xen-devel-4.5.3-8.fc22$>VvGF*fV]E.u >9C?Cd   = &6<Dqq q q q q q q"q$%q&&'0(]((8(r9.dr:u|rG/qH1lqI30qX3Y3\3q]5q^: b;Ed<e<fqv?w@ qxAqyC CCxen-devel4.5.38.fc22Development libraries for Xen toolsThis package contains what's needed to develop applications which manage Xen virtual machines.W_buildhw-06.phx2.fedoraproject.org aFedora ProjectFedora ProjectGPLv2+ and LGPLv2+ and BSDFedora ProjectDevelopment/Librarieshttp://xen.org/linuxi686\A!m $gi  W: 9:[& f[ a1 $bf k7i /D=hF' 2#2&MF +8Qg ? |6g:X$ @W<0 IU%+ 88 A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤W_ҹW_ҹW_ҹVVVVVVVVVVW_ӥVW_ӘVW_ӥVW_ӥVW_ӥVVVVVVVVVVVVVW_ӥW_ҒW_ҒW_ҒW_ҒVVW_ӥVVVVVVVVW_ӥVVVVVVVVVW_uVVVVVVVVVVVVW_ӥVVVVVVVVVVVVVVW_ӥVVVVVW_ӦVVVVVW_ӦW_ӦW_ӪW_ӫW_ӪW_ӥW_ӥW_ӯW_өW_ӦW_ӬW_ӯ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-compat/xs.hxenstore-compat/xs_lib.hlibblktapctl.so.1.0libfsimage.so.1.0libvhd.so.1.0libxenctrl.so.4.5libxenguest.so.4.5libxenlight.so.4.5libxenstat.so.0libxenstore.so.3.0libxenvchan.so.1.0libxlutil.so.4.3rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootxen-4.5.3-8.fc22.src.rpmxen-develxen-devel(x86-32)@@@@@@@@@@    libblktapctl.so.1.0libfsimage.so.1.0libuuid-devellibvhd.so.1.0libxenctrl.so.4.5libxenguest.so.4.5libxenlight.so.4.5libxenstat.so.0libxenstore.so.3.0libxenvchan.so.1.0libxlutil.so.4.3rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)xen-libs3.0.4-14.6.0-14.0-15.2-14.5.3-8.fc224.12.0.1W_WRWI@W;W1@W0{W@VVn@Vm@V`VvVrVii@Vf@Vd#@VA@V9@V3[VVZVV@VU@U@UWU@UU@U@UU@U@UUx&Un@UmUSP$P!@P1@P@P @P @O/@O:O@O@O@OvOX@OX@ON@ON@O?O2cO1@O*zO#@OO yN=@N^N$@NN]N @NGN&@MM@MM@MOMF@MD@MBLML@L*@LLzKLuLV@LMxLL'@LH2LL @L@K K J@J0@J^@J J|@Jyt@JmJ|J+@IV@I@I@II@I1IsIeIHI1.HH@Ht@Hd@Hb3@HRa@HE2@H*@GPGPG Gs@G@GG G@G@GGGaGY5GQLG,bG!G FIFIFFFF@F@F@FuFnFVFLCF9F7+F5@F5@F5@F0@F0@F-@F-@EEWEEE3@E3@EE@E&E@E#@E#@E E@E@EgEgE@E~E-@E-@DfDfD@D@D}D,@DDDD@DГD@D@D@DDDDD{D5D5DDA@DDDDW@DDD[>@DP@DO`DN@DDDD uD $@D $@D@D@DD;@CC.C@C@CCCCC@CQ@CQ@CCh@CCCáC@C}@C@Cx|@Cu@Cs6@CqCqCqCX@C)b@C%mC 'C CB@BB@BBlB_BOBN@BK@BGB.@B*B(MB&@Bp@B*@BBAo@Ao@A4A@A@AAn@A(@A@A@A@A@Michael Young - 4.5.3-8Michael Young - 4.5.3-7Michael Young - 4.5.3-6Michael Young - 4.5.3-5Michael Young - 4.5.3-4Michael Young - 4.5.3-3Michael Young - 4.5.3-2Michael Young - 4.5.3-1Michael Young - 4.5.2-10Michael Young - 4.5.2-9Michael Young - 4.5.2-8Michael Young - 4.5.2-7Michael Young - 4.5.2-6Michael Young - 4.5.2-5Michael Young - 4.5.2-4Michael Young - 4.5.2-3Michael Young - 4.5.2-2Michael Young - 4.5.2-1Michael Young - 4.5.1-14Michael Young - 4.5.1-13Michael Young - 4.5.1-12Michael Young - 4.5.1-11Michael Young - 4.5.1-10Michael Young - 4.5.1-9Michael Young - 4.5.1-8Michael Young - 4.5.1-7Michael Young - 4.5.1-6Michael Young - 4.5.1-5Richard W.M. Jones - 4.5.1-4Michael Young - 4.5.1-3Michael Young - 4.5.1-2Michael Young - 4.5.1-1Richard W.M. Jones - 4.5.0-13Fedora Release Engineering - 4.5.0-12Michael Young Michael Young - 4.5.0-11Michael Young - 4.5.0-10.1Michael Young - 4.5.0-10Michael Young - 4.5.0-9Michael Young - 4.5.0-8Michael Young - 4.5.0-7Michael Young - 4.5.0-6Michael Young - 4.5.0-5Michael Young - 4.5.0-4Michael Young - 4.5.0-3Michael Young - 4.5.0-2Michael Young - 4.5.0-1Michael Young - 4.4.1-12Michael Young - 4.4.1-11Michael Young - 4.4.1-10Michael Young - 4.4.1-9Michael Young - 4.4.1-8Michael Young - 4.4.1-7Michael Young - 4.4.1-6Michael Young - 4.4.1-5Michael Young - 4.4.1-4Michael Young - 4.4.1-3Michael Young - 4.4.1-2Michael Young - 4.4.1-1Richard W.M. Jones - 4.4.0-14Richard W.M. Jones - 4.4.0-13Richard W.M. Jones - 4.4.0-12Fedora Release Engineering - 4.4.0-11Michael Young - 4.4.0-10Richard W.M. Jones - 4.4.0-9Michael Young - 4.4.0-8Michael Young - 4.4.0-7Michael Young - 4.4.0-6Fedora Release Engineering - 4.4.0-5Michael Young - 4.4.0-4Michael Young - 4.4.0-3Michael Young - 4.4.0-2Michael Young - 4.4.0-1Michael Young - 4.3.2-1Michael Young - 4.3.1-10Michael Young - 4.3.1-9Michael Young - 4.3.1-8Michael Young - 4.3.1-7Michael Young - 4.3.1-6Michael Young - 4.3.1-5Michael Young - 4.3.1-4Michael Young - 4.3.1-3Michael Young - 4.3.1-2Michael Young - 4.3.1-1Michael Young - 4.3.0-10Michael Young - 4.3.0-9Michael Young - 4.3.0-8Michael Young - 4.3.0-7Michael Young - 4.3.0-6Richard W.M. Jones - 4.3.0-5Fedora Release Engineering - 4.3.0-4Michael Young - 4.3.0-2 4.3.0-3Michael Young - 4.3.0-1Michael Young - 4.2.2-10Michael Young - 4.2.2-9Michael Young - 4.2.2-8Michael Young - 4.2.2-7Michael Young - 4.2.2-6Michael Young - 4.2.2-5Michael Young - 4.2.2-4Michael Young - 4.2.2-3Michael Young - 4.2.2-2Michael Young - 4.2.2-1Michael Young - 4.2.1-10Michael Young - 4.2.1-9Michael Young - 4.2.1-8Michael Young - 4.2.1-7Michael Young - 4.2.1-6Michael Young Michael Young - 4.2.1-5Michael Young - 4.2.1-4Michael Young - 4.2.1-3Michael Young - 4.2.1-2Michael Young - 4.2.1-1Richard W.M. Jones - 4.2.0-7Michael Young - 4.2.0-6Michael Young - 4.2.0-5Michael Young - 4.2.0-4Michael Young - 4.2.0-3Michael Young - 4.2.0-2Michael Young - 4.2.0-1Michael Young - 4.1.3-6Michael Young - 4.1.3-5Michael Young - 4.1.3-4Michael Young - 4.1.3-3Michael Young - 4.1.3-1 4.1.3-2Michael Young - 4.1.2-25Michael Young - 4.1.2-24Michael Young - 4.1.2-23Michael Young - 4.1.2-22Fedora Release Engineering - 4.1.2-21Michael Young - 4.1.2-20Michael Young - 4.1.2-19Michael Young - 4.1.2-18Michael Young - 4.1.2-16 4.1.2-17Michael Young - 4.1.2-15Michael Young - 4.1.2-14Michael Young - 4.1.2-13Michael Young - 4.1.2-12Michael Young - 4.1.2-11Michael Young - 4.1.2-10Michael Young - 4.1.2-9Michael Young - 4.1.2-8Michael Young - 4.1.2-7Michael Young - 4.1.2-6Michael Young - 4.1.2-5Michael Young - 4.1.2-4Michael Young - 4.1.2-3Michael Young - 4.1.2-2Michael Young - 4.1.2-1Michael Young - 4.1.1-8Michael Young - 4.1.1-7Michael Young - 4.1.1-5 4.1.1-6Michael Young - 4.1.1-4Michael Young - 4.1.1-3Michael Young - 4.1.1-2Michael Young - 4.1.1-1Michael Young - 4.1.0-2Michael Young - 4.1.0-1Michael Young - 4.1.0-0.1.rc8Fedora Release Engineering - 4.0.1-10Michael Young - 4.0.1-9Michael Young - 4.0.1-8Michael Young - 4.0.1-7Michael Young - 4.0.1-6Michael Young - 4.0.1-5jkeating - 4.0.1-4Michael Young - 4.0.1-3Michael Young - 4.0.1-2Michael Young - 4.0.1-1Michael Young - 4.0.0-5Michael Young Michael Young - 4.0.0-4David Malcolm - 4.0.0-3Michael Young - 4.0.0-2Michael Young - 4.0.0-1Michael Young - 3.4.3-1Gerd Hoffmann - 3.4.2-2Gerd Hoffmann - 3.4.2-1Justin M. Forbes - 3.4.1-5Gerd Hoffmann - 3.4.1-4Gerd Hoffmann - 3.4.1-3Gerd Hoffmann - 3.4.1-2Gerd Hoffmann - 3.4.1-1Gerd Hoffmann - 3.4.0-4Fedora Release Engineering - 3.4.0-3Gerd Hoffmann - 3.4.0-2Gerd Hoffmann - 3.4.0-1Gerd Hoffmann - 3.3.1-11Gerd Hoffmann - 3.3.1-9Gerd Hoffmann - 3.3.1-7Gerd Hoffmann - 3.3.1-6Gerd Hoffmann - 3.3.1-5Gerd Hoffmann - 3.3.1-3Tomas Mraz - 3.3.1-2Gerd Hoffmann - 3.3.1-1Gerd Hoffmann - 3.3.0-2Ignacio Vazquez-Abrams - 3.3.0-1.1Daniel P. Berrange - 3.3.0-1.fc10Mark McLoughlin - 3.2.0-17.fc10Daniel P. Berrange - 3.2.0-16.fc10Markus Armbruster - 3.2.0-15.fc10Daniel P. Berrange - 3.2.0-14.fc10Markus Armbruster - 3.2.0-13.fc10Daniel P. Berrange - 3.2.0-12.fc10Markus Armbruster - 3.2.0-11.fc10Daniel P. Berrange - 3.2.0-10.fc9Daniel P. Berrange - 3.2.0-9.fc9Daniel P. Berrange - 3.2.0-8.fc9Mark McLoughlin - 3.2.0-7.fc9Daniel P. Berrange - 3.2.0-6.fc9Daniel P. Berrange - 3.2.0-5.fc9Daniel P. Berrange - 3.2.0-4.fc9Daniel P. Berrange - 3.2.0-3.fc9Daniel P. Berrange - 3.2.0-2.fc9Daniel P. Berrange - 3.2.0-1.fc9Daniel P. Berrange - 3.2.0-0.fc9.rc5.dev16701.1Daniel P. Berrange - 3.1.2-3.fc9Release Engineering - 3.1.2-2.fc9Daniel P. Berrange - 3.1.2-1.fc9Daniel P. Berrange - 3.1.0-14.fc9Daniel P. Berrange - 3.1.0-13.fc9Daniel P. Berrange - 3.1.0-12.fc8Daniel P. Berrange - 3.1.0-11.fc8Chris Lalancette - 3.1.0-10.fc8Daniel P. Berrange - 3.1.0-9.fc8Daniel P. Berrange - 3.1.0-8.fc8Daniel P. Berrange - 3.1.0-7.fc8Daniel P. Berrange - 3.1.0-6.fc8Daniel P. Berrange - 3.1.0-5.fc8Daniel P. Berrange - 3.1.0-4.fc8Markus Armbruster - 3.1.0-3.fc8Daniel P. Berrange - 3.1.0-2.fc8Daniel P. Berrange - 3.1.0-1.fc8Daniel P. Berrange - 3.1.0-0.rc7.2.fc7Daniel P. Berrange - 3.1.0-0.rc7.1.fc7Daniel P. Berrange - 3.0.5-0.rc4.4.fc7Daniel P. Berrange - 3.0.5-0.rc4.3.fc7Daniel P. Berrange - 3.0.5-0.rc4.2.fc7Daniel P. Berrange - 3.0.5-0.rc4.1.fc7Daniel P. Berrange - 3.0.5-0.rc3.14934.2.fc7Daniel P. Berrange - 3.0.5-0.rc3.14934.1.fc7Daniel P. Berrange - 3.0.5-0.rc2.14889.2.fc7Daniel P. Berrange - 3.0.5-0.rc2.14889.1.fc7Daniel P. Berrange - 3.0.4-9.fc7Daniel P. Berrange - 3.0.4-8.fc7Daniel P. Berrange - 3.0.4-7.fc7Daniel P. Berrange - 3.0.4-6.fc7Daniel P. Berrange - 3.0.4-5.fc7Daniel P. Berrange - 3.0.4-4.fc7Daniel P. Berrange - 3.0.4-3.fc7Daniel P. Berrange - 3.0.4-2.fc7Daniel P. Berrange - 3.0.4-1Jeremy Katz - 3.0.3-3Jeremy Katz - 3.0.3-2Daniel P. Berrange - 3.0.3-1Jeremy Katz - 3.0.2-44Stephen C. Tweedie - 3.0.2-43Daniel P. Berrange - 3.0.2-42Stephen C. Tweedie - 3.0.2-41Stephen C. Tweedie - 3.0.2-40Daniel Berrange - 3.0.2-39Jeremy Katz - 3.0.2-38Daniel P. Berrange - 3.0.2-37Stephen C. Tweedie - 3.0.2-36Stephen C. Tweedie - 3.0.2-35Stephen C. Tweedie - 3.0.2-34Jeremy Katz - 3.0.2-33Juan Quintela - 3.0.2-31Jeremy Katz - 3.0.2-31Jeremy Katz - 3.0.2-30Jeremy Katz - 3.0.2-29Jeremy Katz - 3.0.2-28Jeremy Katz - 3.0.2-27Jeremy Katz - 3.0.2-26Jeremy Katz - 3.0.2-25Jeremy Katz - 3.0.2-24Jeremy Katz - 3.0.2-23Jeremy Katz - 3.0.2-22Rik van Riel - 3.0.2-21Jeremy Katz - 3.0.2-20Jeremy Katz - 3.0.2-19Jeremy Katz - 3.0.2-18Mark McLoughlin - 3.0.2-17Mark McLoughlin 3.0.2-16Daniel Veillard - 3.0.2-15Stephen C. Tweedie - 3.0.2-14Stephen C. Tweedie - 3.0.2-13Daniel Veillard - 3.0.2-12Jeremy Katz - 3.0.2-11Jeremy Katz - 3.0.2-10Jeremy Katz - 3.0.2-9Jeremy Katz - 3.0.2-8Daniel Veillard - 3.0.2-7Stephen C. Tweedie - 3.0.2-6Stephen C. Tweedie - 3.0.2-5Jeremy Katz - 3.0.2-4Daniel Veillard - 3.0.2-3Jeremy Katz - 3.0.2-2Jeremy Katz - 3.0.2-1Daniel Veillard - 3.0.1-5Jeremy Katz - 3.0.1-4Jeremy Katz - 3.0.1-3Stephen Tweedie - 3.0.1-2Jeremy Katz - 3.0.1-1Stephen Tweedie - 3.0.1-0.20060301.fc5.3Rik van Riel - 3.0.1-0.20060301.fc5.2Stephen Tweedie - 3.0.1-0.20060301.fc5.1Stephen Tweedie - 3.0.1-0.20060228.fc5.1Jeremy Katz - 3.0.1-0.20060208.fc5.3Jeremy Katz - 3.0.1-0.20060208.fc5.2Jeremy Katz - 3.0.1-0.20060208.fc5.1Jeremy Katz - 3.0.1-0.20060208.fc5Jeremy Katz - 3.0-0.20060130.fc5.6Jeremy Katz - 3.0-0.20060130.fc5.5Jeremy Katz - 3.0-0.20060130.fc5.4Jesse Keating - 3.0-0.20060130.fc5.3.1Bill Nottingham 3.0-0.20060130.fc5.3Bill Nottingham 3.0-0.20060130.fc5.2 - 3.0-0.20060130.fc5.1 - 3.0-0.20060130.fc5Jeremy Katz - 3.0-0.20060110.fc5.5Bill Nottingham - 3.0-0.20060110.fc5.4Jeremy Katz - 3.0-0.20060110.fc5.3 - 3.0-0.20060110.fc5.1Jesse Keating - 3.0-0.20051206.fc5.2Juan Quintela - 3.0-0.20051206.fc5.1Daniel Veillard - 3.0-0.20051109.fc5.4Jeremy Katz - 3.0-0.20051109.fc5.3Jeremy Katz Jeremy Katz - 3.0-0.20051109.fc5.2Jeremy Katz - 3.0-0.20051109.fc5.1Jeremy Katz - 3.0-0.20051109.fc5Jeremy Katz - 3.0-0.20051108.fc5Jeremy Katz - 3.0-0.20051021.fc5Jeremy Katz - 3.0-0.20050912.fc5.1Rik van Riel 3.0-0.20050912.fc5Rik van Riel 3.0-0.20050908Rik van Riel 2-20050823Rik van Riel 2-20050726Rik van Riel 2-20050530Rik van Riel 2-20050522Rik van Riel 2-20050520Rik van Riel 2-20050519Rik van Riel 2-20050424Jeremy Katz Rik van Riel 2-20050403Rik van Riel 2-20050402Rik van Riel 2-20050331Rik van Riel 2-20050328Rik van Riel 2-20050308Rik van Riel 2-20050305Rik van Riel 2-20050303Rik van Riel 2-20050303Rik van Riel 2-20050222Rik van Riel 2-20050219Rik van Riel 2-20050218Rik van Riel 2-20050207Rik van Riel 2-20050201.1Rik van Riel 2-20050201Jeremy Katz Rik van Riel - 2-20050124Jeremy Katz - 2-20050114Rik van Riel Rik van Riel Rik van Riel Rik van Riel Rik van Riel Rik van Riel Che- Qemu: scsi: esp: OOB r/w access while processing ESP_FIFO [CVE-2016-5338] (#1343323) - Qemu: scsi: megasas: information leakage in megasas_ctrl_get_info [CVE-2016-5337] (#1343909)- fix for CVE-2016-2858 doesn't build with qemu-xen enabled - Unsanitised guest input in libxl device handling code [XSA-175, CVE-2016-4962] (#1342132) - Unsanitised driver domain input in libxl device handling [XSA-178, CVE-2016-4963] (#1342131) - arm: Host crash caused by VMID exhaust [XSA-181] (#1342530) - Qemu: display: vmsvga: out-of-bounds read in vmsvga_fifo_read_raw() routine [CVE-2016-4454] (#1340741) - Qemu: display: vmsvga: infinite loop in vmsvga_fifo_run() routine [CVE-2016-4453] (#1340746) - Qemu: scsi: esp: OOB write when using non-DMA mode in get_cmd [CVE-2016-5238] (#1341931)- cleaner way to set kernel module load list - Unrestricted qemu logging [XSA-180, CVE-2014-3672] (#1339125) - Qemu: scsi: esp: OOB write while writing to 's->cmdbuf' in esp_reg_write [CVE-2016-4439] (#1337502) - Qemu: scsi: esp: OOB write while writing to 's->cmdbuf' in get_cmd [CVE-2016-4441] (#1337505) - Qemu: scsi: megasas: out-of-bounds write while setting controller properties [CVE-2016-5106] (#1339578) - Qemu: scsi: megasas: stack information leakage while reading configuration [CVE-2016-5105] (#1339583)- in systemd only try to load kernel modules that are in Fedora (#1291089) - x86 software guest page walk PS bit handling flaw [XSA-176, CVE-2016-4480] (#1332657)- create link to /usr/bin/qemu-system-i386 from /usr/lib/xen/bin for back compatibility and for virt-manager (#1334554) (#1299745) - cleaner fix for XSA-179 on qemu-xen-traditional- qemu-kvm: Integer overflow in SDL when creating too wide screen (#1330513) - QEMU: Banked access to VGA memory (VBE) uses inconsistent bounds checks [XSA-179, CVE-2016-3710, CVE-2016-3712] (#1334346) (#1334343)- x86 shadow pagetables: address width overflow [XSA-173, CVE-2016-3960] (#1328118) - Qemu: net: buffer overflow in stellaris_enet emulator [CVE-2016-4001] (#1325886) - Qemu: net: buffer overflow in MIPSnet emulator [CVE-2016-4002] (#1326084) - qemu: Infinite loop vulnerability in usb_ehci using siTD process [CVE-2016-4037] (#1328081) (supercedes CVE-2015-8558 patch)- update to 4.5.3 adjust xen.use.fedora.ipxe.patch remove patches for issues now fixed upstream renumber patches- broken AMD FPU FIP/FDP/FOP leak workaround [XSA-172, CVE-2016-3158, CVE-2016-3159] (#1321944)- Qemu: nvram: OOB r/w access in processing firmware configurations CVE-2016-1714 (#1296080) - Qemu: i386: null pointer dereference in vapic_write() CVE-2016-1922 (#1292767) - qemu: Stack-based buffer overflow in megasas_ctrl_get_info CVE-2015-8613 (#1293305) - qemu-kvm: Infinite loop and out-of-bounds transfer start in start_xmit() and e1000_receive_iov() CVE-2016-1981 (#1299996) - Qemu: usb ehci out-of-bounds read in ehci_process_itd (#1300235) - Qemu: usb: ehci null pointer dereference in ehci_caps_write CVE-2016-2198 (#1303135) - Qemu: net: ne2000: infinite loop in ne2000_receive CVE-2016-2841 (#1304048) - Qemu: usb: integer overflow in remote NDIS control message handling CVE-2016-2538 (#1305816) - Qemu: usb: null pointer dereference in remote NDIS control message handling CVE-2016-2392 (#1307116) - Qemu: usb: multiple eof_timers in ohci module leads to null pointer dereference CVE-2016-2391 (#1308882) - Qemu: net: out of bounds read in net_checksum_calculate() CVE-2016-2857 (#1309565) - Qemu: OOB access in address_space_rw leads to segmentation fault CVE-2015-8817 CVE-2015-8818 (#1313273) - Qemu: rng-random: arbitrary stack based allocation leading to corruption CVE-2016-2858 (#1314678)- x86: inconsistent cachability flags on guest mappings [XSA-154, CVE-2016-2270] (#1309324) - VMX: guest user mode may crash guest with non-canonical RIP [XSA-170, CVE-2016-2271] (#1309323)- PV superpage functionality missing sanity checks [XSA-167, CVE-2016-1570] (#1300345) - VMX: intercept issue with INVLPG on non-canonical address [XSA-168, CVE-2016-1571] (#1300342) - Qemu: pci: null pointer dereference issue CVE-2015-7549 (#1291139) - qemu: DoS by infinite loop in ehci_advance_state CVE-2015-8558 (#1291310) - qemu: Heap-based buffer overrun during VM migration CVE-2015-8666 (#1294028) - Qemu: net: vmxnet3: incorrect l2 header validation leads to a crash via assert(2) call CVE-2015-8744 (#1295441) - qemu: Support reading IMR registers on bar0 CVE-2015-8745 (#1295443) - Qemu: net: vmxnet3: host memory leakage CVE-2015-8567 CVE-2015-8568 (#1289817) - Qemu: net: ne2000: OOB memory access in ioport r/w functions CVE-2015-8743 (#1294788)- four security updates (#1292439) paravirtualized drivers incautious about shared memory contents [XSA-155, CVE-2015-8550] qemu-dm buffer overrun in MSI-X handling [XSA-164, CVE-2015-8554] information leak in legacy x86 FPU/XMM initialization [XSA-165, CVE-2015-8555] ioreq handling possibly susceptible to multiple read issue [XSA-166]- eepro100: Prevent two endless loops [CVE-2015-8345] (#1285215) - pcnet: fix rx buffer overflow [CVE-2015-7512] (#1286563) - ui: vnc: avoid floating point exception [CVE-2015-8504] (#1289544) - additional patch for [XSA-158, CVE-2015-8338]- three security updates (#1289568) long running memory operations on ARM [XSA-158, CVE-2015-8338] XENMEM_exchange error handling issues [XSA-159, CVE-2015-8339, CVE-2015-8340] libxl leak of pv kernel and initrd on error [XSA-160, CVE-2015-8341]- heap buffer overflow vulnerability in pcnet emulator [XSA-162, CVE-2015-7504] (#1286544) - virtual PMU is unsupported [XSA-163] (#1285351)- x86: CPU lockup during exception delivery [XSA-156, CVE-2015-5307, CVE-2015-8104] (#1279689, #1279690) - silence 2 macro in comment warnings- update to 4.5.2 adjust xen.use.fedora.ipxe.patch remove patches for issues now fixed upstream renumber patches- nine security updates (#1276344) arm: Host crash when preempting a multicall [XSA-145, CVE-2015-7812] arm: various unimplemented hypercalls log without rate limiting [XSA-146, CVE-2015-7813] arm: Race between domain destruction and memory allocation decrease [XSA-147, CVE-2015-7814] x86: Uncontrolled creation of large page mappings by PV guests [XSA-148, CVE-2015-7835] leak of main per-domain vcpu pointer array [XSA-149, CVE-2015-7969] x86: Long latency populate-on-demand operation is not preemptible [XSA-150, CVE-2015-7970] x86: leak of per-domain profiling-related vcpu pointer array [XSA-151, CVE-2015-7969] x86: some pmu and profiling hypercalls log without rate limiting [XSA-152, CVE-2015-7971] x86: populate-on-demand balloon size inaccuracy can crash guests [XSA-153, CVE-2015-7972]- patch CVE-2015-7295 for qemu-xen-traditional as well- Qemu: net: virtio-net possible remote DoS [CVE-2015-7295] (#1264392)- create a symbolic link so libvirt VMs from xen 4.0 to 4.4 can still find qemu-dm (#1268176), (#1248843)- ide: fix ATAPI command permissions [CVE-2015-6855] (#1261792)- ui/vnc: limit client_cut_text msg payload size [CVE-2015-5239] (#1259504) - e1000: Avoid infinite loop in processing transmit descriptor [CVE-2015-6815] (#1260224) - net: add checks to validate ring buffer pointers [CVE-2015-5279] (#1263278) - net: avoid infinite loop when receiving packets [CVE-2015-5278] (#1263281) - qemu buffer overflow in virtio-serial [CVE-2015-5745] (#1251354)- libxl fails to honour readonly flag on disks with qemu-xen [XSA-142, CVE-2015-7311] (#1257893) (final patch version)- printk is not rate-limited in xenmem_add_to_physmap_one (ARM) [XSA-141, CVE-2015-6654]- Use after free in QEMU/Xen block unplug protocol [XSA-139, CVE-2015-5166] (#1249757) - QEMU leak of uninitialized heap memory in rtl8139 device model [XSA-140, CVE-2015-5165] (#1249756)- QEMU heap overflow flaw while processing certain ATAPI commands. [XSA-138, CVE-2015-5154] (#1247142) - try again to fix xen-qemu-dom0-disk-backend.service (#1242246)- OCaml 4.02.3 rebuild.- correct qemu location in xen-qemu-dom0-disk-backend.service (#1242246) - rebuild efi grub.cfg if it is present (#1239309) - re-enable remus by building with libnl3 - modify gnutls use in line with Fedora's crypto policies (#1179352)- xl command line config handling stack overflow [XSA-137, CVE-2015-3259]- update to 4.5.1 adjust xen.use.fedora.ipxe.patch and xen.fedora.systemd.patch remove patches for issues now fixed upstream renumber patches- Rebuild for ocaml-4.02.2.- Rebuilt for https://fedoraproject.org/wiki/Fedora_23_Mass_Rebuild- gcc 5 bug is fixed so remove workaround- stubs-32.h is back, so revert to previous behaviour - Heap overflow in QEMU PCNET controller, allowing guest->host escape [XSA-135, CVE-2015-3209] (#1230537) - GNTTABOP_swap_grant_ref operation misbehavior [XSA-134, CVE-2015-4163] - vulnerability in the iret hypercall handler [XSA-136, CVE-2015-4164]- stubs-32.h has gone from rawhide, put it back manually- replace deprecated gnutls use in qemu-xen-traditional based on qemu-xen patches - work around a gcc 5 bug - Potential unintended writes to host MSI message data field via qemu [XSA-128, CVE-2015-4103] (#1227627) - PCI MSI mask bits inadvertently exposed to guests [XSA-129, CVE-2015-4104] (#1227628) - Guest triggerable qemu MSI-X pass-through error messages [XSA-130, CVE-2015-4105] (#1227629) - Unmediated PCI register access in qemu [XSA-131, CVE-2015-4106] (#1227631)- Privilege escalation via emulated floppy disk drive [XSA-133, CVE-2015-3456] (#1221153)- Information leak through XEN_DOMCTL_gettscinfo [XSA-132, CVE-2015-3340] (#1214037)- Long latency MMIO mapping operations are not preemptible [XSA-125, CVE-2015-2752] (#1207741) - Unmediated PCI command register access in qemu [XSA-126, CVE-2015-2756] (#1307738) - Certain domctl operations may be abused to lock up the host [XSA-127, CVE-2015-2751] (#1207739)- Additional patch for XSA-98 on arm64- HVM qemu unexpectedly enabling emulated VGA graphics backends [XSA-119, CVE-2015-2152] (#1201365)- Hypervisor memory corruption due to x86 emulator flaw [XSA-123, CVE-2015-2151] (#1200398)- Information leak via internal x86 system device emulation [XSA-121, CVE-2015-2044] - Information leak through version information hypercall [XSA-122, CVE-2015-2045] - fix a typo in xen.fedora.systemd.patch- arm: vgic-v2: GICD_SGIR is not properly emulated [XSA-117, CVE-2015-0268] - allow certain warnings with gcc5 that would otherwise be treated as errors- update to 4.5.0 xend has gone, so remove references to xend in spec file, sources and patches remove patches for issues now fixed upstream adjust some patches due to other code changes adjust spec file for renamed xenpolicy files set prefix back to /usr (default is now /usr/local) use upstream systemd files with patches for Fedora and selinux sysconfig for systemd is now in xencommons file for x86_64, files in /usr/lib64/xen/bin have moved to /usr/lib/xen/bin remus isn't built upstream systemd support needs systemd-devel to build replace new uint32 with uint32_t in ocaml file for ocaml-4.02.0 stop oxenstored failing when selinux is enforcing re-number patches - enable building pngs from fig files which is working again - fix oxenstored.service preset preuninstall script - arm: vgic: incorrect rate limiting of guest triggered logging [XSA-118, CVE-2015-1563] (#1187153)- xen crash due to use after free on hvm guest teardown [XSA-116, CVE-2015-0361] (#1179221)- fix xendomains issue introduced by xl migrate --debug patch- p2m lock starvation [XSA-114, CVE-2014-9065] - fix build with --without xsm- Excessive checking in compatibility mode hypercall argument translation [XSA-111, CVE-2014-8866] - Insufficient bounding of "REP MOVS" to MMIO emulated inside the hypervisor [XSA-112, CVE-2014-8867] - fix segfaults and failures in xl migrate --debug (#1166461)- Guest effectable page reference leak in MMU_MACHPHYS_UPDATE handling [XSA-113, CVE-2014-9030] (#1166914)- Insufficient restrictions on certain MMU update hypercalls [XSA-109, CVE-2014-8594] (#1165205) - Missing privilege level checks in x86 emulation of far branches [XSA-110, CVE-2014-8595] (#1165204) - Add fix for CVE-2014-0150 to qemu-dm, though it probably isn't exploitable from xen (#1086776)- Improper MSR range used for x2APIC emulation [XSA-108, CVE-2014-7188] (#1148465)- xen support is in 256k seabios binary when it exists (#1146260)- Race condition in HVMOP_track_dirty_vram [XSA-104, CVE-2014-7154] (#1145736) - Missing privilege level checks in x86 HLT, LGDT, LIDT, and LMSW emulation [XSA-105, CVE-2014-7155] (#1145737) - Missing privilege level checks in x86 emulation of software interrupts [XSA-106, CVE-2014-7156] (#1145738)- disable building pngs from fig files which is currently broken in rawhide- Mishandling of uninitialised FIFO-based event channel control blocks [XSA-107, CVE-2014-6268] (#1140287) - delete a patch file that was dropped in the last update- update to xen-4.4.1 remove patches for fixes that are now included - replace uint32 with uint32_t in ocaml file for ocaml-4.02.0- Bump release and rebuild.- ocaml-4.02.0 final rebuild.- ocaml-4.02.0+rc1 rebuild.- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild- Long latency virtual-mmu operations are not preemptible [XSA-97, CVE-2014-5146]- ocaml-4.02.0-0.8.git10e45753.fc22 rebuild.- rebuild for ocaml update- Hypervisor heap contents leaked to guest [XSA-100, CVE-2014-4021] (#1110316) with extra patch to avoid regression- Fix two %if line typos in the spec file - Vulnerabilities in HVM MSI injection [XSA-96, CVE-2014-3967,CVE-2014-3968] (#1104583)- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild- add systemd preset support (#1094938)- HVMOP_set_mem_type allows invalid P2M entries to be created [XSA-92, CVE-2014-3124] (#1093315) - change -Wmaybe-uninitialized errors into warnings for gcc 4.9.0 - fix a couple of -Wmaybe-uninitialized cases- HVMOP_set_mem_access is not preemptible [XSA-89, CVE-2014-2599] (#1080425)- update to xen-4.4.0 - adjust xend.selinux.fixes.patch and xen-initscript.patch as xend has moved - don't build xend unless --with xend is specified - use --with-system-seabios option instead of xen.use.fedora.seabios.patch - update xen.use.fedora.ipxe.patch patch - replace qemu-xen.tradonly.patch with --with-system-qemu= option pointing to Fedora's qemu-system-i386 - adjust xen.xsm.enable.patch and remove bits that are are no longer needed - blktapctrl is no longer built, remove related files - adjust files to be packaged; xsview has gone, add xen-mfndump and xenstore man pages - add another xenstore-write to xenstored.service and oxenstored.service - Add xen.console.fix.patch to fix issues running pygrub- update to xen-4.3.2 includes fix for "Excessive time to disable caching with HVM guests with PCI passthrough" [XSA-60, CVE-2013-2212] (#987914) - remove patches that are now included- use-after-free in xc_cpupool_getinfo() under memory pressure [XSA-88, CVE-2014-1950] (#1064491)- integer overflow in several XSM/Flask hypercalls [XSA-84, CVE-2014-1891, CVE-2014-1892, CVE-2014-1893, CVE-2014-1894] Off-by-one error in FLASK_AVC_CACHESTAT hypercall [XSA-85, CVE-2014-1895] libvchan failure handling malicious ring indexes [XSA-86, CVE-2014-1896] (#1062335)- PHYSDEVOP_{prepare,release}_msix exposed to unprivileged pv guests [XSA-87, CVE-2014-1666] (#1058398)- Out-of-memory condition yielding memory corruption during IRQ setup [XSA-83, CVE-2014-1642] (#1057142)- Disaggregated domain management security status update [XSA-77] - IOMMU TLB flushing may be inadvertently suppressed [XSA-80, CVE-2013-6400] (#1040024)- HVM guest triggerable AMD CPU erratum may cause host hang [XSA-82, CVE-2013-6885]- Lock order reversal between page_alloc_lock and mm_rwlock [XSA-74, CVE-2013-4553] (#1034925) - Hypercalls exposed to privilege rings 1 and 2 of HVM guests [XSA-76, CVE-2013-4554] (#1034923)- Insufficient TLB flushing in VT-d (iommu) code [XSA-78, CVE-2013-6375] (#1033149)- Host crash due to HVM guest VMX instruction execution [XSA-75, CVE-2013-4551] (#1029055)- update to xen-4.3.1 - Lock order reversal between page allocation and grant table locks [XSA-73, CVE-2013-4494] (#1026248)- ocaml xenstored mishandles oversized message replies [XSA-72, CVE-2013-4416] (#1024450)- systemd changes to allow oxenstored to be used instead of xenstored (#1022640)- security fixes (#1017843) Information leak through outs instruction emulation in 64-bit PV guests [XSA-67, CVE-2013-4368] possible null dereference when parsing vif ratelimiting info [XSA-68, CVE-2013-4369] misplaced free in ocaml xc_vcpu_getaffinity stub [XSA-69, CVE-2013-4370] use-after-free in libxl_list_cpupool under memory pressure [XSA-70, CVE-2013-4371] qemu disk backend (qdisk) resource leak (Fedora doesn't build this qemu) [XSA-71, CVE-2013-4375]- Set "Domain-0" label in xenstored.service systemd file to match xencommons init.d script. - security fixes (#1013748) Information leaks to HVM guests through I/O instruction emulation [XSA-63, CVE-2013-4355] Memory accessible by 64-bit PV guests under live migration [XSA-64, CVE-2013-4356] Information leak to HVM guests through fbld instruction emulation [XSA-66, CVE-2013-4361]- Information leak on AVX and/or LWP capable CPUs [XSA-62, CVE-2013-1442] (#1012056)- Rebuild for OCaml 4.01.0.- Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild- build a 64-bit hypervisor on ix86- update to xen-4.3.0 - rebase xen.use.fedora.ipxe.patch - remove patches that are now included or no longer needed - add polarssl source needed for stubdom build - remove references to ia64 in spec file (dropped upstream) - don't build hypervisor on ix86 (dropped upstream) - tools want wget (or ftp) to build - build XSM FLASK support into hypervisor with policy file - add xencov_split and xencov to files packaged, remove pdf docs - tidy up rpm scripts and stop enabling systemctl services on upgrade now sysv is gone from Fedora - re-number patches- XSA-45/CVE-2013-1918 breaks page reference counting [XSA-58, CVE-2013-1432] (#978383) - let pygrub handle set default="${next_entry}" line in F19 (#978036) - libxl: Set vfb and vkb devid if not done so by the caller (#977987)- add upstream patch for PCI passthrough problems after XSA-46 (#977310)- xenstore permissions not set correctly by libxl [XSA-57, CVE-2013-2211] (#976779)- Revised fixes for [XSA-55, CVE-2013-2194 CVE-2013-2195 CVE-2013-2196] (#970640)- Information leak on XSAVE/XRSTOR capable AMD CPUs [XSA-52, CVE-2013-2076] (#970206) - Hypervisor crash due to missing exception recovery on XRSTOR [XSA-53, CVE-2013-2077] (#970204) - Hypervisor crash due to missing exception recovery on XSETBV [XSA-54, CVE-2013-2078] (#970202) - Multiple vulnerabilities in libelf PV kernel handling [XSA-55] (#970640)- xend toolstack doesn't check bounds for VCPU affinity [XSA-56, CVE-2013-2072] (#964241)- xen-devel should require libuuid-devel (#962833) - pygrub menu items can include too much text (#958524)- PV guests can use non-preemptible long latency operations to mount a denial of service attack on the whole system [XSA-45, CVE-2013-1918] (#958918) - malicious guests can inject interrupts through bridge devices to mount a denial of service attack on the whole system [XSA-49, CVE-2013-1952] (#958919)- fix further man page issues to allow building on F19 and F20- update to xen-4.2.2 includes fixes for [XSA-48, CVE-2013-1922] (Fedora doesn't use the affected code) passed through IRQs or PCI devices might allow denial of service attack [XSA-46, CVE-2013-1919] (#953568) SYSENTER in 32-bit PV guests on 64-bit xen can crash hypervisor [XSA-44, CVE-2013-1917] (#953569) - remove patches that are included in 4.2.2 - look for libxl-save-helper in the right place - fix xl list -l output when built with yajl2 - allow xendomains to work with xl saved images- make xendomains systemd script executable and update it from init.d version (#919705) - Potential use of freed memory in event channel operations [XSA-47, CVE-2013-1920]- patch for [XSA-36, CVE-2013-0153] can cause boot time crash- patch for [XSA-38, CVE-2013-0215] was flawed- BuildRequires for texlive-kpathsea-bin wasn't needed - correct gcc 4.8 fixes and follow suggestions upstream- guest using oxenstored can crash host or exhaust memory [XSA-38, CVE-2013-0215] (#907888) - guest using AMD-Vi for PCI passthrough can cause denial of service [XSA-36, CVE-2013-0153] (#910914) - add some fixes for code which gcc 4.8 complains about - additional BuildRequires are now needed for pod2text and pod2man also texlive-kpathsea-bin for mktexfmt- correct disabling of xendomains.service on uninstall- nested virtualization on 32-bit guest can crash host [XSA-34, CVE-2013-0151] also nested HVM on guest can cause host to run out of memory [XSA-35, CVE-2013-0152] (#902792) - restore status option to xend which is used by libvirt (#893699)- Buffer overflow when processing large packets in qemu e1000 device driver [XSA-41, CVE-2012-6075] (#910845)- fix some format errors in xl.cfg.pod.5 to allow build on F19- VT-d interrupt remapping source validation flaw [XSA-33, CVE-2012-5634] (#893568) - pv guests can crash xen when xen built with debug=y (included for completeness - Fedora builds have debug=n) [XSA-37, CVE-2013-0154]- update to xen-4.2.1 - remove patches that are included in 4.2.1 - rebase xen.fedora.efi.build.patch- Rebuild for OCaml fix (RHBZ#877128).- 6 security fixes A guest can cause xen to crash [XSA-26, CVE-2012-5510] (#883082) An HVM guest can cause xen to run slowly or crash [XSA-27, CVE-2012-5511] (#883084) A PV guest can cause xen to crash and might be able escalate privileges [XSA-29, CVE-2012-5513] (#883088) An HVM guest can cause xen to hang [XSA-30, CVE-2012-5514] (#883091) A guest can cause xen to hang [XSA-31, CVE-2012-5515] (#883092) A PV guest can cause xen to crash and might be able escalate privileges [XSA-32, CVE-2012-5525] (#883094)- two build fixes for Fedora 19 - add texlive-ntgclass package to fix build- 4 security fixes A guest can block a cpu by setting a bad VCPU deadline [XSA 20, CVE-2012-4535] (#876198) HVM guest can exhaust p2m table crashing xen [XSA 22, CVE-2012-4537] (#876203) PAE HVM guest can crash hypervisor [XSA-23, CVE-2012-4538] (#876205) 32-bit PV guest on 64-bit hypervisor can cause an hypervisor infinite loop [XSA-24, CVE-2012-4539] (#876207) - texlive-2012 is now in Fedora 18- texlive-2012 isn't in Fedora 18 yet- limit the size of guest kernels and ramdisks to avoid running out of memeory on dom0 during guest boot [XSA-25, CVE-2012-4544] (#870414)- update to xen-4.2.0 - rebase xen-net-disable-iptables-on-bridge.patch pygrubfix.patch - remove patches that are now upstream or with alternatives upstream - use ipxe and seabios from seabios-bin and ipxe-roms-qemu packages - xen tools now need ./configure to be run (x86_64 needs libdir set) - don't build upstream qemu version - amend list of files in package - relocate xenpaging add /etc/xen/xlexample* oxenstored.conf /usr/include/xenstore-compat/* xenstore-stubdom.gz xen-lowmemd xen-ringwatch xl.1.gz xl.cfg.5.gz xl.conf.5.gz xlcpupool.cfg.5.gz - use a tmpfiles.d file to create /run/xen on boot - add BuildRequires for yajl-devel and graphviz - build an efi boot image where it is supported - adjust texlive changes so spec file still works on Fedora 17- add font packages to build requires due to 2012 version of texlive in F19 - use build requires of texlive-latex instead of tetex-latex which it obsoletes- rebuild for ocaml update- disable qemu monitor by default [XSA-19, CVE-2012-4411] (#855141)- 5 security fixes a malicious 64-bit PV guest can crash the dom0 [XSA-12, CVE-2012-3494] (#854585) a malicious crash might be able to crash the dom0 or escalate privileges [XSA-13, CVE-2012-3495] (#854589) a malicious PV guest can crash the dom0 [XSA-14, CVE-2012-3496] (#854590) a malicious HVM guest can crash the dom0 and might be able to read hypervisor or guest memory [XSA-16, CVE-2012-3498] (#854593) an HVM guest could use VT100 escape sequences to escalate privileges to that of the qemu process [XSA-17, CVE-2012-3515] (#854599)- update to 4.1.3 includes fix for untrusted HVM guest can cause the dom0 to hang or crash [XSA-11, CVE-2012-3433] (#843582) - remove patches that are now upstream - remove some unnecessary compile fixes - adjust upstream-23936:cdb34816a40a-rework for backported fix for upstream-23940:187d59e32a58 - replace pygrub.size.limits.patch with upstreamed version - fix for (#845444) broke xend under systemd- remove some unnecessary cache flushing that slow things down - change python options on xend to reduce selinux problems (#845444)- in rare circumstances an unprivileged user can crash an HVM guest [XSA-10,CVE-2012-3432] (#843766)- add a patch to remove a dependency on PyXML and Require python-lxml instead of PyXML (#842843)- adjust systemd service files not to report failures when running without a hypervisor or when xendomains.service doesn't find anything to start- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild- Apply three security patches 64-bit PV guest privilege escalation vulnerability [CVE-2012-0217] guest denial of service on syscall/sysenter exception generation [CVE-2012-0218] PV guest host Denial of Service [CVE-2012-2934]- adjust xend.service systemd file to avoid selinux problems- Enable xenconsoled by default under systemd (#829732)- make pygrub cope better with big files from guest (#818412 CVE-2012-2625) - add patch from 4.1.3-rc2-pre to build on F17/8- Make the udev tap rule more specific as it breaks openvpn (#812421) - don't try setuid in xend if we don't need to so selinux is happier- /var/lib/xenstored mount has wrong selinux permissions in latest Fedora - load xen-acpi-processor module (kernel 3.4 onwards) if present- fix a packaging error- fix an error in an rpm script from the sysv configuration removal - migrate xendomains script to systemd- put the systemd files back in the right place- clean up systemd and sysv configuration including removal of migrated sysv files for fc17+- move xen-watchdog to systemd- relocate systemd files for fc17+- move xend and xenconsoled to systemd- Fix buffer overflow in e1000 emulation for HVM guests [CVE-2012-0029]- Start building xen's ocaml libraries if appropriate unless --without ocaml was specified - add some backported patches from xen unstable (via Debian) for some ocaml tidying and fixes- actually apply the xend-pci-loop.patch - compile fixes for gcc-4.7- Add xend-pci-loop.patch to stop xend crashing with weird PCI cards (#767742) - avoid a backtrace if xend can't log to the standard file or a temporary directory (part of #741042)- Fix lost interrupts on emulated devices - stop xend crashing if its state files are empty at start up - avoid a python backtrace if xend is run on bare metal - update grub2 configuration after the old hypervisor has gone - move blktapctrl to systemd - Drop obsolete dom0-kernel.repo file- update to 4.1.2 remove upstream patches xen-4.1-testing.23104 and xen-4.1-testing.23112- more pygrub improvements for grub2 on guest- make pygrub work better with GPT partitions and grub2 on guest- improve systemd functionality- lsb header fixes - xenconsoled shutdown needs xenstored to be running - partial migration to systemd to fix shutdown delays - update grub2 configuration after hypervisor updates- untrusted guest controlling PCI[E] device can lock up host CPU [CVE-2011-3131]- clean up patch to solve a problem with hvmloader compiled with gcc 4.6- update to 4.1.1 includes various bugfixes and fix for [CVE-2011-1898] guest with pci passthrough can gain privileged access to base domain - remove upstream cve-2011-1583-4.1.patch- Overflows in kernel decompression can allow root on xen PV guest to gain privileged access to base domain, or access to xen configuration info. Lack of error checking could allow DoS attack from guest [CVE-2011-1583] - Don't require /usr/bin/qemu-nbd as it isn't used at present.- update to 4.1.0 final- update to 4.1.0-rc8 release candidate - create xen-4.1.0-rc8.tar.xz file from git/hg repositories - rebase xen-initscript.patch xen-dumpdir.patch xen-net-disable-iptables-on-bridge.patch localgcc45fix.patch sysconfig.xenstored init.xenstored - remove unnecessary or conflicting xen-xenstore-cli.patch localpy27fixes.patch xen.irq.fixes.patch xen.xsave.disable.patch xen.8259afix.patch localcleanups.patch libpermfixes.patch - add patch to allow pygrub to work with single partitions with boot sectors - create ipxe-git-v1.0.0.tar.gz from http://git.ipxe.org/ipxe.git to avoid downloading at build time - no need to move udev rules or init scripts as now created in the right place - amend list of files shipped - remove fs-backend add init.d scripts xen-watchdog xencommons add config files xencommons xl.conf cpupool add programs kdd tap-ctl xen-hptool xen-hvmcrash xenwatchdogd- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild- Make libraries executable so that rpm gets dependencies right- Temporarily turn off some compile options so it will build on rawhide- ghost directories in /var/run (#656724) - minor fixes to /usr/share/doc/xen-doc-4.?.?/misc/network_setup.txt (#653159) /etc/xen/scripts/network-route, /etc/xen/scripts/vif-common.sh (#669747) and /etc/sysconfig/modules/xen.modules (#656536)- add upstream xen patch xen.8259afix.patch to fix boot panic "IO-APIC + timer doesn't work!" (#642108)- add ext4 support for pvgrub (grub-ext4-support.patch from grub-0.97-66.fc14)- Rebuilt for gcc bug 634757- create symlink for qemu-dm on x86_64 for compatibility with 3.4 - apply some patches destined for 4.0.2 add some irq fixes disable xsave which causes problems for HVM- fix compile problems on Fedora 15, I suspect due to gcc 4.5.1- update to 4.0.1 release - many bug fixes - xen-dev-create-cleanup.patch no longer needed - remove part of localgcc45fix.patch no longer needed - package new files /etc/bash_completion.d/xl.sh and /usr/sbin/gdbsx - add patch to get xm and xend working with python 2.7- add newer module names and xen-gntdev to xen.modules - Update dom0-kernel.repo file to use repos.fedorapeople.org location- create a xen-licenses package to satisfy revised the Fedora Licensing Guidelines- fix gcc 4.5 compile problems- Rebuilt for https://fedoraproject.org/wiki/Features/Python_2.7/MassRebuild- add patch to remove some old device creation code that doesn't work with the latest pvops kernels- update to 4.0.0 release - rebase xen-initscript.patch and xen-dumpdir.patch patches - adjust spec file for files added to or removed from the packages - add new build dependencies libuuid-devel and iasl- update to 3.4.3 release including support for latest pv_ops kernels (possibly incomplete) should fix build problems (#565063) and crashes (#545307) - replace Prereq: with Requires: in spec file - drop static libraries (#556101)- adapt module load script to evtchn.ko -> xen-evtchn.ko rename.- update to 3.4.2 release. - drop backport patches.- add PyXML to dependencies. (#496135) - Take ownership of {_libdir}/fs (#521806)- add e2fsprogs-devel to build dependencies.- swap bzip2+xz linux kernel compression support patches. - backport one more bugfix (videoram option).- backport bzip2+xz linux kernel compression support. - backport a few bugfixes.- update to 3.4.1 release.- Kill info files. No xen docs, just standard gnu stuff. - kill -Werror in tools/libxc to fix build.- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild- rename info files to fix conflict with binutils. - add install-info calls for the doc subpackage. - un-parallelize doc build.- update to version 3.4.0. - cleanup specfile, add doc subpackage.- fix python 2.6 warnings.- fix xen.modules init script for pv_ops kernel. - stick rpm release tag into XEN_VENDORVERSION. - use i386 i486 i586 i686 pentium3 pentium4 athlon geode macro in ExclusiveArch. - keep blktapctrl turned off by default.- fix xenstored init script for pv_ops kernel.- fix xenstored crash. - backport qemu-unplug patch.- fix gcc44 build (broken constrain in inline asm). - fix ExclusiveArch- backport bzImage support for dom0 builder.- rebuild with new openssl- update to xen 3.3.1 release.- build and package stub domains (pvgrub, ioemu). - backport unstable fixes for pv_ops dom0.- Rebuild for Python 2.6- Update to xen 3.3.0 release- Enable xen-hypervisor build - Backport support for booting DomU from bzImage - Re-diff all patches for zero fuzz- Remove bogus ia64 hypercall arg (rhbz #433921)- Re-enable QEMU image format auto-detection, without the security loopholes- Rebuild for GNU TLS ABI change- Correctly limit PVFB size (CVE-2008-1952)- Move /var/run/xend into xen-runtime for pygrub (rhbz #442052)- Disable QEMU image format auto-detection (CVE-2008-2004) - Fix PVFB to validate frame buffer description (CVE-2008-1943)- Fix block device checks for extendable disk formats- Let XenD setup QEMU logfile (rhbz #435164) - Fix PVFB use of event channel filehandle- Fix block device extents check (rhbz #433560)- Restore some network-bridge patches lost during 3.2.0 rebase- Fixed xenstore-ls to automatically use xenstored socket as needed- Fix timer mode parameter handling for HVM - Temporarily disable all Latex docs due to texlive problems (rhbz #431327)- Add a xen-runtime subpackage to allow use of Xen without XenD - Split init script out to one script per daemon - Remove unused / broken / obsolete tools- Remove legacy dependancy on python-virtinst- Added XSM header files to -devel RPM- Updated to 3.2.0 final release- Rebase to Xen 3.2 rc5 changeset 16701- Re-factor to make it easier to test dev trees in RPMs - Include hypervisor build if doing a dev RPM- Rebuild for deps- Upgrade to 3.1.2 bugfix release- Disable network-bridge script since it conflicts with NetworkManager which is now on by default- Fixed xenbaked tmpfile flaw (CVE-2007-3919)- Pull in QEMU BIOS boot menu patch from KVM package - Fix QEMU patch for locating x509 certificates based on command line args - Add XenD config options for TLS x509 certificate setup- Fixed rtl8139 checksum calculation for Vista (rhbz #308201)- QEmu NE2000 overflow check - CVE-2007-1321 - Pygrub guest escape - CVE-2007-4993- Fix generation of manual pages (rhbz #250791) - Really fix FC-6 32-on-64 guests- Make 32-bit FC-6 guest PVFB work on x86_64 host- Re-add support for back-compat FC6 PVFB support - Fix handling of explicit port numbers (rhbz #279581)- Don't clobber the VIF type attribute in FV guests (rhbz #296061)- Added dep on openssl for blktap-qcow- Switch PVFB over to use QEMU - Backport QEMU VNC security patches for TLS/x509- Put guest's native protocol ABI into xenstore, to provide for older kernels running 32-on-64. - VNC keymap fixes - Fix race conditions in LibVNCServer on client disconnect- Remove patch which kills VNC monitor - Fix HVM save/restore file path to be /var/lib/xen instead of /tmp - Don't spawn a bogus xen-vncfb daemon for HVM guests - Add persistent logging of hypervisor & guest consoles - Add /etc/sysconfig/xen to allow admin choice of logging options - Re-write Xen startup to use standard init script functions - Add logrotate configuration for all xen related logs- Updated to official 3.1.0 tar.gz - Fixed data corruption from VNC client disconnect (bz 241303)- Ensure xen-vncfb processes are cleanedup if guest quits (bz 240406) - Tear down guest if device hotplug fails- Updated to 3.1.0 rc7, changeset 15021 (upstream renumbered from 3.0.5)- Fix op_save RPC API- Added BR on gettext- Redo failed build.- Updated to 3.0.5 rc4, changeset 14993 - Reduce number of xenstore transactions used for listing domains - Hack to pre-balloon 2 MB for PV guests as well as HVM- Fixed display of bootloader menu with xm create -c - Added modprobe for both xenblktap & blktap to deal with rename issues - Hack to pre-balloon 10 MB for HVM guests- Updated to 3.0.5 rc3, changeset 14934 - Fixed networking for service xend restart & minor IPv6 tweak- Fixed vfb/vkbd device startup race- Updated to xen 3.0.5 rc2, changeset 14889 - Remove use of netloop from network-bridge script - Add backcompat support to vif-bridge script to translate xenbrN to ethN- Disable access to QEMU monitor over VNC (CVE-2007-0998, bz 230295)- Close QEMU file handles when running network script- Fix interaction of bootloader with blktap (bz 230702) - Ensure PVFB daemon terminates if domain doesn't startup (bz 230634)- Setup readonly loop devices for readonly disks - Extended error reporting for hotplug scripts - Pass all 8 mouse buttons from VNC through to kernel- Don't run the pvfb daemons for HVM guests (bz 225413) - Fix handling of vnclisten parameter for HVM guests- Fix pygrub memory corruption- Added PVFB back compat for FC5/6 guests- Ensure the arch-x86 header files are included in xen-devel package - Bring back patch to move /var/xen/dump to /var/lib/xen/dump - Make /var/log/xen mode 0700- Upgrade to official xen-3.0.4_1 release tarball- fix the build- rebuild for python 2.5- Pull in the official 3.0.3 tarball of xen (changeset 11774). - Add patches for VNC password authentication (bz 203196) - Switch /etc/xen directory to be mode 0700 because the config files can contain plain text passwords (bz 203196) - Change the package dependency to python-virtinst to reflect the package name change. - Fix str-2-int cast of VNC port for paravirt framebuffer (bz 211193)- fix having "many" kernels in pygrub- Fix SMBIOS tables for SVM guests [danpb] (bug 207501)- Added vnclisten patches to make VNC only listen on localhost out of the box, configurable by 'vnclisten' parameter (bz 203196)- Update to xen-3.0.3-testing changeset 11633- Workaround blktap/xenstore startup race - Add udev rules for xen blktap devices (srostedt) - Add support for dynamic blktap device nodes (srostedt) - Fixes for infinite dom0 cpu usage with blktap - Fix xm not to die on malformed "tap:" blkif config string - Enable blktap on kernels without epoll-for-aio support. - Load the blktap module automatically at startup - Reenable blktapctrl- Disable paravirt framebuffer server side rendered cursor (bz 206313) - Ignore SIGPIPE in paravirt framebuffer daemon to avoid terminating on client disconnects while writing data (bz 208025)- Fix cursor in pygrub (#208041)- Removed obsolete scary warnings in package description- Add Requires: kpartx for dom0 access to domU data- Don't strip qemu-dm early, so that we get proper debuginfo (danpb) - Fix compile problem with latest glibc- Update to xen-unstable changeset 11539 - Threading fixes for libVNCserver (danpb)- update pvfb patch based on upstream feedback- re-enable ia64.- update to changeset 11405- fix pvfb for x86_64- update libvncserver to hopefully fix problems with vnc clients disconnecting- fix a typo- add support for paravirt framebuffer- update to xen-unstable cs 11251 - clean up patches some - disable ia64 as it doesn't currently build- make initscript not spew on non-xen kernels (#202945)- remove copy of xenguest-install from this package, require python-xeninst (the new home of xenguest-install)- add patch to fix rtl8139 in FV, switch it back to the default nic - add necessary ia64 patches (#201040) - build on ia64- add patch to fix net devices for HVM guests- make sure disk IO from HVM guests actually hits disk (#198851)- don't start blktapctrl for now - fix HVM guest creation in xenguest-install - make sure log files have the right SELinux label- fix libblktap symlinks (#199820) - make libxenstore executable (#197316) - version libxenstore (markmc)- include /var/xen/dump in file list - load blkbk, netbk and netloop when xend starts - update to cs 10712 - avoid file conflicts with qemu (#199759)- libxenstore is unversioned, so make xen-libs own it rather than xen-devel- Fix network-bridge error (#199414)- desactivating the relocation server in xend conf by default and add a warning text about it.- Compile fix: don't #include - Update to xen-unstable cset 10675 - Remove internal libvncserver build, new qemu device model has its own one now. - Change default FV NIC model from rtl8139 to ne2k_pci until the former works better- bump libvirt requires to 0.1.2 - drop xend httpd localhost server and use the unix socket instead- split into main packages + -libs and -devel subpackages for #198260 - add patch from jfautley to allow specifying other bridge for xenguest-install (#198097)- make xenguest-install work with relative paths to disk images (markmc, #197518)- own /var/run/xend for selinux (#196456, #195952)- fix syntax error in xenguest-install- more initscript patch to report status #184452- Add BuildRequires: for gnu/stubs-32.h so that x86_64 builds pick up glibc32 correctly- Rebase to xen-unstable cset 10278- update to new snapshot (changeset 9925)- xen.h now requires xen-compat.h, install it too- -m64 patch isn't needed anymore either- update to post 3.0.2 snapshot (changeset: 9744:1ad06bd6832d) - stop applying patches that are upstreamed - add patches for bootloader to run on all domain creations - make xenguest-install create a persistent uuid - use libvirt for domain creation in xenguest-install, slightly improve error handling- augment the close on exec patch with the fix for #188361- add udev rule so that /dev/xen/evtchn gets created properly - make pygrub not use /tmp for SELinux - make xenguest-install actually unmount its nfs share. also, don't use /tmp- set /proc/xen/privcmd and /var/log/xend-debug.log as close on exec to avoid SELinux problems - give better feedback on invalid urls (#184176)- Use kva mmap to find the xenstore page (upstream xen-unstable cset 9130)- fix xenguest-install so that it uses phy: for block devices instead of forcing them over loopback. - change package versioning to be a little more accurate- Remove unneeded CFLAGS spec file hack- fix 64 bit CFLAGS issue with vmxloader and hvmloader- Update to xen-unstable cset 9022- Update to xen-unstable cset 9015- add patch to ensure we get a unique fifo for boot loader (#182328) - don't try to read the whole disk if we can't find a partition table with pygrub - fix restarting of domains (#179677)- fix -h conflict for xenguest-isntall- turn on http listener so you can do things with libvir as a user- update to current hg snapshot for HVM support - update xenguest-install for hvm changes. allow hvm on svm hardware - fix a few little xenguest-install bugs- add a hack to fix VMX guests with video to balloon enough (#180375)- fix build for new udev- patch from David Lutterkort to pass macaddr (-m) to xenguest-install - rework xenguest-install a bit so that it can be used for creating fully-virtualized guests as well as paravirt. Run with --help for more details (or follow the prompts) - add more docs (noticed by Andrew Puch)- rebuilt for new gcc4.1 snapshot and glibc changes- disable iptables/ip6tables/arptables on bridging when bringing up a Xen bridge. If complicated filtering is needed that uses this, custom firewalls will be needed. (#177794)- use the default network device, don't hardcode eth0- Add xenguest-install.py in /usr/sbin- Update to xen-unstable from 20060130 (cset 8705)- buildrequire dev86 so that vmx firmware gets built - include a copy of libvncserver and build vmx device models against it- only put the udev rules in one place- move xsls to xenstore-ls to not conflict (#171863)- Update to xen-unstable from 20060110 (cset 8526)- rebuilt- 20051206 version (should be 3.0.0). - Remove xen-bootloader fixes (integrated upstream).- adding missing headers for libxenctrl and libxenstore - use libX11-devel build require instead of xorg-x11-devel- change default dom0 min-mem to 256M so that dom0 will try to balloon down- buildrequire ncurses-devel (reported by Justin Dearing)- actually enable the initscripts- udev rules moved- update to current -unstable - add patches to fix pygrub- update to current -unstable- update to current -unstable- doesn't require twisted anymore- add /var/{lib,run}/xenstored to the %files section (#167496, #167121) - upgrade to today's Xen snapshot - some small build fixes for x86_64 - enable x86_64 builds- explicitly call /usr/sbin/xend from initscript (#167407) - add xenstored directories to spec file (#167496, #167121) - misc gcc4 fixes - spec file cleanups (#161191) - upgrade to today's Xen snapshot - change the version to 3.0-0. (real 3.0 release will be 3.0-1)- upgrade to today's Xen snapshot- upgrade to a known-working newer Xen, now that execshield works again- create /var/lib/xen/xen-db/migrate directory so "xm save" works (#158895)- change default display method for VMX domains to SDL- qemu device model for VMX- apply some VMX related bugfixes- upgrade to last night's snapshot- patch manpath instead of moving in specfile. patch sent upstream - install to native python path instead of /usr/lib/python - other misc specfile duplication cleanup- fix context switch between vcpus in same domain, vcpus > cpus works again- move initscripts to /etc/rc.d/init.d (Florian La Roche) (#153188) - ship only PDF documentation, not the PS or tex duplicates- upgrade to new xen hypervisor - minor gcc4 compile fix- do not yet upgrade to new hypervisor ;) - add barrier to fix SMP boot bug - add tags target - add zlib-devel build requires (#150952)- upgrade to last night's snapshot - new compile fix patch- the gcc4 compile patches are now upstream - upgrade to last night's snapshot, drop patches locally- finally got everything to compile with gcc4 -Wall -Werror- upgrade to last night's Xen-unstable snapshot - drop printf warnings patch, which is upstream now- upgraded to last night's Xen snapshot - compile warning fixes are now upstream, drop patch- fix more compile warnings - fix the fwrite return check- upgrade to last night's Xen snapshot - a kernel upgrade is needed to run this Xen, the hypervisor interface changed slightly - comment out unused debugging function in plan9 domain builder that was giving compile errors with -Werror- upgrade to last night's Xen snapshot- move everything to /var/lib/xen- upgrade to new upstream Xen snapshot- add buildreqs on python-devel and xorg-x11-devel (strange AT nsk.no-ip.org)- fix /etc/xen/scripts/network to not break with ipv6 (also sent upstream)- update to new snap - python-twisted is its own package now - files are in /usr/lib/python now as well, ugh.- add segment fixup patch from xen tree - fix %files list for python-twisted- grab newer snapshot, that does start up - add /var/xen/xend-db/{domain,vnet} to %files section- upgrade to new snapshot of xen-unstable- build python-twisted as a subpackage - update to latest upstream Xen snapshot- grab new Xen tarball (with wednesday's patch already included) - transfig is a buildrequire, add it to the spec file- fix up Che's spec file a little bit - create patch to build just Xen, not the kernels- initial rpm release  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopq4.5.3-8.fc224.5.3-8.fc22  _libxl_list.h_libxl_types.h_libxl_types_json.hfsimage.hfsimage_grub.hfsimage_plugin.hlibxenvchan.hlibxl.hlibxl_event.hlibxl_json.hlibxl_utils.hlibxl_uuid.hlibxlutil.hxenCOPYINGarch-armarch-arm.hhvmsave.harch-x86cpuid.hhvmsave.hxen-mca.hxen-x86_32.hxen-x86_64.hxen.harch-x86_32.harch-x86_64.hcallback.hdom0_ops.hdomctl.helfnote.hevent_channel.hfeatures.hforeignarm32.harm64.hx86_32.hx86_64.hgcov.hgrant_table.hhvme820.hhvm_info_table.hhvm_op.hhvm_xs_strings.hioreq.hparams.hpvdrivers.hsave.hioblkif.hconsole.hfbif.hfsif.hkbdif.hlibxenvchan.hnetif.hpciif.hprotocols.hring.htpmif.husbif.hvscsiif.hxenbus.hxs_wire.hkexec.hmem_event.hmemory.hnmi.hphysdev.hplatform.hsched.hsysevtchn.hgntalloc.hgntdev.hprivcmd.hxenbus_dev.hsysctl.htmem.htrace.hvcpu.hversion.hxen-compat.hxen.hxencomm.hxenoprof.hxsmflask_op.hxenctrl.hxenctrlosdep.hxenguest.hxenstat.hxenstore-compatxs.hxs_lib.hxenstore.hxenstore_lib.hxentoollog.hxs.hxs_lib.hlibblktapctl.solibfsimage.solibvhd.solibxenctrl.solibxenguest.solibxenlight.solibxenstat.solibxenstore.solibxenvchan.solibxlutil.so/usr/include//usr/include/xen//usr/include/xen/arch-arm//usr/include/xen/arch-arm/hvm//usr/include/xen/arch-x86//usr/include/xen/arch-x86/hvm//usr/include/xen/foreign//usr/include/xen/hvm//usr/include/xen/io//usr/include/xen/sys//usr/include/xen/xsm//usr/include/xenstore-compat//usr/lib/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tablesdrpmxz2i686-redhat-linux-gnuC source, ASCII textASCII textdirectoryC source, UTF-8 Unicode text RRRRRRRRR R ?p7zXZ !#,'FS]"k%fJ}!k;X//Olٙgdf[൤ ~ߒ]NvGz!6P-C^< xF&Wz԰x$/BߌJau9ZƗ^D$vعcP8jLT)<)cm8xH)~>?be21lp+TgzS;6֑"!ut2 GtiBzc6"+TJ@knr]Dөv4_G鶇NWYATmX*tSL-ZD.i1U@h(9ڝKS-yTrCХXg]؉69y? bHjb.! w'zc{7<7հ3nxNinJHO߹oЃ\w8)]S ~'wKF눆szjFܰtU9ļw8hu(Fҏim!Hf;)V~c2 YI^o܆4u+Z  \* I\cJ+?i}V=p,nu~}.'RE_=46VN6ꡆ.\ª>*P*q9eqE!þrK e~Ff%TsZkx<D3~^l[9OJY>aj@mƛtI'$?Ud]rb޺ۤM=',Ah诚<E譪cku˭wi'KnQх=f Z%Wd &X;Ms {Oɢ<$T 0o-X-kfnqJ9VjdI}[O|Rͯ?F/>ɚfW`[oz aW^`Fv[r6󵝓֙ߙ;XS=桃[G1 FA61TÀ  iZ23ExW~9Ų|/YKǒTpk^A%mŇR 0#b́TgYuT+Zղ&G;\,.%!/}4p kΑR֣|t#o|y9֒`#.t"s_rpYWh\捭fBy%ہt׭}T2# 9jWInشE3gM6BT)^P8QP!b~(h{?&g^v/c|tr ;X0_J"#EvHCc6/82!A'MDREFHة$J-t@0Uo%؝ C:1% QsL2IPa9cgW B-ûdhZPS;s= | hvnJD^+U{*5ZLWhʈݴV] Y{J R̗ h0?^+[N6#=$eYT4tRl[vEZn{kXw 5s؟pЀ"|f+}}c5ӣf-D #-.ha8Gj 6ngXPí<#TSL2+w^GCJj{[ίSo,C[KK u_\h\gKI~Mkۼ9,'Q%vrc d^ʒ xKWB[ZufJO*֩[j\y>T0̘=Goɦ3BzX.eo=HNsתp\Hf\+cZbY4V 4`-V O oC/iZfcpcrGZ]Z"3Et/)=N!3.OIFj87r-MdbA;/eiUߠJ]YX'kEqX%=]!B`}"5?5)byzk9Q꠪Pty[k&yugH}UsE*/h5`u͆ВjNkE\Y룑Ϯ{#G٘q6>À^lCmDxӹ >kKn%4C$#o*Ӳݱ7m`d% :j!~ʶ/AJ8'gd6v/; 0Wc2ޕHE♵ @)>̆)pYRJߝRJ/Qw4x{V,axEoa'+rvLm*XYYh_VGJMEoZZb AA= "myko;d)̽p` _žlmQk#dm¸. $O!焯vcq$|2g@s]f V|歵peX3[! X'}~;꣬Scc`7Y_& |2nN@Z؃W;#;W`Υ p2c\B>-aRBJ>i !T=Kzp?Nɶ YZ