use-fixed-data-path.patch
use-data-path.patch

# ubuntu patches
ubuntu/qemu-stable-2.11.1.patch
ubuntu/expose-vmx_qemu64cpu.patch
ubuntu/enable-svm-by-default.patch
ubuntu/define-ubuntu-machine-types.patch
ubuntu/guest-agent-freeze-hook-skip-dpkg-artifacts.patch
ubuntu/partial-SLOF-for-s390x-netboot-compilation.patch
ubuntu/pre-bionic-256k-ipxe-efi-roms.patch
ubuntu/lp1753826-memfd-fix-configure-test.patch
ubuntu/lp1739665-SSE-AVX-AVX512-cpu-features.patch
ubuntu/lp1740219-continuous-space-commpage.patch
ubuntu/lp-1761372-1-ppc-spapr-caps-Disallow-setting-workaround-for-spapr.patch
ubuntu/lp-1761372-2-target-ppc-Check-mask-when-setting-cap_ppc_safe_indi.patch
ubuntu/lp-1761372-3-ppc-spapr-caps-Add-support-for-custom-spapr_capabili.patch
ubuntu/lp-1761372-4-ppc-spapr-caps-Convert-cap-cfpc-to-custom-spapr-cap.patch
ubuntu/lp-1761372-5-ppc-spapr-caps-Convert-cap-sbbc-to-custom-spapr-cap.patch
ubuntu/lp-1761372-6-ppc-spapr-caps-Convert-cap-ibs-to-custom-spapr-cap.patch
ubuntu/lp-1761372-7-ppc-spapr-caps-Define-the-pseries-2.12-sxxm-machine-.patch
ubuntu/lp-1761372-extend-ubuntu-machine-types-ppc-2.11.patch
ubuntu/lp-1704312-1-hostmem-file-add-align-option.patch
ubuntu/lp-1704312-2-nvdimm-add-a-macro-for-property-label-size.patch
ubuntu/lp-1704312-3-nvdimm-add-unarmed-option.patch
ubuntu/lp-1762315-slirp-Add-domainname.patch
ubuntu/lp-1762854-scsi-disk-allow-customizing-the-SCSI-version.patch
ubuntu/lp-1762854-hw-scsi-support-SCSI-2-passthrough-without-PI.patch
ubuntu/lp-1763468-1-spapr-Allow-some-cases-where-we-can-t-set-VSMT-mode-.patch
ubuntu/lp-1763468-2-spapr-Adjust-default-VSMT-value-for-better-migration.patch
ubuntu/lp-1763468-3-spapr-set-vsmt-to-MAX-8-smp_threads.patch
ubuntu/lp-1763468-4-spapr-use-spapr-vsmt-to-compute-VCPU-ids.patch
ubuntu/lp-1763468-9-spapr-register-dummy-ICPs-later.patch
ubuntu/CVE-2017-16845.patch
ubuntu/CVE-2018-7550.patch
ubuntu/CVE-2018-7858.patch
ubuntu/CVE-2018-3639.patch
ubuntu/CVE-2018-3639-2.patch
ubuntu/CVE-2018-3639-3.patch
ubuntu/machine-type-hpb.patch
ubuntu/lp-1755912-qxl-fix-local-renderer-crash.patch
ubuntu/lp-1787408-target-ppc-extend-eieio-for-POWER9.patch
ubuntu/lp-1780773-s390x-cpumodels-add-z14-Model-ZR1.patch
ubuntu/lp-1789551-seccomp-set-the-seccomp-filter-to-all-threads.patch
ubuntu/lp-1790457-partial-s390x-linux-headers-update.patch
ubuntu/lp-1790457-s390x-kvm-add-etoken-facility.patch
ubuntu/lp-1787267-fix-en_us-vnc-pipe.patch
ubuntu/lp-1790901-partial-SLOF-for-s390x-netboot-2.11-to-3.0.patch
ubuntu/lp-1790901-0001-ccw-update-libc.patch
ubuntu/lp-1790901-0002-s390-ccw-move-auxiliary-IPL-data-to-separate-locatio.patch
ubuntu/lp-1790901-0101-s390-Do-not-pass-inofficial-IPL-type-to-the-guest.patch
ubuntu/lp-1790901-0102-s390-ccw-force-diag-308-subcode-to-unsigned-long.patch
ubuntu/lp-1790901-0201-pc-bios-s390-ccw-net-Split-up-net_load-into-init-loa.patch
ubuntu/lp-1790901-0202-pc-bios-s390-ccw-net-Use-diag308-to-reset-machine-be.patch
ubuntu/lp-1790901-0203-pc-bios-s390-ccw-net-Add-support-for-.INS-config-fil.patch
ubuntu/lp-1790901-0204-pc-bios-s390-ccw-net-Update-code-for-the-latest-chan.patch
ubuntu/lp-1790901-0205-pc-bios-s390-ccw-net-Add-support-for-pxelinux-style-.patch
ubuntu/lp-1790901-0206-pc-bios-s390-ccw-net-Try-to-load-pxelinux.cfg-file-a.patch
ubuntu/lp-1790901-0207-pc-bios-s390-ccw-Optimize-the-s390-netboot.img-for-s.patch
CVE-2018-10839.patch
CVE-2018-11806.patch
CVE-2018-12617.patch
CVE-2018-16847.patch
CVE-2018-17958.patch
CVE-2018-17962.patch
CVE-2018-17963.patch
CVE-2018-18849.patch
CVE-2018-18954.patch
CVE-2018-19364-1.patch
CVE-2018-19364-2.patch
ubuntu/lp1787405-0001-linux-headers-update.patch
ubuntu/lp1787405-0002-s390x-cpumodel-Set-up-CPU-model-for-AP-device-suppor.patch
ubuntu/lp1787405-0003-s390x-kvm-enable-AP-instruction-interpretation-for-g.patch
ubuntu/lp1787405-0004-s390x-ap-base-Adjunct-Processor-AP-object-model.patch
ubuntu/lp1787405-0005-s390x-vfio-ap-Introduce-VFIO-AP-device.patch
ubuntu/lp1787405-0006-s390-doc-detailed-specifications-for-AP-virtualizati.patch
ubuntu/lp-1806104-spapr_pci-Remove-unhelpful-pagesize-warning.patch
ubuntu/lp-1812384-s390x-Return-specification-exception.patch
ubuntu/lp-1809083-1-target-ppc-always-set-PPC_MEM_TLBIE-in-pre-2.8.patch
ubuntu/lp-1809083-3-spapr-don-t-advertise-radix-GTSE-if-max-compat.patch
ubuntu/lp-1818264-block-Fix-copy-on-read-crash-with-partial.patch
CVE-2018-16872.patch
CVE-2018-19489.patch
CVE-2019-3812.patch
CVE-2019-6778.patch
ubuntu/enable-md-clear.patch
CVE-2018-20815.patch
CVE-2019-9824.patch
ubuntu/lp-1830704-s390x-cpumodel-ignore-csske-for-expansion.patch
ubuntu/lp-1830243-s390-bios-Skip-bootmap-signature-entries.patch
ubuntu/lp1828495-0001-guidance-cpu-models.patch
ubuntu/lp1828495-0002-msr-new-msr-indices.patch
ubuntu/lp1828495-0003-cpuid-feature-ia32-arch-capabilities.patch
ubuntu/lp1828495-0004-cpuid-bit-for-wbnoinvd.patch
ubuntu/lp1828495-0005-new-cpu-model-for-icelake.patch
ubuntu/lp1828495-0006-update-headers-to-4.16-rc5.patch
ubuntu/lp1828495-0007-kvm-get-msr-feature-index_list.patch
ubuntu/lp1828495-0008-x86-msr-related-data-structure-changes.patch
ubuntu/lp1828495-0009-feature-wordS-arch-capabilities.patch
ubuntu/lp1828495-0010-use-kvm-get-msr-index-list.patch
ubuntu/lp1828495-0011-disable-arch-cap-when-no-msr.patch
ubuntu/lp1828495-0012-arch-capabilities-migratable.patch
ubuntu/lp1828495-0013-cascadelake-server.patch
ubuntu/lp1828495-0014-remove-cpuid-pconfig.patch
ubuntu/lp1828495-0015-remove-cpuid-intel_pt.patch
ubuntu/lp1828495-0016-no-ospke-on-some.patch
ubuntu/lp1828495-0017-target-i386-add-MDS-NO-feature.patch
ubuntu/lp-1832622-0001-target-ppc-Factor-out-the-parsing-in-kvmppc_get_cpu_.patch
ubuntu/lp-1832622-0002-target-ppc-spapr-Add-workaround-option-to-SPAPR_CAP_.patch
ubuntu/lp-1832622-0003-ppc-spapr-caps-Change-migration-macro-to-take-full-s.patch
ubuntu/lp-1832622-0004-target-ppc-spapr-Add-SPAPR_CAP_CCF_ASSIST.patch
ubuntu/lp-1840745-i386-define-the-AMD-amd-ssbd-CPUID-feature-bit.patch
ubuntu/lp-1840745-i386-Define-AMD-s-no-SSB-mitigation-needed.patch
ubuntu/lp-1836154-01-mimimal-header-sync-against-5.2.patch
ubuntu/lp-1836154-02-s390x-cpumodel-Miscellaneous-Instruction-Extensions-.patch
ubuntu/lp-1836154-03-s390x-cpumodel-msa9-facility.patch
ubuntu/lp-1836154-04-s390x-cpumodel-vector-enhancements.patch
ubuntu/lp-1836154-05-s390x-cpumodel-enhanced-sort-facility.patch
ubuntu/lp-1836154-06-s390x-cpumodel-add-Deflate-conversion-facility.patch
ubuntu/lp-1836154-07-s390x-cpumodel-add-gen15-defintions.patch
ubuntu/lp-1836154-08-s390x-cpumodel-wire-up-8561-and-8562-as-gen15-machin.patch
ubuntu/lp-1836154-09-s390-cpumodel-fix-description-for-the-new-vector-fac.patch
ubuntu/lp-1836154-s390x-cpumodel-remove-esort-from-the-default-model.patch
ubuntu/lp-1836154-s390x-cpumodel-also-change-name-of-vxbeh.patch
ubuntu/lp-1837869-block-Fix-flags-in-reopen-queue.patch
ubuntu/CVE-2019-11135-taa-no.patch
ubuntu/pschange-mce.patch
ubuntu/CVE-2019-12068.patch
ubuntu/CVE-2019-12155.patch
ubuntu/CVE-2019-13164.patch
ubuntu/CVE-2019-14378.patch
ubuntu/CVE-2019-15890.patch
ubuntu/lp-1842774-s390x-cpumodel-Add-the-z15-name-to-the-description-o.patch
ubuntu/lp-1847948-vfio-pci-Allow-mmap-of-MSIX-BAR.patch
ubuntu/lp-1847948-ppc-spapr-vfio-Turn-off-MSIX-emulation-for-VFIO-devi.patch
lp-1847948-vfio-pci-Relax-DMA-map-errors-for-MMIO-regions.patch
lp-1847948-vfio-Use-a-trace-point-when-a-RAM-section-cannot-be-.patch
lp1859527-virtio-blk-fix-out-of-bounds-access-to-bitmap-in-not.patch
CVE-2020-1711.patch
CVE-2020-7039-1.patch
CVE-2020-7039-2.patch
CVE-2020-7039-3.patch
CVE-2020-8608-1.patch
CVE-2020-8608-2.patch
ubuntu/lp-1847361-modules-load-upgrade.patch
CVE-2019-20382.patch
CVE-2020-1983.patch
lp1887525/0001-vhost-fix-memslot-limit-check.patch
lp1887525/0002-vhost-allow-backends-to-filter-memory-sections.patch
ubuntu/lp-1805256-async-use-explicit-mem-barriers-arm-only.patch
CVE-2020-10756.patch
CVE-2020-13253.patch
CVE-2020-13361.patch
CVE-2020-13362-1.patch
CVE-2020-13362-2.patch
CVE-2020-13362-3.patch
CVE-2020-13659.patch
CVE-2020-13754-1.patch
CVE-2020-13754-2.patch
CVE-2020-13765.patch
CVE-2020-15863.patch
CVE-2020-16092.patch
CVE-2020-12829-pre1.patch
CVE-2020-12829-pre2.patch
CVE-2020-12829-pre3.patch
CVE-2020-12829-pre4.patch
CVE-2020-12829-pre5.patch
CVE-2020-12829-pre6.patch
CVE-2020-12829-pre7.patch
CVE-2020-12829-pre8.patch
CVE-2020-12829-pre9.patch
CVE-2020-12829-pre10.patch
CVE-2020-12829.patch
CVE-2020-12829-2.patch
CVE-2020-12829-3.patch
CVE-2020-12829-4.patch
CVE-2020-12829-5.patch
CVE-2020-12829-6.patch
CVE-2020-12829-7.patch
CVE-2020-14364.patch
ubuntu/lp-1894942-virtio-ccw-fix-virtio_set_ind_atomic.patch
ubuntu/lp-1894942-s390x-pci-fix-set_ind_atomic.patch
CVE-2020-17380.patch
CVE-2020-25084.patch
CVE-2020-25624.patch
CVE-2020-25625.patch
CVE-2020-25723.patch
CVE-2020-27617.patch
CVE-2020-11947.patch
CVE-2020-15859.patch
CVE-2020-28916.patch
CVE-2020-29443-1.patch
CVE-2020-29443-2.patch
CVE-2021-20181.patch
CVE-2020-13754-3.patch
CVE-2020-13754-5.patch
CVE-2020-13754-6.patch
CVE-2020-13754-9.patch
CVE-2020-15469-1.patch
CVE-2020-15469-3.patch
CVE-2020-15469-4.patch
CVE-2020-15469-6.patch
CVE-2020-35504.patch
CVE-2020-35505.patch
CVE-2021-3392.patch
CVE-2021-3409-1.patch
CVE-2021-3409-2.patch
CVE-2021-3409-3.patch
CVE-2021-3409-4.patch
CVE-2021-3409-5.patch
CVE-2021-3416-1.patch
CVE-2021-3416-2.patch
CVE-2021-3416-3.patch
CVE-2021-3416-5.patch
CVE-2021-3416-6.patch
CVE-2021-3416-7.patch
CVE-2021-3416-8.patch
CVE-2021-3416-9.patch
CVE-2021-3416-10.patch
CVE-2021-3527-1.patch
CVE-2021-3527-2.patch
CVE-2021-20221.patch
CVE-2021-20257.patch
CVE-2021-3592-pre1.patch
CVE-2021-3592-1.patch
CVE-2021-3592-2.patch
CVE-2021-3592-3.patch
CVE-2021-3592-4.patch
CVE-2021-3593.patch
CVE-2021-3594.patch
CVE-2021-3595-1.patch
CVE-2021-3595-2.patch
CVE-2021-3682.patch
CVE-2021-3748.patch
CVE-2021-3930.patch
CVE-2021-20196-1.patch
CVE-2021-20196-2.patch
CVE-2021-20203.patch
CVE-2021-3507.patch
CVE-2021-4206.patch
CVE-2021-4207.patch
CVE-2022-26353.patch
CVE-2022-26354.patch
CVE-2021-3750.patch
CVE-2022-0216-1.patch
CVE-2022-0216-2.patch
