0001-qemu-Add-missing-wacom-HID-descriptor.patch -p1
0003-qemu-Add-addition-environment-space-to-boot-loader-q.patch -p1
0006-chardev-connect-socket-to-a-spawned-command.patch -p1
0007-apic-fixup-fallthrough-to-PIC.patch -p1
0010-configure-Add-pkg-config-handling-for-libgcrypt.patch -p1
0001-qemu-Do-not-include-file-if-not-exists.patch -p1
mmap2.patch -p1
determinism.patch -p1
0001-tests-meson.build-use-relative-path-to-refer-to-file.patch -p1
0001-riscv-Set-5.4-as-minimum-kernel-version-for-riscv32.patch -p1
0001-acpi-tpm-Add-missing-device-identification-objects.patch -p1
0001-ppc-Include-asm-ptrace.h-for-pt_regs-struct-definiti.patch -p1
0001-Define-MAP_SYNC-and-MAP_SHARED_VALIDATE-on-needed-li.patch -p1
0001-vhost-vsock-detach-the-virqueue-element-in-case-of-e.patch -p1
0002-virtio-net-fix-map-leaking-on-error-during-receive.patch -p1
pvrdma.patch -p1
CVE-2021-4206.patch -p1
CVE-2021-4207.patch -p1
CVE-2022-35414.patch -p1
CVE-2021-3929.patch -p1
CVE-2021-4158.patch -p1
CVE-2022-0358.patch -p1
CVE-2022-0216_1.patch -p1
CVE-2022-0216_2.patch -p1
CVE-2021-3750-1.patch -p1
CVE-2021-3750-2.patch -p1
CVE-2021-3750-3.patch -p1
0001-use-uint32t-for-reply-queue-head-tail-values.patch -p1
0002_let_dma_memory_valid_function_take_MemTxAttrs_argument.patch -p1
0003_let_dma_memory_set_function_take_MemTxAttrs_argument.patch -p1
0004_let_dma_memory_rw_relaxed_function_take_MemTxAttrs_argument.patch -p1
0005_let_dma_memory_rw_function_take_MemTxAttrs_argument.patch -p1
0006_let_dma_memory_read_write_function_take_MemTxAttrs_argument.patch -p1
0007_let_dma_memory_map_function_take_MemTxAttrs_argument.patch -p1
0008_have_dma_buf_rw_function_take_a_void_pointer.patch -p1
0009_have_dma_buf_read_and_dma_buf_write_functions_take_a_void.patch -p1
0010_let_pci_dma_rw_function_take_MemTxAttrs_argument.patch -p1
0011_let_dma_buf_rw_function_take_MemTxAttrs_argument.patch -p1
0012_let_dma_buf_write_function_take_MemTxAttrs_argument.patch -p1
0013_let_dma_buf_read_function_take_MemTxAttrs_argument.patch -p1
0014_let_dma_buf_rw_function_propagate_MemTxResult.patch -p1
0015_let_st_pointer_dma_function_take_MemTxAttrs_argument.patch -p1
0016_let_ld_pointer_dma_function_take_MemTxAttrs_argument.patch -p1
0017_let_st_pointer_dma_function_propagate_MemTxResult.patch -p1
0018_let_ld_pointer_dma_function_propagate_MemTxResult.patch -p1
0019_let_st_pointer_pci_dma_function_take_MemTxAttrs_argument.patch -p1
0020_let_ld_pointer_pci_dma_function_take_MemTxAttrs_argument.patch -p1
0021_let_st_pointer_pci_dma_function_propagate_MemTxResult.patch -p1
0022_let_ld_pointer_pci_dma_function_propagate_MemTxResult.patch -p1
CVE-2021-3611_1.patch -p1
CVE-2021-3611_2.patch -p1
0001-net-tulip-Restrict-DMA-engine-to-memories.patch -p1
0001-softfloat-Extend-float_exception_flags-to-16-bits.patch -p1
0002-softfloat-Add-flag-specific-to-Inf-Inf.patch -p1
0003-softfloat-Add-flag-specific-to-Inf-0.patch -p1
0004-softfloat-Add-flags-specific-to-Inf-Inf-and-0-0.patch -p1
0005-softfloat-Add-flag-specific-to-signaling-nans.patch -p1
0006-target-ppc-Update-float_invalid_op_addsub-for-new-fl.patch -p1
0007-target-ppc-Update-float_invalid_op_mul-for-new-flags.patch -p1
0008-target-ppc-Update-float_invalid_op_div-for-new-flags.patch -p1
0009-target-ppc-Update-fmadd-for-new-flags.patch -p1
0010-target-ppc-Split-out-do_fmadd.patch -p1
0011-target-ppc-Fix-xs-max-min-cj-dp-to-use-VSX-registers.patch -p1
0012-target-ppc-Move-xs-max-min-cj-dp-to-decodetree.patch -p1
0013-target-ppc-fix-xscvqpdp-register-access.patch -p1
0014-target-ppc-move-xscvqpdp-to-decodetree.patch -p1
0015-target-ppc-ppc_store_fpscr-doesn-t-update-bits-0-to-.patch -p1
0016-target-ppc-Introduce-TRANS-FLAGS-macros.patch -p1
0017-target-ppc-Implement-Vector-Expand-Mask.patch -p1
0018-target-ppc-Implement-Vector-Extract-Mask.patch -p1
0019-target-ppc-Implement-Vector-Mask-Move-insns.patch -p1
0020-target-ppc-move-xs-n-madd-am-ds-p-xs-n-msub-am-ds-p-.patch -p1
0021-target-ppc-implement-xs-n-maddqp-o-xs-n-msubqp-o.patch -p1
CVE-2022-3165.patch -p1
CVE-2022-4144.patch -p1
0001-hw-display-qxl-Have-qxl_log_command-Return-early-if-.patch -p1
0001-hw-display-qxl-Pass-requested-buffer-size-to-qxl_phy.patch -p1
CVE-2023-0330.patch -p1
CVE-2023-3301.patch -p1
CVE-2023-3255.patch -p1
CVE-2023-2861.patch -p1
CVE-2020-14394.patch -p1
CVE-2023-3354.patch -p1
CVE-2023-3180.patch -p1
CVE-2021-3638.patch -p1
CVE-2023-1544.patch -p1
CVE-2023-5088.patch -p1
