902636
%global SLOF_gittagdate 20191022
902636
%global SLOF_gittagcommit 899d9883
26ba25
26ba25
%global have_usbredir 1
26ba25
%global have_spice    1
26ba25
%global have_opengl   1
26ba25
%global have_fdt      0
26ba25
%global have_gluster  1
26ba25
%global have_kvm_setup 0
26ba25
%global have_memlock_limits 0
26ba25
26ba25
%ifnarch %{ix86} x86_64
26ba25
    %global have_usbredir 0
26ba25
%endif
26ba25
36a43f
%ifnarch s390x
26ba25
    %global have_librdma 1
26ba25
%else
26ba25
    %global have_librdma 0
26ba25
%endif
26ba25
26ba25
%ifarch %{ix86}
26ba25
    %global kvm_target    i386
26ba25
%endif
26ba25
%ifarch x86_64
26ba25
    %global kvm_target    x86_64
26ba25
%else
26ba25
    %global have_spice   0
26ba25
    %global have_opengl  0
26ba25
    %global have_gluster 0
26ba25
%endif
26ba25
%ifarch %{power64}
26ba25
    %global kvm_target    ppc64
26ba25
    %global have_fdt     1
26ba25
    %global have_kvm_setup 1
26ba25
    %global have_memlock_limits 1
26ba25
%endif
26ba25
%ifarch s390x
26ba25
    %global kvm_target    s390x
b38b0f
    %global have_kvm_setup 1
26ba25
%endif
26ba25
%ifarch ppc
26ba25
    %global kvm_target    ppc
26ba25
    %global have_fdt     1
26ba25
%endif
26ba25
%ifarch aarch64
26ba25
    %global kvm_target    aarch64
26ba25
    %global have_fdt     1
26ba25
%endif
26ba25
26ba25
#Versions of various parts:
26ba25
26ba25
%global requires_all_modules                                     \
26ba25
Requires: %{name}-block-curl = %{epoch}:%{version}-%{release}    \
26ba25
%if %{have_gluster}                                              \
26ba25
Requires: %{name}-block-gluster = %{epoch}:%{version}-%{release} \
26ba25
%endif                                                           \
26ba25
Requires: %{name}-block-iscsi = %{epoch}:%{version}-%{release}   \
26ba25
Requires: %{name}-block-rbd = %{epoch}:%{version}-%{release}     \
26ba25
Requires: %{name}-block-ssh = %{epoch}:%{version}-%{release}
26ba25
26ba25
# Macro to properly setup RHEL/RHEV conflict handling
26ba25
%define rhev_ma_conflicts()                                      \
1072c8
Obsoletes: %1-ma <= %{epoch}:%{version}-%{release}               \
1072c8
Obsoletes: %1-rhev <= %{epoch}:%{version}-%{release}
26ba25
26ba25
Summary: QEMU is a machine emulator and virtualizer
26ba25
Name: qemu-kvm
902636
Version: 4.2.0
1072c8
Release: 59%{?dist}
26ba25
# Epoch because we pushed a qemu-1.0 package. AIUI this can't ever be dropped
26ba25
Epoch: 15
26ba25
License: GPLv2 and GPLv2+ and CC-BY
26ba25
Group: Development/Tools
26ba25
URL: http://www.qemu.org/
36a43f
ExclusiveArch: x86_64 %{power64} aarch64 s390x
26ba25
26ba25
902636
Source0: http://wiki.qemu.org/download/qemu-4.2.0.tar.xz
26ba25
26ba25
# KSM control scripts
26ba25
Source4: ksm.service
26ba25
Source5: ksm.sysconfig
26ba25
Source6: ksmctl.c
26ba25
Source7: ksmtuned.service
26ba25
Source8: ksmtuned
26ba25
Source9: ksmtuned.conf
26ba25
Source10: qemu-guest-agent.service
26ba25
Source11: 99-qemu-guest-agent.rules
26ba25
Source12: bridge.conf
26ba25
Source13: qemu-ga.sysconfig
26ba25
Source21: kvm-setup
26ba25
Source22: kvm-setup.service
26ba25
Source23: 85-kvm.preset
26ba25
Source26: vhost.conf
26ba25
Source27: kvm.conf
26ba25
Source28: 95-kvm-memlock.conf
26ba25
Source30: kvm-s390x.conf
26ba25
Source31: kvm-x86.conf
26ba25
Source32: qemu-pr-helper.service
26ba25
Source33: qemu-pr-helper.socket
26ba25
Source34: 81-kvm-rhel.rules
26ba25
Source35: udev-kvm-check.c
26ba25
Source36: README.tests
26ba25
26ba25
902636
Patch0005: 0005-Initial-redhat-build.patch
902636
Patch0006: 0006-Enable-disable-devices-for-RHEL.patch
902636
Patch0007: 0007-Machine-type-related-general-changes.patch
902636
Patch0008: 0008-Add-aarch64-machine-types.patch
902636
Patch0009: 0009-Add-ppc64-machine-types.patch
902636
Patch0010: 0010-Add-s390x-machine-types.patch
902636
Patch0011: 0011-Add-x86_64-machine-types.patch
902636
Patch0012: 0012-Enable-make-check.patch
902636
Patch0013: 0013-vfio-cap-number-of-devices-that-can-be-assigned.patch
902636
Patch0014: 0014-Add-support-statement-to-help-output.patch
902636
Patch0015: 0015-globally-limit-the-maximum-number-of-CPUs.patch
902636
Patch0016: 0016-Add-support-for-simpletrace.patch
902636
Patch0017: 0017-Use-qemu-kvm-in-documentation-instead-of-qemu-system.patch
902636
Patch0018: 0018-usb-xhci-Fix-PCI-capability-order.patch
902636
Patch0019: 0019-virtio-scsi-Reject-scsi-cd-if-data-plane-enabled-RHE.patch
902636
Patch0020: 0020-BZ1653590-Require-at-least-64kiB-pages-for-downstrea.patch
902636
Patch0021: 0021-Using-ip_deq-after-m_free-might-read-pointers-from-a.patch
902636
# For bz#1741345 - Remove the "cpu64-rhel6" CPU from qemu-kvm
902636
Patch22: kvm-i386-Remove-cpu64-rhel6-CPU-model.patch
902636
# For bz#1772774 - qemu-kvm core dump during migration+reboot ( Assertion `mem->dirty_bmap' failed )
902636
Patch23: kvm-Reallocate-dirty_bmap-when-we-change-a-slot.patch
902636
# For bz#1733893 - Boot a guest with "-prom-env 'auto-boot?=false'", SLOF failed to enter the boot entry after input "boot" followed by "0 > " on VNC
902636
Patch24: kvm-spapr-Don-t-trigger-a-CAS-reboot-for-XICS-XIVE-mode-.patch
902636
# For bz#1782678 - qemu core dump after hot-unplugging the   XXV710/XL710 PF
902636
Patch25: kvm-vfio-pci-Don-t-remove-irqchip-notifier-if-not-regist.patch
902636
# For bz#1789301 - virtio-blk/scsi: fix notification suppression during AioContext polling
902636
Patch26: kvm-virtio-don-t-enable-notifications-during-polling.patch
902636
# For bz#1790844 - USB related fixes
902636
Patch27: kvm-usbredir-Prevent-recursion-in-usbredir_write.patch
902636
# For bz#1790844 - USB related fixes
902636
Patch28: kvm-xhci-recheck-slot-status.patch
902636
# For bz#1791568 - CVE-2020-7039 qemu-kvm: QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() [rhel-av-8.2.0]
902636
Patch29: kvm-tcp_emu-Fix-oob-access.patch
902636
# For bz#1791568 - CVE-2020-7039 qemu-kvm: QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() [rhel-av-8.2.0]
902636
Patch30: kvm-slirp-use-correct-size-while-emulating-IRC-commands.patch
902636
# For bz#1791568 - CVE-2020-7039 qemu-kvm: QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() [rhel-av-8.2.0]
902636
Patch31: kvm-slirp-use-correct-size-while-emulating-commands.patch
902636
# For bz#1559846 - Nested KVM: limit VMX features according to CPU models - Fast Train
902636
Patch32: kvm-RHEL-hw-i386-disable-nested-PERF_GLOBAL_CTRL-MSR-sup.patch
902636
# For bz#1725084 - aarch64: support dumping SVE registers
902636
Patch33: kvm-target-arm-arch_dump-Add-SVE-notes.patch
902636
# For bz#1779041 - netkvm: no connectivity Windows guest with q35 + hugepages + vhost + hv_synic
902636
Patch34: kvm-vhost-Add-names-to-section-rounded-warning.patch
902636
# For bz#1779041 - netkvm: no connectivity Windows guest with q35 + hugepages + vhost + hv_synic
902636
Patch35: kvm-vhost-Only-align-sections-for-vhost-user.patch
902636
# For bz#1779041 - netkvm: no connectivity Windows guest with q35 + hugepages + vhost + hv_synic
902636
Patch36: kvm-vhost-coding-style-fix.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch37: kvm-virtio-fs-fix-MSI-X-nvectors-calculation.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch38: kvm-vhost-user-fs-remove-vhostfd-property.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch39: kvm-build-rename-CONFIG_LIBCAP-to-CONFIG_LIBCAP_NG.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch40: kvm-virtiofsd-Pull-in-upstream-headers.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch41: kvm-virtiofsd-Pull-in-kernel-s-fuse.h.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch42: kvm-virtiofsd-Add-auxiliary-.c-s.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch43: kvm-virtiofsd-Add-fuse_lowlevel.c.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch44: kvm-virtiofsd-Add-passthrough_ll.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch45: kvm-virtiofsd-Trim-down-imported-files.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch46: kvm-virtiofsd-Format-imported-files-to-qemu-style.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch47: kvm-virtiofsd-remove-mountpoint-dummy-argument.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch48: kvm-virtiofsd-remove-unused-notify-reply-support.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch49: kvm-virtiofsd-Remove-unused-enum-fuse_buf_copy_flags.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch50: kvm-virtiofsd-Fix-fuse_daemonize-ignored-return-values.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch51: kvm-virtiofsd-Fix-common-header-and-define-for-QEMU-buil.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch52: kvm-virtiofsd-Trim-out-compatibility-code.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch53: kvm-vitriofsd-passthrough_ll-fix-fallocate-ifdefs.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch54: kvm-virtiofsd-Make-fsync-work-even-if-only-inode-is-pass.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch55: kvm-virtiofsd-Add-options-for-virtio.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch56: kvm-virtiofsd-add-o-source-PATH-to-help-output.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch57: kvm-virtiofsd-Open-vhost-connection-instead-of-mounting.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch58: kvm-virtiofsd-Start-wiring-up-vhost-user.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch59: kvm-virtiofsd-Add-main-virtio-loop.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch60: kvm-virtiofsd-get-set-features-callbacks.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch61: kvm-virtiofsd-Start-queue-threads.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch62: kvm-virtiofsd-Poll-kick_fd-for-queue.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch63: kvm-virtiofsd-Start-reading-commands-from-queue.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch64: kvm-virtiofsd-Send-replies-to-messages.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch65: kvm-virtiofsd-Keep-track-of-replies.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch66: kvm-virtiofsd-Add-Makefile-wiring-for-virtiofsd-contrib.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch67: kvm-virtiofsd-Fast-path-for-virtio-read.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch68: kvm-virtiofsd-add-fd-FDNUM-fd-passing-option.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch69: kvm-virtiofsd-make-f-foreground-the-default.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch70: kvm-virtiofsd-add-vhost-user.json-file.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch71: kvm-virtiofsd-add-print-capabilities-option.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch72: kvm-virtiofs-Add-maintainers-entry.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch73: kvm-virtiofsd-passthrough_ll-create-new-files-in-caller-.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch74: kvm-virtiofsd-passthrough_ll-add-lo_map-for-ino-fh-indir.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch75: kvm-virtiofsd-passthrough_ll-add-ino_map-to-hide-lo_inod.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch76: kvm-virtiofsd-passthrough_ll-add-dirp_map-to-hide-lo_dir.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch77: kvm-virtiofsd-passthrough_ll-add-fd_map-to-hide-file-des.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch78: kvm-virtiofsd-passthrough_ll-add-fallback-for-racy-ops.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch79: kvm-virtiofsd-validate-path-components.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch80: kvm-virtiofsd-Plumb-fuse_bufvec-through-to-do_write_buf.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch81: kvm-virtiofsd-Pass-write-iov-s-all-the-way-through.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch82: kvm-virtiofsd-add-fuse_mbuf_iter-API.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch83: kvm-virtiofsd-validate-input-buffer-sizes-in-do_write_bu.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch84: kvm-virtiofsd-check-input-buffer-size-in-fuse_lowlevel.c.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch85: kvm-virtiofsd-prevent-.-escape-in-lo_do_lookup.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch86: kvm-virtiofsd-prevent-.-escape-in-lo_do_readdir.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch87: kvm-virtiofsd-use-proc-self-fd-O_PATH-file-descriptor.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch88: kvm-virtiofsd-sandbox-mount-namespace.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch89: kvm-virtiofsd-move-to-an-empty-network-namespace.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch90: kvm-virtiofsd-move-to-a-new-pid-namespace.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch91: kvm-virtiofsd-add-seccomp-whitelist.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch92: kvm-virtiofsd-Parse-flag-FUSE_WRITE_KILL_PRIV.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch93: kvm-virtiofsd-cap-ng-helpers.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch94: kvm-virtiofsd-Drop-CAP_FSETID-if-client-asked-for-it.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch95: kvm-virtiofsd-set-maximum-RLIMIT_NOFILE-limit.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch96: kvm-virtiofsd-fix-libfuse-information-leaks.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch97: kvm-virtiofsd-add-syslog-command-line-option.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch98: kvm-virtiofsd-print-log-only-when-priority-is-high-enoug.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch99: kvm-virtiofsd-Add-ID-to-the-log-with-FUSE_LOG_DEBUG-leve.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch100: kvm-virtiofsd-Add-timestamp-to-the-log-with-FUSE_LOG_DEB.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch101: kvm-virtiofsd-Handle-reinit.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch102: kvm-virtiofsd-Handle-hard-reboot.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch103: kvm-virtiofsd-Kill-threads-when-queues-are-stopped.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch104: kvm-vhost-user-Print-unexpected-slave-message-types.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch105: kvm-contrib-libvhost-user-Protect-slave-fd-with-mutex.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch106: kvm-virtiofsd-passthrough_ll-add-renameat2-support.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch107: kvm-virtiofsd-passthrough_ll-disable-readdirplus-on-cach.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch108: kvm-virtiofsd-passthrough_ll-control-readdirplus.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch109: kvm-virtiofsd-rename-unref_inode-to-unref_inode_lolocked.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch110: kvm-virtiofsd-fail-when-parent-inode-isn-t-known-in-lo_d.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch111: kvm-virtiofsd-extract-root-inode-init-into-setup_root.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch112: kvm-virtiofsd-passthrough_ll-clean-up-cache-related-opti.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch113: kvm-virtiofsd-passthrough_ll-use-hashtable.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch114: kvm-virtiofsd-Clean-up-inodes-on-destroy.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch115: kvm-virtiofsd-support-nanosecond-resolution-for-file-tim.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch116: kvm-virtiofsd-fix-error-handling-in-main.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch117: kvm-virtiofsd-cleanup-allocated-resource-in-se.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch118: kvm-virtiofsd-fix-memory-leak-on-lo.source.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch119: kvm-virtiofsd-add-helper-for-lo_data-cleanup.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch120: kvm-virtiofsd-Prevent-multiply-running-with-same-vhost_u.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch121: kvm-virtiofsd-enable-PARALLEL_DIROPS-during-INIT.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch122: kvm-virtiofsd-fix-incorrect-error-handling-in-lo_do_look.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch123: kvm-Virtiofsd-fix-memory-leak-on-fuse-queueinfo.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch124: kvm-virtiofsd-Support-remote-posix-locks.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch125: kvm-virtiofsd-use-fuse_lowlevel_is_virtio-in-fuse_sessio.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch126: kvm-virtiofsd-prevent-fv_queue_thread-vs-virtio_loop-rac.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch127: kvm-virtiofsd-make-lo_release-atomic.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch128: kvm-virtiofsd-prevent-races-with-lo_dirp_put.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch129: kvm-virtiofsd-rename-inode-refcount-to-inode-nlookup.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch130: kvm-libvhost-user-Fix-some-memtable-remap-cases.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch131: kvm-virtiofsd-passthrough_ll-fix-refcounting-on-remove-r.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch132: kvm-virtiofsd-introduce-inode-refcount-to-prevent-use-af.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch133: kvm-virtiofsd-do-not-always-set-FUSE_FLOCK_LOCKS.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch134: kvm-virtiofsd-convert-more-fprintf-and-perror-to-use-fus.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch135: kvm-virtiofsd-Reset-O_DIRECT-flag-during-file-open.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch136: kvm-virtiofsd-Fix-data-corruption-with-O_APPEND-write-in.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch137: kvm-virtiofsd-passthrough_ll-Use-cache_readdir-for-direc.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch138: kvm-virtiofsd-add-definition-of-fuse_buf_writev.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch139: kvm-virtiofsd-use-fuse_buf_writev-to-replace-fuse_buf_wr.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch140: kvm-virtiofsd-process-requests-in-a-thread-pool.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch141: kvm-virtiofsd-prevent-FUSE_INIT-FUSE_DESTROY-races.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch142: kvm-virtiofsd-fix-lo_destroy-resource-leaks.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch143: kvm-virtiofsd-add-thread-pool-size-NUM-option.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch144: kvm-virtiofsd-Convert-lo_destroy-to-take-the-lo-mutex-lo.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch145: kvm-virtiofsd-passthrough_ll-Pass-errno-to-fuse_reply_er.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch146: kvm-virtiofsd-stop-all-queue-threads-on-exit-in-virtio_l.patch
902636
# For bz#1694164 - virtio-fs: host<->guest shared file system (qemu)
902636
Patch147: kvm-virtiofsd-add-some-options-to-the-help-message.patch
902636
# For bz#1776638 - Guest failed to boot up after system_reset  20 times
902636
Patch148: kvm-ppc-Deassert-the-external-interrupt-pin-in-KVM-on-re.patch
902636
# For bz#1776638 - Guest failed to boot up after system_reset  20 times
902636
Patch149: kvm-xics-Don-t-deassert-outputs.patch
902636
# For bz#1776638 - Guest failed to boot up after system_reset  20 times
902636
Patch150: kvm-ppc-Don-t-use-CPUPPCState-irq_input_state-with-moder.patch
902636
# For bz#1787395 - qemu-trace-stap list : TypeError: startswith first arg must be bytes or a tuple of bytes, not str
902636
Patch151: kvm-trace-update-qemu-trace-stap-to-Python-3.patch
902636
# For bz#1794503 - CVE-2020-1711 qemu-kvm: QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server [rhel-av-8.2.0]
902636
Patch153: kvm-iscsi-Cap-block-count-from-GET-LBA-STATUS-CVE-2020-1.patch
902636
# For bz#1787444 - Broken postcopy migration with vTPM device
902636
Patch154: kvm-tpm-ppi-page-align-PPI-RAM.patch
902636
# For bz#1647366 - aarch64: Add support for the kvm-no-adjvtime ARM CPU feature
902636
Patch155: kvm-target-arm-kvm-trivial-Clean-up-header-documentation.patch
902636
# For bz#1647366 - aarch64: Add support for the kvm-no-adjvtime ARM CPU feature
902636
Patch156: kvm-target-arm-kvm64-kvm64-cpus-have-timer-registers.patch
902636
# For bz#1647366 - aarch64: Add support for the kvm-no-adjvtime ARM CPU feature
902636
Patch157: kvm-tests-arm-cpu-features-Check-feature-default-values.patch
902636
# For bz#1647366 - aarch64: Add support for the kvm-no-adjvtime ARM CPU feature
902636
Patch158: kvm-target-arm-kvm-Implement-virtual-time-adjustment.patch
902636
# For bz#1647366 - aarch64: Add support for the kvm-no-adjvtime ARM CPU feature
902636
Patch159: kvm-target-arm-cpu-Add-the-kvm-no-adjvtime-CPU-property.patch
902636
# For bz#1529231 - [q35] VM hangs after migration with 200 vCPUs
902636
Patch160: kvm-migration-Define-VMSTATE_INSTANCE_ID_ANY.patch
902636
# For bz#1529231 - [q35] VM hangs after migration with 200 vCPUs
902636
Patch161: kvm-migration-Change-SaveStateEntry.instance_id-into-uin.patch
902636
# For bz#1529231 - [q35] VM hangs after migration with 200 vCPUs
902636
Patch162: kvm-apic-Use-32bit-APIC-ID-for-migration-instance-ID.patch
902636
# For bz#1779078 - RHVH 4.4: Failed to run VM on 4.3/4.4 engine (Exit message: the CPU is incompatible with host CPU: Host CPU does not provide required features: hle, rtm)
902636
# For bz#1787291 - RHVH 4.4: Failed to run VM on 4.3/4.4 engine (Exit message: the CPU is incompatible with host CPU: Host CPU does not provide required features: hle, rtm) [rhel-8.1.0.z]
902636
# For bz#1779078 - RHVH 4.4: Failed to run VM on 4.3/4.4 engine (Exit message: the CPU is incompatible with host CPU: Host CPU does not provide required features: hle, rtm)
902636
# For bz#1779078 - RHVH 4.4: Failed to run VM on 4.3/4.4 engine (Exit message: the CPU is incompatible with host CPU: Host CPU does not provide required features: hle, rtm)
902636
Patch163: kvm-i386-Resolve-CPU-models-to-v1-by-default.patch
902636
# For bz#1781637 - qemu crashed when do mem and disk snapshot
902636
Patch164: kvm-iotests-Support-job-complete-in-run_job.patch
902636
# For bz#1781637 - qemu crashed when do mem and disk snapshot
902636
Patch165: kvm-iotests-Create-VM.blockdev_create.patch
902636
# For bz#1781637 - qemu crashed when do mem and disk snapshot
902636
Patch166: kvm-block-Activate-recursively-even-for-already-active-n.patch
902636
# For bz#1781637 - qemu crashed when do mem and disk snapshot
902636
Patch167: kvm-hmp-Allow-using-qdev-ID-for-qemu-io-command.patch
902636
# For bz#1781637 - qemu crashed when do mem and disk snapshot
902636
Patch168: kvm-iotests-Test-external-snapshot-with-VM-state.patch
902636
# For bz#1781637 - qemu crashed when do mem and disk snapshot
902636
Patch169: kvm-iotests.py-Let-wait_migration-wait-even-more.patch
902636
# For bz#1745606 - Qemu hang when do incremental live backup in transaction mode without bitmap
902636
# For bz#1746217 - Src qemu hang when do storage vm migration during guest installation
902636
# For bz#1773517 - Src qemu hang when do storage vm migration with dataplane enable
902636
# For bz#1779036 - Qemu coredump when do snapshot in transaction mode with one snapshot path not exist
902636
# For bz#1782111 - Qemu hang when do full backup on multi-disks with one job's 'job-id' missed in transaction mode(data plane enable)
902636
# For bz#1782175 - Qemu core dump when add persistent bitmap(data plane enable)
902636
# For bz#1783965 - Qemu core dump when do backup with sync: bitmap and no bitmap provided
902636
Patch170: kvm-blockdev-fix-coding-style-issues-in-drive_backup_pre.patch
902636
# For bz#1745606 - Qemu hang when do incremental live backup in transaction mode without bitmap
902636
# For bz#1746217 - Src qemu hang when do storage vm migration during guest installation
902636
# For bz#1773517 - Src qemu hang when do storage vm migration with dataplane enable
902636
# For bz#1779036 - Qemu coredump when do snapshot in transaction mode with one snapshot path not exist
902636
# For bz#1782111 - Qemu hang when do full backup on multi-disks with one job's 'job-id' missed in transaction mode(data plane enable)
902636
# For bz#1782175 - Qemu core dump when add persistent bitmap(data plane enable)
902636
# For bz#1783965 - Qemu core dump when do backup with sync: bitmap and no bitmap provided
902636
Patch171: kvm-blockdev-unify-qmp_drive_backup-and-drive-backup-tra.patch
902636
# For bz#1745606 - Qemu hang when do incremental live backup in transaction mode without bitmap
902636
# For bz#1746217 - Src qemu hang when do storage vm migration during guest installation
902636
# For bz#1773517 - Src qemu hang when do storage vm migration with dataplane enable
902636
# For bz#1779036 - Qemu coredump when do snapshot in transaction mode with one snapshot path not exist
902636
# For bz#1782111 - Qemu hang when do full backup on multi-disks with one job's 'job-id' missed in transaction mode(data plane enable)
902636
# For bz#1782175 - Qemu core dump when add persistent bitmap(data plane enable)
902636
# For bz#1783965 - Qemu core dump when do backup with sync: bitmap and no bitmap provided
902636
Patch172: kvm-blockdev-unify-qmp_blockdev_backup-and-blockdev-back.patch
902636
# For bz#1745606 - Qemu hang when do incremental live backup in transaction mode without bitmap
902636
# For bz#1746217 - Src qemu hang when do storage vm migration during guest installation
902636
# For bz#1773517 - Src qemu hang when do storage vm migration with dataplane enable
902636
# For bz#1779036 - Qemu coredump when do snapshot in transaction mode with one snapshot path not exist
902636
# For bz#1782111 - Qemu hang when do full backup on multi-disks with one job's 'job-id' missed in transaction mode(data plane enable)
902636
# For bz#1782175 - Qemu core dump when add persistent bitmap(data plane enable)
902636
# For bz#1783965 - Qemu core dump when do backup with sync: bitmap and no bitmap provided
902636
Patch173: kvm-blockdev-honor-bdrv_try_set_aio_context-context-requ.patch
902636
# For bz#1745606 - Qemu hang when do incremental live backup in transaction mode without bitmap
902636
# For bz#1746217 - Src qemu hang when do storage vm migration during guest installation
902636
# For bz#1773517 - Src qemu hang when do storage vm migration with dataplane enable
902636
# For bz#1779036 - Qemu coredump when do snapshot in transaction mode with one snapshot path not exist
902636
# For bz#1782111 - Qemu hang when do full backup on multi-disks with one job's 'job-id' missed in transaction mode(data plane enable)
902636
# For bz#1782175 - Qemu core dump when add persistent bitmap(data plane enable)
902636
# For bz#1783965 - Qemu core dump when do backup with sync: bitmap and no bitmap provided
902636
Patch174: kvm-backup-top-Begin-drain-earlier.patch
902636
# For bz#1745606 - Qemu hang when do incremental live backup in transaction mode without bitmap
902636
# For bz#1746217 - Src qemu hang when do storage vm migration during guest installation
902636
# For bz#1773517 - Src qemu hang when do storage vm migration with dataplane enable
902636
# For bz#1779036 - Qemu coredump when do snapshot in transaction mode with one snapshot path not exist
902636
# For bz#1782111 - Qemu hang when do full backup on multi-disks with one job's 'job-id' missed in transaction mode(data plane enable)
902636
# For bz#1782175 - Qemu core dump when add persistent bitmap(data plane enable)
902636
# For bz#1783965 - Qemu core dump when do backup with sync: bitmap and no bitmap provided
902636
Patch175: kvm-block-backup-top-Don-t-acquire-context-while-droppin.patch
902636
# For bz#1745606 - Qemu hang when do incremental live backup in transaction mode without bitmap
902636
# For bz#1746217 - Src qemu hang when do storage vm migration during guest installation
902636
# For bz#1773517 - Src qemu hang when do storage vm migration with dataplane enable
902636
# For bz#1779036 - Qemu coredump when do snapshot in transaction mode with one snapshot path not exist
902636
# For bz#1782111 - Qemu hang when do full backup on multi-disks with one job's 'job-id' missed in transaction mode(data plane enable)
902636
# For bz#1782175 - Qemu core dump when add persistent bitmap(data plane enable)
902636
# For bz#1783965 - Qemu core dump when do backup with sync: bitmap and no bitmap provided
902636
Patch176: kvm-blockdev-Acquire-AioContext-on-dirty-bitmap-function.patch
902636
# For bz#1745606 - Qemu hang when do incremental live backup in transaction mode without bitmap
902636
# For bz#1746217 - Src qemu hang when do storage vm migration during guest installation
902636
# For bz#1773517 - Src qemu hang when do storage vm migration with dataplane enable
902636
# For bz#1779036 - Qemu coredump when do snapshot in transaction mode with one snapshot path not exist
902636
# For bz#1782111 - Qemu hang when do full backup on multi-disks with one job's 'job-id' missed in transaction mode(data plane enable)
902636
# For bz#1782175 - Qemu core dump when add persistent bitmap(data plane enable)
902636
# For bz#1783965 - Qemu core dump when do backup with sync: bitmap and no bitmap provided
902636
Patch177: kvm-blockdev-Return-bs-to-the-proper-context-on-snapshot.patch
902636
# For bz#1745606 - Qemu hang when do incremental live backup in transaction mode without bitmap
902636
# For bz#1746217 - Src qemu hang when do storage vm migration during guest installation
902636
# For bz#1773517 - Src qemu hang when do storage vm migration with dataplane enable
902636
# For bz#1779036 - Qemu coredump when do snapshot in transaction mode with one snapshot path not exist
902636
# For bz#1782111 - Qemu hang when do full backup on multi-disks with one job's 'job-id' missed in transaction mode(data plane enable)
902636
# For bz#1782175 - Qemu core dump when add persistent bitmap(data plane enable)
902636
# For bz#1783965 - Qemu core dump when do backup with sync: bitmap and no bitmap provided
902636
Patch178: kvm-iotests-Test-handling-of-AioContexts-with-some-block.patch
902636
# For bz#1801320 - aarch64: backport query-cpu-model-expansion and adjvtime document fixes
902636
Patch179: kvm-target-arm-monitor-query-cpu-model-expansion-crashed.patch
902636
# For bz#1801320 - aarch64: backport query-cpu-model-expansion and adjvtime document fixes
902636
Patch180: kvm-docs-arm-cpu-features-Make-kvm-no-adjvtime-comment-c.patch
902636
# For bz#1796240 - Enable hw accelerated cache-count-flush by default for POWER9 DD2.3 cpus
902636
Patch181: kvm-spapr-Enable-DD2.3-accelerated-count-cache-flush-in-.patch
902636
# For bz#1798994 - CVE-2020-8608 qemu-kvm: QEMU: Slirp: potential OOB access due to unsafe snprintf() usages [rhel-av-8.2.0]
902636
Patch182: kvm-util-add-slirp_fmt-helpers.patch
902636
# For bz#1798994 - CVE-2020-8608 qemu-kvm: QEMU: Slirp: potential OOB access due to unsafe snprintf() usages [rhel-av-8.2.0]
902636
Patch183: kvm-tcp_emu-fix-unsafe-snprintf-usages.patch
902636
# For bz#1791590 - [Q35] No "DEVICE_DELETED" event in qmp after unplug virtio-net-pci device
902636
Patch184: kvm-virtio-add-ability-to-delete-vq-through-a-pointer.patch
902636
# For bz#1791590 - [Q35] No "DEVICE_DELETED" event in qmp after unplug virtio-net-pci device
902636
Patch185: kvm-virtio-make-virtio_delete_queue-idempotent.patch
902636
# For bz#1791590 - [Q35] No "DEVICE_DELETED" event in qmp after unplug virtio-net-pci device
902636
Patch186: kvm-virtio-reset-region-cache-when-on-queue-deletion.patch
902636
# For bz#1791590 - [Q35] No "DEVICE_DELETED" event in qmp after unplug virtio-net-pci device
902636
Patch187: kvm-virtio-net-delete-also-control-queue-when-TX-RX-dele.patch
902636
# For bz#1805334 - vhost-user/50-qemu-gpu.json is not valid JSON
902636
Patch188: kvm-vhost-user-gpu-Drop-trailing-json-comma.patch
902636
# For bz#1791648 - [RFE] Passthrough host CPU microcode version to KVM guest if using CPU passthrough
902636
Patch189: kvm-target-i386-kvm-initialize-feature-MSRs-very-early.patch
902636
# For bz#1791648 - [RFE] Passthrough host CPU microcode version to KVM guest if using CPU passthrough
902636
Patch190: kvm-target-i386-add-a-ucode-rev-property.patch
902636
# For bz#1791648 - [RFE] Passthrough host CPU microcode version to KVM guest if using CPU passthrough
902636
Patch191: kvm-target-i386-kvm-initialize-microcode-revision-from-K.patch
902636
# For bz#1791648 - [RFE] Passthrough host CPU microcode version to KVM guest if using CPU passthrough
902636
Patch192: kvm-target-i386-fix-TCG-UCODE_REV-access.patch
902636
# For bz#1791648 - [RFE] Passthrough host CPU microcode version to KVM guest if using CPU passthrough
902636
Patch193: kvm-target-i386-check-for-availability-of-MSR_IA32_UCODE.patch
902636
# For bz#1791648 - [RFE] Passthrough host CPU microcode version to KVM guest if using CPU passthrough
902636
Patch194: kvm-target-i386-enable-monitor-and-ucode-revision-with-c.patch
902636
# For bz#1703907 - [upstream]QEMU coredump when converting to qcow2: external data file images on block devices with copy_offloading
902636
Patch195: kvm-qcow2-Fix-qcow2_alloc_cluster_abort-for-external-dat.patch
902636
# For bz#1794692 - Mirror block job stops making progress
902636
Patch196: kvm-mirror-Store-MirrorOp.co-for-debuggability.patch
902636
# For bz#1794692 - Mirror block job stops making progress
902636
Patch197: kvm-mirror-Don-t-let-an-operation-wait-for-itself.patch
902636
# For bz#1782529 - Windows Update Enablement with default smbios strings in qemu
902636
Patch198: kvm-hw-smbios-set-new-default-SMBIOS-fields-for-Windows-.patch
902636
# For bz#1738451 - qemu on src host core dump after set multifd-channels and do migration twice (first migration execute migrate_cancel)
902636
Patch199: kvm-migration-multifd-clean-pages-after-filling-packet.patch
902636
# For bz#1738451 - qemu on src host core dump after set multifd-channels and do migration twice (first migration execute migrate_cancel)
902636
Patch200: kvm-migration-Make-sure-that-we-don-t-call-write-in-case.patch
902636
# For bz#1738451 - qemu on src host core dump after set multifd-channels and do migration twice (first migration execute migrate_cancel)
902636
Patch201: kvm-migration-multifd-fix-nullptr-access-in-terminating-.patch
902636
# For bz#1738451 - qemu on src host core dump after set multifd-channels and do migration twice (first migration execute migrate_cancel)
902636
Patch202: kvm-migration-multifd-fix-destroyed-mutex-access-in-term.patch
902636
# For bz#1738451 - qemu on src host core dump after set multifd-channels and do migration twice (first migration execute migrate_cancel)
902636
Patch203: kvm-multifd-Make-sure-that-we-don-t-do-any-IO-after-an-e.patch
902636
# For bz#1738451 - qemu on src host core dump after set multifd-channels and do migration twice (first migration execute migrate_cancel)
902636
Patch204: kvm-qemu-file-Don-t-do-IO-after-shutdown.patch
902636
# For bz#1738451 - qemu on src host core dump after set multifd-channels and do migration twice (first migration execute migrate_cancel)
902636
Patch205: kvm-migration-Don-t-send-data-if-we-have-stopped.patch
902636
# For bz#1738451 - qemu on src host core dump after set multifd-channels and do migration twice (first migration execute migrate_cancel)
902636
Patch206: kvm-migration-Create-migration_is_running.patch
902636
# For bz#1738451 - qemu on src host core dump after set multifd-channels and do migration twice (first migration execute migrate_cancel)
902636
Patch207: kvm-migration-multifd-fix-nullptr-access-in-multifd_send.patch
902636
# For bz#1738451 - qemu on src host core dump after set multifd-channels and do migration twice (first migration execute migrate_cancel)
902636
Patch208: kvm-migration-Maybe-VM-is-paused-when-migration-is-cance.patch
902636
# For bz#1797064 - virtiofsd: Fixes
902636
Patch209: kvm-virtiofsd-Remove-fuse_req_getgroups.patch
902636
# For bz#1797064 - virtiofsd: Fixes
902636
Patch210: kvm-virtiofsd-fv_create_listen_socket-error-path-socket-.patch
902636
# For bz#1797064 - virtiofsd: Fixes
902636
Patch211: kvm-virtiofsd-load_capng-missing-unlock.patch
902636
# For bz#1797064 - virtiofsd: Fixes
902636
Patch212: kvm-virtiofsd-do_read-missing-NULL-check.patch
902636
# For bz#1797064 - virtiofsd: Fixes
902636
Patch213: kvm-tools-virtiofsd-fuse_lowlevel-Fix-fuse_out_header-er.patch
902636
# For bz#1797064 - virtiofsd: Fixes
902636
Patch214: kvm-virtiofsd-passthrough_ll-cleanup-getxattr-listxattr.patch
902636
# For bz#1797064 - virtiofsd: Fixes
902636
Patch215: kvm-virtiofsd-Fix-xattr-operations.patch
902636
# For bz#1640894 - Fix generic file creation fallback for qemu-img nvme:// image creation support
902636
Patch216: kvm-block-nbd-Fix-hang-in-.bdrv_close.patch
902636
# For bz#1640894 - Fix generic file creation fallback for qemu-img nvme:// image creation support
902636
Patch217: kvm-block-Generic-file-creation-fallback.patch
902636
# For bz#1640894 - Fix generic file creation fallback for qemu-img nvme:// image creation support
902636
Patch218: kvm-file-posix-Drop-hdev_co_create_opts.patch
902636
# For bz#1640894 - Fix generic file creation fallback for qemu-img nvme:// image creation support
902636
Patch219: kvm-iscsi-Drop-iscsi_co_create_opts.patch
902636
# For bz#1640894 - Fix generic file creation fallback for qemu-img nvme:// image creation support
902636
Patch220: kvm-iotests-Add-test-for-image-creation-fallback.patch
902636
# For bz#1640894 - Fix generic file creation fallback for qemu-img nvme:// image creation support
902636
Patch221: kvm-block-Fix-leak-in-bdrv_create_file_fallback.patch
902636
# For bz#1790482 - bitmaps in backing images can't be modified
902636
# For bz#1805143 - allow late/lazy opening of backing chain for shallow blockdev-mirror
902636
Patch222: kvm-iotests-Use-complete_and_wait-in-155.patch
902636
# For bz#1790482 - bitmaps in backing images can't be modified
902636
# For bz#1805143 - allow late/lazy opening of backing chain for shallow blockdev-mirror
902636
Patch223: kvm-block-Introduce-bdrv_reopen_commit_post-step.patch
902636
# For bz#1790482 - bitmaps in backing images can't be modified
902636
# For bz#1805143 - allow late/lazy opening of backing chain for shallow blockdev-mirror
902636
Patch224: kvm-block-qcow2-Move-bitmap-reopen-into-bdrv_reopen_comm.patch
902636
# For bz#1790482 - bitmaps in backing images can't be modified
902636
# For bz#1805143 - allow late/lazy opening of backing chain for shallow blockdev-mirror
902636
Patch225: kvm-iotests-Refactor-blockdev-reopen-test-for-iothreads.patch
902636
# For bz#1790482 - bitmaps in backing images can't be modified
902636
# For bz#1805143 - allow late/lazy opening of backing chain for shallow blockdev-mirror
902636
Patch226: kvm-block-bdrv_reopen-with-backing-file-in-different-Aio.patch
902636
# For bz#1790482 - bitmaps in backing images can't be modified
902636
# For bz#1805143 - allow late/lazy opening of backing chain for shallow blockdev-mirror
902636
Patch227: kvm-block-Versioned-x-blockdev-reopen-API-with-feature-f.patch
902636
# For bz#1790482 - bitmaps in backing images can't be modified
902636
# For bz#1805143 - allow late/lazy opening of backing chain for shallow blockdev-mirror
902636
Patch228: kvm-block-Make-bdrv_get_cumulative_perm-public.patch
902636
# For bz#1790482 - bitmaps in backing images can't be modified
902636
# For bz#1805143 - allow late/lazy opening of backing chain for shallow blockdev-mirror
902636
Patch229: kvm-block-Relax-restrictions-for-blockdev-snapshot.patch
902636
# For bz#1790482 - bitmaps in backing images can't be modified
902636
# For bz#1805143 - allow late/lazy opening of backing chain for shallow blockdev-mirror
902636
Patch230: kvm-iotests-Fix-run_job-with-use_log-False.patch
902636
# For bz#1790482 - bitmaps in backing images can't be modified
902636
# For bz#1805143 - allow late/lazy opening of backing chain for shallow blockdev-mirror
902636
Patch231: kvm-iotests-Test-mirror-with-temporarily-disabled-target.patch
902636
# For bz#1790482 - bitmaps in backing images can't be modified
902636
# For bz#1805143 - allow late/lazy opening of backing chain for shallow blockdev-mirror
902636
Patch232: kvm-block-Fix-cross-AioContext-blockdev-snapshot.patch
902636
# For bz#1790482 - bitmaps in backing images can't be modified
902636
# For bz#1805143 - allow late/lazy opening of backing chain for shallow blockdev-mirror
902636
Patch233: kvm-iotests-Add-iothread-cases-to-155.patch
902636
# For bz#1790482 - bitmaps in backing images can't be modified
902636
# For bz#1805143 - allow late/lazy opening of backing chain for shallow blockdev-mirror
902636
Patch234: kvm-qapi-Add-allow-write-only-overlay-feature-for-blockd.patch
902636
# For bz#1809380 - guest hang during reboot process after migration from RHEl7.8 to RHEL8.2.0.
902636
Patch235: kvm-exec-rom_reset-Free-rom-data-during-inmigrate-skip.patch
902636
# For bz#1814336 - [POWER9] QEMU migration-test triggers a kernel warning
902636
Patch236: kvm-migration-Rate-limit-inside-host-pages.patch
902636
# For bz#1811670 - Unneeded qemu-guest-agent dependency on pixman
902636
Patch237: kvm-build-sys-do-not-make-qemu-ga-link-with-pixman.patch
902636
# For bz#1816007 - qemu-img convert failed to convert with block device as target
902636
Patch238: kvm-block-pass-BlockDriver-reference-to-the-.bdrv_co_cre.patch
902636
# For bz#1816007 - qemu-img convert failed to convert with block device as target
902636
Patch239: kvm-block-trickle-down-the-fallback-image-creation-funct.patch
902636
# For bz#1794692 - Mirror block job stops making progress
902636
Patch240: kvm-Revert-mirror-Don-t-let-an-operation-wait-for-itself.patch
902636
# For bz#1794692 - Mirror block job stops making progress
902636
Patch241: kvm-mirror-Wait-only-for-in-flight-operations.patch
902636
# For bz#1817621 - Crash and deadlock with block jobs when using io-threads
902636
Patch242: kvm-job-take-each-job-s-lock-individually-in-job_txn_app.patch
902636
# For bz#1817621 - Crash and deadlock with block jobs when using io-threads
902636
Patch243: kvm-replication-assert-we-own-context-before-job_cancel_.patch
902636
# For bz#1817621 - Crash and deadlock with block jobs when using io-threads
902636
Patch244: kvm-backup-don-t-acquire-aio_context-in-backup_clean.patch
902636
# For bz#1817621 - Crash and deadlock with block jobs when using io-threads
902636
Patch245: kvm-block-backend-Reorder-flush-pdiscard-function-defini.patch
902636
# For bz#1817621 - Crash and deadlock with block jobs when using io-threads
902636
Patch246: kvm-block-Increase-BB.in_flight-for-coroutine-and-sync-i.patch
902636
# For bz#1817621 - Crash and deadlock with block jobs when using io-threads
902636
Patch247: kvm-block-Fix-blk-in_flight-during-blk_wait_while_draine.patch
902636
# For bz#1822682 - QEMU-4.2 fails to start a VM on Azure
902636
Patch248: kvm-target-i386-do-not-set-unsupported-VMX-secondary-exe.patch
902636
# For bz#1790899 - [RFE] QEMU devices should have the option to enable/disable hotplug/unplug
902636
Patch249: kvm-pcie_root_port-Add-hotplug-disabling-option.patch
902636
# For bz#1816793 - 'edid' compat handling missing for virtio-gpu-ccw
902636
Patch250: kvm-compat-disable-edid-for-virtio-gpu-ccw.patch
902636
# For bz#1820531 - qmp command query-pci get wrong result after hotplug device under hotplug=off controller
902636
Patch251: kvm-hw-pci-pcie-Forbid-hot-plug-if-it-s-disabled-on-the-.patch
902636
# For bz#1820531 - qmp command query-pci get wrong result after hotplug device under hotplug=off controller
902636
Patch252: kvm-hw-pci-pcie-Replace-PCI_DEVICE-casts-with-existing-v.patch
902636
# For bz#1817445 - CVE-2020-10717 virt:8.2/qemu-kvm: QEMU: virtiofsd: guest may open maximum file descriptor to cause DoS [rhel-av-8]
902636
Patch253: kvm-tools-virtiofsd-passthrough_ll-Fix-double-close.patch
902636
# For bz#1817445 - CVE-2020-10717 virt:8.2/qemu-kvm: QEMU: virtiofsd: guest may open maximum file descriptor to cause DoS [rhel-av-8]
902636
Patch254: kvm-virtiofsd-add-rlimit-nofile-NUM-option.patch
902636
# For bz#1817445 - CVE-2020-10717 virt:8.2/qemu-kvm: QEMU: virtiofsd: guest may open maximum file descriptor to cause DoS [rhel-av-8]
902636
Patch255: kvm-virtiofsd-stay-below-fs.file-max-sysctl-value-CVE-20.patch
902636
# For bz#1817445 - CVE-2020-10717 virt:8.2/qemu-kvm: QEMU: virtiofsd: guest may open maximum file descriptor to cause DoS [rhel-av-8]
902636
Patch256: kvm-virtiofsd-jail-lo-proc_self_fd.patch
902636
# For bz#1817445 - CVE-2020-10717 virt:8.2/qemu-kvm: QEMU: virtiofsd: guest may open maximum file descriptor to cause DoS [rhel-av-8]
902636
Patch257: kvm-virtiofsd-Show-submounts.patch
902636
# For bz#1817445 - CVE-2020-10717 virt:8.2/qemu-kvm: QEMU: virtiofsd: guest may open maximum file descriptor to cause DoS [rhel-av-8]
902636
Patch258: kvm-virtiofsd-only-retain-file-system-capabilities.patch
902636
# For bz#1817445 - CVE-2020-10717 virt:8.2/qemu-kvm: QEMU: virtiofsd: guest may open maximum file descriptor to cause DoS [rhel-av-8]
902636
Patch259: kvm-virtiofsd-drop-all-capabilities-in-the-wait-parent-p.patch
902636
# For bz#1775462 - Creating luks-inside-qcow2 images with cluster_size=2k/4k will get a corrupted image
902636
Patch260: kvm-block-always-fill-entire-LUKS-header-space-with-zero.patch
902636
# For bz#1600217 - [Intel 8.2.1 FEAT] KVM ACPI HMAT support - qemu-kvm  Fast Train
902636
Patch261: kvm-numa-remove-not-needed-check.patch
902636
# For bz#1600217 - [Intel 8.2.1 FEAT] KVM ACPI HMAT support - qemu-kvm  Fast Train
902636
Patch262: kvm-numa-properly-check-if-numa-is-supported.patch
902636
# For bz#1600217 - [Intel 8.2.1 FEAT] KVM ACPI HMAT support - qemu-kvm  Fast Train
902636
Patch263: kvm-numa-Extend-CLI-to-provide-initiator-information-for.patch
902636
# For bz#1600217 - [Intel 8.2.1 FEAT] KVM ACPI HMAT support - qemu-kvm  Fast Train
902636
Patch264: kvm-numa-Extend-CLI-to-provide-memory-latency-and-bandwi.patch
902636
# For bz#1600217 - [Intel 8.2.1 FEAT] KVM ACPI HMAT support - qemu-kvm  Fast Train
902636
Patch265: kvm-numa-Extend-CLI-to-provide-memory-side-cache-informa.patch
902636
# For bz#1600217 - [Intel 8.2.1 FEAT] KVM ACPI HMAT support - qemu-kvm  Fast Train
902636
Patch266: kvm-hmat-acpi-Build-Memory-Proximity-Domain-Attributes-S.patch
902636
# For bz#1600217 - [Intel 8.2.1 FEAT] KVM ACPI HMAT support - qemu-kvm  Fast Train
902636
Patch267: kvm-hmat-acpi-Build-System-Locality-Latency-and-Bandwidt.patch
902636
# For bz#1600217 - [Intel 8.2.1 FEAT] KVM ACPI HMAT support - qemu-kvm  Fast Train
902636
Patch268: kvm-hmat-acpi-Build-Memory-Side-Cache-Information-Struct.patch
902636
# For bz#1600217 - [Intel 8.2.1 FEAT] KVM ACPI HMAT support - qemu-kvm  Fast Train
902636
Patch269: kvm-tests-numa-Add-case-for-QMP-build-HMAT.patch
902636
# For bz#1600217 - [Intel 8.2.1 FEAT] KVM ACPI HMAT support - qemu-kvm  Fast Train
902636
Patch270: kvm-tests-bios-tables-test-add-test-cases-for-ACPI-HMAT.patch
902636
# For bz#1600217 - [Intel 8.2.1 FEAT] KVM ACPI HMAT support - qemu-kvm  Fast Train
902636
Patch271: kvm-ACPI-add-expected-files-for-HMAT-tests-acpihmat.patch
902636
# For bz#1813940 - CVE-2020-10702 virt:8.1/qemu-kvm: qemu: weak signature generation in Pointer Authentication support for ARM [rhel-av-8]
902636
Patch272: kvm-target-arm-Fix-PAuth-sbox-functions.patch
902636
# For bz#1749737 - CVE-2019-15890 qemu-kvm: QEMU: Slirp: use-after-free during packet reassembly [rhel-av-8]
902636
Patch273: kvm-Don-t-leak-memory-when-reallocation-fails.patch
902636
# For bz#1749737 - CVE-2019-15890 qemu-kvm: QEMU: Slirp: use-after-free during packet reassembly [rhel-av-8]
902636
Patch274: kvm-Replace-remaining-malloc-free-user-with-glib.patch
902636
# For bz#1839030 - RFE: enable the "memfd" memory backend
902636
Patch275: kvm-Revert-RHEL-disable-hostmem-memfd.patch
902636
# For bz#1827630 - volume creation leaving uncleaned stuff behind on error (vol-clone/libvirt/qemu-kvm)
902636
Patch276: kvm-block-introducing-bdrv_co_delete_file-interface.patch
902636
# For bz#1827630 - volume creation leaving uncleaned stuff behind on error (vol-clone/libvirt/qemu-kvm)
902636
Patch277: kvm-block.c-adding-bdrv_co_delete_file.patch
902636
# For bz#1827630 - volume creation leaving uncleaned stuff behind on error (vol-clone/libvirt/qemu-kvm)
902636
Patch278: kvm-crypto.c-cleanup-created-file-when-block_crypto_co_c.patch
902636
# For bz#1513681 - [Intel 8.2.1 Feat] qemu-kvm PT VMX -- Fast Train
902636
Patch279: kvm-target-i386-set-the-CPUID-level-to-0x14-on-old-machi.patch
902636
# For bz#1841038 - qemu-img: /var/tmp/v2vovl56bced.qcow2: CURL: Error opening file: Server does not support 'range' (byte ranges) with HTTP/2 server in VMware ESXi 7
902636
Patch280: kvm-block-curl-HTTP-header-fields-allow-whitespace-aroun.patch
902636
# For bz#1841038 - qemu-img: /var/tmp/v2vovl56bced.qcow2: CURL: Error opening file: Server does not support 'range' (byte ranges) with HTTP/2 server in VMware ESXi 7
902636
Patch281: kvm-block-curl-HTTP-header-field-names-are-case-insensit.patch
902636
# For bz#1779893 - RFE: Copy bitmaps with qemu-img convert
902636
# For bz#1779904 - RFE: ability to estimate bitmap space utilization for qcow2
902636
Patch282: kvm-MAINTAINERS-fix-qcow2-bitmap.c-under-Dirty-Bitmaps-h.patch
902636
# For bz#1779893 - RFE: Copy bitmaps with qemu-img convert
902636
# For bz#1779904 - RFE: ability to estimate bitmap space utilization for qcow2
902636
Patch283: kvm-iotests-Let-_make_test_img-parse-its-parameters.patch
902636
# For bz#1779893 - RFE: Copy bitmaps with qemu-img convert
902636
# For bz#1779904 - RFE: ability to estimate bitmap space utilization for qcow2
902636
Patch284: kvm-qemu_img-add-cvtnum_full-to-print-error-reports.patch
902636
# For bz#1779893 - RFE: Copy bitmaps with qemu-img convert
902636
# For bz#1779904 - RFE: ability to estimate bitmap space utilization for qcow2
902636
Patch285: kvm-block-Make-it-easier-to-learn-which-BDS-support-bitm.patch
902636
# For bz#1779893 - RFE: Copy bitmaps with qemu-img convert
902636
# For bz#1779904 - RFE: ability to estimate bitmap space utilization for qcow2
902636
Patch286: kvm-blockdev-Promote-several-bitmap-functions-to-non-sta.patch
902636
# For bz#1779893 - RFE: Copy bitmaps with qemu-img convert
902636
# For bz#1779904 - RFE: ability to estimate bitmap space utilization for qcow2
902636
Patch287: kvm-blockdev-Split-off-basic-bitmap-operations-for-qemu-.patch
902636
# For bz#1779893 - RFE: Copy bitmaps with qemu-img convert
902636
# For bz#1779904 - RFE: ability to estimate bitmap space utilization for qcow2
902636
Patch288: kvm-qemu-img-Add-bitmap-sub-command.patch
902636
# For bz#1779893 - RFE: Copy bitmaps with qemu-img convert
902636
# For bz#1779904 - RFE: ability to estimate bitmap space utilization for qcow2
902636
Patch289: kvm-iotests-Fix-test-178.patch
902636
# For bz#1779893 - RFE: Copy bitmaps with qemu-img convert
902636
# For bz#1779904 - RFE: ability to estimate bitmap space utilization for qcow2
902636
Patch290: kvm-qcow2-Expose-bitmaps-size-during-measure.patch
902636
# For bz#1779893 - RFE: Copy bitmaps with qemu-img convert
902636
# For bz#1779904 - RFE: ability to estimate bitmap space utilization for qcow2
902636
Patch291: kvm-qemu-img-Factor-out-code-for-merging-bitmaps.patch
902636
# For bz#1779893 - RFE: Copy bitmaps with qemu-img convert
902636
# For bz#1779904 - RFE: ability to estimate bitmap space utilization for qcow2
902636
Patch292: kvm-qemu-img-Add-convert-bitmaps-option.patch
902636
# For bz#1779893 - RFE: Copy bitmaps with qemu-img convert
902636
# For bz#1779904 - RFE: ability to estimate bitmap space utilization for qcow2
902636
Patch293: kvm-iotests-Add-test-291-to-for-qemu-img-bitmap-coverage.patch
902636
# For bz#1778593 - Qemu coredump when backup to a existing small size image
902636
Patch294: kvm-iotests-Add-more-skip_if_unsupported-statements-to-t.patch
902636
# For bz#1778593 - Qemu coredump when backup to a existing small size image
902636
Patch295: kvm-iotests-don-t-use-format-for-drive_add.patch
902636
# For bz#1778593 - Qemu coredump when backup to a existing small size image
902636
Patch296: kvm-iotests-055-refactor-compressed-backup-to-vmdk.patch
902636
# For bz#1778593 - Qemu coredump when backup to a existing small size image
902636
Patch297: kvm-iotests-055-skip-vmdk-target-tests-if-vmdk-is-not-wh.patch
902636
# For bz#1778593 - Qemu coredump when backup to a existing small size image
902636
Patch298: kvm-backup-Improve-error-for-bdrv_getlength-failure.patch
902636
# For bz#1778593 - Qemu coredump when backup to a existing small size image
902636
Patch299: kvm-backup-Make-sure-that-source-and-target-size-match.patch
902636
# For bz#1778593 - Qemu coredump when backup to a existing small size image
902636
Patch300: kvm-iotests-Backup-with-different-source-target-size.patch
902636
# For bz#1778593 - Qemu coredump when backup to a existing small size image
902636
Patch301: kvm-iotests-109-Don-t-mirror-with-mismatched-size.patch
902636
# For bz#1778593 - Qemu coredump when backup to a existing small size image
902636
Patch302: kvm-iotests-229-Use-blkdebug-to-inject-an-error.patch
902636
# For bz#1778593 - Qemu coredump when backup to a existing small size image
902636
Patch303: kvm-mirror-Make-sure-that-source-and-target-size-match.patch
902636
# For bz#1778593 - Qemu coredump when backup to a existing small size image
902636
Patch304: kvm-iotests-Mirror-with-different-source-target-size.patch
902636
# For bz#1841068 - RFE: please support the "ramfb" display device model
902636
Patch305: kvm-enable-ramfb.patch
902636
# For bz#1780574 - Data corruption with resizing short overlay over longer backing files
902636
Patch306: kvm-block-Add-flags-to-BlockDriver.bdrv_co_truncate.patch
902636
# For bz#1780574 - Data corruption with resizing short overlay over longer backing files
902636
Patch307: kvm-block-Add-flags-to-bdrv-_co-_truncate.patch
902636
# For bz#1780574 - Data corruption with resizing short overlay over longer backing files
902636
Patch308: kvm-block-backend-Add-flags-to-blk_truncate.patch
902636
# For bz#1780574 - Data corruption with resizing short overlay over longer backing files
902636
Patch309: kvm-qcow2-Support-BDRV_REQ_ZERO_WRITE-for-truncate.patch
902636
# For bz#1780574 - Data corruption with resizing short overlay over longer backing files
902636
Patch310: kvm-raw-format-Support-BDRV_REQ_ZERO_WRITE-for-truncate.patch
902636
# For bz#1780574 - Data corruption with resizing short overlay over longer backing files
902636
Patch311: kvm-file-posix-Support-BDRV_REQ_ZERO_WRITE-for-truncate.patch
902636
# For bz#1780574 - Data corruption with resizing short overlay over longer backing files
902636
Patch312: kvm-block-truncate-Don-t-make-backing-file-data-visible.patch
902636
# For bz#1780574 - Data corruption with resizing short overlay over longer backing files
902636
Patch313: kvm-iotests-Add-qemu_io_log.patch
902636
# For bz#1780574 - Data corruption with resizing short overlay over longer backing files
902636
Patch314: kvm-iotests-Filter-testfiles-out-in-filter_img_info.patch
902636
# For bz#1780574 - Data corruption with resizing short overlay over longer backing files
902636
Patch315: kvm-iotests-Test-committing-to-short-backing-file.patch
902636
# For bz#1780574 - Data corruption with resizing short overlay over longer backing files
902636
Patch316: kvm-qcow2-Forward-ZERO_WRITE-flag-for-full-preallocation.patch
902636
# For bz#1769912 - [Intel 8.2.1 Feature] introduce Cooper Lake cpu model - qemu-kvm Fast Train
902636
Patch317: kvm-i386-Add-MSR-feature-bit-for-MDS-NO.patch
902636
# For bz#1769912 - [Intel 8.2.1 Feature] introduce Cooper Lake cpu model - qemu-kvm Fast Train
902636
Patch318: kvm-i386-Add-macro-for-stibp.patch
902636
# For bz#1769912 - [Intel 8.2.1 Feature] introduce Cooper Lake cpu model - qemu-kvm Fast Train
902636
Patch319: kvm-target-i386-Add-new-bit-definitions-of-MSR_IA32_ARCH.patch
902636
# For bz#1769912 - [Intel 8.2.1 Feature] introduce Cooper Lake cpu model - qemu-kvm Fast Train
902636
Patch320: kvm-i386-Add-new-CPU-model-Cooperlake.patch
902636
# For bz#1769912 - [Intel 8.2.1 Feature] introduce Cooper Lake cpu model - qemu-kvm Fast Train
902636
Patch321: kvm-target-i386-Add-missed-features-to-Cooperlake-CPU-mo.patch
902636
# For bz#1845384 - CVE-2020-10761 virt:8.2/qemu-kvm: QEMU: nbd: reachable assertion failure in nbd_negotiate_send_rep_verr via remote client [rhel-av-8]
902636
Patch322: kvm-nbd-server-Avoid-long-error-message-assertions-CVE-2.patch
902636
# For bz#1845384 - CVE-2020-10761 virt:8.2/qemu-kvm: QEMU: nbd: reachable assertion failure in nbd_negotiate_send_rep_verr via remote client [rhel-av-8]
902636
Patch323: kvm-block-Call-attention-to-truncation-of-long-NBD-expor.patch
902636
# For bz#1820531 - qmp command query-pci get wrong result after hotplug device under hotplug=off controller
902636
Patch324: kvm-hw-pci-pcie-Move-hot-plug-capability-check-to-pre_pl.patch
902636
# For bz#1840342 - [Intel 8.2.1 Bug] qemu-kvm Add ARCH_CAPABILITIES to Icelake-Server cpu model - Fast Train
902636
Patch325: kvm-target-i386-Add-ARCH_CAPABILITIES-related-bits-into-.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch327: kvm-linux-headers-update-kvm.h.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch328: kvm-s390x-Don-t-do-a-normal-reset-on-the-initial-cpu.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch329: kvm-s390x-Move-reset-normal-to-shared-reset-handler.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch330: kvm-s390x-Move-initial-reset.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch331: kvm-s390x-Move-clear-reset.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch332: kvm-s390x-Beautify-diag308-handling.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch333: kvm-s390x-kvm-Make-kvm_sclp_service_call-void.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch334: kvm-s390x-Fix-cpu-normal-reset-ri-clearing.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch335: kvm-tests-boot-sector-Fix-the-bad-s390x-assembler-code.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch336: kvm-pc-bios-s390x-Fix-reset-psw-mask.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch337: kvm-s390x-Properly-fetch-and-test-the-short-psw-on-diag3.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch338: kvm-s390x-Rename-and-use-constants-for-short-PSW-address.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch339: kvm-s390x-Add-missing-vcpu-reset-functions.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch340: kvm-s390-sclp-improve-special-wait-psw-logic.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch341: kvm-pc-bios-s390x-Save-iplb-location-in-lowcore.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch342: kvm-s390-ipl-sync-back-loadparm.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch343: kvm-s390-ipl-fix-off-by-one-in-update_machine_ipl_proper.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch344: kvm-s390x-ipl-Consolidate-iplb-validity-check-into-one-f.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch345: kvm-vhost-correctly-turn-on-VIRTIO_F_IOMMU_PLATFORM.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch346: kvm-s390x-Move-diagnose-308-subcodes-and-rcs-into-ipl.h.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch347: kvm-s390x-protvirt-Support-unpack-facility.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch348: kvm-s390x-protvirt-Add-migration-blocker.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch349: kvm-s390x-protvirt-Inhibit-balloon-when-switching-to-pro.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch350: kvm-s390x-protvirt-KVM-intercept-changes.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch351: kvm-s390x-Add-SIDA-memory-ops.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch352: kvm-s390x-protvirt-Move-STSI-data-over-SIDAD.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch353: kvm-s390x-protvirt-SCLP-interpretation.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch354: kvm-s390x-protvirt-Set-guest-IPL-PSW.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch355: kvm-s390x-protvirt-Move-diag-308-data-over-SIDA.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch356: kvm-s390x-protvirt-Disable-address-checks-for-PV-guest-I.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch357: kvm-s390x-protvirt-Move-IO-control-structures-over-SIDA.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch358: kvm-s390x-protvirt-Handle-SIGP-store-status-correctly.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch359: kvm-s390x-Add-unpack-facility-feature-to-GA1.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch360: kvm-s390x-protvirt-Fix-stray-error_report_err-in-s390_ma.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch361: kvm-s390x-pv-Retry-ioctls-on-EINTR.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch362: kvm-s390x-s390-virtio-ccw-Fix-build-on-systems-without-K.patch
902636
# For bz#1828317 - [IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part
902636
Patch363: kvm-s390x-pv-Fix-KVM_PV_PREP_RESET-command-wrapper-name.patch
902636
# For bz#1756946 - [zKVM] Re-enable KVM_CAP_S390_AIS for new machine types
902636
Patch364: kvm-spapr-Pass-the-maximum-number-of-vCPUs-to-the-KVM-in.patch
902636
# For bz#1756946 - [zKVM] Re-enable KVM_CAP_S390_AIS for new machine types
902636
Patch365: kvm-introduce-kvm_kernel_irqchip_-functions.patch
902636
# For bz#1756946 - [zKVM] Re-enable KVM_CAP_S390_AIS for new machine types
902636
Patch366: kvm-target-s390x-kvm-Enable-adapter-interruption-suppres.patch
902636
# For bz#1823275 - RHEL8.1 - GPU Numa nodes not visible in guest post the pass-through.
902636
Patch367: kvm-vfio-nvlink-Remove-exec-permission-to-avoid-SELinux-.patch
902636
# For bz#1660916 - [IBM 8.3 FEAT] KVM s390x: DASD passthrough support - qemu part
902636
Patch368: kvm-vfio-ccw-Fix-error-message.patch
902636
# For bz#1660916 - [IBM 8.3 FEAT] KVM s390x: DASD passthrough support - qemu part
902636
Patch369: kvm-vfio-ccw-allow-non-prefetch-ORBs.patch
902636
# For bz#1660916 - [IBM 8.3 FEAT] KVM s390x: DASD passthrough support - qemu part
902636
Patch370: kvm-linux-headers-support-vfio-ccw-features.patch
902636
# For bz#1660916 - [IBM 8.3 FEAT] KVM s390x: DASD passthrough support - qemu part
902636
Patch371: kvm-vfio-ccw-Refactor-cleanup-of-regions.patch
902636
# For bz#1660916 - [IBM 8.3 FEAT] KVM s390x: DASD passthrough support - qemu part
902636
Patch372: kvm-vfio-ccw-Add-support-for-the-schib-region.patch
902636
# For bz#1660916 - [IBM 8.3 FEAT] KVM s390x: DASD passthrough support - qemu part
902636
Patch373: kvm-vfio-ccw-Refactor-ccw-irq-handler.patch
902636
# For bz#1660916 - [IBM 8.3 FEAT] KVM s390x: DASD passthrough support - qemu part
902636
Patch374: kvm-s390x-css-Refactor-the-css_queue_crw-routine.patch
902636
# For bz#1660916 - [IBM 8.3 FEAT] KVM s390x: DASD passthrough support - qemu part
902636
Patch375: kvm-vfio-ccw-Add-support-for-the-CRW-region-and-IRQ.patch
902636
# For bz#1660916 - [IBM 8.3 FEAT] KVM s390x: DASD passthrough support - qemu part
902636
Patch376: kvm-config-enable-VFIO_CCW.patch
902636
Patch377: kvm-virtio-blk-Refactor-the-code-that-processes-queued-r.patch
902636
Patch378: kvm-virtio-blk-On-restart-process-queued-requests-in-the.patch
902636
# For bz#1838070 - CVE-2020-1983 virt:rhel/qemu-kvm: QEMU: slirp: use-after-free in ip_reass() function in ip_input.c [rhel-8]
902636
Patch379: kvm-Fix-use-afte-free-in-ip_reass-CVE-2020-1983.patch
902636
# For bz#1835390 - qemu promote host does not support 'EDX.npt' and 'EDX.nrip-save' when test with Q35 machine type on EPYC host
902636
Patch380: kvm-i386-Mask-SVM-features-if-nested-SVM-is-disabled.patch
902636
# For bz#1854092 - kvm-unit-tests: tcg smp FAIL
902636
Patch381: kvm-s390x-sigp-Fix-sense-running-reporting.patch
902636
# For bz#1854092 - kvm-unit-tests: tcg smp FAIL
902636
Patch382: kvm-s390x-tcg-clear-local-interrupts-on-reset-normal.patch
902636
Patch383: kvm-virtio-net-fix-removal-of-failover-device.patch
902636
# For bz#1807057 - qcow2_alloc_cluster_abort() frees preallocated zero clusters
902636
Patch384: kvm-qcow2-Fix-alloc_cluster_abort-for-pre-existing-clust.patch
902636
# For bz#1807057 - qcow2_alloc_cluster_abort() frees preallocated zero clusters
902636
Patch385: kvm-iotests-026-Test-EIO-on-preallocated-zero-cluster.patch
902636
# For bz#1807057 - qcow2_alloc_cluster_abort() frees preallocated zero clusters
902636
Patch386: kvm-iotests-026-Test-EIO-on-allocation-in-a-data-file.patch
902636
# For bz#1807057 - qcow2_alloc_cluster_abort() frees preallocated zero clusters
902636
Patch387: kvm-iotests-026-Move-v3-exclusive-test-to-new-file.patch
902636
# For bz#1780385 - [RFE] AMD EPYC-Rome support for KVM / QEMU guest
902636
Patch388: kvm-i386-Add-2nd-Generation-AMD-EPYC-processors.patch
902636
# For bz#1689341 - QEMU should report an error and return failure if AMD SEV is not enabled in the kernel
902636
Patch389: kvm-target-i386-sev-provide-proper-error-reporting-for-q.patch
902636
# For bz#1689341 - QEMU should report an error and return failure if AMD SEV is not enabled in the kernel
902636
Patch390: kvm-target-i386-sev-fail-query-sev-capabilities-if-QEMU-.patch
902636
# For bz#1863034 - RHEL8.3 Beta - Secure Execution: Unable to start Qemu with "-no-reboot" option (qemu-kvm)
902636
Patch391: kvm-s390x-protvirt-allow-to-IPL-secure-guests-with-no-re.patch
902636
# For bz#1869710 - CVE-2020-14364 qemu-kvm: QEMU: usb: out-of-bounds r/w access issue while processing usb packets [rhel-8.3.0]
902636
Patch392: kvm-usb-fix-setup_len-init-CVE-2020-14364.patch
a19a21
# For bz#1755075 - [qemu-guest-agent] fsinfo doesn't return disk info on s390x
a19a21
Patch393: kvm-qga-commands-posix-Rework-build_guest_fsinfo_for_rea.patch
a19a21
# For bz#1755075 - [qemu-guest-agent] fsinfo doesn't return disk info on s390x
a19a21
Patch394: kvm-qga-commands-posix-Move-the-udev-code-from-the-pci-t.patch
a19a21
# For bz#1755075 - [qemu-guest-agent] fsinfo doesn't return disk info on s390x
a19a21
Patch395: kvm-qga-commands-posix-Support-fsinfo-for-non-PCI-virtio.patch
a19a21
# For bz#1874780 - -prom-env does not validate input
a19a21
Patch396: kvm-nvram-Exit-QEMU-if-NVRAM-cannot-contain-all-prom-env.patch
a19a21
# For bz#1846975 - Failed to boot up a s390x guest with virtio-blk-ccw if attaching a virtio-scsi-ccw bus in previous
a19a21
Patch397: kvm-pc-bios-s390-ccw-Makefile-Compile-with-std-gnu99-fwr.patch
a19a21
# For bz#1846975 - Failed to boot up a s390x guest with virtio-blk-ccw if attaching a virtio-scsi-ccw bus in previous
a19a21
Patch398: kvm-pc-bios-s390-ccw-Move-ipl-related-code-from-main-int.patch
a19a21
# For bz#1846975 - Failed to boot up a s390x guest with virtio-blk-ccw if attaching a virtio-scsi-ccw bus in previous
a19a21
Patch399: kvm-pc-bios-s390-ccw-Introduce-ENODEV-define-and-remove-.patch
a19a21
# For bz#1846975 - Failed to boot up a s390x guest with virtio-blk-ccw if attaching a virtio-scsi-ccw bus in previous
a19a21
Patch400: kvm-pc-bios-s390-ccw-Move-the-inner-logic-of-find_subch-.patch
a19a21
# For bz#1846975 - Failed to boot up a s390x guest with virtio-blk-ccw if attaching a virtio-scsi-ccw bus in previous
a19a21
Patch401: kvm-pc-bios-s390-ccw-Do-not-bail-out-early-if-not-findin.patch
a19a21
# For bz#1846975 - Failed to boot up a s390x guest with virtio-blk-ccw if attaching a virtio-scsi-ccw bus in previous
a19a21
Patch402: kvm-pc-bios-s390-ccw-Scan-through-all-devices-if-no-boot.patch
a19a21
# For bz#1846975 - Failed to boot up a s390x guest with virtio-blk-ccw if attaching a virtio-scsi-ccw bus in previous
a19a21
Patch403: kvm-pc-bios-s390-ccw-Allow-booting-in-case-the-first-vir.patch
a19a21
# For bz#1846975 - Failed to boot up a s390x guest with virtio-blk-ccw if attaching a virtio-scsi-ccw bus in previous
a19a21
Patch404: kvm-pc-bios-s390-ccw-main-Remove-superfluous-call-to-ena.patch
a19a21
# For bz#1846975 - Failed to boot up a s390x guest with virtio-blk-ccw if attaching a virtio-scsi-ccw bus in previous
a19a21
Patch405: kvm-aio-posix-completely-stop-polling-when-disabled.patch
a19a21
# For bz#1884531 - qemu-ga aborts after guest-shutdown command
a19a21
Patch406: kvm-qga-fix-assert-regression-on-guest-shutdown.patch
a19a21
# For bz#1857733 - [IBM 8.4 FEAT] KVM: Add support for virtio-fs on s390x - qemu part
a19a21
Patch407: kvm-libvhost-user-handle-endianness-as-mandated-by-the-s.patch
a19a21
# For bz#1857733 - [IBM 8.4 FEAT] KVM: Add support for virtio-fs on s390x - qemu part
a19a21
Patch408: kvm-virtio-add-vhost-user-fs-ccw-device.patch
a19a21
# For bz#1798506 - [IBM 8.4 FEAT] KVM: Support extended-length SCCBs - qemu part
a19a21
Patch410: kvm-s390x-sclp.c-remove-unneeded-label-in-sclp_service_c.patch
a19a21
# For bz#1798506 - [IBM 8.4 FEAT] KVM: Support extended-length SCCBs - qemu part
a19a21
Patch411: kvm-s390-sclp-get-machine-once-during-read-scp-cpu-info.patch
a19a21
# For bz#1798506 - [IBM 8.4 FEAT] KVM: Support extended-length SCCBs - qemu part
a19a21
Patch412: kvm-s390-sclp-rework-sclp-boundary-checks.patch
a19a21
# For bz#1798506 - [IBM 8.4 FEAT] KVM: Support extended-length SCCBs - qemu part
a19a21
Patch413: kvm-s390-sclp-read-sccb-from-mem-based-on-provided-lengt.patch
a19a21
# For bz#1798506 - [IBM 8.4 FEAT] KVM: Support extended-length SCCBs - qemu part
a19a21
Patch414: kvm-s390-sclp-check-sccb-len-before-filling-in-data.patch
a19a21
# For bz#1798506 - [IBM 8.4 FEAT] KVM: Support extended-length SCCBs - qemu part
a19a21
Patch415: kvm-s390-sclp-use-cpu-offset-to-locate-cpu-entries.patch
a19a21
# For bz#1798506 - [IBM 8.4 FEAT] KVM: Support extended-length SCCBs - qemu part
a19a21
Patch416: kvm-s390-sclp-add-extended-length-sccb-support-for-kvm-g.patch
a19a21
# For bz#1798506 - [IBM 8.4 FEAT] KVM: Support extended-length SCCBs - qemu part
a19a21
Patch417: kvm-linux-headers-Partial-update-against-Linux-5.9-rc4.patch
a19a21
# For bz#1798506 - [IBM 8.4 FEAT] KVM: Support extended-length SCCBs - qemu part
a19a21
Patch418: kvm-misc-Replace-zero-length-arrays-with-flexible-array-.patch
a19a21
# For bz#1798506 - [IBM 8.4 FEAT] KVM: Support extended-length SCCBs - qemu part
a19a21
Patch419: kvm-s390-guest-support-for-diagnose-0x318.patch
a19a21
# For bz#1798506 - [IBM 8.4 FEAT] KVM: Support extended-length SCCBs - qemu part
a19a21
Patch420: kvm-s390x-pv-Remove-sclp-boundary-checks.patch
a19a21
# For bz#1798506 - [IBM 8.4 FEAT] KVM: Support extended-length SCCBs - qemu part
a19a21
Patch421: kvm-s390x-pv-Fix-diag318-PV-fencing.patch
a19a21
# For bz#1659412 - [IBM 8.4 FEAT] KVM enablement for enhanced hardware diagnose data of guest kernel on s390x - qemu part
a19a21
Patch422: kvm-s390-kvm-fix-diag318-propagation-and-reset-functiona.patch
a19a21
# For bz#1898700 - qemu-kvm for RHEL-8.4 doesn't build due to a possible incompatibility with systemtap-sdt-devel-4.4-1
a19a21
Patch423: kvm-trace-use-STAP_SDT_V2-to-work-around-symbol-visibili.patch
a19a21
# For bz#1860994 - CVE-2020-16092 virt:rhel/qemu-kvm: QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment() in hw/net/net_tx_pkt.c [rhel-8]
a19a21
Patch424: kvm-hw-net-net_tx_pkt-fix-assertion-failure-in-net_tx_pk.patch
a19a21
# For bz#1880546 - qemu use SCMP_ACT_TRAP even SCMP_ACT_KILL_PROCESS is available
a19a21
Patch425: kvm-seccomp-fix-killing-of-whole-process-instead-of-thre.patch
a19a21
# For bz#1903135 - RHEL8.3 - KVM Distro install to vfio_ccw backed DASD gets error at the reboot step (qemu-kvm)
a19a21
Patch426: kvm-pc-bios-s390x-Rename-PSW_MASK_ZMODE-to-PSW_MASK_64.patch
a19a21
# For bz#1903135 - RHEL8.3 - KVM Distro install to vfio_ccw backed DASD gets error at the reboot step (qemu-kvm)
a19a21
Patch427: kvm-pc-bios-s390x-Use-PSW-masks-where-possible-and-intro.patch
a19a21
# For bz#1903135 - RHEL8.3 - KVM Distro install to vfio_ccw backed DASD gets error at the reboot step (qemu-kvm)
a19a21
Patch428: kvm-pc-bios-s390x-Ensure-Read-IPL-memory-is-clean.patch
a19a21
# For bz#1903135 - RHEL8.3 - KVM Distro install to vfio_ccw backed DASD gets error at the reboot step (qemu-kvm)
a19a21
Patch429: kvm-pc-bios-s390x-Clear-out-leftover-S390EP-string.patch
a19a21
# For bz#1901837 - Failed to hotunplug pc-dimm device
a19a21
Patch430: kvm-ppc-spapr-Add-hotremovable-flag-on-DIMM-LMBs-on-drme.patch
a19a21
# For bz#1901837 - Failed to hotunplug pc-dimm device
a19a21
Patch431: kvm-ppc-spapr-re-assert-IRQs-during-event-scan-if-there-.patch
a19a21
# For bz#1902237 - CVE-2020-29129 CVE-2020-29130 virt:rhel/qemu-kvm: QEMU: slirp: out-of-bounds access while processing ARP/NCSI packets [rhel-8]
a19a21
Patch432: kvm-slirp-check-pkt_len-before-reading-protocol-header.patch
a19a21
# For bz#1905386 - RHEL8.3 - s390x/s390-virtio-ccw: Reset PCI devices during subsystem reset (qemu-kvm)
a19a21
Patch433: kvm-s390x-s390-virtio-ccw-Reset-PCI-devices-during-subsy.patch
a19a21
# For bz#1859494 - Report logical_name for disks without mounted file-system
a19a21
Patch434: kvm-qapi-enable-use-of-g_autoptr-with-QAPI-types.patch
a19a21
# For bz#1859494 - Report logical_name for disks without mounted file-system
a19a21
Patch435: kvm-error-Fix-examples-in-error.h-s-big-comment.patch
a19a21
# For bz#1859494 - Report logical_name for disks without mounted file-system
a19a21
Patch436: kvm-error-Improve-error.h-s-big-comment.patch
a19a21
# For bz#1859494 - Report logical_name for disks without mounted file-system
a19a21
Patch437: kvm-error-Document-Error-API-usage-rules.patch
a19a21
# For bz#1859494 - Report logical_name for disks without mounted file-system
a19a21
Patch438: kvm-error-New-macro-ERRP_GUARD.patch
a19a21
# For bz#1859494 - Report logical_name for disks without mounted file-system
a19a21
Patch439: kvm-qga-add-command-guest-get-disks.patch
a19a21
# For bz#1859494 - Report logical_name for disks without mounted file-system
a19a21
Patch440: kvm-qga-add-implementation-of-guest-get-disks-for-Linux.patch
a19a21
# For bz#1859494 - Report logical_name for disks without mounted file-system
a19a21
Patch441: kvm-qga-add-implementation-of-guest-get-disks-for-Window.patch
a19a21
# For bz#1859494 - Report logical_name for disks without mounted file-system
a19a21
Patch442: kvm-qga-fix-missing-closedir-in-qmp_guest_get_disks.patch
a19a21
# For bz#1859494 - Report logical_name for disks without mounted file-system
a19a21
Patch443: kvm-qga-update-schema-for-guest-get-disks-dependents-fie.patch
a19a21
# For bz#1910267 - There is no soft link '/etc/qemu-kvm/fsfreeze-hook'
a19a21
Patch444: kvm-redhat-link-etc-qemu-ga-fsfreeze-hook-to-etc-qemu-kv.patch
a19a21
# For bz#1910326 - Incorrect hostname returned by  qga command 'guest-get-host-name'
a19a21
Patch445: kvm-qga-rename-Error-parameter-to-more-common-errp.patch
a19a21
# For bz#1910326 - Incorrect hostname returned by  qga command 'guest-get-host-name'
a19a21
Patch446: kvm-util-Introduce-qemu_get_host_name.patch
a19a21
# For bz#1910326 - Incorrect hostname returned by  qga command 'guest-get-host-name'
a19a21
Patch447: kvm-qga-Use-qemu_get_host_name-instead-of-g_get_host_nam.patch
a19a21
# For bz#1843852 - qemu core dumped: qemu-kvm: /builddir/build/BUILD/qemu-4.2.0/memory.c:1928: memory_region_notify_one: Assertion `entry->iova >= notifier->start && entry_end <= notifier->end' failed.
a19a21
Patch449: kvm-hw-arm-smmu-common-Factorize-some-code-in-smmu_ptw_6.patch
a19a21
# For bz#1843852 - qemu core dumped: qemu-kvm: /builddir/build/BUILD/qemu-4.2.0/memory.c:1928: memory_region_notify_one: Assertion `entry->iova >= notifier->start && entry_end <= notifier->end' failed.
a19a21
Patch450: kvm-hw-arm-smmu-common-Add-IOTLB-helpers.patch
a19a21
# For bz#1843852 - qemu core dumped: qemu-kvm: /builddir/build/BUILD/qemu-4.2.0/memory.c:1928: memory_region_notify_one: Assertion `entry->iova >= notifier->start && entry_end <= notifier->end' failed.
a19a21
Patch451: kvm-hw-arm-smmu-Introduce-smmu_get_iotlb_key.patch
a19a21
# For bz#1843852 - qemu core dumped: qemu-kvm: /builddir/build/BUILD/qemu-4.2.0/memory.c:1928: memory_region_notify_one: Assertion `entry->iova >= notifier->start && entry_end <= notifier->end' failed.
a19a21
Patch452: kvm-hw-arm-smmu-Introduce-SMMUTLBEntry-for-PTW-and-IOTLB.patch
a19a21
# For bz#1843852 - qemu core dumped: qemu-kvm: /builddir/build/BUILD/qemu-4.2.0/memory.c:1928: memory_region_notify_one: Assertion `entry->iova >= notifier->start && entry_end <= notifier->end' failed.
a19a21
Patch453: kvm-hw-arm-smmu-common-Manage-IOTLB-block-entries.patch
a19a21
# For bz#1843852 - qemu core dumped: qemu-kvm: /builddir/build/BUILD/qemu-4.2.0/memory.c:1928: memory_region_notify_one: Assertion `entry->iova >= notifier->start && entry_end <= notifier->end' failed.
a19a21
Patch454: kvm-hw-arm-smmuv3-Introduce-smmuv3_s1_range_inval-helper.patch
a19a21
# For bz#1843852 - qemu core dumped: qemu-kvm: /builddir/build/BUILD/qemu-4.2.0/memory.c:1928: memory_region_notify_one: Assertion `entry->iova >= notifier->start && entry_end <= notifier->end' failed.
a19a21
Patch455: kvm-hw-arm-smmuv3-Get-prepared-for-range-invalidation.patch
a19a21
# For bz#1843852 - qemu core dumped: qemu-kvm: /builddir/build/BUILD/qemu-4.2.0/memory.c:1928: memory_region_notify_one: Assertion `entry->iova >= notifier->start && entry_end <= notifier->end' failed.
a19a21
Patch456: kvm-hw-arm-smmuv3-Fix-potential-integer-overflow-CID-143.patch
a19a21
# For bz#1843852 - qemu core dumped: qemu-kvm: /builddir/build/BUILD/qemu-4.2.0/memory.c:1928: memory_region_notify_one: Assertion `entry->iova >= notifier->start && entry_end <= notifier->end' failed.
a19a21
Patch457: kvm-memory-Rename-memory_region_notify_one-to-memory_reg.patch
a19a21
# For bz#1843852 - qemu core dumped: qemu-kvm: /builddir/build/BUILD/qemu-4.2.0/memory.c:1928: memory_region_notify_one: Assertion `entry->iova >= notifier->start && entry_end <= notifier->end' failed.
a19a21
Patch458: kvm-memory-Add-IOMMUTLBEvent.patch
a19a21
# For bz#1843852 - qemu core dumped: qemu-kvm: /builddir/build/BUILD/qemu-4.2.0/memory.c:1928: memory_region_notify_one: Assertion `entry->iova >= notifier->start && entry_end <= notifier->end' failed.
a19a21
Patch459: kvm-memory-Add-IOMMU_NOTIFIER_DEVIOTLB_UNMAP-IOMMUTLBNot.patch
a19a21
# For bz#1843852 - qemu core dumped: qemu-kvm: /builddir/build/BUILD/qemu-4.2.0/memory.c:1928: memory_region_notify_one: Assertion `entry->iova >= notifier->start && entry_end <= notifier->end' failed.
a19a21
Patch460: kvm-intel_iommu-Skip-page-walking-on-device-iotlb-invali.patch
a19a21
# For bz#1843852 - qemu core dumped: qemu-kvm: /builddir/build/BUILD/qemu-4.2.0/memory.c:1928: memory_region_notify_one: Assertion `entry->iova >= notifier->start && entry_end <= notifier->end' failed.
a19a21
Patch461: kvm-memory-Skip-bad-range-assertion-if-notifier-is-DEVIO.patch
a19a21
# For bz#1904393 - CVE-2020-27821 virt:rhel/qemu-kvm: QEMU: heap buffer overflow in msix_table_mmio_write() in hw/pci/msix.c [rhel-8]
a19a21
Patch462: kvm-memory-clamp-cached-translation-in-case-it-points-to.patch
a19a21
# For bz#1898628 - CVE-2020-25723 virt:rhel/qemu-kvm: QEMU: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c [rhel-8]
a19a21
Patch463: kvm-hw-ehci-check-return-value-of-usb_packet_map.patch
a19a21
# For bz#1903070 - CVE-2020-25707 CVE-2020-28916 virt:rhel/qemu-kvm: various flaws [rhel-8]
a19a21
Patch464: kvm-hw-net-e1000e-advance-desc_offset-in-case-of-null-de.patch
a19a21
# For bz#1905391 - RHEL8.4 - s390x/pci: Honor vfio DMA limiting (qemu-kvm)
a19a21
Patch465: kvm-linux-headers-add-vfio-DMA-available-capability.patch
a19a21
# For bz#1905391 - RHEL8.4 - s390x/pci: Honor vfio DMA limiting (qemu-kvm)
a19a21
Patch466: kvm-s390x-pci-Move-header-files-to-include-hw-s390x.patch
a19a21
# For bz#1905391 - RHEL8.4 - s390x/pci: Honor vfio DMA limiting (qemu-kvm)
a19a21
Patch467: kvm-vfio-Create-shared-routine-for-scanning-info-capabil.patch
a19a21
# For bz#1905391 - RHEL8.4 - s390x/pci: Honor vfio DMA limiting (qemu-kvm)
a19a21
Patch468: kvm-vfio-Find-DMA-available-capability.patch
a19a21
# For bz#1905391 - RHEL8.4 - s390x/pci: Honor vfio DMA limiting (qemu-kvm)
a19a21
Patch469: kvm-s390x-pci-Add-routine-to-get-the-vfio-dma-available-.patch
a19a21
# For bz#1905391 - RHEL8.4 - s390x/pci: Honor vfio DMA limiting (qemu-kvm)
a19a21
Patch470: kvm-s390x-pci-Honor-DMA-limits-set-by-vfio.patch
a19a21
# For bz#1905391 - RHEL8.4 - s390x/pci: Honor vfio DMA limiting (qemu-kvm)
a19a21
Patch471: kvm-s390x-fix-build-for-without-default-devices.patch
a19a21
# For bz#1918054 - CVE-2020-10756 virt:rhel/qemu-kvm: QEMU: slirp: networking out-of-bounds read information disclosure vulnerability [rhel-8.4.0]
a19a21
Patch472: kvm-Drop-bogus-IPv6-messages.patch
a19a21
# For bz#1901837 - Failed to hotunplug pc-dimm device
a19a21
Patch473: kvm-spapr-Improve-handling-of-fdt-buffer-size.patch
a19a21
# For bz#1901837 - Failed to hotunplug pc-dimm device
a19a21
Patch474: kvm-spapr-Fold-h_cas_compose_response-into-h_client_arch.patch
a19a21
# For bz#1901837 - Failed to hotunplug pc-dimm device
a19a21
Patch475: kvm-spapr-Don-t-use-spapr_drc_needed-in-CAS-code.patch
a19a21
# For bz#1901837 - Failed to hotunplug pc-dimm device
a19a21
Patch476: kvm-spapr-Fix-handling-of-unplugged-devices-during-CAS-a.patch
a19a21
# For bz#1901837 - Failed to hotunplug pc-dimm device
a19a21
Patch477: kvm-spapr-Allow-memory-unplug-to-always-succeed.patch
a19a21
# For bz#1901837 - Failed to hotunplug pc-dimm device
a19a21
Patch478: kvm-spapr-Improve-handling-of-memory-unplug-with-old-gue.patch
a19a21
# For bz#1834281 - qemu-img convert abort when converting image with unaligned size
a19a21
Patch479: kvm-block-Require-aligned-image-size-to-avoid-assertion-.patch
a19a21
# For bz#1834281 - qemu-img convert abort when converting image with unaligned size
a19a21
Patch480: kvm-file-posix-Allow-byte-aligned-O_DIRECT-with-NFS.patch
a19a21
# For bz#1912974 - CVE-2020-11947 virt:rhel/qemu-kvm: QEMU: heap buffer overflow in iscsi_aio_ioctl_cb() in block/iscsi.c may lead to information disclosure [rhel-8]
a19a21
Patch481: kvm-block-iscsi-fix-heap-buffer-overflow-in-iscsi_aio_io.patch
a19a21
# For bz#1919111 - CVE-2020-35517 virt:rhel/qemu-kvm: QEMU: virtiofsd: potential privileged host device access from guest [rhel-8.4.0]
a19a21
Patch482: kvm-virtiofsd-extract-lo_do_open-from-lo_open.patch
a19a21
# For bz#1919111 - CVE-2020-35517 virt:rhel/qemu-kvm: QEMU: virtiofsd: potential privileged host device access from guest [rhel-8.4.0]
a19a21
Patch483: kvm-virtiofsd-optionally-return-inode-pointer-from-lo_do.patch
a19a21
# For bz#1919111 - CVE-2020-35517 virt:rhel/qemu-kvm: QEMU: virtiofsd: potential privileged host device access from guest [rhel-8.4.0]
a19a21
Patch484: kvm-virtiofsd-prevent-opening-of-special-files-CVE-2020-.patch
a19a21
# For bz#1912891 - [ppc64le] --disk cdimage.iso,bus=usb fails to boot
a19a21
Patch486: kvm-spapr-Adjust-firmware-path-of-PCI-devices.patch
a19a21
# For bz#1790620 - [RFE] AMD Milan - Add KVM/support for EPYC-Milan CPU Model - Slow Train
a19a21
Patch487: kvm-x86-cpu-Enable-AVX512_VP2INTERSECT-cpu-feature.patch
a19a21
# For bz#1790620 - [RFE] AMD Milan - Add KVM/support for EPYC-Milan CPU Model - Slow Train
a19a21
Patch488: kvm-target-i386-add-fast-short-REP-MOV-support.patch
a19a21
# For bz#1790620 - [RFE] AMD Milan - Add KVM/support for EPYC-Milan CPU Model - Slow Train
a19a21
Patch489: kvm-x86-cpu-Populate-SVM-CPUID-feature-bits.patch
a19a21
# For bz#1790620 - [RFE] AMD Milan - Add KVM/support for EPYC-Milan CPU Model - Slow Train
a19a21
Patch490: kvm-i386-Add-the-support-for-AMD-EPYC-3rd-generation-pro.patch
a19a21
# For bz#1917451 - CVE-2020-29443 virt:rhel/qemu-kvm: QEMU: ide: atapi: OOB access while processing read commands [rhel-8.4.0]
a19a21
Patch491: kvm-ide-atapi-check-logical-block-address-and-read-size-.patch
1072c8
# For bz#1892350 - CVE-2020-27617 virt:rhel/qemu-kvm: QEMU: net: an assert failure via eth_get_gso_type [rhel-8.5.0]
a6baaf
Patch492: kvm-net-remove-an-assert-call-in-eth_get_gso_type.patch
1072c8
# For bz#1930092 - CVE-2021-20257 virt:rhel/qemu-kvm: QEMU: net: e1000: infinite loop while processing transmit descriptors [rhel-8.5.0]
1072c8
Patch493: kvm-e1000-fail-early-for-evil-descriptor.patch
1072c8
# For bz#1859175 - CVE-2020-15859 virt:rhel/qemu-kvm: QEMU: net: e1000e: use-after-free while sending packets [rhel-8]
1072c8
Patch494: kvm-net-forbid-the-reentrant-RX.patch
1072c8
# For bz#1855250 - qemu-img convert uses possibly slow pre-zeroing on block storage
1072c8
Patch495: kvm-qemu-img-convert-Don-t-pre-zero-images.patch
1072c8
# For bz#1932823 - after upgrade from 4.3 to 4.4 audio stops working in guests after couple of seconds
1072c8
Patch496: kvm-audio-audio_generic_get_buffer_in-should-honor-size.patch
1072c8
# For bz#1925430 - CVE-2021-20221 virt:rhel/qemu-kvm: qemu: out-of-bound heap buffer access via an interrupt ID field [rhel-8.5.0]
1072c8
Patch497: kvm-hw-intc-arm_gic-Fix-interrupt-ID-in-GICD_SGIR-regist.patch
1072c8
# For bz#1842478 - CVE-2020-13754 virt:rhel/qemu-kvm: QEMU: msix: OOB access during mmio operations may lead to DoS [rhel-8.5.0]
1072c8
Patch498: kvm-libqos-usb-hcd-ehci-use-32-bit-write-for-config-regi.patch
1072c8
# For bz#1842478 - CVE-2020-13754 virt:rhel/qemu-kvm: QEMU: msix: OOB access during mmio operations may lead to DoS [rhel-8.5.0]
1072c8
Patch499: kvm-libqos-pci-pc-use-32-bit-write-for-EJ-register.patch
1072c8
# For bz#1842478 - CVE-2020-13754 virt:rhel/qemu-kvm: QEMU: msix: OOB access during mmio operations may lead to DoS [rhel-8.5.0]
1072c8
Patch500: kvm-memory-Revert-memory-accept-mismatching-sizes-in-mem.patch
1072c8
# For bz#1842478 - CVE-2020-13754 virt:rhel/qemu-kvm: QEMU: msix: OOB access during mmio operations may lead to DoS [rhel-8.5.0]
1072c8
Patch501: kvm-acpi-accept-byte-and-word-access-to-core-ACPI-regist.patch
1072c8
# For bz#1842478 - CVE-2020-13754 virt:rhel/qemu-kvm: QEMU: msix: OOB access during mmio operations may lead to DoS [rhel-8.5.0]
1072c8
Patch502: kvm-xhci-fix-valid.max_access_size-to-access-address-reg.patch
1072c8
# For bz#1842478 - CVE-2020-13754 virt:rhel/qemu-kvm: QEMU: msix: OOB access during mmio operations may lead to DoS [rhel-8.5.0]
1072c8
Patch503: kvm-softmmu-memory-Log-invalid-memory-accesses.patch
1072c8
# For bz#1940450 - RHEL8.5 - Mediated Device already in use by same domain we are booting (vfio-ccw/Multipath Testing) (kvm) - qemu-kvm part (also has kernel and libvirt parts)
1072c8
Patch504: kvm-linux-headers-Add-VFIO_CCW_REQ_IRQ_INDEX.patch
1072c8
# For bz#1940450 - RHEL8.5 - Mediated Device already in use by same domain we are booting (vfio-ccw/Multipath Testing) (kvm) - qemu-kvm part (also has kernel and libvirt parts)
1072c8
Patch505: kvm-vfio-ccw-Connect-the-device-request-notifier.patch
1072c8
# For bz#1942880 - RHEL8.4 Nightly[0322] - KVM guest fails to find zipl boot menu index (qemu-kvm)
1072c8
Patch506: kvm-pc-bios-s390-ccw-fix-off-by-one-error.patch
1072c8
# For bz#1942880 - RHEL8.4 Nightly[0322] - KVM guest fails to find zipl boot menu index (qemu-kvm)
1072c8
Patch507: kvm-pc-bios-s390-ccw-break-loop-if-a-null-block-number-i.patch
1072c8
# For bz#1942880 - RHEL8.4 Nightly[0322] - KVM guest fails to find zipl boot menu index (qemu-kvm)
1072c8
Patch508: kvm-pc-bios-s390-ccw-don-t-try-to-read-the-next-block-if.patch
1072c8
# For bz#1877163 - [FJ 8.3 Bug] The progress bar of the "virt-clone --nonsparse" command shows the progress rate exceeding 100%.
1072c8
Patch509: kvm-file-posix-Mitigate-file-fragmentation-with-extent-s.patch
1072c8
# For bz#1944861 - Qemu-img convert fails when source image is on gpfs
1072c8
Patch510: kvm-block-file-posix-Fix-problem-with-fallocate-PUNCH_HO.patch
1072c8
# For bz#1969768 - [ppc64le] Hotplug vcpu device hit call trace:[qemu output] KVM: unknown exit, hardware reason 7fff9ce87ed8
1072c8
Patch511: kvm-spapr-Remove-stale-comment-about-power-saving-LPCR-b.patch
1072c8
# For bz#1969768 - [ppc64le] Hotplug vcpu device hit call trace:[qemu output] KVM: unknown exit, hardware reason 7fff9ce87ed8
1072c8
Patch512: kvm-spapr-Set-LPCR-to-current-AIL-mode-when-starting-a-n.patch
1072c8
# For bz#1967914 - [virtio-fs] virtiofsd quit when coping file to a folder in virtio-fs mounted volume(windows guest)
1072c8
Patch513: kvm-virtiofsd-Whitelist-fchmod.patch
1072c8
# For bz#1957866 - RHEL8.4 - EEH capability disabled on KVM guest and recovery of PCI passthru device fails(CX5 / mlx5_core) (qemu-kvm)
1072c8
Patch514: kvm-spapr-Fix-EEH-capability-issue-on-KVM-guest-for-PCI-.patch
1072c8
# For bz#1970912 - Deployment fails with "Invalid or missing agent token received"
1072c8
Patch515: kvm-Compress-lines-for-immediate-return.patch
1072c8
# For bz#1970912 - Deployment fails with "Invalid or missing agent token received"
1072c8
Patch516: kvm-file-posix-Handle-EINVAL-fallocate-return-value.patch
1072c8
# For bz#1932917 - CVE-2021-3416 virt:rhel/qemu-kvm: QEMU: net: infinite loop in loopback mode may lead to stack overflow
1072c8
Patch517: kvm-net-introduce-qemu_receive_packet.patch
1072c8
# For bz#1932917 - CVE-2021-3416 virt:rhel/qemu-kvm: QEMU: net: infinite loop in loopback mode may lead to stack overflow
1072c8
Patch518: kvm-e1000-switch-to-use-qemu_receive_packet-for-loopback.patch
1072c8
# For bz#1932917 - CVE-2021-3416 virt:rhel/qemu-kvm: QEMU: net: infinite loop in loopback mode may lead to stack overflow
1072c8
Patch519: kvm-dp8393x-switch-to-use-qemu_receive_packet-for-loopba.patch
1072c8
# For bz#1932917 - CVE-2021-3416 virt:rhel/qemu-kvm: QEMU: net: infinite loop in loopback mode may lead to stack overflow
1072c8
Patch520: kvm-sungem-switch-to-use-qemu_receive_packet-for-loopbac.patch
1072c8
# For bz#1932917 - CVE-2021-3416 virt:rhel/qemu-kvm: QEMU: net: infinite loop in loopback mode may lead to stack overflow
1072c8
Patch521: kvm-tx_pkt-switch-to-use-qemu_receive_packet_iov-for-loo.patch
1072c8
# For bz#1932917 - CVE-2021-3416 virt:rhel/qemu-kvm: QEMU: net: infinite loop in loopback mode may lead to stack overflow
1072c8
Patch522: kvm-rtl8139-switch-to-use-qemu_receive_packet-for-loopba.patch
1072c8
# For bz#1932917 - CVE-2021-3416 virt:rhel/qemu-kvm: QEMU: net: infinite loop in loopback mode may lead to stack overflow
1072c8
Patch523: kvm-pcnet-switch-to-use-qemu_receive_packet-for-loopback.patch
1072c8
# For bz#1932917 - CVE-2021-3416 virt:rhel/qemu-kvm: QEMU: net: infinite loop in loopback mode may lead to stack overflow
1072c8
Patch524: kvm-cadence_gem-switch-to-use-qemu_receive_packet-for-lo.patch
1072c8
# For bz#1932917 - CVE-2021-3416 virt:rhel/qemu-kvm: QEMU: net: infinite loop in loopback mode may lead to stack overflow
1072c8
Patch525: kvm-lan9118-switch-to-use-qemu_receive_packet-for-loopba.patch
1072c8
# For bz#1967716 - RFE: rebuild guest agent to include public ssh injection api support
1072c8
Patch526: kvm-glib-compat-add-g_unix_get_passwd_entry_qemu.patch
1072c8
# For bz#1967716 - RFE: rebuild guest agent to include public ssh injection api support
1072c8
Patch527: kvm-qga-add-ssh-add-remove-authorized-keys.patch
1072c8
# For bz#1967716 - RFE: rebuild guest agent to include public ssh injection api support
1072c8
Patch528: kvm-qga-add-reset-argument-to-ssh-add-authorized-keys.patch
1072c8
# For bz#1967716 - RFE: rebuild guest agent to include public ssh injection api support
1072c8
Patch529: kvm-qga-add-ssh-get-authorized-keys.patch
1072c8
# For bz#1970819 - CVE-2021-3592 virt:rhel/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (bootp) [rhel-8]
1072c8
# For bz#1970835 - CVE-2021-3593 virt:rhel/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp6) [rhel-8]
1072c8
# For bz#1970843 - CVE-2021-3595 virt:rhel/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (tftp) [rhel-8]
1072c8
# For bz#1970853 - CVE-2021-3594 virt:rhel/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp) [rhel-8]
1072c8
Patch530: kvm-Add-mtod_check.patch
1072c8
# For bz#1970819 - CVE-2021-3592 virt:rhel/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (bootp) [rhel-8]
1072c8
# For bz#1970835 - CVE-2021-3593 virt:rhel/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp6) [rhel-8]
1072c8
# For bz#1970843 - CVE-2021-3595 virt:rhel/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (tftp) [rhel-8]
1072c8
# For bz#1970853 - CVE-2021-3594 virt:rhel/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp) [rhel-8]
1072c8
Patch531: kvm-bootp-limit-vendor-specific-area-to-input-packet-mem.patch
1072c8
# For bz#1970819 - CVE-2021-3592 virt:rhel/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (bootp) [rhel-8]
1072c8
Patch532: kvm-bootp-check-bootp_input-buffer-size.patch
1072c8
# For bz#1970835 - CVE-2021-3593 virt:rhel/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp6) [rhel-8]
1072c8
Patch533: kvm-upd6-check-udp6_input-buffer-size.patch
1072c8
# For bz#1970843 - CVE-2021-3595 virt:rhel/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (tftp) [rhel-8]
1072c8
Patch534: kvm-tftp-check-tftp_input-buffer-size.patch
1072c8
# For bz#1970819 - CVE-2021-3592 virt:rhel/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (bootp) [rhel-8]
1072c8
# For bz#1970835 - CVE-2021-3593 virt:rhel/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp6) [rhel-8]
1072c8
# For bz#1970843 - CVE-2021-3595 virt:rhel/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (tftp) [rhel-8]
1072c8
# For bz#1970853 - CVE-2021-3594 virt:rhel/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp) [rhel-8]
1072c8
Patch535: kvm-tftp-introduce-a-header-structure.patch
1072c8
# For bz#1970853 - CVE-2021-3594 virt:rhel/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp) [rhel-8]
1072c8
Patch536: kvm-udp-check-upd_input-buffer-size.patch
1072c8
# For bz#1970819 - CVE-2021-3592 virt:rhel/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (bootp) [rhel-8]
1072c8
# For bz#1970835 - CVE-2021-3593 virt:rhel/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp6) [rhel-8]
1072c8
# For bz#1970843 - CVE-2021-3595 virt:rhel/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (tftp) [rhel-8]
1072c8
# For bz#1970853 - CVE-2021-3594 virt:rhel/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp) [rhel-8]
1072c8
Patch537: kvm-Fix-DHCP-broken-in-libslirp-v4.6.0.patch
1072c8
# For bz#1982134 - QEMU core dump while booting guest with a non-exist fd on tap
1072c8
Patch538: kvm-net-check-if-the-file-descriptor-is-valid-before-usi.patch
1072c8
# For bz#1982134 - QEMU core dump while booting guest with a non-exist fd on tap
1072c8
Patch539: kvm-net-detect-errors-from-probing-vnet-hdr-flag-for-TAP.patch
1072c8
# For bz#1969848 - qemu-img convert hangs on aarch64
1072c8
Patch540: kvm-aio-wait-delegate-polling-of-main-AioContext-if-BQL-.patch
1072c8
# For bz#1969848 - qemu-img convert hangs on aarch64
1072c8
Patch541: kvm-async-use-explicit-memory-barriers.patch
1072c8
# For bz#1967496 - [virtio-fs] nfs/xfstest generic/089 generic/478 generic/632 failed
1072c8
Patch542: kvm-virtiofsd-Disable-remote-posix-locks-by-default.patch
1072c8
# For bz#1967496 - [virtio-fs] nfs/xfstest generic/089 generic/478 generic/632 failed
1072c8
Patch543: kvm-virtiofsd-Fix-the-help-message-of-posix-lock.patch
1072c8
# For bz#1994041 - qemu-kvm scsi: change default passthrough timeout to non-infinite
1072c8
Patch544: kvm-scsi-make-io_timeout-configurable.patch
902636
902636
BuildRequires: wget
902636
BuildRequires: rpm-build
26ba25
BuildRequires: zlib-devel
26ba25
BuildRequires: glib2-devel
26ba25
BuildRequires: which
26ba25
BuildRequires: gnutls-devel
26ba25
BuildRequires: cyrus-sasl-devel
26ba25
BuildRequires: libtool
26ba25
BuildRequires: libaio-devel
26ba25
BuildRequires: rsync
26ba25
BuildRequires: python3-devel
26ba25
BuildRequires: pciutils-devel
26ba25
BuildRequires: libiscsi-devel
26ba25
BuildRequires: ncurses-devel
26ba25
BuildRequires: libattr-devel
26ba25
BuildRequires: libusbx-devel >= 1.0.22
26ba25
%if %{have_usbredir}
26ba25
BuildRequires: usbredir-devel >= 0.7.1
26ba25
%endif
26ba25
BuildRequires: texinfo
902636
BuildRequires: python3-sphinx
26ba25
%if %{have_spice}
26ba25
BuildRequires: spice-protocol >= 0.12.12
26ba25
BuildRequires: spice-server-devel >= 0.12.8
26ba25
BuildRequires: libcacard-devel
26ba25
# For smartcard NSS support
26ba25
BuildRequires: nss-devel
26ba25
%endif
b38b0f
BuildRequires: libseccomp-devel >= 2.4.0
26ba25
# For network block driver
26ba25
BuildRequires: libcurl-devel
b38b0f
BuildRequires: libssh-devel
26ba25
BuildRequires: librados-devel
26ba25
BuildRequires: librbd-devel
26ba25
%if %{have_gluster}
26ba25
# For gluster block driver
a19a21
BuildRequires: glusterfs-api-devel
26ba25
BuildRequires: glusterfs-devel
26ba25
%endif
26ba25
# We need both because the 'stap' binary is probed for by configure
26ba25
BuildRequires: systemtap
26ba25
BuildRequires: systemtap-sdt-devel
26ba25
# For VNC PNG support
26ba25
BuildRequires: libpng-devel
26ba25
# For uuid generation
26ba25
BuildRequires: libuuid-devel
26ba25
# For BlueZ device support
26ba25
BuildRequires: bluez-libs-devel
26ba25
# For Braille device support
26ba25
BuildRequires: brlapi-devel
26ba25
# For test suite
26ba25
BuildRequires: check-devel
902636
# For virtiofs
902636
BuildRequires: libcap-ng-devel
26ba25
# Hard requirement for version >= 1.3
26ba25
BuildRequires: pixman-devel
26ba25
# Documentation requirement
26ba25
BuildRequires: perl-podlators
26ba25
BuildRequires: texinfo
902636
BuildRequires: python3-sphinx
26ba25
# For rdma
26ba25
%if 0%{?have_librdma}
26ba25
BuildRequires: rdma-core-devel
26ba25
%endif
26ba25
%if %{have_fdt}
902636
BuildRequires: libfdt-devel >= 1.6.0
26ba25
%endif
26ba25
# iasl and cpp for acpi generation (not a hard requirement as we can use
26ba25
# pre-compiled files, but it's better to use this)
26ba25
%ifarch %{ix86} x86_64
26ba25
BuildRequires: iasl
26ba25
BuildRequires: cpp
26ba25
%endif
26ba25
# For compressed guest memory dumps
26ba25
BuildRequires: lzo-devel snappy-devel
26ba25
# For NUMA memory binding
36a43f
%ifnarch s390x
26ba25
BuildRequires: numactl-devel
26ba25
%endif
26ba25
BuildRequires: libgcrypt-devel
26ba25
# qemu-pr-helper multipath support (requires libudev too)
26ba25
BuildRequires: device-mapper-multipath-devel
26ba25
BuildRequires: systemd-devel
26ba25
# used by qemu-bridge-helper and qemu-pr-helper
26ba25
BuildRequires: libcap-ng-devel
26ba25
26ba25
BuildRequires: diffutils
26ba25
%ifarch x86_64
26ba25
BuildRequires: libpmem-devel
26ba25
Requires: libpmem
26ba25
%endif
26ba25
26ba25
# qemu-keymap
26ba25
BuildRequires: pkgconfig(xkbcommon)
26ba25
26ba25
# For s390-pgste flag
26ba25
%ifarch s390x
26ba25
BuildRequires: binutils >= 2.27-16
26ba25
%endif
26ba25
26ba25
%if %{have_opengl}
26ba25
BuildRequires: pkgconfig(epoxy)
26ba25
BuildRequires: pkgconfig(libdrm)
26ba25
BuildRequires: pkgconfig(gbm)
26ba25
Requires:      mesa-libGL
26ba25
Requires:      mesa-libEGL
26ba25
Requires:      mesa-dri-drivers
26ba25
%endif
26ba25
902636
BuildRequires: perl-Test-Harness
902636
26ba25
Requires: qemu-kvm-core = %{epoch}:%{version}-%{release}
26ba25
%rhev_ma_conflicts qemu-kvm
26ba25
26ba25
%{requires_all_modules}
26ba25
26ba25
%define qemudocdir %{_docdir}/%{name}
26ba25
26ba25
%description
26ba25
qemu-kvm is an open source virtualizer that provides hardware
26ba25
emulation for the KVM hypervisor. qemu-kvm acts as a virtual
26ba25
machine monitor together with the KVM kernel modules, and emulates the
26ba25
hardware for a full system such as a PC and its associated peripherals.
26ba25
26ba25
26ba25
%package -n qemu-kvm-core
26ba25
Summary: qemu-kvm core components
26ba25
Requires: qemu-img = %{epoch}:%{version}-%{release}
26ba25
%ifarch %{ix86} x86_64
26ba25
Requires: seabios-bin >= 1.10.2-1
26ba25
Requires: sgabios-bin
26ba25
Requires: edk2-ovmf
26ba25
%endif
26ba25
%ifarch aarch64
26ba25
Requires: edk2-aarch64
26ba25
%endif
26ba25
36a43f
%ifnarch aarch64 s390x
902636
Requires: seavgabios-bin >= 1.12.0-3
26ba25
Requires: ipxe-roms-qemu >= 20170123-1
26ba25
%endif
26ba25
%ifarch %{power64}
26ba25
Requires: SLOF >= %{SLOF_gittagdate}-1.git%{SLOF_gittagcommit}
26ba25
%endif
26ba25
Requires: %{name}-common = %{epoch}:%{version}-%{release}
b38b0f
Requires: libseccomp >= 2.4.0
26ba25
# For compressed guest memory dumps
26ba25
Requires: lzo snappy
26ba25
%if %{have_kvm_setup}
26ba25
Requires(post): systemd-units
b38b0f
Requires(preun): systemd-units
26ba25
    %ifarch %{power64}
26ba25
Requires: powerpc-utils
26ba25
    %endif
26ba25
%endif
26ba25
Requires: libusbx >= 1.0.19
26ba25
%if %{have_usbredir}
26ba25
Requires: usbredir >= 0.7.1
26ba25
%endif
902636
%if %{have_fdt}
902636
Requires: libfdt >= 1.6.0
902636
%endif
26ba25
26ba25
%rhev_ma_conflicts qemu-kvm
26ba25
26ba25
%description -n qemu-kvm-core
26ba25
qemu-kvm is an open source virtualizer that provides hardware
26ba25
emulation for the KVM hypervisor. qemu-kvm acts as a virtual
26ba25
machine monitor together with the KVM kernel modules, and emulates the
26ba25
hardware for a full system such as a PC and its associated peripherals.
26ba25
26ba25
26ba25
%package -n qemu-img
26ba25
Summary: QEMU command line tool for manipulating disk images
26ba25
Group: Development/Tools
26ba25
26ba25
%rhev_ma_conflicts qemu-img
26ba25
26ba25
%description -n qemu-img
26ba25
This package provides a command line tool for manipulating disk images.
26ba25
26ba25
%package -n qemu-kvm-common
26ba25
Summary: QEMU common files needed by all QEMU targets
26ba25
Group: Development/Tools
26ba25
Requires(post): /usr/bin/getent
26ba25
Requires(post): /usr/sbin/groupadd
26ba25
Requires(post): /usr/sbin/useradd
26ba25
Requires(post): systemd-units
26ba25
Requires(preun): systemd-units
26ba25
Requires(postun): systemd-units
26ba25
26ba25
%rhev_ma_conflicts qemu-kvm-common
26ba25
26ba25
%description -n qemu-kvm-common
26ba25
qemu-kvm is an open source virtualizer that provides hardware emulation for
26ba25
the KVM hypervisor.
26ba25
26ba25
This package provides documentation and auxiliary programs used with qemu-kvm.
26ba25
26ba25
26ba25
%package -n qemu-guest-agent
26ba25
Summary: QEMU guest agent
26ba25
Requires(post): systemd-units
26ba25
Requires(preun): systemd-units
26ba25
Requires(postun): systemd-units
26ba25
26ba25
%description -n qemu-guest-agent
26ba25
qemu-kvm is an open source virtualizer that provides hardware emulation for
26ba25
the KVM hypervisor.
26ba25
26ba25
This package provides an agent to run inside guests, which communicates
26ba25
with the host over a virtio-serial channel named "org.qemu.guest_agent.0"
26ba25
26ba25
This package does not need to be installed on the host OS.
26ba25
26ba25
%package tests
26ba25
Summary: tests for the qemu-kvm package
26ba25
Requires: %{name} = %{epoch}:%{version}-%{release}
26ba25
26ba25
%define testsdir %{_libdir}/%{name}/tests-src
26ba25
26ba25
%description tests
26ba25
The qemu-kvm-tests rpm contains tests that can be used to verify
26ba25
the functionality of the installed qemu-kvm package
26ba25
26ba25
Install this package if you want access to the avocado_qemu
26ba25
tests, or qemu-iotests.
26ba25
26ba25
%package  block-curl
26ba25
Summary: QEMU CURL block driver
26ba25
Requires: %{name}-common%{?_isa} = %{epoch}:%{version}-%{release}
26ba25
26ba25
%description block-curl
26ba25
This package provides the additional CURL block driver for QEMU.
26ba25
26ba25
Install this package if you want to access remote disks over
26ba25
http, https, ftp and other transports provided by the CURL library.
26ba25
26ba25
26ba25
%if %{have_gluster}
26ba25
%package  block-gluster
26ba25
Summary: QEMU Gluster block driver
26ba25
Requires: %{name}-common%{?_isa} = %{epoch}:%{version}-%{release}
26ba25
%description block-gluster
26ba25
This package provides the additional Gluster block driver for QEMU.
26ba25
26ba25
Install this package if you want to access remote Gluster storage.
26ba25
%endif
26ba25
26ba25
26ba25
%package  block-iscsi
26ba25
Summary: QEMU iSCSI block driver
26ba25
Requires: %{name}-common%{?_isa} = %{epoch}:%{version}-%{release}
26ba25
26ba25
%description block-iscsi
26ba25
This package provides the additional iSCSI block driver for QEMU.
26ba25
26ba25
Install this package if you want to access iSCSI volumes.
26ba25
26ba25
26ba25
%package  block-rbd
26ba25
Summary: QEMU Ceph/RBD block driver
26ba25
Requires: %{name}-common%{?_isa} = %{epoch}:%{version}-%{release}
26ba25
26ba25
%description block-rbd
26ba25
This package provides the additional Ceph/RBD block driver for QEMU.
26ba25
26ba25
Install this package if you want to access remote Ceph volumes
26ba25
using the rbd protocol.
26ba25
26ba25
26ba25
%package  block-ssh
26ba25
Summary: QEMU SSH block driver
26ba25
Requires: %{name}-common%{?_isa} = %{epoch}:%{version}-%{release}
26ba25
26ba25
%description block-ssh
26ba25
This package provides the additional SSH block driver for QEMU.
26ba25
26ba25
Install this package if you want to access remote disks using
26ba25
the Secure Shell (SSH) protocol.
26ba25
26ba25
26ba25
%prep
902636
%setup -n qemu-%{version}
26ba25
%autopatch -p1
26ba25
26ba25
%build
26ba25
%global buildarch %{kvm_target}-softmmu
26ba25
26ba25
# --build-id option is used for giving info to the debug packages.
26ba25
buildldflags="VL_LDFLAGS=-Wl,--build-id"
26ba25
26ba25
%global block_drivers_list qcow2,raw,file,host_device,nbd,iscsi,rbd,blkdebug,luks,null-co,nvme,copy-on-read,throttle
26ba25
26ba25
%if 0%{have_gluster}
26ba25
    %global block_drivers_list %{block_drivers_list},gluster
26ba25
%endif
26ba25
26ba25
./configure  \
26ba25
 --prefix="%{_prefix}" \
26ba25
 --libdir="%{_libdir}" \
26ba25
 --sysconfdir="%{_sysconfdir}" \
26ba25
 --interp-prefix=%{_prefix}/qemu-%M \
26ba25
 --localstatedir="%{_localstatedir}" \
26ba25
 --docdir="%{qemudocdir}" \
26ba25
 --libexecdir="%{_libexecdir}" \
26ba25
 --extra-ldflags="-Wl,--build-id -Wl,-z,relro -Wl,-z,now" \
26ba25
 --extra-cflags="%{optflags}" \
26ba25
 --with-pkgversion="%{name}-%{version}-%{release}" \
26ba25
 --with-confsuffix=/"%{name}" \
26ba25
 --firmwarepath=%{_prefix}/share/qemu-firmware \
26ba25
%if 0%{have_fdt}
26ba25
  --enable-fdt \
26ba25
%else
26ba25
  --disable-fdt \
26ba25
 %endif
26ba25
%if 0%{have_gluster}
26ba25
  --enable-glusterfs \
26ba25
%else
26ba25
  --disable-glusterfs \
26ba25
%endif
26ba25
  --enable-guest-agent \
36a43f
%ifnarch s390x
26ba25
  --enable-numa \
26ba25
%else
26ba25
  --disable-numa \
26ba25
%endif
26ba25
  --enable-rbd \
26ba25
%if 0%{have_librdma}
26ba25
  --enable-rdma \
26ba25
%else
26ba25
  --disable-rdma \
26ba25
%endif
902636
  --disable-pvrdma \
26ba25
  --enable-seccomp \
26ba25
%if 0%{have_spice}
26ba25
  --enable-spice \
26ba25
  --enable-smartcard \
26ba25
%else
26ba25
  --disable-spice \
26ba25
  --disable-smartcard \
26ba25
%endif
26ba25
%if 0%{have_opengl}
26ba25
  --enable-opengl \
26ba25
%else
26ba25
  --disable-opengl \
26ba25
%endif
26ba25
%if 0%{have_usbredir}
26ba25
  --enable-usb-redir \
26ba25
%else
26ba25
  --disable-usb-redir \
26ba25
%endif
26ba25
  --disable-tcmalloc \
26ba25
%ifarch x86_64
26ba25
  --enable-libpmem \
26ba25
%else
26ba25
  --disable-libpmem \
26ba25
%endif
26ba25
  --enable-vhost-user \
a19a21
%ifarch s390x
a19a21
  --enable-vhost-user-fs \
a19a21
%endif
902636
%ifarch %{ix86} x86_64
902636
  --enable-avx2 \
902636
%else
902636
  --disable-avx2 \
902636
%endif
26ba25
  --python=%{__python3} \
26ba25
  --target-list="%{buildarch}" \
26ba25
  --block-drv-rw-whitelist=%{block_drivers_list} \
26ba25
  --audio-drv-list= \
26ba25
  --block-drv-ro-whitelist=vmdk,vhdx,vpc,https,ssh \
26ba25
  --with-coroutine=ucontext \
a19a21
  --tls-priority=@QEMU,SYSTEM \
26ba25
  --disable-bluez \
26ba25
  --disable-brlapi \
902636
  --enable-cap-ng \
26ba25
  --enable-coroutine-pool \
26ba25
  --enable-curl \
26ba25
  --disable-curses \
26ba25
  --disable-debug-tcg \
26ba25
  --enable-docs \
26ba25
  --disable-gtk \
26ba25
  --enable-kvm \
26ba25
  --enable-libiscsi \
26ba25
  --disable-libnfs \
b38b0f
  --enable-libssh \
26ba25
  --enable-libusb \
26ba25
  --disable-bzip2 \
26ba25
  --enable-linux-aio \
26ba25
  --disable-live-block-migration \
26ba25
  --enable-lzo \
26ba25
  --enable-pie \
26ba25
  --disable-qom-cast-debug \
26ba25
  --disable-sdl \
26ba25
  --enable-snappy \
26ba25
  --disable-sparse \
26ba25
  --disable-strip \
26ba25
  --enable-tpm \
26ba25
  --enable-trace-backend=dtrace \
26ba25
  --disable-vde \
26ba25
  --disable-vhost-scsi \
902636
  --disable-vxhs \
26ba25
  --disable-virtfs \
26ba25
  --disable-vnc-jpeg \
26ba25
  --disable-vte \
26ba25
  --enable-vnc-png \
26ba25
  --enable-vnc-sasl \
26ba25
  --enable-werror \
26ba25
  --disable-xen \
26ba25
  --disable-xfsctl \
26ba25
  --enable-gnutls \
26ba25
  --enable-gcrypt \
26ba25
  --disable-nettle \
26ba25
  --enable-attr \
26ba25
  --disable-bsd-user \
26ba25
  --disable-cocoa \
26ba25
  --enable-debug-info \
26ba25
  --disable-guest-agent-msi \
26ba25
  --disable-hax \
26ba25
  --disable-jemalloc \
26ba25
  --disable-linux-user \
26ba25
  --enable-modules \
26ba25
  --disable-netmap \
26ba25
  --disable-replication \
26ba25
  --enable-system \
26ba25
  --enable-tools \
26ba25
  --disable-user \
26ba25
  --enable-vhost-net \
26ba25
  --enable-vhost-vsock \
26ba25
  --enable-vnc \
26ba25
  --enable-mpath \
26ba25
  --disable-xen-pci-passthrough \
26ba25
  --enable-tcg \
26ba25
  --with-git=git \
26ba25
  --disable-sanitizers \
26ba25
  --disable-hvf \
26ba25
  --disable-whpx \
26ba25
  --enable-malloc-trim \
26ba25
  --disable-membarrier \
26ba25
  --disable-vhost-crypto \
26ba25
  --disable-libxml2 \
26ba25
  --enable-capstone \
26ba25
  --disable-git-update \
26ba25
  --disable-crypto-afalg \
902636
  --disable-debug-mutex \
26ba25
  --disable-bochs \
26ba25
  --disable-cloop \
26ba25
  --disable-dmg \
26ba25
  --disable-qcow1 \
26ba25
  --disable-vdi \
26ba25
  --disable-vvfat \
26ba25
  --disable-qed \
26ba25
  --disable-parallels \
902636
  --disable-sheepdog \
902636
  --disable-auth-pam \
902636
  --enable-iconv \
902636
  --disable-lzfse \
902636
  --enable-vhost-kernel \
902636
  --disable-virglrenderer \
902636
  --without-default-devices
26ba25
26ba25
echo "config-host.mak contents:"
26ba25
echo "==="
26ba25
cat config-host.mak
26ba25
echo "==="
26ba25
26ba25
make V=1 %{?_smp_mflags} $buildldflags
26ba25
26ba25
# Setup back compat qemu-kvm binary
902636
%{__python3} scripts/tracetool.py --backend dtrace --format stap \
902636
  --group=all --binary %{_libexecdir}/qemu-kvm --probe-prefix qemu.kvm \
902636
  trace-events-all > qemu-kvm.stp
902636
902636
%{__python3} scripts/tracetool.py --backends=dtrace --format=log-stap \
902636
  --group=all --binary %{_libexecdir}/qemu-kvm --probe-prefix qemu.kvm \
902636
  trace-events-all > qemu-kvm-log.stp
26ba25
26ba25
%{__python3} scripts/tracetool.py --backend dtrace --format simpletrace-stap \
902636
  --group=all --binary %{_libexecdir}/qemu-kvm --probe-prefix qemu.kvm \
902636
  trace-events-all > qemu-kvm-simpletrace.stp
26ba25
26ba25
cp -a %{kvm_target}-softmmu/qemu-system-%{kvm_target} qemu-kvm
26ba25
26ba25
gcc %{SOURCE6} $RPM_OPT_FLAGS $RPM_LD_FLAGS -o ksmctl
26ba25
gcc %{SOURCE35} $RPM_OPT_FLAGS $RPM_LD_FLAGS -o udev-kvm-check
26ba25
902636
%ifarch s390x
902636
    # Copy the built new images into place for "make check":
902636
    cp pc-bios/s390-ccw/s390-ccw.img pc-bios/s390-ccw/s390-netboot.img pc-bios/
902636
%endif
902636
26ba25
%install
26ba25
%define _udevdir %(pkg-config --variable=udevdir udev)
26ba25
%define _udevrulesdir %{_udevdir}/rules.d
26ba25
26ba25
install -D -p -m 0644 %{SOURCE4} $RPM_BUILD_ROOT%{_unitdir}/ksm.service
26ba25
install -D -p -m 0644 %{SOURCE5} $RPM_BUILD_ROOT%{_sysconfdir}/sysconfig/ksm
26ba25
install -D -p -m 0755 ksmctl $RPM_BUILD_ROOT%{_libexecdir}/ksmctl
26ba25
26ba25
install -D -p -m 0644 %{SOURCE7} $RPM_BUILD_ROOT%{_unitdir}/ksmtuned.service
26ba25
install -D -p -m 0755 %{SOURCE8} $RPM_BUILD_ROOT%{_sbindir}/ksmtuned
26ba25
install -D -p -m 0644 %{SOURCE9} $RPM_BUILD_ROOT%{_sysconfdir}/ksmtuned.conf
26ba25
install -D -p -m 0644 %{SOURCE26} $RPM_BUILD_ROOT%{_sysconfdir}/modprobe.d/vhost.conf
26ba25
%ifarch s390x
26ba25
    install -D -p -m 0644 %{SOURCE30} $RPM_BUILD_ROOT%{_sysconfdir}/modprobe.d/kvm.conf
26ba25
%else
26ba25
%ifarch %{ix86} x86_64
26ba25
    install -D -p -m 0644 %{SOURCE31} $RPM_BUILD_ROOT%{_sysconfdir}/modprobe.d/kvm.conf
26ba25
%else
26ba25
    install -D -p -m 0644 %{SOURCE27} $RPM_BUILD_ROOT%{_sysconfdir}/modprobe.d/kvm.conf
26ba25
%endif
26ba25
%endif
26ba25
26ba25
mkdir -p $RPM_BUILD_ROOT%{_bindir}/
26ba25
mkdir -p $RPM_BUILD_ROOT%{_udevrulesdir}/
26ba25
mkdir -p $RPM_BUILD_ROOT%{_datadir}/%{name}
26ba25
26ba25
# Create new directories and put them all under tests-src
902636
mkdir -p $RPM_BUILD_ROOT%{testsdir}/python
902636
mkdir -p $RPM_BUILD_ROOT%{testsdir}/tests
26ba25
mkdir -p $RPM_BUILD_ROOT%{testsdir}/tests/acceptance
26ba25
mkdir -p $RPM_BUILD_ROOT%{testsdir}/tests/qemu-iotests
26ba25
mkdir -p $RPM_BUILD_ROOT%{testsdir}/scripts/qmp
26ba25
26ba25
install -p -m 0755 udev-kvm-check $RPM_BUILD_ROOT%{_udevdir}
26ba25
install -p -m 0644 %{SOURCE34} $RPM_BUILD_ROOT%{_udevrulesdir}
26ba25
26ba25
install -m 0644 scripts/dump-guest-memory.py \
26ba25
                $RPM_BUILD_ROOT%{_datadir}/%{name}
26ba25
26ba25
# Install avocado_qemu tests
26ba25
cp -R tests/acceptance/* $RPM_BUILD_ROOT%{testsdir}/tests/acceptance/
26ba25
26ba25
# Install qemu.py and qmp/ scripts required to run avocado_qemu tests
902636
cp -R python/qemu $RPM_BUILD_ROOT%{testsdir}/python
26ba25
cp -R scripts/qmp/* $RPM_BUILD_ROOT%{testsdir}/scripts/qmp
26ba25
install -p -m 0755 tests/Makefile.include $RPM_BUILD_ROOT%{testsdir}/tests/
26ba25
26ba25
# Install qemu-iotests
26ba25
cp -R tests/qemu-iotests/* $RPM_BUILD_ROOT%{testsdir}/tests/qemu-iotests/
26ba25
# Avoid ambiguous 'python' interpreter name
902636
find $RPM_BUILD_ROOT%{testsdir}/tests/qemu-iotests/* -maxdepth 1 -type f -exec sed -i -e '1 s+/usr/bin/env \(python\|python3\)+%{__python3}+' {} \;
902636
find $RPM_BUILD_ROOT%{testsdir}/scripts/qmp/* -maxdepth 1 -type f -exec sed -i -e '1 s+/usr/bin/env \(python\|python3\)+%{__python3}+' {} \;
902636
find $RPM_BUILD_ROOT%{testsdir}/scripts/qmp/* -maxdepth 1 -type f -exec sed -i -e '1 s+/usr/bin/\(python\|python3\)+%{__python3}+' {} \;
26ba25
26ba25
install -p -m 0644 %{SOURCE36} $RPM_BUILD_ROOT%{testsdir}/README
26ba25
26ba25
make DESTDIR=$RPM_BUILD_ROOT \
26ba25
    sharedir="%{_datadir}/%{name}" \
26ba25
    datadir="%{_datadir}/%{name}" \
26ba25
    install
26ba25
26ba25
mkdir -p $RPM_BUILD_ROOT%{_datadir}/systemtap/tapset
26ba25
26ba25
# Install qemu-guest-agent service and udev rules
26ba25
install -m 0644 %{_sourcedir}/qemu-guest-agent.service %{buildroot}%{_unitdir}
26ba25
install -m 0644 %{_sourcedir}/qemu-ga.sysconfig %{buildroot}%{_sysconfdir}/sysconfig/qemu-ga
26ba25
install -m 0644 %{_sourcedir}/99-qemu-guest-agent.rules %{buildroot}%{_udevrulesdir}
26ba25
26ba25
# - the fsfreeze hook script:
26ba25
install -D --preserve-timestamps \
26ba25
            scripts/qemu-guest-agent/fsfreeze-hook \
26ba25
            $RPM_BUILD_ROOT%{_sysconfdir}/qemu-ga/fsfreeze-hook
a19a21
# Workaround for the missing /etc/qemu-kvm/fsfreeze-hook
a19a21
# Please, do not carry this over to RHEL-9
a19a21
mkdir -p $RPM_BUILD_ROOT%{_sysconfdir}/qemu-kvm/
a19a21
ln -s %{_sysconfdir}/qemu-ga/fsfreeze-hook \
a19a21
      $RPM_BUILD_ROOT%{_sysconfdir}/qemu-kvm/fsfreeze-hook
26ba25
26ba25
# - the directory for user scripts:
26ba25
mkdir $RPM_BUILD_ROOT%{_sysconfdir}/qemu-ga/fsfreeze-hook.d
26ba25
26ba25
# - and the fsfreeze script samples:
26ba25
mkdir --parents $RPM_BUILD_ROOT%{_datadir}/%{name}/qemu-ga/fsfreeze-hook.d/
26ba25
install --preserve-timestamps --mode=0644 \
26ba25
             scripts/qemu-guest-agent/fsfreeze-hook.d/*.sample \
26ba25
             $RPM_BUILD_ROOT%{_datadir}/%{name}/qemu-ga/fsfreeze-hook.d/
26ba25
26ba25
# - Install dedicated log directory:
26ba25
mkdir -p -v $RPM_BUILD_ROOT%{_localstatedir}/log/qemu-ga/
26ba25
26ba25
mkdir -p $RPM_BUILD_ROOT%{_bindir}
26ba25
install -c -m 0755  qemu-ga ${RPM_BUILD_ROOT}%{_bindir}/qemu-ga
26ba25
26ba25
mkdir -p $RPM_BUILD_ROOT%{_mandir}/man8
26ba25
26ba25
install -m 0755 qemu-kvm $RPM_BUILD_ROOT%{_libexecdir}/
26ba25
install -m 0644 qemu-kvm.stp $RPM_BUILD_ROOT%{_datadir}/systemtap/tapset/
902636
install -m 0644 qemu-kvm-log.stp $RPM_BUILD_ROOT%{_datadir}/systemtap/tapset/
26ba25
install -m 0644 qemu-kvm-simpletrace.stp $RPM_BUILD_ROOT%{_datadir}/systemtap/tapset/
26ba25
902636
rm $RPM_BUILD_ROOT/%{_datadir}/applications/qemu.desktop
26ba25
rm $RPM_BUILD_ROOT%{_bindir}/qemu-system-%{kvm_target}
26ba25
rm $RPM_BUILD_ROOT%{_datadir}/systemtap/tapset/qemu-system-%{kvm_target}.stp
26ba25
rm $RPM_BUILD_ROOT%{_datadir}/systemtap/tapset/qemu-system-%{kvm_target}-simpletrace.stp
902636
rm $RPM_BUILD_ROOT%{_datadir}/systemtap/tapset/qemu-system-%{kvm_target}-log.stp
902636
rm $RPM_BUILD_ROOT%{_bindir}/elf2dmp
26ba25
26ba25
# Install simpletrace
26ba25
install -m 0755 scripts/simpletrace.py $RPM_BUILD_ROOT%{_datadir}/%{name}/simpletrace.py
26ba25
# Avoid ambiguous 'python' interpreter name
26ba25
sed -i -e '1 s/python/python3/' $RPM_BUILD_ROOT%{_datadir}/%{name}/simpletrace.py
26ba25
mkdir -p $RPM_BUILD_ROOT%{_datadir}/%{name}/tracetool
26ba25
install -m 0644 -t $RPM_BUILD_ROOT%{_datadir}/%{name}/tracetool scripts/tracetool/*.py
26ba25
mkdir -p $RPM_BUILD_ROOT%{_datadir}/%{name}/tracetool/backend
26ba25
install -m 0644 -t $RPM_BUILD_ROOT%{_datadir}/%{name}/tracetool/backend scripts/tracetool/backend/*.py
26ba25
mkdir -p $RPM_BUILD_ROOT%{_datadir}/%{name}/tracetool/format
26ba25
install -m 0644 -t $RPM_BUILD_ROOT%{_datadir}/%{name}/tracetool/format scripts/tracetool/format/*.py
26ba25
26ba25
mkdir -p $RPM_BUILD_ROOT%{qemudocdir}
902636
install -p -m 0644 -t ${RPM_BUILD_ROOT}%{qemudocdir} Changelog README.rst README.systemtap COPYING COPYING.LIB LICENSE docs/interop/qmp-spec.txt
26ba25
chmod -x ${RPM_BUILD_ROOT}%{_mandir}/man1/*
26ba25
chmod -x ${RPM_BUILD_ROOT}%{_mandir}/man8/*
26ba25
26ba25
install -D -p -m 0644 qemu.sasl $RPM_BUILD_ROOT%{_sysconfdir}/sasl2/%{name}.conf
26ba25
26ba25
# Provided by package openbios
26ba25
rm -rf ${RPM_BUILD_ROOT}%{_datadir}/%{name}/openbios-ppc
26ba25
rm -rf ${RPM_BUILD_ROOT}%{_datadir}/%{name}/openbios-sparc32
26ba25
rm -rf ${RPM_BUILD_ROOT}%{_datadir}/%{name}/openbios-sparc64
26ba25
# Provided by package SLOF
26ba25
rm -rf ${RPM_BUILD_ROOT}%{_datadir}/%{name}/slof.bin
26ba25
26ba25
# Remove unpackaged files.
26ba25
rm -rf ${RPM_BUILD_ROOT}%{_datadir}/%{name}/palcode-clipper
26ba25
rm -rf ${RPM_BUILD_ROOT}%{_datadir}/%{name}/petalogix*.dtb
26ba25
rm -f ${RPM_BUILD_ROOT}%{_datadir}/%{name}/bamboo.dtb
26ba25
rm -f ${RPM_BUILD_ROOT}%{_datadir}/%{name}/ppc_rom.bin
26ba25
rm -rf ${RPM_BUILD_ROOT}%{_datadir}/%{name}/s390-zipl.rom
26ba25
rm -rf ${RPM_BUILD_ROOT}%{_datadir}/%{name}/u-boot.e500
26ba25
rm -rf ${RPM_BUILD_ROOT}%{_datadir}/%{name}/qemu_vga.ndrv
26ba25
rm -rf ${RPM_BUILD_ROOT}%{_datadir}/%{name}/skiboot.lid
26ba25
26ba25
rm -rf ${RPM_BUILD_ROOT}%{_datadir}/%{name}/s390-ccw.img
902636
rm -rf ${RPM_BUILD_ROOT}%{_datadir}/%{name}/s390-netboot.img
26ba25
rm -rf ${RPM_BUILD_ROOT}%{_datadir}/%{name}/hppa-firmware.img
26ba25
rm -rf ${RPM_BUILD_ROOT}%{_datadir}/%{name}/canyonlands.dtb
26ba25
rm -rf ${RPM_BUILD_ROOT}%{_datadir}/%{name}/u-boot-sam460-20100605.bin
26ba25
902636
rm -rf ${RPM_BUILD_ROOT}%{_datadir}/%{name}/firmware
902636
rm -rf ${RPM_BUILD_ROOT}%{_datadir}/%{name}/edk2-*.fd
902636
rm -rf ${RPM_BUILD_ROOT}%{_datadir}/%{name}/edk2-licenses.txt
902636
902636
rm -rf ${RPM_BUILD_ROOT}%{_datadir}/%{name}/opensbi-riscv32-virt-fw_jump.bin
902636
rm -rf ${RPM_BUILD_ROOT}%{_datadir}/%{name}/opensbi-riscv64-sifive_u-fw_jump.bin
902636
rm -rf ${RPM_BUILD_ROOT}%{_datadir}/%{name}/opensbi-riscv64-virt-fw_jump.bin
902636
rm -rf ${RPM_BUILD_ROOT}%{_datadir}/%{name}/qemu-nsis.bmp
902636
902636
rm -rf ${RPM_BUILD_ROOT}%{_libdir}/qemu-kvm/ui-spice-app.so
902636
26ba25
%ifarch s390x
902636
    # Use the s390-*.imgs that we've just built, not the pre-built ones
26ba25
    install -m 0644 pc-bios/s390-ccw/s390-ccw.img $RPM_BUILD_ROOT%{_datadir}/%{name}/
902636
    install -m 0644 pc-bios/s390-ccw/s390-netboot.img $RPM_BUILD_ROOT%{_datadir}/%{name}/
26ba25
%endif
26ba25
26ba25
%ifnarch x86_64
26ba25
    rm -rf ${RPM_BUILD_ROOT}%{_datadir}/%{name}/kvmvapic.bin
26ba25
    rm -rf ${RPM_BUILD_ROOT}%{_datadir}/%{name}/linuxboot.bin
26ba25
    rm -rf ${RPM_BUILD_ROOT}%{_datadir}/%{name}/multiboot.bin
902636
    rm -rf ${RPM_BUILD_ROOT}%{_datadir}/%{name}/pvh.bin
26ba25
%endif
26ba25
26ba25
# Remove sparc files
26ba25
rm -rf ${RPM_BUILD_ROOT}%{_datadir}/%{name}/QEMU,tcx.bin
26ba25
rm -rf ${RPM_BUILD_ROOT}%{_datadir}/%{name}/QEMU,cgthree.bin
26ba25
26ba25
# Remove ivshmem example programs
26ba25
rm -rf ${RPM_BUILD_ROOT}%{_bindir}/ivshmem-client
26ba25
rm -rf ${RPM_BUILD_ROOT}%{_bindir}/ivshmem-server
26ba25
26ba25
# Remove efi roms
26ba25
rm -rf ${RPM_BUILD_ROOT}%{_datadir}/%{name}/efi*.rom
26ba25
26ba25
# Provided by package ipxe
26ba25
rm -rf ${RPM_BUILD_ROOT}%{_datadir}/%{name}/pxe*rom
26ba25
# Provided by package vgabios
26ba25
rm -rf ${RPM_BUILD_ROOT}%{_datadir}/%{name}/vgabios*bin
26ba25
# Provided by package seabios
26ba25
rm -rf ${RPM_BUILD_ROOT}%{_datadir}/%{name}/bios*.bin
26ba25
# Provided by package sgabios
26ba25
rm -rf ${RPM_BUILD_ROOT}%{_datadir}/%{name}/sgabios.bin
26ba25
26ba25
# the pxe gpxe images will be symlinks to the images on
26ba25
# /usr/share/ipxe, as QEMU doesn't know how to look
26ba25
# for other paths, yet.
26ba25
pxe_link() {
26ba25
    ln -s ../ipxe.efi/$2.rom %{buildroot}%{_datadir}/%{name}/efi-$1.rom
26ba25
}
26ba25
36a43f
%ifnarch aarch64 s390x
26ba25
pxe_link e1000 8086100e
26ba25
pxe_link ne2k_pci 10ec8029
26ba25
pxe_link pcnet 10222000
26ba25
pxe_link rtl8139 10ec8139
26ba25
pxe_link virtio 1af41000
26ba25
pxe_link e1000e 808610d3
26ba25
%endif
26ba25
26ba25
rom_link() {
26ba25
    ln -s $1 %{buildroot}%{_datadir}/%{name}/$2
26ba25
}
26ba25
36a43f
%ifnarch aarch64 s390x
26ba25
  rom_link ../seavgabios/vgabios-isavga.bin vgabios