--- /dev/null
+--- qemu-7.2.10/subprojects/libvfio-user/lib/dma.c.orig 2024-03-04 17:26:53.000000000 +0100
++++ qemu-7.2.10/subprojects/libvfio-user/lib/dma.c 2024-04-03 21:26:55.422317782 +0200
+@@ -249,7 +249,7 @@ dma_map_region(dma_controller_t *dma, dm
+ region->info.vaddr = mmap_base + (region->offset - offset);
+
+ vfu_log(dma->vfu_ctx, LOG_DEBUG, "mapped DMA region iova=[%p, %p) "
+- "vaddr=%p page_size=%#lx mapping=[%p, %p)",
++ "vaddr=%p page_size=%#zx mapping=[%p, %p)",
+ region->info.iova.iov_base, iov_end(®ion->info.iova),
+ region->info.vaddr, region->info.page_size,
+ region->info.mapping.iov_base, iov_end(®ion->info.mapping));
+@@ -300,8 +300,8 @@ MOCK_DEFINE(dma_controller_add_region)(d
+
+ assert(dma != NULL);
+
+- snprintf(rstr, sizeof(rstr), "[%p, %p) fd=%d offset=%#lx prot=%#x",
+- dma_addr, (char *)dma_addr + size, fd, offset, prot);
++ snprintf(rstr, sizeof(rstr), "[%p, %p) fd=%d offset=%#"PRIx64" prot=%#x",
++ dma_addr, (char *)dma_addr + size, fd, (int64_t)offset, prot);
+
+ if (size > dma->max_size) {
+ vfu_log(dma->vfu_ctx, LOG_ERR, "DMA region size %zu > max %zu",
+@@ -317,7 +317,7 @@ MOCK_DEFINE(dma_controller_add_region)(d
+ region->info.iova.iov_len == size) {
+ if (offset != region->offset) {
+ vfu_log(dma->vfu_ctx, LOG_ERR, "bad offset for new DMA region "
+- "%s; existing=%#lx", rstr, region->offset);
++ "%s; existing=%#"PRIx64, rstr, (int64_t)(region->offset));
+ return ERROR_INT(EINVAL);
+ }
+ if (!fds_are_same_file(region->fd, fd)) {
+@@ -573,7 +573,7 @@ dma_controller_dirty_page_get(dma_contro
+ }
+
+ if (pgsize != dma->dirty_pgsize) {
+- vfu_log(dma->vfu_ctx, LOG_ERR, "bad page size %ld", pgsize);
++ vfu_log(dma->vfu_ctx, LOG_ERR, "bad page size %zu", pgsize);
+ return ERROR_INT(EINVAL);
+ }
+
+@@ -588,7 +588,7 @@ dma_controller_dirty_page_get(dma_contro
+ * receive.
+ */
+ if (size != (size_t)bitmap_size) {
+- vfu_log(dma->vfu_ctx, LOG_ERR, "bad bitmap size %ld != %ld", size,
++ vfu_log(dma->vfu_ctx, LOG_ERR, "bad bitmap size %zu != %zd", size,
+ bitmap_size);
+ return ERROR_INT(EINVAL);
+ }
+--- qemu-7.2.10/subprojects/libvfio-user/lib/libvfio-user.c.orig 2024-03-04 17:26:53.000000000 +0100
++++ qemu-7.2.10/subprojects/libvfio-user/lib/libvfio-user.c 2024-04-03 22:01:11.697844648 +0200
+@@ -183,16 +183,16 @@ debug_region_access(vfu_ctx_t *vfu_ctx,
+ case 2: val = *((uint16_t *)buf); break;
+ case 1: val = *((uint8_t *)buf); break;
+ default:
+- vfu_log(vfu_ctx, LOG_DEBUG, "region%zu: %s %zu bytes at %#lx",
++ vfu_log(vfu_ctx, LOG_DEBUG, "region%zu: %s %zu bytes at %#"PRIx64,
+ region, verb, count, offset);
+ return;
+ }
+
+ if (is_write) {
+- vfu_log(vfu_ctx, LOG_DEBUG, "region%zu: wrote %#zx to (%#lx:%zu)",
++ vfu_log(vfu_ctx, LOG_DEBUG, "region%zu: wrote %#"PRIx64" to (%#"PRIx64":%zu)",
+ region, val, offset, count);
+ } else {
+- vfu_log(vfu_ctx, LOG_DEBUG, "region%zu: read %#zx from (%#lx:%zu)",
++ vfu_log(vfu_ctx, LOG_DEBUG, "region%zu: read %#"PRIx64" from (%#"PRIx64":%zu)",
+ region, val, offset, count);
+ }
+ }
+@@ -235,7 +235,7 @@ region_access(vfu_ctx_t *vfu_ctx, size_t
+
+ out:
+ if (ret != (ssize_t)count) {
+- vfu_log(vfu_ctx, LOG_DEBUG, "region%zu: %s (%#lx:%zu) failed: %m",
++ vfu_log(vfu_ctx, LOG_DEBUG, "region%zu: %s (%#"PRIx64":%zu) failed: %m",
+ region, verb, offset, count);
+ } else {
+ debug_region_access(vfu_ctx, region, buf, count, offset, is_write);
+@@ -266,7 +266,7 @@ is_valid_region_access(vfu_ctx_t *vfu_ct
+
+ if (cmd == VFIO_USER_REGION_WRITE && size - sizeof(*ra) != ra->count) {
+ vfu_log(vfu_ctx, LOG_ERR, "region write count too small: "
+- "expected %lu, got %u", size - sizeof(*ra), ra->count);
++ "expected %zu, got %u", size - sizeof(*ra), ra->count);
+ return false;
+ }
+
+@@ -278,7 +278,7 @@ is_valid_region_access(vfu_ctx_t *vfu_ct
+ }
+
+ if (satadd_u64(ra->offset, ra->count) > vfu_ctx->reg_info[index].size) {
+- vfu_log(vfu_ctx, LOG_ERR, "out of bounds region access %#lx-%#lx "
++ vfu_log(vfu_ctx, LOG_ERR, "out of bounds region access %#"PRIx64"-%"PRIx64" "
+ "(size %u)", ra->offset, ra->offset + ra->count,
+ vfu_ctx->reg_info[index].size);
+
+@@ -337,7 +337,7 @@ handle_region_access(vfu_ctx_t *vfu_ctx,
+
+ ret = region_access(vfu_ctx, in_ra->region, buf, in_ra->count,
+ in_ra->offset, msg->hdr.cmd == VFIO_USER_REGION_WRITE);
+- if (ret != in_ra->count) {
++ if ((unsigned long)ret != (unsigned long)(in_ra->count)) {
+ /* FIXME we should return whatever has been accessed, not an error */
+ if (ret >= 0) {
+ ret = ERROR_INT(EINVAL);
+@@ -671,7 +671,7 @@ handle_dma_map(vfu_ctx_t *vfu_ctx, vfu_m
+ return ERROR_INT(EINVAL);
+ }
+
+- snprintf(rstr, sizeof(rstr), "[%#lx, %#lx) offset=%#lx flags=%#x",
++ snprintf(rstr, sizeof(rstr), "[%#"PRIx64", %#"PRIx64") offset=%#"PRIx64" flags=%#x",
+ dma_map->addr, dma_map->addr + dma_map->size, dma_map->offset,
+ dma_map->flags);
+
+@@ -700,7 +700,7 @@ handle_dma_map(vfu_ctx_t *vfu_ctx, vfu_m
+ }
+ }
+
+- ret = dma_controller_add_region(vfu_ctx->dma, (void *)dma_map->addr,
++ ret = dma_controller_add_region(vfu_ctx->dma, (void *)(uintptr_t)dma_map->addr,
+ dma_map->size, fd, dma_map->offset,
+ prot);
+ if (ret < 0) {
+@@ -747,7 +747,7 @@ is_valid_unmap(vfu_ctx_t *vfu_ctx, vfu_m
+
+ case VFIO_DMA_UNMAP_FLAG_ALL:
+ if (dma_unmap->addr || dma_unmap->size) {
+- vfu_log(vfu_ctx, LOG_ERR, "bad addr=%#lx or size=%#lx, expected "
++ vfu_log(vfu_ctx, LOG_ERR, "bad addr=%#"PRIx64" or size=%#"PRIx64", expected "
+ "both to be zero", dma_unmap->addr, dma_unmap->size);
+ errno = EINVAL;
+ return false;
+@@ -791,7 +791,7 @@ handle_dma_unmap(vfu_ctx_t *vfu_ctx, vfu
+ return -1;
+ }
+
+- snprintf(rstr, sizeof(rstr), "[%#lx, %#lx) flags=%#x",
++ snprintf(rstr, sizeof(rstr), "[%#"PRIx64", %#"PRIx64") flags=%#x",
+ dma_unmap->addr, dma_unmap->addr + dma_unmap->size, dma_unmap->flags);
+
+ vfu_log(vfu_ctx, LOG_DEBUG, "removing DMA region %s", rstr);
+@@ -817,7 +817,7 @@ handle_dma_unmap(vfu_ctx_t *vfu_ctx, vfu
+ if (dma_unmap->flags & VFIO_DMA_UNMAP_FLAG_GET_DIRTY_BITMAP) {
+ memcpy(msg->out.iov.iov_base + sizeof(*dma_unmap), dma_unmap->bitmap, sizeof(*dma_unmap->bitmap));
+ ret = dma_controller_dirty_page_get(vfu_ctx->dma,
+- (vfu_dma_addr_t)dma_unmap->addr,
++ (vfu_dma_addr_t)(uintptr_t)dma_unmap->addr,
+ dma_unmap->size,
+ dma_unmap->bitmap->pgsize,
+ dma_unmap->bitmap->size,
+@@ -829,7 +829,7 @@ handle_dma_unmap(vfu_ctx_t *vfu_ctx, vfu
+ }
+
+ ret = dma_controller_remove_region(vfu_ctx->dma,
+- (void *)dma_unmap->addr,
++ (void *)(uintptr_t)dma_unmap->addr,
+ dma_unmap->size,
+ vfu_ctx->dma_unregister,
+ vfu_ctx);
+@@ -924,7 +924,7 @@ handle_dirty_pages_get(vfu_ctx_t *vfu_ct
+ range_out = msg->out.iov.iov_base + sizeof(*dirty_pages_out);
+ memcpy(range_out, range_in, sizeof(*range_out));
+ ret = dma_controller_dirty_page_get(vfu_ctx->dma,
+- (vfu_dma_addr_t)range_in->iova,
++ (vfu_dma_addr_t)(uintptr_t)range_in->iova,
+ range_in->size,
+ range_in->bitmap.pgsize,
+ range_in->bitmap.size, bitmap_out);
+@@ -939,7 +939,7 @@ handle_dirty_pages_get(vfu_ctx_t *vfu_ct
+ }
+ } else {
+ vfu_log(vfu_ctx, LOG_ERR,
+- "dirty pages: get [%#lx, %#lx): buffer too small (%u < %lu)",
++ "dirty pages: get [%#"PRIx64", %#"PRIx64"): buffer too small (%u < %zu)",
+ range_in->iova, range_in->iova + range_in->size,
+ dirty_pages_in->argsz, argsz);
+ }
+@@ -2124,7 +2124,7 @@ vfu_dma_transfer(vfu_ctx_t *vfu_ctx, enu
+ while (remaining > 0) {
+ int ret;
+
+- dma_req->addr = (uint64_t)sg->dma_addr + count;
++ dma_req->addr = (uint64_t)(uintptr_t)sg->dma_addr + count;
+ dma_req->count = MIN(remaining, vfu_ctx->client_max_data_xfer_size);
+
+ if (cmd == VFIO_USER_DMA_WRITE) {
+@@ -2154,7 +2154,7 @@ vfu_dma_transfer(vfu_ctx_t *vfu_ctx, enu
+ if (dma_reply->addr != dma_req->addr ||
+ dma_reply->count != dma_req->count) {
+ vfu_log(vfu_ctx, LOG_ERR, "bad reply to DMA transfer: "
+- "request:%#lx,%lu reply:%#lx,%lu",
++ "request:%#"PRIx64",%"PRIu64" reply:%#"PRIx64",%"PRIu64,
+ dma_req->addr, dma_req->count,
+ dma_reply->addr, dma_reply->count);
+ free(rbuf);
+--- qemu-7.2.10/subprojects/libvfio-user/lib/migration.c.orig 2024-03-04 17:26:53.000000000 +0100
++++ qemu-7.2.10/subprojects/libvfio-user/lib/migration.c 2024-04-03 22:17:23.329247535 +0200
+@@ -413,7 +413,7 @@ MOCK_DEFINE(migration_region_access_regi
+ case offsetof(struct vfio_user_migration_info, device_state):
+ if (count != sizeof(migr->info.device_state)) {
+ vfu_log(vfu_ctx, LOG_ERR,
+- "bad device_state access size %ld", count);
++ "bad device_state access size %zd", count);
+ return ERROR_INT(EINVAL);
+ }
+ device_state = (uint32_t *)buf;
+@@ -443,7 +443,7 @@ MOCK_DEFINE(migration_region_access_regi
+ case offsetof(struct vfio_user_migration_info, pending_bytes):
+ if (count != sizeof(migr->info.pending_bytes)) {
+ vfu_log(vfu_ctx, LOG_ERR,
+- "bad pending_bytes access size %ld", count);
++ "bad pending_bytes access size %zd", count);
+ return ERROR_INT(EINVAL);
+ }
+ ret = handle_pending_bytes(vfu_ctx, migr, (uint64_t *)buf, is_write);
+@@ -451,7 +451,7 @@ MOCK_DEFINE(migration_region_access_regi
+ case offsetof(struct vfio_user_migration_info, data_offset):
+ if (count != sizeof(migr->info.data_offset)) {
+ vfu_log(vfu_ctx, LOG_ERR,
+- "bad data_offset access size %ld", count);
++ "bad data_offset access size %zd", count);
+ return ERROR_INT(EINVAL);
+ }
+ ret = handle_data_offset(vfu_ctx, migr, (uint64_t *)buf, is_write);
+@@ -459,14 +459,14 @@ MOCK_DEFINE(migration_region_access_regi
+ case offsetof(struct vfio_user_migration_info, data_size):
+ if (count != sizeof(migr->info.data_size)) {
+ vfu_log(vfu_ctx, LOG_ERR,
+- "bad data_size access size %ld", count);
++ "bad data_size access size %zd", count);
+ return ERROR_INT(EINVAL);
+ }
+ ret = handle_data_size(vfu_ctx, migr, (uint64_t *)buf, is_write);
+ break;
+ default:
+- vfu_log(vfu_ctx, LOG_ERR, "bad migration region register offset %#lx",
+- pos);
++ vfu_log(vfu_ctx, LOG_ERR, "bad migration region register offset %#"PRIx64,
++ (int64_t)pos);
+ return ERROR_INT(EINVAL);
+ }
+ return ret;
+@@ -502,8 +502,8 @@ migration_region_access(vfu_ctx_t *vfu_c
+ * any access to the data region properly.
+ */
+ vfu_log(vfu_ctx, LOG_WARNING,
+- "bad access to dead space %#lx-%#lx in migration region",
+- pos, pos + count - 1);
++ "bad access to dead space %#"PRIx64"-%#"PRIx64" in migration region",
++ (int64_t)pos, (int64_t)(pos + count - 1));
+ return ERROR_INT(EINVAL);
+ }
+
+--- qemu-7.2.10/subprojects/libvfio-user/lib/pci.c.orig 2024-03-04 17:26:53.000000000 +0100
++++ qemu-7.2.10/subprojects/libvfio-user/lib/pci.c 2024-04-03 22:39:07.265516839 +0200
+@@ -264,8 +264,8 @@ pci_hdr_write(vfu_ctx_t *vfu_ctx, const
+ ret = handle_erom_write(vfu_ctx, cfg_space, buf);
+ break;
+ default:
+- vfu_log(vfu_ctx, LOG_ERR, "PCI config write %#lx not handled",
+- offset);
++ vfu_log(vfu_ctx, LOG_ERR, "PCI config write %#"PRIx64" not handled",
++ (int64_t)offset);
+ ret = ERROR_INT(EINVAL);
+ }
+
+@@ -315,7 +315,7 @@ pci_nonstd_access(vfu_ctx_t *vfu_ctx, ch
+
+ if (is_write) {
+ vfu_log(vfu_ctx, LOG_ERR, "no callback for write to config space "
+- "offset %lu size %zu", offset, count);
++ "offset %"PRId64" size %zu", (int64_t)offset, count);
+ return ERROR_INT(EINVAL);
+ }
+
+@@ -429,8 +429,8 @@ pci_config_space_access(vfu_ctx_t *vfu_c
+ size = pci_config_space_next_segment(vfu_ctx, count, offset, is_write,
+ &cb);
+ if (cb == NULL) {
+- vfu_log(vfu_ctx, LOG_ERR, "bad write to PCI config space %#lx-%#lx",
+- offset, offset + count - 1);
++ vfu_log(vfu_ctx, LOG_ERR, "bad write to PCI config space %#"PRIx64"-%#"PRIx64,
++ (int64_t)offset, (int64_t)(offset + count - 1));
+ return size;
+ }
+
+--- qemu-7.2.10/subprojects/libvfio-user/lib/pci_caps.c.orig 2024-03-04 17:26:53.000000000 +0100
++++ qemu-7.2.10/subprojects/libvfio-user/lib/pci_caps.c 2024-04-03 22:41:43.031339650 +0200
+@@ -483,7 +483,7 @@ cap_place(vfu_ctx_t *vfu_ctx, struct pci
+
+ if (cap->off != 0) {
+ if (cap->off < PCI_STD_HEADER_SIZEOF) {
+- vfu_log(vfu_ctx, LOG_ERR, "invalid offset %#lx for capability "
++ vfu_log(vfu_ctx, LOG_ERR, "invalid offset %#zx for capability "
+ "%u (%s)", cap->off, cap->id, cap->name);
+ return ERROR_INT(EINVAL);
+ }
+@@ -516,7 +516,7 @@ cap_place(vfu_ctx_t *vfu_ctx, struct pci
+
+ if (cap->off + cap->size > pci_config_space_size(vfu_ctx)) {
+ vfu_log(vfu_ctx, LOG_ERR, "no config space left for capability "
+- "%u (%s) of size %zu bytes at offset %#lx", cap->id,
++ "%u (%s) of size %zu bytes at offset %#zx", cap->id,
+ cap->name, cap->size, cap->off);
+ return ERROR_INT(ENOSPC);
+ }
+@@ -547,7 +547,7 @@ ext_cap_place(vfu_ctx_t *vfu_ctx, struct
+
+ if (cap->off != 0) {
+ if (cap->off < PCI_CFG_SPACE_SIZE) {
+- vfu_log(vfu_ctx, LOG_ERR, "invalid offset %#lx for capability "
++ vfu_log(vfu_ctx, LOG_ERR, "invalid offset %#zx for capability "
+ "%u (%s)", cap->off, cap->id, cap->name);
+ return ERROR_INT(EINVAL);
+ }
+@@ -581,7 +581,7 @@ ext_cap_place(vfu_ctx_t *vfu_ctx, struct
+
+ if (cap->off + cap->size > pci_config_space_size(vfu_ctx)) {
+ vfu_log(vfu_ctx, LOG_ERR, "no config space left for capability "
+- "%u (%s) of size %zu bytes at offset %#lx", cap->id,
++ "%u (%s) of size %zu bytes at offset %#zx", cap->id,
+ cap->name, cap->size, cap->off);
+ return ERROR_INT(ENOSPC);
+ }
+@@ -700,7 +700,7 @@ vfu_pci_add_capability(vfu_ctx_t *vfu_ct
+
+ if (cap.off + cap.size >= pci_config_space_size(vfu_ctx)) {
+ vfu_log(vfu_ctx, LOG_DEBUG,
+- "PCI capability past end of config space, %#lx >= %#lx",
++ "PCI capability past end of config space, %#zx >= %#zx",
+ cap.off + cap.size, pci_config_space_size(vfu_ctx));
+ return ERROR_INT(EINVAL);
+ }
+--- qemu-7.2.10/subprojects/libvfio-user/lib/tran.c.orig 2024-03-04 17:26:53.000000000 +0100
++++ qemu-7.2.10/subprojects/libvfio-user/lib/tran.c 2024-04-03 22:42:30.844413958 +0200
+@@ -176,7 +176,7 @@ recv_version(vfu_ctx_t *vfu_ctx, uint16_
+
+ if (msg.in.iov.iov_len < sizeof(*cversion)) {
+ vfu_log(vfu_ctx, LOG_ERR,
+- "msg%#hx: VFIO_USER_VERSION: invalid size %lu",
++ "msg%#hx: VFIO_USER_VERSION: invalid size %zu",
+ *msg_idp, msg.in.iov.iov_len);
+ ret = EINVAL;
+ goto out;
+--- qemu-7.2.10/subprojects/libvfio-user/samples/client.c.orig 2024-03-04 17:26:53.000000000 +0100
++++ qemu-7.2.10/subprojects/libvfio-user/samples/client.c 2024-04-04 06:27:19.254657097 +0200
+@@ -110,7 +110,7 @@ send_version(int sock)
+ "\"max_msg_fds\":%u,"
+ "\"max_data_xfer_size\":%u,"
+ "\"migration\":{"
+- "\"pgsize\":%zu"
++ "\"pgsize\":%lu"
+ "}"
+ "}"
+ "}", CLIENT_MAX_FDS, CLIENT_MAX_DATA_XFER_SIZE, sysconf(_SC_PAGESIZE));
+@@ -155,7 +155,7 @@ recv_version(int sock, int *server_max_f
+ }
+
+ if (vlen < sizeof(*sversion)) {
+- errx(EXIT_FAILURE, "VFIO_USER_VERSION: invalid size %lu", vlen);
++ errx(EXIT_FAILURE, "VFIO_USER_VERSION: invalid size %zu", vlen);
+ }
+
+ if (sversion->major != LIB_VFIO_USER_MAJOR) {
+@@ -290,7 +290,7 @@ mmap_sparse_areas(int *fds, struct vfio_
+ sparse->areas[i].offset);
+ if (addr == MAP_FAILED) {
+ err(EXIT_FAILURE,
+- "failed to mmap sparse region #%lu in %s (%#llx-%#llx)",
++ "failed to mmap sparse region #%zu in %s (%#llx-%#llx)",
+ i, buf, sparse->areas[i].offset,
+ sparse->areas[i].offset + sparse->areas[i].size - 1);
+ }
+@@ -330,7 +330,7 @@ get_device_region_info(int sock, uint32_
+
+ cap_sz = region_info->argsz - sizeof(struct vfio_region_info);
+ printf("client: %s: region_info[%d] offset %#llx flags %#x size %llu "
+- "cap_sz %lu #FDs %lu\n", __func__, index, region_info->offset,
++ "cap_sz %zu #FDs %zu\n", __func__, index, region_info->offset,
+ region_info->flags, region_info->size, cap_sz, nr_fds);
+ if (cap_sz) {
+ struct vfio_region_info_cap_sparse_mmap *sparse = NULL;
+@@ -487,14 +487,14 @@ access_region(int sock, int region, bool
+ recv_data, recv_data_len, NULL, 0);
+ pthread_mutex_unlock(&mutex);
+ if (ret != 0) {
+- warn("failed to %s region %d %#lx-%#lx",
++ warn("failed to %s region %d %#"PRIx64"-%#"PRIx64,
+ is_write ? "write to" : "read from", region, offset,
+ offset + data_len - 1);
+ free(recv_data);
+ return ret;
+ }
+ if (recv_data->count != data_len) {
+- warnx("bad %s data count, expected=%lu, actual=%d",
++ warnx("bad %s data count, expected=%zu, actual=%d",
+ is_write ? "write" : "read", data_len,
+ recv_data->count);
+ free(recv_data);
+@@ -585,8 +585,8 @@ handle_dma_write(int sock, struct vfio_u
+ c = pwrite(dma_region_fds[i], data, dma_access.count, offset);
+
+ if (c != (ssize_t)dma_access.count) {
+- err(EXIT_FAILURE, "failed to write to fd=%d at [%#lx-%#lx)",
+- dma_region_fds[i], offset, offset + dma_access.count);
++ err(EXIT_FAILURE, "failed to write to fd=%d at [%#"PRIx64"-%#"PRIx64")",
++ dma_region_fds[i], (int64_t)offset, (int64_t)(offset + dma_access.count));
+ }
+ break;
+ }
+@@ -640,8 +640,8 @@ handle_dma_read(int sock, struct vfio_us
+ c = pread(dma_region_fds[i], data, dma_access.count, offset);
+
+ if (c != (ssize_t)dma_access.count) {
+- err(EXIT_FAILURE, "failed to read from fd=%d at [%#lx-%#lx)",
+- dma_region_fds[i], offset, offset + dma_access.count);
++ err(EXIT_FAILURE, "failed to read from fd=%d at [%#"PRIx64"-%#"PRIx64")",
++ dma_region_fds[i], (int64_t)offset, (int64_t)(offset + dma_access.count));
+ }
+ break;
+ }
+@@ -706,7 +706,7 @@ get_dirty_bitmap(int sock, struct vfio_u
+ err(EXIT_FAILURE, "failed to get dirty page bitmap");
+ }
+
+- printf("client: %s: %#lx-%#lx\t%#x\n", __func__, range->iova,
++ printf("client: %s: %#"PRIx64"-%#"PRIx64"\t%#x\n", __func__, range->iova,
+ range->iova + range->size - 1, bitmap[0]);
+
+ free(data);
+@@ -900,7 +900,7 @@ migrate_from(int sock, size_t *nr_iters,
+ _nr_iters += do_migrate(sock, 1, (*migr_iters) + _nr_iters);
+ if (_nr_iters != 2) {
+ errx(EXIT_FAILURE,
+- "expected 2 iterations instead of %ld while in stop-and-copy state",
++ "expected 2 iterations instead of %zd while in stop-and-copy state",
+ _nr_iters);
+ }
+
+@@ -1000,7 +1000,7 @@ migrate_to(char *old_sock_path, int *ser
+ * TODO write half of migration data via regular write and other half via
+ * memopy map.
+ */
+- printf("client: writing migration device data %#lx-%#lx\n",
++ printf("client: writing migration device data %#"PRIx64"-%#"PRIx64"\n",
+ data_offset, data_offset + migr_iters[i].iov_len - 1);
+ ret = access_region(sock, VFU_PCI_DEV_MIGR_REGION_IDX, true,
+ data_offset, migr_iters[i].iov_base,
+--- qemu-7.2.10/subprojects/libvfio-user/samples/server.c.orig 2024-03-04 17:26:53.000000000 +0100
++++ qemu-7.2.10/subprojects/libvfio-user/samples/server.c 2024-04-04 16:58:57.346435682 +0200
+@@ -93,8 +93,8 @@ bar0_access(vfu_ctx_t *vfu_ctx, char * c
+ struct server_data *server_data = vfu_get_private(vfu_ctx);
+
+ if (count != sizeof(time_t) || offset != 0) {
+- vfu_log(vfu_ctx, LOG_ERR, "bad BAR0 access %#lx-%#lx",
+- offset, offset + count - 1);
++ vfu_log(vfu_ctx, LOG_ERR, "bad BAR0 access %#"PRIx64"-%#"PRIx64,
++ (int64_t)offset, (int64_t)(offset + count - 1));
+ errno = EINVAL;
+ return -1;
+ }
+@@ -123,8 +123,8 @@ bar1_access(vfu_ctx_t *vfu_ctx, char * c
+ struct server_data *server_data = vfu_get_private(vfu_ctx);
+
+ if (offset + count > server_data->bar1_size) {
+- vfu_log(vfu_ctx, LOG_ERR, "bad BAR1 access %#lx-%#lx",
+- offset, offset + count - 1);
++ vfu_log(vfu_ctx, LOG_ERR, "bad BAR1 access %#"PRIx64"-%#"PRIx64,
++ (int64_t)offset, (int64_t)(offset + count - 1));
+ errno = EINVAL;
+ return -1;
+ }
+@@ -353,7 +353,7 @@ migration_write_data(vfu_ctx_t *vfu_ctx,
+ assert(data != NULL);
+
+ if (offset != 0 || size < server_data->bar1_size) {
+- vfu_log(vfu_ctx, LOG_DEBUG, "XXX bad migration data write %#lx-%#lx",
++ vfu_log(vfu_ctx, LOG_DEBUG, "XXX bad migration data write %#"PRIx64"-%#"PRIx64,
+ offset, offset + size - 1);
+ errno = EINVAL;
+ return -1;
+--- qemu-7.2.10/subprojects/libvfio-user/test/unit-tests.c.orig 2024-03-04 17:26:53.000000000 +0100
++++ qemu-7.2.10/subprojects/libvfio-user/test/unit-tests.c 2024-04-04 16:59:18.846711984 +0200
+@@ -161,8 +161,8 @@ static int
+ check_dma_info(const LargestIntegralType value,
+ const LargestIntegralType cvalue)
+ {
+- vfu_dma_info_t *info = (vfu_dma_info_t *)value;
+- vfu_dma_info_t *cinfo = (vfu_dma_info_t *)cvalue;
++ vfu_dma_info_t *info = (vfu_dma_info_t *)(uintptr_t)value;
++ vfu_dma_info_t *cinfo = (vfu_dma_info_t *)(uintptr_t)cvalue;
+
+ return info->iova.iov_base == cinfo->iova.iov_base &&
+ info->iova.iov_len == cinfo->iova.iov_len &&
+@@ -330,7 +330,7 @@ test_dma_addr_to_sgl(void **state UNUSED
+ assert_int_equal(1, ret);
+ assert_int_equal(r->info.iova.iov_base, sg[0].dma_addr);
+ assert_int_equal(0, sg[0].region);
+- assert_int_equal(0x2000 - (unsigned long long)r->info.iova.iov_base,
++ assert_int_equal(0x2000 - (unsigned long long)(uintptr_t)r->info.iova.iov_base,
+ sg[0].offset);
+ assert_int_equal(0x400, sg[0].length);
+ assert_true(vfu_sg_is_mappable(&vfu_ctx, &sg[0]));
+--- qemu-7.2.10/subprojects/libvfio-user/lib/tran_pipe.c.orig 2024-03-04 17:26:53.000000000 +0100
++++ qemu-7.2.10/subprojects/libvfio-user/lib/tran_pipe.c 2024-04-04 17:01:32.872219201 +0200
+@@ -83,7 +83,7 @@ tran_pipe_send_iovec(int fd, uint16_t ms
+ return ERROR_INT(ECONNRESET);
+ }
+ return -1;
+- } else if (ret < hdr.msg_size) {
++ } else if ((uint32_t)ret < hdr.msg_size) {
+ return ERROR_INT(ECONNRESET);
+ }
+
# Conditional build:
%bcond_without sdl # SDL UI and audio support
%bcond_without opengl # Don't require GL deps
+%bcond_with canokey # CanoKey support
%bcond_with ceph # Ceph/RBD support
%bcond_without glusterfs # GlusterFS backend
%bcond_without rdma # RDMA-based migration support
%bcond_without iscsi # iscsi support
%bcond_without libnfs # NFS support
%bcond_without multipath # Multipath support
+%bcond_with pipewire # pipewire support
%bcond_without pmem # libpmem (persistent memory) support
%bcond_without seccomp # seccomp support
%bcond_without usbredir # usb network redirection support
%bcond_without system_seabios # system seabios binary
%bcond_without snappy # snappy compression library
%bcond_without user_static # build linux-user static packages
+%bcond_with vfio_user # vfio-user server support
%bcond_with lttng # lttng-ust trace backend support [needs update]
%bcond_without systemtap # SystemTap/dtrace trace backend support
%bcond_without virgl # build virgl support
Summary: QEMU CPU Emulator
Summary(pl.UTF-8): QEMU - emulator procesora
Name: qemu
-Version: 8.2.2
+Version: 8.2.4
Release: 1
License: GPL v2, BSD (edk2 firmware files)
Group: Applications/Emulators
Source0: https://download.qemu.org/%{name}-%{version}.tar.xz
-# Source0-md5: e43091262671c1728b09522932b75b1d
+# Source0-md5: aa5c2f004d513b746f25a00cfec8eaa5
# Loads kvm kernel modules at boot
Source3: kvm-modules-load.conf
# Creates /dev/kvm
Source12: 99-%{name}-guest-agent.rules
Source13: %{name}-guest-agent.init
Source14: %{name}-guest-agent.logrotate
-Patch3: %{name}-xattr.patch
-Patch4: libjpeg-boolean.patch
+Patch0: %{name}-cflags.patch
+Patch2: %{name}-xattr.patch
+Patch3: libjpeg-boolean.patch
Patch5: %{name}-u2f-emu.patch
Patch6: %{name}-linux-mount.patch
+Patch7: libvfio-user-types.patch
+Patch8: libvfio-user-alloca.patch
URL: https://www.qemu.org/
%{?with_opengl:BuildRequires: Mesa-libgbm-devel}
%{?with_opengl:BuildRequires: OpenGL-GLX-devel}
%{?with_sdl:BuildRequires: SDL2-devel >= 2.0}
%{?with_sdl:BuildRequires: SDL2_image-devel >= 2.0}
BuildRequires: alsa-lib-devel
+BuildRequires: bison
%{?with_brlapi:BuildRequires: brlapi-devel}
BuildRequires: bzip2-devel
+%{?with_canokey:BuildRequires: canokey-qemu-devel}
BuildRequires: capstone-devel >= 4.0
%{?with_ceph:BuildRequires: ceph-devel >= 12}
BuildRequires: curl-devel >= 7.29.0
BuildRequires: cyrus-sasl-devel >= 2
BuildRequires: daxctl-devel >= 57
+BuildRequires: flex
BuildRequires: gcc >= 6:7.4
BuildRequires: gettext-tools
-BuildRequires: glib2-devel >= 1:2.64
+BuildRequires: glib2-devel >= 1:2.75.3
# minimal is 3.4 but new features are used up to 6
%{?with_glusterfs:BuildRequires: glusterfs-devel >= 6}
BuildRequires: gnutls-devel >= 3.6.14
%{?with_gtk3:BuildRequires: gtk+3-devel >= 3.22.0}
BuildRequires: jack-audio-connection-kit-devel
-# for tests
-#BuildRequires: keyutils-devel
+%{?with_vfio_user:BuildRequires: json-c-devel >= 0.11}
+BuildRequires: keyutils-devel
BuildRequires: libaio-devel
+BuildRequires: libblkio-devel >= 1.3.0
BuildRequires: libbpf-devel
%{?with_smartcard:BuildRequires: libcacard-devel >= 2.5.1}
BuildRequires: libcap-ng-devel
%{?with_seccomp:BuildRequires: libseccomp-devel >= 2.3.0}
BuildRequires: libselinux-devel
BuildRequires: libssh-devel >= 0.8.7
+BuildRequires: libslirp-devel >= 4.7
+BuildRequires: libstdc++-devel >= 6:4.7
# for tests only
#BuildRequires: libtasn1-devel
BuildRequires: libu2f-emu-devel
%{?with_lttng:BuildRequires: lttng-ust-devel >= 2.1}
BuildRequires: lzfse-devel
BuildRequires: lzo-devel >= 2
-BuildRequires: meson >= 0.59.3
+BuildRequires: meson >= 0.63.0
%{?with_multipath:BuildRequires: multipath-tools-devel}
BuildRequires: ncurses-devel
# also libgcrypt-devel >= 1.8 possible, but gnutls already pulls nettle
BuildRequires: nettle-devel >= 3.4
-BuildRequires: ninja
+BuildRequires: ninja >= 1.5
%{?with_smartcard:BuildRequires: nss-devel >= 1:3.12.8}
BuildRequires: numactl-devel
BuildRequires: pam-devel
BuildRequires: perl-Encode
BuildRequires: perl-tools-pod
+%{?with_pipewire:BuildRequires: pipewire-devel >= 0.3.60}
BuildRequires: pixman-devel >= 0.21.8
BuildRequires: pkgconfig
%{?with_pmem:BuildRequires: pmdk-devel}
%{?with_pulseaudio:BuildRequires: pulseaudio-devel}
-BuildRequires: python3 >= 1:3.6
-BuildRequires: python3-sphinx_rtd_theme
+BuildRequires: python3 >= 1:3.7
+BuildRequires: python3-sphinx_rtd_theme >= 0.5
+BuildRequires: python3-tomli >= 1.2.0
BuildRequires: rpm-build >= 4.6
BuildRequires: rpmbuild(macros) >= 1.644
%{?with_system_seabios:BuildRequires: seabios}
BuildRequires: sed >= 4.0
%{?with_snappy:BuildRequires: snappy-devel}
-BuildRequires: sphinx-pdg
+BuildRequires: sphinx-pdg >= 1.6
%if %{with spice}
-BuildRequires: spice-protocol >= 0.12.3
-BuildRequires: spice-server-devel >= 0.12.5
+BuildRequires: spice-protocol >= 0.14.0
+BuildRequires: spice-server-devel >= 0.14.0
%endif
%{?with_systemtap:BuildRequires: systemtap-sdt-devel}
BuildRequires: tar >= 1:1.22
BuildRequires: zlib-devel
BuildRequires: zstd-devel >= 1.4.0
%if %{with user_static}
-BuildRequires: glib2-static >= 1:2.74
+BuildRequires: glib2-static >= 1:2.75.3
BuildRequires: glibc-static
+BuildRequires: libstdc++-static >= 6:4.7
BuildRequires: pcre2-8-static >= 10.32
BuildRequires: zlib-static
%endif
%if %{with seccomp} \
Requires: libseccomp >= 2.3.0 \
%endif \
+Requires: libslirp >= 4.7 \
Requires: liburing >= 0.3 \
Requires: libusb >= 1.0.22 \
+Requires: libxdp >= 1.4.0 \
Requires: pixman >= 0.21.8 \
%if %{with spice} \
-Requires: spice-server-libs >= 0.12.5 \
+Requires: spice-server-libs >= 0.14.0 \
%endif \
%if %{with usbredir} \
Requires: usbredir >= 0.6 \
Requires(pre): /usr/bin/getgid
Requires(pre): /usr/sbin/groupadd
Requires(pre): /usr/sbin/useradd
-Requires: glib2 >= 1:2.64
+Requires: glib2 >= 1:2.75.3
Requires: gnutls-libs >= 3.6.14
%{?with_gtk3:Requires: gtk+3 >= 3.22.0}
+Requires: libblkio >= 1.3.0
Requires: nettle >= 3.4
%{?with_vte:Requires: vte >= 0.32.0}
Requires: zstd >= 1.4.0
+Suggests: virtiofsd
Provides: group(qemu)
Provides: user(qemu)
Obsoletes: qemu-kvm-common < 2
Ten pakiet zawiera emulator systemu z procesorem HP/PA (PA-RISC).
-%package system-loongarch
-Summary: QEMU system emulator for Loongson
-Summary(pl.UTF-8): QEMU - emulator systemu z procesorem Loongson
-Group: Applications/Emulators
-Requires: %{name}-common = %{version}-%{release}
-%systempkg_req
-
-%description system-loongarch
-QEMU is a generic and open source processor emulator which achieves a
-good emulation speed by using dynamic translation.
-
-This package provides the system emulator with Loongson CPU.
-
-%description system-loongarch -l pl.UTF-8
-QEMU to ogólny, mający otwarte źródła emulator procesora, osiągający
-dobrą szybkość emulacji dzięki użyciu translacji dynamicznej.
-
-Ten pakiet zawiera emulator systemu z procesorem Loongson.
-
%package system-m68k
Summary: QEMU system emulator for m68k
Summary(pl.UTF-8): QEMU - emulator systemu z procesorem m68k
Summary(pl.UTF-8): QEMU - emulator systemu z procesorem x86
Group: Applications/Emulators
Requires: %{name}-common = %{version}-%{release}
-%{?with_system_seabios:Requires: seabios}
+%{?with_vfio_user:Requires: libvfio-user = %{version}-%{release}}
+%{?with_system_seabios:Requires: seabios >= 1.11.0}
%systempkg_req
Obsoletes: kvm < 89
Obsoletes: qemu-kvm-system-x86 < 2
Summary: QEMU guest agent
Summary(pl.UTF-8): Agent gościa QEMU
Group: Daemons
-Requires: glib2 >= 1:2.64
+Requires: glib2 >= 1:2.75.3
Requires: liburing >= 0.3
Obsoletes: qemu-kvm-guest-agent < 2
Conflicts: SysVinit < 2.96-2
%description module-audio-jack -l pl.UTF-8
Moduł QEMU z wyjściem dźwięku JACK.
+%package module-audio-pipewire
+Summary: QEMU module for PipeWire audio output
+Summary(pl.UTF-8): Moduł QEMU z wyjściem dźwięku PipeWire
+Group: Applications/Emulators
+Requires: %{name}-common = %{version}-%{release}
+Requires: pipewire-libs >= 0.3.60
+
+%description module-audio-pipewire
+QEMU module for PipeWire audio output.
+
+%description module-audio-pipewire -l pl.UTF-8
+Moduł QEMU z wyjściem dźwięku PipeWire.
+
%package module-block-curl
Summary: QEMU module for 'curl' block devices
Summary(pl.UTF-8): Moduł QEMU dla urządeń blokowych typu 'curl'
%description -n systemtap-qemu -l pl.UTF-8
Sondy systemtap/dtrace dla QEMU.
+%package -n libvfio-user
+Summary: vfio-user library
+Summary(pl.UTF-8): Biblioteka vfio-user
+Group: Libraries
+Requires: json-c >= 0.11
+
+%description -n libvfio-user
+vfio-user is a framework that allows implementing PCI devices in
+userspace. Clients (such as qemu) talk the vfio-user protocol over a
+UNIX socket to a server. This library, libvfio-user, provides an API
+for implementing such servers.
+
+%description -n libvfio-user -l pl.UTF-8
+vfio-user to szkielet pozwalający implementować urządzenia PCI w
+przestrzeni użytkownika. Klienci (jak qemu) komunikują się z serwerem
+protokołem vfio-user przez gniazdo uniksowe.
+
+%package -n libvfio-user-devel
+Summary: Header files for vfio-user library
+Summary(pl.UTF-8): Pliki nagłówkowe biblioteki vfio-user
+Group: Development/Libraries
+Requires: libvfio-user = %{version}-%{release}
+
+%description -n libvfio-user-devel
+Header files for vfio-user library.
+
+%description -n libvfio-user-devel -l pl.UTF-8
+Pliki nagłówkowe biblioteki vfio-user.
+
%prep
%setup -q
+%patch0 -p1
+%patch2 -p1
%patch3 -p1
-%patch4 -p1
%patch5 -p1
%patch6 -p1
+%patch7 -p1
+%patch8 -p1
%{__sed} -i '1s,/usr/bin/env python3,%{__python3},' scripts/qemu-trace-stap
# don't require stap binary during build
%{__sed} -i -e "s/stap.found()/true/" meson.build docs/meson.build scripts/meson.build
%endif
+
+%if %{without smartcard}
+%{__sed} -i -e '/^config USB_SMARTCARD/,/^$/ s/default y/default n/' hw/usb/Kconfig
+%endif
+%ifarch x32
+# xen-emu supports only LP64 __x86_64__ case
+%{__sed} -i -e '/^config XEN_EMU/,$ s/default y/default n/' hw/i386/Kconfig
+
+# plain x32 doesn't provide __sync_bool_compare_and_swap_16 - fail int128_t/ATOMIC128 tests earlier
+%{__sed} -i -e '/^has_int128_type = / s/$/FAILME/' meson.build
+%endif
+
%build
build() {
"$@"
%{__make} \
- V=1 \
- %{!?with_smartcard:CONFIG_USB_SMARTCARD=n}
+ V=1
cd ..
}
--audio-drv-list="alsa,jack%{?with_oss:,oss}%{?with_pulseaudio:,pa}%{?with_sdl:,sdl}" \
--enable-attr \
%{__enable_disable brlapi} \
+ %{__enable_disable canokey} \
--enable-cap-ng \
--enable-capstone \
--enable-curl \
%{!?with_gtk3:--disable-gtk} \
%{__enable_disable iscsi libiscsi} \
%{__enable_disable libnfs} \
+ %{__enable_disable pipewire} \
%{__enable_disable pmem libpmem} \
--enable-lzo \
%{__enable_disable multipath mpath} \
%{__enable_disable rdma} \
%{__enable_disable sdl} \
%{__enable_disable seccomp} \
+ --enable-slirp \
%{__enable_disable spice} \
%{__enable_disable smartcard} \
%{__enable_disable snappy} \
--enable-tpm \
%{__enable_disable usbredir usb-redir} \
--enable-vde \
+ %{?with_vfio_user:--enable-vfio-user-server} \
%{__enable_disable virgl virglrenderer} \
--enable-virtfs \
--enable-vnc-jpeg \
%if %{with user_static}
build static \
--disable-brlapi \
+ --disable-canokey \
--disable-cap-ng \
--disable-capstone \
--disable-curl \
%if %{with user_static}
%{__make} -C build-static install \
- %{!?with_smartcard:CONFIG_USB_SMARTCARD=n} \
DESTDIR=$RPM_BUILD_ROOT
# Give all QEMU user emulators a -static suffix
%endif
%{__make} -C build-dynamic install \
- %{!?with_smartcard:CONFIG_USB_SMARTCARD=n} \
DESTDIR=$RPM_BUILD_ROOT
# let rpm generate dependencies
install -p %{SOURCE9} $RPM_BUILD_ROOT%{_sbindir}/ksmtuned
install -p %{SOURCE10} $RPM_BUILD_ROOT%{_sysconfdir}/ksmtuned.conf
-# For the qemu-guest-agent subpackage install the udev rules.
install -p %{SOURCE12} $RPM_BUILD_ROOT/lib/udev/rules.d
install -p %{SOURCE13} $RPM_BUILD_ROOT/etc/rc.d/init.d/qemu-ga
/sbin/chkconfig --del qemu-ga
fi
+%post -n libvfio-user -p /sbin/ldconfig
+%postun -n libvfio-user -p /sbin/ldconfig
+
%files
%defattr(644,root,root,755)
%attr(755,root,root) %{_libexecdir}/virtfs-proxy-helper
%dir %{_libdir}/%{name}
# modules without too many external dependencies
+%attr(755,root,root) %{_libdir}/%{name}/block-blkio.so
%attr(755,root,root) %{_libdir}/%{name}/block-dmg-bz2.so
%attr(755,root,root) %{_libdir}/%{name}/block-dmg-lzfse.so
+%attr(755,root,root) %{_libdir}/%{name}/accel-tcg-i386.so
+%attr(755,root,root) %{_libdir}/%{name}/accel-tcg-x86_64.so
%attr(755,root,root) %{_libdir}/%{name}/audio-alsa.so
%if %{with oss}
%attr(755,root,root) %{_libdir}/%{name}/audio-oss.so
%if %{with pulseaudio}
%attr(755,root,root) %{_libdir}/%{name}/audio-pa.so
%endif
-%if %{with spice}
-%attr(755,root,root) %{_libdir}/%{name}/audio-spice.so
-%attr(755,root,root) %{_libdir}/%{name}/chardev-spice.so
-%attr(755,root,root) %{_libdir}/%{name}/hw-display-qxl.so
+%if %{with brlapi}
+%attr(755,root,root) %{_libdir}/%{name}/chardev-baum.so
%endif
+%attr(755,root,root) %{_libdir}/%{name}/hw-display-qxl.so
%attr(755,root,root) %{_libdir}/%{name}/hw-display-virtio-gpu.so
-%attr(755,root,root) %{_libdir}/%{name}/hw-display-virtio-gpu-gl.so
+%{?with_virgl:%attr(755,root,root) %{_libdir}/%{name}/hw-display-virtio-gpu-gl.so}
%attr(755,root,root) %{_libdir}/%{name}/hw-display-virtio-gpu-pci.so
-%attr(755,root,root) %{_libdir}/%{name}/hw-display-virtio-gpu-pci-gl.so
+%{?with_virgl:%attr(755,root,root) %{_libdir}/%{name}/hw-display-virtio-gpu-pci-gl.so}
%attr(755,root,root) %{_libdir}/%{name}/hw-display-virtio-vga.so
%attr(755,root,root) %{_libdir}/%{name}/hw-display-virtio-vga-gl.so
%attr(755,root,root) %{_libdir}/%{name}/hw-s390x-virtio-gpu-ccw.so
%attr(755,root,root) %{_libdir}/%{name}/hw-usb-host.so
+%attr(755,root,root) %{_libdir}/%{name}/ui-curses.so
+%if %{with usbredir}
%attr(755,root,root) %{_libdir}/%{name}/hw-usb-redirect.so
+%endif
+%if %{with smartcard}
%attr(755,root,root) %{_libdir}/%{name}/hw-usb-smartcard.so
-%attr(755,root,root) %{_libdir}/%{name}/ui-curses.so
-%attr(755,root,root) %{_libdir}/%{name}/ui-egl-headless.so
+%endif
%if %{with opengl}
+%attr(755,root,root) %{_libdir}/%{name}/ui-egl-headless.so
%attr(755,root,root) %{_libdir}/%{name}/ui-opengl.so
%endif
%if %{with spice}
+%attr(755,root,root) %{_libdir}/%{name}/audio-spice.so
+%attr(755,root,root) %{_libdir}/%{name}/chardev-spice.so
%attr(755,root,root) %{_libdir}/%{name}/ui-spice-app.so
%attr(755,root,root) %{_libdir}/%{name}/ui-spice-core.so
%endif
%dir %{_datadir}/%{name}/firmware
%{_datadir}/%{name}/keymaps
%{_datadir}/%{name}/trace-events-all
-%dir %{_datadir}/%{name}/vhost-user
%if %{with virgl}
+%dir %{_datadir}/%{name}/vhost-user
%{_datadir}/%{name}/vhost-user/50-qemu-gpu.json
%endif
%{_desktopdir}/qemu.desktop
%attr(755,root,root) %{_bindir}/qemu-x86_64-static
%attr(755,root,root) %{_bindir}/qemu-xtensa-static
%attr(755,root,root) %{_bindir}/qemu-xtensaeb-static
-%if %{with systemtap}
-%attr(755,root,root) %{_bindir}/qemu-trace-stap-static
-%endif
+%{?with_systemtap:%attr(755,root,root) %{_bindir}/qemu-trace-stap-static}
%endif
%files system-aarch64
%files system-avr
%defattr(644,root,root,755)
%attr(755,root,root) %{_bindir}/qemu-system-avr
+
%files system-cris
%defattr(644,root,root,755)
%attr(755,root,root) %{_bindir}/qemu-system-cris
%attr(755,root,root) %{_bindir}/qemu-system-hppa
%{_datadir}/%{name}/hppa-firmware.img
-%files system-loongarch
-%defattr(644,root,root,755)
-%attr(755,root,root) %{_bindir}/qemu-system-loongarch64
-
%files system-m68k
%defattr(644,root,root,755)
%attr(755,root,root) %{_bindir}/qemu-system-m68k
%files system-mips
%defattr(644,root,root,755)
+%attr(755,root,root) %{_bindir}/qemu-system-loongarch64
%attr(755,root,root) %{_bindir}/qemu-system-mips
%attr(755,root,root) %{_bindir}/qemu-system-mipsel
%attr(755,root,root) %{_bindir}/qemu-system-mips64
%{_datadir}/%{name}/slof.bin
%{_datadir}/%{name}/u-boot.e500
%{_datadir}/%{name}/u-boot-sam460-20100605.bin
+%{_datadir}/%{name}/vof.bin
+%{_datadir}/%{name}/vof-nvram.bin
%files system-riscv32
%defattr(644,root,root,755)
%defattr(644,root,root,755)
%attr(755,root,root) %{_bindir}/qemu-system-i386
%attr(755,root,root) %{_bindir}/qemu-system-x86_64
-%attr(755,root,root) %{_libdir}/%{name}/accel-tcg-i386.so
-%attr(755,root,root) %{_libdir}/%{name}/accel-tcg-x86_64.so
%ifarch %{ix86} %{x8664} x32
%config(noreplace) %verify(not md5 mtime size) /etc/modules-load.d/kvm.conf
/lib/udev/rules.d/80-kvm.rules
%{_datadir}/%{name}/vgabios-stdvga.bin
%{_datadir}/%{name}/vgabios-virtio.bin
%{_datadir}/%{name}/vgabios-vmware.bin
-%{_datadir}/%{name}/vof.bin
-%{_datadir}/%{name}/vof-nvram.bin
%{_datadir}/%{name}/firmware/50-edk2-i386-secure.json
%{_datadir}/%{name}/firmware/50-edk2-x86_64-secure.json
%{_datadir}/%{name}/firmware/60-edk2-i386.json
%defattr(644,root,root,755)
%attr(755,root,root) %{_libdir}/%{name}/audio-jack.so
+%if %{with pipewire}
+%files module-audio-pipewire
+%defattr(644,root,root,755)
+%attr(755,root,root) %{_libdir}/%{name}/audio-pipewire.so
+%endif
+
%files module-block-curl
%defattr(644,root,root,755)
%attr(755,root,root) %{_libdir}/%{name}/block-curl.so
%{_datadir}/systemtap/tapset/qemu-*.stp
%{_mandir}/man1/qemu-trace-stap.1*
%endif
+
+%if %{with vfio_user}
+%files -n libvfio-user
+%defattr(644,root,root,755)
+%attr(755,root,root) %{_libdir}/libvfio-user.so.*.*.*
+%attr(755,root,root) %ghost %{_libdir}/libvfio-user.so.0
+
+%files -n libvfio-user-devel
+%defattr(644,root,root,755)
+%attr(755,root,root) %{_libdir}/libvfio-user.so
+%{_includedir}/vfio-user
+%endif