efibootmgr-17-150400.3.2.2<>,*ep9|!S;bX \C2ۋz||g7aUBtD42?J5(qƐ"*AYYz+ͮlf+չpT!xcGg 멷%BXy5`0EJ~dmz=ep’NT"@n g#s`|7fnAi?(p$Q+>>iieXIﹺkB USbO BhcVi6(5U3 }#.NJ>>@?0d   .  9Zk    (  (Ll(89:FGHIX Y\4]T^bCcdqevfyl{uvw@x`yz,Cefibootmgr17150400.3.2.2EFI Boot ManagerThe EFI Boot Manager allows the user to edit the Intel Extensible Firmware Interface (EFI) Boot Manager variables. Additional information about the EFI can be found at .emourvedre~DSUSE Linux Enterprise 15SUSE LLC GPL-2.0-or-laterhttps://www.suse.com/System/Boothttps://github.com/rhinstaller/efibootmgrlinuxppc64le @xFWi A큤A큤eee[e[eeab7901e1c9d20435a3b6106b89b972624a223ef64b2bf9c0acc85e097f7afcddbb9d3df3c1d4c79dc1bfc060b53a2c231cef395dad1331a9bade688daa404c4d95efea867a9eb767887742c191749ab440489f3a43c4d80f85ac184b72594cc9dcc100d4161cc0b7177545ab6e47216f84857cda3843847c792a25289852dcaa6f924795340c04fcb5d89ea8a5624a5f9741bc967dfdaebf453acef03db8dc44a6855607e8b6ad8f7addb3d80e25a402ac001ee4c9fc1e66431e6987a3a5648erootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootefibootmgr-17-150400.3.2.2.src.rpmefibootmgrefibootmgr(ppc-64)@@@@@@@@@@@@    libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libefiboot.so.1()(64bit)libefiboot.so.1(LIBEFIBOOT_1.31)(64bit)libefiboot.so.1(libefiboot.so.0)(64bit)libefivar.so.1()(64bit)libefivar.so.1(LIBEFIVAR_0.24)(64bit)libefivar.so.1(LIBEFIVAR_1.30)(64bit)libefivar.so.1(LIBEFIVAR_1.36)(64bit)libefivar.so.1(libefivar.so.0)(64bit)libpopt.so.0()(64bit)libpopt.so.0(LIBPOPT_0)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3a /ZlY;@XZX@WF@W~W-@U@U(UzU.@Tr@TTSyTPinfo@paolostivanin.comkukuk@suse.demeissner@suse.comrw@suse.commsuchanek@suse.comarvidjaar@gmail.comrw@suse.comglin@suse.comrw@suse.comrw@suse.commpluskal@suse.comrw@suse.comrw@suse.commpluskal@suse.comdmueller@suse.comglin@suse.com- Update to v17: [jsc#SLE-22542] * use efivar's logging facility more (more info in -v2 , -v3, etc) * Various bug fixes * Better -e parsing * fix pkg-config invocation for ldflags * Make efibootmgr use EFIDIR / efibootmgr.efidir like fwupdate does * make --loader default build-time configurable * sanitize set_mirror()/get_mirror() * Add support for parsing loader options as UCS2 * GCC 7 fixes * Don't use -fshort-wchar since we don't run on EFI machines. - Drop 0001-Don-t-use-fshort-wchar-when-building-63.patch (upstreamed) - Drop 0002-Remove-extra-const-keywords-gcc-7-gripes-about.patch (upstreamed) - Drop 0003-Add-support-for-parsing-optional-data-as-ucs2.patch (upstreamed) - Drop MARM-sanitize-set_mirror.diff (upstreamed) - Drop efibootmgr-derhat.diff (upstreamed) - Rebase efibootmgr-delete-multiple.diff- Use %license instead of %doc [bsc#1082318]- forcefully enable PIE- Update to 14 plus upstream fixes. [fate#322108] (0001-Don-t-use-fshort-wchar-when-building-63.patch, 0002-Remove-extra-const-keywords-gcc-7-gripes-about.patch, 0003-Add-support-for-parsing-optional-data-as-ucs2.patch) - Forward port and refresh SLE patches (efibootmgr-derhat.diff, MARM-sanitize-set_mirror.diff efibootmgr-delete-multiple.diff) - Drop upstreamed patches (efibootmgr-check-boot-order.diff, efibootmgr-fix-efivar-0.24.patch, efibootmgr-fix-usage-of-efi_loadopt_path-again.patch, MARM-add-m-and-M-options.diff, MARM-extend-man-for-M-option.diff, MARM-fix-insufficient-validation-check-of-M-option.diff, MARM-introduce-man-for-m-and-M-option.diff)- Build on all archs. There is no reason not to. [boo#1025520] - Depend on new enough efivar. Build fails otherwise.- add efibootmgr-fix-usage-of-efi_loadopt_path-again.patch - fix efibootmgr -v with new efivar (boo#993458)- Add support for Memory Address Range Mirroring. [fate#320999, bsc#987599] (add MARM-add-m-and-M-options.diff, MARM-fix-insufficient-validation-check-of-M-option.diff, MARM-introduce-man-for-m-and-M-option.diff, MARM-extend-man-for-M-option.diff, MARM-sanitize-set_mirror.diff)- Add efibootmgr-fix-efivar-0.24.patch fix the compilation errors caused by the efivar update- Properly latch long to short option for delete. [bsc#945705] (efibootmgr-delete-multiple.diff)- Refresh for SLE12. [bsc#929677] (efibootmgr-gcc-Wall.diff, efibootmgr-delete-multiple.diff)- Update to 0.12 * This release is mostly a maintenance release that uses libefivar's new library API for creating device paths and load options. * Also DHCPv4 network boot entries are now something you can create without knowing an awful lot about ACPI. - Refresh patches efibootmgr-0.11.0-derhat.diff as efibootmgr-derhat.diff efibootmgr-0.11.0-check-boot-order.diff as efibootmgr-check-boot-order.diff - Update project and download url- Allow disk/partition as selector for delete as well. [bsc#870211] (efibootmgr-delete-multiple.diff) - Remove version number from patches. (add efibootmgr-derhat.diff, efibootmgr-fail-visibly.diff, efibootmgr-gcc-Wall.diff, efibootmgr-set_boot_order.diff, efibootmgr-write-unique-id-once.diff; drop efibootmgr-0.6.0-check-boot-order.diff, efibootmgr-0.6.0-delete-by-uuid.diff, efibootmgr-0.6.0-derhat.diff, efibootmgr-0.6.0-fail-visibly.diff, efibootmgr-0.6.0-gcc-Wall.diff, efibootmgr-0.6.0-set_boot_order.diff, efibootmgr-0.6.0-write-unique-id-once.diff) Note: this entry reflects obsoleted, SLE-only changes!- Introduce partition UUID as selector for delete. [bsc#870211] (efibootmgr-0.6.0-delete-by-uuid.diff)- Enable i586 build- efibootmgr-0.6.0-check-boot-order.diff, efibootmgr-0.6.0-derhat.diff: pass source validator check - switch homepage to https://github.com/vathpela/efibootmgr- Update version number to 0.11.0 - Rebase patches (efibootmgr-0.11.0-derhat.diff, efibootmgr-0.11.0-check-boot-order.diff) - Drop efibootmgr-0.6.0-set_boot_order.diff since the data size of the variable is handled properly now - Drop efibootmgr-0.6.0-fail-visibly.diff since err() and warn() are introduced to show more meaningful messages - Drop upstreamed patch (efibootmgr-0.6.0-gcc-Wall.diff, efibootmgr-0.6.0-write-unique-id-once.diff)mourvedre 170479516017-150400.3.2.217-150400.3.2.2efibootdumpefibootmgrefibootmgrREADMEefibootmgrCOPYINGefibootdump.8.gzefibootmgr.8.gz/usr/sbin//usr/share/doc/packages//usr/share/doc/packages/efibootmgr//usr/share/licenses//usr/share/licenses/efibootmgr//usr/share/man/man8/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:32026/SUSE_SLE-15-SP4_Update/b21cfb90fe7b8d6538739e2cb8496957-efibootmgr.SUSE_SLE-15-SP4_Updatedrpmxz5ppc64le-suse-linuxELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, interpreter /lib64/ld64.so.2, BuildID[sha1]=a98f7b2a902baa21431b7a62deb3d102df5ddb42, for GNU/Linux 3.10.0, strippedELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, interpreter /lib64/ld64.so.2, BuildID[sha1]=07450684426eac614122d1e7ddbf072ed361bdba, for GNU/Linux 3.10.0, strippeddirectoryASCII texttroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)troff or preprocessor input, ASCII text, with very long lines (gzip compressed data, max compression, from Unix) RRR RR RRRR RRRRR RRRRRR^9˛._`t϶3utf-87e9fd19b2a26d1ac88c2953cbf7143f1b06b9443981e55813003a72de334b3bb? 7zXZ !t/WV]"k%nZ?.:X^?慓R\V_ٴu8W:zJ~BB{љůLh3ˎMj툶y? Cr4̽2bblʠ]pJn̓eXahپ߰%<=d_U1!KU$Ǒ"w 8% l0͡qDBO(YsZ̙嘋1f>J脔٠= 2x(@z\5Tr<4'^.SyqpS2Em7\6KĪ+ùT*B/+=;Z7aZ6Fjֿ-M^#%{J{I= [<R xgl]O#މnH_aw8J:f T4vM[9_"~W)UvcJhZ$hkKTl\"PV5RJ*ͽ@cY1D)P0qP g/ 32~ ď8MR 5Ѱ+ߚ|=%'3  BjKӻ^.c'RE4ÖB 8 !w _KekvO_˴I0 Sw+L6ێk]5O[^[ՈΦZRsi821|/=xz|O&k鶆N&[nv Q@9ԷAW*t4Bz/xaR˱JP+#i8\g\!j;v݋i .!>NR&s9n1`-ٹ-g7ME-ߋ >ڛ`]iDfRfv?W&ֿx$\GLE\쬆ȎOx#W<>THқaA2͂?JH;88->SK2۪E#w8I }žj+rx֫IyA6 R^- Nkߧg.4'!2@X9D@pcIA6:Svkꧥ7J ><ñ@~ 8 ,P9%jշ.TRV"g'W2WPv~7 +]ŏ[üe#lfD= Ipr H~ȮI"oԆ39}:EӚ5PS(l|X܆|PGә?YLrПqBb qr}=rM0yA1ӱM6 g(dKx r, 2lmw#?*ћZ;tTIpXXH*n;Ֆ{J]<]l;{jGk+6"pHKȘ<܎8Do{EDr aŽeXj8XpW5Ht> [0"o/ %<+)cg mY*P q\Q-%s]E/0.-jȽlà\R? a>U^12+*^t* t(.YRbMJ~|w\;;}Lދ&wK <:~m0T9 YZ