Wed, 27 Nov 2024 10:15:02 CST | login

Information for build qemu-kvm-6.2.0-11.el9_0.3

ID22339
Package Nameqemu-kvm
Version6.2.0
Release11.el9_0.3
Epoch17
DraftFalse
Sourcegit+https://git.cclinux.org/stage/rpms/qemu-kvm.git#210699cc1bea36a6c08e4d198bb411b98e022f9f
SummaryQEMU is a machine emulator and virtualizer
Descriptionqemu-kvm is an open source virtualizer that provides hardware emulation for the KVM hypervisor. qemu-kvm acts as a virtual machine monitor together with the KVM kernel modules, and emulates the hardware for a full system such as a PC and its associated peripherals.
Built bydistrobuild
State complete
Volume DEFAULT
StartedFri, 19 Aug 2022 20:41:42 CST
CompletedFri, 19 Aug 2022 20:50:03 CST
Taskbuild (dist-circle9_0-updates, /stage/rpms/qemu-kvm.git:210699cc1bea36a6c08e4d198bb411b98e022f9f)
Extra{'source': {'original_url': 'git+https://git.cclinux.org/stage/rpms/qemu-kvm.git?#210699cc1bea36a6c08e4d198bb411b98e022f9f'}}
Tags
dist-circle9-compose
dist-circle9-updates
RPMs
src
qemu-kvm-6.2.0-11.el9_0.3.src.rpm (info) (download)
aarch64
qemu-guest-agent-6.2.0-11.el9_0.3.aarch64.rpm (info) (download)
qemu-img-6.2.0-11.el9_0.3.aarch64.rpm (info) (download)
qemu-kvm-6.2.0-11.el9_0.3.aarch64.rpm (info) (download)
qemu-kvm-audio-pa-6.2.0-11.el9_0.3.aarch64.rpm (info) (download)
qemu-kvm-block-curl-6.2.0-11.el9_0.3.aarch64.rpm (info) (download)
qemu-kvm-block-rbd-6.2.0-11.el9_0.3.aarch64.rpm (info) (download)
qemu-kvm-block-ssh-6.2.0-11.el9_0.3.aarch64.rpm (info) (download)
qemu-kvm-common-6.2.0-11.el9_0.3.aarch64.rpm (info) (download)
qemu-kvm-core-6.2.0-11.el9_0.3.aarch64.rpm (info) (download)
qemu-kvm-device-display-virtio-gpu-6.2.0-11.el9_0.3.aarch64.rpm (info) (download)
qemu-kvm-device-display-virtio-gpu-gl-6.2.0-11.el9_0.3.aarch64.rpm (info) (download)
qemu-kvm-device-display-virtio-gpu-pci-6.2.0-11.el9_0.3.aarch64.rpm (info) (download)
qemu-kvm-device-display-virtio-gpu-pci-gl-6.2.0-11.el9_0.3.aarch64.rpm (info) (download)
qemu-kvm-device-usb-host-6.2.0-11.el9_0.3.aarch64.rpm (info) (download)
qemu-kvm-docs-6.2.0-11.el9_0.3.aarch64.rpm (info) (download)
qemu-kvm-tests-6.2.0-11.el9_0.3.aarch64.rpm (info) (download)
qemu-kvm-tools-6.2.0-11.el9_0.3.aarch64.rpm (info) (download)
qemu-pr-helper-6.2.0-11.el9_0.3.aarch64.rpm (info) (download)
qemu-guest-agent-debuginfo-6.2.0-11.el9_0.3.aarch64.rpm (info) (download)
qemu-img-debuginfo-6.2.0-11.el9_0.3.aarch64.rpm (info) (download)
qemu-kvm-audio-pa-debuginfo-6.2.0-11.el9_0.3.aarch64.rpm (info) (download)
qemu-kvm-block-curl-debuginfo-6.2.0-11.el9_0.3.aarch64.rpm (info) (download)
qemu-kvm-block-rbd-debuginfo-6.2.0-11.el9_0.3.aarch64.rpm (info) (download)
qemu-kvm-block-ssh-debuginfo-6.2.0-11.el9_0.3.aarch64.rpm (info) (download)
qemu-kvm-common-debuginfo-6.2.0-11.el9_0.3.aarch64.rpm (info) (download)
qemu-kvm-core-debuginfo-6.2.0-11.el9_0.3.aarch64.rpm (info) (download)
qemu-kvm-debuginfo-6.2.0-11.el9_0.3.aarch64.rpm (info) (download)
qemu-kvm-debugsource-6.2.0-11.el9_0.3.aarch64.rpm (info) (download)
qemu-kvm-device-display-virtio-gpu-debuginfo-6.2.0-11.el9_0.3.aarch64.rpm (info) (download)
qemu-kvm-device-display-virtio-gpu-gl-debuginfo-6.2.0-11.el9_0.3.aarch64.rpm (info) (download)
qemu-kvm-device-display-virtio-gpu-pci-debuginfo-6.2.0-11.el9_0.3.aarch64.rpm (info) (download)
qemu-kvm-device-display-virtio-gpu-pci-gl-debuginfo-6.2.0-11.el9_0.3.aarch64.rpm (info) (download)
qemu-kvm-device-usb-host-debuginfo-6.2.0-11.el9_0.3.aarch64.rpm (info) (download)
qemu-kvm-tests-debuginfo-6.2.0-11.el9_0.3.aarch64.rpm (info) (download)
qemu-kvm-tools-debuginfo-6.2.0-11.el9_0.3.aarch64.rpm (info) (download)
qemu-pr-helper-debuginfo-6.2.0-11.el9_0.3.aarch64.rpm (info) (download)
ppc64le
qemu-guest-agent-6.2.0-11.el9_0.3.ppc64le.rpm (info) (download)
qemu-img-6.2.0-11.el9_0.3.ppc64le.rpm (info) (download)
qemu-guest-agent-debuginfo-6.2.0-11.el9_0.3.ppc64le.rpm (info) (download)
qemu-img-debuginfo-6.2.0-11.el9_0.3.ppc64le.rpm (info) (download)
qemu-kvm-debuginfo-6.2.0-11.el9_0.3.ppc64le.rpm (info) (download)
qemu-kvm-debugsource-6.2.0-11.el9_0.3.ppc64le.rpm (info) (download)
s390x
qemu-guest-agent-6.2.0-11.el9_0.3.s390x.rpm (info) (download)
qemu-img-6.2.0-11.el9_0.3.s390x.rpm (info) (download)
qemu-kvm-6.2.0-11.el9_0.3.s390x.rpm (info) (download)
qemu-kvm-audio-pa-6.2.0-11.el9_0.3.s390x.rpm (info) (download)
qemu-kvm-block-curl-6.2.0-11.el9_0.3.s390x.rpm (info) (download)
qemu-kvm-block-rbd-6.2.0-11.el9_0.3.s390x.rpm (info) (download)
qemu-kvm-block-ssh-6.2.0-11.el9_0.3.s390x.rpm (info) (download)
qemu-kvm-common-6.2.0-11.el9_0.3.s390x.rpm (info) (download)
qemu-kvm-core-6.2.0-11.el9_0.3.s390x.rpm (info) (download)
qemu-kvm-device-display-virtio-gpu-6.2.0-11.el9_0.3.s390x.rpm (info) (download)
qemu-kvm-device-display-virtio-gpu-ccw-6.2.0-11.el9_0.3.s390x.rpm (info) (download)
qemu-kvm-device-display-virtio-gpu-gl-6.2.0-11.el9_0.3.s390x.rpm (info) (download)
qemu-kvm-device-usb-host-6.2.0-11.el9_0.3.s390x.rpm (info) (download)
qemu-kvm-docs-6.2.0-11.el9_0.3.s390x.rpm (info) (download)
qemu-kvm-tests-6.2.0-11.el9_0.3.s390x.rpm (info) (download)
qemu-kvm-tools-6.2.0-11.el9_0.3.s390x.rpm (info) (download)
qemu-pr-helper-6.2.0-11.el9_0.3.s390x.rpm (info) (download)
qemu-guest-agent-debuginfo-6.2.0-11.el9_0.3.s390x.rpm (info) (download)
qemu-img-debuginfo-6.2.0-11.el9_0.3.s390x.rpm (info) (download)
qemu-kvm-audio-pa-debuginfo-6.2.0-11.el9_0.3.s390x.rpm (info) (download)
qemu-kvm-block-curl-debuginfo-6.2.0-11.el9_0.3.s390x.rpm (info) (download)
qemu-kvm-block-rbd-debuginfo-6.2.0-11.el9_0.3.s390x.rpm (info) (download)
qemu-kvm-block-ssh-debuginfo-6.2.0-11.el9_0.3.s390x.rpm (info) (download)
qemu-kvm-common-debuginfo-6.2.0-11.el9_0.3.s390x.rpm (info) (download)
qemu-kvm-core-debuginfo-6.2.0-11.el9_0.3.s390x.rpm (info) (download)
qemu-kvm-debuginfo-6.2.0-11.el9_0.3.s390x.rpm (info) (download)
qemu-kvm-debugsource-6.2.0-11.el9_0.3.s390x.rpm (info) (download)
qemu-kvm-device-display-virtio-gpu-ccw-debuginfo-6.2.0-11.el9_0.3.s390x.rpm (info) (download)
qemu-kvm-device-display-virtio-gpu-debuginfo-6.2.0-11.el9_0.3.s390x.rpm (info) (download)
qemu-kvm-device-display-virtio-gpu-gl-debuginfo-6.2.0-11.el9_0.3.s390x.rpm (info) (download)
qemu-kvm-device-usb-host-debuginfo-6.2.0-11.el9_0.3.s390x.rpm (info) (download)
qemu-kvm-tests-debuginfo-6.2.0-11.el9_0.3.s390x.rpm (info) (download)
qemu-kvm-tools-debuginfo-6.2.0-11.el9_0.3.s390x.rpm (info) (download)
qemu-pr-helper-debuginfo-6.2.0-11.el9_0.3.s390x.rpm (info) (download)
x86_64
qemu-guest-agent-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-img-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-audio-pa-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-block-curl-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-block-rbd-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-block-ssh-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-common-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-core-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-device-display-virtio-gpu-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-device-display-virtio-gpu-gl-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-device-display-virtio-gpu-pci-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-device-display-virtio-gpu-pci-gl-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-device-display-virtio-vga-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-device-display-virtio-vga-gl-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-device-usb-host-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-device-usb-redirect-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-docs-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-tests-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-tools-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-ui-egl-headless-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-ui-opengl-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-pr-helper-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-guest-agent-debuginfo-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-img-debuginfo-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-audio-pa-debuginfo-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-block-curl-debuginfo-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-block-rbd-debuginfo-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-block-ssh-debuginfo-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-common-debuginfo-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-core-debuginfo-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-debuginfo-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-debugsource-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-device-display-virtio-gpu-debuginfo-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-device-display-virtio-gpu-gl-debuginfo-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-device-display-virtio-gpu-pci-debuginfo-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-device-display-virtio-gpu-pci-gl-debuginfo-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-device-display-virtio-vga-debuginfo-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-device-display-virtio-vga-gl-debuginfo-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-device-usb-host-debuginfo-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-device-usb-redirect-debuginfo-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-tests-debuginfo-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-tools-debuginfo-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-ui-egl-headless-debuginfo-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-kvm-ui-opengl-debuginfo-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
qemu-pr-helper-debuginfo-6.2.0-11.el9_0.3.x86_64.rpm (info) (download)
Logs
aarch64
build.log
hw_info.log
installed_pkgs.log
mock_output.log
root.log
state.log
ppc64le
build.log
hw_info.log
installed_pkgs.log
mock_output.log
root.log
state.log
s390x
build.log
hw_info.log
installed_pkgs.log
mock_output.log
root.log
state.log
x86_64
build.log
hw_info.log
installed_pkgs.log
mock_output.log
root.log
state.log
Changelog * Mon May 09 2022 Miroslav Rezanina <mrezanin@redhat.com> - 6.2.0-11.el9_0.3 - kvm-RHEL-disable-seqpacket-for-vhost-vsock-device-in-rhe.patch [bz#2071102] - kvm-virtio-net-fix-map-leaking-on-error-during-receive.patch [bz#2075635] - kvm-vhost-vsock-detach-the-virqueue-element-in-case-of-e.patch [bz#2075640] - Resolves: bz#2071102 (RHEL 9.0 guest with vsock device migration failed from RHEL 9.0 > RHEL 8.6 [rhel-9.0.0.z]) - Resolves: bz#2075635 (CVE-2022-26353 qemu-kvm: QEMU: virtio-net: map leaking on error during receive [rhel-9] [rhel-9.0.0.z]) - Resolves: bz#2075640 (CVE-2022-26354 qemu-kvm: QEMU: vhost-vsock: missing virtqueue detach on error can lead to memory leak [rhel-9] [rhel-9.0.0.z]) * Tue Mar 22 2022 <cconte@redhat.com> - 6.2.0-11.el9_0.2 - kvm-pci-expose-TYPE_XIO3130_DOWNSTREAM-name.patch [bz#2053584] - kvm-acpi-pcihp-pcie-set-power-on-cap-on-parent-slot.patch [bz#2053584] - kvm-vmxcap-Add-5-level-EPT-bit.patch [bz#2038051] - kvm-i386-Add-Icelake-Server-v6-CPU-model-with-5-level-EP.patch [bz#2038051] - kvm-acpi-fix-QEMU-crash-when-started-with-SLIC-table.patch [bz#2043531] - kvm-tests-acpi-whitelist-expected-blobs-before-changing-.patch [bz#2043531] - kvm-tests-acpi-add-SLIC-table-test.patch [bz#2043531] - kvm-tests-acpi-SLIC-update-expected-blobs.patch [bz#2043531] - kvm-tests-acpi-manually-pad-OEM_ID-OEM_TABLE_ID-for-test.patch [bz#2043531] - kvm-tests-acpi-whitelist-nvdimm-s-SSDT-and-FACP.slic-exp.patch [bz#2043531] - kvm-acpi-fix-OEM-ID-OEM-Table-ID-padding.patch [bz#2043531] - kvm-tests-acpi-update-expected-blobs.patch [bz#2043531] - kvm-tests-acpi-test-short-OEM_ID-OEM_TABLE_ID-values-in-.patch [bz#2043531] - kvm-rhel-workaround-for-lack-of-binary-patches-in-SRPM.patch [bz#2043531] - Resolves: bz#2053584 (watchdog: BUG: soft lockup - CPU#3 stuck for 22s! [cat:2843]) - Resolves: bz#2038051 (Win11 (q35+edk2) guest broke after install wsl2 through 'wsl --install -d Ubuntu-20.04') - Resolves: bz#2043531 (Guest can not start with SLIC acpi table) * Tue Mar 15 2022 Miroslav Rezanina <mrezanin@redhat.com> - 6.2.0-11.el9_0.1 - kvm-RHEL-mark-old-machine-types-as-deprecated.patch [bz#2052050] - kvm-hw-virtio-vdpa-Fix-leak-of-host-notifier-memory-regi.patch [bz#2059786] - kvm-spec-Fix-obsolete-for-spice-subpackages.patch [bz#2059175 bz#2059146] - kvm-spec-Obsolete-old-usb-redir-subpackage.patch [bz#2059175 bz#2059146] - kvm-spec-Obsolete-ssh-driver.patch [bz#2059175 bz#2059146] - Resolves: bz#2052050 (Mark all RHEL-8 and earlier machine types as deprecated) - Resolves: bz#2059786 ([virtual network][rhel9][vDPA] qemu crash after hot unplug vdpa device) - Resolves: bz#2059175 (Broken upgrade path due to qemu-kvm-hw-usbredir rename) - Resolves: bz#2059146 (Missing qemu-kvm-block-ssh obsolete breaks upgrade path) * Tue Mar 01 2022 Miroslav Rezanina <mrezanin@redhat.com> - 6.2.0-11 - kvm-spec-Remove-qemu-virtiofsd.patch [bz#2055284] - Resolves: bz#2055284 (Remove the qemu-virtiofsd subpackage) * Thu Feb 24 2022 Miroslav Rezanina <mrezanin@redhat.com> - 6.2.0-10 - kvm-Revert-ui-clipboard-Don-t-use-g_autoptr-just-to-free.patch [bz#2042820] - kvm-ui-avoid-compiler-warnings-from-unused-clipboard-inf.patch [bz#2042820] - kvm-ui-clipboard-fix-use-after-free-regression.patch [bz#2042820] - kvm-ui-vnc.c-Fixed-a-deadlock-bug.patch [bz#2042820] - kvm-memory-Fix-incorrect-calls-of-log_global_start-stop.patch [bz#2044818] - kvm-memory-Fix-qemu-crash-on-starting-dirty-log-twice-wi.patch [bz#2044818] - Resolves: bz#2042820 (qemu crash when try to copy and paste contents from client to VM) - Resolves: bz#2044818 (Qemu Core Dumped when migrate -> migrate_cancel -> migrate again during guest is paused) * Thu Feb 17 2022 Miroslav Rezanina <mrezanin@redhat.com> - 6.2.0-9 - kvm-block-Lock-AioContext-for-drain_end-in-blockdev-reop.patch [bz#2046659] - kvm-iotests-Test-blockdev-reopen-with-iothreads-and-thro.patch [bz#2046659] - kvm-block-nbd-Delete-reconnect-delay-timer-when-done.patch [bz#2033626] - kvm-block-nbd-Assert-there-are-no-timers-when-closed.patch [bz#2033626] - kvm-iotests.py-Add-QemuStorageDaemon-class.patch [bz#2033626] - kvm-iotests-281-Test-lingering-timers.patch [bz#2033626] - kvm-block-nbd-Move-s-ioc-on-AioContext-change.patch [bz#2033626] - kvm-iotests-281-Let-NBD-connection-yield-in-iothread.patch [bz#2033626] - Resolves: bz#2046659 (qemu crash after execute blockdev-reopen with iothread) - Resolves: bz#2033626 (Qemu core dump when start guest with nbd node or do block jobs to nbd node) * Mon Feb 14 2022 Miroslav Rezanina <mrezanin@redhat.com> - 6.2.0-8 - kvm-numa-Enable-numa-for-SGX-EPC-sections.patch [bz#2033708] - kvm-numa-Support-SGX-numa-in-the-monitor-and-Libvirt-int.patch [bz#2033708] - kvm-doc-Add-the-SGX-numa-description.patch [bz#2033708] - kvm-Enable-SGX-RH-Only.patch [bz#2033708] - kvm-qapi-Cleanup-SGX-related-comments-and-restore-sectio.patch [bz#2033708] - kvm-block-io-Update-BSC-only-if-want_zero-is-true.patch [bz#2041461] - kvm-iotests-block-status-cache-New-test.patch [bz#2041461] - kvm-iotests-Test-qemu-img-convert-of-zeroed-data-cluster.patch [bz#1882917] - kvm-qemu-img-make-is_allocated_sectors-more-efficient.patch [bz#1882917] - kvm-block-backend-prevent-dangling-BDS-pointers-across-a.patch [bz#2040123] - kvm-iotests-stream-error-on-reset-New-test.patch [bz#2040123] - kvm-hw-arm-smmuv3-Fix-device-reset.patch [bz#2042481] - Resolves: bz#2033708 ([Intel 9.0 Feat] qemu-kvm: SGX 1.5 (SGX1 + Flexible Launch Control) support) - Resolves: bz#2041461 (Inconsistent block status reply in qemu-nbd) - Resolves: bz#1882917 (the target image size is incorrect when converting a badly fragmented file) - Resolves: bz#2040123 (Qemu core dumped when do block-stream to a snapshot node on non-enough space storage) - Resolves: bz#2042481 ([aarch64] Launch guest with "default-bus-bypass-iommu=off,iommu=smmuv3" and "iommu_platform=on", guest hangs after system_reset) * Mon Feb 07 2022 Miroslav Rezanina <mrezanin@redhat.com> - 6.2.0-7 - kvm-qemu-storage-daemon-Add-vhost-user-blk-help.patch [bz#1962088] - kvm-qemu-storage-daemon-Fix-typo-in-vhost-user-blk-help.patch [bz#1962088] - kvm-virtiofsd-Drop-membership-of-all-supplementary-group.patch [bz#2046201] - kvm-block-rbd-fix-handling-of-holes-in-.bdrv_co_block_st.patch [bz#2034791] - kvm-block-rbd-workaround-for-ceph-issue-53784.patch [bz#2034791] - Resolves: bz#1962088 ([QSD] wrong help message for the fuse) - Resolves: bz#2046201 (CVE-2022-0358 qemu-kvm: QEMU: virtiofsd: potential privilege escalation via CVE-2018-13405 [rhel-9.0]) - Resolves: bz#2034791 (Booting from Local Snapshot Core Dumped Whose Backing File Is Based on RBD) * Wed Feb 02 2022 Miroslav Rezanina <mrezanin@redhat.com> - 6.2.0-6 - Moving feature support out of qemu-kvm-core to separate packages (can cause loss of functionality when using only qemu-kvm-core - qemu-kvm keeps same feature set). - kvm-spec-Rename-qemu-kvm-hw-usbredir-to-qemu-kvm-device-.patch [bz#2022847] - kvm-spec-Split-qemu-kvm-ui-opengl.patch [bz#2022847] - kvm-spec-Introduce-packages-for-virtio-gpu-modules.patch [bz#2022847] - kvm-spec-Introduce-device-display-virtio-vga-packages.patch [bz#2022847] - kvm-spec-Move-usb-host-module-to-separate-package.patch [bz#2022847] - kvm-spec-Move-qtest-accel-module-to-tests-package.patch [bz#2022847] - kvm-spec-Extend-qemu-kvm-core-description.patch [bz#2022847] - Resolves: bz#2022847 (qemu-kvm: Align package split with Fedora) * Tue Jan 25 2022 Miroslav Rezanina <mrezanin@redhat.com> - 6.2.0-5 - kvm-x86-Add-q35-RHEL-8.6.0-machine-type.patch [bz#1945666] - kvm-x86-Add-q35-RHEL-9.0.0-machine-type.patch [bz#1945666] - kvm-softmmu-fix-device-deletion-events-with-device-JSON-.patch [bz#2036669] - Resolves: bz#1945666 (9.0: x86 machine types) - Resolves: bz#2036669 (DEVICE_DELETED event is not delivered for device frontend if -device is configured via JSON) * Mon Jan 17 2022 Miroslav Rezanina <mrezanin@redhat.com> - 6.2.0-4 - kvm-block-nvme-fix-infinite-loop-in-nvme_free_req_queue_.patch [bz#2024544] - kvm-rhel-machine-types-x86-set-prefer_sockets.patch [bz#2028623] - Resolves: bz#2024544 (Fio workers hangs when running fio with 32 jobs iodepth 32 and QEMU's userspace NVMe driver) - Resolves: bz#2028623 ([9.0] machine types: 6.2: Fix prefer_sockets) * Mon Jan 10 2022 Miroslav Rezanina <mrezanin@redhat.com> - 6.2.0-3 - kvm-hw-arm-virt-Register-iommu-as-a-class-property.patch [bz#2031044] - kvm-hw-arm-virt-Register-its-as-a-class-property.patch [bz#2031044] - kvm-hw-arm-virt-Rename-default_bus_bypass_iommu.patch [bz#2031044] - kvm-hw-arm-virt-Expose-the-RAS-option.patch [bz#2031044] - kvm-hw-arm-virt-Add-9.0-machine-type-and-remove-8.5-one.patch [bz#2031044] - kvm-hw-arm-virt-Check-no_tcg_its-and-minor-style-changes.patch [bz#2031044] - Resolves: bz#2031044 (Add rhel-9.0.0 machine types for RHEL 9.0 [aarch64]) * Fri Jan 07 2022 Miroslav Rezanina <mrezanin@redhat.com> - 6.2.0-2 - kvm-redhat-Add-rhel8.6.0-and-rhel9.0.0-machine-types-for.patch [bz#2008060] - kvm-redhat-Enable-virtio-mem-as-tech-preview-on-x86-64.patch [bz#2014484] - Resolves: bz#2008060 (Fix CPU Model for new IBM Z Hardware - qemu part) - Resolves: bz#2014484 ([RHEL9] Enable virtio-mem as tech-preview on x86-64 - QEMU) * Thu Dec 16 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.2.0-1 - Rebase to QEMU 6.2.0 [bz#2027697] - Resolves: bz#2027697 (Rebase to QEMU 6.2.0) * Wed Nov 24 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.1.0-8 - kvm-Move-ksmtuned-files-to-separate-package.patch [bz#1971678] - Resolves: bz#1971678 (Split out ksmtuned package from qemu-kvm) * Fri Nov 19 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.1.0-7 - kvm-migration-Make-migration-blocker-work-for-snapshots-.patch [bz#1996609] - kvm-migration-Add-migrate_add_blocker_internal.patch [bz#1996609] - kvm-dump-guest-memory-Block-live-migration.patch [bz#1996609] - kvm-spec-Build-the-VDI-block-driver.patch [bz#2013331] - kvm-spec-Explicitly-include-compress-filter.patch [bz#1980035] - Resolves: bz#1996609 (Qemu hit core dump when dump guest memory during live migration) - Resolves: bz#2013331 (RFE: qemu-img cannot convert from vdi format) - Resolves: bz#1980035 (RFE: Enable compress filter so we can create new, compressed qcow2 files via qemu-nbd) * Mon Oct 18 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.1.0-6 - kvm-hw-arm-virt-Add-hw_compat_rhel_8_5-to-8.5-machine-ty.patch [bz#1998942] - Resolves: bz#1998942 (Add machine type compatibility update for 6.1 rebase [aarch64]) * Mon Oct 11 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.1.0-5 - kvm-virtio-balloon-Fix-page-poison-subsection-name.patch [bz#1984401] - kvm-spec-Remove-block-curl-and-block-ssh-dependency.patch [bz#2010985] - Resolves: bz#1984401 (fails to revert snapshot of a VM [balloon/page-poison]) - Resolves: bz#2010985 (Remove dependency on qemu-kvm-block-curl and qemu-kvm-block-ssh [rhel-9.0.0]) * Tue Oct 05 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.1.0-4 - kvm-redhat-Define-hw_compat_rhel_8_5.patch [bz#1998943] - kvm-redhat-Add-s390x-machine-type-compatibility-update-f.patch [bz#1998943] - Resolves: bz#1998943 (Add machine type compatibility update for 6.1 rebase [s390x]) * Fri Sep 24 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.1.0-3 - kvm-disable-sga-device.patch [bz#2000845] - kvm-tools-virtiofsd-Add-fstatfs64-syscall-to-the-seccomp.patch [bz#2005026] - Resolves: bz#2000845 (RFE: Remove SGA, deprecate cirrus, and set defaults for QEMU machine-types in RHEL9) - Resolves: bz#2005026 ([s390][virtio-fs] Umount virtiofs shared folder failure from guest side [rhel-9.0.0]) * Fri Sep 10 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.1.0-2 - kvm-hw-arm-virt-Remove-9.0-machine-type.patch [bz#2002937] - kvm-remove-sgabios-dependency.patch [bz#2000845] - kvm-enable-pulseaudio.patch [bz#1997725] - kvm-spec-disable-use-of-gcrypt-for-crypto-backends-in-fa.patch [bz#1990068] - Resolves: bz#2002937 ([qemu][aarch64] Remove 9.0 machine types in arm virt for 9-Beta) - Resolves: bz#2000845 (RFE: Remove SGA, deprecate cirrus, and set defaults for QEMU machine-types in RHEL9) - Resolves: bz#1997725 (RFE: enable pulseaudio backend on QEMU) - Resolves: bz#1990068 (Disable use of gcrypt for crypto backends in favour of gnutls) * Thu Sep 02 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.1.0-1 - Rebase to QEMU 6.1.0 [bz#1997408] - Resolves: #bz#1997408 (Rebase to QEMU 6.1.0) * Fri Aug 27 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.0.0-13 - kvm-qcow2-Deprecation-warning-when-opening-v2-images-rw.patch [bz#1951814] - kvm-disable-ac97-audio.patch [bz#1995819] - kvm-redhat-Disable-LTO-on-non-x86-architectures.patch [bz#1950192] - kvm-redhat-Enable-the-test-block-iothread-test-again.patch [bz#1950192] - Resolves: bz#1951814 (RFE: Warning when using qcow2-v2 (compat=0.10)) - Resolves: bz#1995819 (RFE: Remove ac97 audio support from QEMU) - Resolves: bz#1950192 (RHEL9: when ioeventfd=off and 8.4guest, (qemu) qemu-kvm: ../util/qemu-coroutine-lock.c:57: qemu_co_queue_wait_impl: Assertion `qemu_in_coroutine()' failed.) * Fri Aug 20 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.0.0-12.el9 - kvm-migration-Move-yank-outside-qemu_start_incoming_migr.patch [bz#1974683] - kvm-migration-Allow-reset-of-postcopy_recover_triggered-.patch [bz#1974683] - kvm-Remove-RHEL-7.0.0-machine-type.patch [bz#1968519] - kvm-Remove-RHEL-7.1.0-machine-type.patch [bz#1968519] - kvm-Remove-RHEL-7.2.0-machine-type.patch [bz#1968519] - kvm-Remove-RHEL-7.3.0-machine-types.patch [bz#1968519] - kvm-Remove-RHEL-7.4.0-machine-types.patch [bz#1968519] - kvm-Remove-RHEL-7.5.0-machine-types.patch [bz#1968519] - kvm-acpi-pc-revert-back-to-v5.2-PCI-slot-enumeration.patch [bz#1957194] - kvm-migration-failover-reset-partially_hotplugged.patch [bz#1957194] - kvm-hmp-Fix-loadvm-to-resume-the-VM-on-success-instead-o.patch [bz#1957194] - kvm-migration-Move-bitmap_mutex-out-of-migration_bitmap_.patch [bz#1957194] - kvm-i386-cpu-Expose-AVX_VNNI-instruction-to-guest.patch [bz#1957194] - kvm-ratelimit-protect-with-a-mutex.patch [bz#1957194] - kvm-Update-Linux-headers-to-5.13-rc4.patch [bz#1957194] - kvm-i386-Add-ratelimit-for-bus-locks-acquired-in-guest.patch [bz#1957194] - kvm-iothread-generalize-iothread_set_param-iothread_get_.patch [bz#1957194] - kvm-iothread-add-aio-max-batch-parameter.patch [bz#1957194] - kvm-linux-aio-limit-the-batch-size-using-aio-max-batch-p.patch [bz#1957194] - kvm-block-nvme-Fix-VFIO_MAP_DMA-failed-No-space-left-on-.patch [bz#1957194] - kvm-migration-move-wait-unplug-loop-to-its-own-function.patch [bz#1957194] - kvm-migration-failover-continue-to-wait-card-unplug-on-e.patch [bz#1957194] - kvm-aarch64-Add-USB-storage-devices.patch [bz#1957194] - kvm-iotests-Improve-and-rename-test-291-to-qemu-img-bitm.patch [bz#1957194] - kvm-qemu-img-Fail-fast-on-convert-bitmaps-with-inconsist.patch [bz#1957194] - kvm-qemu-img-Add-skip-broken-bitmaps-for-convert-bitmaps.patch [bz#1957194] - kvm-audio-Never-send-migration-section.patch [bz#1957194] - kvm-pc-bios-s390-ccw-bootmap-Silence-compiler-warning-fr.patch [bz#1939509 bz#1940132] - kvm-pc-bios-s390-ccw-Use-reset_psw-pointer-instead-of-ha.patch [bz#1939509 bz#1940132] - kvm-pc-bios-s390-ccw-netboot-Use-Wl-prefix-to-pass-param.patch [bz#1939509 bz#1940132] - kvm-pc-bios-s390-ccw-Silence-warning-from-Clang-by-marki.patch [bz#1939509 bz#1940132] - kvm-pc-bios-s390-ccw-Fix-the-cc-option-macro-in-the-Make.patch [bz#1939509 bz#1940132] - kvm-pc-bios-s390-ccw-Silence-GCC-11-stringop-overflow-wa.patch [bz#1939509 bz#1940132] - kvm-pc-bios-s390-ccw-Allow-building-with-Clang-too.patch [bz#1939509 bz#1940132] - kvm-pc-bios-s390-ccw-Fix-inline-assembly-for-older-versi.patch [bz#1939509 bz#1940132] - kvm-configure-Fix-endianess-test-with-LTO.patch [bz#1939509 bz#1940132] - kvm-spec-Switch-toolchain-to-Clang-LLVM.patch [bz#1939509 bz#1940132] - kvm-spec-Use-safe-stack-for-x86_64.patch [bz#1939509 bz#1940132] - kvm-spec-Reenable-write-support-for-VMDK-etc.-in-tools.patch [bz#1989841] - Resolves: bz#1974683 (Fail to set migrate incoming for 2nd time after the first time failed) - Resolves: bz#1968519 (Remove all the old 7.0-7.5 machine types) - Resolves: bz#1957194 (Synchronize RHEL-AV 8.5.0 changes to RHEL 9.0.0 Beta) - Resolves: bz#1939509 (QEMU: enable SafeStack) - Resolves: bz#1940132 (QEMU: switch build toolchain to Clang/LLVM) - Resolves: bz#1989841 (RFE: qemu-img cannot convert images into vmdk and vpc formats) * Tue Aug 10 2021 Mohan Boddu <mboddu@redhat.com> - 17:6.0.0-11.1 - Rebuilt for IMA sigs, glibc 2.34, aarch64 flags Related: rhbz#1991688 * Sat Aug 07 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.0.0-11 - kvm-arm-virt-Register-iommu-as-a-class-property.patch [bz#1838608] - kvm-arm-virt-Register-its-as-a-class-property.patch [bz#1838608] - kvm-arm-virt-Enable-ARM-RAS-support.patch [bz#1838608] - kvm-block-Fix-in_flight-leak-in-request-padding-error-pa.patch [bz#1972079] - kvm-spec-Remove-buildldflags.patch [bz#1973029] - kvm-spec-Use-make_build-macro.patch [bz#1973029] - kvm-spec-Drop-make-install-sharedir-and-datadir-usage.patch [bz#1973029] - kvm-spec-use-make_install-macro.patch [bz#1973029] - kvm-spec-parallelize-make-check.patch [bz#1973029] - kvm-spec-Drop-explicit-build-id.patch [bz#1973029] - kvm-spec-use-build_ldflags.patch [bz#1973029] - kvm-Move-virtiofsd-to-separate-package.patch [bz#1979728] - kvm-Utilize-firmware-configure-option.patch [bz#1980139] - Resolves: bz#1838608 (aarch64: Enable ARMv8 RAS virtualization support) - Resolves: bz#1972079 (Windows Installation blocked on 4k disk when using blk+raw+iothread) - Resolves: bz#1973029 (Spec file cleanups) - Resolves: bz#1979728 (Split out virtiofsd subpackage) - Resolves: bz#1980139 (Use configure --firmwarepath more) * Sun Jul 25 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.0.0-10 - kvm-s390x-css-Introduce-an-ESW-struct.patch [bz#1957194] - kvm-s390x-css-Split-out-the-IRB-sense-data.patch [bz#1957194] - kvm-s390x-css-Refactor-IRB-construction.patch [bz#1957194] - kvm-s390x-css-Add-passthrough-IRB.patch [bz#1957194] - kvm-vhost-user-blk-Fail-gracefully-on-too-large-queue-si.patch [bz#1957194] - kvm-vhost-user-blk-Make-sure-to-set-Error-on-realize-fai.patch [bz#1957194] - kvm-vhost-user-blk-Don-t-reconnect-during-initialisation.patch [bz#1957194] - kvm-vhost-user-blk-Improve-error-reporting-in-realize.patch [bz#1957194] - kvm-vhost-user-blk-Get-more-feature-flags-from-vhost-dev.patch [bz#1957194] - kvm-virtio-Fail-if-iommu_platform-is-requested-but-unsup.patch [bz#1957194] - kvm-vhost-user-blk-Check-that-num-queues-is-supported-by.patch [bz#1957194] - kvm-vhost-user-Fix-backends-without-multiqueue-support.patch [bz#1957194] - kvm-file-posix-fix-max_iov-for-dev-sg-devices.patch [bz#1957194] - kvm-scsi-generic-pass-max_segments-via-max_iov-field-in-.patch [bz#1957194] - kvm-osdep-provide-ROUND_DOWN-macro.patch [bz#1957194] - kvm-block-backend-align-max_transfer-to-request-alignmen.patch [bz#1957194] - kvm-block-add-max_hw_transfer-to-BlockLimits.patch [bz#1957194] - kvm-file-posix-try-BLKSECTGET-on-block-devices-too-do-no.patch [bz#1957194] - kvm-block-Add-option-to-use-driver-whitelist-even-in-too.patch [bz#1957782] - kvm-spec-Restrict-block-drivers-in-tools.patch [bz#1957782] - kvm-Move-tools-to-separate-package.patch [bz#1972285] - kvm-Split-qemu-pr-helper-to-separate-package.patch [bz#1972300] - kvm-spec-RPM_BUILD_ROOT-buildroot.patch [bz#1973029] - kvm-spec-More-use-of-name-instead-of-qemu-kvm.patch [bz#1973029] - kvm-spec-Use-qemu-pr-helper.service-from-qemu.git.patch [bz#1973029] - kvm-spec-Use-_sourcedir-for-referencing-sources.patch [bz#1973029] - kvm-spec-Add-tools_only.patch [bz#1973029] - kvm-spec-build-Add-run_configure-helper.patch [bz#1973029] - kvm-spec-build-Disable-more-bits-with-disable_everything.patch [bz#1973029] - kvm-spec-build-Add-macros-for-some-configure-parameters.patch [bz#1973029] - kvm-spec-files-Move-qemu-guest-agent-and-qemu-img-earlie.patch [bz#1973029] - kvm-spec-install-Remove-redundant-bits.patch [bz#1973029] - kvm-spec-install-Add-modprobe_kvm_conf-macro.patch [bz#1973029] - kvm-spec-install-Remove-qemu-guest-agent-etc-qemu-kvm-us.patch [bz#1973029] - kvm-spec-install-clean-up-qemu-ga-section.patch [bz#1973029] - kvm-spec-install-Use-a-single-tools_only-section.patch [bz#1973029] - kvm-spec-Make-tools_only-not-cross-spec-sections.patch [bz#1973029] - kvm-spec-install-Limit-time-spent-in-qemu_kvm_build.patch [bz#1973029] - kvm-spec-misc-syntactic-merges-with-Fedora.patch [bz#1973029] - kvm-spec-Use-Fedora-s-pattern-for-specifying-rc-version.patch [bz#1973029] - kvm-spec-files-don-t-use-fine-grained-docs-file-list.patch [bz#1973029] - kvm-spec-files-Add-licenses-to-qemu-common-too.patch [bz#1973029] - kvm-spec-install-Drop-python3-shebang-fixup.patch [bz#1973029] - Resolves: bz#1957194 (Synchronize RHEL-AV 8.5.0 changes to RHEL 9.0.0 Beta) - Resolves: bz#1957782 (VMDK support should be read-only) - Resolves: bz#1972285 (Split out a qemu-kvm-tools subpackage) - Resolves: bz#1972300 (Split out a qemu-pr-helper subpackage) - Resolves: bz#1973029 (Spec file cleanups) * Mon Jul 19 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.0.0-9 - kvm-s390x-cpumodel-add-3931-and-3932.patch [bz#1932191] - kvm-spapr-Fix-EEH-capability-issue-on-KVM-guest-for-PCI-.patch [bz#1957194] - kvm-ppc-pef.c-initialize-cgs-ready-in-kvmppc_svm_init.patch [bz#1957194] - kvm-redhat-Move-qemu-kvm-docs-dependency-to-qemu-kvm.patch [bz#1957194] - kvm-redhat-introducting-qemu-kvm-hw-usbredir.patch [bz#1957194] - kvm-redhat-use-the-standard-vhost-user-JSON-path.patch [bz#1957194] - Resolves: bz#1932191 ([IBM 9.0 FEAT] CPU Model for new IBM Z Hardware - qemu part (kvm)) - Resolves: bz#1957194 (Synchronize RHEL-AV 8.5.0 changes to RHEL 9.0.0 Beta) * Mon Jul 12 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.0.0-8 - kvm-Disable-TPM-passthrough.patch [bz#1978911] - kvm-redhat-Replace-the-kvm-setup.service-with-a-etc-modu.patch [bz#1978837] - Resolves: bz#1978911 (Remove TPM Passthrough option from RHEL 9) - Resolves: bz#1978837 (Remove/replace kvm-setup.service) * Mon Jun 28 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.0.0-7 - kvm-aarch64-rh-devices-add-CONFIG_PXB.patch [bz#1967502] - kvm-virtio-gpu-handle-partial-maps-properly.patch [bz#1974795] - kvm-x86-Add-x86-rhel8.5-machine-types.patch [bz#1957194] - kvm-redhat-x86-Enable-kvm-asyncpf-int-by-default.patch [bz#1957194] - kvm-block-backend-add-drained_poll.patch [bz#1957194] - kvm-nbd-server-Use-drained-block-ops-to-quiesce-the-serv.patch [bz#1957194] - kvm-disable-CONFIG_USB_STORAGE_BOT.patch [bz#1957194] - kvm-doc-Fix-some-mistakes-in-the-SEV-documentation.patch [bz#1957194] - kvm-docs-Add-SEV-ES-documentation-to-amd-memory-encrypti.patch [bz#1957194] - kvm-docs-interop-firmware.json-Add-SEV-ES-support.patch [bz#1957194] - kvm-qga-drop-StandardError-syslog.patch [bz#1947977] - kvm-Remove-iscsi-support.patch [bz#1967133] - Resolves: bz#1967502 ([aarch64] [qemu] Compile the PCIe expander bridge) - Resolves: bz#1974795 ([RHEL9-beta] [aarch64] Launch guest with virtio-gpu-pci and virtual smmu causes "virtio_gpu_dequeue_ctrl_func" ERROR) - Resolves: bz#1957194 (Synchronize RHEL-AV 8.5.0 changes to RHEL 9.0.0 Beta) - Resolves: bz#1947977 (remove StandardError=syslog from qemu-guest-agent.service) - Resolves: bz#1967133 (QEMU: disable libiscsi in RHEL-9) * Mon Jun 21 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.0.0-6 - kvm-yank-Unregister-function-when-using-TLS-migration.patch [bz#1972462] - kvm-pc-bios-s390-ccw-don-t-try-to-read-the-next-block-if.patch [bz#1957194] - kvm-redhat-Install-the-s390-netboot.img-that-we-ve-built.patch [bz#1957194] - kvm-sockets-update-SOCKET_ADDRESS_TYPE_FD-listen-2-backl.patch [bz#1957194] - kvm-target-i386-sev-add-support-to-query-the-attestation.patch [bz#1957194] - kvm-spapr-Don-t-hijack-current_machine-boot_order.patch [bz#1957194] - kvm-target-i386-Add-CPU-model-versions-supporting-xsaves.patch [bz#1957194] - kvm-spapr-Remove-stale-comment-about-power-saving-LPCR-b.patch [bz#1957194] - kvm-spapr-Set-LPCR-to-current-AIL-mode-when-starting-a-n.patch [bz#1957194] - Specfile cleanup [bz#1973029] - Resolves: bz#1972462 (QEMU core dump when doing TLS migration via TCP) - Resolves: bz#1957194 (Synchronize RHEL-AV 8.5.0 changes to RHEL 9.0.0 Beta) - Resolves: bz#1973029 (Spec file cleanups) * Tue Jun 08 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.0.0-5 - kvm-arm-virt-Register-highmem-and-gic-version-as-class-p.patch [bz#1952449] - kvm-hw-arm-virt-Add-8.5-and-9.0-machine-types-and-remove.patch [bz#1952449] - kvm-aarch64-rh-devices-add-CONFIG_PVPANIC_PCI.patch [bz#1747467] - kvm-spec-Do-not-build-qemu-kvm-block-gluster.patch [bz#1964795] - kvm-spec-Do-not-link-pcnet-and-ne2k_pci-roms.patch [bz#1965961] - kvm-redhat-s390x-add-rhel-8.5.0-compat-machine.patch [bz#1957194] - kvm-redhat-add-missing-entries-in-hw_compat_rhel_8_4.patch [bz#1957194] - kvm-redhat-Define-pseries-rhel8.5.0-machine-type.patch [bz#1957194] - kvm-virtio-net-failover-add-missing-remove_migration_sta.patch [bz#1957194] - kvm-hw-arm-virt-Disable-PL011-clock-migration-through-hw.patch [bz#1957194] - kvm-virtio-blk-Fix-rollback-path-in-virtio_blk_data_plan.patch [bz#1957194] - kvm-virtio-blk-Configure-all-host-notifiers-in-a-single-.patch [bz#1957194] - kvm-virtio-scsi-Set-host-notifiers-and-callbacks-separat.patch [bz#1957194] - kvm-virtio-scsi-Configure-all-host-notifiers-in-a-single.patch [bz#1957194] - kvm-hw-arm-smmuv3-Another-range-invalidation-fix.patch [bz#1957194] - Resolves: bz#1952449 ([aarch64] define RHEL9 machine types) - Resolves: bz#1747467 ([aarch64] [qemu] PVPANIC support) - Resolves: bz#1964795 (Remove qemu-kvm-block-gluster package) - Resolves: bz#1965961 (Remove links to not build roms) - Resolves: bz#1957194 (Synchronize RHEL-AV 8.5.0 changes to RHEL 9.0.0 Beta) * Mon May 31 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.0.0-4 - kvm-s390x-redhat-disable-experimental-3270-device.patch - Resolves: bz#1962479 (Disable the 'x-terminal3270' device in qemu-kvm on s390x) * Tue May 25 2021 Miroslav Reznaina <mrezanin@redhat.com> - 6.0.0-3 - kvm-hw-s390x-Remove-the-RHEL7-only-machine-type.patch [bz#1944730] - Resolves: bz#1944730 (Remove RHEL7 machine type (s390-ccw-virtio-rhel7.5.0)) * Thu May 13 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.0.0-2 - kvm-Remove-message-with-running-VM-count.patch [bz#1914461] - kvm-Remove-SPICE-and-QXL-from-x86_64-rh-devices.mak.patch [bz#1906168] - kvm-spec-file-build-qemu-kvm-without-SPICE-and-QXL.patch [bz#1906168] - kvm-spec-file-Obsolete-qemu-kvm-ui-spice.patch [bz#1906168] - Resolves: bz#1914461 (Remove KVM guest count and limit info message) - Resolves: bz#1906168 ([RHEL-9] qemu-kvm spec-file: Do not BuildRequire spice) * Fri Apr 30 2021 Miroslav Rezanina <mrezanin@redhat.com> - 6.0.0-1 - Rebase to QEMU 6.0 - Resolves: bz#1872569 * Mon Apr 26 2021 Miroslav Rezanina <mrezanin@redhat.com> - 5.2.0-16 - kvm-Limit-build-on-Power-to-qemu-img-and-qemu-ga-only.patch [bz#1944056] - Resolves: bz#1944056 (Do not build qemu-kvm for Power) * Fri Apr 16 2021 Mohan Boddu <mboddu@redhat.com> - 15:5.2.0-15 - Rebuilt for RHEL 9 BETA on Apr 15th 2021. Related: rhbz#1947937 * Sat Mar 20 2021 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.2.0-14.el8 - kvm-vhost-user-blk-fix-blkcfg-num_queues-endianness.patch [bz#1937004] - kvm-block-export-fix-blk_size-double-byteswap.patch [bz#1937004] - kvm-block-export-use-VIRTIO_BLK_SECTOR_BITS.patch [bz#1937004] - kvm-block-export-fix-vhost-user-blk-export-sector-number.patch [bz#1937004] - kvm-block-export-port-virtio-blk-discard-write-zeroes-in.patch [bz#1937004] - kvm-block-export-port-virtio-blk-read-write-range-check.patch [bz#1937004] - kvm-spec-ui-spice-sub-package.patch [bz#1936373] - kvm-spec-ui-opengl-sub-package.patch [bz#1936373] - Resolves: bz#1937004 (vhost-user-blk server endianness and input validation fixes) - Resolves: bz#1936373 (move spice & opengl modules to rpm subpackages) * Tue Mar 16 2021 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.2.0-13.el8 - kvm-i386-acpi-restore-device-paths-for-pre-5.1-vms.patch [bz#1934158] - Resolves: bz#1934158 (Windows guest looses network connectivity when NIC was configured with static IP) * Mon Mar 15 2021 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.2.0-12.el8 - kvm-scsi-disk-move-scsi_handle_rw_error-earlier.patch [bz#1927530] - kvm-scsi-disk-do-not-complete-requests-early-for-rerror-.patch [bz#1927530] - kvm-scsi-introduce-scsi_sense_from_errno.patch [bz#1927530] - kvm-scsi-disk-pass-SCSI-status-to-scsi_handle_rw_error.patch [bz#1927530] - kvm-scsi-disk-pass-guest-recoverable-errors-through-even.patch [bz#1927530] - kvm-hw-intc-arm_gic-Fix-interrupt-ID-in-GICD_SGIR-regist.patch [bz#1936948] - Resolves: bz#1927530 (RHEL8 Hypervisor - OVIRT - Issues seen on a virtualization guest with direct passthrough LUNS pausing when a host gets a Thin threshold warning) - Resolves: bz#1936948 (CVE-2021-20221 virt:av/qemu-kvm: qemu: out-of-bound heap buffer access via an interrupt ID field [rhel-av-8.4.0]) * Mon Mar 08 2021 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.2.0-11.el8 - kvm-qxl-set-qxl.ssd.dcl.con-on-secondary-devices.patch [bz#1932190] - kvm-qxl-also-notify-the-rendering-is-done-when-skipping-.patch [bz#1932190] - kvm-virtiofsd-Save-error-code-early-at-the-failure-calls.patch [bz#1935071] - kvm-virtiofs-drop-remapped-security.capability-xattr-as-.patch [bz#1935071] - Resolves: bz#1932190 (Timeout when dump the screen from 2nd VGA) - Resolves: bz#1935071 (CVE-2021-20263 virt:8.4/qemu-kvm: QEMU: virtiofsd: 'security.capabilities' is not dropped with xattrmap option [rhel-av-8]) * Wed Mar 03 2021 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.2.0-10.el8 - kvm-migration-dirty-bitmap-Use-struct-for-alias-map-inne.patch [bz#1930757] - kvm-migration-dirty-bitmap-Allow-control-of-bitmap-persi.patch [bz#1930757] - kvm-qemu-iotests-300-Add-test-case-for-modifying-persist.patch [bz#1930757] - kvm-failover-fix-indentantion.patch [bz#1819991] - kvm-failover-Use-always-atomics-for-primary_should_be_hi.patch [bz#1819991] - kvm-failover-primary-bus-is-only-used-once-and-where-it-.patch [bz#1819991] - kvm-failover-Remove-unused-parameter.patch [bz#1819991] - kvm-failover-Remove-external-partially_hotplugged-proper.patch [bz#1819991] - kvm-failover-qdev_device_add-returns-err-or-dev-set.patch [bz#1819991] - kvm-failover-Rename-bool-to-failover_primary_hidden.patch [bz#1819991] - kvm-failover-g_strcmp0-knows-how-to-handle-NULL.patch [bz#1819991] - kvm-failover-Remove-primary_device_opts.patch [bz#1819991] - kvm-failover-remove-standby_id-variable.patch [bz#1819991] - kvm-failover-Remove-primary_device_dict.patch [bz#1819991] - kvm-failover-Remove-memory-leak.patch [bz#1819991] - kvm-failover-simplify-virtio_net_find_primary.patch [bz#1819991] - kvm-failover-should_be_hidden-should-take-a-bool.patch [bz#1819991] - kvm-failover-Rename-function-to-hide_device.patch [bz#1819991] - kvm-failover-virtio_net_connect_failover_devices-does-no.patch [bz#1819991] - kvm-failover-Rename-to-failover_find_primary_device.patch [bz#1819991] - kvm-failover-simplify-qdev_device_add-failover-case.patch [bz#1819991] - kvm-failover-simplify-qdev_device_add.patch [bz#1819991] - kvm-failover-make-sure-that-id-always-exist.patch [bz#1819991] - kvm-failover-remove-failover_find_primary_device-error-p.patch [bz#1819991] - kvm-failover-split-failover_find_primary_device_id.patch [bz#1819991] - kvm-failover-We-don-t-need-to-cache-primary_device_id-an.patch [bz#1819991] - kvm-failover-Caller-of-this-two-functions-already-have-p.patch [bz#1819991] - kvm-failover-simplify-failover_unplug_primary.patch [bz#1819991] - kvm-failover-Remove-primary_dev-member.patch [bz#1819991] - kvm-virtio-net-add-missing-object_unref.patch [bz#1819991] - kvm-x86-cpu-Populate-SVM-CPUID-feature-bits.patch [bz#1926785] - kvm-i386-Add-the-support-for-AMD-EPYC-3rd-generation-pro.patch [bz#1926785] - Resolves: bz#1930757 (Allow control of block-dirty-bitmap persistence via 'block-bitmap-mapping') - Resolves: bz#1819991 (Hostdev type interface with net failover enabled exists in domain xml and doesn't reattach to host after hot-unplug) - Resolves: bz#1926785 ([RFE] AMD Milan - Add KVM/support for EPYC-Milan CPU Model - Fast Train) * Mon Mar 01 2021 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.2.0-9.el8 - kvm-docs-generate-qemu-storage-daemon-qmp-ref-7-man-page.patch [bz#1901323] - kvm-docs-add-qemu-storage-daemon-1-man-page.patch [bz#1901323] - kvm-docs-Add-qemu-storage-daemon-1-manpage-to-meson.buil.patch [bz#1901323] - kvm-qemu-storage-daemon-Enable-object-add.patch [bz#1901323] - kvm-spec-Package-qemu-storage-daemon.patch [bz#1901323] - kvm-default-configs-Enable-vhost-user-blk.patch [bz#1930033] - kvm-qemu-nbd-Use-SOMAXCONN-for-socket-listen-backlog.patch [bz#1925345] - kvm-pcie-don-t-set-link-state-active-if-the-slot-is-empt.patch [bz#1917654] - Resolves: bz#1901323 (QSD (QEMU Storage Daemon): basic support - TechPreview) - Resolves: bz#1930033 (enable vhost-user-blk device) - Resolves: bz#1925345 (qemu-nbd needs larger backlog for Unix socket listen()) - Resolves: bz#1917654 ([failover vf migration][RHEL84 vm] After start a vm with a failover vf + a failover virtio net device, the failvoer vf do not exist in the vm) * Fri Feb 19 2021 Eduardo Lima (Etrunko) <elima@redhat.com> - 5.2.0-8.el8 - kvm-block-nbd-only-detach-existing-iochannel-from-aio_co.patch [bz#1887883] - kvm-block-nbd-only-enter-connection-coroutine-if-it-s-pr.patch [bz#1887883] - kvm-nbd-make-nbd_read-return-EIO-on-error.patch [bz#1887883] - kvm-virtio-move-use-disabled-flag-property-to-hw_compat_.patch [bz#1907255] - kvm-virtiofsd-extract-lo_do_open-from-lo_open.patch [bz#1920740] - kvm-virtiofsd-optionally-return-inode-pointer-from-lo_do.patch [bz#1920740] - kvm-virtiofsd-prevent-opening-of-special-files-CVE-2020-.patch [bz#1920740] - kvm-spapr-Adjust-firmware-path-of-PCI-devices.patch [bz#1920941] - kvm-pci-reject-too-large-ROMs.patch [bz#1917830] - kvm-pci-add-romsize-property.patch [bz#1917830] - kvm-redhat-Add-some-devices-for-exporting-upstream-machi.patch [bz#1917826] - kvm-vhost-Check-for-valid-vdev-in-vhost_backend_handle_i.patch [bz#1880299] - Resolves: bz#1887883 (qemu blocks client progress with various NBD actions) - Resolves: bz#1907255 (Migrate failed with vhost-vsock-pci from RHEL-AV 8.3.1 to RHEL-AV 8.2.1) - Resolves: bz#1920740 (CVE-2020-35517 virt:8.4/qemu-kvm: QEMU: virtiofsd: potential privileged host device access from guest [rhel-av-8.4.0]) - Resolves: bz#1920941 ([ppc64le] [AV]--disk cdimage.iso,bus=usb fails to boot) - Resolves: bz#1917830 (Add romsize property to qemu-kvm) - Resolves: bz#1917826 (Add extra device support to qemu-kvm, but not to rhel machine types) - Resolves: bz#1880299 (vhost-user mq connection fails to restart after kill host testpmd which acts as vhost-user client) * Fri Feb 12 2021 Eduardo Lima (Etrunko) <elima@redhat.com> - 5.2.0-7.el8 - kvm-virtio-Add-corresponding-memory_listener_unregister-.patch [bz#1903521] - kvm-block-Honor-blk_set_aio_context-context-requirements.patch [bz#1918966 bz#1918968] - kvm-nbd-server-Quiesce-coroutines-on-context-switch.patch [bz#1918966 bz#1918968] - kvm-block-Avoid-processing-BDS-twice-in-bdrv_set_aio_con.patch [bz#1918966 bz#1918968] - kvm-storage-daemon-Call-bdrv_close_all-on-exit.patch [bz#1918966 bz#1918968] - kvm-block-move-blk_exp_close_all-to-qemu_cleanup.patch [bz#1918966 bz#1918968] - Resolves: bz#1903521 (hot unplug vhost-user cause qemu crash: qemu-kvm: ../softmmu/memory.c:2818: do_address_space_destroy: Assertion `QTAILQ_EMPTY(&as->listeners)' failed.) - Resolves: bz#1918966 ([incremental_backup] qemu aborts if guest reboot during backup when using virtio-blk: "aio_co_schedule: Co-routine was already scheduled in 'aio_co_schedule'") - Resolves: bz#1918968 ([incremental_backup] qemu deadlock after poweroff in guest during backup in nbd_export_close_all()) * Tue Feb 09 2021 Eduardo Lima (Etrunko) <elima@redhat.com> - 5.2.0-6.el8 - kvm-scsi-fix-device-removal-race-vs-IO-restart-callback-.patch [bz#1854811] - kvm-tracetool-also-strip-l-and-ll-from-systemtap-format-.patch [bz#1907264] - kvm-redhat-moving-all-documentation-files-to-qemu-kvm-do.patch [bz#1881170 bz#1924766] - kvm-hw-arm-smmuv3-Fix-addr_mask-for-range-based-invalida.patch [bz#1834152] - kvm-redhat-makes-qemu-respect-system-s-crypto-profile.patch [bz#1902219] - kvm-vhost-Unbreak-SMMU-and-virtio-iommu-on-dev-iotlb-sup.patch [bz#1925028] - kvm-docs-set-CONFDIR-when-running-sphinx.patch [bz#1902537] - Resolves: bz#1854811 (scsi-bus.c: use-after-free due to race between device unplug and I/O operation causes guest crash) - Resolves: bz#1907264 (systemtap: invalid or missing conversion specifier at the trace event vhost_vdpa_set_log_base) - Resolves: bz#1881170 (split documentation from the qemu-kvm-core package to its own subpackage) - Resolves: bz#1924766 (split documentation from the qemu-kvm-core package to its own subpackage [av-8.4.0]) - Resolves: bz#1834152 ([aarch64] QEMU SMMUv3 device: Support range invalidation) - Resolves: bz#1902219 (QEMU doesn't honour system crypto policies) - Resolves: bz#1925028 (vsmmuv3/vhost and virtio-iommu/vhost regression) - Resolves: bz#1902537 (The default fsfreeze-hook path from man page and qemu-ga --help command are different) * Tue Feb 02 2021 Eduardo Lima (Etrunko) <elima@redhat.com> - 5.2.0-5.el8 - kvm-spapr-Allow-memory-unplug-to-always-succeed.patch [bz#1914069] - kvm-spapr-Improve-handling-of-memory-unplug-with-old-gue.patch [bz#1914069] - kvm-x86-cpu-Add-AVX512_FP16-cpu-feature.patch [bz#1838738] - kvm-q35-Increase-max_cpus-to-710-on-pc-q35-rhel8-machine.patch [bz#1904268] - kvm-config-enable-VFIO_CCW.patch [bz#1922170] - Resolves: bz#1914069 ([ppc64le] have this fix for rhel8.4 av (spapr: Allow memory unplug to always succeed)) - Resolves: bz#1838738 ([Intel 8.4 FEAT] qemu-kvm Sapphire Rapids (SPR) New Instructions (NIs) - Fast Train) - Resolves: bz#1904268 ([RFE] [HPEMC] qemu-kvm: support up to 710 VCPUs) - Resolves: bz#1922170 (Enable vfio-ccw in AV) * Wed Jan 27 2021 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.2.0-4.el8 - kvm-Drop-bogus-IPv6-messages.patch [bz#1918061] - Resolves: bz#1918061 (CVE-2020-10756 virt:rhel/qemu-kvm: QEMU: slirp: networking out-of-bounds read information disclosure vulnerability [rhel-av-8]) * Mon Jan 18 2021 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.2.0-3.el8 - kvm-block-nvme-Implement-fake-truncate-coroutine.patch [bz#1848834] - kvm-spec-find-system-python-via-meson.patch [bz#1899619] - kvm-build-system-use-b_staticpic-false.patch [bz#1899619] - kvm-spapr-Fix-buffer-overflow-in-spapr_numa_associativit.patch [bz#1908693] - kvm-usb-hcd-xhci-pci-Fixup-capabilities-ordering-again.patch [bz#1912846] - kvm-qga-commands-posix-Send-CCW-address-on-s390x-with-th.patch [bz#1755075] - kvm-AArch64-machine-types-cleanup.patch [bz#1895276] - kvm-hw-arm-virt-Add-8.4-Machine-type.patch [bz#1895276] - kvm-udev-kvm-check-remove-the-exceeded-subscription-limi.patch [bz#1914463] - kvm-memory-Rename-memory_region_notify_one-to-memory_reg.patch [bz#1845758] - kvm-memory-Add-IOMMUTLBEvent.patch [bz#1845758] - kvm-memory-Add-IOMMU_NOTIFIER_DEVIOTLB_UNMAP-IOMMUTLBNot.patch [bz#1845758] - kvm-intel_iommu-Skip-page-walking-on-device-iotlb-invali.patch [bz#1845758] - kvm-memory-Skip-bad-range-assertion-if-notifier-is-DEVIO.patch [bz#1845758] - kvm-RHEL-Switch-pvpanic-test-to-q35.patch [bz#1885555] - kvm-8.4-x86-machine-type.patch [bz#1885555] - kvm-memory-clamp-cached-translation-in-case-it-points-to.patch [bz#1904392] - Resolves: bz#1848834 (Failed to create luks format image on NVMe device) - Resolves: bz#1899619 (QEMU 5.2 is built with PIC objects instead of PIE) - Resolves: bz#1908693 ([ppc64le]boot up a guest with 128 numa nodes ,qemu got coredump) - Resolves: bz#1912846 (qemu-kvm: Failed to load xhci:parent_obj during migration) - Resolves: bz#1755075 ([qemu-guest-agent] fsinfo doesn't return disk info on s390x) - Resolves: bz#1895276 (Machine types update for aarch64 for QEMU 5.2.0) - Resolves: bz#1914463 (Remove KVM guest count and limit info message) - Resolves: bz#1845758 (qemu core dumped: qemu-kvm: /builddir/build/BUILD/qemu-4.2.0/memory.c:1928: memory_region_notify_one: Assertion `entry->iova >= notifier->start && entry_end <= notifier->end' failed.) - Resolves: bz#1885555 (8.4 machine types for x86) - Resolves: bz#1904392 (CVE-2020-27821 virt:8.4/qemu-kvm: QEMU: heap buffer overflow in msix_table_mmio_write() in hw/pci/msix.c [rhel-av-8]) * Tue Dec 15 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.2.0-2.el8 - kvm-redhat-Define-hw_compat_8_3.patch [bz#1893935] - kvm-redhat-Add-spapr_machine_rhel_default_class_options.patch [bz#1893935] - kvm-redhat-Define-pseries-rhel8.4.0-machine-type.patch [bz#1893935] - kvm-redhat-s390x-add-rhel-8.4.0-compat-machine.patch [bz#1836282] - Resolves: bz#1836282 (New machine type for qemu-kvm on s390x in RHEL-AV) - Resolves: bz#1893935 (New machine type on RHEL-AV 8.4 for ppc64le) * Wed Dec 09 2020 Miroslav Rezanina <mrezanin@redhat.com> - 5.2.0-1.el8 - Rebase to QEMU 5.2.0 [bz#1905933] - Resolves: bz#1905933 (Rebase qemu-kvm to version 5.2.0) * Tue Dec 01 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.1.0-16.el8 - kvm-redhat-introduces-disable_everything-macro-into-the-.patch [bz#1884611] - kvm-redhat-scripts-extract_build_cmd.py-Avoid-listing-em.patch [bz#1884611] - kvm-redhat-Removing-unecessary-configurations.patch [bz#1884611] - kvm-redhat-Fixing-rh-local-build.patch [bz#1884611] - kvm-redhat-allow-Makefile-rh-prep-builddep-to-fail.patch [bz#1884611] - kvm-redhat-adding-rh-rpm-target.patch [bz#1884611] - kvm-redhat-move-shareable-files-from-qemu-kvm-core-to-qe.patch [bz#1884611] - kvm-redhat-Add-qemu-kiwi-subpackage.patch [bz#1884611] - Resolves: bz#1884611 (Build kata-specific version of qemu) * Mon Nov 16 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.1.0-15.el8 - kvm-redhat-add-un-pre-install-systemd-hooks-for-qemu-ga.patch [bz#1882719] - kvm-rcu-Implement-drain_call_rcu.patch [bz#1812399 bz#1866707] - kvm-libqtest-Rename-qmp_assert_error_class-to-qmp_expect.patch [bz#1812399 bz#1866707] - kvm-qtest-rename-qtest_qmp_receive-to-qtest_qmp_receive_.patch [bz#1812399 bz#1866707] - kvm-qtest-Reintroduce-qtest_qmp_receive-with-QMP-event-b.patch [bz#1812399 bz#1866707] - kvm-qtest-remove-qtest_qmp_receive_success.patch [bz#1812399 bz#1866707] - kvm-device-plug-test-use-qtest_qmp-to-send-the-device_de.patch [bz#1812399 bz#1866707] - kvm-qtest-switch-users-back-to-qtest_qmp_receive.patch [bz#1812399 bz#1866707] - kvm-qtest-check-that-drives-are-really-appearing-and-dis.patch [bz#1812399 bz#1866707] - kvm-qemu-iotests-qtest-rewrite-test-067-as-a-qtest.patch [bz#1812399 bz#1866707] - kvm-qdev-add-check-if-address-free-callback-for-buses.patch [bz#1812399 bz#1866707] - kvm-scsi-scsi_bus-switch-search-direction-in-scsi_device.patch [bz#1812399 bz#1866707] - kvm-device_core-use-drain_call_rcu-in-in-qmp_device_add.patch [bz#1812399 bz#1866707] - kvm-device-core-use-RCU-for-list-of-children-of-a-bus.patch [bz#1812399 bz#1866707] - kvm-scsi-switch-to-bus-check_address.patch [bz#1812399 bz#1866707] - kvm-device-core-use-atomic_set-on-.realized-property.patch [bz#1812399 bz#1866707] - kvm-scsi-scsi-bus-scsi_device_find-don-t-return-unrealiz.patch [bz#1812399] - kvm-scsi-scsi_bus-Add-scsi_device_get.patch [bz#1812399 bz#1866707] - kvm-virtio-scsi-use-scsi_device_get.patch [bz#1812399 bz#1866707] - kvm-scsi-scsi_bus-fix-races-in-REPORT-LUNS.patch [bz#1812399 bz#1866707] - kvm-tests-migration-fix-memleak-in-wait_command-wait_com.patch [bz#1812399 bz#1866707] - kvm-libqtest-fix-the-order-of-buffered-events.patch [bz#1812399 bz#1866707] - kvm-libqtest-fix-memory-leak-in-the-qtest_qmp_event_ref.patch [bz#1812399 bz#1866707] - kvm-iotests-add-filter_qmp_virtio_scsi-function.patch [bz#1812399 bz#1866707] - kvm-iotests-rewrite-iotest-240-in-python.patch [bz#1812399 bz#1866707] - Resolves: bz#1812399 (Qemu crash when detach disk with cache="none" discard="ignore" io="native") - Resolves: bz#1866707 (qemu-kvm is crashing with error "scsi_target_emulate_report_luns: Assertion `i == n + 8' failed") - Resolves: bz#1882719 (qemu-ga service still active and can work after qemu-guest-agent been removed) * Tue Oct 13 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.1.0-14.el8_3 - kvm-virtiofsd-avoid-proc-self-fd-tempdir.patch [bz#1884276] - Resolves: bz#1884276 (Pod with kata-runtime won't start, QEMU: "vhost_user_dev init failed, Operation not permitted" [mkdtemp failing in sandboxing]) * Thu Oct 08 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.1.0-13.el8_3 - kvm-x86-lpc9-let-firmware-negotiate-CPU-hotplug-with-SMI.patch [bz#1846886] - kvm-x86-cpuhp-prevent-guest-crash-on-CPU-hotplug-when-br.patch [bz#1846886] - kvm-x86-cpuhp-refuse-cpu-hot-unplug-request-earlier-if-n.patch [bz#1846886] - Resolves: bz#1846886 (Guest hit soft lockup or reboots if hotplug vcpu under ovmf) * Mon Oct 05 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.1.0-12.el8_3 - kvm-virtio-skip-legacy-support-check-on-machine-types-le.patch [bz#1868449] - kvm-vhost-vsock-pci-force-virtio-version-1.patch [bz#1868449] - kvm-vhost-user-vsock-pci-force-virtio-version-1.patch [bz#1868449] - kvm-vhost-vsock-ccw-force-virtio-version-1.patch [bz#1868449] - Resolves: bz#1868449 (vhost_vsock error: device is modern-only, use disable-legacy=on) * Mon Oct 05 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.1.0-11.el8_3 - kvm-migration-increase-max-bandwidth-to-128-MiB-s-1-Gib-.patch [bz#1874004] - kvm-redhat-Make-all-generated-so-files-executable-not-on.patch [bz#1876635] - Resolves: bz#1874004 (Live migration performance is poor during guest installation process on power host) - Resolves: bz#1876635 (VM fails to start with a passthrough smartcard) * Mon Sep 28 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.1.0-10.el8 - kvm-qemu-img-Support-bitmap-merge-into-backing-image.patch [bz#1877209] - Resolves: bz#1877209 ('qemu-img bitmaps --merge' failed when trying to merge top volume bitmap to base volume bitmap) * Mon Sep 21 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.1.0-9.el8 - kvm-hw-nvram-fw_cfg-fix-FWCfgDataGeneratorClass-get_data.patch [bz#1688978] - Resolves: bz#1688978 (RFE: forward host preferences for cipher suites and CA certs to guest firmware) * Thu Sep 17 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.1.0-8.el8 - kvm-redhat-link-etc-qemu-ga-fsfreeze-hook-to-etc-qemu-kv.patch [bz#1738820] - kvm-seccomp-fix-killing-of-whole-process-instead-of-thre.patch [bz#1752376] - kvm-Revert-Drop-bogus-IPv6-messages.patch [bz#1867075] - kvm-block-rbd-add-namespace-to-qemu_rbd_strong_runtime_o.patch [bz#1821528] - Resolves: bz#1738820 ('-F' option of qemu-ga command cause the guest-fsfreeze-freeze command doesn't work) - Resolves: bz#1752376 (qemu use SCMP_ACT_TRAP even SCMP_ACT_KILL_PROCESS is available) - Resolves: bz#1821528 (missing namespace attribute when access the rbd image with namespace) - Resolves: bz#1867075 (CVE-2020-10756 virt:8.3/qemu-kvm: QEMU: slirp: networking out-of-bounds read information disclosure vulnerability [rhel-av-8]) * Tue Sep 15 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.1.0-7.el8 - kvm-target-ppc-Add-experimental-option-for-enabling-secu.patch [bz#1789757 bz#1870384] - kvm-target-arm-Move-start-powered-off-property-to-generi.patch [bz#1849483] - kvm-target-arm-Move-setting-of-CPU-halted-state-to-gener.patch [bz#1849483] - kvm-ppc-spapr-Use-start-powered-off-CPUState-property.patch [bz#1849483] - Resolves: bz#1789757 ([IBM 8.4 FEAT] Add machine option to enable secure VM support) - Resolves: bz#1849483 (Failed to boot up guest when hotplugging vcpus on bios stage) - Resolves: bz#1870384 ([IBM 8.3 FEAT] Add interim/unsupported machine option to enable secure VM support for testing purposes) * Thu Sep 10 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.1.0-6.el8 - kvm-spec-Move-qemu-pr-helper-back-to-usr-bin.patch [bz#1869635] - kvm-Bump-required-libusbx-version.patch [bz#1856591] - Resolves: bz#1856591 (libusbx isn't updated with qemu-kvm) - Resolves: bz#1869635 ('/usr/bin/qemu-pr-helper' is not a suitable pr helper: No such file or directory) * Tue Sep 08 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.1.0-5.el8 - kvm-Revert-i386-Fix-pkg_id-offset-for-EPYC-cpu-models.patch [bz#1873417] - kvm-Revert-target-i386-Enable-new-apic-id-encoding-for-E.patch [bz#1873417] - kvm-Revert-hw-i386-Move-arch_id-decode-inside-x86_cpus_i.patch [bz#1873417] - kvm-Revert-i386-Introduce-use_epyc_apic_id_encoding-in-X.patch [bz#1873417] - kvm-Revert-hw-i386-Introduce-apicid-functions-inside-X86.patch [bz#1873417] - kvm-Revert-target-i386-Cleanup-and-use-the-EPYC-mode-top.patch [bz#1873417] - kvm-Revert-hw-386-Add-EPYC-mode-topology-decoding-functi.patch [bz#1873417] - kvm-nvram-Exit-QEMU-if-NVRAM-cannot-contain-all-prom-env.patch [bz#1867739] - kvm-usb-fix-setup_len-init-CVE-2020-14364.patch [bz#1869715] - kvm-Remove-explicit-glusterfs-api-dependency.patch [bz#1872853] - kvm-disable-virgl.patch [bz#1831271] - Resolves: bz#1831271 (Drop virgil acceleration support and remove virglrenderer dependency) - Resolves: bz#1867739 (-prom-env does not validate input) - Resolves: bz#1869715 (CVE-2020-14364 qemu-kvm: QEMU: usb: out-of-bounds r/w access issue while processing usb packets [rhel-av-8.3.0]) - Resolves: bz#1872853 (move the glusterfs dependency out of qemu-kvm-core to the glusterfs module) - Resolves: bz#1873417 (AMD/NUMA topology - revert 5.1 changes) * Thu Aug 27 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.1.0-4.el8 - kvm-Drop-bogus-IPv6-messages.patch [bz#1867075] - kvm-machine-types-numa-set-numa_mem_supported-on-old-mac.patch [bz#1849707] - kvm-machine_types-numa-compatibility-for-auto_enable_num.patch [bz#1849707] - kvm-migration-Add-block-bitmap-mapping-parameter.patch [bz#1790492] - kvm-iotests.py-Let-wait_migration-return-on-failure.patch [bz#1790492] - kvm-iotests-Test-node-bitmap-aliases-during-migration.patch [bz#1790492] - Resolves: bz#1790492 ('dirty-bitmaps' migration capability should allow configuring target nodenames) - Resolves: bz#1849707 (8.3 machine types for x86 - 5.1 update) - Resolves: bz#1867075 (CVE-2020-10756 virt:8.3/qemu-kvm: QEMU: slirp: networking out-of-bounds read information disclosure vulnerability [rhel-av-8]) * Wed Aug 19 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.1.0-3.el8 - kvm-redhat-Update-hw_compat_8_2.patch [bz#1843348] - kvm-redhat-update-pseries-rhel8.2.0-machine-type.patch [bz#1843348] - kvm-Disable-TPM-passthrough-backend-on-ARM.patch [bz#1801242] - kvm-Require-libfdt-1.6.0.patch [bz#1867847] - Resolves: bz#1801242 ([aarch64] vTPM support in machvirt) - Resolves: bz#1843348 (8.3 machine types for POWER) - Resolves: bz#1867847 ([ppc] virt module 7629: /usr/libexec/qemu-kvm: undefined symbol: fdt_check_full, version LIBFDT_1.2) * Wed Aug 12 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.1.0-2.el8 - kvm-redhat-define-hw_compat_8_2.patch [bz#1853265] - Resolves: bz#1853265 (Forward and backward migration from rhel-av-8.3.0(qemu-kvm-5.0.0) to rhel-av-8.2.1(qemu-kvm-4.2.0) failed with "qemu-kvm: error while loading state for instance 0x0 of device 'spapr'") * Wed Aug 12 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.1.0-1.el8 - Quick changelog fix to reflect the current fixes: - Resolve: bz#1781911 - Resolve: bz#1841529 - Resolve: bz#1842902 - Resolve: bz#1818843 - Resolve: bz#1819292 - Resolve: bz#1801242 * Wed Aug 12 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 5.1.0-0.el8 - Rebase to 5.1.0 - Resolves: bz#1809650 * Tue Jul 07 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 4.2.0-29.el8 - kvm-virtio-net-fix-removal-of-failover-device.patch [bz#1820120] - Resolves: bz#1820120 (After hotunplugging the vitrio device and netdev, hotunpluging the failover VF will cause qemu core dump) * Sun Jun 28 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 4.2.0-28.el8 - kvm-virtio-blk-Refactor-the-code-that-processes-queued-r.patch [bz#1812765] - kvm-virtio-blk-On-restart-process-queued-requests-in-the.patch [bz#1812765] - kvm-Fix-use-afte-free-in-ip_reass-CVE-2020-1983.patch [bz#1838082] - Resolves: bz#1812765 (qemu with iothreads enabled crashes on resume after enospc pause for disk extension) - Resolves: bz#1838082 (CVE-2020-1983 virt:8.2/qemu-kvm: QEMU: slirp: use-after-free in ip_reass() function in ip_input.c [rhel-av-8]) * Thu Jun 18 2020 Eduardo Lima (Etrunko) <elima@redhat.com> - 4.2.0-27.el8 - kvm-hw-pci-pcie-Move-hot-plug-capability-check-to-pre_pl.patch [bz#1820531] - kvm-spec-Fix-python-shenigans-for-tests.patch [bz#1845779] - kvm-target-i386-Add-ARCH_CAPABILITIES-related-bits-into-.patch [bz#1840342] - Resolves: bz#1820531 (qmp command query-pci get wrong result after hotplug device under hotplug=off controller) - Resolves: bz#1840342 ([Intel 8.2.1 Bug] qemu-kvm Add ARCH_CAPABILITIES to Icelake-Server cpu model - Fast Train) - Resolves: bz#1845779 (Install 'qemu-kvm-tests' failed as nothing provides /usr/libexec/platform-python3 - virt module 6972) * Wed Jun 17 2020 Eduardo Lima (Etrunko) <elima@redhat.com> - 4.2.0-26.el8 - kvm-nbd-server-Avoid-long-error-message-assertions-CVE-2.patch [bz#1845384] - kvm-block-Call-attention-to-truncation-of-long-NBD-expor.patch [bz#1845384] - Resolves: bz#1845384 (CVE-2020-10761 virt:8.2/qemu-kvm: QEMU: nbd: reachable assertion failure in nbd_negotiate_send_rep_verr via remote client [rhel-av-8]) * Tue Jun 09 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 4.2.0-25.el8 - kvm-enable-ramfb.patch [bz#1841068] - kvm-block-Add-flags-to-BlockDriver.bdrv_co_truncate.patch [bz#1780574] - kvm-block-Add-flags-to-bdrv-_co-_truncate.patch [bz#1780574] - kvm-block-backend-Add-flags-to-blk_truncate.patch [bz#1780574] - kvm-qcow2-Support-BDRV_REQ_ZERO_WRITE-for-truncate.patch [bz#1780574] - kvm-raw-format-Support-BDRV_REQ_ZERO_WRITE-for-truncate.patch [bz#1780574] - kvm-file-posix-Support-BDRV_REQ_ZERO_WRITE-for-truncate.patch [bz#1780574] - kvm-block-truncate-Don-t-make-backing-file-data-visible.patch [bz#1780574] - kvm-iotests-Add-qemu_io_log.patch [bz#1780574] - kvm-iotests-Filter-testfiles-out-in-filter_img_info.patch [bz#1780574] - kvm-iotests-Test-committing-to-short-backing-file.patch [bz#1780574] - kvm-qcow2-Forward-ZERO_WRITE-flag-for-full-preallocation.patch [bz#1780574] - kvm-i386-Add-MSR-feature-bit-for-MDS-NO.patch [bz#1769912] - kvm-i386-Add-macro-for-stibp.patch [bz#1769912] - kvm-target-i386-Add-new-bit-definitions-of-MSR_IA32_ARCH.patch [bz#1769912] - kvm-i386-Add-new-CPU-model-Cooperlake.patch [bz#1769912] - kvm-target-i386-Add-missed-features-to-Cooperlake-CPU-mo.patch [bz#1769912] - Resolves: bz#1769912 ([Intel 8.2.1 Feature] introduce Cooper Lake cpu model - qemu-kvm Fast Train) - Resolves: bz#1780574 (Data corruption with resizing short overlay over longer backing files) - Resolves: bz#1841068 (RFE: please support the "ramfb" display device model) * Mon Jun 08 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 4.2.0-24.el8 - kvm-target-i386-set-the-CPUID-level-to-0x14-on-old-machi.patch [bz#1513681] - kvm-block-curl-HTTP-header-fields-allow-whitespace-aroun.patch [bz#1841038] - kvm-block-curl-HTTP-header-field-names-are-case-insensit.patch [bz#1841038] - kvm-MAINTAINERS-fix-qcow2-bitmap.c-under-Dirty-Bitmaps-h.patch [bz#1779893 bz#1779904] - kvm-iotests-Let-_make_test_img-parse-its-parameters.patch [bz#1779893 bz#1779904] - kvm-qemu_img-add-cvtnum_full-to-print-error-reports.patch [bz#1779893 bz#1779904] - kvm-block-Make-it-easier-to-learn-which-BDS-support-bitm.patch [bz#1779893 bz#1779904] - kvm-blockdev-Promote-several-bitmap-functions-to-non-sta.patch [bz#1779893 bz#1779904] - kvm-blockdev-Split-off-basic-bitmap-operations-for-qemu-.patch [bz#1779893 bz#1779904] - kvm-qemu-img-Add-bitmap-sub-command.patch [bz#1779893 bz#1779904] - kvm-iotests-Fix-test-178.patch [bz#1779893 bz#1779904] - kvm-qcow2-Expose-bitmaps-size-during-measure.patch [bz#1779893 bz#1779904] - kvm-qemu-img-Factor-out-code-for-merging-bitmaps.patch [bz#1779893 bz#1779904] - kvm-qemu-img-Add-convert-bitmaps-option.patch [bz#1779893 bz#1779904] - kvm-iotests-Add-test-291-to-for-qemu-img-bitmap-coverage.patch [bz#1779893 bz#1779904] - kvm-iotests-Add-more-skip_if_unsupported-statements-to-t.patch [bz#1778593] - kvm-iotests-don-t-use-format-for-drive_add.patch [bz#1778593] - kvm-iotests-055-refactor-compressed-backup-to-vmdk.patch [bz#1778593] - kvm-iotests-055-skip-vmdk-target-tests-if-vmdk-is-not-wh.patch [bz#1778593] - kvm-backup-Improve-error-for-bdrv_getlength-failure.patch [bz#1778593] - kvm-backup-Make-sure-that-source-and-target-size-match.patch [bz#1778593] - kvm-iotests-Backup-with-different-source-target-size.patch [bz#1778593] - kvm-iotests-109-Don-t-mirror-with-mismatched-size.patch [bz#1778593] - kvm-iotests-229-Use-blkdebug-to-inject-an-error.patch [bz#1778593] - kvm-mirror-Make-sure-that-source-and-target-size-match.patch [bz#1778593] - kvm-iotests-Mirror-with-different-source-target-size.patch [bz#1778593] - Resolves: bz#1513681 ([Intel 8.2.1 Feat] qemu-kvm PT VMX -- Fast Train) - Resolves: bz#1778593 (Qemu coredump when backup to a existing small size image) - Resolves: bz#1779893 (RFE: Copy bitmaps with qemu-img convert) - Resolves: bz#1779904 (RFE: ability to estimate bitmap space utilization for qcow2) - Resolves: bz#1841038 (qemu-img: /var/tmp/v2vovl56bced.qcow2: CURL: Error opening file: Server does not support 'range' (byte ranges) with HTTP/2 server in VMware ESXi 7) * Thu Jun 04 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 4.2.0-23.el8 - kvm-target-arm-Fix-PAuth-sbox-functions.patch [bz#1813940] - kvm-Don-t-leak-memory-when-reallocation-fails.patch [bz#1749737] - kvm-Replace-remaining-malloc-free-user-with-glib.patch [bz#1749737] - kvm-Revert-RHEL-disable-hostmem-memfd.patch [bz#1839030] - kvm-block-introducing-bdrv_co_delete_file-interface.patch [bz#1827630] - kvm-block.c-adding-bdrv_co_delete_file.patch [bz#1827630] - kvm-crypto.c-cleanup-created-file-when-block_crypto_co_c.patch [bz#1827630] - Resolves: bz#1749737 (CVE-2019-15890 qemu-kvm: QEMU: Slirp: use-after-free during packet reassembly [rhel-av-8]) - Resolves: bz#1813940 (CVE-2020-10702 virt:8.1/qemu-kvm: qemu: weak signature generation in Pointer Authentication support for ARM [rhel-av-8]) - Resolves: bz#1827630 (volume creation leaving uncleaned stuff behind on error (vol-clone/libvirt/qemu-kvm)) - Resolves: bz#1839030 (RFE: enable the "memfd" memory backend) * Mon May 25 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 4.2.0-22.el8 - kvm-block-always-fill-entire-LUKS-header-space-with-zero.patch [bz#1775462] - kvm-numa-remove-not-needed-check.patch [bz#1600217] - kvm-numa-properly-check-if-numa-is-supported.patch [bz#1600217] - kvm-numa-Extend-CLI-to-provide-initiator-information-for.patch [bz#1600217] - kvm-numa-Extend-CLI-to-provide-memory-latency-and-bandwi.patch [bz#1600217] - kvm-numa-Extend-CLI-to-provide-memory-side-cache-informa.patch [bz#1600217] - kvm-hmat-acpi-Build-Memory-Proximity-Domain-Attributes-S.patch [bz#1600217] - kvm-hmat-acpi-Build-System-Locality-Latency-and-Bandwidt.patch [bz#1600217] - kvm-hmat-acpi-Build-Memory-Side-Cache-Information-Struct.patch [bz#1600217] - kvm-tests-numa-Add-case-for-QMP-build-HMAT.patch [bz#1600217] - kvm-tests-bios-tables-test-add-test-cases-for-ACPI-HMAT.patch [bz#1600217] - kvm-ACPI-add-expected-files-for-HMAT-tests-acpihmat.patch [bz#1600217] - Resolves: bz#1600217 ([Intel 8.2.1 FEAT] KVM ACPI HMAT support - qemu-kvm Fast Train) - Resolves: bz#1775462 (Creating luks-inside-qcow2 images with cluster_size=2k/4k will get a corrupted image) * Mon May 11 2020 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 4.2.0-21.el8 - kvm-hw-pci-pcie-Forbid-hot-plug-if-it-s-disabled-on-the-.patch [bz#1820531] - kvm-hw-pci-pcie-Replace-PCI_DEVICE-casts-with-existing-v.patch [bz#1820531] - kvm-tools-virtiofsd-passthrough_ll-Fix-double-close.patch [bz#1817445] - kvm-virtiofsd-add-rlimit-nofile-NUM-option.patch [bz#1817445] - kvm-virtiofsd-stay-below-fs.file-max-sysctl-value-CVE-20.patch [bz#1817445] - kvm-virtiofsd-jail-lo-proc_self_fd.patch [bz#1817445] - kvm-virtiofsd-Show-submounts.patch [bz#1817445] - kvm-virtiofsd-only-retain-file-system-capabilities.patch [bz#1817445] - kvm-virtiofsd-drop-all-capabilities-in-the-wait-parent-p.patch [bz#1817445] - Resolves: bz#1817445 (CVE-2020-10717 virt:8.2/qemu-kvm: QEMU: virtiofsd: guest may open maximum file descriptor to cause DoS [rhel-av-8]) - Resolves: bz#1820531 (qmp command query-pci get wrong result after hotplug device under hotplug=off controller)