Name: | qemu-kvm-common |
---|---|
Epoch: | 15 |
Version: | 6.2.0 |
Release: | 32.module+el8.8.0+21044+01700444 |
Architecture: | aarch64 |
Module: | virt:ol:8080020230410211546:fd72936b virt:ol:8080020230612161741:63b34585 virt:ol:8080020230823070311:63b34585 virt:ol:8080020230825031743:63b34585 |
Group: | Development/Tools |
Size: | 4098075 |
License: | GPLv2 and GPLv2+ and CC-BY |
RPM: | qemu-kvm-common-6.2.0-32.module+el8.8.0+21044+01700444.aarch64.rpm |
Source RPM: | qemu-kvm-6.2.0-32.module+el8.8.0+21044+01700444.src.rpm |
Build Date: | Tue May 16 2023 |
Build Host: | build-ol8-aarch64.oracle.com |
Vendor: | Oracle America |
URL: | http://www.qemu.org/ |
Summary: | QEMU common files needed by all QEMU targets |
Description: | qemu-kvm is an open source virtualizer that provides hardware emulation for the KVM hypervisor. This package provides documentation and auxiliary programs used with qemu-kvm. |
- kvm-aio_wait_kick-add-missing-memory-barrier.patch [bz#2168472] - kvm-qatomic-add-smp_mb__before-after_rmw.patch [bz#2168472] - kvm-qemu-thread-posix-cleanup-fix-document-QemuEvent.patch [bz#2168472] - kvm-qemu-thread-win32-cleanup-fix-document-QemuEvent.patch [bz#2168472] - kvm-edu-add-smp_mb__after_rmw.patch [bz#2168472] - kvm-aio-wait-switch-to-smp_mb__after_rmw.patch [bz#2168472] - kvm-qemu-coroutine-lock-add-smp_mb__after_rmw.patch [bz#2168472] - kvm-physmem-add-missing-memory-barrier.patch [bz#2168472] - kvm-async-update-documentation-of-the-memory-barriers.patch [bz#2168472] - kvm-async-clarify-usage-of-barriers-in-the-polling-case.patch [bz#2168472] - kvm-scsi-protect-req-aiocb-with-AioContext-lock.patch [bz#2090990] - kvm-dma-helpers-prevent-dma_blk_cb-vs-dma_aio_cancel-rac.patch [bz#2090990] - kvm-virtio-scsi-reset-SCSI-devices-from-main-loop-thread.patch [bz#2090990] - Resolves: bz#2168472 (Guest hangs when starting or rebooting) - Resolves: bz#2090990 (qemu crash with error scsi_req_unref(SCSIRequest *): Assertion `req->refcount > 0' failed or scsi_dma_complete(void *, int): Assertion `r->req.aiocb != NULL' failed [8.7.0])
- kvm-io-Add-support-for-MSG_PEEK-for-socket-channel.patch [bz#2137740] - kvm-migration-check-magic-value-for-deciding-the-mapping.patch [bz#2137740] - kvm-target-s390x-arch_dump-Fix-memory-corruption-in-s390.patch [bz#2168187] - Resolves: bz#2137740 (Multifd migration fails under a weak network/socket ordering race) - Resolves: bz#2168187 ([s390x] qemu-kvm coredumps when SE crashes)
- kvm-qcow2-Fix-theoretical-corruption-in-store_bitmap-err.patch [bz#2147617] - kvm-qemu-img-commit-Report-errors-while-closing-the-imag.patch [bz#2147617] - kvm-qemu-img-bitmap-Report-errors-while-closing-the-imag.patch [bz#2147617] - kvm-qemu-iotests-Test-qemu-img-bitmap-commit-exit-code-o.patch [bz#2147617] - Resolves: bz#2147617 (qemu-img finishes successfully while having errors in commit or bitmaps operations)
- kvm-block-mirror-Do-not-wait-for-active-writes.patch [bz#2125119] - kvm-block-mirror-Drop-mirror_wait_for_any_operation.patch [bz#2125119] - kvm-block-mirror-Fix-NULL-s-job-in-active-writes.patch [bz#2125119] - kvm-accel-introduce-accelerator-blocker-API.patch [bz#2161188] - kvm-KVM-keep-track-of-running-ioctls.patch [bz#2161188] - kvm-kvm-Atomic-memslot-updates.patch [bz#2161188] - kvm-migration-Read-state-once.patch [bz#2074205] - kvm-s390x-pci-RPCIT-second-pass-when-mappings-exhausted.patch [bz#2163713] - kvm-s390x-pci-coalesce-unmap-operations.patch [bz#2163713] - kvm-s390x-pci-shrink-DMA-aperture-to-be-bound-by-vfio-DM.patch [bz#2163713] - kvm-s390x-pci-reset-ISM-passthrough-devices-on-shutdown-.patch [bz#2163713] - Resolves: bz#2125119 (Mirror job with "copy-mode":"write-blocking" that used for storage migration can't converge under heavy I/O) - Resolves: bz#2161188 (SVM: non atomic memslot updates cause boot failure with seabios and cpu-pm=on) - Resolves: bz#2074205 (while live-migrating many instances concurrently, libvirt sometimes return internal error: migration was active, but no RAM info was set) - Resolves: bz#2163713 ([s390x] VM fails to start with ISM passed through)
- kvm-s390x-tod-kvm-don-t-save-restore-the-TOD-in-PV-guest.patch [bz#2155448] - Resolves: bz#2155448 (RHEL8.8 - KVM: s390: pv: don't allow userspace to set the clock under PV - QEMU part)
- kvm-hw-display-qxl-Have-qxl_log_command-Return-early-if-.patch [bz#2148545] - kvm-hw-display-qxl-Document-qxl_phys2virt.patch [bz#2148545] - kvm-hw-display-qxl-Pass-requested-buffer-size-to-qxl_phy.patch [bz#2148545] - kvm-hw-display-qxl-Avoid-buffer-overrun-in-qxl_phys2virt.patch [bz#2148545] - kvm-hw-display-qxl-Assert-memory-slot-fits-in-preallocat.patch [bz#2148545] - Resolves: bz#2148545 (CVE-2022-4144 virt:rhel/qemu-kvm: QEMU: QXL: qxl_phys2virt unsafe address translation can lead to out-of-bounds read [rhel-8])
- kvm-docs-system-s390x-Document-the-loadparm-machine-prop.patch [bz#2128225] - kvm-s390x-Register-TYPE_S390_CCW_MACHINE-properties-as-c.patch [bz#2128225] - kvm-ui-vnc.c-Fixed-a-deadlock-bug.patch [bz#2141896] - Resolves: bz#2128225 ([s390x] [RHEL8][s390x-ccw bios] lacking document about parameter loadparm in qemu) - Resolves: bz#2141896 (VMs hung on vnc_clipboard_send)
- kvm-hw-acpi-Add-ospm_status-hook-implementation-for-acpi.patch [bz#2132609] - kvm-target-arm-kvm-Retry-KVM_CREATE_VM-call-if-it-fails-.patch [bz#2132609] - Resolves: bz#2132609 (qemu-kvm: backport some aarch64 fixes)
- kvm-s390x-pci-use-a-reserved-ID-for-the-default-PCI-grou.patch [bz#1664378 bz#2043909] - kvm-s390x-pci-don-t-use-hard-coded-dma-range-in-reg_ioat.patch [bz#1664378 bz#2043909] - kvm-s390x-pci-use-the-passthrough-measurement-update-int.patch [bz#1664378 bz#2043909] - kvm-s390x-pci-add-supported-DT-information-to-clp-respon.patch [bz#1664378 bz#2043909] - kvm-Update-linux-headers-to-v6.0-rc4.patch [bz#1664378 bz#2043909] - kvm-s390x-pci-add-routine-to-get-host-function-handle-fr.patch [bz#1664378 bz#2043909] - kvm-s390x-pci-enable-for-load-store-interpretation.patch [bz#1664378 bz#2043909] - kvm-s390x-pci-don-t-fence-interpreted-devices-without-MS.patch [bz#1664378 bz#2043909] - kvm-s390x-pci-enable-adapter-event-notification-for-inte.patch [bz#1664378 bz#2043909] - kvm-s390x-pci-let-intercept-devices-have-separate-PCI-gr.patch [bz#1664378 bz#2043909] - kvm-s390x-pci-reflect-proper-maxstbl-for-groups-of-inter.patch [bz#1664378 bz#2043909] - kvm-s390x-s390-virtio-ccw-Switch-off-zPCI-enhancements-o.patch [bz#1664378 bz#2043909] - kvm-dump-Use-ERRP_GUARD.patch [bz#1664378 bz#2043909] - kvm-dump-Remove-the-sh_info-variable.patch [bz#1664378 bz#2043909] - kvm-dump-Introduce-shdr_num-to-decrease-complexity.patch [bz#1664378 bz#2043909] - kvm-dump-Remove-the-section-if-when-calculating-the-memo.patch [bz#1664378 bz#2043909] - kvm-dump-Add-more-offset-variables.patch [bz#1664378 bz#2043909] - kvm-dump-Introduce-dump_is_64bit-helper-function.patch [bz#1664378 bz#2043909] - kvm-dump-Consolidate-phdr-note-writes.patch [bz#1664378 bz#2043909] - kvm-dump-Cleanup-dump_begin-write-functions.patch [bz#1664378 bz#2043909] - kvm-dump-Consolidate-elf-note-function.patch [bz#1664378 bz#2043909] - kvm-dump-Replace-opaque-DumpState-pointer-with-a-typed-o.patch [bz#1664378 bz#2043909] - kvm-dump-Rename-write_elf_loads-to-write_elf_phdr_loads.patch [bz#1664378 bz#2043909] - kvm-dump-Refactor-dump_iterate-and-introduce-dump_filter.patch [bz#1664378 bz#2043909] - kvm-dump-Rework-get_start_block.patch [bz#1664378 bz#2043909] - kvm-dump-Rework-filter-area-variables.patch [bz#1664378 bz#2043909] - kvm-dump-Rework-dump_calculate_size-function.patch [bz#1664378 bz#2043909] - kvm-dump-Split-elf-header-functions-into-prepare-and-wri.patch [bz#1664378 bz#2043909] - kvm-dump-Rename-write_elf-_phdr_note-to-prepare_elf-_phd.patch [bz#1664378 bz#2043909] - kvm-dump-simplify-a-bit-kdump-get_next_page.patch [bz#1664378 bz#2043909] - kvm-dump-fix-kdump-to-work-over-non-aligned-blocks.patch [bz#1664378 bz#2043909] - kvm-dump-Use-a-buffer-for-ELF-section-data-and-headers.patch [bz#1664378 bz#2043909] - kvm-dump-Write-ELF-section-headers-right-after-ELF-heade.patch [bz#1664378 bz#2043909] - kvm-dump-Reorder-struct-DumpState.patch [bz#1664378 bz#2043909] - kvm-dump-Reintroduce-memory_offset-and-section_offset.patch [bz#1664378 bz#2043909] - kvm-dump-Add-architecture-section-and-section-string-tab.patch [bz#1664378 bz#2043909] - kvm-s390x-Add-protected-dump-cap.patch [bz#1664378 bz#2043909] - kvm-s390x-Introduce-PV-query-interface.patch [bz#1664378 bz#2043909] - kvm-include-elf.h-add-s390x-note-types.patch [bz#1664378 bz#2043909] - kvm-s390x-Add-KVM-PV-dump-interface.patch [bz#1664378 bz#2043909] - kvm-s390x-pv-Add-dump-support.patch [bz#1664378 bz#2043909] - kvm-ui-vnc-clipboard-fix-integer-underflow-in-vnc_client.patch [bz#2129760] - Resolves: bz#1664378 ([IBM 8.8 FEAT] Enhanced Interpretation for PCI Functions (kvm) - qemu part) - Resolves: bz#2043909 ([IBM 8.8 FEAT] KVM: Secure Execution guest dump encryption with customer keys - qemu part) - Resolves: bz#2129760 (CVE-2022-3165 virt:rhel/qemu-kvm: QEMU: VNC: integer underflow in vnc_client_cut_text_ext leads to CPU exhaustion [rhel-8])
- kvm-virtio-fix-the-condition-for-iommu_platform-not-supp.patch [bz#2116302] - kvm-virtio-fix-feature-negotiation-for-ACCESS_PLATFORM.patch [bz#2116302] - Resolves: bz#2116302 (RHEL8.6 - virtiofs will not mount fs on secure execution guest)