qemu-block-curl-2:4.1.0-63.oe1 >  A bW^^f>;$Fޑ_J!GuTSPoIKQl&J!ٰz[Qﺔ*>F:6/R֊X#i'f_C/lhy66;ʚr93Qb Sy$0q %٣@³D!Yd}8뛌`ZWMښBn1DqCAA&a5L#1r8 =>%TkuT_z]WV/k#2A 0O s;9sʘBxLr]ϵG3ff711924e88d72de2d6775056bd5657edf27f418a6739f0a9ef3c340a181669b028c5f4f99e8fe060e0472e2b660c89ac993b12FXbW^^fqJ{JUoy1vYl!;m=R3$@m.9 7ޏx,>,vI5/"ǿ p.<bXӛ&gСލMf|;<?F( U Od.ʼna%wL2#`$UN2oguURו>F"sج8 U%  Mq#ߜ$7{-- *p=?d  $ 4hl $8>HL N P T  _({8!9!:!FGHIXY\ ]^b/c;defltuvzex|Cqemu-block-curl4.1.063.oe1Qemu-block-curlThis package provides block-curl support for Qemub7obs-worker-backend-test-x86-0005XopenEuler:20.03:LTS:SP1:gpgcheck / standard_x86_64http://openeuler.orgGPLv2 and BSD and MIT and CC-BY-SA-4.0http://openeuler.orgUnspecifiedhttp://www.qemu.orglinuxx86_64Xb3efa7a9dbaa6d6c810a2e39c1705d69562b528fe2ca6bf1b8a6dd0d4995b9bberootrootqemu-4.1.0-63.oe1.src.rpmqemu-block-curlqemu-block-curl(x86-64)    rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.15.1bzSbY^@bMbA@aan@aP`aC1a.aS@`]`t`@`@`@`Ȗ@`[`r`!@```f@`q`q`Y`y|@`S@`8`/@`x@`_м@_@yezengruan yezengruan yezengruan Jinhao Gao Chen Qun imxcc Chen Qun Chen Qun imxcc Chen Qun Jiajie Li Chen Qun Chen Qun Chen Qun Chen Qun Chen Qun Chen Qun Chen Qun Chen Qun Ming Yang Chen Qun Chen Qun Ming Yang Chen Qun Chen Qun Huawei Technologies Co., Ltd Chen Qun Huawei Technologies Co., Ltd Huawei Technologies Co., Ltd Huawei Technologies Co., Ltd Huawei Technologies Co., Ltd Huawei Technologies Co., Ltd Huawei Technologies Co., Ltd - hw/block/fdc: Extract blk_create_empty_drive() - hw/block/fdc: Kludge missing floppy drive to fix CVE-2021-20196 - tests/fdc-test: Add a regression test for CVE-2021-20196 - display/qxl-render: fix race condition in qxl_cursor (CVE-2021-4207) - ui/cursor: fix integer overflow in cursor_alloc (CVE-2021-4206)- vhost-vsock: detach the virqueue element in case of error (CVE-2022-26354) - virtio-net: fix map leaking on error during receive (CVE-2022-26353)- hw/rdma: Fix possible mremap overflow in the pvrdma device (CVE-2021-3582) - pvrdma: Ensure correct input on ring init (CVE-2021-3607) - pvrdma: Fix the ring init error flow (CVE-2021-3608)- hw/scsi/scsi-disk: MODE_PAGE_ALLS not allowed in MODE SELECT commands(fix CVE-2021-3930)- virtio-balloon: apply upstream patch.- fix cve-2021-3592 cve-2021-3593 cve-2021-3595- virtio-net: fix use after unmap/free for sg- uas: add stream number sanity checks.- hw/arm/virt: Init PMU for hotplugged vCPU- usbredir: fix free call- add qemu-block-curl package - add qemu-block-curl requirement for qemu.- x86: Intel AVX512_BF16 feature enabling - i386: Add MSR feature bit for MDS-NO - i386: Add macro for stibp - i386: Add new CPU model Cooperlake - target/i386: Add new bit definitions of MSR_IA32_ARCH_CAPABILITIES - target/i386: Add missed security features to Cooperlake CPU model - target/i386: add PSCHANGE_NO bit for the ARCH_CAPABILITIES MSR - target/i386: Export TAA_NO bit to guests- hw/net/rocker_of_dpa: fix double free bug of rocker device- fix cve-2020-35504 esp: always check current_req is not NULL before use in DMA callbacks - fix cve-2020-35505 esp: ensure cmdfifo is not empty and current_dev is non-NULL- ide: ahci: add check to avoid null dereference (CVE-2019-12067) - hw/intc/arm_gic: Fix interrupt ID in GICD_SGIR register - usb: limit combined packets to 1 MiB (CVE-2021-3527)- vhost-user-gpu: fix resource leak in 'vg_resource_create_2d' (CVE-2021-3544) - vhost-user-gpu: fix memory leak in vg_resource_attach_backing (CVE-2021-3544) - vhost-user-gpu: fix memory leak while calling 'vg_resource_unref' (CVE-2021-3544) - vhost-user-gpu: fix memory leak in 'virgl_cmd_resource_unref' (CVE-2021-3544) - vhost-user-gpu: fix memory leak in 'virgl_resource_attach_backing' (CVE-2021-3544) - vhost-user-gpu: fix memory disclosure in virgl_cmd_get_capset_info (CVE-2021-3545) - vhost-user-gpu: fix OOB write in 'virgl_cmd_get_capset' (CVE-2021-3546)- 9pfs: Fully restart unreclaim loop (CVE-2021-20181)- bugfix: fix Uninitialized Free Vulnerability- hw/pci-host: add pci-intack write method - pci-host: add pcie-msi read method - vfio: add quirk device write method - prep: add ppc-parity write method - nvram: add nrf51_soc flash read method - spapr_pci: add spapr msi read method - tz-ppc: add dummy read/write methods - imx7-ccm: add digprog mmio write method- add strip for block-iscsi.so, block-rbd.so and block-ssh.so.- scsi: mptsas: dequeue request object in case of an error- net: introduce qemu_receive_packet() - e1000: switch to use qemu_receive_packet() for loopback - dp8393x: switch to use qemu_receive_packet() for loopback packet - sungem: switch to use qemu_receive_packet() for loopback - tx_pkt: switch to use qemu_receive_packet_iov() for loopback - rtl8139: switch to use qemu_receive_packet() for loopback - pcnet: switch to use qemu_receive_packet() for loopback - cadence_gem: switch to use qemu_receive_packet() for loopback - lan9118: switch to use qemu_receive_packet() for loopback- add qemu-block-iscsi requirement for qemu.- hw/sd: sdhci: Don't transfer any data when command time out - hw/sd: sdhci: Don't write to SDHC_SYSAD register when transfer is in progress - hw/sd: sdhci: Correctly set the controller status for ADMA - hw/sd: sdhci: Limit block size only when SDHC_BLKSIZE register is writable - hw/sd: sdhci: Reset the data pointer of s->fifo_buffer[] when a different block size is programmed- scsi-bus: Refactor the code that retries requests - scsi-disk: Add support for retry on errors - qapi/block-core: Add retry option for error action - block-backend: Introduce retry timer - block-backend: Add device specific retry callback - block-backend: Enable retry action on errors - block-backend: Add timeout support for retry - block: Add error retry param setting - virtio-blk: Refactor the code that processes queued requests - virtio-blk: On restart, process queued requests in the proper context - virtio_blk: Add support for retry on errors - block-backend: Stop retrying when draining - block: Add sanity check when setting retry parameters- add qemu-block-rbd package - add qemu-block-ssh package- net: vmxnet3: validate configuration values during activate (CVE-2021-20203)- ide:atapi: check io_buffer_index in ide_atapi_cmd_reply_end- ati: use vga_read_byte in ati_cursor_define - sd: sdhci: assert data_count is within fifo_buffer - msix: add valid.accepts methods to check address- reorder changelog- memory: clamp cached translation in case it points to an MMIO region- target/arm: Fix write redundant values to kvm- hw: usb: hcd-ohci: check for processed TD before retire - hw: ehci: check return value of 'usb_packet_map' - hw: usb: hcd-ohci: check len and frame_number variables - hw/net/e1000e: advance desc_offset in case of null descriptorobs-worker-backend-test-x86-0005 16547594792:4.1.0-63.oe12:4.1.0-63.oe1block-curl.so/usr/lib64/qemu/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/openEuler/openEuler-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:20.03:LTS:SP1:gpgcheck/standard_x86_64/8000552446a684e24359b7f0c42de482-qemu-4.1.0-63cpioxz2x86_64-openEuler-linux-gnuELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=4106b906f53357b9d85c14971a94bb165f42717d, strippedtCfElutf-8cd6562fc7b3fa18309d4103da3a36b06caa4c41960ce63c410d6f226a2abfd34?07zXZ !#,c"F] b2u Q{LT..2;3=E3i%(n!Ko |akJꧨv7U{JSۼy9H$.*-9eOa\EXp2C8>E@|9:r̓} Lű j>l$_$KS( Olnّ-7u4* &+s5al ՝XQf*>50wc028ﮤ*?]x~V3h춘^I1 7ks@^hSJzLE11PaW 49#Mӂm<(ۨ69kY(hWu4#~Og#||}!Poi0t>U yWw=*4l-?SM;wiK0XAY@Џ]g{}s?0ʉB-e2MaKSg `T?MJ L*c~pX Lʇi3LxE56÷;0 ,I04h`8A7L?{Dr\ _ܹ LÎ%sԲ0+T]r5&[1C!%̨!/?4_ofh]a-BZATy鏂 O ]@hݳ 8F.*)W=stT3틤{UCA^Toin9PQ;2ؘwdoɕ/cB`_Ǣr|"h.fc <|"D?j1E>U0¹'ypzY؉>{V⎣k͂H݃v!_)҃'hڐ-haWs0>xv 1a.UNco˹%RSKy!g6V˰WEP;]ʔ`ZweF.˔br.8KAղ|!O7ˢ;^aq8-:9[E΄Jm_u9[jJ!B)&|{UD& Z"x[a]’Pj2s >-V =D*0͟x Tvfb0O2#ѱF?"׌ӯ3^C^5#8Y֩ͩJ*VI.p?[w&E䭮= xftI6ћq1z:H$E:i<5?r-I?3 !3th%hx5BԠ|cv*FGPH5J(OZV_ AK "3ۓ\V7:K'y16rٺOY>*ɅXAIvХj2nR'^ q-Jw!ZF$?j]?/8Fp%` huhq#S-jW[Tmw-%# f0N[>O$/Auei_xnhœF .6?FK],M5 MAr@$I֫JsE# ?l3GvK@eb_}-”8|d"mx,/,@ISh]=o[&1 ұڄ&(xvT͠اyM~ƀID-MlG 3,k>H9C.;RxSlW%Fkv8ʁpR/jyC!Z3j}t Q:ʳY\zj6of?XCCjK9֣yG]GCh}&[!RFH=Dyx|tAeYc:,*7; <dt]ЄJI,7f,)6ŃDQ`;ˡP .q(@Ff6w# ~CWN8ddK`qΈ Ѵ_:MNdhˢ%EY[Ռ> rs*|n=Xz ~tG4X/ZFumr*Tjft7e\ o<4/}'gI!C䫙DvcOMC*cd8{)H9CKOt5^iq,{("deF&U7o9]h2Xt x[}@cV Lq>bM6zOIk4?N=|JBzL! %Rjm#V}C*YZ-VvS)kKCI$jQpJ[wN>huT b+ ̔ꯎML Un>T*p<J4\ ث -h*_;%Ae )20vPc7 O=bΒ9~%zHT`U.Q.]楓D6jP S?xMr|gj5HL42~Ռdӂ }uӁ;fZ&aÒd3,?ˤ;@mb% Z8UDi-Y֟eknTڕ1D{,#R,0HyrǠS Dr&] x33jûd+~fj=H)CՅ"uαIDPdg/Qֆz*U8snH&fЕa0Hp\d5Rt䷑aQ]gAR-B8M/DɎ+KzzdD03@ IcNduԟvkGC#f#,ѢH>8{AVd O2dn9_6sN@m_ #)n]y1BSse[%#{zs jVwX9f@ ޤġ#Onb,g44.˙.>LGbLFĎ):a5$T~xA+'G9, ݂ ZjR_촂[ 㓟瓗upjI'$['OfGv /f.Z[%%пި ,y쁆{ zecv-f}4(S Hvm +?r ! $8?#ܳmRƣqP f CP,*]Eܼ謁zgyvliH6;E$d9G 3l$)AY;74(ك㴥`V[ygnW%]j#Te/V?> y:hXI@2!kJxķu2&ij qvv |E)eCF8r+Rmi-? u}c?~_ߍIs^*eNŴʱ!Nu²#rܥsU4ŅnrV(g$cw/wNZϴIY !c%0^3ޕJbfo뱐U=%krpjc jO%ySv2u{ި;PuՃr|H~haJH׉fcVxv)au#-*W-&zLC2~_(ߘ*8Bՠ)I?yAch̡2&(܇V(VշCQHSnB 1H!ծZ6ASJU.E㾉ŕdBy]˧FM"tTՠ$>KssV>mhP lk0'4o$zA8_OvǙ4Ÿ10.Ŧ_ :h7XUF )4 7 |-n_+b>K-S'b.'ٵ*cj EDZmex*uʅ֩vir/醘Q=Q[HkQ~] m쐟y}9ZZBcӥ+O=4քK4R](U;N7~@#@_3QUe 1P 6/;1Epk `K/p{ڪ?fΫ_b7waGB+CBf=kllJA‡oAsle>yƧdFV ,Sv~FĮB6\-UK92O.gf:aZ~,@fk FB9X`d状Ȋ]L'zQ&X$9.Z᯽j 7ms4ҡިl'ӓD{0}FH&y^d)aVUSaDsI0KW!$vZ20Kvh)&Nk=}\9-8ۊ`.i BaS~FxB;JϣDq(SoaqVslF2j8d_VsLlO]v$>ZaWZ0Hx܄*i35hٝT뽰VDNwlƦomx4=*LaJ *mx|iB%,a%Ohp]J݌ISl@י'߇6 3LJUϵ85CVŘlzAf$?8_D|9/X:F%c@:C"aP3\PuK:f!Pc]8UKqnwJ",JvҮK̂`opY{fb}9[nU u_6kEVp1T(6dCLۡ`~{6@|󄪜2Qzf}YcL~&3mQ~^1mpi=\eO}i567ZeX$Krlh9r|P汔PA^_yGՃ~-Fs$iv4u60l6~KvV}7Y>#X>jBmw5D8 yCg;D( #+|RE BcOOta[Ƅ̼WP3}#5/_QCLy 8K..IQ?%W^AI};{BQA :\_ËFvmxF 2F~lq !}drj 2?[طJ tsAU1M埦@ж'?9~%m':ѥ$?@`)d}Wuh_uhO A6dBfsᮛzV]]FKhe{xDp> >_چggPa0(F ӓFn4y )6uyrX jo14l\Q1Kof!Tz)cyU Py k0UKȌ[Z8 fZ( T"`Ŗc:$p6 4vsw+ި\nϯ23JR.lL"{Nzll s jr shPir!q)|$ ϴҚw\Q>GD_ d%Ԧ C-ڴ$V rRYu"OPͥ4 *nx?]JNqPcjH2>t4v0_[j $w-ا^Ӿ2WՎ.heC|e_ C,&ɋsrmج9#ʢH>4c!89bWiΙ-B$@ݰ%Xk %p'=(Ѹn ":UQK]Fo^h2w8ap.y,B>1@1ܟ~5M87z$kBk4GB2s9 [%VCʚuvStMh2o!Tt[UqcJ(ЩK&)=K9x͂eX)iL{(-6BR MhK;_ 5OHy>ȇYb_WN_%SE#W8Huh!Ψ7