xen-doc-html-4.12.4_02-lp151.2.30.1 4>$  Ap_+/=„ }/-# knń DH3Bnhe ۣBp8AA7:L_7נS "V&c|I3&~`).ClSOcdgUʁW0R' I(:rUJ_Khg׋ŅZ,QU+Y|75OcnGE^FS;5,%M0:Cr+ryEvedccadf3c700afe8eb5505f4ad63b0c5c3d925fe1591f53ea83b27286471c1457ce2abee671160e53d0200f39bcc6930d171f5ac t_+/=„U+DqfirW;3R7bJYk׈9*6LZʵگgv 2XQ?<2lmsvoaHJ YCV\: b#iu+*'ק9vZ~L9]xǘG ,@/6|1+uկ[k[g#?gyI2ӺhF:Q\"axly%G Rt@FBH~n >p9?d & M AGPMM M M M M M<MM>dMO(s8|S9"S:9SGMHMIMXhYp\M]M^b bMcdefluMvCxen-doc-html4.12.4_02lp151.2.30.1Xen Virtualization: HTML documentationXen is a virtual machine monitor for x86 that supports execution of multiple guest operating systems with unprecedented levels of performance and resource isolation. xen-doc-html contains the online documentation in HTML format. Point your browser at file:/usr/share/doc/packages/xen/html/ Authors: -------- Ian Pratt _build74 =openSUSE Leap 15.1openSUSEGPL-2.0-onlyhttp://bugs.opensuse.orgDocumentation/HTMLhttp://www.cl.cam.ac.uk/Research/SRG/netos/xen/linuxx86_64ot9DA'6@7x3#B( W c e $,76H"yjQ <3 "z79 ;#\xAAAA큤A큤A큤A큤A큤A큤A큤A큤__p_p__p_p__p__p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p_p__p_p__p_e171864f5cfbf7c7b3fecd9b9fbeb3da9e87f63a7284ee52eeed093f8ad303ecf53beaf653f26eae12ff7ced3bf0735dbedad0d8baf45d31e32d33e0b868bfa954e980d65bcde307bad2efeab9640ef5c720b4ebc78ac8cc1eb48bd6134a5280b3422df9c1ad850ce9b456e83713da51f123c2286cf1f9fd4eb97f57c3eca9adbd5267a76a14fe4153f4ca727fb99f1c0bec9e8ff77302865a83919fa74e2b8db80b94ff1a198b4d6e03dcc25f86a1b332a80cf36f7df4bba07c19d192059b2cef514a67cdff39837020d8d96a1ba5eda7d01962b24dab6fee8c475ef8081dd837e73cf353da4bddd8d662b9cf85d2a807ecca293298fe8b00cd352cf958104b078f07651ae04fc86183bc953a94d4437042b3a3e5182bfd03e899ed64ce4bbd561b47426bf32b42f14d7c7c61466a753a6c7dff614ed227f34a3e646040c6cbd344261e1861b09d9bb8bb11a3caa1fcf632c9edc2107b175ecd48555e9bc639851050a5d238d9b38e13e23f494782688926fa6c7aa008016b3ea433277f32c6d7554269b2dc588684a32eea5da8b59ef1347b8fcebabf743127a8d51f8ed2838c60977071d97490acda0485b064d9480c95b878f280d9c1f79d960b7854985c2015fd56a367e006535db8b49524ae66cd08c0afcd4ef0602fe65a9807c3302d61b4dbbfa7a6fa0573416e7292e459d6493fb933380541ba8fc8598dff289775d07b7ee778bc7d235842e6fbfb0e33f9459e0d93dea5311bd00894c6495d7e8fe466c9be077fa0ef0ced23a246e92d14cc0cc8fd757931079cf928689b544b326b03382516373fc9221dc98277ed58043f0d5b49a8cf0913e57e5e47220c2c969ee6135d71a7bc45978b5053451cfbb78bf8b1a5f6494e677bde29652eee3ff59a8c771f2fb58d22ee3f0764495a5a3a33d4b3fbe946ff9f9db3734ec8b211ad4040c61e56acba239b76d0bdd6f9a10b0e60f694e5b9832577336615df9416bfb01e547a2fd520ec38974f159ee03f56ee49cbab40a916fcb20b4eaf75c2fa934371cc47909aee32715d5104b6a3c97d6a699beefe9587b72087783636c328d33863d96b9419f4afb48eb0535f312a84a3def79f7d7a5b41e3747366bb46340eb3e1c4bbda2c55f72a5a5a11d272e7d4ce4bb5c2d12c4c2d6b40de640b4912d3df5076c347e7cad2371f3dc0bc10c6877c8f5251a5a57ddc6c79e1f9b532f89f9b3fc4dd2d139ace9382e594c2c73439a9d4f100fc61c4e4f9294d4239776620fbf590c80aef40b7e6ab58cefe9e4351ef6afaa6bcaf4e55d7809df6392fdb96aadfa0507b89d930b9500c7a95869685253e2082a4d704ad9ab9a720307e4e19a4e5ede94dd88cd418f7f9055306474ee16f502772341ee0cd7fe83eb735ee684faf9f22847781296550c42f0955595f5f23eff9cf7b00ca27ee70988aaee9f7ec2154a382909b7652464c29ad603492e27c76bd7d0de3b5198d0867fe0a75ebd93bafe2e73cf681a88dca3217d79376c353ff4e1e5ecee8c41c70e11b8c9e2dcfcdd851724d27ac6e7db6d1ebea36939bfc87abb5ee94ed0789538023410245976728897864907825a5a2538c25cd0aa407ba15e58bed9f42232379103f1ee4738b1644bb9c4dfc41af8064e2a518120b48fbc4e08145393f66b0c5a021e9382871a17c16c95ab0ee99f64d6dc5c3a303ee5d0ea203246d629ec9a01164f79991b95599c26b803f2c8bfb407d7ea7de55a783c40780dcb7f993af187e4d4200a7cd1ffaf63b68eb2cc3c3d663847edfeeeed22d3b1039b423ec94b5198ad7daba0315ada992171ac097279a5924539c83bc431e243edc9efd772f673fd5301bc159111fcd005b864ab1f4b803e059590043471e04d0ac7ec96fe74dbf857c003a9b4163966919de58c0d14d493b5d7c6826e43bd61f2eda3c2a4a33fd26f285982fb97cc7b4730fc7c1c5289c87cc4d1dfe6184c7908079cfb34de8b6d4d200fa7a5cd899e7aab4589a5d0193118825ac5072abd29bfa809c3b3aa704ec1d432c80a00b3c661489ab62333993243951154c8ffe56cf475ebcb8a54982ecbd145cbe19ee58416bcf16a88f474895a8626db19ae5f3654c894d7337bcf72c1fc59037f947f713649a84322888eb75d9dad867249c4c135787affea14ee1cf2c50b4403362cc91e5249e9a32270b77e1d08f1217206215cbdcbd7b4f179b7787b056e065805b649e73f32af8d7b9fd0a5b317668d9ecd29a382e968e6466945103b1f10e378ccf028b0040d857506d6a2f9f9f7202547fb83347ebc6cf52cf4d3228d603a99a49af40bf7589771dd6810ba68ffd01c20c7d7743ec76891e07a4851f086e043731368850e313269ca98ab91c156529ac3b961a67f54a522ef093965d6be4431b21e9ec2fc3e6c70050a26c3c78777e5200cad4282b96411eb4c871e9845d2b4b1163c8f2f71b3f232161df132b103360ee3fb48495eabd71c2be87437b2d33715486da3e3443c567a5b9cb6b8f54c07b3fac562cc7f7d20c570e6df66605f996aa6d38f8234276f2b8fa5c54a10903b7fa29d49d6dbdae30ef984b372a6dbe9c2786b09c1d722ffa63f7cff6848a3b35a68d4fbd7770dfee8c9157c4151eb9d4bb2e16e25f710099b13ab6c7b0dec076e76d504e091cf2642a805ff778edfde8be1bff36fe3825f070a22662ca16c8b8dc1ee56c4c73c3e56dcee09a80dbf1fabbfc82ede8ce1fe4f43a5c4bb36450cafa0e20cb488f196d3031a4ba0315ada992171ac097279a5924539c83bc431e243edc9efd772f673fd5301be9845d2b4b1163c8f2f71b3f232161df132b103360ee3fb48495eabd71c2be87035880f29f41521dc183e25605c34d8753b41f1a124161c920949ee537f424a6372a6dbe9c2786b09c1d722ffa63f7cff6848a3b35a68d4fbd7770dfee8c915798394ef67fe837f917dc3f0101b89193414868cd6bd7c94ceb5ab3ccc7ed408frootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootxen-4.12.4_02-lp151.2.30.1.src.rpmxen-doc-htmlxen-doc-html(x86-64)     rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PartialHardlinkSets)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0.4-14.0-15.2-14.14.1______[f_X_Wr@_)M_{_^)@^^@^ϧ^x^@^^^s^^ku^h^V]^M#@^0"@^@^!@]B]*]X]d@]@]@]]fl]M`@]B@]@]]@\\ޢ@\ڭ\\@\@\@\,@\7\\N\@\\+@\\M\M\\\@\}@\k\X)@\J@\I\A\?\=@\9\73\4\$\l@[H[k@[@[^[^[/[@[@[9@[v[W[CN@[<[6@[0@[0@['[!@[5@Z@ZnZ@ZZZ@ZmZԐ@ZZZ@ZZ}@Z}@Z}@Z}@Zz@Zz@Zo Zk@ZV@ZS]@ZOhZ:PZ1@Z.s@Z&@ZOZOZ Z Z Z@Z@Z }ZC@ZYYYY|Y@Y{Y*@Y5YA@Y4YYYbYY@Y3Y@YJYJY@YYV@Y@Ym@Yw2Yp@YlYh@Yh@YS@YJ_YI@Y5GY0Y-^Y(Y"YY;@YYY@YtY.X@XQ@X@XۡXg@X@XƉX@X @X@X@X@X@XXX@XXXwoXs{@XlXWXRXQ4@XEVX43@X.@X*X lX&X@XX@W@W֘W֘W^@WiW:Wt@W.@W9WW@Wk@Wi,@WbWZWZWZWYZ@WV@WEWBW=W;W3W1@W1@W,@W(W(W(W(W(W#LWVbV(@V3VJVxV'@VV2V͛@VŲ@V`VwVVV=@VV@VHV@VvV%@VV<@V@VS@VV@V^VwVqR@Vn@VXEVUVTQ@VMVMVMVA@V;DV9@V7P@V0V*!@V V@VCVVVf@VqV@UYU@U@UUݪ@U@UnU4@UUK@UU@UU>U@Ux&Un@U\w@U[%UUUPUKSU>$U6;U%@UU@UUU.@TgT-@TT@TZ@TZ@T@TT@T5T@TLTLT~@Tl@Ti@Ta@THT?@T=@carnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comJames Fehlig carnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comJim Fehlig ohering@suse.deMartin Liška ohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comJan Engelhardt Guillaume GARDET Guillaume GARDET Bernhard Wiedemann carnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deBernhard Wiedemann ohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comtrenn@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.dejfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.deohering@suse.derbrown@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comjfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.dejfehlig@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comohering@suse.dejfehlig@suse.comcarnold@suse.comjfehlig@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.commlatimer@suse.comcarnold@suse.comcyliu@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.derguenther@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comrguenther@suse.comcarnold@suse.commeissner@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.com- bsc#1178591 - VUL-0: xen: Intel RAPL sidechannel attack aka PLATYPUS attack aka XSA-351 xsa351-1.patch xsa351-2.patch xsa351-3.patch- Upstream bug fix (bsc#1027519) 5f92909a-PCI-cleanup-MSI-before-removing-device.patch- Update to Xen 4.12.4 bug fix release (bsc#1027519) xen-4.12.4-testing-src.tar.bz2 - Dropped patches contained in new tarball 5c87be47-libx86-helper-to-deserialise-msr_policy.patch 5d976da3-libxl-attach-PCI-device-to-qemu-only-after-setting-pciback-pcifront.patch 5ec2a760-x86-determine-MXCSR-mask-always.patch 5ec50b05-x86-idle-rework-C6-EOI-workaround.patch 5ec7dcaa-x86-dont-enter-C6-with-in-service-intr.patch 5ec7dcf6-x86-dont-enter-C3-C6-with-errata.patch 5ec82237-x86-extend-ISR-C6-workaround-to-Haswell.patch 5ece1b91-x86-clear-RDRAND-CPUID-bit-on-AMD-fam-15-16.patch 5ece8ac4-x86-load_system_tables-NMI-MC-safe.patch 5eda60cb-SVM-split-recalc-NPT-fault-handling.patch 5edf6ad8-ioreq-pending-emulation-server-destruction-race.patch 5edfbbea-x86-spec-ctrl-CPUID-MSR-defs-for-SRBDS.patch 5edfbbea-x86-spec-ctrl-mitigate-SRBDS.patch 5ee24d0e-x86-spec-ctrl-document-SRBDS-workaround.patch 5ef44e0d-x86-PMTMR-use-FADT-flags.patch 5ef6156a-x86-disallow-access-to-PT-MSRs.patch 5efcb354-x86-protect-CALL-JMP-straight-line-speculation.patch 5f046c18-evtchn-dont-ignore-error-in-get_free_port.patch 5f046c48-x86-shadow-dirty-VRAM-inverted-conditional.patch 5f046c64-EPT-set_middle_entry-adjustments.patch 5f046c78-EPT-atomically-modify-ents-in-ept_next_level.patch 5f046c9a-VT-d-improve-IOMMU-TLB-flush.patch 5f046cb5-VT-d-prune-rename-cache-flush-funcs.patch 5f046cca-x86-IOMMU-introduce-cache-sync-hook.patch 5f046ce9-VT-d-sync_cache-misaligned-addresses.patch 5f046cfd-x86-introduce-alternative_2.patch 5f046d1a-VT-d-optimize-CPU-cache-sync.patch 5f046d2b-EPT-flush-cache-when-modifying-PTEs.patch 5f046d5c-check-VCPUOP_register_vcpu_info-alignment.patch 5f1a9916-x86-S3-put-data-sregs-into-known-state.patch 5f21b9fd-x86-cpuid-APIC-bit-clearing.patch 5f479d9e-x86-begin-to-support-MSR_ARCH_CAPS.patch 5f4cf06e-x86-Dom0-expose-MSR_ARCH_CAPS.patch 5f4cf96a-x86-PV-fix-SEGBASE_GS_USER_SEL.patch 5f560c42-x86-PV-64bit-segbase-consistency.patch 5f560c42-x86-PV-rewrite-segment-ctxt-switch.patch xsa286-0.patch xsa286-1.patch xsa286-2.patch xsa286-3.patch xsa286-4.patch xsa286-5.patch xsa286-6.patch xsa333.patch xsa334.patch xsa336.patch xsa337-1.patch xsa337-2.patch xsa338.patch xsa339.patch xsa340.patch xsa342.patch xsa343-1.patch xsa343-2.patch xsa343-3.patch xsa344-1.patch xsa344-2.patch xsa345-1.patch xsa345-2.patch xsa345-3.patch xsa346-1.patch xsa346-2.patch xsa347-1.patch xsa347-2.patch- bsc#1177950 - adjust help for --max_iters, default is 5 libxl.set-migration-constraints-from-cmdline.patch- bsc#1177409 - VUL-0: xen: x86 PV guest INVLPG-like flushes may leave stale TLB entries (XSA-286) xsa286-0.patch xsa286-1.patch xsa286-2.patch xsa286-3.patch xsa286-4.patch xsa286-5.patch xsa286-6.patch - bsc#1177412 - VUL-0: xen: Race condition in Xen mapping code (XSA-345) xsa345-1.patch xsa345-2.patch xsa345-3.patch - bsc#1177413 - VUL-0: xen: undue deferral of IOMMU TLB flushes (XSA-346) xsa346-1.patch xsa346-2.patch - bsc#1177414 - VUL-0: xen: unsafe AMD IOMMU page table updates (XSA-347) xsa347-1.patch xsa347-2.patch- Escape some % chars in xen.spec, they have to appear verbatim- Enhance libxc.migrate_tracking.patch Print number of allocated pages on sending side, this is more accurate than p2m_size.- bsc#1176339 - VUL-0: CVE-2020-25602: xen: x86 pv: Crash when handling guest access to MSR_MISC_ENABLE (XSA-333) xsa333.patch - bsc#1176341 - VUL-0: CVE-2020-25598: xen: Missing unlock in XENMEM_acquire_resource error path (XSA-334) xsa334.patch - bsc#1176343 - VUL-0: CVE-2020-25604: xen: race when migrating timers between x86 HVM vCPU-s (XSA-336) xsa336.patch - bsc#1176344 - VUL-0: CVE-2020-25595: xen: PCI passthrough code reading back hardware registers (XSA-337) xsa337-1.patch xsa337-2.patch - bsc#1176346 - VUL-0: CVE-2020-25597: xen: once valid event channels may not turn invalid (XSA-338) xsa338.patch - bsc#1176345 - VUL-0: CVE-2020-25596: xen: x86 pv guest kernel DoS via SYSENTER (XSA-339) xsa339.patch - bsc#1176347 - VUL-0: CVE-2020-25603: xen: Missing barrier barriers when accessing/allocating an event channel (XSA-340) xsa340.patch - bsc#1176348 - VUL-0: CVE-2020-25600: xen: out of bounds event channels available to 32-bit x86 domains (XSA-342) xsa342.patch - bsc#1176349 - VUL-0: CVE-2020-25599: xen: races with evtchn_reset() (XSA-343) xsa343-1.patch xsa343-2.patch xsa343-3.patch - bsc#1176350 - VUL-0: CVE-2020-25601: xen: lack of preemption in evtchn_reset() / evtchn_destroy() (XSA-344) xsa344-1.patch xsa344-2.patch - Upstream bug fixes (bsc#1027519) 5c87be47-libx86-helper-to-deserialise-msr_policy.patch 5f479d9e-x86-begin-to-support-MSR_ARCH_CAPS.patch 5f4cf06e-x86-Dom0-expose-MSR_ARCH_CAPS.patch 5f4cf96a-x86-PV-fix-SEGBASE_GS_USER_SEL.patch 5f560c42-x86-PV-64bit-segbase-consistency.patch 5f560c42-x86-PV-rewrite-segment-ctxt-switch.patch- Upstream bug fixes (bsc#1027519) 5ef44e0d-x86-PMTMR-use-FADT-flags.patch 5ef6156a-x86-disallow-access-to-PT-MSRs.patch 5efcb354-x86-protect-CALL-JMP-straight-line-speculation.patch 5f046c18-evtchn-dont-ignore-error-in-get_free_port.patch (Replaces xsa317.patch) 5f046c48-x86-shadow-dirty-VRAM-inverted-conditional.patch (Replaces xsa319.patch) 5f046c64-EPT-set_middle_entry-adjustments.patch (Replaces xsa328-1.patch) 5f046c78-EPT-atomically-modify-ents-in-ept_next_level.patch (Replaces xsa328-2.patch) 5f046c9a-VT-d-improve-IOMMU-TLB-flush.patch (Replaces xsa321-1.patch) 5f046cb5-VT-d-prune-rename-cache-flush-funcs.patch (Replaces xsa321-2.patch) 5f046cca-x86-IOMMU-introduce-cache-sync-hook.patch (Replaces xsa321-3.patch) 5f046ce9-VT-d-sync_cache-misaligned-addresses.patch (Replaces xsa32141.patch) 5f046cfd-x86-introduce-alternative_2.patch (Replaces xsa321-5.patch) 5f046d1a-VT-d-optimize-CPU-cache-sync.patch (Replaces xsa321-6.patch) 5f046d2b-EPT-flush-cache-when-modifying-PTEs.patch (Replaces xsa321-7.patch) 5f046d5c-check-VCPUOP_register_vcpu_info-alignment.patch (Replaces xsa327.patch) 5f1a9916-x86-S3-put-data-sregs-into-known-state.patch 5f21b9fd-x86-cpuid-APIC-bit-clearing.patch 5cf8da09-adjust-sysdom-creation-call-earlier-on-x86.patch- bsc#1172356 - Not able to hot-plug NIC via virt-manager, asks to attach on next reboot while it should be live attached ignore-ip-command-script-errors.patch- Enhance libxc.migrate_tracking.patch After transfer of domU memory, the target host has to assemble the backend devices. Track the time prior xc_domain_unpause.- Add libxc.migrate_tracking.patch to track live migrations unconditionally in logfiles, especially in libvirt. This will track how long a domU was suspended during transit.- bsc#1173376 - VUL-0: CVE-2020-15566: xen: XSA-317 - Incorrect error handling in event channel port allocation xsa317.patch - bsc#1173377 - VUL-0: CVE-2020-15563: xen: XSA-319 - inverted code paths in x86 dirty VRAM tracking xsa319.patch - bsc#1173378 - VUL-0: CVE-2020-15565: xen: XSA-321 - insufficient cache write- back under VT-d xsa321-1.patch xsa321-2.patch xsa321-3.patch xsa321-4.patch xsa321-5.patch xsa321-6.patch xsa321-7.patch - bsc#1173380 - VUL-0: CVE-2020-15567: xen: XSA-328 - non-atomic modification of live EPT PTE xsa328-1.patch xsa328-2.patch- bsc#1172205 - VUL-0: CVE-2020-0543: xen: Special Register Buffer Data Sampling (SRBDS) aka "CrossTalk" (XSA-320) 5ee24d0e-x86-spec-ctrl-document-SRBDS-workaround.patch 5edfbbea-x86-spec-ctrl-CPUID-MSR-defs-for-SRBDS.patch (Replaces xsa320-1.patch) 5edfbbea-x86-spec-ctrl-mitigate-SRBDS.patch (Replaces xsa320-2.patch) - Upstream bug fixes (bsc#1027519) 5ec50b05-x86-idle-rework-C6-EOI-workaround.patch 5ec7dcaa-x86-dont-enter-C6-with-in-service-intr.patch 5ec7dcf6-x86-dont-enter-C3-C6-with-errata.patch 5ec82237-x86-extend-ISR-C6-workaround-to-Haswell.patch 5ece1b91-x86-clear-RDRAND-CPUID-bit-on-AMD-fam-15-16.patch 5ece8ac4-x86-load_system_tables-NMI-MC-safe.patch 5eda60cb-SVM-split-recalc-NPT-fault-handling.patch 5edf6ad8-ioreq-pending-emulation-server-destruction-race.patch- bsc#1172205 - VUL-0: CVE-2020-0543: xen: Special Register Buffer Data Sampling (SRBDS) aka "CrossTalk" (XSA-320) xsa320-1.patch xsa320-2.patch- Update to Xen 4.12.3 bug fix release (bsc#1027519) xen-4.12.3-testing-src.tar.bz2 5ec2a760-x86-determine-MXCSR-mask-always.patch - Drop patches contained in new tarball 5e16fb6a-x86-clear-per-cpu-stub-page-info.patch 5e1da013-IRQ-u16-is-too-narrow-for-evtchn.patch 5e1dcedd-Arm-place-speculation-barrier-after-ERET.patch 5e21ce98-x86-time-update-TSC-stamp-after-deep-C-state.patch 5e286cce-VT-d-dont-pass-bridges-to-domain_context_mapping_one.patch 5e318cd4-x86-apic-fix-disabling-LVT0.patch 5e3bd385-EFI-recheck-variable-name-strings.patch 5e3bd3d1-EFI-dont-leak-heap-VIA-XEN_EFI_get_next_variable_name.patch 5e3bd3f8-xmalloc-guard-against-overflow.patch 5e46e090-x86-smp-reset-x2apic_enabled-in-smp_send_stop.patch 5e4c00ef-VT-d-check-full-RMRR-for-E820-reserved.patch 5e4ec20e-x86-virtualise-MSR_PLATFORM_ID-properly.patch 5e6f53dd-AMD-IOMMU-fix-off-by-one-get_paging_mode.patch 5e7cfb29-x86-ucode-fix-error-paths-in-apply_microcode.patch 5e7dd83b-libx86-CPUID-fix-not-just-leaf-7.patch 5e7dfbf6-x86-ucode-AMD-potential-buffer-overrun-equiv-tab.patch 5e846cce-x86-HVM-fix-AMD-ECS-handling-for-Fam10.patch 5e84905c-x86-ucode-AMD-fix-more-potential-buffer-overruns.patch 5e86f7b7-credit2-avoid-vCPUs-with-lower-creds-than-idle.patch 5e86f7fd-credit2-fix-credit-too-few-resets.patch 5e876b0f-tools-xenstore-fix-use-after-free-in-xenstored.patch 5e95ad61-xenoprof-clear-buffer-intended-to-be-shared-with-guests.patch 5e95ad8f-xenoprof-limit-consumption-of-shared-buffer-data.patch 5e95ae77-Add-missing-memory-barrier-in-the-unlock-path-of-rwlock.patch 5e95af5e-xen-gnttab-Fix-error-path-in-map_grant_ref.patch 5e95afb8-gnttab-fix-GNTTABOP_copy-continuation-handling.patch- Advertise support for new 64bit libxl memory APIs introduced by patch 5db1be79-libxl-Offer-API-versions-0x040700-and-0x040800.patch bsc#1167007 and bsc#1157490- bsc#1169392 - VUL-0: CVE-2020-11742: xen: Bad continuation handling in GNTTABOP_copy (XSA-318) 5e95afb8-gnttab-fix-GNTTABOP_copy-continuation-handling.patch- bsc#1168140 - VUL-0: CVE-2020-11740, CVE-2020-11741: xen: XSA-313 multiple xenoprof issues 5e95ad61-xenoprof-clear-buffer-intended-to-be-shared-with-guests.patch 5e95ad8f-xenoprof-limit-consumption-of-shared-buffer-data.patch - bsc#1168142 - VUL-0: CVE-2020-11739: xen: XSA-314 - Missing memory barriers in read-write unlock paths 5e95ae77-Add-missing-memory-barrier-in-the-unlock-path-of-rwlock.patch - bsc#1168143 - VUL-0: CVE-2020-11743: xen: XSA-316 - Bad error path in GNTTABOP_map_grant 5e95af5e-xen-gnttab-Fix-error-path-in-map_grant_ref.patch - bsc#1167152 - L3: Xenstored Crashed during VM install Need Core analyzed 5e876b0f-tools-xenstore-fix-use-after-free-in-xenstored.patch - bsc#1165206 - Xen 4.12 DomU hang / freeze / stall / NMI watchdog bug soft lockup CPU #0 stuck under high load / upstream with workaround. See also bsc#1134506 5e86f7b7-credit2-avoid-vCPUs-with-lower-creds-than-idle.patch 5e86f7fd-credit2-fix-credit-too-few-resets.patch - Drop for upstream solution (bsc#1165206) 01-xen-credit2-avoid-vcpus-to.patch 02-xen-credit2-fix-runq-cand-skip.patch - Upstream bug fixes (bsc#1027519) 5e6f53dd-AMD-IOMMU-fix-off-by-one-get_paging_mode.patch 5e7cfb29-x86-ucode-fix-error-paths-in-apply_microcode.patch 5e7dd83b-libx86-CPUID-fix-not-just-leaf-7.patch 5e7dfbf6-x86-ucode-AMD-potential-buffer-overrun-equiv-tab.patch 5e846cce-x86-HVM-fix-AMD-ECS-handling-for-Fam10.patch 5e84905c-x86-ucode-AMD-fix-more-potential-buffer-overruns.patch- Update API compatibility versions. Fixes issues for libvirt. See bsc#1167007 and bsc#1157490- bsc#1155200 - L3: L3-Support: aacraid blocks xen commands - ref: _00D1igLOd._5001iIvV1f:ref 5d976da3-libxl-attach-PCI-device-to-qemu-only-after-setting-pciback-pcifront.patch- bsc#1165206 - Xen 4.12 DomU hang / freeze / stall / NMI watchdog bug soft lockup CPU #0 stuck under high load / upstream with workaround. See also bsc#1134506 01-xen-credit2-avoid-vcpus-to.patch 02-xen-credit2-fix-runq-cand-skip.patch- bsc#1160932 - VUL-0: xen: XSA-312 v1: arm: a CPU may speculate past the ERET instruction 5e1dcedd-Arm-place-speculation-barrier-after-ERET.patch - Upstream bug fixes (bsc#1027519) 5e21ce98-x86-time-update-TSC-stamp-after-deep-C-state.patch 5e286cce-VT-d-dont-pass-bridges-to-domain_context_mapping_one.patch 5e318cd4-x86-apic-fix-disabling-LVT0.patch 5e3bd385-EFI-recheck-variable-name-strings.patch 5e3bd3d1-EFI-dont-leak-heap-VIA-XEN_EFI_get_next_variable_name.patch 5e3bd3f8-xmalloc-guard-against-overflow.patch 5e46e090-x86-smp-reset-x2apic_enabled-in-smp_send_stop.patch 5e4c00ef-VT-d-check-full-RMRR-for-E820-reserved.patch 5e4ec20e-x86-virtualise-MSR_PLATFORM_ID-properly.patch - Drop 5e1dd8f3-Arm-fix-build-after-892b9dcebdb7.patch- Fix broken ARM build 5e1dd8f3-Arm-fix-build-after-892b9dcebdb7.patch- bsc#1162040 - L3: Problems Booting Fedora31 VM on sles15 sp1 Xen Dom0 5d53ed45-pygrub-Failing-to-set-value-to-0-in-Grub2ConfigFile.patch- Upstream bug fixes (bsc#1027519) 5e16fb6a-x86-clear-per-cpu-stub-page-info.patch 5e1da013-IRQ-u16-is-too-narrow-for-evtchn.patch- Update to Xen 4.12.2 bug fix release (bsc#1027519) xen-4.12.2-testing-src.tar.bz2 - Drop patches contained in new tarball 5d419d49-x86-spec-ctrl-report-proper-status.patch 5d43253c-x86-ucode-always-collect_cpu_info-at-boot.patch 5d4aa36f-x86-apic-enable-x2APIC-mode-earlier.patch 5d4afa7a-credit2-fix-memory-leak.patch 5d4d850a-introduce-bss-percpu-page-aligned.patch 5d516531-x86-xpti-dont-leak-TSS-adjacent-data.patch 5d5bf475-x86-PV-fix-handling-of-iommu-mappings.patch 5d6524ca-x86-mm-correctly-init-M2P-entries.patch 5d67ceaf-x86-properly-gate-PKU-clearing.patch 5d70bfba-x86-shadow-dont-enable-with-too-small-allocation.patch 5d779811-x86-fix-CPUID7-0-eax-levelling-MSR.patch 5d77b40f-fix-hvm_all_ioreq_servers_add_vcpu-cleanup.patch 5d80ea13-vpci-honor-read-only-devices.patch 5d89d8d9-libxc-x86-avoid-overflow-in-CPUID-APIC-ID.patch 5d8b715f-ACPI-cpuidle-bump-max-num-of-states.patch 5d8ce179-sched-dont-leak-XEN_RUNSTATE_UPDATE.patch 5d947b01-x86-crash-force-unlock-console.patch 5d948bdb-IOMMU-add-missing-HVM-check.patch 5d9ef2a1-EFI-deref-pointer-in-set_color.patch 5d9ef2c5-EFI-gfx-mode-for-MB2-boot.patch 5d9ef2ef-PCI-clear-maskall-fields-on-assign.patch 5d9f454a-x86-EFI-pixel-reserved-0.patch 5db07974-x86-update-time-info-on-TSC-adjustments.patch 5db2b4a2-x86-is_xen_fixed_mfn-off-by-1.patch 5db892ac-VT-x-correct-BDF93-workaround.patch 5db892ac-VT-x-fix-Haswell-Broadwell-LBR-TSX-errata.patch 5dbaf89f-dont-use-BUG-for-parameter-checking.patch 5dbaf8e0-x86-PV-check-GDT-LDT-limits-during-emulation.patch 5dbaf990-x86-mm-L1TF-checks-dont-leave-partial-entry.patch 5dbaf9b2-x86-mm-dont-re-set-PGT_pinned-on-partial-page.patch 5dbaf9ce-x86-mm-split-partial_pte-tristate.patch 5dbaf9f5-x86-mm-use-flags-for-_put_page_type.patch 5dbafa13-x86-mm-rework-get_page_and_type_from_mfn-conditional.patch 5dbafa46-x86-mm-alloc_lN_table-clear-partial_flags-when-preempting.patch 5dbafa5c-x86-mm-always-retain-general-ref-on-partial.patch 5dbafa7f-x86-mm-collapse-PTF_partial_.patch 5dbafaa4-x86-mm-properly-handle-linear-pt-promotion-failure.patch 5dbafabd-x86-mm-fix-nested-devalidation-on-error.patch 5dbafad5-x86-mm-dont-drop-type-ref-unless.patch 5dbafb0d-Arm-p2m-avoid-aliasing-guest-physical-frame.patch 5dbafb4e-Arm-p2m-avoid-off-by-1-check-on-max_mapped_gfn.patch 5dbafb72-Arm-p2m-dont-check-p2m_get_root_pointer-ret-with-BUG_ON.patch 5dbafba5-passthrough-quarantine-PCI-devices.patch 5dbafbda-Arm32-entry-Split-__DEFINE_ENTRY_TRAP.patch 5dbafbfd-Arm32-entry-fold-SAVE_ALL-into-vector-macro.patch 5dbafc3a-Arm32-dont-unmask-interrupts-on-trap-without-level-change.patch 5dbafc4f-Arm64-dont-unmask-interrupts-on-trap-without-level-change.patch 5dbc0d64-x86-fix-CONFIG_PV-build-following-XSA-299.patch 5dca846c-x86-fix-clear_IO_APIC_pin-raw-writes.patch 5dca84a2-AMD-IOMMU-dont-needlessly-trigger-errors-on-unmap.patch 5dcae816-VT-d-hide-superpages-for-SandyBridge.patch 5dcae816-VT-x-runtime-modification-of-exec-sp.patch 5dcae816-VT-x-work-around-executable-EPT-superpages.patch 5dcae816-x86-introduce-tsx-option.patch 5dcae816-x86-spec-ctrl-mitigate-TAA.patch 5dd6b229-add-va_end-to-hypercall_create_continuation.patch 5dd8126b-x86-vLAPIC-allow-APIC_SPIV_FOCUS_DISABLED.patch 5dd93ce0-vVMX-fix-livelock-with-XSA-304-fix.patch 5ddbb3d3-x86-mm-adjust-linear-usage-accounting.patch 5ddcff90-libxc-x86-dont-bump-ApicIdCoreSize-past-7.patch 5ddd2555-IOMMU-always-quarantine-PCI-devs.patch 5ddd25f9-EFI-fix-efi=attr-handling.patch 5ddfa851-VMX-always-sync-PIR-to-IRR.patch 5ddfd62b-x86-internal-IRQs-honor-PEOI-stack.patch 5de0007e-SVM-always-intercept-ICEBP.patch 5de0007e-SVM-write-correct-eip-into-outgoing-task.patch 5de0007e-VMX-early-task-switch-failures-semantics.patch 5de1632a-x86-IOMMU-scratch-page-in-quarantine-dom.patch 5de19115-rationalize-max-grant_frames-maptrack_frames.patch 5de52a86-x86-PSR-dont-write-out-of-range-COS.patch 5de65f84-gnttab-map-always-do-IOMMU-part.patch 5de65fc4-x86-avoid-HPET-use-on-certain-Intel.patch xsa307.patch xsa308.patch xsa309.patch xsa310-1.patch xsa310-2.patch xsa310-3.patch xsa311.patch- bsc#1158003 - VUL-0: CVE-2019-19581,CVE-2019-19582: xen: XSA-307 - find_next_bit() issues xsa307.patch - bsc#1158004 - VUL-0: CVE-2019-19583: xen: XSA-308 - VMX: VMentry failure with debug exceptions and blocked states xsa308.patch - bsc#1158005 - VUL-0: CVE-2019-19578: xen: XSA-309 - Linear pagetable use / entry miscounts xsa309.patch - bsc#1158006 - VUL-0: CVE-2019-19580: xen: XSA-310 - Further issues with restartable PV type change operations xsa310-1.patch xsa310-2.patch xsa310-3.patch - bsc#1158007 - VUL-0: CVE-2019-19577: xen: XSA-311 - dynamic height for the IOMMU pagetables xsa311.patch - Upstream bug fixes (bsc#1027519) 5dd6b229-add-va_end-to-hypercall_create_continuation.patch 5dd8126b-x86-vLAPIC-allow-APIC_SPIV_FOCUS_DISABLED.patch 5dd93ce0-vVMX-fix-livelock-with-XSA-304-fix.patch 5ddbb3d3-x86-mm-adjust-linear-usage-accounting.patch 5ddcff90-libxc-x86-dont-bump-ApicIdCoreSize-past-7.patch 5ddd2555-IOMMU-always-quarantine-PCI-devs.patch (Replaces xsa306.patch) 5ddd25f9-EFI-fix-efi=attr-handling.patch 5ddfa851-VMX-always-sync-PIR-to-IRR.patch 5ddfd62b-x86-internal-IRQs-honor-PEOI-stack.patch 5de0007e-VMX-early-task-switch-failures-semantics.patch 5de0007e-SVM-always-intercept-ICEBP.patch 5de0007e-SVM-write-correct-eip-into-outgoing-task.patch 5de1632a-x86-IOMMU-scratch-page-in-quarantine-dom.patch 5de19115-rationalize-max-grant_frames-maptrack_frames.patch 5de52a86-x86-PSR-dont-write-out-of-range-COS.patch 5de65f84-gnttab-map-always-do-IOMMU-part.patch 5de65fc4-x86-avoid-HPET-use-on-certain-Intel.patch- bsc#1157047 - PCI passthrough failed on AMD machine xen host 5dca846c-x86-fix-clear_IO_APIC_pin-raw-writes.patch 5dca84a2-AMD-IOMMU-dont-needlessly-trigger-errors-on-unmap.patch - bsc#1157888 - - VUL-0: xen: Device quarantine for alternate pci assignment methods xsa306.patch - Upstream bug fixes (bsc#1027519) 5dcae816-VT-x-runtime-modification-of-exec-sp.patch 5dcae816-VT-d-hide-superpages-for-SandyBridge.patch (Replaces xsa304-1.patch) 5dcae816-VT-x-work-around-executable-EPT-superpages.patch (Replaces xsa304-2.patch) 5dcae816-x86-introduce-tsx-option.patch (Replaces xsa305-1.patch) 5dcae816-x86-spec-ctrl-mitigate-TAA.patch (Replaces xsa305-2.patch)- Minor adjustments to these security patches for bsc#1155945 and bsc#1152497 xsa304-1.patch xsa304-2.patch xsa305-1.patch xsa305-2.patch- bsc#1154448 - VUL-0: CVE-2019-18420: xen: XSA-296: VCPUOP_initialise DoS 5dbaf89f-dont-use-BUG-for-parameter-checking.patch - bsc#1154456 - VUL-0: CVE-2019-18425: xen: XSA-298: missing descriptor table limit checking in x86 PV emulation 5dbaf8e0-x86-PV-check-GDT-LDT-limits-during-emulation.patch - bsc#1154458 - VUL-0: CVE-2019-18421: xen: XSA-299: Issues with restartable PV type change operations 5dbaf990-x86-mm-L1TF-checks-dont-leave-partial-entry.patch 5dbaf9b2-x86-mm-dont-re-set-PGT_pinned-on-partial-page.patch 5dbaf9ce-x86-mm-split-partial_pte-tristate.patch 5dbaf9f5-x86-mm-use-flags-for-_put_page_type.patch 5dbafa13-x86-mm-rework-get_page_and_type_from_mfn-conditional.patch 5dbafa46-x86-mm-alloc_lN_table-clear-partial_flags-when-preempting.patch 5dbafa5c-x86-mm-always-retain-general-ref-on-partial.patch 5dbafaa4-x86-mm-properly-handle-linear-pt-promotion-failure.patch 5dbafabd-x86-mm-fix-nested-devalidation-on-error.patch 5dbafad5-x86-mm-dont-drop-type-ref-unless.patch 5dbc0d64-x86-fix-CONFIG_PV-build-following-XSA-299.patch - bsc#1154460 - VUL-0: CVE-2019-18423: xen: XSA-301: add-to-physmap can be abused to DoS Arm hosts 5dbafb0d-Arm-p2m-avoid-aliasing-guest-physical-frame.patch 5dbafb4e-Arm-p2m-avoid-off-by-1-check-on-max_mapped_gfn.patch 5dbafb72-Arm-p2m-dont-check-p2m_get_root_pointer-ret-with-BUG_ON.patch - bsc#1154461 - VUL-0: CVE-2019-18424: xen: XSA-302: passed through PCI devices may corrupt host memory after deassignment 5dbafba5-passthrough-quarantine-PCI-devices.patch - bsc#1154464 - VUL-0: CVE-2019-18422: xen: XSA-303: ARM: Interrupts are unconditionally unmasked in exception handlers 5dbafbda-Arm32-entry-Split-__DEFINE_ENTRY_TRAP.patch 5dbafbfd-Arm32-entry-fold-SAVE_ALL-into-vector-macro.patch 5dbafc3a-Arm32-dont-unmask-interrupts-on-trap-without-level-change.patch 5dbafc4f-Arm64-dont-unmask-interrupts-on-trap-without-level-change.patch - bsc#1155945 - VUL-0: CVE-2018-12207: xen: Machine Check Error Avoidance on Page Size Change (aka IFU issue) xsa304-1.patch xsa304-2.patch - bsc#1152497 - VUL-0: CVE-2019-11135: xen: XSA-305: TSX Asynchronous Abort (TAA) issue xsa305-1.patch xsa305-2.patch - Upstream bug fixes (bsc#1027519) 5d9ef2a1-EFI-deref-pointer-in-set_color.patch 5d9f454a-x86-EFI-pixel-reserved-0.patch 5db2b4a2-x86-is_xen_fixed_mfn-off-by-1.patch 5d9ee2f0-AMD-IOMMU-allocate_buffer-avoid-memset.patch 5db892ac-VT-x-fix-Haswell-Broadwell-LBR-TSX-errata.patch 5d948bdb-IOMMU-add-missing-HVM-check.patch 5d9ee312-AMD-IOMMU-prefill-all-DTEs.patch 5d9ef2c5-EFI-gfx-mode-for-MB2-boot.patch 5db892ac-VT-x-correct-BDF93-workaround.patch 5d947b01-x86-crash-force-unlock-console.patch 5d8ce179-sched-dont-leak-XEN_RUNSTATE_UPDATE.patch 5d9ef2ef-PCI-clear-maskall-fields-on-assign.patch 5d9ee2a8-AMD-IOMMU-alloc-1-devtab-per-PCI-seg.patch 5db07974-x86-update-time-info-on-TSC-adjustments.patch 5dbafa7f-x86-mm-collapse-PTF_partial_.patch- bsc#1120095 - add code to change LIBXL_HOTPLUG_TIMEOUT at runtime The included README has details about the impact of this change libxl.LIBXL_HOTPLUG_TIMEOUT.patch- bsc#1135799 - Partner-L3: Xen crashes on AMD ROME based machines 5ca7660f-x86-entry-drop-unused-includes.patch 5cf8da09-adjust-sysdom-creation-call-earlier-on-x86.patch 5cab2a6b-x86-ACPI-also-parse-AMD-tables-early.patch 5cab2ab7-x86-IOMMU-introduce-init-ops.patch 5cab2ae8-x86-IOMMU-abstract-iommu_supports_eim.patch 5cab2b4e-x86-IOMMU-abstract-iommu_enable_x2apic_IR.patch 5cab2b95-x86-IOMMU-initialize-iommu_ops-in.patch 5cac9a4b-x86-IOMMU-abstract-adjust_vtd_irq_affinities.patch 5cdeac7f-AMD-IOMMU-adjust-IOMMU-list-head-init.patch 5d0cf4e4-AMD-IOMMU-initialize-IRQ-tasklet-once.patch 5d149bb0-AMD-IOMMU-dont-add-IOMMUs.patch 5d1b3fab-AMD-IOMMU-restrict-feature-logging.patch 5d358508-x86-IRQ-desc-affinity-represents-request.patch 5d358534-x86-IRQ-consolidate-arch-cpu_mask-use.patch 5d358a67-AMD-IOMMU-pass-IOMMU-to-iterate_ivrs_entries-cb.patch 5d358a92-AMD-IOMMU-pass-IOMMU-to-amd_iommu_alloc_intremap_table.patch 5d39811c-x86-IOMMU-dont-restrict-IRQ-affinities.patch 5d417813-AMD-IOMMU-bitfield-extended-features.patch 5d417838-AMD-IOMMU-bitfield-control-reg.patch 5d41785b-AMD-IOMMU-bitfield-IRTE.patch 5d41787e-AMD-IOMMU-pass-IOMMU-to-gfu-intremap-entry.patch 5d4178ad-AMD-IOMMU-128bit-non-guest-APIC-IRTE.patch 5d4178fc-AMD-IOMMU-split-amd_iommu_init_one.patch 5d41793f-AMD-IOMMU-allow-enabling-without-IRQ.patch 5d417a16-AMD-IOMMU-adjust-IRQ-setup-for-x2APIC.patch 5d417ab6-AMD-IOMMU-enable-x2APIC-mode.patch 5d417b38-AMD-IOMMU-correct-IRTE-updating.patch 5d417b6a-AMD-IOMMU-dont-needlessly-log-headers.patch 5d4a9d25-AMD-IOMMU-drop-not-found-message.patch 5d80e7c0-AMD-IOMMU-free-shared-IRT-once.patch 5d80e80d-AMD-IOMMU-valid-flag-for-IVRS-mappings.patch 5d80e82e-AMD-IOMMU-alloc_intremap_table-callers-handle-errors.patch 5d80e857-x86-PCI-read-MSI-X-table-entry-count-early.patch 5d8b72e5-AMD-IOMMU-dont-blindly-alloc-intremap-tables.patch 5d8b730e-AMD-IOMMU-phantom-funcs-share-intremap-tables.patch 5d8b733b-x86-PCI-read-max-MSI-vector-count-early.patch 5d8b736d-AMD-IOMMU-replace-INTREMAP_ENTRIES.patch 5d8b7393-AMD-IOMMU-restrict-intremap-table-sizes.patch - bsc#1145240 - [Migration]Can't pre-allocate 1 shadow pages 5d70bfba-x86-shadow-dont-enable-with-too-small-allocation.patch - bsc#1137717 - [HPS Bug] Unable to install Windows Server 2016 with 2 CPUs setting (or above) under SLES12 SP4 Xen Server on AMD ROME platform 5d89d8d9-libxc-x86-avoid-overflow-in-CPUID-APIC-ID.patch - Upstream bug fixes (bsc#1027519) 5d67ceaf-x86-properly-gate-PKU-clearing.patch 5d779811-x86-fix-CPUID7-0-eax-levelling-MSR.patch 5d77b40f-fix-hvm_all_ioreq_servers_add_vcpu-cleanup.patch 5d80ea13-vpci-honor-read-only-devices.patch 5d8b715f-ACPI-cpuidle-bump-max-num-of-states.patch- bsc#1145774 - Libivrtd segfaults when trying to live migrate a VM Fix crash in an error path of libxl_domain_suspend with libxl.helper_done-crash.patch- Upstream bug fixes (bsc#1027519) 5d419d49-x86-spec-ctrl-report-proper-status.patch 5d43253c-x86-ucode-always-collect_cpu_info-at-boot.patch 5d4aa36f-x86-apic-enable-x2APIC-mode-earlier.patch 5d4afa7a-credit2-fix-memory-leak.patch 5d4d850a-introduce-bss-percpu-page-aligned.patch 5d516531-x86-xpti-dont-leak-TSS-adjacent-data.patch 5d5bf475-x86-PV-fix-handling-of-iommu-mappings.patch 5d6524ca-x86-mm-correctly-init-M2P-entries.patch - Drop 5d419d49-x86-spec-ctrl-facilities-report-wrong-status.patch- Update to Xen 4.12.1 bug fix release (bsc#1027519) xen-4.12.1-testing-src.tar.bz2 - Drop patches contained in new tarball 5c87b644-IOMMU-leave-enabled-for-kexec-crash.patch 5c87b6a2-x86-HVM-dont-crash-guest-in-find_mmio_cache.patch 5c87b6c8-drop-arch_evtchn_inject.patch 5c87b6e8-avoid-atomic-rmw-accesses-in-map_vcpu_info.patch 5c87e6d1-x86-TSX-controls-for-RTM-force-abort-mode.patch 5c8f752c-x86-e820-build-with-gcc9.patch 5c8fb92d-x86-HVM-split-linear-reads-and-writes.patch 5c8fb951-x86-HVM-finish-IOREQs-correctly-on-completion.patch 5c8fc6c0-x86-MSR-shorten-ARCH_CAPABILITIES.patch 5c8fc6c0-x86-SC-retpoline-safety-calculations-for-eIBRS.patch 5c9e63c5-credit2-SMT-idle-handling.patch 5ca46b68-x86emul-no-GPR-update-upon-AVX-gather-failures.patch 5ca773d1-x86emul-dont-read-mask-reg-without-AVX512F.patch 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch 5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch 5cd921fb-trace-fix-build-with-gcc9.patch 5cd9224b-AMD-IOMMU-disable-upon-init-fail.patch 5cd922c5-x86-MTRR-recalc-p2mt-when-iocaps.patch 5cd9230f-VMX-correctly-get-GS_SHADOW-for-current.patch 5cd926d0-bitmap_fill-zero-sized.patch 5cd92724-drivers-video-drop-constraints.patch 5cd93a69-x86-MSR_INTEL_CORE_THREAD_COUNT.patch 5cd93a69-x86-boot-detect-Intel-SMT-correctly.patch 5cd93a69-x86-spec-ctrl-reposition-XPTI-parsing.patch 5cd981ff-x86-IRQ-tracing-avoid-UB-or-worse.patch 5cdad090-x86-spec-ctrl-CPUID-MSR-definitions-for-MDS.patch 5cdad090-x86-spec-ctrl-infrastructure-for-VERW-flush.patch 5cdad090-x86-spec-ctrl-misc-non-functional-cleanup.patch 5cdad090-x86-spec-ctrl-opts-to-control-VERW-flush.patch 5cdeb9fd-sched-fix-csched2_deinit_pdata.patch 5ce7a92f-x86-IO-APIC-fix-build-with-gcc9.patch 5cf0f6a4-x86-vhpet-resume-avoid-small-diff.patch 5cf16e51-x86-spec-ctrl-Knights-retpoline-safe.patch 5d03a0c4-1-Arm-add-an-isb-before-reading-CNTPCT_EL0.patch 5d03a0c4-2-gnttab-rework-prototype-of-set_status.patch 5d03a0c4-3-Arm64-rewrite-bitops-in-C.patch 5d03a0c4-4-Arm32-rewrite-bitops-in-C.patch 5d03a0c4-5-Arm-bitops-consolidate-prototypes.patch 5d03a0c4-6-Arm64-cmpxchg-simplify.patch 5d03a0c4-7-Arm32-cmpxchg-simplify.patch 5d03a0c4-8-Arm-bitops-helpers-with-timeout.patch 5d03a0c4-9-Arm-cmpxchg-helper-with-timeout.patch 5d03a0c4-A-Arm-turn-on-SILO-mode-by-default.patch 5d03a0c4-B-bitops-guest-helpers.patch 5d03a0c4-C-cmpxchg-guest-helpers.patch 5d03a0c4-D-use-guest-atomics-helpers.patch 5d03a0c4-E-Arm-add-perf-counters-in-guest-atomic-helpers.patch 5d03a0c4-F-Arm-protect-gnttab_clear_flag.patch - Refreshed patches libxl.pvscsi.patch- bsc#1143563 - Speculative mitigation facilities report wrong status 5d419d49-x86-spec-ctrl-facilities-report-wrong-status.patch- bsc#1138563 - L3: xenpvnetboot improperly ported to Python 3 fix-xenpvnetboot.patch- bsc#1138294 - VUL-0: CVE-2019-17349: XSA-295: Unlimited Arm Atomics Operations 5d03a0c4-1-Arm-add-an-isb-before-reading-CNTPCT_EL0.patch 5d03a0c4-2-gnttab-rework-prototype-of-set_status.patch 5d03a0c4-3-Arm64-rewrite-bitops-in-C.patch 5d03a0c4-4-Arm32-rewrite-bitops-in-C.patch 5d03a0c4-5-Arm-bitops-consolidate-prototypes.patch 5d03a0c4-6-Arm64-cmpxchg-simplify.patch 5d03a0c4-7-Arm32-cmpxchg-simplify.patch 5d03a0c4-8-Arm-bitops-helpers-with-timeout.patch 5d03a0c4-9-Arm-cmpxchg-helper-with-timeout.patch 5d03a0c4-A-Arm-turn-on-SILO-mode-by-default.patch 5d03a0c4-B-bitops-guest-helpers.patch 5d03a0c4-C-cmpxchg-guest-helpers.patch 5d03a0c4-D-use-guest-atomics-helpers.patch 5d03a0c4-E-Arm-add-perf-counters-in-guest-atomic-helpers.patch 5d03a0c4-F-Arm-protect-gnttab_clear_flag.patch - Upstream bug fixes (bsc#1027519) 5c87b6c8-drop-arch_evtchn_inject.patch 5c87b6e8-avoid-atomic-rmw-accesses-in-map_vcpu_info.patch 5cd921fb-trace-fix-build-with-gcc9.patch 5cd9224b-AMD-IOMMU-disable-upon-init-fail.patch 5cd922c5-x86-MTRR-recalc-p2mt-when-iocaps.patch 5cd9230f-VMX-correctly-get-GS_SHADOW-for-current.patch 5cd926d0-bitmap_fill-zero-sized.patch 5cd92724-drivers-video-drop-constraints.patch 5cd93a69-x86-spec-ctrl-reposition-XPTI-parsing.patch (Replaces xsa297-0a.patch) 5cd93a69-x86-MSR_INTEL_CORE_THREAD_COUNT.patch (Replaces xsa297-0b.patch) 5cd93a69-x86-boot-detect-Intel-SMT-correctly.patch (Replaces xsa297-0c.patch) 5cdad090-x86-spec-ctrl-misc-non-functional-cleanup.patch (Replaces xsa297-0d.patch) 5cdad090-x86-spec-ctrl-CPUID-MSR-definitions-for-MDS.patch (Replaces xsa297-1.patch) 5cdad090-x86-spec-ctrl-infrastructure-for-VERW-flush.patch (Replaces xsa297-2.patch) 5cdad090-x86-spec-ctrl-opts-to-control-VERW-flush.patch (Replaces xsa297-3.patch) 5cd981ff-x86-IRQ-tracing-avoid-UB-or-worse.patch 5cdeb9fd-sched-fix-csched2_deinit_pdata.patch 5ce7a92f-x86-IO-APIC-fix-build-with-gcc9.patch 5cf0f6a4-x86-vhpet-resume-avoid-small-diff.patch 5cf16e51-x86-spec-ctrl-Knights-retpoline-safe.patch- Fix some outdated information in the readme README.SUSE- spec: xen-tools: require matching version of xen package bsc#1137471- Remove two stale patches xen.build-compare.man.patch xenpaging.doc.patch- Disable LTO (boo#1133296).- Remove arm32 from ExclusiveArch to fix build- bsc#1111331 - VUL-0: CPU issues Q2 2019 aka "Group 4". CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 xsa297-0a.patch xsa297-0b.patch xsa297-0c.patch xsa297-0d.patch xsa297-1.patch xsa297-2.patch xsa297-3.patch - Update 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch and drop 5cac6219-xen-cpu-Fix-ARM-build-following-cs-597fbb8.patch Refresh 5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch- bsc#1131811 - [XEN] internal error: libxenlight failed to create new domain. This patch is a workaround for a systemd issue. See patch header for additional comments. xenstore-launch.patch- bsc#1125378 - [xen][pygrub] Can not restore sle11sp4 pv guest after upgrading host from sle11sp4 to sle15sp1 pygrub-python3-conversion.patch - Fix "TypeError: virDomainDefineXML() argument 2 must be str or None, not bytes" when converting VMs from using the xm/xend toolstack to the libxl/libvirt toolstack. (bsc#1123378) xen2libvirt.py- bsc#1124560 - Fully virtualized guests crash on boot 5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch - bsc#1121391 - GCC 9: xen build fails 5c8f752c-x86-e820-build-with-gcc9.patch - Upstream bug fixes (bsc#1027519) 5c87b644-IOMMU-leave-enabled-for-kexec-crash.patch 5c87b6a2-x86-HVM-dont-crash-guest-in-find_mmio_cache.patch 5c87e6d1-x86-TSX-controls-for-RTM-force-abort-mode.patch 5c8fb92d-x86-HVM-split-linear-reads-and-writes.patch 5c8fb951-x86-HVM-finish-IOREQs-correctly-on-completion.patch 5c8fc6c0-x86-MSR-shorten-ARCH_CAPABILITIES.patch 5c8fc6c0-x86-SC-retpoline-safety-calculations-for-eIBRS.patch 5c9e63c5-credit2-SMT-idle-handling.patch 5ca46b68-x86emul-no-GPR-update-upon-AVX-gather-failures.patch 5ca773d1-x86emul-dont-read-mask-reg-without-AVX512F.patch 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch 5cac6219-xen-cpu-Fix-ARM-build-following-cs-597fbb8.patch- Install pkgconfig files into libdir instead of datadir- Update to Xen 4.12.0 FCS release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2 * HVM/PVH and PV only Hypervisor: The Xen 4.12 release separates the HVM/PVH and PV code paths in Xen and provides KCONFIG options to build a PV only or HVM/PVH only hypervisor. * QEMU Deprivilege (DM_RESTRICT): In Xen 4.12, this feature has been vastly improved. * Argo - Hypervisor-Mediated data eXchange: Argo is a new inter- domain communication mechanism. * Improvements to Virtual Machine Introspection: The VMI subsystem which allows detection of 0-day vulnerabilities has seen many functional and performance improvements. * Credit 2 Scheduler: The Credit2 scheduler is now the Xen Project default scheduler. * PVH Support: Grub2 boot support has been added to Xen and Grub2. * PVH Dom0: PVH Dom0 support has now been upgraded from experimental to tech preview. * The Xen 4.12 upgrade also includes improved IOMMU mapping code, which is designed to significantly improve the startup times of AMD EPYC based systems. * The upgrade also features Automatic Dom0 Sizing which allows the setting of Dom0 memory size as a percentage of host memory (e.g. 10%) or with an offset (e.g. 1G+10%).- bsc#1130485 - Please drop Requires on multipath-tools in xen-tools. Now using Recommends multipath-tools. xen.spec- Update to Xen 4.12.0 RC7 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- Update to Xen 4.12.0 RC6 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- bsc#1026236 - add Xen cmdline option "suse_vtsc_tolerance" to avoid TSC emulation for HVM domUs if their expected frequency does not match exactly the frequency of the receiving host xen.bug1026236.suse_vtsc_tolerance.patch- Update to Xen 4.12.0 RC5 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- jsc#SLE-3059 - Disable Xen auto-ballooning - Add CONFIG_DOM0_MEM to the spec file for managing dom0 memory. xen.spec - Disable autoballooning in xl.con xl-conf-disable-autoballoon.patch- Update gcc9-ignore-warnings.patch to fix build in SLE12- bsc#1126325 - fix crash in libxl in error path Setup of grant_tables and other variables may fail libxl.prepare-environment-for-domcreate_stream_done.patch- bsc#1127620 - Documentation for the xl configuration file allows for firmware=pvgrub64 but we don't ship pvgrub64. Create a link from grub.xen to pvgrub64 xen.spec- Update to Xen 4.12.0 RC4 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2 - Tarball also contains additional post RC4 security fixes for Xen Security Advisories 287, 288, and 290 through 294.- Update to Xen 4.12.0 RC3 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- Update to Xen 4.12.0 RC2 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- bsc#1121391 - GCC 9: xen build fails gcc9-ignore-warnings.patch- bsc#1122563 - Virtualization/xen: Bug no Xen on boot, missing /proc/xen, after 4.11 -> 4.12 upgrade on X86_64/efi. Keep xen.efi in /usr/lib64/efi for booting older distros. xen.spec- fate#326960: Package grub2 as noarch. As part of the effort to have a unified bootloader across architectures, modify the xen.spec file to move the Xen efi files to /usr/share/efi/$(uname -m) from /usr/lib64/efi.- Update to Xen 4.12.0 RC1 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2 - Drop 5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch 5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch 5b8fae26-tools-libxl-correct-vcpu-affinity-output-with-sparse-physical-cpu-map.patch 5b8fae26-xen-fill-topology-info-for-all-present-cpus.patch 5b8fb5af-tools-xl-refuse-to-set-number-of-vcpus-to-0-via-xl-vcpu-set.patch 5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch 5b9784d2-x86-HVM-add-known_gla-helper.patch 5b9784f2-x86-HVM-split-page-straddling-accesses.patch 5bdc31d5-VMX-fix-vmx_handle_eoi.patch gcc8-fix-array-warning-on-i586.patch gcc8-fix-format-warning-on-i586.patch gcc8-inlining-failed.patch xen.bug1079730.patch- bsc#1121960 - xen: sync with Factory xen.spec xen.changes- Replace old $RPM_* shell vars. - Run fdupes for all architectures, and not crossing subvolume boundaries.- Do not run %fdupes on aarch64 to avoid the hardlink-across-partition rpmlint error- Require qemu-seabios only on x86* as it is not available on non-x86 systems- Avoid creating dangling symlinks (bsc#1116524) This reverts the revert of tmp_build.patch- Update to Xen 4.11.1 bug fix release (bsc#1027519) xen-4.11.1-testing-src.tar.bz2 - 5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch replaces xen.2b50cdbc444c637575580dcfa6c9525a84d5cc62.patch - 5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch replaces xen.b8f33431f3dd23fb43a879f4bdb4283fdc9465ad.patch - Drop the following patches contained in the new tarball 5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch 5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch 5b3cab8e-2-VMX-improve-MSR-load-save-API.patch 5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch 5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch 5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch 5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch 5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch 5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch 5b3f8fa5-port-array_index_nospec-from-Linux.patch 5b4321f6-x86-correctly-set-nonlazy_xstate_used-when-loading-full-state.patch 5b4488e7-x86-spec-ctrl-cmdline-handling.patch 5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch 5b4c9a60-allow-cpu_down-to-be-called-earlier.patch 5b4db308-SVM-fix-cleanup-svm_inject_event.patch 5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch 5b5040f2-x86-AMD-distinguish-CU-from-HT.patch 5b505fe5-VMX-fix-find-msr-build.patch 5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch 5b508775-2-x86-possibly-bring-up-all-CPUs.patch 5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch 5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch 5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch 5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch 5b56feb1-hvm-Disallow-unknown-MSR_EFER-bits.patch 5b56feb2-spec-ctrl-Fix-the-parsing-of-xpti--on-fixed-Intel-hardware.patch 5b62ca93-VMX-avoid-hitting-BUG_ON.patch 5b6d84ac-x86-fix-improve-vlapic-read-write.patch 5b6d8ce2-x86-XPTI-parsing.patch 5b72fbbe-ARM-disable-grant-table-v2.patch 5b72fbbe-oxenstored-eval-order.patch 5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch 5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch 5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch 5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch 5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch 5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch 5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch 5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch 5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch 5b72fbbf-x86-Make-spec-ctrl-no-a-global-disable-of-all-mitigations.patch 5b72fbbf-xl.conf-Add-global-affinity-masks.patch 5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch 5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch 5b75afef-x86-setup-avoid-OoB-E820-lookup.patch 5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch 5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch 5b8d5832-x86-assorted-array_index_nospec-insertions.patch 5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch 5bacae4b-x86-boot-allocate-extra-module-slot.patch 5bae44ce-x86-silence-false-log-messages.patch 5bb60c12-x86-split-opt_xpti.patch 5bb60c4f-x86-split-opt_pv_l1tf.patch 5bb60c74-x86-fix-xpti-and-pv-l1tf.patch 5bcf0722-x86-boot-enable-NMIs.patch 5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch 5bd076e9-x86-boot-init-debug-regs-correctly.patch 5bd076e9-x86-init-vcpu-debug-regs-correctly.patch 5bd0e0cf-vvmx-Disallow-the-use-of-VT-x-instructions-when-nested-virt-is-disabled.patch 5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch 5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch 5be2a308-x86-extend-get_platform_badpages.patch 5be2a354-x86-work-around-HLE-host-lockup-erratum.patch xsa275-1.patch xsa275-2.patch xsa276-1.patch xsa276-2.patch xsa277.patch xsa279.patch xsa280-1.patch xsa280-2.patch- bsc#1116524 - Package xen-tools-4.11.0_09-2.1.x86_64 broken: Missing /bin/domu-xenstore. This was broken because "make package build reproducible" change. (boo#1047218, boo#1062303) This fix reverses the change to this patch. tmp_build.patch- bsc#1115040 - VUL-0: CVE-2018-19961 CVE-2018-19962: xen: insufficient TLB flushing / improper large page mappings with AMD IOMMUs (XSA-275) xsa275-1.patch xsa275-2.patch - bsc#1115043 - VUL-0: CVE-2018-19963: xen: resource accounting issues in x86 IOREQ server handling (XSA-276) xsa276-1.patch xsa276-2.patch - bsc#1115044 - VUL-0: CVE-2018-19964: xen: x86: incorrect error handling for guest p2m page removals (XSA-277) xsa277.patch - bsc#1114405 - VUL-0: CVE-2018-18883: xen: Nested VT-x usable even when disabled (XSA-278) 5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch - bsc#1115045 - VUL-0: xen: CVE-2018-19965: x86: DoS from attempting to use INVPCID with a non-canonical addresses (XSA-279) xsa279.patch - bsc#1115047 - VUL-0: CVE-2018-19966: xen: Fix for XSA-240 conflicts with shadow paging (XSA-280) xsa280-1.patch xsa280-2.patch - bsc#1114988 - VUL-0: CVE-2018-19967: xen: guest use of HLE constructs may lock up host (XSA-282) 5be2a308-x86-extend-get_platform_badpages.patch 5be2a354-x86-work-around-HLE-host-lockup-erratum.patch - bsc#1108940 - L3: XEN SLE12-SP1 domU hang on SLE12-SP3 HV 5bdc31d5-VMX-fix-vmx_handle_eoi.patch - Upstream bug fixes (bsc#1027519) 5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch 5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch 5bacae4b-x86-boot-allocate-extra-module-slot.patch 5bae44ce-x86-silence-false-log-messages.patch 5bb60c12-x86-split-opt_xpti.patch 5bb60c4f-x86-split-opt_pv_l1tf.patch 5bb60c74-x86-fix-xpti-and-pv-l1tf.patch 5bcf0722-x86-boot-enable-NMIs.patch 5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch 5bd076e9-x86-boot-init-debug-regs-correctly.patch 5bd076e9-x86-init-vcpu-debug-regs-correctly.patch 5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch- bsc#1114405 - VUL-0: CVE-2018-18883: xen: Nested VT-x usable even when disabled (XSA-278) 5bd0e0cf-vvmx-Disallow-the-use-of-VT-x-instructions-when-nested-virt-is-disabled.patch- Use SMBIOS_REL_DATE instead of SMBIOS_DATE for reproducible binaries- make package build reproducible (boo#1047218, boo#1062303) * Set SMBIOS_REL_DATE * Update tmp_build.patch to use SHA instead of random build-id * Add reproducible.patch to use --no-insert-timestamp- Building with ncurses 6.1 will fail without xen.2b50cdbc444c637575580dcfa6c9525a84d5cc62.patch - Building libxl acpi support on aarch64 with gcc 8.2 will fail without xen.b8f33431f3dd23fb43a879f4bdb4283fdc9465ad.patch- bsc#1106263 - L3: The affinity reporting via 'xl vcpu-list' is apparently broken 5b8fae26-tools-libxl-correct-vcpu-affinity-output-with-sparse-physical-cpu-map.patch 5b8fae26-xen-fill-topology-info-for-all-present-cpus.patch 5b8fb5af-tools-xl-refuse-to-set-number-of-vcpus-to-0-via-xl-vcpu-set.patch- bsc#1094508 - L3: Kernel oops in fs/dcache.c called by d_materialise_unique() 5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch 5b9784d2-x86-HVM-add-known_gla-helper.patch 5b9784f2-x86-HVM-split-page-straddling-accesses.patch - bsc#1103279 - (CVE-2018-15470) VUL-0: CVE-2018-15470: xen: oxenstored does not apply quota-maxentity (XSA-272) 5b72fbbe-oxenstored-eval-order.patch - bsc#1103275 - (CVE-2018-15469) VUL-0: CVE-2018-15469: xen: Use of v2 grant tables may cause crash on ARM (XSA-268) 5b72fbbe-ARM-disable-grant-table-v2.patch - Upstream patches from Jan (bsc#1027519) 5b6d84ac-x86-fix-improve-vlapic-read-write.patch 5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch 5b75afef-x86-setup-avoid-OoB-E820-lookup.patch 5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch 5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch 5b8d5832-x86-assorted-array_index_nospec-insertions.patch - Drop 5b741962-x86-write-to-correct-variable-in-parse_pv_l1tf.patch- bsc#1078292 - rpmbuild -ba SPECS/xen.spec with xen-4.9.1 failed xen.spec- bsc#1091107 - VUL-0: CVE-2018-3646: xen: L1 Terminal Fault -VMM (XSA-273) 5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch 5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch 5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch 5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch 5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch 5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch 5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch 5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch - bsc#1103276 - VUL-0: CVE-2018-15468: xen: x86: Incorrect MSR_DEBUGCTL handling lets guests enable BTS (XSA-269) 5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch - Upstream prereq patches for XSA-273 and other upstream fixes (bsc#1027519) 5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch 5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch 5b3cab8e-2-VMX-improve-MSR-load-save-API.patch 5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch 5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch 5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch 5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch 5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch 5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch 5b4321f6-x86-correctly-set-nonlazy_xstate_used-when-loading-full-state.patch 5b505fe5-VMX-fix-find-msr-build.patch 5b56feb1-hvm-Disallow-unknown-MSR_EFER-bits.patch 5b56feb2-spec-ctrl-Fix-the-parsing-of-xpti--on-fixed-Intel-hardware.patch 5b62ca93-VMX-avoid-hitting-BUG_ON.patch 5b6d8ce2-x86-XPTI-parsing.patch 5b72fbbf-x86-Make-spec-ctrl-no-a-global-disable-of-all-mitigations.patch 5b72fbbf-xl.conf-Add-global-affinity-masks.patch 5b741962-x86-write-to-correct-variable-in-parse_pv_l1tf.patch- Upstream patches from Jan (bsc#1027519) 5b3f8fa5-port-array_index_nospec-from-Linux.patch 5b4488e7-x86-spec-ctrl-cmdline-handling.patch 5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch 5b4c9a60-allow-cpu_down-to-be-called-earlier.patch 5b4db308-SVM-fix-cleanup-svm_inject_event.patch 5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch 5b5040f2-x86-AMD-distinguish-CU-from-HT.patch 5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch 5b508775-2-x86-possibly-bring-up-all-CPUs.patch 5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch 5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch 5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch 5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch gcc8-fix-format-warning-on-i586.patch gcc8-fix-array-warning-on-i586.patch - Drop xen.fuzz-_FORTIFY_SOURCE.patch gcc8-fix-warning-on-i586.patch- Update to Xen 4.11.0 FCS (fate#325202, fate#325123) xen-4.11.0-testing-src.tar.bz2 disable-building-pv-shim.patch - Dropped patches 5a33a12f-domctl-improve-locking-during-domain-destruction.patch 5a6703cb-x86-move-invocations-of-hvm_flush_guest_tlbs.patch 5a79d7ed-libxc-packed-initrd-dont-fail-domain-creation.patch 5a9985bd-x86-invpcid-support.patch 5ac72a48-gcc8.patch 5ac72a5f-gcc8.patch 5ac72a64-gcc8.patch 5ac72a69-gcc8.patch 5ac72a6e-gcc8.patch 5ac72a74-gcc8.patch 5ac72a7b-gcc8.patch 5ad4923e-x86-correct-S3-resume-ordering.patch 5ad49293-x86-suppress-BTI-mitigations-around-S3.patch 5ad600d4-x86-pv-introduce-x86emul_read_dr.patch 5ad600d4-x86-pv-introduce-x86emul_write_dr.patch 5ad8c3a7-x86-spec_ctrl-update-retpoline-decision-making.patch 5adda097-x86-HPET-fix-race-triggering-ASSERT.patch 5adda0d5-x86-HVM-never-retain-emulated-insn-cache.patch 5adde9ed-xpti-fix-double-fault-handling.patch 5ae06fad-SVM-fix-intercepts-for-SYS-CALL-ENTER-MSRs.patch 5ae31917-x86-cpuidle-init-stats-lock-once.patch 5aeaeae4-introduce-vcpu_sleep_nosync_locked.patch 5aeaeaf0-sched-fix-races-in-vcpu-migration.patch 5aeb2c57-x86-retval-checks-of-set-guest-trapbounce.patch 5aec7393-1-x86-xpti-avoid-copy.patch 5aec7393-2-x86-xpti-write-cr3.patch 5aec744a-3-x86-xpti-per-domain-flag.patch 5aec744a-4-x86-xpti-use-invpcid.patch 5aec744a-5-x86-xpti-no-global-pages.patch 5aec744a-6-x86-xpti-cr3-valid-flag.patch 5aec744a-7-x86-xpti-pv_guest_cr4_to_real_cr4.patch 5aec744b-8-x86-xpti-cr3-helpers.patch 5aec74a8-9-x86-xpti-use-pcid.patch 5af1daa9-1-x86-traps-fix-dr6-handing-in-DB-handler.patch 5af1daa9-2-x86-pv-move-exception-injection-into-test_all_events.patch 5af1daa9-3-x86-traps-use-IST-for-DB.patch 5af1daa9-4-x86-traps-fix-handling-of-DB-in-hypervisor-context.patch 5af1daa9-x86-HVM-guard-against-bogus-emulator-ioreq-state.patch 5af1daa9-x86-vpt-support-IO-APIC-routed-intr.patch 5af97999-viridian-cpuid-leaf-40000003.patch 5afc13ae-1-x86-read-MSR_ARCH_CAPABILITIES-once.patch 5afc13ae-2-x86-express-Xen-SPEC_CTRL-choice-as-variable.patch 5afc13ae-3-x86-merge-bti_ist_info-use_shadow_spec_ctrl.patch 5afc13ae-4-x86-fold-XEN_IBRS-ALTERNATIVES.patch 5afc13ae-5-x86-rename-bits-of-spec_ctrl-infrastructure.patch 5afc13ae-6-x86-elide-MSR_SPEC_CTRL-handling-in-idle.patch 5afc13ae-7-x86-split-X86_FEATURE_SC_MSR.patch 5afc13ae-8-x86-explicitly-set-Xen-default-SPEC_CTRL.patch 5afc13ae-9-x86-cpuid-improve-guest-policies-for-speculative.patch 5afc13ae-A-x86-introduce-spec-ctrl-cmdline-opt.patch 5b02c786-x86-AMD-mitigations-for-GPZ-SP4.patch 5b02c786-x86-Intel-mitigations-for-GPZ-SP4.patch 5b02c786-x86-msr-virtualise-SPEC_CTRL-SSBD.patch 5b0bc9da-x86-XPTI-fix-S3-resume.patch 5b0d2286-libxc-x86-PV-dont-hand-through-CPUID-leaf-0x80000008.patch 5b0d2d91-x86-suppress-sync-when-XPTI-off.patch 5b0d2dbc-x86-correct-default_xen_spec_ctrl.patch 5b0d2ddc-x86-CPUID-dont-override-tool-stack-hidden-STIBP.patch 5b150ef9-x86-fix-error-handling-of-pv-dr7-shadow.patch 5b21825d-1-x86-support-fully-eager-FPU-context-switching.patch 5b21825d-2-x86-spec-ctrl-mitigations-for-LazyFPU.patch 5b238b92-x86-HVM-account-for-fully-eager-FPU.patch 5b2b7172-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b31e004-x86-HVM-emul-attempts-FPU-set-fpu_initialised.patch 5b323e3c-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b34882d-x86-mm-dont-bypass-preemption-checks.patch 5b348874-x86-refine-checks-in-DB-handler.patch 5b348897-libxl-qemu_disk_scsi_drive_string-break-out-common.patch 5b3488a2-libxl-restore-passing-ro-to-qemu-for-SCSI-disks.patch 5b34891a-x86-HVM-dont-cause-NM-to-be-raised.patch 5b348954-x86-guard-against-NM.patch libxl.Add-a-version-check-of-QEMU-for-QMP-commands.patch libxl.LIBXL_DESTROY_TIMEOUT.patch libxl.qmp-Tell-QEMU-about-live-migration-or-snapshot.patch xen_fix_build_with_acpica_20180427_and_new_packages.patch- Submit upstream patch libacpi: fixes for iasl >= 20180427 git commit 858dbaaeda33b05c1ac80aea0ba9a03924e09005 xen_fix_build_with_acpica_20180427_and_new_packages.patch This is needed for acpica package to get updated in our build service- Upstream patches from Jan (bsc#1027519) 5b02c786-x86-AMD-mitigations-for-GPZ-SP4.patch (Replaces Spectre-v4-1.patch) 5b02c786-x86-Intel-mitigations-for-GPZ-SP4.patch (Replaces Spectre-v4-2.patch) 5b02c786-x86-msr-virtualise-SPEC_CTRL-SSBD.patch (Replaces Spectre-v4-3.patch) 5b0bc9da-x86-XPTI-fix-S3-resume.patch 5b0d2286-libxc-x86-PV-dont-hand-through-CPUID-leaf-0x80000008.patch 5b0d2d91-x86-suppress-sync-when-XPTI-off.patch 5b0d2dbc-x86-correct-default_xen_spec_ctrl.patch 5b0d2ddc-x86-CPUID-dont-override-tool-stack-hidden-STIBP.patch 5b150ef9-x86-fix-error-handling-of-pv-dr7-shadow.patch 5b21825d-1-x86-support-fully-eager-FPU-context-switching.patch (Replaces xsa267-1.patch) 5b21825d-2-x86-spec-ctrl-mitigations-for-LazyFPU.patch (Replaces xsa267-2.patch) 5b238b92-x86-HVM-account-for-fully-eager-FPU.patch 5b2b7172-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b31e004-x86-HVM-emul-attempts-FPU-set-fpu_initialised.patch 5b323e3c-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b34882d-x86-mm-dont-bypass-preemption-checks.patch (Replaces xsa264.patch) 5b348874-x86-refine-checks-in-DB-handler.patch (Replaces xsa265.patch) 5b348897-libxl-qemu_disk_scsi_drive_string-break-out-common.patch (Replaces xsa266-1-<>.patch) 5b3488a2-libxl-restore-passing-ro-to-qemu-for-SCSI-disks.patch (Replaces xsa266-2-<>.patch) 5b34891a-x86-HVM-dont-cause-NM-to-be-raised.patch 5b348954-x86-guard-against-NM.patch- Fix more build gcc8 related failures with xen.fuzz-_FORTIFY_SOURCE.patch- bsc#1098403 - fix regression introduced by changes for bsc#1079730 a PV domU without qcow2 and/or vfb has no qemu attached. Ignore QMP errors for PV domUs to handle PV domUs with and without an attached qemu-xen. xen.bug1079730.patch- bsc#1097521 - VUL-0: CVE-2018-12891: xen: preemption checks bypassed in x86 PV MM handling (XSA-264) xsa264.patch - bsc#1097522 - VUL-0: CVE-2018-12893: xen: x86: #DB exception safety check can be triggered by a guest (XSA-265) xsa265.patch - bsc#1097523 - VUL-0: CVE-2018-12892: xen: libxl fails to honour readonly flag on HVM emulated SCSI disks (XSA-266) xsa266-1-libxl-qemu_disk_scsi_drive_string-Break-out-common-p.patch xsa266-2-libxl-restore-passing-readonly-to-qemu-for-SCSI-disk.patch- bsc#1095242 - VUL-0: CVE-2018-3665: xen: Lazy FP Save/Restore (XSA-267) xsa267-1.patch xsa267-2.patch- bsc#1092543 - GCC 8: xen build fails gcc8-fix-warning-on-i586.patch- bsc#1092631 - VUL-0: CVE-2018-3639: xen: V4 – Speculative Store Bypass aka "Memory Disambiguation" (XSA-263) 5ad4923e-x86-correct-S3-resume-ordering.patch 5ad49293-x86-suppress-BTI-mitigations-around-S3.patch 5afc13ae-1-x86-read-MSR_ARCH_CAPABILITIES-once.patch 5afc13ae-2-x86-express-Xen-SPEC_CTRL-choice-as-variable.patch 5afc13ae-3-x86-merge-bti_ist_info-use_shadow_spec_ctrl.patch 5afc13ae-4-x86-fold-XEN_IBRS-ALTERNATIVES.patch 5afc13ae-5-x86-rename-bits-of-spec_ctrl-infrastructure.patch 5afc13ae-6-x86-elide-MSR_SPEC_CTRL-handling-in-idle.patch 5afc13ae-7-x86-split-X86_FEATURE_SC_MSR.patch 5afc13ae-8-x86-explicitly-set-Xen-default-SPEC_CTRL.patch 5afc13ae-9-x86-cpuid-improve-guest-policies-for-speculative.patch 5afc13ae-A-x86-introduce-spec-ctrl-cmdline-opt.patch Spectre-v4-1.patch Spectre-v4-2.patch Spectre-v4-3.patch- Always call qemus xen-save-devices-state in suspend/resume to fix migration with qcow2 images (bsc#1079730) libxl.Add-a-version-check-of-QEMU-for-QMP-commands.patch libxl.qmp-Tell-QEMU-about-live-migration-or-snapshot.patch xen.bug1079730.patch- bsc#1087289 - L3: Xen BUG at sched_credit.c:1663 5aeaeae4-introduce-vcpu_sleep_nosync_locked.patch 5aeaeaf0-sched-fix-races-in-vcpu-migration.patch - Upstream patches from Jan (bsc#1027519) 5ad600d4-x86-pv-introduce-x86emul_read_dr.patch 5ad600d4-x86-pv-introduce-x86emul_write_dr.patch 5ad8c3a7-x86-spec_ctrl-update-retpoline-decision-making.patch 5adda097-x86-HPET-fix-race-triggering-ASSERT.patch 5adda0d5-x86-HVM-never-retain-emulated-insn-cache.patch 5ae06fad-SVM-fix-intercepts-for-SYS-CALL-ENTER-MSRs.patch 5ae31917-x86-cpuidle-init-stats-lock-once.patch 5aeb2c57-x86-retval-checks-of-set-guest-trapbounce.patch 5af1daa9-1-x86-traps-fix-dr6-handing-in-DB-handler.patch (Replaces xsa260-1.patch) 5af1daa9-2-x86-pv-move-exception-injection-into-test_all_events.patch (Replaces xsa260-2.patch) 5af1daa9-3-x86-traps-use-IST-for-DB.patch (Replaces xsa260-3.patch) 5af1daa9-4-x86-traps-fix-handling-of-DB-in-hypervisor-context.patch (Replaces xsa260-4.patch) 5af1daa9-x86-HVM-guard-against-bogus-emulator-ioreq-state.patch (Replaces xsa262.patch) 5af1daa9-x86-vpt-support-IO-APIC-routed-intr.patch (Replaces xsa261.patch) 5af97999-viridian-cpuid-leaf-40000003.patch- Fixes related to Page Table Isolation (XPTI). bsc#1074562 XSA-254 5a6703cb-x86-move-invocations-of-hvm_flush_guest_tlbs.patch 5a9985bd-x86-invpcid-support.patch 5adde9ed-xpti-fix-double-fault-handling.patch 5aec7393-1-x86-xpti-avoid-copy.patch 5aec7393-2-x86-xpti-write-cr3.patch 5aec744a-3-x86-xpti-per-domain-flag.patch 5aec744a-4-x86-xpti-use-invpcid.patch 5aec744a-5-x86-xpti-no-global-pages.patch 5aec744a-6-x86-xpti-cr3-valid-flag.patch 5aec744a-7-x86-xpti-pv_guest_cr4_to_real_cr4.patch 5aec744b-8-x86-xpti-cr3-helpers.patch 5aec74a8-9-x86-xpti-use-pcid.patch- bsc#1092543 - GCC 8: xen build fails 5ac72a48-gcc8.patch 5ac72a5f-gcc8.patch 5ac72a64-gcc8.patch 5ac72a69-gcc8.patch 5ac72a6e-gcc8.patch 5ac72a74-gcc8.patch 5ac72a7b-gcc8.patch gcc8-inlining-failed.patch- Update to Xen 4.10.1 bug fix release (bsc#1027519) xen-4.10.1-testing-src.tar.bz2 disable-building-pv-shim.patch - Drop the following patches contained in the new tarball 5a21a77e-x86-pv-construct-d0v0s-GDT-properly.patch 5a2fda0d-x86-mb2-avoid-Xen-when-looking-for-module-crashkernel-pos.patch 5a2ffc1f-x86-mm-drop-bogus-paging-mode-assertion.patch 5a313972-x86-microcode-add-support-for-AMD-Fam17.patch 5a32bd79-x86-vmx-dont-use-hvm_inject_hw_exception-in-.patch 5a4caa5e-x86-IRQ-conditionally-preserve-access-perm.patch 5a4caa8c-x86-E820-don-t-overrun-array.patch 5a4e2bca-x86-free-msr_vcpu_policy-during-destruction.patch 5a4e2c2c-x86-upcall-inject-spurious-event-after-setting-vector.patch 5a4fd893-1-x86-break-out-alternative-asm-into-separate-header.patch 5a4fd893-2-x86-introduce-ALTERNATIVE_2-macros.patch 5a4fd893-3-x86-hvm-rename-update_guest_vendor-to-cpuid_policy_changed.patch 5a4fd893-4-x86-introduce-cpuid_policy_updated.patch 5a4fd893-5-x86-entry-remove-partial-cpu_user_regs.patch 5a4fd894-1-x86-rearrange-RESTORE_ALL-to-restore-in-stack-order.patch 5a4fd894-2-x86-hvm-use-SAVE_ALL-after-VMExit.patch 5a4fd894-3-x86-erase-guest-GPRs-on-entry-to-Xen.patch 5a4fd894-4-clarifications-to-wait-infrastructure.patch 5a534c78-x86-dont-use-incorrect-CPUID-values-for-topology.patch 5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4-updates.patch 5a5e2cff-x86-Meltdown-band-aid.patch 5a5e2d73-x86-Meltdown-band-aid-conditional.patch 5a5e3a4e-1-x86-support-compiling-with-indirect-branch-thunks.patch 5a5e3a4e-2-x86-support-indirect-thunks-from-asm.patch 5a5e3a4e-3-x86-report-speculative-mitigation-details.patch 5a5e3a4e-4-x86-AMD-set-lfence-as-Dispatch-Serialising.patch 5a5e3a4e-5-x86-introduce-alternative-indirect-thunks.patch 5a5e3a4e-6-x86-definitions-for-Indirect-Branch-Controls.patch 5a5e3a4e-7-x86-cmdline-opt-to-disable-IBRS-IBPB-STIBP.patch 5a5e459c-1-x86-SVM-offer-CPUID-faulting-to-AMD-HVM-guests.patch 5a5e459c-2-x86-report-domain-id-on-CPUID.patch 5a68bc16-x86-acpi-process-softirqs-logging-Cx.patch 5a69c0b9-x86-fix-GET_STACK_END.patch 5a6b36cd-1-x86-cpuid-handling-of-IBRS-IBPB-STIBP-and-IBRS-for-guests.patch 5a6b36cd-2-x86-msr-emulation-of-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-3-x86-migrate-MSR_SPEC_CTRL.patch 5a6b36cd-4-x86-hvm-permit-direct-access-to-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-5-x86-use-SPEC_CTRL-on-entry.patch 5a6b36cd-6-x86-clobber-RSB-RAS-on-entry.patch 5a6b36cd-7-x86-no-alternatives-in-NMI-MC-paths.patch 5a6b36cd-8-x86-boot-calculate-best-BTI-mitigation.patch 5a6b36cd-9-x86-issue-speculation-barrier.patch 5a6b36cd-A-x86-offer-Indirect-Branch-Controls-to-guests.patch 5a6b36cd-B-x86-clear-SPEC_CTRL-while-idle.patch 5a7b1bdd-x86-reduce-Meltdown-band-aid-IPI-overhead.patch 5a843807-x86-spec_ctrl-fix-bugs-in-SPEC_CTRL_ENTRY_FROM_INTR_IST.patch 5a856a2b-x86-emul-fix-64bit-decoding-of-segment-overrides.patch 5a856a2b-x86-use-32bit-xors-for-clearing-GPRs.patch 5a856a2b-x86-xpti-hide-almost-all-of-Xen-image-mappings.patch 5a8be788-x86-nmi-start-NMI-watchdog-on-CPU0-after-SMP.patch 5a95373b-x86-PV-avoid-leaking-other-guests-MSR_TSC_AUX.patch 5a95571f-memory-dont-implicitly-unpin-in-decrease-res.patch 5a95576c-gnttab-ARM-dont-corrupt-shared-GFN-array.patch 5a955800-gnttab-dont-free-status-pages-on-ver-change.patch 5a955854-x86-disallow-HVM-creation-without-LAPIC-emul.patch 5a956747-x86-HVM-dont-give-wrong-impression-of-WRMSR-success.patch 5a9eb7f1-x86-xpti-dont-map-stack-guard-pages.patch 5a9eb85c-x86-slightly-reduce-XPTI-overhead.patch 5a9eb890-x86-remove-CR-reads-from-exit-to-guest-path.patch 5aa2b6b9-cpufreq-ondemand-CPU-offlining-race.patch 5aaa9878-x86-vlapic-clear-TMR-bit-for-edge-triggered-intr.patch xsa258.patch xsa259.patch- bsc#1090820 - VUL-0: CVE-2018-8897: xen: x86: mishandling of debug exceptions (XSA-260) xsa260-1.patch xsa260-2.patch xsa260-3.patch xsa260-4.patch - bsc#1090822 - VUL-0: CVE-2018-10982: xen: x86 vHPET interrupt injection errors (XSA-261) xsa261.patch - bsc#1090823 - VUL-0: CVE-2018-10981: xen: qemu may drive Xen into unbounded loop (XSA-262) xsa262.patch- bsc#1089152 - VUL-0: CVE-2018-10472: xen: Information leak via crafted user-supplied CDROM (XSA-258) xsa258.patch - bsc#1089635 - VUL-0: CVE-2018-10471: xen: x86: PV guest may crash Xen with XPTI (XSA-259) xsa259.patch- Preserve xen-syms from xen-dbg.gz to allow processing vmcores with crash(1) (bsc#1087251)- Upstream patches from Jan (bsc#1027519) and fixes related to Page Table Isolation (XPTI). See also bsc#1074562 XSA-254 5a856a2b-x86-xpti-hide-almost-all-of-Xen-image-mappings.patch 5a9eb7f1-x86-xpti-dont-map-stack-guard-pages.patch 5a9eb85c-x86-slightly-reduce-XPTI-overhead.patch 5a9eb890-x86-remove-CR-reads-from-exit-to-guest-path.patch 5aa2b6b9-cpufreq-ondemand-CPU-offlining-race.patch 5aaa9878-x86-vlapic-clear-TMR-bit-for-edge-triggered-intr.patch- bsc#1072834 - Xen HVM: unchecked MSR access error: RDMSR from 0xc90 at rIP: 0xffffffff93061456 (native_read_msr+0x6/0x30) 5a956747-x86-HVM-dont-give-wrong-impression-of-WRMSR-success.patch - Upstream patches from Jan (bsc#1027519) 5a79d7ed-libxc-packed-initrd-dont-fail-domain-creation.patch 5a7b1bdd-x86-reduce-Meltdown-band-aid-IPI-overhead.patch 5a843807-x86-spec_ctrl-fix-bugs-in-SPEC_CTRL_ENTRY_FROM_INTR_IST.patch 5a856a2b-x86-emul-fix-64bit-decoding-of-segment-overrides.patch 5a856a2b-x86-use-32bit-xors-for-clearing-GPRs.patch 5a8be788-x86-nmi-start-NMI-watchdog-on-CPU0-after-SMP.patch 5a95373b-x86-PV-avoid-leaking-other-guests-MSR_TSC_AUX.patch 5a95571f-memory-dont-implicitly-unpin-in-decrease-res.patch (Replaces xsa252.patch) 5a95576c-gnttab-ARM-dont-corrupt-shared-GFN-array.patch (Replaces xsa255-1.patch) 5a955800-gnttab-dont-free-status-pages-on-ver-change.patch (Replaces xsa255-2.patch) 5a955854-x86-disallow-HVM-creation-without-LAPIC-emul.patch (Replaces xsa256.patch) - Drop xsa252.patch xsa255-1.patch xsa255-2.patch xsa256.patch- bsc#1080635 - VUL-0: CVE-2018-7540: xen: DoS via non-preemptable L3/L4 pagetable freeing (XSA-252) xsa252.patch - bsc#1080662 - VUL-0: CVE-2018-7541: xen: grant table v2 -> v1 transition may crash Xen (XSA-255) xsa255-1.patch xsa255-2.patch - bsc#1080634 - VUL-0: CVE-2018-7542: xen: x86 PVH guest without LAPIC may DoS the host (XSA-256) xsa256.patch- Remove stale systemd presets code for 13.2 and older- fate#324965 - add script, udev rule and systemd service to watch for vcpu online/offline events in a HVM domU They are triggered via xl vcpu-set domU N- Replace hardcoded xen with Name tag when refering to subpkgs- Make sure tools and tools-domU require libs from the very same build- tools-domU: Add support for qemu guest agent. New files 80-xen-channel-setup.rules and xen-channel-setup.sh configure a xen-pv-channel for use by the guest agent FATE#324963- Remove outdated /etc/xen/README*- bsc#1073961 - VUL-0: CVE-2018-5244: xen: x86: memory leak with MSR emulation (XSA-253) 5a4e2bca-x86-free-msr_vcpu_policy-during-destruction.patch - bsc#1074562 - VUL-0: CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 xen: Information leak via side effects of speculative execution (XSA-254). Includes Spectre v2 mitigation. 5a4caa5e-x86-IRQ-conditionally-preserve-access-perm.patch 5a4caa8c-x86-E820-don-t-overrun-array.patch 5a4e2c2c-x86-upcall-inject-spurious-event-after-setting-vector.patch 5a4fd893-1-x86-break-out-alternative-asm-into-separate-header.patch 5a4fd893-2-x86-introduce-ALTERNATIVE_2-macros.patch 5a4fd893-3-x86-hvm-rename-update_guest_vendor-to-cpuid_policy_changed.patch 5a4fd893-4-x86-introduce-cpuid_policy_updated.patch 5a4fd893-5-x86-entry-remove-partial-cpu_user_regs.patch 5a4fd894-1-x86-rearrange-RESTORE_ALL-to-restore-in-stack-order.patch 5a4fd894-2-x86-hvm-use-SAVE_ALL-after-VMExit.patch 5a4fd894-3-x86-erase-guest-GPRs-on-entry-to-Xen.patch 5a4fd894-4-clarifications-to-wait-infrastructure.patch 5a534c78-x86-dont-use-incorrect-CPUID-values-for-topology.patch 5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4-updates.patch 5a5e2cff-x86-Meltdown-band-aid.patch 5a5e2d73-x86-Meltdown-band-aid-conditional.patch 5a5e3a4e-1-x86-support-compiling-with-indirect-branch-thunks.patch 5a5e3a4e-2-x86-support-indirect-thunks-from-asm.patch 5a5e3a4e-3-x86-report-speculative-mitigation-details.patch 5a5e3a4e-4-x86-AMD-set-lfence-as-Dispatch-Serialising.patch 5a5e3a4e-5-x86-introduce-alternative-indirect-thunks.patch 5a5e3a4e-6-x86-definitions-for-Indirect-Branch-Controls.patch 5a5e3a4e-7-x86-cmdline-opt-to-disable-IBRS-IBPB-STIBP.patch 5a5e459c-1-x86-SVM-offer-CPUID-faulting-to-AMD-HVM-guests.patch 5a5e459c-2-x86-report-domain-id-on-CPUID.patch 5a68bc16-x86-acpi-process-softirqs-logging-Cx.patch 5a69c0b9-x86-fix-GET_STACK_END.patch 5a6b36cd-1-x86-cpuid-handling-of-IBRS-IBPB-STIBP-and-IBRS-for-guests.patch 5a6b36cd-2-x86-msr-emulation-of-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-3-x86-migrate-MSR_SPEC_CTRL.patch 5a6b36cd-4-x86-hvm-permit-direct-access-to-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-5-x86-use-SPEC_CTRL-on-entry.patch 5a6b36cd-6-x86-clobber-RSB-RAS-on-entry.patch 5a6b36cd-7-x86-no-alternatives-in-NMI-MC-paths.patch 5a6b36cd-8-x86-boot-calculate-best-BTI-mitigation.patch 5a6b36cd-9-x86-issue-speculation-barrier.patch 5a6b36cd-A-x86-offer-Indirect-Branch-Controls-to-guests.patch 5a6b36cd-B-x86-clear-SPEC_CTRL-while-idle.patch- Fix python3 deprecated atoi call (bsc#1067224) pygrub-python3-conversion.patch - Drop xenmon-python3-conversion.patch- bsc#1067317 - pass cache=writeback|unsafe|directsync to qemu, depending on the libxl disk settings libxl.add-option-to-disable-disk-cache-flushes-in-qdisk.patch- Remove libxl.LIBXL_DESTROY_TIMEOUT.debug.patch- bsc#1067224 - xen-tools have hard dependency on Python 2 build-python3-conversion.patch bin-python3-conversion.patch- bsc#1070165 - xen crashes after aborted localhost migration 5a2ffc1f-x86-mm-drop-bogus-paging-mode-assertion.patch - bsc#1035442 - L3: libxl: error: libxl.c:1676:devices_destroy_cb: libxl__devices_destroy failed 5a33a12f-domctl-improve-locking-during-domain-destruction.patch - Upstream patches from Jan (bsc#1027519) 5a21a77e-x86-pv-construct-d0v0s-GDT-properly.patch 5a2fda0d-x86-mb2-avoid-Xen-when-looking-for-module-crashkernel-pos.patch 5a313972-x86-microcode-add-support-for-AMD-Fam17.patch 5a32bd79-x86-vmx-dont-use-hvm_inject_hw_exception-in-.patch- Update to Xen 4.10.0 FCS (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Rebuild initrd if xen-tools-domU is updated- Update to Xen 4.10.0-rc8 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Increase the value of LIBXL_DESTROY_TIMEOUT from 10 to 100 seconds If many domUs shutdown in parallel the backends can not keep up Add some debug output to track how long backend shutdown takes (bsc#1035442) libxl.LIBXL_DESTROY_TIMEOUT.patch libxl.LIBXL_DESTROY_TIMEOUT.debug.patch- Adjust xenstore-run-in-studomain.patch to change the defaults in the code instead of changing the sysconfig template, to also cover the upgrade case- Update to Xen 4.10.0-rc6 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Since xen switched to Kconfig, building a debug hypervisor was done by default. Adjust make logic to build a non-debug hypervisor by default, and continue to provide one as xen-dbg.gz- fate#316614: set migration constraints from cmdline fix libxl.set-migration-constraints-from-cmdline.patch for xen-4.10- Document the suse-diskcache-disable-flush option in xl-disk-configuration(5) (bsc#879425,bsc#1067317)- Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468)- Update to Xen 4.10.0-rc5 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - fate#323663 - Run Xenstore in stubdomain xenstore-run-in-studomain.patch- bsc#1067224 - xen-tools have hard dependency on Python 2 pygrub-python3-conversion.patch xenmon-python3-conversion.patch migration-python3-conversion.patch xnloader.py xen2libvirt.py- Remove xendriverdomain.service (bsc#1065185) Driver domains must be configured manually with custom .service file- Update to Xen 4.10.0-rc3 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - Drop 59f31268-libxc-remove-stale-error-check-for-domain-size.patch- Adjust xen-dom0-modules.service to ignore errors (bsc#1065187)- fate#324052 Support migration of Xen HVM domains larger than 1TB 59f31268-libxc-remove-stale-error-check-for-domain-size.patch- Update to Xen 4.10.0-rc2 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Update to Xen 4.10.0-rc1 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - Drop patches included in new tarball 592fd5f0-stop_machine-fill-result-only-in-case-of-error.patch 596f257e-x86-fix-hvmemul_insn_fetch.patch 5982fd99-VT-d-don-t-panic-warn-on-iommu-no-igfx.patch 598c3630-VT-d-PI-disable-when-CPU-side-PI-is-off.patch 598c3706-cpufreq-only-stop-ondemand-governor-if-started.patch 5992f1e5-x86-grant-disallow-misaligned-PTEs.patch 5992f20d-gnttab-split-maptrack-lock-to-make-it-useful-again.patch 5992f233-gnttab-correct-pin-status-fixup-for-copy.patch 59958e76-gnttab-dont-use-possibly-unbounded-tail-calls.patch 59958ebf-gnttab-fix-transitive-grant-handling.patch 59958edd-gnttab-avoid-spurious-maptrack-handle-alloc-failures.patch 599da329-arm-mm-release-grant-lock-on-xatp1-error-paths.patch 59a01223-x86-check-for-alloc-errors-in-modify_xen_mappings.patch 59a0130c-x86-efi-dont-write-relocs-in-efi_arch_relocate_image-1st-pass.patch 59a9221f-VT-d-use-correct-BDF-for-VF-to-search-VT-d-unit.patch 59ae9177-x86-emul-fix-handling-of-unimplemented-Grp7-insns.patch 59aec335-x86emul-correct-VEX-W-handling-for-VPINSRD.patch 59aec375-x86emul-correct-VEX-L-handling-for-VCVTx2SI.patch 59afcea0-x86-introduce-and-use-setup_force_cpu_cap.patch 59b2a7f2-x86-HVM-correct-repeat-count-update-linear-phys.patch 59b7d664-mm-make-sure-node-is-less-than-MAX_NUMNODES.patch 59b7d69b-grant_table-fix-GNTTABOP_cache_flush-handling.patch 59b7d6c8-xenstore-dont-unlink-connection-object-twice.patch 59b7d6d9-gnttab-also-validate-PTE-perms-upon-destroy-replace.patch gcc7-arm.patch gcc7-mini-os.patch- bsc#1061084 - VUL-0: xen: page type reference leak on x86 (XSA-242) xsa242.patch - bsc#1061086 - VUL-0: xen: x86: Incorrect handling of self-linear shadow mappings with translated guests (XSA-243) xsa243.patch - bsc#1061087 - VUL-0: xen: x86: Incorrect handling of IST settings during CPU hotplug (XSA-244) xsa244.patch- bsc#1061077 - VUL-0: xen: DMOP map/unmap missing argument checks (XSA-238) xsa238.patch - bsc#1061080 - VUL-0: xen: hypervisor stack leak in x86 I/O intercept code (XSA-239) xsa239.patch - bsc#1061081 - VUL-0: xen: Unlimited recursion in linear pagetable de-typing (XSA-240) xsa240-1.patch xsa240-2.patch - bsc#1061082 - VUL-0: xen: Stale TLB entry due to page type release race (XSA-241) xsa241.patch- bsc#1061075 - VUL-0: xen: pin count / page reference race in grant table code (XSA-236) xsa236.patch - bsc#1061076 - VUL-0: xen: multiple MSI mapping issues on x86 (XSA-237) xsa237-1.patch xsa237-2.patch xsa237-3.patch xsa237-4.patch xsa237-5.patch- bsc#1056278 - VUL-0: xen: Missing NUMA node parameter verification (XSA-231) 59b7d664-mm-make-sure-node-is-less-than-MAX_NUMNODES.patch - bsc#1056280 - VUL-0: xen: Missing check for grant table (XSA-232) 59b7d69b-grant_table-fix-GNTTABOP_cache_flush-handling.patch - bsc#1056281 - VUL-0: xen: cxenstored: Race in domain cleanup (XSA-233) 59b7d6c8-xenstore-dont-unlink-connection-object-twice.patch - bsc#1056282 - VUL-0: xen: insufficient grant unmapping checks for x86 PV guests (XSA-234) 59b7d6d9-gnttab-also-validate-PTE-perms-upon-destroy-replace.patch - bsc#1055321 - VUL-0: xen: add-to-physmap error paths fail to release lock on ARM (XSA-235) 599da329-arm-mm-release-grant-lock-on-xatp1-error-paths.patch - Upstream patches from Jan (bsc#1027519) 59a01223-x86-check-for-alloc-errors-in-modify_xen_mappings.patch 59a0130c-x86-efi-dont-write-relocs-in-efi_arch_relocate_image-1st-pass.patch 59a9221f-VT-d-use-correct-BDF-for-VF-to-search-VT-d-unit.patch 59ae9177-x86-emul-fix-handling-of-unimplemented-Grp7-insns.patch 59aec335-x86emul-correct-VEX-W-handling-for-VPINSRD.patch 59aec375-x86emul-correct-VEX-L-handling-for-VCVTx2SI.patch 59afcea0-x86-introduce-and-use-setup_force_cpu_cap.patch 59b2a7f2-x86-HVM-correct-repeat-count-update-linear-phys.patch - Dropped gcc7-xen.patch- bsc#1057358 - Cannot Boot into SLES12.3 with Xen hypervisor when Secure Boot is Enabled xen.spec- bsc#1055695 - XEN: 11SP4 and 12SP3 HVM guests can not be restored update from v6 to v9 to cover more cases for ballooned domUs libxc.sr.superpage.patch- bsc#1026236 - remove suse_vtsc_tolerance= cmdline option for Xen drop the patch because it is not upstream acceptable remove xen.suse_vtsc_tolerance.patch- bsc#1055695 - XEN: 11SP4 and 12SP3 HVM guests can not be restored after the save using xl stack libxc.sr.superpage.patch- Unignore gcc-PIE the toolstack disables PIE for firmware builds as needed- Upstream patches from Jan (bsc#1027519) 592fd5f0-stop_machine-fill-result-only-in-case-of-error.patch 596f257e-x86-fix-hvmemul_insn_fetch.patch 5982fd99-VT-d-don-t-panic-warn-on-iommu-no-igfx.patch 598c3630-VT-d-PI-disable-when-CPU-side-PI-is-off.patch 598c3706-cpufreq-only-stop-ondemand-governor-if-started.patch 5992f1e5-x86-grant-disallow-misaligned-PTEs.patch (Replaces xsa227.patch) 5992f20d-gnttab-split-maptrack-lock-to-make-it-useful-again.patch (Replaces xsa228.patch) 5992f233-gnttab-correct-pin-status-fixup-for-copy.patch (Replaces xsa230.patch) 59958e76-gnttab-dont-use-possibly-unbounded-tail-calls.patch (Replaces xsa226-1.patch) 59958ebf-gnttab-fix-transitive-grant-handling.patch (Replaces xsa226-2.patch) 59958edd-gnttab-avoid-spurious-maptrack-handle-alloc-failures.patch- bsc#1044974 - xen-tools require python-pam xen.spec- Clean up spec file errors and a few warnings. (bsc#1027519) - Removed conditional 'with_systemd' and some old deprecated 'sles_version' checks. xen.spec- Remove use of brctl utiltiy from supportconfig plugin FATE#323639- Use upstream variant of mini-os __udivmoddi4 change gcc7-mini-os.patch- fate#323639 Move bridge-utils to legacy replace-obsolete-network-configuration-commands-in-s.patch- bsc#1052686 - VUL-0: xen: grant_table: possibly premature clearing of GTF_writing / GTF_reading (XSA-230) xsa230.patch- bsc#1035231 - migration of HVM domU does not use superpages on destination dom0 libxc.sr.superpage.patch- bsc#1051787 - VUL-0: CVE-2017-12135: xen: possibly unbounded recursion in grant table code (XSA-226) xsa226-1.patch xsa226-2.patch - bsc#1051788 - VUL-0: CVE-2017-12137: xen: x86: PV privilege escalation via map_grant_ref (XSA-227) xsa227.patch - bsc#1051789 - VUL-0: CVE-2017-12136: xen: grant_table: Race conditions with maptrack free list handling (XSA-228) xsa228.patch- Add a supportconfig plugin xen-supportconfig FATE#323661- bsc#1026236 - add suse_vtsc_tolerance= cmdline option for Xen To avoid emulation of TSC access from a domU after live migration add a global tolerance for the measured host kHz xen.suse_vtsc_tolerance.patch- fate#323662 Drop qemu-dm from xen-tools package The following tarball and patches have been removed qemu-xen-traditional-dir-remote.tar.bz2 VNC-Support-for-ExtendedKeyEvent-client-message.patch 0001-net-move-the-tap-buffer-into-TAPState.patch 0002-net-increase-tap-buffer-size.patch 0003-e1000-fix-access-4-bytes-beyond-buffer-end.patch 0004-e1000-secrc-support.patch 0005-e1000-multi-buffer-packet-support.patch 0006-e1000-clear-EOP-for-multi-buffer-descriptors.patch 0007-e1000-verify-we-have-buffers-upfront.patch 0008-e1000-check-buffer-availability.patch CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch CVE-2015-4037-qemut-smb-config-dir-name.patch CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch CVE-2016-7908-qemut-net-Infinite-loop-in-mcf_fec_do_tx.patch CVE-2016-7909-qemut-net-pcnet-infinite-loop-in-pcnet_rdra_addr.patch CVE-2016-8667-qemut-dma-rc4030-divide-by-zero-error-in-set_next_tick.patch CVE-2016-8669-qemut-char-divide-by-zero-error-in-serial_update_parameters.patch CVE-2016-8910-qemut-net-rtl8139-infinite-loop-while-transmit-in-Cplus-mode.patch CVE-2016-9921-qemut-display-cirrus_vga-divide-by-zero-in-cirrus_do_copy.patch CVE-2017-6505-qemut-usb-an-infinite-loop-issue-in-ohci_service_ed_list.patch CVE-2017-8309-qemut-audio-host-memory-leakage-via-capture-buffer.patch CVE-2017-9330-qemut-usb-ohci-infinite-loop-due-to-incorrect-return-value.patch blktap.patch cdrom-removable.patch xen-qemu-iscsi-fix.patch qemu-security-etch1.patch xen-disable-qemu-monitor.patch xen-hvm-default-bridge.patch qemu-ifup-set-mtu.patch ioemu-vnc-resize.patch capslock_enable.patch altgr_2.patch log-guest-console.patch bdrv_open2_fix_flags.patch bdrv_open2_flags_2.patch ioemu-7615-qcow2-fix-alloc_cluster_link_l2.patch qemu-dm-segfault.patch bdrv_default_rwflag.patch kernel-boot-hvm.patch ioemu-watchdog-support.patch ioemu-watchdog-linkage.patch ioemu-watchdog-ib700-timer.patch ioemu-hvm-pv-support.patch pvdrv_emulation_control.patch ioemu-disable-scsi.patch ioemu-disable-emulated-ide-if-pv.patch xenpaging.qemu.flush-cache.patch ioemu-devicemodel-include.patch - Cleanup spec file and remove unused KMP patches kmp_filelist supported_module.patch xen_pvonhvm.xen_emul_unplug.patch- bsc#1002573 - Optimize LVM functions in block-dmmd block-dmmd- Record initial Xen dmesg in /var/log/xen/xen-boot.log for supportconfig. Keep previous log in /var/log/xen/xen-boot.prev.log- Remove storytelling from description in xen.rpm- Update to Xen 4.9.0 FCS (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update block-dmmd script (bsc#1002573) block-dmmd- Update to Xen 4.9.0-rc8+ (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 gcc7-arm.patch - Drop gcc7-error-xenpmd.patch- Update to Xen 4.9.0-rc8 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1042160 - VUL-1: CVE-2017-9330: xen: usb: ohci: infinite loop due to incorrect return value CVE-2017-9330-qemut-usb-ohci-infinite-loop-due-to-incorrect-return-value.patch- bsc#1037243 - VUL-1: CVE-2017-8309: xen: audio: host memory leakage via capture buffer CVE-2017-8309-qemut-audio-host-memory-leakage-via-capture-buffer.patch- Update to Xen 4.9.0-rc7 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update to Xen 4.9.0-rc6 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1031343 - xen fails to build with GCC 7 gcc7-mini-os.patch gcc7-xen.patch- bsc#1031343 - xen fails to build with GCC 7 gcc7-error-xenpmd.patch- Update to Xen 4.9.0-rc5 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 - Drop xen-tools-pkgconfig-xenlight.patch- bsc#1037779 - xen breaks kexec-tools build xen-tools-pkgconfig-xenlight.patch- Update to Xen 4.9.0-rc4 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1036146 - sles12sp2 xen VM dumps core to wrong path xen.spec- Update to Xen 4.9.0-rc3 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 aarch64-maybe-uninitialized.patch- Update to Xen 4.9.0-rc2 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update to Xen 4.9.0-rc1 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 ioemu-devicemodel-include.patch - Dropped patches contained in new tarball xen-4.8.0-testing-src.tar.bz2 0001-xenstore-let-write_node-and-some-callers-return-errn.patch 0002-xenstore-undo-function-rename.patch 0003-xenstore-rework-of-transaction-handling.patch 584806ce-x86emul-correct-PUSHF-POPF.patch 584fc649-fix-determining-when-domain-creation-is-complete.patch 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch 58510cac-x86emul-MOVNTI-no-REP-prefixes.patch 58526ccc-x86emul-64bit-ignore-most-segment-bases-in-align-check.patch 5853ed37-VT-d-correct-dma_msi_set_affinity.patch 5853ee07-x86emul-CMPXCHG16B-aligned-operand.patch 58580060-x86-emul-correct-SYSCALL-eflags-handling.patch 585aa3c5-x86-force-EFLAGS-IF-on-upon-exit-to-PV.patch 585aa407-x86-HVM-NULL-check-before-using-VMFUNC-hook.patch 585bd5fe-x86-emul-correct-VMFUNC-return-value-handling.patch 586ba81c-x86-cpu-dont-update-this_cpu-for-guest-get_cpu_vendor.patch 587d04d6-x86-xstate-fix-array-overrun-with-LWP.patch 587de4a9-x86emul-VEX-B-ignored-in-compat-mode.patch 5882129d-x86emul-LOCK-check-adjustments.patch 58821300-x86-segment-attribute-handling.patch 58873c1f-x86emul-correct-FPU-stub-asm-constraints.patch 58873c80-x86-hvm-do-not-set-msr_tsc_adjust-on-.patch 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5887888f-credit2-never-consider-CPUs-outside-of-pool.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5888b1b3-x86-emulate-dont-assume-addr_size-32-implies-protmode.patch 5899cbd9-EPT-allow-wrcomb-MMIO-mappings-again.patch 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch 58a44771-IOMMU-always-call-teardown-callback.patch 58a48ccc-x86-fix-p2m_flush_table-for-non-nested.patch 58a59f4b-libxl-correct-xenstore-entry-for-empty-cdrom.patch 58a70d94-VMX-fix-VMCS-race-on-cswitch-paths.patch 58ac1f3f-VMX-dont-leak-host-syscall-MSRs.patch 58b5a2de-x86-correct-Xens-idea-of-its-memory-layout.patch 58b6fd42-credit2-always-mark-a-tickled-pCPU-as-tickled.patch 58b6fd42-credit2-dont-miss-accounting-during-credit-reset.patch 58cbf682-x86-EFI-avoid-overrunning-mb_modules.patch 58cf9200-x86-EFI-avoid-IOMMU-faults-on-tail-gap.patch 58cf9260-x86-EFI-avoid-Xen-when-looking-for-mod-kexec-pos.patch 58cf9277-x86-time-dont-use-vTSC-if-host-guest-freqs-match.patch 58d25ea2-xenstore-add-missing-checks-for-allocation-failure.patch 58d91365-sched-dont-call-wrong-hook-via-VCPU2OP.patch CVE-2017-2615-qemut-display-cirrus-oob-access-while-doing-bitblt-copy-backward-mode.patch CVE-2017-2620-xsa209-qemut-cirrus_bitblt_cputovideo-does-not-check-if-memory-region-safe.patch glibc-2.25-compatibility-fix.patch xs-09-add_change_node-params.patch xs-10-call-add_change_node.patch xs-11-tdb-record-header.patch xs-12-node-gen-count.patch xs-13-read-directory-part-support.patch xs-14-command-array.patch xs-15-command-return-val.patch xs-16-function-static.patch xs-17-arg-parsing.patch xs-18-default-buffer.patch xs-19-handle-alloc-failures.patch xs-20-tdb-version.patch xs-21-empty-tdb-database.patch xs-22-reopen_log-fix.patch xs-23-XS_DEBUG-rename.patch xs-24-xenstored_control.patch xs-25-control-enhance.patch xs-26-log-control.patch xs-27-memory-report.patch xs-28-remove-talloc-report.patch xs-29-define-off_t.patch xsa206-0001-xenstored-apply-a-write-transaction-rate-limit.patch xsa206-0002-xenstored-Log-when-the-write-transaction-rate-limit.patch- bsc#1022703 - Xen HVM guest with OVMF hangs with unattached CDRom 58a59f4b-libxl-correct-xenstore-entry-for-empty-cdrom.patch- bsc#1015348 - L3: libvirtd does not start during boot suse-xendomains-service.patch- bsc#1014136 - Partner-L3: kdump can't dump a kernel on SLES12-SP2 with Xen hypervisor. 58cf9260-x86-EFI-avoid-Xen-when-looking-for-mod-kexec-pos.patch - bsc#1026236 - L3: Paravirtualized vs. fully virtualized migration - latter one much faster 58cf9277-x86-time-dont-use-vTSC-if-host-guest-freqs-match.patch - Upstream patch from Jan 58cbf682-x86-EFI-avoid-overrunning-mb_modules.patch 58cf9200-x86-EFI-avoid-IOMMU-faults-on-tail-gap.patch 58d91365-sched-dont-call-wrong-hook-via-VCPU2OP.patch- bsc#1022555 - L3: Timeout in "execution of /etc/xen/scripts/block add" 58d25ea2-xenstore-add-missing-checks-for-allocation-failure.patch 0001-xenstore-let-write_node-and-some-callers-return-errn.patch 0002-xenstore-undo-function-rename.patch 0003-xenstore-rework-of-transaction-handling.patch - bsc#1030144 - VUL-0: xen: xenstore denial of service via repeated update (XSA-206) xsa206-0001-xenstored-apply-a-write-transaction-rate-limit.patch xsa206-0002-xenstored-Log-when-the-write-transaction-rate-limit.patch - bsc#1029827 - Forward port xenstored xs-09-add_change_node-params.patch xs-10-call-add_change_node.patch xs-11-tdb-record-header.patch xs-12-node-gen-count.patch xs-13-read-directory-part-support.patch xs-14-command-array.patch xs-15-command-return-val.patch xs-16-function-static.patch xs-17-arg-parsing.patch xs-18-default-buffer.patch xs-19-handle-alloc-failures.patch xs-20-tdb-version.patch xs-21-empty-tdb-database.patch xs-22-reopen_log-fix.patch xs-23-XS_DEBUG-rename.patch xs-24-xenstored_control.patch xs-25-control-enhance.patch xs-26-log-control.patch xs-27-memory-report.patch xs-28-remove-talloc-report.patch xs-29-define-off_t.patch- bsc#1029128 - fix make xen to really produce xen.efi with gcc48- bsc#1028235 - VUL-0: CVE-2017-6505: xen: qemu: usb: an infinite loop issue in ohci_service_ed_list CVE-2017-6505-qemut-usb-an-infinite-loop-issue-in-ohci_service_ed_list.patch - Upstream patches from Jan (bsc#1027519) 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5899cbd9-EPT-allow-wrcomb-MMIO-mappings-again.patch 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch 58a44771-IOMMU-always-call-teardown-callback.patch 58a48ccc-x86-fix-p2m_flush_table-for-non-nested.patch 58a70d94-VMX-fix-VMCS-race-on-cswitch-paths.patch 58ac1f3f-VMX-dont-leak-host-syscall-MSRs.patch 58b5a2de-x86-correct-Xens-idea-of-its-memory-layout.patch 58b6fd42-credit2-always-mark-a-tickled-pCPU-as-tickled.patch 58b6fd42-credit2-dont-miss-accounting-during-credit-reset.patch- bsc#1027654 - XEN fails to build against glibc 2.25 glibc-2.25-compatibility-fix.patch libxl.pvscsi.patch- fate#316613: Refresh and enable libxl.pvscsi.patch- bsc#1024834 - VUL-0: CVE-2017-2620: xen: cirrus_bitblt_cputovideo does not check if memory region is safe (XSA-209) CVE-2017-2620-xsa209-qemut-cirrus_bitblt_cputovideo-does-not-check-if-memory-region-safe.patch- bsc#1023948 - [pvusb][sles12sp3][openqa] Segmentation fault happened when adding usbctrl devices via xl 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch- Upstream patches from Jan (bsc#1027519) 587d04d6-x86-xstate-fix-array-overrun-with-LWP.patch 587de4a9-x86emul-VEX-B-ignored-in-compat-mode.patch 5882129d-x86emul-LOCK-check-adjustments.patch 58821300-x86-segment-attribute-handling.patch 58873c1f-x86emul-correct-FPU-stub-asm-constraints.patch 58873c80-x86-hvm-do-not-set-msr_tsc_adjust-on-.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5887888f-credit2-never-consider-CPUs-outside-of-pool.patch 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5888b1b3-x86-emulate-dont-assume-addr_size-32-implies-protmode.patch- bsc#1023004 - VUL-0: CVE-2017-2615: qemu: display: cirrus: oob access while doing bitblt copy backward mode CVE-2017-2615-qemut-display-cirrus-oob-access-while-doing-bitblt-copy-backward-mode.patch- fate#322313 and fate#322150 require the acpica package ported to aarch64 which Xen 4.8 needs to build. Temporarily disable aarch64 until these fates are complete. xen.spec- bsc#1021952 - Virutalization/xen: Bug xen-tools missing /usr/bin/domu-xenstore; guests fail to launch tmp_build.patch xen.spec- No systemd presets for 42.3+ and SLE12SP3+ (bsc#1012842)- bsc#1007224 - broken symlinks in /usr/share/doc/packages/xen/misc/ xen.spec- 585aa3c5-x86-force-EFLAGS-IF-on-upon-exit-to-PV.patch Replaces xsa202.patch (bsc#1014298) - 585aa407-x86-HVM-NULL-check-before-using-VMFUNC-hook.patch Replaces xsa203.patch (bsc#1014300) - 58580060-x86-emul-correct-SYSCALL-eflags-handling.patch Replaces xsa204.patch (bsc#1016340) - Upstream patches from Jan 58526ccc-x86emul-64bit-ignore-most-segment-bases-in-align-check.patch 5853ed37-VT-d-correct-dma_msi_set_affinity.patch 5853ee07-x86emul-CMPXCHG16B-aligned-operand.patch 585bd5fe-x86-emul-correct-VMFUNC-return-value-handling.patch 586ba81c-x86-cpu-dont-update-this_cpu-for-guest-get_cpu_vendor.patch- bsc#1015169 - VUL-0: CVE-2016-9921, CVE-2016-9922: xen: qemu: display: cirrus_vga: a divide by zero in cirrus_do_copy CVE-2016-9921-qemut-display-cirrus_vga-divide-by-zero-in-cirrus_do_copy.patch- bsc#1016340 - VUL-0: CVE-2016-10013: xen: x86: Mishandling of SYSCALL singlestep during emulation (XSA-204) xsa204.patch- bsc#1012651 - VUL-0: CVE-2016-9932: xen: x86 CMPXCHG8B emulation fails to ignore operand size override (XSA-200) 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch- bsc#1014298 - VUL-0: CVE-2016-10024: xen: x86 PV guests may be able to mask interrupts (XSA-202) xsa202.patch - bsc#1014300 - VUL-0: CVE-2016-10025: xen: x86: missing NULL pointer check in VMFUNC emulation (XSA-203) xsa203.patch - Upstream patches from Jan 584806ce-x86emul-correct-PUSHF-POPF.patch 584fc649-fix-determining-when-domain-creation-is-complete.patch 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch 58510cac-x86emul-MOVNTI-no-REP-prefixes.patch- Update to Xen 4.8 FCS xen-4.8.0-testing-src.tar.bz2 - Dropped xen-4.7.1-testing-src.tar.bz2 0001-libxc-Rework-extra-module-initialisation.patch 0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch 0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch 0004-firmware-makefile-install-BIOS-blob.patch 0005-libxl-Load-guest-BIOS-from-file.patch 0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch 0007-hvmloader-Grab-the-hvm_start_info-pointer.patch 0008-hvmloader-Locate-the-BIOS-blob.patch 0009-hvmloader-Check-modules-whereabouts-in-perform_tests.patch 0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch 0011-hvmloader-Load-OVMF-from-modules.patch 0012-hvmloader-Specific-bios_load-function-required.patch 0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch 0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch 57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch 576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 5769106e-x86-generate-assembler-equates-for-synthesized.patch 57a1e603-x86-time-adjust-local-system-time-initialization.patch 57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch 57a30261-x86-support-newer-Intel-CPU-models.patch 5810a9cc-x86-emul-Correct-decoding-of-SReg3-operands.patch 581b2c3b-x86-emul-reject-LGDT-LIDT-with-non-canonical-addresses.patch 581b647a-x86emul-L-S-G-I-DT-ignore-opsz-overrides-in-64-bit-mode.patch 58249392-x86-svm-dont-clobber-eax-edx-if-RDMSR-intercept-fails.patch 582c35d6-x86-vmx-correct-long-mode-check-in-vmx_cpuid_intercept.patch 582c35ee-x86-traps-dont-call-hvm_hypervisor_cpuid_leaf-for-PV.patch 58343dc2-x86-hvm-Fix-the-handling-of-non-present-segments.patch 58343df8-x86-HVM-dont-load-LDTR-with-VM86-mode-attrs-during-task-switch.patch 58343e24-x86-PV-writes-of-fs-and-gs-base-MSRs-require-canonical-addresses.patch 58343e9e-libelf-fix-stack-memory-leak-when-loading-32-bit-symbol-tables.patch 58343ec2-x86emul-fix-huge-bit-offset-handling.patch 58343f29-x86-emul-correct-the-IDT-entry-calculation-in-inject_swint.patch 58343f44-x86-svm-fix-injection-of-software-interrupts.patch 58343f79-pygrub-Properly-quote-results-when-returning-them-to-the-caller.patch CVE-2016-9381-xsa197-qemut.patch CVE-2016-9637-xsa199-qemut.patch- bsc#1011652 - VUL-0: xen: qemu ioport array overflow CVE-2016-9637-xsa199-qemut.patch- bsc#1009100 - VUL-0: CVE-2016-9386: XSA-191: xen: x86 null segments not always treated as unusable 58343dc2-x86-hvm-Fix-the-handling-of-non-present-segments.patch - bsc#1009103 - VUL-0: CVE-2016-9382: XSA-192: xen: x86 task switch to VM86 mode mis-handled 58343df8-x86-HVM-dont-load-LDTR-with-VM86-mode-attrs-during-task-switch.patch - bsc#1009104 - VUL-0: CVE-2016-9385: XSA-193: xen: x86 segment base write emulation lacking canonical address checks 58343e24-x86-PV-writes-of-fs-and-gs-base-MSRs-require-canonical-addresses.patch - bsc#1009105 - VUL-0: CVE-2016-9384: XSA-194: xen: guest 32-bit ELF symbol table load leaking host data 58343e9e-libelf-fix-stack-memory-leak-when-loading-32-bit-symbol-tables.patch - bsc#1009107 - VUL-0: CVE-2016-9383: XSA-195: xen: x86 64-bit bit test instruction emulation broken 58343ec2-x86emul-fix-huge-bit-offset-handling.patch - bsc#1009108 - VUL-0: CVE-2016-9377,CVE-2016-9378: XSA-196: xen: x86 software interrupt injection mis-handled 58343f29-x86-emul-correct-the-IDT-entry-calculation-in-inject_swint.patch 58343f44-x86-svm-fix-injection-of-software-interrupts.patch - bsc#1009109 - VUL-0: CVE-2016-9381: XSA-197: xen: qemu incautious about shared ring processing CVE-2016-9381-xsa197-qemut.patch - bsc#1009111 - VUL-0: CVE-2016-9379,CVE-2016-9380: XSA-198: xen: delimiter injection vulnerabilities in pygrub 58343f79-pygrub-Properly-quote-results-when-returning-them-to-the-caller.patch - Upstream patches from Jan 581b2c3b-x86-emul-reject-LGDT-LIDT-with-non-canonical-addresses.patch 581b647a-x86emul-L-S-G-I-DT-ignore-opsz-overrides-in-64-bit-mode.patch 58249392-x86-svm-dont-clobber-eax-edx-if-RDMSR-intercept-fails.patch 582c35d6-x86-vmx-correct-long-mode-check-in-vmx_cpuid_intercept.patch 582c35ee-x86-traps-dont-call-hvm_hypervisor_cpuid_leaf-for-PV.patch- Update to Xen Version 4.7.1 xen-4.7.1-testing-src.tar.bz2 - Dropped patches contained in new tarball xen-4.7.0-testing-src.tar.bz2 575e9ca0-nested-vmx-Validate-host-VMX-MSRs-before-accessing-them.patch 57640448-xen-sched-use-default-scheduler-upon-an-invalid-sched.patch 57973099-have-schedulers-revise-initial-placement.patch 579730e6-remove-buggy-initial-placement-algorithm.patch 57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch 57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch 57ac6316-don-t-restrict-DMA-heap-to-node-0.patch 57b71fc5-x86-EFI-don-t-apply-relocations-to-l-2-3-_bootmap.patch 57b7447b-dont-permit-guest-to-populate-PoD-pages-for-itself.patch 57c4412b-x86-HVM-add-guarding-logic-for-VMX-specific-code.patch 57c57f73-libxc-correct-max_pfn-calculation-for-saving-domain.patch 57c805bf-x86-levelling-restrict-non-architectural-OSXSAVE-handling.patch 57c805c1-x86-levelling-pass-vcpu-to-ctxt_switch_levelling.patch 57c805c3-x86-levelling-provide-architectural-OSXSAVE-handling.patch 57c82be2-x86-32on64-adjust-call-gate-emulation.patch 57c93e52-fix-error-in-libxl_device_usbdev_list.patch 57c96df3-credit1-fix-a-race-when-picking-initial-pCPU.patch 57c96e2c-x86-correct-PT_NOTE-file-position.patch 57cfed43-VMX-correct-feature-checks-for-MPX-and-XSAVES.patch 57d1563d-x86-32on64-don-t-allow-recursive-page-tables-from-L3.patch 57d15679-x86-emulate-Correct-boundary-interactions-of-emulated-insns.patch 57d1569a-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch 57d18642-hvm-fep-Allow-test-insns-crossing-1-0-boundary.patch 57d18642-x86-segment-Bounds-check-accesses-to-emulation-ctxt-seg_reg.patch 57d7ca5f-x86-domctl-fix-TOCTOU-race-in-XEN_DOMCTL_getvcpuextstate.patch 57d7ca64-x86-domctl-fix-migration-of-guests-not-using-xsave.patch 57da8883-credit1-fix-mask-to-be-used-for-tickling.patch 57da8883-credit2-properly-schedule-migration-of-running-vcpu.patch 57dfb1c5-x86-Intel-hide-CPUID-faulting-capability-from-guests.patch 57e93e1d-x86emul-correct-loading-of-ss.patch 57e93e4a-x86emul-don-t-allow-null-selector-for-LTR.patch 57e93e89-x86-AMD-apply-erratum-665-workaround.patch 57ee6cbc-credit1-return-time-remaining-to-limit-as-next-timeslice.patch 57f3a8ee-x86emul-honor-guest-CR0-TS-and-CR0-EM.patch 57fb6a91-x86-defer-not-present-segment-checks.patch 5800c51d-x86-hvm-Clobber-cs-L-when-LME-becomes-set.patch 5800caec-x86emul-fix-pushing-of-selector-registers.patch 5800cb06-x86-Viridian-don-t-depend-on-undefined-register-state.patch 580e29f9-x86-MISALIGNSSE-feature-depends-on-SSE.patch 57dfb2ff-x86-Intel-Broadwell-no-PKG_C8-10_RESIDENCY-MSRs.patch- bsc#1004981 - Xen RPM doesn't contain debug hypervisor for EFI systems xen.spec- bsc#1000106 - VUL-0: CVE-2016-7777: xen: CR0.TS and CR0.EM not always honored for x86 HVM guests (XSA-190) 57f3a8ee-x86emul-honor-guest-CR0-TS-and-CR0-EM.patch - bsc#996191 - [XEN][acpi]residency -n 88 -c will cause xen panic on broadwell-ep 57dfb2ff-x86-Intel-Broadwell-no-PKG_C8-10_RESIDENCY-MSRs.patch - Upstream patches from Jan 57d7ca5f-x86-domctl-fix-TOCTOU-race-in-XEN_DOMCTL_getvcpuextstate.patch 57d7ca64-x86-domctl-fix-migration-of-guests-not-using-xsave.patch 57da8883-credit1-fix-mask-to-be-used-for-tickling.patch 57da8883-credit2-properly-schedule-migration-of-running-vcpu.patch 57dfb1c5-x86-Intel-hide-CPUID-faulting-capability-from-guests.patch 57e93e1d-x86emul-correct-loading-of-ss.patch 57e93e4a-x86emul-don-t-allow-null-selector-for-LTR.patch 57e93e89-x86-AMD-apply-erratum-665-workaround.patch 57ee6cbc-credit1-return-time-remaining-to-limit-as-next-timeslice.patch 57fb6a91-x86-defer-not-present-segment-checks.patch 5800c51d-x86-hvm-Clobber-cs-L-when-LME-becomes-set.patch 5800caec-x86emul-fix-pushing-of-selector-registers.patch 5800cb06-x86-Viridian-don-t-depend-on-undefined-register-state.patch 580e29f9-x86-MISALIGNSSE-feature-depends-on-SSE.patch 5810a9cc-x86-emul-Correct-decoding-of-SReg3-operands.patch- bsc#1007941 - Xen tools limit the number of vcpus to 256 when the system has 384 xen-arch-kconfig-nr_cpus.patch- bsc#1007157 - VUL-0: CVE-2016-8910: xen: net: rtl8139: infinite loop while transmit in C+ mode CVE-2016-8910-qemut-net-rtl8139-infinite-loop-while-transmit-in-Cplus-mode.patch- bsc#1005004 - CVE-2016-8667: xen: dma: rc4030 divide by zero error in set_next_tick CVE-2016-8667-qemut-dma-rc4030-divide-by-zero-error-in-set_next_tick.patch - bsc#1005005 - VUL-0: CVE-2016-8669: xen: char: divide by zero error in serial_update_parameters CVE-2016-8669-qemut-char-divide-by-zero-error-in-serial_update_parameters.patch- bsc#1003030 - VUL-0: CVE-2016-7908: xen: net: Infinite loop in mcf_fec_do_tx CVE-2016-7908-qemut-net-Infinite-loop-in-mcf_fec_do_tx.patch - bsc#1003032 - VUL-0: CVE-2016-7909: xen: net: pcnet: infinite loop in pcnet_rdra_addr CVE-2016-7909-qemut-net-pcnet-infinite-loop-in-pcnet_rdra_addr.patch- bsc#995785 - VUL-0: CVE-2016-7092: xen: x86: Disallow L3 recursive pagetable for 32-bit PV guests (XSA-185) 57d1563d-x86-32on64-don-t-allow-recursive-page-tables-from-L3.patch - bsc#995789 - VUL-0: CVE-2016-7093: xen: x86: Mishandling of instruction pointer truncation during emulation (XSA-186) 57d15679-x86-emulate-Correct-boundary-interactions-of-emulated-insns.patch 57d18642-hvm-fep-Allow-test-insns-crossing-1-0-boundary.patch - bsc#995792 - VUL-0: CVE-2016-7094: xen: x86 HVM: Overflow of sh_ctxt->seg_reg[] (XSA-187) 57d1569a-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch 57d18642-x86-segment-Bounds-check-accesses-to-emulation-ctxt-seg_reg.patch - bsc#991934 - xen hypervisor crash in csched_acct 57c96df3-credit1-fix-a-race-when-picking-initial-pCPU.patch - Upstream patches from Jan 57c4412b-x86-HVM-add-guarding-logic-for-VMX-specific-code.patch 57c57f73-libxc-correct-max_pfn-calculation-for-saving-domain.patch 57c805bf-x86-levelling-restrict-non-architectural-OSXSAVE-handling.patch 57c805c1-x86-levelling-pass-vcpu-to-ctxt_switch_levelling.patch 57c805c3-x86-levelling-provide-architectural-OSXSAVE-handling.patch 57c82be2-x86-32on64-adjust-call-gate-emulation.patch 57c96e2c-x86-correct-PT_NOTE-file-position.patch 57cfed43-VMX-correct-feature-checks-for-MPX-and-XSAVES.patch- bsc#979002 - add 60-persistent-xvd.rules and helper script also to initrd, add the relevant dracut helper- bnc#953518 - unplug also SCSI disks in qemu-xen-traditional for upstream unplug protocol- bsc#989679 - [pvusb feature] USB device not found when 'virsh detach-device guest usb.xml' 57c93e52-fix-error-in-libxl_device_usbdev_list.patch- bsc#992224 - [HPS Bug] During boot of Xen Hypervisor, Failed to get contiguous memory for DMA from Xen 57ac6316-don-t-restrict-DMA-heap-to-node-0.patch - bsc#978755 - xen uefi systems fail to boot - bsc#983697 - SLES12 SP2 Xen UEFI mode cannot boot 57b71fc5-x86-EFI-don-t-apply-relocations-to-l-2-3-_bootmap.patch - Upstream patch from Jan 57b7447b-dont-permit-guest-to-populate-PoD-pages-for-itself.patch- spec: to stay compatible with the in-tree qemu-xen binary, use /usr/bin/qemu-system-i386 instead of /usr/bin/qemu-system-x86_64 bsc#986164- bsc#970135 - new virtualization project clock test randomly fails on Xen 576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 5769106e-x86-generate-assembler-equates-for-synthesized.patch 57a1e603-x86-time-adjust-local-system-time-initialization.patch 57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch - bsc#991934 - xen hypervisor crash in csched_acct 57973099-have-schedulers-revise-initial-placement.patch 579730e6-remove-buggy-initial-placement-algorithm.patch - bsc#988675 - VUL-0: CVE-2016-6258: xen: x86: Privilege escalation in PV guests (XSA-182) 57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch - bsc#988676 - VUL-0: CVE-2016-6259: xen: x86: Missing SMAP whitelisting in 32-bit exception / event delivery (XSA-183) 57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch - Upstream patches from Jan 57a30261-x86-support-newer-Intel-CPU-models.patch- bsc#985503 - vif-route broken vif-route.patch- bsc#978413 - PV guest upgrade from sles11sp4 to sles12sp2 alpha3 failed on sles11sp4 xen host. pygrub-handle-one-line-menu-entries.patch- bsc#990843 - VUL-1: CVE-2016-6351: xen: qemu: scsi: esp: OOB write access in esp_do_dma CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch- bsc#900418 - Dump cannot be performed on SLES12 XEN 57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch - Upstream patches from Jan 575e9ca0-nested-vmx-Validate-host-VMX-MSRs-before-accessing-them.patch 57640448-xen-sched-use-default-scheduler-upon-an-invalid-sched.patch- fate#319989 - Update to Xen 4.7 FCS xen-4.7.0-testing-src.tar.bz2 - Drop CVE-2014-3672-qemut-xsa180.patch- bsc#954872 - script block-dmmd not working as expected - libxl: error: libxl_dm.c (Additional fixes) block-dmmd- Convert with_stubdom into build_conditional to allow adjusting via prjconf - Convert with_debug into build_conditional to allow adjusting via prjconf- bsc#979002 - add 60-persistent-xvd.rules and helper script to xen-tools-domU to simplify transition to pvops based kernels- Convert with_oxenstored into build_conditional to allow adjusting via prjconf (fate#320836)- bsc#983984 - VUL-0: CVE-2016-5338: xen: qemu: scsi: esp: OOB r/w access while processing ESP_FIFO CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch - bsc#982960 - VUL-0: CVE-2016-5238: xen: qemu: scsi: esp: OOB write when using non-DMA mode in get_cmd CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch- fate#319989 - Update to Xen 4.7 RC5 xen-4.7.0-testing-src.tar.bz2- fate#319989 - Update to Xen 4.7 RC4 xen-4.7.0-testing-src.tar.bz2 - Dropped xen.pkgconfig-4.7.patch xsa164.patch- bsc#981264 - VUL-0: CVE-2014-3672: xen: Unrestricted qemu logging (XSA-180) CVE-2014-3672-qemut-xsa180.patch- bsc#980724 - VUL-0: CVE-2016-4441: Qemu: scsi: esp: OOB write while writing to 's->cmdbuf' in get_cmd CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch - bsc#980716 - VUL-0: CVE-2016-4439: xen: scsi: esp: OOB write while writing to 's->cmdbuf' in esp_reg_write CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch- fate#319989 - Update to Xen 4.7 RC3 xen-4.7.0-testing-src.tar.bz2 - Dropped libxl-remove-cdrom-cachemode.patch x86-PoD-only-reclaim-if-needed.patch gcc6-warnings-as-errors.patch- bsc#954872 - script block-dmmd not working as expected - libxl: error: libxl_dm.c (another modification) block-dmmd- fate#319989 - Update to Xen 4.7 RC2 xen-4.7.0-testing-src.tar.bz2- bsc#961600 - L3: poor performance when Xen HVM domU configured with max memory > current memory x86-PoD-only-reclaim-if-needed.patch- Mark SONAMEs and pkgconfig as xen 4.7 xen.pkgconfig-4.7.patch- bsc#977329 - Xen: Cannot boot HVM guests with empty cdrom libxl-remove-cdrom-cachemode.patch- fate#319989 - Update to Xen 4.7 RC1 xen-4.7.0-testing-src.tar.bz2- fate#316614: set migration constraints from cmdline restore libxl.set-migration-constraints-from-cmdline.patch- Remove obsolete patch for xen-kmp magic_ioport_compat.patch- fate#316613: update to v12 libxl.pvscsi.patch- Update to the latest Xen 4.7 pre-release c2994f86 Drop libxl.migrate-legacy-stream-read.patch- bnc#972756 - Can't migrate HVM guest from SLES12SP1 Xen host to SLES12SP2 Alpha 1 host using xl migrate libxl.migrate-legacy-stream-read.patch- Add patches from proposed upstream series to load BIOS's from the toolstack instead of embedding in hvmloader http://lists.xenproject.org/archives/html/xen-devel/2016-03/msg01626.html 0001-libxc-Rework-extra-module-initialisation.patch, 0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch, 0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch, 0004-firmware-makefile-install-BIOS-blob.patch, 0005-libxl-Load-guest-BIOS-from-file.patch, 0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch, 0007-hvmloader-Grab-the-hvm_start_info-pointer.patch, 0008-hvmloader-Locate-the-BIOS-blob.patch, 0009-hvmloader-Check-modules-whereabouts-in-perform_tests.patch, 0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch, 0011-hvmloader-Load-OVMF-from-modules.patch, 0012-hvmloader-Specific-bios_load-function-required.patch, 0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch, 0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch - Enable support for UEFI on x86_64 using the ovmf-x86_64-ms.bin firmware from qemu-ovmf-x86_64. The firmware is preloaded with Microsoft keys to more closely resemble firmware on real hardware FATE#320490- fate#319989: Update to Xen 4.7 (pre-release) xen-4.7.0-testing-src.tar.bz2 - Dropped: xen-4.6.1-testing-src.tar.bz2 55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch 5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch hotplug-Linux-block-performance-fix.patch set-mtu-from-bridge-for-tap-interface.patch xendomains-libvirtd-conflict.patch xsa154.patch xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa170.patch- Use system SeaBIOS instead of building/installing another one FATE#320638 Dropped files: seabios-dir-remote.tar.bz2 xen-c99-fix.patch xen.build-compare.seabios.patch- spec: drop BuildRequires that were only needed for qemu-xen- bsc#969377 - xen does not build with GCC 6 ipxe-use-rpm-opt-flags.patch gcc6-warnings-as-errors.patch- bsc#969351 - VUL-0: CVE-2016-2841: xen: net: ne2000: infinite loop in ne2000_receive CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch - Drop xsa154-fix.patch- Use system qemu instead of building/installing yet another qemu FATE#320638 - Dropped files qemu-xen-dir-remote.tar.bz2 CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch CVE-2015-4037-qemuu-smb-config-dir-name.patch CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch qemu-xen-enable-spice-support.patch qemu-xen-upstream-qdisk-cache-unsafe.patch tigervnc-long-press.patch xsa162-qemuu.patch- bsc#962321 - VUL-0: CVE-2016-1922: xen: i386: null pointer dereference in vapic_write() CVE-2016-1922-qemuu-i386-null-pointer-dereference-in-vapic_write.patch- bsc#968004 - VUL-0: CVE-2016-2538: xen: usb: integer overflow in remote NDIS control message handling CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch- bsc#954872 - L3: script block-dmmd not working as expected - libxl: error: libxl_dm.c block-dmmd - Update libxl to recognize dmmd and npiv prefix in disk spec xen.libxl.dmmd.patch- bsc#967101 - VUL-0: CVE-2016-2391: xen: usb: multiple eof_timers in ohci module leads to null pointer dereference CVE-2016-2391-qemuu-usb-null-pointer-dereference-in-ohci-module.patch CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch - bsc#967090 - VUL-0: CVE-2016-2392: xen: usb: null pointer dereference in remote NDIS control message handling CVE-2016-2392-qemuu-usb-null-pointer-dereference-in-NDIS-message-handling.patch- Update to Xen Version 4.6.1 xen-4.6.1-testing-src.tar.bz2 - Dropped patches now contained in tarball or unnecessary xen-4.6.0-testing-src.tar.bz2 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 5632129c-free-domain-s-vcpu-array.patch 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 563212e4-xenoprof-free-domain-s-vcpu-array.patch 563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch 56549f24-x86-vPMU-document-as-unsupported.patch 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch xsa155-qemut-qdisk-double-access.patch xsa155-qemut-xenfb.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa159.patch xsa160.patch xsa162-qemut.patch xsa165.patch xsa166.patch xsa167.patch xsa168.patch- bsc#965315 - VUL-0: CVE-2016-2270: xen: x86: inconsistent cachability flags on guest mappings (XSA-154) xsa154.patch - bsc#965317 - VUL-0: CVE-2016-2271: xen: VMX: guest user mode may crash guest with non-canonical RIP (XSA-170) xsa170.patch- bsc#965269 - VUL-1: CVE-2015-8619: xen: stack based OOB write in hmp_sendkey routine CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch- bsc#965156 - VUL-0: CVE-2015-6855: xen: ide: divide by zero issue CVE-2015-6855-qemuu-ide-divide-by-zero-issue.patch - bsc#965112 - VUL-0: CVE-2014-3640: xen: slirp: NULL pointer deref in sosendto() CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch- bsc#964947 - VUL-0: CVE-2015-5278: xen: Infinite loop in ne2000_receive() function CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch - bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch- bsc#964644 - VUL-0: CVE-2013-4533: xen pxa2xx: buffer overrun on incoming migration CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch - bsc#964925 - VUL-0: CVE-2014-0222: xen: qcow1: validate L2 table size to avoid integer overflows CVE-2014-0222-blktap-qcow1-validate-l2-table-size.patch - Dropped CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch- bsc#964415 - VUL-1: CVE-2016-2198: xen: usb: ehci null pointer dereference in ehci_caps_write CVE-2016-2198-qemuu-usb-ehci-null-pointer-dereference-in-ehci_caps_write.patch - bsc#964452 - VUL-0: CVE-2013-4534: xen: openpic: buffer overrun on incoming migration CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch- bsc#963783 - VUL-1: CVE-2016-1981: xen: net: e1000 infinite loop in start_xmit and e1000_receive_iov routines CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch- bsc#962758 - VUL-0: CVE-2013-4539: xen: tsc210x: buffer overrun on invalid state load CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch- bsc#962632 - VUL-0: CVE-2015-1779: xen: vnc: insufficient resource limiting in VNC websockets decoder CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch - bsc#962642 - VUL-0: CVE-2013-4537: xen: ssi-sd: buffer overrun on invalid state load CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch - bsc#962627 - VUL-0: CVE-2014-7815: xen: vnc: insufficient bits_per_pixel from the client sanitization CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch- bsc#962335 - VUL-0: CVE-2013-4538: xen: ssd0323: fix buffer overun on invalid state CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch - bsc#962360 - VUL-0: CVE-2015-7512: xen: net: pcnet: buffer overflow in non-loopback mode CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch- bsc#961692 - VUL-0: CVE-2016-1714: xen: nvram: OOB r/w access in processing firmware configurations CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch- bsc#961358 - VUL-0: CVE-2015-8613: xen: qemu: scsi: stack based buffer overflow in megasas_ctrl_get_info CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch - bsc#961332 - VUL-0: CVE-2016-1568: xen: Qemu: ide: ahci use-after-free vulnerability in aio port commands CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch- bsc#959695 - missing docs for xen xen.spec- bsc#960862 - VUL-0: CVE-2016-1571: xen: VMX: intercept issue with INVLPG on non-canonical address (XSA-168) xsa168.patch - bsc#960861 - VUL-0: CVE-2016-1570: xen: PV superpage functionality missing sanity checks (XSA-167) xsa167.patch - bsc#960836 - VUL-0: CVE-2015-8744: xen: net: vmxnet3: incorrect l2 header validation leads to a crash via assert(2) call CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch- bsc#960707 - VUL-0: CVE-2015-8745: xen: reading IMR registers leads to a crash via assert(2) call CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch - bsc#960726 - VUL-0: CVE-2015-8743: xen: ne2000: OOB memory access in ioport r/w functions CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch- bsc#960093 - VUL-0: CVE-2015-8615: xen: x86: unintentional logging upon guest changing callback method (XSA-169) 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch- Adjust xen-dom0-modules.service to run Before xenstored.service instead of proc-xen.mount to workaround a bug in systemd "design" (bnc#959845)- bsc#959387 - VUL-0: CVE-2015-8568 CVE-2015-8567: xen: qemu: net: vmxnet3: host memory leakage CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch- bsc#957988 - VUL-0: CVE-2015-8550: xen: paravirtualized drivers incautious about shared memory contents (XSA-155) xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemut-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa155-qemut-xenfb.patch - bsc#959006 - VUL-0: CVE-2015-8558: xen: qemu: usb: infinite loop in ehci_advance_state results in DoS CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch - bsc#958918 - VUL-0: CVE-2015-7549: xen: qemu pci: null pointer dereference issue CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch - bsc#958493 - VUL-0: CVE-2015-8504: xen: qemu: ui: vnc: avoid floating point exception CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch - bsc#958007 - VUL-0: CVE-2015-8554: xen: qemu-dm buffer overrun in MSI-X handling (XSA-164) xsa164.patch - bsc#958009 - VUL-0: CVE-2015-8555: xen: information leak in legacy x86 FPU/XMM initialization (XSA-165) xsa165.patch - bsc#958523 - VUL-0: xen: ioreq handling possibly susceptible to multiple read issue (XSA-166) xsa166.patch- bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch - Upstream patches from Jan 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch) 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 56544a57-VMX-fix-adjust-trap-injection.patch 56546ab2-sched-fix-insert_vcpu-locking.patch- bsc#956592 - VUL-0: xen: virtual PMU is unsupported (XSA-163) 56549f24-x86-vPMU-document-as-unsupported.patch - bsc#956408 - VUL-0: CVE-2015-8339, CVE-2015-8340: xen: XENMEM_exchange error handling issues (XSA-159) xsa159.patch - bsc#956409 - VUL-0: CVE-2015-8341: xen: libxl leak of pv kernel and initrd on error (XSA-160) xsa160.patch - bsc#956411 - VUL-0: CVE-2015-7504: xen: heap buffer overflow vulnerability in pcnet emulator (XSA-162) xsa162-qemuu.patch xsa162-qemut.patch - bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142) 5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch- fate#315712: XEN: Use the PVOPS kernel Turn off building the KMPs now that we are using the pvops kernel xen.spec- Upstream patches from Jan 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 5632129c-free-domain-s-vcpu-array.patch (Replaces CVE-2015-7969-xsa149.patch) 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 563212e4-xenoprof-free-domain-s-vcpu-array.patch 563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch) 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch - Dropped 55b0a2db-x86-MSI-track-guest-masking.patch- Use upstream variants of block-iscsi and block-nbd- Remove xenalyze.hg, its part of xen-4.6- Update to Xen Version 4.6.0 xen-4.6.0-testing-src.tar.bz2 mini-os.tar.bz2 blktap2-no-uninit.patch stubdom-have-iovec.patch - Renamed xsa149.patch to CVE-2015-7969-xsa149.patch - Dropped patches now contained in tarball or unnecessary xen-4.5.2-testing-src.tar.bz2 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch 54f4985f-libxl-fix-libvirtd-double-free.patch 55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 551ac326-xentop-add-support-for-qdisk.patch 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch 5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 554cc211-libxl-add-qxl.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch 5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch 5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch 5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch 5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch 5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch 5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch 55b0a218-x86-PCI-CFG-write-intercept.patch 55b0a255-x86-MSI-X-maskall.patch 55b0a283-x86-MSI-X-teardown.patch 55b0a2ab-x86-MSI-X-enable.patch blktapctrl-close-fifos.patch blktapctrl-default-to-ioemu.patch blktapctrl-disable-debug-printf.patch blktap-no-uninit.patch blktap-pv-cdrom.patch build-tapdisk-ioemu.patch ioemu-bdrv-open-CACHE_WB.patch ioemu-blktap-barriers.patch ioemu-blktap-fv-init.patch ioemu-blktap-image-format.patch ioemu-blktap-zero-size.patch libxl.set-migration-constraints-from-cmdline.patch local_attach_support_for_phy.patch pci-attach-fix.patch qemu-xen-upstream-megasas-buildtime.patch tapdisk-ioemu-logfile.patch tapdisk-ioemu-shutdown-fix.patch udev-rules.patch xen.build-compare.ipxe.patch xen.build-compare.mini-os.patch xen.build-compare.smbiosdate.patch xen.build-compare.vgabios.patch xen.build-compare.xen_compile_h.patch xl-coredump-file-location.patch- bsc#954405 - VUL-0: CVE-2015-8104: Xen: guest to host DoS by triggering an infinite loop in microcode via #DB exception - bsc#954018 - VUL-0: CVE-2015-5307: xen: x86: CPU lockup during fault delivery (XSA-156) CVE-2015-5307-xsa156.patch- Update to Xen 4.5.2 xen-4.5.2-testing-src.tar.bz2 - Drop the following xen-4.5.1-testing-src.tar.bz2 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 559bdde5-pull-in-latest-linux-earlycpio.patch 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch 560bd926-credit1-fix-tickling-when-it-happens-from-a-remote-pCPU.patch 560e6d34-x86-p2m-pt-tighten-conditions-of-IOMMU-mapping-updates.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch CVE-2015-4106-xsa131-9.patch CVE-2015-3259-xsa137.patch CVE-2015-7311-xsa142.patch CVE-2015-7835-xsa148.patch xsa139-qemuu.patch xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch xsa151.patch xsa152.patch xsa153-libxl.patch CVE-2015-5154-qemuu-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemuu-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch"- bsc#950704 - CVE-2015-7970 VUL-1: xen: x86: Long latency populate-on-demand operation is not preemptible (XSA-150) 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch- Upstream patches from Jan 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch- bsc#951845 - VUL-0: CVE-2015-7972: xen: x86: populate-on-demand balloon size inaccuracy can crash guests (XSA-153) xsa153-libxl.patch- bsc#950703 - VUL-1: CVE-2015-7969: xen: leak of main per-domain vcpu pointer array (DoS) (XSA-149) xsa149.patch - bsc#950705 - VUL-1: CVE-2015-7969: xen: x86: leak of per-domain profiling-related vcpu pointer array (DoS) (XSA-151) xsa151.patch - bsc#950706 - VUL-0: CVE-2015-7971: xen: x86: some pmu and profiling hypercalls log without rate limiting (XSA-152) xsa152.patch - Dropped 55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch 5604f239-x86-PV-properly-populate-descriptor-tables.patch- bsc#932267 - VUL-1: CVE-2015-4037: qemu,kvm,xen: insecure temporary file use in /net/slirp.c CVE-2015-4037-qemuu-smb-config-dir-name.patch CVE-2015-4037-qemut-smb-config-dir-name.patch - bsc#877642 - VUL-0: CVE-2014-0222: qemu: qcow1: validate L2 table size to avoid integer overflows CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch- bsc#950367 - VUL-0: CVE-2015-7835: xen: x86: Uncontrolled creation of large page mappings by PV guests (XSA-148) CVE-2015-7835-xsa148.patch- bsc#949138 - Setting vcpu affinity under Xen causes libvirtd abort 54f4985f-libxl-fix-libvirtd-double-free.patch- bsc#949046 - Increase %suse_version in SP1 to 1316 xen.spec - Update README.SUSE detailing dom0 ballooning recommendations- bsc#945167 - Running command ’ xl pci-assignable-add 03:10.1’ secondly show errors 55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch - Upstream patches from Jan 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f239-x86-PV-properly-populate-descriptor-tables.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch 560bd926-credit1-fix-tickling-when-it-happens-from-a-remote-pCPU.patch 560e6d34-x86-p2m-pt-tighten-conditions-of-IOMMU-mapping-updates.patch- bsc#941074 - VmError: Device 51728 (vbd) could not be connected. Hotplug scripts not working. hotplug-Linux-block-performance-fix.patch- bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142) CVE-2015-7311-xsa142.patch- bsc#945165 - Xl pci-attach show error with kernel of SLES 12 sp1 pci-attach-fix.patch- bsc#945164 - Xl destroy show error with kernel of SLES 12 sp1 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch- Upstream patches from Jan 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch- bsc#944463 - VUL-0: CVE-2015-5239: qemu-kvm: Integer overflow in vnc_client_read() and protocol_client_msg() CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch - bsc#944697 - VUL-1: CVE-2015-6815: qemu: net: e1000: infinite loop issue CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch- bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch- bsc#907514 - Bus fatal error & sles12 sudden reboot has been observed - bsc#910258 - SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984 - Bus fatal error & sles11-SP4 sudden reboot has been observed - bsc#923967 - Partner-L3: Bus fatal error & sles11-SP3 sudden reboot has been observed 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 55b0a218-x86-PCI-CFG-write-intercept.patch 55b0a255-x86-MSI-X-maskall.patch 55b0a283-x86-MSI-X-teardown.patch 55b0a2ab-x86-MSI-X-enable.patch 55b0a2db-x86-MSI-track-guest-masking.patch - Upstream patches from Jan 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch - Dropped for upstream version x86-MSI-mask.patch x86-MSI-pv-unmask.patch x86-MSI-X-enable.patch x86-MSI-X-maskall.patch x86-MSI-X-teardown.patch x86-pci_cfg_okay.patch x86-PCI-CFG-write-intercept.patch- bsc#939712 - VUL-0: XSA-140: QEMU leak of uninitialized heap memory in rtl8139 device model xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch - bsc#939709 - VUL-0: XSA-139: xen: Use after free in QEMU/Xen block unplug protocol xsa139-qemuu.patch- bsc#937371 - xen vm's running after reboot xendomains-libvirtd-conflict.patch- bsc#938344 - VUL-0: CVE-2015-5154: qemu,kvm,xen: host code execution via IDE subsystem CD-ROM CVE-2015-5154-qemuu-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemuu-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch- Remove xendomains.service from systemd preset file because it conflicts with libvirt-guests.service (bnc#937371) Its up to the admin to run systemctl enable xendomains.service- bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow CVE-2015-3259-xsa137.patch - Upstream patches from Jan 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bdde5-pull-in-latest-linux-earlycpio.patch - Upstream patches from Jan pending review 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch 5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch 5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch 5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch 5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch 5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch x86-MSI-pv-unmask.patch x86-pci_cfg_okay.patch x86-PCI-CFG-write-intercept.patch x86-MSI-X-maskall.patch x86-MSI-X-teardown.patch x86-MSI-X-enable.patch x86-MSI-mask.patch- Adjust more places to use br0 instead of xenbr0- bnc#936516 - xen fails to build with kernel update(4.1.0 from stable) 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch- Update to Xen Version 4.5.1 FCS (fate#315675) xen-4.5.1-testing-src.tar.bz2 - Dropped patches now contained in tarball 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch qemu-MSI-X-enable-maskall.patch qemu-MSI-X-latch-writes.patch x86-MSI-X-guest-mask.patch- Replace 5124efbe-add-qxl-support.patch with the variant that finally made it upstream, 554cc211-libxl-add-qxl.patch- bsc#931627 - VUL-0: CVE-2015-4105: XSA-130: xen: Guest triggerable qemu MSI-X pass-through error messages qemu-MSI-X-latch-writes.patch - bsc#907514 - Bus fatal error & sles12 sudden reboot has been observed - bsc#910258 - SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984 - Bus fatal error & sles11-SP4 sudden reboot has been observed - bsc#923967 - Partner-L3: Bus fatal error & sles11-SP3 sudden reboot has been observed x86-MSI-X-teardown.patch x86-MSI-X-enable.patch x86-MSI-X-guest-mask.patch x86-MSI-X-maskall.patch qemu-MSI-X-enable-maskall.patch - Upstream patches from Jan 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch - Dropped the following patches now contained in the tarball xen-no-array-bounds.patch CVE-2015-4103-xsa128.patch CVE-2015-4104-xsa129.patch CVE-2015-4105-xsa130.patch CVE-2015-4106-xsa131-1.patch CVE-2015-4106-xsa131-2.patch CVE-2015-4106-xsa131-3.patch CVE-2015-4106-xsa131-4.patch CVE-2015-4106-xsa131-5.patch CVE-2015-4106-xsa131-6.patch CVE-2015-4106-xsa131-7.patch CVE-2015-4106-xsa131-8.patch- Update to Xen 4.5.1 RC2 - bsc#931628 - VUL-0: CVE-2015-4106: XSA-131: xen: Unmediated PCI register access in qemu CVE-2015-4106-xsa131-1.patch CVE-2015-4106-xsa131-2.patch CVE-2015-4106-xsa131-3.patch CVE-2015-4106-xsa131-4.patch CVE-2015-4106-xsa131-5.patch CVE-2015-4106-xsa131-6.patch CVE-2015-4106-xsa131-7.patch CVE-2015-4106-xsa131-8.patch CVE-2015-4106-xsa131-9.patch - bsc#931627 - VUL-0: CVE-2015-4105: XSA-130: xen: Guest triggerable qemu MSI-X pass-through error messages CVE-2015-4105-xsa130.patch - bsc#931626 - VUL-0: CVE-2015-4104: XSA-129: xen: PCI MSI mask bits inadvertently exposed to guests CVE-2015-4104-xsa129.patch - bsc#931625 - VUL-0: CVE-2015-4103: XSA-128: xen: Potential unintended writes to host MSI message data field via qemu CVE-2015-4103-xsa128.patch - Upstream patches from Jan 5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch- Add DefaultDependencies=no to xen-dom0-modules.service because it has to run before proc-xen.mount- Update to Xen 4.5.1 RC1- Update blktap-no-uninit.patch to work with gcc-4.5- bsc#927967 - VUL-0: CVE-2015-3340: xen: Information leak through XEN_DOMCTL_gettscinfo (XSA-132) 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch- bnc#929339 - VUL-0: CVE-2015-3456: qemu kvm xen: VENOM qemu floppy driver host code execution CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch- bsc#928783 - Reboot failure; Request backport of upstream Xen patch to 4.5.0, or update pkgs to 4.5.1 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch- bnc#927750 - Avoid errors reported by system-modules-load.service- Add xen-no-array-bounds.patch and blktap-no-uninit.patch to selectively turn errors back to warnings to fix build with GCC 5. - Amend xen.stubdom.newlib.patch to pull in declaration of strcmp to avoid implicit-fortify-decl rpmlint error. - Fix quoting of __SMBIOS_DATE__ in xen.build-compare.smbiosdate.patch.- xentop: Fix memory leak on read failure 551ac326-xentop-add-support-for-qdisk.patch- Dropped xentop-add-support-for-qdisk.patch in favor of upstream version 551ac326-xentop-add-support-for-qdisk.patch- Enable spice support in qemu for x86_64 5124efbe-add-qxl-support.patch qemu-xen-enable-spice-support.patch- Add xen-c99-fix.patch to remove pointless inline specifier on function declarations which break build with a C99 compiler which GCC 5 is by default. (bsc#921994) - Add ipxe-no-error-logical-not-parentheses.patch to supply - Wno-logical-not-parentheses to the ipxe build to fix breakage with GCC 5. (bsc#921994)- bnc#921842 - Xentop doesn't display disk statistics for VMs using qdisks xentop-add-support-for-qdisk.patch- Disable the PIE enablement done for Factory, as the XEN code is not buildable with PIE and it does not make much sense to build the hypervisor code with it.- bnc#918169 - XEN fixes required to work with Kernel 3.19.0 xen.spec- Package xen.changes because its referenced in xen.spec- Update seabios to rel-1.7.5 which is the correct version for Xen 4.5- Update to Xen 4.5.0 FCS- Include systemd presets in 13.2 and older- bnc#897352 - Enable xencommons/xendomains only during fresh install - disable restart on upgrade because the toolstack is not restartable- adjust seabios, vgabios, stubdom and hvmloader build to reduce build-compare noise xen.build-compare.mini-os.patch xen.build-compare.smbiosdate.patch xen.build-compare.ipxe.patch xen.build-compare.vgabios.patch xen.build-compare.seabios.patch xen.build-compare.man.patch- Update to Xen 4.5.0 RC4- Remove xend specific if-up scripts Recording bridge slaves is a generic task which should be handled by generic network code- Use systemd features from upstream requires updated systemd-presets-branding package- Update to Xen 4.5.0 RC3- Set GIT, WGET and FTP to /bin/false- Use new configure features instead of make variables xen.stubdom.newlib.patch- adjust docs and xen build to reduce build-compare noise xen.build-compare.doc_html.patch xen.build-compare.xen_compile_h.patch- Drop trailing B_CNT from XEN_EXTRAVERSION to reduce build-compare noise- Update to Xen 4.5.0 RC2- Update to Xen 4.5.0 RC1 xen-4.5.0-testing-src.tar.bz2 - Remove all patches now contained in the new tarball xen-4.4.1-testing-src.tar.bz2 5315a3bb-x86-don-t-propagate-acpi_skip_timer_override-do-Dom0.patch 5315a43a-x86-ACPI-also-print-address-space-for-PM1x-fields.patch 53299d8f-xenconsole-reset-tty-on-failure.patch 53299d8f-xenconsole-tolerate-tty-errors.patch 5346a7a0-x86-AMD-support-further-feature-masking-MSRs.patch 53563ea4-x86-MSI-drop-workaround-for-insecure-Dom0-kernels.patch 537c9c77-libxc-check-return-values-on-mmap-and-madvise.patch 537cd0b0-hvmloader-also-cover-PCI-MMIO-ranges-above-4G-with-UC-MTRR-ranges.patch 537cd0cc-hvmloader-PA-range-0xfc000000-0xffffffff-should-be-UC.patch 539ebe62-x86-EFI-improve-boot-time-diagnostics.patch 53aac342-x86-HVM-consolidate-and-sanitize-CR4-guest-reserved-bit-determination.patch 53c9151b-Fix-xl-vncviewer-accesses-port-0-by-any-invalid-domid.patch 53d124e7-fix-list_domain_details-check-config-data-length-0.patch 53dba447-x86-ACPI-allow-CMOS-RTC-use-even-when-ACPI-says-there-is-none.patch 53df727b-x86-HVM-extend-LAPIC-shortcuts-around-P2M-lookups.patch 53e8be5f-x86-vHPET-use-rwlock-instead-of-simple-one.patch 53f737b1-VMX-fix-DebugCtl-MSR-clearing.patch 53f7386d-x86-irq-process-softirqs-in-irq-keyhandlers.patch 53fcebab-xen-pass-kernel-initrd-to-qemu.patch 53ff3659-x86-consolidate-boolean-inputs-in-hvm-and-p2m.patch 53ff36ae-x86-hvm-treat-non-insn-fetch-NPF-also-as-read-violations.patch 53ff36d5-x86-mem_event-deliver-gla-fault-EPT-violation-information.patch 53ff3716-x86-ats-Disable-Address-Translation-Services-by-default.patch 53ff3899-x86-NMI-allow-processing-unknown-NMIs-with-watchdog.patch 54005472-EPT-utilize-GLA-GPA-translation-known-for-certain-faults.patch 540effe6-evtchn-check-control-block-exists-when-using-FIFO-based-events.patch 540f2624-x86-idle-add-barriers-to-CLFLUSH-workaround.patch 541825dc-VMX-don-t-leave-x2APIC-MSR-intercepts-disabled.patch 541ad385-x86-suppress-event-check-IPI-to-MWAITing-CPUs.patch 541ad3ca-x86-HVM-batch-vCPU-wakeups.patch 541ad81a-VT-d-suppress-UR-signaling-for-further-desktop-chipsets.patch 54216833-x86-shadow-fix-race-when-sampling-dirty-vram-state.patch 54216882-x86-emulate-check-cpl-for-all-privileged-instructions.patch 542168ae-x86emul-only-emulate-swint-injection-for-real-mode.patch 54228a37-x86-EFI-fix-freeing-of-uninitialized-pointer.patch 5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch 5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch 542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch 542bf997-x86-HVM-properly-bound-x2APIC-MSR-range.patch 54325cc0-x86-MSI-fix-MSI-X-case-of-freeing-IRQ.patch 54325d2f-x86-restore-reserving-of-IO-APIC-pages-in-XENMEM_machine_memory_map-output.patch 54325d95-don-t-allow-Dom0-access-to-IOMMUs-MMIO-pages.patch 54325ecc-AMD-guest_iommu-properly-disable-guest-iommu-support.patch 54325f3c-x86-paging-make-log-dirty-operations-preemptible.patch 54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch CVE-2013-4540-qemu.patch qemu-support-xen-hvm-direct-kernel-boot.patch qemu-xen-upstream-blkif-discard.patch change-vnc-passwd.patch libxc-pass-errno-to-callers-of-xc_domain_save.patch libxl.honor-more-top-level-vfb-options.patch libxl.add-option-for-discard-support-to-xl-disk-conf.patch libxl.introduce-an-option-to-disable-the-non-O_DIRECT-workaround.patch x86-dom-print.patch x86-extra-trap-info.patch tmp_build.patch xl-check-for-libvirt-managed-domain.patch disable-wget-check.patch - Xend/xm is no longer supported and is not part of the upstream code. Remove all xend/xm specific patches, configs, and scripts xen-xmexample.patch bridge-opensuse.patch xmexample.disks xmclone.sh init.xend xend-relocation.sh xend.service xend-relocation-server.fw domUloader.py xmexample.domUloader xmexample.disks bridge-vlan.patch bridge-bonding.patch bridge-record-creation.patch network-nat-open-SuSEfirewall2-FORWARD.patch xend-set-migration-constraints-from-cmdline.patch xen.migrate.tools-xend_move_assert_to_exception_block.patch xend-pvscsi-recognize-also-SCSI-CDROM-devices.patch xend-config.patch xend-max-free-mem.patch xend-hvm-default-pae.patch xend-vif-route-ifup.patch xend-xenapi-console-protocol.patch xend-core-dump-loc.patch xend-xen-api-auth.patch xend-checkpoint-rename.patch xend-xm-save-check-file.patch xend-xm-create-xflag.patch xend-domu-usb-controller.patch xend-devid-or-name.patch xend-migration-domname-fix.patch xend-del_usb_xend_entry.patch xend-xen-domUloader.patch xend-multi-xvdp.patch xend-check_device_status.patch xend-change_home_server.patch xend-minimum-restart-time.patch xend-disable-internal-logrotate.patch xend-config-enable-dump-comment.patch xend-tools-watchdog-support.patch xend-console-port-restore.patch xend-vcpu-affinity-fix.patch xend-migration-bridge-check.patch xend-managed-pci-device.patch xend-hvm-firmware-passthrough.patch xend-cpuinfo-model-name.patch xend-xm-reboot-fix.patch xend-domain-lock.patch xend-domain-lock-sfex.patch xend-32on64-extra-mem.patch xend-hv_extid_compatibility.patch xend-xenpaging.autostart.patch xend-remove-xm-deprecation-warning.patch libxen_permissive.patch tmp-initscript-modprobe.patch init.xendomains xendomains.service xen-watchdog.service xen-updown.sh- bnc#901317 - L3: increase limit domUloader to 32MB domUloader.py- bnc#898772 - SLES 12 RC3 - XEN Host crashes when assigning non-VF device (SR-IOV) to guest 54325cc0-x86-MSI-fix-MSI-X-case-of-freeing-IRQ.patch - bnc#882089 - Windows 2012 R2 fails to boot up with greater than 60 vcpus 54325ecc-AMD-guest_iommu-properly-disable-guest-iommu-support.patch - bnc#826717 - VUL-0: CVE-2013-3495: XSA-59: xen: Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts 541ad81a-VT-d-suppress-UR-signaling-for-further-desktop-chipsets.patch - Upstream patches from Jan 540effe6-evtchn-check-control-block-exists-when-using-FIFO-based-events.patch (Replaces xsa107.patch) 54216833-x86-shadow-fix-race-when-sampling-dirty-vram-state.patch (Replaces xsa104.patch) 54216882-x86-emulate-check-cpl-for-all-privileged-instructions.patch (Replaces xsa105.patch) 542168ae-x86emul-only-emulate-swint-injection-for-real-mode.patch (Replaces xsa106.patch) 54228a37-x86-EFI-fix-freeing-of-uninitialized-pointer.patch 5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch 5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch 542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch 542bf997-x86-HVM-properly-bound-x2APIC-MSR-range.patch (Replaces xsa108.patch) 54325d2f-x86-restore-reserving-of-IO-APIC-pages-in-XENMEM_machine_memory_map-output.patch 54325d95-don-t-allow-Dom0-access-to-IOMMUs-MMIO-pages.patch 54325f3c-x86-paging-make-log-dirty-operations-preemptible.patch (Replaces xsa97.patch) 54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGH3AKDM4.12.4_02-lp151.2.30.14.12.4_02-lp151.2.30.1  xenhtmlhypercallarmindex.htmlindex.htmlx86_32index.htmlx86_64index.htmlindex.htmlmanindex.htmlxen-pci-device-reservations.7.htmlxen-pv-channel.7.htmlxen-tscmode.7.htmlxen-vtpm.7.htmlxen-vtpmmgr.7.htmlxenstore-chmod.1.htmlxenstore-ls.1.htmlxenstore-read.1.htmlxenstore-write.1.htmlxenstore.1.htmlxentop.1.htmlxentrace.8.htmlxentrace_format.1.htmlxl-disk-configuration.5.htmlxl-network-configuration.5.htmlxl-numa-placement.7.htmlxl.1.htmlxl.cfg.5.htmlxl.conf.5.htmlxlcpupool.cfg.5.htmlmiscamd-ucode-container.txtarmbig.LITTLE.txtbooting.txtdevice-treeacpi.txtbooting.txtguest.txtindex.htmlpassthrough.txtearly-printk.txtindex.htmlpassthrough.txtsilicon-errata.txtblock-scripts.txtconsole.txtcrashdb.txtdistro_mapping.txtdump-core-format.txtgrant-tables.txtindex.htmlkconfig-language.txtkconfig.txtkexec_and_kdump.txtlibxl_memory.txtprintk-formats.txtqemu-backends.txtstubdom.txtvtd-pi.txtvtd.txtvtpm-platforms.txtxen-error-handling.txtxenmon.txtxenpaging.txtxenstore-ring.txtxenstore.txtxsm-flask.txtmisccrashdb.txtvtpm-platforms.txtxen-command-line.pandocxenpaging.txtxenstore-paths.pandoc/usr/share/doc/packages//usr/share/doc/packages/xen//usr/share/doc/packages/xen/html//usr/share/doc/packages/xen/html/hypercall//usr/share/doc/packages/xen/html/hypercall/arm//usr/share/doc/packages/xen/html/hypercall/x86_32//usr/share/doc/packages/xen/html/hypercall/x86_64//usr/share/doc/packages/xen/html/man//usr/share/doc/packages/xen/html/misc//usr/share/doc/packages/xen/html/misc/arm//usr/share/doc/packages/xen/html/misc/arm/device-tree//usr/share/doc/packages/xen/misc/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:15057/openSUSE_Leap_15.1_Update/e98eefa8fd56cdf0032f5ea851ca37bc-xen.openSUSE_Leap_15.1_Updatecpioxz5x86_64-suse-linuxdirectoryHTML document, ASCII textXML 1.0 document, ASCII text, with very long linesXML 1.0 document, ASCII textC source, ASCII textASCII textASCII text, with very long linesAlgol 68 source, ASCII textutf-8fb037579ad73da2e0a712d8861f3f4cd49b52a5681386c5d60585756cd03e34c?p7zXZ !t/,] crt:bLL 9;G<'Ŏ.OMR~y+r\_ 3Rf`Y2t -|Clx׏ՠ^ܮW囪o qIa1,˒,HS&:GJjO[w@Ҝ1jZ&1iM+lL"i_u"* \{Zi%gMH-OM*P% ,h`p?Wajn_Q9\#mZ/3y6Y^ ij y083&Q@ f8 ƭU!AULnZyմ9\C?gfp(\3Gjb]4l;2cz!VXYmx"P>;7[A^ѾD#:9g`S~Լ;>r^&/b`y8N|-:֍ t9',8Q#6QJE<暝 -)Ծ +h0xP5xjT  v/NB ;({GnئA1BRvV2krJi3dN9sb& U lpUHV{ 7\Rmݬ̍1ӳF?J> 4/[OeK~7u@q`*Ld-` w|t(@cZ,Z.Rx>je7v ʼn7<^l wJoBYa˦/ Zsjr WTB&upШ Ȣ }iVWn ne*`zȅh,f-ΨY<[qG,RU< oԠ6l*5Э oXY|\aRR%DEu)xǚ7zQP?[\eeޕhmoM~ȱ3 ~$~e %m;mKۃk^ $!U{^0!o+*[cCb LxܕM0Bg xad[Ahj$5dbiq;}Yŵ8S+_cUtDgʜ w΍qr3/i޴9,n!~,ZC ;ı3m<-\A>go ]$dX`RJ?5l!e 8ܥ{Y12\8R\~(z;jݕ,c>Px /JF4}V1+ VhQH6!2Kœ~BG0 4Z 9%ZפF' k!%8=<^22G5Vs@Aw6=sSes(pl&F|DAp"/tٴl/"7RkM016nO잟1ZPzDc5UTS+jd-Ɠ.1$<]fP(X^ODD0A`/~V-֫_nߌm|9'ɆO$3ST\>HQNxk&aV thi#ⶭu#ly&ɴ8q#^.vվ;Cl7ogEx9Е cTYQ[ \J^1Eyj-ƌQq"Nr3Nq${CG 6XeFv+޶ywyR_DꔋvK,lp)c2.7x%T܎A&& o>P⊎$|TWWyn+}5 pjPbVP2;[;M~0RWSn]0bW84w 7]0i/b#j>'s2 0AVg wZʶQ)gW֎'<;*%C\/7@W]`DRLgo5׿-]?Zdžp\;;h&'hAAɍt~MΛLbY*$'H 0 )cV4|idݿ!iu=4CC cK=Mk8aJ}LmGQ7&JA~x/џ?Z_3.g;0؆W<[L~(J ˸ez 9r0ٟWaq'4AN_(JV2UK?G`H38 K3[z_B ʨ{7G|=0(]6gt)U\,GF`5o -IDzK#-q ›]RXZ`ixw \Ak Pz+OS/H,)W"fC̿V?TRANEzvR3kWQ=<㽃 ]a^ Έ3xo³`U26yD_{\A87Lfz0C Nl=uҜ1d$]pC Psjh|oBEJi6r_] tkw3 LJ1GN Xe,;{6 #$˵e0ujy̓(SUV?Pwuy)Ӻov@I~57~\UpޏP) 3"Ƙ?g{X{Nc@Gb=τZ1幽]K\pI\;s>F/\񢅞Xm|_(; nMkL]3UFxˆ@@싱D+$ALy4B9MUF'=.˅~<ӑK$Fj 8LeGXw^"wՠnz=cf2c˟n^l63h^߬](WNb5c']9DHY@h xBKY3ūJ(DÃo$Uhnu;Pͺ<ܗ(8,c-QTU "A+NltX#Mp2K[,ML߸ڎv,.CmEk'?, is{as.L(X|'.M[r~2?Ԅ;JA X]MoKY YJFp<hs^&ѯX?%oWvHQ*o [rDvCB"zvkrC'U4݊."`c2S9l+{zm[!i"Dr%3 p (KK]0و2j5jT$Ql)$_)#gMTeD֩!Kaܢ4Y̽![>`XS0aoZ_l`s IA9{-65A@ 3|5.Pej!~R𧒔)2Lr 1VIC]yG]^e& 7S" CX|hs ȟxo+$3h"H*V U hW*NsmZYLsʂ.K2G.14֎iF 9;xP*2]ά*Bn]A<Fn#T?z?4an|%&_HѳtֻЙ.!JKQjIV-ť?h,2&f+,!LlDHơOt3A>11s.[A֐1Kf*@Z{ZM`=frr9 tzk<(u"Y,'FK.~{ܰۡ'ä  K΢i{Xs`DY|19zUFIz|-]O<I6+m)Qztbp( @iesߌHF]V&opKmNؒ~hIOr_V#5"P.D"ft`OY(q-"dսR#%HsG[Mx |DSXI@J­쬂:=uVhJh%WaRCRatRt%пLܥ&CW3Q5l'F\C'wI'.Pgᚲ9|5pA͚ ^&-jWc/kknvd(!gWYWOMgPdWͣ%LCvh(!$C )㌀_XAOp]ث_gUϏXSq%(_8U|DGkXLx}mi{HGx1T8#CfʌqyԜ޷"|@<\GlR=,S $0q @SBdx՛"x#~R;{4|08bJfRāS uȿ*)ڬ(F)tt>'}u@eS6'?81wԱ[Ҳ7&rifT۱Y;[(Ղ*X+ DrŁ U!Aϥ}klv\{rwAZ CIvwyrlEmvGvRn ! OgX|/{fkjH97X[w~pC1[Bѳ~+'fDM6 l;%;裕HmA If߄4qY!6#_޺F0Pλtt[[(>* NLy piPYCYr.Cގ!Z 6$K=Ul+|8^OOM_  !su^ CJ AnxD>4;8ӥg |n6LhAוA{5ו9U"S4䊬Q6d/"ƎbC,h7 ȖO>Sԍ``)4e!l_#f3ǦơL^U> ZkB{BIX1.UF(ffl] tl"# Yȯ,'DEU쐷[N÷eRAI,w ;?Kx.fu0#&VOV4;\}0MT;n˃>`߂(;]2ThA Ql,NcS黪tߺm3 Et>P3KA_2i21X g(}"p3zCVĻj3-k٭P_ o0*.^k$ᴇ%n1>TS(́ig>N'fϱs -CH{?=d4%|5Όf)COcQ1Bf|xn0?Q{(W]" +"~Wz6EoJ9Z;͚V|8gދTDP6)ǒ߼ǿ#n:(X]:qZ=h[^otl\AXɨ,fQ-_:9"^8IHKOut hrr"ۼ . S4$zJ;zm*by6H.[>pZF)aSuE 4m8{V5^V9ض;u9K^_a Cܢ\$c!)V.F6b2V/k'yN2) n?D\ T+>aycBhD탌}kχj3 [U1o`PqF'r0oӝxZcz}ۚ^xmp- kcl݇K.J`+025"ŝ@&~i}/!u͇oj3X3fY.uvtB8ݼ\P`t=^wU'8 \尝L)ls cEenjՓ~0}\B }KT+?=; $c>*J \x򇃵sxUa-WUS4âS;hY #.z%u8aDŗz'r3nOU;@XfdWJMjpa#V/Gu.T*.E,FUgڦ> NN*ː%;bzo xQ(O 9=Pu/C4,PcJPe% BIfلfvt;\9L,7{-4X4*(eɅXcv / #ַ:ƉZ} &7++Dmo4f玍^c.k*m8.0gn3E$A:kLVv^ 77Fq\ɨOrwGD݁$"?#y"`4z5=BPRٚYwgR2F̪:FM!atyohc`>twځ]bG(OIk 9يYV+ܪ 0曈r,I W]}gl!Q/2TbIpIMVM|pa:mۦX;EAWwV05hXoTDy Q"ER.h<&Z2hո+Y ewO,#8us 'ufiEU S f zTou)5Z,wCBDt1=[Fy ay{1*|;KAʔYw1Fz}pyjǼ;.{s%W_!MJo0Ifhmߡj jT2ec7\Ƹh 듨%;jx286~UC.7s`pi²KSץXGL:uҁQ&ʸ)WMUä +* (㚿* [^$*,y_H]>xǿhphSC7"~ Eh#{x   *?1N_~r[re3TN̐b(~J".1\0,/PxF65驗鍛|m5 ,n 5_t@^hɄL }fʹ+ΖU_V$#2Քb/N֗oh>Bb!vҀ7\cEҨ,꾋.uuAoyyǣRղ?"[m:Ǭ,m9l8eAvW/f )u+rG̲/f 'Dac-{ծvsVt;Hp7l7 [?OŒ&Mk(j#N2GuoSI1X,_*ko;h"E7QNZ? 1۫%tn\cc{Y>c.dž%ݢLj[ n!B]}-kP7Ate}+,k]̄MVc1/qjyՄ}`ضȰN"JL1yA Zm2=;0P*`DZ^khj{%{ETAI9IrbrziR6O*{.LR/]4 )2(Ѷ[a]qhPRj/;?__w|J}yFWGl=kՒAY-| *ˈ1tm)z H*,bUAsiB'rZNbn6ϭ8rP~QQŽ8+xs棬JUbKr@S4U6ΤζREr%7wO 4R<hFPX8xEɱza#_;2=kk5z6poÔ<{xfvL[:ǰd܋z ޾ܵpI}T[C?Ko^!i *G qW_vz=c~hᅤQc`Xt%" 'ʤK=`?BPXw:WL4VQ(j&[*ф􅑦:-\֨}O ؒ|oD͎h~-]֖jL)D(! ->k81Py*X/u"nw;g))A](su 6 tm\I7nqpz)e- 2ը?ƃ~ ]ooPۈy{NPуWVfF;`qNfݤv֢ v]׮ !4bK2_jO+Q (Wlz3}$RoC5mZla߮E+>Ppo )a= oO>#u& H7mMС/hc Σf$f4ӓ' $$GCǘ3aJYMk?wyG"9Z*fWLN om SAd9VV`S gN7@@V=,餖W)NqB'ʣ~L؎hD GS t: <˓G>|uY@rv"y7MWqL ;r+i33Ӑy}g3974tFv;08fSy{ epn0?6eUh.;t,j6_513 ^w=28L<߀ X\dǯt_\m5>=I%?.Y݌ 9?(RxQCBRC$% $KS/ Z+L& ]52[0媲Ԍ݆ˆ#Hg* KA|eODƴ 7 DJZ~͉`j4VA RnXO\ŋbbv>oLHc?Ȍ]_M,0Q ]a sNyd4%%y^zRWpXVDoTtl?jn"mA1#tݑiJfDn斵W 6QI]C.gQ6nn k"Kskg8exxE۴e.IMc歑}=o. Ǝ| y`^y qcQo*@[)\~j mߗ|~ۚv7(6pzHCH Mʱv]gYKret%ěn+ -نR82(B]6ٍ[FdeOPoz ٬C*V~\+Ft {t`xz+ɵ^mUD d t#wch`| ܛi14x׈I<9!b0Ls(Hw p8FϡȬG"#etەi%/3zn{8~sq?($V+"E&æ8hն1D3O2%R}Ц/g^ .E)q n$^zͲ40h>uz}}ZqghyGmCP%w55qW)%2%Q,vvu|} &Dhtӫ]$5&^#ngK˸3_+o'fGGMervZW-YhnbfgCy'-8>y[ kzwPUf@H~o)kǽo9u=ܻ:["VEYUX1q8x*a#SH\͙ F?jUvFofѺEPSŘroBI^!|ۘz)Aiq~ٝ6~%eK̳FvȠ22Yƨ*!Er9@]Ѵ?BuF1,߸Hӿ ݙ.}Zp8A> ۈWlyP,hRDrF*kW=#I^8&t ~iJZ>=Pń)ECmiAW+cӾ<Ɗ`_%RoT0aR][g3&qHَ=]guT7;=VZXP; c=;kY Fe&E6#%)(HfnLV;> JC)ߢ rF!![%s0nC͑6}|ڝ+WblWYwz=(& in';K +̣[-ՌG)5$:eHj5Eↇ!SQ5~alO4mlRu!F5} 2!~t$LtK-A{4~x ;~g5c`TijR8h3˦רw(26iy۝xr-mZGKꝇF<=9/[]`dP}^Tn\>6X9ǘpI"*P{\g,$ouk)ٰ5} ,m'~]1ͬD8ƃШmHW|ywqT-,>`?OKʘ|C^ܷ!uæJ'+RW"7A)*Hi5V=p);'!jM|~X':`A-jU]h ^GEUEPc".{p@ei8Lzc\Ћ%XuT!ehñ]o%)N:T)+ XKC&;vƖmK{qхnՙhG9z 8lȆJ2jm~17^UlM!̠!k|!zT`XX瑐 8[1wtVcb(ZVl;b Fr7JC<25 luXGA-o"QNgwK`7:Eq m0>_ΚY+p/]}135XPTO0i&v"i\dögzS59xeh^4X"bDT;2>d/SPx5;(-`ŪƒSbDqI;2&7<8؇ -+Ր,es\rs%۠@?ȕ➈a?BB "঺<"\qn:]}~̗.RzY[sTC :OG}Hysv^l,&fEI5: W><75 wcd^{bejиuE'(Tcf H}.UQTZG^ pm4`_L̐Yw tճ1] e*EގWNTݮ`e@w>}s@M/Aw8NSD^xSzjp;j*x;`y¼b> H?]3ϧh3 vztX/|hT|ц-ד6:q+4>FM?q|f;p pVF^/eoQ[T(Rˁ_u-acssnIczcvƔ=mĽX=ݶUt$k9pYMr?z}Qڮի3̤ޜ%Ϯn/Zeg 59w!5R5%Sjx*siAm4r ozw9gw.Fh\@' ^7f>\Э9lȲ3j;v{aՙ.#4zF$GX˿%ڑR^cbZ g2GYku o(JlHţ/-#x5sL-9ҮWihc¾BX [(" WaGcEV$i ~?Lx2ʉt3@J%,xw=.sx#^xVV|G?N@}K휶$PFBP^<E+YpK3p{NP^QäaFa~ώ{3QleߨŀdJPQO/ڨ{ r@2t/l~׃q:h ӥipa#D\0#+^DczvýmZS~E#*e[%aٓ&&T9;h{ec}cea?+7g/Nzêu+N0¾%Fb=˂{ x|lB <q2/]8BA|P-NdD mkcAŘ|Rv^zW7z)ywVCMc0p03%/eo7@#\j#&4Ѱ[8Pi\Ln=K˞m曩y:A:OK˜g>e0ʸє|٦)SȘZ@"ɖݙcb 5D/YCBNaIQgΑEi!oaĨ@M$~"LP=ehۀ8X+4+l&vv7G0: YVVN< ˒dj-Cmo:AGnj{stߕ/oi@Z\&@U.e1vʂss?X f#% S*;.-́.݄ލO0 S9f%8953 cMT;?_RC&iSbĂBȊ sw1 Cup.rU;z(9.t[R'8N} 3v+o3E'.>fE.EUM ODVQ#u'e_ /\{1C3ڋ{Oju9V)Ä A+Gy 69;%@"7"0CձsA9?h4'%< 5baC11fjfў Zb5C;| +Pl`cg{#) W Y룛Rͳg5p 2AB,]/I1fmpyw>4v[ϝ½AɯZf+YnT'FѭRWԐ!n+86dGE< Fs/? "FdUE+/d~GۙglfzSe~SUFn,x>sTQJ$ ~ aW+b6+H@H "Z@ 7$fa/pweVkJ6˙ DYAHM[fa\1_E<A/th)\+6|VO+6Q^}!ޞ݊c X;yIWgaB]?ٺwlbFƂ`| (xͪ7vLr oYb91Q$r:2cz4ͫmZa*@V}Aƃp"~#Gu& kk$ <`#-G éֹ8c@`\ YljC? h Yg5"'ҭY®Ŋ0mk'̍nn RDdq<K/U^7EjHDo bWpC|ƨfױug|iR@L#- Iz3>^10/k]f^#uc4@ Y 57AFZ`;'cL,1ؑ \7&Ov;"Xܞ]0rF׹lgЊN+y 5.k?H T͔RJkpp׆\lQI^e5pקc!pnn \%%3A Q}kXsE3dIzu_=hf oY3z2`F8jaamb>DRy7U|m1Uu;ĕi@S| 8X5κÁ/j D5P0D==R*Ӗ1̈́Vi}'8#+xCXc@+Õ,)(㮆UA eRޕpA\@M4qvSÄvM/K.`ݳ6)me},0:C]Ok|I2?]gՄF9ٹ4),<6x5جS(U? l{5fWOe~7MDh#AJIpLCpiRڹ^9ը4qS"eoL%3TVj̃7ЃC ɸj=/X58蹡nAqgZᣊvm̟X)UA#cͷ-<(E6ߧP/J9u:jifԮP8X<Ȟ>9|m.ňݛzpasUr/$GÒ'H8yMpWVƸo fǏu#cq#nbr[/'WD\D_i{A ߒJ4ᛗw˟<?~wq C[ǒVw2T9F,|x,Y2,q!c_"K$gxZƮ- 8wRBXx  Ni) Ň*rl"S4J6+sxOp2ӠXҀd,iJ$Hni# 5?kH @$#{p1@;V qC B7nɨV! _'A~ ^xmUoSj12F?+9#L_64)V),#=Ҫ*hJ}NͤdwM[;Ga3{Kh2ϸegx>r{}yUbИ_KO(ecZt\.~7[ +CBn" ֠{g.Y)`lB$+U @ m tF6 MKnAZ%Bg2ŐWݲ<펭Yn}9|r9X>`rLonu?f`$ IheiM ,=]A)G Xhe&H+.$W{yBPSZb_>$Ҭff /( l~ iZ6YX49].͢4X;g$Y`v՝b3mihY9:M&2b<R:oѯezKQ.p&#O }G8M!W9 |L(Cd;44=Z28iuSZ0w+aW]m-c芪Y5)5_w 8vqhN7w .Ngc8Wٖq^i)2h> %/j"-@2SQ!aۂYzd%%V<Xhj-FٍǞ*Ԧ55=h}c+r>M04tBnHI@7e[<; dF̣?]=]mpR5wHz @:ҙXLfڊ荪S-aN2\__gO㌵ ^TkvV$N E>sH4KA0(Tfi$pxjL $=3fбGFL5 ɲ#AJ-au5 [A*4w2]D ?"}Fv3NZ&ܽlqޔ$mU iP lxyE̶( c v喂aX@r%fNn.vb :l6kbE~!^cwKJ,' '@"GG0d0<1M2T ~t>@3W=͐PwGAǘG;c'?3Uz ڧվmm%|071z v[]$QW.]r$ vQrWXn>)-in 3(C)DqI.̨**:Q8j?6c(WU"YC ٳwl/ZTwap XT8nշ.1tLk\q뤱Hƶ ⡑u.= ^7-^#$wFףuiiN,M,;ea^W"j'HVHV~PkܜXӢe=Vu݆iSEq%{.uvs/^~#7U bIr8zL^BN3̍!b=(A MMϓu3&܃I]E!ɌD;G=BKӍ jϱRCrSs q?kA"<62,n]VzrD X^ķ@[ˁ0 /+W$|BF,WcO|z6o5I%TU7#r{}Iۯ7i>r.e_j&?å9$_ij!I~i躯ez"d_ 'ND֡7_0bPYCV?0٨2J]WTqffߠa:^jC:ZMDQe:'4m ]L`iԾ-pO'oXml+&i燽lYrJaSI,9U) t&bB˰O,y182.% .ݹu'*ҽm&g E/Yk0 ¦xE-㈯?eSLcT&#!LrDnCB{_}` ~|xbJ/S 괔V-U68:'y2iԍ)79oGѽ88RE)[tVc/S kgB!HR1n߼Eńao[uyC;9X-h$IX:誏y'&E%Ȣ/t;LWiCHR N)L:(#`Ou:k!\õk<\k$ӔM0Ȝj7cr^ y-8SZSIx#>I ~!]X&/maW+fS p!ohb/Z0][yPa -a#(VPu#CXJ' Z̊MW͆\C HQmZp@A ?^b=[^oXJK= Ŵ5gb^#Н%fY֕_k| #Xē9#raղ\ ~gۀիdY8nlK8CN,u2AW&"KVB:Ց7S7/T#m&w|d^UUK|e* 8;D!rivVHM,q{"q,| ȜPWso\҇ C¢@^c_gD)Y4b=8ExcdY{ $*9Upv aSì2c2T-H-.yyOYPq$ (6h ߋ:'q JhG@F~?rV"NCs9]Gηl N|"LMg!Ҧ<C2CoTZ8mrI)lz"GUuu@[)Uw/I/ ־ ŽM5y^T >ys# jR엏k*h!V.sw$>v3%Iنody5i Z;~0NsǢ .6N:%XJ?#t0 -mGX)_ruv84s_rOZƜKՉxw!xHħ a [E 2+G,i"RrXfWjӳRlCJ 5 ;/2(qWjzL[׃=a:G??E J#c 1s]ZAeuc .VÆվ\2T0 V:ӽ:rS8Tܪ 5YVïOl$|eB^ jmde/Ojrl& a[9},Y٥ba&le$ Ohd0COLKaO76ΈZ!ħ{D [@dG{ɕ5%9v@YWbLjXSo%KqDdy#Jd/2ys Ewq@}~ƽ[1Љ$6U7i@&+3" | i0m@yC|ͷ %7XAd ]s -\;:O;VXCʑbBl b:us@лmKS6UR~ p/lv hױW^N5zB&/xH7Y:P=Ep_XM67d,\+mKmN;H_I?@Ffb3pZY-`~H#`EX7A滅'swb6*|'C V$*@ Nѳ'hCyS[3NTxE}1E_n8v^ndޕ|ٝ ǫ+ZQ#EZΰ˹R@].gqҕFŠ,T[uf˝۝P!/ +K1Dmm$؁~$=\[_%aq(9w]FdȡJ̫Y^OU⥅ҷV|L0gKR?B-)"qnLx<6?Qp[Q pK;{B*xN|| J%$ߤU%:/_L&UvEN!z*#Hh9(rc iMAP;A&dhG2=B|?E[-0|j=%6{`;K(oL]iݹx"O ~N.JnQb3(J]%Jߵ&A).` 8C84<|a%o0La=d=F9V‱*L5Bp_e5 &1.D 1ZX4U&_`v"f,k|N{\׼v"|-RܮKŏb::G#Bb,ޔ?o[J{$-,#Н,:DpcU̍6oN@ٔm<@ö+WG;Fzn $d mNyƄɣtTzRs}R;'W I_--A/@i6[Gт6LAw+$x@{C⺦]:"e4 ^#(d@?ngN(`԰*?"u ںL+4|d:ǞL_ q}$UZ:^ 2Tb l&z3m` 1&auZ`{Zİ.#lDM]%N`A"P\)-ıq9F3##^s @LS[󎼹i@(bҪ*eWrLv`8WdIBe#iKQ2> rMy+IUU?$|ĭAn֜nwӘMAqW\>Z-L\F$= *7[.Š%,ܲ=B (C yrA~ct܋>~@n}צ.2}"7 oP o*T p3HG  b` 0^۝,˭.det4tbF 6&@je,c&f n0ʽGin"vA2 oNJ+ftb)Љ UtzJ 5oTި]VnI=bm.J6V-4ytBi^T̗aSQ* 1%*6 qڑe}:=Coī\ ܭ+!POa_l||:2EřA&~ 9w Y"Rigr[žaܨLo(Iَ/wE0,sH׺zNp:VCǹ>S%{:(20΁yrbpv%U"=>9Itg߬jޟm~)P\2꦳|ّeYGuW&^#z W +&k- w(AHF脓HKݟƉHiEZGY .cGBkdR0BEw^K%rw]$ӓ1xyD` F:7sm/61J( >{ץ_lZ#^'ZĀㄣ^ C2-/hzEQg`5.P?ϖ:Y4<- T~ p ԧyq_*󭩎F 7^;_M|U`\W]A9.N!_/_-Ѭ !$=fB+q IiݵaEIt&|)7qKWh/eCn(67\(tAv\:ہZ&Qr/o ȒbSU< bXLh… Hl O~.sIBFR \+t \D]hIs+-4^+&' w(~ *0k*fjʲuH_ԗ>x6[rih8K93gkeīT#)`'~L4)Ո T0ںFQ]EkWrh]M`S;B+%_(țD%3Ͳ!6!  \5Pen53*rM;Yh* 8 :ӈ5d˅A2߶g(:R\öۅܰ/e?R8'If"XcJP|9g] SA3S0#ձ8FzHiҭuMx|BrLi'SP_h4@@0ȣ Eňta֓azȯQ*Ӵa+.i3&I~n6>2db[S(LrDiVG!-_475( y <+:4^ E- r.^@)wpa4z^J74KVA @Zf_`5-zPdY&"+5E ԯ "΄Z犖hh2j JecV7jL)bĬ~(QHLD`en.c 6ll}3sOMՑAB.ؿ|4]B=HVVRr602Mf,4Uy'o4{,RZt_͙̃r=j48(']6M !~Y'ƖƶegZ'O2qEDwz =d0KDnb[WYK!N.(_mRn+l'9>3_@)1L-7&o8~&)wT95 l>%ȱQE6!=`H|8,O TO{.@e cG;UX; إb3Q#ҭm~qm=jnd ͏ޡIMFp36/&eNZ/n.@iQ a5ʳ4XQA+77lG|L6Ͼ4!%<=ٛ *a ML.\l`S"WI,OCd{ͅaX kƐOud9&d1S 4s>˴:]El"50;?h cؒB?'g Y话2Qv{ŕ6z~qt v* aXtXԠRw[1(1W>Jjʛ[2b=@)zv8g`ؘky̞͂EQC|LY[U^Ak_ih*<0s" '(\o21SSl9.ƥA]dۉK%Rhgb)k:*Fu_iٹx=N;Kf2/$VDqpDwpl pȁIXBy]֞EIbRu9_f>O_1BQV#cX{=-zh?|0B ,/DkkD@X!RTy !)m/T-1,9$.QXvf!+m8 SIqFj8'RZQ﫽5$] { BS-P 07,ȩ6!VT *m kR}TWp?"82R. Xv%.`Xmѓ SWB=S,Y)ps@*l1SEAS:`V#B#%^9V`@] ӄˎ CRj ǍAYױ EP/1O|=]/k} \cQk[d(]aRL`fV`UYZU߿߬Ym'4nɮ6|XUIۥs7QSIC]w9o|QLvF  io6esxߘOjA?jZ„'ɪC@b9wp%k7(>,mb"*MqF,Z%e˼HøY]Ր&$cD7Mj| $9Y OQDKzsY`$Do{n X ί8'㻾ay0"XU/GJO|D+~X+:&p\~ĵuwz!.e~|a7QVJd +{Q脀;LJc2+r9՟`o%mC@t=hSD q@ȵ]ChDE {{bkFJl#UiAp*yg Iэ$n['[-4CEiGXokn;h4nc48<ԛ!<{,[]J6|f:5l\S=?FigtWPB=XʷOgEi6!k٦;08][4Xv72 o,w%?8<"|v} 㡡&,Aq#Bd>pdǢcz^$o0U~=oF:}Yw)[&̿o{Be:wo̒Fwp`ti N/z/'K羪!UiEa{\mW)N_ \T "yh;z*#pYZBҫU6ar:-R rMdil5Npc %@ 0\pLAvxvy}:J O4G-R1r-N&Q$xX)#3b<e}~{F'0ӘBF먴~AkjyTjn84 *6f}/PO*}ޘB:(_(@"9Jk8u_8]%{hbUVg?!£g/Z OHw(=O0J&b3rGKfJYepQn1wBf{"C{ĴPgHy>2qpӎU0V8ĐEQ'O߷m?(0m O[j#5˒zLc%2X` rټ3 L(@n!o{/ vJlZHtM'dB\Id`pwj~KPv XwCQxNkS ӮnA,%YLyd{c]%-⻴b,)I7spGQ;^v3Ja=♣YgR݆hɵ, HfSX+X kԌKۨ_Ԍ,KtHͦXxa|Ikutw$Q!~]:s{TxyF/YrIX֦qM֛Dǟ ePɀkşӆd^V=,d#'ZXZGnyC}vP[w d?1a-&4Ɨ0=CEyV辌=V:. xʈg:+_䔊}Uƻv,x~)^B=~,piy% ^S{b7ӎ<$Y"i";( h'1498:l\*`u:aFR4~z<(O 0+ ]X"@Y+_ Fqblٚk+zﯠ -^Y؉ŃE  bȯ/OM_S2XA,ubK,ZEYLp* &m/MZg_Z1:6w@p8͞, ǻe?7ŬrĞ_g_ Kn٣I@( v# ")M#^:i5M1R?[U :bhv+=LN nhe\,A'ʲ_}m5! ] .8|B46yY]GEP?Ls뛾}$͸f@͓Ű3 K>N6̖.Yײ pHZK{߶-d|x5;EN[H]@wim& io@.ݙFwķA|Dw">l;MbL^b$IgogK5imHIK%ئ+e-7.e,{on&X$fUCxjZFsew6 Hv.37$C&E*_?}VESLl)m3&w-46r]c ,+'v>RTﶢ*eҤh'VqߗL*"a]Rv+|A 45W<~x>oIs8ʟKKFŬ1>Vc닒 -н+LX* m4Ӥ5hhK|WL/IFπc:-9,8MFpci6Z;yEgKN$>E,|afBO @s2jq,G*>Cq{o[He0&̉"ᴚ k_/Is1bcbm4Mp:#~{T6^aVC7.рtV&?yZR#ZpapSp+뜇(W}`,*gz M8pH!4+ߦ-k^}J#\9/+Uخ}*kTߗKu4hitItbw?7õF8Q| DnB[p'x^sI 4; ֿǂ2uzvPKd͡IIfxX[;mV1K3No p`,)tBܢ"7GY ȦpRUS36PI+LF6wg&SQ_2ZTFιA {WxyϟIY/,!3r[3/At#EA!:UJ)\]1:I(깡zzf$lZhf5gaG{gAk.g_Ivc˚#(0.| s?|r(ʢmv&9D$.S ?锥UT[٦i (zES&߈'ō.T)iRQg `dՈA`h@%q:vK0ϬХa3  |L1$h) <{SW EWGQ%2* e_go!:{R0ų芤ɏ)JJ5# FAW9 G(yYۤɒ^&'/+Yk/J`]3t'bu T~lri.۠`ݰj %?x T]KXcs0$lkp}KoS QxH dG-/tn no"~6c5fS)" fj}E ɖIH veSU,hٙJLQ~n fD0<fsD9%ju%7h}"InT{=4SL@ ˵lTMhON࿖,}؋TC?<ہZpg㱞gjrq.bB [bes 54 @<\7,Օ;ډ!)=%Z)|_7Q"/?rs:X *q;7"QGС`G֘޹SjhYݣ0T^ ?/8^FY65Ip'i^Dޖ%I?>$Wi1\i0`U5^wf wQN.l?~0t9C"uwnCZeCݟʋ4T[O^은' ̙9{9?FxF0Ar̔;/U#7vxL{۰nBJG>3EJsAHɚ,sM*rQo0ǷQwWCm`k޺A1(t&Ϻ `p wlRRd ]pM-Ҍ㛕cFȗ*OhV񼱱$=ߪAhϥF%Jgh%.n4I_+u)_`x8sjݍ-ԐlQeiӣ qpn]  13ye|Yȗ%y7L6 B%jr!f)m!w}XI<.ܘgH&' RX!AOgs}һ-pEa[9~c^#m*8Êvi^"z$CF<_i=8}6oui@6Eu6͝9^[fѨ_RHr=L|z[dR~O`& !oTE'Gm$y ØxMlf*>42|k:ёiiϯ?fa3x܃!':ł5M雙9ykES@op-|AN:4ul뺯,){8^O0AC5<7 t6)<}<Ɇ55&TGs{?nƻƐ3_;0' |{2NU-`1୔`UusKo͆ j72[>1. :Jߓj~`"p56w9ь??| [G?!Q+O~MՏi`@ID0*wiNBFт«*0`lawY!?c{'uaRw9 cP=.Ȏomq47*E!ZZmsgٌK5LF}`N b=(vfx;{>sƮ`6#ix1,v߷ÚV)c0!s&Ԕj KMXgA!IӾ,k_ Mf79ϳe;t<[:z%1e &^u) e$ʧ8h1/@EP؞9 r6^hR^FG!͚X8rizv84S.'fΤܔX䍖3Zg׎;Vxag+H.+~pI)Դ0Cʨi -.J৒a:2Zp UE™Uf6qW@"g-\d,ݙnIZD3% @ NcL,};@i -ej.ؼL'ysAmQD]ȶo5 aj/DjeCcr?IL޽ jR{FЮMldYBqI. Sz7:w )]~z94,Ъ S> QoyVbҐ.Uxj$ K_(ښt@@o{iZ!|[%H׫nYF`<6SwskX!䎻1Gd>ql~JF7h X$^GŭP0=!K=f}J{ś~ߟzeb2N E &x|% -u:G3$Bt+yDlVkYJ'G[Hm nJQ+B%Ǩ)S_/"v Ml~0O'JIA"VPm)]?s(3I2w,YatLPv"of#Y05.- O؜1}-\xOj5@He ~_¸h-e9$|52"(b3l,ٽk|1Y>CMD *JN$ةdBAIR^w5nra3+u'fNXN5opfL*zJ5xk/p+"cf6Y_SvR|)rar}ƯKioL+,(!_8Wb4fAUH:ysxI+"1tp.Ck;J/c 8ZA .$Ď܈gd!ΈYKZznMǖỉ]RR7鼁,Adj.7j.;QMmZ.N7wZ]ϓx%dǑaNCjN,Ό|k4U]1C2JsMPyCgu EWoOKɶ#CJ77}܊Q etPFgi#,V$PҍMX\jKAXlZ^:O&v3#8 ͪRP^3J-հ)9^05n'DZ|nQ}_*6vwpFb8G$1n2=/r2n&j'7HLd ̜fO `gu|l "ܿj.9Mk(Z)%G%1YAy1c$UWl=1je`z@#Css`ppQǧ9_\/Wh^+F<"d\NRPV  Ǎ)[2 Gj hC%HN֬d'V K?&:9hZCX9|PA@ P<8 ҁc4ЦH\Z.(Oѷb|"`ņ1SEɨ9zO^4W1d`ٰ?S%j9\, 1{+X3Hf$Vʹ:֍,\@R;ħ懸t$}qB(Ӫ gc P# sD|##Lwe|ܢ j?bgwLL+K#-DYS>6V' o9쯋jEhg^w8R2gFփ5K]ؖrí53y䗕 +{U=KApx4_hVI}*^C25.w-Äˢa׵  %5re%HXؠ|Au0X<|2 z]D&5keWhU Y8au+tsa[́u\d<, IrY/zOzΌq~CML'B?,5d*$:]OVFψq&vU٠ gNO\W7vrPgM:Nyv\66 8򝹑)-$AE'Т[AAUF󄆆|ˌ {IKh~@BU`R<tօϢe^$:Ol,*TnBo$V(ڿ;NgzdSV{mYp%bF.Q<z5m)U7M yi(I~O)X0-K]NM3ǏQ8F=K#Oi3޺8v2RA%& _cuzӝjT)5n]jS}?z$~だE| z6 >_w8%1@-Jt_WK|Fml IW2`m-<7|!}n*RYAꢶ|CbHtlQ֎ّܳ|C az+|ţ\ ޭ}uƧJ{0wuW [Ӗ4U$ i7jE2V{ usd](2rx³5;4 :}5 68ۥByd胨|5~LcsQtp.aO)=,ccVt1s_06]T"[tCu1 21\=Y#1{ b}󍅞l? h I\WkC%8qo:&%LK\XDA[&_g~?o&+ EU]u5ϗ;4iYJrkQS7 BYb:ϫtet26G?VQIx)+~nHJI>SRo#I*#zKQ9E_ wF2؆BOr#0 DCJzN&tAX5%k9Jd[DLpvB]JI:Ŀ8K3if]ziWx}ك&HՋ)~P^ ^)b CIo*@( 󡉓v#<+0T/U^8]X#=`4~LxN~5jϸC ӊzUr/&c?T$̃Dh%HY.-ʾ=^ld&1an!#ɭ~285ف-B'BFrtO sXP5[$`J&c:܎c-ӁT8.g(Zp:N*t45?R>F̖HmĩX4Aޠ:=re<Vi*Q&}6v4tEIeA@)L#D_atz4fe{=?3U>bX5d3:E :7L N -u敇jMh[d_У4&PqftBO >I(=$# N䕣̷?RK}BE`ls1g ~v6NW'өmQԑX/7ِh_$M#Қ ȩ#Q[A4i#.{ >T81q5|kŽ`tfTN;])J-p(AUs.7I8SY]|7$_}|.rē1 ,A,Loȷz&c LvWxr1w5J p5Ӈ@ ;>cWm󯦫c!S/'t9t%Ȑ&N/ҥB"^@^ 2? M2_o9b60V<*%W 8\Ҧs1 `N"n#u!^="lz+)WSoC Y< ҩo3-gÏWz6l1~tN=#ik4]BoU#[H#JIwˌv[ XB1(.!lTsUiRlLh: YnF7u]* 9Xͧ˽}=]Ĝ͓EmH{uȃN6Eg{T_ Є1޻G+棝u^xx\(xo͢oi+ S TBi\t W'4IɗjVI:9MDYuRfWg"H7,`6ElTωgDbW)[V}p(E/+\u׆'$|,v2 \6&/+VhL+s0|Pv7}|Oݺ@N0]p,x .DrDeOrH0)OՐ 8rEl1Ḳ[ٜyWO逝H x[uX[)6#ta%}XfEʕ4z$v.] Z'!' PBs( 8p!h߲;&W-iL&BЏ9a #GZB٬dCE6jۼXb,f88'OYE%dB ~c%Rs%iwx21B9y2Pq]T>v;6G˙ _h t N=K}T3T2 w!ч_=VBKE juY΅b/ SGNqymK{ZC/Ele6s"Y]]_?R(hRgN<$z!|-O%F'7 M6!gЮgUB1.Atm=´"E@ nk 1Z$b]/sr- mFSQ wq~y D_/Dxzd̍cDT4b@2Nt(CZmq%/\X$/ң! Ϡ3!۩R")tjV9#v憫T nd@8\ rwWP_moBJjO -wZ-a")28LL.14&`JOk$`+Βz(jatHM/tq#9_ңPra )M{|Mԇ]?S3>B(wR63:<&1lV6ϋePʷV!7Ig1=ydsU9©o+]sf ̪.;OL:.MEk3pX#D:Veà^uZs{|MnOkأAe S3;i.Wt1ֲ#%8Aꢶpm K:K(hD|(8fbb͍bkp-> ?S,Xn~ʆM\"3 *d0ph~GqQᎎbzLJT:'pTr :HK@bpY'^^|ڠz?Yo${ehqwa257P:>CgabXhڶW/ rd/aΕؘy}{ԔG,LuXi U=hZÙ1/Y苸Bj!(pz6-Fr2QFQxII)m',qI"Nxr?&΄1.uqUy A>#%؉T+i&>=>OMr! kܻ. '*ϳ4OhJ_&莃i3 L(̹ 0$R^#[v7AXIʬTTh|nG),EQv9ȣ}B`S[r<

?H[f)ߟ:5+T JH/D:AU)X "IbM2Ԕ|L:=~RX dσ (Pjv#ܡ4cFZ9SwίĤrwf[;a_`_01 4mDAd 1B?Skur/ w8WnB-Y?U>A ޷tqоpZMCݣ~vA\"MvvHWGQ1$:FKK1#E<3 ߣ'j>uȫb1:vYpx+9ΑM=qn0EQIJlyVG.p> A=%=nTK쒁`5"S+!-JMpJq`ޑ͒w1!۶4$(hC:0'?a0cv'ЗeK2;r;7[+V^Z7T/B1Oˎ75/_=f!QD?] qG*68uI| h:ÒV륞[#(G/SWe\t>w:x'RH3iN}1/Kx_{?zY,ֳ\hY웥 r] :DJ)Sբ殫\i [_D5xl' 4 tw->[ƌCQSY*e񙦂( |s"j_@?%r >Ji˵ JTG4O.vCJOYO(IPʳlZ5L]Ndq龊Iw-J$?cZĹ\=..Zelth%GC*\ NhUً֮㘫I@.ωڞHuxh$*?QK_$@%<ܭ!,SPf4Dq@L[H>+V-F]A;6Ú45^NL@6vJ1n$?Lxg.~f}F&.KSArq edhښ]]?%}a9$RCwU4Ox dݛ"QzhFs[;/D@QND1b^o۬D?8LJ.y딚YRL 麏3DɟXG1PN,~QLJvinZLC2bW(2 JQ&1'9$gIGI.`#Q̖s8)ZlD 7KPhvb):.>9dS"m3"\Ĵ3wsyoz !bߝYiKc8۱d 6j`nuT`2%-J{ی/# nu9lG5Qm 9;Fr;Gi.!+,0Esd^#Rc \6Ƥ!fLk4Q8>OL*rEety$݆ZKBjvC ʰWt$f!7݌R*9 9\ +3~6io C7'#4pX@ ,H?@J@FOfHu:,ب00}OB'Yqē=K.6,]g[eŞP>hL Q@*,{wP_VjG+a{Nt«}ĒYfq2c#\ml^уĊ"GvǓ ;\@C~H5ysrLnԩFdJ.=):>s"YoTr.R,.yl1n\pm~ᯣo`RX0[d"6+Ժg, &2ֵo>wUDpяRk$5ŁpEeլ)֥ d7'싷tQ: u#(-4*#sByXgŁuMOyDZßǜ"KA!eYxL+?܋4wu)Sّ,NoF8qUE{ߠ5#Ӱ{#0 @z'.z\.E1e4}ıQsUȣS-X2.vIqcR-6]0w6*fe`j鼱R$zmqeмmuZ!ӝ >^xg;X^]D0Yz9"=p 'B++ #2y?"4ב@Hd2>\v-.vU,w?\f]ڳ%{ajpSyE3^6 SHT@矍x8Ѹos> &OA/Om T}ZVH( VNaE(Gy!xl"O3Gn:wUqR&ث4DK$8b@NE|mPM5|+-!mؓX;z{{0-/}z0PIοi-uY-'ӖpO8q܄ de(Z,b5&<*f"Ne^kͤgyVTfh$`RF0 Fk125ɑ AF+ۙH/щgt3 ƞDwQzd+M \U`RrEn.Z$bftn.`"o8j3u/Άy-Ջ+=n-eA~- ?tʮ!Ќ x}!,y/Y=2yOu Ck] l,\Y-F|bR_{! +i;c ?t.~F0yf@!/T@C I#0s)iσq+uok lI /ٯO>#-Ft; `9RdV Aa@,sc yY l,xKûsZ\%"%=T4ASL{9N⦦q_5:Pp*]m&C>EZT r{YֲV+s ,)7D bZaN{B5}}Gc"tHK\ZJ/8涸$> l&(c/N_:rnS_p~uIM) |@MCw,3g}tI7%2 UY1BC=5r bszbwॗ5X ̗?7$ 6?HaM'Hw鳧<;[$Hg 2_ 2pP5`T4 7b~u)3Wf =,MGm#Н2 Q"锱3gSg&)xHTf|Yv]&L*GNwNoyϑ {/P-_/ֳԭy0|urh!Jd֋Z!cSwY]i>, #߇`H+੝5_@d\Q~& % Z`Is8XhjTݞjc9<IĴʹ;Ȗ)F Sc\WFrTćk{(e UA <6&!cL`0 {u z?x/M(BoP8@в Rи~JYh+2mTG욻)94˷>]VF!#1i+"q1Z|n@0,(6ゾε0!TUE}Wʊ$ysgǰV3}kHڟ-<CXwqս?XUe8>4-?`clKSػ!yD&ū\22\ǒƷD:]5.j!g^|uDPxQT_E/"!_xζŔ6e5@K̕➘D'J ՙ&q>8]@(6_#h`DuN &22e!NFIg`k)4MHz,)Ob#q .6c(#d>c2tTnnا:[ǕHT :I*=V׺ݲ( W./ʇ`Tjݙ,lOOZFԙpGϣl UTᾚ }qŌA)}x_ =en=ܷ0NfR9q!NQIžTԫ,0n=cd8Fh-T;s$WzUWp !Bv&5juv؂>LH8%6DOi##rjǐHX y|9ueJNv2|xrAKNT5XcЫDW;m1;99YW4~2%݄U㔯 <咖4;SD|0SIIU@H /D8~EoLESC˾Cdk|٧<3R:TJ@T80^\wy}AP^J>(G\JE$Ytsp$-97,ȒP֍OYo瑍d9P 7egu&$/5or{s"ҕVnмVh7*g9x:X'7~;C(X-i HJblձ]H0>*T-q?cN D6AN:hHTz!t)[c瘧'j4Z>rd3=+]]D - Smpog <R>3f<^U䵚,@lZ]4C!55G⹠b'[/ KaLFFF,vnjnrIhRKmHtĹU8gp} ){sLV>bA40(8>i&1FHs9%-մ[0.w=<z7(=#0ꉧ.$DG!֢JE:oޖ8Bn}n钰jc0V&_2V>Xex]UHbe4ڙR𒥧hhʱ3=I歴 F@kEc,S T_25*ʧU>LzcK,3S/DaIp wj|l&.3rZLB1J&\z휋vK~V }UA..BYz,N?j;aհ@;w*蓑'%ۿƥR~[dw=+%^=Nc򣣣fOwCX $x5 3qԷ7ؑNnvLR*CB8ӂ0!o:nBTLg]]OQa( d/rWF ͏zHKtfTX^TWmV[}DK~XUQ3Rrp=}%jѳ?eRmC4P?l ?Ql񣕧fX:9j^<.–]Ҝ\'KxZX g.I#$AEf̈́-oN%r(8QrX__=i%@Y8K4-J'"_%@Օ7m弄`V[íQvdNITFc9L-AWͺ8ݐǗV?n,F?}A 0E6kH"672~5H0cSF?jAs<4T*=]`/9@ݎɕE5?B~dkśz0#DZn{߻0 bj_k V?qIZ++e19Ur!Gp"mp!d|ip>}fܮ 0dɥ:/c"U-]|\ը 'kUD?8ZQ?5??84h;նõxڪt$f>S_ݲ]o87K6z;0!m\4Hq)AbWSS7آy};ًb_1k<;T6Ѣ}GC9Ε]pƗ[j&lm=&"Ҭ5?X=;FeiTkewp.R+L@{q,ۼ&"FGh@o7stX/ĝ&uI#2xDǡ<B)K |&㺤 z jbl$69[! tmX]b ?P~pU?]D ʦاXE!)2 :XވV&Ru[\I].kliQwkg13"M/N]qȽ:V ~hƁZߺ槺Z9OIc2xkP/r.MCr ۤ/L_f蘅 0q1rA{Zp-j;9rRV-`xxK΀"Q6tssSНl+з_ nt(_;̝SV^9?E9Dn%@x`.N1?rs+dh#!]hcFY˜>@c]7:QT~jQ)7Y薈M0N]do)45Y [Qnd+!]@vXr t'z5[iBA4 Up候X@(J] ax%A)M fk/L>զ2Hp>jAwnlЌ7{~ t2;)sXWq=JHwȖ,nmiL)4gx!X<ń[m_zۄ7Rq&"ˢ]G6*s(*q? pD*};zd xh'-a{EnL7>Rsj.hJ15|[F>C%rӐpib&#_cv T b{t굈Zk~U~M-&."5hz֣jH< ]`AYO᪹w{!zП(`)83 &D?C4OdFB3e<ͦ \ܻ2Kvo8 ,cPF(Sг Vpwer*4#< XM3fۡ + j?`|w,-9h~Fx)2|(C/R lQb\sE]pm^Y?RԞxM#0'ZiFedu+ey;KPcZ˓Jes/MȍPlAzKR(9 0j?Od }yY .Sz=;+~}(dDQI*@U*<+H(adJ]a]1zNDX8y"Ӭ <d:A}D{ԉꗶ$>K9dݑ9gEoԜL;Z@" riq4ߴrh$_ Ghh TPVrlxa+u&b2g[$0C` IS ,.(|gScD$!gc q+yDlIf=' ך#nـ@ĺOS\bu/UmۮH𙙉4ױ-ď (;~H+ȥN?`뙼 %%_f|y@J5?9q0-tqb* ᠄|aFY{hI5^pT?oТú!YFO_%'՜e~_'G|a +1| 6p†Tw8la7EWSwzm<&$hH^3ff|oS/-/ǎcJCi++&(L77IÓǫ|8Yu2~Sg:AY.^\t [? !emD+sl씈 qI/G0PZ,Crfd8꿄C4etRhKX|Z7 aEڀ+jHW՝'}9UljH9D ni :2ian`g:::ƩQ+vr4gв$'ȁCFM_Cx*W{,Hd'4k.qpA OtAq $eLAM}WGxȾR/Q#S!DQOeCn4VE\!v3H|SٱbRl9AvJA[ 8 (Zg:FKՏdlY&U нz bFqϨ7DžBȮ>G?Y 1H^u$U;Ya"塡-o<CI57_C߽cmSouQҪ۵e 70`*(E૗tmFbu}W݁NRsϯϱ6Ⱦ{:Iyx S+tW[JMztm a$k6Ezw\?jK ZL^unLW@V~h0@%fr^Y~ݩ;$Ey*˜$a, kE,f' FC!cbR2j9+d`HDI[­Z # 'NGe~{1}lH\"Yu՝B\C|ӽmh ΢Ja?ܓz"i/2&wiI@/3;L( 0xȻN[khZqF.Sퟒ_&q]Cf3ԀLP/~(9i#C l>w=W@*lw[hҍC*л9Cy}U%G_K0IR-IGfCƽͤūo=7ͻjpv({F7~TF?R.*lحܤGNSd,$㰛tkf%A >Il=:bg$/ctNt^Kc`Q>e[W2^1T u : ݫ6 >7 ?n-RG9搱 J* LYYQ=$ b丸 PI#YIa.iYe\T %Ysi滦m\ELl3fА}VoSRl , _*LB󀟿EFqs1;jϙ 6boADDSx+VIdv_T䡔R8KS 8)E579'(/\M/ƀ&W[Ns&%| Ba_: YJP`7+\9Hv!ܮ+j97ڧ۟{e3q=0w\(9'mt*~YΰlkЛC@Z %_))XxagܽMp+hRMy`)Yjs7!Ļ$CW;ךNdQfw ss.; >d)ffiF h9/TP^6zUYy\(9C}{A료:D2+&x"wHP+Zը/Ш{+FDHo} r+][--X~6B›tѶ&G3ʵ]VQQ)xTŵ[Z IY`?בH% S(ܠtɲ!IOe< QfrMPiݍekj)]vĚyrtW8f!+8aU_z%b9t?薒BRS|ꆱ&j9ĞpЃ5v-WOͭ:EPSe\+-Z79<{1Usj_ҍZ/oPd.Xuuҕ*0%Q&"hm79rD}()o$裿n}"4GH݌r;✸(0O ȿ~rXo%}dm1d/W7h"B2Tx[3^F wd;"UP߂M 6!xږPg=5V>0nPpiER;N D.W4 ܳ,+S 0(kD,^,Z QɁSrò5H?whm2M!)tAسi!wQ =T3b͵B *RzwhfϼM̘O12,f9jR⺮'Z2"2&Ho2Y| (4tr~4on<)T'8鶊TW;/$Oj+ QGKDn37!]tm̜OۜE4r9iJo†G30O |7}{e/O{C ˠC@.N"sq߁yrazHul \{iQ[L*m+rN?}cb3Cš{gN?GN=]?P A :) 7ĉ1p\#דҜm'YeA(K6we*TQ hXBm.a=rQ @{7hSGd8LZ>0ͯ.A皆 aFen߮^ݧ^}AD%6p!5gp9)&5)^qq ujM%-y JGԌm BXxNRXz߭# ,)}I*I|7B_@BKpu1xlWԚ(szyѸ!bwaCsrK߷C67[dR7`33+I=&]ὮG7_LNJGT4ǢT'e5W3^= k~rx s~4PFN9$R`S}g2`bam7Mr>OC|@43h%&ɗ5pCx*Xk<饰%qEOKml%rPCOV@K sgVQH.ezRjR:㫻I* aZTK~V0A;ɋzN:FN/vk}#}gB&߲ cC= Jxz]]B5("Ƿ/{fVYV0;r9( œQibmMjwy=Q_i^+!>"Ð[9Et(徤m1މ%\]8Rx5A&H\.MjkDaϘ*o*Lg} iՊ˓BIEb`m2zjf΁\,ʋ!̺ս4g|IDudp rDx#7`5g+!K9X$oU)X5)oIONLrq 5͹7ϑKCDE.wfu%|ݶn+H_S@^M{xΚ/vcù/|_JuXCeI.>]ҲԶ_W8IR&XEf h[J )t%lbv6b5O)5[}'R`7K`[:_$Ds\0 ENBې׉@y(SRg~,}~K]VL?Tz.D; 'S]<ч0Wy~xx_X(( Keg<>^Eֱ{D C+SL/_iU"3,Ӌ- rIdxB#w44gvwN} KqӳX"ttݩ{د=V$-v8BAȽ;Q఻p~Ґ@4 u;Tl9C>j.TcBWfz1V$PvGRԓxA!1JLK$MJ&TElwfZTps9ÇĶ7! ?;}l2OxA(sAfoaUk3!U)bi "[YCaaL[i?;L$dŊJ4F ":T 0ѝL 9ѥr_͸5im >$5տDq)`:|BO6=WnEOI/pݝnTrhN$zKr6Lr[@3+2ޕ24r K7˭dT+x,2Ui6-M1ULT%`rⰋ!Kʫrj`acNu\ D2+_zRgL'm Xޛ?-Ec{9Tcrt7_ @(&@i.m|o"{&]#6:KOD=ܫg 0vbǓz~X(-GbK9$/ٓp1FqXjZ(-_Ʒ}qqiă,qtc Mmѧ@ T-/CfWbk.hq?ud R48"L>l>@7=OW ^sf:zY[m ,8!M=hu8tzx{-a 6:dHP?.u޳#ce2' {<%E^/gfrFgn Gfkn:g D1g %QM |DY#\b?˴v&Q&\@Hw*X-|| r&JYTK}Z_!g;O!NUԆ2s#Aִc6o,Z}$—&DBo.\ëƉ|N Ј?2!Sqxu`r NkU?@~EVn4t Zn74X p^B0 b!pb!7ن.t{q2:K]? I"g Pl?e=q)/XL|YгX-K_=rÏ?.[%L8;Έ^;mG=5M3+%[n|rxd0+GuR$ #2Yw~X I^~oc30ٚXĺW֫KMصV# 7DN?$c0|^P l2b I9ß]yvX2w9dBӚ }o:ScUj' +2HY3#X!Ã΀OIϼ.Ԫ̑z|? s19Q  R5^nUf8>pŏ`ƴYɮٝ-z"P R>_'.E"0JESbq$XmOeM8ĽՅL+XyCWS:"0gή]_X̯ǯ4+Ro:"T#ݨH}Bk n!%O62F[A+G{紀ؗ^_fLBUqT %Fs9!{W̝;n%`S[M=~19T *ST  7Pڢ Lm4C؃dDI-$Hs/9Q0d]ƻ>fNY)م(c!(xvrxa~С\*RD"|t`X)lE$*<6vfsT+cfƄixjDBA˓&]QanɇC)%0}+EАW/ įGET.SǬٌ :Q ^ș.ŭL38ǔE۴=JsFԝk4>1=3 uKv==XpcYf<3 Q p6 5cK(^}=TWӄˤtt Y\XxX@"OG;,l[u%hM?4cux/Q8hv JMwO'D烺!_N-G( -L[ER*je{,ovUk!vpگ 콝@ra,䓈 9g%A">|K!IMxD۾oj؃ -& =v-,F3kh0L'ZI@luTd`ZeY"+\y1KQi%qsD' zO3c3|aCyw=xRtG]yJ_t;i ^ +}?i )tAhĞPW\L&?hoF .drT9ez*nD8k[fO'Η?m;k?o5?U@Ո+3[;N={͖dgS_J#bWh&52еܤ+ja~lxsqfOEG{JRmG 2^&VyR XZN!a -պVۇ2&E]Z#R ߆GsWe,@iCUˣdK=D|UbƑG5NݬtٸݫÄez`-ۉ[L¡h'o^&8QL :=d})·٬9xe*VT"Gu=ǟoB^NI=g ڗ !/0P2楒D2ဍ47P>e`,⾢p`&0tEt , H¶ m_(Fm_nL»pL]<?.q^&`pqOo{u:saӰ#quyU٭}>U6BUhb $yp8BQ3*).Ľ35~ȃ@խ$F$OĕvYMo bD6ϪՄFl>멤(bo(Ӈ9LL?Ry髷9c"hhmd3PXމ\6 ˪V*uBCWwn(0a人p)gdۧ`#!TvBѩX!s.j1x-G[AaZlR2Ҫh2(%|zQkV#nUM9+GtBN=IW^>6 iquvMNxiʌw6wz[YSbH:֬0 !81e<͏`d@~}ž,p`r>鼘,Wߔ[wKރI:M8(F5/OCRxj¡Dn' A)}'q5&r s𿾎{`6q}Wb6{}'wr?mS:LZR <'^L!]j퇒 LVw>xXŠ(S`ta4zCQ +^:x<..ho.uޙ6QR%6DzzL+»c;'rąYTk%X3\*$ 4e>$[28#_-Ja TI|6C7p۷ b@?U; d;Gv카tj JЧwpBM4WPzj >P`g{._ꬌ_Sp֋WzTe5$<,Wmme]NKzWB(w\@2O݈yk`vΙ-&Wc/vzTVp}f2eJ[Ot^~5$f4%CO&0 A[﹝aOl-+/SUNq 74 [w=Fw%.̏%mT!/yin~1z-%Ӧ=nmɕdÃ9 34ZOK )zP.ráW'Gbb_q(>ɿ!ijHe׀Ђ:ޭ.8ya_b^cfjiAc׸Ö ޏ~nĄ~?¦40rjo)ɋ6CoVח[U@{eUgI6vl'`Yc^V 5vNs1W n[7P+ @s|,[6e@ȚսtA8c%ypE6zъv0 Qt 1Mj4b+Uh\{(v+˦ dOVZIm@ˀ̔-0{Pqt|QZEW{&KJ 2iCD ar9A|ؽO̩[ʕ z1J Q;{ rxiTPwI@W@B!;ŲuU=Aer{q d}*Op^|G z9's+X,(F)lޛ I'0ꢉ_] Wq+1rx)vأ8~9,{!>s!DvKsLbeqޡkc>M0`#qkģ دڲ&iԚ!ց'?sm Z0{4G Vܪp6%F^lsv:E#1g]/;E{y'XR%m'ǸiM۷c Q$Gr}TPxkw+ }mMPv6S(xcG.{H\4k~bhF*Q\aMU}DHL|CUs_%dʌkXC,c" ȐQHL;d{ ^%P1݁$oMKFhz- AD{G (ꂡ?jdժ(`D!HG7ąȅjKe&$wSzB@JbUc *KF\,߿30qg鼹KM 2|>E`!Prѩ͡h^ n4j^؋MQvN |ժǰ2t(|UT~p~!~֛1WQ;C$\64 rB$˦mbw8rԦuh鉊96@GˊF߫۱.¢r~1Z'޸^R}Fʀ :l1snLy'dZYsc?8\ӝ t YEw3ͫe8)|J>ZߏաM=Q_[v*;PrfI7/vetcK'fs6 ޹}QD6hR.C3(e>7'@T*o4NA; Gg BEhg;k/A>;SY^+㐺}KΨbcg~{#CdpH{u2M N?+8yNrS6^-ae KGO{᲏ם8 Gzr*E8 {"mB I9|mLjWLM{v`T/'6@DN^ nnAW%"FK<'jQ9M{I /"yqC#ڔpN0?!hV{V-VV;=\).+eޅQ&R=:I/g|%9&gq&80UT>S4caq_qڤ}3sn `PiGZt"</F@bh̾l\'7ʁZ( Pxe1ʸ-ZgaLjr<NFH;dt)ne rVE;$SL]ȳv33??2zRG 4~@l-]TqcНa#Z/yxg>`8ޓ_h((<ȭ pv|k`%ާd1)Kݸ˰0aw?]v> IQ nX)ׄ 8/DYɶ^c`|\] .坼PV[0,N:&7~6+fI8*Y0 -J%RI-KY4NWX[鈱i 7pfgBS5h#R>< {bh3M_98+Q27[pŊ*O4R S>ћ}M B_LcWŘ˓}._-Ȼ@Ǜ>{8A#?<6lx:O7 n4/!pr 4U}vl~Ar0iȿ<%LwZpd|ؼ݀{%vWO\OhFw54WC[^x. G> xO'7xx1ARብT%vpQwVMi ȍkղ/ p؂p?X B2dDliԐ1v^$@/H__ෘ-ɸ(پyXk.#FtyU$!WEԗAG G> X0kj)+[K}6$u_W] xZ.6C]ձE[.j30eɇ4hx2pp'wb:|){ ..g;&,MńA7J{ SCxT*,ï;aad!1?k:Ӏܽfڴ&:u~% gMzdHP4!єRuWƂZZ+!B+ՑLeAU;.Hu {(\2zsLSE֣{d\$uhAK= Ls~G6蜔|6t a,|5#9 ,OzC!{:~WgF4b"7A-\~ I xN(4"-QF|]:wuphxE/b7ߨq},[{=ɑ,mYJ6R1q\ {\2?4cl0>4dG[ԃ#m/ a^9U@X7$5sV+ta)Kma iQPxYsqbi;:)j/b(@ÔXvk&7bF<6G5&zf \0ش=pðq "/Э8]95s3C VxS\og)یB9sZ$NR N;щx@r8ڒMaeO[XQqs3j$!j(aOa7b&cw&Y P$2-GzQɗbzvX,qlxPӼj5sy * S?3<[Ok24le~wC/r ͿFw^{v]o{%f ̬>Wh&m9er\biN9\9g٥R'd8vsmfdھ,r`x @ 5|*c8kkǬ ٌ?EYgK$A#K폃H's6偮4Kͣ{kBcniJk`G˽V@ԭ8~>fI 쾬H$2 O IBqiMWŌ\ KË]qJ *;cqb`u]r4Л]+p==Ud-[$.ŭgg*FkLe0ljk,m= {]"Meu'"w*G6\ɪ~Eو9-sifZ@5O-#b ?80/\*C\m7"/qm* @@.Rs44686S| u8sfd.0d_:ѯ~2L=#X&ɶBpƀ2K/{y '/@r>g>IxV80lҞ˽(.1?d"@ٕ0n*9P )?n-PzdY!j!Hԏa\%;H*BmEYc}e FE;+nM LE*3DZbtӮ"K$5}c*,W#_}j}X!6 ƏdlYw$~,Ei?ϙ<۾i}4<n)*T2p71*Z*4ᦶ Q咃ߏ7u∖٨-t;Az:0 ke[Up T:;wrܚbqWYƊ=@V#jAZZ,)l.IbB:p2wtB yKa/ M%En?_&SiǗM.a_I_ycX>ח{+VC>jCbr )xqȭ>D/(}Y!9) m2Cy`qZfR=qa t3!X< YmrJNî+ /}IH u&o1C448wDL6Oj,% "SױfO34NPwfw&%xroGvU߈#H;-0dѾJ[9b:$1Rg#r* ds˙He;b*WKca*e4W@qKjt&Yf*1ױAXΤ8~h"'X|\|vyLQuܦF$I"f͸N>" 6rkݥ0 -<3oCeؐHOaP3,VԼ_A’6#sk}hY74zoF~}dE1/ՙk h1=zj̿ X>ֳn8IxBa0\b;;K5.Qr& ePRIkweX%{hr8NBV8-AK! %*Y6s'ڋkV-~Oa[ZaGՈ*Fyo"@1CiͼߒnK^ iIpM‰DUIpK+!g1!Jmw2u9y' /\kYyy;ZjiZ-Q#7=sV˃dĘz6cIeٽt dlLԀXVt0Y7]H@7ӈAVoO#mpZk|* &*m|jA1^]`z@* `83FEZ/34 M~oWgrQXDfHoE: }r'?,Z3K:1P+'xh&6!ZM:eפ~ӴÍl,lu×$E匱6 ~e7Lކc?Z6+ZK4LX/JRi&4ZLY=4vx_~6Jմ0m$[_2nMjTL}:fT:.cl|$2$ޝ^X!qTzm<ߠ/A(zLvF:KSħh3Fov `Sow eD5\tԾj^1FuG N0}eKч>m8ǧYgj'UnO0P-R{o 1pu!ݳv_φRsa)O,2K2PM ,!vj~cz`e,pK\kOl¨k`R 99Zh>YyM7/")uquIۡpYN=^s>I+0k0J5)b3 VeLPUS(kF?kI6C EyM en86[~O\*mC0| L}֫1X( qO t]&(c[Kszk P!dt 9"9 @k-0iX7x,)ii$;9q3<0P8z=[K%ی[}*!8?,F3eifH"]y9MfX-NU[Eny(.}K+)zIrF@?{rᰶRI8>|T.'Yʃ YigW춙] 0gܜXwO1꧘\ <S3ɽNim82x h[;q\/Nsչ:U 䓂IIλE~jb}_hn&-Жa!m7IvD^9P<= YCe=ca dĂ[ {6e4ۃQ~wHBhy%]) 4g(=ȃKL:| AVz~B  RYR' Lvn\'Y+k'Ŗ2v#Xiy1/b/V'/`VAxP9|ᚢOmilpg҅ "HQV<Ƨkb3l[]?o$cjƏ*T5@RvdVĆZ,7ۓ\03ȨB>Q4-;b](hK d&U]uZٌT~(ˋeÃ2@pDXP+hڂHbhZ%Hm3&ċ !d>RiuhDrT$7ʢZ;oޛ\⨂N+,#cuaӣBgXҒNPQz&S4%/kI=LbzE WSR(A#m5oՒ&[0ٱ}q8Mykew1͐`˻(~>7w jzZ5޶(pX=^H;񈺱?5kav&^ \sz<=sCÇs6NR09F>|ם!~(b ,' udpc2GCA,\Զ鲊|~tF]#|D=2} W6b ϳTҗ2I4N4Dn++KxEY4X~S]F=iP^ؼ  +爠˹tL %"S7gW@jb(;|+JN;;ۋqihTȡ~x$9[NIYE6)2j @o{Vxxޔ " υC u: R؂-Z,85YlE-*y"oT$ދ$y.˄)hw-H;4Ym}wn BI9i `KqL*=L7hF(k-M!6́[& D60\e= gmkUe BfFpN\jV}rWa,T!hF!2`;4c39*Kx3<ӄm<4jN!~A4!z{y-ۼ+TֺX+qGG] ̒?;%2ݭA$f͸ K&r]A$_CD~t"ٛ|ۗWQzJܻTq0GyFI7i8LuPΑ0"/E5IC&ѻי 7/Arjo&Dg J=  šp HE7VYz/ -;"'fu2weL`Ba^&y\%џegIF)]Q}9bUEݕ,.u)pAZ^n|e~bśC`v::UJ(/N.Ikt;:umaMmmȗc-;Vat} iX<Ӎhm+ODxbi7tDWBa##)*zAt;KBuMu"B[4@2ψ@H{!W.& yHwOZftDi*} jk~bm(%.v(R[܊6=su΃Y%GbDE@ :`Zz?>VHScWuD%}t-YƏfmSNKvNFbeiEOjzm7l\; ~]GX.ZDe!e%pP<6pՃO| 6*+oW2x RmꅦRR6uN|sIρAǭ08s5 ](0G3uc>t*ioaTU>}Y Ro15 Jak&57v'eGknۦ߿~Nxb wLfK;ndn,(.ÄRyΏQ„Z$ް#hyD_y;_hReԾ Le Sua"4qB R~,z 6`bķd6 θ۵*G$;X7'+Z=9d!(F#G1N5{c]ޯ-k`Rȩ tt7Fqo~JJ?!IA9oMj e!<0jnvCj`+Mw Z{ 7Gxd" j!pg'FxKFTss])<:Ӽv'\n' T1 5wBPUQ/.~O84)BC0$xOP>:|1aI>ؒ[i2ퟏ5MuPMm@%X̊/:\noڟ8}@D∟8ן^Î/lE[%aT4*+؂4駅tW^UrbS7/t^b D9<3?x:^q63PqQ-G Z-zetũdL橧$a'U4x<7U>* fm**azINOCW}>׋zuO꿹֥,Fݠ@9GXdطޣЁgy͛g3EWVan4gC=u3N]C鸮zz,}%mh?y^juiEE61f|RǕ[c@L\3Sn%RgST0_rܒm D`)op{)݃JB<\Zօ%4ߔMk>X>;}0W(uYjH&}kgFۢxH18oĎ3Qr.:bЯe'_tGTZ6C1D3#mp 1֟ &} Dt=ַ^8OF+tm%Ur]Y4㰩CskkHPpnre/ TF3BUɰؘ=3Cj=A\><d ;$X'v왞 ?7&`wzFx|@R?!?Ƀ©YpeB8e"M4"10=>_>tjv_ԥk@$z=FH1#&.]pp2v 6Lk]|VN4r_g"@EWF=^"vΕܐ(ڇqMէQ pȞ6v`,҂9x1o4TRO&k='sE\^U^= ,%O ZsŢ_ 8j, Tô }jmHF] &R'i's%-xx2o,Eodѥn:(j~|}GT\U lix"2Sͪ* ^O³i9(/L#,6}0;DFN+/;ȍf*QfGU^Ң^wBY!y@. .( = 7='%/CFYQ'n^,-U]*d2NSJfyd\\e?VNz]:?T~ÒN$g@ *\ &tЛ sbbA>x%j-a`q]jƷߣZ%ٲv^-/Q{'Wyvuh㦽33aqOp+vw+.ȿّMnxɹxdj]NƼ6UiÒŝ,:f7.qcr* =F{ogaEJ y(аB?MAWuYLヽEC֭؇nɖEQ^yMQm/qr 7c5H@LLrP3vmσqVDaln2C>wl% #RĎyA-.N^3m} /.r<4+bL(稹@Fc>鑉i)$h [n8lȿ#s:;G|(Bp&]lb/(ӣd +bU9e(nE@# 5em %{Ӥ(Qkj+M}VN7Rl涍~ -Wzd$UXS=e[}k"={˱upfpJ^ [K+ah54?NJz,O3(^#&z\S&w~B(vM3ĸj$ۺeüòm.HkUp>J,'Y|_#!>@lAvXC3I}0Vg,9ZH:1HǮ5 6?%|4a WyfoQb]pTbCD[C*wWegyHseÐ3_Fz*1yHd%Jhm Ze^5!_.%CV `2h(o8)9SAET.b6:Vl`ط}vHٯر$N>.XEθ\ߚI#*GҤ|Hu&?{6'6.>ypXB^p̜X86} ZK~UxSڠp`hf*3tpFIW& e W ~q)xt#r*\d>+-Z#zpQe-~yG"ylC]WW'fo_̸̵ )+ A%\SKP@0=ͬLSW-^ӛt`Q|xm ݌` GbXT[ׂX GȽMUa 颺IZAQ #^=% #>\6f:4j._oa31oAp~dIxf4) 8a@,YZ");oSy$MIP=ru?D:(sjZ CMҌ+knQ AϹrZlb 8'q(vM-6Po4HL 2Ϡ;Π>4t8nWxtWn=>༃'WNsi8PB[V FUA zl2#shRF=\-R5=m?Uk8aXxDء)_9Ag"E.zSckP`@t(DMı҉ïJ<4d̔EpM8 lI jb/qݽm\Qy~2|r{Vb/xBA"?߉K1سQa/r[h9jjNXnl[WKt¶v !xY, 3wRǠE-Y t)>ykƩҢF 08v9J]Q]'kIֶXNи%(F.Zˣo)Lb#m` ?5{@-HD/J;k$gX|߳ϴI7Gim)@si>JE̍#sVFw'BBPw-@]/tC͘K}C%SOyUKj;uVri/ ^6sv܂y[UxǏ[`3eOfA.&с߿É}?a*z_Ճt-tRK<a/\ ֎֠=#6rh| E`x7X\pM[󽺏ְ֖Dy3SS/\Ag 3,AV|'ǯV3\Ebo>@.쒔$Oq4=sv7izߜ/l#]9y' b:`izmLWUG="< pufH겛*< I6g;gRLҢGtұ;M=ߑb wMÙTGv^za L]G$\@9OM.+6$U4*eDO'vQCuoFySY2!pdT[ފu;I M%;~?/\5y`|P3ren*m"']y;yςMeF^E.Io)]m?۽wV0aݓz$>A{'k޼ $V=!JI${dюgd %Ct =-vfL&7gxAQwR"YC19dcz7W:hH#wp%a!9bQ_}٪·>2N}|* *#lR`Hu]bGO|؂OLIGrш̂<|SW/?}Wɳ@[1#U^%JsHΑzeOZ'q2Px7#n2UStd wB|NqSྨi~4|m#C6H(q_c<|(,]В 'PZ[PlA-$ ޻ivɌ~l]U:puDɍ ۊ?G_ \@v:J{FӜhlot~ǜn!RZ蒢abՓzXOUÜY?wTzJ$~% ?ֺ6+;YnCeLZ ')a!9ٙkŊGLbfmw w>2T3itJ< [=_6\_ a z*Ҷ "RHbM%<}ߥtYHcX@]ָsyXRlk ԝw@od&K9Ƞ-\%EhPb"'g e;)sv4vcҶ&3#*(>Qh.8{%fniyNt68P-eBH;D.\9ͭT]ek3jf<\FHuPlNzڵ}Y 4|Φagrx"_U f^&>XhQATK\8HHDrL*k)_uò~8;F'V$YIsd;Y h3KvP_%gF:3`1b~7gx(_h*WXNt[y7_~hN,k~ma2OVK0ɢ|(wM HIrXJ+A"/$Ku-V#fm|K,1[QCU]R%Ԫ̗ؒҨj+y]@ՓsJEg} (ߧ%͜">3B]EJ.oAǩǒZMj +fu n~}Ie6e9н -_"w|":Bh*nR:T[Mb[s _^=W%W³FgxT刂Aq?-3!5:源Oy'b_YwD~9Q-WBJW1*WwvsluMX/zgM=Evҟzé,n QRю'm#SMvКL泩q\àBd+-28m0 +H$ D0e\\ZC&@bY+EpR$ j-v6Q 9۶IebbR?/vY!덵QJLn}ާac<sxNyCͳ=͡Yv06lVXV x?>t $M'Q#!Wtپ;~Qf͞sq_}S $\|]͕Ʋfy[Ez6^6PED nlIm'VvEηZaz]oNwYsѕ0il@pGu>~̢{rA04ء~Cgei#vA!&v8]Hhѿa11if6m,Y }\y~uGBa rXe5ö[ZZR LWnNÁWsOt9aº:Y[Ak;Dm4&!e VsJCh XObʭ&κd+JZ\/\1qk3;HJӦV5vw3pjX??K!i(#VD{a)5 ,up~M*=F)/3X3t1wp001kk #Y۸d3ηzgb7 xA!n 0n)W@5`Oeq#]e߇-#k_K+Td]DǍFkpFxeܔ+ccdIRwO56R]<'^; t#p0&fڞ3ӱХ}!0"ݯ9bkL6f# `V&xQ[lJTgv9)T}4=%] L?Y!%(Tٮ3Y8Q5[XrJ$<F -‰'oiުD 枟'eVe+ރ(7 %/'9f1ޚiNsug>/Kep%z`BTLmt<?#˲ c6;-rbR>~d䵞 Ѫ3gRz7K@wKPUL9sNS5Wc.mOz5U-)epm+9k/1;DYu|R4r0``<[͆!{=%O HO$cX7J[Ӽ){yďx>:´3W]M`'`dIu^򫁱AibʢM]:>@/b"kn\Db.dO°7K0lAMO8AxiQݑofK`qḙ VjHRBjv!$j]+ CN LR/G]Va:)O< yE1w )JX&YbO;I~wr)tK2W+MTUJE*.6A§Īuґ.΄t+Dkk󷬶OEO>jn *LEUv 7:W+9&LJβ@^2jEkz17^4No^Ո0Xhicn8/y}Bj-IxZP5S@PBIU-[bH}o+v#9GEL7&4oa`ײoIx=zfʛ)\#.U0^l ]1AmՅ);>>X׍eJiC]pr)6/ w#ͷ=R%Ty>1+XE9Y5}5!%Vx@Mfa]k74Mߦ:ͣ+Kk#t'yKн.74^q,x.(G,|"}ܾ@?YJi­vo,d&}N:%8\ T"]} xjsYj~FnlbmCb6U]ݗ+`^~}u{T'biV`=4RO! I[A %UNAާ_a/¦MR<8~U\cw1hB<p]Y{5R۲&_P{bϚO(Di^Jt\IlSY^ҥwR}?w1M6[ }@:F;Ŝ#j}J6x-äߊ]%J1SR'ErW)2Vɻ w-GhuqƽgY}[R7fθk!k^/goQѕ4Q.?b[p!f͘nD8ĄvxT.J^?Ƴ lԡ,]`16Sr0yP$i*2}ܡ >wq1x2r,,uǷ+LvPohZBpQju0tQla.q+ S|6U Fu r5aPzi̭~ߤ{2s^|8+b,5p{8't$03\]3N6EgLe{=o`"hjɥ r,g bOEn2L#m3m,_p]~<sq8%|;W.w:I T S;j(Û #QC|졲>ΐ,9ЃUJ|e̟!nh"a&̼߼"[P"]yD3@a ҅$ad.]GH}x@};@ɰVUFo^%70Gqź iSRVgnځ;}Z\DCl< TDP`E+ $Ѯ: ZC2,l?5u\*?sgSzk2 b PѧK;6T+L*uR5z3拭S2]yk^ &!A\I|.iG{@@oӕM͂:Aha]iyY#osKuVkk%3_VjfۏeDEC6K~E+jy}3 x @r/bBzڂ\SB[ ,B?Qi}QP )D6l+!W$r!6Y쇑K#+P >@-n5DM~z.l#Tq&D  1Eg %7d^z!м+&jNRsίlY/ JHB9fmfx(VQA%k8Ú>u-:rך[5/=gZQUb@BI|b,qjRN'Roả Coҟty*eI^!El,Qd.",6^ d9_7SVv~g:/qhJg ~ ŭdK8Cʢ|޶zU$h1d:ٯ1v JW:O&,Tfx]8IG^潦n"U7hN*@:Жu˿XaA>-:7Wg:aC̓37q0 _e*cnG"d}^W L %7E bʔ o u!bC&ɬ4Ln>@k};d v´mdU0C%l-%Z !"f{uӑQ} 5#8 lwTc#'E]k`,Y)JC~"CZG/#DJg u6Ed[!ߵfg0F[fݎjG94=Ҕ4.fI2^UH+?ll5:/h9r!LdM#c0Ey2]"͜Q: bahZUfPppZ6*6YC5 [3t~Lܛ]`;<ʮԥJKVic!ҖY:'EQ?qS`%HGa\T}AMsT_GI.,I]!V#HvýMWȭdѦo/NI8Įޓ8דi"( #vb 1:,fOW/i9Rl= Sh,dJ⌬Dh %DŽ7YtkGM6!K]Z%(ݘ<[KH-dn{f~vT4o;\%sIкo۠{,cqN7fgd(f;eHWϒ9RM5K[ݡc[괡Z]*,0 7T0xYm<kW?fpcL=vw4L홟]RAeCa֩\ZqMMbAX`z5ʽ$tT:|zz 6؅%Opu M7_پEsfAˉ؈~ZڌOdkksz3-fk*,CxeC1aFޯwv WRA/bx |\g/Bk g'莿Z*Avt#ne|{"ժ;LtӧNbr*#8\" YNÚlU>( p UBXD|!#Ȼ)K,>"C1_A8k:mfDa/.ꞅ$߁r4rSv٘'/91w"{`hjqW;э3oVCw oۚ)U|J$,̏T2ғ2ۂN$G܊7]c@,g ĚRca!eݷ|Ҿ<@(* _f,llI/l||p=\o"i+F}kJ/h8F_Gc|zp<2*_PN{DVuw!< W*O1k%s2vMVR c[RG啕Zl*#!7NrXyJ[LZ+ɚAK_˽1|-DA3"%vђV(Bۙ2xk6m>9VM~ Ќ%- d π/ Ĩ]ߒة3%t.%v eh)vaԥɔ+P?EFo8;<9ҕM,jѡ !ˊ00!@^t@:OV@?sOds&fDLu|{kK+Ӓ\%]/gVmHȜ.0)&' pMʐϲ՛NF2WVo5w0%lY%Usͱh HH{W >"Ǚ?|?FV_Cͣ5f>T1Quh|E< 9S1q\-wD>ڼZQI*XѢY2(>O<rglj& 8Bܚ^9Ӽ<kg fg ;;aM. t:~O6EI@)=ܨBYU}?QVj6cRDYrAX8M/ Qmq!>d$ A7B&"xaF(ɮaH~$Ƴ'Ke7wÿ+*+Ɇ$bq?.j&JȤC4"Ra[Ͱ!u"f" P$"tߜQ <ٚA:dnX!pO;o^ļuf7x$by=0Oeu-5 ը9l'۰8~_0/+ CE!r1A{֢ģjXO"˼9UA iGN&gepe٬Up_M gAo:oq Ax h[lm}]RŌhOUdROHơnxkuVa<Yz^48,9%ʎy |%^&w.WK7[V%Zv^L#{u.!qns'щ<&qj>(zOͳ^ ѨyEs2XxB,Z/,%I炲K@+$cJaD3K%R m0vf#)ٍ5B GHniH%J3葩/U^La&oEF_G}pDZCkGVj 51j{܁iST"olZPKb3*jr ۂvv R7H6r}[B!7ZºY^ɫڍÊL@BB=sID)%bK& #ݭ=7lڪF$aVς(Jze0a4XL0_hȸ} Vo%DrJQXykuNΡ s$w'JkdYF',IYO3wMCb\ ql㕝Ұ5~IlSN1-LLr@(xg4G/Ļ YZW]`o"s g췠:7SvEmt;͎nw;\ƙ*6Rje 6" c>lG#+w4!+O@K Y}BvGXv3a'*E]3DS!8Hhceu9Bj{5(7\z P]D,|%}>w>f kgZeM ZNOɏ8Ũ SY@}M 1x4 5՛}mJH$x9#HBv{|TZOVd.xUފBW\Eڽ?LiQc-^Ns:'B"IEf2pmؑ%I_:ht.qPDP" .T 8ק][ H52=bֶXOpE@nnvlt=Yao=,AIZSSz}n:an`=tgS#lP*} U/ ;S ʌJW`L#Ϣ)u=%SU΂%f$kF#QvYO 4O h) AV 8] IF9E/Z 9+ؒIQ M>:5fW:& 1Z+), f"O?ׯ} b;\#RQTxLL+M\&d2E. ;A&AB1UV԰a5 w]9s\7q+G$7zN+? v;})WbKZ3/&eIa(Ï2VP7]hdQķX,7` Ep~&fRAX>Եacݝn7UƒSCP0AGX]\;~ `}ԥqo0X$s f~ϥE12 "N`$zY/'wwR2,7>T7OF=pIo(1oFyl0ܵygV%h:j`~V"$\;Fq% P98+c1~L&&֑M^;{oxAh3$97vYkL #ZC -׆LOU }6RzTlԨNy-ȱeՁUyǯg$v#іQD# j eMimgEljMF@ch[;Ӓnm5\bAt TVC} ^q7yДq=A @oXѝimOt0;8P(\d3;6_MC9@PIbzi@s<12y+RJu"-0AvJp.@7̓F:m0l3 6ZO~ Ğ}[HQ"R )6n`Z|I+Ӂ݁a]S׃ z{eIU:"ٴ]Wڠӱ_9 rmǃro~eԜHv]qckgQ!N8 ͭvY2.6 Ȟμ&J6Ru&.W,VXK;9ǃ4lWmSbӒhOCA}p┭ 1O۸^wG, E+|왱?lhC4v NjL\@N#UH)&-=1i*3Fɀൃ*0BEdzNX>Z{B:B|$Arvώ8O ]Ƞ鑳h RW*OYٽjOriĚo#zߋE@è ߝhO%2 (12(8'R@c4`ꋎBvoSoys0)M`ǃۼ(!ś~tYj^0=dQEz?ÔfAK2ERa;#D E#hbA;GGV\5,fxv"I%n((G7"NS ~.`*lWorMDpfIX sXk&cRbpT.n<BJ\uwoq! CrF4)6ry;}k}Maj,̊gB9Y)qRFȟ3bJaD\}vr.N+n >K[GIЏ cƎ̨J ps:v '˳B e'oY`ȖŰ<,7ZhDjﬠ}Pa<.c]xoFv4oCDDfv[N,ѮX* Q鯻@lʼn4.~UӿG|>Tkl 53ۇ !`V6u2ָυDyЯe xkǮ8ۑlaikrY?$pހE.Ҁ)n@ƙ!؎VM&}lss'cjP$.ɅizT_AߛuLųřxu#$R.T#{1R ܏u6nt$`Q@ݬ,Py}|1'Z֨|+^1?!&yV+c˲m!Թ%ۓGR"bJ{o 1!+7K e5O<WЖG`*;LB#骡P*lr)^]Ƥ}rwv05ey_]}Q9͠ua#_x^@)ut= ^Os:ECmK8PvoFM'K14Q1 hv'^~]Pkkk)#&'/͜;fXpC:r3a X=m7xדaS&"3`K⮲Rǥ?59$_| 5rew/fi=F}3<[BejaYRm] Uh1g^ r]s\&;^{eu$BuH<%0+N'1ijc N3RtofaN7EJ{ clt%q*|B) d]Ȩw#ra#WlzM:u؟ʫEC*Kkv$}W̮v]|SK _4D /)͐:#bR7QӞbsg8p2N; [ZD# /\orYR.;˿i cc#)r.bCL+f0]#˝?|J1tK]Apv[&t,K Ts)>M+Pgs^)l3wơjW2;P T apJ8EpeɀB]a$:^$S0Ղ\drXDNaYreFؼ AAEw)x6L6l f6.48 iW5`g0ۚ4'{M7UFP;:x5O ro0%ʯ(fkc+oQ.00$2$.eKH a{pL1R-WOGf!Pa뭥}"~:n|4e t(>ZHM:ɁcIvEMV8Yjrw/n{Nսzqn9eYm1O3T?WM ,p4TCK\Sn4#z}|ԻLv)5j0rX}]kZqթwuyB |S-S"Y+%> o[n*'. l&@kۍor"NnAԴM ,z]K5P{}oe]I2iOc_V7MH-BZ7{"~70á=[STu#@TTyOb~>,08E76q(-8듓6jx(ns )IW{;R)Ȝ(X)Zx R~4~/;'s˿T֜3ټVKǂQhåF~ u]/Hwl,x_k]L҃4fUJ]ZC0w$C:qoQ\r0 (/k4o\V\"Y Ƽh+c8Um~1KО|{ku@L܂8\Qh*;*TXWifu<i=9^2t֧>#lbY/8iy-dCNG%&s)B_Ee ʏ%#zQ&[u"si&[墸.1(NO:+/D֫0S-Se~`l$TUZPnFLwKSn6 ȵ`=xEwQ%aSvQ+(:5^%ꝨT}0@sJןޡ#$˩6`Y.JͶl O_9Nhy$CN .N+ d[ %,IQn&+-?wlm$WAxc :1-]ɍoLZ3%O,]DIcn tj%OK;ӳӋ3<rd5r^z77k=Y1HT 0e Y-͸a41U:46L3rAbAf_|"a6@Prek*3|]ᱲ4 zi4ryc 5/Š]~SN!b$tv_7^>qG߆|q'0QDlgq udaj>}aQC[2C1Ȼez2oB:kDrg*{/,hտ[|XRX*S(Jgˬ2:Ȏ؇ Gn$7G'7I)1Na2DoY,1I eM-WG|R qPA Q_Bᖵٻ5ZDr6齵+ $K\QАu>uv&d7QZ_ZA``5Px勤AwH ! .R-;ũkXZ7Aw6md#\*&|`EZFڔZV-zJf˻Ɉ&=Hwq]F|έ\\g!τ՚}r8#"E h~[tcb≚ ;m[ U<_דm.OS<ì@0h-̤=UA5T +,hn`k8=p4L$w{.!Ict_tQ{rBD~3Lw'ca:E裠y Sש;u<$c\gPFW3K;sؒo Q*e&YE /2%3* ǟN,I&Jxj+ ](I_,{ԑ!eӯrUlNۺ[ ԛy qvf8%zkHsPw?g Jtw7GTFPgvdGrKa~޽ɳv&96(@H&jrdNR=} Flۭ,yn:m{d,4J1N ^zPvĆ{9PZFSN=M~!al({ĩm|BYK23RRdsޢAF ly+$O";{Y|} LU $9x!|(x6[íG L߃,LmN\v3uY#Y<\򯀋sI/AFC@#Fʴ7mjs,D8/ݳi83K/Bo]8V\^Ӧ%vRdJbw#"2E+ETÂOOBЯ;?/w1߮fMͺXx/+C> NE*;|:1 /F6Zj'0ra$kO!vMS:7 @=g'eOȤ>zΨBGヸZ1;͌. $gQxAlzk,ݍ: RY k!~HAhu\qѦ맔K*Թ).VAi#P*a중:h5cȜOIz6yvկEy`B>%f}uRH>aycdX_+10Pw8"/1wpsPc`&}T逫& pORo!W^g)~9`-vݥS_8G]ʝ;wv,@}nfb*Ք"g40g(YѾ\5"ƉǴog8ԹX#Ws0à;JHs띹;WAX>^b^P" $b~x >v> gҺܱ[ֱ| r;1PTx0_Zg`ٳy?{~4@B*3lyeL3(ECΨn=? c[i\AǢ߶~nC-5'.>#`?m ecW8sc[ 8} jPCޜg>oػ[D A4"X%q2-2I(G.2{8n_tUW5nE~3_",R(|*?6Z0"P8"(\/ARvf~  })DIIr:cNb*`s80bGa쉕;0]?ӖX_Q'j^X;a)PJ0cHVrV5ewx֦yEjliZv;ͭ<_'BU ANHгG$ QE^nF: =HS7[@?0/fzt{m=$[񧺳ɰ# 0o mWZ X8=p5Rys)ܧ* ̗ϭ]-/QG^H)\{ |N/q̠Tj `i_$eƛ pYk#謺QQA{TlpE{0UHVTHiϑ~IK"p_o& ܚ4/,sע f͟6?Nhq^E]者0| \KW> @颴Ǜ'd߶F-o-mZp}Q6~GZq&.``q @&ڿ(oF.u!@lRcϩfnś+ ]l@th2ӫ+>˔)썙R,6*|D"AM7Mm*}}-rϬ `K"$GL0`+n2k&w1} s }OU^;1,@Z_Ӫ>h`d0 +^5X*"B;8! bSHuaV֠8+}j(-dFVW+rgMdVDjRJɪV`i_Vޯ)ܧJdF. ӱt"OyHa{YN5H]WԽ5!P-[>_v%{p=P5/qC]#^9ŕ[W3} wں$h:J:"T|e3i-zF랾-:F#~qI]/ ,o8"zޡw1t<:OrVWa:]SvU!04ENz3[~a _o;Y[\wR<&56擘 ɥjwePtU>x񉮆~\`dT )iD6*y+Gj. [TS*NSwz'!Q7?\T^ՙy oK :jMR"M_Bƙ8;G5bZ '$0O;N[Ʌ,ͪ3LyT*~_ةcIݔEw5Ba6zsYȷL8W>Y+VcV6n(rM0[Rq[gbZJ JRaOĭi h\pM*A"KY[&O"=i-ZPuf{G`i_8Aޖ_S~]^ K"]oOAnV~7dPlB˕{/׊ ؋XS+N8~;I?(2ҞGdrJY -0T-;0i=Su7Q-0,$Y?,V}vh,DnDe3=u]8/NZ6ƷDhqG q4b4r:33]hYHOF7A/XR")O /[c%;-8w&TVdEfkmJy<һ <@jCdgH+{Cx!O66w[:t0qP#eܦ:rg͊Qh䡯uM-~ݎx4vxy`o)ɡnOaGa:00y!\lQT'^;Jث]^Ql'cx\ᎇ8* G,':B>J?WnN ~#xIW|;&%mZj7@hr+ Y}*l t'xb3Z-JE@}P3t> 7Xv}-qt(sp^M&e;ǾsŘ%-SA-|xZRqEU9R' ԋ. `= sq3-͢@yde飩z(70a u+8npl3C1$'8MYp[7qɌr C2taHJ{<=_Xrxن/̕e{+'yEMx@Z4LCF;X] W#ސ?wz9p,ʌ{i%.Qu!\ ?~Ϣ4g *f9= rOvPe f rmHM tcb %{qJwXeWd+DAEJH6;͇TzXI&>VOXb/#Hr0rw ;}^D //@8Ow P1ir İ&EHWbVl_Oji<)XQB+i橷m ,FC7>1 D"w劏孱Īys͖c^`[#axbp:uU)k(sMl%gPL8KkD㘚n? j}xX!Zpj&4$P[kFڡoLruɱ6K9Ɵ>b{Oo2#ts.7!Rq,/XZTX#( Sq[W|l sk$+s=. a ZP,BqH `CiNl1#ሐh =* T |m_3=M8MDHg}H8B$kT-Wz?KZ Ew\].UYEp= w8_QqRz-P9T/p&“k۪b"cgS I>-lF"^MKsԮ.][nf7 (+qM̀X =Ӗސf(X[CuXCW`6oH=b+OpogBtE&Gц@FbyxQ[ n|1!XYQWE~/1]2mV)B1HFIdb2Qӗ:&MM>%Z[9Wrvv_`N@cc#T TRPAy*K*uv'gl23ep9 X-\%m=R-bA;%vB{t NW<ޒ"6Cah*Z!B'z" _3cHȣ.qvcńkMo{ԪHb.&0+7NgVܦDzW3nDU,eƦ{5?=<+ϓL̥ŪIYEq7жG\/ч9Eyʱ8 G;|o2%QgW暈вF3QAl+|f}uc6,i`EtqP-!TTB8gMp6b`C &5£2SUz9p&21}Y՛T uj(J~$umW-9@;wl"ቊ=gg[f@Ŏ'J~m_d'|1$ݷtګxf fىgwM 0ȁXݕ/}%%kuNy]Wz݊erd~Ș|glF]{Kb3urrC&ĠG Jwk`o7 0iE|([5٦ߌƹ~͑N.Ewn,9x1/qos.=Qs׏R3h1L^1<.} v/7ci GZVӞwf7i:AlD՗Ʉy߮HV6C\~,hyDo J=#w=oתW( *=ĥ{̔0w(e9#ݮ/MY?B7+g9`{0av ozA'[t9Wgwh 5VWa ^Qd+D>/y=GV8 e=~cFB5=\惁͞P>XAF@&%Q~c@FlXx6gWg WY'۶:Wg~]~IIZ'G[ Af1t@Ds@}kG$iN黛^,Db,(6K&wIQІϘMFH[l^.b\K2uhm茬VuK0M+=DN|rjyAfG]ľW4,h}ΪD곡B 49;. ʍChj9Yo&9)HdP~ c2&o<žNv Q62:<eБ4\&<[(V߼5:l\SHqlZf#[GpeJc;P۬3oJzAoާL[}nc@1u#ޯ0`<<$ ܳk`S=hjDJ_+GjES+!q}Xy|U*y{ ҃R[Ax 'F anh}7@pE mlc%mpWQ4J)iPEϲOi8swYHcuͰ[ ˖"QK|$ӕ6)<=$cUy-sULqH]_y[IOP-q8CSL<s^Z*Z iC+ *3.`Ϸхã*ԙr$D;,m9Oxq<_St pߋnMcbBe]h??ɳ wP~2EaZ[{>yҏgLr^@|D|UGS˂'Zu(mZl|"s]MV"˳7!fSZmUrM1Q\tw\vsl쬱ZbqjoF9FOo6 =eGHߖA\DH]Zb&:kΛ̄DCg!.R`̅j坍SdiqZʬmoIt֨u~63xl65>$;ɺO>ӳdr~滰bӥMN\gO'JC؎':O-WT|c(%žۆbT-j&odN=nf7?k# ֈ˟[0b% 5]?](<*@j aIR/?5+@cS;)œYWۄt$A`ذT &A͏\fgIͭe/;lCA{q+TGb45xAK5jL=uO1^<WW_%v\H =\G.=ZJUG=4 {!,*AsZ:0%i< 9f==c0!5('l.pM C`е@S-7wY2ƒORg;r1 ="&B#vP3]np `0kj4^#XjODqߢRFZC{+Yz!h(]R$X .XhIt@٨]{U@{ߙ 3xGFo`*mLAT^O, 7^JL|n<߁d${2u< aGrGWqiLp1S?%aI68h#..@t Y1|BIq3( =Ƃ\;xs%N K ֒icGiwc?$'SFᨘ ,y08PRT4(F%2toj̓7:Jp*<%\%b1N'E5!g b"j@ 85'gkEϣN&)q#aWoo%Rzٜ@s4vO[K:~Ae'ѿm?Sb A=ИqV@B Ez_ ǻǵ ̀JdQN66 E#}LR LĚ'QS!0|oji{FGc_H뜧U]"m ۿ`4eky3LRC VӸҔ1̱m\S3$_Q.̴3" )0bp wc:7"EhDuzqgwBՊEe)pPs\ *Zoq (7ʀ 6[X{PTI>k ®(2vw]VOYUZN \jL'$?򻁇0+8dNG"tWNI=w4<;i{Gcp,;Q(T\%i VFnSuɸf>q/OIaɵϱmioU|zi{6YjCҲam 4[NFxA},re⑐Qڮv(;GN>V3-73zVT$) Jk|Z/S+ N+^,|R+*_.݈2?g>%C WD+O+z)V.s~. lг[dߒl0 C ">d?4], hjNdY+1h9X'0ezƤӒu9#8/4c`5-8ZAŻ.:ݞ{z8FWqSF](p!'N68n#I'1lHUP/%y`$>[ y{r|V1*m0Sv'_o5 ǼC$ɼl<5/S>;*m:`O5JtB+DA#o_Դi䜆b"OI2ElP}& դ==a& <( 8:ztuXX} y {hܫJ/%`潗^8^Uv#i=i&.|rvk"Q9ve~1'?8q_ o6+o0 qxDg G&P4:*XF- ^ѧkba_f#?pΚ!Fb<%$̟Z;AؐρxmQkaŔ@:zD&N -52hd1`GK#/3M+1knہ#P$16I1-8^vq9fVooT>vϝy {thVSNiqTQ#[}V?Ռ^ XSg,zz[N'N0.hG8UrQ-\Cxa" F k_pJw"wOQ/e"xuB%p吶a IJ3b8 @SqBzt[?^!h'&ݿ-qnZOKJh QGdKLU D E0sd7Y7.՝hn4ܔy);]alЎtQ+&e7q58ǔzFdݟf[1P{|ٰ.'bp13b/;}ۜ;"b $,H:ПyIIԭN7 Q,ca~nb, Y19jF!“!0ӵA|gR<G$As% \fh> Ad>U9i?,쏺 s{#TXL1S# pBiȮH>K*Zt׭Zo%_wX׆}3. ^JdCJ67pyUPĚɒ(Y&`/ֲpIuS]S/ 9"`ư&Y;$իN@vq`d!;Q܋"C}V+\ίˤ*XTj\#|m JTj1붶[$S'dA͍m@IXJf2k,6Dx> #|LCL-2)r5eQJ[2)bz0CxLEcvT/J]Q~a6 1Oeck/5ss紟t?hr43!"A{½׵'j֫ SPPh?l"#wJ8ݟ O0+FΛNڥ~5.l!5пvUYRt}r53r,^I;djGJJ8 _ӳ3$]Zn?wf\˄~*$uWٯJbғ{A) wQ'Ab|>yfB2(\,j;r9Y !+چw7L|qƿ/aq Cb:{r%=^g$R XB_,/k[ȍz~u(߯+RXoUҁlaNۀjvpP%,һfMn1K(=czg-5@ g3}d Ϳ ixsF5v_3?S`DJYL!* >c[x5:<ֽLA_q#:h8/{< Db ayKvͤЙ9e )Y?C$hJx3v뗏/_pr˕3bpi:>'Qɝ^߇_s 3 {-QB՚hԠf8W(ѽד,m֟-⸇/Oʹ MQF(\YzQC5;iY҇6ĎB"j}hp=挎%scT3Pn=| E㏇3*4 |+XI/b%`d##3azVt}y5ʖS/o\4 Ouɱ߿X/1%㛖NGt3B~4n(.F;n-zs\( z:C;_lgn(9]ֶ{ԤׇŠaт> Grj ئӇ9j}f@?ە W5y_xy hNp>'iCxO*:}(jU;7R P^$-(sy~pe[ h0BPrc]D6 NCFM,ѝ1ݩ,s 3)"* H}{lO#N/&b$rkF262cvŸU [l8#6mdbdsEL-eD[~.i2QID  5aش^ReBF8P۠qr . RFo:vʓRiYMXyO*! 9>z<;hDLS YqqKyze{SzJrO,!d]z]zBQdZeҡ{=-P}"og[ tRNeiSLnaJ߉L"da^"y_x!\<:֟t2z;+xFT"vJq|/浏v6ݯrTb'M<'#>9g؉ fH>Lie En/'tmA2DMɝOsvLKw:T@Km5ogSId llTeaj%ϒ{J6^{̑LDpx@8?kƐݙN^DY,{VT}S2(PPjnQE~K R=E!fo2bF]ˈ ΄Hc]efK%(kt+(3yA9],V\Z$vb[,q1\ a+0ȏ #8FQnp6Oo'\%ec-e_΅ [0)V%T8 Ȧ#g pz#ƿ<5#T*ʕOأ幸ĪP9kWoX-%)b686GSӰYm5SCF\s$tPZZ+ Xs"q/3$B\M!bݓ\5Ҹ<kNո?jH̳J5@\81# ~*W֋p8f 94G@96RLpl9q1+!kV[hZtW!~5 7f&Òg\B،UdPm\~BPI i1|]mu 'y4dE}a RZ 0q%DnE8ѧJiQfS}1Xu bjJ2g h!ҀH`Hi>4P@*8}e#!#Lgl=򏰛{ %ai6'zJJE/ Wq91<S.EBEA-fC4ajXbGa'UňD4dYCF9 xSҸ Og 9 ^T^nPzUu.k\QZPBhYW@D#*)m'*šuߕ52 i5?h%۹˔ς ,h~ft”|2rtػ^fd4tR9+Zf:;^mR1mFDW8nuN$Ýs,+l3 >KmNj<}D8V ܢ t*ӌijgjt f~l.Q70L2t8ݍDi?H@G` ""9?gJ1ꂣn'ÅX:b- E.j#QU^W8_ 6N.8=3w$+BRʝA4GWR ڍ@"*od$K]ҋA#d@w؋sLzkK ~IBX`IYMGEC6#}|t*6%*aS^Sԩrv>,}$MkDmc)qsߝRrI!Dj#%l4NMVlYĔڞi7m>mN Ɋ/rLҧiS6湑) .<(`֬96vQ]r]Isz?坂e*7(v7,Y}ю~껹۝HZLܼ *5s1ad0K{ *W.$:rȡݗf%mK3F;t(42ڈ5\ )\жߜ0 `vg'Ck~s׷Mg f`جwzj2ߔϠ;z+FF\E_ٚ}}X؉ެk 77YL;UENj`ilOw#-d-#j:A~:d@[)!26J +VR:dDW]-MoT=_z'= q9w`H%]VRw]M^`gs&ѝ`UAjwݸd,ݯk)+lvs%{9;zymؼt}NL1_>FnT#hDdJZuHo_œ~ 9Yj$$f?ZAB݌FfȭUCtgkYƄQ2'ΒN-iO;뎨XE dJ,s[]Sӹah2˰6sPDPXqǤk#صג8uк/LY`\ׇPi_Up 6rΈ&9 c1#^=AG"kb)L WVi ( kl>';MA$td9Lά-&,y$,|SU|K݂On1tT tR7N2|nBO/f*}GN lu[U?/5'"xRnŬ΁h>W=ؤ"UFzǒ`6nVgm-LWwDgVŇt&Zm5i9AZ$var.zTOY̓b,8JdNyN'1k}37-e[-.o8>,WȴsS%h0q"Pr`( 86wdjF&5 qS5`M^g^d`jJvR̃wQZs@8>XܠuGFNJrCj.Xm{q2$n4+Y‹d $NnjA4GC+~}?9zI5/AeX"L#aWv:vC@l3i.J<8ƺʅwo5{>tp>[l$loԧQƌ n/wўk~CD\( lhtԍsv냍Å/.Znh"lTlw.aY5,uK M\kcK[PoOǞx9նggg95,S7}uUP(/H78kQ)*I&$5~l*J|tEǟۿ!'+s$3Ny$G~/9ⵉx2z%O5v ?d~ W7"d'C3B'fЅt %ӐA5,_" /[|}]dΣ_l\{>k!s Q($ qY08絧h>" DXғZqL7OfsT6EV=*! pEO9&v +?"Iֻ+Ifdt~(s=e)hZ<՜Ny5f3A_u Fe8B8ycO{j(@h*7ʿI;ؾYxFg(CY %7'pZN(_m5iJ{3{؋Sњ!zQچ/0@}?4:(u ;ֽ :rgz宰0ULG|':lr!w]t!.{k_ym>'\eQbEq ޴zP= Pnvu]a\i߇J =bH|2<]_SHu=')ѽ|B~,?IAZ«?.^.Uϓ!l:wAvn +~ɵSdMndV ]8=Si9 RW0韝yJ[Ǭeg ĿZ4WVIE,KuygR}ZLCCcY[\>;)y0GLE=䵪wPsBTO _Ht ,ygay([ңOe؝Mzgw!Ii28<\XՕx5ʹ>Kş=!Rv|_} ekqh7 w&&" Tnݰ`][N $Q−صp;y+@tӉUQ~=^4s>/_T0P.#GB/nemgy0(w)$\Me=2ǧx.'yRֵ0Q9Y̩ Ac*:|*4#˃59ڭ}ثKn8ʤs)[`8ڬ*AG O-όin8O XupmqÇu |5(5y8l<]$Y-}.HV|>7ylޫIc` B^NeE);}d ѿQ?F/ 8٥a]. AuZf@DEhÐr\*lPL;㴌*CD<+9;]w3C) I@,$LldS?q _gpv'XpǝQ aV1hG\tv(ئGͨ\ˢrH(}&ȏ44~5 kh.:8# @<} Qz}9ip.@/&h}S.e"+Fr8Ǥ)*JwWSЧhTKU`GNB&Xs`ֶqb.\ϓ:D`۞7~ S@v ZO' QEԳˤQ 񇹥W9u G~y͜XV{jow uSC(+gsobQ6X0ï &/ ElEDYcS.2CCXJ-59)HǓ Q_cKY@oNS\]xbhmRd&[SAI'A1Q,n\ED,.n7xΪ6ZQ..?Ix0+5 BT[]Á }}K;Я2 >U!ԃU0‡w Mi² (v10 b1NȤŷH 5pgFon r`J6rPNɅs}=d.KlLDAz'dq yq2!)ݫWH`D6)0vf*@Ocnʍ1zҌ !@ulYI$ B1W.mMM2F"-q}S)6lt$_L"f{Ɓ:Gen dZ)hkb!W%usKt0|z>ΓQaj葶"M%x5g!.aˬ/?yLaur5'B|=,ӾAwG+o,;[҅H}:b?WI#d;%m#࠘@0k-AG.E7$̳^f NokbۜU+y|$o]h s@'e~2kxӼ\ńw}.?)`da W ^ZOZF2w=&uP=ߒB޲ ЫnZ9D98 '.T,us!.w *Px0_TUe _INv|j.?XW.D(y|41>8}KhK%41;$m&Xa+ˠ݌f ]Ԭ{#̷.R'"O'kV F@f2~z1[ସ% e&$Y-F@'`*+i(V~Rq?N# T3dqW[],tr̕;޼+p4 ޳]}U,q;!eyvɾ),+qY"n?͕3FuR&M &: ] 9Q#1` guۦ M`9A&^m("sUW oCl: ERIcnm}ӲKߔh ~_fWKȥȈY(щP$6O0z-skΜǽo<tkB4<,Nba63}'C[ S&׀_#UN+l_w?&@brcrQZ5{ׁ,2\d2ڙr ( hѫL[ǁycDgʵRJS(:p-q#N`ύ҈%F;&3eU1*MM9ܣ)ļSj!o{E_Rnn¾>)>_FN nI|~Ѷh2, 4#(fw{BW-QuxI"|.N*C:@^sk\kTx;G<+$uCi^sԝ3DFؑSzm'W}@;%- kal{H3 WY;zó{JXG×va&`,3"(Sj5b봥xbzL}J1^V vJ1f&C1Y5`R?j[x"AtSsnooTxTxH^ yz7 CU7h|s$#2+óy-ő<h0]gVkG<}_"W5)[p)}ʄ}bAh'?8v???sҴh^6X@˼hsE{ ݉dvMB)߂fWG}}Oa7iz z̩UsVYh9A! ,\nUѲ_wl,4U$=_x[rBe*IE)vZsv zY(YxWAF2IR(?ҌP $=E$BWUw=)iZ {ƬTD(w æY_VY?9"g G]xa|t{Gu083fcLٗQX5\敷izL+BA$#aG:z^(8( doHÙF(d|~|  +lEr4kކ+jd~n%{ ,1H ky/AÎqHKa'r(m?To_[f]-ƞqXYvq$w w,e)G=3{CT!XN*\w^0Vؑ0)lotSd1`6kga%ğ!Mi*@/xfsAb/QxJ ~~z *QVǍCs(XBtդ #y "~b,Em7jo])7 yr3kt8M:< ALfӶ JGla#)5lxc(/_)뇘w3FƤQ)3 "TsjD?>Etkiq1߆Lc}{ M3+?NQ^S'O͌/:^a,oYbs~mء*Cα>vjjy7Cg-/H{ I!vfSzWQhc]H <K.hFyƆO;[p C7]Q!ޝZ6TpЫic2Ϗ􍎛ܲ[H3ZIE֡{Sl}M<#,g8<ϳc 3ApY_J3'5%(:IiP?h~8EtdI .(N΢8'ћeG}.?-j'fD:3E 3q99]58mYYHLC `)8pަ4|6U<+@x Y|"Wz˷3s</hc6͍=!R\fqttWwVvX6%6 ,e,Sτ-::DMgբsEh+.g˕DlZ;H8ɒe}9PdQ&[c>.AE_N)1GBvxSrvSB\m`tiZmhb &VЮ.3)0a -i/CSJ4c\]fV S)lfROv+mmJVEc3de^M \()#ѧ`Yh"sx AGo~rs/َ'!5Vڰ=fDR> ] LaUjD`lF3x Oaoi/P0-jkH?=z{|Y?4yy|(_kY5{$oʢNvldF&QDRc_RFs,0D\&n˲0V `մIƾtRv&b[̩͈C -.+1tʨWq@v`ΤRzjze5*6Rk) QV5[\!7zfzxCbjI 7t!d:~ ^BV@3]8 ӰkҴC[Mbn7Ji<įm%fVh}i(ۥ8T`τaza(۽c 9۳[3|UݑIiԯZL{TU'N?EڦƠ2pHg2 'f,3 H;Y\ W|_`[޶4W%U$*Di͐JBjS.M]4ur[|mmTP'oH`툤 gCbo+6Od#f)މFH:yToV+&7WJ)чQ}7?G,?,iA9-%:JN*VC=k!Q%;H%+ZrOcK•̉}*|_̪tUdO񂊃ėIevU%㼁57wS"BfWsjX-BDx| ܬ,"MU'jj`WfZf]5M-VO+$~ {@KLHV#ibOXX&:a;.Y/l̰>*s45IˁЦdJMScx~(Ii1"km2S.)o80՞zӳYx}((KQ^KmЩjvJlAn*{wqLQpx@%X3G'a*Ҩ\?$ɾK#hJ!# < P&8K-'b"jЄ=8ّ;W{+Wy:hXVҢ5~݁Rpz XRlO5k" fe{_ma⏕yU3O=t.-pF*o鑧gtH |ÄL<|>(d"1S.Gr@q1~Z_C\,+E(g xNmcs,*9U.=|R2 wfD!j7Qg|A%3Ƈ9gD(IpGVyDĕhI&FTt9:4rDe6?e 2}T8o'";_g&&ʃd h!]zP4D8t9zpXz6gB s(kX YNIX$*شxmd3%~%J,7)MNRq;kSW/tbjK3y&A^u |ewzZ{MM>aG> qZ=n2>BbnzxSˉ& *آxzچ]|41^{yblJd6-:;vM\f0 `0s!&f1Kp2$ OQ+`-c^jf3!RqpU(o9q:o%WV _F9:c:#5/{#M05Au ULɘ pXEH8v'%LUa7/b{⮺`\|l rC~f䚝9BO :,|oXRuI)`?8)Cn[2HoBGE_ZoK}lZtsN ZY:.D2m^d'/6$k!e:PBq:OS15-,1Ls'n^?GtlpN`n?Bn^mڨeYA+L ZoY2a]s>F^v_LX9FکHi+x|mԨmc#B l[Wq@̝]j(+@(Yv5|{._'%%=*\GVMI^NeŻL`2P_;\6.a8~I( fˁ##IQK.d>RAFU=nT#)7pY|WXE"i' q!ʳv4W)pƘP+GlEhN]#AOeO!DQɣr~T >ckXA6ކ+Jg D]QLK&xnʳS67XaL~ 3/SVxM2*;e>]a56.տM? ")5cz(rb {x7HF.: v_uG@ʤu\Ucz\籗1(ޫͽR*vHBd#iG 4_樏wqQυFH^̼ܧ\#fI.l'0o'Yzŧ0IJ/k U`INw2r&!l |-hCCtnr)b2@+Irpno{œJ:aBJwolV/9&08P0NJ܌:6 0W5LLr%$ Жo6"osӷk@|8qAz3 sC̏(r*.|Igh̲g({;YzS3 Z1N8cDf7.1;_<)vXPD\I_X>u̔S͟g cUZ$ d5|Q\,٤)De*Q<5k#\3QW < 5M40dNȚ"XTqHVL$Wex H3N|6PΝh>zT)d@^¢0UnNm.O e`A 3D!‚-uf}eM7ڃ9(Q=] WڹQh{P1 㡓V/'ظP*yw4~w5u;]I$zU!7u;ڻO!UuMY<TS wJsQe uh'x.qx=R(*LP~܎qASX nf>\=a51UzW%mL^Cia?"NΦ)E3_x_j)be>5- DYQJqZTT9n)}%qj`P~%& c&Hκ8]T- %wi| l;TjB^.l: (Rt+תy8*q! ?q/Щ_' Lf u] 5Q&(yo^_IuZW}޳ B[W .'|v=[0d'(C(>^^CR+4".VV*,?xˁp6^{"c?57Ɨ8DM-IݓXtgG3AJÙG";~ݒ[npOJ4$`#E}_f/CtZ3tnM;ͤ]#YMHZkge?(k WB%cU:"f=@v6 !:K(M& m Gr4#wGӖ 9Loij6%x[Ԏv#zG]F%U;Z k9dh2EZϞq0#} Q,~8ݯgyX)ڕ-3 2<|>?(t73\gG7ߺ= /"đIvMo5 0H̯&IpTk~R^ W_7`69>',4H"HGm?tkKܑ&ڥcXt,40Lꥤ\KߐHЋ@Ck!1vLHs\hTtp80a+%;NJ>w#SE ):m nIc~kM}G~IE(ĘA?t3!]CgZTpPTs_,Y \1kIiocL涜(Dm"?E ZJc8AgB:Y8ۘW'*[utRL#P-fv *D2%(8N5:3Gh;;3r@ؿ7qmfcEҫe5B ťƛ|(SO1T9E.4c?ri9`[Fj"!_v*%}=O- WwBf>$YB ;'M:H)"\M>PBEcԽ6q4s:ra1L3늫 V5d %J>XKf."u@o! -E1e7,cBtөc1++I񩏑5DY{uFfH6-Ϛ`2mbɢ x${@ӗ<&'o?T-=G5̖K$Ȉb@t6*R]mC 2N`Y;JRԁYBDZ2se8̛~t߻>2"T'Oq zްpGx/3su)^Y3xG*Z0YJ0uaIN r(3-SCLN@$* ͅ{˷X7V 0R<9`RDN7!/~͒EduBiί7INrJG%%9h<  N`pT@\s\ze]1kNJ-h7[SӾ=?s]1*l+03*A)f&Z{'9Ld;99vJ3fcb G3AFŁ0¶!E.`U_ V4R-F26~tTșF E½⼭( ,y+YIXϓ_D/1VtDe1UhjX+G?&iDߡF@-}i%vĺIJX&ru>r_ToHig@=n4,J;ECEdSM@gm(ɛt)gӟM ;{=*{!ݞr|< eaGLؤWaxđȠʓxfVGt1k}V ao.'C+qDnЂ8} e7 jpp`щ3@EC^T~L&U'O~&iE[=Tٲel)%{4-sJ8[?1M:.&Fg!ՏQ%myO_3=P֑fqb^n ?4Jl醙KY'g-{/Q=,͛v}L: /tDhQ?&9 2Uq~ $m:bƫXEm' ,tOeSȽ6C^EZuhoUАİWbK'dh6zR#PF`2ޗ~p({]FEQ.)-y)I?em{2\=HƀDJșZTvˌ L$ދ}/qt[l!z sgtdHT*+g +Mx:ﻡ_Naʹt̐^HxɆ%FҴQP?3=Yxiw )MWLUv}lzM){[ś>i{~n^ڟvc-H#Κ{"G9ڠ|V/~Aj@ub[ڍB3ZY*?ŗpHvbӲemTvJ4XҴpc}ƽ4&}}9 6&SnINI~[A뫏Ocs_ثzdBv,Tb4w7ⷉ"ADDNT%5Q Lw%|o=>9T~R=bcw~1=1 1(# ]j1Ag+}mXkQY? ' A(䨖R;6f7t+i 1h&R)ipyN[HmQ,j[q8R%g|\hI1T305~2n %:% x7~$vMTVca_'`?V{ ."Ms^ ftETc/s뮱q/xtx:B`v;Xp -4f $|2R$맪}j/OL1} ?6y_Ss 7gaWhpLq&^3(D8*~!h̲Ix=ēsd~Mls;gp3Ov #qSI{B.V[>}]o4NH9[%IAbv{ۧzp&src\׸Մ>ҿc<1,AIT6mbѾmgwΤ6fDV1,5nmrkN@2I'?[2/pfKB@vi3lr-z%żW(hNrB, DlfY½VV.]XoT&ȩ: }*=uBh ىd6Y[W]Y&vFYoVQ* 6XbL9v9@^^KջE~#,͚x-Y<Nv Mÿ},ES24&Q>O}=^I#җfKrF [~M DwQ)i“TAA2̪ kY-Z M3h fVU7"fL. Jo`wE?E{#NW_Heo5nFp pPTZ֕x}hb|9WpyFKu@DqC.=bcY]h7B_{Yf4,?iQ ϺI9ɨ?+6St'f2g;g͏}D9SDZA;HNt=] C24^Qq_hXQN@qH 6%{w3|ps+!%s3$}y$#6Ջn$@z[-yGuV,Ҭn =%jO]i7H}8# Q&WqZ؄Zv <8;xT0XK92+}Y_"ɉߏa@CrkڴO~$~+ heUKv=Y)HuvWAiGϭȪB,%k Tu1-x~P4a.ԋG=axb8BGcj0X6{<{8g^˨XΔ:+ %7;#k &jI+}n +zm@kG89a'"F`f!uSv]".!ەSãR(ixLH'#'/d@#n{qwhbdJfv+Sti/5gBXdtvF@ȕ  ܾh*xCvg(u~ qۆr\EȆ?9wi aUR4`&x 3mm4m-J#AP l49s^̤rv^;8tmlES, TLs4Dv|",4ʼn hΩ:dY3eEIw0` MQ+qoS,L${4Uze|؝a>BކP{Zh-1S'XTST|W\])g7Prڔ{5>O .yXB'l(=c47f hF>Fmp@pީ 3W zY<ajͳS'ć4 rTHC8VvyԶD0 15 gk*)qm!QZhV7^\k!OCI)fpJGC'P`UX Э_g.+\2~K3]%IBBrhϾ5XCQsG=Zw TBXa.Kal[SC[䘴9q9ij,iC-H}Ϫ s[a.bw~#O\!Y\s) gR%@1-'::Kh[5@OPzM kWhX5W(89&zʇ;;:#kIfW8?)^? ^?_m2=BVg yNشR8["u -1bvOtq@d<ڍSõF>@Jc]aHnk./B>*DwMt\"þLX6 {w;~b{ȰYhavq[-*F~xd",sl2t4(Չl̓/UÃ), Hb$&5Iod)`O Xd9/nuR%*%j {y*Hއw ^kNͱ.glzM/C!/W&.U_F_8qNX9xPmTdm.xy:-{QtYf[VݱjSV,D&8%"rB` &wH-b@VnL7>{0cQ?"뒐v}µd_V2Rk2`:fIx0qwçh~bzyK6Cns5"Vt̆ 췤Gd}?S::[<@ v"Rm#"Ǝ9kV/ &S4u(JmI)B/`N͒D&]4slGQ~vbr[*.g+l.鱏sۑ YO!()8M#uQ,ޟ݂̚(̦7šOV\D""~xt鈘#O9\e/4" tzSPu͆Y,aT;qd^kFA!"*^#d0<da9'`+uŁ]%A}ƺ NsoUS 4.4 Kmgӑ-lSO)B) `Q|>  v9T 0mplߔNG $w*^5ʄIV+J^77}HLAEg9t֞`bAo?|lڸELn &%0Z q=z; S;.Luh.doQWm36iJU&,$PWp ?E~NW{'0E(,1+=YIn"kq= }`[K({_6zyh}i)ٌsU*EidHz= NYK ~Xv1Bskdgf2 4GbqZ@ZvC|=mXH* 3cs7^"eOC5{sü!@ mD7ϼiroa7Ei pN'S$!;x- t8Q8 FHR^k{Y):SYܯU4<_;EXrd762 P%c=Ӗߓ 'X/յD߄VPuz{:ܽ>4<$@.~a@ț@8ҏ3cqz^2-N;4yny?<^ &hL YZ