Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: qemu-kvm-hw-usbredir | Distribution: CentOS |
Version: 6.2.0 | Vendor: CentOS |
Release: 4.el9 | Build date: Mon Jan 17 13:53:58 2022 |
Group: Unspecified | Build host: x86-06.stream.rdu2.redhat.com |
Size: 74465 | Source RPM: qemu-kvm-6.2.0-4.el9.src.rpm |
Packager: builder@centos.org | |
Url: http://www.qemu.org/ | |
Summary: QEMU usbredir support |
This package provides usbredir support.
GPLv2 and GPLv2+ and CC-BY
* Mon Jan 17 2022 Miroslav Rezanina <mrezanin@redhat.com> - 6.2.0-4 - kvm-block-nvme-fix-infinite-loop-in-nvme_free_req_queue_.patch [bz#2024544] - kvm-rhel-machine-types-x86-set-prefer_sockets.patch [bz#2028623] - Resolves: bz#2024544 (Fio workers hangs when running fio with 32 jobs iodepth 32 and QEMU's userspace NVMe driver) - Resolves: bz#2028623 ([9.0] machine types: 6.2: Fix prefer_sockets) * Mon Jan 10 2022 Miroslav Rezanina <mrezanin@redhat.com> - 6.2.0-3 - kvm-hw-arm-virt-Register-iommu-as-a-class-property.patch [bz#2031044] - kvm-hw-arm-virt-Register-its-as-a-class-property.patch [bz#2031044] - kvm-hw-arm-virt-Rename-default_bus_bypass_iommu.patch [bz#2031044] - kvm-hw-arm-virt-Expose-the-RAS-option.patch [bz#2031044] - kvm-hw-arm-virt-Add-9.0-machine-type-and-remove-8.5-one.patch [bz#2031044] - kvm-hw-arm-virt-Check-no_tcg_its-and-minor-style-changes.patch [bz#2031044] - Resolves: bz#2031044 (Add rhel-9.0.0 machine types for RHEL 9.0 [aarch64]) * Fri Jan 07 2022 Miroslav Rezanina <mrezanin@redhat.com> - 6.2.0-2 - kvm-redhat-Add-rhel8.6.0-and-rhel9.0.0-machine-types-for.patch [bz#2008060] - kvm-redhat-Enable-virtio-mem-as-tech-preview-on-x86-64.patch [bz#2014484] - Resolves: bz#2008060 (Fix CPU Model for new IBM Z Hardware - qemu part) - Resolves: bz#2014484 ([RHEL9] Enable virtio-mem as tech-preview on x86-64 - QEMU) * Thu Dec 16 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.2.0-1 - Rebase to QEMU 6.2.0 [bz#2027697] - Resolves: bz#2027697 (Rebase to QEMU 6.2.0) * Wed Nov 24 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.1.0-8 - kvm-Move-ksmtuned-files-to-separate-package.patch [bz#1971678] - Resolves: bz#1971678 (Split out ksmtuned package from qemu-kvm) * Fri Nov 19 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.1.0-7 - kvm-migration-Make-migration-blocker-work-for-snapshots-.patch [bz#1996609] - kvm-migration-Add-migrate_add_blocker_internal.patch [bz#1996609] - kvm-dump-guest-memory-Block-live-migration.patch [bz#1996609] - kvm-spec-Build-the-VDI-block-driver.patch [bz#2013331] - kvm-spec-Explicitly-include-compress-filter.patch [bz#1980035] - Resolves: bz#1996609 (Qemu hit core dump when dump guest memory during live migration) - Resolves: bz#2013331 (RFE: qemu-img cannot convert from vdi format) - Resolves: bz#1980035 (RFE: Enable compress filter so we can create new, compressed qcow2 files via qemu-nbd) * Mon Oct 18 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.1.0-6 - kvm-hw-arm-virt-Add-hw_compat_rhel_8_5-to-8.5-machine-ty.patch [bz#1998942] - Resolves: bz#1998942 (Add machine type compatibility update for 6.1 rebase [aarch64]) * Mon Oct 11 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.1.0-5 - kvm-virtio-balloon-Fix-page-poison-subsection-name.patch [bz#1984401] - kvm-spec-Remove-block-curl-and-block-ssh-dependency.patch [bz#2010985] - Resolves: bz#1984401 (fails to revert snapshot of a VM [balloon/page-poison]) - Resolves: bz#2010985 (Remove dependency on qemu-kvm-block-curl and qemu-kvm-block-ssh [rhel-9.0.0]) * Tue Oct 05 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.1.0-4 - kvm-redhat-Define-hw_compat_rhel_8_5.patch [bz#1998943] - kvm-redhat-Add-s390x-machine-type-compatibility-update-f.patch [bz#1998943] - Resolves: bz#1998943 (Add machine type compatibility update for 6.1 rebase [s390x]) * Fri Sep 24 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.1.0-3 - kvm-disable-sga-device.patch [bz#2000845] - kvm-tools-virtiofsd-Add-fstatfs64-syscall-to-the-seccomp.patch [bz#2005026] - Resolves: bz#2000845 (RFE: Remove SGA, deprecate cirrus, and set defaults for QEMU machine-types in RHEL9) - Resolves: bz#2005026 ([s390][virtio-fs] Umount virtiofs shared folder failure from guest side [rhel-9.0.0]) * Fri Sep 10 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.1.0-2 - kvm-hw-arm-virt-Remove-9.0-machine-type.patch [bz#2002937] - kvm-remove-sgabios-dependency.patch [bz#2000845] - kvm-enable-pulseaudio.patch [bz#1997725] - kvm-spec-disable-use-of-gcrypt-for-crypto-backends-in-fa.patch [bz#1990068] - Resolves: bz#2002937 ([qemu][aarch64] Remove 9.0 machine types in arm virt for 9-Beta) - Resolves: bz#2000845 (RFE: Remove SGA, deprecate cirrus, and set defaults for QEMU machine-types in RHEL9) - Resolves: bz#1997725 (RFE: enable pulseaudio backend on QEMU) - Resolves: bz#1990068 (Disable use of gcrypt for crypto backends in favour of gnutls) * Thu Sep 02 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.1.0-1 - Rebase to QEMU 6.1.0 [bz#1997408] - Resolves: #bz#1997408 (Rebase to QEMU 6.1.0) * Fri Aug 27 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.0.0-13 - kvm-qcow2-Deprecation-warning-when-opening-v2-images-rw.patch [bz#1951814] - kvm-disable-ac97-audio.patch [bz#1995819] - kvm-redhat-Disable-LTO-on-non-x86-architectures.patch [bz#1950192] - kvm-redhat-Enable-the-test-block-iothread-test-again.patch [bz#1950192] - Resolves: bz#1951814 (RFE: Warning when using qcow2-v2 (compat=0.10)) - Resolves: bz#1995819 (RFE: Remove ac97 audio support from QEMU) - Resolves: bz#1950192 (RHEL9: when ioeventfd=off and 8.4guest, (qemu) qemu-kvm: ../util/qemu-coroutine-lock.c:57: qemu_co_queue_wait_impl: Assertion `qemu_in_coroutine()' failed.) * Fri Aug 20 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.0.0-12.el9 - kvm-migration-Move-yank-outside-qemu_start_incoming_migr.patch [bz#1974683] - kvm-migration-Allow-reset-of-postcopy_recover_triggered-.patch [bz#1974683] - kvm-Remove-RHEL-7.0.0-machine-type.patch [bz#1968519] - kvm-Remove-RHEL-7.1.0-machine-type.patch [bz#1968519] - kvm-Remove-RHEL-7.2.0-machine-type.patch [bz#1968519] - kvm-Remove-RHEL-7.3.0-machine-types.patch [bz#1968519] - kvm-Remove-RHEL-7.4.0-machine-types.patch [bz#1968519] - kvm-Remove-RHEL-7.5.0-machine-types.patch [bz#1968519] - kvm-acpi-pc-revert-back-to-v5.2-PCI-slot-enumeration.patch [bz#1957194] - kvm-migration-failover-reset-partially_hotplugged.patch [bz#1957194] - kvm-hmp-Fix-loadvm-to-resume-the-VM-on-success-instead-o.patch [bz#1957194] - kvm-migration-Move-bitmap_mutex-out-of-migration_bitmap_.patch [bz#1957194] - kvm-i386-cpu-Expose-AVX_VNNI-instruction-to-guest.patch [bz#1957194] - kvm-ratelimit-protect-with-a-mutex.patch [bz#1957194] - kvm-Update-Linux-headers-to-5.13-rc4.patch [bz#1957194] - kvm-i386-Add-ratelimit-for-bus-locks-acquired-in-guest.patch [bz#1957194] - kvm-iothread-generalize-iothread_set_param-iothread_get_.patch [bz#1957194] - kvm-iothread-add-aio-max-batch-parameter.patch [bz#1957194] - kvm-linux-aio-limit-the-batch-size-using-aio-max-batch-p.patch [bz#1957194] - kvm-block-nvme-Fix-VFIO_MAP_DMA-failed-No-space-left-on-.patch [bz#1957194] - kvm-migration-move-wait-unplug-loop-to-its-own-function.patch [bz#1957194] - kvm-migration-failover-continue-to-wait-card-unplug-on-e.patch [bz#1957194] - kvm-aarch64-Add-USB-storage-devices.patch [bz#1957194] - kvm-iotests-Improve-and-rename-test-291-to-qemu-img-bitm.patch [bz#1957194] - kvm-qemu-img-Fail-fast-on-convert-bitmaps-with-inconsist.patch [bz#1957194] - kvm-qemu-img-Add-skip-broken-bitmaps-for-convert-bitmaps.patch [bz#1957194] - kvm-audio-Never-send-migration-section.patch [bz#1957194] - kvm-pc-bios-s390-ccw-bootmap-Silence-compiler-warning-fr.patch [bz#1939509 bz#1940132] - kvm-pc-bios-s390-ccw-Use-reset_psw-pointer-instead-of-ha.patch [bz#1939509 bz#1940132] - kvm-pc-bios-s390-ccw-netboot-Use-Wl-prefix-to-pass-param.patch [bz#1939509 bz#1940132] - kvm-pc-bios-s390-ccw-Silence-warning-from-Clang-by-marki.patch [bz#1939509 bz#1940132] - kvm-pc-bios-s390-ccw-Fix-the-cc-option-macro-in-the-Make.patch [bz#1939509 bz#1940132] - kvm-pc-bios-s390-ccw-Silence-GCC-11-stringop-overflow-wa.patch [bz#1939509 bz#1940132] - kvm-pc-bios-s390-ccw-Allow-building-with-Clang-too.patch [bz#1939509 bz#1940132] - kvm-pc-bios-s390-ccw-Fix-inline-assembly-for-older-versi.patch [bz#1939509 bz#1940132] - kvm-configure-Fix-endianess-test-with-LTO.patch [bz#1939509 bz#1940132] - kvm-spec-Switch-toolchain-to-Clang-LLVM.patch [bz#1939509 bz#1940132] - kvm-spec-Use-safe-stack-for-x86_64.patch [bz#1939509 bz#1940132] - kvm-spec-Reenable-write-support-for-VMDK-etc.-in-tools.patch [bz#1989841] - Resolves: bz#1974683 (Fail to set migrate incoming for 2nd time after the first time failed) - Resolves: bz#1968519 (Remove all the old 7.0-7.5 machine types) - Resolves: bz#1957194 (Synchronize RHEL-AV 8.5.0 changes to RHEL 9.0.0 Beta) - Resolves: bz#1939509 (QEMU: enable SafeStack) - Resolves: bz#1940132 (QEMU: switch build toolchain to Clang/LLVM) - Resolves: bz#1989841 (RFE: qemu-img cannot convert images into vmdk and vpc formats) * Tue Aug 10 2021 Mohan Boddu <mboddu@redhat.com> - 17:6.0.0-11.1 - Rebuilt for IMA sigs, glibc 2.34, aarch64 flags Related: rhbz#1991688 * Sat Aug 07 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.0.0-11 - kvm-arm-virt-Register-iommu-as-a-class-property.patch [bz#1838608] - kvm-arm-virt-Register-its-as-a-class-property.patch [bz#1838608] - kvm-arm-virt-Enable-ARM-RAS-support.patch [bz#1838608] - kvm-block-Fix-in_flight-leak-in-request-padding-error-pa.patch [bz#1972079] - kvm-spec-Remove-buildldflags.patch [bz#1973029] - kvm-spec-Use-make_build-macro.patch [bz#1973029] - kvm-spec-Drop-make-install-sharedir-and-datadir-usage.patch [bz#1973029] - kvm-spec-use-make_install-macro.patch [bz#1973029] - kvm-spec-parallelize-make-check.patch [bz#1973029] - kvm-spec-Drop-explicit-build-id.patch [bz#1973029] - kvm-spec-use-build_ldflags.patch [bz#1973029] - kvm-Move-virtiofsd-to-separate-package.patch [bz#1979728] - kvm-Utilize-firmware-configure-option.patch [bz#1980139] - Resolves: bz#1838608 (aarch64: Enable ARMv8 RAS virtualization support) - Resolves: bz#1972079 (Windows Installation blocked on 4k disk when using blk+raw+iothread) - Resolves: bz#1973029 (Spec file cleanups) - Resolves: bz#1979728 (Split out virtiofsd subpackage) - Resolves: bz#1980139 (Use configure --firmwarepath more) * Sun Jul 25 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.0.0-10 - kvm-s390x-css-Introduce-an-ESW-struct.patch [bz#1957194] - kvm-s390x-css-Split-out-the-IRB-sense-data.patch [bz#1957194] - kvm-s390x-css-Refactor-IRB-construction.patch [bz#1957194] - kvm-s390x-css-Add-passthrough-IRB.patch [bz#1957194] - kvm-vhost-user-blk-Fail-gracefully-on-too-large-queue-si.patch [bz#1957194] - kvm-vhost-user-blk-Make-sure-to-set-Error-on-realize-fai.patch [bz#1957194] - kvm-vhost-user-blk-Don-t-reconnect-during-initialisation.patch [bz#1957194] - kvm-vhost-user-blk-Improve-error-reporting-in-realize.patch [bz#1957194] - kvm-vhost-user-blk-Get-more-feature-flags-from-vhost-dev.patch [bz#1957194] - kvm-virtio-Fail-if-iommu_platform-is-requested-but-unsup.patch [bz#1957194] - kvm-vhost-user-blk-Check-that-num-queues-is-supported-by.patch [bz#1957194] - kvm-vhost-user-Fix-backends-without-multiqueue-support.patch [bz#1957194] - kvm-file-posix-fix-max_iov-for-dev-sg-devices.patch [bz#1957194] - kvm-scsi-generic-pass-max_segments-via-max_iov-field-in-.patch [bz#1957194] - kvm-osdep-provide-ROUND_DOWN-macro.patch [bz#1957194] - kvm-block-backend-align-max_transfer-to-request-alignmen.patch [bz#1957194] - kvm-block-add-max_hw_transfer-to-BlockLimits.patch [bz#1957194] - kvm-file-posix-try-BLKSECTGET-on-block-devices-too-do-no.patch [bz#1957194] - kvm-block-Add-option-to-use-driver-whitelist-even-in-too.patch [bz#1957782] - kvm-spec-Restrict-block-drivers-in-tools.patch [bz#1957782] - kvm-Move-tools-to-separate-package.patch [bz#1972285] - kvm-Split-qemu-pr-helper-to-separate-package.patch [bz#1972300] - kvm-spec-RPM_BUILD_ROOT-buildroot.patch [bz#1973029] - kvm-spec-More-use-of-name-instead-of-qemu-kvm.patch [bz#1973029] - kvm-spec-Use-qemu-pr-helper.service-from-qemu.git.patch [bz#1973029] - kvm-spec-Use-_sourcedir-for-referencing-sources.patch [bz#1973029] - kvm-spec-Add-tools_only.patch [bz#1973029] - kvm-spec-build-Add-run_configure-helper.patch [bz#1973029] - kvm-spec-build-Disable-more-bits-with-disable_everything.patch [bz#1973029] - kvm-spec-build-Add-macros-for-some-configure-parameters.patch [bz#1973029] - kvm-spec-files-Move-qemu-guest-agent-and-qemu-img-earlie.patch [bz#1973029] - kvm-spec-install-Remove-redundant-bits.patch [bz#1973029] - kvm-spec-install-Add-modprobe_kvm_conf-macro.patch [bz#1973029] - kvm-spec-install-Remove-qemu-guest-agent-etc-qemu-kvm-us.patch [bz#1973029] - kvm-spec-install-clean-up-qemu-ga-section.patch [bz#1973029] - kvm-spec-install-Use-a-single-tools_only-section.patch [bz#1973029] - kvm-spec-Make-tools_only-not-cross-spec-sections.patch [bz#1973029] - kvm-spec-install-Limit-time-spent-in-qemu_kvm_build.patch [bz#1973029] - kvm-spec-misc-syntactic-merges-with-Fedora.patch [bz#1973029] - kvm-spec-Use-Fedora-s-pattern-for-specifying-rc-version.patch [bz#1973029] - kvm-spec-files-don-t-use-fine-grained-docs-file-list.patch [bz#1973029] - kvm-spec-files-Add-licenses-to-qemu-common-too.patch [bz#1973029] - kvm-spec-install-Drop-python3-shebang-fixup.patch [bz#1973029] - Resolves: bz#1957194 (Synchronize RHEL-AV 8.5.0 changes to RHEL 9.0.0 Beta) - Resolves: bz#1957782 (VMDK support should be read-only) - Resolves: bz#1972285 (Split out a qemu-kvm-tools subpackage) - Resolves: bz#1972300 (Split out a qemu-pr-helper subpackage) - Resolves: bz#1973029 (Spec file cleanups) * Mon Jul 19 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.0.0-9 - kvm-s390x-cpumodel-add-3931-and-3932.patch [bz#1932191] - kvm-spapr-Fix-EEH-capability-issue-on-KVM-guest-for-PCI-.patch [bz#1957194] - kvm-ppc-pef.c-initialize-cgs-ready-in-kvmppc_svm_init.patch [bz#1957194] - kvm-redhat-Move-qemu-kvm-docs-dependency-to-qemu-kvm.patch [bz#1957194] - kvm-redhat-introducting-qemu-kvm-hw-usbredir.patch [bz#1957194] - kvm-redhat-use-the-standard-vhost-user-JSON-path.patch [bz#1957194] - Resolves: bz#1932191 ([IBM 9.0 FEAT] CPU Model for new IBM Z Hardware - qemu part (kvm)) - Resolves: bz#1957194 (Synchronize RHEL-AV 8.5.0 changes to RHEL 9.0.0 Beta) * Mon Jul 12 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.0.0-8 - kvm-Disable-TPM-passthrough.patch [bz#1978911] - kvm-redhat-Replace-the-kvm-setup.service-with-a-etc-modu.patch [bz#1978837] - Resolves: bz#1978911 (Remove TPM Passthrough option from RHEL 9) - Resolves: bz#1978837 (Remove/replace kvm-setup.service) * Mon Jun 28 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.0.0-7 - kvm-aarch64-rh-devices-add-CONFIG_PXB.patch [bz#1967502] - kvm-virtio-gpu-handle-partial-maps-properly.patch [bz#1974795] - kvm-x86-Add-x86-rhel8.5-machine-types.patch [bz#1957194] - kvm-redhat-x86-Enable-kvm-asyncpf-int-by-default.patch [bz#1957194] - kvm-block-backend-add-drained_poll.patch [bz#1957194] - kvm-nbd-server-Use-drained-block-ops-to-quiesce-the-serv.patch [bz#1957194] - kvm-disable-CONFIG_USB_STORAGE_BOT.patch [bz#1957194] - kvm-doc-Fix-some-mistakes-in-the-SEV-documentation.patch [bz#1957194] - kvm-docs-Add-SEV-ES-documentation-to-amd-memory-encrypti.patch [bz#1957194] - kvm-docs-interop-firmware.json-Add-SEV-ES-support.patch [bz#1957194] - kvm-qga-drop-StandardError-syslog.patch [bz#1947977] - kvm-Remove-iscsi-support.patch [bz#1967133] - Resolves: bz#1967502 ([aarch64] [qemu] Compile the PCIe expander bridge) - Resolves: bz#1974795 ([RHEL9-beta] [aarch64] Launch guest with virtio-gpu-pci and virtual smmu causes "virtio_gpu_dequeue_ctrl_func" ERROR) - Resolves: bz#1957194 (Synchronize RHEL-AV 8.5.0 changes to RHEL 9.0.0 Beta) - Resolves: bz#1947977 (remove StandardError=syslog from qemu-guest-agent.service) - Resolves: bz#1967133 (QEMU: disable libiscsi in RHEL-9) * Mon Jun 21 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.0.0-6 - kvm-yank-Unregister-function-when-using-TLS-migration.patch [bz#1972462] - kvm-pc-bios-s390-ccw-don-t-try-to-read-the-next-block-if.patch [bz#1957194] - kvm-redhat-Install-the-s390-netboot.img-that-we-ve-built.patch [bz#1957194] - kvm-sockets-update-SOCKET_ADDRESS_TYPE_FD-listen-2-backl.patch [bz#1957194] - kvm-target-i386-sev-add-support-to-query-the-attestation.patch [bz#1957194] - kvm-spapr-Don-t-hijack-current_machine-boot_order.patch [bz#1957194] - kvm-target-i386-Add-CPU-model-versions-supporting-xsaves.patch [bz#1957194] - kvm-spapr-Remove-stale-comment-about-power-saving-LPCR-b.patch [bz#1957194] - kvm-spapr-Set-LPCR-to-current-AIL-mode-when-starting-a-n.patch [bz#1957194] - Specfile cleanup [bz#1973029] - Resolves: bz#1972462 (QEMU core dump when doing TLS migration via TCP) - Resolves: bz#1957194 (Synchronize RHEL-AV 8.5.0 changes to RHEL 9.0.0 Beta) - Resolves: bz#1973029 (Spec file cleanups) * Tue Jun 08 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.0.0-5 - kvm-arm-virt-Register-highmem-and-gic-version-as-class-p.patch [bz#1952449] - kvm-hw-arm-virt-Add-8.5-and-9.0-machine-types-and-remove.patch [bz#1952449] - kvm-aarch64-rh-devices-add-CONFIG_PVPANIC_PCI.patch [bz#1747467] - kvm-spec-Do-not-build-qemu-kvm-block-gluster.patch [bz#1964795] - kvm-spec-Do-not-link-pcnet-and-ne2k_pci-roms.patch [bz#1965961] - kvm-redhat-s390x-add-rhel-8.5.0-compat-machine.patch [bz#1957194] - kvm-redhat-add-missing-entries-in-hw_compat_rhel_8_4.patch [bz#1957194] - kvm-redhat-Define-pseries-rhel8.5.0-machine-type.patch [bz#1957194] - kvm-virtio-net-failover-add-missing-remove_migration_sta.patch [bz#1957194] - kvm-hw-arm-virt-Disable-PL011-clock-migration-through-hw.patch [bz#1957194] - kvm-virtio-blk-Fix-rollback-path-in-virtio_blk_data_plan.patch [bz#1957194] - kvm-virtio-blk-Configure-all-host-notifiers-in-a-single-.patch [bz#1957194] - kvm-virtio-scsi-Set-host-notifiers-and-callbacks-separat.patch [bz#1957194] - kvm-virtio-scsi-Configure-all-host-notifiers-in-a-single.patch [bz#1957194] - kvm-hw-arm-smmuv3-Another-range-invalidation-fix.patch [bz#1957194] - Resolves: bz#1952449 ([aarch64] define RHEL9 machine types) - Resolves: bz#1747467 ([aarch64] [qemu] PVPANIC support) - Resolves: bz#1964795 (Remove qemu-kvm-block-gluster package) - Resolves: bz#1965961 (Remove links to not build roms) - Resolves: bz#1957194 (Synchronize RHEL-AV 8.5.0 changes to RHEL 9.0.0 Beta) * Mon May 31 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.0.0-4 - kvm-s390x-redhat-disable-experimental-3270-device.patch - Resolves: bz#1962479 (Disable the 'x-terminal3270' device in qemu-kvm on s390x) * Tue May 25 2021 Miroslav Reznaina <mrezanin@redhat.com> - 6.0.0-3 - kvm-hw-s390x-Remove-the-RHEL7-only-machine-type.patch [bz#1944730] - Resolves: bz#1944730 (Remove RHEL7 machine type (s390-ccw-virtio-rhel7.5.0)) * Thu May 13 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.0.0-2 - kvm-Remove-message-with-running-VM-count.patch [bz#1914461] - kvm-Remove-SPICE-and-QXL-from-x86_64-rh-devices.mak.patch [bz#1906168] - kvm-spec-file-build-qemu-kvm-without-SPICE-and-QXL.patch [bz#1906168] - kvm-spec-file-Obsolete-qemu-kvm-ui-spice.patch [bz#1906168] - Resolves: bz#1914461 (Remove KVM guest count and limit info message) - Resolves: bz#1906168 ([RHEL-9] qemu-kvm spec-file: Do not BuildRequire spice) * Fri Apr 30 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.0.0-1 - Rebase to QEMU 6.0 - Resolves: bz#1872569 * Mon Apr 26 2021 Miroslav Rezanina <mrezanin@redhat.com> - 5.2.0-16 - kvm-Limit-build-on-Power-to-qemu-img-and-qemu-ga-only.patch [bz#1944056] - Resolves: bz#1944056 (Do not build qemu-kvm for Power) * Fri Apr 16 2021 Mohan Boddu <mboddu@redhat.com> - 15:5.2.0-15 - Rebuilt for RHEL 9 BETA on Apr 15th 2021. Related: rhbz#1947937 * Sat Mar 20 2021 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.2.0-14.el8 - kvm-vhost-user-blk-fix-blkcfg-num_queues-endianness.patch [bz#1937004] - kvm-block-export-fix-blk_size-double-byteswap.patch [bz#1937004] - kvm-block-export-use-VIRTIO_BLK_SECTOR_BITS.patch [bz#1937004] - kvm-block-export-fix-vhost-user-blk-export-sector-number.patch [bz#1937004] - kvm-block-export-port-virtio-blk-discard-write-zeroes-in.patch [bz#1937004] - kvm-block-export-port-virtio-blk-read-write-range-check.patch [bz#1937004] - kvm-spec-ui-spice-sub-package.patch [bz#1936373] - kvm-spec-ui-opengl-sub-package.patch [bz#1936373] - Resolves: bz#1937004 (vhost-user-blk server endianness and input validation fixes) - Resolves: bz#1936373 (move spice & opengl modules to rpm subpackages) * Tue Mar 16 2021 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.2.0-13.el8 - kvm-i386-acpi-restore-device-paths-for-pre-5.1-vms.patch [bz#1934158] - Resolves: bz#1934158 (Windows guest looses network connectivity when NIC was configured with static IP) * Mon Mar 15 2021 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.2.0-12.el8 - kvm-scsi-disk-move-scsi_handle_rw_error-earlier.patch [bz#1927530] - kvm-scsi-disk-do-not-complete-requests-early-for-rerror-.patch [bz#1927530] - kvm-scsi-introduce-scsi_sense_from_errno.patch [bz#1927530] - kvm-scsi-disk-pass-SCSI-status-to-scsi_handle_rw_error.patch [bz#1927530] - kvm-scsi-disk-pass-guest-recoverable-errors-through-even.patch [bz#1927530] - kvm-hw-intc-arm_gic-Fix-interrupt-ID-in-GICD_SGIR-regist.patch [bz#1936948] - Resolves: bz#1927530 (RHEL8 Hypervisor - OVIRT - Issues seen on a virtualization guest with direct passthrough LUNS pausing when a host gets a Thin threshold warning) - Resolves: bz#1936948 (CVE-2021-20221 virt:av/qemu-kvm: qemu: out-of-bound heap buffer access via an interrupt ID field [rhel-av-8.4.0]) * Mon Mar 08 2021 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.2.0-11.el8 - kvm-qxl-set-qxl.ssd.dcl.con-on-secondary-devices.patch [bz#1932190] - kvm-qxl-also-notify-the-rendering-is-done-when-skipping-.patch [bz#1932190] - kvm-virtiofsd-Save-error-code-early-at-the-failure-calls.patch [bz#1935071] - kvm-virtiofs-drop-remapped-security.capability-xattr-as-.patch [bz#1935071] - Resolves: bz#1932190 (Timeout when dump the screen from 2nd VGA) - Resolves: bz#1935071 (CVE-2021-20263 virt:8.4/qemu-kvm: QEMU: virtiofsd: 'security.capabilities' is not dropped with xattrmap option [rhel-av-8]) * Wed Mar 03 2021 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.2.0-10.el8 - kvm-migration-dirty-bitmap-Use-struct-for-alias-map-inne.patch [bz#1930757] - kvm-migration-dirty-bitmap-Allow-control-of-bitmap-persi.patch [bz#1930757] - kvm-qemu-iotests-300-Add-test-case-for-modifying-persist.patch [bz#1930757] - kvm-failover-fix-indentantion.patch [bz#1819991] - kvm-failover-Use-always-atomics-for-primary_should_be_hi.patch [bz#1819991] - kvm-failover-primary-bus-is-only-used-once-and-where-it-.patch [bz#1819991] - kvm-failover-Remove-unused-parameter.patch [bz#1819991] - kvm-failover-Remove-external-partially_hotplugged-proper.patch [bz#1819991] - kvm-failover-qdev_device_add-returns-err-or-dev-set.patch [bz#1819991] - kvm-failover-Rename-bool-to-failover_primary_hidden.patch [bz#1819991] - kvm-failover-g_strcmp0-knows-how-to-handle-NULL.patch [bz#1819991] - kvm-failover-Remove-primary_device_opts.patch [bz#1819991] - kvm-failover-remove-standby_id-variable.patch [bz#1819991] - kvm-failover-Remove-primary_device_dict.patch [bz#1819991] - kvm-failover-Remove-memory-leak.patch [bz#1819991] - kvm-failover-simplify-virtio_net_find_primary.patch [bz#1819991] - kvm-failover-should_be_hidden-should-take-a-bool.patch [bz#1819991] - kvm-failover-Rename-function-to-hide_device.patch [bz#1819991] - kvm-failover-virtio_net_connect_failover_devices-does-no.patch [bz#1819991] - kvm-failover-Rename-to-failover_find_primary_device.patch [bz#1819991] - kvm-failover-simplify-qdev_device_add-failover-case.patch [bz#1819991] - kvm-failover-simplify-qdev_device_add.patch [bz#1819991] - kvm-failover-make-sure-that-id-always-exist.patch [bz#1819991] - kvm-failover-remove-failover_find_primary_device-error-p.patch [bz#1819991] - kvm-failover-split-failover_find_primary_device_id.patch [bz#1819991] - kvm-failover-We-don-t-need-to-cache-primary_device_id-an.patch [bz#1819991] - kvm-failover-Caller-of-this-two-functions-already-have-p.patch [bz#1819991] - kvm-failover-simplify-failover_unplug_primary.patch [bz#1819991] - kvm-failover-Remove-primary_dev-member.patch [bz#1819991] - kvm-virtio-net-add-missing-object_unref.patch [bz#1819991] - kvm-x86-cpu-Populate-SVM-CPUID-feature-bits.patch [bz#1926785] - kvm-i386-Add-the-support-for-AMD-EPYC-3rd-generation-pro.patch [bz#1926785] - Resolves: bz#1930757 (Allow control of block-dirty-bitmap persistence via 'block-bitmap-mapping') - Resolves: bz#1819991 (Hostdev type interface with net failover enabled exists in domain xml and doesn't reattach to host after hot-unplug) - Resolves: bz#1926785 ([RFE] AMD Milan - Add KVM/support for EPYC-Milan CPU Model - Fast Train) * Mon Mar 01 2021 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.2.0-9.el8 - kvm-docs-generate-qemu-storage-daemon-qmp-ref-7-man-page.patch [bz#1901323] - kvm-docs-add-qemu-storage-daemon-1-man-page.patch [bz#1901323] - kvm-docs-Add-qemu-storage-daemon-1-manpage-to-meson.buil.patch [bz#1901323] - kvm-qemu-storage-daemon-Enable-object-add.patch [bz#1901323] - kvm-spec-Package-qemu-storage-daemon.patch [bz#1901323] - kvm-default-configs-Enable-vhost-user-blk.patch [bz#1930033] - kvm-qemu-nbd-Use-SOMAXCONN-for-socket-listen-backlog.patch [bz#1925345] - kvm-pcie-don-t-set-link-state-active-if-the-slot-is-empt.patch [bz#1917654] - Resolves: bz#1901323 (QSD (QEMU Storage Daemon): basic support - TechPreview) - Resolves: bz#1930033 (enable vhost-user-blk device) - Resolves: bz#1925345 (qemu-nbd needs larger backlog for Unix socket listen()) - Resolves: bz#1917654 ([failover vf migration][RHEL84 vm] After start a vm with a failover vf + a failover virtio net device, the failvoer vf do not exist in the vm) * Fri Feb 19 2021 Eduardo Lima (Etrunko) <elima@redhat.com> - 5.2.0-8.el8 - kvm-block-nbd-only-detach-existing-iochannel-from-aio_co.patch [bz#1887883] - kvm-block-nbd-only-enter-connection-coroutine-if-it-s-pr.patch [bz#1887883] - kvm-nbd-make-nbd_read-return-EIO-on-error.patch [bz#1887883] - kvm-virtio-move-use-disabled-flag-property-to-hw_compat_.patch [bz#1907255] - kvm-virtiofsd-extract-lo_do_open-from-lo_open.patch [bz#1920740] - kvm-virtiofsd-optionally-return-inode-pointer-from-lo_do.patch [bz#1920740] - kvm-virtiofsd-prevent-opening-of-special-files-CVE-2020-.patch [bz#1920740] - kvm-spapr-Adjust-firmware-path-of-PCI-devices.patch [bz#1920941] - kvm-pci-reject-too-large-ROMs.patch [bz#1917830] - kvm-pci-add-romsize-property.patch [bz#1917830] - kvm-redhat-Add-some-devices-for-exporting-upstream-machi.patch [bz#1917826] - kvm-vhost-Check-for-valid-vdev-in-vhost_backend_handle_i.patch [bz#1880299] - Resolves: bz#1887883 (qemu blocks client progress with various NBD actions) - Resolves: bz#1907255 (Migrate failed with vhost-vsock-pci from RHEL-AV 8.3.1 to RHEL-AV 8.2.1) - Resolves: bz#1920740 (CVE-2020-35517 virt:8.4/qemu-kvm: QEMU: virtiofsd: potential privileged host device access from guest [rhel-av-8.4.0]) - Resolves: bz#1920941 ([ppc64le] [AV]--disk cdimage.iso,bus=usb fails to boot) - Resolves: bz#1917830 (Add romsize property to qemu-kvm) - Resolves: bz#1917826 (Add extra device support to qemu-kvm, but not to rhel machine types) - Resolves: bz#1880299 (vhost-user mq connection fails to restart after kill host testpmd which acts as vhost-user client) * Fri Feb 12 2021 Eduardo Lima (Etrunko) <elima@redhat.com> - 5.2.0-7.el8 - kvm-virtio-Add-corresponding-memory_listener_unregister-.patch [bz#1903521] - kvm-block-Honor-blk_set_aio_context-context-requirements.patch [bz#1918966 bz#1918968] - kvm-nbd-server-Quiesce-coroutines-on-context-switch.patch [bz#1918966 bz#1918968] - kvm-block-Avoid-processing-BDS-twice-in-bdrv_set_aio_con.patch [bz#1918966 bz#1918968] - kvm-storage-daemon-Call-bdrv_close_all-on-exit.patch [bz#1918966 bz#1918968] - kvm-block-move-blk_exp_close_all-to-qemu_cleanup.patch [bz#1918966 bz#1918968] - Resolves: bz#1903521 (hot unplug vhost-user cause qemu crash: qemu-kvm: ../softmmu/memory.c:2818: do_address_space_destroy: Assertion `QTAILQ_EMPTY(&as->listeners)' failed.) - Resolves: bz#1918966 ([incremental_backup] qemu aborts if guest reboot during backup when using virtio-blk: "aio_co_schedule: Co-routine was already scheduled in 'aio_co_schedule'") - Resolves: bz#1918968 ([incremental_backup] qemu deadlock after poweroff in guest during backup in nbd_export_close_all()) * Tue Feb 09 2021 Eduardo Lima (Etrunko) <elima@redhat.com> - 5.2.0-6.el8 - kvm-scsi-fix-device-removal-race-vs-IO-restart-callback-.patch [bz#1854811] - kvm-tracetool-also-strip-l-and-ll-from-systemtap-format-.patch [bz#1907264] - kvm-redhat-moving-all-documentation-files-to-qemu-kvm-do.patch [bz#1881170 bz#1924766] - kvm-hw-arm-smmuv3-Fix-addr_mask-for-range-based-invalida.patch [bz#1834152] - kvm-redhat-makes-qemu-respect-system-s-crypto-profile.patch [bz#1902219] - kvm-vhost-Unbreak-SMMU-and-virtio-iommu-on-dev-iotlb-sup.patch [bz#1925028] - kvm-docs-set-CONFDIR-when-running-sphinx.patch [bz#1902537] - Resolves: bz#1854811 (scsi-bus.c: use-after-free due to race between device unplug and I/O operation causes guest crash) - Resolves: bz#1907264 (systemtap: invalid or missing conversion specifier at the trace event vhost_vdpa_set_log_base) - Resolves: bz#1881170 (split documentation from the qemu-kvm-core package to its own subpackage) - Resolves: bz#1924766 (split documentation from the qemu-kvm-core package to its own subpackage [av-8.4.0]) - Resolves: bz#1834152 ([aarch64] QEMU SMMUv3 device: Support range invalidation) - Resolves: bz#1902219 (QEMU doesn't honour system crypto policies) - Resolves: bz#1925028 (vsmmuv3/vhost and virtio-iommu/vhost regression) - Resolves: bz#1902537 (The default fsfreeze-hook path from man page and qemu-ga --help command are different) * Tue Feb 02 2021 Eduardo Lima (Etrunko) <elima@redhat.com> - 5.2.0-5.el8 - kvm-spapr-Allow-memory-unplug-to-always-succeed.patch [bz#1914069] - kvm-spapr-Improve-handling-of-memory-unplug-with-old-gue.patch [bz#1914069] - kvm-x86-cpu-Add-AVX512_FP16-cpu-feature.patch [bz#1838738] - kvm-q35-Increase-max_cpus-to-710-on-pc-q35-rhel8-machine.patch [bz#1904268] - kvm-config-enable-VFIO_CCW.patch [bz#1922170] - Resolves: bz#1914069 ([ppc64le] have this fix for rhel8.4 av (spapr: Allow memory unplug to always succeed)) - Resolves: bz#1838738 ([Intel 8.4 FEAT] qemu-kvm Sapphire Rapids (SPR) New Instructions (NIs) - Fast Train) - Resolves: bz#1904268 ([RFE] [HPEMC] qemu-kvm: support up to 710 VCPUs) - Resolves: bz#1922170 (Enable vfio-ccw in AV) * Wed Jan 27 2021 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.2.0-4.el8 - kvm-Drop-bogus-IPv6-messages.patch [bz#1918061] - Resolves: bz#1918061 (CVE-2020-10756 virt:rhel/qemu-kvm: QEMU: slirp: networking out-of-bounds read information disclosure vulnerability [rhel-av-8]) * Mon Jan 18 2021 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.2.0-3.el8 - kvm-block-nvme-Implement-fake-truncate-coroutine.patch [bz#1848834] - kvm-spec-find-system-python-via-meson.patch [bz#1899619] - kvm-build-system-use-b_staticpic-false.patch [bz#1899619] - kvm-spapr-Fix-buffer-overflow-in-spapr_numa_associativit.patch [bz#1908693] - kvm-usb-hcd-xhci-pci-Fixup-capabilities-ordering-again.patch [bz#1912846] - kvm-qga-commands-posix-Send-CCW-address-on-s390x-with-th.patch [bz#1755075] - kvm-AArch64-machine-types-cleanup.patch [bz#1895276] - kvm-hw-arm-virt-Add-8.4-Machine-type.patch [bz#1895276] - kvm-udev-kvm-check-remove-the-exceeded-subscription-limi.patch [bz#1914463] - kvm-memory-Rename-memory_region_notify_one-to-memory_reg.patch [bz#1845758] - kvm-memory-Add-IOMMUTLBEvent.patch [bz#1845758] - kvm-memory-Add-IOMMU_NOTIFIER_DEVIOTLB_UNMAP-IOMMUTLBNot.patch [bz#1845758] - kvm-intel_iommu-Skip-page-walking-on-device-iotlb-invali.patch [bz#1845758] - kvm-memory-Skip-bad-range-assertion-if-notifier-is-DEVIO.patch [bz#1845758] - kvm-RHEL-Switch-pvpanic-test-to-q35.patch [bz#1885555] - kvm-8.4-x86-machine-type.patch [bz#1885555] - kvm-memory-clamp-cached-translation-in-case-it-points-to.patch [bz#1904392] - Resolves: bz#1848834 (Failed to create luks format image on NVMe device) - Resolves: bz#1899619 (QEMU 5.2 is built with PIC objects instead of PIE) - Resolves: bz#1908693 ([ppc64le]boot up a guest with 128 numa nodes ,qemu got coredump) - Resolves: bz#1912846 (qemu-kvm: Failed to load xhci:parent_obj during migration) - Resolves: bz#1755075 ([qemu-guest-agent] fsinfo doesn't return disk info on s390x) - Resolves: bz#1895276 (Machine types update for aarch64 for QEMU 5.2.0) - Resolves: bz#1914463 (Remove KVM guest count and limit info message) - Resolves: bz#1845758 (qemu core dumped: qemu-kvm: /builddir/build/BUILD/qemu-4.2.0/memory.c:1928: memory_region_notify_one: Assertion `entry->iova >= notifier->start && entry_end <= notifier->end' failed.) - Resolves: bz#1885555 (8.4 machine types for x86) - Resolves: bz#1904392 (CVE-2020-27821 virt:8.4/qemu-kvm: QEMU: heap buffer overflow in msix_table_mmio_write() in hw/pci/msix.c [rhel-av-8]) * Tue Dec 15 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.2.0-2.el8 - kvm-redhat-Define-hw_compat_8_3.patch [bz#1893935] - kvm-redhat-Add-spapr_machine_rhel_default_class_options.patch [bz#1893935] - kvm-redhat-Define-pseries-rhel8.4.0-machine-type.patch [bz#1893935] - kvm-redhat-s390x-add-rhel-8.4.0-compat-machine.patch [bz#1836282] - Resolves: bz#1836282 (New machine type for qemu-kvm on s390x in RHEL-AV) - Resolves: bz#1893935 (New machine type on RHEL-AV 8.4 for ppc64le) * Wed Dec 09 2020 Miroslav Rezanina <mrezanin@redhat.com> - 5.2.0-1.el8 - Rebase to QEMU 5.2.0 [bz#1905933] - Resolves: bz#1905933 (Rebase qemu-kvm to version 5.2.0) * Tue Dec 01 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.1.0-16.el8 - kvm-redhat-introduces-disable_everything-macro-into-the-.patch [bz#1884611] - kvm-redhat-scripts-extract_build_cmd.py-Avoid-listing-em.patch [bz#1884611] - kvm-redhat-Removing-unecessary-configurations.patch [bz#1884611] - kvm-redhat-Fixing-rh-local-build.patch [bz#1884611] - kvm-redhat-allow-Makefile-rh-prep-builddep-to-fail.patch [bz#1884611] - kvm-redhat-adding-rh-rpm-target.patch [bz#1884611] - kvm-redhat-move-shareable-files-from-qemu-kvm-core-to-qe.patch [bz#1884611] - kvm-redhat-Add-qemu-kiwi-subpackage.patch [bz#1884611] - Resolves: bz#1884611 (Build kata-specific version of qemu) * Mon Nov 16 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.1.0-15.el8 - kvm-redhat-add-un-pre-install-systemd-hooks-for-qemu-ga.patch [bz#1882719] - kvm-rcu-Implement-drain_call_rcu.patch [bz#1812399 bz#1866707] - kvm-libqtest-Rename-qmp_assert_error_class-to-qmp_expect.patch [bz#1812399 bz#1866707] - kvm-qtest-rename-qtest_qmp_receive-to-qtest_qmp_receive_.patch [bz#1812399 bz#1866707] - kvm-qtest-Reintroduce-qtest_qmp_receive-with-QMP-event-b.patch [bz#1812399 bz#1866707] - kvm-qtest-remove-qtest_qmp_receive_success.patch [bz#1812399 bz#1866707] - kvm-device-plug-test-use-qtest_qmp-to-send-the-device_de.patch [bz#1812399 bz#1866707] - kvm-qtest-switch-users-back-to-qtest_qmp_receive.patch [bz#1812399 bz#1866707] - kvm-qtest-check-that-drives-are-really-appearing-and-dis.patch [bz#1812399 bz#1866707] - kvm-qemu-iotests-qtest-rewrite-test-067-as-a-qtest.patch [bz#1812399 bz#1866707] - kvm-qdev-add-check-if-address-free-callback-for-buses.patch [bz#1812399 bz#1866707] - kvm-scsi-scsi_bus-switch-search-direction-in-scsi_device.patch [bz#1812399 bz#1866707] - kvm-device_core-use-drain_call_rcu-in-in-qmp_device_add.patch [bz#1812399 bz#1866707] - kvm-device-core-use-RCU-for-list-of-children-of-a-bus.patch [bz#1812399 bz#1866707] - kvm-scsi-switch-to-bus-check_address.patch [bz#1812399 bz#1866707] - kvm-device-core-use-atomic_set-on-.realized-property.patch [bz#1812399 bz#1866707] - kvm-scsi-scsi-bus-scsi_device_find-don-t-return-unrealiz.patch [bz#1812399] - kvm-scsi-scsi_bus-Add-scsi_device_get.patch [bz#1812399 bz#1866707] - kvm-virtio-scsi-use-scsi_device_get.patch [bz#1812399 bz#1866707] - kvm-scsi-scsi_bus-fix-races-in-REPORT-LUNS.patch [bz#1812399 bz#1866707] - kvm-tests-migration-fix-memleak-in-wait_command-wait_com.patch [bz#1812399 bz#1866707] - kvm-libqtest-fix-the-order-of-buffered-events.patch [bz#1812399 bz#1866707] - kvm-libqtest-fix-memory-leak-in-the-qtest_qmp_event_ref.patch [bz#1812399 bz#1866707] - kvm-iotests-add-filter_qmp_virtio_scsi-function.patch [bz#1812399 bz#1866707] - kvm-iotests-rewrite-iotest-240-in-python.patch [bz#1812399 bz#1866707] - Resolves: bz#1812399 (Qemu crash when detach disk with cache="none" discard="ignore" io="native") - Resolves: bz#1866707 (qemu-kvm is crashing with error "scsi_target_emulate_report_luns: Assertion `i == n + 8' failed") - Resolves: bz#1882719 (qemu-ga service still active and can work after qemu-guest-agent been removed) * Tue Oct 13 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.1.0-14.el8_3 - kvm-virtiofsd-avoid-proc-self-fd-tempdir.patch [bz#1884276] - Resolves: bz#1884276 (Pod with kata-runtime won't start, QEMU: "vhost_user_dev init failed, Operation not permitted" [mkdtemp failing in sandboxing]) * Thu Oct 08 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.1.0-13.el8_3 - kvm-x86-lpc9-let-firmware-negotiate-CPU-hotplug-with-SMI.patch [bz#1846886] - kvm-x86-cpuhp-prevent-guest-crash-on-CPU-hotplug-when-br.patch [bz#1846886] - kvm-x86-cpuhp-refuse-cpu-hot-unplug-request-earlier-if-n.patch [bz#1846886] - Resolves: bz#1846886 (Guest hit soft lockup or reboots if hotplug vcpu under ovmf) * Mon Oct 05 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.1.0-12.el8_3 - kvm-virtio-skip-legacy-support-check-on-machine-types-le.patch [bz#1868449] - kvm-vhost-vsock-pci-force-virtio-version-1.patch [bz#1868449] - kvm-vhost-user-vsock-pci-force-virtio-version-1.patch [bz#1868449] - kvm-vhost-vsock-ccw-force-virtio-version-1.patch [bz#1868449] - Resolves: bz#1868449 (vhost_vsock error: device is modern-only, use disable-legacy=on) * Mon Oct 05 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.1.0-11.el8_3 - kvm-migration-increase-max-bandwidth-to-128-MiB-s-1-Gib-.patch [bz#1874004] - kvm-redhat-Make-all-generated-so-files-executable-not-on.patch [bz#1876635] - Resolves: bz#1874004 (Live migration performance is poor during guest installation process on power host) - Resolves: bz#1876635 (VM fails to start with a passthrough smartcard) * Mon Sep 28 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.1.0-10.el8 - kvm-qemu-img-Support-bitmap-merge-into-backing-image.patch [bz#1877209] - Resolves: bz#1877209 ('qemu-img bitmaps --merge' failed when trying to merge top volume bitmap to base volume bitmap) * Mon Sep 21 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.1.0-9.el8 - kvm-hw-nvram-fw_cfg-fix-FWCfgDataGeneratorClass-get_data.patch [bz#1688978] - Resolves: bz#1688978 (RFE: forward host preferences for cipher suites and CA certs to guest firmware) * Thu Sep 17 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.1.0-8.el8 - kvm-redhat-link-etc-qemu-ga-fsfreeze-hook-to-etc-qemu-kv.patch [bz#1738820] - kvm-seccomp-fix-killing-of-whole-process-instead-of-thre.patch [bz#1752376] - kvm-Revert-Drop-bogus-IPv6-messages.patch [bz#1867075] - kvm-block-rbd-add-namespace-to-qemu_rbd_strong_runtime_o.patch [bz#1821528] - Resolves: bz#1738820 ('-F' option of qemu-ga command cause the guest-fsfreeze-freeze command doesn't work) - Resolves: bz#1752376 (qemu use SCMP_ACT_TRAP even SCMP_ACT_KILL_PROCESS is available) - Resolves: bz#1821528 (missing namespace attribute when access the rbd image with namespace) - Resolves: bz#1867075 (CVE-2020-10756 virt:8.3/qemu-kvm: QEMU: slirp: networking out-of-bounds read information disclosure vulnerability [rhel-av-8]) * Tue Sep 15 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.1.0-7.el8 - kvm-target-ppc-Add-experimental-option-for-enabling-secu.patch [bz#1789757 bz#1870384] - kvm-target-arm-Move-start-powered-off-property-to-generi.patch [bz#1849483] - kvm-target-arm-Move-setting-of-CPU-halted-state-to-gener.patch [bz#1849483] - kvm-ppc-spapr-Use-start-powered-off-CPUState-property.patch [bz#1849483] - Resolves: bz#1789757 ([IBM 8.4 FEAT] Add machine option to enable secure VM support) - Resolves: bz#1849483 (Failed to boot up guest when hotplugging vcpus on bios stage) - Resolves: bz#1870384 ([IBM 8.3 FEAT] Add interim/unsupported machine option to enable secure VM support for testing purposes) * Thu Sep 10 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.1.0-6.el8 - kvm-spec-Move-qemu-pr-helper-back-to-usr-bin.patch [bz#1869635] - kvm-Bump-required-libusbx-version.patch [bz#1856591] - Resolves: bz#1856591 (libusbx isn't updated with qemu-kvm) - Resolves: bz#1869635 ('/usr/bin/qemu-pr-helper' is not a suitable pr helper: No such file or directory) * Tue Sep 08 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.1.0-5.el8 - kvm-Revert-i386-Fix-pkg_id-offset-for-EPYC-cpu-models.patch [bz#1873417] - kvm-Revert-target-i386-Enable-new-apic-id-encoding-for-E.patch [bz#1873417] - kvm-Revert-hw-i386-Move-arch_id-decode-inside-x86_cpus_i.patch [bz#1873417] - kvm-Revert-i386-Introduce-use_epyc_apic_id_encoding-in-X.patch [bz#1873417] - kvm-Revert-hw-i386-Introduce-apicid-functions-inside-X86.patch [bz#1873417] - kvm-Revert-target-i386-Cleanup-and-use-the-EPYC-mode-top.patch [bz#1873417] - kvm-Revert-hw-386-Add-EPYC-mode-topology-decoding-functi.patch [bz#1873417] - kvm-nvram-Exit-QEMU-if-NVRAM-cannot-contain-all-prom-env.patch [bz#1867739] - kvm-usb-fix-setup_len-init-CVE-2020-14364.patch [bz#1869715] - kvm-Remove-explicit-glusterfs-api-dependency.patch [bz#1872853] - kvm-disable-virgl.patch [bz#1831271] - Resolves: bz#1831271 (Drop virgil acceleration support and remove virglrenderer dependency) - Resolves: bz#1867739 (-prom-env does not validate input) - Resolves: bz#1869715 (CVE-2020-14364 qemu-kvm: QEMU: usb: out-of-bounds r/w access issue while processing usb packets [rhel-av-8.3.0]) - Resolves: bz#1872853 (move the glusterfs dependency out of qemu-kvm-core to the glusterfs module) - Resolves: bz#1873417 (AMD/NUMA topology - revert 5.1 changes) * Thu Aug 27 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.1.0-4.el8 - kvm-Drop-bogus-IPv6-messages.patch [bz#1867075] - kvm-machine-types-numa-set-numa_mem_supported-on-old-mac.patch [bz#1849707] - kvm-machine_types-numa-compatibility-for-auto_enable_num.patch [bz#1849707] - kvm-migration-Add-block-bitmap-mapping-parameter.patch [bz#1790492] - kvm-iotests.py-Let-wait_migration-return-on-failure.patch [bz#1790492] - kvm-iotests-Test-node-bitmap-aliases-during-migration.patch [bz#1790492] - Resolves: bz#1790492 ('dirty-bitmaps' migration capability should allow configuring target nodenames) - Resolves: bz#1849707 (8.3 machine types for x86 - 5.1 update) - Resolves: bz#1867075 (CVE-2020-10756 virt:8.3/qemu-kvm: QEMU: slirp: networking out-of-bounds read information disclosure vulnerability [rhel-av-8]) * Wed Aug 19 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.1.0-3.el8 - kvm-redhat-Update-hw_compat_8_2.patch [bz#1843348] - kvm-redhat-update-pseries-rhel8.2.0-machine-type.patch [bz#1843348] - kvm-Disable-TPM-passthrough-backend-on-ARM.patch [bz#1801242] - kvm-Require-libfdt-1.6.0.patch [bz#1867847] - Resolves: bz#1801242 ([aarch64] vTPM support in machvirt) - Resolves: bz#1843348 (8.3 machine types for POWER) - Resolves: bz#1867847 ([ppc] virt module 7629: /usr/libexec/qemu-kvm: undefined symbol: fdt_check_full, version LIBFDT_1.2) * Wed Aug 12 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.1.0-2.el8 - kvm-redhat-define-hw_compat_8_2.patch [bz#1853265] - Resolves: bz#1853265 (Forward and backward migration from rhel-av-8.3.0(qemu-kvm-5.0.0) to rhel-av-8.2.1(qemu-kvm-4.2.0) failed with "qemu-kvm: error while loading state for instance 0x0 of device 'spapr'") * Wed Aug 12 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.1.0-1.el8 - Quick changelog fix to reflect the current fixes: - Resolve: bz#1781911 - Resolve: bz#1841529 - Resolve: bz#1842902 - Resolve: bz#1818843 - Resolve: bz#1819292 - Resolve: bz#1801242 * Wed Aug 12 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.1.0-0.el8 - Rebase to 5.1.0 - Resolves: bz#1809650 * Tue Jul 07 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 4.2.0-29.el8 - kvm-virtio-net-fix-removal-of-failover-device.patch [bz#1820120] - Resolves: bz#1820120 (After hotunplugging the vitrio device and netdev, hotunpluging the failover VF will cause qemu core dump) * Sun Jun 28 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 4.2.0-28.el8 - kvm-virtio-blk-Refactor-the-code-that-processes-queued-r.patch [bz#1812765] - kvm-virtio-blk-On-restart-process-queued-requests-in-the.patch [bz#1812765] - kvm-Fix-use-afte-free-in-ip_reass-CVE-2020-1983.patch [bz#1838082] - Resolves: bz#1812765 (qemu with iothreads enabled crashes on resume after enospc pause for disk extension) - Resolves: bz#1838082 (CVE-2020-1983 virt:8.2/qemu-kvm: QEMU: slirp: use-after-free in ip_reass() function in ip_input.c [rhel-av-8]) * Thu Jun 18 2020 Eduardo Lima (Etrunko) <elima@redhat.com> - 4.2.0-27.el8 - kvm-hw-pci-pcie-Move-hot-plug-capability-check-to-pre_pl.patch [bz#1820531] - kvm-spec-Fix-python-shenigans-for-tests.patch [bz#1845779] - kvm-target-i386-Add-ARCH_CAPABILITIES-related-bits-into-.patch [bz#1840342] - Resolves: bz#1820531 (qmp command query-pci get wrong result after hotplug device under hotplug=off controller) - Resolves: bz#1840342 ([Intel 8.2.1 Bug] qemu-kvm Add ARCH_CAPABILITIES to Icelake-Server cpu model - Fast Train) - Resolves: bz#1845779 (Install 'qemu-kvm-tests' failed as nothing provides /usr/libexec/platform-python3 - virt module 6972) * Wed Jun 17 2020 Eduardo Lima (Etrunko) <elima@redhat.com> - 4.2.0-26.el8 - kvm-nbd-server-Avoid-long-error-message-assertions-CVE-2.patch [bz#1845384] - kvm-block-Call-attention-to-truncation-of-long-NBD-expor.patch [bz#1845384] - Resolves: bz#1845384 (CVE-2020-10761 virt:8.2/qemu-kvm: QEMU: nbd: reachable assertion failure in nbd_negotiate_send_rep_verr via remote client [rhel-av-8]) * Tue Jun 09 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 4.2.0-25.el8 - kvm-enable-ramfb.patch [bz#1841068] - kvm-block-Add-flags-to-BlockDriver.bdrv_co_truncate.patch [bz#1780574] - kvm-block-Add-flags-to-bdrv-_co-_truncate.patch [bz#1780574] - kvm-block-backend-Add-flags-to-blk_truncate.patch [bz#1780574] - kvm-qcow2-Support-BDRV_REQ_ZERO_WRITE-for-truncate.patch [bz#1780574] - kvm-raw-format-Support-BDRV_REQ_ZERO_WRITE-for-truncate.patch [bz#1780574] - kvm-file-posix-Support-BDRV_REQ_ZERO_WRITE-for-truncate.patch [bz#1780574] - kvm-block-truncate-Don-t-make-backing-file-data-visible.patch [bz#1780574] - kvm-iotests-Add-qemu_io_log.patch [bz#1780574] - kvm-iotests-Filter-testfiles-out-in-filter_img_info.patch [bz#1780574] - kvm-iotests-Test-committing-to-short-backing-file.patch [bz#1780574] - kvm-qcow2-Forward-ZERO_WRITE-flag-for-full-preallocation.patch [bz#1780574] - kvm-i386-Add-MSR-feature-bit-for-MDS-NO.patch [bz#1769912] - kvm-i386-Add-macro-for-stibp.patch [bz#1769912] - kvm-target-i386-Add-new-bit-definitions-of-MSR_IA32_ARCH.patch [bz#1769912] - kvm-i386-Add-new-CPU-model-Cooperlake.patch [bz#1769912] - kvm-target-i386-Add-missed-features-to-Cooperlake-CPU-mo.patch [bz#1769912] - Resolves: bz#1769912 ([Intel 8.2.1 Feature] introduce Cooper Lake cpu model - qemu-kvm Fast Train) - Resolves: bz#1780574 (Data corruption with resizing short overlay over longer backing files) - Resolves: bz#1841068 (RFE: please support the "ramfb" display device model) * Mon Jun 08 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 4.2.0-24.el8 - kvm-target-i386-set-the-CPUID-level-to-0x14-on-old-machi.patch [bz#1513681] - kvm-block-curl-HTTP-header-fields-allow-whitespace-aroun.patch [bz#1841038] - kvm-block-curl-HTTP-header-field-names-are-case-insensit.patch [bz#1841038] - kvm-MAINTAINERS-fix-qcow2-bitmap.c-under-Dirty-Bitmaps-h.patch [bz#1779893 bz#1779904] - kvm-iotests-Let-_make_test_img-parse-its-parameters.patch [bz#1779893 bz#1779904] - kvm-qemu_img-add-cvtnum_full-to-print-error-reports.patch [bz#1779893 bz#1779904] - kvm-block-Make-it-easier-to-learn-which-BDS-support-bitm.patch [bz#1779893 bz#1779904] - kvm-blockdev-Promote-several-bitmap-functions-to-non-sta.patch [bz#1779893 bz#1779904] - kvm-blockdev-Split-off-basic-bitmap-operations-for-qemu-.patch [bz#1779893 bz#1779904] - kvm-qemu-img-Add-bitmap-sub-command.patch [bz#1779893 bz#1779904] - kvm-iotests-Fix-test-178.patch [bz#1779893 bz#1779904] - kvm-qcow2-Expose-bitmaps-size-during-measure.patch [bz#1779893 bz#1779904] - kvm-qemu-img-Factor-out-code-for-merging-bitmaps.patch [bz#1779893 bz#1779904] - kvm-qemu-img-Add-convert-bitmaps-option.patch [bz#1779893 bz#1779904] - kvm-iotests-Add-test-291-to-for-qemu-img-bitmap-coverage.patch [bz#1779893 bz#1779904] - kvm-iotests-Add-more-skip_if_unsupported-statements-to-t.patch [bz#1778593] - kvm-iotests-don-t-use-format-for-drive_add.patch [bz#1778593] - kvm-iotests-055-refactor-compressed-backup-to-vmdk.patch [bz#1778593] - kvm-iotests-055-skip-vmdk-target-tests-if-vmdk-is-not-wh.patch [bz#1778593] - kvm-backup-Improve-error-for-bdrv_getlength-failure.patch [bz#1778593] - kvm-backup-Make-sure-that-source-and-target-size-match.patch [bz#1778593] - kvm-iotests-Backup-with-different-source-target-size.patch [bz#1778593] - kvm-iotests-109-Don-t-mirror-with-mismatched-size.patch [bz#1778593] - kvm-iotests-229-Use-blkdebug-to-inject-an-error.patch [bz#1778593] - kvm-mirror-Make-sure-that-source-and-target-size-match.patch [bz#1778593] - kvm-iotests-Mirror-with-different-source-target-size.patch [bz#1778593] - Resolves: bz#1513681 ([Intel 8.2.1 Feat] qemu-kvm PT VMX -- Fast Train) - Resolves: bz#1778593 (Qemu coredump when backup to a existing small size image) - Resolves: bz#1779893 (RFE: Copy bitmaps with qemu-img convert) - Resolves: bz#1779904 (RFE: ability to estimate bitmap space utilization for qcow2) - Resolves: bz#1841038 (qemu-img: /var/tmp/v2vovl56bced.qcow2: CURL: Error opening file: Server does not support 'range' (byte ranges) with HTTP/2 server in VMware ESXi 7) * Thu Jun 04 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 4.2.0-23.el8 - kvm-target-arm-Fix-PAuth-sbox-functions.patch [bz#1813940] - kvm-Don-t-leak-memory-when-reallocation-fails.patch [bz#1749737] - kvm-Replace-remaining-malloc-free-user-with-glib.patch [bz#1749737] - kvm-Revert-RHEL-disable-hostmem-memfd.patch [bz#1839030] - kvm-block-introducing-bdrv_co_delete_file-interface.patch [bz#1827630] - kvm-block.c-adding-bdrv_co_delete_file.patch [bz#1827630] - kvm-crypto.c-cleanup-created-file-when-block_crypto_co_c.patch [bz#1827630] - Resolves: bz#1749737 (CVE-2019-15890 qemu-kvm: QEMU: Slirp: use-after-free during packet reassembly [rhel-av-8]) - Resolves: bz#1813940 (CVE-2020-10702 virt:8.1/qemu-kvm: qemu: weak signature generation in Pointer Authentication support for ARM [rhel-av-8]) - Resolves: bz#1827630 (volume creation leaving uncleaned stuff behind on error (vol-clone/libvirt/qemu-kvm)) - Resolves: bz#1839030 (RFE: enable the "memfd" memory backend) * Mon May 25 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 4.2.0-22.el8 - kvm-block-always-fill-entire-LUKS-header-space-with-zero.patch [bz#1775462] - kvm-numa-remove-not-needed-check.patch [bz#1600217] - kvm-numa-properly-check-if-numa-is-supported.patch [bz#1600217] - kvm-numa-Extend-CLI-to-provide-initiator-information-for.patch [bz#1600217] - kvm-numa-Extend-CLI-to-provide-memory-latency-and-bandwi.patch [bz#1600217] - kvm-numa-Extend-CLI-to-provide-memory-side-cache-informa.patch [bz#1600217] - kvm-hmat-acpi-Build-Memory-Proximity-Domain-Attributes-S.patch [bz#1600217] - kvm-hmat-acpi-Build-System-Locality-Latency-and-Bandwidt.patch [bz#1600217] - kvm-hmat-acpi-Build-Memory-Side-Cache-Information-Struct.patch [bz#1600217] - kvm-tests-numa-Add-case-for-QMP-build-HMAT.patch [bz#1600217] - kvm-tests-bios-tables-test-add-test-cases-for-ACPI-HMAT.patch [bz#1600217] - kvm-ACPI-add-expected-files-for-HMAT-tests-acpihmat.patch [bz#1600217] - Resolves: bz#1600217 ([Intel 8.2.1 FEAT] KVM ACPI HMAT support - qemu-kvm Fast Train) - Resolves: bz#1775462 (Creating luks-inside-qcow2 images with cluster_size=2k/4k will get a corrupted image) * Mon May 11 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 4.2.0-21.el8 - kvm-hw-pci-pcie-Forbid-hot-plug-if-it-s-disabled-on-the-.patch [bz#1820531] - kvm-hw-pci-pcie-Replace-PCI_DEVICE-casts-with-existing-v.patch [bz#1820531] - kvm-tools-virtiofsd-passthrough_ll-Fix-double-close.patch [bz#1817445] - kvm-virtiofsd-add-rlimit-nofile-NUM-option.patch [bz#1817445] - kvm-virtiofsd-stay-below-fs.file-max-sysctl-value-CVE-20.patch [bz#1817445] - kvm-virtiofsd-jail-lo-proc_self_fd.patch [bz#1817445] - kvm-virtiofsd-Show-submounts.patch [bz#1817445] - kvm-virtiofsd-only-retain-file-system-capabilities.patch [bz#1817445] - kvm-virtiofsd-drop-all-capabilities-in-the-wait-parent-p.patch [bz#1817445] - Resolves: bz#1817445 (CVE-2020-10717 virt:8.2/qemu-kvm: QEMU: virtiofsd: guest may open maximum file descriptor to cause DoS [rhel-av-8]) - Resolves: bz#1820531 (qmp command query-pci get wrong result after hotplug device under hotplug=off controller) * Fri May 01 2020 Jon Maloy <jmaloy@redhat.com> - 4.2.0-20.el8 - kvm-pcie_root_port-Add-hotplug-disabling-option.patch [bz#1790899] - kvm-compat-disable-edid-for-virtio-gpu-ccw.patch [bz#1816793] - Resolves: bz#1790899 ([RFE] QEMU devices should have the option to enable/disable hotplug/unplug) - Resolves: bz#1816793 ('edid' compat handling missing for virtio-gpu-ccw) * Tue Apr 14 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 4.2.0-19.el8_2 - kvm-target-i386-do-not-set-unsupported-VMX-secondary-exe.patch [bz#1822682] - Resolves: bz#1822682 (QEMU-4.2 fails to start a VM on Azure) * Thu Apr 09 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 4.2.0-18.el8_2 - kvm-job-take-each-job-s-lock-individually-in-job_txn_app.patch [bz#1817621] - kvm-replication-assert-we-own-context-before-job_cancel_.patch [bz#1817621] - kvm-backup-don-t-acquire-aio_context-in-backup_clean.patch [bz#1817621] - kvm-block-backend-Reorder-flush-pdiscard-function-defini.patch [bz#1817621] - kvm-block-Increase-BB.in_flight-for-coroutine-and-sync-i.patch [bz#1817621] - kvm-block-Fix-blk-in_flight-during-blk_wait_while_draine.patch [bz#1817621] - Resolves: bz#1817621 (Crash and deadlock with block jobs when using io-threads) * Mon Mar 30 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 4.2.0-17.el8 - kvm-block-pass-BlockDriver-reference-to-the-.bdrv_co_cre.patch [bz#1816007] - kvm-block-trickle-down-the-fallback-image-creation-funct.patch [bz#1816007] - kvm-Revert-mirror-Don-t-let-an-operation-wait-for-itself.patch [bz#1794692] - kvm-mirror-Wait-only-for-in-flight-operations.patch [bz#1794692] - Resolves: bz#1794692 (Mirror block job stops making progress) - Resolves: bz#1816007 (qemu-img convert failed to convert with block device as target) * Tue Mar 24 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 4.2.0-16.el8 - kvm-migration-Rate-limit-inside-host-pages.patch [bz#1814336] - kvm-build-sys-do-not-make-qemu-ga-link-with-pixman.patch [bz#1811670] - Resolves: bz#1811670 (Unneeded qemu-guest-agent dependency on pixman) - Resolves: bz#1814336 ([POWER9] QEMU migration-test triggers a kernel warning) * Tue Mar 17 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 4.2.0-15.el8 - kvm-block-nbd-Fix-hang-in-.bdrv_close.patch [bz#1640894] - kvm-block-Generic-file-creation-fallback.patch [bz#1640894] - kvm-file-posix-Drop-hdev_co_create_opts.patch [bz#1640894] - kvm-iscsi-Drop-iscsi_co_create_opts.patch [bz#1640894] - kvm-iotests-Add-test-for-image-creation-fallback.patch [bz#1640894] - kvm-block-Fix-leak-in-bdrv_create_file_fallback.patch [bz#1640894] - kvm-iotests-Use-complete_and_wait-in-155.patch [bz#1790482 bz#1805143] - kvm-block-Introduce-bdrv_reopen_commit_post-step.patch [bz#1790482 bz#1805143] - kvm-block-qcow2-Move-bitmap-reopen-into-bdrv_reopen_comm.patch [bz#1790482 bz#1805143] - kvm-iotests-Refactor-blockdev-reopen-test-for-iothreads.patch [bz#1790482 bz#1805143] - kvm-block-bdrv_reopen-with-backing-file-in-different-Aio.patch [bz#1790482 bz#1805143] - kvm-block-Versioned-x-blockdev-reopen-API-with-feature-f.patch [bz#1790482 bz#1805143] - kvm-block-Make-bdrv_get_cumulative_perm-public.patch [bz#1790482 bz#1805143] - kvm-block-Relax-restrictions-for-blockdev-snapshot.patch [bz#1790482 bz#1805143] - kvm-iotests-Fix-run_job-with-use_log-False.patch [bz#1790482 bz#1805143] - kvm-iotests-Test-mirror-with-temporarily-disabled-target.patch [bz#1790482 bz#1805143] - kvm-block-Fix-cross-AioContext-blockdev-snapshot.patch [bz#1790482 bz#1805143] - kvm-iotests-Add-iothread-cases-to-155.patch [bz#1790482 bz#1805143] - kvm-qapi-Add-allow-write-only-overlay-feature-for-blockd.patch [bz#1790482 bz#1805143] - kvm-exec-rom_reset-Free-rom-data-during-inmigrate-skip.patch [bz#1809380] - Resolves: bz#1640894 (Fix generic file creation fallback for qemu-img nvme:// image creation support) - Resolves: bz#1790482 (bitmaps in backing images can't be modified) - Resolves: bz#1805143 (allow late/lazy opening of backing chain for shallow blockdev-mirror) - Resolves: bz#1809380 (guest hang during reboot process after migration from RHEl7.8 to RHEL8.2.0.) * Wed Mar 11 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 4.2.0-14.el8 - kvm-hw-smbios-set-new-default-SMBIOS-fields-for-Windows-.patch [bz#1782529] - kvm-migration-multifd-clean-pages-after-filling-packet.patch [bz#1738451] - kvm-migration-Make-sure-that-we-don-t-call-write-in-case.patch [bz#1738451] - kvm-migration-multifd-fix-nullptr-access-in-terminating-.patch [bz#1738451] - kvm-migration-multifd-fix-destroyed-mutex-access-in-term.patch [bz#1738451] - kvm-multifd-Make-sure-that-we-don-t-do-any-IO-after-an-e.patch [bz#1738451] - kvm-qemu-file-Don-t-do-IO-after-shutdown.patch [bz#1738451] - kvm-migration-Don-t-send-data-if-we-have-stopped.patch [bz#1738451] - kvm-migration-Create-migration_is_running.patch [bz#1738451] - kvm-migration-multifd-fix-nullptr-access-in-multifd_send.patch [bz#1738451] - kvm-migration-Maybe-VM-is-paused-when-migration-is-cance.patch [bz#1738451] - kvm-virtiofsd-Remove-fuse_req_getgroups.patch [bz#1797064] - kvm-virtiofsd-fv_create_listen_socket-error-path-socket-.patch [bz#1797064] - kvm-virtiofsd-load_capng-missing-unlock.patch [bz#1797064] - kvm-virtiofsd-do_read-missing-NULL-check.patch [bz#1797064] - kvm-tools-virtiofsd-fuse_lowlevel-Fix-fuse_out_header-er.patch [bz#1797064] - kvm-virtiofsd-passthrough_ll-cleanup-getxattr-listxattr.patch [bz#1797064] - kvm-virtiofsd-Fix-xattr-operations.patch [bz#1797064] - Resolves: bz#1738451 (qemu on src host core dump after set multifd-channels and do migration twice (first migration execute migrate_cancel)) - Resolves: bz#1782529 (Windows Update Enablement with default smbios strings in qemu) - Resolves: bz#1797064 (virtiofsd: Fixes) * Sat Feb 29 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 4.2.0-13.el8 - kvm-target-i386-kvm-initialize-feature-MSRs-very-early.patch [bz#1791648] - kvm-target-i386-add-a-ucode-rev-property.patch [bz#1791648] - kvm-target-i386-kvm-initialize-microcode-revision-from-K.patch [bz#1791648] - kvm-target-i386-fix-TCG-UCODE_REV-access.patch [bz#1791648] - kvm-target-i386-check-for-availability-of-MSR_IA32_UCODE.patch [bz#1791648] - kvm-target-i386-enable-monitor-and-ucode-revision-with-c.patch [bz#1791648] - kvm-qcow2-Fix-qcow2_alloc_cluster_abort-for-external-dat.patch [bz#1703907] - kvm-mirror-Store-MirrorOp.co-for-debuggability.patch [bz#1794692] - kvm-mirror-Don-t-let-an-operation-wait-for-itself.patch [bz#1794692] - Resolves: bz#1703907 ([upstream]QEMU coredump when converting to qcow2: external data file images on block devices with copy_offloading) - Resolves: bz#1791648 ([RFE] Passthrough host CPU microcode version to KVM guest if using CPU passthrough) - Resolves: bz#1794692 (Mirror block job stops making progress) * Mon Feb 24 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 4.2.0-12.el8 - kvm-vhost-user-gpu-Drop-trailing-json-comma.patch [bz#1805334] - Resolves: bz#1805334 (vhost-user/50-qemu-gpu.json is not valid JSON) * Sun Feb 23 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 4.2.0-11.el8 - kvm-spapr-Enable-DD2.3-accelerated-count-cache-flush-in-.patch [bz#1796240] - kvm-util-add-slirp_fmt-helpers.patch [bz#1798994] - kvm-tcp_emu-fix-unsafe-snprintf-usages.patch [bz#1798994] - kvm-virtio-add-ability-to-delete-vq-through-a-pointer.patch [bz#1791590] - kvm-virtio-make-virtio_delete_queue-idempotent.patch [bz#1791590] - kvm-virtio-reset-region-cache-when-on-queue-deletion.patch [bz#1791590] - kvm-virtio-net-delete-also-control-queue-when-TX-RX-dele.patch [bz#1791590] - Resolves: bz#1791590 ([Q35] No "DEVICE_DELETED" event in qmp after unplug virtio-net-pci device) - Resolves: bz#1796240 (Enable hw accelerated cache-count-flush by default for POWER9 DD2.3 cpus) - Resolves: bz#1798994 (CVE-2020-8608 qemu-kvm: QEMU: Slirp: potential OOB access due to unsafe snprintf() usages [rhel-av-8.2.0]) * Fri Feb 14 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 4.2.0-10.el8 - kvm-i386-Resolve-CPU-models-to-v1-by-default.patch [bz#1779078 bz#1787291 bz#1779078 bz#1779078] - kvm-iotests-Support-job-complete-in-run_job.patch [bz#1781637] - kvm-iotests-Create-VM.blockdev_create.patch [bz#1781637] - kvm-block-Activate-recursively-even-for-already-active-n.patch [bz#1781637] - kvm-hmp-Allow-using-qdev-ID-for-qemu-io-command.patch [bz#1781637] - kvm-iotests-Test-external-snapshot-with-VM-state.patch [bz#1781637] - kvm-iotests.py-Let-wait_migration-wait-even-more.patch [bz#1781637] - kvm-blockdev-fix-coding-style-issues-in-drive_backup_pre.patch [bz#1745606 bz#1746217 bz#1773517 bz#1779036 bz#1782111 bz#1782175 bz#1783965] - kvm-blockdev-unify-qmp_drive_backup-and-drive-backup-tra.patch [bz#1745606 bz#1746217 bz#1773517 bz#1779036 bz#1782111 bz#1782175 bz#1783965] - kvm-blockdev-unify-qmp_blockdev_backup-and-blockdev-back.patch [bz#1745606 bz#1746217 bz#1773517 bz#1779036 bz#1782111 bz#1782175 bz#1783965] - kvm-blockdev-honor-bdrv_try_set_aio_context-context-requ.patch [bz#1745606 bz#1746217 bz#1773517 bz#1779036 bz#1782111 bz#1782175 bz#1783965] - kvm-backup-top-Begin-drain-earlier.patch [bz#1745606 bz#1746217 bz#1773517 bz#1779036 bz#1782111 bz#1782175 bz#1783965] - kvm-block-backup-top-Don-t-acquire-context-while-droppin.patch [bz#1745606 bz#1746217 bz#1773517 bz#1779036 bz#1782111 bz#1782175 bz#1783965] - kvm-blockdev-Acquire-AioContext-on-dirty-bitmap-function.patch [bz#1745606 bz#1746217 bz#1773517 bz#1779036 bz#1782111 bz#1782175 bz#1783965] - kvm-blockdev-Return-bs-to-the-proper-context-on-snapshot.patch [bz#1745606 bz#1746217 bz#1773517 bz#1779036 bz#1782111 bz#1782175 bz#1783965] - kvm-iotests-Test-handling-of-AioContexts-with-some-block.patch [bz#1745606 bz#1746217 bz#1773517 bz#1779036 bz#1782111 bz#1782175 bz#1783965] - kvm-target-arm-monitor-query-cpu-model-expansion-crashed.patch [bz#1801320] - kvm-docs-arm-cpu-features-Make-kvm-no-adjvtime-comment-c.patch [bz#1801320] - Resolves: bz#1745606 (Qemu hang when do incremental live backup in transaction mode without bitmap) - Resolves: bz#1746217 (Src qemu hang when do storage vm migration during guest installation) - Resolves: bz#1773517 (Src qemu hang when do storage vm migration with dataplane enable) - Resolves: bz#1779036 (Qemu coredump when do snapshot in transaction mode with one snapshot path not exist) - Resolves: bz#1779078 (RHVH 4.4: Failed to run VM on 4.3/4.4 engine (Exit message: the CPU is incompatible with host CPU: Host CPU does not provide required features: hle, rtm)) - Resolves: bz#1781637 (qemu crashed when do mem and disk snapshot) - Resolves: bz#1782111 (Qemu hang when do full backup on multi-disks with one job's 'job-id' missed in transaction mode(data plane enable)) - Resolves: bz#1782175 (Qemu core dump when add persistent bitmap(data plane enable)) - Resolves: bz#1783965 (Qemu core dump when do backup with sync: bitmap and no bitmap provided) - Resolves: bz#1787291 (RHVH 4.4: Failed to run VM on 4.3/4.4 engine (Exit message: the CPU is incompatible with host CPU: Host CPU does not provide required features: hle, rtm) [rhel-8.1.0.z]) - Resolves: bz#1801320 (aarch64: backport query-cpu-model-expansion and adjvtime document fixes) * Mon Feb 10 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 4.2.0-9.el8 - kvm-ppc-Deassert-the-external-interrupt-pin-in-KVM-on-re.patch [bz#1776638] - kvm-xics-Don-t-deassert-outputs.patch [bz#1776638] - kvm-ppc-Don-t-use-CPUPPCState-irq_input_state-with-moder.patch [bz#1776638] - kvm-trace-update-qemu-trace-stap-to-Python-3.patch [bz#1787395] - kvm-redhat-Remove-redundant-fix-for-qemu-trace-stap.patch [bz#1787395] - kvm-iscsi-Cap-block-count-from-GET-LBA-STATUS-CVE-2020-1.patch [bz#1794503] - kvm-tpm-ppi-page-align-PPI-RAM.patch [bz#1787444] - kvm-target-arm-kvm-trivial-Clean-up-header-documentation.patch [bz#1647366] - kvm-target-arm-kvm64-kvm64-cpus-have-timer-registers.patch [bz#1647366] - kvm-tests-arm-cpu-features-Check-feature-default-values.patch [bz#1647366] - kvm-target-arm-kvm-Implement-virtual-time-adjustment.patch [bz#1647366] - kvm-target-arm-cpu-Add-the-kvm-no-adjvtime-CPU-property.patch [bz#1647366] - kvm-migration-Define-VMSTATE_INSTANCE_ID_ANY.patch [bz#1529231] - kvm-migration-Change-SaveStateEntry.instance_id-into-uin.patch [bz#1529231] - kvm-apic-Use-32bit-APIC-ID-for-migration-instance-ID.patch [bz#1529231] - Resolves: bz#1529231 ([q35] VM hangs after migration with 200 vCPUs) - Resolves: bz#1647366 (aarch64: Add support for the kvm-no-adjvtime ARM CPU feature) - Resolves: bz#1776638 (Guest failed to boot up after system_reset 20 times) - Resolves: bz#1787395 (qemu-trace-stap list : TypeError: startswith first arg must be bytes or a tuple of bytes, not str) - Resolves: bz#1787444 (Broken postcopy migration with vTPM device) - Resolves: bz#1794503 (CVE-2020-1711 qemu-kvm: QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server [rhel-av-8.2.0]) * Fri Jan 31 2020 Miroslav Rezanina <mrezanin@redhat.com> - 4.2.0-8.el8 - kvm-target-arm-arch_dump-Add-SVE-notes.patch [bz#1725084] - kvm-vhost-Add-names-to-section-rounded-warning.patch [bz#1779041] - kvm-vhost-Only-align-sections-for-vhost-user.patch [bz#1779041] - kvm-vhost-coding-style-fix.patch [bz#1779041] - kvm-virtio-fs-fix-MSI-X-nvectors-calculation.patch [bz#1694164] - kvm-vhost-user-fs-remove-vhostfd-property.patch [bz#1694164] - kvm-build-rename-CONFIG_LIBCAP-to-CONFIG_LIBCAP_NG.patch [bz#1694164] - kvm-virtiofsd-Pull-in-upstream-headers.patch [bz#1694164] - kvm-virtiofsd-Pull-in-kernel-s-fuse.h.patch [bz#1694164] - kvm-virtiofsd-Add-auxiliary-.c-s.patch [bz#1694164] - kvm-virtiofsd-Add-fuse_lowlevel.c.patch [bz#1694164] - kvm-virtiofsd-Add-passthrough_ll.patch [bz#1694164] - kvm-virtiofsd-Trim-down-imported-files.patch [bz#1694164] - kvm-virtiofsd-Format-imported-files-to-qemu-style.patch [bz#1694164] - kvm-virtiofsd-remove-mountpoint-dummy-argument.patch [bz#1694164] - kvm-virtiofsd-remove-unused-notify-reply-support.patch [bz#1694164] - kvm-virtiofsd-Remove-unused-enum-fuse_buf_copy_flags.patch [bz#1694164] - kvm-virtiofsd-Fix-fuse_daemonize-ignored-return-values.patch [bz#1694164] - kvm-virtiofsd-Fix-common-header-and-define-for-QEMU-buil.patch [bz#1694164] - kvm-virtiofsd-Trim-out-compatibility-code.patch [bz#1694164] - kvm-vitriofsd-passthrough_ll-fix-fallocate-ifdefs.patch [bz#1694164] - kvm-virtiofsd-Make-fsync-work-even-if-only-inode-is-pass.patch [bz#1694164] - kvm-virtiofsd-Add-options-for-virtio.patch [bz#1694164] - kvm-virtiofsd-add-o-source-PATH-to-help-output.patch [bz#1694164] - kvm-virtiofsd-Open-vhost-connection-instead-of-mounting.patch [bz#1694164] - kvm-virtiofsd-Start-wiring-up-vhost-user.patch [bz#1694164] - kvm-virtiofsd-Add-main-virtio-loop.patch [bz#1694164] - kvm-virtiofsd-get-set-features-callbacks.patch [bz#1694164] - kvm-virtiofsd-Start-queue-threads.patch [bz#1694164] - kvm-virtiofsd-Poll-kick_fd-for-queue.patch [bz#1694164] - kvm-virtiofsd-Start-reading-commands-from-queue.patch [bz#1694164] - kvm-virtiofsd-Send-replies-to-messages.patch [bz#1694164] - kvm-virtiofsd-Keep-track-of-replies.patch [bz#1694164] - kvm-virtiofsd-Add-Makefile-wiring-for-virtiofsd-contrib.patch [bz#1694164] - kvm-virtiofsd-Fast-path-for-virtio-read.patch [bz#1694164] - kvm-virtiofsd-add-fd-FDNUM-fd-passing-option.patch [bz#1694164] - kvm-virtiofsd-make-f-foreground-the-default.patch [bz#1694164] - kvm-virtiofsd-add-vhost-user.json-file.patch [bz#1694164] - kvm-virtiofsd-add-print-capabilities-option.patch [bz#1694164] - kvm-virtiofs-Add-maintainers-entry.patch [bz#1694164] - kvm-virtiofsd-passthrough_ll-create-new-files-in-caller-.patch [bz#1694164] - kvm-virtiofsd-passthrough_ll-add-lo_map-for-ino-fh-indir.patch [bz#1694164] - kvm-virtiofsd-passthrough_ll-add-ino_map-to-hide-lo_inod.patch [bz#1694164] - kvm-virtiofsd-passthrough_ll-add-dirp_map-to-hide-lo_dir.patch [bz#1694164] - kvm-virtiofsd-passthrough_ll-add-fd_map-to-hide-file-des.patch [bz#1694164] - kvm-virtiofsd-passthrough_ll-add-fallback-for-racy-ops.patch [bz#1694164] - kvm-virtiofsd-validate-path-components.patch [bz#1694164] - kvm-virtiofsd-Plumb-fuse_bufvec-through-to-do_write_buf.patch [bz#1694164] - kvm-virtiofsd-Pass-write-iov-s-all-the-way-through.patch [bz#1694164] - kvm-virtiofsd-add-fuse_mbuf_iter-API.patch [bz#1694164] - kvm-virtiofsd-validate-input-buffer-sizes-in-do_write_bu.patch [bz#1694164] - kvm-virtiofsd-check-input-buffer-size-in-fuse_lowlevel.c.patch [bz#1694164] - kvm-virtiofsd-prevent-.-escape-in-lo_do_lookup.patch [bz#1694164] - kvm-virtiofsd-prevent-.-escape-in-lo_do_readdir.patch [bz#1694164] - kvm-virtiofsd-use-proc-self-fd-O_PATH-file-descriptor.patch [bz#1694164] - kvm-virtiofsd-sandbox-mount-namespace.patch [bz#1694164] - kvm-virtiofsd-move-to-an-empty-network-namespace.patch [bz#1694164] - kvm-virtiofsd-move-to-a-new-pid-namespace.patch [bz#1694164] - kvm-virtiofsd-add-seccomp-whitelist.patch [bz#1694164] - kvm-virtiofsd-Parse-flag-FUSE_WRITE_KILL_PRIV.patch [bz#1694164] - kvm-virtiofsd-cap-ng-helpers.patch [bz#1694164] - kvm-virtiofsd-Drop-CAP_FSETID-if-client-asked-for-it.patch [bz#1694164] - kvm-virtiofsd-set-maximum-RLIMIT_NOFILE-limit.patch [bz#1694164] - kvm-virtiofsd-fix-libfuse-information-leaks.patch [bz#1694164] - kvm-virtiofsd-add-syslog-command-line-option.patch [bz#1694164] - kvm-virtiofsd-print-log-only-when-priority-is-high-enoug.patch [bz#1694164] - kvm-virtiofsd-Add-ID-to-the-log-with-FUSE_LOG_DEBUG-leve.patch [bz#1694164] - kvm-virtiofsd-Add-timestamp-to-the-log-with-FUSE_LOG_DEB.patch [bz#1694164] - kvm-virtiofsd-Handle-reinit.patch [bz#1694164] - kvm-virtiofsd-Handle-hard-reboot.patch [bz#1694164] - kvm-virtiofsd-Kill-threads-when-queues-are-stopped.patch [bz#1694164] - kvm-vhost-user-Print-unexpected-slave-message-types.patch [bz#1694164] - kvm-contrib-libvhost-user-Protect-slave-fd-with-mutex.patch [bz#1694164] - kvm-virtiofsd-passthrough_ll-add-renameat2-support.patch [bz#1694164] - kvm-virtiofsd-passthrough_ll-disable-readdirplus-on-cach.patch [bz#1694164] - kvm-virtiofsd-passthrough_ll-control-readdirplus.patch [bz#1694164] - kvm-virtiofsd-rename-unref_inode-to-unref_inode_lolocked.patch [bz#1694164] - kvm-virtiofsd-fail-when-parent-inode-isn-t-known-in-lo_d.patch [bz#1694164] - kvm-virtiofsd-extract-root-inode-init-into-setup_root.patch [bz#1694164] - kvm-virtiofsd-passthrough_ll-clean-up-cache-related-opti.patch [bz#1694164] - kvm-virtiofsd-passthrough_ll-use-hashtable.patch [bz#1694164] - kvm-virtiofsd-Clean-up-inodes-on-destroy.patch [bz#1694164] - kvm-virtiofsd-support-nanosecond-resolution-for-file-tim.patch [bz#1694164] - kvm-virtiofsd-fix-error-handling-in-main.patch [bz#1694164] - kvm-virtiofsd-cleanup-allocated-resource-in-se.patch [bz#1694164] - kvm-virtiofsd-fix-memory-leak-on-lo.source.patch [bz#1694164] - kvm-virtiofsd-add-helper-for-lo_data-cleanup.patch [bz#1694164] - kvm-virtiofsd-Prevent-multiply-running-with-same-vhost_u.patch [bz#1694164] - kvm-virtiofsd-enable-PARALLEL_DIROPS-during-INIT.patch [bz#1694164] - kvm-virtiofsd-fix-incorrect-error-handling-in-lo_do_look.patch [bz#1694164] - kvm-Virtiofsd-fix-memory-leak-on-fuse-queueinfo.patch [bz#1694164] - kvm-virtiofsd-Support-remote-posix-locks.patch [bz#1694164] - kvm-virtiofsd-use-fuse_lowlevel_is_virtio-in-fuse_sessio.patch [bz#1694164] - kvm-virtiofsd-prevent-fv_queue_thread-vs-virtio_loop-rac.patch [bz#1694164] - kvm-virtiofsd-make-lo_release-atomic.patch [bz#1694164] - kvm-virtiofsd-prevent-races-with-lo_dirp_put.patch [bz#1694164] - kvm-virtiofsd-rename-inode-refcount-to-inode-nlookup.patch [bz#1694164] - kvm-libvhost-user-Fix-some-memtable-remap-cases.patch [bz#1694164] - kvm-virtiofsd-passthrough_ll-fix-refcounting-on-remove-r.patch [bz#1694164] - kvm-virtiofsd-introduce-inode-refcount-to-prevent-use-af.patch [bz#1694164] - kvm-virtiofsd-do-not-always-set-FUSE_FLOCK_LOCKS.patch [bz#1694164] - kvm-virtiofsd-convert-more-fprintf-and-perror-to-use-fus.patch [bz#1694164] - kvm-virtiofsd-Reset-O_DIRECT-flag-during-file-open.patch [bz#1694164] - kvm-virtiofsd-Fix-data-corruption-with-O_APPEND-write-in.patch [bz#1694164] - kvm-virtiofsd-passthrough_ll-Use-cache_readdir-for-direc.patch [bz#1694164] - kvm-virtiofsd-add-definition-of-fuse_buf_writev.patch [bz#1694164] - kvm-virtiofsd-use-fuse_buf_writev-to-replace-fuse_buf_wr.patch [bz#1694164] - kvm-virtiofsd-process-requests-in-a-thread-pool.patch [bz#1694164] - kvm-virtiofsd-prevent-FUSE_INIT-FUSE_DESTROY-races.patch [bz#1694164] - kvm-virtiofsd-fix-lo_destroy-resource-leaks.patch [bz#1694164] - kvm-virtiofsd-add-thread-pool-size-NUM-option.patch [bz#1694164] - kvm-virtiofsd-Convert-lo_destroy-to-take-the-lo-mutex-lo.patch [bz#1694164] - kvm-virtiofsd-passthrough_ll-Pass-errno-to-fuse_reply_er.patch [bz#1694164] - kvm-virtiofsd-stop-all-queue-threads-on-exit-in-virtio_l.patch [bz#1694164] - kvm-virtiofsd-add-some-options-to-the-help-message.patch [bz#1694164] - kvm-redhat-ship-virtiofsd-vhost-user-device-backend.patch [bz#1694164] - Resolves: bz#1694164 (virtio-fs: host<->guest shared file system (qemu)) - Resolves: bz#1725084 (aarch64: support dumping SVE registers) - Resolves: bz#1779041 (netkvm: no connectivity Windows guest with q35 + hugepages + vhost + hv_synic) * Tue Jan 21 2020 Miroslav Rezanina <mrezanin@redhat.com> - 4.2.0-7.el8 - kvm-tcp_emu-Fix-oob-access.patch [bz#1791568] - kvm-slirp-use-correct-size-while-emulating-IRC-commands.patch [bz#1791568] - kvm-slirp-use-correct-size-while-emulating-commands.patch [bz#1791568] - kvm-RHEL-hw-i386-disable-nested-PERF_GLOBAL_CTRL-MSR-sup.patch [bz#1559846] - Resolves: bz#1559846 (Nested KVM: limit VMX features according to CPU models - Fast Train) - Resolves: bz#1791568 (CVE-2020-7039 qemu-kvm: QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() [rhel-av-8.2.0])
/usr/lib/.build-id /usr/lib/.build-id/da /usr/lib/.build-id/da/fa6916fe000a6b36e295c81d1349b6927b4c99 /usr/lib64/qemu-kvm/hw-usb-redirect.so
Generated by rpm2html 1.8.1
Fabrice Bellet, Wed Nov 13 07:19:42 2024