xen-doc-html-4.13.2_02-lp152.2.15.1 4>$  Ap_AC/=„ k@~Oq3 [bowt^125/wM)^NGǍcwZVi,ۓ *"a|8_i˭Da^S(cկ$'d_bQg}el%a[`0h%1Yƕ0@RZMJZЕ-e_IIcg%F@&@}#/7 J"dUkbw!J&P_R%Wɕ5bbf98daab8412c9f0b92e2267164ea450a15dfbc1e58d6e71ed724a4a6bad61db5ec5f259ec7ed148ad9a21e23a5a5ed5bd8c3a|_AC/=„c)~"z(qTc##ʌ+ט=aP.%+ۨUɭÎw\k^y& ,p.rtCК^`_p9P?@d & M EKTMM "M M M M  M@MMBhMS(w8e9#e:;[eGMH,MI`MXY\M]M^ bc>defluMv<Cxen-doc-html4.13.2_02lp152.2.15.1Xen Virtualization: HTML documentationXen is a virtual machine monitor for x86 that supports execution of multiple guest operating systems with unprecedented levels of performance and resource isolation. xen-doc-html contains the online documentation in HTML format. Point your browser at file:/usr/share/doc/packages/xen/html/ Authors: -------- Ian Pratt _@cloud106 openSUSE Leap 15.2openSUSEGPL-2.0-onlyhttp://bugs.opensuse.orgDocumentation/HTMLhttp://www.cl.cam.ac.uk/Research/SRG/netos/xen/linuxx86_64ot9DA'&6@ 72."B W 8` e $,76H"yjQ <3 "z768 I\xAAAA큤A큤A큤A큤A큤A큤A큤A큤_?_>_>_?_>_>_?_>_?_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_>_?_>_>_?_>_?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-4.13.2_02-lp152.2.15.1.src.rpmxen-doc-htmlxen-doc-html(x86-64)     rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PartialHardlinkSets)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0.4-14.0-15.2-14.14.1____@__[f_X_Wr@_'@_{_^)@^^@^3^ϧ^x^@^@^^^{G^r @^j$@^g@^_@^Nt^K^=Q@^:@^0"@^@^@]]]N@]@]ʞ])]c@]@]@]@]]fl]fl]M`@]B@]/ ],j] ]@]@] ] ] #]]@\\ޢ@\ڭ\\@\@\@\,@\7\\N\@\\+@\\M\M\\\@\}@\k\X)@\J@\I\A\?\=@\9\73\4\$\l@[H[k@[@[^[^[/[@[@[9@[v[W[CN@[<[6@[0@[0@['[!@[5@Z@ZnZ@ZZZ@ZmZԐ@ZZZ@ZZ}@Z}@Z}@Z}@Zz@Zz@Zo Zk@ZV@ZS]@ZOhZ:PZ1@Z.s@Z&@ZOZOZ Z Z Z@Z@Z }ZC@ZYYYY|Y@Y{Y*@Y5YA@Y4YYYbYY@Y3Y@YJYJY@YYV@Y@Ym@Yw2Yp@YlYh@Yh@YS@YJ_YI@Y5GY0Y-^Y(Y"YY;@YYY@YtY.X@XQ@X@XۡXg@X@XƉX@X @X@X@X@X@XXX@XXXwoXs{@XlXWXRXQ4@XEVX43@X.@X*X lX&X@XX@W@W֘W֘W^@WiW:Wt@W.@W9WW@Wk@Wi,@WbWZWZWZWYZ@WV@WEWBW=W;W3W1@W1@W,@W(W(W(W(W(W#LWVbV(@V3VJVxV'@VV2V͛@VŲ@V`VwVVV=@VV@VHV@VvV%@VV<@V@VS@VV@V^VwVqR@Vn@VXEVUVTQ@VMVMVMVA@V;DV9@V7P@V0V*!@V V@VCVVVf@VqV@UYU@U@UUݪ@U@UnU4@UUK@UU@UU>U@Ux&Un@U\w@U[%UUUPUKSU>$U6;U%@UU@UUU.@TgT-@TT@TZ@TZ@T@TT@T5T@TLTLT~@Tl@Ti@Ta@THT?@T=@carnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comCallum Farmer carnold@suse.comcarnold@suse.comJames Fehlig carnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comDominique Leuenberger carnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comMatej Cepl carnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comJim Fehlig ohering@suse.deMartin Liška ohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comJan Engelhardt Guillaume GARDET Guillaume GARDET Bernhard Wiedemann carnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deBernhard Wiedemann ohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comtrenn@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.dejfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.deohering@suse.derbrown@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comjfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.dejfehlig@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comohering@suse.dejfehlig@suse.comcarnold@suse.comjfehlig@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.commlatimer@suse.comcarnold@suse.comcyliu@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.derguenther@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comrguenther@suse.comcarnold@suse.commeissner@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.com- bsc#1178591 - VUL-0: xen: Intel RAPL sidechannel attack aka PLATYPUS attack aka XSA-351 xsa351-1.patch xsa351-2.patch xsa351-3.patch- Upstream bug fix (bsc#1027519) 5f92909a-PCI-cleanup-MSI-before-removing-device.patch- bsc#1177950 - adjust help for --max_iters, default is 5 libxl.set-migration-constraints-from-cmdline.patch- Update to Xen 4.13.2 bug fix release (bsc#1027519) xen-4.13.2-testing-src.tar.bz2 - Drop patches contained in new tarball 5eb51be6-cpupool-fix-removing-cpu-from-pool.patch 5eb51caa-sched-vcpu-pause-flags-atomic.patch 5ec2a760-x86-determine-MXCSR-mask-always.patch 5ec50b05-x86-idle-rework-C6-EOI-workaround.patch 5ec7dcaa-x86-dont-enter-C6-with-in-service-intr.patch 5ec7dcf6-x86-dont-enter-C3-C6-with-errata.patch 5ec82237-x86-extend-ISR-C6-workaround-to-Haswell.patch 5ece1b91-x86-clear-RDRAND-CPUID-bit-on-AMD-fam-15-16.patch 5ece8ac4-x86-load_system_tables-NMI-MC-safe.patch 5ed69804-x86-ucode-fix-start-end-update.patch 5eda60cb-SVM-split-recalc-NPT-fault-handling.patch 5edf6ad8-ioreq-pending-emulation-server-destruction-race.patch 5edfbbea-x86-spec-ctrl-CPUID-MSR-defs-for-SRBDS.patch 5edfbbea-x86-spec-ctrl-mitigate-SRBDS.patch 5ee24d0e-x86-spec-ctrl-document-SRBDS-workaround.patch 5ef44e0d-x86-PMTMR-use-FADT-flags.patch 5ef6156a-x86-disallow-access-to-PT-MSRs.patch 5efcb354-x86-protect-CALL-JMP-straight-line-speculation.patch 5f046c18-evtchn-dont-ignore-error-in-get_free_port.patch 5f046c48-x86-shadow-dirty-VRAM-inverted-conditional.patch 5f046c64-EPT-set_middle_entry-adjustments.patch 5f046c78-EPT-atomically-modify-ents-in-ept_next_level.patch 5f046c9a-VT-d-improve-IOMMU-TLB-flush.patch 5f046cb5-VT-d-prune-rename-cache-flush-funcs.patch 5f046cca-x86-IOMMU-introduce-cache-sync-hook.patch 5f046ce9-VT-d-sync_cache-misaligned-addresses.patch 5f046cfd-x86-introduce-alternative_2.patch 5f046d1a-VT-d-optimize-CPU-cache-sync.patch 5f046d2b-EPT-flush-cache-when-modifying-PTEs.patch 5f046d5c-check-VCPUOP_register_vcpu_info-alignment.patch 5f1a9916-x86-S3-put-data-sregs-into-known-state.patch 5f21b9fd-x86-cpuid-APIC-bit-clearing.patch 5f479d9e-x86-begin-to-support-MSR_ARCH_CAPS.patch 5f4cf06e-x86-Dom0-expose-MSR_ARCH_CAPS.patch 5f4cf96a-x86-PV-fix-SEGBASE_GS_USER_SEL.patch 5f560c42-x86-PV-64bit-segbase-consistency.patch xsa286-1.patch xsa286-2.patch xsa286-3.patch xsa286-4.patch xsa286-5.patch xsa286-6.patch xsa333.patch xsa334.patch xsa336.patch xsa337-1.patch xsa337-2.patch xsa338.patch xsa339.patch xsa340.patch xsa342.patch xsa343-1.patch xsa343-2.patch xsa343-3.patch xsa344-1.patch xsa344-2.patch xsa345-1.patch xsa345-2.patch xsa345-3.patch xsa346-1.patch xsa346-2.patch xsa347-1.patch xsa347-2.patch xsa347-3.patch- bsc#1177409 - VUL-0: xen: x86 PV guest INVLPG-like flushes may leave stale TLB entries (XSA-286) xsa286-1.patch xsa286-2.patch xsa286-3.patch xsa286-4.patch xsa286-5.patch xsa286-6.patch - bsc#1177412 - VUL-0: xen: Race condition in Xen mapping code (XSA-345) xsa345-1.patch xsa345-2.patch xsa345-3.patch - bsc#1177413 - VUL-0: xen: undue deferral of IOMMU TLB flushes (XSA-346) xsa346-1.patch xsa346-2.patch - bsc#1177414 - VUL-0: xen: unsafe AMD IOMMU page table updates (XSA-347) xsa347-1.patch xsa347-2.patch xsa347-3.patch- Escape some % chars in xen.spec, they have to appear verbatim- Enhance libxc.migrate_tracking.patch Print number of allocated pages on sending side, this is more accurate than p2m_size.- bsc#1176339 - VUL-0: CVE-2020-25602: xen: x86 pv: Crash when handling guest access to MSR_MISC_ENABLE (XSA-333) xsa333.patch - bsc#1176341 - VUL-0: CVE-2020-25598: xen: Missing unlock in XENMEM_acquire_resource error path (XSA-334) xsa334.patch - bsc#1176343 - VUL-0: CVE-2020-25604: xen: race when migrating timers between x86 HVM vCPU-s (XSA-336) xsa336.patch - bsc#1176344 - VUL-0: CVE-2020-25595: xen: PCI passthrough code reading back hardware registers (XSA-337) xsa337-1.patch xsa337-2.patch - bsc#1176346 - VUL-0: CVE-2020-25597: xen: once valid event channels may not turn invalid (XSA-338) xsa338.patch - bsc#1176345 - VUL-0: CVE-2020-25596: xen: x86 pv guest kernel DoS via SYSENTER (XSA-339) xsa339.patch - bsc#1176347 - VUL-0: CVE-2020-25603: xen: Missing barrier barriers when accessing/allocating an event channel (XSA-340) xsa340.patch - bsc#1176348 - VUL-0: CVE-2020-25600: xen: out of bounds event channels available to 32-bit x86 domains (XSA-342) xsa342.patch - bsc#1176349 - VUL-0: CVE-2020-25599: xen: races with evtchn_reset() (XSA-343) xsa343-1.patch xsa343-2.patch xsa343-3.patch - bsc#1176350 - VUL-0: CVE-2020-25601: xen: lack of preemption in evtchn_reset() / evtchn_destroy() (XSA-344) xsa344-1.patch xsa344-2.patch - Upstream bug fixes (bsc#1027519) 5f479d9e-x86-begin-to-support-MSR_ARCH_CAPS.patch 5f4cf06e-x86-Dom0-expose-MSR_ARCH_CAPS.patch 5f4cf96a-x86-PV-fix-SEGBASE_GS_USER_SEL.patch 5f560c42-x86-PV-64bit-segbase-consistency.patch- Upstream bug fixes (bsc#1027519) 5ef44e0d-x86-PMTMR-use-FADT-flags.patch 5ef6156a-x86-disallow-access-to-PT-MSRs.patch 5efcb354-x86-protect-CALL-JMP-straight-line-speculation.patch 5f046c18-evtchn-dont-ignore-error-in-get_free_port.patch (Replaces xsa317.patch) 5f046c48-x86-shadow-dirty-VRAM-inverted-conditional.patch (Replaces xsa319.patch) 5f046c64-EPT-set_middle_entry-adjustments.patch (Replaces xsa328-1.patch) 5f046c78-EPT-atomically-modify-ents-in-ept_next_level.patch (Replaces xsa328-2.patch) 5f046c9a-VT-d-improve-IOMMU-TLB-flush.patch (Replaces xsa321-1.patch) 5f046cb5-VT-d-prune-rename-cache-flush-funcs.patch (Replaces xsa321-2.patch) 5f046cca-x86-IOMMU-introduce-cache-sync-hook.patch (Replaces xsa321-3.patch) 5f046ce9-VT-d-sync_cache-misaligned-addresses.patch (Replaces xsa32141.patch) 5f046cfd-x86-introduce-alternative_2.patch (Replaces xsa321-5.patch) 5f046d1a-VT-d-optimize-CPU-cache-sync.patch (Replaces xsa321-6.patch) 5f046d2b-EPT-flush-cache-when-modifying-PTEs.patch (Replaces xsa321-7.patch) 5f046d5c-check-VCPUOP_register_vcpu_info-alignment.patch (Replaces xsa327.patch) 5f1a9916-x86-S3-put-data-sregs-into-known-state.patch 5f21b9fd-x86-cpuid-APIC-bit-clearing.patch- bsc#1172356 - Not able to hot-plug NIC via virt-manager, asks to attach on next reboot while it should be live attached ignore-ip-command-script-errors.patch- Enhance libxc.migrate_tracking.patch After transfer of domU memory, the target host has to assemble the backend devices. Track the time prior xc_domain_unpause.- Add libxc.migrate_tracking.patch to track live migrations unconditionally in logfiles, especially in libvirt. This will track how long a domU was suspended during transit.- bsc#1173376 - VUL-0: CVE-2020-15566: xen: XSA-317 - Incorrect error handling in event channel port allocation xsa317.patch - bsc#1173377 - VUL-0: CVE-2020-15563: xen: XSA-319 - inverted code paths in x86 dirty VRAM tracking xsa319.patch - bsc#1173378 - VUL-0: CVE-2020-15565: xen: XSA-321 - insufficient cache write- back under VT-d xsa321-1.patch xsa321-2.patch xsa321-3.patch xsa321-4.patch xsa321-5.patch xsa321-6.patch xsa321-7.patch - bsc#1173380 - VUL-0: CVE-2020-15567: xen: XSA-328 - non-atomic modification of live EPT PTE xsa328-1.patch xsa328-2.patch- bsc#1172205 - VUL-0: CVE-2020-0543: xen: Special Register Buffer Data Sampling (SRBDS) aka "CrossTalk" (XSA-320) 5ee24d0e-x86-spec-ctrl-document-SRBDS-workaround.patch 5edfbbea-x86-spec-ctrl-CPUID-MSR-defs-for-SRBDS.patch (Replaces xsa320-1.patch) 5edfbbea-x86-spec-ctrl-mitigate-SRBDS.patch (Replaces xsa320-2.patch) - Upstream bug fixes (bsc#1027519) 5ec50b05-x86-idle-rework-C6-EOI-workaround.patch 5ec7dcaa-x86-dont-enter-C6-with-in-service-intr.patch 5ec7dcf6-x86-dont-enter-C3-C6-with-errata.patch 5ec82237-x86-extend-ISR-C6-workaround-to-Haswell.patch 5ece1b91-x86-clear-RDRAND-CPUID-bit-on-AMD-fam-15-16.patch 5ece8ac4-x86-load_system_tables-NMI-MC-safe.patch 5ed69804-x86-ucode-fix-start-end-update.patch 5eda60cb-SVM-split-recalc-NPT-fault-handling.patch 5edf6ad8-ioreq-pending-emulation-server-destruction-race.patch- Fixes for %_libexecdir changing to /usr/libexec- bsc#1172205 - VUL-0: CVE-2020-0543: xen: Special Register Buffer Data Sampling (SRBDS) aka "CrossTalk" (XSA-320) xsa320-1.patch xsa320-2.patch- Update to Xen 4.13.1 bug fix release (bsc#1027519) xen-4.13.1-testing-src.tar.bz2 5eb51be6-cpupool-fix-removing-cpu-from-pool.patch 5eb51caa-sched-vcpu-pause-flags-atomic.patch 5ec2a760-x86-determine-MXCSR-mask-always.patch - Drop patches contained in new tarball 5de65f84-gnttab-map-always-do-IOMMU-part.patch 5de65fc4-x86-avoid-HPET-use-on-certain-Intel.patch 5e15e03d-sched-fix-S3-resume-with-smt=0.patch 5e16fb6a-x86-clear-per-cpu-stub-page-info.patch 5e1da013-IRQ-u16-is-too-narrow-for-evtchn.patch 5e1dcedd-Arm-place-speculation-barrier-after-ERET.patch 5e21ce98-x86-time-update-TSC-stamp-after-deep-C-state.patch 5e286cce-VT-d-dont-pass-bridges-to-domain_context_mapping_one.patch 5e318cd4-x86-apic-fix-disabling-LVT0.patch 5e344c11-x86-HVM-relinquish-resources-from-domain_destroy.patch 5e3bd385-EFI-recheck-variable-name-strings.patch 5e3bd3d1-EFI-dont-leak-heap-VIA-XEN_EFI_get_next_variable_name.patch 5e3bd3f8-xmalloc-guard-against-overflow.patch 5e46e090-x86-smp-reset-x2apic_enabled-in-smp_send_stop.patch 5e4c00ef-VT-d-check-full-RMRR-for-E820-reserved.patch 5e4d4f5b-sched-fix-get_cpu_idle_time-with-core-sched.patch 5e4e614d-x86-spec-ctrl-no-xen-also-disables-branch-hardening.patch 5e4ec20e-x86-virtualise-MSR_PLATFORM_ID-properly.patch 5e5e7188-fix-error-path-in-cpupool_unassign_cpu_start.patch 5e6f53dd-AMD-IOMMU-fix-off-by-one-get_paging_mode.patch 5e7a371c-sched-fix-cpu-onlining-with-core-sched.patch 5e7c90cf-sched-fix-cpu-offlining-with-core-sched.patch 5e7cfb29-x86-ucode-AMD-fix-assert-in-compare_patch.patch 5e7cfb29-x86-ucode-fix-error-paths-in-apply_microcode.patch 5e7dd83b-libx86-CPUID-fix-not-just-leaf-7.patch 5e7dfbf6-x86-ucode-AMD-potential-buffer-overrun-equiv-tab.patch 5e846cce-x86-HVM-fix-AMD-ECS-handling-for-Fam10.patch 5e84905c-x86-ucode-AMD-fix-more-potential-buffer-overruns.patch 5e86f7b7-credit2-avoid-vCPUs-with-lower-creds-than-idle.patch 5e86f7fd-credit2-fix-credit-too-few-resets.patch 5e876b0f-tools-xenstore-fix-use-after-free-in-xenstored.patch 5e95ad61-xenoprof-clear-buffer-intended-to-be-shared-with-guests.patch 5e95ad8f-xenoprof-limit-consumption-of-shared-buffer-data.patch 5e95ae77-Add-missing-memory-barrier-in-the-unlock-path-of-rwlock.patch 5e95af5e-xen-gnttab-Fix-error-path-in-map_grant_ref.patch 5e95afb8-gnttab-fix-GNTTABOP_copy-continuation-handling.patch- spec: Remove invocation of autogen.sh - spec: Recommend qemu-ovmf-x86_64 to provide UEFI firmwares- bsc#1170968 - GCC 10: xen build fails on i586 gcc10-fixes.patch- bsc#1169392 - VUL-0: CVE-2020-11742: xen: Bad continuation handling in GNTTABOP_copy (XSA-318) 5e95afb8-gnttab-fix-GNTTABOP_copy-continuation-handling.patch- bsc#1168140 - VUL-0: CVE-2020-11740, CVE-2020-11741: xen: XSA-313 multiple xenoprof issues 5e95ad61-xenoprof-clear-buffer-intended-to-be-shared-with-guests.patch 5e95ad8f-xenoprof-limit-consumption-of-shared-buffer-data.patch - bsc#1168142 - VUL-0: CVE-2020-11739: xen: XSA-314 - Missing memory barriers in read-write unlock paths 5e95ae77-Add-missing-memory-barrier-in-the-unlock-path-of-rwlock.patch - bsc#1168143 - VUL-0: CVE-2020-11743: xen: XSA-316 - Bad error path in GNTTABOP_map_grant 5e95af5e-xen-gnttab-Fix-error-path-in-map_grant_ref.patch - bsc#1167152 - L3: Xenstored Crashed during VM install Need Core analyzed 5e876b0f-tools-xenstore-fix-use-after-free-in-xenstored.patch - bsc#1165206 - Xen 4.12 DomU hang / freeze / stall / NMI watchdog bug soft lockup CPU #0 stuck under high load / upstream with workaround. See also bsc#1134506 5e86f7b7-credit2-avoid-vCPUs-with-lower-creds-than-idle.patch 5e86f7fd-credit2-fix-credit-too-few-resets.patch - Drop for upstream solution (bsc#1165206) 01-xen-credit2-avoid-vcpus-to.patch default-to-credit1-scheduler.patch - Upstream bug fixes (bsc#1027519) 5e4ec20e-x86-virtualise-MSR_PLATFORM_ID-properly.patch 5e5e7188-fix-error-path-in-cpupool_unassign_cpu_start.patch 5e6f53dd-AMD-IOMMU-fix-off-by-one-get_paging_mode.patch 5e7a371c-sched-fix-cpu-onlining-with-core-sched.patch 5e7c90cf-sched-fix-cpu-offlining-with-core-sched.patch 5e7cfb29-x86-ucode-AMD-fix-assert-in-compare_patch.patch 5e7cfb29-x86-ucode-fix-error-paths-in-apply_microcode.patch 5e7dd83b-libx86-CPUID-fix-not-just-leaf-7.patch 5e7dfbf6-x86-ucode-AMD-potential-buffer-overrun-equiv-tab.patch 5e846cce-x86-HVM-fix-AMD-ECS-handling-for-Fam10.patch 5e84905c-x86-ucode-AMD-fix-more-potential-buffer-overruns.patch- bsc#1167608 - unbound limit for max_event_channels domUs with many vcpus and/or resources fail to start libxl.max_event_channels.patch- bsc#1161480 - Fix xl shutdown for HVM without PV drivers add libxl.libxl__domain_pvcontrol.patch- bsc#1165206 - Xen 4.12 DomU hang / freeze / stall / NMI watchdog bug soft lockup CPU #0 stuck under high load / upstream with workaround. See also bsc#1134506 01-xen-credit2-avoid-vcpus-to.patch- bsc#1158414 - GCC 10: xen build fails gcc10-fixes.patch- bsc#1165206 - Xen 4.12 DomU hang / freeze / stall / NMI watchdog bug soft lockup CPU #0 stuck under high load / upstream with workaround. See also bsc#1134506 default-to-credit1-scheduler.patch- bsc#1160932 - VUL-0: xen: XSA-312 v1: arm: a CPU may speculate past the ERET instruction 5e1dcedd-Arm-place-speculation-barrier-after-ERET.patch - bsc#1164425 - x86: "spec-ctrl=no-xen" should also disable branch hardening 5e4e614d-x86-spec-ctrl-no-xen-also-disables-branch-hardening.patch - Upstream bug fixes (bsc#1027519) 5e21ce98-x86-time-update-TSC-stamp-after-deep-C-state.patch 5e286cce-VT-d-dont-pass-bridges-to-domain_context_mapping_one.patch 5e318cd4-x86-apic-fix-disabling-LVT0.patch 5e344c11-x86-HVM-relinquish-resources-from-domain_destroy.patch 5e3bd385-EFI-recheck-variable-name-strings.patch 5e3bd3d1-EFI-dont-leak-heap-VIA-XEN_EFI_get_next_variable_name.patch 5e3bd3f8-xmalloc-guard-against-overflow.patch 5e46e090-x86-smp-reset-x2apic_enabled-in-smp_send_stop.patch 5e4c00ef-VT-d-check-full-RMRR-for-E820-reserved.patch 5e4d4f5b-sched-fix-get_cpu_idle_time-with-core-sched.patch- bsc#1159755 - use fixed qemu-3.1 machine type for HVM This must be done in qemu to preserve PCI layout remove libxl.lock-qemu-machine-for-hvm.patch- jsc#SLE-10183 - script to calculate cpuid= mask add helper script from https://github.com/twizted/xen_maskcalc domUs may be migrated between different cpus from the same vendor if their visible cpuid value has incompatible feature bits masked.- jsc#SLE-10172, bsc#1055731 - handle degraded raid for xendomains add helper script and systemd service from https://github.com/luizluca/xen-tools-xendomains-wait-disk in new sub package xen-tools-xendomains-wait-disk See included README for usage instructions xendomains-wait-disks.LICENSE xendomains-wait-disks.README.md xendomains-wait-disks.sh- bsc#1159755 - use fixed qemu-3.1 machine type for HVM qemu4 introduced incompatible changes in pc-i440fx, which revealed a design bug in 'xenfv'. Live migration from domUs started with qemu versions prior qemu4 can not be received with qemu4+. libxl.lock-qemu-machine-for-hvm.patch- Upstream bug fixes (bsc#1027519) 5de65f84-gnttab-map-always-do-IOMMU-part.patch 5de65fc4-x86-avoid-HPET-use-on-certain-Intel.patch 5e15e03d-sched-fix-S3-resume-with-smt=0.patch 5e16fb6a-x86-clear-per-cpu-stub-page-info.patch 5e1da013-IRQ-u16-is-too-narrow-for-evtchn.patch- BuildRequire pkgconfig(libsystemd) instead of systemd-devel: Allow OBS to shortcut through the -mini flavors.- bsc#1159320 - Xen logrotate file needs updated logrotate.conf- Update to Xen 4.13.0 FCS release xen-4.13.0-testing-src.tar.bz2 * Core Scheduling (contributed by SUSE) * Branch hardening to mitigate against Spectre v1 (contributed by Citrix) * Late uCode loading (contributed by Intel) * Improved live-patching build tools (contributed by AWS) * OP-TEE support (contributed by EPAM) * Renesas R-CAR IPMMU-VMSA driver (contributed by EPAM) * Dom0-less passthrough and ImageBuilder (contributed by XILINX) * Support for new Hardware- Update to Xen 4.13.0 RC4 release xen-4.13.0-testing-src.tar.bz2 - Rebase libxl.pvscsi.patch- Update to Xen 4.13.0 RC3 release xen-4.13.0-testing-src.tar.bz2 - Drop python38-build.patch- Update to Xen 4.13.0 RC2 release xen-4.13.0-testing-src.tar.bz2- Add python38-build.patch fixing build with Python 3.8 (add - -embed to python-config call)- Update to Xen 4.13.0 RC1 release xen-4.13.0-testing-src.tar.bz2 - Drop patches contained in new tarball or invalid 5ca7660f-x86-entry-drop-unused-includes.patch 5cab2a6b-x86-ACPI-also-parse-AMD-tables-early.patch 5cab2ab7-x86-IOMMU-introduce-init-ops.patch 5cab2ae8-x86-IOMMU-abstract-iommu_supports_eim.patch 5cab2b4e-x86-IOMMU-abstract-iommu_enable_x2apic_IR.patch 5cab2b95-x86-IOMMU-initialize-iommu_ops-in.patch 5cac9a4b-x86-IOMMU-abstract-adjust_vtd_irq_affinities.patch 5cdeac7f-AMD-IOMMU-adjust-IOMMU-list-head-init.patch 5cf8da09-adjust-sysdom-creation-call-earlier-on-x86.patch 5d0cf4e4-AMD-IOMMU-initialize-IRQ-tasklet-once.patch 5d149bb0-AMD-IOMMU-dont-add-IOMMUs.patch 5d1b3fab-AMD-IOMMU-restrict-feature-logging.patch 5d358508-x86-IRQ-desc-affinity-represents-request.patch 5d358534-x86-IRQ-consolidate-arch-cpu_mask-use.patch 5d358a67-AMD-IOMMU-pass-IOMMU-to-iterate_ivrs_entries-cb.patch 5d358a92-AMD-IOMMU-pass-IOMMU-to-amd_iommu_alloc_intremap_table.patch 5d39811c-x86-IOMMU-dont-restrict-IRQ-affinities.patch 5d417813-AMD-IOMMU-bitfield-extended-features.patch 5d417838-AMD-IOMMU-bitfield-control-reg.patch 5d41785b-AMD-IOMMU-bitfield-IRTE.patch 5d41787e-AMD-IOMMU-pass-IOMMU-to-gfu-intremap-entry.patch 5d4178ad-AMD-IOMMU-128bit-non-guest-APIC-IRTE.patch 5d4178fc-AMD-IOMMU-split-amd_iommu_init_one.patch 5d41793f-AMD-IOMMU-allow-enabling-without-IRQ.patch 5d417a16-AMD-IOMMU-adjust-IRQ-setup-for-x2APIC.patch 5d417ab6-AMD-IOMMU-enable-x2APIC-mode.patch 5d417b38-AMD-IOMMU-correct-IRTE-updating.patch 5d417b6a-AMD-IOMMU-dont-needlessly-log-headers.patch 5d419d49-x86-spec-ctrl-report-proper-status.patch 5d43253c-x86-ucode-always-collect_cpu_info-at-boot.patch 5d4a9d25-AMD-IOMMU-drop-not-found-message.patch 5d4aa36f-x86-apic-enable-x2APIC-mode-earlier.patch 5d4afa7a-credit2-fix-memory-leak.patch 5d4d850a-introduce-bss-percpu-page-aligned.patch 5d516531-x86-xpti-dont-leak-TSS-adjacent-data.patch 5d5bf475-x86-PV-fix-handling-of-iommu-mappings.patch 5d6524ca-x86-mm-correctly-init-M2P-entries.patch 5d67ceaf-x86-properly-gate-PKU-clearing.patch 5d70bfba-x86-shadow-dont-enable-with-too-small-allocation.patch 5d779811-x86-fix-CPUID7-0-eax-levelling-MSR.patch 5d77b40f-fix-hvm_all_ioreq_servers_add_vcpu-cleanup.patch 5d80e7c0-AMD-IOMMU-free-shared-IRT-once.patch 5d80e80d-AMD-IOMMU-valid-flag-for-IVRS-mappings.patch 5d80e82e-AMD-IOMMU-alloc_intremap_table-callers-handle-errors.patch 5d80e857-x86-PCI-read-MSI-X-table-entry-count-early.patch 5d80ea13-vpci-honor-read-only-devices.patch 5d89d8d9-libxc-x86-avoid-overflow-in-CPUID-APIC-ID.patch 5d8b715f-ACPI-cpuidle-bump-max-num-of-states.patch 5d8b72e5-AMD-IOMMU-dont-blindly-alloc-intremap-tables.patch 5d8b730e-AMD-IOMMU-phantom-funcs-share-intremap-tables.patch 5d8b733b-x86-PCI-read-max-MSI-vector-count-early.patch 5d8b736d-AMD-IOMMU-replace-INTREMAP_ENTRIES.patch 5d8b7393-AMD-IOMMU-restrict-intremap-table-sizes.patch 5d9ee2a8-AMD-IOMMU-alloc-1-devtab-per-PCI-seg.patch 5d9ee2f0-AMD-IOMMU-allocate_buffer-avoid-memset.patch 5d9ee312-AMD-IOMMU-prefill-all-DTEs.patch CVE-2014-0222-blktap-qcow1-validate-l2-table-size.patch blktap2-no-uninit.patch libxl.prepare-environment-for-domcreate_stream_done.patch pygrub-python3-conversion.patch fix-xenpvnetboot.patch- bsc#1135799 - Partner-L3: Xen crashes on AMD ROME based machines 5d9ee2a8-AMD-IOMMU-alloc-1-devtab-per-PCI-seg.patch 5d9ee2f0-AMD-IOMMU-allocate_buffer-avoid-memset.patch 5d9ee312-AMD-IOMMU-prefill-all-DTEs.patch- bsc#1120095 - add code to change LIBXL_HOTPLUG_TIMEOUT at runtime The included README has details about the impact of this change libxl.LIBXL_HOTPLUG_TIMEOUT.patch- bsc#1135799 - Partner-L3: Xen crashes on AMD ROME based machines 5ca7660f-x86-entry-drop-unused-includes.patch 5cf8da09-adjust-sysdom-creation-call-earlier-on-x86.patch 5cab2a6b-x86-ACPI-also-parse-AMD-tables-early.patch 5cab2ab7-x86-IOMMU-introduce-init-ops.patch 5cab2ae8-x86-IOMMU-abstract-iommu_supports_eim.patch 5cab2b4e-x86-IOMMU-abstract-iommu_enable_x2apic_IR.patch 5cab2b95-x86-IOMMU-initialize-iommu_ops-in.patch 5cac9a4b-x86-IOMMU-abstract-adjust_vtd_irq_affinities.patch 5cdeac7f-AMD-IOMMU-adjust-IOMMU-list-head-init.patch 5d0cf4e4-AMD-IOMMU-initialize-IRQ-tasklet-once.patch 5d149bb0-AMD-IOMMU-dont-add-IOMMUs.patch 5d1b3fab-AMD-IOMMU-restrict-feature-logging.patch 5d358508-x86-IRQ-desc-affinity-represents-request.patch 5d358534-x86-IRQ-consolidate-arch-cpu_mask-use.patch 5d358a67-AMD-IOMMU-pass-IOMMU-to-iterate_ivrs_entries-cb.patch 5d358a92-AMD-IOMMU-pass-IOMMU-to-amd_iommu_alloc_intremap_table.patch 5d39811c-x86-IOMMU-dont-restrict-IRQ-affinities.patch 5d417813-AMD-IOMMU-bitfield-extended-features.patch 5d417838-AMD-IOMMU-bitfield-control-reg.patch 5d41785b-AMD-IOMMU-bitfield-IRTE.patch 5d41787e-AMD-IOMMU-pass-IOMMU-to-gfu-intremap-entry.patch 5d4178ad-AMD-IOMMU-128bit-non-guest-APIC-IRTE.patch 5d4178fc-AMD-IOMMU-split-amd_iommu_init_one.patch 5d41793f-AMD-IOMMU-allow-enabling-without-IRQ.patch 5d417a16-AMD-IOMMU-adjust-IRQ-setup-for-x2APIC.patch 5d417ab6-AMD-IOMMU-enable-x2APIC-mode.patch 5d417b38-AMD-IOMMU-correct-IRTE-updating.patch 5d417b6a-AMD-IOMMU-dont-needlessly-log-headers.patch 5d4a9d25-AMD-IOMMU-drop-not-found-message.patch 5d80e7c0-AMD-IOMMU-free-shared-IRT-once.patch 5d80e80d-AMD-IOMMU-valid-flag-for-IVRS-mappings.patch 5d80e82e-AMD-IOMMU-alloc_intremap_table-callers-handle-errors.patch 5d80e857-x86-PCI-read-MSI-X-table-entry-count-early.patch 5d8b72e5-AMD-IOMMU-dont-blindly-alloc-intremap-tables.patch 5d8b730e-AMD-IOMMU-phantom-funcs-share-intremap-tables.patch 5d8b733b-x86-PCI-read-max-MSI-vector-count-early.patch 5d8b736d-AMD-IOMMU-replace-INTREMAP_ENTRIES.patch 5d8b7393-AMD-IOMMU-restrict-intremap-table-sizes.patch - bsc#1145240 - [Migration]Can't pre-allocate 1 shadow pages 5d70bfba-x86-shadow-dont-enable-with-too-small-allocation.patch - bsc#1137717 - [HPS Bug] Unable to install Windows Server 2016 with 2 CPUs setting (or above) under SLES12 SP4 Xen Server on AMD ROME platform 5d89d8d9-libxc-x86-avoid-overflow-in-CPUID-APIC-ID.patch - Upstream bug fixes (bsc#1027519) 5d67ceaf-x86-properly-gate-PKU-clearing.patch 5d779811-x86-fix-CPUID7-0-eax-levelling-MSR.patch 5d77b40f-fix-hvm_all_ioreq_servers_add_vcpu-cleanup.patch 5d80ea13-vpci-honor-read-only-devices.patch 5d8b715f-ACPI-cpuidle-bump-max-num-of-states.patch- bsc#1145774 - Libivrtd segfaults when trying to live migrate a VM Fix crash in an error path of libxl_domain_suspend with libxl.helper_done-crash.patch- Upstream bug fixes (bsc#1027519) 5d419d49-x86-spec-ctrl-report-proper-status.patch 5d43253c-x86-ucode-always-collect_cpu_info-at-boot.patch 5d4aa36f-x86-apic-enable-x2APIC-mode-earlier.patch 5d4afa7a-credit2-fix-memory-leak.patch 5d4d850a-introduce-bss-percpu-page-aligned.patch 5d516531-x86-xpti-dont-leak-TSS-adjacent-data.patch 5d5bf475-x86-PV-fix-handling-of-iommu-mappings.patch 5d6524ca-x86-mm-correctly-init-M2P-entries.patch - Drop 5d419d49-x86-spec-ctrl-facilities-report-wrong-status.patch- Preserve modified files which used to be marked as %config, rename file.rpmsave to file- Update to Xen 4.12.1 bug fix release (bsc#1027519) xen-4.12.1-testing-src.tar.bz2 - Drop patches contained in new tarball 5c87b644-IOMMU-leave-enabled-for-kexec-crash.patch 5c87b6a2-x86-HVM-dont-crash-guest-in-find_mmio_cache.patch 5c87b6c8-drop-arch_evtchn_inject.patch 5c87b6e8-avoid-atomic-rmw-accesses-in-map_vcpu_info.patch 5c87e6d1-x86-TSX-controls-for-RTM-force-abort-mode.patch 5c8f752c-x86-e820-build-with-gcc9.patch 5c8fb92d-x86-HVM-split-linear-reads-and-writes.patch 5c8fb951-x86-HVM-finish-IOREQs-correctly-on-completion.patch 5c8fc6c0-x86-MSR-shorten-ARCH_CAPABILITIES.patch 5c8fc6c0-x86-SC-retpoline-safety-calculations-for-eIBRS.patch 5c9e63c5-credit2-SMT-idle-handling.patch 5ca46b68-x86emul-no-GPR-update-upon-AVX-gather-failures.patch 5ca773d1-x86emul-dont-read-mask-reg-without-AVX512F.patch 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch 5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch 5cd921fb-trace-fix-build-with-gcc9.patch 5cd9224b-AMD-IOMMU-disable-upon-init-fail.patch 5cd922c5-x86-MTRR-recalc-p2mt-when-iocaps.patch 5cd9230f-VMX-correctly-get-GS_SHADOW-for-current.patch 5cd926d0-bitmap_fill-zero-sized.patch 5cd92724-drivers-video-drop-constraints.patch 5cd93a69-x86-MSR_INTEL_CORE_THREAD_COUNT.patch 5cd93a69-x86-boot-detect-Intel-SMT-correctly.patch 5cd93a69-x86-spec-ctrl-reposition-XPTI-parsing.patch 5cd981ff-x86-IRQ-tracing-avoid-UB-or-worse.patch 5cdad090-x86-spec-ctrl-CPUID-MSR-definitions-for-MDS.patch 5cdad090-x86-spec-ctrl-infrastructure-for-VERW-flush.patch 5cdad090-x86-spec-ctrl-misc-non-functional-cleanup.patch 5cdad090-x86-spec-ctrl-opts-to-control-VERW-flush.patch 5cdeb9fd-sched-fix-csched2_deinit_pdata.patch 5ce7a92f-x86-IO-APIC-fix-build-with-gcc9.patch 5cf0f6a4-x86-vhpet-resume-avoid-small-diff.patch 5cf16e51-x86-spec-ctrl-Knights-retpoline-safe.patch 5d03a0c4-1-Arm-add-an-isb-before-reading-CNTPCT_EL0.patch 5d03a0c4-2-gnttab-rework-prototype-of-set_status.patch 5d03a0c4-3-Arm64-rewrite-bitops-in-C.patch 5d03a0c4-4-Arm32-rewrite-bitops-in-C.patch 5d03a0c4-5-Arm-bitops-consolidate-prototypes.patch 5d03a0c4-6-Arm64-cmpxchg-simplify.patch 5d03a0c4-7-Arm32-cmpxchg-simplify.patch 5d03a0c4-8-Arm-bitops-helpers-with-timeout.patch 5d03a0c4-9-Arm-cmpxchg-helper-with-timeout.patch 5d03a0c4-A-Arm-turn-on-SILO-mode-by-default.patch 5d03a0c4-B-bitops-guest-helpers.patch 5d03a0c4-C-cmpxchg-guest-helpers.patch 5d03a0c4-D-use-guest-atomics-helpers.patch 5d03a0c4-E-Arm-add-perf-counters-in-guest-atomic-helpers.patch 5d03a0c4-F-Arm-protect-gnttab_clear_flag.patch - Refreshed patches libxl.pvscsi.patch- bsc#1143563 - Speculative mitigation facilities report wrong status 5d419d49-x86-spec-ctrl-facilities-report-wrong-status.patch- Update xen-dom0-modules.service (bsc#1137251) Map backend module names from pvops and xenlinux kernels to a module alias. This avoids errors from modprobe about unknown modules. Ignore a few xenlinux modules that lack aliases.- Gcc9 warnings seem to be cleared up with upstream fixes. Drop gcc9-ignore-warnings.patch- bsc#1138563 - L3: xenpvnetboot improperly ported to Python 3 fix-xenpvnetboot.patch- Move /etc/modprobe.d/xen_loop.conf to /lib/modprobe.d/xen_loop.conf- Remove /etc/xen/xenapiusers and /etc/pam.d/xen-api- Remove all upstream provided files in /etc/xen They are not required at runtime. The host admin is now responsible if he really needs anything in this subdirectory.- In our effort to make /etc fully admin controlled, move /etc/xen/scripts to libexec/xen/scripts with xen-tools.etc_pollution.patch- Move /etc/bash_completion.d/xl.sh to %{_datadir}/bash-completion/completions- bsc#1138294 - VUL-0: CVE-2019-17349: XSA-295: Unlimited Arm Atomics Operations 5d03a0c4-1-Arm-add-an-isb-before-reading-CNTPCT_EL0.patch 5d03a0c4-2-gnttab-rework-prototype-of-set_status.patch 5d03a0c4-3-Arm64-rewrite-bitops-in-C.patch 5d03a0c4-4-Arm32-rewrite-bitops-in-C.patch 5d03a0c4-5-Arm-bitops-consolidate-prototypes.patch 5d03a0c4-6-Arm64-cmpxchg-simplify.patch 5d03a0c4-7-Arm32-cmpxchg-simplify.patch 5d03a0c4-8-Arm-bitops-helpers-with-timeout.patch 5d03a0c4-9-Arm-cmpxchg-helper-with-timeout.patch 5d03a0c4-A-Arm-turn-on-SILO-mode-by-default.patch 5d03a0c4-B-bitops-guest-helpers.patch 5d03a0c4-C-cmpxchg-guest-helpers.patch 5d03a0c4-D-use-guest-atomics-helpers.patch 5d03a0c4-E-Arm-add-perf-counters-in-guest-atomic-helpers.patch 5d03a0c4-F-Arm-protect-gnttab_clear_flag.patch - Upstream bug fixes (bsc#1027519) 5c87b6c8-drop-arch_evtchn_inject.patch 5c87b6e8-avoid-atomic-rmw-accesses-in-map_vcpu_info.patch 5cd921fb-trace-fix-build-with-gcc9.patch 5cd9224b-AMD-IOMMU-disable-upon-init-fail.patch 5cd922c5-x86-MTRR-recalc-p2mt-when-iocaps.patch 5cd9230f-VMX-correctly-get-GS_SHADOW-for-current.patch 5cd926d0-bitmap_fill-zero-sized.patch 5cd92724-drivers-video-drop-constraints.patch 5cd93a69-x86-spec-ctrl-reposition-XPTI-parsing.patch (Replaces xsa297-0a.patch) 5cd93a69-x86-MSR_INTEL_CORE_THREAD_COUNT.patch (Replaces xsa297-0b.patch) 5cd93a69-x86-boot-detect-Intel-SMT-correctly.patch (Replaces xsa297-0c.patch) 5cdad090-x86-spec-ctrl-misc-non-functional-cleanup.patch (Replaces xsa297-0d.patch) 5cdad090-x86-spec-ctrl-CPUID-MSR-definitions-for-MDS.patch (Replaces xsa297-1.patch) 5cdad090-x86-spec-ctrl-infrastructure-for-VERW-flush.patch (Replaces xsa297-2.patch) 5cdad090-x86-spec-ctrl-opts-to-control-VERW-flush.patch (Replaces xsa297-3.patch) 5cd981ff-x86-IRQ-tracing-avoid-UB-or-worse.patch 5cdeb9fd-sched-fix-csched2_deinit_pdata.patch 5ce7a92f-x86-IO-APIC-fix-build-with-gcc9.patch 5cf0f6a4-x86-vhpet-resume-avoid-small-diff.patch 5cf16e51-x86-spec-ctrl-Knights-retpoline-safe.patch- Fix some outdated information in the readme README.SUSE- spec: xen-tools: require matching version of xen package bsc#1137471- Remove two stale patches xen.build-compare.man.patch xenpaging.doc.patch- Disable LTO (boo#1133296).- Remove arm32 from ExclusiveArch to fix build- bsc#1111331 - VUL-0: CPU issues Q2 2019 aka "Group 4". CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 xsa297-0a.patch xsa297-0b.patch xsa297-0c.patch xsa297-0d.patch xsa297-1.patch xsa297-2.patch xsa297-3.patch - Update 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch and drop 5cac6219-xen-cpu-Fix-ARM-build-following-cs-597fbb8.patch Refresh 5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch- bsc#1131811 - [XEN] internal error: libxenlight failed to create new domain. This patch is a workaround for a systemd issue. See patch header for additional comments. xenstore-launch.patch- bsc#1125378 - [xen][pygrub] Can not restore sle11sp4 pv guest after upgrading host from sle11sp4 to sle15sp1 pygrub-python3-conversion.patch - Fix "TypeError: virDomainDefineXML() argument 2 must be str or None, not bytes" when converting VMs from using the xm/xend toolstack to the libxl/libvirt toolstack. (bsc#1123378) xen2libvirt.py- bsc#1124560 - Fully virtualized guests crash on boot 5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch - bsc#1121391 - GCC 9: xen build fails 5c8f752c-x86-e820-build-with-gcc9.patch - Upstream bug fixes (bsc#1027519) 5c87b644-IOMMU-leave-enabled-for-kexec-crash.patch 5c87b6a2-x86-HVM-dont-crash-guest-in-find_mmio_cache.patch 5c87e6d1-x86-TSX-controls-for-RTM-force-abort-mode.patch 5c8fb92d-x86-HVM-split-linear-reads-and-writes.patch 5c8fb951-x86-HVM-finish-IOREQs-correctly-on-completion.patch 5c8fc6c0-x86-MSR-shorten-ARCH_CAPABILITIES.patch 5c8fc6c0-x86-SC-retpoline-safety-calculations-for-eIBRS.patch 5c9e63c5-credit2-SMT-idle-handling.patch 5ca46b68-x86emul-no-GPR-update-upon-AVX-gather-failures.patch 5ca773d1-x86emul-dont-read-mask-reg-without-AVX512F.patch 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch 5cac6219-xen-cpu-Fix-ARM-build-following-cs-597fbb8.patch- Install pkgconfig files into libdir instead of datadir- Update to Xen 4.12.0 FCS release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2 * HVM/PVH and PV only Hypervisor: The Xen 4.12 release separates the HVM/PVH and PV code paths in Xen and provides KCONFIG options to build a PV only or HVM/PVH only hypervisor. * QEMU Deprivilege (DM_RESTRICT): In Xen 4.12, this feature has been vastly improved. * Argo - Hypervisor-Mediated data eXchange: Argo is a new inter- domain communication mechanism. * Improvements to Virtual Machine Introspection: The VMI subsystem which allows detection of 0-day vulnerabilities has seen many functional and performance improvements. * Credit 2 Scheduler: The Credit2 scheduler is now the Xen Project default scheduler. * PVH Support: Grub2 boot support has been added to Xen and Grub2. * PVH Dom0: PVH Dom0 support has now been upgraded from experimental to tech preview. * The Xen 4.12 upgrade also includes improved IOMMU mapping code, which is designed to significantly improve the startup times of AMD EPYC based systems. * The upgrade also features Automatic Dom0 Sizing which allows the setting of Dom0 memory size as a percentage of host memory (e.g. 10%) or with an offset (e.g. 1G+10%).- bsc#1130485 - Please drop Requires on multipath-tools in xen-tools. Now using Recommends multipath-tools. xen.spec- Update to Xen 4.12.0 RC7 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- Update to Xen 4.12.0 RC6 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- bsc#1026236 - add Xen cmdline option "suse_vtsc_tolerance" to avoid TSC emulation for HVM domUs if their expected frequency does not match exactly the frequency of the receiving host xen.bug1026236.suse_vtsc_tolerance.patch- Update to Xen 4.12.0 RC5 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- jsc#SLE-3059 - Disable Xen auto-ballooning - Add CONFIG_DOM0_MEM to the spec file for managing dom0 memory. xen.spec - Disable autoballooning in xl.con xl-conf-disable-autoballoon.patch- Update gcc9-ignore-warnings.patch to fix build in SLE12- bsc#1126325 - fix crash in libxl in error path Setup of grant_tables and other variables may fail libxl.prepare-environment-for-domcreate_stream_done.patch- bsc#1127620 - Documentation for the xl configuration file allows for firmware=pvgrub64 but we don't ship pvgrub64. Create a link from grub.xen to pvgrub64 xen.spec- Update to Xen 4.12.0 RC4 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2 - Tarball also contains additional post RC4 security fixes for Xen Security Advisories 287, 288, and 290 through 294.- Update to Xen 4.12.0 RC3 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- Update to Xen 4.12.0 RC2 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- bsc#1121391 - GCC 9: xen build fails gcc9-ignore-warnings.patch- bsc#1122563 - Virtualization/xen: Bug no Xen on boot, missing /proc/xen, after 4.11 -> 4.12 upgrade on X86_64/efi. Keep xen.efi in /usr/lib64/efi for booting older distros. xen.spec- fate#326960: Package grub2 as noarch. As part of the effort to have a unified bootloader across architectures, modify the xen.spec file to move the Xen efi files to /usr/share/efi/$(uname -m) from /usr/lib64/efi.- Update to Xen 4.12.0 RC1 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2 - Drop 5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch 5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch 5b8fae26-tools-libxl-correct-vcpu-affinity-output-with-sparse-physical-cpu-map.patch 5b8fae26-xen-fill-topology-info-for-all-present-cpus.patch 5b8fb5af-tools-xl-refuse-to-set-number-of-vcpus-to-0-via-xl-vcpu-set.patch 5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch 5b9784d2-x86-HVM-add-known_gla-helper.patch 5b9784f2-x86-HVM-split-page-straddling-accesses.patch 5bdc31d5-VMX-fix-vmx_handle_eoi.patch gcc8-fix-array-warning-on-i586.patch gcc8-fix-format-warning-on-i586.patch gcc8-inlining-failed.patch xen.bug1079730.patch- bsc#1121960 - xen: sync with Factory xen.spec xen.changes- Replace old $RPM_* shell vars. - Run fdupes for all architectures, and not crossing subvolume boundaries.- Do not run %fdupes on aarch64 to avoid the hardlink-across-partition rpmlint error- Require qemu-seabios only on x86* as it is not available on non-x86 systems- Avoid creating dangling symlinks (bsc#1116524) This reverts the revert of tmp_build.patch- Update to Xen 4.11.1 bug fix release (bsc#1027519) xen-4.11.1-testing-src.tar.bz2 - 5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch replaces xen.2b50cdbc444c637575580dcfa6c9525a84d5cc62.patch - 5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch replaces xen.b8f33431f3dd23fb43a879f4bdb4283fdc9465ad.patch - Drop the following patches contained in the new tarball 5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch 5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch 5b3cab8e-2-VMX-improve-MSR-load-save-API.patch 5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch 5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch 5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch 5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch 5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch 5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch 5b3f8fa5-port-array_index_nospec-from-Linux.patch 5b4321f6-x86-correctly-set-nonlazy_xstate_used-when-loading-full-state.patch 5b4488e7-x86-spec-ctrl-cmdline-handling.patch 5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch 5b4c9a60-allow-cpu_down-to-be-called-earlier.patch 5b4db308-SVM-fix-cleanup-svm_inject_event.patch 5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch 5b5040f2-x86-AMD-distinguish-CU-from-HT.patch 5b505fe5-VMX-fix-find-msr-build.patch 5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch 5b508775-2-x86-possibly-bring-up-all-CPUs.patch 5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch 5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch 5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch 5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch 5b56feb1-hvm-Disallow-unknown-MSR_EFER-bits.patch 5b56feb2-spec-ctrl-Fix-the-parsing-of-xpti--on-fixed-Intel-hardware.patch 5b62ca93-VMX-avoid-hitting-BUG_ON.patch 5b6d84ac-x86-fix-improve-vlapic-read-write.patch 5b6d8ce2-x86-XPTI-parsing.patch 5b72fbbe-ARM-disable-grant-table-v2.patch 5b72fbbe-oxenstored-eval-order.patch 5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch 5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch 5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch 5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch 5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch 5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch 5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch 5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch 5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch 5b72fbbf-x86-Make-spec-ctrl-no-a-global-disable-of-all-mitigations.patch 5b72fbbf-xl.conf-Add-global-affinity-masks.patch 5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch 5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch 5b75afef-x86-setup-avoid-OoB-E820-lookup.patch 5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch 5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch 5b8d5832-x86-assorted-array_index_nospec-insertions.patch 5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch 5bacae4b-x86-boot-allocate-extra-module-slot.patch 5bae44ce-x86-silence-false-log-messages.patch 5bb60c12-x86-split-opt_xpti.patch 5bb60c4f-x86-split-opt_pv_l1tf.patch 5bb60c74-x86-fix-xpti-and-pv-l1tf.patch 5bcf0722-x86-boot-enable-NMIs.patch 5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch 5bd076e9-x86-boot-init-debug-regs-correctly.patch 5bd076e9-x86-init-vcpu-debug-regs-correctly.patch 5bd0e0cf-vvmx-Disallow-the-use-of-VT-x-instructions-when-nested-virt-is-disabled.patch 5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch 5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch 5be2a308-x86-extend-get_platform_badpages.patch 5be2a354-x86-work-around-HLE-host-lockup-erratum.patch xsa275-1.patch xsa275-2.patch xsa276-1.patch xsa276-2.patch xsa277.patch xsa279.patch xsa280-1.patch xsa280-2.patch- bsc#1116524 - Package xen-tools-4.11.0_09-2.1.x86_64 broken: Missing /bin/domu-xenstore. This was broken because "make package build reproducible" change. (boo#1047218, boo#1062303) This fix reverses the change to this patch. tmp_build.patch- bsc#1115040 - VUL-0: CVE-2018-19961 CVE-2018-19962: xen: insufficient TLB flushing / improper large page mappings with AMD IOMMUs (XSA-275) xsa275-1.patch xsa275-2.patch - bsc#1115043 - VUL-0: CVE-2018-19963: xen: resource accounting issues in x86 IOREQ server handling (XSA-276) xsa276-1.patch xsa276-2.patch - bsc#1115044 - VUL-0: CVE-2018-19964: xen: x86: incorrect error handling for guest p2m page removals (XSA-277) xsa277.patch - bsc#1114405 - VUL-0: CVE-2018-18883: xen: Nested VT-x usable even when disabled (XSA-278) 5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch - bsc#1115045 - VUL-0: xen: CVE-2018-19965: x86: DoS from attempting to use INVPCID with a non-canonical addresses (XSA-279) xsa279.patch - bsc#1115047 - VUL-0: CVE-2018-19966: xen: Fix for XSA-240 conflicts with shadow paging (XSA-280) xsa280-1.patch xsa280-2.patch - bsc#1114988 - VUL-0: CVE-2018-19967: xen: guest use of HLE constructs may lock up host (XSA-282) 5be2a308-x86-extend-get_platform_badpages.patch 5be2a354-x86-work-around-HLE-host-lockup-erratum.patch - bsc#1108940 - L3: XEN SLE12-SP1 domU hang on SLE12-SP3 HV 5bdc31d5-VMX-fix-vmx_handle_eoi.patch - Upstream bug fixes (bsc#1027519) 5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch 5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch 5bacae4b-x86-boot-allocate-extra-module-slot.patch 5bae44ce-x86-silence-false-log-messages.patch 5bb60c12-x86-split-opt_xpti.patch 5bb60c4f-x86-split-opt_pv_l1tf.patch 5bb60c74-x86-fix-xpti-and-pv-l1tf.patch 5bcf0722-x86-boot-enable-NMIs.patch 5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch 5bd076e9-x86-boot-init-debug-regs-correctly.patch 5bd076e9-x86-init-vcpu-debug-regs-correctly.patch 5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch- bsc#1114405 - VUL-0: CVE-2018-18883: xen: Nested VT-x usable even when disabled (XSA-278) 5bd0e0cf-vvmx-Disallow-the-use-of-VT-x-instructions-when-nested-virt-is-disabled.patch- Use SMBIOS_REL_DATE instead of SMBIOS_DATE for reproducible binaries- make package build reproducible (boo#1047218, boo#1062303) * Set SMBIOS_REL_DATE * Update tmp_build.patch to use SHA instead of random build-id * Add reproducible.patch to use --no-insert-timestamp- Building with ncurses 6.1 will fail without xen.2b50cdbc444c637575580dcfa6c9525a84d5cc62.patch - Building libxl acpi support on aarch64 with gcc 8.2 will fail without xen.b8f33431f3dd23fb43a879f4bdb4283fdc9465ad.patch- bsc#1106263 - L3: The affinity reporting via 'xl vcpu-list' is apparently broken 5b8fae26-tools-libxl-correct-vcpu-affinity-output-with-sparse-physical-cpu-map.patch 5b8fae26-xen-fill-topology-info-for-all-present-cpus.patch 5b8fb5af-tools-xl-refuse-to-set-number-of-vcpus-to-0-via-xl-vcpu-set.patch- bsc#1094508 - L3: Kernel oops in fs/dcache.c called by d_materialise_unique() 5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch 5b9784d2-x86-HVM-add-known_gla-helper.patch 5b9784f2-x86-HVM-split-page-straddling-accesses.patch - bsc#1103279 - (CVE-2018-15470) VUL-0: CVE-2018-15470: xen: oxenstored does not apply quota-maxentity (XSA-272) 5b72fbbe-oxenstored-eval-order.patch - bsc#1103275 - (CVE-2018-15469) VUL-0: CVE-2018-15469: xen: Use of v2 grant tables may cause crash on ARM (XSA-268) 5b72fbbe-ARM-disable-grant-table-v2.patch - Upstream patches from Jan (bsc#1027519) 5b6d84ac-x86-fix-improve-vlapic-read-write.patch 5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch 5b75afef-x86-setup-avoid-OoB-E820-lookup.patch 5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch 5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch 5b8d5832-x86-assorted-array_index_nospec-insertions.patch - Drop 5b741962-x86-write-to-correct-variable-in-parse_pv_l1tf.patch- bsc#1078292 - rpmbuild -ba SPECS/xen.spec with xen-4.9.1 failed xen.spec- bsc#1091107 - VUL-0: CVE-2018-3646: xen: L1 Terminal Fault -VMM (XSA-273) 5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch 5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch 5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch 5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch 5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch 5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch 5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch 5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch - bsc#1103276 - VUL-0: CVE-2018-15468: xen: x86: Incorrect MSR_DEBUGCTL handling lets guests enable BTS (XSA-269) 5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch - Upstream prereq patches for XSA-273 and other upstream fixes (bsc#1027519) 5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch 5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch 5b3cab8e-2-VMX-improve-MSR-load-save-API.patch 5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch 5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch 5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch 5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch 5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch 5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch 5b4321f6-x86-correctly-set-nonlazy_xstate_used-when-loading-full-state.patch 5b505fe5-VMX-fix-find-msr-build.patch 5b56feb1-hvm-Disallow-unknown-MSR_EFER-bits.patch 5b56feb2-spec-ctrl-Fix-the-parsing-of-xpti--on-fixed-Intel-hardware.patch 5b62ca93-VMX-avoid-hitting-BUG_ON.patch 5b6d8ce2-x86-XPTI-parsing.patch 5b72fbbf-x86-Make-spec-ctrl-no-a-global-disable-of-all-mitigations.patch 5b72fbbf-xl.conf-Add-global-affinity-masks.patch 5b741962-x86-write-to-correct-variable-in-parse_pv_l1tf.patch- Upstream patches from Jan (bsc#1027519) 5b3f8fa5-port-array_index_nospec-from-Linux.patch 5b4488e7-x86-spec-ctrl-cmdline-handling.patch 5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch 5b4c9a60-allow-cpu_down-to-be-called-earlier.patch 5b4db308-SVM-fix-cleanup-svm_inject_event.patch 5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch 5b5040f2-x86-AMD-distinguish-CU-from-HT.patch 5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch 5b508775-2-x86-possibly-bring-up-all-CPUs.patch 5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch 5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch 5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch 5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch gcc8-fix-format-warning-on-i586.patch gcc8-fix-array-warning-on-i586.patch - Drop xen.fuzz-_FORTIFY_SOURCE.patch gcc8-fix-warning-on-i586.patch- Update to Xen 4.11.0 FCS (fate#325202, fate#325123) xen-4.11.0-testing-src.tar.bz2 disable-building-pv-shim.patch - Dropped patches 5a33a12f-domctl-improve-locking-during-domain-destruction.patch 5a6703cb-x86-move-invocations-of-hvm_flush_guest_tlbs.patch 5a79d7ed-libxc-packed-initrd-dont-fail-domain-creation.patch 5a9985bd-x86-invpcid-support.patch 5ac72a48-gcc8.patch 5ac72a5f-gcc8.patch 5ac72a64-gcc8.patch 5ac72a69-gcc8.patch 5ac72a6e-gcc8.patch 5ac72a74-gcc8.patch 5ac72a7b-gcc8.patch 5ad4923e-x86-correct-S3-resume-ordering.patch 5ad49293-x86-suppress-BTI-mitigations-around-S3.patch 5ad600d4-x86-pv-introduce-x86emul_read_dr.patch 5ad600d4-x86-pv-introduce-x86emul_write_dr.patch 5ad8c3a7-x86-spec_ctrl-update-retpoline-decision-making.patch 5adda097-x86-HPET-fix-race-triggering-ASSERT.patch 5adda0d5-x86-HVM-never-retain-emulated-insn-cache.patch 5adde9ed-xpti-fix-double-fault-handling.patch 5ae06fad-SVM-fix-intercepts-for-SYS-CALL-ENTER-MSRs.patch 5ae31917-x86-cpuidle-init-stats-lock-once.patch 5aeaeae4-introduce-vcpu_sleep_nosync_locked.patch 5aeaeaf0-sched-fix-races-in-vcpu-migration.patch 5aeb2c57-x86-retval-checks-of-set-guest-trapbounce.patch 5aec7393-1-x86-xpti-avoid-copy.patch 5aec7393-2-x86-xpti-write-cr3.patch 5aec744a-3-x86-xpti-per-domain-flag.patch 5aec744a-4-x86-xpti-use-invpcid.patch 5aec744a-5-x86-xpti-no-global-pages.patch 5aec744a-6-x86-xpti-cr3-valid-flag.patch 5aec744a-7-x86-xpti-pv_guest_cr4_to_real_cr4.patch 5aec744b-8-x86-xpti-cr3-helpers.patch 5aec74a8-9-x86-xpti-use-pcid.patch 5af1daa9-1-x86-traps-fix-dr6-handing-in-DB-handler.patch 5af1daa9-2-x86-pv-move-exception-injection-into-test_all_events.patch 5af1daa9-3-x86-traps-use-IST-for-DB.patch 5af1daa9-4-x86-traps-fix-handling-of-DB-in-hypervisor-context.patch 5af1daa9-x86-HVM-guard-against-bogus-emulator-ioreq-state.patch 5af1daa9-x86-vpt-support-IO-APIC-routed-intr.patch 5af97999-viridian-cpuid-leaf-40000003.patch 5afc13ae-1-x86-read-MSR_ARCH_CAPABILITIES-once.patch 5afc13ae-2-x86-express-Xen-SPEC_CTRL-choice-as-variable.patch 5afc13ae-3-x86-merge-bti_ist_info-use_shadow_spec_ctrl.patch 5afc13ae-4-x86-fold-XEN_IBRS-ALTERNATIVES.patch 5afc13ae-5-x86-rename-bits-of-spec_ctrl-infrastructure.patch 5afc13ae-6-x86-elide-MSR_SPEC_CTRL-handling-in-idle.patch 5afc13ae-7-x86-split-X86_FEATURE_SC_MSR.patch 5afc13ae-8-x86-explicitly-set-Xen-default-SPEC_CTRL.patch 5afc13ae-9-x86-cpuid-improve-guest-policies-for-speculative.patch 5afc13ae-A-x86-introduce-spec-ctrl-cmdline-opt.patch 5b02c786-x86-AMD-mitigations-for-GPZ-SP4.patch 5b02c786-x86-Intel-mitigations-for-GPZ-SP4.patch 5b02c786-x86-msr-virtualise-SPEC_CTRL-SSBD.patch 5b0bc9da-x86-XPTI-fix-S3-resume.patch 5b0d2286-libxc-x86-PV-dont-hand-through-CPUID-leaf-0x80000008.patch 5b0d2d91-x86-suppress-sync-when-XPTI-off.patch 5b0d2dbc-x86-correct-default_xen_spec_ctrl.patch 5b0d2ddc-x86-CPUID-dont-override-tool-stack-hidden-STIBP.patch 5b150ef9-x86-fix-error-handling-of-pv-dr7-shadow.patch 5b21825d-1-x86-support-fully-eager-FPU-context-switching.patch 5b21825d-2-x86-spec-ctrl-mitigations-for-LazyFPU.patch 5b238b92-x86-HVM-account-for-fully-eager-FPU.patch 5b2b7172-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b31e004-x86-HVM-emul-attempts-FPU-set-fpu_initialised.patch 5b323e3c-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b34882d-x86-mm-dont-bypass-preemption-checks.patch 5b348874-x86-refine-checks-in-DB-handler.patch 5b348897-libxl-qemu_disk_scsi_drive_string-break-out-common.patch 5b3488a2-libxl-restore-passing-ro-to-qemu-for-SCSI-disks.patch 5b34891a-x86-HVM-dont-cause-NM-to-be-raised.patch 5b348954-x86-guard-against-NM.patch libxl.Add-a-version-check-of-QEMU-for-QMP-commands.patch libxl.LIBXL_DESTROY_TIMEOUT.patch libxl.qmp-Tell-QEMU-about-live-migration-or-snapshot.patch xen_fix_build_with_acpica_20180427_and_new_packages.patch- Submit upstream patch libacpi: fixes for iasl >= 20180427 git commit 858dbaaeda33b05c1ac80aea0ba9a03924e09005 xen_fix_build_with_acpica_20180427_and_new_packages.patch This is needed for acpica package to get updated in our build service- Upstream patches from Jan (bsc#1027519) 5b02c786-x86-AMD-mitigations-for-GPZ-SP4.patch (Replaces Spectre-v4-1.patch) 5b02c786-x86-Intel-mitigations-for-GPZ-SP4.patch (Replaces Spectre-v4-2.patch) 5b02c786-x86-msr-virtualise-SPEC_CTRL-SSBD.patch (Replaces Spectre-v4-3.patch) 5b0bc9da-x86-XPTI-fix-S3-resume.patch 5b0d2286-libxc-x86-PV-dont-hand-through-CPUID-leaf-0x80000008.patch 5b0d2d91-x86-suppress-sync-when-XPTI-off.patch 5b0d2dbc-x86-correct-default_xen_spec_ctrl.patch 5b0d2ddc-x86-CPUID-dont-override-tool-stack-hidden-STIBP.patch 5b150ef9-x86-fix-error-handling-of-pv-dr7-shadow.patch 5b21825d-1-x86-support-fully-eager-FPU-context-switching.patch (Replaces xsa267-1.patch) 5b21825d-2-x86-spec-ctrl-mitigations-for-LazyFPU.patch (Replaces xsa267-2.patch) 5b238b92-x86-HVM-account-for-fully-eager-FPU.patch 5b2b7172-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b31e004-x86-HVM-emul-attempts-FPU-set-fpu_initialised.patch 5b323e3c-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b34882d-x86-mm-dont-bypass-preemption-checks.patch (Replaces xsa264.patch) 5b348874-x86-refine-checks-in-DB-handler.patch (Replaces xsa265.patch) 5b348897-libxl-qemu_disk_scsi_drive_string-break-out-common.patch (Replaces xsa266-1-<>.patch) 5b3488a2-libxl-restore-passing-ro-to-qemu-for-SCSI-disks.patch (Replaces xsa266-2-<>.patch) 5b34891a-x86-HVM-dont-cause-NM-to-be-raised.patch 5b348954-x86-guard-against-NM.patch- Fix more build gcc8 related failures with xen.fuzz-_FORTIFY_SOURCE.patch- bsc#1098403 - fix regression introduced by changes for bsc#1079730 a PV domU without qcow2 and/or vfb has no qemu attached. Ignore QMP errors for PV domUs to handle PV domUs with and without an attached qemu-xen. xen.bug1079730.patch- bsc#1097521 - VUL-0: CVE-2018-12891: xen: preemption checks bypassed in x86 PV MM handling (XSA-264) xsa264.patch - bsc#1097522 - VUL-0: CVE-2018-12893: xen: x86: #DB exception safety check can be triggered by a guest (XSA-265) xsa265.patch - bsc#1097523 - VUL-0: CVE-2018-12892: xen: libxl fails to honour readonly flag on HVM emulated SCSI disks (XSA-266) xsa266-1-libxl-qemu_disk_scsi_drive_string-Break-out-common-p.patch xsa266-2-libxl-restore-passing-readonly-to-qemu-for-SCSI-disk.patch- bsc#1095242 - VUL-0: CVE-2018-3665: xen: Lazy FP Save/Restore (XSA-267) xsa267-1.patch xsa267-2.patch- bsc#1092543 - GCC 8: xen build fails gcc8-fix-warning-on-i586.patch- bsc#1092631 - VUL-0: CVE-2018-3639: xen: V4 – Speculative Store Bypass aka "Memory Disambiguation" (XSA-263) 5ad4923e-x86-correct-S3-resume-ordering.patch 5ad49293-x86-suppress-BTI-mitigations-around-S3.patch 5afc13ae-1-x86-read-MSR_ARCH_CAPABILITIES-once.patch 5afc13ae-2-x86-express-Xen-SPEC_CTRL-choice-as-variable.patch 5afc13ae-3-x86-merge-bti_ist_info-use_shadow_spec_ctrl.patch 5afc13ae-4-x86-fold-XEN_IBRS-ALTERNATIVES.patch 5afc13ae-5-x86-rename-bits-of-spec_ctrl-infrastructure.patch 5afc13ae-6-x86-elide-MSR_SPEC_CTRL-handling-in-idle.patch 5afc13ae-7-x86-split-X86_FEATURE_SC_MSR.patch 5afc13ae-8-x86-explicitly-set-Xen-default-SPEC_CTRL.patch 5afc13ae-9-x86-cpuid-improve-guest-policies-for-speculative.patch 5afc13ae-A-x86-introduce-spec-ctrl-cmdline-opt.patch Spectre-v4-1.patch Spectre-v4-2.patch Spectre-v4-3.patch- Always call qemus xen-save-devices-state in suspend/resume to fix migration with qcow2 images (bsc#1079730) libxl.Add-a-version-check-of-QEMU-for-QMP-commands.patch libxl.qmp-Tell-QEMU-about-live-migration-or-snapshot.patch xen.bug1079730.patch- bsc#1087289 - L3: Xen BUG at sched_credit.c:1663 5aeaeae4-introduce-vcpu_sleep_nosync_locked.patch 5aeaeaf0-sched-fix-races-in-vcpu-migration.patch - Upstream patches from Jan (bsc#1027519) 5ad600d4-x86-pv-introduce-x86emul_read_dr.patch 5ad600d4-x86-pv-introduce-x86emul_write_dr.patch 5ad8c3a7-x86-spec_ctrl-update-retpoline-decision-making.patch 5adda097-x86-HPET-fix-race-triggering-ASSERT.patch 5adda0d5-x86-HVM-never-retain-emulated-insn-cache.patch 5ae06fad-SVM-fix-intercepts-for-SYS-CALL-ENTER-MSRs.patch 5ae31917-x86-cpuidle-init-stats-lock-once.patch 5aeb2c57-x86-retval-checks-of-set-guest-trapbounce.patch 5af1daa9-1-x86-traps-fix-dr6-handing-in-DB-handler.patch (Replaces xsa260-1.patch) 5af1daa9-2-x86-pv-move-exception-injection-into-test_all_events.patch (Replaces xsa260-2.patch) 5af1daa9-3-x86-traps-use-IST-for-DB.patch (Replaces xsa260-3.patch) 5af1daa9-4-x86-traps-fix-handling-of-DB-in-hypervisor-context.patch (Replaces xsa260-4.patch) 5af1daa9-x86-HVM-guard-against-bogus-emulator-ioreq-state.patch (Replaces xsa262.patch) 5af1daa9-x86-vpt-support-IO-APIC-routed-intr.patch (Replaces xsa261.patch) 5af97999-viridian-cpuid-leaf-40000003.patch- Fixes related to Page Table Isolation (XPTI). bsc#1074562 XSA-254 5a6703cb-x86-move-invocations-of-hvm_flush_guest_tlbs.patch 5a9985bd-x86-invpcid-support.patch 5adde9ed-xpti-fix-double-fault-handling.patch 5aec7393-1-x86-xpti-avoid-copy.patch 5aec7393-2-x86-xpti-write-cr3.patch 5aec744a-3-x86-xpti-per-domain-flag.patch 5aec744a-4-x86-xpti-use-invpcid.patch 5aec744a-5-x86-xpti-no-global-pages.patch 5aec744a-6-x86-xpti-cr3-valid-flag.patch 5aec744a-7-x86-xpti-pv_guest_cr4_to_real_cr4.patch 5aec744b-8-x86-xpti-cr3-helpers.patch 5aec74a8-9-x86-xpti-use-pcid.patch- bsc#1092543 - GCC 8: xen build fails 5ac72a48-gcc8.patch 5ac72a5f-gcc8.patch 5ac72a64-gcc8.patch 5ac72a69-gcc8.patch 5ac72a6e-gcc8.patch 5ac72a74-gcc8.patch 5ac72a7b-gcc8.patch gcc8-inlining-failed.patch- Update to Xen 4.10.1 bug fix release (bsc#1027519) xen-4.10.1-testing-src.tar.bz2 disable-building-pv-shim.patch - Drop the following patches contained in the new tarball 5a21a77e-x86-pv-construct-d0v0s-GDT-properly.patch 5a2fda0d-x86-mb2-avoid-Xen-when-looking-for-module-crashkernel-pos.patch 5a2ffc1f-x86-mm-drop-bogus-paging-mode-assertion.patch 5a313972-x86-microcode-add-support-for-AMD-Fam17.patch 5a32bd79-x86-vmx-dont-use-hvm_inject_hw_exception-in-.patch 5a4caa5e-x86-IRQ-conditionally-preserve-access-perm.patch 5a4caa8c-x86-E820-don-t-overrun-array.patch 5a4e2bca-x86-free-msr_vcpu_policy-during-destruction.patch 5a4e2c2c-x86-upcall-inject-spurious-event-after-setting-vector.patch 5a4fd893-1-x86-break-out-alternative-asm-into-separate-header.patch 5a4fd893-2-x86-introduce-ALTERNATIVE_2-macros.patch 5a4fd893-3-x86-hvm-rename-update_guest_vendor-to-cpuid_policy_changed.patch 5a4fd893-4-x86-introduce-cpuid_policy_updated.patch 5a4fd893-5-x86-entry-remove-partial-cpu_user_regs.patch 5a4fd894-1-x86-rearrange-RESTORE_ALL-to-restore-in-stack-order.patch 5a4fd894-2-x86-hvm-use-SAVE_ALL-after-VMExit.patch 5a4fd894-3-x86-erase-guest-GPRs-on-entry-to-Xen.patch 5a4fd894-4-clarifications-to-wait-infrastructure.patch 5a534c78-x86-dont-use-incorrect-CPUID-values-for-topology.patch 5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4-updates.patch 5a5e2cff-x86-Meltdown-band-aid.patch 5a5e2d73-x86-Meltdown-band-aid-conditional.patch 5a5e3a4e-1-x86-support-compiling-with-indirect-branch-thunks.patch 5a5e3a4e-2-x86-support-indirect-thunks-from-asm.patch 5a5e3a4e-3-x86-report-speculative-mitigation-details.patch 5a5e3a4e-4-x86-AMD-set-lfence-as-Dispatch-Serialising.patch 5a5e3a4e-5-x86-introduce-alternative-indirect-thunks.patch 5a5e3a4e-6-x86-definitions-for-Indirect-Branch-Controls.patch 5a5e3a4e-7-x86-cmdline-opt-to-disable-IBRS-IBPB-STIBP.patch 5a5e459c-1-x86-SVM-offer-CPUID-faulting-to-AMD-HVM-guests.patch 5a5e459c-2-x86-report-domain-id-on-CPUID.patch 5a68bc16-x86-acpi-process-softirqs-logging-Cx.patch 5a69c0b9-x86-fix-GET_STACK_END.patch 5a6b36cd-1-x86-cpuid-handling-of-IBRS-IBPB-STIBP-and-IBRS-for-guests.patch 5a6b36cd-2-x86-msr-emulation-of-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-3-x86-migrate-MSR_SPEC_CTRL.patch 5a6b36cd-4-x86-hvm-permit-direct-access-to-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-5-x86-use-SPEC_CTRL-on-entry.patch 5a6b36cd-6-x86-clobber-RSB-RAS-on-entry.patch 5a6b36cd-7-x86-no-alternatives-in-NMI-MC-paths.patch 5a6b36cd-8-x86-boot-calculate-best-BTI-mitigation.patch 5a6b36cd-9-x86-issue-speculation-barrier.patch 5a6b36cd-A-x86-offer-Indirect-Branch-Controls-to-guests.patch 5a6b36cd-B-x86-clear-SPEC_CTRL-while-idle.patch 5a7b1bdd-x86-reduce-Meltdown-band-aid-IPI-overhead.patch 5a843807-x86-spec_ctrl-fix-bugs-in-SPEC_CTRL_ENTRY_FROM_INTR_IST.patch 5a856a2b-x86-emul-fix-64bit-decoding-of-segment-overrides.patch 5a856a2b-x86-use-32bit-xors-for-clearing-GPRs.patch 5a856a2b-x86-xpti-hide-almost-all-of-Xen-image-mappings.patch 5a8be788-x86-nmi-start-NMI-watchdog-on-CPU0-after-SMP.patch 5a95373b-x86-PV-avoid-leaking-other-guests-MSR_TSC_AUX.patch 5a95571f-memory-dont-implicitly-unpin-in-decrease-res.patch 5a95576c-gnttab-ARM-dont-corrupt-shared-GFN-array.patch 5a955800-gnttab-dont-free-status-pages-on-ver-change.patch 5a955854-x86-disallow-HVM-creation-without-LAPIC-emul.patch 5a956747-x86-HVM-dont-give-wrong-impression-of-WRMSR-success.patch 5a9eb7f1-x86-xpti-dont-map-stack-guard-pages.patch 5a9eb85c-x86-slightly-reduce-XPTI-overhead.patch 5a9eb890-x86-remove-CR-reads-from-exit-to-guest-path.patch 5aa2b6b9-cpufreq-ondemand-CPU-offlining-race.patch 5aaa9878-x86-vlapic-clear-TMR-bit-for-edge-triggered-intr.patch xsa258.patch xsa259.patch- bsc#1090820 - VUL-0: CVE-2018-8897: xen: x86: mishandling of debug exceptions (XSA-260) xsa260-1.patch xsa260-2.patch xsa260-3.patch xsa260-4.patch - bsc#1090822 - VUL-0: CVE-2018-10982: xen: x86 vHPET interrupt injection errors (XSA-261) xsa261.patch - bsc#1090823 - VUL-0: CVE-2018-10981: xen: qemu may drive Xen into unbounded loop (XSA-262) xsa262.patch- bsc#1089152 - VUL-0: CVE-2018-10472: xen: Information leak via crafted user-supplied CDROM (XSA-258) xsa258.patch - bsc#1089635 - VUL-0: CVE-2018-10471: xen: x86: PV guest may crash Xen with XPTI (XSA-259) xsa259.patch- Preserve xen-syms from xen-dbg.gz to allow processing vmcores with crash(1) (bsc#1087251)- Upstream patches from Jan (bsc#1027519) and fixes related to Page Table Isolation (XPTI). See also bsc#1074562 XSA-254 5a856a2b-x86-xpti-hide-almost-all-of-Xen-image-mappings.patch 5a9eb7f1-x86-xpti-dont-map-stack-guard-pages.patch 5a9eb85c-x86-slightly-reduce-XPTI-overhead.patch 5a9eb890-x86-remove-CR-reads-from-exit-to-guest-path.patch 5aa2b6b9-cpufreq-ondemand-CPU-offlining-race.patch 5aaa9878-x86-vlapic-clear-TMR-bit-for-edge-triggered-intr.patch- bsc#1072834 - Xen HVM: unchecked MSR access error: RDMSR from 0xc90 at rIP: 0xffffffff93061456 (native_read_msr+0x6/0x30) 5a956747-x86-HVM-dont-give-wrong-impression-of-WRMSR-success.patch - Upstream patches from Jan (bsc#1027519) 5a79d7ed-libxc-packed-initrd-dont-fail-domain-creation.patch 5a7b1bdd-x86-reduce-Meltdown-band-aid-IPI-overhead.patch 5a843807-x86-spec_ctrl-fix-bugs-in-SPEC_CTRL_ENTRY_FROM_INTR_IST.patch 5a856a2b-x86-emul-fix-64bit-decoding-of-segment-overrides.patch 5a856a2b-x86-use-32bit-xors-for-clearing-GPRs.patch 5a8be788-x86-nmi-start-NMI-watchdog-on-CPU0-after-SMP.patch 5a95373b-x86-PV-avoid-leaking-other-guests-MSR_TSC_AUX.patch 5a95571f-memory-dont-implicitly-unpin-in-decrease-res.patch (Replaces xsa252.patch) 5a95576c-gnttab-ARM-dont-corrupt-shared-GFN-array.patch (Replaces xsa255-1.patch) 5a955800-gnttab-dont-free-status-pages-on-ver-change.patch (Replaces xsa255-2.patch) 5a955854-x86-disallow-HVM-creation-without-LAPIC-emul.patch (Replaces xsa256.patch) - Drop xsa252.patch xsa255-1.patch xsa255-2.patch xsa256.patch- bsc#1080635 - VUL-0: CVE-2018-7540: xen: DoS via non-preemptable L3/L4 pagetable freeing (XSA-252) xsa252.patch - bsc#1080662 - VUL-0: CVE-2018-7541: xen: grant table v2 -> v1 transition may crash Xen (XSA-255) xsa255-1.patch xsa255-2.patch - bsc#1080634 - VUL-0: CVE-2018-7542: xen: x86 PVH guest without LAPIC may DoS the host (XSA-256) xsa256.patch- Remove stale systemd presets code for 13.2 and older- fate#324965 - add script, udev rule and systemd service to watch for vcpu online/offline events in a HVM domU They are triggered via xl vcpu-set domU N- Replace hardcoded xen with Name tag when refering to subpkgs- Make sure tools and tools-domU require libs from the very same build- tools-domU: Add support for qemu guest agent. New files 80-xen-channel-setup.rules and xen-channel-setup.sh configure a xen-pv-channel for use by the guest agent FATE#324963- Remove outdated /etc/xen/README*- bsc#1073961 - VUL-0: CVE-2018-5244: xen: x86: memory leak with MSR emulation (XSA-253) 5a4e2bca-x86-free-msr_vcpu_policy-during-destruction.patch - bsc#1074562 - VUL-0: CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 xen: Information leak via side effects of speculative execution (XSA-254). Includes Spectre v2 mitigation. 5a4caa5e-x86-IRQ-conditionally-preserve-access-perm.patch 5a4caa8c-x86-E820-don-t-overrun-array.patch 5a4e2c2c-x86-upcall-inject-spurious-event-after-setting-vector.patch 5a4fd893-1-x86-break-out-alternative-asm-into-separate-header.patch 5a4fd893-2-x86-introduce-ALTERNATIVE_2-macros.patch 5a4fd893-3-x86-hvm-rename-update_guest_vendor-to-cpuid_policy_changed.patch 5a4fd893-4-x86-introduce-cpuid_policy_updated.patch 5a4fd893-5-x86-entry-remove-partial-cpu_user_regs.patch 5a4fd894-1-x86-rearrange-RESTORE_ALL-to-restore-in-stack-order.patch 5a4fd894-2-x86-hvm-use-SAVE_ALL-after-VMExit.patch 5a4fd894-3-x86-erase-guest-GPRs-on-entry-to-Xen.patch 5a4fd894-4-clarifications-to-wait-infrastructure.patch 5a534c78-x86-dont-use-incorrect-CPUID-values-for-topology.patch 5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4-updates.patch 5a5e2cff-x86-Meltdown-band-aid.patch 5a5e2d73-x86-Meltdown-band-aid-conditional.patch 5a5e3a4e-1-x86-support-compiling-with-indirect-branch-thunks.patch 5a5e3a4e-2-x86-support-indirect-thunks-from-asm.patch 5a5e3a4e-3-x86-report-speculative-mitigation-details.patch 5a5e3a4e-4-x86-AMD-set-lfence-as-Dispatch-Serialising.patch 5a5e3a4e-5-x86-introduce-alternative-indirect-thunks.patch 5a5e3a4e-6-x86-definitions-for-Indirect-Branch-Controls.patch 5a5e3a4e-7-x86-cmdline-opt-to-disable-IBRS-IBPB-STIBP.patch 5a5e459c-1-x86-SVM-offer-CPUID-faulting-to-AMD-HVM-guests.patch 5a5e459c-2-x86-report-domain-id-on-CPUID.patch 5a68bc16-x86-acpi-process-softirqs-logging-Cx.patch 5a69c0b9-x86-fix-GET_STACK_END.patch 5a6b36cd-1-x86-cpuid-handling-of-IBRS-IBPB-STIBP-and-IBRS-for-guests.patch 5a6b36cd-2-x86-msr-emulation-of-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-3-x86-migrate-MSR_SPEC_CTRL.patch 5a6b36cd-4-x86-hvm-permit-direct-access-to-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-5-x86-use-SPEC_CTRL-on-entry.patch 5a6b36cd-6-x86-clobber-RSB-RAS-on-entry.patch 5a6b36cd-7-x86-no-alternatives-in-NMI-MC-paths.patch 5a6b36cd-8-x86-boot-calculate-best-BTI-mitigation.patch 5a6b36cd-9-x86-issue-speculation-barrier.patch 5a6b36cd-A-x86-offer-Indirect-Branch-Controls-to-guests.patch 5a6b36cd-B-x86-clear-SPEC_CTRL-while-idle.patch- Fix python3 deprecated atoi call (bsc#1067224) pygrub-python3-conversion.patch - Drop xenmon-python3-conversion.patch- bsc#1067317 - pass cache=writeback|unsafe|directsync to qemu, depending on the libxl disk settings libxl.add-option-to-disable-disk-cache-flushes-in-qdisk.patch- Remove libxl.LIBXL_DESTROY_TIMEOUT.debug.patch- bsc#1067224 - xen-tools have hard dependency on Python 2 build-python3-conversion.patch bin-python3-conversion.patch- bsc#1070165 - xen crashes after aborted localhost migration 5a2ffc1f-x86-mm-drop-bogus-paging-mode-assertion.patch - bsc#1035442 - L3: libxl: error: libxl.c:1676:devices_destroy_cb: libxl__devices_destroy failed 5a33a12f-domctl-improve-locking-during-domain-destruction.patch - Upstream patches from Jan (bsc#1027519) 5a21a77e-x86-pv-construct-d0v0s-GDT-properly.patch 5a2fda0d-x86-mb2-avoid-Xen-when-looking-for-module-crashkernel-pos.patch 5a313972-x86-microcode-add-support-for-AMD-Fam17.patch 5a32bd79-x86-vmx-dont-use-hvm_inject_hw_exception-in-.patch- Update to Xen 4.10.0 FCS (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Rebuild initrd if xen-tools-domU is updated- Update to Xen 4.10.0-rc8 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Increase the value of LIBXL_DESTROY_TIMEOUT from 10 to 100 seconds If many domUs shutdown in parallel the backends can not keep up Add some debug output to track how long backend shutdown takes (bsc#1035442) libxl.LIBXL_DESTROY_TIMEOUT.patch libxl.LIBXL_DESTROY_TIMEOUT.debug.patch- Adjust xenstore-run-in-studomain.patch to change the defaults in the code instead of changing the sysconfig template, to also cover the upgrade case- Update to Xen 4.10.0-rc6 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Since xen switched to Kconfig, building a debug hypervisor was done by default. Adjust make logic to build a non-debug hypervisor by default, and continue to provide one as xen-dbg.gz- fate#316614: set migration constraints from cmdline fix libxl.set-migration-constraints-from-cmdline.patch for xen-4.10- Document the suse-diskcache-disable-flush option in xl-disk-configuration(5) (bsc#879425,bsc#1067317)- Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468)- Update to Xen 4.10.0-rc5 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - fate#323663 - Run Xenstore in stubdomain xenstore-run-in-studomain.patch- bsc#1067224 - xen-tools have hard dependency on Python 2 pygrub-python3-conversion.patch xenmon-python3-conversion.patch migration-python3-conversion.patch xnloader.py xen2libvirt.py- Remove xendriverdomain.service (bsc#1065185) Driver domains must be configured manually with custom .service file- Update to Xen 4.10.0-rc3 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - Drop 59f31268-libxc-remove-stale-error-check-for-domain-size.patch- Adjust xen-dom0-modules.service to ignore errors (bsc#1065187)- fate#324052 Support migration of Xen HVM domains larger than 1TB 59f31268-libxc-remove-stale-error-check-for-domain-size.patch- Update to Xen 4.10.0-rc2 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Update to Xen 4.10.0-rc1 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - Drop patches included in new tarball 592fd5f0-stop_machine-fill-result-only-in-case-of-error.patch 596f257e-x86-fix-hvmemul_insn_fetch.patch 5982fd99-VT-d-don-t-panic-warn-on-iommu-no-igfx.patch 598c3630-VT-d-PI-disable-when-CPU-side-PI-is-off.patch 598c3706-cpufreq-only-stop-ondemand-governor-if-started.patch 5992f1e5-x86-grant-disallow-misaligned-PTEs.patch 5992f20d-gnttab-split-maptrack-lock-to-make-it-useful-again.patch 5992f233-gnttab-correct-pin-status-fixup-for-copy.patch 59958e76-gnttab-dont-use-possibly-unbounded-tail-calls.patch 59958ebf-gnttab-fix-transitive-grant-handling.patch 59958edd-gnttab-avoid-spurious-maptrack-handle-alloc-failures.patch 599da329-arm-mm-release-grant-lock-on-xatp1-error-paths.patch 59a01223-x86-check-for-alloc-errors-in-modify_xen_mappings.patch 59a0130c-x86-efi-dont-write-relocs-in-efi_arch_relocate_image-1st-pass.patch 59a9221f-VT-d-use-correct-BDF-for-VF-to-search-VT-d-unit.patch 59ae9177-x86-emul-fix-handling-of-unimplemented-Grp7-insns.patch 59aec335-x86emul-correct-VEX-W-handling-for-VPINSRD.patch 59aec375-x86emul-correct-VEX-L-handling-for-VCVTx2SI.patch 59afcea0-x86-introduce-and-use-setup_force_cpu_cap.patch 59b2a7f2-x86-HVM-correct-repeat-count-update-linear-phys.patch 59b7d664-mm-make-sure-node-is-less-than-MAX_NUMNODES.patch 59b7d69b-grant_table-fix-GNTTABOP_cache_flush-handling.patch 59b7d6c8-xenstore-dont-unlink-connection-object-twice.patch 59b7d6d9-gnttab-also-validate-PTE-perms-upon-destroy-replace.patch gcc7-arm.patch gcc7-mini-os.patch- bsc#1061084 - VUL-0: xen: page type reference leak on x86 (XSA-242) xsa242.patch - bsc#1061086 - VUL-0: xen: x86: Incorrect handling of self-linear shadow mappings with translated guests (XSA-243) xsa243.patch - bsc#1061087 - VUL-0: xen: x86: Incorrect handling of IST settings during CPU hotplug (XSA-244) xsa244.patch- bsc#1061077 - VUL-0: xen: DMOP map/unmap missing argument checks (XSA-238) xsa238.patch - bsc#1061080 - VUL-0: xen: hypervisor stack leak in x86 I/O intercept code (XSA-239) xsa239.patch - bsc#1061081 - VUL-0: xen: Unlimited recursion in linear pagetable de-typing (XSA-240) xsa240-1.patch xsa240-2.patch - bsc#1061082 - VUL-0: xen: Stale TLB entry due to page type release race (XSA-241) xsa241.patch- bsc#1061075 - VUL-0: xen: pin count / page reference race in grant table code (XSA-236) xsa236.patch - bsc#1061076 - VUL-0: xen: multiple MSI mapping issues on x86 (XSA-237) xsa237-1.patch xsa237-2.patch xsa237-3.patch xsa237-4.patch xsa237-5.patch- bsc#1056278 - VUL-0: xen: Missing NUMA node parameter verification (XSA-231) 59b7d664-mm-make-sure-node-is-less-than-MAX_NUMNODES.patch - bsc#1056280 - VUL-0: xen: Missing check for grant table (XSA-232) 59b7d69b-grant_table-fix-GNTTABOP_cache_flush-handling.patch - bsc#1056281 - VUL-0: xen: cxenstored: Race in domain cleanup (XSA-233) 59b7d6c8-xenstore-dont-unlink-connection-object-twice.patch - bsc#1056282 - VUL-0: xen: insufficient grant unmapping checks for x86 PV guests (XSA-234) 59b7d6d9-gnttab-also-validate-PTE-perms-upon-destroy-replace.patch - bsc#1055321 - VUL-0: xen: add-to-physmap error paths fail to release lock on ARM (XSA-235) 599da329-arm-mm-release-grant-lock-on-xatp1-error-paths.patch - Upstream patches from Jan (bsc#1027519) 59a01223-x86-check-for-alloc-errors-in-modify_xen_mappings.patch 59a0130c-x86-efi-dont-write-relocs-in-efi_arch_relocate_image-1st-pass.patch 59a9221f-VT-d-use-correct-BDF-for-VF-to-search-VT-d-unit.patch 59ae9177-x86-emul-fix-handling-of-unimplemented-Grp7-insns.patch 59aec335-x86emul-correct-VEX-W-handling-for-VPINSRD.patch 59aec375-x86emul-correct-VEX-L-handling-for-VCVTx2SI.patch 59afcea0-x86-introduce-and-use-setup_force_cpu_cap.patch 59b2a7f2-x86-HVM-correct-repeat-count-update-linear-phys.patch - Dropped gcc7-xen.patch- bsc#1057358 - Cannot Boot into SLES12.3 with Xen hypervisor when Secure Boot is Enabled xen.spec- bsc#1055695 - XEN: 11SP4 and 12SP3 HVM guests can not be restored update from v6 to v9 to cover more cases for ballooned domUs libxc.sr.superpage.patch- bsc#1026236 - remove suse_vtsc_tolerance= cmdline option for Xen drop the patch because it is not upstream acceptable remove xen.suse_vtsc_tolerance.patch- bsc#1055695 - XEN: 11SP4 and 12SP3 HVM guests can not be restored after the save using xl stack libxc.sr.superpage.patch- Unignore gcc-PIE the toolstack disables PIE for firmware builds as needed- Upstream patches from Jan (bsc#1027519) 592fd5f0-stop_machine-fill-result-only-in-case-of-error.patch 596f257e-x86-fix-hvmemul_insn_fetch.patch 5982fd99-VT-d-don-t-panic-warn-on-iommu-no-igfx.patch 598c3630-VT-d-PI-disable-when-CPU-side-PI-is-off.patch 598c3706-cpufreq-only-stop-ondemand-governor-if-started.patch 5992f1e5-x86-grant-disallow-misaligned-PTEs.patch (Replaces xsa227.patch) 5992f20d-gnttab-split-maptrack-lock-to-make-it-useful-again.patch (Replaces xsa228.patch) 5992f233-gnttab-correct-pin-status-fixup-for-copy.patch (Replaces xsa230.patch) 59958e76-gnttab-dont-use-possibly-unbounded-tail-calls.patch (Replaces xsa226-1.patch) 59958ebf-gnttab-fix-transitive-grant-handling.patch (Replaces xsa226-2.patch) 59958edd-gnttab-avoid-spurious-maptrack-handle-alloc-failures.patch- bsc#1044974 - xen-tools require python-pam xen.spec- Clean up spec file errors and a few warnings. (bsc#1027519) - Removed conditional 'with_systemd' and some old deprecated 'sles_version' checks. xen.spec- Remove use of brctl utiltiy from supportconfig plugin FATE#323639- Use upstream variant of mini-os __udivmoddi4 change gcc7-mini-os.patch- fate#323639 Move bridge-utils to legacy replace-obsolete-network-configuration-commands-in-s.patch- bsc#1052686 - VUL-0: xen: grant_table: possibly premature clearing of GTF_writing / GTF_reading (XSA-230) xsa230.patch- bsc#1035231 - migration of HVM domU does not use superpages on destination dom0 libxc.sr.superpage.patch- bsc#1051787 - VUL-0: CVE-2017-12135: xen: possibly unbounded recursion in grant table code (XSA-226) xsa226-1.patch xsa226-2.patch - bsc#1051788 - VUL-0: CVE-2017-12137: xen: x86: PV privilege escalation via map_grant_ref (XSA-227) xsa227.patch - bsc#1051789 - VUL-0: CVE-2017-12136: xen: grant_table: Race conditions with maptrack free list handling (XSA-228) xsa228.patch- Add a supportconfig plugin xen-supportconfig FATE#323661- bsc#1026236 - add suse_vtsc_tolerance= cmdline option for Xen To avoid emulation of TSC access from a domU after live migration add a global tolerance for the measured host kHz xen.suse_vtsc_tolerance.patch- fate#323662 Drop qemu-dm from xen-tools package The following tarball and patches have been removed qemu-xen-traditional-dir-remote.tar.bz2 VNC-Support-for-ExtendedKeyEvent-client-message.patch 0001-net-move-the-tap-buffer-into-TAPState.patch 0002-net-increase-tap-buffer-size.patch 0003-e1000-fix-access-4-bytes-beyond-buffer-end.patch 0004-e1000-secrc-support.patch 0005-e1000-multi-buffer-packet-support.patch 0006-e1000-clear-EOP-for-multi-buffer-descriptors.patch 0007-e1000-verify-we-have-buffers-upfront.patch 0008-e1000-check-buffer-availability.patch CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch CVE-2015-4037-qemut-smb-config-dir-name.patch CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch CVE-2016-7908-qemut-net-Infinite-loop-in-mcf_fec_do_tx.patch CVE-2016-7909-qemut-net-pcnet-infinite-loop-in-pcnet_rdra_addr.patch CVE-2016-8667-qemut-dma-rc4030-divide-by-zero-error-in-set_next_tick.patch CVE-2016-8669-qemut-char-divide-by-zero-error-in-serial_update_parameters.patch CVE-2016-8910-qemut-net-rtl8139-infinite-loop-while-transmit-in-Cplus-mode.patch CVE-2016-9921-qemut-display-cirrus_vga-divide-by-zero-in-cirrus_do_copy.patch CVE-2017-6505-qemut-usb-an-infinite-loop-issue-in-ohci_service_ed_list.patch CVE-2017-8309-qemut-audio-host-memory-leakage-via-capture-buffer.patch CVE-2017-9330-qemut-usb-ohci-infinite-loop-due-to-incorrect-return-value.patch blktap.patch cdrom-removable.patch xen-qemu-iscsi-fix.patch qemu-security-etch1.patch xen-disable-qemu-monitor.patch xen-hvm-default-bridge.patch qemu-ifup-set-mtu.patch ioemu-vnc-resize.patch capslock_enable.patch altgr_2.patch log-guest-console.patch bdrv_open2_fix_flags.patch bdrv_open2_flags_2.patch ioemu-7615-qcow2-fix-alloc_cluster_link_l2.patch qemu-dm-segfault.patch bdrv_default_rwflag.patch kernel-boot-hvm.patch ioemu-watchdog-support.patch ioemu-watchdog-linkage.patch ioemu-watchdog-ib700-timer.patch ioemu-hvm-pv-support.patch pvdrv_emulation_control.patch ioemu-disable-scsi.patch ioemu-disable-emulated-ide-if-pv.patch xenpaging.qemu.flush-cache.patch ioemu-devicemodel-include.patch - Cleanup spec file and remove unused KMP patches kmp_filelist supported_module.patch xen_pvonhvm.xen_emul_unplug.patch- bsc#1002573 - Optimize LVM functions in block-dmmd block-dmmd- Record initial Xen dmesg in /var/log/xen/xen-boot.log for supportconfig. Keep previous log in /var/log/xen/xen-boot.prev.log- Remove storytelling from description in xen.rpm- Update to Xen 4.9.0 FCS (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update block-dmmd script (bsc#1002573) block-dmmd- Update to Xen 4.9.0-rc8+ (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 gcc7-arm.patch - Drop gcc7-error-xenpmd.patch- Update to Xen 4.9.0-rc8 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1042160 - VUL-1: CVE-2017-9330: xen: usb: ohci: infinite loop due to incorrect return value CVE-2017-9330-qemut-usb-ohci-infinite-loop-due-to-incorrect-return-value.patch- bsc#1037243 - VUL-1: CVE-2017-8309: xen: audio: host memory leakage via capture buffer CVE-2017-8309-qemut-audio-host-memory-leakage-via-capture-buffer.patch- Update to Xen 4.9.0-rc7 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update to Xen 4.9.0-rc6 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1031343 - xen fails to build with GCC 7 gcc7-mini-os.patch gcc7-xen.patch- bsc#1031343 - xen fails to build with GCC 7 gcc7-error-xenpmd.patch- Update to Xen 4.9.0-rc5 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 - Drop xen-tools-pkgconfig-xenlight.patch- bsc#1037779 - xen breaks kexec-tools build xen-tools-pkgconfig-xenlight.patch- Update to Xen 4.9.0-rc4 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1036146 - sles12sp2 xen VM dumps core to wrong path xen.spec- Update to Xen 4.9.0-rc3 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 aarch64-maybe-uninitialized.patch- Update to Xen 4.9.0-rc2 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update to Xen 4.9.0-rc1 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 ioemu-devicemodel-include.patch - Dropped patches contained in new tarball xen-4.8.0-testing-src.tar.bz2 0001-xenstore-let-write_node-and-some-callers-return-errn.patch 0002-xenstore-undo-function-rename.patch 0003-xenstore-rework-of-transaction-handling.patch 584806ce-x86emul-correct-PUSHF-POPF.patch 584fc649-fix-determining-when-domain-creation-is-complete.patch 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch 58510cac-x86emul-MOVNTI-no-REP-prefixes.patch 58526ccc-x86emul-64bit-ignore-most-segment-bases-in-align-check.patch 5853ed37-VT-d-correct-dma_msi_set_affinity.patch 5853ee07-x86emul-CMPXCHG16B-aligned-operand.patch 58580060-x86-emul-correct-SYSCALL-eflags-handling.patch 585aa3c5-x86-force-EFLAGS-IF-on-upon-exit-to-PV.patch 585aa407-x86-HVM-NULL-check-before-using-VMFUNC-hook.patch 585bd5fe-x86-emul-correct-VMFUNC-return-value-handling.patch 586ba81c-x86-cpu-dont-update-this_cpu-for-guest-get_cpu_vendor.patch 587d04d6-x86-xstate-fix-array-overrun-with-LWP.patch 587de4a9-x86emul-VEX-B-ignored-in-compat-mode.patch 5882129d-x86emul-LOCK-check-adjustments.patch 58821300-x86-segment-attribute-handling.patch 58873c1f-x86emul-correct-FPU-stub-asm-constraints.patch 58873c80-x86-hvm-do-not-set-msr_tsc_adjust-on-.patch 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5887888f-credit2-never-consider-CPUs-outside-of-pool.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5888b1b3-x86-emulate-dont-assume-addr_size-32-implies-protmode.patch 5899cbd9-EPT-allow-wrcomb-MMIO-mappings-again.patch 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch 58a44771-IOMMU-always-call-teardown-callback.patch 58a48ccc-x86-fix-p2m_flush_table-for-non-nested.patch 58a59f4b-libxl-correct-xenstore-entry-for-empty-cdrom.patch 58a70d94-VMX-fix-VMCS-race-on-cswitch-paths.patch 58ac1f3f-VMX-dont-leak-host-syscall-MSRs.patch 58b5a2de-x86-correct-Xens-idea-of-its-memory-layout.patch 58b6fd42-credit2-always-mark-a-tickled-pCPU-as-tickled.patch 58b6fd42-credit2-dont-miss-accounting-during-credit-reset.patch 58cbf682-x86-EFI-avoid-overrunning-mb_modules.patch 58cf9200-x86-EFI-avoid-IOMMU-faults-on-tail-gap.patch 58cf9260-x86-EFI-avoid-Xen-when-looking-for-mod-kexec-pos.patch 58cf9277-x86-time-dont-use-vTSC-if-host-guest-freqs-match.patch 58d25ea2-xenstore-add-missing-checks-for-allocation-failure.patch 58d91365-sched-dont-call-wrong-hook-via-VCPU2OP.patch CVE-2017-2615-qemut-display-cirrus-oob-access-while-doing-bitblt-copy-backward-mode.patch CVE-2017-2620-xsa209-qemut-cirrus_bitblt_cputovideo-does-not-check-if-memory-region-safe.patch glibc-2.25-compatibility-fix.patch xs-09-add_change_node-params.patch xs-10-call-add_change_node.patch xs-11-tdb-record-header.patch xs-12-node-gen-count.patch xs-13-read-directory-part-support.patch xs-14-command-array.patch xs-15-command-return-val.patch xs-16-function-static.patch xs-17-arg-parsing.patch xs-18-default-buffer.patch xs-19-handle-alloc-failures.patch xs-20-tdb-version.patch xs-21-empty-tdb-database.patch xs-22-reopen_log-fix.patch xs-23-XS_DEBUG-rename.patch xs-24-xenstored_control.patch xs-25-control-enhance.patch xs-26-log-control.patch xs-27-memory-report.patch xs-28-remove-talloc-report.patch xs-29-define-off_t.patch xsa206-0001-xenstored-apply-a-write-transaction-rate-limit.patch xsa206-0002-xenstored-Log-when-the-write-transaction-rate-limit.patch- bsc#1022703 - Xen HVM guest with OVMF hangs with unattached CDRom 58a59f4b-libxl-correct-xenstore-entry-for-empty-cdrom.patch- bsc#1015348 - L3: libvirtd does not start during boot suse-xendomains-service.patch- bsc#1014136 - Partner-L3: kdump can't dump a kernel on SLES12-SP2 with Xen hypervisor. 58cf9260-x86-EFI-avoid-Xen-when-looking-for-mod-kexec-pos.patch - bsc#1026236 - L3: Paravirtualized vs. fully virtualized migration - latter one much faster 58cf9277-x86-time-dont-use-vTSC-if-host-guest-freqs-match.patch - Upstream patch from Jan 58cbf682-x86-EFI-avoid-overrunning-mb_modules.patch 58cf9200-x86-EFI-avoid-IOMMU-faults-on-tail-gap.patch 58d91365-sched-dont-call-wrong-hook-via-VCPU2OP.patch- bsc#1022555 - L3: Timeout in "execution of /etc/xen/scripts/block add" 58d25ea2-xenstore-add-missing-checks-for-allocation-failure.patch 0001-xenstore-let-write_node-and-some-callers-return-errn.patch 0002-xenstore-undo-function-rename.patch 0003-xenstore-rework-of-transaction-handling.patch - bsc#1030144 - VUL-0: xen: xenstore denial of service via repeated update (XSA-206) xsa206-0001-xenstored-apply-a-write-transaction-rate-limit.patch xsa206-0002-xenstored-Log-when-the-write-transaction-rate-limit.patch - bsc#1029827 - Forward port xenstored xs-09-add_change_node-params.patch xs-10-call-add_change_node.patch xs-11-tdb-record-header.patch xs-12-node-gen-count.patch xs-13-read-directory-part-support.patch xs-14-command-array.patch xs-15-command-return-val.patch xs-16-function-static.patch xs-17-arg-parsing.patch xs-18-default-buffer.patch xs-19-handle-alloc-failures.patch xs-20-tdb-version.patch xs-21-empty-tdb-database.patch xs-22-reopen_log-fix.patch xs-23-XS_DEBUG-rename.patch xs-24-xenstored_control.patch xs-25-control-enhance.patch xs-26-log-control.patch xs-27-memory-report.patch xs-28-remove-talloc-report.patch xs-29-define-off_t.patch- bsc#1029128 - fix make xen to really produce xen.efi with gcc48- bsc#1028235 - VUL-0: CVE-2017-6505: xen: qemu: usb: an infinite loop issue in ohci_service_ed_list CVE-2017-6505-qemut-usb-an-infinite-loop-issue-in-ohci_service_ed_list.patch - Upstream patches from Jan (bsc#1027519) 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5899cbd9-EPT-allow-wrcomb-MMIO-mappings-again.patch 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch 58a44771-IOMMU-always-call-teardown-callback.patch 58a48ccc-x86-fix-p2m_flush_table-for-non-nested.patch 58a70d94-VMX-fix-VMCS-race-on-cswitch-paths.patch 58ac1f3f-VMX-dont-leak-host-syscall-MSRs.patch 58b5a2de-x86-correct-Xens-idea-of-its-memory-layout.patch 58b6fd42-credit2-always-mark-a-tickled-pCPU-as-tickled.patch 58b6fd42-credit2-dont-miss-accounting-during-credit-reset.patch- bsc#1027654 - XEN fails to build against glibc 2.25 glibc-2.25-compatibility-fix.patch libxl.pvscsi.patch- fate#316613: Refresh and enable libxl.pvscsi.patch- bsc#1024834 - VUL-0: CVE-2017-2620: xen: cirrus_bitblt_cputovideo does not check if memory region is safe (XSA-209) CVE-2017-2620-xsa209-qemut-cirrus_bitblt_cputovideo-does-not-check-if-memory-region-safe.patch- bsc#1023948 - [pvusb][sles12sp3][openqa] Segmentation fault happened when adding usbctrl devices via xl 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch- Upstream patches from Jan (bsc#1027519) 587d04d6-x86-xstate-fix-array-overrun-with-LWP.patch 587de4a9-x86emul-VEX-B-ignored-in-compat-mode.patch 5882129d-x86emul-LOCK-check-adjustments.patch 58821300-x86-segment-attribute-handling.patch 58873c1f-x86emul-correct-FPU-stub-asm-constraints.patch 58873c80-x86-hvm-do-not-set-msr_tsc_adjust-on-.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5887888f-credit2-never-consider-CPUs-outside-of-pool.patch 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5888b1b3-x86-emulate-dont-assume-addr_size-32-implies-protmode.patch- bsc#1023004 - VUL-0: CVE-2017-2615: qemu: display: cirrus: oob access while doing bitblt copy backward mode CVE-2017-2615-qemut-display-cirrus-oob-access-while-doing-bitblt-copy-backward-mode.patch- fate#322313 and fate#322150 require the acpica package ported to aarch64 which Xen 4.8 needs to build. Temporarily disable aarch64 until these fates are complete. xen.spec- bsc#1021952 - Virutalization/xen: Bug xen-tools missing /usr/bin/domu-xenstore; guests fail to launch tmp_build.patch xen.spec- No systemd presets for 42.3+ and SLE12SP3+ (bsc#1012842)- bsc#1007224 - broken symlinks in /usr/share/doc/packages/xen/misc/ xen.spec- 585aa3c5-x86-force-EFLAGS-IF-on-upon-exit-to-PV.patch Replaces xsa202.patch (bsc#1014298) - 585aa407-x86-HVM-NULL-check-before-using-VMFUNC-hook.patch Replaces xsa203.patch (bsc#1014300) - 58580060-x86-emul-correct-SYSCALL-eflags-handling.patch Replaces xsa204.patch (bsc#1016340) - Upstream patches from Jan 58526ccc-x86emul-64bit-ignore-most-segment-bases-in-align-check.patch 5853ed37-VT-d-correct-dma_msi_set_affinity.patch 5853ee07-x86emul-CMPXCHG16B-aligned-operand.patch 585bd5fe-x86-emul-correct-VMFUNC-return-value-handling.patch 586ba81c-x86-cpu-dont-update-this_cpu-for-guest-get_cpu_vendor.patch- bsc#1015169 - VUL-0: CVE-2016-9921, CVE-2016-9922: xen: qemu: display: cirrus_vga: a divide by zero in cirrus_do_copy CVE-2016-9921-qemut-display-cirrus_vga-divide-by-zero-in-cirrus_do_copy.patch- bsc#1016340 - VUL-0: CVE-2016-10013: xen: x86: Mishandling of SYSCALL singlestep during emulation (XSA-204) xsa204.patch- bsc#1012651 - VUL-0: CVE-2016-9932: xen: x86 CMPXCHG8B emulation fails to ignore operand size override (XSA-200) 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch- bsc#1014298 - VUL-0: CVE-2016-10024: xen: x86 PV guests may be able to mask interrupts (XSA-202) xsa202.patch - bsc#1014300 - VUL-0: CVE-2016-10025: xen: x86: missing NULL pointer check in VMFUNC emulation (XSA-203) xsa203.patch - Upstream patches from Jan 584806ce-x86emul-correct-PUSHF-POPF.patch 584fc649-fix-determining-when-domain-creation-is-complete.patch 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch 58510cac-x86emul-MOVNTI-no-REP-prefixes.patch- Update to Xen 4.8 FCS xen-4.8.0-testing-src.tar.bz2 - Dropped xen-4.7.1-testing-src.tar.bz2 0001-libxc-Rework-extra-module-initialisation.patch 0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch 0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch 0004-firmware-makefile-install-BIOS-blob.patch 0005-libxl-Load-guest-BIOS-from-file.patch 0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch 0007-hvmloader-Grab-the-hvm_start_info-pointer.patch 0008-hvmloader-Locate-the-BIOS-blob.patch 0009-hvmloader-Check-modules-whereabouts-in-perform_tests.patch 0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch 0011-hvmloader-Load-OVMF-from-modules.patch 0012-hvmloader-Specific-bios_load-function-required.patch 0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch 0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch 57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch 576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 5769106e-x86-generate-assembler-equates-for-synthesized.patch 57a1e603-x86-time-adjust-local-system-time-initialization.patch 57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch 57a30261-x86-support-newer-Intel-CPU-models.patch 5810a9cc-x86-emul-Correct-decoding-of-SReg3-operands.patch 581b2c3b-x86-emul-reject-LGDT-LIDT-with-non-canonical-addresses.patch 581b647a-x86emul-L-S-G-I-DT-ignore-opsz-overrides-in-64-bit-mode.patch 58249392-x86-svm-dont-clobber-eax-edx-if-RDMSR-intercept-fails.patch 582c35d6-x86-vmx-correct-long-mode-check-in-vmx_cpuid_intercept.patch 582c35ee-x86-traps-dont-call-hvm_hypervisor_cpuid_leaf-for-PV.patch 58343dc2-x86-hvm-Fix-the-handling-of-non-present-segments.patch 58343df8-x86-HVM-dont-load-LDTR-with-VM86-mode-attrs-during-task-switch.patch 58343e24-x86-PV-writes-of-fs-and-gs-base-MSRs-require-canonical-addresses.patch 58343e9e-libelf-fix-stack-memory-leak-when-loading-32-bit-symbol-tables.patch 58343ec2-x86emul-fix-huge-bit-offset-handling.patch 58343f29-x86-emul-correct-the-IDT-entry-calculation-in-inject_swint.patch 58343f44-x86-svm-fix-injection-of-software-interrupts.patch 58343f79-pygrub-Properly-quote-results-when-returning-them-to-the-caller.patch CVE-2016-9381-xsa197-qemut.patch CVE-2016-9637-xsa199-qemut.patch- bsc#1011652 - VUL-0: xen: qemu ioport array overflow CVE-2016-9637-xsa199-qemut.patch- bsc#1009100 - VUL-0: CVE-2016-9386: XSA-191: xen: x86 null segments not always treated as unusable 58343dc2-x86-hvm-Fix-the-handling-of-non-present-segments.patch - bsc#1009103 - VUL-0: CVE-2016-9382: XSA-192: xen: x86 task switch to VM86 mode mis-handled 58343df8-x86-HVM-dont-load-LDTR-with-VM86-mode-attrs-during-task-switch.patch - bsc#1009104 - VUL-0: CVE-2016-9385: XSA-193: xen: x86 segment base write emulation lacking canonical address checks 58343e24-x86-PV-writes-of-fs-and-gs-base-MSRs-require-canonical-addresses.patch - bsc#1009105 - VUL-0: CVE-2016-9384: XSA-194: xen: guest 32-bit ELF symbol table load leaking host data 58343e9e-libelf-fix-stack-memory-leak-when-loading-32-bit-symbol-tables.patch - bsc#1009107 - VUL-0: CVE-2016-9383: XSA-195: xen: x86 64-bit bit test instruction emulation broken 58343ec2-x86emul-fix-huge-bit-offset-handling.patch - bsc#1009108 - VUL-0: CVE-2016-9377,CVE-2016-9378: XSA-196: xen: x86 software interrupt injection mis-handled 58343f29-x86-emul-correct-the-IDT-entry-calculation-in-inject_swint.patch 58343f44-x86-svm-fix-injection-of-software-interrupts.patch - bsc#1009109 - VUL-0: CVE-2016-9381: XSA-197: xen: qemu incautious about shared ring processing CVE-2016-9381-xsa197-qemut.patch - bsc#1009111 - VUL-0: CVE-2016-9379,CVE-2016-9380: XSA-198: xen: delimiter injection vulnerabilities in pygrub 58343f79-pygrub-Properly-quote-results-when-returning-them-to-the-caller.patch - Upstream patches from Jan 581b2c3b-x86-emul-reject-LGDT-LIDT-with-non-canonical-addresses.patch 581b647a-x86emul-L-S-G-I-DT-ignore-opsz-overrides-in-64-bit-mode.patch 58249392-x86-svm-dont-clobber-eax-edx-if-RDMSR-intercept-fails.patch 582c35d6-x86-vmx-correct-long-mode-check-in-vmx_cpuid_intercept.patch 582c35ee-x86-traps-dont-call-hvm_hypervisor_cpuid_leaf-for-PV.patch- Update to Xen Version 4.7.1 xen-4.7.1-testing-src.tar.bz2 - Dropped patches contained in new tarball xen-4.7.0-testing-src.tar.bz2 575e9ca0-nested-vmx-Validate-host-VMX-MSRs-before-accessing-them.patch 57640448-xen-sched-use-default-scheduler-upon-an-invalid-sched.patch 57973099-have-schedulers-revise-initial-placement.patch 579730e6-remove-buggy-initial-placement-algorithm.patch 57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch 57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch 57ac6316-don-t-restrict-DMA-heap-to-node-0.patch 57b71fc5-x86-EFI-don-t-apply-relocations-to-l-2-3-_bootmap.patch 57b7447b-dont-permit-guest-to-populate-PoD-pages-for-itself.patch 57c4412b-x86-HVM-add-guarding-logic-for-VMX-specific-code.patch 57c57f73-libxc-correct-max_pfn-calculation-for-saving-domain.patch 57c805bf-x86-levelling-restrict-non-architectural-OSXSAVE-handling.patch 57c805c1-x86-levelling-pass-vcpu-to-ctxt_switch_levelling.patch 57c805c3-x86-levelling-provide-architectural-OSXSAVE-handling.patch 57c82be2-x86-32on64-adjust-call-gate-emulation.patch 57c93e52-fix-error-in-libxl_device_usbdev_list.patch 57c96df3-credit1-fix-a-race-when-picking-initial-pCPU.patch 57c96e2c-x86-correct-PT_NOTE-file-position.patch 57cfed43-VMX-correct-feature-checks-for-MPX-and-XSAVES.patch 57d1563d-x86-32on64-don-t-allow-recursive-page-tables-from-L3.patch 57d15679-x86-emulate-Correct-boundary-interactions-of-emulated-insns.patch 57d1569a-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch 57d18642-hvm-fep-Allow-test-insns-crossing-1-0-boundary.patch 57d18642-x86-segment-Bounds-check-accesses-to-emulation-ctxt-seg_reg.patch 57d7ca5f-x86-domctl-fix-TOCTOU-race-in-XEN_DOMCTL_getvcpuextstate.patch 57d7ca64-x86-domctl-fix-migration-of-guests-not-using-xsave.patch 57da8883-credit1-fix-mask-to-be-used-for-tickling.patch 57da8883-credit2-properly-schedule-migration-of-running-vcpu.patch 57dfb1c5-x86-Intel-hide-CPUID-faulting-capability-from-guests.patch 57e93e1d-x86emul-correct-loading-of-ss.patch 57e93e4a-x86emul-don-t-allow-null-selector-for-LTR.patch 57e93e89-x86-AMD-apply-erratum-665-workaround.patch 57ee6cbc-credit1-return-time-remaining-to-limit-as-next-timeslice.patch 57f3a8ee-x86emul-honor-guest-CR0-TS-and-CR0-EM.patch 57fb6a91-x86-defer-not-present-segment-checks.patch 5800c51d-x86-hvm-Clobber-cs-L-when-LME-becomes-set.patch 5800caec-x86emul-fix-pushing-of-selector-registers.patch 5800cb06-x86-Viridian-don-t-depend-on-undefined-register-state.patch 580e29f9-x86-MISALIGNSSE-feature-depends-on-SSE.patch 57dfb2ff-x86-Intel-Broadwell-no-PKG_C8-10_RESIDENCY-MSRs.patch- bsc#1004981 - Xen RPM doesn't contain debug hypervisor for EFI systems xen.spec- bsc#1000106 - VUL-0: CVE-2016-7777: xen: CR0.TS and CR0.EM not always honored for x86 HVM guests (XSA-190) 57f3a8ee-x86emul-honor-guest-CR0-TS-and-CR0-EM.patch - bsc#996191 - [XEN][acpi]residency -n 88 -c will cause xen panic on broadwell-ep 57dfb2ff-x86-Intel-Broadwell-no-PKG_C8-10_RESIDENCY-MSRs.patch - Upstream patches from Jan 57d7ca5f-x86-domctl-fix-TOCTOU-race-in-XEN_DOMCTL_getvcpuextstate.patch 57d7ca64-x86-domctl-fix-migration-of-guests-not-using-xsave.patch 57da8883-credit1-fix-mask-to-be-used-for-tickling.patch 57da8883-credit2-properly-schedule-migration-of-running-vcpu.patch 57dfb1c5-x86-Intel-hide-CPUID-faulting-capability-from-guests.patch 57e93e1d-x86emul-correct-loading-of-ss.patch 57e93e4a-x86emul-don-t-allow-null-selector-for-LTR.patch 57e93e89-x86-AMD-apply-erratum-665-workaround.patch 57ee6cbc-credit1-return-time-remaining-to-limit-as-next-timeslice.patch 57fb6a91-x86-defer-not-present-segment-checks.patch 5800c51d-x86-hvm-Clobber-cs-L-when-LME-becomes-set.patch 5800caec-x86emul-fix-pushing-of-selector-registers.patch 5800cb06-x86-Viridian-don-t-depend-on-undefined-register-state.patch 580e29f9-x86-MISALIGNSSE-feature-depends-on-SSE.patch 5810a9cc-x86-emul-Correct-decoding-of-SReg3-operands.patch- bsc#1007941 - Xen tools limit the number of vcpus to 256 when the system has 384 xen-arch-kconfig-nr_cpus.patch- bsc#1007157 - VUL-0: CVE-2016-8910: xen: net: rtl8139: infinite loop while transmit in C+ mode CVE-2016-8910-qemut-net-rtl8139-infinite-loop-while-transmit-in-Cplus-mode.patch- bsc#1005004 - CVE-2016-8667: xen: dma: rc4030 divide by zero error in set_next_tick CVE-2016-8667-qemut-dma-rc4030-divide-by-zero-error-in-set_next_tick.patch - bsc#1005005 - VUL-0: CVE-2016-8669: xen: char: divide by zero error in serial_update_parameters CVE-2016-8669-qemut-char-divide-by-zero-error-in-serial_update_parameters.patch- bsc#1003030 - VUL-0: CVE-2016-7908: xen: net: Infinite loop in mcf_fec_do_tx CVE-2016-7908-qemut-net-Infinite-loop-in-mcf_fec_do_tx.patch - bsc#1003032 - VUL-0: CVE-2016-7909: xen: net: pcnet: infinite loop in pcnet_rdra_addr CVE-2016-7909-qemut-net-pcnet-infinite-loop-in-pcnet_rdra_addr.patch- bsc#995785 - VUL-0: CVE-2016-7092: xen: x86: Disallow L3 recursive pagetable for 32-bit PV guests (XSA-185) 57d1563d-x86-32on64-don-t-allow-recursive-page-tables-from-L3.patch - bsc#995789 - VUL-0: CVE-2016-7093: xen: x86: Mishandling of instruction pointer truncation during emulation (XSA-186) 57d15679-x86-emulate-Correct-boundary-interactions-of-emulated-insns.patch 57d18642-hvm-fep-Allow-test-insns-crossing-1-0-boundary.patch - bsc#995792 - VUL-0: CVE-2016-7094: xen: x86 HVM: Overflow of sh_ctxt->seg_reg[] (XSA-187) 57d1569a-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch 57d18642-x86-segment-Bounds-check-accesses-to-emulation-ctxt-seg_reg.patch - bsc#991934 - xen hypervisor crash in csched_acct 57c96df3-credit1-fix-a-race-when-picking-initial-pCPU.patch - Upstream patches from Jan 57c4412b-x86-HVM-add-guarding-logic-for-VMX-specific-code.patch 57c57f73-libxc-correct-max_pfn-calculation-for-saving-domain.patch 57c805bf-x86-levelling-restrict-non-architectural-OSXSAVE-handling.patch 57c805c1-x86-levelling-pass-vcpu-to-ctxt_switch_levelling.patch 57c805c3-x86-levelling-provide-architectural-OSXSAVE-handling.patch 57c82be2-x86-32on64-adjust-call-gate-emulation.patch 57c96e2c-x86-correct-PT_NOTE-file-position.patch 57cfed43-VMX-correct-feature-checks-for-MPX-and-XSAVES.patch- bsc#979002 - add 60-persistent-xvd.rules and helper script also to initrd, add the relevant dracut helper- bnc#953518 - unplug also SCSI disks in qemu-xen-traditional for upstream unplug protocol- bsc#989679 - [pvusb feature] USB device not found when 'virsh detach-device guest usb.xml' 57c93e52-fix-error-in-libxl_device_usbdev_list.patch- bsc#992224 - [HPS Bug] During boot of Xen Hypervisor, Failed to get contiguous memory for DMA from Xen 57ac6316-don-t-restrict-DMA-heap-to-node-0.patch - bsc#978755 - xen uefi systems fail to boot - bsc#983697 - SLES12 SP2 Xen UEFI mode cannot boot 57b71fc5-x86-EFI-don-t-apply-relocations-to-l-2-3-_bootmap.patch - Upstream patch from Jan 57b7447b-dont-permit-guest-to-populate-PoD-pages-for-itself.patch- spec: to stay compatible with the in-tree qemu-xen binary, use /usr/bin/qemu-system-i386 instead of /usr/bin/qemu-system-x86_64 bsc#986164- bsc#970135 - new virtualization project clock test randomly fails on Xen 576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 5769106e-x86-generate-assembler-equates-for-synthesized.patch 57a1e603-x86-time-adjust-local-system-time-initialization.patch 57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch - bsc#991934 - xen hypervisor crash in csched_acct 57973099-have-schedulers-revise-initial-placement.patch 579730e6-remove-buggy-initial-placement-algorithm.patch - bsc#988675 - VUL-0: CVE-2016-6258: xen: x86: Privilege escalation in PV guests (XSA-182) 57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch - bsc#988676 - VUL-0: CVE-2016-6259: xen: x86: Missing SMAP whitelisting in 32-bit exception / event delivery (XSA-183) 57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch - Upstream patches from Jan 57a30261-x86-support-newer-Intel-CPU-models.patch- bsc#985503 - vif-route broken vif-route.patch- bsc#978413 - PV guest upgrade from sles11sp4 to sles12sp2 alpha3 failed on sles11sp4 xen host. pygrub-handle-one-line-menu-entries.patch- bsc#990843 - VUL-1: CVE-2016-6351: xen: qemu: scsi: esp: OOB write access in esp_do_dma CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch- bsc#900418 - Dump cannot be performed on SLES12 XEN 57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch - Upstream patches from Jan 575e9ca0-nested-vmx-Validate-host-VMX-MSRs-before-accessing-them.patch 57640448-xen-sched-use-default-scheduler-upon-an-invalid-sched.patch- fate#319989 - Update to Xen 4.7 FCS xen-4.7.0-testing-src.tar.bz2 - Drop CVE-2014-3672-qemut-xsa180.patch- bsc#954872 - script block-dmmd not working as expected - libxl: error: libxl_dm.c (Additional fixes) block-dmmd- Convert with_stubdom into build_conditional to allow adjusting via prjconf - Convert with_debug into build_conditional to allow adjusting via prjconf- bsc#979002 - add 60-persistent-xvd.rules and helper script to xen-tools-domU to simplify transition to pvops based kernels- Convert with_oxenstored into build_conditional to allow adjusting via prjconf (fate#320836)- bsc#983984 - VUL-0: CVE-2016-5338: xen: qemu: scsi: esp: OOB r/w access while processing ESP_FIFO CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch - bsc#982960 - VUL-0: CVE-2016-5238: xen: qemu: scsi: esp: OOB write when using non-DMA mode in get_cmd CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch- fate#319989 - Update to Xen 4.7 RC5 xen-4.7.0-testing-src.tar.bz2- fate#319989 - Update to Xen 4.7 RC4 xen-4.7.0-testing-src.tar.bz2 - Dropped xen.pkgconfig-4.7.patch xsa164.patch- bsc#981264 - VUL-0: CVE-2014-3672: xen: Unrestricted qemu logging (XSA-180) CVE-2014-3672-qemut-xsa180.patch- bsc#980724 - VUL-0: CVE-2016-4441: Qemu: scsi: esp: OOB write while writing to 's->cmdbuf' in get_cmd CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch - bsc#980716 - VUL-0: CVE-2016-4439: xen: scsi: esp: OOB write while writing to 's->cmdbuf' in esp_reg_write CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch- fate#319989 - Update to Xen 4.7 RC3 xen-4.7.0-testing-src.tar.bz2 - Dropped libxl-remove-cdrom-cachemode.patch x86-PoD-only-reclaim-if-needed.patch gcc6-warnings-as-errors.patch- bsc#954872 - script block-dmmd not working as expected - libxl: error: libxl_dm.c (another modification) block-dmmd- fate#319989 - Update to Xen 4.7 RC2 xen-4.7.0-testing-src.tar.bz2- bsc#961600 - L3: poor performance when Xen HVM domU configured with max memory > current memory x86-PoD-only-reclaim-if-needed.patch- Mark SONAMEs and pkgconfig as xen 4.7 xen.pkgconfig-4.7.patch- bsc#977329 - Xen: Cannot boot HVM guests with empty cdrom libxl-remove-cdrom-cachemode.patch- fate#319989 - Update to Xen 4.7 RC1 xen-4.7.0-testing-src.tar.bz2- fate#316614: set migration constraints from cmdline restore libxl.set-migration-constraints-from-cmdline.patch- Remove obsolete patch for xen-kmp magic_ioport_compat.patch- fate#316613: update to v12 libxl.pvscsi.patch- Update to the latest Xen 4.7 pre-release c2994f86 Drop libxl.migrate-legacy-stream-read.patch- bnc#972756 - Can't migrate HVM guest from SLES12SP1 Xen host to SLES12SP2 Alpha 1 host using xl migrate libxl.migrate-legacy-stream-read.patch- Add patches from proposed upstream series to load BIOS's from the toolstack instead of embedding in hvmloader http://lists.xenproject.org/archives/html/xen-devel/2016-03/msg01626.html 0001-libxc-Rework-extra-module-initialisation.patch, 0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch, 0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch, 0004-firmware-makefile-install-BIOS-blob.patch, 0005-libxl-Load-guest-BIOS-from-file.patch, 0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch, 0007-hvmloader-Grab-the-hvm_start_info-pointer.patch, 0008-hvmloader-Locate-the-BIOS-blob.patch, 0009-hvmloader-Check-modules-whereabouts-in-perform_tests.patch, 0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch, 0011-hvmloader-Load-OVMF-from-modules.patch, 0012-hvmloader-Specific-bios_load-function-required.patch, 0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch, 0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch - Enable support for UEFI on x86_64 using the ovmf-x86_64-ms.bin firmware from qemu-ovmf-x86_64. The firmware is preloaded with Microsoft keys to more closely resemble firmware on real hardware FATE#320490- fate#319989: Update to Xen 4.7 (pre-release) xen-4.7.0-testing-src.tar.bz2 - Dropped: xen-4.6.1-testing-src.tar.bz2 55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch 5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch hotplug-Linux-block-performance-fix.patch set-mtu-from-bridge-for-tap-interface.patch xendomains-libvirtd-conflict.patch xsa154.patch xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa170.patch- Use system SeaBIOS instead of building/installing another one FATE#320638 Dropped files: seabios-dir-remote.tar.bz2 xen-c99-fix.patch xen.build-compare.seabios.patch- spec: drop BuildRequires that were only needed for qemu-xen- bsc#969377 - xen does not build with GCC 6 ipxe-use-rpm-opt-flags.patch gcc6-warnings-as-errors.patch- bsc#969351 - VUL-0: CVE-2016-2841: xen: net: ne2000: infinite loop in ne2000_receive CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch - Drop xsa154-fix.patch- Use system qemu instead of building/installing yet another qemu FATE#320638 - Dropped files qemu-xen-dir-remote.tar.bz2 CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch CVE-2015-4037-qemuu-smb-config-dir-name.patch CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch qemu-xen-enable-spice-support.patch qemu-xen-upstream-qdisk-cache-unsafe.patch tigervnc-long-press.patch xsa162-qemuu.patch- bsc#962321 - VUL-0: CVE-2016-1922: xen: i386: null pointer dereference in vapic_write() CVE-2016-1922-qemuu-i386-null-pointer-dereference-in-vapic_write.patch- bsc#968004 - VUL-0: CVE-2016-2538: xen: usb: integer overflow in remote NDIS control message handling CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch- bsc#954872 - L3: script block-dmmd not working as expected - libxl: error: libxl_dm.c block-dmmd - Update libxl to recognize dmmd and npiv prefix in disk spec xen.libxl.dmmd.patch- bsc#967101 - VUL-0: CVE-2016-2391: xen: usb: multiple eof_timers in ohci module leads to null pointer dereference CVE-2016-2391-qemuu-usb-null-pointer-dereference-in-ohci-module.patch CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch - bsc#967090 - VUL-0: CVE-2016-2392: xen: usb: null pointer dereference in remote NDIS control message handling CVE-2016-2392-qemuu-usb-null-pointer-dereference-in-NDIS-message-handling.patch- Update to Xen Version 4.6.1 xen-4.6.1-testing-src.tar.bz2 - Dropped patches now contained in tarball or unnecessary xen-4.6.0-testing-src.tar.bz2 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 5632129c-free-domain-s-vcpu-array.patch 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 563212e4-xenoprof-free-domain-s-vcpu-array.patch 563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch 56549f24-x86-vPMU-document-as-unsupported.patch 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch xsa155-qemut-qdisk-double-access.patch xsa155-qemut-xenfb.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa159.patch xsa160.patch xsa162-qemut.patch xsa165.patch xsa166.patch xsa167.patch xsa168.patch- bsc#965315 - VUL-0: CVE-2016-2270: xen: x86: inconsistent cachability flags on guest mappings (XSA-154) xsa154.patch - bsc#965317 - VUL-0: CVE-2016-2271: xen: VMX: guest user mode may crash guest with non-canonical RIP (XSA-170) xsa170.patch- bsc#965269 - VUL-1: CVE-2015-8619: xen: stack based OOB write in hmp_sendkey routine CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch- bsc#965156 - VUL-0: CVE-2015-6855: xen: ide: divide by zero issue CVE-2015-6855-qemuu-ide-divide-by-zero-issue.patch - bsc#965112 - VUL-0: CVE-2014-3640: xen: slirp: NULL pointer deref in sosendto() CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch- bsc#964947 - VUL-0: CVE-2015-5278: xen: Infinite loop in ne2000_receive() function CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch - bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch- bsc#964644 - VUL-0: CVE-2013-4533: xen pxa2xx: buffer overrun on incoming migration CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch - bsc#964925 - VUL-0: CVE-2014-0222: xen: qcow1: validate L2 table size to avoid integer overflows CVE-2014-0222-blktap-qcow1-validate-l2-table-size.patch - Dropped CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch- bsc#964415 - VUL-1: CVE-2016-2198: xen: usb: ehci null pointer dereference in ehci_caps_write CVE-2016-2198-qemuu-usb-ehci-null-pointer-dereference-in-ehci_caps_write.patch - bsc#964452 - VUL-0: CVE-2013-4534: xen: openpic: buffer overrun on incoming migration CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch- bsc#963783 - VUL-1: CVE-2016-1981: xen: net: e1000 infinite loop in start_xmit and e1000_receive_iov routines CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch- bsc#962758 - VUL-0: CVE-2013-4539: xen: tsc210x: buffer overrun on invalid state load CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch- bsc#962632 - VUL-0: CVE-2015-1779: xen: vnc: insufficient resource limiting in VNC websockets decoder CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch - bsc#962642 - VUL-0: CVE-2013-4537: xen: ssi-sd: buffer overrun on invalid state load CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch - bsc#962627 - VUL-0: CVE-2014-7815: xen: vnc: insufficient bits_per_pixel from the client sanitization CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch- bsc#962335 - VUL-0: CVE-2013-4538: xen: ssd0323: fix buffer overun on invalid state CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch - bsc#962360 - VUL-0: CVE-2015-7512: xen: net: pcnet: buffer overflow in non-loopback mode CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch- bsc#961692 - VUL-0: CVE-2016-1714: xen: nvram: OOB r/w access in processing firmware configurations CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch- bsc#961358 - VUL-0: CVE-2015-8613: xen: qemu: scsi: stack based buffer overflow in megasas_ctrl_get_info CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch - bsc#961332 - VUL-0: CVE-2016-1568: xen: Qemu: ide: ahci use-after-free vulnerability in aio port commands CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch- bsc#959695 - missing docs for xen xen.spec- bsc#960862 - VUL-0: CVE-2016-1571: xen: VMX: intercept issue with INVLPG on non-canonical address (XSA-168) xsa168.patch - bsc#960861 - VUL-0: CVE-2016-1570: xen: PV superpage functionality missing sanity checks (XSA-167) xsa167.patch - bsc#960836 - VUL-0: CVE-2015-8744: xen: net: vmxnet3: incorrect l2 header validation leads to a crash via assert(2) call CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch- bsc#960707 - VUL-0: CVE-2015-8745: xen: reading IMR registers leads to a crash via assert(2) call CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch - bsc#960726 - VUL-0: CVE-2015-8743: xen: ne2000: OOB memory access in ioport r/w functions CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch- bsc#960093 - VUL-0: CVE-2015-8615: xen: x86: unintentional logging upon guest changing callback method (XSA-169) 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch- Adjust xen-dom0-modules.service to run Before xenstored.service instead of proc-xen.mount to workaround a bug in systemd "design" (bnc#959845)- bsc#959387 - VUL-0: CVE-2015-8568 CVE-2015-8567: xen: qemu: net: vmxnet3: host memory leakage CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch- bsc#957988 - VUL-0: CVE-2015-8550: xen: paravirtualized drivers incautious about shared memory contents (XSA-155) xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemut-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa155-qemut-xenfb.patch - bsc#959006 - VUL-0: CVE-2015-8558: xen: qemu: usb: infinite loop in ehci_advance_state results in DoS CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch - bsc#958918 - VUL-0: CVE-2015-7549: xen: qemu pci: null pointer dereference issue CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch - bsc#958493 - VUL-0: CVE-2015-8504: xen: qemu: ui: vnc: avoid floating point exception CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch - bsc#958007 - VUL-0: CVE-2015-8554: xen: qemu-dm buffer overrun in MSI-X handling (XSA-164) xsa164.patch - bsc#958009 - VUL-0: CVE-2015-8555: xen: information leak in legacy x86 FPU/XMM initialization (XSA-165) xsa165.patch - bsc#958523 - VUL-0: xen: ioreq handling possibly susceptible to multiple read issue (XSA-166) xsa166.patch- bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch - Upstream patches from Jan 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch) 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 56544a57-VMX-fix-adjust-trap-injection.patch 56546ab2-sched-fix-insert_vcpu-locking.patch- bsc#956592 - VUL-0: xen: virtual PMU is unsupported (XSA-163) 56549f24-x86-vPMU-document-as-unsupported.patch - bsc#956408 - VUL-0: CVE-2015-8339, CVE-2015-8340: xen: XENMEM_exchange error handling issues (XSA-159) xsa159.patch - bsc#956409 - VUL-0: CVE-2015-8341: xen: libxl leak of pv kernel and initrd on error (XSA-160) xsa160.patch - bsc#956411 - VUL-0: CVE-2015-7504: xen: heap buffer overflow vulnerability in pcnet emulator (XSA-162) xsa162-qemuu.patch xsa162-qemut.patch - bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142) 5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch- fate#315712: XEN: Use the PVOPS kernel Turn off building the KMPs now that we are using the pvops kernel xen.spec- Upstream patches from Jan 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 5632129c-free-domain-s-vcpu-array.patch (Replaces CVE-2015-7969-xsa149.patch) 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 563212e4-xenoprof-free-domain-s-vcpu-array.patch 563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch) 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch - Dropped 55b0a2db-x86-MSI-track-guest-masking.patch- Use upstream variants of block-iscsi and block-nbd- Remove xenalyze.hg, its part of xen-4.6- Update to Xen Version 4.6.0 xen-4.6.0-testing-src.tar.bz2 mini-os.tar.bz2 blktap2-no-uninit.patch stubdom-have-iovec.patch - Renamed xsa149.patch to CVE-2015-7969-xsa149.patch - Dropped patches now contained in tarball or unnecessary xen-4.5.2-testing-src.tar.bz2 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch 54f4985f-libxl-fix-libvirtd-double-free.patch 55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 551ac326-xentop-add-support-for-qdisk.patch 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch 5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 554cc211-libxl-add-qxl.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch 5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch 5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch 5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch 5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch 5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch 5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch 55b0a218-x86-PCI-CFG-write-intercept.patch 55b0a255-x86-MSI-X-maskall.patch 55b0a283-x86-MSI-X-teardown.patch 55b0a2ab-x86-MSI-X-enable.patch blktapctrl-close-fifos.patch blktapctrl-default-to-ioemu.patch blktapctrl-disable-debug-printf.patch blktap-no-uninit.patch blktap-pv-cdrom.patch build-tapdisk-ioemu.patch ioemu-bdrv-open-CACHE_WB.patch ioemu-blktap-barriers.patch ioemu-blktap-fv-init.patch ioemu-blktap-image-format.patch ioemu-blktap-zero-size.patch libxl.set-migration-constraints-from-cmdline.patch local_attach_support_for_phy.patch pci-attach-fix.patch qemu-xen-upstream-megasas-buildtime.patch tapdisk-ioemu-logfile.patch tapdisk-ioemu-shutdown-fix.patch udev-rules.patch xen.build-compare.ipxe.patch xen.build-compare.mini-os.patch xen.build-compare.smbiosdate.patch xen.build-compare.vgabios.patch xen.build-compare.xen_compile_h.patch xl-coredump-file-location.patch- bsc#954405 - VUL-0: CVE-2015-8104: Xen: guest to host DoS by triggering an infinite loop in microcode via #DB exception - bsc#954018 - VUL-0: CVE-2015-5307: xen: x86: CPU lockup during fault delivery (XSA-156) CVE-2015-5307-xsa156.patch- Update to Xen 4.5.2 xen-4.5.2-testing-src.tar.bz2 - Drop the following xen-4.5.1-testing-src.tar.bz2 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 559bdde5-pull-in-latest-linux-earlycpio.patch 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch 560bd926-credit1-fix-tickling-when-it-happens-from-a-remote-pCPU.patch 560e6d34-x86-p2m-pt-tighten-conditions-of-IOMMU-mapping-updates.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch CVE-2015-4106-xsa131-9.patch CVE-2015-3259-xsa137.patch CVE-2015-7311-xsa142.patch CVE-2015-7835-xsa148.patch xsa139-qemuu.patch xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch xsa151.patch xsa152.patch xsa153-libxl.patch CVE-2015-5154-qemuu-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemuu-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch"- bsc#950704 - CVE-2015-7970 VUL-1: xen: x86: Long latency populate-on-demand operation is not preemptible (XSA-150) 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch- Upstream patches from Jan 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch- bsc#951845 - VUL-0: CVE-2015-7972: xen: x86: populate-on-demand balloon size inaccuracy can crash guests (XSA-153) xsa153-libxl.patch- bsc#950703 - VUL-1: CVE-2015-7969: xen: leak of main per-domain vcpu pointer array (DoS) (XSA-149) xsa149.patch - bsc#950705 - VUL-1: CVE-2015-7969: xen: x86: leak of per-domain profiling-related vcpu pointer array (DoS) (XSA-151) xsa151.patch - bsc#950706 - VUL-0: CVE-2015-7971: xen: x86: some pmu and profiling hypercalls log without rate limiting (XSA-152) xsa152.patch - Dropped 55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch 5604f239-x86-PV-properly-populate-descriptor-tables.patch- bsc#932267 - VUL-1: CVE-2015-4037: qemu,kvm,xen: insecure temporary file use in /net/slirp.c CVE-2015-4037-qemuu-smb-config-dir-name.patch CVE-2015-4037-qemut-smb-config-dir-name.patch - bsc#877642 - VUL-0: CVE-2014-0222: qemu: qcow1: validate L2 table size to avoid integer overflows CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch- bsc#950367 - VUL-0: CVE-2015-7835: xen: x86: Uncontrolled creation of large page mappings by PV guests (XSA-148) CVE-2015-7835-xsa148.patch- bsc#949138 - Setting vcpu affinity under Xen causes libvirtd abort 54f4985f-libxl-fix-libvirtd-double-free.patch- bsc#949046 - Increase %suse_version in SP1 to 1316 xen.spec - Update README.SUSE detailing dom0 ballooning recommendations- bsc#945167 - Running command ’ xl pci-assignable-add 03:10.1’ secondly show errors 55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch - Upstream patches from Jan 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f239-x86-PV-properly-populate-descriptor-tables.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch 560bd926-credit1-fix-tickling-when-it-happens-from-a-remote-pCPU.patch 560e6d34-x86-p2m-pt-tighten-conditions-of-IOMMU-mapping-updates.patch- bsc#941074 - VmError: Device 51728 (vbd) could not be connected. Hotplug scripts not working. hotplug-Linux-block-performance-fix.patch- bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142) CVE-2015-7311-xsa142.patch- bsc#945165 - Xl pci-attach show error with kernel of SLES 12 sp1 pci-attach-fix.patch- bsc#945164 - Xl destroy show error with kernel of SLES 12 sp1 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch- Upstream patches from Jan 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch- bsc#944463 - VUL-0: CVE-2015-5239: qemu-kvm: Integer overflow in vnc_client_read() and protocol_client_msg() CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch - bsc#944697 - VUL-1: CVE-2015-6815: qemu: net: e1000: infinite loop issue CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch- bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch- bsc#907514 - Bus fatal error & sles12 sudden reboot has been observed - bsc#910258 - SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984 - Bus fatal error & sles11-SP4 sudden reboot has been observed - bsc#923967 - Partner-L3: Bus fatal error & sles11-SP3 sudden reboot has been observed 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 55b0a218-x86-PCI-CFG-write-intercept.patch 55b0a255-x86-MSI-X-maskall.patch 55b0a283-x86-MSI-X-teardown.patch 55b0a2ab-x86-MSI-X-enable.patch 55b0a2db-x86-MSI-track-guest-masking.patch - Upstream patches from Jan 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch - Dropped for upstream version x86-MSI-mask.patch x86-MSI-pv-unmask.patch x86-MSI-X-enable.patch x86-MSI-X-maskall.patch x86-MSI-X-teardown.patch x86-pci_cfg_okay.patch x86-PCI-CFG-write-intercept.patch- bsc#939712 - VUL-0: XSA-140: QEMU leak of uninitialized heap memory in rtl8139 device model xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch - bsc#939709 - VUL-0: XSA-139: xen: Use after free in QEMU/Xen block unplug protocol xsa139-qemuu.patch- bsc#937371 - xen vm's running after reboot xendomains-libvirtd-conflict.patch- bsc#938344 - VUL-0: CVE-2015-5154: qemu,kvm,xen: host code execution via IDE subsystem CD-ROM CVE-2015-5154-qemuu-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemuu-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch- Remove xendomains.service from systemd preset file because it conflicts with libvirt-guests.service (bnc#937371) Its up to the admin to run systemctl enable xendomains.service- bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow CVE-2015-3259-xsa137.patch - Upstream patches from Jan 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bdde5-pull-in-latest-linux-earlycpio.patch - Upstream patches from Jan pending review 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch 5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch 5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch 5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch 5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch 5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch x86-MSI-pv-unmask.patch x86-pci_cfg_okay.patch x86-PCI-CFG-write-intercept.patch x86-MSI-X-maskall.patch x86-MSI-X-teardown.patch x86-MSI-X-enable.patch x86-MSI-mask.patch- Adjust more places to use br0 instead of xenbr0- bnc#936516 - xen fails to build with kernel update(4.1.0 from stable) 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch- Update to Xen Version 4.5.1 FCS (fate#315675) xen-4.5.1-testing-src.tar.bz2 - Dropped patches now contained in tarball 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch qemu-MSI-X-enable-maskall.patch qemu-MSI-X-latch-writes.patch x86-MSI-X-guest-mask.patch- Replace 5124efbe-add-qxl-support.patch with the variant that finally made it upstream, 554cc211-libxl-add-qxl.patch- bsc#931627 - VUL-0: CVE-2015-4105: XSA-130: xen: Guest triggerable qemu MSI-X pass-through error messages qemu-MSI-X-latch-writes.patch - bsc#907514 - Bus fatal error & sles12 sudden reboot has been observed - bsc#910258 - SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984 - Bus fatal error & sles11-SP4 sudden reboot has been observed - bsc#923967 - Partner-L3: Bus fatal error & sles11-SP3 sudden reboot has been observed x86-MSI-X-teardown.patch x86-MSI-X-enable.patch x86-MSI-X-guest-mask.patch x86-MSI-X-maskall.patch qemu-MSI-X-enable-maskall.patch - Upstream patches from Jan 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch - Dropped the following patches now contained in the tarball xen-no-array-bounds.patch CVE-2015-4103-xsa128.patch CVE-2015-4104-xsa129.patch CVE-2015-4105-xsa130.patch CVE-2015-4106-xsa131-1.patch CVE-2015-4106-xsa131-2.patch CVE-2015-4106-xsa131-3.patch CVE-2015-4106-xsa131-4.patch CVE-2015-4106-xsa131-5.patch CVE-2015-4106-xsa131-6.patch CVE-2015-4106-xsa131-7.patch CVE-2015-4106-xsa131-8.patch- Update to Xen 4.5.1 RC2 - bsc#931628 - VUL-0: CVE-2015-4106: XSA-131: xen: Unmediated PCI register access in qemu CVE-2015-4106-xsa131-1.patch CVE-2015-4106-xsa131-2.patch CVE-2015-4106-xsa131-3.patch CVE-2015-4106-xsa131-4.patch CVE-2015-4106-xsa131-5.patch CVE-2015-4106-xsa131-6.patch CVE-2015-4106-xsa131-7.patch CVE-2015-4106-xsa131-8.patch CVE-2015-4106-xsa131-9.patch - bsc#931627 - VUL-0: CVE-2015-4105: XSA-130: xen: Guest triggerable qemu MSI-X pass-through error messages CVE-2015-4105-xsa130.patch - bsc#931626 - VUL-0: CVE-2015-4104: XSA-129: xen: PCI MSI mask bits inadvertently exposed to guests CVE-2015-4104-xsa129.patch - bsc#931625 - VUL-0: CVE-2015-4103: XSA-128: xen: Potential unintended writes to host MSI message data field via qemu CVE-2015-4103-xsa128.patch - Upstream patches from Jan 5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch- Add DefaultDependencies=no to xen-dom0-modules.service because it has to run before proc-xen.mount- Update to Xen 4.5.1 RC1- Update blktap-no-uninit.patch to work with gcc-4.5- bsc#927967 - VUL-0: CVE-2015-3340: xen: Information leak through XEN_DOMCTL_gettscinfo (XSA-132) 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch- bnc#929339 - VUL-0: CVE-2015-3456: qemu kvm xen: VENOM qemu floppy driver host code execution CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch- bsc#928783 - Reboot failure; Request backport of upstream Xen patch to 4.5.0, or update pkgs to 4.5.1 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch- bnc#927750 - Avoid errors reported by system-modules-load.service- Add xen-no-array-bounds.patch and blktap-no-uninit.patch to selectively turn errors back to warnings to fix build with GCC 5. - Amend xen.stubdom.newlib.patch to pull in declaration of strcmp to avoid implicit-fortify-decl rpmlint error. - Fix quoting of __SMBIOS_DATE__ in xen.build-compare.smbiosdate.patch.- xentop: Fix memory leak on read failure 551ac326-xentop-add-support-for-qdisk.patch- Dropped xentop-add-support-for-qdisk.patch in favor of upstream version 551ac326-xentop-add-support-for-qdisk.patch- Enable spice support in qemu for x86_64 5124efbe-add-qxl-support.patch qemu-xen-enable-spice-support.patch- Add xen-c99-fix.patch to remove pointless inline specifier on function declarations which break build with a C99 compiler which GCC 5 is by default. (bsc#921994) - Add ipxe-no-error-logical-not-parentheses.patch to supply - Wno-logical-not-parentheses to the ipxe build to fix breakage with GCC 5. (bsc#921994)- bnc#921842 - Xentop doesn't display disk statistics for VMs using qdisks xentop-add-support-for-qdisk.patch- Disable the PIE enablement done for Factory, as the XEN code is not buildable with PIE and it does not make much sense to build the hypervisor code with it.- bnc#918169 - XEN fixes required to work with Kernel 3.19.0 xen.spec- Package xen.changes because its referenced in xen.spec- Update seabios to rel-1.7.5 which is the correct version for Xen 4.5- Update to Xen 4.5.0 FCS- Include systemd presets in 13.2 and older- bnc#897352 - Enable xencommons/xendomains only during fresh install - disable restart on upgrade because the toolstack is not restartable- adjust seabios, vgabios, stubdom and hvmloader build to reduce build-compare noise xen.build-compare.mini-os.patch xen.build-compare.smbiosdate.patch xen.build-compare.ipxe.patch xen.build-compare.vgabios.patch xen.build-compare.seabios.patch xen.build-compare.man.patch- Update to Xen 4.5.0 RC4- Remove xend specific if-up scripts Recording bridge slaves is a generic task which should be handled by generic network code- Use systemd features from upstream requires updated systemd-presets-branding package- Update to Xen 4.5.0 RC3- Set GIT, WGET and FTP to /bin/false- Use new configure features instead of make variables xen.stubdom.newlib.patch- adjust docs and xen build to reduce build-compare noise xen.build-compare.doc_html.patch xen.build-compare.xen_compile_h.patch- Drop trailing B_CNT from XEN_EXTRAVERSION to reduce build-compare noise- Update to Xen 4.5.0 RC2- Update to Xen 4.5.0 RC1 xen-4.5.0-testing-src.tar.bz2 - Remove all patches now contained in the new tarball xen-4.4.1-testing-src.tar.bz2 5315a3bb-x86-don-t-propagate-acpi_skip_timer_override-do-Dom0.patch 5315a43a-x86-ACPI-also-print-address-space-for-PM1x-fields.patch 53299d8f-xenconsole-reset-tty-on-failure.patch 53299d8f-xenconsole-tolerate-tty-errors.patch 5346a7a0-x86-AMD-support-further-feature-masking-MSRs.patch 53563ea4-x86-MSI-drop-workaround-for-insecure-Dom0-kernels.patch 537c9c77-libxc-check-return-values-on-mmap-and-madvise.patch 537cd0b0-hvmloader-also-cover-PCI-MMIO-ranges-above-4G-with-UC-MTRR-ranges.patch 537cd0cc-hvmloader-PA-range-0xfc000000-0xffffffff-should-be-UC.patch 539ebe62-x86-EFI-improve-boot-time-diagnostics.patch 53aac342-x86-HVM-consolidate-and-sanitize-CR4-guest-reserved-bit-determination.patch 53c9151b-Fix-xl-vncviewer-accesses-port-0-by-any-invalid-domid.patch 53d124e7-fix-list_domain_details-check-config-data-length-0.patch 53dba447-x86-ACPI-allow-CMOS-RTC-use-even-when-ACPI-says-there-is-none.patch 53df727b-x86-HVM-extend-LAPIC-shortcuts-around-P2M-lookups.patch 53e8be5f-x86-vHPET-use-rwlock-instead-of-simple-one.patch 53f737b1-VMX-fix-DebugCtl-MSR-clearing.patch 53f7386d-x86-irq-process-softirqs-in-irq-keyhandlers.patch 53fcebab-xen-pass-kernel-initrd-to-qemu.patch 53ff3659-x86-consolidate-boolean-inputs-in-hvm-and-p2m.patch 53ff36ae-x86-hvm-treat-non-insn-fetch-NPF-also-as-read-violations.patch 53ff36d5-x86-mem_event-deliver-gla-fault-EPT-violation-information.patch 53ff3716-x86-ats-Disable-Address-Translation-Services-by-default.patch 53ff3899-x86-NMI-allow-processing-unknown-NMIs-with-watchdog.patch 54005472-EPT-utilize-GLA-GPA-translation-known-for-certain-faults.patch 540effe6-evtchn-check-control-block-exists-when-using-FIFO-based-events.patch 540f2624-x86-idle-add-barriers-to-CLFLUSH-workaround.patch 541825dc-VMX-don-t-leave-x2APIC-MSR-intercepts-disabled.patch 541ad385-x86-suppress-event-check-IPI-to-MWAITing-CPUs.patch 541ad3ca-x86-HVM-batch-vCPU-wakeups.patch 541ad81a-VT-d-suppress-UR-signaling-for-further-desktop-chipsets.patch 54216833-x86-shadow-fix-race-when-sampling-dirty-vram-state.patch 54216882-x86-emulate-check-cpl-for-all-privileged-instructions.patch 542168ae-x86emul-only-emulate-swint-injection-for-real-mode.patch 54228a37-x86-EFI-fix-freeing-of-uninitialized-pointer.patch 5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch 5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch 542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch 542bf997-x86-HVM-properly-bound-x2APIC-MSR-range.patch 54325cc0-x86-MSI-fix-MSI-X-case-of-freeing-IRQ.patch 54325d2f-x86-restore-reserving-of-IO-APIC-pages-in-XENMEM_machine_memory_map-output.patch 54325d95-don-t-allow-Dom0-access-to-IOMMUs-MMIO-pages.patch 54325ecc-AMD-guest_iommu-properly-disable-guest-iommu-support.patch 54325f3c-x86-paging-make-log-dirty-operations-preemptible.patch 54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch CVE-2013-4540-qemu.patch qemu-support-xen-hvm-direct-kernel-boot.patch qemu-xen-upstream-blkif-discard.patch change-vnc-passwd.patch libxc-pass-errno-to-callers-of-xc_domain_save.patch libxl.honor-more-top-level-vfb-options.patch libxl.add-option-for-discard-support-to-xl-disk-conf.patch libxl.introduce-an-option-to-disable-the-non-O_DIRECT-workaround.patch x86-dom-print.patch x86-extra-trap-info.patch tmp_build.patch xl-check-for-libvirt-managed-domain.patch disable-wget-check.patch - Xend/xm is no longer supported and is not part of the upstream code. Remove all xend/xm specific patches, configs, and scripts xen-xmexample.patch bridge-opensuse.patch xmexample.disks xmclone.sh init.xend xend-relocation.sh xend.service xend-relocation-server.fw domUloader.py xmexample.domUloader xmexample.disks bridge-vlan.patch bridge-bonding.patch bridge-record-creation.patch network-nat-open-SuSEfirewall2-FORWARD.patch xend-set-migration-constraints-from-cmdline.patch xen.migrate.tools-xend_move_assert_to_exception_block.patch xend-pvscsi-recognize-also-SCSI-CDROM-devices.patch xend-config.patch xend-max-free-mem.patch xend-hvm-default-pae.patch xend-vif-route-ifup.patch xend-xenapi-console-protocol.patch xend-core-dump-loc.patch xend-xen-api-auth.patch xend-checkpoint-rename.patch xend-xm-save-check-file.patch xend-xm-create-xflag.patch xend-domu-usb-controller.patch xend-devid-or-name.patch xend-migration-domname-fix.patch xend-del_usb_xend_entry.patch xend-xen-domUloader.patch xend-multi-xvdp.patch xend-check_device_status.patch xend-change_home_server.patch xend-minimum-restart-time.patch xend-disable-internal-logrotate.patch xend-config-enable-dump-comment.patch xend-tools-watchdog-support.patch xend-console-port-restore.patch xend-vcpu-affinity-fix.patch xend-migration-bridge-check.patch xend-managed-pci-device.patch xend-hvm-firmware-passthrough.patch xend-cpuinfo-model-name.patch xend-xm-reboot-fix.patch xend-domain-lock.patch xend-domain-lock-sfex.patch xend-32on64-extra-mem.patch xend-hv_extid_compatibility.patch xend-xenpaging.autostart.patch xend-remove-xm-deprecation-warning.patch libxen_permissive.patch tmp-initscript-modprobe.patch init.xendomains xendomains.service xen-watchdog.service xen-updown.sh- bnc#901317 - L3: increase limit domUloader to 32MB domUloader.py- bnc#898772 - SLES 12 RC3 - XEN Host crashes when assigning non-VF device (SR-IOV) to guest 54325cc0-x86-MSI-fix-MSI-X-case-of-freeing-IRQ.patch - bnc#882089 - Windows 2012 R2 fails to boot up with greater than 60 vcpus 54325ecc-AMD-guest_iommu-properly-disable-guest-iommu-support.patch - bnc#826717 - VUL-0: CVE-2013-3495: XSA-59: xen: Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts 541ad81a-VT-d-suppress-UR-signaling-for-further-desktop-chipsets.patch - Upstream patches from Jan 540effe6-evtchn-check-control-block-exists-when-using-FIFO-based-events.patch (Replaces xsa107.patch) 54216833-x86-shadow-fix-race-when-sampling-dirty-vram-state.patch (Replaces xsa104.patch) 54216882-x86-emulate-check-cpl-for-all-privileged-instructions.patch (Replaces xsa105.patch) 542168ae-x86emul-only-emulate-swint-injection-for-real-mode.patch (Replaces xsa106.patch) 54228a37-x86-EFI-fix-freeing-of-uninitialized-pointer.patch 5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch 5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch 542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch 542bf997-x86-HVM-properly-bound-x2APIC-MSR-range.patch (Replaces xsa108.patch) 54325d2f-x86-restore-reserving-of-IO-APIC-pages-in-XENMEM_machine_memory_map-output.patch 54325d95-don-t-allow-Dom0-access-to-IOMMUs-MMIO-pages.patch 54325f3c-x86-paging-make-log-dirty-operations-preemptible.patch (Replaces xsa97.patch) 54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGH3AKDM4.13.2_02-lp152.2.15.14.13.2_02-lp152.2.15.1  xenhtmlhypercallarmindex.htmlindex.htmlx86_32index.htmlx86_64index.htmlindex.htmlmanindex.htmlxen-pci-device-reservations.7.htmlxen-pv-channel.7.htmlxen-tscmode.7.htmlxen-vtpm.7.htmlxen-vtpmmgr.7.htmlxenstore-chmod.1.htmlxenstore-ls.1.htmlxenstore-read.1.htmlxenstore-write.1.htmlxenstore.1.htmlxentop.1.htmlxentrace.8.htmlxentrace_format.1.htmlxl-disk-configuration.5.htmlxl-network-configuration.5.htmlxl-numa-placement.7.htmlxl.1.htmlxl.cfg.5.htmlxl.conf.5.htmlxlcpupool.cfg.5.htmlmiscamd-ucode-container.txtarmbig.LITTLE.txtbooting.txtdevice-treeacpi.txtbooting.txtguest.txtindex.htmlpassthrough.txtearly-printk.txtindex.htmlpassthrough.txtsilicon-errata.txtblock-scripts.txtconsole.txtcrashdb.txtdistro_mapping.txtdump-core-format.txtgrant-tables.txtindex.htmlkconfig-language.txtkconfig.txtkexec_and_kdump.txtlibxl_memory.txtprintk-formats.txtqemu-backends.txtstubdom.txtvtd-pi.txtvtd.txtvtpm-platforms.txtxen-error-handling.txtxenmon.txtxenpaging.txtxenstore-ring.txtxenstore.txtxsm-flask.txtmisccrashdb.txtvtpm-platforms.txtxen-command-line.pandocxenpaging.txtxenstore-paths.pandoc/usr/share/doc/packages//usr/share/doc/packages/xen//usr/share/doc/packages/xen/html//usr/share/doc/packages/xen/html/hypercall//usr/share/doc/packages/xen/html/hypercall/arm//usr/share/doc/packages/xen/html/hypercall/x86_32//usr/share/doc/packages/xen/html/hypercall/x86_64//usr/share/doc/packages/xen/html/man//usr/share/doc/packages/xen/html/misc//usr/share/doc/packages/xen/html/misc/arm//usr/share/doc/packages/xen/html/misc/arm/device-tree//usr/share/doc/packages/xen/misc/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:15094/openSUSE_Leap_15.2_Update/b2799d0eb93862ce580f266476b2cc3f-xen.openSUSE_Leap_15.2_Updatecpioxz5x86_64-suse-linuxdirectoryHTML document, ASCII textXML 1.0 document, ASCII text, with very long linesXML 1.0 document, ASCII textC source, ASCII textASCII textASCII text, with very long linesAlgol 68 source, ASCII textutf-84c1ba586f07de033f7d67693a67214b8be8bee4ad3f332c6d7d983e8679270d8?p7zXZ !t/)] crt:bLL U 3犓dT+EȌDx55s"T~T8?F:-?嬇7hI(&~}-Y-&Y=$'cxAAULn]Eݻ㥛kC#+>.5i6|R}h o啮Ei,퐋n{mq.if's`_KA'vV} G7I9PL L6?8j[Y\:ZA~i!Q3fsҢ~,m[) ubHF=KcWA:5r0sZpJqoHԇOSc}6dSs!6>퓟`^h[XE&YKQа2T+6^`](BkHdqJ"S|б鲨5Rtf%w-|c@DDRQZ#U^ |;I}޹wV38Vuw <w0fѪZcOt0HLy#F`nJ 1{>u~g\^t)E&KŽ-TZ*wR7>Ahr9ȲO*=Ljfmrttb4Lb VGÏ[7o\e$ZŲ, 4|yphOQ`o"F~.U[%0VY,=a,t*kNEU#hǜk[k^3SU$D:.P(̟sUrH gO` ⃢Ӥ= Յw*op9]'`.a]L:?oӝ' q] /Ow Rm 9Nq(i!;O`l6Ses-Tfb)vo ,t ޜٔ<{O,sU:>}/ºt( ݼȾր{zŖ]-Cdv}i?yC_@agIꃵ<-IL}I6⨀ϰ׻cj~kUlT? j1ퟋd20&29d,ZSX==[ȣrPF e[Ă 0"+[xy2ݫ761H8  ,7wHWStUPa|vqmC+G(F3'=\'N>?4xYVxmĬXN.PS'm$R{sBՃϼܓvOc0P?aNFM'?cM`l !m]EGoS$ ?/0'9w+8iy p|L8* @xF~4E%>QSloI, Lg&=`*r);cv<~h`mjEҷ+HGp8I˝x(Sw6p@?f׶3yN9gH jO 'Je*TU} rԥ]^ }2ӅРsZJ]-NAf8Bhw545?I8Rmi}%-+ h9tc_ 56i.Xp| OTS.V.PWlmb ʹ$(^'`0BmubM\'G.2ݗsT/I> V<{41.}z"O{uâ>kE lIɥ|"1T,LS,_?. oȼ@K3BCun;ZUX3lӭLZʿGY+{ I8cBuz.0j9꩖_ﶿ|G{ Yz "=5ʶ)UPt 5۹M6=j嘁p(ƇGbM 3֠~0ڠ6,,kK7<`|"ǣsvzLj5ujvbVKᶏo#{dHm3pxa9DŃVlA7,K _ӟ^td; 4/>/AtTT8It¤+0CՎdVvPM9a.m]\I{_HAj߬<_59kmxy-Ύ"<î]Fgi$*$\'+H*4od=1gIԹG$Eci1)>bvW{%" Ped*6?_HEUO!K1fehٝi4`fRdx|7H MRn=W@Y%=@ IN~j&t )mޛ[R-1*_%o_.0 9mf;kEBk uD;[ L끊[N(19IzӷSi4:#Qyͬ<*C~VK; -1s}ޯDv8a>N'K{>” WpSمs P0JWܕ]S7q¬#&1ꨀ ň LAnp s$9Zå6z 34ZbJ6m"4Lbk;,a6r6Kq`3MB -pK"X0H$>M!#KžȫsZ %VZ\Vymw~ӂ`;02cVS7 Ӭ5!p][+ԓ{ 5{u!ˑŜg yx3b@\h1g?gabQXs{I"ޤ!ÜEr8 G5n'QB sz;"iLI\Kه3ʵBf w9]ho+UTC - H$8LQ* g f[b$o0'WyT'-n wL!!J%.^L@Hyg#h,#YfpH0kQRݩ*TK^UeP?WˆBz,i 5j\ AE9A$"cLo1$kldkΉ_ wJz[Jx(Ee,pLSF00}9OHEa=ةooS Dο )jCNʀ52aTEG+}>fֳbwMXt;OʥPgZSl:wt6/@;g1U0VX^q~ޒ| ]32%?ʊs{OlC!97tiQ 3]|Bcz} a ꛿ vIDͫf䂙U5h8i1>(o =ߖ|@w?ۏVV"n:Vs e܂ИE1 +vd흭97+}HuRDHp6Xr#F-m+4hd+&K{..ZՇm G(2(!j(Rt9Y盔h=D!@pYdɄzfy2WDy2(1ZFOBm0m|C뛮]psq(T/ -ΡuȪہ >o{Ic{_X{tr3E&ټjH=)ykw?xB4a $4+mv&Vd=as7ʛ4V-xݐTFUD`\ (Jr>NQU?ο!B5%fylf^pTYP%G4* ޖ+'i\Jt*Cr ]&tTr2Emlz9W QS+IOP@<.q~m.񡶯O\(=#O\.=zzQy0oQ@3#69R~9~iPH>qQ2T2֓=SV z/fW$3;U/2Xyro@Mk!DCgl޵BdyiF;Оӧ [v;m\>fAAb|OuJdb iS)Bԝ8r׃4WGY7,zj]w%\Qb\HjiZEQR[Ʃ^ߖO @Ԃfϟk{0l-$So`I>Wy 0ʓa'wFPnH $ ui-!&x[Q}]b1h?A^4[~XN↌KDNKO~vJiWK&H66-I"fOЧ?lp'1n^ޤ{'۫g4лB=oظ\e kG\t țL<(``mb,l2k-l>.w\ځCѿЍG{ ouJJ|lҔe.d/:gxֻv/Iyrܺh_MIn,bSz&S蝂p}Ti S<@3U/V s[%LcY%|27EbO eg"jJ!C't`:l}K8")6d^-k2K|C](5m?v gѪ_T20ujRK|6-$ &"TUchpeБWP_[Hӻ'1Q2䰧In_ +*N) 9J[N2MqZ;e+Ws<Ę?3,iH#7uHi*!k(FpzTq|SKWsتڭwc.8n0xuU *t~4Qi'X V Vč2MϲvÑhPk*|9SO=ؒCse Id s1gSK{k'|B!3/q|Zߧ+(0`mQPAfᙑJ= f6TW0QjGYmPݚ;(Pӣ҂y3nN:*(5$FpNZh/nD]p>vqR\l~v~5hhl&GTm/ FؓbqܭǛ+5 Þ(.9fŘ~ĝ ;tĆ:2U{Zs#d2׌h%?ϡ_u( BhG[&&1E5SbvW@S5e!W)AfѮgXNRhR V~x͜i5M[w@?\GfDd3~7 cNODXJt&ƒrs5&dB䖃ֹ^O[k](2%NfûWՓYO'*3m,{Ahń{MjyN*zAНyMVQ&R}EkF㍡>N]-RԽ~"}:sT,+fEiͯN}ܘ:,PLLd}q)ӑx@?7۵foj'B&48\WQy a06wqjȽc2+' ԘJqZô)7SY5b4baeFY VHMN^\p; #-) DU=)DrB2ZHmĮ-cBnY`$ww8c\X#B_2bu4:UiE,I%FZI'xfO2L%u%FSGu .tf<]b'^@ov3`0R“=—dz1(  e C /RkF-22!g\MbhN0%y ?xx=~[y) \$/D&czϼߓq=J&de[ ho;792}lhR<*oJu|bBխdm1Fʢ>fEJH}X5Yt!m9Q]Va(_t{4 9jLĢ:kT G>835R'rH̢Tzwkxp{IۿFS֎ l,ˑ66`5Y$BxxN-A?eGӃPA7FÃFd|F^Q.:\m-W-ȅDӱ^8{+9yXZ]u3C K8#2 o`FǨw4VU)8a4*O|:,(c}yͮ ճ%ь ""E:oM8wv#4LSǰ`Ux^xxWC3}> D4صRZc1 Frs?VgqVAۭ`?YvW̛~OHd' >=.;.~ |D3/7eg?嘏rq]XҒswN뵀:ga-#1UIZ&}XfL!W"i6DF,bϛŭ;2NoVu7S9ݮ6ULۥTd2&&*b)?2Qrb8@ؗ>Xo^w_qoWH&(lJK~BK@e\)q˥ *;f2NNL흕>|gߤUóJ&ߨ 0xт]FlFvs4IDZ~~.?'̣7Gb4]KعQ<>#xMkpX~'^ݥ Q}81{{}ÁciEӀx{yԲTV>ŌEy,A傂# h$Cv$@~{,߸խ󭸽/fw`Ly'6$b 1S!m9UՕ%%P:.7Ӕp@_ZM;h[h>ptN{a%/:rB8tMl܏o0.qE2t.kZau+ 40RtpE6}.Q-Uy]XJ./)*8%5ډ ,fJ4Ѳjo(E8DL bD.<&d-ŔվNIsޒxv&Wg-Z!E@ ~+2&أƆ IlcMuAc(*]j>[zXZ*C}bAKoCpK}NT vBޔQfco zk^8fQj=>ngg;H%f[fjmYFPa3gHŻ+97_Lf0XF\L"+g.rPR)br -p\Z K<"*V2E'B(7`ߊ!F#:]К>ͻp"łQn6 uݡ+_.vn>(V|pnɿ#oá]z3^"et|" ˶(7uf e,WD~R{+Sc=zymٿ8ù<;bڴb L*dOWgZzZh[+Mcm\KHrǺ+լZ; y8F!Bl!ai a*%l KK؊ÜZ%T -IxSiBM''1sħ_iml[\ B5XWj 4l{~ EKPUdjdõ{VY><8lIX'6=, }2Opif۩ .@CFl˒"㤈f?0:Q}ٲyt[kS99 E VK{{?t|'fs.A$rKje i)lueԔWq>~7p iFF2 ݾG]y֏Y'60h$o?tXsG>徐u < 2[{,Kox1Q1aT GP[x(v߼cAgB~W"2\汵Ol/\Ǯt#ɱ%n} ꥖ËXKjMUk۫&mnNga;n,%f#u%oKwłiՌ tb]-lƒc; d,3|H}d ^sdre;s B B~Eؾ^^Y֗- +"Ck oUAM.(Pz H4`苊.ؾM8t$ T2;9lIG_f'~w*] K XS0,df6LJWI_ KV>ڛJSӡ$vgza[KWMN-҉U)Z<($V`4mv3TœnWŦpDsVheл}˟8R~}@ð`aFyӹnrT)!,kuQ'Bdi ɖjyU :ՙ]k@tiO< _逷ӲB^F8]*fB.GVٶk}4"A$m>n}(}QN. EdJNF#T]_(r2aIUzX0-gWew>P 1CLA>a7 #E%'2*TfJ`,7Azi1N*mu[߭q5&iQoUZWH\oOLC) ^|exCK<^9U.WMYʥC[ډsaRЛzl+᳻]½I΀? GV?8JglzϗşR\qbӑ)q-kd'^<=('\lƙT^YQթA<{؁Eຣ ƿaBLkϢ lrndCtI': ־F!L&co 2Hfl H:yEQʶW ~xIy RQoϡ-]d @ʗnEATB#nlRe}' 抴|(VL4xaK=DAx~TXX^1<#~.nu*+-$"9(CCBe񅼫ӭ@AE PH1hw'1병v8Aq=LҘ'nU:u~hh0V\ W-!Vt"DK/46z@ d~({i5'|Ws "aV)TmIȼVu)@[^r_0f!i 9ArՉiwdx72Zp\+;ce+6˓@ڦH8PWAB)7,(џW.c%(U* ng"{EW<[sc\.XjɝYac>#Esr)-KJ4 }KKQJ5s&4W2\7!sz3o8'i_V IjN̓ڞTD ãOҪ:5{wXvVeDu}B(8X‘D{f]?LKXo2{T1 F?݂0/ekC5E+vMSÍHkLsN?ъ&yUݩa DQVzѣuR> #7FCS߼L75EIad-_LWk0^!Ł5rqcYr,k3}]s 1^5ۼskznɏQ!hDᶟA399By|:ZP#AwM1(7F2$MH䈹'85:i.wT'?97JHR|s2u{^u+K3p6̥l{L.@_6ܞ;Wm4}!Ie~Bm)nQYg7`" 11o3i/Bq-HMƃOV{nGSS~$f Q-lHpN}<ҏGsR3ݼu C~`MP־^.1+1*x=[aiRLN7 y&İ,LZF.oЗj?ލG瓪JI[}\eRȑa:|=R:;0Ro⨻v›N}sA-cv 57&O)۳eh[z.Z.[[u%K}q;Lbd++Ф# Z b~swH~6DnT3_O(f8ٍXIP$OX5ۊ&zR'[b0]d&VΡ?(gu쿎ƧSH!bƖb|8ZcK>-"[0E$䖭 S\KpY{גQ 7e9ŌNz[wQì*K6KY]8΀u1R՟ Fv%գK߷g(ѐ>.nח{DĹs&5Ļ;4Y&R.&ܓ+7؄e->t|"W)29F ~ X1zE^́|r B $jX?ͼObhϥ۱՜g NT96R &w90?|'tK[!r}_1&łj+&> /-8V=CUR%8"*yp2gɘςs bh ceۆ?a:9@LG,Z-1[!|>?Ι-0AX 0a8'@pEW Sj^W"/zb khhAFi],ڃ[QO_ȃnxf68/AYS)ԍb%qY.AUZ*VWyLu aBtc7?NW|U!d&'0n 6 |uBȢ5IYZw!tk!pFB)7F#4 s\$Y<|XO|EUхP|i'غo&R+l‰pvdsRly ÎZdF?˛ |9 w?.>}h?|S4(Tf2['9DYg%}[{1OܹM(u1 a $duͳ ݿ`u7ǭ( pu {\DE,z  }xsy;|*ia>q¶Tw !_nܣ+RRuk'ە|U`3$d#1Ц<R4Q7̬qZl^S-7kUA7'6p= ⠣Q4,Yh`@>bd f=}Ucԏf#/<#Bwv. kg炄tMz p[ Nҝ ="\{T/5y);,ɬ _FLƁUGuNTzn!!;_S2E5JZP>haE83b4%͂\5UhJr;L$ M4+#9Akk,,r˜[\ C\{9eEl~lui}#UIla쓝g>P=P%ҝ!C1 .%xUCM2=]|&h*+Hv1 P[O-ױ:ӊ$Y]# ٘ X:t !% _m9θ) 8J̈eQICZN$8tWq%Tt8IaׅQdK(t ̸qrMFS˗Z:DʨŏAWN[fU3ոf9m֌mܔ>_ ~^!t`G0r$Y-WgV\Wh`T_W'1)CE+֕Q[ZڶpuC/Maupdc-p[>q;aqݩf.)kmZ51qnJIwB fԘ+`O1ظs WE Κ~p ˒C,ǵ d%8%dTc[+ڥ0x}[/TGiU &-XHtrk,Gv ӡLqCv^`2{)S)R̓V/~/C°9ֺm"/V]}M5O<:Lh5ĤUW$r>HBRi@?.Of+$@jG!cw]f|q j<2[,//+22e6ed*9/4NHK9*R7E/W%S_>U+yT-J_POhjG|̫r:BM2Rwb!mQ~k}P% Cܧ¦5ԌqgRemcANΠCb♴,tU& jO,*q)*y  S-EuA|:*ꢥ9M5d(Tm[J(o+8iP X3m2oxz[g6ySL+>~Z\:z/; 8 ži'tZ}FP ԟ_6W}~5j-Mꠜ/JKD xOHL'2W=MvC Ry iNsnnC<(X =seg8m5HBff$5$T F/$ t^::]KPQ]f ©BPe, <@?5ɴSG*1 5,ҖˉϾI.ʐ;![/ ޚ=?|#}F,Ku9\6 rg4?R03lCv?etʽ9ۢ}RUw[\Rc<})) ek3󹌚d8-ɲ+[mъTe"TN { XS-^ żgO1n'HzoWycwhWRx[ E$?'dvȦV^~K&/#댃Z`r a:"ַ%.[mX@ "c-He;@'ڟ Xn= M>s=d)}́D s}cyJ DT~\3I&NoB\}5/7DVAw?Dև{rqAu}-Rs4q$G*(Ksiux V~+Ƈx5!1>.S],J&Yk.n#ѣ5G axY1yKN}E'/ߓވľG#+ h:HFfO'~k#ˌ^UL=9΀a-Sͩa nl9(N1>6@t2{8)k(b G_pbbTlr rd^`9^5Yȟ:RPI2`3+E<&!7(돿<)]mnp 9#oŽ|KN\f8s$4SYi0j\6쟸z K\ot: -8"D$0A viứ|l >DzR"R4HnǑMm0DQ m&DXV#ܨp@ %4kk#j bDbHFs ٔB2[AQ>αc@(E4aK[8sH\;(h㮛[Wn-k|V7]˕6uKß|NtT>Y qoΨ'2cy W1`bKV{~qo.-_6(s!Aþdkg=q>s mDGSz=<Î𫅼9q~]Ln Y3P|{.뇑|'+fehk_nc^+ BXfDzgg&[nbgXN,ރ P\# QVZ)(N"i m0C NBZc:߳*Y ) q H()qX3y-) n7żDE|7s[ڸyOaR4`~5pdg*cA3zYKxcH :Zl?ФhV_q .k֎e*ߏ>ۍ*絭 0d/. y+OAKwRL/c;n#P_,:y5#EMZ\;+ *mIn[uƲ*0h8abWqg>H[3˙Y@E|8rgTmȂ+O|bpZDž ~.Mr fvK>jH֧Ӆ\E(,;fiA^֫WLh#猄e荃 ڸ sE ugl3jHܾ,hYhVfQ%8!o#}XIuO#[OY3NlTh=IyØ.͢NYԏ;l?!Rs2X xy] jx۷Tly^q$Ц;u]o̗i"z~(ThAtT̼>S8H241stkQ,?s)l.5h]׫\ E1[5O~-Qv}z*cZA淬1c΀5g䗦#< |qpFo\F#/5yK!@gZȤiEs HG綑3`l(q/ƶSQH:5Ԇ9P;$i)&mM̺O.+^hdM=unt^BkÿzǠS՟TZ]fWw#}H+N Z8+U V_#&f ZhLS})jErx^3Wf˵p~]H93L,0O66i5MHFon"=p~ 8\z[kDHJ>|mRg3_y\gv@z9uoX%fgs!8[a! )H A$bNQ%O< | 0ԏOLV(&OrM9&3Mn$^.;P_I(VR~հ{u ff:u#h,`p˹)5,$hu9e%Z[syNBZG;Z*kS5,90{ZV7UrSWtRQqޣK*L8"OT#ugY#-%|zDפ!6DNE˓_fޓm4lT-1y.F`nɟgsd,S/g0 /#Ca 3f'"6#|Yw#ɷP\K.p) +;^%贚έ !Ȉ;8S>xyŽ'q)o;CP\k 5dl;(ideE|^3š]ga`MDtk HCdFǟC믜>>τ#4Xj1VhanY Fr.VziW H:F e2iW t7F7ÈQ#/D7EG% Ϸg.qT 5\Y"ڈ-5F{JY 2D2=*,{ׂ41{ /\F }D.pQQ[i=sItObtNcчl+Y{Y!1y&&f]UW -\Vvo(~7ﭴ7tU j6 Fto Az'ʿX4(Wحr)l-wyT=\4@:O#/0hKUd*M\PI(Wf<0de4FFg"~>Ox'3D^QJë*g4zF.n5vJ)yJGT2y8<噞$">q\N6s)0݋ڨj W&2o[~mN A" M`pO,"uڴ~;^ JX%=i0V%wG #ZhMNIxA:c0߂Wh.,WSVyКeb}*@kְR4 ǮW- b uU׮!DEC^A{Sۆ)dT>7"6mҮIWX^TV9C Pdm8`_з^`GraO6:k%[pX} n=)T;r흘jUnD/Ђe_]M1'zs-4BP:J%c7BoG'+ yT}YjJ)*K V`#:{ҹ&ȷ e#sɲj/JǑU3j~2M ;B. $k ݥo̚.@`o`6)6I0S=4g1Aѓ-mt TqM:ӶYFAVr]&} PG`]ID&X!" oC\4@]Kը\im&XQl`^NUG9;*} gdJ^+i%漏c,i_1w}`jĄncfY|QwWH m\~ϕQq-8SA7҂y`_w%Q48 T?n-I684D1A.BX~CkA>.sLWyW:_g/2䔝 l1IzMl}XEx\.ˍa nDbTj97u\[q5d=?;hYK3*2G], 䪑x:x$oRT[baGͰ;({ $P.lP};^Bpb~[(^ -}ptQQp^PW6-/ !nps哢. oСBO N(A:r}mX٨ޱRx r,J7x)yF #M[6u*7>6$,F'gx^8`1X1"< ~8$90^3,sK(M*ÉsiNg S;n_qZt!`'8M_>~~LIQMՌ{QǏV"BWU%%9Kq u覴aD)jF-@K%y?3aq!ϔn[wuX4#[1-SecZs}X] /kVpH}Pl`R9>)o/G%fhҖɃP6X<%8 P ],/5Aj5ʎ$3kh[s 2(fT`EDT V3dJ=~~yPHJZG:?)-Taar/q˞:TIU=re⿋X|{,`qf!>/?;#NQ%E{9 96xe@)t82qHL!l 1`rTj3!n1l5Q ?VQNtSEFR. P1 [j["kt^^ F80E4 +kA]z!5/~a R:Lޞ+k=+@_F.z* x+L|gstkyߏO.V)cj k˿%ĩ5"HT_RjknAVjQO֣D%$>D$ћUBI'Ĉ`dRN1JhFW"aH2b_4xQ<+!XlKMjGK@ OOSQ0.9bPEg791x[lݚEzWE͑n#;j:NEmߣql:no~7^UjtLjήtii;a|q˜%CZ"犮A9_K_#!{7HAϚsOf/ 3{eP-S]|[4hLiOY)09誉^Prw藁!!U7φ*3[>Nn(%_|B-$+nϠrHL-h}g8wm /.^A%rd;2>q .w)^]-~bj+{LDکVW;ٛc- \UtDSLwH-}Ov a !FQ7CzH#Je>r6D _vO(ؿ? 6; _*?>x.Ǖ5x sxTm 02PE;s݇gT^b㣞3HZt/oveJ$3QQ*]s(/ķY%>=/gJNz>uu Ld.aYiK2u}y-]i珲 Ko4[@LVfPe(jj 81uW(/e_2(UE br,3Jel6͎3/a9qh> o᧲hgLT[&C7S MoG&겉L@?)+>7*\zOTDx䭡: azff,$/K:X([rN6Gkϯeq'~WOyDsIӅm/8c VE1lU͏Huh䋆S1O'$)}4qOx M 1mıQ;nSw¡o|2q%K5+U߉m!@uv$&S$IV:x"VjEA dTxӞ*\ fR>&|1oZe%:r~oc\;WG!{lah5 cqW7jr}: yNBW7:Gq$^zŴl9SoJfv7zw 51n>HFeiFI$Jjk_-t%xz濏QǼ:xp9p}T=v5=>Ϲb8&P=s{qs;5eiw7ܭH!q=zPM1s#G$2}UQa&iYP!Ox''qV.F!iZ5Wg+T$K rN[N>@8 /s)iC~ }xKc@w6 @3*2@<*eS5>gsM47ΐYĖ,*q:5pFܺ<%Ͱ-K,-_N^8^.lUJ7UNw#Cw4Fx}Ft6՘1ZkGu`Kࣣ1(-쭚A8{ ^I}"t0= ۫0:URZRt5>Y+bL:j5+VXua|ӵ瓩j!dQ ]2wfsqÈҗܫP}fx0+QƲ[Pz.Ds l9μ6̉YDtNDz]`_L* E5rQc\@@_la72D41t|%4fAzf|3~'4hly4 9,7ZK\ ܞQ1nh|Xdrw!վy$PXw -E:n=k+L ,5)pKi% .yf䛬M> t Y?L"NZԕӺKTG weFjȓѧrͪ䧊:zð.Η_@ xI_觧֡ʤvsXH"RҨ̄%kbX* _0FJV刁b -a%kL악: |!npau)8[h>0D)$mM8r}V-R⃺]W^'!NXÂE6?-V DU3C/oC m gN6+BH>}5(ٰgN2ӯUei{^ B0U֫nD>)ZbֵO sGO:Gf5B@yTR9DPZ cvN#: J]ʟެ14/}|UNu[ +)p9=kf4k;/ȣřk/{4yY%~5&eCAnLkLgA% :L,BIVs+3d\:}s09 !AϟD˞%>PTO+4SOF۽׮xL ligpip U1K@ *C}[jCnY `9&YYh'v2L>0h t۴,Yهy@;n!T"#gy~9az߸x ~La'r+< UY;oaՐ!}$3Hʲ{bTB~z!XW:?g@(R'hp:U.)z=H!jŭ+-BK֓::T[~vC;rh$bm]'i[ +[nQOHY9C-C򰜄m=`|ca.塖w|{*&ކrra [ڞG9MTFgԷ!UPۛ)A`1p.PF!OS6F]|:LƭA.B"U#=\󅼌"jJYb}]3N {kg^}x[\━DsB@Ь [.D8ŭ.9{WdfTl~p0}50hHqJѵ6n3ax|Zl67ډv|!㛗'u9ڦȫu< {)+*8.oabvڹygL@0HԐoNzK#R6Sυ*Ա7|Ghp9+=l_m^VYoqN1 *)T ~d,Ajr N}\y @8~s DR)R$a=R?/x o|+o2}+,A#@Ӄ"dFnx.ie6-dw_fg[2j,c(ohf30uiJӬ:fk7n(,n [>#ƕN%G-v<̫x-jT sҒ391gOv5h75I$lOtx|3]UBR7[qW ;2ֲ[H )nI.Q`?u/mN"PfX4q'V|o!+<=&aO30W#_mFȒĴ=lp "B8D oK hf qZz3O7qDnai cT<֩v wwZcXȡlC4+rCB۶pJD<"{f)> b3&GR~AE&d eڬr%>l1^dPNZVuT .Mәe3u Mq~D(Y/qWq"tb)qq b 0&$_9XU9w<~(VcB ^iC }&E*霿,!sv{Squ DoHX^uc)^Q8h"hNSTK>ZEXi kPg)քRS|ڙ.q ?-6mؕh ~7Z5)BMAON1ޗS#͓Ұc(qw;-nUΟna"]B=2,8<ˆiP5jh(2G{e6߫i~ƨal(>dܩ'#x}dNmXD rWOg/H0)(E n-(K7BKYP^~WlұJzY{F#+)j@ͫ?GJ3Y9j#zy{uqϳ ]]JE!^قݜZ[EI`5b+VWeBs Ǘh\xDp)-Ս-MuggAWrC, i bM|h_Ztmt9M[FȜ%Km辍|^_ pK?$h[A+~mqXk ;w𸯟A H'uvME[Ͱ|an7w7mfu:N@Ptݞ:fDN?.rM/SK& "b%/BwTjWwUoޗ R5FAYtLiKՔTyp97ac!mgwLf}Ơ2I֑ Fl6.1{!mYz,Db.ӜԬT+EM^AIw,36. R+P#iچO-|LZJ$APx^,EJ:яYz V9J./Q:\NWX/ ʘ *ݝ^޽:(&ܖ )ѓy(gT'B׹ lR;q/8ICGVAƝwhZ"L4R}~8IwL֭HH/"na61A"VEh 5I. ;2!9( GeOco X!lBM=XE;O5Y:D6"} e@G=\ SeEadȨҾd jq=n?`}Тt BK^(Đ םh)1TrG6~C[LeɭG5 UNP/4g]T}s*&Z讏a4_KclZ+6ڑzHxC)P0quׂm( 0}cðq@d8tR"=4|,װkwp]Zѭ~D=/¤vT˓#x-\Ĩ.<1HЂzg6KGh8I7|dFQUũqNC,}bDDY~td:^iWbU~΂ۂ<|yJ؉I𗎘JPx\6*ӑ4_vu3BɟVd%!Ӧš PLo K~5)U~h+ݩ&gyry,Zf-v + rq]r* #L3McnozC6I y{EUPX4- Zٟ Il:xt{0}1r$=ͩ@1}-3cnLv*R8 2Vu[ĔvAl?.pC S7Ccƿֈ!ӰI~qޅUF۾ٸ7&Ъh gQoO94"w2AA\2/plP/O9/x)s[ׂ)T뀑^ZNdiHb6Z0N֍S%)Nߏ_yi!r>}sa +_`SSا$զC{ZQrp 荞) Q $4E 4oxd4 3Mא ;О&A1=*z5s=z] |iqooK\IŒfQ=1)~ >`{g;NˀCWۼzZݝi&hצW >*RĤV}79YN X+[E2vf1`_K3|#ywnu|C[տajJ-ނ%'~-f-/+,񃔱KPc1@+ Eq4y|KzV?s3T=Hg4G@ىݜs^gDb;SL ,z^{Gp{h![x3R&Br']|0'@V[! ЦozrU΁zǨ\xbS*T+26}=X-XY3N ޙ{_d".kYRpGpK Z;n bfaS B}=$nЦU7{QæAܮ=cO|DFު(׌9:G8\0kR"m}D0׮1TՌ X&hQ}1d ~HX|$ֈ@Mcc:(ԎK*O<7&6&<DY/Xgj;*^6O*{sF)(AJ'G/Ι,7M[`hvɞiTH")١5<16r܏7i10Uճ;lN: 6m. t=-G8>6ЄYC(v ~ ل) FSᅘn[=dL#&anv!JnwӜljDqBB$-_>!$vz&EUeᨥZ/p#D<|J+}q Tn.dx_rL,VN#שJ7 +QdI7-@]ھgNw4vÂDyLx Iþ/AEr^rD%\Te=0Q*}S?Ia/j@k!SWwϹC= X=H廗;A2; >OU] vɥ]V8; y9еE`vb"4.:=mr,I@/BjJHxAbJXXolُb>22LHjwTa*㈈:_Sc4ǎP7z'/nOpU(s PB3JF|IxQ9oah*: ,ʪ 2괠2+E +E@^2aQ\^pl}|mr8ênԵxg]jKXeNorVI.2;M D!a9+G%)fUH57tJI$N|'.^vS LP*6T=fT^È&Q3bŹx40ׯ~r*۴[R 1N3.NSLr =c^3*P >g""S@wz^xDjw% '4 Dp޷g`<>k="_]fی c$k%ؠV8RT2kJ4ULz@|魾ݷf[><HAZ%.G󔥂Zf56dpl{- #JW -GhVК4gxf:BW1gJ_hϒԞ|xP/T4+o`:Q>1imph9oe3? .K0~Z ג-W{1 X޿qRڿiR쁃E;yF"L#De/T@cRn5zv-!8L$cP fo~P3\և-̚sQBT@r[J~ Iu#̫ٔ_oѠ)p04/Hɥg5*/ReYeZ$~03R@]K2`u *ZgUs(1bQIw$N>Qg]=ҚX7+B2d>QwdyΫi^ ؄/Ө2r7<"g.#dӞ6B0)G N][V;j3)}dKwS =T/43ss+8D=LhED 8PLriJUU?;jQڳ]0Ja ¾mxxI4i|vf8/ӌ2J+֚4qdS_/ۖEC7!;>v3Ns~43"%`mŹݑϑct䕹/SSGظm@UzpK}/!Ȃ>FH q4Ϣ0*icլ|Ō*gK~Y >"x0UQZ.TBlW `}yĻqDI41+Βo׮> ZTQ}'PMa.Reg܈j(zk={*6b Qe>W75rCҭ ?v4G""ݪJ*œ XiDEy#=KIn0`ɠHRyRr٣D*Ur8Nrc'-?8ݕȔLLP G\$B!U4A>UvH+BjZI/~;.x;bgw 0Gmarީ϶'6eΨ $.>vϥDzD!`xomcxm_&u\, *Dah{9.;h u=ğ zbShT4aaYMŁAu*ՠ;aPԌNw!G.:AGo Wv']>e g,oRp&WRi>Q.k\BC,d dݿ~)rƙӦ,ƴ*[*$;J-G-eIvp*=}|. s.#bRh>bP>ŘFMx!]$q5ĩ)S$pcrBbc{_Lu;%Nco'2o * (AypLoA,,il[3Fl"@@xwJ4B\b8>i+H`1H3h.7|=s6`CGQޝc'AXUT$|;Qp?.pO'N\Y^W]+bY_`G9Ktפ5ؤ?}F(]k'9 }N!M,K7vm.қ6a\XO*GQ JZ.!0 mPqdx`g=(aC o I~jR`V D= |^SfO^w爒<"HFe&aB=/r.Wh(Y,VIS3[4Y KPs߼Ra1wKm[ /tt2۰Ʋaa:ugA(MJ{@sQ mm)m>ጀfQs 4 RҠ%&gi*r˱]&z_7iہD ߗ$jaqlq"l&0K Rd)\W PЪƜٛFe9=>KRX5xC#=D3R`kJ- CeRbPBGksϻnO=߃>,ОF`ڠu+빲ՊqnrXCӬ1~bCpg8sЧ&r? p9i ׮ QuM(I&))^Sj 3Și\O4q:z |~\'=H8_,ߧ("}r% u)BLx2\ee(zW{EqL)#?3.ۺ 'j\nif[MTM/!:"i8YQ2Yp'H @Ihhj~H=ە:NL$yG %_b)EhK1O1nsI4͌ǐKTkW*S"(8yʽO |2?OH6` {O43(=ZYBzpn/33VE߰x;oX7i8 Ai '‘U{Fm­^HYOn''-Ke ŸѨ› lA8+G p$T#~5".3Jw\JwziT[|'8mqoAmyjbW!h7[4;{ىRwbKezT;ko VuLR/oz':E6&SF@J{P{T45֘ՠk2M12Y&?3Ƈr7-l/+uCc/S.M = &*9WjI8;/HLOK1s_ERpsU‍寞_F5yR Gzq~b^1~c=9CTkN/ Nof}aªs{N8)0Fk~+.Z\K1ƣ %@0?]b¡_wxJ+eX~Le^і|Q<]'WƢUw'l aʃ{{1'oF(K4GkVઢ;8jr9[93C'%fr}C ,st=b>겱 z'6~Va>:R۩DŽP>Υq ۓsb0D"c sFtGCZSW.YNӼ(Xfצ#:nAe2P \զq$qyft#[$HX-ocǕbu9SϵPON,9JJƌ4n>>>0vU̡-gAAђ/ˤKy4~ba4M`3Hu!^iړˣ.Ĵ i7Ub @=^ Jbp ]@E~\5RycN;ݻ-z5΍Sngh? [Qȟ64C;FK/iiO+&WJ;$u#v}Ϋ/0oqyvڋKk haL !W9}E< XL5*z%mdFO,( ,{0Ǜ۟ku-D4=/w8u|2MmJh+,M{. yApx҈f(.\f~+#(HUR/WtxAA${)Ef3.jWG=1Yυ]Vo]S?F >XsL ܖCe0{Fv~aUJˮ |h},GmDWrL1gv.ؗ풕){錒X̘r+BBٗwj˳O hSg`E]Ɓz7*N>ZQ HahCX`,¯xw5Q.A~s{;IhmOIo {8I5:EoUvr"׼mKPNwHh3,ItbCKݖ]y9 ky鯤VQ(PKQő Wtc#l(.7 +08Ӄ·zb"W6YH Fs6u}kٯF3& AtwҩU.*vId@Uڇg;.fSi࿯4;hO۹@ NcZ ΔR&q$Pb\6Htm0`| 2`ƾ*=O@ J 74.f5e$%%?);6TɢEѠ^SoT7(,@7 8}`qk7|X"ϋQ<Ԁ2V)n!D;58X:k$K^HER+TrHcz fb0z?I2DLޤgyjF⏹IYi@h#i+m6NY}g^03丯[Ϡ^In/~3?{)HH9/΁nult֠1 1d$i끅ZԗLJ0[ax=@|5mP:^tr B[5}N&BߛkAMQyq]6@KaL>g;TSIN\$.#Q]yL`]C1ҰlҸ tmٕ)X h-ks _GVr. rx^2J~hbOdty"᳣'?:j^Mzz`t  Χ$[d6B+$ ۮv g iUA0sB և%TVةhog#d\Cۥ&*#6cC4"=|@۷8~bMmqsCD~+] .Jb4I$ @5U0ؙ;iT%<K0=, F,X79 oAfyIвV/c۫o8팹@C[4'yoBh(pһN"ݣȶK@*ϧa~jEQe%:/{j]g9I= ͚vi(}d.ڲG[dL1SQbBKTcHӭʼnD%a6<"ݰ>fln]%GV ~)>DI A+c(5<ح1@|!"TaZl]? <;,i*߿IT b&_pvZΠ&c#I쏤kKaqQWCN UMO*4('Pb|FIG5\@cnܾ~hßpL8آD`I7ZޠI78#?;˟jǗ;GZp\%C<{wjԟf,U?$A5 r[Үu]z;û3"~ fE1u*MbSAF>NRzF&So. 2~SuR{g0 "|(-B&~P&uP(OVOfUIfjBy{N Tksr) _ɉìzi֝.݅_Fė<|z&"ݍƮ4]'3/E4lqk}XC7;7 <.V|yQjB6E1򒇖qaorfQ+pyJeOjr`'{S$L+S`h܇;Y~-=+i^өF.#hgũ\Z\ZsA BgD Ha{v UH1qkEq/G=CJqO܉1>*ꊠʢOW δb3bL%O#Go7?ԉ${M Ay?9X+VU7?}<4׮)D W֩R/UMUaJsfLH,řM@?nHФdVK<-_74'Zt:>LeJB _5=eVۢ~|Y~j^4U -/BxvTd62&Zy^I#9|BD^6"ҔEl5ҦNw〉P;\ӯiDg41NQc ~ʴLP M"XBY&G\,R(0d8|+% 2\{1:޹dC/t2Ym)u] 5x/T 2H]6ًZG[\qg"ܒ,/&>&=#CkC#-.^\9prm[JNL+<,SC4e:'3EfX+[&܃UօMCג.m }Sn+ߡ^[[)Y @j'#y!4漆8AjS1+sO*qVNYASB3p=aWVAXpwCn#4-M6_ю*KPU*Ots[M)lV/Tk gU1 8;:@n)ʿZ[ VNཌྷqje;EC/H]}3 0{!lā-"{9ηru^Y'.Dq&yKyFFd9mHIfd㷯۱?9w^dK~ncx _HCX\b-ݻR 31 沏ē3WEӀL ic%m8\4(S29/5XXhA˴{w\K@t!y.w\ڊ ,uc5A>M(LMles#$T4.ٷ. D]~FSjn.];WgCn((~i`;^JcAU/g'HACY2ٯD?돼0jnC,dR]<?IF!(]&B h˽$MG85C]Ȩtc=Пcc0r4EbSʙnI\; 5 4ېt 7dH Ɩ5꘽}m~Őߗ5h2)E J[U獯P,t$8p%$ClQJG$JIl)P㡃(ghVwWq-#rjbm|uodywFzVBcM]>4]ƥAlgafoGJ"nU^!ΆPmU؁|J*,ߕVp[:JXdwM@ݻ++#J4$[:G|vq_j/gEc]dulQ\L)Y^R9(lA~}m2vBhpv7Ss[c E}]1sLQD{Y&~g !E_<EfW$bsgfN89넛Ki*Ӕ?rhr23q08Z[\ȰǑ0\F)qp5h2zVxkjmh~.Q]hFju5Q.<#'Fbs{,t-] iНQycJ!fOWHMT%#,W8K-&oRWMhZqdfCnƝrB+'b\R}Zz뢯t藂 [)@\ʷlT `uAu5BULj,;"x0t}adj~N|,W#0]GܻMiϤмbI[FaIh@MQp,UeCA@>Tͼ0 h&<72軡#ljЌzbE++cW`ue;$f|5n2r`|Cnr/#8;$2Mm&qCJpFQQv" ~WKnx"LEaZ.f׸EG)Jav=cmr0O vP4<"5⨷-1b4dyXlOhGjFEOvԆ}^"IGڡRA.:0_b ?L5œ|vWHAY-[ǂ2_>_+@vLdt:3#YbZnޅgjNͬEf4#Jϴ@G"`Q>g`R\@Rnq=&ƨ+ϟ䴵-{!3>d;(z.窤Γ5a-fvW0y36U1c <>Gx#:c\>(1xg1D }l57 5!xDZװef>⟜i՜π WrvH4Jg(C])v&y>FLJ?=4ų#Zr2ˤX5Sn_E[4rzCosi3»' VTls^@yƽПSp}(ލ-v%%gSmLO lU̕ v.L+W rS8Jn )H[VZ6Ϋӧn^uҶHa&ǎIi+c >%aVx^z.K}QB>ϛ\ a ~@&0*f=Cav@G ˧`s//bQtjSe?JL'j.|+]ȨԹVqN VPh0"b8 iυe+"ewJ k<}GoB?XH#]/700 ,J&7,=#۝g ͏.v|Iҏk| WpF5fLe`)wzcۤ(Q+#kNTtxSjSQ{8*0<#20ܟgܟ2m9M?&:~R04zjs3}lvVƑ!4y"a9 6v1j}晷׳YJ`vL5(纽kqa`x! ʇQDMKvI)ZZ}p\UfłnS]VB3_\Riff_--]LW&Q3X#H_w'OM͡Ջ!&P[z@Ys`;1 Er}Hmh=NUdqBG;vwmQu3wNrm.8w 2ILr1\+5M"( hk2 `!%&9ҐC,r\4]Dn_BpӨ0}]plP.E8[.!ъ?5^V%]||"%ӟ**reڙ{s7d6x1Flf6Y'-K84AG:Ğ h9MY;bsB=};F2UT&XID|Vw_v8?|mkwM{:4l ${k$N24<;ӈk-Y Uo%ߎ~NyX=Ud))t;a~L$P dKJ'qB.@O5+Ud[C52V։+tJ*-Ǎay+$'wT{5!'6Ef"==$5VOl /T@'i;W' h+9}7WQ;B9|/1N, #%%fT L8% gF>{i%_2A/y#@:6djɱM %w̸;3`O(De4MK#GCz ꅡA{! r:`܋YWbmHG-ICxN 9U)  fÍZBGfߑvt;3`z8$;Fኖo@VJ?ϕf {n)4K KЫX.#T$K:+o[S0IBoAG W kַƇ:WqƅcOA&, щ+@طN4Mk(M.V9&t4Hɹu°E!"LdbqG8RCWj`^"n1͖ lɋ-|w)-4 x nT\7eNx9}Q*Ky`H neS|< Œ>jt4RŒ(ΊtQϏ,ٙ#{@QE!JWaTNąq|y"綺Lj@WyH?(dyiD'}3ېu %هI{ڎszYf5go ) 8Fu vjA ӣQrZҐm ƍkBwdHvF&V'RWuWz<&0TjMaq Na4U֘mbI2_,JsM3*P dlkڊn}s <h(&O"7~(;mJgVAzWMBOV0BTW6B~ !2]BRZRls6j~ O.f3@-K X@4LstxM{H i!5BˬC?qWlp`o%Au(`x|ucZ;zUWRi_O.KP +3wT{<fgT!0?dBd9/CYH*C^P}1dVu3gHyhrYE5b%ˈ;Ȅ&{!H 0ٿws0FNNa!9,desAr]$0,]Vj8 Yhs|cߛ~\< ",NM5WbCq8a%.c(r] N!R#*0=QlB %=b!_kb r4!bvM0MK횰$T,œ rpro1ְ.V6M\K[4%AĦ#8c.`7&< V4C܃b"/lB\ eRb_,~xr>us19fyeR`S@ܕXnP8)kJ 5]riS_7~u=JA4#E/#+ړ~"m8p5[rí+I=lPDjY?p bV]ƚzAEng,lU=պ1AvYj`,!ӶK5|ed]`(b Oʹ$46xmN3hXh0#xG6,5P].SϘ;O/R,r iMmiGQ9P6/vmTf0oKD>c)uz?$)oHՍz{2O^m ^t]zkk^⟍E&dcE}M9@$Kt\Fc;0ՎԔMRqE]?*y^+eÊ o$3BU֦%˷ZD26;6N}kxW]{=,YBop2[N!x3wiaYeIǎݾ5%Yɿ|jC2̒ez{U'KYDmQ3~X?  bFNvN]ѽaeK,GiVϘ|u0д[Ԓ'i^l^9?=jz7eiL~ lOb)ط@`1RFo!#t]";G?E"jKb!u4Cb0̧=xIN8?Pb'Jh8uc6a- y_sBF 5b>(YƜkq̒dIW8s5Jb=ًhsC ă:x_>1eO!=<@H3Ղ47%$IEij1=\?Aq@cvw]p鄺qGS@Cq+JL ](;Jy&&q謘Aw\,QqHp ?ZPDp4Vzl xDZulʵ.E-4̟Lo3ǭ =~z l^;2vg,w"isE>s)NV F}3=V@+),[({@ )[vj\ip֭O&_y|[3<f)dN~+4Kl_v[Jc $N8X)Ǖgiְɷv3q& ~"6,VhwwEPlqI E^pL$6GqO[F@O0f'`U340RXg7.:Ťs=~y$/ S'GȮY`8)1"Ks:p #3{zPY'(gxk4i0Tf1zN$LzdUd-ׯ2Q|wԽit0R'{![͋ Q&?eC/b_ݍ lp7_H@>8I京x" ruN|]U*lZj\|4i;h95% >NWWf'J $F=iGrvB0-7A fJFoRם_{L͎Z/z==r}r X)נcs"lcu)Uq\k W5rfE"d=c!Ox6胩bdBB(>أπwzPNWug|_I*)(8:kPiQG$t5Vse,Z;_Emw˙=?Kг10|21m99T)ѫ;ӭfk5,e\ =rpRnȴ͉)7\%u HRL)eM;`ܺS`V^/9i=mːևkҘe(\zQkG7O8[#ѐ3HĦw, 92_/؉ zūˁ!VU D%Z!𚻅0vЈ,i1)j}JemdOsYόAKϰ"Pe[W,fdb%M3k_pty&b,sxtXkUK&>VOOXU?vdܳ{+Q%.~C?H8k[aP侮椵/ `~-lD=Nlg#FgbBI"sUIzz9u{tLKq2WH'{զ7>P\\ޜn,p% ]&r!$o5! l& p8V+V6stG A4_*[v}W@O "VXkQņW0j6.;|iU6CrY7HE@kF. ]CqG~_'l7cU:Ҝj5PE&ߌ&nTmnGЗyڗLZ:ZX^Du} 1MQ 'm'%V繸g8Լ7,c*=/WCƔtB02КY^׳#`} ;MLGb6ݲ ){9BL9{f?fX!K̉ [ c]ܚ{~H_r} x&*D䔄"))lp18iD<]&Z}t%>>WѱS!FޛYTtIest:X&tEe>i-;>nMsC ; vjH8ϧ`NEY;p)(Zn7+e <,>~(KeV j8.l EwbPbe21 *s#FOV% |[?{B7YI{Л5Ef>B<=9ŹiuZBL{‚e2-SYh" ʭpaxp )JoRpԷCk)2Qym_X6|Gx$S61iNח؍:Š@?Jw ~|Ufr39%7\~!0fiT!``{'2c9"{PPF [0J5'BEn@(E@1 0_J$`'K +i5a\+ ;nCkyIgپiu{́2ȋeVj`=ͮz̎}BO@Ԫ0aEzNpd!*%c뇿ѨEimK! 0"Ӫ#fEKWorPa5)@)MZ&.^[Tol\g's bl4Nݣ~ikÒukۦ\Ccx@lY(nJ~]A }nK:DXBr'=5}8xOʢ.cL`d3q݌Ƴo: Ğj q!͟vK]u/ 87">2x<پao&9u/>!!A|Coy{_\6 Xwu,, 0HJ#P5[NicfcpmG vR+T6 F_3kKTlJrF*C b]Uc{O6T)q{+%'jwk 1z\P_{F- PWb!x>ibT0mLc6DZ߆=-{M'\,o{.#֑P2dL@ {`"c `?0 b rQ,b )A=ou?$A9Y8+)J!5q0 r6/geާ[+,K2I;qdi:vY^6.&^evznF#[/= ڴ@c v`Y&EQ.]#WA*ȝ-Bx7:~ßi"ġ# ~/ln`Xtۉ[{T ӻ4nqb:ʀjQLm逯Y1R¢3jLL^(5,P)W)U,a-.Pnܷ6VNuˮZMLؼ,P!ɜQOL Iv]SkҍI_ce oC3:xkZzJզ)>HZ⺣RBQ$HpX0Sm:^׾&*y!Т<괍n$Sg;Ѱ؃,G ʴ ,h5Z%By-b`7Xd*h\cڬ(˛wBmԒ]i>7~c(n ,t2V^%auYEeH,E Zj~=R֬ߺ'2dmoL}S,FvV*JsI''&͔#!ȝ5"[1x5lY0]2 A `@vgBڒ"c(kpjDE+!ސxOw{i_;sOm|Y7t!̘O4n 8menwl6Va)EGWR6ݸ{4Sll_h v8Wt[TN5׳ ?m|$'@Vmus42npZ G2d!o_BKjS9Y=-gYJλj-k#nz| 83b]q&X{N׮o 7hR֨%+eyFR9'ŷ;D&8MdHԓ9W`T7+z 7CZ78FS,C=p9bѼq kX'X`Lgva%0+pA: T:3Z"(9P?o??,-FJ22"hB"I>Y?>' o!𼬭%ҼPS zffzò =9|QI2źͼq&CN~6M")t-< vYh Stbt$)~!(~JzQ'N,*0wqrCX}<E'2T=^XgiȎNȨE! & Zpﰺk|>:E ‹j>._?/m6S:Yѿ=2 #6$j+~" -`9MOʁo4F=KŕCnLbC$(71[xёr3iHA%}d`%yc8%w dM8u'zSp꾠%6SC-:!#]Kձ]n>= &j;&["ģwhݨ+2_.eB)e0-J̽w^]$zq ='}pQ_մ^"],S4'ߪOI.KkFծۡ-mqD8S_+;-v(-cSls3(K0sO䴮+8/™noP4;L  b_BlW*xwXTyC1NO͊V%F[?9!&=[DTMzYSm#Nl>HZklRx8Y)lp'E496 w-_M|2w'^}yٶG߄ 9a~ܢ+&TO&Wv1`?2pVdrX*c;Y Y ʎ/bT{jꛭ=uh}'L^N;XH&SSyb}#Ε蓼y€8-Pw :b(rb$jt|!Lj:3֯mJF8Or{Ǐشe>MJU(L"* *%D6'WƎ|qy8¯ <'ާ̈́xeH<+'ⶸh24j.:ݑm2;d87;ʨˡD mKf/Iq:DRx<`*?UV&I3*"r>pQWՙ];e"R2;~Cї8P˰)WjF쬵=8*56#(҆@ +ge8TsA7I:yJScfe }qUUV#n]ze=MCpٷ j2v2x1TFOQBPr[dB 2+ģx-$е v% Ͳ{sڪciƄ?EꚌ)nHӻAh-{ߍ0,Otns8)- Q0sB8B~(fG 2VdOC[w⓪UoY"[coa0L\ I b3S {/i2.pT~4pϧ48z+VsC{O;cbizůy5%WapP5!1kP]]-ռ ̈́!0J}3_S ̔v=*,+QJk4APkO3Gn+ny_4o E?ewGmZ|x,;1|Uƥk&_UvKhlJ$;p\O B^dog{Z߸F&Z܎^ otK|F[ =0(J} GY̓39FpX酶v*V?@)g,.2? 4#h(&wV:?9{HRR26s qÊPQJ3OcRMPiQ͜VX!m|Բ夗h!u_ك bzyɢM1Y\M b҃-E>0U#{ ^;N`#tVv(.-s灑me J3ar9[`w5 L_65e>@8#ɒBNK RN"[o=zħcT 6Df#TNN٪tkXk:Us<q\nTV$dXC5i}$C3qw,[&Mi.Jϟ1xx1E%oD09]{W/F$4U3~x71O]KmEZ Yj=3،&4Q;mA0w+U7>U-<9_Xq*/~k+;P-.{ ͌;gE. v]=[@R͟Ha7FQ!&0yB #+.tNqMG9Zzt,vhLv^6)\xO0jG@zorGt 75T!N@ Lfb79oT }YoflLǝKMEaJFRjLr׶6 dǟJC!fJѮ&%Q6 p]ۼ*EGf6b*cF+uDC4i|6jT2eLzDrXy\(7WW)%"| ͫ뇙prxK7]C[ kbsgmoFwrLKtfKx@z܎+۠vM)dmXmy_ƉaXq]VrF%&p \% ?iƒˈI׻4x,))ׄ`G\'/']s.IHm-~F\:V[ZJnlQɋj&O0rg3] @Я~jhwu9f$Æ`a+ƒ 9HZ,ycmzت&&غ]  _\*D`4[nHGѐj[w]f?.[FdQM.-Qܭ~(k*V0O/P5o#B>V6* 3/ذ٧dv&|y\ P;UI!"=WVb櫁ߍ,S!/TŻ/X0<0 #qӻ`]F-69p&q]E-}|$Tob^ JmRRq&*$dI!)CK!o< -|e: ל~_"𦜼i)PO>4{+D`8/+#!BܢT0ɽ͹Be8FoJiU:Β&mg3F;,{9;ez(<7{0Na|x]!r^I~^Xߤk87n8yIP4SO.&6Ă*HҰ"Ľn6JNI Rv1"[fP_#ݏJes =rm4Z*K$h3#^6`v&$_UXQK֢ga?hĐe)ї/5ռIx)фg8U!r܈lAWjkiݒ!2GI3'(ėDH  ٌ=q>_bgzX\Z`Rw~6n{1N[0f^qяwy{J ?Jϴ9՛l⬪n 6z';r\}Ǵ^_(!vW"bwgUו6Q))"`q9^\c ȅ3 6{9>d&2a9d%Z&ƒʱBC>V>3 Gm([?4Km(ӕB 6G2HEt1¶t8bVhqcLtn앻>^ BcV.aiWn꾑芏+oɹ̹}n4b@8{6蓮25R;x<۝QwfJO9 CM%tKR^r﵍E!%v9o"k{|tHQ~,ǣݜ9(3̉/Nz _fʚA {)qr:%M 0X?-MJ>R zldiŲaB{m˭}>b&Es,釆ba5'~5xYhW:{9618i٘clha- {DVfhY5j̽b*+7|h8=n X,wݿ\Dp֟` QxMg |w7լsA" ";(L=MH2A\E7>8 5DlO [dq E”K;M'~)첷Y R+ީ(KZǼ]TrZ][qZ~`E!TFk!RǍzWi9 =!W/KIO}`ZA?HׅĆoTօY0U{$&Z˱3둞I/o$8u*o7c)0E|lR7AʓK&*2o1yE3FvT*Fk anIuE[+5*<3W!렟=';4L2#=ȭfŰ2>3Əj&+}+ҍl (>"F*eP4SըlAPW@:Ô$M/1ce,ʶ3mKBdN&K! {&9:Nl6%^OpaF"p%땶C0T.^`[@IN,]nY>w%4Vrv|[H&FUZ:?Jd5!8澖Syq.^s9Ld +G{ԃ.ցdoBQ'X[o"@#e%UL TDA:bagPJ\vy6gyAcQ/I7Ÿ ]'h?+ON f+c"'ݕnM 8̗pdg'Mz)ZL<Zky`ujgPzȘ_ɳ{T .|Y>BS(' Nj{QjL^p)dT im-[2ײ:<7]j _/j1N0gF g T:l_>OM:p$< ۷CQT> υBu'!PY:vXaCů@ju'rO5ҀgP|k]dzhC)6+~7_Sh]ZKpcmloҶboIEW!1*iD.ot kFA%tFhQqv9L`rf2qh%ceJzC*G16F# qڒ|x"8krkέm&3K46{ ID-vϲ%uuOA G𰳺C3\M,_!_.1Räk!OaN`qOU)r{1П"+]z(S~:r2THЙOAŅ"v!UyD8MTU^i8-i>eggz&iYܺA4 h:e0A ,&;v]b!KjT0|QXB^l@^Ajrw:D۩6.߸uP#v*}O90`Q,lHN㇜Pd$tQ:yα&/`݆#/j@GYU/ MD^ͪ}Id( xef|$4o;ӤTy x#)׳xNN9Λ9W]gK9sa`nv0`wlGMJq &ܭ#Tކ _Z{z{/S ݞ cҿ,7Non/t e^Ԃ۠ϨԻ099K$IP9o{yWdEvWrg/*m{c#:R`yQ+;T}"&ap߈>#+!v[5FcO V׭75 @d(XG/#!=HvpˤzNGz1 zܛL>'YB#Wd$(wd.IiQQt1dW)L0+L JmRؓ~d,P8 }pJ<;jmpWHQ>VZt8l״E08ekAni`Iͣ2*W'jAALe½4t™/7_gb (AO1q:Poxx;H|ֽBxp!RK箂H1\G-4Knٶ#XVU7&jji&0 ;zTK76%M I|HZ| nΎٺzh \ ?wj\B3 }.jI$NA'PyvD_>#;$:O!{">,,M^yp$mkHꃫ?r鲓7JHt*Qo3`UI9^c8 U,wfn@!.}7+&x󅰤qfXG9f1?LE7Q96Ĕl?D֮ .]SIouſ;J?+yiOBnj~?/uYw]i[f 1)Ы#oQu?ME7VFUfQ1tari!3wւ]}wa=#9" ި`FïQ RIwl8G>-ǣY'6DJ/O)Qwy/ "mR8+*{ԩQ4,YPIs#wD: ,$Us_qeRB_0U[ͼ#K..V#G9l3DNiŇ{kwqk7fEl}1*ȁߞ3%L>hS#w㳦1Dehsi#m掲ap^2uc ϰ9QR[uJBoVHܙY,CJ)Ylsgt !!L*3"ͱ6'ey*rD=D!cz5ũ-? s',Id[a EұrR,4oe 蝬mӕ{ŊQ(q4Klq$UX";! 0@NlӻSQrrYԘ$Q~zܶU=ccsOؑPFcXzT[K Pp t6Ao{W#0*nHZt{$3U9٤|袅 yL$q1$P`Qr(*-̡W\m]!tWDnjѯr 9`慞( .M:U bƘg%pI<ŻjI2dvJ/ $vˍ}Аz-eʇ|C ^iQ0^Oȁ.K3X)Fw)mߘQK $dfN[O[9L]vŃ>ClJ⒘bVg*ag¶8)12mGEsIWNԑTrW0%Ruq layBd~B׭Y)Sue]^' {R/2fo{}泻 {X cGFgެ 6ޱQ:٥DjqݱT RO{NW.(lFSGd!d^fN En1^+$r%ɷ|Gusnh*`Þ,{<,yh]BNcm"ykȂak':qKT[l3a$: nUA{*%+:F7 Dl싟Y%Fç42 mslV뱦<]ڒ73S\f~Rp.JؒJ7c5i'99qe1pݰr1aΆv1W/%OV1@QAYys7$QbS-8F<"׋L55|D% *D&oH`k?JJsa001_beFɳ,췻0c 2b?53|D7snlLv;A'|L ct9)/q2v4\ᅽLWmr5k:EtMO1o\ aP)o=9^iq$+tSzJ/'K e{Ы} BkOӨ{j=慶7,1.96o6f?zL@3C-Azߛd8 yX qErh''5&+83&z}rqB 7{Oʾpȷ(&iMTR8: OA1hO#y!}5ݬ鷚YĥlZN=0<=# ƪE-Jh`taS|iu@E{X}'H$ᮥnmFP"~EXd$>d9VſtVQ4_?;H|>l7є0ԗK~|xmz0< EvL 9%F&^%|̬a'{GB>b\#16`-_̖h\ |-9hD !2ߊ:)4tÒˡD#dq@!sA;W*h\z/5wgf<+SQ%(gFvW/i`4D*NC"b:?gz ye "c|oQg6$Ͽ{ǵ XzMSjTV'iiVHDpژe@=@G}(ݢ9q? ,OnٯSiP20KCPhY'=8HwUlJ̉>G|׻5:,'Vü©=] ?z`Y;DCaad&l̝Ť ~͗\O:w4_[zwyJ@\3nƮZKD2"ʳוnb]nq^od8J ZDIz65jȻ)oi䦳4t7Q1N^DZ>ʛ\t &m~i.t]Z[jto +냹 StbA퐦8ؘ~6t]mpKu$4[b5<Q1-qϹ7ך4t8zXS_n9$ڏ|ZŒnQ:K9!Y?A_>=g` cf,Q>:m+d ԙ4F*9l(EWᑪji([\d+ݬUHg8q(gf͵b}"<;h {{:>P^-/Q P* = K}Gdd;?gc/?\uxeVQ|JED#TBB'a5n1S7 }s 䝾,zM/9aNM3ht*'N=V0x5 _2@Sc G59Pyصʕ7 \B}bf꾹%X>׿ta/+Mo)!٣i{q槍"_NrZԯUn^(^T*<#)|&U)%Xdg3XC萙a#_C)}TT+8TÅҬ +]UG!ԏ}M]q rPƠe0 !GU'`OyOv>)(BaB(..>:oj}Kow]$RҦl2hTHeK[Z},XE轢os]p'ijdtݧJIl,ko.aAʥsgkpT!2tkW:{;tsG z*ib6nje 1t7n| ͥHhp#94H/CZq.<>$EY˩6Þce؜o\ͯ8l٤ sO@]U`M˼;75?++k1'0P:ߤm˜0cVSHRqB &2J3Sf*dy x|4l Y?7-V'=:= xXwgxgJIa s $cdYI\Es@L#<iӢ?X! ꪶ(7̑ٵWof4C 7.D'y"IU#LP/JuƤ˼XHWz<>;WfAJiI2pFsX\xG`3({63 KP& D3-[ uX D>c0~A>/:u.V]JވkO@LKިe/ZqsW"VsHZNjHgeUxCdz }|Ht~Mf7ȫe}*BlVA5yD ׏K<#/wu3`$7I^]~[54@," WՆiz J^ ÔuZgƹc-M2ƵS([TĠ*:)E'+'/PnmF:L;egz𶚛qВ4n7&aʁ&%WFJ)J]" AW{dKxX ŦÈfvdhoΦ.45@˃4.t>zCҒImQt[Np8Z)OГQhЎ+Gg]c a܌QNvVҡW؏7:3 !<k׌U/&wblG*-#gB>U;ki m)YոÌ*n y]uRE$ T6KR>|-y3PaWD;Cm4xѻh쒲y|vj^:PTA:@A!!]tOsm|MZlWQ{'Ļvm.ڈL=phQGWA^0U  _Ӆ-`>7}<\ͤ) Bm17VF9+~7TI^aEJY-h^"@(Z ,Z |b!$<[ Sjڔ0r])ҿ5OH'޴V*L4e^5Hd jqeJ? F^Avg Jk%;&,Gp(?c{@N^ ˜FI#F̍+(0 '/YL?;GB6渙B@-.C|V 0F@6BwM =;`$~0bب,y9&@{yv;s0g)) \2xcVh0KpNgMNٹk&ԵdZ \JӶN0nnN^B#Pp5UJa,WzʓD>T+bM5qՐk:XZ0!Rz*$%qow"WbZ53(AV΁ȺHOͤomA,1Uey,sf!ka/>/]8m`)0pa=kIL*x$w$Gk7}9iT}oO4e2&wFSnBXpS3s0p?.@C K&]>qh>Nwiba"5:sٌ\& B<@M-A7KF,~)gHevC' tj@Rn(TY f/ׂǜ_gEc9|(z|t.pzhw%_Ym*ƪݞ6 :u5|'*6EE iNОQB =[ 9ѩe@o mbC'Ev1I48z4(G`D4wd'S426ԛ53X2K+O1zs!|Xq mi-Sxlkl>^URyq!k@9ep-%ԹkbC}M;jz)Sh NWwN0he/vb>叅|Gd X咿>~( -*fΖHq8b9q`G:?R ׹Y5p~]b3ʴ Q_!!j&Ic-LBm]`>Ra>:A @y%)f̋+f?Vn_&w:ק!֨YBͰHud6ӜbMV2$Hxy@"JJ$!7'F{t%Jf<۩nBC苜#O-61U ůYK#6 VݖsDfAcgAik򢎞4xEc8pq:-ϨvtPDܓy(;MJv,ΗEc ΍ 7BEB F ( //Fmoyqf :vnt 0lBYO&7al?KTLC-ͳ{#ء}ZV@JQeuJCh>#63= BV?Ao|%Un=cުGLo H2}‡DPCj}߅N-B\w+$IK^R3猴kgA($X`FhlN}Z@N"5\Ѿ=b|1q3P۽&D.Іph ˭/,rC"Ϭz?LÎ)RƼ2(`}]28(0o5F4D osGv0[p#fɪ7_~V#%}*ǵNg .*h+RA`QIj1ǰcf3xLo͛p#ւyb;#bk$~E0Pr*!%Πw?%LAzvW5ʥиc#yx,,߅Cl(,,ig`p"Uj2ή Q.)HC"j5C4/8 ! \zf2Uh86 H%\gR[lk]\Y[I//@\V^ko~Xuc>_mDWUSY6YI [b;B<}ThU,a}%Ԛ6˜?XFUG`ٯ6 զ c=5Ntaol2X[s`ls85LW}6G ozhB3WuCLa@7:(VYiSmnlBLBM/XZh mhh?xXޔL-!="MP0Dg}>ZyY A@}rcU?N ÃFnk}j;2DKOŒ+f'xOZ 3i'ػM83 /Ԙ/j*x '9&\X0J&>jۋ&d`eOH)0]L5RGt x b$,F&-?b* ΄߀\`PSIA2oQ6 xqB{C:uZGDЦkIyDl _5L7ᚠ-^O62F@*Bf㕔-N\tmGM `5XZo}۱c{}Fv!pMǜj (Jd{!Ľ#`6A8)ujY xZ.WiHG}VGĴ]ƍ[7kZ0y( \A&Mgcapj)Gc̗sgfh/9U%>p'$aj%iaOFE 7o z/.r ?n#Cs ],?U#nydeRphδL%V*4]svq+'++ P̔HҫcFӊL0 y 0eI21;غw$eE?+A`6} PXӪr沧l'VN8Vրw۵Փ|P(GXX[ Sj st|:|1ɠ;o Lc`|3!cJb\cAi.r _г?okDRHmA*Oɞ Qt-7Mf9YDY`eb}hB":€ݘB h%;{@LP?E q 7Rk."bz8 2mA.bE_.V Z\J_!Wx^3?jsDj9٩3cLp. 6-l.<4Ώ5峂PѸ I6KO־P_%=/zQO dPվ[bQ ®(3!Ι1R6n{d-됢K(]ltIF &3_;|K TB/\86jjIX<" =wCѻ]ĶTݶ3b޼ɋ-i8.=1RŔ#I{౥E+^}8"xBb=>VmSMu7qBDyt8ce63 -p9S%8Bސ'z5Wf>BO_+o |!&v4e[̏KӒk-Vl ~rTmBZ-rؾꚚv qxvN#ӕ.sʒ=ǿ}9+v >IcbYJ+™ p;>x2VeHlCjs2J_#O:d!ZSB8L&(ŬC;T@yeNGS)cKTCx *8Ok| !-&b]S{@ń ˰~_D;ͅvLZ;wμ2A[K0:Lӆ^XjB*g jhCtTВ>s> á_}R`ӫK ɰ[Ҋ.wY4mJ u(m i`_?Ӯ)\rрRKkpU% {$io٣8.*UX!a@XX8UkZ[9mu7ܠ#[0y|wmaM`HkT4>0+> Ozo@_3( n)]$3S|973__[)oNEENjvIĒx.6oFLR‡z !{*ٹEaSwE5i(qU8O4Bd4D6Ƃ4nqeP }W%ֆE*^n*^S=GMN";!QQx ^ =SJȡZ+3K "Y0toe]<䙆+y .49zPI&3,\&^ rq8uZN?[bb/JE0{*ert[ú I"5p qx|yҪyUa C3TUBFfS(9PL PNiD;ەZ1~G<8WdE[*LO#4u +X^ݭt=:nTxќ]nL?Ov0 oN53nu5%] _aF:Կ潕u @tMДeX (lA1 pJb¿yQ\>hbW+gu`vwh`ܑ_XU-j^"k_D(iazJ'gxǜ=&-V5̛OpQH=k1b֎MKLpXXYTq 7VlY06֘l3QI/*,IzQ?=jsdūI'6d+1Ŗx⋊kNk&—] E"N^?K6'y"i}vx% ;WRhӆk_K8*o撩3B=pfœ뎗j+Qb0 l sVӧ&v9qD6[/ aAuwZ>I*"NUU^_ XC:?L=נO$KZu%}o "~N5 ޗ)?Y&i$|(G ޑ|r@LΒ#e g"챌SG(Z;3u^9ye$GxAt) B⊟cK>_s,>ŧ?eԨ_nʔ7 Ns46סQ gp2ѿ|f|>ߤ%;LU,iw dxlT66Tx-1А8z ]2`dUFob>& \nYm c{\Dke}&so$8K)f`\caӒ붧⢚xhM,{Ԧê7>:Ms2zv@IOi^dr j1eK!;iy*Xw`G✨ ~k G]=[TS1q|VT(,r?.{CQQ~V0Yox C@C$~e{n8~ut(fҺQr)~\\rg-~pb i~lKyhjD w(_W;GY 1`I"` '/})= c>V WG|Rz<ͽ/R YK7J`>8*rVîsa}sgx9ZpchL:f tD+hQ؃=8?B{'JHnO#͜eCPqE]{{)!ˉk(Q"Ѯjxo8pVj.ʟfgoA>O0ZVNa"|>v_p[(ok7ԭ<.>ɹzyjK^1?BFEQؒR&?44yCK6XnZB8э*;`?_8h5ahʵl1J\=ռ4,ACBKz6ϡUhrV)zcAZx̮3G6_Ṅߠޅ9'cbO "6e],״!g]9|;2$7hY[5IO>wєA/NEg3,GCT|R*%lí ~ÿl65GXvE +|gs0IU2G7]n!~+fI$i4wUķTҹ-]I!ې+;':01@EYhp1w5Լ^H=CE ̴nž(^n3WMD5U}i\GU9zT4Ĺedd)j 5&UV4Zn~po)޷~&) <̧fVlLi+b; -oH! 30 ,ODMo.ioi,\j m,ˉFW5Ҋ̦ct|A>-߭]w:ve- ?%,YгEQ,'Nw[Tw߮YgsmY*O%X-kH~6$'kyA"O qc(ͅ;1BӻKl9D!wڭȚl̳iU,=E/yj,.),lĐ}e[h~ITaGIVF vfiZB:Ǣעy${**?C4 풦~ߨdAoБGs4b ؝@c59NwTQdOVs?:Ч !)@a$b[ߝ%g[` " pŠQ]u1v^/Լveg z0%F[HV mG| l dLY9Ok&BA 5>Ț4 >֧4_QA`YKrLI R G3RA~īClKmJK3A @m̊Cd:sE>< = /!!)8˔Ec4M|BFg{ (\3-|.`5 8- LyL!d>F?y0u&ާ zk|D)hytZR$j& AfWz"eb- 0b3Ob}͌tY;#×;)Q|)l!:x<._' $0H7kWo ^n6 癗wAX!V;GZ("OKX2B?@TSJ䉰PDxbK7ƀM}ToI7Q6z$IW,D~0ǿ<;"5ċaP|{y+ n?G BF ]ʴn-}^ڛn,%d;ϔOFsv&>H:KK+׫rL8.W 3඙qfmMl+ !u28$K[SV~iY&S{x)(VO?4bkvۿk;=Kb!pyuJ F9ZRƮ[MoRAG7[$,-\W#\|xU3}>tn1]/Lٹg dsэ%-1"}Aq8yǶ}) O 4aڢ]ŧZ7 Zx~h>P/Y)VzC /3JIzGu/ѕW\b/WB>g\5$:}j|64sͭib_aCFηM! 3`J~u2ӗ-iku-Y+v,{-N530.Z 1TiU9JPyeNA<:;x'v _ ǠqFeŶ۲y8ɗ?W>VY_mQiHv0JG4y4n%=> n_  $H^ŭlW o2;=\X+J;)O(n;hsĽ9Ӄ]|li\|۟Ъ#6#C 8 lzGw4,I]ܰGKύ[xt=W I Ƅ@LoڣXOuɞO/1ؽ/=jhM's%% @k9f0,皁I]Y+HQgL< h!A֋ᯭxf[p=7,ېZ GO1 O"%xWު8|ʀx r*v#*mo6_#\G9Or ))ks .~[Sר l=F35K6M8 ) ʊ%#^C^]/.`ki_wr+[ԘŊNv#l IiT e#["4M WifX&[!w̓ƨxmK]wY_v`8B BlG u4]np}םכ6ơX䖕>|1+D&-C)^fE Pׇީ)TÀyM7>FHBvb`Eˊ8 AIIXh8aV= u^sph$=۽7p uNǧQoug0E/Q.(w%71osZFTh+"!#pdD mW/Ƃ`oFtYq]NR6 z?]xYMm]Aʁ 6sڲȀܙ彩SJh!^njO^}Af.db|t8ŤliO.< (bdY)}TS-t(5^r}vUq/HM+l[ }:ab.(5Pӓѷci,~IrK244˪LwJ:uئ.guڂ/gЕrBpa@Lg>٠t"l,PpzVd lJ'p .v# 8٫indʂ#(Drʐ=U<+S%qR9KޯryS8u͟wi^n3uݑT;qR]͆|eY~9$5x<}=f\;%S5LL';_dPfg|1&^,ƨYѣq݃跥-_D5NSλʬwzqRط1qņCBy*h`<5ٲh$:+ (mshXcOet>.m$Q}Jٰҵ3vSnPCu⭲? 7 S45a^RJ\,A˿rS{,X痵RzWw  8]f6Z[z=3ǖJҋKȺ׆Mrfca~] 2(%`NӍG6Eff8 lƵAJt'Cj1"].5&\B[BD| Aq7ӌ1H@W kJW W%G*upy3;́q@Ɵz !wHo@RZA?֟h" KJ6﬋tT"}U>#.¯v6`g EړSdOCO j[ 07RzS6\ps4lt5CtzWVKz`X=6/Xe𤽍)$_J5[򿰛*52ݳCd汯4"]=l R44vY p~2(9h3sӳ(@Ab]^Mk m\v1"_ c{||mȐʂ!)KWD̑T2N6DZ_ޱ/LIH{a7Eu90 KEOLF.<>:+b\V m{\ĕ?z#lư䩗 A6G-J >LtFb\3&ϲ< @pywچYTw'RzcMJ ॉܟEr+5BHFv;03 FXRih?\m:I].g$D 5J{ CJi% -=IR-t4S) v{B]~|O0G : HnQ+V7(ڑS}~1 ݯ!_D2 \9G(?IMb aK~m䉇=`oA1_BL4F攍&bHA b-Iqkl8ODY|u'_+.8}Gg&o[)Y5pphm/7C' txCZn\o(Z4~9a_P= /o5±: q@}`@Ktw`)+'(c13IXj8M1Y@pW`oP-vq U +&y l@㣠 gzejYEr#hȧ!=(j 2S.Hh`uf6ܖdE \SXh?}Υ탨6ˊNe ^qP:;EFX>wkIB 3 b;֌iE\:96q;j-=z7L|a-KACU`rlUW| 4vZm¨5G'w^:1mJB7@QaFJaZq&X.ȉ cؔp#P!zQk*ІQ/3 5+g17uH~\t E-Q_^,YbGJ@$C۵c]"6Xb߽9o/}. gJ~2J>Lna@!KUq"ʸyү zқr~Zl 3!ţ 7![Mrzv&&[OA0`24 Lɗ#tRN I!=hbh5k ɦp x۟`{,M%%1L3Z2bЍnjE3ؠư,v µل*96袔p9 PHȕ_[*x(s.["M2BHYOyŋ4vJ8Q`%]lܜ6>\`(TǷ Z0aq&z -2 BT Sa tXClGR­@Q r8<f.0 QQCawp ϝED;8zm` |e)􊠘5yv`SW%Wш~lϬBjҦ'ׄ"eUYX1ύx*5Vp\=fםFT-rz/6eҤhC!N{ykƶM>q H06zTbEs*f-҉277n`w:a(Ԃb||B9ysԪd"2W?F3:sXuvņ_.|E Av7>W D\6:J)0;3xX&1ӠNXtesI#T=נnw˓q$ dQ~N)3`V_( LSe­Zi͓2-FZ8эr0`P+u`_RE ڵ{2D8V( nz:YvM5ʾPoS!#EhoD[# E!ڮ>bsԊ][b&R;[NJ ɄzhRZIZBCS3g'ӱSG6,wbߊ/{mnu5gVHK)-SQ WO[ %B@}d0n[N&}T#j`_9 FwlG#w! d/r3t_H2Y UL[KkO] M#RT;`2խ[ $NLHJ]^U4ʿR *)Ww69G\9n] vX0v'DArӇ}O`&XG8'9.Y; zYd̂H;dy)5sʌXS ?s[<|Ś_]xV423؛i.Ve[)5v9U⪕"%>gf-k|HArL][rsL.тQN30Zνm|?(v}cgزԀqKx#}1OEo?!QIKւ+yC}+=G LdzX. o$f-R:ۣ<n<9af ו~b y ¨]l_-*Wf"11 rV"AR݃(є_U#g+QL6:4ju vJ7-^m~E}=;{])v3n 7 $qz8^6G- +tI+y8/u@WrH[z!F>O ݼvKn>fSP u dO3%AYVAbvff%D4,$Oe;q]"żϞk.[ʤ_|h@Vxaٸ B._d߄ȯ7w>oO'sD $F% zp!cupO qŦho owK. "T R%߳VZ ŠaaC(,gـR) =)Vv]&b87[/0@c k~ , ОU-uZ6VjV<83KEQ3ĠJ9B/`[),;NxHo.UU#2@}eC-ʾR(n\Ёvo_XVaKѹ]2`ۧkL e%z`%NdzH yPWfHE5"LȄXԕx1nzd$K<.SAhr&qɆB+}0h #lICꍷѰ}ciꮍ`3_gL4Q47-jo}Nu:;d)3cL(dEc*'#~!m/ q!_G6rv4"!`c 1)u`kVB#?r\Cp f pLijJ;ܹ{yP0+}(b{JAՓK"yWqE 9e_Q7lfc}Rz<ש~3ߌ}t0tV_ dvx cn*8G)wБuVqQro.7Eo#F0ﮬw .ơٸ::0./&9 8v ߜ6iLGϺo_ QjIF5Pe|-K'Jzeu$‚ajh=}#-FO 8l%T'p(y;3̏^BY!X"FGxq(~! 4 6s ^Pپ,U0VbN4 CB~v(:-u[\9ݝVº5yN0nP͚VX`)ì ++ix!8lܖJGؘaGH`cZG$qfХI>mbEk=hzrO[ġCh7ԤFv;T7藪V(1}5|Ģp 眶84ݺ\w#ӏ)oaMU (7Q 1X?>AH^!kٺ-)"^e{Gϣl}8)*ƥ# u_!OmG_Pńwmv<h@èYR=o;Bg /~$ah^щG:e8ܸ'Z(Js5-8#G 6,ٺ [65y]n[& ܉>ޣsC_ E9U 9%;Z3|лL=2m! NYe֫,K&];WWjYo )]]w }ax`eUA #ғ5/RJoNNNQsxfg>vv:z! FSL3>J&jqYYR<qѬL)[ng85,tR==:z׊0~zj:TՠON,U&9Vi8ĽlTG;4Ͽl2ЕzѪ/7Ո#O-&\!K#l7*+7w ϵ.8l Ӛ&%\Wuo5\{\Wn@ziCLܕ } _6jw2Lψ1A)ȕfij 5ʳ)DG>rL$o؏ơȂ1qƊwk40a3xRG?Ϟ=9l^8r;P!ƵjJ UvY5Ip=B=z)|RD% 7yu J؀.Y͏@jx\3ziYtR ź(RŮRwٯЀjH؅TxCHSTR|V?(e=9CɪC*w˃QN y B 9sHDgq$afq|Kx"*ĺAb8.|:Vs~~OI_*@ܣ29hyZвY LFF f6u w(2=ϤK8vg>ҙcb*s%LPbTlgA?WW[$~Kru >״~4(pD?팩(5uI˜'nз'yOӻ,/,py2 m jO_E #rXM i|*|LeGG7;X_"s?*VPMvufJO |2a:Z_k.$sTtAa#X`yq1^V@gſkΔ OY@Ayd>g׀l%'{tDe*/NX3]f6͘ie.67~8ӱoߘ_y 9%@^faiDps5!J' vDy*l9ttCfjĶ:}RPlY"l.| I,9 qUtgeEm4;>V"eW0[|GJrVozSS\cMoS$2=~P^ Yknqvb=Kz0yZ2BXۑJ 47ܙ[-؋TD}3@It(oƂ+\o1)&ڡܺYP9p' K'$8@5NBC)s'ׯqDC!(ŜX.tZKQQߘɡjѫk;&FDHڣǿű+A<[wWhah#u,TWXu0&1cqԒ9'T"QGtqLn%U`{.*k:ԣ*x<̃ 2f;Ʋ $X< ? 8)Hŏ؉)}6ťJy7oAxcm66v w_mS5Ltಢ%MHEJ4[ԿBʝMYmfju@?.KZV%{c!,na]A%X4-,?M~Yo׻4W>#K 'LX#v_ihL-p6|'6"x|錹rŲE[YenB &4OAVTc;Ҧt#ح ֕Ǻ't96D7Ĺ &ApćռD7a9^TiʹŶZĽGWnLU%%zz 57#k;TuPWH ;JԞ6nI2\*ȶ.Y W6.*f' ]12W;NHS!ZfA ARk8?s͕ ˤP帷ɀ jOt-$jenI@|W1Xxo4FsmGsBC<6M4`0cMn %#[!3% '( /}^Ϙ`o h1U|9~[Rp ,w!Gh44Jqfχ* DO9F "Vޯmo]lH y{~~+pf67ccүa  -=~*~gNn5_ #9}# 8! x`| 31-3i!' ]X;BMg jʮ9 {J}wJDW)6oZM>`:c\5vP28ktgox-q߅5 ܪhJOcK:hde[ EL뎍jf! TgD6"7~Xi΂}A%xa{N5R˪xhTܸ_59kZ !K`7p bC*@Mi˹tS@ U=逍+< .y0jwiUyEdzʟ..ƶE_1p'{ iDhm8۱V+%dv<,]$Ib`GS8/ʚ'`Uo2||FI>-lX3״Z<?3Ijߌ;@ ='@2i"1s@9|A!d<"E'.+0^6RשQmiP5RL:Z7 olSE:T"O#[_4 ͘ HY<{>5ɈA*FP3MhWeoRdTdBב_>dVw *)]RL<քuzVYZSR6Ut$]KꉦsYLeYEh 8 6Rh2)[Aֲ)M0mgHȤ@qJ@6IY*.53%U Uv+d$E)D/V@' ME.-$mR4qDL&uJS@ .mrI 2|dC"W<(OWg$y}ډ:>.>]L~K$_A}{Q&Hq?;0Mek*"2CtuA{kULj@\tNHꆥI ղzϞW"r?{8A0y<:F@z;%bMUv :B o2iǒO1,9D c}_iI$kD l8l/jVjG7kVZv̇8Ѕ^C;E暂aїat"?41.b9@7&]_pWTu:ۊ%\YW|u%0A)>my?Zg "2Rggg))ַ*Uif֑/` 1s3Rv {,qJWX7mV9^Q;'X]hwLB+mPeRb$ۨ1/9*lA9a WQT$4_Omg=y/90hOBzZ8ŠDΫZ* K=7YBEݨZm^*>Wە9[ K(E d( pKӃjx";LD:/CehxL^ر@nO:BCS߼n;h*kYe#/$f=lEB> g<dbJ_? 2QdPoTf_ܹr-;j (e4ZP'? ̀ nyv[_qWWYP@CPZ] j+'wFz%G;%_byp 9>ĀJ߾iCռ4hY7chIK,9Uy `;ս?al8S;a8heF ~ ŁX} r4 #}fMйΛd{}kx vX*R[vxqE .&Kq {{Onڣ:Cbt6gEde;+N!zռ|y %$Bӣz3+W:qݥlUain4 ~Ƙ<ʼn!x?}Vv(N?6Mm(ih}~K!)/<`}C%dNxZa'5B95k]?T?uu:i o-`_>hXOj 9&pynAKV?5݅XVw~ݤ[7֍r:gh'S>сh/4΢%[ѥX.]zvK/ +Z=) DRiSZpa+41EY}Jzsg ;GNJ 1بP*2y+.@yh6vAh!lĈhއаQ1l(Rt\HJ#uR / 鈅S*3i?Kt]gF͎ \߼ҟ-V-Yn!x 0q hlt>GRKKؠs( A*}lvBq$,zw& rb3~?$98kDgQU0Þ lF\%Ui*+ZodTI9ГbeV>C!{'n/6/h5-KX[B95q4xd_-Ul >2X8UU^LilZW}_9OgQ}H]<?:AŕMu#ǜ%$bH"'!6N<دTum2O&D<(Z/ [_Xԧ"ǒ-+15.W6Wvv,N5ǑG=,b]8d\F:𳪽,m\YԷi%&p)`6n#qۍiqw/~DlvGx z|Z>"#`: KkqSjœ8B[BdtO:xZ$jv6wU!4("6c&MS/'}K[[tfIGݡXնH }T^dә( |9whV-r 2~zA3dwafV5S_&zyI.!,b^cg)9ջA%)-ds5 p(Bc.WKɛa \-!S<bL=JR=x$D@z3 ߧ/i[r歰nvUBnD-3E6 sB<«FqwõD~n 25|u]P"2EGCS}_7o,hgm.O4i:ɽ܎U;1hZ& Tq/2_Zd7ǰf!)8K2+O>9 5i'v9 ._I^M.mu,K[3}$aF& ! sc ™k4լ4GûQ>Ưdus^NRbdZ3vB}|jvGdX Ry5d3tfq{Iu4OA]$_Hv2#/{UM.} N6]G{tm}+?ƯM AnH*Kϱce?]떭!~U@T.Z%\ |tj7 0i %s)XDwPp}!|'- _Dᨊ~{mX@|o/( UX ?2ȷ kĦv-Eo-FGΕ BulNi&|--36o t3uFV,/8P{(rJ[xL(D[V1I0nqgp&e9ߣ6-VԮHFz]Nt0*"`+In _y#}3Ǭ51HIz:NBJJW+`r|H*h P8.6 DC Z+ng_f2Ţ ,7tO޸dZO_0(l0 3Ljl-TGؗT(\ȩ4\'S||8 4.fV!U䰶x0Gek=Eyb5}3 .O:41\Ru)t7OGQj*'|;? HC\zӑsF͝"a5KW~Ɲbn`⡵5oXEHg?Ns5;˳aC-&|Z]jA(l5W̮dFζ&,0$ԑ*LsYe%}1#m,FZ+VqC> tя^y"+SlsY~ۍ rcqx A{L^lGbU>y=9WnLfywÕH(߷d"G;[%#x墊\4wI49X[@'ۻ"n$bnH&S^x7FEϕn}1ltJa%p^R\ @& xZ<9]Rsա~Zx>x tRaϩoɥK~[a{ }gQUErcoTLTŻgk'NTW0ZfiWhoӮ$hwΔ-,&u1'Qݍ)VR,\%țL[_Ax4kYV{OLDTl`L 9"t%Gn;72t9Q G\}ocSe@NXCF>p"K!MZA:?l_wh"r n B`ľ=lq/l0Q'Bbl=72z*=\,AD;SG)OHp^}^_ EZaY{X.ZعF)iEMV;4/>qbռ!g =#\xK}QU7bvX6B NESe\<>jQ4#e^-ĿJͳ[$Dc ڟ+̤̙qDۮ\Es!RQMast¤P!`#E]:dɴ;9ĖUԠ?K#e%J7hJT}>s9^5|yaA%r3 UTD| Zy_ECbrH%l,YZ0R$(K<\-sg͟=Vn|~3<ɝ^lgخCu e){<€3:\cOp--SRth\:JfkÇIb>ZռT6OF'8t@.F* d),~+t g1貫>8RpW-,oکމD޳1W|!ӵ/ag9 usS][\s}F5{Sp/!,,"U4j7QYM`E[;NxfmL8 `F'(*G.xQn.S|#! nU{x0rCs EcQB/3ox/.^iF˕KH%25b5557.34LiӺxBdBL|1MJO0V;P+D YC5鳓rӴ*e͞WqW1m'^ >x<dw m?D:ǻK٬՝z+MXSF %^եiʳ|woҀ*)nyӞ-)4 _&$!ȔҞb!\ȣdFS ْ-Rz#}eG(i{!8t3ƴ|ar;J?Q`Lz,qYZ tq܋+T'o/(і4Ti4ѭҝ CEklP,UѥWXeN! K]Ϩ"9r_*w #|9bDF/'$ܞYU xv fׄ]^kϖ{)J(} UkBp$gNJ엞ִ7 -{eO'BVoeτ) [X%Τ /}b-%puiދ(Uh*5.k`囩TCAZ7$`<؈S|b|{L > 1s&߁^N&s>`ajA|,՗M}ޠqJp(Z@L^ZUoģEհAXe|tV0Ͱ鐙/P&g`7ZP\]p*6 _-R,mIkWZ/(xcB_[35Vdv *sD"Dof=߻;Vuim:OgdwqnY5hus!B'R#+н=ܨ |zg&֍Mi5r,Hpִ !pLKtVG[˔P,^Oғ,X#IIQa4V0dNd3*"ӛ |!Яg^PU+E>yt%ɋww,8@ >)Qx6$xG/zfDQ=iIԯ-.I-I-A?H#-׭}Cz_w}@`yüKS> #l1xyN 2.ʄ"ҏ'zje.dg̪̕!E xd֟e.'Er s2F`ޠ"l(Ps@`[88pˑ֚P^ewV58>%5.-?p懶i&[mIO ʝdo$-n>[Hw7~38oU1)>6FGO`  :5a7*1f&{Aas]`L7&d#*Uy9ػ1 ,Yu.p;oCnaOjQh&1;dsuΉi='٦moʭ! ͙gBZHg_  Cé;23|vLqF` ɺD!WldKN Q֧,)xD8 d:圲9ׄw4ߘTݬ+&=Ghy^ 0jm{Xcϟҳ@V?h\gʽٔ]_ v/lA!B2⾌~Va1zU ]pFF|i^? j+ n"Q󴽏L )ٸQTc?Y]v3S{Z`zppYrTbK:|bPwrj6J`Uͦ*e+>3 2S/z|h\饜St?S7"}WkyhWr#vPprWh+J}?s]CǙFE+z9^ #TW, #F%BdzɈҊW/Db,pm-ّwȐ6tι~"+9W);x:{\b?t ޺5Kuw(\;N39XM;oi!a͔S͚}`#"8ψT G+CI/*⭹VGof;7 @lo%?BkxTXMrq## "pru6S F>E7u LòfN~3 '')BxՖ,ܻaY2Ynm<ђWKe4y"N]!wz`k>:;CwpD?/:j}&1*lo..o?FfVˁw{Bz;_'ץ~ua0F36Ȓmye3Wh_yD$N8Pz7SSAv5/`;gNU<[3xĝ75O? ԆѝmeQZ u؊qOpv <3Pܓ0 #/s\);S_n8%`7l6_982U|{sRgѵW:~߹r;#~ǻw7$r<+ߔsgY؅,^mv[oȡ6Wٰ;Z)[(F~2 h@K'u)'$bIA5i7? );IF wdq LSAϒ\s0O%Rz@ #.#xo:/2޾ JEk<1( IAH5|DǨ##OLW?yp{<YgIѯ>f4#oIHj%V ԀiV xAޥm {u)a?]f>+pù4t]f9Axl>bysȘQP@*|(Y톦 6~CQE*Z0IE+xvbi@B]Y3somb}&!#<k7v E:7MaZɖ J^Nb.zWįQeSʉZ>H{ypqiir!-,5`TeR-[&xVu&}IandZ}J^1Pd6c]!r5)cқ E;$+ԝ >9O$)OּA/Kɢs?:"8.[- |ݨ(N'M-:R㲙88jXШ~E %}0BO '?Ƨ`lŭ4J%Ԟ-I+霈Lm*0` )z. $0\(|_ Э]tXQؠ}$bi oue+RntÏ}bf-WxNkoJgZlf PJ% *$cO-DaLn{\7%T&C wpD*RE)Z&-H&O7+"y-Dx|;.ߛC}I_ݫFVnJ)%7=;Y$T27^vs#9XI|]̅N4إ:͎WFU 2[Gk~۠TʈXڿd!4OGxŘ00"i @A'AX5=p1{ZU9rbvip/g#v+=} ! J\&;2#+^ȭq q24r fimRO`IYW3,0 ]M,řѝxF?Zd$^τR^j"ւ&5*}q;֮UV4prr}m3l,zpmk Ha u٦K ES珶n6̵m$S)+ #3-F4涆 K";#,UpdDE/o\‡Y Q @~.r4W*7*n|ڐn᪗/rH#fNbrt_zul-fyh6qk+ͫ–(w0/I cVDg(/V"_[im=ĭ8ɐ7[eJo9D 7y?+loy0^U W"fwա/L >Սc2&M§S:55xT@'bCmԩp] 8_.58Ւ5 ;sYrYkpdADP֦;K$Ӓ $Q'fP'\¾UQsȵܛ?J|y*E)pcBj/b)oM]A8@5V -bOwDhg`z~z9FK~ty6&@=$Cܙob҈zW"1˞!{6c뛬GG NzplV<Oz߮U?t%^sooa\!?*fOu$x⡗T[WxI ΛxI[F >"2 B@Wwej/A+9) |$ňPJӷ7E<־Ap󩞿}ţwuF+ҏ)ԥsD*: ic}->պ x )OPS(>`FDg#)]ybb~jTa &|ӂTy:x2nYHd;*AfJ{61pN-(4K37}Xy+>P hGRU23$s4P5!s.60aʹ6)tPZs=V|-{tO wZ>qrvY^sJPnE;ƼG CD0RAY&;OS-s1)߬%ҋLx<S[0&vuUm>T|&HXiH&{RUrN =tha؛ؐ}q_ʇdmL2@ #v0ǩ !㒧 w Mq*e ՠ;򯾳/ |b-r340Yz4oh卡  v=z!sI?8 1VajtV=I88!*= 9w-ʴ:i dQdZCq쮒R'29ɥH;P$ͤ}g>of(~)I;m|,s`1ԉ<8M"zq"NwǛ#2㰘 5 [9Ox)%+*O^PljS:+kll溫W /|c ;Ë)3S>`GԢo4t8B/W<Pg 5la!09"5S(MOme%g)pbk6^4T[uoUH촤Wki uQ@'pP(B ,ld]]hRO4rHC^jBUn,/QNg>$Fe!N wnalkyQ=wULXb3G-f#VCqLK 3ČKz\Ͷc&sVwk7JxX/xoV%x݄XPP/)=_QM;=M?ؑv,Y!lZ,(ӓ$lyߊ0(‰a 洐1R Ɯ [WR׃-K۶4{w t1U)Qڢ^\Z/[y# 9L1FhMYj}\)j9_&u=)|SO;QY{K [4wb>lUR`Ih7BSi=HwR4?*I\hApՆTi9_å*Mu5wTU!D*C`Ԅᑸ(SY=(yLyͨգo៥@Gmc u@%o5vN/ \P,@yã(ڭSu06hkYҹUx~tܖq@yH_. ˦\>)HĖm.|` qMvQi5={2.z]vi*u̞NlaDmi"SȳYw{?Ok~Ew!y"qR4*dsgFҤq ?K6gc]"xp>P]Ɵd V`oǀE}s s afILl.HM Enl]iDp72euᘚߕ'{YAc W`Ͻ.9BJ썻H'C Ӏ~xd?q(yl6*l>}}v3NNUڅ87T<)ʯʐPLjjWQv"Q0-R˚)[*] } k*̓p [f+S}Z)&&L]Tb6:t<C!Ġ}Z'v#6?xKផaԉ0Of*/ncUzBNaTc"{oP+DA}1M\^aqԒyx 0ƃD{ Ir[峥8\ۗg&!G3r8  $LkߗMۙd]Y@>bߴ܅f"^ߠY\ayp>Hׂ)]sތ8Ɨ`@{ htQk_yuMRl@E~W ͅ`B` Y8'vkvgx~ y gTw\]=}{TZG!û 2+g qΔCՍrhr* ӣt)Q#ɮajJmL6R.il#pz18ju!/c;nF)AY_=@B>s-~>aLco`Kr|+n0HR"1$k4HSDHx VD~mv@bEAһᆡRmA?e@L+Ys&v=W_3e9m0\8\;Gu\jA٧&ZyY6i=;lW"Ieһ+XVft#k!mRǯ#P)yR,Yfe찅n",Fx55NfB`ޫ \ҟDO0KO*ߌQx1 [MI&\ !\xöY{=v\z8ļQ%:ynaxNl*&&lԋ.hE$?S iR%&φpTt7fդb`B)evC(#0:Dk9",]*>`d*%uTD:c]Ks+_hL{=b]AzO1/p m*uE:ߏJ6gCk>y49O½9 'tw*yiQv] ǂ5Wun)F]NkD ee H<Ó)٣bpSdD ~FL2h+ʳ Őn`){֧&,`$k"`-Fe?\}J'vB=0'ɷ6#fOrKKS˘eaΊFH7j0 6qZX#\^<8qh?D3Swqأ&}\I `ZnSOθ{joMՄ)WR_!Wg reJ,@rf"gjXkkɒ:B1m`WX?1٠.~ciߨ'e$T|uZV&= Mq-CB7*Ha8\}DǺjըS(CsZppN'IЏ@Izmn^LٙU0{~B9ap+ӂ1`z+w4 @m!K v{wfEKe!Gر^p%{k0`fh8ABԴMknU!Z(JAYP«mx%T1IDyBPc c~G;tCyvOf"gSjȻQW0ۡ16>Aï+ݒrUPo[ǾZ*0-BWs'Ta=R=j՘85jWbh']c~pOd~RTP`Q׺|OR]-X7惮-6 Oܓꐀ?ZV4Jv'kJyU0+r.MaQ^ jEߪ7xmUf8jԟJLpDckJ$m&uۦ!˛[ٟ\[~xQ3j|Z&% vLq/pĴo Q*0! $)S"Çp?ͮkk>zBtw(Ga-8+N, Ys'}w?M}e4|SG`l-R%LV&<m/|,e7K4Aazʇ*`_hsR3eqkԽ/MY,y Z#6U(s\/&`ƫCWȷInQՊw۴OJ9k9&R2uZH:ϴMdZ$%1Q14q&怡)l`: ;`2;PZ=$K➴2Z9}07_-Ǯe*'JӜ8B̃7}VVAXTSd |JեJAYrV{Zٚ;vY|Yk ϼnKC\zl @[{;z] Aln/N@0Ur@mW<ϡ}Q}4K:%L/|4E&Bi⤰a4';1eXb쉒lJ2ؔxyU`@J̪$vgJqa,JްGLDN ># E'dCruS+'"EKNĐO4Zfr6JzӋr(8XA]BpN[Adޚd s?`](wa)ijI;-K_N}m5ڑ5$p`h% ~wPљq:*'2O(,4X$%lD`'o9.5[}3o L@ͯ(j؜mUdQLLK678utZ^[GnGB#.9Ѱ\#% +%+ \j?u\vJߊOca SGuܑJ#IKŸ N-?aL?^3ٶ˻L- `qBQŅ8Ɔ\p1"EgC<1ꩣvm|[C5ݾ'&~ )-Vw9vcqL_iT%{c\^Y k'{:.y;?ϷQ0:tC4`'nE8bP1ǃn=p/:4&Q/fb 0w#EwaTq/^ k&~Q74Yץx*.hq6]\V)C*\ΐp2YtbeG'MP> Yii15YAŀ% {.Շ3-r#G-$@6ok+[I8䧿bbL*"ư1ݯ"Գ~=' 7I'U7}rx̉4<+Rp\CXV8oW9 m:qq5TX( tjPEbemYZuJqgO9>"xtxD(W} &%[CKNYs{99 1N-,)ӡ;IޜphR'Natez%:|^;Maqi~$@Mb9Z&TVbnBVcE"J+$ YDzhH9\-y'Q<f_*sXW:X R \zD%%/?vͺ*T#-/0#UgWv2Z{_Ǡulϗ(f|~У} cqC|-^*',pWec͊eyt5'?ZoElq<+/񩮬M98kMJ҄ECm0{u1rOXqL{GS &ӽLz FjJ): DBw͌q!l#-^XKTď읩Qy(AϾ me\V]2oZC7s#hH+ 2RΛp i*4ͤlb?9 qS\j2w dg M-=qP+VU+_h|@`O\ ۻ rۓDžyS 7]՛;2d%>`^1ETƸaF# IsZ p=j՟\" ̐%*/$L>9 -"忰}dcRp3ʒāP]bU{[I]g[j~QVhcEܨa,-)SXr?ӓX`9LY"+:ah-9}sg)$?1dyN!62.۶ч)g5dwf7LK2MbbQ[iGWJGGĖ*jN[ D(TMB4:RFsJ>-IchJ :dhy?$,'c=;VTcCy,qsbN9BWµS@/X'/bWS](_I-Vרf'~#hH8P7o 4G۱)7I~d*8ddJB>ybZbBM=Њ1|ϫNY (ꇈڲxK Zx Հy;U{B2B*v bDwr!WQF7=AtKtvl$$^  y p> %;`1`8?ٶ?{ZÅ Q+[/1Ò8o"@b].@5{2Lm}`}s^_GoPl6+{i{cRVSNяx]Z1@Pr=+\a;0jVnߏK01Y X 'fv7b ]Gz}h&hOGj<4I3FFV(P*ķ?x?mw5~e;n[|%^q럵bo۰EA5]lșuDl5IuSjU+&e#5Fjhq"{Ӻmƴ!ΪnK拚!zK[ePA+g5;Ԗs+EԽ"M*-gƅ |1ej5C' qJߍoG:ύ3&> cQU2NT@wfs6̊&%XڼnS_Vv 6^ٜ> ?1^ޒ?wbwz'[10<[ھO ո&Ǿk~:I+S'# 뽏@?)a(N8KzPn erAz9zh fͥ"Q-PB!ʇ=_o)& Ű1݊ʠr>tG׫KMOzωl}l_FZBwhOxxPJѽŪ wO$-B>ƒqVJuyo96&*9e(eifmDu%#ZArFDH' (h?VYJ2XL7cQc(VZo,ݝq8^L u)Wl!6*xBߟ<ѹ(೥'ˡIEqHy3؋Yns֙,: w1Is7p:yj0Vl7ePڜ_rV:*S@>1_QYP\l %ZT,Hs{qIo) Cx@ż<|?XxF8d8zK ߘN9 E !I9$IN Ke\%[FLt =|%.bgIŕRcfHnF:7:=*KP[Oy=a)r(5hQJ5Vo!f$n3.FƁ_m]Л)!ܴ#ƳpNp^/'a0xDэz^8utvj Y]] !i pj8L^3h>fK6veXށtkGHiAjn63̾rZPC/O9lO`6o EHa#vdmvǶ&EKoØBDy5EC(3FCfQ!ZV LD3YZ!RV!|x˰l%0q ឝRr;^zNϿIkW>ohPe]1;(VFd"---] ?7p\QoV9 DW%I K7ȑO5B'oV_ZhK"v4"]|, .߬ 32\F5M=ƖP9x0C~LJp= S>:@cw gnoKسk^?$dHĉRjE /JZ:o=]5p&g~8FjENXԟ#\7VG 4ͲIۊa. y}Մ 'n_#|OY]6?m&RL^~US?c놟B{U{%Wqg씑U B:񵋱c.x˅a8hzəc6YQpMe-c+8&Mi/cF|1}gRоQx,rÀEP.s[B#Ei6철z\BlkjoۗC+v>SKQ1ϓq*cװW蓥F]S]?]V}$aЪk7B xc'[IAHI ^RFf_;'T6}>'߿I WPf%1; Aw>?٧CU\z>**7 bP~ 6%eꆊf"y1@+Q|ё/]6Vkn jߞO ߱vjh^K;㑲gj4Kg9<P#pM&ZGw/iG7$ BSdfr'2ԦylSFj4`S;=pZ /*}Ċ$\&Ι5ѽJ I583RQT"iTO+I-n?Wn"7}`-e{;3Q}7ZLfk}s" KX]T t6'Ly)bWIkr. uL`bZ@ɘwRا6 \2cQ{tI:iT_={N"7~|TĿfoI26Js6%3^[&ăZHze3;ѴOa63Xg _h|àh~4*1QQ 70hE-vqhm~̏;=+BC4YR9&Q,\>?xEYiv/'U^_uc_^;&UpXj|\MO(uܸud<"{c%g|4i ~MZZuMW?';ϻ vэy%%VC=1'WŻ.)tZjUriO(_&MNƨy!p x+o@kJ6=P{-td-5p' n7ϧvw}ZyA_g>xqpAgl]6h_,wRSߣׇg9kJ=^ r]7XH\_t; R(d"|- ftǒU8'brcA}O/΢@9T° ՎntM0OFB߸{¹͒#U<32i-\u_O]90f05G+e 煔Lzv; !<,꛲O-Z7$ , up w)k$/"FZ 3;=BQBpE,fhOި[X2UCG1H:٨/ҧ!a>x e+sPOތc$0ُO:1ǐ ,{J$ l. 3 W/6`t@e\: '~= /CNln^W$g~g_Ul}Ozէ5¡nyv?d=r̄l*ڑ&ͶQAozZO2h MTR h34|s|<zE<\RX C.N%-L ejdְKl/P{{|~{Mv%&G} `쩷WT^wWl+K_u{d@bU7= H6Y,)GMGe; S5lYo, ;Q@ix$y0^xQ!h M G_/w~s=8f|S"nN v1sG؜xA{hyQ -3]c)QбTZad{9r nFd ~VP@+ޱ%랐(h x6c@d˿v߿wjE"/.Z XϚB#ۍLגT嵶+2p__byֱ-py+7t*eRT+ _sԭaK4)_3ҊǼtE(K.m]}Vjwa `Q*3e HB&_ܴڈy,[v3Gq-}7=7YBQh5i&u]]PKݦd΁V7fe@^L|)^|mU 8wZQ.1y}hcXCIKLdm ,,BѩL}+殥}ʕ5h̠c_so"d3+w2LqGņ]fBQ>.Mj,.dC} ZBW[z IoF[%bL'jP'Z`PбI)GdX1\_Gܺ::OY8wW\T j=].5{4. >^T0$^M {$KT,ZPgrð%/qcN߮wSg=FLOAvubh-44@IT>W u#Z! ~įj:] ǾgT t/ZE=IdwsR]FZMZ,!*{#NG'++qk|m{ P[K5ii) @U69ìF0.f5r 2M/&|!B:2_O:1Ksq"aMhܩɣc'Yee$'a6i5~~1NPjug2YA0;5{!N"BZd]3UbSRl~|\n#DA٧{k[P w :Zi?p4\rŢr&z>h ;_xbO&`ҧ0s m7{K8!X={4Zeq};O01@ +u+B/"}`w/t|i}hF4{$zߗsDNG.&ll``3ڋ<1'vr #xz{h?Xѯqj"䜛6gйe}Ǡ%DDO3»+R6y+ITI<@: ].Ÿ U!73 acϬJrBC.ܢ<.Lb¡u՜ʦߦ".|x"v8c)1cб0< (]̵]xu3EƦ$Ap%^p"A g)f¨Ԣ9u:Ë}4Y |yf$[ wJwv;E>?.y֗C)4Yr %8ؕٙބB/`7E+d4Wpdŝ$ivw3 pd-޽H._T9 \5DzHtٝ\ o_7j[(1p` jci g>>By,idEl@z ,b{B=±X!`${2 eSpgk?@"->^o-3+S$DMm |?)|^I­|SA7EG {z,s#5.{ݖ}Yrߚ*V`-6T\߇$##Z,;ɷqqO:q#[dxt0s>k)ַ>H7+6 =v<`9P6~C{HH J!}.&WǛ8ο ٱ._IA]n *_f_btT7Ġ<,t]Kw:PJ=X+ĉt⬜S,ڷO~Që W`]7H '(+)=X ̓S,n%Q-!CזoF I#L4ƊR9A:]{(7hYtĬBL"XEb8V8GoKI?R?g9K]FIL ܩpxNΫu &EBd6[usUcc3ARW2=ͣ::ʤ2 j;R&!,t@K^Eo] ނ@=q ` OQ֖(+=GVEܒQWmD !ҡhyr*uz+,iۛʖ׌|I1T<莰!i*rZ*}hyYQ-WUx][<Uj<,VmYD_`̈́-!I*dtszy3F].hbnp㍎<$gIz/S'>_3 WN"?^DYZ HT#;bµӮ*'wOߠW]e 4YR%cwz2%d6d`*"X⪸ANpb| 64DY@H W_ usPc &J>T|)H1z Ozjq7Eoc#ml?*,3`B|\A8)4Xp{G3WOyX Fh\pT/9[hڈs 綪6[Wŏ7Qq]"= :i馂`X={/dJ4s=pSVh&q9Vb˕}KY]3+MiD pMQ6_r{Pfߪuې:c7  XEPr# ,dH5ĺgGbo,szD%i. 1>G3urր3𣏕kVn%TԢ "}f':߫h2.[(hA'fbj0aɑKnEYb(tD n)~D3CN!N?SĎ`rm'8'oA}c1w8OZ\2o0TP2uBn%kV` yúyǙnRЮFe  +(#~$MT.x"?:]c񽩳ip5\dEb˖ଔ#K $Ꭵ!oUXvžu=օuHvǬiqFj(?0| 2S˺go}Jge6^T7Kib8HҬ KKhMq#t*W#;DUmQ>e-C{? mY;W(WG`Hz~%,cTPsn7rۊ2zɝG2/e^"kEKN~;R;v\k,=׆5q4 {Q92Zx 啴u"NL_iXa~/ |?ot<! T-T.rSڸjy|[ڪgH6+5D{k1;Dt>cJwS$eL1oL~j^ѓ@'"T챑3Zr*L6Qr"!?"͢-dې")+vS;l.P( l ~qljdHGAKˁL0)g)3tDRĠwKlu@Mb/B7"7sx'y@_IپmYk5PH^=$<8x/琀uF2ۆq4gaQDz8E ? AX; kpIjc&"2$>XWR l7]MYW?u!ߞX^/(l܍p1lOv^~כ!֝<C.XAT\p &\fMv(Ϸ=ghgpފl,]) K=R\14KwR]PO':~\[kmel6RszpKkl pdf$k%)b!h&,WH.wZyNԍUY>d{ЗpYRn#ŷI_ӣL&" t2巉"fU*5T|fg`kPt9KˁE0_n@oZgr(S>ߔ$B99jl@l6FcK%{)YťThr=sl)7Xio< ([ 3w5WC}lJZCnI#a\(1n%\6YN's>g?ᑨ4ZC>WkߜB9mLAe_; 1 )ek&"'Q`+A ǺX02p;A˿˶ 8;fV^%WQS>iEFPHsx`2QJM*ܼ]1i.}Ϝ⊟ß޿NSfUe~7ޕ5M%5(f;zȄG"&eܪuzѮs/WO15ń'Bmzx:A,Wac]jC鬒^MG=ִ?tߤk:cVB }@ޯ[aYGbfT| #T+' Q' }닆b,pd,ۭgX8ݕXPR,!D`R7mXSǢ=;/q/#zi5weFR5aܱJ^5B܉Kb;0'ڐ 3.=EOVABOAܽ=O:9z-O [އ?r3yK4~ Z hJrp@2]F5lƀCL6\5b:by[Q%ay[ޚQƎR*⤛WS׎!/0d9qƀ!ǝ\=/zf@M JJ5%:m}iPo)U;wz`+WCac@sL Jɉ2vMt NQs}; iIZ\RW*-EdȰ))Av m0Pƨ}yD]穴ʣSjV5 ($+ٍ}K0OFHGvl0]e#ʄ(gvH<\ZM{`MhzqOhL4gJ0󶢊O;7 .;J c8;ğ97µx1 GuLɐnëfޮwC̭F% GȮH7O!z즎 v&}3qg.YpmD-WB| -mVX*S1Pض=K{wL`AxZ;xeDNZȴs쒩{ t Z)@+j06t,N1O[Ji)J5*1+N<5͕M2@*/;/(q4ШFַ楍@9f~_[;Da#fmS+v%YYri֋״|9DZ]%mR>C(~FgAvM_3.7?w R8-2 R͞2WKζ%-".[ĪCyvB<V_v$:"w&hTyX>FϐGd⏘s^Z9&1Fe|zZH?W,Ci&jznbfɤBrAxL jpd71NYڛ{p%lpk;E^ġ`Jl U4')|[tx@nɠ5./A];` yN~eLI )&' N* @+QVovF_ˊCg^Xn_" 1ZZaa)I7 4-ŌtWmQqIR܅S k֟3=:۾LM/Zf)ՍO/Wj+ 3lR̥-`.fYiD&/F-fm"E6(4/lk6Q nM!':?GiG?/@œz{wD(W*=o(j*1ԩ6 eLӉVI(iMQf713[G$eGqPܼ:":+~+خ SN,ݖJ A*/R'0}jFh"n.6NMʠ#%ɜˑi  )QVDxߊd3YXn*ODYW Iv@܆EZm)q"en-I4:ĀKiL _kpJ)7mt"HlyvR qZJ"`y=pxmq^d; K|3lEvUcP"H.@=I-"F:2pXoJUFi4KދưqQ.J~[uΞv[<c 'J洠.lXc773K˜^m>ŽzLW=h_aGLm{p;9lO%#IȌ@D8';O4ܶ_ @ۋFCQT`EO[k(( oPX[yg8? j #Q츳0@*dccE*:?\]u&:r!-z:WF6m]$* 1sƝvw͹ƬЄg7c#CqO7#PC$'$US ޡ˦wX[̖ǣCF!0B҄!w%0997H 1 W;ɹn|"eHaa7$Kc5nK KuzyP'` R :]i:pM3)}bb6Պި#UZR/_MYAp\Q$թl;,"L/G{gqQXrkWm)sՔ j[ $P2UMb,mhM?s HκP`}C@9ρY$KL'Q|AKRId$RI+;c=V@7]Q~\^}'󧍪'&XJ,PjX”yNQɽ/K)`NY85߃H Jƣam:aΓ= f@xs X⡎;K\]|ǃag1B@|@pj 1X+KI1w!6-w<&ض0Ӟ5AYgɹY/u߀nMrc9ΨiχAՑdR[=(Qm(NL0ԆnNct΂Pי~yd zwCbJ c(NĐ]t/*u2r ԯAH6F\dMӛqilp 0wX fF / +W#SX!{ 85"pm#0_HrzT;w0hSV\~ @XB0g~W5KDq{,ɹq'w#Bv7iGUucMٴh׭~^cR~MKu(|!=QrWV[KsĕT'k)"1$n+Wjw/3}#wvY*0X.܏~BXg4Mxki&6-鴀3BOZl;gh<܏hW\8#ئfIQcp? fCR)2*\PnZ`ٞ{K@*w+`iH0qa.,0XA*uO'(l*D Gfy&K^CѢ=j\PRf-RMum_ˏOpd,>l&T\V fzImZyʟtl|3rXO!BW$"'<7` AeIEKbƉL8lWz@ (q oECۺCo6\1R-316>L wW<[QdEqIK&MvdЧ(jr; 2$=0a"m%(s2vRkB[ia uD`WӃfȻޖTNvt Q6ϧ &to%=bEƟx5+Z-Kw0hF1/(_q:]cE)3 xU"J;@^=|[2VDBH&JYSnQ ڭG+?s;։*xG[c{܎AeCcJJ8N?:i@K g5#>'RV/c!e{sPEDťRFT-sh<9Jβ/eN7upgŒ88+-D?X$=i#ƅ Mg S(A "o$ԡ~iCQ?;L!Jp6I ZD]F+k+E`#qF`rE3QGbJj'yl:%l`Xvk&xQDT/rz:xw|!f3X?oGq h"QA~_ QDPde%kWY`.}iPKɫ!{ Ja;u !5yistK!hs\;G {Uf]̺%Kߪ[ j1 1GR4c]&崼LYuLT +nV#v?|hwa%!MsU ;/ qX Ri!<'BRmχU u]7;te/le-rci ?jWX{f4׎'Q>?u\aOJFYa=dHCrn|eo_<Ә} \$J#x VņPeް֑:lEMTU„cNCQ6>CN $8NUAd4+g.4.؋ WƷqWS>/"{SmFRQ?aXS)+uh UR`#0?Zu0yAZ!S%n5giWHFi,uYkzHu7h؉ց-`G ENKRdi?˅73}r!?cH' 8RH'ܟ Aܚ+Z}LWAXb m'rլ 8*$P7%(N54C1 =Ő#W$jd?ފ۫QJOE%Yo"8s?/^޶9O 3=@ L 8vw3iEY1#bXy=oV" Vch^@bZuKX=qTUg9Jzt]^.So8dg6;nyml<&],#Y}}^h'g\{H߰dt~ٜ=wevM3I<;rtEkRjG'W+.?֖\Yl7)P𼬹Z}(pk%ʋP\vJ'ѪB| PSjCH2R(jt[J ྉ+YPJm;k``GI",3\ڹE@ jDEszCW7OqSqLyf*>ו7x5^߬@[2%9J"HW[F)gۨ30PAIkԎ dwP CvD*,/*T[չPjtG5GRG<3Ob AE1%Ef>sf.ԡg2/IZ߳F1?4$9Bmp˷[u愾ۣh&1Vc"a@,p{Oy/Z̀&un-p4cS:8Ru U$.ͅ>z%ޣ^sX^,9^!& KXuͿGZ ٖi{=D4BkfYy fRSy 'W^r-j(5&&5mQڃwϔUԖeE B䶡a[/=jb RcRBA/~,Ebj, Gd*dD*aȽ(ړasB42K(kejH]#Ne# n,"3 AIjbޔa' (PƮf[z|"U1 n  d *"e[`;DTlG e CvѺEK"R d9NBa+޺Fn0e4ʇGUr*:{.wy?\eӍVD \.aYMzhgfyszg,<6j UV4B8~cřϔzpO0\ܖXorK1*/q hņGXkDyfi4WˏzdX[O=ge\opuŠ.%nlH@!9)\v!!POyrND[٨0E=ìE[G\K/#$8p=cy4*k{ej"YNWsV'Ncew[W[7Xku@i F~_D jb[Ώ!awAVk_As2e$6ERLY6[MsGݿőd"ޢZ]cɠ:"Q9DT)e(=xza7X jd|Xt5GT:EKgnTK"mPlX!y^mb+eV:o<6L'{hCXOCK*vtl)5ulgKrsv\,3/la12'u:>:l&neܽ6Vzq!3IV8{N]エXڹҟKdc Mnbd:&$-%3|ݦ2`s)8쪞Tp> dpwrOG/:? DRI8y$ݥEꍩF)RxL,*@._‣SD:'.ڪ!D+HK :PNɴR]5|^s&(oM s 7$:+윎Jw&}_)l\kHӢ=/T .|XlmZ;ܸ%,#fcmiϣḋw8%3%߉OtːX2x[7^a:r}b%eR W3U䍗r2BZT|.F9T9?N=uVmU8ҧ`t!y[؇aKcAg*X3qRׁΐt#vjtl?G::b$Z&~yKV$QFOIJ|/ ԅR1B,hF1&j6:}s27^-e;`$,K;_ &w󺍯QQ(ظSTmժH$lk!𨻥N:Qs%]Ԓ(Kdǔ 2Rؽ*d~O\Y G u#?i%7&lwʃ-J9 C{ZN<$N*;`j -(RZ띄3V }d ߢ[*NtRmSMU2G.; gѰ)Qwh0TԇqYO9$&u 642 UCo ~t+pK/lO!h*?QX[Rjmxr$ٟf,">RMV?1Eż\! ݁r+Z .vwe˼ak>n0=[5̨AI7۴P1D67iݰ1цHݑvѤ-xI/HU`QnhXzg딍^>; a`_t1(XrsiЇ0eUX@yT=U/eXu붆KXBJUOn` }73l@jrin\)jJnkn=5sk}"&зLXk:8khwf>VW])Wm-ehn0E/ؤ ki";or > >zc/Rze '7y YZ