xen-4.12.2-2.fc31$>r,f#F>AM?Md   5) 8DTZb33 3 P3 3 3 3333p H(8+9X+:+>=?=G=3H>3I?3X?Y?\@3]@3^D[bFfdGeGfGlGtG3uH3vIPwJ3xK3yLh7MDMHMkMqMCxen4.12.22.fc31Xen is a virtual machine monitorThis package contains the XenD daemon and xm command line tools, needed to manage virtual machines running under the Xen hypervisor^7$buildvm-aarch64-16.arm.fedoraproject.orgFedora ProjectFedora ProjectGPLv2+ and LGPLv2+ and BSDFedora ProjectUnspecifiedhttp://xen.org/linuxaarch64 if [ $1 -eq 1 ] && [ -x /usr/bin/systemctl ] ; then # Initial installation /usr/bin/systemctl --no-reload preset xendomains.service || : fi if [ $1 -eq 0 ] && [ -x /usr/bin/systemctl ] ; then # Package removal, not upgrade /usr/bin/systemctl --no-reload disable --now xendomains.service || : fie ^^/wwwwww,,MM((XX-=Rfx!QBAAAAA큤A큤A큤A큤A큤A큤A큤^7I^7`^7`^7^7^7^7^7^7J^7^7]_^7^7^7^7]_^7^7^7^7^7^7]_^7^7^7^7^7^7^7^7^7^7^7^7^7^7^7^7^7]_]_]_]_]_]_]_^7]_^7&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../../../../usr/lib64/python3.7/site-packages/xen/lowlevel/xs.cpython-37m-aarch64-linux-gnu.so../../../../usr/lib64/python3.7/site-packages/xen/lowlevel/xc.cpython-37m-aarch64-linux-gnu.sorootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootxen-4.12.2-2.fc31.src.rpmconfig(xen)python3.7dist(xen)python3dist(xen)xenxen(aarch-64) @@@@@@@@@@@@     @/bin/sh/bin/sh/usr/bin/python3config(xen)iproutekpartxld-linux-aarch64.so.1()(64bit)ld-linux-aarch64.so.1(GLIBC_2.17)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libpthread.so.0()(64bit)libpthread.so.0(GLIBC_2.17)(64bit)libpython3.7m.so.1.0()(64bit)libxenctrl.so.4.12()(64bit)libxenguest.so.4.12()(64bit)libxenstore.so.3.0()(64bit)python(abi)python3-lxmlrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PartialHardlinkSets)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsZstd)rtld(GNU_HASH)systemdsystemdxen-runtime4.12.2-2.fc313.73.0.4-14.6.0-14.0.4-14.0-15.4.18-14.12.2-2.fc314.15.1^@^!@]@]]ʞ]ʞ]]]Z@]M`@]<<] #]@\h\ڭ\C@\~d\eX@\V\[@[@[^[[[[~[v[r@[r@[GB[3|@[#@[@Z@ZZmZw@ZZZ@Z}@ZvMichael Young - 4.12.2-2Michael Young - 4.12.2-1Michael Young - 4.12.1-8Michael Young - 4.12.1-7Michael Young - 4.12.1-6Michael Young - 4.12.1-5Michael Young - 4.12.1-4Miro Hrončok - 4.12.1-3Miro Hrončok - 4.12.1-2Michael Young - 4.12.1-1Fedora Release Engineering - 4.12.0-5Michael Young - 4.12.0-4Zbigniew Jędrzejewski-Szmek Michael Young - 4.12.0-3Michael Young - 4.12.0-2Michael Young - 4.12.0-1Michael Young - 4.11.1-4Michael Young - 4.11.1-3Fedora Release Engineering - 4.11.1-2Michael Young - 4.11.1-1Michael Young - 4.11.0-10Michael Young - 4.11.0-9Michael Young - 4.11.0-8Michael Young - 4.11.0-7Michael Young - 4.11.0-6Michael Young Michael Young - 4.11.0-5Michael Young - 4.11.0-4Michael Young - 4.11.0-3Michael Young - 4.11.0-2Michael Young - 4.11.0-1Michael Young - 4.10.1-5Michael Young - 4.10.1-4Michael Young - 4.10.1-3Michael Young - 4.10.1-2Michael Young - 4.10.1-1Michael Young - 4.10.0-9Michael Young - 4.10.0-8Michael Young - 4.10.0-7Michael Young - 4.10.0-6Michael Young Igor Gnatenko - 4.10.0-5Igor Gnatenko - 4.10.0-4- arm: a CPU may speculate past the ERET instruction [XSA-312]- update to 4.12.2 remove patches for issues now fixed upstream- denial of service in find_next_bit() [XSA-307, CVE-2019-19581, CVE-2019-19582] (#1782211) - denial of service in HVM/PVH guest userspace code [XSA-308, CVE-2019-19583] (#1782206) - privilege escalation due to malicious PV guest [XSA-309, CVE-2019-19578] (#1782210) - Further issues with restartable PV type change operations [XSA-310, CVE-2019-19580] (#1782207) - vulnerability in dynamic height handling for AMD IOMMU pagetables [XSA-311, CVE-2019-19577] (#1782208) - add patches needed to apply XSA-311- Device quarantine for alternate pci assignment methods [XSA-306, CVE-2019-19579] (#1780559)- add missing XSA-299 patches- x86: Machine Check Error on Page Size Change DoS [XSA-304, CVE-2018-12207] - TSX Asynchronous Abort speculative side channel [XSA-305, CVE-2019-11135]- VCPUOP_initialise DoS [XSA-296, CVE-2019-18420] (#1771368) - missing descriptor table limit checking in x86 PV emulation [XSA-298, CVE-2019-18425] (#1771341) - Issues with restartable PV type change operations [XSA-299, CVE-2019-18421] (#1767726) - add-to-physmap can be abused to DoS Arm hosts [XSA-301, CVE-2019-18423] (#1771345) - passed through PCI devices may corrupt host memory after deassignment [XSA-302, CVE-2019-18424] (#1767731) - ARM: Interrupts are unconditionally unmasked in exception handlers [XSA-303, CVE-2019-18422] (#1771443)- Rebuilt for Python 3.8.0rc1 (#1748018)- Rebuilt for Python 3.8- update to 4.12.1 remove patches for issues now fixed upstream adjust xen.gcc9.fixes.patch- Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild- Unlimited Arm Atomics Operations [XSA-295, CVE-2019-17349, CVE-2019-17350] (#1720760) - some debug files are now properly packaged in debuginfo rpms- Fix build with python3.8 (#1704807)- fix HVM DomU boot on some chipsets - fix expected FTBFS with Python 3.8 (#1704807) - adjust grub2 workaround- Microarchitectural Data Sampling speculative side channel [XSA-297, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091] - additional patches so above applies cleanly - work around grub2 issues in dom0- update to 4.12.0 (#1694695) remove patches for issues now fixed upstream replace xen.use.fedora.ipxe.patch with --with-system-ipxe drop xen.glibcfix.patch xen.gcc8.temp.fix.patch which are no longer needed adjust xen.python.env.patch xen.gcc9.fixes.patch xen.hypervisor.config refresh kdd is now xen-kdd, xenmon.py is now xenmon, fsimage.so is now xenfsimage.so fs libdir is now xenfsimage libdir xen-ringwatch xen-bugtool have been dropped - remove remaining traces of efiming and efi_flags logic - switch from python2 to python3 - drop systemd_postun and renumber patches- xen: various flaws (#1685577) grant table transfer issues on large hosts [XSA-284, CVE-2019-17340] race with pass-through device hotplug [XSA-285, CVE-2019-17341] x86: steal_page violates page_struct access discipline [XSA-287, CVE-2019-17342] x86: Inconsistent PV IOMMU discipline [XSA-288, CVE-2019-17343] missing preemption in x86 PV page table unvalidation [XSA-290, CVE-2019-17344] x86/PV: page type reference counting issue with failed IOMMU update [XSA-291, CVE-2019-17345] x86: insufficient TLB flushing when using PCID [XSA-292, CVE-2019-17346] x86: PV kernel context switch corruption [XSA-293, CVE-2019-17347] x86 shadow: Insufficient TLB flushing when using PCID [XSA-294, CVE-2019-17348]- add gcc9 build fixes (#1676229)- Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild- update to 4.11.1 remove patches for issues now fixed upstream adjust xen.use.fedora.ipxe.patch - only include qemutrad build requirements for platforms that use it - construct ovmf.bin from edk2-ovmf package (#1656651)- insufficient TLB flushing / improper large page mappings with AMD IOMMUs [XSA-275, CVE-2018-19961, CVE-2018-19962] (#1651665) - x86: DoS from attempting to use INVPCID with a non-canonical addresses [XSA-279, CVE-2018-19965] (#1651970) - xen: various flaws (#1652251) resource accounting issues in x86 IOREQ server handling [XSA-276, CVE-2018-19963] x86: incorrect error handling for guest p2m page removals [XSA-277, CVE-2018-19964] Fix for XSA-240 conflicts with shadow paging [XSA-280, CVE-2018-19966]- guest use of HLE constructs may lock up host [XSA-282, CVE-2018-19967]- x86: Nested VT-x usable even when disabled [XSA-278, CVE-2018-18883] (#1643118)- set /usr/bin/python2 at the start of another python script- move pkgconfig files to xen-devel (#1629643)- set /usr/bin/python2 at the start of some python scripts- move creation of /usr/lib/xen symlink to posttrans to avoid rpm conflict- move files from /usr/lib/xen to /usr/libexec/xen - create symlink at /usr/lib/xen for compatibility- replace use of deprecated vwprintw- no longer need to set python_sitearch - L1 Terminal Fault speculative side channel patch bundle [XSA-273, CVE-2018-3620, CVE-2018-3646] also includes Use of v2 grant tables may cause crash on ARM [XSA-268, CVE-2018-15469] (#1616081) x86: Incorrect MSR_DEBUGCTL handling lets guests enable BTS [XSA-269, CVE-2018-15468] (#1616077) oxenstored does not apply quota-maxentity [XSA-272, CVE-2018-15470] (#1616080)- update to 4.11.0 (#1592976) remove patches for issues now fixed upstream adjust xen.use.fedora.ipxe.patch drop parts of xen.fedora.efi.build.patch & xen.gcc8.temp.fix.patch - replace use of deprecated brctl command (#1588712) - add gcc BuildRequires - adjustments now /usr/bin/python is in a separate package - update hypervisor configuration for arm - put back some gcc fixes needed for arm and i686 - work around a build issue with perl - i686 now want to build EFI hypervisor (actually x86_64) so let it- preemption checks bypassed in x86 PV MM handling [XSA-264, CVE-2018-12891] (#1595959) - x86: #DB exception safety check can be triggered by a guest [XSA-265, CVE-2018-12893] (#1595958) - libxl fails to honour readonly flag on HVM emulated SCSI disks [XSA-266, CVE-2018-12892] (#1595957)- Speculative register leakage from lazy FPU context switching [XSA-267, CVE-2018-3665] - fix for change in iasl output- Speculative Store Bypass [XSA-263, CVE-2018-3639] (with extra patches so it applies cleanly)- x86: mishandling of debug exceptions [XSA-260, CVE-2018-8897] - x86 vHPET interrupt injection errors [XSA-261, CVE-2018-10982] (#1576089) - qemu may drive Xen into unbounded loop [XSA-262, CVE-2018-10981] (#1576680)- update to xen-4.10.1 adjust xen.use.fedora.ipxe.patch and xen.fedora.efi.build.patch remove patches for issues now fixed upstream package /usr/lib/debug/usr/lib/xen/boot/xen-shim-syms- Information leak via crafted user-supplied CDROM [XSA-258, CVE-2018-10472] (#1571867) - x86: PV guest may crash Xen with XPTI [XSA-259, CVE-2018-10471] (#1571878)- fix safe-strings patch for OCaml 4.0.6- avoid building parts of xen twice - hypervisor built with -fcf-protection doesn't work on x86_64- update patch for XPTI mitigation for XSA-254 - add Branch Target Injection (BTI) mitigation for XSA-254 - DoS via non-preemptable L3/L4 pagetable freeing [XSA-252, CVE-2018-7540] (#1549568) - grant table v2 -> v1 transition may crash Xen [XSA-255, CVE-2018-7541] (#1549570) - x86 PVH guest without LAPIC may DoS the host [XSA-256, CVE-2018-7542] (#1549572) - further build issue fixes with gcc8 (some temporary workarounds) - -mcet and -fcf-protection aren't recognized in hypervisor build x86_64 on i686 either- fix some build issues with gcc8- Escape macros in %changelog- Switch to %ldconfig_scriptlets/bin/sh/bin/sh  ""$$&&((*+,-./01234.12.2-2.fc31334.12.2-2.fc314.12.2-2.fc31  xendomainsautoxencons.build-id2a29370618024b1636512ebd3841fcfa4ed77bc1e48f6ff298a6b7dcc7d6eb260b36d0353ea71fd2xendomains.servicexenxen-3.0-py3.7.egg-info__init__.py__pycache____init__.cpython-37.opt-1.pyc__init__.cpython-37.pyclowlevel__init__.py__pycache____init__.cpython-37.opt-1.pyc__init__.cpython-37.pycxc.cpython-37m-aarch64-linux-gnu.soxs.cpython-37m-aarch64-linux-gnu.somigration__init__.py__pycache____init__.cpython-37.opt-1.pyc__init__.cpython-37.pyclegacy.cpython-37.opt-1.pyclegacy.cpython-37.pyclibxc.cpython-37.opt-1.pyclibxc.cpython-37.pyclibxl.cpython-37.opt-1.pyclibxl.cpython-37.pycpublic.cpython-37.opt-1.pycpublic.cpython-37.pyctests.cpython-37.opt-1.pyctests.cpython-37.pycverify.cpython-37.opt-1.pycverify.cpython-37.pycxl.cpython-37.opt-1.pycxl.cpython-37.pyclegacy.pylibxc.pylibxl.pypublic.pytests.pyverify.pyxl.pyxenCOPYINGREADME/etc/sysconfig//etc/xen//usr/bin//usr/lib//usr/lib/.build-id//usr/lib/.build-id/2a//usr/lib/.build-id/e4//usr/lib/systemd/system//usr/lib64/python3.7/site-packages//usr/lib64/python3.7/site-packages/xen//usr/lib64/python3.7/site-packages/xen/__pycache__//usr/lib64/python3.7/site-packages/xen/lowlevel//usr/lib64/python3.7/site-packages/xen/lowlevel/__pycache__//usr/lib64/python3.7/site-packages/xen/migration//usr/lib64/python3.7/site-packages/xen/migration/__pycache__//usr/share/doc//usr/share/doc/xen/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fexceptions -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -fasynchronous-unwind-tables -fstack-clash-protectiondrpmzstd19aarch64-redhat-linux-gnuASCII textdirectoryPython script, ASCII text executablepython 3.7 byte-compiledELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, BuildID[sha1]=e48f6ff298a6b7dcc7d6eb260b36d0353ea71fd2, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, BuildID[sha1]=2a29370618024b1636512ebd3841fcfa4ed77bc1, strippedempty  !"#$%&'()*+,-./0123456 RPPRRRRRRRRR RR R RR R RRRRR RR RR R RRRRRRRRRRRRRRRRRRRRRRRRRRRhttps://bugz.fedoraproject.org/xenutf-862392b1da744bd5488729680d0104e71da2ce3beec133f1b04a8af78d6a41fd3?(/hDLT3xen-4.12.1-8.fc31!'d2ak#%Aa(C\@\C VP4<-t2-2 >  AЉ^XP9 <3YujV;?%Մ kLVА#aэrTaIlJn3XR67{dP\&bҕ$SYCޱyYM40cAztym63'B;:gT/+j)3X g/A1vHpuVc˖I{PҼ {e%[ {Reg@kraKi &)[ch*EWSN.OyC _ZPW:wG"Ϙ@wc͹b$ a!CE!-BWusk)zӳxZ1M2. Y. Y\/"*D!x"cC~t iv zgwײvgj7[x[qRS6S M)O)# hSzF&M駐O)X%PN WW7d~^l6̄K;4d14Pet] Ĝ~10]\I"w{;ѥ>tT'.\ X:=wmރq=qYk PEQ qszEވN#6*J.# Ís\ XAT$0$ JrWmaFSuLcZl-j2@5mn/:  8RXpRVSG"Ԯ'7qS:Md -X1ߩע)ZY'zUTٞ; B;KN@({"Eᇇ*3LbWJ*)8]U,ځG[x5[Vtt?<&;n9*/|z^{鮩0U񄊶!gկ-Ҕ̑rGlB=4i-K AncŰu*۲y7kթ@@k5Y[,]o8xMa8C[CM Tp nj.O4H@ z$>fuSBR(wMlw1T/h3"4 ꉞYvF\: [PGY=Jg&cQ5Րybr.m= #E\sbs^+MB֝T9dgUw ;vd[!Ss&9ZDzsYԮ PT[?l0׉K*&q]fLOr"70g(>HnaFNRP oa0@Ke޹ ئ'ح^Hz},7qdYI4\FaXRwhS`/a0q,,ap(" #E D>n}GM!c⪣g Lxmj(VMO~Re)yw84jf`*nD(vd4g!xpM l,nUe`HhȊJ7j$ucl\!/&ۂN!?hдY~YURhMك:umZ^!:3L^W y{Rޚ9 ӓ ,rGE &:?Jp@o|+O bsȏCH 0% : 3Z Z,ddffz7؊Du47[[^y+8RT1eehF-.Qc00~[)4M6G`8lLa*3H2:<툺Ա2)%3h+7a)urr~kOV_DWFOJƻsp%KP^(w(qNwjEG?VXaڮ'Pr 1vb;g.C],瀠*ȱ%I*Q|è{eD{bXRCR仇 k'{T!#0]+ 3P:ݏd(ǢR&O+EhqUpLk/"G8c--i$n-4]$GM1ɥczޚx.:)Yik49e7͎I^gW0=eܢ~$OP"Du ([Mk7#\5;O}nUF gɍ5d=3Q]v4<@#7[%uKG#Bk/i(RtDH_i$[[d,=wbwk:X J1:)*T*`76>#&?ٔc8,y*+PZ'71ZDBȴ@L׽[!vilԕCdA _1 Hɛrj'ee3Z߿I1%Y|WN䅆Mٽ µ_ @ :FIXxj: G,#6\52uHWkPgnկ F;3[TGf,!\˟N:ߗ>(u F%7C+,>eVԑoAza\=}ȖUTDQ1ti+BrƎAwɤytv)pw0.TV3?WUf6`:KQ)pOWOG\྅ {IpEӲYX1{؏iHy׭AmԲ3/y^)_yi!E^=s[TR{ݨ.F0`O7xiX}342>oUJH5\?mb)2^ g\ O^!U~ʋ{3BLK5g 'T6 K$톆#&!ӥm\I3d-d~.,o˦v3A |cgò3pbW}[74ȫ .2*Ȭ lݞ=~_9GbխjJ $/$xQ*A $ I(p/@J&" a :* &1) AA"T| %0B `* =)gWW4cOe_Q[瞣jWV Rd2W}f~|p$ ;;B*veۓRP5VlcZ|)JxSP"wBc8_c|a(J9 /nj?MiN-_rE8P#sysconfig/xendomains## Path: System/Virtualization Descrip: start/stop on bootType:ringfault: # he caRq requests to shutdown.If youn't wantMIGRATE, SAVor SHUTDOWN, this may be a possibilityquick ady ("s e i u o")at least syncesksof").XENDOMAINS_SYSRQ="" integer 10 istvariabletermines how longit(microseds) afteach, so haschancert'n'viailvely highlue (12USLEEP=5Whctg,nllowtime fgetedenorproceedrouss. Without,gwillash upTspecifiesyCRESenon-emp igrate v mpasstxmID commis: It sldntIP addrhysicoyramske --l. Leave tryociucneiexecuha//lib/sirectounns (0) Wufrom#RESTOREsee) (e.g.ca),t=--"wern faibt. Om flagvoidskip= AgoovauttlAUTO_ONLYot/accorb,harsomsye(Notheven.)_ALL=nuT=etcu(justplace fsclb richy nawfuzzy= t,; wis3On,umb,) Iwosse,passful.zero,dogryyifzombonTlokur/ keep1GBGigabnus%kbwidthpo,ignamouShughopP_MAXWAIT=-1.pyc071c81a4e24B2Đ)@r(<F3Ƙ (>6ZBv'C&0|u xO!xn\9:Q-(WlyrfpjR&j];fùTa埣Uy\Q(OgHJP׬A:כ=o 2qGަ\< R,!im,{41dLuN822}nC{Z/gRSbb2R-SDX)3IAl `.{d j)I zwR~ Ձ@FÙC(P_UnOŰ+;1iK[=evuS<²DYhe5^RR۞)T&m)MzEA ysz6jm~Z<%Z \9c8CWP182OIE"'HAV) lNMQ%f+hf4gniw&*_-D(&CYYF8b ݌pDXybj?m=) XF.gHR3Y7UI T}3K\(cP68 aKO edpo.69Kgy:a29{o]j% AI`e4B8JM4