Xen Virtualization: Hypervisor (aka VMM aka Microkernel)

Edit Package xen.15649

Xen is a virtual machine monitor for x86 that supports execution of
multiple guest operating systems with unprecedented levels of
performance and resource isolation.

This package contains the Xen Hypervisor. (tm)

Modern computers are sufficiently powerful to use virtualization to
present the illusion of many smaller virtual machines (VMs), each
running a separate operating system instance. Successful partitioning
of a machine to support the concurrent execution of multiple operating
systems poses several challenges. Firstly, virtual machines must be
isolated from one another: It is not acceptable for the execution of
one to adversely affect the performance of another. This is
particularly true when virtual machines are owned by mutually
untrusting users. Secondly, it is necessary to support a variety of
different operating systems to accommodate the heterogeneity of popular
applications. Thirdly, the performance overhead introduced by
virtualization should be small.

Xen uses a technique called paravirtualization: The guest OS is
modified, mainly to enhance performance.

The Xen hypervisor (microkernel) does not provide device drivers for
your hardware (except for CPU and memory). This job is left to the
kernel that's running in domain 0. Thus the domain 0 kernel is
privileged; it has full hardware access. It's started immediately after
Xen starts up. Other domains have no access to the hardware; instead
they use virtual interfaces that are provided by Xen (with the help of
the domain 0 kernel).

Xen does support booting other Operating Systems; ports of NetBSD
(Christian Limpach), FreeBSD (Kip Macy), and Plan 9 (Ron Minnich)
exist. A port of Windows XP was developed for an earlier version of
Xen, but is not available for release due to license restrictions.

In addition to this package you need to install the kernel-xen and
xen-tools to use Xen. Xen 3 also supports running unmodified guests
using full virtualization, if appropriate hardware is present. Install
xen-tools-ioemu if you want to use this.

[Hypervisor is a trademark of IBM]

Refresh
Refresh
Source Files
Filename Size Changed
5ca7660f-x86-entry-drop-unused-includes.patch 0000001951 1.91 KB
5cab2a6b-x86-ACPI-also-parse-AMD-tables-early.patch 0000002219 2.17 KB
5cab2ab7-x86-IOMMU-introduce-init-ops.patch 0000003929 3.84 KB
5cab2ae8-x86-IOMMU-abstract-iommu_supports_eim.patch 0000004284 4.18 KB
5cab2b4e-x86-IOMMU-abstract-iommu_enable_x2apic_IR.patch 0000006268 6.12 KB
5cab2b95-x86-IOMMU-initialize-iommu_ops-in.patch 0000003797 3.71 KB
5cac9a4b-x86-IOMMU-abstract-adjust_vtd_irq_affinities.patch 0000002786 2.72 KB
5cdeac7f-AMD-IOMMU-adjust-IOMMU-list-head-init.patch 0000001148 1.12 KB
5cf8da09-adjust-sysdom-creation-call-earlier-on-x86.patch 0000010600 10.4 KB
5d0cf4e4-AMD-IOMMU-initialize-IRQ-tasklet-once.patch 0000001199 1.17 KB
5d149bb0-AMD-IOMMU-dont-add-IOMMUs.patch 0000002212 2.16 KB
5d1b3fab-AMD-IOMMU-restrict-feature-logging.patch 0000001355 1.32 KB
5d358508-x86-IRQ-desc-affinity-represents-request.patch 0000004326 4.22 KB
5d358534-x86-IRQ-consolidate-arch-cpu_mask-use.patch 0000007606 7.43 KB
5d358a67-AMD-IOMMU-pass-IOMMU-to-iterate_ivrs_entries-cb.patch 0000004959 4.84 KB
5d358a92-AMD-IOMMU-pass-IOMMU-to-amd_iommu_alloc_intremap_table.patch 0000002450 2.39 KB
5d39811c-x86-IOMMU-dont-restrict-IRQ-affinities.patch 0000003110 3.04 KB
5d417813-AMD-IOMMU-bitfield-extended-features.patch 0000014793 14.4 KB
5d417838-AMD-IOMMU-bitfield-control-reg.patch 0000019537 19.1 KB
5d41785b-AMD-IOMMU-bitfield-IRTE.patch 0000009721 9.49 KB
5d41787e-AMD-IOMMU-pass-IOMMU-to-gfu-intremap-entry.patch 0000006196 6.05 KB
5d4178ad-AMD-IOMMU-128bit-non-guest-APIC-IRTE.patch 0000016966 16.6 KB
5d4178fc-AMD-IOMMU-split-amd_iommu_init_one.patch 0000001857 1.81 KB
5d41793f-AMD-IOMMU-allow-enabling-without-IRQ.patch 0000002025 1.98 KB
5d417a16-AMD-IOMMU-adjust-IRQ-setup-for-x2APIC.patch 0000006555 6.4 KB
5d417ab6-AMD-IOMMU-enable-x2APIC-mode.patch 0000009395 9.17 KB
5d417b38-AMD-IOMMU-correct-IRTE-updating.patch 0000004924 4.81 KB
5d417b6a-AMD-IOMMU-dont-needlessly-log-headers.patch 0000004286 4.19 KB
5d4a9d25-AMD-IOMMU-drop-not-found-message.patch 0000001137 1.11 KB
5d53ed45-pygrub-Failing-to-set-value-to-0-in-Grub2ConfigFile.patch 0000001349 1.32 KB
5d80e7c0-AMD-IOMMU-free-shared-IRT-once.patch 0000002473 2.42 KB
5d80e80d-AMD-IOMMU-valid-flag-for-IVRS-mappings.patch 0000003215 3.14 KB
5d80e82e-AMD-IOMMU-alloc_intremap_table-callers-handle-errors.patch 0000002104 2.05 KB
5d80e857-x86-PCI-read-MSI-X-table-entry-count-early.patch 0000007222 7.05 KB
5d8b72e5-AMD-IOMMU-dont-blindly-alloc-intremap-tables.patch 0000017770 17.4 KB
5d8b730e-AMD-IOMMU-phantom-funcs-share-intremap-tables.patch 0000007938 7.75 KB
5d8b733b-x86-PCI-read-max-MSI-vector-count-early.patch 0000005827 5.69 KB
5d8b736d-AMD-IOMMU-replace-INTREMAP_ENTRIES.patch 0000011191 10.9 KB
5d8b7393-AMD-IOMMU-restrict-intremap-table-sizes.patch 0000010391 10.1 KB
5d976da3-libxl-attach-PCI-device-to-qemu-only-after-setting-pciback-pcifront.patch 0000001747 1.71 KB
5d9ee2a8-AMD-IOMMU-alloc-1-devtab-per-PCI-seg.patch 0000006123 5.98 KB
5d9ee2f0-AMD-IOMMU-allocate_buffer-avoid-memset.patch 0000004582 4.47 KB
5d9ee312-AMD-IOMMU-prefill-all-DTEs.patch 0000010674 10.4 KB
5db1be79-libxl-Offer-API-versions-0x040700-and-0x040800.patch 0000001403 1.37 KB
5ec2a760-x86-determine-MXCSR-mask-always.patch 0000002233 2.18 KB
5ec50b05-x86-idle-rework-C6-EOI-workaround.patch 0000003737 3.65 KB
5ec7dcaa-x86-dont-enter-C6-with-in-service-intr.patch 0000003729 3.64 KB
5ec7dcf6-x86-dont-enter-C3-C6-with-errata.patch 0000002219 2.17 KB
5ec82237-x86-extend-ISR-C6-workaround-to-Haswell.patch 0000001397 1.36 KB
5ece1b91-x86-clear-RDRAND-CPUID-bit-on-AMD-fam-15-16.patch 0000005217 5.09 KB
5ece8ac4-x86-load_system_tables-NMI-MC-safe.patch 0000003324 3.25 KB
5eda60cb-SVM-split-recalc-NPT-fault-handling.patch 0000004062 3.97 KB
5edf6ad8-ioreq-pending-emulation-server-destruction-race.patch 0000002196 2.14 KB
5edfbbea-x86-spec-ctrl-CPUID-MSR-defs-for-SRBDS.patch 0000005042 4.92 KB
5edfbbea-x86-spec-ctrl-mitigate-SRBDS.patch 0000006762 6.6 KB
5ee24d0e-x86-spec-ctrl-document-SRBDS-workaround.patch 0000001942 1.9 KB
CVE-2014-0222-blktap-qcow1-validate-l2-table-size.patch 0000001545 1.51 KB
README.SUSE 0000032571 31.8 KB
aarch64-maybe-uninitialized.patch 0000000759 759 Bytes
aarch64-rename-PSR_MODE_ELxx-to-match-linux-headers.patch 0000001371 1.34 KB
baselibs.conf 0000000009 9 Bytes
bin-python3-conversion.patch 0000015372 15 KB
blktap2-no-uninit.patch 0000000423 423 Bytes
block-dmmd 0000009571 9.35 KB
block-npiv 0000003588 3.5 KB
block-npiv-common.sh 0000007967 7.78 KB
block-npiv-vport 0000002101 2.05 KB
boot.local.xenU 0000001987 1.94 KB
boot.xen 0000002385 2.33 KB
build-python3-conversion.patch 0000035837 35 KB
disable-building-pv-shim.patch 0000000386 386 Bytes
etc_pam.d_xen-api 0000000265 265 Bytes
fix-xenpvnetboot.patch 0000000827 827 Bytes
gcc9-ignore-warnings.patch 0000000710 710 Bytes
hibernate.patch 0000001324 1.29 KB
init.pciback 0000002530 2.47 KB
init.xen_loop 0000000093 93 Bytes
ipxe-enable-nics.patch 0000000371 371 Bytes
ipxe-no-error-logical-not-parentheses.patch 0000001025 1 KB
ipxe-use-rpm-opt-flags.patch 0000001125 1.1 KB
ipxe.tar.bz2 0003669858 3.5 MB
libxc.sr.superpage.patch 0000028279 27.6 KB
libxl.LIBXL_HOTPLUG_TIMEOUT.patch 0000010886 10.6 KB
libxl.add-option-to-disable-disk-cache-flushes-in-qdisk.patch 0000008017 7.83 KB
libxl.helper_done-crash.patch 0000002072 2.02 KB
libxl.prepare-environment-for-domcreate_stream_done.patch 0000001357 1.33 KB
libxl.pvscsi.patch 0000083468 81.5 KB
libxl.set-migration-constraints-from-cmdline.patch 0000024082 23.5 KB
logrotate.conf 0000000259 259 Bytes
migration-python3-conversion.patch 0000005004 4.89 KB
mini-os.tar.bz2 0000310523 303 KB
pygrub-boot-legacy-sles.patch 0000002506 2.45 KB
pygrub-handle-one-line-menu-entries.patch 0000002474 2.42 KB
pygrub-netware-xnloader.patch 0000000722 722 Bytes
pygrub-python3-conversion.patch 0000025883 25.3 KB
replace-obsolete-network-configuration-commands-in-s.patch 0000009610 9.38 KB
reproducible.patch 0000001716 1.68 KB
stdvga-cache.patch 0000000750 750 Bytes
stubdom-have-iovec.patch 0000000803 803 Bytes
stubdom.tar.bz2 0019598658 18.7 MB
suse-xendomains-service.patch 0000000806 806 Bytes
suspend_evtchn_lock.patch 0000002115 2.07 KB
sysconfig.pciback 0000000237 237 Bytes
tmp_build.patch 0000001866 1.82 KB
vif-bridge-no-iptables.patch 0000000350 350 Bytes
vif-bridge-tap-fix.patch 0000000969 969 Bytes
vif-route.patch 0000000530 530 Bytes
x86-cpufreq-report.patch 0000002860 2.79 KB
x86-ioapic-ack-default.patch 0000000604 604 Bytes
xen-4.12.3-testing-src.tar.bz2 0005108752 4.87 MB
xen-arch-kconfig-nr_cpus.patch 0000000419 419 Bytes
xen-destdir.patch 0000002185 2.13 KB
xen-dom0-modules.service 0000000468 468 Bytes
xen-supportconfig 0000002968 2.9 KB
xen-utils-0.1.tar.bz2 0000006272 6.13 KB
xen.bug1026236.suse_vtsc_tolerance.patch 0000002415 2.36 KB
xen.build-compare.doc_html.patch 0000001203 1.17 KB
xen.changes 0000505713 494 KB
xen.libxl.dmmd.patch 0000005793 5.66 KB
xen.spec 0000041851 40.9 KB
xen.stubdom.newlib.patch 0000004459 4.35 KB
xen2libvirt.py 0000004853 4.74 KB
xenapiusers 0000000005 5 Bytes
xencommons.service 0000001052 1.03 KB
xenconsole-no-multiple-connections.patch 0000000931 931 Bytes
xenstore-launch.patch 0000000869 869 Bytes
xenstore-run-in-studomain.patch 0000002470 2.41 KB
xl-conf-default-bridge.patch 0000000537 537 Bytes
xl-conf-disable-autoballoon.patch 0000000495 495 Bytes
xnloader.py 0000001903 1.86 KB
xsa317.patch 0000001776 1.73 KB
xsa319.patch 0000000928 928 Bytes
xsa320-1.patch 0000004771 4.66 KB
xsa320-2.patch 0000006574 6.42 KB
xsa321-1.patch 0000001316 1.29 KB
xsa321-2.patch 0000006441 6.29 KB
xsa321-3.patch 0000003024 2.95 KB
xsa321-4.patch 0000001184 1.16 KB
xsa321-5.patch 0000000795 795 Bytes
xsa321-6.patch 0000003245 3.17 KB
xsa321-7.patch 0000005632 5.5 KB
xsa328-1.patch 0000003903 3.81 KB
xsa328-2.patch 0000001621 1.58 KB
Latest Revision
Robert Frohl's avatar Robert Frohl (rfrohl) committed (revision 1)
Release from SUSE:Maintenance:15649 / xen.SUSE_SLE-15-SP1_Update
Comments 0
openSUSE Build Service is sponsored by