Package xen: Information

    Source package: xen
    Version: 4.10.1-alt1.S1
    Build time:  Jun 7, 2018, 04:05 PM in the task #207978
    Category: Emulators
    Report package bug
    License: GPLv2+, LGPLv2+, BSD
    Summary: Xen is a virtual machine monitor (hypervisor)
    Description: 
    The Xen Project hypervisor is an open-source type-1 or baremetal
    hypervisor, which makes it possible to run many instances of an
    operating system or indeed different operating systems in parallel on a
    single machine (or host). The Xen Project hypervisor is the only type-1
    hypervisor that is available as open source. It is used as the basis for
    a number of different commercial and open source applications, such as:
    server virtualization, Infrastructure as a Service (IaaS),
    desktop virtualization, security applications, embedded and hardware
    appliances. The Xen Project hypervisor is powering the largest clouds in
    production today.
    
    This package contains the command line tools, needed to manage virtual
    machines running under the Xen hypervisor.

    List of rpms provided by this srpm:
    libxen (x86_64, i586)
    libxen-debuginfo (x86_64, i586)
    libxen-devel (x86_64, i586)
    xen (x86_64, i586)
    xen-debuginfo (x86_64, i586)
    xen-doc (noarch)
    xen-hypervisor (x86_64)
    xen-licenses (x86_64, i586)
    xen-ocaml (x86_64, i586)
    xen-ocaml-debuginfo (x86_64, i586)
    xen-ocaml-devel (x86_64, i586)
    xen-runtime (x86_64, i586)
    xen-runtime-common (noarch)
    xen-runtime-debuginfo (x86_64, i586)
    xen-stubdoms (x86_64, i586)



    ACL:
    Dmitriy D. Shadrinov
    @everybody

      1. perl(Pod/Man.pm)
      2. perl(Pod/Text.pm)
      3. libxml2-devel
      4. libe2fs-devel
      5. liblzma-devel
      6. liblzo2-devel
      7. perl-HTML-Parser
      8. libyajl-devel
      9. perl-devel
      10. libfdt-devel
      11. libssl-devel
      12. bzlib-devel
      13. gettext
      14. ghostscript
      15. checkpolicy
      16. m4
      17. makeinfo
      18. cmake
      19. pkgconfig(glib-2.0) >= 2.12
      20. libncurses-devel
      21. mingw64-binutils >= 2.26
      22. libnettle-devel
      23. libnl-devel >= 3.2.8
      24. libnl3 >= 3.2.8
      25. libnl3-utils >= 3.2.8
      26. dev86
      27. discount
      28. graphviz
      29. /usr/bin/texi2html
      30. /usr/include/gnu/stubs-32.h
      31. libgcrypt-devel
      32. nettle
      33. python-devel
      34. ocaml
      35. libpci-devel
      36. flex
      37. seabios
      38. rpm-build-ubt
      39. libpixman >= 0.21.8
      40. libpixman-devel >= 0.21.8
      41. rpm-macros-uefi
      42. iasl
      43. libSDL-devel
      44. gcc-c++
      45. libpng-devel
      46. libgnutls-devel
      47. ipxe-roms-qemu
      48. libXext-devel
      49. texinfo
      50. libcap-devel
      51. libsystemd-devel >= 209
      52. transfig
      53. ocaml-findlib
      54. libaio-devel
      55. ocaml-ocamlbuild
      56. ocaml-ocamldoc
      57. udev
      58. libattr-devel
      59. zlib-devel
      60. libuuid-devel
      61. libjpeg-devel
      62. libvde-devel

    Last changed


    May 24, 2018 Dmitriy D. Shadrinov 4.10.1-alt1.S1
    - 4.10.1 release
    - upstream updates upto 7b35e7807, including:
      + x86/HVM: guard against emulator driving ioreq state in weird ways
        (thx Jan Beulich) (XSA-262)
      + x86/vpt: add support for IO-APIC routed interrupts (part of XSA-261)
      + x86/traps: Fix handling of #DB exceptions in hypervisor context
        x86/traps: Use an Interrupt Stack Table for #DB
        x86/pv: Move exception injection into {,compat_}test_all_events()
        x86/traps: Fix %dr6 handing in #DB handler
        (thx Andrew Cooper) (part of XSA-260 / CVE-2018-8897)
    May 22, 2018 Anton Farygin 4.10.0-alt6.S1
    - rebuild for 4.06.1
    March 9, 2018 Dmitriy D. Shadrinov 4.10.0-alt5.S1
    - upstream updates:
      + xen/arm: Flush TLBs before turning on the MMU to avoid stale
        entries (thx Julien Grall).
      + xen/arm: vgic: Make sure the number of SPIs is a multiple of 32 (thx Julien Grall).
      + x86/hvm: Disallow the creation of HVM domains without Local
        APIC emulation (thx Andrew Cooper).
      + gnttab: don't blindly free status pages upon version change (thx Jan Beulich).
      + gnttab/ARM: don't corrupt shared GFN array (thx Jan Beulich).
      + memory: don't implicitly unpin for decrease-reservation (thx Jan Beulich).
      + xen/arm: cpuerrata: Actually check errata on non-boot CPUs (thx Julien Grall).
      + xen/arm: vsmc: Don't implement function IDs that don't exist (thx Julien Grall).
      + xen/arm: vpsci: Removing dummy MIGRATE and MIGRATE_INFO_UP_CPU (thx Julien Grall).
      + x86/idle: Clear SPEC_CTRL while idle (thx Andrew Cooper).
      + x86/cpuid: Offer Indirect Branch Controls to guests (thx Andrew Cooper).
      + x86/ctxt: Issue a speculation barrier between vcpu contexts (thx Andrew Cooper).
      + x86/boot: Calculate the most appropriate BTI mitigation to use (thx Andrew Cooper).
      + x86/entry: Avoid using alternatives in NMI/#MC paths (thx Andrew Cooper).
      + x86/entry: Organise the clobbering of the RSB/RAS on entry to Xen (thx Andrew Cooper).
      + x86/entry: Organise the use of MSR_SPEC_CTRL at each entry/exit
        point (thx Andrew Cooper).
      + x86/hvm: Permit guests direct access to MSR_{SPEC_CTRL,PRED_CMD} (thx Andrew Cooper).
      + x86/migrate: Move MSR_SPEC_CTRL on migrate (thx Andrew Cooper).
      + x86/msr: Emulation of MSR_{SPEC_CTRL,PRED_CMD} for guests (thx Andrew Cooper).
      + x86/cpuid: Handling of IBRS/IBPB, STIBP and IBRS for guests (thx Andrew Cooper).
      + x86: fix GET_STACK_END (thx Wei Liu).
      + x86/acpi: process softirqs while printing CPU ACPI data (thx Roger Pau Monne).
      + xen/x86: report domain id on cpuid (thx Roger Pau Monne).
      + x86/svm: Offer CPUID Faulting to AMD HVM guests as well (thx Andrew Cooper).
      + x86/cmdline: Introduce a command line option to disable
        IBRS/IBPB, STIBP and IBPB (thx Andrew Cooper).
      + x86/feature: Definitions for Indirect Branch Controls (thx Andrew Cooper).
      + x86: Introduce alternative indirect thunks (thx Andrew Cooper).
      + x86/amd: Try to set lfence as being Dispatch Serialising (thx Andrew Cooper).
      + x86/boot: Report details of speculative mitigations (thx Andrew Cooper).
      + x86: Support indirect thunks from assembly code (thx Andrew Cooper).
      + x86: Support compiling with indirect branch thunks (thx Andrew Cooper).
      + common/wait: Clarifications to wait infrastructure (thx Andrew Cooper).
      + x86/entry: Erase guest GPR state on entry to Xen (thx Andrew Cooper).
      + x86/hvm: Use SAVE_ALL to construct the cpu_user_regs frame
        after VMExit (thx Andrew Cooper).
      + x86/entry: Rearrange RESTORE_ALL to restore register in stack
        order (thx Andrew Cooper).
      + x86: Introduce a common cpuid_policy_updated() (thx Andrew Cooper).
      + x86/hvm: Rename update_guest_vendor() callback to
        cpuid_policy_changed() (thx Andrew Cooper).
      + x86/alt: Introduce ALTERNATIVE{,_2} macros (thx Andrew Cooper).
      + x86/alt: Break out alternative-asm into a separate header file (thx Andrew Cooper).
      + xen/arm32: entry: Document the purpose of r11 in the traps
        handler (thx Julien Grall).
      + xen/arm32: Invalidate icache on guest exist for Cortex-A15 (thx Julien Grall).
      + xen/arm32: Invalidate BTB on guest exit for Cortex A17 and 12 (thx Julien Grall).
      + xen/arm32: Add skeleton to harden branch predictor aliasing
        attacks (thx Julien Grall).
      + xen/arm32: entry: Add missing trap_reset entry (thx Julien Grall).
      + xen/arm32: Add missing MIDR values for Cortex-A17 and A12 (thx Julien Grall).
      + xen/arm32: entry: Consolidate DEFINE_TRAP_ENTRY_* macros (thx Julien Grall).
      + SUPPORT.md: Fix version and Initial-Release (thx Ian Jackson).
      + xen/arm: cpuerrata: Remove percpu.h include (thx Julien Grall).
      + xen/arm64: Implement branch predictor hardening for affected
        Cortex-A CPUs (thx Julien Grall).
      + xen/arm64: Add skeleton to harden the branch predictor aliasing
        attacks (thx Julien Grall).
      + xen/arm: cpuerrata: Add MIDR_ALL_VERSIONS (thx Julien Grall).
      + xen/arm64: Add missing MIDR values for Cortex-A72, A73 and A75 (thx Julien Grall).
      + xen/arm: Introduce enable callback to enable a capabilities on
        each online CPU (thx Julien Grall).