xen-doc-html-4.9.0_08-2.1>t  DH`pYbԸ/=„!h*&֕2=.9MPÎH銻[(]H``I{;;b)FߙLr YU&,$3ºx\nR7%sH'3c%*VG=3jFh rĆC/+ƞJ@ouފ\l-~3\72"T\WV!.S52i@<.ԶDkZg)N=tdcd5ff98bc26fbad6863856bdb302388ef8421d9tYbԸ/=„^ J !! lh)A*Pfs^?5kO78;7 _/>#GXL2[T b3 n7P8Ø`d\ =4k1RP[Tc`7`y3n~,>t wQ9s ӹo&O;AvLe6LfNVK H}R<@s+3`{- =IZdxyfS+ GR(>9h?hd  C 4:DHdH H H H  ,H  HHPHH$u(89:UFYGYHH[HI\8HX\Y\\\H]]H^a bccdVddedfdldudHvewfHxgHzhCxen-doc-html4.9.0_082.1Xen Virtualization: HTML documentationXen is a virtual machine monitor for x86 that supports execution of multiple guest operating systems with unprecedented levels of performance and resource isolation. xen-doc-html contains the online documentation in HTML format. Point your browser at file:/usr/share/doc/packages/xen/html/ Authors: -------- Ian Pratt Yblamb51"SopenSUSE Leap 42.3openSUSEGPL-2.0http://bugs.opensuse.orgDocumentation/HTMLhttp://www.cl.cam.ac.uk/Research/SRG/netos/xen/linuxx86_64o !+K Bj@7V>i?'B W  eR $,76H"y1) <3 " Sz29UAAAA큤A큤A큤A큤A큤A큤A큤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../html/misc/crashdb.txt../html/misc/vtpm-platforms.txt../html/misc/xenpaging.txtrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootxen-4.9.0_08-2.1.src.rpmxen-doc-htmlxen-doc-html(x86-64)   rpmlib(CompressedFileNames)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsLzma)3.0.4-14.0-14.4.6-14.11.2YS@YJ_YI@Y5GY0Y-^Y(Y"YY;@YYY@YtY.X@XQ@X@XۡXg@X@X@X@X @X@X@X@X@XXX@XXXwoXs{@XlXWXRXQ4@XEVX43@X.@X*X lX&X@XX@W@W֘W֘W^@WiW:Wt@W.@W9WW@Wk@Wi,@WbWZWZWZWYZ@WV@WEWBW=W;W3W1@W1@W,@W(W(W(W(W(W#LWVbV(@V3VJVxV'@VV2V͛@VŲ@V`VwVVV=@VV@VHV@VvV%@VV<@V@VS@VV@V^VwVqR@Vn@VXEVUVTQ@VMVMVMVA@V;DV9@V7P@V0V*!@V V@VCVVVf@VqV@UYU@U@UUݪ@U@UnU4@UUK@UU@UU>U@Ux&Un@U\w@U[%UUUPUKSU>$U6;U%@UU@UUU.@TgT-@TT@TZ@TZ@T@TT@T5T@TLTLT~@Tl@Ti@Ta@THT?@T=@T9T5'@T.T*@T*@T)IT @TwTT=@TT@T@T_Tk@S@SSj@Sہ@S@S׌S@S˯@S@S.SSSS\Sh@SS@S[S~@S~@S~@S~@S{CSuSpSl@ShS[SXSI*SE6@S=M@S=M@S=M@S;S:@S5d@S4S)S L@SS@Sc@S SRRRR@R@R@RR3@R3@RR@R>R>RJ@R@R@RlR@RRx@R&RΏ@RTR@R@RG@RG@RRRRRRw@RrF@RfhRe@RL RJ@RIgRB@RB@R-@R%@R @R @R @R @RC@RZ@R@R@R Q@QY@QQQ@Qֵ@Q)@Q@QQQ@Q(@QQ?@QxQ'@QQQ@Q@QIQU@Q@Q~`Q~`Qw@Qq1Qo@QkQkQ]k@QZ@QQQAQAQ=@Q=@Q=@Q9Q8@Q5@Q4Q/FQ$Q#i@Q#i@Q"Q@Q@QEQ@Q @Q @QsQ"@P@PP@PDP@P @P @P @P @PPPP@P@P|@P6@P@PP@PoP)P@P5@P5@P@P@P}L@P{PyWPtPr@Pr@PnPnPnPnPnPiPaP`K@PYPXb@PWPIPG>P?UPseg_reg[] (XSA-187) 57d1569a-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch 57d18642-x86-segment-Bounds-check-accesses-to-emulation-ctxt-seg_reg.patch - bsc#991934 - xen hypervisor crash in csched_acct 57c96df3-credit1-fix-a-race-when-picking-initial-pCPU.patch - Upstream patches from Jan 57c4412b-x86-HVM-add-guarding-logic-for-VMX-specific-code.patch 57c57f73-libxc-correct-max_pfn-calculation-for-saving-domain.patch 57c805bf-x86-levelling-restrict-non-architectural-OSXSAVE-handling.patch 57c805c1-x86-levelling-pass-vcpu-to-ctxt_switch_levelling.patch 57c805c3-x86-levelling-provide-architectural-OSXSAVE-handling.patch 57c82be2-x86-32on64-adjust-call-gate-emulation.patch 57c96e2c-x86-correct-PT_NOTE-file-position.patch 57cfed43-VMX-correct-feature-checks-for-MPX-and-XSAVES.patch- bsc#979002 - add 60-persistent-xvd.rules and helper script also to initrd, add the relevant dracut helper- bnc#953518 - unplug also SCSI disks in qemu-xen-traditional for upstream unplug protocol- bsc#989679 - [pvusb feature] USB device not found when 'virsh detach-device guest usb.xml' 57c93e52-fix-error-in-libxl_device_usbdev_list.patch- bsc#992224 - [HPS Bug] During boot of Xen Hypervisor, Failed to get contiguous memory for DMA from Xen 57ac6316-don-t-restrict-DMA-heap-to-node-0.patch - bsc#978755 - xen uefi systems fail to boot - bsc#983697 - SLES12 SP2 Xen UEFI mode cannot boot 57b71fc5-x86-EFI-don-t-apply-relocations-to-l-2-3-_bootmap.patch - Upstream patch from Jan 57b7447b-dont-permit-guest-to-populate-PoD-pages-for-itself.patch- spec: to stay compatible with the in-tree qemu-xen binary, use /usr/bin/qemu-system-i386 instead of /usr/bin/qemu-system-x86_64 bsc#986164- bsc#970135 - new virtualization project clock test randomly fails on Xen 576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 5769106e-x86-generate-assembler-equates-for-synthesized.patch 57a1e603-x86-time-adjust-local-system-time-initialization.patch 57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch - bsc#991934 - xen hypervisor crash in csched_acct 57973099-have-schedulers-revise-initial-placement.patch 579730e6-remove-buggy-initial-placement-algorithm.patch - bsc#988675 - VUL-0: CVE-2016-6258: xen: x86: Privilege escalation in PV guests (XSA-182) 57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch - bsc#988676 - VUL-0: CVE-2016-6259: xen: x86: Missing SMAP whitelisting in 32-bit exception / event delivery (XSA-183) 57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch - Upstream patches from Jan 57a30261-x86-support-newer-Intel-CPU-models.patch- bsc#985503 - vif-route broken vif-route.patch- bsc#978413 - PV guest upgrade from sles11sp4 to sles12sp2 alpha3 failed on sles11sp4 xen host. pygrub-handle-one-line-menu-entries.patch- bsc#990843 - VUL-1: CVE-2016-6351: xen: qemu: scsi: esp: OOB write access in esp_do_dma CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch- bsc#900418 - Dump cannot be performed on SLES12 XEN 57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch - Upstream patches from Jan 575e9ca0-nested-vmx-Validate-host-VMX-MSRs-before-accessing-them.patch 57640448-xen-sched-use-default-scheduler-upon-an-invalid-sched.patch- fate#319989 - Update to Xen 4.7 FCS xen-4.7.0-testing-src.tar.bz2 - Drop CVE-2014-3672-qemut-xsa180.patch- bsc#954872 - script block-dmmd not working as expected - libxl: error: libxl_dm.c (Additional fixes) block-dmmd- Convert with_stubdom into build_conditional to allow adjusting via prjconf - Convert with_debug into build_conditional to allow adjusting via prjconf- bsc#979002 - add 60-persistent-xvd.rules and helper script to xen-tools-domU to simplify transition to pvops based kernels- Convert with_oxenstored into build_conditional to allow adjusting via prjconf (fate#320836)- bsc#983984 - VUL-0: CVE-2016-5338: xen: qemu: scsi: esp: OOB r/w access while processing ESP_FIFO CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch - bsc#982960 - VUL-0: CVE-2016-5238: xen: qemu: scsi: esp: OOB write when using non-DMA mode in get_cmd CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch- fate#319989 - Update to Xen 4.7 RC5 xen-4.7.0-testing-src.tar.bz2- fate#319989 - Update to Xen 4.7 RC4 xen-4.7.0-testing-src.tar.bz2 - Dropped xen.pkgconfig-4.7.patch xsa164.patch- bsc#981264 - VUL-0: CVE-2014-3672: xen: Unrestricted qemu logging (XSA-180) CVE-2014-3672-qemut-xsa180.patch- bsc#980724 - VUL-0: CVE-2016-4441: Qemu: scsi: esp: OOB write while writing to 's->cmdbuf' in get_cmd CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch - bsc#980716 - VUL-0: CVE-2016-4439: xen: scsi: esp: OOB write while writing to 's->cmdbuf' in esp_reg_write CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch- fate#319989 - Update to Xen 4.7 RC3 xen-4.7.0-testing-src.tar.bz2 - Dropped libxl-remove-cdrom-cachemode.patch x86-PoD-only-reclaim-if-needed.patch gcc6-warnings-as-errors.patch- bsc#954872 - script block-dmmd not working as expected - libxl: error: libxl_dm.c (another modification) block-dmmd- fate#319989 - Update to Xen 4.7 RC2 xen-4.7.0-testing-src.tar.bz2- bsc#961600 - L3: poor performance when Xen HVM domU configured with max memory > current memory x86-PoD-only-reclaim-if-needed.patch- Mark SONAMEs and pkgconfig as xen 4.7 xen.pkgconfig-4.7.patch- bsc#977329 - Xen: Cannot boot HVM guests with empty cdrom libxl-remove-cdrom-cachemode.patch- fate#319989 - Update to Xen 4.7 RC1 xen-4.7.0-testing-src.tar.bz2- fate#316614: set migration constraints from cmdline restore libxl.set-migration-constraints-from-cmdline.patch- Remove obsolete patch for xen-kmp magic_ioport_compat.patch- fate#316613: update to v12 libxl.pvscsi.patch- Update to the latest Xen 4.7 pre-release c2994f86 Drop libxl.migrate-legacy-stream-read.patch- bnc#972756 - Can't migrate HVM guest from SLES12SP1 Xen host to SLES12SP2 Alpha 1 host using xl migrate libxl.migrate-legacy-stream-read.patch- Add patches from proposed upstream series to load BIOS's from the toolstack instead of embedding in hvmloader http://lists.xenproject.org/archives/html/xen-devel/2016-03/msg01626.html 0001-libxc-Rework-extra-module-initialisation.patch, 0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch, 0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch, 0004-firmware-makefile-install-BIOS-blob.patch, 0005-libxl-Load-guest-BIOS-from-file.patch, 0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch, 0007-hvmloader-Grab-the-hvm_start_info-pointer.patch, 0008-hvmloader-Locate-the-BIOS-blob.patch, 0009-hvmloader-Check-modules-whereabouts-in-perform_tests.patch, 0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch, 0011-hvmloader-Load-OVMF-from-modules.patch, 0012-hvmloader-Specific-bios_load-function-required.patch, 0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch, 0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch - Enable support for UEFI on x86_64 using the ovmf-x86_64-ms.bin firmware from qemu-ovmf-x86_64. The firmware is preloaded with Microsoft keys to more closely resemble firmware on real hardware FATE#320490- fate#319989: Update to Xen 4.7 (pre-release) xen-4.7.0-testing-src.tar.bz2 - Dropped: xen-4.6.1-testing-src.tar.bz2 55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch 5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch hotplug-Linux-block-performance-fix.patch set-mtu-from-bridge-for-tap-interface.patch xendomains-libvirtd-conflict.patch xsa154.patch xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa170.patch- Use system SeaBIOS instead of building/installing another one FATE#320638 Dropped files: seabios-dir-remote.tar.bz2 xen-c99-fix.patch xen.build-compare.seabios.patch- spec: drop BuildRequires that were only needed for qemu-xen- bsc#969377 - xen does not build with GCC 6 ipxe-use-rpm-opt-flags.patch gcc6-warnings-as-errors.patch- bsc#969351 - VUL-0: CVE-2016-2841: xen: net: ne2000: infinite loop in ne2000_receive CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch - Drop xsa154-fix.patch- Use system qemu instead of building/installing yet another qemu FATE#320638 - Dropped files qemu-xen-dir-remote.tar.bz2 CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch CVE-2015-4037-qemuu-smb-config-dir-name.patch CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch qemu-xen-enable-spice-support.patch qemu-xen-upstream-qdisk-cache-unsafe.patch tigervnc-long-press.patch xsa162-qemuu.patch- bsc#962321 - VUL-0: CVE-2016-1922: xen: i386: null pointer dereference in vapic_write() CVE-2016-1922-qemuu-i386-null-pointer-dereference-in-vapic_write.patch- bsc#968004 - VUL-0: CVE-2016-2538: xen: usb: integer overflow in remote NDIS control message handling CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch- bsc#954872 - L3: script block-dmmd not working as expected - libxl: error: libxl_dm.c block-dmmd - Update libxl to recognize dmmd and npiv prefix in disk spec xen.libxl.dmmd.patch- bsc#967101 - VUL-0: CVE-2016-2391: xen: usb: multiple eof_timers in ohci module leads to null pointer dereference CVE-2016-2391-qemuu-usb-null-pointer-dereference-in-ohci-module.patch CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch - bsc#967090 - VUL-0: CVE-2016-2392: xen: usb: null pointer dereference in remote NDIS control message handling CVE-2016-2392-qemuu-usb-null-pointer-dereference-in-NDIS-message-handling.patch- Update to Xen Version 4.6.1 xen-4.6.1-testing-src.tar.bz2 - Dropped patches now contained in tarball or unnecessary xen-4.6.0-testing-src.tar.bz2 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 5632129c-free-domain-s-vcpu-array.patch 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 563212e4-xenoprof-free-domain-s-vcpu-array.patch 563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch 56549f24-x86-vPMU-document-as-unsupported.patch 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch xsa155-qemut-qdisk-double-access.patch xsa155-qemut-xenfb.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa159.patch xsa160.patch xsa162-qemut.patch xsa165.patch xsa166.patch xsa167.patch xsa168.patch- bsc#965315 - VUL-0: CVE-2016-2270: xen: x86: inconsistent cachability flags on guest mappings (XSA-154) xsa154.patch - bsc#965317 - VUL-0: CVE-2016-2271: xen: VMX: guest user mode may crash guest with non-canonical RIP (XSA-170) xsa170.patch- bsc#965269 - VUL-1: CVE-2015-8619: xen: stack based OOB write in hmp_sendkey routine CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch- bsc#965156 - VUL-0: CVE-2015-6855: xen: ide: divide by zero issue CVE-2015-6855-qemuu-ide-divide-by-zero-issue.patch - bsc#965112 - VUL-0: CVE-2014-3640: xen: slirp: NULL pointer deref in sosendto() CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch- bsc#964947 - VUL-0: CVE-2015-5278: xen: Infinite loop in ne2000_receive() function CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch - bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch- bsc#964644 - VUL-0: CVE-2013-4533: xen pxa2xx: buffer overrun on incoming migration CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch - bsc#964925 - VUL-0: CVE-2014-0222: xen: qcow1: validate L2 table size to avoid integer overflows CVE-2014-0222-blktap-qcow1-validate-l2-table-size.patch - Dropped CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch- bsc#964415 - VUL-1: CVE-2016-2198: xen: usb: ehci null pointer dereference in ehci_caps_write CVE-2016-2198-qemuu-usb-ehci-null-pointer-dereference-in-ehci_caps_write.patch - bsc#964452 - VUL-0: CVE-2013-4534: xen: openpic: buffer overrun on incoming migration CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch- bsc#963783 - VUL-1: CVE-2016-1981: xen: net: e1000 infinite loop in start_xmit and e1000_receive_iov routines CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch- bsc#962758 - VUL-0: CVE-2013-4539: xen: tsc210x: buffer overrun on invalid state load CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch- bsc#962632 - VUL-0: CVE-2015-1779: xen: vnc: insufficient resource limiting in VNC websockets decoder CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch - bsc#962642 - VUL-0: CVE-2013-4537: xen: ssi-sd: buffer overrun on invalid state load CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch - bsc#962627 - VUL-0: CVE-2014-7815: xen: vnc: insufficient bits_per_pixel from the client sanitization CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch- bsc#962335 - VUL-0: CVE-2013-4538: xen: ssd0323: fix buffer overun on invalid state CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch - bsc#962360 - VUL-0: CVE-2015-7512: xen: net: pcnet: buffer overflow in non-loopback mode CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch- bsc#961692 - VUL-0: CVE-2016-1714: xen: nvram: OOB r/w access in processing firmware configurations CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch- bsc#961358 - VUL-0: CVE-2015-8613: xen: qemu: scsi: stack based buffer overflow in megasas_ctrl_get_info CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch - bsc#961332 - VUL-0: CVE-2016-1568: xen: Qemu: ide: ahci use-after-free vulnerability in aio port commands CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch- bsc#959695 - missing docs for xen xen.spec- bsc#960862 - VUL-0: CVE-2016-1571: xen: VMX: intercept issue with INVLPG on non-canonical address (XSA-168) xsa168.patch - bsc#960861 - VUL-0: CVE-2016-1570: xen: PV superpage functionality missing sanity checks (XSA-167) xsa167.patch - bsc#960836 - VUL-0: CVE-2015-8744: xen: net: vmxnet3: incorrect l2 header validation leads to a crash via assert(2) call CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch- bsc#960707 - VUL-0: CVE-2015-8745: xen: reading IMR registers leads to a crash via assert(2) call CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch - bsc#960726 - VUL-0: CVE-2015-8743: xen: ne2000: OOB memory access in ioport r/w functions CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch- bsc#960093 - VUL-0: CVE-2015-8615: xen: x86: unintentional logging upon guest changing callback method (XSA-169) 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch- Adjust xen-dom0-modules.service to run Before xenstored.service instead of proc-xen.mount to workaround a bug in systemd "design" (bnc#959845)- bsc#959387 - VUL-0: CVE-2015-8568 CVE-2015-8567: xen: qemu: net: vmxnet3: host memory leakage CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch- bsc#957988 - VUL-0: CVE-2015-8550: xen: paravirtualized drivers incautious about shared memory contents (XSA-155) xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemut-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa155-qemut-xenfb.patch - bsc#959006 - VUL-0: CVE-2015-8558: xen: qemu: usb: infinite loop in ehci_advance_state results in DoS CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch - bsc#958918 - VUL-0: CVE-2015-7549: xen: qemu pci: null pointer dereference issue CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch - bsc#958493 - VUL-0: CVE-2015-8504: xen: qemu: ui: vnc: avoid floating point exception CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch - bsc#958007 - VUL-0: CVE-2015-8554: xen: qemu-dm buffer overrun in MSI-X handling (XSA-164) xsa164.patch - bsc#958009 - VUL-0: CVE-2015-8555: xen: information leak in legacy x86 FPU/XMM initialization (XSA-165) xsa165.patch - bsc#958523 - VUL-0: xen: ioreq handling possibly susceptible to multiple read issue (XSA-166) xsa166.patch- bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch - Upstream patches from Jan 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch) 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 56544a57-VMX-fix-adjust-trap-injection.patch 56546ab2-sched-fix-insert_vcpu-locking.patch- bsc#956592 - VUL-0: xen: virtual PMU is unsupported (XSA-163) 56549f24-x86-vPMU-document-as-unsupported.patch - bsc#956408 - VUL-0: CVE-2015-8339, CVE-2015-8340: xen: XENMEM_exchange error handling issues (XSA-159) xsa159.patch - bsc#956409 - VUL-0: CVE-2015-8341: xen: libxl leak of pv kernel and initrd on error (XSA-160) xsa160.patch - bsc#956411 - VUL-0: CVE-2015-7504: xen: heap buffer overflow vulnerability in pcnet emulator (XSA-162) xsa162-qemuu.patch xsa162-qemut.patch - bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142) 5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch- fate#315712: XEN: Use the PVOPS kernel Turn off building the KMPs now that we are using the pvops kernel xen.spec- Upstream patches from Jan 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 5632129c-free-domain-s-vcpu-array.patch (Replaces CVE-2015-7969-xsa149.patch) 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 563212e4-xenoprof-free-domain-s-vcpu-array.patch 563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch) 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch - Dropped 55b0a2db-x86-MSI-track-guest-masking.patch- Use upstream variants of block-iscsi and block-nbd- Remove xenalyze.hg, its part of xen-4.6- Update to Xen Version 4.6.0 xen-4.6.0-testing-src.tar.bz2 mini-os.tar.bz2 blktap2-no-uninit.patch stubdom-have-iovec.patch - Renamed xsa149.patch to CVE-2015-7969-xsa149.patch - Dropped patches now contained in tarball or unnecessary xen-4.5.2-testing-src.tar.bz2 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch 54f4985f-libxl-fix-libvirtd-double-free.patch 55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 551ac326-xentop-add-support-for-qdisk.patch 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch 5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 554cc211-libxl-add-qxl.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch 5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch 5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch 5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch 5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch 5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch 5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch 55b0a218-x86-PCI-CFG-write-intercept.patch 55b0a255-x86-MSI-X-maskall.patch 55b0a283-x86-MSI-X-teardown.patch 55b0a2ab-x86-MSI-X-enable.patch blktapctrl-close-fifos.patch blktapctrl-default-to-ioemu.patch blktapctrl-disable-debug-printf.patch blktap-no-uninit.patch blktap-pv-cdrom.patch build-tapdisk-ioemu.patch ioemu-bdrv-open-CACHE_WB.patch ioemu-blktap-barriers.patch ioemu-blktap-fv-init.patch ioemu-blktap-image-format.patch ioemu-blktap-zero-size.patch libxl.set-migration-constraints-from-cmdline.patch local_attach_support_for_phy.patch pci-attach-fix.patch qemu-xen-upstream-megasas-buildtime.patch tapdisk-ioemu-logfile.patch tapdisk-ioemu-shutdown-fix.patch udev-rules.patch xen.build-compare.ipxe.patch xen.build-compare.mini-os.patch xen.build-compare.smbiosdate.patch xen.build-compare.vgabios.patch xen.build-compare.xen_compile_h.patch xl-coredump-file-location.patch- bsc#954405 - VUL-0: CVE-2015-8104: Xen: guest to host DoS by triggering an infinite loop in microcode via #DB exception - bsc#954018 - VUL-0: CVE-2015-5307: xen: x86: CPU lockup during fault delivery (XSA-156) CVE-2015-5307-xsa156.patch- Update to Xen 4.5.2 xen-4.5.2-testing-src.tar.bz2 - Drop the following xen-4.5.1-testing-src.tar.bz2 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 559bdde5-pull-in-latest-linux-earlycpio.patch 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch 560bd926-credit1-fix-tickling-when-it-happens-from-a-remote-pCPU.patch 560e6d34-x86-p2m-pt-tighten-conditions-of-IOMMU-mapping-updates.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch CVE-2015-4106-xsa131-9.patch CVE-2015-3259-xsa137.patch CVE-2015-7311-xsa142.patch CVE-2015-7835-xsa148.patch xsa139-qemuu.patch xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch xsa151.patch xsa152.patch xsa153-libxl.patch CVE-2015-5154-qemuu-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemuu-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch"- bsc#950704 - CVE-2015-7970 VUL-1: xen: x86: Long latency populate-on-demand operation is not preemptible (XSA-150) 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch- Upstream patches from Jan 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch- bsc#951845 - VUL-0: CVE-2015-7972: xen: x86: populate-on-demand balloon size inaccuracy can crash guests (XSA-153) xsa153-libxl.patch- bsc#950703 - VUL-1: CVE-2015-7969: xen: leak of main per-domain vcpu pointer array (DoS) (XSA-149) xsa149.patch - bsc#950705 - VUL-1: CVE-2015-7969: xen: x86: leak of per-domain profiling-related vcpu pointer array (DoS) (XSA-151) xsa151.patch - bsc#950706 - VUL-0: CVE-2015-7971: xen: x86: some pmu and profiling hypercalls log without rate limiting (XSA-152) xsa152.patch - Dropped 55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch 5604f239-x86-PV-properly-populate-descriptor-tables.patch- bsc#932267 - VUL-1: CVE-2015-4037: qemu,kvm,xen: insecure temporary file use in /net/slirp.c CVE-2015-4037-qemuu-smb-config-dir-name.patch CVE-2015-4037-qemut-smb-config-dir-name.patch - bsc#877642 - VUL-0: CVE-2014-0222: qemu: qcow1: validate L2 table size to avoid integer overflows CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch- bsc#950367 - VUL-0: CVE-2015-7835: xen: x86: Uncontrolled creation of large page mappings by PV guests (XSA-148) CVE-2015-7835-xsa148.patch- bsc#949138 - Setting vcpu affinity under Xen causes libvirtd abort 54f4985f-libxl-fix-libvirtd-double-free.patch- bsc#949046 - Increase %suse_version in SP1 to 1316 xen.spec - Update README.SUSE detailing dom0 ballooning recommendations- bsc#945167 - Running command ’ xl pci-assignable-add 03:10.1’ secondly show errors 55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch - Upstream patches from Jan 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f239-x86-PV-properly-populate-descriptor-tables.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch 560bd926-credit1-fix-tickling-when-it-happens-from-a-remote-pCPU.patch 560e6d34-x86-p2m-pt-tighten-conditions-of-IOMMU-mapping-updates.patch- bsc#941074 - VmError: Device 51728 (vbd) could not be connected. Hotplug scripts not working. hotplug-Linux-block-performance-fix.patch- bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142) CVE-2015-7311-xsa142.patch- bsc#945165 - Xl pci-attach show error with kernel of SLES 12 sp1 pci-attach-fix.patch- bsc#945164 - Xl destroy show error with kernel of SLES 12 sp1 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch- Upstream patches from Jan 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch- bsc#944463 - VUL-0: CVE-2015-5239: qemu-kvm: Integer overflow in vnc_client_read() and protocol_client_msg() CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch - bsc#944697 - VUL-1: CVE-2015-6815: qemu: net: e1000: infinite loop issue CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch- bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch- bsc#907514 - Bus fatal error & sles12 sudden reboot has been observed - bsc#910258 - SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984 - Bus fatal error & sles11-SP4 sudden reboot has been observed - bsc#923967 - Partner-L3: Bus fatal error & sles11-SP3 sudden reboot has been observed 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 55b0a218-x86-PCI-CFG-write-intercept.patch 55b0a255-x86-MSI-X-maskall.patch 55b0a283-x86-MSI-X-teardown.patch 55b0a2ab-x86-MSI-X-enable.patch 55b0a2db-x86-MSI-track-guest-masking.patch - Upstream patches from Jan 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch - Dropped for upstream version x86-MSI-mask.patch x86-MSI-pv-unmask.patch x86-MSI-X-enable.patch x86-MSI-X-maskall.patch x86-MSI-X-teardown.patch x86-pci_cfg_okay.patch x86-PCI-CFG-write-intercept.patch- bsc#939712 - VUL-0: XSA-140: QEMU leak of uninitialized heap memory in rtl8139 device model xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch - bsc#939709 - VUL-0: XSA-139: xen: Use after free in QEMU/Xen block unplug protocol xsa139-qemuu.patch- bsc#937371 - xen vm's running after reboot xendomains-libvirtd-conflict.patch- bsc#938344 - VUL-0: CVE-2015-5154: qemu,kvm,xen: host code execution via IDE subsystem CD-ROM CVE-2015-5154-qemuu-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemuu-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch- Remove xendomains.service from systemd preset file because it conflicts with libvirt-guests.service (bnc#937371) Its up to the admin to run systemctl enable xendomains.service- bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow CVE-2015-3259-xsa137.patch - Upstream patches from Jan 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bdde5-pull-in-latest-linux-earlycpio.patch - Upstream patches from Jan pending review 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch 5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch 5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch 5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch 5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch 5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch x86-MSI-pv-unmask.patch x86-pci_cfg_okay.patch x86-PCI-CFG-write-intercept.patch x86-MSI-X-maskall.patch x86-MSI-X-teardown.patch x86-MSI-X-enable.patch x86-MSI-mask.patch- Adjust more places to use br0 instead of xenbr0- bnc#936516 - xen fails to build with kernel update(4.1.0 from stable) 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch- Update to Xen Version 4.5.1 FCS (fate#315675) xen-4.5.1-testing-src.tar.bz2 - Dropped patches now contained in tarball 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch qemu-MSI-X-enable-maskall.patch qemu-MSI-X-latch-writes.patch x86-MSI-X-guest-mask.patch- Replace 5124efbe-add-qxl-support.patch with the variant that finally made it upstream, 554cc211-libxl-add-qxl.patch- bsc#931627 - VUL-0: CVE-2015-4105: XSA-130: xen: Guest triggerable qemu MSI-X pass-through error messages qemu-MSI-X-latch-writes.patch - bsc#907514 - Bus fatal error & sles12 sudden reboot has been observed - bsc#910258 - SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984 - Bus fatal error & sles11-SP4 sudden reboot has been observed - bsc#923967 - Partner-L3: Bus fatal error & sles11-SP3 sudden reboot has been observed x86-MSI-X-teardown.patch x86-MSI-X-enable.patch x86-MSI-X-guest-mask.patch x86-MSI-X-maskall.patch qemu-MSI-X-enable-maskall.patch - Upstream patches from Jan 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch - Dropped the following patches now contained in the tarball xen-no-array-bounds.patch CVE-2015-4103-xsa128.patch CVE-2015-4104-xsa129.patch CVE-2015-4105-xsa130.patch CVE-2015-4106-xsa131-1.patch CVE-2015-4106-xsa131-2.patch CVE-2015-4106-xsa131-3.patch CVE-2015-4106-xsa131-4.patch CVE-2015-4106-xsa131-5.patch CVE-2015-4106-xsa131-6.patch CVE-2015-4106-xsa131-7.patch CVE-2015-4106-xsa131-8.patch- Update to Xen 4.5.1 RC2 - bsc#931628 - VUL-0: CVE-2015-4106: XSA-131: xen: Unmediated PCI register access in qemu CVE-2015-4106-xsa131-1.patch CVE-2015-4106-xsa131-2.patch CVE-2015-4106-xsa131-3.patch CVE-2015-4106-xsa131-4.patch CVE-2015-4106-xsa131-5.patch CVE-2015-4106-xsa131-6.patch CVE-2015-4106-xsa131-7.patch CVE-2015-4106-xsa131-8.patch CVE-2015-4106-xsa131-9.patch - bsc#931627 - VUL-0: CVE-2015-4105: XSA-130: xen: Guest triggerable qemu MSI-X pass-through error messages CVE-2015-4105-xsa130.patch - bsc#931626 - VUL-0: CVE-2015-4104: XSA-129: xen: PCI MSI mask bits inadvertently exposed to guests CVE-2015-4104-xsa129.patch - bsc#931625 - VUL-0: CVE-2015-4103: XSA-128: xen: Potential unintended writes to host MSI message data field via qemu CVE-2015-4103-xsa128.patch - Upstream patches from Jan 5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch- Add DefaultDependencies=no to xen-dom0-modules.service because it has to run before proc-xen.mount- Update to Xen 4.5.1 RC1- Update blktap-no-uninit.patch to work with gcc-4.5- bsc#927967 - VUL-0: CVE-2015-3340: xen: Information leak through XEN_DOMCTL_gettscinfo (XSA-132) 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch- bnc#929339 - VUL-0: CVE-2015-3456: qemu kvm xen: VENOM qemu floppy driver host code execution CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch- bsc#928783 - Reboot failure; Request backport of upstream Xen patch to 4.5.0, or update pkgs to 4.5.1 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch- bnc#927750 - Avoid errors reported by system-modules-load.service- Add xen-no-array-bounds.patch and blktap-no-uninit.patch to selectively turn errors back to warnings to fix build with GCC 5. - Amend xen.stubdom.newlib.patch to pull in declaration of strcmp to avoid implicit-fortify-decl rpmlint error. - Fix quoting of __SMBIOS_DATE__ in xen.build-compare.smbiosdate.patch.- xentop: Fix memory leak on read failure 551ac326-xentop-add-support-for-qdisk.patch- Dropped xentop-add-support-for-qdisk.patch in favor of upstream version 551ac326-xentop-add-support-for-qdisk.patch- Enable spice support in qemu for x86_64 5124efbe-add-qxl-support.patch qemu-xen-enable-spice-support.patch- Add xen-c99-fix.patch to remove pointless inline specifier on function declarations which break build with a C99 compiler which GCC 5 is by default. (bsc#921994) - Add ipxe-no-error-logical-not-parentheses.patch to supply - Wno-logical-not-parentheses to the ipxe build to fix breakage with GCC 5. (bsc#921994)- bnc#921842 - Xentop doesn't display disk statistics for VMs using qdisks xentop-add-support-for-qdisk.patch- Disable the PIE enablement done for Factory, as the XEN code is not buildable with PIE and it does not make much sense to build the hypervisor code with it.- bnc#918169 - XEN fixes required to work with Kernel 3.19.0 xen.spec- Package xen.changes because its referenced in xen.spec- Update seabios to rel-1.7.5 which is the correct version for Xen 4.5- Update to Xen 4.5.0 FCS- Include systemd presets in 13.2 and older- bnc#897352 - Enable xencommons/xendomains only during fresh install - disable restart on upgrade because the toolstack is not restartable- adjust seabios, vgabios, stubdom and hvmloader build to reduce build-compare noise xen.build-compare.mini-os.patch xen.build-compare.smbiosdate.patch xen.build-compare.ipxe.patch xen.build-compare.vgabios.patch xen.build-compare.seabios.patch xen.build-compare.man.patch- Update to Xen 4.5.0 RC4- Remove xend specific if-up scripts Recording bridge slaves is a generic task which should be handled by generic network code- Use systemd features from upstream requires updated systemd-presets-branding package- Update to Xen 4.5.0 RC3- Set GIT, WGET and FTP to /bin/false- Use new configure features instead of make variables xen.stubdom.newlib.patch- adjust docs and xen build to reduce build-compare noise xen.build-compare.doc_html.patch xen.build-compare.xen_compile_h.patch- Drop trailing B_CNT from XEN_EXTRAVERSION to reduce build-compare noise- Update to Xen 4.5.0 RC2- Update to Xen 4.5.0 RC1 xen-4.5.0-testing-src.tar.bz2 - Remove all patches now contained in the new tarball xen-4.4.1-testing-src.tar.bz2 5315a3bb-x86-don-t-propagate-acpi_skip_timer_override-do-Dom0.patch 5315a43a-x86-ACPI-also-print-address-space-for-PM1x-fields.patch 53299d8f-xenconsole-reset-tty-on-failure.patch 53299d8f-xenconsole-tolerate-tty-errors.patch 5346a7a0-x86-AMD-support-further-feature-masking-MSRs.patch 53563ea4-x86-MSI-drop-workaround-for-insecure-Dom0-kernels.patch 537c9c77-libxc-check-return-values-on-mmap-and-madvise.patch 537cd0b0-hvmloader-also-cover-PCI-MMIO-ranges-above-4G-with-UC-MTRR-ranges.patch 537cd0cc-hvmloader-PA-range-0xfc000000-0xffffffff-should-be-UC.patch 539ebe62-x86-EFI-improve-boot-time-diagnostics.patch 53aac342-x86-HVM-consolidate-and-sanitize-CR4-guest-reserved-bit-determination.patch 53c9151b-Fix-xl-vncviewer-accesses-port-0-by-any-invalid-domid.patch 53d124e7-fix-list_domain_details-check-config-data-length-0.patch 53dba447-x86-ACPI-allow-CMOS-RTC-use-even-when-ACPI-says-there-is-none.patch 53df727b-x86-HVM-extend-LAPIC-shortcuts-around-P2M-lookups.patch 53e8be5f-x86-vHPET-use-rwlock-instead-of-simple-one.patch 53f737b1-VMX-fix-DebugCtl-MSR-clearing.patch 53f7386d-x86-irq-process-softirqs-in-irq-keyhandlers.patch 53fcebab-xen-pass-kernel-initrd-to-qemu.patch 53ff3659-x86-consolidate-boolean-inputs-in-hvm-and-p2m.patch 53ff36ae-x86-hvm-treat-non-insn-fetch-NPF-also-as-read-violations.patch 53ff36d5-x86-mem_event-deliver-gla-fault-EPT-violation-information.patch 53ff3716-x86-ats-Disable-Address-Translation-Services-by-default.patch 53ff3899-x86-NMI-allow-processing-unknown-NMIs-with-watchdog.patch 54005472-EPT-utilize-GLA-GPA-translation-known-for-certain-faults.patch 540effe6-evtchn-check-control-block-exists-when-using-FIFO-based-events.patch 540f2624-x86-idle-add-barriers-to-CLFLUSH-workaround.patch 541825dc-VMX-don-t-leave-x2APIC-MSR-intercepts-disabled.patch 541ad385-x86-suppress-event-check-IPI-to-MWAITing-CPUs.patch 541ad3ca-x86-HVM-batch-vCPU-wakeups.patch 541ad81a-VT-d-suppress-UR-signaling-for-further-desktop-chipsets.patch 54216833-x86-shadow-fix-race-when-sampling-dirty-vram-state.patch 54216882-x86-emulate-check-cpl-for-all-privileged-instructions.patch 542168ae-x86emul-only-emulate-swint-injection-for-real-mode.patch 54228a37-x86-EFI-fix-freeing-of-uninitialized-pointer.patch 5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch 5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch 542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch 542bf997-x86-HVM-properly-bound-x2APIC-MSR-range.patch 54325cc0-x86-MSI-fix-MSI-X-case-of-freeing-IRQ.patch 54325d2f-x86-restore-reserving-of-IO-APIC-pages-in-XENMEM_machine_memory_map-output.patch 54325d95-don-t-allow-Dom0-access-to-IOMMUs-MMIO-pages.patch 54325ecc-AMD-guest_iommu-properly-disable-guest-iommu-support.patch 54325f3c-x86-paging-make-log-dirty-operations-preemptible.patch 54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch CVE-2013-4540-qemu.patch qemu-support-xen-hvm-direct-kernel-boot.patch qemu-xen-upstream-blkif-discard.patch change-vnc-passwd.patch libxc-pass-errno-to-callers-of-xc_domain_save.patch libxl.honor-more-top-level-vfb-options.patch libxl.add-option-for-discard-support-to-xl-disk-conf.patch libxl.introduce-an-option-to-disable-the-non-O_DIRECT-workaround.patch x86-dom-print.patch x86-extra-trap-info.patch tmp_build.patch xl-check-for-libvirt-managed-domain.patch disable-wget-check.patch - Xend/xm is no longer supported and is not part of the upstream code. Remove all xend/xm specific patches, configs, and scripts xen-xmexample.patch bridge-opensuse.patch xmexample.disks xmclone.sh init.xend xend-relocation.sh xend.service xend-relocation-server.fw domUloader.py xmexample.domUloader xmexample.disks bridge-vlan.patch bridge-bonding.patch bridge-record-creation.patch network-nat-open-SuSEfirewall2-FORWARD.patch xend-set-migration-constraints-from-cmdline.patch xen.migrate.tools-xend_move_assert_to_exception_block.patch xend-pvscsi-recognize-also-SCSI-CDROM-devices.patch xend-config.patch xend-max-free-mem.patch xend-hvm-default-pae.patch xend-vif-route-ifup.patch xend-xenapi-console-protocol.patch xend-core-dump-loc.patch xend-xen-api-auth.patch xend-checkpoint-rename.patch xend-xm-save-check-file.patch xend-xm-create-xflag.patch xend-domu-usb-controller.patch xend-devid-or-name.patch xend-migration-domname-fix.patch xend-del_usb_xend_entry.patch xend-xen-domUloader.patch xend-multi-xvdp.patch xend-check_device_status.patch xend-change_home_server.patch xend-minimum-restart-time.patch xend-disable-internal-logrotate.patch xend-config-enable-dump-comment.patch xend-tools-watchdog-support.patch xend-console-port-restore.patch xend-vcpu-affinity-fix.patch xend-migration-bridge-check.patch xend-managed-pci-device.patch xend-hvm-firmware-passthrough.patch xend-cpuinfo-model-name.patch xend-xm-reboot-fix.patch xend-domain-lock.patch xend-domain-lock-sfex.patch xend-32on64-extra-mem.patch xend-hv_extid_compatibility.patch xend-xenpaging.autostart.patch xend-remove-xm-deprecation-warning.patch libxen_permissive.patch tmp-initscript-modprobe.patch init.xendomains xendomains.service xen-watchdog.service xen-updown.sh- bnc#901317 - L3: increase limit domUloader to 32MB domUloader.py- bnc#898772 - SLES 12 RC3 - XEN Host crashes when assigning non-VF device (SR-IOV) to guest 54325cc0-x86-MSI-fix-MSI-X-case-of-freeing-IRQ.patch - bnc#882089 - Windows 2012 R2 fails to boot up with greater than 60 vcpus 54325ecc-AMD-guest_iommu-properly-disable-guest-iommu-support.patch - bnc#826717 - VUL-0: CVE-2013-3495: XSA-59: xen: Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts 541ad81a-VT-d-suppress-UR-signaling-for-further-desktop-chipsets.patch - Upstream patches from Jan 540effe6-evtchn-check-control-block-exists-when-using-FIFO-based-events.patch (Replaces xsa107.patch) 54216833-x86-shadow-fix-race-when-sampling-dirty-vram-state.patch (Replaces xsa104.patch) 54216882-x86-emulate-check-cpl-for-all-privileged-instructions.patch (Replaces xsa105.patch) 542168ae-x86emul-only-emulate-swint-injection-for-real-mode.patch (Replaces xsa106.patch) 54228a37-x86-EFI-fix-freeing-of-uninitialized-pointer.patch 5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch 5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch 542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch 542bf997-x86-HVM-properly-bound-x2APIC-MSR-range.patch (Replaces xsa108.patch) 54325d2f-x86-restore-reserving-of-IO-APIC-pages-in-XENMEM_machine_memory_map-output.patch 54325d95-don-t-allow-Dom0-access-to-IOMMUs-MMIO-pages.patch 54325f3c-x86-paging-make-log-dirty-operations-preemptible.patch (Replaces xsa97.patch) 54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch- restrict requires on grub2-x86_64-xen to x86_64 hosts- bsc#900292 - xl: change default dump directory xl-coredump-file-location.patch- Update xen2libvirt.py to better detect and handle file formats- bnc#889526 - VUL-0: CVE-2014-5146, CVE-2014-5149: xen: XSA-97 Long latency virtual-mmu operations are not preemptible xsa97.patch - bnc#882089 - Windows 2012 R2 fails to boot up with greater than 60 vcpus 541ad385-x86-suppress-event-check-IPI-to-MWAITing-CPUs.patch 541ad3ca-x86-HVM-batch-vCPU-wakeups.patch - Upstream patches from Jan 540f2624-x86-idle-add-barriers-to-CLFLUSH-workaround.patch 541825dc-VMX-don-t-leave-x2APIC-MSR-intercepts-disabled.patch- bnc#897657 - VUL-0: CVE-2014-7188: xen: XSA-108 Improper MSR range used for x2APIC emulation xsa108.patch- bnc#897906 - libxc: check return values on mmap() and madvise() on xc_alloc_hypercall_buffer() 537c9c77-libxc-check-return-values-on-mmap-and-madvise.patch- bnc#897614 - Virtualization/xen: Bug `xen-tools` uninstallable; grub2-x86_64-xen dependency not available xen.spec- More cleanup of README.SUSE- Update xen patch with upstream patch so that latest libvirt patch can work. (bnc#896044) + 53fcebab-xen-pass-kernel-initrd-to-qemu.patch - xen-pass-kernel-initrd-to-qemu.patch- bnc#895804 - VUL-0: CVE-2014-6268: xen: XSA-107: Mishandling of uninitialised FIFO-based event channel control blocks xsa107.patch - bnc#895802 - VUL-0: CVE-2014-7156: xen: XSA-106: Missing privilege level checks in x86 emulation of software interrupts xsa106.patch - bnc#895799 - VUL-0: CVE-2014-7155: xen: XSA-105: Missing privilege level checks in x86 HLT, LGDT, LIDT, and LMSW emulation xsa105.patch - bnc#895798 - VUL-0: CVE-2014-7154: xen: XSA-104: Race condition in HVMOP_track_dirty_vram xsa104.patch- bnc#882405 - Only one key-press event was generated while holding a key before key-release in pv guests through xl vncviewer tigervnc-long-press.patch- Update to Xen Version 4.4.1 FCS xen-4.4.1-testing-src.tar.bz2 - Dropped patches now contained in tarball 53d7b781-x86-cpu-undo-BIOS-CPUID-max_leaf-limit-earlier.patch 53df71c7-lz4-check-for-underruns.patch 53e47d6b-x86_emulate-properly-do-IP-updates-and-other-side-effects.patch- bnc#882089 - Windows 2012 R2 fails to boot up with greater than 60 vcpus 53df727b-x86-HVM-extend-LAPIC-shortcuts-around-P2M-lookups.patch 53e8be5f-x86-vHPET-use-rwlock-instead-of-simple-one.patch 53ff3659-x86-consolidate-boolean-inputs-in-hvm-and-p2m.patch 53ff36ae-x86-hvm-treat-non-insn-fetch-NPF-also-as-read-violations.patch 53ff36d5-x86-mem_event-deliver-gla-fault-EPT-violation-information.patch 54005472-EPT-utilize-GLA-GPA-translation-known-for-certain-faults.patch - Upstream patches from Jan 53f737b1-VMX-fix-DebugCtl-MSR-clearing.patch 53f7386d-x86-irq-process-softirqs-in-irq-keyhandlers.patch 53ff3716-x86-ats-Disable-Address-Translation-Services-by-default.patch 53ff3899-x86-NMI-allow-processing-unknown-NMIs-with-watchdog.patch- bnc#864801 - VUL-0: CVE-2013-4540: qemu: zaurus: buffer overrun on invalid state load CVE-2013-4540-qemu.patch- Update README.SUSE with additional debug help- bnc#883112 - Xen Panic during boot "System without CMOS RTC must be booted from EFI" 53dba447-x86-ACPI-allow-CMOS-RTC-use-even-when-ACPI-says-there-is-none.patch - Upstream patches from Jan 53d7b781-x86-cpu-undo-BIOS-CPUID-max_leaf-limit-earlier.patch 53df71c7-lz4-check-for-underruns.patch 53df727b-x86-HVM-extend-LAPIC-shortcuts-around-P2M-lookups.patch 53e47d6b-x86_emulate-properly-do-IP-updates-and-other-side-effects.patch- Update to Xen Version 4.4.1-rc2 xen-4.4.1-testing-src.tar.bz2 - Dropped the following upstream patches and xen-4.4.0-testing-src.tar.bz2 537b5ede-move-domain-to-cpupool0-before-destroying-it.patch 5327190a-x86-Intel-work-around-Xeon-7400-series-erratum-AAI65.patch 534bdf47-x86-HAP-also-flush-TLB-when-altering-a-present-1G-or-intermediate-entry.patch 535a354b-passthrough-allow-to-suppress-SERR-and-PERR-signaling.patch 53636ebf-x86-fix-guest-CPUID-handling.patch 5347b524-evtchn-eliminate-64k-ports-limitation.patch 53a040c6-page-alloc-scrub-pages-used-by-hypervisor-upon-freeing.patch 53a1990a-IOMMU-prevent-VT-d-device-IOTLB-operations-on-wrong-IOMMU.patch 53732f4f-x86-MCE-bypass-uninitialized-vcpu-in-vMCE-injection.patch 531dc0e2-xmalloc-handle-correctly-page-allocation-when-align-size.patch 5331917d-x86-enforce-preemption-in-HVM_set_mem_access-p2m_set_mem_access.patch 531d8e09-x86-HVM-fix-memory-type-merging-in-epte_get_entry_emt.patch 538ee637-ACPI-Prevent-acpi_table_entries-from-falling-into-a-infinite-loop.patch 535a34eb-VT-d-suppress-UR-signaling-for-server-chipsets.patch 535e31bc-x86-HVM-correct-the-SMEP-logic-for-HVM_CR0_GUEST_RESERVED_BITS.patch 53859956-timers-set-the-deadline-more-accurately.patch 53636978-hvm_set_ioreq_page-releases-wrong-page-in-error-path.patch 535a3516-VT-d-suppress-UR-signaling-for-desktop-chipsets.patch 53cfdcc7-avoid-crash-when-doing-shutdown-with-active-cpupools.patch 5383175e-VT-d-fix-mask-applied-to-DMIBAR-in-desktop-chipset-XSA-59-workaround.patch 531d8e34-x86-HVM-consolidate-passthrough-handling-in-epte_get_entry_emt.patch 532fff53-x86-fix-determination-of-bit-count-for-struct-domain-allocations.patch 5357baff-x86-add-missing-break-in-dom0_pit_access.patch 530c54c3-x86-mce-Reduce-boot-time-logspam.patch 5383167d-ACPI-ERST-fix-table-mapping.patch 5390927f-x86-fix-reboot-shutdown-with-running-HVM-guests.patch 530b27fd-x86-MCE-Fix-race-condition-in-mctelem_reserve.patch 53709b77-Nested-VMX-load-current_vmcs-only-when-it-exists.patch 5396d818-avoid-crash-on-HVM-domain-destroy-with-PCI-passthrough.patch 531d8fd0-kexec-identify-which-cpu-the-kexec-image-is-being-executed-on.patch 5385956b-x86-don-t-use-VA-for-cache-flush-when-also-flushing-TLB.patch 539ec004-x86-mce-don-t-spam-the-console-with-CPUx-Temperature-z.patch 53909259-x86-domctl-two-functional-fixes-to-XEN_DOMCTL_-gs-etvcpuextstate.patch 53859549-AMD-IOMMU-don-t-free-page-table-prematurely.patch 533d413b-x86-mm-fix-checks-against-max_mapped_pfn.patch 535fa503-x86-HVM-restrict-HVMOP_set_mem_type.patch 53271880-VT-d-fix-RMRR-handling.patch 5390917a-VT-d-honor-APEI-firmware-first-mode-in-XSA-59-workaround-code.patch 538dcada-x86-HVM-eliminate-vulnerabilities-from-hvm_inject_msi.patch 53455585-x86-AMD-feature-masking-is-unavailable-on-Fam11.patch 537b5e50-VT-d-apply-quirks-at-device-setup-time-rather-than-only-at-boot.patch 53a199d7-x86-EFI-allow-FPU-XMM-use-in-runtime-service-functions.patch 53cfddaf-x86-mem_event-validate-the-response-vcpu_id-before-acting-on-it.patch 53b16cd4-VT-d-ATS-correct-and-clean-up-dev_invalidate_iotlb.patch 53cfdde4-x86-mem_event-prevent-underflow-of-vcpu-pause-counts.patch 53356c1e-x86-HVM-correct-CPUID-leaf-80000008-handling.patch 534bbd90-x86-nested-HAP-don-t-BUG-on-legitimate-error.patch 530b28c5-x86-MSI-don-t-risk-division-by-zero.patch 5396e805-x86-HVM-refine-SMEP-test-in-HVM_CR4_GUEST_RESERVED_BITS.patch 5370e03b-pygrub-fix-error-handling-if-no-valid-partitions-are-found.patch 5321b257-x86-make-hypercall-preemption-checks-consistent.patch 5321b20b-common-make-hypercall-preemption-checks-consistent.patch 538c338f-x86-amd_ucode-flip-revision-numbers-in-printk.patch 537b5e79-VT-d-extend-error-report-masking-workaround-to-newer-chipsets.patch 531d8db1-x86-hvm-refine-the-judgment-on-IDENT_PT-for-EMT.patch 53b56de1-properly-reference-count-DOMCTL_-un-pausedomain-hypercalls.patch 530b2880-Nested-VMX-update-nested-paging-mode-on-vmexit.patch 533ad1ee-VMX-fix-PAT-value-seen-by-guest.patch 53206661-pygrub-support-linux16-and-initrd16.patch 5315a254-IOMMU-generalize-and-correct-softirq-processing.patch- bnc#820873 - The "long" option doesn't work with "xl list" 53d124e7-fix-list_domain_details-check-config-data-length-0.patch- bnc#888996 - Package 'xen-tool' contains 'SuSE' spelling in a filename and/or SPEC file Renamed README.SuSE -> README.SUSE Modified files: xen.spec, boot.local.xenU, init.pciback xend-config.patch, xend-vif-route-ifup.patch- bnc#882673 - Dom0 memory should enforce a minimum memory size (e.g. dom0_mem=min:512M) xen.spec (Mike Latimer)- Upstream patches from Jan 5347b524-evtchn-eliminate-64k-ports-limitation.patch 53aac342-x86-HVM-consolidate-and-sanitize-CR4-guest-reserved-bit-determination.patch 53b16cd4-VT-d-ATS-correct-and-clean-up-dev_invalidate_iotlb.patch 53b56de1-properly-reference-count-DOMCTL_-un-pausedomain-hypercalls.patch 53cfdcc7-avoid-crash-when-doing-shutdown-with-active-cpupools.patch 53cfddaf-x86-mem_event-validate-the-response-vcpu_id-before-acting-on-it.patch 53cfdde4-x86-mem_event-prevent-underflow-of-vcpu-pause-counts.patch- bnc#886801 - xl vncviewer: The first domu can be accessed by any id 53c9151b-Fix-xl-vncviewer-accesses-port-0-by-any-invalid-domid.patch- Upstream pygrub bug fix 5370e03b-pygrub-fix-error-handling-if-no-valid-partitions-are-found.patch- Fix pygrub to handle old 32 bit VMs pygrub-boot-legacy-sles.patch (Mike Latimer)- Remove xen-vmresync utility. It is an old Platespin Orchestrate utility that should have never been included in the Xen package. Updated xen.spec- Rework xen-destroy utility included in xen-utils bnc#885292 and bnc#886063 Updated xen-utils-0.1.tar.bz2- bnc#886063 - Xen monitor fails (xl list --long output different from xm list --long output) - bnc#885292 - VirtualDomain: pid_status does not know how to check status on SLE12 Re-enable building xen-utils for sle12 and include xen-list and xen-destroy in the xen-tools package for HA. xen.spec- bnc#882127 - Xen kernel panics on booting SLES12 Beta 8 53a199d7-x86-EFI-allow-FPU-XMM-use-in-runtime-service-functions.patch - Upstream patches from Jan 538c338f-x86-amd_ucode-flip-revision-numbers-in-printk.patch 538ee637-ACPI-Prevent-acpi_table_entries-from-falling-into-a-infinite-loop.patch 5390917a-VT-d-honor-APEI-firmware-first-mode-in-XSA-59-workaround-code.patch 53909259-x86-domctl-two-functional-fixes-to-XEN_DOMCTL_-gs-etvcpuextstate.patch 5390927f-x86-fix-reboot-shutdown-with-running-HVM-guests.patch 5396d818-avoid-crash-on-HVM-domain-destroy-with-PCI-passthrough.patch 5396e805-x86-HVM-refine-SMEP-test-in-HVM_CR4_GUEST_RESERVED_BITS.patch 539ebe62-x86-EFI-improve-boot-time-diagnostics.patch 539ec004-x86-mce-don-t-spam-the-console-with-CPUx-Temperature-z.patch 53a040c6-page-alloc-scrub-pages-used-by-hypervisor-upon-freeing.patch (replaces xsa100.patch) 53a1990a-IOMMU-prevent-VT-d-device-IOTLB-operations-on-wrong-IOMMU.patch- Replace 'domUloader' with 'pygrub' when converting or importing Xen domains into libvirt with xen2libvirt. domUloader is no longer provided in xen-tools. Modified: xen2libvirt.py- fate#310956: Support Direct Kernel Boot for FV guests patches would go to upstream: qemu side: qemu-support-xen-hvm-direct-kernel-boot.patch xen side: xen-pass-kernel-initrd-to-qemu.patch- Modify how we check for libvirt managed domains xl-check-for-libvirt-managed-domain.patch- bnc#880751 - VUL-0: xen: Hypervisor heap contents leaked to guests xsa100.patch - bnc#878841 - VUL-0: XSA-96: Xen: Vulnerabilities in HVM MSI injection 538dcada-x86-HVM-eliminate-vulnerabilities-from-hvm_inject_msi.patch - Upstream patches from Jan 537cd0b0-hvmloader-also-cover-PCI-MMIO-ranges-above-4G-with-UC-MTRR-ranges.patch 537cd0cc-hvmloader-PA-range-0xfc000000-0xffffffff-should-be-UC.patch 5383167d-ACPI-ERST-fix-table-mapping.patch 5383175e-VT-d-fix-mask-applied-to-DMIBAR-in-desktop-chipset-XSA-59-workaround.patch 53859549-AMD-IOMMU-don-t-free-page-table-prematurely.patch 5385956b-x86-don-t-use-VA-for-cache-flush-when-also-flushing-TLB.patch 53859956-timers-set-the-deadline-more-accurately.patch- bnc#879425: handle cache=unsafe from libvirt to disable flush in qdisk libxl.add-option-to-disable-disk-cache-flushes-in-qdisk.patch qemu-xen-upstream-qdisk-cache-unsafe.patch- libxl: introduce an option for disabling the non-O_DIRECT workaround recognize direct-io-safe in domU.cfg diskspec libxl.introduce-an-option-to-disable-the-non-O_DIRECT-workaround.patch- fate#316071: add discard support for file backed storage (qdisk) update patch to allow more values in overloaded ->readwrite member- bnc#826717 - VUL-0: CVE-2013-3495: XSA-59: xen: Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts 537b5e50-VT-d-apply-quirks-at-device-setup-time-rather-than-only-at-boot.patch 537b5e79-VT-d-extend-error-report-masking-workaround-to-newer-chipsets.patch - Upstream patches from Jan 53709b77-Nested-VMX-load-current_vmcs-only-when-it-exists.patch 53732f4f-x86-MCE-bypass-uninitialized-vcpu-in-vMCE-injection.patch 537b5ede-move-domain-to-cpupool0-before-destroying-it.patch- Update README.SuSE with information on the toolstack change- fate#316071: add discard support for file backed storage (qdisk) update to recognize option discard/no-discard instead of discard=0,1 to match upstream change- fate#316613: Implement pvscsi in xl/libxl libxl.pvscsi.patch- bnc#875668 - VUL-0: CVE-2014-3124: xen: XSA-92: HVMOP_set_mem_type allows invalid P2M entries to be created 535fa503-x86-HVM-restrict-HVMOP_set_mem_type.patch (replaces xsa92.patch) - bnc#826717 - VUL-0: CVE-2013-3495: XSA-59: xen: Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts 535a34eb-VT-d-suppress-UR-signaling-for-server-chipsets.patch 535a3516-VT-d-suppress-UR-signaling-for-desktop-chipsets.patch - Upstream patches from Jan 535a354b-passthrough-allow-to-suppress-SERR-and-PERR-signaling.patch 535e31bc-x86-HVM-correct-the-SMEP-logic-for-HVM_CR0_GUEST_RESERVED_BITS.patch 53636978-hvm_set_ioreq_page-releases-wrong-page-in-error-path.patch 53636ebf-x86-fix-guest-CPUID-handling.patch- Fix pygrub to handle VM with no grub/menu.lst file. - Don't use /var/run/xend/boot for temporary boot directory pygrub-boot-legacy-sles.patch- When the xl command is used, check to see if the domain being modified is managed by libvirt and print warning if it is. xl-check-for-libvirt-managed-domain.patch- Upstream patches from Jan 53455585-x86-AMD-feature-masking-is-unavailable-on-Fam11.patch 5346a7a0-x86-AMD-support-further-feature-masking-MSRs.patch 534bbd90-x86-nested-HAP-don-t-BUG-on-legitimate-error.patch 534bdf47-x86-HAP-also-flush-TLB-when-altering-a-present-1G-or-intermediate-entry.patch 53563ea4-x86-MSI-drop-workaround-for-insecure-Dom0-kernels.patch 5357baff-x86-add-missing-break-in-dom0_pit_access.patch - XSA-92 xsa92.patch- Add # needssslcertforbuild to use the project's certificate when building in a home project. (bnc#872354)- Upstream patches from Jan 53356c1e-x86-HVM-correct-CPUID-leaf-80000008-handling.patch 533ad1ee-VMX-fix-PAT-value-seen-by-guest.patch 533d413b-x86-mm-fix-checks-against-max_mapped_pfn.patch- bnc#862608 - SLES 11 SP3 vm-install should get RHEL 7 support when released 53206661-pygrub-support-linux16-and-initrd16.patch - Upstream bug fixes 53299d8f-xenconsole-reset-tty-on-failure.patch 53299d8f-xenconsole-tolerate-tty-errors.patch- fix build for armv7l and aarch64- Remove compiletime strings from qemu-upstream qemu-xen-upstream-megasas-buildtime.patch- bnc#871546 - KMPs are not signed in SUSE:SLE-12:GA? xen.spec- Upstream patches from Jan 532fff53-x86-fix-determination-of-bit-count-for-struct-domain-allocations.patch 5331917d-x86-enforce-preemption-in-HVM_set_mem_access-p2m_set_mem_access.patch - Drop xsa89.patch for upstream version (see bnc#867910, 5331917d-x86-enforce...)- bnc#863821 - Xen unable to boot paravirtualized VMs installed with btrfs. Add 'Requires: grub2-x86_64-xen' to xen-tools. - Restore soft links for qemu-system-i386 and qemu-dm - Cleanup inconsistency in which version of qemu-system-i386 is being used (Xen vs qemu-x86). Use only Xen's version. xen.spec- Add conditionals for SLE12 when defining xend and max_cpus xen.spec- Upstream patches from Jan 5321b20b-common-make-hypercall-preemption-checks-consistent.patch 5321b257-x86-make-hypercall-preemption-checks-consistent.patch 53271880-VT-d-fix-RMRR-handling.patch 5327190a-x86-Intel-work-around-Xeon-7400-series-erratum-AAI65.patch - Dropped the following as now part of 5321b257 5310bac3-mm-ensure-useful-progress-in-decrease_reservation.patch- bnc#867910 - VUL-0: EMBARGOED: xen: XSA-89: HVMOP_set_mem_access is not preemptible xsa89.patch - Upstream patches from Jan 530b27fd-x86-MCE-Fix-race-condition-in-mctelem_reserve.patch 530b2880-Nested-VMX-update-nested-paging-mode-on-vmexit.patch 530b28c5-x86-MSI-don-t-risk-division-by-zero.patch 530c54c3-x86-mce-Reduce-boot-time-logspam.patch 5310bac3-mm-ensure-useful-progress-in-decrease_reservation.patch 5315a254-IOMMU-generalize-and-correct-softirq-processing.patch 5315a3bb-x86-don-t-propagate-acpi_skip_timer_override-do-Dom0.patch 5315a43a-x86-ACPI-also-print-address-space-for-PM1x-fields.patch 531d8db1-x86-hvm-refine-the-judgment-on-IDENT_PT-for-EMT.patch 531d8e09-x86-HVM-fix-memory-type-merging-in-epte_get_entry_emt.patch 531d8e34-x86-HVM-consolidate-passthrough-handling-in-epte_get_entry_emt.patch 531d8fd0-kexec-identify-which-cpu-the-kexec-image-is-being-executed-on.patch 531dc0e2-xmalloc-handle-correctly-page-allocation-when-align-size.patch- Add conversion tool for migrating xend/xm managed VMs to libvirt xen2libvirt.py (Jim Fehlig)- Update to Xen 4.4.0 FCS- bnc#865682 - Local attach support for PHY backends using scripts local_attach_support_for_phy.patch- bnc#798770 - Improve multipath support for npiv devices block-npiv block-npiv-common.sh- honor global keymap= option in libxl libxl.honor-more-top-level-vfb-options.patch- Update to c/s 28381 to include libxl fork and event fixes for libvirt xen-4.4.0-testing-src.tar.bz2- bnc#863297: xend/pvscsi: recognize also SCSI CDROM devices xend-pvscsi-recognize-also-SCSI-CDROM-devices.patch- fate#316614: set migration constraints from cmdline fix xl migrate to print the actual error string libxc-pass-errno-to-callers-of-xc_domain_save.patch- Include additional help docs for xl in xen-tools - Apply all patches including those for unpackaged xend xen.spec- fate#316614: set migration constraints from cmdline split existing changes into libxl and xend part added libxl.set-migration-constraints-from-cmdline.patch added xend-set-migration-constraints-from-cmdline.patch removed xen.migrate.tools_add_xm_migrate_--log_progress_option.patch removed xen.migrate.tools_set_number_of_dirty_pages_during_migration.patch removed xen.migrate.tools_set_migration_constraints_from_cmdline.patch- Enable ix86 32bit build for xen-libs to be built to support xen-tools-domU on 32bit VMs and also vhostmd running in 32bit VMs- Enable blktapctrl when qemu-traditional is required to satisfy build dependencies. Remove binaries after build if xend is disabled- update ifarch usage in xen.spec to cover also arm - blktapctrl is used only by xend - fix xend-tools-xend sub pkg handling - default to gcc47 for sles11sp3 builds - remove all latex packages from BuildRequires - aarch64-rename-PSR_MODE_ELxx-to-match-linux-headers.patch- add arch dependent install suffix for /boot/xen files- Set max_cpus==4 for non-x86_64 builds- Update to Xen 4.4.0 RC3 c/s 28321- Add flex and bison to BuildRequires, needed by previous patch- fate#316071: add discard support for file backed storage (qdisk) libxl.add-option-for-discard-support-to-xl-disk-conf.patch- On platforms where xend is still supported don't output a deprecation warning when using xm. xend-remove-xm-deprecation-warning.patch- Changed License to GPL-2.0 (from GPL-2.0+)- Dropped xen-changeset.patch. It is no longer needed.- BuildRequire libfdt1-devel on ARM- fate#311487: remove modprobe.conf files for autoloading of pv-on-hvm files. Rely on core kernel to skip initialization of emulated hardware Handle xen_emul_unplug= from xenlinux based core kernel-default xen_pvonhvm.xen_emul_unplug.patch Dropped xen_pvdrivers.conf- Fix the spec file to build for old distros The xm/xend toolstack will continue to be contained in xen-tools for older openSUSE and sles distros but it will be contained in xend-tools for os13.x- fate#316071: add discard support for file backed storage (qdisk) to qemu-upstream, enabled unconditionally qemu-xen-upstream-blkif-discard.patch- Update to Xen 4.4.0 RC2 c/s 28287- Restore 32bit ix86 support in spec file for kmps and domU tools - Restore a few missing xend patches xend-config-enable-dump-comment.patch xend-tools-watchdog-support.patch xend-vif-route-ifup.patch- fate#315692: XEN: Include Xen version 4.4 in SLES-12 Update to Xen 4.4.0 RC1 c/s 28233 - Drop 32bit support from spec file - Dropped numerous patches now included in the tarball- gcc-32bit pulls in the right gcc bits, so better buildrequire that- Upstream patches from Jan 5281fad4-numa-sched-leave-node-affinity-alone-if-not-in-auto-mode.patch 52820823-nested-SVM-adjust-guest-handling-of-structure-mappings.patch 52820863-VMX-don-t-crash-processing-d-debug-key.patch 5282492f-x86-eliminate-has_arch_mmios.patch 52864df2-credit-Update-other-parameters-when-setting-tslice_ms.patch 52864f30-fix-leaking-of-v-cpu_affinity_saved-on-domain-destruction.patch 5289d225-nested-VMX-don-t-ignore-mapping-errors.patch 528a0eb0-x86-consider-modules-when-cutting-off-memory.patch 528f606c-x86-hvm-reset-TSC-to-0-after-domain-resume-from-S3.patch 528f609c-x86-crash-disable-the-watchdog-NMIs-on-the-crashing-cpu.patch 52932418-x86-xsave-fix-nonlazy-state-handling.patch- bnc#851749 - Xen service file does not call xend properly xend.service- Add missing requires to pciutils package for xend-tools- bnc#851386 - VUL-0: xen: XSA-78: Insufficient TLB flushing in VT-d (iommu) code 528a0e5b-TLB-flushing-in-dma_pte_clear_one.patch- Make -devel package depend on libuuid-devel, since libxl.h includes uuid.h- bnc#849667 - VUL-0: xen: XSA-74: Lock order reversal between page_alloc_lock and mm_rwlock CVE-2013-4553-xsa74.patch - bnc#849665 - VUL-0: CVE-2013-4551: xen: XSA-75: Host crash due to guest VMX instruction execution 52809208-nested-VMX-VMLANUCH-VMRESUME-emulation-must-check-permission-1st.patch - bnc#849668 - VUL-0: xen: XSA-76: Hypercalls exposed to privilege rings 1 and 2 of HVM guests CVE-2013-4554-xsa76.patch - Upstream patches from Jan 52654798-x86-xsave-also-save-restore-XCR0-across-suspend-ACPI-S3.patch 526e43d4-x86-refine-address-validity-checks-before-accessing-page-tables.patch 526f786a-fix-locking-in-cpu_disable_scheduler.patch 5277646c-x86-ACPI-x2APIC-guard-against-out-of-range-ACPI-or-APIC-IDs.patch 5277a134-x86-make-sure-memory-block-is-RAM-before-passing-to-the-allocator.patch 5278f7f9-x86-HVM-32-bit-IN-result-must-be-zero-extended-to-64-bits.patch 527a0a05-call-sched_destroy_domain-before-cpupool_rm_domain.patch 527cb7d2-x86-hvm-fix-restart-of-RTC-periodic-timer-with-vpt_align-1.patch 527cb820-x86-EFI-make-trampoline-allocation-more-flexible.patch 5280aae0-x86-idle-reduce-contention-on-ACPI-register-accesses.patch- bnc#848657 - VUL-0: xen: CVE-2013-4494: XSA-73: Lock order reversal between page allocation and grant table locks 5277639c-gnttab-correct-locking-order-reversal.patch- Update to Xen 4.3.1- domUloader can no longer be used with the xl toolstack to boot sles10. Patch pygrub to get the kernel and initrd from the image. pygrub-boot-legacy-sles.patch- bnc#842515 - VUL-0: CVE-2013-4375: XSA-71: xen: qemu disk backend (qdisk) resource leak CVE-2013-4375-xsa71.patch - bnc#845520 - VUL-0: CVE-2013-4416: xen: ocaml xenstored mishandles oversized message replies CVE-2013-4416-xsa72.patch - Upstream patches from Jan 52496bea-x86-properly-handle-hvm_copy_from_guest_-phys-virt-errors.patch (Replaces CVE-2013-4355-xsa63.patch) 52496c11-x86-mm-shadow-Fix-initialization-of-PV-shadow-L4-tables.patch (Replaces CVE-2013-4356-xsa64.patch) 52496c32-x86-properly-set-up-fbld-emulation-operand-address.patch (Replaces CVE-2013-4361-xsa66.patch) 52497c6c-x86-don-t-blindly-create-L3-tables-for-the-direct-map.patch 524e971b-x86-idle-Fix-get_cpu_idle_time-s-interaction-with-offline-pcpus.patch 524e9762-x86-percpu-Force-INVALID_PERCPU_AREA-to-non-canonical.patch 524e983e-Nested-VMX-check-VMX-capability-before-read-VMX-related-MSRs.patch 524e98b1-Nested-VMX-fix-IA32_VMX_CR4_FIXED1-msr-emulation.patch 524e9dc0-xsm-forbid-PV-guest-console-reads.patch 5256a979-x86-check-segment-descriptor-read-result-in-64-bit-OUTS-emulation.patch 5256be57-libxl-fix-vif-rate-parsing.patch 5256be84-tools-ocaml-fix-erroneous-free-of-cpumap-in-stub_xc_vcpu_getaffinity.patch 5256be92-libxl-fix-out-of-memory-error-handling-in-libxl_list_cpupool.patch 5257a89a-x86-correct-LDT-checks.patch 5257a8e7-x86-add-address-validity-check-to-guest_map_l1e.patch 5257a944-x86-check-for-canonical-address-before-doing-page-walks.patch 525b95f4-scheduler-adjust-internal-locking-interface.patch 525b9617-sched-fix-race-between-sched_move_domain-and-vcpu_wake.patch 525e69e8-credit-unpause-parked-vcpu-before-destroying-it.patch 525faf5e-x86-print-relevant-tail-part-of-filename-for-warnings-and-crashes.patch- Improvements to block-dmmd script bnc#828623- bnc#840196 - L3: MTU size on Dom0 gets reset when booting DomU with e1000 device set-mtu-from-bridge-for-tap-interface.patch- bnc#839596 - VUL-0: CVE-2013-1442: XSA-62: xen: Information leak on AVX and/or LWP capable CPUs 5242a1b5-x86-xsave-initialize-extended-register-state-when-guests-enable-it.patch - bnc#840592 - VUL-0: CVE-2013-4355: XSA-63: xen: Information leaks through I/O instruction emulation CVE-2013-4355-xsa63.patch - bnc#840593 - VUL-0: CVE-2013-4356: XSA-64: xen: Memory accessible by 64-bit PV guests under live migration CVE-2013-4356-xsa64.patch - bnc#841766 - VUL-1: CVE-2013-4361: XSA-66: xen: Information leak through fbld instruction emulation CVE-2013-4361-xsa66.patch - bnc#833796 - L3: Xen: migration broken from xsave-capable to xsave-incapable host 52205e27-x86-xsave-initialization-improvements.patch 522dc0e6-x86-xsave-fix-migration-from-xsave-capable-to-xsave-incapable-host.patch - bnc#839600 - [HP BCS SLES11 Bug]: In HP’s UEFI x86_64 platform and sles11sp3 with xen environment, xen hypervisor will panic on multiple blades nPar. 523172d5-x86-fix-memory-cut-off-when-using-PFN-compression.patch - bnc#833251 - [HP BCS SLES11 Bug]: In HP’s UEFI x86_64 platform and with xen environment, in booting stage ,xen hypervisor will panic. 522d896b-x86-EFI-properly-handle-run-time-memory-regions-outside-the-1-1-map.patch - bnc#834751 - [HP BCS SLES11 Bug]: In xen, “shutdown –y 0 –h” cannot power off system 522d896b-x86-EFI-properly-handle-run-time-memory-regions-outside-the-1-1-map.patch - Upstream patches from Jan 520119fc-xen-conring-Write-to-console-ring-even-if-console-lock-is-busted.patch 520a2705-watchdog-crash-Always-disable-watchdog-in-console_force_unlock.patch 522d8a1f-x86-allow-guest-to-set-clear-MSI-X-mask-bit-try-2.patch 522dc044-xmalloc-make-whole-pages-xfree-clear-the-order-field-ab-used-by-xmalloc.patch 522f2f9f-Nested-VMX-Clear-bit-31-of-IA32_VMX_BASIC-MSR.patch 522f37b2-sched-arinc653-check-for-guest-data-transfer-failures.patch 5231e090-libxc-x86-fix-page-table-creation-for-huge-guests.patch 5231f00c-cpufreq-missing-check-of-copy_from_guest.patch 523304b6-x86-machine_restart-must-not-call-acpi_dmar_reinstate-twice.patch 5239a064-x86-HVM-fix-failure-path-in-hvm_vcpu_initialise.patch 5239a076-VMX-fix-failure-path-in-construct_vmcs.patch 523c0ed4-x86-HVM-properly-handle-wide-MMIO.patch 523c1758-sched_credit-filter-node-affinity-mask-against-online-cpus.patch 523ff393-x86-HVM-linear-address-must-be-canonical-for-the-whole-accessed-range.patch 523ff3e2-x86-HVM-refuse-doing-string-operations-in-certain-situations.patch- Use upstream version of unplugging in PVonHVM guests add 523c1834-unmodified_drivers-enable-unplug-per-default.patch remove disable_emulated_device.patch- fate#315714 - Support pvUSB in Xen HVM guests, add xen-usb.ko- Upstream patches from Jan 521c6d4a-x86-don-t-allow-Dom0-access-to-the-MSI-address-range.patch 521c6d6c-x86-don-t-allow-Dom0-access-to-the-HT-address-range.patch 521c6e23-x86-Intel-add-support-for-Haswell-CPU-models.patch 521db25f-Fix-inactive-timer-list-corruption-on-second-S3-resume.patch 521e1156-x86-AVX-instruction-emulation-fixes.patch 521ef8d9-AMD-IOMMU-add-missing-checks.patch 52205a7d-hvmloader-smbios-Correctly-count-the-number-of-tables-written.patch 52205a90-public-hvm_xs_strings.h-Fix-ABI-regression-for-OEM-SMBios-strings.patch 52205e27-x86-xsave-initialization-improvements.patch 5226020f-xend-handle-extended-PCI-configuration-space-when-saving-state.patch 52260214-xend-fix-file-descriptor-leak-in-pci-utilities.patch 52285317-hvmloader-fix-SeaBIOS-interface.patch- bnc#837585 - xen* pkg update DISables `xencommons` and `xendomains` systemd services xen.spec- remove unneeded patch, autoload is handled by PCI device, without PCI device xen_platform_pci would not work anyway xen.sles11sp1.fate311487.xen_platform_pci.dmistring.patch- Update our xen-3.0.4 version of unplug code in qemu-trad add comments about the usage of the code rename handler function reenable handlers for writing/reading from emulated PCI device- Change unplugging of emulated devices in PVonHVM guests Since 3.0.4 xen-platform-pci.ko triggerd the unplug by writing to the PCI space of the emulated PCI device. 3.3 introduced an official unplug protocol. The option to unplug wit the official protocol is disabled per default. Remove our version and enable the unplug via official protocol- Upstream patches from Jan 51e517e6-AMD-IOMMU-allocate-IRTEs.patch 51e5183f-AMD-IOMMU-untie-remap-and-vector-maps.patch 51e63df6-VMX-fix-interaction-of-APIC-V-and-Viridian-emulation.patch 52146070-ACPI-fix-acpi_os_map_memory.patch 5214d26a-VT-d-warn-about-CFI-being-enabled-by-firmware.patch 5215d094-Nested-VMX-Check-whether-interrupt-is-blocked-by-TPR.patch 5215d0c5-Nested-VMX-Force-check-ISR-when-L2-is-running.patch 5215d135-Nested-VMX-Clear-APIC-v-control-bit-in-vmcs02.patch 5215d2d5-Nested-VMX-Update-APIC-v-RVI-SVI-when-vmexit-to-L1.patch 5215d8b0-Correct-X2-APIC-HVM-emulation.patch - Dropped 520d417d-xen-Add-stdbool.h-workaround-for-BSD.patch- bnc#836239 - SLES 11 SP3 Xen security patch does not automatically update UEFI boot binary xen.spec- Upstream patches from Jan 51d5334e-x86-mm-Ensure-useful-progress-in-alloc_l2_table.patch 51dd155c-adjust-x86-EFI-build.patch 51e63d80-x86-cpuidle-Change-logging-for-unknown-APIC-IDs.patch 51e6540d-x86-don-t-use-destroy_xen_mappings-for-vunmap.patch 51e7963f-x86-time-Update-wallclock-in-shared-info-when-altering-domain-time-offset.patch 51ffd577-fix-off-by-one-mistakes-in-vm_alloc.patch 51ffd5fd-x86-refine-FPU-selector-handling-code-for-XSAVEOPT.patch 520114bb-Nested-VMX-Flush-TLBs-and-Caches-if-paging-mode-changed.patch 520a5504-VMX-add-boot-parameter-to-enable-disable-APIC-v-dynamically.patch 520a24f6-x86-AMD-Fix-nested-svm-crash-due-to-assertion-in-__virt_to_maddr.patch 520a2570-x86-AMD-Inject-GP-instead-of-UD-when-unable-to-map-vmcb.patch 520b4b60-VT-d-protect-against-bogus-information-coming-from-BIOS.patch 520b4bda-x86-MTRR-fix-range-check-in-mtrr_add_page.patch 520cb8b6-x86-time-fix-check-for-negative-time-in-__update_vcpu_system_time.patch 520d417d-xen-Add-stdbool.h-workaround-for-BSD.patch- The xencommons.service file handles the starting of xenstored and xenconsoled. Drop the following services files as unecessary. Update xendomains.service to reflect these changes. xenstored.service xenconsoled.service blktapctrl.service- Add xencommons.service to xendomains.service 'After' tag xendomains.service- Change the default bridge in xl.conf from xenbr0 to just br0 xl-conf-default-bridge.patch - Add network.target to xendomains.service 'After' tag xendomains.service- Spec file cleanups xen.spec - Renamed xend-sysconfig.patch to xencommons-sysconfig.patch- Added support for systemd with the following service files xenstored.service blktapctrl.service xend.service xenconsoled.service xen-watchdog.service xendomains.service xencommons.service- Upstream patches from Jan 51d277a3-x86-don-t-pass-negative-time-to-gtime_to_gtsc-try-2.patch 51d27807-iommu-amd-Fix-logic-for-clearing-the-IOMMU-interrupt-bits.patch 51d27841-iommu-amd-Workaround-for-erratum-787.patch 51daa074-Revert-hvmloader-always-include-HPET-table.patch- Dropped deprecated or unnecessary patches pvdrv-import-shared-info.patch minios-fixups.patch- Update to Xen 4.3.0 FCS- Enable ARM targets for Xen- Update to Xen 4.3.0-rc6- Update to Xen 4.3.0-rc5- Update to Xen 4.3.0-rc4- Fix xen-utils compiler time warnings xen-utils-0.1.tar.bz2- Enable building the KMPs xen.spec- Update to Xen 4.3.0-rc3- bnc#801663 - performance of mirror lvm unsuitable for production block-dmmd- Update to Xen 4.3.0-rc2- The xend toolstack is now deprecated and unsupported. Consolidate all xend and traditional qemu patches into one patch file. Rename '.diff' patches to '.patch' and reoder others. xend-traditional-qemu.patch- Create a xend-tools package for the legacy xend toolstack and traditional qemu files.- Update to Xen 4.3.0-rc1 c/s 27068 Drop all upstream changeset patches now included in 4.3 tarball - Removed the doc-pdf RPM as there are no more PDFs to include since the docs/xen-api sources were dropped.- bnc#818183 - VUL-0: xen: CVE-2013-2007: XSA-51: qga set umask 0077 when daemonizing CVE-2013-2007-xsa51-1.patch CVE-2013-2007-xsa51-2.patch- add lndir to BuildRequires- remove xen.migrate.tools_notify_restore_to_hangup_during_migration_--abort_if_busy.patch It changed migration protocol and upstream wants a different solution- bnc#802221 - fix xenpaging readd xenpaging.qemu.flush-cache.patch- bnc#808269 - Fully Virtualized Windows VM install is failed on Ivy Bridge platforms with Xen kernel 26754-hvm-Improve-APIC-INIT-SIPI-emulation.patch- Upstream patches from Jan 26891-x86-S3-Fix-cpu-pool-scheduling-after-suspend-resume.patch 26930-x86-EFI-fix-runtime-call-status-for-compat-mode-Dom0.patch - Additional fix for bnc#816159 CVE-2013-1918-xsa45-followup.patch- bnc#817068 - Xen guest with >1 sr-iov vf won't start xen-managed-pci-device.patch- Update to Xen 4.2.2 c/s 26064 The following recent security patches are included in the tarball CVE-2013-0151-xsa34.patch (bnc#797285) CVE-2012-6075-xsa41.patch (bnc#797523) CVE-2013-1917-xsa44.patch (bnc#813673) CVE-2013-1919-xsa46.patch (bnc#813675)- Upstream patch from Jan 26902-x86-EFI-pass-boot-services-variable-info-to-runtime-code.patch- bnc#816159 - VUL-0: xen: CVE-2013-1918: XSA-45: Several long latency operations are not preemptible CVE-2013-1918-xsa45-1-vcpu-destroy-pagetables-preemptible.patch CVE-2013-1918-xsa45-2-new-guest-cr3-preemptible.patch CVE-2013-1918-xsa45-3-new-user-base-preemptible.patch CVE-2013-1918-xsa45-4-vcpu-reset-preemptible.patch CVE-2013-1918-xsa45-5-set-info-guest-preemptible.patch CVE-2013-1918-xsa45-6-unpin-preemptible.patch CVE-2013-1918-xsa45-7-mm-error-paths-preemptible.patch - bnc#816163 - VUL-0: xen: CVE-2013-1952: XSA-49: VT-d interrupt remapping source validation flaw for bridges CVE-2013-1952-xsa49.patch- bnc#809662 - can't use pv-grub to start domU (pygrub does work) xen.spec- bnc#814709 - Unable to create XEN virtual machines in SLED 11 SP2 on Kyoto xend-cpuinfo-model-name.patch- bnc#813673 - VUL-0: CVE-2013-1917: xen: Xen PV DoS vulnerability with SYSENTER CVE-2013-1917-xsa44.patch - bnc#813675 - VUL-0: CVE-2013-1919: xen: Several access permission issues with IRQs for unprivileged guests CVE-2013-1919-xsa46.patch - bnc#814059 - VUL-1: xen: qemu-nbd format-guessing due to missing format specification CVE-2013-1922-xsa48.patch - Upstream patches from Jan 26749-x86-reserve-pages-when-SandyBridge-integrated-graphics.patch 26751-x86-EFI-permit-setting-variable-with-non-zero-attributes.patch 26765-hvm-Clean-up-vlapic_reg_write-error-propagation.patch 26770-x86-irq_move_cleanup_interrupt-must-ignore-legacy-vectors.patch 26771-x86-S3-Restore-broken-vcpu-affinity-on-resume.patch 26772-VMX-Always-disable-SMEP-when-guest-is-in-non-paging-mode.patch 26773-x86-mm-shadow-spurious-warning-when-unmapping-xenheap-pages.patch 26774-defer-event-channel-bucket-pointer-store-until-after-XSM-checks.patch 26799-x86-don-t-pass-negative-time-to-gtime_to_gtsc.patch- bnc#813156 - IndentationError in XendCheckpoint.py xend-domain-lock.patch- bnc#797014 - no way to control live migrations - bnc#803712 - after live migration rcu_sched_state detected stalls xen.migrate.tools-xend_move_assert_to_exception_block.patch xen.migrate.tools-libxc_print_stats_if_migration_is_aborted.patch xen.migrate.tools_set_number_of_dirty_pages_during_migration.patch xen.migrate.tools_notify_restore_to_hangup_during_migration_--abort_if_busy.patch- bnc#811764 - XEN (hypervisor or kernel) has a problem with EFI variable services x86-EFI-set-variable-permit-attrs.patch - Upstream patches from Jan 26060-ACPI-ERST-table-size-checks.patch 26692-x86-fully-protect-MSI-X-table-from-PV-guest-accesses.patch 26702-powernow-add-fixups-for-AMD-P-state-figures.patch 26704-x86-MCA-suppress-bank-clearing-for-certain-injected-events.patch (bnc#805579) 26731-AMD-IOMMU-Process-softirqs-while-building-dom0-iommu-mappings.patch 26733-VT-d-Enumerate-IOMMUs-when-listing-capabilities.patch 26734-ACPI-ERST-Name-table-in-otherwise-opaque-error-messages.patch 26736-ACPI-APEI-Unlock-apei_iomaps_lock-on-error-path.patch 26737-ACPI-APEI-Add-apei_exec_run_optional.patch 26742-IOMMU-properly-check-whether-interrupt-remapping-is-enabled.patch 26743-VT-d-deal-with-5500-5520-X58-errata.patch (bnc#801910) 26744-AMD-IOMMU-allow-disabling-only-interrupt-remapping.patch- Load blktap module in xencommons init script. blktap2 doesn't support qcow2, so blktap is needed to support domains with 'tap:qcow2' disk configurations. modified tmp-initscript-modprobe.patch- bnc#809203 - xen.efi isn't signed with SUSE Secure Boot key xen.spec- Fix adding managed PCI device to an inactive domain modified xen-managed-pci-device.patch- bnc#805094 - xen hot plug attach/detach fails modified blktap-pv-cdrom.patch- bnc# 802690 - domain locking can prevent a live migration from completing modified xend-domain-lock.patch- bnc#797014 - no way to control live migrations 26675-tools-xentoollog_update_tty_detection_in_stdiostream_progress.patch xen.migrate.tools-xc_print_messages_from_xc_save_with_xc_report.patch xen.migrate.tools-xc_document_printf_calls_in_xc_restore.patch xen.migrate.tools-xc_rework_xc_save.cswitch_qemu_logdirty.patch xen.migrate.tools_set_migration_constraints_from_cmdline.patch xen.migrate.tools_add_xm_migrate_--log_progress_option.patch- Upstream patches from Jan 26585-x86-mm-Take-the-p2m-lock-even-in-shadow-mode.patch 26595-x86-nhvm-properly-clean-up-after-failure-to-set-up-all-vCPU-s.patch 26601-honor-ACPI-v4-FADT-flags.patch 26656-x86-fix-null-pointer-dereference-in-intel_get_extended_msrs.patch 26659-AMD-IOMMU-erratum-746-workaround.patch 26660-x86-fix-CMCI-injection.patch 26672-vmx-fix-handling-of-NMI-VMEXIT.patch 26673-Avoid-stale-pointer-when-moving-domain-to-another-cpupool.patch 26676-fix-compat-memory-exchange-op-splitting.patch 26677-x86-make-certain-memory-sub-ops-return-valid-values.patch 26678-SEDF-avoid-gathering-vCPU-s-on-pCPU0.patch 26679-x86-defer-processing-events-on-the-NMI-exit-path.patch 26683-credit1-Use-atomic-bit-operations-for-the-flags-structure.patch 26689-fix-domain-unlocking-in-some-xsm-error-paths.patch- fate#313584: pass bios information to XEN HVM guest xend-hvm-firmware-passthrough.patch- bnc#806736: enabling xentrace crashes hypervisor 26686-xentrace_fix_off-by-one_in_calculate_tbuf_size.patch- update xenalyze to revision 149 Make eip_list output more useful Use correct length when copying record into buffer decode PV_HYPERCALL_SUBCALL events decode PV_HYPERCALL_V2 records Analyze populate-on-demand reclamation patterns Handle 64-bit MMIO Also strip write bit when processing a generic event Make the warnigns in hvm_generic_postprocess more informative Don't warn about switching paging levels unless verbosity>=6 Process NPFs as generic for summary purposes Add HVM_EVENT_VLAPIC- Add upstream patch to fix vfb/vkb initialization in libxl 26369-libxl-devid.patch- fate##313584: pass bios information to XEN HVM guest 26554-hvm-firmware-passthrough.patch 26555-hvm-firmware-passthrough.patch 26556-hvm-firmware-passthrough.patch- Upstream patches from Jan 26516-ACPI-parse-table-retval.patch (Replaces CVE-2013-0153-xsa36.patch) 26517-AMD-IOMMU-clear-irtes.patch (Replaces CVE-2013-0153-xsa36.patch) 26518-AMD-IOMMU-disable-if-SATA-combined-mode.patch (Replaces CVE-2013-0153-xsa36.patch) 26519-AMD-IOMMU-perdev-intremap-default.patch (Replaces CVE-2013-0153-xsa36.patch) 26526-pvdrv-no-devinit.patch 26529-gcc48-build-fix.patch 26531-AMD-IOMMU-IVHD-special-missing.patch (Replaces CVE-2013-0153-xsa36.patch) 26532-AMD-IOMMU-phantom-MSI.patch 26536-xenoprof-div-by-0.patch 26576-x86-APICV-migration.patch 26577-x86-APICV-x2APIC.patch 26578-AMD-IOMMU-replace-BUG_ON.patch- bnc#797014 - no way to control live migrations 26547-tools-xc_fix_logic_error_in_stdiostream_progress.patch 26548-tools-xc_handle_tty_output_differently_in_stdiostream_progress.patch 26549-tools-xc_turn_XCFLAGS_*_into_shifts.patch 26550-tools-xc_restore_logging_in_xc_save.patch 26551-tools-xc_log_pid_in_xc_save-xc_restore_output.patch- Set $BRP_PESIGN_FILES in the %install section so that modules are signed in the buildservice (fate#314552).- PVonHVM: __devinit was removed in linux-3.8- Add 'managed' PCI passthrough support to xend, allowing support for the same through libvirt xen-managed-pci-device.patch FATE#313570- Upstream patches from Jan 26287-sched-credit-pick-idle.patch 26340-VT-d-intremap-verify-legacy-bridge.patch (Replaces CVE-2012-5634-xsa33.patch) 26370-libxc-x86-initial-mapping-fit.patch 26395-x86-FPU-context-conditional.patch 26404-x86-forward-both-NMI-kinds.patch 26418-x86-trampoline-consider-multiboot.patch 26427-x86-AMD-enable-WC+.patch 26428-x86-HVM-RTC-update.patch 26440-x86-forward-SERR.patch 26443-ACPI-zap-DMAR.patch 26444-x86-nHVM-no-self-enable.patch (Replaces CVE-2013-0152-xsa35.patch) 26501-VMX-simplify-CR0-update.patch 26502-VMX-disable-SMEP-when-not-paging.patch- bnc#800275 - VUL-0: XSA-36: CVE-2013-0153: xen: interrupt remap entries shared and old ones not cleared on AMD IOMMUs CVE-2013-0153-xsa36.patch- Add # needssslcertforbuild to the specfile, to make the UEFI signing certificate available during build (fate#314511, fate#314552).- bnc#798188 - Add $network to xend initscript dependencies- Add upstream patches to fix libxl bugs. These patches have already been posted for inclusion in xen-4.2-testing. 25912-partial-libxl.patch 26372-tools-paths.patch 26468-libxl-race.patch 26469-libxl-race.patch- bnc#797285 - VUL-0: Xen: XSA-34 (CVE-2013-0151) - nested virtualization on 32-bit exposes host crash CVE-2013-0151-xsa34.patch - bnc#797287 - VUL-0: Xen: XSA-35 (CVE-2013-0152) - Nested HVM exposes host to being driven out of memory by guest CVE-2013-0152-xsa35.patch- bnc#793717 - NetWare will not boot on Xen 4.2 xnloader.py domUloader.py pygrub-netware-xnloader.patch Removed reverse-24757-use-grant-references.patch- bnc#797523 - VUL-1: CVE-2012-6075: qemu / kvm-qemu: e1000 overflows under some conditions CVE-2012-6075-xsa41.patch- Mask the floating point exceptions for guests like NetWare on machines that support XSAVE. x86-fpu-context-conditional.patch- fate##313584: pass bios information to XEN HVM guest 26341-hvm-firmware-passthrough.patch 26342-hvm-firmware-passthrough.patch 26343-hvm-firmware-passthrough.patch 26344-hvm-firmware-passthrough.patch- bnc#787169 - L3: Marvell 88SE9125 disk controller not detecting disk in Xen kernel 26133-IOMMU-defer-BM-disable.patch 26324-IOMMU-assign-params.patch 26325-IOMMU-add-remove-params.patch 26326-VT-d-context-map-params.patch 26327-AMD-IOMMU-flush-params.patch 26328-IOMMU-pdev-type.patch 26329-IOMMU-phantom-dev.patch 26330-VT-d-phantom-MSI.patch 26331-IOMMU-phantom-dev-quirk.patch - Upstream patches from Jan 26294-x86-AMD-Fam15-way-access-filter.patch 26320-IOMMU-domctl-assign-seg.patch 26332-x86-compat-show-guest-stack-mfn.patch 26333-x86-get_page_type-assert.patch- bnc#794316 - VUL-0: CVE-2012-5634: xen: VT-d interrupt remapping source validation flaw (XSA-33) CVE-2012-5634-xsa33.patch- Update to Xen 4.2.1 c/s 25952- Upstream patches from Jan 26195-x86-compat-atp-gmfn-range-cont.patch 26196-ACPI-set-PDC-bits-rc.patch 26200-IOMMU-debug-verbose.patch 26203-x86-HAP-dirty-vram-leak.patch 26229-gnttab-version-switch.patch (Replaces CVE-2012-5510-xsa26.patch) 26230-x86-HVM-limit-batches.patch (Replaces CVE-2012-5511-xsa27.patch) 26231-memory-exchange-checks.patch (Replaces CVE-2012-5513-xsa29.patch) 26232-x86-mark-PoD-error-path.patch (Replaces CVE-2012-5514-xsa30.patch) 26233-memop-order-checks.patch (Replaces CVE-2012-5515-xsa31.patch) 26234-x86-page-from-gfn-pv.patch (Replaces CVE-2012-5525-xsa32.patch) 26235-IOMMU-ATS-max-queue-depth.patch 26252-VMX-nested-rflags.patch 26253-VMX-nested-rdtsc.patch 26254-VMX-nested-dr.patch 26255-VMX-nested-ia32e-mode.patch 26258-VMX-nested-intr-delivery.patch 26260-x86-mmuext-errors.patch 26262-x86-EFI-secure-shim.patch 26266-sched-ratelimit-check.patch 26272-x86-EFI-makefile-cflags-filter.patch- bnc#757525 - domain destroyed on live migration with missing vif on target machine xen-migration-bridge-check.patch- NetWare will not boot or install on Xen 4.2 reverse-24757-use-grant-references.patch- fate#313222 - xenstore-chmod should support 256 permissions 26189-xenstore-chmod.patch- bnc#789945 - VUL-0: CVE-2012-5510: xen: Grant table version switch list corruption vulnerability (XSA-26) CVE-2012-5510-xsa26.patch - bnc#789944 - VUL-0: CVE-2012-5511: xen: Several HVM operations do not validate the range of their inputs (XSA-27) CVE-2012-5511-xsa27.patch - bnc#789951 - VUL-0: CVE-2012-5513: xen: XENMEM_exchange may overwrite hypervisor memory (XSA-29) CVE-2012-5513-xsa29.patch - bnc#789948 - VUL-0: CVE-2012-5514: xen: Missing unlock in guest_physmap_mark_populate_on_demand() (XSA-30) CVE-2012-5514-xsa30.patch - bnc#789950 - VUL-0: CVE-2012-5515: xen: Several memory hypercall operations allow invalid extent order values (XSA-31) CVE-2012-5515-xsa31.patch - bnc#789952 - VUL-0: CVE-2012-5525: xen: Several hypercalls do not validate input GFNs (XSA-32) CVE-2012-5525-xsa32.patch - Upstream patches from Jan 26129-ACPI-BGRT-invalidate.patch 26132-tmem-save-NULL-check.patch 26134-x86-shadow-invlpg-check.patch 26139-cpumap-masking.patch 26148-vcpu-timer-overflow.patch (Replaces CVE-2012-4535-xsa20.patch) 26149-x86-p2m-physmap-error-path.patch (Replaces CVE-2012-4537-xsa22.patch) 26150-x86-shadow-unhook-toplevel-check.patch (Replaces CVE-2012-4538-xsa23.patch) 26151-gnttab-compat-get-status-frames.patch (Replaces CVE-2012-4539-xsa24.patch) 26179-PCI-find-next-cap.patch 26183-x86-HPET-masking.patch 26188-x86-time-scale-asm.patch- remove obsolete pv-driver-build.patch to fix build- Fix build with glibc 2.17: add patch xen-glibc217.patch, fix configure for librt.- bnc#777628 - guest "disappears" after live migration Updated block-dmmd script- Fix exception in balloon.py and osdep.py xen-max-free-mem.diff- fate#311966: Fix XEN VNC implementation to correctly map keyboard layouts VNC-Support-for-ExtendedKeyEvent-client-message.patch- fate#310510 - fix xenpaging restore changes to integrate paging into xm/xend xenpaging.autostart.patch xenpaging.doc.patch- bnc#787163 - VUL-0: CVE-2012-4544: xen: Domain builder Out-of- memory due to malicious kernel/ramdisk (XSA 25) CVE-2012-4544-xsa25.patch - bnc#779212 - VUL-0: CVE-2012-4411: XEN / qemu: guest administrator can access qemu monitor console (XSA-19) CVE-2012-4411-xsa19.patch- bnc#786516 - VUL-0: CVE-2012-4535: xen: Timer overflow DoS vulnerability CVE-2012-4535-xsa20.patch - bnc#786518 - VUL-0: CVE-2012-4536: xen: pirq range check DoS vulnerability CVE-2012-4536-xsa21.patch - bnc#786517 - VUL-0: CVE-2012-4537: xen: Memory mapping failure DoS vulnerability CVE-2012-4537-xsa22.patch - bnc#786519 - VUL-0: CVE-2012-4538: xen: Unhooking empty PAE entries DoS vulnerability CVE-2012-4538-xsa23.patch - bnc#786520 - VUL-0: CVE-2012-4539: xen: Grant table hypercall infinite loop DoS vulnerability CVE-2012-4539-xsa24.patch - bnc#784087 - L3: Xen BUG at io_apic.c:129 26102-x86-IOAPIC-legacy-not-first.patch- Upstream patches from Jan 25920-x86-APICV-enable.patch 25921-x86-APICV-delivery.patch 25922-x86-APICV-x2APIC.patch 25957-x86-TSC-adjust-HVM.patch 25958-x86-TSC-adjust-sr.patch 25959-x86-TSC-adjust-expose.patch 25975-x86-IvyBridge.patch 25984-SVM-nested-paging-mode.patch 26054-x86-AMD-perf-ctr-init.patch 26055-x86-oprof-hvm-mode.patch 26056-page-alloc-flush-filter.patch 26061-x86-oprof-counter-range.patch 26062-ACPI-ERST-move-data.patch 26063-x86-HPET-affinity-lock.patch 26095-SVM-nested-leak.patch 26096-SVM-nested-vmexit-emul.patch 26098-perfc-build.patch- handle possible asprintf failures in log-guest-console.patch- bnc#694863 - kexec fails in xen 26093-hvm_handle_PoD_and_grant_pages_in_HVMOP_get_mem_type.patch- fate#312709: Pygrub needs to know which entry to select 26114-pygrub-list-entries.patch- merge changes fron xen-unstable, obsolete our changes 26077-stubdom_fix_compile_errors_in_grub.patch 26078-hotplug-Linux_remove_hotplug_support_rely_on_udev_instead.patch 26079-hotplug-Linux_close_lockfd_after_lock_attempt.patch 26081-stubdom_fix_rpmlint_warning_spurious-executable-perm.patch 26082-blktap2-libvhd_fix_rpmlint_warning_spurious-executable-perm.patch 26083-blktap_fix_rpmlint_warning_spurious-executable-perm.patch 26084-hotplug_install_hotplugpath.sh_as_data_file.patch 26085-stubdom_install_stubdompath.sh_as_data_file.patch 26086-hotplug-Linux_correct_sysconfig_tag_in_xendomains.patch 26087-hotplug-Linux_install_sysconfig_files_as_data_files.patch 26088-tools_xend_fix_wrong_condition_check_for_xml_file.patch- fate#311966: Fix XEN VNC implementation to correctly map keyboard layouts VNC-Support-for-ExtendedKeyEvent-client-message.patch- workaround bash bug in locking.sh:claim_lock, close fd- fix incorrect self-provides/obsoletes of xen-tools-ioemu- bnc#783847 - Virtualization/xen: Bug Xen 4.2 'xendomins' init script incorrectly Requires 'xend' service when using 'xl' toolstack init.xendomains- bnc#782835 - Xen HVM Guest fails (errors) to launch on Opensuse 12.2 + Xen 4.2 + 'xl' toolstack xen-pygrub-grub-args.patch- backport parallel build support for stubdom - rename 5 patches which were merged upstream- remove more obsolete changes: CFLAGS passing to qemu-traditional, PYTHON_PREFIX_ARG handling and pygrub installation- update blktap-pv-cdrom.patch handle allocation errors in asprintf to fix compile errors handle value returned from xs_read properly remove casts from void pointers- update xenalyze to revision 138 Fix dump time calculation overflow move struct record_info into a header correctly display of count of HW events update trace.h to match xen-unstable Remove vestigal HW_IRQ trace records Remove decode of PV_UPDATE_VA_MAPPING automatically generate dependencies Get rid of redundant hvm dump_header Introduce more efficient read mechanism Eliminate unnecessary cycles_to_time calculation Rework math to remove two 64-bit divisions Enable -O2 optimization level Remove --dump-cooked Remove spurious dump_header construction Improve record-sorting algorithm Use long to cast into and out of pointers Make max_active_pcpu calculation smarter Optimize pcpu_string Enable more cr3 output Sort cr3 enumerated values by start time Add option to skip vga range in MMIO enumeration Handle MMIO records from different vmexits Relocate pio and mmio enumaration structs to their own sub-struct Handle new hvm_event traces Introduce generic summary functionality Function-ize setting of h->post_process Reorganize cr trace handling Allow several summary handlers to register on a single vmexit Get rid of all tabs in xenalyze.c Handle new IRQ tracing Decrease verbosity Print exit reason number if no string is available Fix minor summary issue Add string for TPR_BELOW_THRESHOLD Raise MAX_CPUS to 256 cpus. Add --report-pcpu option to report physical cpu utilization. increase MAX_CPUS Handle RUNSTATE_INIT in domain_runstate calculation- update RPM_OPT_FLAGS handling in spec file pass EXTRA_CFLAGS via environment- remove obsolete xencommons-proc-xen.patch- Upstream patches from Jan 25927-x86-domctl-ioport-mapping-range.patch 25929-tmem-restore-pool-version.patch 25931-x86-domctl-iomem-mapping-checks.patch 25940-x86-S3-flush-cache.patch 25952-x86-MMIO-remap-permissions.patch 25961-x86-HPET-interrupts.patch 25962-x86-assign-irq-vector-old.patch 25965-x86-ucode-Intel-resume.patch- pygrub: always append --args 25941-pygrub_always_append_--args.patch- use BuildRequires: gcc46 only in sles11sp2 or 12.1 to fix build in 11.4- Upstream patches from Jan 25833-32on64-bogus-pt_base-adjust.patch 25835-adjust-rcu-lock-domain.patch 25836-VT-d-S3-MSI-resume.patch 25850-tmem-xsa-15-1.patch 25851-tmem-xsa-15-2.patch 25852-tmem-xsa-15-3.patch 25853-tmem-xsa-15-4.patch 25854-tmem-xsa-15-5.patch 25855-tmem-xsa-15-6.patch 25856-tmem-xsa-15-7.patch 25857-tmem-xsa-15-8.patch 25858-tmem-xsa-15-9.patch 25859-tmem-missing-break.patch 25860-tmem-cleanup.patch 25861-x86-early-fixmap.patch 25862-sercon-non-com.patch 25863-sercon-ehci-dbgp.patch 25864-sercon-unused.patch 25866-sercon-ns16550-pci-irq.patch 25867-sercon-ns16550-parse.patch 25874-x86-EFI-chain-cfg.patch 25909-xenpm-consistent.patch- Fixed the 32bit build.- Update to Xen 4.2.0 FCS c/s 25844- unmodified_drivers: handle IRQF_SAMPLE_RANDOM, it was removed in 3.6-rc1- bnc#778105 - first XEN-PV VM fails to spawn xend: Increase wait time for disk to appear in host bootloader Modified existing xen-domUloader.diff- Disable the snapshot patches. Snapshot only supported the qcow2 image format which was poorly implemented qemu 0.10.2. Snapshot support may be restored in the future when the newer upstream qemu is used by Xen.- bnc#776995 - attaching scsi control luns with pvscsi - xend/pvscsi: fix passing of SCSI control LUNs xen-bug776995-pvscsi-no-devname.patch - xend/pvscsi: fix usage of persistant device names for SCSI devices xen-bug776995-pvscsi-persistent-names.patch - xend/pvscsi: update sysfs parser for Linux 3.0 xen-bug776995-pvscsi-sysfs-parser.patch- Update to Xen 4.2.0 RC3+ c/s 25779- Update to Xen 4.2.0 RC2+ c/s 25765-bnc#766284 - compiled-in ata_piix driver issues with PVonHVM guests Update xen_pvdrivers.conf to match not only libata but also ata_piix This avoids IO errors in the piix driver caused by unplugged hardware- Update to Xen 4.1.3 c/s 23336- Upstream or pending upstream patches from Jan 25587-fix-off-by-one-parsing-error.patch 25616-x86-MCi_CTL-default.patch 25617-vtd-qinval-addr.patch 25688-x86-nr_irqs_gsi.patch- Build all files with optimization (fortify source does not work with -O0).- bnc#773393 - VUL-0: CVE-2012-3433: xen: HVM guest destroy p2m teardown host DoS vulnerability CVE-2012-3433-xsa11.patch - bnc#773401 - VUL-1: CVE-2012-3432: xen: HVM guest user mode MMIO emulation DoS 25682-x86-inconsistent-io-state.patch- bnc#762484 - VUL-1: CVE-2012-2625: xen: pv bootloader doesn't check the size of the bzip2 or lzma compressed kernel, leading to denial of service 25589-pygrub-size-limits.patch- Make it build with latest TeXLive 2012 with new package layout- bnc#767273 - unsupported /var/lock/subsys is still used by xendomains init.xendomains- bnc#766283 - opensuse 12.2 pv guests can not start after installation due to lack of grub2 support in the host 24000-pygrub-grub2.patch 24001-pygrub-grub2.patch 24002-pygrub-grub2.patch- Upstream pygrub patches for grub2 support and fixes 23686-pygrub-solaris.patch 23697-pygrub-grub2.patch 23944-pygrub-debug.patch 23998-pygrub-GPT.patch 23999-pygrub-grub2.patch 24064-pygrub-HybridISO.patch 24401-pygrub-scrolling.patch 24402-pygrub-edit-fix.patch 24460-pygrub-extlinux.patch 24706-pygrub-extlinux.patch- Revised version of security patch and an additional patch for bnc#764077 x86_64-AMD-erratum-121.patch x86_64-allow-unsafe-adjust.patch- remove dummy asm/smp-processor-id.h- removed dummy xenapi.tex which was added because of bnc#750679 (see the below entry dated "Mon Apr 2 13:07:20 CEST 2012") because "ps2pdf xenapi.ps xenapi.pdf" failed only for Ghostscript version 9.04 (now we have Ghostscript 9.05).- bnc#764077 - VUL-0: EMBARGOED: xen: XSA-9: denial of service on older AMD systems x86_64-AMD-erratum-121.patch - Revised version of security patch for bnc#757537 x86_64-sysret-canonical.patch- Upstream patches from Jan 25242-x86_64-hotplug-compat-m2p.patch 25247-SVM-no-rdtsc-intercept.patch 25267-x86-text-unlikely.patch 25269-x86-vMCE-addr-misc-write.patch 25271-x86_64-IST-index.patch 25327-pvdrv-no-asm-system-h.patch- add dummy asm/smp-processor-id.h for kernel-source 3.4-rcX- remove inclusion of asm/system.h from platform-pci.c- Upstream patches from Jan 25168-x86-memset-size.patch 25191-x86-tdt-delta-calculation.patch 25195-x86-cpuidle-C2-no-flush-or-bm-check.patch 25196-x86-HAP-PAT-sr.patch 25200-x86_64-trap-bounce-flags.patch- bnc#757537 - VUL-0: xen: CVE-2012-0217 PV guest escalation x86_64-sysret-canonical.patch - bnc#757970 - VUL-1: xen: guest denial of service on syscall GPF generation x86_64-trap-bounce-flags.patch- Upstream patches from Jan 25098-x86-emul-lock-UD.patch 25101-x86-hpet-disable.patch ioemu-9877-MSI-X-device-cleanup.patch- bnc#750679 - "ps2pdf xenapi.ps xenapi.pdf" fails for user abuild in Factory add dummy xenapi.tex until ghostscript is fixed- remove vcd.o rule from PVonHVM Makefile, not needed anymore- bnc#753165 - xen/scripts/network-bridge wont create bridge bridge-bonding.diff- Upstream patches from Jan 24950-gnttab-copy-mapped.patch 24970-x86-cpuidle-deny-port-access.patch 24996-x86-cpuidle-array-overrun.patch 25041-tapdisk2-create-init-name.patch- use BuildRequires: gcc46 only in sles11sp2 to avoid issues when gcc47 and newer is the distro default- bnc#745880 - cpuid setting is not preserved across xend restarts xend-cpuid.patch- Rename 2XXXX-vif-bridge.patch -> vif-bridge-tap-fix.patch- bnc#747331 - XEN: standard "newburn" kernel QA stress test on guest (+ smartd on Dom0?) freezes the guest 24883-x86-guest-walk-not-present.patch - bnc#745367 - MCE bank handling during migration 24781-x86-vmce-mcg_ctl.patch 24886-x86-vmce-mcg_ctl-default.patch 24887-x86-vmce-sr.patch - bnc#744771 - L3: VM with passed through PCI card fails to reboot under dom0 load 24888-pci-release-devices.patch - Upstream patches from Jan 24517-VT-d-fault-softirq.patch 24527-AMD-Vi-fault-softirq.patch 24535-x86-vMSI-misc.patch 24615-VESA-lfb-flush.patch 24690-x86-PCI-SERR-no-deadlock.patch 24701-gnttab-map-grant-ref-recovery.patch 24742-gnttab-misc.patch 24780-x86-paging-use-clear_guest.patch 24805-x86-MSI-X-dom0-ro.patch ioemu-9869-MSI-X-init.patch ioemu-9873-MSI-X-fix-unregister_iomem.patch- add BuildRequires: libuuid-devel- bnc#746702 - Xen HVM DomU crash during Windows Server 2008 R2 install, when maxmem > memory README.SuSE- bnc#745005 - Update vif configuration examples in xmexample* Updated xen-xmexample.diff- bnc#743414 - using vifname is ignored when defining a xen virtual interface with xl/libxl 24459-libxl-vifname.patch- bnc#740165 - VUL-0: kvm: qemu heap overflow in e1000 device emulation (applicable to Xen qemu - CVE-2012-0029) cve-2012-0029-qemu-xen-unstable.patch- bnc#744014 - blank screen in SLES11 SP2 guest with a VF statically assigned ioemu-MSI-X-fix-unregister_iomem.patch - Upstream patches from Jan 24453-x86-vIRQ-IRR-TMR-race.patch 24456-x86-emul-lea.patch- fate#310510 - fix xenpaging 24586-x86-mm_Properly_account_for_paged_out_pages.patch 24609-tools-libxc_handle_fallback_in_linux_privcmd_map_foreign_bulk_properly.patch 24610-xenpaging_make_file_op_largefile_aware.patch xen-unstable.misc.linux_privcmd_map_foreign_bulk.retry_paged.patch xenpaging.speedup-page-out.resume_pages.find_next_bit_set.patch xenpaging.speedup-page-out.evict_pages.free_slot_stack.patch xenpaging.speedup-page-out.policy_choose_victim.patch update xenpaging.error-handling.patch, flush qemu cache not so often- fate#310510 - fix xenpaging 24566-tools-libxc_fix_error_handling_in_xc_mem_paging_load.patch- fate#310510 - fix xenpaging 24466-libxc_Only_retry_mapping_pages_when_ENOENT_is_returned.patch- The xen kmp packages fail on the 09-check-packaged-twice script. Rename xen_pvdrivers.conf to xen_pvdrivers-.conf- fate#310510 - fix xenpaging xenpaging.speedup-page-in.gfn_to_slot.patch- bnc#739585 - L3: Xen block-attach fails after repeated attach/detach blktap-close-fifos.patch blktap-disable-debug-printf.patch- bnc#741159 - Fix default setting of XENSTORED_ROOTDIR in xencommons init script xencommons-xenstored-root.patch- bnc#740625 - xen: cannot interact with xend after upgrade (SLES) - bnc#738694 - xen: cannot interact with xend after upgrade (os12.1) - Other README changes included. README.SuSE- bnc#694863 - kexec fails in xen 24478-libxl_add_feature_flag_to_xenstore_for_XS_RESET_WATCHES.patch- fate#310510 - fix xenpaging xenpaging.speedup-page-out.patch- bnc#735806 - VF doesn't work after hot-plug for many times 24448-x86-pt-irq-leak.patch - Upstream patches from Jan 24261-x86-cpuidle-Westmere-EX.patch 24417-amd-erratum-573.patch 24429-mceinj-tool.patch 24447-x86-TXT-INIT-SIPI-delay.patch ioemu-9868-MSI-X.patch- bnc#732884 - remove private runlevel 4 from init scripts xen.no-default-runlevel-4.patch- bnc#727515 - Fragmented packets hang network boot of HVM guest ipxe-gcc45-warnings.patch ipxe-ipv4-fragment.patch ipxe-enable-nics.patch- fate#310510 - fix xenpaging update xenpaging.autostart.patch, make changes with mem-swap-target permanent update xenpaging.doc.patch, mention issues with live migration- fate#310510 - fix xenpaging add xenpaging.evict_mmap_readonly.patch update xenpaging.error-handling.patch, reduce debug output- bnc#736824 - Microcode patches for AMD's 15h processors panic the system 24189-x86-p2m-pod-locking.patch 24412-x86-AMD-errata-model-shift.patch 24411-x86-ucode-AMD-Fam15.patch- bnc#711219 - SR-IOV VF doesn't work in SLES11 sp2 guest 24357-firmware-no-_PS0-_PS3.patch - Upstream patches from Jan 24153-x86-emul-feature-checks.patch 24275-x86-emul-lzcnt.patch 24277-x86-dom0-features.patch 24278-x86-dom0-no-PCID.patch 24282-x86-log-dirty-bitmap-leak.patch 24359-x86-domU-features.patch 24360-x86-pv-domU-no-PCID.patch 24389-amd-fam10-gart-tlb-walk-err.patch 24391-x86-pcpu-version.patch- bnc#729208 - xenpaging=-1 doesn't work xenpaging.doc.patch- fate#310510 - fix xenpaging readd xenpaging.qemu.flush-cache.patch- bnc#732782 - L3: xm create hangs when maxmen value is enclosed in "quotes" xm-create-maxmem.patch- Upstream patches / changes from Jan Added 24358-kexec-compat-overflow.patch Removed 24341-x86-64-mmcfg_remove___initdata_annotation_overlooked_in_23749e8d1c8f074ba.patch Removed 24345-tools-libxc_Fix_x86_32_build_breakage_in_previous_changeset..patch- fate#310510 - fix xenpaging 24178-debug_Add_domain-vcpu_pause_count_info_to_d_key..patch Use wait queues for paging, improve foreign mappings. xenpaging.versioned-interface.patch xenpaging.mmap-before-nominate.patch xenpaging.p2m_is_paged.patch xenpaging.evict_fail_fast_forward.patch xenpaging.error-handling.patch xenpaging.mem_event-use-wait_queue.patch xenpaging.waitqueue-paging.patch Remove obsolete patch, not needed with wait queue usage xenpaging.HVMCOPY_gfn_paged_out.patch- fate#310510 - fix xenpaging Fix incorrect backport, remove double memset, use xzalloc 24171-x86waitqueue_Allocate_whole_page_for_shadow_stack..patch- fate#310510 - fix xenpaging fix typo in nominate, use lock instead of double unlock 23905-xenpaging_fix_locking_in_p2m_mem_paging_functions.patch- fate#310510 - fix xenpaging 24327-After_preparing_a_page_for_page-in_allow_immediate_fill-in_of_the_page_contents.patch 24328-Tools_Libxc_wrappers_to_automatically_fill_in_page_oud_page_contents_on_prepare.patch 24329-Teach_xenpaging_to_use_the_new_and_non-racy_xc_mem_paging_load_interface.patch- bnc#734826 - xm rename doesn't work anymore Updated xend-migration-domname-fix.patch- fate#310510 - fix xenpaging 24269-mem_event_move_mem_event_domain_out_of_struct_domain.patch 24270-Free_d-mem_event_on_domain_destruction..patch- fate#310510 - fix xenpaging 24318-x86-mm_Fix_checks_during_foreign_mapping_of_paged_pages.patch- fate#310510 - fix xenpaging 23949-constify_vcpu_set_affinitys_second_parameter.patch- fate#310510 - fix xenpaging 24105-xenpaging_compare_domain_pointer_in_p2m_mem_paging_populate.patch 24106-mem_event_check_capabilities_only_once.patch- fate#310510 - fix xenpaging 24272-xenpaging_Fix_c-s_235070a29c8c3ddf7_update_machine_to_phys_mapping_during_page_deallocation.patch- bnc#727081 - xend domains don't work anymore since update from 12.1 beta to 12.1 RC 1 24344-tools-x86_64_Fix_cpuid_inline_asm_to_not_clobber_stacks_red_zone.patch 24345-tools-libxc_Fix_x86_32_build_breakage_in_previous_changeset..patch- bnc#733449 - Panic in mcfg_ioremap when booting xen-dbg.gz on Xeon E3-1230 24341-x86-64-mmcfg_remove___initdata_annotation_overlooked_in_23749e8d1c8f074ba.patch- fate#310510 - fix xenpaging backport waitqueue changes from xen-unstable 24104-waitqueue_Double_size_of_x86_shadow_stack..patch 24171-x86waitqueue_Allocate_whole_page_for_shadow_stack..patch 24195-waitqueue_Detect_saved-stack_overflow_and_crash_the_guest..patch 24196-waitqueue_Reorder_prepare_to_wait_so_that_vcpu_is_definitely_on_the.patch 24197-x86-waitqueue_Because_we_have_per-cpu_stacks_we_must_wake_up_on_teh.patch 24231-waitqueue_Implement_wake_up_nroneall..patch 24232-waitqueue_Hold_a_reference_to_a_domain_on_a_waitqueue..patch- fate#310510 - fix xenpaging 24227-xenpaging_restrict_pagefile_permissions.patch- fate#310510 - fix xenpaging merge upstream version of our existing patches: 24218-libxc_add_bitmap_clear_function.patch remove old versions: xenpaging.bitmap_clear.patch- fate#310510 - fix xenpaging merge upstream version of our existing patches: 24138-xenpaging_munmap_all_pages_after_page-in.patch 24208-xenpaging_remove_filename_from_comment.patch 24209-xenpaging_remove_obsolete_comment_in_resume_path.patch 24210-xenpaging_use_PERROR_to_print_errno.patch 24211-xenpaging_simplify_file_op.patch 24212-xenpaging_print_gfn_in_failure_case.patch 24213-xenpaging_update_xenpaging_init.patch 24214-xenpaging_remove_xc_dominfo_t_from_paging_t.patch 24215-xenpaging_track_the_number_of_paged-out_pages.patch 24216-xenpaging_move_page_add-resume_loops_into_its_own_function..patch 24217-xenpaging_improve_mainloop_exit_handling.patch 24219-xenpaging_retry_unpageable_gfns.patch 24220-xenpaging_install_into_LIBEXEC_dir.patch 24221-xenpaging_add_XEN_PAGING_DIR_-_libxl_xenpaging_dir_path.patch 24222-xenpaging_use_guests_tot_pages_as_working_target.patch 24223-xenpaging_watch_the_guests_memory-target-tot_pages_xenstore_value.patch 24224-xenpaging_add_cmdline_interface_for_pager.patch 24225-xenpaging_improve_policy_mru_list_handling.patch 24226-xenpaging_add_debug_to_show_received_watch_event..patch remove old versions: xenpaging.XEN_PAGING_DIR.patch xenpaging.add_evict_pages.patch xenpaging.cmdline-interface.patch xenpaging.encapsulate_domain_info.patch xenpaging.file_op-return-code.patch xenpaging.install-to-libexec.patch xenpaging.low_target_policy_nomru.patch xenpaging.main-loop-exit-handling.patch xenpaging.misleading-comment.patch xenpaging.page_in-munmap-size.patch xenpaging.print-gfn.patch xenpaging.record-numer-paged-out-pages.patch xenpaging.reset-uncomsumed.patch xenpaging.stale-comments.patch xenpaging.target-tot_pages.patch xenpaging.use-PERROR.patch xenpaging.watch-target-tot_pages.patch xenpaging.watch_event-DPRINTF.patch xenpaging.xc_interface_open-comment.patch- bnc#733348 - Use 'xm' in various scripts if xend is running. Modified xmclone.sh and xen-updown.sh - Only emit xl warning when xend is running and -f (force) flag is not specified. Modified disable-xl-when-using-xend.patch- Upstream patches from Jan 24190-hap-log-dirty-disable-rc.patch 24193-hap-track-dirty-vram-rc.patch 24201-x86-pcpu-platform-op.patch- Upstream patches from Jan 23900-xzalloc.patch 24144-cpufreq-turbo-crash.patch 24148-shadow-pgt-dying-op-performance.patch 24155-x86-ioapic-EOI-after-migration.patch 24156-x86-ioapic-shared-vectors.patch 24157-x86-xstate-init.patch 24168-x86-vioapic-clear-remote_irr.patch- submit fixes for bnc#649209 and bnc#711892 xl-create-pv-with-qcow2-img.patch update suspend_evtchn_lock.patch- Update trace.c, merge patches from upstream 23050-xentrace_dynamic_tracebuffer_allocation.patch 23091-xentrace_fix_t_info_pages_calculation..patch 23092-xentrace_print_calculated_numbers_in_calculate_tbuf_size.patch 23093-xentrace_remove_gdprintk_usage_since_they_are_not_in_guest_context.patch 23094-xentrace_update_comments.patch 23095-xentrace_use_consistent_printk_prefix.patch 23128-xentrace_correct_formula_to_calculate_t_info_pages.patch 23129-xentrace_remove_unneeded_debug_printk.patch 23173-xentrace_Move_register_cpu_notifier_call_into_boot-time_init..patch 23239-xentrace_correct_overflow_check_for_number_of_per-cpu_trace_pages.patch 23308-xentrace_Move_the_global_variable_t_info_first_offset_into_calculate_tbuf_size.patch 23309-xentrace_Mark_data_size___read_mostly_because_its_only_written_once.patch 23310-xentrace_Remove_unneeded_cast_when_assigning_pointer_value_to_dst.patch 23404-xentrace_reduce_trace_buffer_size_to_something_mfn_offset_can_reach.patch 23405-xentrace_fix_type_of_offset_to_avoid_ouf-of-bounds_access.patch 23406-xentrace_update___insert_record_to_copy_the_trace_record_to_individual_mfns.patch 23407-xentrace_allocate_non-contiguous_per-cpu_trace_buffers.patch 23643-xentrace_Allow_tracing_to_be_enabled_at_boot.patch 23719-xentrace_update___trace_var_comment.patch Remove old patches: xen-unstable.xentrace.dynamic_tbuf.patch xen-unstable.xentrace.empty_t_info_pages.patch xen-unstable.xentrace.verbose.patch xen-unstable.xentrace.no_gdprintk.patch xen-unstable.xentrace.comments.patch xen-unstable.xentrace.printk_prefix.patch xen-unstable.xentrace.remove_debug_printk.patch xen-unstable.xentrace.t_info_pages-formula.patch xen-unstable.xentrace.register_cpu_notifier-boot_time.patch xen-unstable.xentrace.t_info_page-overflow.patch xen-unstable.xentrace.t_info_first_offset.patch xen-unstable.xentrace.data_size__read_mostly.patch xen-unstable.xentrace.__insert_record-dst-type.patch- Upstream patches from Jan 24116-x86-continuation-cancel.patch 24123-x86-cpuidle-quiesce.patch 24124-x86-microcode-amd-quiesce.patch 24137-revert-23666.patch 24xxx-shadow-pgt-dying-op-performance.patch- bnc#722738 - xm cpupool-create errors out xen-cpupool-xl-config-format.patch- Fix broken build when building docs 23819-make-docs.patch- bnc#720054 - Prevent vif-bridge from adding user-created tap interfaces to a bridge 2XXXX-vif-bridge.patch- bnc#713503 - DOM0 filesystem commit 23752-x86-shared-IRQ-vector-maps.patch 23754-AMD-perdev-vector-map.patch- fate#310510 - fix xenpaging This change reverses the task of xenpaging. Before this change a fixed number of pages was paged out. With this change the guest will not have access to more than the given number of pages at the same time. The xenpaging= config option is replaced by actmem= A new xm mem-swap-target is added. The xenpaging binary is moved to /usr/lib/xen/bin/ xenpaging.HVMCOPY_gfn_paged_out.patch xenpaging.XEN_PAGING_DIR.patch xenpaging.add_evict_pages.patch xenpaging.bitmap_clear.patch xenpaging.cmdline-interface.patch xenpaging.encapsulate_domain_info.patch xenpaging.file_op-return-code.patch xenpaging.guest-memusage.patch xenpaging.install-to-libexec.patch xenpaging.low_target_policy_nomru.patch xenpaging.main-loop-exit-handling.patch xenpaging.misleading-comment.patch xenpaging.page_in-munmap-size.patch xenpaging.print-gfn.patch xenpaging.record-numer-paged-out-pages.patch xenpaging.reset-uncomsumed.patch xenpaging.stale-comments.patch xenpaging.target-tot_pages.patch xenpaging.use-PERROR.patch xenpaging.watch-target-tot_pages.patch xenpaging.watch_event-DPRINTF.patch xenpaging.xc_interface_open-comment.patch- xen.spec: update filelist package /usr/lib*/xen with wildcard to pickup new files remove duplicate /usr/sbin/xen-list from filelist- bnc#725169 - xen-4.0.2_21511_03-0.5.3: bootup hangs 23993-x86-microcode-amd-fix-23871.patch- Update to Xen 4.1.2 FCS c/s 23174- bnc#720054 - Fix syntax error introduced during recent adjustment of Xen's tap udev rule. Updated udev-rules.patch- fate#310510 - fix xenpaging Merge paging related fixes from xen-unstable: 23506-x86_Disable_set_gpfn_from_mfn_until_m2p_table_is_allocated..patch 23507-xenpaging_update_machine_to_phys_mapping_during_page_deallocation.patch 23509-x86_32_Fix_build_Define_machine_to_phys_mapping_valid.patch 23562-xenpaging_remove_unused_spinlock_in_pager.patch 23576-x86_show_page_walk_also_for_early_page_faults.patch 23577-tools_merge_several_bitop_functions_into_xc_bitops.h.patch 23578-xenpaging_add_xs_handle_to_struct_xenpaging.patch 23579-xenpaging_drop_xc.c_remove_ASSERT.patch 23580-xenpaging_drop_xc.c_remove_xc_platform_info_t.patch 23581-xenpaging_drop_xc.c_remove_xc_wait_for_event.patch 23582-xenpaging_drop_xc.c_move_xc_mem_paging_flush_ioemu_cache.patch 23583-xenpaging_drop_xc.c_move_xc_wait_for_event_or_timeout.patch 23584-xenpaging_drop_xc.c_remove_xc_files.patch 23585-xenpaging_correct_dropping_of_pages_to_avoid_full_ring_buffer.patch 23586-xenpaging_do_not_bounce_p2mt_back_to_the_hypervisor.patch 23587-xenpaging_remove_srand_call.patch 23588-xenpaging_remove_return_values_from_functions_that_can_not_fail.patch 23589-xenpaging_catch_xc_mem_paging_resume_errors.patch 23590-xenpaging_remove_local_domain_id_variable.patch 23591-xenpaging_move_num_pages_into_xenpaging_struct.patch 23592-xenpaging_start_paging_in_the_middle_of_gfn_range.patch 23593-xenpaging_pass_integer_to_xenpaging_populate_page.patch 23594-xenpaging_add_helper_function_for_unlinking_pagefile.patch 23595-xenpaging_add_watch_thread_to_catch_guest_shutdown.patch 23596-xenpaging_implement_stopping_of_pager_by_sending_SIGTERM-SIGINT.patch 23597-xenpaging_remove_private_mem_event.h.patch 23599-tools_fix_build_after_recent_xenpaging_changes.patch 23817-mem_event_add_ref_counting_for_free_requestslots.patch 23818-mem_event_use_mem_event_mark_and_pause_in_mem_event_check_ring.patch 23827-xenpaging_use_batch_of_pages_during_final_page-in.patch 23841-mem_event_pass_mem_event_domain_pointer_to_mem_event_functions.patch 23842-mem_event_use_different_ringbuffers_for_share_paging_and_access.patch 23874-xenpaging_track_number_of_paged_pages_in_struct_domain.patch 23904-xenpaging_use_p2m-get_entry_in_p2m_mem_paging_functions.patch 23905-xenpaging_fix_locking_in_p2m_mem_paging_functions.patch 23906-xenpaging_remove_confusing_comment_from_p2m_mem_paging_populate.patch 23908-p2m_query-modify_p2mt_with_p2m_lock_held.patch 23943-xenpaging_clear_page_content_after_evict.patch 23953-xenpaging_handle_evict_failures.patch 23978-xenpaging_check_p2mt_in_p2m_mem_paging_functions.patch 23979-xenpaging_document_p2m_mem_paging_functions.patch 23980-xenpaging_disallow_paging_in_a_PoD_guest.patch Remove obsolete patches: x86-show-page-walk-early.patch xenpaging.23817-mem_event_check_ring.patch xenpaging.catch-xc_mem_paging_resume-error.patch xenpaging.guest_remove_page.slow_path.patch xenpaging.mem_event-no-p2mt.patch xenpaging.no-srand.patch xenpaging.return-void.patch xenpaging.xenpaging_populate_page-gfn.patch- xen.spec: use changeset number as patch number for upstream patches- do not use runlevel 4 in init scripts, it makes it impossible to "insserv xend" on 12.1- Upstream patches from Jan 23955-x86-pv-cpuid-xsave.patch 23957-cpufreq-error-paths.patch- Upstream patches from Jan 23933-pt-bus2bridge-update.patch 23726-x86-intel-flexmigration-v2.patch 23925-x86-AMD-ARAT-Fam12.patch 23246-x86-xsave-enable.patch 23897-x86-mce-offline-again.patch- Update to Xen 4.1.2_rc3 c/s 23171- bnc#720054 - Changed /etc/udev/rules.d/40-xen.rules to not run Xen's vif-bridge script when not running Xen. This is not a solution to the bug but an improvement in the rules regardless. Updated udev-rules.patch- Upstream patches from Jan 23868-vtd-RMRR-validation.patch 23871-x86-microcode-amd-silent.patch 23898-cc-option-grep.patch- Add pciback init script and sysconf file, giving users a simple mechanism to configure pciback. init.pciback sysconfig.pciback- update scripts to use xl -f, or xm if xend is running: xen-updown.sh, init.xendomains, xmclone.sh- bnc#694863 - kexec fails in xen xenstored: allow guest to shutdown all its watches/transactions xenstored.XS_RESET_WATCHES.patch- Upstream patches from Jan 23843-scheduler-switch.patch 23846-x86-TSC-check.patch 23848-vmx-conditional-off.patch 23853-x86-pv-cpuid-xsave.patch- fate#310510 - fix xenpaging mem_event: add ref counting for free requestslots xenpaging.23817-mem_event_check_ring.patch- bnc#717650 - Unable to start VM - Update to Xen 4.1.2_rc2 c/s 23152- bnc#716695 - domUs using tap devices will not start updated multi-xvdp.patch- Upstream patches from Jan 23803-intel-pmu-models.patch 23800-x86_64-guest-addr-range.patch 23795-intel-ich10-quirk.patch 23804-x86-IPI-counts.patch- bnc#706106 - Inconsistent reporting of VM names during migration xend-migration-domname-fix.patch- bnc#712823 - L3:Xen guest does not start reliable when rebooted xend-vcpu-affinity-fix.patch- Upstream patches from Jan 23725-pci-add-device.patch 23762-iommu-fault-bm-off.patch 23763-pci-multi-seg-x2apic-vtd-no-crash.patch 23765-x86-irq-vector-leak.patch 23766-x86-msi-vf-bars.patch 23771-x86-ioapic-clear-pin.patch 23772-x86-trampoline.patch 23774-x86_64-EFI-EDD.patch 23776-x86-kexec-hpet-legacy-bcast-disable.patch 23781-pm-wide-ACPI-ids.patch 23782-x86-ioapic-clear-irr.patch 23783-ACPI-set-_PDC-bits.patch- Include gcc46 only when its available (>11.4 && >sles11sp1)- bnc#711943 - [xl] Fail to create multi-guests with NIC assigned 23685-libxl-segfault-fix.patch- libxenlight and legacy xend toolstack should not be used together. If xend is running, print a warning and exit xl. Add a '-f' (force) option to xl to override this behavior. disable-xl-when-using-xend.patch bnc#707664- Upstream patches from Jan 23732-sedf.patch 23735-guest-dom0-cap.patch 23746-vtd-cleanup-timers.patch 23747-mmcfg-base-address.patch 23749-mmcfg-reservation.patch- bnc#704160 - crm resource migrate fails with xen machines update snapshot-xend.patch - bnc#706574 - xm console DomUName hang after "xm save/restore" of PVM on the latest Xen xend-console-port-restore.patch- update xencommons script to run only when needed xencommons-proc-xen.patch- Upstream patches from Jan 23726-x86-intel-flexmigration.patch 23706-fix-20892.patch 23723-x86-CMOS-lock.patch 23676-x86_64-image-map-bounds.patch 23724-x86-smpboot-x2apic.patch- hotplug.losetup.patch correct dev:inode detection, stat returns major:minor without leading zeros, while losetup -a includes trailing zeros- fate#310635: xen npiv multipath support update block-npiv* scripts for testing- Fixes for EFI support x86-EFI-discard-comment.patch- fate#309894: Xen needs to correctly understand family 15h CPU topology - fate#311376: EFI support in SP2 - fate#311529: Native UEFI booting under Xen (installation) 23074-pfn.h.patch 23571-vtd-fault-verbosity.patch 23574-x86-dom0-compressed-ELF.patch 23575-x86-DMI.patch 23610-x86-topology-info.patch 23611-amd-fam15-topology.patch 23613-EFI-headers.patch 23614-x86_64-EFI-boot.patch 23615-x86_64-EFI-runtime.patch 23616-x86_64-EFI-MPS.patch- Mark xen-scsi.ko supported (bnc#582265, fate#309459).- fate#310308: Hypervisor assisted watchdog driver ioemu-watchdog-support.patch ioemu-watchdog-linkage.patch ioemu-watchdog-ib700-timer.patch tools-watchdog-support.patch- bnc#702025 - VUL-0: xen: VT-d (PCI passthrough) MSI trap injection (CVE-2011-1898) Fixed in Xen version 4.1.1- fate#310956: Support Direct Kernel Boot for FV guests kernel-boot-hvm.patch- fate#310316: Support change vnc password while vm is running change-vnc-passwd.patch - fate#310325: Support get domU console log from Dom0 log-guest-console.patch- fate#311487: remove modprobe.conf files for autoloading of Xen and Hyper-V drivers xen.sles11sp1.fate311487.xen_platform_pci.dmistring.patch add dmi modalias to xen-platform-pci.ko- fate#308532: [NONCODE] Remove XEN 32-bit Hypervisor Modify ExclusiveArch in xen.spec to build only x86_64- fate#309900 - Add Xen support for SVM Decode Assist in AMD family 15h - fate#309902 - Add Xen support for AMD family 12h processors - fate#309903 - Add Xen support for AMD family 14h processors - fate#309906 - Add Xen support for performance event counters in AMD family 15h- fate#309893: Add Xen support for AMD family 15h processors - fate#309901: Add Xen support for SVM TSC scaling in AMD family 15h - fate#311951: Ivy Bridge: XEN support for Supervisor Mode Execution Protection (SMEP) 23437-amd-fam15-TSC-scaling.patch 23462-libxc-cpu-feature.patch 23481-x86-SMEP.patch 23504-x86-SMEP-hvm.patch 23505-x86-cpu-add-arg-check.patch 23508-vmx-proc-based-ctls-probe.patch 23510-hvm-cpuid-DRNG.patch 23511-amd-fam15-no-flush-for-C3.patch 23516-cpuid-ERMS.patch 23538-hvm-pio-emul-no-host-crash.patch 23539-hvm-cpuid-FSGSBASE.patch 23543-x86_64-maddr_to_virt-assertion.patch 23546-fucomip.patch- Fix libxc reentrancy issues 23383-libxc-rm-static-vars.patch- fate#310957 - Update to Xen 4.1.1 FCS c/s 23079- fate#311000 - Extend Xen domain lock framework to support more alternative xend-domain-lock-sfex.patch- fate#311371 - Enhance yast to configure live migration for Xen and KVM add firewall service file for xen-tools- Add man page for xen-list utility updated xen-utils-0.1.tar.bz2- Upstream patches from Jan 23233-hvm-cr-access.patch 23234-svm-decode-assist-base.patch 23235-svm-decode-assist-crs.patch 23236-svm-decode-assist-invlpg.patch 23238-svm-decode-assist-insn-fetch.patch 23303-cpufreq-misc.patch 23304-amd-oprofile-strings.patch 23305-amd-fam15-xenoprof.patch 23306-amd-fam15-vpmu.patch 23334-amd-fam12+14-vpmu.patch 23338-vtd-force-intremap.patch- fate#310957 - Update to Xen 4.1.1-rc1 c/s 23064- xentrace: dynamic tracebuffer allocation xen-unstable.xentrace.dynamic_tbuf.patch xen-unstable.xentrace.empty_t_info_pages.patch xen-unstable.xentrace.verbose.patch xen-unstable.xentrace.no_gdprintk.patch xen-unstable.xentrace.comments.patch xen-unstable.xentrace.printk_prefix.patch xen-unstable.xentrace.remove_debug_printk.patch xen-unstable.xentrace.t_info_pages-formula.patch xen-unstable.xentrace.register_cpu_notifier-boot_time.patch xen-unstable.xentrace.t_info_page-overflow.patch xen-unstable.xentrace.t_info_first_offset.patch xen-unstable.xentrace.data_size__read_mostly.patch xen-unstable.xentrace.__insert_record-dst-type.patch- fate#310510 - fix xenpaging update xenpaging patches for xen 4.1 xenpaging.guest_remove_page.slow_path.patch xenpaging.mem_event-no-p2mt.patch xenpaging.no-srand.patch xenpaging.return-void.patch xenpaging.catch-xc_mem_paging_resume-error.patch xenpaging.xenpaging_populate_page-gfn.patch xenpaging.autostart.patch- bnc#670465 - When connecting to Xen guest through vncviewer mouse tracking is off. - Upstream patch 23298-hvmop-get-mem-type.patch replaces xen.sles11sp1.bug684297.HVMOP_get_mem_type.patch - Upstream patches from Jan 23333-hvm-32bit-compat-hypercalls.patch 23337-vtd-malicious-msi-filter.patch 23338-vtd-force-intremap.patch (CVE-2011-1898) 23341-x86-ioapic-write-entry.patch 23343-vtd-error-path-leaks.patch- bnc#684305 - on_crash is being ignored with kdump now working in HVM xend-config-enable-dump-comment.patch- disable xend's logrotation for xend.log, use included logrotate.conf- bnc#684297 - HVM taking too long to dump vmcore xen.sles11sp1.bug684297.HVMOP_get_mem_type.patch new hvm_op hyper call option xen.sles11sp1.bug684297.xen_oldmem_pfn_is_ram.patch Use new Xen HVMOP_get_mem_type hvmop hypercall option and new Linux kernel register_oldmem_pfn_is_ram interface. (depends on two kernel-source changes)- Update to Xen 4.1.1-rc1-pre c/s 23051- Numerous cleanups when compiling with the unused-but-set-variable flag enabled and warnings equal to errors. xen-warnings-unused.diff- Add a 'long' option to xen-list utility Updated xen-utils-0.1.tar.bz2- bnc#691256 - move modprobe of xen backend modules from xend to xencommons initscript tmp-initscript-modprobe.patch- bnc#691738 - Xen does not find device create with npiv block xen-qemu-iscsi-fix.patch- Upstream patches from Jan 22998-x86-get_page_from_l1e-retcode.patch 22999-x86-mod_l1_entry-retcode.patch 23000-x86-mod_l2_entry-retcode.patch 23096-x86-hpet-no-cpumask_lock.patch 23099-x86-rwlock-scalability.patch 23103-x86-pirq-guest-eoi-check.patch 23127-vtd-bios-settings.patch 23153-x86-amd-clear-DramModEn.patch 23154-x86-amd-iorr-no-rdwr.patch 23199-amd-iommu-unmapped-intr-fault.patch 23200-amd-iommu-intremap-sync.patch 23228-x86-conditional-write_tsc.patch- bnc#691238 - L3: question on behaviour change xm list snapshot-xend.patch- update xenalyze to revision 98 * Unify setting of vcpu data type * Unify record size checks * Fix cr3_switch not to access hvm struct before it's initialized - add xenalyze.gcc46.patch to fix unused-but-set-variable errors- bnc#688473 - VUL-0: potential buffer overflow in tools cve-2011-1583-4.0.patch- hotplug.losetup.patch correct dev:inode detection and use variable expansion- bnc#623680 - xen kernel freezes during boot when processor module is loaded 23228-x86-conditional-write_tsc.patch - bnc#680824 - dom0 can't recognize boot disk when IOMMU is enabled 23200-amd-iommu-intremap-sync.patch - Upstream patches from Jan 23127-vtd-bios-settings.patch 23153-x86-amd-clear-DramModEn.patch 23154-x86-amd-iorr-no-rdwr.patch 23199-amd-iommu-unmapped-intr-fault.patch- bnc#685189: update vif-route-ifup.patch to use correct variable after upstream commit 22910:d4bc41a8cecb- bnc#688519: correct indention in xend-domain-lock.patch- bnc#687981 - L3: mistyping model type when defining VIF crashes VM xend-validate-nic-model.patch- bnc#685338: Fix porting of xend-domain-lock.patch- update scripts to use xl instead of xm: xen-updown.sh, init.xendomains, xmclone.sh- disable xend in openSuSE > 11.4 the xl command is the replacement for the xm command- mark runlevel scripts as config to preserve local changes by admin or dev during package update- enable xencommons runlevel script during upgrade if xend was already enabled- call /sbin/ldconfig directly in xen-libs post install scripts- Upstream patches from Jan 23103-x86-pirq-guest-eoi-check.patch 23030-x86-hpet-init.patch 23061-amd-iommu-resume.patch 23127-vtd-bios-settings.patch- add baselibs.conf as libvirt uses 32bit libraries- Remus support is enabled for now.- Enable support for kernel decompression for gzip, bzip2, and LZMA so that kernels compressed with any of these methods can be launched- Update to Xen 4.1 FCS- fix xentrace.dynamic_sized_tbuf.patch the default case did not work, correct size calculation- Update to c/s 23010 Xen 4.1 rc8- use _smp_mflags instead of jobs, jobs is not expanded everywhere- bnc#681302 - xm create -x returns "ImportError: No module named ext" xm-create-xflag.patch- bnc#675817 - Kernel panic when creating HVM guests on AMD platforms with XSAVE 22462-x86-xsave-init-common.patch- bnc#679344 - Xen: multi-vCPU pv guest may crash host 23034-x86-arch_set_info_guest-DoS.patch - bnc#678871 - dom0 hangs long time when starting hvm guests with memory >= 64GB 22780-pod-preempt.patch - bnc#675363 - Random lockups with kernel-xen. Possibly graphics related 22997-x86-map_pages_to_xen-check.patch - Upstream patches from Jan 22949-x86-nmi-pci-serr.patch 22992-x86-fiop-m32i.patch 22996-x86-alloc_xen_pagetable-no-BUG.patch 23020-x86-cpuidle-ordering.patch 23039-csched-constrain-cpu.patch- Fix xen-utils to cope with xen-unstable c/s 21483- bnc#678229 - restore of sles HVM fails 22873-svm-sr-32bit-sysenter-msrs.patch- xz-devel is available since 11.2, make it optional for SLES11SP1- Fix /vm/uuid xenstore leak on tapdisk2 device cleanup 22499-xen-hotplug-cleanup.patch- Upstream patches from Jan 22872-amd-iommu-pci-reattach.patch 22879-hvm-no-self-set-mem-type.patch 22899-x86-tighten-msr-permissions.patch 22915-x86-hpet-msi-s3.patch 22947-amd-k8-mce-init-all-msrs.patch- bnc#672833 - xen-tools bug causing problems with Ubuntu 10.10 under Xen 4. 22238-pygrub-grub2-fix.patch- bnc#665610 - xm console > 1 to same VM messes up both consoles Upstream rejected due to portability concern, see http://lists.xensource.com/archives/html/xen-devel/2011-02/msg00942.html xenconsole-no-multiple-connections.patch- Enable support for kernel decompression for gzip, bzip2, and LZMA so that kernels compressed with any of these methods can be launched.- bnc#651822 - xm snapshot-xxx scripts lead to an XP SP3 HVM domU to chkdsk Make sure we only apply the snapshot once, and the changes made after snapshot-apply hit the disk.- Update to Xen 4.1.0 c/s 22861- bnc#658569 - SLES 11 SP1 dom0 iptables gives lots of physdev messages 22385-vif-common.patch- update xenalyze, more 64bit fixes- allocate xentrace buffer metadata based on requested tbuf_size xentrace.dynamic_sized_tbuf.patch- fate#310510 - fix xenpaging xenpaging.runtime_mru_size.patch - specify policy mru size at runtime xenpaging.no_domain_id.patch - reduce memory usage in pager- bnc#625394 - set vif mtu from bridge mtu if kernel supports it vif-bridge.mtu.patch- fate#310510 - fix xenpaging xenpaging.autostart_delay.patch - decouple create/destroycreateXenPaging from _create/_removeDevices - change xenpaging variable from int to str - init xenpaging variable to 0 if xenpaging is not in config file to avoid string None coming from sxp file- Update to Xen 4.0.2 rc2-pre, changeset 21443- bnc#633573 - System fail to boot after running several warm reboot tests 22749-vtd-workarounds.patch - Upstream patches from Jan 22744-ept-pod-locking.patch 22777-vtd-ats-fixes.patch 22781-pod-hap-logdirty.patch 22782-x86-emul-smsw.patch 22789-i386-no-x2apic.patch 22790-svm-resume-migrate-pirqs.patch 22816-x86-pirq-drop-priv-check.patch- Don't pass the deprecataed extid parameter to xc.hvm_build- bnc#658704 - SLES11 SP1 Xen boot panic in x2apic mode 22707-x2apic-preenabled-check.patch - bnc#641419 - L3: Xen: qemu-dm reports "xc_map_foreign_batch: mmap failed: Cannot allocate memory" 7434-qemu-rlimit-as.patch - Additional or upstream patches from Jan 22693-fam10-mmio-conf-base-protect.patch 22694-x86_64-no-weak.patch 22708-xenctx-misc.patch 21432-4.0-cpu-boot-failure.patch 22645-amd-flush-filter.patch qemu-fix-7433.patch- Maintain compatibility with the extid flag even though it is deprecated for both legacy and sxp config files. hv_extid_compatibility.patch- bnc#649209-improve suspend eventchn lock suspend_evtchn_lock.patch- Removed the hyper-v shim patches in favor of using the upstream version.- bnc#641419 - L3: Xen: qemu-dm reports "xc_map_foreign_batch: mmap failed: Cannot allocate memory" qemu-rlimit-as.patch- Upstream c/s 7433 to replace qemu_altgr_more.patch 7433-qemu-altgr.patch- bnc#661931 - Fix fd leak in xenstore library 21344-4.0-testing-xenstore-fd-leak.patch- bnc#656369 - g5plus: sles11sp1 xen crash with 8 socket x2apic preenabled 21989-x2apic-resume.patch 22475-x2apic-cleanup.patch 22535-x2apic-preenabled.patch - bnc#658163 - maintenance release - Nehalem system cannot boot into xen with maintenance release installed 22504-iommu-dom0-holes.patch 22506-x86-iommu-dom0-estimate.patch - bnc#658704 - SLES11 SP1 Xen boot panic in x2apic mode 21810-x2apic-acpi.patch - Upstream patches from Jan 22470-vlapic-tick-loss.patch 22484-vlapic-tmcct-periodic.patch 22526-ept-access-once.patch 22533-x86-32bit-apicid.patch 22534-x86-max-local-apic.patch 22538-keyhandler-relax.patch 22540-32on64-hypercall-debug.patch 22549-vtd-map-page-leak.patch 22574-ept-skip-validation.patch 22632-vtd-print-entries.patch- bnc#661298 - maintenance release candidate - Windows VMs reboot too fast, triggering failsafe xen-minimum-restart-time.patch- bnc#659070 - Fail to input '|' in en-us keyboard qemu_altgr_more.patch- bnc#659466 - XEN drbd block device type not working on SLES 11 SP1 20158-revert.patch- Revert changes made to snapshot-xend.patch and snapshot-ioemu-restore.patch made on 2010-11-19. The changes were intended to fix bnc#651822, but testing revealed additional changes were needed to completely resolve the bug. bnc#651822 will be fixed in a subsequent maintenance release.- bnc#654543 - PV guest won't unplug the IDE disk created by qemu-dm a dirty hack, only add the device to drives_table[] if we are FV domU, that will be unplugged anyway if a PV driver is loaded later. ioemu-disable-emulated-ide-if-pv.patch- Upstream patch to replace xenfb_32bpp.patch 7426-xenfb-depth.patch- bnc#651822 make sure we only apply the snapshot once, and the changes made after snapshot-apply hit the disk. snapshot-xend.patch snapshot-without-pv-fix.patch- fate#310510 - fix xenpaging xenpaging.HVMCOPY_gfn_paged_out.patch - remove incorrect and unneeded cleanup from do_memory_op subfunctions add mainline tag to merged patches- bnc#613584 - If available, use kpartx '-f' option in domUloader- bnc#659872 - xend: Do no release domain lock on checkpoint operation.- Upstream patches from Jan 22431-p2m-remove-bug-check.patch 22448-x86_64-gdt-ldt-fault-filter.patch 22466-x86-sis-apic-bug.patch 22451-hvm-cap-clobber.patch 22388-x2apic-panic.patch 22452-x86-irq-migrate-directed-eoi.patch- bnc#658163 - maintenance release - Nehalem system cannot boot into xen with maintenance release installed iommu-dom0-holes.patch x86-iommu-dom0-estimate.patch- bnc#659085 - physical host is rebooted with unknown reason Regression: Remove the patch 22071-ept-get-entry-lock.patch- Removed 7410-qemu-alt-gr.patch and altgr_2.patch. It causes a regression (see bnc#659070)- make stubdom build optional- pass -j N to stubdom build- add xenalzye from http://xenbits.xensource.com/ext/xenalyze.hg- hotplug-block-losetup-a.patch allow hardlinked blockdevices - fate#310510 - fix xenpaging xenpaging.paging_prep_enomem.patch - retry page-in if guest is temporary out-of-memory xenpaging.print-arguments.patch - print arguments passed to xenpaging xenpaging.machine_to_phys_mapping.patch - invalidate array during page deallocation xenpaging.autostart_delay.patch - fold xenpaging.enabled.patch into this patch - set xenpaging_delay to 0.0 to start xenpaging right away- bnc#654591 - SLES11 SP0->Sp1 regression? (Xen, HVMs, NPIV) Fixed xen-qemu-iscsi-fix.patch- blktap2 patch - fix problem that blktap2 device info not cleared when block-attach fail. blktap2.patch- bnc#655438 - Using performance counter in domU on Nehalem cpus 22417-vpmu-nehalem.patch - Upstream patches from Jan 22389-amd-iommu-decls.patch 22416-acpi-check-mwait.patch 22431-p2m-remove-bug-check.patch- bnc#656245 - VUL-1: hypervisor: application or kernel in any pv Xen domain can crash Xen x86_64-gdt-ldt-fault-filter.patch- bnc#654050 - Python: a crasher bug in pyexpat - upstream patch needs backporting 22235-lxml-validator.patch- bnc#628729 - Add a small, fast alternative to 'xm list' for enumerating active domains. xen-list is a C program that uses libxenstore and libxenctl directly, bypassing the python toolstack. xen-utils-0.1.tar.bz2- bnc#628729 - Add a small, fast alternative to 'xm list' for enumerating active domains. xen-list is a C program that uses libxenstore and libxenctl directly, bypassing the python toolstack. xen-utils-0.1.tar.bz2- bnc#651822 - xm snapshot-xxx scripts lead to an XP SP3 HVM domU to chkdsk snapshot-xend.patch snapshot-ioemu-restore.patch- bnc#651957 - Xen: vm-install failed to start xenpaging.enabled.patch- fate#310510 - fix xenpaging xenpaging.signal_handling.patch - unlink pagefile in signal handler- Upstream patch for python 2.7 compatibility 22045-python27-compat.patch- bnc#641144 - FV Xen VM running windows or linux cannot write to virtual floppy drive bdrv_default_rwflag.patch- fate#310510 - fix xenpaging xenpaging.optimize_p2m_mem_paging_populate.patch xenpaging.HVMCOPY_gfn_paged_out.patch- bnc#649864 - automatic numa cpu placement of xen conflicts with cpupools 22326-cpu-pools-numa-placement.patch- fate#310510 - fix xenpaging xenpaging.populate_only_if_paged.patch - revert logic, populate needs to happen unconditionally xenpaging.p2m_mem_paging_populate_if_p2m_ram_paged.patch - invalidate current mfn only if gfn is not in flight or done xenpaging.mem_event_check_ring-free_requests.patch - print info only if 1 instead of 2 slots are free xenpaging.guest_remove_page.patch - check mfn before usage in resume function xenpaging.machine_to_phys_mapping.patch - check mfn before usage in resume function- bnc#552115 - Remove target discovery in block-iscsi modified block-iscsi script- bnc#649277 - Fix pci passthru in xend interface used by libvirt 22369-xend-pci-passthru-fix.patch- bnc#642078 - xm snapshot-create causes qemu-dm to SEGV snapshot-without-pv-fix.patch- fate#310510 - fix xenpaging xenpaging.num_pages_equal_max_pages.patch- bnc#647681 - L3: Passthrough of certain PCI device broken after SLES 11 to SP1 upgrade - bnc#650871 - Regression in Xen PCI Passthrough 22348-vtd-check-secbus-devfn.patch - Upstream patches from Jan 22223-vtd-workarounds.patch (bnc#652935) 22231-x86-pv-ucode-msr-intel.patch 22232-x86-64-lahf-lm-bios-workaround.patch 22280-kexec.patch 22337-vtd-scan-single-func.patch- bnc#497149 - SLES11 64bit Xen - SLES11 64bit HVM guest has corrupt text console stdvga-cache.patch- fate#310510 - fix xenpaging xenpaging.page_already_populated.patch xenpaging.notify_policy_only_once.patch xenpaging.guest_remove_page.patch xenpaging.machine_to_phys_mapping.patch remove xenpaging.memory_op.patch, retry loops are not needed- bnc#474789 - xen-tools 3.3 rpm misses pv-grub - PV-GRUB replaces PyGrub to boot domU images safely: it runs the regular grub inside the created domain itself and uses regular domU facilities to read the disk / fetch files from network etc.; it eventually loads the PV kernel and chain-boots it.- fate#310510 - fix xenpaging xenpaging.doc.patch - add /var/lib/xen/xenpaging directory- Some cleanup in the APIC handling code in the HyperV shim. hv_apic.patch- fate#310510 - fix xenpaging xenpaging.memory_op.patch, correct delay handling in retry loop- bnc#640370 - VM graphic console in VNC is corrupted xenfb_32bpp.patch- fate#310510 - fix xenpaging xenpaging.autostart_delay.patch delay start of xenpaging 7 seconds for smooth BIOS startup- fate#310510 - fix xenpaging xenpaging.tools_xenpaging_cleanup.patch- fate#310510 - fix xenpaging xenpaging.mem_event_check_ring-free_requests.patch- install /etc/xen/examples/xentrace_formats.txt to get human readable tracedata if xenalyze is not used- fate#310510 - fix xenpaging xenpaging.autostart_delay.patch xenpaging.blacklist.patch xenpaging.MRU_SIZE.patch remove xenpaging.hacks.patch, realmode works- Upstream patches from Jan including fixes for the following bugs bnc#583568 - Xen kernel is not booting bnc#615206 - Xen kernel fails to boot with IO-APIC problem bnc#640773 - Xen kernel crashing right after grub bnc#643477 - issues with PCI hotplug/hotunplug to Xen driver domain 22222-x86-timer-extint.patch 22214-x86-msr-misc-enable.patch 22213-x86-xsave-cpuid-check.patch 22194-tmem-check-pv-mfn.patch 22177-i386-irq-safe-map_domain_page.patch 22175-x86-irq-enter-exit.patch 22174-x86-pmtimer-accuracy.patch 22160-Intel-C6-EOI.patch 22159-notify-evtchn-dying.patch 22157-x86-debug-key-i.patch- fate#310510 - fix xenpaging xenpaging.signal_handling.patch xenpaging.autostart.patch xenpaging.hacks.patch- rename xenpaging.XENMEM_decrease_reservation.patch to xenpaging.memory_op.patch- bnc#632956 - fix VNC altgr-insert behavior 7410-qemu-alt-gr.patch altgr_2.patch- bnc#618087 - VNC view won't stay connected to fully virtualized Linux Xen VMs modified ioemu-vnc-resize.patch- bnc#639546 - Dom-U deleted after introduction of the parameter "change_home_server False" in the VM configuration change_home_server.patch- bnc#641859 - block-dmmd script does not handle the configuration when only MD is used modified block-dmmd script- fate#310510 - fix xenpaging xenpaging.populate_only_if_paged.patch- bnc#640773 - Xen kernel crashing right after grub 21894-intel-unmask-cpuid.patch - Upstream patch from Jan 22148-serial-irq-dest.patch- bnc#628719 - improve check_device_status to handle HA cases check_device_status.patch- bnc#628719 - multi-xvdp mutli-xvdp.patch- fate#310510 - fix xenpaging xenpaging.XENMEM_decrease_reservation.patch xenpaging.xenpaging_init.patch xenpaging.policy_linear.patch- bnc#632956 - fix VNC altgr-insert behavior 7410-qemu-alt-gr.patch altgr_2.patch- fate#310510 - fix xenpaging xenpaging.pageout_policy.patch xenpaging.xs_daemon_close.patch xenpaging.pagefile.patch xenpaging.mem_paging_tool_qemu_flush_cache.patch xenpaging.get_paged_frame.patch xenpaging.notify_via_xen_event_channel.patch- bnc#636231 - XEN: Unable to disconnect/remove CDROM drive from VM xend-devid-or-name.patch- Upstream patches from Jan 22019-x86-cpuidle-online-check.patch 22051-x86-forced-EOI.patch 22067-x86-irq-domain.patch 22068-vtd-irte-RH-bit.patch 22071-ept-get-entry-lock.patch 22084-x86-xsave-off.patch- bnc#638465 - hypervisor panic in memory handling 22135-heap-lock.patch- Update to Xen 4.0.1. This is a bug fix release.- bnc#635380 - Fix pygrub Grub2 support See update to Xen 4.0.1 for fixes- bnc#628701 - Improve performance when activate/deactivate dmmd devices modified block-dmmd script- bnc#628701 - Fix qemu-dm handling of dmmd devices modified xen-qemu-iscsi-fix.patch- bnc#626262 - Populate-on-demand memory problem on xen with hvm guest 21971-pod-accounting.patch- bnc#584204 - xm usb-list broken usb-list.patch- bnc#625520 - TP-L3: NMI cannot be triggered for xen kernel 21926-x86-pv-NMI-inject.patch- bnc#613529 - TP-L3: kdump kernel hangs when crash was initiated from xen kernel 21886-kexec-shutdown.patch- Upstream Intel patches to improve X2APIC handling. 21716-iommu-alloc.patch 21717-ir-qi.patch 21718-x2apic-logic.patch- bnc#623833 - Error in Xend-API method VM_set_actions_after_crash 21866-xenapi.patch- bnc#625003 - Fix vm config options coredump-{restart,destroy} Added hunk to xm-create-xflag.patch- bnc#605186 - Squelch harmless error messages in block-iscsi- bnc#623438 - Add ability to control SCSI device path scanning in xend 21847-pscsi.patch- Enable the packaging of create.dtd. This is needed for when xm is configured to use xenapi.- bnc#624285 - TP-L3: xen rdtsc emulation reports wrong frequency 21445-x86-tsc-handling-cleanups-v2.patch- bnc#623201 - drbd xvd will fail in new xen4 packages due to wrong popen2 arguments in blkif.py popen2-argument-fix.patch- bnc#620694 - Xen yast vm-install for existing paravirtualized disk fails with UnboundLocalError: local variable 'dev_type' referenced before assignment 21678-xend-mac-fix.patch- bnc#586221 - cannot add DomU with USB host controller defined domu-usb-controller.patch (Chun Yan Liu)- Upstream patches from Jan 21151-trace-bounds-check.patch 21627-cpuidle-wrap.patch 21643-vmx-vpmu-pmc-offset.patch 21682-trace-buffer-range.patch 21683-vtd-kill-timer-conditional.patch 21693-memevent-64bit-only.patch 21695-trace-t_info-readonly.patch 21698-x86-pirq-range-check.patch 21699-p2m-query-for-type-change.patch 21700-32on64-vm86-gpf.patch 21705-trace-printk.patch 21706-trace-security.patch 21712-amd-osvw.patch 21744-x86-cpufreq-range-check.patch 21933-vtd-ioapic-write.patch 21953-msi-enable.patch- bnc#599550 - Xen cannot distinguish the status of 'pause' 21723-get-domu-state.patch- bnc#604611 - Do not store vif device details when vif config contains invalid mac address. 21653-xend-mac-addr.patch- linux pvdrv: generalize location of autoconf.h Fixes error because of missing autoconf.h when building os11.2 Factory.- bnc#609153 - xm migrate localhost -l fails on Windows VMs 21615-dont-save-xen-heap-pages.patch - Upstream fixes from Jan 21446-iommu-graceful-generic-fail.patch 21453-shadow-avoid-remove-all-after-teardown.patch 21456-compat-hvm-addr-check.patch 21492-x86-pirq-unbind.patch 21526-x86-nehalem-cpuid-mask.patch 21620-x86-signed-domain-irq.patch- bnc#612189 - Clear APIC Timer Initial Count Register when masking timer interrupt 21542-amd-erratum-411.patch- bnc#610658 - XEN: PXE boot fails for fully virtualized guests - e1000 virtual nic. (see also bnc#484778) enable_more_nic_pxe.patch- bnc#608191 - /var/adm/fillup-templates/sysconfig.xend from package xen-tools is no valid sysconfig file xend-sysconfig.patch- bnc#608194 - /etc/xen/* config files are not packaged with noreplace- bnc#569744 - SLE HVM guest clock/timezone is incorrect after reboot 21460-xend-timeoffset.patch- bnc#606882 - Allow spaces in vbd path names 21459-block-script.patch- bnc#591799 - The status of Caps Lock is incorrect in domU capslock_enable.patch- Upstream fixes from Jan including a fix for Intel's ATS issue 21435-vmx-retain-global-controls.patch 21406-x86-microcode-quiet.patch 21421-vts-ats-enabling.patch- bnc#607219 - AMD Erratum 383 workaround for Xen 21408-amd-erratum-383.patch- Added modprobe of evtchn to init.xend. The kernel will also need to build evtchn as a module for this to be meaningful.- bnc#603008 - On an 8 Socket Nehalem-EX system, the fix for 593536 causes a hang during network setup. - Upstream patches from Jan. 21360-x86-mce-polling-disabled-init.patch 21372-x86-cross-cpu-wait.patch 21331-svm-vintr-during-nmi.patch 21333-xentrace-t_info-size.patch 21340-vtd-dom0-mapping-latency.patch 21346-x86-platform-timer-wrap.patch 21373-dummy-domain-io-caps.patch- bnc#605182 - /etc/xen/scripts/xen-hotplug-cleanup: line 24: [: !=: unary operator expected 21129-xen-hotplug-cleanup.patch- bnc#599929 - Hot add/remove Kawela NIC device over 500 times will cause guest domain crash passthrough-hotplug-segfault.patch- bnc#603583 - Fix migration of domUs using tapdisk devices 21317-xend-blkif-util-tap2.patch suse-disable-tap2-default.patch- Match upstreams cpu pools switch from domctl to sysctl - Upstream replacements for two of our custom patches (to ease applying further backports) - Fixed dump-exec-state.patch (could previously hang the system, as could - with lower probability - the un-patched implementation)- bnc#593536 - xen hypervisor takes very long to initialize Dom0 on 128 CPUs and 256Gb 21272-x86-dom0-alloc-performance.patch 21266-vmx-disabled-check.patch 21271-x86-cache-flush-global.patch- bnc#558815 - using multiple npiv luns with same wwpn/wwnn broken - bnc#601104 - Xen /etc/xen/scripts/block-npiv script fails when accessing multiple disks using NPIV block-npiv- bnc#595124 - VT-d can not be enabled on 32PAE Xen on Nehalem-EX platform 21234-x86-bad-srat-clear-pxm2node.patch bnc#585371 - kdump fails to load with xen: locate_hole failed 21235-crashkernel-advanced.patch- bnc#588918 - Attaching a U-disk to domain's failed by "xm usb-attach" init.xend- bnc#596442 - Preserve device config on domain start failure xend-preserve-devs.patch- bnc#597770 - insserv reports a loop between xendomains and openais. Remove openais from Should-Start in xendomains script.- bnc#569194 - Tools-side fixes for tapdisk protocol specification blktap-script.patch ioemu-subtype.patch Modified xen-domUloader.diff- Upstream bug fixes from Jan 21089-x86-startup-irq-from-setup-gsi.patch 21109-x86-cpu-hotplug.patch 21150-shadow-race.patch 21160-sysctl-debug-keys.patch- Updated to Xen 4.0.0 FCS, changeset 21091- Change default lock dir (when domain locking is enabled) to /var/lib/xen/images/vm_locks - Support SXP config files in xendomains script- Update to changeset 21087 Xen 4.0.0 RC9.- Update to changeset 21075 Xen 4.0.0 RC8.- bnc#584210 - xm usb-hc-destroy does not remove entry from xend del_usb_xend_entry.patch- Update to changeset 21057 Xen 4.0.0 RC7.-Fix bnc#466899 - numa enabled xen fails to start/create vms adjust_vcpuaffinity_more_cpu.patch- Update to changeset 21022 Xen 4.0.0 RC6.- bnc#586510 - cpupool fixes cpu-pools-update.patch- bnc#582645 - Xen stuck, mptbase driver attempting to reset config request- Update to changeset 20990 Xen 4.0.0 RC5.- bnc#556939 - Improve device map cleanup code in domUloader- bnc# 578910 - xm block-detach does not cleanup xenstore hotplug-cleanup-fix.patch- bnc#579361 - Windows Server 2003 cannot wake up from stand by in sp1 hibernate.patch- fate#308852: XEN CPU Pools cpupools-core.patch cpupools-core-fixup.patch keyhandler-alternative.patch cpu-pools-libxc.patch cpu-pools-python.patch cpu-pools-libxen.patch cpu-pools-xmtest.patch cpu-pools-docs.patch- bnc#558760: Disable scsi devices when PV drivers are loaded.- Update to changeset 20951 Xen 4.0.0 RC4 for sle11-sp1 beta5.- bnc#572146 - SLES11 SP1 beta 2 Xen - BUG: soft lockup - CPU#31 stuck for 61s! [kstop/31:4512] cpuidle-hint-v3.patch- Update to changeset 20900 RC2+ for sle11-sp1 beta4.- bnc#573376 - OS reboot while create DomU with Windows CD- bnc#573881 - /usr/lib64/xen/bin/qemu-dm is a broken link- Update to changeset 20840 RC1+ for sle11-sp1 beta3.- bnc#569581 - SuSEfirewall2 should handle rules. Disable handle_iptable in vif-bridge script vif-bridge-no-iptables.patch- bnc#569577 - /etc/modprove.d/xen_pvdrivers, installed by xen-kmp-default, to ../xen_pvdrivers.conf- bnc#564406 - Make the new PV drivers work with older hosts that do not understand the new PV driver protocol.- Upstream Xen version renamed to 4.0.0 in changeset 20624 & 20625.- fate#307594: HP-MCBS: XEN: support NR_CPUS=256 This is a spec file change (xen.spec)- bnc#555152 - "NAME" column in xentop (SLES11) output limited to 10 characters unlike SLES10 The update to c/s 20572 includes this fix (at c/s 20567).- Modify xen-paths.diff- Merge xend-tap-fix.patch to xen-domUloader.diff remove part of it which accepted by upstream- Load gntdev module in xend init script similar to blkbk, netbk, etc.- Backport dmmd from sles11/xen block-dmmd xen-qemu-iscsi-fix.patch xen.spec- Fix regression when create_vbd for tap xend-tap-fix.patch- Temporarily disable libxl because of libconfig dependency.- fate#302864 domUloader support lvm in disk domUloader.py Note: for test in Beta1, if not good, remove it- fate#302864 domUloader support fs on whole disk domUloader.py- Turn KMPs back on now that kernel side fix is checked in.- fate#304415 VMM: ability to switch networking mode Add vif-route-ifup to handle routed configurations using sysconfig scripts. vif-route-ifup.patch- fate#307540 USB for Xen VMs usb-add.patch- fate#305545 XEN extra descriptive field within xenstore add_des.patch- Update to Xen version 3.5.0 for the following features. fate#304226 XEN: FlexMigration feature of VT-x2 support fate#305004 Add SR-IOV PF and VF drivers to Vt-d enabled Xen fate#306830 T states in Xen controlling by MSR fate#306832 Fix for xen panic on new processors fate#306833 Westmere and Nehalem-EX: Add support for Pause Loop exiting feature for Xen fate#306835 Xen: server virtual power management enhacement fate#306837 VT-d2 - PCI SIG ATS support fate#306872 Xen: Node manager support P/T-states change when Vt-d enable fate#306873 Xen: SMP guest live migration may fail with hap=1 on NHM fate#306875 Westmere: LT-SX (Xen) fate#306891 RAS features for Xen: Add support for Machine Check and CPU/Memory online/offline features fate#307322 1GB page support in Xen fate#307324 Xen IOMMU support- bnc#541945 - xm create -x command does not work in SLES 10 SP2 or SLES 11 xm-create-xflag.patch- Minor enhancement to xen-updown.sh sysconfig hook- Add patch ioemu-bdrv-open-CACHE_WB.patch for install guest on tapdisk very very slow.- Add temporary workaround for race between xend writing and qemu-dm reading from xenstore. The issue is preventing PV domUs from booting as they have no backend console. qemu-retry-be-status.patch - bnc#520234 - npiv does not work with XEN Update block-npiv - bnc#496033 - Support for creating NPIV ports without starting vm block-npiv-common.sh block-npiv-vport Update block-npiv - bnc#500043 - Fix access to NPIV disk from HVM vm Update xen-qemu-iscsi-fix.patch- bnc#513921 - Xen doesn't work get an eror when starting the install processes or starting a pervious installed DomU 20125-xc-parse-tuple-fix.patch- bnc#536176 - Xen panic when using iommu after updating hypervisor 19380-vtd-feature-check.patch- bnc#530959 - virsh autostart doesn't work Fixing this libvirt bug also required fixing xend's op_pincpu method with upstream c/s 19580 19580-xend-pincpu.patch- bnc#534146 - Xen: Fix SRAT check for discontig memory 20120-x86-srat-check-discontig.patch- bnc#491081 - Xen time goes backwards x3950M2 20112-x86-dom0-boot-run-timers.patch- disable module build for ec2 correctly to fix build (at the suse_kernel_module_package macro)- bnc#524071 - implemented workaround for a windows7 bug. hv_win7_eoi_bug.patch- bnc#524180 - xend memory leak resulting in long garbage collector runs 20013-xend-memleak.patch- Upstream bugfixes from Jan. 19896-32on64-arg-xlat.patch 19960-show-page-walk.patch 19945-pae-xen-l2-entries.patch 19953-x86-fsgs-base.patch 19931-gnttblop-preempt.patch 19885-kexec-gdt-switch.patch 19894-shadow-resync-fastpath-race.patch - hvperv shim patches no longer require being applied conditionally- bnc#520234 - npiv does not work with XEN in SLE11 Update block-npiv - bnc#496033 - Support for creating NPIV ports without starting vm block-npiv-common.sh block-npiv-vport Update block-npiv - bnc#500043 - Fix access to NPIV disk from HVM vm Update xen-qemu-iscsi-fix.patch- Don't build the KMPs for the ec2 kernel.- Upstream fixes from Jan Beulich 19606-hvm-x2apic-cpuid.patch 19734-vtd-gcmd-submit.patch 19752-vtd-srtp-sirtp-flush.patch 19753-vtd-reg-write-lock.patch 19764-hvm-domain-lock-leak.patch 19765-hvm-post-restore-vcpu-state.patch 19767-hvm-port80-inhibit.patch 19768-x86-dom0-stack-dump.patch 19770-x86-amd-s3-resume.patch 19801-x86-p2m-2mb-hap-only.patch 19815-vtd-kill-correct-timer.patch - Patch from Jan Beulich to aid in debugging bnc#509911 gnttblop-preempt.patch- bnc#515220 - qemu-img-xen snapshot Segmentation fault qemu-img-snapshot.patch update- bnc#504491 - drop write data when set read only disk in xen config bdrv_open2_fix_flags.patch bdrv_open2_flags_2.patch- Upstream fixes from Jan Beulich. 19474-32on64-S3.patch 19490-log-dirty.patch 19492-sched-timer-non-idle.patch 19493-hvm-io-intercept-count.patch 19505-x86_64-clear-cr1.patch 19519-domctl-deadlock.patch 19523-32on64-restore-p2m.patch 19555-ept-live-migration.patch 19557-amd-iommu-ioapic-remap.patch 19560-x86-flush-tlb-empty-mask.patch 19571-x86-numa-shift.patch 19578-hvm-load-ldt-first.patch 19592-vmx-exit-reason-perfc-size.patch 19595-hvm-set-callback-irq-level.patch 19597-x86-ioport-quirks-BL2xx.patch 19602-vtd-multi-ioapic-remap.patch 19631-x86-frametable-map.patch 19653-hvm-vcpuid-range-checks.patch- bnc#382112 - Caps lock not being passed to vm correctly. capslock_enable.patch- bnc#506833 - Use pidof in xend and xendomains init scripts- bnc#484778 - XEN: PXE boot of FV domU using non-Realtek NIC fails enable_more_nic_pxe.patchcross-migrate.patch - bnc#390961 - cross-migration of a VM causes it to become unresponsive (remains paused after migration)- Patches taken to fix the xenctx tool. The fixed version of this tool is needed to debug bnc#502735. 18962-xc_translate_foreign_address.patch 18963-xenctx.patch 19168-hvm-domctl.patch 19169-remove-declare-bitmap.patch 19170-libxc.patch 19171-xenctx.patch 19450-xc_translate_foreign_address.patch-bnc#485770 - check exsit file for save and snapshot-create xm-save-check-file.patch snapshot-xend.patch-bnc#503782 - Using converted vmdk image does not work ioemu-tapdisk-compat-QEMU_IMG.patch- bnc#503332 - Remove useless qcow tools /usr/sbin/{qcow-create,img2qcow,qcow2raw} from xen-tools package.- bnc#474738 - adding CD drive to VM guest makes it unbootable. parse_boot_disk.patch- bnc#477892 - snapshot windows can't accomplish. snapshot-xend.patch- bnc#495300 - L3: Xen unable to PXE boot Windows based DomU's 18545-hvm-gpxe-rom.patch, 18548-hvm-gpxe-rom.patch- bnc#459836 - Fix rtc_timeoffset when localtime=0 xend-timeoffset.patch- bnc#497440 - xmclone.sh script incorrectly handles networking for SLE11.- bnc#477890 - VM becomes unresponsive after applying snapshot- bnc#494892 - Update xend-domain-lock.patch to flock the lock file.- bnc#439639 - SVVP Test 273 System - Sleep Stress With IO" fails Turned off s3/s4 sleep states for HVM guests.- bnc#468169 - fix domUloader to umount the mounted device mapper target in dom0 when install a sles10 guest with disk = /dev/disk/by_path- bnc#488490 - domUloader can't handle block device names with ':' - bnc#486244 - vms fail to start after reboot when using qcow2- bnc#490835 - VTd errata on Cantiga chipset 19230-vtd-mobile-series4-chipset.patch- bnc#482515 - Missing dependency in xen.spec- Additional upstream bug fix patches from Jan Beulich. 19132-page-list-mfn-links.patch 19134-fold-shadow-page-info.patch 19135-next-shadow-mfn.patch 19136-page-info-rearrange.patch 19156-page-list-simplify.patch 19161-pv-ldt-handling.patch 19162-page-info-no-cpumask.patch 19216-msix-fixmap.patch 19268-page-get-owner.patch 19293-vcpu-migration-delay.patch 19391-vpmu-double-free.patch 19415-vtd-dom0-s3.patch- Imported numerous upstream bug fix patches. 19083-memory-is-conventional-fix.patch 19097-M2P-table-1G-page-mappings.patch 19137-lock-domain-page-list.patch 19140-init-heap-pages-max-order.patch 19167-recover-pat-value-s3-resume.patch 19172-irq-to-vector.patch 19173-pci-passthrough-fix.patch 19176-free-irq-shutdown-fix.patch 19190-pciif-typo-fix.patch 19204-allow-old-images-restore.patch 19232-xend-exception-fix.patch 19239-ioapic-s3-suspend-fix.patch 19240-ioapic-s3-suspend-fix.patch 19242-xenstored-use-after-free-fix.patch 19259-ignore-shutdown-deferrals.patch 19266-19365-event-channel-access-fix.patch 19275-19296-schedular-deadlock-fixes.patch 19276-cpu-selection-allocation-fix.patch 19302-passthrough-pt-irq-time-out.patch 19313-hvmemul-read-msr-fix.patch 19317-vram-tracking-fix.patch 19335-apic-s3-resume-error-fix.patch 19353-amd-migration-fix.patch 19354-amd-migration-fix.patch 19371-in-sync-L1s-writable.patch 19372-2-on-3-shadow-mode-fix.patch 19377-xend-vnclisten.patch 19400-ensure-ltr-execute.patch 19410-virt-to-maddr-fix.patch- bnc#483565 - Fix block-iscsi script. Updated block-iscsi and xen-domUloader.diff- bnc#465814 - Mouse stops responding when wheel is used in Windows VM. mouse-wheel-roll.patch (James Song) - bnc#470704 - save/restore of windows VM throws off the mouse tracking. usb-save-restore.patch (James Song)- bnc#436629 - Use global vnc-listen setting specified in xend configuration file. xend-vnclisten.patch - bnc#482623 - Fix pygrub to append user-supplied 'extra' args to kernel args. 19234_pygrub.patch- bnc#481161 upgrade - sles10sp2 to sles11 upgrade keeps xen-tools-ioemu- Don't load 8139* driver if xen-vnif works [bnc#480164]lamb51 1499634064  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGH4.9.0_08-2.14.9.0_08-2.1  xenhtmlhypercallarmindex.htmlindex.htmlx86_32index.htmlx86_64index.htmlindex.htmlmanindex.htmlxen-pci-device-reservations.7.htmlxen-tscmode.7.htmlxen-vtpm.7.htmlxen-vtpmmgr.7.htmlxenstore-chmod.1.htmlxenstore-ls.1.htmlxenstore.1.htmlxentop.1.htmlxentrace.8.htmlxentrace_format.1.htmlxl-disk-configuration.5.htmlxl.1.htmlxl.cfg.5.htmlxl.conf.5.htmlxlcpupool.cfg.5.htmlmiscamd-ucode-container.txtarmbooting.txtdevice-treeacpi.txtbooting.txtguest.txtindex.htmlpassthrough.txtearly-printk.txtindex.htmlpassthrough.txtsilicon-errata.txtblock-scripts.txtconsole.txtcrashdb.txtdistro_mapping.txtdump-core-format.txtgrant-tables.txtindex.htmlkconfig-language.txtkconfig.txtkexec_and_kdump.txtlibxl_memory.txtprintk-formats.txtqemu-backends.txtqemu-deprivilege.txtstubdom.txtvtd-pi.txtvtd.txtvtpm-platforms.txtxen-error-handling.txtxenmon.txtxenpaging.txtxenstore-ring.txtxenstore.txtxsm-flask.txtmisccrashdb.txtvtpm-platforms.txtxen-command-line.markdownxenpaging.txtxenstore-paths.markdown/usr/share/doc/packages//usr/share/doc/packages/xen//usr/share/doc/packages/xen/html//usr/share/doc/packages/xen/html/hypercall//usr/share/doc/packages/xen/html/hypercall/arm//usr/share/doc/packages/xen/html/hypercall/x86_32//usr/share/doc/packages/xen/html/hypercall/x86_64//usr/share/doc/packages/xen/html/man//usr/share/doc/packages/xen/html/misc//usr/share/doc/packages/xen/html/misc/arm//usr/share/doc/packages/xen/html/misc/arm/device-tree//usr/share/doc/packages/xen/misc/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/openSUSE:Leap:42.3/standard/130ef2f510ced3382abaceef1c9f25ec-xencpiolzma5x86_64-suse-linuxdirectoryHTML document, ASCII textXML document textC source, ASCII textASCII textC++ source, ASCII textC++ source, ASCII text, with very long lines,<2z# f_?p] crt:bLLl(kR1B T5+! $ lrLH74ZC΁;Kl\l&RìO^s.Ֆ9 Ք/k$ilaʌZކw;۱P.nP7 `z1tl%a8-MdjM"_g $hl)Bbt1딡nV[BS4Qz o6cex[ ;a^;5We rK[ 㠦uG(+E02ۛ鬔|kz׻S `r:bj,feXٮ; $0@rT|fg<&!G< n=g&ݚM 74oF719 I^ f/c0|}j yP,G%B{ېQ:}<#utc' 6!Л35B[©N fscFoXeBMOk_,Cr 3cd4=^֫?\}T-څy|? y#*GC.x+lx8OW}KZTi,CXD!ľ[wy0F Q] 1.[Adڳ! CHa@/9oąwwYiHnr=}Q2dŔS at&z-:dHdEziB ef˦,Jq= ^v1FG#VPU=s "諵mhR"^.=$[dl+.q1D+z\]&oNuRbyoRZ"fpCe $ niw*Bű/t[V 3u;3(:oe^0Յ0 ϏXb (9r{ н+w2b \2׌L}U~ @>n1r4OХ)It2#zs?#9K{Y HxmWATmx%r=/B/oBA`3"ZRRyZ!וk Wo $l{*\L%IqȤ6_0>>.t3Vg>tJ#cg s60em,B@N סh{^ov'C1]R!,lLW8Gb ^IaFCQT*҇|1?f_R-(hGa6fG n;l3a]U'XIJ:.ѧ>)ǁG)%.v >U6 >fnuQ3,uHsl? P|}j"Hj^ð kIۋJxU+x33/UIv_9?9/EY~n+5H(]ѴVJ>_"A49~ّN8;>&(C7t!x aaF9 jprV-w M4{7 De%i \6@b˓èdꔈ}_mLzؒp}?0 /$ *}_"K[LAFi,N7!r L|љP)AIÓW29nZJWN<&:Zge-,O˔뚼챾nJT!>- ʭ`e_FT0!zm sxU' @Ѵx'pٺ4Ѷ߯`N)*"3=e*r}ʑe?CG&^ohj}M;{tAbx hE$H W[J 9Kfi;^,,z)E(-K/.P"6o%DV,0c5ٯJ`=7|0d+Z:A^nf/H(bns|Zst4F-厲ŜS"B*k(FB?.qlqhp8ӨVIw >i}qWF i}EM)F $맋[,ޟhmB(DQL&EIY8F40x鶂>:"'w?\bd&Wkl5|f Dž)j38ahɵlp:ySq~I% э8]'r |Rl_">@݅-eRȯ{/k>7"[PT*ᛓyyNkvc[y9u_ @tTEAjUt@@톀 o lT&;n>MYܚ'=wRTw-nnCrV6U6S^89!qNXjN{Hn+'W{jf|/ zl?'9W=ҁ}'8,`3{M2J|zCyqx"^|@E^S̪/?Эft&"^S_}8Rk8eGp/E}ț?u] bνğӽ4Y}"u6t+8O˂; DhpgGUuxLI!O_zI֫rz& N-mߘ iaϗޑև(C4 zj1R?݆w;e`I,vy@;vZ \!pKpbxަ\B>4m3?60|ߑ1?d\ߔZFb $;'t %NMQpkU`k -rT$oKc |.hW@: ] @*si `''Q ʞnC4*V ߩ˙ [KȞB8ؚ%Z P=7伔" 9yYkq$Ҧ;RzSݖ~ɚX#攦h$M0-L17=]šXR8`HY>mɸudF'8p/2;rlbc`oa6s?X;0ĴUV-qY(˦ۼC,n~LUjUϏb+YHS `%>v‚`C|M tNmj8 BHht.%\ nw8``&}^qKu7AGxpgےڹY xTJaõ+@KZdvT){D!IopM?tyUq;4.d-oOk:#h)8B*5ş5ji`'ۻ#(q^ v}$2t7x TvF~=fPۘ۲yrIy6F?h>ޯKȗc-CF&ZD P7v皗ԾxʅE] o>z}j2x$zrXm!zV^MD$ ÌxHS6Xy56a50g<|x6=㲭$k yؘUyuj AEW',Ɠ.W ~Gdtm m;H 'hH/cߊrXxىxZWLp>~ їΙhZW3ETnsIڄ5ZU`fKP"YT24>.O fQxUd\mup[(>1eZZn,p7—*`B! SItۚDF9DUӨ"<ʼnޢNL^Red8!ZI#5H#C,f.[1M1O6Ԭ+(W^Ջ2hGErl83g.Y֏:i>WDSBy!K?oZAM{)oS#E0:?B.a ݈mHT3 8j9 EuD~A_tKGÓv䗙&w=te?70"ɦc[It<^AY5׼j:,,o1eQDT lC0`MK~9aNzYyuxtli8l%p6ϵ Bg;uvRN7asiZrVPHHQf?S_N_=ES/p%@&ud/j\Ka5G\> %Ҳ.8) :|/pFkk6,^[(LY%!A3;~0(hZyY/zWܖ&!˭$EKpPn*`E,᥻x!Qw܊+oh~% `Z,T/V%0g^2>xLm؃px,Z4 /bBJ~fWi)@#R %e[~+n&>i|Y*"3aGL = QK)#fL'2t)*VP6Gmh}[6OOPvAB%Xq:J1'G4e>zO}ߗ:CeĖTp1ƃxɂ ,-!\R誘( ak$oQ5{K薟NbQ^ B>Xn x򩣏\m++xȀ^2};Юxp?OCI j&B=lx2rt@tpbSF.(&ŏx_֌/cN5 WbrN7a}| =դSQ[ih,vcdiq?{Oj,v˲uZte606BcdYTLC%ی1_y] ѻvծWldl=}v5tޞC[M湩(-}['la`PmRUMM_y1mMb3xv9ţjC9` A t^p>Ƿ;xW վ'L=G>6TقeiCodMgh70zX)-ڈAw[fQO07[#*/q6`&3%}ί`K J&fErZ~GYxmm*7޹L`U^fƌ|rTMGpK&0M,?[(Yy3D˽Sէ)Q."n(,wcѽ+(WofPZOg!2/}69}dlc-8/Ѥi&thn=΍.c hD>UF*yAvGC9ǤQ -l-=o,HEN^ݵZs3YgS $XH( Wol=f*v.g0āhY?d$kk>XyqξMAhn Zpuj&[W^xvOAFǿRvPHUgkB5O#q(q' [K?yD8"=iׇMQ}x 3e륑.?U6?-PksB4_\cG[ix+(QOYPPd@ bXXl^kp5j`R}Y'f(h=Uqr{Oؔ͵'=uq ޡO& QU>y/n1o cJsxsRJh F8YިKzg>~!YzxxFhfEHEQNg 6mLE`MYOV;dIRlEF׳BsH!AJBDG">V#7[rtk<Q;x&l[!Kn(a.ΘJBGi*5/fՉ+V"Jl6eM1@l..rEQ)P޹tA;.&ت,+Qp_ 혚+k瘅 ?rSu P+ qfc,%+ [G{OM1WP#oTc!ɮz>A[mY:=ߊ05}8صtkTX_ǂ^xKdǜg jSJZn5(,𚰫)p/4؄= <-Ip ls3q0.;۰'%AfyhXZy}`֘RA(i.Zߵ%Q`,‰w( N Rb DB-@|$:=?H*h#=H.WvԶbBaub!*>YXcq0ƃ @:ϟ|CnuAN)7xeHd蛃-6C09# %{AY[**X1TqX =z@swWְڎpmӪæދ=geΦ>'$l!e: P֕԰St ɤ&8S<=_#f髕[gɮ)}| {MֶOD>vBx1}=̧2ћ#dUךS2'e(-1E{hbpn\Q.^{\[l|?hQhˡ & X>55\IFެ9;0Oi,70s24/5!%suxĺ%ly 4֚uST)|S8]~a3g4 O& d%N[x+Ɠ O^6Riہg Oãmxi3PO8ړ.rmR φA%QF. b Z ϒ ~vY? %b 7݌€Ln;T`7:&#܁;{,'!OX%1%[|MIItsa7oP" Kmi({gn 1yg@$8WXyQ)6):( yRKQ]AIwM8j2D$fԷ/5:)amփ0s}WN\R𒡘X].qRHF_8ɗd{/3D4c]s7h OA8Ťa~oLGɺ1bUi룏~L^a >vup'Hv~bdy$dufzwZŦ|/R6;ŇpVf'-O,T8N=p˽VIHPzAc؉jQ(S@q߹gɾ}Kg~qAst$S028+ =<*;YE ju1Q|gi^p}ֽfbS$m?n &UGgIC_ VHHL'8Z׽lbsqer9BMI~NkkLr.݀d;̉{A3 Wl'?E֙-OHS&`6st5!N$a {Z"l@AK0oHi6ka G<@Rl(%T~m,Aߢ^!"0<$?1&R0,_G}1d~^QRo: >Alf.S{J7*y/Z[E!%;qגTSw8xICڡ*fi–W;.0[tr NEǦvJ$#tu_|rB!źc V-Qܹ^^'akVܐ,PTmm :>ﱻ(!$W|,ព`dÜ@+gehpFͱ?JLH゙-D=mœ8ڃ\SIqǔw.י/'qWC%hM6%ևb 6,@V&SۗԪ C3X[h_P_t[{|* z뭸)8c_?4>W- +å#(qw-hD% .i-3kݨQ$Ɛ@h͐WTd)3;I ng7~N^ ! n s}хh{[D}jZ)ZmA-@H$BMu/_h$>{TpHWf.^{U[[bb"qx S{;I*{(b}gTZH0A#AEw"S)b@V|sj=X~ uǹ7LT*f=>b`V䒷[2ΨhmŪg%VL4ޯ]b_ZTKq iTKuTjBL6{L wA9F*sIfeI$ VzT- "Qɢo"u#R-'T^5N9QCȗ&_r-g;R60a\x߱H݃kSQLCG]=5\n@ Cc4-)x wO"?8?X5|by9:ӕ]G)Ӂ`JX8$9tD]^~֏+vCi3' ;+]tbXޣ|)%52:I 9al)q/Mg犡}+X9-TO`Dn,\,8r0X\5-;ϹEq,`͞iZËU"WX[m {P.s$fYVOm\S PW5{L(x,fENt5 (P~j !KQ>D_NG}à{")^r,~RE S!;| Pɽi$h]ڳ!k b~7#NvTj"@0s]FDGڗT#8͵ءEL4޼BGX'a#KPmrSd;|n'-P"y?4p '@d5?+_6j&w{Μ^vDyZMX!%skVAu׼|]01IuA"8MϷ.t),Nb;aW (qOΜd-59aIBQ2IPRd?!v[>}RDNfDm7@\G"Xed6 ,8۰+73ae0w BR̂*?@z6ʡ^Π,BT2Z?|(nNQ5e޾?T2Ԏъk6'fisXyKL y@7O/;*z:rwl4=-oѩaQD6AMHzӸU@dȵ Ƀ1dz%Ϭq˙㸒]Q^ii{XdF wc[qMSsM]j8zGJETsKy(WwGRv WQwj~(aDS@ɡ)N= tW}oûAr,OJ1 [ ׍El #C%-={#0ot/%#6,˂a_7Ǩ)dvV%Lgr؏,+[ޛIu|f2ݵ^BT|JPYG`(V<5F}>{>KyP_6OB4Ĝj䡶`G.23;#oՋHjvv(̲K[G2e4L7B._\!B"RRXVo&^`uQ ޫM+,&]azg6&UExXCf摵QV`njB]dv6I,1eER+gqLpM<だwVй|ʈy2!1ȑ˱|ǾB-f0\o8{z;19as O]FW=8|.a`@[:t =$VaJ^Wdvai7c fMo Íe~ZTL^ SASVN~ \>TVuQ9e`vA={1-WwtזWJ Sb076IJ9l~s/m^\v2XP1c!E*~(?)ߛ0Lw #nD25)2[ ȠF\J=[y6x_gfȗ 8yc63^"TBDȢ$U at\쇓aB`;!QcZ9I6@<tf 5Wnbd7!mkPFP?3dMf ŵ̦{!$ua6cF 48YJQСZ `heɋc/r %6B@A%(+2mk N=w92{"hW4X0M)3))uǐNRBT"Z=^[U~qTR,\C"'3bJo0tٺ-,TmZgS`z㖺?[Ej"5)s Ϻ@V6bKjtʀwcs&*y9ɁP3"GTG`kc))e+G/\=COH_""RصK(%| 8R. Ĺur9s͵Ne:$1%K%wsCA )0 WؽwT24z۠#6(9."U>.=e;m>G)aĨTFٮF;Frt 2Iz$/tAּ]Ope;K}( 6ֺ!Pư5O *!#*=X HR eU_"-| D_, V/I׵dk/-ۦWUiUC9 ph9g"! Yʋ@x/=; $ih H{{KTS'"X}X!턠A4nk6}ǘ[8V#1|nBay2Yn.I=©\IG}J 2upB-D-0Fv D$dwf~X0 $ٗ6WAuah$դfCATN~>~x*l ЁQ[]* vuaT2sDKdn>!աD(ȟ|Tt>v?FWBܲ.WGDtƦJ|lLpi4ijTi=G1QGʡbO~un=dgBF /gјwb?N}0wP_ :\M4ߨ8V 3|u%ZUs$!sO]A=fvגּsD٫0;B+ "Hl[׋ ~ڷB1K#I+$5{[j@AkF7^isgVy1#}eum8X/6k9NL`K\ub_k0,E BOhRr#m-5cw61r(!%J@1Hs*$Om:&EKI_ppI{W@ofUq2!BD)[Kg{fߋ.qv2zd̑GXF_m 18nQKN'gqjqLG Pbubr|BP_OQ'/J$6ye>^;poaI0 ϠӴቮ0x_S&بJVr!c6FTFgx0h@`F!v] /K鎢MܸpP>cN7:ҁ͍2 >Ǹ5`Id=5 sr_~zYy`33DZ ѩ9,Xʳi<\K{Lj -@B_@+ $ G I8ke3T7J IތVSk7p! a405cGEoߤL"$ƳH~ ٰ\P%G}Mzt.Dig8~Fuؼ|ϻ!UrN5>Uc3>xԯy萁 n"- SI 01,o#(Q0A,PC5H]8;tfD2L:s$1_edy@ P?즑ʟ/P( (57u %[IjF,74P )Ul$c< j1B^v:|bv`G5ӾŭKrlàb7n)FbvA1^*W=~ފodrmQUl҉nqmw z5D{}&;K&ijNEMc,]piB8I|$SȗfB_AXA^NfͿCѨ rl^:}~D3J-:wV,g=pZF>4XÒ`5ru+V\C"wD)!&ڄz 'iY4'x^ԋv"AYQ ak1##PɾۯgS>5OM%B^KVuwL<1Ua@mDVq',x'dl4n6{Sxigko1΄z.jF. >*Ǥ59tw+>j)K/)v(zBĈ5Wn>*Fn(4|U<zsWߖebM+j/ t0a:8 ]%#tdç,)Ƅ⮘j RZE,O<}UwaQ$.8c1 #L#?LH#J[Zh"S$\wMehuxlWt ZKi-4i+FUܫl:?&(7NC;;,@;/;0:IT+LBtM#[?(,wKy#xYP0li  x |x/7ʆ4Xyjt9}Wmzb]^!ş[-m"e:')-e%oLCu`4&<:n5pHS|õƚm]0]9c4pM%@}r&JY-|:w b?ZLL,}@J]`^rx&ץR] dz4n+]Ov"C6{G(2}`{聄7A'8Ƃ9_;9,8B˜t揿"F"i[l]HfyEYj@l.)=5ܔs`16ɛZ؀ bOxWsMwiAzk7>ihrU󘣅%;r.+€[# tȜD%#Cӷ52fA;@ WL \C`N*~XexP$Q$yH,;$sS k7 3Cv, Y hQ}" i|3`䨝BD3'wE_朠 z^6?_ܡ)淜J(GZdZ&?|cm`#@> x.JxԞv&ޯָ0:>$?U/o~]1\сfʊJӖuV _]%>k3:oD ~.pXeZ'+!QUڐc*շ N{_ ,3F*GW' smS/eiu@cqOgLp}y\jC_-;d(^Rl`(*>'lş^oU\xHr~Lw+ԽC=3IoU eLuocr@UU&w $L#g@vh#ajW*NqJYfSIx%C쾽ކ?#Pzn?BsL 5's H>y !BK+*6yW5.3"GS"5.¾6=sﴲň >k+jCl+|;=I՜"*5}AL KNʃKþc3< 0Q2~DBwFqO` J !ipDr(X1{G/n"Dk,E4̖I t  q=Aϛ͍]MLwKm;m ?;η{p6y%n&+2ba l ŊU|PV[F'ęLmGQƋԜ `E%4 [|Mѷ\%+2 N*]r|*WARWv)*WkfJǼE0<{ ̌3[L#߷qd4%t#(U\:|ЎӄM}b(jޢ3hZܛl̕5O饠8!L+ |չ $!Ny=v(}{>e՚j aQ(͘Sb2KI0ƫW'a.E80M"{K^:(€:G6Vvh:=njHYwat':a WQS>ڽhVez[v`6Vœ6 `.m#rv̤gb$䏿%J `t%r6;ciOBF*Y] @&S G6 huwW͹@ H~~1+w{$j7=2b#/1ƛBH-B 5pEX<bajg)c@D ꌄZZJzK2C9!`n3eeNeZ)qeI!@cא;Dx>'^既mJ!{xCS ٵ #-愺m"mIqWjR MC%ƛ_OlQwP8q% *Tl> `RoE:c:sׁPtza*l <,Ep|Xd/I~X`ܙ`< SUK&fAV:y? ֎#h Tt~Mwm+:r $f}+HH7lE8& LYtt1O%dҨAV2 16Z&mni .;\aiM:tu'j!DFLl 7cY + LT|Y:V9Ts@;@@ayz6x(I̅FфoUi:\,qݻ<&EjSoLynM؅Ux|h}~_r1^E,J_Ҷ{et)O s2c}xN_^ eT֬gC|!r^sD½yL\ 6wyg t:VB1d6ݱ旜#+txz!?kxY"8 6A,X0C Okh&+U՘땤M q 7ÙӤOHV(oO8~\NWpxRG*( `Iƌ&_fJsi0#rR]+N_mg(dSP[Nh."Azқӏ*u c8b[CL0?(^#YV&>91 Pв@bߛB0X׀KEWʫ7oS+> $ŭcmqVvD`@;B3(Ef锬ljo;$>cz4i$%_{$li@q:@%“ Sz;\ýf |Qr]t>+-n7R'\Ǟ.͒CԙReA?\'ʛ'a/Ğ1]CaQϹ~]crFzFѥAuJEaVD`Jz('A2i,}<<ԻUیF#&sWmN?dӓrq:ys)o/\`ګۡBA;켓:,oy0 |Κr׉#%oɠ Jxn%g,_]Vp9Әy7*fiE7dk|4_O7Z<6R*oOnJ ܶ~15tLRءL͚ SYv*OFPj&EO) ̖ 7w{]q&1 m d ^Պ-7YM5fPqU7xP}Ij 7{x ތ$^);ϑebũ0jfHإ``?УWx!+ïĐ#H}98S GP$3Jh[٦zI>JjcKf;RF6v(bo_#Ү Yb4*sM~AID VR %N,qy=a%(1Pp̎tlִT M#ĺD?g5BшxY걣TLCτ0>5H BÝ=nj,VFಶ~<N@.k{D$RAF)pDeeVFt; jHK8T _}vN?r#?DZ-""bld* :W.;v"{Q{_P.0uM{ }-e޳G1O`R+ !DQL)pUI) 6FAH##HFDєq{Yr45Vy\kX0$!dmKk7*AMbŇ!aH-{Ij>šv f0a;֗tŘo֓"|IJy/ܦV␐湲vE&Fȴ+0\ں:(ym r.F*$z'g]).JJ}I(Wy᭖GC'݅:QƃE\<'P gJdD㦥,S\LUo_JIeǵ#ҍe\lK+JIaJ~߮,e '.|zQ= YWjh3&v4*4`hXedVeȜ|'ٰGx6X?Le-@B&*Ӵ@2G-M(=-gJGwfhi*JeKlTT}pq]6XAq0b`q;-2vH*"-|3Dz^2 "@l{ m%.,wn,$O]pOUO* y0%Bf،3.9l /fdxu*zÎQ|6 Z@1#7mS\lg~g_V[8~=0ufT0.[we2ݷuM:7t]u8];kȊlKH^ P C!I_pAqK%Upy-`&}(~&< KHlb6>|؂H1nk)L6Ԗ I_K&$pYOk2KMoI[( ]#J2A 8qv`1's4DnY5Z=Fe^ŠYp+`M*jR>=)-+*i;qB(` ԇhׇSxEms~*%䋭c_cүv@e"36kMM1JGLJ4}Q&4 :̚_oKNAx^쒿Hy-1ڏ+p)Fe7V>X=oi6ؤ">eo2GlF^ʙ=[x|܊f9њM$Mt5EA1=ɼL,Hg`-&ΓqU͠^Bnt[Lnl;1j,mpr C c˗$Ur8}+uwT5=n_#g wkߑl5ϪCLDnZM *DvcDO\ "h ~G@yy6˺PCX9ȌLNAC,QW3tV PJ\s2PY:l!˴dZ ܂XE:ċ:72;,Yn^(,1Wm1U`e,i㭴X4-)vcGK«_ 0Fp,i4f|?XWLf|/Ut՝ѻ+ Qߔyg p3-8[! X rKSE ~GAapzhvfDI G$%nS*ύobC{4;$π!$[5;Κ@{a$V؇0&GťiC3Mb&)c 5'^aOՄG8uF YL;p :&ZLU6MX"ڭ # #ebs\:AK(!cϒQa@nI NU~vnBLv\@Ky"MJEk $)RB=҈w17W5ۣHPn ;"@ɺ b%k#it@z@`y4Bo^z>ə2Wחt`ndJ_e\A.u Kc^( `|ۗ1;@Ť)6IߧЇnq_ԏ 5uC]/ A Ms萮K]w x귏\% eȑ{]5 P}uYw+Sh5O7kzq6N"&q6=+JGLVO<Ɛ͛V7r_j-E0ng#,{^a=*.10ԉnu?flp?щ6 ԋnN%1M<BI4plLYUCTիȦH,1FF&vC d#&}_yV"}5o^x 7zp(Y}ܷDGʌ'!v%qfDD˼ԭuկirF*aYrDv&Oնz|mIgeIѷ3/?sY[!H{IHh,(O-*;od^rRm[~DmId`Iy$b#3_e~6 )( lYɘ䔀zk[qZ=1SN4X}-t{d=ng7f c7@:BRڎ(}Y4 =-6 _WCw׶'v`+6Wv~9tZ]= $\T"}#!ݷI9}ܠO2_)'}ҳ[H؜X2O([Dž&]!i>iԴzXE.FS屪A&Yn ZU+hE fq׮gK[76KW m 娪%`O&)˜4"Ѕ+5bhѹ4ٗ5*֑Il7~Q.pJKѱbfL6%s(>F|L3;rD<I.AԈ3tjF HlI)8 g쒄M꺒-ndo@Zh/ż)Ų8-@/r\w ŧ+c௼$ٰMM9HJ6&i#mpLFՄZ#Meq;Eɋ;&}@W!ʕs?onFs@:=ݗcN$4n `|!u iaG3hoGE>MRe'D1hO3q ^\AN}rǑoncCVX@h ) tJff~1)hGQJpڢ_>Q8 i 8ڲ1vĘO7Z\>RlmN7{̳"Vd .# R{C`LFDM\Bm'$ML| |)O>MҽхPG߈bN,a|.YwmĜ b?rMϣJCgNb;lgruB3;O~ܠgV`wOJ )g..I$k/fQZ Rv5uX6$Hl#23*DR2r&txϺXO,#}X=j nS֥OOjw@[>oi,'}/LIܗ[\(E ` -'k / .Q=aHMIo `Bgj$']䟟&p@V#,byc/@I`1QKЉ8.@6CQ t{u="(a]IlTnC Gm@h8e5nIx%c|iOK"+n+j5}An(šF. y{'c=FiF0HlͤnL*R$!UFpS`&L{B3U1gšdj_nswO9TI?K!H3~eL0£y[L}H<~9=滱6ʲ$m˺(FOը:8ZCou ?BNۖ\4~aCvB@ p.y^)Teή&I8$t(Lw.Ȭ1?dR\yOKSqx58-S=T2X9j"P犲@B016cNťPSjBQ<Ļ̿j?3_}ͣ6ӫ\uYLK4Hk+Y}چ]E|&{Ax=xULMZ I\v("By"w VYF .xopg8kJBssAu1a/l=YDۜUH~T蘜 BkAd3 ĽZfC>TaoD:#JrF KC dXM[`Hd3JGE`oo6Pz|g fe \X_}B3\ɄZIWs?&4ɺքԤZUq!nfz.>0(Qs1D1"yoD|Idky+=mfs_Lf󓽽P3X]yTttd{*~VbQ):s_|LV4YLgŢBIC#Qب zzMv6CҪGe5?dT;eτi}.+*FΧ! sv Fu W-^J0{%^2$LԳ$"eX/ W==(mCEZQOr͈wa*&cO3;|!Ӓ"PG,j6nR)g#\ B܅?wҸk\ym8"!l9Clۂ:Y>ɍ4֤DJ/;E[#&ш. S|xâh^`V;࣎ '`VaGُEB|O&uj!F£(NCyu1!mG!B ¢0h3ov>-uY%E3Ͷ#LnsG< %1tZݪ-JUi (@к!*/ʒ@tpیlvT;?@#;b3"ےbAI7fdЋO}ҍ`pb|ƓM/螋JcSⱭo5Foې^^k00A]F)&_4n5? V\d[QU3M5?̡h"}KV/ l;Md2qB!v~Љ~hnXRq"ׅp {Lx/m,YiQ<\SVu8=&Hz+aHeqIPPC`mm:TUKq4,5ykB'[Gޮi&/k=/Oh4}xRlu;jhL&K DwMB A;A}ku-4gviƝMa2oKI'NNDxgY,zǖ.曶A uMK,ThOy!h%ɬR,bb,!Yњc~25Φբ9ƃ&5 @ "o]DIfw!{͂Ƿ* Qv6T21e6s-nd1}oqu[hNsJQovtUbz4mL8Hz_Lt9ocE;ts12"ьX{!iOM>`E >BݺɌ@$LIl"̏u5b٭Op\R>Y P y_{kmo;.$AV8`uY5coSJBͤ >ꏍLpo2}r&O]zܛ+vuQ 1W*6;%w%& #Gڲ,y2xLV6H/@q&7$>|>ZeY:R)ӽ`+1RӦ";}4@CP4u<)kƴW/j̲lEY@R-jXrLJ>m]tHc:!{1o ^Hn~J-A>j(y:1"z!`y&=(d`s7udҬN7>a OQMP~5qF%s%?j6W]/b̫XAC 3kv'HOy_Rg{Lr@En`cruo V?:N 'ŏI0hWNP! lgmm֏i:B'%.gK!{Tpt|* "ٻH8BR7Gը ;҉#w (_#Hٕzmgy0x=:T!w9 ]y^j h0h@GlAYcuglђDX$sTSI>,=6Hl-х%B&6gFA}3N"9$3V=EQ#ff?RakL}*8Mzk]6i\ux[eC'Ac?F5=\S &F#-i˚ Z/G(t{6P :1o73O}c$&D-+H,n5)LL/7t_.ᕱOۼGcrdI3[{iBwXPMm}| (`3ײS4 ͥշ5L>^Ŋ c\optpdざY2_>;nYxD>ϐhuk&䲤DH֑@{fW~VQ5`{saE!wV떖*p=EKc<\J؊:2uK_魭qejC耉Ĉ#%AKlBp*qDwCr8}V2Ζ4h]7 %?ZR2~jV/6P2z=d?޵@W"(:r.Fc7؄,'L@Tyc!KyWAWoӲWʾX:K5 Q -Ykօ yM0Q}Q& 8#$ QD*YMlC,0I'A_"I.9yc!qU^]4ɣ20U1 p NwC,BOAk ؁nmuhLb<#is |%~6)VηF4KP<"bD^ޞټ(؜]&d;k(DfJKȳУK֓cR6@f'l@"?S9P%t;^ i]120vܣHa#ܔ*~1zXiEPLJQd>b7YpQj<:}=k^et#Kv1U[(Lo a <.J׎yb0{oSgK?|!r/`|q#TMa szcȵ'HHxytlt#嶎/._u<\4+E=׼ Sr1sY<g6GO,{98YוiٝKI%C:-[Uy)]b|!SJK]~:߰\d-  M[DM劬-x€QRUkiGB3bA X_?DJj{ox~_khTne2ooG(=鰧˺4E)J2Wv@!;i"sf2'>_Ŕ֏DDDLlY"wy 55c @a.+iO3L*vl2x>29IGLdo Lʛ@ ,i 43ϼs}I9Q n\/ur@@Ԭ7jf̘"yЖvb( :9 / c :S~Q8 ŽFt"5,#V"HzP-@Z-v\>ɇgADr &.{+1gZS?qnX ?4!Z ]n@p2o3n @5bdg]D5[݈&:y:WK#Vۘ=uTbYZcf&d Y2@#֏j,2KyjGiьP1m; VԈ9J/܀ndA K1D$ $|!c曅T(T-{FhՅ:%\b8nRIjm!,5jc룒H˺//V$= 4Gu4to^^V\_< *҅nGK;h9қy6/ͻxNЊѐ!Zz?-pP,_ͱo TY3SI1Yw?H>_ۗE@ ;KL-*_./`{]䠂1LT4eG3nM+5?eB,Q\| 1\gr=.8,Χt+'9bTb-$5\`yC;1C'T{UfA"~ݖҸ 7կ Ѹ+MQnzhѓP q\zT7҆p0`͕JfE)&"i h0LDA_-TB^Ȼ+Zǜ2+ ]!r΃R<ќ>fG;2q[ #N99ZDar3ݨ;ҐAbMFvNc Aae/-:ng}^ :l1d玝Tpx/J-TMO@Y{A[y`AEl6&m[śOEIϔ/,z)Eœ%yej, }2EX|+{0ʖ.,E_!`LYAw1Cm86YUb!V&{xkUiSoqG?V*E8A83"0}FM<%`]iT<)%ĮŏȄ|@h7CW6PsTv\{h{hAQFi?Ahc -qwP`(*" ʛo9aZK0D5NM3z:R,F?>VXJܬaPzyexk]`5ۆ 4ܹׅե](w܎bg JIb1#2=.*޷!x8SNb^]xevۑ sn^=RoSѥhܡfB E~~Bk#(6vΆT׊:u:6AsNzgK8+WŒ`WHЊ|R/v-ͲܧZsuIW@HqՅz/eM<3131g'Gs :?!mpc\ ɵ: 2A _ %#BIU`_2OY ùzY;1r4cαú4W=g/3K@b.O\+Ν l[ HA%bڴ$\|bq}mAOY31u,/jXBcKݟ7eFud>JS(f;^/r*f݉&>Wx/f=c4߯=-UB$,WT7?%`=*>-n1qrao5tˌTJ|9%&ZjjIϐ#yemA7=u񻱳#,>LP8n7Y#ޮEjF+ awC,-}DdeWnۭǫgg-cFk BzvY40&O&3}?@gc+Ul#uiO*؃R'Sgڍes՟4GIK&c_|{G8s"-Zi<)<-DPt@=gKqW9Nfv4\^N)XuiUj|R7Ő(f^.ە쇘00y3n)w%"@bhOg nVdϐYWhX}n`<_ c] NFcZdU/? ~4U.TV#6 i?_>;$E6t_X*maƌ޹hω|@AlyN]-T %juqq\ 8[}PT>%L§zFDXݸ7(:?auS1xvgZZZ =n#b_PeI!(1(JFtMP3gELgaUr}l @BE)+!I!$yRصqnPhPU˻@!þD3[zc5AJ# t  oX&jL+vqpfC>=}VhwDC AYC睆TF'r*؂_gNyu &0x)Xe MK"Sz>3ևT8K{6~=A˧-3lC`xϩG!'梁ʨMQ/f =Vdz-n@.ˍ:" !  AK7#_r* tu7B_"RC%鼆 PcƱƞ a#5Sd<ɫ5ѐ>W?bVy^/8Wk,ySY{QIGS=MO++dD( k GyFj [0 x0LY;^WyLZJqkaPͩ NW1\;(<+ 9%$+==e@pSĘ+='ڍ nζ$944m1K!{-,M n/NlK]xR8U~0'6M\}0eG~}T@^DB9 +^a)%=,0־NAM86Ƽxޫ#/IPΠUwD2ڠ 'ٚZahaϦ_ ?;$R4G>/&w>#bfn0Ch#4[ ䷈gwԾZ5}JrVIS,I03~ljmj32 5gC\۬8oXψ6["n}w>P.h 0μEo!|9  hn bz;VaqAR G O3+7!IlejOeti_Jp7?xm?y1$qT}ssTFd'*'u*.*p;)ߘ&16k`i}sa.C&u#:ixGߡ$>H;+74c Կr1Yg^U%Kǰv| :E?gF."ztZY>ܼh + oCLs+4=+E]{c2tup|*1'#Rb*9'40Z{+ut8:X18~VС0$.3l`(C;HDՍJkE#NZzTM7O 7-[ghb "6t,ɰ7-7a#XzϝeW6c40?BOص1błou"XUY2 F=2&?`ݏ]禎>H:4Gp,wr&O K晣0I&dHv9Q>1ZqȄI zk96#8sN_[uf\'y\wz5²^y4sB02?Yj?h~%ӛM 'x_:X#C,oa?*qF[x]?+3T 8ai,!eFKJ!RDyzg Bm=Uھhٓ+gL/{1s} G}uS;{9w0Ϟ;EoOܳ7+ymJ}b\\IB}Dib1~G=NJ jar+ O3$Q1}HkyoxV5YBcP9/\Y錍+= NwI*WOP0}yPhc+";vBG5XQe~wOqI'l^ÒX:'&|,hŸY7_v śZr.hܠ0㾇Bڋw{3{iW1s'fӭ p A'}f3ܭIaRh8ŞȌu13 S5Vi`4.\L)3qCϔF){<&wh."w#P~wWjOet9IUEľ>dWGŭfy~;k*EUGQ"c)=B~y)eG;gwFJ?t8&N+d uul9DF3bQg1 vV 4Fd`K5BN)m7[H77S֡tD09k;p5YcȿZ5[[:"6T}i^̮!ڼ+*"?^BdR&mLTAJN3Bp82iWD??=w蟷tS/锩}Q;e?}NjCMCY@jBeEsQEytҾmyRph(w]̷#J: :60왓Gf6YU4Y^'[  (|})_(¸.,Ӽ[+Wڶ*h)FM-L[q5B}?v!l=6@Fw1$*A&UѢY>XqGC=:3b0h(Z0ZWnНE/WSwꔆuZ $acL<l'Z+~ÀX^'`c=q@<MwhaDNp:˖䛦uL"tw lb2b$􂊂,[vO}'$a)UFz[5?vf%@9.ɳ>~-nVlg~E)Ds(*?P':]zS8[ )*lxO$N1ȁ&l\ii`h}pNL%ejr%rJ0HY.dfï7F'p1`YFtA_SXwZHCP}\cؕv^КM[uv9n/N!660i$=W$:RZ>7*, (;d;eCXQy@K~@g b"oTaN275Y|9pezCp;r7 @u] Pp]5b[TlyTQ1& ["#C7$0hD0yu3ѧ|3 0/g0GwDԁ FqRm tMoOL A'6 MYP j(h5mm@ӫشuUYO*nIgM4@Is/3V;9z?o?-TIPɍLRu/װX8JzXTTj˘7MJiЍ>#Úi7zޥJF\ӥ@Iljwhb;3zo [6[ 6=ZZ~fA!A-m;&1LJEh^kss)T- !"p@H[,෇(^&Q؈u\ҵ!`藊T(S!'㯸2y̲룽Rs;T6k3t@iEwqⵏq}>;jP7ޢ}`[0w&ڏ B3зFG^೨ae(Qt2(BLia֠WkȠw6' udԲŔ' heHWfY#Zs=4_]z0 h,aTZww4 Uxؒv<%Q9rhO\؏7QA*6wf>Bo`V;4?HH;WDr S9./lPF$<zjaH0ε^$?q&h#|Rϡ) ~:쀗lzA<WIU-mqY`ËO{A{8 o:|L7$VbrܪhfUa,2yk"OA}rp1JOl11ھKmXۤ[-ې:-=nI-ͳnͮ.;7OZZFʁ,Oj(2d8[!uK'>C\]`͉y퉀ahY01S %4C{| h%tkraO⎱P/PAR?G||: 0Ch1* bP̜x߿1/OTكw(O"KI` dIn!JEu{tAyz̮B af &]Ϝ;Pk^r*ʂ O{<7aGܲ[a%T-KzGа'P (Ua%ys)Kmw(ؤtWMIVҍ&S8;KPT |b'pxL,Q"UD1ZO5ҼsoP@b?WhB1i"=?U/M ܑ;u j olXȵ["ZPIfg f =Mdƥʮǡo_gį eoTl0ӎ,BۀW}pѧ썁 hFׄf)AlY6i#l!=CI"5WHB{4ZGH .)L/m-d }?!QtƁ*Weq` xpK(/KV4{X(Q eUCY:1n۶ ~e'I<1nh}@MxgflX;*w hT:07hzFYb+!YZP,aOa:rjZ>+KR)3bhK\2q߲D'/5opEcb :5+_Gww,T $F$[' 0R3go ƤX&w3C{^}fIV%v$&ɛjX|gJ9.uMT+4aIwmE; [ϟ@zY[:‹Vt.$BV՘aY>ߑe(B2vsPo.V=NNQj8 m\0#'?@al)r䭣 n,qX&ٸ3t̶D eg=NBq.2.i HY'ڋ*t+MPΠ2ξ5?S#-22Nj3L 90Pzw GZ|b~\/sђ}_B)a:XuǜJI K;:j8+HTo_R]{1b};NU`na2S+AQnO~ K̬o]skcNۿҎyKבl#?&W=PݭQU"K^;W:*%8Rw7tGP?k~310VVA.CcmVo[ydY({)bȶ<ﺊ~\*J:ܰ9,^ I,y/|F,sCѬ8+k'wSS} Y9XK ꦪ2phb8ڇs<*Ks;p)ecI$#QɮZ4i^aXq^=𹻣Pى#b;wdKs} Mqs/ Zdc?{ 9JoBh5|0wrj0{\ۻ/.ڲHGޟ>AcT%Dp<\% FVsLDbf4  %bl.3&')pgоe;Y9FI\X<^jU94jd()?T&z rØʛiB,>d{KrvVANX|Vj:@ѲcNKmEs373(ZLu}lM/2w)GZ L3e!;*˾:Fº MιN(B^^Ծ_X+y蔛{e=Iu@ \,HQj0)4c LV ѡOo j^4[e8y7I@YmHR _lZ>LMN$XK׍sga Z,{U X\thˬU 52] ӫN>{mavHh{?Y,wZ59YK 묜]YbGZU$;rP+h+,uNC(l bm;@sX+:~ ݋tŲz Mc;$/c^ǻPN4wu#WlT J;1At3zZM/h:owt3fm}[JќĀ!$mpP^͈gX4pt\AȤգ0.WY_wcU`D+Q0p!\W6&"cDkVc 0W@Eϩz†j`;f?|⼿–6YH)r3ؽ!aeM7FkV{B{h77P A&%zBQh&m,}̢>Vei5'1XT}cF]W?;Ie֚zQnl z:r|4ڐZe~6քRV80a+8VKZjP\]ܶ7Ȭa |'4.Ǻ" wl@vt6K:,Yk±݊Q,qݤrڜ2X_8+Pʇ>U3c`y+Vr-25%Hq wjzFg^.Jy.V AGTOG 刅^K %oy& l_YnԟH1>fQmIݤK  u#q0]1T^"Jזlt6ėc,켯CQG-W}(ޘmCϵt2uWiMP#=ldJq,2$/yym,pW#L eCBf=gq@:jWaJtBmT+2;`{J_y܏NS<.! EX1>)W%m_C_iWRj󱎭04q^wͼ>`=G-YhK>zuxojqĕbėY4Ma4 6WOql,ۻV5`: 핊 R8RѣqSmq\s-8IëXXrGlewJѧܜF^I+Ǐئ%1]JR/S:꫖wJa`(1l3< 4 `.»wm=fճRCs˟{Rd(c\E>s->`JlXt*8]@ pn\Uep5Q᝕abz'hhGA>.0+2әO3ɬ|'2A$=o/< G *d޳hFSc=޸\ie-!H>$?ɐ]e%|&$7V\fsވ= ^J;I4dƥ5D3IoӘpAH~:]9CBvr\9yB$~yb["aq yK`ISsA׫F95֠./s,영8p9KZC6ܲ 4@DB!4ROi{ﮨJ[Mq(3=mv5b߸ o-J6aҒ>w'xY òqNJ}OX54폦$-80U,v;},J܁l1swV)jճ=k%g<9lda6_#)!2:Sc)N7lvJ٦ 燃 Y)AZg&L&A~NYڞڥ.yhprsX lx @@d Pܯ40*Kr ~7}:I3=8p `됿 ]l Q߮^kwBrHz#֬(;*u?fO`ߜ 5_ \6#Ge Kx]I#d#V?pCgQpOK*hDrA]өup9 5dUgVot?ni#郍LD(lwP;\(Dv곙+̡^*`W)r4P }f ;d>TcZLϓ&V!UAɗP>/惗pvJ*o;A|6 $ذКh}LՀujS+2j͢Qj8Zs>oo r k4fH3)=ЊU]rŜVOͤ:Uj:WTlq}Ϳ T!Lt^PldQ|\6/0)D͢:j*w8*}hhuMHқ%"O7i߇ndv†X{IvJ^]j yxQ]̒6Avj!nj1QK`\ KE\n4@%*d2wy6g@.ZQ]xghSwWwe}=?-T :W8)h_CT+ t' )k/tGN=W2bt0ʡ?&=VCHovn88+*G `96H5%O1-) Q }wv'f+D 2C{6[jO*C Ѝs\~y5{676&|/ iH:>7 @ _rmHUB nmXIZ Fz'}I#Wf.- Q+#c!ņ\ĵl?b R S[nl$Qxe5y+?Ҏ;[Kevb0\Zqdg&!%\&gk()~:k$\"鼦6n:nghg遹JHh2"xa/!a?+a7 |KihxckV WZ?̺1`r {NP]*4:7;&Sği ic4 ŸH~!B+ l(1 9ydt@j$FU-?5嶉??6&'v#ǖlx{Tv5.cc& n$%ńAθi4!펆y7kO^n쯛F9lb-(WX>!q>0Lm9Y:$CPY~ ))iG 8 CGJ\ʰ F2lu=VSlQm1Ms4[E}$_h3˚du/; ?_ݰs&, {K_Efǫa%j\e z2MhC-% ch]`L6 )/aHjm0osfw}&+\'mT$ڧt1Xv:y%{!Ez_?q2Gj2W.H]O@ş x Tܜ Sj_aA02E$NY:ΖfMrp¹@;N^€{AI[4ɿzꅍUsΑ*tǐ($6D ~"#W`ɚNX򉬝XQ%_?#SQ'ѼњK/fi"nѿ4 Q+1[-@w|}7Ȗj _3C`9$Kg[xDJ &sMn[2WAHDdv2P!CTrPz!dOzx",I0QVhZQrQ}x*mYIJjWEJW& ޳,;BGa#l`x`*M,VՍZx yj+tB$_U ;nsLB~Fy#HtT< ʂ՚E| d$ i|pڸXiт/rVJѣ91(t t|VӹWn% &]eSO@-J>Cn?jYU05?tc) 6HAxz"޶ JEXh mƑD!p/S?*;$2U{"; y;}GS1ySJigW7`5"{퀉$6} \ϴ|^2>Y8Χ%OӠ,`sԙxUœVik%Ƹ$. ?濪_:DBJ9g-ekJ+LXn)M1HuZén ^KVQ#3aEHK޳& Ui g2nyrix.|#{>,`eӳ%1a`l ֲ..Rق]era>1 EXj6@D˘S70:Li 6'>]Be3LۭNޯ} >G2h5ӥՂIX0iٟQxnj&7=4 "oOCjsҏ$ټ @SGg825b^W<нE 9ZMvͥ`q54a{HA,\JTlE+QFB>j풍^;1p~3Vj,4JrCVCZEm wz;`ͻoM"թsϩq՘5شqPd9cݕ+^^$U]6ۃ^2Z-Z؋DT?l2{{)|f:ՖjL.jWG_  QRDǵ+eU1噇Jxld#GF'Q_PQVneqВG, ktn,{>:ѲY;$* Jvwq[pCJޫ? K7̉ û;Gc|;߽O~vSnh7"I1K FN6^cJBܩ-y qnbD0ma?+zd,U/wC2v[˸:8J4P]WKBDp@x.0um>ExG'S0K^tRr>i3^plFu۝ &Yvd-#yE(Zs yr"_jIY%^^H Xi.}Ur,mK_p+T~pӌ_f`QJ Bx7qȪLӗB4 l* fo3dgQ"QP-@xщᚲ>;(m:DWao>N\ʏJ' ",F zS'.џMQkNtT֒Q'4=PKx蠥2H!ɂ(+w1'vW93'5Z&M~a3K>(| Rج6|o8.G.ww lqWG*K 캎Rࢩ55Y8mhC?߅l 7D&V k)9 ;$׉][ :R̿m֌oA!Z jG.@s!G>_ @N-3i7a-KzSB~@+knGC" !|)8uXJJA%g)P0Eq&m;OKut9Ye9+xzˑ-v<=, T[2FU\Gp&Exrir㛑}hEih]x -}'zPKԁT@aV4Z.o+u8bַ8؋Oݩ/T?N9-颳nJս6~߄EPRv 5AuEQ=/d3M٦iSKwio}ĵa_n-/3u)-lr{vبo7f OW^'oZoAW*>/3j47]6;oJտ](jj2LAk.@7|B9NR^H,/60]\` |yގƪ!|3J}R&voEetl|J$ǴF~=0+k ?ӱ.u87}ocnh1H{<5%cNq=Zg`}aJWm"wXv$1ȞiUtooyTfg&ۈ:r0r=HC0BeZPFy}_:-Rpϭ"G!sG>eW FP\J7σ8>E/؜ۏhQYr6 |-|mk`T-fXLeLYd-d?p=j'n]<b`^7^\N |3Wt+%,b̄V`8.Ekr=ݰ$uyyB~,CAAsAZML-6#KԞ\oƢ8#i\ɬGEX#\1jnQlM7]. +7UBă="k%־swP0|a-MTK@M$l^uLy^ԕI%V9:O]jG+$$`]Ԃ~vZ_%}kvYYFvd6HdN3dѼ " ʧ V6WzzG.#Pj@BIP(QMXoxIGD0s{d*xz坈 K&:v(cN8E@gv51vU000QزJ=ݬ*[!I9`m贑Zc+I2eYkɧMCp@5/$S{Q& -}U"٥T4ޝh91-70AM\<<ܩ>sBgk)T+iG)?,& RUD\0&sӳcqq{9"u%gZZו.dLW,SW{0Wcl7ғ #ʼnM =3dYN:)38>X^G8`d]W[8U7IF`OG eMt6:gd |`̉Ƒ ⡓_u<^Vz`Vn~^p}xXAj嗪OS?՛pP3uD`H.XQ(`hupg=_Fj% sxpl,vqJ z}SzgL&LGE2wFM?2byݪy>H(+qf H(z'/uUv9T^lq䰧u :K"D2Y:z RJ6MF$9D3IޱiD=52ŕ(14te1 o;߷R#@U:lp\  _}0㑳jdFp5\7&^ FV,xO;|sp1GXN0>j&gMJz]għJN$wT-~7HEڕeH{%7i}᭍8HiSLwjB|'^ HڨZ9큋\B|NtfIeT݉c$"+ʫE0Ȩ٫PʗBrKf슶OTie QMJ$^ުL۹ iS<hj Ҳ` V 0ɦ֞ W0΁τ%h4n­A{K{?`y'.&yP jqݣuH*jF r0/:O T k!>s$n4/,^(dh46m- bYuBB ,ZL6`F˝L&RTw5cwa;cZ j]d63^}G}=ISvñ͆={ـBH}mF Ȼ"^:'qN͇i9~q^{jAr4Y;B9}E0nuz[榡TQ&m8h|@3T.1qu^ VbOe*f-92X:ց{|V$L] ˕  #&1TX7[`.?k)*SI̖d)~0grol߯٤ݏׇOL@zTBh#Cs'BK~K$h' P)}1˧0Wߣ~׳=vuS3]XU?3]_ന LIvIM|fHnb,AF͐5 [t8u q'0H"- @g@+ yǚ1O6#*+[|t-z3u<Xbe[D_= 4zrRt#5w9Ĕ..j4 |zVDŽ{2NGMDE1 Iz0c~I%o{d&,oVK9/Td&mϋ j"= $<ahqJe`l^\Ъ\(#::e4x5| '2P i\}_޺EeV)injhY-qT+hYCH.X 8<݊{5 o.;rN% 8ي})#8bwc@3ztqpSu1c0_`fZ[9vPCӱ<ԡ"M8UDOkqjʿ-t>}f. RP K5őSw:GД_b<n_ \l/A!ݰn>I5J+ZC.m|iT"H:]ضT7.33bSn㪈,^=K 4*OcSZ-ADQ'?smj ~NF w!4ëZɒm$VTJp(e2LLjhoT̙AKG#HW݊%=d>@&GRՙww)^l*!E%mb 28`q+}]64 0Q֚Ni7=3{>|/wҠe3,Fi&Ff*dFR6#1jΏyR(3Bu3|B ?Dq hėA$Jl Oy=y̒-n:a9U+yT4K)Ai/plWo_Cx}ȱt0#Uϓ7]e@yt!!fqy4-ogMD;,LC\۞?ob#OxUKq rDS}\hr(>ަkw*>zX0ՓT81m \lf9lBJ,*%kzN>/׸gך$-܊^ŶTk*FL?+;^>EGNj>+k2m$LaSܦq34x% ]2YgE'O1c]Ȗ$iJXׯ|t=8ﯚ, _(_Տr㱸B.$֕X6` lY0fw dL1jv+Ǒ($#@JBrh˜$ :mZ at("SQ-Kv?|>4~邳>* X Z*[@Aj`wȜG0؞ oj[ο>Yx+OS͌_0e@+9d( ]1߰'y7{MT{W9\< m+q7_徧/ys(Uq3U=B1HwRO.q$h$n%k3dV=& orj&Ue|&/1/h|޵ķuE%VtI6 T g 8@ ExTQCȯ$ޠ@=UX T`^ɯ donN~)_^ƹz._Y'-~xGSTmvzh*mS, .i#HX7PLHw (mCR*D%Kt/Qޏz NDb ׼.su4.4-_ùY'00BY&(K/ 6dUT!pp@)?[RQv\oGQ$3*u?^ jtt?A\#eg_?g+#7O:Yqb4sƓ9"ŋVCIP|[7`*0(1rSh.>jN#`&ݗ=VlX%_\IB>!l}4vv1C"">=4gcZ#Gӯ*LN⨿?WdHu* :|#_ћo$S8ZFAr`Dz Ӿ7cZX [o | IF6]PjD`ٰVDIyie@분OoM1=IC$tVli|i4̀RE1PRS7fPM]!7ؚvO /DI]- 82?hl=J!t5w&tU0ߤ7]IcJ^Cj,h=W~nl XWxt)?u.u%ڱipS1l'Ϛ5O?>9j5Qut^kZ܆ M' "f:g1&-:?NJx1nfS5Koikd٥S"~wNt4 GBwOH1aˈѬMTq#:glxt8@O9іc Kz⭦u>N:|Fa/uaC0(0|1'nМgf $ウ@]:컯\%Ȝ2aN>TU1]Ŭs{mA3HYgP \\`. &;bjg ;Lc ,%4=[L"V@0ĥrcRxywi"$Xpo^6^ uVjb%>\cN|$, &; ,vUɟ ?h9f{ CD.bp^-ODn* Mx w}uT+ζGB-EG8`$$^p[oNM]`} Tz6جm &hv)b)uri aQ+Wa#ra ;}z~iV-˾h:ZT F+30:>? [ag$O.}GLKoc\G{"[ElGij{p6XA|H] `Ŭ4P6JC.$o45*RbFS4|XFn}ab Y1ݤ r;͊] Q'|jl"^^O4 +yY 'Z 7e/0R^wN@آ|;\]B 1_ve!n1T'$ >՟EXƇ(p?T&Pe~̊ۯ}nOBois݃4v"sN,]~L* DK| YǾQJ7)c*oT{Wds<fBNRdaqTAMAK4j@N ].?t%+@/&?hmUicSGq0[spH5REb e p = Ơ';eE$., b\(trAfVYu(I} M&!RN8_I/*pc>gq8izm*yNS)Ig%j6UغZ߬TH`7E&ȖY2Dx {P Ogw,:lQ7XpP U}FMO* ƪ BKP|QQcB\S`-sq Fتą-QQA0")_gqc]Kڼf|U/}Q%Ӎ]Lsm1gbSouB(EaxNd^nqWPC6M)|'B~k||yHcy؆0q]@G3$aSh_TuW)n/V{C ;nHLD /~Z{)R%1\ܦ4ewE]$*ح}m8S u5U6?M.K3{DeWYTXm77?#ҽexĊ;-WFR ATҏqwڼs+aXԲ67Q> 'd'ԕ#zM>(ъgiB BhFRU&W) j~nq>=jC^LՔV>U5ˤfwb{|h/ h[e@ကI)v,2rC[N^2lg:\uߤaa%A;7J2z5>#d3-t0 `2ƷEomS&Q轅p[cPD&{`4ε ugd=d؅h!$'EL &1kKZZCYV&1 83iѮjv dO#cCOZ¾Ry9|/$]?>}WvR `*XxC1g)dKs;^Z:r*L ~L9ptS4])2n;c`ߴҁ"œoʙߊ (c*KUeבu;n؝7KC_ۍsu3꣮(h V9iKl^)zH@!(<% i<8Zrkؼ?r]aXy3xɩAXk6{Ҝ-f]EVK&*nmFYn0̋j9:9!%˾_μװhGk|a#|H+^Li<"(~W&6bo8oS(lmw ŨG+.E8ڡ9x+Zh'WF4H1|ӡp"Zc)T1q ʚU!92$|̰1 @ fdOIKB PZN],ϦeL\GiǜH@0<JmwgMXۚTnEt5QC|Үz)*}61bZ]̚yʙ2ϜcHLǢ1AH_Eh-s ?2&gU #Xsg#Ga5v*SsoXĝ238i2c3i'(]28iȏ9:蕏=RV/԰?/+GpU7hO{N]J4/phdA,j4!.Hy]:Td4׀0VqP#)A\K; SwMڊ.f ?lC*StђeuBЫy3B<ڂӾy?ZɎ޽hB쪾 Ka@$NBBߒ*)s"hKŐKjT?('FQ/I+3lt;SrܸYq#lB1:8Q~&́QD;/R ?nX70G_W3J- 94bK,ez;N(Ժ%rw׃cv+ử04FX" K"8 jPVt:v aWQ;%Pyj q@m5 !7m_e2ai׬rxa@dL;mئ{NŢPS`ZDԆPY;I  ҋ"ȉ^/R9+Vl>%bf.hѼO6lonrᑚr'߯{NK(eO@D*fw4DFBr1pwI[r*![ߛ!yWGK0'Ep1tWYW ^)׶#򝩙1(JQ4#փR*ȉ?q9 7Re/lia`iBN.8KNL@maZiO ̮[ڝ/J}o)#7xxr1;i܍k4"nd~vIlRg< fn n.c9)Fy?qKZ vWko-/k љK%Zg,ڍWZZßw ǔaߝٲʏ5~JBsx иUܸMfPQ^Iizq5f+ 돴I2rFVnm.O\]㮾BMi wKN渃$1ASf\Ոj 4֡i VEWDZF^p򣀿h4t9fuQO 4L8n3YA" 11X_U ̫`"فba挓o75PY"g&.]7 w P߷3Q>aj0,` p/N>TCt>n K3Zʗ #k13 ܳ[pp7Al( y>49|a25AlSKC8EUFiS1y/Ibm7zRcH˭b^gY xʛLJ##YdgcQF{7l* 2\ /0?+{t&J룉[XhoKUq(Y#ΤB:@=bedݎ+͜LY:оwV^IBe; R \oc)zC :N=FP Bx]L^gG$.[U,.v|?ڒ !+)5̘%gs7v.0:1 e`?Ha57L>;s/#S*\Qi-oCS.tK-?b.sBKQ>&'l32y<ǙDC=F[s){yy~WDkBm( `&VJuE. ➮su)X:6#圊ifgT1̧NG,x%r->B!q 1}D/Ft&:: ,Lez%?M(tB Աs;:s|E#WcC^^#~NKnPB#T2vo]& 2I{Ѓ~,KQ2ª E]KыЎW\eEO!h%ֲ{5&=,#KV}붐N?Jsl[ðϸ-bK,hg]4ꉈ Z}[+exBq fjsIٵj^Ŋi 2K:W&U6 ]&:;Lb!@VpL:Σ~`ǘ|ŽTt y_/㯍,K 3aN$ܯߦf@ 2?9Pq,}1B5oI"*AVڌIz`Ÿ|#DgP:sm8Ι8A6?ik$:4_#;.:KU:p#(V\&+m hakpzUR?UӠ\D:9N8T.%β9^2P(E:<}P9 L>[aE<|MΎ7 "f3<~}*bYg {l՟yl!iGHWt}p _-'GJMB3oÒoYp;6Gֽ(alSQaZ;{KhK ѱ V6i/GhxjD:*$UD8Iw)0J]TYP\=,#XӔuͷ!'BEnߊnGD4wIk+GHl?{1\O<]^s 3^DfD.noIF00UN& +11,5 wӊ IJUҪ9c~ uB<1{ک0DSw\ݹjmr#1-[#mK~k )HDokŴg??,|Iw)UK`0zy*fRi,K ? g3.kU9•޺]ka1Aba ^^SM_dy(p"0dv_u}ɖ0c( ~F2qlpmKlL<]Xc2kb#Pɤ/&Ch%!ƈ0Ѹ1\bBoo9#9*S.!jm$10L>73~6K(?i4[H|05o&˔&V45uXzxzՒʈ{.fV9/6W@+xnnpD$em&|AXhPRl ^x٬0Z$ū&^RGJl K̨ w??ҿBNryk7S+gz 'kW:om:za!{gR=k&67Z._1_GP6z1 D~DLc59G&ڦQp$2Љ^8rkXo̎G`P+R1褮 Y( W_ \3kUW-\ “poǟnkKIӖAfyQ9Jrc8,VoX "v?E#oϲhb_BG5qll$O־yDr.>;g"-UG{K}(R!Z|"7ͦٳ$dxLA`1z;e-a[Tac3G& Go&7^fbCs1ds7dD)%ŨǸz6FU j5LZP<5w]pIU}x%~GJRc {t\Ìz̭1Cm}TyD_xi3d5Bؘ ;I2_S)ƣ 2rf _^5 @0m ]x{+7.-z/>yJiV-+%FͭrTx[Ts)+:+l z-Ʌ?ckL32/'K=Ia)yCX&3E.teG$8A%kgv 3.uD\+sUʕokkE0h"s"n*#SC s ε3 tĮ_3MҜvh0e,-A5K͢70aS;d%e$x;rTÕ I񄒨=Z[Cac@g7uumt&!K54#1T#YyarBqhi [&G(`I[˯) ]F>V{:l04OAor/*XH1T4˘̒%"J ʬV&#Yzy/d 9 QCҴK tX2Z 6D6O/ -{gRwE2X!A+[o(mywkU,qerr!Td&qXa{ s컹M)5(ڋnHDny !bPPٛ|R7dT,YGSoMf? łnhcن$'矒 zc4)r[w?IN]BQ$ !,s]] )H[jk9@3;e{36R@J 1dNNg3B^61Hˈs~LQ 6j{%8Pہ1lTylOgd\YyFyܴۨ.*ʱ!4KDY:Yln,Fy$"sOf\)/ZhAe,j{K e>yPƾW'9iBcr'/6/sU1:8=VJ^7W{.S$kFcwyx:/%QyM!K1yì`Gзm"MWOy$8,!zpk5qj꾭YrTcdWT$#PXmU) ̘c)= }vھPgt%W30␑b@FXcpUUGf:6mz?ڟ?#Mš{te /$(eeŇtPVM[Zs9.4җ&\e&'S٭ ;G.f--:p >lfWoH;"6{*|N &]Y9u9+Ft?"ȑIޑj<CS25Ai1/hnZ^i#GK%-L"S-#p`ѯV.MpY*as8j&[E;A6iA4(=e ntHi~L Y}Q)2|w` ݑTHNZ%jw/.u7!VTjϤN1hK)zg~gXNw 1޲:߮ kQو̈pmW wElBuDw_b iV|kWeL#~G>Fw}᪒Va=ReE؟撠'on "7 \G |S>,w'$tg˛  |=+ ]d( (:Dol>iv"er@(Fh+D=`gR..tLNȅp&i-ϧS۳&j5rvQfn-U2sTD[|]вŗa`̳X"M]QJeR?VxJzĘi]Jo-[O*3btYG"طR8Jtznc6%IeS^Fw SwSF- @l\>-..9 6KT.F]T bT_ϔ( I[~k|n:%e@{H !C¹.t "jv2!<[OCËV *U-4l;dSƖ.D~eiDC$ރdt-^i~"LݳIHDdŖ$e~f 4 stlc\< Oѻ.Ab\whqXwh`RmJswv v.YybPe~ [dc*Bw V4% YsM\|G;m_k: /ǙE|;9wr*Z{N20MCQ)LgL Od nTފB{Wii0A=7% goQn˼+ucA {IIY=\.BS%6 q l=H)օ(:}'D"kj:AѩFE )4J$'̂3:- {{XEX7 ZR4 `,JHrGs~(a_$ J*o- 9QoyǘB/ʁ6ecӇ}W[yFF\.f/1MA$ό kf!?pZKU34,hQKb Ԍ 5PD5+as8(y.h ~(,$wqi}//ӤHniM@ ]hV  "g?)ǜɧI,;H H{mzjw~ck=^:V:9O򵭮i?.ĀHZjgO%q'}.1ĨAeuע1ˊbO7Cn ꦽoeu~9 8ElUxb/`~!2hs>N`u͊CQv'0_ ɓhZ b5} >bǙg1١ 2Z'- +HZE?of4-2$b/v% P!R{MhLhqHXk3ՍJ/oƔO *VcR[G. dOԓ`IB #Rs4gg!?@c|5=ľI9$<5Imj]Yկ'&Iphcj. @R{M)ޯc+L=ARq ^NsLu! 1a=P Yhh Irg`# ?hԌCI-gRj2 =py/T0l ЬrTfm;%2eֱEDʐ'Sj੠uqH?8 *ˆ3҇j\4ȞI2f6fQH]K3v=В=K|R"nw}o{81ǁPg8zOm&"lxeq994 ;*rqyOM^BE8viL +?RkO6YUJlԛVa.M̧nSeCÿx!uם߼QG5Zz">%Unϳ Bpu>55O2$YZ@ԗ+8'ށ;J6am|HW@qARW[a_NqBǐ=UFu;xmy:g~hfj[L@SCD8H٭l7bN` t1ad= tɩD_04Coǟx摝=n'NG޹I($)XVY2qY- 1.F0QNʶDBck @I&CS]ۛVAGÿKy頝HgH$A>Z%_Z&$_y^Jẅq_favN3 GAC^/PӲTk0: #xmԑo卲6weviGOwH9b-hhw#+uCB3\p8FT_~&Pɨ fqH^W+c:鄥ײa<E/E1Q{Fy'ѥyEAs^&Q"_Y@D-,cp$bN Ü]q<//ŵDnSĪ=q`Y*}ޜhݳISR=IW2 Z / re0El ?%1`bv?A>e$ׄN+EUo.48 grbkz@zX&M=Vz/ӲY5 18%UYd$e xE#RaˢtMUJ)h -r"_G MhG,+K& $%0ˇ8]}@bggL3DOoHei{KxYߩqJ O=BNHžpvl`2f6`5Ǿβf$D%=x왣*˶%-I4VnQ dk3m:x`% oeh$ pqK̹b |+kAfJ5s6Ħt+$BP$HB*=JƷ Nyml{z(,I~?*ipr҉\%*_7.zRD[Z|Gk 7D&p%6EUSʭ(}X! 10R#_ىuHfzn8~$0F-[ZV(sd(qoԾ w/н}-ҕͪONpRR`(ci\Peea6{7:*+ !jթ{u64D^C/,՝ہR8n]c*k]|~"fj]rt|(}Z,AALS[s>E-ػ pM%Όel7aXDEC`AO xuâ0}6K7ؑMBϪɁ۠݅:9kE~m^w_<ޥ9 e]n_a;I?j nKL50e'똉zԆZ7@0ѨKࡰp򤚿8]cV{PIڲ=B@K mJ^Nx)@|ƄNAw9t%c\=f^+=gMsf%2e]/J|eun@/X^|YᮍGr!fb )EG2ih j^)Zt(HICiCBa@muImj,L"s;Ys;.|7<ۊʴlVfMx-_׈8#Kv˫: Q6(/vÂەcx{wMˑf R'O7F1#eI&&AvBm(}STty 6)+7'!6h 쓬 wL,]S=bAy50ۘ,':>MyH1hFNP(B#_ p0<)lh26k/_ Z/q?)C(\fPHEzbd .g@CklEC#2aK& -.|O{T&O¤| neK?䢿Ml{.( b{CqmSUC&|nhy+<'(;|57:/>i0`QJ5L!m.VBWy^x2^ c)K'aB-ւg/K Y;Q,cqdWi+Sݒd+La)GMRײl_' sžMBMD p[=yQ\:*i*&s@ :غL͈|NQx<n.<'kJ@|Y lIij>eh0# %oQ40Y6SfnuKHVXyިF(bNw :gf:']Gq],ZsiCjIөc7d{f{U$Pi ) esux>ѯU-=rE7M^?ZĢi 5-p9yV+^ A|&[6UT %%>`(}yz yx6i@G^^**ܚr'p˴61`rldÑv[ix^fp JC9AI}/S*Ć0qA_YƽR0-},J J 8;9[SDHmu\6Wtj u#mD/H[єKbBIO; 2fpiF8-➓X4Ul"d!+7ÉXk"S0zI V:f}p^K(4%~`4dޠbKT^1ƒ.]=͖^]~&C5FcBVvk±MhRMf/U 3>>/E )OezE%YхǍi+@^!REu~OgRW5 ;!L1iw>p~QTLur`Au !xk+KNR _WwZ:zx`LgQfwY'ߒUɑ>s+5wț+ VѵO6EDF6i$NxKpGL2wN|V^Đr.SvK3|sQuVT8un[_}Kde@'>8YN)71$gH WPR:C$\f_;&uEƗ5QT |qOJkLS:.E[%Ihl(6[ʠ(>V.B 3QzW-OkqdNc ݺmOIڶK,lQpǴe>Ŧ͹tڦd$klݽ7^Z}Z/qX5iOr*Ka全251"v'{͆2[ȫ4 #A&Ju </2<8 H2nADhڟnSF( ~Z-ti OLva [\ŮDXFNb66nk;vXS`qj,8oX2` fXU^B:lH=`;Owu'P5T_K(*K@bI$>7Aϒ.Y-*ZAl;RQ>Y!`oy&MZv AڢKo޷W^jg-ay0'LtQfzBgHX܂qctQ2Q]`rf8@*Q- slOT5Gr='4eO+m6DVAK7goLU`8npS\UH$e~Mv"QHd]=n]XG:/˥/YґV,>Řf-GY E.sn Qaiόdsobpcko: SdWW×}n\Rwxw=ͼrDS=2RVhQĻ! ErPJ~ߚ2ձrq*+??f\Aҥg{M;ɞ`K?o] nc~2^e]焓X#+VߛR9P_4♌F{p TPcyL%*t`B̉ H=Ԡ-`:kt}ORuҋ8lhrc_ԥ8a=!l*rZnB хŅaq&T`~Xz\D垑\CM f#'lϳlx[ѿtnRG1 52D^kj [C+%c IZEe/x ']f"JԟH.bR~lye-2KEj!߱eũ䖷?:V݀orjZq.5/K:GLv-VEij"p w}rpG&y$zTi\nlsEeLZ 6✥hN8 5֧Quª`$}/1ӊ~437 ,˖`ظk֣-[ ;r8TS!(ǐ:_z g%i _hVIkoˋuƿPq ia A@;Ws6P"iq@#h{*ޥe>@NɹZ@kN`LSQe},Mz! knr <ΉM7(+J,=:%-!¸$kr4,&7ڻLJiUҳޭ7oVnDpp/Kޕ:ٗ*f-Rn^xi, S`IHCY>%gleӶT4YvrR"IpRӄ@_wO wOHt`#Ŵu +SC2qd5PwWaLk^z3]ƶG/k`zѫџ2n~eBe$}lI|x~ɋ# OܤT~;P057p' ф"wS Z4 7#Ybu/IPȩ!tXCY*q^0>&nx1?U6P9وŷs+4jlHt[y=k{Wny4v ̐;gwy@_L%$!Q`\g Z"^_dsҩӀJwEO-޽sH{YڒEt><.\TLwՁjaoCR5r L 7{)رM3~QopD";ed& !@h#N%0'DҸaQtM n S ygq$­]q }{Υd!3Z]fsA@`yT=e.M ra H7z GHDjePi <s_woކ"\M15vǐ׎2v_ÿd W/+"w~in Vjo,r ۭ& MXxt:Y8rùC~"܉hpmA$;Z50 )etàįj._5'0]FSJ;_圼 9#吝+j=L1mg}ړ~Qtfj2x~@pS|)eDɰN^՛mCW5ꮻ&* UxFC_1r"/ٹDft@$\4fohMG*i~n)/tfk zg{{yq6I)?%J]BH!|ާV!p2/=661=z3@X[P9aMyVX6b;,YRs bBqȼu.G'auh*y2MV8D țxy] BʲKn(IJR * V*\:] 9iZKHʌ9j8Ezmwh|~?tajtr{0FWƯۯV\ %& 9Εx:5j6ٵfdTNx?QAp $2W1%q1mx`iBFM;9OL>BLzvGe[,о큫pN;j?Z]HU&fe#,#ɥ`׸t[ށ} Ւn ca:r'_SrOIo+Hy8-HwrȧfLlwW W5˙ĸ1¹6M/h>{p!]DSl/(1-Pkޕ}t0X):Z>%[ {`RzWTqzjcdڼh0G~(7az!d|N%TZd˓kդX7@+֋O>(RZnHi!̢7s^+'[J> >x U,$SZ!NQ;߀- cMF1@@m3B7ݷ8Q| ÚQ"1ӺqRQߴx;{Ȫx+)t>֙y~(E4qq1ogg[.NIŽuų48{&+Ќng0Oq$3ܠ{3Uc5AsQi+tKrȱtt1MlbXP*Bl&FRI-=SLHJέ,p[['v0!c[b4ɱW.u1Iq:6H⒲!)5Gմ#ŵp65gl,O^sj/E(cU _{.Éd)ELi}!M-G⃠ 6byCr#7OAe7:N^ND>shL:~p~ʏQ͵)#"S[Y=.Z 59m8LC275^o=*6go WDH$͆M'7kɂHt%rٽ)&.d )r Gmǎ Nt3c蟺ī RucI[ϟMT^ nnwYYA) gҡ5(+Ǭ+%HZHm>[wv9)Uu2WvBګ>PT8eZ73l$f`'5.g\f,O`" uu=% kgS33̕ڶ|$OYEϴ5@NAf20vKR C߀kXATҼqY>cuy4ԅ=˭+`be!v(خQ,J/2n_KʯHqU[*o =սT<;ٮ_[NF_73蔐K:$ebJNIr+T~+eV@M4õSmx¡+[qjژ}e{ A~VC!/..Fy+=L/ѹ⦅ U?w%>~ ںb&d d/x¦'hXk Qn2M2G@}oxX֥]r` /y<"f Aody]a m/0eˮKCŠ.*z6y%UhOR/ ̐e9p܀v]W-j CEJ<( q^i@{ Ȓ+XV!cHC-Tan.?MSz)z$x ­>]CN ۸ f x/T,){W(z,x 3J$ c(p@yY5ØnZLl<ҧy%kW& McW6b \.>z$#ptHį"F?1= |}Bκ_w~a'ŘzD ڨN-0:Degc]\Q[H,]Φ@USh\z\q2!Z@wE?Uiݦ=q$R6YSW~vJ28kϣj)??Ӓk7)<#Q1dr{ \el83G%sAM*y2rpoXᄧ4K&uS^c.؊w fGܦ  į)Xs~;&Qw6ٍ䘰h9g[da~ͳa=0<(ß+Q꒚X)3'qy5̲M K0KkXFMy< |?JyfŷI\Fd2#$TI<coW!9#Ї1BE}_b`2,+/g /Ix[B|?E@4MIi>D 7>a9yB.WAKHA" pGJ, z +*>uЧa<(!SbӪ !}L7gN=[3QoGWImWg't`YI"ʩV7/gezwO3J+CIB+1"4!G1RiwDqoruu.㈶W8R ՖEO[5>q']˜bDݧ>h{+!6) 9$Cfc'8{Bv(8KXnD}nzGw#&;bcmtF|Ku Aþ +Lh׈5ڰ;lu6 JJG~;5r%>_ 4΅I_t^"aG#ݩ ň!:7ϐGDKwA+M$E0xhD#J[1^eʔ2y֣) B^̮ Ow,\/A'&F`>5O'e 6fz>T *o,9DYc:`DS^ԉPa,A/!X ?(bZ]/&׆?L&AʪRid4C60KMŊ;tg]j`U Y?rF\UMũ!q8U?lC[( ;w]K^ZJeLk )EhAOo"DX/zshj=+ Pk5QguO4[Ԛs(H\Y9AQ$iMxc-í$a#Ij TIں JK*'7RrP #ɞLҢ[t^1CJ/D0Y ;#/ɐj+\p@yćxAّ_zFV5kG$|2Is*9Z'aZXl1sur0lW sU_nd 8*d)I%w5Ct>Ei^*M(c]I^\/ޜ&xZЖciy/Q\VR%- Kz35e9/?hjꟇgYnZ6oR>_)Lў&#m,:pZ*p R 孔nve'j\>V|$apm8)V։νê5ȟQ-C- 9/No}2oYeg&_@(MMA^9êubOmʯP ߶رcJ48;Mu$zqA=?DYm݊m~`<7̒aw+W% 9+h+ìcCߚlE .dZ6̱NFQ1v  ]1tqz0XfPՒnj=|ZIb4iuPx0t?=߸X8 )'%ȀɊ;c&+.v.pyĚlODԋ\RsV}ځy(A0BBoin(5'tbz4}_ ?>\>Kl:h2ZnC)߫zf$ѩ pg -Z:É}E*9Co/YŽ^K'doPy`kTL3S[>Gͨy';\th)#5Z5ԥP5< ,-6d uzO  ).n k1]Ȏ7 "5fmB]c6 #hf4-kg~Ԅm,gϙP\p(;ISG7_(E-Y9ǼBIYcbԅjG~ːLMe roҮD5mۙPZ|_V[V)H>09C});ѿ d&0\X`5ODiE4ve> D]PZ(ngS>bİ3Mt槛@)ǖLo=xt/=qA:RKZXh)i}w&C;OpŅxCӿ (9SCoI}$4>;P_64"J>m%^::i,= UM:ԹLZ'l[@gn4*{fRo&1ԡX 7ۂ("%Y%幖Yϲ+J5>`e0d֒x%0~lwכBraھaRN)+nU5}C$ocI uzV\w=Ob> w*ۚG"ABAǨ:{J*_.^8G@P6+δq:9Yz*EWTb'>pK,S ۫Bz@:MaP %*>>5g2syq9dd烰K!:N |,0=LQD?Եb4#Gťl;fO. "Mnn5"b=37xH}3[+#9BM:F{oaoSSsVV$SmeV`3JEYLP@E<}B_?W9u{mWh5%̒ ( K&+. T]~,.80ϹwKW@ @g]0W4P$-KU5xn{.xBewɠM vq0ldR GS[z LoP+S(pՌU]ZOIۿa9]*v1z2+!\X/Moe;DV$N~gt/ -VR0ZȳWX'(]Lc c@)zGYqW{f9l*ƅ-(ӟ}bKs^vDMQP FIXA7is~gkn.>!'\+xT+g蓬rSi:C7 2|Z",@#0PmiRɀQ(6YMf;R)]#_^US#BsD;ʲ m7jrtHA-4~a"=%Rd utP0Δ4_@W ?\V/bUe-W'XtYg*,q($]:l63FKm}WݘPԆ'Hk{Q8pT,ZM+7ET6z[*-oW%ƾ<#;B8X'8ke-xAK ' 4<ӿ޳@mr4"/m Fȃ`p7)$*5y`]rٗd[r?X#0oq''=aOmpJL ctS.\k.Rgnm[3AVddSs2;bE[>Ԡ& >(Q)N4$:&i#Ԝ< ~"G[Q WG⃄`ubP1E &Uw~w@A Sez^՜l~ st F6yo޹_:,-儧?chJc-S)hǷ23wVۼJɰ v}KQB˛a'i X4p8v%PiLO((O@R艠lX<{Lք* `7K_s7eM0C 㝅b{NVتĩ{ f7HH-T's^=f&(q vtdt_\x"F 5<$^gMBȋM4(!3rND?Jrb8~,w`ax>)tuw 0~ &8K Bͷ~ç~U3f49` ,5B|G"_qggbm>oka8ѯ{c.Ǐ7 l{DWqc6EQg_988r /Nzv竪$Շ8P_2x7=}I~Ч=o ޵i; iY\L|f{qPy(ismʒjj|W;66>=,vwTd2gKcY(fAd Ȝb9$Sܵ{L6@R|,6] p Kvd +J)*"Tkqs ݘҳƏ[*}" @]v(wJ2r9hGʬe#pN%mܠ?VjG^oV; CBϿroDTU; &5>F4>osUHU @91:݌޿̈W d2roy<߯@}x~\J)#Z#o O2FY9fHU KUO=Pϕp=w7_L8Y߯+=X .{6mV9H6q3qafj GMPmpȘK",3"$Pk|9Y7ΚW^eWh u`W `$4bgNFb0 ufBjWq;Ece2fFй.7a]_)`P~] ceXl :<[xnfoSA@] Tw YI9Q)?VLsT 42zj24)ӫcr< sAteL,KHc[$ _5WAGE]F=E],P$Qu.j1D!YPd2b+ģv62wRu1OFA="q&ܢQ!.m0 -Ag} nD&s SX,P0VIDdffAt8 .!?vV (:em_QhÚ+M{-ݡ=8 +?ޔL>'-F^L念>BQnd{8sk| uKΙ,4ẕÚ߮.mqt."5&P ߁Mƾm;VUh ֹ'o:|_|aR"bpP-SO]e6ܑ)0.2򣃺uI,ݶ~ighJpŠ"IJB L(pMQm@`c+͖1FǾ&؆Ru ʻOL0x7#iI,EDzK3`}Ǹ_[/A ^ 5}w1ueӱ~ @.UyMjӦޘ SԤTV7`p %0,U l`>8\hO~>{/#%H^WMD}8=~4J_L\50sYx3,qR s]+ E )i5cIy-S)9r̷`s֔I_$,F—k6çɫZ싱8|!ZHls[R?^ķ7} ]#K#6Knzu&AI@).Jd*4O 4+?BZh8'2t_<x8xy)qSG,dAk,W?+/ثB͇H /$53SJI[SL%7 ,?)ߵ7t6c3.d#8eщ:W5N,꘮<3VLXͱcO3Э)ߍ?̖Q}45tzS&nsh@9o=[[Fa9v,e /pMop bԩp<8NNbjoy,/1t\(J?d^̄Ҳ"`Q[ojw.`E#ٖ-Vs摱v㌉K]f27%VFF'϶>Cba[jxm$]6yH1-'߇ݷ!i@_,f5•eqw˱!tbk[Ů__Q=([-<κuQy X&#R i]GWNB}?]ltv& І?Ҁ0_0$I|}6dy\P$&1sohOc^F[?x8J-TP\q4D}#y"iۂiY:w 2R<7UbC vD,5́ Fa=#i!{ P$F$-_!PJy{Z Z hx>1#4T&[RBZDxk* "x")!&k jC_5=ϛV-AB2 PX8m+h,"LR!,X] ;Ƽ^jl3a PRh2saVa!Q޿r*pҊZM5xRİHT~+//-Uo|fĻ'TJpwѩ#ԶN\ݻF,r}W'zk*8Sz# 5G C|{ͥ~<2!7*[C wtE'6f{"4j_ER#.$P:>NщFVz}Z p{<]rc\!jaRǦ$W}a3-9!a7FepW$s~iOM$\LO!)&U˰OvafXeX[ n0[(NP5tJ.;՝>,&m4WX%p!<Ī)(ͣ𰡠.X:U~4U(Gu@VʎvS \$>()LXC<tm=!34։/;];#Rw=ݹ[SըvWFfc-q(߃w?Jp'] ,~u{.w꿧Ot{ż<}?IDgXd n2ʔ9skQ|RҮl6 wPuo͝SJMKFو d`H?GD󲼒?O!!^=)PHOY7?08b(Uؗtp[LNgB_nY|M(h/eQb@B VZB,EFCO闾XOn]btx[T:0\PGj12!i!;$rc/DpM;?׌hX+Jwxaơ½ WTB ,oY3̧%RmvAK/g ZpEQݿ/ri ZP1.kJغ8ڈ!˒Kn ~B>֟ ˤSvGxRvpԢU4h{J˄IbT_% RDIHjۼweqW)Mm ;_ )(ԱJR)̩֚FvಋyK/)Q oHp_x tJ솁RfD-A;FؘWZ`.$(JF5HLNiluݰoW%J~3+t-q0⨤ . ދlaDj|u l䡁ψs݃c>-v+X9<(ԡ㓮1o:eº->RyS"a.n :B[݋܇!邕%ވВ+*NϢC Z70`%1J&9 P*# ]Pn KgD?ı }rsI_4˾ySL=EfAwBy^Gv;F"EsO0w8(;mG  =sbTNt۷߇bX/(>^u\0B,V)r% F[2X"O/Һfd 򭠗G` ӤIlMQ?b(Laimf{%o,RF%~ZryJʇnRKڕd,ߥpx%&as2؜dA׶Jx(x.%n#Yexx&WkNz-M2KMa,ci|~'6m0t 58ޫtS[ Ix$o+S& N #J-;6-< d^4GnJp p&xH#*zhBG<$eA``6&?P]2/4!i"5bo3#kqq,8y(`KM? z}D"MC37k+ 9 H@;a+ץohM$֡?]2jJZX(ufNehk0RMDѶ>x2Íu*rv];{:2%1P ('ݥJ2{>;;tG(PuK09T.^Y=7Km\u8{|cTZ --4JKњ%tӏD׮ }\T:^qiT$ߧ2$n,.ٺS[ơr~v-`*#WA?9(HіUEڌ1I= C0DxO5@w:T.= Nlؤjǻ+)%㯏kiZ"y=4c!yU_2b%%Y2~* sVZӳVd|?QCmS j?&hQx5ŋՐ;\;;+!6vk2Zc࢖Gq [qxApó7D60jIB )O +sl" ➺"ea# tu]Ye&d+pP΁an3"t]d.s}x4ۤ`!vUS jzʯ:EOsPE6t"Twdž7Ҙt#Wd>jh3zcEHz7-R.jQ&dK9a헞gNǧ[C4WY) #QGI?x~5 Ć] 2`c=/,ӭ`Q^ ~EWgG(R.q^3@4tFee{85eͱ1*إiBw33fcL;7wdR~Sn hJDL7h; }513S&ȷ a!ON^PiM3_{ E$jL}yK D$Ċ2R_d{#r%[I^\CF%+l\+Е}~cht)|q?OAg]/d(R pu jKwEXc"4gO坮z@ ¾g;{C@%hgy}mkeoe= |ڇ'^X@m tJs`8oFVi0E꾯ڦFPrXގmJ/Xb$$*eK5mR"sDo4N{xjRJ)9t'gs%%}۽Q)@%=:M+F zq !$i(bCYn_JJ행G{hxsUN;'%Gtt2O~0 oq]MDrZ(JC_vWfg-zvXO @`[M&7 peefDtL䩟].k ?"VF}0|79mNYK1Z5EztG,LnvI-}kP?pjNJ3O{#Ӝ4ڜ5~׊Qؓ-ڞ5RXs"=\Y=,`7ru`g`l?VSV/.chR/HKp-%Dh Т3 J$$XbX<6~bZˊK? 0TD`LV5Cǣ; ƐB_,^J͖W){tS__Z9j ݌=$ +V%"^8 p!0(G.U r'eeқ/¥l ![ظ+ݹPl74Į #njL_Ꝋ!ǴĿz#" Z\:ssm)ֳM~"(6ٶP @K&flo`$\9_vaoV&i?~ .p%) k$VAg k GSYY" ~8e1de*ڃ=LgA~M {g4n} EoeRh!#} 3ĂByl%KT llXR߷)kMNy]sJUTejډ܉:xJp}͆pi^egSh`1̕Bm0VjCyw^=[7㉙>rDI:f >d9U-\^e!S۽(}M-h $v .W#:C)Q".oe薂g\eM*i )Nr&ƅ>rc'E*\9p(p .@ 4D)Mm%Jϋ91fZ-g wC e*Jo/Zg5<!L] = +$wS+w,_Kr}[ZAԡUoyg>V|-8 `ҽ3ğ)M+M;N! .2wp8TzOܟiע`hSGY%Ф?'wȗ}q o2ٲDnֱA;4Бc?Mev8|)/M c?SD.An@$p`V| mשyψaURG#%p\]Z>!& H$vb ޔLzo2;*o6[i/:R᥺t=7pXoL5pq\u$Tp˽ K{\.S40iu~&L9UZM,eI'yxNUt=ϓ%=3t7ZH˸M;AOF@ͯM[=?жogJ'xpkCX^ 6~˓d8v2C&15#0ejUD2vMcnh*@֔ā\wn?§`4}uSp=Ԕh/34qrKzLHCz%\>ԔQLM*kf7-/#UT dyD;JA2$VFۨJoޅ1X v>?tۂ1|5[vDy]6zZZ'zZU3506cOZ%i,9;Oz NJ=3rJDPwSyOBO($ Nq$SDS YEdEk5ߕd(,#^-i^x7ma80N8]kN#'AG3!q2J 52۽=R:?̝h3bq`#~ *\JxetAyŧiYS#8(`x#7J @>Vo=G/D51:*>Nk{?)x2-w9k;kiV(ֵq '{~I4{&L7v:}!/Bݹ;]`mkk©(<,@e8]I 4o*Ջ@FmQKixCR{tJGq4^Do6n.ѕJѝs Q$jNa73D$X#мWH;=tՃ~D;b8!+4YТdؠ=,F&>TQ6lՐ#+Sw,$=dzݺMH7uf_ty<3U4%7lJÑ+d)1"ɑ)X_q.r"!zk]@ɷ GrlR2&,f 8(ب&QB< d.89uk\*BVVY%JjC!q+ Zdes!ʾLL<.JWԃZ=r0r#MVǐNp۲"MEnBjHwRSrga+jNo+ENo 6.g js&XI*op"K^ Pidۈ_FS+X˝-Vbwug2L$ .S6XՕo4j'UH.:ЬXP}Bf8p &^v7.sJarMtCW*!0q"hY6/J OK`VQC3k-=hl6)PNe^Zj[az&ue7Jw3ކl\Wc1ٳ˟y_)Ln:KKUџ/u#J2P|%;%Umf\vI]9*釬RO2Qr1:I_Ls&e1l.ιfIQEilT[`e:*X}WOs vmZ?L ɭG؝yL`7د a8TA v׋YP;{0G$\D+WSIHzYvEf`fEm*n..Br%w hpj];dr'Zcl#YGfݹC*'qjNLp.1jmڧэ.wckN8b e^r# BwvJuTN|MR%*֍wk_}m3*K,/lya0j @9i>;GԚNo`Q.Yv@l#l3C!t\.8r*q_QTI~im?.rEi&u.R}ni%!-6嘇_߂ĄUx 9 J>Ƭ\hOa&Ⱕl?<8J7}VI TX5-\\eFW@^7J:s=X6 P!@5ȋe؀Sf ' gJ@ g HȧP))-1Lv= w'[JRy%\7R N҂۷ 29 aE9VygrJ,XF剁$#%uѣ;"gaD?,-}]h~#եڍ-3uRs0 e~Y9@I{v0񆣯:&Ӹ?S LِJ<zT? 7n.nvP0 /Xp{p*3m r/Q)vt`{~L{*8F\wmq\O会5cePnW}KR6ŽoӘFإ%j:[RČ7+qܟ/v>>fAv1A- tDO஋dhw”^#ݶq/ʼIJyW"4ƁZx2e[8\sDon黦dd恪Q R~dn<wRY'*F39m=gÎ 啬ͥCc2vn!w"ąp'u3 *5~ )zH*Ċd0伛hg!N |eCdfZM۶2t*Pʃ@KRUTpou1|\Jo:T+~!\!`lT'#֕sU%cF^uud<~*t/}Ni8.頿>i GB1ex s(^UD- #gDt{X-x+R[\WV, @&v1V>~oDc[#YQςj-J`,dԗ,ަJc@nH"D`psGas[] U bzMVBe/VeA _ͥużrX:Cl|. >X 5:uy6cEҭ{%6V.ؿD PZ whZ$ձK *N]Skz8x:V]B\YVrUZOw!oΓ0PF N;'3mnƘ5'?F2؀ .+?uhbgk |] VAeR'VEX%VĊ(,[2LP3TA?1eU6Y=jf2KYzIhK*QБS]E4as' <+?VoL'Ic#=(܅L[t-m%m&ʹG)tݭH+Α8814*t%| we͇n?1]h_w`[XW2cvRX.Z ?TJ):e`{b 7A b23L%!+K_!tX9IM5$(x(pR|u|s:@Nf\sbNO)L穨v-D,|R򩐞-clH4 'EG+N-ZňAiHq%: pjLm!s$V+S?j`E"Bcn*ԍnzcp!2I B5?[^gu*ja4%~7VI`͚jI'N#1pcRKTP1*CgngbcI!_gIZTjNjW#{B _ R=\? -a:u_.3@Fx9SDeVٻEKzKEtWC.(m05}ҶcAClkPM$@kOwyKdsdM=  ]ɠ7dV ;Lb !TyvEP{bP}put)@XF֓%'q6lra&47qnGi+[DYuau)p44. 5I DdͦTuj4$mzOlڋҢpyH䝬[%*%-$"7 ywNmwG:mC89]t^ |AK*RzC&o(eA 859a[e$O5o]k2< ?'T׋tW4+ߋ5[BY"(W}_Ư' bWed$ҧBJ/VAs8l;OK?e}NͽN0W?Ȑ-cb!9{!Kt/:.7W$FP~_#3sd# e ]EM/ق x~/~н\TK{*U!1c 4S% $E5-TdI@#zo3֯bcelQ ճvDqQ[د0wf#uX:.h#`Vd<{ F~PQxSE_(M6#/#e;~~K~L)9VA^9pxnM'RJ j~1FR2{"N"LC=O?BkMprU/}8&*&)1-7ϑ )W PAw29 B6/m4[SH= }C>Byv~V?W7CG$O ID`ɳ%qOo XL2RX,fǝ<fz0ܼlfӠUG2" 6;<-12{ DRĉMl0/|o.?C} P:Lr&7++Ѣ0mi  W !ɣ{Suޏvס.c+ZpkC1g+.5&?9xu 27[01^Ջ _ӎ`2 Z]ӊE=%r;7B$ߍ,%dm_J-{%FW_Y]~;$I/լT`x4`{\ޤPA ǚr}TuT{U]ׄ8Ex~ 89eZ06[np"'枌/&ވoFV]%`J#4Ÿj,X% O 3$Om$็k1o 7ӭ[+L}#Qyd'%^NK-4lR5 Ka NN㞕zt>WWOcWqP`="gq0Wqa'Smfj`-ln4fDvlL?  uj4ئIx=.+飝b \@=x7|vgFr S$bvapa'+!}K~0ϺlF^,GLHSI8qpH ؖ;Ν[jW\7Qj}k$:uV.h*~"P+@|4D i0fnib)s=Njٶ'DFX#4/-@] YX ک5.RSCé'.' aZFNE)8^Y=ZDh3z䂟Wu9Wuknfi;FzӡsӟF>~}?Xp7*F3{{*:E9ﶒJwC57g0_g]:`h<.hipŭ ԭYĥCzk>]:>*_ >6`Y)P2=0gCae.PsA4_n! Z<mz:2_-`͜p V-B^f @IoX1SK=tf-:$FDr +JL%WKe K ?%-3f~-V H53Q2JrmE0J5q,I][pAГņdRF%rSJ}5"kZtXx-{7ccPlk4JTXB٧hﱡ)l(* CG,krB`?њmjp#^ę.FpPa?5O̤^^(vmDWƦb )*Cc@,Qc8֨Cz)|lX )u &u OfR*w5'4/x*t< "tV*` µ3So3ֶ!jNH 87'c!R ݼ#bXE C(#`Oyb-)q6LQK-ϤBsD"[XC҈zE0 hZv8i q(ͅN>I$u F˘n{`U^91Ji%({-lja~I!qPWݷeD 4G8ZFBRPR+Ț/FآMUA ScbCM.^ y@pf$>Aރ"X ~`(nOx vo9t_UlJA@:/7HNC1@s"↡cqS"< yQwr`oIΒmE->u3VϿ1.?u2%pja#lro@\/,!8 #!۷*,y4|>WbTUe:FV RDkɀh;e8C"Jm S/+I&U#x;P{-f(C1:hqs`Ρ/cg:g߿BX@90 GBUe=N] IGZ6#L0gPHte6baH~(m7-Uzc  j d 0[I«?M:BP%ood[J.X6F7/[=S=Ѹ~)~mO0~hIfh]-9c˔L^QuRtv jG0N 4EZq[&j9& t"P3l'6` 7~{LRbW9`bL#KM;!S ,BU _R]/G$%|B{Ta0v@slS vKk<[Z%Od>)D0fgyʝ K qPkqB|d]#BC:WԿXkͥ.A`Fت;J& bո :Ҝʥ q[ KۻckȔ$(W'Z>#X$PtT;~Xgi{s pJyZY)whG-O_/'юDcl x=}.S|-m6ſΑ#I zj^`@8׸& \ZZO;G5o2o|, Ќ] UY qA G%&.]˸18pĻhU3K {b}dH?zipard0D{]pT$^4IyY+)v tЬgQP],3-`ǶXxU\JOv&Z* |ؑ j̜_GupnE,=K.-Tx2PWވIxZiZ]Y%ty$)XPG&퍉삃 1 zAۊ"~#4|Z{ڑ*fc9 h(;l[hK )y^̜tkx kbEo. j7{~=T&Q*Ϡf))3vGB̖COF>^gOLKSIJ+vz-,ʟ|޴Vһ'Uڸovā? o}7F5kR[V~S`d_Z+sIv)=3V,8hsgMcg DU-Oư֠nu` E9;Rܠ$qi`ϲyi %!!OTug_OjBC0@ ^m6|ڙ┩ 0-VTsҾ#3.}@lc\dwYJ7ԇ ":.„TBkaSua.UJkK3|* _7L U5;&\q79uݰ`SюcbFd"v~|Nb3qL aJrXJuN* ª 7Vx,`& G!خD>1e0mٱ`Q<'fNVmύ#%SbZbAT=JA"y%-s<$Ղ@:iw;O/9HIg[ ج'ɴEKjL$"#+F-@y:5;{3JS ˳xvRI><bw>aFzϝԺƱKQbcU  )|^)9㘱(:6>[L`lJ #l]D߀|ډ, rpEf2FQv!BgDޝw@\)>hٛ^oȘ)}%D;~P).Хm4JxI=a9$MtL t4x{w?аn#yhZtJ[\G}YVGZ. CAn' PL˦ޫGy,I+ .D̘HytKXo<왫qX,FYS4"܀вړR4coEÀ8]^J5ѩRhyJpӔnX]&L^I)HJɈ4cf׸f9涱` Wb3kd0kz4&RqEl]9w__͢9<0~qE?69AE.z b[x'^k^GU6me![>{i\3М VD\ҸP'4 q(P2X")-І+[F޲ogSnc{ l(m/6Ghb)D7}$|FA}2Wǐoۛ[鸏6>96 J-(VJYZsgʃŻ X3?5ofbǯqZW0臸03Zm3@g+opgWϡ\ݡXyXiòKFSqABBΓT i ~MsHyBXv}`oi$I5t>$tH6{ f-!K&_vkA(ephYcnIg.M+uzS à>A?TSjrEt2kK<)CPb%:6l+t9чOށ{KLvBH~I\vsZnS  l}eZÕRk3ʪ| ̘ c\0K`]uswi%-FqJ(+Zud`.FOۅ(o_b h)K~P >.Z߹l [o Rqظ#D`"jHs+`.iјFcsNjOsY-a\lƔ%ʪ6^RV쐏#u]>y7$5?2oR]st}RDd%MBP`pi(SiMvndV*zttYVfcU_UpYIE] ~ תƹ,a^hQ7Z םrM#JR/iVyHAYu CԪQ%8=Qm RmL&Vef/.V{m8,lPAWd𳲮O/#فSGk`WR:*@ߦ-*:j]6$8kƾ8PQ^)h۷}朣לCD}d>{ʪ=4tR^qNi SSĬUMJN.Wv;>9q 7s>\KKZєR +V7Y.hv/=\nM'ڝ/4L >Cƶ pոlӀw@WTTb;x([ynGYL5|e^_|=^W cHJ1{^{^Z4vBkwƣQe'_9^aQ18{C=Es=ٜl PIjߗ8FkOM.ueq4sR9Mh__"Fp;fӃyA9hKk戤eo՜D XTmr52~$M61QaY}ЊpBy&RЄWYcXM_=Ւ%Kj$/xlu\ ZqV[b{$$muX_\T$_Ӎ&uVȡ8OWjRxԸ. *eZ=7nOnk+j8#Ĉp }KgkP݁EcʠN*Jvn uo^m4;.=*JI#s$c5/2m)?-~kZQ折g 73بo=znrhݘ⁘Z WupgK\k񾍅Y(ILkTPP-js&Z