xen-ocaml-devel-4.12.2-2.fc31$>D0#^B@o?<#~>::4?:$d  J $0@FP  (   o          ;( h8 p+9 +:+G3H4I4X4Y4\4]5,^6b7pd8e8f8l8t8u90v99999: Cxen-ocaml-devel4.12.22.fc31Ocaml development libraries for Xen toolsThis package contains libraries for developing ocaml tools to manage Xen virtual machines.^7$buildvm-aarch64-16.arm.fedoraproject.org Fedora ProjectFedora ProjectGPLv2+ and LGPLv2+ and BSDFedora ProjectUnspecifiedhttp://xen.org/linuxaarch64UȞ2^g 9. z j. (\(?$ǁ^7^7^7^7^7^7^7^7^7^7^7^7^7^7^7^7^7^7^7^7^7^7^7^7^7^7^7e22e7c0b86367504045cf068d3132b23fecf70ccaff810573fe2ef3d3dce0e60aead5b00ee6ca5f05ba48f7cac42394f2fca0cbe09a2f1272ddeb32bd44a8eb8cebc8edd360db19266ae9f8dec6d815569abe3b99724991f4442752927b5fbe38233b132efc313213c30a7875e04c5f87b454c0e4f0591de3957030be4be2bce13aa050083ee82bbd60d1ad2ae6dd2da8e7821ead7ebdc4364e30c049e20eb8a287051da0ee65ecca13e9979dc288dffe73b51ca89bcbb05913eddc8dadffdb436f6374e1b2d5535f162ba48fea8c9cc609d9acf9c8169f6c923a11e7aaac8e97ba6532da1dbce8353749ce53f4233552824b54876e03ae82e532b755894f0f46eaea94de4ddeec5b7c8d538f70d9d4005cc05bbd88236bcb4503b4c9c4af6965b5a3f575e2f8cf37b5f2e6c5c7d644891238ce4687857603bdd9b0d5a47065a8d7597c1b316cb630a06cccad750dcab9b3115dfabfc64c0207615a3afafe2724dedc6e6ee182c715a856f9fe26b8be91c5f91a2ce5b4b81bd7a39fbc7b8b293d1c682349b63a031c67292342cae7eb47cf94d33bb41c2e04a5194c13c728720d420b5d04642584e88955ffaf8b1ab49b8f7c745f642e30c37d91e4da1d475c6649df9c6a56b6352f46d1cb2b34dd2574f603c098814a1debfaf4a3627cefe85a3016f101627624e42a8e5db8edb8385fca923f64d9c482cd0942578d034f8d1a58d8d8628ee3be8f993a49f59ddddf7043f83e2f50547072d84849331313556cd9abd178883dd67aebd2bfdc0fd6b63ca8321d889deeae4d7a11fdb76080bc5f58a2659999634fdb1db360d12bfd80f9cf360eed672684c083d2bbfbc057fa0d11f4652033201bee11aef4021285102a9657c1553f31177b16b00da14a975e266ef5b755bfc8293a75afb5607e7bc669ae98f5a2657697283e0ad7be32fa16bee1b1bda927d11ec57a02047caabd00155338f12862a6c89d7d54ff31af27c7cbc69ccd78c3910f697bfc38440cf78c9987441ec850db098dfad11a0ec01683c089bf77daad81898e05f6f6c472cdca59f08916d157ec99df19f37f1b3e0ee17f58b437f3475be89e7c18428ff2b1ff6389141e3463b31e7f30bd0103c3652b4de2a1c83eb78f4ce068ccd8142e0ec3ec640afeb31a9fb403357c4b7ebcf1043c51e15ac21928765efe586bce149320e9634c6be4e60323e78688771e769b5d0rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootxen-4.12.2-2.fc31.src.rpmxen-ocaml-develxen-ocaml-devel(aarch-64)    rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsZstd)xen-ocaml3.0.4-14.6.0-14.0-15.4.18-14.12.2-2.fc314.15.1^@^!@]@]]ʞ]ʞ]]]Z@]M`@]<<] #]@\h\ڭ\C@\~d\eX@\V\[@[@[^[[[[~[v[r@[r@[GB[3|@[#@[@Z@ZZmZw@ZZZ@Z}@ZvMichael Young - 4.12.2-2Michael Young - 4.12.2-1Michael Young - 4.12.1-8Michael Young - 4.12.1-7Michael Young - 4.12.1-6Michael Young - 4.12.1-5Michael Young - 4.12.1-4Miro Hrončok - 4.12.1-3Miro Hrončok - 4.12.1-2Michael Young - 4.12.1-1Fedora Release Engineering - 4.12.0-5Michael Young - 4.12.0-4Zbigniew Jędrzejewski-Szmek Michael Young - 4.12.0-3Michael Young - 4.12.0-2Michael Young - 4.12.0-1Michael Young - 4.11.1-4Michael Young - 4.11.1-3Fedora Release Engineering - 4.11.1-2Michael Young - 4.11.1-1Michael Young - 4.11.0-10Michael Young - 4.11.0-9Michael Young - 4.11.0-8Michael Young - 4.11.0-7Michael Young - 4.11.0-6Michael Young Michael Young - 4.11.0-5Michael Young - 4.11.0-4Michael Young - 4.11.0-3Michael Young - 4.11.0-2Michael Young - 4.11.0-1Michael Young - 4.10.1-5Michael Young - 4.10.1-4Michael Young - 4.10.1-3Michael Young - 4.10.1-2Michael Young - 4.10.1-1Michael Young - 4.10.0-9Michael Young - 4.10.0-8Michael Young - 4.10.0-7Michael Young - 4.10.0-6Michael Young Igor Gnatenko - 4.10.0-5Igor Gnatenko - 4.10.0-4- arm: a CPU may speculate past the ERET instruction [XSA-312]- update to 4.12.2 remove patches for issues now fixed upstream- denial of service in find_next_bit() [XSA-307, CVE-2019-19581, CVE-2019-19582] (#1782211) - denial of service in HVM/PVH guest userspace code [XSA-308, CVE-2019-19583] (#1782206) - privilege escalation due to malicious PV guest [XSA-309, CVE-2019-19578] (#1782210) - Further issues with restartable PV type change operations [XSA-310, CVE-2019-19580] (#1782207) - vulnerability in dynamic height handling for AMD IOMMU pagetables [XSA-311, CVE-2019-19577] (#1782208) - add patches needed to apply XSA-311- Device quarantine for alternate pci assignment methods [XSA-306, CVE-2019-19579] (#1780559)- add missing XSA-299 patches- x86: Machine Check Error on Page Size Change DoS [XSA-304, CVE-2018-12207] - TSX Asynchronous Abort speculative side channel [XSA-305, CVE-2019-11135]- VCPUOP_initialise DoS [XSA-296, CVE-2019-18420] (#1771368) - missing descriptor table limit checking in x86 PV emulation [XSA-298, CVE-2019-18425] (#1771341) - Issues with restartable PV type change operations [XSA-299, CVE-2019-18421] (#1767726) - add-to-physmap can be abused to DoS Arm hosts [XSA-301, CVE-2019-18423] (#1771345) - passed through PCI devices may corrupt host memory after deassignment [XSA-302, CVE-2019-18424] (#1767731) - ARM: Interrupts are unconditionally unmasked in exception handlers [XSA-303, CVE-2019-18422] (#1771443)- Rebuilt for Python 3.8.0rc1 (#1748018)- Rebuilt for Python 3.8- update to 4.12.1 remove patches for issues now fixed upstream adjust xen.gcc9.fixes.patch- Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild- Unlimited Arm Atomics Operations [XSA-295, CVE-2019-17349, CVE-2019-17350] (#1720760) - some debug files are now properly packaged in debuginfo rpms- Fix build with python3.8 (#1704807)- fix HVM DomU boot on some chipsets - fix expected FTBFS with Python 3.8 (#1704807) - adjust grub2 workaround- Microarchitectural Data Sampling speculative side channel [XSA-297, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091] - additional patches so above applies cleanly - work around grub2 issues in dom0- update to 4.12.0 (#1694695) remove patches for issues now fixed upstream replace xen.use.fedora.ipxe.patch with --with-system-ipxe drop xen.glibcfix.patch xen.gcc8.temp.fix.patch which are no longer needed adjust xen.python.env.patch xen.gcc9.fixes.patch xen.hypervisor.config refresh kdd is now xen-kdd, xenmon.py is now xenmon, fsimage.so is now xenfsimage.so fs libdir is now xenfsimage libdir xen-ringwatch xen-bugtool have been dropped - remove remaining traces of efiming and efi_flags logic - switch from python2 to python3 - drop systemd_postun and renumber patches- xen: various flaws (#1685577) grant table transfer issues on large hosts [XSA-284, CVE-2019-17340] race with pass-through device hotplug [XSA-285, CVE-2019-17341] x86: steal_page violates page_struct access discipline [XSA-287, CVE-2019-17342] x86: Inconsistent PV IOMMU discipline [XSA-288, CVE-2019-17343] missing preemption in x86 PV page table unvalidation [XSA-290, CVE-2019-17344] x86/PV: page type reference counting issue with failed IOMMU update [XSA-291, CVE-2019-17345] x86: insufficient TLB flushing when using PCID [XSA-292, CVE-2019-17346] x86: PV kernel context switch corruption [XSA-293, CVE-2019-17347] x86 shadow: Insufficient TLB flushing when using PCID [XSA-294, CVE-2019-17348]- add gcc9 build fixes (#1676229)- Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild- update to 4.11.1 remove patches for issues now fixed upstream adjust xen.use.fedora.ipxe.patch - only include qemutrad build requirements for platforms that use it - construct ovmf.bin from edk2-ovmf package (#1656651)- insufficient TLB flushing / improper large page mappings with AMD IOMMUs [XSA-275, CVE-2018-19961, CVE-2018-19962] (#1651665) - x86: DoS from attempting to use INVPCID with a non-canonical addresses [XSA-279, CVE-2018-19965] (#1651970) - xen: various flaws (#1652251) resource accounting issues in x86 IOREQ server handling [XSA-276, CVE-2018-19963] x86: incorrect error handling for guest p2m page removals [XSA-277, CVE-2018-19964] Fix for XSA-240 conflicts with shadow paging [XSA-280, CVE-2018-19966]- guest use of HLE constructs may lock up host [XSA-282, CVE-2018-19967]- x86: Nested VT-x usable even when disabled [XSA-278, CVE-2018-18883] (#1643118)- set /usr/bin/python2 at the start of another python script- move pkgconfig files to xen-devel (#1629643)- set /usr/bin/python2 at the start of some python scripts- move creation of /usr/lib/xen symlink to posttrans to avoid rpm conflict- move files from /usr/lib/xen to /usr/libexec/xen - create symlink at /usr/lib/xen for compatibility- replace use of deprecated vwprintw- no longer need to set python_sitearch - L1 Terminal Fault speculative side channel patch bundle [XSA-273, CVE-2018-3620, CVE-2018-3646] also includes Use of v2 grant tables may cause crash on ARM [XSA-268, CVE-2018-15469] (#1616081) x86: Incorrect MSR_DEBUGCTL handling lets guests enable BTS [XSA-269, CVE-2018-15468] (#1616077) oxenstored does not apply quota-maxentity [XSA-272, CVE-2018-15470] (#1616080)- update to 4.11.0 (#1592976) remove patches for issues now fixed upstream adjust xen.use.fedora.ipxe.patch drop parts of xen.fedora.efi.build.patch & xen.gcc8.temp.fix.patch - replace use of deprecated brctl command (#1588712) - add gcc BuildRequires - adjustments now /usr/bin/python is in a separate package - update hypervisor configuration for arm - put back some gcc fixes needed for arm and i686 - work around a build issue with perl - i686 now want to build EFI hypervisor (actually x86_64) so let it- preemption checks bypassed in x86 PV MM handling [XSA-264, CVE-2018-12891] (#1595959) - x86: #DB exception safety check can be triggered by a guest [XSA-265, CVE-2018-12893] (#1595958) - libxl fails to honour readonly flag on HVM emulated SCSI disks [XSA-266, CVE-2018-12892] (#1595957)- Speculative register leakage from lazy FPU context switching [XSA-267, CVE-2018-3665] - fix for change in iasl output- Speculative Store Bypass [XSA-263, CVE-2018-3639] (with extra patches so it applies cleanly)- x86: mishandling of debug exceptions [XSA-260, CVE-2018-8897] - x86 vHPET interrupt injection errors [XSA-261, CVE-2018-10982] (#1576089) - qemu may drive Xen into unbounded loop [XSA-262, CVE-2018-10981] (#1576680)- update to xen-4.10.1 adjust xen.use.fedora.ipxe.patch and xen.fedora.efi.build.patch remove patches for issues now fixed upstream package /usr/lib/debug/usr/lib/xen/boot/xen-shim-syms- Information leak via crafted user-supplied CDROM [XSA-258, CVE-2018-10472] (#1571867) - x86: PV guest may crash Xen with XPTI [XSA-259, CVE-2018-10471] (#1571878)- fix safe-strings patch for OCaml 4.0.6- avoid building parts of xen twice - hypervisor built with -fcf-protection doesn't work on x86_64- update patch for XPTI mitigation for XSA-254 - add Branch Target Injection (BTI) mitigation for XSA-254 - DoS via non-preemptable L3/L4 pagetable freeing [XSA-252, CVE-2018-7540] (#1549568) - grant table v2 -> v1 transition may crash Xen [XSA-255, CVE-2018-7541] (#1549570) - x86 PVH guest without LAPIC may DoS the host [XSA-256, CVE-2018-7542] (#1549572) - further build issue fixes with gcc8 (some temporary workarounds) - -mcet and -fcf-protection aren't recognized in hypervisor build x86_64 on i686 either- fix some build issues with gcc8- Escape macros in %changelog- Switch to %ldconfig_scriptlets 4.12.2-2.fc314.12.2-2.fc31libxenbus_stubs.axenbus.axenbus.cmxxenbus.cmxalibxenctrl_stubs.axenctrl.axenctrl.cmxxenctrl.cmxalibxeneventchn_stubs.axeneventchn.axeneventchn.cmxxeneventchn.cmxalibxenlight_stubs.axenlight.axenlight.cmxxenlight.cmxalibxenmmap_stubs.axenmmap.axenmmap.cmxxenmmap.cmxaxenstore.axenstore.cmxxenstore.cmxalibxentoollog_stubs.axentoollog.axentoollog.cmxxentoollog.cmxa/usr/lib64/ocaml/xenbus//usr/lib64/ocaml/xenctrl//usr/lib64/ocaml/xeneventchn//usr/lib64/ocaml/xenlight//usr/lib64/ocaml/xenmmap//usr/lib64/ocaml/xenstore//usr/lib64/ocaml/xentoollog/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fexceptions -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -fasynchronous-unwind-tables -fstack-clash-protectiondrpmzstd19aarch64-redhat-linux-gnucurrent ar archivehttps://bugz.fedoraproject.org/xenutf-8ccd93cac9f32afbbb99cf322e460825f1da7818799dabb1fe11ffcc2d833861b?`(/h%8jDLT3xen-ocaml-devel-4.12.1-8.fc31zDyop_24f+' r2-2 >  A Љ^XP9 <3Y27 *{ JMfYzR_c#^K>MY`[\ !uwI =2xq1!Y|kre  \GҤN8ZO(C2b\dujhtYGgLr9P5\R> hS[C@2Ԝeͪش$` EbDNAʢ"Bݟi0ِbTV-ǯ*چ_- Ǟ 1D&Z#X$J  ̼,Lz\,EcxKG{4;7˚QT2qRZE2J{ DGR9k%8W'mFz7M5^{Ny/0Lnvztk4Dx=u,\䷏4G&-Q3G"4ۡOyB[A`\$W.Xd}0INKpAC |g#R@g/6d ɑ ee80c88f034d3c7ae43017f2bac37972bd10153040a9371ae8b9692923883977966353fcf2c1843f3b08fa3063e774f363a321b9ژ6(U#0~H7U(6IЀʀkDm{(ܛ4t:{d}*M^TmJ)țE =e9i-++Ѭvo!eY ̑kK5PP*9g 8KZm;a8Lk<]XM#OJi$cfI?/uGgtS1i2-NcɪE2!YfSˁʽHhM q)"/Ípf\h5 yRr+޺Om@D+KdX,Dlb .h K6YSSkOBwv.Uc օYz '!G=)k:y-H>aƆ׹m >p8fBZh91AY&SY_L*!?S/2" (Dl STB<fShd il4ɓF0F`(h ,zI~U4&8&AJX7`V # Z&,E PK"ޅe(R  ȀD+)D H"H$" YERAQAYj +n~9Tl/8J<篧'vO]V~KH:I7@ڹm|gtDJz)z'#W RSȨWZŷ]$p֤ +XVOkÇFҎQT(.p!ľT*(lc!a]03aage01Y,6FP8H @!P%`G<xTXpw4L d\*j^?& 3a