xen-doc-html-4.12.4_04-lp151.2.33.1 4>$  Ap_Ȯݸ/=„ #&lXy09OtXS`fqy*vx{STC(`ۮk,ДVEF|N-jD?7uQ1Л\jCcxɄ\[;[GnT=&j3yb>q O# j:_)a5)?"Ng ˏmq Q(jz| >p9?d & M AGPMM M M M M M<MM>dMO(s8|U9"U:9UGDMHxMIMXY\4M]hM^ bcdefl!u4Mvh<@FCxen-doc-html4.12.4_04lp151.2.33.1Xen Virtualization: HTML documentationXen is a virtual machine monitor for x86 that supports execution of multiple guest operating systems with unprecedented levels of performance and resource isolation. xen-doc-html contains the online documentation in HTML format. Point your browser at file:/usr/share/doc/packages/xen/html/ Authors: -------- Ian Pratt _Ȯlamb75 =openSUSE Leap 15.1openSUSEGPL-2.0-onlyhttp://bugs.opensuse.orgDocumentation/HTMLhttp://www.cl.cam.ac.uk/Research/SRG/netos/xen/linuxx86_64ot9DA'6@7x3#B( W c e $,76H"yjQ <3 "z79 ;#\xAAAA큤A큤A큤A큤A큤A큤A큤A큤_ȭ_Ȭ_Ȭ_ȭ_Ȭ_Ȭ_ȭ_Ȭ_ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_Ȭ_ȭ_Ȭ_Ȭ_ȭ_Ȭ_ȭ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-4.12.4_04-lp151.2.33.1.src.rpmxen-doc-htmlxen-doc-html(x86-64)     rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PartialHardlinkSets)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0.4-14.0-15.2-14.14.1________[f_X_Wr@_)M_{_^)@^^@^ϧ^x^@^^^s^^ku^h^V]^M#@^0"@^@^!@]B]*]X]d@]@]@]]fl]M`@]B@]@]]@\\ޢ@\ڭ\\@\@\@\,@\7\\N\@\\+@\\M\M\\\@\}@\k\X)@\J@\I\A\?\=@\9\73\4\$\l@[H[k@[@[^[^[/[@[@[9@[v[W[CN@[<[6@[0@[0@['[!@[5@Z@ZnZ@ZZZ@ZmZԐ@ZZZ@ZZ}@Z}@Z}@Z}@Zz@Zz@Zo Zk@ZV@ZS]@ZOhZ:PZ1@Z.s@Z&@ZOZOZ Z Z Z@Z@Z }ZC@ZYYYY|Y@Y{Y*@Y5YA@Y4YYYbYY@Y3Y@YJYJY@YYV@Y@Ym@Yw2Yp@YlYh@Yh@YS@YJ_YI@Y5GY0Y-^Y(Y"YY;@YYY@YtY.X@XQ@X@XۡXg@X@XƉX@X @X@X@X@X@XXX@XXXwoXs{@XlXWXRXQ4@XEVX43@X.@X*X lX&X@XX@W@W֘W֘W^@WiW:Wt@W.@W9WW@Wk@Wi,@WbWZWZWZWYZ@WV@WEWBW=W;W3W1@W1@W,@W(W(W(W(W(W#LWVbV(@V3VJVxV'@VV2V͛@VŲ@V`VwVVV=@VV@VHV@VvV%@VV<@V@VS@VV@V^VwVqR@Vn@VXEVUVTQ@VMVMVMVA@V;DV9@V7P@V0V*!@V V@VCVVVf@VqV@UYU@U@UUݪ@U@UnU4@UUK@UU@UU>U@Ux&Un@U\w@U[%UUUPUKSU>$U6;U%@UU@UUU.@TgT-@TT@TZ@TZ@T@TT@T5T@TLTLT~@Tl@Ti@Ta@THT?@T=@carnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comJames Fehlig carnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comJim Fehlig ohering@suse.deMartin Liška ohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comJan Engelhardt Guillaume GARDET Guillaume GARDET Bernhard Wiedemann carnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deBernhard Wiedemann ohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comtrenn@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.dejfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.deohering@suse.derbrown@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comjfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.dejfehlig@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comohering@suse.dejfehlig@suse.comcarnold@suse.comjfehlig@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.commlatimer@suse.comcarnold@suse.comcyliu@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.derguenther@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comrguenther@suse.comcarnold@suse.commeissner@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.com- bsc#1178963 - VUL-0: xen: stack corruption from XSA-346 change (XSA-355) xsa355.patch- Enhance libxc.migrate_tracking.patch Hide SUSEINFO messages from pause/unpause/resume from xl command. They are intended for libvirt logging, but lacked info about execution context.- bsc#1178591 - VUL-0: CVE-2020-28368: xen: Intel RAPL sidechannel attack aka PLATYPUS attack aka XSA-351 xsa351-1.patch xsa351-2.patch xsa351-3.patch- Upstream bug fix (bsc#1027519) 5f92909a-PCI-cleanup-MSI-before-removing-device.patch- Update to Xen 4.12.4 bug fix release (bsc#1027519) xen-4.12.4-testing-src.tar.bz2 - Dropped patches contained in new tarball 5c87be47-libx86-helper-to-deserialise-msr_policy.patch 5d976da3-libxl-attach-PCI-device-to-qemu-only-after-setting-pciback-pcifront.patch 5ec2a760-x86-determine-MXCSR-mask-always.patch 5ec50b05-x86-idle-rework-C6-EOI-workaround.patch 5ec7dcaa-x86-dont-enter-C6-with-in-service-intr.patch 5ec7dcf6-x86-dont-enter-C3-C6-with-errata.patch 5ec82237-x86-extend-ISR-C6-workaround-to-Haswell.patch 5ece1b91-x86-clear-RDRAND-CPUID-bit-on-AMD-fam-15-16.patch 5ece8ac4-x86-load_system_tables-NMI-MC-safe.patch 5eda60cb-SVM-split-recalc-NPT-fault-handling.patch 5edf6ad8-ioreq-pending-emulation-server-destruction-race.patch 5edfbbea-x86-spec-ctrl-CPUID-MSR-defs-for-SRBDS.patch 5edfbbea-x86-spec-ctrl-mitigate-SRBDS.patch 5ee24d0e-x86-spec-ctrl-document-SRBDS-workaround.patch 5ef44e0d-x86-PMTMR-use-FADT-flags.patch 5ef6156a-x86-disallow-access-to-PT-MSRs.patch 5efcb354-x86-protect-CALL-JMP-straight-line-speculation.patch 5f046c18-evtchn-dont-ignore-error-in-get_free_port.patch 5f046c48-x86-shadow-dirty-VRAM-inverted-conditional.patch 5f046c64-EPT-set_middle_entry-adjustments.patch 5f046c78-EPT-atomically-modify-ents-in-ept_next_level.patch 5f046c9a-VT-d-improve-IOMMU-TLB-flush.patch 5f046cb5-VT-d-prune-rename-cache-flush-funcs.patch 5f046cca-x86-IOMMU-introduce-cache-sync-hook.patch 5f046ce9-VT-d-sync_cache-misaligned-addresses.patch 5f046cfd-x86-introduce-alternative_2.patch 5f046d1a-VT-d-optimize-CPU-cache-sync.patch 5f046d2b-EPT-flush-cache-when-modifying-PTEs.patch 5f046d5c-check-VCPUOP_register_vcpu_info-alignment.patch 5f1a9916-x86-S3-put-data-sregs-into-known-state.patch 5f21b9fd-x86-cpuid-APIC-bit-clearing.patch 5f479d9e-x86-begin-to-support-MSR_ARCH_CAPS.patch 5f4cf06e-x86-Dom0-expose-MSR_ARCH_CAPS.patch 5f4cf96a-x86-PV-fix-SEGBASE_GS_USER_SEL.patch 5f560c42-x86-PV-64bit-segbase-consistency.patch 5f560c42-x86-PV-rewrite-segment-ctxt-switch.patch xsa286-0.patch xsa286-1.patch xsa286-2.patch xsa286-3.patch xsa286-4.patch xsa286-5.patch xsa286-6.patch xsa333.patch xsa334.patch xsa336.patch xsa337-1.patch xsa337-2.patch xsa338.patch xsa339.patch xsa340.patch xsa342.patch xsa343-1.patch xsa343-2.patch xsa343-3.patch xsa344-1.patch xsa344-2.patch xsa345-1.patch xsa345-2.patch xsa345-3.patch xsa346-1.patch xsa346-2.patch xsa347-1.patch xsa347-2.patch- bsc#1177950 - adjust help for --max_iters, default is 5 libxl.set-migration-constraints-from-cmdline.patch- bsc#1177409 - VUL-0: CVE-2020-27674: xen: x86 PV guest INVLPG-like flushes may leave stale TLB entries (XSA-286) xsa286-0.patch xsa286-1.patch xsa286-2.patch xsa286-3.patch xsa286-4.patch xsa286-5.patch xsa286-6.patch - bsc#1177412 - VUL-0: CVE-2020-27672: xen: Race condition in Xen mapping code (XSA-345) xsa345-1.patch xsa345-2.patch xsa345-3.patch - bsc#1177413 - VUL-0: CVE-2020-27671: xen: undue deferral of IOMMU TLB flushes (XSA-346) xsa346-1.patch xsa346-2.patch - bsc#1177414 - VUL-0: CVE-2020-27670: xen: unsafe AMD IOMMU page table updates (XSA-347) xsa347-1.patch xsa347-2.patch- Escape some % chars in xen.spec, they have to appear verbatim- Enhance libxc.migrate_tracking.patch Print number of allocated pages on sending side, this is more accurate than p2m_size.- bsc#1176339 - VUL-0: CVE-2020-25602: xen: x86 pv: Crash when handling guest access to MSR_MISC_ENABLE (XSA-333) xsa333.patch - bsc#1176341 - VUL-0: CVE-2020-25598: xen: Missing unlock in XENMEM_acquire_resource error path (XSA-334) xsa334.patch - bsc#1176343 - VUL-0: CVE-2020-25604: xen: race when migrating timers between x86 HVM vCPU-s (XSA-336) xsa336.patch - bsc#1176344 - VUL-0: CVE-2020-25595: xen: PCI passthrough code reading back hardware registers (XSA-337) xsa337-1.patch xsa337-2.patch - bsc#1176346 - VUL-0: CVE-2020-25597: xen: once valid event channels may not turn invalid (XSA-338) xsa338.patch - bsc#1176345 - VUL-0: CVE-2020-25596: xen: x86 pv guest kernel DoS via SYSENTER (XSA-339) xsa339.patch - bsc#1176347 - VUL-0: CVE-2020-25603: xen: Missing barrier barriers when accessing/allocating an event channel (XSA-340) xsa340.patch - bsc#1176348 - VUL-0: CVE-2020-25600: xen: out of bounds event channels available to 32-bit x86 domains (XSA-342) xsa342.patch - bsc#1176349 - VUL-0: CVE-2020-25599: xen: races with evtchn_reset() (XSA-343) xsa343-1.patch xsa343-2.patch xsa343-3.patch - bsc#1176350 - VUL-0: CVE-2020-25601: xen: lack of preemption in evtchn_reset() / evtchn_destroy() (XSA-344) xsa344-1.patch xsa344-2.patch - Upstream bug fixes (bsc#1027519) 5c87be47-libx86-helper-to-deserialise-msr_policy.patch 5f479d9e-x86-begin-to-support-MSR_ARCH_CAPS.patch 5f4cf06e-x86-Dom0-expose-MSR_ARCH_CAPS.patch 5f4cf96a-x86-PV-fix-SEGBASE_GS_USER_SEL.patch 5f560c42-x86-PV-64bit-segbase-consistency.patch 5f560c42-x86-PV-rewrite-segment-ctxt-switch.patch- Upstream bug fixes (bsc#1027519) 5ef44e0d-x86-PMTMR-use-FADT-flags.patch 5ef6156a-x86-disallow-access-to-PT-MSRs.patch 5efcb354-x86-protect-CALL-JMP-straight-line-speculation.patch 5f046c18-evtchn-dont-ignore-error-in-get_free_port.patch (Replaces xsa317.patch) 5f046c48-x86-shadow-dirty-VRAM-inverted-conditional.patch (Replaces xsa319.patch) 5f046c64-EPT-set_middle_entry-adjustments.patch (Replaces xsa328-1.patch) 5f046c78-EPT-atomically-modify-ents-in-ept_next_level.patch (Replaces xsa328-2.patch) 5f046c9a-VT-d-improve-IOMMU-TLB-flush.patch (Replaces xsa321-1.patch) 5f046cb5-VT-d-prune-rename-cache-flush-funcs.patch (Replaces xsa321-2.patch) 5f046cca-x86-IOMMU-introduce-cache-sync-hook.patch (Replaces xsa321-3.patch) 5f046ce9-VT-d-sync_cache-misaligned-addresses.patch (Replaces xsa32141.patch) 5f046cfd-x86-introduce-alternative_2.patch (Replaces xsa321-5.patch) 5f046d1a-VT-d-optimize-CPU-cache-sync.patch (Replaces xsa321-6.patch) 5f046d2b-EPT-flush-cache-when-modifying-PTEs.patch (Replaces xsa321-7.patch) 5f046d5c-check-VCPUOP_register_vcpu_info-alignment.patch (Replaces xsa327.patch) 5f1a9916-x86-S3-put-data-sregs-into-known-state.patch 5f21b9fd-x86-cpuid-APIC-bit-clearing.patch 5cf8da09-adjust-sysdom-creation-call-earlier-on-x86.patch- bsc#1172356 - Not able to hot-plug NIC via virt-manager, asks to attach on next reboot while it should be live attached ignore-ip-command-script-errors.patch- Enhance libxc.migrate_tracking.patch After transfer of domU memory, the target host has to assemble the backend devices. Track the time prior xc_domain_unpause.- Add libxc.migrate_tracking.patch to track live migrations unconditionally in logfiles, especially in libvirt. This will track how long a domU was suspended during transit.- bsc#1173376 - VUL-0: CVE-2020-15566: xen: XSA-317 - Incorrect error handling in event channel port allocation xsa317.patch - bsc#1173377 - VUL-0: CVE-2020-15563: xen: XSA-319 - inverted code paths in x86 dirty VRAM tracking xsa319.patch - bsc#1173378 - VUL-0: CVE-2020-15565: xen: XSA-321 - insufficient cache write- back under VT-d xsa321-1.patch xsa321-2.patch xsa321-3.patch xsa321-4.patch xsa321-5.patch xsa321-6.patch xsa321-7.patch - bsc#1173380 - VUL-0: CVE-2020-15567: xen: XSA-328 - non-atomic modification of live EPT PTE xsa328-1.patch xsa328-2.patch- bsc#1172205 - VUL-0: CVE-2020-0543: xen: Special Register Buffer Data Sampling (SRBDS) aka "CrossTalk" (XSA-320) 5ee24d0e-x86-spec-ctrl-document-SRBDS-workaround.patch 5edfbbea-x86-spec-ctrl-CPUID-MSR-defs-for-SRBDS.patch (Replaces xsa320-1.patch) 5edfbbea-x86-spec-ctrl-mitigate-SRBDS.patch (Replaces xsa320-2.patch) - Upstream bug fixes (bsc#1027519) 5ec50b05-x86-idle-rework-C6-EOI-workaround.patch 5ec7dcaa-x86-dont-enter-C6-with-in-service-intr.patch 5ec7dcf6-x86-dont-enter-C3-C6-with-errata.patch 5ec82237-x86-extend-ISR-C6-workaround-to-Haswell.patch 5ece1b91-x86-clear-RDRAND-CPUID-bit-on-AMD-fam-15-16.patch 5ece8ac4-x86-load_system_tables-NMI-MC-safe.patch 5eda60cb-SVM-split-recalc-NPT-fault-handling.patch 5edf6ad8-ioreq-pending-emulation-server-destruction-race.patch- bsc#1172205 - VUL-0: CVE-2020-0543: xen: Special Register Buffer Data Sampling (SRBDS) aka "CrossTalk" (XSA-320) xsa320-1.patch xsa320-2.patch- Update to Xen 4.12.3 bug fix release (bsc#1027519) xen-4.12.3-testing-src.tar.bz2 5ec2a760-x86-determine-MXCSR-mask-always.patch - Drop patches contained in new tarball 5e16fb6a-x86-clear-per-cpu-stub-page-info.patch 5e1da013-IRQ-u16-is-too-narrow-for-evtchn.patch 5e1dcedd-Arm-place-speculation-barrier-after-ERET.patch 5e21ce98-x86-time-update-TSC-stamp-after-deep-C-state.patch 5e286cce-VT-d-dont-pass-bridges-to-domain_context_mapping_one.patch 5e318cd4-x86-apic-fix-disabling-LVT0.patch 5e3bd385-EFI-recheck-variable-name-strings.patch 5e3bd3d1-EFI-dont-leak-heap-VIA-XEN_EFI_get_next_variable_name.patch 5e3bd3f8-xmalloc-guard-against-overflow.patch 5e46e090-x86-smp-reset-x2apic_enabled-in-smp_send_stop.patch 5e4c00ef-VT-d-check-full-RMRR-for-E820-reserved.patch 5e4ec20e-x86-virtualise-MSR_PLATFORM_ID-properly.patch 5e6f53dd-AMD-IOMMU-fix-off-by-one-get_paging_mode.patch 5e7cfb29-x86-ucode-fix-error-paths-in-apply_microcode.patch 5e7dd83b-libx86-CPUID-fix-not-just-leaf-7.patch 5e7dfbf6-x86-ucode-AMD-potential-buffer-overrun-equiv-tab.patch 5e846cce-x86-HVM-fix-AMD-ECS-handling-for-Fam10.patch 5e84905c-x86-ucode-AMD-fix-more-potential-buffer-overruns.patch 5e86f7b7-credit2-avoid-vCPUs-with-lower-creds-than-idle.patch 5e86f7fd-credit2-fix-credit-too-few-resets.patch 5e876b0f-tools-xenstore-fix-use-after-free-in-xenstored.patch 5e95ad61-xenoprof-clear-buffer-intended-to-be-shared-with-guests.patch 5e95ad8f-xenoprof-limit-consumption-of-shared-buffer-data.patch 5e95ae77-Add-missing-memory-barrier-in-the-unlock-path-of-rwlock.patch 5e95af5e-xen-gnttab-Fix-error-path-in-map_grant_ref.patch 5e95afb8-gnttab-fix-GNTTABOP_copy-continuation-handling.patch- Advertise support for new 64bit libxl memory APIs introduced by patch 5db1be79-libxl-Offer-API-versions-0x040700-and-0x040800.patch bsc#1167007 and bsc#1157490- bsc#1169392 - VUL-0: CVE-2020-11742: xen: Bad continuation handling in GNTTABOP_copy (XSA-318) 5e95afb8-gnttab-fix-GNTTABOP_copy-continuation-handling.patch- bsc#1168140 - VUL-0: CVE-2020-11740, CVE-2020-11741: xen: XSA-313 multiple xenoprof issues 5e95ad61-xenoprof-clear-buffer-intended-to-be-shared-with-guests.patch 5e95ad8f-xenoprof-limit-consumption-of-shared-buffer-data.patch - bsc#1168142 - VUL-0: CVE-2020-11739: xen: XSA-314 - Missing memory barriers in read-write unlock paths 5e95ae77-Add-missing-memory-barrier-in-the-unlock-path-of-rwlock.patch - bsc#1168143 - VUL-0: CVE-2020-11743: xen: XSA-316 - Bad error path in GNTTABOP_map_grant 5e95af5e-xen-gnttab-Fix-error-path-in-map_grant_ref.patch - bsc#1167152 - L3: Xenstored Crashed during VM install Need Core analyzed 5e876b0f-tools-xenstore-fix-use-after-free-in-xenstored.patch - bsc#1165206 - Xen 4.12 DomU hang / freeze / stall / NMI watchdog bug soft lockup CPU #0 stuck under high load / upstream with workaround. See also bsc#1134506 5e86f7b7-credit2-avoid-vCPUs-with-lower-creds-than-idle.patch 5e86f7fd-credit2-fix-credit-too-few-resets.patch - Drop for upstream solution (bsc#1165206) 01-xen-credit2-avoid-vcpus-to.patch 02-xen-credit2-fix-runq-cand-skip.patch - Upstream bug fixes (bsc#1027519) 5e6f53dd-AMD-IOMMU-fix-off-by-one-get_paging_mode.patch 5e7cfb29-x86-ucode-fix-error-paths-in-apply_microcode.patch 5e7dd83b-libx86-CPUID-fix-not-just-leaf-7.patch 5e7dfbf6-x86-ucode-AMD-potential-buffer-overrun-equiv-tab.patch 5e846cce-x86-HVM-fix-AMD-ECS-handling-for-Fam10.patch 5e84905c-x86-ucode-AMD-fix-more-potential-buffer-overruns.patch- Update API compatibility versions. Fixes issues for libvirt. See bsc#1167007 and bsc#1157490- bsc#1155200 - L3: L3-Support: aacraid blocks xen commands - ref: _00D1igLOd._5001iIvV1f:ref 5d976da3-libxl-attach-PCI-device-to-qemu-only-after-setting-pciback-pcifront.patch- bsc#1165206 - Xen 4.12 DomU hang / freeze / stall / NMI watchdog bug soft lockup CPU #0 stuck under high load / upstream with workaround. See also bsc#1134506 01-xen-credit2-avoid-vcpus-to.patch 02-xen-credit2-fix-runq-cand-skip.patch- bsc#1160932 - VUL-0: xen: XSA-312 v1: arm: a CPU may speculate past the ERET instruction 5e1dcedd-Arm-place-speculation-barrier-after-ERET.patch - Upstream bug fixes (bsc#1027519) 5e21ce98-x86-time-update-TSC-stamp-after-deep-C-state.patch 5e286cce-VT-d-dont-pass-bridges-to-domain_context_mapping_one.patch 5e318cd4-x86-apic-fix-disabling-LVT0.patch 5e3bd385-EFI-recheck-variable-name-strings.patch 5e3bd3d1-EFI-dont-leak-heap-VIA-XEN_EFI_get_next_variable_name.patch 5e3bd3f8-xmalloc-guard-against-overflow.patch 5e46e090-x86-smp-reset-x2apic_enabled-in-smp_send_stop.patch 5e4c00ef-VT-d-check-full-RMRR-for-E820-reserved.patch 5e4ec20e-x86-virtualise-MSR_PLATFORM_ID-properly.patch - Drop 5e1dd8f3-Arm-fix-build-after-892b9dcebdb7.patch- Fix broken ARM build 5e1dd8f3-Arm-fix-build-after-892b9dcebdb7.patch- bsc#1162040 - L3: Problems Booting Fedora31 VM on sles15 sp1 Xen Dom0 5d53ed45-pygrub-Failing-to-set-value-to-0-in-Grub2ConfigFile.patch- Upstream bug fixes (bsc#1027519) 5e16fb6a-x86-clear-per-cpu-stub-page-info.patch 5e1da013-IRQ-u16-is-too-narrow-for-evtchn.patch- Update to Xen 4.12.2 bug fix release (bsc#1027519) xen-4.12.2-testing-src.tar.bz2 - Drop patches contained in new tarball 5d419d49-x86-spec-ctrl-report-proper-status.patch 5d43253c-x86-ucode-always-collect_cpu_info-at-boot.patch 5d4aa36f-x86-apic-enable-x2APIC-mode-earlier.patch 5d4afa7a-credit2-fix-memory-leak.patch 5d4d850a-introduce-bss-percpu-page-aligned.patch 5d516531-x86-xpti-dont-leak-TSS-adjacent-data.patch 5d5bf475-x86-PV-fix-handling-of-iommu-mappings.patch 5d6524ca-x86-mm-correctly-init-M2P-entries.patch 5d67ceaf-x86-properly-gate-PKU-clearing.patch 5d70bfba-x86-shadow-dont-enable-with-too-small-allocation.patch 5d779811-x86-fix-CPUID7-0-eax-levelling-MSR.patch 5d77b40f-fix-hvm_all_ioreq_servers_add_vcpu-cleanup.patch 5d80ea13-vpci-honor-read-only-devices.patch 5d89d8d9-libxc-x86-avoid-overflow-in-CPUID-APIC-ID.patch 5d8b715f-ACPI-cpuidle-bump-max-num-of-states.patch 5d8ce179-sched-dont-leak-XEN_RUNSTATE_UPDATE.patch 5d947b01-x86-crash-force-unlock-console.patch 5d948bdb-IOMMU-add-missing-HVM-check.patch 5d9ef2a1-EFI-deref-pointer-in-set_color.patch 5d9ef2c5-EFI-gfx-mode-for-MB2-boot.patch 5d9ef2ef-PCI-clear-maskall-fields-on-assign.patch 5d9f454a-x86-EFI-pixel-reserved-0.patch 5db07974-x86-update-time-info-on-TSC-adjustments.patch 5db2b4a2-x86-is_xen_fixed_mfn-off-by-1.patch 5db892ac-VT-x-correct-BDF93-workaround.patch 5db892ac-VT-x-fix-Haswell-Broadwell-LBR-TSX-errata.patch 5dbaf89f-dont-use-BUG-for-parameter-checking.patch 5dbaf8e0-x86-PV-check-GDT-LDT-limits-during-emulation.patch 5dbaf990-x86-mm-L1TF-checks-dont-leave-partial-entry.patch 5dbaf9b2-x86-mm-dont-re-set-PGT_pinned-on-partial-page.patch 5dbaf9ce-x86-mm-split-partial_pte-tristate.patch 5dbaf9f5-x86-mm-use-flags-for-_put_page_type.patch 5dbafa13-x86-mm-rework-get_page_and_type_from_mfn-conditional.patch 5dbafa46-x86-mm-alloc_lN_table-clear-partial_flags-when-preempting.patch 5dbafa5c-x86-mm-always-retain-general-ref-on-partial.patch 5dbafa7f-x86-mm-collapse-PTF_partial_.patch 5dbafaa4-x86-mm-properly-handle-linear-pt-promotion-failure.patch 5dbafabd-x86-mm-fix-nested-devalidation-on-error.patch 5dbafad5-x86-mm-dont-drop-type-ref-unless.patch 5dbafb0d-Arm-p2m-avoid-aliasing-guest-physical-frame.patch 5dbafb4e-Arm-p2m-avoid-off-by-1-check-on-max_mapped_gfn.patch 5dbafb72-Arm-p2m-dont-check-p2m_get_root_pointer-ret-with-BUG_ON.patch 5dbafba5-passthrough-quarantine-PCI-devices.patch 5dbafbda-Arm32-entry-Split-__DEFINE_ENTRY_TRAP.patch 5dbafbfd-Arm32-entry-fold-SAVE_ALL-into-vector-macro.patch 5dbafc3a-Arm32-dont-unmask-interrupts-on-trap-without-level-change.patch 5dbafc4f-Arm64-dont-unmask-interrupts-on-trap-without-level-change.patch 5dbc0d64-x86-fix-CONFIG_PV-build-following-XSA-299.patch 5dca846c-x86-fix-clear_IO_APIC_pin-raw-writes.patch 5dca84a2-AMD-IOMMU-dont-needlessly-trigger-errors-on-unmap.patch 5dcae816-VT-d-hide-superpages-for-SandyBridge.patch 5dcae816-VT-x-runtime-modification-of-exec-sp.patch 5dcae816-VT-x-work-around-executable-EPT-superpages.patch 5dcae816-x86-introduce-tsx-option.patch 5dcae816-x86-spec-ctrl-mitigate-TAA.patch 5dd6b229-add-va_end-to-hypercall_create_continuation.patch 5dd8126b-x86-vLAPIC-allow-APIC_SPIV_FOCUS_DISABLED.patch 5dd93ce0-vVMX-fix-livelock-with-XSA-304-fix.patch 5ddbb3d3-x86-mm-adjust-linear-usage-accounting.patch 5ddcff90-libxc-x86-dont-bump-ApicIdCoreSize-past-7.patch 5ddd2555-IOMMU-always-quarantine-PCI-devs.patch 5ddd25f9-EFI-fix-efi=attr-handling.patch 5ddfa851-VMX-always-sync-PIR-to-IRR.patch 5ddfd62b-x86-internal-IRQs-honor-PEOI-stack.patch 5de0007e-SVM-always-intercept-ICEBP.patch 5de0007e-SVM-write-correct-eip-into-outgoing-task.patch 5de0007e-VMX-early-task-switch-failures-semantics.patch 5de1632a-x86-IOMMU-scratch-page-in-quarantine-dom.patch 5de19115-rationalize-max-grant_frames-maptrack_frames.patch 5de52a86-x86-PSR-dont-write-out-of-range-COS.patch 5de65f84-gnttab-map-always-do-IOMMU-part.patch 5de65fc4-x86-avoid-HPET-use-on-certain-Intel.patch xsa307.patch xsa308.patch xsa309.patch xsa310-1.patch xsa310-2.patch xsa310-3.patch xsa311.patch- bsc#1158003 - VUL-0: CVE-2019-19581,CVE-2019-19582: xen: XSA-307 - find_next_bit() issues xsa307.patch - bsc#1158004 - VUL-0: CVE-2019-19583: xen: XSA-308 - VMX: VMentry failure with debug exceptions and blocked states xsa308.patch - bsc#1158005 - VUL-0: CVE-2019-19578: xen: XSA-309 - Linear pagetable use / entry miscounts xsa309.patch - bsc#1158006 - VUL-0: CVE-2019-19580: xen: XSA-310 - Further issues with restartable PV type change operations xsa310-1.patch xsa310-2.patch xsa310-3.patch - bsc#1158007 - VUL-0: CVE-2019-19577: xen: XSA-311 - dynamic height for the IOMMU pagetables xsa311.patch - Upstream bug fixes (bsc#1027519) 5dd6b229-add-va_end-to-hypercall_create_continuation.patch 5dd8126b-x86-vLAPIC-allow-APIC_SPIV_FOCUS_DISABLED.patch 5dd93ce0-vVMX-fix-livelock-with-XSA-304-fix.patch 5ddbb3d3-x86-mm-adjust-linear-usage-accounting.patch 5ddcff90-libxc-x86-dont-bump-ApicIdCoreSize-past-7.patch 5ddd2555-IOMMU-always-quarantine-PCI-devs.patch (Replaces xsa306.patch) 5ddd25f9-EFI-fix-efi=attr-handling.patch 5ddfa851-VMX-always-sync-PIR-to-IRR.patch 5ddfd62b-x86-internal-IRQs-honor-PEOI-stack.patch 5de0007e-VMX-early-task-switch-failures-semantics.patch 5de0007e-SVM-always-intercept-ICEBP.patch 5de0007e-SVM-write-correct-eip-into-outgoing-task.patch 5de1632a-x86-IOMMU-scratch-page-in-quarantine-dom.patch 5de19115-rationalize-max-grant_frames-maptrack_frames.patch 5de52a86-x86-PSR-dont-write-out-of-range-COS.patch 5de65f84-gnttab-map-always-do-IOMMU-part.patch 5de65fc4-x86-avoid-HPET-use-on-certain-Intel.patch- bsc#1157047 - PCI passthrough failed on AMD machine xen host 5dca846c-x86-fix-clear_IO_APIC_pin-raw-writes.patch 5dca84a2-AMD-IOMMU-dont-needlessly-trigger-errors-on-unmap.patch - bsc#1157888 - - VUL-0: xen: Device quarantine for alternate pci assignment methods xsa306.patch - Upstream bug fixes (bsc#1027519) 5dcae816-VT-x-runtime-modification-of-exec-sp.patch 5dcae816-VT-d-hide-superpages-for-SandyBridge.patch (Replaces xsa304-1.patch) 5dcae816-VT-x-work-around-executable-EPT-superpages.patch (Replaces xsa304-2.patch) 5dcae816-x86-introduce-tsx-option.patch (Replaces xsa305-1.patch) 5dcae816-x86-spec-ctrl-mitigate-TAA.patch (Replaces xsa305-2.patch)- Minor adjustments to these security patches for bsc#1155945 and bsc#1152497 xsa304-1.patch xsa304-2.patch xsa305-1.patch xsa305-2.patch- bsc#1154448 - VUL-0: CVE-2019-18420: xen: XSA-296: VCPUOP_initialise DoS 5dbaf89f-dont-use-BUG-for-parameter-checking.patch - bsc#1154456 - VUL-0: CVE-2019-18425: xen: XSA-298: missing descriptor table limit checking in x86 PV emulation 5dbaf8e0-x86-PV-check-GDT-LDT-limits-during-emulation.patch - bsc#1154458 - VUL-0: CVE-2019-18421: xen: XSA-299: Issues with restartable PV type change operations 5dbaf990-x86-mm-L1TF-checks-dont-leave-partial-entry.patch 5dbaf9b2-x86-mm-dont-re-set-PGT_pinned-on-partial-page.patch 5dbaf9ce-x86-mm-split-partial_pte-tristate.patch 5dbaf9f5-x86-mm-use-flags-for-_put_page_type.patch 5dbafa13-x86-mm-rework-get_page_and_type_from_mfn-conditional.patch 5dbafa46-x86-mm-alloc_lN_table-clear-partial_flags-when-preempting.patch 5dbafa5c-x86-mm-always-retain-general-ref-on-partial.patch 5dbafaa4-x86-mm-properly-handle-linear-pt-promotion-failure.patch 5dbafabd-x86-mm-fix-nested-devalidation-on-error.patch 5dbafad5-x86-mm-dont-drop-type-ref-unless.patch 5dbc0d64-x86-fix-CONFIG_PV-build-following-XSA-299.patch - bsc#1154460 - VUL-0: CVE-2019-18423: xen: XSA-301: add-to-physmap can be abused to DoS Arm hosts 5dbafb0d-Arm-p2m-avoid-aliasing-guest-physical-frame.patch 5dbafb4e-Arm-p2m-avoid-off-by-1-check-on-max_mapped_gfn.patch 5dbafb72-Arm-p2m-dont-check-p2m_get_root_pointer-ret-with-BUG_ON.patch - bsc#1154461 - VUL-0: CVE-2019-18424: xen: XSA-302: passed through PCI devices may corrupt host memory after deassignment 5dbafba5-passthrough-quarantine-PCI-devices.patch - bsc#1154464 - VUL-0: CVE-2019-18422: xen: XSA-303: ARM: Interrupts are unconditionally unmasked in exception handlers 5dbafbda-Arm32-entry-Split-__DEFINE_ENTRY_TRAP.patch 5dbafbfd-Arm32-entry-fold-SAVE_ALL-into-vector-macro.patch 5dbafc3a-Arm32-dont-unmask-interrupts-on-trap-without-level-change.patch 5dbafc4f-Arm64-dont-unmask-interrupts-on-trap-without-level-change.patch - bsc#1155945 - VUL-0: CVE-2018-12207: xen: Machine Check Error Avoidance on Page Size Change (aka IFU issue) xsa304-1.patch xsa304-2.patch - bsc#1152497 - VUL-0: CVE-2019-11135: xen: XSA-305: TSX Asynchronous Abort (TAA) issue xsa305-1.patch xsa305-2.patch - Upstream bug fixes (bsc#1027519) 5d9ef2a1-EFI-deref-pointer-in-set_color.patch 5d9f454a-x86-EFI-pixel-reserved-0.patch 5db2b4a2-x86-is_xen_fixed_mfn-off-by-1.patch 5d9ee2f0-AMD-IOMMU-allocate_buffer-avoid-memset.patch 5db892ac-VT-x-fix-Haswell-Broadwell-LBR-TSX-errata.patch 5d948bdb-IOMMU-add-missing-HVM-check.patch 5d9ee312-AMD-IOMMU-prefill-all-DTEs.patch 5d9ef2c5-EFI-gfx-mode-for-MB2-boot.patch 5db892ac-VT-x-correct-BDF93-workaround.patch 5d947b01-x86-crash-force-unlock-console.patch 5d8ce179-sched-dont-leak-XEN_RUNSTATE_UPDATE.patch 5d9ef2ef-PCI-clear-maskall-fields-on-assign.patch 5d9ee2a8-AMD-IOMMU-alloc-1-devtab-per-PCI-seg.patch 5db07974-x86-update-time-info-on-TSC-adjustments.patch 5dbafa7f-x86-mm-collapse-PTF_partial_.patch- bsc#1120095 - add code to change LIBXL_HOTPLUG_TIMEOUT at runtime The included README has details about the impact of this change libxl.LIBXL_HOTPLUG_TIMEOUT.patch- bsc#1135799 - Partner-L3: Xen crashes on AMD ROME based machines 5ca7660f-x86-entry-drop-unused-includes.patch 5cf8da09-adjust-sysdom-creation-call-earlier-on-x86.patch 5cab2a6b-x86-ACPI-also-parse-AMD-tables-early.patch 5cab2ab7-x86-IOMMU-introduce-init-ops.patch 5cab2ae8-x86-IOMMU-abstract-iommu_supports_eim.patch 5cab2b4e-x86-IOMMU-abstract-iommu_enable_x2apic_IR.patch 5cab2b95-x86-IOMMU-initialize-iommu_ops-in.patch 5cac9a4b-x86-IOMMU-abstract-adjust_vtd_irq_affinities.patch 5cdeac7f-AMD-IOMMU-adjust-IOMMU-list-head-init.patch 5d0cf4e4-AMD-IOMMU-initialize-IRQ-tasklet-once.patch 5d149bb0-AMD-IOMMU-dont-add-IOMMUs.patch 5d1b3fab-AMD-IOMMU-restrict-feature-logging.patch 5d358508-x86-IRQ-desc-affinity-represents-request.patch 5d358534-x86-IRQ-consolidate-arch-cpu_mask-use.patch 5d358a67-AMD-IOMMU-pass-IOMMU-to-iterate_ivrs_entries-cb.patch 5d358a92-AMD-IOMMU-pass-IOMMU-to-amd_iommu_alloc_intremap_table.patch 5d39811c-x86-IOMMU-dont-restrict-IRQ-affinities.patch 5d417813-AMD-IOMMU-bitfield-extended-features.patch 5d417838-AMD-IOMMU-bitfield-control-reg.patch 5d41785b-AMD-IOMMU-bitfield-IRTE.patch 5d41787e-AMD-IOMMU-pass-IOMMU-to-gfu-intremap-entry.patch 5d4178ad-AMD-IOMMU-128bit-non-guest-APIC-IRTE.patch 5d4178fc-AMD-IOMMU-split-amd_iommu_init_one.patch 5d41793f-AMD-IOMMU-allow-enabling-without-IRQ.patch 5d417a16-AMD-IOMMU-adjust-IRQ-setup-for-x2APIC.patch 5d417ab6-AMD-IOMMU-enable-x2APIC-mode.patch 5d417b38-AMD-IOMMU-correct-IRTE-updating.patch 5d417b6a-AMD-IOMMU-dont-needlessly-log-headers.patch 5d4a9d25-AMD-IOMMU-drop-not-found-message.patch 5d80e7c0-AMD-IOMMU-free-shared-IRT-once.patch 5d80e80d-AMD-IOMMU-valid-flag-for-IVRS-mappings.patch 5d80e82e-AMD-IOMMU-alloc_intremap_table-callers-handle-errors.patch 5d80e857-x86-PCI-read-MSI-X-table-entry-count-early.patch 5d8b72e5-AMD-IOMMU-dont-blindly-alloc-intremap-tables.patch 5d8b730e-AMD-IOMMU-phantom-funcs-share-intremap-tables.patch 5d8b733b-x86-PCI-read-max-MSI-vector-count-early.patch 5d8b736d-AMD-IOMMU-replace-INTREMAP_ENTRIES.patch 5d8b7393-AMD-IOMMU-restrict-intremap-table-sizes.patch - bsc#1145240 - [Migration]Can't pre-allocate 1 shadow pages 5d70bfba-x86-shadow-dont-enable-with-too-small-allocation.patch - bsc#1137717 - [HPS Bug] Unable to install Windows Server 2016 with 2 CPUs setting (or above) under SLES12 SP4 Xen Server on AMD ROME platform 5d89d8d9-libxc-x86-avoid-overflow-in-CPUID-APIC-ID.patch - Upstream bug fixes (bsc#1027519) 5d67ceaf-x86-properly-gate-PKU-clearing.patch 5d779811-x86-fix-CPUID7-0-eax-levelling-MSR.patch 5d77b40f-fix-hvm_all_ioreq_servers_add_vcpu-cleanup.patch 5d80ea13-vpci-honor-read-only-devices.patch 5d8b715f-ACPI-cpuidle-bump-max-num-of-states.patch- bsc#1145774 - Libivrtd segfaults when trying to live migrate a VM Fix crash in an error path of libxl_domain_suspend with libxl.helper_done-crash.patch- Upstream bug fixes (bsc#1027519) 5d419d49-x86-spec-ctrl-report-proper-status.patch 5d43253c-x86-ucode-always-collect_cpu_info-at-boot.patch 5d4aa36f-x86-apic-enable-x2APIC-mode-earlier.patch 5d4afa7a-credit2-fix-memory-leak.patch 5d4d850a-introduce-bss-percpu-page-aligned.patch 5d516531-x86-xpti-dont-leak-TSS-adjacent-data.patch 5d5bf475-x86-PV-fix-handling-of-iommu-mappings.patch 5d6524ca-x86-mm-correctly-init-M2P-entries.patch - Drop 5d419d49-x86-spec-ctrl-facilities-report-wrong-status.patch- Update to Xen 4.12.1 bug fix release (bsc#1027519) xen-4.12.1-testing-src.tar.bz2 - Drop patches contained in new tarball 5c87b644-IOMMU-leave-enabled-for-kexec-crash.patch 5c87b6a2-x86-HVM-dont-crash-guest-in-find_mmio_cache.patch 5c87b6c8-drop-arch_evtchn_inject.patch 5c87b6e8-avoid-atomic-rmw-accesses-in-map_vcpu_info.patch 5c87e6d1-x86-TSX-controls-for-RTM-force-abort-mode.patch 5c8f752c-x86-e820-build-with-gcc9.patch 5c8fb92d-x86-HVM-split-linear-reads-and-writes.patch 5c8fb951-x86-HVM-finish-IOREQs-correctly-on-completion.patch 5c8fc6c0-x86-MSR-shorten-ARCH_CAPABILITIES.patch 5c8fc6c0-x86-SC-retpoline-safety-calculations-for-eIBRS.patch 5c9e63c5-credit2-SMT-idle-handling.patch 5ca46b68-x86emul-no-GPR-update-upon-AVX-gather-failures.patch 5ca773d1-x86emul-dont-read-mask-reg-without-AVX512F.patch 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch 5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch 5cd921fb-trace-fix-build-with-gcc9.patch 5cd9224b-AMD-IOMMU-disable-upon-init-fail.patch 5cd922c5-x86-MTRR-recalc-p2mt-when-iocaps.patch 5cd9230f-VMX-correctly-get-GS_SHADOW-for-current.patch 5cd926d0-bitmap_fill-zero-sized.patch 5cd92724-drivers-video-drop-constraints.patch 5cd93a69-x86-MSR_INTEL_CORE_THREAD_COUNT.patch 5cd93a69-x86-boot-detect-Intel-SMT-correctly.patch 5cd93a69-x86-spec-ctrl-reposition-XPTI-parsing.patch 5cd981ff-x86-IRQ-tracing-avoid-UB-or-worse.patch 5cdad090-x86-spec-ctrl-CPUID-MSR-definitions-for-MDS.patch 5cdad090-x86-spec-ctrl-infrastructure-for-VERW-flush.patch 5cdad090-x86-spec-ctrl-misc-non-functional-cleanup.patch 5cdad090-x86-spec-ctrl-opts-to-control-VERW-flush.patch 5cdeb9fd-sched-fix-csched2_deinit_pdata.patch 5ce7a92f-x86-IO-APIC-fix-build-with-gcc9.patch 5cf0f6a4-x86-vhpet-resume-avoid-small-diff.patch 5cf16e51-x86-spec-ctrl-Knights-retpoline-safe.patch 5d03a0c4-1-Arm-add-an-isb-before-reading-CNTPCT_EL0.patch 5d03a0c4-2-gnttab-rework-prototype-of-set_status.patch 5d03a0c4-3-Arm64-rewrite-bitops-in-C.patch 5d03a0c4-4-Arm32-rewrite-bitops-in-C.patch 5d03a0c4-5-Arm-bitops-consolidate-prototypes.patch 5d03a0c4-6-Arm64-cmpxchg-simplify.patch 5d03a0c4-7-Arm32-cmpxchg-simplify.patch 5d03a0c4-8-Arm-bitops-helpers-with-timeout.patch 5d03a0c4-9-Arm-cmpxchg-helper-with-timeout.patch 5d03a0c4-A-Arm-turn-on-SILO-mode-by-default.patch 5d03a0c4-B-bitops-guest-helpers.patch 5d03a0c4-C-cmpxchg-guest-helpers.patch 5d03a0c4-D-use-guest-atomics-helpers.patch 5d03a0c4-E-Arm-add-perf-counters-in-guest-atomic-helpers.patch 5d03a0c4-F-Arm-protect-gnttab_clear_flag.patch - Refreshed patches libxl.pvscsi.patch- bsc#1143563 - Speculative mitigation facilities report wrong status 5d419d49-x86-spec-ctrl-facilities-report-wrong-status.patch- bsc#1138563 - L3: xenpvnetboot improperly ported to Python 3 fix-xenpvnetboot.patch- bsc#1138294 - VUL-0: CVE-2019-17349: XSA-295: Unlimited Arm Atomics Operations 5d03a0c4-1-Arm-add-an-isb-before-reading-CNTPCT_EL0.patch 5d03a0c4-2-gnttab-rework-prototype-of-set_status.patch 5d03a0c4-3-Arm64-rewrite-bitops-in-C.patch 5d03a0c4-4-Arm32-rewrite-bitops-in-C.patch 5d03a0c4-5-Arm-bitops-consolidate-prototypes.patch 5d03a0c4-6-Arm64-cmpxchg-simplify.patch 5d03a0c4-7-Arm32-cmpxchg-simplify.patch 5d03a0c4-8-Arm-bitops-helpers-with-timeout.patch 5d03a0c4-9-Arm-cmpxchg-helper-with-timeout.patch 5d03a0c4-A-Arm-turn-on-SILO-mode-by-default.patch 5d03a0c4-B-bitops-guest-helpers.patch 5d03a0c4-C-cmpxchg-guest-helpers.patch 5d03a0c4-D-use-guest-atomics-helpers.patch 5d03a0c4-E-Arm-add-perf-counters-in-guest-atomic-helpers.patch 5d03a0c4-F-Arm-protect-gnttab_clear_flag.patch - Upstream bug fixes (bsc#1027519) 5c87b6c8-drop-arch_evtchn_inject.patch 5c87b6e8-avoid-atomic-rmw-accesses-in-map_vcpu_info.patch 5cd921fb-trace-fix-build-with-gcc9.patch 5cd9224b-AMD-IOMMU-disable-upon-init-fail.patch 5cd922c5-x86-MTRR-recalc-p2mt-when-iocaps.patch 5cd9230f-VMX-correctly-get-GS_SHADOW-for-current.patch 5cd926d0-bitmap_fill-zero-sized.patch 5cd92724-drivers-video-drop-constraints.patch 5cd93a69-x86-spec-ctrl-reposition-XPTI-parsing.patch (Replaces xsa297-0a.patch) 5cd93a69-x86-MSR_INTEL_CORE_THREAD_COUNT.patch (Replaces xsa297-0b.patch) 5cd93a69-x86-boot-detect-Intel-SMT-correctly.patch (Replaces xsa297-0c.patch) 5cdad090-x86-spec-ctrl-misc-non-functional-cleanup.patch (Replaces xsa297-0d.patch) 5cdad090-x86-spec-ctrl-CPUID-MSR-definitions-for-MDS.patch (Replaces xsa297-1.patch) 5cdad090-x86-spec-ctrl-infrastructure-for-VERW-flush.patch (Replaces xsa297-2.patch) 5cdad090-x86-spec-ctrl-opts-to-control-VERW-flush.patch (Replaces xsa297-3.patch) 5cd981ff-x86-IRQ-tracing-avoid-UB-or-worse.patch 5cdeb9fd-sched-fix-csched2_deinit_pdata.patch 5ce7a92f-x86-IO-APIC-fix-build-with-gcc9.patch 5cf0f6a4-x86-vhpet-resume-avoid-small-diff.patch 5cf16e51-x86-spec-ctrl-Knights-retpoline-safe.patch- Fix some outdated information in the readme README.SUSE- spec: xen-tools: require matching version of xen package bsc#1137471- Remove two stale patches xen.build-compare.man.patch xenpaging.doc.patch- Disable LTO (boo#1133296).- Remove arm32 from ExclusiveArch to fix build- bsc#1111331 - VUL-0: CPU issues Q2 2019 aka "Group 4". CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 xsa297-0a.patch xsa297-0b.patch xsa297-0c.patch xsa297-0d.patch xsa297-1.patch xsa297-2.patch xsa297-3.patch - Update 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch and drop 5cac6219-xen-cpu-Fix-ARM-build-following-cs-597fbb8.patch Refresh 5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch- bsc#1131811 - [XEN] internal error: libxenlight failed to create new domain. This patch is a workaround for a systemd issue. See patch header for additional comments. xenstore-launch.patch- bsc#1125378 - [xen][pygrub] Can not restore sle11sp4 pv guest after upgrading host from sle11sp4 to sle15sp1 pygrub-python3-conversion.patch - Fix "TypeError: virDomainDefineXML() argument 2 must be str or None, not bytes" when converting VMs from using the xm/xend toolstack to the libxl/libvirt toolstack. (bsc#1123378) xen2libvirt.py- bsc#1124560 - Fully virtualized guests crash on boot 5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch - bsc#1121391 - GCC 9: xen build fails 5c8f752c-x86-e820-build-with-gcc9.patch - Upstream bug fixes (bsc#1027519) 5c87b644-IOMMU-leave-enabled-for-kexec-crash.patch 5c87b6a2-x86-HVM-dont-crash-guest-in-find_mmio_cache.patch 5c87e6d1-x86-TSX-controls-for-RTM-force-abort-mode.patch 5c8fb92d-x86-HVM-split-linear-reads-and-writes.patch 5c8fb951-x86-HVM-finish-IOREQs-correctly-on-completion.patch 5c8fc6c0-x86-MSR-shorten-ARCH_CAPABILITIES.patch 5c8fc6c0-x86-SC-retpoline-safety-calculations-for-eIBRS.patch 5c9e63c5-credit2-SMT-idle-handling.patch 5ca46b68-x86emul-no-GPR-update-upon-AVX-gather-failures.patch 5ca773d1-x86emul-dont-read-mask-reg-without-AVX512F.patch 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch 5cac6219-xen-cpu-Fix-ARM-build-following-cs-597fbb8.patch- Install pkgconfig files into libdir instead of datadir- Update to Xen 4.12.0 FCS release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2 * HVM/PVH and PV only Hypervisor: The Xen 4.12 release separates the HVM/PVH and PV code paths in Xen and provides KCONFIG options to build a PV only or HVM/PVH only hypervisor. * QEMU Deprivilege (DM_RESTRICT): In Xen 4.12, this feature has been vastly improved. * Argo - Hypervisor-Mediated data eXchange: Argo is a new inter- domain communication mechanism. * Improvements to Virtual Machine Introspection: The VMI subsystem which allows detection of 0-day vulnerabilities has seen many functional and performance improvements. * Credit 2 Scheduler: The Credit2 scheduler is now the Xen Project default scheduler. * PVH Support: Grub2 boot support has been added to Xen and Grub2. * PVH Dom0: PVH Dom0 support has now been upgraded from experimental to tech preview. * The Xen 4.12 upgrade also includes improved IOMMU mapping code, which is designed to significantly improve the startup times of AMD EPYC based systems. * The upgrade also features Automatic Dom0 Sizing which allows the setting of Dom0 memory size as a percentage of host memory (e.g. 10%) or with an offset (e.g. 1G+10%).- bsc#1130485 - Please drop Requires on multipath-tools in xen-tools. Now using Recommends multipath-tools. xen.spec- Update to Xen 4.12.0 RC7 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- Update to Xen 4.12.0 RC6 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- bsc#1026236 - add Xen cmdline option "suse_vtsc_tolerance" to avoid TSC emulation for HVM domUs if their expected frequency does not match exactly the frequency of the receiving host xen.bug1026236.suse_vtsc_tolerance.patch- Update to Xen 4.12.0 RC5 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- jsc#SLE-3059 - Disable Xen auto-ballooning - Add CONFIG_DOM0_MEM to the spec file for managing dom0 memory. xen.spec - Disable autoballooning in xl.con xl-conf-disable-autoballoon.patch- Update gcc9-ignore-warnings.patch to fix build in SLE12- bsc#1126325 - fix crash in libxl in error path Setup of grant_tables and other variables may fail libxl.prepare-environment-for-domcreate_stream_done.patch- bsc#1127620 - Documentation for the xl configuration file allows for firmware=pvgrub64 but we don't ship pvgrub64. Create a link from grub.xen to pvgrub64 xen.spec- Update to Xen 4.12.0 RC4 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2 - Tarball also contains additional post RC4 security fixes for Xen Security Advisories 287, 288, and 290 through 294.- Update to Xen 4.12.0 RC3 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- Update to Xen 4.12.0 RC2 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- bsc#1121391 - GCC 9: xen build fails gcc9-ignore-warnings.patch- bsc#1122563 - Virtualization/xen: Bug no Xen on boot, missing /proc/xen, after 4.11 -> 4.12 upgrade on X86_64/efi. Keep xen.efi in /usr/lib64/efi for booting older distros. xen.spec- fate#326960: Package grub2 as noarch. As part of the effort to have a unified bootloader across architectures, modify the xen.spec file to move the Xen efi files to /usr/share/efi/$(uname -m) from /usr/lib64/efi.- Update to Xen 4.12.0 RC1 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2 - Drop 5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch 5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch 5b8fae26-tools-libxl-correct-vcpu-affinity-output-with-sparse-physical-cpu-map.patch 5b8fae26-xen-fill-topology-info-for-all-present-cpus.patch 5b8fb5af-tools-xl-refuse-to-set-number-of-vcpus-to-0-via-xl-vcpu-set.patch 5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch 5b9784d2-x86-HVM-add-known_gla-helper.patch 5b9784f2-x86-HVM-split-page-straddling-accesses.patch 5bdc31d5-VMX-fix-vmx_handle_eoi.patch gcc8-fix-array-warning-on-i586.patch gcc8-fix-format-warning-on-i586.patch gcc8-inlining-failed.patch xen.bug1079730.patch- bsc#1121960 - xen: sync with Factory xen.spec xen.changes- Replace old $RPM_* shell vars. - Run fdupes for all architectures, and not crossing subvolume boundaries.- Do not run %fdupes on aarch64 to avoid the hardlink-across-partition rpmlint error- Require qemu-seabios only on x86* as it is not available on non-x86 systems- Avoid creating dangling symlinks (bsc#1116524) This reverts the revert of tmp_build.patch- Update to Xen 4.11.1 bug fix release (bsc#1027519) xen-4.11.1-testing-src.tar.bz2 - 5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch replaces xen.2b50cdbc444c637575580dcfa6c9525a84d5cc62.patch - 5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch replaces xen.b8f33431f3dd23fb43a879f4bdb4283fdc9465ad.patch - Drop the following patches contained in the new tarball 5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch 5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch 5b3cab8e-2-VMX-improve-MSR-load-save-API.patch 5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch 5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch 5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch 5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch 5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch 5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch 5b3f8fa5-port-array_index_nospec-from-Linux.patch 5b4321f6-x86-correctly-set-nonlazy_xstate_used-when-loading-full-state.patch 5b4488e7-x86-spec-ctrl-cmdline-handling.patch 5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch 5b4c9a60-allow-cpu_down-to-be-called-earlier.patch 5b4db308-SVM-fix-cleanup-svm_inject_event.patch 5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch 5b5040f2-x86-AMD-distinguish-CU-from-HT.patch 5b505fe5-VMX-fix-find-msr-build.patch 5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch 5b508775-2-x86-possibly-bring-up-all-CPUs.patch 5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch 5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch 5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch 5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch 5b56feb1-hvm-Disallow-unknown-MSR_EFER-bits.patch 5b56feb2-spec-ctrl-Fix-the-parsing-of-xpti--on-fixed-Intel-hardware.patch 5b62ca93-VMX-avoid-hitting-BUG_ON.patch 5b6d84ac-x86-fix-improve-vlapic-read-write.patch 5b6d8ce2-x86-XPTI-parsing.patch 5b72fbbe-ARM-disable-grant-table-v2.patch 5b72fbbe-oxenstored-eval-order.patch 5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch 5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch 5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch 5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch 5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch 5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch 5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch 5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch 5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch 5b72fbbf-x86-Make-spec-ctrl-no-a-global-disable-of-all-mitigations.patch 5b72fbbf-xl.conf-Add-global-affinity-masks.patch 5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch 5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch 5b75afef-x86-setup-avoid-OoB-E820-lookup.patch 5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch 5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch 5b8d5832-x86-assorted-array_index_nospec-insertions.patch 5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch 5bacae4b-x86-boot-allocate-extra-module-slot.patch 5bae44ce-x86-silence-false-log-messages.patch 5bb60c12-x86-split-opt_xpti.patch 5bb60c4f-x86-split-opt_pv_l1tf.patch 5bb60c74-x86-fix-xpti-and-pv-l1tf.patch 5bcf0722-x86-boot-enable-NMIs.patch 5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch 5bd076e9-x86-boot-init-debug-regs-correctly.patch 5bd076e9-x86-init-vcpu-debug-regs-correctly.patch 5bd0e0cf-vvmx-Disallow-the-use-of-VT-x-instructions-when-nested-virt-is-disabled.patch 5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch 5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch 5be2a308-x86-extend-get_platform_badpages.patch 5be2a354-x86-work-around-HLE-host-lockup-erratum.patch xsa275-1.patch xsa275-2.patch xsa276-1.patch xsa276-2.patch xsa277.patch xsa279.patch xsa280-1.patch xsa280-2.patch- bsc#1116524 - Package xen-tools-4.11.0_09-2.1.x86_64 broken: Missing /bin/domu-xenstore. This was broken because "make package build reproducible" change. (boo#1047218, boo#1062303) This fix reverses the change to this patch. tmp_build.patch- bsc#1115040 - VUL-0: CVE-2018-19961 CVE-2018-19962: xen: insufficient TLB flushing / improper large page mappings with AMD IOMMUs (XSA-275) xsa275-1.patch xsa275-2.patch - bsc#1115043 - VUL-0: CVE-2018-19963: xen: resource accounting issues in x86 IOREQ server handling (XSA-276) xsa276-1.patch xsa276-2.patch - bsc#1115044 - VUL-0: CVE-2018-19964: xen: x86: incorrect error handling for guest p2m page removals (XSA-277) xsa277.patch - bsc#1114405 - VUL-0: CVE-2018-18883: xen: Nested VT-x usable even when disabled (XSA-278) 5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch - bsc#1115045 - VUL-0: xen: CVE-2018-19965: x86: DoS from attempting to use INVPCID with a non-canonical addresses (XSA-279) xsa279.patch - bsc#1115047 - VUL-0: CVE-2018-19966: xen: Fix for XSA-240 conflicts with shadow paging (XSA-280) xsa280-1.patch xsa280-2.patch - bsc#1114988 - VUL-0: CVE-2018-19967: xen: guest use of HLE constructs may lock up host (XSA-282) 5be2a308-x86-extend-get_platform_badpages.patch 5be2a354-x86-work-around-HLE-host-lockup-erratum.patch - bsc#1108940 - L3: XEN SLE12-SP1 domU hang on SLE12-SP3 HV 5bdc31d5-VMX-fix-vmx_handle_eoi.patch - Upstream bug fixes (bsc#1027519) 5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch 5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch 5bacae4b-x86-boot-allocate-extra-module-slot.patch 5bae44ce-x86-silence-false-log-messages.patch 5bb60c12-x86-split-opt_xpti.patch 5bb60c4f-x86-split-opt_pv_l1tf.patch 5bb60c74-x86-fix-xpti-and-pv-l1tf.patch 5bcf0722-x86-boot-enable-NMIs.patch 5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch 5bd076e9-x86-boot-init-debug-regs-correctly.patch 5bd076e9-x86-init-vcpu-debug-regs-correctly.patch 5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch- bsc#1114405 - VUL-0: CVE-2018-18883: xen: Nested VT-x usable even when disabled (XSA-278) 5bd0e0cf-vvmx-Disallow-the-use-of-VT-x-instructions-when-nested-virt-is-disabled.patch- Use SMBIOS_REL_DATE instead of SMBIOS_DATE for reproducible binaries- make package build reproducible (boo#1047218, boo#1062303) * Set SMBIOS_REL_DATE * Update tmp_build.patch to use SHA instead of random build-id * Add reproducible.patch to use --no-insert-timestamp- Building with ncurses 6.1 will fail without xen.2b50cdbc444c637575580dcfa6c9525a84d5cc62.patch - Building libxl acpi support on aarch64 with gcc 8.2 will fail without xen.b8f33431f3dd23fb43a879f4bdb4283fdc9465ad.patch- bsc#1106263 - L3: The affinity reporting via 'xl vcpu-list' is apparently broken 5b8fae26-tools-libxl-correct-vcpu-affinity-output-with-sparse-physical-cpu-map.patch 5b8fae26-xen-fill-topology-info-for-all-present-cpus.patch 5b8fb5af-tools-xl-refuse-to-set-number-of-vcpus-to-0-via-xl-vcpu-set.patch- bsc#1094508 - L3: Kernel oops in fs/dcache.c called by d_materialise_unique() 5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch 5b9784d2-x86-HVM-add-known_gla-helper.patch 5b9784f2-x86-HVM-split-page-straddling-accesses.patch - bsc#1103279 - (CVE-2018-15470) VUL-0: CVE-2018-15470: xen: oxenstored does not apply quota-maxentity (XSA-272) 5b72fbbe-oxenstored-eval-order.patch - bsc#1103275 - (CVE-2018-15469) VUL-0: CVE-2018-15469: xen: Use of v2 grant tables may cause crash on ARM (XSA-268) 5b72fbbe-ARM-disable-grant-table-v2.patch - Upstream patches from Jan (bsc#1027519) 5b6d84ac-x86-fix-improve-vlapic-read-write.patch 5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch 5b75afef-x86-setup-avoid-OoB-E820-lookup.patch 5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch 5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch 5b8d5832-x86-assorted-array_index_nospec-insertions.patch - Drop 5b741962-x86-write-to-correct-variable-in-parse_pv_l1tf.patch- bsc#1078292 - rpmbuild -ba SPECS/xen.spec with xen-4.9.1 failed xen.spec- bsc#1091107 - VUL-0: CVE-2018-3646: xen: L1 Terminal Fault -VMM (XSA-273) 5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch 5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch 5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch 5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch 5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch 5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch 5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch 5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch - bsc#1103276 - VUL-0: CVE-2018-15468: xen: x86: Incorrect MSR_DEBUGCTL handling lets guests enable BTS (XSA-269) 5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch - Upstream prereq patches for XSA-273 and other upstream fixes (bsc#1027519) 5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch 5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch 5b3cab8e-2-VMX-improve-MSR-load-save-API.patch 5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch 5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch 5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch 5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch 5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch 5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch 5b4321f6-x86-correctly-set-nonlazy_xstate_used-when-loading-full-state.patch 5b505fe5-VMX-fix-find-msr-build.patch 5b56feb1-hvm-Disallow-unknown-MSR_EFER-bits.patch 5b56feb2-spec-ctrl-Fix-the-parsing-of-xpti--on-fixed-Intel-hardware.patch 5b62ca93-VMX-avoid-hitting-BUG_ON.patch 5b6d8ce2-x86-XPTI-parsing.patch 5b72fbbf-x86-Make-spec-ctrl-no-a-global-disable-of-all-mitigations.patch 5b72fbbf-xl.conf-Add-global-affinity-masks.patch 5b741962-x86-write-to-correct-variable-in-parse_pv_l1tf.patch- Upstream patches from Jan (bsc#1027519) 5b3f8fa5-port-array_index_nospec-from-Linux.patch 5b4488e7-x86-spec-ctrl-cmdline-handling.patch 5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch 5b4c9a60-allow-cpu_down-to-be-called-earlier.patch 5b4db308-SVM-fix-cleanup-svm_inject_event.patch 5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch 5b5040f2-x86-AMD-distinguish-CU-from-HT.patch 5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch 5b508775-2-x86-possibly-bring-up-all-CPUs.patch 5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch 5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch 5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch 5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch gcc8-fix-format-warning-on-i586.patch gcc8-fix-array-warning-on-i586.patch - Drop xen.fuzz-_FORTIFY_SOURCE.patch gcc8-fix-warning-on-i586.patch- Update to Xen 4.11.0 FCS (fate#325202, fate#325123) xen-4.11.0-testing-src.tar.bz2 disable-building-pv-shim.patch - Dropped patches 5a33a12f-domctl-improve-locking-during-domain-destruction.patch 5a6703cb-x86-move-invocations-of-hvm_flush_guest_tlbs.patch 5a79d7ed-libxc-packed-initrd-dont-fail-domain-creation.patch 5a9985bd-x86-invpcid-support.patch 5ac72a48-gcc8.patch 5ac72a5f-gcc8.patch 5ac72a64-gcc8.patch 5ac72a69-gcc8.patch 5ac72a6e-gcc8.patch 5ac72a74-gcc8.patch 5ac72a7b-gcc8.patch 5ad4923e-x86-correct-S3-resume-ordering.patch 5ad49293-x86-suppress-BTI-mitigations-around-S3.patch 5ad600d4-x86-pv-introduce-x86emul_read_dr.patch 5ad600d4-x86-pv-introduce-x86emul_write_dr.patch 5ad8c3a7-x86-spec_ctrl-update-retpoline-decision-making.patch 5adda097-x86-HPET-fix-race-triggering-ASSERT.patch 5adda0d5-x86-HVM-never-retain-emulated-insn-cache.patch 5adde9ed-xpti-fix-double-fault-handling.patch 5ae06fad-SVM-fix-intercepts-for-SYS-CALL-ENTER-MSRs.patch 5ae31917-x86-cpuidle-init-stats-lock-once.patch 5aeaeae4-introduce-vcpu_sleep_nosync_locked.patch 5aeaeaf0-sched-fix-races-in-vcpu-migration.patch 5aeb2c57-x86-retval-checks-of-set-guest-trapbounce.patch 5aec7393-1-x86-xpti-avoid-copy.patch 5aec7393-2-x86-xpti-write-cr3.patch 5aec744a-3-x86-xpti-per-domain-flag.patch 5aec744a-4-x86-xpti-use-invpcid.patch 5aec744a-5-x86-xpti-no-global-pages.patch 5aec744a-6-x86-xpti-cr3-valid-flag.patch 5aec744a-7-x86-xpti-pv_guest_cr4_to_real_cr4.patch 5aec744b-8-x86-xpti-cr3-helpers.patch 5aec74a8-9-x86-xpti-use-pcid.patch 5af1daa9-1-x86-traps-fix-dr6-handing-in-DB-handler.patch 5af1daa9-2-x86-pv-move-exception-injection-into-test_all_events.patch 5af1daa9-3-x86-traps-use-IST-for-DB.patch 5af1daa9-4-x86-traps-fix-handling-of-DB-in-hypervisor-context.patch 5af1daa9-x86-HVM-guard-against-bogus-emulator-ioreq-state.patch 5af1daa9-x86-vpt-support-IO-APIC-routed-intr.patch 5af97999-viridian-cpuid-leaf-40000003.patch 5afc13ae-1-x86-read-MSR_ARCH_CAPABILITIES-once.patch 5afc13ae-2-x86-express-Xen-SPEC_CTRL-choice-as-variable.patch 5afc13ae-3-x86-merge-bti_ist_info-use_shadow_spec_ctrl.patch 5afc13ae-4-x86-fold-XEN_IBRS-ALTERNATIVES.patch 5afc13ae-5-x86-rename-bits-of-spec_ctrl-infrastructure.patch 5afc13ae-6-x86-elide-MSR_SPEC_CTRL-handling-in-idle.patch 5afc13ae-7-x86-split-X86_FEATURE_SC_MSR.patch 5afc13ae-8-x86-explicitly-set-Xen-default-SPEC_CTRL.patch 5afc13ae-9-x86-cpuid-improve-guest-policies-for-speculative.patch 5afc13ae-A-x86-introduce-spec-ctrl-cmdline-opt.patch 5b02c786-x86-AMD-mitigations-for-GPZ-SP4.patch 5b02c786-x86-Intel-mitigations-for-GPZ-SP4.patch 5b02c786-x86-msr-virtualise-SPEC_CTRL-SSBD.patch 5b0bc9da-x86-XPTI-fix-S3-resume.patch 5b0d2286-libxc-x86-PV-dont-hand-through-CPUID-leaf-0x80000008.patch 5b0d2d91-x86-suppress-sync-when-XPTI-off.patch 5b0d2dbc-x86-correct-default_xen_spec_ctrl.patch 5b0d2ddc-x86-CPUID-dont-override-tool-stack-hidden-STIBP.patch 5b150ef9-x86-fix-error-handling-of-pv-dr7-shadow.patch 5b21825d-1-x86-support-fully-eager-FPU-context-switching.patch 5b21825d-2-x86-spec-ctrl-mitigations-for-LazyFPU.patch 5b238b92-x86-HVM-account-for-fully-eager-FPU.patch 5b2b7172-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b31e004-x86-HVM-emul-attempts-FPU-set-fpu_initialised.patch 5b323e3c-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b34882d-x86-mm-dont-bypass-preemption-checks.patch 5b348874-x86-refine-checks-in-DB-handler.patch 5b348897-libxl-qemu_disk_scsi_drive_string-break-out-common.patch 5b3488a2-libxl-restore-passing-ro-to-qemu-for-SCSI-disks.patch 5b34891a-x86-HVM-dont-cause-NM-to-be-raised.patch 5b348954-x86-guard-against-NM.patch libxl.Add-a-version-check-of-QEMU-for-QMP-commands.patch libxl.LIBXL_DESTROY_TIMEOUT.patch libxl.qmp-Tell-QEMU-about-live-migration-or-snapshot.patch xen_fix_build_with_acpica_20180427_and_new_packages.patch- Submit upstream patch libacpi: fixes for iasl >= 20180427 git commit 858dbaaeda33b05c1ac80aea0ba9a03924e09005 xen_fix_build_with_acpica_20180427_and_new_packages.patch This is needed for acpica package to get updated in our build service- Upstream patches from Jan (bsc#1027519) 5b02c786-x86-AMD-mitigations-for-GPZ-SP4.patch (Replaces Spectre-v4-1.patch) 5b02c786-x86-Intel-mitigations-for-GPZ-SP4.patch (Replaces Spectre-v4-2.patch) 5b02c786-x86-msr-virtualise-SPEC_CTRL-SSBD.patch (Replaces Spectre-v4-3.patch) 5b0bc9da-x86-XPTI-fix-S3-resume.patch 5b0d2286-libxc-x86-PV-dont-hand-through-CPUID-leaf-0x80000008.patch 5b0d2d91-x86-suppress-sync-when-XPTI-off.patch 5b0d2dbc-x86-correct-default_xen_spec_ctrl.patch 5b0d2ddc-x86-CPUID-dont-override-tool-stack-hidden-STIBP.patch 5b150ef9-x86-fix-error-handling-of-pv-dr7-shadow.patch 5b21825d-1-x86-support-fully-eager-FPU-context-switching.patch (Replaces xsa267-1.patch) 5b21825d-2-x86-spec-ctrl-mitigations-for-LazyFPU.patch (Replaces xsa267-2.patch) 5b238b92-x86-HVM-account-for-fully-eager-FPU.patch 5b2b7172-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b31e004-x86-HVM-emul-attempts-FPU-set-fpu_initialised.patch 5b323e3c-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b34882d-x86-mm-dont-bypass-preemption-checks.patch (Replaces xsa264.patch) 5b348874-x86-refine-checks-in-DB-handler.patch (Replaces xsa265.patch) 5b348897-libxl-qemu_disk_scsi_drive_string-break-out-common.patch (Replaces xsa266-1-<>.patch) 5b3488a2-libxl-restore-passing-ro-to-qemu-for-SCSI-disks.patch (Replaces xsa266-2-<>.patch) 5b34891a-x86-HVM-dont-cause-NM-to-be-raised.patch 5b348954-x86-guard-against-NM.patch- Fix more build gcc8 related failures with xen.fuzz-_FORTIFY_SOURCE.patch- bsc#1098403 - fix regression introduced by changes for bsc#1079730 a PV domU without qcow2 and/or vfb has no qemu attached. Ignore QMP errors for PV domUs to handle PV domUs with and without an attached qemu-xen. xen.bug1079730.patch- bsc#1097521 - VUL-0: CVE-2018-12891: xen: preemption checks bypassed in x86 PV MM handling (XSA-264) xsa264.patch - bsc#1097522 - VUL-0: CVE-2018-12893: xen: x86: #DB exception safety check can be triggered by a guest (XSA-265) xsa265.patch - bsc#1097523 - VUL-0: CVE-2018-12892: xen: libxl fails to honour readonly flag on HVM emulated SCSI disks (XSA-266) xsa266-1-libxl-qemu_disk_scsi_drive_string-Break-out-common-p.patch xsa266-2-libxl-restore-passing-readonly-to-qemu-for-SCSI-disk.patch- bsc#1095242 - VUL-0: CVE-2018-3665: xen: Lazy FP Save/Restore (XSA-267) xsa267-1.patch xsa267-2.patch- bsc#1092543 - GCC 8: xen build fails gcc8-fix-warning-on-i586.patch- bsc#1092631 - VUL-0: CVE-2018-3639: xen: V4 – Speculative Store Bypass aka "Memory Disambiguation" (XSA-263) 5ad4923e-x86-correct-S3-resume-ordering.patch 5ad49293-x86-suppress-BTI-mitigations-around-S3.patch 5afc13ae-1-x86-read-MSR_ARCH_CAPABILITIES-once.patch 5afc13ae-2-x86-express-Xen-SPEC_CTRL-choice-as-variable.patch 5afc13ae-3-x86-merge-bti_ist_info-use_shadow_spec_ctrl.patch 5afc13ae-4-x86-fold-XEN_IBRS-ALTERNATIVES.patch 5afc13ae-5-x86-rename-bits-of-spec_ctrl-infrastructure.patch 5afc13ae-6-x86-elide-MSR_SPEC_CTRL-handling-in-idle.patch 5afc13ae-7-x86-split-X86_FEATURE_SC_MSR.patch 5afc13ae-8-x86-explicitly-set-Xen-default-SPEC_CTRL.patch 5afc13ae-9-x86-cpuid-improve-guest-policies-for-speculative.patch 5afc13ae-A-x86-introduce-spec-ctrl-cmdline-opt.patch Spectre-v4-1.patch Spectre-v4-2.patch Spectre-v4-3.patch- Always call qemus xen-save-devices-state in suspend/resume to fix migration with qcow2 images (bsc#1079730) libxl.Add-a-version-check-of-QEMU-for-QMP-commands.patch libxl.qmp-Tell-QEMU-about-live-migration-or-snapshot.patch xen.bug1079730.patch- bsc#1087289 - L3: Xen BUG at sched_credit.c:1663 5aeaeae4-introduce-vcpu_sleep_nosync_locked.patch 5aeaeaf0-sched-fix-races-in-vcpu-migration.patch - Upstream patches from Jan (bsc#1027519) 5ad600d4-x86-pv-introduce-x86emul_read_dr.patch 5ad600d4-x86-pv-introduce-x86emul_write_dr.patch 5ad8c3a7-x86-spec_ctrl-update-retpoline-decision-making.patch 5adda097-x86-HPET-fix-race-triggering-ASSERT.patch 5adda0d5-x86-HVM-never-retain-emulated-insn-cache.patch 5ae06fad-SVM-fix-intercepts-for-SYS-CALL-ENTER-MSRs.patch 5ae31917-x86-cpuidle-init-stats-lock-once.patch 5aeb2c57-x86-retval-checks-of-set-guest-trapbounce.patch 5af1daa9-1-x86-traps-fix-dr6-handing-in-DB-handler.patch (Replaces xsa260-1.patch) 5af1daa9-2-x86-pv-move-exception-injection-into-test_all_events.patch (Replaces xsa260-2.patch) 5af1daa9-3-x86-traps-use-IST-for-DB.patch (Replaces xsa260-3.patch) 5af1daa9-4-x86-traps-fix-handling-of-DB-in-hypervisor-context.patch (Replaces xsa260-4.patch) 5af1daa9-x86-HVM-guard-against-bogus-emulator-ioreq-state.patch (Replaces xsa262.patch) 5af1daa9-x86-vpt-support-IO-APIC-routed-intr.patch (Replaces xsa261.patch) 5af97999-viridian-cpuid-leaf-40000003.patch- Fixes related to Page Table Isolation (XPTI). bsc#1074562 XSA-254 5a6703cb-x86-move-invocations-of-hvm_flush_guest_tlbs.patch 5a9985bd-x86-invpcid-support.patch 5adde9ed-xpti-fix-double-fault-handling.patch 5aec7393-1-x86-xpti-avoid-copy.patch 5aec7393-2-x86-xpti-write-cr3.patch 5aec744a-3-x86-xpti-per-domain-flag.patch 5aec744a-4-x86-xpti-use-invpcid.patch 5aec744a-5-x86-xpti-no-global-pages.patch 5aec744a-6-x86-xpti-cr3-valid-flag.patch 5aec744a-7-x86-xpti-pv_guest_cr4_to_real_cr4.patch 5aec744b-8-x86-xpti-cr3-helpers.patch 5aec74a8-9-x86-xpti-use-pcid.patch- bsc#1092543 - GCC 8: xen build fails 5ac72a48-gcc8.patch 5ac72a5f-gcc8.patch 5ac72a64-gcc8.patch 5ac72a69-gcc8.patch 5ac72a6e-gcc8.patch 5ac72a74-gcc8.patch 5ac72a7b-gcc8.patch gcc8-inlining-failed.patch- Update to Xen 4.10.1 bug fix release (bsc#1027519) xen-4.10.1-testing-src.tar.bz2 disable-building-pv-shim.patch - Drop the following patches contained in the new tarball 5a21a77e-x86-pv-construct-d0v0s-GDT-properly.patch 5a2fda0d-x86-mb2-avoid-Xen-when-looking-for-module-crashkernel-pos.patch 5a2ffc1f-x86-mm-drop-bogus-paging-mode-assertion.patch 5a313972-x86-microcode-add-support-for-AMD-Fam17.patch 5a32bd79-x86-vmx-dont-use-hvm_inject_hw_exception-in-.patch 5a4caa5e-x86-IRQ-conditionally-preserve-access-perm.patch 5a4caa8c-x86-E820-don-t-overrun-array.patch 5a4e2bca-x86-free-msr_vcpu_policy-during-destruction.patch 5a4e2c2c-x86-upcall-inject-spurious-event-after-setting-vector.patch 5a4fd893-1-x86-break-out-alternative-asm-into-separate-header.patch 5a4fd893-2-x86-introduce-ALTERNATIVE_2-macros.patch 5a4fd893-3-x86-hvm-rename-update_guest_vendor-to-cpuid_policy_changed.patch 5a4fd893-4-x86-introduce-cpuid_policy_updated.patch 5a4fd893-5-x86-entry-remove-partial-cpu_user_regs.patch 5a4fd894-1-x86-rearrange-RESTORE_ALL-to-restore-in-stack-order.patch 5a4fd894-2-x86-hvm-use-SAVE_ALL-after-VMExit.patch 5a4fd894-3-x86-erase-guest-GPRs-on-entry-to-Xen.patch 5a4fd894-4-clarifications-to-wait-infrastructure.patch 5a534c78-x86-dont-use-incorrect-CPUID-values-for-topology.patch 5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4-updates.patch 5a5e2cff-x86-Meltdown-band-aid.patch 5a5e2d73-x86-Meltdown-band-aid-conditional.patch 5a5e3a4e-1-x86-support-compiling-with-indirect-branch-thunks.patch 5a5e3a4e-2-x86-support-indirect-thunks-from-asm.patch 5a5e3a4e-3-x86-report-speculative-mitigation-details.patch 5a5e3a4e-4-x86-AMD-set-lfence-as-Dispatch-Serialising.patch 5a5e3a4e-5-x86-introduce-alternative-indirect-thunks.patch 5a5e3a4e-6-x86-definitions-for-Indirect-Branch-Controls.patch 5a5e3a4e-7-x86-cmdline-opt-to-disable-IBRS-IBPB-STIBP.patch 5a5e459c-1-x86-SVM-offer-CPUID-faulting-to-AMD-HVM-guests.patch 5a5e459c-2-x86-report-domain-id-on-CPUID.patch 5a68bc16-x86-acpi-process-softirqs-logging-Cx.patch 5a69c0b9-x86-fix-GET_STACK_END.patch 5a6b36cd-1-x86-cpuid-handling-of-IBRS-IBPB-STIBP-and-IBRS-for-guests.patch 5a6b36cd-2-x86-msr-emulation-of-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-3-x86-migrate-MSR_SPEC_CTRL.patch 5a6b36cd-4-x86-hvm-permit-direct-access-to-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-5-x86-use-SPEC_CTRL-on-entry.patch 5a6b36cd-6-x86-clobber-RSB-RAS-on-entry.patch 5a6b36cd-7-x86-no-alternatives-in-NMI-MC-paths.patch 5a6b36cd-8-x86-boot-calculate-best-BTI-mitigation.patch 5a6b36cd-9-x86-issue-speculation-barrier.patch 5a6b36cd-A-x86-offer-Indirect-Branch-Controls-to-guests.patch 5a6b36cd-B-x86-clear-SPEC_CTRL-while-idle.patch 5a7b1bdd-x86-reduce-Meltdown-band-aid-IPI-overhead.patch 5a843807-x86-spec_ctrl-fix-bugs-in-SPEC_CTRL_ENTRY_FROM_INTR_IST.patch 5a856a2b-x86-emul-fix-64bit-decoding-of-segment-overrides.patch 5a856a2b-x86-use-32bit-xors-for-clearing-GPRs.patch 5a856a2b-x86-xpti-hide-almost-all-of-Xen-image-mappings.patch 5a8be788-x86-nmi-start-NMI-watchdog-on-CPU0-after-SMP.patch 5a95373b-x86-PV-avoid-leaking-other-guests-MSR_TSC_AUX.patch 5a95571f-memory-dont-implicitly-unpin-in-decrease-res.patch 5a95576c-gnttab-ARM-dont-corrupt-shared-GFN-array.patch 5a955800-gnttab-dont-free-status-pages-on-ver-change.patch 5a955854-x86-disallow-HVM-creation-without-LAPIC-emul.patch 5a956747-x86-HVM-dont-give-wrong-impression-of-WRMSR-success.patch 5a9eb7f1-x86-xpti-dont-map-stack-guard-pages.patch 5a9eb85c-x86-slightly-reduce-XPTI-overhead.patch 5a9eb890-x86-remove-CR-reads-from-exit-to-guest-path.patch 5aa2b6b9-cpufreq-ondemand-CPU-offlining-race.patch 5aaa9878-x86-vlapic-clear-TMR-bit-for-edge-triggered-intr.patch xsa258.patch xsa259.patch- bsc#1090820 - VUL-0: CVE-2018-8897: xen: x86: mishandling of debug exceptions (XSA-260) xsa260-1.patch xsa260-2.patch xsa260-3.patch xsa260-4.patch - bsc#1090822 - VUL-0: CVE-2018-10982: xen: x86 vHPET interrupt injection errors (XSA-261) xsa261.patch - bsc#1090823 - VUL-0: CVE-2018-10981: xen: qemu may drive Xen into unbounded loop (XSA-262) xsa262.patch- bsc#1089152 - VUL-0: CVE-2018-10472: xen: Information leak via crafted user-supplied CDROM (XSA-258) xsa258.patch - bsc#1089635 - VUL-0: CVE-2018-10471: xen: x86: PV guest may crash Xen with XPTI (XSA-259) xsa259.patch- Preserve xen-syms from xen-dbg.gz to allow processing vmcores with crash(1) (bsc#1087251)- Upstream patches from Jan (bsc#1027519) and fixes related to Page Table Isolation (XPTI). See also bsc#1074562 XSA-254 5a856a2b-x86-xpti-hide-almost-all-of-Xen-image-mappings.patch 5a9eb7f1-x86-xpti-dont-map-stack-guard-pages.patch 5a9eb85c-x86-slightly-reduce-XPTI-overhead.patch 5a9eb890-x86-remove-CR-reads-from-exit-to-guest-path.patch 5aa2b6b9-cpufreq-ondemand-CPU-offlining-race.patch 5aaa9878-x86-vlapic-clear-TMR-bit-for-edge-triggered-intr.patch- bsc#1072834 - Xen HVM: unchecked MSR access error: RDMSR from 0xc90 at rIP: 0xffffffff93061456 (native_read_msr+0x6/0x30) 5a956747-x86-HVM-dont-give-wrong-impression-of-WRMSR-success.patch - Upstream patches from Jan (bsc#1027519) 5a79d7ed-libxc-packed-initrd-dont-fail-domain-creation.patch 5a7b1bdd-x86-reduce-Meltdown-band-aid-IPI-overhead.patch 5a843807-x86-spec_ctrl-fix-bugs-in-SPEC_CTRL_ENTRY_FROM_INTR_IST.patch 5a856a2b-x86-emul-fix-64bit-decoding-of-segment-overrides.patch 5a856a2b-x86-use-32bit-xors-for-clearing-GPRs.patch 5a8be788-x86-nmi-start-NMI-watchdog-on-CPU0-after-SMP.patch 5a95373b-x86-PV-avoid-leaking-other-guests-MSR_TSC_AUX.patch 5a95571f-memory-dont-implicitly-unpin-in-decrease-res.patch (Replaces xsa252.patch) 5a95576c-gnttab-ARM-dont-corrupt-shared-GFN-array.patch (Replaces xsa255-1.patch) 5a955800-gnttab-dont-free-status-pages-on-ver-change.patch (Replaces xsa255-2.patch) 5a955854-x86-disallow-HVM-creation-without-LAPIC-emul.patch (Replaces xsa256.patch) - Drop xsa252.patch xsa255-1.patch xsa255-2.patch xsa256.patch- bsc#1080635 - VUL-0: CVE-2018-7540: xen: DoS via non-preemptable L3/L4 pagetable freeing (XSA-252) xsa252.patch - bsc#1080662 - VUL-0: CVE-2018-7541: xen: grant table v2 -> v1 transition may crash Xen (XSA-255) xsa255-1.patch xsa255-2.patch - bsc#1080634 - VUL-0: CVE-2018-7542: xen: x86 PVH guest without LAPIC may DoS the host (XSA-256) xsa256.patch- Remove stale systemd presets code for 13.2 and older- fate#324965 - add script, udev rule and systemd service to watch for vcpu online/offline events in a HVM domU They are triggered via xl vcpu-set domU N- Replace hardcoded xen with Name tag when refering to subpkgs- Make sure tools and tools-domU require libs from the very same build- tools-domU: Add support for qemu guest agent. New files 80-xen-channel-setup.rules and xen-channel-setup.sh configure a xen-pv-channel for use by the guest agent FATE#324963- Remove outdated /etc/xen/README*- bsc#1073961 - VUL-0: CVE-2018-5244: xen: x86: memory leak with MSR emulation (XSA-253) 5a4e2bca-x86-free-msr_vcpu_policy-during-destruction.patch - bsc#1074562 - VUL-0: CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 xen: Information leak via side effects of speculative execution (XSA-254). Includes Spectre v2 mitigation. 5a4caa5e-x86-IRQ-conditionally-preserve-access-perm.patch 5a4caa8c-x86-E820-don-t-overrun-array.patch 5a4e2c2c-x86-upcall-inject-spurious-event-after-setting-vector.patch 5a4fd893-1-x86-break-out-alternative-asm-into-separate-header.patch 5a4fd893-2-x86-introduce-ALTERNATIVE_2-macros.patch 5a4fd893-3-x86-hvm-rename-update_guest_vendor-to-cpuid_policy_changed.patch 5a4fd893-4-x86-introduce-cpuid_policy_updated.patch 5a4fd893-5-x86-entry-remove-partial-cpu_user_regs.patch 5a4fd894-1-x86-rearrange-RESTORE_ALL-to-restore-in-stack-order.patch 5a4fd894-2-x86-hvm-use-SAVE_ALL-after-VMExit.patch 5a4fd894-3-x86-erase-guest-GPRs-on-entry-to-Xen.patch 5a4fd894-4-clarifications-to-wait-infrastructure.patch 5a534c78-x86-dont-use-incorrect-CPUID-values-for-topology.patch 5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4-updates.patch 5a5e2cff-x86-Meltdown-band-aid.patch 5a5e2d73-x86-Meltdown-band-aid-conditional.patch 5a5e3a4e-1-x86-support-compiling-with-indirect-branch-thunks.patch 5a5e3a4e-2-x86-support-indirect-thunks-from-asm.patch 5a5e3a4e-3-x86-report-speculative-mitigation-details.patch 5a5e3a4e-4-x86-AMD-set-lfence-as-Dispatch-Serialising.patch 5a5e3a4e-5-x86-introduce-alternative-indirect-thunks.patch 5a5e3a4e-6-x86-definitions-for-Indirect-Branch-Controls.patch 5a5e3a4e-7-x86-cmdline-opt-to-disable-IBRS-IBPB-STIBP.patch 5a5e459c-1-x86-SVM-offer-CPUID-faulting-to-AMD-HVM-guests.patch 5a5e459c-2-x86-report-domain-id-on-CPUID.patch 5a68bc16-x86-acpi-process-softirqs-logging-Cx.patch 5a69c0b9-x86-fix-GET_STACK_END.patch 5a6b36cd-1-x86-cpuid-handling-of-IBRS-IBPB-STIBP-and-IBRS-for-guests.patch 5a6b36cd-2-x86-msr-emulation-of-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-3-x86-migrate-MSR_SPEC_CTRL.patch 5a6b36cd-4-x86-hvm-permit-direct-access-to-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-5-x86-use-SPEC_CTRL-on-entry.patch 5a6b36cd-6-x86-clobber-RSB-RAS-on-entry.patch 5a6b36cd-7-x86-no-alternatives-in-NMI-MC-paths.patch 5a6b36cd-8-x86-boot-calculate-best-BTI-mitigation.patch 5a6b36cd-9-x86-issue-speculation-barrier.patch 5a6b36cd-A-x86-offer-Indirect-Branch-Controls-to-guests.patch 5a6b36cd-B-x86-clear-SPEC_CTRL-while-idle.patch- Fix python3 deprecated atoi call (bsc#1067224) pygrub-python3-conversion.patch - Drop xenmon-python3-conversion.patch- bsc#1067317 - pass cache=writeback|unsafe|directsync to qemu, depending on the libxl disk settings libxl.add-option-to-disable-disk-cache-flushes-in-qdisk.patch- Remove libxl.LIBXL_DESTROY_TIMEOUT.debug.patch- bsc#1067224 - xen-tools have hard dependency on Python 2 build-python3-conversion.patch bin-python3-conversion.patch- bsc#1070165 - xen crashes after aborted localhost migration 5a2ffc1f-x86-mm-drop-bogus-paging-mode-assertion.patch - bsc#1035442 - L3: libxl: error: libxl.c:1676:devices_destroy_cb: libxl__devices_destroy failed 5a33a12f-domctl-improve-locking-during-domain-destruction.patch - Upstream patches from Jan (bsc#1027519) 5a21a77e-x86-pv-construct-d0v0s-GDT-properly.patch 5a2fda0d-x86-mb2-avoid-Xen-when-looking-for-module-crashkernel-pos.patch 5a313972-x86-microcode-add-support-for-AMD-Fam17.patch 5a32bd79-x86-vmx-dont-use-hvm_inject_hw_exception-in-.patch- Update to Xen 4.10.0 FCS (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Rebuild initrd if xen-tools-domU is updated- Update to Xen 4.10.0-rc8 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Increase the value of LIBXL_DESTROY_TIMEOUT from 10 to 100 seconds If many domUs shutdown in parallel the backends can not keep up Add some debug output to track how long backend shutdown takes (bsc#1035442) libxl.LIBXL_DESTROY_TIMEOUT.patch libxl.LIBXL_DESTROY_TIMEOUT.debug.patch- Adjust xenstore-run-in-studomain.patch to change the defaults in the code instead of changing the sysconfig template, to also cover the upgrade case- Update to Xen 4.10.0-rc6 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Since xen switched to Kconfig, building a debug hypervisor was done by default. Adjust make logic to build a non-debug hypervisor by default, and continue to provide one as xen-dbg.gz- fate#316614: set migration constraints from cmdline fix libxl.set-migration-constraints-from-cmdline.patch for xen-4.10- Document the suse-diskcache-disable-flush option in xl-disk-configuration(5) (bsc#879425,bsc#1067317)- Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468)- Update to Xen 4.10.0-rc5 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - fate#323663 - Run Xenstore in stubdomain xenstore-run-in-studomain.patch- bsc#1067224 - xen-tools have hard dependency on Python 2 pygrub-python3-conversion.patch xenmon-python3-conversion.patch migration-python3-conversion.patch xnloader.py xen2libvirt.py- Remove xendriverdomain.service (bsc#1065185) Driver domains must be configured manually with custom .service file- Update to Xen 4.10.0-rc3 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - Drop 59f31268-libxc-remove-stale-error-check-for-domain-size.patch- Adjust xen-dom0-modules.service to ignore errors (bsc#1065187)- fate#324052 Support migration of Xen HVM domains larger than 1TB 59f31268-libxc-remove-stale-error-check-for-domain-size.patch- Update to Xen 4.10.0-rc2 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Update to Xen 4.10.0-rc1 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - Drop patches included in new tarball 592fd5f0-stop_machine-fill-result-only-in-case-of-error.patch 596f257e-x86-fix-hvmemul_insn_fetch.patch 5982fd99-VT-d-don-t-panic-warn-on-iommu-no-igfx.patch 598c3630-VT-d-PI-disable-when-CPU-side-PI-is-off.patch 598c3706-cpufreq-only-stop-ondemand-governor-if-started.patch 5992f1e5-x86-grant-disallow-misaligned-PTEs.patch 5992f20d-gnttab-split-maptrack-lock-to-make-it-useful-again.patch 5992f233-gnttab-correct-pin-status-fixup-for-copy.patch 59958e76-gnttab-dont-use-possibly-unbounded-tail-calls.patch 59958ebf-gnttab-fix-transitive-grant-handling.patch 59958edd-gnttab-avoid-spurious-maptrack-handle-alloc-failures.patch 599da329-arm-mm-release-grant-lock-on-xatp1-error-paths.patch 59a01223-x86-check-for-alloc-errors-in-modify_xen_mappings.patch 59a0130c-x86-efi-dont-write-relocs-in-efi_arch_relocate_image-1st-pass.patch 59a9221f-VT-d-use-correct-BDF-for-VF-to-search-VT-d-unit.patch 59ae9177-x86-emul-fix-handling-of-unimplemented-Grp7-insns.patch 59aec335-x86emul-correct-VEX-W-handling-for-VPINSRD.patch 59aec375-x86emul-correct-VEX-L-handling-for-VCVTx2SI.patch 59afcea0-x86-introduce-and-use-setup_force_cpu_cap.patch 59b2a7f2-x86-HVM-correct-repeat-count-update-linear-phys.patch 59b7d664-mm-make-sure-node-is-less-than-MAX_NUMNODES.patch 59b7d69b-grant_table-fix-GNTTABOP_cache_flush-handling.patch 59b7d6c8-xenstore-dont-unlink-connection-object-twice.patch 59b7d6d9-gnttab-also-validate-PTE-perms-upon-destroy-replace.patch gcc7-arm.patch gcc7-mini-os.patch- bsc#1061084 - VUL-0: xen: page type reference leak on x86 (XSA-242) xsa242.patch - bsc#1061086 - VUL-0: xen: x86: Incorrect handling of self-linear shadow mappings with translated guests (XSA-243) xsa243.patch - bsc#1061087 - VUL-0: xen: x86: Incorrect handling of IST settings during CPU hotplug (XSA-244) xsa244.patch- bsc#1061077 - VUL-0: xen: DMOP map/unmap missing argument checks (XSA-238) xsa238.patch - bsc#1061080 - VUL-0: xen: hypervisor stack leak in x86 I/O intercept code (XSA-239) xsa239.patch - bsc#1061081 - VUL-0: xen: Unlimited recursion in linear pagetable de-typing (XSA-240) xsa240-1.patch xsa240-2.patch - bsc#1061082 - VUL-0: xen: Stale TLB entry due to page type release race (XSA-241) xsa241.patch- bsc#1061075 - VUL-0: xen: pin count / page reference race in grant table code (XSA-236) xsa236.patch - bsc#1061076 - VUL-0: xen: multiple MSI mapping issues on x86 (XSA-237) xsa237-1.patch xsa237-2.patch xsa237-3.patch xsa237-4.patch xsa237-5.patch- bsc#1056278 - VUL-0: xen: Missing NUMA node parameter verification (XSA-231) 59b7d664-mm-make-sure-node-is-less-than-MAX_NUMNODES.patch - bsc#1056280 - VUL-0: xen: Missing check for grant table (XSA-232) 59b7d69b-grant_table-fix-GNTTABOP_cache_flush-handling.patch - bsc#1056281 - VUL-0: xen: cxenstored: Race in domain cleanup (XSA-233) 59b7d6c8-xenstore-dont-unlink-connection-object-twice.patch - bsc#1056282 - VUL-0: xen: insufficient grant unmapping checks for x86 PV guests (XSA-234) 59b7d6d9-gnttab-also-validate-PTE-perms-upon-destroy-replace.patch - bsc#1055321 - VUL-0: xen: add-to-physmap error paths fail to release lock on ARM (XSA-235) 599da329-arm-mm-release-grant-lock-on-xatp1-error-paths.patch - Upstream patches from Jan (bsc#1027519) 59a01223-x86-check-for-alloc-errors-in-modify_xen_mappings.patch 59a0130c-x86-efi-dont-write-relocs-in-efi_arch_relocate_image-1st-pass.patch 59a9221f-VT-d-use-correct-BDF-for-VF-to-search-VT-d-unit.patch 59ae9177-x86-emul-fix-handling-of-unimplemented-Grp7-insns.patch 59aec335-x86emul-correct-VEX-W-handling-for-VPINSRD.patch 59aec375-x86emul-correct-VEX-L-handling-for-VCVTx2SI.patch 59afcea0-x86-introduce-and-use-setup_force_cpu_cap.patch 59b2a7f2-x86-HVM-correct-repeat-count-update-linear-phys.patch - Dropped gcc7-xen.patch- bsc#1057358 - Cannot Boot into SLES12.3 with Xen hypervisor when Secure Boot is Enabled xen.spec- bsc#1055695 - XEN: 11SP4 and 12SP3 HVM guests can not be restored update from v6 to v9 to cover more cases for ballooned domUs libxc.sr.superpage.patch- bsc#1026236 - remove suse_vtsc_tolerance= cmdline option for Xen drop the patch because it is not upstream acceptable remove xen.suse_vtsc_tolerance.patch- bsc#1055695 - XEN: 11SP4 and 12SP3 HVM guests can not be restored after the save using xl stack libxc.sr.superpage.patch- Unignore gcc-PIE the toolstack disables PIE for firmware builds as needed- Upstream patches from Jan (bsc#1027519) 592fd5f0-stop_machine-fill-result-only-in-case-of-error.patch 596f257e-x86-fix-hvmemul_insn_fetch.patch 5982fd99-VT-d-don-t-panic-warn-on-iommu-no-igfx.patch 598c3630-VT-d-PI-disable-when-CPU-side-PI-is-off.patch 598c3706-cpufreq-only-stop-ondemand-governor-if-started.patch 5992f1e5-x86-grant-disallow-misaligned-PTEs.patch (Replaces xsa227.patch) 5992f20d-gnttab-split-maptrack-lock-to-make-it-useful-again.patch (Replaces xsa228.patch) 5992f233-gnttab-correct-pin-status-fixup-for-copy.patch (Replaces xsa230.patch) 59958e76-gnttab-dont-use-possibly-unbounded-tail-calls.patch (Replaces xsa226-1.patch) 59958ebf-gnttab-fix-transitive-grant-handling.patch (Replaces xsa226-2.patch) 59958edd-gnttab-avoid-spurious-maptrack-handle-alloc-failures.patch- bsc#1044974 - xen-tools require python-pam xen.spec- Clean up spec file errors and a few warnings. (bsc#1027519) - Removed conditional 'with_systemd' and some old deprecated 'sles_version' checks. xen.spec- Remove use of brctl utiltiy from supportconfig plugin FATE#323639- Use upstream variant of mini-os __udivmoddi4 change gcc7-mini-os.patch- fate#323639 Move bridge-utils to legacy replace-obsolete-network-configuration-commands-in-s.patch- bsc#1052686 - VUL-0: xen: grant_table: possibly premature clearing of GTF_writing / GTF_reading (XSA-230) xsa230.patch- bsc#1035231 - migration of HVM domU does not use superpages on destination dom0 libxc.sr.superpage.patch- bsc#1051787 - VUL-0: CVE-2017-12135: xen: possibly unbounded recursion in grant table code (XSA-226) xsa226-1.patch xsa226-2.patch - bsc#1051788 - VUL-0: CVE-2017-12137: xen: x86: PV privilege escalation via map_grant_ref (XSA-227) xsa227.patch - bsc#1051789 - VUL-0: CVE-2017-12136: xen: grant_table: Race conditions with maptrack free list handling (XSA-228) xsa228.patch- Add a supportconfig plugin xen-supportconfig FATE#323661- bsc#1026236 - add suse_vtsc_tolerance= cmdline option for Xen To avoid emulation of TSC access from a domU after live migration add a global tolerance for the measured host kHz xen.suse_vtsc_tolerance.patch- fate#323662 Drop qemu-dm from xen-tools package The following tarball and patches have been removed qemu-xen-traditional-dir-remote.tar.bz2 VNC-Support-for-ExtendedKeyEvent-client-message.patch 0001-net-move-the-tap-buffer-into-TAPState.patch 0002-net-increase-tap-buffer-size.patch 0003-e1000-fix-access-4-bytes-beyond-buffer-end.patch 0004-e1000-secrc-support.patch 0005-e1000-multi-buffer-packet-support.patch 0006-e1000-clear-EOP-for-multi-buffer-descriptors.patch 0007-e1000-verify-we-have-buffers-upfront.patch 0008-e1000-check-buffer-availability.patch CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch CVE-2015-4037-qemut-smb-config-dir-name.patch CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch CVE-2016-7908-qemut-net-Infinite-loop-in-mcf_fec_do_tx.patch CVE-2016-7909-qemut-net-pcnet-infinite-loop-in-pcnet_rdra_addr.patch CVE-2016-8667-qemut-dma-rc4030-divide-by-zero-error-in-set_next_tick.patch CVE-2016-8669-qemut-char-divide-by-zero-error-in-serial_update_parameters.patch CVE-2016-8910-qemut-net-rtl8139-infinite-loop-while-transmit-in-Cplus-mode.patch CVE-2016-9921-qemut-display-cirrus_vga-divide-by-zero-in-cirrus_do_copy.patch CVE-2017-6505-qemut-usb-an-infinite-loop-issue-in-ohci_service_ed_list.patch CVE-2017-8309-qemut-audio-host-memory-leakage-via-capture-buffer.patch CVE-2017-9330-qemut-usb-ohci-infinite-loop-due-to-incorrect-return-value.patch blktap.patch cdrom-removable.patch xen-qemu-iscsi-fix.patch qemu-security-etch1.patch xen-disable-qemu-monitor.patch xen-hvm-default-bridge.patch qemu-ifup-set-mtu.patch ioemu-vnc-resize.patch capslock_enable.patch altgr_2.patch log-guest-console.patch bdrv_open2_fix_flags.patch bdrv_open2_flags_2.patch ioemu-7615-qcow2-fix-alloc_cluster_link_l2.patch qemu-dm-segfault.patch bdrv_default_rwflag.patch kernel-boot-hvm.patch ioemu-watchdog-support.patch ioemu-watchdog-linkage.patch ioemu-watchdog-ib700-timer.patch ioemu-hvm-pv-support.patch pvdrv_emulation_control.patch ioemu-disable-scsi.patch ioemu-disable-emulated-ide-if-pv.patch xenpaging.qemu.flush-cache.patch ioemu-devicemodel-include.patch - Cleanup spec file and remove unused KMP patches kmp_filelist supported_module.patch xen_pvonhvm.xen_emul_unplug.patch- bsc#1002573 - Optimize LVM functions in block-dmmd block-dmmd- Record initial Xen dmesg in /var/log/xen/xen-boot.log for supportconfig. Keep previous log in /var/log/xen/xen-boot.prev.log- Remove storytelling from description in xen.rpm- Update to Xen 4.9.0 FCS (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update block-dmmd script (bsc#1002573) block-dmmd- Update to Xen 4.9.0-rc8+ (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 gcc7-arm.patch - Drop gcc7-error-xenpmd.patch- Update to Xen 4.9.0-rc8 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1042160 - VUL-1: CVE-2017-9330: xen: usb: ohci: infinite loop due to incorrect return value CVE-2017-9330-qemut-usb-ohci-infinite-loop-due-to-incorrect-return-value.patch- bsc#1037243 - VUL-1: CVE-2017-8309: xen: audio: host memory leakage via capture buffer CVE-2017-8309-qemut-audio-host-memory-leakage-via-capture-buffer.patch- Update to Xen 4.9.0-rc7 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update to Xen 4.9.0-rc6 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1031343 - xen fails to build with GCC 7 gcc7-mini-os.patch gcc7-xen.patch- bsc#1031343 - xen fails to build with GCC 7 gcc7-error-xenpmd.patch- Update to Xen 4.9.0-rc5 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 - Drop xen-tools-pkgconfig-xenlight.patch- bsc#1037779 - xen breaks kexec-tools build xen-tools-pkgconfig-xenlight.patch- Update to Xen 4.9.0-rc4 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1036146 - sles12sp2 xen VM dumps core to wrong path xen.spec- Update to Xen 4.9.0-rc3 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 aarch64-maybe-uninitialized.patch- Update to Xen 4.9.0-rc2 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update to Xen 4.9.0-rc1 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 ioemu-devicemodel-include.patch - Dropped patches contained in new tarball xen-4.8.0-testing-src.tar.bz2 0001-xenstore-let-write_node-and-some-callers-return-errn.patch 0002-xenstore-undo-function-rename.patch 0003-xenstore-rework-of-transaction-handling.patch 584806ce-x86emul-correct-PUSHF-POPF.patch 584fc649-fix-determining-when-domain-creation-is-complete.patch 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch 58510cac-x86emul-MOVNTI-no-REP-prefixes.patch 58526ccc-x86emul-64bit-ignore-most-segment-bases-in-align-check.patch 5853ed37-VT-d-correct-dma_msi_set_affinity.patch 5853ee07-x86emul-CMPXCHG16B-aligned-operand.patch 58580060-x86-emul-correct-SYSCALL-eflags-handling.patch 585aa3c5-x86-force-EFLAGS-IF-on-upon-exit-to-PV.patch 585aa407-x86-HVM-NULL-check-before-using-VMFUNC-hook.patch 585bd5fe-x86-emul-correct-VMFUNC-return-value-handling.patch 586ba81c-x86-cpu-dont-update-this_cpu-for-guest-get_cpu_vendor.patch 587d04d6-x86-xstate-fix-array-overrun-with-LWP.patch 587de4a9-x86emul-VEX-B-ignored-in-compat-mode.patch 5882129d-x86emul-LOCK-check-adjustments.patch 58821300-x86-segment-attribute-handling.patch 58873c1f-x86emul-correct-FPU-stub-asm-constraints.patch 58873c80-x86-hvm-do-not-set-msr_tsc_adjust-on-.patch 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5887888f-credit2-never-consider-CPUs-outside-of-pool.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5888b1b3-x86-emulate-dont-assume-addr_size-32-implies-protmode.patch 5899cbd9-EPT-allow-wrcomb-MMIO-mappings-again.patch 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch 58a44771-IOMMU-always-call-teardown-callback.patch 58a48ccc-x86-fix-p2m_flush_table-for-non-nested.patch 58a59f4b-libxl-correct-xenstore-entry-for-empty-cdrom.patch 58a70d94-VMX-fix-VMCS-race-on-cswitch-paths.patch 58ac1f3f-VMX-dont-leak-host-syscall-MSRs.patch 58b5a2de-x86-correct-Xens-idea-of-its-memory-layout.patch 58b6fd42-credit2-always-mark-a-tickled-pCPU-as-tickled.patch 58b6fd42-credit2-dont-miss-accounting-during-credit-reset.patch 58cbf682-x86-EFI-avoid-overrunning-mb_modules.patch 58cf9200-x86-EFI-avoid-IOMMU-faults-on-tail-gap.patch 58cf9260-x86-EFI-avoid-Xen-when-looking-for-mod-kexec-pos.patch 58cf9277-x86-time-dont-use-vTSC-if-host-guest-freqs-match.patch 58d25ea2-xenstore-add-missing-checks-for-allocation-failure.patch 58d91365-sched-dont-call-wrong-hook-via-VCPU2OP.patch CVE-2017-2615-qemut-display-cirrus-oob-access-while-doing-bitblt-copy-backward-mode.patch CVE-2017-2620-xsa209-qemut-cirrus_bitblt_cputovideo-does-not-check-if-memory-region-safe.patch glibc-2.25-compatibility-fix.patch xs-09-add_change_node-params.patch xs-10-call-add_change_node.patch xs-11-tdb-record-header.patch xs-12-node-gen-count.patch xs-13-read-directory-part-support.patch xs-14-command-array.patch xs-15-command-return-val.patch xs-16-function-static.patch xs-17-arg-parsing.patch xs-18-default-buffer.patch xs-19-handle-alloc-failures.patch xs-20-tdb-version.patch xs-21-empty-tdb-database.patch xs-22-reopen_log-fix.patch xs-23-XS_DEBUG-rename.patch xs-24-xenstored_control.patch xs-25-control-enhance.patch xs-26-log-control.patch xs-27-memory-report.patch xs-28-remove-talloc-report.patch xs-29-define-off_t.patch xsa206-0001-xenstored-apply-a-write-transaction-rate-limit.patch xsa206-0002-xenstored-Log-when-the-write-transaction-rate-limit.patch- bsc#1022703 - Xen HVM guest with OVMF hangs with unattached CDRom 58a59f4b-libxl-correct-xenstore-entry-for-empty-cdrom.patch- bsc#1015348 - L3: libvirtd does not start during boot suse-xendomains-service.patch- bsc#1014136 - Partner-L3: kdump can't dump a kernel on SLES12-SP2 with Xen hypervisor. 58cf9260-x86-EFI-avoid-Xen-when-looking-for-mod-kexec-pos.patch - bsc#1026236 - L3: Paravirtualized vs. fully virtualized migration - latter one much faster 58cf9277-x86-time-dont-use-vTSC-if-host-guest-freqs-match.patch - Upstream patch from Jan 58cbf682-x86-EFI-avoid-overrunning-mb_modules.patch 58cf9200-x86-EFI-avoid-IOMMU-faults-on-tail-gap.patch 58d91365-sched-dont-call-wrong-hook-via-VCPU2OP.patch- bsc#1022555 - L3: Timeout in "execution of /etc/xen/scripts/block add" 58d25ea2-xenstore-add-missing-checks-for-allocation-failure.patch 0001-xenstore-let-write_node-and-some-callers-return-errn.patch 0002-xenstore-undo-function-rename.patch 0003-xenstore-rework-of-transaction-handling.patch - bsc#1030144 - VUL-0: xen: xenstore denial of service via repeated update (XSA-206) xsa206-0001-xenstored-apply-a-write-transaction-rate-limit.patch xsa206-0002-xenstored-Log-when-the-write-transaction-rate-limit.patch - bsc#1029827 - Forward port xenstored xs-09-add_change_node-params.patch xs-10-call-add_change_node.patch xs-11-tdb-record-header.patch xs-12-node-gen-count.patch xs-13-read-directory-part-support.patch xs-14-command-array.patch xs-15-command-return-val.patch xs-16-function-static.patch xs-17-arg-parsing.patch xs-18-default-buffer.patch xs-19-handle-alloc-failures.patch xs-20-tdb-version.patch xs-21-empty-tdb-database.patch xs-22-reopen_log-fix.patch xs-23-XS_DEBUG-rename.patch xs-24-xenstored_control.patch xs-25-control-enhance.patch xs-26-log-control.patch xs-27-memory-report.patch xs-28-remove-talloc-report.patch xs-29-define-off_t.patch- bsc#1029128 - fix make xen to really produce xen.efi with gcc48- bsc#1028235 - VUL-0: CVE-2017-6505: xen: qemu: usb: an infinite loop issue in ohci_service_ed_list CVE-2017-6505-qemut-usb-an-infinite-loop-issue-in-ohci_service_ed_list.patch - Upstream patches from Jan (bsc#1027519) 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5899cbd9-EPT-allow-wrcomb-MMIO-mappings-again.patch 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch 58a44771-IOMMU-always-call-teardown-callback.patch 58a48ccc-x86-fix-p2m_flush_table-for-non-nested.patch 58a70d94-VMX-fix-VMCS-race-on-cswitch-paths.patch 58ac1f3f-VMX-dont-leak-host-syscall-MSRs.patch 58b5a2de-x86-correct-Xens-idea-of-its-memory-layout.patch 58b6fd42-credit2-always-mark-a-tickled-pCPU-as-tickled.patch 58b6fd42-credit2-dont-miss-accounting-during-credit-reset.patch- bsc#1027654 - XEN fails to build against glibc 2.25 glibc-2.25-compatibility-fix.patch libxl.pvscsi.patch- fate#316613: Refresh and enable libxl.pvscsi.patch- bsc#1024834 - VUL-0: CVE-2017-2620: xen: cirrus_bitblt_cputovideo does not check if memory region is safe (XSA-209) CVE-2017-2620-xsa209-qemut-cirrus_bitblt_cputovideo-does-not-check-if-memory-region-safe.patch- bsc#1023948 - [pvusb][sles12sp3][openqa] Segmentation fault happened when adding usbctrl devices via xl 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch- Upstream patches from Jan (bsc#1027519) 587d04d6-x86-xstate-fix-array-overrun-with-LWP.patch 587de4a9-x86emul-VEX-B-ignored-in-compat-mode.patch 5882129d-x86emul-LOCK-check-adjustments.patch 58821300-x86-segment-attribute-handling.patch 58873c1f-x86emul-correct-FPU-stub-asm-constraints.patch 58873c80-x86-hvm-do-not-set-msr_tsc_adjust-on-.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5887888f-credit2-never-consider-CPUs-outside-of-pool.patch 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5888b1b3-x86-emulate-dont-assume-addr_size-32-implies-protmode.patch- bsc#1023004 - VUL-0: CVE-2017-2615: qemu: display: cirrus: oob access while doing bitblt copy backward mode CVE-2017-2615-qemut-display-cirrus-oob-access-while-doing-bitblt-copy-backward-mode.patch- fate#322313 and fate#322150 require the acpica package ported to aarch64 which Xen 4.8 needs to build. Temporarily disable aarch64 until these fates are complete. xen.spec- bsc#1021952 - Virutalization/xen: Bug xen-tools missing /usr/bin/domu-xenstore; guests fail to launch tmp_build.patch xen.spec- No systemd presets for 42.3+ and SLE12SP3+ (bsc#1012842)- bsc#1007224 - broken symlinks in /usr/share/doc/packages/xen/misc/ xen.spec- 585aa3c5-x86-force-EFLAGS-IF-on-upon-exit-to-PV.patch Replaces xsa202.patch (bsc#1014298) - 585aa407-x86-HVM-NULL-check-before-using-VMFUNC-hook.patch Replaces xsa203.patch (bsc#1014300) - 58580060-x86-emul-correct-SYSCALL-eflags-handling.patch Replaces xsa204.patch (bsc#1016340) - Upstream patches from Jan 58526ccc-x86emul-64bit-ignore-most-segment-bases-in-align-check.patch 5853ed37-VT-d-correct-dma_msi_set_affinity.patch 5853ee07-x86emul-CMPXCHG16B-aligned-operand.patch 585bd5fe-x86-emul-correct-VMFUNC-return-value-handling.patch 586ba81c-x86-cpu-dont-update-this_cpu-for-guest-get_cpu_vendor.patch- bsc#1015169 - VUL-0: CVE-2016-9921, CVE-2016-9922: xen: qemu: display: cirrus_vga: a divide by zero in cirrus_do_copy CVE-2016-9921-qemut-display-cirrus_vga-divide-by-zero-in-cirrus_do_copy.patch- bsc#1016340 - VUL-0: CVE-2016-10013: xen: x86: Mishandling of SYSCALL singlestep during emulation (XSA-204) xsa204.patch- bsc#1012651 - VUL-0: CVE-2016-9932: xen: x86 CMPXCHG8B emulation fails to ignore operand size override (XSA-200) 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch- bsc#1014298 - VUL-0: CVE-2016-10024: xen: x86 PV guests may be able to mask interrupts (XSA-202) xsa202.patch - bsc#1014300 - VUL-0: CVE-2016-10025: xen: x86: missing NULL pointer check in VMFUNC emulation (XSA-203) xsa203.patch - Upstream patches from Jan 584806ce-x86emul-correct-PUSHF-POPF.patch 584fc649-fix-determining-when-domain-creation-is-complete.patch 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch 58510cac-x86emul-MOVNTI-no-REP-prefixes.patch- Update to Xen 4.8 FCS xen-4.8.0-testing-src.tar.bz2 - Dropped xen-4.7.1-testing-src.tar.bz2 0001-libxc-Rework-extra-module-initialisation.patch 0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch 0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch 0004-firmware-makefile-install-BIOS-blob.patch 0005-libxl-Load-guest-BIOS-from-file.patch 0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch 0007-hvmloader-Grab-the-hvm_start_info-pointer.patch 0008-hvmloader-Locate-the-BIOS-blob.patch 0009-hvmloader-Check-modules-whereabouts-in-perform_tests.patch 0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch 0011-hvmloader-Load-OVMF-from-modules.patch 0012-hvmloader-Specific-bios_load-function-required.patch 0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch 0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch 57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch 576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 5769106e-x86-generate-assembler-equates-for-synthesized.patch 57a1e603-x86-time-adjust-local-system-time-initialization.patch 57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch 57a30261-x86-support-newer-Intel-CPU-models.patch 5810a9cc-x86-emul-Correct-decoding-of-SReg3-operands.patch 581b2c3b-x86-emul-reject-LGDT-LIDT-with-non-canonical-addresses.patch 581b647a-x86emul-L-S-G-I-DT-ignore-opsz-overrides-in-64-bit-mode.patch 58249392-x86-svm-dont-clobber-eax-edx-if-RDMSR-intercept-fails.patch 582c35d6-x86-vmx-correct-long-mode-check-in-vmx_cpuid_intercept.patch 582c35ee-x86-traps-dont-call-hvm_hypervisor_cpuid_leaf-for-PV.patch 58343dc2-x86-hvm-Fix-the-handling-of-non-present-segments.patch 58343df8-x86-HVM-dont-load-LDTR-with-VM86-mode-attrs-during-task-switch.patch 58343e24-x86-PV-writes-of-fs-and-gs-base-MSRs-require-canonical-addresses.patch 58343e9e-libelf-fix-stack-memory-leak-when-loading-32-bit-symbol-tables.patch 58343ec2-x86emul-fix-huge-bit-offset-handling.patch 58343f29-x86-emul-correct-the-IDT-entry-calculation-in-inject_swint.patch 58343f44-x86-svm-fix-injection-of-software-interrupts.patch 58343f79-pygrub-Properly-quote-results-when-returning-them-to-the-caller.patch CVE-2016-9381-xsa197-qemut.patch CVE-2016-9637-xsa199-qemut.patch- bsc#1011652 - VUL-0: xen: qemu ioport array overflow CVE-2016-9637-xsa199-qemut.patch- bsc#1009100 - VUL-0: CVE-2016-9386: XSA-191: xen: x86 null segments not always treated as unusable 58343dc2-x86-hvm-Fix-the-handling-of-non-present-segments.patch - bsc#1009103 - VUL-0: CVE-2016-9382: XSA-192: xen: x86 task switch to VM86 mode mis-handled 58343df8-x86-HVM-dont-load-LDTR-with-VM86-mode-attrs-during-task-switch.patch - bsc#1009104 - VUL-0: CVE-2016-9385: XSA-193: xen: x86 segment base write emulation lacking canonical address checks 58343e24-x86-PV-writes-of-fs-and-gs-base-MSRs-require-canonical-addresses.patch - bsc#1009105 - VUL-0: CVE-2016-9384: XSA-194: xen: guest 32-bit ELF symbol table load leaking host data 58343e9e-libelf-fix-stack-memory-leak-when-loading-32-bit-symbol-tables.patch - bsc#1009107 - VUL-0: CVE-2016-9383: XSA-195: xen: x86 64-bit bit test instruction emulation broken 58343ec2-x86emul-fix-huge-bit-offset-handling.patch - bsc#1009108 - VUL-0: CVE-2016-9377,CVE-2016-9378: XSA-196: xen: x86 software interrupt injection mis-handled 58343f29-x86-emul-correct-the-IDT-entry-calculation-in-inject_swint.patch 58343f44-x86-svm-fix-injection-of-software-interrupts.patch - bsc#1009109 - VUL-0: CVE-2016-9381: XSA-197: xen: qemu incautious about shared ring processing CVE-2016-9381-xsa197-qemut.patch - bsc#1009111 - VUL-0: CVE-2016-9379,CVE-2016-9380: XSA-198: xen: delimiter injection vulnerabilities in pygrub 58343f79-pygrub-Properly-quote-results-when-returning-them-to-the-caller.patch - Upstream patches from Jan 581b2c3b-x86-emul-reject-LGDT-LIDT-with-non-canonical-addresses.patch 581b647a-x86emul-L-S-G-I-DT-ignore-opsz-overrides-in-64-bit-mode.patch 58249392-x86-svm-dont-clobber-eax-edx-if-RDMSR-intercept-fails.patch 582c35d6-x86-vmx-correct-long-mode-check-in-vmx_cpuid_intercept.patch 582c35ee-x86-traps-dont-call-hvm_hypervisor_cpuid_leaf-for-PV.patch- Update to Xen Version 4.7.1 xen-4.7.1-testing-src.tar.bz2 - Dropped patches contained in new tarball xen-4.7.0-testing-src.tar.bz2 575e9ca0-nested-vmx-Validate-host-VMX-MSRs-before-accessing-them.patch 57640448-xen-sched-use-default-scheduler-upon-an-invalid-sched.patch 57973099-have-schedulers-revise-initial-placement.patch 579730e6-remove-buggy-initial-placement-algorithm.patch 57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch 57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch 57ac6316-don-t-restrict-DMA-heap-to-node-0.patch 57b71fc5-x86-EFI-don-t-apply-relocations-to-l-2-3-_bootmap.patch 57b7447b-dont-permit-guest-to-populate-PoD-pages-for-itself.patch 57c4412b-x86-HVM-add-guarding-logic-for-VMX-specific-code.patch 57c57f73-libxc-correct-max_pfn-calculation-for-saving-domain.patch 57c805bf-x86-levelling-restrict-non-architectural-OSXSAVE-handling.patch 57c805c1-x86-levelling-pass-vcpu-to-ctxt_switch_levelling.patch 57c805c3-x86-levelling-provide-architectural-OSXSAVE-handling.patch 57c82be2-x86-32on64-adjust-call-gate-emulation.patch 57c93e52-fix-error-in-libxl_device_usbdev_list.patch 57c96df3-credit1-fix-a-race-when-picking-initial-pCPU.patch 57c96e2c-x86-correct-PT_NOTE-file-position.patch 57cfed43-VMX-correct-feature-checks-for-MPX-and-XSAVES.patch 57d1563d-x86-32on64-don-t-allow-recursive-page-tables-from-L3.patch 57d15679-x86-emulate-Correct-boundary-interactions-of-emulated-insns.patch 57d1569a-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch 57d18642-hvm-fep-Allow-test-insns-crossing-1-0-boundary.patch 57d18642-x86-segment-Bounds-check-accesses-to-emulation-ctxt-seg_reg.patch 57d7ca5f-x86-domctl-fix-TOCTOU-race-in-XEN_DOMCTL_getvcpuextstate.patch 57d7ca64-x86-domctl-fix-migration-of-guests-not-using-xsave.patch 57da8883-credit1-fix-mask-to-be-used-for-tickling.patch 57da8883-credit2-properly-schedule-migration-of-running-vcpu.patch 57dfb1c5-x86-Intel-hide-CPUID-faulting-capability-from-guests.patch 57e93e1d-x86emul-correct-loading-of-ss.patch 57e93e4a-x86emul-don-t-allow-null-selector-for-LTR.patch 57e93e89-x86-AMD-apply-erratum-665-workaround.patch 57ee6cbc-credit1-return-time-remaining-to-limit-as-next-timeslice.patch 57f3a8ee-x86emul-honor-guest-CR0-TS-and-CR0-EM.patch 57fb6a91-x86-defer-not-present-segment-checks.patch 5800c51d-x86-hvm-Clobber-cs-L-when-LME-becomes-set.patch 5800caec-x86emul-fix-pushing-of-selector-registers.patch 5800cb06-x86-Viridian-don-t-depend-on-undefined-register-state.patch 580e29f9-x86-MISALIGNSSE-feature-depends-on-SSE.patch 57dfb2ff-x86-Intel-Broadwell-no-PKG_C8-10_RESIDENCY-MSRs.patch- bsc#1004981 - Xen RPM doesn't contain debug hypervisor for EFI systems xen.spec- bsc#1000106 - VUL-0: CVE-2016-7777: xen: CR0.TS and CR0.EM not always honored for x86 HVM guests (XSA-190) 57f3a8ee-x86emul-honor-guest-CR0-TS-and-CR0-EM.patch - bsc#996191 - [XEN][acpi]residency -n 88 -c will cause xen panic on broadwell-ep 57dfb2ff-x86-Intel-Broadwell-no-PKG_C8-10_RESIDENCY-MSRs.patch - Upstream patches from Jan 57d7ca5f-x86-domctl-fix-TOCTOU-race-in-XEN_DOMCTL_getvcpuextstate.patch 57d7ca64-x86-domctl-fix-migration-of-guests-not-using-xsave.patch 57da8883-credit1-fix-mask-to-be-used-for-tickling.patch 57da8883-credit2-properly-schedule-migration-of-running-vcpu.patch 57dfb1c5-x86-Intel-hide-CPUID-faulting-capability-from-guests.patch 57e93e1d-x86emul-correct-loading-of-ss.patch 57e93e4a-x86emul-don-t-allow-null-selector-for-LTR.patch 57e93e89-x86-AMD-apply-erratum-665-workaround.patch 57ee6cbc-credit1-return-time-remaining-to-limit-as-next-timeslice.patch 57fb6a91-x86-defer-not-present-segment-checks.patch 5800c51d-x86-hvm-Clobber-cs-L-when-LME-becomes-set.patch 5800caec-x86emul-fix-pushing-of-selector-registers.patch 5800cb06-x86-Viridian-don-t-depend-on-undefined-register-state.patch 580e29f9-x86-MISALIGNSSE-feature-depends-on-SSE.patch 5810a9cc-x86-emul-Correct-decoding-of-SReg3-operands.patch- bsc#1007941 - Xen tools limit the number of vcpus to 256 when the system has 384 xen-arch-kconfig-nr_cpus.patch- bsc#1007157 - VUL-0: CVE-2016-8910: xen: net: rtl8139: infinite loop while transmit in C+ mode CVE-2016-8910-qemut-net-rtl8139-infinite-loop-while-transmit-in-Cplus-mode.patch- bsc#1005004 - CVE-2016-8667: xen: dma: rc4030 divide by zero error in set_next_tick CVE-2016-8667-qemut-dma-rc4030-divide-by-zero-error-in-set_next_tick.patch - bsc#1005005 - VUL-0: CVE-2016-8669: xen: char: divide by zero error in serial_update_parameters CVE-2016-8669-qemut-char-divide-by-zero-error-in-serial_update_parameters.patch- bsc#1003030 - VUL-0: CVE-2016-7908: xen: net: Infinite loop in mcf_fec_do_tx CVE-2016-7908-qemut-net-Infinite-loop-in-mcf_fec_do_tx.patch - bsc#1003032 - VUL-0: CVE-2016-7909: xen: net: pcnet: infinite loop in pcnet_rdra_addr CVE-2016-7909-qemut-net-pcnet-infinite-loop-in-pcnet_rdra_addr.patch- bsc#995785 - VUL-0: CVE-2016-7092: xen: x86: Disallow L3 recursive pagetable for 32-bit PV guests (XSA-185) 57d1563d-x86-32on64-don-t-allow-recursive-page-tables-from-L3.patch - bsc#995789 - VUL-0: CVE-2016-7093: xen: x86: Mishandling of instruction pointer truncation during emulation (XSA-186) 57d15679-x86-emulate-Correct-boundary-interactions-of-emulated-insns.patch 57d18642-hvm-fep-Allow-test-insns-crossing-1-0-boundary.patch - bsc#995792 - VUL-0: CVE-2016-7094: xen: x86 HVM: Overflow of sh_ctxt->seg_reg[] (XSA-187) 57d1569a-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch 57d18642-x86-segment-Bounds-check-accesses-to-emulation-ctxt-seg_reg.patch - bsc#991934 - xen hypervisor crash in csched_acct 57c96df3-credit1-fix-a-race-when-picking-initial-pCPU.patch - Upstream patches from Jan 57c4412b-x86-HVM-add-guarding-logic-for-VMX-specific-code.patch 57c57f73-libxc-correct-max_pfn-calculation-for-saving-domain.patch 57c805bf-x86-levelling-restrict-non-architectural-OSXSAVE-handling.patch 57c805c1-x86-levelling-pass-vcpu-to-ctxt_switch_levelling.patch 57c805c3-x86-levelling-provide-architectural-OSXSAVE-handling.patch 57c82be2-x86-32on64-adjust-call-gate-emulation.patch 57c96e2c-x86-correct-PT_NOTE-file-position.patch 57cfed43-VMX-correct-feature-checks-for-MPX-and-XSAVES.patch- bsc#979002 - add 60-persistent-xvd.rules and helper script also to initrd, add the relevant dracut helper- bnc#953518 - unplug also SCSI disks in qemu-xen-traditional for upstream unplug protocol- bsc#989679 - [pvusb feature] USB device not found when 'virsh detach-device guest usb.xml' 57c93e52-fix-error-in-libxl_device_usbdev_list.patch- bsc#992224 - [HPS Bug] During boot of Xen Hypervisor, Failed to get contiguous memory for DMA from Xen 57ac6316-don-t-restrict-DMA-heap-to-node-0.patch - bsc#978755 - xen uefi systems fail to boot - bsc#983697 - SLES12 SP2 Xen UEFI mode cannot boot 57b71fc5-x86-EFI-don-t-apply-relocations-to-l-2-3-_bootmap.patch - Upstream patch from Jan 57b7447b-dont-permit-guest-to-populate-PoD-pages-for-itself.patch- spec: to stay compatible with the in-tree qemu-xen binary, use /usr/bin/qemu-system-i386 instead of /usr/bin/qemu-system-x86_64 bsc#986164- bsc#970135 - new virtualization project clock test randomly fails on Xen 576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 5769106e-x86-generate-assembler-equates-for-synthesized.patch 57a1e603-x86-time-adjust-local-system-time-initialization.patch 57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch - bsc#991934 - xen hypervisor crash in csched_acct 57973099-have-schedulers-revise-initial-placement.patch 579730e6-remove-buggy-initial-placement-algorithm.patch - bsc#988675 - VUL-0: CVE-2016-6258: xen: x86: Privilege escalation in PV guests (XSA-182) 57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch - bsc#988676 - VUL-0: CVE-2016-6259: xen: x86: Missing SMAP whitelisting in 32-bit exception / event delivery (XSA-183) 57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch - Upstream patches from Jan 57a30261-x86-support-newer-Intel-CPU-models.patch- bsc#985503 - vif-route broken vif-route.patch- bsc#978413 - PV guest upgrade from sles11sp4 to sles12sp2 alpha3 failed on sles11sp4 xen host. pygrub-handle-one-line-menu-entries.patch- bsc#990843 - VUL-1: CVE-2016-6351: xen: qemu: scsi: esp: OOB write access in esp_do_dma CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch- bsc#900418 - Dump cannot be performed on SLES12 XEN 57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch - Upstream patches from Jan 575e9ca0-nested-vmx-Validate-host-VMX-MSRs-before-accessing-them.patch 57640448-xen-sched-use-default-scheduler-upon-an-invalid-sched.patch- fate#319989 - Update to Xen 4.7 FCS xen-4.7.0-testing-src.tar.bz2 - Drop CVE-2014-3672-qemut-xsa180.patch- bsc#954872 - script block-dmmd not working as expected - libxl: error: libxl_dm.c (Additional fixes) block-dmmd- Convert with_stubdom into build_conditional to allow adjusting via prjconf - Convert with_debug into build_conditional to allow adjusting via prjconf- bsc#979002 - add 60-persistent-xvd.rules and helper script to xen-tools-domU to simplify transition to pvops based kernels- Convert with_oxenstored into build_conditional to allow adjusting via prjconf (fate#320836)- bsc#983984 - VUL-0: CVE-2016-5338: xen: qemu: scsi: esp: OOB r/w access while processing ESP_FIFO CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch - bsc#982960 - VUL-0: CVE-2016-5238: xen: qemu: scsi: esp: OOB write when using non-DMA mode in get_cmd CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch- fate#319989 - Update to Xen 4.7 RC5 xen-4.7.0-testing-src.tar.bz2- fate#319989 - Update to Xen 4.7 RC4 xen-4.7.0-testing-src.tar.bz2 - Dropped xen.pkgconfig-4.7.patch xsa164.patch- bsc#981264 - VUL-0: CVE-2014-3672: xen: Unrestricted qemu logging (XSA-180) CVE-2014-3672-qemut-xsa180.patch- bsc#980724 - VUL-0: CVE-2016-4441: Qemu: scsi: esp: OOB write while writing to 's->cmdbuf' in get_cmd CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch - bsc#980716 - VUL-0: CVE-2016-4439: xen: scsi: esp: OOB write while writing to 's->cmdbuf' in esp_reg_write CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch- fate#319989 - Update to Xen 4.7 RC3 xen-4.7.0-testing-src.tar.bz2 - Dropped libxl-remove-cdrom-cachemode.patch x86-PoD-only-reclaim-if-needed.patch gcc6-warnings-as-errors.patch- bsc#954872 - script block-dmmd not working as expected - libxl: error: libxl_dm.c (another modification) block-dmmd- fate#319989 - Update to Xen 4.7 RC2 xen-4.7.0-testing-src.tar.bz2- bsc#961600 - L3: poor performance when Xen HVM domU configured with max memory > current memory x86-PoD-only-reclaim-if-needed.patch- Mark SONAMEs and pkgconfig as xen 4.7 xen.pkgconfig-4.7.patch- bsc#977329 - Xen: Cannot boot HVM guests with empty cdrom libxl-remove-cdrom-cachemode.patch- fate#319989 - Update to Xen 4.7 RC1 xen-4.7.0-testing-src.tar.bz2- fate#316614: set migration constraints from cmdline restore libxl.set-migration-constraints-from-cmdline.patch- Remove obsolete patch for xen-kmp magic_ioport_compat.patch- fate#316613: update to v12 libxl.pvscsi.patch- Update to the latest Xen 4.7 pre-release c2994f86 Drop libxl.migrate-legacy-stream-read.patch- bnc#972756 - Can't migrate HVM guest from SLES12SP1 Xen host to SLES12SP2 Alpha 1 host using xl migrate libxl.migrate-legacy-stream-read.patch- Add patches from proposed upstream series to load BIOS's from the toolstack instead of embedding in hvmloader http://lists.xenproject.org/archives/html/xen-devel/2016-03/msg01626.html 0001-libxc-Rework-extra-module-initialisation.patch, 0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch, 0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch, 0004-firmware-makefile-install-BIOS-blob.patch, 0005-libxl-Load-guest-BIOS-from-file.patch, 0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch, 0007-hvmloader-Grab-the-hvm_start_info-pointer.patch, 0008-hvmloader-Locate-the-BIOS-blob.patch, 0009-hvmloader-Check-modules-whereabouts-in-perform_tests.patch, 0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch, 0011-hvmloader-Load-OVMF-from-modules.patch, 0012-hvmloader-Specific-bios_load-function-required.patch, 0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch, 0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch - Enable support for UEFI on x86_64 using the ovmf-x86_64-ms.bin firmware from qemu-ovmf-x86_64. The firmware is preloaded with Microsoft keys to more closely resemble firmware on real hardware FATE#320490- fate#319989: Update to Xen 4.7 (pre-release) xen-4.7.0-testing-src.tar.bz2 - Dropped: xen-4.6.1-testing-src.tar.bz2 55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch 5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch hotplug-Linux-block-performance-fix.patch set-mtu-from-bridge-for-tap-interface.patch xendomains-libvirtd-conflict.patch xsa154.patch xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa170.patch- Use system SeaBIOS instead of building/installing another one FATE#320638 Dropped files: seabios-dir-remote.tar.bz2 xen-c99-fix.patch xen.build-compare.seabios.patch- spec: drop BuildRequires that were only needed for qemu-xen- bsc#969377 - xen does not build with GCC 6 ipxe-use-rpm-opt-flags.patch gcc6-warnings-as-errors.patch- bsc#969351 - VUL-0: CVE-2016-2841: xen: net: ne2000: infinite loop in ne2000_receive CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch - Drop xsa154-fix.patch- Use system qemu instead of building/installing yet another qemu FATE#320638 - Dropped files qemu-xen-dir-remote.tar.bz2 CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch CVE-2015-4037-qemuu-smb-config-dir-name.patch CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch qemu-xen-enable-spice-support.patch qemu-xen-upstream-qdisk-cache-unsafe.patch tigervnc-long-press.patch xsa162-qemuu.patch- bsc#962321 - VUL-0: CVE-2016-1922: xen: i386: null pointer dereference in vapic_write() CVE-2016-1922-qemuu-i386-null-pointer-dereference-in-vapic_write.patch- bsc#968004 - VUL-0: CVE-2016-2538: xen: usb: integer overflow in remote NDIS control message handling CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch- bsc#954872 - L3: script block-dmmd not working as expected - libxl: error: libxl_dm.c block-dmmd - Update libxl to recognize dmmd and npiv prefix in disk spec xen.libxl.dmmd.patch- bsc#967101 - VUL-0: CVE-2016-2391: xen: usb: multiple eof_timers in ohci module leads to null pointer dereference CVE-2016-2391-qemuu-usb-null-pointer-dereference-in-ohci-module.patch CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch - bsc#967090 - VUL-0: CVE-2016-2392: xen: usb: null pointer dereference in remote NDIS control message handling CVE-2016-2392-qemuu-usb-null-pointer-dereference-in-NDIS-message-handling.patch- Update to Xen Version 4.6.1 xen-4.6.1-testing-src.tar.bz2 - Dropped patches now contained in tarball or unnecessary xen-4.6.0-testing-src.tar.bz2 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 5632129c-free-domain-s-vcpu-array.patch 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 563212e4-xenoprof-free-domain-s-vcpu-array.patch 563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch 56549f24-x86-vPMU-document-as-unsupported.patch 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch xsa155-qemut-qdisk-double-access.patch xsa155-qemut-xenfb.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa159.patch xsa160.patch xsa162-qemut.patch xsa165.patch xsa166.patch xsa167.patch xsa168.patch- bsc#965315 - VUL-0: CVE-2016-2270: xen: x86: inconsistent cachability flags on guest mappings (XSA-154) xsa154.patch - bsc#965317 - VUL-0: CVE-2016-2271: xen: VMX: guest user mode may crash guest with non-canonical RIP (XSA-170) xsa170.patch- bsc#965269 - VUL-1: CVE-2015-8619: xen: stack based OOB write in hmp_sendkey routine CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch- bsc#965156 - VUL-0: CVE-2015-6855: xen: ide: divide by zero issue CVE-2015-6855-qemuu-ide-divide-by-zero-issue.patch - bsc#965112 - VUL-0: CVE-2014-3640: xen: slirp: NULL pointer deref in sosendto() CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch- bsc#964947 - VUL-0: CVE-2015-5278: xen: Infinite loop in ne2000_receive() function CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch - bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch- bsc#964644 - VUL-0: CVE-2013-4533: xen pxa2xx: buffer overrun on incoming migration CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch - bsc#964925 - VUL-0: CVE-2014-0222: xen: qcow1: validate L2 table size to avoid integer overflows CVE-2014-0222-blktap-qcow1-validate-l2-table-size.patch - Dropped CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch- bsc#964415 - VUL-1: CVE-2016-2198: xen: usb: ehci null pointer dereference in ehci_caps_write CVE-2016-2198-qemuu-usb-ehci-null-pointer-dereference-in-ehci_caps_write.patch - bsc#964452 - VUL-0: CVE-2013-4534: xen: openpic: buffer overrun on incoming migration CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch- bsc#963783 - VUL-1: CVE-2016-1981: xen: net: e1000 infinite loop in start_xmit and e1000_receive_iov routines CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch- bsc#962758 - VUL-0: CVE-2013-4539: xen: tsc210x: buffer overrun on invalid state load CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch- bsc#962632 - VUL-0: CVE-2015-1779: xen: vnc: insufficient resource limiting in VNC websockets decoder CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch - bsc#962642 - VUL-0: CVE-2013-4537: xen: ssi-sd: buffer overrun on invalid state load CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch - bsc#962627 - VUL-0: CVE-2014-7815: xen: vnc: insufficient bits_per_pixel from the client sanitization CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch- bsc#962335 - VUL-0: CVE-2013-4538: xen: ssd0323: fix buffer overun on invalid state CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch - bsc#962360 - VUL-0: CVE-2015-7512: xen: net: pcnet: buffer overflow in non-loopback mode CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch- bsc#961692 - VUL-0: CVE-2016-1714: xen: nvram: OOB r/w access in processing firmware configurations CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch- bsc#961358 - VUL-0: CVE-2015-8613: xen: qemu: scsi: stack based buffer overflow in megasas_ctrl_get_info CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch - bsc#961332 - VUL-0: CVE-2016-1568: xen: Qemu: ide: ahci use-after-free vulnerability in aio port commands CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch- bsc#959695 - missing docs for xen xen.spec- bsc#960862 - VUL-0: CVE-2016-1571: xen: VMX: intercept issue with INVLPG on non-canonical address (XSA-168) xsa168.patch - bsc#960861 - VUL-0: CVE-2016-1570: xen: PV superpage functionality missing sanity checks (XSA-167) xsa167.patch - bsc#960836 - VUL-0: CVE-2015-8744: xen: net: vmxnet3: incorrect l2 header validation leads to a crash via assert(2) call CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch- bsc#960707 - VUL-0: CVE-2015-8745: xen: reading IMR registers leads to a crash via assert(2) call CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch - bsc#960726 - VUL-0: CVE-2015-8743: xen: ne2000: OOB memory access in ioport r/w functions CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch- bsc#960093 - VUL-0: CVE-2015-8615: xen: x86: unintentional logging upon guest changing callback method (XSA-169) 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch- Adjust xen-dom0-modules.service to run Before xenstored.service instead of proc-xen.mount to workaround a bug in systemd "design" (bnc#959845)- bsc#959387 - VUL-0: CVE-2015-8568 CVE-2015-8567: xen: qemu: net: vmxnet3: host memory leakage CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch- bsc#957988 - VUL-0: CVE-2015-8550: xen: paravirtualized drivers incautious about shared memory contents (XSA-155) xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemut-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa155-qemut-xenfb.patch - bsc#959006 - VUL-0: CVE-2015-8558: xen: qemu: usb: infinite loop in ehci_advance_state results in DoS CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch - bsc#958918 - VUL-0: CVE-2015-7549: xen: qemu pci: null pointer dereference issue CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch - bsc#958493 - VUL-0: CVE-2015-8504: xen: qemu: ui: vnc: avoid floating point exception CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch - bsc#958007 - VUL-0: CVE-2015-8554: xen: qemu-dm buffer overrun in MSI-X handling (XSA-164) xsa164.patch - bsc#958009 - VUL-0: CVE-2015-8555: xen: information leak in legacy x86 FPU/XMM initialization (XSA-165) xsa165.patch - bsc#958523 - VUL-0: xen: ioreq handling possibly susceptible to multiple read issue (XSA-166) xsa166.patch- bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch - Upstream patches from Jan 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch) 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 56544a57-VMX-fix-adjust-trap-injection.patch 56546ab2-sched-fix-insert_vcpu-locking.patch- bsc#956592 - VUL-0: xen: virtual PMU is unsupported (XSA-163) 56549f24-x86-vPMU-document-as-unsupported.patch - bsc#956408 - VUL-0: CVE-2015-8339, CVE-2015-8340: xen: XENMEM_exchange error handling issues (XSA-159) xsa159.patch - bsc#956409 - VUL-0: CVE-2015-8341: xen: libxl leak of pv kernel and initrd on error (XSA-160) xsa160.patch - bsc#956411 - VUL-0: CVE-2015-7504: xen: heap buffer overflow vulnerability in pcnet emulator (XSA-162) xsa162-qemuu.patch xsa162-qemut.patch - bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142) 5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch- fate#315712: XEN: Use the PVOPS kernel Turn off building the KMPs now that we are using the pvops kernel xen.spec- Upstream patches from Jan 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 5632129c-free-domain-s-vcpu-array.patch (Replaces CVE-2015-7969-xsa149.patch) 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 563212e4-xenoprof-free-domain-s-vcpu-array.patch 563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch) 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch - Dropped 55b0a2db-x86-MSI-track-guest-masking.patch- Use upstream variants of block-iscsi and block-nbd- Remove xenalyze.hg, its part of xen-4.6- Update to Xen Version 4.6.0 xen-4.6.0-testing-src.tar.bz2 mini-os.tar.bz2 blktap2-no-uninit.patch stubdom-have-iovec.patch - Renamed xsa149.patch to CVE-2015-7969-xsa149.patch - Dropped patches now contained in tarball or unnecessary xen-4.5.2-testing-src.tar.bz2 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch 54f4985f-libxl-fix-libvirtd-double-free.patch 55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 551ac326-xentop-add-support-for-qdisk.patch 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch 5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 554cc211-libxl-add-qxl.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch 5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch 5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch 5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch 5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch 5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch 5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch 55b0a218-x86-PCI-CFG-write-intercept.patch 55b0a255-x86-MSI-X-maskall.patch 55b0a283-x86-MSI-X-teardown.patch 55b0a2ab-x86-MSI-X-enable.patch blktapctrl-close-fifos.patch blktapctrl-default-to-ioemu.patch blktapctrl-disable-debug-printf.patch blktap-no-uninit.patch blktap-pv-cdrom.patch build-tapdisk-ioemu.patch ioemu-bdrv-open-CACHE_WB.patch ioemu-blktap-barriers.patch ioemu-blktap-fv-init.patch ioemu-blktap-image-format.patch ioemu-blktap-zero-size.patch libxl.set-migration-constraints-from-cmdline.patch local_attach_support_for_phy.patch pci-attach-fix.patch qemu-xen-upstream-megasas-buildtime.patch tapdisk-ioemu-logfile.patch tapdisk-ioemu-shutdown-fix.patch udev-rules.patch xen.build-compare.ipxe.patch xen.build-compare.mini-os.patch xen.build-compare.smbiosdate.patch xen.build-compare.vgabios.patch xen.build-compare.xen_compile_h.patch xl-coredump-file-location.patch- bsc#954405 - VUL-0: CVE-2015-8104: Xen: guest to host DoS by triggering an infinite loop in microcode via #DB exception - bsc#954018 - VUL-0: CVE-2015-5307: xen: x86: CPU lockup during fault delivery (XSA-156) CVE-2015-5307-xsa156.patch- Update to Xen 4.5.2 xen-4.5.2-testing-src.tar.bz2 - Drop the following xen-4.5.1-testing-src.tar.bz2 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 559bdde5-pull-in-latest-linux-earlycpio.patch 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch 560bd926-credit1-fix-tickling-when-it-happens-from-a-remote-pCPU.patch 560e6d34-x86-p2m-pt-tighten-conditions-of-IOMMU-mapping-updates.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch CVE-2015-4106-xsa131-9.patch CVE-2015-3259-xsa137.patch CVE-2015-7311-xsa142.patch CVE-2015-7835-xsa148.patch xsa139-qemuu.patch xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch xsa151.patch xsa152.patch xsa153-libxl.patch CVE-2015-5154-qemuu-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemuu-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch"- bsc#950704 - CVE-2015-7970 VUL-1: xen: x86: Long latency populate-on-demand operation is not preemptible (XSA-150) 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch- Upstream patches from Jan 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch- bsc#951845 - VUL-0: CVE-2015-7972: xen: x86: populate-on-demand balloon size inaccuracy can crash guests (XSA-153) xsa153-libxl.patch- bsc#950703 - VUL-1: CVE-2015-7969: xen: leak of main per-domain vcpu pointer array (DoS) (XSA-149) xsa149.patch - bsc#950705 - VUL-1: CVE-2015-7969: xen: x86: leak of per-domain profiling-related vcpu pointer array (DoS) (XSA-151) xsa151.patch - bsc#950706 - VUL-0: CVE-2015-7971: xen: x86: some pmu and profiling hypercalls log without rate limiting (XSA-152) xsa152.patch - Dropped 55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch 5604f239-x86-PV-properly-populate-descriptor-tables.patch- bsc#932267 - VUL-1: CVE-2015-4037: qemu,kvm,xen: insecure temporary file use in /net/slirp.c CVE-2015-4037-qemuu-smb-config-dir-name.patch CVE-2015-4037-qemut-smb-config-dir-name.patch - bsc#877642 - VUL-0: CVE-2014-0222: qemu: qcow1: validate L2 table size to avoid integer overflows CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch- bsc#950367 - VUL-0: CVE-2015-7835: xen: x86: Uncontrolled creation of large page mappings by PV guests (XSA-148) CVE-2015-7835-xsa148.patch- bsc#949138 - Setting vcpu affinity under Xen causes libvirtd abort 54f4985f-libxl-fix-libvirtd-double-free.patch- bsc#949046 - Increase %suse_version in SP1 to 1316 xen.spec - Update README.SUSE detailing dom0 ballooning recommendations- bsc#945167 - Running command ’ xl pci-assignable-add 03:10.1’ secondly show errors 55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch - Upstream patches from Jan 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f239-x86-PV-properly-populate-descriptor-tables.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch 560bd926-credit1-fix-tickling-when-it-happens-from-a-remote-pCPU.patch 560e6d34-x86-p2m-pt-tighten-conditions-of-IOMMU-mapping-updates.patch- bsc#941074 - VmError: Device 51728 (vbd) could not be connected. Hotplug scripts not working. hotplug-Linux-block-performance-fix.patch- bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142) CVE-2015-7311-xsa142.patch- bsc#945165 - Xl pci-attach show error with kernel of SLES 12 sp1 pci-attach-fix.patch- bsc#945164 - Xl destroy show error with kernel of SLES 12 sp1 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch- Upstream patches from Jan 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch- bsc#944463 - VUL-0: CVE-2015-5239: qemu-kvm: Integer overflow in vnc_client_read() and protocol_client_msg() CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch - bsc#944697 - VUL-1: CVE-2015-6815: qemu: net: e1000: infinite loop issue CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch- bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch- bsc#907514 - Bus fatal error & sles12 sudden reboot has been observed - bsc#910258 - SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984 - Bus fatal error & sles11-SP4 sudden reboot has been observed - bsc#923967 - Partner-L3: Bus fatal error & sles11-SP3 sudden reboot has been observed 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 55b0a218-x86-PCI-CFG-write-intercept.patch 55b0a255-x86-MSI-X-maskall.patch 55b0a283-x86-MSI-X-teardown.patch 55b0a2ab-x86-MSI-X-enable.patch 55b0a2db-x86-MSI-track-guest-masking.patch - Upstream patches from Jan 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch - Dropped for upstream version x86-MSI-mask.patch x86-MSI-pv-unmask.patch x86-MSI-X-enable.patch x86-MSI-X-maskall.patch x86-MSI-X-teardown.patch x86-pci_cfg_okay.patch x86-PCI-CFG-write-intercept.patch- bsc#939712 - VUL-0: XSA-140: QEMU leak of uninitialized heap memory in rtl8139 device model xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch - bsc#939709 - VUL-0: XSA-139: xen: Use after free in QEMU/Xen block unplug protocol xsa139-qemuu.patch- bsc#937371 - xen vm's running after reboot xendomains-libvirtd-conflict.patch- bsc#938344 - VUL-0: CVE-2015-5154: qemu,kvm,xen: host code execution via IDE subsystem CD-ROM CVE-2015-5154-qemuu-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemuu-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch- Remove xendomains.service from systemd preset file because it conflicts with libvirt-guests.service (bnc#937371) Its up to the admin to run systemctl enable xendomains.service- bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow CVE-2015-3259-xsa137.patch - Upstream patches from Jan 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bdde5-pull-in-latest-linux-earlycpio.patch - Upstream patches from Jan pending review 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch 5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch 5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch 5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch 5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch 5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch x86-MSI-pv-unmask.patch x86-pci_cfg_okay.patch x86-PCI-CFG-write-intercept.patch x86-MSI-X-maskall.patch x86-MSI-X-teardown.patch x86-MSI-X-enable.patch x86-MSI-mask.patch- Adjust more places to use br0 instead of xenbr0- bnc#936516 - xen fails to build with kernel update(4.1.0 from stable) 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch- Update to Xen Version 4.5.1 FCS (fate#315675) xen-4.5.1-testing-src.tar.bz2 - Dropped patches now contained in tarball 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch qemu-MSI-X-enable-maskall.patch qemu-MSI-X-latch-writes.patch x86-MSI-X-guest-mask.patch- Replace 5124efbe-add-qxl-support.patch with the variant that finally made it upstream, 554cc211-libxl-add-qxl.patch- bsc#931627 - VUL-0: CVE-2015-4105: XSA-130: xen: Guest triggerable qemu MSI-X pass-through error messages qemu-MSI-X-latch-writes.patch - bsc#907514 - Bus fatal error & sles12 sudden reboot has been observed - bsc#910258 - SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984 - Bus fatal error & sles11-SP4 sudden reboot has been observed - bsc#923967 - Partner-L3: Bus fatal error & sles11-SP3 sudden reboot has been observed x86-MSI-X-teardown.patch x86-MSI-X-enable.patch x86-MSI-X-guest-mask.patch x86-MSI-X-maskall.patch qemu-MSI-X-enable-maskall.patch - Upstream patches from Jan 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch - Dropped the following patches now contained in the tarball xen-no-array-bounds.patch CVE-2015-4103-xsa128.patch CVE-2015-4104-xsa129.patch CVE-2015-4105-xsa130.patch CVE-2015-4106-xsa131-1.patch CVE-2015-4106-xsa131-2.patch CVE-2015-4106-xsa131-3.patch CVE-2015-4106-xsa131-4.patch CVE-2015-4106-xsa131-5.patch CVE-2015-4106-xsa131-6.patch CVE-2015-4106-xsa131-7.patch CVE-2015-4106-xsa131-8.patch- Update to Xen 4.5.1 RC2 - bsc#931628 - VUL-0: CVE-2015-4106: XSA-131: xen: Unmediated PCI register access in qemu CVE-2015-4106-xsa131-1.patch CVE-2015-4106-xsa131-2.patch CVE-2015-4106-xsa131-3.patch CVE-2015-4106-xsa131-4.patch CVE-2015-4106-xsa131-5.patch CVE-2015-4106-xsa131-6.patch CVE-2015-4106-xsa131-7.patch CVE-2015-4106-xsa131-8.patch CVE-2015-4106-xsa131-9.patch - bsc#931627 - VUL-0: CVE-2015-4105: XSA-130: xen: Guest triggerable qemu MSI-X pass-through error messages CVE-2015-4105-xsa130.patch - bsc#931626 - VUL-0: CVE-2015-4104: XSA-129: xen: PCI MSI mask bits inadvertently exposed to guests CVE-2015-4104-xsa129.patch - bsc#931625 - VUL-0: CVE-2015-4103: XSA-128: xen: Potential unintended writes to host MSI message data field via qemu CVE-2015-4103-xsa128.patch - Upstream patches from Jan 5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch- Add DefaultDependencies=no to xen-dom0-modules.service because it has to run before proc-xen.mount- Update to Xen 4.5.1 RC1- Update blktap-no-uninit.patch to work with gcc-4.5- bsc#927967 - VUL-0: CVE-2015-3340: xen: Information leak through XEN_DOMCTL_gettscinfo (XSA-132) 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch- bnc#929339 - VUL-0: CVE-2015-3456: qemu kvm xen: VENOM qemu floppy driver host code execution CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch- bsc#928783 - Reboot failure; Request backport of upstream Xen patch to 4.5.0, or update pkgs to 4.5.1 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch- bnc#927750 - Avoid errors reported by system-modules-load.service- Add xen-no-array-bounds.patch and blktap-no-uninit.patch to selectively turn errors back to warnings to fix build with GCC 5. - Amend xen.stubdom.newlib.patch to pull in declaration of strcmp to avoid implicit-fortify-decl rpmlint error. - Fix quoting of __SMBIOS_DATE__ in xen.build-compare.smbiosdate.patch.- xentop: Fix memory leak on read failure 551ac326-xentop-add-support-for-qdisk.patch- Dropped xentop-add-support-for-qdisk.patch in favor of upstream version 551ac326-xentop-add-support-for-qdisk.patch- Enable spice support in qemu for x86_64 5124efbe-add-qxl-support.patch qemu-xen-enable-spice-support.patch- Add xen-c99-fix.patch to remove pointless inline specifier on function declarations which break build with a C99 compiler which GCC 5 is by default. (bsc#921994) - Add ipxe-no-error-logical-not-parentheses.patch to supply - Wno-logical-not-parentheses to the ipxe build to fix breakage with GCC 5. (bsc#921994)- bnc#921842 - Xentop doesn't display disk statistics for VMs using qdisks xentop-add-support-for-qdisk.patch- Disable the PIE enablement done for Factory, as the XEN code is not buildable with PIE and it does not make much sense to build the hypervisor code with it.- bnc#918169 - XEN fixes required to work with Kernel 3.19.0 xen.spec- Package xen.changes because its referenced in xen.spec- Update seabios to rel-1.7.5 which is the correct version for Xen 4.5- Update to Xen 4.5.0 FCS- Include systemd presets in 13.2 and older- bnc#897352 - Enable xencommons/xendomains only during fresh install - disable restart on upgrade because the toolstack is not restartable- adjust seabios, vgabios, stubdom and hvmloader build to reduce build-compare noise xen.build-compare.mini-os.patch xen.build-compare.smbiosdate.patch xen.build-compare.ipxe.patch xen.build-compare.vgabios.patch xen.build-compare.seabios.patch xen.build-compare.man.patch- Update to Xen 4.5.0 RC4- Remove xend specific if-up scripts Recording bridge slaves is a generic task which should be handled by generic network code- Use systemd features from upstream requires updated systemd-presets-branding package- Update to Xen 4.5.0 RC3- Set GIT, WGET and FTP to /bin/false- Use new configure features instead of make variables xen.stubdom.newlib.patch- adjust docs and xen build to reduce build-compare noise xen.build-compare.doc_html.patch xen.build-compare.xen_compile_h.patch- Drop trailing B_CNT from XEN_EXTRAVERSION to reduce build-compare noise- Update to Xen 4.5.0 RC2- Update to Xen 4.5.0 RC1 xen-4.5.0-testing-src.tar.bz2 - Remove all patches now contained in the new tarball xen-4.4.1-testing-src.tar.bz2 5315a3bb-x86-don-t-propagate-acpi_skip_timer_override-do-Dom0.patch 5315a43a-x86-ACPI-also-print-address-space-for-PM1x-fields.patch 53299d8f-xenconsole-reset-tty-on-failure.patch 53299d8f-xenconsole-tolerate-tty-errors.patch 5346a7a0-x86-AMD-support-further-feature-masking-MSRs.patch 53563ea4-x86-MSI-drop-workaround-for-insecure-Dom0-kernels.patch 537c9c77-libxc-check-return-values-on-mmap-and-madvise.patch 537cd0b0-hvmloader-also-cover-PCI-MMIO-ranges-above-4G-with-UC-MTRR-ranges.patch 537cd0cc-hvmloader-PA-range-0xfc000000-0xffffffff-should-be-UC.patch 539ebe62-x86-EFI-improve-boot-time-diagnostics.patch 53aac342-x86-HVM-consolidate-and-sanitize-CR4-guest-reserved-bit-determination.patch 53c9151b-Fix-xl-vncviewer-accesses-port-0-by-any-invalid-domid.patch 53d124e7-fix-list_domain_details-check-config-data-length-0.patch 53dba447-x86-ACPI-allow-CMOS-RTC-use-even-when-ACPI-says-there-is-none.patch 53df727b-x86-HVM-extend-LAPIC-shortcuts-around-P2M-lookups.patch 53e8be5f-x86-vHPET-use-rwlock-instead-of-simple-one.patch 53f737b1-VMX-fix-DebugCtl-MSR-clearing.patch 53f7386d-x86-irq-process-softirqs-in-irq-keyhandlers.patch 53fcebab-xen-pass-kernel-initrd-to-qemu.patch 53ff3659-x86-consolidate-boolean-inputs-in-hvm-and-p2m.patch 53ff36ae-x86-hvm-treat-non-insn-fetch-NPF-also-as-read-violations.patch 53ff36d5-x86-mem_event-deliver-gla-fault-EPT-violation-information.patch 53ff3716-x86-ats-Disable-Address-Translation-Services-by-default.patch 53ff3899-x86-NMI-allow-processing-unknown-NMIs-with-watchdog.patch 54005472-EPT-utilize-GLA-GPA-translation-known-for-certain-faults.patch 540effe6-evtchn-check-control-block-exists-when-using-FIFO-based-events.patch 540f2624-x86-idle-add-barriers-to-CLFLUSH-workaround.patch 541825dc-VMX-don-t-leave-x2APIC-MSR-intercepts-disabled.patch 541ad385-x86-suppress-event-check-IPI-to-MWAITing-CPUs.patch 541ad3ca-x86-HVM-batch-vCPU-wakeups.patch 541ad81a-VT-d-suppress-UR-signaling-for-further-desktop-chipsets.patch 54216833-x86-shadow-fix-race-when-sampling-dirty-vram-state.patch 54216882-x86-emulate-check-cpl-for-all-privileged-instructions.patch 542168ae-x86emul-only-emulate-swint-injection-for-real-mode.patch 54228a37-x86-EFI-fix-freeing-of-uninitialized-pointer.patch 5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch 5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch 542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch 542bf997-x86-HVM-properly-bound-x2APIC-MSR-range.patch 54325cc0-x86-MSI-fix-MSI-X-case-of-freeing-IRQ.patch 54325d2f-x86-restore-reserving-of-IO-APIC-pages-in-XENMEM_machine_memory_map-output.patch 54325d95-don-t-allow-Dom0-access-to-IOMMUs-MMIO-pages.patch 54325ecc-AMD-guest_iommu-properly-disable-guest-iommu-support.patch 54325f3c-x86-paging-make-log-dirty-operations-preemptible.patch 54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch CVE-2013-4540-qemu.patch qemu-support-xen-hvm-direct-kernel-boot.patch qemu-xen-upstream-blkif-discard.patch change-vnc-passwd.patch libxc-pass-errno-to-callers-of-xc_domain_save.patch libxl.honor-more-top-level-vfb-options.patch libxl.add-option-for-discard-support-to-xl-disk-conf.patch libxl.introduce-an-option-to-disable-the-non-O_DIRECT-workaround.patch x86-dom-print.patch x86-extra-trap-info.patch tmp_build.patch xl-check-for-libvirt-managed-domain.patch disable-wget-check.patch - Xend/xm is no longer supported and is not part of the upstream code. Remove all xend/xm specific patches, configs, and scripts xen-xmexample.patch bridge-opensuse.patch xmexample.disks xmclone.sh init.xend xend-relocation.sh xend.service xend-relocation-server.fw domUloader.py xmexample.domUloader xmexample.disks bridge-vlan.patch bridge-bonding.patch bridge-record-creation.patch network-nat-open-SuSEfirewall2-FORWARD.patch xend-set-migration-constraints-from-cmdline.patch xen.migrate.tools-xend_move_assert_to_exception_block.patch xend-pvscsi-recognize-also-SCSI-CDROM-devices.patch xend-config.patch xend-max-free-mem.patch xend-hvm-default-pae.patch xend-vif-route-ifup.patch xend-xenapi-console-protocol.patch xend-core-dump-loc.patch xend-xen-api-auth.patch xend-checkpoint-rename.patch xend-xm-save-check-file.patch xend-xm-create-xflag.patch xend-domu-usb-controller.patch xend-devid-or-name.patch xend-migration-domname-fix.patch xend-del_usb_xend_entry.patch xend-xen-domUloader.patch xend-multi-xvdp.patch xend-check_device_status.patch xend-change_home_server.patch xend-minimum-restart-time.patch xend-disable-internal-logrotate.patch xend-config-enable-dump-comment.patch xend-tools-watchdog-support.patch xend-console-port-restore.patch xend-vcpu-affinity-fix.patch xend-migration-bridge-check.patch xend-managed-pci-device.patch xend-hvm-firmware-passthrough.patch xend-cpuinfo-model-name.patch xend-xm-reboot-fix.patch xend-domain-lock.patch xend-domain-lock-sfex.patch xend-32on64-extra-mem.patch xend-hv_extid_compatibility.patch xend-xenpaging.autostart.patch xend-remove-xm-deprecation-warning.patch libxen_permissive.patch tmp-initscript-modprobe.patch init.xendomains xendomains.service xen-watchdog.service xen-updown.sh- bnc#901317 - L3: increase limit domUloader to 32MB domUloader.py- bnc#898772 - SLES 12 RC3 - XEN Host crashes when assigning non-VF device (SR-IOV) to guest 54325cc0-x86-MSI-fix-MSI-X-case-of-freeing-IRQ.patch - bnc#882089 - Windows 2012 R2 fails to boot up with greater than 60 vcpus 54325ecc-AMD-guest_iommu-properly-disable-guest-iommu-support.patch - bnc#826717 - VUL-0: CVE-2013-3495: XSA-59: xen: Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts 541ad81a-VT-d-suppress-UR-signaling-for-further-desktop-chipsets.patch - Upstream patches from Jan 540effe6-evtchn-check-control-block-exists-when-using-FIFO-based-events.patch (Replaces xsa107.patch) 54216833-x86-shadow-fix-race-when-sampling-dirty-vram-state.patch (Replaces xsa104.patch) 54216882-x86-emulate-check-cpl-for-all-privileged-instructions.patch (Replaces xsa105.patch) 542168ae-x86emul-only-emulate-swint-injection-for-real-mode.patch (Replaces xsa106.patch) 54228a37-x86-EFI-fix-freeing-of-uninitialized-pointer.patch 5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch 5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch 542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch 542bf997-x86-HVM-properly-bound-x2APIC-MSR-range.patch (Replaces xsa108.patch) 54325d2f-x86-restore-reserving-of-IO-APIC-pages-in-XENMEM_machine_memory_map-output.patch 54325d95-don-t-allow-Dom0-access-to-IOMMUs-MMIO-pages.patch 54325f3c-x86-paging-make-log-dirty-operations-preemptible.patch (Replaces xsa97.patch) 54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGH3AKDM4.12.4_04-lp151.2.33.14.12.4_04-lp151.2.33.1  xenhtmlhypercallarmindex.htmlindex.htmlx86_32index.htmlx86_64index.htmlindex.htmlmanindex.htmlxen-pci-device-reservations.7.htmlxen-pv-channel.7.htmlxen-tscmode.7.htmlxen-vtpm.7.htmlxen-vtpmmgr.7.htmlxenstore-chmod.1.htmlxenstore-ls.1.htmlxenstore-read.1.htmlxenstore-write.1.htmlxenstore.1.htmlxentop.1.htmlxentrace.8.htmlxentrace_format.1.htmlxl-disk-configuration.5.htmlxl-network-configuration.5.htmlxl-numa-placement.7.htmlxl.1.htmlxl.cfg.5.htmlxl.conf.5.htmlxlcpupool.cfg.5.htmlmiscamd-ucode-container.txtarmbig.LITTLE.txtbooting.txtdevice-treeacpi.txtbooting.txtguest.txtindex.htmlpassthrough.txtearly-printk.txtindex.htmlpassthrough.txtsilicon-errata.txtblock-scripts.txtconsole.txtcrashdb.txtdistro_mapping.txtdump-core-format.txtgrant-tables.txtindex.htmlkconfig-language.txtkconfig.txtkexec_and_kdump.txtlibxl_memory.txtprintk-formats.txtqemu-backends.txtstubdom.txtvtd-pi.txtvtd.txtvtpm-platforms.txtxen-error-handling.txtxenmon.txtxenpaging.txtxenstore-ring.txtxenstore.txtxsm-flask.txtmisccrashdb.txtvtpm-platforms.txtxen-command-line.pandocxenpaging.txtxenstore-paths.pandoc/usr/share/doc/packages//usr/share/doc/packages/xen//usr/share/doc/packages/xen/html//usr/share/doc/packages/xen/html/hypercall//usr/share/doc/packages/xen/html/hypercall/arm//usr/share/doc/packages/xen/html/hypercall/x86_32//usr/share/doc/packages/xen/html/hypercall/x86_64//usr/share/doc/packages/xen/html/man//usr/share/doc/packages/xen/html/misc//usr/share/doc/packages/xen/html/misc/arm//usr/share/doc/packages/xen/html/misc/arm/device-tree//usr/share/doc/packages/xen/misc/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:15230/openSUSE_Leap_15.1_Update/302bf22eb726e93ad839a22e33b5a81a-xen.openSUSE_Leap_15.1_Updatecpioxz5x86_64-suse-linuxdirectoryHTML document, ASCII textXML 1.0 document, ASCII text, with very long linesXML 1.0 document, ASCII textC source, ASCII textASCII textASCII text, with very long linesAlgol 68 source, ASCII textutf-86fba4fc22ddb7b461a53d32d3942d360f5731258f3706ff18664c3d3b1c24147?p7zXZ !t/,] crt:bLL 8iVs[#bv)RItVm2E-*eGm*֍,'*迤=|THzi>7 ϣc^.!W,OcZY띔J[.w`ױd/qjZ#hjgQ؂ZastY;̀~.:hw>&S&Udf3m, ΀JS˭v.ƟkHvD{x=$[2Z 圱;^C$>I|D6sY|@h~UR8i TmY(M& A9X+1CɻXa&G5xX7-(waYJH3IHeRa-6у^^o] 1-wFWS&(r`8aR yu] _{or1lF-.0icJFxήIWZ5{J7?*X+Yƌ}sSVLeJ8wfrIܺ(F鄎!ɴtB;V&ۀ\8)4 ^ O\V]ߚԏTlsb" 7ei(kk]63"4 |*6Cg~ZN1k 'ghZW5W/k{ W~ǁ^N0:B't]:!SoYo7AZY L$Ïֽh>YX{B+込‚1.E@KKU:-JhuZ M$ϰߔC~TG\@X Nʦe@~] qUV7 szetA"M[G n'LJk =b 4E+Ԗ뮎^.(Ww#|rxN>",m7RAP}cle!y ߞHO,Unj˛{Nk'#ו*jao9@uz577-[ 0·%j7OVOHQɔw5lRu<듢?@5GC7/ V1 +vCݍS>rS,=TiCbA9;创xfVqMt\/>ERaR8[:7&[-Q՚e#z}Fz;8dڹ`De3:$Dy6g\|=^GLSnX`'߶Hr}Ѡ,͛aʧab;&>s^r?+8UPB՗ǐsXqPFWB}=N\^C&ЦQz^\i˥<۪hvBw] ]LL5h2X";b1VM]n73vC\T:1 S')2 kǒ|lzC?Q*ӱ-sؠ9tM~lZ;Co5 Hh ghF9(x1'/T=ڝnCy_lIoXS Zeݚ`M?5HA+e 9J.Gjn3T؈wE SҡdTN= lqpH c73ےOpٟ?6}$ONv;^2" _2žTG>藩 J*׽*RKu{||bgd(esL(ڣ("L}1Xu/AH6l%h2'yDc06 6eU7mz1|.cO*23c(-پe"pX(0nEP>FvcKilΘwcmnhwaM @)\LG;֊k!XD+HM5U^9vGDF\Μ0]5>ktT3f枳W a`r*_\O zpVݜ^H'Q͵}]AHJMGڱa5Phk1JX .Paކ &k3U-3v$eoq(z!mɢ|!4'-Ab>jyHs!W5xݎ|, ~ ]1߿Nw.E h"mQv[rbálUFQqER%': qA0o."dUfh\-FRAzO"8+4;P&=EZc#N\4}m1sV(VCN:Iw$8a٢=}+ܠƍ~\rB,#k؇ernLکbQrM8B3}E~%n %Y[ݙpoGl{y UԾkI/x3ZM lzIZO[<$ Kd]O;U(K[1By")k`(o\H%T(c*p>s00 `]J%nb2>5o}Uw9va츻3m?$0pd j z@=P\0[524\$8G>iBXU1`U{d}{,57񏶛W0JN\A7~5y&sv@|.o&zp2(YͿjXގ8{GjW8 W,N3%Jf/zI\@" jf:}֕]ڨ[7p|KL Wwu _QWgFs,:j-': s mрIA ;w;r&s>'ץT$g`gcr'tؼj6)J5լ h#\#2"!U%['1CP?BoD)>tʯ9 _5.1"!IJ|wܪ9wAIسw8LJ:c]YzUY0Q)I_^^^}+9n"،v9#*CAڛ3<.NNYzB)AFlxIЋܪvI9ˬs ;vvII$yÉ) `oފ)^||g-lpy"g[FHG^N[2lG#"3xÁLNiKɲrf{J 8+jkNE7b.! ۛ2gߡ)50޲6vϕUe閞-4Mv2zr#HOǗG[/yN9Ol'*cwzQLn=5FA dEJjeH? rh6XnUT9qNg\ѧi܍ ~(eN;g]D76ME+}'qʙ@{rڇ;*-_J*@]6GN6A{ aT?PCliIG 7`oˍYāMŐy(MP fXj@G]H pr]W.iYpHH7}E?&:$+σA_szn:y/>Lt}iNp\/ gD0(l(!ǚre (AAPz]MAK>C;"!4ߺ2.^kJJMT ;w;NTCɉ<9챃mqgb$/Bqo3+=*o 9ş{&KQ@ o jYA9&&i$sK/t΀{+^hwKt:W)Xc"Uwg{Vl_.覹80P) `y?ÔNJl1foE@}?x_S%Y Lv&Ꞁm`vȮ{? 5?3$Cp"xx1j7_9+}|u{'0odaj6s}}MO[r[%6x1J;I8 p8GLSS\r(y_iiGd#NP_'q}3z M,0*. фkAT/IgdsV0" ]$+볌 WK\[$잗bCdIOzw:=C F / s6E×B;QCcXw87>A3 A&\|W9ZY~Qx vR}E0aKeyuV"DqL߮jޖ!Zd}$nORP?1HV9Dn;k+쬙OzAgx 'HSE\=15[&Dmkx_[jOG?˝eqSr]# 9zkUw)uH9y]$?r$SQAMA? uPRxƼxMb3ARKb@_@n/$)09o`mn7(Aw2C*۾U`^_s/-JSs̝蝈LDYuNͫ?o&1A'u'q@BldpX/=)/w!t8`;l"~ |Ug~!6Sv3F:YjXL)GD0ǣ~eFwMQ-lYM:i~tePv44ӫoS|| qs^'>_O~,GGMV(,HxĕôS6׏@{1"RLnziYRf';oK<%#G*Ã<=*;$/`}t=Y)hUuE$fF\kqE ߠQd{Ñ<3e[mU_K`7!< ̣qMg7Cr4f6cHLBիAzB6^::Eµ \O*mr"4 s`[{ʵNv8/}SZqS9o arܜ&Q]J\h%\E g`_yCX[{q( ͽ!\n9k=xϫx9a$>˗uj>;ҚٴXpeSH^|Т3 K%JH}3ͻ-R#J+]ly*e-A5aYH{P,b @1l6JE_A4muqr 1c3EVzB ALQ MJŬPx{ 4/X~I&u>|f#n9]*H'3.yIBRvntK|Pl|`v#lUMFY"x;fh5?"1~Cj@. K0Q+r>[ ?N =m#qp/ڎd]>𞂬lۗۀ]@;YtzD9\ԌFY,Ky߉%G"`JKAF8/ u%]g̐﷎PV,o` G 9-iEDaF\A8! +0%:= =UǞl,ˉxd9 XՀ~@k_iq?G9<`9;!)s)<l:,/Çiѡ=v.}&-!Ō"`Z ؋Ip@ }:l…BDS9lP5S?G4  ]6ڏjkƷH- &M=x|QdR*=;iTԄbYy ͷ)&h裄H:T4q &,C)TDjkqYڇ:ԖE܆m1s),2LKyCD1[kCGexp#9Ι4ude ˪>͸ nr[I=;ڗNv>C:s5` 7 _D{P1pOZ*nlU%çuP`r!jWG0 E #O9XGl*, }?,^99z$=g vdԼ4 E9 %t"=9 29uD~3[Mbij)6˶`` !Mqʇh ~WV'ɤ{7O5𻨫p f\[Tfay'\8~z,(qwu 3 4~#0z*iR"iszԟPn3~iǼ1 g tfL݋GOr]=wBh~cw&b4nR&NT~֝KT9bS*3Gh(DrhAd:-Ii2XBU(?Q<1%>`7nC(/6M?`p nqVvy:# b}Gk%O:;qHW׬f~Ί:G,:viXv:1dׯ9hfNe^or6Md"jtں0XPN ;aOxq%bu|l.`C-qV[ r$Rb ~I5cWHВ:hQ߈|S#->e\l~k鲿썊,T+g]c6߻s}ˏ,qL]M/M( iBFs.8]>Tt(\i9;ECc؇hRVe۩+Gibۚc y/^$[Z,=9<閮Pb}[|"/{)8A]Z爛ep[ьdYwK0VP S~ʷ !&n0z]R2[ l@Uͨ"wiiOkӮh7UdVI`9{9׀Qrq{>-`ceET+Ϝ2|O󆝶6Zg8|b|m9m^B ;Y$0:Ne/],V=}A<@Oa1ll6\a\!vW=%:},0 (j%q<c;ءwRz[דAK03l]l7Ǖ"=o 9s>x3*V!2ػa|5;#wH;4m2L j|7%[)pGUbq7ӋZmJwJ"rD $PoI񘤢ZHWUzVgQ:--cjq0'K! UHyHzmciCuЌ;&žj6S2cplﱲԤOit+Mcv禃7t3ċg0H2L,Ir r:G4K؀̨ԔyLTYlyt}u Hq}݀D5$3>>^E)yPH\W4k [Ywjp+Mp7נY6P-OҔAhfM+[o>#H0@~TG.>uՂ.^i`@VVPbVEf'f-a*X^Q6)OgpB(/(}VVoZ8xM{p.:N4U!ՔӸKTmr<qٟnXPN\eD }a~6Bz~:3vم%YJܽ}{2!pC5ڛ`-&|<‘|-m74ˋ}yX0-@B>DǶXT~ +TTa4Ѣb6Oī}<72CΚ)Pl,*vAjN{m0SyN.P,gNL =KG_?j> 1_bw9E{JL٬t35ᣚMZF%aOp"'?7^TK782+o] ŐC}繄vK;>)n=Y=Z8F틨,TiG0>WCCVSg* oה%B{/"!LJ~W":X͒*I lȮwX&pF= 4[U#U,6KyXuR_`E@١da5ǂ(0K)scQvS>;x郊-Uu.3An &rcl&}c@>9L+3 F:MeQ3/ѶԠӑ08wY-,VPR*n;}biX-fBk؊VfWr#}ädwNh$Ma9D=f 3 U7lMy T2R.qO~;wM|gd i6b}aㇻ<@~V*TrGQK 0d*g/2IghIL6=|(P |wuC(|ĞWFC-/Bw/y<^~/#*Siɧ=/#2{Oڧ wtasʋLLN=F/jGC5nƞ2)ayy!@AAt _R~?7]9`찠zpcw.\~&X){]eF KۙqY`ՒTng5 n L]ҙ!=]yLB)ٜ >z-4(}I)+ȨEȚMN,D9a?ٵ<ʓ'Qe:-v= ʹTOQx5z!>z9p0W`h \M[Z3SlNJ O?n܆4 Nx:qsצҀ \ vc~AKɿ_t+;\KLOrMz!܅FP/?vBS|Ɗ9?%9`Mwd\tQ]j^x5/;t *9>]f!Ԓ)PsnF!wP¶냷~u/voL!8Hw-fvy=*¢Dll̝pbfHހ@z~L~,OH-??J:a8 4tdQQVqg(R\B41r%v7VܕV=jZZm[<߹)jLQ}Oxhc*z=F/7d6y/! >q-o%!mYXg[uG}#o;{M.H#gXW;pW%I0q>ԀRG8 E;sfI\0S Ŗ9/ $/]UBKjv臁?vi53N'Y/AD cu}޻]Dك_ԏ 7V7BmkDZEF"{-Z@X-)KA hXi\4d~)M]y5kmQ HۃIiP_67xę1f3 qAEpi텭{ V܈C g h-qjFGFj5Bj7c؛or^ށY0aAynmJր,g?CTfI*ҩȺ~,\pku O$|c _b߰'ҡo=_@X Uٻ|mGYmȂY=9ͺ/ѫdX05h 52e .c/j6P)G-yu~xwVK$C}ԇ " \#rʽ&}.zša^UV:=G.IY*0KHgu~b{o*MigЀ<@)pRZ517gKd_=FHDb?c:[Ѹa/~Y櫚zd 'ԓOWoO @#lUn, ; $!ކ;hnYrb! r,.bQs n)v?p8Yglw,ko)OP5| =%v3Gϕ{W4oo~(X:6Tdb sD,:ǽd!q2Ly2UZyIuJQewg.فp-s JTA&xh**0ocQsv6WKWi 9Fs4 dUgRH}T.ϗgJYEs2_wwn/{?Bv6kƻ?uI}X 9J!@Dcp7keu ѥXj4ՇGe9Ё͓dKbhy,ꍂ`J1Fb .J$fyz3b?bnBbrx0tg1  c³͏ђ^|2t׾:DP{o'pfmu!np.'}dۢx,K2-lKi&нXWYo!J @EΝq%fԵ*캘HnfbuW +ƭqhol5sE8 1ڹyOS М~U\Bogq?0MΑŌq.Lp3+bGŸ&mE(J`KkjV f9'N>zÒOL^|Tkg{YWBeejCB_ O5*`>lqT6}"eD`F9D)r T"KƛKcO(.u`: \n)ԉc/EhZH@}ԡEA7˳ńγn_VBiH]@qQ44t' nj Jag5R&`:)Fr4' `V Zj!YVBTҾ`?\7(H8b)z-j5jL|zǚ oOZ[!nქj.|/P TI nn^1+-y<1 D[kkֽshL5S66ar`CKr>_<{o?Cz [F*bgKҴAȣQ:f%f:J 7Us[Jl"Ҧ=FZr;PEesQb\k A1htq4vs'*Uh J/X)S# I(+]}?ߙln&<$J!:8/Cx lmܯo..V/:_ ~LabiN FnX'r~8Q93FCҥ9vqNC'}"Fw#T7ca78 q8~.< [qf0vZc$7rDhC02΄7.<9s!9N޳5L7'cƗ)Un/wP $OeU=5Oҳ,`ND=,(D:D)BW.1B- ,Ul37Xy.I=? l+;aۂٷ9 .{CLs 1D6m8c`߈Xr|0k}sv Pvr@03, 4i3rRS~ױGoew A g){8Z:QX/HAR5Fpy}H ڹwǗށ{, 8"Wsg?5qhig\ݷ\x[tpl*$Pd' #Q]wĽ7pԒn '¤F>Byòrs԰˷o#Jf97 :URqB?Bi WQt1kߜ|gB#.?uVBQ9Ʋ rmAP@Y5_V7Q#s7YڒuC6J~Y|<[M5%=#bWł㒠̇[MԒt@uQM%j$Eo;D!dpv\rخ3) 4Eje̔ݡ:Qں*[cX674Ϲ#`x"͍{bO/>QPQrVH[U nP~p}/okNȼYe-Gn~i|bW,:Q{b@X5\;Co,~{5G+9&Xd{8=gi7{C,d}2MM4CoSf@q98&@ˀuǭ iQc x-OAjxH#C^^7E;j.KYw+Y2CrW}7Nr N?Gd9 +Mk Q|M:cf;s:Cn; x%զ/U12w+ob=( !I*O4 Mt A(c2g`F;Z|ˌ,JyKaKMs[FK=@(8  3=B"flo_NW[ēQG]6,~uE''F gOJ&7Ҵ%~ߎǯ+f5wSH\cE4aB~i#vLvOzU5' Iz٪X:5XtnHFC)|y/1N{1\Me -Tczti7ddHg+ &C1^/#Eɔlʾmb*n\C}+Vd]z:e^Xr0lYjh  V4y;~]DeTQpsMŵա|uq $gú`u 2P kr1ȿ&""JR/FsuQԀ[CG6]teBJѵ! P?qġY2Р<cu7PZwҶOhgwй&`֤8;}qL:gv|P;s6D/]DK19vrv\@ҍt%̲r7 ՜Iw5:G(>H*cșhsYv5>RPU pɠEv瘛B˵Xf@~wd)g35QeBm*q5* D5UH%d9KYfxtI$ ~[5dz$Ph #Bg8\a[X?Rf>xCب1b֩Б/ M] Nrו)V)>1qL㓲U9;ٹTd){˜%%IF. /Տb-2Iogҫgd?C(=SF/*!5@kɅmŞ7\cdV=}: c@w. G慪&Ò9kZ;j(7rS xL{1S] 1y .+&Y7 'GrKXg?٫;E_WXGK`҅u~0la'cVntmʶ7@'^>/gم,NjR˯ll$F\Mah*j5cZB,%m#K`Kr@7;A6.;#xAc3u\]zChGHTk)CsԷ4/zLD)}GM"wN5nl!/MjZcc%( ;^)L1Y,B#k{:JX\L:}-+B =8r|QAxdC|q5o/n2tSBY҅SޭIۼJ1v]wV_./!hWex<ͻnŘťO[&E0)}9R ޢFAٶKBm,8 V1ͳaҙru]YtoHf?>?a O%9ogfvSI!TT뀨\<#B'snşOI<8+M|pp?ES_Y Ym Krg0dJQUuV̚_VLz `D^\C7z0(FCqC k{mu5>G8`< ^!<ХNV20 XuAhow҂Էz|Kf |fbZmL{1Fz 8p\$Z]lW]v24y颕XJ%6OX̮4]-NpI"=hppP*lلzk*/J.(2t!X?=:lhۃR]z%LKا&WK.ug3"hX5l m(.T܈t.T㓻`X y_H Rc+f~Fż) fKE+*ڋMơ6]#K'Ɩ‚ .G`K\;g8idXwN&\Z3GU[W3t(GH2=Hs 3h'HVsjvKQq%G c98i h-3/~E_/(hD7`PwIk(Q8 .qbv` ڪi ֤ uY7ۗĖcʂ4h %Ж6exđgSj"&PuHH̀^$)t*`ۆ^?C]Tbibt6"[O0eb*T4daϲ'cPBw>4 ٌ5O3%>OupP):A9;:LJ?{S4< ؚ5,Q"oޠl|3HJ&--(S ٮO]H tԺ) Y>VۭܣE%b59E3-#⣗D6ٛ8QW}(o!H5N(ޅjBnB]Nh\#vFp! ݅J.R딲*& @k,R.֢i%WGYrI@T nk£pjv(pdbƶ&=PQ\ڒT|KɏבZWlM&tfm#ސ:\8ܔ3$绎g3bǎ %D|;Lh/'OetfQ%c,m\K9S#Li$piuL'2JxI\ڀkDH _]3oKlL@z *hoZqF9yutf+J0-ڐnUXGn窾8OL7j>Lmn CLDzF97pnQ >I s&Hz[\ Ye"&3Z' Z4{91gG^amb-qK'79h<_-jL} 0AUyҴ5 $K0Fٷ+h'N֞ߚoڰXIfVzV~ 0Դŷlڷ-?ۓҎ2}GgёN tƟ=wy䕲qxAh{E>վߟqlP^@>HBՁr24S+3}?C*@2*X8`1ĵj<iYzG:+ cTslr9xYYkUw[kx4uLS]Bq~JQcZQ93b 1 ħL<AĔ "%,?iIwMfϊOjXVϳYܘ:$85LI#+0ِW68ˌs|,b3Harv OψĤhd4@S4ˈ窅.!ٽ|O+gܪ(ā:YUšJf+zJd q2](:%Ba\Gt:2GQMl|v8Hp~ KRgHA+*NbW.E {;9._eHP+Hl^GUN)_Y=Ƈg8w U#*Hf)o"(RxS!ee?WS 2(!O{:I[(73E$L4.=s܅]o_?b%R::m5LOy9MMΪ- F(?y07Mz::$'+Z5`YQ l[I<XRIJ ES~ t3pd br u[? A0n* 57d kOMs+I*S İ|]1ÑO" 4l]D4ۇYWEHƴ ݣp;Aw4Fۅȓ&Ya%./Яz H_={dVbXJ!fujK1bq,+mʢJc|=Th)1}H @E-^~"NaO(6ÿnJlfUKTէ{*oM;Z5Z҆-0pU&c#v7y!mvteWgZhN~"ݫs՜^߫HB(2LG]/u\~q^:k,'}Rs2K.TϡfvW PM/;|GcM] f_[MXFtVW(W9{Ǧ% =QX]*Qxv[UԯzoRVp R˟Tl]~ͤ2KHLvaEt0}{ex+B1tL1~,32dluF&%LFElYNo4ScFiHHs ho{V_dcD؂" ײ|#d]QW9+_F%s/yQ/I.W?+8hπ14pc7M~0#Ĭ&j%0fUo:^p$Se&Jsm1?_Bsp'g1` Wa9F"{Ð>nh3QҀQng&`?.8;s#|ch$Yׄ>;YGbf gXzSB:|Эkt _h.uy;'QeQj{"s0p_nFS/A K`9Z٬,5`CV )|VSOV iH:A4?+ǣ.О%C8<.2K<tNɋdx&xTEpQΊfr,X ǘsB̖:ڷT.QW0FK P@#z4/U|k(kqv&gP~^K GuX 4TPqg&2tl/HԻk Fwx8[J5K󵆎fkDK*2M^_`e-" <\z<0X]{}BB6w?4EFfGWɱrAU>#֨6[J{6[BIgHf%?#`UZL|~AH6PvtoǸS@Z!f7Fq!oP(N]=Z L@ʩCEqa# ?@O}`BB*"Ԣy=Z8.?::CX'%마zxiu*ojTWkk +%;#t߮$l~ Ɛ0&7]/`RǺQ*oaГ ҕ}n_ތ87۝S Ju1RQpzP=@h}y6d,w*juPצ9ji WU]I4̡8YL>5M&,$΃Vڢzk_5 rɖV4.f_2Lbg\&>t oF_F yUaV N#FǛBL|+Jߞ#Ao!qb,U犅le{,?( b/N}zG<;M ZQL} 9iah@+IBs85rp:\ZmQK]!SbvΪ*+am#):c!d'bh ,r)-8&[n6 Hi Ym&;VXNy:ٚu⍑ O[ȼ),.I/Cjv bǂ𳮨9{KhM fB#ܠFOZ,Ap3ǃꠡgS @6 g횺b\ .ڼоv1!4PYx7\75c)xLMyȎ4VزER#ma^$}MI8(0K"tTߠ[ h=!b$6{]WBEn řE&&²+^=[T9!9_2摒.&Ucc$f/׮IkcOSh-),Y 1?@/~In3a>ߧ u]0Bsk ,UpG>.sed+Pؐw.|\3=FDv=!wFL3y] _Dٽz}u._*Z&a4"\uNی,A&ˋK_tG+"ryDT=l(R _Ul׺rw !cb8w{BF`B;%ҿ_$'lA\s`=9򛂒UX!Ra-j%!UYP&u0mr.va:.S8 I|LTN1 Gd hy=D{#Т& N'\~~3BEK&7eLu {Y< BT#veV5vecq{ټ.жi ho,g6 z#VD8cЭVG1v_"N'ΡۅuœaaW-֖i=R(w-=?^R<|VLےNQF{?ZI-?eUB4/*RgY,XQ_ݹﬡ9ݑ~Ƴ$YIgVkG1pax&#NU5혖ɢ=Lޖ(Pܮ'gJGJhU= ; \K^$M>8_3A9B:`e9 BKPU>l6p ͏N3Tkh kA55搹/DNdiyIb+(݄nזTQ,e(yVrz\ ^^N;8^|?b\m-Z[".|~:W@Qѿŗ^AR A7la%-'a$CbH ?G9 AwضS.$S:.6{eϭJGxM۝ގjxZ+P}Q[.`.0vICo*V~Z:;1V<{韮\lv):O{.}H*nW׾lsk܅|~ܱc%m=-~i MS7i%فe?sD?$U 7`9]X4mWDVOc9֏% |~s̴wf|s?ZlHlBc i(x}W (ư[ Q?*DzY͋QO!#.Syt aÖ +/xL̦&t7#nG8Oʢ8Nj[4P^y~/R;zT=Z}T?zr8Th}ʂӖ&A h)nk&->-Hkat"aͅT6aY Hvh}bBu)h3=4a|y̿6h{`f&槮UUZ^3ۥd I1z$y"H쳑O,syڜoT,2ՉѨk&(<,Vp7 Q)^p!S'H?θT\`"`%#3x5Q1<@t ϘzR~GW^R70iQ5o|ø˧-vMi}wbQJE8܄ԝqa.jq,UKNnncω`0S-SQbN)Y͆?TL+R5q@5aձ $o7~jSM)p]E$Q+ _L/h0)b'80_{BGTml芉1;:9a,NA}^QVo&q.{J/z_ObJwJW q'dhQn̫5DnG"},\^(DMBRwL@EPY[\G_aV=|КJT[/%4}IE뼳%VR2|yt~̶dzږ,a'ammhNTzMn;*=TVg3/ *9<MN2fρBJ*~v0M,ۥRCGiڻR_z71mp2r}5Z?gc8#jB$~(h'%yba/Cn6+njWS1a:I97RGKKw|e)dlZ4xqeu9MOԼ`(~`*sq?1T ڥXƊ O+:4ӄ ntK$HOYxC},?HƬbF@4a&.J:#_ep $G$λ9R6Q1@jU74Ÿy^LKL=MLu&(N6UQbNxP\umK}stboFp Dش̕>օ ^U! p ˙xʨFkpFXlmӃTϫ<)W 3oWq^vHW1WPzMe;j_dݺ 1V&)#*4Ã& B Gj\(+2>`vx!j0u'V@ :8{~r+T=A,֬.du dunw {B]Mk$9\a#6Dg8:HȾtdzd)g{T324Qf,i& 8J]''g;LCZ308mbKOOB n+gIt ݏ'Mc<KWa(QV{GO E.IfෙZ^v>"~ێV - qxwȼ cjS 9WYڳAX峫ـ^[4ة0aVXRhpv^I`PB%ểAhH i!]b6NXF1oFV dl!Nj,Ѩ(4~Mh7x#@C:-S=9ӄ*a[ENXckŽJm#8>F:z`a?F@&̳/B wDOC .-_Z(b_xS:&hV"詖{\ ZؠԎ2رf2/sk[gwBW?ap-yG#i[Q_U" 5tnQ$13,4@l+kJrY識cwKGCE&l<9M[vIdU5R#*$8鎄4l|p~.Pzˋw)[]+Ak!Z"排@_E7l j:PJ>&6sB!|]{!tO8) zmZv:{Ū 1#A<_r8}E|ێZ2h 6 ȷgq;& Bj"ҰB}Ĺq-Z.t=&K*̨i~̡l0Tӡopc2xܹtރA\qOc/3+ aڷvz 3K>s;P%$X!gaSC@QZziWl Z[xayLRUY @iiip`. >bĊ>"fή,&RMvg6A[ bXI?d(:#5CqK!直T'Պz2:/zЭ@.5C ԋ -PY82+eI j?GlN(ϪEVD-. jLD^+9:[y)fl>6䯎p/*%߭n)_&ׂb13W+W%ɥ@)]mk?T*Otdvj@ rjpiJ¦ZA 9}ܥ+(Rh^35?"o3XRyE LT&O(,n9KrG,Hjy"0!S8C{\ 'D i|Lt@Y4i`81%*CTUX Qfmc w۔A@ ?%$'Q3Ϲ]oXu)ɂ%iJ]Wd\Ƿ(z49mkrA08W5/$/鷩\ŽʠLr Jz8CW= 5/.YiGK^m`O .c.<ؤo@y8T( C5՜O~ʝ9 \;-OLNT.!dZmtQ`uXj\v4 5o H;tq ϜOhG&IRiJ~k2xgNY i=!QsK.NͮZ՝δa!+H~ HŽi@CIlclfhFgJi=kՏhe:("("e*@'3F)ui,E.<)1b{aPӿ>BPXz?yXtgN#-aLπ v`!Ϋϩ:&] ܳ © 4u7 2wыSS 4t`YʎV5XsۖT bK3ux-} a6K i6ͿaIݛw:DmEbGDG]{ ٓ< hŌ59.L!\"sTq»1WNܭ_E(7q+C4MAzr*&UL4G 6 v½;!MΑ3&i. UA v}+@nVhZ4qB?K0bNv:;_}lDe:n_9* 3zkBuЇ9QkDD+JF8Wp{j9*|YV  vY|pE7gy)Ak=)x{L2 %@>JZX1p~r&$ՋCܲK(App\L3C0һΆd^PJjN0jv$("Im1`oqL* $Z8̢<H D2q $wxw. tD;U@f Q hh~I.G2NqCAy{ڀ?jڤ?z5ۤ! <7 %P+;Ј~F)\ʊHVv"One/c:K~5ygh"&ul1 Tkjesru]I܏2.9x xxBJsyG#xJ#!$IckVsV?fZr#ꏅ$58HEdb` A6D2%3KZKm2Z҈ ,"d'NdUhRꚰut,~2`g(mqxtja\O0?,hID7Sj҈Kͼ~H0w$ISm ]TmCkB@ĩh'nAr\]xZdItZA$|̃6^PųTI%fzjO el+[y4ONA5D | לsFo+oU23eOǐձ5/f!%@>?30ֽq{Ͳ*FP'8=M_e䙹]=BNGXCgX%xڃRcCBXQ5znE*[>90@vkXh1l6'mv pTtI>m +}g℘7X7T#KՖ/Eڥ_5[ۢp |he<遗@77: pXx99,]Ybk~Y5v+uٱY(%SMኍ,fOPxD^kQ8AOj2{d5z[\%4лhsk B us67i- \814)`}:A˱> qAA9~.pcoE |x%z#0y1C 2SF&EӐ.,Q] *#B|rcL4{0|؁U&:X5U͊Y' ]h_Fek )c%+/diF%>i ɷ}Y4%Nv=z9e(OT" ǛxC@${L#}~]tJT`GUUEտ}y󳨀r?hgvp^:pֽa3Ժ@@*,LnS =+^^Iٶ{$𠦣x4d b2c՗IIؔ*Bo;Ū-GD0R8bhgH/rlɕl?Ɠ9e;TGJE<|e՚zSNvCzҦٕbz~mdpCdgbM:S)k,|-ۃ]5=j|rO4b"v.a{h_{b]v׾< k:mOR%(AܺeI#b#敓 ~i?Zs7w|iӗ@ ;.Dh ?Α|&" 1">V0i`$Y;j>|K!4h-e:a9 c8IrymYl@qTpGlzЗMm$Ew<;b`\"|BΞwrJ>y@:/6vOxnSkNqL"1ivyoHQShZgL;ºCBJ WZj8o5D6IOc@o$L7ݩ7T.kq[O?> T?6U"'gf2x2<+Btز&Qn Io4[6S?}7~ܟNl"L4#h!=|E׺lD');va\sHݠ,zK?iW);LF3@ dIv=Eb {%%[)q8vUjܻ6 9BK ^+KT 6p"KҭEU9soGcGT`PPZp]d.f֞wo=I#Daa Zbh6iWg&c#1k# 5$I@~MJXrc"gZw9Jb  A˦:vXDϭ>#F!J*{ B K0Bݑ/L<ׯ=Z pjU3ӗ%V7(s=S5Nd!=sPޮY=f!vPk "5,nDgM܌ Ke@r&@ 4qY{ lWMU31b8K #_eMh҄!2l3r_SMڜEgUjEnIYmxDtB6Oj((mx z[XQd01mɗnkgA5&JFs׀DƀDS`><4`C-+ fSp. :)8Gw@4v^cUlkRȘ=Ygr\>i+Yi Vbz;2){7|%% 3:_H]C&_l_$"eq`O-jc,|W @`.g&{f(I803<-(VۤFsX/O]V#Yq [+*v,TWR\.D˟sPgT25 -T|-c۞,;hPg&d8l:  5 8$ĜgP~PG' g\.#socN.>eTE(ӑE{W~~0r^B1>kqƎ[Hܷ?'gbU+qT;˹ IEj4ANsb Αȏ9J$ݺg,3A/=Zٰ>Th"1SI5|K;G.ϕ]yWsk3|IW`7#VN혦ixΚ.z'(!8y#FajOèBk /96cS+kߜeNqW1VHP ګ"$*O9vY%: sou>'ܑSS`}o@8 1_|$26Whc2ʰ|e~-0kN.,/8S$9-JzF-%X}.b.Bˆ6w-ubJ#'^!![K'yHsQ+QqWJˇ>bzLԡǿ0NM:W,YbK˅B P_ !LUU#~jwa&LYS5ywPO$3-#2 dzM@ڶ]z$R2b>F>]A7?xְ]"^P[XwydkGCjk; R1z}SZXD]Z,Yе x(x8Hm}v n: .kjʾ֊;L Gs;(l!-L11w`Y Tv$h|:?>r)撄>N1N,%nD +VpSCwD4PߦA6uk(^] ? k;xUB3m^~~eO+x%2.@ zfaCB/!bu:~t@LtHjZ1 ssz#.\mii50AD5i&wX7|HI - Խy`CF -+k~2}qnzi qr=&H !<:عSKc.5E<.Ըa`=.{FN,v!5t?$%(|Y)WSkS\q !;6_q䤨-trC#-RA$%&kf=Z̭x:lșM@2g&AxfbgO|DBNӟD1͠KGq(fhU>Rj{,MH1--v(/X@ig G Xkuhhlͤ2=!@߱|#:i4!hSx35 Wbۧ ›Tzߘb3/R!!*ͰOt7ohze77gt@ 3*@E~fxF|2.G>ł&u1^J(fqRٜDAǫ9o.0˷\3 |%I3aFZքLݒİ"!9$$ _`Xo"ЕhZʁ V4r9OQ[ǵB0ٟA78 d4w, >..ZY-Ǫ'"QIm"Qji^gZ0o$c3bヽY:*"  $̟QqPH}P͙mglr53_o oӑuo|V<66Ԥ4 i̽ O'gm׵Ώ U_ U/ Vn1\{=z1o;&ڛ!l[>9gvj@!5aaФQ919l*g4Ho$KbcɊN::z`ft7 VXVq7 `0P)3F9-Se5c˼Rk,}l9m])RmO t%o,ƣ\~eT]C1Tlr!3ZKI +l{zy%;>vwWZbC|w -Lڔ(R%3u%Fgn6UTol/+^$^j*~_-;t.&{aqlޣ2nt9jүy uN!oy PI\!S‘dϒ1*4lPiz醇ݧKO~Lt}箿ByW\Mp$&-:5M4ͻjBWk}D*x|%X!Cw1"j78Ϯ'əRK&ggH2og(}T2\2 NLKBᑝτbU)%Z {.b֯º}Ϸ8 K-:)3*9zxJ؇ 6}ejJ1(Kc)p-a\&yVaXe6"X0'ns.LIBC]n+dԑ| vF܂sN"xưz~,QR+*s沿/ mc` ctҥrz3Љv ɭ$Lhڱ'Nu" q- kTӶb7JDYޤ?kXI%s7p6]㝽IYۙRUnh y&SbDC1I<ڭ}X\ J49Sb`ey>1T F,Im/mRwnۃ]ououh1xSxnG Bۙ; =ܳx_n)~΋j0xiYi5\EOOhp1u(,9pvңa[<њUǛdqzl>‹VdOԉ^?)Ǯ"\"~a\wƱ)GR'iU 'c핌Spp׽`ezkXD@` O%\δu|)X_ٿb&."Dn]Ip龑]K͗u༁ktwg[s4<^6tfl:o$+5]\厓,*B\֛_E.|kɵv'T޼إ?0ڍD`l^iq7 4t+C*0YrMg;JSf nI[J{pyfɊKR/bvAN[)h abEN]F뫁VЪ-_hce]CESBs73b9Ml`+7  qN b'Dn jp""9p|%2҈>ZK(fRZFWtQ6kBPvh1TQ!;Zpo-\RhN5n.;Mo#@fo^̐3Yq%A* Nmmxz۬gTҝ|)W:h`NE8AƝV`b3--L۬f9Oy # ^ht35 V v.xŏA $¬h!n9wfb(a-kJdu h6|*Z bW#sXXVݺ"Cz|!b>p{z/dEn/v00ةexʂL( 2c M7S/\/u#0jXfh5I -ƋU`(Wf ŔtJTwE?oc> $WB ;N7g9hoܮ^[Cc0"qi~?l=Zl%Z>tCȤv;eofjzo1\/BG >}sx.փerҋݗvnh}Yb)܎qCBq8;, Ku@#;cΟS2NɮP%;k28oq;S|aXks^yd`o4PL)hJoSjpn2+ Mn:7taV|ys\ '^"UPaibs.lTB4 ihL鸀-A "a1 u{SF尝4G>eEWɸ0V\$(b8C-O Rdva(umfiOr l"Td5=nBL!P$+,?಑C e צzdave6n;T]@fԸQTFyP0E,n @D&6U!z4K_^% G%;Zw;d&rB̟kGh뻁L|w#39eE] Y@ U04ks1CCtp€p)"d_u @@ A]cS^(,9=mAgW\R_q6v$j?3t9TEd_A(#xHrkN{>O&dYmL) 2,awi/UEI(Zuqާ; kew?ҫOau#k+s@fxCXʘ ۡªM_eu1%Mˈ@ =`~+Q$UԞps \2s*|,Vp)tf?A,|{dE<"rKp,£[;V2SQ(ˤRٱ D^GtW6im E&gi9 R7O8ifݽ4Ҝ`Y?)r,х`b˹BL@Q=uZ 4ĭ1@xZ)g M镲D4P-l|SIz)>ә >bE1*v#m[aHB 2`&[L`0НBꇆN지T-Tzp7 ySZ;%>Ѥ_Ej?r3N?Zp==@z(c3ZL>&9jkUzHƊSb [=g.ֹ`tβCN>3!,Wf(Ӽ¤M -S{q">Q@d -JБx%Nݰ7 Wj6#, аiCcX8H6il6CTcrJM0aΗ:%AlmG) apXNZ7.1 v `×?Tc۫)S G5;3S?KAe)>kՓ FMC<򷽂  Ѭuap%V\[pKUt@5795VE|0 v*T"r@PTu-|JY[Lq/ |amvG><}=[0vpNEF=|1Q,ݑQ-p/ A|T>̂݅&5^|nu Ͽn7WчB9U 5ukU>eZ3tprן}[1~FYƌټcg70yEcW-=rGMl00Q sRMg>+ s|P> 2ckߖkŘQ{N'>?ǥFӠm[yM=|CV8GȞ%GofCמ(铨)@5`0]9&eUu(݀=*mֻu`C%P t65,Er(-dpD¯1u9unM2c1?^ɿÛ;rUG K|2z,f[p2aU풇UG҇E+R2SGL߮ȴ!_vK!iUy<4uh/ 07$ƾZQ4e%˲gפ֧̚YInH_ eBeOX eɊ{5XbjA>%-DhR/2lA ĨQH2C*2$<(ըȹ뱉 C9Imdr+8 M< r@@8r,L! /_YO(lC.^msZ>Bk(pd a} dkqMb$m$/663Vt])&՝[_7*Z@=\"< 29bsksG?v8q}_ze5zlkf~m^%=hBLcWAؓ~rj![xaΠLB^Z@Nhɸ̕O^r!;$9ל6F+{/̼Iqopdk=h;SQYCp;釋F8e/,!@·׷j2tP新:߂K9:e*&CA>%0D]Gi K8?a?J}~[:C;P DKuEa3J+kz3ĨL!&&1OZ5_(U]zClj=lv K`nzolwᛙϱ]KAhͭlP ߇x0% /g.껳dto뵶H"U~= ?w|ŷʳWuݮؖwz65kLg$OIV5;ĢQ xEpRiOӁ.؆[&~#bgM[ z}-?4<|G2$ׇ~Y(oZO167$[<K9~L8^ؖzR6Cz` pFރxe㫨K(g4A9JC('RzϼXhMytسWa6Q.<Ɲx:ǔ>>&) Kh`_U}WvlPb`uZ#]0=?J DmJME~$Wl-%FX V)h3.}Gq9~`B* qzt 9ey;TS$5׷k?nז mu: JaI'SkzA1k;a1޺? IO˷2gC:S<ѵknV<t֔CTp ]֜γjePzu>'z^tYlHlȮ)ftbL ֿ[;`Izd#|3_N@M3V~_f[ja$L˹Zkܩm hokvUr]\/12N{ydI蓋xMb<# Nܝ%a*J:b(چ[gi;%b%G,@֭lGP' {CzLBj2O-]7'PWCAĖWce?p(YqU1|/ΟfN#[4ؾ ȷ߻C2YJ^nP85I[!S *Bga5S3iW8Au.ais^ &>//&i_^`z>zF,rM i~~Q! MYQTU&,myu~<'fsTG#W]O::TIĺ&,0*eYs(t!=Ks~+#L%K7@תp 7:EFĵ(e ΍ X>X*1M/ f >bb!y/*+H==E1#YUW#+&/^ޯ"Y笑lsuژL0Q.MFʸ>N?"sNUSk֟DŽSdy,Wc }=0Нwد xu`gsg'CZ̳J6b]eáJkK \v든ҨO U]EUgNdK) Nw* !Sw)C1B/J5{~c;` h슞­_mzdjX;8DGxx|~л/#vTB3MRڣmۦ*;AG.>ʚ](S|+H.&A|0醔M|MF' ƫ`bL)r?G0&nm:fU._t;x,?19 {3ŦQ՞IR>u@ ͸"\<_eغbyֶƹvl ~_RV#4۵G&ߪ!^/fTjTZ@{dԭc܁MOwj 9]C*E' )udOۦ-Q~|I U-]V_ PV1 h %+PjCظ]&#rא E!*^g4={j52bѦ;}='ږ&ϸ/D|˨ ǜHSi` ɮк% eǢl~_ <0/cEX8̀G 7P4]6+^D-HOmP8W#}4oXHVc+%En! AUpim8x*zF1er-*V`sG Gfkf&H\D.!e}ͳNSCEIVvl4S" pI/p0tM\U(| nQ;6p;i`o'~xWAe3SáOWJnd酵Se癩gX;Q[e?h1rZ['Sje9Bgql"?`;jFd>73# P2]'LXӭPj da2ZkCL}]BrOG+ `;MN·|I֠& IW0N^`/ M8rqN`__WFcE!G->WѮHвYbygt[.rk^GF  Is ;Id[N^558o޻{{%YbBZWFXҢ_.b  VA8STyW$5qxXqg-W,>AHp="h aCrkލUb|-O}i4\K%e< `nI%;sb&[9.X|WOl~(^a&g=hDbC`v1^Fn\4EQ\>hN2ACi?h4 ϶tҹ^M#)RHezD䬗i~{ɋ 7H.d񗽱w;UVwƲ4a.zbfAknapO;aIE$f>+T7Gf+LOW:s>b4}V =wQ+=Hbs9"Ha3角O%Şp5hrH-tsx CgqWso$0dVI:ƆSǠ0{71Gf!'/E'`2*.12 t .aBvڷA$fj>ԍBQ¶-EU Hr}8~䵢 ıyC8C`(5%Y,!u1ȰgŃ"I?DLf.EaA1ݙY8Mbx c#aB/u-(8O pt&Z3j5'K>4 J3j@XA"IÕNr>b"4'`Ye5GTʹJv]- FN}K UrZϞsjǕsh/(B΄~byU>$:;l d H@y&B -xjR1R(bF\ Gh%2%F%8K6Ӡ́U&&AR66 t-N  K7Q@뇅 K,:cЂ ^u*<SIP?DΡ[RjQ9$ՕvJK 7OP/Yg2Eg[B iEJ;vv11*zbf1 ӄk S|B#7λz\qd٨DC >*-?T"K-ɀ5]r=` 4(|-˧1s Iΰ|ZIFxt?m7xCRInF"I%Y(tpO4'wX5 Z3R=U 5- />Ld:/^puZ꿱r{' O R拸p_!_憛h}zP 5LJ^~.,Bٶ(hk(:oDMk[+r2S}!onhy/Mvx+-?# {![lp8"}W@و!mqi~L-/#Q>L4͜0 ٟ?F%؋Dhr85{҈V w9 An{c/}M3" ;gdʻe4d.8y|{jF0E1${7tE"W=]A$[Gݕ|{d3iQν1 6@`8cZtVwXaC߱ND~iao㼃ۋ.g9 O *2#%qVO|s7Lͽú)USCbSpf>O\[*OU"WO+"@$r-m`HYLh IțgwAHV]HGxcv>{l"9F@wK J`=<;?N\!:케W C>gej9aE-GuJdHձDWR_'[w` g6N~뤪hO,H`&/sF8wI][`$ف šx99.gg8bnafXd= ,R&etcGs9|% !jWĔ.›!„at_k= j9[MRԺ|LBtXZ¤SfVTbziwX-?G_CLN 貞EkF{fImyۮϨ.'=[e8̯2߯$M]%[kc*,^ù].Ɨ6Y%B+!"54Dqqwz''j&5geA:[ @ ,b$[[VA"uԹgd,\ܵ5v ]ߘ!e q[Vq3fDr DgIF7h0YYdz׹QDܝ+.G86]_TaZXɯ^iv_T.b]6,kaLZ>'Xl6SBTLe";SDjjnXUʸexq&K-e2,t>Ӡ'0P2ϧ [4CaIȶ߸RrMafRΕ+-ձ~`вg|y٢B60lnCp].s"TD Zkȅ:\O9Z'UX]&Jws'M8Il+y̷l)qU&!Sc| 0k\`5y|d,a*}}S tߟT_<: ÿXe i"V{;E#D;X` NYR`ή`i9h[ݔm13e_S&QjabJ1(0m#MnnLvBA| 5?c^ږ~ A'FgvMl"ۖhiMT4y}b (L)7VK{A׹K9(.8_DT# C\d7?;b?qKCo +32e}2R. 0wIlz 9g]b#B=Dz.5ťXA;t!yHޑ |$~ anwTP$wT+w11wV&I޵c:8 s.zF+}v)Oԩ,,MLFsrmמ5WizIrC>c7pj\~3 +vVfl>e.w)ePP|Ϩ,t4k_lcleo ݒ rV81`]m𒧺ӆBFT?Wrbzs?(74Dntȃ ;֍L nF&s(%"jȵ%sy;#UL~5tP;STmʿ"ԍ 0V7~uFO`<Ӕ enR}w9 ('НYu2Mc#*-Skyfu#gX+XӒ *c=j+ GNbVߣ#[fWQ#:g| r?B';/Sȵ@Bց쳳4s Wb2'qCJ IpjƇgUQ|A7YX=l°>qC]*Υ cnH d E1Zė>6#1c݇!}̉ݔ|va.-uEGFcL'ը|t⌁&S¡BK %;gjs䷳l :FAa-?2K 4#*AodmŜ5GB6̕LSz˒ΐ Hpx?sܹ㺐x'mQN)ڦ*9V!r#:ޱ¯KPP5Oa24ص}k>;`i{\U] gD{7nm!Xdm#^a;Q%HQ 2nsyr,Tlo<9L*Eע }aŘOz_a׊9*U̥}^ΜhCGxYk2#םvfeZyTPxRTf mٺg&·S*-D=g7gI&8喎}u ' 1]dࡼ$S ?J}ɉWm#:>xpCB`vu?Rf ?(2Y*YL3aٿ&&PP3Z!R{۾vdG-#6G 0G:+c@1OV>Pk ]EȔvh%~zRPHC_Ar*_#ZbvPYgդX%-IM)ƲѬ f͔Ƥ` fls쁼AoHJу?;j&)s޳q"f[LժzQp7F S헨XR)Mցfx݃ESpO`xˢ/7/TK/oFjR#}DZH+Q->yvOw{2UޓGq'Mq T$ܩpߋ֍TL>yzEcփM6BV ғ]*q #r)|I=d<}&1 ThnE܌gP7(揬yΡN7JO".'9ۼm5[7hG&nMߞ#ML!1A]:Ĭh:s?mUS2xa rl eyɵ2&~@X[{6'WKMb,z@RClVt O,)yzHEjh"o|x (A=!k&M4UE#K2/R.ڬ/񜍌Z:YHxԔ$Cg92mY|Z7~o ^*4Uiarczv(3 hbm4nJe^tGl d5[Vm^6 Ú`: cD sh\m|G;RݸA7qx7&e5a_40+ΟoCg>?xMIorܻVyr 7D!e:4 Q)짳4SCХťbl61Kk;4 H*ulS>Z6ىe9e~_P(ʂ':M%ԘQCzIOf%SxP^zŜFmLU.<^m˥šK9R͗Sqv)soNdwo 9_hsm20&j% xUG+cZ\Virc}oW=# 0&Jnq.]YZHǡ&G56` F򅺒oQIQlKvj >9-hu.Y^~c j?n5mu ̍s( Z4ůE!^Abpda5w mȩ?`0 w-)4%c >ϴ$e{<B޹iu̧+>T^mYEO}Xlt+ꤑ ID UцnV\qFT"05]=鲝) ^F p8ug]Kw`l>2f IӵJ[)C\]{`RkgzK:&0%_p첼nۗ~cO8Zl j'vD~I:aZhOsD2r.8篈!OMz $CԚ< $?9➭7]j`|L 4bsm%Ԥ `d&ً"U~ n&{fzGÎC=4K91ms&ld ^ +- ,Qfo/,fй ASS !S;q$m=̣J5\NNTREZJ.bQ 3uޯT[ڪfH1.]Wj?PSFM>|Z<0vQNԶSMtP@_ͦH{/rޫXeg6ƶ_!1ja '>|ʫH^'$*.kif$x9av->ÍeL$Z=iUcCa;(~Uz~3JNyCzLCqG䗯p-HURoMI{=2XX#4ruY[g%WC:DA>4#\0(V?]''qX09NݣCvNfcFCc/d/T YĥI'P;nh FnLaFI)$S&5b"% 2RP6㽫Ml*eYe/O.ͽj.֞W45 FvX9ھR_7oVE 1+(P\p֙pb^e3?/"HIJ*V--R*!!!]YeD}Ძ,3u>ݞv6{??UØGNщ{75NIZ{SmKIE4@:z1Ins{ ovrER2,v"'Ao,o-ǶU8KZ 1VtQ/y_?Q.*96B^B# 77.jܢtk20E J( ^.lE9GH"7aU,WCSWf;nDM]Qmai9`̸̗n^N/˞1PʭyLX QIP殩Wqfc&Թ#K!A763oF.ZQ샮%(Xmly=I!4[$5JN8f>Sy.Pq[a6}I,kzDN_xW oGǐmQ.0;ɏoyApך^H)^ܘ&_KW(*c2e=a#wg4zf^vmd9YCݥ`oyӹBfB.{'ǶN.jOLry5$J$dAj,v٫nl7L{OCp˩'4K:93wgA_8R u [QJNw?j Ixm'W9Xճx#Jg *;;MKcEة"lQ΃S|[;oG? MT6AyQfgc1NuDt+/ߴːߞ@߅ 8J(aA}~~50XZ+54+ +.QO|&JLX`z7_дMFGs[b]Iw޹K87RJaAD`i]m` Y4k|XnLP͛,cb88IK2ƒP.״x 6dW?]mxe;&3r#Fڊ.(4x1K6 |}#@d47C4ǒ ao'.BbEJF!oskG~֪ؠT$U lϧ”,FI7eX?\P np[w1~8$$\Bh >aqv i&dj Ԃ*˔]兞" }@cb&¥ sS _Cl/.tTҋd9@unS3"Xl&@7_D_30:HD!h:(QB:BEMi8a0{(xZ9Iczaև8>.d@,Ӳ'}h؞hצ߻WNJ2Z&k& hb8X Io*Cǻ"L?BüžӒJKc Sz;//8gLAd&MsixvDU*Wq1&7 8뱉y4BunTԍ#<.M]zEiJN8ˁgDtIOy'ąXJdn^s[;Ѻ+*IObBezԸ/ك*<㼦sx-@2G-POSRs!_HκV#,%1v)3pwnb:?=Z-C7߯}l`]N8B):pOkS&1/?[>b(k?Z"[xΒ~p`=es L}F&}L8~{N[,STū^e8'Ñߐ(JёGw-E|et 1 o6lA8p:(]G]\4f,Lre"0ʹO,RB}z]aX8Mj]q]% A+u0-%P0>ɂ<33x&r!34gj\JY* +1Jj2wLTaH>9LN " l0F+zMmHh%u A2n}Gux@ 4$"i1CI4~UsJ3ܗpx EDe+W ߞ|!$@<I;bvTjW^<J UPiLr}<)5B>2Vޒ0^T.k~X .s4k͝}0+R9T[mC>'UJ(,2 .zs[p>eݑ"9^DPVuݕS,J NQ9}ڿo"Y6:X5=IrH:Q ; גd'ºӗypx'[[Z%\u˹o$kQ=4B6fnu3ca~Hdo=VA?cJ3b5 lS0ɿʌ kK,(ZqjS% tCuxUJlf; ,mEW`xmΛrAԻd*o(I%x+Z->)جr$:`cҬ9=k3/¼MiĨ?8QxkJ b]@cVPZABOs-&Bv`<ȇQ6ua"mzԃ]9xGNL[A|>:,m` ^k߫m :*U9B{K9jgmnCˡ[+UAr:D}ו9%je?7NYpTvL7pQ|O]u>9AUk?E(σT|  "{)JXjƈjd04+D=JlDVu1|EYSLF@O F%bj6\Ik-g𴰁d&{ T :T.kDhajlb0il5-\pd 8`iftV5_C kBHt TW w'B[hVe뭞U'p w![NZ#dS9׃i <'Sˍ{tgúc+!._V>YpO^ 9'RXF.Q}WQsR1^*ԫS]ar-Nј.m mFdoN)]NHR0@K*"`x'Q/IFcrj8/.Xe19(A#qkUɡE|! DFJ9Pa .e"<Ѕœ۶Uח)t #u*:#oܳ6<o;N$8ʇ]y*x;ҠP[4Cx}Fsڭg'\V{Ǝ8k|mibx#N}s(`XW^|ȎywbӜC'-vRl("IM| j2O=-Jz\ReWE;@0! k2 {kuf"KD}ۨ[sU 5"feEt˥ Z Wlczplz V~Hf&@H]`WmfF Tmח/`z4W/>CIep_FN:~,fGZhlO+^=:t)v;4\FuEÝe tm<`DZv( =A\2 4wzU2҄Յ9. V h"V1 'TigII׶n+fy5E3h($ 禸@*k ӕ zJW2Z͎%/ʗ \hrblBju&źJ-[rK`0g+r%mvGoweա`VOg)e9"`A0V^ 49(&Ls{O d}v,u ?KzfOۉUZvdU3>2j VX &T#:vgxdSEDy*5Sq_q*Gj$v XG]y1$JS3q&_U*{,iQ~aB00m'WJ.OԋŒFnut@&m]; `OILUE:#G+ }y8x.?T(:`6(Od[uhlIj lET}Y vS4oU]x G eXXJ_,2S;,PӤLtGS4 H(_v.ʇhZ>+eȯQȜz;sɥW^&e.kԌy]c`,BѰt&cF,ΤzbnÂ"s^Ԥ}ɇpqİ?F?+qrDծT;)/Me/3ܩ2m=KhsB>+~ cfX3ykrv jc{d6@Yb:4q[+q2M4FB2y-k_6q0otvq{8eߜ> 41ZyL84m@0Ä$ Hݜ7ztT ͠h~vG[c99_IS"+6%}m)2*U`oTq &"Bȑr{k =R YY0PP_57 i Ȃf! +0ّ+%* }Vp/rQJ3VDEgQ^~iϓ0B&g-hgL Ӱ J 6HRR4 Eyɻ=ܤQ<_{W ׋6ƻZ-|f:2JJ2un36_2UofiӶv U0]oaGbIKzSt?MմIԿT;V4Õc5 G}FDGL̎f⓴69R "zm|_vі$^X"*x\`M`#* sBHy*Mi =rḻ'1K"$|߲;IԺL еx|&ޛo&eHMP]$ԅO@,@Ӣ#i3S(7Ňy0π;Z*!yWڅyx'WmK,L?[ 魆`#ST&  t[`8`.1ii5f)O2/N٥0_`K" ?V7M W'MPCd` 5W nFld/ՎbA`xRO g)`5SO?rukbc;G,qeekB_na_Laxق8@L^ZÎ`skd ⫮$v?5ܾ+G{le/Bd({K޿tYqPU?a kV-SH7zؠba;ad&H>,>E11"@iZL hoJ!h|.5royW?K؏zRO %"a 2pn6!ngڈ:ر1.gC(V6:D9 EKOLR/M6 YLBg爃7> 6=w*A9q{2Ae y3]mԕg**H+x+2YjTQub)g8>T=Pbzao 쉜:j?0J.$ Os{~9MT)N"nY978|:wYsB* c`}W%Z[ֲ￯,!1Y`х<`I|u)߇,#]IY+v澬8kXDDZř$v4 uՕNC-I 3J3RE9X,Im}c,)oa@oWvjkxIt5?4e{r~YPLhhT&Ij⩞$EgD +K}sz~5&-LJ@=Km˓_\y;iZ-2҈ƼvUMHe0´Lnew$H F S0R76pGԞD,R8>F:jdh, 2744HE~ d]]`?&-*DP 8]rU;N٭ 1eos5cDf0pv.$kgcJNrɇԟBHHx\nf`+䙘/2fS&/>׸;!`n0{tN8v.TDS8`ԤLgGh\+nX/*k՛,֨\/;#_#a$aOr$S8*W<{ESbu3BY>_{_a8r/ufsŞqW VN}l7Ӳ`YS*00jV=[ -eIлEqK~@i4%Le ,Q2WRe*2+sT$W0uGVRl1;C#Ͼ7uxYs2ߪtH} /τxx?Pk29Z$7WЀZaד(0i\?q+rkSRoacGXw`W0L߀"V:Ap:^0j]C.9/jvl֖QzނXFfHLSgR`k~egli^g,*̒A>aI$V*G=N!俓&k%( 4.S?F-TξyG6/c}yZ~]9wF)Ehx(₾{vTI7G"_>veYXeљlOlϿY> zH*0p^ʂ@4͉@ڽ YT9\?-vt/7-@pݼ0iqxr_7ķO9֏Rqj3hC1kl2H#Qӕ, 'k RG&&XT1Y9PB\4yXY ߛ` 3t@H-ml`Ϥ$C'VKt%= {7u7ω2,+kBsj/t( _eAKjCCXWTzE~XIr:Z0 M. ;Êf屾E$~,ܳUږ.xEo A.ߢRYaVĎ1& , ֡0P{FLPe9P v]K"xSO 4 zw._(]L*!k?@w3]_0V{ԜҨ` ubdcsw7fyO3TOP*)/xxvu7׮r,ct_"dsKhuM[DP>C`iĒ'JQRn$cYŎ9ZhFi*"{ea)`Ws3M\ g,>-2AH!-SKE aOS$^3"(1a=TW+Ma"q]8+M.rgbŸ>$:f䶔 h-Iخ6 6h61cH lXk7m%Tml.j_ٝ#Wg}PLnEBVTs%̱:,s؎o dp+?\9yҗg&toB?_N:جW&Chhz4L7}8l)Kz-Y5W˭ Xk皻ת4P>*NsNjiC6gJ.ͫPGd {<h~ރ,hًa Qi%#*̢mb<[š␧;y.b/.' %FSvo6~|7q/.[(}jG /X- PI-nMcFwx9Hyk1CZ}sdX]s~#pם@〰TMmQ3r6]3E#` b3Fym{` VIՉS)dw#^FeyY$-0د~CXڭc{>nEArE"T I5X+ξ¶pPxdQ Ji£-":k]1 (<&Bs9I'k(|ܼܠ.Y.v%7\ %+`^&+how-a5J^`N๽]j YT]W.j d0.<_r4,wr?>M~fksʊpGu[yVy猘`p Ycfµ1.< 6㉄nQRt8\k"("u."8 %1L'!ޛUZK]1%IېՊ \dHǸ&o 3naAKoNb|;@붔7i~qR֖8/SR%m3RWZo;fPM4`롽$_D֦4zd ?D*?*cJnV_l.P~bWO܎3\u]$ӿ lzŪꢳ9PA&1|%\" %2J/J!f-25x| aAmigaBE֎!1y4LhN-xZ5N !zsDhp Z5a b)HLXA*ZU w]5Z\փQwgvSƩZ[HZl9eNl2_$ (m~1e5~nNd7Au~+!(K&!XvgހUg"W$< G4BP9D[ѲJ5Xܶ%`+_˿P$*P5kT:0 .9^ۂ!SzgƖL^ȧ]a)⺪'i[-^oPû7f,\~wV·hRLo.`'CFEȫY3>Bm%h&-( Wu9VWb20zg^ {z藦>bꖓ"wtj%>pt@xdNԜ8 t7OD@Io( M,WqH@n]de9uaKmg.hC[Vy.;XkW i>%V&οz)hxzɏ{h.=i׉HBӘ?WS0 D}>;EeNè&%|a,rk bRk2~(.j-i6˜ސƌ ?(E=2DCW_ v(eb>emer߶0З ,HA .0(rllYi<m+~N>)Nrh".fF UxL0+k>㫕0͵{W|3>p\v|ԬSkfhCH}LU\,lΆvܘlcsmQhnMv"vDP;7_!9pkSS?< xHݖJQ9 [ :M-u7w0;Gt}жH)H?COgOq&.53q'Cb[ognN 00;ӉҨ)p@eC@|<~7 p%5=FBTGerwE@9Ǽ8vzkwޱHfa4QF59Dgv6Yn:L?7._W N#:|vh'6ؼJ3z8\?GC hgךq/ȯ ĭt7Dv"9dN@%;U1JgįM >) ݔ00Yfb(`ΦkE8m l1!'Oo?a[Kns<+N<71 }Ȝ;%;Epez&2$&"l/n8Da6Кz'hs gp-`(hVwwaV3d>,e6uc -rdD ɤgW9dCAOL f5fl:c-tS}hqZ+-% =̋F[|9oe%E-E[(Y@t[#Պg=@5A ╦2Hy 9}HSX|āy>^S|+PwnuϘQvoLՆ&C^+H:L3K଩4-#{7<^ +bl$^V[,brDCݓ|TNa v*$?dv.v$_-%0SF+?x+̴ۣ ˥BTȅ:ɜ[r,klfC:ffҩ|κ~Zl y2ҍ 5{17zy]Ђ:hyS%9)Jc%"`浼܋j@ 7Xߦ8 Ow_V>yB`.}6XP"&ҢBl3~[5D^*)o!@"j)z36}]%6v[nw,s"UpF0,p7/!қ|$* Bg py*޻WAai EعƁaO7Z)~^Y^Eӑ/?pv#MJGIDEXl I7$ekstFlW@@V"ŲHpOMAD#QN//ձ]%l?%Nn|15͝M~zc$ !EBK?u:-@{$#r(?犍ڹ,©>}r'7 [3=^O57k 0 *#bdM N?P4HP;qW95IEZ/~g{uGʣ4ZѰ %1n1JJBOJMC٫ @cL1"&<A{U&$8zH8=̫ l2)-GhY7%ѥjp:zŚ+@ZGųBv^s@ftڧ _;.OI Z|GYP1 0p0{}k@( Wߠ8"`%F8 @*hGJ){!\)C /;' l"^_e͸p=؁pIRI)T1j)m$aؤko FոgH}-i7`n(-!rosQ ++@Twq(SC$C$V&'Pm dBl@PLf'=nYwÄ5 G W!Y!&Ӕeu6iT5sk̖TwPa(FSZ"thT3^M(,jQ{hWn8#i8߁K囯~|*` rt E C'F؜nL-[+Dgg(.%j+ob ^0'1ˑ{3Z }0b{Jy*|sb_,T4ƪ@p}>QRZ 낉lMY!WAY.9#"x`(ܳ5-(r/slAvb^i33Öcrevٻ6IeOl㻥AjL{H1Ns0K܎cHQv[Vye@><0ܳqwYo$;#Ow!X_iC>cV&#A]¼ "/gJxMElI7G?s huM2х='C00i: |/'7ʢ!N Qdvwhe#N. Cot]x֍1otޝ#Vo"+a+([.~`^@*<-$$HnC[BBPk @2é&]y l9{N&hzl͸72w@Pj77 2uQSJOփQ4/+P!~"2"1N<=4|!'lLLG/>)Xܬ0ݱh]`۞8@O2.P3ZAbV*lfVMTƕ̙L!vեz.KzX}Wf`ȍ9%͉S:x9GFjܑ:L̬WkZ~.M=*|GRnbgg^kcN~k.irshRg<Gc K&o_s~NiM툼۷ 9J" Hӑ=6 Ɩ=Bi|qe1^RhKIaBhթ0t&hq~&q: ,VHҥPd'hH!ɔRxr2\x2*Q2Hm;Ǫ>{Bg#mY)}7tSQ4s4?Do+ց T@MMBs0JQ|4,'  S̲nox+$f}Ex3BF/x|?Qt֪mmޚmd”Q 2AlZ 6izr>-xf /잡N)'>s=) ʨx>T7|lt)=X٢˛eO% '|u~KK#oAoK7RhRW J?׌k \ү>m=@^M3A0}TmD#,:$XH5tWA_j+<;:~#v%gq}DּSԁ%yE(l3_l<H=[ ھ:4msdVCގta$I#4/<2Ƥ̆KPN jGĖ!F4!`#N5w'j<"<(0~tƿiYX/Hm4]M,fVvʰd+ G\ZAEiqB j\,0XyeԴFvŸuI '$1 :|QZZ1fjR6w!T&[ H숀FhɨvcL*&ڐg%2!#vQx䈵7"ښ;j[ż)h( 9vm̍Y is b(O[OXQz'-aL|67Em"14,4}Z^jSMgqFsv?" tY'EGIgجv#;ŻC{bl/~ptencyDeu)jw{]V QB.Rr=pT3tfuQNH*lxNaS9H`.J!T=w\NWTO[nZ-YaƷ1W nE{dդy{=0lPV ZO"KphWYHSm=? J[ 9HR혟NR !Y~ai>Nťy ($'0?dJ1>>WA5f3.Kg,3RZzo q *MA5ih*hz# I\5|'I,}/".9joQ%|Yj݊✹ 80Cx"`/l0?&!؁`1k LXʂG>Q8L9SoqQnjNX#s~x?v4ZzjɠTҍ<㈤2vʤ[[|pIyUדݵÍӮ9`-yCΘ;3RP(\GU=I4F8+w<-Kzoޥ\C% ]7q?1찁 S_M!Q?rLQi?c{r!o1VWeӇ8 Xn6wB/ k?ژSָ+-|z{EiCqp ch\X`df`h r|E1<҇k2pwMM"m Z$Zc]'b/d;vѱ}/w&(Q4$ Zt~'ܡ6"3XȪ5[硹"v MHB7l*˿2"x= yBw" ;S-7AL+TW&X>wuIܚSU[40E`W޸u,N^چ#W_z2R1mܝhS̿3΋왘"UỲwfZe|ALDwB~cq ~QCۗq( K>;?=VغVCeQ5/UKOE=S'xWeoGo4;6&zq𡽥ϓAWD$ M5 ˴JOQZF$e;!d bюbƜ~[5xs_-:5n"IDdQmGȓ겞5s7w9/*iPҰԈT"(PUx4ia $n9 Eɖl?φѡyr*eVa]lB3 ~P#Nkj*Gܭcdٝ0ܽ~{<ߕ"HJ@5}x?n,7WF+g}dMes C{nc֮c*ױ@ sFД>XHtl=n3EN AS7W f ]W$1 ) 7r2n =&q۴!tb, |8v`n]SKǙ(`n2SP{k` ߩpΒȖLֲ:HbkЕmȏ"ձ]?AVo:,./!tT\8AWBy~{T˚ڻJ.AО+i.-ҧඦ~G+b /JY|9 |'1Lr tH7N ȃ9xM1^s9G*?F%ve˓ܷg;#d E~^9Y F.xPwZX7>mJq#;7[lx˚'x/bP[K;gn^sc} \)gbYܛU8 L3`*U`n=MdFOt,3o ƒ$gā>I`XZjN_I׵XHD쫅4"&{(ue?4\!:RLu ^}P\#i QDTv4AAלڬ*t{QElU<3qyp͏Iz,wlYRpxAMPjkdg)XJԣSz. a70^)>Jd%؄Q Q(aQh2;%kAp0ÐZZN'mt'sO\tѥzV5S>uIy1Ö ~ѩFܔM5D=h€ nvIN 1E@A)NeAE1w*R?~nIzBDiπ\1eAMu3Z6YALvyS s,lL7y?nDOdL5 rT|L6Oq\:⻾ʌUY Q@vXFwϻk'{ah@^+ 8K;^M9j>&رĖͦi{Uoպfu2qp1zvnK4@MqT`;t7_(퍏wz*Uێ2h ~`'J2ת?*;nԔCiS6DQclW) { \ l@|z^ GxÛ,=o~|ʤ#$gjud.7QYpdE۞|ZN UHAiF]9"I6}"@8I;?^X(k#4*Oǀ5ס2aU' V Kc=ǻr| ."z &3-4u)c@d:Bvi+^G8)>=v'MȽUam+w9Ap PJ-vg"Zy+[װ;&RU{~;i>t-ߺ`|hS\]#b .! ~0RsHa +y$luJ8wWxF y'y%N4f(!G4V@cHiՒjozzwO5_^89[ҵk_h˱Dj^f-ɐL6Z|9QK%#7r8OG^pzrCQ`t?fVEl%﯄d"5Z Wɝr|r2%[^|;5Jqt-Uw^wYS\9C.=Dtʫ^ m4"~YY L]G$SRqeN95\g*j~}f*eHڭ.O&W?ՎEO1u0Nwl4mI>*8KU`ӓ1m9Ye9 S˯O j& =O>~! J7!^v+ۛRT8D)9Kr!lO-ZIhJ.W\ Iwz$љ YLJz69ojB~\H 5|j#4>n&S22^c\M2iGϸz>vXid)bb4 # Va'-c!;sJw4~bJ#1~nPaI_tHaҨ|M+?U@A`3[R/Vw^"̮4gJʂ ݱWCpjڷ xb1.'%>$o-@/ Ce(N^U|kvվAOMci9$2|ʭup0-us!HdOjv 9z7Hl#8r㤤zd#yPnM u,TqPD*z'tS͇u|Lg oPG%{_lӯjZ5(*YC3loRSoe6 #;a4tPC@5}qCE}AH>8`iIC8u^J+Ze,[r+ڊjgC;G9f֔SBrHpt{T RDQ+Ȕӣ͌ư 623cb+ce׿@olؑ_̪0z瘙/kIkI~\ey Ӕl Mӧj^ߞWhוiU5\. |M<Źfv-w6ˊ94,L$w>g/) KezEچE[H`F/yAh WK1^ #$ꑁ"v!fWbJBH^QY1˛ xEIHt˛yY٭a5t$/0;Q1BJ)Hզқ:¿hhM{˖-LޛWqWxE}aE7i>9mޞ-<򁹣ኵ_ gwDd.ܞVwkf|A%LS6ᄃ<)B7,!#nu(3,!X Hw*>z:=.2Mif:h Fell^3a ^x[;;X'n>P"eo-A'c.xAM ò6cm^/oD'4Ƶ}91*"=+OoR6+H8=qd>LZ! s]8K9y[0I~S06=ͷ_RlX@A;Tw$Ғ$vCɇ7Jvꈻ_h i3S${iD jI9=%B~K*xC4{N7d+*U͐$G]W b> _"|n ߛKAv<ƙ&7[T0'Џ\w+iAx?P0 #]lun4^)LDYu Mӌf]ÈX/ go(H9{W7DQ䦸SU۽$#wx4ޭw [Ag`0# M ro=ް*+3W5iw(:o|V>Ai ̄W9ƞ< So S$}{Sq43P$v"|V8u l\qoՌv(qgS0*7;KvT>|j]=\Wh/$%Gme/WӾRevH5&TzկͲGew?BGX1t:HH3svB>UDSp|:Lt2׆sXk6s.>;W:%*\PڦD Ƚ\ލ׸JT^Ά>=; R) &4Ovm1[e6`yC4)t98Id[_Ag='섓`s]xS@r&P 1+ CS)AVr Q1)sk{"E\obONhhPaS7Jf|75_٬w4Pӣ5@9x \btg ɡ')J o\V5My13y>7DU(OhlI|m-\<;*1]^2҇`3S^+?F$6 e9U.ΗɱD|Bn^\\JO;;sԊxo1Po,&F#jJ<R WhhR[ MO1~%eYmMmJ`4$X Yln'5HFЕi O\sdREU%X53Xnꩳ*?2~Q::n6kw6 i*+]M2giʦS)y}fgSTbQlW_U SvҋP= 9`x 2YZO}c$Ei6hgP&L ״1"ep*6sfaItj$ulE X?KV0 BhK| $e^mIs 6ql+^%o|vVQ.+w@yf*{[pմ] ]: v.C\?w+8=45{ LvvcLmM%mt/Fc՞vF'$ w;q}_ GFQ#E`z7Tc v% p:Ő:rCqH-^iE "JC6FLscɁ̒{^QI7S /a$ޣ;Ut8M#5"tg~Fdwʃ$?q3SG tbzaRkxx> t'(^:F9fKs{/ijvg"Xz*YFb|8ؕ]3I DՆ2۠wnBZ*_e 6OCz)p6kClL^2$[>骽W ~ k]mTĊ.DIlz}^1/]QT<ך[hMA(!xansa3d΢X4mÉ4fuϤ5=ˍRTGd6nP<C~HlBӠj7r ] c:HRdM;=47{Л6GG" N'^G͕zP{*AuERv)꧱hgO Ɂ`ӽ%tPaijt>ƦӤeV ΁ش*F}K%0qd\z55@Kc8*nwxt[t㊋rS7fJ1$o y s}SŲe1uncaGe!FO2 bY*z;Z?`_KpEOX-3l7$?Sn>y;ܯ *m551|yJt;UN> @8e{_$}Q U F?GD)!A=ɒaM,Jo{_1Dҿ!˽2X/˰d0ybm:`ְ㱿oWy\iWZ>b| ( ann&S74o`yNms 1BыU pL2Χ͉d6#y)ΔGN4ZG'yPoSU)$;N\a}; S{tMhU7D!:q9쮮{<腜_?yAZ"aw ߝy>b9!0K9?ُCvJv ns_PoL7JC{wЏ>~ψRݦFyvIGH>ċS7~1ȀT~h-b .A.vʌ6W\k8֤Òhň ɛNQ̺C>…*OԹ%sR.Ұv%?jp78CMuPֱXla,ןn*5CۃX=:i3 +cd8R8śF^k3?н lScq0zZqb݈qFlrVsykB"Ox>Â;I439u^;#p6<Рt9f<#^I("2 bHc9UatݎMDjw4h2H|EX5ؒ ('zbFZgM0kfkn@i IO]&]+>,UQ4<7 0Z˩hC([3[L^zn}FYl&?+oh#wh̲7s"tFA~fa6QlX9M #S)BFW(+P8ĝ##^bҾڶc7j'Z^] |m4+`"k=[b>voы<6Uox)٪+*\A^nR&jh)pMexzPi!BU'Lb5(_g69&*ІP 3j.M'=ϗk/LN<Մ=bٍJn;|`:8°:)P;@SG.C5P6G6! 9U*|[qtQb>x] 0 M,ob߇+kۺI]NYfNoMyv pq[<Z) $ IT@ՊWeBv%dٴХ,GdzI,DŽ[2%Zr#{P1ImS=gݬ+]2S-Ed&T×NU$ha{]Ð}+8d!ċ!\H?֒7ID%:] +'\_/o̭\ ѧp0/`6qn{DxߧaDZ.Ү%ªd5R0fbgu%1w[\3InSLGU-+voCwƼgU 1yz| Q8h+8^iHE)"D H9Wq( ʾkJPKg,8xy?!yni/iЏVgz8dPs:L z5B{ίuMvT< %M3N:MHS y[m"_NU]$;sbQm{U j+1-`oY,JIc!.19<;UU+i1f3ŕPXEZƅ@hq=$k1Q%sHEZ tI+mNj[' 7;}C7ƙp6HP*/S }HVkrVn˾< n$(bL E% ).qDg05ZPV E턚~3˜ +~ #kdK5dٮ k3vN)6{az~"f+-eEaѦ<9~g"ARxoA91]) p: !JMjhԏ=7K?k׌̏#%MwϥCԎ0غ1\8bA1,&zQdĀPO3Oڟy`<Fe[Sc#ޠmqlBP Yk 5m61EYjϚmp!fw՜> db Aqm]>8&x(CV< ecZ{f/Tșg=q%m0WF quWNu{^}7R(L-^ `XO^/a1f=Q?CMjpy䦋'bࡹ'1T}].Oo 1؂cT{;ЖAh1Db^̶{y<ˉI5~#Jt.^$s̟ ko146CyKGkk`؃Xj֡H{LSOΖ.]k`xa96 @+ U{)y1†>5@$ /Fv"9Ɛwq.99[ pZj`!'%x :)j# W>cM˿>>ǔTԓ6f0M|Q7y!W7bkVs<Ȧ\2_795 O~TyHYDԂ- atv.&Dl0!p>wC_O“% )ym_kPvru@vPQ PQ Es?짜FK\tqDM(B~9G2u;V7LwF1Fj"Z"!Zka0KPDgW*̸'TըK+ KFsLNZ kR`[$ =MZInW >9Ŏ.h"v TġȲFmJCleĂghŧ=Kn[$K35o+N.W\%Fu 2$T{fҝ%EB%,o>b~ A)&7*xv|y/~ f"U;Us[f|y}xW9j89xwVSN1@ƧK j ,oas:A0^p D/z8vSOgAvuh/N%-8+6r-cAsA_Dh_;6 0$P賀%a>noRTi_tكx <:Pҹ@'Zvai5p"VX0!KcXȴlˬe>X>Ȯq餔Z)>;"bb5?5*Ih7d$m;[]E 2ީ+ǺF@ϚO_/0mVG&43y8J=TM!_B.V!d/B(aVo);.{܅08g,(Yw[X٬ʃ-HY=Ibee#TdO5VwVw⬤1e'r>N bhVCnu@]jh:C,io/ q L~ {eR-ư #50玺ϾhwEdAŧV|j( Cg'k y,r0 ^Wnj)1MO~|XO7N<-i" V;:/L.BMzǹT/E*#ԥ1=q5["gߤ^%aÏc*|Dž|Ӗ }yvK~?9%Uί#'Xu\ tVD0PQ"+DSYqvN k<@v~py݃`E+AkA5Ѥ^ÁYLQ{hEwd?kZ|F~Uq26 EL BFnd]Qvulam=TzBu]%}ə'QYm,Eg;cHEFqv>¦bLBוKcDj`k@:A7h5: ӝ:TշI.S0h3e,i {6uYi=ߛ:STS\@:& ?pL`uL4S#W%P<7ɬik_> K(Gѷ֭yV~4-nL35MYn4Vj<8Z}(I̜8]CrV~R/2w+:ei )8Ęif(e-,@ 2½+J9KjVM3<831Mm dT}HƎӦۦ2JG {H0+^mdb8/I-^I/N>U?& ɕj!h9J?˸X 8):;L%#tWZی6q0LrL33-,s/ēGŸ}]]B5d5&߆oLFVa!d znbnI=ֹO瞻zX㜀 푂PY%o [ dմ?+8VJ,#_~K~T:W=-:}/earY "sԼrK([]OӽSRCJ(/حsуbw?}{+{So%9G6%Ql\^o2 7`$W;JVV1UX )'wTk'} ĥ< us+d2:qXi-,x3 Ռ_1H@t[ll-,B'O'vhiEa2N]:ߙR큪 X*8 (1[S'?(IrI%=SC5M'N-;횪hsF:^K0(8$z'6.KT6C58?Wo;+ Ť/ gjdeioyk#B_Mi;*-{-Y;pg~9-RN(cf3~d>*&Im/{ePTײ7ݾťک4C%' LdrN92>>Sn8^R''FS;r;Au\{xk[5EB[t`$BX?͹ 죮7䰱 |x Pa7~|Kn"T$4U?27%Ñw!m ՈjG̈;4WlSmO>Vޱ=9)_uml[5TUjlm{}dz9Mܺ^(g欷ިs3É荐n%֞ ̃İ#ɠkYR:U3@{@gZ-ōTio\t|5/6,@fJa7sܨaќ;钡%(a`>wYoܣ k;ch/JP{M-B3Iwغł )#}e2nmM[xO/pc?؎ӎ7dP5W^(r1PWJ fl1/Rm$#AF⽡Te|'c#:$0[UG9P@s|d}Kaf^pɘ qkD& d oyꞘ'tfQ6 ӅLHg*/ኀ`I_qPJ?r_kd}FJ5Tx:{/⢂5a#EGKY@^ BӘ,|/'v>J (ߞ ,Ӝ]%Pkh-i&'eD-"ϼtGEZ^Zo41̅Iu(q4Vdn{ ]"݊4pnGR_hȑ 4z^Xz! jѝN.m;$D5&No='I!K[hpL]=ߖ6tXM*^BgD"xxxR) ImU[(*-9pb7L4+K@/Y T=NH"7ϔX>?JЗnH{,~SmH0U9l?ދ1|]Lp:fI-gLfUaL0K Ϯgޏ" HuFL%h->SsCF\0Z{ _mUF[wf#iL}<!U=9A}>d"hp@eLoww]0g‹$8.-/AlMDMg~U3ōEXnBǂ F;Ai[kⱘ7 Kjl'.KNUʄODj?0oсSiϩAA#npG|3T8XZ]B}0 Yxhwu-1# qHQ rp$f0D+kRY ~",Eݦ}(6NyӇ vgU;^7F*_d"Y۟+3^6LC釩*:?[]k9.M?f98wڎv&WFƇ>_qXfMzğ~#Wx -tszz"7L|_ 8(J,2Ő,!WTmT3(M`nC٧҅ Y5 7uAЙHVޣ*>?fReۻC773FIܖ~!Ne Qu籸Ⱦ" t]|YGa{߯;[!3:\. LKpH!x݉I>?[a 4i]90:W;p$3"mOc,R/tw'MnWIy,'"WCmW(dH4!p}."ƜU=pSb^bL-FFg PT9 6"tC4 {U]@cðf1:L1w4ҁ  ( *,f\j:/P͠wp2 9S 0C aT܁ב̋?Z  hw^)Wmm}(dkM,E_.\&&%6 ĨO58Mh5襭vխd0fĨӉ_͋p4w\jXs/ 4JGM:ܵPczfv<-uƩ::T*ߔ\GbC|}~ GrҩSNExImsSP |M 0Uf1jݪh>k'U_qzB+-:m筃Խ+)X'eԏ_œ6P `|4?2z۔`$kܥaڤ4 4N|qK-Q.b_,傂z@XM1: r¬ Ɔ#sA{zHUhЋ($r7}¢vGREP*ŵ0 װ|G+VYIf:uHh+ߦtĬ eʾ턜~>oL mJd>4^K`[ J.݁}\cCpI"scWsji*Z`2%RX0"EGO:*ƜRE[HMCj{BS0JF[as޴Edi%D2R.q Ӕ]>4`.';5fጻ)whMO`2MTcP4SDAcNa%'<'$E>$pBd{`):kZB lJjmց :Kiu΃ 61q''Üa'1Jc[a$K=$# 2pBgCR:]STq!r}TS: aRmfaN3͜9Q5dT>|Z+vȵ!P{*xg \Ld , uĸo+~V|JC@S Ee^!RW yFE ^F;dhX*98Ϫ@b-,C:չh OL&U9;Fcyϯ[ Y +?h@KHߤ0mi@6 WxY &N[b2o ni*VnE"qE$ l )V@Z?{Ri$.Bsb0sں[jJsIo42{GDlh[|}ReNЖ˖%8%^%b+9iW ?91;[ҽğS|9C&4?&߶+eFyY2:[!G}wx5l 5MԨ0<:|5UvWMR FQ@Cg/YP~ yo? \99r"A{_Uso~4eUV,"MXG/HmׁtXR@ϯ,}Ry)gW՘J'_2;FTo#8-'~(ឥAX5j 2\RJUepm؉I|o!44q)/=Sό7NӯFGEO6ӫ9QhLj3x>8<em`}T收Q'GTЖtTҎ5X'-׸xyzi}W 9Y=9tE=8]LP[ #7k%Ri*\%',2p+/qy$} u/@ێ{uYBw>-[Uz דxJ)BG)@UB/8 WFF]}a[;^TAog.JKd"{+t>=!o췈[oxv^T\?s;І] [ n~T>kW؟),g/_u]ΎyD?e }ë2 lZU^UA}VuhB 廠]8*.ȇԮ `htv7-"Cv6G1RHGv`fk{7lU빎_(#?-+#Q ĉoճ4F&#N\,tgkt [oH_ev9_?8g} xq>WMғyb}o[ l`l hMDvshMv-Ёsb%xFn% KR~+60NҟV΍v*xYyZ;$x3%g[a QmP;SgB~To ȩqŠqg6=ظň/ƍ){ SS@_ދeWĤ&yچ*kBMuG7 }0Ġ]ueت Raj;gͯmnʺF ʎM"hߠ`o˗w(RxWmN)0 .||ԡzd|TxDE;+%,Nۮ׉]H< m % eu4c>l.-a&Wkx!]3eC&D+IQlT'ѝ/)L+J;cTuimc {MR=EbW:P >U j r¿O %RAE>Ȱ O[JkLӤ'+»6gJo,eh#' K}mWK[BbB_BvCf#?ä9ÅO:9ܚWbg͉YʔMQ (^F; D=InېZ3êI;#Drq>.Eym,_ZiWHiRc!>TҟBMɪ7ܪ-f?2n놦BNjN|qU&^,*CR7Z.sXYo[!T0p'>w E;Wmxf."nL~aMH%$?6bX9[ZCQ\/m"^ 84`~[nJoL#3#AY1Q>Tk0xhR~ 7)SDO(^*/~Jvbn{fY~NɪN4uU㍽_k|2(-?!F T*NwkcfO_6;5>ƀ*k)*#;(bz. 5JN^,N8]A[┭A րJnηe.Z3*g8V45ׅL]1vIK&A>̔:[>a-Faq_2n%) &\_oy3r¾#Fi͛ ӑ)EmnRr>&oץqo "J}ު]lEM(1,f$-=b:*}rS\ 򉪰FkӢ̣}w޻Yhܛ8@R`cb /KaʴBRpsW3T1a!M5D{$BcOAS)>fylTaz6ӫ]$BVMbęGL. Rf. 1c#ɟeT VNIQh; n5WY UX>o>s'c %bo4z:W>fFDgܘ=xJ!Mҟsp=_vMMK<(8 qxy-Cȥs^()7R.1) KD?A@QA"9UP $z _(u9<׆Xecf1+0Xr_@@Z}GU*P} ˗E{%#SKe#̟瓝CjA~sa bƯK ,KR(ׇq;S&н_y* RwJ,~EaDǂ LKn:tnN&p[2w@XȶZt1Ph&f ώCC[XGbo >d^cV^iZ0HJ[L9?:8/@P᭵wmgC:`{jd,,G'Ш)g6GΕ*=;\5UdǤxj570XS F;[d#ayk|@$BtS'tEjWfK̍X2m+0leTq#ON:}v^$ v|mɴ]&~ ?93ٺZyDCe~sT:Kc!kD: ObBߚ!5ym{/C{&V0Е3(2\݌ }R^D!ŹCϐ^ZN+qV pJjP/=QΠ%*WqݵzSs6ViNۍ&+熦p)iԼ'X ],>f\Qփ0?|`K܀npe) LM1" Ȁ$T 6ؙ eʁAL~nH6~X)V9;wsC;&J5|Y#+5[HFr-\u譃"w2sAcQVf$TU92c"ip)J(UlV6J&$R5P Y'MLI|#!! Gy>|JyV`.*SL )/̣:yQ&TO's8u7kT|ssY5ʝEa'rXX@N7&zwF_ól1}IHPa<7ŏD}1۪u ֟=;eJ 1t'#4gRZ]>b[8g`#*&lײSːǑQY  w+ ༷28R'מt8 91zD&iT+0*d"(KpP! pmF;8ZPFv< &E*\$ư+iDm&pYKdZ;M\c'aRNU]6iYI Ace5s!3fRlT݂ιBBo dB'BٙCcPq9 (u (' ˦čﱸ7Xu}9Ԁ'kVb 5qހ<(-BDDSZʀfϽ0eD 3o(WXϪ|XQ. `oWH0E:x5G\7'1lg9+I mwYp3f7 476?'hkgv2Mޥ/y_湍sȉGa'8sSMG k5n&`5٩crG}?۹uM7F Q >aˌ֒'(!R|~EfD{9"M_UYS1cc.Z[nָ}OE _"W4Kμ:7ͦ~mM2[1"j;rr Heh+Fy>rQi+`HΜ7D얪2u* ا ڣҋp-doWb|-QP2`mJER3 bkř!Fcgi>2r_-.Wull`TUԸgDZ,j/3;+-UK_fJX`5d?d:\a^J(2Pw-3տ!s$#Զ~aGk`L %.G-JhhN兾2Ek,Yh*LAHbU(n2']7.ȸ+K^ض ]"@sGp&=X"MڡT/k^uO'W_QlUJ%/n:rJݶwPc~WÊ"Do=d&֏(oLҟC2s|"Ŭ #€[ W/db V]DU754 6XQЛfIG0"K ;Ŀ{\qQ zEhϮ큮@*~eg530T_:l^kToK]B !.2F| /XxʒE]RCbr:]i6NAo:v6̒[pF{7πe AD>4u)GZRUP;dYk2k+ hOL#P~ڏMZT늡.0e_dMn Ö мP]ƨBU܈I?aA:{g,(T>r}J@ZW?%g0\"!J>[>ت[;> oQaEwJ?ߜN]s+_Ej̦žlc sXiDhåC_1]ŧs+nz5Wd@`ˁL=[[:eAui< iY7 9L7-T։hKXּ {Jk3ס e{.cb-[s]9U+EjӯV6Ccs)#NX[߲ %FAt{H0}KVťH.X: CG7Re`Er>M4%C1=Ui%QmV4uB3:՜k#f!b u^lxdlr1yA~K`a Jv8jc=FJ _ ǮNk"@Uw*$ aַÔBf;f/ )M1xDS/ i YRS.Ao3$/,1Zi<k)0]zn|oT^ro{l S9&%\bJ-<2m[7s/ұHjTqcr\"`ZlVhLOg}GhI\ ܛ%ƙ0>To0W4QEOgeohSRmIR|AyF`J:IO_%s nPPz/p 4Ͻ:Q_xZD V$1*&:[i!?+/uЇ7(7TPN6tD}Fhu|5rK|v1>ڕoPPSR Ԟgڳt&b0-D{;捪u;reMwܡrFyݓ;~,-ђ P( Y,S@ R?d<rm lUfǫ-%#78w}Au;i ]JѧK1~< ]`QQskÐe!^+=}EjE%{cAWL[MIZa{'8i`g=̍t>Ɲh8,q-Eh\#ẏt&#C =I(МܼB*(Ng}\j|_T!66ݪ5yqkG@_d5RCYXo;i#B<社u0S'QH'rxx v2s5%nl%,E8?RJؔxuh(u>,,&"̼Җ;\3w,F·$娡~Z+Ja᷋|o'ɣ/ƵgQ+k~Zy'z,nX܃NBpVelN`Frq[ +}-Pĵ&]eK 럵 &#IȐ_CriJA]7zUd8VfHMw0 2am$ऴYo\/y! 1䁯u$OO8MW2S_=OrFGvZfYska(2e&amsRfi+lne^~;I$'"<hզЧ(Y¾Ưf%BJ3cjDߌcEܢ3^%i1E]u_lc ۦzL=QQw{(COXpdvI;[wXqY Wwb>,Y}8LwþH1Bd9ZæxtӃB8U&>UmhD6n FtzC;J@2e1tsO~jN0'Hu(cK#:IKу(MKL|1*0<<{?$&pA_$\޸:Jk=dLզIx)[cWbɡ0þG1G\\!U0XH-1(Uܥ R)`d82939%V4CI oTuXGjE:(-ՅYshl4dT--{YqP62#ĢtdAWSJ\#EUI-<6 ; D(V|r00nMlA:+4Ww](D9(U5s9S,lkm!_ܹt |5u]xܻй BJuƇ] !Im-F@Aud_RFVf92{8zw; ۫a&V ڃLDK듗t;x5 #ɑ>B1(+G ϢU~,+A42!$aXo]~w9w_t׎%ƮbLCK.@yNW(>*>5`VޝN >Q@ űh" J2 [@;)0^^ɜ[G7Qb= &倯tv !0}u8]:`3%xEdG]]Qq upյBdK^$;^-: ')־< & #%.3]Wi/Tش0eq)eݣ>Wl;O y~MDZ|6ZNlD9G߷݌4&\\23ٹAsiLOzVOs- 0LI[No=DwWײp<!êLJF~ 1 'MdCIhp@϶Y3w=8(WRvW7'vH1g}ǀ>׿ڡBq'2(䞐TӃ7k&=,`HW NClM}1Xr޺J3&àVLu] \E M.IMnllhIƗS! x#WkGٰ{h$V\-D)|*b{2+,@:9[ᱳu^IcA^M쌢@m}5PNrL3/^2==Z~RVrXAU AF c6 hiez!MT2HF R`ϯzk-@&%4 BռF W{TJHv\m)Y.OM-yTɤ~?]SjyLR1^@_j[Fȝ>,ιER|OAEI~1AGm(^͂_E'_6Y9/ABzHX$]^n"=|^U;p+0X6yEPp : mSᗳ 6k)XJla ̨9D3:g)-pṝ q`!9hf.5681:Oטƨsp]ڿ| gQw}U@ڋmHB2w <[#ʃs],2Rx Zpϖ8wAT%! HP)Uykvu!/c0|j4zC!juv` 0B{w '`9x<5O[9L [poDbܳ!Lj IQ5׼!PDZ' F5~V 0ae:9I6{wNgH(nɜSŗ1&ߖsbW2`%r==#8F~c %!H0![졂 q:Q7^v$pߏ1A ?>3Y:ڗOS~7DQPAF)M.HRWb B%j~!ȧ0"Biߛw:5#r Bco!]Tt֯y7H/IV݋.\n8" 8>;ʦK]K>ty1%(Y:9Us?ȳ0+oJad/șۣ4/448'ߋȻ6k)7FlK]N} zAB?Y*;} сN 1 ˾3/uױԲ5-X~{2sC)QC~ͤk5tu]ːtNU:-[ZcPU)h[TWmCuhW0+f~(r]75w%9Gv/^H xav06gy>jBGRg+{4Q+L+ɸ%Ê+A+ ׹pmҭivDVλ_̫96r1t}@o v #Zz|3OP\tiIJ.N5GQf>gΙ5qpwPumU%%Z `n쌵N`LSVɓX,1Veշ"L82ZM.T ʏP-/#,RbbyE 3Ŕ؂ʡ%n20N䫥+םH=פn/0Q }B1@ϞZ9JhWك`>U$;p:l0\evmS-weԔ$I$D]s[򟌠1:GG"G-OEɤ:u3Ɲj@ 5|| OM|ݻз Z wvBNI1<}ޕ me3M )':HL7¢Z`̬= -x I*`bD V{.W-,]~Gk6:ې5mEr󀟃 lEgjʌ0$[u3Zh[}Yz:!?F7V儩Qi rp/p kd|i 3 J ֟8. z ]vˋ*wk}"DeumFbt3ˋBe$ii(ϧ"=(CೖI?S 䧴ak'Jbh2 l̙}pk\3n!~#J+P3)&"ǻqdx\a97ݔ.WT AK*eIu~uH0 輾oK,ƴ2?Jde0.goKk?&{e S륓μ,R׮4 ~1A0BE^S5# PX[{$ޘO'0@$u6Ӵah7 ;1[)tg=1WU|W,A$ei:My\.|AREFτW`i," q.גQ rnC}̬3]&Dtּ*Mz@l-kСn~E8VeI|Co8>qʜ\64> YP6 ގ|hٓ}ų]>jp}\dKMşP -ts0$vܓH9.:l(nZ92AIRc4z^U| ,XkD kbmAa|QHI\?0m 2(j, ;P^C6 ȕᆿ~Rr2`8.iś!˘Н\GA}ti$ ;Fk@pe?4.R\t.h Fէ9%Yq7 e9Βv7  x;r8V5W%pjU@- ^8~ebu,TSzeݭ!:˭?q3J%JyYc\H^z4H^mNJ'AYT&?"Uࡍu IAᓊ 3ZYn a#50#S겈Vj=s|ܫ:'W I =cThԉ_a=^EQj2\}\sz0S*AfG(5Uu!Rg%ɮ wU0n]ޡּtP^70^_]QnZ* L5s?xOdˌQ2Pj S<7 z[%WC~L9tM9{Zֈu&\DvQqgƈO;l]BQ,+cBwVsBzaeYAѓ nܡ!oos?Nteʋo H{tP  Uh6W$߱'+rg icZa=5q5s@۶ F}vZ8qD`,0UhO|Rc` ݟyʮJp%;Е a 4+XgSi2"5BŁX;q¾Q{G2s.+Vn/Yl8601 8\km$;7wGTϕ rx,&Tu'6O5񅴷zn9$fmC|.Mb܂x|!0 T<;ǝ85xgE *EDFa \sTZQՇQyO.;0)ZFR|#we z FZKGkOÐ&m5Ԉ..e Gks kB/,h j}5Z&n5A׌I\_jz>l/) fW~_ \*y/\vy|W|0Sim̎h|j$tQG[HU倁%ݟ3*q*]8ԾiS 2>5ºV5)Z2ȍoCf Mt?w r7#^a(Jq,hIUa>ɣm~70-cqe:&[&0--7hn!-B59\Q14htyωnmGPMѻn.PZkq6m9wQJ{泮@ iC[à@a5h| 8Axb֨w6o ߿%_s{/8nyU-8_^hEh=OwP:?t9@SK-;+H9VuINUe|!/d;psvR?AL[}VH5zY#5.ee^ERRE160VvHthSVk,+>[e7)r2/lgU($+ڨ/FqcJ'JxFt/\mD(\ˁOܸHBsΙ1ָF~smXO<3G—HKop߿~$g~m˞nC 7NO'VZFﵼ6,%.VHҽg#7UWIxTm_ԍ6I\p'wKС 5umN? ٢N61ݟa~nVwnXy{>J -g/gG&Ϡh; zN25# jR O+hMJBVw B;+*^1jhlGQO9ڝS}&s}Ig8w/4"*8hd)bߖviW&Vv ö{; Dg?D]$՜a=e'!F:i:IAONc v}Gl/&3H(ḓX@חBS/.߁,&wd)qS#×]t[?CDisFmYuOK:^Q鸯# '+\'fwE+O[ :ts}rc6UwfKNWM{wpt\_5!j8!V`z{+1A2gF#D uNrL6@2=WY${,e4y5&CV Fާʒ_4 lcV@o3誁!S}z N~]>|q4 #n#͟?LyF ]u%;R?l+sWš^W ^pGpw[@cm $"&@&$¡N= >MKΒ"xzCW=K`<.9"{ߎ v0uY  ex[%Umw>l P^[dN>|@a2e,I1ӃO.8U/L.h[m[n!4Jf W#k{F!@@ZN I{z\7A}y oL ¡ل?"iWsԍE y˶8ז>q%3Y4a9T!UbW4DzKcj H1B}N}˳hg7E"Űko=- |2EݿB 3zp8#^& ZcХdeFf.Td@{[zDxc297hN{[,J*%$'Qze>LYB 8Lg udpJs2c8FPVVʆ,Ga}"% &m"d 8A$\o8 ۯYC1֢Nm}״20T&*=7Cw _Rhn*hm.錪"6Gy_]ltHEt/V%  Ciz4)Bү0nrUpO\1UB8p!>[G/8iq)ҽ/Lx06z> ޷n!!qH떗)ϩNn j}BAZArƀQhP g@ƐkcFQSZ\[gwdqܰ :F,n*(r<"JA q:'a.-O19"3c=0ڀ$ܼ*jlMu1}Lw(MMuD> -ȊPu2 ɶvOl(7U6p}q.WjpނHBᷡ%6]&Lg`8U]!R@\?RW_s6@P&U=Q %f"تf̠mڜĝsdqbǁ>ۛ8--S?ল;ݪT锻*/.»nSw{NJќs,Ɋd?$d7uCik&%CEK!H^uPFERJm?eֹgi&qx՝edĵ`|#Щ[3-]$ߵҜ"5qHk{\mP%Ʌ(*3viדc<ӊMY^?+ kcG 8g^:ϸ~H& `i#$5cٌ!.%!V {N"bI#v;-Z^fH42=1JV}ˮK [}99*]8t'LD*A*-Ϊ<20{ځDYx 3^lE1Pp]ZE/9IfZPDcSJޕpUld0y7?H†-/S--GeO-4-ݒ-WWvlڇZNNqd<XoNS-I_lV*3ihmu-'vWf8*2q: ܩ0nD"ȬÄQ 0L15`!("fd$kFBrVuCӱ"]}a3 X`G}/Z[8EUt V0ٚ ALĵ9D]xw`K͂M\hpn*ga%CY*v/( V SڴL()'tUo:xzT+_%r5ht?.zȀ ps ;g%XZFްzc>UL ϯС/aɁrP?i4{BߜKk+Hns*1}O(f~>q$hɽ[M=Bk gWo.(Eh oIp:3LzuB:6eTvJԗ}X2b"OٰS*\ch HPpN'=,h>:fY>uU Wkz~)`1a̲:U,=NUH[[{X8Lc, ͒sc$rvuvg)qU/>k3d <$-gh+|XpZ WNJKZ$q?G4N$}> N)]]%֝l)<\E!<Njp(; ~*0QQY#x)B!ه9!kC)Dϭ{E񕫻˿5etvva}:_+.PX'Lbu?%A %X.tD{ '԰Aki[z2ޯm~er"ދ;`n0]ho0z3QY~ǭFKrKE)gi썭7 q{놳Le A{~E9%E4C\´7^']r=>'6Im9Ne\# >?EVnϱP\ ॊ9#A1nkֿhQ8[\ˊbj mGԗ쏫oa } H2, հi)PpC{``\а~)födSוa2P՜hdOφN4E`suOniXCz*>՗'xyQRJ:ѣؼZ}b15B:y Ni\MCS5 XKO 6\LʇS^j_Oǒ 1.)sfx0"iZ+Ẅ́gl晨fi CW Au#BT7ZBͩ.4|@W),y ؀-~9҇CjbFAIx3"W $3c8uUY} W!70"M6\$im{5b'8֡2CAN)C]i:|,W|z#H _3Kĕf |t׋̏Zm@r,$j"[TMƶ*4HaG>묯?a71`ct1viܘzC3A vfӑ+gƅi|½¾`tF7hNKV% G2n8<$,F9 T\xh?D5FU\I \~.]u"~aN!?nךZ0 3$' 7/4f+JRge x 4M4ԍ}Ȃ獓A@,e >vUɵo#JPhYQd_uh601tM6L"hR _7$3Ehyi.яY&c!l˾v…^zN{*fXPnT1Z=6*w'0~<ۼl-u ^*nBu OG k`:"~ 1G;f+E '4i5Saġkr+T$?VAzZ(oG^']~}{3Omd[C)㹰*3ư+@r t} :x pVn*!([}#"i0OmY.d Jŋ9DZcP9Q^&5"QV Aj#dwܱ/jV- j ڿu\H5,J\#2," +ы]+,BX}43('qPO3p q $a-ibl_kRV"yGÂRN0 ƎwX2A;@*<5XaX?XM-^aEG~N~tL,jݯr*\dkW(Ȼ2DP*e /la-Rh 1[D+@X$eZ-NTE*o3];V}-?swq@<0ڕg-njX+mXV mLc+[l lLӉiN.fN EACOkJ207qWSWI+-r٢>e f`߮(2ٝ#C8MZa.x7In8V^Th`IV)\X^F iޤP0oj5@Vf\v?XO45I;$|[ 9Ȍ-!~&:Ec+KEr62LިEy_*Ef ;yn )J8`i:ײԦkŵy5ɭkbQu&ĄFp(f2bː 0‹ڨ\7ɢ(aHQa3mNvYQ)=8>7Z2!xfIb_~Ce3 F%a4,^ӟ:;=DA EK ]\:V$GKz-re~{mkhz OwEcq? ,Z>=Ւ:TQI> 5O[LT)qx,ؗXB; G} hV)0h[od98 Vؕ=`lf k$%hf@GD6bA1&|l0/V/H)mSW"qA%12O.2ɗDv'&:I~͎"18@Y_QmR9߭2jS@nÿW2XD|J~zЖ-g6AI{ao-rׁ:~ \ڒqjad-qbв0)PqC[G^[4 Oq ^#TԶP+͸ɴ3Han!kJdֈs$hU[OY~=6-ي6a9/ѻGQ=6c}% uWC}tGI-ZơÅA:V0 ̈́)㱤}/gHP5ɫV(3K RHK?9_IKrTWflϦۢm#Fu|*K2kyIkD=`E7Ogє;[K N[ |-;ț#>' 4Hy{ͨ4C,msEZ  A OD fL.XݯcBx~5]a ]*k bCa"'܄Rj w7iٓx0]:<]FxsԮtjTv Eda6{3nM#ԟmQ۵oSkv Eυjݯ7:d%P5IE~ē k5$]'!4 4EjSrW&XT#ܬ-WHzLsG | 2o7 :ȜqE`EI]fio{;s8au0jU{a%,h1|vaN;-O>WTkPryu[ 'jQ~2}>yD0ٶOO͢7>p:}JA~$A oOS_N,laI*dPG-ר55OuFM[#bC],cyL1\rM Yt an@i=Wqe& JmsCzDuM%Lzn@*)S}}Kqv.(RY"^V;ؠ} fcD%Yg҇a>Gg,D _ɲC ӺNꔲtU˿/YBY bƪ^eHK*atw,yTO}J Mlb7ZtMqHu]?sxT ,nͪCr/ % IU  QȾBᬓ~Il_JIڵΣ[xmZa]p'} 0D;X8mdv ,pZ6Ihʰ3]bs[$:wBI@8lS@AUjFB _n!W>em;^@4߁wEP;?m:&t)hƦLn(6!( go og{G/Qh,7,X`?blP 9c(,{H,R!uh_x#<71Oyt&* >¨θ3}@/=Ȁ#ҽ;ǰx+8Ȓ{;tBEndž+ݳ'8Yg"<yj^DBØb)$RE7C$۫o#&'ܮ u)S"3IbuOLh|Ƿֿ@dCLd` 9 _ j\*9  bQX*J[ HzfSN`ӹ1yI DcUs_MI/J ]+KTN៟y.料*JCzǮNVbCMmhlaԱB2h9Ѷv+65v;Dmn5G~|ʹ{~Foqm eWNȤ!JRTPOwa) YC!?3FkD>f=Ng_$(v:r1'$_2dg0iNO< {6rx!E}e ye!:^[](@I3qu5+^G+1ܕ̨l /8z:,,!aqpd5JR# }YFfT/ 3wy&?B.i.2O G ϨoC ݅R+Zybivٚc?&<=_֣!1j 杫h.Hpu:׀$Tmcd6w&S)H~{- T}hcrez3QoQҐed:˙ń3L72W]w> 8YtUn+D %j| 6BjC_'!Ywc6iʃo WH8=: :A3HjICV)m43g`]bf>hhx|5ц  )3"5Odh#K }u ZUlSf#*[TiJ<MfP]?0!qd%.T6 C\t$b blh~՛mQ%¡Pc.94' /N~ _˙k,X[/ C18)A$ ґH)Qu"љY,^"466J}] rYwҋe6*tیleMn:z1ӹ?A Oɾ#9jZXNgw aOj%iJR0u3%bT]&\QԮ^&l*CX\멗׺5W[+Mѧ*Q vHj~ 0IiGwn~JCe;UONVpWXD2+י*43]Q;Nz.ΥUuξpـu=h@@وYpM p:㳙Nڌ:+|9$fe;zjea4y#=ea >&HXTh<[vRa sMFZ&v̬m'/+z]%UK쮼cquz8^%k,p~š_;i8" ulw9K-|Ĭ\xU=5p˜qFVa'G0mXwǼIB4*|e̞&@; ~rs/RurE0L(B[Cz~G3b Ƕd*4;ozχ 2oro|2O;AcYw+ajڼ 3VtVf[#Gn8J6判ϵ 9?iJcj`Qҹ+v'Om^`#m(j>؈BIWT:6)+WlĻ2!)bCnAwDɡ/)s$/=42EBztQ47n?3Fa0Ú Uldb6䪬7g}b GJd1d2s-pzp+ֺ>#-k0мMߎn @UȤƺyUI4')S FV8R)5KaO\gٔAHm\tL90kϾ$HDR)?ˣ z{(|i!Pfxz7hbF UB@ފع.7 VB{s51񥀃SGwP!>6]́4D9,̊31CwЀz`Vγezi?E,K%L#o(\;ZsN ˆ~Q,5j yzGY(䰴LhPy%Hpi v;plKi$0biŨuH}*(pD:-40fvv!vz?SLVxh-(blf_(Ln' :6ȷJ3#eF## :>3,˞)|?8"mL%;M1?g>^&U@c-*0Oy:̽0A( H[rNzb8ez_r/ u '(Dΰ*H1vKtCޠ e aA:9hՂ7wU/ov5 򖪒l±C?>kĹVXeҏQC=ғ§h]2Ww\ W!EޣɢS14]ᘽ)g|W&A `K ^wPwy-ĂPJs-@S!~qCjnDEh5)vi}= 4}9ܚ]PfÐg;aK߂Ks}NϪv(߾Ճ>]A҃GX-N(bKF{dNtP:Ut2޿#1K‘v5ca ̻9}ګw/O2'>mjߪ^ۓg,WtꡘMFvaҳJGU/JvBLk)oxvX* 7sT0*`43bh|Xg (drcÐA :Hϖ!Uo\̣-@lvl7O;y+VshzLՄ֎b>a [cze>P[J*1V s>Y㷰[u Z\{P\:zhDP=lJݬ[ZzjB]#Bc;Id5ɾ$4.m"F M3s=I=DDN;) 4-:!k+cϐ-UJ<Dž61k<HTp{{Av@y-=gM1M7YL d?BO2R1m*\"{^9[?51Y. 9'd{wH$p ׯ׿. jBqNpL}d+otCO-#^0݂vh vJQVG!S4=34|.ykAfjmB_v?j;?|pqԚ8MC_MrtAԽ>y8wa4m>ToY us4Lq E `%f/-q5hwKWVoQg2ƶ &BE&RHgFЍޜZ|"W XiHF8.bjrMD깎Z>MI~|c f ;V@gRǒ?@$rqJ|4?qXNRm7(a ; KP+.\OK~APضaP51SMDn ^/b [[olKҮ ?yʊ}d8GՅ.xH;_'kSoDu0 3Q*_ w|'MnvE7XB^HBZǦF\F祝c>]f^9 n_Gqu յ9Sg+`e%Qtrz}2m6ל@)vnScWs39G i?Q_큤8M8張Db΁]|u"6}w[3AY?f0/IHzF$C:v=8J~jA#q0|tؕQb~`$yξKZ|F\g:TgZQ]"#InOO=G@YqDKC0)aHb{n]ZvLG~D8Tst}q"h{ ־8V[ EػWYP)L Hޞ[ hk; ZdfuW!Ĝߵe,4?mJiԆ/؊u}[ Kak}G>4P(}zVc`.U-uMnp[\~4N2e'+ zP }t9 uF|DiU>&C08.>GR'@TXav mn=.)mu7']qNѧB'I!8f_L;pQ0 n>3K:tľ] hQc3yQ1]Ҵ۪A%ݳd l AߠT:o摫2 :ڔJ2lb/󬫐bͰ-Pt5c,<+yKI9^5!Ym˾_ ;Y<Ϡ ?I]a@Я{7:̻bdx~Dz1dHѧ]0%AbmM({i/xl= c{!#c(cn&zSa%._;O@JML@a>X+A6' "Sݧ6էdTQ;w-SÅ!hey Y-Z=W!a! 1 Q'YAwa *RL^] IvAdZcq[$"qdjZ٨0I0@Ƭ K% ;Ip%j0P 6¢ۙ'"# [i<*Y"\Oez6RN;.eħ',{%56HYLԙl# :m1Qn L<[l_Dz0uAAN>s>n_TJ盎ԊZ N BP%^w4,+\ U/23o P8ٛׯj*|&s\|A]^Rʋg@tO4ACJ`S]PkRNiĶ!q#@-qWg/=P܆.3Z<^bDF~;iT)p %b2?ôVG͐^=U -vJG+Ƈa:a"2]teg_ͮrEv@́' ۔5А;Z']^?iYV?iE2F #(Ų;.J }ؕRz ~h"}cx]$ xjV"$ɼfi}j Ozٗm%r]kȿ]Y-/^}Pˆw"}MfV` *ᦃǠJTF#R,WW?'5%Z8.E_J/l*XtBAb{!]2O;R{Bkn5B@Oǰs.{Mik+ᢀGk.%ЮHHQ8fӱ !X)A ʁT-Q*tP }cX(ݽ/Y OW ƨ ޿$H}ՇLQ;QyQmTqÌ' QJBB};dȧ sHrһM'_[jrfZ=Dm70ց0T"# Ac4St %}c0vWXN}#X3\ ih1a9.XkhaL` v]]p +襫pwm?y?~= _<?;%+bm9H$j>NO\K̶%+^S0}`+HvB@;"8gHx8ٓ T](F/ h@^cK*r&TX{y.0n'U'ΕU,'OKkȈ;?~dRBX;HXgzۯ %tD:EWH<wmx|'?F/c$Q8=RŜz=a[L _t+1_Xd4V (P+oSc6eH_D/amY'/d)!Nf^`9f W'1 et"Rhr~y-셀R=*[G"d#X $W ElOؖy:y.Afx,aVmœI_;,hά/)p}\)=H[r3 >n"p-FcJ=b)!\Mmz#y=~'$D>5ׇ.A ,wBxO |ʃ#eLe\WV J J84GݴE^XsTSIGkDe@kAِzΑ>:Pj{ڸ𼴒h 5|f=9O2NKsj,4+coay- Dל`Vp+KY#BNXB+daRux?(E2g{Uη'^ֆ-uz :5gQ<#uQmι7L-HǞx_ӠRRsI5R\fX>GDl\o0#RצJ;g !Buػi` [FQ(j+Pʽ3ܦTX+)V܈3ON>NKrr 5GPFs]~acŠh;3$Lݢ^@"mm^tÙsu&.l|sxG+, $;@9[g^=}{{N';YL2>gY&?*[pX@ k#SV2[44=O)w=|3h\sk".# *&h8&4.ԏ) &/~l_F TX/q!'}Hhkpuam쳆 ,42YA1K}H^bGHbZ];c~iJND3ݴОrݭSs Coϔʈώ[Rb+c?뷜=ZFGhHa'q֮'K[2ۢNt`DdPmMgkre DwBE~殣i%~loͥs3w5wSD;8EB-ğ{cטÄ4aE5̇0np3yu\+I4Sf"5-qB/XAq^NXCYeXxޟ8e4~PjM )@Mxb(oG2,R(vϲXΣT1-+E?kDh\wŗLJTڣ_iۇ ,&0-? {-*%@6[BS ,LxbO/5W]H ? 95ʇfBL !Ǹ4{=t ^X̴: QEpp1 {䉺N 4iM/H hg'ә#ʀEbfM#}Xn*K:o@ ӢfMzfd:.[R g`i( KM02^Nn>v/!ewa p5oS*!>X*:t0*R6L]ܱb`uʾ=b6=_>n zs"{5Қ]HPj^5ZͶ_Xk:/b !$S\|o /L)kBdf̖`%JsZٚFK^k%rN_LhƬ\ ~Gn}1)M.;N!Π;/ v[{k`loLx}@O*6HC\N}+ppqJ[dS5c+l5L!Ɓf A>9j̴:$>2~VnRE}T}+(OZbnlZ;^' j¯1ŒY,ϜHn/KFr+'E_=/}ƘX ѪEcq=n݅sm7/[oQ v7aǙ\> 6{s=UdJ痷`B^L.CZ#O0ai⧮@o[A^LΌm!Q0:1rĘe}eżO '>UQ#Ѭ"lJϏBͺi˙g`0 o0g(9&Z43͹>ADҁ6Lpo9٫UQRC[^;Y#Ao&u~`*iv[zCi u1NS9w*; 6Vx.f/tmOR|y6r3a lVpgʶhgvE/h pfǢ闇 1o^'>6i Yk9Ybv3:.6QoQfJHb[j /v|?\/LV@el&\mGjvsn|)}?x)'s/yfz-lpA`:|{Tiz"J?Jb|5"f.󂔱y. ks3A)d=*ρxpx[mbg' un[ GZSJY0}a\Y9oG7Bp?Xub+BR\`$!1@on)qB"6 Ԑ OE8S xvg#!en`7) Z`܆G  c^Y{]Ir+bN,_[]H? XpkZ# w#ωr<pOobRp!W$a)P#"!:WBH>B@e;7vUR*w7`ӄRHè3ҏ4JHE\wkMr  z &VUfh1OwgEC)pӈ*37R)*.K }ȋBQ]%X 2q&*}xv)́%qNPx|.* K9uBrF-WGQ `!`wHLE0j(4ۑiM?4&=k;;+qD`h&9 ?B33$PØy.XpwXXʂޖ]lP7 eJwSZfJJ0"uJw?,0jwvr &M; YZ