use-fixed-data-path.patch
microvm-default-machine-type.patch
skip-meson-pc-bios.diff
linux-user-binfmt-P.diff
note-missing-module-pkg-name.diff
#
openbios-address-of-packet-member.patch
openbios-array-bounds.diff
openbios-use-source_date_epoch-in-makefile.patch
seabios-hppa-use-consistent-date-and-remove-hostname.patch
slof-remove-user-and-host-from-release-version.patch
slof-ensure-ld-is-called-with-C-locale.patch
spelling.diff
parallels.diff
acpi-fix-QEMU-crash-when-started-with-SLIC-table.patch
acpi-fix-OEM_ID-padding.patch
ati_2d-fix-buffer-overflow-in-ati_2d_blt-CVE-2021-3638.patch
ignore-roms-dependency-in-qtest.patch
acpi-validate-hotplug-selector-on-access-CVE-2021-4158.patch

# ubuntu patches
ubuntu/enable-svm-by-default.patch
ubuntu/define-ubuntu-machine-types.patch
ubuntu/pre-bionic-256k-ipxe-efi-roms.patch
ubuntu/avoid-fcf-clashing-with-i486.patch
ubuntu/lp-1952448-relax-skiboot-gcc-deprecation-errors.patch
ubuntu/lp-1959984-s390x-ipl-support-extended-kernel-command-line-size.patch
ubuntu/fix-virtiofsd-for-glibc2.35.patch
ubuntu/tcg-Remove-dh_alias-indirection-for-dh_typecode.patch
ubuntu/lp-1968258-block-rbd-fix-handling-of-holes-in-.bdrv_co.patch
ubuntu/lp-1968258-block-rbd-workaround-for-ceph-issue-53784.patch
ubuntu/lp-1970563-ui-vnc.c-Fixed-a-deadlock-bug.patch
CVE-2021-3507.patch
CVE-2021-3929.patch
CVE-2021-4206.patch
CVE-2021-4207.patch
CVE-2022-0358.patch
CVE-2022-26353.patch
CVE-2022-26354.patch
ubuntu/lp1970737-linux-aio-fix-unbalanced-plugged-counter-in-laio_io_.patch
ubuntu/lp1970737-linux-aio-explain-why-max-batch-is-checked-in-laio_i.patch
ubuntu/lp-1980896-0001-linux-user-ppc-Use-force_sig_fault.patch
ubuntu/lp-1980896-0002-linux-user-ppc-deliver-SIGTRAP-on-POWERPC_EXCP_TRAP.patch
ubuntu/lp-1980896-0003-tests-tcg-ppc64le-change-signal_save_restore_xer-to-.patch
ubuntu/lp-1981339-target-s390x-Remove-DISAS_GOTO_TB.patch
ubuntu/lp-1981339-target-s390x-Remove-DISAS_PC_STALE.patch
ubuntu/lp-1981339-target-s390x-Remove-DISAS_PC_STALE_NOCHAIN.patch
ubuntu/lp-1981339-target-s390x-Exit-tb-after-executing-ex_value.patch
CVE-2021-3750.patch
CVE-2022-0216-1.patch
CVE-2022-0216-2.patch
CVE-2022-3165.patch
ubuntu/lp1994002-migration-Read-state-once.patch
ubuntu/lp2009048-vfio_map_dma_einval_amd_iommu_1tb.patch
ubuntu/lp-1999885-s390x-tod-kvm-don-t-save-restore-the-TOD-in-PV-guest.patch
ubuntu/lp-2011832-target-ppc-Fix-xs-max-min-cj-dp-to-use-VSX-registers.patch
ubuntu/lp-2011832-target-mips-Fix-df_extract_val-and-df_extract_df-dfe.patch
ubuntu/lp-2011832-target-mips-Fix-FTRUNC_S-and-FTRUNC_U-trans-helper.patch
ubuntu/lp-2019766-target-arm-kvm-Retry-KVM_CREATE_VM-call-if-it-fails-.patch
ubuntu/allow-repeating-hot-unplug-requests.patch
CVE-2022-1050.patch
CVE-2022-4144-1.patch
CVE-2022-4144-2.patch
CVE-2022-4144-3.patch
CVE-2022-4144-4.patch
CVE-2022-4144-5.patch
CVE-2023-0330.patch
ubuntu/lp2025591-block-use-the-request-length-for-iov-alignment.patch
ubuntu/lp-1853307-virtio-gpu-do-not-byteswap-padding.patch
ubuntu/lp-1853307-linux-headers-update-to-5.16-rc1.patch
ubuntu/lp-1853307-update-linux-headers-Add-asm-riscv-kvm.h.patch
ubuntu/lp-1853307-linux-headers-Update-headers-to-v5.17-rc1.patch
ubuntu/lp-1853307-linux-headers-include-missing-changes-from-5.17.patch
ubuntu/lp-1853307-linux-headers-Update-to-v5.18-rc6.patch
ubuntu/lp-1853307-linux-headers-Add-vduse.h.patch
ubuntu/lp-1853307-kvm-add-support-for-boolean-statistics.patch
ubuntu/lp-1853307-hw-i386-pass-RNG-seed-via-setup_data-entry.patch
ubuntu/lp-1853307-s390x-pci-use-a-reserved-ID-for-the-default-PCI-grou.patch
ubuntu/lp-1853307-s390x-pci-add-supported-DT-information-to-clp-respon.patch
ubuntu/lp-1853307-configure-Add-Wno-gnu-variable-sized-type-not-at-end.patch
ubuntu/lp-1853307-Update-linux-headers-to-v6.0-rc4.patch
ubuntu/lp-1853307-s390x-pci-add-routine-to-get-host-function-handle-fr.patch
ubuntu/lp-1853307-s390x-pci-enable-for-load-store-interpretation.patch
ubuntu/lp-1853307-s390x-pci-don-t-fence-interpreted-devices-without-MS.patch
ubuntu/lp-1853307-s390x-pci-enable-adapter-event-notification-for-inte.patch
ubuntu/lp-1853307-s390x-pci-let-intercept-devices-have-separate-PCI-gr.patch
ubuntu/lp-1853307-s390x-pci-reflect-proper-maxstbl-for-groups-of-inter.patch
ubuntu/lp-1853307-s390x-pci-RPCIT-second-pass-when-mappings-exhausted.patch
ubuntu/lp-1853307-s390x-pci-shrink-DMA-aperture-to-be-bound-by-vfio-DM.patch
ubuntu/lp-1853307-s390x-pci-reset-ISM-passthrough-devices-on-shutdown-.patch
ubuntu/lp-2033957-virtiofsd-Fix-breakage-due-to-fuse_init_in.patch
CVE-2020-14394.patch
CVE-2023-1544.patch
CVE-2023-2861.patch
CVE-2023-3180.patch
CVE-2023-3255.patch
CVE-2023-3301.patch
CVE-2023-3354.patch
CVE-2023-5088.patch
CVE-2021-3611-01.patch
CVE-2021-3611-02.patch
CVE-2021-3611-03.patch
CVE-2021-3611-04.patch
CVE-2021-3611-05.patch
CVE-2021-3611-06.patch
CVE-2021-3611-07.patch
CVE-2021-3611-08.patch
CVE-2021-3611-09.patch
CVE-2021-3611-10.patch
CVE-2021-3611-11.patch
CVE-2021-3611-12.patch
CVE-2021-3611-13.patch
CVE-2021-3611-14.patch
CVE-2021-3611-15.patch
CVE-2021-3611-16.patch
CVE-2021-3611-17.patch
CVE-2021-3611-18.patch
CVE-2021-3611-19.patch
CVE-2021-3611-20.patch
CVE-2021-3611-21.patch
CVE-2021-3611-22.patch
CVE-2021-3611-23.patch
CVE-2021-3611-24.patch
ubuntu/lp-2046439-target-s390x-Split-out-gen_ri2.patch
ubuntu/lp-2046439-s390x-Fix-emulation-of-C-G-HRL.patch
ubuntu/lp2012763-maxcpus-too-low.patch
ubuntu/lp-2064914-properly-reset-tsc-on-reset.patch
ubuntu/lp-2065579-9pfs-allow-sockets.patch
CVE-2023-6683-1.patch
CVE-2023-6683-2.patch
CVE-2023-6693.patch
CVE-2024-24474.patch
ubuntu/lp1959966-kvm-secure-guest-exec-01.patch
ubuntu/lp1959966-kvm-secure-guest-exec-02.patch
ubuntu/lp1959966-kvm-secure-guest-exec-03.patch
ubuntu/lp1959966-kvm-secure-guest-exec-04.patch
ubuntu/lp1959966-kvm-secure-guest-exec-05.patch
ubuntu/lp1959966-kvm-secure-guest-exec-06.patch
ubuntu/lp1959966-kvm-secure-guest-exec-07.patch
ubuntu/lp1959966-kvm-secure-guest-exec-08.patch
ubuntu/lp1959966-kvm-secure-guest-exec-09.patch
ubuntu/lp1959966-kvm-secure-guest-exec-10.patch
ubuntu/lp1959966-kvm-secure-guest-exec-11.patch
ubuntu/lp1959966-kvm-secure-guest-exec-12.patch
ubuntu/lp1959966-kvm-secure-guest-exec-13.patch
ubuntu/lp1959966-kvm-secure-guest-exec-14.patch
ubuntu/lp1959966-kvm-secure-guest-exec-15.patch
ubuntu/lp1959966-kvm-secure-guest-exec-16.patch
ubuntu/lp1959966-kvm-secure-guest-exec-17.patch
ubuntu/lp1959966-kvm-secure-guest-exec-18.patch
ubuntu/lp1959966-kvm-secure-guest-exec-19.patch
ubuntu/lp1959966-kvm-secure-guest-exec-20.patch
ubuntu/lp1959966-kvm-secure-guest-exec-21.patch
ubuntu/lp1959966-kvm-secure-guest-exec-22.patch
ubuntu/lp1959966-kvm-secure-guest-exec-23.patch
ubuntu/lp1959966-kvm-secure-guest-exec-24.patch
ubuntu/lp1959966-kvm-secure-guest-exec-25.patch
ubuntu/lp1959966-kvm-secure-guest-exec-26.patch
ubuntu/lp1959966-kvm-secure-guest-exec-27.patch
ubuntu/lp1959966-kvm-secure-guest-exec-28.patch
ubuntu/lp1959966-kvm-secure-guest-exec-29.patch
ubuntu/lp1959966-kvm-secure-guest-exec-30.patch
ubuntu/lp1959966-kvm-secure-guest-exec-31.patch
ubuntu/lp1959966-kvm-secure-guest-exec-32.patch
ubuntu/lp1959966-kvm-secure-guest-exec-33.patch
ubuntu/lp1959966-kvm-secure-guest-exec-34.patch
CVE-2023-3019-pre1.patch
CVE-2023-3019-1.patch
CVE-2023-3019-2.patch
