xen-doc-html-4.13.1_04-lp152.2.3.1 4>$  Ap_ (/=„ 8ww{rDHѴ5~9B c"}tǶ^C7J/-Vپ@Rѳ/o麋&!Q9IL .[LҞ]21U9ҴF}`.o7tӕX,m \X)(j[oV 1`DuuP46h?GL)Da*7[9LyyO4A*;n=/fmt>nZ 2fb24afa6dc4c92c671a9a0406e348ba7ea366fda91b3be97ee90bc12932c79d218ea1556c6aed6a142441b789ad0cbc70bf1446D_ (/=„<%7ULɨJMtAAt*OۛS֕w-]ڿa=.BBr7A/3tTnL)D_;ʔ1kۿ[&*ddOm{dJFPůϏj]p9?d % L EKTMM "M M M M  M@MMBdMO(s8|Y9"Y::FYGMHMIMX`Yh\M]M^V bAcdwe|fluMvCxen-doc-html4.13.1_04lp152.2.3.1Xen Virtualization: HTML documentationXen is a virtual machine monitor for x86 that supports execution of multiple guest operating systems with unprecedented levels of performance and resource isolation. xen-doc-html contains the online documentation in HTML format. Point your browser at file:/usr/share/doc/packages/xen/html/ Authors: -------- Ian Pratt _ cloud119 openSUSE Leap 15.2openSUSEGPL-2.0-onlyhttp://bugs.opensuse.orgDocumentation/HTMLhttp://www.cl.cam.ac.uk/Research/SRG/netos/xen/linuxx86_64ot9DA'&6@ 72/"B W 8` We $,76H"yjQ <3 "z768 I\xAAAA큤A큤A큤A큤A큤A큤A큤A큤_ _ E_ E_ _ E_ E_ _ E_ _ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ E_ _ E_ E_ _ E_ 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-4.13.1_04-lp152.2.3.1.src.rpmxen-doc-htmlxen-doc-html(x86-64)     rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PartialHardlinkSets)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0.4-14.0-15.2-14.14.1^)@^^@^ϧ^x^@^@^^^{G^r @^j$@^g@^_@^Nt^K^=Q@^:@^0"@^@^@]]]N@]@]ʞ])]c@]@]@]@]]fl]fl]M`@]B@]/ ],j] ]@]@] ] ] #]]@\\ޢ@\ڭ\\@\@\@\,@\7\\N\@\\+@\\M\M\\\@\}@\k\X)@\J@\I\A\?\=@\9\73\4\$\l@[H[k@[@[^[^[ā@[@[@[9@[v[W[CN@[<[6@[0@[0@['[!@[5@Z@ZnZ@ZZZ@ZmZԐ@ZZZ@ZZ}@Z}@Z}@Z}@Zz@Zz@Zo Zk@ZV@ZS]@ZOhZ:PZ1@Z.s@Z&@ZOZOZ Z Z Z@Z@Z }ZC@ZYYYY|Y@Y{Y*@Y5YA@Y4YYYbYY@Y3Y@YJYJY@YYV@Y@Ym@Yw2Yp@YlYh@Yh@YS@YJ_YI@Y5GY0Y-^Y(Y"YY;@YYY@YtY.X@XQ@X@XۡXg@X@X@X@X @X@X@X@X@XXX@XXXwoXs{@XlXWXRXQ4@XEVX43@X.@X*X lX&X@XX@W@W֘W֘W^@WiW:Wt@W.@W9WW@Wk@Wi,@WbWZWZWZWYZ@WV@WEWBW=W;W3W1@W1@W,@W(W(W(W(W(W#LWVbV(@V3VJVxV'@VV2V͛@VŲ@V`VwVVV=@VV@VHV@VvV%@VV<@V@VS@VV@V^VwVqR@Vn@VXEVUVTQ@VMVMVMVA@V;DV9@V7P@V0V*!@V V@VCVVVf@VqV@UYU@U@UUݪ@U@UnU4@UUK@UU@UU>U@Ux&Un@U\w@U[%UUUPUKSU>$U6;U%@UU@UUU.@TgT-@TT@TZ@TZ@T@TT@T5T@TLTLT~@Tl@Ti@Ta@TJ?@T?@T=@ohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comJames Fehlig carnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comDominique Leuenberger carnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comMatej Cepl carnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comJim Fehlig ohering@suse.deMartin Liška ohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comJan Engelhardt Guillaume GARDET Guillaume GARDET Bernhard Wiedemann carnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deBernhard Wiedemann ohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comtrenn@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.dejfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.deohering@suse.derbrown@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comjfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.dejfehlig@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comohering@suse.dejfehlig@suse.comcarnold@suse.comjfehlig@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.commlatimer@suse.comcarnold@suse.comcyliu@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.derguenther@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comrguenther@suse.comcarnold@suse.commeissner@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.com- Add libxc.migrate_tracking.patch to track live migrations unconditionally in logfiles, especially in libvirt. This will track how long a domU was suspended during transit.- bsc#1173376 - VUL-0: CVE-2020-15566: xen: XSA-317 v1 - Incorrect error handling in event channel port allocation xsa317.patch - bsc#1173377 - VUL-0: CVE-2020-15563: xen: XSA-319 v1 - inverted code paths in x86 dirty VRAM tracking xsa319.patch - bsc#1173378 - VUL-0: CVE-2020-15565: xen: XSA-321 v1 - insufficient cache write-back under VT-d xsa321-1.patch xsa321-2.patch xsa321-3.patch xsa321-4.patch xsa321-5.patch xsa321-6.patch xsa321-7.patch - bsc#1173380 - VUL-0: CVE-2020-15567: xen: XSA-328 v1 - non-atomic modification of live EPT PTE xsa328-1.patch xsa328-2.patch- bsc#1172205 - VUL-0: CVE-2020-0543: xen: Special Register Buffer Data Sampling (SRBDS) aka "CrossTalk" (XSA-320) 5ee24d0e-x86-spec-ctrl-document-SRBDS-workaround.patch 5edfbbea-x86-spec-ctrl-CPUID-MSR-defs-for-SRBDS.patch (Replaces xsa320-1.patch) 5edfbbea-x86-spec-ctrl-mitigate-SRBDS.patch (Replaces xsa320-2.patch) - Upstream bug fixes (bsc#1027519) 5ec50b05-x86-idle-rework-C6-EOI-workaround.patch 5ec7dcaa-x86-dont-enter-C6-with-in-service-intr.patch 5ec7dcf6-x86-dont-enter-C3-C6-with-errata.patch 5ec82237-x86-extend-ISR-C6-workaround-to-Haswell.patch 5ece1b91-x86-clear-RDRAND-CPUID-bit-on-AMD-fam-15-16.patch 5ece8ac4-x86-load_system_tables-NMI-MC-safe.patch 5ed69804-x86-ucode-fix-start-end-update.patch 5eda60cb-SVM-split-recalc-NPT-fault-handling.patch 5edf6ad8-ioreq-pending-emulation-server-destruction-race.patch- bsc#1172205 - VUL-0: CVE-2020-0543: xen: Special Register Buffer Data Sampling (SRBDS) aka "CrossTalk" (XSA-320) xsa320-1.patch xsa320-2.patch- Update to Xen 4.13.1 bug fix release (bsc#1027519) xen-4.13.1-testing-src.tar.bz2 5eb51be6-cpupool-fix-removing-cpu-from-pool.patch 5eb51caa-sched-vcpu-pause-flags-atomic.patch 5ec2a760-x86-determine-MXCSR-mask-always.patch - Drop patches contained in new tarball 5de65f84-gnttab-map-always-do-IOMMU-part.patch 5de65fc4-x86-avoid-HPET-use-on-certain-Intel.patch 5e15e03d-sched-fix-S3-resume-with-smt=0.patch 5e16fb6a-x86-clear-per-cpu-stub-page-info.patch 5e1da013-IRQ-u16-is-too-narrow-for-evtchn.patch 5e1dcedd-Arm-place-speculation-barrier-after-ERET.patch 5e21ce98-x86-time-update-TSC-stamp-after-deep-C-state.patch 5e286cce-VT-d-dont-pass-bridges-to-domain_context_mapping_one.patch 5e318cd4-x86-apic-fix-disabling-LVT0.patch 5e344c11-x86-HVM-relinquish-resources-from-domain_destroy.patch 5e3bd385-EFI-recheck-variable-name-strings.patch 5e3bd3d1-EFI-dont-leak-heap-VIA-XEN_EFI_get_next_variable_name.patch 5e3bd3f8-xmalloc-guard-against-overflow.patch 5e46e090-x86-smp-reset-x2apic_enabled-in-smp_send_stop.patch 5e4c00ef-VT-d-check-full-RMRR-for-E820-reserved.patch 5e4d4f5b-sched-fix-get_cpu_idle_time-with-core-sched.patch 5e4e614d-x86-spec-ctrl-no-xen-also-disables-branch-hardening.patch 5e4ec20e-x86-virtualise-MSR_PLATFORM_ID-properly.patch 5e5e7188-fix-error-path-in-cpupool_unassign_cpu_start.patch 5e6f53dd-AMD-IOMMU-fix-off-by-one-get_paging_mode.patch 5e7a371c-sched-fix-cpu-onlining-with-core-sched.patch 5e7c90cf-sched-fix-cpu-offlining-with-core-sched.patch 5e7cfb29-x86-ucode-AMD-fix-assert-in-compare_patch.patch 5e7cfb29-x86-ucode-fix-error-paths-in-apply_microcode.patch 5e7dd83b-libx86-CPUID-fix-not-just-leaf-7.patch 5e7dfbf6-x86-ucode-AMD-potential-buffer-overrun-equiv-tab.patch 5e846cce-x86-HVM-fix-AMD-ECS-handling-for-Fam10.patch 5e84905c-x86-ucode-AMD-fix-more-potential-buffer-overruns.patch 5e86f7b7-credit2-avoid-vCPUs-with-lower-creds-than-idle.patch 5e86f7fd-credit2-fix-credit-too-few-resets.patch 5e876b0f-tools-xenstore-fix-use-after-free-in-xenstored.patch 5e95ad61-xenoprof-clear-buffer-intended-to-be-shared-with-guests.patch 5e95ad8f-xenoprof-limit-consumption-of-shared-buffer-data.patch 5e95ae77-Add-missing-memory-barrier-in-the-unlock-path-of-rwlock.patch 5e95af5e-xen-gnttab-Fix-error-path-in-map_grant_ref.patch 5e95afb8-gnttab-fix-GNTTABOP_copy-continuation-handling.patch- spec: Remove invocation of autogen.sh - spec: Recommend qemu-ovmf-x86_64 to provide UEFI firmwares- bsc#1170968 - GCC 10: xen build fails on i586 gcc10-fixes.patch- bsc#1169392 - VUL-0: CVE-2020-11742: xen: Bad continuation handling in GNTTABOP_copy (XSA-318) 5e95afb8-gnttab-fix-GNTTABOP_copy-continuation-handling.patch- bsc#1168140 - VUL-0: CVE-2020-11740, CVE-2020-11741: xen: XSA-313 multiple xenoprof issues 5e95ad61-xenoprof-clear-buffer-intended-to-be-shared-with-guests.patch 5e95ad8f-xenoprof-limit-consumption-of-shared-buffer-data.patch - bsc#1168142 - VUL-0: CVE-2020-11739: xen: XSA-314 - Missing memory barriers in read-write unlock paths 5e95ae77-Add-missing-memory-barrier-in-the-unlock-path-of-rwlock.patch - bsc#1168143 - VUL-0: CVE-2020-11743: xen: XSA-316 - Bad error path in GNTTABOP_map_grant 5e95af5e-xen-gnttab-Fix-error-path-in-map_grant_ref.patch - bsc#1167152 - L3: Xenstored Crashed during VM install Need Core analyzed 5e876b0f-tools-xenstore-fix-use-after-free-in-xenstored.patch - bsc#1165206 - Xen 4.12 DomU hang / freeze / stall / NMI watchdog bug soft lockup CPU #0 stuck under high load / upstream with workaround. See also bsc#1134506 5e86f7b7-credit2-avoid-vCPUs-with-lower-creds-than-idle.patch 5e86f7fd-credit2-fix-credit-too-few-resets.patch - Drop for upstream solution (bsc#1165206) 01-xen-credit2-avoid-vcpus-to.patch default-to-credit1-scheduler.patch - Upstream bug fixes (bsc#1027519) 5e4ec20e-x86-virtualise-MSR_PLATFORM_ID-properly.patch 5e5e7188-fix-error-path-in-cpupool_unassign_cpu_start.patch 5e6f53dd-AMD-IOMMU-fix-off-by-one-get_paging_mode.patch 5e7a371c-sched-fix-cpu-onlining-with-core-sched.patch 5e7c90cf-sched-fix-cpu-offlining-with-core-sched.patch 5e7cfb29-x86-ucode-AMD-fix-assert-in-compare_patch.patch 5e7cfb29-x86-ucode-fix-error-paths-in-apply_microcode.patch 5e7dd83b-libx86-CPUID-fix-not-just-leaf-7.patch 5e7dfbf6-x86-ucode-AMD-potential-buffer-overrun-equiv-tab.patch 5e846cce-x86-HVM-fix-AMD-ECS-handling-for-Fam10.patch 5e84905c-x86-ucode-AMD-fix-more-potential-buffer-overruns.patch- bsc#1167608 - unbound limit for max_event_channels domUs with many vcpus and/or resources fail to start libxl.max_event_channels.patch- bsc#1161480 - Fix xl shutdown for HVM without PV drivers add libxl.libxl__domain_pvcontrol.patch- bsc#1165206 - Xen 4.12 DomU hang / freeze / stall / NMI watchdog bug soft lockup CPU #0 stuck under high load / upstream with workaround. See also bsc#1134506 01-xen-credit2-avoid-vcpus-to.patch- bsc#1158414 - GCC 10: xen build fails gcc10-fixes.patch- bsc#1165206 - Xen 4.12 DomU hang / freeze / stall / NMI watchdog bug soft lockup CPU #0 stuck under high load / upstream with workaround. See also bsc#1134506 default-to-credit1-scheduler.patch- bsc#1160932 - VUL-0: xen: XSA-312 v1: arm: a CPU may speculate past the ERET instruction 5e1dcedd-Arm-place-speculation-barrier-after-ERET.patch - bsc#1164425 - x86: "spec-ctrl=no-xen" should also disable branch hardening 5e4e614d-x86-spec-ctrl-no-xen-also-disables-branch-hardening.patch - Upstream bug fixes (bsc#1027519) 5e21ce98-x86-time-update-TSC-stamp-after-deep-C-state.patch 5e286cce-VT-d-dont-pass-bridges-to-domain_context_mapping_one.patch 5e318cd4-x86-apic-fix-disabling-LVT0.patch 5e344c11-x86-HVM-relinquish-resources-from-domain_destroy.patch 5e3bd385-EFI-recheck-variable-name-strings.patch 5e3bd3d1-EFI-dont-leak-heap-VIA-XEN_EFI_get_next_variable_name.patch 5e3bd3f8-xmalloc-guard-against-overflow.patch 5e46e090-x86-smp-reset-x2apic_enabled-in-smp_send_stop.patch 5e4c00ef-VT-d-check-full-RMRR-for-E820-reserved.patch 5e4d4f5b-sched-fix-get_cpu_idle_time-with-core-sched.patch- bsc#1159755 - use fixed qemu-3.1 machine type for HVM This must be done in qemu to preserve PCI layout remove libxl.lock-qemu-machine-for-hvm.patch- jsc#SLE-10183 - script to calculate cpuid= mask add helper script from https://github.com/twizted/xen_maskcalc domUs may be migrated between different cpus from the same vendor if their visible cpuid value has incompatible feature bits masked.- jsc#SLE-10172, bsc#1055731 - handle degraded raid for xendomains add helper script and systemd service from https://github.com/luizluca/xen-tools-xendomains-wait-disk in new sub package xen-tools-xendomains-wait-disk See included README for usage instructions xendomains-wait-disks.LICENSE xendomains-wait-disks.README.md xendomains-wait-disks.sh- bsc#1159755 - use fixed qemu-3.1 machine type for HVM qemu4 introduced incompatible changes in pc-i440fx, which revealed a design bug in 'xenfv'. Live migration from domUs started with qemu versions prior qemu4 can not be received with qemu4+. libxl.lock-qemu-machine-for-hvm.patch- Upstream bug fixes (bsc#1027519) 5de65f84-gnttab-map-always-do-IOMMU-part.patch 5de65fc4-x86-avoid-HPET-use-on-certain-Intel.patch 5e15e03d-sched-fix-S3-resume-with-smt=0.patch 5e16fb6a-x86-clear-per-cpu-stub-page-info.patch 5e1da013-IRQ-u16-is-too-narrow-for-evtchn.patch- BuildRequire pkgconfig(libsystemd) instead of systemd-devel: Allow OBS to shortcut through the -mini flavors.- bsc#1159320 - Xen logrotate file needs updated logrotate.conf- Update to Xen 4.13.0 FCS release xen-4.13.0-testing-src.tar.bz2 * Core Scheduling (contributed by SUSE) * Branch hardening to mitigate against Spectre v1 (contributed by Citrix) * Late uCode loading (contributed by Intel) * Improved live-patching build tools (contributed by AWS) * OP-TEE support (contributed by EPAM) * Renesas R-CAR IPMMU-VMSA driver (contributed by EPAM) * Dom0-less passthrough and ImageBuilder (contributed by XILINX) * Support for new Hardware- Update to Xen 4.13.0 RC4 release xen-4.13.0-testing-src.tar.bz2 - Rebase libxl.pvscsi.patch- Update to Xen 4.13.0 RC3 release xen-4.13.0-testing-src.tar.bz2 - Drop python38-build.patch- Update to Xen 4.13.0 RC2 release xen-4.13.0-testing-src.tar.bz2- Add python38-build.patch fixing build with Python 3.8 (add - -embed to python-config call)- Update to Xen 4.13.0 RC1 release xen-4.13.0-testing-src.tar.bz2 - Drop patches contained in new tarball or invalid 5ca7660f-x86-entry-drop-unused-includes.patch 5cab2a6b-x86-ACPI-also-parse-AMD-tables-early.patch 5cab2ab7-x86-IOMMU-introduce-init-ops.patch 5cab2ae8-x86-IOMMU-abstract-iommu_supports_eim.patch 5cab2b4e-x86-IOMMU-abstract-iommu_enable_x2apic_IR.patch 5cab2b95-x86-IOMMU-initialize-iommu_ops-in.patch 5cac9a4b-x86-IOMMU-abstract-adjust_vtd_irq_affinities.patch 5cdeac7f-AMD-IOMMU-adjust-IOMMU-list-head-init.patch 5cf8da09-adjust-sysdom-creation-call-earlier-on-x86.patch 5d0cf4e4-AMD-IOMMU-initialize-IRQ-tasklet-once.patch 5d149bb0-AMD-IOMMU-dont-add-IOMMUs.patch 5d1b3fab-AMD-IOMMU-restrict-feature-logging.patch 5d358508-x86-IRQ-desc-affinity-represents-request.patch 5d358534-x86-IRQ-consolidate-arch-cpu_mask-use.patch 5d358a67-AMD-IOMMU-pass-IOMMU-to-iterate_ivrs_entries-cb.patch 5d358a92-AMD-IOMMU-pass-IOMMU-to-amd_iommu_alloc_intremap_table.patch 5d39811c-x86-IOMMU-dont-restrict-IRQ-affinities.patch 5d417813-AMD-IOMMU-bitfield-extended-features.patch 5d417838-AMD-IOMMU-bitfield-control-reg.patch 5d41785b-AMD-IOMMU-bitfield-IRTE.patch 5d41787e-AMD-IOMMU-pass-IOMMU-to-gfu-intremap-entry.patch 5d4178ad-AMD-IOMMU-128bit-non-guest-APIC-IRTE.patch 5d4178fc-AMD-IOMMU-split-amd_iommu_init_one.patch 5d41793f-AMD-IOMMU-allow-enabling-without-IRQ.patch 5d417a16-AMD-IOMMU-adjust-IRQ-setup-for-x2APIC.patch 5d417ab6-AMD-IOMMU-enable-x2APIC-mode.patch 5d417b38-AMD-IOMMU-correct-IRTE-updating.patch 5d417b6a-AMD-IOMMU-dont-needlessly-log-headers.patch 5d419d49-x86-spec-ctrl-report-proper-status.patch 5d43253c-x86-ucode-always-collect_cpu_info-at-boot.patch 5d4a9d25-AMD-IOMMU-drop-not-found-message.patch 5d4aa36f-x86-apic-enable-x2APIC-mode-earlier.patch 5d4afa7a-credit2-fix-memory-leak.patch 5d4d850a-introduce-bss-percpu-page-aligned.patch 5d516531-x86-xpti-dont-leak-TSS-adjacent-data.patch 5d5bf475-x86-PV-fix-handling-of-iommu-mappings.patch 5d6524ca-x86-mm-correctly-init-M2P-entries.patch 5d67ceaf-x86-properly-gate-PKU-clearing.patch 5d70bfba-x86-shadow-dont-enable-with-too-small-allocation.patch 5d779811-x86-fix-CPUID7-0-eax-levelling-MSR.patch 5d77b40f-fix-hvm_all_ioreq_servers_add_vcpu-cleanup.patch 5d80e7c0-AMD-IOMMU-free-shared-IRT-once.patch 5d80e80d-AMD-IOMMU-valid-flag-for-IVRS-mappings.patch 5d80e82e-AMD-IOMMU-alloc_intremap_table-callers-handle-errors.patch 5d80e857-x86-PCI-read-MSI-X-table-entry-count-early.patch 5d80ea13-vpci-honor-read-only-devices.patch 5d89d8d9-libxc-x86-avoid-overflow-in-CPUID-APIC-ID.patch 5d8b715f-ACPI-cpuidle-bump-max-num-of-states.patch 5d8b72e5-AMD-IOMMU-dont-blindly-alloc-intremap-tables.patch 5d8b730e-AMD-IOMMU-phantom-funcs-share-intremap-tables.patch 5d8b733b-x86-PCI-read-max-MSI-vector-count-early.patch 5d8b736d-AMD-IOMMU-replace-INTREMAP_ENTRIES.patch 5d8b7393-AMD-IOMMU-restrict-intremap-table-sizes.patch 5d9ee2a8-AMD-IOMMU-alloc-1-devtab-per-PCI-seg.patch 5d9ee2f0-AMD-IOMMU-allocate_buffer-avoid-memset.patch 5d9ee312-AMD-IOMMU-prefill-all-DTEs.patch CVE-2014-0222-blktap-qcow1-validate-l2-table-size.patch blktap2-no-uninit.patch libxl.prepare-environment-for-domcreate_stream_done.patch pygrub-python3-conversion.patch fix-xenpvnetboot.patch- bsc#1135799 - Partner-L3: Xen crashes on AMD ROME based machines 5d9ee2a8-AMD-IOMMU-alloc-1-devtab-per-PCI-seg.patch 5d9ee2f0-AMD-IOMMU-allocate_buffer-avoid-memset.patch 5d9ee312-AMD-IOMMU-prefill-all-DTEs.patch- bsc#1120095 - add code to change LIBXL_HOTPLUG_TIMEOUT at runtime The included README has details about the impact of this change libxl.LIBXL_HOTPLUG_TIMEOUT.patch- bsc#1135799 - Partner-L3: Xen crashes on AMD ROME based machines 5ca7660f-x86-entry-drop-unused-includes.patch 5cf8da09-adjust-sysdom-creation-call-earlier-on-x86.patch 5cab2a6b-x86-ACPI-also-parse-AMD-tables-early.patch 5cab2ab7-x86-IOMMU-introduce-init-ops.patch 5cab2ae8-x86-IOMMU-abstract-iommu_supports_eim.patch 5cab2b4e-x86-IOMMU-abstract-iommu_enable_x2apic_IR.patch 5cab2b95-x86-IOMMU-initialize-iommu_ops-in.patch 5cac9a4b-x86-IOMMU-abstract-adjust_vtd_irq_affinities.patch 5cdeac7f-AMD-IOMMU-adjust-IOMMU-list-head-init.patch 5d0cf4e4-AMD-IOMMU-initialize-IRQ-tasklet-once.patch 5d149bb0-AMD-IOMMU-dont-add-IOMMUs.patch 5d1b3fab-AMD-IOMMU-restrict-feature-logging.patch 5d358508-x86-IRQ-desc-affinity-represents-request.patch 5d358534-x86-IRQ-consolidate-arch-cpu_mask-use.patch 5d358a67-AMD-IOMMU-pass-IOMMU-to-iterate_ivrs_entries-cb.patch 5d358a92-AMD-IOMMU-pass-IOMMU-to-amd_iommu_alloc_intremap_table.patch 5d39811c-x86-IOMMU-dont-restrict-IRQ-affinities.patch 5d417813-AMD-IOMMU-bitfield-extended-features.patch 5d417838-AMD-IOMMU-bitfield-control-reg.patch 5d41785b-AMD-IOMMU-bitfield-IRTE.patch 5d41787e-AMD-IOMMU-pass-IOMMU-to-gfu-intremap-entry.patch 5d4178ad-AMD-IOMMU-128bit-non-guest-APIC-IRTE.patch 5d4178fc-AMD-IOMMU-split-amd_iommu_init_one.patch 5d41793f-AMD-IOMMU-allow-enabling-without-IRQ.patch 5d417a16-AMD-IOMMU-adjust-IRQ-setup-for-x2APIC.patch 5d417ab6-AMD-IOMMU-enable-x2APIC-mode.patch 5d417b38-AMD-IOMMU-correct-IRTE-updating.patch 5d417b6a-AMD-IOMMU-dont-needlessly-log-headers.patch 5d4a9d25-AMD-IOMMU-drop-not-found-message.patch 5d80e7c0-AMD-IOMMU-free-shared-IRT-once.patch 5d80e80d-AMD-IOMMU-valid-flag-for-IVRS-mappings.patch 5d80e82e-AMD-IOMMU-alloc_intremap_table-callers-handle-errors.patch 5d80e857-x86-PCI-read-MSI-X-table-entry-count-early.patch 5d8b72e5-AMD-IOMMU-dont-blindly-alloc-intremap-tables.patch 5d8b730e-AMD-IOMMU-phantom-funcs-share-intremap-tables.patch 5d8b733b-x86-PCI-read-max-MSI-vector-count-early.patch 5d8b736d-AMD-IOMMU-replace-INTREMAP_ENTRIES.patch 5d8b7393-AMD-IOMMU-restrict-intremap-table-sizes.patch - bsc#1145240 - [Migration]Can't pre-allocate 1 shadow pages 5d70bfba-x86-shadow-dont-enable-with-too-small-allocation.patch - bsc#1137717 - [HPS Bug] Unable to install Windows Server 2016 with 2 CPUs setting (or above) under SLES12 SP4 Xen Server on AMD ROME platform 5d89d8d9-libxc-x86-avoid-overflow-in-CPUID-APIC-ID.patch - Upstream bug fixes (bsc#1027519) 5d67ceaf-x86-properly-gate-PKU-clearing.patch 5d779811-x86-fix-CPUID7-0-eax-levelling-MSR.patch 5d77b40f-fix-hvm_all_ioreq_servers_add_vcpu-cleanup.patch 5d80ea13-vpci-honor-read-only-devices.patch 5d8b715f-ACPI-cpuidle-bump-max-num-of-states.patch- bsc#1145774 - Libivrtd segfaults when trying to live migrate a VM Fix crash in an error path of libxl_domain_suspend with libxl.helper_done-crash.patch- Upstream bug fixes (bsc#1027519) 5d419d49-x86-spec-ctrl-report-proper-status.patch 5d43253c-x86-ucode-always-collect_cpu_info-at-boot.patch 5d4aa36f-x86-apic-enable-x2APIC-mode-earlier.patch 5d4afa7a-credit2-fix-memory-leak.patch 5d4d850a-introduce-bss-percpu-page-aligned.patch 5d516531-x86-xpti-dont-leak-TSS-adjacent-data.patch 5d5bf475-x86-PV-fix-handling-of-iommu-mappings.patch 5d6524ca-x86-mm-correctly-init-M2P-entries.patch - Drop 5d419d49-x86-spec-ctrl-facilities-report-wrong-status.patch- Preserve modified files which used to be marked as %config, rename file.rpmsave to file- Update to Xen 4.12.1 bug fix release (bsc#1027519) xen-4.12.1-testing-src.tar.bz2 - Drop patches contained in new tarball 5c87b644-IOMMU-leave-enabled-for-kexec-crash.patch 5c87b6a2-x86-HVM-dont-crash-guest-in-find_mmio_cache.patch 5c87b6c8-drop-arch_evtchn_inject.patch 5c87b6e8-avoid-atomic-rmw-accesses-in-map_vcpu_info.patch 5c87e6d1-x86-TSX-controls-for-RTM-force-abort-mode.patch 5c8f752c-x86-e820-build-with-gcc9.patch 5c8fb92d-x86-HVM-split-linear-reads-and-writes.patch 5c8fb951-x86-HVM-finish-IOREQs-correctly-on-completion.patch 5c8fc6c0-x86-MSR-shorten-ARCH_CAPABILITIES.patch 5c8fc6c0-x86-SC-retpoline-safety-calculations-for-eIBRS.patch 5c9e63c5-credit2-SMT-idle-handling.patch 5ca46b68-x86emul-no-GPR-update-upon-AVX-gather-failures.patch 5ca773d1-x86emul-dont-read-mask-reg-without-AVX512F.patch 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch 5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch 5cd921fb-trace-fix-build-with-gcc9.patch 5cd9224b-AMD-IOMMU-disable-upon-init-fail.patch 5cd922c5-x86-MTRR-recalc-p2mt-when-iocaps.patch 5cd9230f-VMX-correctly-get-GS_SHADOW-for-current.patch 5cd926d0-bitmap_fill-zero-sized.patch 5cd92724-drivers-video-drop-constraints.patch 5cd93a69-x86-MSR_INTEL_CORE_THREAD_COUNT.patch 5cd93a69-x86-boot-detect-Intel-SMT-correctly.patch 5cd93a69-x86-spec-ctrl-reposition-XPTI-parsing.patch 5cd981ff-x86-IRQ-tracing-avoid-UB-or-worse.patch 5cdad090-x86-spec-ctrl-CPUID-MSR-definitions-for-MDS.patch 5cdad090-x86-spec-ctrl-infrastructure-for-VERW-flush.patch 5cdad090-x86-spec-ctrl-misc-non-functional-cleanup.patch 5cdad090-x86-spec-ctrl-opts-to-control-VERW-flush.patch 5cdeb9fd-sched-fix-csched2_deinit_pdata.patch 5ce7a92f-x86-IO-APIC-fix-build-with-gcc9.patch 5cf0f6a4-x86-vhpet-resume-avoid-small-diff.patch 5cf16e51-x86-spec-ctrl-Knights-retpoline-safe.patch 5d03a0c4-1-Arm-add-an-isb-before-reading-CNTPCT_EL0.patch 5d03a0c4-2-gnttab-rework-prototype-of-set_status.patch 5d03a0c4-3-Arm64-rewrite-bitops-in-C.patch 5d03a0c4-4-Arm32-rewrite-bitops-in-C.patch 5d03a0c4-5-Arm-bitops-consolidate-prototypes.patch 5d03a0c4-6-Arm64-cmpxchg-simplify.patch 5d03a0c4-7-Arm32-cmpxchg-simplify.patch 5d03a0c4-8-Arm-bitops-helpers-with-timeout.patch 5d03a0c4-9-Arm-cmpxchg-helper-with-timeout.patch 5d03a0c4-A-Arm-turn-on-SILO-mode-by-default.patch 5d03a0c4-B-bitops-guest-helpers.patch 5d03a0c4-C-cmpxchg-guest-helpers.patch 5d03a0c4-D-use-guest-atomics-helpers.patch 5d03a0c4-E-Arm-add-perf-counters-in-guest-atomic-helpers.patch 5d03a0c4-F-Arm-protect-gnttab_clear_flag.patch - Refreshed patches libxl.pvscsi.patch- bsc#1143563 - Speculative mitigation facilities report wrong status 5d419d49-x86-spec-ctrl-facilities-report-wrong-status.patch- Update xen-dom0-modules.service (bsc#1137251) Map backend module names from pvops and xenlinux kernels to a module alias. This avoids errors from modprobe about unknown modules. Ignore a few xenlinux modules that lack aliases.- Gcc9 warnings seem to be cleared up with upstream fixes. Drop gcc9-ignore-warnings.patch- bsc#1138563 - L3: xenpvnetboot improperly ported to Python 3 fix-xenpvnetboot.patch- Move /etc/modprobe.d/xen_loop.conf to /lib/modprobe.d/xen_loop.conf- Remove /etc/xen/xenapiusers and /etc/pam.d/xen-api- Remove all upstream provided files in /etc/xen They are not required at runtime. The host admin is now responsible if he really needs anything in this subdirectory.- In our effort to make /etc fully admin controlled, move /etc/xen/scripts to libexec/xen/scripts with xen-tools.etc_pollution.patch- Move /etc/bash_completion.d/xl.sh to %{_datadir}/bash-completion/completions- bsc#1138294 - VUL-0: CVE-2019-17349: XSA-295: Unlimited Arm Atomics Operations 5d03a0c4-1-Arm-add-an-isb-before-reading-CNTPCT_EL0.patch 5d03a0c4-2-gnttab-rework-prototype-of-set_status.patch 5d03a0c4-3-Arm64-rewrite-bitops-in-C.patch 5d03a0c4-4-Arm32-rewrite-bitops-in-C.patch 5d03a0c4-5-Arm-bitops-consolidate-prototypes.patch 5d03a0c4-6-Arm64-cmpxchg-simplify.patch 5d03a0c4-7-Arm32-cmpxchg-simplify.patch 5d03a0c4-8-Arm-bitops-helpers-with-timeout.patch 5d03a0c4-9-Arm-cmpxchg-helper-with-timeout.patch 5d03a0c4-A-Arm-turn-on-SILO-mode-by-default.patch 5d03a0c4-B-bitops-guest-helpers.patch 5d03a0c4-C-cmpxchg-guest-helpers.patch 5d03a0c4-D-use-guest-atomics-helpers.patch 5d03a0c4-E-Arm-add-perf-counters-in-guest-atomic-helpers.patch 5d03a0c4-F-Arm-protect-gnttab_clear_flag.patch - Upstream bug fixes (bsc#1027519) 5c87b6c8-drop-arch_evtchn_inject.patch 5c87b6e8-avoid-atomic-rmw-accesses-in-map_vcpu_info.patch 5cd921fb-trace-fix-build-with-gcc9.patch 5cd9224b-AMD-IOMMU-disable-upon-init-fail.patch 5cd922c5-x86-MTRR-recalc-p2mt-when-iocaps.patch 5cd9230f-VMX-correctly-get-GS_SHADOW-for-current.patch 5cd926d0-bitmap_fill-zero-sized.patch 5cd92724-drivers-video-drop-constraints.patch 5cd93a69-x86-spec-ctrl-reposition-XPTI-parsing.patch (Replaces xsa297-0a.patch) 5cd93a69-x86-MSR_INTEL_CORE_THREAD_COUNT.patch (Replaces xsa297-0b.patch) 5cd93a69-x86-boot-detect-Intel-SMT-correctly.patch (Replaces xsa297-0c.patch) 5cdad090-x86-spec-ctrl-misc-non-functional-cleanup.patch (Replaces xsa297-0d.patch) 5cdad090-x86-spec-ctrl-CPUID-MSR-definitions-for-MDS.patch (Replaces xsa297-1.patch) 5cdad090-x86-spec-ctrl-infrastructure-for-VERW-flush.patch (Replaces xsa297-2.patch) 5cdad090-x86-spec-ctrl-opts-to-control-VERW-flush.patch (Replaces xsa297-3.patch) 5cd981ff-x86-IRQ-tracing-avoid-UB-or-worse.patch 5cdeb9fd-sched-fix-csched2_deinit_pdata.patch 5ce7a92f-x86-IO-APIC-fix-build-with-gcc9.patch 5cf0f6a4-x86-vhpet-resume-avoid-small-diff.patch 5cf16e51-x86-spec-ctrl-Knights-retpoline-safe.patch- Fix some outdated information in the readme README.SUSE- spec: xen-tools: require matching version of xen package bsc#1137471- Remove two stale patches xen.build-compare.man.patch xenpaging.doc.patch- Disable LTO (boo#1133296).- Remove arm32 from ExclusiveArch to fix build- bsc#1111331 - VUL-0: CPU issues Q2 2019 aka "Group 4". CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 xsa297-0a.patch xsa297-0b.patch xsa297-0c.patch xsa297-0d.patch xsa297-1.patch xsa297-2.patch xsa297-3.patch - Update 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch and drop 5cac6219-xen-cpu-Fix-ARM-build-following-cs-597fbb8.patch Refresh 5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch- bsc#1131811 - [XEN] internal error: libxenlight failed to create new domain. This patch is a workaround for a systemd issue. See patch header for additional comments. xenstore-launch.patch- bsc#1125378 - [xen][pygrub] Can not restore sle11sp4 pv guest after upgrading host from sle11sp4 to sle15sp1 pygrub-python3-conversion.patch - Fix "TypeError: virDomainDefineXML() argument 2 must be str or None, not bytes" when converting VMs from using the xm/xend toolstack to the libxl/libvirt toolstack. (bsc#1123378) xen2libvirt.py- bsc#1124560 - Fully virtualized guests crash on boot 5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch - bsc#1121391 - GCC 9: xen build fails 5c8f752c-x86-e820-build-with-gcc9.patch - Upstream bug fixes (bsc#1027519) 5c87b644-IOMMU-leave-enabled-for-kexec-crash.patch 5c87b6a2-x86-HVM-dont-crash-guest-in-find_mmio_cache.patch 5c87e6d1-x86-TSX-controls-for-RTM-force-abort-mode.patch 5c8fb92d-x86-HVM-split-linear-reads-and-writes.patch 5c8fb951-x86-HVM-finish-IOREQs-correctly-on-completion.patch 5c8fc6c0-x86-MSR-shorten-ARCH_CAPABILITIES.patch 5c8fc6c0-x86-SC-retpoline-safety-calculations-for-eIBRS.patch 5c9e63c5-credit2-SMT-idle-handling.patch 5ca46b68-x86emul-no-GPR-update-upon-AVX-gather-failures.patch 5ca773d1-x86emul-dont-read-mask-reg-without-AVX512F.patch 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch 5cac6219-xen-cpu-Fix-ARM-build-following-cs-597fbb8.patch- Install pkgconfig files into libdir instead of datadir- Update to Xen 4.12.0 FCS release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2 * HVM/PVH and PV only Hypervisor: The Xen 4.12 release separates the HVM/PVH and PV code paths in Xen and provides KCONFIG options to build a PV only or HVM/PVH only hypervisor. * QEMU Deprivilege (DM_RESTRICT): In Xen 4.12, this feature has been vastly improved. * Argo - Hypervisor-Mediated data eXchange: Argo is a new inter- domain communication mechanism. * Improvements to Virtual Machine Introspection: The VMI subsystem which allows detection of 0-day vulnerabilities has seen many functional and performance improvements. * Credit 2 Scheduler: The Credit2 scheduler is now the Xen Project default scheduler. * PVH Support: Grub2 boot support has been added to Xen and Grub2. * PVH Dom0: PVH Dom0 support has now been upgraded from experimental to tech preview. * The Xen 4.12 upgrade also includes improved IOMMU mapping code, which is designed to significantly improve the startup times of AMD EPYC based systems. * The upgrade also features Automatic Dom0 Sizing which allows the setting of Dom0 memory size as a percentage of host memory (e.g. 10%) or with an offset (e.g. 1G+10%).- bsc#1130485 - Please drop Requires on multipath-tools in xen-tools. Now using Recommends multipath-tools. xen.spec- Update to Xen 4.12.0 RC7 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- Update to Xen 4.12.0 RC6 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- bsc#1026236 - add Xen cmdline option "suse_vtsc_tolerance" to avoid TSC emulation for HVM domUs if their expected frequency does not match exactly the frequency of the receiving host xen.bug1026236.suse_vtsc_tolerance.patch- Update to Xen 4.12.0 RC5 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- jsc#SLE-3059 - Disable Xen auto-ballooning - Add CONFIG_DOM0_MEM to the spec file for managing dom0 memory. xen.spec - Disable autoballooning in xl.con xl-conf-disable-autoballoon.patch- Update gcc9-ignore-warnings.patch to fix build in SLE12- bsc#1126325 - fix crash in libxl in error path Setup of grant_tables and other variables may fail libxl.prepare-environment-for-domcreate_stream_done.patch- bsc#1127620 - Documentation for the xl configuration file allows for firmware=pvgrub64 but we don't ship pvgrub64. Create a link from grub.xen to pvgrub64 xen.spec- Update to Xen 4.12.0 RC4 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2 - Tarball also contains additional post RC4 security fixes for Xen Security Advisories 287, 288, and 290 through 294.- Update to Xen 4.12.0 RC3 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- Update to Xen 4.12.0 RC2 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- bsc#1121391 - GCC 9: xen build fails gcc9-ignore-warnings.patch- bsc#1122563 - Virtualization/xen: Bug no Xen on boot, missing /proc/xen, after 4.11 -> 4.12 upgrade on X86_64/efi. Keep xen.efi in /usr/lib64/efi for booting older distros. xen.spec- fate#326960: Package grub2 as noarch. As part of the effort to have a unified bootloader across architectures, modify the xen.spec file to move the Xen efi files to /usr/share/efi/$(uname -m) from /usr/lib64/efi.- Update to Xen 4.12.0 RC1 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2 - Drop 5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch 5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch 5b8fae26-tools-libxl-correct-vcpu-affinity-output-with-sparse-physical-cpu-map.patch 5b8fae26-xen-fill-topology-info-for-all-present-cpus.patch 5b8fb5af-tools-xl-refuse-to-set-number-of-vcpus-to-0-via-xl-vcpu-set.patch 5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch 5b9784d2-x86-HVM-add-known_gla-helper.patch 5b9784f2-x86-HVM-split-page-straddling-accesses.patch 5bdc31d5-VMX-fix-vmx_handle_eoi.patch gcc8-fix-array-warning-on-i586.patch gcc8-fix-format-warning-on-i586.patch gcc8-inlining-failed.patch xen.bug1079730.patch- bsc#1121960 - xen: sync with Factory xen.spec xen.changes- Replace old $RPM_* shell vars. - Run fdupes for all architectures, and not crossing subvolume boundaries.- Do not run %fdupes on aarch64 to avoid the hardlink-across-partition rpmlint error- Require qemu-seabios only on x86* as it is not available on non-x86 systems- Avoid creating dangling symlinks (bsc#1116524) This reverts the revert of tmp_build.patch- Update to Xen 4.11.1 bug fix release (bsc#1027519) xen-4.11.1-testing-src.tar.bz2 - 5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch replaces xen.2b50cdbc444c637575580dcfa6c9525a84d5cc62.patch - 5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch replaces xen.b8f33431f3dd23fb43a879f4bdb4283fdc9465ad.patch - Drop the following patches contained in the new tarball 5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch 5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch 5b3cab8e-2-VMX-improve-MSR-load-save-API.patch 5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch 5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch 5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch 5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch 5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch 5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch 5b3f8fa5-port-array_index_nospec-from-Linux.patch 5b4321f6-x86-correctly-set-nonlazy_xstate_used-when-loading-full-state.patch 5b4488e7-x86-spec-ctrl-cmdline-handling.patch 5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch 5b4c9a60-allow-cpu_down-to-be-called-earlier.patch 5b4db308-SVM-fix-cleanup-svm_inject_event.patch 5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch 5b5040f2-x86-AMD-distinguish-CU-from-HT.patch 5b505fe5-VMX-fix-find-msr-build.patch 5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch 5b508775-2-x86-possibly-bring-up-all-CPUs.patch 5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch 5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch 5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch 5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch 5b56feb1-hvm-Disallow-unknown-MSR_EFER-bits.patch 5b56feb2-spec-ctrl-Fix-the-parsing-of-xpti--on-fixed-Intel-hardware.patch 5b62ca93-VMX-avoid-hitting-BUG_ON.patch 5b6d84ac-x86-fix-improve-vlapic-read-write.patch 5b6d8ce2-x86-XPTI-parsing.patch 5b72fbbe-ARM-disable-grant-table-v2.patch 5b72fbbe-oxenstored-eval-order.patch 5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch 5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch 5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch 5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch 5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch 5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch 5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch 5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch 5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch 5b72fbbf-x86-Make-spec-ctrl-no-a-global-disable-of-all-mitigations.patch 5b72fbbf-xl.conf-Add-global-affinity-masks.patch 5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch 5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch 5b75afef-x86-setup-avoid-OoB-E820-lookup.patch 5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch 5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch 5b8d5832-x86-assorted-array_index_nospec-insertions.patch 5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch 5bacae4b-x86-boot-allocate-extra-module-slot.patch 5bae44ce-x86-silence-false-log-messages.patch 5bb60c12-x86-split-opt_xpti.patch 5bb60c4f-x86-split-opt_pv_l1tf.patch 5bb60c74-x86-fix-xpti-and-pv-l1tf.patch 5bcf0722-x86-boot-enable-NMIs.patch 5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch 5bd076e9-x86-boot-init-debug-regs-correctly.patch 5bd076e9-x86-init-vcpu-debug-regs-correctly.patch 5bd0e0cf-vvmx-Disallow-the-use-of-VT-x-instructions-when-nested-virt-is-disabled.patch 5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch 5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch 5be2a308-x86-extend-get_platform_badpages.patch 5be2a354-x86-work-around-HLE-host-lockup-erratum.patch xsa275-1.patch xsa275-2.patch xsa276-1.patch xsa276-2.patch xsa277.patch xsa279.patch xsa280-1.patch xsa280-2.patch- bsc#1116524 - Package xen-tools-4.11.0_09-2.1.x86_64 broken: Missing /bin/domu-xenstore. This was broken because "make package build reproducible" change. (boo#1047218, boo#1062303) This fix reverses the change to this patch. tmp_build.patch- bsc#1115040 - VUL-0: CVE-2018-19961 CVE-2018-19962: xen: insufficient TLB flushing / improper large page mappings with AMD IOMMUs (XSA-275) xsa275-1.patch xsa275-2.patch - bsc#1115043 - VUL-0: CVE-2018-19963: xen: resource accounting issues in x86 IOREQ server handling (XSA-276) xsa276-1.patch xsa276-2.patch - bsc#1115044 - VUL-0: CVE-2018-19964: xen: x86: incorrect error handling for guest p2m page removals (XSA-277) xsa277.patch - bsc#1114405 - VUL-0: CVE-2018-18883: xen: Nested VT-x usable even when disabled (XSA-278) 5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch - bsc#1115045 - VUL-0: xen: CVE-2018-19965: x86: DoS from attempting to use INVPCID with a non-canonical addresses (XSA-279) xsa279.patch - bsc#1115047 - VUL-0: CVE-2018-19966: xen: Fix for XSA-240 conflicts with shadow paging (XSA-280) xsa280-1.patch xsa280-2.patch - bsc#1114988 - VUL-0: CVE-2018-19967: xen: guest use of HLE constructs may lock up host (XSA-282) 5be2a308-x86-extend-get_platform_badpages.patch 5be2a354-x86-work-around-HLE-host-lockup-erratum.patch - bsc#1108940 - L3: XEN SLE12-SP1 domU hang on SLE12-SP3 HV 5bdc31d5-VMX-fix-vmx_handle_eoi.patch - Upstream bug fixes (bsc#1027519) 5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch 5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch 5bacae4b-x86-boot-allocate-extra-module-slot.patch 5bae44ce-x86-silence-false-log-messages.patch 5bb60c12-x86-split-opt_xpti.patch 5bb60c4f-x86-split-opt_pv_l1tf.patch 5bb60c74-x86-fix-xpti-and-pv-l1tf.patch 5bcf0722-x86-boot-enable-NMIs.patch 5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch 5bd076e9-x86-boot-init-debug-regs-correctly.patch 5bd076e9-x86-init-vcpu-debug-regs-correctly.patch 5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch- bsc#1114405 - VUL-0: CVE-2018-18883: xen: Nested VT-x usable even when disabled (XSA-278) 5bd0e0cf-vvmx-Disallow-the-use-of-VT-x-instructions-when-nested-virt-is-disabled.patch- Use SMBIOS_REL_DATE instead of SMBIOS_DATE for reproducible binaries- make package build reproducible (boo#1047218, boo#1062303) * Set SMBIOS_REL_DATE * Update tmp_build.patch to use SHA instead of random build-id * Add reproducible.patch to use --no-insert-timestamp- Building with ncurses 6.1 will fail without xen.2b50cdbc444c637575580dcfa6c9525a84d5cc62.patch - Building libxl acpi support on aarch64 with gcc 8.2 will fail without xen.b8f33431f3dd23fb43a879f4bdb4283fdc9465ad.patch- bsc#1106263 - L3: The affinity reporting via 'xl vcpu-list' is apparently broken 5b8fae26-tools-libxl-correct-vcpu-affinity-output-with-sparse-physical-cpu-map.patch 5b8fae26-xen-fill-topology-info-for-all-present-cpus.patch 5b8fb5af-tools-xl-refuse-to-set-number-of-vcpus-to-0-via-xl-vcpu-set.patch- bsc#1094508 - L3: Kernel oops in fs/dcache.c called by d_materialise_unique() 5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch 5b9784d2-x86-HVM-add-known_gla-helper.patch 5b9784f2-x86-HVM-split-page-straddling-accesses.patch - bsc#1103279 - (CVE-2018-15470) VUL-0: CVE-2018-15470: xen: oxenstored does not apply quota-maxentity (XSA-272) 5b72fbbe-oxenstored-eval-order.patch - bsc#1103275 - (CVE-2018-15469) VUL-0: CVE-2018-15469: xen: Use of v2 grant tables may cause crash on ARM (XSA-268) 5b72fbbe-ARM-disable-grant-table-v2.patch - Upstream patches from Jan (bsc#1027519) 5b6d84ac-x86-fix-improve-vlapic-read-write.patch 5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch 5b75afef-x86-setup-avoid-OoB-E820-lookup.patch 5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch 5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch 5b8d5832-x86-assorted-array_index_nospec-insertions.patch - Drop 5b741962-x86-write-to-correct-variable-in-parse_pv_l1tf.patch- bsc#1078292 - rpmbuild -ba SPECS/xen.spec with xen-4.9.1 failed xen.spec- bsc#1091107 - VUL-0: CVE-2018-3646: xen: L1 Terminal Fault -VMM (XSA-273) 5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch 5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch 5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch 5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch 5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch 5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch 5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch 5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch - bsc#1103276 - VUL-0: CVE-2018-15468: xen: x86: Incorrect MSR_DEBUGCTL handling lets guests enable BTS (XSA-269) 5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch - Upstream prereq patches for XSA-273 and other upstream fixes (bsc#1027519) 5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch 5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch 5b3cab8e-2-VMX-improve-MSR-load-save-API.patch 5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch 5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch 5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch 5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch 5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch 5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch 5b4321f6-x86-correctly-set-nonlazy_xstate_used-when-loading-full-state.patch 5b505fe5-VMX-fix-find-msr-build.patch 5b56feb1-hvm-Disallow-unknown-MSR_EFER-bits.patch 5b56feb2-spec-ctrl-Fix-the-parsing-of-xpti--on-fixed-Intel-hardware.patch 5b62ca93-VMX-avoid-hitting-BUG_ON.patch 5b6d8ce2-x86-XPTI-parsing.patch 5b72fbbf-x86-Make-spec-ctrl-no-a-global-disable-of-all-mitigations.patch 5b72fbbf-xl.conf-Add-global-affinity-masks.patch 5b741962-x86-write-to-correct-variable-in-parse_pv_l1tf.patch- Upstream patches from Jan (bsc#1027519) 5b3f8fa5-port-array_index_nospec-from-Linux.patch 5b4488e7-x86-spec-ctrl-cmdline-handling.patch 5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch 5b4c9a60-allow-cpu_down-to-be-called-earlier.patch 5b4db308-SVM-fix-cleanup-svm_inject_event.patch 5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch 5b5040f2-x86-AMD-distinguish-CU-from-HT.patch 5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch 5b508775-2-x86-possibly-bring-up-all-CPUs.patch 5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch 5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch 5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch 5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch gcc8-fix-format-warning-on-i586.patch gcc8-fix-array-warning-on-i586.patch - Drop xen.fuzz-_FORTIFY_SOURCE.patch gcc8-fix-warning-on-i586.patch- Update to Xen 4.11.0 FCS (fate#325202, fate#325123) xen-4.11.0-testing-src.tar.bz2 disable-building-pv-shim.patch - Dropped patches 5a33a12f-domctl-improve-locking-during-domain-destruction.patch 5a6703cb-x86-move-invocations-of-hvm_flush_guest_tlbs.patch 5a79d7ed-libxc-packed-initrd-dont-fail-domain-creation.patch 5a9985bd-x86-invpcid-support.patch 5ac72a48-gcc8.patch 5ac72a5f-gcc8.patch 5ac72a64-gcc8.patch 5ac72a69-gcc8.patch 5ac72a6e-gcc8.patch 5ac72a74-gcc8.patch 5ac72a7b-gcc8.patch 5ad4923e-x86-correct-S3-resume-ordering.patch 5ad49293-x86-suppress-BTI-mitigations-around-S3.patch 5ad600d4-x86-pv-introduce-x86emul_read_dr.patch 5ad600d4-x86-pv-introduce-x86emul_write_dr.patch 5ad8c3a7-x86-spec_ctrl-update-retpoline-decision-making.patch 5adda097-x86-HPET-fix-race-triggering-ASSERT.patch 5adda0d5-x86-HVM-never-retain-emulated-insn-cache.patch 5adde9ed-xpti-fix-double-fault-handling.patch 5ae06fad-SVM-fix-intercepts-for-SYS-CALL-ENTER-MSRs.patch 5ae31917-x86-cpuidle-init-stats-lock-once.patch 5aeaeae4-introduce-vcpu_sleep_nosync_locked.patch 5aeaeaf0-sched-fix-races-in-vcpu-migration.patch 5aeb2c57-x86-retval-checks-of-set-guest-trapbounce.patch 5aec7393-1-x86-xpti-avoid-copy.patch 5aec7393-2-x86-xpti-write-cr3.patch 5aec744a-3-x86-xpti-per-domain-flag.patch 5aec744a-4-x86-xpti-use-invpcid.patch 5aec744a-5-x86-xpti-no-global-pages.patch 5aec744a-6-x86-xpti-cr3-valid-flag.patch 5aec744a-7-x86-xpti-pv_guest_cr4_to_real_cr4.patch 5aec744b-8-x86-xpti-cr3-helpers.patch 5aec74a8-9-x86-xpti-use-pcid.patch 5af1daa9-1-x86-traps-fix-dr6-handing-in-DB-handler.patch 5af1daa9-2-x86-pv-move-exception-injection-into-test_all_events.patch 5af1daa9-3-x86-traps-use-IST-for-DB.patch 5af1daa9-4-x86-traps-fix-handling-of-DB-in-hypervisor-context.patch 5af1daa9-x86-HVM-guard-against-bogus-emulator-ioreq-state.patch 5af1daa9-x86-vpt-support-IO-APIC-routed-intr.patch 5af97999-viridian-cpuid-leaf-40000003.patch 5afc13ae-1-x86-read-MSR_ARCH_CAPABILITIES-once.patch 5afc13ae-2-x86-express-Xen-SPEC_CTRL-choice-as-variable.patch 5afc13ae-3-x86-merge-bti_ist_info-use_shadow_spec_ctrl.patch 5afc13ae-4-x86-fold-XEN_IBRS-ALTERNATIVES.patch 5afc13ae-5-x86-rename-bits-of-spec_ctrl-infrastructure.patch 5afc13ae-6-x86-elide-MSR_SPEC_CTRL-handling-in-idle.patch 5afc13ae-7-x86-split-X86_FEATURE_SC_MSR.patch 5afc13ae-8-x86-explicitly-set-Xen-default-SPEC_CTRL.patch 5afc13ae-9-x86-cpuid-improve-guest-policies-for-speculative.patch 5afc13ae-A-x86-introduce-spec-ctrl-cmdline-opt.patch 5b02c786-x86-AMD-mitigations-for-GPZ-SP4.patch 5b02c786-x86-Intel-mitigations-for-GPZ-SP4.patch 5b02c786-x86-msr-virtualise-SPEC_CTRL-SSBD.patch 5b0bc9da-x86-XPTI-fix-S3-resume.patch 5b0d2286-libxc-x86-PV-dont-hand-through-CPUID-leaf-0x80000008.patch 5b0d2d91-x86-suppress-sync-when-XPTI-off.patch 5b0d2dbc-x86-correct-default_xen_spec_ctrl.patch 5b0d2ddc-x86-CPUID-dont-override-tool-stack-hidden-STIBP.patch 5b150ef9-x86-fix-error-handling-of-pv-dr7-shadow.patch 5b21825d-1-x86-support-fully-eager-FPU-context-switching.patch 5b21825d-2-x86-spec-ctrl-mitigations-for-LazyFPU.patch 5b238b92-x86-HVM-account-for-fully-eager-FPU.patch 5b2b7172-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b31e004-x86-HVM-emul-attempts-FPU-set-fpu_initialised.patch 5b323e3c-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b34882d-x86-mm-dont-bypass-preemption-checks.patch 5b348874-x86-refine-checks-in-DB-handler.patch 5b348897-libxl-qemu_disk_scsi_drive_string-break-out-common.patch 5b3488a2-libxl-restore-passing-ro-to-qemu-for-SCSI-disks.patch 5b34891a-x86-HVM-dont-cause-NM-to-be-raised.patch 5b348954-x86-guard-against-NM.patch libxl.Add-a-version-check-of-QEMU-for-QMP-commands.patch libxl.LIBXL_DESTROY_TIMEOUT.patch libxl.qmp-Tell-QEMU-about-live-migration-or-snapshot.patch xen_fix_build_with_acpica_20180427_and_new_packages.patch- Submit upstream patch libacpi: fixes for iasl >= 20180427 git commit 858dbaaeda33b05c1ac80aea0ba9a03924e09005 xen_fix_build_with_acpica_20180427_and_new_packages.patch This is needed for acpica package to get updated in our build service- Upstream patches from Jan (bsc#1027519) 5b02c786-x86-AMD-mitigations-for-GPZ-SP4.patch (Replaces Spectre-v4-1.patch) 5b02c786-x86-Intel-mitigations-for-GPZ-SP4.patch (Replaces Spectre-v4-2.patch) 5b02c786-x86-msr-virtualise-SPEC_CTRL-SSBD.patch (Replaces Spectre-v4-3.patch) 5b0bc9da-x86-XPTI-fix-S3-resume.patch 5b0d2286-libxc-x86-PV-dont-hand-through-CPUID-leaf-0x80000008.patch 5b0d2d91-x86-suppress-sync-when-XPTI-off.patch 5b0d2dbc-x86-correct-default_xen_spec_ctrl.patch 5b0d2ddc-x86-CPUID-dont-override-tool-stack-hidden-STIBP.patch 5b150ef9-x86-fix-error-handling-of-pv-dr7-shadow.patch 5b21825d-1-x86-support-fully-eager-FPU-context-switching.patch (Replaces xsa267-1.patch) 5b21825d-2-x86-spec-ctrl-mitigations-for-LazyFPU.patch (Replaces xsa267-2.patch) 5b238b92-x86-HVM-account-for-fully-eager-FPU.patch 5b2b7172-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b31e004-x86-HVM-emul-attempts-FPU-set-fpu_initialised.patch 5b323e3c-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b34882d-x86-mm-dont-bypass-preemption-checks.patch (Replaces xsa264.patch) 5b348874-x86-refine-checks-in-DB-handler.patch (Replaces xsa265.patch) 5b348897-libxl-qemu_disk_scsi_drive_string-break-out-common.patch (Replaces xsa266-1-<>.patch) 5b3488a2-libxl-restore-passing-ro-to-qemu-for-SCSI-disks.patch (Replaces xsa266-2-<>.patch) 5b34891a-x86-HVM-dont-cause-NM-to-be-raised.patch 5b348954-x86-guard-against-NM.patch- Fix more build gcc8 related failures with xen.fuzz-_FORTIFY_SOURCE.patch- bsc#1098403 - fix regression introduced by changes for bsc#1079730 a PV domU without qcow2 and/or vfb has no qemu attached. Ignore QMP errors for PV domUs to handle PV domUs with and without an attached qemu-xen. xen.bug1079730.patch- bsc#1097521 - VUL-0: CVE-2018-12891: xen: preemption checks bypassed in x86 PV MM handling (XSA-264) xsa264.patch - bsc#1097522 - VUL-0: CVE-2018-12893: xen: x86: #DB exception safety check can be triggered by a guest (XSA-265) xsa265.patch - bsc#1097523 - VUL-0: CVE-2018-12892: xen: libxl fails to honour readonly flag on HVM emulated SCSI disks (XSA-266) xsa266-1-libxl-qemu_disk_scsi_drive_string-Break-out-common-p.patch xsa266-2-libxl-restore-passing-readonly-to-qemu-for-SCSI-disk.patch- bsc#1095242 - VUL-0: CVE-2018-3665: xen: Lazy FP Save/Restore (XSA-267) xsa267-1.patch xsa267-2.patch- bsc#1092543 - GCC 8: xen build fails gcc8-fix-warning-on-i586.patch- bsc#1092631 - VUL-0: CVE-2018-3639: xen: V4 – Speculative Store Bypass aka "Memory Disambiguation" (XSA-263) 5ad4923e-x86-correct-S3-resume-ordering.patch 5ad49293-x86-suppress-BTI-mitigations-around-S3.patch 5afc13ae-1-x86-read-MSR_ARCH_CAPABILITIES-once.patch 5afc13ae-2-x86-express-Xen-SPEC_CTRL-choice-as-variable.patch 5afc13ae-3-x86-merge-bti_ist_info-use_shadow_spec_ctrl.patch 5afc13ae-4-x86-fold-XEN_IBRS-ALTERNATIVES.patch 5afc13ae-5-x86-rename-bits-of-spec_ctrl-infrastructure.patch 5afc13ae-6-x86-elide-MSR_SPEC_CTRL-handling-in-idle.patch 5afc13ae-7-x86-split-X86_FEATURE_SC_MSR.patch 5afc13ae-8-x86-explicitly-set-Xen-default-SPEC_CTRL.patch 5afc13ae-9-x86-cpuid-improve-guest-policies-for-speculative.patch 5afc13ae-A-x86-introduce-spec-ctrl-cmdline-opt.patch Spectre-v4-1.patch Spectre-v4-2.patch Spectre-v4-3.patch- Always call qemus xen-save-devices-state in suspend/resume to fix migration with qcow2 images (bsc#1079730) libxl.Add-a-version-check-of-QEMU-for-QMP-commands.patch libxl.qmp-Tell-QEMU-about-live-migration-or-snapshot.patch xen.bug1079730.patch- bsc#1087289 - L3: Xen BUG at sched_credit.c:1663 5aeaeae4-introduce-vcpu_sleep_nosync_locked.patch 5aeaeaf0-sched-fix-races-in-vcpu-migration.patch - Upstream patches from Jan (bsc#1027519) 5ad600d4-x86-pv-introduce-x86emul_read_dr.patch 5ad600d4-x86-pv-introduce-x86emul_write_dr.patch 5ad8c3a7-x86-spec_ctrl-update-retpoline-decision-making.patch 5adda097-x86-HPET-fix-race-triggering-ASSERT.patch 5adda0d5-x86-HVM-never-retain-emulated-insn-cache.patch 5ae06fad-SVM-fix-intercepts-for-SYS-CALL-ENTER-MSRs.patch 5ae31917-x86-cpuidle-init-stats-lock-once.patch 5aeb2c57-x86-retval-checks-of-set-guest-trapbounce.patch 5af1daa9-1-x86-traps-fix-dr6-handing-in-DB-handler.patch (Replaces xsa260-1.patch) 5af1daa9-2-x86-pv-move-exception-injection-into-test_all_events.patch (Replaces xsa260-2.patch) 5af1daa9-3-x86-traps-use-IST-for-DB.patch (Replaces xsa260-3.patch) 5af1daa9-4-x86-traps-fix-handling-of-DB-in-hypervisor-context.patch (Replaces xsa260-4.patch) 5af1daa9-x86-HVM-guard-against-bogus-emulator-ioreq-state.patch (Replaces xsa262.patch) 5af1daa9-x86-vpt-support-IO-APIC-routed-intr.patch (Replaces xsa261.patch) 5af97999-viridian-cpuid-leaf-40000003.patch- Fixes related to Page Table Isolation (XPTI). bsc#1074562 XSA-254 5a6703cb-x86-move-invocations-of-hvm_flush_guest_tlbs.patch 5a9985bd-x86-invpcid-support.patch 5adde9ed-xpti-fix-double-fault-handling.patch 5aec7393-1-x86-xpti-avoid-copy.patch 5aec7393-2-x86-xpti-write-cr3.patch 5aec744a-3-x86-xpti-per-domain-flag.patch 5aec744a-4-x86-xpti-use-invpcid.patch 5aec744a-5-x86-xpti-no-global-pages.patch 5aec744a-6-x86-xpti-cr3-valid-flag.patch 5aec744a-7-x86-xpti-pv_guest_cr4_to_real_cr4.patch 5aec744b-8-x86-xpti-cr3-helpers.patch 5aec74a8-9-x86-xpti-use-pcid.patch- bsc#1092543 - GCC 8: xen build fails 5ac72a48-gcc8.patch 5ac72a5f-gcc8.patch 5ac72a64-gcc8.patch 5ac72a69-gcc8.patch 5ac72a6e-gcc8.patch 5ac72a74-gcc8.patch 5ac72a7b-gcc8.patch gcc8-inlining-failed.patch- Update to Xen 4.10.1 bug fix release (bsc#1027519) xen-4.10.1-testing-src.tar.bz2 disable-building-pv-shim.patch - Drop the following patches contained in the new tarball 5a21a77e-x86-pv-construct-d0v0s-GDT-properly.patch 5a2fda0d-x86-mb2-avoid-Xen-when-looking-for-module-crashkernel-pos.patch 5a2ffc1f-x86-mm-drop-bogus-paging-mode-assertion.patch 5a313972-x86-microcode-add-support-for-AMD-Fam17.patch 5a32bd79-x86-vmx-dont-use-hvm_inject_hw_exception-in-.patch 5a4caa5e-x86-IRQ-conditionally-preserve-access-perm.patch 5a4caa8c-x86-E820-don-t-overrun-array.patch 5a4e2bca-x86-free-msr_vcpu_policy-during-destruction.patch 5a4e2c2c-x86-upcall-inject-spurious-event-after-setting-vector.patch 5a4fd893-1-x86-break-out-alternative-asm-into-separate-header.patch 5a4fd893-2-x86-introduce-ALTERNATIVE_2-macros.patch 5a4fd893-3-x86-hvm-rename-update_guest_vendor-to-cpuid_policy_changed.patch 5a4fd893-4-x86-introduce-cpuid_policy_updated.patch 5a4fd893-5-x86-entry-remove-partial-cpu_user_regs.patch 5a4fd894-1-x86-rearrange-RESTORE_ALL-to-restore-in-stack-order.patch 5a4fd894-2-x86-hvm-use-SAVE_ALL-after-VMExit.patch 5a4fd894-3-x86-erase-guest-GPRs-on-entry-to-Xen.patch 5a4fd894-4-clarifications-to-wait-infrastructure.patch 5a534c78-x86-dont-use-incorrect-CPUID-values-for-topology.patch 5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4-updates.patch 5a5e2cff-x86-Meltdown-band-aid.patch 5a5e2d73-x86-Meltdown-band-aid-conditional.patch 5a5e3a4e-1-x86-support-compiling-with-indirect-branch-thunks.patch 5a5e3a4e-2-x86-support-indirect-thunks-from-asm.patch 5a5e3a4e-3-x86-report-speculative-mitigation-details.patch 5a5e3a4e-4-x86-AMD-set-lfence-as-Dispatch-Serialising.patch 5a5e3a4e-5-x86-introduce-alternative-indirect-thunks.patch 5a5e3a4e-6-x86-definitions-for-Indirect-Branch-Controls.patch 5a5e3a4e-7-x86-cmdline-opt-to-disable-IBRS-IBPB-STIBP.patch 5a5e459c-1-x86-SVM-offer-CPUID-faulting-to-AMD-HVM-guests.patch 5a5e459c-2-x86-report-domain-id-on-CPUID.patch 5a68bc16-x86-acpi-process-softirqs-logging-Cx.patch 5a69c0b9-x86-fix-GET_STACK_END.patch 5a6b36cd-1-x86-cpuid-handling-of-IBRS-IBPB-STIBP-and-IBRS-for-guests.patch 5a6b36cd-2-x86-msr-emulation-of-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-3-x86-migrate-MSR_SPEC_CTRL.patch 5a6b36cd-4-x86-hvm-permit-direct-access-to-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-5-x86-use-SPEC_CTRL-on-entry.patch 5a6b36cd-6-x86-clobber-RSB-RAS-on-entry.patch 5a6b36cd-7-x86-no-alternatives-in-NMI-MC-paths.patch 5a6b36cd-8-x86-boot-calculate-best-BTI-mitigation.patch 5a6b36cd-9-x86-issue-speculation-barrier.patch 5a6b36cd-A-x86-offer-Indirect-Branch-Controls-to-guests.patch 5a6b36cd-B-x86-clear-SPEC_CTRL-while-idle.patch 5a7b1bdd-x86-reduce-Meltdown-band-aid-IPI-overhead.patch 5a843807-x86-spec_ctrl-fix-bugs-in-SPEC_CTRL_ENTRY_FROM_INTR_IST.patch 5a856a2b-x86-emul-fix-64bit-decoding-of-segment-overrides.patch 5a856a2b-x86-use-32bit-xors-for-clearing-GPRs.patch 5a856a2b-x86-xpti-hide-almost-all-of-Xen-image-mappings.patch 5a8be788-x86-nmi-start-NMI-watchdog-on-CPU0-after-SMP.patch 5a95373b-x86-PV-avoid-leaking-other-guests-MSR_TSC_AUX.patch 5a95571f-memory-dont-implicitly-unpin-in-decrease-res.patch 5a95576c-gnttab-ARM-dont-corrupt-shared-GFN-array.patch 5a955800-gnttab-dont-free-status-pages-on-ver-change.patch 5a955854-x86-disallow-HVM-creation-without-LAPIC-emul.patch 5a956747-x86-HVM-dont-give-wrong-impression-of-WRMSR-success.patch 5a9eb7f1-x86-xpti-dont-map-stack-guard-pages.patch 5a9eb85c-x86-slightly-reduce-XPTI-overhead.patch 5a9eb890-x86-remove-CR-reads-from-exit-to-guest-path.patch 5aa2b6b9-cpufreq-ondemand-CPU-offlining-race.patch 5aaa9878-x86-vlapic-clear-TMR-bit-for-edge-triggered-intr.patch xsa258.patch xsa259.patch- bsc#1090820 - VUL-0: CVE-2018-8897: xen: x86: mishandling of debug exceptions (XSA-260) xsa260-1.patch xsa260-2.patch xsa260-3.patch xsa260-4.patch - bsc#1090822 - VUL-0: CVE-2018-10982: xen: x86 vHPET interrupt injection errors (XSA-261) xsa261.patch - bsc#1090823 - VUL-0: CVE-2018-10981: xen: qemu may drive Xen into unbounded loop (XSA-262) xsa262.patch- bsc#1089152 - VUL-0: CVE-2018-10472: xen: Information leak via crafted user-supplied CDROM (XSA-258) xsa258.patch - bsc#1089635 - VUL-0: CVE-2018-10471: xen: x86: PV guest may crash Xen with XPTI (XSA-259) xsa259.patch- Preserve xen-syms from xen-dbg.gz to allow processing vmcores with crash(1) (bsc#1087251)- Upstream patches from Jan (bsc#1027519) and fixes related to Page Table Isolation (XPTI). See also bsc#1074562 XSA-254 5a856a2b-x86-xpti-hide-almost-all-of-Xen-image-mappings.patch 5a9eb7f1-x86-xpti-dont-map-stack-guard-pages.patch 5a9eb85c-x86-slightly-reduce-XPTI-overhead.patch 5a9eb890-x86-remove-CR-reads-from-exit-to-guest-path.patch 5aa2b6b9-cpufreq-ondemand-CPU-offlining-race.patch 5aaa9878-x86-vlapic-clear-TMR-bit-for-edge-triggered-intr.patch- bsc#1072834 - Xen HVM: unchecked MSR access error: RDMSR from 0xc90 at rIP: 0xffffffff93061456 (native_read_msr+0x6/0x30) 5a956747-x86-HVM-dont-give-wrong-impression-of-WRMSR-success.patch - Upstream patches from Jan (bsc#1027519) 5a79d7ed-libxc-packed-initrd-dont-fail-domain-creation.patch 5a7b1bdd-x86-reduce-Meltdown-band-aid-IPI-overhead.patch 5a843807-x86-spec_ctrl-fix-bugs-in-SPEC_CTRL_ENTRY_FROM_INTR_IST.patch 5a856a2b-x86-emul-fix-64bit-decoding-of-segment-overrides.patch 5a856a2b-x86-use-32bit-xors-for-clearing-GPRs.patch 5a8be788-x86-nmi-start-NMI-watchdog-on-CPU0-after-SMP.patch 5a95373b-x86-PV-avoid-leaking-other-guests-MSR_TSC_AUX.patch 5a95571f-memory-dont-implicitly-unpin-in-decrease-res.patch (Replaces xsa252.patch) 5a95576c-gnttab-ARM-dont-corrupt-shared-GFN-array.patch (Replaces xsa255-1.patch) 5a955800-gnttab-dont-free-status-pages-on-ver-change.patch (Replaces xsa255-2.patch) 5a955854-x86-disallow-HVM-creation-without-LAPIC-emul.patch (Replaces xsa256.patch) - Drop xsa252.patch xsa255-1.patch xsa255-2.patch xsa256.patch- bsc#1080635 - VUL-0: CVE-2018-7540: xen: DoS via non-preemptable L3/L4 pagetable freeing (XSA-252) xsa252.patch - bsc#1080662 - VUL-0: CVE-2018-7541: xen: grant table v2 -> v1 transition may crash Xen (XSA-255) xsa255-1.patch xsa255-2.patch - bsc#1080634 - VUL-0: CVE-2018-7542: xen: x86 PVH guest without LAPIC may DoS the host (XSA-256) xsa256.patch- Remove stale systemd presets code for 13.2 and older- fate#324965 - add script, udev rule and systemd service to watch for vcpu online/offline events in a HVM domU They are triggered via xl vcpu-set domU N- Replace hardcoded xen with Name tag when refering to subpkgs- Make sure tools and tools-domU require libs from the very same build- tools-domU: Add support for qemu guest agent. New files 80-xen-channel-setup.rules and xen-channel-setup.sh configure a xen-pv-channel for use by the guest agent FATE#324963- Remove outdated /etc/xen/README*- bsc#1073961 - VUL-0: CVE-2018-5244: xen: x86: memory leak with MSR emulation (XSA-253) 5a4e2bca-x86-free-msr_vcpu_policy-during-destruction.patch - bsc#1074562 - VUL-0: CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 xen: Information leak via side effects of speculative execution (XSA-254). Includes Spectre v2 mitigation. 5a4caa5e-x86-IRQ-conditionally-preserve-access-perm.patch 5a4caa8c-x86-E820-don-t-overrun-array.patch 5a4e2c2c-x86-upcall-inject-spurious-event-after-setting-vector.patch 5a4fd893-1-x86-break-out-alternative-asm-into-separate-header.patch 5a4fd893-2-x86-introduce-ALTERNATIVE_2-macros.patch 5a4fd893-3-x86-hvm-rename-update_guest_vendor-to-cpuid_policy_changed.patch 5a4fd893-4-x86-introduce-cpuid_policy_updated.patch 5a4fd893-5-x86-entry-remove-partial-cpu_user_regs.patch 5a4fd894-1-x86-rearrange-RESTORE_ALL-to-restore-in-stack-order.patch 5a4fd894-2-x86-hvm-use-SAVE_ALL-after-VMExit.patch 5a4fd894-3-x86-erase-guest-GPRs-on-entry-to-Xen.patch 5a4fd894-4-clarifications-to-wait-infrastructure.patch 5a534c78-x86-dont-use-incorrect-CPUID-values-for-topology.patch 5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4-updates.patch 5a5e2cff-x86-Meltdown-band-aid.patch 5a5e2d73-x86-Meltdown-band-aid-conditional.patch 5a5e3a4e-1-x86-support-compiling-with-indirect-branch-thunks.patch 5a5e3a4e-2-x86-support-indirect-thunks-from-asm.patch 5a5e3a4e-3-x86-report-speculative-mitigation-details.patch 5a5e3a4e-4-x86-AMD-set-lfence-as-Dispatch-Serialising.patch 5a5e3a4e-5-x86-introduce-alternative-indirect-thunks.patch 5a5e3a4e-6-x86-definitions-for-Indirect-Branch-Controls.patch 5a5e3a4e-7-x86-cmdline-opt-to-disable-IBRS-IBPB-STIBP.patch 5a5e459c-1-x86-SVM-offer-CPUID-faulting-to-AMD-HVM-guests.patch 5a5e459c-2-x86-report-domain-id-on-CPUID.patch 5a68bc16-x86-acpi-process-softirqs-logging-Cx.patch 5a69c0b9-x86-fix-GET_STACK_END.patch 5a6b36cd-1-x86-cpuid-handling-of-IBRS-IBPB-STIBP-and-IBRS-for-guests.patch 5a6b36cd-2-x86-msr-emulation-of-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-3-x86-migrate-MSR_SPEC_CTRL.patch 5a6b36cd-4-x86-hvm-permit-direct-access-to-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-5-x86-use-SPEC_CTRL-on-entry.patch 5a6b36cd-6-x86-clobber-RSB-RAS-on-entry.patch 5a6b36cd-7-x86-no-alternatives-in-NMI-MC-paths.patch 5a6b36cd-8-x86-boot-calculate-best-BTI-mitigation.patch 5a6b36cd-9-x86-issue-speculation-barrier.patch 5a6b36cd-A-x86-offer-Indirect-Branch-Controls-to-guests.patch 5a6b36cd-B-x86-clear-SPEC_CTRL-while-idle.patch- Fix python3 deprecated atoi call (bsc#1067224) pygrub-python3-conversion.patch - Drop xenmon-python3-conversion.patch- bsc#1067317 - pass cache=writeback|unsafe|directsync to qemu, depending on the libxl disk settings libxl.add-option-to-disable-disk-cache-flushes-in-qdisk.patch- Remove libxl.LIBXL_DESTROY_TIMEOUT.debug.patch- bsc#1067224 - xen-tools have hard dependency on Python 2 build-python3-conversion.patch bin-python3-conversion.patch- bsc#1070165 - xen crashes after aborted localhost migration 5a2ffc1f-x86-mm-drop-bogus-paging-mode-assertion.patch - bsc#1035442 - L3: libxl: error: libxl.c:1676:devices_destroy_cb: libxl__devices_destroy failed 5a33a12f-domctl-improve-locking-during-domain-destruction.patch - Upstream patches from Jan (bsc#1027519) 5a21a77e-x86-pv-construct-d0v0s-GDT-properly.patch 5a2fda0d-x86-mb2-avoid-Xen-when-looking-for-module-crashkernel-pos.patch 5a313972-x86-microcode-add-support-for-AMD-Fam17.patch 5a32bd79-x86-vmx-dont-use-hvm_inject_hw_exception-in-.patch- Update to Xen 4.10.0 FCS (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Rebuild initrd if xen-tools-domU is updated- Update to Xen 4.10.0-rc8 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Increase the value of LIBXL_DESTROY_TIMEOUT from 10 to 100 seconds If many domUs shutdown in parallel the backends can not keep up Add some debug output to track how long backend shutdown takes (bsc#1035442) libxl.LIBXL_DESTROY_TIMEOUT.patch libxl.LIBXL_DESTROY_TIMEOUT.debug.patch- Adjust xenstore-run-in-studomain.patch to change the defaults in the code instead of changing the sysconfig template, to also cover the upgrade case- Update to Xen 4.10.0-rc6 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Since xen switched to Kconfig, building a debug hypervisor was done by default. Adjust make logic to build a non-debug hypervisor by default, and continue to provide one as xen-dbg.gz- fate#316614: set migration constraints from cmdline fix libxl.set-migration-constraints-from-cmdline.patch for xen-4.10- Document the suse-diskcache-disable-flush option in xl-disk-configuration(5) (bsc#879425,bsc#1067317)- Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468)- Update to Xen 4.10.0-rc5 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - fate#323663 - Run Xenstore in stubdomain xenstore-run-in-studomain.patch- bsc#1067224 - xen-tools have hard dependency on Python 2 pygrub-python3-conversion.patch xenmon-python3-conversion.patch migration-python3-conversion.patch xnloader.py xen2libvirt.py- Remove xendriverdomain.service (bsc#1065185) Driver domains must be configured manually with custom .service file- Update to Xen 4.10.0-rc3 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - Drop 59f31268-libxc-remove-stale-error-check-for-domain-size.patch- Adjust xen-dom0-modules.service to ignore errors (bsc#1065187)- fate#324052 Support migration of Xen HVM domains larger than 1TB 59f31268-libxc-remove-stale-error-check-for-domain-size.patch- Update to Xen 4.10.0-rc2 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Update to Xen 4.10.0-rc1 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - Drop patches included in new tarball 592fd5f0-stop_machine-fill-result-only-in-case-of-error.patch 596f257e-x86-fix-hvmemul_insn_fetch.patch 5982fd99-VT-d-don-t-panic-warn-on-iommu-no-igfx.patch 598c3630-VT-d-PI-disable-when-CPU-side-PI-is-off.patch 598c3706-cpufreq-only-stop-ondemand-governor-if-started.patch 5992f1e5-x86-grant-disallow-misaligned-PTEs.patch 5992f20d-gnttab-split-maptrack-lock-to-make-it-useful-again.patch 5992f233-gnttab-correct-pin-status-fixup-for-copy.patch 59958e76-gnttab-dont-use-possibly-unbounded-tail-calls.patch 59958ebf-gnttab-fix-transitive-grant-handling.patch 59958edd-gnttab-avoid-spurious-maptrack-handle-alloc-failures.patch 599da329-arm-mm-release-grant-lock-on-xatp1-error-paths.patch 59a01223-x86-check-for-alloc-errors-in-modify_xen_mappings.patch 59a0130c-x86-efi-dont-write-relocs-in-efi_arch_relocate_image-1st-pass.patch 59a9221f-VT-d-use-correct-BDF-for-VF-to-search-VT-d-unit.patch 59ae9177-x86-emul-fix-handling-of-unimplemented-Grp7-insns.patch 59aec335-x86emul-correct-VEX-W-handling-for-VPINSRD.patch 59aec375-x86emul-correct-VEX-L-handling-for-VCVTx2SI.patch 59afcea0-x86-introduce-and-use-setup_force_cpu_cap.patch 59b2a7f2-x86-HVM-correct-repeat-count-update-linear-phys.patch 59b7d664-mm-make-sure-node-is-less-than-MAX_NUMNODES.patch 59b7d69b-grant_table-fix-GNTTABOP_cache_flush-handling.patch 59b7d6c8-xenstore-dont-unlink-connection-object-twice.patch 59b7d6d9-gnttab-also-validate-PTE-perms-upon-destroy-replace.patch gcc7-arm.patch gcc7-mini-os.patch- bsc#1061084 - VUL-0: xen: page type reference leak on x86 (XSA-242) xsa242.patch - bsc#1061086 - VUL-0: xen: x86: Incorrect handling of self-linear shadow mappings with translated guests (XSA-243) xsa243.patch - bsc#1061087 - VUL-0: xen: x86: Incorrect handling of IST settings during CPU hotplug (XSA-244) xsa244.patch- bsc#1061077 - VUL-0: xen: DMOP map/unmap missing argument checks (XSA-238) xsa238.patch - bsc#1061080 - VUL-0: xen: hypervisor stack leak in x86 I/O intercept code (XSA-239) xsa239.patch - bsc#1061081 - VUL-0: xen: Unlimited recursion in linear pagetable de-typing (XSA-240) xsa240-1.patch xsa240-2.patch - bsc#1061082 - VUL-0: xen: Stale TLB entry due to page type release race (XSA-241) xsa241.patch- bsc#1061075 - VUL-0: xen: pin count / page reference race in grant table code (XSA-236) xsa236.patch - bsc#1061076 - VUL-0: xen: multiple MSI mapping issues on x86 (XSA-237) xsa237-1.patch xsa237-2.patch xsa237-3.patch xsa237-4.patch xsa237-5.patch- bsc#1056278 - VUL-0: xen: Missing NUMA node parameter verification (XSA-231) 59b7d664-mm-make-sure-node-is-less-than-MAX_NUMNODES.patch - bsc#1056280 - VUL-0: xen: Missing check for grant table (XSA-232) 59b7d69b-grant_table-fix-GNTTABOP_cache_flush-handling.patch - bsc#1056281 - VUL-0: xen: cxenstored: Race in domain cleanup (XSA-233) 59b7d6c8-xenstore-dont-unlink-connection-object-twice.patch - bsc#1056282 - VUL-0: xen: insufficient grant unmapping checks for x86 PV guests (XSA-234) 59b7d6d9-gnttab-also-validate-PTE-perms-upon-destroy-replace.patch - bsc#1055321 - VUL-0: xen: add-to-physmap error paths fail to release lock on ARM (XSA-235) 599da329-arm-mm-release-grant-lock-on-xatp1-error-paths.patch - Upstream patches from Jan (bsc#1027519) 59a01223-x86-check-for-alloc-errors-in-modify_xen_mappings.patch 59a0130c-x86-efi-dont-write-relocs-in-efi_arch_relocate_image-1st-pass.patch 59a9221f-VT-d-use-correct-BDF-for-VF-to-search-VT-d-unit.patch 59ae9177-x86-emul-fix-handling-of-unimplemented-Grp7-insns.patch 59aec335-x86emul-correct-VEX-W-handling-for-VPINSRD.patch 59aec375-x86emul-correct-VEX-L-handling-for-VCVTx2SI.patch 59afcea0-x86-introduce-and-use-setup_force_cpu_cap.patch 59b2a7f2-x86-HVM-correct-repeat-count-update-linear-phys.patch - Dropped gcc7-xen.patch- bsc#1057358 - Cannot Boot into SLES12.3 with Xen hypervisor when Secure Boot is Enabled xen.spec- bsc#1055695 - XEN: 11SP4 and 12SP3 HVM guests can not be restored update from v6 to v9 to cover more cases for ballooned domUs libxc.sr.superpage.patch- bsc#1026236 - remove suse_vtsc_tolerance= cmdline option for Xen drop the patch because it is not upstream acceptable remove xen.suse_vtsc_tolerance.patch- bsc#1055695 - XEN: 11SP4 and 12SP3 HVM guests can not be restored after the save using xl stack libxc.sr.superpage.patch- Unignore gcc-PIE the toolstack disables PIE for firmware builds as needed- Upstream patches from Jan (bsc#1027519) 592fd5f0-stop_machine-fill-result-only-in-case-of-error.patch 596f257e-x86-fix-hvmemul_insn_fetch.patch 5982fd99-VT-d-don-t-panic-warn-on-iommu-no-igfx.patch 598c3630-VT-d-PI-disable-when-CPU-side-PI-is-off.patch 598c3706-cpufreq-only-stop-ondemand-governor-if-started.patch 5992f1e5-x86-grant-disallow-misaligned-PTEs.patch (Replaces xsa227.patch) 5992f20d-gnttab-split-maptrack-lock-to-make-it-useful-again.patch (Replaces xsa228.patch) 5992f233-gnttab-correct-pin-status-fixup-for-copy.patch (Replaces xsa230.patch) 59958e76-gnttab-dont-use-possibly-unbounded-tail-calls.patch (Replaces xsa226-1.patch) 59958ebf-gnttab-fix-transitive-grant-handling.patch (Replaces xsa226-2.patch) 59958edd-gnttab-avoid-spurious-maptrack-handle-alloc-failures.patch- bsc#1044974 - xen-tools require python-pam xen.spec- Clean up spec file errors and a few warnings. (bsc#1027519) - Removed conditional 'with_systemd' and some old deprecated 'sles_version' checks. xen.spec- Remove use of brctl utiltiy from supportconfig plugin FATE#323639- Use upstream variant of mini-os __udivmoddi4 change gcc7-mini-os.patch- fate#323639 Move bridge-utils to legacy replace-obsolete-network-configuration-commands-in-s.patch- bsc#1052686 - VUL-0: xen: grant_table: possibly premature clearing of GTF_writing / GTF_reading (XSA-230) xsa230.patch- bsc#1035231 - migration of HVM domU does not use superpages on destination dom0 libxc.sr.superpage.patch- bsc#1051787 - VUL-0: CVE-2017-12135: xen: possibly unbounded recursion in grant table code (XSA-226) xsa226-1.patch xsa226-2.patch - bsc#1051788 - VUL-0: CVE-2017-12137: xen: x86: PV privilege escalation via map_grant_ref (XSA-227) xsa227.patch - bsc#1051789 - VUL-0: CVE-2017-12136: xen: grant_table: Race conditions with maptrack free list handling (XSA-228) xsa228.patch- Add a supportconfig plugin xen-supportconfig FATE#323661- bsc#1026236 - add suse_vtsc_tolerance= cmdline option for Xen To avoid emulation of TSC access from a domU after live migration add a global tolerance for the measured host kHz xen.suse_vtsc_tolerance.patch- fate#323662 Drop qemu-dm from xen-tools package The following tarball and patches have been removed qemu-xen-traditional-dir-remote.tar.bz2 VNC-Support-for-ExtendedKeyEvent-client-message.patch 0001-net-move-the-tap-buffer-into-TAPState.patch 0002-net-increase-tap-buffer-size.patch 0003-e1000-fix-access-4-bytes-beyond-buffer-end.patch 0004-e1000-secrc-support.patch 0005-e1000-multi-buffer-packet-support.patch 0006-e1000-clear-EOP-for-multi-buffer-descriptors.patch 0007-e1000-verify-we-have-buffers-upfront.patch 0008-e1000-check-buffer-availability.patch CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch CVE-2015-4037-qemut-smb-config-dir-name.patch CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch CVE-2016-7908-qemut-net-Infinite-loop-in-mcf_fec_do_tx.patch CVE-2016-7909-qemut-net-pcnet-infinite-loop-in-pcnet_rdra_addr.patch CVE-2016-8667-qemut-dma-rc4030-divide-by-zero-error-in-set_next_tick.patch CVE-2016-8669-qemut-char-divide-by-zero-error-in-serial_update_parameters.patch CVE-2016-8910-qemut-net-rtl8139-infinite-loop-while-transmit-in-Cplus-mode.patch CVE-2016-9921-qemut-display-cirrus_vga-divide-by-zero-in-cirrus_do_copy.patch CVE-2017-6505-qemut-usb-an-infinite-loop-issue-in-ohci_service_ed_list.patch CVE-2017-8309-qemut-audio-host-memory-leakage-via-capture-buffer.patch CVE-2017-9330-qemut-usb-ohci-infinite-loop-due-to-incorrect-return-value.patch blktap.patch cdrom-removable.patch xen-qemu-iscsi-fix.patch qemu-security-etch1.patch xen-disable-qemu-monitor.patch xen-hvm-default-bridge.patch qemu-ifup-set-mtu.patch ioemu-vnc-resize.patch capslock_enable.patch altgr_2.patch log-guest-console.patch bdrv_open2_fix_flags.patch bdrv_open2_flags_2.patch ioemu-7615-qcow2-fix-alloc_cluster_link_l2.patch qemu-dm-segfault.patch bdrv_default_rwflag.patch kernel-boot-hvm.patch ioemu-watchdog-support.patch ioemu-watchdog-linkage.patch ioemu-watchdog-ib700-timer.patch ioemu-hvm-pv-support.patch pvdrv_emulation_control.patch ioemu-disable-scsi.patch ioemu-disable-emulated-ide-if-pv.patch xenpaging.qemu.flush-cache.patch ioemu-devicemodel-include.patch - Cleanup spec file and remove unused KMP patches kmp_filelist supported_module.patch xen_pvonhvm.xen_emul_unplug.patch- bsc#1002573 - Optimize LVM functions in block-dmmd block-dmmd- Record initial Xen dmesg in /var/log/xen/xen-boot.log for supportconfig. Keep previous log in /var/log/xen/xen-boot.prev.log- Remove storytelling from description in xen.rpm- Update to Xen 4.9.0 FCS (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update block-dmmd script (bsc#1002573) block-dmmd- Update to Xen 4.9.0-rc8+ (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 gcc7-arm.patch - Drop gcc7-error-xenpmd.patch- Update to Xen 4.9.0-rc8 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1042160 - VUL-1: CVE-2017-9330: xen: usb: ohci: infinite loop due to incorrect return value CVE-2017-9330-qemut-usb-ohci-infinite-loop-due-to-incorrect-return-value.patch- bsc#1037243 - VUL-1: CVE-2017-8309: xen: audio: host memory leakage via capture buffer CVE-2017-8309-qemut-audio-host-memory-leakage-via-capture-buffer.patch- Update to Xen 4.9.0-rc7 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update to Xen 4.9.0-rc6 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1031343 - xen fails to build with GCC 7 gcc7-mini-os.patch gcc7-xen.patch- bsc#1031343 - xen fails to build with GCC 7 gcc7-error-xenpmd.patch- Update to Xen 4.9.0-rc5 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 - Drop xen-tools-pkgconfig-xenlight.patch- bsc#1037779 - xen breaks kexec-tools build xen-tools-pkgconfig-xenlight.patch- Update to Xen 4.9.0-rc4 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1036146 - sles12sp2 xen VM dumps core to wrong path xen.spec- Update to Xen 4.9.0-rc3 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 aarch64-maybe-uninitialized.patch- Update to Xen 4.9.0-rc2 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update to Xen 4.9.0-rc1 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 ioemu-devicemodel-include.patch - Dropped patches contained in new tarball xen-4.8.0-testing-src.tar.bz2 0001-xenstore-let-write_node-and-some-callers-return-errn.patch 0002-xenstore-undo-function-rename.patch 0003-xenstore-rework-of-transaction-handling.patch 584806ce-x86emul-correct-PUSHF-POPF.patch 584fc649-fix-determining-when-domain-creation-is-complete.patch 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch 58510cac-x86emul-MOVNTI-no-REP-prefixes.patch 58526ccc-x86emul-64bit-ignore-most-segment-bases-in-align-check.patch 5853ed37-VT-d-correct-dma_msi_set_affinity.patch 5853ee07-x86emul-CMPXCHG16B-aligned-operand.patch 58580060-x86-emul-correct-SYSCALL-eflags-handling.patch 585aa3c5-x86-force-EFLAGS-IF-on-upon-exit-to-PV.patch 585aa407-x86-HVM-NULL-check-before-using-VMFUNC-hook.patch 585bd5fe-x86-emul-correct-VMFUNC-return-value-handling.patch 586ba81c-x86-cpu-dont-update-this_cpu-for-guest-get_cpu_vendor.patch 587d04d6-x86-xstate-fix-array-overrun-with-LWP.patch 587de4a9-x86emul-VEX-B-ignored-in-compat-mode.patch 5882129d-x86emul-LOCK-check-adjustments.patch 58821300-x86-segment-attribute-handling.patch 58873c1f-x86emul-correct-FPU-stub-asm-constraints.patch 58873c80-x86-hvm-do-not-set-msr_tsc_adjust-on-.patch 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5887888f-credit2-never-consider-CPUs-outside-of-pool.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5888b1b3-x86-emulate-dont-assume-addr_size-32-implies-protmode.patch 5899cbd9-EPT-allow-wrcomb-MMIO-mappings-again.patch 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch 58a44771-IOMMU-always-call-teardown-callback.patch 58a48ccc-x86-fix-p2m_flush_table-for-non-nested.patch 58a59f4b-libxl-correct-xenstore-entry-for-empty-cdrom.patch 58a70d94-VMX-fix-VMCS-race-on-cswitch-paths.patch 58ac1f3f-VMX-dont-leak-host-syscall-MSRs.patch 58b5a2de-x86-correct-Xens-idea-of-its-memory-layout.patch 58b6fd42-credit2-always-mark-a-tickled-pCPU-as-tickled.patch 58b6fd42-credit2-dont-miss-accounting-during-credit-reset.patch 58cbf682-x86-EFI-avoid-overrunning-mb_modules.patch 58cf9200-x86-EFI-avoid-IOMMU-faults-on-tail-gap.patch 58cf9260-x86-EFI-avoid-Xen-when-looking-for-mod-kexec-pos.patch 58cf9277-x86-time-dont-use-vTSC-if-host-guest-freqs-match.patch 58d25ea2-xenstore-add-missing-checks-for-allocation-failure.patch 58d91365-sched-dont-call-wrong-hook-via-VCPU2OP.patch CVE-2017-2615-qemut-display-cirrus-oob-access-while-doing-bitblt-copy-backward-mode.patch CVE-2017-2620-xsa209-qemut-cirrus_bitblt_cputovideo-does-not-check-if-memory-region-safe.patch glibc-2.25-compatibility-fix.patch xs-09-add_change_node-params.patch xs-10-call-add_change_node.patch xs-11-tdb-record-header.patch xs-12-node-gen-count.patch xs-13-read-directory-part-support.patch xs-14-command-array.patch xs-15-command-return-val.patch xs-16-function-static.patch xs-17-arg-parsing.patch xs-18-default-buffer.patch xs-19-handle-alloc-failures.patch xs-20-tdb-version.patch xs-21-empty-tdb-database.patch xs-22-reopen_log-fix.patch xs-23-XS_DEBUG-rename.patch xs-24-xenstored_control.patch xs-25-control-enhance.patch xs-26-log-control.patch xs-27-memory-report.patch xs-28-remove-talloc-report.patch xs-29-define-off_t.patch xsa206-0001-xenstored-apply-a-write-transaction-rate-limit.patch xsa206-0002-xenstored-Log-when-the-write-transaction-rate-limit.patch- bsc#1022703 - Xen HVM guest with OVMF hangs with unattached CDRom 58a59f4b-libxl-correct-xenstore-entry-for-empty-cdrom.patch- bsc#1015348 - L3: libvirtd does not start during boot suse-xendomains-service.patch- bsc#1014136 - Partner-L3: kdump can't dump a kernel on SLES12-SP2 with Xen hypervisor. 58cf9260-x86-EFI-avoid-Xen-when-looking-for-mod-kexec-pos.patch - bsc#1026236 - L3: Paravirtualized vs. fully virtualized migration - latter one much faster 58cf9277-x86-time-dont-use-vTSC-if-host-guest-freqs-match.patch - Upstream patch from Jan 58cbf682-x86-EFI-avoid-overrunning-mb_modules.patch 58cf9200-x86-EFI-avoid-IOMMU-faults-on-tail-gap.patch 58d91365-sched-dont-call-wrong-hook-via-VCPU2OP.patch- bsc#1022555 - L3: Timeout in "execution of /etc/xen/scripts/block add" 58d25ea2-xenstore-add-missing-checks-for-allocation-failure.patch 0001-xenstore-let-write_node-and-some-callers-return-errn.patch 0002-xenstore-undo-function-rename.patch 0003-xenstore-rework-of-transaction-handling.patch - bsc#1030144 - VUL-0: xen: xenstore denial of service via repeated update (XSA-206) xsa206-0001-xenstored-apply-a-write-transaction-rate-limit.patch xsa206-0002-xenstored-Log-when-the-write-transaction-rate-limit.patch - bsc#1029827 - Forward port xenstored xs-09-add_change_node-params.patch xs-10-call-add_change_node.patch xs-11-tdb-record-header.patch xs-12-node-gen-count.patch xs-13-read-directory-part-support.patch xs-14-command-array.patch xs-15-command-return-val.patch xs-16-function-static.patch xs-17-arg-parsing.patch xs-18-default-buffer.patch xs-19-handle-alloc-failures.patch xs-20-tdb-version.patch xs-21-empty-tdb-database.patch xs-22-reopen_log-fix.patch xs-23-XS_DEBUG-rename.patch xs-24-xenstored_control.patch xs-25-control-enhance.patch xs-26-log-control.patch xs-27-memory-report.patch xs-28-remove-talloc-report.patch xs-29-define-off_t.patch- bsc#1029128 - fix make xen to really produce xen.efi with gcc48- bsc#1028235 - VUL-0: CVE-2017-6505: xen: qemu: usb: an infinite loop issue in ohci_service_ed_list CVE-2017-6505-qemut-usb-an-infinite-loop-issue-in-ohci_service_ed_list.patch - Upstream patches from Jan (bsc#1027519) 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5899cbd9-EPT-allow-wrcomb-MMIO-mappings-again.patch 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch 58a44771-IOMMU-always-call-teardown-callback.patch 58a48ccc-x86-fix-p2m_flush_table-for-non-nested.patch 58a70d94-VMX-fix-VMCS-race-on-cswitch-paths.patch 58ac1f3f-VMX-dont-leak-host-syscall-MSRs.patch 58b5a2de-x86-correct-Xens-idea-of-its-memory-layout.patch 58b6fd42-credit2-always-mark-a-tickled-pCPU-as-tickled.patch 58b6fd42-credit2-dont-miss-accounting-during-credit-reset.patch- bsc#1027654 - XEN fails to build against glibc 2.25 glibc-2.25-compatibility-fix.patch libxl.pvscsi.patch- fate#316613: Refresh and enable libxl.pvscsi.patch- bsc#1024834 - VUL-0: CVE-2017-2620: xen: cirrus_bitblt_cputovideo does not check if memory region is safe (XSA-209) CVE-2017-2620-xsa209-qemut-cirrus_bitblt_cputovideo-does-not-check-if-memory-region-safe.patch- bsc#1023948 - [pvusb][sles12sp3][openqa] Segmentation fault happened when adding usbctrl devices via xl 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch- Upstream patches from Jan (bsc#1027519) 587d04d6-x86-xstate-fix-array-overrun-with-LWP.patch 587de4a9-x86emul-VEX-B-ignored-in-compat-mode.patch 5882129d-x86emul-LOCK-check-adjustments.patch 58821300-x86-segment-attribute-handling.patch 58873c1f-x86emul-correct-FPU-stub-asm-constraints.patch 58873c80-x86-hvm-do-not-set-msr_tsc_adjust-on-.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5887888f-credit2-never-consider-CPUs-outside-of-pool.patch 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5888b1b3-x86-emulate-dont-assume-addr_size-32-implies-protmode.patch- bsc#1023004 - VUL-0: CVE-2017-2615: qemu: display: cirrus: oob access while doing bitblt copy backward mode CVE-2017-2615-qemut-display-cirrus-oob-access-while-doing-bitblt-copy-backward-mode.patch- fate#322313 and fate#322150 require the acpica package ported to aarch64 which Xen 4.8 needs to build. Temporarily disable aarch64 until these fates are complete. xen.spec- bsc#1021952 - Virutalization/xen: Bug xen-tools missing /usr/bin/domu-xenstore; guests fail to launch tmp_build.patch xen.spec- No systemd presets for 42.3+ and SLE12SP3+ (bsc#1012842)- bsc#1007224 - broken symlinks in /usr/share/doc/packages/xen/misc/ xen.spec- 585aa3c5-x86-force-EFLAGS-IF-on-upon-exit-to-PV.patch Replaces xsa202.patch (bsc#1014298) - 585aa407-x86-HVM-NULL-check-before-using-VMFUNC-hook.patch Replaces xsa203.patch (bsc#1014300) - 58580060-x86-emul-correct-SYSCALL-eflags-handling.patch Replaces xsa204.patch (bsc#1016340) - Upstream patches from Jan 58526ccc-x86emul-64bit-ignore-most-segment-bases-in-align-check.patch 5853ed37-VT-d-correct-dma_msi_set_affinity.patch 5853ee07-x86emul-CMPXCHG16B-aligned-operand.patch 585bd5fe-x86-emul-correct-VMFUNC-return-value-handling.patch 586ba81c-x86-cpu-dont-update-this_cpu-for-guest-get_cpu_vendor.patch- bsc#1015169 - VUL-0: CVE-2016-9921, CVE-2016-9922: xen: qemu: display: cirrus_vga: a divide by zero in cirrus_do_copy CVE-2016-9921-qemut-display-cirrus_vga-divide-by-zero-in-cirrus_do_copy.patch- bsc#1016340 - VUL-0: CVE-2016-10013: xen: x86: Mishandling of SYSCALL singlestep during emulation (XSA-204) xsa204.patch- bsc#1012651 - VUL-0: CVE-2016-9932: xen: x86 CMPXCHG8B emulation fails to ignore operand size override (XSA-200) 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch- bsc#1014298 - VUL-0: CVE-2016-10024: xen: x86 PV guests may be able to mask interrupts (XSA-202) xsa202.patch - bsc#1014300 - VUL-0: CVE-2016-10025: xen: x86: missing NULL pointer check in VMFUNC emulation (XSA-203) xsa203.patch - Upstream patches from Jan 584806ce-x86emul-correct-PUSHF-POPF.patch 584fc649-fix-determining-when-domain-creation-is-complete.patch 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch 58510cac-x86emul-MOVNTI-no-REP-prefixes.patch- Update to Xen 4.8 FCS xen-4.8.0-testing-src.tar.bz2 - Dropped xen-4.7.1-testing-src.tar.bz2 0001-libxc-Rework-extra-module-initialisation.patch 0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch 0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch 0004-firmware-makefile-install-BIOS-blob.patch 0005-libxl-Load-guest-BIOS-from-file.patch 0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch 0007-hvmloader-Grab-the-hvm_start_info-pointer.patch 0008-hvmloader-Locate-the-BIOS-blob.patch 0009-hvmloader-Check-modules-whereabouts-in-perform_tests.patch 0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch 0011-hvmloader-Load-OVMF-from-modules.patch 0012-hvmloader-Specific-bios_load-function-required.patch 0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch 0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch 57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch 576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 5769106e-x86-generate-assembler-equates-for-synthesized.patch 57a1e603-x86-time-adjust-local-system-time-initialization.patch 57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch 57a30261-x86-support-newer-Intel-CPU-models.patch 5810a9cc-x86-emul-Correct-decoding-of-SReg3-operands.patch 581b2c3b-x86-emul-reject-LGDT-LIDT-with-non-canonical-addresses.patch 581b647a-x86emul-L-S-G-I-DT-ignore-opsz-overrides-in-64-bit-mode.patch 58249392-x86-svm-dont-clobber-eax-edx-if-RDMSR-intercept-fails.patch 582c35d6-x86-vmx-correct-long-mode-check-in-vmx_cpuid_intercept.patch 582c35ee-x86-traps-dont-call-hvm_hypervisor_cpuid_leaf-for-PV.patch 58343dc2-x86-hvm-Fix-the-handling-of-non-present-segments.patch 58343df8-x86-HVM-dont-load-LDTR-with-VM86-mode-attrs-during-task-switch.patch 58343e24-x86-PV-writes-of-fs-and-gs-base-MSRs-require-canonical-addresses.patch 58343e9e-libelf-fix-stack-memory-leak-when-loading-32-bit-symbol-tables.patch 58343ec2-x86emul-fix-huge-bit-offset-handling.patch 58343f29-x86-emul-correct-the-IDT-entry-calculation-in-inject_swint.patch 58343f44-x86-svm-fix-injection-of-software-interrupts.patch 58343f79-pygrub-Properly-quote-results-when-returning-them-to-the-caller.patch CVE-2016-9381-xsa197-qemut.patch CVE-2016-9637-xsa199-qemut.patch- bsc#1011652 - VUL-0: xen: qemu ioport array overflow CVE-2016-9637-xsa199-qemut.patch- bsc#1009100 - VUL-0: CVE-2016-9386: XSA-191: xen: x86 null segments not always treated as unusable 58343dc2-x86-hvm-Fix-the-handling-of-non-present-segments.patch - bsc#1009103 - VUL-0: CVE-2016-9382: XSA-192: xen: x86 task switch to VM86 mode mis-handled 58343df8-x86-HVM-dont-load-LDTR-with-VM86-mode-attrs-during-task-switch.patch - bsc#1009104 - VUL-0: CVE-2016-9385: XSA-193: xen: x86 segment base write emulation lacking canonical address checks 58343e24-x86-PV-writes-of-fs-and-gs-base-MSRs-require-canonical-addresses.patch - bsc#1009105 - VUL-0: CVE-2016-9384: XSA-194: xen: guest 32-bit ELF symbol table load leaking host data 58343e9e-libelf-fix-stack-memory-leak-when-loading-32-bit-symbol-tables.patch - bsc#1009107 - VUL-0: CVE-2016-9383: XSA-195: xen: x86 64-bit bit test instruction emulation broken 58343ec2-x86emul-fix-huge-bit-offset-handling.patch - bsc#1009108 - VUL-0: CVE-2016-9377,CVE-2016-9378: XSA-196: xen: x86 software interrupt injection mis-handled 58343f29-x86-emul-correct-the-IDT-entry-calculation-in-inject_swint.patch 58343f44-x86-svm-fix-injection-of-software-interrupts.patch - bsc#1009109 - VUL-0: CVE-2016-9381: XSA-197: xen: qemu incautious about shared ring processing CVE-2016-9381-xsa197-qemut.patch - bsc#1009111 - VUL-0: CVE-2016-9379,CVE-2016-9380: XSA-198: xen: delimiter injection vulnerabilities in pygrub 58343f79-pygrub-Properly-quote-results-when-returning-them-to-the-caller.patch - Upstream patches from Jan 581b2c3b-x86-emul-reject-LGDT-LIDT-with-non-canonical-addresses.patch 581b647a-x86emul-L-S-G-I-DT-ignore-opsz-overrides-in-64-bit-mode.patch 58249392-x86-svm-dont-clobber-eax-edx-if-RDMSR-intercept-fails.patch 582c35d6-x86-vmx-correct-long-mode-check-in-vmx_cpuid_intercept.patch 582c35ee-x86-traps-dont-call-hvm_hypervisor_cpuid_leaf-for-PV.patch- Update to Xen Version 4.7.1 xen-4.7.1-testing-src.tar.bz2 - Dropped patches contained in new tarball xen-4.7.0-testing-src.tar.bz2 575e9ca0-nested-vmx-Validate-host-VMX-MSRs-before-accessing-them.patch 57640448-xen-sched-use-default-scheduler-upon-an-invalid-sched.patch 57973099-have-schedulers-revise-initial-placement.patch 579730e6-remove-buggy-initial-placement-algorithm.patch 57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch 57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch 57ac6316-don-t-restrict-DMA-heap-to-node-0.patch 57b71fc5-x86-EFI-don-t-apply-relocations-to-l-2-3-_bootmap.patch 57b7447b-dont-permit-guest-to-populate-PoD-pages-for-itself.patch 57c4412b-x86-HVM-add-guarding-logic-for-VMX-specific-code.patch 57c57f73-libxc-correct-max_pfn-calculation-for-saving-domain.patch 57c805bf-x86-levelling-restrict-non-architectural-OSXSAVE-handling.patch 57c805c1-x86-levelling-pass-vcpu-to-ctxt_switch_levelling.patch 57c805c3-x86-levelling-provide-architectural-OSXSAVE-handling.patch 57c82be2-x86-32on64-adjust-call-gate-emulation.patch 57c93e52-fix-error-in-libxl_device_usbdev_list.patch 57c96df3-credit1-fix-a-race-when-picking-initial-pCPU.patch 57c96e2c-x86-correct-PT_NOTE-file-position.patch 57cfed43-VMX-correct-feature-checks-for-MPX-and-XSAVES.patch 57d1563d-x86-32on64-don-t-allow-recursive-page-tables-from-L3.patch 57d15679-x86-emulate-Correct-boundary-interactions-of-emulated-insns.patch 57d1569a-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch 57d18642-hvm-fep-Allow-test-insns-crossing-1-0-boundary.patch 57d18642-x86-segment-Bounds-check-accesses-to-emulation-ctxt-seg_reg.patch 57d7ca5f-x86-domctl-fix-TOCTOU-race-in-XEN_DOMCTL_getvcpuextstate.patch 57d7ca64-x86-domctl-fix-migration-of-guests-not-using-xsave.patch 57da8883-credit1-fix-mask-to-be-used-for-tickling.patch 57da8883-credit2-properly-schedule-migration-of-running-vcpu.patch 57dfb1c5-x86-Intel-hide-CPUID-faulting-capability-from-guests.patch 57e93e1d-x86emul-correct-loading-of-ss.patch 57e93e4a-x86emul-don-t-allow-null-selector-for-LTR.patch 57e93e89-x86-AMD-apply-erratum-665-workaround.patch 57ee6cbc-credit1-return-time-remaining-to-limit-as-next-timeslice.patch 57f3a8ee-x86emul-honor-guest-CR0-TS-and-CR0-EM.patch 57fb6a91-x86-defer-not-present-segment-checks.patch 5800c51d-x86-hvm-Clobber-cs-L-when-LME-becomes-set.patch 5800caec-x86emul-fix-pushing-of-selector-registers.patch 5800cb06-x86-Viridian-don-t-depend-on-undefined-register-state.patch 580e29f9-x86-MISALIGNSSE-feature-depends-on-SSE.patch 57dfb2ff-x86-Intel-Broadwell-no-PKG_C8-10_RESIDENCY-MSRs.patch- bsc#1004981 - Xen RPM doesn't contain debug hypervisor for EFI systems xen.spec- bsc#1000106 - VUL-0: CVE-2016-7777: xen: CR0.TS and CR0.EM not always honored for x86 HVM guests (XSA-190) 57f3a8ee-x86emul-honor-guest-CR0-TS-and-CR0-EM.patch - bsc#996191 - [XEN][acpi]residency -n 88 -c will cause xen panic on broadwell-ep 57dfb2ff-x86-Intel-Broadwell-no-PKG_C8-10_RESIDENCY-MSRs.patch - Upstream patches from Jan 57d7ca5f-x86-domctl-fix-TOCTOU-race-in-XEN_DOMCTL_getvcpuextstate.patch 57d7ca64-x86-domctl-fix-migration-of-guests-not-using-xsave.patch 57da8883-credit1-fix-mask-to-be-used-for-tickling.patch 57da8883-credit2-properly-schedule-migration-of-running-vcpu.patch 57dfb1c5-x86-Intel-hide-CPUID-faulting-capability-from-guests.patch 57e93e1d-x86emul-correct-loading-of-ss.patch 57e93e4a-x86emul-don-t-allow-null-selector-for-LTR.patch 57e93e89-x86-AMD-apply-erratum-665-workaround.patch 57ee6cbc-credit1-return-time-remaining-to-limit-as-next-timeslice.patch 57fb6a91-x86-defer-not-present-segment-checks.patch 5800c51d-x86-hvm-Clobber-cs-L-when-LME-becomes-set.patch 5800caec-x86emul-fix-pushing-of-selector-registers.patch 5800cb06-x86-Viridian-don-t-depend-on-undefined-register-state.patch 580e29f9-x86-MISALIGNSSE-feature-depends-on-SSE.patch 5810a9cc-x86-emul-Correct-decoding-of-SReg3-operands.patch- bsc#1007941 - Xen tools limit the number of vcpus to 256 when the system has 384 xen-arch-kconfig-nr_cpus.patch- bsc#1007157 - VUL-0: CVE-2016-8910: xen: net: rtl8139: infinite loop while transmit in C+ mode CVE-2016-8910-qemut-net-rtl8139-infinite-loop-while-transmit-in-Cplus-mode.patch- bsc#1005004 - CVE-2016-8667: xen: dma: rc4030 divide by zero error in set_next_tick CVE-2016-8667-qemut-dma-rc4030-divide-by-zero-error-in-set_next_tick.patch - bsc#1005005 - VUL-0: CVE-2016-8669: xen: char: divide by zero error in serial_update_parameters CVE-2016-8669-qemut-char-divide-by-zero-error-in-serial_update_parameters.patch- bsc#1003030 - VUL-0: CVE-2016-7908: xen: net: Infinite loop in mcf_fec_do_tx CVE-2016-7908-qemut-net-Infinite-loop-in-mcf_fec_do_tx.patch - bsc#1003032 - VUL-0: CVE-2016-7909: xen: net: pcnet: infinite loop in pcnet_rdra_addr CVE-2016-7909-qemut-net-pcnet-infinite-loop-in-pcnet_rdra_addr.patch- bsc#995785 - VUL-0: CVE-2016-7092: xen: x86: Disallow L3 recursive pagetable for 32-bit PV guests (XSA-185) 57d1563d-x86-32on64-don-t-allow-recursive-page-tables-from-L3.patch - bsc#995789 - VUL-0: CVE-2016-7093: xen: x86: Mishandling of instruction pointer truncation during emulation (XSA-186) 57d15679-x86-emulate-Correct-boundary-interactions-of-emulated-insns.patch 57d18642-hvm-fep-Allow-test-insns-crossing-1-0-boundary.patch - bsc#995792 - VUL-0: CVE-2016-7094: xen: x86 HVM: Overflow of sh_ctxt->seg_reg[] (XSA-187) 57d1569a-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch 57d18642-x86-segment-Bounds-check-accesses-to-emulation-ctxt-seg_reg.patch - bsc#991934 - xen hypervisor crash in csched_acct 57c96df3-credit1-fix-a-race-when-picking-initial-pCPU.patch - Upstream patches from Jan 57c4412b-x86-HVM-add-guarding-logic-for-VMX-specific-code.patch 57c57f73-libxc-correct-max_pfn-calculation-for-saving-domain.patch 57c805bf-x86-levelling-restrict-non-architectural-OSXSAVE-handling.patch 57c805c1-x86-levelling-pass-vcpu-to-ctxt_switch_levelling.patch 57c805c3-x86-levelling-provide-architectural-OSXSAVE-handling.patch 57c82be2-x86-32on64-adjust-call-gate-emulation.patch 57c96e2c-x86-correct-PT_NOTE-file-position.patch 57cfed43-VMX-correct-feature-checks-for-MPX-and-XSAVES.patch- bsc#979002 - add 60-persistent-xvd.rules and helper script also to initrd, add the relevant dracut helper- bnc#953518 - unplug also SCSI disks in qemu-xen-traditional for upstream unplug protocol- bsc#989679 - [pvusb feature] USB device not found when 'virsh detach-device guest usb.xml' 57c93e52-fix-error-in-libxl_device_usbdev_list.patch- bsc#992224 - [HPS Bug] During boot of Xen Hypervisor, Failed to get contiguous memory for DMA from Xen 57ac6316-don-t-restrict-DMA-heap-to-node-0.patch - bsc#978755 - xen uefi systems fail to boot - bsc#983697 - SLES12 SP2 Xen UEFI mode cannot boot 57b71fc5-x86-EFI-don-t-apply-relocations-to-l-2-3-_bootmap.patch - Upstream patch from Jan 57b7447b-dont-permit-guest-to-populate-PoD-pages-for-itself.patch- spec: to stay compatible with the in-tree qemu-xen binary, use /usr/bin/qemu-system-i386 instead of /usr/bin/qemu-system-x86_64 bsc#986164- bsc#970135 - new virtualization project clock test randomly fails on Xen 576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 5769106e-x86-generate-assembler-equates-for-synthesized.patch 57a1e603-x86-time-adjust-local-system-time-initialization.patch 57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch - bsc#991934 - xen hypervisor crash in csched_acct 57973099-have-schedulers-revise-initial-placement.patch 579730e6-remove-buggy-initial-placement-algorithm.patch - bsc#988675 - VUL-0: CVE-2016-6258: xen: x86: Privilege escalation in PV guests (XSA-182) 57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch - bsc#988676 - VUL-0: CVE-2016-6259: xen: x86: Missing SMAP whitelisting in 32-bit exception / event delivery (XSA-183) 57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch - Upstream patches from Jan 57a30261-x86-support-newer-Intel-CPU-models.patch- bsc#985503 - vif-route broken vif-route.patch- bsc#978413 - PV guest upgrade from sles11sp4 to sles12sp2 alpha3 failed on sles11sp4 xen host. pygrub-handle-one-line-menu-entries.patch- bsc#990843 - VUL-1: CVE-2016-6351: xen: qemu: scsi: esp: OOB write access in esp_do_dma CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch- bsc#900418 - Dump cannot be performed on SLES12 XEN 57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch - Upstream patches from Jan 575e9ca0-nested-vmx-Validate-host-VMX-MSRs-before-accessing-them.patch 57640448-xen-sched-use-default-scheduler-upon-an-invalid-sched.patch- fate#319989 - Update to Xen 4.7 FCS xen-4.7.0-testing-src.tar.bz2 - Drop CVE-2014-3672-qemut-xsa180.patch- bsc#954872 - script block-dmmd not working as expected - libxl: error: libxl_dm.c (Additional fixes) block-dmmd- Convert with_stubdom into build_conditional to allow adjusting via prjconf - Convert with_debug into build_conditional to allow adjusting via prjconf- bsc#979002 - add 60-persistent-xvd.rules and helper script to xen-tools-domU to simplify transition to pvops based kernels- Convert with_oxenstored into build_conditional to allow adjusting via prjconf (fate#320836)- bsc#983984 - VUL-0: CVE-2016-5338: xen: qemu: scsi: esp: OOB r/w access while processing ESP_FIFO CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch - bsc#982960 - VUL-0: CVE-2016-5238: xen: qemu: scsi: esp: OOB write when using non-DMA mode in get_cmd CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch- fate#319989 - Update to Xen 4.7 RC5 xen-4.7.0-testing-src.tar.bz2- fate#319989 - Update to Xen 4.7 RC4 xen-4.7.0-testing-src.tar.bz2 - Dropped xen.pkgconfig-4.7.patch xsa164.patch- bsc#981264 - VUL-0: CVE-2014-3672: xen: Unrestricted qemu logging (XSA-180) CVE-2014-3672-qemut-xsa180.patch- bsc#980724 - VUL-0: CVE-2016-4441: Qemu: scsi: esp: OOB write while writing to 's->cmdbuf' in get_cmd CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch - bsc#980716 - VUL-0: CVE-2016-4439: xen: scsi: esp: OOB write while writing to 's->cmdbuf' in esp_reg_write CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch- fate#319989 - Update to Xen 4.7 RC3 xen-4.7.0-testing-src.tar.bz2 - Dropped libxl-remove-cdrom-cachemode.patch x86-PoD-only-reclaim-if-needed.patch gcc6-warnings-as-errors.patch- bsc#954872 - script block-dmmd not working as expected - libxl: error: libxl_dm.c (another modification) block-dmmd- fate#319989 - Update to Xen 4.7 RC2 xen-4.7.0-testing-src.tar.bz2- bsc#961600 - L3: poor performance when Xen HVM domU configured with max memory > current memory x86-PoD-only-reclaim-if-needed.patch- Mark SONAMEs and pkgconfig as xen 4.7 xen.pkgconfig-4.7.patch- bsc#977329 - Xen: Cannot boot HVM guests with empty cdrom libxl-remove-cdrom-cachemode.patch- fate#319989 - Update to Xen 4.7 RC1 xen-4.7.0-testing-src.tar.bz2- fate#316614: set migration constraints from cmdline restore libxl.set-migration-constraints-from-cmdline.patch- Remove obsolete patch for xen-kmp magic_ioport_compat.patch- fate#316613: update to v12 libxl.pvscsi.patch- Update to the latest Xen 4.7 pre-release c2994f86 Drop libxl.migrate-legacy-stream-read.patch- bnc#972756 - Can't migrate HVM guest from SLES12SP1 Xen host to SLES12SP2 Alpha 1 host using xl migrate libxl.migrate-legacy-stream-read.patch- Add patches from proposed upstream series to load BIOS's from the toolstack instead of embedding in hvmloader http://lists.xenproject.org/archives/html/xen-devel/2016-03/msg01626.html 0001-libxc-Rework-extra-module-initialisation.patch, 0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch, 0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch, 0004-firmware-makefile-install-BIOS-blob.patch, 0005-libxl-Load-guest-BIOS-from-file.patch, 0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch, 0007-hvmloader-Grab-the-hvm_start_info-pointer.patch, 0008-hvmloader-Locate-the-BIOS-blob.patch, 0009-hvmloader-Check-modules-whereabouts-in-perform_tests.patch, 0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch, 0011-hvmloader-Load-OVMF-from-modules.patch, 0012-hvmloader-Specific-bios_load-function-required.patch, 0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch, 0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch - Enable support for UEFI on x86_64 using the ovmf-x86_64-ms.bin firmware from qemu-ovmf-x86_64. The firmware is preloaded with Microsoft keys to more closely resemble firmware on real hardware FATE#320490- fate#319989: Update to Xen 4.7 (pre-release) xen-4.7.0-testing-src.tar.bz2 - Dropped: xen-4.6.1-testing-src.tar.bz2 55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch 5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch hotplug-Linux-block-performance-fix.patch set-mtu-from-bridge-for-tap-interface.patch xendomains-libvirtd-conflict.patch xsa154.patch xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa170.patch- Use system SeaBIOS instead of building/installing another one FATE#320638 Dropped files: seabios-dir-remote.tar.bz2 xen-c99-fix.patch xen.build-compare.seabios.patch- spec: drop BuildRequires that were only needed for qemu-xen- bsc#969377 - xen does not build with GCC 6 ipxe-use-rpm-opt-flags.patch gcc6-warnings-as-errors.patch- bsc#969351 - VUL-0: CVE-2016-2841: xen: net: ne2000: infinite loop in ne2000_receive CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch - Drop xsa154-fix.patch- Use system qemu instead of building/installing yet another qemu FATE#320638 - Dropped files qemu-xen-dir-remote.tar.bz2 CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch CVE-2015-4037-qemuu-smb-config-dir-name.patch CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch qemu-xen-enable-spice-support.patch qemu-xen-upstream-qdisk-cache-unsafe.patch tigervnc-long-press.patch xsa162-qemuu.patch- bsc#962321 - VUL-0: CVE-2016-1922: xen: i386: null pointer dereference in vapic_write() CVE-2016-1922-qemuu-i386-null-pointer-dereference-in-vapic_write.patch- bsc#968004 - VUL-0: CVE-2016-2538: xen: usb: integer overflow in remote NDIS control message handling CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch- bsc#954872 - L3: script block-dmmd not working as expected - libxl: error: libxl_dm.c block-dmmd - Update libxl to recognize dmmd and npiv prefix in disk spec xen.libxl.dmmd.patch- bsc#967101 - VUL-0: CVE-2016-2391: xen: usb: multiple eof_timers in ohci module leads to null pointer dereference CVE-2016-2391-qemuu-usb-null-pointer-dereference-in-ohci-module.patch CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch - bsc#967090 - VUL-0: CVE-2016-2392: xen: usb: null pointer dereference in remote NDIS control message handling CVE-2016-2392-qemuu-usb-null-pointer-dereference-in-NDIS-message-handling.patch- Update to Xen Version 4.6.1 xen-4.6.1-testing-src.tar.bz2 - Dropped patches now contained in tarball or unnecessary xen-4.6.0-testing-src.tar.bz2 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 5632129c-free-domain-s-vcpu-array.patch 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 563212e4-xenoprof-free-domain-s-vcpu-array.patch 563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch 56549f24-x86-vPMU-document-as-unsupported.patch 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch xsa155-qemut-qdisk-double-access.patch xsa155-qemut-xenfb.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa159.patch xsa160.patch xsa162-qemut.patch xsa165.patch xsa166.patch xsa167.patch xsa168.patch- bsc#965315 - VUL-0: CVE-2016-2270: xen: x86: inconsistent cachability flags on guest mappings (XSA-154) xsa154.patch - bsc#965317 - VUL-0: CVE-2016-2271: xen: VMX: guest user mode may crash guest with non-canonical RIP (XSA-170) xsa170.patch- bsc#965269 - VUL-1: CVE-2015-8619: xen: stack based OOB write in hmp_sendkey routine CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch- bsc#965156 - VUL-0: CVE-2015-6855: xen: ide: divide by zero issue CVE-2015-6855-qemuu-ide-divide-by-zero-issue.patch - bsc#965112 - VUL-0: CVE-2014-3640: xen: slirp: NULL pointer deref in sosendto() CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch- bsc#964947 - VUL-0: CVE-2015-5278: xen: Infinite loop in ne2000_receive() function CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch - bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch- bsc#964644 - VUL-0: CVE-2013-4533: xen pxa2xx: buffer overrun on incoming migration CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch - bsc#964925 - VUL-0: CVE-2014-0222: xen: qcow1: validate L2 table size to avoid integer overflows CVE-2014-0222-blktap-qcow1-validate-l2-table-size.patch - Dropped CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch- bsc#964415 - VUL-1: CVE-2016-2198: xen: usb: ehci null pointer dereference in ehci_caps_write CVE-2016-2198-qemuu-usb-ehci-null-pointer-dereference-in-ehci_caps_write.patch - bsc#964452 - VUL-0: CVE-2013-4534: xen: openpic: buffer overrun on incoming migration CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch- bsc#963783 - VUL-1: CVE-2016-1981: xen: net: e1000 infinite loop in start_xmit and e1000_receive_iov routines CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch- bsc#962758 - VUL-0: CVE-2013-4539: xen: tsc210x: buffer overrun on invalid state load CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch- bsc#962632 - VUL-0: CVE-2015-1779: xen: vnc: insufficient resource limiting in VNC websockets decoder CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch - bsc#962642 - VUL-0: CVE-2013-4537: xen: ssi-sd: buffer overrun on invalid state load CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch - bsc#962627 - VUL-0: CVE-2014-7815: xen: vnc: insufficient bits_per_pixel from the client sanitization CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch- bsc#962335 - VUL-0: CVE-2013-4538: xen: ssd0323: fix buffer overun on invalid state CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch - bsc#962360 - VUL-0: CVE-2015-7512: xen: net: pcnet: buffer overflow in non-loopback mode CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch- bsc#961692 - VUL-0: CVE-2016-1714: xen: nvram: OOB r/w access in processing firmware configurations CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch- bsc#961358 - VUL-0: CVE-2015-8613: xen: qemu: scsi: stack based buffer overflow in megasas_ctrl_get_info CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch - bsc#961332 - VUL-0: CVE-2016-1568: xen: Qemu: ide: ahci use-after-free vulnerability in aio port commands CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch- bsc#959695 - missing docs for xen xen.spec- bsc#960862 - VUL-0: CVE-2016-1571: xen: VMX: intercept issue with INVLPG on non-canonical address (XSA-168) xsa168.patch - bsc#960861 - VUL-0: CVE-2016-1570: xen: PV superpage functionality missing sanity checks (XSA-167) xsa167.patch - bsc#960836 - VUL-0: CVE-2015-8744: xen: net: vmxnet3: incorrect l2 header validation leads to a crash via assert(2) call CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch- bsc#960707 - VUL-0: CVE-2015-8745: xen: reading IMR registers leads to a crash via assert(2) call CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch - bsc#960726 - VUL-0: CVE-2015-8743: xen: ne2000: OOB memory access in ioport r/w functions CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch- bsc#960093 - VUL-0: CVE-2015-8615: xen: x86: unintentional logging upon guest changing callback method (XSA-169) 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch- Adjust xen-dom0-modules.service to run Before xenstored.service instead of proc-xen.mount to workaround a bug in systemd "design" (bnc#959845)- bsc#959387 - VUL-0: CVE-2015-8568 CVE-2015-8567: xen: qemu: net: vmxnet3: host memory leakage CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch- bsc#957988 - VUL-0: CVE-2015-8550: xen: paravirtualized drivers incautious about shared memory contents (XSA-155) xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemut-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa155-qemut-xenfb.patch - bsc#959006 - VUL-0: CVE-2015-8558: xen: qemu: usb: infinite loop in ehci_advance_state results in DoS CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch - bsc#958918 - VUL-0: CVE-2015-7549: xen: qemu pci: null pointer dereference issue CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch - bsc#958493 - VUL-0: CVE-2015-8504: xen: qemu: ui: vnc: avoid floating point exception CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch - bsc#958007 - VUL-0: CVE-2015-8554: xen: qemu-dm buffer overrun in MSI-X handling (XSA-164) xsa164.patch - bsc#958009 - VUL-0: CVE-2015-8555: xen: information leak in legacy x86 FPU/XMM initialization (XSA-165) xsa165.patch - bsc#958523 - VUL-0: xen: ioreq handling possibly susceptible to multiple read issue (XSA-166) xsa166.patch- bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch - Upstream patches from Jan 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch) 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 56544a57-VMX-fix-adjust-trap-injection.patch 56546ab2-sched-fix-insert_vcpu-locking.patch- bsc#956592 - VUL-0: xen: virtual PMU is unsupported (XSA-163) 56549f24-x86-vPMU-document-as-unsupported.patch - bsc#956408 - VUL-0: CVE-2015-8339, CVE-2015-8340: xen: XENMEM_exchange error handling issues (XSA-159) xsa159.patch - bsc#956409 - VUL-0: CVE-2015-8341: xen: libxl leak of pv kernel and initrd on error (XSA-160) xsa160.patch - bsc#956411 - VUL-0: CVE-2015-7504: xen: heap buffer overflow vulnerability in pcnet emulator (XSA-162) xsa162-qemuu.patch xsa162-qemut.patch - bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142) 5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch- fate#315712: XEN: Use the PVOPS kernel Turn off building the KMPs now that we are using the pvops kernel xen.spec- Upstream patches from Jan 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 5632129c-free-domain-s-vcpu-array.patch (Replaces CVE-2015-7969-xsa149.patch) 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 563212e4-xenoprof-free-domain-s-vcpu-array.patch 563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch) 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch - Dropped 55b0a2db-x86-MSI-track-guest-masking.patch- Use upstream variants of block-iscsi and block-nbd- Remove xenalyze.hg, its part of xen-4.6- Update to Xen Version 4.6.0 xen-4.6.0-testing-src.tar.bz2 mini-os.tar.bz2 blktap2-no-uninit.patch stubdom-have-iovec.patch - Renamed xsa149.patch to CVE-2015-7969-xsa149.patch - Dropped patches now contained in tarball or unnecessary xen-4.5.2-testing-src.tar.bz2 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch 54f4985f-libxl-fix-libvirtd-double-free.patch 55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 551ac326-xentop-add-support-for-qdisk.patch 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch 5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 554cc211-libxl-add-qxl.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch 5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch 5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch 5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch 5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch 5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch 5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch 55b0a218-x86-PCI-CFG-write-intercept.patch 55b0a255-x86-MSI-X-maskall.patch 55b0a283-x86-MSI-X-teardown.patch 55b0a2ab-x86-MSI-X-enable.patch blktapctrl-close-fifos.patch blktapctrl-default-to-ioemu.patch blktapctrl-disable-debug-printf.patch blktap-no-uninit.patch blktap-pv-cdrom.patch build-tapdisk-ioemu.patch ioemu-bdrv-open-CACHE_WB.patch ioemu-blktap-barriers.patch ioemu-blktap-fv-init.patch ioemu-blktap-image-format.patch ioemu-blktap-zero-size.patch libxl.set-migration-constraints-from-cmdline.patch local_attach_support_for_phy.patch pci-attach-fix.patch qemu-xen-upstream-megasas-buildtime.patch tapdisk-ioemu-logfile.patch tapdisk-ioemu-shutdown-fix.patch udev-rules.patch xen.build-compare.ipxe.patch xen.build-compare.mini-os.patch xen.build-compare.smbiosdate.patch xen.build-compare.vgabios.patch xen.build-compare.xen_compile_h.patch xl-coredump-file-location.patch- bsc#954405 - VUL-0: CVE-2015-8104: Xen: guest to host DoS by triggering an infinite loop in microcode via #DB exception - bsc#954018 - VUL-0: CVE-2015-5307: xen: x86: CPU lockup during fault delivery (XSA-156) CVE-2015-5307-xsa156.patch- Update to Xen 4.5.2 xen-4.5.2-testing-src.tar.bz2 - Drop the following xen-4.5.1-testing-src.tar.bz2 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 559bdde5-pull-in-latest-linux-earlycpio.patch 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch 560bd926-credit1-fix-tickling-when-it-happens-from-a-remote-pCPU.patch 560e6d34-x86-p2m-pt-tighten-conditions-of-IOMMU-mapping-updates.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch CVE-2015-4106-xsa131-9.patch CVE-2015-3259-xsa137.patch CVE-2015-7311-xsa142.patch CVE-2015-7835-xsa148.patch xsa139-qemuu.patch xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch xsa151.patch xsa152.patch xsa153-libxl.patch CVE-2015-5154-qemuu-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemuu-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch"- bsc#950704 - CVE-2015-7970 VUL-1: xen: x86: Long latency populate-on-demand operation is not preemptible (XSA-150) 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch- Upstream patches from Jan 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch- bsc#951845 - VUL-0: CVE-2015-7972: xen: x86: populate-on-demand balloon size inaccuracy can crash guests (XSA-153) xsa153-libxl.patch- bsc#950703 - VUL-1: CVE-2015-7969: xen: leak of main per-domain vcpu pointer array (DoS) (XSA-149) xsa149.patch - bsc#950705 - VUL-1: CVE-2015-7969: xen: x86: leak of per-domain profiling-related vcpu pointer array (DoS) (XSA-151) xsa151.patch - bsc#950706 - VUL-0: CVE-2015-7971: xen: x86: some pmu and profiling hypercalls log without rate limiting (XSA-152) xsa152.patch - Dropped 55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch 5604f239-x86-PV-properly-populate-descriptor-tables.patch- bsc#932267 - VUL-1: CVE-2015-4037: qemu,kvm,xen: insecure temporary file use in /net/slirp.c CVE-2015-4037-qemuu-smb-config-dir-name.patch CVE-2015-4037-qemut-smb-config-dir-name.patch - bsc#877642 - VUL-0: CVE-2014-0222: qemu: qcow1: validate L2 table size to avoid integer overflows CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch- bsc#950367 - VUL-0: CVE-2015-7835: xen: x86: Uncontrolled creation of large page mappings by PV guests (XSA-148) CVE-2015-7835-xsa148.patch- bsc#949138 - Setting vcpu affinity under Xen causes libvirtd abort 54f4985f-libxl-fix-libvirtd-double-free.patch- bsc#949046 - Increase %suse_version in SP1 to 1316 xen.spec - Update README.SUSE detailing dom0 ballooning recommendations- bsc#945167 - Running command ’ xl pci-assignable-add 03:10.1’ secondly show errors 55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch - Upstream patches from Jan 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f239-x86-PV-properly-populate-descriptor-tables.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch 560bd926-credit1-fix-tickling-when-it-happens-from-a-remote-pCPU.patch 560e6d34-x86-p2m-pt-tighten-conditions-of-IOMMU-mapping-updates.patch- bsc#941074 - VmError: Device 51728 (vbd) could not be connected. Hotplug scripts not working. hotplug-Linux-block-performance-fix.patch- bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142) CVE-2015-7311-xsa142.patch- bsc#945165 - Xl pci-attach show error with kernel of SLES 12 sp1 pci-attach-fix.patch- bsc#945164 - Xl destroy show error with kernel of SLES 12 sp1 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch- Upstream patches from Jan 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch- bsc#944463 - VUL-0: CVE-2015-5239: qemu-kvm: Integer overflow in vnc_client_read() and protocol_client_msg() CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch - bsc#944697 - VUL-1: CVE-2015-6815: qemu: net: e1000: infinite loop issue CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch- bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch- bsc#907514 - Bus fatal error & sles12 sudden reboot has been observed - bsc#910258 - SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984 - Bus fatal error & sles11-SP4 sudden reboot has been observed - bsc#923967 - Partner-L3: Bus fatal error & sles11-SP3 sudden reboot has been observed 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 55b0a218-x86-PCI-CFG-write-intercept.patch 55b0a255-x86-MSI-X-maskall.patch 55b0a283-x86-MSI-X-teardown.patch 55b0a2ab-x86-MSI-X-enable.patch 55b0a2db-x86-MSI-track-guest-masking.patch - Upstream patches from Jan 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch - Dropped for upstream version x86-MSI-mask.patch x86-MSI-pv-unmask.patch x86-MSI-X-enable.patch x86-MSI-X-maskall.patch x86-MSI-X-teardown.patch x86-pci_cfg_okay.patch x86-PCI-CFG-write-intercept.patch- bsc#939712 - VUL-0: XSA-140: QEMU leak of uninitialized heap memory in rtl8139 device model xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch - bsc#939709 - VUL-0: XSA-139: xen: Use after free in QEMU/Xen block unplug protocol xsa139-qemuu.patch- bsc#937371 - xen vm's running after reboot xendomains-libvirtd-conflict.patch- bsc#938344 - VUL-0: CVE-2015-5154: qemu,kvm,xen: host code execution via IDE subsystem CD-ROM CVE-2015-5154-qemuu-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemuu-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch- Remove xendomains.service from systemd preset file because it conflicts with libvirt-guests.service (bnc#937371) Its up to the admin to run systemctl enable xendomains.service- bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow CVE-2015-3259-xsa137.patch - Upstream patches from Jan 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bdde5-pull-in-latest-linux-earlycpio.patch - Upstream patches from Jan pending review 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch 5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch 5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch 5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch 5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch 5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch x86-MSI-pv-unmask.patch x86-pci_cfg_okay.patch x86-PCI-CFG-write-intercept.patch x86-MSI-X-maskall.patch x86-MSI-X-teardown.patch x86-MSI-X-enable.patch x86-MSI-mask.patch- Adjust more places to use br0 instead of xenbr0- bnc#936516 - xen fails to build with kernel update(4.1.0 from stable) 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch- Update to Xen Version 4.5.1 FCS (fate#315675) xen-4.5.1-testing-src.tar.bz2 - Dropped patches now contained in tarball 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch qemu-MSI-X-enable-maskall.patch qemu-MSI-X-latch-writes.patch x86-MSI-X-guest-mask.patch- Replace 5124efbe-add-qxl-support.patch with the variant that finally made it upstream, 554cc211-libxl-add-qxl.patch- bsc#931627 - VUL-0: CVE-2015-4105: XSA-130: xen: Guest triggerable qemu MSI-X pass-through error messages qemu-MSI-X-latch-writes.patch - bsc#907514 - Bus fatal error & sles12 sudden reboot has been observed - bsc#910258 - SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984 - Bus fatal error & sles11-SP4 sudden reboot has been observed - bsc#923967 - Partner-L3: Bus fatal error & sles11-SP3 sudden reboot has been observed x86-MSI-X-teardown.patch x86-MSI-X-enable.patch x86-MSI-X-guest-mask.patch x86-MSI-X-maskall.patch qemu-MSI-X-enable-maskall.patch - Upstream patches from Jan 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch - Dropped the following patches now contained in the tarball xen-no-array-bounds.patch CVE-2015-4103-xsa128.patch CVE-2015-4104-xsa129.patch CVE-2015-4105-xsa130.patch CVE-2015-4106-xsa131-1.patch CVE-2015-4106-xsa131-2.patch CVE-2015-4106-xsa131-3.patch CVE-2015-4106-xsa131-4.patch CVE-2015-4106-xsa131-5.patch CVE-2015-4106-xsa131-6.patch CVE-2015-4106-xsa131-7.patch CVE-2015-4106-xsa131-8.patch- Update to Xen 4.5.1 RC2 - bsc#931628 - VUL-0: CVE-2015-4106: XSA-131: xen: Unmediated PCI register access in qemu CVE-2015-4106-xsa131-1.patch CVE-2015-4106-xsa131-2.patch CVE-2015-4106-xsa131-3.patch CVE-2015-4106-xsa131-4.patch CVE-2015-4106-xsa131-5.patch CVE-2015-4106-xsa131-6.patch CVE-2015-4106-xsa131-7.patch CVE-2015-4106-xsa131-8.patch CVE-2015-4106-xsa131-9.patch - bsc#931627 - VUL-0: CVE-2015-4105: XSA-130: xen: Guest triggerable qemu MSI-X pass-through error messages CVE-2015-4105-xsa130.patch - bsc#931626 - VUL-0: CVE-2015-4104: XSA-129: xen: PCI MSI mask bits inadvertently exposed to guests CVE-2015-4104-xsa129.patch - bsc#931625 - VUL-0: CVE-2015-4103: XSA-128: xen: Potential unintended writes to host MSI message data field via qemu CVE-2015-4103-xsa128.patch - Upstream patches from Jan 5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch- Add DefaultDependencies=no to xen-dom0-modules.service because it has to run before proc-xen.mount- Update to Xen 4.5.1 RC1- Update blktap-no-uninit.patch to work with gcc-4.5- bsc#927967 - VUL-0: CVE-2015-3340: xen: Information leak through XEN_DOMCTL_gettscinfo (XSA-132) 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch- bnc#929339 - VUL-0: CVE-2015-3456: qemu kvm xen: VENOM qemu floppy driver host code execution CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch- bsc#928783 - Reboot failure; Request backport of upstream Xen patch to 4.5.0, or update pkgs to 4.5.1 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch- bnc#927750 - Avoid errors reported by system-modules-load.service- Add xen-no-array-bounds.patch and blktap-no-uninit.patch to selectively turn errors back to warnings to fix build with GCC 5. - Amend xen.stubdom.newlib.patch to pull in declaration of strcmp to avoid implicit-fortify-decl rpmlint error. - Fix quoting of __SMBIOS_DATE__ in xen.build-compare.smbiosdate.patch.- xentop: Fix memory leak on read failure 551ac326-xentop-add-support-for-qdisk.patch- Dropped xentop-add-support-for-qdisk.patch in favor of upstream version 551ac326-xentop-add-support-for-qdisk.patch- Enable spice support in qemu for x86_64 5124efbe-add-qxl-support.patch qemu-xen-enable-spice-support.patch- Add xen-c99-fix.patch to remove pointless inline specifier on function declarations which break build with a C99 compiler which GCC 5 is by default. (bsc#921994) - Add ipxe-no-error-logical-not-parentheses.patch to supply - Wno-logical-not-parentheses to the ipxe build to fix breakage with GCC 5. (bsc#921994)- bnc#921842 - Xentop doesn't display disk statistics for VMs using qdisks xentop-add-support-for-qdisk.patch- Disable the PIE enablement done for Factory, as the XEN code is not buildable with PIE and it does not make much sense to build the hypervisor code with it.- bnc#918169 - XEN fixes required to work with Kernel 3.19.0 xen.spec- Package xen.changes because its referenced in xen.spec- Update seabios to rel-1.7.5 which is the correct version for Xen 4.5- Update to Xen 4.5.0 FCS- Include systemd presets in 13.2 and older- bnc#897352 - Enable xencommons/xendomains only during fresh install - disable restart on upgrade because the toolstack is not restartable- adjust seabios, vgabios, stubdom and hvmloader build to reduce build-compare noise xen.build-compare.mini-os.patch xen.build-compare.smbiosdate.patch xen.build-compare.ipxe.patch xen.build-compare.vgabios.patch xen.build-compare.seabios.patch xen.build-compare.man.patch- Update to Xen 4.5.0 RC4- Remove xend specific if-up scripts Recording bridge slaves is a generic task which should be handled by generic network code- Use systemd features from upstream requires updated systemd-presets-branding package- Update to Xen 4.5.0 RC3- Set GIT, WGET and FTP to /bin/false- Use new configure features instead of make variables xen.stubdom.newlib.patch- adjust docs and xen build to reduce build-compare noise xen.build-compare.doc_html.patch xen.build-compare.xen_compile_h.patch- Drop trailing B_CNT from XEN_EXTRAVERSION to reduce build-compare noise- Update to Xen 4.5.0 RC2- Update to Xen 4.5.0 RC1 xen-4.5.0-testing-src.tar.bz2 - Remove all patches now contained in the new tarball xen-4.4.1-testing-src.tar.bz2 5315a3bb-x86-don-t-propagate-acpi_skip_timer_override-do-Dom0.patch 5315a43a-x86-ACPI-also-print-address-space-for-PM1x-fields.patch 53299d8f-xenconsole-reset-tty-on-failure.patch 53299d8f-xenconsole-tolerate-tty-errors.patch 5346a7a0-x86-AMD-support-further-feature-masking-MSRs.patch 53563ea4-x86-MSI-drop-workaround-for-insecure-Dom0-kernels.patch 537c9c77-libxc-check-return-values-on-mmap-and-madvise.patch 537cd0b0-hvmloader-also-cover-PCI-MMIO-ranges-above-4G-with-UC-MTRR-ranges.patch 537cd0cc-hvmloader-PA-range-0xfc000000-0xffffffff-should-be-UC.patch 539ebe62-x86-EFI-improve-boot-time-diagnostics.patch 53aac342-x86-HVM-consolidate-and-sanitize-CR4-guest-reserved-bit-determination.patch 53c9151b-Fix-xl-vncviewer-accesses-port-0-by-any-invalid-domid.patch 53d124e7-fix-list_domain_details-check-config-data-length-0.patch 53dba447-x86-ACPI-allow-CMOS-RTC-use-even-when-ACPI-says-there-is-none.patch 53df727b-x86-HVM-extend-LAPIC-shortcuts-around-P2M-lookups.patch 53e8be5f-x86-vHPET-use-rwlock-instead-of-simple-one.patch 53f737b1-VMX-fix-DebugCtl-MSR-clearing.patch 53f7386d-x86-irq-process-softirqs-in-irq-keyhandlers.patch 53fcebab-xen-pass-kernel-initrd-to-qemu.patch 53ff3659-x86-consolidate-boolean-inputs-in-hvm-and-p2m.patch 53ff36ae-x86-hvm-treat-non-insn-fetch-NPF-also-as-read-violations.patch 53ff36d5-x86-mem_event-deliver-gla-fault-EPT-violation-information.patch 53ff3716-x86-ats-Disable-Address-Translation-Services-by-default.patch 53ff3899-x86-NMI-allow-processing-unknown-NMIs-with-watchdog.patch 54005472-EPT-utilize-GLA-GPA-translation-known-for-certain-faults.patch 540effe6-evtchn-check-control-block-exists-when-using-FIFO-based-events.patch 540f2624-x86-idle-add-barriers-to-CLFLUSH-workaround.patch 541825dc-VMX-don-t-leave-x2APIC-MSR-intercepts-disabled.patch 541ad385-x86-suppress-event-check-IPI-to-MWAITing-CPUs.patch 541ad3ca-x86-HVM-batch-vCPU-wakeups.patch 541ad81a-VT-d-suppress-UR-signaling-for-further-desktop-chipsets.patch 54216833-x86-shadow-fix-race-when-sampling-dirty-vram-state.patch 54216882-x86-emulate-check-cpl-for-all-privileged-instructions.patch 542168ae-x86emul-only-emulate-swint-injection-for-real-mode.patch 54228a37-x86-EFI-fix-freeing-of-uninitialized-pointer.patch 5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch 5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch 542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch 542bf997-x86-HVM-properly-bound-x2APIC-MSR-range.patch 54325cc0-x86-MSI-fix-MSI-X-case-of-freeing-IRQ.patch 54325d2f-x86-restore-reserving-of-IO-APIC-pages-in-XENMEM_machine_memory_map-output.patch 54325d95-don-t-allow-Dom0-access-to-IOMMUs-MMIO-pages.patch 54325ecc-AMD-guest_iommu-properly-disable-guest-iommu-support.patch 54325f3c-x86-paging-make-log-dirty-operations-preemptible.patch 54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch CVE-2013-4540-qemu.patch qemu-support-xen-hvm-direct-kernel-boot.patch qemu-xen-upstream-blkif-discard.patch change-vnc-passwd.patch libxc-pass-errno-to-callers-of-xc_domain_save.patch libxl.honor-more-top-level-vfb-options.patch libxl.add-option-for-discard-support-to-xl-disk-conf.patch libxl.introduce-an-option-to-disable-the-non-O_DIRECT-workaround.patch x86-dom-print.patch x86-extra-trap-info.patch tmp_build.patch xl-check-for-libvirt-managed-domain.patch disable-wget-check.patch - Xend/xm is no longer supported and is not part of the upstream code. Remove all xend/xm specific patches, configs, and scripts xen-xmexample.patch bridge-opensuse.patch xmexample.disks xmclone.sh init.xend xend-relocation.sh xend.service xend-relocation-server.fw domUloader.py xmexample.domUloader xmexample.disks bridge-vlan.patch bridge-bonding.patch bridge-record-creation.patch network-nat-open-SuSEfirewall2-FORWARD.patch xend-set-migration-constraints-from-cmdline.patch xen.migrate.tools-xend_move_assert_to_exception_block.patch xend-pvscsi-recognize-also-SCSI-CDROM-devices.patch xend-config.patch xend-max-free-mem.patch xend-hvm-default-pae.patch xend-vif-route-ifup.patch xend-xenapi-console-protocol.patch xend-core-dump-loc.patch xend-xen-api-auth.patch xend-checkpoint-rename.patch xend-xm-save-check-file.patch xend-xm-create-xflag.patch xend-domu-usb-controller.patch xend-devid-or-name.patch xend-migration-domname-fix.patch xend-del_usb_xend_entry.patch xend-xen-domUloader.patch xend-multi-xvdp.patch xend-check_device_status.patch xend-change_home_server.patch xend-minimum-restart-time.patch xend-disable-internal-logrotate.patch xend-config-enable-dump-comment.patch xend-tools-watchdog-support.patch xend-console-port-restore.patch xend-vcpu-affinity-fix.patch xend-migration-bridge-check.patch xend-managed-pci-device.patch xend-hvm-firmware-passthrough.patch xend-cpuinfo-model-name.patch xend-xm-reboot-fix.patch xend-domain-lock.patch xend-domain-lock-sfex.patch xend-32on64-extra-mem.patch xend-hv_extid_compatibility.patch xend-xenpaging.autostart.patch xend-remove-xm-deprecation-warning.patch libxen_permissive.patch tmp-initscript-modprobe.patch init.xendomains xendomains.service xen-watchdog.service xen-updown.sh- bnc#901317 - L3: increase limit domUloader to 32MB domUloader.py- bnc#898772 - SLES 12 RC3 - XEN Host crashes when assigning non-VF device (SR-IOV) to guest 54325cc0-x86-MSI-fix-MSI-X-case-of-freeing-IRQ.patch - bnc#882089 - Windows 2012 R2 fails to boot up with greater than 60 vcpus 54325ecc-AMD-guest_iommu-properly-disable-guest-iommu-support.patch - bnc#826717 - VUL-0: CVE-2013-3495: XSA-59: xen: Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts 541ad81a-VT-d-suppress-UR-signaling-for-further-desktop-chipsets.patch - Upstream patches from Jan 540effe6-evtchn-check-control-block-exists-when-using-FIFO-based-events.patch (Replaces xsa107.patch) 54216833-x86-shadow-fix-race-when-sampling-dirty-vram-state.patch (Replaces xsa104.patch) 54216882-x86-emulate-check-cpl-for-all-privileged-instructions.patch (Replaces xsa105.patch) 542168ae-x86emul-only-emulate-swint-injection-for-real-mode.patch (Replaces xsa106.patch) 54228a37-x86-EFI-fix-freeing-of-uninitialized-pointer.patch 5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch 5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch 542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch 542bf997-x86-HVM-properly-bound-x2APIC-MSR-range.patch (Replaces xsa108.patch) 54325d2f-x86-restore-reserving-of-IO-APIC-pages-in-XENMEM_machine_memory_map-output.patch 54325d95-don-t-allow-Dom0-access-to-IOMMUs-MMIO-pages.patch 54325f3c-x86-paging-make-log-dirty-operations-preemptible.patch (Replaces xsa97.patch) 54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGH3AKDM4.13.1_04-lp152.2.3.14.13.1_04-lp152.2.3.1  xenhtmlhypercallarmindex.htmlindex.htmlx86_32index.htmlx86_64index.htmlindex.htmlmanindex.htmlxen-pci-device-reservations.7.htmlxen-pv-channel.7.htmlxen-tscmode.7.htmlxen-vtpm.7.htmlxen-vtpmmgr.7.htmlxenstore-chmod.1.htmlxenstore-ls.1.htmlxenstore-read.1.htmlxenstore-write.1.htmlxenstore.1.htmlxentop.1.htmlxentrace.8.htmlxentrace_format.1.htmlxl-disk-configuration.5.htmlxl-network-configuration.5.htmlxl-numa-placement.7.htmlxl.1.htmlxl.cfg.5.htmlxl.conf.5.htmlxlcpupool.cfg.5.htmlmiscamd-ucode-container.txtarmbig.LITTLE.txtbooting.txtdevice-treeacpi.txtbooting.txtguest.txtindex.htmlpassthrough.txtearly-printk.txtindex.htmlpassthrough.txtsilicon-errata.txtblock-scripts.txtconsole.txtcrashdb.txtdistro_mapping.txtdump-core-format.txtgrant-tables.txtindex.htmlkconfig-language.txtkconfig.txtkexec_and_kdump.txtlibxl_memory.txtprintk-formats.txtqemu-backends.txtstubdom.txtvtd-pi.txtvtd.txtvtpm-platforms.txtxen-error-handling.txtxenmon.txtxenpaging.txtxenstore-ring.txtxenstore.txtxsm-flask.txtmisccrashdb.txtvtpm-platforms.txtxen-command-line.pandocxenpaging.txtxenstore-paths.pandoc/usr/share/doc/packages//usr/share/doc/packages/xen//usr/share/doc/packages/xen/html//usr/share/doc/packages/xen/html/hypercall//usr/share/doc/packages/xen/html/hypercall/arm//usr/share/doc/packages/xen/html/hypercall/x86_32//usr/share/doc/packages/xen/html/hypercall/x86_64//usr/share/doc/packages/xen/html/man//usr/share/doc/packages/xen/html/misc//usr/share/doc/packages/xen/html/misc/arm//usr/share/doc/packages/xen/html/misc/arm/device-tree//usr/share/doc/packages/xen/misc/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:13303/openSUSE_Leap_15.2_Update/407f1180fe706db15a27ce54b6121b67-xen.openSUSE_Leap_15.2_Updatecpioxz5x86_64-suse-linuxdirectoryHTML document, ASCII textXML 1.0 document, ASCII text, with very long linesXML 1.0 document, ASCII textC source, ASCII textASCII textASCII text, with very long linesAlgol 68 source, ASCII textutf-8a688c0be6a52b03a64477eedac0353ffdd60fcc6c08683f557b1e5f106d98b43?p7zXZ !t/))] crt:bLL c Erۇ 'ZP _aF_~\eUYP{r/eMi^px6[P(:bG!ӿi Ffʩ ^2dԀiP{N>TDݼQJDS!%Jz"s盶Cjv&~~Lt1.T{FccRt{=y/ښNi@Hȏa!Đb/>P]ޝؖ~`~PȊˆ{y$>ZLǔ?\)M0xN\n!%%I{=DQ&i ;Ҹ6+ ϴj7hڥ\76ggM| ZmigýRu}_x/,n$qfݥ)lW](L3_sS'VT&g; X!"'Kn.L JA ;Or ޠIpfr h2E-!aRI^l=^*J…yhn"I0w0C $_WA@~ޛaS$/<'ӧЬA-˾ƨ`nĺ:b#&,>VU҆&Ɵ7CjvUKg۰ qC4Cnfii5 Dh3MRjj!B\Crx0/4{xgıkt-Ep㬼u#2fAcC_ߞW#рAmj ftB^X:YW[tϞ}ȣdj֭#贚NKM/JYB И p|QЅ-,y-[MyF%b_MgbDV])#]C}~q@ڋ.vz(%π1K2Sy) 9۟#o㲔öuxb=xG4ӹ=;r+ N-Y 9^h0 C.GX 1tZU/*WFׯon_p0 lPdj1MpRţMK(&y~!-nHO߆7kuj&i wB,يSf)ԏ^%0Au dҜ,۩M@*;E$~ք "^cIS_8A Ċ^њs݅v>MPgY&m?4 %a"e݇1@ ^O2Ӻ}P.M3װ;ǀi[%-,kؤ^6/Jn INxI,G{K~hIdrO#aj6 N "b)@Bak3\w}$+H_(C-a콹%4$&x&P D?r0 ;Fƕj~Mb6CtppSc UQ`D<ÅkE6LM,oyaK?U9>F X$LOဲ{y;(BVkυtk?{<)b- &9.[6t5O%|:9~a/2Ogͣassa3: ,޹6A&M;ۯhG9U7WL6KFtd/,)lRգ? JrQż,}xVMBcasdB6_jϝi1JCQJB(&q=J7HY<\w[5tnIU%2^qm\7]N#l)'j)踼|9;*p1eqd8 A ֶd#]Yr}!ub;(4Jg8c)Ajꪬmވ Fs7fX^TA B>f2m, ]/iZп8Ik#OB/Uf lu,nա^_E(p,0N2m 0֛)pSN0Fn%7 U#q,,]7z";1-qq~청$w»8OC4ۊe;ljn۔-@W{ZNf 93j?DubKZtw| ]Y&bs^%6ATFvIz3S,g׫Vux EC_&m P51/U=}jY"oI5(<瞁!r]E?HmB~)%%9/A<0J'ٸي@JLY^׆z'lICߩ |Eq xyhZy9$V `U -ƃ~hV'N.9',,8-J2a|<d2o*_kh;Xjqo@NOT}'a[ h6 :fsXr@0\m"?BYH%H#Цl.(*dd)̛{Ʋ!-ޥvW 5D8ΰl< fJKdz't3<@_og FT \{WS5\ueOI vƈX V i\Uvn>0eXp$is9y|Ztg&A\tsf9#֭cNgpw@|ڡN ݦe";a v!X/hxps_sϾU4Υv/F~bOW7Ir|}%Be@' {H<߼|p# yj{L*->KP+xwHt}zCΧ05EU4‰ ח--ŗfb)&ߒA'!i`R+ \ms{LN!2w;^nǕ|'Sxs.lMSkƻ<݆+Tj>|Gno]Wd vVn,pI+hќәQ,h}ы6GTʠ ޿+7eޱ։n*F&0Mx/wEZ~`0f;qȹr Xm&{/5$q.6Xq{#~wN'{N<%8*tX3ϱ_6SbK xᄇ:7)gZZu,~Y!{`/NqoV!_2RY8}aU `yFZD;&|8yRiGO5}õuRvSTб*A&@]͈0Pݗ4Vl c#C+Q`X &Eݯykq隚\ }jFo%=<}48b3%E`P&1D11|K?UAC\0^{]y l{ ]}E*r#OJQ]u_S賞)3y_FxAc+94 .Lk˷ /.|W7A0ewVȍ hJB?ʾ8 rs=Cek^/U:Q02٬1 ibzM0hZ LðJY`2SNl-{phx3=gƶebt2nȾ:Mn}1}k6Զ; 4˦U9a~1O/g}"']5QMˇhQUp&'Ih?-Z\-|;~OezQoW=Gh9reNlAÃϓWgwu!y߮~,gEql_+N⧙+wȅw%JZG=%L}M2Z(釒03 )IаK|!td97];%ٿ*AtKTC.ir sL=f)dmtʹlhb&!0HLVO(2k PC_8eb/"wZDÚs@;37]n7|\_ OaJw5bDuQ'*I\Dϩw#s  p7E-33۔3-&H1=I' *F =A**{AszBUZ P+9rAI1[=KBP}6L^aeD+|8ED "r#_0id[ʑ+=X%P`I!  x+Jn{ʎ}̹M4Ы 9ZSR+dvkek5xH  hLf'oIs/¤A!Xk7$5R]ɋo 4/N*B[Ln&eH+-/_-+rkɺX)jI=/ѶE Xg 0U\ZSF}x 4q x\SQnUQ Ps#S\Uā<*G}쓔!{vvw8v"OS7 GaHe(>GfM؛ 9DFAAi},vt44mt\c M;3 "Yp͓#ZvΒ9Hw!zabD MOàie )oRP+ ~C$jsk&y(zM_HXd4K$]G]}kNKQ8tBhBCN ok z{kd+)TNV?I?)8-Zt(U.f7P[[>^zSXN d7F9M֊`;"[ۿ Hu j" (=GXGP,r핉2E>q=ǧiMR}38فUY%E7f@#L+O6L~?@״/B$M`3lP;sd;l6D]ELίiu (:?w׏YZA߽֝EL[m=1Ȱ#0 ǰ҅Dh1OGkݕ"`,9@lR6QulB h%TE_[FGXv4YKb`k%?IFJt+Ka_E z4#=oJ|2\Fd5j|*SɴhZ<4ÂeHVgcE$0ǞŚR5KLH%K>'l?WݾXwB}0.?:ue SOإ1ǜ561nt4Q(3ɀ^: $&+TwIՔ)#[/y ұ ^DP3:NlXe]DgyB8AcN8mQY$B n(F3;ϾJ|;^î&"exGCcQ+p4NQ>9MWajFpT0XD)U_7hgܑmBa` NF@T)[)G?ޒJC%eƉ&kJjrBSB;&'n{ S06^)=rZw2g2vL,T_5(w狼{4֖Ԭ]Mk5 2X>Ghx1ch´wfOUi;!dh=(hNu̎ f{21Rj6_ʎ_lsֳL7dBp "+;}ي-Q8Cdݯ[΋u,ig]FSuO-fF}dGۢ%`ztX000 ox5s1K _"'4zN`xL)vK/PLIWZ%1p&-1-u?ET ʔ'B?e#O \s75)fCA}0 k 5nKho?*ۈP&kP@%`ڌ[)A4:k.^Yzn{J;KO]|J=S XݸG׺ :ؖDn Atr "ϓ}S[ pqJaᇅ⦅uAWŨ 3'pC,'FѬQQBEn+TAV1\t<)̇_I-^4(kէzJ4s(eGL@ O^x' s2)}B8X(/_~DV'!/ZBF.Sz*:0ɀ 6ja4Dx5G4O-ʍRd!Qlf"Ro˙=b](H}rv$[^:A%RC 0ͷþXOEVɧ^aPz.Y 1֒tQ@K_)D*/A`CNsN/9P] ݸ{n shxqA_!-PFopY [hg2Ȇhc P1}iLL¬20:@Hen$!L d*Ff"N|/%<, 8>pE+'NiJ]y_ ƑË;١4D"(/?ȘHÚ$BOToWx@^#u-iJ4+lƲ~.96R6v* ܯ3Q:|'Qd@t /GGa-UP&?/P AIEbN/#ĊcA"j''Ti2))Us廳 VHxĉ4TLW_PѨ;ҀJֺ̮&%S\8։<͝k3oqc飶J-Z=aIEu78XEG!zLQ/ީ nbtber3Z@}DI4u֖rP9,WZދ@bx5,t\c΁(!OxKYoѮǵf~YCtt 8&&'骘YGBrTR%gWq(?sQFQh ~d-PBbn-=Sy.a %PJ@Rm0;|},D#q,iZ(XIp+ῄҜڴ>3%%g\ xu y C*H#M@B;<]=Ĥ|AO{-4!LQ?Ւ+)zzOFgso Ғ ֶ e(vE1&t: [a~oD^bVڲnfA$g 5FŊ#dEX_euYy8.ϟq'd9B_qmN'qLǪu ]1ܔ J[k<@^y̧&r}[vz h-:zyR|m%Ϙn6[:7dBO0M$0]9ĝF )bC` o 2LU: .⛲5H Ym93R"ds1$kX%Yg/yu $amRV/TQ 'i* >A1KAK./6(ՕRa*1 \#oC4Qxmum7wRj|ZCVK蹩G^\>-i/ƚJ<Ф ]@^y!u<tMVSVLg-$Ά1 α۔J}vEz*lᖤZ"\h_/I=T$&qݶ0xCs!IZXg}vk^囼kB[S+5j}ehᒈ>vb?u랪L,=D8O )Wh ȱ4pΙs -D-IS .u2]o#b|$2/^y5O #q8fyo@i̙u5u;Nz(}!JpvQ]nꔒQR-hHӰ78^H*M(+WRg-cHINDR2EV I!7r}8-yInK,pq|8ǑH{8 9"'6rC^G"h;!o~=G7C~CfN9V`w^/>.Yt)1-HcJ;^^[> *c 4ٛ59V2OЄl+uP[ӒT^\=> hRSe$9=` H/o1ٷ[ >]CIƗ9ԅS:,b+wR`!3.9Kha&@n]h4PO1w^4>_KI[YԙVDm9Fi[;[]9*Y}!!+W~c|ѐ x'n/ _wЭa7ˊF:/N,p )(v1Ze}u oڎF0Fem\+s# Jw]l1x)],bѿzNMM@$V.[LI8rX_ {*&;!-&҃ȚuLڔml9Q7J'Pي]hFnfظ%tp^kIw+Q^OLOimZu<5,V ڣT!q5_oPz ~~[VL^pB$e֮J_ψ@3WsQ:~wCfb/Q|S~3;GQs&!K^2TyRNiPGDx04* 0N],!{'7~{fCrY(yQd 8(xH$<=ݒT'yFw19˲-͐0X؜Ļ\:M5IWy̷U2ۀ,oRl -J?%YhRҖDTaȡo?ue VmYB=rMiTq301/T;o3-G`sV:e]Ui0{`:IZZ8$+\X un )P]r/Edo aՑu4VOɞfѯSRDAgK^){c0>N%+ʧ/YrJ#.d,b[4߅&9KP@ǡh$NIpy0@CbHRߖJ_2+<ݝSW ʋ< zgIA|T BGe`nIG-ɴ1"7V Ux0uCvˢ'P k7c뢋UO(/Bmmrqo)AeV_HkG 1 WV)}eF7ļ&cUKPuo&<Ӣ/2d>͒_ PαhټZ_^U*32ȏfW]U4Ey 8RAsKExwP+9SA* W,[ 49 ;kW0KzP8#fN>B:ӝMq?Z)ȡbdV՟o?&Z%~+,6RtZ#U`˷iT|뷰,ym5o(WV_t0_2bZV]0L*Vfu1XӐ>YVG3;X.0N`y%XWwQ(r49Zxˮpr>6Z#HjO'R.gHipl{Wa֒Si?0%֛2ilQ -jSu&A֏p3qu?2t}hj7ay t~N_cYLbU'g-9!ZowLvU>*rwzqlY~WAG A.>'?`- ({"E>F6'[!V>Y 6ALyvs^Hq#NbΩTץ N^ m93=ʠp7$GƋ)oBs]y.6#|,i$-U1 B-6E+/5VϿ .UC;>^*aT3 Kצxr": UE!O7AeUPbgqgmu yʝ,$ Rbc-UkZdAbF%4O7W*l8ª.7Ausϼ>&g#\ɞd ^~pBD,A#oyP92JvQ-{ݓzYΗagm58t(6> b~il=OVm^&rq8 B R6;w>ұ c[d=D[Nr !z@氧RD {ÐV h\bjJa(-NUhoic[IGGV[SSl?YCm]@2. ӓi`qǫA \03\;X k-uuV>ƫ@GG1%Z ~_6UȆ2jxp^k)pқx[:u?UEGMn}NHBƴ(RyEH84|G-r鰝ُVzJ2XБC;6I\5yV#Qƺ釗k䶜IJŎsvArm:uy UvBPň@HE:8 ,C0QTQVkp@w#j9#:LTQ_9O ockؑ3*@܍7)Oʦt ς,7Y 7=񌣮LΓhzBNˍDzeWatD\֏TBHfrk#H~}.ޮsdvtP^Ȱ0$uAkeiN9\|N5ەr?1ar\crDǦƗFkPZE=%ɢ<(o-ᶀ%IiBtgR7K^MZG<R mwfA=.,ae 7defT#c$P%D| ; Vld=mc)T?_$KVU쿜ˑ U~FfU?2-. >\$ϥ̮ylz{EsE]ӐFGGD8b* wW)f}!-\6TU6u%Gi ۇ)yN5n dSDbw) k c:L_vwd< ݄i9%gUv=( +XS,!hG6Թnw7 \%̼0bVwlJ>@'RAFkӴﰖ=N5.ku%!r)3{x'[umo"βN#]n`6&d^cPUH"ܶ6脻#Q'p@b א} EBvCYAi?t-*rMM<ṙpDU3%bdiL D)`w.oWc]<ҾFK[B/w8 =mh `ftA9/p.6qf$"b{Rj&˾PݔףLv) NZUb觪N$}-^l[>js+שcQЗ= 5f^tIVDEoUs_6oAZ@ 7muÍxWnwtGv8:aN`BB'ɐBh/EM_ʙ 0wzo5GmX [VvO8$#2!e[;Yjߢ NY"4-CJUl}>d9cte ů8ѱn+&IadaH2s({s &xIav/;q/@&CUA0c"S L,1 KB?B'Xv}П2%m[H!:+g| iꂥސe.gN*Gr*|Z b3p1恗jqҗ(w1B40*U^RD*zrٛ2]+59d! Ir_!Ul+e) Hs #8݇|*ݥ N1:yv2;y™\&-]ιX4OHF)\w8cD̡yj&c ]tbOR6v󷦨 > +z `߸Ъ9h/=Ry{%^yMK|mrz,`ԌEb늷,ϺecNRjtD=}QtHf@"c ~צ@bYTߞ>쑲C"&DG}'%|aztuaN؃V$(:&*Zmi7Se_Κ`[c鈆O.\=L"0&\o%B(īs]9NKg UZ)kVDxPFyj$-M؈կ^P(D"$<*ꔾ܆YT9 0 Ox=RW7s8oF^ 0\2]r1?|"M] 2":DPͦA=ފi}|_X&?!T:*v-tT@1NC|.H?V6A!JID|@.4.p?4$e)y 㴑dY_F c>-Ȏ/SCoT6b$̪y yOs5 ?\ZT= SQ*eKPmsrAKrmn׮t3+W`$ټwYwO+S\ GbjµJblǀ ,/4 Ye]Ýl^}fR o0ٿDS]:qAGM 9q$a&R)C[QX67 Yr:V!Q! RU&r] U_@R_}ф;:]66=*j`F١}Zrfe6&կ1(2bWgQ5HRF&`#qaFmfV$KaY@h i.Qoa0jSp|0XBK?ЂNUIwli5Os3&Fc a56"E*6ւe?FLv Ux{ JʎWIАL*x> 0 [֊ˮ+ [z M@ v;5Rs)@{oz3_F2 "xIM9^~9BdpeO}!;MۥKGM?XoOQe ,lTv# ,L-U nd-ޛ5 wpen236'{ ͰkX f9>ؾ3i@T#%C)Csa;lbdjƢ)>Wo~0󷀥B'mCSUNO&Ffj@0 +D,>Ë-ļŅQqB{-|j-ŰX`nDXA 0AX5T3PjFrJ 2Y"ɝ;Jۙp!sX14-2G_m\P{qXV1%K{?W8j>>!8m10cOt]m$EAѴ+,m9-paD v'Le,˜vg1*5BXT44 A&Rxj!1BXW318 2r)a>7rttf3/lYp2Ӟj̉aHm|ثƂ8aj5ξۚa(dU5Pyۑ9ŏKZ{ՏB{p>Zߌ\&?~OLيɩ zXN?5sQ֋Ae>J v!/(CKvז i2iŐHB:ޣ=QnXZl-c@hZNj"Cii-hŝk,h$ƴFu4<`֧əR]c=vGM.87+c_va (f`\鑒.o{t]+-?F(Zx J$S0à<Q"i|ٗM6<گٺ&"LVnx^İ=+&U4q["nN][l'sq}02hO{Y͓# .y1:b ݑX ߠ=>*[2Ip .IL!XU`:6.Xox?~GJ~y 2t5Dq6+N.@Lk).#HY!W)5I{*x03cwV\ 7OVQZezfP\ L4sB|b(t&EIB;Ϧ~F)0"V*.,d}%(t\6:%gZ6]Y5l{5[>&z h J:6PLٳĄ³b$X ۜ{G&2\mn6tT6w;bkY$M;Τ͠K4ݼ{`opAUH?[9eS}A=g9Hr’ ^SP@/M|gNOZjP,xm`7C!YZ3<(gF[DARM2nߣXQ/eo xjƄ3y^y=09d_Cyc;c t|7>9]!{쮚E5|WDgޟ֏$4#Lz^%]DR16.ͯǞ?Cu3 k/ccM{ Ic‹,tv gKJd8'=Òsܟ 0,`O#"?[7\gjʣ`oRB,e=nUIF(ZrF 1'Dg=f+(m!>O:ZfAt8LbZ$MM ~Kȏ&mԡ"g' 8d$Cw*WGj+ϻH`h/hIž[7&+JɮdT| .}ךж|ycZ8G-$6yC͛Qi3NNaK*4a`(D|[d  <+mW"By_F;x,T зBF3{VMqY~LDr3[ KykbfKhvV}TDÝW]ʷ ՠ< t|(Q9R&H532mzjڳ%4as2bAݤmJ$*5_D +%#;t"XiD~;x0h@Dz;#p#>G9<j"Р;N@[ORQjH:$!16YG6vF([) 4=;E@A~TΊԳ V\ arٗy/dnܹ0 Ȓd ac"6dmoE@#<7o}Kksn wby*wt yyN;Di|M2l҈){PaIAl:#Yof ޾. 9[cv0,o;jM|. x+7U >!qrDgRuc=V vdX#yP[xʘfn SѸ[#A(q ?ބLYjr-Y( "$P _ j3<#[391kL Pq^`)Z1D{/x6uDKr/})$ Et͈n{~+3h OeILW45G d΢oe_5,Q Zh] 7=i 4fxk.p^:0+i9Abǵ,7s5>}B=s Y\RPԼCIG߄?onD)>1ԣ M(ȉ{,I/SDܘ oȲyMqw $-)UvLǭ z ryUW^֪K'}iK09.+ݝgQqKJԳ}xPǼŴet%%I΁%/N6-tn%oƧ ƬLSX+"~©\1q yUո*I" ƮypF^WZkMAm;oSANQƒË@ ^mV{gǟu1!q2룖&cHG-V/{u;J>[J"T,@p_t])*6mh6˴Mn"r\ڡsq Q\.ciJ!;8g utmEeOÊpC#:D#NqDy?%qt&=ӡUsV N@5Wu(F%QRs반ZF݉mgܝR_ $eSL TT2f;YFkX!hDMGG sN1hӒ9p/_TЁ@Rmy}ԋS4U:zYQ͝{b_k0S {jiŃlCSctaCopψ\ZP^_sEuޯ:'ƣ\^Se(冲1Saf44>.(*eʼnWq+&Yd*8fRoF&V+k;k3qb~՛5;!ڸum,ַwo8L01&flFj%}ES7KuōO8 &ԦVW{@9s+ŝT6sN׌uS?S؂تjG]d޹kF4\p((@ rjC]rܘa$u@P@B+۸IaeCSwKvz2J==}T31 !H{x=Cmh@4v߶zbs^e/1'5TQ> Ҫ}e M<4K r*AȀlDռ(8%YRA΋EBT5^+vj]Lqy/iv_"{w^BfY,AT9\CTm80^#;QO'nB- Qn+q< ޔIb=`«Y_0mާeFCPP]e0yI9~]Goڀ 5[{ɉg \ǓgzDF 0m tͿx0I u"$Gm..eIyڸUyTFp;g&E&mKޝ sv;j_^p(k+ 5Qa$֌aaUo?/m ӥV_L"y&@v]jvx5*VNЅwa/Ӭ.:6u Rԑ@rH >֯`0z8&8r'VmQ 9: įũIм`wFEwa2F꣊+ E.O`[OgqV"1Y;]Mq{W )`fowAD] r/BaI<.Q-"z55Yr?2MʥS+% 9OIt !j֊ac3u{6S޻Y[U i-&rDd!)N=~NM; u[nQB%m>96wץ͓E=\-6-RdY]HU6s%V Tna۟\Qos42i1 *Jq%z-lP_8~(1wtR,2) F\aБ{dЩ,>~h*^;=/ QQ&R}ːrTJ{XPrE2uXv] Q_”kC@mPN¦$yIpϳ208t&mkz2"o ;!X9=y2aWn" me7GDÓ2]B< abG\mBuN)fk)j@Y#akK%خ "gMzo'RVӹƜ60nz }b>䋲XIҀ{4^[OK Ɂϴ޳-#\5js ͇̱[H]ёF-?}+./"5Ī4^F.jҵŏ\zv"K=h:#h\`>Ul,`JnMTY)b%Z!+ GA5nOqx"pAJg S#D6CjyK}eKkz>ꉂ!0094 OQjKپX47ob~ĩxmz2Qůò@˻ +]R%d@mWjFAZ$I5|IR׀Kg&Tj:9ڛj1`XJpSIStq ǭP9,i{ȡPG7IFMVʞ? 18L6=`,);2 #NҲmn bΙtu2Ɇ;8J(7܆gַ4Ct!ڝ{R~ e2h0^Wy=*!Qܦɐj"*LG`zHr0'bf'"Ѧ:azw7[Ce3dR׀߫pb& v_aqj~^Pa%b`x=O(IJ~:|q 4`vTh!DQsiL`iRLG2DMbYYڒOU"A3S* v-xRu]-N2c-= ȠBV|qQ{5"~jK-L#*I#o3B{; B2P^R:hlw]aεߩ-_9LԵP!I/>ܾ-S )D-C~VOӶ* XZ\swdkᔐ5ОK`ΕsI[Cgb7/SLU&^Ɗowwϣ@ʡR8ˆX QpGzXjp"] 5ftD:X߅y>}7W6D!UZeP8 n421ǀ^-N-f-@ %_1!C٪¥qKkPj7O(! v*ImE*CYFp2QE^0]UMzCv`j80evQΈH]W ĘFb El[Bd(lĐ|/MbC7''.R~t! (+[̯cRT0kc[Obů Scn4hpsbX)_b%ugYpHɊuӤ+PHm|h GQ&8 gw"kAll,65;RxdGPNџOr;|#o$Ҿ ?Je*Cyi 7l`* gNY , e `- |$."Ptʺ"c-S\cxGMEOߜ~\u\Dlcn`П l-&6@}E;dQaA5Zjv"C"YzkܧY/c KF8D]@c' V8NxXEC¼Z5Jh37mtenɪ+Q W5kބx $Xh h,Abӄsu&B#bh~(Ru,d A$SS`2TDԻ)r?Yczʹd+W3tĸ1,NXrSsc1[S3~6GBRmARбqVE}ؿi圌qcDR{Xԧ+DDyg>^p`R*l<8IJXE:֗IX0pf-,mk)Lp](4fB/*E\~rxoڮ:k$H!V"dIa+W`Qm=>˜Ң?|Zj"Te@N?=#̞SUQMG%|G1NOV X lJY6:;[)J|m&[<5!u:9hy 4eL@=7Kd#M9+~Hg:ER^C__Y]1u%^-W0*_'֦Rq-6q5._i/q9^8kZ?uLֶ9oy҃9߆"y*MS%qAnULfпi"rl\M@3{`'qy1T}- sʼn1Us3ffnr3D&bh!{P5e Ɛv Lw?^ҭg5Ock7Ħ1kw].c,w6|v a)ݖTK(K$@|fIP>;WKl!;3os ˾W"%t L]Ƽ.q'Jv [272 w8XpVgYfctR"SSD#sEuX7r̐;'ieK5&>rCxxDc @7Cg{bƀejA 'L)]:̙!O;kա>xD% R7Pw#D ۥge:fJ$F.X xY"qp4`oІʺ/龷cjD׳m˼r8MSi0RHւ!)iH@y-۫ml%%0~g"3BS{5@t dbhhxN[MTK ϻIGK6=K6eEtuʺؗ8Rh^!_^`H tJo.IU'4G|7@">~$+H3=mˮHƈa~Hcx_rZQbiI M4lA:>ؿ_>ρ*$c|3M*W]~<| )*?(L`ΧZbC$;1\c-Vl[(6ISYG SجB%Y+2uH# Nc4k1qeΊg!S"+_PP{(aFZz7T׊5(+ ̱Zᤉ+= qA"{F FdR?c'fkcD n(nbZ"߱:_v١B՝[xKٗ:gؓݴ*mzshu(Z !%C*Tk$)fHmzn~Գ` |B)0j*[uAQMI@̔S@X^xM*&ؑ ;VshLƛOtXOGB=[]K)\mkza҃tݒ ;o yn?@^iESL-Tw~Fi4=Dk8|m!06ISV!Mg 3㯹gAx# t7ӄj*:|&anD+%56. IJo"aD`#=dԳ1ƥZx 2j,`Kǵ1 `UʛQF3w >Z#|iqt "薬_Pyn%.ww\=*#u8BfpS5Q^_WiKHzv]Wn&CLj RMr~?{Sjkb2-%ʹt/`F2Sw%;%ml %@5`>i(<G_ oIF˪-T9_P0$##$wIFtT Ve8vz:V;_(yq`6DD"`GhOiSp}Xx`g1Ǯw hM&=V¶(YθĠ[3oJ OhTH^̋E UU}D>`hWFRSG8YLc*T)r cCs?̜{φ:\qOT}O &3Mwvm:WZ_wz_ ľ+:?k7^diګ0Sf :+OW%xPYH9jes5wex m{P'ka CA-7L. q8Ye"la "@+ٸהf[t5Y҇C,/^s CRL޼Q2. wAv\+CfE?/5M\T*q5g䀗:뢚 \#yְ6V>ԛ*o=i  Wwu W|-eidCVW }%5u2R }u. Q!Jy;S}ղ=Tﮏ8*wY4~b 5sS\Ǘyyq^ρ-!7!^ ځ>ؿ)a%$~CZ d vg* x֔Aр^c+_ C5@ɲv}bP2Z24R&;UfN}vs2;!ek!7IW*2&bsMĨz@J0`uAmre6' я ^๐Pbz[#`+&BRzӹE>I$K>X+;eU&Q FDbb́z\L虂mq'3 :j *Ґơ"E7*0ʅ7߭l<p)APJkc@P{},z[]2I$'jF,` 5nV#@FJz-.+tVr(!/<.xvЬgk.ʘ} SކZ:TmX4nR$ qFmDq%A`djM̎-mgN%ƭizkfΗ%x@DNIR!P1< _YC^)LV4kBoV;3 ^YկSqUU_l4-ڊ}nP)#@_\,L"1]C^^4V(U*Z*(cd7" 3X .4Ύ kV}}d4}\W%S؎z;loXD*Rlo{=φNjK(1,OioT77ZhS>Jͤ>y򎈵[7, %7K#w^zp:N>wxHY_;#. ;e- g_wyx/EOyM4Vh/փ/2vnZ;5rŚsZ!N빁Oae{4ɶtOf4d ' /5y%ZA)e{[dc\{ #{L =  pBi52^P%w -[p!FeXhF귁zeHFoQ]ƞ 5s+.âH#Á-hV .qxb /1YGV57KQR ;wȝ3"aR@Sҙw(W0 S+cЃf&:\)25 Z?kaTaߺ92wQ)(7:~5Lta5IxDJ{0ݤZ30zqt3iڑ>> v)(ȃ>xPP9+{(5dp9(o]_bܯǰ$TBrvQ}C+Gdp> <3q#nǧ{0,H 2C}{GH,m55)]I8lm1ãh[c:䨡4⤝DuAX [Ob7Zy)aqZV[鞴{9_hv~ E ܻnDcdxzޏv/%:d1"7P5 lvå%͌~2LkV/yJReq=lMOs 2:^ ZF0&`9OFI~Tvrw=j3:]ע8ta]jP@LaO˸ 2(.C %GgJ^?XC"uVE=BxlhS;<ٛÞ-ag<#f{wmTfnjR PT ֗[aȔY0:45MLA/U2#+> )*g#¬rgj]btB{_mr6{9#`s uȴ J[Ihnǽo@d ḡ^R;uFYQc)=" dM]~r A$gV{O^B{ʅ8Sp͆ 8\zPzv2aV GIÃc7f1+T7D@h3UB Շre e\Xܔ1.&# #9އvWPwiVLvP5Iݖ wlJ͏%\hhO*S4 @ٻkձxN:h©/hl**l]x`Î-Vn&e2 |aI`$l6V*8DJ@x lBLx0Pճjz}z(QrI,(͢nb P v[-wDsnTAnzΪ5K`,՘N)r˳+yFf+tAʊvQ Ea_C_1`5#A(d@a9C\IP3V VSGuw&©M &1RGEz<c O%UJxEشPI }ʠ 4,/d-@oѿc\]լCR"۔`+?zcF{a As[zrBqXK횂*Le TiS:ɻ$\gZ[I R\wNa)Mʃh1l)fkdBZy^ Jq_vWYqwhgerae?50FgW|3SJGcPy_G!#H Vctn-IǡyZ-35/Vb ) KqzwiڹDukd$v~Qhꦢ CN(ZiRHH(mBz#Yf_8oÝ6}'h LPa#BV 9tG7B 5ۺ]gLiK}h\JǠ xY+#<Dc*>ZCfjǒ7I٢P鑝 qH_')0g󣾇${[_ݸݪc{p8lA`6x7>ijdϜ 6-bkϻQE^ &2F[);k9~Eye~MF0<o"H}:,3r -.K9fwT ;,4>?ACC.LWPHy'F+bBK.ʠ.iG-\"cxs7h,?e@ډl^22̹Xh׆rT\_<նJ4ѤhremO+W}uKF+R[aD UOm$GpvrRPj.;"$P87ή&wB]b'D0|YGx̆[;!iY֘-M{XsanmVe^'=}YP; ;y&QA Spk(`)狾R ;i~;;yLh{VAKw.#*~kSgy{df?ǹůH'VbUi͛o~t*Jݛ0h][ @B+ͩ`yG607 ~O3P'Ğuz{pP%&B.NC998Ϋ͚>w⭑C1Ό'ZR,GGt<7*{y'W8sR;n t*2b)W漾YRҀ)Q+~>؞gK1udrH`PB=UVw](0tc!-!>l 8]ZYu31~ 9G +Yd?*\n;؟&@ ڗJnvѽT!^ʇTǭ:W NcTOb/^~;հy(7sWsd9mzȔor'Wo \igi~ʢ"/]I([@Uƌ{WnEӔRpwz]$ER6@UaMz"rA\o}H]U*hke"aN{FWlE/5C1DQj}_9xȱA=+/J磏u:lz؍CBaKʽI~O 2)r(>KPŶD@Ay7?ELD*H]rc* +?1mw0"^T<Ҥ1L[QSWZ/>r2UzNǪAQlu+dDrKȟ lx-Qb ~t@nS+/'$R~%-'[&7̑ڍl#~< eMU23hQ4EGPY(v lE\22&:I() H{sP "uG ʷ  huʓ,? \l.))[=[7>ʪCzA]_L$)C3PmrCgP5€RhZ7N6|~3 u̾HM?:p"nVVzzQ+/]}iڂ22Z G֚GF9 *ab7[f&}*)d74,S[U>Mt}PʐH$,QcNjq#o%c/66yr&*bZWMЃ=*4i;-䭃KAIZ PXZKQ+6*(~ߛ>sSάVٮz!Ť.qh} ˲]p;ODG8oj*eHI|f_t$'&}Vvf-um,cBE 9IC1AAVȣVB<H( oh+tQ~ނF ḠIBjqp)$YW)AL8S|Lu7F={  @^BI7dK^HX(Tp`lWb|~4U"i;#3")XcGՃL=b /vvh⑏q\.z}VbPzSU0}\-h] (أWmV5023IH=MfZ[:yۭgl'yB^y 1eT+[VD9{[ol09fW{ l{5Z&'%V933{AMx3QM&`J*QYz^ZխX0 μdtfG[_mKP@,];ZvkAnL%ϫ NdțVʙ$km]~oM YNlb~ݒDN/_=v3A.1'>0A'2 /`#q擝o`#vr SyC|Xi2<}JN&BtbꁜB6tt@ 8j] !3$M9,t7f"FnO[Q<̩B]b:WD;~V~^g;~{:5!u P;4D͡=J|OFF y/,TNE,~'E&#zaW9~R j]ӊ~k }UbrvK HPBe(}v +.=9țstoR0E hO2'UE=92*B55+?S% kd꺄uJ<6A-@:,0x)+G9Ywsz(5l?_%ƥ=lk!]gԂKH08~}7w @:u-߂Z` uc&}<'[D[xպXevbe1_͑be./l-u)MBd=mcdyB,PB+8HeYAZ%ܵi~ʩOŪcth}f?"cE.;el5n%WC+ƤXM\7tV6oܐ=~S&QB{f>$xm/B/yk ΫG>6X9znGZ%f} ]<T` NϡI\KLPJo=hʔ ąyCN&fG,cV*Q!<\ f_x^ΗOD,?;UZi\ϖ2 esRr(C~7zt= lnoZB8K"Ȼ emjUε3Ҫනܓ!3c6nx0> iEnqVpJگSP1';q:F 9Oݩ"-~?@Xm"m5ü;%O}5T &Kt.DrϺ}?YI|I6ҘB %ֿ;~e>>d/i~@ $UvK[pBiV4Ր y/ai'z\dsL&zbRAp3 ЯruBk|$}q1䷻v !u0 NyX^Ӿ$\0:=Df^H}S [UYg]V?ͼ_o.2O@ 8V.ߩ:2UڛxV]zOW7"TE%b.zSmpL?9 )+}y;Kl~/(]Efp}&:k$ mI^8g Q%@Ei2Ѕ&/t/yFW]ȘMʑ8*/Wl`yt}f)!kV+Vuc7w3v=6 nW0~[6y\ްt+`V6N 棖=g2=Z$p7Ѓw}{{rEN1>eq[/+{l4;mX_(7V2Ee +{Iw7:ANqyc1c~8P.o `i)xl)R{̓i~ihѶ#[NeRLW lNmv:& M]Īg-qBO&a6F8XyBRgihLrR)D\[XO ,>Xk%]~[~оyrkW3/FY?Q1?V0Xk\l<6! N9A'Е/Ydxh*Mmar%ERN1]CAM 9E..؉1{R^R 5\)1mcz>9HCU';~C̞DhL(;|dc]HHp=<> ,vNP:ײ߫D5zCu:"#'zڐv^*ܞ*g'\ ><_ǺU!w/SG`ٕӗ e*XIgrM=[ &?kq-qMHc?7=I^ӰŴ,0;`JXЋ 0t^r 2;5A,_38<=7 4ȞWwY Zh 5_Ёbd>!! nE=9/%18H 7"6jϗ`ZE`՟jrTm]D/zGB,aT?]P|Rn}Lέ(%{ O bH/Uw`2ItډL2Ac[;bd¤/!f!L*\]% &W* |`v5)8Vؤ*1=I>c*S2nK{N@tݙ:+h#o˔~胉 M8m!M7l֖ԓխ")GF}23d5M;Ȑ b96K8O$i%"d:>ak:= 3xL э֪jIˣ[5ʑOxM^fו*IdJΌ=Q׋_8nyU(W5UGsAWѿ՗oCU>%: 'f_}TJuO:v}ru[ix7ZO<PnUAWYNg槯5pY?9MDz"Y 1_PZY駱͙?WlXGN?cd"Hdd~(d緳R-u"y [>tXZM 59l &|˶X#@) @kO: SϪa7{✀co ^(Eō"0a#He߆ _4jae @⧡5.Xݑ&#}Xb6<&: SDfE.A ˺?X˺|eB=,1Nqt3S"2Cmb~ żB[>霍I' 턍s˂BwJNFR %`TD~#圑R5GA5D:9|yLq 1Rqn/#0!8(M}- 聸t5zo^!MeK<(O6 FoC; 2^ڞ'=Q[ENrι; '3qR Ĥ[~%z̦6H{3E;쐶5||CX1OTN\dzNq*vWtx*Y2Jy8:Zv)TB=#A4T5Fs{`$)ۭX3԰YxO8 +l9kPA>G;O}PKvn頦42o5@Df..Motqb =4B [|DBlѼ$ÄKwBQf~\$ЪAq')^ |&kLJitɭ:KaDsoh #S(hVu/h-ѻm1:w͞!i=dʆQ.iҞވB{(S@Ƴb=XI4Hi=6/M{_נ@##r8GБemV!Q%\|n #P;-(C4V7H٬IUU~7GCZ= 6_Ȩ0'pW[}٢e+-(hf AK;}|j TZ%CLsmO2? dъD`>aa7SԖft!Ǝ4c=bHlT==߲݄-Wf4賩'}ߤ2cf]W?3vMl5hAyqPFu!ToWiv)ˊ  >;2ԈAT;wmB Ib# ]6;d82Aa]G*¯رS+6- #K~e}}qB^)5<$[Qߡ\ 3*QcJ$L&d#z ` wg%+aVNG,5,^flպ13X1}8\Ia싟ubk' 5? W^!'avՊyD:}8 ~x$Z[ 2Hm𶔿}WNgE9NtN.ԙ6|L e} D_L*XܜF/ |UFNM?v1خ!s2NbvUbhC~1~ Z&˹HYXdp(:"^A?' Q@pȡhňA%_^Azz5c߮U)8{zz?A==`nBt + > _jgb W[8es:'چZF8K^I7\8otRfc@˫L/*qlʛl%o4gBGGe,ε9k#*v<&$,7,5L_oF=wY};f#+/5?,/_aL=6/5#WeRV>bz+ԝeP~x <5BFXY҅cw(wAVYDهɪ_mCby"BJTPR7&Ь0Ήelg.KMVMq%kIsdzܰ 'rgAy(NAiݫЌI!)@2sc'h;/C%~8PkD2l耋̱a#eLm`P<) =\ټJG@~n'0훵$ݒ֞jͭg=[ᖜ!EM5:&R| WX.SubQp&ϤҦ tCc%&s9 r,^ dkzTO#͛P GIi: gb / 8:2k~PC6ӵ'~~/ '(gvNx_|Tk=>aoxB/< n79}k-3[2=ҟ+m9. 54~֛kQeagu0\ۃe6Գ_sP͠VC Ks(Ťd@3g9cy3QAV0'?=oK|O8 v;#`e\RkilΕsk/;'~pQ2jbc%^V,,^M%czc.μw=HV9o8†4^|G(/l#w܉ _dȿ2vh7tQvpˡd*A¥zA`F OIci: j]RSrFs:b\3-Mc𻔬}?_rNI\@K $+XA d/UK,κ T C%aDĵ$<+!we(NeVGgWJUmx2[W%޸(7!=6]:H%O[h\|*yR4PPgRL;?);CHA؆#|DxA%xP^,}}?y+/jz1iBaSI ,P-՘(wهK8pV%TVgƕ e<*qmT$zP7CWy'(蒑HKHvе?.!=ăf OC֭*Ώq 0h`SR{!gإLiЅfeHʅ[ S|83d$џN2.XX`mcz0Hͷ+avž*Z{uMc> ]J4gz aLOEz oݩ /W&+0Gr')Zd8ɽ=7V@@dIO箽Ŕ݈Z#omjB Ȝ0_-7`i8XGUfyUD@q_1i$VAK&6.6C 0}X$]o\x2㌿Qjщ8X̓S7`Nbc;ߓmE(@;8޾H&\JșrI#bh⃈k-rQmh}rՉ";#\bYT[1rE'{b 8BMpq:Y@moD(^- ٧_0t?dqՊy 0M453]cIEGn%p)?ܑ`몷9|'㾪.f!چ8=bI(.pQj nl,1OYtS(Hnv㳤J9#C%I˜ZN6?qμoѡ$;)pK ?UDP!KA!uN'ȐP٠pl42Tȿ&ɬ^%oMvub{(.?Ƨ3+ItѢV;$|1bbe G]hhr%;PߵFEiB訢- eT^ko*?F&C+|S:ȯIU܉0./ƩV^VZ ^L=7?cd8Ň+^).W "K>½8 EZJ]#ΥҨθ /"-yj:l@x~ EW)&bz]JWqʛFFbڂ & y}hakpwaB~6</Äcxq oL}IZgsrԳ߼ڵG,`d9CM#B7}҂EBDƸญv+)Wҵh2ttY Do,liìSJ!*BA\ogxøt߳҄Oϙ#;{LRwձ;EԳKZ+`O1᪁xIk_ ofO:'@uofV4}Lk{s$^t ,<8'nA N%~Ǵ4Xd"0| AB' {B&/(  i䜇QW,|spagr;[519 &7TSJC X^D{-&km\.;DL}p<`USǜ,B4#>L*o4@h0C_AN $[S)x SSY \V-~N$ܿ:B8RA[uc ݄(;\ϳ>7PѣIo767Z)s"gw=-lU&ֺlmKI)ϒN© i@mq#ɿJOgxTO:+R{eYPЉj|RGQrtɢ;z\QN.>b-ԗܸϤ`F""E}NVlq*.rc)nY~je+í@0b+ZSBu8֪*D5KgtΙ*lh (u6)[i,7䣹Nډ}~1\k*6;F[F^ܗuf|m]4Wv1|-n+[mInxCuJoWsh~G(:{Q֪&B/uozAx<>\ȗ12!7gу[vJtTN@jjx9vنJ90v &gi&:v~u0}?+hg]Z_62*Fχ;dgȡn6*[L" j(6g'56|ueJi\Z,XË,MIy\TQէ]ppiG@Yz4E]_tO65>fuKyr2(yi4dX0OX$x-jK"CrTKC?݅w 5>C0DBn7L`JpZ9wA Й~&/ 2j7{qr{,D"%|le2@NO>Vu`pVW)2O]Y; 5~(mĊ9b>2.}+ۨAKU}].N ݋}%>R:|5zf&y#ǤTTw0OkqGӴ&”l6/.:-QUL1fd&ӂf~4k*i:-Ph:|/|_j?X)`'ݶ.8\q!8gR [98MZZ;Sa; 39T%TB(:㒪Gz>xX9BA>@gg-.qN32RXގi4[QZo>u﹍Exf&C2Pk `AX+$Ky1aɍIC|gP"7c^+BM-w4 N8R~6(74U" zqV y 6M/lhT$k3(/JU[ w2|T}i(?Z/L̶iNI95(ݝj֗Q`^(<aΑkugـ0)̸:NG80;ȝH\7ҍQ+_¬%5]E. U0 2 %i߂9/P&,GBL#MXO/@${usbd{s 8#;lFίX`X3/ܢnǢB37vOm%+~H,y v31踩g|j_뾃4'+EqpG(yoƌ0`8%P- g Kq<ݔ+ANّ;wWh[At[7Troa]tZqR l=\8mҨxh (X\ |v xv" #^ X2wp'zCrRF74מ2!;Ɵ8{$MK|Sĭkan2UV6zZ&C.-a j#^s,-"Ju*$B `Y5 S).w'7ݩw7@3s9ek7d )\ٓT7wfhKЇ1qtoYy]/{:D~II a b#;JLF?3&=X/2͉5q|<wtzn I46ă~M8j;|Hz'oh>3V:c\6qNRW=B 82l*ۂEGeHIݻ~Lp?muT Sn #6>C7v5Vߎ΋Б4tGcc}\#ȡ ]zW޵h{ֿZ%[ L"݊H2>;S"9gc4.~ZFgu˜Zm*OvXZ 6B墪|C^ӡN~?^PV7%^1usg2'0Ifwfj^t"8MjpJcZw}X-!t=:&~yRlת fDyDAcC~ 9o=ll7[)(_ 깂Z8)[3 U3 $j@:P©ݥ+a֔U[$QI6J1iXgpBJg0H8r̔đވ2s3s:&hћ=)xάgz rƮz6PĨ61`9b_٪oQmʐ[:qG1KIWVY>.W\7&>+?b_=p۝~szjzdx.+ੵRK02…C M'UFROcfߕ !N ( TYh/96T#ܲS6AY7%"T.˾A["cCxPoPz_5>68]_;l 8ERqc Oi1WMWm*u5MA `DkɅ>t0`t)2MZDlCяohK${Rpdlu W&ȏ/ח]7cQG" ,22CAټ2?´*`8ULmG6[5"T:z(ڰRI 1($/g[v $y{gbMxxAO:j89, ˠO:0]S;I!zȞ^gI/2I޴rq/-(而5g"r1E,KRS~߫L=sׁ E A#iVKV FIu)JJҨ._*KAK09vn$zҹ4o%u9TcMns@c'O3e7J4@| KfpoqξOKYx75J__=hqbmE4j쨶ssv/LKs2 U :&wTgyU֒t3a(gr!r7بgxPEI/iOmeZ7|҉%>gTҾI@[J +Q|xٌ ?>B&q-/D_нЈ\f7 Vq Z5J$3ޞm%T['Q}dsU5ǬJz08? *4whxSH5[o8M^$)vL-TW3?)D4#Y@J ϏkqZ# rR }J7/5m.='~Y0i$',\|Rx(w"e ( b;SmqOk?T񇮞FQ],'&Ɖڦ78- i_.5.c*] '`WU=^4m=ftFOа}绡d(!߇w5;e8(3>s&c6ʪ[Fĉ#HM@vR[Co]F܀rɶ_ʺ6>=1y;tخ?) x~NR tqC^u|Ŭ3M ;\jSul%J:sINRn#1UڜhJ M@hMRsTV\"ݒYcw;OeLrZ=*@kWqc | {r[<ņ ^еf`N]K&.1qX)3a*TM}j۱jd*=9EJڍ.gôм@K+||Ȋ~DZo8Ѹ,N.-G(>msn8[eI^eWXVqQ*<j=h ZFgzKB}ӻ, 忺ͬP7Mg RIB;I*.9Y \0pTä2`Òt 1\b+n!*69{O-"sNNl.VxcYpi{#<'(Vdg *5Nދf@Z$J -xZ >p.e/za9S`&a&Q;y?7> Ԩ蓜bg2~8dyKޜpԎZO1y01qgq@%D5 (_T/'*===ыimgiƩdE Ґ++zY0} E6i3^O]`}K? 1$PD"}.\ߑ(U6IC w%3Jk5`g^ |pCOp$56Nf;C$s\=8. >>Lװ#?{8ɡ1T:EC:&x@((T0?P!)1~#vR<#n?3!Mo?AM0Z;dYv5.x?.0Kqw|:z@o֔OQ2jCwLʿNX#\; ݥsl(@qdtSY?}(]6%`FyQ -TAO(Wy@sA)v%6$``bFzujJ%T F:eA5\ _/ϡq;?Zv1I1pDثΟ &ɀ S@XN~|*bY+K ' Huo,|-6Ay{rE02/v8S2I>q/yLG[G {6!`~߫skJ-+wݞ<1q/߀dCBUoi|A IP3Ѿ(UL|~%H a*n`˻~h^ 5''oCL2%.p$ICaŇCD|'-qr\%`LHj"hzvA^ ֕>Oy%$ o5IF}5cboKu& ]b,E/U)nh~PcaTK"(^n&Wz=9$V0C~96T^Gy kAqٓ@QԿJrTzQ k2Fɔe +GQAQra~օ1675e젛kv!zTTQ 3cpfYx"$ ɓWl<Ϡ&gJ ㍙-l{Y=2Cы*{sO 827o <5/0uo]~U{h!( evLI4 ڵiRRSi oKN Y;Ѽ۰f˺SiaK`ȾmcۧI2U$vrhou5[ Fq88cLNKFT9PO'c{VƳ șʻ.1+Th*S;'$,vd&}el UB5wE3=t&ޖm;95) ~?&^h07VνjJ\[98q|m'[)9ZIFczLw-r:Q6Y+ H6s-4r:GُI(5lŀd{#V,s4nMWyXdVďl9$wWΧ趒9a v0kT%G`2'V40ú[''k%z9XMo;51zg$O9(ʌ1n4Ϋ(, d40wÍIam'hS|{g}}?xU{ZNG3!*9m[@J=(LpO~g<_2ߓoܧB] p[;ʻkh/316};?KT̃s;9}C*"'u '@. SGG\eQ umx;V`]AD94Ǥ }GU_qrJeA s*vrШsDн %? ߗASgv7Wh^b3bTnB{# Y[ ԩG?S7OPu$bqgR^ѿQ]o~k XF\<1CqݓLl7'=MS%/*T-'m:)ad } Ln҇BY*Ԩd [rE22b|&p+UFd,.t`C ~_o.d*Z 3Q핓>jr{$yMNf!+V<(]&x?%f?Xia_BQH[TTgԽ6f.|ls1C4BaJ<[-\OXgcX #A%JWyهd:-T;=6wl v(WjTAjvrɢU]̓pt"K tauO,⼔;a;E'=6!50x8Fԗ5jrl;nQdfx9\Y22J/kpAB }{G?5l I9-BGow $ xwxi#zs1Y毪i#vl;gPiX.sz 4Sz[R_?PmI'yfhj5>A %e8-_dvH'an dY6κ~{t:%i$203[x0K\Ҫu.YLldF҃~Q%%|*8Zƻ;)R\P $J|4mZKGvud98 Xr>9I<-!qM8%>.PZcfouN밁 `DbDq )nY"S.U(MjycW04&30T0?Lus"eDݵ&mgtmJEc*nPkyk)-c{ԁW>LV{U%!w:})%Ss nWk{΂X8!tE1hH?kBOx(Ņh0ˡyKOx 3mó/ "JT)~+^36`WlP j3ٍ\acnd !Mcv܇!y1D^w7Oَu{d CېC9bEl!pB UjLoKm&AF}X,VH3F]XscTanWmQaH`F&O斒z 4^'@xu~G9|;Lф.ʠ ֨FwVԏލ=IXm3`_ , g[0Ll%şb.Mx9m#,\1h\"$S -*Q% |Tb3j;%CMR3 G s |p}|:H [2N>C6YCcH3 P,;jE"3Y oݭG4Y& (?lpC8F֞,jϫ:ՅrW D]*=7-Ys0h Țv@Nv掅sO= [iXteX$eD; j8l_4Qzg}G$^5:ϼ>5,NӴ>1w91ü&:$h5: (QBZr|mv}X6qlֶmv(9_"Ͻ6 eŨ Gh܋_1.Ε6}c qW<}ugiX,*&yԖv9ECUㄫwjVX5v`uur}3<_צ'x2# ew\ Ш}D~ڭ6Z*M|9FeAK?0׺#ޡ C40-l)[o[ PX5/=Q8ɬ*>wͲchAw u=q Bh: Pvue@.UwXXF[sUԋdҎ'beŏuJgxTAuG\%3_4!N+eK UI|}(0Z:P|IN:,\:38~I;Weղn5?a@_.9ܔ(o8jR)7(.{n?$]r"qz0z3`6ST _ [(0q<⠅Fj,1+zۘ~q+\ V}rs vhJxSIcW)"?h@Dj ugEW0~G.ULfu%0@,q=v|Klj.ol*Ӂ|dƘ%0iqCP%}nff>PT恂*PZ8:7g)9_l?PQ\nja!Dl g~Y'mr]*ML<^ʗsC%jrihXP#E{$7c.ldSڣـ䩟,eӕޯ)ř8'U vP {WV\) uG,ݚq4h{"87x׃& 1p54;n[JEEɼle+խL$80X NrfiJHI~ Tײ߃;_y:?Z*Jŕ9 Nʠ&E(A{Rn|_͜Bxp+l ze㐭$YZ6i^߃h]BO;;P7l 챁bjSIDq#vEVMm#(R"m7:TN[DKb)(5, 1JYE1T K3hd g+͡: Ӷ6Ω,A$^A< x:`q_8v8;wy+M?n`_uzNEW!hF 1 7,qr:+w9@\ħJrz Zk`俪wh+B)yC M=OFmZ-nTBsrkbt@6 $g]t'k*OmsqSʻA Z>3m6M60otb=))#IҔj40k~XAO1{Ow1`cYH>aeȴjΡ`dj0T0$5|W[b:( 6xEBFu~ؙW'2:> &|3:wb7[m@:ǁSKH:#(;>srUȍ~H@ H͕p0m8LEn۫8?j4-5&ܼ̹?ڡ[ ՄP ^~O4g 'F-)Vu;yC@Yeʚ'TK.Mv9QD8/%Me80m;Tl"_,xec8ñvIN0]ě:apn8ξ$bAdt^UvGr%9UBOVW5LK l`9m|h}\xQΟj:WT2 Dm}%1e*-\)ޙ]eE=תpS {'ע~0_9%]LPC[47C7e9%wtgɂ-qÞ5xIUYKfHF8th90jlAE/4\aS2W,mܻJ&YJs|EefbYrYjOKz!Sr$tPD* 4z 3x ~jAIɩ_C[ď[ڴ<rC\2}?'wҵC|0YS"h_ynn mG+ZWK H",D!)a%](nŦ@v9T<3 "Ya$,Xb@A 6ʙ}ݣ]_d_xAcc:3߹,YsZ.pyu{@Vr,܍CAuLNZf#%V{I [h[f[E:\wZ`4 ׏`|aKG^x#s% 쨻E@bR[ >g#/]#f#1^='7϶ːhv-VpulH7Ȁx`64,ו#7@x1Cڋ-"fyђ0ux%aҷp,UWD?a/=} ý&CH鱬5s܀pw<,ANi:ݣZúI+x3M!v;S{I\~4ۨiړ4y¾'yX1F{A E_ ' d)Wv]=^޼@A<| jʧ4O//@dqT16T)*uj ȲMf`9VAՂcdhHS~'J% oZCŷ>TvG+|\t Id-1(C[']^60\fy^Ą$6>F1LykAТ|)A!.d?98hpπˢJ/%4(!h~,. F {ԩڢN8ػ$aN=rvK~A/67D|.K5w/|,wб}TQ:/o͎ZU2Ŗ*EL-8l*ɫ͜>!FB91+J3$§L]v>_ +}o28`Q[ Na?|(ZɮM9Hh,5sJ%"yG-Dx2M!id!aJ zv)C|ݘPʱ,UqPA3 ,%[ҧ_v`~Y]$>e=$C"ڥ[?GI4 WxJ*/pq\p ӚUYw&a}HWK@=2B~_Ű"ZHK^.OI|AX_3sejL2HXqo+9?%x P%6\HiAkZh1OqTpT pllz)ɫ[r `Wy.H2^$o՚X=+qֈ,U |EF2( _:q[dY,phx>i[)M-.H:'W_#] Pm sض ZKT3YA=haRhq_7-}1'"6ki &j$5 Uo{7mM'z%o'EieV:s.J_FŬ!g+)q!PW.'BZ}c@̧qڬ|R(ZM5Q6R~wni6>K?|bbu-ypJt8ySM[?@`QyF%8C%HJ5gvXRD=CղѾw؞ JVdٿX^2|1K(h<Pd 1[A=w1@[^qv<}h93Gu+eM!8`>?LW1-A$_.cZ]`˽wڇF$&яC \&Y$g!fD5ep6LP|~F򚇂*4FQTV]}C䰞K<9|W%⽻X ͔ڌ 3(FDJi!p7arb큌YWC^:; >)YEW"cmʢYTT[\j>00}j;z4ŞR=)AE O%DB$)pg*? a)*/]qޕjYh=3N BM㹜a}`q8$\#`rt 4:UFX .[<6^M/͚ݸ1Q :f>l$R39%17D @]:Y&@i ` -ls:B%cj:]o0A! ʄWi4afo֊ cJm(qAy|9&[e'枥zMB?:U8 O [3/>%1' `C"ƺ7 yq<ǭϓfC+t6Psң>ws̈́Hf: 0HKφV\" ?׾d4j? didrMlWm5txAMJU"wNGF$﨤懗I%SA1/ot&PǴt@1+n>E#mE3ԅPK&BR<|-Bj[kh5yl(lC@0FWO H}r~ yR9>p~u^`jRt1S\,zt pb !YO[~m߶ g38zں}t&u7v\ƓTe !AC!Q84Q TǴه®J8l#4?tg2̆Vf4-fp$H7]Yq\@#[HpcP>@^m1܀tx?TM222D;z/ƪ/!yM/PwN`I7z? ^^ć,D2@R$%Pf<~h;_ t*VIq}O6qj:Fc[$v+x*%4}(-aSq|5F-(]+ߒFzb $\؞&{M]S[_sĬxT;bS:؝s3u3<U@ǬaLAkFdž 43!Q#f'<:RWLnCq a^<>Qnפ1\wGFyx#JCq0J" 4r$DWm9%X?ז}Ѝ8PhZAQ!ArhfE{߸dޥjdv69rj%Cp' OAvW MQ^N9NK2F[v^¤2c %[kl6D e@4܄jT܋5g{w__Q n'bh?U4| $fnC+YrBuf?:T?$Ѕ益A` vU"i@mVZ9TG$IMԍxftgʕ7O+­x~Byz!a5`=Pޏ[` k Oޱ&<# $T_N]3Xqd m3:сAoRm帋*9m?cT_`$bԟn،`%QcU9=L MXVpaKNNJ^Ou\ZcJvD/ ,C^3?Lht;)ږ80MuQxGEe R+"k1J;lofk P!m]9e|ɰy%*f<*AיÂ>Y6{g_` +y*,673_""[BGT(gYةV^1P. ɴzUeZ-f |E~lz{hpa oQ.  ʖx֥_f lZUZ mc'5|Yv\M rxUd63q}4x`^f1%"e!KY |5`t"J Q")+oּDumGE$(yjE8ꉖztFlKZu\lVF|KlrRw #%'v_AKp)f#!ڹ2DDOnN _X݋BN@(,N=f&i7MeTt3W ̊Q+ƍ{龫)D(ِTM| $+ӹ} F܆YHb@jd!Cnd>zۋ| Tmv _J~  (,|JhP"IB({uސlvS h`(a*2?rfjRF :.ۀNWn_8^ /%E<5v̎szL.r7c T{# >t=Lb>gr䎙083<ϘV3դr,wV`I&8n)D:r-_dH|0xH@^k;Hh,cw8,<>ط\3(n\b~7󠎕:w,sG*fҕeAe,BR=' v#Ru =)Ԟ%~OxGL>GB8q,o^E!!+&QML_);{q=ۀ+V> x.ҚhGE`o4J8 3e+=EŤ 8zJuqH5iNЉIwj.`M]MhMXhY ؤq &= :U:+@;-_Z$ZSinvOWwwO@)-ٜ{Kw ʋ1\ <;|v+̃LXJSL;^icCȺG6)WЧ;n\@;0_!or`K~CQR49x C.AE'濙wr]aAs|uMhFC=!2|[ϖ-읽[?>G'T'FT5_%cKTkNPUV޿ :qv2l l99&g \BȖ ~\")eCsx ÎfɩGP,H۱腸*s/` y~,Yb͔0w*LF^ j*Q>K^]*e`/W!-Qb.Q7.59Cox0&Л.{ PC?( Z{6xVH8ʎݳ#4B݌[ s=j IL9:.$b.Q8ho\Ǹ[Ye ;nCЊF|~v`[?+GR<QaeX>zk뱞X5B0lD Ҡ2ژ zd4u+:pD1o=աѓ\ "rqgN +=m0\R,eH^!r9kQW.7vWqQZU@cDapqM'tz'nOsv?4çk.գ&aiZWTU@%r,~gg8 .s86NF̍m\ॏ|9cQpِ뽹 'nXa `+Ґ*=ef%s4fLvo6'ьU€jy1o` Tfu} ^ ISRDI=h"jC):SqZ3v>#-T!`, 䉚FC۱?ԭT^8~ zlUMvkH|,ث|Nh//jς J!vfA{Hus̍Y|o u `:.%+k*h֮)D<6j'QB/҈_|_e Ks\Aݣlr8TUr[u귥-".jUYLUMe ZFuW_~zfl~lk;rf29g+ujC˟ }ц_eƌt[S 叶-ti{͂Z0o w!:ǣJ4y>)y< ۽^P]?<Y,C!?3!3 Aqțf԰ܳP$$( ȌX`KpC1!KP8d=j /kӫ_k? A4Ma?b?3˺&XĐ1Z]UٛJadj8wYQJ|Zd%rՖ1s=Al! ) }nz;mCIөcOҤ@6JOTi1w/(jѮ^}z#)+  hcsUd*:uqrU αs$C{cNOWtM Z#6J~$owcfbJC%^*F:XNqsҺMhN)934~uВ4ر4e:k[]d]})^j4x·_4fW b'Y@+1}d]6.BKσB$.pNjq„XkRJ53頇 x !S픰QRyDXko.phTg%ŔG[8y.s}"ɡ ?icx  dZC] ǖy{PXf]޻Pq6Z+mFY%/ <ɃWؾըeayG)ب8uM88@2^` CwkK:P_[޷oRL,7;}SЄ9`X2"akE -)]8yW߷Snboo aG-r = yB^e߶qݧV!Մ#J&x%Gz5sUI0TU.>v}5' ­YH #/A7jf^v7"ŮIcC([F*_l—HTwjhA Y f CYt\,Fsfew\C)2a'3RR6ٟH# N eu.Zw1 Y'M@<Alk}kb`cvun]Ķ(4'X'=D kK" hV^Gzv;7q'ω<?q)(أA :7bizOWKuY`珍N>%";TdIZPC?;ҿ^(Tp+eCAG%&smBk W}*K Ӫ-!Z3ԧw&\&8}[Y[}r,Y;Lj!U1Q K]k$ᒍr^|wnQNY Jɐ+3+D4L[C e6؇jƆsX`yuNFr)%X.R=iz`h$՘&w&QE%m1u軓[=Ps0Q_Pfa!lI Y A1u(-dI8g*纂 qu%J;FwRo-&NPҭ;C[=-#) 7-5ҍϺ@"r(%;s.y[o:F{o7E5mϧ>D5*1 mUw'$؜ٟuwaRzkBRGi#C4ּ:OF_)n'd*ea$ADx]O=g |q4)($T+_k}wk*XS?rւT B=+/ke_*8"yuԅ P5&UD wj}>R_ X3iԏs~US"DH/t{G.Zp?~[oQ0Co+N$q8p k6; IXN;sGuO\(&˘M4\G '&;g[XVU",DR;xViy) 2vLq"g,I:cOHO@#0ql tR*UET}m{p5vy WM_3Eෘ۹zk;.t\mrpN8VaT+=TJЯ+[%t2@?}k'*-W8[ Akܰ1TmYmwj)q@YՀ2ך`<0vH:TK]K!|Bټ@w@z d-NvFzàXOs8> N6SX5;fz h{Llrٸ TL&E yZz>wq1?e'BXhinc-?j$!n0d2Bhb?Zk¤aQad$YL(cRDR'cLY:=r 0F*l񘢜Dҷ "@֟f ;QfL,[Od$sEN;G ECE.0`4~\a+G#Y3ӛFTM, "3P !k;5rn\bNy7-5m3Q? yoOy'’{LB$䔕ǂC~\xDxMnrm0WI(+vQ{;xmQ)ƷҚ"B1MVĸ7ɥ['4} 8~c`FO%;;rg( ֫UŢ;PZYX 9.}=Ԝ.yuInٲ]#4QAqė%QY v/gNypF#νNyr!ZSifD7JwvZ\GiFC^c$mQ܁08p?hl9 fQÌ0[*CbC1-T ծ{k *w旖mC[4zͬ[E/#i(OǓI@@hd}Os R $OFaks Zp֗‹?"ۃǁ=;w4IL;]d;[YOCd?[ ӤKV;)"\u*6,CE̗׉tJx}EC!²ZZg_sE߸臤=ZT= ~(!aL(W"'(sdݝ@^uw}${N.;an(1Y.o1_o/>Xm1 BbHA֕1?S!`}E2ϱ~^f fwˌ#6ilH!1W(KXGWERMELunX pR\*uu&^[3&ӣ?G@cHTrHyߐLlp"+._|ʉI6]~G :U`Mc. QB]/^ GiҋD/6_ q|S8XA 9(ve}_`$!cѸRLe.m$; 7ߴKo<ƙ鬥 xXI_zSc ђBiW6T|ds{;0k N! 51eA/8F%o5TKۗ;Z.i Xa>v7\~[t?l Ql2r+[sAlvؒu[l9B/pQ6Z!gY=ݹٴ^oVD<z/>wPz)nf&l\'[ca_h:bճ؏,D iER궾tꂧ=a]QJ6Oq`M}]eM&Qq,c:CN .@xLV3 O ژ~wWd41Mo z+%8zJAABJ5G%X&]KxzEv:62#$.řT!=$yo:G&@h^yr|~W!gϽ_Ct]9U1Dt%$9@yxĘ@}v"C\5otd 2ˎ~;h#_@Fw'!~wI#WcU*Wo$4q-tup~%:`?beӛ9RYUvP/ bH_Sߪt{Z]_ѳAk[ŖW3+#)hTP8ZP5]rUʯh,v&'Բf矴F[GT0)Dxx̖I;ERH{b1 d-C IˆO*ۯ2Ħ6T*r.ynt/DVJyWpc6}~SF8#TXޚoS֪ZA3Zp %&K=yRL-- oܻ\ +|&el*&lsM}!jpIy;\pގkHIc+\?0{oɄlUU,ڊ /qb3 " (7* pr" R=o!4uH 03BuI b bT5g8CTAEX` te.̱Qt7JW2Qfm^<'U,cޓfy>ժkTWPz6Gi)yJیbJH4:C Zъ]Aq$JS\-]AxN3T&NPk(^ȡe+:Y)arnܶXx0Pb| ҉~E 'e1{'O8ãE dy0FЋbT{_MI1IRhXM_2IVr8%TbXM^.X?*d%8%:y3F>_#o?KLQD-嘅HTEIt~5yƀ .i\CN%zWHauG-I h ZLE/[7A֓١Cqy8B2v#f ՚'g qVȀɘ>g_PU#&2u(@ Lk'8vl䱅 Sc/X/0fRۍXÜj`Oe[Y 6}fщ`O@#vSSSni˭fM1yx֓:EN KS'ک Zn-w1S-0?JרTlzb1MmfQߨ~n_oQtgK ΅x'5wN7Fs &6;ёǾTXDu/j+*Ez޽|`! .nlC/TAٴMW(JŊ$L]ɋ'7P{$b*e鰗HUw'`B%Df% * P·prQmƅ9lQBO?0(ھa6˄楈M;y9֔aLkݎatOJ0B6e#6a.'V2Ea+sr(:Ţ Vll bFw[n0~BD%^ 1ER=đ4>t$B2@e&b2qM4>(6FzKi0`JBcg$5kETDۈbx[Zyo؇I2_JkURfQʶѬ8sSFN m^%!~q&tdpTIQ(|̺ ʨCk()Ð4i @{/H[aK'~7?$8ܳ@vf-SiCR8|r\0|ݺ _;!"׉ >3;T_2Ѵk'\Q[WH<Ka}CAYXq+Z2@]U^ *㘿B7 VV` &\_6r ;e J)%nhW[T[ lkC7Zf^w2z/ByMzOyE#,xeS7x//&fU>:BmܐH'Jnhٙɷ'EHAu_>GsuʣzpS}l>Flt|<)|r9+'nME߼Hy>ϜH}qƸɬg6μ¼|N-S.S,TP,X!RX?omE hC2)M۞!}' ݉uF`ܽKE\HO~ab8Kjy čJxVeU˱cUu/o)w1IxlMdqLYqĹ]3T4k3J-9Jڰ/4j$oN-C>,8>IUa0W'Γ d3UYմL`Fr`ݯyDi+T{CҾϗ p>BWrT1LuE ")"%tBAI^ N#29l#8'@A`Lv\GV]4wbQ cą{$Df([&XHdaG1@b= J)ۋշLKyw鿯P(Fϸf̀3/, ڕ{Qp``--y H#>{+0*f![HS{nlʕݮ:sx#ynh B>V=p( 7ݏH[+GD"~ +^ LW J9}EmFޏM؊Fz yf8wtXJY,4XR so vX͂Ɇ{]cL-LzrZt%?.Ziv2`l d]zRTd1Zј1:P#Uڝ%7XPfyf0V"#41ݨټX=) 4GefQsn*#ݑJ.Vv_'t 9( ͒}qW!(ׂrc VVMr{_4ƥQ{Iw{(&e7;s:z^vW%\YϺZQ(:j+ !8A~Y #B"5bGر}DSy#`ޘ2 hlBtUt%eLAjmgcRX-&Q+xNc%⦝,k{CK͠qxx@v6Q؛ޱ&aOLL[>b^H,l=,wCFdݮil,TҐCO1Jiqׇ^ kp3q|Nio;Qލ:Wf6~]GR{\SXg>(abI"`&y4s:'P"CҜQAM(FÜn*ĚaHrQ*乞⪄`|_;+0,\E6'b \ᤫjN4$ :3c`atЀ4;^_mIu7_s 3,WVI="/bl>N8W%g*oVCXdd}NU:>h̏9ns 58"<~/j aQ0uʰY$TȞ,AB[jHnFx?agѝe:;^kCt,9UBB T/Bw|ڔP^w)KU |bC[H>I|$~?mRVmy(TUKq C?=%bpגU/jMO D"Ja$RI}I:]I62Ɯ,}RA$6y?\'n/WtAN؜Ptz?]~eZKȠC# |q:x(&z-NωH!Dŭ3; MRBKk>Y}`n7jzrp`3́eѪ@i59 t{x.CTneLdSV CZ;pvu9k4foI` 3D0@1@( @̍ qvBZD $ 1ǍP2PW۳+ڳ |OZ [{F;"iXjPJˍO!lbpb[ƒeQftP yD"\Q(H*63ٻoH/vu~dD%1Տz6)6!TZD qz.ƾ,`,/^>!:(|I33RHa,ac~bLtcy2VW$c :cц~%(l:BpP &Q>܏X:EWvazKɲ#s Bk@u!dV;g{?scMJ׋@Vt̄#]O_.:%%M(dg0%9tQNB2fss'Yʤ8f^Zn[dCƿέoo)>ip^A 9B,Qf#rQ"-L"WS-DRB i4@) YyG#tSG+짥'7QbPN,N|y{v{}~_۸%рZ+ԌЯ̈*#//Q ry̜dIXE=8hIٸ$$T r},'he+*"Shy^qCqVa<$zATlD_,H|Nd*'\|1y ߕtVB&#>툂]x͛OVXf}M 5= iq|٢7嗅0— ;Dg1LRe]SeE})R7%E 6ΟXb})v1,PK%;n"?AZWS4=lE\SI>Rf~pn]{HF_JxȤe]H֜+0tg0֕XQAg~fh9إM6gfc{ c{\t0@e6S9qaV`C凱LcW{༼R7~Ul|>-4mdyӱg.mN|cuKRf,> ^}c@Zj^r,2CI-נREP+/JNܗ=L2SLQP$T1Wa (8$ٔ;q㍕y΃]U`~[],gCNzac"t>ItM]jA YJ:!SdoLZܶ^/;Dq ;qULx &vq hY|3s#Nqfqe`qrc \~l# z+œ /)P I;Rhv|g ѪI,%ֱͯs`'V 'q$H]DŽ%h2lRZ+o;f `rR]0̗Yu!o]}Z5szI1'ǹݳ24R? +PHM$%HlW&o.0gbկω^*i@[Yt5uZfI{Ĭ bk(-ːCxE=!=>8EL̆j@Z?eℽ$DbvdalƘ%%`$9 ːXo٢ktB0iM3 ܯIb ,x-X)̄U[0Zu^`wCALǪO~amYHf1|+7J);tg7uIcotf:k'oX?QS>%R,BԤ2RODH` @ZCH1*8h+\M0s ++@)AqQ5)~o{p J]-L!vu]4 ^1D7Fv9ųx7?M_$%+I[Rz7@Mu=BK#H .~#-.>ltbOc{9ޒ}A tJeJ-ϝf[&.`c|&j.)P =$7:JbK2U4۹wkh_AҬ^9K7#&^:q*drW9@ЏI%Uu23jXN +8 XFla!&y"1"LКr%P zֶE02^lHAo#mT`8.<Շ1 vu<na 60'B[>uiT4;V@$ZDKL a-bP+^;g=©_>.yՔP Y r~n‚AsZg'2^ ,H- C_w( 2(ZU7QoZfU=ȓO8/?'m", N0D||i*O&/U`T@ƴC,FAzy1?zoܱb uw\_0PPf95|yl+ +1lXn'$vs7 &g㺡c3LLF)>\̶ʙCp%͸IrpmbUv/qSWt bǐ5)dٙZ~h"ȶmbObCP#hV@| i ҜpnV\STrnc1_!ecT63BɻHbu% _y83[Ag'}8]y?к!0‚e vr2zIMJxh?O:dH1Sr#?bH+2|o QQ?B zވ;RP6nRЦlg8XJ3K$@v8.Ov`8K+]!|d,|/$"+f1B7vGt%ЀuԓhM\<%?9:#-ޟm(5HB 7%"(?)rx]fɋ {"bWmSZa #L$o؎f@LCEBxvb "MMuL ?%Yyz828 .6fFU4}pY>;xr@GTob)rGf$"C` 3ъg\WQ[eRg+q5i0B%3M# |v)AJɏ\kiϮh{4{Bld-f"ȄИ^ X`QSz_}{Ս]#=D3rlAX|}U?xG"6Sr tw @EB˾B)㭝S'ŅVqXe_l':i3mr~x#E=g/TN=uݳIJ_O;-FK}U᠈r,] tqĶܹ9s/hU^|.'@6!~!q)Rk22RZ mɤܖkThVq\GB|P8}yY#j Zvmps;/ήdtdgx6lx 84bߵLBZ:EDɎ3Sg mkWLU " C<5 tN`;r 8lo+0 WBizy#BAo gmHC8d3#/4(_C8$^Ch[gzMiqgju,j'K%KG%+|9ؗMmzݴ~yXm7NԿ`81EeZ ̐3.(38@ ,xBKRZ0w9I{wX*!K2;JT2|I'[-2K:UsV<W=t,D,+NohT|Dp-ɧ7`~y&A2]#h﯊BXĿ x b5åO:T7w]}̰Csf]:F{XTlh?ET^׏G\D@]/Aͤr 2*eLjsxO /G6n6_b|`Uͩ8xw^NY\A$kRXSnUJj'(:>zw̭yuQg/Դq "0ԏ)<f@иu^"W^)-^6xA@33і\0(!ҲOw'ecEyW LXY;mG Ә^YY'/[5dvnr.;łDzTv y`泂=FdiRpT (Vy*xZA B,Fƺ9C*B>#@Ȏ?ͯ_mtDqMyȈs#|FxD/%@%22yH:P=uBW$(nY|8>0ämbȐW9sk=i\z4VM#,%,d!!Rx?-jRaw9DWm brおB1x8ڝs-~PXewaoj)4 5*[U=;$t9ui_Wq ~I ω18d<W@z b0s\`tˆg :kYFeW\jC]^"_Z=rv3C*` dXH!~6oȘ@?͸Iu(m1ڊ)^e -i w$ W3̟])iUyKt[йKp UIO 4_yHzx6_b aPsc,%J+?/Ex֞z]]V,;(Zn#看*tjj3 iFF6I&*g7a@uUqRisU a\bLf)TN ]aiAdY5<:Z|*gg |"7?Lv (>6U'2$#d}fĐU{I}4]%"s2&z۸(qY<&^h2D+߾VJӒ4{@*eTN3k1p x:(UvF&ȠFN~W5&ncrsE틏Q녋Q(d;*ſ Aa!˼b 8Z.kn&:_|ҨVV 69-*%/L=1kAkI 5D)|NQX(V* c.7Sb tOI ?BE)t(u[&^9iMq '-}A~z3WU=VRfг7 q k>Q:ؘ 9jĎ/I zv0kAWJdX `5O;]{9̕|=-T{Fle)|40Q\ 1#H; (q) Lu`i. tG@!u;\]~cԌVo?V(5<;(k vF`'"6q^bqEv%2f]OӞM̭C: o1NpU"I- 㤩{掼QiNF}%P,F T|WV AX'&CQ cL3d,g6 >/UkeCՔDjintCq'SDLMس2"($ЛQ1~pΘ|8"_Fku;=d]wM=}cCذCy,_Q{Ddda9Ẹ!Zdfeak/#ڈ¨4u(O5Qiu͋#KWff"Vi'w> AUxELcryo^ "g%-&! )s!D(vTtJ@6ṁ uܬaڜH]<6~$-r7:b kp #4&hJE[' ֐Ӳ'6gFc]pD"U]޶{T X(R&~z!-VRQyst0'ok4-ґ,%慙dZ@r%O& MvicCIbc|U:;x(t\ldde+ƪ,b- !Zy*ņb9E*9d ,]n'O!Ťg|cd_0К%IF>iX*lPPiHJ9;}T'o+,y` >Go)x.NJ/K;bU)*癄p:MV13lqeQdO})RHUxr >VjH:8Cr#jPt>RA[y~" kUzi[K5Gic W!`Bƽ[3}ΒKp7O4EaVd'[hK9A(P]|EYJS̏%,,$n:ŨQ XShNxugۖF- ^)#tf[Y3{!V5ꏕ(Q=rDƶXݲKΥz5^Z]x \:PoRH@mNx**ǪaAʥϘrĆ" f 5},_˘" RX<$@z.U8^ͭRnۗ"pY'_bdwt ?bA:tsp* BFKqXf!GdBytcmRMhQ=y"a':P+V_hR<\%>JZ-hoGUB%쉏2f+Yb,5H3_ptZBNH1KF2 `s~vl?v^L~yZ FpFqֻt*?=%c c9Wt/1_8cJ=qU 8ʿ}k@A pCchK4mg ;V&tiZ>rkz^,>kOzBeNb۳ {{LFs Hx9TqBξW)TLJ/b!&sPz9#].wTL9H".u cLbCH=i\_)KbĚm Tf!ɰsky<-=n@_z$cȉ6GUwH'bBt=ƿ30;. b}*kKhbūBhrg$kW@hzyĂfH^uGm`enR@}B)%(9Fr(UEU]w}Rrc_؞x=P_SΞ->"H?|`H`z crY u N&^2MP„!5z},Ο&t4Bu: ړ .|rPF ʕ\xm [BH$*3<ڏ[ߊ&e_ QSKԐ3)){gpͩ@=<r9˨\yce!ةKV0-`q)_k~ !נ 8~ÍҌ|}_^Ρl*Rq~Žs~XUoB8Mc86%wu6xBGgWM\kÀlN,VΔ༏ Qb7c%jd̲urj׸YZ6# λMPЯSUoDiΫ *AM2@_DFmԏ.cmTHIcHnOg!ƕ:|2hp+I_-Mѐʈ5^UOK$1VW?$\\KlQJM!(st<_p+*$螵xBYQ!9H 1`Fap_L =%+5:ߊ5f5ܮ4qoɞ܀`omaP3Ie^TVDʦ][wa;iYp?bL!'A$,y:e5Wo3OW}j[z;H[Mm{-?sv6mO_taӑVg:_xt*%@ײCr' Ktnonz!Ӛԉ'D/1ۏXv"Bj2:`.^ @/Kt/7^spoM=8}ZưG9*%/-xĀ+;WzuЂ U> zX,fzPpʹ(8;iɥ`PhQ LCam KyVpTE0 ҹN)5>ڐDZE 6$pP~gmYb+Ԋ;n7]% V.|L F[C3tT!zuEsB; / Q]]sN ;v-X(LYG27mGadQ><j> &Aon?;;);5˔)zt'28xDq;b}}R9Kg;jJc0,!1Y’f7BEgV jA$zwbhd32u[Ukп6/~;h"}w/ǏkFw? | ^[^٬ N9WUEDCQ6YdXtriH,M"sl@hPJ'KcQYK*GDm22Nj<[p٘Ywy|4m<ô7bdIrjFy%"Gr^J MtgN_{.` j$Cj^)p\N.P]1=Y*d [Xʮ e+d9ÓplQD͚a˂_[*G<ܸ!'<X:<ʁSIĜh'bM,c8E4B K"A߫Z-)1+'Zg#t  "1u^(mE~ dE[{|5rcn6wU[`^ ŵ`S)N5 6X- O)5QD <{nP8?|%2EN;ӤNa,QK0&ZO \6gq@JԹMtHj~ʢ(u 3^tF"Jlv)NLV)\'r$g*+㉅f OS5_b n5ϊlo9܆K_o.fa/nWa78JOf6ݛ0?k3'#O~Wr2d'{iɍJ|xU$ĢDjkNjyrr3 Km<ݶXT5iSJ3I^mFT.*Q|O>jeQmN|WO\r' m8߆oͧ.RB'*[k^hG&9fqRXBIb } uPw0:`>޶Ԅ!Õkh-njz9 !X> pºP Eל a*kHM qAYxk[Pqۈz2 Vx{;87`;osvFlxCdtܲrDM{7O4Ur6႓ =E=^CIy7R9O*5-D;X*$kM.oku8s+F[}WMi{dD\ G3&t$vM{<.cNf"s!waG֋q9On,dAؠAK;Xb3Pqë2uf N@6x;PO\mNXJ"׍=V? ZB>Ke|P^au2ePlN7b6 f#”)PN׌A  wZ|>cEx‚&}3Cl+0oo%tzsJwo¼+`3,xQkT*@=y|cXh%@~Xo8>@Qd46Vih }(vS!V Gy-u>BYf2tJ| N5c7csC%S EIm/VѼ|{e?P"siAf̶4qD}{a3N:K΢.̳9s[q-qizKvϽƼ?60q\DܲoT) &BО`q aԉ|u&D~Lq$fv?Lc5M[//!2vHsɱpDgr/̝m-(zG5O'맿2yv464o͈0u::w'6Z(~WͲbb{[tK7&(5i0tުlxe}E+/V}~t"ttz?Y 5U"_Nsқ$[;r{wb6n͒HxH-&U>!\kM˪Gx !x=˱>hm^OR,+A p?ެqA&V3-Z*!~OAF<`U,eMertw_;,kp oLp ) is_,e%ixrݜrj1U F HQFIjDd `%j[br=(h ڎ|DcrpPx\ˢi "^JFYF~n9jJh\N'_;jxjNy@ q 뛺:|>ap~#"EZ|u$F(߯wW^!}5 >oGnCŦOW nrC:U?&MRE!:5""#O 8j!. k^ᯗGP¹p+8RxЅbf2F-^=uMcѱ=BlrA1" l;`.ç #hA: hѾĜF^RnW;-Ub}KIq46X֯TuAeL%SDq|= h !0eـ020 ul9Wϒc7,1HDǠO,X;jqޗdQ)l5Ƅ+T}gV|7F[נfk]$b&jfD{Ȏ1R!ƕw Cwy`0So jUg|5:i PņjUNK'C ^֚,FW$S*KI>Ӱ. dr3y1St P`DkXaU|1{A譠4Nݱ@PlYUZH=t<_<@]da xb6.+l o0NƉgj2v*8n'Y-lOy>8i*IňݳfⳞS b Q. isqGyWk~;dFw|QD\~P˻6,aPYWFT|nC4+m31ReaD0JoH4>Łq3kpU 8*8qMpn+1;NOsBl $H"m2${cHnߕd-8K? cnV}xtͫ-W:e"G4DwNr; V J]`Cs޵ dh(1GlɨjT+}eF7g~CfIQ݉ q*,@Թiʕúhu Ems%?%&JiB#ڥjp2s4N2|aHDM& qԾIN73Ӟ.X}`@S|e\ Q`cz((GQ|쓵7A3jr)ҩѾXFC@+IÀuJ??Ob[K6G}}ZHۡNG Y\N$&MZrX ꋍbANYqq,1c?;_j\lVy.[y6C [[\ۇ4}VeنB>OZDd&1.1q +WYҲ ea#:f z`Q1Da=* =G{xC^HHv𛽴 HN6 y}Ѳo B뾫JhdˀX+0; +1:jcSayb&=Wׅ2I<'bt.V}bG}4LݠP!J3}T:uyqe 0v0X- V\/Ignn{Ž,Lf +P~Y!)تi5=vn]M+NhIimUK)8q\e !WbvUBM$=H @vlRjY}ˍ Ԝ<ܣYA47#h;w6{MO ĉM$2CAܧ54"J^1;x[.LY!K'Jmn1!u"x$Wk81N4LlȺ|HS#@(Q,bp/]:֮[vЩUĠ.NxIq(t٭=M~4[\^+eDL;fXrz|a#o$.)14V#oy*/1*;we)1y@8!S66?^p :-#6@Zwy,}!"?1qpi~}a"de`2#t$gVO-Ng} *acǿ `^7c?.B3U}G!M!6V۔Lm;5v߾W:h m5D=brT'؁{ajAb&ze) Z#UzX?7O 7:埐|w%+X=Kd@Cm?m( K>urF݃Q $@Eq`?<e5SD9Rozd"i*ڮ?:3O@FBF#̡l) ;jvfE INP_bZ@D :O!ɻB``y;ʢ%!m(tQ8/= ZW,2w./+i8ŶhPbz( W?&u8 Tj+5CwbGvM@"L7`EWm\q_ dʷZhܦQ,@d5[穷p$9v,Ĺ^{_7Ö 5R X4+<7`6 !Het @tb.Ś\XM]34kXݖb͵tF6xu Ml).qHO[sMq"J|vn8\OӋ*o|t-o bD)P¬?@S^;(b]`: ư}QhKfVDcdcf|@8JPq$epfڍ긽 m2`cUyeA-tz (oJӍ]Zd'Y 4˘!w<2vQYqjDF.!AVĈBK)GΚQ/is H7 6]5lhs&Z&N*]ޥKQ5e{6h_h=Cv]OµIa_}CSxB(0rpRH#J5֑,:Jϙ6_YY2F87`+Ƿ-I5}ȿ3L>f,]_?fLLa^ qJ>FƉ(=L}0%z Tۚv TF:F:p^3YEհG7^rt|>:7$Xd7©65%TiZπ zDZ2uX9+zKzWC_#V 1l Ag՛j|ҫ(̃ YF4q Su‘tn{54ҖŸGE-Z_rЫY~.8]:dg5};/.hY;,h>idPHDmW~.aiS%VYQN^Gp|8 !F]2NK9Bk{qNJ|SabOsвf$@(sØ] #]"Y<;}KDhٮժ#og]#褕mw50ԏi2 L?.ܙjdP$_h0f̄jƒ*H ߥ!%m'~3f?_QHX$P'1}EjřOBT&0pGue5L1\L|"*bʒ8{>LȜ;P!7`oH Ks}%[2*z3+V;K-E>e)2ZyCYʤ|l8BE Tm:򬵲j?.Q@(h S8:o@Mgϥ-v̓:& 5CS! %5c]encI_!s$' Ǧ= k-Yj f4a+ qU-m MOrwD$P3%Zhݺ4BJ3j*q7ԹvHfrv4|_i*M*Xs61v <<(24HE`w[=J9`E t7o$Z@Oo60Ikd@n= ܭV?őDj1\ĪuJ$]o-zm\UȓYZ=X*ϦDvG?-;%'fxj1o4t(6/ ka/6Kպos[:]`jʇ.܄~:#ike_A~6Mb@Ɖ;HJ6_rH'BMI9< S(q</76m#:mB),CMޛ*Nܦ{<N U{NOAz~pUOGfh찵bRg.+[1)BjI:'?tђOmV^C,RjrRx AyVsy(Pt$B^؍sy`)Mf2b¸ofZL&׺qJ/ll:ڎȻ<9}ʽ[S/N }1[C);vsr,Sb}4;nwz+AQ}<hzCQAª{s?D hŌ5eRW%ٞj?ny>20tN+ѯy+r,@I}Llp;99H,vv*W80 r *g[_iHrQcf)[| nU]p;[6lǩmߍk2eD^z%8$ol%BJGrvZdۿJZ@a`[#=vO{+~텗=ZN]{c&Z_W:m`Hw+pϯ>IŏlPٷ,N1؝չ7Bqp&&My)i puLFoQT 璝kա,7&DA4!ow)|Ϯu:.E2YȖ=p:HWI.Yƽ[L~씢1ȅ˄OɍFp,5r:b- gcPs3}B:ʢD HJ( OB=bl(9RcsX\jgm+/R޾iUtcR>r/>~-]5ic{n! :IoB3WSmKi:l XR/!W)!(+KcQV>W5 Ŭ՟1af>d#SyRٶhvʚs60aЍ8U]]XfjfĠ x Uw}I`Rҁ6cN%Ÿ7PN}L`JqlYvnr֕L\nG=|ξ^pMހk fhCA,L$,D̅B v> ^)TFqࢗP9N`lG#kyxXɎi64玗4:q)~ n.eF.ІqД7IJe{ls&P%<ۄ"(SӇ]Mg1k FCBrl*Ԇ"@C`t[d#:XР<%_a2;z/~>#t KClG:)C Ի #`ALɺe^H&SLŖOObd:ñ8iT?9s.h9`gF2CR_(-_1+wȦ:js\2 PqGzܒ`" 46a9MbȧBoE3a>muy;usO90I%$R~Z1]a1vo`S``I I9;O#l^XLAf8 )VUC>ՙѣ{0wk }d\}M xr+T+xɯ O o8 կ{ ]PhlխV{lAhX4px296Mur\c0xD؂؃X`}Q"+C*ꆱ>Q=M|hE9Ϭx%b~8ᅁ`φ ^ֻ%+!&uMp[P>orEO=NӱX+Qj?J3*LVeҥsAE[ԫ8bV颒)" U-xXO-,$50ɷ7mMozXСvʓ  FɉFwy]kC_=[%ASɮKkoaܺOqG˪県*o솰(M޿h0imJlq~=BZY{S8,&W|qa)Nh>͙'BtR8HE X.4k/'A>"ySG}hqE4gP{qTXJ(R(s+@:M/,W sxcr g+U$氟B 6+>%ަۈ-`kPǪH` =y;l.X](oLZ_Dܱc`-O=i+wdK4WkGHt/&v*ca>t Wm]Ҟg R'` yLjݒ'Ņ{VQ8#k 0x`Tמcs3c Q7!,.np^uJݬSlci~hYuL4~~%;|llݞKҝXaMKCaYhj Q!lh)|vn糦c;)2d{} :Ӱ 0Y`)+$R;M݃\ V!iyBcgt9I~|M +1ҬvrO< e|pw[B AGQ\H7L|TC/~yi*ZˎcT՟95*la*z}q@Z+˕ ⵶.36KP4Q@3 jq/؄55*ZCOT\,4o6wa[ 0JM0[%cMQUn-s>o+24n C4b9<憱wODESΏk3-ڋEĉ28}=|aa >N;rl~qL5uc;49`K%f5nV4˹ۡr[0~5f 6ԪIYթox/P## AXu|vluUGv [TJ=RpPmoɅ )kc*yw_5E:blI9/+,_$ C?ߊAk 讞 k}.mRUQ_XF+cU L( FJE7 ~IK  G)yOVh4o[pkՍBɾuLˑ@9SD-$e\cHʡ[֪RitX3'y\^{ѻ99(j ŮGaЊdyFw8 %s*0ޓjɶYjE{"pi޶}KPX۝%u^ŬPR:lq Hwwxԝoa:bki{`<-R Y{Ϳ2mܙ&NfV`ڬ#otj[y4\̴I`H1V&l0 7np!(ņȴ,pi~PIP[EٺOELA嘹qoUY_Gf6ƒ;it %Y`q8"ޚɾ6sPGAo^?}fzWNKc:zס5l<{¿ -KZLI-.ޛٙxb:~ Sdc/@F4NpC2M3iL' hGOtK oI?0 rI븁O9Pt#woX,e4~t};*'29UMW='cP[pG)X;J}q]8"j77:GS5;wd6.pPNpAK\(7$ PM6|ü)S,L] BZ~R hzjb6@xnIE|ϗc %zg:V‰v.9׌F.,c51=<>ܡЈ|B_d VUV9@+鬣&ȇ.岫uygm*tWDRr.> ΂O&41dٳ:"yk0n^Qa kRlN("_qVU:N[YL+zb]mN^P8;",s/ŵ|5B!sf2/2cmY_X㉫Mw!3ƙ]>>XSf5 o"pdxCi+ 6[jYV@6~p5馿ݳ얚l%xvXmM7ޝI<(hEk\.l;暹pLdl:V%l^sfN+(x6P/}c!}(?+cY^T3rE`LW*#ϡAle{+ޔ2z*1Y@[Jbs2]Qt6O@M>(beQV¬U20n anЍCqK_iCIX=q;P{?O^{/%6௤Z F}e.cU-/:zzRe@jzuIcXEܽ`W4qG@0f/%ۮG:XWhsZUzU0Ѝ:[=g"5{ cR|*yTXI)KJMԛ^q%ԋ.3ssq4)Tb@oɪvi wp--ٙJSsqA e$AcHh4VMF&I sT dhz?T krgzʝ(cr^%!@yv?\_qi qrLt u6Sv)JC)|mv }f.z =w1oHeԣ9i9wbIҳRŁߊ;2s%.z~W. wmWu|YWwXhig?Ŋtm0k.JCm;ـ#ȹf"%79i1=.eZn^]y5c jLNͣl;u{Ϝ}< 6`D.܂|y! VeezH 4S}Y] 4bDX@ct-&]bJ&UlW~j8OlM IeݶBN6tj"*wѤ_:*AtNʆkv0H␗3흤<8nu_Cp(h\5Xb4Y!?͒zBǢ;OB?1'8/[;"%A.12QYlё\R'Ӵ΢8=X(3Fq ?р>s4(ػ9_Xw9 }>n+ Q;Fx!qNS)q|H y!_ 枫 h7R㐚 1 !.ϺO5VQG2ૼor[hRBsq&.\ؒV`*B\Kښ[=[i"*lOHTB!?1 Uc,^AhHwי!FYa

*uޘhCjf3&#^⌰+g3'sg%g'gƢ9R Tk *UŚZBQuJبsHW $Ӎr*dHOsFgx*R=E{2r]qOxԸ

uG-F#RVUrОHl@. \~IP6axLvkHaĻȾ67?d䎌Ya\ B8F_qZ?GØխb*=ߚGzK6I|az˯>n|suHlY@dG}dr LPY \K{[EploF `n3`UY;rE4?!Ǜq 0F<DXz6=&oҪHWb^[sV697P}A5Au' ϚȀRkFLR -\ .'@<-;i(jQfN*풬p(DO5@ԷSx:aIM S$&٣/teaoE.x@:&a0{ģ52.&0cȐdɈ?[qz1gL,?`Kn?ZaO:*wcQcG#]24HN4^I{XABn}f2yukz:0弁 I@҂$'}jr ?#̳c|.w)NwɔS_L(SkL1g*ik͝RPoؐ3C"ٷWKK®E07LlWspu?=cu>UOJ" Cx$0yOzt$YFdfuǙ4kǡ ].e񩭂'ΥT#kCq2Crǒ؍h>8AA/\5c̢fbHN5kؓp"d0i/P% hRc1WbEkx=KO;@N<Eh1yi"V 'L{ȠIvb[ x5yG;9%R6EQx0UWg@NFvnI@kK fQɆԥޓjc yؤyR4>FSIX}7Yftng=:(m=ሢ;2f i&U~b y~k"x_3"GM37y7<+<{v#LrQQ*X/|ZGW(%yb: 4t֣}qcaX! +ނU\euAmNTjؒ`YLҗ8742r)&f* Ezvxd+}jΌ`iNL%04Z;E ;,3͜u.9)샱C^R ҋh՜7ZKf_,2 yhdGq`v7O22y)vj~֫ Ke")?vXbHlwb-1l1׾6 K9 <0K䄎zCx]2=Go$E+-X1`z#Q&wCTr SٚB 'Q㿅!m~ 4xG8Gܮ=Oqp.9p :pz!sNf=y۫y tI 4tTݖ2>fu&Vw6Re' lMI%q:yz?)-8y﬏}  1~j˄ck׃:a2*,gɉK`fHaE&i.}x)*sرBÙM<7"~wՅR+K@wװud(Vpr`EnKJY,١l6N8L+UOT FAx~r'U;@´H 9;O#Kϐe6'E+% wd %y0}jDIDQB5/H Bpw1azU9G>SIJ5`iLJ^|X~m턦&SJWՎܸ6]!jT8.7nO~Cakw=Ufp|U{0fZ36BLDzwy'ovl_>73d2LAğNxY W B.+-y?VY `^ηHr 7'gj_\irOr{kz$g|OJ̉}+\ B.63`wX_/Ehh;s&Xgt#2ۉJh.YKGeUG2u|L#jbZW]qNjU@n0랅Zb_Ë cL_YS#a`WBe+PϱWQ09PӇ䅻$aACd:IhRʏRd[(h{c,($ y dAAHY#UV} W'E=Ⴘ꼙̼`y}0]cgJ.5 8D0yc M sxz5HSO/]JstZ7u1YOk bЯ|RRf1ȕdTݟ2}'JW9+YFm(5F媬}7vQc y[C[&,9a\!<[ Ms=Fn<4ڲ)6/hF}׵]J ASO+ #B`$M({!bkպmr]pZ,z coAW׶B}Wtm\VznrK\ڽZq뮳,+3: D-Ċa{i2W957;}<`PdP6si  /\jؕ崯|6rm W a=cC"/dKVw"@U8iG'`*B+l-%'wPA6ChMZw!(ez.Ue}T>% Gb4\XNޫ[Dz!T=)v~q&H|<;~ .1D ^ZuBő"SGnA1m܂A~- :E¯|qL:!@ߓMr ΒU&rZ2'!~ݒ+ 4xCʳUp,>W$_:%c17>橌_+2n?XdxIjf{nI#kN)A 6w :9e!l.@%eB3Jݯm7ZV"EInr z+IoKNk zغ08-C82wX~_B#-L54![>a+H4]ULlaZ;_-YzFޙuzTߏznV  k_F"RJ`pNKNTg+yGNHYk\8SgّY~dS2 GY<.75e&:aGbLcrg\bFXnr8tmS#T(cU[x\JQ3Y%[׳DŽi? \q%B"ڵx5蟡~~9Ή b(R& Hp$~#U$l9ݹ]}5 (fёfeI. w9َ [O`?Ak 4t]q?cSv?hȭð8*"h6(3iYnA&S2m7yc)\=Nucߞna^GdqZ603vT2jb ~vK=ֈ :/"Tk%Znx A F (Ƴ*ԥIG>g˕B C!Q"Iy= .>pVFF5Ⲻ1+i@nϸ.LJ{!cҡ" J9%K]17 *8Y_<~8 t L 6؞IU싑3u{ u ֯i3"SL >.B_3B n3lIXU-0d^ަegVL?`>`K ~dFyI|KHHhJ-.IJ<`F>b[ |=%эHz5\ }.J$|֢/ɗȭAKªYOMGWB3DS&J_QjArxȩV_ԧlt 6|&&;g-G10<0Nc2bd3O)k֡ʩ0 yGO k#+c3Nkh:E7;%{bX9LN18ը bInH,=(] 4gÇ#yq3j4#;uۘhg3ag.W&mR`L#q+MK<1Yx:0)ү {X_gAWDH(i[>^ޏe_kr 30?ڙo `L$$HkwX~8M_O0ԏF^S+}B % 80koko6Ȱ@YsB M+T}}YMuɇ[5Wt4!p>SCcL9.(14su]/\D9KɭC ;(엞!2꓃A5-vPm"`洿\AiXG33!|yZ(xG@=Z_9.¶OyļkŞ`ar&V I7}t{\mݲ kQRP5Z8]5fT^BB#)FAN3wET1g\yR@' DzIAz<ʖ'bSH_ Hws=" s" k[ 4#@A=lVp:Kĉ'e 56R&T7 O99L#Xb9pT|ikӊqIG'5jV|"pI^7]rc+V"~o.+U@jpё5+uO.vsR\6y3ي_WHE aY54Kxƍ,?p! Lp!‰2.'Fw4P+t{nw 1LV羷y5/L Ө-ΓLnj]ooLEh&K AĽvTjŰӢ\,to`mkrݟy4.lV}m1v2/\-/&m~r ,? V=~z ç_5YT"s޾(tG7#GE}$ MW9ѽN ih_X+:u]K󢠏@Acv0R0p I;}ssu{aXXP5ˊs^@ KuEQǟ!x-ey5/*r/:@Ul%y Q5n ё.Ģb&Ӣm^?u-ie.? d 8QrYpE1fb)p`^;AKZ[(쩐d7&i%S#2Л))'/DeemlcWZ'Q} *b֊_H e}(#!EB@Ld0@K^bC8X>$Q3x#*j3x[Ln"T}H*ybd`\9=x:nl] H٢"8Dw8WB" o_3ܮUY+iZ^@| u7e*C7o#z2Y?񑉘_9v 1lO7oAH0ΐ` U <INʆV+®-S[Kg'xbf2i=ҟ'%-j*p7wPq je%[zw˙US`zٶdy{l,f?YP-lwuM054\HV+c؁Uf9uXeGuϠ!&.fX&[T|l1٘*0X(곊{-+=)3k]F'17-?N \\nYኸx AC4Ov)mޚJCAI5"?E ո)h#ZmN訝Be>mFj糾ag[a|K0hs5 q ##X慡&t6/9<'3ep€FLL(w3-yzIIXaA~Aoqpĸh2 4Sv96Y5^`'H @f ZIs "CJN'RH8/A>&9zx/&d՛-;5*ݷ3HYUelise~&=sְe^Zs6mY󝌡#Fi 4]qM%n2G{"*.]+OfFWLo+m<;* [(}@ taˋ `"}nJ1@C;ԙ(PLEWe)IҤe׼!uͽɛIAsFz9rlLPE 1(TG:CmƟk+> ;xp%NT6O3$vzsr, ]_h/'IXL}UP{[^sFP!0sQnǦO.4MCJE:}Yܠ+K`=JBH&IߘMD*ޔΛS|\V[l2ǙzuJSJ*Uli57\ 7qiaոC6Vtá ~fgkJQ mސ62!+kɟ5i|wuRƻWl}נ\6×4_ӝ{J5AQ}A_ZޫY^2<+ _(>aBZo0pn5 :Rꗏg뺑gz@]7ϙY1S-:Ptq/?Z{Sdd7?"fBQj/qWeK: 7??nUX? {U#-I\/.c'Q@zCYTd:gcc5rR+im"6!q `Ү wp5;u6 X'V-xfO?{VjΌ񹹟Wa/˼B -.+0'UP=~*pxY $4b,^:eߖ3t^ ѼC82m"Zښ&8݌ݸ =cF c֬G$Ȼ /Eh!5[#n OYs`R0p|r2t?Okq 7œ:p X:1 bЀvlG-S<\zKފ&q+qГyZ/7et]Y8ߠԞ by-$;upsg.DK,^_9zNƚ L\fk] z%jԡJ0s$y0 7h,^_fy.$GcVJ0]ގ0#*ooCS*w(5褼Nv9Eivް/O ?o`c3]Ax%a?D "2.aYӎRsw&'z_v- $]|!s&œXјlMl9|nK(F.;跂[#ȟH6LsaxOx|̾:hӸ"lc(n9{g;RW'A}Pa2,ۣry^eHLUq}oϦ!%5 $K1}uHJeA_1 `j_f;C)l%4>A| #qw0D|^×zڊ˙:`濸uY !΋U=C ;(ćeu?]C))`C#؉MhRafC' %KנbO{SY |ОD2QCb^%'` dlO,.4QMkJxd5ig.#c_ZrFYbUdՂ% 01ܜo"s>//Q,;aӢ_vFjs`'EV;m {GuP׻`ҴyW%&) H9257)_D@z1v;z[X?Tr1cms&te2g N*?M.h%TTa5c96ITI٪mA5PO WX{slzBvY#v06Ik3+xVp=*)*<# ^&t?O#s=eU8?L7Iՙu[sĞ'c 㬜թ]o2J$<:%ܑ{dws2oa=B<3Wx3@hmFߝ(!Ђ61z Ah_aC!PAZV VǻR~W$>2uy2t/kFi0SvO 7ph'``::(8fp9Bd00(z_(}j->'f_Kghᅯ{+=??8A] '|! W#{)2BTǀ8.X{~5';d60d為"U|rsiQ_jsV3yCݸ8Lw]&#!U&GDfC͉講텬}Q]s%~y{cJd9ZZᥡ0Lt^D2\`T f=[f:'?W.!BkCH5[6X41g{*Ge1~#ٱfR}W\"fbC#`L|WdڠJGo6 tqZr@* OwB>#n>F"fJVy`IOϘoi';}mileN` h͠_O[~]{~̔B=lb U(&Ѡ$<9C]*K.S}CM)vXb&#%@7֏L63;LXE@1֬pĉ{[V>m0'Xqk}e 2pEدQqWnLUV,>Su;z5T2 |̳XoZykq1W:=h@ ߜ1k&7mySʑ1 ТIPAK)N`GhmJA_]I!Kےؠ`CW]7'߬'': +NǬTiPbCKQ$CkLLr=u&)U*ZjK{(O i WfNνTgBXwu&li k9+ua|G{{i.J<Ե(#u#.@V9`1]]>7TxXbJѣnL |iI |E+Q V؆9>6. B(辴GMgE$nL!3Yd*hH=`EE O;ſY0(Y߆iE]rSATSAm/;kb2C2s!Pi1+60d1շnet.v&{֯ͱ}>gB}rz Ծgm .*G&CydkB%_m|,JZөga6od:km b{Fþ̘[`$kv5ݳh"~ W=flx[q7L)<7-rDR$2МwD Bi)Z|pģ4<\1|cHǼCEѵc6bFbN8Karo6t%ah<`qSHyHo ZNXM$,\cIMHf鈝/N#/k,/1BR6iM%vsEp'I 8!:Rj2sHq/^7oYOSq燛[#"}):)"m1TuF"ɯFqAh8^ !&0n:NPm%Ud XZ9 ^ UmuN"T\hD>L  WW6fPn0ʳsFg3 6ɉg'.#aͥ*:'j[p joB $S8sr-܂+&2(M{4[ ._7KfpsHHAM2m=Ո|{~7um*bC{Ѣcn2?r^6ʈclϋlj}0kʣ6t쏏 r]8@Z}Pa6m-h뭨 WtdkƋ 7i$"sŨ-fZR2-kycl";FL8/fQvUA@GmF)Sw-ڊ2kY6W ( ͱה={3')4G|I5߱67/E=y3qy[n~[R9X@q9 -R <ה|nո=~''PEYavERO<WUGƿ) ŹUEEI|ga|8v{ 8O<c' Cs}H 2{tB^}oDvIwxޠtlY~1:,C;!B06?k{7CeYMlɤ$ԭ#gKZ2^ WT> 8%YnP_gcU.op*M{.*7n2ݼGijiXs saǓ EI|X6v;+Y40kFeJY~=JHr2ezlR}%%;]~E$ʜ៿|pdgŃOdշ4QD0d[}0R lD`)ٯ[7P"5:e":5y?:a1YsuMNO] ufFZM8L!t}0`p(wyꘈ-;m8™sڻ'dJ CO L|ʵS3ɢ=A8Ec1PÄ#C"7jУq4 2&hFoz::]s˚PXf%5`UE`XdӢkPᆕ5 bS` 8y&L'ZAzIy9̎ЀT$Li%5*ļc>$wq?XR&Ck3CP:9ΉCVXԕhi2iaQμ9Iz(6c; B(l<Ge/e#Ih<9&i ]*thZIΞϸZve8|uiKyV jZ#U@SyL- air-!ut>ߙ3^xȥD)+eWC й^z%7#R KH%g7ݣ?aBнRlwO Zu6.1rwzQƩZ :U6"/@iI8=K]iS &QZw92yVe'9WkCM&d0,Sن~˫۵LyK2!|ήvr9Ln O-ł,D _Gō*ژe3r z-~ppMT\a^Lt0M{j5 %l 5ڮ`1a  g{L~FꐩN8 &ןBsbʗ`G[Tz:B.|S(4rFCRͺg4=#2܀g{uDJʻV >@g,!29zk""<ܡ\XcF8in NjGYC2[iz åմҼSprnf4T N[*hgUө0m(]rV{K1y 9\H Z oPNx%l"tbλh5=,VxAwv윦ȁXZ kzyAS2pM=?(]Z*?L}쯘`Ȳ`TAq2ŋ@`y(d}T>>C}0$j}ɮA{A Rc?_2FuA%2!i:wȓUs@IHe0-RK U *fUV+ Q9>^-l7Z l2u5El.M"\aMԺJ MJ5wr`9̯Z#4; "Q;WW4=RdP2<7Zg74[f-N4~9a zv0e $K0{b#H1xP/e,e0%AxN9>PɭF\ 5jǜ7k+ `cU)3pA֦%կ͹FjDM!_#(eIB lyAx9sw7?6OE?byQ(1bM}3<,:C?6NONuĀ= ;Hc_ԅ.fyP\fiE{pnW l]H;=o-QVо 2E1MqדGLKqy ~ҧamPyϾKw7I0b}rMDat\D)Dtfv})QWBS*> 䌉sqd( 9˧~* ;&FНM;QT&29cl_MH&֚g81@W>g:ߍKW3~  ajVir`x=p'nwTe=NcN=YTUM 4OfE\cwz ^]2P\ UpaDOjIv,_K ;9xؤt+E7YwtEEV02@ 7o)ib@]cF_ L(D~MiJ+8==c4zQ+bu;_6J_5yԋ/;,C"1ΣN|[R ~92CrEzAqf(ߝ券 Z}{/֙2ͥ3EB]R8=oVv^9hߓ _/wکͦ"&cW̓f*^C<*6Rd1$T'YLzuc n;"Ol F'bJ "D U֟H2sQWq/r =Ycnh WrFCL[69TJ] msqpכR4X=Ъ9:׏̩I`DƵ}5y^NMq5eqeOnlZ0s=P^qhdh멉̱f5}T7{VboXvOE'L(Ό^ twvHz: s18XlOޮkzc׎`A.h:վ|Q`2'x0iq8n' |eFS4;ߝ8S RggsfW#..S8YzW!'C*9xij16߾]p\UUW2Du$sZJdl:^r)%F?nuwW;#3ꢒkHN*0h-$$}d~Xeu0г>$7ݲ$uB koghUB@^~fۻJl &ߞ1y@9etVH[R jxHZSLt1놑qV =іli׹jf<@ǼjJ 2dݢ'*4Eびf'FOسԩ2tu0Xc-̰>ߜ?{#O*Z#(CM* e\uO<8/3B*䇓"(xphS\S4f<5~43 wDJQNÁ& ROYIB Q#jcH$6 hbW)~v1riƨ͒G32`h n:|\رlӯL0~&n[:xDrdk3j҂^`2~ﰥj8@9 B Q-$mU<㘗(iҼtY4sQzqH#:1̎O#(\ ii (z_=frgci&NeMbz{8ul`^ٯ=L@Sa;4_5F_uZ/p^9yMz,N @ADžk~OS_SDҗ"h3oGJ{TV7Rӛof\}y]rJ2:|)-zz:u!v/xS_Ӄ3eȶHmH{ܘSxZ/9@.u&ԫ*> Due`h0k؎.|m3ٟ7Q=OY똧V(6k'|YzE<@N~ݏIp*~\~SR;?'0)4V[ D : )'4hʺS5MdZ ]KFSǎz-\n%s=9ys7/{H0p=;zrm}@MV`m.xRB+1bI\|a\f&:~.:nQZu29GfFx|7mubbpC_sdkݦ^6M SYA HQc졒>@v^,Re%*TL8iwS<۬M:Mf_pj{`v#чZ/WFlӌS,mV'Qѧi.Ѹ]* $W!ܛaB7`:b' vRB2>P Ɣ8y9˅rsS%D|=i2Ju <|] t&,%[#`i_=%3FPoKӃ:+1=G/_"0+d5ۘ;ʳA rFeXQ8pvu ._V\=}%T.[Gd~ŐЀ  ORw-x$a_I )JGHsJZJp*W29RSm| =0& 0֍JswsD-a:yZ"Zy%kEU ZA=TaO c.# B"FP( 0)(GW'L[H*t"P[N~{χެ$#Z-4T>4!g-.E}A"gԜ abw)>7Tw\ &/Vv,o,8DK9<Q>&gĬnoGd'eEmvj\YQ 1=EM>B?ų9 ORw7`Oek= pCF_窤"o%{9m_p8nfkP[yF)5Օ @2"?³ex5N@IޒYG-*mtS.&4lK ЅH[ȱ_1%&3gL!MvjVadOUZKVd5R&}:AYB\ǜS}G5#{p\tVSD `Iq&13+>U '`Lnxl%H 9f1dT'8p~#Ջt^E RCy'Į8>48x*JvM3 +-e "'M}AƳT}fV$ lgຎާ_$mi|yĀ!E;cU^TEw],*L>T2TCkM:"]R]j43CpI1K$QOǻcܢ+Jfnd[3TQ3D.QHt enUpm~*]-1^e6_uE3B1v'.l)d&`E~N# s BF[׊ʺJl0@ڴ1*z-"df/zE7_s^#i=HDM!;^vX/$)LK5mzn`ϯ/qUfU.].Zs Av\h\ 者wNC"^hR:fL9 组ܗI9BZAtM: ݋ST&П,1<⾻%$%M+Va1|p,8>u(o\8ȅ(kȌ9KV6½1/ThxMR^{iW{A9%F ryv"y0Pƚ}ˮjV!ʕBlŽy*| ;*4&,BIGsY7,hvx&h'PKPN;ӵ<_D#٣{~k%bUV3c&qDa'w|9@#L|Fl*R8~VSu D=ZY\Mbw U45L$SC讒^96+y `6dC{T'џC b* 5!s;S'/3g 3(zHIm' -i稛J.pW|]( hk1L~fr΄E%e&5g&}BEkdׂh'$$JaOD4}:ɨ`-)ݾJL@ P-FNdž1pVRPcۦR4ڦpOO5Bͅn3ݼ xIr&UKֲj%:v%Ew2.5BV?,%ե@+||ٟUnmſ8 %/|,b JW 3 _LѧCF1[~Ha}OW^å^\Ok^ۛg#]EZjhcGAe:p8e k˛Ҕq`؞~\!ȅ{ E7;'ԋn 4G AHD=**K Yx? Z7lpZKC=hļ2߃-1-5 3P<~S:*Q`:,_]rǼK")Sw^zd29.pl4"RY:o2 }Xe?dI]ׇw zj,W-hz7J64Qf`W m\=xDV4/ (MNga3ݪ~&CI gKy1wpulHV6\LV  EV4Fg>+́&lwZS$Yh[t<4t"Л!r硗^&R9)nk M0) &mԨvJO>pN+힖!_Eز1dcvaTwm%3`n4w-0Nɋ`Q,Ynrꕓ%[ڎ $cj n>LR5YC\TU xL>7 6I<]E5(3*3n$Ŋ+჻Sqp:uF(J XA\SQtNl~j~|Țt\  ]֓5 vD82&H-5p0yDCnxS# S5 )y!".x! B0Y {}Tb@!rxy~\j6Wa7ʿ(|a5QǗ!ע_$֥fg:Il'A"[*2IҺIJ_ZHzVrqaEcI^:0#ea{79X.9NV!,&VFtR2?ɍ]PW7J aOxSx"kv8fB ӳ N'W^>~Z6RVo!xA}JWqS,-E1J?One)ي)́nk9:ǏX[x6$Je17zjȁ/!.azMU/9X@,Km!v5REϖCߗM:RuwV7ix9O /AT LwTCbn.+%N3X=һӁZUf'xDYϯ!t֝nˮNZc3wkO7䁗T<ߨ=N'9M<_ńF:™5&V **25 9~ ͪc'61/cE{mB, 6%(NOyv#frlB[+8=nŤu}왨Je#z&,dQdz߄H9z8ӤM4cȑUi;  U]M7\m{O mD! yŝ<'kGed4֠o e4r]|Ъ.[/Tep>L! \ai9 A)s%rZām3ih;ӹy+}FwUyBa 3tCذӒ? ^*G*U2E֔P{s@(9b^]0›yK~[Y  w%_ # B4@"jP 8u j/v&|*/t`Pq\L͍1 KÞwϲQ]|?*HRvvv gkU%0OsgLu2(W L~)%f uF ˘9aK|K"?^bT cPdjOa50lA5Qd(_a|(4 5*w+.ٸ奖&ՠI:k .Ч~ub>[b;d/8Td@yQi ņڱPHqgIHwcb`vM9S1],ofu!7z$GfcUK1TǴ:_a } q5FvJ0'V9{AKA@Tw;B%EsIuRqrtu%Rk ?[2V55qDm4Zb$SF6kG)䂫:w\/5қ#cmѢ.UjXUuU@&6νDZ_R\{BHnjXA;j 2ݽ*|VC G%_xf Hp>|^hP'[QnQƙڲvhk*v&y Hj[+>y GPGPնc|:B/ ވ_[{(rh2 eiw RwJɴjW tR](NyВw B_,@sb cͰ4N[H$<>#:;:#?*q&D.jTDEyA;VZU/mؠbѪVj 0D6 a = .Y1{.'`J!R!FW==bʗ5tWN0SW)Pi F] D> h`q;!+?@b7K%Qߎbini>ط W[.mB g41*t-HjVێ-:c*b(D7ЇB|IëI4E/Q,'FY#^Tg}ƍYhh+;<迯9^&y'`Kl%b-`,tƴ ,FLW]?^v/RrXMHˍ-Qfēt9vAݦx_v!àf\`LMctTDlWٚ8U@}U Cۈ;~SuMW)cvט=xiҽF> Ck'_IH`q&[ ǎA~?J 2-Ie4g8k t;oPs0SB@y5= O wD!LIijAAm"}&cpŻyn$]ַB$ƊV^bdpr#Uœi>"pnĄ_%:ȺYfKP!c鍿}H)5 I>=(\j㝹p#B$*E)GC>obcQs"04^G|I/TƩ#5=fe LK0/2# D);W85[xcI6çWq$4NOD7s0qVwyƠW ft+&v&jJg~{pIi̺*;zQU&Śzz( Dq*%A b= _v)r2˶"#ݠ Sz}v[N5n (СbpP8H1 eOsq|LIxopۗi8l[{㬠PQ?YrwQVsZo\sTČp0AɌYTACS+~5(wAe JWDxB0Bۨ{L9%Kbm \§7X} o8z*Rez=A=iJEn곷a 2L#@#lU!1] wjKYs g6#DwadgtIl|I:˄di"$9ƶAj4Z75:{#n AƏc6Fn,8KiJ/ɞ/θk8i¨.QGzbtksDoصZXi{m$2r{H.WtΛCv( MiقN-Mȶ[!2&7'b^( /t2 S̋V|# \HgԖAnSn| )eC X:prV[ِ0N/Ob%*jP{D-זLrx/<_'E$nV /v+ FK *(3P ~8 :u9'2&wOLR׸2q>z^%f>#^bdnU H;0[O%IfB$o)E^lo aTշ|Hwӹ|rL x0NtwNA>L3DSGض:QҀq 55'tIiD1R5V#G׭ 7nn\ [pk_0&S`xSa8g6u%[ ߶/xk |Ts\=db)"%;dfF [Ғ\x"Y:`յMG l:iJQ/h me7 1:D9΢$!nz|͖ 4kcS4v,#r!Qa|v2=O y+-JES+ т{9,1iW<6R A]=`EV:9L30T?x}t9MiƐ7qVjv'|S的k=#I|4+Kxu{<іlhWғ)RZGi[*DbW=qh;'C=~*Hga&TO6قjCϩVbrmCYIlyhǖ_MԷ\BeZUs ! gmST8uh+:Cc溲cn1T\2{!B5 Un- d7,c!+45?߂D{抎It>EB"-%(߮è#-CZ1P20YsA8^078T7risTc-FQ\ERA_3j(D[LpG,taQfVT@zGI5Z[#uCIdiޗ M.i qEYcڞ }UwP3#yZ#Fz8}ۋlg_ٍ\|y 2;^йdh!K[c!hSg\SCm۔;w޿`$X4:?48Ipd^|6 Q*9vK2U\*܎6I@lפQ8o:AT!~1qrI[ t0}KFpp>q΋`ׇ]}OI<&,oD4Fo6`B\D$!g'tCxn<^S ҁs ʡ{E|lW$t޵3ԭm-U|$-~ sCDQVc1+k[8 h©;^ɣ;813_ AK $2}\˶{syĩ]/y0>W¦jTJfoڐR O 6 wwY\%OMƸ :T_n_M(.DpN>s_q'6UZV>=Oyv0aK | IO}yyj/ ۬["[2P|ZscT"lP|$n7{2w'p\rvsHoZyzx@gjd@ CfWH+q䅯,I?RuUjFiWZid4F 7\Y/ӳK/@pJ(BJ6^vr, v^.d*:vE*clFёaXq}Xp6FXؙ)>77p% v%$Gbխ"k5`'ߏ V\ w ]zf"'yYe Y1wƠ +nGu26'"kE 8qÂȝH( AZE!z.J/U?'˺/F LCE!=|{!ROPt8No0'*)z$K:J Jxu*OQ\Mx+I!u4rC)\\%yS$gqΗ殷;3`F W61N[J6_-Hf@$PJ";Zvpg3'KUW9CK! "ˎ{Lq noݗj ؔ/c·eKEj7zJ=OΦ^m4&h@Cd*Zm5?'Snkp+2H⭧6pS_X} [)Uhj@,nUmD;%?[suqp7^`,JC3 LO4͑:hT|31paDZ1 d юQbCaY1F቙Tu,p_(8iq4Qݬf/;mW*ˌa+OB-3PN|5U/CLUdTF\U6l>ב)0-\b7330v3SqvMeƸ-94h)fAST }JnAϟ IoxJK=Q,WƔ-rщ5PV)wU*yP1]yn̑,_L3.#$5&xZ|{!tIKE峥N5D7:@ ~'脢$_T4MEXE',C8i6|[*\ ҫA7'Y-ؚϥ6d{j@A1bh-:rv_^Ҵ>:ҝ8 E 4IS7d7Xn8W(WMR;d?\is|<^&SC \ne\:i!cxU|'pxZ}Ѿ>QCXb0Ĵtxetl? PA@==fqj{HMp}/VQ` CW⽁F:qT/!Cnh+JuPj&@wZ'5X6}]{;*G%j ,g@gnA@Y9C8[y0@}i{P@P`iԝfeliLSh9Tn*K8UȎTz]a1)ݝŮ4)0"c`E&xM^?ې~ak^f#3}I,a%+Uђ)V3ZՓ9ŏ;~7ZW<( 9y> C,Q5AMY] fStQ a<3ijk=c\0wIQbv;Bg U w3mD sIZثIs<2𬽰 Ǵz}Vr4кI?ECCZ>OE?d4eVUSC5B> P['' !3a@6@6I}gϻ*.|BHP׳m_>4o~S;_":&uQT(v MCbȦHܰkWbQ-vBptUXp$đU'8EFlܾe^0N&cE(©BR xgXc873IW$?dqUh_j+K񰓆s0;5V0߅&zSV+<䟐|Z\0|:ljV%h{V%Tb&e'ڏ,[ΦAK]WCjbgBO=S oDLEn*Dѕ>u*mo\KNz04Ӣ9%ױGniyI һCe<M MaB" |KRhq.cjH= WIk6 j$zY%vf/.og 2QÃlvv?J@M 沿8{MCьn3O|ņLG;@Byz΄qcUd߰~/AfW>V+JO|_Nԍ6ƍ2ٮ3"R33؋LWNy\y®25.qUf7e9XM]s}, \BZDn qm(41 (,p ДsM sAQ=Κ,!rhPӒLh)#R̟C8 B'An叝M?Zm]<я^ . Mlt5|J#1 R Stê뙱 Wd$5ѵ~[,j`IIp kJIԭ4ǫ s+^hOGiX^\+HRM(X:<ӻ<,W$]Ld;΁$pV\w)˸[|o-P>t7ctU9Ta<[uӲzAP+kDTf 7s{f56ZAYtq ?ʑ_z.(J:Xַ(>aO5gb)BIz8Ƴar? &-}6̹XKIK}-|fۃ&.ac_mg&okpdH" kdlUIϭ^qU8}G{cbJjli\e#Dix g$7zrҘ,f 4)<3Jgx@?e7n G;g!21ܘ$:on9S9bj:|HjU(˲ 0tIJrb1#<"H=K^ +Aߤ!$y]-Fnݹ K&@Bu+`R.CiA'*^m{CxVu[ K&4 V]V#UB>4MAVhZ9!VT:eiS3õxFKBrϷ .kX܉qvΠڲwaYe$10jpDֺgD5'[iaG Ypsh#00 -~}"7!ҬMcfHyY(2|/τ3յU;[63k)BӚ{0p3< dd7d{?BNHF3~9]On+L*xPY+ :HQ8p$,hs+} y~SL,E泤&,|B89{ ICCo5mf n.U%C- fT?hyV3,[e ^ i:Q7*$[0HP|TftuM;SaCLhJ&kb(_AXo&D\qC\??u#͋;( i-~Oe{ ),`0藡5k,t(\atE4ptN2c]*& ,i|)  4T)I7}=KijgF!?غ4܊UnAy6!@)S[Ipdl%FGxlk=^\y(; ^ `&拼 'PN:#JUg%#2@}"ʝPRD|пa"oAObbj'nym A"S&V4 D4k՘-j}hIj̈ueޏtil9֭G X U>}#BMT/$PO"rxll;{w"6D[\4Z'nȉj̺8Gu* sdR=0 L"©pT^z"xa{Zx@x@Hwdf; AEZͳ#nf,1mFȝUN3awRWʉ^'J>\⛠t}#vR: -:uq=:)aҠPKߤ Bv\*(lc2gN6OX $#D_7 nX׫Y>VKP}X%'`rv1GkTj2F}ʗnޏ?sJ]Zҥ|$4Ύ.*" ^QXmWdu.p2ty)Iœw6TT^6?^zrǩ)œE+4H]][[hkDĝ&c^O1݊ u0T.^Y+ #ׁwY[TS.!Bƛ :{ J?M gB|,Ui<-+:-fyV5nc8p_K=ft5ÑbHNW6Ej F#cdƧ״y%Jb絣`i$lgK;upn1 U{TX-.A8L6V|g#PH+TAw6w`hoH1'yHQp : K g#HPuyLɤQ|[~uX]NѴc6?k9n\G#*gx=䞯MYi2I }b-a/5l$DYV7B,#tN7\2 jLvn;Nd* pS*L ; 6!N^i8-ޏWfvABԈ8S;t%~h2X& K@>䐜$- zvAb/LK/F@DLxj$yvĐmn4YS5%S#ϣU,M!NO3P2Mkb9uR1C,qw0+w)|He5S *p !eY5b}d, h*P #yz_=Ub`8 J1Qu{];yZpqT6~;S |2Y7 B%3+c>kHJmpԴ6g6g Gq?Fv~cPXLNbr 3A4 ۑ-uuNFٓ`1]tڥ+п-WZa?*o=aO8Yx2 gU!z51V"}]1QW`Dz(b<Ϋx戭ܘ{P:Yɓ0$mn"խtK+KA]Aic;oh!)k'A}*n9_{N25k!ĢG]5rf腥rJzb1_Ueut*Laz{p6zcy.7n}ltIm^) !K{VBz@-J{џ. ?1\3sm0byAQ Htʞ/oYZ[LzW8_՞,?g!k|J}ݼg0Y$gق~3jVxv’p4 $ )E,fo~<y&oox zMBܡľxA.qE[ڳUQ Pc'Rp33+%vB3~a7d78u#A)* YlG*{~ &`v$W`NkQ)`J`:zRC4}g׊@v322L > 7v08#ٚTF`هy:6U¢PJ2 ۼ7;?HhfSD KNi؞뉨iTDtzbuF,Fo` LU5>"^ntp vS+|L-(Δ-o[* knRٴ92$U*BOWEp0 @^EE־ vTUq z\J;pnW ?!E4_P`b ԁئWyLh.-`0tQfY"eicԂ%+GPht5^W/-]^jBȂ㲷 |)'09GiNbGH4Nyِ式]k$&!#=Ak]R%]n.mMUYöv\jq0 …Axga8 uTHZ^42/R7(f(enyg#6gM gu2f!KRafV7v AsPp]>88}eռ+17Ϭ&Doy(hsXj;Ҟ>ATbfJkB˘J[>ް?-?u<&)D4;AN":D0u32ڰEbA\z\Gk EOѝhTO+hN2BSh30cKSaFåқZյ ~\xHӑ/4 Acf+~;{/:LmI0pZXt<~ANmTl(( "Zⴝ-% "mݾ;W ^s4nN/p BGv)'(սD*"^qqZ43x} đ@S-vH=l{,S|gGHcQO[ڱ?ntsvyN`͡%V7CZoQ x9~ ~gJU9lPka6TZMU5Ł6t q*nffbjEMAz)x/'f̓wJm:ޙ ;kO `8e"w67X(߹.gՕ)G{~#ٛۦdNb6FvYM ' YZ