Sat, 21 Mar 2026 09:07:43 UTC | login

Information for build xen-4.19.1-1.0.ydi.6.0.ydi3.1.xcpng8.99

ID5315
Package Namexen
Version4.19.1
Release1.0.ydi.6.0.ydi3.1.xcpng8.99
Epoch
DraftFalse
Sourcegit+https://github.com/xcp-ng-rpms/xen.git#bbb2991b83e76d9291fee113ecef45861cb1e18e
SummaryXen is a virtual machine monitor
DescriptionXen Hypervisor.
Built byydirson
State failed
Volume DEFAULT
StartedWed, 18 Mar 2026 11:10:09 UTC
CompletedWed, 18 Mar 2026 11:17:16 UTC
Taskbuild (v9.0-u-ydi1, /xcp-ng-rpms/xen.git:bbb2991b83e76d9291fee113ecef45861cb1e18e)
Extra{'source': {'original_url': 'git+https://github.com/xcp-ng-rpms/xen.git?#bbb2991b83e76d9291fee113ecef45861cb1e18e'}}
Tags No tags
RPMs No RPMs
Changelog * Wed Dec 17 2025 Yann Dirson <yann.dirson@vates.tech> - 4.19.3-0.0.ydi.6 - Merge former xcpng-8.3 and ydi/9 work - do not fail build when revision contains a '+' - adjust exclude list to use rc.d/ - allow building for x86_64_v2 - update to 4.19.1-2 from XS: * Mon Feb 24 2025 Roger Pau Monné <roger.pau@citrix.com> - 4.19.1-2 - Fix (experimental) nested virt enabling - Fix IO_PAGE_FAULT on AMD machines due to interrupt migration - Reduce PCI config space accesses - Fix reboot/shutdown issues on AMD due to local APIC ESR interrupts * Mon Jan 13 2025 Andrew Cooper <andrew.cooper3@citrix.com> - 4.19.1-1 - Update to Xen 4.19.1 * Mon May 05 2025 Tu Dinh <ngoc-tu.dinh@vates.tech> - 4.17.5-9.3 - Backport dd05d265b8ab "x86/intel: Fix PERF_GLOBAL fixup when virtualised" * Tue Apr 29 2025 Yann Dirson <yann.dirson@vates.tech> - 4.17.5-9.2 - Rebuild against ncurses 6.4-6.20240309 to pull abi5 (compat) libs * Mon Mar 31 2025 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.17.5-9.1 - Sync with 4.17.5-9 - *** Upstream changelog *** * Fri Feb 07 2025 Javi Merino <javi.merino@cloud.com> - 4.17.5-9 - Fix PCI config reads patch * Tue Feb 4 2025 Javi Merino <javi.merino@cloud.com> - 4.17.5-8 - Fix IO_PAGE_FAULT reported by AMD - Reduce PCI config reads * Wed Dec 18 2024 Roger Pau Monné <roger.pau@citrix.com> - 4.17.5-7 - Fix IO-APIC initialization with ExtINT mode pins - Fix emulation of MOVBE instruction - Fix Ocaml rpath setting * Wed Mar 05 2025 Thierry Escande <thierry.escande@vates.tech> - 4.17.5-6.1 - Sync with 4.17.5-6 - *** Upstream changelog *** * Tue Dec 3 2024 Andrew Cooper <andrew.cooper3@citrix.com> - 4.17.5-6 - Fix migration of VMs from CH 8.2 CU1 to XS8 when the guest is using BHI_DIS_S * Mon Nov 25 2024 Andrew Cooper <andrew.cooper3@citrix.com> - 4.17.5-5 - Initial AMD Turin support - Fix dom0 pIRQ limit calculation - Fix emulation of BMI1/2 instructions * Fri Feb 28 2025 David Morel <david.morel@vates.tech> - 4.17.5-4.2 - Fix for XSA-467 / CVE-2025-1713 * Mon Feb 03 2025 Yann Dirson <yann.dirson@vates.tech> - 4.17.5-4.1 - xenguest: activate nested virt when requested * Tue Nov 05 2024 Andrew Cooper <andrew.cooper3@citrix.com> - 4.17.5-4 - Fixes for - XSA-463 CVE-2024-45818 - XSA-464 CVE-2024-45819 - Fix IO-APIC directed EOIs when using AMD-Vi interrupt remapping - Fix a crash during livepatch loading caused by an incorrect order of checks - Switch xAPIC flat driver to use physical destination mode for external interrupts - Remove an overly strict check when parsing AMD IVRS ACPI tables - Fix a leak of pending interrupts during CPU offline * Wed Sep 11 2024 Andrew Cooper <andrew.cooper3@citrix.com> - 4.17.5-3 - Fix for XSA-462 CA-399169 * Tue Sep 10 2024 Andrew Cooper <andrew.cooper3@citrix.com> - 4.17.5-2 - Fix x2APIC cluster handling across S3 - Avoid clobbering firmware memory during the load-base calculation - Fix ASAN issues identified in `xentop` and `xl dmesg` * Wed Aug 21 2024 Andrew Cooper <andrew.cooper3@citrix.com> - 4.17.5-1 - Update to Xen 4.17.5 * Fri Aug 02 2024 Roger Pau Monné <roger.pau@citrix.com> - 4.17.4-8 - Fix for XSA-460 CVE-2024-31145 - Fix IO breakpoint recognition in PV guests - Fix libxenstore.so to not modify SIGBUS behind the back of the application - Fix a integer overflow in Xen's bunzip2(), leading to a rare decompression faliure * Mon Jul 22 2024 Matthew Barnes <matthew.barnes@cloud.com> - 4.17.4-7 - Fix CLOEXEC handling in libxenstore - Don't package Ocaml Xenbus library - Inject #DF instead of overwriting RIP in xen-hvmcrash * Wed Jul 03 2024 Andrew Cooper <andrew.cooper3@citrix.com> - 4.17.4-6 - Fix for XSA-458 CVE-2024-31143 - Fix early detection of CPU features on hardware with the CPUID Limit active in firmware - Fix a bug whereby dynamic XSTATE CPUID information was provided to all guests, even those with XSAVE disabled - Fix a bug on Intel where HVM guests may have MMIO mappings forced to UC even if the guest kernel wanted a different cacheability - Fix multiple bugs with interrupt affinity handling around CPU hotplug * Fri May 31 2024 Pau Ruiz Safont <pau.ruizsafont@cloud.com> - 4.17.4-5 - Rebuild with OCaml 4.14.2 compiler. * Thu May 30 2024 Andrew Cooper <andrew.cooper3@citrix.com> - 4.17.4-4 - Don't link oxenstored against libsystemd, and remove systemd-devel as a build dependency - Fix population of the online vCPU bitmap for PVH guests - Drop unused openssl-devel build dependency * Wed May 15 2024 Andrew Cooper <andrew.cooper3@citrix.com> - 4.17.4-3 - Pass all MSI-X vector control writes to the device model - Distinguish "ucode already up to date" and treat it as success - Optimise HVMLoader AP bringup - Fix xentop cpu% sort order - Fix possible watchdog timeouts or NULL pointer deference with CPU hotplug * Tue May 07 2024 Andrew Cooper <andrew.cooper3@citrix.com> - 4.17.4-2 - Fix a heterogeneous CPU levelling bug between ICX and CLX * Tue Apr 30 2024 Andrew Cooper <andrew.cooper3@citrix.com> - 4.17.4-1 - Update to Xen 4.17.4 - Fix a bug in RTC emulation for HVM guests which occasionally causes OVMF to fail an assertion - Fix a bug in livepatch application when CET-IBT is active, leading to a full host crash - Include the debug xen debug symbols in in the lp-devel subpackage * Tue Apr 09 2024 Alex Brett <alex.brett@cloud.com> - 4.17.3-6 - CA-391273: Rebuild to resolve xen-dom0-tools dependency issue * Wed Apr 03 2024 Andrew Cooper <andrew.cooper3@citrix.com> - 4.17.3-5 - Fixes for: - XSA-454 CVE-2023-46842 - XSA-455 CVE-2024-31142 - XSA-456 CVE-2024-2201 * Fri Mar 08 2024 Andrew Cooper <andrew.cooper3@citrix.com> - 4.17.3-4 - Fixes for: - XSA-453 CVE-2024-2193, off by default - XSA-452 CVE-2023-28746 - Fix levelling of MD_CLEAR/FB_CLEAR across a pool - Hide x2APIC from PV guests by default - Fixes to livepatching, including the ability to patch .rodata - Improve oxenstored performance by avoiding Hashtbl.copy when processing packets - Print the SPECULATIVE_HARDEN_* options which are enabled at build time * Fri Feb 23 2024 Andrew Cooper <andrew.cooper3@citrix.com> - 4.17.3-3 - Fix for XSA-451 CVE-2023-46841. - Fix the migration of VMs which had previously seen the CMP_LEGACY feature. - Retire support to customise guest memory at the 1M boundary. * Tue Feb 13 2024 Andrew Cooper <andrew.cooper3@citrix.com> - 4.17.3-2 - De-virtualise more function pointers, based on boot time configuration - Improve the performance of IOMMU construction for dom0 - Fix a bug with the determination of IVMD memory regions - Fix inefficiencies with XEN_{SYS,DOM}CTL_getdomaininfo{,list} - Fix undefined behaviour in compat_set_timer_op() - Fix the Raw CPU Policy rescan when CPUID Masking is active * Fri Jan 26 2024 Andrew Cooper <andrew.cooper3@citrix.com> - 4.17.3-1 - Update to Xen 4.17 Major highlights: - CET-SS, CET-IBT and IOMMU Superpages used on capable hardware - PV32, PV_LINEAR_PT and SHADOW_PAGING now compiled out - NX and HAP (Intel EPT or AMD NPT) support in hardware is now mandatory * Wed Jan 24 2024 Andrew Cooper <andrew.cooper3@citrix.com> - 4.13.5-10.60 - Fix watchdog setup on Intel Sapphire Rapids and Emerald Rapids platforms. - Adjust preemption during IOMMU setup to avoid triggering the watchdog. - Extend AMD #1474 (crash after ~1044 days) workaround to Zen1 platforms. * Tue Dec 19 2023 Andrew Cooper <andrew.cooper3@citrix.com> - 4.13.5-10.59 - Enable AVX-512 by default for Intel IceLake and later CPUs. - Rebuild with updated Ocaml 4.14 runtime. - Fix possible memory leak in libxenguest cpu-policy infrastructure.