qemu-kvm-block-curl-15:4.2.0-59.module_el8.5.0+1002+36725df2 >  A a+7U]Ge.&E*7z=(\*>r -bk?xkej25_ThJS cJ-I=]Y&o,mr;X\kw>MB-=)-j't\~x NvMUԃã Lgqt4NT(ӟlouv~ zV@h1X]]ث~l6y+_>ߠ__63Kcir׀hO>0J5`$;UXzObtL<(460700027258faa5677929c6a41fba9fbea546d5047a244426bfd5ab64ae73221e2e956c773ae05587c9acb863ee3516a6239d96+a+7U]ƛ-aiI%r-(1ߏu_[$0? 0 OSOZw{!E'To~fNJ)':IP;m9e ~Jʺ9?3eB ~@óRLPeBzayD$ I|r6Vq-=DwH:I6 {Ru?|u˙,FpSTK 'Ӯ5aQ0$6g5A D-9lS{ߦ-VcQ ~ mg 䭬$)kE$?{oʄEpl8Aa{ת{nSc Ù\RTs+1U#Q)k PyLN;!V0wX@ȘU2Q m,mig 4QȌ[jhlWj*&x_yQ=k%fL[K,N! t 9l `1X9D>p>?sd< @ W 8<CJe     0 `p| (d8l~9d~:'~G<HLI\X`Yh\޼]^bXdefltuvwxyHLCqemu-kvm-block-curl4.2.059.module_el8.5.0+1002+36725df2QEMU CURL block driverThis package provides the additional CURL block driver for QEMU. Install this package if you want to access remote disks over http, https, ftp and other transports provided by the CURL library.ax86-01.mbox.centos.orgPCentOSCentOSGPLv2 and GPLv2+ and CC-BYCentOS Buildsys Development/Toolshttp://www.qemu.org/linuxx86_64,PAAaaaa8b21fb3dfbfd25cd64f43ff50fa778da1c6245ef4fae5e26d07c8604c37144c4../../../../usr/lib64/qemu-kvm/block-curl.sorootrootrootrootrootrootrootrootqemu-kvm-4.2.0-59.module_el8.5.0+1002+36725df2.src.rpmqemu-kvm-block-curlqemu-kvm-block-curl(x86-64)@@@@@@@@@@@@@@@@@@@@@    @libc.so.6()(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libcap-ng.so.0()(64bit)libcurl.so.4()(64bit)libdl.so.2()(64bit)libgcc_s.so.1()(64bit)libgcrypt.so.20()(64bit)libglib-2.0.so.0()(64bit)libgmodule-2.0.so.0()(64bit)libgnutls.so.30()(64bit)libgpg-error.so.0()(64bit)libgthread-2.0.so.0()(64bit)libm.so.6()(64bit)libpthread.so.0()(64bit)librt.so.1()(64bit)libstdc++.so.6()(64bit)libutil.so.1()(64bit)libz.so.1()(64bit)qemu-kvm-common(x86-64)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)rtld(GNU_HASH)15:4.2.0-59.module_el8.5.0+1002+36725df23.0.4-14.6.0-14.0-15.2-14.14.3aV@a@a @a@`@`]``P@```N@`P`F`?z@`#`>`U` l`x@_@_1@__@_@___Wr@_=@_16_*@_c^@^^^y^@^@^O@^AE^*@^r^ @]]@]]e@]ʞ]c@]{]nU]Z@]V]B@]6]#0@]G@]@] u@]:\\\\ڭ\ڭ\\s@\-@\@\@\r@\@\7\u*@\s\ac\N\I\E@\8@\8@\4\4\4\/J\ @\@\\@\\\ @[1[@[0[[[[ā@[[[;@[;@[R@[[@[@[@[s[[v[ug@[r@[m~@[m~@[m~@[m~@[h8@[`O@[W[CN@[+@ZZZ@ZЛZJ@Z1@Jon Maloy - 4.2.0-59Danilo Cesar Lemes de Paula - 4.2.0-58.el8Miroslav Rezanina - 4.2.0-57Miroslav Rezanina - 4.2.0-56Danilo Cesar Lemes de Paula - 4.2.0-55.el8Danilo Cesar Lemes de Paula - 4.2.0-54.el8Danilo Cesar Lemes de Paula - 4.2.0-53.el8Danilo Cesar Lemes de Paula - 4.2.0-52.el8Danilo Cesar Lemes de Paula - 4.2.0-51.el8Danilo Cesar Lemes de Paula - 4.2.0-50.el8Danilo Cesar Lemes de Paula - 4.2.0-49.el8Danilo Cesar Lemes de Paula - 4.2.0-48.el8Danilo Cesar Lemes de Paula - 4.2.0-47.el8Danilo Cesar Lemes de Paula - 4.2.0-46.el8Jon Maloy - 4.2.0-45.el8Jon Maloy - 4.2.0-44.el8Danilo Cesar Lemes de Paula - 4.2.0-43.el8Danilo Cesar Lemes de Paula - 4.2.0-42.el8Danilo Cesar Lemes de Paula - 4.2.0-41.el8Danilo Cesar Lemes de Paula - 4.2.0-40.el8Danilo Cesar Lemes de Paula - 4.2.0-39.el8Danilo Cesar Lemes de Paula - 4.2.0-38.el8Danilo Cesar Lemes de Paula - 4.2.0-37.el8Danilo Cesar Lemes de Paula - 4.2.0-36.el8Danilo Cesar Lemes de Paula - 4.2.0-35.el8Danilo Cesar Lemes de Paula - 4.2.0-34.el8Danilo Cesar Lemes de Paula - 4.2.0-33.el8Danilo Cesar Lemes de Paula - 4.2.0-32.el8Danilo Cesar Lemes de Paula - 4.2.0-31.el8Danilo Cesar Lemes de Paula - 4.2.0-30.el8Danilo Cesar Lemes de Paula - 4.2.0-29.el8Danilo Cesar Lemes de Paula - 4.2.0-28.el8Danilo C. L. de Paula - 4.2.0Danilo C. L. de Paula - 4.2.0-25Danilo C. L. de Paula - 4.2.0-23.el8Danilo C. L. de Paula - 4.2.0Danilo Cesar Lemes de Paula - 2.12.0-99.el8Danilo Cesar Lemes de Paula - 2.12.0-98.el8Miroslav Rezanina - 2.12.0-97.el8Danilo Cesar Lemes de Paula - 2.12.0-96.el8Danilo Cesar Lemes de Paula - 2.12.0-95.el8Danilo Cesar Lemes de Paula - 2.12.0-94.el8Danilo Cesar Lemes de Paula - 2.12.0-93.el8Danilo Cesar Lemes de Paula - 2.12.0-92.el8Danilo Cesar Lemes de Paula - 2.12.0-91.el8Danilo Cesar Lemes de Paula - 2.12.0-90.el8Danilo Cesar Lemes de Paula - 2.12.0-89.el8Danilo Cesar Lemes de Paula - 2.12.0-88.el8Danilo Cesar Lemes de Paula - 2.12.0-86.el8Danilo Cesar Lemes de Paula - 2.12.0-85.el8Danilo Cesar Lemes de Paula - 2.12.0-84.el8Danilo Cesar Lemes de Paula - 2.12.0-83.el8Danilo Cesar Lemes de Paula - 2.12.0-82.el8Miroslav Rezanina - 2.12.0-81.el8Danilo Cesar Lemes de Paula - 2.12.0-80.el8Danilo de Paula - 15:2.12.0-79Miroslav Rezanina - 2.12.0-78.el8Danilo Cesar Lemes de Paula - 2.12.0-77.el8Danilo Cesar Lemes de Paula - 2.12.0-76.el8Danilo Cesar Lemes de Paula - 2.12.0-75.el8Danilo Cesar Lemes de Paula - 2.12.0-74.el8Danilo Cesar Lemes de Paula - 2.12.0-73.el8Danilo Cesar Lemes de Paula - 2.12.0-72.el8Danilo Cesar Lemes de Paula - 2.12.0-71.el8Danilo Cesar Lemes de Paula - 2.12.0-70.el8Danilo Cesar Lemes de Paula - 2.12.0-69.el8Danilo Cesar Lemes de Paula - 2.12.0-68.el8Danilo Cesar Lemes de Paula - 2.12.0-67.el8Danilo Cesar Lemes de Paula - 2.12.0-66.el8Danilo Cesar Lemes de Paula - 2.12.0-65.el8Danilo Cesar Lemes de Paula - 2.12.0-64.el8Danilo Cesar Lemes de Paula - 2.12.0-63.el8Danilo Cesar Lemes de Paula - 2.12.0-62.el8Danilo Cesar Lemes de Paula - 2.12.0-61.el8Danilo Cesar Lemes de Paula - 2.12.0-60.el8Danilo Cesar Lemes de Paula - 2.12.0-59.el8Danilo Cesar Lemes de Paula - 2.12.0-58.el8Danilo Cesar Lemes de Paula - 2.12.0-57.el8Danilo Cesar Lemes de Paula - 2.12.0-56.el8Danilo Cesar Lemes de Paula - 2.12.0-55.el8Danilo Cesar Lemes de Paula - 2.12.0-54.el8Danilo Cesar Lemes de Paula - 2.12.0-53.el8Danilo Cesar Lemes de Paula - 2.12.0-52.el8Danilo Cesar Lemes de Paula - 2.12.0-51.el8Danilo Cesar Lemes de Paula - 2.12.0-51Danilo Cesar Lemes de Paula - Danilo Cesar Lemes de Paula - qemu-kvm-2.12.0-48 Danilo Cesar Lemes de Paula - qemu-kvm-2.12.0-47Danilo Cesar Lemes de Paula - qemu-kvm-2.12.0-46Danilo Cesar Lemes de Paula - qemu-kvm-2.12.0-45Danilo Cesar Lemes de Paula - qemu-kvm-2.12.0-44Danilo Cesar Lemes de Paula - qemu-kvm-2.12.0-43Danilo Cesar Lemes de Paula - 2.12.0-42.el8Danilo Cesar Lemes de Paula - 2.12.0-41.el8Danilo Cesar Lemes de Paula - 2.12.0-40.el8Danilo Cesar Lemes de Paula - 2.12.0-39.el8Danilo Cesar Lemes de Paula - 2.12.0-38.el8Danilo Cesar Lemes de Paula - 2.12.0-37.el8Danilo Cesar Lemes de Paula - 2.12.0-36.el8Danilo Cesar Lemes de Paula - 2.12.0-35.el8Danilo Cesar Lemes de Paula - 2.12.0-34.el8Danilo Cesar Lemes de Paula - 2.12.0-33.el8Danilo Cesar Lemes de Paula - 2.12.0-32.el8Danilo Cesar Lemes de Paula - 2.12.0-31.el8Danilo Cesar Lemes de Paula - 2.12.0-30.el8Danilo Cesar Lemes de Paula - 2.12.0-29.el8Danilo Cesar Lemes de Paula - 2.12.0-28.el8Danilo Cesar Lemes de Paula - 2.12.0-27.el8Danilo Cesar Lemes de Paula - 2.12.0-26.el8Danilo Cesar Lemes de Paula - 2.12.0-25.el8Danilo Cesar Lemes de Paula - 2.12.0-24.el8Danilo Cesar Lemes de Paula - 2.12.0-23.el8Danilo Cesar Lemes de Paula - 2.12.0-22.el8Danilo Cesar Lemes de Paula - 2.12.0-20.el8Danilo Cesar Lemes de Paula - 2.12.0-18.el8Danilo Cesar Lemes de Paula - 2.12.0-17.el8Danilo Cesar Lemes de Paula - 2.12.0-16.el8Danilo Cesar Lemes de Paula - 2.12.0-15.el8Danilo Cesar Lemes de Paula - 2.12.0-14.el8Danilo C. L. de Paula - 2.12.0-13.el8Danilo C. L. de Paula - 2.12.0-11.el8.1Danilo de Paula - 2.12.0-11.el8Danilo de Paula - 2.12.0-10.elDanilo de Paula - 2.11.0-7.el8Danilo de Paula - 2.11.0-6.el8Danilo de Paula - 2.11.0-5.el8- kvm-scsi-make-io_timeout-configurable.patch [bz#1994041] - Resolves: bz#1994041 (qemu-kvm scsi: change default passthrough timeout to non-infinite)- kvm-virtiofsd-Disable-remote-posix-locks-by-default.patch [bz#1967496] - kvm-virtiofsd-Fix-the-help-message-of-posix-lock.patch [bz#1967496] - Resolves: bz#1967496 ([virtio-fs] nfs/xfstest generic/089 generic/478 generic/632 failed)- kvm-aio-wait-delegate-polling-of-main-AioContext-if-BQL-.patch [bz#1969848] - kvm-async-use-explicit-memory-barriers.patch [bz#1969848] - Resolves: bz#1969848 (qemu-img convert hangs on aarch64)- kvm-glib-compat-add-g_unix_get_passwd_entry_qemu.patch [bz#1967716] - kvm-qga-add-ssh-add-remove-authorized-keys.patch [bz#1967716] - kvm-qga-add-reset-argument-to-ssh-add-authorized-keys.patch [bz#1967716] - kvm-qga-add-ssh-get-authorized-keys.patch [bz#1967716] - kvm-Add-mtod_check.patch [bz#1970819 bz#1970835 bz#1970843 bz#1970853] - kvm-bootp-limit-vendor-specific-area-to-input-packet-mem.patch [bz#1970819 bz#1970835 bz#1970843 bz#1970853] - kvm-bootp-check-bootp_input-buffer-size.patch [bz#1970819] - kvm-upd6-check-udp6_input-buffer-size.patch [bz#1970835] - kvm-tftp-check-tftp_input-buffer-size.patch [bz#1970843] - kvm-tftp-introduce-a-header-structure.patch [bz#1970819 bz#1970835 bz#1970843 bz#1970853] - kvm-udp-check-upd_input-buffer-size.patch [bz#1970853] - kvm-Fix-DHCP-broken-in-libslirp-v4.6.0.patch [bz#1970819 bz#1970835 bz#1970843 bz#1970853] - kvm-net-check-if-the-file-descriptor-is-valid-before-usi.patch [bz#1982134] - kvm-net-detect-errors-from-probing-vnet-hdr-flag-for-TAP.patch [bz#1982134] - Resolves: bz#1967716 (RFE: rebuild guest agent to include public ssh injection api support) - Resolves: bz#1970819 (CVE-2021-3592 virt:rhel/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (bootp) [rhel-8]) - Resolves: bz#1970835 (CVE-2021-3593 virt:rhel/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp6) [rhel-8]) - Resolves: bz#1970843 (CVE-2021-3595 virt:rhel/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (tftp) [rhel-8]) - Resolves: bz#1970853 (CVE-2021-3594 virt:rhel/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp) [rhel-8]) - Resolves: bz#1982134 (QEMU core dump while booting guest with a non-exist fd on tap)- kvm-net-introduce-qemu_receive_packet.patch [bz#1932917] - kvm-e1000-switch-to-use-qemu_receive_packet-for-loopback.patch [bz#1932917] - kvm-dp8393x-switch-to-use-qemu_receive_packet-for-loopba.patch [bz#1932917] - kvm-sungem-switch-to-use-qemu_receive_packet-for-loopbac.patch [bz#1932917] - kvm-tx_pkt-switch-to-use-qemu_receive_packet_iov-for-loo.patch [bz#1932917] - kvm-rtl8139-switch-to-use-qemu_receive_packet-for-loopba.patch [bz#1932917] - kvm-pcnet-switch-to-use-qemu_receive_packet-for-loopback.patch [bz#1932917] - kvm-cadence_gem-switch-to-use-qemu_receive_packet-for-lo.patch [bz#1932917] - kvm-lan9118-switch-to-use-qemu_receive_packet-for-loopba.patch [bz#1932917] - Resolves: bz#1932917 (CVE-2021-3416 virt:rhel/qemu-kvm: QEMU: net: infinite loop in loopback mode may lead to stack overflow)- kvm-redhat-Fix-unversioned-Obsoletes-warning.patch [bz#1967329] - Resolves: bz#1967329 (Make qemu-kvm use versioned obsoletes for qemu-kvm-ma and qemu-kvm-rhev)- kvm-virtiofsd-Whitelist-fchmod.patch [bz#1967914] - kvm-spapr-Fix-EEH-capability-issue-on-KVM-guest-for-PCI-.patch [bz#1957866] - kvm-Compress-lines-for-immediate-return.patch [bz#1970912] - kvm-file-posix-Handle-EINVAL-fallocate-return-value.patch [bz#1970912] - Resolves: bz#1967914 ([virtio-fs] virtiofsd quit when coping file to a folder in virtio-fs mounted volume(windows guest)) - Resolves: bz#1957866 (RHEL8.4 - EEH capability disabled on KVM guest and recovery of PCI passthru device fails(CX5 / mlx5_core) (qemu-kvm)) - Resolves: bz#1970912 (Deployment fails with "Invalid or missing agent token received")- kvm-file-posix-Mitigate-file-fragmentation-with-extent-s.patch [bz#1877163] - kvm-block-file-posix-Fix-problem-with-fallocate-PUNCH_HO.patch [bz#1944861] - kvm-spapr-Remove-stale-comment-about-power-saving-LPCR-b.patch [bz#1969768] - kvm-spapr-Set-LPCR-to-current-AIL-mode-when-starting-a-n.patch [bz#1969768] - Resolves: bz#1877163 ([FJ 8.3 Bug] The progress bar of the "virt-clone --nonsparse" command shows the progress rate exceeding 100%.) - Resolves: bz#1944861 (Qemu-img convert fails when source image is on gpfs) - Resolves: bz#1969768 ([ppc64le] Hotplug vcpu device hit call trace:[qemu output] KVM: unknown exit, hardware reason 7fff9ce87ed8)- kvm-linux-headers-Add-VFIO_CCW_REQ_IRQ_INDEX.patch [bz#1940450] - kvm-vfio-ccw-Connect-the-device-request-notifier.patch [bz#1940450] - kvm-pc-bios-s390-ccw-fix-off-by-one-error.patch [bz#1942880] - kvm-pc-bios-s390-ccw-break-loop-if-a-null-block-number-i.patch [bz#1942880] - kvm-pc-bios-s390-ccw-don-t-try-to-read-the-next-block-if.patch [bz#1942880] - Resolves: bz#1940450 (RHEL8.5 - Mediated Device already in use by same domain we are booting (vfio-ccw/Multipath Testing) (kvm) - qemu-kvm part (also has kernel and libvirt parts)) - Resolves: bz#1942880 (RHEL8.4 Nightly[0322] - KVM guest fails to find zipl boot menu index (qemu-kvm))- kvm-hw-intc-arm_gic-Fix-interrupt-ID-in-GICD_SGIR-regist.patch [bz#1925430] - kvm-libqos-usb-hcd-ehci-use-32-bit-write-for-config-regi.patch [bz#1842478] - kvm-libqos-pci-pc-use-32-bit-write-for-EJ-register.patch [bz#1842478] - kvm-memory-Revert-memory-accept-mismatching-sizes-in-mem.patch [bz#1842478] - kvm-acpi-accept-byte-and-word-access-to-core-ACPI-regist.patch [bz#1842478] - kvm-xhci-fix-valid.max_access_size-to-access-address-reg.patch [bz#1842478] - kvm-softmmu-memory-Log-invalid-memory-accesses.patch [bz#1842478] - Resolves: bz#1925430 (CVE-2021-20221 virt:rhel/qemu-kvm: qemu: out-of-bound heap buffer access via an interrupt ID field [rhel-8.5.0]) - Resolves: bz#1842478 (CVE-2020-13754 virt:rhel/qemu-kvm: QEMU: msix: OOB access during mmio operations may lead to DoS [rhel-8.5.0])- kvm-net-remove-an-assert-call-in-eth_get_gso_type.patch [bz#1892350] - kvm-e1000-fail-early-for-evil-descriptor.patch [bz#1930092] - kvm-net-forbid-the-reentrant-RX.patch [bz#1859175] - kvm-qemu-img-convert-Don-t-pre-zero-images.patch [bz#1855250] - kvm-audio-audio_generic_get_buffer_in-should-honor-size.patch [bz#1932823] - Resolves: bz#1892350 (CVE-2020-27617 virt:rhel/qemu-kvm: QEMU: net: an assert failure via eth_get_gso_type [rhel-8.5.0]) - Resolves: bz#1930092 (CVE-2021-20257 virt:rhel/qemu-kvm: QEMU: net: e1000: infinite loop while processing transmit descriptors [rhel-8.5.0]) - Resolves: bz#1859175 (CVE-2020-15859 virt:rhel/qemu-kvm: QEMU: net: e1000e: use-after-free while sending packets [rhel-8]) - Resolves: bz#1855250 (qemu-img convert uses possibly slow pre-zeroing on block storage) - Resolves: bz#1932823 (after upgrade from 4.3 to 4.4 audio stops working in guests after couple of seconds)- kvm-ide-atapi-check-logical-block-address-and-read-size-.patch [bz#1917451] - Resolves: bz#1917451 (CVE-2020-29443 virt:rhel/qemu-kvm: QEMU: ide: atapi: OOB access while processing read commands [rhel-8.4.0])- kvm-x86-cpu-Enable-AVX512_VP2INTERSECT-cpu-feature.patch [bz#1790620] - kvm-target-i386-add-fast-short-REP-MOV-support.patch [bz#1790620] - kvm-x86-cpu-Populate-SVM-CPUID-feature-bits.patch [bz#1790620] - kvm-i386-Add-the-support-for-AMD-EPYC-3rd-generation-pro.patch [bz#1790620] - Resolves: bz#1790620 ([RFE] AMD Milan - Add KVM/support for EPYC-Milan CPU Model - Slow Train)- kvm-redhat-makes-qemu-respect-system-s-crypto-profile.patch [bz#1902960] - kvm-spapr-Adjust-firmware-path-of-PCI-devices.patch [bz#1912891] - Resolves: bz#1902960 (QEMU doesn't honour system crypto policies) - Resolves: bz#1912891 ([ppc64le] --disk cdimage.iso,bus=usb fails to boot)- kvm-virtiofsd-extract-lo_do_open-from-lo_open.patch [bz#1919111] - kvm-virtiofsd-optionally-return-inode-pointer-from-lo_do.patch [bz#1919111] - kvm-virtiofsd-prevent-opening-of-special-files-CVE-2020-.patch [bz#1919111] - Resolves: bz#1919111 (CVE-2020-35517 virt:rhel/qemu-kvm: QEMU: virtiofsd: potential privileged host device access from guest [rhel-8.4.0])- kvm-spapr-Improve-handling-of-fdt-buffer-size.patch [bz#1901837] - kvm-spapr-Fold-h_cas_compose_response-into-h_client_arch.patch [bz#1901837] - kvm-spapr-Don-t-use-spapr_drc_needed-in-CAS-code.patch [bz#1901837] - kvm-spapr-Fix-handling-of-unplugged-devices-during-CAS-a.patch [bz#1901837] - kvm-spapr-Allow-memory-unplug-to-always-succeed.patch [bz#1901837] - kvm-spapr-Improve-handling-of-memory-unplug-with-old-gue.patch [bz#1901837] - kvm-block-Require-aligned-image-size-to-avoid-assertion-.patch [bz#1834281] - kvm-file-posix-Allow-byte-aligned-O_DIRECT-with-NFS.patch [bz#1834281] - kvm-block-iscsi-fix-heap-buffer-overflow-in-iscsi_aio_io.patch [bz#1912974] - Resolves: bz#1834281 (qemu-img convert abort when converting image with unaligned size) - Resolves: bz#1901837 (Failed to hotunplug pc-dimm device) - Resolves: bz#1912974 (CVE-2020-11947 virt:rhel/qemu-kvm: QEMU: heap buffer overflow in iscsi_aio_ioctl_cb() in block/iscsi.c may lead to information disclosure [rhel-8])- kvm-Drop-bogus-IPv6-messages.patch [bz#1918054] - Resolves: bz#1918054 (CVE-2020-10756 virt:rhel/qemu-kvm: QEMU: slirp: networking out-of-bounds read information disclosure vulnerability [rhel-8.4.0])- kvm-linux-headers-add-vfio-DMA-available-capability.patch [bz#1905391] - kvm-s390x-pci-Move-header-files-to-include-hw-s390x.patch [bz#1905391] - kvm-vfio-Create-shared-routine-for-scanning-info-capabil.patch [bz#1905391] - kvm-vfio-Find-DMA-available-capability.patch [bz#1905391] - kvm-s390x-pci-Add-routine-to-get-the-vfio-dma-available-.patch [bz#1905391] - kvm-s390x-pci-Honor-DMA-limits-set-by-vfio.patch [bz#1905391] - kvm-s390x-fix-build-for-without-default-devices.patch [bz#1905391] - Resolves: bz#1905391 (RHEL8.4 - s390x/pci: Honor vfio DMA limiting (qemu-kvm))- kvm-udev-kvm-check-remove-the-exceeded-subscription-limi.patch [bz#1909244] - kvm-hw-arm-smmu-common-Factorize-some-code-in-smmu_ptw_6.patch [bz#1843852] - kvm-hw-arm-smmu-common-Add-IOTLB-helpers.patch [bz#1843852] - kvm-hw-arm-smmu-Introduce-smmu_get_iotlb_key.patch [bz#1843852] - kvm-hw-arm-smmu-Introduce-SMMUTLBEntry-for-PTW-and-IOTLB.patch [bz#1843852] - kvm-hw-arm-smmu-common-Manage-IOTLB-block-entries.patch [bz#1843852] - kvm-hw-arm-smmuv3-Introduce-smmuv3_s1_range_inval-helper.patch [bz#1843852] - kvm-hw-arm-smmuv3-Get-prepared-for-range-invalidation.patch [bz#1843852] - kvm-hw-arm-smmuv3-Fix-potential-integer-overflow-CID-143.patch [bz#1843852] - kvm-memory-Rename-memory_region_notify_one-to-memory_reg.patch [bz#1843852] - kvm-memory-Add-IOMMUTLBEvent.patch [bz#1843852] - kvm-memory-Add-IOMMU_NOTIFIER_DEVIOTLB_UNMAP-IOMMUTLBNot.patch [bz#1843852] - kvm-intel_iommu-Skip-page-walking-on-device-iotlb-invali.patch [bz#1843852] - kvm-memory-Skip-bad-range-assertion-if-notifier-is-DEVIO.patch [bz#1843852] - kvm-memory-clamp-cached-translation-in-case-it-points-to.patch [bz#1904393] - kvm-hw-ehci-check-return-value-of-usb_packet_map.patch [bz#1898628] - kvm-hw-net-e1000e-advance-desc_offset-in-case-of-null-de.patch [bz#1903070] - Resolves: bz#1909244 (Remove KVM guest count and limit info message) - Resolves: bz#1843852 (qemu core dumped: qemu-kvm: /builddir/build/BUILD/qemu-4.2.0/memory.c:1928: memory_region_notify_one: Assertion `entry->iova >= notifier->start && entry_end <= notifier->end' failed.) - Resolves: bz#1904393 (CVE-2020-27821 virt:rhel/qemu-kvm: QEMU: heap buffer overflow in msix_table_mmio_write() in hw/pci/msix.c [rhel-8]) - Resolves: bz#1898628 (CVE-2020-25723 virt:rhel/qemu-kvm: QEMU: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c [rhel-8]) - Resolves: bz#1903070 (CVE-2020-25707 CVE-2020-28916 virt:rhel/qemu-kvm: various flaws [rhel-8])- kvm-redhat-link-etc-qemu-ga-fsfreeze-hook-to-etc-qemu-kv.patch [bz#1910267] - kvm-qga-rename-Error-parameter-to-more-common-errp.patch [bz#1910326] - kvm-util-Introduce-qemu_get_host_name.patch [bz#1910326] - kvm-qga-Use-qemu_get_host_name-instead-of-g_get_host_nam.patch [bz#1910326] - kvm-redhat-add-un-pre-install-systemd-hooks-for-qemu-ga.patch [bz#1910220] - Resolves: bz#1910267 (There is no soft link '/etc/qemu-kvm/fsfreeze-hook') - Resolves: bz#1910326 (Incorrect hostname returned by qga command 'guest-get-host-name') - Resolves: bz#1910220 (qemu-ga service still active and can work after qemu-guest-agent been removed)- kvm-ppc-spapr-Add-hotremovable-flag-on-DIMM-LMBs-on-drme.patch [bz#1901837] - kvm-ppc-spapr-re-assert-IRQs-during-event-scan-if-there-.patch [bz#1901837] - kvm-slirp-check-pkt_len-before-reading-protocol-header.patch [bz#1902237] - kvm-s390x-s390-virtio-ccw-Reset-PCI-devices-during-subsy.patch [bz#1905386] - kvm-qapi-enable-use-of-g_autoptr-with-QAPI-types.patch [bz#1859494] - kvm-error-Fix-examples-in-error.h-s-big-comment.patch [bz#1859494] - kvm-error-Improve-error.h-s-big-comment.patch [bz#1859494] - kvm-error-Document-Error-API-usage-rules.patch [bz#1859494] - kvm-error-New-macro-ERRP_GUARD.patch [bz#1859494] - kvm-qga-add-command-guest-get-disks.patch [bz#1859494] - kvm-qga-add-implementation-of-guest-get-disks-for-Linux.patch [bz#1859494] - kvm-qga-add-implementation-of-guest-get-disks-for-Window.patch [bz#1859494] - kvm-qga-fix-missing-closedir-in-qmp_guest_get_disks.patch [bz#1859494] - kvm-qga-update-schema-for-guest-get-disks-dependents-fie.patch [bz#1859494] - Resolves: bz#1859494 (Report logical_name for disks without mounted file-system) - Resolves: bz#1901837 (Failed to hotunplug pc-dimm device) - Resolves: bz#1902237 (CVE-2020-29129 CVE-2020-29130 virt:rhel/qemu-kvm: QEMU: slirp: out-of-bounds access while processing ARP/NCSI packets [rhel-8]) - Resolves: bz#1905386 (RHEL8.3 - s390x/s390-virtio-ccw: Reset PCI devices during subsystem reset (qemu-kvm))- kvm-seccomp-fix-killing-of-whole-process-instead-of-thre.patch [bz#1880546] - kvm-pc-bios-s390x-Rename-PSW_MASK_ZMODE-to-PSW_MASK_64.patch [bz#1903135] - kvm-pc-bios-s390x-Use-PSW-masks-where-possible-and-intro.patch [bz#1903135] - kvm-pc-bios-s390x-Ensure-Read-IPL-memory-is-clean.patch [bz#1903135] - kvm-pc-bios-s390x-Clear-out-leftover-S390EP-string.patch [bz#1903135] - Resolves: bz#1880546 (qemu use SCMP_ACT_TRAP even SCMP_ACT_KILL_PROCESS is available) - Resolves: bz#1903135 (RHEL8.3 - KVM Distro install to vfio_ccw backed DASD gets error at the reboot step (qemu-kvm))- kvm-hw-net-net_tx_pkt-fix-assertion-failure-in-net_tx_pk.patch [bz#1860994] - Resolves: bz#1860994 (CVE-2020-16092 virt:rhel/qemu-kvm: QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment() in hw/net/net_tx_pkt.c [rhel-8])- kvm-qga-fix-assert-regression-on-guest-shutdown.patch [bz#1884531] - kvm-libvhost-user-handle-endianness-as-mandated-by-the-s.patch [bz#1857733] - kvm-virtio-add-vhost-user-fs-ccw-device.patch [bz#1857733] - kvm-Ensure-vhost-user-fs-is-enabled-on-s390x.patch [bz#1857733] - kvm-s390x-sclp.c-remove-unneeded-label-in-sclp_service_c.patch [bz#1798506] - kvm-s390-sclp-get-machine-once-during-read-scp-cpu-info.patch [bz#1798506] - kvm-s390-sclp-rework-sclp-boundary-checks.patch [bz#1798506] - kvm-s390-sclp-read-sccb-from-mem-based-on-provided-lengt.patch [bz#1798506] - kvm-s390-sclp-check-sccb-len-before-filling-in-data.patch [bz#1798506] - kvm-s390-sclp-use-cpu-offset-to-locate-cpu-entries.patch [bz#1798506] - kvm-s390-sclp-add-extended-length-sccb-support-for-kvm-g.patch [bz#1798506] - kvm-linux-headers-Partial-update-against-Linux-5.9-rc4.patch [bz#1798506] - kvm-misc-Replace-zero-length-arrays-with-flexible-array-.patch [bz#1798506] - kvm-s390-guest-support-for-diagnose-0x318.patch [bz#1798506] - kvm-s390x-pv-Remove-sclp-boundary-checks.patch [bz#1798506] - kvm-s390x-pv-Fix-diag318-PV-fencing.patch [bz#1798506] - kvm-s390-kvm-fix-diag318-propagation-and-reset-functiona.patch [bz#1659412] - kvm-trace-use-STAP_SDT_V2-to-work-around-symbol-visibili.patch [bz#1898700] - Resolves: bz#1659412 ([IBM 8.4 FEAT] KVM enablement for enhanced hardware diagnose data of guest kernel on s390x - qemu part) - Resolves: bz#1798506 ([IBM 8.4 FEAT] KVM: Support extended-length SCCBs - qemu part) - Resolves: bz#1857733 ([IBM 8.4 FEAT] KVM: Add support for virtio-fs on s390x - qemu part) - Resolves: bz#1884531 (qemu-ga aborts after guest-shutdown command) - Resolves: bz#1898700 (qemu-kvm for RHEL-8.4 doesn't build due to a possible incompatibility with systemtap-sdt-devel-4.4-1)- kvm-qga-commands-posix-Rework-build_guest_fsinfo_for_rea.patch [bz#1755075] - kvm-qga-commands-posix-Move-the-udev-code-from-the-pci-t.patch [bz#1755075] - kvm-qga-commands-posix-Support-fsinfo-for-non-PCI-virtio.patch [bz#1755075] - kvm-nvram-Exit-QEMU-if-NVRAM-cannot-contain-all-prom-env.patch [bz#1874780] - kvm-pc-bios-s390-ccw-Makefile-Compile-with-std-gnu99-fwr.patch [bz#1846975] - kvm-pc-bios-s390-ccw-Move-ipl-related-code-from-main-int.patch [bz#1846975] - kvm-pc-bios-s390-ccw-Introduce-ENODEV-define-and-remove-.patch [bz#1846975] - kvm-pc-bios-s390-ccw-Move-the-inner-logic-of-find_subch-.patch [bz#1846975] - kvm-pc-bios-s390-ccw-Do-not-bail-out-early-if-not-findin.patch [bz#1846975] - kvm-pc-bios-s390-ccw-Scan-through-all-devices-if-no-boot.patch [bz#1846975] - kvm-pc-bios-s390-ccw-Allow-booting-in-case-the-first-vir.patch [bz#1846975] - kvm-pc-bios-s390-ccw-main-Remove-superfluous-call-to-ena.patch [bz#1846975] - kvm-aio-posix-completely-stop-polling-when-disabled.patch [bz#1846975] - kvm-Remove-explicit-glusterfs-api-dependency.patch [bz#1872854] - Resolves: bz#1755075 ([qemu-guest-agent] fsinfo doesn't return disk info on s390x) - Resolves: bz#1846975 (Failed to boot up a s390x guest with virtio-blk-ccw if attaching a virtio-scsi-ccw bus in previous) - Resolves: bz#1872854 (move the glusterfs dependency out of qemu-kvm-core to the glusterfs module) - Resolves: bz#1874780 (-prom-env does not validate input)- kvm-usb-fix-setup_len-init-CVE-2020-14364.patch [bz#1869710] - Resolves: bz#1869710 (CVE-2020-14364 qemu-kvm: QEMU: usb: out-of-bounds r/w access issue while processing usb packets [rhel-8.3.0])- kvm-Require-libfdt-1.6.0.patch [bz#1867847] - Resolves: bz#1867847 ([ppc] virt module 7629: /usr/libexec/qemu-kvm: undefined symbol: fdt_check_full, version LIBFDT_1.2)- kvm-i386-Add-2nd-Generation-AMD-EPYC-processors.patch [bz#1780385] - kvm-target-i386-sev-provide-proper-error-reporting-for-q.patch [bz#1689341] - kvm-target-i386-sev-fail-query-sev-capabilities-if-QEMU-.patch [bz#1689341] - kvm-s390x-protvirt-allow-to-IPL-secure-guests-with-no-re.patch [bz#1863034] - Resolves: bz#1689341 (QEMU should report an error and return failure if AMD SEV is not enabled in the kernel) - Resolves: bz#1780385 ([RFE] AMD EPYC-Rome support for KVM / QEMU guest) - Resolves: bz#1863034 (RHEL8.3 Beta - Secure Execution: Unable to start Qemu with "-no-reboot" option (qemu-kvm))- kvm-qcow2-Fix-alloc_cluster_abort-for-pre-existing-clust.patch [bz#1807057] - kvm-iotests-026-Test-EIO-on-preallocated-zero-cluster.patch [bz#1807057] - kvm-iotests-026-Test-EIO-on-allocation-in-a-data-file.patch [bz#1807057] - kvm-iotests-026-Move-v3-exclusive-test-to-new-file.patch [bz#1807057] - Resolves: bz#1807057 (qcow2_alloc_cluster_abort() frees preallocated zero clusters)- kvm-i386-Mask-SVM-features-if-nested-SVM-is-disabled.patch [bz#1835390] - kvm-s390x-sigp-Fix-sense-running-reporting.patch [bz#1854092] - kvm-s390x-tcg-clear-local-interrupts-on-reset-normal.patch [bz#1854092] - kvm-virtio-net-fix-removal-of-failover-device.patch [] - Resolves: bz#1835390 (qemu promote host does not support 'EDX.npt' and 'EDX.nrip-save' when test with Q35 machine type on EPYC host) - Resolves: bz#1854092 (kvm-unit-tests: tcg smp FAIL)- kvm-vfio-ccw-Fix-error-message.patch [bz#1660916] - kvm-vfio-ccw-allow-non-prefetch-ORBs.patch [bz#1660916] - kvm-linux-headers-support-vfio-ccw-features.patch [bz#1660916] - kvm-vfio-ccw-Refactor-cleanup-of-regions.patch [bz#1660916] - kvm-vfio-ccw-Add-support-for-the-schib-region.patch [bz#1660916] - kvm-vfio-ccw-Refactor-ccw-irq-handler.patch [bz#1660916] - kvm-s390x-css-Refactor-the-css_queue_crw-routine.patch [bz#1660916] - kvm-vfio-ccw-Add-support-for-the-CRW-region-and-IRQ.patch [bz#1660916] - kvm-config-enable-VFIO_CCW.patch [bz#1660916] - kvm-virtio-blk-Refactor-the-code-that-processes-queued-r.patch [] - kvm-virtio-blk-On-restart-process-queued-requests-in-the.patch [] - kvm-Fix-use-afte-free-in-ip_reass-CVE-2020-1983.patch [bz#1838070] - Resolves: bz#1660916 ([IBM 8.3 FEAT] KVM s390x: DASD passthrough support - qemu part) - Resolves: bz#1838070 (CVE-2020-1983 virt:rhel/qemu-kvm: QEMU: slirp: use-after-free in ip_reass() function in ip_input.c [rhel-8])- kvm-redhat-Install-the-s390-netboot.img-that-we-ve-built.patch [bz#1828317] - kvm-linux-headers-update-kvm.h.patch [bz#1828317] - kvm-s390x-Don-t-do-a-normal-reset-on-the-initial-cpu.patch [bz#1828317] - kvm-s390x-Move-reset-normal-to-shared-reset-handler.patch [bz#1828317] - kvm-s390x-Move-initial-reset.patch [bz#1828317] - kvm-s390x-Move-clear-reset.patch [bz#1828317] - kvm-s390x-Beautify-diag308-handling.patch [bz#1828317] - kvm-s390x-kvm-Make-kvm_sclp_service_call-void.patch [bz#1828317] - kvm-s390x-Fix-cpu-normal-reset-ri-clearing.patch [bz#1828317] - kvm-tests-boot-sector-Fix-the-bad-s390x-assembler-code.patch [bz#1828317] - kvm-pc-bios-s390x-Fix-reset-psw-mask.patch [bz#1828317] - kvm-s390x-Properly-fetch-and-test-the-short-psw-on-diag3.patch [bz#1828317] - kvm-s390x-Rename-and-use-constants-for-short-PSW-address.patch [bz#1828317] - kvm-s390x-Add-missing-vcpu-reset-functions.patch [bz#1828317] - kvm-s390-sclp-improve-special-wait-psw-logic.patch [bz#1828317] - kvm-pc-bios-s390x-Save-iplb-location-in-lowcore.patch [bz#1828317] - kvm-s390-ipl-sync-back-loadparm.patch [bz#1828317] - kvm-s390-ipl-fix-off-by-one-in-update_machine_ipl_proper.patch [bz#1828317] - kvm-s390x-ipl-Consolidate-iplb-validity-check-into-one-f.patch [bz#1828317] - kvm-vhost-correctly-turn-on-VIRTIO_F_IOMMU_PLATFORM.patch [bz#1828317] - kvm-s390x-Move-diagnose-308-subcodes-and-rcs-into-ipl.h.patch [bz#1828317] - kvm-s390x-protvirt-Support-unpack-facility.patch [bz#1828317] - kvm-s390x-protvirt-Add-migration-blocker.patch [bz#1828317] - kvm-s390x-protvirt-Inhibit-balloon-when-switching-to-pro.patch [bz#1828317] - kvm-s390x-protvirt-KVM-intercept-changes.patch [bz#1828317] - kvm-s390x-Add-SIDA-memory-ops.patch [bz#1828317] - kvm-s390x-protvirt-Move-STSI-data-over-SIDAD.patch [bz#1828317] - kvm-s390x-protvirt-SCLP-interpretation.patch [bz#1828317] - kvm-s390x-protvirt-Set-guest-IPL-PSW.patch [bz#1828317] - kvm-s390x-protvirt-Move-diag-308-data-over-SIDA.patch [bz#1828317] - kvm-s390x-protvirt-Disable-address-checks-for-PV-guest-I.patch [bz#1828317] - kvm-s390x-protvirt-Move-IO-control-structures-over-SIDA.patch [bz#1828317] - kvm-s390x-protvirt-Handle-SIGP-store-status-correctly.patch [bz#1828317] - kvm-s390x-Add-unpack-facility-feature-to-GA1.patch [bz#1828317] - kvm-s390x-protvirt-Fix-stray-error_report_err-in-s390_ma.patch [bz#1828317] - kvm-s390x-pv-Retry-ioctls-on-EINTR.patch [bz#1828317] - kvm-s390x-s390-virtio-ccw-Fix-build-on-systems-without-K.patch [bz#1828317] - kvm-s390x-pv-Fix-KVM_PV_PREP_RESET-command-wrapper-name.patch [bz#1828317] - kvm-spapr-Pass-the-maximum-number-of-vCPUs-to-the-KVM-in.patch [bz#1756946] - kvm-introduce-kvm_kernel_irqchip_-functions.patch [bz#1756946] - kvm-target-s390x-kvm-Enable-adapter-interruption-suppres.patch [bz#1756946] - kvm-vfio-nvlink-Remove-exec-permission-to-avoid-SELinux-.patch [bz#1823275] - Resolves: bz#1756946 ([zKVM] Re-enable KVM_CAP_S390_AIS for new machine types) - Resolves: bz#1823275 (RHEL8.1 - GPU Numa nodes not visible in guest post the pass-through.) - Resolves: bz#1828317 ([IBM 8.3 FEAT] s390x: Base KVM setup for secure guests - qemu part)- Resolves: bz#1810193 (Upgrade components in virt:rhel module:stream for RHEL-8.3 release)- Resolves: bz#1810193 (Upgrade components in virt:rhel module:stream for RHEL-8.3 release) Another sync- Resolves: bz#1810193 (Upgrade components in virt:rhel module:stream for RHEL-8.3 release) Another syncronization- Resolves: bz#1810193 (Upgrade components in virt:rhel module:stream for RHEL-8.3 release)- kvm-slirp-disable-tcp_emu.patch [bz#1791677] - kvm-target-i386-kvm-initialize-feature-MSRs-very-early.patch [bz#1790308] - Resolves: bz#1790308 (qemu-kvm core dump when do L1 guest live migration with L2 guest running) - Resolves: bz#1791677 (QEMU: Slirp: disable emulation of tcp programs like ftp IRC etc. [rhel-8])- kvm-iscsi-Avoid-potential-for-get_status-overflow.patch [bz#1794501] - kvm-iscsi-Cap-block-count-from-GET-LBA-STATUS-CVE-2020-1.patch [bz#1794501] - kvm-clean-up-callback-when-del-virtqueue.patch [bz#1708480] - kvm-virtio-add-ability-to-delete-vq-through-a-pointer.patch [bz#1708480] - kvm-virtio-reset-region-cache-when-on-queue-deletion.patch [bz#1708480] - kvm-virtio-net-delete-also-control-queue-when-TX-RX-dele.patch [bz#1708480] - Resolves: bz#1708480 ([Q35] No "DEVICE_DELETED" event in qmp after unplug virtio-net-pci device) - Resolves: bz#1794501 (CVE-2020-1711 qemu-kvm: QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server [rhel-8.2.0])- kvm-exec-Fix-MAP_RAM-for-cached-access.patch [bz#1769613] - kvm-virtio-Return-true-from-virtio_queue_empty-if-broken.patch [bz#1769613] - kvm-usbredir-Prevent-recursion-in-usbredir_write.patch [bz#1752320] - kvm-xhci-recheck-slot-status.patch [bz#1752320] - kvm-tcp_emu-Fix-oob-access.patch [bz#1791566] - kvm-slirp-use-correct-size-while-emulating-IRC-commands.patch [bz#1791566] - kvm-slirp-use-correct-size-while-emulating-commands.patch [bz#1791566] - Resolves: bz#1752320 (vm gets stuck when migrate vm back and forth with remote-viewer trying to connect) - Resolves: bz#1769613 ([SEV] kexec mays hang at "[sda] Synchronizing SCSI cache " before switching to new kernel) - Resolves: bz#1791566 (CVE-2020-7039 virt:rhel/qemu-kvm: QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() [rhel-8.2.0])- kvm-i386-Remove-cpu64-rhel6-CPU-model.patch [bz#1741346] - Resolves: bz#1741346 (Remove the "cpu64-rhel6" CPU from qemu-kvm)- kvm-virtio-gpu-block-both-2d-and-3d-rendering.patch [bz#1674324] - kvm-x86-Intel-AVX512_BF16-feature-enabling.patch [bz#1642541] - Resolves: bz#1642541 ([Intel 8.2 Feature] qemu-kvm Enable BFloat16 data type support) - Resolves: bz#1674324 (With , qemu either refuses to start completely or spice-server crashes afterwards)- kvm-util-mmap-alloc-Add-a-is_pmem-parameter-to-qemu_ram_.patch [bz#1539282] - kvm-mmap-alloc-unfold-qemu_ram_mmap.patch [bz#1539282] - kvm-mmap-alloc-fix-hugetlbfs-misaligned-length-in-ppc64.patch [bz#1539282] - kvm-util-mmap-alloc-support-MAP_SYNC-in-qemu_ram_mmap.patch [bz#1539282] - kvm-x86-cpu-Enable-MOVDIRI-cpu-feature.patch [bz#1634827] - kvm-x86-cpu-Enable-MOVDIR64B-cpu-feature.patch [bz#1634827] - kvm-add-call-to-qemu_add_opts-for-overcommit-option.patch [bz#1634827] - kvm-support-overcommit-cpu-pm-on-off.patch [bz#1634827] - kvm-i386-cpu-make-cpu-host-support-monitor-mwait.patch [] - kvm-x86-cpu-Add-support-for-UMONITOR-UMWAIT-TPAUSE.patch [bz#1634827] - kvm-target-i386-Add-support-for-save-load-IA32_UMWAIT_CO.patch [bz#1634827] - Resolves: bz#1539282 ([Intel 8.2 Feature][Crystal Ridge] Support MAP_SYNC - qemu-kvm) - Resolves: bz#1634827 ([Intel 8.2 Feat] KVM Enable SnowRidge Accelerator Interface Architecture (AIA) - qemu)- kvm-target-i386-Export-TAA_NO-bit-to-guests.patch [bz#1771971] - kvm-target-i386-add-support-for-MSR_IA32_TSX_CTRL.patch [bz#1771971] - Resolves: bz#1771971 (CVE-2019-11135 virt:rhel/qemu-kvm: hw: TSX Transaction Asynchronous Abort (TAA) [rhel-8.2.0])- kvm-x86-cpu-use-FeatureWordArray-to-define-filtered_feat.patch [bz#1689270] - kvm-i386-Add-x-force-features-option-for-testing.patch [bz#1689270] - kvm-target-i386-define-a-new-MSR-based-feature-word-FEAT.patch [bz#1689270] - kvm-i386-display-known-CPUID-features-linewrapped-in-alp.patch [bz#1689270] - kvm-target-i386-kvm-kvm_get_supported_msrs-cleanup.patch [bz#1689270] - kvm-target-i386-handle-filtered_features-in-a-new-functi.patch [bz#1689270] - kvm-target-i386-introduce-generic-feature-dependency-mec.patch [bz#1689270] - kvm-target-i386-expand-feature-words-to-64-bits.patch [bz#1689270] - kvm-target-i386-add-VMX-definitions.patch [bz#1689270] - kvm-vmxcap-correct-the-name-of-the-variables.patch [bz#1689270] - kvm-target-i386-add-VMX-features.patch [bz#1689270] - kvm-target-i386-work-around-KVM_GET_MSRS-bug-for-seconda.patch [bz#1689270] - kvm-target-i386-adjust-for-missing-VMX-features.patch [bz#1689270] - kvm-target-i386-add-VMX-features-to-named-CPU-models.patch [bz#1689270] - kvm-target-i386-add-VMX-features-to-named-CPU-models-RHE.patch [bz#1689270] - kvm-vhost-fix-vhost_log-size-overflow-during-migration.patch [bz#1776808] - Resolves: bz#1689270 (Nested KVM: limit VMX features according to CPU models - Slow Train) - Resolves: bz#1776808 (qemu-kvm crashes when Windows VM is migrated with multiqueue)- kvm-qapi-fill-in-CpuInfoFast.arch-in-query-cpus-fast.patch [bz#1730969] - kvm-curl-Keep-pointer-to-the-CURLState-in-CURLSocket.patch [bz#1744602] - kvm-curl-Keep-socket-until-the-end-of-curl_sock_cb.patch [bz#1744602] - kvm-curl-Check-completion-in-curl_multi_do.patch [bz#1744602] - kvm-curl-Pass-CURLSocket-to-curl_multi_do.patch [bz#1744602] - kvm-curl-Report-only-ready-sockets.patch [bz#1744602] - kvm-curl-Handle-success-in-multi_check_completion.patch [bz#1744602] - kvm-curl-Check-curl_multi_add_handle-s-return-code.patch [bz#1744602] - Resolves: bz#1730969 ([ppc] qmp: The 'arch' value returned by the command 'query-cpus-fast' does not match) - Resolves: bz#1744602 (qemu-img gets stuck when stream-converting from http)- kvm-i386-Don-t-print-warning-if-phys-bits-was-set-automa.patch [bz#1719127] - kvm-Disable-CONFIG_I2C-and-CONFIG_IOH3420.patch [bz#1693140] - kvm-usb-drop-unnecessary-usb_device_post_load-checks.patch [bz#1757482] - kvm-pc-bios-s390-ccw-define-loadparm-length.patch [bz#1664376] - kvm-pc-bios-s390-ccw-net-Use-diag308-to-reset-machine-be.patch [bz#1664376] - kvm-s390-bios-decouple-cio-setup-from-virtio.patch [bz#1664376] - kvm-s390-bios-decouple-common-boot-logic-from-virtio.patch [bz#1664376] - kvm-s390-bios-Clean-up-cio.h.patch [bz#1664376] - kvm-s390-bios-Decouple-channel-i-o-logic-from-virtio.patch [bz#1664376] - kvm-s390-bios-Map-low-core-memory.patch [bz#1664376] - kvm-s390-bios-ptr2u32-and-u32toptr.patch [bz#1664376] - kvm-s390-bios-Support-for-running-format-0-1-channel-pro.patch [bz#1664376] - kvm-s390-bios-cio-error-handling.patch [bz#1664376] - kvm-s390-bios-Extend-find_dev-for-non-virtio-devices.patch [bz#1664376] - kvm-s390-bios-Factor-finding-boot-device-out-of-virtio-c.patch [bz#1664376] - kvm-s390-bios-Refactor-virtio-to-run-channel-programs-vi.patch [bz#1664376] - kvm-s390-bios-Use-control-unit-type-to-determine-boot-me.patch [bz#1664376] - kvm-s390-bios-Add-channel-command-codes-structs-needed-f.patch [bz#1664376] - kvm-s390-bios-Support-booting-from-real-dasd-device.patch [bz#1664376] - kvm-s390-bios-Use-control-unit-type-to-find-bootable-dev.patch [bz#1664376] - kvm-s390x-vfio-ap-Implement-hot-plug-unplug-of-vfio-ap-d.patch [bz#1660906] - Resolves: bz#1660906 ([IBM 8.2 FEAT] KVM s390x: Crypto Passthrough Hotplug - qemu part) - Resolves: bz#1664376 ([IBM 8.2 FEAT] CCW IPL Support (kvm) - qemu part) - Resolves: bz#1693140 (aarch64: qemu: remove smbus_eeprom and i2c from config) - Resolves: bz#1719127 ([Intel 8.2 Bug] warning shown when boot VM with “–cpu host” or “–cpu other mode” on ICX platform (physical)) - Resolves: bz#1757482 (Fail to migrate a rhel6.10-mt7.6 guest with dimm device)- kvm-accel-use-g_strsplit-for-parsing-accelerator-names.patch [bz#1749022] - kvm-opts-don-t-silently-truncate-long-parameter-keys.patch [bz#1749022] - kvm-opts-don-t-silently-truncate-long-option-values.patch [bz#1749022] - kvm-i386-fix-regression-parsing-multiboot-initrd-modules.patch [bz#1749022] - kvm-i386-only-parse-the-initrd_filename-once-for-multibo.patch [bz#1749022] - kvm-opts-remove-redundant-check-for-NULL-parameter.patch [bz#1749022] - kvm-Using-ip_deq-after-m_free-might-read-pointers-from-a.patch [bz#1749724] - kvm-virtio-blk-Cancel-the-pending-BH-when-the-dataplane-.patch [bz#1708459] - kvm-s390x-cpumodel-Rework-CPU-feature-definition.patch [bz#1660909] - kvm-s390x-cpumodel-Set-up-CPU-model-for-AQIC-interceptio.patch [bz#1660909] - kvm-ccid-Fix-dwProtocols-advertisement-of-T-0.patch [bz#1746361] - kvm-s390-PCI-fix-IOMMU-region-init.patch [bz#1754643] - kvm-fw_cfg-Improve-error-message-when-can-t-load-splash-.patch [bz#1607367] - kvm-fw_cfg-Fix-boot-bootsplash-error-checking.patch [bz#1607367] - kvm-fw_cfg-Fix-boot-reboot-timeout-error-checking.patch [bz#1607367] - kvm-hw-nvram-fw_cfg-Store-reboot-timeout-as-little-endia.patch [bz#1607367] - kvm-intel_iommu-Correct-caching-mode-error-message.patch [bz#1738440] - kvm-intel_iommu-Sanity-check-vfio-pci-config-on-machine-.patch [bz#1738440] - kvm-qdev-machine-Introduce-hotplug_allowed-hook.patch [bz#1738440] - kvm-pc-q35-Disallow-vfio-pci-hotplug-without-VT-d-cachin.patch [bz#1738440] - kvm-intel_iommu-Remove-the-caching-mode-check-during-fla.patch [bz#1738440] - kvm-pseries-do-not-allow-memory-less-cpu-less-NUMA-node.patch [bz#1651474] - Resolves: bz#1607367 (After boot failed, guest should not reboot when set reboot-timeout < -1) - Resolves: bz#1651474 (RHEL8.0 Beta - [4.18.0-32.el8.ppc64le] Guest VM crashes during vcpu hotplug with specific numa configuration (kvm)) - Resolves: bz#1660909 ([IBM 8.2 FEAT] KVM s390x: Crypto Passthrough Interrupt Support - qemu part) - Resolves: bz#1708459 (qemu-kvm core dumped when repeat "system_reset" multiple times during guest boot) - Resolves: bz#1738440 (For intel-iommu, qemu shows conflict behaviors between booting a guest with vfio and hot plugging vfio device) - Resolves: bz#1746361 (ccid: Fix incorrect dwProtocol advertisement of T=0) - Resolves: bz#1749022 (Please backport 950c4e6c94b1 ("opts: don't silently truncate long option values", 2018-05-09)) - Resolves: bz#1749724 (CVE-2019-15890 qemu-kvm: QEMU: Slirp: use-after-free during packet reassembly [rhel-8]) - Resolves: bz#1754643 (RHEL8.1 Snapshot3 - Passthrough PCI card goes into error state if used in domain (kvm))- Revert fix for bz#1749724 - this got delayed to 8.2 (CVE-2019-15890 qemu-kvm: QEMU: Slirp: use-after-free during packet reassembly [rhel-8])- kvm-Do-not-run-iotests-on-brew-build.patch [bz#1742819] - kvm-target-ppc-spapr-Add-workaround-option-to-SPAPR_CAP_.patch [bz#1744415] - kvm-target-ppc-spapr-Add-SPAPR_CAP_CCF_ASSIST.patch [bz#1744415] - kvm-i386-x86_cpu_list_feature_names-function.patch [bz#1747185] - kvm-i386-unavailable-features-QOM-property.patch [bz#1747185] - kvm-file-posix-Handle-undetectable-alignment.patch [bz#1738839] - kvm-iotests-Tweak-221-sizing-for-different-hole-granular.patch [bz#1738839] - kvm-iotests-Filter-175-s-allocation-information.patch [bz#1738839] - kvm-block-posix-Always-allocate-the-first-block.patch [bz#1738839] - kvm-iotests-Test-allocate_first_block-with-O_DIRECT.patch [bz#1738839] - Resolves: bz#1738839 (I/O error when virtio-blk disk is backed by a raw image on 4k disk) - Resolves: bz#1742819 (Remove iotests from qemu-kvm builds [RHEL 8.1.0]) - Resolves: bz#1744415 (Backport support for count cache flush Spectre v2 mitigation [slow train]) - Resolves: bz#1747185 ("filtered-features" QOM property is not available)- kvm-console-Avoid-segfault-in-screendump.patch [bz#1684383] - kvm-usb-hub-clear-suspend-on-detach.patch [bz#1619661] - kvm-qemu-img-fix-regression-copying-secrets-during-conve.patch [bz#1727821] - Resolves: bz#1619661 (the attach hub on one hub still exits in device manager after unhotplug) - Resolves: bz#1684383 (qemu crashed when take screenshot for 2nd head of virtio video device if the display not opened by virt-viewer) - Resolves: bz#1727821 (Failed to convert a source image to the qcow2 image encrypted by luks)- kvm-vnc-detect-and-optimize-pageflips.patch [bz#1727033] - kvm-block-backend-Make-blk_inc-dec_in_flight-public.patch [bz#1716349] - kvm-virtio-blk-Increase-in_flight-for-request-restart-BH.patch [bz#1716349] - kvm-block-Fix-AioContext-switch-for-drained-node.patch [bz#1716349] - kvm-test-bdrv-drain-AioContext-switch-in-drained-section.patch [bz#1716349] - kvm-block-Use-normal-drain-for-bdrv_set_aio_context.patch [bz#1716349] - kvm-block-Fix-AioContext-switch-for-bs-drv-NULL.patch [bz#1716347] - kvm-iothread-fix-crash-with-invalid-properties.patch [bz#1687541] - kvm-iothread-replace-init_done_cond-with-a-semaphore.patch [bz#1687541] - kvm-RHEL-disable-hostmem-memfd.patch [bz#1740797] - Resolves: bz#1687541 (qemu aborted when start guest with a big iothreads) - Resolves: bz#1716347 (Qemu Core dump when quit vm that's in status "paused(io-error)" with data plane enabled) - Resolves: bz#1716349 (qemu with iothreads enabled crashes on resume after enospc pause for disk extension) - Resolves: bz#1727033 (vnc server should detect page-flips and avoid sending fullscreen updates then.) - Resolves: bz#1740797 (Disable memfd in QEMU)- kvm-hw-block-pflash_cfi01-Add-missing-DeviceReset-handle.patch [bz#1707192] - kvm-block-file-posix-Unaligned-O_DIRECT-block-status.patch [bz#1678979] - kvm-iotests-Test-unaligned-raw-images-with-O_DIRECT.patch [bz#1678979] - kvm-nbd-client-Lower-min_block-for-block-status-unaligne.patch [bz#1678979] - kvm-nbd-client-Reject-inaccessible-tail-of-inconsistent-.patch [bz#1678979] - kvm-nbd-client-Support-qemu-img-convert-from-unaligned-s.patch [bz#1678979] - kvm-block-Add-bdrv_get_request_alignment.patch [bz#1678979] - kvm-nbd-server-Advertise-actual-minimum-block-size.patch [bz#1678979] - kvm-slirp-check-sscanf-result-when-emulating-ident.patch [bz#1727642] - kvm-slirp-fix-big-little-endian-conversion-in-ident-prot.patch [bz#1727642] - kvm-slirp-ensure-there-is-enough-space-in-mbuf-to-null-t.patch [bz#1727642] - kvm-slirp-don-t-manipulate-so_rcv-in-tcp_emu.patch [bz#1727642] - kvm-tap-set-vhostfd-passed-from-qemu-cli-to-non-blocking.patch [bz#1732642] - kvm-Fix-heap-overflow-in-ip_reass-on-big-packet-input.patch [bz#1734751] - Resolves: bz#1678979 (qemu-img convert abort when converting image with unaligned size (qemu-img: block/io.c:2134: bdrv_co_block_status: Assertion `*pnum && (((*pnum) % (align)) == 0) && align > offset - aligned_offset\' failed)) - Resolves: bz#1707192 (implement missing reset handler for cfi.pflash01 - slow train) - Resolves: bz#1727642 (CVE-2019-6778 qemu-kvm: QEMU: slirp: heap buffer overflow in tcp_emu()) - Resolves: bz#1732642 (enable the virtio-net frontend to work with the vhost-net backend in SEV guests) - Resolves: bz#1734751 (CVE-2019-14378 qemu-kvm: QEMU: slirp: heap buffer overflow during packet reassembly [rhel-8.1.0])- kvm-i386-Add-new-model-of-Cascadelake-Server.patch [bz#1629906] - kvm-i386-Update-stepping-of-Cascadelake-Server.patch [bz#1629906] - kvm-target-i386-Disable-MPX-support-on-named-CPU-models.patch [bz#1629906] - kvm-i386-remove-the-INTEL_PT-CPUID-bit-from-named-CPU-NEW.patch [bz#1629906] - kvm-i386-Disable-OSPKE-on-CPU-model-definitions-NEW.patch [bz#1629906] - kvm-block-ssh-Convert-from-DPRINTF-macro-to-trace-events.patch [bz#1513367] - kvm-block-ssh-Do-not-report-read-write-flush-errors-to-t.patch [bz#1513367] - kvm-qemu-iotests-Fix-paths-for-NFS.patch [bz#1513367] - kvm-qemu-iotests-Filter-NFS-paths.patch [bz#1513367] - kvm-iotests-Filter-SSH-paths.patch [bz#1513367] - kvm-block-ssh-Implement-.bdrv_refresh_filename.patch [bz#1513367] - kvm-iotests-Use-Python-byte-strings-where-appropriate.patch [bz#1513367] - kvm-iotests-Unify-log-outputs-between-Python-2-and-3.patch [bz#1513367] - kvm-ssh-switch-from-libssh2-to-libssh.patch [bz#1513367] - kvm-redhat-switch-from-libssh2-to-libssh.patch [bz#1513367] - kvm-block-gluster-limit-the-transfer-size-to-512-MiB.patch [bz#1728657] - kvm-s390-cpumodel-fix-description-for-the-new-vector-fac.patch [bz#1729975] - kvm-s390x-cpumodel-remove-esort-from-the-default-model.patch [bz#1729975] - kvm-s390x-cpumodel-also-change-name-of-vxbeh.patch [bz#1729975] - kvm-s390x-cpumodel-change-internal-name-of-vxpdeh-to-mat.patch [bz#1729975] - kvm-target-i386-sev-Do-not-unpin-ram-device-memory-regio.patch [bz#1728958] - kvm-i386-Save-EFER-for-32-bit-targets.patch [bz#1689269] - kvm-target-i386-rename-HF_SVMI_MASK-to-HF_GUEST_MASK.patch [bz#1689269] - kvm-target-i386-kvm-add-VMX-migration-blocker.patch [bz#1689269] - kvm-target-i386-kvm-just-return-after-migrate_add_blocke.patch [bz#1689269] - kvm-target-i386-kvm-Delete-VMX-migration-blocker-on-vCPU.patch [bz#1689269] - kvm-Introduce-kvm_arch_destroy_vcpu.patch [bz#1689269] - kvm-target-i386-kvm-Use-symbolic-constant-for-DB-BP-exce.patch [bz#1689269] - kvm-target-i386-kvm-Re-inject-DB-to-guest-with-updated-D.patch [bz#1689269] - kvm-target-i386-kvm-Block-migration-for-vCPUs-exposed-wi.patch [bz#1689269] - kvm-target-i386-kvm-do-not-initialize-padding-fields.patch [bz#1689269] - kvm-linux-headers-synchronize-generic-and-x86-KVM-header.patch [bz#1689269] - kvm-vmstate-Add-support-for-kernel-integer-types.patch [bz#1689269] - kvm-target-i386-kvm-Add-support-for-save-and-restore-nes.patch [bz#1689269] - kvm-target-i386-kvm-Add-support-for-KVM_CAP_EXCEPTION_PA.patch [bz#1689269] - kvm-target-i386-kvm-Add-nested-migration-blocker-only-wh.patch [bz#1689269] - kvm-target-i386-kvm-Demand-nested-migration-kernel-capab.patch [bz#1689269] - kvm-target-i386-skip-KVM_GET-SET_NESTED_STATE-if-VMX-dis.patch [bz#1689269] - kvm-i386-kvm-Do-not-sync-nested-state-during-runtime.patch [bz#1689269] - Resolves: bz#1513367 (qemu with libssh) - Resolves: bz#1629906 ([Intel 8.1 Feat] qemu-kvm Introduce Cascade Lake (CLX) cpu model) - Resolves: bz#1689269 (Nested KVM: support for migration of nested hypervisors - Slow Train) - Resolves: bz#1728657 ('qemu-io write' to a raw image over libgfapi fails) - Resolves: bz#1728958 (Hot unplug vfio-pci NIC devices from sev guest will cause qemu-kvm: sev_ram_block_removed: failed to unregister region) - Resolves: bz#1729975 (RHEL 8.1 Pre-Beta - Fix for hardware CPU Model)- kvm-target-i386-add-MDS-NO-feature.patch [bz#1714792] - kvm-virtio-gpu-pass-down-VirtIOGPU-pointer-to-a-bunch-of.patch [bz#1531543] - kvm-virtio-gpu-add-iommu-support.patch [bz#1531543] - kvm-virtio-gpu-fix-unmap-in-error-path.patch [bz#1531543] - Resolves: bz#1531543 ([RFE] add iommu support to virtio-gpu) - Resolves: bz#1714792 ([Intel 8.1 FEAT] MDS_NO exposure to guest)- kvm-qxl-check-release-info-object.patch [bz#1712705] - kvm-iotests-Make-182-do-without-device_add.patch [bz#1707598] - Resolves: bz#1707598 (qemu-iotest 182 fails without device hotplugging support) - Resolves: bz#1712705 (CVE-2019-12155 qemu-kvm: QEMU: qxl: null pointer dereference while releasing spice resources [rhel-8])- Rebuild all virt packages to fix RHEL's upgrade path - Resolves: rhbz#1695587 (Ensure modular RPM upgrade path)- kvm-gluster-Handle-changed-glfs_ftruncate-signature.patch [bz#1721983] - kvm-gluster-the-glfs_io_cbk-callback-function-pointer-ad.patch [bz#1721983] - Resolves: bz#1721983 (qemu-kvm can't be build with new gluster version (6.0.6))- kvm-i386-Make-arch_capabilities-migratable.patch [bz#1709970] - kvm-spapr-Fix-ibm-max-associativity-domains-property-num.patch [bz#1710662] - kvm-linux-headers-Update-for-NVLink2-passthrough-downstr.patch [bz#1710662] - kvm-pci-Move-NVIDIA-vendor-id-to-the-rest-of-ids.patch [bz#1710662] - kvm-vfio-quirks-Add-common-quirk-alloc-helper.patch [bz#1710662] - kvm-vfio-Make-vfio_get_region_info_cap-public.patch [bz#1710662] - kvm-spapr-Support-NVIDIA-V100-GPU-with-NVLink2.patch [bz#1710662] - kvm-qemu-kvm.spec-bump-libseccomp-2.4.0.patch [bz#1719578] - Resolves: bz#1709970 ([Intel 8.1 Bug] [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM - qemu-kvm) - Resolves: bz#1710662 ([IBM 8.1 FEAT] POWER9 - Virt: qemu: NVLink2 passthru to guest - Nvidia Volta (GPU) (kvm)) - Resolves: bz#1719578 (VM failed to start with error "failed to install seccomp syscall filter in the kernel")- kvm-Introduce-new-no_guest_reset-parameter-for-usb-host-.patch [bz#1713677] - kvm-usb-call-reset-handler-before-updating-state.patch [bz#1713677] - kvm-usb-host-skip-reset-for-untouched-devices.patch [bz#1713677] - kvm-usb-host-avoid-libusb_set_configuration-calls.patch [bz#1713677] - kvm-virtio-scsi-Move-BlockBackend-back-to-the-main-AioCo.patch [bz#1673396 bz#1673401] - kvm-scsi-disk-Acquire-the-AioContext-in-scsi_-_realize.patch [bz#1673396 bz#1673401] - kvm-virtio-scsi-Forbid-devices-with-different-iothreads-.patch [bz#1673396 bz#1673401] - kvm-Disable-VXHS-support.patch [bz#1714933] - Resolves: bz#1673396 (qemu-kvm core dumped after hotplug the deleted disk with iothread parameter) - Resolves: bz#1673401 (Qemu core dump when start guest with two disks using same drive) - Resolves: bz#1713677 (Detached device when trying to upgrade USB device firmware when in doing USB Passthrough via QEMU) - Resolves: bz#1714933 (Disable VXHS in qemu-kvm)- kvm-s390x-cpumodel-enum-type-S390FeatGroup-now-gets-gene.patch [bz#1660912] - kvm-linux-headers-update-against-Linux-5.2-rc1.patch [bz#1660912] - kvm-s390x-cpumodel-ignore-csske-for-expansion.patch [bz#1660912] - kvm-s390x-cpumodel-Miscellaneous-Instruction-Extensions-.patch [bz#1660912] - kvm-s390x-cpumodel-msa9-facility.patch [bz#1660912] - kvm-s390x-cpumodel-vector-enhancements.patch [bz#1660912] - kvm-s390x-cpumodel-enhanced-sort-facility.patch [bz#1660912] - kvm-s390x-cpumodel-add-Deflate-conversion-facility.patch [bz#1660912] - kvm-s390x-cpumodel-add-gen15-defintions.patch [bz#1660912] - kvm-s390x-cpumodel-wire-up-8561-and-8562-as-gen15-machin.patch [bz#1660912] - kvm-spice-set-device-address-and-device-display-ID-in-QX.patch [bz#1712946] - kvm-hw-pci-Add-missing-include.patch [bz#1712946] - Resolves: bz#1660912 ([IBM 8.1 FEAT] KVM s390x: Add hardware CPU Model - qemu part) - Resolves: bz#1712946 (qemu-kvm build is broken due to spice_qxl_set_max_monitors being deprecated)- kvm-x86-cpu-Enable-CLDEMOTE-Demote-Cache-Line-cpu-featur.patch [bz#1696436] - kvm-memory-Fix-the-memory-region-type-assignment-order.patch [bz#1667249] - kvm-target-i386-sev-Do-not-pin-the-ram-device-memory-reg.patch [bz#1667249] - kvm-block-Fix-invalidate_cache-error-path-for-parent-act.patch [bz#1673010] - kvm-target-i386-define-md-clear-bit.patch [bz#1703302 bz#1703308] - Resolves: bz#1667249 (Fail to launch AMD SEV VM with assigned PCI device) - Resolves: bz#1673010 (Local VM and migrated VM on the same host can run with same RAW file as visual disk source while without shareable configured or lock manager enabled) - Resolves: bz#1696436 ([Intel 8.0 Feat] KVM Enabling SnowRidge new NIs - qemu-kvm) - Resolves: bz#1703302 (CVE-2018-12130 virt:rhel/qemu-kvm: hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) [rhel-8]) - Resolves: bz#1703308 (CVE-2018-12127 virt:rhel/qemu-kvm: hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) [rhel-8])- kvm-i386-remove-the-INTEL_PT-CPUID-bit-from-named-CPU-mo.patch [bz#1561761] - kvm-i386-Disable-OSPKE-on-CPU-model-definitions.patch [bz#1561761] - Resolves: bz#1561761 ([Intel 8.1 Feat] qemu-kvm Introduce Icelake cpu model)- kvm-Use-KVM_GET_MSR_INDEX_LIST-for-MSR_IA32_ARCH_CAP.patch [bz#1707706] - kvm-i386-kvm-Disable-arch_capabilities-if-MSR-can-t-be-s.patch [bz#1707706] - Resolves: bz#1707706 (/builddir/build/BUILD/qemu-2.12.0/target/i386/kvm.c:2031: kvm_put_msrs: Assertion `ret == cpu->kvm_msr_buf->nmsrs' failed.)- kvm-s390-bios-Skip-bootmap-signature-entries.patch [bz#1683275] - Resolves: bz#1683275 ([IBM 8.1 FEAT] KVM: Secure Linux Boot Toleration (qemu))- kvm-i386-Add-new-MSR-indices-for-IA32_PRED_CMD-and-IA32_.patch [bz#1561761] - kvm-i386-Add-CPUID-bit-and-feature-words-for-IA32_ARCH_C.patch [bz#1561761] - kvm-i386-Add-CPUID-bit-for-PCONFIG.patch [bz#1561761] - kvm-i386-Add-CPUID-bit-for-WBNOINVD.patch [bz#1561761] - kvm-i386-Add-new-CPU-model-Icelake-Server-Client.patch [bz#1561761] - kvm-Add-support-to-KVM_GET_MSR_FEATURE_INDEX_LIST-an.patch [bz#1561761] - kvm-x86-Data-structure-changes-to-support-MSR-based-feat.patch [bz#1561761] - kvm-x86-define-a-new-MSR-based-feature-word-FEATURE_WORD.patch [bz#1561761] - kvm-i386-remove-the-new-CPUID-PCONFIG-from-Icelake-Serve.patch [bz#1561761] - kvm-Revert-i386-Add-CPUID-bit-for-PCONFIG.patch [bz#1561761] - Resolves: bz#1561761 ([Intel 8.1 Feat] qemu-kvm Introduce Icelake cpu model)- kvm-tests-crypto-Use-the-IEC-binary-prefix-definitions.patch [bz#1680231] - kvm-crypto-expand-algorithm-coverage-for-cipher-benchmar.patch [bz#1680231] - kvm-crypto-remove-code-duplication-in-tweak-encrypt-decr.patch [bz#1680231] - kvm-crypto-introduce-a-xts_uint128-data-type.patch [bz#1680231] - kvm-crypto-convert-xts_tweak_encdec-to-use-xts_uint128-t.patch [bz#1680231] - kvm-crypto-convert-xts_mult_x-to-use-xts_uint128-type.patch [bz#1680231] - kvm-crypto-annotate-xts_tweak_encdec-as-inlineable.patch [bz#1680231] - kvm-crypto-refactor-XTS-cipher-mode-test-suite.patch [bz#1680231] - kvm-crypto-add-testing-for-unaligned-buffers-with-XTS-ci.patch [bz#1680231] - Resolves: bz#1680231 (severe performance impact using luks format)- kvm-s390x-ipl-Try-to-detect-Linux-vs-non-Linux-for-initi.patch [bz#1699070] - kvm-loader-Check-access-size-when-calling-rom_ptr-to-avo.patch [bz#1699070] - kvm-hw-s390x-Use-the-IEC-binary-prefix-definitions.patch [bz#1699070] - kvm-s390x-storage-attributes-fix-CMMA_BLOCK_SIZE-usage.patch [bz#1699070] - kvm-s390x-cpumodel-fix-segmentation-fault-when-baselinin.patch [bz#1699070] - kvm-hw-s390x-s390-pci-bus-Convert-sysbus-init-function-t.patch [bz#1699070] - kvm-s390x-pci-properly-fail-if-the-zPCI-device-cannot-be.patch [bz#1699070] - kvm-s390x-pci-rename-hotplug-handler-callbacks.patch [bz#1699070] - kvm-s390-avoid-potential-null-dereference-in-s390_pcihos.patch [bz#1699070] - kvm-s390x-pci-Send-correct-event-on-hotplug.patch [bz#1699070] - kvm-s390x-pci-Set-the-iommu-region-size-mpcifc-request.patch [bz#1699070] - kvm-s390x-pci-Always-delete-and-free-the-release_timer.patch [bz#1699070] - kvm-s390x-pci-Ignore-the-unplug-call-if-we-already-have-.patch [bz#1699070] - kvm-s390x-pci-Use-hotplug_dev-instead-of-looking-up-the-.patch [bz#1699070] - kvm-s390x-pci-Move-some-hotplug-checks-to-the-pre_plug-h.patch [bz#1699070] - kvm-s390x-pci-Introduce-unplug-requests-and-split-unplug.patch [bz#1699070] - kvm-s390x-pci-Drop-release-timer-and-replace-it-with-a-f.patch [bz#1699070] - kvm-s390x-pci-mark-zpci-devices-as-unmigratable.patch [bz#1699070] - kvm-s390x-pci-Fix-primary-bus-number-for-PCI-bridges.patch [bz#1699070] - kvm-s390x-pci-Fix-hotplugging-of-PCI-bridges.patch [bz#1699070] - kvm-s390x-pci-Warn-when-adding-PCI-devices-without-the-z.patch [bz#1699070] - kvm-s390x-pci-Unplug-remaining-requested-devices-on-pcih.patch [bz#1699070] - kvm-s390x-refactor-reset-reipl-handling.patch [bz#1699070] - kvm-s390-ipl-fix-ipl-with-no-reboot.patch [bz#1699070] - Resolves: bz#1699070 (Backport s390x-related fixes for qemu-kvm)- kvm-device_tree-Fix-integer-overflowing-in-load_device_t.patch [bz#1693116] - Resolves: bz#1693116 (CVE-2018-20815 qemu-kvm: QEMU: device_tree: heap buffer overflow while loading device tree blob [rhel-8.0])- kvm-iotests-153-Fix-dead-code.patch [bz#1694148] - kvm-file-posix-Include-filename-in-locking-error-message.patch [bz#1694148] - kvm-file-posix-Skip-effectiveless-OFD-lock-operations.patch [bz#1694148] - kvm-file-posix-Drop-s-lock_fd.patch [bz#1694148] - kvm-tests-Add-unit-tests-for-image-locking.patch [bz#1694148] - kvm-file-posix-Fix-shared-locks-on-reopen-commit.patch [bz#1694148] - kvm-iotests-Test-file-posix-locking-and-reopen.patch [bz#1694148] - kvm-block-file-posix-do-not-fail-on-unlock-bytes.patch [bz#1694148] - kvm-hostmem-file-remove-object-id-from-pmem-error-messag.patch [bz#1687596] - kvm-redhat-setting-target-release-to-rhel-8.1.0.patch [] - kvm-redhat-removing-iotest-182.patch [] - Resolves: bz#1687596 ([Intel 8.1 BUG][KVM][Crystal Ridge]object_get_canonical_path_component: assertion failed: (obj->parent != NULL)) - Resolves: bz#1694148 (QEMU image locking needn't double open fd number, and it should not fail when attempting to release locks)- kvm-s390x-cpumodel-mepochptff-warn-when-no-mepoch-and-re.patch [bz#1664371] - kvm-s390x-cpumodel-add-z14-GA2-model.patch [bz#1664371] - kvm-redhat-s390x-cpumodel-enable-mepoch-by-default-for-z.patch [bz#1664371] - kvm-intel_iommu-fix-operator-in-vtd_switch_address_space.patch [bz#1662272] - kvm-intel_iommu-reset-intr_enabled-when-system-reset.patch [bz#1662272] - kvm-pci-msi-export-msi_is_masked.patch [bz#1662272] - kvm-i386-kvm-ignore-masked-irqs-when-update-msi-routes.patch [bz#1662272] - Resolves: bz#1662272 (Boot guest with device assignment+vIOMMU, qemu prompts "vtd_interrupt_remap_msi: MSI address low 32 bit invalid: 0x0" when first rebooting guest) - Resolves: bz#1664371 ([IBM 8.1 FEAT] Update hardware CPU Model z14 (kvm) - qemu part)- kvm-doc-fix-the-configuration-path.patch [bz#1645411] - kvm-Increase-number-of-iotests-being-run-as-a-part-of-RH.patch [bz#1664463] - kvm-Load-kvm-module-during-boot.patch [bz#1676907 bz#1685995] - kvm-qemu-kvm.spec.template-Update-pyton-path-to-system-i.patch [] - Resolves: bz#1645411 (the "fsfreeze-hook" script path shown by command "qemu-ga --help" or "man qemu-ga" is wrong) - Resolves: bz#1664463 (Modify iotest behavior to include luks and nbd and fail build if iotests fail) - Resolves: bz#1676907 (/dev/kvm device exists but kernel module is not loaded on boot up causing VM start to fail in libvirt) - Resolves: bz#1685995 (/dev/kvm device exists but kernel module is not loaded on boot up causing VM start to fail in libvirt)- kvm-scsi-generic-avoid-possible-out-of-bounds-access-to-.patch [bz#1668162] - Resolves: bz#1668162 (CVE-2019-6501 qemu-kvm: QEMU: scsi-generic: possible OOB access while handling inquiry request [rhel-8])- kvm-slirp-check-data-length-while-emulating-ident-functi.patch [bz#1669069] - Resolves: bz#1669069 (CVE-2019-6778 qemu-kvm: QEMU: slirp: heap buffer overflow in tcp_emu() [rhel-8.0])- kvm-qemu-ga-make-get-fsinfo-work-over-pci-bridges.patch [bz#1666952] - kvm-qga-fix-driver-leak-in-guest-get-fsinfo.patch [bz#1666952] - Resolves: bz#1666952 (qemu-guest-agent does not parse PCI bridge links in "build_guest_fsinfo_for_real_device" (q35))- kvm-ne2000-fix-possible-out-of-bound-access-in-ne2000_re.patch [bz#1636784] - kvm-rtl8139-fix-possible-out-of-bound-access.patch [bz#1636784] - kvm-pcnet-fix-possible-buffer-overflow.patch [bz#1636784] - kvm-net-ignore-packet-size-greater-than-INT_MAX.patch [bz#1636784] - kvm-net-drop-too-large-packet-early.patch [bz#1636784] - kvm-net-hub-suppress-warnings-of-no-host-network-for-qte.patch [bz#1636784] - kvm-virtio-net-test-accept-variable-length-argument-in-p.patch [bz#1636784] - kvm-virtio-net-test-remove-unused-macro.patch [bz#1636784] - kvm-virtio-net-test-add-large-tx-buffer-test.patch [bz#1636784] - kvm-s390x-Return-specification-exception-for-unimplement.patch [bz#1668261] - kvm-cpus-ignore-ESRCH-in-qemu_cpu_kick_thread.patch [bz#1665844] - Resolves: bz#1636784 (CVE-2018-17963 qemu-kvm: Qemu: net: ignore packets with large size [rhel-8]) - Resolves: bz#1665844 (Guest quit with error when hotunplug cpu) - Resolves: bz#1668261 ([RHEL8] Backport diag308 stable exception fix (qemu-kvm))- kvm-hw-scsi-cleanups-before-VPD-BL-emulation.patch [bz#1639957] - kvm-hw-scsi-centralize-SG_IO-calls-into-single-function.patch [bz#1639957] - kvm-hw-scsi-add-VPD-Block-Limits-emulation.patch [bz#1639957] - kvm-scsi-disk-Block-Device-Characteristics-emulation-fix.patch [bz#1639957] - kvm-scsi-generic-keep-VPD-page-list-sorted.patch [bz#1639957] - kvm-scsi-generic-avoid-out-of-bounds-access-to-VPD-page-.patch [bz#1639957] - kvm-scsi-generic-avoid-invalid-access-to-struct-when-emu.patch [bz#1639957] - kvm-scsi-generic-do-not-do-VPD-emulation-for-sense-other.patch [bz#1639957] - Resolves: bz#1639957 ([RHEL.8] scsi host device passthrough limits IO writes - slow train)- kvm-block-Update-flags-in-bdrv_set_read_only.patch [bz#1644996] - kvm-block-Add-auto-read-only-option.patch [bz#1644996] - kvm-rbd-Close-image-in-qemu_rbd_open-error-path.patch [bz#1644996] - kvm-block-Require-auto-read-only-for-existing-fallbacks.patch [bz#1644996] - kvm-nbd-Support-auto-read-only-option.patch [bz#1644996] - kvm-file-posix-Support-auto-read-only-option.patch [bz#1644996] - kvm-curl-Support-auto-read-only-option.patch [bz#1644996] - kvm-gluster-Support-auto-read-only-option.patch [bz#1644996] - kvm-iscsi-Support-auto-read-only-option.patch [bz#1644996] - kvm-block-Make-auto-read-only-on-default-for-drive.patch [bz#1644996] - kvm-qemu-iotests-Test-auto-read-only-with-drive-and-bloc.patch [bz#1644996] - kvm-block-Fix-update-of-BDRV_O_AUTO_RDONLY-in-update_fla.patch [bz#1644996] - kvm-qemu-img-Add-C-option-for-convert-with-copy-offloadi.patch [bz#1623082] - kvm-iotests-Add-test-for-qemu-img-convert-C-compatibilit.patch [bz#1623082] - Resolves: bz#1623082 ([rhel.8.0]Target files for 'qemu-img convert' do not support thin_provisoning with iscsi/nfs backend) - Resolves: bz#1644996 (block-commit can't be used with -blockdev)- kvm-qemu-kvm.spec.template-Update-files-for-tests-rpm-to.patch [bz#1601107]- kvm-Run-iotests-as-part-of-the-build-process.patch [bz#1661026] - kvm-Introduce-the-qemu-kvm-tests-rpm.patch [bz#1601107] - Resolves: bz#1601107 (qemu-kvm packaging: make running qemu-iotests more robust) - Resolves: bz#1661026 (Run iotests as part of build process)- kvm-block-Don-t-inactivate-children-before-parents.patch [bz#1659395] - kvm-iotests-Test-migration-with-blockdev.patch [bz#1659395] - Resolves: bz#1659395 (src qemu core dump when do migration ( block device node-name changed after change cdrom) - Slow Train)- kvm-s390x-tcg-avoid-overflows-in-time2tod-tod2time.patch [bz#1653569] - kvm-s390x-kvm-pass-values-instead-of-pointers-to-kvm_s39.patch [bz#1653569] - kvm-s390x-tod-factor-out-TOD-into-separate-device.patch [bz#1653569] - kvm-s390x-tcg-drop-tod_basetime.patch [bz#1653569] - kvm-s390x-tcg-properly-implement-the-TOD.patch [bz#1653569] - kvm-s390x-tcg-SET-CLOCK-COMPARATOR-can-clear-CKC-interru.patch [bz#1653569] - kvm-s390x-tcg-implement-SET-CLOCK.patch [bz#1653569] - kvm-s390x-tcg-rearm-the-CKC-timer-during-migration.patch [bz#1653569] - kvm-s390x-tcg-fix-locking-problem-with-tcg_s390_tod_upda.patch [bz#1653569] - kvm-hw-s390x-Include-the-tod-qemu-also-for-builds-with-d.patch [bz#1653569] - kvm-s390x-tod-Properly-stop-the-KVM-TOD-while-the-guest-.patch [bz#1653569] - kvm-hw-s390x-Fix-bad-mask-in-time2tod.patch [bz#1653569] - kvm-migration-discard-non-migratable-RAMBlocks.patch [bz#1539285] - kvm-vfio-pci-do-not-set-the-PCIDevice-has_rom-attribute.patch [bz#1539285] - kvm-memory-exec-Expose-all-memory-block-related-flags.patch [bz#1539285] - kvm-memory-exec-switch-file-ram-allocation-functions-to-.patch [bz#1539285] - kvm-configure-add-libpmem-support.patch [bz#1539285] - kvm-hostmem-file-add-the-pmem-option.patch [bz#1539285] - kvm-mem-nvdimm-ensure-write-persistence-to-PMEM-in-label.patch [bz#1539285] - kvm-migration-ram-Add-check-and-info-message-to-nvdimm-p.patch [bz#1539285] - kvm-migration-ram-ensure-write-persistence-on-loading-al.patch [bz#1539285] - Resolves: bz#1539285 ([Intel 8.0 Bug] [KVM][Crystal Ridge] Lack of data persistence guarantee of QEMU writes to host PMEM) - Resolves: bz#1653569 (Stress guest and stop it, then do live migration, guest hit call trace on destination end)- kvm-ui-add-qapi-parser-for-display.patch [bz#1652871] - kvm-ui-switch-trivial-displays-to-qapi-parser.patch [bz#1652871] - kvm-qapi-Add-rendernode-display-option-for-egl-headless.patch [bz#1652871] - kvm-ui-Allow-specifying-rendernode-display-option-for-eg.patch [bz#1652871] - kvm-qapi-add-query-display-options-command.patch [bz#1652871] - Resolves: bz#1652871 (QEMU doesn't expose rendernode option for egl-headless display type)- kvm-Add-edk2-Requires-to-qemu-kvm.patch [bz#1654276] - Resolves: bz#1654276 (qemu-kvm: Should depend on the architecture-appropriate guest firmware)- kvm-x86-host-phys-bits-limit-option.patch [bz#1598284] - kvm-rhel-Set-host-phys-bits-limit-48-on-rhel-machine-typ.patch [bz#1598284] - kvm-i386-do-not-migrate-MSR_SMI_COUNT-on-machine-types-2.patch [bz#1659565] - kvm-pc-x-migrate-smi-count-to-PC_RHEL_COMPAT.patch [bz#1659565] - kvm-slow-train-kvm-clear-out-KVM_ASYNC_PF_DELIVERY_AS_PF.patch [bz#1656829] - Resolves: bz#1598284 ([Intel 8.0 Alpha] physical bits should < 48 when host with 5level paging &EPT5 and qemu command with "-cpu qemu64" parameters.) - Resolves: bz#1656829 (8->7 migration failed: qemu-kvm: error: failed to set MSR 0x4b564d02 to 0x27fc13285) - Resolves: bz#1659565 (machine type: required compat flag x-migrate-smi-count=off)- kvm-Add-edk2-Requires-to-qemu-kvm.patch [bz#1654276] - Resolves: bz#1654276 (qemu-kvm: Should depend on the architecture-appropriate guest firmware)- kvm-redhat-enable-tpmdev-passthrough.patch [bz#1654486] - Resolves: bz#1654486 ([RFE] enable TPM passthrough at compile time (qemu-kvm))- kvm-redhat-use-autopatch-instead-of-PATCHAPPLY.patch [bz#1613128] - kvm-redhat-Removing-some-unused-build-flags-in-the-spec-.patch [bz#1613128] - kvm-redhat-Fixing-rhev-ma-conflicts.patch [bz#1613126] - kvm-redhat-Remove-_smp_mflags-cleanup-workaround-for-s39.patch [bz#1613128] - kvm-redhat-Removing-dead-code-from-the-spec-file.patch [bz#1613128] - kvm-i386-Add-stibp-flag-name.patch [bz#1639446] - kvm-Add-functional-acceptance-tests-infrastructure.patch [bz#1655807] - kvm-scripts-qemu.py-allow-adding-to-the-list-of-extra-ar.patch [bz#1655807] - kvm-Acceptance-tests-add-quick-VNC-tests.patch [bz#1655807] - kvm-scripts-qemu.py-introduce-set_console-method.patch [bz#1655807] - kvm-Acceptance-tests-add-Linux-kernel-boot-and-console-c.patch [bz#1655807] - kvm-Bootstrap-Python-venv-for-tests.patch [bz#1655807] - kvm-Acceptance-tests-add-make-rule-for-running-them.patch [bz#1655807] - Resolves: bz#1613126 (Check and fix qemu-kvm-rhev and qemu-kvm-ma conflicts in qemu-kvm for rhel-8) - Resolves: bz#1613128 (Spec file clean up) - Resolves: bz#1639446 (Cross migration from RHEL7.5 to RHEL8 shouldn't fail with cpu flag stibp [qemu-kvm]) - Resolves: bz#1655807 (Backport avocado-qemu tests for QEMU 2.12)- kvm-Disable-CONFIG_IPMI-and-CONFIG_I2C-for-ppc64.patch [bz#1640044] - kvm-Disable-CONFIG_CAN_BUS-and-CONFIG_CAN_SJA1000.patch [bz#1640042] - Resolves: bz#1640042 (Disable CONFIG_CAN_BUS and CONFIG_CAN_SJA1000 config switches) - Resolves: bz#1640044 (Disable CONFIG_I2C and CONFIG_IPMI in default-configs/ppc64-softmmu.mak)- kvm-qcow2-Give-the-refcount-cache-the-minimum-possible-s.patch [bz#1656507] - kvm-docs-Document-the-new-default-sizes-of-the-qcow2-cac.patch [bz#1656507] - kvm-qcow2-Fix-Coverity-warning-when-calculating-the-refc.patch [bz#1656507] - kvm-include-Add-IEC-binary-prefixes-in-qemu-units.h.patch [bz#1656507] - kvm-qcow2-Options-documentation-fixes.patch [bz#1656507] - kvm-include-Add-a-lookup-table-of-sizes.patch [bz#1656507] - kvm-qcow2-Make-sizes-more-humanly-readable.patch [bz#1656507] - kvm-qcow2-Avoid-duplication-in-setting-the-refcount-cach.patch [bz#1656507] - kvm-qcow2-Assign-the-L2-cache-relatively-to-the-image-si.patch [bz#1656507] - kvm-qcow2-Increase-the-default-upper-limit-on-the-L2-cac.patch [bz#1656507] - kvm-qcow2-Resize-the-cache-upon-image-resizing.patch [bz#1656507] - kvm-qcow2-Set-the-default-cache-clean-interval-to-10-min.patch [bz#1656507] - kvm-qcow2-Explicit-number-replaced-by-a-constant.patch [bz#1656507] - kvm-block-backend-Set-werror-rerror-defaults-in-blk_new.patch [bz#1657637] - kvm-qcow2-Fix-cache-clean-interval-documentation.patch [bz#1656507] - Resolves: bz#1656507 ([RHEL.8] qcow2 cache is too small) - Resolves: bz#1657637 (Wrong werror default for -device drive=)- kvm-target-ppc-add-basic-support-for-PTCR-on-POWER9.patch [bz#1639069] - kvm-linux-headers-Update-for-nested-KVM-HV-downstream-on.patch [bz#1639069] - kvm-target-ppc-Add-one-reg-id-for-ptcr.patch [bz#1639069] - kvm-ppc-spapr_caps-Add-SPAPR_CAP_NESTED_KVM_HV.patch [bz#1639069] - kvm-Re-enable-CONFIG_HYPERV_TESTDEV.patch [bz#1651195] - kvm-qxl-use-guest_monitor_config-for-local-renderer.patch [bz#1610163] - kvm-Declare-cirrus-vga-as-deprecated.patch [bz#1651994] - kvm-Do-not-build-bluetooth-support.patch [bz#1654651] - kvm-vfio-helpers-Fix-qemu_vfio_open_pci-crash.patch [bz#1645840] - kvm-balloon-Allow-multiple-inhibit-users.patch [bz#1650272] - kvm-Use-inhibit-to-prevent-ballooning-without-synchr.patch [bz#1650272] - kvm-vfio-Inhibit-ballooning-based-on-group-attachment-to.patch [bz#1650272] - kvm-vfio-ccw-pci-Allow-devices-to-opt-in-for-ballooning.patch [bz#1650272] - kvm-vfio-pci-Handle-subsystem-realpath-returning-NULL.patch [bz#1650272] - kvm-vfio-pci-Fix-failure-to-close-file-descriptor-on-err.patch [bz#1650272] - kvm-postcopy-Synchronize-usage-of-the-balloon-inhibitor.patch [bz#1650272] - Resolves: bz#1610163 (guest shows border blurred screen with some resolutions when qemu boot with -device qxl-vga ,and guest on rhel7.6 has no such question) - Resolves: bz#1639069 ([IBM 8.0 FEAT] POWER9 - Nested virtualization in RHEL8.0 KVM for ppc64le - qemu-kvm side) - Resolves: bz#1645840 (Qemu core dump when hotplug nvme:// drive via -blockdev) - Resolves: bz#1650272 (Ballooning is incompatible with vfio assigned devices, but not prevented) - Resolves: bz#1651195 (Re-enable hyperv-testdev device) - Resolves: bz#1651994 (Declare the "Cirrus VGA" device emulation of QEMU as deprecated in RHEL8) - Resolves: bz#1654651 (Qemu: hw: bt: keep bt/* objects from building [rhel-8.0])- kvm-block-Make-more-block-drivers-compile-time-configura.patch [bz#1598842 bz#1598842] - kvm-RHEL8-Add-disable-configure-options-to-qemu-spec-fil.patch [bz#1598842] - Resolves: bz#1598842 (Compile out unused block drivers)- kvm-configure-add-test-for-libudev.patch [bz#1636185] - kvm-qga-linux-report-disk-serial-number.patch [bz#1636185] - kvm-qga-linux-return-disk-device-in-guest-get-fsinfo.patch [bz#1636185] - kvm-qemu-error-introduce-error-warn-_report_once.patch [bz#1625173] - kvm-intel-iommu-start-to-use-error_report_once.patch [bz#1625173] - kvm-intel-iommu-replace-more-vtd_err_-traces.patch [bz#1625173] - kvm-intel_iommu-introduce-vtd_reset_caches.patch [bz#1625173] - kvm-intel_iommu-better-handling-of-dmar-state-switch.patch [bz#1625173] - kvm-intel_iommu-move-ce-fetching-out-when-sync-shadow.patch [bz#1625173 bz#1629616] - kvm-intel_iommu-handle-invalid-ce-for-shadow-sync.patch [bz#1625173 bz#1629616] - kvm-block-remove-bdrv_dirty_bitmap_make_anon.patch [bz#1518989] - kvm-block-simplify-code-around-releasing-bitmaps.patch [bz#1518989] - kvm-hbitmap-Add-advance-param-to-hbitmap_iter_next.patch [bz#1518989] - kvm-test-hbitmap-Add-non-advancing-iter_next-tests.patch [bz#1518989] - kvm-block-dirty-bitmap-Add-bdrv_dirty_iter_next_area.patch [bz#1518989] - kvm-blockdev-backup-add-bitmap-argument.patch [bz#1518989] - kvm-dirty-bitmap-switch-assert-fails-to-errors-in-bdrv_m.patch [bz#1518989] - kvm-dirty-bitmap-rename-bdrv_undo_clear_dirty_bitmap.patch [bz#1518989] - kvm-dirty-bitmap-make-it-possible-to-restore-bitmap-afte.patch [bz#1518989] - kvm-blockdev-rename-block-dirty-bitmap-clear-transaction.patch [bz#1518989] - kvm-qapi-add-transaction-support-for-x-block-dirty-bitma.patch [bz#1518989] - kvm-block-dirty-bitmaps-add-user_locked-status-checker.patch [bz#1518989] - kvm-block-dirty-bitmaps-fix-merge-permissions.patch [bz#1518989] - kvm-block-dirty-bitmaps-allow-clear-on-disabled-bitmaps.patch [bz#1518989] - kvm-block-dirty-bitmaps-prohibit-enable-disable-on-locke.patch [bz#1518989] - kvm-block-backup-prohibit-backup-from-using-in-use-bitma.patch [bz#1518989] - kvm-nbd-forbid-use-of-frozen-bitmaps.patch [bz#1518989] - kvm-bitmap-Update-count-after-a-merge.patch [bz#1518989] - kvm-iotests-169-drop-deprecated-autoload-parameter.patch [bz#1518989] - kvm-block-qcow2-improve-error-message-in-qcow2_inactivat.patch [bz#1518989] - kvm-bloc-qcow2-drop-dirty_bitmaps_loaded-state-variable.patch [bz#1518989] - kvm-dirty-bitmaps-clean-up-bitmaps-loading-and-migration.patch [bz#1518989] - kvm-iotests-improve-169.patch [bz#1518989] - kvm-iotests-169-add-cases-for-source-vm-resuming.patch [bz#1518989] - kvm-pc-dimm-turn-alignment-assert-into-check.patch [bz#1630116] - Resolves: bz#1518989 (RFE: QEMU Incremental live backup) - Resolves: bz#1625173 ([NVMe Device Assignment] Guest could not boot up with q35+iommu) - Resolves: bz#1629616 (boot guest with q35+vIOMMU+ device assignment, qemu terminal shows "qemu-kvm: VFIO_UNMAP_DMA: -22" when return assigned network devices from vfio driver to ixgbe in guest) - Resolves: bz#1630116 (pc_dimm_get_free_addr: assertion failed: (QEMU_ALIGN_UP(address_space_start, align) == address_space_start)) - Resolves: bz#1636185 ([RFE] Report disk device name and serial number (qemu-guest-agent on Linux))- kvm-luks-Allow-share-rw-on.patch [bz#1629701] - kvm-redhat-reenable-gluster-support.patch [bz#1599340] - kvm-redhat-bump-libusb-requirement.patch [bz#1627970] - Resolves: bz#1599340 (Reenable glusterfs in qemu-kvm once BZ#1567292 gets fixed) - Resolves: bz#1627970 (symbol lookup error: /usr/libexec/qemu-kvm: undefined symbol: libusb_set_option) - Resolves: bz#1629701 ("share-rw=on" does not work for luks format image - Fast Train)- kvm-block-rbd-pull-out-qemu_rbd_convert_options.patch [bz#1635585] - kvm-block-rbd-Attempt-to-parse-legacy-filenames.patch [bz#1635585] - kvm-block-rbd-add-deprecation-documentation-for-filename.patch [bz#1635585] - kvm-block-rbd-add-iotest-for-rbd-legacy-keyvalue-filenam.patch [bz#1635585] - Resolves: bz#1635585 (rbd json format of 7.6 is incompatible with 7.5)- kvm-vnc-call-sasl_server_init-only-when-required.patch [bz#1609327] - kvm-nbd-server-fix-NBD_CMD_CACHE.patch [bz#1636142] - kvm-nbd-fix-NBD_FLAG_SEND_CACHE-value.patch [bz#1636142] - kvm-test-bdrv-drain-bdrv_drain-works-with-cross-AioConte.patch [bz#1637976] - kvm-block-Use-bdrv_do_drain_begin-end-in-bdrv_drain_all.patch [bz#1637976] - kvm-block-Remove-recursive-parameter-from-bdrv_drain_inv.patch [bz#1637976] - kvm-block-Don-t-manually-poll-in-bdrv_drain_all.patch [bz#1637976] - kvm-tests-test-bdrv-drain-bdrv_drain_all-works-in-corout.patch [bz#1637976] - kvm-block-Avoid-unnecessary-aio_poll-in-AIO_WAIT_WHILE.patch [bz#1637976] - kvm-block-Really-pause-block-jobs-on-drain.patch [bz#1637976] - kvm-block-Remove-bdrv_drain_recurse.patch [bz#1637976] - kvm-test-bdrv-drain-Add-test-for-node-deletion.patch [bz#1637976] - kvm-block-Drain-recursively-with-a-single-BDRV_POLL_WHIL.patch [bz#1637976] - kvm-test-bdrv-drain-Test-node-deletion-in-subtree-recurs.patch [bz#1637976] - kvm-block-Don-t-poll-in-parent-drain-callbacks.patch [bz#1637976] - kvm-test-bdrv-drain-Graph-change-through-parent-callback.patch [bz#1637976] - kvm-block-Defer-.bdrv_drain_begin-callback-to-polling-ph.patch [bz#1637976] - kvm-test-bdrv-drain-Test-that-bdrv_drain_invoke-doesn-t-.patch [bz#1637976] - kvm-block-Allow-AIO_WAIT_WHILE-with-NULL-ctx.patch [bz#1637976] - kvm-block-Move-bdrv_drain_all_begin-out-of-coroutine-con.patch [bz#1637976] - kvm-block-ignore_bds_parents-parameter-for-drain-functio.patch [bz#1637976] - kvm-block-Allow-graph-changes-in-bdrv_drain_all_begin-en.patch [bz#1637976] - kvm-test-bdrv-drain-Test-graph-changes-in-drain_all-sect.patch [bz#1637976] - kvm-block-Poll-after-drain-on-attaching-a-node.patch [bz#1637976] - kvm-test-bdrv-drain-Test-bdrv_append-to-drained-node.patch [bz#1637976] - kvm-block-linux-aio-acquire-AioContext-before-qemu_laio_.patch [bz#1637976] - kvm-util-async-use-qemu_aio_coroutine_enter-in-co_schedu.patch [bz#1637976] - kvm-job-Fix-nested-aio_poll-hanging-in-job_txn_apply.patch [bz#1637976] - kvm-job-Fix-missing-locking-due-to-mismerge.patch [bz#1637976] - kvm-blockjob-Wake-up-BDS-when-job-becomes-idle.patch [bz#1637976] - kvm-aio-wait-Increase-num_waiters-even-in-home-thread.patch [bz#1637976] - kvm-test-bdrv-drain-Drain-with-block-jobs-in-an-I-O-thre.patch [bz#1637976] - kvm-test-blockjob-Acquire-AioContext-around-job_cancel_s.patch [bz#1637976] - kvm-job-Use-AIO_WAIT_WHILE-in-job_finish_sync.patch [bz#1637976] - kvm-test-bdrv-drain-Test-AIO_WAIT_WHILE-in-completion-ca.patch [bz#1637976] - kvm-block-Add-missing-locking-in-bdrv_co_drain_bh_cb.patch [bz#1637976] - kvm-block-backend-Add-.drained_poll-callback.patch [bz#1637976] - kvm-block-backend-Fix-potential-double-blk_delete.patch [bz#1637976] - kvm-block-backend-Decrease-in_flight-only-after-callback.patch [bz#1637976] - kvm-blockjob-Lie-better-in-child_job_drained_poll.patch [bz#1637976] - kvm-block-Remove-aio_poll-in-bdrv_drain_poll-variants.patch [bz#1637976] - kvm-test-bdrv-drain-Test-nested-poll-in-bdrv_drain_poll_.patch [bz#1637976] - kvm-job-Avoid-deadlocks-in-job_completed_txn_abort.patch [bz#1637976] - kvm-test-bdrv-drain-AIO_WAIT_WHILE-in-job-.commit-.abort.patch [bz#1637976] - kvm-test-bdrv-drain-Fix-outdated-comments.patch [bz#1637976] - kvm-block-Use-a-single-global-AioWait.patch [bz#1637976] - kvm-test-bdrv-drain-Test-draining-job-source-child-and-p.patch [bz#1637976] - kvm-qemu-img-Fix-assert-when-mapping-unaligned-raw-file.patch [bz#1639374] - kvm-iotests-Add-test-221-to-catch-qemu-img-map-regressio.patch [bz#1639374] - Resolves: bz#1609327 (qemu-kvm[37046]: Could not find keytab file: /etc/qemu/krb5.tab: Unknown error 49408) - Resolves: bz#1636142 (qemu NBD_CMD_CACHE flaws impacting non-qemu NBD clients) - Resolves: bz#1637976 (Crashes and hangs with iothreads vs. block jobs) - Resolves: bz#1639374 (qemu-img map 'Aborted (core dumped)' when specifying a plain file)- kvm-linux-headers-update.patch [bz#1508142] - kvm-s390x-cpumodel-Set-up-CPU-model-for-AP-device-suppor.patch [bz#1508142] - kvm-s390x-kvm-enable-AP-instruction-interpretation-for-g.patch [bz#1508142] - kvm-s390x-ap-base-Adjunct-Processor-AP-object-model.patch [bz#1508142] - kvm-s390x-vfio-ap-Introduce-VFIO-AP-device.patch [bz#1508142] - kvm-s390-doc-detailed-specifications-for-AP-virtualizati.patch [bz#1508142] - Resolves: bz#1508142 ([IBM 8.0 FEAT] KVM: Guest-dedicated Crypto Adapters - qemu part)- kvm-Revert-hw-acpi-build-build-SRAT-memory-affinity-stru.patch [bz#1609235] - kvm-add-udev-kvm-check.patch [bz#1552663] - kvm-aio-posix-Don-t-count-ctx-notifier-as-progress-when-.patch [bz#1623085] - kvm-aio-Do-aio_notify_accept-only-during-blocking-aio_po.patch [bz#1623085] - kvm-aio-posix-fix-concurrent-access-to-poll_disable_cnt.patch [bz#1632622] - kvm-aio-posix-compute-timeout-before-polling.patch [bz#1632622] - kvm-aio-posix-do-skip-system-call-if-ctx-notifier-pollin.patch [bz#1632622] - kvm-intel-iommu-send-PSI-always-even-if-across-PDEs.patch [bz#1450712] - kvm-intel-iommu-remove-IntelIOMMUNotifierNode.patch [bz#1450712] - kvm-intel-iommu-add-iommu-lock.patch [bz#1450712] - kvm-intel-iommu-only-do-page-walk-for-MAP-notifiers.patch [bz#1450712] - kvm-intel-iommu-introduce-vtd_page_walk_info.patch [bz#1450712] - kvm-intel-iommu-pass-in-address-space-when-page-walk.patch [bz#1450712] - kvm-intel-iommu-trace-domain-id-during-page-walk.patch [bz#1450712] - kvm-util-implement-simple-iova-tree.patch [bz#1450712] - kvm-intel-iommu-rework-the-page-walk-logic.patch [bz#1450712] - kvm-i386-define-the-ssbd-CPUID-feature-bit-CVE-2018-3639.patch [bz#1633928] - Resolves: bz#1450712 (Booting nested guest with vIOMMU, the assigned network devices can not receive packets (qemu)) - Resolves: bz#1552663 (81-kvm-rhel.rules is no longer part of initscripts) - Resolves: bz#1609235 (Win2016 guest can't recognize pc-dimm hotplugged to node 0) - Resolves: bz#1623085 (VM doesn't boot from HD) - Resolves: bz#1632622 (~40% virtio_blk disk performance drop for win2012r2 guest when comparing qemu-kvm-rhev-2.12.0-9 with qemu-kvm-rhev-2.12.0-12) - Resolves: bz#1633928 (CVE-2018-3639 qemu-kvm: hw: cpu: speculative store bypass [rhel-8.0])- kvm-block-for-jobs-do-not-clear-user_paused-until-after-.patch [bz#1635583] - kvm-iotests-Add-failure-matching-to-common.qemu.patch [bz#1635583] - kvm-block-iotest-to-catch-abort-on-forced-blockjob-cance.patch [bz#1635583] - Resolves: bz#1635583 (Quitting VM causes qemu core dump once the block mirror job paused for no enough target space)- kvm-check-Only-test-ivshm-when-it-is-compiled-in.patch [bz#1621817] - kvm-Disable-ivshmem.patch [bz#1621817] - kvm-mirror-Fail-gracefully-for-source-target.patch [bz#1637963] - kvm-commit-Add-top-node-base-node-options.patch [bz#1637970] - kvm-qemu-iotests-Test-commit-with-top-node-base-node.patch [bz#1637970] - Resolves: bz#1621817 (Disable IVSHMEM in RHEL 8) - Resolves: bz#1637963 (Segfault on 'blockdev-mirror' with same node as source and target) - Resolves: bz#1637970 (allow using node-names with block-commit)- kvm-redhat-make-the-plugins-executable.patch [bz#1638304] - Resolves: bz#1638304 (the driver packages lack all the library Requires)- kvm-seccomp-allow-sched_setscheduler-with-SCHED_IDLE-pol.patch [bz#1618356] - kvm-seccomp-use-SIGSYS-signal-instead-of-killing-the-thr.patch [bz#1618356] - kvm-seccomp-prefer-SCMP_ACT_KILL_PROCESS-if-available.patch [bz#1618356] - kvm-configure-require-libseccomp-2.2.0.patch [bz#1618356] - kvm-seccomp-set-the-seccomp-filter-to-all-threads.patch [bz#1618356] - kvm-memory-cleanup-side-effects-of-memory_region_init_fo.patch [bz#1600365] - Resolves: bz#1600365 (QEMU core dumped when hotplug memory exceeding host hugepages and with discard-data=yes) - Resolves: bz#1618356 (qemu-kvm: Qemu: seccomp: blacklist is not applied to all threads [rhel-8])- kvm-migration-postcopy-Clear-have_listen_thread.patch [bz#1608765] - kvm-migration-cleanup-in-error-paths-in-loadvm.patch [bz#1608765] - kvm-jobs-change-start-callback-to-run-callback.patch [bz#1632939] - kvm-jobs-canonize-Error-object.patch [bz#1632939] - kvm-jobs-add-exit-shim.patch [bz#1632939] - kvm-block-commit-utilize-job_exit-shim.patch [bz#1632939] - kvm-block-mirror-utilize-job_exit-shim.patch [bz#1632939] - kvm-jobs-utilize-job_exit-shim.patch [bz#1632939] - kvm-block-backup-make-function-variables-consistently-na.patch [bz#1632939] - kvm-jobs-remove-ret-argument-to-job_completed-privatize-.patch [bz#1632939] - kvm-jobs-remove-job_defer_to_main_loop.patch [bz#1632939] - kvm-block-commit-add-block-job-creation-flags.patch [bz#1632939] - kvm-block-mirror-add-block-job-creation-flags.patch [bz#1632939] - kvm-block-stream-add-block-job-creation-flags.patch [bz#1632939] - kvm-block-commit-refactor-commit-to-use-job-callbacks.patch [bz#1632939] - kvm-block-mirror-don-t-install-backing-chain-on-abort.patch [bz#1632939] - kvm-block-mirror-conservative-mirror_exit-refactor.patch [bz#1632939] - kvm-block-stream-refactor-stream-to-use-job-callbacks.patch [bz#1632939] - kvm-tests-blockjob-replace-Blockjob-with-Job.patch [bz#1632939] - kvm-tests-test-blockjob-remove-exit-callback.patch [bz#1632939] - kvm-tests-test-blockjob-txn-move-.exit-to-.clean.patch [bz#1632939] - kvm-jobs-remove-.exit-callback.patch [bz#1632939] - kvm-qapi-block-commit-expose-new-job-properties.patch [bz#1632939] - kvm-qapi-block-mirror-expose-new-job-properties.patch [bz#1632939] - kvm-qapi-block-stream-expose-new-job-properties.patch [bz#1632939] - kvm-block-backup-qapi-documentation-fixup.patch [bz#1632939] - kvm-blockdev-document-transactional-shortcomings.patch [bz#1632939] - Resolves: bz#1608765 (After postcopy migration, do savevm and loadvm, guest hang and call trace) - Resolves: bz#1632939 (qemu blockjobs other than backup do not support job-finalize or job-dismiss)- kvm-Re-enable-disabled-Hyper-V-enlightenments.patch [bz#1625185] - kvm-Fix-annocheck-issues.patch [bz#1624164] - kvm-exec-check-that-alignment-is-a-power-of-two.patch [bz#1630746] - kvm-curl-Make-sslverify-off-disable-host-as-well-as-peer.patch [bz#1575925] - Resolves: bz#1575925 ("SSL: no alternative certificate subject name matches target host name" error even though sslverify = off) - Resolves: bz#1624164 (Review annocheck distro flag failures in qemu-kvm) - Resolves: bz#1625185 (Re-enable disabled Hyper-V enlightenments) - Resolves: bz#1630746 (qemu_ram_mmap: Assertion `is_power_of_2(align)' failed)- kvm-i386-Disable-TOPOEXT-by-default-on-cpu-host.patch [bz#1619804] - kvm-redhat-enable-opengl-add-build-and-runtime-deps.patch [bz#1618412] - Resolves: bz#1618412 (Enable opengl (for intel vgpu display)) - Resolves: bz#1619804 (kernel panic in init_amd_cacheinfo)- kvm-redhat-Disable-vhost-crypto.patch [bz#1625668] - Resolves: bz#1625668 (Decide if we should disable 'vhost-crypto' or not)- kvm-target-i386-sev-fix-memory-leaks.patch [bz#1615717] - kvm-i386-Fix-arch_query_cpu_model_expansion-leak.patch [bz#1615717] - kvm-redhat-Update-build-configuration.patch [bz#1573156] - Resolves: bz#1573156 (Update build configure for QEMU 2.12.0) - Resolves: bz#1615717 (Memory leaks)- kvm-e1000e-Do-not-auto-clear-ICR-bits-which-aren-t-set-i.patch [bz#1596024] - kvm-e1000e-Prevent-MSI-MSI-X-storms.patch [bz#1596024] - kvm-Drop-build_configure.sh-and-Makefile.local-files.patch [] - kvm-Fix-subject-line-in-.gitpublish.patch [] - Resolves: bz#1596024 (The network link can't be detected on guest when the guest uses e1000e model type)- kvm-Fix-libusb-1.0.22-deprecated-libusb_set_debug-with-l.patch [bz#1622656] - Resolves: bz#1622656 (qemu-kvm fails to build due to libusb_set_debug being deprecated)- kvm-redhat-remove-extra-in-rhel_rhev_conflicts-macro.patch [bz#1618752] - Resolves: bz#1618752 (qemu-kvm can't be installed in RHEL-8 as it Conflicts with itself.)- kvm-Migration-TLS-Fix-crash-due-to-double-cleanup.patch [bz#1594384] - Resolves: bz#1594384 (2.12 migration fixes)- kvm-Add-qemu-keymap-to-qemu-kvm-common.patch [bz#1593117] - Resolves: bz#1593117 (add qemu-keymap utility)- Fixing an issue with some old command in the spec file- Fix an issue with the build_configure script. - Resolves: bz#1425820 (Improve QEMU packaging layout with modularization of the block layer)- kvm-migration-stop-compressing-page-in-migration-thread.patch [bz#1594384] - kvm-migration-stop-compression-to-allocate-and-free-memo.patch [bz#1594384] - kvm-migration-stop-decompression-to-allocate-and-free-me.patch [bz#1594384] - kvm-migration-detect-compression-and-decompression-error.patch [bz#1594384] - kvm-migration-introduce-control_save_page.patch [bz#1594384] - kvm-migration-move-some-code-to-ram_save_host_page.patch [bz#1594384] - kvm-migration-move-calling-control_save_page-to-the-comm.patch [bz#1594384] - kvm-migration-move-calling-save_zero_page-to-the-common-.patch [bz#1594384] - kvm-migration-introduce-save_normal_page.patch [bz#1594384] - kvm-migration-remove-ram_save_compressed_page.patch [bz#1594384] - kvm-migration-block-dirty-bitmap-fix-memory-leak-in-dirt.patch [bz#1594384] - kvm-migration-fix-saving-normal-page-even-if-it-s-been-c.patch [bz#1594384] - kvm-migration-update-index-field-when-delete-or-qsort-RD.patch [bz#1594384] - kvm-migration-introduce-decompress-error-check.patch [bz#1594384] - kvm-migration-Don-t-activate-block-devices-if-using-S.patch [bz#1594384] - kvm-migration-not-wait-RDMA_CM_EVENT_DISCONNECTED-event-.patch [bz#1594384] - kvm-migration-block-dirty-bitmap-fix-dirty_bitmap_load.patch [bz#1594384] - kvm-s390x-add-RHEL-7.6-machine-type-for-ccw.patch [bz#1595718] - kvm-s390x-cpumodel-default-enable-bpb-and-ppa15-for-z196.patch [bz#1595718] - kvm-linux-headers-asm-s390-kvm.h-header-sync.patch [bz#1612938] - kvm-s390x-kvm-add-etoken-facility.patch [bz#1612938] - Resolves: bz#1594384 (2.12 migration fixes) - Resolves: bz#1595718 (Add ppa15/bpb to the default cpu model for z196 and higher in the 7.6 s390-ccw-virtio machine) - Resolves: bz#1612938 (Add etoken support to qemu-kvm for s390x KVM guests)Mass import from RHEL 7.6 qemu-kvm-rhev, including fixes to the following BZs: - kvm-AArch64-Add-virt-rhel7.6-machine-type.patch [bz#1558723] - kvm-cpus-Fix-event-order-on-resume-of-stopped-guest.patch [bz#1566153] - kvm-qemu-img-Check-post-truncation-size.patch [bz#1523065] - kvm-vga-catch-depth-0.patch [bz#1575541] - kvm-Fix-x-hv-max-vps-compat-value-for-7.4-machine-type.patch [bz#1583959] - kvm-ccid-card-passthru-fix-regression-in-realize.patch [bz#1584984] - kvm-Use-4-MB-vram-for-cirrus.patch [bz#1542080] - kvm-spapr_pci-Remove-unhelpful-pagesize-warning.patch [bz#1505664] - kvm-rpm-Add-nvme-VFIO-driver-to-rw-whitelist.patch [bz#1416180] - kvm-qobject-Use-qobject_to-instead-of-type-cast.patch [bz#1557995] - kvm-qobject-Ensure-base-is-at-offset-0.patch [bz#1557995] - kvm-qobject-use-a-QObjectBase_-struct.patch [bz#1557995] - kvm-qobject-Replace-qobject_incref-QINCREF-qobject_decre.patch [bz#1557995] - kvm-qobject-Modify-qobject_ref-to-return-obj.patch [bz#1557995] - kvm-rbd-Drop-deprecated-drive-parameter-filename.patch [bz#1557995] - kvm-iscsi-Drop-deprecated-drive-parameter-filename.patch [bz#1557995] - kvm-block-Add-block-specific-QDict-header.patch [bz#1557995] - kvm-qobject-Move-block-specific-qdict-code-to-block-qdic.patch [bz#1557995] - kvm-block-Fix-blockdev-for-certain-non-string-scalars.patch [bz#1557995] - kvm-block-Fix-drive-for-certain-non-string-scalars.patch [bz#1557995] - kvm-block-Clean-up-a-misuse-of-qobject_to-in-.bdrv_co_cr.patch [bz#1557995] - kvm-block-Factor-out-qobject_input_visitor_new_flat_conf.patch [bz#1557995] - kvm-block-Make-remaining-uses-of-qobject-input-visitor-m.patch [bz#1557995] - kvm-block-qdict-Simplify-qdict_flatten_qdict.patch [bz#1557995] - kvm-block-qdict-Tweak-qdict_flatten_qdict-qdict_flatten_.patch [bz#1557995] - kvm-block-qdict-Clean-up-qdict_crumple-a-bit.patch [bz#1557995] - kvm-block-qdict-Simplify-qdict_is_list-some.patch [bz#1557995] - kvm-check-block-qdict-Rename-qdict_flatten-s-variables-f.patch [bz#1557995] - kvm-check-block-qdict-Cover-flattening-of-empty-lists-an.patch [bz#1557995] - kvm-block-Fix-blockdev-blockdev-add-for-empty-objects-an.patch [bz#1557995] - kvm-rbd-New-parameter-auth-client-required.patch [bz#1557995] - kvm-rbd-New-parameter-key-secret.patch [bz#1557995] - kvm-block-mirror-honor-ratelimit-again.patch [bz#1572856] - kvm-block-mirror-Make-cancel-always-cancel-pre-READY.patch [bz#1572856] - kvm-iotests-Add-test-for-cancelling-a-mirror-job.patch [bz#1572856] - kvm-iotests-Split-214-off-of-122.patch [bz#1518738] - kvm-block-Add-COR-filter-driver.patch [bz#1518738] - kvm-block-BLK_PERM_WRITE-includes-._UNCHANGED.patch [bz#1518738] - kvm-block-Add-BDRV_REQ_WRITE_UNCHANGED-flag.patch [bz#1518738] - kvm-block-Set-BDRV_REQ_WRITE_UNCHANGED-for-COR-writes.patch [bz#1518738] - kvm-block-quorum-Support-BDRV_REQ_WRITE_UNCHANGED.patch [bz#1518738] - kvm-block-Support-BDRV_REQ_WRITE_UNCHANGED-in-filters.patch [bz#1518738] - kvm-iotests-Clean-up-wrap-image-in-197.patch [bz#1518738] - kvm-iotests-Copy-197-for-COR-filter-driver.patch [bz#1518738] - kvm-iotests-Add-test-for-COR-across-nodes.patch [bz#1518738] - kvm-qemu-io-Use-purely-string-blockdev-options.patch [bz#1576598] - kvm-qemu-img-Use-only-string-options-in-img_open_opts.patch [bz#1576598] - kvm-iotests-Add-test-for-U-force-share-conflicts.patch [bz#1576598] - kvm-qemu-io-Drop-command-functions-return-values.patch [bz#1519617] - kvm-qemu-io-Let-command-functions-return-error-code.patch [bz#1519617] - kvm-qemu-io-Exit-with-error-when-a-command-failed.patch [bz#1519617] - kvm-iotests.py-Add-qemu_io_silent.patch [bz#1519617] - kvm-iotests-Let-216-make-use-of-qemu-io-s-exit-code.patch [bz#1519617] - kvm-qcow2-Repair-OFLAG_COPIED-when-fixing-leaks.patch [bz#1527085] - kvm-iotests-Repairing-error-during-snapshot-deletion.patch [bz#1527085] - kvm-block-Make-bdrv_is_writable-public.patch [bz#1588039] - kvm-qcow2-Do-not-mark-inactive-images-corrupt.patch [bz#1588039] - kvm-iotests-Add-case-for-a-corrupted-inactive-image.patch [bz#1588039] - kvm-main-loop-drop-spin_counter.patch [bz#1168213] - kvm-target-ppc-Factor-out-the-parsing-in-kvmppc_get_cpu_.patch [bz#1560847] - kvm-target-ppc-Don-t-require-private-l1d-cache-on-POWER8.patch [bz#1560847] - kvm-ppc-spapr_caps-Don-t-disable-cap_cfpc-on-POWER8-by-d.patch [bz#1560847] - kvm-qxl-fix-local-renderer-crash.patch [bz#1567733] - kvm-qemu-img-Amendment-support-implies-create_opts.patch [bz#1537956] - kvm-block-Add-Error-parameter-to-bdrv_amend_options.patch [bz#1537956] - kvm-qemu-option-Pull-out-Supported-options-print.patch [bz#1537956] - kvm-qemu-img-Add-print_amend_option_help.patch [bz#1537956] - kvm-qemu-img-Recognize-no-creation-support-in-o-help.patch [bz#1537956] - kvm-iotests-Test-help-option-for-unsupporting-formats.patch [bz#1537956] - kvm-iotests-Rework-113.patch [bz#1537956] - kvm-qemu-img-Resolve-relative-backing-paths-in-rebase.patch [bz#1569835] - kvm-iotests-Add-test-for-rebasing-with-relative-paths.patch [bz#1569835] - kvm-qemu-img-Special-post-backing-convert-handling.patch [bz#1527898] - kvm-iotests-Test-post-backing-convert-target-behavior.patch [bz#1527898] - kvm-migration-calculate-expected_downtime-with-ram_bytes.patch [bz#1564576] - kvm-sheepdog-Fix-sd_co_create_opts-memory-leaks.patch [bz#1513543] - kvm-qemu-iotests-reduce-chance-of-races-in-185.patch [bz#1513543] - kvm-blockjob-do-not-cancel-timer-in-resume.patch [bz#1513543] - kvm-nfs-Fix-error-path-in-nfs_options_qdict_to_qapi.patch [bz#1513543] - kvm-nfs-Remove-processed-options-from-QDict.patch [bz#1513543] - kvm-blockjob-drop-block_job_pause-resume_all.patch [bz#1513543] - kvm-blockjob-expose-error-string-via-query.patch [bz#1513543] - kvm-blockjob-Fix-assertion-in-block_job_finalize.patch [bz#1513543] - kvm-blockjob-Wrappers-for-progress-counter-access.patch [bz#1513543] - kvm-blockjob-Move-RateLimit-to-BlockJob.patch [bz#1513543] - kvm-blockjob-Implement-block_job_set_speed-centrally.patch [bz#1513543] - kvm-blockjob-Introduce-block_job_ratelimit_get_delay.patch [bz#1513543] - kvm-blockjob-Add-block_job_driver.patch [bz#1513543] - kvm-blockjob-Update-block-job-pause-resume-documentation.patch [bz#1513543] - kvm-blockjob-Improve-BlockJobInfo.offset-len-documentati.patch [bz#1513543] - kvm-job-Create-Job-JobDriver-and-job_create.patch [bz#1513543] - kvm-job-Rename-BlockJobType-into-JobType.patch [bz#1513543] - kvm-job-Add-JobDriver.job_type.patch [bz#1513543] - kvm-job-Add-job_delete.patch [bz#1513543] - kvm-job-Maintain-a-list-of-all-jobs.patch [bz#1513543] - kvm-job-Move-state-transitions-to-Job.patch [bz#1513543] - kvm-job-Add-reference-counting.patch [bz#1513543] - kvm-job-Move-cancelled-to-Job.patch [bz#1513543] - kvm-job-Add-Job.aio_context.patch [bz#1513543] - kvm-job-Move-defer_to_main_loop-to-Job.patch [bz#1513543] - kvm-job-Move-coroutine-and-related-code-to-Job.patch [bz#1513543] - kvm-job-Add-job_sleep_ns.patch [bz#1513543] - kvm-job-Move-pause-resume-functions-to-Job.patch [bz#1513543] - kvm-job-Replace-BlockJob.completed-with-job_is_completed.patch [bz#1513543] - kvm-job-Move-BlockJobCreateFlags-to-Job.patch [bz#1513543] - kvm-blockjob-Split-block_job_event_pending.patch [bz#1513543] - kvm-job-Add-job_event_.patch [bz#1513543] - kvm-job-Move-single-job-finalisation-to-Job.patch [bz#1513543] - kvm-job-Convert-block_job_cancel_async-to-Job.patch [bz#1513543] - kvm-job-Add-job_drain.patch [bz#1513543] - kvm-job-Move-.complete-callback-to-Job.patch [bz#1513543] - kvm-job-Move-job_finish_sync-to-Job.patch [bz#1513543] - kvm-job-Switch-transactions-to-JobTxn.patch [bz#1513543] - kvm-job-Move-transactions-to-Job.patch [bz#1513543] - kvm-job-Move-completion-and-cancellation-to-Job.patch [bz#1513543] - kvm-block-Cancel-job-in-bdrv_close_all-callers.patch [bz#1513543] - kvm-job-Add-job_yield.patch [bz#1513543] - kvm-job-Add-job_dismiss.patch [bz#1513543] - kvm-job-Add-job_is_ready.patch [bz#1513543] - kvm-job-Add-job_transition_to_ready.patch [bz#1513543] - kvm-job-Move-progress-fields-to-Job.patch [bz#1513543] - kvm-job-Introduce-qapi-job.json.patch [bz#1513543] - kvm-job-Add-JOB_STATUS_CHANGE-QMP-event.patch [bz#1513543] - kvm-job-Add-lifecycle-QMP-commands.patch [bz#1513543] - kvm-job-Add-query-jobs-QMP-command.patch [bz#1513543] - kvm-blockjob-Remove-BlockJob.driver.patch [bz#1513543] - kvm-iotests-Move-qmp_to_opts-to-VM.patch [bz#1513543] - kvm-qemu-iotests-Test-job-with-block-jobs.patch [bz#1513543] - kvm-vdi-Fix-vdi_co_do_create-return-value.patch [bz#1513543] - kvm-vhdx-Fix-vhdx_co_create-return-value.patch [bz#1513543] - kvm-job-Add-error-message-for-failing-jobs.patch [bz#1513543] - kvm-block-create-Make-x-blockdev-create-a-job.patch [bz#1513543] - kvm-qemu-iotests-Add-VM.get_qmp_events_filtered.patch [bz#1513543] - kvm-qemu-iotests-Add-VM.qmp_log.patch [bz#1513543] - kvm-qemu-iotests-Add-iotests.img_info_log.patch [bz#1513543] - kvm-qemu-iotests-Add-VM.run_job.patch [bz#1513543] - kvm-qemu-iotests-iotests.py-helper-for-non-file-protocol.patch [bz#1513543] - kvm-qemu-iotests-Rewrite-206-for-blockdev-create-job.patch [bz#1513543] - kvm-qemu-iotests-Rewrite-207-for-blockdev-create-job.patch [bz#1513543] - kvm-qemu-iotests-Rewrite-210-for-blockdev-create-job.patch [bz#1513543] - kvm-qemu-iotests-Rewrite-211-for-blockdev-create-job.patch [bz#1513543] - kvm-qemu-iotests-Rewrite-212-for-blockdev-create-job.patch [bz#1513543] - kvm-qemu-iotests-Rewrite-213-for-blockdev-create-job.patch [bz#1513543] - kvm-block-create-Mark-blockdev-create-stable.patch [bz#1513543] - kvm-jobs-fix-stale-wording.patch [bz#1513543] - kvm-jobs-fix-verb-references-in-docs.patch [bz#1513543] - kvm-iotests-Fix-219-s-timing.patch [bz#1513543] - kvm-iotests-improve-pause_job.patch [bz#1513543] - kvm-rpm-Whitelist-copy-on-read-block-driver.patch [bz#1518738] - kvm-rpm-add-throttle-driver-to-rw-whitelist.patch [bz#1591076] - kvm-usb-host-skip-open-on-pending-postload-bh.patch [bz#1572851] - kvm-i386-Define-the-Virt-SSBD-MSR-and-handling-of-it-CVE.patch [bz#1574216] - kvm-i386-define-the-AMD-virt-ssbd-CPUID-feature-bit-CVE-.patch [bz#1574216] - kvm-block-file-posix-Pass-FD-to-locking-helpers.patch [bz#1519144] - kvm-block-file-posix-File-locking-during-creation.patch [bz#1519144] - kvm-iotests-Add-creation-test-to-153.patch [bz#1519144] - kvm-vhost-user-add-Net-prefix-to-internal-state-structur.patch [bz#1526645] - kvm-virtio-support-setting-memory-region-based-host-noti.patch [bz#1526645] - kvm-vhost-user-support-receiving-file-descriptors-in-sla.patch [bz#1526645] - kvm-osdep-add-wait.h-compat-macros.patch [bz#1526645] - kvm-vhost-user-bridge-support-host-notifier.patch [bz#1526645] - kvm-vhost-allow-backends-to-filter-memory-sections.patch [bz#1526645] - kvm-vhost-user-allow-slave-to-send-fds-via-slave-channel.patch [bz#1526645] - kvm-vhost-user-introduce-shared-vhost-user-state.patch [bz#1526645] - kvm-vhost-user-support-registering-external-host-notifie.patch [bz#1526645] - kvm-libvhost-user-support-host-notifier.patch [bz#1526645] - kvm-block-Introduce-API-for-copy-offloading.patch [bz#1482537] - kvm-raw-Check-byte-range-uniformly.patch [bz#1482537] - kvm-raw-Implement-copy-offloading.patch [bz#1482537] - kvm-qcow2-Implement-copy-offloading.patch [bz#1482537] - kvm-file-posix-Implement-bdrv_co_copy_range.patch [bz#1482537] - kvm-iscsi-Query-and-save-device-designator-when-opening.patch [bz#1482537] - kvm-iscsi-Create-and-use-iscsi_co_wait_for_task.patch [bz#1482537] - kvm-iscsi-Implement-copy-offloading.patch [bz#1482537] - kvm-block-backend-Add-blk_co_copy_range.patch [bz#1482537] - kvm-qemu-img-Convert-with-copy-offloading.patch [bz#1482537] - kvm-qcow2-Fix-src_offset-in-copy-offloading.patch [bz#1482537] - kvm-iscsi-Don-t-blindly-use-designator-length-in-respons.patch [bz#1482537] - kvm-file-posix-Fix-EINTR-handling.patch [bz#1482537] - kvm-usb-storage-Add-rerror-werror-properties.patch [bz#1595180] - kvm-numa-clarify-error-message-when-node-index-is-out-of.patch [bz#1578381] - kvm-qemu-iotests-Update-026.out.nocache-reference-output.patch [bz#1528541] - kvm-qcow2-Free-allocated-clusters-on-write-error.patch [bz#1528541] - kvm-qemu-iotests-Test-qcow2-not-leaking-clusters-on-writ.patch [bz#1528541] - kvm-qemu-options-Add-missing-newline-to-accel-help-text.patch [bz#1586313] - kvm-xhci-fix-guest-triggerable-assert.patch [bz#1594135] - kvm-virtio-gpu-tweak-scanout-disable.patch [bz#1589634] - kvm-virtio-gpu-update-old-resource-too.patch [bz#1589634] - kvm-virtio-gpu-disable-scanout-when-backing-resource-is-.patch [bz#1589634] - kvm-block-Don-t-silently-truncate-node-names.patch [bz#1549654] - kvm-pr-helper-fix-socket-path-default-in-help.patch [bz#1533158] - kvm-pr-helper-fix-assertion-failure-on-failed-multipath-.patch [bz#1533158] - kvm-pr-manager-helper-avoid-SIGSEGV-when-writing-to-the-.patch [bz#1533158] - kvm-pr-manager-put-stubs-in-.c-file.patch [bz#1533158] - kvm-pr-manager-add-query-pr-managers-QMP-command.patch [bz#1533158] - kvm-pr-manager-helper-report-event-on-connection-disconn.patch [bz#1533158] - kvm-pr-helper-avoid-error-on-PR-IN-command-with-zero-req.patch [bz#1533158] - kvm-pr-helper-Rework-socket-path-handling.patch [bz#1533158] - kvm-pr-manager-helper-fix-memory-leak-on-event.patch [bz#1533158] - kvm-object-fix-OBJ_PROP_LINK_UNREF_ON_RELEASE-ambivalenc.patch [bz#1556678] - kvm-usb-hcd-xhci-test-add-a-test-for-ccid-hotplug.patch [bz#1556678] - kvm-Revert-usb-release-the-created-buses.patch [bz#1556678] - kvm-file-posix-Fix-creation-locking.patch [bz#1599335] - kvm-file-posix-Unlock-FD-after-creation.patch [bz#1599335] - kvm-ahci-trim-signatures-on-raise-lower.patch [bz#1584914] - kvm-ahci-fix-PxCI-register-race.patch [bz#1584914] - kvm-ahci-don-t-schedule-unnecessary-BH.patch [bz#1584914] - kvm-qcow2-Fix-qcow2_truncate-error-return-value.patch [bz#1595173] - kvm-block-Convert-.bdrv_truncate-callback-to-coroutine_f.patch [bz#1595173] - kvm-qcow2-Remove-coroutine-trampoline-for-preallocate_co.patch [bz#1595173] - kvm-block-Move-bdrv_truncate-implementation-to-io.c.patch [bz#1595173] - kvm-block-Use-tracked-request-for-truncate.patch [bz#1595173] - kvm-file-posix-Make-.bdrv_co_truncate-asynchronous.patch [bz#1595173] - kvm-block-Fix-copy-on-read-crash-with-partial-final-clus.patch [bz#1590640] - kvm-block-fix-QEMU-crash-with-scsi-hd-and-drive_del.patch [bz#1599515] - kvm-virtio-rng-process-pending-requests-on-DRIVER_OK.patch [bz#1576743] - kvm-file-posix-specify-expected-filetypes.patch [bz#1525829] - kvm-iotests-add-test-226-for-file-driver-types.patch [bz#1525829] - kvm-block-dirty-bitmap-add-lock-to-bdrv_enable-disable_d.patch [bz#1207657] - kvm-qapi-add-x-block-dirty-bitmap-enable-disable.patch [bz#1207657] - kvm-qmp-transaction-support-for-x-block-dirty-bitmap-ena.patch [bz#1207657] - kvm-qapi-add-x-block-dirty-bitmap-merge.patch [bz#1207657] - kvm-qapi-add-disabled-parameter-to-block-dirty-bitmap-ad.patch [bz#1207657] - kvm-block-dirty-bitmap-add-bdrv_enable_dirty_bitmap_lock.patch [bz#1207657] - kvm-dirty-bitmap-fix-double-lock-on-bitmap-enabling.patch [bz#1207657] - kvm-block-qcow2-bitmap-fix-free_bitmap_clusters.patch [bz#1207657] - kvm-qcow2-add-overlap-check-for-bitmap-directory.patch [bz#1207657] - kvm-blockdev-enable-non-root-nodes-for-backup-source.patch [bz#1207657] - kvm-iotests-add-222-to-test-basic-fleecing.patch [bz#1207657] - kvm-qcow2-Remove-dead-check-on-ret.patch [bz#1207657] - kvm-block-Move-request-tracking-to-children-in-copy-offl.patch [bz#1207657] - kvm-block-Fix-parameter-checking-in-bdrv_co_copy_range_i.patch [bz#1207657] - kvm-block-Honour-BDRV_REQ_NO_SERIALISING-in-copy-range.patch [bz#1207657] - kvm-backup-Use-copy-offloading.patch [bz#1207657] - kvm-block-backup-disable-copy-offloading-for-backup.patch [bz#1207657] - kvm-iotests-222-Don-t-run-with-luks.patch [bz#1207657] - kvm-block-io-fix-copy_range.patch [bz#1207657] - kvm-block-split-flags-in-copy_range.patch [bz#1207657] - kvm-block-add-BDRV_REQ_SERIALISING-flag.patch [bz#1207657] - kvm-block-backup-fix-fleecing-scheme-use-serialized-writ.patch [bz#1207657] - kvm-nbd-server-Reject-0-length-block-status-request.patch [bz#1207657] - kvm-nbd-server-fix-trace.patch [bz#1207657] - kvm-nbd-server-refactor-NBDExportMetaContexts.patch [bz#1207657] - kvm-nbd-server-add-nbd_meta_empty_or_pattern-helper.patch [bz#1207657] - kvm-nbd-server-implement-dirty-bitmap-export.patch [bz#1207657] - kvm-qapi-new-qmp-command-nbd-server-add-bitmap.patch [bz#1207657] - kvm-docs-interop-add-nbd.txt.patch [bz#1207657] - kvm-nbd-server-introduce-NBD_CMD_CACHE.patch [bz#1207657] - kvm-nbd-server-Silence-gcc-false-positive.patch [bz#1207657] - kvm-nbd-server-Fix-dirty-bitmap-logic-regression.patch [bz#1207657] - kvm-nbd-server-fix-nbd_co_send_block_status.patch [bz#1207657] - kvm-nbd-client-Add-x-dirty-bitmap-to-query-bitmap-from-s.patch [bz#1207657] - kvm-iotests-New-test-223-for-exporting-dirty-bitmap-over.patch [bz#1207657] - kvm-hw-char-serial-Only-retry-if-qemu_chr_fe_write-retur.patch [bz#1592817] - kvm-hw-char-serial-retry-write-if-EAGAIN.patch [bz#1592817] - kvm-throttle-groups-fix-hang-when-group-member-leaves.patch [bz#1535914] - kvm-Disable-aarch64-devices-reappeared-after-2.12-rebase.patch [bz#1586357] - kvm-Disable-split-irq-device.patch [bz#1586357] - kvm-Disable-AT24Cx-i2c-eeprom.patch [bz#1586357] - kvm-Disable-CAN-bus-devices.patch [bz#1586357] - kvm-Disable-new-superio-devices.patch [bz#1586357] - kvm-Disable-new-pvrdma-device.patch [bz#1586357] - kvm-qdev-add-HotplugHandler-post_plug-callback.patch [bz#1607891] - kvm-virtio-scsi-fix-hotplug-reset-vs-event-race.patch [bz#1607891] - kvm-e1000-Fix-tso_props-compat-for-82540em.patch [bz#1608778] - kvm-slirp-correct-size-computation-while-concatenating-m.patch [bz#1586255] - kvm-s390x-sclp-fix-maxram-calculation.patch [bz#1595740] - kvm-redhat-Make-gitpublish-profile-the-default-one.patch [bz#1425820] - Resolves: bz#1168213 (main-loop: WARNING: I/O thread spun for 1000 iterations while doing stream block device.) - Resolves: bz#1207657 (RFE: QEMU Incremental live backup - push and pull modes) - Resolves: bz#1416180 (QEMU VFIO based block driver for NVMe devices) - Resolves: bz#1425820 (Improve QEMU packaging layout with modularization of the block layer) - Resolves: bz#1482537 ([RFE] qemu-img copy-offloading (convert command)) - Resolves: bz#1505664 ("qemu-kvm: System page size 0x1000000 is not enabled in page_size_mask (0x11000). Performance may be slow" show up while using hugepage as guest's memory) - Resolves: bz#1513543 ([RFE] Add block job to create format on a storage device) - Resolves: bz#1518738 (Add 'copy-on-read' filter driver for use with blockdev-add) - Resolves: bz#1519144 (qemu-img: image locking doesn't cover image creation) - Resolves: bz#1519617 (The exit code should be non-zero when qemu-io reports an error) - Resolves: bz#1523065 ("qemu-img resize" should fail to decrease the size of logical partition/lvm/iSCSI image with raw format) - Resolves: bz#1525829 (can not boot up a scsi-block passthrough disk via -blockdev with error "cannot get SG_IO version number: Operation not supported. Is this a SCSI device?") - Resolves: bz#1526645 ([Intel 7.6 FEAT] vHost Data Plane Acceleration (vDPA) - vhost user client - qemu-kvm-rhev) - Resolves: bz#1527085 (The copied flag should be updated during '-r leaks') - Resolves: bz#1527898 ([RFE] qemu-img should leave cluster unallocated if it's read as zero throughout the backing chain) - Resolves: bz#1528541 (qemu-img check reports tons of leaked clusters after re-start nfs service to resume writing data in guest) - Resolves: bz#1533158 (QEMU support for libvirtd restarting qemu-pr-helper) - Resolves: bz#1535914 (Disable io throttling for one member disk of a group during io will induce the other one hang with io) - Resolves: bz#1537956 (RFE: qemu-img amend should list the true supported options) - Resolves: bz#1542080 (Qemu core dump at cirrus_invalidate_region) - Resolves: bz#1549654 (Reject node-names which would be truncated by the block layer commands) - Resolves: bz#1556678 (Hot plug usb-ccid for the 2nd time with the same ID as the 1st time failed) - Resolves: bz#1557995 (QAPI schema for RBD storage misses the 'password-secret' option) - Resolves: bz#1558723 (Create RHEL-7.6 QEMU machine type for AArch64) - Resolves: bz#1560847 ([Power8][FW b0320a_1812.861][rhel7.5rc2 3.10.0-861.el7.ppc64le][qemu-kvm-{ma,rhev}-2.10.0-21.el7_5.1.ppc64le] KVM guest does not default to ori type flush even with pseries-rhel7.5.0-sxxm) - Resolves: bz#1564576 (Pegas 1.1 - Require to backport qemu-kvm patch that fixes expected_downtime calculation during migration) - Resolves: bz#1566153 (IOERROR pause code lost after resuming a VM while I/O error is still present) - Resolves: bz#1567733 (qemu abort when migrate during guest reboot) - Resolves: bz#1569835 (qemu-img get wrong backing file path after rebasing image with relative path) - Resolves: bz#1572851 (Core dumped after migration when with usb-host) - Resolves: bz#1572856 ('block-job-cancel' can not cancel a "drive-mirror" job) - Resolves: bz#1574216 (CVE-2018-3639 qemu-kvm-rhev: hw: cpu: speculative store bypass [rhel-7.6]) - Resolves: bz#1575541 (qemu core dump while installing win10 guest) - Resolves: bz#1576598 (Segfault in qemu-io and qemu-img with -U --image-opts force-share=off) - Resolves: bz#1576743 (virtio-rng hangs when running on recent (2.x) QEMU versions) - Resolves: bz#1578381 (Error message need update when specify numa distance with node index >=128) - Resolves: bz#1583959 (Incorrect vcpu count limit for 7.4 machine types for windows guests) - Resolves: bz#1584914 (SATA emulator lags and hangs) - Resolves: bz#1584984 (Vm starts failed with 'passthrough' smartcard) - Resolves: bz#1586255 (CVE-2018-11806 qemu-kvm-rhev: QEMU: slirp: heap buffer overflow while reassembling fragmented datagrams [rhel-7.6]) - Resolves: bz#1586313 (-smp option is not easily found in the output of qemu help) - Resolves: bz#1586357 (Disable new devices in 2.12) - Resolves: bz#1588039 (Possible assertion failure in qemu when a corrupted image is used during an incoming migration) - Resolves: bz#1589634 (Migration failed when rebooting guest with multiple virtio videos) - Resolves: bz#1590640 (qemu-kvm: block/io.c:1098: bdrv_co_do_copy_on_readv: Assertion `skip_bytes < pnum' failed.) - Resolves: bz#1591076 (The driver of 'throttle' is not whitelisted) - Resolves: bz#1592817 (Retrying on serial_xmit if the pipe is broken may compromise the Guest) - Resolves: bz#1594135 (system_reset many times linux guests cause qemu process Aborted) - Resolves: bz#1595173 (blockdev-create is blocking) - Resolves: bz#1595180 (Can't set rerror/werror with usb-storage) - Resolves: bz#1595740 (RHEL-Alt-7.6 - qemu has error during migration of larger guests) - Resolves: bz#1599335 (Image creation locking is too tight and is not properly released) - Resolves: bz#1599515 (qemu core-dump with aio_read via hmp (util/qemu-thread-posix.c:64: qemu_mutex_lock_impl: Assertion `mutex->initialized' failed)) - Resolves: bz#1607891 (Hotplug events are sometimes lost with virtio-scsi + iothread) - Resolves: bz#1608778 (qemu/migration: migrate failed from RHEL.7.6 to RHEL.7.5 with e1000-82540em)- kvm-linux-headers-Update-to-include-KVM_CAP_S390_HPAGE_1.patch [bz#1610906] - kvm-s390x-Enable-KVM-huge-page-backing-support.patch [bz#1610906] - kvm-redhat-s390x-add-hpage-1-to-kvm.conf.patch [bz#1610906] - Resolves: bz#1610906 ([IBM 8.0 FEAT] KVM: Huge Pages - libhugetlbfs Enablement - qemu-kvm part)- kvm-spapr-Correct-inverted-test-in-spapr_pc_dimm_node.patch [bz#1601671] - kvm-osdep-powerpc64-align-memory-to-allow-2MB-radix-THP-.patch [bz#1601317] - kvm-RHEL-8.0-Add-pseries-rhel7.6.0-sxxm-machine-type.patch [bz#1595501] - kvm-i386-Helpers-to-encode-cache-information-consistentl.patch [bz#1597739] - kvm-i386-Add-cache-information-in-X86CPUDefinition.patch [bz#1597739] - kvm-i386-Initialize-cache-information-for-EPYC-family-pr.patch [bz#1597739] - kvm-i386-Add-new-property-to-control-cache-info.patch [bz#1597739] - kvm-i386-Clean-up-cache-CPUID-code.patch [bz#1597739] - kvm-i386-Populate-AMD-Processor-Cache-Information-for-cp.patch [bz#1597739] - kvm-i386-Add-support-for-CPUID_8000_001E-for-AMD.patch [bz#1597739] - kvm-i386-Fix-up-the-Node-id-for-CPUID_8000_001E.patch [bz#1597739] - kvm-i386-Enable-TOPOEXT-feature-on-AMD-EPYC-CPU.patch [bz#1597739] - kvm-i386-Remove-generic-SMT-thread-check.patch [bz#1597739] - kvm-i386-Allow-TOPOEXT-to-be-enabled-on-older-kernels.patch [bz#1597739] - Resolves: bz#1595501 (Create pseries-rhel7.6.0-sxxm machine type) - Resolves: bz#1597739 (AMD EPYC/Zen SMT support for KVM / QEMU guest (qemu-kvm)) - Resolves: bz#1601317 (RHEL8.0 - qemu patch to align memory to allow 2MB THP) - Resolves: bz#1601671 (After rebooting guest,all the hot plug memory will be assigned to the 1st numa node.)- kvm-spapr-Add-ibm-max-associativity-domains-property.patch [bz#1599593] - kvm-Revert-spapr-Don-t-allow-memory-hotplug-to-memory-le.patch [bz#1599593] - kvm-simpletrace-Convert-name-from-mapping-record-to-str.patch [bz#1594969] - kvm-tests-fix-TLS-handshake-failure-with-TLS-1.3.patch [bz#1602403] - Resolves: bz#1594969 (simpletrace.py fails when running with Python 3) - Resolves: bz#1599593 (User can't hotplug memory to less memory numa node on rhel8) - Resolves: bz#1602403 (test-crypto-tlssession unit test fails with assertions)- kvm-vfio-pci-Default-display-option-to-off.patch [bz#1590511] - kvm-python-futurize-f-libfuturize.fixes.fix_print_with_i.patch [bz#1571533] - kvm-python-futurize-f-lib2to3.fixes.fix_except.patch [bz#1571533] - kvm-Revert-Defining-a-shebang-for-python-scripts.patch [bz#1571533] - kvm-spec-Fix-ambiguous-python-interpreter-name.patch [bz#1571533] - kvm-qemu-ga-blacklisting-guest-exec-and-guest-exec-statu.patch [bz#1518132] - kvm-redhat-rewrap-build_configure.sh-cmdline-for-the-rh-.patch - kvm-redhat-remove-the-VTD-LIVE_BLOCK_OPS-and-RHV-options.patch - kvm-redhat-fix-the-rh-env-prep-target-s-dependency-on-th.patch - kvm-redhat-remove-dead-code-related-to-s390-not-s390x.patch - kvm-redhat-sync-compiler-flags-from-the-spec-file-to-rh-.patch - kvm-redhat-sync-guest-agent-enablement-and-tcmalloc-usag.patch - kvm-redhat-fix-up-Python-3-dependency-for-building-QEMU.patch - kvm-redhat-fix-up-Python-dependency-for-SRPM-generation.patch - kvm-redhat-disable-glusterfs-dependency-support-temporar.patch - Resolves: bz#1518132 (Ensure file access RPCs are disabled by default) - Resolves: bz#1571533 (Convert qemu-kvm python scripts to python3) - Resolves: bz#1590511 (Fails to start guest with Intel vGPU device)- Resolves: bz#1508137 ([IBM 8.0 FEAT] KVM: Interactive Bootloader (qemu)) - Resolves: bz#1513558 (Remove RHEL6 machine types) - Resolves: bz#1568600 (pc-i440fx-rhel7.6.0 and pc-q35-rhel7.6.0 machine types (x86)) - Resolves: bz#1570029 ([IBM 8.0 FEAT] KVM: 3270 Connectivity - qemu part) - Resolves: bz#1578855 (Enable Native Ceph support on non x86_64 CPUs) - Resolves: bz#1585651 (RHEL 7.6 new pseries machine type (ppc64le)) - Resolves: bz#1592337 ([IBM 8.0 FEAT] KVM: CPU Model z14 ZR1 (qemu-kvm))- Resolves: bz#1576468 (Enable vhost_user in qemu-kvm 2.12)- Resolves: bz#1574406 ([RHEL 8][qemu-kvm] Failed to find romfile "efi-virtio.rom") - Resolves: bz#1569675 (Backwards compatibility of pc-*-rhel7.5.0 and older machine-types) - Resolves: bz#1576045 (Fix build issue by using python3) - Resolves: bz#1571145 (qemu-kvm segfaults on RHEL 8 when run guestfsd under TCG)- Fixing some issues with packaging. - Rebasing to 2.12.0-rc4- Bumping epoch for RHEL8 and dropping self-obsoleting- Rebuilding- Prepare building on RHEL-8.015:4.2.0-59.module_el8.5.0+1002+36725df215:4.2.0-59.module_el8.5.0+1002+36725df2.build-idb0f3e8a11755c30349253112e57fdbb560c87cf9block-curl.so/usr/lib//usr/lib/.build-id//usr/lib/.build-id/b0//usr/lib64/qemu-kvm/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fexceptions -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protectioncpioxz2x86_64-redhat-linux-gnudirectoryELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=b0f3e8a11755c30349253112e57fdbb560c87cf9, strippedRRRRRRR R RR RR R RRRRRRRRRutf-89bb2d3b38d4f844b437038d27458da6ada395cd948b68f4b9499ab59f8e763ddvirt:rhel:8050020211110001900:b4937e53? 7zXZ !#,C'`] b2u jӫ`(y-$s.]bVҰ^dB.)lbPIc8,#Θ@)[l߿wYQϬ{V9XojfTaɑD ׯw ,V^i} j4|oo_c֨Ղ6O"'[5>('`n`r<{e[i]\0y~7nj\M8Ȧ~1(}1/>-Co!ہV\(3* D2kGmuVb:jm70hD jK\$ta!%"E@ ƪw0uI&xjy0aY\;mKA/xG_$=EhbF<(nU1%qwe$G#JÞj8zuxXl >FzYs4"P v!L5׺ǩ@Pey{L6 m)8g=8XDGQ7- 㴈0ۮ5 r[8rr2' !r`}ϺA9#9n,x"h%s㫔+*I,}-_ϵPʲ_m\uCK I]-֮9 :"'0G,mmumM 1lm d5XͿ}BBg.6uيM6#ޫ~Θ9r:SȾ%>%Ĉ\VMæ0C{50u+Q޴F? A_HvXϚ*綑@[5nƭ$.+-xaXF`[:M儸M_RDEpxc8)Yg d&P\%ϡ}O yF1Ttxks`byCt:Rvjý2$IL?=axea9jX|v)`(2Br#Ӝ#]i%dUɠ]FjW,q#mYJW昽iH,Qn-]DG~.̖K5e D4L'E!!ϔ/XB&7f'uii|\>S0oK$4c lZHYC©ҮTJ*R wrЏڲDΝ-ٙ}mo |beLbMSd ҘdpΫ><],ru 1iX 6i~iNa^`tT?oﱃ&z#KH0(50Eц{fuӑ|n(7,}<&7apjoRy@(Zx"^۱ྯ{qǼꩂﰃ$\{I+~M٤__o;Z抛KU>@OYWZRZQ逭 U_cD5?4J_Q5ڗX#!Q5l^7'~A<^Lf{WI7ٗUWDUM2$BHKɐ0r&f*+tPPVbdTK~}gۥr/9S22|3C=*̘G9Bo+nrbr:TJ n fk3xh ڽϯ ˵B!d@rD '^PX) ?4Žᜲ#@HfuS-˙o4Bmk̡WP6\6)\I(Hl*pR*G8wX5H.DP|'7y"Ьf=NZm,PҍMҕ0!8b{1֨ G+#*rFB >ZÒ 挋>Ed[?(g @G#hd;UAD!fqݡWɣn *K]7g8(s1g d:Z~I2=4&?ɝw_]Te!! ,%IWg.qoSǦ_ۢ(7Et@.SU1fjnO,հm45~]M=a7T9 8Ź (DހO%q[lVA|QXY7t_i7$qynhmþ,շD(gdqWtEbnc-;'6DF5c|ԹIQ;@R:%K*|\Jj`m# y&Nn1)Iqμ.6O\]:yU Վ6b; 4Jg[gȾ ^Rffyl&r$R{7hVLP}Ob6*NK6ct^V=" SST a _(/#W棱ڰ}sssMڧQ  :W,G'ِŸS n4D;MJisX%Jno~2VȖLF3`I3)XVz>l8/ MukNbdž;.րˢ/ϳqKi 4DCBRIg(sdB"Pv,X<jn5hx[e{-C~ubem|jFH"sc(wRS#LWT~ wO KlTc-ۓ;"+k`U1';:^;ޒ0+7W}Ҩs/;:5W Re3Y֣tRx,[-UHGܹufG|l(Y)D5"LyM"R:R${}5mu&3P`SB="36g_iD$0:/U&ӢЮ<ԅ.)=K<.s\֐;Alj>D ~4ߋ].#.Rv^ՈX&Ѭܔ),B!ԃދ^^?yӆJ1mWC/-ǝ] 'h"9ː] ߼IHY7ױL}oI0uq&ĥ:<4t0]aQo=؊):ÙxA)5Ie4 /:M!kf,J[}z>gS\6v7_HrәJ@.o:v,O7j7dL3`{Z9Rİ/d'\DŽB+zw pk/JB*l}"2 ]f=3 s6"TUXbcȍS{Da8ÿMXWM^LGv8F$`/ȠЉVt /FZ(!dI6 ^',0MEBЉ<_ea$Py7S"|;z1`*(:n=w.b'O$4xwLI؂ml6yUa/9<pUA zlf!&?@k !dzk?""NވKl:b0 Rp W:$fi.A0,O%5R2Y!]Iy퀳T,H?JFrRMM=ngȢkBB>5{Y#Z- &Ĭɮrh ,bP؜C U0m&5mKͩ._G\|X 4hlg4RF|7}Cw4םo:P?@2V+Fy'Q8bQ\nYRiWfz3e5ghy7?Q8@e])_iN\WFJnA*dQM5u\i*Cˡzyȟ ;@ '.籣ϐNGHb|Oԍ1QZf76@% \,Zv ʄ,22s]9+U;-`-;ՄUn NTbV܁J}uXΨ;sՍW짔3jo"f/؝Wi|k#)3&.M A%[_x? p!Yu;q}Eo.42RrZb\IK'"^disOViA{)1, Ь]KK~J D|[jG{ ?.`.H]}⫿>N:dnSZJK%85]ňǤEs5ŗhrrx؉g¥0-J`+)k\AF3t*s 7F|pyٺR:sܛ=п;FBB`)_tʈkk] 3Lzc< 럏9xNaJ7AX#D&OQ;Ý fAD!i z^EM Ovk?t^[Fv~U#,R `piS 12_rI3Jϧ9q>,1 %=ըawosjLQ_lQLĮ?7Xی=J\cv ~02+[ⱴc ӎ9ieYQ❞+'aN?Y"B2~ W!$XM^I4T%XBgVѤvbsQ%D]Minx9S0;i9^H\dVKf^ѡdZk[_k"UؖlqTep.˛9uޭe-oDw(vs["mHxd15Kth1#Z 'iN']0_e 1&/l(pl95bnUAJSړ VmﶌsZ0K%FŔ ?1o:`Agm\WQQPrUGJ=Vfzfa2:}0HlEլS|ԍBzqDU ڛ6!Y2c6Wʄd)&}9u(;V&K4CU2PR (=̚`f}覜IFIbig I-.128TjwP1 F)<&)m,nǔ Dkl ˯h@:iB[fN)N/]\qILzW&<Չ~A4}oiZTrКV4 Vl:эXp䘦E|[T/#lX {LtVB}Isˉ94+?M Ԋ{9Ʉm+:fM*&ANꨙ5ɅVΑckJ!Of9 *og4%8޶*d 7C7(F<ӫ(ME'w2&gm ٩ gDRO\{k3iu](4. ZFJEn&1L/w{/U8/4sj[$_ќ։#^(7Aπ4hȬ!ԯgɄScqÂ!ӊkL`%Od04-]uuRL@Mn!.1} 0I~%MΣq-(ZpdzX>`AQb*%Qܻ6HWđ}1:.MZ4Fqf._'g-blC)V{+Gpb.R O4r&vFi+N7T|=n+[B7 Zi*ۿxOf"f%zbwh)䄼~AlW ^r3,zU$_XgLSnW㪸h@ M? V+o֥ C#Wـu5@4@RjbVhWNRkiC 01ɟgqH^ ½)t͵g;N׍ʇ w[Xf=ٛrquvl54%r;p[vT`%.~,bth)5[ND*&B%8F6JcA5u9Ct > 7>Mʾd$vhw hxuG[QZ,&6 `p*[h[mc_~y#?a ԫũGڏh@^'ePcAŚVkJ{,K<3)6T- 9q}z 9(B?ޡEžə-0(.~;Y&3}0J<0? aӲ=QtI<~"W'?YS0m"wV%'O"RN<^Bލ$礨Ʊ]@d"CenQu~JH#mo.IQoTG{9F[CE=[ЍTC6 1Uʜ½7'Nn(x-˚GJ㺝UT:ݰA40 FI-ܛ]ylu=4zaŞ\QZ3i=_tĨȋ|)KQIR 5scq j3)XsFyut14fBp~nE֠V]dD)_XL PN!87"kؓګ?)2bBSDSufhTMboGk>&WFMߦ À.`Ҩ7U܏q'LjTY!#E&Yb)s1SN1{)j@%@<Q5qǽ<@JXW`i,mp ;O#|7_{\/*{Lޑ1 5_H]x5u G:f)3Wߟw1nsOP=fzV$ޟʁECGhfb+$LÑK-Uo)-jBgB!SIOx=8Xܔ$N?O~i kq1SnHi%Un:JIy[O7e`iL3Fx컰E@(;PW"C9iҰj!ZhvY"Dck;S*e 7fIcPXiu(߱iaO.bGE*S!$Σx$O_vUZ1J=d?äz28(3fy+~\J)Jy5PĤ ZpܽH`7O Œ(* 3UQ:O|{詫_'5̑͡!#ck@J,qarӓ9E 3BO,_^6kӸ#x֨rnZХMyGJ]zY;D9]Rݍx[hQٻ-R H@ej`.#p`7aGU>Vk+j(l[X\8|wwk^njㄴtCqbhy@-F7Re/;\ 74|uAبR]N̔딼4pgkRʚYi<2ֶ]:`YOL ywKL+mufg%ir*?xMaCR'JBк+Ν3"woLU+`O, νߨu⎥6 *Ml+w6o6S~2v+~9U\srm&nƇ;,({9hSnGl0պR3눮Vwv!ֵ$4A&Ps`RFϮ_f|9_n톧ʱ_Y g Ofa0dr /_Q]PMdēMu9Ոh'ꩣ449OSs@ Z牎AgxtW+=/mKPue!y6^wQże]n,7d 2Xמ>(%̫2' !%,z8JWlՀ|]f9'ץ1_ x8Z oۚ!W8e4<498~;#1>O<'LqStc* x1`$q+ۺ絍 -SA5!$ !KSfju>%{g :ӜvK95o:^cIX.7yIѢ@ĻSKwvv,"e(űmKVd?&ߺJ p[y߽jpGʍn)kY E f: G2nDYܑU%l}-G :=͉j_`bPJtПnm2ǩhfJF@U-$xɉ:J'jc،VnOĊʺ YZ