xen-doc-html-4.13.1_10-lp152.2.12.1 4>$  Ap_͸/=„}q+ꯉ&C[6HH"Px( E'w`)R7wℛOzȲ ?ɵ[g6<Nz6t́RP:K&4s;p*vL2 N!@9· }oq/};ںŹ@3.TPj.n$H91{)]lx0]04{eC1$REtȋ[tNUq}i3d631382505b6f0189bcd8b057b5ccb6b9cc1e5e749d05193490af680c572c0a67878e4a04bce73d1103d2ff29767a0f7a16f3f1 _͸/=„#=%|襕'`_̐~#RpJgf5ܟ!Е-MW8c+ћq8- jNYob5^}vXHw=?{,@D7]񬾃0LiRV}2"M&y;^}T<x*dryJ.e}nOm_?b5]a@:E`FkZP#RsX] GHN?ɵܾ~v`mjUXlPU_Aθ2p9?d & M AGPMM M M M M M<MM>dMO(s8|a9#a:;aGMHMIMXTY\\M]M^N b9cdoetfwlyuMvCxen-doc-html4.13.1_10lp152.2.12.1Xen Virtualization: HTML documentationXen is a virtual machine monitor for x86 that supports execution of multiple guest operating systems with unprecedented levels of performance and resource isolation. xen-doc-html contains the online documentation in HTML format. Point your browser at file:/usr/share/doc/packages/xen/html/ Authors: -------- Ian Pratt _lamb74 openSUSE Leap 15.2openSUSEGPL-2.0-onlyhttp://bugs.opensuse.orgDocumentation/HTMLhttp://www.cl.cam.ac.uk/Research/SRG/netos/xen/linuxx86_64ot9DA'&6@ 72/"B W 8` We $,76H"yjQ <3 "z768 I\xAAAA큤A큤A큤A큤A큤A큤A큤A큤_____________________________________________________________________________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-4.13.1_10-lp152.2.12.1.src.rpmxen-doc-htmlxen-doc-html(x86-64)     rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PartialHardlinkSets)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0.4-14.0-15.2-14.14.1__[f_X_Wr@_'@_{_^)@^^@^3^ϧ^x^@^@^^^{G^r @^j$@^g@^_@^Nt^K^=Q@^:@^0"@^@^@]]]N@]@]ʞ])]c@]@]@]@]]fl]fl]M`@]B@]/ ],j] ]@]@] ] ] #]]@\\ޢ@\ڭ\\@\@\@\,@\7\\N\@\\+@\\M\M\\\@\}@\k\X)@\J@\I\A\?\=@\9\73\4\$\l@[H[k@[@[^[^[ā@[@[@[9@[v[W[CN@[<[6@[0@[0@['[!@[5@Z@ZnZ@ZZZ@ZmZԐ@ZZZ@ZZ}@Z}@Z}@Z}@Zz@Zz@Zo Zk@ZV@ZS]@ZOhZ:PZ1@Z.s@Z&@ZOZOZ Z Z Z@Z@Z }ZC@ZYYYY|Y@Y{Y*@Y5YA@Y4YYYbYY@Y3Y@YJYJY@YYV@Y@Ym@Yw2Yp@YlYh@Yh@YS@YJ_YI@Y5GY0Y-^Y(Y"YY;@YYY@YtY.X@XQ@X@XۡXg@X@X@X@X @X@X@X@X@XXX@XXXwoXs{@XlXWXRXQ4@XEVX43@X.@X*X lX&X@XX@W@W֘W֘W^@WiW:Wt@W.@W9WW@Wk@Wi,@WbWZWZWZWYZ@WV@WEWBW=W;W3W1@W1@W,@W(W(W(W(W(W#LWVbV(@V3VJVxV'@VV2V͛@VŲ@V`VwVVV=@VV@VHV@VvV%@VV<@V@VS@VV@V^VwVqR@Vn@VXEVUVTQ@VMVMVMVA@V;DV9@V7P@V0V*!@V V@VCVVVf@VqV@UYU@U@UUݪ@U@UnU4@UUK@UU@UU>U@Ux&Un@U\w@U[%UUUPUKSU>$U6;U%@UU@UUU.@TgT-@TT@TZ@TZ@T@TT@T5T@TLTLT~@Tl@Ti@Ta@THT?@T=@carnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comCallum Farmer carnold@suse.comcarnold@suse.comJames Fehlig carnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comDominique Leuenberger carnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comMatej Cepl carnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comJim Fehlig ohering@suse.deMartin Liška ohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comJan Engelhardt Guillaume GARDET Guillaume GARDET Bernhard Wiedemann carnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deBernhard Wiedemann ohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comtrenn@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.dejfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.deohering@suse.derbrown@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comjfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.dejfehlig@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comohering@suse.dejfehlig@suse.comcarnold@suse.comjfehlig@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.commlatimer@suse.comcarnold@suse.comcyliu@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.derguenther@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comrguenther@suse.comcarnold@suse.commeissner@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.com- bsc#1177409 - VUL-0: xen: x86 PV guest INVLPG-like flushes may leave stale TLB entries (XSA-286) xsa286-1.patch xsa286-2.patch xsa286-3.patch xsa286-4.patch xsa286-5.patch xsa286-6.patch - bsc#1177412 - VUL-0: xen: Race condition in Xen mapping code (XSA-345) xsa345-1.patch xsa345-2.patch xsa345-3.patch - bsc#1177413 - VUL-0: xen: undue deferral of IOMMU TLB flushes (XSA-346) xsa346-1.patch xsa346-2.patch - bsc#1177414 - VUL-0: xen: unsafe AMD IOMMU page table updates (XSA-347) xsa347-1.patch xsa347-2.patch xsa347-3.patch- Escape some % chars in xen.spec, they have to appear verbatim- Enhance libxc.migrate_tracking.patch Print number of allocated pages on sending side, this is more accurate than p2m_size.- bsc#1176339 - VUL-0: CVE-2020-25602: xen: x86 pv: Crash when handling guest access to MSR_MISC_ENABLE (XSA-333) xsa333.patch - bsc#1176341 - VUL-0: CVE-2020-25598: xen: Missing unlock in XENMEM_acquire_resource error path (XSA-334) xsa334.patch - bsc#1176343 - VUL-0: CVE-2020-25604: xen: race when migrating timers between x86 HVM vCPU-s (XSA-336) xsa336.patch - bsc#1176344 - VUL-0: CVE-2020-25595: xen: PCI passthrough code reading back hardware registers (XSA-337) xsa337-1.patch xsa337-2.patch - bsc#1176346 - VUL-0: CVE-2020-25597: xen: once valid event channels may not turn invalid (XSA-338) xsa338.patch - bsc#1176345 - VUL-0: CVE-2020-25596: xen: x86 pv guest kernel DoS via SYSENTER (XSA-339) xsa339.patch - bsc#1176347 - VUL-0: CVE-2020-25603: xen: Missing barrier barriers when accessing/allocating an event channel (XSA-340) xsa340.patch - bsc#1176348 - VUL-0: CVE-2020-25600: xen: out of bounds event channels available to 32-bit x86 domains (XSA-342) xsa342.patch - bsc#1176349 - VUL-0: CVE-2020-25599: xen: races with evtchn_reset() (XSA-343) xsa343-1.patch xsa343-2.patch xsa343-3.patch - bsc#1176350 - VUL-0: CVE-2020-25601: xen: lack of preemption in evtchn_reset() / evtchn_destroy() (XSA-344) xsa344-1.patch xsa344-2.patch - Upstream bug fixes (bsc#1027519) 5f479d9e-x86-begin-to-support-MSR_ARCH_CAPS.patch 5f4cf06e-x86-Dom0-expose-MSR_ARCH_CAPS.patch 5f4cf96a-x86-PV-fix-SEGBASE_GS_USER_SEL.patch 5f560c42-x86-PV-64bit-segbase-consistency.patch- Upstream bug fixes (bsc#1027519) 5ef44e0d-x86-PMTMR-use-FADT-flags.patch 5ef6156a-x86-disallow-access-to-PT-MSRs.patch 5efcb354-x86-protect-CALL-JMP-straight-line-speculation.patch 5f046c18-evtchn-dont-ignore-error-in-get_free_port.patch (Replaces xsa317.patch) 5f046c48-x86-shadow-dirty-VRAM-inverted-conditional.patch (Replaces xsa319.patch) 5f046c64-EPT-set_middle_entry-adjustments.patch (Replaces xsa328-1.patch) 5f046c78-EPT-atomically-modify-ents-in-ept_next_level.patch (Replaces xsa328-2.patch) 5f046c9a-VT-d-improve-IOMMU-TLB-flush.patch (Replaces xsa321-1.patch) 5f046cb5-VT-d-prune-rename-cache-flush-funcs.patch (Replaces xsa321-2.patch) 5f046cca-x86-IOMMU-introduce-cache-sync-hook.patch (Replaces xsa321-3.patch) 5f046ce9-VT-d-sync_cache-misaligned-addresses.patch (Replaces xsa32141.patch) 5f046cfd-x86-introduce-alternative_2.patch (Replaces xsa321-5.patch) 5f046d1a-VT-d-optimize-CPU-cache-sync.patch (Replaces xsa321-6.patch) 5f046d2b-EPT-flush-cache-when-modifying-PTEs.patch (Replaces xsa321-7.patch) 5f046d5c-check-VCPUOP_register_vcpu_info-alignment.patch (Replaces xsa327.patch) 5f1a9916-x86-S3-put-data-sregs-into-known-state.patch 5f21b9fd-x86-cpuid-APIC-bit-clearing.patch- bsc#1172356 - Not able to hot-plug NIC via virt-manager, asks to attach on next reboot while it should be live attached ignore-ip-command-script-errors.patch- Enhance libxc.migrate_tracking.patch After transfer of domU memory, the target host has to assemble the backend devices. Track the time prior xc_domain_unpause.- Add libxc.migrate_tracking.patch to track live migrations unconditionally in logfiles, especially in libvirt. This will track how long a domU was suspended during transit.- bsc#1173376 - VUL-0: CVE-2020-15566: xen: XSA-317 - Incorrect error handling in event channel port allocation xsa317.patch - bsc#1173377 - VUL-0: CVE-2020-15563: xen: XSA-319 - inverted code paths in x86 dirty VRAM tracking xsa319.patch - bsc#1173378 - VUL-0: CVE-2020-15565: xen: XSA-321 - insufficient cache write- back under VT-d xsa321-1.patch xsa321-2.patch xsa321-3.patch xsa321-4.patch xsa321-5.patch xsa321-6.patch xsa321-7.patch - bsc#1173380 - VUL-0: CVE-2020-15567: xen: XSA-328 - non-atomic modification of live EPT PTE xsa328-1.patch xsa328-2.patch- bsc#1172205 - VUL-0: CVE-2020-0543: xen: Special Register Buffer Data Sampling (SRBDS) aka "CrossTalk" (XSA-320) 5ee24d0e-x86-spec-ctrl-document-SRBDS-workaround.patch 5edfbbea-x86-spec-ctrl-CPUID-MSR-defs-for-SRBDS.patch (Replaces xsa320-1.patch) 5edfbbea-x86-spec-ctrl-mitigate-SRBDS.patch (Replaces xsa320-2.patch) - Upstream bug fixes (bsc#1027519) 5ec50b05-x86-idle-rework-C6-EOI-workaround.patch 5ec7dcaa-x86-dont-enter-C6-with-in-service-intr.patch 5ec7dcf6-x86-dont-enter-C3-C6-with-errata.patch 5ec82237-x86-extend-ISR-C6-workaround-to-Haswell.patch 5ece1b91-x86-clear-RDRAND-CPUID-bit-on-AMD-fam-15-16.patch 5ece8ac4-x86-load_system_tables-NMI-MC-safe.patch 5ed69804-x86-ucode-fix-start-end-update.patch 5eda60cb-SVM-split-recalc-NPT-fault-handling.patch 5edf6ad8-ioreq-pending-emulation-server-destruction-race.patch- Fixes for %_libexecdir changing to /usr/libexec- bsc#1172205 - VUL-0: CVE-2020-0543: xen: Special Register Buffer Data Sampling (SRBDS) aka "CrossTalk" (XSA-320) xsa320-1.patch xsa320-2.patch- Update to Xen 4.13.1 bug fix release (bsc#1027519) xen-4.13.1-testing-src.tar.bz2 5eb51be6-cpupool-fix-removing-cpu-from-pool.patch 5eb51caa-sched-vcpu-pause-flags-atomic.patch 5ec2a760-x86-determine-MXCSR-mask-always.patch - Drop patches contained in new tarball 5de65f84-gnttab-map-always-do-IOMMU-part.patch 5de65fc4-x86-avoid-HPET-use-on-certain-Intel.patch 5e15e03d-sched-fix-S3-resume-with-smt=0.patch 5e16fb6a-x86-clear-per-cpu-stub-page-info.patch 5e1da013-IRQ-u16-is-too-narrow-for-evtchn.patch 5e1dcedd-Arm-place-speculation-barrier-after-ERET.patch 5e21ce98-x86-time-update-TSC-stamp-after-deep-C-state.patch 5e286cce-VT-d-dont-pass-bridges-to-domain_context_mapping_one.patch 5e318cd4-x86-apic-fix-disabling-LVT0.patch 5e344c11-x86-HVM-relinquish-resources-from-domain_destroy.patch 5e3bd385-EFI-recheck-variable-name-strings.patch 5e3bd3d1-EFI-dont-leak-heap-VIA-XEN_EFI_get_next_variable_name.patch 5e3bd3f8-xmalloc-guard-against-overflow.patch 5e46e090-x86-smp-reset-x2apic_enabled-in-smp_send_stop.patch 5e4c00ef-VT-d-check-full-RMRR-for-E820-reserved.patch 5e4d4f5b-sched-fix-get_cpu_idle_time-with-core-sched.patch 5e4e614d-x86-spec-ctrl-no-xen-also-disables-branch-hardening.patch 5e4ec20e-x86-virtualise-MSR_PLATFORM_ID-properly.patch 5e5e7188-fix-error-path-in-cpupool_unassign_cpu_start.patch 5e6f53dd-AMD-IOMMU-fix-off-by-one-get_paging_mode.patch 5e7a371c-sched-fix-cpu-onlining-with-core-sched.patch 5e7c90cf-sched-fix-cpu-offlining-with-core-sched.patch 5e7cfb29-x86-ucode-AMD-fix-assert-in-compare_patch.patch 5e7cfb29-x86-ucode-fix-error-paths-in-apply_microcode.patch 5e7dd83b-libx86-CPUID-fix-not-just-leaf-7.patch 5e7dfbf6-x86-ucode-AMD-potential-buffer-overrun-equiv-tab.patch 5e846cce-x86-HVM-fix-AMD-ECS-handling-for-Fam10.patch 5e84905c-x86-ucode-AMD-fix-more-potential-buffer-overruns.patch 5e86f7b7-credit2-avoid-vCPUs-with-lower-creds-than-idle.patch 5e86f7fd-credit2-fix-credit-too-few-resets.patch 5e876b0f-tools-xenstore-fix-use-after-free-in-xenstored.patch 5e95ad61-xenoprof-clear-buffer-intended-to-be-shared-with-guests.patch 5e95ad8f-xenoprof-limit-consumption-of-shared-buffer-data.patch 5e95ae77-Add-missing-memory-barrier-in-the-unlock-path-of-rwlock.patch 5e95af5e-xen-gnttab-Fix-error-path-in-map_grant_ref.patch 5e95afb8-gnttab-fix-GNTTABOP_copy-continuation-handling.patch- spec: Remove invocation of autogen.sh - spec: Recommend qemu-ovmf-x86_64 to provide UEFI firmwares- bsc#1170968 - GCC 10: xen build fails on i586 gcc10-fixes.patch- bsc#1169392 - VUL-0: CVE-2020-11742: xen: Bad continuation handling in GNTTABOP_copy (XSA-318) 5e95afb8-gnttab-fix-GNTTABOP_copy-continuation-handling.patch- bsc#1168140 - VUL-0: CVE-2020-11740, CVE-2020-11741: xen: XSA-313 multiple xenoprof issues 5e95ad61-xenoprof-clear-buffer-intended-to-be-shared-with-guests.patch 5e95ad8f-xenoprof-limit-consumption-of-shared-buffer-data.patch - bsc#1168142 - VUL-0: CVE-2020-11739: xen: XSA-314 - Missing memory barriers in read-write unlock paths 5e95ae77-Add-missing-memory-barrier-in-the-unlock-path-of-rwlock.patch - bsc#1168143 - VUL-0: CVE-2020-11743: xen: XSA-316 - Bad error path in GNTTABOP_map_grant 5e95af5e-xen-gnttab-Fix-error-path-in-map_grant_ref.patch - bsc#1167152 - L3: Xenstored Crashed during VM install Need Core analyzed 5e876b0f-tools-xenstore-fix-use-after-free-in-xenstored.patch - bsc#1165206 - Xen 4.12 DomU hang / freeze / stall / NMI watchdog bug soft lockup CPU #0 stuck under high load / upstream with workaround. See also bsc#1134506 5e86f7b7-credit2-avoid-vCPUs-with-lower-creds-than-idle.patch 5e86f7fd-credit2-fix-credit-too-few-resets.patch - Drop for upstream solution (bsc#1165206) 01-xen-credit2-avoid-vcpus-to.patch default-to-credit1-scheduler.patch - Upstream bug fixes (bsc#1027519) 5e4ec20e-x86-virtualise-MSR_PLATFORM_ID-properly.patch 5e5e7188-fix-error-path-in-cpupool_unassign_cpu_start.patch 5e6f53dd-AMD-IOMMU-fix-off-by-one-get_paging_mode.patch 5e7a371c-sched-fix-cpu-onlining-with-core-sched.patch 5e7c90cf-sched-fix-cpu-offlining-with-core-sched.patch 5e7cfb29-x86-ucode-AMD-fix-assert-in-compare_patch.patch 5e7cfb29-x86-ucode-fix-error-paths-in-apply_microcode.patch 5e7dd83b-libx86-CPUID-fix-not-just-leaf-7.patch 5e7dfbf6-x86-ucode-AMD-potential-buffer-overrun-equiv-tab.patch 5e846cce-x86-HVM-fix-AMD-ECS-handling-for-Fam10.patch 5e84905c-x86-ucode-AMD-fix-more-potential-buffer-overruns.patch- bsc#1167608 - unbound limit for max_event_channels domUs with many vcpus and/or resources fail to start libxl.max_event_channels.patch- bsc#1161480 - Fix xl shutdown for HVM without PV drivers add libxl.libxl__domain_pvcontrol.patch- bsc#1165206 - Xen 4.12 DomU hang / freeze / stall / NMI watchdog bug soft lockup CPU #0 stuck under high load / upstream with workaround. See also bsc#1134506 01-xen-credit2-avoid-vcpus-to.patch- bsc#1158414 - GCC 10: xen build fails gcc10-fixes.patch- bsc#1165206 - Xen 4.12 DomU hang / freeze / stall / NMI watchdog bug soft lockup CPU #0 stuck under high load / upstream with workaround. See also bsc#1134506 default-to-credit1-scheduler.patch- bsc#1160932 - VUL-0: xen: XSA-312 v1: arm: a CPU may speculate past the ERET instruction 5e1dcedd-Arm-place-speculation-barrier-after-ERET.patch - bsc#1164425 - x86: "spec-ctrl=no-xen" should also disable branch hardening 5e4e614d-x86-spec-ctrl-no-xen-also-disables-branch-hardening.patch - Upstream bug fixes (bsc#1027519) 5e21ce98-x86-time-update-TSC-stamp-after-deep-C-state.patch 5e286cce-VT-d-dont-pass-bridges-to-domain_context_mapping_one.patch 5e318cd4-x86-apic-fix-disabling-LVT0.patch 5e344c11-x86-HVM-relinquish-resources-from-domain_destroy.patch 5e3bd385-EFI-recheck-variable-name-strings.patch 5e3bd3d1-EFI-dont-leak-heap-VIA-XEN_EFI_get_next_variable_name.patch 5e3bd3f8-xmalloc-guard-against-overflow.patch 5e46e090-x86-smp-reset-x2apic_enabled-in-smp_send_stop.patch 5e4c00ef-VT-d-check-full-RMRR-for-E820-reserved.patch 5e4d4f5b-sched-fix-get_cpu_idle_time-with-core-sched.patch- bsc#1159755 - use fixed qemu-3.1 machine type for HVM This must be done in qemu to preserve PCI layout remove libxl.lock-qemu-machine-for-hvm.patch- jsc#SLE-10183 - script to calculate cpuid= mask add helper script from https://github.com/twizted/xen_maskcalc domUs may be migrated between different cpus from the same vendor if their visible cpuid value has incompatible feature bits masked.- jsc#SLE-10172, bsc#1055731 - handle degraded raid for xendomains add helper script and systemd service from https://github.com/luizluca/xen-tools-xendomains-wait-disk in new sub package xen-tools-xendomains-wait-disk See included README for usage instructions xendomains-wait-disks.LICENSE xendomains-wait-disks.README.md xendomains-wait-disks.sh- bsc#1159755 - use fixed qemu-3.1 machine type for HVM qemu4 introduced incompatible changes in pc-i440fx, which revealed a design bug in 'xenfv'. Live migration from domUs started with qemu versions prior qemu4 can not be received with qemu4+. libxl.lock-qemu-machine-for-hvm.patch- Upstream bug fixes (bsc#1027519) 5de65f84-gnttab-map-always-do-IOMMU-part.patch 5de65fc4-x86-avoid-HPET-use-on-certain-Intel.patch 5e15e03d-sched-fix-S3-resume-with-smt=0.patch 5e16fb6a-x86-clear-per-cpu-stub-page-info.patch 5e1da013-IRQ-u16-is-too-narrow-for-evtchn.patch- BuildRequire pkgconfig(libsystemd) instead of systemd-devel: Allow OBS to shortcut through the -mini flavors.- bsc#1159320 - Xen logrotate file needs updated logrotate.conf- Update to Xen 4.13.0 FCS release xen-4.13.0-testing-src.tar.bz2 * Core Scheduling (contributed by SUSE) * Branch hardening to mitigate against Spectre v1 (contributed by Citrix) * Late uCode loading (contributed by Intel) * Improved live-patching build tools (contributed by AWS) * OP-TEE support (contributed by EPAM) * Renesas R-CAR IPMMU-VMSA driver (contributed by EPAM) * Dom0-less passthrough and ImageBuilder (contributed by XILINX) * Support for new Hardware- Update to Xen 4.13.0 RC4 release xen-4.13.0-testing-src.tar.bz2 - Rebase libxl.pvscsi.patch- Update to Xen 4.13.0 RC3 release xen-4.13.0-testing-src.tar.bz2 - Drop python38-build.patch- Update to Xen 4.13.0 RC2 release xen-4.13.0-testing-src.tar.bz2- Add python38-build.patch fixing build with Python 3.8 (add - -embed to python-config call)- Update to Xen 4.13.0 RC1 release xen-4.13.0-testing-src.tar.bz2 - Drop patches contained in new tarball or invalid 5ca7660f-x86-entry-drop-unused-includes.patch 5cab2a6b-x86-ACPI-also-parse-AMD-tables-early.patch 5cab2ab7-x86-IOMMU-introduce-init-ops.patch 5cab2ae8-x86-IOMMU-abstract-iommu_supports_eim.patch 5cab2b4e-x86-IOMMU-abstract-iommu_enable_x2apic_IR.patch 5cab2b95-x86-IOMMU-initialize-iommu_ops-in.patch 5cac9a4b-x86-IOMMU-abstract-adjust_vtd_irq_affinities.patch 5cdeac7f-AMD-IOMMU-adjust-IOMMU-list-head-init.patch 5cf8da09-adjust-sysdom-creation-call-earlier-on-x86.patch 5d0cf4e4-AMD-IOMMU-initialize-IRQ-tasklet-once.patch 5d149bb0-AMD-IOMMU-dont-add-IOMMUs.patch 5d1b3fab-AMD-IOMMU-restrict-feature-logging.patch 5d358508-x86-IRQ-desc-affinity-represents-request.patch 5d358534-x86-IRQ-consolidate-arch-cpu_mask-use.patch 5d358a67-AMD-IOMMU-pass-IOMMU-to-iterate_ivrs_entries-cb.patch 5d358a92-AMD-IOMMU-pass-IOMMU-to-amd_iommu_alloc_intremap_table.patch 5d39811c-x86-IOMMU-dont-restrict-IRQ-affinities.patch 5d417813-AMD-IOMMU-bitfield-extended-features.patch 5d417838-AMD-IOMMU-bitfield-control-reg.patch 5d41785b-AMD-IOMMU-bitfield-IRTE.patch 5d41787e-AMD-IOMMU-pass-IOMMU-to-gfu-intremap-entry.patch 5d4178ad-AMD-IOMMU-128bit-non-guest-APIC-IRTE.patch 5d4178fc-AMD-IOMMU-split-amd_iommu_init_one.patch 5d41793f-AMD-IOMMU-allow-enabling-without-IRQ.patch 5d417a16-AMD-IOMMU-adjust-IRQ-setup-for-x2APIC.patch 5d417ab6-AMD-IOMMU-enable-x2APIC-mode.patch 5d417b38-AMD-IOMMU-correct-IRTE-updating.patch 5d417b6a-AMD-IOMMU-dont-needlessly-log-headers.patch 5d419d49-x86-spec-ctrl-report-proper-status.patch 5d43253c-x86-ucode-always-collect_cpu_info-at-boot.patch 5d4a9d25-AMD-IOMMU-drop-not-found-message.patch 5d4aa36f-x86-apic-enable-x2APIC-mode-earlier.patch 5d4afa7a-credit2-fix-memory-leak.patch 5d4d850a-introduce-bss-percpu-page-aligned.patch 5d516531-x86-xpti-dont-leak-TSS-adjacent-data.patch 5d5bf475-x86-PV-fix-handling-of-iommu-mappings.patch 5d6524ca-x86-mm-correctly-init-M2P-entries.patch 5d67ceaf-x86-properly-gate-PKU-clearing.patch 5d70bfba-x86-shadow-dont-enable-with-too-small-allocation.patch 5d779811-x86-fix-CPUID7-0-eax-levelling-MSR.patch 5d77b40f-fix-hvm_all_ioreq_servers_add_vcpu-cleanup.patch 5d80e7c0-AMD-IOMMU-free-shared-IRT-once.patch 5d80e80d-AMD-IOMMU-valid-flag-for-IVRS-mappings.patch 5d80e82e-AMD-IOMMU-alloc_intremap_table-callers-handle-errors.patch 5d80e857-x86-PCI-read-MSI-X-table-entry-count-early.patch 5d80ea13-vpci-honor-read-only-devices.patch 5d89d8d9-libxc-x86-avoid-overflow-in-CPUID-APIC-ID.patch 5d8b715f-ACPI-cpuidle-bump-max-num-of-states.patch 5d8b72e5-AMD-IOMMU-dont-blindly-alloc-intremap-tables.patch 5d8b730e-AMD-IOMMU-phantom-funcs-share-intremap-tables.patch 5d8b733b-x86-PCI-read-max-MSI-vector-count-early.patch 5d8b736d-AMD-IOMMU-replace-INTREMAP_ENTRIES.patch 5d8b7393-AMD-IOMMU-restrict-intremap-table-sizes.patch 5d9ee2a8-AMD-IOMMU-alloc-1-devtab-per-PCI-seg.patch 5d9ee2f0-AMD-IOMMU-allocate_buffer-avoid-memset.patch 5d9ee312-AMD-IOMMU-prefill-all-DTEs.patch CVE-2014-0222-blktap-qcow1-validate-l2-table-size.patch blktap2-no-uninit.patch libxl.prepare-environment-for-domcreate_stream_done.patch pygrub-python3-conversion.patch fix-xenpvnetboot.patch- bsc#1135799 - Partner-L3: Xen crashes on AMD ROME based machines 5d9ee2a8-AMD-IOMMU-alloc-1-devtab-per-PCI-seg.patch 5d9ee2f0-AMD-IOMMU-allocate_buffer-avoid-memset.patch 5d9ee312-AMD-IOMMU-prefill-all-DTEs.patch- bsc#1120095 - add code to change LIBXL_HOTPLUG_TIMEOUT at runtime The included README has details about the impact of this change libxl.LIBXL_HOTPLUG_TIMEOUT.patch- bsc#1135799 - Partner-L3: Xen crashes on AMD ROME based machines 5ca7660f-x86-entry-drop-unused-includes.patch 5cf8da09-adjust-sysdom-creation-call-earlier-on-x86.patch 5cab2a6b-x86-ACPI-also-parse-AMD-tables-early.patch 5cab2ab7-x86-IOMMU-introduce-init-ops.patch 5cab2ae8-x86-IOMMU-abstract-iommu_supports_eim.patch 5cab2b4e-x86-IOMMU-abstract-iommu_enable_x2apic_IR.patch 5cab2b95-x86-IOMMU-initialize-iommu_ops-in.patch 5cac9a4b-x86-IOMMU-abstract-adjust_vtd_irq_affinities.patch 5cdeac7f-AMD-IOMMU-adjust-IOMMU-list-head-init.patch 5d0cf4e4-AMD-IOMMU-initialize-IRQ-tasklet-once.patch 5d149bb0-AMD-IOMMU-dont-add-IOMMUs.patch 5d1b3fab-AMD-IOMMU-restrict-feature-logging.patch 5d358508-x86-IRQ-desc-affinity-represents-request.patch 5d358534-x86-IRQ-consolidate-arch-cpu_mask-use.patch 5d358a67-AMD-IOMMU-pass-IOMMU-to-iterate_ivrs_entries-cb.patch 5d358a92-AMD-IOMMU-pass-IOMMU-to-amd_iommu_alloc_intremap_table.patch 5d39811c-x86-IOMMU-dont-restrict-IRQ-affinities.patch 5d417813-AMD-IOMMU-bitfield-extended-features.patch 5d417838-AMD-IOMMU-bitfield-control-reg.patch 5d41785b-AMD-IOMMU-bitfield-IRTE.patch 5d41787e-AMD-IOMMU-pass-IOMMU-to-gfu-intremap-entry.patch 5d4178ad-AMD-IOMMU-128bit-non-guest-APIC-IRTE.patch 5d4178fc-AMD-IOMMU-split-amd_iommu_init_one.patch 5d41793f-AMD-IOMMU-allow-enabling-without-IRQ.patch 5d417a16-AMD-IOMMU-adjust-IRQ-setup-for-x2APIC.patch 5d417ab6-AMD-IOMMU-enable-x2APIC-mode.patch 5d417b38-AMD-IOMMU-correct-IRTE-updating.patch 5d417b6a-AMD-IOMMU-dont-needlessly-log-headers.patch 5d4a9d25-AMD-IOMMU-drop-not-found-message.patch 5d80e7c0-AMD-IOMMU-free-shared-IRT-once.patch 5d80e80d-AMD-IOMMU-valid-flag-for-IVRS-mappings.patch 5d80e82e-AMD-IOMMU-alloc_intremap_table-callers-handle-errors.patch 5d80e857-x86-PCI-read-MSI-X-table-entry-count-early.patch 5d8b72e5-AMD-IOMMU-dont-blindly-alloc-intremap-tables.patch 5d8b730e-AMD-IOMMU-phantom-funcs-share-intremap-tables.patch 5d8b733b-x86-PCI-read-max-MSI-vector-count-early.patch 5d8b736d-AMD-IOMMU-replace-INTREMAP_ENTRIES.patch 5d8b7393-AMD-IOMMU-restrict-intremap-table-sizes.patch - bsc#1145240 - [Migration]Can't pre-allocate 1 shadow pages 5d70bfba-x86-shadow-dont-enable-with-too-small-allocation.patch - bsc#1137717 - [HPS Bug] Unable to install Windows Server 2016 with 2 CPUs setting (or above) under SLES12 SP4 Xen Server on AMD ROME platform 5d89d8d9-libxc-x86-avoid-overflow-in-CPUID-APIC-ID.patch - Upstream bug fixes (bsc#1027519) 5d67ceaf-x86-properly-gate-PKU-clearing.patch 5d779811-x86-fix-CPUID7-0-eax-levelling-MSR.patch 5d77b40f-fix-hvm_all_ioreq_servers_add_vcpu-cleanup.patch 5d80ea13-vpci-honor-read-only-devices.patch 5d8b715f-ACPI-cpuidle-bump-max-num-of-states.patch- bsc#1145774 - Libivrtd segfaults when trying to live migrate a VM Fix crash in an error path of libxl_domain_suspend with libxl.helper_done-crash.patch- Upstream bug fixes (bsc#1027519) 5d419d49-x86-spec-ctrl-report-proper-status.patch 5d43253c-x86-ucode-always-collect_cpu_info-at-boot.patch 5d4aa36f-x86-apic-enable-x2APIC-mode-earlier.patch 5d4afa7a-credit2-fix-memory-leak.patch 5d4d850a-introduce-bss-percpu-page-aligned.patch 5d516531-x86-xpti-dont-leak-TSS-adjacent-data.patch 5d5bf475-x86-PV-fix-handling-of-iommu-mappings.patch 5d6524ca-x86-mm-correctly-init-M2P-entries.patch - Drop 5d419d49-x86-spec-ctrl-facilities-report-wrong-status.patch- Preserve modified files which used to be marked as %config, rename file.rpmsave to file- Update to Xen 4.12.1 bug fix release (bsc#1027519) xen-4.12.1-testing-src.tar.bz2 - Drop patches contained in new tarball 5c87b644-IOMMU-leave-enabled-for-kexec-crash.patch 5c87b6a2-x86-HVM-dont-crash-guest-in-find_mmio_cache.patch 5c87b6c8-drop-arch_evtchn_inject.patch 5c87b6e8-avoid-atomic-rmw-accesses-in-map_vcpu_info.patch 5c87e6d1-x86-TSX-controls-for-RTM-force-abort-mode.patch 5c8f752c-x86-e820-build-with-gcc9.patch 5c8fb92d-x86-HVM-split-linear-reads-and-writes.patch 5c8fb951-x86-HVM-finish-IOREQs-correctly-on-completion.patch 5c8fc6c0-x86-MSR-shorten-ARCH_CAPABILITIES.patch 5c8fc6c0-x86-SC-retpoline-safety-calculations-for-eIBRS.patch 5c9e63c5-credit2-SMT-idle-handling.patch 5ca46b68-x86emul-no-GPR-update-upon-AVX-gather-failures.patch 5ca773d1-x86emul-dont-read-mask-reg-without-AVX512F.patch 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch 5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch 5cd921fb-trace-fix-build-with-gcc9.patch 5cd9224b-AMD-IOMMU-disable-upon-init-fail.patch 5cd922c5-x86-MTRR-recalc-p2mt-when-iocaps.patch 5cd9230f-VMX-correctly-get-GS_SHADOW-for-current.patch 5cd926d0-bitmap_fill-zero-sized.patch 5cd92724-drivers-video-drop-constraints.patch 5cd93a69-x86-MSR_INTEL_CORE_THREAD_COUNT.patch 5cd93a69-x86-boot-detect-Intel-SMT-correctly.patch 5cd93a69-x86-spec-ctrl-reposition-XPTI-parsing.patch 5cd981ff-x86-IRQ-tracing-avoid-UB-or-worse.patch 5cdad090-x86-spec-ctrl-CPUID-MSR-definitions-for-MDS.patch 5cdad090-x86-spec-ctrl-infrastructure-for-VERW-flush.patch 5cdad090-x86-spec-ctrl-misc-non-functional-cleanup.patch 5cdad090-x86-spec-ctrl-opts-to-control-VERW-flush.patch 5cdeb9fd-sched-fix-csched2_deinit_pdata.patch 5ce7a92f-x86-IO-APIC-fix-build-with-gcc9.patch 5cf0f6a4-x86-vhpet-resume-avoid-small-diff.patch 5cf16e51-x86-spec-ctrl-Knights-retpoline-safe.patch 5d03a0c4-1-Arm-add-an-isb-before-reading-CNTPCT_EL0.patch 5d03a0c4-2-gnttab-rework-prototype-of-set_status.patch 5d03a0c4-3-Arm64-rewrite-bitops-in-C.patch 5d03a0c4-4-Arm32-rewrite-bitops-in-C.patch 5d03a0c4-5-Arm-bitops-consolidate-prototypes.patch 5d03a0c4-6-Arm64-cmpxchg-simplify.patch 5d03a0c4-7-Arm32-cmpxchg-simplify.patch 5d03a0c4-8-Arm-bitops-helpers-with-timeout.patch 5d03a0c4-9-Arm-cmpxchg-helper-with-timeout.patch 5d03a0c4-A-Arm-turn-on-SILO-mode-by-default.patch 5d03a0c4-B-bitops-guest-helpers.patch 5d03a0c4-C-cmpxchg-guest-helpers.patch 5d03a0c4-D-use-guest-atomics-helpers.patch 5d03a0c4-E-Arm-add-perf-counters-in-guest-atomic-helpers.patch 5d03a0c4-F-Arm-protect-gnttab_clear_flag.patch - Refreshed patches libxl.pvscsi.patch- bsc#1143563 - Speculative mitigation facilities report wrong status 5d419d49-x86-spec-ctrl-facilities-report-wrong-status.patch- Update xen-dom0-modules.service (bsc#1137251) Map backend module names from pvops and xenlinux kernels to a module alias. This avoids errors from modprobe about unknown modules. Ignore a few xenlinux modules that lack aliases.- Gcc9 warnings seem to be cleared up with upstream fixes. Drop gcc9-ignore-warnings.patch- bsc#1138563 - L3: xenpvnetboot improperly ported to Python 3 fix-xenpvnetboot.patch- Move /etc/modprobe.d/xen_loop.conf to /lib/modprobe.d/xen_loop.conf- Remove /etc/xen/xenapiusers and /etc/pam.d/xen-api- Remove all upstream provided files in /etc/xen They are not required at runtime. The host admin is now responsible if he really needs anything in this subdirectory.- In our effort to make /etc fully admin controlled, move /etc/xen/scripts to libexec/xen/scripts with xen-tools.etc_pollution.patch- Move /etc/bash_completion.d/xl.sh to %{_datadir}/bash-completion/completions- bsc#1138294 - VUL-0: CVE-2019-17349: XSA-295: Unlimited Arm Atomics Operations 5d03a0c4-1-Arm-add-an-isb-before-reading-CNTPCT_EL0.patch 5d03a0c4-2-gnttab-rework-prototype-of-set_status.patch 5d03a0c4-3-Arm64-rewrite-bitops-in-C.patch 5d03a0c4-4-Arm32-rewrite-bitops-in-C.patch 5d03a0c4-5-Arm-bitops-consolidate-prototypes.patch 5d03a0c4-6-Arm64-cmpxchg-simplify.patch 5d03a0c4-7-Arm32-cmpxchg-simplify.patch 5d03a0c4-8-Arm-bitops-helpers-with-timeout.patch 5d03a0c4-9-Arm-cmpxchg-helper-with-timeout.patch 5d03a0c4-A-Arm-turn-on-SILO-mode-by-default.patch 5d03a0c4-B-bitops-guest-helpers.patch 5d03a0c4-C-cmpxchg-guest-helpers.patch 5d03a0c4-D-use-guest-atomics-helpers.patch 5d03a0c4-E-Arm-add-perf-counters-in-guest-atomic-helpers.patch 5d03a0c4-F-Arm-protect-gnttab_clear_flag.patch - Upstream bug fixes (bsc#1027519) 5c87b6c8-drop-arch_evtchn_inject.patch 5c87b6e8-avoid-atomic-rmw-accesses-in-map_vcpu_info.patch 5cd921fb-trace-fix-build-with-gcc9.patch 5cd9224b-AMD-IOMMU-disable-upon-init-fail.patch 5cd922c5-x86-MTRR-recalc-p2mt-when-iocaps.patch 5cd9230f-VMX-correctly-get-GS_SHADOW-for-current.patch 5cd926d0-bitmap_fill-zero-sized.patch 5cd92724-drivers-video-drop-constraints.patch 5cd93a69-x86-spec-ctrl-reposition-XPTI-parsing.patch (Replaces xsa297-0a.patch) 5cd93a69-x86-MSR_INTEL_CORE_THREAD_COUNT.patch (Replaces xsa297-0b.patch) 5cd93a69-x86-boot-detect-Intel-SMT-correctly.patch (Replaces xsa297-0c.patch) 5cdad090-x86-spec-ctrl-misc-non-functional-cleanup.patch (Replaces xsa297-0d.patch) 5cdad090-x86-spec-ctrl-CPUID-MSR-definitions-for-MDS.patch (Replaces xsa297-1.patch) 5cdad090-x86-spec-ctrl-infrastructure-for-VERW-flush.patch (Replaces xsa297-2.patch) 5cdad090-x86-spec-ctrl-opts-to-control-VERW-flush.patch (Replaces xsa297-3.patch) 5cd981ff-x86-IRQ-tracing-avoid-UB-or-worse.patch 5cdeb9fd-sched-fix-csched2_deinit_pdata.patch 5ce7a92f-x86-IO-APIC-fix-build-with-gcc9.patch 5cf0f6a4-x86-vhpet-resume-avoid-small-diff.patch 5cf16e51-x86-spec-ctrl-Knights-retpoline-safe.patch- Fix some outdated information in the readme README.SUSE- spec: xen-tools: require matching version of xen package bsc#1137471- Remove two stale patches xen.build-compare.man.patch xenpaging.doc.patch- Disable LTO (boo#1133296).- Remove arm32 from ExclusiveArch to fix build- bsc#1111331 - VUL-0: CPU issues Q2 2019 aka "Group 4". CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 xsa297-0a.patch xsa297-0b.patch xsa297-0c.patch xsa297-0d.patch xsa297-1.patch xsa297-2.patch xsa297-3.patch - Update 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch and drop 5cac6219-xen-cpu-Fix-ARM-build-following-cs-597fbb8.patch Refresh 5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch- bsc#1131811 - [XEN] internal error: libxenlight failed to create new domain. This patch is a workaround for a systemd issue. See patch header for additional comments. xenstore-launch.patch- bsc#1125378 - [xen][pygrub] Can not restore sle11sp4 pv guest after upgrading host from sle11sp4 to sle15sp1 pygrub-python3-conversion.patch - Fix "TypeError: virDomainDefineXML() argument 2 must be str or None, not bytes" when converting VMs from using the xm/xend toolstack to the libxl/libvirt toolstack. (bsc#1123378) xen2libvirt.py- bsc#1124560 - Fully virtualized guests crash on boot 5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch - bsc#1121391 - GCC 9: xen build fails 5c8f752c-x86-e820-build-with-gcc9.patch - Upstream bug fixes (bsc#1027519) 5c87b644-IOMMU-leave-enabled-for-kexec-crash.patch 5c87b6a2-x86-HVM-dont-crash-guest-in-find_mmio_cache.patch 5c87e6d1-x86-TSX-controls-for-RTM-force-abort-mode.patch 5c8fb92d-x86-HVM-split-linear-reads-and-writes.patch 5c8fb951-x86-HVM-finish-IOREQs-correctly-on-completion.patch 5c8fc6c0-x86-MSR-shorten-ARCH_CAPABILITIES.patch 5c8fc6c0-x86-SC-retpoline-safety-calculations-for-eIBRS.patch 5c9e63c5-credit2-SMT-idle-handling.patch 5ca46b68-x86emul-no-GPR-update-upon-AVX-gather-failures.patch 5ca773d1-x86emul-dont-read-mask-reg-without-AVX512F.patch 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch 5cac6219-xen-cpu-Fix-ARM-build-following-cs-597fbb8.patch- Install pkgconfig files into libdir instead of datadir- Update to Xen 4.12.0 FCS release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2 * HVM/PVH and PV only Hypervisor: The Xen 4.12 release separates the HVM/PVH and PV code paths in Xen and provides KCONFIG options to build a PV only or HVM/PVH only hypervisor. * QEMU Deprivilege (DM_RESTRICT): In Xen 4.12, this feature has been vastly improved. * Argo - Hypervisor-Mediated data eXchange: Argo is a new inter- domain communication mechanism. * Improvements to Virtual Machine Introspection: The VMI subsystem which allows detection of 0-day vulnerabilities has seen many functional and performance improvements. * Credit 2 Scheduler: The Credit2 scheduler is now the Xen Project default scheduler. * PVH Support: Grub2 boot support has been added to Xen and Grub2. * PVH Dom0: PVH Dom0 support has now been upgraded from experimental to tech preview. * The Xen 4.12 upgrade also includes improved IOMMU mapping code, which is designed to significantly improve the startup times of AMD EPYC based systems. * The upgrade also features Automatic Dom0 Sizing which allows the setting of Dom0 memory size as a percentage of host memory (e.g. 10%) or with an offset (e.g. 1G+10%).- bsc#1130485 - Please drop Requires on multipath-tools in xen-tools. Now using Recommends multipath-tools. xen.spec- Update to Xen 4.12.0 RC7 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- Update to Xen 4.12.0 RC6 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- bsc#1026236 - add Xen cmdline option "suse_vtsc_tolerance" to avoid TSC emulation for HVM domUs if their expected frequency does not match exactly the frequency of the receiving host xen.bug1026236.suse_vtsc_tolerance.patch- Update to Xen 4.12.0 RC5 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- jsc#SLE-3059 - Disable Xen auto-ballooning - Add CONFIG_DOM0_MEM to the spec file for managing dom0 memory. xen.spec - Disable autoballooning in xl.con xl-conf-disable-autoballoon.patch- Update gcc9-ignore-warnings.patch to fix build in SLE12- bsc#1126325 - fix crash in libxl in error path Setup of grant_tables and other variables may fail libxl.prepare-environment-for-domcreate_stream_done.patch- bsc#1127620 - Documentation for the xl configuration file allows for firmware=pvgrub64 but we don't ship pvgrub64. Create a link from grub.xen to pvgrub64 xen.spec- Update to Xen 4.12.0 RC4 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2 - Tarball also contains additional post RC4 security fixes for Xen Security Advisories 287, 288, and 290 through 294.- Update to Xen 4.12.0 RC3 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- Update to Xen 4.12.0 RC2 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- bsc#1121391 - GCC 9: xen build fails gcc9-ignore-warnings.patch- bsc#1122563 - Virtualization/xen: Bug no Xen on boot, missing /proc/xen, after 4.11 -> 4.12 upgrade on X86_64/efi. Keep xen.efi in /usr/lib64/efi for booting older distros. xen.spec- fate#326960: Package grub2 as noarch. As part of the effort to have a unified bootloader across architectures, modify the xen.spec file to move the Xen efi files to /usr/share/efi/$(uname -m) from /usr/lib64/efi.- Update to Xen 4.12.0 RC1 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2 - Drop 5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch 5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch 5b8fae26-tools-libxl-correct-vcpu-affinity-output-with-sparse-physical-cpu-map.patch 5b8fae26-xen-fill-topology-info-for-all-present-cpus.patch 5b8fb5af-tools-xl-refuse-to-set-number-of-vcpus-to-0-via-xl-vcpu-set.patch 5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch 5b9784d2-x86-HVM-add-known_gla-helper.patch 5b9784f2-x86-HVM-split-page-straddling-accesses.patch 5bdc31d5-VMX-fix-vmx_handle_eoi.patch gcc8-fix-array-warning-on-i586.patch gcc8-fix-format-warning-on-i586.patch gcc8-inlining-failed.patch xen.bug1079730.patch- bsc#1121960 - xen: sync with Factory xen.spec xen.changes- Replace old $RPM_* shell vars. - Run fdupes for all architectures, and not crossing subvolume boundaries.- Do not run %fdupes on aarch64 to avoid the hardlink-across-partition rpmlint error- Require qemu-seabios only on x86* as it is not available on non-x86 systems- Avoid creating dangling symlinks (bsc#1116524) This reverts the revert of tmp_build.patch- Update to Xen 4.11.1 bug fix release (bsc#1027519) xen-4.11.1-testing-src.tar.bz2 - 5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch replaces xen.2b50cdbc444c637575580dcfa6c9525a84d5cc62.patch - 5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch replaces xen.b8f33431f3dd23fb43a879f4bdb4283fdc9465ad.patch - Drop the following patches contained in the new tarball 5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch 5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch 5b3cab8e-2-VMX-improve-MSR-load-save-API.patch 5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch 5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch 5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch 5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch 5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch 5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch 5b3f8fa5-port-array_index_nospec-from-Linux.patch 5b4321f6-x86-correctly-set-nonlazy_xstate_used-when-loading-full-state.patch 5b4488e7-x86-spec-ctrl-cmdline-handling.patch 5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch 5b4c9a60-allow-cpu_down-to-be-called-earlier.patch 5b4db308-SVM-fix-cleanup-svm_inject_event.patch 5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch 5b5040f2-x86-AMD-distinguish-CU-from-HT.patch 5b505fe5-VMX-fix-find-msr-build.patch 5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch 5b508775-2-x86-possibly-bring-up-all-CPUs.patch 5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch 5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch 5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch 5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch 5b56feb1-hvm-Disallow-unknown-MSR_EFER-bits.patch 5b56feb2-spec-ctrl-Fix-the-parsing-of-xpti--on-fixed-Intel-hardware.patch 5b62ca93-VMX-avoid-hitting-BUG_ON.patch 5b6d84ac-x86-fix-improve-vlapic-read-write.patch 5b6d8ce2-x86-XPTI-parsing.patch 5b72fbbe-ARM-disable-grant-table-v2.patch 5b72fbbe-oxenstored-eval-order.patch 5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch 5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch 5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch 5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch 5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch 5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch 5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch 5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch 5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch 5b72fbbf-x86-Make-spec-ctrl-no-a-global-disable-of-all-mitigations.patch 5b72fbbf-xl.conf-Add-global-affinity-masks.patch 5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch 5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch 5b75afef-x86-setup-avoid-OoB-E820-lookup.patch 5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch 5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch 5b8d5832-x86-assorted-array_index_nospec-insertions.patch 5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch 5bacae4b-x86-boot-allocate-extra-module-slot.patch 5bae44ce-x86-silence-false-log-messages.patch 5bb60c12-x86-split-opt_xpti.patch 5bb60c4f-x86-split-opt_pv_l1tf.patch 5bb60c74-x86-fix-xpti-and-pv-l1tf.patch 5bcf0722-x86-boot-enable-NMIs.patch 5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch 5bd076e9-x86-boot-init-debug-regs-correctly.patch 5bd076e9-x86-init-vcpu-debug-regs-correctly.patch 5bd0e0cf-vvmx-Disallow-the-use-of-VT-x-instructions-when-nested-virt-is-disabled.patch 5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch 5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch 5be2a308-x86-extend-get_platform_badpages.patch 5be2a354-x86-work-around-HLE-host-lockup-erratum.patch xsa275-1.patch xsa275-2.patch xsa276-1.patch xsa276-2.patch xsa277.patch xsa279.patch xsa280-1.patch xsa280-2.patch- bsc#1116524 - Package xen-tools-4.11.0_09-2.1.x86_64 broken: Missing /bin/domu-xenstore. This was broken because "make package build reproducible" change. (boo#1047218, boo#1062303) This fix reverses the change to this patch. tmp_build.patch- bsc#1115040 - VUL-0: CVE-2018-19961 CVE-2018-19962: xen: insufficient TLB flushing / improper large page mappings with AMD IOMMUs (XSA-275) xsa275-1.patch xsa275-2.patch - bsc#1115043 - VUL-0: CVE-2018-19963: xen: resource accounting issues in x86 IOREQ server handling (XSA-276) xsa276-1.patch xsa276-2.patch - bsc#1115044 - VUL-0: CVE-2018-19964: xen: x86: incorrect error handling for guest p2m page removals (XSA-277) xsa277.patch - bsc#1114405 - VUL-0: CVE-2018-18883: xen: Nested VT-x usable even when disabled (XSA-278) 5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch - bsc#1115045 - VUL-0: xen: CVE-2018-19965: x86: DoS from attempting to use INVPCID with a non-canonical addresses (XSA-279) xsa279.patch - bsc#1115047 - VUL-0: CVE-2018-19966: xen: Fix for XSA-240 conflicts with shadow paging (XSA-280) xsa280-1.patch xsa280-2.patch - bsc#1114988 - VUL-0: CVE-2018-19967: xen: guest use of HLE constructs may lock up host (XSA-282) 5be2a308-x86-extend-get_platform_badpages.patch 5be2a354-x86-work-around-HLE-host-lockup-erratum.patch - bsc#1108940 - L3: XEN SLE12-SP1 domU hang on SLE12-SP3 HV 5bdc31d5-VMX-fix-vmx_handle_eoi.patch - Upstream bug fixes (bsc#1027519) 5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch 5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch 5bacae4b-x86-boot-allocate-extra-module-slot.patch 5bae44ce-x86-silence-false-log-messages.patch 5bb60c12-x86-split-opt_xpti.patch 5bb60c4f-x86-split-opt_pv_l1tf.patch 5bb60c74-x86-fix-xpti-and-pv-l1tf.patch 5bcf0722-x86-boot-enable-NMIs.patch 5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch 5bd076e9-x86-boot-init-debug-regs-correctly.patch 5bd076e9-x86-init-vcpu-debug-regs-correctly.patch 5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch- bsc#1114405 - VUL-0: CVE-2018-18883: xen: Nested VT-x usable even when disabled (XSA-278) 5bd0e0cf-vvmx-Disallow-the-use-of-VT-x-instructions-when-nested-virt-is-disabled.patch- Use SMBIOS_REL_DATE instead of SMBIOS_DATE for reproducible binaries- make package build reproducible (boo#1047218, boo#1062303) * Set SMBIOS_REL_DATE * Update tmp_build.patch to use SHA instead of random build-id * Add reproducible.patch to use --no-insert-timestamp- Building with ncurses 6.1 will fail without xen.2b50cdbc444c637575580dcfa6c9525a84d5cc62.patch - Building libxl acpi support on aarch64 with gcc 8.2 will fail without xen.b8f33431f3dd23fb43a879f4bdb4283fdc9465ad.patch- bsc#1106263 - L3: The affinity reporting via 'xl vcpu-list' is apparently broken 5b8fae26-tools-libxl-correct-vcpu-affinity-output-with-sparse-physical-cpu-map.patch 5b8fae26-xen-fill-topology-info-for-all-present-cpus.patch 5b8fb5af-tools-xl-refuse-to-set-number-of-vcpus-to-0-via-xl-vcpu-set.patch- bsc#1094508 - L3: Kernel oops in fs/dcache.c called by d_materialise_unique() 5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch 5b9784d2-x86-HVM-add-known_gla-helper.patch 5b9784f2-x86-HVM-split-page-straddling-accesses.patch - bsc#1103279 - (CVE-2018-15470) VUL-0: CVE-2018-15470: xen: oxenstored does not apply quota-maxentity (XSA-272) 5b72fbbe-oxenstored-eval-order.patch - bsc#1103275 - (CVE-2018-15469) VUL-0: CVE-2018-15469: xen: Use of v2 grant tables may cause crash on ARM (XSA-268) 5b72fbbe-ARM-disable-grant-table-v2.patch - Upstream patches from Jan (bsc#1027519) 5b6d84ac-x86-fix-improve-vlapic-read-write.patch 5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch 5b75afef-x86-setup-avoid-OoB-E820-lookup.patch 5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch 5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch 5b8d5832-x86-assorted-array_index_nospec-insertions.patch - Drop 5b741962-x86-write-to-correct-variable-in-parse_pv_l1tf.patch- bsc#1078292 - rpmbuild -ba SPECS/xen.spec with xen-4.9.1 failed xen.spec- bsc#1091107 - VUL-0: CVE-2018-3646: xen: L1 Terminal Fault -VMM (XSA-273) 5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch 5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch 5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch 5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch 5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch 5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch 5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch 5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch - bsc#1103276 - VUL-0: CVE-2018-15468: xen: x86: Incorrect MSR_DEBUGCTL handling lets guests enable BTS (XSA-269) 5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch - Upstream prereq patches for XSA-273 and other upstream fixes (bsc#1027519) 5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch 5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch 5b3cab8e-2-VMX-improve-MSR-load-save-API.patch 5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch 5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch 5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch 5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch 5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch 5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch 5b4321f6-x86-correctly-set-nonlazy_xstate_used-when-loading-full-state.patch 5b505fe5-VMX-fix-find-msr-build.patch 5b56feb1-hvm-Disallow-unknown-MSR_EFER-bits.patch 5b56feb2-spec-ctrl-Fix-the-parsing-of-xpti--on-fixed-Intel-hardware.patch 5b62ca93-VMX-avoid-hitting-BUG_ON.patch 5b6d8ce2-x86-XPTI-parsing.patch 5b72fbbf-x86-Make-spec-ctrl-no-a-global-disable-of-all-mitigations.patch 5b72fbbf-xl.conf-Add-global-affinity-masks.patch 5b741962-x86-write-to-correct-variable-in-parse_pv_l1tf.patch- Upstream patches from Jan (bsc#1027519) 5b3f8fa5-port-array_index_nospec-from-Linux.patch 5b4488e7-x86-spec-ctrl-cmdline-handling.patch 5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch 5b4c9a60-allow-cpu_down-to-be-called-earlier.patch 5b4db308-SVM-fix-cleanup-svm_inject_event.patch 5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch 5b5040f2-x86-AMD-distinguish-CU-from-HT.patch 5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch 5b508775-2-x86-possibly-bring-up-all-CPUs.patch 5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch 5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch 5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch 5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch gcc8-fix-format-warning-on-i586.patch gcc8-fix-array-warning-on-i586.patch - Drop xen.fuzz-_FORTIFY_SOURCE.patch gcc8-fix-warning-on-i586.patch- Update to Xen 4.11.0 FCS (fate#325202, fate#325123) xen-4.11.0-testing-src.tar.bz2 disable-building-pv-shim.patch - Dropped patches 5a33a12f-domctl-improve-locking-during-domain-destruction.patch 5a6703cb-x86-move-invocations-of-hvm_flush_guest_tlbs.patch 5a79d7ed-libxc-packed-initrd-dont-fail-domain-creation.patch 5a9985bd-x86-invpcid-support.patch 5ac72a48-gcc8.patch 5ac72a5f-gcc8.patch 5ac72a64-gcc8.patch 5ac72a69-gcc8.patch 5ac72a6e-gcc8.patch 5ac72a74-gcc8.patch 5ac72a7b-gcc8.patch 5ad4923e-x86-correct-S3-resume-ordering.patch 5ad49293-x86-suppress-BTI-mitigations-around-S3.patch 5ad600d4-x86-pv-introduce-x86emul_read_dr.patch 5ad600d4-x86-pv-introduce-x86emul_write_dr.patch 5ad8c3a7-x86-spec_ctrl-update-retpoline-decision-making.patch 5adda097-x86-HPET-fix-race-triggering-ASSERT.patch 5adda0d5-x86-HVM-never-retain-emulated-insn-cache.patch 5adde9ed-xpti-fix-double-fault-handling.patch 5ae06fad-SVM-fix-intercepts-for-SYS-CALL-ENTER-MSRs.patch 5ae31917-x86-cpuidle-init-stats-lock-once.patch 5aeaeae4-introduce-vcpu_sleep_nosync_locked.patch 5aeaeaf0-sched-fix-races-in-vcpu-migration.patch 5aeb2c57-x86-retval-checks-of-set-guest-trapbounce.patch 5aec7393-1-x86-xpti-avoid-copy.patch 5aec7393-2-x86-xpti-write-cr3.patch 5aec744a-3-x86-xpti-per-domain-flag.patch 5aec744a-4-x86-xpti-use-invpcid.patch 5aec744a-5-x86-xpti-no-global-pages.patch 5aec744a-6-x86-xpti-cr3-valid-flag.patch 5aec744a-7-x86-xpti-pv_guest_cr4_to_real_cr4.patch 5aec744b-8-x86-xpti-cr3-helpers.patch 5aec74a8-9-x86-xpti-use-pcid.patch 5af1daa9-1-x86-traps-fix-dr6-handing-in-DB-handler.patch 5af1daa9-2-x86-pv-move-exception-injection-into-test_all_events.patch 5af1daa9-3-x86-traps-use-IST-for-DB.patch 5af1daa9-4-x86-traps-fix-handling-of-DB-in-hypervisor-context.patch 5af1daa9-x86-HVM-guard-against-bogus-emulator-ioreq-state.patch 5af1daa9-x86-vpt-support-IO-APIC-routed-intr.patch 5af97999-viridian-cpuid-leaf-40000003.patch 5afc13ae-1-x86-read-MSR_ARCH_CAPABILITIES-once.patch 5afc13ae-2-x86-express-Xen-SPEC_CTRL-choice-as-variable.patch 5afc13ae-3-x86-merge-bti_ist_info-use_shadow_spec_ctrl.patch 5afc13ae-4-x86-fold-XEN_IBRS-ALTERNATIVES.patch 5afc13ae-5-x86-rename-bits-of-spec_ctrl-infrastructure.patch 5afc13ae-6-x86-elide-MSR_SPEC_CTRL-handling-in-idle.patch 5afc13ae-7-x86-split-X86_FEATURE_SC_MSR.patch 5afc13ae-8-x86-explicitly-set-Xen-default-SPEC_CTRL.patch 5afc13ae-9-x86-cpuid-improve-guest-policies-for-speculative.patch 5afc13ae-A-x86-introduce-spec-ctrl-cmdline-opt.patch 5b02c786-x86-AMD-mitigations-for-GPZ-SP4.patch 5b02c786-x86-Intel-mitigations-for-GPZ-SP4.patch 5b02c786-x86-msr-virtualise-SPEC_CTRL-SSBD.patch 5b0bc9da-x86-XPTI-fix-S3-resume.patch 5b0d2286-libxc-x86-PV-dont-hand-through-CPUID-leaf-0x80000008.patch 5b0d2d91-x86-suppress-sync-when-XPTI-off.patch 5b0d2dbc-x86-correct-default_xen_spec_ctrl.patch 5b0d2ddc-x86-CPUID-dont-override-tool-stack-hidden-STIBP.patch 5b150ef9-x86-fix-error-handling-of-pv-dr7-shadow.patch 5b21825d-1-x86-support-fully-eager-FPU-context-switching.patch 5b21825d-2-x86-spec-ctrl-mitigations-for-LazyFPU.patch 5b238b92-x86-HVM-account-for-fully-eager-FPU.patch 5b2b7172-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b31e004-x86-HVM-emul-attempts-FPU-set-fpu_initialised.patch 5b323e3c-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b34882d-x86-mm-dont-bypass-preemption-checks.patch 5b348874-x86-refine-checks-in-DB-handler.patch 5b348897-libxl-qemu_disk_scsi_drive_string-break-out-common.patch 5b3488a2-libxl-restore-passing-ro-to-qemu-for-SCSI-disks.patch 5b34891a-x86-HVM-dont-cause-NM-to-be-raised.patch 5b348954-x86-guard-against-NM.patch libxl.Add-a-version-check-of-QEMU-for-QMP-commands.patch libxl.LIBXL_DESTROY_TIMEOUT.patch libxl.qmp-Tell-QEMU-about-live-migration-or-snapshot.patch xen_fix_build_with_acpica_20180427_and_new_packages.patch- Submit upstream patch libacpi: fixes for iasl >= 20180427 git commit 858dbaaeda33b05c1ac80aea0ba9a03924e09005 xen_fix_build_with_acpica_20180427_and_new_packages.patch This is needed for acpica package to get updated in our build service- Upstream patches from Jan (bsc#1027519) 5b02c786-x86-AMD-mitigations-for-GPZ-SP4.patch (Replaces Spectre-v4-1.patch) 5b02c786-x86-Intel-mitigations-for-GPZ-SP4.patch (Replaces Spectre-v4-2.patch) 5b02c786-x86-msr-virtualise-SPEC_CTRL-SSBD.patch (Replaces Spectre-v4-3.patch) 5b0bc9da-x86-XPTI-fix-S3-resume.patch 5b0d2286-libxc-x86-PV-dont-hand-through-CPUID-leaf-0x80000008.patch 5b0d2d91-x86-suppress-sync-when-XPTI-off.patch 5b0d2dbc-x86-correct-default_xen_spec_ctrl.patch 5b0d2ddc-x86-CPUID-dont-override-tool-stack-hidden-STIBP.patch 5b150ef9-x86-fix-error-handling-of-pv-dr7-shadow.patch 5b21825d-1-x86-support-fully-eager-FPU-context-switching.patch (Replaces xsa267-1.patch) 5b21825d-2-x86-spec-ctrl-mitigations-for-LazyFPU.patch (Replaces xsa267-2.patch) 5b238b92-x86-HVM-account-for-fully-eager-FPU.patch 5b2b7172-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b31e004-x86-HVM-emul-attempts-FPU-set-fpu_initialised.patch 5b323e3c-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b34882d-x86-mm-dont-bypass-preemption-checks.patch (Replaces xsa264.patch) 5b348874-x86-refine-checks-in-DB-handler.patch (Replaces xsa265.patch) 5b348897-libxl-qemu_disk_scsi_drive_string-break-out-common.patch (Replaces xsa266-1-<>.patch) 5b3488a2-libxl-restore-passing-ro-to-qemu-for-SCSI-disks.patch (Replaces xsa266-2-<>.patch) 5b34891a-x86-HVM-dont-cause-NM-to-be-raised.patch 5b348954-x86-guard-against-NM.patch- Fix more build gcc8 related failures with xen.fuzz-_FORTIFY_SOURCE.patch- bsc#1098403 - fix regression introduced by changes for bsc#1079730 a PV domU without qcow2 and/or vfb has no qemu attached. Ignore QMP errors for PV domUs to handle PV domUs with and without an attached qemu-xen. xen.bug1079730.patch- bsc#1097521 - VUL-0: CVE-2018-12891: xen: preemption checks bypassed in x86 PV MM handling (XSA-264) xsa264.patch - bsc#1097522 - VUL-0: CVE-2018-12893: xen: x86: #DB exception safety check can be triggered by a guest (XSA-265) xsa265.patch - bsc#1097523 - VUL-0: CVE-2018-12892: xen: libxl fails to honour readonly flag on HVM emulated SCSI disks (XSA-266) xsa266-1-libxl-qemu_disk_scsi_drive_string-Break-out-common-p.patch xsa266-2-libxl-restore-passing-readonly-to-qemu-for-SCSI-disk.patch- bsc#1095242 - VUL-0: CVE-2018-3665: xen: Lazy FP Save/Restore (XSA-267) xsa267-1.patch xsa267-2.patch- bsc#1092543 - GCC 8: xen build fails gcc8-fix-warning-on-i586.patch- bsc#1092631 - VUL-0: CVE-2018-3639: xen: V4 – Speculative Store Bypass aka "Memory Disambiguation" (XSA-263) 5ad4923e-x86-correct-S3-resume-ordering.patch 5ad49293-x86-suppress-BTI-mitigations-around-S3.patch 5afc13ae-1-x86-read-MSR_ARCH_CAPABILITIES-once.patch 5afc13ae-2-x86-express-Xen-SPEC_CTRL-choice-as-variable.patch 5afc13ae-3-x86-merge-bti_ist_info-use_shadow_spec_ctrl.patch 5afc13ae-4-x86-fold-XEN_IBRS-ALTERNATIVES.patch 5afc13ae-5-x86-rename-bits-of-spec_ctrl-infrastructure.patch 5afc13ae-6-x86-elide-MSR_SPEC_CTRL-handling-in-idle.patch 5afc13ae-7-x86-split-X86_FEATURE_SC_MSR.patch 5afc13ae-8-x86-explicitly-set-Xen-default-SPEC_CTRL.patch 5afc13ae-9-x86-cpuid-improve-guest-policies-for-speculative.patch 5afc13ae-A-x86-introduce-spec-ctrl-cmdline-opt.patch Spectre-v4-1.patch Spectre-v4-2.patch Spectre-v4-3.patch- Always call qemus xen-save-devices-state in suspend/resume to fix migration with qcow2 images (bsc#1079730) libxl.Add-a-version-check-of-QEMU-for-QMP-commands.patch libxl.qmp-Tell-QEMU-about-live-migration-or-snapshot.patch xen.bug1079730.patch- bsc#1087289 - L3: Xen BUG at sched_credit.c:1663 5aeaeae4-introduce-vcpu_sleep_nosync_locked.patch 5aeaeaf0-sched-fix-races-in-vcpu-migration.patch - Upstream patches from Jan (bsc#1027519) 5ad600d4-x86-pv-introduce-x86emul_read_dr.patch 5ad600d4-x86-pv-introduce-x86emul_write_dr.patch 5ad8c3a7-x86-spec_ctrl-update-retpoline-decision-making.patch 5adda097-x86-HPET-fix-race-triggering-ASSERT.patch 5adda0d5-x86-HVM-never-retain-emulated-insn-cache.patch 5ae06fad-SVM-fix-intercepts-for-SYS-CALL-ENTER-MSRs.patch 5ae31917-x86-cpuidle-init-stats-lock-once.patch 5aeb2c57-x86-retval-checks-of-set-guest-trapbounce.patch 5af1daa9-1-x86-traps-fix-dr6-handing-in-DB-handler.patch (Replaces xsa260-1.patch) 5af1daa9-2-x86-pv-move-exception-injection-into-test_all_events.patch (Replaces xsa260-2.patch) 5af1daa9-3-x86-traps-use-IST-for-DB.patch (Replaces xsa260-3.patch) 5af1daa9-4-x86-traps-fix-handling-of-DB-in-hypervisor-context.patch (Replaces xsa260-4.patch) 5af1daa9-x86-HVM-guard-against-bogus-emulator-ioreq-state.patch (Replaces xsa262.patch) 5af1daa9-x86-vpt-support-IO-APIC-routed-intr.patch (Replaces xsa261.patch) 5af97999-viridian-cpuid-leaf-40000003.patch- Fixes related to Page Table Isolation (XPTI). bsc#1074562 XSA-254 5a6703cb-x86-move-invocations-of-hvm_flush_guest_tlbs.patch 5a9985bd-x86-invpcid-support.patch 5adde9ed-xpti-fix-double-fault-handling.patch 5aec7393-1-x86-xpti-avoid-copy.patch 5aec7393-2-x86-xpti-write-cr3.patch 5aec744a-3-x86-xpti-per-domain-flag.patch 5aec744a-4-x86-xpti-use-invpcid.patch 5aec744a-5-x86-xpti-no-global-pages.patch 5aec744a-6-x86-xpti-cr3-valid-flag.patch 5aec744a-7-x86-xpti-pv_guest_cr4_to_real_cr4.patch 5aec744b-8-x86-xpti-cr3-helpers.patch 5aec74a8-9-x86-xpti-use-pcid.patch- bsc#1092543 - GCC 8: xen build fails 5ac72a48-gcc8.patch 5ac72a5f-gcc8.patch 5ac72a64-gcc8.patch 5ac72a69-gcc8.patch 5ac72a6e-gcc8.patch 5ac72a74-gcc8.patch 5ac72a7b-gcc8.patch gcc8-inlining-failed.patch- Update to Xen 4.10.1 bug fix release (bsc#1027519) xen-4.10.1-testing-src.tar.bz2 disable-building-pv-shim.patch - Drop the following patches contained in the new tarball 5a21a77e-x86-pv-construct-d0v0s-GDT-properly.patch 5a2fda0d-x86-mb2-avoid-Xen-when-looking-for-module-crashkernel-pos.patch 5a2ffc1f-x86-mm-drop-bogus-paging-mode-assertion.patch 5a313972-x86-microcode-add-support-for-AMD-Fam17.patch 5a32bd79-x86-vmx-dont-use-hvm_inject_hw_exception-in-.patch 5a4caa5e-x86-IRQ-conditionally-preserve-access-perm.patch 5a4caa8c-x86-E820-don-t-overrun-array.patch 5a4e2bca-x86-free-msr_vcpu_policy-during-destruction.patch 5a4e2c2c-x86-upcall-inject-spurious-event-after-setting-vector.patch 5a4fd893-1-x86-break-out-alternative-asm-into-separate-header.patch 5a4fd893-2-x86-introduce-ALTERNATIVE_2-macros.patch 5a4fd893-3-x86-hvm-rename-update_guest_vendor-to-cpuid_policy_changed.patch 5a4fd893-4-x86-introduce-cpuid_policy_updated.patch 5a4fd893-5-x86-entry-remove-partial-cpu_user_regs.patch 5a4fd894-1-x86-rearrange-RESTORE_ALL-to-restore-in-stack-order.patch 5a4fd894-2-x86-hvm-use-SAVE_ALL-after-VMExit.patch 5a4fd894-3-x86-erase-guest-GPRs-on-entry-to-Xen.patch 5a4fd894-4-clarifications-to-wait-infrastructure.patch 5a534c78-x86-dont-use-incorrect-CPUID-values-for-topology.patch 5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4-updates.patch 5a5e2cff-x86-Meltdown-band-aid.patch 5a5e2d73-x86-Meltdown-band-aid-conditional.patch 5a5e3a4e-1-x86-support-compiling-with-indirect-branch-thunks.patch 5a5e3a4e-2-x86-support-indirect-thunks-from-asm.patch 5a5e3a4e-3-x86-report-speculative-mitigation-details.patch 5a5e3a4e-4-x86-AMD-set-lfence-as-Dispatch-Serialising.patch 5a5e3a4e-5-x86-introduce-alternative-indirect-thunks.patch 5a5e3a4e-6-x86-definitions-for-Indirect-Branch-Controls.patch 5a5e3a4e-7-x86-cmdline-opt-to-disable-IBRS-IBPB-STIBP.patch 5a5e459c-1-x86-SVM-offer-CPUID-faulting-to-AMD-HVM-guests.patch 5a5e459c-2-x86-report-domain-id-on-CPUID.patch 5a68bc16-x86-acpi-process-softirqs-logging-Cx.patch 5a69c0b9-x86-fix-GET_STACK_END.patch 5a6b36cd-1-x86-cpuid-handling-of-IBRS-IBPB-STIBP-and-IBRS-for-guests.patch 5a6b36cd-2-x86-msr-emulation-of-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-3-x86-migrate-MSR_SPEC_CTRL.patch 5a6b36cd-4-x86-hvm-permit-direct-access-to-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-5-x86-use-SPEC_CTRL-on-entry.patch 5a6b36cd-6-x86-clobber-RSB-RAS-on-entry.patch 5a6b36cd-7-x86-no-alternatives-in-NMI-MC-paths.patch 5a6b36cd-8-x86-boot-calculate-best-BTI-mitigation.patch 5a6b36cd-9-x86-issue-speculation-barrier.patch 5a6b36cd-A-x86-offer-Indirect-Branch-Controls-to-guests.patch 5a6b36cd-B-x86-clear-SPEC_CTRL-while-idle.patch 5a7b1bdd-x86-reduce-Meltdown-band-aid-IPI-overhead.patch 5a843807-x86-spec_ctrl-fix-bugs-in-SPEC_CTRL_ENTRY_FROM_INTR_IST.patch 5a856a2b-x86-emul-fix-64bit-decoding-of-segment-overrides.patch 5a856a2b-x86-use-32bit-xors-for-clearing-GPRs.patch 5a856a2b-x86-xpti-hide-almost-all-of-Xen-image-mappings.patch 5a8be788-x86-nmi-start-NMI-watchdog-on-CPU0-after-SMP.patch 5a95373b-x86-PV-avoid-leaking-other-guests-MSR_TSC_AUX.patch 5a95571f-memory-dont-implicitly-unpin-in-decrease-res.patch 5a95576c-gnttab-ARM-dont-corrupt-shared-GFN-array.patch 5a955800-gnttab-dont-free-status-pages-on-ver-change.patch 5a955854-x86-disallow-HVM-creation-without-LAPIC-emul.patch 5a956747-x86-HVM-dont-give-wrong-impression-of-WRMSR-success.patch 5a9eb7f1-x86-xpti-dont-map-stack-guard-pages.patch 5a9eb85c-x86-slightly-reduce-XPTI-overhead.patch 5a9eb890-x86-remove-CR-reads-from-exit-to-guest-path.patch 5aa2b6b9-cpufreq-ondemand-CPU-offlining-race.patch 5aaa9878-x86-vlapic-clear-TMR-bit-for-edge-triggered-intr.patch xsa258.patch xsa259.patch- bsc#1090820 - VUL-0: CVE-2018-8897: xen: x86: mishandling of debug exceptions (XSA-260) xsa260-1.patch xsa260-2.patch xsa260-3.patch xsa260-4.patch - bsc#1090822 - VUL-0: CVE-2018-10982: xen: x86 vHPET interrupt injection errors (XSA-261) xsa261.patch - bsc#1090823 - VUL-0: CVE-2018-10981: xen: qemu may drive Xen into unbounded loop (XSA-262) xsa262.patch- bsc#1089152 - VUL-0: CVE-2018-10472: xen: Information leak via crafted user-supplied CDROM (XSA-258) xsa258.patch - bsc#1089635 - VUL-0: CVE-2018-10471: xen: x86: PV guest may crash Xen with XPTI (XSA-259) xsa259.patch- Preserve xen-syms from xen-dbg.gz to allow processing vmcores with crash(1) (bsc#1087251)- Upstream patches from Jan (bsc#1027519) and fixes related to Page Table Isolation (XPTI). See also bsc#1074562 XSA-254 5a856a2b-x86-xpti-hide-almost-all-of-Xen-image-mappings.patch 5a9eb7f1-x86-xpti-dont-map-stack-guard-pages.patch 5a9eb85c-x86-slightly-reduce-XPTI-overhead.patch 5a9eb890-x86-remove-CR-reads-from-exit-to-guest-path.patch 5aa2b6b9-cpufreq-ondemand-CPU-offlining-race.patch 5aaa9878-x86-vlapic-clear-TMR-bit-for-edge-triggered-intr.patch- bsc#1072834 - Xen HVM: unchecked MSR access error: RDMSR from 0xc90 at rIP: 0xffffffff93061456 (native_read_msr+0x6/0x30) 5a956747-x86-HVM-dont-give-wrong-impression-of-WRMSR-success.patch - Upstream patches from Jan (bsc#1027519) 5a79d7ed-libxc-packed-initrd-dont-fail-domain-creation.patch 5a7b1bdd-x86-reduce-Meltdown-band-aid-IPI-overhead.patch 5a843807-x86-spec_ctrl-fix-bugs-in-SPEC_CTRL_ENTRY_FROM_INTR_IST.patch 5a856a2b-x86-emul-fix-64bit-decoding-of-segment-overrides.patch 5a856a2b-x86-use-32bit-xors-for-clearing-GPRs.patch 5a8be788-x86-nmi-start-NMI-watchdog-on-CPU0-after-SMP.patch 5a95373b-x86-PV-avoid-leaking-other-guests-MSR_TSC_AUX.patch 5a95571f-memory-dont-implicitly-unpin-in-decrease-res.patch (Replaces xsa252.patch) 5a95576c-gnttab-ARM-dont-corrupt-shared-GFN-array.patch (Replaces xsa255-1.patch) 5a955800-gnttab-dont-free-status-pages-on-ver-change.patch (Replaces xsa255-2.patch) 5a955854-x86-disallow-HVM-creation-without-LAPIC-emul.patch (Replaces xsa256.patch) - Drop xsa252.patch xsa255-1.patch xsa255-2.patch xsa256.patch- bsc#1080635 - VUL-0: CVE-2018-7540: xen: DoS via non-preemptable L3/L4 pagetable freeing (XSA-252) xsa252.patch - bsc#1080662 - VUL-0: CVE-2018-7541: xen: grant table v2 -> v1 transition may crash Xen (XSA-255) xsa255-1.patch xsa255-2.patch - bsc#1080634 - VUL-0: CVE-2018-7542: xen: x86 PVH guest without LAPIC may DoS the host (XSA-256) xsa256.patch- Remove stale systemd presets code for 13.2 and older- fate#324965 - add script, udev rule and systemd service to watch for vcpu online/offline events in a HVM domU They are triggered via xl vcpu-set domU N- Replace hardcoded xen with Name tag when refering to subpkgs- Make sure tools and tools-domU require libs from the very same build- tools-domU: Add support for qemu guest agent. New files 80-xen-channel-setup.rules and xen-channel-setup.sh configure a xen-pv-channel for use by the guest agent FATE#324963- Remove outdated /etc/xen/README*- bsc#1073961 - VUL-0: CVE-2018-5244: xen: x86: memory leak with MSR emulation (XSA-253) 5a4e2bca-x86-free-msr_vcpu_policy-during-destruction.patch - bsc#1074562 - VUL-0: CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 xen: Information leak via side effects of speculative execution (XSA-254). Includes Spectre v2 mitigation. 5a4caa5e-x86-IRQ-conditionally-preserve-access-perm.patch 5a4caa8c-x86-E820-don-t-overrun-array.patch 5a4e2c2c-x86-upcall-inject-spurious-event-after-setting-vector.patch 5a4fd893-1-x86-break-out-alternative-asm-into-separate-header.patch 5a4fd893-2-x86-introduce-ALTERNATIVE_2-macros.patch 5a4fd893-3-x86-hvm-rename-update_guest_vendor-to-cpuid_policy_changed.patch 5a4fd893-4-x86-introduce-cpuid_policy_updated.patch 5a4fd893-5-x86-entry-remove-partial-cpu_user_regs.patch 5a4fd894-1-x86-rearrange-RESTORE_ALL-to-restore-in-stack-order.patch 5a4fd894-2-x86-hvm-use-SAVE_ALL-after-VMExit.patch 5a4fd894-3-x86-erase-guest-GPRs-on-entry-to-Xen.patch 5a4fd894-4-clarifications-to-wait-infrastructure.patch 5a534c78-x86-dont-use-incorrect-CPUID-values-for-topology.patch 5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4-updates.patch 5a5e2cff-x86-Meltdown-band-aid.patch 5a5e2d73-x86-Meltdown-band-aid-conditional.patch 5a5e3a4e-1-x86-support-compiling-with-indirect-branch-thunks.patch 5a5e3a4e-2-x86-support-indirect-thunks-from-asm.patch 5a5e3a4e-3-x86-report-speculative-mitigation-details.patch 5a5e3a4e-4-x86-AMD-set-lfence-as-Dispatch-Serialising.patch 5a5e3a4e-5-x86-introduce-alternative-indirect-thunks.patch 5a5e3a4e-6-x86-definitions-for-Indirect-Branch-Controls.patch 5a5e3a4e-7-x86-cmdline-opt-to-disable-IBRS-IBPB-STIBP.patch 5a5e459c-1-x86-SVM-offer-CPUID-faulting-to-AMD-HVM-guests.patch 5a5e459c-2-x86-report-domain-id-on-CPUID.patch 5a68bc16-x86-acpi-process-softirqs-logging-Cx.patch 5a69c0b9-x86-fix-GET_STACK_END.patch 5a6b36cd-1-x86-cpuid-handling-of-IBRS-IBPB-STIBP-and-IBRS-for-guests.patch 5a6b36cd-2-x86-msr-emulation-of-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-3-x86-migrate-MSR_SPEC_CTRL.patch 5a6b36cd-4-x86-hvm-permit-direct-access-to-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-5-x86-use-SPEC_CTRL-on-entry.patch 5a6b36cd-6-x86-clobber-RSB-RAS-on-entry.patch 5a6b36cd-7-x86-no-alternatives-in-NMI-MC-paths.patch 5a6b36cd-8-x86-boot-calculate-best-BTI-mitigation.patch 5a6b36cd-9-x86-issue-speculation-barrier.patch 5a6b36cd-A-x86-offer-Indirect-Branch-Controls-to-guests.patch 5a6b36cd-B-x86-clear-SPEC_CTRL-while-idle.patch- Fix python3 deprecated atoi call (bsc#1067224) pygrub-python3-conversion.patch - Drop xenmon-python3-conversion.patch- bsc#1067317 - pass cache=writeback|unsafe|directsync to qemu, depending on the libxl disk settings libxl.add-option-to-disable-disk-cache-flushes-in-qdisk.patch- Remove libxl.LIBXL_DESTROY_TIMEOUT.debug.patch- bsc#1067224 - xen-tools have hard dependency on Python 2 build-python3-conversion.patch bin-python3-conversion.patch- bsc#1070165 - xen crashes after aborted localhost migration 5a2ffc1f-x86-mm-drop-bogus-paging-mode-assertion.patch - bsc#1035442 - L3: libxl: error: libxl.c:1676:devices_destroy_cb: libxl__devices_destroy failed 5a33a12f-domctl-improve-locking-during-domain-destruction.patch - Upstream patches from Jan (bsc#1027519) 5a21a77e-x86-pv-construct-d0v0s-GDT-properly.patch 5a2fda0d-x86-mb2-avoid-Xen-when-looking-for-module-crashkernel-pos.patch 5a313972-x86-microcode-add-support-for-AMD-Fam17.patch 5a32bd79-x86-vmx-dont-use-hvm_inject_hw_exception-in-.patch- Update to Xen 4.10.0 FCS (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Rebuild initrd if xen-tools-domU is updated- Update to Xen 4.10.0-rc8 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Increase the value of LIBXL_DESTROY_TIMEOUT from 10 to 100 seconds If many domUs shutdown in parallel the backends can not keep up Add some debug output to track how long backend shutdown takes (bsc#1035442) libxl.LIBXL_DESTROY_TIMEOUT.patch libxl.LIBXL_DESTROY_TIMEOUT.debug.patch- Adjust xenstore-run-in-studomain.patch to change the defaults in the code instead of changing the sysconfig template, to also cover the upgrade case- Update to Xen 4.10.0-rc6 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Since xen switched to Kconfig, building a debug hypervisor was done by default. Adjust make logic to build a non-debug hypervisor by default, and continue to provide one as xen-dbg.gz- fate#316614: set migration constraints from cmdline fix libxl.set-migration-constraints-from-cmdline.patch for xen-4.10- Document the suse-diskcache-disable-flush option in xl-disk-configuration(5) (bsc#879425,bsc#1067317)- Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468)- Update to Xen 4.10.0-rc5 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - fate#323663 - Run Xenstore in stubdomain xenstore-run-in-studomain.patch- bsc#1067224 - xen-tools have hard dependency on Python 2 pygrub-python3-conversion.patch xenmon-python3-conversion.patch migration-python3-conversion.patch xnloader.py xen2libvirt.py- Remove xendriverdomain.service (bsc#1065185) Driver domains must be configured manually with custom .service file- Update to Xen 4.10.0-rc3 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - Drop 59f31268-libxc-remove-stale-error-check-for-domain-size.patch- Adjust xen-dom0-modules.service to ignore errors (bsc#1065187)- fate#324052 Support migration of Xen HVM domains larger than 1TB 59f31268-libxc-remove-stale-error-check-for-domain-size.patch- Update to Xen 4.10.0-rc2 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Update to Xen 4.10.0-rc1 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - Drop patches included in new tarball 592fd5f0-stop_machine-fill-result-only-in-case-of-error.patch 596f257e-x86-fix-hvmemul_insn_fetch.patch 5982fd99-VT-d-don-t-panic-warn-on-iommu-no-igfx.patch 598c3630-VT-d-PI-disable-when-CPU-side-PI-is-off.patch 598c3706-cpufreq-only-stop-ondemand-governor-if-started.patch 5992f1e5-x86-grant-disallow-misaligned-PTEs.patch 5992f20d-gnttab-split-maptrack-lock-to-make-it-useful-again.patch 5992f233-gnttab-correct-pin-status-fixup-for-copy.patch 59958e76-gnttab-dont-use-possibly-unbounded-tail-calls.patch 59958ebf-gnttab-fix-transitive-grant-handling.patch 59958edd-gnttab-avoid-spurious-maptrack-handle-alloc-failures.patch 599da329-arm-mm-release-grant-lock-on-xatp1-error-paths.patch 59a01223-x86-check-for-alloc-errors-in-modify_xen_mappings.patch 59a0130c-x86-efi-dont-write-relocs-in-efi_arch_relocate_image-1st-pass.patch 59a9221f-VT-d-use-correct-BDF-for-VF-to-search-VT-d-unit.patch 59ae9177-x86-emul-fix-handling-of-unimplemented-Grp7-insns.patch 59aec335-x86emul-correct-VEX-W-handling-for-VPINSRD.patch 59aec375-x86emul-correct-VEX-L-handling-for-VCVTx2SI.patch 59afcea0-x86-introduce-and-use-setup_force_cpu_cap.patch 59b2a7f2-x86-HVM-correct-repeat-count-update-linear-phys.patch 59b7d664-mm-make-sure-node-is-less-than-MAX_NUMNODES.patch 59b7d69b-grant_table-fix-GNTTABOP_cache_flush-handling.patch 59b7d6c8-xenstore-dont-unlink-connection-object-twice.patch 59b7d6d9-gnttab-also-validate-PTE-perms-upon-destroy-replace.patch gcc7-arm.patch gcc7-mini-os.patch- bsc#1061084 - VUL-0: xen: page type reference leak on x86 (XSA-242) xsa242.patch - bsc#1061086 - VUL-0: xen: x86: Incorrect handling of self-linear shadow mappings with translated guests (XSA-243) xsa243.patch - bsc#1061087 - VUL-0: xen: x86: Incorrect handling of IST settings during CPU hotplug (XSA-244) xsa244.patch- bsc#1061077 - VUL-0: xen: DMOP map/unmap missing argument checks (XSA-238) xsa238.patch - bsc#1061080 - VUL-0: xen: hypervisor stack leak in x86 I/O intercept code (XSA-239) xsa239.patch - bsc#1061081 - VUL-0: xen: Unlimited recursion in linear pagetable de-typing (XSA-240) xsa240-1.patch xsa240-2.patch - bsc#1061082 - VUL-0: xen: Stale TLB entry due to page type release race (XSA-241) xsa241.patch- bsc#1061075 - VUL-0: xen: pin count / page reference race in grant table code (XSA-236) xsa236.patch - bsc#1061076 - VUL-0: xen: multiple MSI mapping issues on x86 (XSA-237) xsa237-1.patch xsa237-2.patch xsa237-3.patch xsa237-4.patch xsa237-5.patch- bsc#1056278 - VUL-0: xen: Missing NUMA node parameter verification (XSA-231) 59b7d664-mm-make-sure-node-is-less-than-MAX_NUMNODES.patch - bsc#1056280 - VUL-0: xen: Missing check for grant table (XSA-232) 59b7d69b-grant_table-fix-GNTTABOP_cache_flush-handling.patch - bsc#1056281 - VUL-0: xen: cxenstored: Race in domain cleanup (XSA-233) 59b7d6c8-xenstore-dont-unlink-connection-object-twice.patch - bsc#1056282 - VUL-0: xen: insufficient grant unmapping checks for x86 PV guests (XSA-234) 59b7d6d9-gnttab-also-validate-PTE-perms-upon-destroy-replace.patch - bsc#1055321 - VUL-0: xen: add-to-physmap error paths fail to release lock on ARM (XSA-235) 599da329-arm-mm-release-grant-lock-on-xatp1-error-paths.patch - Upstream patches from Jan (bsc#1027519) 59a01223-x86-check-for-alloc-errors-in-modify_xen_mappings.patch 59a0130c-x86-efi-dont-write-relocs-in-efi_arch_relocate_image-1st-pass.patch 59a9221f-VT-d-use-correct-BDF-for-VF-to-search-VT-d-unit.patch 59ae9177-x86-emul-fix-handling-of-unimplemented-Grp7-insns.patch 59aec335-x86emul-correct-VEX-W-handling-for-VPINSRD.patch 59aec375-x86emul-correct-VEX-L-handling-for-VCVTx2SI.patch 59afcea0-x86-introduce-and-use-setup_force_cpu_cap.patch 59b2a7f2-x86-HVM-correct-repeat-count-update-linear-phys.patch - Dropped gcc7-xen.patch- bsc#1057358 - Cannot Boot into SLES12.3 with Xen hypervisor when Secure Boot is Enabled xen.spec- bsc#1055695 - XEN: 11SP4 and 12SP3 HVM guests can not be restored update from v6 to v9 to cover more cases for ballooned domUs libxc.sr.superpage.patch- bsc#1026236 - remove suse_vtsc_tolerance= cmdline option for Xen drop the patch because it is not upstream acceptable remove xen.suse_vtsc_tolerance.patch- bsc#1055695 - XEN: 11SP4 and 12SP3 HVM guests can not be restored after the save using xl stack libxc.sr.superpage.patch- Unignore gcc-PIE the toolstack disables PIE for firmware builds as needed- Upstream patches from Jan (bsc#1027519) 592fd5f0-stop_machine-fill-result-only-in-case-of-error.patch 596f257e-x86-fix-hvmemul_insn_fetch.patch 5982fd99-VT-d-don-t-panic-warn-on-iommu-no-igfx.patch 598c3630-VT-d-PI-disable-when-CPU-side-PI-is-off.patch 598c3706-cpufreq-only-stop-ondemand-governor-if-started.patch 5992f1e5-x86-grant-disallow-misaligned-PTEs.patch (Replaces xsa227.patch) 5992f20d-gnttab-split-maptrack-lock-to-make-it-useful-again.patch (Replaces xsa228.patch) 5992f233-gnttab-correct-pin-status-fixup-for-copy.patch (Replaces xsa230.patch) 59958e76-gnttab-dont-use-possibly-unbounded-tail-calls.patch (Replaces xsa226-1.patch) 59958ebf-gnttab-fix-transitive-grant-handling.patch (Replaces xsa226-2.patch) 59958edd-gnttab-avoid-spurious-maptrack-handle-alloc-failures.patch- bsc#1044974 - xen-tools require python-pam xen.spec- Clean up spec file errors and a few warnings. (bsc#1027519) - Removed conditional 'with_systemd' and some old deprecated 'sles_version' checks. xen.spec- Remove use of brctl utiltiy from supportconfig plugin FATE#323639- Use upstream variant of mini-os __udivmoddi4 change gcc7-mini-os.patch- fate#323639 Move bridge-utils to legacy replace-obsolete-network-configuration-commands-in-s.patch- bsc#1052686 - VUL-0: xen: grant_table: possibly premature clearing of GTF_writing / GTF_reading (XSA-230) xsa230.patch- bsc#1035231 - migration of HVM domU does not use superpages on destination dom0 libxc.sr.superpage.patch- bsc#1051787 - VUL-0: CVE-2017-12135: xen: possibly unbounded recursion in grant table code (XSA-226) xsa226-1.patch xsa226-2.patch - bsc#1051788 - VUL-0: CVE-2017-12137: xen: x86: PV privilege escalation via map_grant_ref (XSA-227) xsa227.patch - bsc#1051789 - VUL-0: CVE-2017-12136: xen: grant_table: Race conditions with maptrack free list handling (XSA-228) xsa228.patch- Add a supportconfig plugin xen-supportconfig FATE#323661- bsc#1026236 - add suse_vtsc_tolerance= cmdline option for Xen To avoid emulation of TSC access from a domU after live migration add a global tolerance for the measured host kHz xen.suse_vtsc_tolerance.patch- fate#323662 Drop qemu-dm from xen-tools package The following tarball and patches have been removed qemu-xen-traditional-dir-remote.tar.bz2 VNC-Support-for-ExtendedKeyEvent-client-message.patch 0001-net-move-the-tap-buffer-into-TAPState.patch 0002-net-increase-tap-buffer-size.patch 0003-e1000-fix-access-4-bytes-beyond-buffer-end.patch 0004-e1000-secrc-support.patch 0005-e1000-multi-buffer-packet-support.patch 0006-e1000-clear-EOP-for-multi-buffer-descriptors.patch 0007-e1000-verify-we-have-buffers-upfront.patch 0008-e1000-check-buffer-availability.patch CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch CVE-2015-4037-qemut-smb-config-dir-name.patch CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch CVE-2016-7908-qemut-net-Infinite-loop-in-mcf_fec_do_tx.patch CVE-2016-7909-qemut-net-pcnet-infinite-loop-in-pcnet_rdra_addr.patch CVE-2016-8667-qemut-dma-rc4030-divide-by-zero-error-in-set_next_tick.patch CVE-2016-8669-qemut-char-divide-by-zero-error-in-serial_update_parameters.patch CVE-2016-8910-qemut-net-rtl8139-infinite-loop-while-transmit-in-Cplus-mode.patch CVE-2016-9921-qemut-display-cirrus_vga-divide-by-zero-in-cirrus_do_copy.patch CVE-2017-6505-qemut-usb-an-infinite-loop-issue-in-ohci_service_ed_list.patch CVE-2017-8309-qemut-audio-host-memory-leakage-via-capture-buffer.patch CVE-2017-9330-qemut-usb-ohci-infinite-loop-due-to-incorrect-return-value.patch blktap.patch cdrom-removable.patch xen-qemu-iscsi-fix.patch qemu-security-etch1.patch xen-disable-qemu-monitor.patch xen-hvm-default-bridge.patch qemu-ifup-set-mtu.patch ioemu-vnc-resize.patch capslock_enable.patch altgr_2.patch log-guest-console.patch bdrv_open2_fix_flags.patch bdrv_open2_flags_2.patch ioemu-7615-qcow2-fix-alloc_cluster_link_l2.patch qemu-dm-segfault.patch bdrv_default_rwflag.patch kernel-boot-hvm.patch ioemu-watchdog-support.patch ioemu-watchdog-linkage.patch ioemu-watchdog-ib700-timer.patch ioemu-hvm-pv-support.patch pvdrv_emulation_control.patch ioemu-disable-scsi.patch ioemu-disable-emulated-ide-if-pv.patch xenpaging.qemu.flush-cache.patch ioemu-devicemodel-include.patch - Cleanup spec file and remove unused KMP patches kmp_filelist supported_module.patch xen_pvonhvm.xen_emul_unplug.patch- bsc#1002573 - Optimize LVM functions in block-dmmd block-dmmd- Record initial Xen dmesg in /var/log/xen/xen-boot.log for supportconfig. Keep previous log in /var/log/xen/xen-boot.prev.log- Remove storytelling from description in xen.rpm- Update to Xen 4.9.0 FCS (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update block-dmmd script (bsc#1002573) block-dmmd- Update to Xen 4.9.0-rc8+ (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 gcc7-arm.patch - Drop gcc7-error-xenpmd.patch- Update to Xen 4.9.0-rc8 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1042160 - VUL-1: CVE-2017-9330: xen: usb: ohci: infinite loop due to incorrect return value CVE-2017-9330-qemut-usb-ohci-infinite-loop-due-to-incorrect-return-value.patch- bsc#1037243 - VUL-1: CVE-2017-8309: xen: audio: host memory leakage via capture buffer CVE-2017-8309-qemut-audio-host-memory-leakage-via-capture-buffer.patch- Update to Xen 4.9.0-rc7 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update to Xen 4.9.0-rc6 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1031343 - xen fails to build with GCC 7 gcc7-mini-os.patch gcc7-xen.patch- bsc#1031343 - xen fails to build with GCC 7 gcc7-error-xenpmd.patch- Update to Xen 4.9.0-rc5 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 - Drop xen-tools-pkgconfig-xenlight.patch- bsc#1037779 - xen breaks kexec-tools build xen-tools-pkgconfig-xenlight.patch- Update to Xen 4.9.0-rc4 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1036146 - sles12sp2 xen VM dumps core to wrong path xen.spec- Update to Xen 4.9.0-rc3 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 aarch64-maybe-uninitialized.patch- Update to Xen 4.9.0-rc2 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update to Xen 4.9.0-rc1 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 ioemu-devicemodel-include.patch - Dropped patches contained in new tarball xen-4.8.0-testing-src.tar.bz2 0001-xenstore-let-write_node-and-some-callers-return-errn.patch 0002-xenstore-undo-function-rename.patch 0003-xenstore-rework-of-transaction-handling.patch 584806ce-x86emul-correct-PUSHF-POPF.patch 584fc649-fix-determining-when-domain-creation-is-complete.patch 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch 58510cac-x86emul-MOVNTI-no-REP-prefixes.patch 58526ccc-x86emul-64bit-ignore-most-segment-bases-in-align-check.patch 5853ed37-VT-d-correct-dma_msi_set_affinity.patch 5853ee07-x86emul-CMPXCHG16B-aligned-operand.patch 58580060-x86-emul-correct-SYSCALL-eflags-handling.patch 585aa3c5-x86-force-EFLAGS-IF-on-upon-exit-to-PV.patch 585aa407-x86-HVM-NULL-check-before-using-VMFUNC-hook.patch 585bd5fe-x86-emul-correct-VMFUNC-return-value-handling.patch 586ba81c-x86-cpu-dont-update-this_cpu-for-guest-get_cpu_vendor.patch 587d04d6-x86-xstate-fix-array-overrun-with-LWP.patch 587de4a9-x86emul-VEX-B-ignored-in-compat-mode.patch 5882129d-x86emul-LOCK-check-adjustments.patch 58821300-x86-segment-attribute-handling.patch 58873c1f-x86emul-correct-FPU-stub-asm-constraints.patch 58873c80-x86-hvm-do-not-set-msr_tsc_adjust-on-.patch 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5887888f-credit2-never-consider-CPUs-outside-of-pool.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5888b1b3-x86-emulate-dont-assume-addr_size-32-implies-protmode.patch 5899cbd9-EPT-allow-wrcomb-MMIO-mappings-again.patch 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch 58a44771-IOMMU-always-call-teardown-callback.patch 58a48ccc-x86-fix-p2m_flush_table-for-non-nested.patch 58a59f4b-libxl-correct-xenstore-entry-for-empty-cdrom.patch 58a70d94-VMX-fix-VMCS-race-on-cswitch-paths.patch 58ac1f3f-VMX-dont-leak-host-syscall-MSRs.patch 58b5a2de-x86-correct-Xens-idea-of-its-memory-layout.patch 58b6fd42-credit2-always-mark-a-tickled-pCPU-as-tickled.patch 58b6fd42-credit2-dont-miss-accounting-during-credit-reset.patch 58cbf682-x86-EFI-avoid-overrunning-mb_modules.patch 58cf9200-x86-EFI-avoid-IOMMU-faults-on-tail-gap.patch 58cf9260-x86-EFI-avoid-Xen-when-looking-for-mod-kexec-pos.patch 58cf9277-x86-time-dont-use-vTSC-if-host-guest-freqs-match.patch 58d25ea2-xenstore-add-missing-checks-for-allocation-failure.patch 58d91365-sched-dont-call-wrong-hook-via-VCPU2OP.patch CVE-2017-2615-qemut-display-cirrus-oob-access-while-doing-bitblt-copy-backward-mode.patch CVE-2017-2620-xsa209-qemut-cirrus_bitblt_cputovideo-does-not-check-if-memory-region-safe.patch glibc-2.25-compatibility-fix.patch xs-09-add_change_node-params.patch xs-10-call-add_change_node.patch xs-11-tdb-record-header.patch xs-12-node-gen-count.patch xs-13-read-directory-part-support.patch xs-14-command-array.patch xs-15-command-return-val.patch xs-16-function-static.patch xs-17-arg-parsing.patch xs-18-default-buffer.patch xs-19-handle-alloc-failures.patch xs-20-tdb-version.patch xs-21-empty-tdb-database.patch xs-22-reopen_log-fix.patch xs-23-XS_DEBUG-rename.patch xs-24-xenstored_control.patch xs-25-control-enhance.patch xs-26-log-control.patch xs-27-memory-report.patch xs-28-remove-talloc-report.patch xs-29-define-off_t.patch xsa206-0001-xenstored-apply-a-write-transaction-rate-limit.patch xsa206-0002-xenstored-Log-when-the-write-transaction-rate-limit.patch- bsc#1022703 - Xen HVM guest with OVMF hangs with unattached CDRom 58a59f4b-libxl-correct-xenstore-entry-for-empty-cdrom.patch- bsc#1015348 - L3: libvirtd does not start during boot suse-xendomains-service.patch- bsc#1014136 - Partner-L3: kdump can't dump a kernel on SLES12-SP2 with Xen hypervisor. 58cf9260-x86-EFI-avoid-Xen-when-looking-for-mod-kexec-pos.patch - bsc#1026236 - L3: Paravirtualized vs. fully virtualized migration - latter one much faster 58cf9277-x86-time-dont-use-vTSC-if-host-guest-freqs-match.patch - Upstream patch from Jan 58cbf682-x86-EFI-avoid-overrunning-mb_modules.patch 58cf9200-x86-EFI-avoid-IOMMU-faults-on-tail-gap.patch 58d91365-sched-dont-call-wrong-hook-via-VCPU2OP.patch- bsc#1022555 - L3: Timeout in "execution of /etc/xen/scripts/block add" 58d25ea2-xenstore-add-missing-checks-for-allocation-failure.patch 0001-xenstore-let-write_node-and-some-callers-return-errn.patch 0002-xenstore-undo-function-rename.patch 0003-xenstore-rework-of-transaction-handling.patch - bsc#1030144 - VUL-0: xen: xenstore denial of service via repeated update (XSA-206) xsa206-0001-xenstored-apply-a-write-transaction-rate-limit.patch xsa206-0002-xenstored-Log-when-the-write-transaction-rate-limit.patch - bsc#1029827 - Forward port xenstored xs-09-add_change_node-params.patch xs-10-call-add_change_node.patch xs-11-tdb-record-header.patch xs-12-node-gen-count.patch xs-13-read-directory-part-support.patch xs-14-command-array.patch xs-15-command-return-val.patch xs-16-function-static.patch xs-17-arg-parsing.patch xs-18-default-buffer.patch xs-19-handle-alloc-failures.patch xs-20-tdb-version.patch xs-21-empty-tdb-database.patch xs-22-reopen_log-fix.patch xs-23-XS_DEBUG-rename.patch xs-24-xenstored_control.patch xs-25-control-enhance.patch xs-26-log-control.patch xs-27-memory-report.patch xs-28-remove-talloc-report.patch xs-29-define-off_t.patch- bsc#1029128 - fix make xen to really produce xen.efi with gcc48- bsc#1028235 - VUL-0: CVE-2017-6505: xen: qemu: usb: an infinite loop issue in ohci_service_ed_list CVE-2017-6505-qemut-usb-an-infinite-loop-issue-in-ohci_service_ed_list.patch - Upstream patches from Jan (bsc#1027519) 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5899cbd9-EPT-allow-wrcomb-MMIO-mappings-again.patch 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch 58a44771-IOMMU-always-call-teardown-callback.patch 58a48ccc-x86-fix-p2m_flush_table-for-non-nested.patch 58a70d94-VMX-fix-VMCS-race-on-cswitch-paths.patch 58ac1f3f-VMX-dont-leak-host-syscall-MSRs.patch 58b5a2de-x86-correct-Xens-idea-of-its-memory-layout.patch 58b6fd42-credit2-always-mark-a-tickled-pCPU-as-tickled.patch 58b6fd42-credit2-dont-miss-accounting-during-credit-reset.patch- bsc#1027654 - XEN fails to build against glibc 2.25 glibc-2.25-compatibility-fix.patch libxl.pvscsi.patch- fate#316613: Refresh and enable libxl.pvscsi.patch- bsc#1024834 - VUL-0: CVE-2017-2620: xen: cirrus_bitblt_cputovideo does not check if memory region is safe (XSA-209) CVE-2017-2620-xsa209-qemut-cirrus_bitblt_cputovideo-does-not-check-if-memory-region-safe.patch- bsc#1023948 - [pvusb][sles12sp3][openqa] Segmentation fault happened when adding usbctrl devices via xl 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch- Upstream patches from Jan (bsc#1027519) 587d04d6-x86-xstate-fix-array-overrun-with-LWP.patch 587de4a9-x86emul-VEX-B-ignored-in-compat-mode.patch 5882129d-x86emul-LOCK-check-adjustments.patch 58821300-x86-segment-attribute-handling.patch 58873c1f-x86emul-correct-FPU-stub-asm-constraints.patch 58873c80-x86-hvm-do-not-set-msr_tsc_adjust-on-.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5887888f-credit2-never-consider-CPUs-outside-of-pool.patch 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5888b1b3-x86-emulate-dont-assume-addr_size-32-implies-protmode.patch- bsc#1023004 - VUL-0: CVE-2017-2615: qemu: display: cirrus: oob access while doing bitblt copy backward mode CVE-2017-2615-qemut-display-cirrus-oob-access-while-doing-bitblt-copy-backward-mode.patch- fate#322313 and fate#322150 require the acpica package ported to aarch64 which Xen 4.8 needs to build. Temporarily disable aarch64 until these fates are complete. xen.spec- bsc#1021952 - Virutalization/xen: Bug xen-tools missing /usr/bin/domu-xenstore; guests fail to launch tmp_build.patch xen.spec- No systemd presets for 42.3+ and SLE12SP3+ (bsc#1012842)- bsc#1007224 - broken symlinks in /usr/share/doc/packages/xen/misc/ xen.spec- 585aa3c5-x86-force-EFLAGS-IF-on-upon-exit-to-PV.patch Replaces xsa202.patch (bsc#1014298) - 585aa407-x86-HVM-NULL-check-before-using-VMFUNC-hook.patch Replaces xsa203.patch (bsc#1014300) - 58580060-x86-emul-correct-SYSCALL-eflags-handling.patch Replaces xsa204.patch (bsc#1016340) - Upstream patches from Jan 58526ccc-x86emul-64bit-ignore-most-segment-bases-in-align-check.patch 5853ed37-VT-d-correct-dma_msi_set_affinity.patch 5853ee07-x86emul-CMPXCHG16B-aligned-operand.patch 585bd5fe-x86-emul-correct-VMFUNC-return-value-handling.patch 586ba81c-x86-cpu-dont-update-this_cpu-for-guest-get_cpu_vendor.patch- bsc#1015169 - VUL-0: CVE-2016-9921, CVE-2016-9922: xen: qemu: display: cirrus_vga: a divide by zero in cirrus_do_copy CVE-2016-9921-qemut-display-cirrus_vga-divide-by-zero-in-cirrus_do_copy.patch- bsc#1016340 - VUL-0: CVE-2016-10013: xen: x86: Mishandling of SYSCALL singlestep during emulation (XSA-204) xsa204.patch- bsc#1012651 - VUL-0: CVE-2016-9932: xen: x86 CMPXCHG8B emulation fails to ignore operand size override (XSA-200) 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch- bsc#1014298 - VUL-0: CVE-2016-10024: xen: x86 PV guests may be able to mask interrupts (XSA-202) xsa202.patch - bsc#1014300 - VUL-0: CVE-2016-10025: xen: x86: missing NULL pointer check in VMFUNC emulation (XSA-203) xsa203.patch - Upstream patches from Jan 584806ce-x86emul-correct-PUSHF-POPF.patch 584fc649-fix-determining-when-domain-creation-is-complete.patch 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch 58510cac-x86emul-MOVNTI-no-REP-prefixes.patch- Update to Xen 4.8 FCS xen-4.8.0-testing-src.tar.bz2 - Dropped xen-4.7.1-testing-src.tar.bz2 0001-libxc-Rework-extra-module-initialisation.patch 0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch 0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch 0004-firmware-makefile-install-BIOS-blob.patch 0005-libxl-Load-guest-BIOS-from-file.patch 0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch 0007-hvmloader-Grab-the-hvm_start_info-pointer.patch 0008-hvmloader-Locate-the-BIOS-blob.patch 0009-hvmloader-Check-modules-whereabouts-in-perform_tests.patch 0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch 0011-hvmloader-Load-OVMF-from-modules.patch 0012-hvmloader-Specific-bios_load-function-required.patch 0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch 0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch 57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch 576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 5769106e-x86-generate-assembler-equates-for-synthesized.patch 57a1e603-x86-time-adjust-local-system-time-initialization.patch 57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch 57a30261-x86-support-newer-Intel-CPU-models.patch 5810a9cc-x86-emul-Correct-decoding-of-SReg3-operands.patch 581b2c3b-x86-emul-reject-LGDT-LIDT-with-non-canonical-addresses.patch 581b647a-x86emul-L-S-G-I-DT-ignore-opsz-overrides-in-64-bit-mode.patch 58249392-x86-svm-dont-clobber-eax-edx-if-RDMSR-intercept-fails.patch 582c35d6-x86-vmx-correct-long-mode-check-in-vmx_cpuid_intercept.patch 582c35ee-x86-traps-dont-call-hvm_hypervisor_cpuid_leaf-for-PV.patch 58343dc2-x86-hvm-Fix-the-handling-of-non-present-segments.patch 58343df8-x86-HVM-dont-load-LDTR-with-VM86-mode-attrs-during-task-switch.patch 58343e24-x86-PV-writes-of-fs-and-gs-base-MSRs-require-canonical-addresses.patch 58343e9e-libelf-fix-stack-memory-leak-when-loading-32-bit-symbol-tables.patch 58343ec2-x86emul-fix-huge-bit-offset-handling.patch 58343f29-x86-emul-correct-the-IDT-entry-calculation-in-inject_swint.patch 58343f44-x86-svm-fix-injection-of-software-interrupts.patch 58343f79-pygrub-Properly-quote-results-when-returning-them-to-the-caller.patch CVE-2016-9381-xsa197-qemut.patch CVE-2016-9637-xsa199-qemut.patch- bsc#1011652 - VUL-0: xen: qemu ioport array overflow CVE-2016-9637-xsa199-qemut.patch- bsc#1009100 - VUL-0: CVE-2016-9386: XSA-191: xen: x86 null segments not always treated as unusable 58343dc2-x86-hvm-Fix-the-handling-of-non-present-segments.patch - bsc#1009103 - VUL-0: CVE-2016-9382: XSA-192: xen: x86 task switch to VM86 mode mis-handled 58343df8-x86-HVM-dont-load-LDTR-with-VM86-mode-attrs-during-task-switch.patch - bsc#1009104 - VUL-0: CVE-2016-9385: XSA-193: xen: x86 segment base write emulation lacking canonical address checks 58343e24-x86-PV-writes-of-fs-and-gs-base-MSRs-require-canonical-addresses.patch - bsc#1009105 - VUL-0: CVE-2016-9384: XSA-194: xen: guest 32-bit ELF symbol table load leaking host data 58343e9e-libelf-fix-stack-memory-leak-when-loading-32-bit-symbol-tables.patch - bsc#1009107 - VUL-0: CVE-2016-9383: XSA-195: xen: x86 64-bit bit test instruction emulation broken 58343ec2-x86emul-fix-huge-bit-offset-handling.patch - bsc#1009108 - VUL-0: CVE-2016-9377,CVE-2016-9378: XSA-196: xen: x86 software interrupt injection mis-handled 58343f29-x86-emul-correct-the-IDT-entry-calculation-in-inject_swint.patch 58343f44-x86-svm-fix-injection-of-software-interrupts.patch - bsc#1009109 - VUL-0: CVE-2016-9381: XSA-197: xen: qemu incautious about shared ring processing CVE-2016-9381-xsa197-qemut.patch - bsc#1009111 - VUL-0: CVE-2016-9379,CVE-2016-9380: XSA-198: xen: delimiter injection vulnerabilities in pygrub 58343f79-pygrub-Properly-quote-results-when-returning-them-to-the-caller.patch - Upstream patches from Jan 581b2c3b-x86-emul-reject-LGDT-LIDT-with-non-canonical-addresses.patch 581b647a-x86emul-L-S-G-I-DT-ignore-opsz-overrides-in-64-bit-mode.patch 58249392-x86-svm-dont-clobber-eax-edx-if-RDMSR-intercept-fails.patch 582c35d6-x86-vmx-correct-long-mode-check-in-vmx_cpuid_intercept.patch 582c35ee-x86-traps-dont-call-hvm_hypervisor_cpuid_leaf-for-PV.patch- Update to Xen Version 4.7.1 xen-4.7.1-testing-src.tar.bz2 - Dropped patches contained in new tarball xen-4.7.0-testing-src.tar.bz2 575e9ca0-nested-vmx-Validate-host-VMX-MSRs-before-accessing-them.patch 57640448-xen-sched-use-default-scheduler-upon-an-invalid-sched.patch 57973099-have-schedulers-revise-initial-placement.patch 579730e6-remove-buggy-initial-placement-algorithm.patch 57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch 57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch 57ac6316-don-t-restrict-DMA-heap-to-node-0.patch 57b71fc5-x86-EFI-don-t-apply-relocations-to-l-2-3-_bootmap.patch 57b7447b-dont-permit-guest-to-populate-PoD-pages-for-itself.patch 57c4412b-x86-HVM-add-guarding-logic-for-VMX-specific-code.patch 57c57f73-libxc-correct-max_pfn-calculation-for-saving-domain.patch 57c805bf-x86-levelling-restrict-non-architectural-OSXSAVE-handling.patch 57c805c1-x86-levelling-pass-vcpu-to-ctxt_switch_levelling.patch 57c805c3-x86-levelling-provide-architectural-OSXSAVE-handling.patch 57c82be2-x86-32on64-adjust-call-gate-emulation.patch 57c93e52-fix-error-in-libxl_device_usbdev_list.patch 57c96df3-credit1-fix-a-race-when-picking-initial-pCPU.patch 57c96e2c-x86-correct-PT_NOTE-file-position.patch 57cfed43-VMX-correct-feature-checks-for-MPX-and-XSAVES.patch 57d1563d-x86-32on64-don-t-allow-recursive-page-tables-from-L3.patch 57d15679-x86-emulate-Correct-boundary-interactions-of-emulated-insns.patch 57d1569a-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch 57d18642-hvm-fep-Allow-test-insns-crossing-1-0-boundary.patch 57d18642-x86-segment-Bounds-check-accesses-to-emulation-ctxt-seg_reg.patch 57d7ca5f-x86-domctl-fix-TOCTOU-race-in-XEN_DOMCTL_getvcpuextstate.patch 57d7ca64-x86-domctl-fix-migration-of-guests-not-using-xsave.patch 57da8883-credit1-fix-mask-to-be-used-for-tickling.patch 57da8883-credit2-properly-schedule-migration-of-running-vcpu.patch 57dfb1c5-x86-Intel-hide-CPUID-faulting-capability-from-guests.patch 57e93e1d-x86emul-correct-loading-of-ss.patch 57e93e4a-x86emul-don-t-allow-null-selector-for-LTR.patch 57e93e89-x86-AMD-apply-erratum-665-workaround.patch 57ee6cbc-credit1-return-time-remaining-to-limit-as-next-timeslice.patch 57f3a8ee-x86emul-honor-guest-CR0-TS-and-CR0-EM.patch 57fb6a91-x86-defer-not-present-segment-checks.patch 5800c51d-x86-hvm-Clobber-cs-L-when-LME-becomes-set.patch 5800caec-x86emul-fix-pushing-of-selector-registers.patch 5800cb06-x86-Viridian-don-t-depend-on-undefined-register-state.patch 580e29f9-x86-MISALIGNSSE-feature-depends-on-SSE.patch 57dfb2ff-x86-Intel-Broadwell-no-PKG_C8-10_RESIDENCY-MSRs.patch- bsc#1004981 - Xen RPM doesn't contain debug hypervisor for EFI systems xen.spec- bsc#1000106 - VUL-0: CVE-2016-7777: xen: CR0.TS and CR0.EM not always honored for x86 HVM guests (XSA-190) 57f3a8ee-x86emul-honor-guest-CR0-TS-and-CR0-EM.patch - bsc#996191 - [XEN][acpi]residency -n 88 -c will cause xen panic on broadwell-ep 57dfb2ff-x86-Intel-Broadwell-no-PKG_C8-10_RESIDENCY-MSRs.patch - Upstream patches from Jan 57d7ca5f-x86-domctl-fix-TOCTOU-race-in-XEN_DOMCTL_getvcpuextstate.patch 57d7ca64-x86-domctl-fix-migration-of-guests-not-using-xsave.patch 57da8883-credit1-fix-mask-to-be-used-for-tickling.patch 57da8883-credit2-properly-schedule-migration-of-running-vcpu.patch 57dfb1c5-x86-Intel-hide-CPUID-faulting-capability-from-guests.patch 57e93e1d-x86emul-correct-loading-of-ss.patch 57e93e4a-x86emul-don-t-allow-null-selector-for-LTR.patch 57e93e89-x86-AMD-apply-erratum-665-workaround.patch 57ee6cbc-credit1-return-time-remaining-to-limit-as-next-timeslice.patch 57fb6a91-x86-defer-not-present-segment-checks.patch 5800c51d-x86-hvm-Clobber-cs-L-when-LME-becomes-set.patch 5800caec-x86emul-fix-pushing-of-selector-registers.patch 5800cb06-x86-Viridian-don-t-depend-on-undefined-register-state.patch 580e29f9-x86-MISALIGNSSE-feature-depends-on-SSE.patch 5810a9cc-x86-emul-Correct-decoding-of-SReg3-operands.patch- bsc#1007941 - Xen tools limit the number of vcpus to 256 when the system has 384 xen-arch-kconfig-nr_cpus.patch- bsc#1007157 - VUL-0: CVE-2016-8910: xen: net: rtl8139: infinite loop while transmit in C+ mode CVE-2016-8910-qemut-net-rtl8139-infinite-loop-while-transmit-in-Cplus-mode.patch- bsc#1005004 - CVE-2016-8667: xen: dma: rc4030 divide by zero error in set_next_tick CVE-2016-8667-qemut-dma-rc4030-divide-by-zero-error-in-set_next_tick.patch - bsc#1005005 - VUL-0: CVE-2016-8669: xen: char: divide by zero error in serial_update_parameters CVE-2016-8669-qemut-char-divide-by-zero-error-in-serial_update_parameters.patch- bsc#1003030 - VUL-0: CVE-2016-7908: xen: net: Infinite loop in mcf_fec_do_tx CVE-2016-7908-qemut-net-Infinite-loop-in-mcf_fec_do_tx.patch - bsc#1003032 - VUL-0: CVE-2016-7909: xen: net: pcnet: infinite loop in pcnet_rdra_addr CVE-2016-7909-qemut-net-pcnet-infinite-loop-in-pcnet_rdra_addr.patch- bsc#995785 - VUL-0: CVE-2016-7092: xen: x86: Disallow L3 recursive pagetable for 32-bit PV guests (XSA-185) 57d1563d-x86-32on64-don-t-allow-recursive-page-tables-from-L3.patch - bsc#995789 - VUL-0: CVE-2016-7093: xen: x86: Mishandling of instruction pointer truncation during emulation (XSA-186) 57d15679-x86-emulate-Correct-boundary-interactions-of-emulated-insns.patch 57d18642-hvm-fep-Allow-test-insns-crossing-1-0-boundary.patch - bsc#995792 - VUL-0: CVE-2016-7094: xen: x86 HVM: Overflow of sh_ctxt->seg_reg[] (XSA-187) 57d1569a-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch 57d18642-x86-segment-Bounds-check-accesses-to-emulation-ctxt-seg_reg.patch - bsc#991934 - xen hypervisor crash in csched_acct 57c96df3-credit1-fix-a-race-when-picking-initial-pCPU.patch - Upstream patches from Jan 57c4412b-x86-HVM-add-guarding-logic-for-VMX-specific-code.patch 57c57f73-libxc-correct-max_pfn-calculation-for-saving-domain.patch 57c805bf-x86-levelling-restrict-non-architectural-OSXSAVE-handling.patch 57c805c1-x86-levelling-pass-vcpu-to-ctxt_switch_levelling.patch 57c805c3-x86-levelling-provide-architectural-OSXSAVE-handling.patch 57c82be2-x86-32on64-adjust-call-gate-emulation.patch 57c96e2c-x86-correct-PT_NOTE-file-position.patch 57cfed43-VMX-correct-feature-checks-for-MPX-and-XSAVES.patch- bsc#979002 - add 60-persistent-xvd.rules and helper script also to initrd, add the relevant dracut helper- bnc#953518 - unplug also SCSI disks in qemu-xen-traditional for upstream unplug protocol- bsc#989679 - [pvusb feature] USB device not found when 'virsh detach-device guest usb.xml' 57c93e52-fix-error-in-libxl_device_usbdev_list.patch- bsc#992224 - [HPS Bug] During boot of Xen Hypervisor, Failed to get contiguous memory for DMA from Xen 57ac6316-don-t-restrict-DMA-heap-to-node-0.patch - bsc#978755 - xen uefi systems fail to boot - bsc#983697 - SLES12 SP2 Xen UEFI mode cannot boot 57b71fc5-x86-EFI-don-t-apply-relocations-to-l-2-3-_bootmap.patch - Upstream patch from Jan 57b7447b-dont-permit-guest-to-populate-PoD-pages-for-itself.patch- spec: to stay compatible with the in-tree qemu-xen binary, use /usr/bin/qemu-system-i386 instead of /usr/bin/qemu-system-x86_64 bsc#986164- bsc#970135 - new virtualization project clock test randomly fails on Xen 576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 5769106e-x86-generate-assembler-equates-for-synthesized.patch 57a1e603-x86-time-adjust-local-system-time-initialization.patch 57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch - bsc#991934 - xen hypervisor crash in csched_acct 57973099-have-schedulers-revise-initial-placement.patch 579730e6-remove-buggy-initial-placement-algorithm.patch - bsc#988675 - VUL-0: CVE-2016-6258: xen: x86: Privilege escalation in PV guests (XSA-182) 57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch - bsc#988676 - VUL-0: CVE-2016-6259: xen: x86: Missing SMAP whitelisting in 32-bit exception / event delivery (XSA-183) 57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch - Upstream patches from Jan 57a30261-x86-support-newer-Intel-CPU-models.patch- bsc#985503 - vif-route broken vif-route.patch- bsc#978413 - PV guest upgrade from sles11sp4 to sles12sp2 alpha3 failed on sles11sp4 xen host. pygrub-handle-one-line-menu-entries.patch- bsc#990843 - VUL-1: CVE-2016-6351: xen: qemu: scsi: esp: OOB write access in esp_do_dma CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch- bsc#900418 - Dump cannot be performed on SLES12 XEN 57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch - Upstream patches from Jan 575e9ca0-nested-vmx-Validate-host-VMX-MSRs-before-accessing-them.patch 57640448-xen-sched-use-default-scheduler-upon-an-invalid-sched.patch- fate#319989 - Update to Xen 4.7 FCS xen-4.7.0-testing-src.tar.bz2 - Drop CVE-2014-3672-qemut-xsa180.patch- bsc#954872 - script block-dmmd not working as expected - libxl: error: libxl_dm.c (Additional fixes) block-dmmd- Convert with_stubdom into build_conditional to allow adjusting via prjconf - Convert with_debug into build_conditional to allow adjusting via prjconf- bsc#979002 - add 60-persistent-xvd.rules and helper script to xen-tools-domU to simplify transition to pvops based kernels- Convert with_oxenstored into build_conditional to allow adjusting via prjconf (fate#320836)- bsc#983984 - VUL-0: CVE-2016-5338: xen: qemu: scsi: esp: OOB r/w access while processing ESP_FIFO CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch - bsc#982960 - VUL-0: CVE-2016-5238: xen: qemu: scsi: esp: OOB write when using non-DMA mode in get_cmd CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch- fate#319989 - Update to Xen 4.7 RC5 xen-4.7.0-testing-src.tar.bz2- fate#319989 - Update to Xen 4.7 RC4 xen-4.7.0-testing-src.tar.bz2 - Dropped xen.pkgconfig-4.7.patch xsa164.patch- bsc#981264 - VUL-0: CVE-2014-3672: xen: Unrestricted qemu logging (XSA-180) CVE-2014-3672-qemut-xsa180.patch- bsc#980724 - VUL-0: CVE-2016-4441: Qemu: scsi: esp: OOB write while writing to 's->cmdbuf' in get_cmd CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch - bsc#980716 - VUL-0: CVE-2016-4439: xen: scsi: esp: OOB write while writing to 's->cmdbuf' in esp_reg_write CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch- fate#319989 - Update to Xen 4.7 RC3 xen-4.7.0-testing-src.tar.bz2 - Dropped libxl-remove-cdrom-cachemode.patch x86-PoD-only-reclaim-if-needed.patch gcc6-warnings-as-errors.patch- bsc#954872 - script block-dmmd not working as expected - libxl: error: libxl_dm.c (another modification) block-dmmd- fate#319989 - Update to Xen 4.7 RC2 xen-4.7.0-testing-src.tar.bz2- bsc#961600 - L3: poor performance when Xen HVM domU configured with max memory > current memory x86-PoD-only-reclaim-if-needed.patch- Mark SONAMEs and pkgconfig as xen 4.7 xen.pkgconfig-4.7.patch- bsc#977329 - Xen: Cannot boot HVM guests with empty cdrom libxl-remove-cdrom-cachemode.patch- fate#319989 - Update to Xen 4.7 RC1 xen-4.7.0-testing-src.tar.bz2- fate#316614: set migration constraints from cmdline restore libxl.set-migration-constraints-from-cmdline.patch- Remove obsolete patch for xen-kmp magic_ioport_compat.patch- fate#316613: update to v12 libxl.pvscsi.patch- Update to the latest Xen 4.7 pre-release c2994f86 Drop libxl.migrate-legacy-stream-read.patch- bnc#972756 - Can't migrate HVM guest from SLES12SP1 Xen host to SLES12SP2 Alpha 1 host using xl migrate libxl.migrate-legacy-stream-read.patch- Add patches from proposed upstream series to load BIOS's from the toolstack instead of embedding in hvmloader http://lists.xenproject.org/archives/html/xen-devel/2016-03/msg01626.html 0001-libxc-Rework-extra-module-initialisation.patch, 0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch, 0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch, 0004-firmware-makefile-install-BIOS-blob.patch, 0005-libxl-Load-guest-BIOS-from-file.patch, 0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch, 0007-hvmloader-Grab-the-hvm_start_info-pointer.patch, 0008-hvmloader-Locate-the-BIOS-blob.patch, 0009-hvmloader-Check-modules-whereabouts-in-perform_tests.patch, 0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch, 0011-hvmloader-Load-OVMF-from-modules.patch, 0012-hvmloader-Specific-bios_load-function-required.patch, 0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch, 0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch - Enable support for UEFI on x86_64 using the ovmf-x86_64-ms.bin firmware from qemu-ovmf-x86_64. The firmware is preloaded with Microsoft keys to more closely resemble firmware on real hardware FATE#320490- fate#319989: Update to Xen 4.7 (pre-release) xen-4.7.0-testing-src.tar.bz2 - Dropped: xen-4.6.1-testing-src.tar.bz2 55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch 5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch hotplug-Linux-block-performance-fix.patch set-mtu-from-bridge-for-tap-interface.patch xendomains-libvirtd-conflict.patch xsa154.patch xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa170.patch- Use system SeaBIOS instead of building/installing another one FATE#320638 Dropped files: seabios-dir-remote.tar.bz2 xen-c99-fix.patch xen.build-compare.seabios.patch- spec: drop BuildRequires that were only needed for qemu-xen- bsc#969377 - xen does not build with GCC 6 ipxe-use-rpm-opt-flags.patch gcc6-warnings-as-errors.patch- bsc#969351 - VUL-0: CVE-2016-2841: xen: net: ne2000: infinite loop in ne2000_receive CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch - Drop xsa154-fix.patch- Use system qemu instead of building/installing yet another qemu FATE#320638 - Dropped files qemu-xen-dir-remote.tar.bz2 CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch CVE-2015-4037-qemuu-smb-config-dir-name.patch CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch qemu-xen-enable-spice-support.patch qemu-xen-upstream-qdisk-cache-unsafe.patch tigervnc-long-press.patch xsa162-qemuu.patch- bsc#962321 - VUL-0: CVE-2016-1922: xen: i386: null pointer dereference in vapic_write() CVE-2016-1922-qemuu-i386-null-pointer-dereference-in-vapic_write.patch- bsc#968004 - VUL-0: CVE-2016-2538: xen: usb: integer overflow in remote NDIS control message handling CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch- bsc#954872 - L3: script block-dmmd not working as expected - libxl: error: libxl_dm.c block-dmmd - Update libxl to recognize dmmd and npiv prefix in disk spec xen.libxl.dmmd.patch- bsc#967101 - VUL-0: CVE-2016-2391: xen: usb: multiple eof_timers in ohci module leads to null pointer dereference CVE-2016-2391-qemuu-usb-null-pointer-dereference-in-ohci-module.patch CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch - bsc#967090 - VUL-0: CVE-2016-2392: xen: usb: null pointer dereference in remote NDIS control message handling CVE-2016-2392-qemuu-usb-null-pointer-dereference-in-NDIS-message-handling.patch- Update to Xen Version 4.6.1 xen-4.6.1-testing-src.tar.bz2 - Dropped patches now contained in tarball or unnecessary xen-4.6.0-testing-src.tar.bz2 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 5632129c-free-domain-s-vcpu-array.patch 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 563212e4-xenoprof-free-domain-s-vcpu-array.patch 563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch 56549f24-x86-vPMU-document-as-unsupported.patch 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch xsa155-qemut-qdisk-double-access.patch xsa155-qemut-xenfb.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa159.patch xsa160.patch xsa162-qemut.patch xsa165.patch xsa166.patch xsa167.patch xsa168.patch- bsc#965315 - VUL-0: CVE-2016-2270: xen: x86: inconsistent cachability flags on guest mappings (XSA-154) xsa154.patch - bsc#965317 - VUL-0: CVE-2016-2271: xen: VMX: guest user mode may crash guest with non-canonical RIP (XSA-170) xsa170.patch- bsc#965269 - VUL-1: CVE-2015-8619: xen: stack based OOB write in hmp_sendkey routine CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch- bsc#965156 - VUL-0: CVE-2015-6855: xen: ide: divide by zero issue CVE-2015-6855-qemuu-ide-divide-by-zero-issue.patch - bsc#965112 - VUL-0: CVE-2014-3640: xen: slirp: NULL pointer deref in sosendto() CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch- bsc#964947 - VUL-0: CVE-2015-5278: xen: Infinite loop in ne2000_receive() function CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch - bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch- bsc#964644 - VUL-0: CVE-2013-4533: xen pxa2xx: buffer overrun on incoming migration CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch - bsc#964925 - VUL-0: CVE-2014-0222: xen: qcow1: validate L2 table size to avoid integer overflows CVE-2014-0222-blktap-qcow1-validate-l2-table-size.patch - Dropped CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch- bsc#964415 - VUL-1: CVE-2016-2198: xen: usb: ehci null pointer dereference in ehci_caps_write CVE-2016-2198-qemuu-usb-ehci-null-pointer-dereference-in-ehci_caps_write.patch - bsc#964452 - VUL-0: CVE-2013-4534: xen: openpic: buffer overrun on incoming migration CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch- bsc#963783 - VUL-1: CVE-2016-1981: xen: net: e1000 infinite loop in start_xmit and e1000_receive_iov routines CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch- bsc#962758 - VUL-0: CVE-2013-4539: xen: tsc210x: buffer overrun on invalid state load CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch- bsc#962632 - VUL-0: CVE-2015-1779: xen: vnc: insufficient resource limiting in VNC websockets decoder CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch - bsc#962642 - VUL-0: CVE-2013-4537: xen: ssi-sd: buffer overrun on invalid state load CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch - bsc#962627 - VUL-0: CVE-2014-7815: xen: vnc: insufficient bits_per_pixel from the client sanitization CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch- bsc#962335 - VUL-0: CVE-2013-4538: xen: ssd0323: fix buffer overun on invalid state CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch - bsc#962360 - VUL-0: CVE-2015-7512: xen: net: pcnet: buffer overflow in non-loopback mode CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch- bsc#961692 - VUL-0: CVE-2016-1714: xen: nvram: OOB r/w access in processing firmware configurations CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch- bsc#961358 - VUL-0: CVE-2015-8613: xen: qemu: scsi: stack based buffer overflow in megasas_ctrl_get_info CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch - bsc#961332 - VUL-0: CVE-2016-1568: xen: Qemu: ide: ahci use-after-free vulnerability in aio port commands CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch- bsc#959695 - missing docs for xen xen.spec- bsc#960862 - VUL-0: CVE-2016-1571: xen: VMX: intercept issue with INVLPG on non-canonical address (XSA-168) xsa168.patch - bsc#960861 - VUL-0: CVE-2016-1570: xen: PV superpage functionality missing sanity checks (XSA-167) xsa167.patch - bsc#960836 - VUL-0: CVE-2015-8744: xen: net: vmxnet3: incorrect l2 header validation leads to a crash via assert(2) call CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch- bsc#960707 - VUL-0: CVE-2015-8745: xen: reading IMR registers leads to a crash via assert(2) call CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch - bsc#960726 - VUL-0: CVE-2015-8743: xen: ne2000: OOB memory access in ioport r/w functions CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch- bsc#960093 - VUL-0: CVE-2015-8615: xen: x86: unintentional logging upon guest changing callback method (XSA-169) 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch- Adjust xen-dom0-modules.service to run Before xenstored.service instead of proc-xen.mount to workaround a bug in systemd "design" (bnc#959845)- bsc#959387 - VUL-0: CVE-2015-8568 CVE-2015-8567: xen: qemu: net: vmxnet3: host memory leakage CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch- bsc#957988 - VUL-0: CVE-2015-8550: xen: paravirtualized drivers incautious about shared memory contents (XSA-155) xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemut-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa155-qemut-xenfb.patch - bsc#959006 - VUL-0: CVE-2015-8558: xen: qemu: usb: infinite loop in ehci_advance_state results in DoS CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch - bsc#958918 - VUL-0: CVE-2015-7549: xen: qemu pci: null pointer dereference issue CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch - bsc#958493 - VUL-0: CVE-2015-8504: xen: qemu: ui: vnc: avoid floating point exception CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch - bsc#958007 - VUL-0: CVE-2015-8554: xen: qemu-dm buffer overrun in MSI-X handling (XSA-164) xsa164.patch - bsc#958009 - VUL-0: CVE-2015-8555: xen: information leak in legacy x86 FPU/XMM initialization (XSA-165) xsa165.patch - bsc#958523 - VUL-0: xen: ioreq handling possibly susceptible to multiple read issue (XSA-166) xsa166.patch- bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch - Upstream patches from Jan 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch) 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 56544a57-VMX-fix-adjust-trap-injection.patch 56546ab2-sched-fix-insert_vcpu-locking.patch- bsc#956592 - VUL-0: xen: virtual PMU is unsupported (XSA-163) 56549f24-x86-vPMU-document-as-unsupported.patch - bsc#956408 - VUL-0: CVE-2015-8339, CVE-2015-8340: xen: XENMEM_exchange error handling issues (XSA-159) xsa159.patch - bsc#956409 - VUL-0: CVE-2015-8341: xen: libxl leak of pv kernel and initrd on error (XSA-160) xsa160.patch - bsc#956411 - VUL-0: CVE-2015-7504: xen: heap buffer overflow vulnerability in pcnet emulator (XSA-162) xsa162-qemuu.patch xsa162-qemut.patch - bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142) 5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch- fate#315712: XEN: Use the PVOPS kernel Turn off building the KMPs now that we are using the pvops kernel xen.spec- Upstream patches from Jan 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 5632129c-free-domain-s-vcpu-array.patch (Replaces CVE-2015-7969-xsa149.patch) 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 563212e4-xenoprof-free-domain-s-vcpu-array.patch 563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch) 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch - Dropped 55b0a2db-x86-MSI-track-guest-masking.patch- Use upstream variants of block-iscsi and block-nbd- Remove xenalyze.hg, its part of xen-4.6- Update to Xen Version 4.6.0 xen-4.6.0-testing-src.tar.bz2 mini-os.tar.bz2 blktap2-no-uninit.patch stubdom-have-iovec.patch - Renamed xsa149.patch to CVE-2015-7969-xsa149.patch - Dropped patches now contained in tarball or unnecessary xen-4.5.2-testing-src.tar.bz2 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch 54f4985f-libxl-fix-libvirtd-double-free.patch 55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 551ac326-xentop-add-support-for-qdisk.patch 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch 5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 554cc211-libxl-add-qxl.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch 5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch 5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch 5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch 5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch 5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch 5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch 55b0a218-x86-PCI-CFG-write-intercept.patch 55b0a255-x86-MSI-X-maskall.patch 55b0a283-x86-MSI-X-teardown.patch 55b0a2ab-x86-MSI-X-enable.patch blktapctrl-close-fifos.patch blktapctrl-default-to-ioemu.patch blktapctrl-disable-debug-printf.patch blktap-no-uninit.patch blktap-pv-cdrom.patch build-tapdisk-ioemu.patch ioemu-bdrv-open-CACHE_WB.patch ioemu-blktap-barriers.patch ioemu-blktap-fv-init.patch ioemu-blktap-image-format.patch ioemu-blktap-zero-size.patch libxl.set-migration-constraints-from-cmdline.patch local_attach_support_for_phy.patch pci-attach-fix.patch qemu-xen-upstream-megasas-buildtime.patch tapdisk-ioemu-logfile.patch tapdisk-ioemu-shutdown-fix.patch udev-rules.patch xen.build-compare.ipxe.patch xen.build-compare.mini-os.patch xen.build-compare.smbiosdate.patch xen.build-compare.vgabios.patch xen.build-compare.xen_compile_h.patch xl-coredump-file-location.patch- bsc#954405 - VUL-0: CVE-2015-8104: Xen: guest to host DoS by triggering an infinite loop in microcode via #DB exception - bsc#954018 - VUL-0: CVE-2015-5307: xen: x86: CPU lockup during fault delivery (XSA-156) CVE-2015-5307-xsa156.patch- Update to Xen 4.5.2 xen-4.5.2-testing-src.tar.bz2 - Drop the following xen-4.5.1-testing-src.tar.bz2 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 559bdde5-pull-in-latest-linux-earlycpio.patch 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch 560bd926-credit1-fix-tickling-when-it-happens-from-a-remote-pCPU.patch 560e6d34-x86-p2m-pt-tighten-conditions-of-IOMMU-mapping-updates.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch CVE-2015-4106-xsa131-9.patch CVE-2015-3259-xsa137.patch CVE-2015-7311-xsa142.patch CVE-2015-7835-xsa148.patch xsa139-qemuu.patch xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch xsa151.patch xsa152.patch xsa153-libxl.patch CVE-2015-5154-qemuu-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemuu-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch"- bsc#950704 - CVE-2015-7970 VUL-1: xen: x86: Long latency populate-on-demand operation is not preemptible (XSA-150) 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch- Upstream patches from Jan 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch- bsc#951845 - VUL-0: CVE-2015-7972: xen: x86: populate-on-demand balloon size inaccuracy can crash guests (XSA-153) xsa153-libxl.patch- bsc#950703 - VUL-1: CVE-2015-7969: xen: leak of main per-domain vcpu pointer array (DoS) (XSA-149) xsa149.patch - bsc#950705 - VUL-1: CVE-2015-7969: xen: x86: leak of per-domain profiling-related vcpu pointer array (DoS) (XSA-151) xsa151.patch - bsc#950706 - VUL-0: CVE-2015-7971: xen: x86: some pmu and profiling hypercalls log without rate limiting (XSA-152) xsa152.patch - Dropped 55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch 5604f239-x86-PV-properly-populate-descriptor-tables.patch- bsc#932267 - VUL-1: CVE-2015-4037: qemu,kvm,xen: insecure temporary file use in /net/slirp.c CVE-2015-4037-qemuu-smb-config-dir-name.patch CVE-2015-4037-qemut-smb-config-dir-name.patch - bsc#877642 - VUL-0: CVE-2014-0222: qemu: qcow1: validate L2 table size to avoid integer overflows CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch- bsc#950367 - VUL-0: CVE-2015-7835: xen: x86: Uncontrolled creation of large page mappings by PV guests (XSA-148) CVE-2015-7835-xsa148.patch- bsc#949138 - Setting vcpu affinity under Xen causes libvirtd abort 54f4985f-libxl-fix-libvirtd-double-free.patch- bsc#949046 - Increase %suse_version in SP1 to 1316 xen.spec - Update README.SUSE detailing dom0 ballooning recommendations- bsc#945167 - Running command ’ xl pci-assignable-add 03:10.1’ secondly show errors 55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch - Upstream patches from Jan 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f239-x86-PV-properly-populate-descriptor-tables.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch 560bd926-credit1-fix-tickling-when-it-happens-from-a-remote-pCPU.patch 560e6d34-x86-p2m-pt-tighten-conditions-of-IOMMU-mapping-updates.patch- bsc#941074 - VmError: Device 51728 (vbd) could not be connected. Hotplug scripts not working. hotplug-Linux-block-performance-fix.patch- bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142) CVE-2015-7311-xsa142.patch- bsc#945165 - Xl pci-attach show error with kernel of SLES 12 sp1 pci-attach-fix.patch- bsc#945164 - Xl destroy show error with kernel of SLES 12 sp1 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch- Upstream patches from Jan 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch- bsc#944463 - VUL-0: CVE-2015-5239: qemu-kvm: Integer overflow in vnc_client_read() and protocol_client_msg() CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch - bsc#944697 - VUL-1: CVE-2015-6815: qemu: net: e1000: infinite loop issue CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch- bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch- bsc#907514 - Bus fatal error & sles12 sudden reboot has been observed - bsc#910258 - SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984 - Bus fatal error & sles11-SP4 sudden reboot has been observed - bsc#923967 - Partner-L3: Bus fatal error & sles11-SP3 sudden reboot has been observed 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 55b0a218-x86-PCI-CFG-write-intercept.patch 55b0a255-x86-MSI-X-maskall.patch 55b0a283-x86-MSI-X-teardown.patch 55b0a2ab-x86-MSI-X-enable.patch 55b0a2db-x86-MSI-track-guest-masking.patch - Upstream patches from Jan 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch - Dropped for upstream version x86-MSI-mask.patch x86-MSI-pv-unmask.patch x86-MSI-X-enable.patch x86-MSI-X-maskall.patch x86-MSI-X-teardown.patch x86-pci_cfg_okay.patch x86-PCI-CFG-write-intercept.patch- bsc#939712 - VUL-0: XSA-140: QEMU leak of uninitialized heap memory in rtl8139 device model xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch - bsc#939709 - VUL-0: XSA-139: xen: Use after free in QEMU/Xen block unplug protocol xsa139-qemuu.patch- bsc#937371 - xen vm's running after reboot xendomains-libvirtd-conflict.patch- bsc#938344 - VUL-0: CVE-2015-5154: qemu,kvm,xen: host code execution via IDE subsystem CD-ROM CVE-2015-5154-qemuu-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemuu-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch- Remove xendomains.service from systemd preset file because it conflicts with libvirt-guests.service (bnc#937371) Its up to the admin to run systemctl enable xendomains.service- bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow CVE-2015-3259-xsa137.patch - Upstream patches from Jan 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bdde5-pull-in-latest-linux-earlycpio.patch - Upstream patches from Jan pending review 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch 5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch 5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch 5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch 5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch 5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch x86-MSI-pv-unmask.patch x86-pci_cfg_okay.patch x86-PCI-CFG-write-intercept.patch x86-MSI-X-maskall.patch x86-MSI-X-teardown.patch x86-MSI-X-enable.patch x86-MSI-mask.patch- Adjust more places to use br0 instead of xenbr0- bnc#936516 - xen fails to build with kernel update(4.1.0 from stable) 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch- Update to Xen Version 4.5.1 FCS (fate#315675) xen-4.5.1-testing-src.tar.bz2 - Dropped patches now contained in tarball 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch qemu-MSI-X-enable-maskall.patch qemu-MSI-X-latch-writes.patch x86-MSI-X-guest-mask.patch- Replace 5124efbe-add-qxl-support.patch with the variant that finally made it upstream, 554cc211-libxl-add-qxl.patch- bsc#931627 - VUL-0: CVE-2015-4105: XSA-130: xen: Guest triggerable qemu MSI-X pass-through error messages qemu-MSI-X-latch-writes.patch - bsc#907514 - Bus fatal error & sles12 sudden reboot has been observed - bsc#910258 - SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984 - Bus fatal error & sles11-SP4 sudden reboot has been observed - bsc#923967 - Partner-L3: Bus fatal error & sles11-SP3 sudden reboot has been observed x86-MSI-X-teardown.patch x86-MSI-X-enable.patch x86-MSI-X-guest-mask.patch x86-MSI-X-maskall.patch qemu-MSI-X-enable-maskall.patch - Upstream patches from Jan 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch - Dropped the following patches now contained in the tarball xen-no-array-bounds.patch CVE-2015-4103-xsa128.patch CVE-2015-4104-xsa129.patch CVE-2015-4105-xsa130.patch CVE-2015-4106-xsa131-1.patch CVE-2015-4106-xsa131-2.patch CVE-2015-4106-xsa131-3.patch CVE-2015-4106-xsa131-4.patch CVE-2015-4106-xsa131-5.patch CVE-2015-4106-xsa131-6.patch CVE-2015-4106-xsa131-7.patch CVE-2015-4106-xsa131-8.patch- Update to Xen 4.5.1 RC2 - bsc#931628 - VUL-0: CVE-2015-4106: XSA-131: xen: Unmediated PCI register access in qemu CVE-2015-4106-xsa131-1.patch CVE-2015-4106-xsa131-2.patch CVE-2015-4106-xsa131-3.patch CVE-2015-4106-xsa131-4.patch CVE-2015-4106-xsa131-5.patch CVE-2015-4106-xsa131-6.patch CVE-2015-4106-xsa131-7.patch CVE-2015-4106-xsa131-8.patch CVE-2015-4106-xsa131-9.patch - bsc#931627 - VUL-0: CVE-2015-4105: XSA-130: xen: Guest triggerable qemu MSI-X pass-through error messages CVE-2015-4105-xsa130.patch - bsc#931626 - VUL-0: CVE-2015-4104: XSA-129: xen: PCI MSI mask bits inadvertently exposed to guests CVE-2015-4104-xsa129.patch - bsc#931625 - VUL-0: CVE-2015-4103: XSA-128: xen: Potential unintended writes to host MSI message data field via qemu CVE-2015-4103-xsa128.patch - Upstream patches from Jan 5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch- Add DefaultDependencies=no to xen-dom0-modules.service because it has to run before proc-xen.mount- Update to Xen 4.5.1 RC1- Update blktap-no-uninit.patch to work with gcc-4.5- bsc#927967 - VUL-0: CVE-2015-3340: xen: Information leak through XEN_DOMCTL_gettscinfo (XSA-132) 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch- bnc#929339 - VUL-0: CVE-2015-3456: qemu kvm xen: VENOM qemu floppy driver host code execution CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch- bsc#928783 - Reboot failure; Request backport of upstream Xen patch to 4.5.0, or update pkgs to 4.5.1 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch- bnc#927750 - Avoid errors reported by system-modules-load.service- Add xen-no-array-bounds.patch and blktap-no-uninit.patch to selectively turn errors back to warnings to fix build with GCC 5. - Amend xen.stubdom.newlib.patch to pull in declaration of strcmp to avoid implicit-fortify-decl rpmlint error. - Fix quoting of __SMBIOS_DATE__ in xen.build-compare.smbiosdate.patch.- xentop: Fix memory leak on read failure 551ac326-xentop-add-support-for-qdisk.patch- Dropped xentop-add-support-for-qdisk.patch in favor of upstream version 551ac326-xentop-add-support-for-qdisk.patch- Enable spice support in qemu for x86_64 5124efbe-add-qxl-support.patch qemu-xen-enable-spice-support.patch- Add xen-c99-fix.patch to remove pointless inline specifier on function declarations which break build with a C99 compiler which GCC 5 is by default. (bsc#921994) - Add ipxe-no-error-logical-not-parentheses.patch to supply - Wno-logical-not-parentheses to the ipxe build to fix breakage with GCC 5. (bsc#921994)- bnc#921842 - Xentop doesn't display disk statistics for VMs using qdisks xentop-add-support-for-qdisk.patch- Disable the PIE enablement done for Factory, as the XEN code is not buildable with PIE and it does not make much sense to build the hypervisor code with it.- bnc#918169 - XEN fixes required to work with Kernel 3.19.0 xen.spec- Package xen.changes because its referenced in xen.spec- Update seabios to rel-1.7.5 which is the correct version for Xen 4.5- Update to Xen 4.5.0 FCS- Include systemd presets in 13.2 and older- bnc#897352 - Enable xencommons/xendomains only during fresh install - disable restart on upgrade because the toolstack is not restartable- adjust seabios, vgabios, stubdom and hvmloader build to reduce build-compare noise xen.build-compare.mini-os.patch xen.build-compare.smbiosdate.patch xen.build-compare.ipxe.patch xen.build-compare.vgabios.patch xen.build-compare.seabios.patch xen.build-compare.man.patch- Update to Xen 4.5.0 RC4- Remove xend specific if-up scripts Recording bridge slaves is a generic task which should be handled by generic network code- Use systemd features from upstream requires updated systemd-presets-branding package- Update to Xen 4.5.0 RC3- Set GIT, WGET and FTP to /bin/false- Use new configure features instead of make variables xen.stubdom.newlib.patch- adjust docs and xen build to reduce build-compare noise xen.build-compare.doc_html.patch xen.build-compare.xen_compile_h.patch- Drop trailing B_CNT from XEN_EXTRAVERSION to reduce build-compare noise- Update to Xen 4.5.0 RC2- Update to Xen 4.5.0 RC1 xen-4.5.0-testing-src.tar.bz2 - Remove all patches now contained in the new tarball xen-4.4.1-testing-src.tar.bz2 5315a3bb-x86-don-t-propagate-acpi_skip_timer_override-do-Dom0.patch 5315a43a-x86-ACPI-also-print-address-space-for-PM1x-fields.patch 53299d8f-xenconsole-reset-tty-on-failure.patch 53299d8f-xenconsole-tolerate-tty-errors.patch 5346a7a0-x86-AMD-support-further-feature-masking-MSRs.patch 53563ea4-x86-MSI-drop-workaround-for-insecure-Dom0-kernels.patch 537c9c77-libxc-check-return-values-on-mmap-and-madvise.patch 537cd0b0-hvmloader-also-cover-PCI-MMIO-ranges-above-4G-with-UC-MTRR-ranges.patch 537cd0cc-hvmloader-PA-range-0xfc000000-0xffffffff-should-be-UC.patch 539ebe62-x86-EFI-improve-boot-time-diagnostics.patch 53aac342-x86-HVM-consolidate-and-sanitize-CR4-guest-reserved-bit-determination.patch 53c9151b-Fix-xl-vncviewer-accesses-port-0-by-any-invalid-domid.patch 53d124e7-fix-list_domain_details-check-config-data-length-0.patch 53dba447-x86-ACPI-allow-CMOS-RTC-use-even-when-ACPI-says-there-is-none.patch 53df727b-x86-HVM-extend-LAPIC-shortcuts-around-P2M-lookups.patch 53e8be5f-x86-vHPET-use-rwlock-instead-of-simple-one.patch 53f737b1-VMX-fix-DebugCtl-MSR-clearing.patch 53f7386d-x86-irq-process-softirqs-in-irq-keyhandlers.patch 53fcebab-xen-pass-kernel-initrd-to-qemu.patch 53ff3659-x86-consolidate-boolean-inputs-in-hvm-and-p2m.patch 53ff36ae-x86-hvm-treat-non-insn-fetch-NPF-also-as-read-violations.patch 53ff36d5-x86-mem_event-deliver-gla-fault-EPT-violation-information.patch 53ff3716-x86-ats-Disable-Address-Translation-Services-by-default.patch 53ff3899-x86-NMI-allow-processing-unknown-NMIs-with-watchdog.patch 54005472-EPT-utilize-GLA-GPA-translation-known-for-certain-faults.patch 540effe6-evtchn-check-control-block-exists-when-using-FIFO-based-events.patch 540f2624-x86-idle-add-barriers-to-CLFLUSH-workaround.patch 541825dc-VMX-don-t-leave-x2APIC-MSR-intercepts-disabled.patch 541ad385-x86-suppress-event-check-IPI-to-MWAITing-CPUs.patch 541ad3ca-x86-HVM-batch-vCPU-wakeups.patch 541ad81a-VT-d-suppress-UR-signaling-for-further-desktop-chipsets.patch 54216833-x86-shadow-fix-race-when-sampling-dirty-vram-state.patch 54216882-x86-emulate-check-cpl-for-all-privileged-instructions.patch 542168ae-x86emul-only-emulate-swint-injection-for-real-mode.patch 54228a37-x86-EFI-fix-freeing-of-uninitialized-pointer.patch 5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch 5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch 542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch 542bf997-x86-HVM-properly-bound-x2APIC-MSR-range.patch 54325cc0-x86-MSI-fix-MSI-X-case-of-freeing-IRQ.patch 54325d2f-x86-restore-reserving-of-IO-APIC-pages-in-XENMEM_machine_memory_map-output.patch 54325d95-don-t-allow-Dom0-access-to-IOMMUs-MMIO-pages.patch 54325ecc-AMD-guest_iommu-properly-disable-guest-iommu-support.patch 54325f3c-x86-paging-make-log-dirty-operations-preemptible.patch 54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch CVE-2013-4540-qemu.patch qemu-support-xen-hvm-direct-kernel-boot.patch qemu-xen-upstream-blkif-discard.patch change-vnc-passwd.patch libxc-pass-errno-to-callers-of-xc_domain_save.patch libxl.honor-more-top-level-vfb-options.patch libxl.add-option-for-discard-support-to-xl-disk-conf.patch libxl.introduce-an-option-to-disable-the-non-O_DIRECT-workaround.patch x86-dom-print.patch x86-extra-trap-info.patch tmp_build.patch xl-check-for-libvirt-managed-domain.patch disable-wget-check.patch - Xend/xm is no longer supported and is not part of the upstream code. Remove all xend/xm specific patches, configs, and scripts xen-xmexample.patch bridge-opensuse.patch xmexample.disks xmclone.sh init.xend xend-relocation.sh xend.service xend-relocation-server.fw domUloader.py xmexample.domUloader xmexample.disks bridge-vlan.patch bridge-bonding.patch bridge-record-creation.patch network-nat-open-SuSEfirewall2-FORWARD.patch xend-set-migration-constraints-from-cmdline.patch xen.migrate.tools-xend_move_assert_to_exception_block.patch xend-pvscsi-recognize-also-SCSI-CDROM-devices.patch xend-config.patch xend-max-free-mem.patch xend-hvm-default-pae.patch xend-vif-route-ifup.patch xend-xenapi-console-protocol.patch xend-core-dump-loc.patch xend-xen-api-auth.patch xend-checkpoint-rename.patch xend-xm-save-check-file.patch xend-xm-create-xflag.patch xend-domu-usb-controller.patch xend-devid-or-name.patch xend-migration-domname-fix.patch xend-del_usb_xend_entry.patch xend-xen-domUloader.patch xend-multi-xvdp.patch xend-check_device_status.patch xend-change_home_server.patch xend-minimum-restart-time.patch xend-disable-internal-logrotate.patch xend-config-enable-dump-comment.patch xend-tools-watchdog-support.patch xend-console-port-restore.patch xend-vcpu-affinity-fix.patch xend-migration-bridge-check.patch xend-managed-pci-device.patch xend-hvm-firmware-passthrough.patch xend-cpuinfo-model-name.patch xend-xm-reboot-fix.patch xend-domain-lock.patch xend-domain-lock-sfex.patch xend-32on64-extra-mem.patch xend-hv_extid_compatibility.patch xend-xenpaging.autostart.patch xend-remove-xm-deprecation-warning.patch libxen_permissive.patch tmp-initscript-modprobe.patch init.xendomains xendomains.service xen-watchdog.service xen-updown.sh- bnc#901317 - L3: increase limit domUloader to 32MB domUloader.py- bnc#898772 - SLES 12 RC3 - XEN Host crashes when assigning non-VF device (SR-IOV) to guest 54325cc0-x86-MSI-fix-MSI-X-case-of-freeing-IRQ.patch - bnc#882089 - Windows 2012 R2 fails to boot up with greater than 60 vcpus 54325ecc-AMD-guest_iommu-properly-disable-guest-iommu-support.patch - bnc#826717 - VUL-0: CVE-2013-3495: XSA-59: xen: Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts 541ad81a-VT-d-suppress-UR-signaling-for-further-desktop-chipsets.patch - Upstream patches from Jan 540effe6-evtchn-check-control-block-exists-when-using-FIFO-based-events.patch (Replaces xsa107.patch) 54216833-x86-shadow-fix-race-when-sampling-dirty-vram-state.patch (Replaces xsa104.patch) 54216882-x86-emulate-check-cpl-for-all-privileged-instructions.patch (Replaces xsa105.patch) 542168ae-x86emul-only-emulate-swint-injection-for-real-mode.patch (Replaces xsa106.patch) 54228a37-x86-EFI-fix-freeing-of-uninitialized-pointer.patch 5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch 5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch 542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch 542bf997-x86-HVM-properly-bound-x2APIC-MSR-range.patch (Replaces xsa108.patch) 54325d2f-x86-restore-reserving-of-IO-APIC-pages-in-XENMEM_machine_memory_map-output.patch 54325d95-don-t-allow-Dom0-access-to-IOMMUs-MMIO-pages.patch 54325f3c-x86-paging-make-log-dirty-operations-preemptible.patch (Replaces xsa97.patch) 54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGH3AKDM4.13.1_10-lp152.2.12.14.13.1_10-lp152.2.12.1  xenhtmlhypercallarmindex.htmlindex.htmlx86_32index.htmlx86_64index.htmlindex.htmlmanindex.htmlxen-pci-device-reservations.7.htmlxen-pv-channel.7.htmlxen-tscmode.7.htmlxen-vtpm.7.htmlxen-vtpmmgr.7.htmlxenstore-chmod.1.htmlxenstore-ls.1.htmlxenstore-read.1.htmlxenstore-write.1.htmlxenstore.1.htmlxentop.1.htmlxentrace.8.htmlxentrace_format.1.htmlxl-disk-configuration.5.htmlxl-network-configuration.5.htmlxl-numa-placement.7.htmlxl.1.htmlxl.cfg.5.htmlxl.conf.5.htmlxlcpupool.cfg.5.htmlmiscamd-ucode-container.txtarmbig.LITTLE.txtbooting.txtdevice-treeacpi.txtbooting.txtguest.txtindex.htmlpassthrough.txtearly-printk.txtindex.htmlpassthrough.txtsilicon-errata.txtblock-scripts.txtconsole.txtcrashdb.txtdistro_mapping.txtdump-core-format.txtgrant-tables.txtindex.htmlkconfig-language.txtkconfig.txtkexec_and_kdump.txtlibxl_memory.txtprintk-formats.txtqemu-backends.txtstubdom.txtvtd-pi.txtvtd.txtvtpm-platforms.txtxen-error-handling.txtxenmon.txtxenpaging.txtxenstore-ring.txtxenstore.txtxsm-flask.txtmisccrashdb.txtvtpm-platforms.txtxen-command-line.pandocxenpaging.txtxenstore-paths.pandoc/usr/share/doc/packages//usr/share/doc/packages/xen//usr/share/doc/packages/xen/html//usr/share/doc/packages/xen/html/hypercall//usr/share/doc/packages/xen/html/hypercall/arm//usr/share/doc/packages/xen/html/hypercall/x86_32//usr/share/doc/packages/xen/html/hypercall/x86_64//usr/share/doc/packages/xen/html/man//usr/share/doc/packages/xen/html/misc//usr/share/doc/packages/xen/html/misc/arm//usr/share/doc/packages/xen/html/misc/arm/device-tree//usr/share/doc/packages/xen/misc/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:14764/openSUSE_Leap_15.2_Update/a1fd4ae4c4aa8c8024b3958b448572f8-xen.openSUSE_Leap_15.2_Updatecpioxz5x86_64-suse-linuxdirectoryHTML document, ASCII textXML 1.0 document, ASCII text, with very long linesXML 1.0 document, ASCII textC source, ASCII textASCII textASCII text, with very long linesAlgol 68 source, ASCII textutf-890bf2f7ad76f4f8d400a2fb1ea8d144266e3bfd7f0ec82bd3833714ebc325931?p7zXZ !t/)] crt:bLL j׮0<@f!i=Zi_niOaR3T"1)BLK% +t2 6gb$D>ڤj'?^ 7bZi| c_0kLpY§gv>bKޯ"f^ ӷw5$yBy#ktPq DOc&sVX%a#LbC/Z,htnx L"j˗>Gz!뀕,Wa]}+@Y2p؞5 sL>=TY%qjQhVf֌:[Ɇ# Cwl9sنnEaN,섥!@uOcHkzu2~x[Q$YDdk7 理he}{F_z]Xan\^48CL%T9*­\.\nsR:A& Q͛[XkS8f5y6+.GkP5GL~(*N-Q [t)Movm"K&ӎ㲔R/v'۶R\9n .!T5Ĭfʑ!"93b੪fK(htE,( D[L 7 Y&Vu ǽ3 GXBsjYȴ5mqӟKi"l\)QD!i,eWJ]fi .%[g}!ok(_y"+G^K=6599Â^--o-J۸nJ-g]H˥CX_aH7l”nq:%rpWh|z*""X{X:k̠\@)xV|sQq'cr6;"QT}jD}yP+c6@ C AY-ulXPsyS(,Foq<9AztöKox/>/56ᙯ.JEh/5PÝ]x^dX)5sضH|Zz:,B2[{xه/5aRp\Y gMB1J?ђEq H -LfhBɲ'C;.9>{1.'{}F;WSJޮ|H{ ] ΋VafsMMt]B2NEE?8ixes ;ᚎo|ei+dH  NvĎ`U'{)ťDm5H Ҵu+1Hd {8n%?` $[Nl+-(JZ#Z:8 H YD>"i<ٲ]1qN//J >#J\_ 0fOw L$=5ҴԨXVXge;)vu`oo! :Xi9! $ztٺϒ$6ˁg[&bDՒ_[CL\%60$J"~q~`} .}(. |uJ"97`uU$ |jFj?Q]1ʂFB;|ʅ{蹌2n?r]J&w [Skָ$ӧ"%}#Xƪd`~6.tZfkp%@X5 jؚ#.L;FC5|Z[~ h-ڬԺ7ÑIU7RCF bUQiO, d0YWH]q3EG`e$(1i8h5M:%5/ڶ+*a` u4/3#-lzx 9|yw' ] 6 HlgmE2*aE(bA[;o=(|)L]ቼ?p GY3 L@rkK0Ս/ATB@0cSy_^hF&fFדy<9Q%%Rt >& .ŦIu/k1` *?p~,K\I Զh0r&)cy$@ΝgLU*.ڒ #$R qgdHE ?v;d0glP%8MX9x|-B :ӣl-}wg{9jSUc%h\4zr,صo'/z]\V3)ޛCu|C[橲F ')_izExd5jlK1am.c}g{]¡gyc݌e,cV ͓\-Bvu5)ڮk*=6AQS<Ws+s:oKːG4ʲ /G% Aȃ<{pDܱ͛ņLPe4S!axob)E4\a'b#Lmjȅ4\'ǵAhXhL 钢MixiНvbOqn2u+a3όad3hz \o)9dOcԌwLqmW3yĕD$'@('Xƞ߰:3! p[5lky@t g E31~SVO[f_OG%tg뗂H'żڎNR4Bd>cy|)8sV?-ʫe+$tM$嶖0 M|&4k0u~xcGnYo>*S=1Wj2ގF:9Ñ]O |=UQ|k20GxreK?6kɬ4v3NrJꋞNfIb贑idP:!01eϪ,j ,;xn(}}k_G~1 7߄W[rw^H܆Zvf%Yrg0],c*}wxlBEthUAb̻;`8$Lnڱ]̂h|oB4nýchg3j֯SڵYne=0g\z u4 G|P$3>PYftVh! pyĨ5"L,Du]G9 #&:V,r$3zXu>cYylŘ}8Բt-| l&d^&.ܟ@V:0:c 3 F1u`w' `R@#qJNPbJWPO\X]+B= 96UUm d21sI͈'am \?ikQ{^6\͕fK25jUں8QIh~vCU51Rֆ,I qJ pJX,ބyN|(I,9RDmoKD Ja87 jfbAẃ i B94+\vBF?ʼnW +@`WmѹFk=-4 -ےBtY7†Y;&(@5ε=A;g A95(Lb~ȲT|/s7?vQDAx!'WJCr %Ja: *;my50/jT}2|ɫ"XƉ,RD*VxpWƥ`npx4>QTd\,Evʙ3CW"=Ȟ' T^hi~Lx\^wIX7#0ܩj[s-kשL1z'V-@尉9Q06@۸ z~=_r>!uQ H>5\w?&dLD{_ÂxG +*Mu1)t]O*Q."49[2yTsKE Ǧ҉ aF{Qk@^^P'{nwځщvX-\x~Lq ЭUP*yo`a\H@b\Nu"9Q2m1ss cO5-  YEC"rƫ &^{it ̫h_n'?j仜 .F!P d>6f.b/6$X_S3wGpFe~ح$Z u;Tn7eN@8(oۗagp]aS'#-"76f"pkVhf\zB5vI,opyKH'T0hK6ѡR BƂ stF|yot䇃/VoS.!Xfwv K>6HDt^UAX gT9"71' ?5M&|23 |zٗ-%BTZ98X?1ek Cv5l&i ;x<{#3TYB*D+SQU fǔ}{mx5ƙO|3c2񠦯.GB;N~x_ÿ,o 9*݁GdjJ6:uG3JQ}mjQI.u;lEC-q2{_1>w=ud)åCi: Y1 OjbiDUYT==.Uk+B Гlk0{l}TM0:ܚv)㙂/">= ewjBu={ 8:v+-HN# 40s_zBJl?Tз=ЫJQop>Tγ0JwTZDN=S;5ëHpUv* {x~&07< dbeDM3g|$vʼDp`#.+M76:J׾"L|OCw~}ţ&הE߱е$G44ߒ <ׁ]EB5NgÇy? h_ہ@UIYUN~i.+. \~8 nKcr3{lr]$~vD'ZxЊIE'usߊvDIM , ĕ kƗg0?w4N5S& Ή:<$4SޞI[61ECW$&/ˈnS[)dr r\`‹):Do7U{[> "dI d((H~6 ʶ-1a#B ewnoDQ/)#h!5#`~?>dv=N'`@unʹtSk{jZp<Lb(ﱄ]' r=ÀVvcH*S @Ɩ q!^G .{%:= !_qgMz233=2KL8'[&V/l %'Ϭ9r :D=<6G|мofZm ȴ43]owanPI"YS#?d8we(q'@+Ay`BM=}+ۙ\w웋 UbAZպSL3lNOegUs"三S;D"9K*_ҩFi|q_ޓAaC-RΆG{8s#`^阐iO ͗}NH{S{jtQH r=HE̒8pB$ 8{2( Z2{L8h8ϱ٥ycgYԇ+pYG#,%F+Tjem+7:SDM['&SiPz3vZ:\ ~:Yl7Y&]@|?!.wx ^( Aug;R+d6OZ^R*UCZ_:PP($՗*vUxRoBij, կ% PE8 29 YZD=³NQĦb9Z+G=⟫J#-22.>4紟pἲ{^Қ2mE{6S;l*M Qkg)9x++h .p|es?}2iWy(w Ypkh0h"7n8ͷ 0KHZ͌N0>>{&E$OyP#,=6{ê(YA3o l4.uY4.eHq5t2GFQR> @Tqmհ_㱸K q+GPDbVFdaaJC!t?'37|=A3NJt^MYvv tdG o:[بrW|K-n $KwT_Uy1]rZ:eݦOCA;Tes2>"W[ 7m:&O[L~*=IgA0I^ԛm|N-I!.h\Yg'\饡3 -KE9{fF-8<dID8Dтp@Ҩ21¶7X+Tgk|oCzƭ\fjH(8ʨOFuQD EIǒv"ìQKv wQɿ_23uWǴ; QO#>Pl6Y\׽elo`”6p _}l C4is5|3O sqȥ=|4ΚG sBLO-_vYU`sIppY }~B֬{"[\]5SYl'%tK_DX.7_UbIvؽw?x}z- pq+GX@.fVTmF'i.k8'1f壥Ng$ Fu:D{n $fL9+Tv&|ӢX {As~n GWYNEN6I r$5rWPp6l^Дlq:ҐUfVJqF\%q ucǙ@պۖCsO=/N}/O]5zfV؃bɶLUO?&<+&9+!Ms Pl)c$CDZApPioл& SXJ۔x| n$G7m"Ҥ@BL6,WlYe&"w7:XWV0 Q Hb}P׊~ vO"-v'L:@H/Mi9\*RH1TxBV+L~7nXtBP!*pƹ+(i4VU$ L[ƺ}"TFQt-[}^9DD0hIYadE~ ,g)a6cnSCh"ǧ.-Z[ 倚\6mK:%^y ()>Q ={5FNms&V)Dr rqS($ri&d|9*2< ||վpp͸tiz#%akD2"? u\odb دsE)^;&F)B.֪_ĝ\#j R)%WvE2n䕎~3w S,5?o )'+/K7r9j1}d=% 5΁o>7}ƄOht*-ߨR`W܅֏!uj6A?B",-?Ҍ>=x;_6]ՑrBɧ(ӷ1;]$W~|aҘ۱b[8#y؂,7b#Άˈ줴_4R$_ۻ0s &&sk2ld,J6Jj=[[ I?֮QDz/7(;u}t5Ƽo㢙Ԝ9*ƒ 1)3PWk?4gê!tꬬI{/g0 %i_ߒknWTM0I3DeEDq(M+(Q.3Խ' `W/ѩIV?I,ys _% yfC/=?~")+ ȾG)Fk('ܺ6 %˷ʫA>X*s4gO~rED'Mĝv,Ŏ*1^ur4/"Haxf7V5UPmxNV[eVk}VsRQ'Wƍփ}&ޫJi ;`(5/|9H\L0Ÿ.O`O9E5TR~UzJ*j.iR/r0.Hm4G̉i|+r1*:POe=x:ړϒ`dƥ/muQbaVg{#FͭƑK_wTZ7EiME /m"7@]=&>)S!±}t֦_֩2lj/10G[bp eG~gc8r} }Vb.zlp& 0*p/[0yP'F\9]n'u$|nktU6Pzau5zS6g]+1I1GlAdGDyj͗$Qy~ A|!>&҃/g*ŷ/Ř J&9^ *0:̣IAOj]XǻJf ՂRjIdmrHXxt6u-xe/}s{^Y:M$B`Jm0{Tp19Pp3T1LO)+eAަr<-T$yOy@GϗaG2l-iaX]Ml1 OAҰ:Z9ǵ NR=} 8J",WMfa@w&ٷeT4zJ $+~֧񎺤Nbu}K _)Ihk[_ ʀxFOl͈j:G7y4^nSddYWOC#?mZGi:t!#:Ιm̏A4*K C!j ֏0L$>Hw.eufe2j+619v^U!D Yè(J8o jdމg升1EunNn5sFz 5 CMT'tb-1O ڴؓ\ s9܃.1I߫ |Ϙ23I@p6Rj:J>.KnAvf'緸%(NU)]8g4B*(X9:?&_Ls 0dR*A0X S;r`Kgq=.esd !tJV5i-Hci JIx>ޡ2%ՔV`%KI(9t"VR+[{h<•!w2y`tGVCs}Mg$jSbq09ouc'3V%19q/N<5e6_}іt;0$OxRaO`VjyQ7ɨ8oy!@іvaf%>iA^q[ DcШ"f!~~ PT V׾^`ٶIܠMި+5Dm= ;<`(d?=9LQߗ*} ;+Ml̂F h6ɇ%fep2¼nVBۦљ޹j@D`&u4gcUd-<[lדE~ϪWE:Y? *VEfIBV%pd0hWA: ~M<ޣn53B ;Hzi"-TZ|dT/|= u5I6m4HU|xWm7;3qbI: f!rC)%DHʘePEsEl5["2g"&Em\bxCob]4 @=,=SzɠY˔(<*+csːޖqѱ?{*OYZqC緑-%>$~Qn'(4\cGL-%[]E9m|_b(SOI2-!NiA&pK ]mPea5m sw:v\)c0vzcĽD*? M%8yZ;wE\7O*f[<gR3*Ocn f կDžFG=_C"])&Ñc>B.B*q܊U"_8{Zm0wE4fH-JS 2V5 L/ q͈br!_nO]?H{iocltzby g`).TTK ,][y=␇qPd!I)`J ^pŜ@: *FXCڎpVԃM|WN\8R&1!8?L}V-Nş56[mTkX!Hj}ݥDCmAPH-kyF50=p v}κm*Eʓ4+ Tҕ Z\S%{Z & [m~ѿ6o Ga_SUߵJۅ:HO8Q :.`DZ! WO1CFn3 H©|U51j` 3204Et-FI# fZbg2 a+V)F'|wP':P욓)RSmV`-[H0x@6h pĉو6\m|O +.1x9 g >\Ϻ_brf2}6YPQl 1Z[&]}wOeoBfR^:g@eY!vTI6;'+gϵ1qwwdt l#4 OÞ_^ و0Il "Ӊ4o1bIkO2O~-9y]^h̅$L BhYzȂ4Rn{P?OaL sxz[2`X͇h@NJID2[~Бhi75~Arn(/CE;W~3x̔wZ. V~(z=gX,F7ukT`Wd3B@f#황pq"SE5ʬ.ڙ4Z xߌU\kkt4Q/#j@FA)>;W}9CC5< IU r<\\A鰣O Q[5Nm[0p! 4PXDo ҳ-91uL< '|+ŊT54gky- 4h⻱*6 QP9& vaL~"-*(H)#z\~"B8|RtR$<*z9w'd)ƨŷ`e3.Dθ+sܲm@ʩ _Bey`d*/(5ITXN665ȋ *uGq 9@WI :u$.dWp2O_{;(BXzU\0/c d蟪"Czii5]n=ĊP`)eGNX_Bv IZV[WUkݼmPJ{O7q}uATžGtO\v`l{7d>7D˘bk$_xOo^>C== ?fv.K~`ibWʆis̈́]:b@7Šha7<>bv?cHfV>^fbM@7~pE%bD#ө˛Hx lr5i !E=2(GI- FW07 D?(F)vWL0Թ;=/wN|\?im{z78֫}_SC|%~Uj7r0!;> J_3,|/P >L(Gr;?댮ߕ· (ߘ!jK^ 4gDbЉXU3:DO|ܭa`y:cn&HiQ֠# 6Ҳ2q_R)'bFRѭijmPr2*LJK,Wܘ$6"R S8s5cDy$Bj1&R%Ѽvwzu~eFUhn ]v|ꔍY!!ZPlrЇl~&moO)}&vJ2A vgowwN`5LDuӅC(kM>{/ b3u}6~'4ء.އ&[`?sC;\ln Eyz䓯Ji W|GD. ƫ16W6(CzUA=:4魢92UzDdvIB6rhsۖv2^öUTWχrW> !W ]sd-҃f@%UƢ|2 VX^s'.HA:qbC>'ΜNKd l̓ki RϘٖoe  %q?EHW/9Dž3h:X:3FȦKڰz,kں Y x)q3rOݱr2+fhM]Fl{϶+}|Byz_^/>ƑGS#Xgr/u&G+(m.=ɰE8.R^%ID'A{zz]X!$B3ՁXzcU x/nNsWE29 FmzV=uia,21hZDUxԉ9R?9vC?>RbRTB/Y=󛓝$Dא M=Y2tMd078@ xr@ѧǸ:,z=`{SmbSD[{H tx?1${ J;sVkdh'x-5KHA-d_VոT}i1=7?ˮrG/@MFa/u Y3D4+aAw5]P itO&׉ ]nj+x&<ˌ[f!1o$=JrˊZ /}cWZYZc%k%Z8[5`=%JUP{KrɃ \rrz'6YY+;j%+:dvҩ[jn΀^8T"x[s!ΝvD&?,/Yo+"sšqRZq,`0Q૘Eջ ZXbù!( `L[w'uEFQVgI3{nӆdL+͋Y\lRZw·УtL4 3깞~H?R[7^ @]eİ[!mLDR|)F:?Y}pbKzYikkay'A Mec l#1 |4& (P~TɡWaU ȜbH~||DVZ~UC*>@ڙfMs.G /l88戋JVI|w -I*;wJ[8W/y-%q&0QBk'IjXu9ةxƑLOڴrQ1j+#, 'UśSL[w#Mt~,V|]bVݎv4FD-#n;lH/ac&OJ9D; gd3Ĩm}-do· .  s(llbǴ#ZY{/kfZ`P |O{DJ:}},Idq.݈vBqbw|8RGx EVjƗl@?_|t*p!}5rx/>ڐ^cO/_?n,?VĨ2 Cbr%uJ?r͟8T.4_){eŻfaO  xcIDJ̞a +.pEjm%p ȠGlt'u!?Ci(e9I< .:3 b!aS%PG؎μ#뜖#U]_cƪ $0q+mЈ\*)d9=k۩Ï^#M$ŦSj:81_|9zei>mvX%s>GujN,~M:<ߝX-Wxr/8ĆR]`h{*My-ٙG~x 6ũ;-3UڨK82<5yY> KphjQ fN*9{EA\7ײַѷԣᇛt'R¾2+ e$'i=d> _tLc?,}KE4[ 29%g:!NX[E3Y=X?P{IFeHS?4:7}^+cƳߛ\U<\=ћwdlL 5Т1AcMfypz[n Z785~l9O9cLq2mbeNR=[EPCop8\SF-u vkr)#i )*A{;'~l:f|k1܃iy! ,@XؾO 4K 06,a%V~OMItr9+k o<43~ e$}3`d@=$Lɲ(6x>ll00PARmzmO)HH5RdhcBi"Xn!剕ӋC2F#H;6^e /@w\.^L G=Δ̍@VAc_JߌSe#l=BzJ44ZD)"%pR&MDۚ{ Z6H6KI&p_#`yN:McWeęmLQ2Xp=1 EӜ{Eb4 0 9a[`4EIXl}9;vX%.H If p[o&Xp;}nHQ9yH? C4œMҝpZ{Tìb| 1[%N9hR0}Z7m3kbR$)ųi#jA#W7IͰ}-;͌0x]UH6al_q8~^e9P#:Jѽ*d>t=%0^0/A=Qm4f~aO?qLJ꼫+Gbk$;9 с Xr1B)eZYt#{W5/xkA5i&0 LgِO#m51SwҚ5H|ۆ0OMs@W 'I: 280j &G`Uc}`' :垯I4W0fM6T:=z+y8 Srl{`,|Ɉ8yL@:T@I2 y]>yC=){52ߠj ٞ84(,?$0OM9VXA6]'JULRjsQ4R{pB-IrXvOfkt%s(t`G*r>;@.-^х U$ 61Ti x:9Tr5-\n'L&<;j1^8auJjذ:\]ȓ0eJ>&JsSlSwwl:7lFm\.߄;?= iף5'PGU8zTO\$iƹ402kF8GX6c7E|&OМ :pѿ`Y}ĥT!ŁՐ8`CHb@$u8z1Sf#Nh aC%M"Dn 9uk#*3j,C7~5}[g}doxd` 3*\ [ Q(WD%M#`6Mdrmv"]u{U_eqE `n|s d>r%U'PQ qܺ3?Ѫn$Š39Ub 3S-=//nYd $d5οcʆ]diԴSexE[" $t&2' VF»d7UU%'+g󽕱\JCcFL7K*YDw0ab{> 8_v]F2=.pkyy$ 71Fɶ%曰w ;%jw`#,a>r$8iam1\ro-/8y$- e~{>_' FB5PNCLY, Ny{yIH02Xw}d 00\C17 \ŐTFp Th fkAB?bCN:@ -EC;yW*5bj9P};˸ZDHc46!͍~tYɏQT qh`I#?JBS AdeͦA0bf4ɲ;|( ];:>jӟ kϨfrŒ?ǧj 8e](sKtDGբтAݧCԂlíE: 0.iG`6N"QTo 2;nu#L$6^jGcƏo@=„ܝJTjΎ.lgspDSr_X%(* 7r`Fb෭]/·ŹC4fTf6>&^@zpl X;*({y}BDG" ƙxk%+Of֜!ΐY<7LB 'e.ӌ9g]D}Oi'>ߪ/_M'*XIioK>n{]PINрcX8"eqa. bۖ@y ߱NG[@Ҥi& k1~Jre(!&Ouϙq= >@E^6=㿂 '%NVڟxZ[|qD}-8_CGi ܸYy]aFseQ59|=CǫiJ~B 09K?' (yC# |I]earCR\ln8y rcҫ9Ԟ}pD[ SxlS~qlJqNRrR S˺ h~ Iޖi1WӏA 7e=Nk*W#y5ȑ2O/\[d@PgXG4YlK//CÂ@c~B!D7#Ϙ{c /N}C*Gnîļ2^w[GX*r0gL-u%)QsmNq1B!"m~{цb3)V*bʊ\&L #LRguG׫򊫟 //i}=B9pbE6283BluL Nq=a+"IiT7_"#5A ."]w./ D@m>gXf@6"TF~Q E9׊il#cIA%I ?$mX%{~U Tauw\Z.'w\P w&Ov7PEīx[xh6hɻ)w+^+~YqSO)8UFo'岭ȉĤ(s0#$C58a(PY'~iƴ|AfQoNNws kw3q=4W3]] MBM?<ϩZz!ݫK  8*C?,?5vH⛈,D1# _}uZꑚoTf_櫙*ÙǏX?l 2TA@q_\p[1vnLrȡH)`SV ^c"'AKt^C/# oi]Lj[ \ @4ȥmsLUSϮOpLLKآ` Vs^;`y!я [w*WnfUwHMcn)쟖EZvP?Xp!MYW𨘙Z`\h\n⼬=sy{'k5R&`da|Ec3^g!D'!i*NOÌj0€bހ1h7*}!bPךsY@VFJ"|Ā)Ol1Ve$fJh<T29?`V!cDI6Qc#Y~fS"@,anJ5 B*pSEݳ#> U Nb}KS)o5ו!σkfb]bwԖBA=,uhxnMU]쬪Hȇ)5 S-&W^kW>s):pOnh􇕚|xs6S qE|/='S&@%/ UExPK>5DzÞU D3Nj=eX 4"|܂=.y]uhMő&B`}663F q|eSsd- nـhd*q4AwpAn Ίn UƷR̓~uYQR1BԨ;y@恔"7Z+ݤ:+\XIk|f8L_ZaXr=9}Ag^a ->"ixFXeI],ْ><<B_">q\T ^WA<L|e.ҬcsBfl;;YˍMaKjN(sU8V&ytDs5I& >ӣE դM9%agDӫCt5=5- d0F'57/oX[afn7&f l<%,䅹tFMFBk>OpXrƜb)zLҏb/OQ,')I튌!(xy?A_+X7 K|da+oT?x/fr) K z$ȱLs'uiR ;IO/Kn=b'=>u d\X6GD`"ss9jOOe.G2+2"5"*FL{zyhb+9޽Y0^ud.2)?1HbZՒ='/Lq ڷ/Japv\"o!l/̘AyLmA7QHRRx^ O@m\B(t@;Q Æg, bLP,Tɉ>baEoGG_ U_SdmԤ7tR9!^7eaR:R1v~#![Gj&0Lʨ^ iȁz5Y()\y`ZLE<̾XsifE[UwقDυNQw=Z 5Up=b +T6]"4\GbkRb~W<]̌ ruD+F_e(\kkpgou_Z7 pyIMa{R9pa&>S^fv T3 c&QR \|i> 1W㹌ѾAXy=-~_tϚ7R:-@i+|q7k5!J1%FDˈNdbN'ZLև5+M/x܉oa_F˱ӚIGݑ*rC+Ш[22KMdTOU#+b/𧊤G:T`^75G¾䏵zr҄qSN B^CaA4vBK׽ !Y.cy 2)^WY 4$5?xyAh$]c\bEp4[ A.JWwѦTfܐyS[">c2lTwnOP`sa]tEt`z"b0ٝMKJ4B&}b/~$@gNƑLΰ\33^FfDGO Z~k1`O+0)Ld+.1+5^!-dʨ.. eG᠆|wh'v]'>*w#ZUv˄1aCܠ^nNiQES{>_$ nX3ds\*" VST`.#*v[ێ %dHc2[5WΛ-}-`mMPk<ÖgEO%љxᥭkfcuG9z_ˎXاmC{~$V)c|[4̃t"1e|:t|.dO"̿ UW";ÀQ &η.:ɰI4>U1]'}ʣIP;&Dl$tύ3A;/f W4lx6wCߐRfZT hvO=d:ZU ?A\im@A~TIoVd+*Y (7!&y5,%+CДTWJ&餲̏<7Ew΅\P~$x$w# =E8KBαz}kQ݆82\Ij̀L?XuwJ1mMqcu)Wp?Pu[<)z7-2#FמHmtXwGfݵ_^Qյ:so;ΰF珞-Hm$iN'J?5`rɝURٽ0 Ns!a kygY:iDJ[뱽s^̬{ZCzՃy\r-1kQ X8GWeϠPl#MA|`Hkcoګ #zGC~Ƨŵb f<ڪ3R@lH-Hn5^gE@(T\* aJiBn3u3욥:ZW5>XsQ%TI K*|Z}U#&1f֑OadR 7Wb߁ :򸏤G$6Y^~K]U+ÚpI[5>Mz3q8D;4BZޓ.]=7 H+T8EEan?elIUQR\Ң;,K6L1mD=̨M\31۩Z{/gl2gvBJ5ZrFlWI -L- &t`o j(A5\l0GP5ccfWF{m{`WkҀ⿱ $qqJ:O1@ 8ކ({".wL ?7CAuĤ?EFH갥xj8w7BI4l]GڦPROQ rcP$ajL!02bqOY2^*4 ߧC ^^-(p02U"zg+$BK&LʼhH#FvǜPg0Q3B_#9kj̪kaH,5yH Tq~\}Stg(7f,ҔM(„7Q P S-aThg vx^`ᶛ ҃yӛZR'Ks 1'L0mGqdۧBZ @`qtf!m285?g8 ,{ BLڛcZ|$Y>Z7B{iQ,?w^ yg@ޢ%_Fu7"8MݭLM48zYu:2unHj׋,Ѩ׼{NxC=б)gO"OhjYȷ5\ Ƒk|~}7*M.Ǐ t(OkVC  /[EE)H=}Ծ:!-w_:׬H7_Al`9=rCL$m^x&S`ڠB@>`0?ٰN2nG^HY%nh&(ۖ:1v'Il z/z'`qTUH:XmmS(:MBc5!?cZ!sc<Ʉn<neцNsQfdA7VbNOG:wnp䖪RGWi>U=d<=` _MTku*ܣ+`OlEWLϮDT#Y˫uRPY+5ޮE =u`c˔V3<ݨ* bX(o)XG.*ڡPO>OAӽBR}8MZ  T󋊧B =_AuWgzr D0֑veݓΑ$KqVv.ٷ;ύ77Hg5G{C ,iX)y /_gg"J̈fuJ;W/bhB'n[dgf7W% WmpcֻR>,غ.,(\>z`]/dHAݩ׾rEmß;fzc2WڵwKLUsic:x@.(n&W]6B7xOm7lMBB?.D"4h9 O8,. >R];|ĉݪ~ W@J7Gʨ0ZxL(P*:hSOm< >lÞ.Riruv\⊪' ^)7I")0^EnBN.q4hyे4R6=Yn۴ LZ8L=_DjGNVi7h\F <-!준)ʞ1 #kn=R&-rˠ!v,4 Pn[˃PsH EVzL]'"MY*7 ;Me!pMtrA䲼`G<ԃ^S*{ ? .1Ԕ4 7ߊ#z![:A`SzA-5Ƅ#ۛ_Ǔ$U>U#Se d4Yy}Ob5pW9 ~SdKJ׋lOrmI*C9-hTB^d 5[^9>XGuWB7 0$(HVl+'+1>cNel߾Fg <6v'L/m+jlE0O{Gz wZj⛋J]5de}IX㐹|r~`rF7pSP <[(9NN0nEZy=+äjgF#a6=fRArfVkWZvŃ:3*i.]_Fڟ]d:k`) ڈαM/88nToGb-# @AHձ)GL0 z>Aӷ 50 KԬ6P{1 Nwn_H/*Z]z r`T?axu@97No?LvYk Д3ۘwsC]4 5\Mbyڃ;&,Cn /(f&N0X/J~KE"@Qv~h8li;Wu{vw\!n_Ҏh7t<$a?S,gૂh{s~h9>, *EBJko[h!_3[*v'zIW| ! Z?hR cd 2nSTDmO8*?S$`LOGvV£ h>K5iSG`P$pGC3FܜF.3;3'@$bz&*#).eO|0JػS#qld <)6:pn&RiߟC'"x%d+'e}s=qsdחyl 6./)%X7[A;6aҦB)8x;bZJz Pw 4o,jU+~9M!^![Hd`k20@b 䎸A<:)Rc4ByRK]Gni98`)vkmNm^;菼}у_6`W{\2^슍"22ƪxowvloU) /g3kELmV^tSWb.MUeͧgs+vm& `vx3yA>50/wFҧ.1;M)`[|"=T2WQ/+'m/ XYH#ޏkfV2|PjC1`WIx!sI24t ~GaKf!e`{Gi2,&WQ7(f9=Ġpg^ ku$n;(q݌ 6*_"H}-93B-£ȭ} DV G|GCc> 4̎f|Rd sil+"~rk}TD9Hi+v٬cyC`(f$dzMl+&S}`sj*PnTv@xir{Ӑ95Zȡo1&Z^>'M#9.Γ #Zntjv p؇S0sq|ՅdVtd *po w b Iuf1hC4{ vD8ox i V+XV9as\W YlQѤ ?Gx=@lfË=SFZE*lDC08& *OD`F0ӅxieFlbcV3T]ReτHRnȩ] (Y B- e?8V]HŻ:f`ZmI ykJj>}^@G& Wh@\&1=2E輺[]Fi=ݟ Y>sTV9O$XL mɘtn= 6eXw~s[[P:G, 'ZxZ䂉8am~JBWKkvǀ%E,Hw3B`hXFpT%PEawTz}zP|o%Oe&G_ѧJ@TM.bAhKS  =()VpLTwigkxm1YE#ig ᩂx3M̭?Pi&+BE5Z̷Vȧ]+ȕT|sdx p,ס5)E$JFR37,EhsS';䛢_س9߫uOX_dG$ΤDv 0q& Gn;[f.k﵋ˀeWhòa D8UB.e㮺ZI SSAk @I-,@GH ay *~C'~yJeV_+S "06 -q:'} W5)%=L*Ag(A%2Fu}b"͑ǢM2Aub/vLGCJ [76MЌÁb|)M8dnD';7* O('hW&b#z2pY3uA=g`6~nnYniέne rؗ0%o(} Ʈ ӐCN@f|p7;:0J7$ЏZqcy밟w3ke*"d+zF,8n1HPMhB*gQp߿Rz/tӱj̉?y~ZF 7Z!MxՀ_"ש0ȟiYF@@n\oF=ğ%2HnWPlel_i3dNW+tkk wW~ 46M`>bm"X*lQA゙Kƾb+2poʏμ`WfYt*x!C!cF9 VDǭjīʒr7CQx } l"E^;/C9ڈ@bb>"h$AGK+d Μ6ox3&iy-xA/żh;kaޖe4mQґv<2\. x2Ԣ9,tyihu@1YU /rsI}sJq-cl+Z!< בh`!r8M۷{hWcU,Ś"P@@o*CQtpҘʃa//0"Љ%rr?&lysN{EoFK!$ָ} |efBL 9!c`bUQ^p{/ZB;p|`"3u䛒En{>fPډ{F c|m7Oog@AxH6: ۱5k7)Fn N#CLBvwazt3oJngHlmHjiЈJ([<;rHPVp]JxU;aU@YTn0"J4aT/A}L=~`f@M>k֥16x&d X +jQ%šP J?3ͺ}uX -]% [,O-mJʨOLE hNW(xJͧ|.%= NPjz{HsM24!1Аח 8q#|"s}Bt͋[MspP|I di|ldYES')16.U|awu1 mv t4=fzG7P)'΂2ƒW~mb>jLcɚB4f *s0&X,~F[Qɳ7S("˽l0sL6ǒGu6 ~5tVMn=.NY^CN1;0C5g&FN1 -#o{L2?h "L]gI`LVZul$c{GPpTC̳(v7{ ~B _N|κi{ MF͏}zt)_W6"rY恺1$la6KK]\\j~]l#8kBy䔾ڕdB>{P@wh.΍aoCߌJP% b5#Oܷapd/2hs Fƒ&aK gbA.Pe4բ;N%Q6;&?sEcU"αYʥVj IPeܰTuL|:)M,_]zHiEkms>]&R~Վ9zK2)^sЖ-ꦪ}vV<_INlJ0~5vb0p`N1 a[;2]We4@f_lBz "_(Z-:LgԲb!7s%*+fWZpBpfO>X1V5= #I&C>cHXgv G+_RJPDAqCB&s\ f9j&Im}ίG:KUzOD>>ѴiAuE7ʝcO_&B\heB'qdm ̂K,_YZ+7jzȷ'kptG lÕ8'JXxZ-߸_/q{ b OɀR {,qFj?lX،^`VFډEVdok1t% "v:jztB64R~!{O!h7c?EPh${0ႽD9\=П6d!opm6%P_6"8󟻛oȊPX[[4ˊAL6;8tI(:VJ Λ(|8\4θ@,^F njloUT`n`%q8Gq۞yO$ DO#vô= < `P \ Q>{P3Mu̾cbG"F}ŴMDGHr|~uᶬ^ORΊ1Q7/ByFp"ZptģH8J1f( 8HZ;<׃f$*qZjcld1څ.Fp]o0 $L(tjJ;74Z"%hQVelz=TR;Ih%?Ӓdg^G,.*-nl/.Z)q'}Ivn$4Q1L؈ ROaˌ7 k~*l $ʒ#&cr8 +o'+0InaG^㎎jɎԜ^?][BcFImYܭl2S6I|LPl~v& *MX Swׄt<^͓sʩXǀ8LJ[to-n`kNt?zs avxig ˖.#t||I=8w .#WCWb.G2d<>׹69<7&(+U!37+Rm H~\r> &4 =lwfmď'DEh(H1ZR % [Ў_tr~WAT?\wR6/\w+MkapNywIt0t$;>04]kTp2mL]cJ>*~U@X P=T̾UOnW!^,䗪 'O& d4G\jF=j&RkʛÅƩV(>J CNJGﱡ*f>EFPD9 ̄n#=V7tyuB{ !mP$}0VVp}i4=pA`x&(v_2'qP&T<ާكAEl10?#fLCOPn{ۣ]eY.p]*fyH0_}5 O39s#wԠnb߽Y8j2`j;5CL\GH#3V\IL* -?P2˗943NW}wXn݈;ʥ&4 tEnpUuCtȭ&:tUG>fz6ZKYdu;bzPB ҨJ܇԰mwS`6`b߇Sn yC@Bhǒ9t3+mU=NWD}ShEZįr#ǾM LlG{S(H_g›ijxaf_YO*>kn6ZylOHjv=o}="M~wmWV԰ۓ0p*uo}0bj-C|;N>%uSKſ$N37"?>\/~g$R Σ@0 azwH&6?Ā.2%_doǂ6i?Pi~\<lpxی6=%ȘGDn2ny$wjѦwsn*cLP"*X$Y7u4Ğoj zLg]Cu]ɂi-ܙĿ8 ;c10N[.՚BLW46TB:y4?dc"Y>-kaXZʓw+0J//J? r -yR>_yyb:\l"}Nw3vj|SWr\ ڄ @6 ue- %$}oVp/ yPkW^I_hKΈ*m',ww' )%>Cl 9pHA;ι5?֕~-LeP nT,l,92eHkn5LC(Y,=:ܲR5Ωd7 \i[~OxLܠT*v1tK& /^V)xNOk UZ0QkU_l`gV9|A]vJ~i6`Nl[ZmSzu +ur0,c{m{d|~c|#R H8>O%F/%ēpOC6hpOd^E^m7ǞR'#ᦪQCtWsGmv60j^?$O NfEZ˕+96;w_)d&[tuGZk6I #H4%/+*t_xfx Sg*_*( ӊ{?GK[.%)M[Љ,XHy ߘԌldOIJLKk.V,™f$$ZnIU4H<χA6)7{2n]rzBGVu'h?C0֏rX#$ז#<`l wiiIGA\A> :I1< 娗DMEmo7b<=5\uR^!RZ 9:օ d&'KNLttX(Vr:8 Ym`, Bu[6xX|TkqYv_9.GAA7 b?S+OsH΋uw{e'`fvbR`0Vz䜿Vj|nK^[ Yw5"6McQ$8:n{ Xp2; ޡBPH}ГZZbƈmfnW Y]NZْȦjBzQ0tx'Ӈl2㧗I:Փ8"ڱB*/,lI ε6'_8X="d $Mr[M%`ʼnmT&Ò9YMG<`?[ :XD'DdPea<J Q<^ jX+ e"2'Ӡ]s!DX=z=,^f:3h(tEi )X‹|B8/E1]^ѢKjjE}ۺ+a k '>ڧxO!,UW +5pu`lKN8go$$/]ld.M9;خ+Biaٱ"3q( !(-\{cwW ٔWWx$j h M]w(9<sLNmE4GK˦CU%' ȕ`~>4%.[T:J`-MSjA];лe,PPW4;=LZp)~ fשxe^Ơ"a}(:aI C,B_1RωHx7v5RT!:31ogYH=NjRFuLii;~ak-c"͂g-rtʮk[;g+b#w HvLJdcspZ8Hq oJfટq=f4}HNf+7NK4?M0B'nDKl}ޒ7æ>~k m#/PZM{UB]PFO⌷sFZCWd3h ȦwC ײw3dOv@فY>jIO`] <I k=m\A2?eA)qw%9( R*$n[ S)8ﺟw˾ -RqO 5OaҶXBPZ#+;Xv.=OKClj/ᄻD¸(\gZ]MzJ<`sjmִB[³7(f_/b [6z t 0|ek{w=pz5/RKvPoeFŤ%5ItL+ɆpCv1YrK3`jEzePCwɏJB^0! BpO֤ Ywj.c('1Ť(Vxf5R?'u %P>is;;Xz+n #!@#Q%t+cS5b\= Wzfū:I 2R%u9dAY~ -J)Gupk|\Mb2F*bO>!{BEs xGJn`-KǴjv,&ht ni7 V,=2g%1M[trIàׁLQ "U,;t?)}ÈeI;YRI+! 'STTvijVZXF#rnL!n$`QΑ0ЬzCÃ+BƁ>Ku쒼Z}Wĭsgb^"'Q-TqE,Xa5[0;WQ{3Zmq"L׸.Gᴦdmف`4@Ze9C3)O{ߪBb1C!~b}I>JJZĶƬ&* i=5/T;ܩ[ uŖuWPFBqwi,H;z1p@XT3̏דs|O6>ZBt:2ŗ@W)ǟ$5@+7:7~Zw#>0a 6(k弋?d3,X!s^9epqP'Ė%_EqKKz;$'}`EX"_?Zyg8G%Shɖ7!^=۹Bu;O]??Rܜ] ]0e&3qH?_o diQt"m~2UXʏ_,A#rZ voEj$U]oё8ݮ+(R7}zZd7jpMJ" ecxIݟgI.} u/u&41X_eP3lsxԔtC!ٳ0\KIDm .;o*[+G`jُ=Ie94+6" %NGҠ~uuqor!@1*l@66iG_ķ< "grG,^8*,\1G*p2lo?X;C JLs6"~vet&Wݩ0_[jqHnNpbqE rx&SaN,.gh_1ze0ZKqgYjm~3OlnDa!,`C\gӱhXomW9@DȫsD5o5I}δ;31z2Cn`(S$2ڒǖ߮!8Ƀ47gQ]8DlJ]`wy^S|EWaٽ(ma<^czln@"m^{'h>QxXqGk ]\c'XU@M574k:yt*Y:OFhϮ8BHP @y#v:H.h)@pu #KJ:# # mժ5SOe¿pEP]ەKVNz@4\7\ P{1@Joc ?DL9I{!9~#;uT3Ula`'C(;y`?xrG?!J $&3I-cNhV4Pi4>!ek4$`U8Y:xuP~Z%[.vRQСs@E-QT_56?_4g^s*2XK+8fQY<妘(pɋFMHף:iQdiC>^͛{eޣX6" 9G0`n4ym_:vUj۶4q$omobn" մT`@@qt`ϊRi櫗Ǽz䶇x( _TdDZ#.بEڝK 6UBM4Vq/\r+w9,lK]JF5TX-* d?SӖ{tZkHᵝ 1&xB>a-Y~قu*vz (\h6goF[B;[N鄼w(6O0+T 8m%lKQu.BJī? &i {pv<36yǍE 9hkD m/ Gn$y-P=@'`bF9f/:?TbeOZ#7Bslu Du"2+>h`eZGGz%=?qr_j d,I^=F b6mG1C))(i&Wg=mcˢٖ{Y!e7ţRmPA<6@~#l8vo@"ލa/adS_=nv{h(0']T3<\fc6dq{268k%R>D}gCӡjF`sUX|*H Q*SU|f/VG ̐$N(,odRn x%87#sڲ! &2fL4gDW ;~&ɎX/!HYUX1q)]qE0ϭ` 1!pʡKXgwڇEMRj=UxU<6QqwR ?6 B}E 0`g <,@"X{;ђz>Tlrz#!.4މ*}y"ܗRRi5ՙB('r"i^r}ю K.tm\抴_]6*%`)Q;/a2 מ9*# HX0-GjFᤙsNɽ~M6vd) 8=S6S۬8 }=Dl}:j6QFCM-nM4+fHAcQjC%[x%&2d4S* c<uj=ps^~ ճ6 4JB|l"A&TwDSiAk-1;_ /p90n(ǖAi:bi< 0c5!͐1.}_"2 9n5[ Ov/@=e덨2dr7-H(UŎU+ kUG)DrV]pO %Xɴ }3$;$ 6VǑ=T̿y--'Z"c˭B"o+;3{nv gY\XKel5W 0eb" dᎲDO92 " sKf 3<KaҊ^cGAxK=ȏKץ Ct:p Q^|f+`K@ɛϠf9k"[`L]\{R":h_H>U4Vo1م4`W6->e5 S >:y*oէ,ؗnj>0`ʇP0;Kx+ז|-vg^(Gk5yߜRA_!dPMEX#IEB$#RE]lT _zR? 9\Ψ4l;mAVQi0Q O8'zk3 l>9}($`䟢"m BGbZĜ&CK޾ viРȡigdAz+عAKbE&rU@Yu0磅%,6it ٰtU3 i1ﷲ!sV_=<0d&X0`UrŸP9.sC\ MLL!0{;yk۟Z(UXO59ݏOmHM7nh̟ݖM2h2g'-V -"$Rhg}F`iQ*w{L? 4~1lʚ9iaMqn 7S1fU=MSsԳ֔)3C^mq|c;ݏqIGYs@,!2ݝ٭z:&z9Ĉ(| ?2<^A.؆/\}`ѷF؅X}/(ߺ aɺ`XZ6V_xt2X7-kBעM!-Jhs+59v4,0|)X `OhE Ϧ-d<Қh3*oGoHbٵ̏6+fzf@= ӔSȦo;|,Jd">8 I:ϢTbК"'.-*EYs#ҎjŅG8F*n+B 2[o5ZOuLc;Aa&FMq1Qd':czYB.e;`2cweWvYE(b,Ļb+D =qJ [9sW(]+aƺ +N#U2llܑ%a(1Xjǯ\ LϏ ɡz̵b$zaeRwTM_SNi!Ro- ݦxcR@E?K9i7SO  wS9S-=} @[#,Me#X=|4z_ƛo ` \?-{2j&g>[ݛb~+c s c]d2ڗ R8vY[ IhD-EFlD(k1$ A~4 PDf\muҿCO)\/[\F\aq $S:'բ_1Լ#$x| +[2S <2pv^!"xPgRizsN]<[9!Fdx"hl(QT13˭qHoV?߄HHgj+{:vy?p02,M|x7D7.5Wk I2\ !>鲎ρET:}lT&x!pd.X'x{W“fPGBuݤ9OYW}XV|:![ gt(@bN5݉.'Ꭺ/0QG^g!Yf4*SC\gAӸ1b;O@0^aLjFW ΰ5 <`$V}˚[w/IvfdD "~A=7<v[TaV$-}gyÔ>R+>?V\i!*ny?GmqWc.Y%kVr[ gQa% \bBį$ab],S宎:”pYY1P0E`Gyn|[s Q{P#uL1\S*-U۳S]϶w0wIJlߔ|tfBnUi)f&)̿S0 4Ɋ G26nE0|M'X EDYkvfoi5ңR 3?9l:J0p#TeFTil1$pEMnܑ/57;$-[i@K8fXy?<FKS!aZ`QEQh&9g>VДXw6_Da ݁cuaa "Ux%]A~k<{}Uu|Sʢo稦dQBQ C-~=+7o)^43ъzUj}ݞ_,V95;i0ȥ@ZS.?zdj9U=w{6t}\ϋr}~):_'vYr"c@Â-@\,I " ?V%087wpq{զ{c-OHub]wHXrXM}@ve;37_]F呌w#:"'Iy04^X掊X>\,GnZz8z.`jbQ#fbi+DlqGJd5S.+fv|+C<Ȥɀ:Ǐ!C2Lj?w@OIvHu&P)$>=!j=rqӇ/CԾ[ըڳONeD"~*8I`gk*h~+s0Kօ {63V_:Qev@e& V>w&yDKHNNɰSb@NPƊ$h  8/ zWX[iM4`HxRDEю{to^T'4:# 2VXW*Lpׇia|rdo ̢:hTGi!U[DneU#pU)UDzV]4*RҀUȝX2*}D^\&\4W ʇA7j z7ʤ-ih~Ar@Κ]KǦ]M[Fi '8WAHgLqڋ0q9Dn&ȗ|ƙP]gNZM}y&wƅdyf K +l^Ӡal1p H9l"Z$LQ8cńDlCz6KUbe LYnAt_`i ,ߝ$ZZEnrE>)2lŎL;@ATJV K, ϢG@OJ L{]DpxLLgƭK5 18cAm7sd: \!B}lؒ.fad"2TWeXr!=Ȇ#ѓt,kn<&F3c .ccG*>]5R>?<[M (JEaj䪦3nIN~4s5fJlDO"q7ߏ}*26"K\UBPz:Ԅm24B88%Q4y<| KI!/m0FSRP -Әv*NFs%qJݕP;l!˄o|woY^@`V$!3r])_ Mxx6vGd{S6e>3Mj/A'~j SG,Q09uj˗9s$Z9 Z~kU 5doy/tBަW"xQT1V@]pZ`uT R‘H=sE,qa^ Ok G;ҬC vOX,| :jHmVe0^H2`6o_UH53[E"|1X/]Cބ"2 bϊHHODEȸ4ܢN۸.-.v#:w7KP}iLUa:1V^adujXu-s׽!|GQm v0f2l]g>{CD(j~ Kj5hҸ+4'hm@K'rx r.g8b(nTH}5*d]^VZl?H29_~m$suUj_e}ll3[ ;|7} %pϱ(X߼y Cqzet@(+r2 G7 $KI;i!Ef1h%4V啣t09CrnW)M1XϷa0,-.Ժ]2!pm9nLVȊ0Y&%;'"UzCYoS'ծ3RQ{ʉ/8GlfyA=T&,ޜ3 M0eb@fבhV{HK)5%  3qvA G=np]\F>[¸ga㎎\iKBF'M1?Tf 8 \vvTShpY1)ɍ%ZI<>˧uxȼ>Uu*w K;j,!a[\ Y4UaJlpJ}ka+4{\vWN3ʟӻmUcԬOf PR 斑zǘ{ۑD vs!M=g`A '5O3 Y?,(UΫ۔MlwPDlO{/F-hE V VBgF7_{^L<Z. PB7%L6;ZlH:b$N@ޡl$[EVq8dc\ LqbϠV0:N`hlwY21fˇRbN7˯jF4a^ka+¥IR M-1 ]guz$ZZfĹ8$p<|lTX': : of !D F1S {E̙x\D;Pp (1" 4xx^]?EŶY'%xLb9s*'xAeO3~ ɍTyфX/΀ ߠv$A2{Iޘ|Nu̧E<t ޸3V}ښ:-<ߐ!^HS0~Rk'V9ެTs(*z˚'hTԉ[t*XQ^8کo5[7quH%Q[Dn֓e4xqr Qpch鄥;A(Nx9cv'o R;uƷgvoR X8e>4ͬVA)<*D'[KkU_IxGg@E?wT&Źa|jL  #D z=Pb 9L]5OQ;ʔn%0[\_b@i~gL`U)lR(2^=LJkiJ4yh . ty*[cՍo !TeOܸ-;G( I$@jݟ,Ղ*襆{^IpZ ru̾|5Sc^+͗LvF".GCgk#-LGv$[L? p]t9$6-c"OhJeg3+.hBd|܁L|fK"PK`7m =QtԎhԒn"eki[@SapGQؐ6HuuM{E\@ΪXs2C>n T=x@D?1mZ>[߱PRr,v`3D/R@ ~B^:*#BZ0T<#@:/ ;I:6gz(>`[BOHtK ;^OҾDz]L ~Ԗtխ<9kJ+A +k`i3?f;'#se5Zq 8 15ۼ/YJ}od#CD*12Ǽ!*0TꅾL&VA&(,4^an/S!9| Л?0 40Mt[^d0:_ύ2kSYF{ )GS\88D[C.o+_DD#{<Ϯ|3uE!z࿠Ct Iϔ 4)'fu2 9wW7`+n]H]Ȃ<Ժ9^^`TJcb4 BB0A GRs0L,S;ņ_=y}u'i,ȼ'sUQjDcVOѵ(uCӇգDJx?ׄb7&}:1ݢ|z?|}ܴ9/\@ wdQ&y5#+lUwz5Yv#s5L|ӟޡ7RȲV/ųCry˕fRݼeѸ@kzZu&N%MN(Z'L}N $ `N}PKQnUزMBz# EIP*AddP/\$ƞOkJ qJf(9#9'ەo#]cEa!StUG/l$ݷfJ Ȫ[9UM?]+&;>BT]+ q}m(>Ocf:6R8I͚|fTsiŒI.(ʘpǰ=ҟCnOi͏+҃ sX|$1)f pp?-?RWwux"<x@#շlg-)eY't96&\AVlOI}>Oϵw `հx!9(̲ƾ$ی3l=ǁ5x}cL'OCf>Q≫!`L8h/_YB (B&;,  tߍ[ #Jݲo N}'K}k Or6P+^ߍ)U&ZO2 C[ֺdCHxOJ;ӧw wvM˪/~h}9{:+QV(i)TٽoT#8nV'9t:s2M+kFXrF7:3/|l5?ϛ!n^J~/|PTk!Sy" v(9ө \s[+("nkoN% 78ǂ_4w ~3MKg,dLbn!Q_N+ qo׶?< M>B ؖE@;S4Khת܌,glt( pOO%sqiCE4h2`K_ $qE'3E(I|zw'@ KՌE!Tͫ{J$[[CX(H+<;͸ 6~=FL[pq8J!a nm %F̟+]ZZ gY j"i1>\q/+LhQ9C=v3ygUDڠmBl}@g;`-t{k`epP Z5@NeJC| R^`S^ďPQ%进v⫞QUt# ɘ j\u[Ym~)22ej骓U1J; ظbꨱR#8c5le3:xRlcJd`(RGr, 1hRȑ. !!\QSg 1aތ;᜗tHf#ە'r|.%Ҿ7eYY?XQd[&z; "Zu4_HQ9[+(;>LFSsS=$߼E1З؆,ϿE>729fWoC#$"M?#&e/$LnHDFɜc1 <ԉ&|c80 ?]KdX,?DCHh,fQj|À'x.z>=@b;uLEHBRghI1-=E>grwЋ7ݒAp-vMM9z(#BlP3 ,pv߲OUFv-)K%gͽmz!ҧ~hqCT;$l&<'RTxEbвcK.-mG˲s) Aw>Þ 5}Gz]_} 2w6s,@o \6jLTg]vvnآN&yv`Y?fLZ3 Kл 4L ;tDd,ZZWv1Bܥ@L HJUN cJM>IU[YppܶAz>4_W=7'uwDF7%S@~Z(@~vASxkUݣ.#Rlx}ңNǔuNfQ ! Qט$8АbRxq 6xiTʇhLܺOg|g`ou JK\MC4#:-E7)!ɢ_9gn$9 ~y*'B=rIYCC5UsZ.zk-~X*&i7 s?GUPKrkc}2+ߑE%||I(%8N0y ~vTcJd*to s_j{J8=fp2<͹>i,h>[\uHaq}(G+w.[Ga A60[{FV(jʸGWXom xl[6wܟ"_{0 p]w\+d'y=X:Ɍ)FdG*X[-T4NU]G(mF{g/91޲e rw+glBd8j.5'O)V~XSqր\®E;( M; ^Io$U-tYP9~T;#~2ˈtSʲh9ۛr{/z 9cj3}7)8 Atp]p !Il/a%G.yB R"(v랚n sEXxAU+~v7 M2>\E2 UїeeyFs赋d5&S8j:=%˩*Y\n); Kw]׉Ӽ-rBql<2S ENUJ$=҈BϘOƟ 9-hw>"ag!s:~CC,I:|q}%eNܽ:s+ m]OXM1rق q#OR̦$6> 5K:K+o#J͝ÕKv.Ѱcy,BI`:4~N>1_ej쬂b6< zm `7b;}a j SD%,& X#GU9>Dd7LvH %Ƭ:']mT,:;n n&TYwZ Jy!/?m20*3I;5IylтXkm6@ns譂BC9Yh8eTjeS)ħ2V &(V]6 t&Fik/Sv [Jݺ=-s&V"Y{vOD_] ZԚdG )M.Q_cd=0R:3қQ^1WMQܝ^qTsVC Reۡ79Sv|O;jK~%wq0ǵ./ |dN؅Q;oj.O4 1[s1X~ʝikCM%{)WU-[ .Fswa4ݮ8;akp+y!'(s`;Ͷ`p䘖E1@E=~C.FMځM0,cUH0b1O Ԝ y~- >HG0j$@Y&aOR^։1!V~swUYU|!vՔ6n5OG-`)|ga_GZ-vE+#,Ӧ7XG)fd2gN16íP`pT9xdk.YФ7sfA/&9ü`twO0ZO/ec e2j!::k3B@^>L%^u'[y1FLu3s@1:TLSzT6B^ϚPdi!FU ReC6n}(FF_6߱[.BF37К*4Fk#f6iݬx̳U&+F4*# CF8O@[qB| @HlrڟUtgb l2َ{VuAW(^c-4czz2Vs e@b##ٹL d8#ە0n-ߣVz ֞S+`nYGsɢzJ*z(m2#[nm՟poVTtE/V j9L4M,xq? .)LlEw׈l^CzBWn0ebyOnH-0WRbӷƓ:>*ztIN,.\k/-vz,XyYHBgCGu@+劭ФKZ}et/"_;%gxO4 s ~+ȅÐSL \Tn!j:1Ǒ!/;Qu26 Qo &𪅃wd[0182^Φ8} g&;T~%Q|eB_[23+#=.0"k|:U ]?GA_O"=4bٯU|r`Biu&yaV˟ eD}.i-p(t~cXZeF]26Nf>ddK 鵟k0%PN͹歛5l).!9uf;Y;%K'AyKӲ#Y0qBNhdiHƌ1#(}%T@O[!v 5qˊa⸡)'UQ=OؗJD,-offQ*ai<=mdXF >e:ʀ?,J^?TS)P,o!7eDzTAaѴFE=%vB$i=!HY:ОZR;UP34N{>sv ZR@#zSR?)!lWP%Qoi]CtV#Vu o~ظ(IZz3HG$e[2MX?> 㕦E^Gb*-lӨdQ2?ZFj+(SN]:&b82N _W#zEJ 3|5nq;a+TNCLt `t}8OG.wl%ncZ}[OB2 C1`ys/@`ɵG58d{7C)~T ?r[5BAcquezdr1Q "+0#_GQ B["%J;8L5Z*ʶ.whWϐD3 DCe{P~?`w:D|8}1sk ޹6&Ϲq'h$^?Gb+wSPd{QC,G) kK!n wK@nz 0/͙Sg&Rc:7c\͊:iqsꟕ6!+#3*n~y=""!ŸR-ggEUUۓkqKFѳV[p'i(B@Dg=;cfaؔ1?w$]dje1R\ٴ/ m~!ҡd$~nYTK'[}!B' Vf,X)~XJxOZ 3%+q+n>!zz僧Ҭw?Q_;-VLs W |(΅ ϔqGecٽuM BraiSNxǘtr5@ ?ӟ5=aݐsW-yVHlm?4o"QZ 0B,^ :ftl"k 7AYkISCm^pg ! RSؑd |.bєv }e\M+C,_~ݒ"s`JWU+dZTdR 'H2GHma8^,2wy *s sdö 6=!wDGSUhQz|0Sy e\} O*N 3vz,pF@#L2+OSƹN!'7  3tFY ꘏O4eP(с o ym5MBD4fD AnԝE=Pc+_&T첡1&cfeCUd'ψ+M%M:cNB%ΫjBTӲ^v*&nۿ0iFͩO!sO/fAuW}F)LBr̘?OW77nG 'U׷|wW~%ɪoI6rQ*^;Xː&ޖΞde|Nf];(Y%cE0*0[Q<ݛfpЫi;a7@ʃYHI!v./C (dVƖ næYH/&Q4֟˂^bLmrWGdcTYye`Xo`r/vC!ɺ  +7Fϸ@Ա1Y,āeb){Zj"qb_зm26Ɉ,ZEک8_F]"K0HσFa}(&rvjv+`fS3=Hӂ]a+J5)j0*kR͛rՉ%uYXL 4 j!8E.;/%Gf_2nQ_d435V2U9)b0ӽGe-uq_T2w!-k Hqg'K)({<lfv^I*Sɳk^xYx [M'~moc%Nv|}2_D|BisXt կI[:RL@9MNd'R=]pr5El4T 7Dͣ4| G=}%rrkhT{YK}O][%-_4">)eـ?w9 cjGJ-f%zlpY]!(ɱľ .7Aƹ⣵Hl xTܣWRʼf S>{UD؆%\>h{BWZ ,ZʯEՋMdJկu3B#ҍ7pB4OLKo==jl=nhmD2P@?Tb̖3Eӻ`SU!*mHGRgi~-<# |-SD;{ GWߵS:2qTRbZejepXzcDIb9YFe#.i{,s-݅0[ˀ$ ; L[$a\:ysVҸbq(iͰGytqB-I^LVcKLHB:]Yrt.xn@;oC'$:]S{Sfe^$:KW\UCh/2'hwR- VXx]6A^frA& i//N.Y7o_ֻÚT=B2qh"LPg:y7kv$܋l:DqM-|(qFvWu Nl Aڎ[{.WE<6Ab4K/oLt vzPW K1uzH"LQyVPki^#w [xь]T-v˅MJG:j>!7H){Dd9{ vwaȉK7Qn9>z@0Hv\/0¤urBE~HR g9ԟt[7A5 I< 6vjNK` _VկSf b.(Ɩ>xW^uAW|M"6w ;Zu28~9̋гN U>^ sfמ{t?,K kӵCLEzmLEтO q=Yׁ∼ Ze(7~zNYPl!ٝ*D8 X_H!bW$Đpc)MQݧ?>08C)[ Q4 Dwtdt/NhAMy:((f.1jvHDLUFh׎]Zl;\y2s [IW/We>& X`Hk|0cH-7F>M߽o k i496)d-o\I_[p(ˮN9n\ ݦ[i\iI,0,A)1X{{P$ڨaQߦxuvT=/-TJ>^/5hwRwJhBu׉#VN9=t ?C!NeiE#ͱn:γLE`ԎΪ܀g 3y!X}% ` 6yI-%z.ȧ[(34~ %+#}U-3La (~3p,ޅug>D58Q;H&Lwټа. `u<1/;D $$= gV!¾3z ׏,> e hС LYAӅB 0F 58~>7LLV;=IQU:~_d7wQWw>g@*yJ{9dnK9`j`?[:&+Y l'kvݹh]jdKKCDw[)FZREܽ3{3@N VUcrނ89;t:hxQ6ŽU8=6<ρp\Ֆ4Ĝ.qOi%@m5`-ϵrx T}k-lı?[匕NP$7[ja:=ȩh+3ǭludt[]7o\#~NI@#tA_qq.~wI{Aj6}-dϴIъֵ3<1}D{^`hG*#cW A3:VyFret#p^;Or*j!.+(w*~v=3"zj/nL >@'+E~'n:qO 7{eB$b(+% [PdBץɵ>꧛;NBZ`6itD{h_DVX`ˈ?ϮN߲"WnB2ؿ<4!ZJ8ar$6&U?47atc:}wSv5jx`[_-)YK_} Al:gs~+;i}NkӼ" rD{r^AuJ\ym]Ʊ6`]t"_O!xuޢ`Qlj=xY>|i()Xj# g|\1n~!` |D}UaV)_o (kVJ'Ke .vX;.gKƂ,%,ȶ_ĨA1ܽ!+DR@g _nXNn2xz#PhoT73WCOBvB#Uڏ \˄hgLwlwdlJTz8Bа5C:\Y G#\'}sV{eb)7)ߖGЃp+E/K> ٫4 Z?&/=:ؿnf:y*aIBqcO׶`暵 sZɾ3#v oXtb~k0b#aO66g]ˆYBw ۩P-B5xTfP=f ļEz[c_6N/ؐ(r5QXԌ>MǤ#ݯ!:jBBKuVd5?Z#_ZZQ8$>n'ZOr@^3A:5ӜWGl ]/QkyOQI>f %p`&ZrA̤su& -jX?RSni /?,2k|7U: (VPndG 5Ԡ PC-DYR8n'7c c 8|oCkKz &6zUXH i80[:3 <9Qk_]AuR:y\{oiY06IFfSE?_LM?mIQzY=_W 7LY;wJf7leG QT2P>;k;1ҘѢ2#|dN;b?oh} 1yi6~fpvV`zU]gQ䚉e\Z_!ϒ1gssLbLv<ȼ FFTR*_Pɀ`ִn Uc~8zW&I=ʺ! eWpvX/^1q ܕ7PV`B19:@8d裣/\Hcʹ{.7 (qD7rȈ9 ^fbBw; 긺%Sj:Ii|w6b穕/L'輘1XQmz6P3UZ/P!3Ѩ(EX:n ; Ao^= L+ϱ:`jQZ8wĒ? |x89BBRvU/DzM˱z3kqIM odqoEz% TC1$w--h5@<dh(}oBuć;^Y^]Og_\ Qô.ȥۣn-lxz%MҠV9zͅң.aE7?@`mM!Bc]cOeՀǛGrǖtzNѭ}1:SvFɞb]֕Sl3h #8ɝn?/ TXC^q|L-J4TTp&0 Zq\ G215vދ* \ <#G| e!)S z t KD{*ԉ!-7"4σf^a袋EמiG ENx)f#E6CON$hJƄ)alb΍DP Pw߅m$n`yC 1,h CA,>S/>Ӑkr\@Aϖ>?wiR(mwֆWV<1_8tfu:B}|yϬ ^_[RArg Cuwze7R?RbFOJzhTqw/?E=o|kBouOC[[$h2b^,4mDVM~2"Pj}\aOvAi3/e&}`ݰ׿tVE 7.Fԇ i.4j&HFOcb׹mut΢sf\|?w& KF6Tn\xQ|"~ $9ǘwLO1.U& )l؄w _9eʠ>k AQm)0ъ٫}\|U;s{ڀB~z}ij̾>fW(C/JfVTjxGTICtJJyXV$ {gXo!qe#ϗ QP!m%ֱZzI~kou՛&[wFf-faYkh"3m[_yױS?WxDX 0HO5-b(4%y#VYfľYF{\O(@ h@ 넵`܋K g=h`"z3\vo"E>J,D\*%+*tWrމD]8MB_۶#Pylx{쌶I<[ӗIJu O*%$9 ^{fǑ| 郁1D,Lov\0Yhshó԰`u߾3BմܹVgv9TiYp<:C?7:ش *f`> .:(PkoBUm9aIR:{558@+ž8bس#*MS~+)+\<6ˏH0$ʽqJ!b 9~ȹ麞yƐq͉_[?IGS H5D@%*$KB0=|%:/؇5I5n"o7@U66b0ZQhjg0`A27=}Q[=k8 :^= [3MQo\E?ǮqnL*݆'6B K}YAY _w>o(psEŵP8an*wmT~%`g jDTbq &T10TUQ7H˞B^vyG .?6X1Z-}c ;OMXb.[؜ Y>1loAUqPcJaZb D3 XډwN DF*<נc&J"w&6=c)cy,,fD!jYs/l@IY[^V sq;ޠI=KuS,;аd=97!{:P%3[w MQ?)14D.L%^K؛$xΓEuwAkuJ$嚿}!>=5c5HeugT@ ٷ*3p<]aDh{9A}> L* =ccƺ>>*Q07 6qW(f7FrK*tmĐqle+wȜzEB R&[f`v3ݗt@6Ri8 ^c0NE8aUb4]Pzx)[8LwјEA0p@Eo2L\@s? ǜoWUaȥ &u[BxAae]0qxYLd|m38]j9cmxa07.<8CV8xʞ栛vQb3 +R$۶oErHRLR0څ"4{B,>,MzwQKF|n!VOy_k ÛSXn7ʫ9>Dwbq`7$?< ?\ 9b0ƏrE`8&S4U*T / /%Ӆ.r<#S,ں}KwmSp=9oA-R {g;Qț|RQGڸjN5xjW[ 3wlG,@~_O:q;D[X a¦廪VA#e|C<r(|)jYC[(r94dOӌ>WXӸ{AbZ' #3T'FU’?AnV2X $dg %X PY EUQSJFI#Ā\K0 s_YQ /7ח }yUHY ɗQ'f=r8w@iNN^pSOWPhBrQhSӜ 1_ߔf+9vG{pN-Ϊ uGAT'!x61%* 9 poY~H@{pq E|W `jPLa 0res?O{Haߠ8B+8t5 뚞%5TNE]G!#O s0🡴(O8#(x =| ?Xox@,.ԢE+ak~6ZA`0%~^~8x~L2S1Fwy3QoodH`%z{vCkR$%~*F5ԟL=i$~P7^ Jc9%޵cжG:y ]zXp^Wz;?8%(ͨLVː݆eN`|Ɛ "…-~8߉J'(9TI5#Ԡ@I`!V#4U4׮}FqeCYgm54#k^T>`n8H;aP/"C෎\ GL2*&|[|3vC[̷AQ󩥷գy >$䇱Ø1>AG\CmNY3"x-\w+Q#nr|x> rVtkRB-ߜg0bab!ݻna$_*ఘtyt&[;~cm'Y?)@j:"zե EEh]+g̻9+KVç4g-LS $|,@޽g mM0:~;qpRgfI:H̥c^gMm`p ú팝$6Ѭ ݩd|,(r f xã,),L$]pL8m?c=5M~gBnd> Z'$F A[t'ə.@fX y) ѡٮO xljU2Ղ[- u~y&xBMDE9oԚ~~v2Ž`e $q"'9p$- @:mK@-\XW;wfw?Brm6]4BK̀<)U]:beSgSR&C^OZEnMoݗ."ya*\1FL0iUmWڢ&BŷހԚ[,_ o2xvqǏQ $7'qTVf g̠"aGh[c@ޒ33?Vji{&;57PB8m3X?]N ߰hdi7lETktZPuĽ rs姰UڴY{3CъYQ7~l@v1EV k1l$wbחؾOH]4@n?9`34,{U!,n* s_襥:/rU|>MZU.}\C\4V^-C"$!vx"̸xfa A::06+s ae_ֳۘ!.1MVȠ7z`)v_KV;&!0+^LR/S6yQ5}Z0}%ףNW]߫L`l ޕl+|4`wJWxONz!<*h8m37o@Djfo~_{XQ]&+zcq ,kXM}h _vˡ,)@b_`@FB rؕm!Zl16$ bӒbrY1qP:# b_}|;NvgQ-g9"[ (tOU3^@1HmrZqʼn.aԖ#+brzCrs\X"Jҕ0}6P^ntD.4X@Әi@K7Yj0@u~')]v)C":0&sIT^_ >2ތR+T]-qB>O9.H6ͱ=AD'Ga/mǚv$!2d KAo4|;1OU.QԣES(OchXgi`Q"pKV8Z)gC;-2]PݬSkߓΚ"va@Rb7 8`h$ۥj^suH߀7fB d$]>_0UOb8^vW5ݞcD#0My iɞ@z%=n+rBB!B!UpMKMtJ3y9cc^$F&Ny9WE2*CʈpTWry;'k:(1]ԖMr\y^ӫwJ*4Aw>9Ҽpd 9C(;݈%G휫D bCoiufp#(-/Γl1u yN(Kz/\zZ1ͽklXmR|hl18FyNyW4YO: X?ץɦc +)b`j`ә'H4E-Nov m snODȝ|QDZTY|5ȇ7!~/jJ2Η몮 "6h]9vD! !]rlj5VL {\ڷɏɀzV|0]s ;xO_(ϤዦLCbvEvp7@X[֖Č1U߶S=BѐkKs*6[DpÎ%}!#H tGI4_ɿm;Ud ʹL ;+Ƣ,/53[6G5hKuYO.MHmW*P2:W<P5_dNE` %@̪pglwLqU^)U$G T^QW}0M;*V-Q֫IFdwU4ia{OjhU=o:5QBGmzMWPV3چE6&(n ?[C֬th̦.` BDkb!5&Wk; d$4zf ii&T'kJn!> Cp5Cʅ)T+AP(8Z]vDdӊOiAS9R?!H|$@ AH/Ioc@;Yu#6S9$4`qZUf:P{w+^xuE+WNJ BH`7;mXBOγe&ܶjYwGR@5 7MV $|Zq+Ȣ˳L<92k#KBܓgydXAM.jaS+UzX\\u {74U;I,P~d).Ƞ4l) ?NVt{T R 0C9˹k{́_kHd8a'٥Yss棪Grdp܂I/r ܲMdG t  &65X7m"tO@G/ j2#Jko,T%NvyDq8e#kFFг!t,eQ#=G=7=?T|7,2Ҳ(⃔ՈLJ*{~*d d47t6y̅dDRjurNb(˭jCwgbٱRKzԻ| -Ki:^G,9z_]+cL`N]St(B5{QsћDF>7Z,s$Ψ^ZF®6y}0?mmb`uh}UǠ[uj(2bdh& Hwj0 ~+CȒZq΅> ^:ڪI>hVsm9ѿ*Wp$țuZ Ӂz{:o>KF3AuK'xʓ{Аh0fjm,or8M=sbR !hFXwsF,t,渚o%i(f;i'"Mq4txrx*Lʶ42bDDfo7@-KU?( N]Z* L,m*GU`gwr^"L >;ά 9r@5~z<-#Yjt7_R i||zG}:b7Omcx)Qd57!da2/(L8 k))]p<0 Ag 'Hn5-Rv,y/t0ǻ`ap*0973uk>wn2;)V2!X8#1 ّǏoʻ`غuZ0ȋya`KC iJ A laUg#+ l[}XcUH"HAٿytH?➦ѹj*7~w R8V +QikhD [*s( ~rrU,O`"Bvgl*yI-:e/GQ&`g> lW mh&N߹gລzU.m\jPˈp*-,m5{TM79@qjpiN[Y4I- Q07}YDCtsFf/0!6d{9t{WO @) ,kQ nỹC+,8(z62l+67ȽDv.="\v6灃M CDB"X<m掜MTt:|;̟1W$ל% Ƕ;=_?&I{uz[*qmg6)lCSC|~")uS]8j:,o\w(d{\(daΩ*31Q͆st.3]qֻ*LaBWKBe0>@%h{=zp!C$zC>; Xaor.k?(,`\|w>}9"yG!yoV4hS%& 5LU7 ٫B^ܮOS ͕ zУF1םK~~${93>|> TjAyN:3O\^d{lg\ڸyԷ~=_Co_ Xn WO~5SLS+6VHwԗ+rAܤȷZs+O3Z d}G`*y`H1m:KHzV;uA|QZ f ev!o=es5$,t]/!+=hɋڂːiVTNI92^]l'*p,e]E_:sėޛMH I2HO-TB$Y!' Gc5L.ڭ2miEcoC@y/jSwg2V9د';+o,V\_|aJ)mИǼc$q#㎐s<>ԉ7uD u&`eA׷ԢZvϮ%&";ȺE5nAjR|wMGK2/'/A6t 9eǏV{n?WCŖ?X$5a}:$eqSOuL/sIa"2ݜ%('R S=[H!3oS̶7n13%ЌF~9`0: #/:&5E)+Q&E}{U 8J8`6b1K+ T#'"ʁޒU-9"$cq/V: qYLbtpTg1~>x$kv.SPlZI3`,,Uy=N0LSxcv⚻-ڸN8=;tc"w?irhG$܉z[w5y{ޔ/wgORǒQeB2 7oCPY|+m/EÜKECޯlr}gwlL^_oEdخnd엋 62~*-||X*=kw{&,f~?>fbw96Ѻa__ue`~/فuNiV`43*  ~!m0 ? Uc_[{;׸`G͘!pX ó#㷥ˊ:DkTtѭ;^IĦ̨oM~ Xڃ0p6T-Dy4s RһS(.[>`d5Z23\n}R02o׺S C % 5 }irk%Ey ǙkAG*egP5v}Hg燴.'ǿ4u2EͩkGb3+:e]OR?oI'c/NkA &I*Wq7FXG=}fbQbMdPD>UZ~ȽQ/ `x/ XK0|\@MІ1F]Ǚz%z*ӉyFY 5)4S{bSuY.9P/}qv2FM3)NTFSZ=4$J~R5R,VM9KN%X nB Z>]%@O;E B\,t.# u`1o %\$ٛ(ׯz>lH00Xz%(eͳC VPntެ+DjıWX?E$-_,юY<*C.93GtW`eYJW"8jJֵ[mTW-`t=! @j2=hdҒ7D9O#}I@~` i?N:tOl9r ϴ/w=x?&m7E>7Sp~Z݀m5 >uH+b {V$@("x!7ni7۔j280>X*.~r@-.a̜rn>\^x a?&NPE4MF\UcW{{'CzM9p#tXX E T{`W >o`Fzze="#2zVYJPT~Q(G.N{cs}s!՛Hv+9epWa^Pʵ?KW-ߑ<tc|e+P!J-UnmucTxrfh /n0#PO;%Y׭Jqtli: l|"V~=`#[[0;F.[m#7#2dAH[9kaIDtYs՝ǭ*,Nh8pmY>8gAC1"Ve=1ncEG$l2ļ7Ro)J' BgKn) =VCz> g%‚ )aCVk8dMמ Qss{\BGc0*0N(:-b>Y6{+ϤFqC҂*tbj_tV,*IC=w0Q7#C`5p)}dkA瘟h'D,nvR?UrodYmNB嘑VЇ,>cVP(~SIoB#oO_{h"{%oA`e~❦% `':*; MQs&^!?y.Ŋk(բ20O^w'Ǟly1};u'VGs2~hRJY Of57- x-_$~^z]{egiRazljbG5B1cS6ۀJڂa8Ҝ_"fQ P Yv9͐kQ\˪ l甉M%P8k/[+Ef\ jAA@e'`iꡝ &K0 ~.G%P*Ő`գH9"R3NVk-Ԉ*GG (1`vSUg[Nк*|f;SGY ^ˑqvr#٣ 62~!: 55;HmS##ZbN쨍.65`9L̟Y'SSh&P%9Gp6 |O3waqyO)陬xluso]s-& @񘥷A=7Ɛڹވts gV7*d攟!*Ƹh$<3w~W\x8lhSE- 7g4&CTtK_kNi.4x lJҪq9I $/LV}z3i R QcW7:J~(I_Bx':`.z$7=ư_U;}6~@0q# )Y'"#WςYKBqK{lE bU dNO+Vϣz.7LòJOc*Jwy ~YtX^7h7"]&̞"QIy?Sf#VjvnZfP{[+<,鲰FLV)geO=pik'Y+s>yQ$RG<ٗ3#@LۆdJ9r ljDK&VwZkw~ CE*R$BYϣb! )M-38HӠy#5o<%ߴͿ˿N0}J LN`.D!fmZil eO+zK4"e 8ɫ/jP5O f0q; hJ;ˀ&fuXY1IW+?oX%LL@Kr:bkoG t-6x']p`CqƙvQJFV(Iwh*O:@Qwm͍>qFjJ6J&'0tS;T[k1U :$`%>. zk?rc5,ˠ7J+ПKN\KOO 1I|as=+t@L1{rDeD'&}i|sGT8 #=*.eHظͤ)~!e< ;ctjoz?&#Je=vo AL_ea{FQ:O. ہɳEzֹW4hgƺ id~)] BSMSȣר[ jFyZnǖ!7Jq9xQ7ӻ4 YƘ",sE&_'Ǹ ;cAԇx.`ȵOw|`jӃ)cR[Yw+ na5fqZ+:<.yFceeTN'GU.ɡg[[(5vFq?$p5Yf芏e7*`ڒWφ][VEVe rGТfIoɌ;7܆<,{r ݷhCgFë1$(dm)Aw&2cY]'-3i/\be>.Lј:< 1c)6Im?ts״vaDQe4okco?y+m\IΘoZ(()6yIjPP_JYu7eȹA&}~}PD|OE>wo'_|׳V`3ɬ"G-DlvGuTy;9znMn\귻av>Ȋﰴ KA 1(>H6TpV ymXs>Cg"%U]ȯ?rH 9D {JWj,u 3cl2ՓWaOt& |_ht8:$ecScZpoݢN/ "JqV^[ubDwVG S03\(TL? ošY8%k䨧=GUO{~`| @BJ1{5PGÐ&dGά|pi5 w᙭O!^-aoAf8"_C<6mP]Ukbeh ӊyw޿R=O"%}=E{VKAX*G<綨Y(I\.X A*97ɢPUYXi}gP5*Ā/v애&30>`Tͮc\F=NmTwֹ֏SVdYd14ɤm_0n'}AF u/Ō P$^in>J P1%p[M97C=XIQ\ 2n'L1N0d1#qt ◐yc,8D;bp6H#yaC [ZB`mȾºIO4Y>j[-Cj\% H(wK }($5tOS 'SQ42Z4zקm)R!,`$'Ŝ0Q˶A~O̗Cn]=#} {k~!fee4WЏ9.;7Vx:r]=lձdh1,.%4:&R7%ꩳ0n/,NmG~*]I.8lzloub^DȢޘs1g`FcȽ->8-h eFpD3o;p"c>mV[L_kBc^<O#咵 _&[S>ۥf za<&(PX>B#םl<CLA`WBC:-/$I*^=KK"@\7L#쩴ElN,vx}#&>9@kpٮle$g|j"e$@Bq'Y Z[\wO nVa4YI+b[Ȕe b ]e4k+r~vF@zd1렠h,FMt[ AZ]kAhOknH$0zde TF9G,Ţ".;}i#SJUn<u8U5xJ(Ӈh.ʟv6eG:^^N}e؅KhGlkWFv[HLςg1 XY E8S}D2Cw@@b )v|KG+JAxYgՄmVC6ﶁ q.c=o |z@[b%( ۉ#ݷ gܶq^01w!wïFE}a9纲J4CTP^L9~K6R>wFԘџS~BV4M۪K{*ͦ)I)bkJ_=A![H*h,jEϹ Zi vgȜUJ uyX7 hSIxNlbGN~ `L1le`)gA#$(B#,=ɡ?,PRXrF8MgbGmqz#:F5t4cˌkhpA,mc~fM3 wJQb kzdBK0ky<(rnbLfr5g@Cl1g6aF1p0ʠ2$+Qx)+oDVi2C"u*\8P6=]!AI{p!aOh %qf%;m"LPe>'yr|V; \uK`C1 ûk)AQzD_{^?'{(kfusLy۳9{}Lkiܩ-SuUgHdf "J]N5pG)O<O-NvHzr]֫d7<4R d:_L{Wxr{܋5&aW;B;1ţ!"<'J{БBb6k702駏{j%[A5q0ftP~uث ~|nHNtZ9`K;]nm{+zY⥯^>px>ҡ:|9Vgyˤ1k^/ijhBt0;]Ȉ r0%9#F}^_{*l9ݵ%+o:Mz@#hsRM 8*D`>Ǵ5c=& .IE7[+5R>ګ4 pOPGQ!^:Wmܴpt ЫFC mZi ܌ :f9 \ó#$R×6j@`@qK)˛)/vpWp"|&7ha cF MF@/ קBTV_D-IVI1"Rdu~M+]G@Aۼ?ּ%Z̏F~0qb*qc j iJ󗄶|-;/:3-sgiDhhAY?. ר:ʾPFr^ 9:Hl ZFҧ&s檾7 rM8sAզ8i6?,/2ӞP,QopAʰ=LٗEZ檺l= #٨F L@^̻fnOGpxEwM:!O[*Nڽ t8}i S$98rA !"lցTvlD~N_f%5xAlS&a'Mڳuk?B ;(aX uT 0\( qND hyx_!mg֥Ο1=5*8E\ X-|sֹoYoIb 4zڶЯ4;]jf Tl{u1>LY$UP?b |jx7a*?qs\ W5.֓I\ L$*X椅d_;:mA@YR{YmӰO-@=\~k3ъ({Ż;I5 FI"j(fs=r#!P`h»pL.}1b`]x61I2P~y= ڏƾ&5G7k,2MsJÛW΁yIΨB.7(ЦŻan!o;Ix `k]ehfk}C6z픘a^;w1>|ܡB>KL8x[v5*8CK<0T%Ny($,HfNU4!ϭdyGw(8SiȠMo8vG‚elO0> :BPPcZIWb}\(fWa%,-۠+n и͵ae1i%D9V!yuj3o/xtbM(/ :4?`BI(Kd>凰oyM]3:M:,]_Nc VŚg1i@IHMi z]nYk(ɭw9ʁ-~ns<;v -]u<~M[цz9 *:>(#ߩ1K7*F;;Pg A[ ) 3,XeggT ,3'\!h{P V[ÿ7AʏGJxcS4t9g#g1?j{ḿB'E0A#*>[LsI$F[[*]I D0{@ Ԉj `^xXRmI/ISoE,~Ae*x_sw]MEysĊ18p*"iaF5V3cMCq[שּׁ_eKC~fn…n?Wk[)\kNoLBP˟]@eN=t7VԢ^ (H1l~ktxdrŁdsnHG2pW~GA v6Y9sFbWDx- lYEv,:-h#Vg-lvU6Mnlfe VI+b 1y+C`,ʣ 2D < sG:cnc EKAp8R 3DImm3jw6N DjۙrNoK2_F Ë-ZDmѷOOkubYP3ܺC}bSeJC"[* @7F:P:z-ڞv&R!\]&C»љGбd&8kH6x̢6:`B6E 4 ChPOZEsuc>)gS 4/uR0WL;H 2t7!M V;o'"Qio%'JRG]W )};}&T=Uxu}tjZdgR7{jF+Rv;L`Jk/ZxQF&LB6- =EEҀzzr[ ]Wlۏ?'sj)嗢32Lȅ%N͎29qzeϰ f7^B6{GAQ dziU&pI+IV:빨tW0v a 灣v  VXtI߃ȠSB'-%κ圫a!A8KX6V@?ƻ1Y5Ӓ m>RU͌{ `i\"dT8lx<- <|E P_6&j+*kPp{j֔YDs{x iv=FR'U] - /g!`\.W!tǕscy2 :{ 4'Y 7zAr{T躦N`{Λ͠ҕ^:ng&ϕ_°9JV<(Z;avv P<9Q.P&*36HQWA=v휤3Oh6h!VAtA. :nѽ=Qh7b3^c:Wxd#wn!wg([%XSGh+".KkEk#>tꁌu-<Gը?p@+)'`sTW. 3n#|0UV1Du͇ҡF?R~ை B5^Tr՝xQ:>z` bq/]aNVBa*o6a1/ɇЗ;љsuٙs'\]&/8*_d^7#òt6|=rVRo+͙1ԟx)]/D%/ 7Y 3ΈH6ˆZlcơJ<Pjzes*gO(sJ1 S`|8.^FOkK;&[9_B*ŦJWd1m}}LYS |)MF6͒KI,5i2N"m6u:{k!o@}]iicN 7yXZϰmQ͟Q{pJ9dE3m@Oo(y"|S?0VEތ01|_ҳ.\Z.ګx>ruE^c#p{(Fo7oL ~!ƌ5ܛX.υs/-C7fCC*7f[x#˥;m86vj*RJ'-P+ uM׎SEƅhQhϯ=k+MY6Ciُ{iKM3*c/$VRȗ.fv\asU<uF>[E &Oyk#\"1 S!\!lnƟ'A+Ef!O /bb?jYE ")Q(/T#H5[ q~וqb=Z>'x1}بK$ R|zeY=xo_jh+JUUDضJMբukEוsZ* l1@À~`1(mdZQ B_.f2->~zo%[Jqp{:QawJ+Ufw!N?aCX(ާB9t9HZWd,Tgzx?mpfu R,RzU{<l+Ty< eo<%8:>[9tE~/8YBs2[xIWhQֲv/a-#009s6TѮ XVMњ mo 98\)}6jDf%'T8i@4kOAbt1Hx &`lh 3Lp@8@t  uR93}~,>pE"A|#];B]jk#@@wRF8N>6 $U9X8V0 6G^ukP&QDW$,IOx9M$m?p9بkp|C=|QֽvYHsfo↼Kg^~&%vqM6YC7ݙz3ղ|>7B3a*]~(>2XRaM]IIUԁ2\ UeTsCTeގl*0+=U8ҫK}Α܇JiJaŠ΋qf?/"VDe?w$(%*OZ5Tx7o*>bA+H]g:wǼ֡zFD2[ȞzA +)ڡȬg&=0%>܈S'0^r(*k4Z=Ü]z?Ѭg1l}LSfq.T9Qyg͈U]j\C0ݕeP\pҵh%Ѵ>> !n &yFނXC- UY{9K$Hh?&D)Jy#7$eu.#ۦ!n1/r`sTz}}l +Wuh˔N(i^?` l+h8ɿM47@)~܏u5F-?/DRj׏iCZ֏ aH; ze` rC{p#BgX0D%kED#>@o<Иw]֤J[Ҝ>CLß8J> "R:kIyERNV@ =DIeTR&l+^ƓpBCg2Urq{%ӪCIŠNdҋCD c)U܋wg‡aLLx?|0n t\(Ln&*1n2բ(^M #s v"J!8e/Ff-Hc\/eVbL0ӟ[˝ eLSvy Pd{,.ns_pK )$M=TeJ8{/$]ZZ%f$+ifݺ{ p{T($[~:$ -͠RkYb9>D!Ogdji2+ǘ]=>-ﺷ/6${QB$BimGX#)hAi"+qe!|1qwƬAf:%aJ\9u 2֣#XvQ+*_nHǘUx d˙]hѯa// A%W y0]T_Yyps.XKAas ?!jHisZCꬌXt_@/ PYO5Y.Ζ4g4۴IG!OjC[?/s4wޓmy*DwVdUq2.5mlm^ NmcFT˘`j9靏E(t_:nwH )t2'D.%A`ݕRE(PʉIa\p_RCӄz:^1 zUVsWRm6tjnD_%ǠW+wx ڏ% ) OಿEUB>A }qZMΔ/6w麕]LقF(@a2Kjb4*?׍>nO(N9p$!>A9@ʼn+8:A~skN)rEt҆XF.2]=o"(F8.2\q4Xl1^Io>6ܥ=^qјӤ|sSltL}X'ѓW4u+I( rR?[J/hY/wz_ 6&SES57&7&͌0 ;js8ggǁZ5 l ͟c῞p,>`mA@l1> ?y߯ev8 0?&M B X4+zP_a$c L< \`ˮ)VˉoToGȤlLl0H&9S}>bfxTIx(X۱-ڹOb㦱&zxybfUL:طJ4C-~97nY }`@|Nz>G? ^D#~5 g̯r.3Fǵx3J\&7gFO. b>4r5jh'Hb \9 6i-uFǮ2tP>0YȞa2r[?~쾹xa]ٵ㟼oI?euؤ;Hx-B$LHT{i:;mY케4/`,}d7 "?xFo{?gЩ -u#srq2=agaƴƹJu1U8`T @}0dqmC)hT'Gh<īR|qOØ/f_T&ܦDQ DqU6C1堓;GX9ɍʸ`-T6n bRGsB2PARFȩ(OI!X`M'2n_Y)ݏMSWcԃqi"V's?2o\PbBDJhxsTU+@ ,>w‡>Zdc]`hv"oʊFHuۘ'|'$jJJo$`)< 6sW,cS!7k]@`КIpt -% cS9Mpt'dr@v CkB'YZkFiW( x Vǔ ~ń E s\77rVH*m}g9jK/K0>$+FS'/ia|KLsߗ ]M(M:4kv8ӄ5(LϺTH`؏6D<#+-ƞ;|!Uҏm֒qy@'t'cRڜg o~-́ko W2r:1K&+hH,bhC`Y(go^7O'f3 n;<Ln(,۹țBa^̌:PffZ MNRgfl+Ib}t:{' }*@j?s`@ /$*5# adCd(Y67r!6 YBo6T]1A^ WXJ,.$unK];چ[Wr0BjDk|,P[CHM (RNEoD0kƟCѭ 6aqJ2N$=Չ?Uj͗v^6~}OzxV'[smJX z9aQwbIH%厀rRmYM,()Z>`2ƗB,u \"n[sՠҦ̽|2W>e$?c2jrX~ L%Ap5gvD͢KMI{utkGtE3&2a* 1^NLGhS׷V$wp+B84Lc@{(܃,%*Fzs!:Y QwaDL%jފj23R6f"^Ls[1mXaaa:t=[.ɋ&qGQþɧЧµ9Ŭۨʛc9jD&Rg?l/avNs_Q]H@Nh41mԪ_w)n,surq4eabFs扉›2Wz1ŝW25HLo}ۡC|tpp屇I0wP")x滿!LJl(P,6m|eՊßW75+H^tx]˷&wtWBٳZ8;U$[5 |\9>TQ/B% $v?ɪl-ÛW;ZCWK.C7C(D6paCyӗ}W#3x=vF/fEXJĴy)3K]Y!1M5{om b !'= ew~ Fh#E.Im^M()h5hiFvTwIrC[#8s\j*wOՍQGha(i+&R۞y ^d˩K__4P\KNTq>_1Aƥg.KF#e 3Q%fJ<h8o`䡡cMlt%=I,GYU^ZEpri-ۋ#Hߝ B_cYYy=!Nq{jT^%`<2F/&`1z FssG0'ڋ:A4ik,wE"&*)?0ČHh}xۋ=-z\&Wg[J k!#SSJ_rH#RJraG3G<ꗄ(gTp#͝?uyO7 RԀ{%MwWS:Tp#Ai@yK$էoLe>Leq7AɋL-sV'\u?AϢq(jQ5Yuh;/pʤ+C^0>Iǧ,ձĔįp^X5:2SVH @m:(Xc洰Qı>|Tr 3|:,&5 P"O~Nn"ch KHʀGV>(A&xc#<s|t8YgȈ"`˹Tjd$&}l8שH/gqgj/pl=5ϋ"с IuעK9/SH!ZNP<Au%Yr L2"Nd7yWP5tMn|3-bjk"R $D}tb-! Nܻ̙ٕ F½m>$,)̬G._@kt@d0ỳ=ت%аE/O dƛ 39⌉D&#m<&Er OUbWuPDmUۉ9|o Nha""NnY*=Zc M` uq~tm!T^ 0RfG2ڲ]@+Va5Ucy@/\yAr!RJ޿g9c&#7$XoΘfzj:Lp0 dL*La!O9Se"H?|#g=!JH% 7Nj&4cuj`N_G!* ={ UM@n=.ӊl38q:FS2"⎿~;k@U q-nPƷ?}H H &G29K 㸈MIPt1Q)o4S~yY=1rՃH z@!$Hȍ~oW,Yd Vl=HM >bYjPNYh\~H2+MHn=t1`3R3~ٴcp 9b[M A[r)d$-@WN3}!IWZN6e~̋'z۳cmҏ4x`Ǝ^AL'ttf Csu,#긬VgIsX+3)԰6MQS;-UTKN5^-/R6L#Pyֽ/IfJdKz 6'Y3BoT*K eJػIW۫DL`ez-U~e^#!!ʗdhRʴ/ 7}8 `ն1زpjOg˺Qe$k7N`LOjXLTz4+t?9qhi vҿuluX̯dok̊=Yg@nq, nh7013Nw.gS0(J' %2qq9-іl/٪a%}hئSwנ#2='(\ αsæ`00o=z/zXM_4"\|hI l bfp¨ƻ;ADoKY)hG!CgIS77|@$.\Wl%VoUҘһ1o֦#m0C3fj7wi@.[ ]$tFLzG7=x;(j(F`YZ[*|'K3\26!z)5(O3-l Tj;-o _4L;'ap0Jr%Ca_d{ʼnO}-hC(ώd=j5;DűGyit Ԅb!W6}O 'V uΌ!ǟ#EfY,;g7I [5Fi/BG;8Յ̚L9^+ŪR mz[tw(A$6wUP^X9^99 t vQݝF/ x#|!~#8=IfXmN! cwyǰ3\ 7Y3>$.!, z|%dX87]?(J@< rDUjܩ<=?K ,^B^O M.ը77jr2eyRES̵$xAB.C+v HE sw|b41X߸3%3y5*06gi$%a<|>0VN0"͈= eg4uzђi6*5>r9_6oe5 9u9KhdXߝcHkFѫNmz5wz'MO])$lN6K?b:s]$*#!iK]k=&{'īñq_nr3u^"և8Ԋ$Oi%٤bqVfPU“)íT!l{hS#E&(i_v' ԣ>IZrbQ6-['6&u0:5tC}^ ŚhfsR߭<'F}ƹᙞJȚTlB?g都<$"5`|V26bx#@a~N3 )O($}M.U]I_>?zwnֻx!Fڣb?<`5c4?HI˶u326Y?ݺtd=t<`?#a*wp"s ۰m&ʽ`Peח7ÇRT\ԟmĿr]e!ʿuH(yM 9d.^V-^=W; o&} qO=E#9ߩNMՎǭR 9[vq{ɻa` ZبH<;3/C_Ye_ڻ&X Zbxֽc`Wߴ#'&\zF 7¥`?zTϚ)0j)g?M@̕eS͛OZ%\m`'7al#mNVku3@5՛nX}I$;{Ė 9Ʌu,+blVeA6x:@kR6 pr'V5;_юq ґa۳/F42E:CPqD.P/GN Fq[܀1 —k ƷЯ4NY8ZY PbpQ"4Qw͍ b Fu:KeXR&a%&&3: 3̹W^& <#wwS&2\{吃doLu"̚uyBJҋ;(/nՄPitJ ."coJqpY@Pah]V:D-ct Pw (2cP3Av*FLQd]Κ׀A8<-TBf&ԥخ9{WI,֭?s9 K%޶r9f=טBx4>1hZ+ Re}=CbaL,F9PS~it ϼQ6^bt'%,;p̅k(f8neS7Į'~Bژt+=PdD~j67:%̺|lЄ28qLP:.˜vIW(c̻JI #m\Oj_ҦBOvl`/H LDWue*'T{VQ̣qՃk(|[IØ磃犚MT2bG+^3I#^g7EʮLDnR ITH:ёaW/i UQca" yOV*C9,nXE2r o[!.H[S`Cw>  &8:URMt|M%dRA&acZ-corDҫRT&93 Y1woO`7]ˆ t0ljMD`N},`[$x!@z Aː%//_|ij ;jMl^ԃ&eDPaє>qQBu?+]D؎T|<(+S+`+LV=Qy 5eX&)GGލ=#||6b?]ġܩ `Ö3\lܥ60,_t k$tNQ5(!F~{G[sI̠־Έbifw_pQZ&nmlA>:I~ nGYfSi0IaMZR##!w-6k>(d&2lRzOa R_-]w6vPmA`?݊ ' `QH^/ϲ̝UEOW>qMu32x @φ\)\#- P.1)e@UX̐$3ѱ{9R < j?l8^>p`?ki.[XfI RqZd^L&fx8`qSO:rb^)=wHi:IH~@n&DIeсSL>~U1ZZ0JVʞ~6^\jrs,}x},Ґh2hL*;ꕖ Y2n]cڕ5%``lNyYl磫uW1|9.lM"=?4ϙΔkGA"y5U*) ڥyOY/K -r~%542GUHYYg _ϻ7[۾L|מ9*]-6e7 L4vp>ILarjc7]wǻ/eNدmena&;569jM@B 7g1kJ!̺ ~vC8`B΍DzaGDbp0!4:uF.gc''_ +pz"OOR9 Xƀ77گTe6`Pg7E;w8*1u[㋮%+'δLKKDC.eό׭=\ŧ0mDKѰx^h7'lnEۑ0~ pO`I},D*n ufǁ\xRYR=']k8 gu'E ѼiA 洡!΀4 C"4im N7N9Z`,G=̾W%qWhq[.3a(pnv/24-b} h"GDduәφ u8 q}T0Z"=q7NjV;Уݗ$Gh4Wo<a_Sn-_Њؐ}lI04{Bb̰SӁE[7 _#vFR8<+o-mJz>A1>IDDF0kAe.p  ^e#_;A+AjxW{ŝMozd;|L}duI&hJ!O/at*P #&ƻ;.kʫT+@wdA鈃ZӨ1h"xNZ+j/'aTj<`A= t*Psr$O{Du~-Ŝ%"v$ȴ KXHUGca)8 l\N:2o*-F~5 JQJD >,+4GĪQ^:@D;̸QO[YTJ[js3*@Y+Ŀ}f '(@.HW9̂S;K>_gA:VWa7ARyf΁D2 ]}wGTW§Rf. ¶i1kYOBU= `pmq4E a#h%tY23yRHu{8n 9ز)1kbk9-)PդVhzTϭ#UwՅ튘gÇ ThX)ϗhN;AXDb98j+-8iAqcŋ,3X,D[g;;X?VXi=@c 4K0F_Lmå1?ۑ)|隱KLr#z^(xm~vnTf6 e86ht]aI')tz( 0hWkp<^%9A -ӴΩ|xQ VxH.r=ЁZ=2@nݰHzY*+BJK|:[k3Rp"4EƢ:OZ8t*~=&HXYHc׋L*Ojr`y -a@qEoqW~F2Hj W! U7[EvK]M=\eKs Y/ 4P) ?5X~s sIm"e;4 j{N)".0d}ԭ-БwJ1)6&mgno`AJz(3w@t8h6pYwѧM9sӕ7;zd%*&8VxtA y㳫8}+qq1E[>ُ2ne@"!e:E0]Qyr6OJޭ +$5{pn͌_ hB_gU5Cڔi>8#O.>`bf]D W& LHc vëE`"-[؆jd|/8Цϡi*o=JM{! 3w@VQ-1"z{rfO~9'M d.#, \] &*E rYVIg-JboeD_;LVfi' -7W-Zgi1lf{d/LA *L`X59u N5|!8C&؉lmLescӰbh2 ~0 &QmxOdCä>.Eō#$9e[Z&u_'8kFDs218NꗋzٟDl2w$c ̱xt4@aXTrJ4xW}aWvDoOӓŝkJ ͘|3yZjq%/¤51T1#_dGD3O[i P Dy6sn'=^4t\? gnN'uDn,UF}惀\DL}2\:Rm Pإ'l"ܧTO5QAf 6iwREg.b ՗Fz~ܶ1%pj[_Sluj5+1Gw2^\78I__'ݘ6&ó'h 3 FahzqŋJ11&I,nhټWP v~^G!ר Zf#*9a=0Uܓ\dMsLS'eǎg7Cְ]ْDO3z>hi?9pobg ;4!:own&I4 $>ؠ#A"śhV3aUU荢W` J;MIStv1y+?!QJmi׈=Ձew [4h6kv7zKlbYۆ&ʾ4ǫ rse\Ͽ| ,HOިƼw]X0bu,chӈ?H  f$~֓{/xdwY6#uEQѭ`7UCjAU-"N|baF'Up'{l~FdaQfd8Ku۬p!} ?ˬuO/ @Vr]+G.jFH6 pjB0p 1:!PY'A߃(s͟INf8sZFvU&l y#P9{ vCKf_֕,LU~P>@"d%ITo9o]+mQTm><ԋe0ܓ"S&MR*(fW۞ñ]5%ea&4 ڊ <}13"ADwxAʝ@ %4`aEnjGʮr.?5.%G7@FH8ff,o:"Vwʜ0v_|d0b.\0eӹM+3\,pDd8n[ЌO;Y܅&yd"X]S0۬ރٛd*}ӂ]`L3_A$%.nM^t 1sDLͮc3gEL6ZPIδoӖ_i+xO?Y]Ȳ7Ҡ@G=pol]*R~eZOB$t0_K/ cW}_@#Wd0Vq5) -|]З53eb1@b@.܃@؉t%VR13yI{yF+8UTO/Ak T !aSrS"x+( e}~uܱ"XH=$1PP(H@bMFf\ XcQar&mB-FQ.rcPNo $$9-À16W!i^P4zZ2>QBntg7x;>[`4-VEl&IzE!I­ zEC쬛$4}jvdg5x>C 8`2*|Je;Pة3> 2 )"V"VI"slHlY'T.Wg=p?9';VLZ:mupk&z{{DY{>Q,^dӲ6\ 6J_aAPd0Ja.nL,X>[!쑁gຈ&1;!!ogȂ4T5I sd^ eO(ʹ>aERAw72O7ѿoQbϢ6 DQ3IfƁyV/DMp),F$0;6]vDĀj!LWh B@ܤ1,2b G1T/eE4U/˲XRT +^K15mv/مe2-: =QX/|[jǏovi8S-@OE ~#}Ѻf51@5ik2R1Rq΁a, w[XN^G 򂂔x3^'T@Z[pZp6t 68cn/ 2 G csHMN{oT G3;`/ a)(6vr@G_J3qífH*^$Fw"[%ZumQS&7Rb;ϳ{+P;_\d;\>{Hwx"~n\WԓJje:LLo'R9P#d@[^*={ 縴G"nYltڒx ,(1}"G%c3\NM0 IE+<;M.Fh&3{NA:Iԡ:vTiP*?:aʽ2zi姕)}ځڤ\ǨŒQBDej2L1]T=fZ"@tiihC#٘6N~BcH9y_V17oNfе |˨\RQʓM&8D .A9`<~ߚx+?jp5;bfsjPTc(BS;ukR#MqmC8#]+-UB/3WYEפ5wp:|Lu.b;D /qaR g=^eR .@0"34qԥ{ l8Nbv8X0ɠbN/u7(EquQhjd[?&2̘!7j ^ `Xv|K|fG CvP(Hoyx2p-SAҪE^ F8ՏNӬԉ]=[Uiڽ܎sq@Vv4B"(âwEtJ0wjn4ˏev(m;antۈ 9YMR= FУnƠp:/Ȅj#X&_Y9Ɇ̪q*)%⇏Zp:sNd| (aoF17j̝ otz}`G@)2w[g>;@t/ Jvl;Yehۮǘ]U(AM̑ 6P 6P5(T_Z !+|_Ӧ|s& !#`F@V%i{&QYXDG1ރ=' 2@w߂g7&yJ®`'>E7Nj̜pG,;D@VΎQ:[|l.HQ}Bk 9eib95gXgFD027OH7!7bԕp.h =t꾖wltǰ­nkw[K 9_@e?clnT*$A<{j{_ޅviu}禙Ofjˀ v %+eF$&RƣcbZN"s=+godj 0)ozHx\:1E㪇aS!gU` CNZ`XKX& f*˗X/8fpfHX0B|Ӭ:83y F{[#>ISW!nd>"/X/ g1l1,g=ݱxqG܁([!@W36Pj)GeNP@_gKtIБ_P݀Bz7DbdwJ}=LreMbTBi? cVQB"TFBxݓA ^l O0͎x\Tf$&JB/,p GzZ1I)/AM^l]&hE3Ui sGc>攸r7(m{ CGDMg ;34;SYd#`」{,@E]w=Gϴ*?nd;)YE0D$X'* †JEKWxb l1:ɞ f'|œ2jƅHY/s#.5,CkykT>  d>lP"AW4D z ċ^D B&:+,E $)+IŤ0]YY%zչB};(E,1cK8{z_/{,U d$툂`4#ԽTw&̏K ntf72 #um5Uײ\u'aJedp=L T@mwIۥ>.'ИP`=m[@%3]snC'لjTnbve)[LH3aED1NnbkL5;L+0"Aۆ{/ ${&s3(7(u"| tGi}Ip< -p,lx(D[%Ji| j/6"d_c|3qMrqe^{c^ l_DiςaGqmg|FhRӻ5y/b`1^Kۊ7yb:+rÇ <9W2.Zy QAuc3F9rpGC+hCӃdw(lR|O6nsLfT΍t‹xV^X(׼*1$*{g-mM/l lcӸ m8k z~ghm0NuAE ]|(b \vn#`8 QRl;SE}OuD8&%/pS>Bm Tz5B!#jsmp?r$;1^Ǻ'1 >Ü:I+9-%Ralz Myob![4Z=0>e~gA /zh%Tvw?x?$ihiqIhSJ{agI(4A(M] GN8f'nayl:$Xa=276̯C3HJZ\2 9N0Tmzw4cWV_WWo({3# [S&ףDΫ !ik_QƜn@V "R92m)_#jJn_Z $˼b~cDE.?Baw՗w݆eDS'}{8a`OO5OLޟEubh5uftakX˘e1Z_R>U9=+I!;mcӅ,W.ϦaiJ%7oۧ x q^ bE+l ɫ둴g+MX4ZG@>al D7x-B~VO6~qi.jbtF%oR|ꣵ }|̍. aZد7u% `i?V#^`6ſyHx ب>˛,';4ФqSӈs*6Ⱦ)>½Alk\)+\2r%,t!= -sDeb:5.w՟y qH~!Dk *QklM=( `@u $ !2 Emz*oʹ$|Z]cǹ T@{rRGN|,Tįa9rQ'HśbL}dΰӄFXEۺށH7??۳nL4IעP5 ?qRW`]9+55,}T=y7hhdy[kLOl'Z鏓A\>5 EN > `VKE.^Eo꯼r%Ž?bn(["#]em[If(/5c `Fq0݋ٹs҅x;w< qgH_<|/³fQ)$fdt`ˠ>ki1o- B[H<v+y@L賚o V - ˃h(+Ŭ"0K*@ͩœ%~JVfY9\,J7vxvjaA &SGhvV[[q2ǾtOU3Qzb~A{2g=YsUݰa.R\1Ӻ}O$ݼ^ 2޵,ca)gf[GmG޶[;bl0pKu!Yx7GfHʍm{W_ÕE/W|V>QZ%t7-usQZb"St]79X~$Ͻ@N^B%Vbr lvyLm_1DˋbgPr)Dk`CUSH[c3]Pi!ߥ\П19B~ HJYo.U6O1VO V^w@ă H]t^1$p݄Y>s&[QF> .yyh\϶{\:n[!:zig.lJefoI8!5*of&H_WF5S{5iSy̨!%=u@K5% _9$#LwKmTpMՊ<}qh)x_B/#t( oAyFslK, >x{`]܁&s W}?odZW)r8do2K,"]p?!yk=;m1wASYiyPUq\myF6)d8+'Y4qj?mi3RF4kiɊnW O<ϋ%|X)jw ~9iT 1-֒*ׁ#XbR l Mo񤝖-BCYLŌya$cN†ö0mfj㢳ިψpV5Eč=n`̝a2KZC8Soivgө0=5i0#cǛ6$)[fe+ۼھkAn[p?V뗮Ilk#ԩ1J;>a8~ԟ 6D']H_0pA7IóC8%~B?h}˨v*C9/+9jOMHl< ѱLfWЗeͲt5-!|xKh榏ϕ*f/hPS䆥]"B@$ XVّdXތcT ;y_-n@eLPwxpgq?{8D?MyGY|F.&5]Ifکn֫ c<+}5gVn:ze@{4қR*l6#.{RRɚ MHzHC"2ekҗ_76=1y0۠ic 6sһ}J8}T` v^(QwLj2?i(Ouh'|sb1*ogǑ<|bhj*RE5DX rŲ ysݎN'[H$,:O8ӌlCx~穀/Q]Otn7ECwPF(^mL^:#jfq(1+y\Wg]( 4n¯`n-'xlD°YS^][Ei6G!3Ys_Gmb0ς\QwD5>/k5ǯz,$B+hn:ei7? u533GJDAe nYN/x-7>71QppK"c;~P:#oDvʿjZE6N* _HMq8EM<2: -ŽzNb!Z#_B7%S,fu,]7v/1"fkPLX;qp\SWyk?,xկh }k v_,HM-M?V!^g`SxmHtS$5/ X#=#8/AUgYVd i`GjV(^杛Xhͳ}8ڗ_b O(2 4E)N{lo o+:4Fzd:'}VVwm$rVn7 Θv9?hlUXc&,]"ez~ViwLޣ"E N1KvE6ornLօp\+pҰM/9ȴnḼ́Vh_w\f\9$E 6uTӊU,{Np(od!V5mY=*B{k--/Z%1[g:ѬE |G'ºR7-TƒgTإ FN;zGA9wSʊǴ~N-u{(y>wF^HE5WD$kN5 aб¦7hS>LvMHoIVyFZC9봸yo-3!x״n9dsU =Aj Ԙl 㕘%Y)gh*SG5bj'BH.,{ՀnY1|P!2VXbaE=(VӡcHYFzs4mGƹw5b?L$+p#F3@a-)U0@]6SX_J} FU{ݒ Po+K2eP`~jdjfbDS|ws#:rz*97=أz LR<ڭvD9 s,+Ȝi,⦢-]~POcMl/|rM0:=!ZX`Lesi`6FJL֏V0Q`{#>W' rP:8q3aE=eŵ ]VhԳ?u~U!"61L IPs(#^e.? vl+A-&ه\sѥfR95]?~(G5Zrb ؗ$/1>:ib׻hz<j v/YL z{94ŨOjX] *5\E)ylL&_a\Q~P8Mr8QA+6*S܂N ݲu%tx "Z׫{(d3Jt;#ws 既amc,S:xRy%-Iyo&iLVI asib< 3QdֻK| xI7d஍yu# Z  3LPaY%^[& Rܖy_\8)RNYXFGsq r2]Ll1:.$M[*[>?~n釴FS҈a|*%~?oȕ~2|/Kդ!S{RvOMwE;:FD݊A"KI=&CtX쨖%8#0Bh4wSb8d+ZU^XuQN΋gIzԈ_/wX!c[yq48< %i~Y[Y~,+@05a ϑ*J zƏl4g;NF<#֝Š~`x>ƶ97!yfxpItW(Za1qqN(y|m>e  oAdz7 a_+v68|^4Ag(u5Jq= %&h]A ])HFutBGQnn8*5ܗzpK{#nO|I!,z~ >q*oOnw}gphQJ´@S);k%'De:@ c IɞAB?|6P:1GP.qaHLؕ&˽ر57U?sT,KumfPպ'VX| 0i"iǰZ?qkLjW+¼T^ҫu`njl!AJpJ~ֻ~6J}LՇO߂ N(KJQ 먰nxd'[L)>nQq1t>tEXCJ;˜inIQmE$:[SƔ" ~Sw?S"m$GvbE{6ynZ>]my޵+lC[NMD{B25wɞ<&y q{)ڣ<%R.x_ wj#Dñ_YWQ3 ,QWȤl ϯ'z϶6v_RYX|޾ uD-lEWY*E3 u}IRR"و7'/>GG_6UWHxG9m*Z qO1ȇ,JZy-%&_i^d /;JW4a] [9^OgKߦSy; l>h+D؋=SeB|D)po[#sՕ4\ш|/ CZg@Go| D: I ֺ2ɩӏɢʝ(L$ 5,pw!ZڒRw^]<;\=>. _J%ޢޠvCF~=w u06gu"Ky;8& ,"1FL^<7ϯ]1s2 73&2;,'3Gu7[ڭkB9UU5EIWjH9T%ӵڏ`5|3%8mc 5GUAΘN+^8zd>t<ѯzkϰkǵ<ʙT&S l<.nPfݟ~SBO07􌒫*쌄4H5SO7)X zHɻZIGxL|c8@^Tl2?\dm@2AFN\s8:}) p}O0'=ט"u6ne:pAd 6]X+)LxXO:yN /7A8(r ɨ9 j!*Ck!8_F0.tNbSE" AB!ŕtNJFK`i*D"dEyuR]Ek򅅆PR1zTdη 4vэI!w~]4@uM{vRTKk6U^ /(VvN⎞:b<5.x"jh)p!Xy$`54c@oQ:]8ףbiǼK-K-@h*C|llr|jߊ RbW_weHqşD;,v,d=#;]uƤ- B 0Rx{T\Rg[."lrdCel%j01XMJ*R%`J~Ɔ 0ze-s/mv1W1YOBmHىc@RW ;t8.+&>{N20i *h~: 'Qt:rKL`i7[ EvJq*aI$ճ- R?q S!ʒAvCd綥4E ͓ƤH3CkLnkىITKfl$% \;ӻǟ]n k7$B3q|63VKSii#&Z#/QPcUCtRۣ9MT-rtē nԽƝ>S.H /.I4cN!pF%V{5w,RLrJ&U.PxP:'\׾wZM}cch 1PTLl~gS%IbK:B6]YQ{tz@%( C&7ԭF ͟_3š%3zѠeXx5U|EO ՞D [ȴ*k@07$K[s^0aO "1&uaJ 5krjӵT "?GER ?5^0K=h.MnDW`,XYlBa7򋔐k_~@*7/d@֫AIqK#c]FMY49T+2Xr6J`(eT\'hxN"\f[Re lxw8#%jj!8I>ٕd(5Q N(A%py!\UV=l`,v-@aXryڠ_>DR_ʂKNL3X2,5\dNk+$ȭ} Tڼy6~ْ3j3AMOj[_AVI׏ʂD" #[>.{vb=ЏhB6p*Nf͆\bﱰmg={S1'g$_5ø@%nk%@[Xvٜ%Hz#z ҿOJw@iHFhYﷅmSd:.KRD.Jz}اߊofR8ҹ'p}SDzͽ Zڀ`RѶ R`i3a:zLju"iv7Ҭ>P%ԠtV(k ZfLl;+cWV79s7' !,i~翚9I(L+N X}#7+tA;rXq! =&_ͻ;Po*'8t!ִ1IVq-g{W ^! sq&h\y3hS{N#XV bk 1xu{x|Ŝ݄=`x="wL0Dҵ:j@V[՛L̈\uui_T(z(?q-\L9 Ф :Dӂ>&K`R?+ێu17OPYAfRA-MK8ע(Z1cyz9IbewxB6F-g fP5 LvC@Bч!4V!{hMQ\V.EQ UD &X~ ď7Ms])I.N΍,fbYKܨk&Y| d0H(|n,gN>ky}{_N<nmI]%!LOcBSzC׭茻m8'4ҧ$kC{ea wX7ݽ0. [S tm\o}߼diB"|oLZrn/Rʯ"ǔ"#KX1.yܢ>Dz4Fewc R!@n(:KM|@ @)o5wMm!r&yl5^<Z2{=V14U$:aP^u'蘥GyˊG5 M*O}@n%m |^]TdCO' x OnFb#&ym2яT,o;M!E%K(bgRY4Wti4ȣWF#{ Fd~ 8 \#رLi $C٧wFܽcH0k<2u= G =E!$(W8cEPT飺_ vO<|-W C'Lp6,T7]mLSF8۽,C]vE qj2þG1ri[D(?~Jm_D2nNt (DjOmՍF JkPo"~R?'sA+jdi8BX&v4lMt x4tUeVZxxҢlet?ը2-\Bc|ʼn_xN^sywT;OdBX#kAc .5o^J" x˂$l4~Kxc,~# /aRj 7JjZhǻ_GF2D+iQH[l)`s#>:,8Ll3k?3 EXP/|g5G[vQOpʛ͟ vDsZoX—3W cW\0+UKږ!6QyS j-(jczGvWjWDSwt79ns5`bF:1?kA !*'׭9$=rq^lE' NRkX3ۇC~屹HFJG]G]ՍH ?_Ep fɪݕU?Y$Ib <+0zZUfL&˧sj,gHR1SES@◶|# qNfe#W+@w ]^8t#t?3ܥ$ hĦY4HGhAw)tL]n%n7Ԃy'&S-0ti*xk"UiwBKΉymJ#KY T8GhhSJ>F36mGJ ' ~єoz B:Y|v!7P3(TX(R.d0we~4YQZײ:@6Ό˾ѿe.h\jOAõt<P-H9<5/A =(A I ,ibOCmEn=>N疩Eb猭%c%9SvB9`< ԏʆ^5GykHWQVf6sdYy_? B8jONb$"[f/dʼœ:AeagwB5d#?2Sll"%tW Fx~|+JhQ,|_C`з7:rF}q7i&;h NxqqA 3T(k xy202+8,_J#!AS y (,JÌؑ˶x=O#& }b^z(t+הWQŔ5lEDmayR["*Pfj Wa$]bm庿17ݓڟf7ޟ<2w(j2 %W ~#޽Ցq垥k $2ZI$XlBUpd3~" BMř (pz '>$:<"U~2D=:ค+dz 8c/(V'*.}aۉW5@S$WK:`W4R.fC:2*gtHС-K`"HrՇ}*lcn'6~ ,ȧ;c51bu?(_1Z[ըڊHA)1{5ol E80Y4&PsO.k~Z䟃WhQxK(Cʒ͛6VhT{^L~HX}UeD˅8lrW! :bNa^ aRDaqaAő.+HJG;Z(]?e{M-qbI.>nvhw]? fj3z񱤟C'hAXf,${BlO w0v` [JI̅Dm6?;w$k)u ab9+U]i ~I4P82uZӡlN&9p8qv2}kho /)aܚK*Ri+Jy;”ip^EAZ \Jh]yHWJtgE6ᩔ yXb2(~Vɒ)Tvbf <cbVz)蟼 |<@~o!ng+&^ozn*j?aѶzfTILxpӺy/uZ& .x*q` 71UңЊC1B5KrlˢY9"Y^ۊ>$"r˨r,SH'FIcrFĬ/y([S:AA%5mgX@,bz`r &" v$({"iYﻫ /. q~|I DoFG@,-=Il.͸4"V2U cz<<(墣TlAC?jb1>:fnڤ?Y]n$%SVY֖ʄ[(CfveSu$96_Xyn=&340e v}(GNOn>Zl;cg(muxƶ4uW"A ru(c!x/lfVg@`1O+;O4u:w;{սr`iy4_5K ^1 $J˧+D$R]Y#h+,=n;wO7 '󨠶 YZ