xen-doc-4.5.3-8.fc22$>Hs񜟵mq>8?d   )X\      K8 L8P8U8Z8ZT^T^l^^(_ 8_r9dr:rGf$Hj$In$Xo$Yo,\oH]sH^0 bdefltuvwxCxen-doc4.5.38.fc22Xen documentationThis package contains the Xen documentation.W_buildhw-06.phx2.fedoraproject.org)Fedora ProjectFedora ProjectGPLv2+ and LGPLv2+ and BSDFedora ProjectDocumentationhttp://xen.org/linuxi6864KA@!T/  R9u ao'R "4?/, #NgD =A@t%;.CS'4#o IDH1!T2  R<x do*U %4?2, #Qd @Ar%W;.F!V*J  IDHK1C!T2  R<x do*U %4?2, #Qd @Ar%W;.F!V*J 3ވ  B $,-  @e6/7n" z3h'F4B  O $,o- 8  B#U@e6/7n"P [88Kz3h'[.2F4AAAA큤A큤A큤A큤A큤A큤A큤A큤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.5.3-8.fc22.src.rpmxen-docxen-doc(x86-32)    rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)xen-licenses3.0.4-14.6.0-14.0-15.2-14.12.0.1W_WRWI@W;W1@W0{W@VVn@Vm@V`VvVrVii@Vf@Vd#@VA@V9@V3[VVZVV@VU@U@UWU@UU@U@UU@U@UUx&Un@UmUSP$P!@P1@P@P @P @O/@O:O@O@O@OvOX@OX@ON@ON@O?O2cO1@O*zO#@OO yN=@N^N$@NN]N @NGN&@MM@MM@MOMF@MD@MBLML@L*@LLzKLuLV@LMxLL'@LH2LL @L@K K J@J0@J^@J J|@Jyt@JmJ|J+@IV@I@I@II@I1IsIeIHI1.HH@Ht@Hd@Hb3@HRa@HE2@H*@GPGPG Gs@G@GG G@G@GGGaGY5GQLG,bG!G FIFIFFFF@F@F@FuFnFVFLCF9F7+F5@F5@F5@F0@F0@F-@F-@EEWEEE3@E3@EE@E&E@E#@E#@E E@E@EgEgE@E~E-@E-@DfDfD@D@D}D,@DDDD@DГD@D@D@DDDDD{D5D5DDA@DDDDW@DDD[>@DP@DO`DN@DDDD uD $@D $@D@D@DD;@CC.C@C@CCCCC@CQ@CQ@CCh@CCCáC@C}@C@Cx|@Cu@Cs6@CqCqCqCX@C)b@C%mC 'C CB@BB@BBlB_BOBN@BK@BGB.@B*B(MB&@Bp@B*@BBAo@Ao@A4A@A@AAn@A(@A@A@A@A@Michael Young - 4.5.3-8Michael Young - 4.5.3-7Michael Young - 4.5.3-6Michael Young - 4.5.3-5Michael Young - 4.5.3-4Michael Young - 4.5.3-3Michael Young - 4.5.3-2Michael Young - 4.5.3-1Michael Young - 4.5.2-10Michael Young - 4.5.2-9Michael Young - 4.5.2-8Michael Young - 4.5.2-7Michael Young - 4.5.2-6Michael Young - 4.5.2-5Michael Young - 4.5.2-4Michael Young - 4.5.2-3Michael Young - 4.5.2-2Michael Young - 4.5.2-1Michael Young - 4.5.1-14Michael Young - 4.5.1-13Michael Young - 4.5.1-12Michael Young - 4.5.1-11Michael Young - 4.5.1-10Michael Young - 4.5.1-9Michael Young - 4.5.1-8Michael Young - 4.5.1-7Michael Young - 4.5.1-6Michael Young - 4.5.1-5Richard W.M. Jones - 4.5.1-4Michael Young - 4.5.1-3Michael Young - 4.5.1-2Michael Young - 4.5.1-1Richard W.M. Jones - 4.5.0-13Fedora Release Engineering - 4.5.0-12Michael Young Michael Young - 4.5.0-11Michael Young - 4.5.0-10.1Michael Young - 4.5.0-10Michael Young - 4.5.0-9Michael Young - 4.5.0-8Michael Young - 4.5.0-7Michael Young - 4.5.0-6Michael Young - 4.5.0-5Michael Young - 4.5.0-4Michael Young - 4.5.0-3Michael Young - 4.5.0-2Michael Young - 4.5.0-1Michael Young - 4.4.1-12Michael Young - 4.4.1-11Michael Young - 4.4.1-10Michael Young - 4.4.1-9Michael Young - 4.4.1-8Michael Young - 4.4.1-7Michael Young - 4.4.1-6Michael Young - 4.4.1-5Michael Young - 4.4.1-4Michael Young - 4.4.1-3Michael Young - 4.4.1-2Michael Young - 4.4.1-1Richard W.M. Jones - 4.4.0-14Richard W.M. Jones - 4.4.0-13Richard W.M. Jones - 4.4.0-12Fedora Release Engineering - 4.4.0-11Michael Young - 4.4.0-10Richard W.M. Jones - 4.4.0-9Michael Young - 4.4.0-8Michael Young - 4.4.0-7Michael Young - 4.4.0-6Fedora Release Engineering - 4.4.0-5Michael Young - 4.4.0-4Michael Young - 4.4.0-3Michael Young - 4.4.0-2Michael Young - 4.4.0-1Michael Young - 4.3.2-1Michael Young - 4.3.1-10Michael Young - 4.3.1-9Michael Young - 4.3.1-8Michael Young - 4.3.1-7Michael Young - 4.3.1-6Michael Young - 4.3.1-5Michael Young - 4.3.1-4Michael Young - 4.3.1-3Michael Young - 4.3.1-2Michael Young - 4.3.1-1Michael Young - 4.3.0-10Michael Young - 4.3.0-9Michael Young - 4.3.0-8Michael Young - 4.3.0-7Michael Young - 4.3.0-6Richard W.M. Jones - 4.3.0-5Fedora Release Engineering - 4.3.0-4Michael Young - 4.3.0-2 4.3.0-3Michael Young - 4.3.0-1Michael Young - 4.2.2-10Michael Young - 4.2.2-9Michael Young - 4.2.2-8Michael Young - 4.2.2-7Michael Young - 4.2.2-6Michael Young - 4.2.2-5Michael Young - 4.2.2-4Michael Young - 4.2.2-3Michael Young - 4.2.2-2Michael Young - 4.2.2-1Michael Young - 4.2.1-10Michael Young - 4.2.1-9Michael Young - 4.2.1-8Michael Young - 4.2.1-7Michael Young - 4.2.1-6Michael Young Michael Young - 4.2.1-5Michael Young - 4.2.1-4Michael Young - 4.2.1-3Michael Young - 4.2.1-2Michael Young - 4.2.1-1Richard W.M. Jones - 4.2.0-7Michael Young - 4.2.0-6Michael Young - 4.2.0-5Michael Young - 4.2.0-4Michael Young - 4.2.0-3Michael Young - 4.2.0-2Michael Young - 4.2.0-1Michael Young - 4.1.3-6Michael Young - 4.1.3-5Michael Young - 4.1.3-4Michael Young - 4.1.3-3Michael Young - 4.1.3-1 4.1.3-2Michael Young - 4.1.2-25Michael Young - 4.1.2-24Michael Young - 4.1.2-23Michael Young - 4.1.2-22Fedora Release Engineering - 4.1.2-21Michael Young - 4.1.2-20Michael Young - 4.1.2-19Michael Young - 4.1.2-18Michael Young - 4.1.2-16 4.1.2-17Michael Young - 4.1.2-15Michael Young - 4.1.2-14Michael Young - 4.1.2-13Michael Young - 4.1.2-12Michael Young - 4.1.2-11Michael Young - 4.1.2-10Michael Young - 4.1.2-9Michael Young - 4.1.2-8Michael Young - 4.1.2-7Michael Young - 4.1.2-6Michael Young - 4.1.2-5Michael Young - 4.1.2-4Michael Young - 4.1.2-3Michael Young - 4.1.2-2Michael Young - 4.1.2-1Michael Young - 4.1.1-8Michael Young - 4.1.1-7Michael Young - 4.1.1-5 4.1.1-6Michael Young - 4.1.1-4Michael Young - 4.1.1-3Michael Young - 4.1.1-2Michael Young - 4.1.1-1Michael Young - 4.1.0-2Michael Young - 4.1.0-1Michael Young - 4.1.0-0.1.rc8Fedora Release Engineering - 4.0.1-10Michael Young - 4.0.1-9Michael Young - 4.0.1-8Michael Young - 4.0.1-7Michael Young - 4.0.1-6Michael Young - 4.0.1-5jkeating - 4.0.1-4Michael Young - 4.0.1-3Michael Young - 4.0.1-2Michael Young - 4.0.1-1Michael Young - 4.0.0-5Michael Young Michael Young - 4.0.0-4David Malcolm - 4.0.0-3Michael Young - 4.0.0-2Michael Young - 4.0.0-1Michael Young - 3.4.3-1Gerd Hoffmann - 3.4.2-2Gerd Hoffmann - 3.4.2-1Justin M. Forbes - 3.4.1-5Gerd Hoffmann - 3.4.1-4Gerd Hoffmann - 3.4.1-3Gerd Hoffmann - 3.4.1-2Gerd Hoffmann - 3.4.1-1Gerd Hoffmann - 3.4.0-4Fedora Release Engineering - 3.4.0-3Gerd Hoffmann - 3.4.0-2Gerd Hoffmann - 3.4.0-1Gerd Hoffmann - 3.3.1-11Gerd Hoffmann - 3.3.1-9Gerd Hoffmann - 3.3.1-7Gerd Hoffmann - 3.3.1-6Gerd Hoffmann - 3.3.1-5Gerd Hoffmann - 3.3.1-3Tomas Mraz - 3.3.1-2Gerd Hoffmann - 3.3.1-1Gerd Hoffmann - 3.3.0-2Ignacio Vazquez-Abrams - 3.3.0-1.1Daniel P. Berrange - 3.3.0-1.fc10Mark McLoughlin - 3.2.0-17.fc10Daniel P. Berrange - 3.2.0-16.fc10Markus Armbruster - 3.2.0-15.fc10Daniel P. Berrange - 3.2.0-14.fc10Markus Armbruster - 3.2.0-13.fc10Daniel P. Berrange - 3.2.0-12.fc10Markus Armbruster - 3.2.0-11.fc10Daniel P. Berrange - 3.2.0-10.fc9Daniel P. Berrange - 3.2.0-9.fc9Daniel P. Berrange - 3.2.0-8.fc9Mark McLoughlin - 3.2.0-7.fc9Daniel P. Berrange - 3.2.0-6.fc9Daniel P. Berrange - 3.2.0-5.fc9Daniel P. Berrange - 3.2.0-4.fc9Daniel P. Berrange - 3.2.0-3.fc9Daniel P. Berrange - 3.2.0-2.fc9Daniel P. Berrange - 3.2.0-1.fc9Daniel P. Berrange - 3.2.0-0.fc9.rc5.dev16701.1Daniel P. Berrange - 3.1.2-3.fc9Release Engineering - 3.1.2-2.fc9Daniel P. Berrange - 3.1.2-1.fc9Daniel P. Berrange - 3.1.0-14.fc9Daniel P. Berrange - 3.1.0-13.fc9Daniel P. Berrange - 3.1.0-12.fc8Daniel P. Berrange - 3.1.0-11.fc8Chris Lalancette - 3.1.0-10.fc8Daniel P. Berrange - 3.1.0-9.fc8Daniel P. Berrange - 3.1.0-8.fc8Daniel P. Berrange - 3.1.0-7.fc8Daniel P. Berrange - 3.1.0-6.fc8Daniel P. Berrange - 3.1.0-5.fc8Daniel P. Berrange - 3.1.0-4.fc8Markus Armbruster - 3.1.0-3.fc8Daniel P. Berrange - 3.1.0-2.fc8Daniel P. Berrange - 3.1.0-1.fc8Daniel P. Berrange - 3.1.0-0.rc7.2.fc7Daniel P. Berrange - 3.1.0-0.rc7.1.fc7Daniel P. Berrange - 3.0.5-0.rc4.4.fc7Daniel P. Berrange - 3.0.5-0.rc4.3.fc7Daniel P. Berrange - 3.0.5-0.rc4.2.fc7Daniel P. Berrange - 3.0.5-0.rc4.1.fc7Daniel P. Berrange - 3.0.5-0.rc3.14934.2.fc7Daniel P. Berrange - 3.0.5-0.rc3.14934.1.fc7Daniel P. Berrange - 3.0.5-0.rc2.14889.2.fc7Daniel P. Berrange - 3.0.5-0.rc2.14889.1.fc7Daniel P. Berrange - 3.0.4-9.fc7Daniel P. Berrange - 3.0.4-8.fc7Daniel P. Berrange - 3.0.4-7.fc7Daniel P. Berrange - 3.0.4-6.fc7Daniel P. Berrange - 3.0.4-5.fc7Daniel P. Berrange - 3.0.4-4.fc7Daniel P. Berrange - 3.0.4-3.fc7Daniel P. Berrange - 3.0.4-2.fc7Daniel P. Berrange - 3.0.4-1Jeremy Katz - 3.0.3-3Jeremy Katz - 3.0.3-2Daniel P. Berrange - 3.0.3-1Jeremy Katz - 3.0.2-44Stephen C. Tweedie - 3.0.2-43Daniel P. Berrange - 3.0.2-42Stephen C. Tweedie - 3.0.2-41Stephen C. Tweedie - 3.0.2-40Daniel Berrange - 3.0.2-39Jeremy Katz - 3.0.2-38Daniel P. Berrange - 3.0.2-37Stephen C. Tweedie - 3.0.2-36Stephen C. Tweedie - 3.0.2-35Stephen C. Tweedie - 3.0.2-34Jeremy Katz - 3.0.2-33Juan Quintela - 3.0.2-31Jeremy Katz - 3.0.2-31Jeremy Katz - 3.0.2-30Jeremy Katz - 3.0.2-29Jeremy Katz - 3.0.2-28Jeremy Katz - 3.0.2-27Jeremy Katz - 3.0.2-26Jeremy Katz - 3.0.2-25Jeremy Katz - 3.0.2-24Jeremy Katz - 3.0.2-23Jeremy Katz - 3.0.2-22Rik van Riel - 3.0.2-21Jeremy Katz - 3.0.2-20Jeremy Katz - 3.0.2-19Jeremy Katz - 3.0.2-18Mark McLoughlin - 3.0.2-17Mark McLoughlin 3.0.2-16Daniel Veillard - 3.0.2-15Stephen C. Tweedie - 3.0.2-14Stephen C. Tweedie - 3.0.2-13Daniel Veillard - 3.0.2-12Jeremy Katz - 3.0.2-11Jeremy Katz - 3.0.2-10Jeremy Katz - 3.0.2-9Jeremy Katz - 3.0.2-8Daniel Veillard - 3.0.2-7Stephen C. Tweedie - 3.0.2-6Stephen C. Tweedie - 3.0.2-5Jeremy Katz - 3.0.2-4Daniel Veillard - 3.0.2-3Jeremy Katz - 3.0.2-2Jeremy Katz - 3.0.2-1Daniel Veillard - 3.0.1-5Jeremy Katz - 3.0.1-4Jeremy Katz - 3.0.1-3Stephen Tweedie - 3.0.1-2Jeremy Katz - 3.0.1-1Stephen Tweedie - 3.0.1-0.20060301.fc5.3Rik van Riel - 3.0.1-0.20060301.fc5.2Stephen Tweedie - 3.0.1-0.20060301.fc5.1Stephen Tweedie - 3.0.1-0.20060228.fc5.1Jeremy Katz - 3.0.1-0.20060208.fc5.3Jeremy Katz - 3.0.1-0.20060208.fc5.2Jeremy Katz - 3.0.1-0.20060208.fc5.1Jeremy Katz - 3.0.1-0.20060208.fc5Jeremy Katz - 3.0-0.20060130.fc5.6Jeremy Katz - 3.0-0.20060130.fc5.5Jeremy Katz - 3.0-0.20060130.fc5.4Jesse Keating - 3.0-0.20060130.fc5.3.1Bill Nottingham 3.0-0.20060130.fc5.3Bill Nottingham 3.0-0.20060130.fc5.2 - 3.0-0.20060130.fc5.1 - 3.0-0.20060130.fc5Jeremy Katz - 3.0-0.20060110.fc5.5Bill Nottingham - 3.0-0.20060110.fc5.4Jeremy Katz - 3.0-0.20060110.fc5.3 - 3.0-0.20060110.fc5.1Jesse Keating - 3.0-0.20051206.fc5.2Juan Quintela - 3.0-0.20051206.fc5.1Daniel Veillard - 3.0-0.20051109.fc5.4Jeremy Katz - 3.0-0.20051109.fc5.3Jeremy Katz Jeremy Katz - 3.0-0.20051109.fc5.2Jeremy Katz - 3.0-0.20051109.fc5.1Jeremy Katz - 3.0-0.20051109.fc5Jeremy Katz - 3.0-0.20051108.fc5Jeremy Katz - 3.0-0.20051021.fc5Jeremy Katz - 3.0-0.20050912.fc5.1Rik van Riel 3.0-0.20050912.fc5Rik van Riel 3.0-0.20050908Rik van Riel 2-20050823Rik van Riel 2-20050726Rik van Riel 2-20050530Rik van Riel 2-20050522Rik van Riel 2-20050520Rik van Riel 2-20050519Rik van Riel 2-20050424Jeremy Katz Rik van Riel 2-20050403Rik van Riel 2-20050402Rik van Riel 2-20050331Rik van Riel 2-20050328Rik van Riel 2-20050308Rik van Riel 2-20050305Rik van Riel 2-20050303Rik van Riel 2-20050303Rik van Riel 2-20050222Rik van Riel 2-20050219Rik van Riel 2-20050218Rik van Riel 2-20050207Rik van Riel 2-20050201.1Rik van Riel 2-20050201Jeremy Katz Rik van Riel - 2-20050124Jeremy Katz - 2-20050114Rik van Riel Rik van Riel Rik van Riel Rik van Riel Rik van Riel Rik van Riel Che- Qemu: scsi: esp: OOB r/w access while processing ESP_FIFO [CVE-2016-5338] (#1343323) - Qemu: scsi: megasas: information leakage in megasas_ctrl_get_info [CVE-2016-5337] (#1343909)- fix for CVE-2016-2858 doesn't build with qemu-xen enabled - Unsanitised guest input in libxl device handling code [XSA-175, CVE-2016-4962] (#1342132) - Unsanitised driver domain input in libxl device handling [XSA-178, CVE-2016-4963] (#1342131) - arm: Host crash caused by VMID exhaust [XSA-181] (#1342530) - Qemu: display: vmsvga: out-of-bounds read in vmsvga_fifo_read_raw() routine [CVE-2016-4454] (#1340741) - Qemu: display: vmsvga: infinite loop in vmsvga_fifo_run() routine [CVE-2016-4453] (#1340746) - Qemu: scsi: esp: OOB write when using non-DMA mode in get_cmd [CVE-2016-5238] (#1341931)- cleaner way to set kernel module load list - Unrestricted qemu logging [XSA-180, CVE-2014-3672] (#1339125) - Qemu: scsi: esp: OOB write while writing to 's->cmdbuf' in esp_reg_write [CVE-2016-4439] (#1337502) - Qemu: scsi: esp: OOB write while writing to 's->cmdbuf' in get_cmd [CVE-2016-4441] (#1337505) - Qemu: scsi: megasas: out-of-bounds write while setting controller properties [CVE-2016-5106] (#1339578) - Qemu: scsi: megasas: stack information leakage while reading configuration [CVE-2016-5105] (#1339583)- in systemd only try to load kernel modules that are in Fedora (#1291089) - x86 software guest page walk PS bit handling flaw [XSA-176, CVE-2016-4480] (#1332657)- create link to /usr/bin/qemu-system-i386 from /usr/lib/xen/bin for back compatibility and for virt-manager (#1334554) (#1299745) - cleaner fix for XSA-179 on qemu-xen-traditional- qemu-kvm: Integer overflow in SDL when creating too wide screen (#1330513) - QEMU: Banked access to VGA memory (VBE) uses inconsistent bounds checks [XSA-179, CVE-2016-3710, CVE-2016-3712] (#1334346) (#1334343)- x86 shadow pagetables: address width overflow [XSA-173, CVE-2016-3960] (#1328118) - Qemu: net: buffer overflow in stellaris_enet emulator [CVE-2016-4001] (#1325886) - Qemu: net: buffer overflow in MIPSnet emulator [CVE-2016-4002] (#1326084) - qemu: Infinite loop vulnerability in usb_ehci using siTD process [CVE-2016-4037] (#1328081) (supercedes CVE-2015-8558 patch)- update to 4.5.3 adjust xen.use.fedora.ipxe.patch remove patches for issues now fixed upstream renumber patches- broken AMD FPU FIP/FDP/FOP leak workaround [XSA-172, CVE-2016-3158, CVE-2016-3159] (#1321944)- Qemu: nvram: OOB r/w access in processing firmware configurations CVE-2016-1714 (#1296080) - Qemu: i386: null pointer dereference in vapic_write() CVE-2016-1922 (#1292767) - qemu: Stack-based buffer overflow in megasas_ctrl_get_info CVE-2015-8613 (#1293305) - qemu-kvm: Infinite loop and out-of-bounds transfer start in start_xmit() and e1000_receive_iov() CVE-2016-1981 (#1299996) - Qemu: usb ehci out-of-bounds read in ehci_process_itd (#1300235) - Qemu: usb: ehci null pointer dereference in ehci_caps_write CVE-2016-2198 (#1303135) - Qemu: net: ne2000: infinite loop in ne2000_receive CVE-2016-2841 (#1304048) - Qemu: usb: integer overflow in remote NDIS control message handling CVE-2016-2538 (#1305816) - Qemu: usb: null pointer dereference in remote NDIS control message handling CVE-2016-2392 (#1307116) - Qemu: usb: multiple eof_timers in ohci module leads to null pointer dereference CVE-2016-2391 (#1308882) - Qemu: net: out of bounds read in net_checksum_calculate() CVE-2016-2857 (#1309565) - Qemu: OOB access in address_space_rw leads to segmentation fault CVE-2015-8817 CVE-2015-8818 (#1313273) - Qemu: rng-random: arbitrary stack based allocation leading to corruption CVE-2016-2858 (#1314678)- x86: inconsistent cachability flags on guest mappings [XSA-154, CVE-2016-2270] (#1309324) - VMX: guest user mode may crash guest with non-canonical RIP [XSA-170, CVE-2016-2271] (#1309323)- PV superpage functionality missing sanity checks [XSA-167, CVE-2016-1570] (#1300345) - VMX: intercept issue with INVLPG on non-canonical address [XSA-168, CVE-2016-1571] (#1300342) - Qemu: pci: null pointer dereference issue CVE-2015-7549 (#1291139) - qemu: DoS by infinite loop in ehci_advance_state CVE-2015-8558 (#1291310) - qemu: Heap-based buffer overrun during VM migration CVE-2015-8666 (#1294028) - Qemu: net: vmxnet3: incorrect l2 header validation leads to a crash via assert(2) call CVE-2015-8744 (#1295441) - qemu: Support reading IMR registers on bar0 CVE-2015-8745 (#1295443) - Qemu: net: vmxnet3: host memory leakage CVE-2015-8567 CVE-2015-8568 (#1289817) - Qemu: net: ne2000: OOB memory access in ioport r/w functions CVE-2015-8743 (#1294788)- four security updates (#1292439) paravirtualized drivers incautious about shared memory contents [XSA-155, CVE-2015-8550] qemu-dm buffer overrun in MSI-X handling [XSA-164, CVE-2015-8554] information leak in legacy x86 FPU/XMM initialization [XSA-165, CVE-2015-8555] ioreq handling possibly susceptible to multiple read issue [XSA-166]- eepro100: Prevent two endless loops [CVE-2015-8345] (#1285215) - pcnet: fix rx buffer overflow [CVE-2015-7512] (#1286563) - ui: vnc: avoid floating point exception [CVE-2015-8504] (#1289544) - additional patch for [XSA-158, CVE-2015-8338]- three security updates (#1289568) long running memory operations on ARM [XSA-158, CVE-2015-8338] XENMEM_exchange error handling issues [XSA-159, CVE-2015-8339, CVE-2015-8340] libxl leak of pv kernel and initrd on error [XSA-160, CVE-2015-8341]- heap buffer overflow vulnerability in pcnet emulator [XSA-162, CVE-2015-7504] (#1286544) - virtual PMU is unsupported [XSA-163] (#1285351)- x86: CPU lockup during exception delivery [XSA-156, CVE-2015-5307, CVE-2015-8104] (#1279689, #1279690) - silence 2 macro in comment warnings- update to 4.5.2 adjust xen.use.fedora.ipxe.patch remove patches for issues now fixed upstream renumber patches- nine security updates (#1276344) arm: Host crash when preempting a multicall [XSA-145, CVE-2015-7812] arm: various unimplemented hypercalls log without rate limiting [XSA-146, CVE-2015-7813] arm: Race between domain destruction and memory allocation decrease [XSA-147, CVE-2015-7814] x86: Uncontrolled creation of large page mappings by PV guests [XSA-148, CVE-2015-7835] leak of main per-domain vcpu pointer array [XSA-149, CVE-2015-7969] x86: Long latency populate-on-demand operation is not preemptible [XSA-150, CVE-2015-7970] x86: leak of per-domain profiling-related vcpu pointer array [XSA-151, CVE-2015-7969] x86: some pmu and profiling hypercalls log without rate limiting [XSA-152, CVE-2015-7971] x86: populate-on-demand balloon size inaccuracy can crash guests [XSA-153, CVE-2015-7972]- patch CVE-2015-7295 for qemu-xen-traditional as well- Qemu: net: virtio-net possible remote DoS [CVE-2015-7295] (#1264392)- create a symbolic link so libvirt VMs from xen 4.0 to 4.4 can still find qemu-dm (#1268176), (#1248843)- ide: fix ATAPI command permissions [CVE-2015-6855] (#1261792)- ui/vnc: limit client_cut_text msg payload size [CVE-2015-5239] (#1259504) - e1000: Avoid infinite loop in processing transmit descriptor [CVE-2015-6815] (#1260224) - net: add checks to validate ring buffer pointers [CVE-2015-5279] (#1263278) - net: avoid infinite loop when receiving packets [CVE-2015-5278] (#1263281) - qemu buffer overflow in virtio-serial [CVE-2015-5745] (#1251354)- libxl fails to honour readonly flag on disks with qemu-xen [XSA-142, CVE-2015-7311] (#1257893) (final patch version)- printk is not rate-limited in xenmem_add_to_physmap_one (ARM) [XSA-141, CVE-2015-6654]- Use after free in QEMU/Xen block unplug protocol [XSA-139, CVE-2015-5166] (#1249757) - QEMU leak of uninitialized heap memory in rtl8139 device model [XSA-140, CVE-2015-5165] (#1249756)- QEMU heap overflow flaw while processing certain ATAPI commands. [XSA-138, CVE-2015-5154] (#1247142) - try again to fix xen-qemu-dom0-disk-backend.service (#1242246)- OCaml 4.02.3 rebuild.- correct qemu location in xen-qemu-dom0-disk-backend.service (#1242246) - rebuild efi grub.cfg if it is present (#1239309) - re-enable remus by building with libnl3 - modify gnutls use in line with Fedora's crypto policies (#1179352)- xl command line config handling stack overflow [XSA-137, CVE-2015-3259]- update to 4.5.1 adjust xen.use.fedora.ipxe.patch and xen.fedora.systemd.patch remove patches for issues now fixed upstream renumber patches- Rebuild for ocaml-4.02.2.- Rebuilt for https://fedoraproject.org/wiki/Fedora_23_Mass_Rebuild- gcc 5 bug is fixed so remove workaround- stubs-32.h is back, so revert to previous behaviour - Heap overflow in QEMU PCNET controller, allowing guest->host escape [XSA-135, CVE-2015-3209] (#1230537) - GNTTABOP_swap_grant_ref operation misbehavior [XSA-134, CVE-2015-4163] - vulnerability in the iret hypercall handler [XSA-136, CVE-2015-4164]- stubs-32.h has gone from rawhide, put it back manually- replace deprecated gnutls use in qemu-xen-traditional based on qemu-xen patches - work around a gcc 5 bug - Potential unintended writes to host MSI message data field via qemu [XSA-128, CVE-2015-4103] (#1227627) - PCI MSI mask bits inadvertently exposed to guests [XSA-129, CVE-2015-4104] (#1227628) - Guest triggerable qemu MSI-X pass-through error messages [XSA-130, CVE-2015-4105] (#1227629) - Unmediated PCI register access in qemu [XSA-131, CVE-2015-4106] (#1227631)- Privilege escalation via emulated floppy disk drive [XSA-133, CVE-2015-3456] (#1221153)- Information leak through XEN_DOMCTL_gettscinfo [XSA-132, CVE-2015-3340] (#1214037)- Long latency MMIO mapping operations are not preemptible [XSA-125, CVE-2015-2752] (#1207741) - Unmediated PCI command register access in qemu [XSA-126, CVE-2015-2756] (#1307738) - Certain domctl operations may be abused to lock up the host [XSA-127, CVE-2015-2751] (#1207739)- Additional patch for XSA-98 on arm64- HVM qemu unexpectedly enabling emulated VGA graphics backends [XSA-119, CVE-2015-2152] (#1201365)- Hypervisor memory corruption due to x86 emulator flaw [XSA-123, CVE-2015-2151] (#1200398)- Information leak via internal x86 system device emulation [XSA-121, CVE-2015-2044] - Information leak through version information hypercall [XSA-122, CVE-2015-2045] - fix a typo in xen.fedora.systemd.patch- arm: vgic-v2: GICD_SGIR is not properly emulated [XSA-117, CVE-2015-0268] - allow certain warnings with gcc5 that would otherwise be treated as errors- update to 4.5.0 xend has gone, so remove references to xend in spec file, sources and patches remove patches for issues now fixed upstream adjust some patches due to other code changes adjust spec file for renamed xenpolicy files set prefix back to /usr (default is now /usr/local) use upstream systemd files with patches for Fedora and selinux sysconfig for systemd is now in xencommons file for x86_64, files in /usr/lib64/xen/bin have moved to /usr/lib/xen/bin remus isn't built upstream systemd support needs systemd-devel to build replace new uint32 with uint32_t in ocaml file for ocaml-4.02.0 stop oxenstored failing when selinux is enforcing re-number patches - enable building pngs from fig files which is working again - fix oxenstored.service preset preuninstall script - arm: vgic: incorrect rate limiting of guest triggered logging [XSA-118, CVE-2015-1563] (#1187153)- xen crash due to use after free on hvm guest teardown [XSA-116, CVE-2015-0361] (#1179221)- fix xendomains issue introduced by xl migrate --debug patch- p2m lock starvation [XSA-114, CVE-2014-9065] - fix build with --without xsm- Excessive checking in compatibility mode hypercall argument translation [XSA-111, CVE-2014-8866] - Insufficient bounding of "REP MOVS" to MMIO emulated inside the hypervisor [XSA-112, CVE-2014-8867] - fix segfaults and failures in xl migrate --debug (#1166461)- Guest effectable page reference leak in MMU_MACHPHYS_UPDATE handling [XSA-113, CVE-2014-9030] (#1166914)- Insufficient restrictions on certain MMU update hypercalls [XSA-109, CVE-2014-8594] (#1165205) - Missing privilege level checks in x86 emulation of far branches [XSA-110, CVE-2014-8595] (#1165204) - Add fix for CVE-2014-0150 to qemu-dm, though it probably isn't exploitable from xen (#1086776)- Improper MSR range used for x2APIC emulation [XSA-108, CVE-2014-7188] (#1148465)- xen support is in 256k seabios binary when it exists (#1146260)- Race condition in HVMOP_track_dirty_vram [XSA-104, CVE-2014-7154] (#1145736) - Missing privilege level checks in x86 HLT, LGDT, LIDT, and LMSW emulation [XSA-105, CVE-2014-7155] (#1145737) - Missing privilege level checks in x86 emulation of software interrupts [XSA-106, CVE-2014-7156] (#1145738)- disable building pngs from fig files which is currently broken in rawhide- Mishandling of uninitialised FIFO-based event channel control blocks [XSA-107, CVE-2014-6268] (#1140287) - delete a patch file that was dropped in the last update- update to xen-4.4.1 remove patches for fixes that are now included - replace uint32 with uint32_t in ocaml file for ocaml-4.02.0- Bump release and rebuild.- ocaml-4.02.0 final rebuild.- ocaml-4.02.0+rc1 rebuild.- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild- Long latency virtual-mmu operations are not preemptible [XSA-97, CVE-2014-5146]- ocaml-4.02.0-0.8.git10e45753.fc22 rebuild.- rebuild for ocaml update- Hypervisor heap contents leaked to guest [XSA-100, CVE-2014-4021] (#1110316) with extra patch to avoid regression- Fix two %if line typos in the spec file - Vulnerabilities in HVM MSI injection [XSA-96, CVE-2014-3967,CVE-2014-3968] (#1104583)- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild- add systemd preset support (#1094938)- HVMOP_set_mem_type allows invalid P2M entries to be created [XSA-92, CVE-2014-3124] (#1093315) - change -Wmaybe-uninitialized errors into warnings for gcc 4.9.0 - fix a couple of -Wmaybe-uninitialized cases- HVMOP_set_mem_access is not preemptible [XSA-89, CVE-2014-2599] (#1080425)- update to xen-4.4.0 - adjust xend.selinux.fixes.patch and xen-initscript.patch as xend has moved - don't build xend unless --with xend is specified - use --with-system-seabios option instead of xen.use.fedora.seabios.patch - update xen.use.fedora.ipxe.patch patch - replace qemu-xen.tradonly.patch with --with-system-qemu= option pointing to Fedora's qemu-system-i386 - adjust xen.xsm.enable.patch and remove bits that are are no longer needed - blktapctrl is no longer built, remove related files - adjust files to be packaged; xsview has gone, add xen-mfndump and xenstore man pages - add another xenstore-write to xenstored.service and oxenstored.service - Add xen.console.fix.patch to fix issues running pygrub- update to xen-4.3.2 includes fix for "Excessive time to disable caching with HVM guests with PCI passthrough" [XSA-60, CVE-2013-2212] (#987914) - remove patches that are now included- use-after-free in xc_cpupool_getinfo() under memory pressure [XSA-88, CVE-2014-1950] (#1064491)- integer overflow in several XSM/Flask hypercalls [XSA-84, CVE-2014-1891, CVE-2014-1892, CVE-2014-1893, CVE-2014-1894] Off-by-one error in FLASK_AVC_CACHESTAT hypercall [XSA-85, CVE-2014-1895] libvchan failure handling malicious ring indexes [XSA-86, CVE-2014-1896] (#1062335)- PHYSDEVOP_{prepare,release}_msix exposed to unprivileged pv guests [XSA-87, CVE-2014-1666] (#1058398)- Out-of-memory condition yielding memory corruption during IRQ setup [XSA-83, CVE-2014-1642] (#1057142)- Disaggregated domain management security status update [XSA-77] - IOMMU TLB flushing may be inadvertently suppressed [XSA-80, CVE-2013-6400] (#1040024)- HVM guest triggerable AMD CPU erratum may cause host hang [XSA-82, CVE-2013-6885]- Lock order reversal between page_alloc_lock and mm_rwlock [XSA-74, CVE-2013-4553] (#1034925) - Hypercalls exposed to privilege rings 1 and 2 of HVM guests [XSA-76, CVE-2013-4554] (#1034923)- Insufficient TLB flushing in VT-d (iommu) code [XSA-78, CVE-2013-6375] (#1033149)- Host crash due to HVM guest VMX instruction execution [XSA-75, CVE-2013-4551] (#1029055)- update to xen-4.3.1 - Lock order reversal between page allocation and grant table locks [XSA-73, CVE-2013-4494] (#1026248)- ocaml xenstored mishandles oversized message replies [XSA-72, CVE-2013-4416] (#1024450)- systemd changes to allow oxenstored to be used instead of xenstored (#1022640)- security fixes (#1017843) Information leak through outs instruction emulation in 64-bit PV guests [XSA-67, CVE-2013-4368] possible null dereference when parsing vif ratelimiting info [XSA-68, CVE-2013-4369] misplaced free in ocaml xc_vcpu_getaffinity stub [XSA-69, CVE-2013-4370] use-after-free in libxl_list_cpupool under memory pressure [XSA-70, CVE-2013-4371] qemu disk backend (qdisk) resource leak (Fedora doesn't build this qemu) [XSA-71, CVE-2013-4375]- Set "Domain-0" label in xenstored.service systemd file to match xencommons init.d script. - security fixes (#1013748) Information leaks to HVM guests through I/O instruction emulation [XSA-63, CVE-2013-4355] Memory accessible by 64-bit PV guests under live migration [XSA-64, CVE-2013-4356] Information leak to HVM guests through fbld instruction emulation [XSA-66, CVE-2013-4361]- Information leak on AVX and/or LWP capable CPUs [XSA-62, CVE-2013-1442] (#1012056)- Rebuild for OCaml 4.01.0.- Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild- build a 64-bit hypervisor on ix86- update to xen-4.3.0 - rebase xen.use.fedora.ipxe.patch - remove patches that are now included or no longer needed - add polarssl source needed for stubdom build - remove references to ia64 in spec file (dropped upstream) - don't build hypervisor on ix86 (dropped upstream) - tools want wget (or ftp) to build - build XSM FLASK support into hypervisor with policy file - add xencov_split and xencov to files packaged, remove pdf docs - tidy up rpm scripts and stop enabling systemctl services on upgrade now sysv is gone from Fedora - re-number patches- XSA-45/CVE-2013-1918 breaks page reference counting [XSA-58, CVE-2013-1432] (#978383) - let pygrub handle set default="${next_entry}" line in F19 (#978036) - libxl: Set vfb and vkb devid if not done so by the caller (#977987)- add upstream patch for PCI passthrough problems after XSA-46 (#977310)- xenstore permissions not set correctly by libxl [XSA-57, CVE-2013-2211] (#976779)- Revised fixes for [XSA-55, CVE-2013-2194 CVE-2013-2195 CVE-2013-2196] (#970640)- Information leak on XSAVE/XRSTOR capable AMD CPUs [XSA-52, CVE-2013-2076] (#970206) - Hypervisor crash due to missing exception recovery on XRSTOR [XSA-53, CVE-2013-2077] (#970204) - Hypervisor crash due to missing exception recovery on XSETBV [XSA-54, CVE-2013-2078] (#970202) - Multiple vulnerabilities in libelf PV kernel handling [XSA-55] (#970640)- xend toolstack doesn't check bounds for VCPU affinity [XSA-56, CVE-2013-2072] (#964241)- xen-devel should require libuuid-devel (#962833) - pygrub menu items can include too much text (#958524)- PV guests can use non-preemptible long latency operations to mount a denial of service attack on the whole system [XSA-45, CVE-2013-1918] (#958918) - malicious guests can inject interrupts through bridge devices to mount a denial of service attack on the whole system [XSA-49, CVE-2013-1952] (#958919)- fix further man page issues to allow building on F19 and F20- update to xen-4.2.2 includes fixes for [XSA-48, CVE-2013-1922] (Fedora doesn't use the affected code) passed through IRQs or PCI devices might allow denial of service attack [XSA-46, CVE-2013-1919] (#953568) SYSENTER in 32-bit PV guests on 64-bit xen can crash hypervisor [XSA-44, CVE-2013-1917] (#953569) - remove patches that are included in 4.2.2 - look for libxl-save-helper in the right place - fix xl list -l output when built with yajl2 - allow xendomains to work with xl saved images- make xendomains systemd script executable and update it from init.d version (#919705) - Potential use of freed memory in event channel operations [XSA-47, CVE-2013-1920]- patch for [XSA-36, CVE-2013-0153] can cause boot time crash- patch for [XSA-38, CVE-2013-0215] was flawed- BuildRequires for texlive-kpathsea-bin wasn't needed - correct gcc 4.8 fixes and follow suggestions upstream- guest using oxenstored can crash host or exhaust memory [XSA-38, CVE-2013-0215] (#907888) - guest using AMD-Vi for PCI passthrough can cause denial of service [XSA-36, CVE-2013-0153] (#910914) - add some fixes for code which gcc 4.8 complains about - additional BuildRequires are now needed for pod2text and pod2man also texlive-kpathsea-bin for mktexfmt- correct disabling of xendomains.service on uninstall- nested virtualization on 32-bit guest can crash host [XSA-34, CVE-2013-0151] also nested HVM on guest can cause host to run out of memory [XSA-35, CVE-2013-0152] (#902792) - restore status option to xend which is used by libvirt (#893699)- Buffer overflow when processing large packets in qemu e1000 device driver [XSA-41, CVE-2012-6075] (#910845)- fix some format errors in xl.cfg.pod.5 to allow build on F19- VT-d interrupt remapping source validation flaw [XSA-33, CVE-2012-5634] (#893568) - pv guests can crash xen when xen built with debug=y (included for completeness - Fedora builds have debug=n) [XSA-37, CVE-2013-0154]- update to xen-4.2.1 - remove patches that are included in 4.2.1 - rebase xen.fedora.efi.build.patch- Rebuild for OCaml fix (RHBZ#877128).- 6 security fixes A guest can cause xen to crash [XSA-26, CVE-2012-5510] (#883082) An HVM guest can cause xen to run slowly or crash [XSA-27, CVE-2012-5511] (#883084) A PV guest can cause xen to crash and might be able escalate privileges [XSA-29, CVE-2012-5513] (#883088) An HVM guest can cause xen to hang [XSA-30, CVE-2012-5514] (#883091) A guest can cause xen to hang [XSA-31, CVE-2012-5515] (#883092) A PV guest can cause xen to crash and might be able escalate privileges [XSA-32, CVE-2012-5525] (#883094)- two build fixes for Fedora 19 - add texlive-ntgclass package to fix build- 4 security fixes A guest can block a cpu by setting a bad VCPU deadline [XSA 20, CVE-2012-4535] (#876198) HVM guest can exhaust p2m table crashing xen [XSA 22, CVE-2012-4537] (#876203) PAE HVM guest can crash hypervisor [XSA-23, CVE-2012-4538] (#876205) 32-bit PV guest on 64-bit hypervisor can cause an hypervisor infinite loop [XSA-24, CVE-2012-4539] (#876207) - texlive-2012 is now in Fedora 18- texlive-2012 isn't in Fedora 18 yet- limit the size of guest kernels and ramdisks to avoid running out of memeory on dom0 during guest boot [XSA-25, CVE-2012-4544] (#870414)- update to xen-4.2.0 - rebase xen-net-disable-iptables-on-bridge.patch pygrubfix.patch - remove patches that are now upstream or with alternatives upstream - use ipxe and seabios from seabios-bin and ipxe-roms-qemu packages - xen tools now need ./configure to be run (x86_64 needs libdir set) - don't build upstream qemu version - amend list of files in package - relocate xenpaging add /etc/xen/xlexample* oxenstored.conf /usr/include/xenstore-compat/* xenstore-stubdom.gz xen-lowmemd xen-ringwatch xl.1.gz xl.cfg.5.gz xl.conf.5.gz xlcpupool.cfg.5.gz - use a tmpfiles.d file to create /run/xen on boot - add BuildRequires for yajl-devel and graphviz - build an efi boot image where it is supported - adjust texlive changes so spec file still works on Fedora 17- add font packages to build requires due to 2012 version of texlive in F19 - use build requires of texlive-latex instead of tetex-latex which it obsoletes- rebuild for ocaml update- disable qemu monitor by default [XSA-19, CVE-2012-4411] (#855141)- 5 security fixes a malicious 64-bit PV guest can crash the dom0 [XSA-12, CVE-2012-3494] (#854585) a malicious crash might be able to crash the dom0 or escalate privileges [XSA-13, CVE-2012-3495] (#854589) a malicious PV guest can crash the dom0 [XSA-14, CVE-2012-3496] (#854590) a malicious HVM guest can crash the dom0 and might be able to read hypervisor or guest memory [XSA-16, CVE-2012-3498] (#854593) an HVM guest could use VT100 escape sequences to escalate privileges to that of the qemu process [XSA-17, CVE-2012-3515] (#854599)- update to 4.1.3 includes fix for untrusted HVM guest can cause the dom0 to hang or crash [XSA-11, CVE-2012-3433] (#843582) - remove patches that are now upstream - remove some unnecessary compile fixes - adjust upstream-23936:cdb34816a40a-rework for backported fix for upstream-23940:187d59e32a58 - replace pygrub.size.limits.patch with upstreamed version - fix for (#845444) broke xend under systemd- remove some unnecessary cache flushing that slow things down - change python options on xend to reduce selinux problems (#845444)- in rare circumstances an unprivileged user can crash an HVM guest [XSA-10,CVE-2012-3432] (#843766)- add a patch to remove a dependency on PyXML and Require python-lxml instead of PyXML (#842843)- adjust systemd service files not to report failures when running without a hypervisor or when xendomains.service doesn't find anything to start- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild- Apply three security patches 64-bit PV guest privilege escalation vulnerability [CVE-2012-0217] guest denial of service on syscall/sysenter exception generation [CVE-2012-0218] PV guest host Denial of Service [CVE-2012-2934]- adjust xend.service systemd file to avoid selinux problems- Enable xenconsoled by default under systemd (#829732)- make pygrub cope better with big files from guest (#818412 CVE-2012-2625) - add patch from 4.1.3-rc2-pre to build on F17/8- Make the udev tap rule more specific as it breaks openvpn (#812421) - don't try setuid in xend if we don't need to so selinux is happier- /var/lib/xenstored mount has wrong selinux permissions in latest Fedora - load xen-acpi-processor module (kernel 3.4 onwards) if present- fix a packaging error- fix an error in an rpm script from the sysv configuration removal - migrate xendomains script to systemd- put the systemd files back in the right place- clean up systemd and sysv configuration including removal of migrated sysv files for fc17+- move xen-watchdog to systemd- relocate systemd files for fc17+- move xend and xenconsoled to systemd- Fix buffer overflow in e1000 emulation for HVM guests [CVE-2012-0029]- Start building xen's ocaml libraries if appropriate unless --without ocaml was specified - add some backported patches from xen unstable (via Debian) for some ocaml tidying and fixes- actually apply the xend-pci-loop.patch - compile fixes for gcc-4.7- Add xend-pci-loop.patch to stop xend crashing with weird PCI cards (#767742) - avoid a backtrace if xend can't log to the standard file or a temporary directory (part of #741042)- Fix lost interrupts on emulated devices - stop xend crashing if its state files are empty at start up - avoid a python backtrace if xend is run on bare metal - update grub2 configuration after the old hypervisor has gone - move blktapctrl to systemd - Drop obsolete dom0-kernel.repo file- update to 4.1.2 remove upstream patches xen-4.1-testing.23104 and xen-4.1-testing.23112- more pygrub improvements for grub2 on guest- make pygrub work better with GPT partitions and grub2 on guest- improve systemd functionality- lsb header fixes - xenconsoled shutdown needs xenstored to be running - partial migration to systemd to fix shutdown delays - update grub2 configuration after hypervisor updates- untrusted guest controlling PCI[E] device can lock up host CPU [CVE-2011-3131]- clean up patch to solve a problem with hvmloader compiled with gcc 4.6- update to 4.1.1 includes various bugfixes and fix for [CVE-2011-1898] guest with pci passthrough can gain privileged access to base domain - remove upstream cve-2011-1583-4.1.patch- Overflows in kernel decompression can allow root on xen PV guest to gain privileged access to base domain, or access to xen configuration info. Lack of error checking could allow DoS attack from guest [CVE-2011-1583] - Don't require /usr/bin/qemu-nbd as it isn't used at present.- update to 4.1.0 final- update to 4.1.0-rc8 release candidate - create xen-4.1.0-rc8.tar.xz file from git/hg repositories - rebase xen-initscript.patch xen-dumpdir.patch xen-net-disable-iptables-on-bridge.patch localgcc45fix.patch sysconfig.xenstored init.xenstored - remove unnecessary or conflicting xen-xenstore-cli.patch localpy27fixes.patch xen.irq.fixes.patch xen.xsave.disable.patch xen.8259afix.patch localcleanups.patch libpermfixes.patch - add patch to allow pygrub to work with single partitions with boot sectors - create ipxe-git-v1.0.0.tar.gz from http://git.ipxe.org/ipxe.git to avoid downloading at build time - no need to move udev rules or init scripts as now created in the right place - amend list of files shipped - remove fs-backend add init.d scripts xen-watchdog xencommons add config files xencommons xl.conf cpupool add programs kdd tap-ctl xen-hptool xen-hvmcrash xenwatchdogd- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild- Make libraries executable so that rpm gets dependencies right- Temporarily turn off some compile options so it will build on rawhide- ghost directories in /var/run (#656724) - minor fixes to /usr/share/doc/xen-doc-4.?.?/misc/network_setup.txt (#653159) /etc/xen/scripts/network-route, /etc/xen/scripts/vif-common.sh (#669747) and /etc/sysconfig/modules/xen.modules (#656536)- add upstream xen patch xen.8259afix.patch to fix boot panic "IO-APIC + timer doesn't work!" (#642108)- add ext4 support for pvgrub (grub-ext4-support.patch from grub-0.97-66.fc14)- Rebuilt for gcc bug 634757- create symlink for qemu-dm on x86_64 for compatibility with 3.4 - apply some patches destined for 4.0.2 add some irq fixes disable xsave which causes problems for HVM- fix compile problems on Fedora 15, I suspect due to gcc 4.5.1- update to 4.0.1 release - many bug fixes - xen-dev-create-cleanup.patch no longer needed - remove part of localgcc45fix.patch no longer needed - package new files /etc/bash_completion.d/xl.sh and /usr/sbin/gdbsx - add patch to get xm and xend working with python 2.7- add newer module names and xen-gntdev to xen.modules - Update dom0-kernel.repo file to use repos.fedorapeople.org location- create a xen-licenses package to satisfy revised the Fedora Licensing Guidelines- fix gcc 4.5 compile problems- Rebuilt for https://fedoraproject.org/wiki/Features/Python_2.7/MassRebuild- add patch to remove some old device creation code that doesn't work with the latest pvops kernels- update to 4.0.0 release - rebase xen-initscript.patch and xen-dumpdir.patch patches - adjust spec file for files added to or removed from the packages - add new build dependencies libuuid-devel and iasl- update to 3.4.3 release including support for latest pv_ops kernels (possibly incomplete) should fix build problems (#565063) and crashes (#545307) - replace Prereq: with Requires: in spec file - drop static libraries (#556101)- adapt module load script to evtchn.ko -> xen-evtchn.ko rename.- update to 3.4.2 release. - drop backport patches.- add PyXML to dependencies. (#496135) - Take ownership of {_libdir}/fs (#521806)- add e2fsprogs-devel to build dependencies.- swap bzip2+xz linux kernel compression support patches. - backport one more bugfix (videoram option).- backport bzip2+xz linux kernel compression support. - backport a few bugfixes.- update to 3.4.1 release.- Kill info files. No xen docs, just standard gnu stuff. - kill -Werror in tools/libxc to fix build.- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild- rename info files to fix conflict with binutils. - add install-info calls for the doc subpackage. - un-parallelize doc build.- update to version 3.4.0. - cleanup specfile, add doc subpackage.- fix python 2.6 warnings.- fix xen.modules init script for pv_ops kernel. - stick rpm release tag into XEN_VENDORVERSION. - use i386 i486 i586 i686 pentium3 pentium4 athlon geode macro in ExclusiveArch. - keep blktapctrl turned off by default.- fix xenstored init script for pv_ops kernel.- fix xenstored crash. - backport qemu-unplug patch.- fix gcc44 build (broken constrain in inline asm). - fix ExclusiveArch- backport bzImage support for dom0 builder.- rebuild with new openssl- update to xen 3.3.1 release.- build and package stub domains (pvgrub, ioemu). - backport unstable fixes for pv_ops dom0.- Rebuild for Python 2.6- Update to xen 3.3.0 release- Enable xen-hypervisor build - Backport support for booting DomU from bzImage - Re-diff all patches for zero fuzz- Remove bogus ia64 hypercall arg (rhbz #433921)- Re-enable QEMU image format auto-detection, without the security loopholes- Rebuild for GNU TLS ABI change- Correctly limit PVFB size (CVE-2008-1952)- Move /var/run/xend into xen-runtime for pygrub (rhbz #442052)- Disable QEMU image format auto-detection (CVE-2008-2004) - Fix PVFB to validate frame buffer description (CVE-2008-1943)- Fix block device checks for extendable disk formats- Let XenD setup QEMU logfile (rhbz #435164) - Fix PVFB use of event channel filehandle- Fix block device extents check (rhbz #433560)- Restore some network-bridge patches lost during 3.2.0 rebase- Fixed xenstore-ls to automatically use xenstored socket as needed- Fix timer mode parameter handling for HVM - Temporarily disable all Latex docs due to texlive problems (rhbz #431327)- Add a xen-runtime subpackage to allow use of Xen without XenD - Split init script out to one script per daemon - Remove unused / broken / obsolete tools- Remove legacy dependancy on python-virtinst- Added XSM header files to -devel RPM- Updated to 3.2.0 final release- Rebase to Xen 3.2 rc5 changeset 16701- Re-factor to make it easier to test dev trees in RPMs - Include hypervisor build if doing a dev RPM- Rebuild for deps- Upgrade to 3.1.2 bugfix release- Disable network-bridge script since it conflicts with NetworkManager which is now on by default- Fixed xenbaked tmpfile flaw (CVE-2007-3919)- Pull in QEMU BIOS boot menu patch from KVM package - Fix QEMU patch for locating x509 certificates based on command line args - Add XenD config options for TLS x509 certificate setup- Fixed rtl8139 checksum calculation for Vista (rhbz #308201)- QEmu NE2000 overflow check - CVE-2007-1321 - Pygrub guest escape - CVE-2007-4993- Fix generation of manual pages (rhbz #250791) - Really fix FC-6 32-on-64 guests- Make 32-bit FC-6 guest PVFB work on x86_64 host- Re-add support for back-compat FC6 PVFB support - Fix handling of explicit port numbers (rhbz #279581)- Don't clobber the VIF type attribute in FV guests (rhbz #296061)- Added dep on openssl for blktap-qcow- Switch PVFB over to use QEMU - Backport QEMU VNC security patches for TLS/x509- Put guest's native protocol ABI into xenstore, to provide for older kernels running 32-on-64. - VNC keymap fixes - Fix race conditions in LibVNCServer on client disconnect- Remove patch which kills VNC monitor - Fix HVM save/restore file path to be /var/lib/xen instead of /tmp - Don't spawn a bogus xen-vncfb daemon for HVM guests - Add persistent logging of hypervisor & guest consoles - Add /etc/sysconfig/xen to allow admin choice of logging options - Re-write Xen startup to use standard init script functions - Add logrotate configuration for all xen related logs- Updated to official 3.1.0 tar.gz - Fixed data corruption from VNC client disconnect (bz 241303)- Ensure xen-vncfb processes are cleanedup if guest quits (bz 240406) - Tear down guest if device hotplug fails- Updated to 3.1.0 rc7, changeset 15021 (upstream renumbered from 3.0.5)- Fix op_save RPC API- Added BR on gettext- Redo failed build.- Updated to 3.0.5 rc4, changeset 14993 - Reduce number of xenstore transactions used for listing domains - Hack to pre-balloon 2 MB for PV guests as well as HVM- Fixed display of bootloader menu with xm create -c - Added modprobe for both xenblktap & blktap to deal with rename issues - Hack to pre-balloon 10 MB for HVM guests- Updated to 3.0.5 rc3, changeset 14934 - Fixed networking for service xend restart & minor IPv6 tweak- Fixed vfb/vkbd device startup race- Updated to xen 3.0.5 rc2, changeset 14889 - Remove use of netloop from network-bridge script - Add backcompat support to vif-bridge script to translate xenbrN to ethN- Disable access to QEMU monitor over VNC (CVE-2007-0998, bz 230295)- Close QEMU file handles when running network script- Fix interaction of bootloader with blktap (bz 230702) - Ensure PVFB daemon terminates if domain doesn't startup (bz 230634)- Setup readonly loop devices for readonly disks - Extended error reporting for hotplug scripts - Pass all 8 mouse buttons from VNC through to kernel- Don't run the pvfb daemons for HVM guests (bz 225413) - Fix handling of vnclisten parameter for HVM guests- Fix pygrub memory corruption- Added PVFB back compat for FC5/6 guests- Ensure the arch-x86 header files are included in xen-devel package - Bring back patch to move /var/xen/dump to /var/lib/xen/dump - Make /var/log/xen mode 0700- Upgrade to official xen-3.0.4_1 release tarball- fix the build- rebuild for python 2.5- Pull in the official 3.0.3 tarball of xen (changeset 11774). - Add patches for VNC password authentication (bz 203196) - Switch /etc/xen directory to be mode 0700 because the config files can contain plain text passwords (bz 203196) - Change the package dependency to python-virtinst to reflect the package name change. - Fix str-2-int cast of VNC port for paravirt framebuffer (bz 211193)- fix having "many" kernels in pygrub- Fix SMBIOS tables for SVM guests [danpb] (bug 207501)- Added vnclisten patches to make VNC only listen on localhost out of the box, configurable by 'vnclisten' parameter (bz 203196)- Update to xen-3.0.3-testing changeset 11633- Workaround blktap/xenstore startup race - Add udev rules for xen blktap devices (srostedt) - Add support for dynamic blktap device nodes (srostedt) - Fixes for infinite dom0 cpu usage with blktap - Fix xm not to die on malformed "tap:" blkif config string - Enable blktap on kernels without epoll-for-aio support. - Load the blktap module automatically at startup - Reenable blktapctrl- Disable paravirt framebuffer server side rendered cursor (bz 206313) - Ignore SIGPIPE in paravirt framebuffer daemon to avoid terminating on client disconnects while writing data (bz 208025)- Fix cursor in pygrub (#208041)- Removed obsolete scary warnings in package description- Add Requires: kpartx for dom0 access to domU data- Don't strip qemu-dm early, so that we get proper debuginfo (danpb) - Fix compile problem with latest glibc- Update to xen-unstable changeset 11539 - Threading fixes for libVNCserver (danpb)- update pvfb patch based on upstream feedback- re-enable ia64.- update to changeset 11405- fix pvfb for x86_64- update libvncserver to hopefully fix problems with vnc clients disconnecting- fix a typo- add support for paravirt framebuffer- update to xen-unstable cs 11251 - clean up patches some - disable ia64 as it doesn't currently build- make initscript not spew on non-xen kernels (#202945)- remove copy of xenguest-install from this package, require python-xeninst (the new home of xenguest-install)- add patch to fix rtl8139 in FV, switch it back to the default nic - add necessary ia64 patches (#201040) - build on ia64- add patch to fix net devices for HVM guests- make sure disk IO from HVM guests actually hits disk (#198851)- don't start blktapctrl for now - fix HVM guest creation in xenguest-install - make sure log files have the right SELinux label- fix libblktap symlinks (#199820) - make libxenstore executable (#197316) - version libxenstore (markmc)- include /var/xen/dump in file list - load blkbk, netbk and netloop when xend starts - update to cs 10712 - avoid file conflicts with qemu (#199759)- libxenstore is unversioned, so make xen-libs own it rather than xen-devel- Fix network-bridge error (#199414)- desactivating the relocation server in xend conf by default and add a warning text about it.- Compile fix: don't #include - Update to xen-unstable cset 10675 - Remove internal libvncserver build, new qemu device model has its own one now. - Change default FV NIC model from rtl8139 to ne2k_pci until the former works better- bump libvirt requires to 0.1.2 - drop xend httpd localhost server and use the unix socket instead- split into main packages + -libs and -devel subpackages for #198260 - add patch from jfautley to allow specifying other bridge for xenguest-install (#198097)- make xenguest-install work with relative paths to disk images (markmc, #197518)- own /var/run/xend for selinux (#196456, #195952)- fix syntax error in xenguest-install- more initscript patch to report status #184452- Add BuildRequires: for gnu/stubs-32.h so that x86_64 builds pick up glibc32 correctly- Rebase to xen-unstable cset 10278- update to new snapshot (changeset 9925)- xen.h now requires xen-compat.h, install it too- -m64 patch isn't needed anymore either- update to post 3.0.2 snapshot (changeset: 9744:1ad06bd6832d) - stop applying patches that are upstreamed - add patches for bootloader to run on all domain creations - make xenguest-install create a persistent uuid - use libvirt for domain creation in xenguest-install, slightly improve error handling- augment the close on exec patch with the fix for #188361- add udev rule so that /dev/xen/evtchn gets created properly - make pygrub not use /tmp for SELinux - make xenguest-install actually unmount its nfs share. also, don't use /tmp- set /proc/xen/privcmd and /var/log/xend-debug.log as close on exec to avoid SELinux problems - give better feedback on invalid urls (#184176)- Use kva mmap to find the xenstore page (upstream xen-unstable cset 9130)- fix xenguest-install so that it uses phy: for block devices instead of forcing them over loopback. - change package versioning to be a little more accurate- Remove unneeded CFLAGS spec file hack- fix 64 bit CFLAGS issue with vmxloader and hvmloader- Update to xen-unstable cset 9022- Update to xen-unstable cset 9015- add patch to ensure we get a unique fifo for boot loader (#182328) - don't try to read the whole disk if we can't find a partition table with pygrub - fix restarting of domains (#179677)- fix -h conflict for xenguest-isntall- turn on http listener so you can do things with libvir as a user- update to current hg snapshot for HVM support - update xenguest-install for hvm changes. allow hvm on svm hardware - fix a few little xenguest-install bugs- add a hack to fix VMX guests with video to balloon enough (#180375)- fix build for new udev- patch from David Lutterkort to pass macaddr (-m) to xenguest-install - rework xenguest-install a bit so that it can be used for creating fully-virtualized guests as well as paravirt. Run with --help for more details (or follow the prompts) - add more docs (noticed by Andrew Puch)- rebuilt for new gcc4.1 snapshot and glibc changes- disable iptables/ip6tables/arptables on bridging when bringing up a Xen bridge. If complicated filtering is needed that uses this, custom firewalls will be needed. (#177794)- use the default network device, don't hardcode eth0- Add xenguest-install.py in /usr/sbin- Update to xen-unstable from 20060130 (cset 8705)- buildrequire dev86 so that vmx firmware gets built - include a copy of libvncserver and build vmx device models against it- only put the udev rules in one place- move xsls to xenstore-ls to not conflict (#171863)- Update to xen-unstable from 20060110 (cset 8526)- rebuilt- 20051206 version (should be 3.0.0). - Remove xen-bootloader fixes (integrated upstream).- adding missing headers for libxenctrl and libxenstore - use libX11-devel build require instead of xorg-x11-devel- change default dom0 min-mem to 256M so that dom0 will try to balloon down- buildrequire ncurses-devel (reported by Justin Dearing)- actually enable the initscripts- udev rules moved- update to current -unstable - add patches to fix pygrub- update to current -unstable- update to current -unstable- doesn't require twisted anymore- add /var/{lib,run}/xenstored to the %files section (#167496, #167121) - upgrade to today's Xen snapshot - some small build fixes for x86_64 - enable x86_64 builds- explicitly call /usr/sbin/xend from initscript (#167407) - add xenstored directories to spec file (#167496, #167121) - misc gcc4 fixes - spec file cleanups (#161191) - upgrade to today's Xen snapshot - change the version to 3.0-0. (real 3.0 release will be 3.0-1)- upgrade to today's Xen snapshot- upgrade to a known-working newer Xen, now that execshield works again- create /var/lib/xen/xen-db/migrate directory so "xm save" works (#158895)- change default display method for VMX domains to SDL- qemu device model for VMX- apply some VMX related bugfixes- upgrade to last night's snapshot- patch manpath instead of moving in specfile. patch sent upstream - install to native python path instead of /usr/lib/python - other misc specfile duplication cleanup- fix context switch between vcpus in same domain, vcpus > cpus works again- move initscripts to /etc/rc.d/init.d (Florian La Roche) (#153188) - ship only PDF documentation, not the PS or tex duplicates- upgrade to new xen hypervisor - minor gcc4 compile fix- do not yet upgrade to new hypervisor ;) - add barrier to fix SMP boot bug - add tags target - add zlib-devel build requires (#150952)- upgrade to last night's snapshot - new compile fix patch- the gcc4 compile patches are now upstream - upgrade to last night's snapshot, drop patches locally- finally got everything to compile with gcc4 -Wall -Werror- upgrade to last night's Xen-unstable snapshot - drop printf warnings patch, which is upstream now- upgraded to last night's Xen snapshot - compile warning fixes are now upstream, drop patch- fix more compile warnings - fix the fwrite return check- upgrade to last night's Xen snapshot - a kernel upgrade is needed to run this Xen, the hypervisor interface changed slightly - comment out unused debugging function in plan9 domain builder that was giving compile errors with -Werror- upgrade to last night's Xen snapshot- move everything to /var/lib/xen- upgrade to new upstream Xen snapshot- add buildreqs on python-devel and xorg-x11-devel (strange AT nsk.no-ip.org)- fix /etc/xen/scripts/network to not break with ipv6 (also sent upstream)- update to new snap - python-twisted is its own package now - files are in /usr/lib/python now as well, ugh.- add segment fixup patch from xen tree - fix %files list for python-twisted- grab newer snapshot, that does start up - add /var/xen/xend-db/{domain,vnet} to %files section- upgrade to new snapshot of xen-unstable- build python-twisted as a subpackage - update to latest upstream Xen snapshot- grab new Xen tarball (with wednesday's patch already included) - transfig is a buildrequire, add it to the spec file- fix up Che's spec file a little bit - create patch to build just Xen, not the kernels- initial rpm release  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~4.5.3-8.fc224.5.3-8.fc22 xen-dochtmlhypercallarm.depsinclude,public,arch-arm,hvm,save.h.htmlinclude,public,arch-arm.h.htmlinclude,public,callback.h.htmlinclude,public,dom0_ops.h.htmlinclude,public,domctl.h.htmlinclude,public,elfnote.h.htmlinclude,public,event_channel.h.htmlinclude,public,features.h.htmlinclude,public,gcov.h.htmlinclude,public,grant_table.h.htmlinclude,public,hvm,e820.h.htmlinclude,public,hvm,hvm_info_table.h.htmlinclude,public,hvm,hvm_op.h.htmlinclude,public,hvm,hvm_xs_strings.h.htmlinclude,public,hvm,ioreq.h.htmlinclude,public,hvm,params.h.htmlinclude,public,hvm,pvdrivers.h.htmlinclude,public,hvm,save.h.htmlinclude,public,io,blkif.h.htmlinclude,public,io,console.h.htmlinclude,public,io,fbif.h.htmlinclude,public,io,fsif.h.htmlinclude,public,io,kbdif.h.htmlinclude,public,io,libxenvchan.h.htmlinclude,public,io,netif.h.htmlinclude,public,io,pciif.h.htmlinclude,public,io,protocols.h.htmlinclude,public,io,ring.h.htmlinclude,public,io,tpmif.h.htmlinclude,public,io,usbif.h.htmlinclude,public,io,vscsiif.h.htmlinclude,public,io,xenbus.h.htmlinclude,public,io,xs_wire.h.htmlinclude,public,kexec.h.htmlinclude,public,mem_event.h.htmlinclude,public,memory.h.htmlinclude,public,nmi.h.htmlinclude,public,physdev.h.htmlinclude,public,platform.h.htmlinclude,public,sched.h.htmlinclude,public,sysctl.h.htmlinclude,public,tmem.h.htmlinclude,public,trace.h.htmlinclude,public,vcpu.h.htmlinclude,public,version.h.htmlinclude,public,xen-compat.h.htmlinclude,public,xen.h.htmlinclude,public,xencomm.h.htmlinclude,public,xenoprof.h.htmlinclude,public,xsm,flask_op.h.htmlinclude,xen,errno.h.htmlindex.htmlindex.htmlx86_32.depsinclude,public,arch-x86,cpuid.h.htmlinclude,public,arch-x86,hvm,save.h.htmlinclude,public,arch-x86,xen-mca.h.htmlinclude,public,arch-x86,xen-x86_32.h.htmlinclude,public,arch-x86,xen.h.htmlinclude,public,arch-x86_32.h.htmlinclude,public,callback.h.htmlinclude,public,dom0_ops.h.htmlinclude,public,domctl.h.htmlinclude,public,elfnote.h.htmlinclude,public,event_channel.h.htmlinclude,public,features.h.htmlinclude,public,gcov.h.htmlinclude,public,grant_table.h.htmlinclude,public,hvm,e820.h.htmlinclude,public,hvm,hvm_info_table.h.htmlinclude,public,hvm,hvm_op.h.htmlinclude,public,hvm,hvm_xs_strings.h.htmlinclude,public,hvm,ioreq.h.htmlinclude,public,hvm,params.h.htmlinclude,public,hvm,pvdrivers.h.htmlinclude,public,hvm,save.h.htmlinclude,public,io,blkif.h.htmlinclude,public,io,console.h.htmlinclude,public,io,fbif.h.htmlinclude,public,io,fsif.h.htmlinclude,public,io,kbdif.h.htmlinclude,public,io,libxenvchan.h.htmlinclude,public,io,netif.h.htmlinclude,public,io,pciif.h.htmlinclude,public,io,protocols.h.htmlinclude,public,io,ring.h.htmlinclude,public,io,tpmif.h.htmlinclude,public,io,usbif.h.htmlinclude,public,io,vscsiif.h.htmlinclude,public,io,xenbus.h.htmlinclude,public,io,xs_wire.h.htmlinclude,public,kexec.h.htmlinclude,public,mem_event.h.htmlinclude,public,memory.h.htmlinclude,public,nmi.h.htmlinclude,public,physdev.h.htmlinclude,public,platform.h.htmlinclude,public,sched.h.htmlinclude,public,sysctl.h.htmlinclude,public,tmem.h.htmlinclude,public,trace.h.htmlinclude,public,vcpu.h.htmlinclude,public,version.h.htmlinclude,public,xen-compat.h.htmlinclude,public,xen.h.htmlinclude,public,xencomm.h.htmlinclude,public,xenoprof.h.htmlinclude,public,xsm,flask_op.h.htmlinclude,xen,errno.h.htmlindex.htmlx86_64.depsinclude,public,arch-x86,cpuid.h.htmlinclude,public,arch-x86,hvm,save.h.htmlinclude,public,arch-x86,xen-mca.h.htmlinclude,public,arch-x86,xen-x86_64.h.htmlinclude,public,arch-x86,xen.h.htmlinclude,public,arch-x86_64.h.htmlinclude,public,callback.h.htmlinclude,public,dom0_ops.h.htmlinclude,public,domctl.h.htmlinclude,public,elfnote.h.htmlinclude,public,event_channel.h.htmlinclude,public,features.h.htmlinclude,public,gcov.h.htmlinclude,public,grant_table.h.htmlinclude,public,hvm,e820.h.htmlinclude,public,hvm,hvm_info_table.h.htmlinclude,public,hvm,hvm_op.h.htmlinclude,public,hvm,hvm_xs_strings.h.htmlinclude,public,hvm,ioreq.h.htmlinclude,public,hvm,params.h.htmlinclude,public,hvm,pvdrivers.h.htmlinclude,public,hvm,save.h.htmlinclude,public,io,blkif.h.htmlinclude,public,io,console.h.htmlinclude,public,io,fbif.h.htmlinclude,public,io,fsif.h.htmlinclude,public,io,kbdif.h.htmlinclude,public,io,libxenvchan.h.htmlinclude,public,io,netif.h.htmlinclude,public,io,pciif.h.htmlinclude,public,io,protocols.h.htmlinclude,public,io,ring.h.htmlinclude,public,io,tpmif.h.htmlinclude,public,io,usbif.h.htmlinclude,public,io,vscsiif.h.htmlinclude,public,io,xenbus.h.htmlinclude,public,io,xs_wire.h.htmlinclude,public,kexec.h.htmlinclude,public,mem_event.h.htmlinclude,public,memory.h.htmlinclude,public,nmi.h.htmlinclude,public,physdev.h.htmlinclude,public,platform.h.htmlinclude,public,sched.h.htmlinclude,public,sysctl.h.htmlinclude,public,tmem.h.htmlinclude,public,trace.h.htmlinclude,public,vcpu.h.htmlinclude,public,version.h.htmlinclude,public,xen-compat.h.htmlinclude,public,xen.h.htmlinclude,public,xencomm.h.htmlinclude,public,xenoprof.h.htmlinclude,public,xsm,flask_op.h.htmlinclude,xen,errno.h.htmlindex.htmlindex.htmlmanindex.htmlxenstore-chmod.1.htmlxenstore-ls.1.htmlxenstore.1.htmlxl.1.htmlxl.cfg.5.htmlxl.conf.5.htmlxlcpupool.cfg.5.htmlmiscamd-ucode-container.txtchannel.txtconsole.txtcrashdb.txtdistro_mapping.txtdump-core-format.txtgrant-tables.txtindex.htmlkexec_and_kdump.txtlibxl_memory.txtpci-device-reservations.txtprintk-formats.txtpvh-readme.txtsedf_scheduler_mini-HOWTO.txttscmode.txtvbd-interface.txtvtd.txtvtpm-platforms.txtvtpm.txtvtpmmgr.txtxen-error-handling.txtxenpaging.txtxenstore-ring.txtxenstore.txtxl-disk-configuration.txtxsm-flask.txtmiscamd-ucode-container.txtarmbooting.txtdevice-treebooting.txtearly-printk.txtchannel.txtconsole.txtcoverage.markdowncrashdb.txtdistro_mapping.txtdump-core-format.txtefi.markdowngrant-tables.txthvm-emulated-unplug.markdownkexec_and_kdump.txtlibxl_memory.txtpci-device-reservations.txtprintk-formats.txtpvh-readme.txtpvh.markdownpvrdtscp.cqemu-upstream_howto_use_it.markdownsedf_scheduler_mini-HOWTO.txttmem-internals.htmltscmode.txtvbd-interface.txtvtd.txtvtpm-platforms.txtvtpm.txtvtpmmgr.txtx86-xenpv-bootloader.markdownxen-command-line.markdownxen-error-handling.txtxen_config.htmlxenpaging.txtxenstore-paths.markdownxenstore-paths.markdown.origxenstore-ring.txtxenstore.txtxl-disk-configuration.txtxl-network-configuration.markdownxl-numa-placement.markdownxsm-flask.txt/usr/share/doc//usr/share/doc/xen-doc//usr/share/doc/xen-doc/html//usr/share/doc/xen-doc/html/hypercall//usr/share/doc/xen-doc/html/hypercall/arm//usr/share/doc/xen-doc/html/hypercall/x86_32//usr/share/doc/xen-doc/html/hypercall/x86_64//usr/share/doc/xen-doc/html/man//usr/share/doc/xen-doc/html/misc//usr/share/doc/xen-doc/misc//usr/share/doc/xen-doc/misc/arm//usr/share/doc/xen-doc/misc/arm/device-tree/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tablesdrpmxz2i686-redhat-linux-gnudirectoryASCII textHTML document, ASCII textHTML document, UTF-8 Unicode textXML document textC source, ASCII textC++ source, ASCII text, with very long linesC++ source, ASCII text?7zXZ !#,4pb]"k%]=!uBwIL3:TsH hMrɺ<~~h|P[S2%=F:*6wiCd٨+uUp,S?-l%>o~xlgqڢx$cbԎ5Hxyy: Sȃu{zCF@qJ ^06'.`%Za9!WÇ^|$|wWHF<NoqcP (q E=߱O0We֋հFXJsGnGO <9?LMiW/U na~Fr=` v;&.U}I@%S!sn8ZUwF1_I߈-} &L $IBҶ7nPDgś_\.(tG$ԳJm ^P? ̅Vgk s(gWNjC- zM0B p+o|AzD֜mITsoEVڨAqQF>EJ^ἄѠwF,Z/"?IS$'!c4Q*:!T8>ѬC7q+= KH]Hv--qa1HtL~7aIP QW1Qz5e޷㯝N429̾aֹITʀ;"Nx-߽To`hAA0NŘf|.aq mS#S#'@Z{ewVi.US "nrdž cp|ymD5{ grۘpo)Z "#f]^>Й=^\ev I81ZK:ƄK}šm,yhU9QuF>JF;#5 pdQKe9m,;z\ITn%HLc6z!ŝ/{6D}|"X}˘kϦ_K[loy+l=hުqgd'dྉ/  UO=H^nB˖RاKfz2ɧ@GnЛ}h9Vlg[1&$tCޜY^Q.(1%Me:r1TK}mt6aftSrweْb,ʷX0 A@)e8]Ó)@: U *orHA$Ϋp Kb̽2K,R2@ɻX?_ ?з>Di:ূۖgQo\3nδCǖSݧvP^wul܆CN*O`/}&2mk{xm[ zMyl`f`oXr3'Qފo4?jՀvBJ^g@~ɌF\ZN6~ܱEOM`di{]@O{!9FGO}{gMĿVT̢:T[pö3-?2U1Ah{=C{<&5U?X٪ .Rp&`"˖ܲ[@/x'RDܼ-]_j;lkl?:faZ!+&47!xj2t㸒p߁̡O+=PMK-#Vi$̔*½WlNe [ԟ'%Gp pqa =٣"PH wq-o_ X^[0in;g2I/)e7RpK5^<[s4"^5=N">4!$N2BZC@|)bsR(:F#qVdʺr1 ư.BZPPy,#I_gTo⓷a_~9,NaR>%?\\w xW-Zs޻"&cx]9Ƈ?$0/^s/- i>ݻYI:b)ԍ˭f2 2ض a]:J VeMW&GQPlǞxP%ڛM*!W] O&'MsA< OH,?&pY^Ŕ{W~:ӫc :Ea+jL@qCJVܒv5$NEx^.%Xz\mueBݵfM+LI͒:iDƪ i""b0}S1_8;#ZY>ntDg+BvUt>#[H(O_@4d}|qUM//dUHn&/zHpyݖrH>CL} aC0ZDʾ>lwԪ4pR0hqVm?m?.!z2=@r? 31'P}6i1YgTr_@RڛZ@,1UQz#^\]&{Zi&j&l^u @^ų N/?1Պ KWEJ <6FLDcS%;ݞ'#E-@esCA\F5{ =x,viNI[Ybؗhma!pb/C]RHeTHiK5WBDȦ,F,;Q$,NKql3NPZ&V@!Q TJ{dwOk<>k;k6Ѵ NHNr@:RO ؛/F@r)FTC 3O+q!WFJ+#VΤSč]x  W3AJ&,w] {~ZOHZݠ,zt|<6*\y je+Px@ ca%)kXMpet4_8Q~Nʌ ԰~SR>p1RU1>fQFT"!_asMIEJE4s/1jǢݧ'M?8J =xλ?c{"NeBw/F^4W1taro j2Fx;#|׵"%Ӏ$d=A;v$pd_eMUS,度jvU lR~8U\["eW Y?5 g|k0S