* The minimum toolchain requirements have increased for some architectures:
- For x86, GCC 5.1 and Binutils 2.25, or Clang/LLVM 11
- For ARM32 and ARM64, GCC 5.1 and Binutils 2.25
- For RISC-V, GCC 12.2 and Binutils 2.39
* Debian Trixie added to CI. Debian Bullseye retired from CI for RISC-V due
to the baseline change.
* Linux based device model stubdomains are now fully supported.
* New dependency on library json-c 0.15 or later, the toolstack will prefer it
to `YAJL` when available.
* Introduce libxenmanage as a stable library, replacing xenstored's
dependency on unstable libraries.
* Introduce new PDX compression algorithm to cope with Intel Sierra Forest and
Granite Rapids having sparse memory maps.
* Support of qemu-traditional has been removed.
* The in-tree oxenstored is deprecated and will be removed in a future
version of Xen. It is moving into the Xapi project
https://github.com/xapi-project/oxenstored so it can be maintained in line
with the other Ocaml projects in the Xen ecosystem.
* On x86:
- Restrict the cache flushing done as a result of guest physical memory map
manipulations and memory type changes.
- Allow controlling the MTRR cache attribute of the Xen platform PCI device
BAR for HVM guests, to improve performance of guests using it to map the
grant table or foreign memory.
- Allow configuring the number of altp2m tables per domain via vm.cfg.
- Option to attempt to fixup p2m page-faults on PVH dom0.
- Resizable BARs is supported for PVH dom0.
- Support PCI passthrough for HVM domUs when dom0 is PVH (note SR-IOV
capability usage is not yet supported on PVH dom0).
OBS-URL: https://build.opensuse.org/package/show/Virtualization/xen?expand=0&rev=903
format as expected by fillup.
Each comment needs to be followed by an enabled key. Otherwise
fillup will remove manually enabled key=value pairs, along with
everything that looks like a stale comment, during next pkg update
- Remove init.xen_loop and /etc/modprobe.d/xen_loop.conf
The number of loop devices is unlimited since a while
- Refresh xenstore-launch.patch to cover also daemon case
- Now that SOURCE_DATE_EPOCH is defined and Xen Makefile uses it,
drop reproducible.patch
- Update to Xen 4.15.0 FCS release
xen-4.15.0-testing-src.tar.bz2
* Xen can now export Intel Processor Trace (IPT) data from guests to tools in dom0.
* Xen now supports Viridian enlightenments for guests with more than 64 vcpus.
* Xenstored and oxenstored both now support LiveUpdate (tech preview).
* Unified boot images
* Switched x86 MSR accesses to deny by default policy.
* Named PCI devices for xl/libxl and improved documentation for xl PCI configuration format.
* Support for zstd-compressed dom0 (x86) and domU kernels.
* Reduce ACPI verbosity by default.
* Add ucode=allow-same option to test late microcode loading path.
* Library improvements from NetBSD ports upstreamed.
* x86: Allow domains to use AVX-VNNI instructions.
* Added XEN_SCRIPT_DIR configuration option to specify location for Xen scripts.
* xennet: Documented a way for the backend (or toolstack) to specify MTU to the frontend.
* On detecting a host crash, some debug key handlers can automatically triggered to aid in debugging.
OBS-URL: https://build.opensuse.org/package/show/Virtualization/xen?expand=0&rev=743
The receiving side did detect holes in a to-be-allocated superpage,
but allocated a superpage anyway. This resulted to over-allocation.
- bsc#1167608 - adjust limit for max_event_channels
A previous change allowed an unbound number of event channels
to make sure even large domUs can start of of the box.
This may have a bad side effect in the light of XSA-344.
Adjust the built-in limit based on the number of vcpus.
In case this is not enough, max_event_channels=/maxEventChannels=
has to be used to set the limit as needed for large domUs
adjust libxl.max_event_channels.patch
- bsc#1183072 - VUL-0: xen: HVM soft-reset crashes toolstack (XSA-368)
Also resolves,
bsc#1179148 - kdump of HVM fails, soft-reset not handled by libxl
bsc#1181989 - openQA job causes libvirtd to dump core when
running kdump inside domain
xsa368.patch
OBS-URL: https://build.opensuse.org/package/show/Virtualization/xen?expand=0&rev=739
xen-4.14.0-testing-src.tar.bz2
* Linux stubdomains (contributed by QUBES OS)
* Control-flow Enforcement Technology (CET) Shadow Stack support (contributed by Citrix)
* Lightweight VM fork for fuzzing / introspection. (contributed by Intel)
* Livepatch: buildid and hotpatch stack requirements
* CONFIG_PV32
* Hypervisor FS support
* Running Xen as a Hyper-V Guest
* Domain ID randomization, persistence across save / restore
* Golang binding autogeneration
* KDD support for Windows 7, 8.x and 10
- Dropped patches contained in new tarball
5eb51be6-cpupool-fix-removing-cpu-from-pool.patch
5eb51caa-sched-vcpu-pause-flags-atomic.patch
5ec2a760-x86-determine-MXCSR-mask-always.patch
5ec50b05-x86-idle-rework-C6-EOI-workaround.patch
5ec7dcaa-x86-dont-enter-C6-with-in-service-intr.patch
5ec7dcf6-x86-dont-enter-C3-C6-with-errata.patch
5ec82237-x86-extend-ISR-C6-workaround-to-Haswell.patch
5ece1b91-x86-clear-RDRAND-CPUID-bit-on-AMD-fam-15-16.patch
5ece8ac4-x86-load_system_tables-NMI-MC-safe.patch
5ed69804-x86-ucode-fix-start-end-update.patch
5eda60cb-SVM-split-recalc-NPT-fault-handling.patch
5edf6ad8-ioreq-pending-emulation-server-destruction-race.patch
5edfbbea-x86-spec-ctrl-CPUID-MSR-defs-for-SRBDS.patch
5edfbbea-x86-spec-ctrl-mitigate-SRBDS.patch
5ee24d0e-x86-spec-ctrl-document-SRBDS-workaround.patch
xsa317.patch
xsa319.patch
OBS-URL: https://build.opensuse.org/package/show/Virtualization/xen?expand=0&rev=690