Cookies op Tweakers

Tweakers maakt gebruik van cookies, onder andere om de website te analyseren, het gebruiksgemak te vergroten en advertenties te tonen. Door gebruik te maken van deze website, of door op 'Ga verder' te klikken, geef je toestemming voor het gebruik van cookies. Wil je meer informatie over cookies en hoe ze worden gebruikt, bekijk dan ons cookiebeleid.

Meer informatie

Software-update: Xen 4.7.6

Xen is een baremetal-hypervisor voor het x86- en ARMv7/v8-platform, en laat diverse besturingssystemen gelijktijdig op één systeem draaien zonder de prestaties drastisch te beïnvloeden. Voor meer informatie over Xen en de bijbehorende community verwijzen we naar deze en deze pagina. Op dit moment worden alleen Linux, NetBSD en FreeBSD als hostsystemen ondersteund, maar men is druk bezig om ook andere besturingssystemen volledig te ondersteunen. De ontwikkelaars hebben versie 4.7.6 uitgebracht, met de volgende aankondiging:

Xen Project 4.7.6

We are pleased to announce the release of Xen 4.7.6. This is available immediately from its git repository;a=shortlog;h=refs/heads/stable-4.7 (tag RELEASE-4.7.6) or from this download page. This release contains the following bug-fixes and improvements in the Xen Project hypervisor:
  • 280a556893: update Xen version to 4.7.6
  • e7956461f7: x86/HVM: don't cause #NM to be raised in Xen
  • b292518812: libxl: restore passing "readonly=" to qemu for SCSI disks
  • 790847d237: libxl: qemu_disk_scsi_drive_string: Break out common parts of disk config
  • f9898e7873: x86: Refine checks in #DB handler for faulting conditions
  • 253c3ec8ae: x86/mm: don't bypass preemption checks
  • 839826b094: x86/EFI: further correct FPU state handling around runtime calls
  • 55674ed8c8: x86/EFI: fix FPU state handling around runtime calls
  • 0feed480d8: x86: correct default_xen_spec_ctrl calculation
  • a8d37eef31: libxc/x86/PV: don't hand through CPUID leaf 0x80000008 as is
  • 117ef5e270: x86/spec-ctrl: Mitigations for LazyFPU
  • 536d16cbdd: x86: Support fully eager FPU context switching
  • 196932adb2: x86: don't enable XPTI on idle domain
  • 0d44ee0bc0: x86: re-enable XPTI/PCID as needed in switch_native()
  • f9b8c1119e: xen/x86: use PCID feature
  • ed4f56df89: xen/x86: add some cr3 helpers
  • 3f5bd561d1: xen/x86: convert pv_guest_cr4_to_real_cr4() to a function
  • 03bf349d6f: xen/x86: use flag byte for decision whether xen_cr3 is valid
  • 375c01ec3f: xen/x86: disable global pages for domains with XPTI active
  • acdf07d3f0: xen/x86: use invpcid for flushing the TLB
  • 53c6a02469: xen/x86: support per-domain flag for xpti
  • 466ab4269c: xen/x86: add a function for modifying cr3
  • 870d737058: x86/xpti: avoid copying L4 page table contents when possible
  • fb665b3c2a: x86: invpcid support
  • 6678f08755: x86: move invocations of hvm_flush_guest_tlbs()
  • bd63f04192: x86/XPTI: fix S3 resume (and CPU offlining in general)
  • 340c686ace: x86/msr: Virtualise MSR_SPEC_CTRL.SSBD for guests to use
  • 55c1e8486b: x86/Intel: Mitigations for GPZ SP4 - Speculative Store Bypass
  • 88f810af57: x86/AMD: Mitigations for GPZ SP4 - Speculative Store Bypass
  • ea94f1e1eb: x86/spec_ctrl: Introduce a new `spec-ctrl=` command line argument to replace `bti=`
  • 9299683d59: x86/cpuid: Improvements to guest policies for speculative sidechannel features
  • 8c699a0768: x86/spec_ctrl: Explicitly set Xen's default MSR_SPEC_CTRL value
  • 0b5b62a694: x86/spec_ctrl: Split X86_FEATURE_SC_MSR into PV and HVM variants
  • ff11aaff4a: x86/spec_ctrl: Elide MSR_SPEC_CTRL handling in idle context when possible
  • f666dab271: x86/spec_ctrl: Rename bits of infrastructure to avoid NATIVE and VMEXIT
  • 366e041818: x86/spec_ctrl: Fold the XEN_IBRS_{SET,CLEAR} ALTERNATIVES together
  • 5d271d51cc: x86/spec_ctrl: Merge bti_ist_info and use_shadow_spec_ctrl into spec_ctrl_flags
  • 5d8c6fd2c6: x86/spec_ctrl: Express Xen's choice of MSR_SPEC_CTRL value as a variable
  • 226c231154: x86/spec_ctrl: Read MSR_ARCH_CAPABILITIES only once
  • 6de86cfa68: x86: Fix "x86: further CPUID handling adjustments"
  • ce22cc35df: xpti: fix bug in double fault handling
  • 4f713cf37d: x86/spec_ctrl: Updates to retpoline-safety decision making
  • 0b6c7b4e94: x86: suppress BTI mitigations around S3 suspend/resume
  • 2bc2e1fb27: x86: correct ordering of operations during S3 resume
  • 11fd624138: x86: log XPTI enabled status
  • 3478fb798b: x86: disable XPTI when RDCL_NO
  • 0bc0693c33: x86/pv: Protect multicalls against Spectre v2 - Branch Target Injection
  • be0d7af589: x86/cpuid: fix raw FEATURESET_7d0 reporting
  • d355f02335: x86/emul: Fix emulator test harness build following a backport of 7c508612
  • 236b8be22d: x86/emul: Fix emulator test harness build following the backport of ff555d59e8a
  • e9281adb47: x86/HVM: guard against emulator driving ioreq state in weird ways
  • fb70754082: x86/vpt: add support for IO-APIC routed interrupts
  • a6a2b5a202: x86/traps: Fix handling of #DB exceptions in hypervisor context
  • 54ff338572: x86/traps: Use an Interrupt Stack Table for #DB
  • 1bd5a368a5: x86/pv: Move exception injection into {,compat_}test_all_events()
  • 5fc01021dd: x86/traps: Fix %dr6 handing in #DB handler
  • a8ef07566f: x86: fix slow int80 path after XPTI additions
  • e61305042e: libxl: Specify format of inserted cdrom
  • 2fbc006150: x86/msr: Correct the emulation behaviour of MSR_PRED_CMD
  • 1619cff9d6: x86/VT-x: Fix determination of EFER.LMA in vmcs_dump_vcpu()
  • 5c81317a54: x86/HVM: suppress I/O completion for port output
  • 912aa9b19a: x86/pv: Fix up erroneous segments for 32bit syscall entry
  • 63b140fe33: x86/pv: Fix the handing of writes to %dr7
  • 62b1879693: x86: further CPUID handling adjustments
  • 9680710bed: x86/emul: Fix backport of "x86/emul: Fix the decoding of segment overrides in 64bit mode"
  • dca80abc20: update Xen version to 4.7.5
  • 4bfe39fc20: x86/PV: also cover Dom0 in SPEC_CTRL / PRED_CMD emulation
  • 2c6ef37466: x86: Move microcode loading earlier
  • 7e5f68befc: x86/entry: Fix passing 6th argument for compat hypercalls
  • 8f4998777e: x86/vlapic: clear TMR bit upon acceptance of edge-triggered interrupt to IRR
  • d0919f5648: cpufreq/ondemand: fix race while offlining CPU
  • e306cf57a2: x86: remove CR reads from exit-to-guest path
  • 3442d5b9e8: x86: slightly reduce Meltdown band-aid overhead
  • b7756369db: x86/xpti: don't map stack guard pages
  • e03c04f4a0: x86/xpti: Hide almost all of .text and all .data/.rodata/.bss mappings
  • 8d3dfdfcb3: x86/apicv: fix wrong IPI suppression during posted interrupt delivery
  • 529218f468: x86: ignore guest microcode loading attempts
  • b56a0cdeaf: x86/HVM: don't give the wrong impression of WRMSR succeeding
  • ec5815a86a: x86/PV: fix off-by-one in I/O bitmap limit check
  • 5570e5f298: grant: Release domain lock on 'map' path in cache_flush
  • 577277bd62: x86/pv: Avoid leaking other guests' MSR_TSC_AUX values into PV context
  • 796a61331b: x86/nmi: start NMI watchdog on CPU0 after SMP bootstrap
  • 658f173102: x86/srat: fix end calculation in nodes_cover_memory()
  • ad52760b9b: x86/entry: Use 32bit xors rater than 64bit xors for clearing GPRs
  • d02dfea764: x86/emul: Fix the decoding of segment overrides in 64bit mode
  • 6a16018f72: x86/spec_ctrl: Fix several bugs in SPEC_CTRL_ENTRY_FROM_INTR_IST
  • 4eeea06949: x86/srat: fix the end pfn check in valid_numa_range()
  • 2a97af1145: x86: reduce Meltdown band-aid IPI overhead
  • f89c26c60a: x86/emul: Fix the emulation of invlpga
  • 92f8e00e6e: xen/arm: Flush TLBs before turning on the MMU to avoid stale entries
  • bbd12188fa: tools/libxc: Fix restoration of PV MSRs after migrate
  • 60e129725a: tools/libxc: Avoid generating inappropriate zero-content records
  • 02daeb5f42: x86: two fixes to Spectre v2 backports
  • c15b8dc36b: gnttab: don't blindly free status pages upon version change
  • 640691d565: gnttab/ARM: don't corrupt shared GFN array
  • 69dcb65120: memory: don't implicitly unpin for decrease-reservation
  • ade3bcafd2: x86/PV: correctly count MSRs to migrate
  • c64e0c1cb5: xen/arm: cpuerrata: Actually check errata on non-boot CPUs
  • e54670ff26: tools/kdd: don't use a pointer to an unaligned field.
  • 7d56ef3015: libxc: fix build (introduce _AC())
  • aac4cbe364: x86: fix build with older tool chain
  • 68420b47d9: x86/idle: Clear SPEC_CTRL while idle
  • e09548d28a: x86/cpuid: Offer Indirect Branch Controls to guests
  • be261bd97f: x86/ctxt: Issue a speculation barrier between vcpu contexts
  • 327a783674: x86/boot: Calculate the most appropriate BTI mitigation to use
  • 9f08fce3b9: x86/entry: Avoid using alternatives in NMI/#MC paths
  • 4a38ec26ba: x86/entry: Organise the clobbering of the RSB/RAS on entry to Xen
  • 65c9e06429: x86/entry: Organise the use of MSR_SPEC_CTRL at each entry/exit point
  • 84d47acc05: x86/hvm: Permit guests direct access to MSR_{SPEC_CTRL,PRED_CMD}
  • b7dae55c0e: x86/migrate: Move MSR_SPEC_CTRL on migrate
  • b2b7fe128f: x86/msr: Emulation of MSR_{SPEC_CTRL,PRED_CMD} for guests
  • c947e1e23d: x86/cpuid: Handling of IBRS/IBPB, STIBP and IBRS for guests
  • b1ae1264ba: x86: fix GET_STACK_END
  • 72450c89f5: x86/acpi: process softirqs while printing CPU ACPI data
  • e9220b40c6: x86/cmdline: Introduce a command line option to disable IBRS/IBPB, STIBP and IBPB
  • f9616884e1: x86/feature: Definitions for Indirect Branch Controls
  • 91f7e4627b: x86: Introduce alternative indirect thunks
  • f291c01cd6: x86/amd: Try to set lfence as being Dispatch Serialising
  • 3cf4e29f8d: x86/boot: Report details of speculative mitigations
  • 88602190f6: x86: Support indirect thunks from assembly code
  • 62a2624e3c: x86: Support compiling with indirect branch thunks
  • c3f8df3df2: common/wait: Clarifications to wait infrastructure
  • 3877c024ea: x86/entry: Erase guest GPR state on entry to Xen
  • f0ed5f95cb: x86/hvm: Use SAVE_ALL to construct the cpu_user_regs frame after VMExit
  • 160b53c824: x86/entry: Rearrange RESTORE_ALL to restore register in stack order
  • e1313098e4: x86: Introduce a common cpuid_policy_updated()
  • 9ede1acbe9: x86/hvm: Rename update_guest_vendor() callback to cpuid_policy_changed()
  • d0cfbe81d0: x86/alt: Introduce ALTERNATIVE{,_2} macros
  • d596e6a0a6: x86/alt: Break out alternative-asm into a separate header file
  • f50ea840b9: xen/arm32: entry: Document the purpose of r11 in the traps handler
  • de3bdaa717: xen/arm32: Invalidate icache on guest exist for Cortex-A15
  • 766990b0b6: xen/arm32: Invalidate BTB on guest exit for Cortex A17 and 12
  • 4ac0229bc5: xen/arm32: Add skeleton to harden branch predictor aliasing attacks
  • bafd63f8be: xen/arm32: entry: Add missing trap_reset entry
  • d5bb425dac: xen/arm32: Add missing MIDR values for Cortex-A17 and A12
  • 003ec3e00a: xen/arm32: entry: Consolidate DEFINE_TRAP_ENTRY_* macros
  • fd884d6199: xen/arm64: Implement branch predictor hardening for affected Cortex-A CPUs
  • 50c68df818: xen/arm64: Add skeleton to harden the branch predictor aliasing attacks
  • 1bdcc9f7ef: xen/arm: cpuerrata: Add MIDR_ALL_VERSIONS
  • 2914ef5753: xen/arm64: Add missing MIDR values for Cortex-A72, A73 and A75
  • 62b9706dba: xen/arm: Introduce enable callback to enable a capabilities on each online CPU
  • 624abdcf2d: xen/arm: Detect silicon revision and set cap bits accordingly
  • d7b73edd0f: xen/arm: cpufeature: Provide an helper to check if a capability is supported
  • 112c49c114: xen/arm: Add cpu_hwcap bitmap
  • a5b0fa4871: xen/arm: Add macros to handle the MIDR
  • e19d0af4ee: x86: allow Meltdown band-aid to be disabled
  • e19517a335: x86: Meltdown band-aid against malicious 64-bit PV guests
  • 9b76908e6e: x86/mm: Always set _PAGE_ACCESSED on L4e updates
  • 46025e3c07: x86: Don't use potentially incorrect CPUID values for topology information
  • 0e6c6fc449: x86/entry: Remove support for partial cpu_user_regs frames
  • 40c4410924: x86/upcall: inject a spurious event after setting upcall vector
  • f3b76b6c50: x86/E820: don't overrun array
  • 4c937e26fa: x86/IRQ: conditionally preserve access permission on map error paths
  • 2307798903: xen/arm: fix smpboot barriers
  • 7089465510: arm: configure interrupts to be in non-secure group1
  • 375896d389: xen/arm: bootfdt: Use proper default for #address-cells and #size-cells
  • 99474d1c0b: xen/arm: gic-v3: Bail out if gicv3_cpu_init fail
  • f407332f99: xen/efi: Fix build with clang-5.0
  • 1c58d74aff: x86/microcode: Add support for fam17h microcode loading
  • d02140fc4d: gnttab: improve GNTTABOP_cache_flush locking
  • fae9dd55b2: gnttab: correct GNTTABOP_cache_flush empty batch handling
  • caae052733: x86/vvmx: don't enable vmcs shadowing for nested guests
  • c90b5c105b: xen/pv: Construct d0v0's GDT properly
  • 5b1c9fe417: x86/hvm: fix interaction between internal and external emulation
  • 2e6775eb54: improve XENMEM_add_to_physmap_batch address checking
  • f2d19fbf5f: x86: check paging mode earlier in xenmem_add_to_physmap_one()
  • 0baeec6421: x86: replace bad ASSERT() in xenmem_add_to_physmap_one()
  • 664433a1a0: sync CPU state upon final domain destruction
  • b3dfadc4e3: x86/hvm: Don't corrupt the HVM context stream when writing the MSR record
  • 8f140271ef: x86/hvm: Fix altp2m_vcpu_enable_notify error handling
  • 1967ced15a: common/gnttab: Correct error handling for gnttab_setup_table()
  • c3ddeca415: x86/paging: don't unconditionally BUG() on finding SHARED_M2P_ENTRY
  • b9c150ecbb: x86/shadow: fix ref-counting error handling
  • 5a99156840: x86/shadow: fix refcount overflow check
  • 4f34d9fa68: x86/mm: don't wrongly set page ownership
  • 4133de769d: x86: don't wrongly trigger linear page table assertion (2)
  • b3981ea9e8: p2m: Check return value of p2m_set_entry() when decreasing reservation
  • 184f259697: p2m: Always check to see if removing a p2m entry actually worked
  • 67966a98f8: x86/pod: prevent infinite loop when shattering large pages
  • af3f585bd6: update Xen version to 4.7.5-pre
This release contains neither fixes to qemu-traditional. nor to qemu-upstream.
Versienummer 4.7.6
Releasestatus Final
Besturingssystemen Linux, BSD
Website Xen
Licentietype Voorwaarden (GNU/BSD/etc.)

Door Japke Rosink


10-07-2018 • 09:38

1 Linkedin Google+

Bron: Xen


Meer historie

Reacties (1)

Wijzig sortering
Kan je niet beter een linkje plaatsen naar zo'n lap tekst?

Op dit item kan niet meer gereageerd worden.

Apple iPhone XS Red Dead Redemption 2 LG W7 Google Pixel 3 XL OnePlus 6T (6GB ram) FIFA 19 Samsung Galaxy S10 Google Pixel 3

Tweakers vormt samen met Tweakers Elect, Hardware.Info, Autotrack, Nationale Vacaturebank, Intermediair en Independer de Persgroep Online Services B.V.
Alle rechten voorbehouden © 1998 - 2019 Hosting door True