diff --git a/0001-sgx-stub-fix.patch b/0001-sgx-stub-fix.patch deleted file mode 100644 index ff31973ab889f66c9260ba4b70b4c5cfa041af0a..0000000000000000000000000000000000000000 --- a/0001-sgx-stub-fix.patch +++ /dev/null @@ -1,27 +0,0 @@ -From 509b6078631ad2437e1a452f749831e401fb8afb Mon Sep 17 00:00:00 2001 -From: Paolo Bonzini -Date: Tue, 1 Feb 2022 20:09:37 +0100 -Subject: [PATCH] target/i386: the sgx_epc_get_section stub is reachable -MIME-Version: 1.0 -Content-Type: text/plain; charset=UTF-8 -Content-Transfer-Encoding: 8bit - -The sgx_epc_get_section stub is reachable from cpu_x86_cpuid. It -should not assert, instead it should just return true just like -the "real" sgx_epc_get_section does when SGX is disabled. - -Reported-by: Vladimír Beneš -Cc: qemu-stable@nongnu.org -Signed-off-by: Paolo Bonzini - -diff --git a/hw/i386/sgx-stub.c b/hw/i386/sgx-stub.c -index 26833eb233..16b1dfd90b 100644 ---- a/hw/i386/sgx-stub.c -+++ b/hw/i386/sgx-stub.c -@@ -34,5 +34,5 @@ void pc_machine_init_sgx_epc(PCMachineState *pcms) - - bool sgx_epc_get_section(int section_nr, uint64_t *addr, uint64_t *size) - { -- g_assert_not_reached(); -+ return true; - } diff --git a/0002-Fix-crash-when-loading-snapshot-on-inactive-node.patch b/0002-Fix-crash-when-loading-snapshot-on-inactive-node.patch deleted file mode 100644 index 68b84c683b0dbee768a32ae81cce01dba9f494a1..0000000000000000000000000000000000000000 --- a/0002-Fix-crash-when-loading-snapshot-on-inactive-node.patch +++ /dev/null @@ -1,52 +0,0 @@ -From a629fee99ba2189a7452a212f0a01696a65877ac Mon Sep 17 00:00:00 2001 -From: Kevin Wolf -Date: Fri, 1 Dec 2023 15:25:18 +0100 -Subject: [PATCH] block: Fix crash when loading snapshot on inactive node - -bdrv_is_read_only() only checks if the node is configured to be -read-only eventually, but even if it returns false, writing to the node -may not be permitted at the moment (because it's inactive). - -bdrv_is_writable() checks that the node can be written to right now, and -this is what the snapshot operations really need. - -Change bdrv_can_snapshot() to use bdrv_is_writable() to fix crashes like -the following: - -$ ./qemu-system-x86_64 -hda /tmp/test.qcow2 -loadvm foo -incoming defer -qemu-system-x86_64: ../block/io.c:1990: int bdrv_co_write_req_prepare(BdrvChild *, int64_t, int64_t, BdrvTrackedRequest *, int): Assertion `!(bs->open_flags & BDRV_O_INACTIVE)' failed. - -The resulting error message after this patch isn't perfect yet, but at -least it doesn't crash any more: - -$ ./qemu-system-x86_64 -hda /tmp/test.qcow2 -loadvm foo -incoming defer -qemu-system-x86_64: Device 'ide0-hd0' is writable but does not support snapshots - -Signed-off-by: Kevin Wolf -Message-ID: <20231201142520.32255-2-kwolf@redhat.com> -Signed-off-by: Kevin Wolf -(cherry picked from commit d3007d348adaaf04ee8b099a475282034a662414) -Signed-off-by: Michael Tokarev ---- - block/snapshot.c | 4 +++- - 1 file changed, 3 insertions(+), 1 deletion(-) - -diff --git a/block/snapshot.c b/block/snapshot.c -index e22ac3eac63..86e29ca59f9 100644 ---- a/block/snapshot.c -+++ b/block/snapshot.c -@@ -190,8 +190,10 @@ static BlockDriverState *bdrv_snapshot_fallback(BlockDriverState *bs) - int bdrv_can_snapshot(BlockDriverState *bs) - { - BlockDriver *drv = bs->drv; -+ - GLOBAL_STATE_CODE(); -- if (!drv || !bdrv_is_inserted(bs) || bdrv_is_read_only(bs)) { -+ -+ if (!drv || !bdrv_is_inserted(bs) || !bdrv_is_writable(bs)) { - return 0; - } - --- -GitLab - diff --git a/0028-target-loongarch-Fix-qemu-loongarch64-hang-when-exec.patch b/0028-target-loongarch-Fix-qemu-loongarch64-hang-when-exec.patch deleted file mode 100644 index f49bf1b9f98ca15b74519c4ba3188c7f056e2b0e..0000000000000000000000000000000000000000 --- a/0028-target-loongarch-Fix-qemu-loongarch64-hang-when-exec.patch +++ /dev/null @@ -1,45 +0,0 @@ -From 00cba740b912937535a0ad70b968bc94cd1ba4e5 Mon Sep 17 00:00:00 2001 -From: Song Gao -Date: Wed, 20 Mar 2024 09:39:55 +0800 -Subject: [PATCH] target/loongarch: Fix qemu-loongarch64 hang when - executing 'll.d $t0, $t0, 0' - -On gen_ll, if a->imm is zero, make_address_x return src1, -but the load to destination may clobber src1. We use a new -destination to fix this problem. - -Fixes: c5af6628f4be (target/loongarch: Extract make_address_i() helper) -Reviewed-by: Richard Henderson -Suggested-by: Richard Henderson -Signed-off-by: Song Gao -Message-Id: <20240320013955.1561311-1-gaosong@loongson.cn> ---- - target/loongarch/tcg/insn_trans/trans_atomic.c.inc | 8 ++++---- - 1 file changed, 4 insertions(+), 4 deletions(-) - -diff --git a/target/loongarch/tcg/insn_trans/trans_atomic.c.inc b/target/loongarch/tcg/insn_trans/trans_atomic.c.inc -index 80c2e286fd..974bc2a70f 100644 ---- a/target/loongarch/tcg/insn_trans/trans_atomic.c.inc -+++ b/target/loongarch/tcg/insn_trans/trans_atomic.c.inc -@@ -5,14 +5,14 @@ - - static bool gen_ll(DisasContext *ctx, arg_rr_i *a, MemOp mop) - { -- TCGv dest = gpr_dst(ctx, a->rd, EXT_NONE); -+ TCGv t1 = tcg_temp_new(); - TCGv src1 = gpr_src(ctx, a->rj, EXT_NONE); - TCGv t0 = make_address_i(ctx, src1, a->imm); - -- tcg_gen_qemu_ld_i64(dest, t0, ctx->mem_idx, mop); -+ tcg_gen_qemu_ld_i64(t1, t0, ctx->mem_idx, mop); - tcg_gen_st_tl(t0, tcg_env, offsetof(CPULoongArchState, lladdr)); -- tcg_gen_st_tl(dest, tcg_env, offsetof(CPULoongArchState, llval)); -- gen_set_gpr(a->rd, dest, EXT_NONE); -+ tcg_gen_st_tl(t1, tcg_env, offsetof(CPULoongArchState, llval)); -+ gen_set_gpr(a->rd, t1, EXT_NONE); - - return true; - } --- -2.33.0 - diff --git a/0034-target-loongarch-Fix-qemu-system-loongarch64-assert-.patch b/0034-target-loongarch-Fix-qemu-system-loongarch64-assert-.patch deleted file mode 100644 index 659cfc15369d7360af748f4a254050f5798205e3..0000000000000000000000000000000000000000 --- a/0034-target-loongarch-Fix-qemu-system-loongarch64-assert-.patch +++ /dev/null @@ -1,131 +0,0 @@ -From 9e66722c617c4e01e2a5efdd7f533fd9d225033b Mon Sep 17 00:00:00 2001 -From: Song Gao -Date: Tue, 2 Apr 2024 09:39:36 +0800 -Subject: [PATCH] target/loongarch: Fix qemu-system-loongarch64 assert - failed with the option '-d int' -MIME-Version: 1.0 -Content-Type: text/plain; charset=UTF-8 -Content-Transfer-Encoding: 8bit - -qemu-system-loongarch64 assert failed with the option '-d int', -the helper_idle() raise an exception EXCP_HLT, but the exception name is undefined. - -Signed-off-by: Song Gao -Reviewed-by: Philippe Mathieu-Daudé -Message-Id: <20240321123606.1704900-1-gaosong@loongson.cn> ---- - target/loongarch/cpu.c | 74 +++++++++++++++++++++++------------------- - 1 file changed, 40 insertions(+), 34 deletions(-) - -diff --git a/target/loongarch/cpu.c b/target/loongarch/cpu.c -index 86d18f89a4..bc557f207b 100644 ---- a/target/loongarch/cpu.c -+++ b/target/loongarch/cpu.c -@@ -45,33 +45,45 @@ const char * const fregnames[32] = { - "f24", "f25", "f26", "f27", "f28", "f29", "f30", "f31", - }; - --static const char * const excp_names[] = { -- [EXCCODE_INT] = "Interrupt", -- [EXCCODE_PIL] = "Page invalid exception for load", -- [EXCCODE_PIS] = "Page invalid exception for store", -- [EXCCODE_PIF] = "Page invalid exception for fetch", -- [EXCCODE_PME] = "Page modified exception", -- [EXCCODE_PNR] = "Page Not Readable exception", -- [EXCCODE_PNX] = "Page Not Executable exception", -- [EXCCODE_PPI] = "Page Privilege error", -- [EXCCODE_ADEF] = "Address error for instruction fetch", -- [EXCCODE_ADEM] = "Address error for Memory access", -- [EXCCODE_SYS] = "Syscall", -- [EXCCODE_BRK] = "Break", -- [EXCCODE_INE] = "Instruction Non-Existent", -- [EXCCODE_IPE] = "Instruction privilege error", -- [EXCCODE_FPD] = "Floating Point Disabled", -- [EXCCODE_FPE] = "Floating Point Exception", -- [EXCCODE_DBP] = "Debug breakpoint", -- [EXCCODE_BCE] = "Bound Check Exception", -- [EXCCODE_SXD] = "128 bit vector instructions Disable exception", -- [EXCCODE_ASXD] = "256 bit vector instructions Disable exception", -+struct TypeExcp { -+ int32_t exccode; -+ const char * const name; -+}; -+ -+static const struct TypeExcp excp_names[] = { -+ {EXCCODE_INT, "Interrupt"}, -+ {EXCCODE_PIL, "Page invalid exception for load"}, -+ {EXCCODE_PIS, "Page invalid exception for store"}, -+ {EXCCODE_PIF, "Page invalid exception for fetch"}, -+ {EXCCODE_PME, "Page modified exception"}, -+ {EXCCODE_PNR, "Page Not Readable exception"}, -+ {EXCCODE_PNX, "Page Not Executable exception"}, -+ {EXCCODE_PPI, "Page Privilege error"}, -+ {EXCCODE_ADEF, "Address error for instruction fetch"}, -+ {EXCCODE_ADEM, "Address error for Memory access"}, -+ {EXCCODE_SYS, "Syscall"}, -+ {EXCCODE_BRK, "Break"}, -+ {EXCCODE_INE, "Instruction Non-Existent"}, -+ {EXCCODE_IPE, "Instruction privilege error"}, -+ {EXCCODE_FPD, "Floating Point Disabled"}, -+ {EXCCODE_FPE, "Floating Point Exception"}, -+ {EXCCODE_DBP, "Debug breakpoint"}, -+ {EXCCODE_BCE, "Bound Check Exception"}, -+ {EXCCODE_SXD, "128 bit vector instructions Disable exception"}, -+ {EXCCODE_ASXD, "256 bit vector instructions Disable exception"}, -+ {EXCP_HLT, "EXCP_HLT"}, - }; - - const char *loongarch_exception_name(int32_t exception) - { -- assert(excp_names[exception]); -- return excp_names[exception]; -+ int i; -+ -+ for (i = 0; i < ARRAY_SIZE(excp_names); i++) { -+ if (excp_names[i].exccode == exception) { -+ return excp_names[i].name; -+ } -+ } -+ return "Unknown"; - } - - void G_NORETURN do_raise_exception(CPULoongArchState *env, -@@ -80,7 +92,7 @@ void G_NORETURN do_raise_exception(CPULoongArchState *env, - { - CPUState *cs = env_cpu(env); - -- qemu_log_mask(CPU_LOG_INT, "%s: %d (%s)\n", -+ qemu_log_mask(CPU_LOG_INT, "%s: expection: %d (%s)\n", - __func__, - exception, - loongarch_exception_name(exception)); -@@ -161,22 +173,16 @@ static void loongarch_cpu_do_interrupt(CPUState *cs) - CPULoongArchState *env = &cpu->env; - bool update_badinstr = 1; - int cause = -1; -- const char *name; - bool tlbfill = FIELD_EX64(env->CSR_TLBRERA, CSR_TLBRERA, ISTLBR); - uint32_t vec_size = FIELD_EX64(env->CSR_ECFG, CSR_ECFG, VS); - - if (cs->exception_index != EXCCODE_INT) { -- if (cs->exception_index < 0 || -- cs->exception_index >= ARRAY_SIZE(excp_names)) { -- name = "unknown"; -- } else { -- name = excp_names[cs->exception_index]; -- } -- - qemu_log_mask(CPU_LOG_INT, - "%s enter: pc " TARGET_FMT_lx " ERA " TARGET_FMT_lx -- " TLBRERA " TARGET_FMT_lx " %s exception\n", __func__, -- env->pc, env->CSR_ERA, env->CSR_TLBRERA, name); -+ " TLBRERA " TARGET_FMT_lx " exception: %d (%s)\n", -+ __func__, env->pc, env->CSR_ERA, env->CSR_TLBRERA, -+ cs->exception_index, -+ loongarch_exception_name(cs->exception_index)); - } - - switch (cs->exception_index) { --- -2.33.0 - diff --git a/1001-i386-cpu-Clear-FEAT_XSAVE_XSS_LO-HI-leafs-when-CPUID.patch b/1001-i386-cpu-Clear-FEAT_XSAVE_XSS_LO-HI-leafs-when-CPUID.patch deleted file mode 100644 index 7709d6ec139a69acc9e6e183428117da8b627e95..0000000000000000000000000000000000000000 --- a/1001-i386-cpu-Clear-FEAT_XSAVE_XSS_LO-HI-leafs-when-CPUID.patch +++ /dev/null @@ -1,42 +0,0 @@ -From 15c883697908b38e9021277d83480d382fc76b3a Mon Sep 17 00:00:00 2001 -From: Xiaoyao Li -Date: Mon, 15 Jan 2024 04:13:24 -0500 -Subject: [PATCH] i386/cpu: Clear FEAT_XSAVE_XSS_LO/HI leafs when - CPUID_EXT_XSAVE is not available - -commit 81f5cad3858f27623b1b14467926032d229b76cc upstream. - -Leaf FEAT_XSAVE_XSS_LO and FEAT_XSAVE_XSS_HI also need to be cleared -when CPUID_EXT_XSAVE is not set. - -Intel-SIG: commit 81f5cad3858f i386/cpu: Clear FEAT_XSAVE_XSS_LO/HI leafs when CPUID_EXT_XSAVE is not available -Backport i386/cpu fixes - -Fixes: 301e90675c3f ("target/i386: Enable support for XSAVES based features") -Signed-off-by: Xiaoyao Li -Reviewed-by: Yang Weijiang -Message-ID: <20240115091325.1904229-2-xiaoyao.li@intel.com> -Cc: qemu-stable@nongnu.org -Signed-off-by: Paolo Bonzini -Signed-off-by: Jason Zeng -Signed-off-by: Aubrey Li ---- - target/i386/cpu.c | 2 ++ - 1 file changed, 2 insertions(+) - -diff --git a/target/i386/cpu.c b/target/i386/cpu.c -index cd16cb893daf..8b9ef218d3df 100644 ---- a/target/i386/cpu.c -+++ b/target/i386/cpu.c -@@ -6927,6 +6927,8 @@ static void x86_cpu_enable_xsave_components(X86CPU *cpu) - if (!(env->features[FEAT_1_ECX] & CPUID_EXT_XSAVE)) { - env->features[FEAT_XSAVE_XCR0_LO] = 0; - env->features[FEAT_XSAVE_XCR0_HI] = 0; -+ env->features[FEAT_XSAVE_XSS_LO] = 0; -+ env->features[FEAT_XSAVE_XSS_HI] = 0; - return; - } - --- -2.34.1 - diff --git a/1002-i386-cpu-Mask-with-XCR0-XSS-mask-for-FEAT_XSAVE_XCR0.patch b/1002-i386-cpu-Mask-with-XCR0-XSS-mask-for-FEAT_XSAVE_XCR0.patch deleted file mode 100644 index fbefa7fdfbf87fd4844368e870cf4f75eb69d8c1..0000000000000000000000000000000000000000 --- a/1002-i386-cpu-Mask-with-XCR0-XSS-mask-for-FEAT_XSAVE_XCR0.patch +++ /dev/null @@ -1,46 +0,0 @@ -From 626266a79b8e4826c185e94ca2fc339a304a21ca Mon Sep 17 00:00:00 2001 -From: Xiaoyao Li -Date: Mon, 15 Jan 2024 04:13:25 -0500 -Subject: [PATCH] i386/cpu: Mask with XCR0/XSS mask for FEAT_XSAVE_XCR0_HI and - FEAT_XSAVE_XSS_HI leafs - -commit a11a365159b944e05be76f3ec3b98c8b38cb70fd upstream. - -The value of FEAT_XSAVE_XCR0_HI leaf and FEAT_XSAVE_XSS_HI leaf also -need to be masked by XCR0 and XSS mask respectively, to make it -logically correct. - -Intel-SIG: commit a11a365159b9 i386/cpu: Mask with XCR0/XSS mask for FEAT_XSAVE_XCR0_HI and FEAT_XSAVE_XSS_HI leafs -Backport i386/cpu fixes - -Fixes: 301e90675c3f ("target/i386: Enable support for XSAVES based features") -Signed-off-by: Xiaoyao Li -Reviewed-by: Yang Weijiang -Message-ID: <20240115091325.1904229-3-xiaoyao.li@intel.com> -Cc: qemu-stable@nongnu.org -Signed-off-by: Paolo Bonzini -Signed-off-by: Jason Zeng -Signed-off-by: Aubrey Li ---- - target/i386/cpu.c | 4 ++-- - 1 file changed, 2 insertions(+), 2 deletions(-) - -diff --git a/target/i386/cpu.c b/target/i386/cpu.c -index 8b9ef218d3df..a66e5a357b19 100644 ---- a/target/i386/cpu.c -+++ b/target/i386/cpu.c -@@ -6947,9 +6947,9 @@ static void x86_cpu_enable_xsave_components(X86CPU *cpu) - } - - env->features[FEAT_XSAVE_XCR0_LO] = mask & CPUID_XSTATE_XCR0_MASK; -- env->features[FEAT_XSAVE_XCR0_HI] = mask >> 32; -+ env->features[FEAT_XSAVE_XCR0_HI] = (mask & CPUID_XSTATE_XCR0_MASK) >> 32; - env->features[FEAT_XSAVE_XSS_LO] = mask & CPUID_XSTATE_XSS_MASK; -- env->features[FEAT_XSAVE_XSS_HI] = mask >> 32; -+ env->features[FEAT_XSAVE_XSS_HI] = (mask & CPUID_XSTATE_XSS_MASK) >> 32; - } - - /***** Steps involved on loading and filtering CPUID data --- -2.34.1 - diff --git a/1003-i386-cpuid-Decrease-cpuid_i-when-skipping-CPUID-leaf.patch b/1003-i386-cpuid-Decrease-cpuid_i-when-skipping-CPUID-leaf.patch deleted file mode 100644 index ba00a2d200607973be16003455ec3fa095b4f500..0000000000000000000000000000000000000000 --- a/1003-i386-cpuid-Decrease-cpuid_i-when-skipping-CPUID-leaf.patch +++ /dev/null @@ -1,42 +0,0 @@ -From 2bb1c3d8c6d669468c574db017c96df17e797dc9 Mon Sep 17 00:00:00 2001 -From: Xiaoyao Li -Date: Wed, 24 Jan 2024 21:40:14 -0500 -Subject: [PATCH] i386/cpuid: Decrease cpuid_i when skipping CPUID leaf 1F - -commit 10f92799af8ba3c3cef2352adcd4780f13fbab31 upstream. - -Existing code misses a decrement of cpuid_i when skip leaf 0x1F. -There's a blank CPUID entry(with leaf, subleaf as 0, and all fields -stuffed 0s) left in the CPUID array. - -It conflicts with correct CPUID leaf 0. - -Intel-SIG: commit 10f92799af8b i386/cpuid: Decrease cpuid_i when skipping CPUID leaf 1F -Backport i386/cpuid fixes - -Signed-off-by: Xiaoyao Li -Reviewed-by:Yang Weijiang -Message-ID: <20240125024016.2521244-2-xiaoyao.li@intel.com> -Cc: qemu-stable@nongnu.org -Signed-off-by: Paolo Bonzini -Signed-off-by: Jason Zeng -Signed-off-by: Aubrey Li ---- - target/i386/kvm/kvm.c | 1 + - 1 file changed, 1 insertion(+) - -diff --git a/target/i386/kvm/kvm.c b/target/i386/kvm/kvm.c -index 4ce80555b45c..e68eb8f5e6b0 100644 ---- a/target/i386/kvm/kvm.c -+++ b/target/i386/kvm/kvm.c -@@ -1914,6 +1914,7 @@ int kvm_arch_init_vcpu(CPUState *cs) - } - case 0x1f: - if (env->nr_dies < 2) { -+ cpuid_i--; - break; - } - /* fallthrough */ --- -2.34.1 - diff --git a/1004-i386-cpuid-Move-leaf-7-to-correct-group.patch b/1004-i386-cpuid-Move-leaf-7-to-correct-group.patch deleted file mode 100644 index 659f0efbf97034fa5a2ed084b056e298aba6dd98..0000000000000000000000000000000000000000 --- a/1004-i386-cpuid-Move-leaf-7-to-correct-group.patch +++ /dev/null @@ -1,54 +0,0 @@ -From 6449fc40100be71bdb454f542ca708026cd5ad11 Mon Sep 17 00:00:00 2001 -From: Xiaoyao Li -Date: Wed, 24 Jan 2024 21:40:16 -0500 -Subject: [PATCH] i386/cpuid: Move leaf 7 to correct group - -commit 0729857c707535847d7fe31d3d91eb8b2a118e3c upstream. - -CPUID leaf 7 was grouped together with SGX leaf 0x12 by commit -b9edbadefb9e ("i386: Propagate SGX CPUID sub-leafs to KVM") by mistake. - -SGX leaf 0x12 has its specific logic to check if subleaf (starting from 2) -is valid or not by checking the bit 0:3 of corresponding EAX is 1 or -not. - -Leaf 7 follows the logic that EAX of subleaf 0 enumerates the maximum -valid subleaf. - -Intel-SIG: commit 0729857c7075 i386/cpuid: Move leaf 7 to correct group -Backport i386/cpu fixes - -Fixes: b9edbadefb9e ("i386: Propagate SGX CPUID sub-leafs to KVM") -Signed-off-by: Xiaoyao Li -Message-ID: <20240125024016.2521244-4-xiaoyao.li@intel.com> -Cc: qemu-stable@nongnu.org -Signed-off-by: Paolo Bonzini -Signed-off-by: Jason Zeng -Signed-off-by: Aubrey Li ---- - target/i386/kvm/kvm.c | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -diff --git a/target/i386/kvm/kvm.c b/target/i386/kvm/kvm.c -index e68eb8f5e6b0..a0bc9ea7b192 100644 ---- a/target/i386/kvm/kvm.c -+++ b/target/i386/kvm/kvm.c -@@ -1955,7 +1955,6 @@ int kvm_arch_init_vcpu(CPUState *cs) - c = &cpuid_data.entries[cpuid_i++]; - } - break; -- case 0x7: - case 0x12: - for (j = 0; ; j++) { - c->function = i; -@@ -1975,6 +1974,7 @@ int kvm_arch_init_vcpu(CPUState *cs) - c = &cpuid_data.entries[cpuid_i++]; - } - break; -+ case 0x7: - case 0x14: - case 0x1d: - case 0x1e: { --- -2.34.1 - diff --git a/qemu-8.2.0.tar.xz b/qemu-8.2.3.tar.xz similarity index 88% rename from qemu-8.2.0.tar.xz rename to qemu-8.2.3.tar.xz index 6d13b5dd8d4d58c99a8d664ca6f207c9ae5c59b7..b2f49e6f73377b060fc6c69a6c6552053b236881 100644 Binary files a/qemu-8.2.0.tar.xz and b/qemu-8.2.3.tar.xz differ diff --git a/qemu.spec b/qemu.spec index 0bb549f0f72f62340b9967b01397419ce9240119..882cd56ddd7712ee21f062a6d2b6dbcb17e40be3 100644 --- a/qemu.spec +++ b/qemu.spec @@ -1,4 +1,4 @@ -%define anolis_release 12 +%define anolis_release 1 %bcond_with check @@ -243,7 +243,7 @@ Obsoletes: %{name}-audio-sdl <= %{epoch}:%{version}-%{release} Summary: QEMU is a FAST! processor emulator Name: qemu -Version: 8.2.0 +Version: 8.2.3 Release: %{anolis_release}%{?dist} Epoch: 2 License: GPLv2 and BSD and MIT and CC-BY @@ -262,9 +262,6 @@ Source27: kvm.conf Source31: kvm-x86.conf Source36: README.tests -Patch0001: 0001-sgx-stub-fix.patch -Patch0002: 0002-Fix-crash-when-loading-snapshot-on-inactive-node.patch - Patch0003: 0003-hw-loongarch-virt-Align-high-memory-base-address-wit.patch Patch0004: 0004-target-loongarch-Add-timer-information-dump-support.patch Patch0005: 0005-target-loongarch-meson-move-gdbstub.c-to-loongarch.s.patch @@ -290,21 +287,14 @@ Patch0024: 0024-target-loongarch-kvm-Enable-LSX-LASX-extension.patch Patch0025: 0025-target-loongarch-Fix-qtest-test-hmp-error-when-KVM-o.patch Patch0026: 0026-loongarch-Change-the-UEFI-loading-mode-to-loongarch.patch Patch0027: 0027-target-loongarch-Fix-tlb-huge-page-loading-issue.patch -Patch0028: 0028-target-loongarch-Fix-qemu-loongarch64-hang-when-exec.patch Patch0029: 0029-target-loongarch-kvm-Add-software-breakpoint-support.patch Patch0030: 0030-hw-intc-loongarch_extioi-Add-virt-extension-support.patch Patch0031: 0031-target-loongarch-kvm-sync-kernel-header-files.patch Patch0032: 0032-hw-intc-loongarch_extioi-Add-virt-extension-support-.patch Patch0033: 0033-target-loongarch-kvm-Add-pmu-support.patch -Patch0034: 0034-target-loongarch-Fix-qemu-system-loongarch64-assert-.patch Patch0035: 0035-newfeature-support-vpsp.patch -Patch1001: 1001-i386-cpu-Clear-FEAT_XSAVE_XSS_LO-HI-leafs-when-CPUID.patch -Patch1002: 1002-i386-cpu-Mask-with-XCR0-XSS-mask-for-FEAT_XSAVE_XCR0.patch -Patch1003: 1003-i386-cpuid-Decrease-cpuid_i-when-skipping-CPUID-leaf.patch -Patch1004: 1004-i386-cpuid-Move-leaf-7-to-correct-group.patch - Patch1005: 1005-doc-update-AMD-SEV-to-include-Live-migration-flow.patch Patch1006: 1006-migration.json-add-AMD-SEV-specific-migration-parame.patch Patch1007: 1007-confidential-guest-support-introduce-ConfidentialGue.patch @@ -1910,7 +1900,10 @@ useradd -r -u 107 -g qemu -G kvm -d / -s /sbin/nologin \ %endif %changelog -* Tue Apr 19 2024 Yanjing Zhou - 2:8.2.0-12 +* Wed May 15 2024 mgb01105731 - 2:8.2.3-1 +- update to 8.2.3 + +* Fri Apr 19 2024 Yanjing Zhou - 2:8.2.0-12 - Patch1049: 1049-target-i386-Add-Hygon-Dhyana-v3-CPU-model.patch - Patch1050: 1050-target-i386-Add-new-Hygon-Dharma-CPU-model.patch (Add Hygon Dhyana-v3 and Dharma CPU model) @@ -2031,11 +2024,11 @@ useradd -r -u 107 -g qemu -G kvm -d / -s /sbin/nologin \ Remove subpackage of virtiofsd since QEMU upstream deleted the C impl of virtiofsd entirely. The alternative is to rewrite it separately in rust. -* Sat Mar 06 2024 Liyang Han - 15:7.2.6-8 +* Wed Mar 06 2024 Liyang Han - 15:7.2.6-8 - Patch0046: 0046-target-i386-sev-Fix-incompatibility-between-SEV-and-.patch (Fix incompatibility between SEV and CSV on the GET_ID API) -* Wed Jan 22 2024 Liyang Han - 15:7.2.6-7 +* Mon Jan 22 2024 Liyang Han - 15:7.2.6-7 - Patch0045: 0045-anolis-target-i386-sev-Add-support-for-reuse-ASID-fo.patch (Support reuse ASID for CSV guests) @@ -2051,7 +2044,7 @@ useradd -r -u 107 -g qemu -G kvm -d / -s /sbin/nologin \ - Patch0043: 0043-anolis-csv-i386-add-support-to-migrate-the-incoming-.patch (Support CSV3 live migration) -* Tue Nov 22 2023 Liyang Han - 15:7.2.6-4 +* Wed Nov 22 2023 Liyang Han - 15:7.2.6-4 - Patch0010: 0010-doc-update-AMD-SEV-to-include-Live-migration-flow.patch - Patch0011: 0011-migration.json-add-AMD-SEV-specific-migration-parame.patch - Patch0012: 0012-confidential-guest-support-introduce-ConfidentialGue.patch