Package xen-runtime-common: Information
Binary package: xen-runtime-common
Version: 4.10.1-alt1.S1
Architecture: noarch
Build time: Jun 7, 2018, 04:05 PM in the task #207978
Source package: xen
Category: Emulators
Report package bugHome page: http://www.xenproject.org/
License: GPLv2+, LGPLv2+, BSD
Summary: Core Xen runtime environment
Description:
The Xen Project hypervisor is an open-source type-1 or baremetal hypervisor, which makes it possible to run many instances of an operating system or indeed different operating systems in parallel on a single machine (or host). This package contains the runtime programs which form the core Xen userspace environment.
Maintainer: Dmitriy D. Shadrinov
List of contributors:
Dmitriy D. Shadrinov
Anton Farygin
Led
George V. Kouryachy
Lenar Shakirov
Vitaly Kuznetsov
Dmitriy D. Shadrinov
Anton Farygin
Led
George V. Kouryachy
Lenar Shakirov
Vitaly Kuznetsov
Last changed
May 24, 2018 Dmitriy D. Shadrinov 4.10.1-alt1.S1
- 4.10.1 release - upstream updates upto 7b35e7807, including: + x86/HVM: guard against emulator driving ioreq state in weird ways (thx Jan Beulich) (XSA-262) + x86/vpt: add support for IO-APIC routed interrupts (part of XSA-261) + x86/traps: Fix handling of #DB exceptions in hypervisor context x86/traps: Use an Interrupt Stack Table for #DB x86/pv: Move exception injection into {,compat_}test_all_events() x86/traps: Fix %dr6 handing in #DB handler (thx Andrew Cooper) (part of XSA-260 / CVE-2018-8897)
May 22, 2018 Anton Farygin 4.10.0-alt6.S1
- rebuild for 4.06.1
March 9, 2018 Dmitriy D. Shadrinov 4.10.0-alt5.S1
- upstream updates: + xen/arm: Flush TLBs before turning on the MMU to avoid stale entries (thx Julien Grall). + xen/arm: vgic: Make sure the number of SPIs is a multiple of 32 (thx Julien Grall). + x86/hvm: Disallow the creation of HVM domains without Local APIC emulation (thx Andrew Cooper). + gnttab: don't blindly free status pages upon version change (thx Jan Beulich). + gnttab/ARM: don't corrupt shared GFN array (thx Jan Beulich). + memory: don't implicitly unpin for decrease-reservation (thx Jan Beulich). + xen/arm: cpuerrata: Actually check errata on non-boot CPUs (thx Julien Grall). + xen/arm: vsmc: Don't implement function IDs that don't exist (thx Julien Grall). + xen/arm: vpsci: Removing dummy MIGRATE and MIGRATE_INFO_UP_CPU (thx Julien Grall). + x86/idle: Clear SPEC_CTRL while idle (thx Andrew Cooper). + x86/cpuid: Offer Indirect Branch Controls to guests (thx Andrew Cooper). + x86/ctxt: Issue a speculation barrier between vcpu contexts (thx Andrew Cooper). + x86/boot: Calculate the most appropriate BTI mitigation to use (thx Andrew Cooper). + x86/entry: Avoid using alternatives in NMI/#MC paths (thx Andrew Cooper). + x86/entry: Organise the clobbering of the RSB/RAS on entry to Xen (thx Andrew Cooper). + x86/entry: Organise the use of MSR_SPEC_CTRL at each entry/exit point (thx Andrew Cooper). + x86/hvm: Permit guests direct access to MSR_{SPEC_CTRL,PRED_CMD} (thx Andrew Cooper). + x86/migrate: Move MSR_SPEC_CTRL on migrate (thx Andrew Cooper). + x86/msr: Emulation of MSR_{SPEC_CTRL,PRED_CMD} for guests (thx Andrew Cooper). + x86/cpuid: Handling of IBRS/IBPB, STIBP and IBRS for guests (thx Andrew Cooper). + x86: fix GET_STACK_END (thx Wei Liu). + x86/acpi: process softirqs while printing CPU ACPI data (thx Roger Pau Monne). + xen/x86: report domain id on cpuid (thx Roger Pau Monne). + x86/svm: Offer CPUID Faulting to AMD HVM guests as well (thx Andrew Cooper). + x86/cmdline: Introduce a command line option to disable IBRS/IBPB, STIBP and IBPB (thx Andrew Cooper). + x86/feature: Definitions for Indirect Branch Controls (thx Andrew Cooper). + x86: Introduce alternative indirect thunks (thx Andrew Cooper). + x86/amd: Try to set lfence as being Dispatch Serialising (thx Andrew Cooper). + x86/boot: Report details of speculative mitigations (thx Andrew Cooper). + x86: Support indirect thunks from assembly code (thx Andrew Cooper). + x86: Support compiling with indirect branch thunks (thx Andrew Cooper). + common/wait: Clarifications to wait infrastructure (thx Andrew Cooper). + x86/entry: Erase guest GPR state on entry to Xen (thx Andrew Cooper). + x86/hvm: Use SAVE_ALL to construct the cpu_user_regs frame after VMExit (thx Andrew Cooper). + x86/entry: Rearrange RESTORE_ALL to restore register in stack order (thx Andrew Cooper). + x86: Introduce a common cpuid_policy_updated() (thx Andrew Cooper). + x86/hvm: Rename update_guest_vendor() callback to cpuid_policy_changed() (thx Andrew Cooper). + x86/alt: Introduce ALTERNATIVE{,_2} macros (thx Andrew Cooper). + x86/alt: Break out alternative-asm into a separate header file (thx Andrew Cooper). + xen/arm32: entry: Document the purpose of r11 in the traps handler (thx Julien Grall). + xen/arm32: Invalidate icache on guest exist for Cortex-A15 (thx Julien Grall). + xen/arm32: Invalidate BTB on guest exit for Cortex A17 and 12 (thx Julien Grall). + xen/arm32: Add skeleton to harden branch predictor aliasing attacks (thx Julien Grall). + xen/arm32: entry: Add missing trap_reset entry (thx Julien Grall). + xen/arm32: Add missing MIDR values for Cortex-A17 and A12 (thx Julien Grall). + xen/arm32: entry: Consolidate DEFINE_TRAP_ENTRY_* macros (thx Julien Grall). + SUPPORT.md: Fix version and Initial-Release (thx Ian Jackson). + xen/arm: cpuerrata: Remove percpu.h include (thx Julien Grall). + xen/arm64: Implement branch predictor hardening for affected Cortex-A CPUs (thx Julien Grall). + xen/arm64: Add skeleton to harden the branch predictor aliasing attacks (thx Julien Grall). + xen/arm: cpuerrata: Add MIDR_ALL_VERSIONS (thx Julien Grall). + xen/arm64: Add missing MIDR values for Cortex-A72, A73 and A75 (thx Julien Grall). + xen/arm: Introduce enable callback to enable a capabilities on each online CPU (thx Julien Grall).