is
modified, mainly to enhance performance.

The Xen hypervisor (microkernel) does not provide device drivers for
your hardware (except for CPU and memory). This job is left to the
kernel that's running in domain 0. Thus the domain 0 kernel is
privileged; it has full hardware access. It's started immediately after
Xen starts up. Other domains have no access to the hardware; instead
they use virtual interfaces that are provided by Xen (with the help of
the domain 0 kernel).

Xen does support booting other Operating Systems; ports of NetBSD
(Christian Limpach), FreeBSD (Kip Macy), and Plan 9 (Ron Minnich)
exist. A port of Windows XP was developed for an earlier version of
Xen, but is not available for release due to license restrictions.

In addition to this package you need to install the kernel-xen and
xen-tools to use Xen. Xen 3 also supports running unmodified guests
using full virtualization, if appropriate hardware is present. Install
xen-tools-ioemu if you want to use this.

[Hypervisor is a trademark of IBM]

Refresh
Refresh
Source Files (show unmerged sources)
Filename Size Changed
0001-net-move-the-tap-buffer-into-TAPState.patch 0000001793 1.75 KB
0002-net-increase-tap-buffer-size.patch 0000001383 1.35 KB
0003-e1000-fix-access-4-bytes-beyond-buffer-end.patch 0000001690 1.65 KB
0004-e1000-secrc-support.patch 0000001778 1.74 KB
0005-e1000-multi-buffer-packet-support.patch 0000004051 3.96 KB
0006-e1000-clear-EOP-for-multi-buffer-descriptors.patch 0000002393 2.34 KB
0007-e1000-verify-we-have-buffers-upfront.patch 0000003055 2.98 KB
0008-e1000-check-buffer-availability.patch 0000001585 1.55 KB
2e5738ff-add-vga-none-support.patch 0000004222 4.12 KB
5315a3bb-x86-don-t-propagate-acpi_skip_timer_override-do-Dom0.patch 0000002880 2.81 KB
5315a43a-x86-ACPI-also-print-address-space-for-PM1x-fields.patch 0000001206 1.18 KB
53299d8f-xenconsole-reset-tty-on-failure.patch 0000001789 1.75 KB
5346a7a0-x86-AMD-support-further-feature-masking-MSRs.patch 0000007084 6.92 KB
53563ea4-x86-MSI-drop-workaround-for-insecure-Dom0-kernels.patch 0000003890 3.8 KB
537c790d-fix-memory-leak-in-libxl_cpuid_dispose.patch 0000000904 904 Bytes
537cd0b0-hvmloader-also-cover-PCI-MMIO-ranges-above-4G-with-UC-MTRR-ranges.patch 0000011593 11.3 KB
537cd0cc-hvmloader-PA-range-0xfc000000-0xffffffff-should-be-UC.patch 0000001422 1.39 KB
538c7df7-libxenstat-handle-renamed-vifs.patch 0000001947 1.9 KB
539ebe62-x86-EFI-improve-boot-time-diagnostics.patch 0000002006 1.96 KB
53aac342-x86-HVM-consolidate-and-sanitize-CR4-guest-reserved-bit-determination.patch 0000007033 6.87 KB
53c9151b-Fix-xl-vncviewer-accesses-port-0-by-any-invalid-domid.patch 0000001508 1.47 KB
53d124e7-fix-list_domain_details-check-config-data-length-0.patch 0000001779 1.74 KB
53dba447-x86-ACPI-allow-CMOS-RTC-use-even-when-ACPI-says-there-is-none.patch 0000005504 5.38 KB
53df727b-x86-HVM-extend-LAPIC-shortcuts-around-P2M-lookups.patch 0000004337 4.24 KB
53e8be5f-x86-vHPET-use-rwlock-instead-of-simple-one.patch 0000005815 5.68 KB
53fcebab-xen-pass-kernel-initrd-to-qemu.patch 0000012537 12.2 KB
53ff3659-x86-consolidate-boolean-inputs-in-hvm-and-p2m.patch 0000013609 13.3 KB
53ff36ae-x86-hvm-treat-non-insn-fetch-NPF-also-as-read-violations.patch 0000003460 3.38 KB
53ff36d5-x86-mem_event-deliver-gla-fault-EPT-violation-information.patch 0000005370 5.24 KB
54005472-EPT-utilize-GLA-GPA-translation-known-for-certain-faults.patch 0000007280 7.11 KB
541ad385-x86-suppress-event-check-IPI-to-MWAITing-CPUs.patch 0000003966 3.87 KB
541ad3ca-x86-HVM-batch-vCPU-wakeups.patch 0000007305 7.13 KB
5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch 0000007369 7.2 KB
5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch 0000011263 11 KB
542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch 0000008483 8.28 KB
54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch 0000003402 3.32 KB
54467cfc-x86-hvm-further-restrict-x2apic-MSRs.patch 0000003980 3.89 KB
5459f759-xentop-dynamically-expand-columns.patch 0000007518 7.34 KB
5489c2cf-have-architectures-specify-Dom0-PIRQs.patch 0000007143 6.98 KB
548e9c0d-console-allocate-ring-buffer-earlier.patch 0000003601 3.52 KB
54f4985f-libxl-fix-libvirtd-double-free.patch 0000002684 2.62 KB
55111ee4-x86-support-newer-Intel-CPU-models.patch 0000003792 3.7 KB
551ac326-xentop-add-support-for-qdisk.patch 0000020083 19.6 KB
5527edd2-x86-hvm-Fix-the-unknown-nested-vmexit-reason-80000021-bug.patch 0000001760 1.72 KB
552d293b-x86-vMSI-X-honor-all-mask-requests.patch 0000001905 1.86 KB
552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 0000002117 2.07 KB
5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 0000001168 1.14 KB
555de7bb-xl-migrate-live.patch 0000002203 2.15 KB
5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 0000005289 5.17 KB
55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 0000003179 3.1 KB
5583d9c5-x86-MSI-X-cleanup.patch 0000010669 10.4 KB
5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 0000015722 15.4 KB
55b0a218-x86-PCI-CFG-write-intercept.patch 0000004561 4.45 KB
55b0a255-x86-MSI-X-maskall.patch 0000002671 2.61 KB
55b0a283-x86-MSI-X-teardown.patch 0000012458 12.2 KB
55b0a2ab-x86-MSI-X-enable.patch 0000013604 13.3 KB
55b0a2db-x86-MSI-track-guest-masking.patch 0000001795 1.75 KB
55c322f9-VT-d-add-iommu-igfx-option-to-workaround-graphics-issues.patch 0000002556 2.5 KB
55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch 0000004102 4.01 KB
5603d3aa-libxl-fix-the-cleanup-of-the-backend-path.patch 0000002328 2.27 KB
5604f239-x86-PV-properly-populate-descriptor-tables.patch 0000003716 3.63 KB
561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 0000003578 3.49 KB
5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch 0000004126 4.03 KB
564f0639-x86-P2M-consolidate-handling-of-types-without-valid-MFN.patch 0000005980 5.84 KB
56546afb-sched-better-handle-not-inserting-idle-vCPUs.patch 0000003857 3.77 KB
566052a6-VT-d-drop-unneeded-Ivybridge-quirk-workaround.patch 0000000996 996 Bytes
56a0f4a2-x86-mmuext-tighten-TLB-flush-address-checks.patch 0000002180 2.13 KB
56a0f508-x86-fix-and-simplify-MTRR-overlap-checking.patch 0000005825 5.69 KB
56b0a884-x86-vmx-don-t-clobber-exception_bitmap-for-emulated-real-mode.patch 0000002903 2.83 KB
56b0a90a-credit-update-timeslice-under-lock.patch 0000001454 1.42 KB
56b0a92c-recalculate-cpupool-credits-when-updating-timeslice.patch 0000001053 1.03 KB
56b9d9f5-x86-nHVM-avoid-NULL-deref-during-INVLPG-intercept.patch 0000001601 1.56 KB
56bb3f45-hvmloader-fix-scratch_alloc-to-avoid-overlaps.patch 0000000919 919 Bytes
56c48ee5-x86-enforce-consistent-cachability-of-MMIO-mappings.patch 0000012134 11.8 KB
56c48f30-x86-VMX-sanitize-rIP-before-re-entering-guest.patch 0000003373 3.29 KB
56c5cfae-x86emul-fix-rIP-handling.patch 0000001888 1.84 KB
56ceed55-x86-hvm-print-register-state-upon-triple-fault.patch 0000001535 1.5 KB
56d0339f-x86emul-limit-check-branch-targets.patch 0000018941 18.5 KB
56d03711-x86-fpu-add-a-per-domain-field-to-set-the-width-of-FIP-FDP.patch 0000008137 7.95 KB
56d03743-x86-hvm-add-HVM_PARAM_X87_FIP_WIDTH.patch 0000005184 5.06 KB
56e197e7-x86-don-t-flush-the-whole-cache-when-changing-cachability.patch 0000002416 2.36 KB
56e7efb1-vmx-restore-debug-registers-when-injecting-DB-traps.patch 0000002963 2.89 KB
56ebc0fd-x86-fpu-improve-check-for-XSAVE-not-writing-FIP-FDP-fields.patch 0000004258 4.16 KB
56fa73fa-x86-fix-information-leak-on-AMD-CPUs.patch 0000001865 1.82 KB
56fd1d74-x86-HVM-fix-forwarding-of-internally-cached-requests.patch 0000005473 5.34 KB
57026603-unmodified-drivers-enable-use-of-register_oldmem_pfn_is_ram-API.patch 0000001517 1.48 KB
5708158d-x86-vMSI-X-fix-qword-write-covering-vector-control-field.patch 0000000828 828 Bytes
5717b5cd-x86-limit-GFNs-to-32-bits-for-shadowed-superpages.patch 0000007770 7.59 KB
571e0bb9-x86-MSI-handle-both-MSI-X-and-MSI-in-cfg-space-write-intercept.patch 0000001649 1.61 KB
571e0c2b-x86-MSI-X-correctly-track-interrupt-masking-state.patch 0000001471 1.44 KB
571f3a56-x86-vMSI-X-avoid-missing-first-unmask-of-vectors.patch 0000005826 5.69 KB
57220af0-x86-time-fix-gtime_to_gtsc-for-vtsc-1-PV-guests.patch 0000002433 2.38 KB
57220bd5-x86-vMSI-X-also-snoop-qword-writes.patch 0000002142 2.09 KB
57238bb9-x86-vMSI-X-also-snoop-REP-MOVS.patch 0000005584 5.45 KB
57238c1e-x86-fix-domain-cleanup.patch 0000001364 1.33 KB
5734a90d-x86-PoD-skip-eager-reclaim-when-possible.patch 0000001387 1.35 KB
573b116a-x86-mm-fully-honor-PS-bits-in-guest-page-table-walks.patch 0000001715 1.67 KB
573d9029-x86emul-suppress-writeback-upon-unsuccessful-MMX-SSE-AVX.patch 0000001137 1.11 KB
5742fa17-sched-avoid-races-on-time-values-read-from-NOW.patch 0000003110 3.04 KB
57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch 0000005217 5.09 KB
576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 0000002632 2.57 KB
57973099-have-schedulers-revise-initial-placement.patch 0000002585 2.52 KB
579730e6-remove-buggy-initial-placement-algorithm.patch 0000002833 2.77 KB
57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch 0000003924 3.83 KB
57a1e603-x86-time-adjust-local-system-time-initialization.patch 0000004011 3.92 KB
57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 0000007779 7.6 KB
57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch 0000009275 9.06 KB
57a30261-x86-support-newer-Intel-CPU-models.patch 0000005142 5.02 KB
57ac6316-page-alloc-x86-don-t-restrict-DMA-heap-to-node-0.patch 0000003206 3.13 KB
57b7447b-dont-permit-guest-to-populate-PoD-pages-for-itself.patch 0000002156 2.11 KB
57c82be2-x86-32on64-adjust-call-gate-emulation.patch 0000002116 2.07 KB
57c96df3-credit1-fix-a-race-when-picking-initial-pCPU.patch 0000005313 5.19 KB
57d1563d-x86-32on64-don-t-allow-recursive-page-tables-from-L3.patch 0000001217 1.19 KB
57d15679-x86-emulate-Correct-boundary-interactions-of-emulated-insns.patch 0000002152 2.1 KB
57d1569a-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch 0000001722 1.68 KB
57d18642-x86-segment-Bounds-check-accesses-to-emulation-ctxt-seg_reg.patch 0000006727 6.57 KB
CVE-2013-4527-qemuu-hpet-buffer-overrun-on-invalid-state-load.patch 0000001350 1.32 KB
CVE-2013-4529-01-qemuu-pci-fix-buffer-overrun-on-invalid-state-load.patch 0000002197 2.15 KB
CVE-2013-4529-02-qemuu-pci-fix-buffer-overrun-on-invalid-state-load.patch 0000001443 1.41 KB
CVE-2013-4529-03-qemuu-pci-fix-buffer-overrun-on-invalid-state-load.patch 0000002046 2 KB
CVE-2013-4530-qemuu-pl022-fix-buffer-overun-on-invalid-state-load.patch 0000001610 1.57 KB
CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch 0000001794 1.75 KB
CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch 0000001899 1.85 KB
CVE-2013-4534-qemuu-openpic-buffer-overrun-on-incoming-migration.patch 0000002324 2.27 KB
CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch 0000001377 1.34 KB
CVE-2013-4537-qemuu-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch 0000001366 1.33 KB
CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch 0000001038 1.01 KB
CVE-2013-4538-qemuu-ssd0323-fix-buffer-overun-on-invalid-state.patch 0000001026 1 KB
CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch 0000001665 1.63 KB
CVE-2013-4539-qemuu-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch 0000001647 1.61 KB
CVE-2013-4540-qemu.patch 0000001833 1.79 KB
CVE-2014-0222-blktap-qcow1-validate-l2-table-size.patch 0000002214 2.16 KB
CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch 0000001647 1.61 KB
CVE-2014-3615-qemut-sanity-check-vbe.patch 0000007414 7.24 KB
CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch 0000001601 1.56 KB
CVE-2014-3672-qemut-xsa180.patch 0000002618 2.56 KB
CVE-2014-3672-qemuu-xsa180.patch 0000003104 3.03 KB
CVE-2014-3689-qemut-vmware-vga-turn-off-hw-accel.patch 0000001211 1.18 KB
CVE-2014-3689-qemuu-vmware-vga-vmsvga_copy_rect.patch 0000002366 2.31 KB
CVE-2014-3689-qemuu-vmware-vga-vmsvga_fill_rect.patch 0000002177 2.13 KB
CVE-2014-3689-qemuu-vmware-vga-vmsvga_update_rect.patch 0000002192 2.14 KB
CVE-2014-3689-qemuu-vmware-vga-vmsvga_verify_rect.patch 0000002667 2.6 KB
CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch 0000001398 1.37 KB
CVE-2014-9718-qemuu-PRDT-overflow-from-guest-to-host.patch 0000012308 12 KB
CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch 0000008503 8.3 KB
CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch 0000002407 2.35 KB
CVE-2015-4037-qemut-smb-config-dir-name.patch 0000001554 1.52 KB
CVE-2015-4037-qemuu-smb-config-dir-name.patch 0000001852 1.81 KB
CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch 0000002028 1.98 KB
CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch 0000001204 1.18 KB
CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch 0000001184 1.16 KB
CVE-2015-6855-qemuu-ide-divide-by-zero-issue.patch 0000007016 6.85 KB
CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch 0000001091 1.07 KB
CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch 0000001068 1.04 KB
CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch 0000003333 3.25 KB
CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch 0000002383 2.33 KB
CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch 0000002133 2.08 KB
CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch 0000001137 1.11 KB
CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch 0000001072 1.05 KB
CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch 0000001307 1.28 KB
CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch 0000003056 2.98 KB
CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch 0000001155 1.13 KB
CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch 0000004382 4.28 KB
CVE-2015-8743-qemut-ne2000-OOB-memory-access-in-ioport-rw-functions.patch 0000001554 1.52 KB
CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch 0000001692 1.65 KB
CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch 0000002826 2.76 KB
CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch 0000001369 1.34 KB
CVE-2015-8817-qemuu-OOB-access-in-address_space_rw-leads-to-segmentation-fault.patch 0000003434 3.35 KB
CVE-2015-8818-qemuu-OOB-access-in-address_space_rw-leads-to-segmentation-fault.patch 0000004222 4.12 KB
CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch 0000001730 1.69 KB
CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch 0000002031 1.98 KB
CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch 0000002046 2 KB
CVE-2016-1922-qemuu-i386-null-pointer-dereference-in-vapic_write.patch 0000002184 2.13 KB
CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch 0000004302 4.2 KB
CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch 0000004317 4.22 KB
CVE-2016-2198-qemuu-usb-ehci-null-pointer-dereference-in-ehci_caps_write.patch 0000001344 1.31 KB
CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch 0000001841 1.8 KB
CVE-2016-2391-qemuu-usb-null-pointer-dereference-in-ohci-module.patch 0000001776 1.73 KB
CVE-2016-2392-qemuu-usb-null-pointer-dereference-in-NDIS-message-handling.patch 0000001086 1.06 KB
CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch 0000002444 2.39 KB
CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch 0000001136 1.11 KB
CVE-2016-2841-qemuu-ne2000-infinite-loop-in-ne2000_receive.patch 0000001112 1.09 KB
CVE-2016-3710-qemut-0001-vga-fix-banked-access-bounds-checking.patch 0000004049 3.95 KB
CVE-2016-3710-qemut-0002-vga-add-vbe_enabled-helper.patch 0000002379 2.32 KB
CVE-2016-3710-qemut-0003-vga-factor-out-vga-register-setup.patch 0000004860 4.75 KB
CVE-2016-3710-qemut-0004-vga-update-vga-register-setup-on-vbe-changes.patch 0000001164 1.14 KB
CVE-2016-3710-qemut-0005-vga-make-sure-vga-register-setup-for-vbe-stays-intac.patch 0000003195 3.12 KB
CVE-2016-3710-qemuu-0001-vga-fix-banked-access-bounds-checking.patch 0000004411 4.31 KB
CVE-2016-3710-qemuu-0002-vga-add-vbe_enabled-helper.patch 0000002312 2.26 KB
CVE-2016-3710-qemuu-0003-vga-factor-out-vga-register-setup.patch 0000005426 5.3 KB
CVE-2016-3710-qemuu-0004-vga-update-vga-register-setup-on-vbe-changes.patch 0000001129 1.1 KB
CVE-2016-3710-qemuu-0005-vga-make-sure-vga-register-setup-for-vbe-stays-intac.patch 0000002965 2.9 KB
CVE-2016-3712-qemuu-vga-add-sr_vbe-register-set.patch 0000009093 8.88 KB
CVE-2016-4001-qemut-net-buffer-overflow-in-stellaris_enet-emulator.patch 0000001615 1.58 KB
CVE-2016-4001-qemuu-net-buffer-overflow-in-stellaris_enet-emulator.patch 0000001594 1.56 KB
CVE-2016-4002-qemut-net-buffer-overflow-in-MIPSnet-emulator.patch 0000000942 942 Bytes
CVE-2016-4002-qemuu-net-buffer-overflow-in-MIPSnet-emulator.patch 0000000917 917 Bytes
CVE-2016-4020-qemuu-leakage-of-stack-memory-to-guest.patch 0000000942 942 Bytes
CVE-2016-4037-qemuu-usb-Infinite-loop-vulnerability-in-usb_ehci-using-siTD-process.patch 0000001742 1.7 KB
CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch 0000001246 1.22 KB
CVE-2016-4439-qemuu-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch 0000001231 1.2 KB
CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch 0000001843 1.8 KB
CVE-2016-4441-qemuu-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch 0000002150 2.1 KB
CVE-2016-4453-qemuu-vmware-vga-vmsvga-infinite-loop.patch 0000001278 1.25 KB
CVE-2016-4454-qemuu-vmware-vga-vmsvga-out-of-bounds-read.patch 0000002139 2.09 KB
CVE-2016-4952-qemuu-pvscsi-out-of-bounds-access-issue-in-pvsci_ring_init_msg.patch 0000002935 2.87 KB
CVE-2016-5105-qemuu-scsi-megasas-stack-information-leakage-while-reading-configuration.patch 0000001096 1.07 KB
CVE-2016-5106-qemuu-scsi-megasas-out-of-bounds-write-while-setting-controller-properties.patch 0000001078 1.05 KB
CVE-2016-5107-qemuu-scsi-megasas-out-of-bounds-read-in-megasas_lookup_frame-function.patch 0000001292 1.26 KB
CVE-2016-5126-qemuu-buffer-overflow-in-iscsi_aio_ioctl.patch 0000001177 1.15 KB
CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch 0000001301 1.27 KB
CVE-2016-5238-qemuu-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch 0000001288 1.26 KB
CVE-2016-5337-qemuu-scsi-megasas-information-leakage-in-megasas_ctrl_get_info.patch 0000001072 1.05 KB
CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch 0000002575 2.51 KB
CVE-2016-5338-qemuu-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch 0000002616 2.55 KB
CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch 0000002555 2.5 KB
CVE-2016-6351-qemuu-scsi-esp-fix-migration.patch 0000002459 2.4 KB
CVE-2016-6351-qemuu-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch 0000002665 2.6 KB
CVE-2016-6833-qemuu-net-vmxnet3-use-after-free-while-writing.patch 0000001095 1.07 KB
CVE-2016-6834-qemuu-net-vmxnet3-an-infinite-loop-during-packet-fragmentation.patch 0000001239 1.21 KB
CVE-2016-6835-qemuu-net-vmxnet3-buffer-overflow-in-vmxnet_tx_pkt_parse_headers.patch 0000001057 1.03 KB
CVE-2016-6836-qemuu-net-vmxnet3-information-leakage-in-vmxnet3_complete_packet.patch 0000000990 990 Bytes
CVE-2016-6888-qemuu-net-vmxnet3-integer-overflow-in-packet-initialisation-in-vmxnet3.patch 0000001302 1.27 KB
README.SUSE 0000029978 29.3 KB
VNC-Support-for-ExtendedKeyEvent-client-message.patch 0000005002 4.88 KB
aarch64-rename-PSR_MODE_ELxx-to-match-linux-headers.patch 0000001313 1.28 KB
add-qxl-support.patch 0000006449 6.3 KB
altgr_2.patch 0000001869 1.83 KB
baselibs.conf 0000000009 9 Bytes
bdrv_default_rwflag.patch 0000001092 1.07 KB
bdrv_open2_fix_flags.patch 0000005021 4.9 KB
bdrv_open2_flags_2.patch 0000003062 2.99 KB
blktap-control-socket-race.patch 0000000803 803 Bytes
blktap-pv-cdrom.patch 0000024008 23.4 KB
blktap.patch 0000002013 1.97 KB
blktapctrl-close-fifos.patch 0000000648 648 Bytes
blktapctrl-default-to-ioemu.patch 0000000944 944 Bytes
blktapctrl-disable-debug-printf.patch 0000001014 1014 Bytes
block-dmmd 0000005820 5.68 KB
block-iscsi 0000002109 2.06 KB
block-nbd 0000000673 673 Bytes
block-npiv 0000003588 3.5 KB
block-npiv-common.sh 0000007967 7.78 KB
block-npiv-vport 0000002101 2.05 KB
boot.local.xenU 0000001987 1.94 KB
boot.xen 0000002385 2.33 KB
bridge-bonding.patch 0000001712 1.67 KB
bridge-opensuse.patch 0000000898 898 Bytes
bridge-record-creation.patch 0000001206 1.18 KB
bridge-vlan.patch 0000001953 1.91 KB
build-tapdisk-ioemu.patch 0000005056 4.94 KB
capslock_enable.patch 0000000632 632 Bytes
cdrom-removable.patch 0000018703 18.3 KB
change-vnc-passwd.patch 0000006576 6.42 KB
disable-wget-check.patch 0000010810 10.6 KB
domUloader.py 0000018850 18.4 KB
etc_pam.d_xen-api 0000000265 265 Bytes
figlet.tar.bz2 0000019314 18.9 KB
hibernate.patch 0000001420 1.39 KB
hotplug-Linux-block-find-free-loop-fix.patch 0000000440 440 Bytes
init.50-hvm-xen_conf 0000001561 1.52 KB
init.pciback 0000002530 2.47 KB
init.xen_loop 0000000093 93 Bytes
init.xend 0000002302 2.25 KB
init.xendomains 0000009624 9.4 KB
ioemu-bdrv-open-CACHE_WB.patch 0000000818 818 Bytes
ioemu-blktap-barriers.patch 0000002227 2.17 KB
ioemu-blktap-fv-init.patch 0000000869 869 Bytes
ioemu-blktap-image-format.patch 0000003002 2.93 KB
ioemu-blktap-zero-size.patch 0000001808 1.77 KB
ioemu-disable-emulated-ide-if-pv.patch 0000002734 2.67 KB
ioemu-disable-scsi.patch 0000003510 3.43 KB
ioemu-hvm-pv-support.patch 0000002519 2.46 KB
ioemu-vnc-resize.patch 0000001145 1.12 KB
ioemu-watchdog-ib700-timer.patch 0000001439 1.41 KB
ioemu-watchdog-linkage.patch 0000002901 2.83 KB
ioemu-watchdog-support.patch 0000031665 30.9 KB
ipxe-enable-nics.patch 0000000371 371 Bytes
ipxe.tar.bz2 0002877769 2.74 MB
kernel-boot-hvm.patch 0000008688 8.48 KB
kmp_filelist 0000000042 42 Bytes
libxc-pass-errno-to-callers-of-xc_domain_save.patch 0000024620 24 KB
libxen_permissive.patch 0000000766 766 Bytes
libxl-migration-cleanup-remove-backend-domain-field.patch 0000001790 1.75 KB
libxl-migration-cleanup-update-uuid-name.patch 0000001407 1.37 KB
libxl-restore-cleanup-left-xenstore-entries.patch 0000003222 3.15 KB
libxl.add-option-for-discard-support-to-xl-disk-conf.patch 0000005629 5.5 KB
libxl.add-option-to-disable-disk-cache-flushes-in-qdisk.patch 0000004217 4.12 KB
libxl.honor-more-top-level-vfb-options.patch 0000003390 3.31 KB
libxl.introduce-an-option-to-disable-the-non-O_DIRECT-workaround.patch 0000009150 8.94 KB
libxl.pvscsi.patch 0000045200 44.1 KB
libxl.set-migration-constraints-from-cmdline.patch 0000021505 21 KB
local_attach_support_for_phy.patch 0000002387 2.33 KB
log-guest-console.patch 0000004248 4.15 KB
logrotate.conf 0000000259 259 Bytes
magic_ioport_compat.patch 0000000746 746 Bytes
network-nat-open-SuSEfirewall2-FORWARD.patch 0000000698 698 Bytes
pvdrv_emulation_control.patch 0000001066 1.04 KB
pygrub-boot-legacy-sles.patch 0000002499 2.44 KB
pygrub-handle-one-line-menu-entries.patch 0000002474 2.42 KB
pygrub-netware-xnloader.patch 0000000722 722 Bytes
qemu-dm-segfault.patch 0000002639 2.58 KB
qemu-ifup-set-mtu.patch 0000000556 556 Bytes
qemu-security-etch1.patch 0000001450 1.42 KB
qemu-support-xen-hvm-direct-kernel-boot.patch 0000004008 3.91 KB
qemu-xen-dir-remote.tar.bz2 0007576523 7.23 MB
qemu-xen-enable-spice-support.patch 0000000430 430 Bytes
qemu-xen-traditional-dir-remote.tar.bz2 0003214328 3.07 MB
qemu-xen-upstream-allow-every-discard-range.patch 0000001684 1.64 KB
qemu-xen-upstream-blkif-discard.patch 0000004834 4.72 KB
qemu-xen-upstream-hvm-pv-support.patch 0000001476 1.44 KB
qemu-xen-upstream-megasas-buildtime.patch 0000001025 1 KB
qemu-xen-upstream-qdisk-cache-unsafe.patch 0000001827 1.78 KB
seabios-dir-remote.tar.bz2 0000402359 393 KB
set-mtu-from-bridge-for-tap-interface.patch 0000001443 1.41 KB
stdvga-cache.patch 0000000750 750 Bytes
stubdom.tar.bz2 0017477236 16.7 MB
supported_module.patch 0000000420 420 Bytes
suspend_evtchn_lock.patch 0000002401 2.34 KB
sysconfig.pciback 0000000237 237 Bytes
tapdisk-ioemu-logfile.patch 0000001389 1.36 KB
tapdisk-ioemu-shutdown-fix.patch 0000002943 2.87 KB
tigervnc-long-press.patch 0000001243 1.21 KB
tmp-initscript-modprobe.patch 0000001802 1.76 KB
tmp_build.patch 0000001258 1.23 KB
udev-rules.patch 0000000835 835 Bytes
vif-bridge-no-iptables.patch 0000000430 430 Bytes
vif-bridge-tap-fix.patch 0000000969 969 Bytes
vif-route.patch 0000000527 527 Bytes
x86-cpufreq-report.patch 0000002769 2.7 KB
x86-dom-print.patch 0000001359 1.33 KB
x86-extra-trap-info.patch 0000002127 2.08 KB
x86-ioapic-ack-default.patch 0000000604 604 Bytes
x86-no-ERESTART.patch 0000001149 1.12 KB
xen-4.4.4-testing-src.tar.bz2 0004437371 4.23 MB
xen-destdir.patch 0000004208 4.11 KB
xen-disable-qemu-monitor.patch 0000003064 2.99 KB
xen-figlet-makefile.patch 0000001617 1.58 KB
xen-hvm-default-bridge.patch 0000004541 4.43 KB
xen-qemu-iscsi-fix.patch 0000002843 2.78 KB
xen-updown.sh 0000003766 3.68 KB
xen-utils-0.1.tar.bz2 0000006171 6.03 KB
xen-watchdog.service 0000000224 224 Bytes
xen-xmexample.patch 0000011439 11.2 KB
xen.changes 0000388322 379 KB
xen.libxl.dmmd.patch 0000005783 5.65 KB
xen.migrate.tools-xend_move_assert_to_exception_block.patch 0000001634 1.6 KB
xen.spec 0000069514 67.9 KB
xen2libvirt.py 0000004835 4.72 KB
xen_pvonhvm.xen_emul_unplug.patch 0000001496 1.46 KB
xenalyze.hg.tar.bz2 0000126674 124 KB
xenapiusers 0000000005 5 Bytes
xencommons.service 0000000486 486 Bytes
xenconsole-no-multiple-connections.patch 0000000929 929 Bytes
xend-32on64-extra-mem.patch 0000000676 676 Bytes
xend-change_home_server.patch 0000000815 815 Bytes
xend-check_device_status.patch 0000002338 2.28 KB
xend-checkpoint-rename.patch 0000000680 680 Bytes
xend-config-enable-dump-comment.patch 0000000720 720 Bytes
xend-config.patch 0000002259 2.21 KB
xend-console-port-restore.patch 0000001674 1.63 KB
xend-core-dump-loc.patch 0000000678 678 Bytes
xend-cpuinfo-model-name.patch 0000000925 925 Bytes
xend-del_usb_xend_entry.patch 0000001400 1.37 KB
xend-devid-or-name.patch 0000001191 1.16 KB
xend-disable-internal-logrotate.patch 0000000699 699 Bytes
xend-domain-lock-sfex.patch 0000010594 10.3 KB
xend-domain-lock.patch 0000014237 13.9 KB
xend-domu-usb-controller.patch 0000000946 946 Bytes
xend-fix-sendkey.patch 0000000575 575 Bytes
xend-hv_extid_compatibility.patch 0000003077 3 KB
xend-hvm-default-pae.patch 0000000660 660 Bytes
xend-hvm-firmware-passthrough.patch 0000011594 11.3 KB
xend-managed-pci-device.patch 0000012774 12.5 KB
xend-max-free-mem.patch 0000006600 6.45 KB
xend-migration-bridge-check.patch 0000001024 1 KB
xend-migration-domname-fix.patch 0000001636 1.6 KB
xend-minimum-restart-time.patch 0000000567 567 Bytes
xend-multi-xvdp.patch 0000003800 3.71 KB
xend-pvscsi-recognize-also-SCSI-CDROM-devices.patch 0000001094 1.07 KB
xend-relocation-server.fw 0000000097 97 Bytes
xend-relocation.sh 0000004144 4.05 KB
xend-remove-xm-deprecation-warning.patch 0000001319 1.29 KB
xend-set-migration-constraints-from-cmdline.patch 0000016314 15.9 KB
xend-tools-watchdog-support.patch 0000006395 6.25 KB
xend-vcpu-affinity-fix.patch 0000000891 891 Bytes
xend-vif-route-ifup.patch 0000003319 3.24 KB
xend-xen-api-auth.patch 0000000580 580 Bytes
xend-xen-domUloader.patch 0000004931 4.82 KB
xend-xenapi-console-protocol.patch 0000000766 766 Bytes
xend-xenpaging.autostart.patch 0000016503 16.1 KB
xend-xm-create-xflag.patch 0000002002 1.96 KB
xend-xm-reboot-fix.patch 0000001059 1.03 KB
xend-xm-save-check-file.patch 0000004026 3.93 KB
xend-xsa153.patch 0000003603 3.52 KB
xend.service 0000000347 347 Bytes
xendomains.service 0000000365 365 Bytes
xenpaging.doc.patch 0000002658 2.6 KB
xenpaging.qemu.flush-cache.patch 0000001334 1.3 KB
xl-check-for-libvirt-managed-domain.patch 0000001827 1.78 KB
xl-conf-default-bridge.patch 0000000537 537 Bytes
xl-coredump-file-location.patch 0000000873 873 Bytes
xmclone.sh 0000019564 19.1 KB
xmexample.disks 0000001106 1.08 KB
xmexample.domUloader 0000001167 1.14 KB
xnloader.py 0000001875 1.83 KB
xsa140-qemut-1.patch 0000003090 3.02 KB
xsa140-qemut-2.patch 0000018417 18 KB
xsa140-qemut-3.patch 0000001432 1.4 KB
xsa140-qemut-4.patch 0000002045 2 KB
xsa140-qemut-5.patch 0000001243 1.21 KB
xsa140-qemut-6.patch 0000001445 1.41 KB
xsa140-qemut-7.patch 0000001302 1.27 KB
xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch 0000002150 2.1 KB
xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch 0000002529 2.47 KB
xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch 0000001613 1.58 KB
xsa162-qemuu.patch 0000001535 1.5 KB
xsa164.patch 0000001450 1.42 KB
xsa175-0001-libxl-Record-backend-frontend-paths-in-libxl-DOMID.patch 0000007699 7.52 KB
xsa175-0002-libxl-Provide-libxl__backendpath_parse_domid.patch 0000002279 2.23 KB
xsa175-0003-libxl-Do-not-trust-frontend-in-libxl__devices_destro.patch 0000003051 2.98 KB
xsa175-0004-libxl-Do-not-trust-frontend-in-libxl__device_nextid.patch 0000001495 1.46 KB
xsa175-0005-libxl-Do-not-trust-frontend-for-disk-eject-event.patch 0000003904 3.81 KB
xsa175-0006-libxl-Do-not-trust-frontend-for-disk-in-getinfo.patch 0000003434 3.35 KB
xsa175-0007-libxl-Do-not-trust-frontend-for-vtpm-list.patch 0000002407 2.35 KB
xsa175-0008-libxl-Do-not-trust-frontend-for-vtpm-in-getinfo.patch 0000002182 2.13 KB
xsa175-0009-libxl-Do-not-trust-frontend-for-nic-in-libxl_devid_t.patch 0000001583 1.55 KB
xsa175-0010-libxl-Do-not-trust-frontend-for-nic-in-getinfo.patch 0000002872 2.8 KB
xsa178-0001-libxl-Make-copy-of-every-xs-backend-in-libxl-in-_gen.patch 0000004079 3.98 KB
xsa178-0004-libxl-Do-not-trust-backend-for-vtpm-in-getinfo-uuid.patch 0000001919 1.87 KB
xsa178-0006-libxl-Do-not-trust-backend-for-disk-eject-vdev.patch 0000004079 3.98 KB
xsa178-0007-libxl-Do-not-trust-backend-for-disk-fix-driver-domai.patch 0000009447 9.23 KB
xsa178-0008-libxl-Do-not-trust-backend-for-disk-in-getinfo.patch 0000001479 1.44 KB
xsa178-0011-libxl-Rename-libxl__device_-nic-channel-_from_xs_be-.patch 0000002174 2.12 KB
xsa178-0012-libxl-Rename-READ_BACKEND-to-READ_LIBXLDEV.patch 0000003039 2.97 KB
xsa178-0013-libxl-Have-READ_LIBXLDEV-use-libxl_path-rather-than-.patch 0000001797 1.75 KB
xsa178-0014-libxl-Do-not-trust-backend-in-nic-getinfo.patch 0000001368 1.34 KB
xsa178-0015-libxl-Do-not-trust-backend-for-nic-in-devid_to_devic.patch 0000001637 1.6 KB
xsa178-0016-libxl-Do-not-trust-backend-for-nic-in-list.patch 0000003067 3 KB
xsa178-0019-libxl-Cleanup-Have-libxl__alloc_vdev-use-libxl.patch 0000001953 1.91 KB
xsa178-0020-libxl-Cleanup-use-libxl__backendpath_parse_domid-in-.patch 0000001305 1.27 KB
xsa178-0021-libxl-Document-serial-correctly.patch 0000001385 1.35 KB
xsa184.patch 0000002371 2.32 KB
xsa188.patch 0000000887 887 Bytes
Latest Revision
buildservice-autocommit accepted request 433134 from Johannes Segitz's avatar Johannes Segitz (jsegitz) (revision 3)
freeze link
Comments 0
openSUSE Build Service is sponsored by