qemu-block-curl-10:4.1.0-76.oe1 >  A cvW^^fc0r&jcUlynݦ Tg:h/˜3 . 5e6 å'9d(S?"WO/m{`F8;6=HzQow 4x#h5F,S;fDp=%DaH+۝ʟc $MpT ʍH蛎M$pVUpp0{Z`SLk>jDb{zБ}6?'0D ӭ*wt\'JEřyy8住0L䫰)}[;m)ߺ_QܡG "i RZ?pS%&Z1DKTm };Bk @Cmd>p=(?(d  $ 4hl /5<@ B D H  S(o8x/94/: /F% G%8H%<I%@X%DY%L\%l]%p^%~b%c&d&e&f&l&t'u'v'z''''(Cqemu-block-curl4.1.076.oe1 Qemu-block-curlThis package provides block-curl support for Qemucobs-worker-backend-test-x86-0006XopenEuler:20.03:LTS:SP3 / standard_x86_64http://openeuler.orgGPLv2 and BSD and MIT and CC-BY-SA-4.0http://openeuler.orgUnspecifiedhttp://www.qemu.orglinuxx86_64Xc028eea47dd2360896c259c386c378bb3239678c1c6a69fd912b505552d8181b29rootrootqemu-4.1.0-76.oe1.src.rpmqemu-block-curlqemu-block-curl(x86-64)    rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.15.1c@c6@cc cd@b֜b@bb@bzSbY^@bMbA@aaay?@an@aP`aA@a.aGaS@`t`@`@`Ȗ@`[`r`r`!@`O@``q`q`Y`Y`Y`z`y|@`S@`8`/@`x@`__@__@_м@yezengruan yezengruan yezengruan yezengruan yezengruan yezengruan yezengruan sundongxu yezengruan yezengruan yezengruan yezengruan Jinhao Gao imxcc Chen Qun Chen Qun imxcc Chen Qun Chen Qun imxcc Jiajie Li Chen Qun Chen Qun Chen Qun Chen Qun Chen Qun Chen Qun imxcc Chen Qun Chen Qun Chen Qun Chen Qun Chen Qun Ming Yang Chuan Zheng imxcc Chen Qun Chuan Zheng Huawei Technologies Co., Ltd Chen Qun Huawei Technologies Co., Ltd Huawei Technologies Co., Ltd Huawei Technologies Co., Ltd Huawei Technologies Co., Ltd Huawei Technologies Co., Ltd Huawei Technologies Co., Ltd Huawei Technologies Co., Ltd - fix CVE-2022-4144- hw/display/ati_2d: Fix buffer overflow in ati_2d_blt (CVE-2021-3638)- hw/usb/hcd-xhci: Fix unbounded loop in xhci_ring_chain_length() (CVE-2020-14394)- hw/scsi/lsi53c895a: Do not abort when DMA requested and no data queued - scsi/lsi53c895a: fix use-after-free in lsi_do_msgout (CVE-2022-0216) - scsi/lsi53c895a: really fix use-after-free in lsi_do_msgout (CVE-2022-0216)- Provides qemu-kvm for upgrade- softmmu: Always initialize xlat in address_space_translate_for_iotlb (CVE-2022-35414)- hw/block/fdc: Prevent end-of-track overrun (CVE-2021-3507)- e1000: fail early for evil descriptor - e1000: fix tx re-entrancy problem - hw/sd/sdcard: Do not allow invalid SD card sizes - hw/sd/sdcard: Do not switch to ReceivingData if address is invalid - hw/sd/sdcard: Restrict Class 6 commands to SCSD cards - hw/sd/sdcard: Simplify realize() a bit - hw/sd/sdcard: Update coding style to make checkpatch.pl happy - scsi/qemu-pr-helper: Fix out-of-bounds access to trnptid_list[] - curses: Fixes curses compiling errors. - net/dump.c: Suppress spurious compiler warning - tests: Replace deprecated ASN1 code- hw/intc/arm_gicv3_dist: Rename 64-bit accessors with 'q' suffix - hw/intc/arm_gicv3: Replace mis-used MEMTX_* constants by booleans - hw/intc/arm_gicv3: Check for !MEMTX_OK instead of MEMTX_ERROR (CVE-2021-3750) - net/colo-compare.c: Check that colo-compare is active- hw/block/fdc: Extract blk_create_empty_drive() - hw/block/fdc: Kludge missing floppy drive to fix CVE-2021-20196 - tests/fdc-test: Add a regression test for CVE-2021-20196 - display/qxl-render: fix race condition in qxl_cursor (CVE-2021-4207) - ui/cursor: fix integer overflow in cursor_alloc (CVE-2021-4206)- vhost-vsock: detach the virqueue element in case of error (CVE-2022-26354) - virtio-net: fix map leaking on error during receive (CVE-2022-26353)- hw/rdma: Fix possible mremap overflow in the pvrdma device (CVE-2021-3582) - pvrdma: Ensure correct input on ring init (CVE-2021-3607) - pvrdma: Fix the ring init error flow (CVE-2021-3608)- hw/scsi/scsi-disk: MODE_PAGE_ALLS not allowed in MODE SELECT commands(fix CVE-2021-3930)- add Phytium's CPU models: FT-2000+ and Tengyun-S2500- virtio-balloon: apply upstream patch.- fix cve-2020-35504 - fix cve-2020-35505- fix cve-2021-3592 cve-2021-3593 cve-2021-3595- virtio-net: fix use after unmap/free for sg- uas: add stream number sanity checks.- hw/arm/virt:Init PMU for hotplugged vCPU- add qemu-block-curl package - add qemu-block-curl requirement for qemu.- usbredir: fix free call- x86: Intel AVX512_BF16 feature enabling - i386: Add MSR feature bit for MDS-NO - i386: Add macro for stibp - i386: Add new CPU model Cooperlake - target/i386: Add new bit definitions of MSR_IA32_ARCH_CAPABILITIES - target/i386: Add missed security features to Cooperlake CPU model - target/i386: add PSCHANGE_NO bit for the ARCH_CAPABILITIES MSR - target/i386: Export TAA_NO bit to guests- hw/net/rocker_of_dpa: fix double free bug of rocker device- ide: ahci: add check to avoid null dereference (CVE-2019-12067) - hw/intc/arm_gic: Fix interrupt ID in GICD_SGIR register - usb: limit combined packets to 1 MiB (CVE-2021-3527)- vhost-user-gpu: fix resource leak in 'vg_resource_create_2d' (CVE-2021-3544) - vhost-user-gpu: fix memory leak in vg_resource_attach_backing (CVE-2021-3544) - vhost-user-gpu: fix memory leak while calling 'vg_resource_unref' (CVE-2021-3544) - vhost-user-gpu: fix memory leak in 'virgl_cmd_resource_unref' (CVE-2021-3544) - vhost-user-gpu: fix memory leak in 'virgl_resource_attach_backing' (CVE-2021-3544) - vhost-user-gpu: fix memory disclosure in virgl_cmd_get_capset_info (CVE-2021-3545) - vhost-user-gpu: fix OOB write in 'virgl_cmd_get_capset' (CVE-2021-3546)- 9pfs: Fully restart unreclaim loop (CVE-2021-20181)- add strip for block-iscsi.so, block-rbd.so and block-ssh.so- bugfix: fix Uninitialized Free Vulnerability- hw/pci-host: add pci-intack write method - pci-host: add pcie-msi read method - vfio: add quirk device write method - prep: add ppc-parity write method - nvram: add nrf51_soc flash read method - spapr_pci: add spapr msi read method - tz-ppc: add dummy read/write methods - imx7-ccm: add digprog mmio write method- hw/sd: sdhci: Don't transfer any data when command time out - hw/sd: sdhci: Don't write to SDHC_SYSAD register when transfer is in progress - hw/sd: sdhci: Correctly set the controller status for ADMA - hw/sd: sdhci: Limit block size only when SDHC_BLKSIZE register is writable - hw/sd: sdhci: Reset the data pointer of s->fifo_buffer[] when a different block size is programmed - net: introduce qemu_receive_packet() - e1000: switch to use qemu_receive_packet() for loopback - dp8393x: switch to use qemu_receive_packet() for loopback packet - sungem: switch to use qemu_receive_packet() for loopback - tx_pkt: switch to use qemu_receive_packet_iov() for loopback - rtl8139: switch to use qemu_receive_packet() for loopback - pcnet: switch to use qemu_receive_packet() for loopback - cadence_gem: switch to use qemu_receive_packet() for loopback - lan9118: switch to use qemu_receive_packet() for loopback- scsi: mptsas: dequeue request object in case of an error- arm/cpu: Fixed function undefined error at compile time under arm- add qemu-block-iscsi installing requirement- migration/dirtyrate: add dirtyrate fearure for migration - migration/multifd-tls: add multifd for tls migration- hw/acpi: build smt processor structure to support smt topology - hw/acpi: Use max_cpus instead of cpus when build PPTT- scsi-bus: Refactor the code that retries requests - scsi-disk: Add support for retry on errors - qapi/block-core: Add retry option for error action - block-backend: Introduce retry timer - block-backend: Add device specific retry callback - block-backend: Enable retry action on errors - block-backend: Add timeout support for retry - block: Add error retry param setting - virtio-blk: Refactor the code that processes queued requests - virtio-blk: On restart, process queued requests in the proper context - virtio_blk: Add support for retry on errors - block-backend: Stop retrying when draining - block: Add sanity check when setting retry parameters- dirtyrate: add migration dirtyrate feature- add qemu-block-rbd package - add qemu-block-ssh package- net: vmxnet3: validate configuration values during activate (CVE-2021-20203)- ide:atapi: check io_buffer_index in ide_atapi_cmd_reply_end- ati: use vga_read_byte in ati_cursor_define - sd: sdhci: assert data_count is within fifo_buffer - msix: add valid.accepts methods to check address- reorder the changelog- memory: clamp cached translation in case it points to an MMIO region- slirp: check pkt_len before reading protocol header for fixing CVE-2020-29129 and CVE-2020-29130- hostmem: Fix up free host_nodes list right after visited- target/arm: Fix write redundant values to kvmobs-worker-backend-test-x86-0006 167041838110:4.1.0-76.oe110:4.1.0-76.oe1block-curl.so/usr/lib64/qemu/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:20.03:LTS:SP3/standard_x86_64/dd21418813feeaf4ed130131b8845e8a-qemucpioxz2x86_64-openEuler-linux-gnuELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=5d4831887a7c08a7e7a48e8ac3ca585746bf060c, strippedƬ\)?-Y+ƭutf-8a67de179e43145e99157f0e2c804660645bec1f58401201ac5d1a81757d4fc0c?07zXZ !#,c"G] b2u Q{LUXvjr;oA6Y;2Ûĉ$"m Ws礒ݍ@S`(~XPEGpBt+l^@ pc;&n% #g7pޭ/  -}  d3ο{-R#v^VIR(X|RD+<RY+>ly4G3!A9;!ˍ۸L7 B6Y-b/HSZ27;b?|DJJ?4rMeބ0GyP2~ڽ\ p**+˗$JڳC6ɨc8Do>Ou_Kh{H9ѩ!2k̨5jyK W:=%n!:]A >x2qNhrH >+V]lrz|p*84Ib{h?x[O45FY<Ⱥ-[~f pןB[2ak!$r# sAhc2(eI*B-;d!v:fN.Fp@ChZW,q'g͉rrlcPJ3ι` )ķ{g}(1cYKC5޸:ûs8l}}s#`!܊ ; f$XoT?+#y%RI!b|bM""|0GB[y'B&$(V&2'B"T(|}VN;X,YZ4I"s]H@la YÁ-"ZDD3 =w(Qmzr\8nVFc|g@z]dzJyq%2#=f=bM8M6֖.TJ?*Ƴ8PIFǧMWy/ V0|2Olp7QV7ȍV)ˊIaax:hӫ& ~֔6wYtu5gby υl}@(Ze},H~O 0@ގ^UZkz 9uHb.zPߦ 8-X*"Z2&sĒ=I I&4aE-9ÝcY+.o@qf\&*W2~O7nx+.AZR>ܶ`x o-_QD`8}~a8g +[{sZrjh'ԇ<;)%89ȳ6 #}S=xnWP, -;7 t ؊jy C)c=kW+V?W ` KݠMi&؋R]+9:zǧ3 }6u۽`=\}@IyRD\8 $-7O@9 Å3lHwͥqwH.פLu_18c~a_*Lm;*Xt/Wzr}Kr@?d%H0sF`̖~NbU+>{!Gm4+Jd᤯Q><#p?hAp,$dQwe$4h-,߫se-"R v(6%:r}"i|DO2s;?4-x[C% rH?NuP[yZ*kCA{Bbt1-'ܱ= ˊо;h caG{Z6c!z&_0pRB!7/PʭLL`ߤ;6ñnةC#؅c ]ҁ2q1.`b<%d.M3z= 8_SķbrX6J,$pw\F/39&a.n6s^S-c+Eͳ`kɨF)p- Lug&Ze=DF<úJi!]+'( { y7LrV5 &JqJ'aY=ʂWq@vҎ_m$֦(ͯR0U! khw b(?q@ fƜ<:] )Wߒ{a-_o{4XR?W>+2 ? .$?ҐWލ4Qѐiƫ idYثɃuM-O}<<LJ{]w8 :޳bOjSvW^J*[1qShQ[0U6]\կ 5V0*& x#"#+ft <)V_m)̽ ҔȦqA"7Z%Rl|ZawCW:Bۭ&w;&-2@G!Tb5`\5U%m>7[vDFǟǢirLm^xKS Fqh;{;=flHa^|C[}7Ps5 p3"wlu6 /e[> (dLFY[Gjǎf/{nx_vb$ky5N'm>YNj2x7GҐpxݗkHECET˅v%`dn+;#UJ|uRiYm tAH8"(dnqٹNeg}' GF@/CFeʥ +Ѓep]1Z r%4(N+,v4ǡ /sܣ`Mĩc"P>ZҚqsW׵/d6Z>Y÷/ӐƏ|06_ԳGݩD+nvˈ=y @)vN@`XfAD*sNATwTx9x6< z`W][3U 'g*?IcpJ#i0Qj]Jb V3 j·!fS! Qc/0x#2,M } g7hMZTvmnT\)?оlboweQT8HGPJh}G#|s$P1G_q Q/fNRėܾ/=eۣ̓صetإoLk|=#dYP;?T*V: 1hQٴE&2cґs1` _g5P%8ʘ˩VaR[ۡuC 0*@qHoWdwhVD̮MIS,QcV٦IaJA P}\)aDs:Z?tA &TAH[Tkës3EB$iZC±爱hn duS[Q\$ _CBs`uoBAAD"ND:- ױEUpvClJk p?8Ds\b#aS$_WB>W:d ˷S4$W\o֦mq /L+kņ6$׃V`.w.w%M%N ھp]1c(l~E \S Z qMɋN+(O2B+6u\ESD † [۵i6W˥6- zʼnW \ۣT,A/aؒRK QNE99}/ %6^(X!qM^$O.J@ v)qTwX &{A=LGj;r}rOu78~!>fSAWh zM_.[ /kIaQȦܶ̑Dd R^=LR|q'=')C[e蓷Qpsէ͋XYшzL *봸ZRkobNAfz̧io~W>dOa*wny<0WGr:nڌrGAnT,;^[ nZ$^ᄉnmK5(d.K@v cW P" J"jM_K|ʕۗE8ik'pՑ3P8=3`_Fl4_Iј;^ dI{vu70gf#nvr$R*>[sS;y-7a@">]> ҅{~ b|eV~c~?9%*B#˹)dG ,!XK"sp T@&c ?VK  PUD x0r0ON dz}KcM=,'NbX\ҋPƕ=7tX,liսD~,vh;.@X9E7I]y U?m[ H+@xU2> h G-I1]'0Z?:4dz5BHɖ&yQ;^ 9',]*~ U&GBے] kV]fÀZ)D&(dT4٦ŰU "9TעMk 2j~eU?UJ=&ɲˑ)^F׍rXfRڜ j:aDf-$C_V QnW%u"v&?5{wIb} _;ۗ)gz{&5, xh'Ւ ?DMZt 8Lvaoy/xbj&™ͫI~biG԰;OqE<@@GeFvm_Pk٘Eɡt0Gu~nsmZC< f7wS: Zv0<ο-Qg o| O(yt]3\[x7rkQOm_{_9%atUġ4_vJ!$\ Cgf(q}SwZ7-m'uVԧ3i/bK tOXmSr ڼޗ.߹L'}GkWv]JbzҤr'ͩIãR-AN* Ǭym;v)GAЂ0OKf_ tJSWԤ^bT%NB`r=[}o)J|K vn\`KUmAQ`H_Ik~=HPqZ*ma,R%Bu#cH:`3`Y)Oe_?gZ!0Z?iխԇn츨 9y;i/[ qͯ8!coWPaB)6v"*3r.3iL2?)=le-O]/;aVe/ m&_[-($1Ϩaf^:e%'lXկ8]R^J)y Θ ^6&E'}";F#9vj؛ibz7NV1'o0 3mypV_FQ囼XWܟ^ OXQ%~ KvcazQF!:ؒEf !ԼT[?XwjY}}kp[ArDgDqU7(?rK1ߛbuSa˽*8xh7en}9s+nX~0BkMP}ʣy}JKyڅgņd[ȿc"9"8LbaSjcaefB$'O%I9},iHt@U>+͟TELskn#C:I&8RVq҆t? uz9HKíQ%ƪ/vmb.>QO}/\`Ch~&ɖY.%f @K 2Dw YZ