Package xen-runtime-common: Information

    Binary package: xen-runtime-common
    Version: 4.10.1-alt1.S1
    Architecture: noarch
    Build time:  Jun 7, 2018, 04:05 PM in the task #207978
    Source package: xen
    Category: Emulators
    Report package bug
    License: GPLv2+, LGPLv2+, BSD
    Summary: Core Xen runtime environment
    Description: 
    The Xen Project hypervisor is an open-source type-1 or baremetal
    hypervisor, which makes it possible to run many instances of an
    operating system or indeed different operating systems in parallel on a
    single machine (or host).
    
    This package contains the runtime programs which form the core Xen
    userspace environment.



    Last changed


    May 24, 2018 Dmitriy D. Shadrinov 4.10.1-alt1.S1
    - 4.10.1 release
    - upstream updates upto 7b35e7807, including:
      + x86/HVM: guard against emulator driving ioreq state in weird ways
        (thx Jan Beulich) (XSA-262)
      + x86/vpt: add support for IO-APIC routed interrupts (part of XSA-261)
      + x86/traps: Fix handling of #DB exceptions in hypervisor context
        x86/traps: Use an Interrupt Stack Table for #DB
        x86/pv: Move exception injection into {,compat_}test_all_events()
        x86/traps: Fix %dr6 handing in #DB handler
        (thx Andrew Cooper) (part of XSA-260 / CVE-2018-8897)
    May 22, 2018 Anton Farygin 4.10.0-alt6.S1
    - rebuild for 4.06.1
    March 9, 2018 Dmitriy D. Shadrinov 4.10.0-alt5.S1
    - upstream updates:
      + xen/arm: Flush TLBs before turning on the MMU to avoid stale
        entries (thx Julien Grall).
      + xen/arm: vgic: Make sure the number of SPIs is a multiple of 32 (thx Julien Grall).
      + x86/hvm: Disallow the creation of HVM domains without Local
        APIC emulation (thx Andrew Cooper).
      + gnttab: don't blindly free status pages upon version change (thx Jan Beulich).
      + gnttab/ARM: don't corrupt shared GFN array (thx Jan Beulich).
      + memory: don't implicitly unpin for decrease-reservation (thx Jan Beulich).
      + xen/arm: cpuerrata: Actually check errata on non-boot CPUs (thx Julien Grall).
      + xen/arm: vsmc: Don't implement function IDs that don't exist (thx Julien Grall).
      + xen/arm: vpsci: Removing dummy MIGRATE and MIGRATE_INFO_UP_CPU (thx Julien Grall).
      + x86/idle: Clear SPEC_CTRL while idle (thx Andrew Cooper).
      + x86/cpuid: Offer Indirect Branch Controls to guests (thx Andrew Cooper).
      + x86/ctxt: Issue a speculation barrier between vcpu contexts (thx Andrew Cooper).
      + x86/boot: Calculate the most appropriate BTI mitigation to use (thx Andrew Cooper).
      + x86/entry: Avoid using alternatives in NMI/#MC paths (thx Andrew Cooper).
      + x86/entry: Organise the clobbering of the RSB/RAS on entry to Xen (thx Andrew Cooper).
      + x86/entry: Organise the use of MSR_SPEC_CTRL at each entry/exit
        point (thx Andrew Cooper).
      + x86/hvm: Permit guests direct access to MSR_{SPEC_CTRL,PRED_CMD} (thx Andrew Cooper).
      + x86/migrate: Move MSR_SPEC_CTRL on migrate (thx Andrew Cooper).
      + x86/msr: Emulation of MSR_{SPEC_CTRL,PRED_CMD} for guests (thx Andrew Cooper).
      + x86/cpuid: Handling of IBRS/IBPB, STIBP and IBRS for guests (thx Andrew Cooper).
      + x86: fix GET_STACK_END (thx Wei Liu).
      + x86/acpi: process softirqs while printing CPU ACPI data (thx Roger Pau Monne).
      + xen/x86: report domain id on cpuid (thx Roger Pau Monne).
      + x86/svm: Offer CPUID Faulting to AMD HVM guests as well (thx Andrew Cooper).
      + x86/cmdline: Introduce a command line option to disable
        IBRS/IBPB, STIBP and IBPB (thx Andrew Cooper).
      + x86/feature: Definitions for Indirect Branch Controls (thx Andrew Cooper).
      + x86: Introduce alternative indirect thunks (thx Andrew Cooper).
      + x86/amd: Try to set lfence as being Dispatch Serialising (thx Andrew Cooper).
      + x86/boot: Report details of speculative mitigations (thx Andrew Cooper).
      + x86: Support indirect thunks from assembly code (thx Andrew Cooper).
      + x86: Support compiling with indirect branch thunks (thx Andrew Cooper).
      + common/wait: Clarifications to wait infrastructure (thx Andrew Cooper).
      + x86/entry: Erase guest GPR state on entry to Xen (thx Andrew Cooper).
      + x86/hvm: Use SAVE_ALL to construct the cpu_user_regs frame
        after VMExit (thx Andrew Cooper).
      + x86/entry: Rearrange RESTORE_ALL to restore register in stack
        order (thx Andrew Cooper).
      + x86: Introduce a common cpuid_policy_updated() (thx Andrew Cooper).
      + x86/hvm: Rename update_guest_vendor() callback to
        cpuid_policy_changed() (thx Andrew Cooper).
      + x86/alt: Introduce ALTERNATIVE{,_2} macros (thx Andrew Cooper).
      + x86/alt: Break out alternative-asm into a separate header file (thx Andrew Cooper).
      + xen/arm32: entry: Document the purpose of r11 in the traps
        handler (thx Julien Grall).
      + xen/arm32: Invalidate icache on guest exist for Cortex-A15 (thx Julien Grall).
      + xen/arm32: Invalidate BTB on guest exit for Cortex A17 and 12 (thx Julien Grall).
      + xen/arm32: Add skeleton to harden branch predictor aliasing
        attacks (thx Julien Grall).
      + xen/arm32: entry: Add missing trap_reset entry (thx Julien Grall).
      + xen/arm32: Add missing MIDR values for Cortex-A17 and A12 (thx Julien Grall).
      + xen/arm32: entry: Consolidate DEFINE_TRAP_ENTRY_* macros (thx Julien Grall).
      + SUPPORT.md: Fix version and Initial-Release (thx Ian Jackson).
      + xen/arm: cpuerrata: Remove percpu.h include (thx Julien Grall).
      + xen/arm64: Implement branch predictor hardening for affected
        Cortex-A CPUs (thx Julien Grall).
      + xen/arm64: Add skeleton to harden the branch predictor aliasing
        attacks (thx Julien Grall).
      + xen/arm: cpuerrata: Add MIDR_ALL_VERSIONS (thx Julien Grall).
      + xen/arm64: Add missing MIDR values for Cortex-A72, A73 and A75 (thx Julien Grall).
      + xen/arm: Introduce enable callback to enable a capabilities on
        each online CPU (thx Julien Grall).