xen-doc-html-4.13.3_04-lp152.2.30.1 4>$  ApaE /=„JIIZ2Q_wr|$R L;G,ec<7ce̟V&t\xhXN;򨌐zjhjD m@@W׭VUE=D/8*3H dJnhW-#Pʪ6X@q'k=wEפaJj(R ^xVpExwR9P\AHF622#wl1{X +;ab96c3fba059d6af75731d89d6251c41c288a1aeaf541501809c5f6ab29c505d61ea17018c71eb0519a4a54b3c5f77568fa87473EaE /=„#wAjsTRv:Rrj:drSNh36R|iVBM}M_[7QƍxPaN Ʀ>(7/l)vDx1©LzHz-d$}2bBOא_"mPHYLGki@)״NOzjf[81 "+ǻ4&^VZFTD:ԍM/҃ࠞu<:y!Ǣn~ƔЧ;Bv^ T>p9L?<d & M EKTMM "M M M M  M@MMBhMS(w8~9#x~:=`~GMH(MI\MXѬYѴ\M]M^צ bّc:defluMv8Cxen-doc-html4.13.3_04lp152.2.30.1Xen Virtualization: HTML documentationXen is a virtual machine monitor for x86 that supports execution of multiple guest operating systems with unprecedented levels of performance and resource isolation. xen-doc-html contains the online documentation in HTML format. Point your browser at file:/usr/share/doc/packages/xen/html/ Authors: -------- Ian Pratt aEcloud132 oopenSUSE Leap 15.2openSUSEGPL-2.0-onlyhttp://bugs.opensuse.orgDocumentation/HTMLhttp://www.cl.cam.ac.uk/Research/SRG/netos/xen/linuxx86_64ot9DA'&6@ 72."B W 8` e $,76H"yjQ <3 "z868 P\xAAAA큤A큤A큤A큤A큤A큤A큤A큤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-4.13.3_04-lp152.2.30.1.src.rpmxen-doc-htmlxen-doc-html(x86-64)     rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PartialHardlinkSets)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0.4-14.0-15.2-14.14.1a7T@a,@aGa $@a @` @``E`` @```7@`a@`\{@`OL@`B@`4@`@` l__$_ǁ______@__[f_X_Wr@_'@_{_^)@^^@^3^ϧ^x^@^@^^^{G^r @^j$@^g@^_@^Nt^K^=Q@^:@^0"@^@^@]]]N@]@]ʞ])]c@]@]@]@]]fl]fl]M`@]B@]/ ],j] ]@]@] ] ] #]]@\\ޢ@\ڭ\\@\@\@\,@\7\\N\@\\+@\\M\M\\\@\}@\k\X)@\J@\I\A\?\=@\9\73\4\$\l@[H[k@[@[^[^[ā@[@[@[9@[v[W[CN@[<[6@[0@[0@['[!@[5@Z@ZnZ@ZZZ@ZmZԐ@ZZZ@ZZ}@Z}@Z}@Z}@Zz@Zz@Zo Zk@ZV@ZS]@ZOhZ:PZ1@Z.s@Z&@ZOZOZ Z Z Z@Z@Z }ZC@ZYYYY|Y@Y{Y*@Y5YA@Y4YYYbYY@Y3Y@YJYJY@YYV@Y@Ym@Yw2Yp@YlYh@Yh@YS@YJ_YI@Y5GY0Y-^Y(Y"YY;@YYY@YtY.X@XQ@X@XۡXg@X@X@X@X @X@X@X@X@XXX@XXXwoXs{@XlXWXRXQ4@XEVX43@X.@X*X lX&X@XX@W@W֘W֘W^@WiW:Wt@W.@W9WW@Wk@Wi,@WbWZWZWZWYZ@WV@WEWBW=W;W3W1@W1@W,@W(W(W(W(W(W#LWVbV(@V3VJVxV'@VV2V͛@VŲ@V`VwVVV=@VV@VHV@VvV%@VV<@V@VS@VV@V^VwVqR@Vn@VXEVUVTQ@VMVMVMVA@V;DV9@V7P@V0V*!@V V@VCVVVf@VqV@UYU@U@UUݪ@U@UnU4@UUK@UU@UU>U@Ux&Un@U\w@U[%UUUPUKSU>$U6;U%@UU@UUU.@TgT-@TT@TZ@TZ@T@TT@T5T@TLTLT~@Tl@Ti@Ta@THT?@T=@carnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comCallum Farmer carnold@suse.comcarnold@suse.comJames Fehlig carnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comDominique Leuenberger carnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comMatej Cepl carnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comJim Fehlig ohering@suse.deMartin Liška ohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comJan Engelhardt Guillaume GARDET Guillaume GARDET Bernhard Wiedemann carnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deBernhard Wiedemann ohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comtrenn@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.dejfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.deohering@suse.derbrown@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comjfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.dejfehlig@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comohering@suse.dejfehlig@suse.comcarnold@suse.comjfehlig@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.commlatimer@suse.comcarnold@suse.comcyliu@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.derguenther@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comrguenther@suse.comcarnold@suse.commeissner@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.com- bsc#1189632 - VUL-0: CVE-2021-28701: xen: Another race in XENMAPSPACE_grant_table handling (XSA-384) xsa384.patch - Upstream bug fixes (bsc#1027519) 5e5001ee-x86-p2m-PoD-accounting-in-gpae.patch (Replaces xsa378-0a.patch) 5e86fa2a-x86-p2m_remove_page-retval.patch (Replaces xsa378-0b.patch) 5e86fa57-x86-p2m-remove-MFN-check.patch (Replaces xsa378-0c.patch) 61001231-x86-work-around-GNU-ld-2-37-issue.patch 611a7e38-x86-CET-shstk-WARN-manipulation.patch 611cba4e-VT-d-Tylersburg-errata-more-steppings.patch 6128a856-gnttab-radix-tree-node-init.patch 611f844b-AMD-IOMMU-dont-leave-pt-mapped.patch 61122ac6-credit2-avoid-spuriously-picking-idle.patch (Replaces credit2-avoid-picking-a-spurious-idle-unit-when-caps-are-used.patch) 6126339d-AMD-IOMMU-global-ER-extending.patch (Replaces xsa378-1.patch) 6126344f-AMD-IOMMU-unity-map-handling.patch (Replaces xsa378-2.patch) 61263464-IOMMU-pass-access-to-p2m_get_iommu_flags.patch (Replaces xsa378-3.patch) 6126347d-IOMMU-generalize-VT-d-mapped-RMRR-tracking.patch (Replaces xsa378-4.patch) 6126349a-AMD-IOMMU-rearrange-reassignment.patch (Replaces xsa378-5.patch) 612634ae-AMD-IOMMU-rearrange-ER-UM-recording.patch (Replaces xsa378-6.patch) 612634c3-x86-p2m-introduce-p2m_is_special.patch (Replaces xsa378-7.patch) 612634dc-x86-p2m-guard-identity-mappings.patch (Replaces xsa378-8.patch) 612634f4-x86-mm-widen-locked-region-in-xatp1.patch (Replaces xsa379.patch) 6126350a-gnttab-release-mappings-preemption.patch (Replaces xsa380-1.patch 6126351f-gnttab-replace-mapkind.patch (Replaces xsa380-2.patch) 6126353d-gnttab-get-status-frames-array-capacity.patch (Replaces xsa382.patch) 61263553-Arm-restrict-maxmem-for-dom0less.patch (Replaces xsa383.patch)- bsc#1189882 - refresh libxc.sr.superpage.patch prevent superpage allocation in the LAPIC and ACPI_INFO range- bsc#1189373 - VUL-0: CVE-2021-28694,CVE-2021-28695, CVE-2021-28696: xen: IOMMU page mapping issues on x86 (XSA-378) xsa378-0a.patch xsa378-0b.patch xsa378-0c.patch xsa378-1.patch xsa378-2.patch xsa378-3.patch xsa378-4.patch xsa378-5.patch xsa378-6.patch xsa378-7.patch xsa378-8.patch - bsc#1189376 - VUL-0: CVE-2021-28697: xen: grant table v2 status pages may remain accessible after de-allocation. (XSA-379) xsa379.patch - bsc#1189378 - VUL-0: CVE-2021-28698: xen: long running loops in grant table handling. (XSA-380) xsa380-1.patch xsa380-2.patch - bsc#1189380 - VUL-0: CVE-2021-28699: xen: inadequate grant-v2 status frames array bounds check. (XSA-382) xsa382.patch - bsc#1189381 - VUL-0: CVE-2021-28700: xen: xen/arm: No memory limit for dom0less domUs. (XSA-383) xsa383.patch- bsc#1188050 - L3: Xen guest yval1a80 SLES11SP4 hangs on cluster See also bsc#1179246. credit2-avoid-picking-a-spurious-idle-unit-when-caps-are-used.patch- Drop aarch64-maybe-uninitialized.patch as the fix is in tarball.- bsc#1176189 - xl monitoring process exits during xl save -p|-c keep the monitoring process running to cleanup the domU during shutdown xl-save-pc.patch- bsc#1179246 - Dom0 hangs when pinning CPUs for dom0 with HVM guest 60be0e24-credit2-pick-runnable-unit.patch 60be0e42-credit2-per-entity-load-tracking-when-continuing.patch - Upstream bug fixes (bsc#1027519) 60be3097-x86-CPUID-fix-HLE-and-RTM-handling-again.patch 60bf9e19-Arm-create-dom0less-domUs-earlier.patch (Replaces xsa372-1.patch) 60bf9e1a-Arm-boot-modules-scrubbing.patch (Replaces xsa372-2.patch) 60bf9e1b-VT-d-size-qinval-queue-dynamically.patch (Replaces xsa373-1.patch) 60bf9e1c-AMD-IOMMU-size-command-buffer-dynamically.patch (Replaces xsa373-2.patch) 60bf9e1d-VT-d-eliminate-flush-related-timeouts.patch (Replaces xsa373-2.patch) 60bf9e1e-x86-spec-ctrl-protect-against-SCSB.patch (Replaces xsa375.patch) 60bf9e1f-x86-spec-ctrl-mitigate-TAA-after-S3.patch (Replaces xsa377.patch) 60bfa904-AMD-IOMMU-wait-for-command-slot.patch (Replaces xsa373-4.patch) 60bfa906-AMD-IOMMU-drop-command-completion-timeout.patch (Replaces xsa373-5.patch) 60c8a7ac-x86-vpt-fully-init-timers-before-enlisting.patch 60d49689-VT-d-undo-device-mappings-upon-error.patch 60d496b9-VT-d-adjust-domid-map-updating-on-unmap.patch 60d496d6-VT-d-clear_fault_bits-should-clear-all.patch 60d496ee-VT-d-dont-lose-errors-on-multi-IOMMU-flush.patch 60d5c6df-IOMMU-PCI-dont-let-domain-cleanup-continue.patch- bsc#1183243 - L3: Core cannot be opened when using xl dump-core of VM with PTF 60ba695e-tools-libs-ctrl-fix-xc_core_arch_map_p2m-to-support.patch- Update logrotate.conf, move global options into per-file sections to prevent globbering of global state (bsc#1187406)- Fix shell macro expansion in xen.spec, so that ExecStart= in xendomains-wait-disks.service is created correctly (bsc#1183877)- bsc#1186428 - VUL-0: CVE-2021-28693: xen: xen/arm: Boot modules are not scrubbed (XSA-372) xsa372-1.patch xsa372-2.patch - bsc#1186429 - VUL-0: CVE-2021-28692: xen: inappropriate x86 IOMMU timeout detection / handling (XSA-373) xsa373-1.patch xsa373-2.patch xsa373-3.patch xsa373-4.patch xsa373-5.patch - bsc#1186433 - VUL-0: CVE-2021-0089: xen: Speculative Code Store Bypass (XSA-375) xsa375.patch - bsc#1186434 - VUL-0: CVE-2021-28690: xen: x86: TSX Async Abort protections not restored after S3 (XSA-377) xsa377.patch - bsc#1180491 - "Panic on CPU 0: IO-APIC + timer doesn't work!" 6011bbc7-x86-timer-fix-boot-without-PIT.patch - Upstream bug fixes (bsc#1027519) 60631c38-VT-d-QI-restore-flush-hooks.patch 60700077-x86-vpt-avoid-pt_migrate-rwlock.patch 60787714-x86-HPET-avoid-legacy-replacement-mode.patch 60787714-x86-HPET-factor-legacy-replacement-mode-enabling.patch 608676f2-VT-d-register-based-invalidation-optional.patch 60a27288-x86emul-gas-2-36-test-harness-build.patch 60afe616-x86-CPUID-rework-HLE-and-RTM-handling.patch - Drop gcc10-fixes.patch- Add xen.sysconfig-fillup.patch to make sure xencommons is in a format as expected by fillup. (bsc#1185682) Each comment needs to be followed by an enabled key. Otherwise fillup will remove manually enabled key=value pairs, along with everything that looks like a stale comment, during next pkg update- Refresh xenstore-launch.patch to cover also daemon case- Update to Xen 4.13.3 bug fix release (bsc#1027519) xen-4.13.3-testing-src.tar.bz2 - Drop patches contained in new tarball 5faa974f-evtchn-rework-per-channel-lock.patch 5faa978b-evtchn-revert-52e1fc47abc3a0123.patch 5faac497-xen-arm-Always-trap-AMU-system-registers.patch 5fbcdf2e-evtchn-FIFO-access-last.patch 5fbcdf99-x86-DMI-fix-SMBIOS-pointer-check.patch 5fbd042b-memory-off-by-one-in-XSA-346.patch 5fc4ee23-evtchn-FIFO-queue-locking.patch 5fd8aebb-x86-replace-reset_stack_and_jump_nolp.patch 5fd8aee5-x86-fold-guest_idle_loop.patch 5fd8aef3-x86-avoid-calling-do_resume.patch 5fd8af4b-evtchn-FIFO-add-2nd-smp_rmb.patch 5fd8b02d-evtchn-FIFO-reorder-and-synchronize.patch 5ff458f2-x86-vPCI-tolerate-disabled-MSI-X-entry.patch 5ff71655-x86-dpci-EOI-regardless-of-masking.patch 5ffc58e8-x86-ACPI-dont-overwrite-FADT.patch 600999ad-x86-dpci-do-not-remove-pirqs-from.patch 600ab341-x86-vioapic-EOI-check-IRR-before-inject.patch 6013e4bd-memory-bail-from-page-scrub-when-CPU-offline.patch 6013e546-x86-HVM-reorder-domain-init-error-path.patch 601d4396-x86-EFI-suppress-ld-2-36-debug-info.patch 602bd768-page_alloc-only-flush-after-scrubbing.patch 602cfe3d-IOMMU-check-if-initialized-before-teardown.patch 602e5a8c-gnttab-never-permit-mapping-transitive-grants.patch 602e5abb-gnttab-bypass-IOMMU-when-mapping-own-grant.patch 6037b02e-x86-EFI-suppress-ld-2-36-base-relocs.patch 60410127-gcc11-adjust-rijndaelEncrypt.patch 60422428-x86-shadow-avoid-fast-fault-path.patch xen-4.13.2-testing-src.tar.bz2 xsa115-1.patch xsa115-10.patch xsa115-2.patch xsa115-3.patch xsa115-4.patch xsa115-5.patch xsa115-6.patch xsa115-7.patch xsa115-8.patch xsa115-9.patch xsa322.patch xsa324.patch xsa325.patch xsa351-1.patch xsa351-2.patch xsa368.patch- bsc#1137251 - Restore changes for xen-dom0-modules.service which were silently removed on 2019-10-17- bsc#1177204 - L3-Question: conring size for XEN HV's with huge memory to small. Inital Xen logs cut 5ffc58c4-ACPI-reduce-verbosity-by-default.patch - Upstream bug fixes (bsc#1027519) 601d4396-x86-EFI-suppress-ld-2-36-debug-info.patch 602bd768-page_alloc-only-flush-after-scrubbing.patch 602cfe3d-IOMMU-check-if-initialized-before-teardown.patch 602e5a8c-gnttab-never-permit-mapping-transitive-grants.patch 602e5abb-gnttab-bypass-IOMMU-when-mapping-own-grant.patch 6037b02e-x86-EFI-suppress-ld-2-36-base-relocs.patch 60410127-gcc11-adjust-rijndaelEncrypt.patch 60422428-x86-shadow-avoid-fast-fault-path.patch- bsc#1183072 - VUL-0: CVE-2021-28687: xen: HVM soft-reset crashes toolstack (XSA-368). Also resolves, bsc#1179148 - kdump of HVM fails, soft-reset not handled by libxl bsc#1181989 - openQA job causes libvirtd to dump core when running kdump inside domain xsa368.patch- bsc#1182576 - L3: XEN domU crashed on resume when using the xl unpause command 602ffae9-tools-libs-light-fix-xl-save--c-handling.patch- Upstream bug fixes (bsc#1027519) 5fd8aebb-x86-replace-reset_stack_and_jump_nolp.patch (Replaces xsa348-1.patch) 5fd8aee5-x86-fold-guest_idle_loop.patch (Replaces xsa348-2.patch 5fd8aef3-x86-avoid-calling-do_resume.patch (Replaces xsa348-3.patch) 5fd8af4b-evtchn-FIFO-add-2nd-smp_rmb.patch (Replaces xsa359.patch) 5fd8b02d-evtchn-FIFO-reorder-and-synchronize.patch (Replaces xsa358.patch) 5ff458f2-x86-vPCI-tolerate-disabled-MSI-X-entry.patch 5ff71655-x86-dpci-EOI-regardless-of-masking.patch 5ffc58e8-x86-ACPI-dont-overwrite-FADT.patch 600999ad-x86-dpci-do-not-remove-pirqs-from.patch (Replaces xsa360.patch) 600ab341-x86-vioapic-EOI-check-IRR-before-inject.patch 6013e4bd-memory-bail-from-page-scrub-when-CPU-offline.patch 6013e546-x86-HVM-reorder-domain-init-error-path.patch- bsc#1181254 - VUL-0: xen: IRQ vector leak on x86 (XSA-360) xsa360.patch- bsc#1180690 - L3-Question: xen: no needsreboot flag set Add Provides: installhint(reboot-needed) in xen.spec for libzypp- bsc#1176782 - L3: xl dump-core shows missing nr_pages during core. If maxmem and current are the same the issue doesn't happen 5fca3b32-tools-libs-ctrl-fix-dumping-of-ballooned-guest.patch- bsc#1179496 - VUL-0: CVE-2020-29480: xen: xenstore: watch notifications lacking permission checks (XSA-115) xsa115-1.patch xsa115-2.patch xsa115-3.patch xsa115-4.patch xsa115-5.patch xsa115-6.patch xsa115-7.patch xsa115-8.patch xsa115-9.patch xsa115-10.patch - bsc#1179498 - VUL-0: CVE-2020-29481: xen: xenstore: new domains inheriting existing node permissions (XSA-322) xsa322.patch - bsc#1179501 - VUL-0: CVE-2020-29484: xen: xenstore: guests can crash xenstored via watchs (XSA-324) xsa324.patch - bsc#1179502 - VUL-0: CVE-2020-29483: xen: xenstore: guests can disturb domain cleanup (XSA-325) xsa325.patch - bsc#1179506 - VUL-0: CVE-2020-29566: xen: undue recursion in x86 HVM context switch code (XSA-348) xsa348-1.patch xsa348-2.patch xsa348-3.patch - bsc#1179514 - VUL-0: CVE-2020-29570: xen: FIFO event channels control block related ordering (XSA-358) xsa358.patch - bsc#1179516 - VUL-0: CVE-2020-29571: xen: FIFO event channels control structure ordering (XSA-359) xsa359.patch - Upstream bug fixes (bsc#1027519) 5faa974f-evtchn-rework-per-channel-lock.patch 5faa978b-evtchn-revert-52e1fc47abc3a0123.patch 5faac497-xen-arm-Always-trap-AMU-system-registers.patch (Replaces xsa351-3.patch) 5fbcdf2e-evtchn-FIFO-access-last.patch 5fbcdf99-x86-DMI-fix-SMBIOS-pointer-check.patch 5fbd042b-memory-off-by-one-in-XSA-346.patch (Replaces xsa355.patch) 5fc4ee23-evtchn-FIFO-queue-locking.patch- bsc#1178963 - VUL-0: xen: stack corruption from XSA-346 change (XSA-355) xsa355.patch- Enhance libxc.migrate_tracking.patch Hide SUSEINFO messages from pause/unpause/resume from xl command. They are intended for libvirt logging, but lacked info about execution context.- bsc#1178591 - VUL-0: CVE-2020-28368: xen: Intel RAPL sidechannel attack aka PLATYPUS attack aka XSA-351 xsa351-1.patch xsa351-2.patch xsa351-3.patch- Upstream bug fix (bsc#1027519) 5f92909a-PCI-cleanup-MSI-before-removing-device.patch- bsc#1177950 - adjust help for --max_iters, default is 5 libxl.set-migration-constraints-from-cmdline.patch- Update to Xen 4.13.2 bug fix release (bsc#1027519) xen-4.13.2-testing-src.tar.bz2 - Drop patches contained in new tarball 5eb51be6-cpupool-fix-removing-cpu-from-pool.patch 5eb51caa-sched-vcpu-pause-flags-atomic.patch 5ec2a760-x86-determine-MXCSR-mask-always.patch 5ec50b05-x86-idle-rework-C6-EOI-workaround.patch 5ec7dcaa-x86-dont-enter-C6-with-in-service-intr.patch 5ec7dcf6-x86-dont-enter-C3-C6-with-errata.patch 5ec82237-x86-extend-ISR-C6-workaround-to-Haswell.patch 5ece1b91-x86-clear-RDRAND-CPUID-bit-on-AMD-fam-15-16.patch 5ece8ac4-x86-load_system_tables-NMI-MC-safe.patch 5ed69804-x86-ucode-fix-start-end-update.patch 5eda60cb-SVM-split-recalc-NPT-fault-handling.patch 5edf6ad8-ioreq-pending-emulation-server-destruction-race.patch 5edfbbea-x86-spec-ctrl-CPUID-MSR-defs-for-SRBDS.patch 5edfbbea-x86-spec-ctrl-mitigate-SRBDS.patch 5ee24d0e-x86-spec-ctrl-document-SRBDS-workaround.patch 5ef44e0d-x86-PMTMR-use-FADT-flags.patch 5ef6156a-x86-disallow-access-to-PT-MSRs.patch 5efcb354-x86-protect-CALL-JMP-straight-line-speculation.patch 5f046c18-evtchn-dont-ignore-error-in-get_free_port.patch 5f046c48-x86-shadow-dirty-VRAM-inverted-conditional.patch 5f046c64-EPT-set_middle_entry-adjustments.patch 5f046c78-EPT-atomically-modify-ents-in-ept_next_level.patch 5f046c9a-VT-d-improve-IOMMU-TLB-flush.patch 5f046cb5-VT-d-prune-rename-cache-flush-funcs.patch 5f046cca-x86-IOMMU-introduce-cache-sync-hook.patch 5f046ce9-VT-d-sync_cache-misaligned-addresses.patch 5f046cfd-x86-introduce-alternative_2.patch 5f046d1a-VT-d-optimize-CPU-cache-sync.patch 5f046d2b-EPT-flush-cache-when-modifying-PTEs.patch 5f046d5c-check-VCPUOP_register_vcpu_info-alignment.patch 5f1a9916-x86-S3-put-data-sregs-into-known-state.patch 5f21b9fd-x86-cpuid-APIC-bit-clearing.patch 5f479d9e-x86-begin-to-support-MSR_ARCH_CAPS.patch 5f4cf06e-x86-Dom0-expose-MSR_ARCH_CAPS.patch 5f4cf96a-x86-PV-fix-SEGBASE_GS_USER_SEL.patch 5f560c42-x86-PV-64bit-segbase-consistency.patch xsa286-1.patch xsa286-2.patch xsa286-3.patch xsa286-4.patch xsa286-5.patch xsa286-6.patch xsa333.patch xsa334.patch xsa336.patch xsa337-1.patch xsa337-2.patch xsa338.patch xsa339.patch xsa340.patch xsa342.patch xsa343-1.patch xsa343-2.patch xsa343-3.patch xsa344-1.patch xsa344-2.patch xsa345-1.patch xsa345-2.patch xsa345-3.patch xsa346-1.patch xsa346-2.patch xsa347-1.patch xsa347-2.patch xsa347-3.patch- bsc#1177409 - VUL-0: CVE-2020-27674: xen: x86 PV guest INVLPG-like flushes may leave stale TLB entries (XSA-286) xsa286-1.patch xsa286-2.patch xsa286-3.patch xsa286-4.patch xsa286-5.patch xsa286-6.patch - bsc#1177412 - VUL-0: CVE-2020-27672: xen: Race condition in Xen mapping code (XSA-345) xsa345-1.patch xsa345-2.patch xsa345-3.patch - bsc#1177413 - VUL-0: CVE-2020-27671: xen: undue deferral of IOMMU TLB flushes (XSA-346) xsa346-1.patch xsa346-2.patch - bsc#1177414 - VUL-0: CVE-2020-27670: xen: unsafe AMD IOMMU page table updates (XSA-347) xsa347-1.patch xsa347-2.patch xsa347-3.patch- Escape some % chars in xen.spec, they have to appear verbatim- Enhance libxc.migrate_tracking.patch Print number of allocated pages on sending side, this is more accurate than p2m_size.- bsc#1176339 - VUL-0: CVE-2020-25602: xen: x86 pv: Crash when handling guest access to MSR_MISC_ENABLE (XSA-333) xsa333.patch - bsc#1176341 - VUL-0: CVE-2020-25598: xen: Missing unlock in XENMEM_acquire_resource error path (XSA-334) xsa334.patch - bsc#1176343 - VUL-0: CVE-2020-25604: xen: race when migrating timers between x86 HVM vCPU-s (XSA-336) xsa336.patch - bsc#1176344 - VUL-0: CVE-2020-25595: xen: PCI passthrough code reading back hardware registers (XSA-337) xsa337-1.patch xsa337-2.patch - bsc#1176346 - VUL-0: CVE-2020-25597: xen: once valid event channels may not turn invalid (XSA-338) xsa338.patch - bsc#1176345 - VUL-0: CVE-2020-25596: xen: x86 pv guest kernel DoS via SYSENTER (XSA-339) xsa339.patch - bsc#1176347 - VUL-0: CVE-2020-25603: xen: Missing barrier barriers when accessing/allocating an event channel (XSA-340) xsa340.patch - bsc#1176348 - VUL-0: CVE-2020-25600: xen: out of bounds event channels available to 32-bit x86 domains (XSA-342) xsa342.patch - bsc#1176349 - VUL-0: CVE-2020-25599: xen: races with evtchn_reset() (XSA-343) xsa343-1.patch xsa343-2.patch xsa343-3.patch - bsc#1176350 - VUL-0: CVE-2020-25601: xen: lack of preemption in evtchn_reset() / evtchn_destroy() (XSA-344) xsa344-1.patch xsa344-2.patch - Upstream bug fixes (bsc#1027519) 5f479d9e-x86-begin-to-support-MSR_ARCH_CAPS.patch 5f4cf06e-x86-Dom0-expose-MSR_ARCH_CAPS.patch 5f4cf96a-x86-PV-fix-SEGBASE_GS_USER_SEL.patch 5f560c42-x86-PV-64bit-segbase-consistency.patch- Upstream bug fixes (bsc#1027519) 5ef44e0d-x86-PMTMR-use-FADT-flags.patch 5ef6156a-x86-disallow-access-to-PT-MSRs.patch 5efcb354-x86-protect-CALL-JMP-straight-line-speculation.patch 5f046c18-evtchn-dont-ignore-error-in-get_free_port.patch (Replaces xsa317.patch) 5f046c48-x86-shadow-dirty-VRAM-inverted-conditional.patch (Replaces xsa319.patch) 5f046c64-EPT-set_middle_entry-adjustments.patch (Replaces xsa328-1.patch) 5f046c78-EPT-atomically-modify-ents-in-ept_next_level.patch (Replaces xsa328-2.patch) 5f046c9a-VT-d-improve-IOMMU-TLB-flush.patch (Replaces xsa321-1.patch) 5f046cb5-VT-d-prune-rename-cache-flush-funcs.patch (Replaces xsa321-2.patch) 5f046cca-x86-IOMMU-introduce-cache-sync-hook.patch (Replaces xsa321-3.patch) 5f046ce9-VT-d-sync_cache-misaligned-addresses.patch (Replaces xsa32141.patch) 5f046cfd-x86-introduce-alternative_2.patch (Replaces xsa321-5.patch) 5f046d1a-VT-d-optimize-CPU-cache-sync.patch (Replaces xsa321-6.patch) 5f046d2b-EPT-flush-cache-when-modifying-PTEs.patch (Replaces xsa321-7.patch) 5f046d5c-check-VCPUOP_register_vcpu_info-alignment.patch (Replaces xsa327.patch) 5f1a9916-x86-S3-put-data-sregs-into-known-state.patch 5f21b9fd-x86-cpuid-APIC-bit-clearing.patch- bsc#1172356 - Not able to hot-plug NIC via virt-manager, asks to attach on next reboot while it should be live attached ignore-ip-command-script-errors.patch- Enhance libxc.migrate_tracking.patch After transfer of domU memory, the target host has to assemble the backend devices. Track the time prior xc_domain_unpause.- Add libxc.migrate_tracking.patch to track live migrations unconditionally in logfiles, especially in libvirt. This will track how long a domU was suspended during transit.- bsc#1173376 - VUL-0: CVE-2020-15566: xen: XSA-317 - Incorrect error handling in event channel port allocation xsa317.patch - bsc#1173377 - VUL-0: CVE-2020-15563: xen: XSA-319 - inverted code paths in x86 dirty VRAM tracking xsa319.patch - bsc#1173378 - VUL-0: CVE-2020-15565: xen: XSA-321 - insufficient cache write- back under VT-d xsa321-1.patch xsa321-2.patch xsa321-3.patch xsa321-4.patch xsa321-5.patch xsa321-6.patch xsa321-7.patch - bsc#1173380 - VUL-0: CVE-2020-15567: xen: XSA-328 - non-atomic modification of live EPT PTE xsa328-1.patch xsa328-2.patch- bsc#1172205 - VUL-0: CVE-2020-0543: xen: Special Register Buffer Data Sampling (SRBDS) aka "CrossTalk" (XSA-320) 5ee24d0e-x86-spec-ctrl-document-SRBDS-workaround.patch 5edfbbea-x86-spec-ctrl-CPUID-MSR-defs-for-SRBDS.patch (Replaces xsa320-1.patch) 5edfbbea-x86-spec-ctrl-mitigate-SRBDS.patch (Replaces xsa320-2.patch) - Upstream bug fixes (bsc#1027519) 5ec50b05-x86-idle-rework-C6-EOI-workaround.patch 5ec7dcaa-x86-dont-enter-C6-with-in-service-intr.patch 5ec7dcf6-x86-dont-enter-C3-C6-with-errata.patch 5ec82237-x86-extend-ISR-C6-workaround-to-Haswell.patch 5ece1b91-x86-clear-RDRAND-CPUID-bit-on-AMD-fam-15-16.patch 5ece8ac4-x86-load_system_tables-NMI-MC-safe.patch 5ed69804-x86-ucode-fix-start-end-update.patch 5eda60cb-SVM-split-recalc-NPT-fault-handling.patch 5edf6ad8-ioreq-pending-emulation-server-destruction-race.patch- Fixes for %_libexecdir changing to /usr/libexec- bsc#1172205 - VUL-0: CVE-2020-0543: xen: Special Register Buffer Data Sampling (SRBDS) aka "CrossTalk" (XSA-320) xsa320-1.patch xsa320-2.patch- Update to Xen 4.13.1 bug fix release (bsc#1027519) xen-4.13.1-testing-src.tar.bz2 5eb51be6-cpupool-fix-removing-cpu-from-pool.patch 5eb51caa-sched-vcpu-pause-flags-atomic.patch 5ec2a760-x86-determine-MXCSR-mask-always.patch - Drop patches contained in new tarball 5de65f84-gnttab-map-always-do-IOMMU-part.patch 5de65fc4-x86-avoid-HPET-use-on-certain-Intel.patch 5e15e03d-sched-fix-S3-resume-with-smt=0.patch 5e16fb6a-x86-clear-per-cpu-stub-page-info.patch 5e1da013-IRQ-u16-is-too-narrow-for-evtchn.patch 5e1dcedd-Arm-place-speculation-barrier-after-ERET.patch 5e21ce98-x86-time-update-TSC-stamp-after-deep-C-state.patch 5e286cce-VT-d-dont-pass-bridges-to-domain_context_mapping_one.patch 5e318cd4-x86-apic-fix-disabling-LVT0.patch 5e344c11-x86-HVM-relinquish-resources-from-domain_destroy.patch 5e3bd385-EFI-recheck-variable-name-strings.patch 5e3bd3d1-EFI-dont-leak-heap-VIA-XEN_EFI_get_next_variable_name.patch 5e3bd3f8-xmalloc-guard-against-overflow.patch 5e46e090-x86-smp-reset-x2apic_enabled-in-smp_send_stop.patch 5e4c00ef-VT-d-check-full-RMRR-for-E820-reserved.patch 5e4d4f5b-sched-fix-get_cpu_idle_time-with-core-sched.patch 5e4e614d-x86-spec-ctrl-no-xen-also-disables-branch-hardening.patch 5e4ec20e-x86-virtualise-MSR_PLATFORM_ID-properly.patch 5e5e7188-fix-error-path-in-cpupool_unassign_cpu_start.patch 5e6f53dd-AMD-IOMMU-fix-off-by-one-get_paging_mode.patch 5e7a371c-sched-fix-cpu-onlining-with-core-sched.patch 5e7c90cf-sched-fix-cpu-offlining-with-core-sched.patch 5e7cfb29-x86-ucode-AMD-fix-assert-in-compare_patch.patch 5e7cfb29-x86-ucode-fix-error-paths-in-apply_microcode.patch 5e7dd83b-libx86-CPUID-fix-not-just-leaf-7.patch 5e7dfbf6-x86-ucode-AMD-potential-buffer-overrun-equiv-tab.patch 5e846cce-x86-HVM-fix-AMD-ECS-handling-for-Fam10.patch 5e84905c-x86-ucode-AMD-fix-more-potential-buffer-overruns.patch 5e86f7b7-credit2-avoid-vCPUs-with-lower-creds-than-idle.patch 5e86f7fd-credit2-fix-credit-too-few-resets.patch 5e876b0f-tools-xenstore-fix-use-after-free-in-xenstored.patch 5e95ad61-xenoprof-clear-buffer-intended-to-be-shared-with-guests.patch 5e95ad8f-xenoprof-limit-consumption-of-shared-buffer-data.patch 5e95ae77-Add-missing-memory-barrier-in-the-unlock-path-of-rwlock.patch 5e95af5e-xen-gnttab-Fix-error-path-in-map_grant_ref.patch 5e95afb8-gnttab-fix-GNTTABOP_copy-continuation-handling.patch- spec: Remove invocation of autogen.sh - spec: Recommend qemu-ovmf-x86_64 to provide UEFI firmwares- bsc#1170968 - GCC 10: xen build fails on i586 gcc10-fixes.patch- bsc#1169392 - VUL-0: CVE-2020-11742: xen: Bad continuation handling in GNTTABOP_copy (XSA-318) 5e95afb8-gnttab-fix-GNTTABOP_copy-continuation-handling.patch- bsc#1168140 - VUL-0: CVE-2020-11740, CVE-2020-11741: xen: XSA-313 multiple xenoprof issues 5e95ad61-xenoprof-clear-buffer-intended-to-be-shared-with-guests.patch 5e95ad8f-xenoprof-limit-consumption-of-shared-buffer-data.patch - bsc#1168142 - VUL-0: CVE-2020-11739: xen: XSA-314 - Missing memory barriers in read-write unlock paths 5e95ae77-Add-missing-memory-barrier-in-the-unlock-path-of-rwlock.patch - bsc#1168143 - VUL-0: CVE-2020-11743: xen: XSA-316 - Bad error path in GNTTABOP_map_grant 5e95af5e-xen-gnttab-Fix-error-path-in-map_grant_ref.patch - bsc#1167152 - L3: Xenstored Crashed during VM install Need Core analyzed 5e876b0f-tools-xenstore-fix-use-after-free-in-xenstored.patch - bsc#1165206 - Xen 4.12 DomU hang / freeze / stall / NMI watchdog bug soft lockup CPU #0 stuck under high load / upstream with workaround. See also bsc#1134506 5e86f7b7-credit2-avoid-vCPUs-with-lower-creds-than-idle.patch 5e86f7fd-credit2-fix-credit-too-few-resets.patch - Drop for upstream solution (bsc#1165206) 01-xen-credit2-avoid-vcpus-to.patch default-to-credit1-scheduler.patch - Upstream bug fixes (bsc#1027519) 5e4ec20e-x86-virtualise-MSR_PLATFORM_ID-properly.patch 5e5e7188-fix-error-path-in-cpupool_unassign_cpu_start.patch 5e6f53dd-AMD-IOMMU-fix-off-by-one-get_paging_mode.patch 5e7a371c-sched-fix-cpu-onlining-with-core-sched.patch 5e7c90cf-sched-fix-cpu-offlining-with-core-sched.patch 5e7cfb29-x86-ucode-AMD-fix-assert-in-compare_patch.patch 5e7cfb29-x86-ucode-fix-error-paths-in-apply_microcode.patch 5e7dd83b-libx86-CPUID-fix-not-just-leaf-7.patch 5e7dfbf6-x86-ucode-AMD-potential-buffer-overrun-equiv-tab.patch 5e846cce-x86-HVM-fix-AMD-ECS-handling-for-Fam10.patch 5e84905c-x86-ucode-AMD-fix-more-potential-buffer-overruns.patch- bsc#1167608 - unbound limit for max_event_channels domUs with many vcpus and/or resources fail to start libxl.max_event_channels.patch- bsc#1161480 - Fix xl shutdown for HVM without PV drivers add libxl.libxl__domain_pvcontrol.patch- bsc#1165206 - Xen 4.12 DomU hang / freeze / stall / NMI watchdog bug soft lockup CPU #0 stuck under high load / upstream with workaround. See also bsc#1134506 01-xen-credit2-avoid-vcpus-to.patch- bsc#1158414 - GCC 10: xen build fails gcc10-fixes.patch- bsc#1165206 - Xen 4.12 DomU hang / freeze / stall / NMI watchdog bug soft lockup CPU #0 stuck under high load / upstream with workaround. See also bsc#1134506 default-to-credit1-scheduler.patch- bsc#1160932 - VUL-0: xen: XSA-312 v1: arm: a CPU may speculate past the ERET instruction 5e1dcedd-Arm-place-speculation-barrier-after-ERET.patch - bsc#1164425 - x86: "spec-ctrl=no-xen" should also disable branch hardening 5e4e614d-x86-spec-ctrl-no-xen-also-disables-branch-hardening.patch - Upstream bug fixes (bsc#1027519) 5e21ce98-x86-time-update-TSC-stamp-after-deep-C-state.patch 5e286cce-VT-d-dont-pass-bridges-to-domain_context_mapping_one.patch 5e318cd4-x86-apic-fix-disabling-LVT0.patch 5e344c11-x86-HVM-relinquish-resources-from-domain_destroy.patch 5e3bd385-EFI-recheck-variable-name-strings.patch 5e3bd3d1-EFI-dont-leak-heap-VIA-XEN_EFI_get_next_variable_name.patch 5e3bd3f8-xmalloc-guard-against-overflow.patch 5e46e090-x86-smp-reset-x2apic_enabled-in-smp_send_stop.patch 5e4c00ef-VT-d-check-full-RMRR-for-E820-reserved.patch 5e4d4f5b-sched-fix-get_cpu_idle_time-with-core-sched.patch- bsc#1159755 - use fixed qemu-3.1 machine type for HVM This must be done in qemu to preserve PCI layout remove libxl.lock-qemu-machine-for-hvm.patch- jsc#SLE-10183 - script to calculate cpuid= mask add helper script from https://github.com/twizted/xen_maskcalc domUs may be migrated between different cpus from the same vendor if their visible cpuid value has incompatible feature bits masked.- jsc#SLE-10172, bsc#1055731 - handle degraded raid for xendomains add helper script and systemd service from https://github.com/luizluca/xen-tools-xendomains-wait-disk in new sub package xen-tools-xendomains-wait-disk See included README for usage instructions xendomains-wait-disks.LICENSE xendomains-wait-disks.README.md xendomains-wait-disks.sh- bsc#1159755 - use fixed qemu-3.1 machine type for HVM qemu4 introduced incompatible changes in pc-i440fx, which revealed a design bug in 'xenfv'. Live migration from domUs started with qemu versions prior qemu4 can not be received with qemu4+. libxl.lock-qemu-machine-for-hvm.patch- Upstream bug fixes (bsc#1027519) 5de65f84-gnttab-map-always-do-IOMMU-part.patch 5de65fc4-x86-avoid-HPET-use-on-certain-Intel.patch 5e15e03d-sched-fix-S3-resume-with-smt=0.patch 5e16fb6a-x86-clear-per-cpu-stub-page-info.patch 5e1da013-IRQ-u16-is-too-narrow-for-evtchn.patch- BuildRequire pkgconfig(libsystemd) instead of systemd-devel: Allow OBS to shortcut through the -mini flavors.- bsc#1159320 - Xen logrotate file needs updated logrotate.conf- Update to Xen 4.13.0 FCS release xen-4.13.0-testing-src.tar.bz2 * Core Scheduling (contributed by SUSE) * Branch hardening to mitigate against Spectre v1 (contributed by Citrix) * Late uCode loading (contributed by Intel) * Improved live-patching build tools (contributed by AWS) * OP-TEE support (contributed by EPAM) * Renesas R-CAR IPMMU-VMSA driver (contributed by EPAM) * Dom0-less passthrough and ImageBuilder (contributed by XILINX) * Support for new Hardware- Update to Xen 4.13.0 RC4 release xen-4.13.0-testing-src.tar.bz2 - Rebase libxl.pvscsi.patch- Update to Xen 4.13.0 RC3 release xen-4.13.0-testing-src.tar.bz2 - Drop python38-build.patch- Update to Xen 4.13.0 RC2 release xen-4.13.0-testing-src.tar.bz2- Add python38-build.patch fixing build with Python 3.8 (add - -embed to python-config call)- Update to Xen 4.13.0 RC1 release xen-4.13.0-testing-src.tar.bz2 - Drop patches contained in new tarball or invalid 5ca7660f-x86-entry-drop-unused-includes.patch 5cab2a6b-x86-ACPI-also-parse-AMD-tables-early.patch 5cab2ab7-x86-IOMMU-introduce-init-ops.patch 5cab2ae8-x86-IOMMU-abstract-iommu_supports_eim.patch 5cab2b4e-x86-IOMMU-abstract-iommu_enable_x2apic_IR.patch 5cab2b95-x86-IOMMU-initialize-iommu_ops-in.patch 5cac9a4b-x86-IOMMU-abstract-adjust_vtd_irq_affinities.patch 5cdeac7f-AMD-IOMMU-adjust-IOMMU-list-head-init.patch 5cf8da09-adjust-sysdom-creation-call-earlier-on-x86.patch 5d0cf4e4-AMD-IOMMU-initialize-IRQ-tasklet-once.patch 5d149bb0-AMD-IOMMU-dont-add-IOMMUs.patch 5d1b3fab-AMD-IOMMU-restrict-feature-logging.patch 5d358508-x86-IRQ-desc-affinity-represents-request.patch 5d358534-x86-IRQ-consolidate-arch-cpu_mask-use.patch 5d358a67-AMD-IOMMU-pass-IOMMU-to-iterate_ivrs_entries-cb.patch 5d358a92-AMD-IOMMU-pass-IOMMU-to-amd_iommu_alloc_intremap_table.patch 5d39811c-x86-IOMMU-dont-restrict-IRQ-affinities.patch 5d417813-AMD-IOMMU-bitfield-extended-features.patch 5d417838-AMD-IOMMU-bitfield-control-reg.patch 5d41785b-AMD-IOMMU-bitfield-IRTE.patch 5d41787e-AMD-IOMMU-pass-IOMMU-to-gfu-intremap-entry.patch 5d4178ad-AMD-IOMMU-128bit-non-guest-APIC-IRTE.patch 5d4178fc-AMD-IOMMU-split-amd_iommu_init_one.patch 5d41793f-AMD-IOMMU-allow-enabling-without-IRQ.patch 5d417a16-AMD-IOMMU-adjust-IRQ-setup-for-x2APIC.patch 5d417ab6-AMD-IOMMU-enable-x2APIC-mode.patch 5d417b38-AMD-IOMMU-correct-IRTE-updating.patch 5d417b6a-AMD-IOMMU-dont-needlessly-log-headers.patch 5d419d49-x86-spec-ctrl-report-proper-status.patch 5d43253c-x86-ucode-always-collect_cpu_info-at-boot.patch 5d4a9d25-AMD-IOMMU-drop-not-found-message.patch 5d4aa36f-x86-apic-enable-x2APIC-mode-earlier.patch 5d4afa7a-credit2-fix-memory-leak.patch 5d4d850a-introduce-bss-percpu-page-aligned.patch 5d516531-x86-xpti-dont-leak-TSS-adjacent-data.patch 5d5bf475-x86-PV-fix-handling-of-iommu-mappings.patch 5d6524ca-x86-mm-correctly-init-M2P-entries.patch 5d67ceaf-x86-properly-gate-PKU-clearing.patch 5d70bfba-x86-shadow-dont-enable-with-too-small-allocation.patch 5d779811-x86-fix-CPUID7-0-eax-levelling-MSR.patch 5d77b40f-fix-hvm_all_ioreq_servers_add_vcpu-cleanup.patch 5d80e7c0-AMD-IOMMU-free-shared-IRT-once.patch 5d80e80d-AMD-IOMMU-valid-flag-for-IVRS-mappings.patch 5d80e82e-AMD-IOMMU-alloc_intremap_table-callers-handle-errors.patch 5d80e857-x86-PCI-read-MSI-X-table-entry-count-early.patch 5d80ea13-vpci-honor-read-only-devices.patch 5d89d8d9-libxc-x86-avoid-overflow-in-CPUID-APIC-ID.patch 5d8b715f-ACPI-cpuidle-bump-max-num-of-states.patch 5d8b72e5-AMD-IOMMU-dont-blindly-alloc-intremap-tables.patch 5d8b730e-AMD-IOMMU-phantom-funcs-share-intremap-tables.patch 5d8b733b-x86-PCI-read-max-MSI-vector-count-early.patch 5d8b736d-AMD-IOMMU-replace-INTREMAP_ENTRIES.patch 5d8b7393-AMD-IOMMU-restrict-intremap-table-sizes.patch 5d9ee2a8-AMD-IOMMU-alloc-1-devtab-per-PCI-seg.patch 5d9ee2f0-AMD-IOMMU-allocate_buffer-avoid-memset.patch 5d9ee312-AMD-IOMMU-prefill-all-DTEs.patch CVE-2014-0222-blktap-qcow1-validate-l2-table-size.patch blktap2-no-uninit.patch libxl.prepare-environment-for-domcreate_stream_done.patch pygrub-python3-conversion.patch fix-xenpvnetboot.patch- bsc#1135799 - Partner-L3: Xen crashes on AMD ROME based machines 5d9ee2a8-AMD-IOMMU-alloc-1-devtab-per-PCI-seg.patch 5d9ee2f0-AMD-IOMMU-allocate_buffer-avoid-memset.patch 5d9ee312-AMD-IOMMU-prefill-all-DTEs.patch- bsc#1120095 - add code to change LIBXL_HOTPLUG_TIMEOUT at runtime The included README has details about the impact of this change libxl.LIBXL_HOTPLUG_TIMEOUT.patch- bsc#1135799 - Partner-L3: Xen crashes on AMD ROME based machines 5ca7660f-x86-entry-drop-unused-includes.patch 5cf8da09-adjust-sysdom-creation-call-earlier-on-x86.patch 5cab2a6b-x86-ACPI-also-parse-AMD-tables-early.patch 5cab2ab7-x86-IOMMU-introduce-init-ops.patch 5cab2ae8-x86-IOMMU-abstract-iommu_supports_eim.patch 5cab2b4e-x86-IOMMU-abstract-iommu_enable_x2apic_IR.patch 5cab2b95-x86-IOMMU-initialize-iommu_ops-in.patch 5cac9a4b-x86-IOMMU-abstract-adjust_vtd_irq_affinities.patch 5cdeac7f-AMD-IOMMU-adjust-IOMMU-list-head-init.patch 5d0cf4e4-AMD-IOMMU-initialize-IRQ-tasklet-once.patch 5d149bb0-AMD-IOMMU-dont-add-IOMMUs.patch 5d1b3fab-AMD-IOMMU-restrict-feature-logging.patch 5d358508-x86-IRQ-desc-affinity-represents-request.patch 5d358534-x86-IRQ-consolidate-arch-cpu_mask-use.patch 5d358a67-AMD-IOMMU-pass-IOMMU-to-iterate_ivrs_entries-cb.patch 5d358a92-AMD-IOMMU-pass-IOMMU-to-amd_iommu_alloc_intremap_table.patch 5d39811c-x86-IOMMU-dont-restrict-IRQ-affinities.patch 5d417813-AMD-IOMMU-bitfield-extended-features.patch 5d417838-AMD-IOMMU-bitfield-control-reg.patch 5d41785b-AMD-IOMMU-bitfield-IRTE.patch 5d41787e-AMD-IOMMU-pass-IOMMU-to-gfu-intremap-entry.patch 5d4178ad-AMD-IOMMU-128bit-non-guest-APIC-IRTE.patch 5d4178fc-AMD-IOMMU-split-amd_iommu_init_one.patch 5d41793f-AMD-IOMMU-allow-enabling-without-IRQ.patch 5d417a16-AMD-IOMMU-adjust-IRQ-setup-for-x2APIC.patch 5d417ab6-AMD-IOMMU-enable-x2APIC-mode.patch 5d417b38-AMD-IOMMU-correct-IRTE-updating.patch 5d417b6a-AMD-IOMMU-dont-needlessly-log-headers.patch 5d4a9d25-AMD-IOMMU-drop-not-found-message.patch 5d80e7c0-AMD-IOMMU-free-shared-IRT-once.patch 5d80e80d-AMD-IOMMU-valid-flag-for-IVRS-mappings.patch 5d80e82e-AMD-IOMMU-alloc_intremap_table-callers-handle-errors.patch 5d80e857-x86-PCI-read-MSI-X-table-entry-count-early.patch 5d8b72e5-AMD-IOMMU-dont-blindly-alloc-intremap-tables.patch 5d8b730e-AMD-IOMMU-phantom-funcs-share-intremap-tables.patch 5d8b733b-x86-PCI-read-max-MSI-vector-count-early.patch 5d8b736d-AMD-IOMMU-replace-INTREMAP_ENTRIES.patch 5d8b7393-AMD-IOMMU-restrict-intremap-table-sizes.patch - bsc#1145240 - [Migration]Can't pre-allocate 1 shadow pages 5d70bfba-x86-shadow-dont-enable-with-too-small-allocation.patch - bsc#1137717 - [HPS Bug] Unable to install Windows Server 2016 with 2 CPUs setting (or above) under SLES12 SP4 Xen Server on AMD ROME platform 5d89d8d9-libxc-x86-avoid-overflow-in-CPUID-APIC-ID.patch - Upstream bug fixes (bsc#1027519) 5d67ceaf-x86-properly-gate-PKU-clearing.patch 5d779811-x86-fix-CPUID7-0-eax-levelling-MSR.patch 5d77b40f-fix-hvm_all_ioreq_servers_add_vcpu-cleanup.patch 5d80ea13-vpci-honor-read-only-devices.patch 5d8b715f-ACPI-cpuidle-bump-max-num-of-states.patch- bsc#1145774 - Libivrtd segfaults when trying to live migrate a VM Fix crash in an error path of libxl_domain_suspend with libxl.helper_done-crash.patch- Upstream bug fixes (bsc#1027519) 5d419d49-x86-spec-ctrl-report-proper-status.patch 5d43253c-x86-ucode-always-collect_cpu_info-at-boot.patch 5d4aa36f-x86-apic-enable-x2APIC-mode-earlier.patch 5d4afa7a-credit2-fix-memory-leak.patch 5d4d850a-introduce-bss-percpu-page-aligned.patch 5d516531-x86-xpti-dont-leak-TSS-adjacent-data.patch 5d5bf475-x86-PV-fix-handling-of-iommu-mappings.patch 5d6524ca-x86-mm-correctly-init-M2P-entries.patch - Drop 5d419d49-x86-spec-ctrl-facilities-report-wrong-status.patch- Preserve modified files which used to be marked as %config, rename file.rpmsave to file- Update to Xen 4.12.1 bug fix release (bsc#1027519) xen-4.12.1-testing-src.tar.bz2 - Drop patches contained in new tarball 5c87b644-IOMMU-leave-enabled-for-kexec-crash.patch 5c87b6a2-x86-HVM-dont-crash-guest-in-find_mmio_cache.patch 5c87b6c8-drop-arch_evtchn_inject.patch 5c87b6e8-avoid-atomic-rmw-accesses-in-map_vcpu_info.patch 5c87e6d1-x86-TSX-controls-for-RTM-force-abort-mode.patch 5c8f752c-x86-e820-build-with-gcc9.patch 5c8fb92d-x86-HVM-split-linear-reads-and-writes.patch 5c8fb951-x86-HVM-finish-IOREQs-correctly-on-completion.patch 5c8fc6c0-x86-MSR-shorten-ARCH_CAPABILITIES.patch 5c8fc6c0-x86-SC-retpoline-safety-calculations-for-eIBRS.patch 5c9e63c5-credit2-SMT-idle-handling.patch 5ca46b68-x86emul-no-GPR-update-upon-AVX-gather-failures.patch 5ca773d1-x86emul-dont-read-mask-reg-without-AVX512F.patch 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch 5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch 5cd921fb-trace-fix-build-with-gcc9.patch 5cd9224b-AMD-IOMMU-disable-upon-init-fail.patch 5cd922c5-x86-MTRR-recalc-p2mt-when-iocaps.patch 5cd9230f-VMX-correctly-get-GS_SHADOW-for-current.patch 5cd926d0-bitmap_fill-zero-sized.patch 5cd92724-drivers-video-drop-constraints.patch 5cd93a69-x86-MSR_INTEL_CORE_THREAD_COUNT.patch 5cd93a69-x86-boot-detect-Intel-SMT-correctly.patch 5cd93a69-x86-spec-ctrl-reposition-XPTI-parsing.patch 5cd981ff-x86-IRQ-tracing-avoid-UB-or-worse.patch 5cdad090-x86-spec-ctrl-CPUID-MSR-definitions-for-MDS.patch 5cdad090-x86-spec-ctrl-infrastructure-for-VERW-flush.patch 5cdad090-x86-spec-ctrl-misc-non-functional-cleanup.patch 5cdad090-x86-spec-ctrl-opts-to-control-VERW-flush.patch 5cdeb9fd-sched-fix-csched2_deinit_pdata.patch 5ce7a92f-x86-IO-APIC-fix-build-with-gcc9.patch 5cf0f6a4-x86-vhpet-resume-avoid-small-diff.patch 5cf16e51-x86-spec-ctrl-Knights-retpoline-safe.patch 5d03a0c4-1-Arm-add-an-isb-before-reading-CNTPCT_EL0.patch 5d03a0c4-2-gnttab-rework-prototype-of-set_status.patch 5d03a0c4-3-Arm64-rewrite-bitops-in-C.patch 5d03a0c4-4-Arm32-rewrite-bitops-in-C.patch 5d03a0c4-5-Arm-bitops-consolidate-prototypes.patch 5d03a0c4-6-Arm64-cmpxchg-simplify.patch 5d03a0c4-7-Arm32-cmpxchg-simplify.patch 5d03a0c4-8-Arm-bitops-helpers-with-timeout.patch 5d03a0c4-9-Arm-cmpxchg-helper-with-timeout.patch 5d03a0c4-A-Arm-turn-on-SILO-mode-by-default.patch 5d03a0c4-B-bitops-guest-helpers.patch 5d03a0c4-C-cmpxchg-guest-helpers.patch 5d03a0c4-D-use-guest-atomics-helpers.patch 5d03a0c4-E-Arm-add-perf-counters-in-guest-atomic-helpers.patch 5d03a0c4-F-Arm-protect-gnttab_clear_flag.patch - Refreshed patches libxl.pvscsi.patch- bsc#1143563 - Speculative mitigation facilities report wrong status 5d419d49-x86-spec-ctrl-facilities-report-wrong-status.patch- Update xen-dom0-modules.service (bsc#1137251) Map backend module names from pvops and xenlinux kernels to a module alias. This avoids errors from modprobe about unknown modules. Ignore a few xenlinux modules that lack aliases.- Gcc9 warnings seem to be cleared up with upstream fixes. Drop gcc9-ignore-warnings.patch- bsc#1138563 - L3: xenpvnetboot improperly ported to Python 3 fix-xenpvnetboot.patch- Move /etc/modprobe.d/xen_loop.conf to /lib/modprobe.d/xen_loop.conf- Remove /etc/xen/xenapiusers and /etc/pam.d/xen-api- Remove all upstream provided files in /etc/xen They are not required at runtime. The host admin is now responsible if he really needs anything in this subdirectory.- In our effort to make /etc fully admin controlled, move /etc/xen/scripts to libexec/xen/scripts with xen-tools.etc_pollution.patch- Move /etc/bash_completion.d/xl.sh to %{_datadir}/bash-completion/completions- bsc#1138294 - VUL-0: CVE-2019-17349: XSA-295: Unlimited Arm Atomics Operations 5d03a0c4-1-Arm-add-an-isb-before-reading-CNTPCT_EL0.patch 5d03a0c4-2-gnttab-rework-prototype-of-set_status.patch 5d03a0c4-3-Arm64-rewrite-bitops-in-C.patch 5d03a0c4-4-Arm32-rewrite-bitops-in-C.patch 5d03a0c4-5-Arm-bitops-consolidate-prototypes.patch 5d03a0c4-6-Arm64-cmpxchg-simplify.patch 5d03a0c4-7-Arm32-cmpxchg-simplify.patch 5d03a0c4-8-Arm-bitops-helpers-with-timeout.patch 5d03a0c4-9-Arm-cmpxchg-helper-with-timeout.patch 5d03a0c4-A-Arm-turn-on-SILO-mode-by-default.patch 5d03a0c4-B-bitops-guest-helpers.patch 5d03a0c4-C-cmpxchg-guest-helpers.patch 5d03a0c4-D-use-guest-atomics-helpers.patch 5d03a0c4-E-Arm-add-perf-counters-in-guest-atomic-helpers.patch 5d03a0c4-F-Arm-protect-gnttab_clear_flag.patch - Upstream bug fixes (bsc#1027519) 5c87b6c8-drop-arch_evtchn_inject.patch 5c87b6e8-avoid-atomic-rmw-accesses-in-map_vcpu_info.patch 5cd921fb-trace-fix-build-with-gcc9.patch 5cd9224b-AMD-IOMMU-disable-upon-init-fail.patch 5cd922c5-x86-MTRR-recalc-p2mt-when-iocaps.patch 5cd9230f-VMX-correctly-get-GS_SHADOW-for-current.patch 5cd926d0-bitmap_fill-zero-sized.patch 5cd92724-drivers-video-drop-constraints.patch 5cd93a69-x86-spec-ctrl-reposition-XPTI-parsing.patch (Replaces xsa297-0a.patch) 5cd93a69-x86-MSR_INTEL_CORE_THREAD_COUNT.patch (Replaces xsa297-0b.patch) 5cd93a69-x86-boot-detect-Intel-SMT-correctly.patch (Replaces xsa297-0c.patch) 5cdad090-x86-spec-ctrl-misc-non-functional-cleanup.patch (Replaces xsa297-0d.patch) 5cdad090-x86-spec-ctrl-CPUID-MSR-definitions-for-MDS.patch (Replaces xsa297-1.patch) 5cdad090-x86-spec-ctrl-infrastructure-for-VERW-flush.patch (Replaces xsa297-2.patch) 5cdad090-x86-spec-ctrl-opts-to-control-VERW-flush.patch (Replaces xsa297-3.patch) 5cd981ff-x86-IRQ-tracing-avoid-UB-or-worse.patch 5cdeb9fd-sched-fix-csched2_deinit_pdata.patch 5ce7a92f-x86-IO-APIC-fix-build-with-gcc9.patch 5cf0f6a4-x86-vhpet-resume-avoid-small-diff.patch 5cf16e51-x86-spec-ctrl-Knights-retpoline-safe.patch- Fix some outdated information in the readme README.SUSE- spec: xen-tools: require matching version of xen package bsc#1137471- Remove two stale patches xen.build-compare.man.patch xenpaging.doc.patch- Disable LTO (boo#1133296).- Remove arm32 from ExclusiveArch to fix build- bsc#1111331 - VUL-0: CPU issues Q2 2019 aka "Group 4". CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 xsa297-0a.patch xsa297-0b.patch xsa297-0c.patch xsa297-0d.patch xsa297-1.patch xsa297-2.patch xsa297-3.patch - Update 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch and drop 5cac6219-xen-cpu-Fix-ARM-build-following-cs-597fbb8.patch Refresh 5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch- bsc#1131811 - [XEN] internal error: libxenlight failed to create new domain. This patch is a workaround for a systemd issue. See patch header for additional comments. xenstore-launch.patch- bsc#1125378 - [xen][pygrub] Can not restore sle11sp4 pv guest after upgrading host from sle11sp4 to sle15sp1 pygrub-python3-conversion.patch - Fix "TypeError: virDomainDefineXML() argument 2 must be str or None, not bytes" when converting VMs from using the xm/xend toolstack to the libxl/libvirt toolstack. (bsc#1123378) xen2libvirt.py- bsc#1124560 - Fully virtualized guests crash on boot 5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch - bsc#1121391 - GCC 9: xen build fails 5c8f752c-x86-e820-build-with-gcc9.patch - Upstream bug fixes (bsc#1027519) 5c87b644-IOMMU-leave-enabled-for-kexec-crash.patch 5c87b6a2-x86-HVM-dont-crash-guest-in-find_mmio_cache.patch 5c87e6d1-x86-TSX-controls-for-RTM-force-abort-mode.patch 5c8fb92d-x86-HVM-split-linear-reads-and-writes.patch 5c8fb951-x86-HVM-finish-IOREQs-correctly-on-completion.patch 5c8fc6c0-x86-MSR-shorten-ARCH_CAPABILITIES.patch 5c8fc6c0-x86-SC-retpoline-safety-calculations-for-eIBRS.patch 5c9e63c5-credit2-SMT-idle-handling.patch 5ca46b68-x86emul-no-GPR-update-upon-AVX-gather-failures.patch 5ca773d1-x86emul-dont-read-mask-reg-without-AVX512F.patch 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch 5cac6219-xen-cpu-Fix-ARM-build-following-cs-597fbb8.patch- Install pkgconfig files into libdir instead of datadir- Update to Xen 4.12.0 FCS release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2 * HVM/PVH and PV only Hypervisor: The Xen 4.12 release separates the HVM/PVH and PV code paths in Xen and provides KCONFIG options to build a PV only or HVM/PVH only hypervisor. * QEMU Deprivilege (DM_RESTRICT): In Xen 4.12, this feature has been vastly improved. * Argo - Hypervisor-Mediated data eXchange: Argo is a new inter- domain communication mechanism. * Improvements to Virtual Machine Introspection: The VMI subsystem which allows detection of 0-day vulnerabilities has seen many functional and performance improvements. * Credit 2 Scheduler: The Credit2 scheduler is now the Xen Project default scheduler. * PVH Support: Grub2 boot support has been added to Xen and Grub2. * PVH Dom0: PVH Dom0 support has now been upgraded from experimental to tech preview. * The Xen 4.12 upgrade also includes improved IOMMU mapping code, which is designed to significantly improve the startup times of AMD EPYC based systems. * The upgrade also features Automatic Dom0 Sizing which allows the setting of Dom0 memory size as a percentage of host memory (e.g. 10%) or with an offset (e.g. 1G+10%).- bsc#1130485 - Please drop Requires on multipath-tools in xen-tools. Now using Recommends multipath-tools. xen.spec- Update to Xen 4.12.0 RC7 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- Update to Xen 4.12.0 RC6 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- bsc#1026236 - add Xen cmdline option "suse_vtsc_tolerance" to avoid TSC emulation for HVM domUs if their expected frequency does not match exactly the frequency of the receiving host xen.bug1026236.suse_vtsc_tolerance.patch- Update to Xen 4.12.0 RC5 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- jsc#SLE-3059 - Disable Xen auto-ballooning - Add CONFIG_DOM0_MEM to the spec file for managing dom0 memory. xen.spec - Disable autoballooning in xl.con xl-conf-disable-autoballoon.patch- Update gcc9-ignore-warnings.patch to fix build in SLE12- bsc#1126325 - fix crash in libxl in error path Setup of grant_tables and other variables may fail libxl.prepare-environment-for-domcreate_stream_done.patch- bsc#1127620 - Documentation for the xl configuration file allows for firmware=pvgrub64 but we don't ship pvgrub64. Create a link from grub.xen to pvgrub64 xen.spec- Update to Xen 4.12.0 RC4 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2 - Tarball also contains additional post RC4 security fixes for Xen Security Advisories 287, 288, and 290 through 294.- Update to Xen 4.12.0 RC3 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- Update to Xen 4.12.0 RC2 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- bsc#1121391 - GCC 9: xen build fails gcc9-ignore-warnings.patch- bsc#1122563 - Virtualization/xen: Bug no Xen on boot, missing /proc/xen, after 4.11 -> 4.12 upgrade on X86_64/efi. Keep xen.efi in /usr/lib64/efi for booting older distros. xen.spec- fate#326960: Package grub2 as noarch. As part of the effort to have a unified bootloader across architectures, modify the xen.spec file to move the Xen efi files to /usr/share/efi/$(uname -m) from /usr/lib64/efi.- Update to Xen 4.12.0 RC1 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2 - Drop 5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch 5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch 5b8fae26-tools-libxl-correct-vcpu-affinity-output-with-sparse-physical-cpu-map.patch 5b8fae26-xen-fill-topology-info-for-all-present-cpus.patch 5b8fb5af-tools-xl-refuse-to-set-number-of-vcpus-to-0-via-xl-vcpu-set.patch 5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch 5b9784d2-x86-HVM-add-known_gla-helper.patch 5b9784f2-x86-HVM-split-page-straddling-accesses.patch 5bdc31d5-VMX-fix-vmx_handle_eoi.patch gcc8-fix-array-warning-on-i586.patch gcc8-fix-format-warning-on-i586.patch gcc8-inlining-failed.patch xen.bug1079730.patch- bsc#1121960 - xen: sync with Factory xen.spec xen.changes- Replace old $RPM_* shell vars. - Run fdupes for all architectures, and not crossing subvolume boundaries.- Do not run %fdupes on aarch64 to avoid the hardlink-across-partition rpmlint error- Require qemu-seabios only on x86* as it is not available on non-x86 systems- Avoid creating dangling symlinks (bsc#1116524) This reverts the revert of tmp_build.patch- Update to Xen 4.11.1 bug fix release (bsc#1027519) xen-4.11.1-testing-src.tar.bz2 - 5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch replaces xen.2b50cdbc444c637575580dcfa6c9525a84d5cc62.patch - 5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch replaces xen.b8f33431f3dd23fb43a879f4bdb4283fdc9465ad.patch - Drop the following patches contained in the new tarball 5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch 5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch 5b3cab8e-2-VMX-improve-MSR-load-save-API.patch 5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch 5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch 5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch 5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch 5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch 5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch 5b3f8fa5-port-array_index_nospec-from-Linux.patch 5b4321f6-x86-correctly-set-nonlazy_xstate_used-when-loading-full-state.patch 5b4488e7-x86-spec-ctrl-cmdline-handling.patch 5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch 5b4c9a60-allow-cpu_down-to-be-called-earlier.patch 5b4db308-SVM-fix-cleanup-svm_inject_event.patch 5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch 5b5040f2-x86-AMD-distinguish-CU-from-HT.patch 5b505fe5-VMX-fix-find-msr-build.patch 5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch 5b508775-2-x86-possibly-bring-up-all-CPUs.patch 5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch 5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch 5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch 5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch 5b56feb1-hvm-Disallow-unknown-MSR_EFER-bits.patch 5b56feb2-spec-ctrl-Fix-the-parsing-of-xpti--on-fixed-Intel-hardware.patch 5b62ca93-VMX-avoid-hitting-BUG_ON.patch 5b6d84ac-x86-fix-improve-vlapic-read-write.patch 5b6d8ce2-x86-XPTI-parsing.patch 5b72fbbe-ARM-disable-grant-table-v2.patch 5b72fbbe-oxenstored-eval-order.patch 5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch 5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch 5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch 5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch 5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch 5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch 5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch 5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch 5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch 5b72fbbf-x86-Make-spec-ctrl-no-a-global-disable-of-all-mitigations.patch 5b72fbbf-xl.conf-Add-global-affinity-masks.patch 5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch 5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch 5b75afef-x86-setup-avoid-OoB-E820-lookup.patch 5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch 5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch 5b8d5832-x86-assorted-array_index_nospec-insertions.patch 5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch 5bacae4b-x86-boot-allocate-extra-module-slot.patch 5bae44ce-x86-silence-false-log-messages.patch 5bb60c12-x86-split-opt_xpti.patch 5bb60c4f-x86-split-opt_pv_l1tf.patch 5bb60c74-x86-fix-xpti-and-pv-l1tf.patch 5bcf0722-x86-boot-enable-NMIs.patch 5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch 5bd076e9-x86-boot-init-debug-regs-correctly.patch 5bd076e9-x86-init-vcpu-debug-regs-correctly.patch 5bd0e0cf-vvmx-Disallow-the-use-of-VT-x-instructions-when-nested-virt-is-disabled.patch 5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch 5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch 5be2a308-x86-extend-get_platform_badpages.patch 5be2a354-x86-work-around-HLE-host-lockup-erratum.patch xsa275-1.patch xsa275-2.patch xsa276-1.patch xsa276-2.patch xsa277.patch xsa279.patch xsa280-1.patch xsa280-2.patch- bsc#1116524 - Package xen-tools-4.11.0_09-2.1.x86_64 broken: Missing /bin/domu-xenstore. This was broken because "make package build reproducible" change. (boo#1047218, boo#1062303) This fix reverses the change to this patch. tmp_build.patch- bsc#1115040 - VUL-0: CVE-2018-19961 CVE-2018-19962: xen: insufficient TLB flushing / improper large page mappings with AMD IOMMUs (XSA-275) xsa275-1.patch xsa275-2.patch - bsc#1115043 - VUL-0: CVE-2018-19963: xen: resource accounting issues in x86 IOREQ server handling (XSA-276) xsa276-1.patch xsa276-2.patch - bsc#1115044 - VUL-0: CVE-2018-19964: xen: x86: incorrect error handling for guest p2m page removals (XSA-277) xsa277.patch - bsc#1114405 - VUL-0: CVE-2018-18883: xen: Nested VT-x usable even when disabled (XSA-278) 5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch - bsc#1115045 - VUL-0: xen: CVE-2018-19965: x86: DoS from attempting to use INVPCID with a non-canonical addresses (XSA-279) xsa279.patch - bsc#1115047 - VUL-0: CVE-2018-19966: xen: Fix for XSA-240 conflicts with shadow paging (XSA-280) xsa280-1.patch xsa280-2.patch - bsc#1114988 - VUL-0: CVE-2018-19967: xen: guest use of HLE constructs may lock up host (XSA-282) 5be2a308-x86-extend-get_platform_badpages.patch 5be2a354-x86-work-around-HLE-host-lockup-erratum.patch - bsc#1108940 - L3: XEN SLE12-SP1 domU hang on SLE12-SP3 HV 5bdc31d5-VMX-fix-vmx_handle_eoi.patch - Upstream bug fixes (bsc#1027519) 5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch 5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch 5bacae4b-x86-boot-allocate-extra-module-slot.patch 5bae44ce-x86-silence-false-log-messages.patch 5bb60c12-x86-split-opt_xpti.patch 5bb60c4f-x86-split-opt_pv_l1tf.patch 5bb60c74-x86-fix-xpti-and-pv-l1tf.patch 5bcf0722-x86-boot-enable-NMIs.patch 5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch 5bd076e9-x86-boot-init-debug-regs-correctly.patch 5bd076e9-x86-init-vcpu-debug-regs-correctly.patch 5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch- bsc#1114405 - VUL-0: CVE-2018-18883: xen: Nested VT-x usable even when disabled (XSA-278) 5bd0e0cf-vvmx-Disallow-the-use-of-VT-x-instructions-when-nested-virt-is-disabled.patch- Use SMBIOS_REL_DATE instead of SMBIOS_DATE for reproducible binaries- make package build reproducible (boo#1047218, boo#1062303) * Set SMBIOS_REL_DATE * Update tmp_build.patch to use SHA instead of random build-id * Add reproducible.patch to use --no-insert-timestamp- Building with ncurses 6.1 will fail without xen.2b50cdbc444c637575580dcfa6c9525a84d5cc62.patch - Building libxl acpi support on aarch64 with gcc 8.2 will fail without xen.b8f33431f3dd23fb43a879f4bdb4283fdc9465ad.patch- bsc#1106263 - L3: The affinity reporting via 'xl vcpu-list' is apparently broken 5b8fae26-tools-libxl-correct-vcpu-affinity-output-with-sparse-physical-cpu-map.patch 5b8fae26-xen-fill-topology-info-for-all-present-cpus.patch 5b8fb5af-tools-xl-refuse-to-set-number-of-vcpus-to-0-via-xl-vcpu-set.patch- bsc#1094508 - L3: Kernel oops in fs/dcache.c called by d_materialise_unique() 5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch 5b9784d2-x86-HVM-add-known_gla-helper.patch 5b9784f2-x86-HVM-split-page-straddling-accesses.patch - bsc#1103279 - (CVE-2018-15470) VUL-0: CVE-2018-15470: xen: oxenstored does not apply quota-maxentity (XSA-272) 5b72fbbe-oxenstored-eval-order.patch - bsc#1103275 - (CVE-2018-15469) VUL-0: CVE-2018-15469: xen: Use of v2 grant tables may cause crash on ARM (XSA-268) 5b72fbbe-ARM-disable-grant-table-v2.patch - Upstream patches from Jan (bsc#1027519) 5b6d84ac-x86-fix-improve-vlapic-read-write.patch 5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch 5b75afef-x86-setup-avoid-OoB-E820-lookup.patch 5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch 5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch 5b8d5832-x86-assorted-array_index_nospec-insertions.patch - Drop 5b741962-x86-write-to-correct-variable-in-parse_pv_l1tf.patch- bsc#1078292 - rpmbuild -ba SPECS/xen.spec with xen-4.9.1 failed xen.spec- bsc#1091107 - VUL-0: CVE-2018-3646: xen: L1 Terminal Fault -VMM (XSA-273) 5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch 5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch 5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch 5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch 5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch 5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch 5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch 5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch - bsc#1103276 - VUL-0: CVE-2018-15468: xen: x86: Incorrect MSR_DEBUGCTL handling lets guests enable BTS (XSA-269) 5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch - Upstream prereq patches for XSA-273 and other upstream fixes (bsc#1027519) 5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch 5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch 5b3cab8e-2-VMX-improve-MSR-load-save-API.patch 5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch 5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch 5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch 5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch 5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch 5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch 5b4321f6-x86-correctly-set-nonlazy_xstate_used-when-loading-full-state.patch 5b505fe5-VMX-fix-find-msr-build.patch 5b56feb1-hvm-Disallow-unknown-MSR_EFER-bits.patch 5b56feb2-spec-ctrl-Fix-the-parsing-of-xpti--on-fixed-Intel-hardware.patch 5b62ca93-VMX-avoid-hitting-BUG_ON.patch 5b6d8ce2-x86-XPTI-parsing.patch 5b72fbbf-x86-Make-spec-ctrl-no-a-global-disable-of-all-mitigations.patch 5b72fbbf-xl.conf-Add-global-affinity-masks.patch 5b741962-x86-write-to-correct-variable-in-parse_pv_l1tf.patch- Upstream patches from Jan (bsc#1027519) 5b3f8fa5-port-array_index_nospec-from-Linux.patch 5b4488e7-x86-spec-ctrl-cmdline-handling.patch 5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch 5b4c9a60-allow-cpu_down-to-be-called-earlier.patch 5b4db308-SVM-fix-cleanup-svm_inject_event.patch 5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch 5b5040f2-x86-AMD-distinguish-CU-from-HT.patch 5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch 5b508775-2-x86-possibly-bring-up-all-CPUs.patch 5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch 5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch 5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch 5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch gcc8-fix-format-warning-on-i586.patch gcc8-fix-array-warning-on-i586.patch - Drop xen.fuzz-_FORTIFY_SOURCE.patch gcc8-fix-warning-on-i586.patch- Update to Xen 4.11.0 FCS (fate#325202, fate#325123) xen-4.11.0-testing-src.tar.bz2 disable-building-pv-shim.patch - Dropped patches 5a33a12f-domctl-improve-locking-during-domain-destruction.patch 5a6703cb-x86-move-invocations-of-hvm_flush_guest_tlbs.patch 5a79d7ed-libxc-packed-initrd-dont-fail-domain-creation.patch 5a9985bd-x86-invpcid-support.patch 5ac72a48-gcc8.patch 5ac72a5f-gcc8.patch 5ac72a64-gcc8.patch 5ac72a69-gcc8.patch 5ac72a6e-gcc8.patch 5ac72a74-gcc8.patch 5ac72a7b-gcc8.patch 5ad4923e-x86-correct-S3-resume-ordering.patch 5ad49293-x86-suppress-BTI-mitigations-around-S3.patch 5ad600d4-x86-pv-introduce-x86emul_read_dr.patch 5ad600d4-x86-pv-introduce-x86emul_write_dr.patch 5ad8c3a7-x86-spec_ctrl-update-retpoline-decision-making.patch 5adda097-x86-HPET-fix-race-triggering-ASSERT.patch 5adda0d5-x86-HVM-never-retain-emulated-insn-cache.patch 5adde9ed-xpti-fix-double-fault-handling.patch 5ae06fad-SVM-fix-intercepts-for-SYS-CALL-ENTER-MSRs.patch 5ae31917-x86-cpuidle-init-stats-lock-once.patch 5aeaeae4-introduce-vcpu_sleep_nosync_locked.patch 5aeaeaf0-sched-fix-races-in-vcpu-migration.patch 5aeb2c57-x86-retval-checks-of-set-guest-trapbounce.patch 5aec7393-1-x86-xpti-avoid-copy.patch 5aec7393-2-x86-xpti-write-cr3.patch 5aec744a-3-x86-xpti-per-domain-flag.patch 5aec744a-4-x86-xpti-use-invpcid.patch 5aec744a-5-x86-xpti-no-global-pages.patch 5aec744a-6-x86-xpti-cr3-valid-flag.patch 5aec744a-7-x86-xpti-pv_guest_cr4_to_real_cr4.patch 5aec744b-8-x86-xpti-cr3-helpers.patch 5aec74a8-9-x86-xpti-use-pcid.patch 5af1daa9-1-x86-traps-fix-dr6-handing-in-DB-handler.patch 5af1daa9-2-x86-pv-move-exception-injection-into-test_all_events.patch 5af1daa9-3-x86-traps-use-IST-for-DB.patch 5af1daa9-4-x86-traps-fix-handling-of-DB-in-hypervisor-context.patch 5af1daa9-x86-HVM-guard-against-bogus-emulator-ioreq-state.patch 5af1daa9-x86-vpt-support-IO-APIC-routed-intr.patch 5af97999-viridian-cpuid-leaf-40000003.patch 5afc13ae-1-x86-read-MSR_ARCH_CAPABILITIES-once.patch 5afc13ae-2-x86-express-Xen-SPEC_CTRL-choice-as-variable.patch 5afc13ae-3-x86-merge-bti_ist_info-use_shadow_spec_ctrl.patch 5afc13ae-4-x86-fold-XEN_IBRS-ALTERNATIVES.patch 5afc13ae-5-x86-rename-bits-of-spec_ctrl-infrastructure.patch 5afc13ae-6-x86-elide-MSR_SPEC_CTRL-handling-in-idle.patch 5afc13ae-7-x86-split-X86_FEATURE_SC_MSR.patch 5afc13ae-8-x86-explicitly-set-Xen-default-SPEC_CTRL.patch 5afc13ae-9-x86-cpuid-improve-guest-policies-for-speculative.patch 5afc13ae-A-x86-introduce-spec-ctrl-cmdline-opt.patch 5b02c786-x86-AMD-mitigations-for-GPZ-SP4.patch 5b02c786-x86-Intel-mitigations-for-GPZ-SP4.patch 5b02c786-x86-msr-virtualise-SPEC_CTRL-SSBD.patch 5b0bc9da-x86-XPTI-fix-S3-resume.patch 5b0d2286-libxc-x86-PV-dont-hand-through-CPUID-leaf-0x80000008.patch 5b0d2d91-x86-suppress-sync-when-XPTI-off.patch 5b0d2dbc-x86-correct-default_xen_spec_ctrl.patch 5b0d2ddc-x86-CPUID-dont-override-tool-stack-hidden-STIBP.patch 5b150ef9-x86-fix-error-handling-of-pv-dr7-shadow.patch 5b21825d-1-x86-support-fully-eager-FPU-context-switching.patch 5b21825d-2-x86-spec-ctrl-mitigations-for-LazyFPU.patch 5b238b92-x86-HVM-account-for-fully-eager-FPU.patch 5b2b7172-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b31e004-x86-HVM-emul-attempts-FPU-set-fpu_initialised.patch 5b323e3c-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b34882d-x86-mm-dont-bypass-preemption-checks.patch 5b348874-x86-refine-checks-in-DB-handler.patch 5b348897-libxl-qemu_disk_scsi_drive_string-break-out-common.patch 5b3488a2-libxl-restore-passing-ro-to-qemu-for-SCSI-disks.patch 5b34891a-x86-HVM-dont-cause-NM-to-be-raised.patch 5b348954-x86-guard-against-NM.patch libxl.Add-a-version-check-of-QEMU-for-QMP-commands.patch libxl.LIBXL_DESTROY_TIMEOUT.patch libxl.qmp-Tell-QEMU-about-live-migration-or-snapshot.patch xen_fix_build_with_acpica_20180427_and_new_packages.patch- Submit upstream patch libacpi: fixes for iasl >= 20180427 git commit 858dbaaeda33b05c1ac80aea0ba9a03924e09005 xen_fix_build_with_acpica_20180427_and_new_packages.patch This is needed for acpica package to get updated in our build service- Upstream patches from Jan (bsc#1027519) 5b02c786-x86-AMD-mitigations-for-GPZ-SP4.patch (Replaces Spectre-v4-1.patch) 5b02c786-x86-Intel-mitigations-for-GPZ-SP4.patch (Replaces Spectre-v4-2.patch) 5b02c786-x86-msr-virtualise-SPEC_CTRL-SSBD.patch (Replaces Spectre-v4-3.patch) 5b0bc9da-x86-XPTI-fix-S3-resume.patch 5b0d2286-libxc-x86-PV-dont-hand-through-CPUID-leaf-0x80000008.patch 5b0d2d91-x86-suppress-sync-when-XPTI-off.patch 5b0d2dbc-x86-correct-default_xen_spec_ctrl.patch 5b0d2ddc-x86-CPUID-dont-override-tool-stack-hidden-STIBP.patch 5b150ef9-x86-fix-error-handling-of-pv-dr7-shadow.patch 5b21825d-1-x86-support-fully-eager-FPU-context-switching.patch (Replaces xsa267-1.patch) 5b21825d-2-x86-spec-ctrl-mitigations-for-LazyFPU.patch (Replaces xsa267-2.patch) 5b238b92-x86-HVM-account-for-fully-eager-FPU.patch 5b2b7172-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b31e004-x86-HVM-emul-attempts-FPU-set-fpu_initialised.patch 5b323e3c-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b34882d-x86-mm-dont-bypass-preemption-checks.patch (Replaces xsa264.patch) 5b348874-x86-refine-checks-in-DB-handler.patch (Replaces xsa265.patch) 5b348897-libxl-qemu_disk_scsi_drive_string-break-out-common.patch (Replaces xsa266-1-<>.patch) 5b3488a2-libxl-restore-passing-ro-to-qemu-for-SCSI-disks.patch (Replaces xsa266-2-<>.patch) 5b34891a-x86-HVM-dont-cause-NM-to-be-raised.patch 5b348954-x86-guard-against-NM.patch- Fix more build gcc8 related failures with xen.fuzz-_FORTIFY_SOURCE.patch- bsc#1098403 - fix regression introduced by changes for bsc#1079730 a PV domU without qcow2 and/or vfb has no qemu attached. Ignore QMP errors for PV domUs to handle PV domUs with and without an attached qemu-xen. xen.bug1079730.patch- bsc#1097521 - VUL-0: CVE-2018-12891: xen: preemption checks bypassed in x86 PV MM handling (XSA-264) xsa264.patch - bsc#1097522 - VUL-0: CVE-2018-12893: xen: x86: #DB exception safety check can be triggered by a guest (XSA-265) xsa265.patch - bsc#1097523 - VUL-0: CVE-2018-12892: xen: libxl fails to honour readonly flag on HVM emulated SCSI disks (XSA-266) xsa266-1-libxl-qemu_disk_scsi_drive_string-Break-out-common-p.patch xsa266-2-libxl-restore-passing-readonly-to-qemu-for-SCSI-disk.patch- bsc#1095242 - VUL-0: CVE-2018-3665: xen: Lazy FP Save/Restore (XSA-267) xsa267-1.patch xsa267-2.patch- bsc#1092543 - GCC 8: xen build fails gcc8-fix-warning-on-i586.patch- bsc#1092631 - VUL-0: CVE-2018-3639: xen: V4 – Speculative Store Bypass aka "Memory Disambiguation" (XSA-263) 5ad4923e-x86-correct-S3-resume-ordering.patch 5ad49293-x86-suppress-BTI-mitigations-around-S3.patch 5afc13ae-1-x86-read-MSR_ARCH_CAPABILITIES-once.patch 5afc13ae-2-x86-express-Xen-SPEC_CTRL-choice-as-variable.patch 5afc13ae-3-x86-merge-bti_ist_info-use_shadow_spec_ctrl.patch 5afc13ae-4-x86-fold-XEN_IBRS-ALTERNATIVES.patch 5afc13ae-5-x86-rename-bits-of-spec_ctrl-infrastructure.patch 5afc13ae-6-x86-elide-MSR_SPEC_CTRL-handling-in-idle.patch 5afc13ae-7-x86-split-X86_FEATURE_SC_MSR.patch 5afc13ae-8-x86-explicitly-set-Xen-default-SPEC_CTRL.patch 5afc13ae-9-x86-cpuid-improve-guest-policies-for-speculative.patch 5afc13ae-A-x86-introduce-spec-ctrl-cmdline-opt.patch Spectre-v4-1.patch Spectre-v4-2.patch Spectre-v4-3.patch- Always call qemus xen-save-devices-state in suspend/resume to fix migration with qcow2 images (bsc#1079730) libxl.Add-a-version-check-of-QEMU-for-QMP-commands.patch libxl.qmp-Tell-QEMU-about-live-migration-or-snapshot.patch xen.bug1079730.patch- bsc#1087289 - L3: Xen BUG at sched_credit.c:1663 5aeaeae4-introduce-vcpu_sleep_nosync_locked.patch 5aeaeaf0-sched-fix-races-in-vcpu-migration.patch - Upstream patches from Jan (bsc#1027519) 5ad600d4-x86-pv-introduce-x86emul_read_dr.patch 5ad600d4-x86-pv-introduce-x86emul_write_dr.patch 5ad8c3a7-x86-spec_ctrl-update-retpoline-decision-making.patch 5adda097-x86-HPET-fix-race-triggering-ASSERT.patch 5adda0d5-x86-HVM-never-retain-emulated-insn-cache.patch 5ae06fad-SVM-fix-intercepts-for-SYS-CALL-ENTER-MSRs.patch 5ae31917-x86-cpuidle-init-stats-lock-once.patch 5aeb2c57-x86-retval-checks-of-set-guest-trapbounce.patch 5af1daa9-1-x86-traps-fix-dr6-handing-in-DB-handler.patch (Replaces xsa260-1.patch) 5af1daa9-2-x86-pv-move-exception-injection-into-test_all_events.patch (Replaces xsa260-2.patch) 5af1daa9-3-x86-traps-use-IST-for-DB.patch (Replaces xsa260-3.patch) 5af1daa9-4-x86-traps-fix-handling-of-DB-in-hypervisor-context.patch (Replaces xsa260-4.patch) 5af1daa9-x86-HVM-guard-against-bogus-emulator-ioreq-state.patch (Replaces xsa262.patch) 5af1daa9-x86-vpt-support-IO-APIC-routed-intr.patch (Replaces xsa261.patch) 5af97999-viridian-cpuid-leaf-40000003.patch- Fixes related to Page Table Isolation (XPTI). bsc#1074562 XSA-254 5a6703cb-x86-move-invocations-of-hvm_flush_guest_tlbs.patch 5a9985bd-x86-invpcid-support.patch 5adde9ed-xpti-fix-double-fault-handling.patch 5aec7393-1-x86-xpti-avoid-copy.patch 5aec7393-2-x86-xpti-write-cr3.patch 5aec744a-3-x86-xpti-per-domain-flag.patch 5aec744a-4-x86-xpti-use-invpcid.patch 5aec744a-5-x86-xpti-no-global-pages.patch 5aec744a-6-x86-xpti-cr3-valid-flag.patch 5aec744a-7-x86-xpti-pv_guest_cr4_to_real_cr4.patch 5aec744b-8-x86-xpti-cr3-helpers.patch 5aec74a8-9-x86-xpti-use-pcid.patch- bsc#1092543 - GCC 8: xen build fails 5ac72a48-gcc8.patch 5ac72a5f-gcc8.patch 5ac72a64-gcc8.patch 5ac72a69-gcc8.patch 5ac72a6e-gcc8.patch 5ac72a74-gcc8.patch 5ac72a7b-gcc8.patch gcc8-inlining-failed.patch- Update to Xen 4.10.1 bug fix release (bsc#1027519) xen-4.10.1-testing-src.tar.bz2 disable-building-pv-shim.patch - Drop the following patches contained in the new tarball 5a21a77e-x86-pv-construct-d0v0s-GDT-properly.patch 5a2fda0d-x86-mb2-avoid-Xen-when-looking-for-module-crashkernel-pos.patch 5a2ffc1f-x86-mm-drop-bogus-paging-mode-assertion.patch 5a313972-x86-microcode-add-support-for-AMD-Fam17.patch 5a32bd79-x86-vmx-dont-use-hvm_inject_hw_exception-in-.patch 5a4caa5e-x86-IRQ-conditionally-preserve-access-perm.patch 5a4caa8c-x86-E820-don-t-overrun-array.patch 5a4e2bca-x86-free-msr_vcpu_policy-during-destruction.patch 5a4e2c2c-x86-upcall-inject-spurious-event-after-setting-vector.patch 5a4fd893-1-x86-break-out-alternative-asm-into-separate-header.patch 5a4fd893-2-x86-introduce-ALTERNATIVE_2-macros.patch 5a4fd893-3-x86-hvm-rename-update_guest_vendor-to-cpuid_policy_changed.patch 5a4fd893-4-x86-introduce-cpuid_policy_updated.patch 5a4fd893-5-x86-entry-remove-partial-cpu_user_regs.patch 5a4fd894-1-x86-rearrange-RESTORE_ALL-to-restore-in-stack-order.patch 5a4fd894-2-x86-hvm-use-SAVE_ALL-after-VMExit.patch 5a4fd894-3-x86-erase-guest-GPRs-on-entry-to-Xen.patch 5a4fd894-4-clarifications-to-wait-infrastructure.patch 5a534c78-x86-dont-use-incorrect-CPUID-values-for-topology.patch 5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4-updates.patch 5a5e2cff-x86-Meltdown-band-aid.patch 5a5e2d73-x86-Meltdown-band-aid-conditional.patch 5a5e3a4e-1-x86-support-compiling-with-indirect-branch-thunks.patch 5a5e3a4e-2-x86-support-indirect-thunks-from-asm.patch 5a5e3a4e-3-x86-report-speculative-mitigation-details.patch 5a5e3a4e-4-x86-AMD-set-lfence-as-Dispatch-Serialising.patch 5a5e3a4e-5-x86-introduce-alternative-indirect-thunks.patch 5a5e3a4e-6-x86-definitions-for-Indirect-Branch-Controls.patch 5a5e3a4e-7-x86-cmdline-opt-to-disable-IBRS-IBPB-STIBP.patch 5a5e459c-1-x86-SVM-offer-CPUID-faulting-to-AMD-HVM-guests.patch 5a5e459c-2-x86-report-domain-id-on-CPUID.patch 5a68bc16-x86-acpi-process-softirqs-logging-Cx.patch 5a69c0b9-x86-fix-GET_STACK_END.patch 5a6b36cd-1-x86-cpuid-handling-of-IBRS-IBPB-STIBP-and-IBRS-for-guests.patch 5a6b36cd-2-x86-msr-emulation-of-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-3-x86-migrate-MSR_SPEC_CTRL.patch 5a6b36cd-4-x86-hvm-permit-direct-access-to-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-5-x86-use-SPEC_CTRL-on-entry.patch 5a6b36cd-6-x86-clobber-RSB-RAS-on-entry.patch 5a6b36cd-7-x86-no-alternatives-in-NMI-MC-paths.patch 5a6b36cd-8-x86-boot-calculate-best-BTI-mitigation.patch 5a6b36cd-9-x86-issue-speculation-barrier.patch 5a6b36cd-A-x86-offer-Indirect-Branch-Controls-to-guests.patch 5a6b36cd-B-x86-clear-SPEC_CTRL-while-idle.patch 5a7b1bdd-x86-reduce-Meltdown-band-aid-IPI-overhead.patch 5a843807-x86-spec_ctrl-fix-bugs-in-SPEC_CTRL_ENTRY_FROM_INTR_IST.patch 5a856a2b-x86-emul-fix-64bit-decoding-of-segment-overrides.patch 5a856a2b-x86-use-32bit-xors-for-clearing-GPRs.patch 5a856a2b-x86-xpti-hide-almost-all-of-Xen-image-mappings.patch 5a8be788-x86-nmi-start-NMI-watchdog-on-CPU0-after-SMP.patch 5a95373b-x86-PV-avoid-leaking-other-guests-MSR_TSC_AUX.patch 5a95571f-memory-dont-implicitly-unpin-in-decrease-res.patch 5a95576c-gnttab-ARM-dont-corrupt-shared-GFN-array.patch 5a955800-gnttab-dont-free-status-pages-on-ver-change.patch 5a955854-x86-disallow-HVM-creation-without-LAPIC-emul.patch 5a956747-x86-HVM-dont-give-wrong-impression-of-WRMSR-success.patch 5a9eb7f1-x86-xpti-dont-map-stack-guard-pages.patch 5a9eb85c-x86-slightly-reduce-XPTI-overhead.patch 5a9eb890-x86-remove-CR-reads-from-exit-to-guest-path.patch 5aa2b6b9-cpufreq-ondemand-CPU-offlining-race.patch 5aaa9878-x86-vlapic-clear-TMR-bit-for-edge-triggered-intr.patch xsa258.patch xsa259.patch- bsc#1090820 - VUL-0: CVE-2018-8897: xen: x86: mishandling of debug exceptions (XSA-260) xsa260-1.patch xsa260-2.patch xsa260-3.patch xsa260-4.patch - bsc#1090822 - VUL-0: CVE-2018-10982: xen: x86 vHPET interrupt injection errors (XSA-261) xsa261.patch - bsc#1090823 - VUL-0: CVE-2018-10981: xen: qemu may drive Xen into unbounded loop (XSA-262) xsa262.patch- bsc#1089152 - VUL-0: CVE-2018-10472: xen: Information leak via crafted user-supplied CDROM (XSA-258) xsa258.patch - bsc#1089635 - VUL-0: CVE-2018-10471: xen: x86: PV guest may crash Xen with XPTI (XSA-259) xsa259.patch- Preserve xen-syms from xen-dbg.gz to allow processing vmcores with crash(1) (bsc#1087251)- Upstream patches from Jan (bsc#1027519) and fixes related to Page Table Isolation (XPTI). See also bsc#1074562 XSA-254 5a856a2b-x86-xpti-hide-almost-all-of-Xen-image-mappings.patch 5a9eb7f1-x86-xpti-dont-map-stack-guard-pages.patch 5a9eb85c-x86-slightly-reduce-XPTI-overhead.patch 5a9eb890-x86-remove-CR-reads-from-exit-to-guest-path.patch 5aa2b6b9-cpufreq-ondemand-CPU-offlining-race.patch 5aaa9878-x86-vlapic-clear-TMR-bit-for-edge-triggered-intr.patch- bsc#1072834 - Xen HVM: unchecked MSR access error: RDMSR from 0xc90 at rIP: 0xffffffff93061456 (native_read_msr+0x6/0x30) 5a956747-x86-HVM-dont-give-wrong-impression-of-WRMSR-success.patch - Upstream patches from Jan (bsc#1027519) 5a79d7ed-libxc-packed-initrd-dont-fail-domain-creation.patch 5a7b1bdd-x86-reduce-Meltdown-band-aid-IPI-overhead.patch 5a843807-x86-spec_ctrl-fix-bugs-in-SPEC_CTRL_ENTRY_FROM_INTR_IST.patch 5a856a2b-x86-emul-fix-64bit-decoding-of-segment-overrides.patch 5a856a2b-x86-use-32bit-xors-for-clearing-GPRs.patch 5a8be788-x86-nmi-start-NMI-watchdog-on-CPU0-after-SMP.patch 5a95373b-x86-PV-avoid-leaking-other-guests-MSR_TSC_AUX.patch 5a95571f-memory-dont-implicitly-unpin-in-decrease-res.patch (Replaces xsa252.patch) 5a95576c-gnttab-ARM-dont-corrupt-shared-GFN-array.patch (Replaces xsa255-1.patch) 5a955800-gnttab-dont-free-status-pages-on-ver-change.patch (Replaces xsa255-2.patch) 5a955854-x86-disallow-HVM-creation-without-LAPIC-emul.patch (Replaces xsa256.patch) - Drop xsa252.patch xsa255-1.patch xsa255-2.patch xsa256.patch- bsc#1080635 - VUL-0: CVE-2018-7540: xen: DoS via non-preemptable L3/L4 pagetable freeing (XSA-252) xsa252.patch - bsc#1080662 - VUL-0: CVE-2018-7541: xen: grant table v2 -> v1 transition may crash Xen (XSA-255) xsa255-1.patch xsa255-2.patch - bsc#1080634 - VUL-0: CVE-2018-7542: xen: x86 PVH guest without LAPIC may DoS the host (XSA-256) xsa256.patch- Remove stale systemd presets code for 13.2 and older- fate#324965 - add script, udev rule and systemd service to watch for vcpu online/offline events in a HVM domU They are triggered via xl vcpu-set domU N- Replace hardcoded xen with Name tag when refering to subpkgs- Make sure tools and tools-domU require libs from the very same build- tools-domU: Add support for qemu guest agent. New files 80-xen-channel-setup.rules and xen-channel-setup.sh configure a xen-pv-channel for use by the guest agent FATE#324963- Remove outdated /etc/xen/README*- bsc#1073961 - VUL-0: CVE-2018-5244: xen: x86: memory leak with MSR emulation (XSA-253) 5a4e2bca-x86-free-msr_vcpu_policy-during-destruction.patch - bsc#1074562 - VUL-0: CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 xen: Information leak via side effects of speculative execution (XSA-254). Includes Spectre v2 mitigation. 5a4caa5e-x86-IRQ-conditionally-preserve-access-perm.patch 5a4caa8c-x86-E820-don-t-overrun-array.patch 5a4e2c2c-x86-upcall-inject-spurious-event-after-setting-vector.patch 5a4fd893-1-x86-break-out-alternative-asm-into-separate-header.patch 5a4fd893-2-x86-introduce-ALTERNATIVE_2-macros.patch 5a4fd893-3-x86-hvm-rename-update_guest_vendor-to-cpuid_policy_changed.patch 5a4fd893-4-x86-introduce-cpuid_policy_updated.patch 5a4fd893-5-x86-entry-remove-partial-cpu_user_regs.patch 5a4fd894-1-x86-rearrange-RESTORE_ALL-to-restore-in-stack-order.patch 5a4fd894-2-x86-hvm-use-SAVE_ALL-after-VMExit.patch 5a4fd894-3-x86-erase-guest-GPRs-on-entry-to-Xen.patch 5a4fd894-4-clarifications-to-wait-infrastructure.patch 5a534c78-x86-dont-use-incorrect-CPUID-values-for-topology.patch 5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4-updates.patch 5a5e2cff-x86-Meltdown-band-aid.patch 5a5e2d73-x86-Meltdown-band-aid-conditional.patch 5a5e3a4e-1-x86-support-compiling-with-indirect-branch-thunks.patch 5a5e3a4e-2-x86-support-indirect-thunks-from-asm.patch 5a5e3a4e-3-x86-report-speculative-mitigation-details.patch 5a5e3a4e-4-x86-AMD-set-lfence-as-Dispatch-Serialising.patch 5a5e3a4e-5-x86-introduce-alternative-indirect-thunks.patch 5a5e3a4e-6-x86-definitions-for-Indirect-Branch-Controls.patch 5a5e3a4e-7-x86-cmdline-opt-to-disable-IBRS-IBPB-STIBP.patch 5a5e459c-1-x86-SVM-offer-CPUID-faulting-to-AMD-HVM-guests.patch 5a5e459c-2-x86-report-domain-id-on-CPUID.patch 5a68bc16-x86-acpi-process-softirqs-logging-Cx.patch 5a69c0b9-x86-fix-GET_STACK_END.patch 5a6b36cd-1-x86-cpuid-handling-of-IBRS-IBPB-STIBP-and-IBRS-for-guests.patch 5a6b36cd-2-x86-msr-emulation-of-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-3-x86-migrate-MSR_SPEC_CTRL.patch 5a6b36cd-4-x86-hvm-permit-direct-access-to-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-5-x86-use-SPEC_CTRL-on-entry.patch 5a6b36cd-6-x86-clobber-RSB-RAS-on-entry.patch 5a6b36cd-7-x86-no-alternatives-in-NMI-MC-paths.patch 5a6b36cd-8-x86-boot-calculate-best-BTI-mitigation.patch 5a6b36cd-9-x86-issue-speculation-barrier.patch 5a6b36cd-A-x86-offer-Indirect-Branch-Controls-to-guests.patch 5a6b36cd-B-x86-clear-SPEC_CTRL-while-idle.patch- Fix python3 deprecated atoi call (bsc#1067224) pygrub-python3-conversion.patch - Drop xenmon-python3-conversion.patch- bsc#1067317 - pass cache=writeback|unsafe|directsync to qemu, depending on the libxl disk settings libxl.add-option-to-disable-disk-cache-flushes-in-qdisk.patch- Remove libxl.LIBXL_DESTROY_TIMEOUT.debug.patch- bsc#1067224 - xen-tools have hard dependency on Python 2 build-python3-conversion.patch bin-python3-conversion.patch- bsc#1070165 - xen crashes after aborted localhost migration 5a2ffc1f-x86-mm-drop-bogus-paging-mode-assertion.patch - bsc#1035442 - L3: libxl: error: libxl.c:1676:devices_destroy_cb: libxl__devices_destroy failed 5a33a12f-domctl-improve-locking-during-domain-destruction.patch - Upstream patches from Jan (bsc#1027519) 5a21a77e-x86-pv-construct-d0v0s-GDT-properly.patch 5a2fda0d-x86-mb2-avoid-Xen-when-looking-for-module-crashkernel-pos.patch 5a313972-x86-microcode-add-support-for-AMD-Fam17.patch 5a32bd79-x86-vmx-dont-use-hvm_inject_hw_exception-in-.patch- Update to Xen 4.10.0 FCS (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Rebuild initrd if xen-tools-domU is updated- Update to Xen 4.10.0-rc8 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Increase the value of LIBXL_DESTROY_TIMEOUT from 10 to 100 seconds If many domUs shutdown in parallel the backends can not keep up Add some debug output to track how long backend shutdown takes (bsc#1035442) libxl.LIBXL_DESTROY_TIMEOUT.patch libxl.LIBXL_DESTROY_TIMEOUT.debug.patch- Adjust xenstore-run-in-studomain.patch to change the defaults in the code instead of changing the sysconfig template, to also cover the upgrade case- Update to Xen 4.10.0-rc6 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Since xen switched to Kconfig, building a debug hypervisor was done by default. Adjust make logic to build a non-debug hypervisor by default, and continue to provide one as xen-dbg.gz- fate#316614: set migration constraints from cmdline fix libxl.set-migration-constraints-from-cmdline.patch for xen-4.10- Document the suse-diskcache-disable-flush option in xl-disk-configuration(5) (bsc#879425,bsc#1067317)- Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468)- Update to Xen 4.10.0-rc5 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - fate#323663 - Run Xenstore in stubdomain xenstore-run-in-studomain.patch- bsc#1067224 - xen-tools have hard dependency on Python 2 pygrub-python3-conversion.patch xenmon-python3-conversion.patch migration-python3-conversion.patch xnloader.py xen2libvirt.py- Remove xendriverdomain.service (bsc#1065185) Driver domains must be configured manually with custom .service file- Update to Xen 4.10.0-rc3 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - Drop 59f31268-libxc-remove-stale-error-check-for-domain-size.patch- Adjust xen-dom0-modules.service to ignore errors (bsc#1065187)- fate#324052 Support migration of Xen HVM domains larger than 1TB 59f31268-libxc-remove-stale-error-check-for-domain-size.patch- Update to Xen 4.10.0-rc2 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Update to Xen 4.10.0-rc1 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - Drop patches included in new tarball 592fd5f0-stop_machine-fill-result-only-in-case-of-error.patch 596f257e-x86-fix-hvmemul_insn_fetch.patch 5982fd99-VT-d-don-t-panic-warn-on-iommu-no-igfx.patch 598c3630-VT-d-PI-disable-when-CPU-side-PI-is-off.patch 598c3706-cpufreq-only-stop-ondemand-governor-if-started.patch 5992f1e5-x86-grant-disallow-misaligned-PTEs.patch 5992f20d-gnttab-split-maptrack-lock-to-make-it-useful-again.patch 5992f233-gnttab-correct-pin-status-fixup-for-copy.patch 59958e76-gnttab-dont-use-possibly-unbounded-tail-calls.patch 59958ebf-gnttab-fix-transitive-grant-handling.patch 59958edd-gnttab-avoid-spurious-maptrack-handle-alloc-failures.patch 599da329-arm-mm-release-grant-lock-on-xatp1-error-paths.patch 59a01223-x86-check-for-alloc-errors-in-modify_xen_mappings.patch 59a0130c-x86-efi-dont-write-relocs-in-efi_arch_relocate_image-1st-pass.patch 59a9221f-VT-d-use-correct-BDF-for-VF-to-search-VT-d-unit.patch 59ae9177-x86-emul-fix-handling-of-unimplemented-Grp7-insns.patch 59aec335-x86emul-correct-VEX-W-handling-for-VPINSRD.patch 59aec375-x86emul-correct-VEX-L-handling-for-VCVTx2SI.patch 59afcea0-x86-introduce-and-use-setup_force_cpu_cap.patch 59b2a7f2-x86-HVM-correct-repeat-count-update-linear-phys.patch 59b7d664-mm-make-sure-node-is-less-than-MAX_NUMNODES.patch 59b7d69b-grant_table-fix-GNTTABOP_cache_flush-handling.patch 59b7d6c8-xenstore-dont-unlink-connection-object-twice.patch 59b7d6d9-gnttab-also-validate-PTE-perms-upon-destroy-replace.patch gcc7-arm.patch gcc7-mini-os.patch- bsc#1061084 - VUL-0: xen: page type reference leak on x86 (XSA-242) xsa242.patch - bsc#1061086 - VUL-0: xen: x86: Incorrect handling of self-linear shadow mappings with translated guests (XSA-243) xsa243.patch - bsc#1061087 - VUL-0: xen: x86: Incorrect handling of IST settings during CPU hotplug (XSA-244) xsa244.patch- bsc#1061077 - VUL-0: xen: DMOP map/unmap missing argument checks (XSA-238) xsa238.patch - bsc#1061080 - VUL-0: xen: hypervisor stack leak in x86 I/O intercept code (XSA-239) xsa239.patch - bsc#1061081 - VUL-0: xen: Unlimited recursion in linear pagetable de-typing (XSA-240) xsa240-1.patch xsa240-2.patch - bsc#1061082 - VUL-0: xen: Stale TLB entry due to page type release race (XSA-241) xsa241.patch- bsc#1061075 - VUL-0: xen: pin count / page reference race in grant table code (XSA-236) xsa236.patch - bsc#1061076 - VUL-0: xen: multiple MSI mapping issues on x86 (XSA-237) xsa237-1.patch xsa237-2.patch xsa237-3.patch xsa237-4.patch xsa237-5.patch- bsc#1056278 - VUL-0: xen: Missing NUMA node parameter verification (XSA-231) 59b7d664-mm-make-sure-node-is-less-than-MAX_NUMNODES.patch - bsc#1056280 - VUL-0: xen: Missing check for grant table (XSA-232) 59b7d69b-grant_table-fix-GNTTABOP_cache_flush-handling.patch - bsc#1056281 - VUL-0: xen: cxenstored: Race in domain cleanup (XSA-233) 59b7d6c8-xenstore-dont-unlink-connection-object-twice.patch - bsc#1056282 - VUL-0: xen: insufficient grant unmapping checks for x86 PV guests (XSA-234) 59b7d6d9-gnttab-also-validate-PTE-perms-upon-destroy-replace.patch - bsc#1055321 - VUL-0: xen: add-to-physmap error paths fail to release lock on ARM (XSA-235) 599da329-arm-mm-release-grant-lock-on-xatp1-error-paths.patch - Upstream patches from Jan (bsc#1027519) 59a01223-x86-check-for-alloc-errors-in-modify_xen_mappings.patch 59a0130c-x86-efi-dont-write-relocs-in-efi_arch_relocate_image-1st-pass.patch 59a9221f-VT-d-use-correct-BDF-for-VF-to-search-VT-d-unit.patch 59ae9177-x86-emul-fix-handling-of-unimplemented-Grp7-insns.patch 59aec335-x86emul-correct-VEX-W-handling-for-VPINSRD.patch 59aec375-x86emul-correct-VEX-L-handling-for-VCVTx2SI.patch 59afcea0-x86-introduce-and-use-setup_force_cpu_cap.patch 59b2a7f2-x86-HVM-correct-repeat-count-update-linear-phys.patch - Dropped gcc7-xen.patch- bsc#1057358 - Cannot Boot into SLES12.3 with Xen hypervisor when Secure Boot is Enabled xen.spec- bsc#1055695 - XEN: 11SP4 and 12SP3 HVM guests can not be restored update from v6 to v9 to cover more cases for ballooned domUs libxc.sr.superpage.patch- bsc#1026236 - remove suse_vtsc_tolerance= cmdline option for Xen drop the patch because it is not upstream acceptable remove xen.suse_vtsc_tolerance.patch- bsc#1055695 - XEN: 11SP4 and 12SP3 HVM guests can not be restored after the save using xl stack libxc.sr.superpage.patch- Unignore gcc-PIE the toolstack disables PIE for firmware builds as needed- Upstream patches from Jan (bsc#1027519) 592fd5f0-stop_machine-fill-result-only-in-case-of-error.patch 596f257e-x86-fix-hvmemul_insn_fetch.patch 5982fd99-VT-d-don-t-panic-warn-on-iommu-no-igfx.patch 598c3630-VT-d-PI-disable-when-CPU-side-PI-is-off.patch 598c3706-cpufreq-only-stop-ondemand-governor-if-started.patch 5992f1e5-x86-grant-disallow-misaligned-PTEs.patch (Replaces xsa227.patch) 5992f20d-gnttab-split-maptrack-lock-to-make-it-useful-again.patch (Replaces xsa228.patch) 5992f233-gnttab-correct-pin-status-fixup-for-copy.patch (Replaces xsa230.patch) 59958e76-gnttab-dont-use-possibly-unbounded-tail-calls.patch (Replaces xsa226-1.patch) 59958ebf-gnttab-fix-transitive-grant-handling.patch (Replaces xsa226-2.patch) 59958edd-gnttab-avoid-spurious-maptrack-handle-alloc-failures.patch- bsc#1044974 - xen-tools require python-pam xen.spec- Clean up spec file errors and a few warnings. (bsc#1027519) - Removed conditional 'with_systemd' and some old deprecated 'sles_version' checks. xen.spec- Remove use of brctl utiltiy from supportconfig plugin FATE#323639- Use upstream variant of mini-os __udivmoddi4 change gcc7-mini-os.patch- fate#323639 Move bridge-utils to legacy replace-obsolete-network-configuration-commands-in-s.patch- bsc#1052686 - VUL-0: xen: grant_table: possibly premature clearing of GTF_writing / GTF_reading (XSA-230) xsa230.patch- bsc#1035231 - migration of HVM domU does not use superpages on destination dom0 libxc.sr.superpage.patch- bsc#1051787 - VUL-0: CVE-2017-12135: xen: possibly unbounded recursion in grant table code (XSA-226) xsa226-1.patch xsa226-2.patch - bsc#1051788 - VUL-0: CVE-2017-12137: xen: x86: PV privilege escalation via map_grant_ref (XSA-227) xsa227.patch - bsc#1051789 - VUL-0: CVE-2017-12136: xen: grant_table: Race conditions with maptrack free list handling (XSA-228) xsa228.patch- Add a supportconfig plugin xen-supportconfig FATE#323661- bsc#1026236 - add suse_vtsc_tolerance= cmdline option for Xen To avoid emulation of TSC access from a domU after live migration add a global tolerance for the measured host kHz xen.suse_vtsc_tolerance.patch- fate#323662 Drop qemu-dm from xen-tools package The following tarball and patches have been removed qemu-xen-traditional-dir-remote.tar.bz2 VNC-Support-for-ExtendedKeyEvent-client-message.patch 0001-net-move-the-tap-buffer-into-TAPState.patch 0002-net-increase-tap-buffer-size.patch 0003-e1000-fix-access-4-bytes-beyond-buffer-end.patch 0004-e1000-secrc-support.patch 0005-e1000-multi-buffer-packet-support.patch 0006-e1000-clear-EOP-for-multi-buffer-descriptors.patch 0007-e1000-verify-we-have-buffers-upfront.patch 0008-e1000-check-buffer-availability.patch CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch CVE-2015-4037-qemut-smb-config-dir-name.patch CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch CVE-2016-7908-qemut-net-Infinite-loop-in-mcf_fec_do_tx.patch CVE-2016-7909-qemut-net-pcnet-infinite-loop-in-pcnet_rdra_addr.patch CVE-2016-8667-qemut-dma-rc4030-divide-by-zero-error-in-set_next_tick.patch CVE-2016-8669-qemut-char-divide-by-zero-error-in-serial_update_parameters.patch CVE-2016-8910-qemut-net-rtl8139-infinite-loop-while-transmit-in-Cplus-mode.patch CVE-2016-9921-qemut-display-cirrus_vga-divide-by-zero-in-cirrus_do_copy.patch CVE-2017-6505-qemut-usb-an-infinite-loop-issue-in-ohci_service_ed_list.patch CVE-2017-8309-qemut-audio-host-memory-leakage-via-capture-buffer.patch CVE-2017-9330-qemut-usb-ohci-infinite-loop-due-to-incorrect-return-value.patch blktap.patch cdrom-removable.patch xen-qemu-iscsi-fix.patch qemu-security-etch1.patch xen-disable-qemu-monitor.patch xen-hvm-default-bridge.patch qemu-ifup-set-mtu.patch ioemu-vnc-resize.patch capslock_enable.patch altgr_2.patch log-guest-console.patch bdrv_open2_fix_flags.patch bdrv_open2_flags_2.patch ioemu-7615-qcow2-fix-alloc_cluster_link_l2.patch qemu-dm-segfault.patch bdrv_default_rwflag.patch kernel-boot-hvm.patch ioemu-watchdog-support.patch ioemu-watchdog-linkage.patch ioemu-watchdog-ib700-timer.patch ioemu-hvm-pv-support.patch pvdrv_emulation_control.patch ioemu-disable-scsi.patch ioemu-disable-emulated-ide-if-pv.patch xenpaging.qemu.flush-cache.patch ioemu-devicemodel-include.patch - Cleanup spec file and remove unused KMP patches kmp_filelist supported_module.patch xen_pvonhvm.xen_emul_unplug.patch- bsc#1002573 - Optimize LVM functions in block-dmmd block-dmmd- Record initial Xen dmesg in /var/log/xen/xen-boot.log for supportconfig. Keep previous log in /var/log/xen/xen-boot.prev.log- Remove storytelling from description in xen.rpm- Update to Xen 4.9.0 FCS (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update block-dmmd script (bsc#1002573) block-dmmd- Update to Xen 4.9.0-rc8+ (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 gcc7-arm.patch - Drop gcc7-error-xenpmd.patch- Update to Xen 4.9.0-rc8 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1042160 - VUL-1: CVE-2017-9330: xen: usb: ohci: infinite loop due to incorrect return value CVE-2017-9330-qemut-usb-ohci-infinite-loop-due-to-incorrect-return-value.patch- bsc#1037243 - VUL-1: CVE-2017-8309: xen: audio: host memory leakage via capture buffer CVE-2017-8309-qemut-audio-host-memory-leakage-via-capture-buffer.patch- Update to Xen 4.9.0-rc7 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update to Xen 4.9.0-rc6 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1031343 - xen fails to build with GCC 7 gcc7-mini-os.patch gcc7-xen.patch- bsc#1031343 - xen fails to build with GCC 7 gcc7-error-xenpmd.patch- Update to Xen 4.9.0-rc5 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 - Drop xen-tools-pkgconfig-xenlight.patch- bsc#1037779 - xen breaks kexec-tools build xen-tools-pkgconfig-xenlight.patch- Update to Xen 4.9.0-rc4 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1036146 - sles12sp2 xen VM dumps core to wrong path xen.spec- Update to Xen 4.9.0-rc3 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 aarch64-maybe-uninitialized.patch- Update to Xen 4.9.0-rc2 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update to Xen 4.9.0-rc1 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 ioemu-devicemodel-include.patch - Dropped patches contained in new tarball xen-4.8.0-testing-src.tar.bz2 0001-xenstore-let-write_node-and-some-callers-return-errn.patch 0002-xenstore-undo-function-rename.patch 0003-xenstore-rework-of-transaction-handling.patch 584806ce-x86emul-correct-PUSHF-POPF.patch 584fc649-fix-determining-when-domain-creation-is-complete.patch 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch 58510cac-x86emul-MOVNTI-no-REP-prefixes.patch 58526ccc-x86emul-64bit-ignore-most-segment-bases-in-align-check.patch 5853ed37-VT-d-correct-dma_msi_set_affinity.patch 5853ee07-x86emul-CMPXCHG16B-aligned-operand.patch 58580060-x86-emul-correct-SYSCALL-eflags-handling.patch 585aa3c5-x86-force-EFLAGS-IF-on-upon-exit-to-PV.patch 585aa407-x86-HVM-NULL-check-before-using-VMFUNC-hook.patch 585bd5fe-x86-emul-correct-VMFUNC-return-value-handling.patch 586ba81c-x86-cpu-dont-update-this_cpu-for-guest-get_cpu_vendor.patch 587d04d6-x86-xstate-fix-array-overrun-with-LWP.patch 587de4a9-x86emul-VEX-B-ignored-in-compat-mode.patch 5882129d-x86emul-LOCK-check-adjustments.patch 58821300-x86-segment-attribute-handling.patch 58873c1f-x86emul-correct-FPU-stub-asm-constraints.patch 58873c80-x86-hvm-do-not-set-msr_tsc_adjust-on-.patch 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5887888f-credit2-never-consider-CPUs-outside-of-pool.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5888b1b3-x86-emulate-dont-assume-addr_size-32-implies-protmode.patch 5899cbd9-EPT-allow-wrcomb-MMIO-mappings-again.patch 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch 58a44771-IOMMU-always-call-teardown-callback.patch 58a48ccc-x86-fix-p2m_flush_table-for-non-nested.patch 58a59f4b-libxl-correct-xenstore-entry-for-empty-cdrom.patch 58a70d94-VMX-fix-VMCS-race-on-cswitch-paths.patch 58ac1f3f-VMX-dont-leak-host-syscall-MSRs.patch 58b5a2de-x86-correct-Xens-idea-of-its-memory-layout.patch 58b6fd42-credit2-always-mark-a-tickled-pCPU-as-tickled.patch 58b6fd42-credit2-dont-miss-accounting-during-credit-reset.patch 58cbf682-x86-EFI-avoid-overrunning-mb_modules.patch 58cf9200-x86-EFI-avoid-IOMMU-faults-on-tail-gap.patch 58cf9260-x86-EFI-avoid-Xen-when-looking-for-mod-kexec-pos.patch 58cf9277-x86-time-dont-use-vTSC-if-host-guest-freqs-match.patch 58d25ea2-xenstore-add-missing-checks-for-allocation-failure.patch 58d91365-sched-dont-call-wrong-hook-via-VCPU2OP.patch CVE-2017-2615-qemut-display-cirrus-oob-access-while-doing-bitblt-copy-backward-mode.patch CVE-2017-2620-xsa209-qemut-cirrus_bitblt_cputovideo-does-not-check-if-memory-region-safe.patch glibc-2.25-compatibility-fix.patch xs-09-add_change_node-params.patch xs-10-call-add_change_node.patch xs-11-tdb-record-header.patch xs-12-node-gen-count.patch xs-13-read-directory-part-support.patch xs-14-command-array.patch xs-15-command-return-val.patch xs-16-function-static.patch xs-17-arg-parsing.patch xs-18-default-buffer.patch xs-19-handle-alloc-failures.patch xs-20-tdb-version.patch xs-21-empty-tdb-database.patch xs-22-reopen_log-fix.patch xs-23-XS_DEBUG-rename.patch xs-24-xenstored_control.patch xs-25-control-enhance.patch xs-26-log-control.patch xs-27-memory-report.patch xs-28-remove-talloc-report.patch xs-29-define-off_t.patch xsa206-0001-xenstored-apply-a-write-transaction-rate-limit.patch xsa206-0002-xenstored-Log-when-the-write-transaction-rate-limit.patch- bsc#1022703 - Xen HVM guest with OVMF hangs with unattached CDRom 58a59f4b-libxl-correct-xenstore-entry-for-empty-cdrom.patch- bsc#1015348 - L3: libvirtd does not start during boot suse-xendomains-service.patch- bsc#1014136 - Partner-L3: kdump can't dump a kernel on SLES12-SP2 with Xen hypervisor. 58cf9260-x86-EFI-avoid-Xen-when-looking-for-mod-kexec-pos.patch - bsc#1026236 - L3: Paravirtualized vs. fully virtualized migration - latter one much faster 58cf9277-x86-time-dont-use-vTSC-if-host-guest-freqs-match.patch - Upstream patch from Jan 58cbf682-x86-EFI-avoid-overrunning-mb_modules.patch 58cf9200-x86-EFI-avoid-IOMMU-faults-on-tail-gap.patch 58d91365-sched-dont-call-wrong-hook-via-VCPU2OP.patch- bsc#1022555 - L3: Timeout in "execution of /etc/xen/scripts/block add" 58d25ea2-xenstore-add-missing-checks-for-allocation-failure.patch 0001-xenstore-let-write_node-and-some-callers-return-errn.patch 0002-xenstore-undo-function-rename.patch 0003-xenstore-rework-of-transaction-handling.patch - bsc#1030144 - VUL-0: xen: xenstore denial of service via repeated update (XSA-206) xsa206-0001-xenstored-apply-a-write-transaction-rate-limit.patch xsa206-0002-xenstored-Log-when-the-write-transaction-rate-limit.patch - bsc#1029827 - Forward port xenstored xs-09-add_change_node-params.patch xs-10-call-add_change_node.patch xs-11-tdb-record-header.patch xs-12-node-gen-count.patch xs-13-read-directory-part-support.patch xs-14-command-array.patch xs-15-command-return-val.patch xs-16-function-static.patch xs-17-arg-parsing.patch xs-18-default-buffer.patch xs-19-handle-alloc-failures.patch xs-20-tdb-version.patch xs-21-empty-tdb-database.patch xs-22-reopen_log-fix.patch xs-23-XS_DEBUG-rename.patch xs-24-xenstored_control.patch xs-25-control-enhance.patch xs-26-log-control.patch xs-27-memory-report.patch xs-28-remove-talloc-report.patch xs-29-define-off_t.patch- bsc#1029128 - fix make xen to really produce xen.efi with gcc48- bsc#1028235 - VUL-0: CVE-2017-6505: xen: qemu: usb: an infinite loop issue in ohci_service_ed_list CVE-2017-6505-qemut-usb-an-infinite-loop-issue-in-ohci_service_ed_list.patch - Upstream patches from Jan (bsc#1027519) 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5899cbd9-EPT-allow-wrcomb-MMIO-mappings-again.patch 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch 58a44771-IOMMU-always-call-teardown-callback.patch 58a48ccc-x86-fix-p2m_flush_table-for-non-nested.patch 58a70d94-VMX-fix-VMCS-race-on-cswitch-paths.patch 58ac1f3f-VMX-dont-leak-host-syscall-MSRs.patch 58b5a2de-x86-correct-Xens-idea-of-its-memory-layout.patch 58b6fd42-credit2-always-mark-a-tickled-pCPU-as-tickled.patch 58b6fd42-credit2-dont-miss-accounting-during-credit-reset.patch- bsc#1027654 - XEN fails to build against glibc 2.25 glibc-2.25-compatibility-fix.patch libxl.pvscsi.patch- fate#316613: Refresh and enable libxl.pvscsi.patch- bsc#1024834 - VUL-0: CVE-2017-2620: xen: cirrus_bitblt_cputovideo does not check if memory region is safe (XSA-209) CVE-2017-2620-xsa209-qemut-cirrus_bitblt_cputovideo-does-not-check-if-memory-region-safe.patch- bsc#1023948 - [pvusb][sles12sp3][openqa] Segmentation fault happened when adding usbctrl devices via xl 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch- Upstream patches from Jan (bsc#1027519) 587d04d6-x86-xstate-fix-array-overrun-with-LWP.patch 587de4a9-x86emul-VEX-B-ignored-in-compat-mode.patch 5882129d-x86emul-LOCK-check-adjustments.patch 58821300-x86-segment-attribute-handling.patch 58873c1f-x86emul-correct-FPU-stub-asm-constraints.patch 58873c80-x86-hvm-do-not-set-msr_tsc_adjust-on-.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5887888f-credit2-never-consider-CPUs-outside-of-pool.patch 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5888b1b3-x86-emulate-dont-assume-addr_size-32-implies-protmode.patch- bsc#1023004 - VUL-0: CVE-2017-2615: qemu: display: cirrus: oob access while doing bitblt copy backward mode CVE-2017-2615-qemut-display-cirrus-oob-access-while-doing-bitblt-copy-backward-mode.patch- fate#322313 and fate#322150 require the acpica package ported to aarch64 which Xen 4.8 needs to build. Temporarily disable aarch64 until these fates are complete. xen.spec- bsc#1021952 - Virutalization/xen: Bug xen-tools missing /usr/bin/domu-xenstore; guests fail to launch tmp_build.patch xen.spec- No systemd presets for 42.3+ and SLE12SP3+ (bsc#1012842)- bsc#1007224 - broken symlinks in /usr/share/doc/packages/xen/misc/ xen.spec- 585aa3c5-x86-force-EFLAGS-IF-on-upon-exit-to-PV.patch Replaces xsa202.patch (bsc#1014298) - 585aa407-x86-HVM-NULL-check-before-using-VMFUNC-hook.patch Replaces xsa203.patch (bsc#1014300) - 58580060-x86-emul-correct-SYSCALL-eflags-handling.patch Replaces xsa204.patch (bsc#1016340) - Upstream patches from Jan 58526ccc-x86emul-64bit-ignore-most-segment-bases-in-align-check.patch 5853ed37-VT-d-correct-dma_msi_set_affinity.patch 5853ee07-x86emul-CMPXCHG16B-aligned-operand.patch 585bd5fe-x86-emul-correct-VMFUNC-return-value-handling.patch 586ba81c-x86-cpu-dont-update-this_cpu-for-guest-get_cpu_vendor.patch- bsc#1015169 - VUL-0: CVE-2016-9921, CVE-2016-9922: xen: qemu: display: cirrus_vga: a divide by zero in cirrus_do_copy CVE-2016-9921-qemut-display-cirrus_vga-divide-by-zero-in-cirrus_do_copy.patch- bsc#1016340 - VUL-0: CVE-2016-10013: xen: x86: Mishandling of SYSCALL singlestep during emulation (XSA-204) xsa204.patch- bsc#1012651 - VUL-0: CVE-2016-9932: xen: x86 CMPXCHG8B emulation fails to ignore operand size override (XSA-200) 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch- bsc#1014298 - VUL-0: CVE-2016-10024: xen: x86 PV guests may be able to mask interrupts (XSA-202) xsa202.patch - bsc#1014300 - VUL-0: CVE-2016-10025: xen: x86: missing NULL pointer check in VMFUNC emulation (XSA-203) xsa203.patch - Upstream patches from Jan 584806ce-x86emul-correct-PUSHF-POPF.patch 584fc649-fix-determining-when-domain-creation-is-complete.patch 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch 58510cac-x86emul-MOVNTI-no-REP-prefixes.patch- Update to Xen 4.8 FCS xen-4.8.0-testing-src.tar.bz2 - Dropped xen-4.7.1-testing-src.tar.bz2 0001-libxc-Rework-extra-module-initialisation.patch 0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch 0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch 0004-firmware-makefile-install-BIOS-blob.patch 0005-libxl-Load-guest-BIOS-from-file.patch 0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch 0007-hvmloader-Grab-the-hvm_start_info-pointer.patch 0008-hvmloader-Locate-the-BIOS-blob.patch 0009-hvmloader-Check-modules-whereabouts-in-perform_tests.patch 0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch 0011-hvmloader-Load-OVMF-from-modules.patch 0012-hvmloader-Specific-bios_load-function-required.patch 0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch 0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch 57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch 576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 5769106e-x86-generate-assembler-equates-for-synthesized.patch 57a1e603-x86-time-adjust-local-system-time-initialization.patch 57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch 57a30261-x86-support-newer-Intel-CPU-models.patch 5810a9cc-x86-emul-Correct-decoding-of-SReg3-operands.patch 581b2c3b-x86-emul-reject-LGDT-LIDT-with-non-canonical-addresses.patch 581b647a-x86emul-L-S-G-I-DT-ignore-opsz-overrides-in-64-bit-mode.patch 58249392-x86-svm-dont-clobber-eax-edx-if-RDMSR-intercept-fails.patch 582c35d6-x86-vmx-correct-long-mode-check-in-vmx_cpuid_intercept.patch 582c35ee-x86-traps-dont-call-hvm_hypervisor_cpuid_leaf-for-PV.patch 58343dc2-x86-hvm-Fix-the-handling-of-non-present-segments.patch 58343df8-x86-HVM-dont-load-LDTR-with-VM86-mode-attrs-during-task-switch.patch 58343e24-x86-PV-writes-of-fs-and-gs-base-MSRs-require-canonical-addresses.patch 58343e9e-libelf-fix-stack-memory-leak-when-loading-32-bit-symbol-tables.patch 58343ec2-x86emul-fix-huge-bit-offset-handling.patch 58343f29-x86-emul-correct-the-IDT-entry-calculation-in-inject_swint.patch 58343f44-x86-svm-fix-injection-of-software-interrupts.patch 58343f79-pygrub-Properly-quote-results-when-returning-them-to-the-caller.patch CVE-2016-9381-xsa197-qemut.patch CVE-2016-9637-xsa199-qemut.patch- bsc#1011652 - VUL-0: xen: qemu ioport array overflow CVE-2016-9637-xsa199-qemut.patch- bsc#1009100 - VUL-0: CVE-2016-9386: XSA-191: xen: x86 null segments not always treated as unusable 58343dc2-x86-hvm-Fix-the-handling-of-non-present-segments.patch - bsc#1009103 - VUL-0: CVE-2016-9382: XSA-192: xen: x86 task switch to VM86 mode mis-handled 58343df8-x86-HVM-dont-load-LDTR-with-VM86-mode-attrs-during-task-switch.patch - bsc#1009104 - VUL-0: CVE-2016-9385: XSA-193: xen: x86 segment base write emulation lacking canonical address checks 58343e24-x86-PV-writes-of-fs-and-gs-base-MSRs-require-canonical-addresses.patch - bsc#1009105 - VUL-0: CVE-2016-9384: XSA-194: xen: guest 32-bit ELF symbol table load leaking host data 58343e9e-libelf-fix-stack-memory-leak-when-loading-32-bit-symbol-tables.patch - bsc#1009107 - VUL-0: CVE-2016-9383: XSA-195: xen: x86 64-bit bit test instruction emulation broken 58343ec2-x86emul-fix-huge-bit-offset-handling.patch - bsc#1009108 - VUL-0: CVE-2016-9377,CVE-2016-9378: XSA-196: xen: x86 software interrupt injection mis-handled 58343f29-x86-emul-correct-the-IDT-entry-calculation-in-inject_swint.patch 58343f44-x86-svm-fix-injection-of-software-interrupts.patch - bsc#1009109 - VUL-0: CVE-2016-9381: XSA-197: xen: qemu incautious about shared ring processing CVE-2016-9381-xsa197-qemut.patch - bsc#1009111 - VUL-0: CVE-2016-9379,CVE-2016-9380: XSA-198: xen: delimiter injection vulnerabilities in pygrub 58343f79-pygrub-Properly-quote-results-when-returning-them-to-the-caller.patch - Upstream patches from Jan 581b2c3b-x86-emul-reject-LGDT-LIDT-with-non-canonical-addresses.patch 581b647a-x86emul-L-S-G-I-DT-ignore-opsz-overrides-in-64-bit-mode.patch 58249392-x86-svm-dont-clobber-eax-edx-if-RDMSR-intercept-fails.patch 582c35d6-x86-vmx-correct-long-mode-check-in-vmx_cpuid_intercept.patch 582c35ee-x86-traps-dont-call-hvm_hypervisor_cpuid_leaf-for-PV.patch- Update to Xen Version 4.7.1 xen-4.7.1-testing-src.tar.bz2 - Dropped patches contained in new tarball xen-4.7.0-testing-src.tar.bz2 575e9ca0-nested-vmx-Validate-host-VMX-MSRs-before-accessing-them.patch 57640448-xen-sched-use-default-scheduler-upon-an-invalid-sched.patch 57973099-have-schedulers-revise-initial-placement.patch 579730e6-remove-buggy-initial-placement-algorithm.patch 57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch 57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch 57ac6316-don-t-restrict-DMA-heap-to-node-0.patch 57b71fc5-x86-EFI-don-t-apply-relocations-to-l-2-3-_bootmap.patch 57b7447b-dont-permit-guest-to-populate-PoD-pages-for-itself.patch 57c4412b-x86-HVM-add-guarding-logic-for-VMX-specific-code.patch 57c57f73-libxc-correct-max_pfn-calculation-for-saving-domain.patch 57c805bf-x86-levelling-restrict-non-architectural-OSXSAVE-handling.patch 57c805c1-x86-levelling-pass-vcpu-to-ctxt_switch_levelling.patch 57c805c3-x86-levelling-provide-architectural-OSXSAVE-handling.patch 57c82be2-x86-32on64-adjust-call-gate-emulation.patch 57c93e52-fix-error-in-libxl_device_usbdev_list.patch 57c96df3-credit1-fix-a-race-when-picking-initial-pCPU.patch 57c96e2c-x86-correct-PT_NOTE-file-position.patch 57cfed43-VMX-correct-feature-checks-for-MPX-and-XSAVES.patch 57d1563d-x86-32on64-don-t-allow-recursive-page-tables-from-L3.patch 57d15679-x86-emulate-Correct-boundary-interactions-of-emulated-insns.patch 57d1569a-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch 57d18642-hvm-fep-Allow-test-insns-crossing-1-0-boundary.patch 57d18642-x86-segment-Bounds-check-accesses-to-emulation-ctxt-seg_reg.patch 57d7ca5f-x86-domctl-fix-TOCTOU-race-in-XEN_DOMCTL_getvcpuextstate.patch 57d7ca64-x86-domctl-fix-migration-of-guests-not-using-xsave.patch 57da8883-credit1-fix-mask-to-be-used-for-tickling.patch 57da8883-credit2-properly-schedule-migration-of-running-vcpu.patch 57dfb1c5-x86-Intel-hide-CPUID-faulting-capability-from-guests.patch 57e93e1d-x86emul-correct-loading-of-ss.patch 57e93e4a-x86emul-don-t-allow-null-selector-for-LTR.patch 57e93e89-x86-AMD-apply-erratum-665-workaround.patch 57ee6cbc-credit1-return-time-remaining-to-limit-as-next-timeslice.patch 57f3a8ee-x86emul-honor-guest-CR0-TS-and-CR0-EM.patch 57fb6a91-x86-defer-not-present-segment-checks.patch 5800c51d-x86-hvm-Clobber-cs-L-when-LME-becomes-set.patch 5800caec-x86emul-fix-pushing-of-selector-registers.patch 5800cb06-x86-Viridian-don-t-depend-on-undefined-register-state.patch 580e29f9-x86-MISALIGNSSE-feature-depends-on-SSE.patch 57dfb2ff-x86-Intel-Broadwell-no-PKG_C8-10_RESIDENCY-MSRs.patch- bsc#1004981 - Xen RPM doesn't contain debug hypervisor for EFI systems xen.spec- bsc#1000106 - VUL-0: CVE-2016-7777: xen: CR0.TS and CR0.EM not always honored for x86 HVM guests (XSA-190) 57f3a8ee-x86emul-honor-guest-CR0-TS-and-CR0-EM.patch - bsc#996191 - [XEN][acpi]residency -n 88 -c will cause xen panic on broadwell-ep 57dfb2ff-x86-Intel-Broadwell-no-PKG_C8-10_RESIDENCY-MSRs.patch - Upstream patches from Jan 57d7ca5f-x86-domctl-fix-TOCTOU-race-in-XEN_DOMCTL_getvcpuextstate.patch 57d7ca64-x86-domctl-fix-migration-of-guests-not-using-xsave.patch 57da8883-credit1-fix-mask-to-be-used-for-tickling.patch 57da8883-credit2-properly-schedule-migration-of-running-vcpu.patch 57dfb1c5-x86-Intel-hide-CPUID-faulting-capability-from-guests.patch 57e93e1d-x86emul-correct-loading-of-ss.patch 57e93e4a-x86emul-don-t-allow-null-selector-for-LTR.patch 57e93e89-x86-AMD-apply-erratum-665-workaround.patch 57ee6cbc-credit1-return-time-remaining-to-limit-as-next-timeslice.patch 57fb6a91-x86-defer-not-present-segment-checks.patch 5800c51d-x86-hvm-Clobber-cs-L-when-LME-becomes-set.patch 5800caec-x86emul-fix-pushing-of-selector-registers.patch 5800cb06-x86-Viridian-don-t-depend-on-undefined-register-state.patch 580e29f9-x86-MISALIGNSSE-feature-depends-on-SSE.patch 5810a9cc-x86-emul-Correct-decoding-of-SReg3-operands.patch- bsc#1007941 - Xen tools limit the number of vcpus to 256 when the system has 384 xen-arch-kconfig-nr_cpus.patch- bsc#1007157 - VUL-0: CVE-2016-8910: xen: net: rtl8139: infinite loop while transmit in C+ mode CVE-2016-8910-qemut-net-rtl8139-infinite-loop-while-transmit-in-Cplus-mode.patch- bsc#1005004 - CVE-2016-8667: xen: dma: rc4030 divide by zero error in set_next_tick CVE-2016-8667-qemut-dma-rc4030-divide-by-zero-error-in-set_next_tick.patch - bsc#1005005 - VUL-0: CVE-2016-8669: xen: char: divide by zero error in serial_update_parameters CVE-2016-8669-qemut-char-divide-by-zero-error-in-serial_update_parameters.patch- bsc#1003030 - VUL-0: CVE-2016-7908: xen: net: Infinite loop in mcf_fec_do_tx CVE-2016-7908-qemut-net-Infinite-loop-in-mcf_fec_do_tx.patch - bsc#1003032 - VUL-0: CVE-2016-7909: xen: net: pcnet: infinite loop in pcnet_rdra_addr CVE-2016-7909-qemut-net-pcnet-infinite-loop-in-pcnet_rdra_addr.patch- bsc#995785 - VUL-0: CVE-2016-7092: xen: x86: Disallow L3 recursive pagetable for 32-bit PV guests (XSA-185) 57d1563d-x86-32on64-don-t-allow-recursive-page-tables-from-L3.patch - bsc#995789 - VUL-0: CVE-2016-7093: xen: x86: Mishandling of instruction pointer truncation during emulation (XSA-186) 57d15679-x86-emulate-Correct-boundary-interactions-of-emulated-insns.patch 57d18642-hvm-fep-Allow-test-insns-crossing-1-0-boundary.patch - bsc#995792 - VUL-0: CVE-2016-7094: xen: x86 HVM: Overflow of sh_ctxt->seg_reg[] (XSA-187) 57d1569a-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch 57d18642-x86-segment-Bounds-check-accesses-to-emulation-ctxt-seg_reg.patch - bsc#991934 - xen hypervisor crash in csched_acct 57c96df3-credit1-fix-a-race-when-picking-initial-pCPU.patch - Upstream patches from Jan 57c4412b-x86-HVM-add-guarding-logic-for-VMX-specific-code.patch 57c57f73-libxc-correct-max_pfn-calculation-for-saving-domain.patch 57c805bf-x86-levelling-restrict-non-architectural-OSXSAVE-handling.patch 57c805c1-x86-levelling-pass-vcpu-to-ctxt_switch_levelling.patch 57c805c3-x86-levelling-provide-architectural-OSXSAVE-handling.patch 57c82be2-x86-32on64-adjust-call-gate-emulation.patch 57c96e2c-x86-correct-PT_NOTE-file-position.patch 57cfed43-VMX-correct-feature-checks-for-MPX-and-XSAVES.patch- bsc#979002 - add 60-persistent-xvd.rules and helper script also to initrd, add the relevant dracut helper- bnc#953518 - unplug also SCSI disks in qemu-xen-traditional for upstream unplug protocol- bsc#989679 - [pvusb feature] USB device not found when 'virsh detach-device guest usb.xml' 57c93e52-fix-error-in-libxl_device_usbdev_list.patch- bsc#992224 - [HPS Bug] During boot of Xen Hypervisor, Failed to get contiguous memory for DMA from Xen 57ac6316-don-t-restrict-DMA-heap-to-node-0.patch - bsc#978755 - xen uefi systems fail to boot - bsc#983697 - SLES12 SP2 Xen UEFI mode cannot boot 57b71fc5-x86-EFI-don-t-apply-relocations-to-l-2-3-_bootmap.patch - Upstream patch from Jan 57b7447b-dont-permit-guest-to-populate-PoD-pages-for-itself.patch- spec: to stay compatible with the in-tree qemu-xen binary, use /usr/bin/qemu-system-i386 instead of /usr/bin/qemu-system-x86_64 bsc#986164- bsc#970135 - new virtualization project clock test randomly fails on Xen 576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 5769106e-x86-generate-assembler-equates-for-synthesized.patch 57a1e603-x86-time-adjust-local-system-time-initialization.patch 57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch - bsc#991934 - xen hypervisor crash in csched_acct 57973099-have-schedulers-revise-initial-placement.patch 579730e6-remove-buggy-initial-placement-algorithm.patch - bsc#988675 - VUL-0: CVE-2016-6258: xen: x86: Privilege escalation in PV guests (XSA-182) 57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch - bsc#988676 - VUL-0: CVE-2016-6259: xen: x86: Missing SMAP whitelisting in 32-bit exception / event delivery (XSA-183) 57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch - Upstream patches from Jan 57a30261-x86-support-newer-Intel-CPU-models.patch- bsc#985503 - vif-route broken vif-route.patch- bsc#978413 - PV guest upgrade from sles11sp4 to sles12sp2 alpha3 failed on sles11sp4 xen host. pygrub-handle-one-line-menu-entries.patch- bsc#990843 - VUL-1: CVE-2016-6351: xen: qemu: scsi: esp: OOB write access in esp_do_dma CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch- bsc#900418 - Dump cannot be performed on SLES12 XEN 57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch - Upstream patches from Jan 575e9ca0-nested-vmx-Validate-host-VMX-MSRs-before-accessing-them.patch 57640448-xen-sched-use-default-scheduler-upon-an-invalid-sched.patch- fate#319989 - Update to Xen 4.7 FCS xen-4.7.0-testing-src.tar.bz2 - Drop CVE-2014-3672-qemut-xsa180.patch- bsc#954872 - script block-dmmd not working as expected - libxl: error: libxl_dm.c (Additional fixes) block-dmmd- Convert with_stubdom into build_conditional to allow adjusting via prjconf - Convert with_debug into build_conditional to allow adjusting via prjconf- bsc#979002 - add 60-persistent-xvd.rules and helper script to xen-tools-domU to simplify transition to pvops based kernels- Convert with_oxenstored into build_conditional to allow adjusting via prjconf (fate#320836)- bsc#983984 - VUL-0: CVE-2016-5338: xen: qemu: scsi: esp: OOB r/w access while processing ESP_FIFO CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch - bsc#982960 - VUL-0: CVE-2016-5238: xen: qemu: scsi: esp: OOB write when using non-DMA mode in get_cmd CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch- fate#319989 - Update to Xen 4.7 RC5 xen-4.7.0-testing-src.tar.bz2- fate#319989 - Update to Xen 4.7 RC4 xen-4.7.0-testing-src.tar.bz2 - Dropped xen.pkgconfig-4.7.patch xsa164.patch- bsc#981264 - VUL-0: CVE-2014-3672: xen: Unrestricted qemu logging (XSA-180) CVE-2014-3672-qemut-xsa180.patch- bsc#980724 - VUL-0: CVE-2016-4441: Qemu: scsi: esp: OOB write while writing to 's->cmdbuf' in get_cmd CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch - bsc#980716 - VUL-0: CVE-2016-4439: xen: scsi: esp: OOB write while writing to 's->cmdbuf' in esp_reg_write CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch- fate#319989 - Update to Xen 4.7 RC3 xen-4.7.0-testing-src.tar.bz2 - Dropped libxl-remove-cdrom-cachemode.patch x86-PoD-only-reclaim-if-needed.patch gcc6-warnings-as-errors.patch- bsc#954872 - script block-dmmd not working as expected - libxl: error: libxl_dm.c (another modification) block-dmmd- fate#319989 - Update to Xen 4.7 RC2 xen-4.7.0-testing-src.tar.bz2- bsc#961600 - L3: poor performance when Xen HVM domU configured with max memory > current memory x86-PoD-only-reclaim-if-needed.patch- Mark SONAMEs and pkgconfig as xen 4.7 xen.pkgconfig-4.7.patch- bsc#977329 - Xen: Cannot boot HVM guests with empty cdrom libxl-remove-cdrom-cachemode.patch- fate#319989 - Update to Xen 4.7 RC1 xen-4.7.0-testing-src.tar.bz2- fate#316614: set migration constraints from cmdline restore libxl.set-migration-constraints-from-cmdline.patch- Remove obsolete patch for xen-kmp magic_ioport_compat.patch- fate#316613: update to v12 libxl.pvscsi.patch- Update to the latest Xen 4.7 pre-release c2994f86 Drop libxl.migrate-legacy-stream-read.patch- bnc#972756 - Can't migrate HVM guest from SLES12SP1 Xen host to SLES12SP2 Alpha 1 host using xl migrate libxl.migrate-legacy-stream-read.patch- Add patches from proposed upstream series to load BIOS's from the toolstack instead of embedding in hvmloader http://lists.xenproject.org/archives/html/xen-devel/2016-03/msg01626.html 0001-libxc-Rework-extra-module-initialisation.patch, 0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch, 0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch, 0004-firmware-makefile-install-BIOS-blob.patch, 0005-libxl-Load-guest-BIOS-from-file.patch, 0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch, 0007-hvmloader-Grab-the-hvm_start_info-pointer.patch, 0008-hvmloader-Locate-the-BIOS-blob.patch, 0009-hvmloader-Check-modules-whereabouts-in-perform_tests.patch, 0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch, 0011-hvmloader-Load-OVMF-from-modules.patch, 0012-hvmloader-Specific-bios_load-function-required.patch, 0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch, 0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch - Enable support for UEFI on x86_64 using the ovmf-x86_64-ms.bin firmware from qemu-ovmf-x86_64. The firmware is preloaded with Microsoft keys to more closely resemble firmware on real hardware FATE#320490- fate#319989: Update to Xen 4.7 (pre-release) xen-4.7.0-testing-src.tar.bz2 - Dropped: xen-4.6.1-testing-src.tar.bz2 55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch 5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch hotplug-Linux-block-performance-fix.patch set-mtu-from-bridge-for-tap-interface.patch xendomains-libvirtd-conflict.patch xsa154.patch xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa170.patch- Use system SeaBIOS instead of building/installing another one FATE#320638 Dropped files: seabios-dir-remote.tar.bz2 xen-c99-fix.patch xen.build-compare.seabios.patch- spec: drop BuildRequires that were only needed for qemu-xen- bsc#969377 - xen does not build with GCC 6 ipxe-use-rpm-opt-flags.patch gcc6-warnings-as-errors.patch- bsc#969351 - VUL-0: CVE-2016-2841: xen: net: ne2000: infinite loop in ne2000_receive CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch - Drop xsa154-fix.patch- Use system qemu instead of building/installing yet another qemu FATE#320638 - Dropped files qemu-xen-dir-remote.tar.bz2 CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch CVE-2015-4037-qemuu-smb-config-dir-name.patch CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch qemu-xen-enable-spice-support.patch qemu-xen-upstream-qdisk-cache-unsafe.patch tigervnc-long-press.patch xsa162-qemuu.patch- bsc#962321 - VUL-0: CVE-2016-1922: xen: i386: null pointer dereference in vapic_write() CVE-2016-1922-qemuu-i386-null-pointer-dereference-in-vapic_write.patch- bsc#968004 - VUL-0: CVE-2016-2538: xen: usb: integer overflow in remote NDIS control message handling CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch- bsc#954872 - L3: script block-dmmd not working as expected - libxl: error: libxl_dm.c block-dmmd - Update libxl to recognize dmmd and npiv prefix in disk spec xen.libxl.dmmd.patch- bsc#967101 - VUL-0: CVE-2016-2391: xen: usb: multiple eof_timers in ohci module leads to null pointer dereference CVE-2016-2391-qemuu-usb-null-pointer-dereference-in-ohci-module.patch CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch - bsc#967090 - VUL-0: CVE-2016-2392: xen: usb: null pointer dereference in remote NDIS control message handling CVE-2016-2392-qemuu-usb-null-pointer-dereference-in-NDIS-message-handling.patch- Update to Xen Version 4.6.1 xen-4.6.1-testing-src.tar.bz2 - Dropped patches now contained in tarball or unnecessary xen-4.6.0-testing-src.tar.bz2 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 5632129c-free-domain-s-vcpu-array.patch 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 563212e4-xenoprof-free-domain-s-vcpu-array.patch 563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch 56549f24-x86-vPMU-document-as-unsupported.patch 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch xsa155-qemut-qdisk-double-access.patch xsa155-qemut-xenfb.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa159.patch xsa160.patch xsa162-qemut.patch xsa165.patch xsa166.patch xsa167.patch xsa168.patch- bsc#965315 - VUL-0: CVE-2016-2270: xen: x86: inconsistent cachability flags on guest mappings (XSA-154) xsa154.patch - bsc#965317 - VUL-0: CVE-2016-2271: xen: VMX: guest user mode may crash guest with non-canonical RIP (XSA-170) xsa170.patch- bsc#965269 - VUL-1: CVE-2015-8619: xen: stack based OOB write in hmp_sendkey routine CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch- bsc#965156 - VUL-0: CVE-2015-6855: xen: ide: divide by zero issue CVE-2015-6855-qemuu-ide-divide-by-zero-issue.patch - bsc#965112 - VUL-0: CVE-2014-3640: xen: slirp: NULL pointer deref in sosendto() CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch- bsc#964947 - VUL-0: CVE-2015-5278: xen: Infinite loop in ne2000_receive() function CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch - bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch- bsc#964644 - VUL-0: CVE-2013-4533: xen pxa2xx: buffer overrun on incoming migration CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch - bsc#964925 - VUL-0: CVE-2014-0222: xen: qcow1: validate L2 table size to avoid integer overflows CVE-2014-0222-blktap-qcow1-validate-l2-table-size.patch - Dropped CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch- bsc#964415 - VUL-1: CVE-2016-2198: xen: usb: ehci null pointer dereference in ehci_caps_write CVE-2016-2198-qemuu-usb-ehci-null-pointer-dereference-in-ehci_caps_write.patch - bsc#964452 - VUL-0: CVE-2013-4534: xen: openpic: buffer overrun on incoming migration CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch- bsc#963783 - VUL-1: CVE-2016-1981: xen: net: e1000 infinite loop in start_xmit and e1000_receive_iov routines CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch- bsc#962758 - VUL-0: CVE-2013-4539: xen: tsc210x: buffer overrun on invalid state load CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch- bsc#962632 - VUL-0: CVE-2015-1779: xen: vnc: insufficient resource limiting in VNC websockets decoder CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch - bsc#962642 - VUL-0: CVE-2013-4537: xen: ssi-sd: buffer overrun on invalid state load CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch - bsc#962627 - VUL-0: CVE-2014-7815: xen: vnc: insufficient bits_per_pixel from the client sanitization CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch- bsc#962335 - VUL-0: CVE-2013-4538: xen: ssd0323: fix buffer overun on invalid state CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch - bsc#962360 - VUL-0: CVE-2015-7512: xen: net: pcnet: buffer overflow in non-loopback mode CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch- bsc#961692 - VUL-0: CVE-2016-1714: xen: nvram: OOB r/w access in processing firmware configurations CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch- bsc#961358 - VUL-0: CVE-2015-8613: xen: qemu: scsi: stack based buffer overflow in megasas_ctrl_get_info CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch - bsc#961332 - VUL-0: CVE-2016-1568: xen: Qemu: ide: ahci use-after-free vulnerability in aio port commands CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch- bsc#959695 - missing docs for xen xen.spec- bsc#960862 - VUL-0: CVE-2016-1571: xen: VMX: intercept issue with INVLPG on non-canonical address (XSA-168) xsa168.patch - bsc#960861 - VUL-0: CVE-2016-1570: xen: PV superpage functionality missing sanity checks (XSA-167) xsa167.patch - bsc#960836 - VUL-0: CVE-2015-8744: xen: net: vmxnet3: incorrect l2 header validation leads to a crash via assert(2) call CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch- bsc#960707 - VUL-0: CVE-2015-8745: xen: reading IMR registers leads to a crash via assert(2) call CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch - bsc#960726 - VUL-0: CVE-2015-8743: xen: ne2000: OOB memory access in ioport r/w functions CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch- bsc#960093 - VUL-0: CVE-2015-8615: xen: x86: unintentional logging upon guest changing callback method (XSA-169) 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch- Adjust xen-dom0-modules.service to run Before xenstored.service instead of proc-xen.mount to workaround a bug in systemd "design" (bnc#959845)- bsc#959387 - VUL-0: CVE-2015-8568 CVE-2015-8567: xen: qemu: net: vmxnet3: host memory leakage CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch- bsc#957988 - VUL-0: CVE-2015-8550: xen: paravirtualized drivers incautious about shared memory contents (XSA-155) xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemut-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa155-qemut-xenfb.patch - bsc#959006 - VUL-0: CVE-2015-8558: xen: qemu: usb: infinite loop in ehci_advance_state results in DoS CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch - bsc#958918 - VUL-0: CVE-2015-7549: xen: qemu pci: null pointer dereference issue CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch - bsc#958493 - VUL-0: CVE-2015-8504: xen: qemu: ui: vnc: avoid floating point exception CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch - bsc#958007 - VUL-0: CVE-2015-8554: xen: qemu-dm buffer overrun in MSI-X handling (XSA-164) xsa164.patch - bsc#958009 - VUL-0: CVE-2015-8555: xen: information leak in legacy x86 FPU/XMM initialization (XSA-165) xsa165.patch - bsc#958523 - VUL-0: xen: ioreq handling possibly susceptible to multiple read issue (XSA-166) xsa166.patch- bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch - Upstream patches from Jan 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch) 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 56544a57-VMX-fix-adjust-trap-injection.patch 56546ab2-sched-fix-insert_vcpu-locking.patch- bsc#956592 - VUL-0: xen: virtual PMU is unsupported (XSA-163) 56549f24-x86-vPMU-document-as-unsupported.patch - bsc#956408 - VUL-0: CVE-2015-8339, CVE-2015-8340: xen: XENMEM_exchange error handling issues (XSA-159) xsa159.patch - bsc#956409 - VUL-0: CVE-2015-8341: xen: libxl leak of pv kernel and initrd on error (XSA-160) xsa160.patch - bsc#956411 - VUL-0: CVE-2015-7504: xen: heap buffer overflow vulnerability in pcnet emulator (XSA-162) xsa162-qemuu.patch xsa162-qemut.patch - bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142) 5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch- fate#315712: XEN: Use the PVOPS kernel Turn off building the KMPs now that we are using the pvops kernel xen.spec- Upstream patches from Jan 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 5632129c-free-domain-s-vcpu-array.patch (Replaces CVE-2015-7969-xsa149.patch) 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 563212e4-xenoprof-free-domain-s-vcpu-array.patch 563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch) 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch - Dropped 55b0a2db-x86-MSI-track-guest-masking.patch- Use upstream variants of block-iscsi and block-nbd- Remove xenalyze.hg, its part of xen-4.6- Update to Xen Version 4.6.0 xen-4.6.0-testing-src.tar.bz2 mini-os.tar.bz2 blktap2-no-uninit.patch stubdom-have-iovec.patch - Renamed xsa149.patch to CVE-2015-7969-xsa149.patch - Dropped patches now contained in tarball or unnecessary xen-4.5.2-testing-src.tar.bz2 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch 54f4985f-libxl-fix-libvirtd-double-free.patch 55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 551ac326-xentop-add-support-for-qdisk.patch 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch 5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 554cc211-libxl-add-qxl.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch 5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch 5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch 5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch 5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch 5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch 5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch 55b0a218-x86-PCI-CFG-write-intercept.patch 55b0a255-x86-MSI-X-maskall.patch 55b0a283-x86-MSI-X-teardown.patch 55b0a2ab-x86-MSI-X-enable.patch blktapctrl-close-fifos.patch blktapctrl-default-to-ioemu.patch blktapctrl-disable-debug-printf.patch blktap-no-uninit.patch blktap-pv-cdrom.patch build-tapdisk-ioemu.patch ioemu-bdrv-open-CACHE_WB.patch ioemu-blktap-barriers.patch ioemu-blktap-fv-init.patch ioemu-blktap-image-format.patch ioemu-blktap-zero-size.patch libxl.set-migration-constraints-from-cmdline.patch local_attach_support_for_phy.patch pci-attach-fix.patch qemu-xen-upstream-megasas-buildtime.patch tapdisk-ioemu-logfile.patch tapdisk-ioemu-shutdown-fix.patch udev-rules.patch xen.build-compare.ipxe.patch xen.build-compare.mini-os.patch xen.build-compare.smbiosdate.patch xen.build-compare.vgabios.patch xen.build-compare.xen_compile_h.patch xl-coredump-file-location.patch- bsc#954405 - VUL-0: CVE-2015-8104: Xen: guest to host DoS by triggering an infinite loop in microcode via #DB exception - bsc#954018 - VUL-0: CVE-2015-5307: xen: x86: CPU lockup during fault delivery (XSA-156) CVE-2015-5307-xsa156.patch- Update to Xen 4.5.2 xen-4.5.2-testing-src.tar.bz2 - Drop the following xen-4.5.1-testing-src.tar.bz2 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 559bdde5-pull-in-latest-linux-earlycpio.patch 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch 560bd926-credit1-fix-tickling-when-it-happens-from-a-remote-pCPU.patch 560e6d34-x86-p2m-pt-tighten-conditions-of-IOMMU-mapping-updates.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch CVE-2015-4106-xsa131-9.patch CVE-2015-3259-xsa137.patch CVE-2015-7311-xsa142.patch CVE-2015-7835-xsa148.patch xsa139-qemuu.patch xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch xsa151.patch xsa152.patch xsa153-libxl.patch CVE-2015-5154-qemuu-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemuu-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch"- bsc#950704 - CVE-2015-7970 VUL-1: xen: x86: Long latency populate-on-demand operation is not preemptible (XSA-150) 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch- Upstream patches from Jan 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch- bsc#951845 - VUL-0: CVE-2015-7972: xen: x86: populate-on-demand balloon size inaccuracy can crash guests (XSA-153) xsa153-libxl.patch- bsc#950703 - VUL-1: CVE-2015-7969: xen: leak of main per-domain vcpu pointer array (DoS) (XSA-149) xsa149.patch - bsc#950705 - VUL-1: CVE-2015-7969: xen: x86: leak of per-domain profiling-related vcpu pointer array (DoS) (XSA-151) xsa151.patch - bsc#950706 - VUL-0: CVE-2015-7971: xen: x86: some pmu and profiling hypercalls log without rate limiting (XSA-152) xsa152.patch - Dropped 55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch 5604f239-x86-PV-properly-populate-descriptor-tables.patch- bsc#932267 - VUL-1: CVE-2015-4037: qemu,kvm,xen: insecure temporary file use in /net/slirp.c CVE-2015-4037-qemuu-smb-config-dir-name.patch CVE-2015-4037-qemut-smb-config-dir-name.patch - bsc#877642 - VUL-0: CVE-2014-0222: qemu: qcow1: validate L2 table size to avoid integer overflows CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch- bsc#950367 - VUL-0: CVE-2015-7835: xen: x86: Uncontrolled creation of large page mappings by PV guests (XSA-148) CVE-2015-7835-xsa148.patch- bsc#949138 - Setting vcpu affinity under Xen causes libvirtd abort 54f4985f-libxl-fix-libvirtd-double-free.patch- bsc#949046 - Increase %suse_version in SP1 to 1316 xen.spec - Update README.SUSE detailing dom0 ballooning recommendations- bsc#945167 - Running command ’ xl pci-assignable-add 03:10.1’ secondly show errors 55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch - Upstream patches from Jan 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f239-x86-PV-properly-populate-descriptor-tables.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch 560bd926-credit1-fix-tickling-when-it-happens-from-a-remote-pCPU.patch 560e6d34-x86-p2m-pt-tighten-conditions-of-IOMMU-mapping-updates.patch- bsc#941074 - VmError: Device 51728 (vbd) could not be connected. Hotplug scripts not working. hotplug-Linux-block-performance-fix.patch- bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142) CVE-2015-7311-xsa142.patch- bsc#945165 - Xl pci-attach show error with kernel of SLES 12 sp1 pci-attach-fix.patch- bsc#945164 - Xl destroy show error with kernel of SLES 12 sp1 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch- Upstream patches from Jan 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch- bsc#944463 - VUL-0: CVE-2015-5239: qemu-kvm: Integer overflow in vnc_client_read() and protocol_client_msg() CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch - bsc#944697 - VUL-1: CVE-2015-6815: qemu: net: e1000: infinite loop issue CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch- bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch- bsc#907514 - Bus fatal error & sles12 sudden reboot has been observed - bsc#910258 - SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984 - Bus fatal error & sles11-SP4 sudden reboot has been observed - bsc#923967 - Partner-L3: Bus fatal error & sles11-SP3 sudden reboot has been observed 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 55b0a218-x86-PCI-CFG-write-intercept.patch 55b0a255-x86-MSI-X-maskall.patch 55b0a283-x86-MSI-X-teardown.patch 55b0a2ab-x86-MSI-X-enable.patch 55b0a2db-x86-MSI-track-guest-masking.patch - Upstream patches from Jan 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch - Dropped for upstream version x86-MSI-mask.patch x86-MSI-pv-unmask.patch x86-MSI-X-enable.patch x86-MSI-X-maskall.patch x86-MSI-X-teardown.patch x86-pci_cfg_okay.patch x86-PCI-CFG-write-intercept.patch- bsc#939712 - VUL-0: XSA-140: QEMU leak of uninitialized heap memory in rtl8139 device model xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch - bsc#939709 - VUL-0: XSA-139: xen: Use after free in QEMU/Xen block unplug protocol xsa139-qemuu.patch- bsc#937371 - xen vm's running after reboot xendomains-libvirtd-conflict.patch- bsc#938344 - VUL-0: CVE-2015-5154: qemu,kvm,xen: host code execution via IDE subsystem CD-ROM CVE-2015-5154-qemuu-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemuu-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch- Remove xendomains.service from systemd preset file because it conflicts with libvirt-guests.service (bnc#937371) Its up to the admin to run systemctl enable xendomains.service- bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow CVE-2015-3259-xsa137.patch - Upstream patches from Jan 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bdde5-pull-in-latest-linux-earlycpio.patch - Upstream patches from Jan pending review 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch 5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch 5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch 5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch 5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch 5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch x86-MSI-pv-unmask.patch x86-pci_cfg_okay.patch x86-PCI-CFG-write-intercept.patch x86-MSI-X-maskall.patch x86-MSI-X-teardown.patch x86-MSI-X-enable.patch x86-MSI-mask.patch- Adjust more places to use br0 instead of xenbr0- bnc#936516 - xen fails to build with kernel update(4.1.0 from stable) 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch- Update to Xen Version 4.5.1 FCS (fate#315675) xen-4.5.1-testing-src.tar.bz2 - Dropped patches now contained in tarball 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch qemu-MSI-X-enable-maskall.patch qemu-MSI-X-latch-writes.patch x86-MSI-X-guest-mask.patch- Replace 5124efbe-add-qxl-support.patch with the variant that finally made it upstream, 554cc211-libxl-add-qxl.patch- bsc#931627 - VUL-0: CVE-2015-4105: XSA-130: xen: Guest triggerable qemu MSI-X pass-through error messages qemu-MSI-X-latch-writes.patch - bsc#907514 - Bus fatal error & sles12 sudden reboot has been observed - bsc#910258 - SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984 - Bus fatal error & sles11-SP4 sudden reboot has been observed - bsc#923967 - Partner-L3: Bus fatal error & sles11-SP3 sudden reboot has been observed x86-MSI-X-teardown.patch x86-MSI-X-enable.patch x86-MSI-X-guest-mask.patch x86-MSI-X-maskall.patch qemu-MSI-X-enable-maskall.patch - Upstream patches from Jan 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch - Dropped the following patches now contained in the tarball xen-no-array-bounds.patch CVE-2015-4103-xsa128.patch CVE-2015-4104-xsa129.patch CVE-2015-4105-xsa130.patch CVE-2015-4106-xsa131-1.patch CVE-2015-4106-xsa131-2.patch CVE-2015-4106-xsa131-3.patch CVE-2015-4106-xsa131-4.patch CVE-2015-4106-xsa131-5.patch CVE-2015-4106-xsa131-6.patch CVE-2015-4106-xsa131-7.patch CVE-2015-4106-xsa131-8.patch- Update to Xen 4.5.1 RC2 - bsc#931628 - VUL-0: CVE-2015-4106: XSA-131: xen: Unmediated PCI register access in qemu CVE-2015-4106-xsa131-1.patch CVE-2015-4106-xsa131-2.patch CVE-2015-4106-xsa131-3.patch CVE-2015-4106-xsa131-4.patch CVE-2015-4106-xsa131-5.patch CVE-2015-4106-xsa131-6.patch CVE-2015-4106-xsa131-7.patch CVE-2015-4106-xsa131-8.patch CVE-2015-4106-xsa131-9.patch - bsc#931627 - VUL-0: CVE-2015-4105: XSA-130: xen: Guest triggerable qemu MSI-X pass-through error messages CVE-2015-4105-xsa130.patch - bsc#931626 - VUL-0: CVE-2015-4104: XSA-129: xen: PCI MSI mask bits inadvertently exposed to guests CVE-2015-4104-xsa129.patch - bsc#931625 - VUL-0: CVE-2015-4103: XSA-128: xen: Potential unintended writes to host MSI message data field via qemu CVE-2015-4103-xsa128.patch - Upstream patches from Jan 5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch- Add DefaultDependencies=no to xen-dom0-modules.service because it has to run before proc-xen.mount- Update to Xen 4.5.1 RC1- Update blktap-no-uninit.patch to work with gcc-4.5- bsc#927967 - VUL-0: CVE-2015-3340: xen: Information leak through XEN_DOMCTL_gettscinfo (XSA-132) 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch- bnc#929339 - VUL-0: CVE-2015-3456: qemu kvm xen: VENOM qemu floppy driver host code execution CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch- bsc#928783 - Reboot failure; Request backport of upstream Xen patch to 4.5.0, or update pkgs to 4.5.1 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch- bnc#927750 - Avoid errors reported by system-modules-load.service- Add xen-no-array-bounds.patch and blktap-no-uninit.patch to selectively turn errors back to warnings to fix build with GCC 5. - Amend xen.stubdom.newlib.patch to pull in declaration of strcmp to avoid implicit-fortify-decl rpmlint error. - Fix quoting of __SMBIOS_DATE__ in xen.build-compare.smbiosdate.patch.- xentop: Fix memory leak on read failure 551ac326-xentop-add-support-for-qdisk.patch- Dropped xentop-add-support-for-qdisk.patch in favor of upstream version 551ac326-xentop-add-support-for-qdisk.patch- Enable spice support in qemu for x86_64 5124efbe-add-qxl-support.patch qemu-xen-enable-spice-support.patch- Add xen-c99-fix.patch to remove pointless inline specifier on function declarations which break build with a C99 compiler which GCC 5 is by default. (bsc#921994) - Add ipxe-no-error-logical-not-parentheses.patch to supply - Wno-logical-not-parentheses to the ipxe build to fix breakage with GCC 5. (bsc#921994)- bnc#921842 - Xentop doesn't display disk statistics for VMs using qdisks xentop-add-support-for-qdisk.patch- Disable the PIE enablement done for Factory, as the XEN code is not buildable with PIE and it does not make much sense to build the hypervisor code with it.- bnc#918169 - XEN fixes required to work with Kernel 3.19.0 xen.spec- Package xen.changes because its referenced in xen.spec- Update seabios to rel-1.7.5 which is the correct version for Xen 4.5- Update to Xen 4.5.0 FCS- Include systemd presets in 13.2 and older- bnc#897352 - Enable xencommons/xendomains only during fresh install - disable restart on upgrade because the toolstack is not restartable- adjust seabios, vgabios, stubdom and hvmloader build to reduce build-compare noise xen.build-compare.mini-os.patch xen.build-compare.smbiosdate.patch xen.build-compare.ipxe.patch xen.build-compare.vgabios.patch xen.build-compare.seabios.patch xen.build-compare.man.patch- Update to Xen 4.5.0 RC4- Remove xend specific if-up scripts Recording bridge slaves is a generic task which should be handled by generic network code- Use systemd features from upstream requires updated systemd-presets-branding package- Update to Xen 4.5.0 RC3- Set GIT, WGET and FTP to /bin/false- Use new configure features instead of make variables xen.stubdom.newlib.patch- adjust docs and xen build to reduce build-compare noise xen.build-compare.doc_html.patch xen.build-compare.xen_compile_h.patch- Drop trailing B_CNT from XEN_EXTRAVERSION to reduce build-compare noise- Update to Xen 4.5.0 RC2- Update to Xen 4.5.0 RC1 xen-4.5.0-testing-src.tar.bz2 - Remove all patches now contained in the new tarball xen-4.4.1-testing-src.tar.bz2 5315a3bb-x86-don-t-propagate-acpi_skip_timer_override-do-Dom0.patch 5315a43a-x86-ACPI-also-print-address-space-for-PM1x-fields.patch 53299d8f-xenconsole-reset-tty-on-failure.patch 53299d8f-xenconsole-tolerate-tty-errors.patch 5346a7a0-x86-AMD-support-further-feature-masking-MSRs.patch 53563ea4-x86-MSI-drop-workaround-for-insecure-Dom0-kernels.patch 537c9c77-libxc-check-return-values-on-mmap-and-madvise.patch 537cd0b0-hvmloader-also-cover-PCI-MMIO-ranges-above-4G-with-UC-MTRR-ranges.patch 537cd0cc-hvmloader-PA-range-0xfc000000-0xffffffff-should-be-UC.patch 539ebe62-x86-EFI-improve-boot-time-diagnostics.patch 53aac342-x86-HVM-consolidate-and-sanitize-CR4-guest-reserved-bit-determination.patch 53c9151b-Fix-xl-vncviewer-accesses-port-0-by-any-invalid-domid.patch 53d124e7-fix-list_domain_details-check-config-data-length-0.patch 53dba447-x86-ACPI-allow-CMOS-RTC-use-even-when-ACPI-says-there-is-none.patch 53df727b-x86-HVM-extend-LAPIC-shortcuts-around-P2M-lookups.patch 53e8be5f-x86-vHPET-use-rwlock-instead-of-simple-one.patch 53f737b1-VMX-fix-DebugCtl-MSR-clearing.patch 53f7386d-x86-irq-process-softirqs-in-irq-keyhandlers.patch 53fcebab-xen-pass-kernel-initrd-to-qemu.patch 53ff3659-x86-consolidate-boolean-inputs-in-hvm-and-p2m.patch 53ff36ae-x86-hvm-treat-non-insn-fetch-NPF-also-as-read-violations.patch 53ff36d5-x86-mem_event-deliver-gla-fault-EPT-violation-information.patch 53ff3716-x86-ats-Disable-Address-Translation-Services-by-default.patch 53ff3899-x86-NMI-allow-processing-unknown-NMIs-with-watchdog.patch 54005472-EPT-utilize-GLA-GPA-translation-known-for-certain-faults.patch 540effe6-evtchn-check-control-block-exists-when-using-FIFO-based-events.patch 540f2624-x86-idle-add-barriers-to-CLFLUSH-workaround.patch 541825dc-VMX-don-t-leave-x2APIC-MSR-intercepts-disabled.patch 541ad385-x86-suppress-event-check-IPI-to-MWAITing-CPUs.patch 541ad3ca-x86-HVM-batch-vCPU-wakeups.patch 541ad81a-VT-d-suppress-UR-signaling-for-further-desktop-chipsets.patch 54216833-x86-shadow-fix-race-when-sampling-dirty-vram-state.patch 54216882-x86-emulate-check-cpl-for-all-privileged-instructions.patch 542168ae-x86emul-only-emulate-swint-injection-for-real-mode.patch 54228a37-x86-EFI-fix-freeing-of-uninitialized-pointer.patch 5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch 5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch 542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch 542bf997-x86-HVM-properly-bound-x2APIC-MSR-range.patch 54325cc0-x86-MSI-fix-MSI-X-case-of-freeing-IRQ.patch 54325d2f-x86-restore-reserving-of-IO-APIC-pages-in-XENMEM_machine_memory_map-output.patch 54325d95-don-t-allow-Dom0-access-to-IOMMUs-MMIO-pages.patch 54325ecc-AMD-guest_iommu-properly-disable-guest-iommu-support.patch 54325f3c-x86-paging-make-log-dirty-operations-preemptible.patch 54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch CVE-2013-4540-qemu.patch qemu-support-xen-hvm-direct-kernel-boot.patch qemu-xen-upstream-blkif-discard.patch change-vnc-passwd.patch libxc-pass-errno-to-callers-of-xc_domain_save.patch libxl.honor-more-top-level-vfb-options.patch libxl.add-option-for-discard-support-to-xl-disk-conf.patch libxl.introduce-an-option-to-disable-the-non-O_DIRECT-workaround.patch x86-dom-print.patch x86-extra-trap-info.patch tmp_build.patch xl-check-for-libvirt-managed-domain.patch disable-wget-check.patch - Xend/xm is no longer supported and is not part of the upstream code. Remove all xend/xm specific patches, configs, and scripts xen-xmexample.patch bridge-opensuse.patch xmexample.disks xmclone.sh init.xend xend-relocation.sh xend.service xend-relocation-server.fw domUloader.py xmexample.domUloader xmexample.disks bridge-vlan.patch bridge-bonding.patch bridge-record-creation.patch network-nat-open-SuSEfirewall2-FORWARD.patch xend-set-migration-constraints-from-cmdline.patch xen.migrate.tools-xend_move_assert_to_exception_block.patch xend-pvscsi-recognize-also-SCSI-CDROM-devices.patch xend-config.patch xend-max-free-mem.patch xend-hvm-default-pae.patch xend-vif-route-ifup.patch xend-xenapi-console-protocol.patch xend-core-dump-loc.patch xend-xen-api-auth.patch xend-checkpoint-rename.patch xend-xm-save-check-file.patch xend-xm-create-xflag.patch xend-domu-usb-controller.patch xend-devid-or-name.patch xend-migration-domname-fix.patch xend-del_usb_xend_entry.patch xend-xen-domUloader.patch xend-multi-xvdp.patch xend-check_device_status.patch xend-change_home_server.patch xend-minimum-restart-time.patch xend-disable-internal-logrotate.patch xend-config-enable-dump-comment.patch xend-tools-watchdog-support.patch xend-console-port-restore.patch xend-vcpu-affinity-fix.patch xend-migration-bridge-check.patch xend-managed-pci-device.patch xend-hvm-firmware-passthrough.patch xend-cpuinfo-model-name.patch xend-xm-reboot-fix.patch xend-domain-lock.patch xend-domain-lock-sfex.patch xend-32on64-extra-mem.patch xend-hv_extid_compatibility.patch xend-xenpaging.autostart.patch xend-remove-xm-deprecation-warning.patch libxen_permissive.patch tmp-initscript-modprobe.patch init.xendomains xendomains.service xen-watchdog.service xen-updown.sh- bnc#901317 - L3: increase limit domUloader to 32MB domUloader.py- bnc#898772 - SLES 12 RC3 - XEN Host crashes when assigning non-VF device (SR-IOV) to guest 54325cc0-x86-MSI-fix-MSI-X-case-of-freeing-IRQ.patch - bnc#882089 - Windows 2012 R2 fails to boot up with greater than 60 vcpus 54325ecc-AMD-guest_iommu-properly-disable-guest-iommu-support.patch - bnc#826717 - VUL-0: CVE-2013-3495: XSA-59: xen: Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts 541ad81a-VT-d-suppress-UR-signaling-for-further-desktop-chipsets.patch - Upstream patches from Jan 540effe6-evtchn-check-control-block-exists-when-using-FIFO-based-events.patch (Replaces xsa107.patch) 54216833-x86-shadow-fix-race-when-sampling-dirty-vram-state.patch (Replaces xsa104.patch) 54216882-x86-emulate-check-cpl-for-all-privileged-instructions.patch (Replaces xsa105.patch) 542168ae-x86emul-only-emulate-swint-injection-for-real-mode.patch (Replaces xsa106.patch) 54228a37-x86-EFI-fix-freeing-of-uninitialized-pointer.patch 5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch 5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch 542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch 542bf997-x86-HVM-properly-bound-x2APIC-MSR-range.patch (Replaces xsa108.patch) 54325d2f-x86-restore-reserving-of-IO-APIC-pages-in-XENMEM_machine_memory_map-output.patch 54325d95-don-t-allow-Dom0-access-to-IOMMUs-MMIO-pages.patch 54325f3c-x86-paging-make-log-dirty-operations-preemptible.patch (Replaces xsa97.patch) 54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGH3AKDM4.13.3_04-lp152.2.30.14.13.3_04-lp152.2.30.1  xenhtmlhypercallarmindex.htmlindex.htmlx86_32index.htmlx86_64index.htmlindex.htmlmanindex.htmlxen-pci-device-reservations.7.htmlxen-pv-channel.7.htmlxen-tscmode.7.htmlxen-vtpm.7.htmlxen-vtpmmgr.7.htmlxenstore-chmod.1.htmlxenstore-ls.1.htmlxenstore-read.1.htmlxenstore-write.1.htmlxenstore.1.htmlxentop.1.htmlxentrace.8.htmlxentrace_format.1.htmlxl-disk-configuration.5.htmlxl-network-configuration.5.htmlxl-numa-placement.7.htmlxl.1.htmlxl.cfg.5.htmlxl.conf.5.htmlxlcpupool.cfg.5.htmlmiscamd-ucode-container.txtarmbig.LITTLE.txtbooting.txtdevice-treeacpi.txtbooting.txtguest.txtindex.htmlpassthrough.txtearly-printk.txtindex.htmlpassthrough.txtsilicon-errata.txtblock-scripts.txtconsole.txtcrashdb.txtdistro_mapping.txtdump-core-format.txtgrant-tables.txtindex.htmlkconfig-language.txtkconfig.txtkexec_and_kdump.txtlibxl_memory.txtprintk-formats.txtqemu-backends.txtstubdom.txtvtd-pi.txtvtd.txtvtpm-platforms.txtxen-error-handling.txtxenmon.txtxenpaging.txtxenstore-ring.txtxenstore.txtxsm-flask.txtmisccrashdb.txtvtpm-platforms.txtxen-command-line.pandocxenpaging.txtxenstore-paths.pandoc/usr/share/doc/packages//usr/share/doc/packages/xen//usr/share/doc/packages/xen/html//usr/share/doc/packages/xen/html/hypercall//usr/share/doc/packages/xen/html/hypercall/arm//usr/share/doc/packages/xen/html/hypercall/x86_32//usr/share/doc/packages/xen/html/hypercall/x86_64//usr/share/doc/packages/xen/html/man//usr/share/doc/packages/xen/html/misc//usr/share/doc/packages/xen/html/misc/arm//usr/share/doc/packages/xen/html/misc/arm/device-tree//usr/share/doc/packages/xen/misc/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:16968/openSUSE_Leap_15.2_Update/2a3494ad3971efb6a2cb6e0cdaf8d120-xen.openSUSE_Leap_15.2_Updatecpioxz5x86_64-suse-linuxdirectoryHTML document, ASCII textXML 1.0 document, ASCII text, with very long linesXML 1.0 document, ASCII textC source, ASCII textASCII textASCII text, with very long linesAlgol 68 source, ASCII textutf-8d838325b24421ea18dc2a8eae410ceae59a0b76637d9b85a7d03d962638f8be9?p7zXZ !t/)] crt:bLL s. ⿹ffߍ[5vsA7>L;`C>{lXل9j3e#VWf %5 ,Eo&T6^4#:Q퐜-?Yv0J>j[QRV^]Ls{3d -mo ^Й-0flu돸m$pI5_SHrSċ18{o1~GЭ3W S)?[¥͉K|C;(/Qxh8a C_:}B]iy ͦݪ?o'R!zSKu -jT|??_d.MʮT8 P$+]tka<$y:2=,k;CU2&hGABA̯Ld!8a"D;)vhxͨͥ͂$RI(͒bٖ~l>?rܮ_{ۗ' ׀4/9Uug [C;f%ա . Z"1HnNOo8ReXGwEaѕ=7-WG"NPvSһL:AER7h_?3F;9'V7n{ y\[Opf|,wM &9upr3o HC?BhTTpr qB2?:!v>l Y`i-o`]L4`.<xbئ#t-H,čе .^=}W/mNL̑گ"%US0+]4 ]= D!Ÿ]EjJXs^I>PxW{@elPyr^on90cr5#D4>J iBMk UGa_@mP0 `#woɛbDAb^[=,ebla]|4Ii[^;Hw(텢 U.S2l]?5\ <yϑ%nva@*OP3~;hM+ }%1 @|d {PRku0tFH߸kZi>,6`.!E[*ƯًgoP )^ o&op⮁Co9ߛ=#sy9g=>KZ5lۦ%|x_OЎk@QLe;E;5Oƪr$qZz.&~pVk-﬍FX`A8TFcsdɎ_$ \#X]7Ղox|?Qvèҧ i P W?ϢǦllL @r[)w̽.yE,mRlykl;2LinkY *qcp9 y^9-&B a PMC{QyH7J4f j׷vaN A54AYV q;`H4%=?m._2մ]3цDOX~fAe^_z a ?<g`ŁtKzՔuw&sQYivEu؃Ϟ%r-@K_Э1ՠj^,]-z:ԚT=$@t뮬"hWǃCVE:S|P-Ѩpچ |TJs1a>hrfjfќ ,/d4>FKDV_$J —SM))ԡхYG$fZȷY~c+e=c2*kW!HҭD8m.$NmhLe@C!q 2aq!zx%R;r,S~W_=zd3^iŶkxO̴yg4@]!~ > c M/Od>$6$Fg}Yb_-L1`~NO,죝'7o| ,x:Q0S\=˲su!i&JKή6Ƒ)ܙ KL xܽ“k# "/]WҞzm 2{, `>ὲ2 ..@ɽ&:$sZ_[0.-DqA飥6f Je<1f;H?P1 E,s4~U恅0oܧൡMVc$F\i1Q 77e(5B>Utzf,o|k/mU fDAfU7sM-).eۯYH ](4#X8j9k6rqu n ?!ҮI(C6X@LH8k$ 84d>iLk ŗg%`(UMRpp,{ü9yLF.F$%UM!3DjM|;I*ܽRFC=kCAAn++Y.JJv,K:MV.S_ׇ1:j@OwpLq+Ü6=e)j,%y#]tN+ ?p>lqJA~2)ŰR EEai7OM 22=V.W2._F%z⪻ѲdTe/muwi~@#nDDZKY q?+ QU!-sJ̧ )U6e)nş"Zo @L?z绌 7 QΉ=Xa\e-WveQLS1MO!f˙ ی#/k 1 |\'r. &0(Oz| #vN_pfӄ3يl+ƴPa 5/'ܢ MA1NHir" Jm@ZٰЈnH7Pެ dtNwʆ IbAgOxbNҮ.54C]eĽdYc6YeMKzl!9.2'Lm\D|*+.ܞ)v$( ^tV)мI9rz:kr%49f^Bz.Sq*w186$^-.yϨC|PD{]m2  9̙%վY & 6E Xs|xR c_xw8Kha@$\^v-AB4~y\;ԉteqFQD^qFڂӖB.εH )a3PGcXy@h5I_%qc?w,'5Ęd 5ܸg.vu"Ea)X{* YkHsչJX^O2$T;9`tF {lsʤ,􃄛vIKmҩKBBTfmhC; o~j?O D͙4$qDoo;YGV㾜5wO Kn S(\o[Y7kjW|g gdсbWu4 7^`BFMp TIjY#BY )^sp+b\*zfƫgt<ڃCP0}]U{SŲ0n[ I9?ݔ 6Vn>zN _*pp8=58Y21Rƚu=ΚO m8[h~6T\-m,tC@?hCCr aU CnW0ADWGm&(řomEy%4T Yf63р(V LzwK?{"$f~AT Y e=<0ZX'OW 1^ ]± 3@n?}gI:#l& ⽕k&*.y!o>qMN.HS }ފ2۰6 jrOUNg r Ɯb;F&Bc84&Kzio+\c5(,*bFa \%OPh=ك$LJ\ :hwxP>8l;gwB Im"SС/}?55l&s nVbLf1ѹMnh2?Tw<B L$ $ztj@s!pJ67n8lQ*Gz= mYvgW~hhbS=flFwuL+D^kh`$u":i3[VTw>.u8<1#)}ZS]!ED #nB}="Fh?i'6OAdDS#zEÁs|~frC vKܩ_ PaM;|oQHv.u:KdSM]~n1= 5"@E|]W.y2G8k+0; l*matZ NSͯ)Ȓat |<{e\3@ T%in^lY*aq)k[tλ2$Pc7#ݚ ؋%]hTvif!bږ_juJE5HJjΎ ZrhYVWR>#1ކ,$`%\XM1,i@ V^gҴ,`~> ic8+O[5y:k.ߞn.'q>23<Azj-o \=f[AqErxҵWzm.@F5B )wIcّcIVdt-rEUԽ&6 {I&љl2PH& y_<ʦp_J~p]_ ȧz7Ze @iĪ`7;Fo}?}(Ҿ.Ȟ.cOĵ@ ay$]c|QLATZ?1It x{彑G1om0D !ٰ Hqc['n)A&(#!̕,G̒!8p)FKTnVĬuF c~ Gkt|&mK1VV/6ϜB9;p1X1Ax+ l`Zn

O)Xu5:|T):27Ǜ:+ՠ9N"kYNK߸Qbu$w[. 4>lځtʵh_5qWPr 0a4+%_wL`!ٲetR3dߩ:ǪUӱfkl,'Z{eV`mJͥ ۾05l9#>-]lNz;IkVC Ɲ]E"#x #;jE ƤEԴU^/724 sV $E s d#1fAL)hNx5'Ʒ6b@i/Bi5D u~'lb {f5Vg"F0o#JtIP&g3UfL>eZAN#VwoSB%.g.HnҠa5t\s4m\_FEb|'X.)-ۓPIf=yпЅyK] Γt#pḤ& `| Vd3@_4`D?f> s#_2jdzu@鳏I SXMRʖM{| .\8@^&9fAims>dz8jo:DkFCp}[pS3A |XY|eL/%wluBr?ڇjar3vnZDӹ{Q xNOll}>lM!u-&tۡN⦴Wx/ʴV)7Xj I?KK!te3#Cffh=JOhKrbЕVWn϶Z~qyLmo o&cɜ0=n7cI`>Ch'Y  07]Np3Xc%x8Ԝ_ F(q`46^]/R_!Hlj[;MTGόqa>z4l2 x4vg @uY2Y8y?@0ȸ>Y0.f.3aǁSDٰW;">]#]WMHה/7ؠJh3x.E iw^\Bu([I0CO}h>di0-@9aFGֈRz y"oAw + piޫu5PsJ'Vd m^iZ9"ySuo%F!$2ř<5C_|bu)\srCpa\(4ɛ<-Czn/P KN\$S(љ8Bՙb3c3JTڹS 7k 0SC'/m!fP9}#w^6'5z*JUW:N73+S+0pٸF 0̍ѺJWcI8GRm,)6;%jM_Jb@6ͪ "f@? iuQB/6[Fȕ:󎃑- FG$([|CvHmm;PZ Mom⣘/DJJIU5ÒD8L/`(__&x(fBT\rb?@/dT7AGTfYy!to>?i.>aij}T`E<u (IL6xY0 D)*hQ y?x# O6A JZ~/tP7K |̏|LB9׍HZy;IN#IȂ8sRp|LH JP!}~8~uE{G9~rq]*MY܈̏QҒqZ\F-Ko6_ ܓۧ 5! {wmʃ}*dX[UP̻p\s~ͨL3D~a?c!o zg* {NeaC޵4~Ou]gO 2ۇ˴n)rICfwe`;=*hugae,Y.aT"_n`V hl:A'O,xcUyzp:s27Up+8S # S|w%l[(+$L^2زn)qh? rr摌59ݣQ6],6ѹ^JN{^oQZiaBtՋiElÓvj!PBJ7y`dWZ3Cfk`"պ +9ky{T]]wHfy~]iGck3ePI^q"p~!qUbVaqiBIdn Ybj8|鬌jQV!^&^V.afm"ϱAsLw#F5I Q ~w7+LKV\+п_RVqĻz,jJ~ɑp0^1NMP?]1ȭ|#]'ODo#h-5ه{g:Xz VGE ɸgÑsQlʷL=b=R6wnfY.[8t+tU(`'ch8*9o wZB)BD_DplcIܞ2#X!#s9&YZ*~m&ɩg ?ZZa9Q7>.20$_P !D`&%"T1SA1]j0iOG^j@JE| $$" "p`Jo]$o!^QʫE&>nU`ƢlɡpOz%Nm:sQk;wo+G08wTi7 ~-( oxYC(vq7յ\J֧2DW$RU"䭴el46 rᮍ[He>TO_;EaGJ W4My\=񓽥r݄,W$64 /M2(oQGw2+?y U.8f-#2޷jɂ('ղD 8'(Ry욺K;xV2[rp+Z KR@ I":j=N'3j 5.}iB֢,ј2kRLqzP%וsV$BL7Egsp<\}#SZ"?iޣY$X}EVBwh ]Hi E2TIG3W屿B.m[ƙڬi|2]Y&x`^nxr@n=E%RyܸGB_'R(5\zc_37HS}RY%z?o< +b" (d7bpg;>AfV xb8ӆ~)G7Rsebnd[V#B)U8|6mifi}j+rL;‚$~A)o}X;j>2˞xfCsƁ:Y\eǃP_> C`Hn4v ͱMf1 / .}8׉iKȼDzW pF=5c (-g>F{ĺ!Kty,^A~ 9k &ܸ|J:cfLĬ-a,Jhi!C3 F{Lk<7^IϨUޗaթ$y!,Tj1p0 .eWb(qDm1Qk 5#:].v2'X`,F @j6:62>27_[20YeBRI`[<[ɫb֊f9(!Mx,~XI_4 o{kjTj0Է$ޒZĞ8$"8&oOѴ2H:ޡ|3қTX )ޝË@O݂bhfTWMUն5'0.kF:vb}>KFQ!Ne1+yچn"}u uP.GQtdiCy=-i2"!{'87€1}NjLse#= ]w' F"IXC^&HQm3 T%^l$Z9ʈm9V/P׺a^6_̢+CD>^5]!8q u`_/g_ʳiD[WCLX..Pi\؆bG*D!.ǝ-h-I\NĔkO1mM/NP*IH(8r$]D yEV(~\]uɦ2 cVeaȏF7ڮcQم2la Aߖ } ƫ&5.JǛޗ~iy[DqHlɤ<)*&ӈ3pbvۜ!CqǧThЍOKî|Į_5Ee": FSY6.1*6Cly |rWuKUz 'Hq!@[˰v`ؚA#L L2vdxsQuzsviұoZA Kolr~UhC+ow|rG. F\ cjUd; G4t-7eU+^@Íc$8ʼnlw>_wS,hAvTi$@ёDcϧj̯"̎(9X$0zlTDl~&Rn,RQrgi7Kiu[%3;t-ɋ߉ѭӽnnqUB}6{oW50UrX+)~:^S>&s8ߔY6wF,$;Jfc}~*T^ia gwmƾWRW 9oFC*Wh6ozB# MKw^ގSy,CG5p'٬؁,>fyWgyPjsg}a%&knb͑h)X@U (˓Ȓj5E/\r._<;W;^URNP;n ~>IMA#>cU~uy}DUwkcWv.Y0 }r&` CPnܜSpZzku^V+Lv;pjp,nz'x:"N&aY AtpXƦL]EOťB4 c'`ljU˳!5ySz]i1Г#*<'<Mtm 'tHgjA:C#,q7t$+u/gZ; Gy񧐿mϾ_C!XkOBMУL01pCߪ,U"hhnSQ0;z6%ARgQI1].0m3>E=Q{Zᯉs IZ㔊-B9+N ަj ͔ᠬGx[acƯZƕ3,lz3*^K3dhB_6.7Ǡw, p@ u_I‚Q^,~2^ED-:tE7p?ƪYpK)9k8r?WM*dV{l7p O֣ۑ1# {`Ҋx§T%ؙ֟|0pSa*a V锛kE M2;j^:eξPi3d' 2JJ16(li<;f"L-/ TkA 4hdc~@WPy$47*lΤˣ-ÀhV7Yq!3GF^s1Ʃ9P dTgMSQؚGZFX핓.t]W"q ڭ L߮AV{,tFP&dgjA3(>?0:P>>ceAO Y0.Ą/];n-]W`}ʏFZQ((0c}te{0̼~-6m̅rG^a#.D.[OВءDR\Nδ`ߴTڇ^1ʪ|ec|ag浭dm~/(2QYaWUZ$?P-Zy-|ovp,T3f"H!DX!9 ؟S?Z%4s=u9ߕbBrrz:0g<Ԑ&;!nAl2Jq#u/VflZ{nTُyME2sUm-1(6_PmE5ښzdqR(`6黡,@U*49ao:u=[]RUݘdI)$@Otl*-EY\p$w~ `%zAiMe1Bx4 hƑ[uƻO>6wLRA.4-/uƍ[2%|BM[@^*펌=rɪ:pv* ,̾ dKo;je.E˄5=bPv޽';}=V;@܈%h岿j^G+GH:9?d*#'{:{ETA1J؈ O@'@p8y0>MY(zFjKPh{:0ۇBڔ46]L pFXe1;Hq1SlrF 㮔X cjͪvƳrVJ~FT5jIeS@`ȸWR#'48&? 4IodH"e=x4埛|rJ }ztQw'3ӯ~.Lvh.w ,R0{;=;JO6.fGW]yB|ʺpο/&- ?$7h '\V-[Sv/G6,$C"Fޚ&oKH;I!_0IG2 ,qG3,)^a}Aqqat[&0X6Ww|ߑ-!Q DŽ3&{;?銗+QnY~Z 1X!*'C"%|9>{ɻ(,U x>OZU߃SebV#R$_ޓr>'bDzmHRF$&:^SW(%R4ZZۻ'ų`&u ~DXH[cHeZ:Xĥ _!֏'BPnoV|Nv<(WD |n*M[N>yмE=m|;kLSeQ|׶U<~%"iI hT~UId^ zk31^>w񣽮s>+lL=_(8V\g}'cҔ#pܦWu QSuc$dB rtuЩF:$dSC;F&U@%0'bԅ؇/}_B \ wIF:d5N&x 9&r%#n4bS3U/iKOʐU9m>.LdlHSt !h%1ez '*mr%g "֝rٹQz.ID9h3U4 6Hv%T%̉1hf)|ÙVN&&c[ }’/3d ;Eϖ~UUӗ"قW S"wm4۝'ɷO6qugۏGN{&$cDtNqo pc(G~]g~`$),|CqHy^I7jdx +;}j ;࠘N*?F6IBˬ|3wd{R$.̩vW2HH> 8Zt}8zOԏ;csVY±g{ɰoOҙOgoIUuؽr'  E]a#trڟ ~y*%\41>6k2*A>ܹMlȂ9* r2~E4 xhqw6(9WU).F,. ]]KČ"b/ܞ 6'2};/u-<,C%U5CUݗћ>6v9EC>Ǿ5 .UĶaPh$2 6r˶B $faƝɝj{B|чl_Dg&"ƭr@"P_,eӸS%gG](h HRw𙒮4GK9\̀?].-SRO6[!sWt8{.ԫeϨ&-s #xO[)@:dupM tH$#?7P PF#p1 ;zP*gzʠ@ )Umc~$顝ҙ!ޥAl9L=q= )rLΗI@mVYSKBZ9m$M.Fo%/CGN >ÍÃbd[J*ۇsy C5ׄ[9$a3™ڬECg|<^޴KM81gVOFz+: :B? 8neL)ݎ!67`\j2:!ݺFHC.cJju{0=~AD̵;/KECem eg910 Xch^~ON4'WTl'&؅+=_"ϖ<2.Ji5Qw3azU,wqG#KHb'{x ܑ>P>z@=Oͅ398hypC?@s5b`ӊ.MGaϊEBH#mSXS#%qc+SX jYJ dyH*\kƊ"%GP$v`)¡]<0'AGI}grMO_`@L?sSẓFBa!hTX *pK>_Bh#1F݁?o#BXhԗDlt XO8&@>sv MSYk-"rWS|_ mnS: #؈W^@#c/@E&0U9MavoD /hJ\r $?*LJ?}q~>0P5S\^MUqsg(R#}ԯ|W?fly0vlz.]G(2jlZ C{ҒKVߊmYM$De8(inϥeԏZ<퀄 X-_¬:Y~yS5//nڏA{vxWF8m("=L2/HVO/e$ "P* SIj!p+41*Ц I*%W5֣UtYXqхLaϼq-Ԑj g*7};V&-0ᮎ}sCbOfܽQjd'd';R`:.8=,+2z Di\\ 1\WЃ z:[/™nCdS~ÐUǘPk0>k~Ԍh5|wBp7ksVeM,gc,Bb D]`|0_so7Ӄ ܓYz:E.AcRA1smÆý"kD"dʛWʳl-rn7cUۺ@hO~\7t1w1UA=Hh6`ZIKABą貭:k 1#]J$qS{̦0t.3.r ~(VaD%]%T߃̸ze'}6'A D6xLr+`'8,dSܽ :b[:a`w7sJc,[F:ɦ2}/f"KQa$G8EsbXZ01>$ar*=ۉ`MP?^D{K%;J-sR'$ߣ/OueR;Siv j,3tƻTy 2I=/MlQ&lf:AhB/' 4@L Bw*D=2>y؀DffO1ܽ6ft-%tۅ%k`Gt{8> A4K+д$#s3XgS"1tm03F #wIphCUi0&PrI`(fHm+jؕi,Ks hz#o9n-x3YwPSUbcsJz,%"ED+i[.PH^`۷9?K/eA~oɸlWQĚ;?:jK@dYt9L)V ׉C#vt3/Pߦstw 3,,t!WFk\| LM |4Efgš>¥Qs[@VU90GA5mrg>&' }(nY*W58\vӤۀy=>aJm@'vC+4$]FbGQ>fM+z4Gj. CEH i?PM5v&ڄrn>ՠLAziB ȹ:MQnSTdz|A*P[ɰܑ:HayIao+[<8wwu6d~v}BrصC|U=j)i`n{E9ET U;*kl tg- b X`Anպn׏u sTkJT@D5&Ne!M,Xa `-J}Lmv}>[ܷ \*#LYsKHK+օ7X@gW0ܔAV'|w̚*,Ϲbdm`8<1Ѥ _B4y$"kDvO 2YC>Ҹe {]W?y}JMEW W8ηj98jDQ_8WmՉ@z$1.'(8bBVئ HFܿMpSt ?;ED! HLYk3~`6 (FJ^ˤG|<Րf-I-钾z9xp  O~>Y.#~u 8:ht:!`0 =d"C;ˬ{0K_I*߮t!o\-ٚČ( U<~Ozl$k)ğwyJU(Xip4CciJ 6/|p f^.j],>_M9fժԉ_S}FCc\ams"-N\E"3'W7^O:tD? ~ }J;PNQh"F( d+.v $I@X7kF. @4}opY!\]R0t5;oʠlPTPh{ 7%$v'924töuNYaCU <<F=4[9U"JnƚEIk'"N1Lv}(ڋ9clC16ah>&nj M_*ƫ<{ C.YE~ - 5al5p"n4} Y^z2J իI)Ab0!ʘc][B?)X8g@Cebϖ0RYq?|~:8A`ny=*eL9Clj^]4aTyG)Ի1;`O4si`ԛ싛$ 7,Xӧ,Mc.yu n!B.7^|&A8Ǜ7amA tA%peGNS !Br G h-wpO&%/XcmN%Ps~{"EBݏ\EmTn)m@fycPAK\=Iyk#@_|˗+x=ku T&gfj}gKꫛ$xUbW3#[jj=kGJK@#ZFdI )٭v?&0Q 2AUl6fa>760YRS ZQ=ouTym8XŶ tc=ynGGeKAe^&}Ky١Zq@-T y1d0N$fKw ƻ?H9>+ WveCTXp.5\ 5x ;E ${ ;;~۠xSЩ+cC#bNކ(]X!Pw(z&AmJ=¤ J8AZ :4&rzs MfhiB ˃&[tAD 0}FK =8FCBb3eƼpSVvjEݻNJNmA{FQ Ke l\3I uZwhjV SngT"Yb B[>{b-?HR}y /&\6ndid3(>H4{)I%Q MF bv0P0S.c|ഓBdxx'AQ ~Da21%oR3!7隣c3p3ЛU[[ZnobPH;D -{R7Yo\틖Hxh(9h>cnqZBˢv3rrDP0E6%aO!uBQf,G?,[֘rNX\=aOVP`GyKٺOu֕Vs!”iT;%@ͯոmSsC>kn-t*w#DBsG2:rոcWι.]qճÕgWLgɠK+P?GeF_i(7o?2^8mNX O& 1`dy(*|)eA)5O%E XE͝ijr ֦ɜ=9r#cQXƩ6 :K;3VlB  ^OidRxl,IcuU rLFR6+Tĉ?ʴ>6V#Hy +KUDZd=̺7bߊ"٬N w׀*y;~L uQy?A(=mag [߾SBH:q-Zm!w!Ä+P7I:ZAxE17 x3ёl0.g&ڝs/:_ %A3J@p^~V70X)蜀׎bk|+ʹSJcgV^^WFM2%^+75m˱׎.l1Y.j3fŵh[`Fiuӷ;Y(Frhо[7+{UQX /<517f  .>öTR~9S $TP0n{b5&tE- Ub4ǼZx(cy(4AK9Nt޷#u IDn aC';Z<ߙkbAh{˚#c/Rƚ_6se+" L+?jzrcQ``&o` >ruY{;y␥b'{ŭrwކiq:&rn}nzx߃ʕ5vydo |ORyVW}EW}SkTFr,:[fIf).B$Fx^.IU]"R[q:2nU/`XC/GtB7` yĬߋXt=zWeFYFwK5 roeՓDٹly`A !H|Kz ru,gxܖE=+&I:(P^W8QO<*VH3l]/kx/S3AV8{h=Piʥ6#}x^u̵7KH8y7"i ͛yu 0;.M P C^L~"L idǜ,$ eP }LkuIjH1 &⭶+ e;{墵It+SMrq w}lHw|M7g+ɼ"@ 3ڿp/KI80bms2\o:GH.׵E=ckCYEw\]@یHn{ 첀zrj*W3|sf'Z#h혔"Xz-d6I=b+0lR#ux*68֐¯=6y;pl.@;@o!j72kD5h;j^z@f7ÆXi鈗у]yDŽl%ͦǶB__R i~|eThJ W.^#|XC9Nj-xg/x2 dzAy6*á89]yS#pe<76b5 e4&cٯHkxы{*ߑxKYOwwdkΖBk!L۫BbSc? ˆZ42H9gכh '6FuJr !. Q ]@F'BH0j2Ihފ\˒ϋ힘v;.%)/n;;IOZ BY9>6oYPe#Ǽ WqNc!?]5EU|[{e닶NVM%m xg㠶NG}+GbI=`hbKNɊ/f_/:ξy, T 3^$47V8ȸgY\^=0pXY" ?' WG?cK2}؞~1ՒXQ[}f.`}*' چ~pBNj0gt3! Ɲ$ N; Ub$${pMCF:ص>Ncp9.UIboCzR&0$yj#-bj){vY>#l Nm28mo?$TU3)֙L#̗,e, \NIpc,r9^+i& _SbJG?^ !5 &WyeQ5Ml!!n0D>q}ө(qUg{pu ⍤ zqf'vdNdn5iͧQ݀D{Cݧ"@SyCO`K =&#zLZ{_$ɸfk"0Gn/LU,ޒ9 $p$v\ӄ{썾/!i-$-4JǾV]ߴhhO-3Av;S}%iM HH+ HHvjX/XsDNN-iZΤGb|V_F#rpԻ88=!r ʌV,YǡyMңbH` t.mwFsrv?,H 4k#$bi4 #n `ubR8`[>{M>b=?2*ʒvu6FH Ɯ96Z_9RKؒ蝡 t#ZgOl; (+WFM-73CQثﲾ%m77Z_>{W- u7db8#ga#:.g~ǤIyxߵ@#iJ1?Rw?c"7"{1eOj6uɸހ-(,ش$Bۀۚ4vy4 Nl `^M!k#1Sxĵ[C6?w>|fdA]`OϠi;c"D9uU`6hڗe&h,^PWŅzOTWm%nSru 崡6d!/@+bwMFR@-b;&u\PrpBZfqs۴c]^ ϓ qR1hh|D![ΠJh,::lCC7:p=Yv&8m)?(*yW)f79)P-0þ* "H8H5Ӑoo1ЮxJN^=UWIT|w1ҙx84tB<ɉE^Y +PX1o]CH?-Zđ+4 `ȔL7Ix%p{ 392CJU[GÓ,ڳ}ȦpKnо-5G'6 ᤟҉AuJs+<%R;% :ekmSTX!`L]n8h&#KmݧhKM <f i@/3VhGIwGga-.=?E/\fg|IaG@n{%}xgrdZtZvR`R}aL|A?Wp?p?j H j|dԧ P9,6H4\: {|S_qi\zQDL>)߇1*iJ2R|R*}31Ls~'(;T1 lZcDb;ueH3z;7糉tUjKrs7YO, kc6 _jeOc8=dGB*L:CKʎ R_<|j&,t&bĽfC@ 'aCY5,@=T*r >U.WTH<ww'9Ҷφ,%4:|eT}):ٵbmfwKVTpД'LPl%y1==Wxwkz#fwx6O]y|EgZH#xlH9 B]h:W :sl4@A@VO=2nIMJvu\%@?6p/A+okGqd|Eug'?ZJ8 oȮErA+α9l'!u`F>jR F|$ |pN A<4?2X; ao @.O|82(7CNaڑ Ʊ 94FӅć;0|L2U$Xq !L) ŔC=t\MzIZOG&cJVGH-l1.A?Z#J$Zvd qo, GGNG(Jp<\l ^ Ctӝiy[|dU`O:>b!=6Q1Nm\ٿ Q8\4w18젞D-m2L L\`WwrBB{CZb/ͯ(`qx<R>>nXYZiY%lږ(;F 1GJ'y0]?U=QT~|S,l3ٳ|bM/=2 qzo n,x9Rg6:4A iwD,4AڽFVLpY.:&>>ѷ6)XĻ9WZ뭺f  y$VEH"u[q &Ódq6*>QZ+V*7GEQ#+:q@]GcveWLUCpswE󦶱%px(&8h_Q$K<̎T/[[_ * \AemOpj9|f>/6$>J [Js3k ٦7RNJxoJfCߪo{?SլpRB~g; SԜfuH^nv2 -öցdE))OUec)#P U'l“˲PgBÖRǿbȦG>BgH:Be)YBF"]~ =C1 ~C Ğ0L!U5:rEJcrq5OR3|s +hL &L`'׺k5gXwE9/ "6\5-;S5E΋ DO|LV?R?b9}h&k{:>; hz򞲱mlIh{·fZNm6d/#F^a<]^PQ#\[\ӆ69_#Y5T\shTʐ]tEz|nK)fԹOg~௧9zS }nhgr3УSʏe$J KPAX3Phw/+4 !٤-mYMgkΝѿ/qora:򓺁bZ]ʹj, %OSH" $41Xria)7IOUr %ngBǯh{}{J[aYjd:֒ER ɚ%g7A>6V|'NY0-a-oJ=V k1M8ZͰ>6Q'[?Ս.[!Oh]p^R&tXxZ<0[XZ5:f#$ؾg}wz>Ej]. GL l< gĀ0 `y9$St;to0U7)sn֞z]>iڏmܐkx_1\!2tOI90 R#jG0Ltka3mVu%1^s1`9\2iAi0hR^I \?}C^ı ?5tc|&H,xΙkR7?ɷՃaghh&f%.0O\`lεthU [MbmBj]0nqFVZҘ*jQ+(n4-Т)d  G"j;4eC% ,Ӂ{W29C,D5ttC-^6v{vE[:ɜ2b@#;Lkq07( ,^ ~6mAi.Z5)WG"Kw;auU/hԫӻ0QDv7Ifrn,hXc(dr8D #|?HL) 2p6t/Ʊ{2?!;v!zDV{ѣ|)v8o4bi P Px Ű&yk(z$ JPF s)سytKLd|?ӄ éZÎ^0-,#\;e\#bu/L⋛9O"4Рa@o}7{_ ̼]A"϶21X;@ǨKqt@V |s6gԋFRj FJ yxBBE_Jn,pt:.E ?HO] ʐаiIhfƀ`]T^pفզ٦IXDa,ƉyxJ`)W[uH86P+g&dz Yѫ&cђu4ܩ@JVbH=0$pe9Wr%T .u jL3h\,_r RKɂbui]؍OlsnKiVT$Nɳ )󁮽%CBr,}/Zs=(A0|5y/7m8|$9BCjך*ݖY,d&HYa9Y H*J$H7d Vm‚ȤU4WobItV]hڮk`rٟ}\NmH hVbvʠ!|;rJLYc04H0&+k7UŞ$*~e?6=+vP*R"N UC̽R5fx@ҖjKLT;VKƆ=_AWtZVT8q-{ƍ!.h΋nE;a|+O|E6$O6%!NoBq$w{ĢB).^z!65kxԝ2y dr>Cݮ|vJrY0]{݉ܦڢnjzYKgJ!KJ/]ߢwL!3R `YTKѐnPXOU#ށܖokoè,Ǝ1t&X+.݁F,JHH2Dlwklp lSes.4`@Sm$x9 Zs!)hl;?~ĂcXp!$3ҭҚ@-LaG KCMaX~V8ܞ^V9r6v/D5v/ynA 1<}_䂟wB(;}hb^ i;c$ H_Exv6ډdv\uJ(?#'Bs]EBڢ 0g˴%RCIl)} Mv-d!H<8- ֶ!cݍݹ`͢xL$^hEգ`^RP RqwEj eTS~U8 ]M"W2-iDJn\gjw Z׌- ERLfU Ses W0eE/? >|!T%(=8,36z@%* ¡˞ u=7y/8}LwHr0N#jĶ[D _/:h/燎ZRڊ',<'̮M,Caj$ŷm^[;Kt$3A4>)= n&rhY9^Lp{xG"\n5bؑr5qd 6L)#F{% u'&(X3;DG SHя$;U(X$⨢{O@LYD=&?>fmpkJ/N[-w\|dk뮳lK ~#hYITW/12>9$]]=r (z;q$FFJ>tP^G)WawώМ߂|JD@YRҺ/áRYGKo|kR.igj^0ޓ)|).~<^űKK7#󗕥LA B_}B8xq8o';j{kth;^v-8Jw_o0@#zCf'OY)˃l:ȾZ1өFy7يHAd}% ^7y}ZX+&_81}'`"lzSf¾7,ɮ^."u0i6s}G v1n?C,MhL٪ewڋ m:Y19yi@C"9aX m0 J`3cNC*E#PU/aÌs9[ntɏL,Cxgc0 k/g[+XC"N׎ڐ}=/fj> 0$"Hp8KKbZJB" 9!dD!(y԰8u).)>;Z댶ș B TO/¬hlj0U͜c$b17JRjT2RVfmLUəO702"Kt,l+2p>Sqtsާ` Q9//7~#E/u* Zv-X ¯{՝Dbީr딺*KeSTL5/h_9 .rTL^AGl-/:G\  U|gJ| M8Ig6Ll"F}{_Q%\VDnPat QqN֋‹ĥՒ/8g/>!rG ǂToŤ҂ 1˔%uI60)̣JP`#^(t.G$^!m< |D) 8oT,$A;C.әDOsiݑU)~׏.\F?id{_C[>f se$ cx n7%Wf S=kFwH&<@` :Ūu\u7. v8]Ť$e{$bp;_!Ь>6X0`&'G)_J?=`;@|Vw ^I'pz?TL˄hRO˜]y'f`|M@,H,6~B:\>n$#\-|CG= ??E %.s X@ǂqULI%)6i/j zEoҵ_9]lz`[X>;:|<'%+%]^DQ >4J\dwQaG;Q 8aS֠_J;اo \N~d4Lrl}-"tfQFL,utSjd:>@!m.5edIw~>S S\2 6CL`J*knD{ݖE)o6@5աe`ןO;?΀j?Q)Zk]MOPD]I h{ov[bos#-)w<eJE#rҀ̩=bwӒa$AY@ݚڰ!(l{R lFx߭;*v'0zLET"`i"^ S,4Pnl"b79F Wk )Y6=G&b}w۞^Uplb"`w`c N[|){ȠsB*N;@1@߄;0k1?^gՒ#&:Apn0cXb@էxa^gBitfNR űnbٵLx-xt,S읊B3|F;adv~bY oFvtW(c]*T>Խ9\', cɚŝy|IƓ1W:~$>,$* @'؅˒!w&y-H uMX ەȁԢLrtcjܑS_hcjn(/1 B+O)ɹTX=3pÖ(Ȋ7[O*sxdT,bWЕLL7wy<'VA])kLdWdpL5%=xſ>ՎGԠX=G.zגuR,e: ~n^I"Gv([k! kDEt47et5@ʽzAKytFLs宻2+&K1"} Z[@+.[+y=P,qa.E'ڑaVAѯ+; &ob$S;NRqPýE: ]#uQoQI$GC<ډ.?9 7'sJǒvNSn:$&ۥ6Z69[U|ҋyocjm6ܴv7Ic:c+OJȰ/4龈Tʹ_ֹtmQaL|0d 5}\LO8H,hGi4CYĜpsvO5 F4iNXU 6\ B0LujhͻF.cdvBzRW"A \ӓV>YR#Mg@S\>$ũ}n6CKV(X}!dI!A {X& !_P [RJSIɮQ#yLbI7YD@3MM 0?z{f;H"VK^)Pamy8h"/'$戏4G#-ނ2dD33 `V׃v9n3>@S6K }ݲYXBLP("kZNxݝi`>dO+vr`~JY7ʃEhjZt{/R}3*p/9EHRهvʹ3`F`&,6Ba`BTMP̶߂bT@<3L:j߹.`äK# &@Y,,BQNK]̓K?XcR}n2|z.L)|s^~K?5Tw5^'3t'Br'oJ;iϏ03&r 4X2t՛Ld|22yɜۊo`؈}?uN&z -dkG-ϟW44;8cK#"T:6lO{ D&BOla+ʇp[ pM33 9/ւPvI=8F.];!TD4{.S-NOM9~*x$&%jĊri*j(l2+Q 4P !z&hojY0]b|G~ax'P zbC: k ''x)`|wIO5HUOp/d|Igl6 Gڡ=a /#_P|(;0w%KZ4a83Iqi೻unوKrޟY!XC$@Onjp5uZxyj2U36(Q(/VQ˛ 1ø*7 [HCAk3$JJ8BYؓ;j^xVAKaƐ!`P!2–'s?c\C+}!Z7Zґ2=䟜dR-fNne"Tk> SY%쫅/&yaHksT]xϲapBQ;jCjou=2\}Fޜ[ȒS<jDO3DqNj#-\& urGigVx0p>%`qzJygd1@&\vBB̑ߌ 4'u[LeˬC]^:XX0J~7^$`.ͤsXj܎" E҇0 EQu:510](^IJ{"%!ZRU[nbŘt<#;F)2kd7"Qڑ7_t Zf׉*fz^3`p'*D93i% CĿ'X=jnOX 1V3{Oi&@;դ_$ $sLW'ZlAFaŨZΕN)L]x0l=+<5T?8$5LBOgs9>ԚOգG02]"hswgScY5m hA7nDV2w14ێ쩸yoRe~gCYֺO~t~Y8i9TFptpY6A8Tqc)>Xϭ.+UJo "#CdW%A_SE"7.RB-,`+m!Ј;q'{ Sڥ1 u־>ګ|Egc~#ۇ; /#O^E[M[ 8K¦pՀulʾO^iZșJ0"e/Ξ3}4ޛ QS}(2bi DwdZG,#Ƕ ^rr"g3[|gל~JhaT*!Q3[ mR.n`\ ܺ>\؏@rh{˨N 5(UGpo*LjejRM'X_S+]!$=( P ,nKFcVZSF97AzW'DTΧ]_B2҄XA"U`_yB-&O=O1vφ>#Z8a{oD% ۫-BJUb@ E(E8 IuoZ7(z+ =ބ> 9/eN31e?]]C5BB=q3Wg¤UaDmvLJr-OqDXDF>\\[QrJ]!odAćR[2)0.=xQ-wL[8ڶꛇ w|ucH .-െNݽ#a{n GiClc[ fUbbQI2/+hڮn *\↵Jy%S of8i*ߝ|(==۾Xn%*hZJ W-D5| #ɫ6REO_xIOBQj;p!I+:McMVG}{=l@iRMϘ+u>jx`?Bw4QSyJߏbȵIsw?oTp^]Bw_wߋbJ> V.< 4=X~6N_C~ox52Hբv)c|zosnѦSFIA/XC O`m'kXx۩.(`e3&Fhz/5ITe/.5%ɾӅbnc ;Ҵ瓗D#!&" o@ lQ<`3!CY5 621n:Lp<J,0s@Bl{E_JXmȌԸWt2c)3Wns7":I 9%gѯ "UK-WgXRWYn|l\UcOA?rnJ=ZFgw¼:ZlҺ Bii7iU=wFpIC2ַd HҤ!)5Hj88ձtf?uoh’'ᇌhX?_eR1Ysѫ > JdIdcg?36'\SX—+%~C0fl@Yo8@ׅ?">`Ϣvd@;3h PT8QF7;0{nd"X쩰eі|KAܽ7m}JIMl$]HzI!wovO)|ۓ=Z*$>5~>yP*-=SZ5j^Ua# \UJ;g<< Nѧ$c/ y,dнvZ;PAC/!׎doiuؗ?ϑ@A2 .0)}. z7Ũc@M3Z2NpZ'7XPiLs27Aζ Ӫ`p Ĝa3Q ۄ'x?Ok8Iq`!(Lp봀`Räfg $H H?o и Rbi#Y5v{D,%]T>Q:MGR^mb][PE}oiKND!zT!U4/iKpt^jv̈́Zm9 #YUAv+lیi uK-(p(hAYboXq6&9y~ȴ2v:7L|u,aC$3U{1I,B|rRr d&C*@&~"kwp53o{{GU_q]yǚ>QtHQ iy]r%\qٴB_ kz& 1^&F=}v@W'5*C^{tJäiq"N(o6c .Y)^EeǠE ÔrZƉ2yg3TG"Rk(˂LsO^W%`j),uhR(cXy3B7S$,EBr,y6O_B ,1tDI7$HRbL uG'cQCciR1> t#q8"K{wBZ !luҊe9q(~jM4z@@u~Jt;!8`cQW܏ªyTp-66 Zi_i rʟ Y@rdbsTq\2K|n^Zrq䌤Y瘛y06 4hHFNUo ѽA{Dj^Pq*ozٓ:UvcE=jMP{g#&u '2T- ˢ$5hF\ElcEb륊( Jraxm 6ð,E;X6LZg#eb`|fS[%,-3oJV+[+lHȦʇ}6CRH >c8rցQg&k@;_W4}`f j#'LD ηz $,,RL ne`6./Yii*q4+xء5o@$CbQm쵶 )6BPYtq]πUSЂgDGN5? N/g.FOnի.ib ܤ?evB{4'%9?[]xP85yUĝƂ^gOf!kFu5~o; (s징F\=ۍEK=HNWk(hM(Hq1;B0s!9ܮ`;-ű_^L"G$ily2|px'B`Ȇt1x,wXOP_ ]jϹ25E nݚum)&G˒n>w9dw# ]m)yքW%R KUdz`8} >VRWB7*h䠱8CїS4*2|xE8g_S*Ț7?QgGq`?$0}w;~/`HBA fgJ#* FKef3$ =FbֹH}\Gcf^gtYi iqԳTogy 5h&e<(l0vC,_nZ0l}V{wrWvd8=J\u!QN oA湃b3SV 7êҧ+o3j=]S*Y ޒ|_PF3"JW[ hG߫zJz"3^U2]04yeM!ml[4M[?R.cIDŽ%#rioa#'4nll xtc8YN`y\ʻN,}BL%QCέl]H:t xg 4jgzYz,y{DljKIsF꣋BAX w^B8EkIѠɖpO~9ר-21n7;%5\Ww<^Bq-t4/7qr'Sï%q&;V,ydIt?'&|dݎu\Fa 6/;sG6!zrdVJēEYcw#>-2bv>b549 C?mbO]_EȘOzBpLth^:֗KPX[LM^Z遫x%,|T%|Z 9\%I$+l/1I(xG^#mlrm@ cSRI<fx%(Q?ktղ;jJELg7EU6ؙ^+e;ɏQ&"0*`PbC&ָJ\UN6 $HkmyV"Nr 4~%ȫHc`rbWT0C<+*}זL M܏CJO&s|ײs@@G7^W(UǢGld(hP>HaSc_l`e ,4~6l߾ht^ N\taEj/J#*Ar_ bk\vD 2Ox9:MLh@$ů[Dšb3.U/OHQslXdǾ6I<~r_2%.*7g {8i%q@K>T# %Y [tU=/y*'[лD#VVe MELz;#*oѳk&Mrt=#Ll>GXQ0¥viQ44( 2qo`(m1G|`y8*p&] kjAW$Ig7sد5pL,/D\%EY|&)8?̈-Lv?K!0r츞Im@Wh j8_=3/8嬵ҍH y͝9Rq֭;ۿ1M&d[ypjPW0MY.df$/H,dNZi"FVpV@%ga c/WY6̘l25% ^xծPq}r9GDLnrK$<`nfGs2Ƕ]z䍺qG 5a}E P}IA>}ZFDuzlew?z̈́/4"8\"P]Hz |@-todPR.B1l@YQ 28^鸶|" 4& cf5,d4g'[r7%?^LΪ[82 ǻm*q3[: 4YeaSYr6R MzA'l>,m2cl]| bҎy#[/$ e܌K<<I#19mUyYG]P"Wjd„ۣ34v!֫ }_-lK$nb%Կ[Muo-'jM&}փ IT^w-P_XDlыE[:'?2pcjN! q;sRoY(t}]r-{tIg󲒈ʅvk`1!/NpsE']LFPLPOOl)6[Hnw8#Swbs ^c(vP°W]C?A{_7J6vi@M2{glZH\AVȆ'ۛ_cg_3V91kQҞ åo:er[[{\Q[.vJ,2p \Fr 榊Ĉ:61#u+gc&BQзa_c٤S5goݪ`FWmk>)Iͼ4&h<7d1<+ѽ|4ː2rOalgA/٧W_7)ed:=0ȵ&|=U +)S׌Y0Q5N1c´D*LϽ'~CDݏ'*Mz a{ .Nv%U.eos={/e7HZcu1NF{-A~CR$lmOQ< 3g#v \+PFsU#mN|x5bBkY)vr)\V8Hԍ`tiV%s2֯Bgmq:{V`4?d^e66Y_1jI&H,/pO^a8La`*3a 9s}b 7i@ernrByj @ҋ va!~hH}a6^E&x0XI9;0ƴ#\lxF5) !+nUkf Io?76:_t_bzTEbff)+jD h /C^mX.s2k]4wVTČ2i2tҚ1)md=㺒o3rjZN{R35-Qmd(ϲɓ!1[VUaoEanfhs~[KSrPK个>ҿGA,F4}GBW#]Vhes*(ѫIVBV5,lp&d\ ,|' A><ν,̳ǍH9ȘOg+> S j d:0*O a-u/fG + u- h;ލe֥2?9wtlbk?$y?k.BJ90 ^s xW6xq]EY0ȜV%:őS2F[! JPm/U # sUFXRoF4HD)FoTHm˝9$hytk1(ZInI3ō +mfSh2-@u0=x{'?6A  G %jM}Mj$*8\l$cΘҡ><_t-f^҄6IWHoÓ y Y}"ϰ须k:kVq{@C:>zAi.2ǁָL1,%%@O}B >&vMDGekyͿ>4h>>v =TՄ;5U2]3o?(MAMRun"p ޢhnyJWfVaa #P6v\ը,Mht !#-zxd_Gu9)=~?hc0<5/ctȳGк8fV3x0~n&Ul*^km>׺YfՓ\|NmAơ@P][IYkסȫ+r2j鎷o`(J86â=~ϭ ?CнXk Cp\9WÏԗ~ݺQ^b=K_;qQ uNWKRTnQz`ZX!Hn? 5 YΆNNOimOʧ]H @>߷6ZHXAi<-y:V1+)i|G9_C6m?jlgA@>wJ&u '.r@̇*v eB"+m΋*'ulǾڒ;Ÿ8 _cPގ RcT+(20Ks0 v >%1餾l^|IR9[%=1n!D$g}8H΢i)Y|H`g.D(P.C8G0U=KJĜ)p|p7טڹϗafekFN*kUU}9`{5!!NBnp˿k{5^2lOBA:;u#w L>Bϊj"Kn&(x4lp醶,z`4Z5_ +϶_5/l*d õ1*įARS%̪K;zTa"~ULk+3 IfZ4$礻\YU=`ɄQ :=5TL3Bl*nUg.L-p:!bgxgL &ޭdPT*fc`X]Z8mw^^~HsGz E P-*SX_ǥ6y'9O܁ fGY`J5ԇJ'Q$Ѡ9 :|g2Mnz6|n;4Q!r\?M/bߎffh"n{e?87dfxkd#s=h#h#L,F )d=I ? T"/'Y&mU[_TҺ,+GTG O G9ST{VώGn<ٻY֯ǽ'AzdV{5 ٖ$J&"nǍ7M5X<seZK2yYoQTN_5M߈>Z_Q>vz_o{z5f8ظwrT\LiRhCEKUx悡O8qއNP#)ssڦ8X[0p` T?/U4A0VH$jYJy̘n Xs>儌4tՃ꽔B TNrC)>e;>ƺ%2D:nj'y{Pg@YF:}[5( 66x %{3?hO 'ٖZra8q&(qt BdDʩ1kl@;>5+up"?pb/ Mpꗺ͈H9b$|" 9!*H(;jIy5/)omZ]TvઇjV@Sٻʥ4g :R}19F-%v츞iBO3SUq}ֳUpc;L|6mZSj=Oc3L+deO2 -N63O2ȴQֵ$A\p9$^-8 XuX^B\)yp@_h y v+/6ȾLv\7{O?n )xl7W$pA1"D:8ټLE$>=l+x5@ lTJx"ED` !f. 2#TL^lZ9عnu-k&=y-9] ]adǙaf{7f\",! Tpxxk3i `䘿[juJMϪ%a3!i%H,0%p4 UOdvopr`,nn<0>xt(FLx8_/Guۄӱ3lsS \Jb[&#fd;˞̪+T16K&D\OCIblWt%_J/~5~`$XY@v)Fy^߽\y} \wzp/o" P5Vd# RpK|VCgBAۉTmҲ#=쇽p)[yώ@YxgV17 >tr$ +X }4/6CU ]eck9b Dl{OSWg.._y+yvi9|GTe~9[G˕WA9HC-x OMґ –QU[ws=I7 É5-kHک\+"{FJg 3X>np!bQ>2#[ݱot|5ɑ9i"Ԍǽ&SQk&82~> 2g`ИdlT9Z&b}|Jkx~Y4J5Kdi3MNs|*Ć ̳Gfl=xD$GW3KG|sՂr۱EX>=2ՠF{2{5 S\f"l-fY 瘔[c ..^ "Rdh gdtv @gW8-hϦD5/c|*@(9%O#\~f^bpg_ y_/}[",8 f[,1aDN&DpL vBcvI(xA!a~D(IVJ)ܷlC]m/ _S0V0wК>cl s3TeLM՘H[+A8^>l&ܑH\l C@s,QdA'# ꇙ/]R?m\bh a$ƫ(*/`ҪUo51>b wÐt 6..E<OГrf4⅖RNб\{mt׏46j5^\si\ vtV~dh~CcWǏV-^{2GIF n觘(( /Ep9WVN.^Q{o Z߻H_c$j$=Qm퍳=_5 `}e\S)Y6l:HXa:_ѕʎ+bԠv fh.2wBTAثɒDL3xK{Io M*mۄ<]Z#[^ܾSʱ;gvLvF# ο{pA:ICafJZ3%Dym5Wۈ0'4Ι&)L'4 0g;,l]!Z./5Weһl@Rgl>C %u EkX06c5d,wPc6Z#bxA)lw{GmTi UP' b:h]rY L݊pQ< 0)x6 Gk*}vdi2^蛀"Zۯk󁂉L5I>ɇ%`>כZ_oC9E,3@u"-,,U)INS,sh[ds A`>t1tuf_֨q=?gDcz#2:3Qc:PpZ 7 o6 H̶q3;0즷$[ %eR] !G4jI0@|BcA}g^1PS?xv^ 7e&T/^Y㕧߆0-oRN!Rh'RA'?7ׁ4-bA!ʈJx&  kT EqgYQ _U_Z^i6)V$Iu Fج3p!_5+绠w3hf{M&@#iPl9c<]}0]8 JP7Hu4(#ciJYH6̺&B,jSQAo}mHCnO69xΊVتH\9أgC7Ȅ̼/0^@-#Қep>L~݌ }wxUv0o"H?^+lj/i@Î*]݋^ҀoXq%~7MlM!J/-n)TTt\E xLpF+VM*#qpcZԩ_@{f:pxߴdUa1T{|FEዾD^#m-I oXWȤ"iv@xD L~Gޖ+R-$2qNw.oWJU+G(^ٮ$YFSv3,k_ZJI_EhlE%jװp׋>e|BUQ?і{i/0eP3H=*Oˁ ?&+T⽦Uu-p/yNآ `l'`ۭݫCIGT + cFaf`d,(5%(Xxp8hj4k9gpr924Mnl)8]®eM6lqUp⑈o:NoPS5/J׊ߥ^IRueqL"(UGa!0ǰnP?sҖ6y1C_E%)-hbv9/߶7ホ_&X>3lDf1Xl<Z' ޜAxC|3N?RAqBxDo7t/bM':A'Z {< 2U[ZS+)b2KK^}ݿ0Y+T/; RuAp$HVSTtۡY"&bK>>AӁjhY*rĽ˪#w7jԳ$L#2/Ey4˚)i,, txHd">’ZFCt [[֭w9ldbZ']֖ 1BK1I{̎p!b]B:žuxHL>]e'1Ɏ+=8x*/\/da(On vqP92僃t 63*VhKD!nܟO8G@T@UZXggUQ颃~Ss&ꗆVPxgbJ"eI!{MÇF1#Q4#eZHFh?k'W7:+I)V:}S`f9 ΄#]5 %%H*eHɗXnX㹠u"ގ˧p^u?,q%aZK<ȼ3Z J3J037SjLX^a~R.8[1)xVZh5DAF rm vQ?JV^ް80X7I,4vI:+뾱;0rll0 vNckȼw_yL}V ;`83)W{)45,3'* , 5^QۚN44j=pUM wɀ8רטJ xB }x6z~ʶ!x,&sd#, IB>b>ӡw" N7RI0z6Bat@q(\⯳fckNׇ`}K?4#/=s]D]4HrJls=%-KSh)d Q˃11Ѥ`vLjOw3-yWBYii-wvݔȗ8ug¾ F"<9 @^ E?pEY6"M0`s:R~+?rWjQKw^3s,7ꢥ .,j!q,bަ q$84jӪ@N@珓Q޲QMeq:6-.oM\D|g{`KO.N^(.d@Lŗp欀`~ǷAUm$/uhέsE0`ns,oB̩Ͳ-@eCᰖ  F?hp FL=n"o&Zي J` Z%Izu+KN=7|!{C뙆]Xڃ $"tu {^ 9^yͧOsЍ ImLZ RT A~EV揦*25XCǁ랁y?L JGyyd ?y`m;xf.88ƆMBÙy-ObV6zɁ1!&0|/%Bgp$[VW6 #E\9= ?2:&+i+re UVk kWP<5B3O~iSGKM0pS\Y78G-   ձt=xЀR}d1 PenwjE;I[1?]y9IsAtK"K*+p3{=KϜߪz0p~{%.58 {? |mySˎ"TkGPEj'+a Tv5ʻC|-x0TT>l!7MH3ABQUW(Pn:+ܴB'I7%%_l`RKU|ȡ/Jp0eXgzk┶hCytQ 9ohrmABggC}Rrtq¥0>%?U+h%@^Bh{ipCL ]`NɯX32 1Ow)_ڀJ> '2P #4x7~k*QnͼaȰ\GYLSwZ+2΋ }ت(bp}lKf9PVEs 1$8A&}Tv0i7 I3A>E+ŗN/3!Sff3l>b 5%+`>ԻHm*P>.1!|u0} X>҅X7wW绬>U H`$&W-0ϙ"Zfޡ|aTf#}4E;xxʺUCwtcaY~UĪ։UHIJmڰ&7Dv:c\ 3^C];0$ɈABg=\h~v舥Rx54f"5鏛ZJ}Fh^!J~:孛Ft3U".Df*U]aK_hB#wY܍|%Gz!"TܻѢ"i{Áٟ18+| 6 0t *agBuۿ5W5 H ӸK+SU,hdz?E7YP^cƿ=/2}R}rhvʿ'o)׏8DWp)<3[{e&sdi\<J%v HEZQj[.Ql8hr&z|Lo&Z!kz9&Is@N;p BIM\;,^Bu;B u:<-I2Af_>#W0ś@-Єa#i @ޠc@n >%9@nhܶe_0Xˋת(xy"cH+dc"WULf=N.g!ܥI3͢ȵjPs߂"@l>bI͛+Mh>un/b_ la2c'b3&f 7uBޒa [,wY%3c ˙mhRݬG(a+ڵ`aܠ6) r UYFKA*˪ ˽Tfu; .嶮3sp =scq_&Nj]uQk͞QM3ߌr~V(b$޺>tjW:t_Z 2Ag_KgR.LP6:[bİQj]ts r2+.Q1@n"Յ3-p~VS3lӆ( * w[ݫ;|ňIEMܜm% |:q#;Py͙OpFǤ ؀wy)Gol3"G@w+j$b_·.KGڝBOeUg~0D*Ի,(UuHTHqχ >R)mhY=+ŭ_v҂ISJWal?~Nt"@u\zXT喸Q\cqm-w+2RRV,=v ;?(7#RA iڨ;t}u xž֞ߤYd^hr/;F~+{j[FlQW:s0SK&xYY\?ܛa|$\F] 0E5j;[VuWKNLikʒ{撾H$ ߟhlk_X2YDb}`ϰ"-CBhg" =gM]0o[1g?,$DIIs"?3_1n-N٦' iRaq(?#Iw7Pف>nH!zKM3O>춌+:w!)=j9?b{RY}*yo 6y: FTP7 ŕ 8`Te.7ɒO .vu` _iZ!f8TIYVzLѽ:@Ew6ыrhv))2Y"pڱ] >TwtW:9|uY XR֭"rYPmy Or`T6}2Ӳ +C 4M2k2tM)[xUS`M#`bdCw$1])}WxuI\p{_#|k/#r|T4[4)5긲~ݻ+ t7e%̥C{ Q'ѢaՈB﷧ ;Mn)l:"aI"]j" zGxf7%asCNh87ds8m]H0eE;x\Q7^cEwZ`!\kCهl=Y2+Lʿn0 ᝷ԂJ/5b Jef~Fhlآ xHQC0SJ퐅FDgj+ b Yv_M8R18P7=;KѨ$dLO\ő4K;LE^pm5mW~nr7]'F x:*&[JPnY/3wW)/p )TJ:)a%P<]}#* m@5ؿn (㪮v $nw*\\;qSUAcLGFoYJ=>o7>Yt.("Fʸ_=A:9A 39f"Fo ۮA7ttRm%DNIѵVE~g)+E1s<%wpf잫Јe'J * ,xLQ^(7O3~sfh T=w QPHe$vȼLo2o%1sM!morE4t䬱{1u#~xOsX-#svy3&y:qs#RXrư9l$8k L٫Ϟg9=#YzY΄渭ZЅ[]_O}ep#>C%of$H&Qc#69 ՘^U#g5~\ lO IɜVB tYwrq 3^):E]B=~LH7Yx4ϙV +CAo'1氽8&B ʊ75oZǕV7YzkJekbi 4= /J#!q]yIf\AaCfwۇP=4\F0tHg% Җӡ}Szס6I"Ëu~c[SӞیFt{PBpC|1 5}P‹FKz+*P &x7^\ j5aڞ;푇@mȵTQ!&7hs*)b[_7K0! 55Wh6T!%I~U PUa*!/7׭l0 VV#C - O@"^ŢfxST󓅽ڤ)Η6l4Pvjƚ HaV;A|84EW(J8V^JQfPY>>=8R,ӬV̄i[+1V$@| N19j< Ї0 u/y5mr]d~2vzkC޷8#ASgp.G FۨRfC ôb=dUdH)*>ća)TD/" MXS#[ɝE +BH6 ]w"l#|ڡB5(A9BqwAkbd׋K(ܼ/OƶFZт9T;cq7lO.diճ.T'ǗX!o4[`C#eǔ Zu-J2uM-KSb^>̈guj0)"P}A4ƫHb \Myj!^zb|X|=MND4BY2V냧}_5;T@P4Rt|b&C<*bH9ҿ=[*bVp[{}DϩJ|M(*B,]0sv?7A!BVk;0&S  xlNpe)n6Іʸ+0ڇIS_k|yDx[or wڟODj~rVχʷ^軫dr&RJJ.?{ֵ ;7n/^GPk04~8 짟9i~tXb MBJ]gGMVk<#L"%֕_6&/(TIJp˴m5ֽc<" 3=ۡ4 a>35}5/EH"Ä;xpJs#%NPO΍wÌe?W^^Fp2l0 P=6M@Tu/]+'bp<|S)ldb|p򾥍rz_v$$OHF2\ =4U:u!Q%?eSKs0Itk;i"^YX'#HAw`+`OV:,|]{M5 +h}GYmp43J= qHts+̽~= p%4:fy!F5hKW\ *L۽kU~{xBt͙ 9qiITMPO䭖LPcZR, E}6ܢ\P27\> I%J^Ժd%^PZ$q;yq)x7y_z? @|NE  o Sx9ɝR3N. FFp,/a`.KicS$B:W?6@ppȄf rm,qAZ -+c y_8)|̅ 0(xݧ)̙šVI9^j@Øn8atؼS]O2ָFRѷ3}p;bTȜ+ز`CYRW}o'/!AW=%>ig}),aeOU s>fd#?h#vr&bQq9bBtCD ۸'"0j >t)Gfpk{uYA*z?86me~ 07W\3 a!n@UܠitYNNG8%kQk|myǏ%@3,H;xp6V☌>쑩V^A 96o9ɢq3By2_4ʣ֒$|J.STȊdRJf]kQ#ma*o  P,25P !]= N&hG(hҴϴDYB *u#dGN4Jo-cd>ryצZGJ˃VxpC}(4u(`MnbFkuq{Zay`û GSGK40i'<6Nq׋6q&9Z{kY;vz1n"g-LERV_왊Y/vCP`E V匥B!VE3zBdFBƏt0<K>1 N&d7X2~ ,ݹ,w; |<*_wjFPfDMy¬U# jg5QQ[^yf^er=3D8i)CҵN!u̳>>b])rҢg(a#{D?f;(s" 2=-H-fpױ/7 \]b`eɩua[< |r">(Iwq3|uu s@1AA[⧏hu݌_j(d,]m iHkqo̗GQuR]2ߝ ԝgMSk\%n#) @ Ccb#ʲ1mRK"ERo]w<,'5* ֽw1s(Ť4O|M?Y/HMPfik% $s_vOC&@`\~CQNn:7kizBH-(,(Mґ]BAү#aj?M#E*F8np8+XҚ Ft{dnI=RJfT+nfsH>SciZҠGz@e !_T/ z燤} u!MD.x䠤[a^遈I>3߲~E 7@ƮJgyshLG:ڥIC[&ß0ˍEX0PEIqPSjsZT%^mb$W8+l+"#4~t*DJLi6!雵{&rFO$ (7@%?>9< ,fCA(GR8BT}=7 b4ɫ;U #i1O2R&:<(+RTa(siSxR{WƐԋ(@PQs9rc Z1v G )pQvmr')bZM29Y\xEE4Ւ؜J 1*Rc7Sݧ2͕h](? 396ڭæHbihÃSDN,x -FC?1CsF>x)\sg&ȗT9?[TDTjCs^1܌&|0$0Ʈq_[ʉ?0MDX"9!J)i+$0X|xlƚ`fCj , oDCB1IlD/+l7Obz3 I$C7frQmw: lWFRFe5).6p-؞Q.#;4c%kv8WHdy.H֮ S\e\Sos`$rwR3<:*@ x]qq |Q[u9QqDŽX.7n~y׬@:BD/}֤PԕׅӹFz IJR노KD^jk'lң+-X/j/8h%1p#y|.̻->:X|u5NwSG.ėGGٻ 9جdlɮKE'e T0ip19 b&L.aRm`#ԋjO~bAŃ|STQĮ u6ӻˬ(bf%;7ezpx'IJ`gy꾯K10$z !PbnwD#QE–)VpL)+kL;l[E'x3m1)?ZfJ]RiӜɹy#x<ĪSve+IպGkjT_*a@@140i1ECE 8A~WYi99!;9xlOsr*ʑ˓@k(,79o&@}@3ckCQ㤵ngFچqY)Ad dkJdś]=W90T":r&}%`tӷ9ҽ 7 Jordk[F{kc:C xeȻY=Y+V|WJ t\GؤXҗ Mh24` 2!K.p(VF|OFsxK }D墽^0AMv`vC^Bdnu;!1\M"Q|mV2tP(7kVrx>_2/c߿ȊB:f؉^O ZF0; xȺ 0l4IsH TsmxI}aWPq=80 q+7}G`aU5v~D{sqE!x;r F9+dscM~ڄىu+hM?!-93W@~e5bh%U~8;PG"i{Z{JF>6|j w9Rs t0OQ̶nPPD%6v9tg աK&!8 )1q{G9~ _eWߜKd!$_:B(6.dvapE#1<4dI @k@Wc֙ ;8:ۅΠ" _;K qP_7Tœ `סLjC8xOƨLNxjk:Y;A :7pXi=+Lq^]W^Mc봇49اq߅T [4'o:c|-ves4SeՌ8w J8ʙN }dA x; Ɩ־hZ3]B~.>t{Ts`be} &@LGA>EKܴţ>6wv5=y|䡛\-}^1Pi g9sb 9&SK8mLs?crNJL03hgOtO!@67a\O'e?S!Rz_Aue*>GS`i z =|T86)GljwWd#B%xڈ,TnbҚ:3l{t^)ⷪqଘPVt@4]sz.tƴD!ۊL205 ^?qlڸ/B뚶U s (JR4h쳀T "kYV邜^4VQY9}& HN/>w.*ޏ#~7^AAFaFQ~`l "v)?Sĕ3&>ec.CY/+m(;ÎchdP覴f ]afd)2-{"KVh!:k!l%Ӑ3Y&Jhq ` ;(77!n#Z*z)yXx8_1wehNܐ$5qeq[GIjyJ.g) 3дpN"U_"!ey9VĘJ H>&_Ŧ=qH2-hB S:`9KmS-_1;{w H?Rټd薃1|@4 oL]YBG'ǑMyRESkߧ\f]k2xe[m択̧%xH f:ne{Oʢ,PSKĹyﶝ{IsM-Z(vT^ R:`:WIaĻ& Žf{cctYTsAPLc/:Vb9nqNhq`rx;̺~lIEZg ђ=נܦ*NgVD~]>z#$3uI`ڶӵSoN0V|24rWϘ:2 ДFjUL^\ 4G(3tF-آ:AIdyKbeKw!YWJ"پׄu'4xyϹobF1y|UDh ['MS.z^BЛKzιQ'¸7i!aFG$!PӫG7rr%)Zl$Dmb?ypLKY=_P6S%2iwd|䲾m(/4g~Yw:d>zr%rk⎯rkyuJ'.G6TAo)gq77:C6#~yyo9,'bb 3\ q;|QO4 ce0.I}2[ [r6V;qе2' fdʭ26!0aRBtLGOˠҺ䷫ jpuxhAl7rp辟}Q>Lm&LU: Y}}rJ"˘P_o0R1^H?S[Ovǰ$xß gަ1|B/j>?? "_ȶ ֐S +3tANɛtWgá,uyl㞽֝;1YK ĺ6  fhyfw|Dz7#ʼn ߏQ.]5Fe‰4CU 5M~M*%'OZH&$4cϘ G't7"m~ŌJ;0$/i4s@@=o`;HKL0 0C|" A>+r=$`uWʪ:CeWa.x$ {r/1B6lc xJR/e'$qTٛ茫B@,3ʤ,#4GBjTd0vv@P8>cy`+,`dbnJǔcqV _zCA&[[-MfA>(%VVhƝ8|+@%Clv#!2oGOuKՄAG/@@!0X7GQjOzz/H~㽊{l8||@h?K^8a.(]兤yXyE& …dl[#zV.qvWN . Ke$?,EDmyQxϰP/:ŭ)տUnivecP ,rMf> ]S9i%yYdBz[rʻV-l4"6*_~E@z 1yg^i7Gۦ͞:yW3`ʆ ΂UW~ɻ[ |t64k[FⅬW:;AwWGCiiR)Y}/y{Rn!'K ̍n+\)"y#¬ g5STK_Ѱ8) j_~r t/Dِ@CNskQWD SCA?*itY}'ĩ[&=cv_ `ՆGA K<䦂Ί?dF /")Á)ijE_kc-5+`GwNW^ƬR~\TW $8Gxmo? wy+ӴbSVӨ8 Y) C R պ(xdmP9Ϳͫ7>K-Y[U҄cvÍ@c!˛nf3g`5DNxKJ6͆OۖW=T/.]}ӵHr/XVr`JB ji(mZX%FyB$* m$1콢1Hh|Up6p8H+ kƾY?jt3shO೸c$3i)]h F R%]$ͭٴe:+D]AՍ;翯Rk@Ɖ6 bGZyH0,Y+Lz]O@nI+aSDvjTM=ky*'z"=]qsK7Ƃ_k.ѥc,߄ -9Rx^ujZ=] skMmg8" f>UM?֐ɧ{ 6pߔ{jؗ]$矹A\9yA/R~A:eJf]A v(f0ʓl.P'Kejk1~|۷n n"TD8nV WK*u+}#aEҠmԚ-azARp#q`+M~DR=0Ek>ݢov),8nr H=Y9rD_& cz4ZUȼhۖ܃ax3A'ں5[穖F:(tl?g!ܰ}0#5M=%=qIeyȗ4ۊ4fmJå\)De|٭:!G >cߘUo}bNȀgٯ1) PP{F=W$e֞/PC?K O[]! G,"!$=zaV %p\x9g e!h}"͑mC 'à '8Nyw;"@wHn^C?xbm2mʫFq'$g0XY]f"U_4uCV㸮Q+k1*`>X!D:<(L 03 >H5n e,a(Hdڦw> "UēR@Cj& ]%0umOASuz57G_𶒐l2KI]VviFR8H//F$>pp"5t32ƃZF[H{.FE6ꆇXwGjUyٙopɐk5*! u*j:01>|bϯvJd-}gjB/g$5^΋a|X~z9mq<Ǒ9Z;yʪ%;w9&z7D@w.!d&aQG׬Ys Yy%>([dz2z>gsc II!p<'L2N~/Gx*ZVsW,v(BPf9^{ƚ!I63^!g`}vʅˇWSJВr,=Nyy6S?=cdxMPq>{m"詶)/2)azśf&hӸvz$Ҏ'OP?n5PU;~4X h i|-O[]O{)vV <%&>Ø i\-l!,]Fvq>rO5-nxiP!)vuk :鞴җ U-ȝWAE9ym%_ExlGYѓ83r4-qM.?C-F}FEL63* 2Nl E.'V1_b!*S:uDuTAlk+XS 2>6YaB:%x-kK/&B˴fQxP{Z=mWcۢJU 8[F'y\#mk>Do Jř9O&"!Jl!(Zmi ]1A*;ngڤ)#o hz;xOEDSOץleGCUJΝ '!+Yh,̇BOrvd4\b?~ߒrl"vWVM-?L=GC.tb4ǼMh%&5Fg z7&϶2{~&R[R/:{:,{N[ǝZK;1)Sϩ/%ć%`%@Si Nלsk 1@*@#yRU|Ig/Xu|3V=b6Tmpe3C)m*:#͖jfaA,[tulKxpZ0& 'J@oVvl1l6-ԇefXx*]k+SdȾμJ hF\?PA.3=mGؤmB~9qcDx-OP߂|+|oVW1a'΋ϯ@'gW krl<125ކNA>QzqPT ^d+s$8|iĶ֓gkI;X|dZ~JJ$D/Ъ9JE'<7efNݘ60拯$t Y8 F+3/ XFnn\bQ|s#ѐ.e4 BTs[a%,Ie%O t$"7ѩ:ѾT:"X]}p;NBDHI=萗n~+c?"X+Q?5  mѫo!z(OS/\$ Gs-κtK wxHGNx?iq.eĖZKQw"m$+UXv;XoΉ/`|RWgxJpxXsM5h ׬g;E)98 cuŊ'rOe B]ȱu0p)4cvYDٖ3Vx>u0n#YWCKTŨ+\;@ܬ=bej(!RS|W/#XHwÕNF.vpjM3Ĭ%;iJԖYڠ?Ft~~fϫE[ ?n&Nʪ'kIjf #?<*AO839'%f?{f:%Zr<]-e.M^S2D`LJ8(0y4FZбӎLB0T%L1iY /2Xf8n􌹆va^+|3 Fm2/it,K;і̺1O&DT[G]{Dmiq \9%@t;L>$ yNzPS@:[? ͓Nxo <ɀے[ZKBEron) ` e싏t29ѽș`;1ԩPW*D7EeF.2/bHiGC k,he/6Aq*0tK]IqUP5ىI(Qצ>)f?_]ONK}YW].`ωɜz`"{.7 ;.L`srrmƻ^e|NL^vhFzM6=oޮE/(/)#T?:i9gNޟld$ PI `د:A)ID(W<)'agg/b7NJx?ʁ3wc.jE2F!)AF_ԓddjhW"E Vz"!=<ځh1G[aBҼA?%8]ܵw݋wf5xK ÏcBJ/ Fە7nH?/ o@kC FiaX鮬= ,Xo35R*"n X1 b_) ֖UCǭ/D]a a5iEz+MJnͳ݄ti?3wxtF,b5@;fE(EKYG׹7_[EF0BLl{H2t0N}JL߭<{kCy"@ib!y*8?Z!VLp!1*a.pbK!} 5xLc6j&jdv$jԛ5+qt\8o?4}dM@*i4CǦ9ȪSط+\n7nE##o&9w1<$&ݧ3j%JVw^nxĭk+K8%~O59 䤁qd#!/%,Nxԝˮjv6y$!@OU\-cFpmE=cWBo6Yf<~LcKO09{x ;4)lo3eN˃L?PfCwH -ŽHEBk&RګoI"#i _(^ \d/,AX7{J5Zle=gLuW N=1k뙛\& ֺڋK ; x |mq#^ou*exaS4񊑃wN c11do4 {~k 0:yY +,0&! zR ZM'ZоSV-{i~ Zy6}ѣkRfG 'ge;@b 7v`e)Y^fLh +!:C|vļK߱4ԒH6U_KOl"ux5%P0C.JءBMC,Kz x@RCi/"TxZ,< K8 Y0vY&V< Lٗ `_ײ8Ip 8?̛l|(=&Zz;`kn{8̳r,qD 3BӠ{YnQe1:Vw!-pHJyxzcE݂LF>ҫKsjJR[;˗_4bye3`,gMyߺ$!jH;D:K 4&D7sΥ#S r`k}*4}MlET~; v3eCL]uӤgx'cQ;㿝%:bp旷3^*za9F* ZWM0+XƞM"NjM'&k-LqN$q̲ R fOSCh5!mCK3C#$ɻ, }D hy?&sOKu@K]WqeMg& &=J Jɷuu~Dqw)krsMondyU*|1ԩM0 MD>|=,Գ۔)-suȲގ":nY4j;x ΰKy%@5y.Mp걾egrxs"%БL Eh)e*ʁmF-m(;uT }x$vsk&JvzoK&o lr92*QeGtÞL[S!m_ 7D&Rb ޕm)Yw0C,`sW34ѿ΃M“X q\5~lj BIVК6)5PfiS `[qO$}9Bzm9ފEjx賕p F߃F]ԃ*^y) [tܖɟwv/C./ʳ2" % x.[`%+YjP}/6q7D9vu }dkb U1Fzм1F+c^r#(8;uxm J0.ԻuBiHwSFL%{8l-~#! 57S}`q٥-F̿Ln{%,@DͶbS"]>nʊaqӌf˳4W?S3Q  X`X'T(αzV2ܲC\P Y(,q=oez,X*ld^FU옾w/<p0?&ޢDݤa WB8oL)Q(L,VuMPN'DBDċpSaGߤWF/g]rT%.e2~}ճcz[IP!Evfü-RZ*s͐7"QsH01m.`,cQv`Oz!b T8O7*>̝gNBAS&‰, (,e?{:*M0bQ]ML?Fۂvw1Ѵ; !<.|΁S}rW*E0Yt(\qԴ.k>yŇ%<ܴPFu\֌ONh\'//Pb̧=)ɸYinF͆>JGmQTˁt]7ةO'1.3ebǠq1UKc78lYRgKId [Ki=}fю`H``jI%dq\ӳ[ djO|$K81èd@g[w.оcʴKu{1X$b! ncLBK7F80ˍt 2b8N,P:UN%UH2VL>6K!745 IPf$^It2-M\jVfᄄ|34 Ixn/ Ckv&Pv qh[42o\pD #'!M"ɦBKB9)u{#o㮰 u#J[RANQuNǿ]3c㲙? O9<fv "ݔD3`r0V1crJ%U۩Egx7>%Gm'y}%)IG"kHe|@vF!+P}~'E*{|_;= U-~2ociC#Nh=4 &!% Ȱ 2W@ C;]| _!Fz+1af JnǷ4[;H.U5"?Q-! -W7@do7v[rx<;3IAbZxga pqU{ψs9h%M5-pܵ"* 0F+5hk,)\6b9x^ 4ҿQEX̪)"Qϵ"ݗ/YD%2HPP# D䌥$VoӰž*B?oi鿗MX.fmy/ v2e׹6'W:-ly:Xe? (g~L/l6DyL:&EOAJXrϧ5D mC`b0%xvu}[^ k]M}D8Ph[8|xIÊ'~Eه e)LQH^|̈RbpaM5q:`MmڱI:R(;&xk\I6k)Z'M,CpuTY/ |AO*? Fh`狲ʩN"T -":U4Ե~ʇQ;۬84姌ޖёbn;;롆8"{2ut GIods$H 0Pϳ44 QON}L! [/Jٸ6#_+ѥ]\} #=[Y!3NAMdeoH*2io\xb PT϶l"E?oȢl%yn>sdM[]h޳(ZxfwTѼH~6(Mmh1 { 3]Oۥ\*7Mt:;E`Fj[ϚTǮtN\@@X84aW`Jx d͔Ȫl91ef}kQ\lӱ|Z` цuhCد Cjz!+*ߖ +dJ0@#Y^HC ,7]P#{ !0 ao2cc cf-fOLMKj&b$ @(M-2%^7 m[tfZWBgiv7Z\9X0aI]z@'Dw#r;D|F>E?`  OCKs4=VXDz  !ĵoD 蠱-:\vɊl4Lj;|K0$a'n#)Y'ŀUB7doq#Fe\_8:6te?GFx"R CBH^ey:%0ų_x\TtZAKJX?hcGPYbיԞ-T&54S%CYEi!L Qkv;v1DQ5,S,}TwT!ȷ{+ 9+6.SS9h2֪ ܘeguӔ}.j{'~:Js,GPXK) O5 @|dҍ;`+ a&B9w, VU[`?A#۞?o9Vx奩̚MK%<|@ =kd":P?`E$ֿuJt T`k6yl[CǣYP6-,Ag|#!J3G(b.1cNWv?P %8KH&FYjDS)b %QbI!1#ӁHU2b[ȼMD' 2zv휧 Ê"zcijz_;ap-)?Ttj׃b#tI2>sJBm bX0&p0qmtfVzނϫzge&̸jFJa4Dmu0S.Q]m5jRt;cRo:[jп_ &.c-&e,}U]|КAP(+FQ"Os&n>@W 'Ht "VhX)MH=C wRS+8 )^- XpJ"%xڊ1p^eۘhAA{ gFkڎm V17>A¯/"K<"X\  }IM0c \QWE-3Gs DIZXÂx oC)1JAo_p|87<6ζ#lLoZ P T~Pwv|#2KxC8>& b]^J1֥wk \ۯc7AHJۮ5܂W&5pq P9Lq\mrQS#Ғa,ϧ@捗aE:@Np=h.G"G_~7y EO1f hANZ|9#({F&_Frw䛒{Jֵ=A=LQzo_n䲭˹@ H'uQlt!$mо%!3K.׆c ƴ#Kfd< LZ#$\K~_s҅3Ht%9eԖqCd ,TկZ7oJm*aV-]_AS-e=1Aaqm+5e|@ecU>2fN:(:pK,' wW6hC71 CIK0)Ťmyn )ht)3 j+9z=V~Ә-YS!z;1~\ٵ󺒆J뭵*?);E`szH}Pc8NeOG+UD("ƵC[`ש9>+V&P|BYߦ»080<3ZD՗H0#yo ĚJEq+ѷM}\% uy_EԳ8D.޿fRw'=Sv!3J67[NNFY!(9Q@]1E){k"K0Ҩ Eo_'M"ׄyw~204Y7]vYQuoӕ__<1@H.sv;==|2h=4$pV?/q,t)Al!c!Džw(ۧ6nQ!xCm|^ٲQ>O4u;5vʱ]:͑dTF#e\E΄-{|4q!V<#qI1çk'vݍkY^*,z= 1^nqyJzb<9勩Z'ӘO$WS>l&Œ`y~}^&XX:U'Tۘ5r+s L.0@,_H;m3PFߖvkV$BJ?&C GYk4c2_S63$°B4sP8U#*~=hLܐub( 'EiX`]XA& {(}7'j|t<OTh$ʑhMVdvm12* қ[DjI2*v~^\pHPȔXt'._k~ۋ$ 2YoSS&i˽,=E vVL /Zab$!JO&EtE-: uXk/&ǁR!HO+Pjʮa]èA h6XuɊ;>Q n?ؓT\ -Y?FBϘA_7ڃ0Dkk3b// [KOuii&{t핛L&k9T>+O;uXUlMAf k} uSsWȘޡip=^? 5\9]ؠ-;бK1W[%؀LbB#[aA8;>@,&ڙBH6ܧ LWpX> (p9 \+2̮pIO腼ٺ喻W`Sm8n+5T:d8il)S8m$@#'3Yؾs 9eJЊ[/!`hY%"oqf D OV&[-׬ ܳhȯ~idWO߰r[nؾzз 3"JZ堂Tohz[Mܽ+Gf؄(I׽+!RΤ Ͷ^Hƭa0o,=,wĘ +d/nn ܤuMnU/eGۍxCh&%[3+c\≠]J^C-mkm>!ڬ2^tn |o+N(ə3{Gw7PRw? /:͠s|֪=uE`n>vA%C8N205i-\8ԑ&\[YIVb++wasZ#2RX[M9+]PՈz7lK( #ĈQ M* \sx{^h %2~! =hTpQq^TT7yIG [ '{;6Bjqr"%:QV-9o^!ґXnZB~&1.?_ɯXlg09gHySµFdvd>1$lQ ydpq)b0[H#!@D 7J;{J`o t7VS X C=Ɖ:cMp%:.!phFL!A6RL<9ԟc|B  an$ZKw& U6Kf a5)HvcQ )VFŗj{?|V2F7H>u^snCZmcS,$zB U5 vGBRj!gPЯxj', Z)sXdnD Toqzy{ %vB ˧!Oϸp$P.d6_[%<ax[tf E1esƹgs2~a;s^)YiimrG 7Lҧ˹ݮOEmb8-)ʺB8 z{ NJrO^Co4jfj(m ɢ.hp8&,y`LQ*iJ*_Ka)2N~L JK;=%3v&HL>:iډ"*Z1>m w jΛԍ{r> Z +\oo!0L/nG,TX7'9M*7;Qj !EMbBZtٟ].m>WE$GD 5w(יVx p}"אnY8J(̧2OdGn%VZ̘2e!;O)4ύJN:yPVb?](+P {HjiG*6MFk4_4}ϘCq֕4E^}{ѓJ5?-I@c-jNcZc)e/1@wwbIVpqM&0p9#^q&ևO9Uسr HuAg2XX-K4kC\biwWȌOpA=طs f5_Ξ%zR7^-t/%"ԑ'drJRp|+"2=(\=L'f7aT zT~-TC<9籇D;ea"90QOl,3؉`VlK.~d1j JԅM` C6Nc3NclL%3 =^aHu} >s!tj t.1m*E-;x`sRdUljvI5?+UCB~ǻe))6 evܗm1qFFÛhŕr/dzrIsњ8́,{%W,؊ll``l&f1’6FB;9}PB9R ^ievg#yp_pe/}W̅-=mUXE>`q$0/J<*\NkVHPD*+'ąHjea?j UW| =vr!{vq~%\PdR\{ k`S t @Uzʵ,"nƃb|OYȸ`UK""(M:N\Le-<C*>tOYwxiCFqK~x;ыn?˛ le#.$b\eP Y\v]1F<~oˏ1w8dT [u$s"+n@ ?ߑk]nȤ gO[VtYc :qJ|fNҔݠh%?>%XP3L" 3DzG-_~F8yֈТ70V+qJGaW],Vw N[ӭĹR{ms;]]|]_{fd*-hXz㹻u0Y׽[Ig7n#$'D h&nHU *h}`+eCOBD$inn̋»4Q>10Sq,Tp, QaMjI_Tf uOA (#a4xo$%`wCZ\`;O(zt<'jo0 ,Ȧ?0 B$7i*:vfNr{g$o~'S^C!@//qJr72߻F(ezA'zd|2AvLR`!,RR"~6A?a^ޟr}pn4 8p6>f.'x3Y/;V%m !Ouk5strMjߎ+dD('BȤ:_hL߄%"D yac" M\kbudtFã!&c&vHrK Ad.XI_NZ=qQ *>05 &X޽ - Cc\b[lΊ|K.Ic"!u y1vƸGMmJ1Et ~ˈ V07\A .xe@Yg?=JO4a<}Väwo$5Tʚ@Nlp$!͆B JCmU?/%UIN3-Ш/HPHC2lǨZDa<63ߦO6KF$.r)Ֆ3$+u \4]z),+& dF=h@!Mq7!3+X@qie),6o>Vm:0aŮ#)"6a4X 4ȐQ'"E =w@[30W`q] 3 cΝ5G[5=:ɔuD~rx>h 5Uʖ[{*UrRNAe~5Ri/{&+s)0SFtidf= 5^yRb.v㞩kWDVk wʹISs#{g5 x/y>d%*.l3Yrl&Z외_>tW**V!r؟&N+v

9_Cr)3NSj.[S:*E{00lTໜs7pN@iFȯc`(L.6*W=咎;ˁsal*Nr'6wH$'BAH9 :Lp1lQ}1sGӽ>0uy TQsZi ZdCp]@Kٮ ~3C Q3졸|uH< /Zi]9,X'˨ ZO[h;`:s޺8COW9ձ^'<?1a!tːd3gn_7+sœ8wk\5%E@h?R!$|1ZnY.C/ |`h甯?ӝȎJԌ(Ɋ4 ա" Xףյ CP?u 0kEr;Z%wPh-=`biNPw(*طҪ+!TzHR'-^\>^oB%Z5]R2Dp  bS8lp$+@KmTQJE,vdFPL06cޕ{{X`J!b .ߎ߾]s#qL{=ۉXy4ZO&(]CR79!%׆$.Nh02%aI&Ϯ#5 iйg.^&*+!%rxSTb[kL9)*6Jjr,I7<-SU4h :T{1f8 ΰ::N a9ŌRڣf:=5[".URvQI9:nP!SԲ.S^!WHhE}Ԋ F#@q-+i 8kahtؿr{|lp}/tkSkuI:.7j_G)h= c\aˇ-즒j:8עʶ)L#F*rw: b^:!7bK/ 0˙c'Q]6~'YݙI9i @ې湽J2( Dڨv!zbhnFcA\X Eh|]v =,J!R=Q3!89"hNyMB1j[+q Ftd;OK cT(~&KjMA˵ &Fb7c·@[=1A ܄k+.J00AztY%W^=H=D` |/@ wk"[&DW}@ 3y d33Ug$|s~3PkzD#A{KZ#͆~50kü"(Oj */ tb#ݿܺ>0w 5d@ W*V('"D2ޛa?O/ h*9E#,MoJ+A)1)wvz|X=1|ܼ\u!mu[.'d [AZl/I]EHUF,J/ o^/–XIS6+cxXiJ"$-':03@.p-+ صd &3 ЧCHhd WqB- eM_v%1? 2_('n@rFM 5B~˺F$r7.%Իd9G11>)uDoӞMA& XDPwg9PE+ G!EK}"_{:@k>D5;}VhJїpn~OlH.O D炕6`}\*~+;WfOާǖLlsGieZ,\L( {6UW +7J'䎯^Aՙ1oOhDľUzϼ.Mbt၎K)V f5o 8^1&pm ȟYN|ƙQH nf{pl}Wo1< :dU`u ͱ {b(UYN]}҅/'G`7UNt#Zm$ʿC 6Unaq ̰ RAy;~oܓ[uJ-6U44#~> @Է/DfXuM$c`Lω93r ҭ!٪@OJO;Z+gp2}:!Iem[h~* ]{2ܺj.{tv;-҇ ޗr:DH=Kbmô;onviłVA55|[[}uYaRm`U=v$Jua,xTh}:OF$9c pkVf]?Wz㱲R<! Cet~fcB܌O5vuVԳIy*pd;N) 5YbPcK@=:*u5Tۼv=Mb<{ϫZb(:V&R!&VPE4LKhËGi],ݧj9esmL K ѢiQYħultף M[A/$G~EyOXC|wi$svϼfjo5&t^uxO7"L,$Pg3Q8B66lj%$љ1?7 h] 82c!zp}Z dLN~ E@jz VÜJ"ӏgT6BFkl3 k.BoA88\dH\VAB 4<3W% ^e$\`8ّSe %8C>d+%/Ov'OCmVf؞SZLsnZK!8K*L-0)p5Xf¤pdVƯD<1kH3R_>mNLI4>f,&4D/g,@EXZOR33NMPL顡M*FpAWbi<n8Dd [fxURjzp ; K웈 av}0c&j4񠕚&{C(ɠbzƝKO8VBoouot3}H:~9W^ӛxFKWJڙ\/H>4lּP;~7QXsdAaR+SHB٫Bl'cess m:$c8e\v #`bxd鏣;#%O`G^ȫn.R uq#V8=E\6M8C-#R"VyFd2!AEȺյ9\pzAAbV/V$*zQRҺv݁ V NR^oo#=m> N5Y՟ǽZX72'>#cʢh `jkh %~^a[*E*sidUqYj˛,YѹO; g7֡UfrPp!^MԷ:w/`/*5sW`aH*>_8 0 t}^MӯiqPzz⒗%í 0z7%$m"C4@l :mOC[:$!]{QU@SAsP/.5KM~oye4ԟH]Wrgd|]$]%C2 vnƝ{rŽ bF6 騮YO*&D}]Ji:n ?k(rFE!/ĸY)?n([1ȥ$x;CǾn nB DtsgSv%u͈/վGa.=w7/VXrH:{gBknKIskI ե4$i9M`,Ǘ^"X: e ć@zcnԸ(Y5 +aLJ7WE㓉\L~}8ta=I&ŗFП5}Z.0mg)= ߏQ$Ȉ^)nsG$OvӶ"QY::iv뒃XvkUOe?:UKmG_rAjZ 1 j\ װo %.\3ޒT>=('|u$w?m>K, 6x'+=8]TZ#EܘSVe5z5/q|Ʉ9$#qmi3e?1wLg`\tӈCg4'WCحt':t1=;Z.  .3M2g X(~+)EJ53RǕÅhTgMpl.}Km7""Փ{- :P\}dc.MHiɿg>2NQ͖ z[-2V%.rck|-ۃ3+zҟӋ5ަzsM)액I>f}U.8ЋoDd$8b+ v^/`/Ut;w *BbzkdwT7[((WOvČ[ae^ekqt4`/nvY RV7gOmZrnUL=TYpMsзbkJ%.SO?Ҿ1=eohv E*{1fo\&sR}PǺΏ( {x$'eکDŽv`}6Z4(|i5# $mpw+H%:T(~'E[T}"-ެamqצiq+,p'ZZ` 80++&͋L 2w\ق u>Q{~ jAH(TrB|W%JZ==(0_PKKV1!Zݽt9C;TBz^o ϲw# lߺ=%g(Ra'"]tU4ዕ:Xq -JH\G \)LKI s"mIP-g/oM[g:Hc"'J5ͤA )<؍16 W Hz!%}U9bile,&)I}:(_tʭ0UQ4@e8`.?_7$6xN #G,6 VGT'/ F(@sԂ˞eɄ |Y0W"bVkΓam'&2 h:Wp苄 }c1@;=>xj@&+s~ڵ<XfVbtӗH7$wm @ˑn0{ܚCʝ,t[9H5&ȥ8{ k/ZʺFJ7gXfzktmhGHq;i~G QYjjRBy܇ȥ5X.:(ë>2?v\W뎡Տ.>7Btr]ZfuVNµ3M~oUQ=v012wӝ[m~)s N=U< `K. .d3ҢEP;` .lDwI.`Z,?''kj=P:߂e#ZsN~sLtZv\7H*|J$Mliڔ|Y !2'k6wμc@qˁz[·qc">+[sG&|xiu.n!kvޓa[[97)fԚ!1#/bm"|/9(lmpV؝b͘Vʥf!Lh4O0~2?88z*r*3ADIuy#͂hZ OO{؋=p!^90ņDOͻzNg@k;DyrK\^xxS XxTyguw8qjtͽ` /hl9o\[ Ћ:D '9Ѝ/2n#svrB&>,Wf9cs87S%=_nwzx{rX `#xkCdj7YH.']V]$0cBoɪi*&ISQFNj9e }"/r<.| g/WE=J0)r] f,^7΄Ҭsi2 u167|k |78`jf2]"3BwG[U$Zv/gK*6R^/D槫@s4ḪT3m..p6!7``[0JIYcȸ2U߸2UmeW#@*e2Y/;SLE"zHI4GWxG_a޸P,@=? q H*s 9Cܫ; y oOhWTY1O%E7yaR=3BŇs3ڀyb><^mT)^ >7}_pc)t6j%EU7Wk t 7"B ~GrC[KJ%1>:j8 wy\H6Q J:a߮t)XE 8gu3(*gK⩊ rt[eMRs#iP֛ZA*0ߔK"k~щ Rh;zn&(9]w&z S~EBa`HE=׵K( >1 }-DWF>!OɾJl?| hPy=Y?h_e?@uens.0c);=Jg7uaPS35`ݦ/mra]48n$ b3EsԄX/wb"snUj#/ r slo:Pv]/Y:8bYyg^BR"ѭe1SbS Ճ-n!Bwrpgߙf(價f i/~Oj{I0|XK ֑ܒ//`?z=-mHMjڢ V+W9܊ՀW`HǼoɻLe4/ _D$m-Vn>ESB 2Sؕ1lCq G KlSWLEŔKf?S,BXăaSlpv ]kUGh>4e8<@<}ަffbo>v3QR?M)j<1D6ߠ93a}:3KW\;*|²͋)0qY=Pap+?7oO5f <^OqǎWuR QcPKO7`oT>2Y! Zi!%,#kSsDg37l#)M$Q\%AR8cr|<6̰O"G/a dJ領| 0C-1r_c/ ~`˰֯\:D(׹g)aQs;) 6o@茤E90!6+va%)} J32Y;)S_E jWeA5!O>K]:tdԧF hb/3?T\u3 \xl(LMf5fpI,.@2 \ST0>J+"T:&`yedʵSJc%\%4*N]PL+-T=1ge$"xPir wsءRk@Xnb@ޅr4b[_.xϫsZ+g:ajUΓSQtqԫ3+)9pWF]D)1wC,8k햗 8{ ҏo,Z+:._fJD';qmXphp@EhjcH~w޶# *C)/^d(`Ԫ^YgNo˸R} 2@G8A8$oIlȌlERxV'qCdBsmVjaa6Cr5@+r!W;`!? K-({ق?@O巬$͏7{tA/V]ס  zpg`d \OMyQ^.*+S+vA(/{|!${`Ttr'D]wa$8yD0^ɰoĴh@ŮT4ޕe}aJ#3ўMARk&XXȔ6ܞY'ܶ@nLs0C$/(6|*WP0V-R O[As$fzq_- V§t %)h4d^rSNSvV/mN56&b_wm]Q €s@ㄢ=1/x==7ޕ@}eZqe3~ځS^/˘^8>4aRû uؕLJǚ`O¤ŏ&PZ]8\°aSa8O5h{ݔ)bȴevhsa.c**Qni,vԽ3f ]E~heQI9#b8 Cq`vu< ``o /n~ʆ{+A;sT@htkhX6 kU-*D0L`E]{=ZCZkWalGgNvFR_U)Khj%BZ уF3j[רs K5˶F;w)>c90Y]cHX01j6Ƞ ƦA]{$bnښ^֋ApYqO:}!ߒQa#9.?>5%V+y4n3rPM&R^StC*kI;Ġ&R|C\.#Mrw¾,&jCQvg򁐙VJ(Rhj/I(aʛ᫄B'wwYst!Y=+}qV.gu|3VaF5_W*'\8FF>lX%G+K(%-չXN^타p%LVd9]:V 'Qe{}:nU2G:1c" n-ڽc\4wj8Cr`Q^>A gql'xI_ʼ!f ċLO\$iϋh- h!Q_SB0V4S;~g[g+/ZinA\NgQ8:YGѯcC+Z&9r>@h[k彛hm-SNF8Ph\T $?& LjGi5E9XyL RMxUHvoҵS[Tf3>,RPki,6z-%jy9}UM~ikJ2D<ۨ@Ar. t2%ѵe R3BGw lPO_C7l -Sp}w,qסe$V~]R*5XJ$:çFWHa2Ej$Y"9üX`9ծf]OG -$#\ *Zkt%r<7^e^[pG[\p#gSekGJ8Y1/DZ 8@1< ++*ccy\*.<`K KotwOkƀD,sJ _ťɌ/ajtz Asw_o曕T[43PL${Ղ֐ jY}s6K6ut:C0mi-ܡ\odكG n{N'6sLYTp}'_%ݑ/I'|xꖞ15a%4J "oDh{=[I 3lxܤ$g+ NЂU>ZiXa|vh,jG\H/%$5a6K9C!Di Gn43꾜P%kpMG1]^3D'fU1X65bi֥6Qh|7"iej2أr-Ml@ꌰo%&-UR0K<ȓznZ \fG:A0an0|8GȠzθה@MhBNf;]A3qVT $Xd3!!Z1=5^&8*ֶ9[BWcs4F/!Zk9L`*tmV_CgoX :z)G_%Zx^zr00Acﯫz|݊y#USO$|zUܾnSKGQZ*Ջn8ZX;B5 ǧ7URuE`&(n5Z2ĭctݴ>yv-2zu#o29qVd2L-¿up%ި 0 xw{+֦h~1(ڎ]hz0dO+(4YZN8'=ނ/٫\+b0}.Ji~VC{}ৰg$?#9g or|d&W*kDܝOyF2- lHfLѳD&e`Z^E ok S"N1rO'vOυ՘yIpG~oCe(4@4Kp v\ŧ5pwz?L hW./i=$-U=XXwu-NxԾlgE*6C)h=DVS |no7XeqLnp|0V?$EEޛ4ָV%V\p>28 ONJ8X8@b/iuqcTLw.o-F% 4f)B 1(Ud AN[w st Zeл%Cd2اsF\Y@G<3zh{H>}5Kn,c|,X7S O xdY  zg75Md?v56۫o6tQJ/aNT_Pwu:WoYr]11Aa/e\5z3PO(@ϻ ] rp[񍋭ʚ3ֹEd'|߮?9>a2Qv:c9AVk#ߒ "4HΟ]Jm_E`Mgs R>ߍח,a3n9so2DkysM|I47)53eaZ.vV [s,}.uÏzT` xl[@k\/I WOQI$Į|6wq.siJ+-@<4q[Iu+\BXJIKw+Dn<O{kjlR$lqRLllc y YI8ʛ#D!",ql/I1pe1/#)! {Ю+D>=|lFИ[~s+܅e96K>cIGvU~Ŏl ƓR1J&P~ 2b tx=]% +χp\=|ZI\ޔl6tۡ"Wlp݆@, 7Zb4y.8unbmM_fڹ=Z #3r4i!bWr(`#V5&eۮDja &K [8PEh VKYMRZ/]EW=s֌,1̌E1"l%"&F -LlV6Z| ,7<5Rou\l6XW+GO:IJ9*b0v> Rro=[6)Fx\*5-4CBZd% Y}l|onPt:z5nƉ ̛b3BXapJ|LSeN)ta4qN=g,RDS<̷ڡn;<'eԋ{@. 4=/L9 CcMUU&NL'"\()Ŵ*MT\oŻYP\5ƬH񍝠6f(пq-CT)d$(Ę[}]2bXK)30PD=}N2 jq(dXဟ8|B,#*J~^Jmv4Uz]G2+kݿNeU:_C_+BsIMW/G<>/Ȣ$ץxmj )8ȨfS ŷ@` }Sr5E]bΖPI]?TN j:Vca4#U'kfJ# ^ep ) o||,\@k^l y L6c&J2.g%~z`Gg2gNL:-4ɕ=+voz)<@#\ U9{ =1N8AHaCҽ&a%n,Wbb*gAUaI hx*-dS4-kЅ} yک-[K E؛S[5gGN%ęN9/ a4Om^ë>`WDUnMȺ*Xi $ՋvjS4m  v65R@yomo48o9[//gi/=iƛ=?6'lETFb.r4> ЖT̜3 D;-/mA2Yhġ)s]>IdN ?xzMµh*46Iͺ,XWCޕxkn}P 2[F3}hTɉVRNîUA&T~u 713}>ū笰7ߏ4%`Ԋɰ_T-mQlFŠkyRЊL2/elR9yU3|tJh-RG7Hr`Vp C5*lnJ=A5~b 9Q_-֒+?x.Qv~I?oBvL )CD XkSN-8a\T."ٵ}%$GUՖ)S6A=T<?e;˲8kmਗ਼0\#!Ư30M%Aekei6Υ]'RX--uİ6]KDKg.=[f56/ D>/vx&{yAqxǘ(躢kCo t)-;r܆ITfBwsHMt'?©[.&LF̹Q\Hn>{T΁/9lώrq2ުq9 |Ax<` =4vrh`$";0|Z_Vd8Q[xUڦJ2puu+ynb5Q'h!<8#" 6N[E Dp݈Rs?t:;4Ve$wU@=骝J !jN.0x&-*u8'bպz&v ?k_"#[?vy|f[0ؙRc ";v[eRz4 V@ j:5n}}A3#<%yߎ  NOʖ bǮC;A/!6lUэ| R j. 2f.CZZޱ;VZX ,U0a61D"y8"F橒"R m{L\bHˢqGfRY[ϟbJ6,'b^[H6SHŷ"zcƭ1-C`Žmt.ب(CB d$T+r@,`E4gD!`e 6/0Z<.s 6*DWOo49֗~S__9s>2,D%*Nb^J}5[ƺlS0P:9jBx9mH_>E_27]ș#]2D26V95/9ԙ̡@ LLYaq 0=!V i6lYdsH ,Yca-ُԦ_ HJʢl b eAzO٪.ODtp:_b:u LqZ1n3CǶD9d*OхI* R-eH7G:BvPLd.Ap@_v2R&{`1p1V2^TjG$'Z׮DN~$ƬdzB47)Q.ҎS39ucRLa"Bw|(VMԗt3&0Fv:Ctxޖ r56X^WVgs,=Y˂ 6j}(hsJ.Qe3:ۗ"UB7ZuӱZ31^s>Dl< !.卶yӌ7ʍ:URC5ƶp'Hmq@D,R~v:,O<i%~`v1Oê[+5+tao=P%qg%Y>v޾T@Kz @1uHR5g~3 CgrGxh-׏z72>O&HTAX{}-u6iT| { 7pAʜ =:h}Otց=lJWtJ|:sq{+h[wǝÈ.Ck2VK; 7G k!=?GEn1-:#[#紡ȺޠÃ!)͓DuԅgWRˑXIiǺ M,0j7a IID`,{46 \iC?@x._KZ?׶`.F Q^?(_{]?!=-c՞OeGxݴj׌=}4T5\<,,/}p4̊2Nh #՘\= yzdЉ*ϑwȈ?CZ צs=6= II˛J{`%gH>t/r(S~Z#b0NK#4sHF/ȼR-m՛AJ !,Jkqly%9WC?k`r'}§ʞ;E6@cqe *#F-sacBug%~#!4@;$#/gGYTe6ku_Z5?_ #7ȔwN6H/Hg+ʞ*?r#jVw==]//Y47дabAS~xpQ;!* GEI~#%I^{Ttț˦L[qE(`-{cs ǚעr~,ccZ~dߏfe .t 㓟=,CvҥťY(Mj]}XK~ܑl”A$?A|`pKE%%'op/p /:_X.t]QB$YC%E!#'y2GMes'C)WZSG98&;\P1br`A7x1VX4+)O7QˆzQ RS!5 ~ƙ\^,:&\P% ڴO&}&1WY3W=m*UA; 7Zi2ݴVZ Sxw"k-SrSl-\ 7$@h/t 鬁Brm{bv&,=b]\6nh=,yP=sRmu.3rW̠N4QgD[RMb0 e+ޛm'4gt=u (d ʻ\mf'|pa%(HpW{|D2 ghkBXZq YS)\ O&&^QOfDų /I$TȊA )1滞6FEuW:v%_83׏νl-T\k@<6*7|1Jg,ŤG=]Qg=uS5j2#15hs|vaNI¸<5$wt,v:I3Hw jɧ7QLYF&]~hcޕUgiD4GܳE/a+T̗k*J 6%Nn|XfŬTh߇M2F&2 P7}KʹO~)ɰZ.|(^KǡCY,pwzlI%dh]K y).ңׇ„mH}TVDPwTSVisܸBX?@iVkDwp\N&RBwω;sOÁ5뱾ml*?ҹ{K "|\d3coBR*\vnơ2y2Tzt)cr%4d6gr!ƶ,Y3ԌZ5̛#>dQ]OEti'APU3_gʌ"{h*l!X딿`.! d-j4yMxJT~#ͤ> Nkq.ΧE% 9!: U& v+*ZL-=&\%nyxuD,fJ|^)I |6 g>uHdcD@e!2Ժ ]tK')˻[kIjX.惐&>VQvȽ(1V"Uѝ9~ ֠ -FJXP%3Jª 3@TmceLD:pX˘3 N7P w6G!+.3?%Ʊ1aVJԏBYmRi)PcnȮνEQZJK+$ E+R/y8 )q.v|7f~cHڃ^ S1f-~^KL8߳P5%֥q 2zDBV"C7VxnK& Ej) kޒ^`-֪@H𡃁|e|ZE"pMv@OFݥ>2[ yxr3Ѷh6Qj%q6fYb/?G,\k~ivdY |i|_v>,YQ 3)>Vnmjjn!5795fN&g`dOu5`n6t3C3k;D(,Hٓ 73&a4VO], n*ά㜤.5A74\B#!/AKbŸWƌYQ| &."eb;҂=_3?OVt!a!驗y|Aa%#:}jUu!Uwo #>mAH۪t@&&%tix v|fJAFއ}mw6ϋfY|R÷ =(psjVWéڙo;*f/3Ű(s JXݹWbDڞv .~v ´3`coC&h-,,%|5vcX̠_Tl?v;s%[O")OmBZN+& ग mT" Ϟv |\1S$9Pqsk eYLQE`nIp\V(NV%9v##j@:US|p&jݠ.7} WA>@a:=.UlxV1`ziBQ^EzBߎϷJAD.\5 ;vw.iRbYP^ 8sp)Ğv(\0>2O%30y>Mav޷Ic_ӵCDۉXxPi<08sim}ZAWlU2HR>ϽPA CfK茯jNSEm1Qz8DŽؠ[/֜TtPQ=m"a#EcX [N@]3P.u4hSy5,%}h:T"Pu V.˹Kg #?z06E !n<:y"Xq´E$lJLIv,AzǼ$ۖ?)R4h kq5`LFvyk0;4( N;ijLsWW3jwz8" ct l--gBa0:6Yuz!1X^ќTIF=:K֢kg'|~RU-j_c3=X~pz[Z`bogԥ[=p0\[#RMŮxI-|97]C%5LIEjbx0STZrTk4.l͋ ln}_TGot^}ܔJLW&F oI7`?R+O Gvz[MbVq,, YzJJEYx3AU e⹘գg>$fh=+{mMB2Jޒkaa ;66GHo^+e+'[!Mukk*~ ݩHysCFI^C/By]lM{ /[%ŸTR̟̂9})u@|M") r^XK6B"P^ ~ZnW_;^+,XhVB1-;nF=u_,t;>jG+)dl6VL0L+X44sx - #Fx 7wmmb#Q'ς'җkȒ7.Ligߠp#ӃQ):?+}uUp,O!D7V80\~ЫFڛFTo${/_m7pe1jwZ1~+͸Pv\Ev5RZ TWaZUGqpQ,]V-e=V9..vBc1p9Tb )*Q&|yHpl(D 2>Bri9ՐJ\f[!7;_,O(V'6Dr2H߽]krtj0{W<&J :e &9kչb*DBz{mXUju=uk/sNG&dGNY~ c'8D;yߗx S%F:txT,{ZXwO´Lf$ _[?7<Bodw ?3W=QWj0)5zs-0%r Z$ D '.)VyjKf_|,XT•f υ'vF˃*qdKP7j~t~/wЌ#3P,%K j~uI#ؚx0\&@^ usL{^3;vI?*Za\;=Rf—/w8QbP< ^FF_envQ q"] I ib5}p^hX|"psnp]y.|y0hDFdEW91%+VR{'D!.n$p64z-V3U-,OY4zy8b.=ȞxA-}΃F%+i-m" .67mhyey FPfK@%-Brަ+oGN\'Aȱh?,th0藹Sq t{DZ 7|]8)o7b,5`Ž7 dC* A;c4sF^IR\M?][. .QOLRI\wz"Ѣ.Xz|oZTƕ$^"R%TcO%dNW*QAf: 'Mj!HͲZO @Ҵx58r˂WzF}}],GucLa r,j.H{&!yUlha0/ou87vϏ `| ŚJ7~ZӑȄHp"A(\nPľBj$w\0-I[K'W*3Dy?/+&4|> R{sg aԭr,7rG$؆_\Nmp;`,(`ۓ'#.OTO-+ PgE~3LJk`3#TTÅ26>}3~0i0c!w]<=AEy_S@3EDyНi0>*rⶪ %QBsۦ: A;?% 0T%WΎi*$YWD#y.3P=COp#ag2;T-FqOi% QCВMuYB)s&!29jf`2_fwgS9X%:`x*hO'huޤP.qTʜwkӣx 24|;W79}ZZ[,JtxQPmIxy}Li\-EuK3胵Oe9 h=|]#%W(ggԣɿw{0 kIK6!ٌKbAzt&p!SM7b*bG5-/R6:RqDĂy"˵9^ҽ$K<)@U!p͞-~ YoF$bQ |je r}^ڠ9L e])Rz ȽD .gj]aZI|^cSwW0>orL "W#,tLS<~lfFC. +DȄrhDXj5Izuϵ: 4R5j͗zlR-삜>bq%{5ּ M_kAbς[8{k473"XNۂ)s:'+-MMCZ5ͫ?X,JOo,Ƌ*~Q(M*k[C@WmYC1S(FVr۪:56,p"#?!1n'F qy/x~S5Ge:Au\LANDSAW1` Ư|R0*}& ?]bb G)jǛp_ۄ:M[m&G'f`bfW.^(2`_Y9.]GFts|{N£re)B"k? r$*'ƳZqN^hӶ=^Ʃ3Q,7"lP~tdc r-~_S%84_{]4e}sx.h\7s er- e=bPA U 7ŝXx`R;]@UOPRӖ"~fX둧Fzr"z"GG<A.r)1%tY;lzOC|:n-.>4czvΠV<1be> b#kl]d;Pc*E ic*Z;$;EۺXHGǟMв,a kR*Ry7hH-_{b§Ut´̈́zd_I$/߁MlY.$xm Tdi$(E\&# ̭M~i?,/ §LlXeoz t^'cާRsu$EmA%6}>ydg9Lʌ\x'pjT$-9[3-H8f<' _M/` cV|!˛g[\(("%5#SSm;&TusgV V)^B;9$6~UuEqw9#<ó"KHˏtȰ8*gdf,XS Y<3=e_2f-nr{Յ&3h⛅fGokuTQ% /L VN+\YF_KQa1@" 1O [ϛp! R[b'&eiSXE~(q:W#lפfJǸT7{S4=b# D5VHpc0-(~q 02DJR9ʵۖde{pk; J /Cv\&=u[v@4Pӥ];ѩ{|WT_o0T*A1jb&@L}g0C,IpͯLyϼI~ULfu&]w%L\Uˀ }(+\[Ҋ,RZTMI&8m>V(T^(5 2q:MbGy]^֯+F^S9c1t#: կ m/?ixjw!CtcMx)t]^zԵW4gǥ7\xٛ5 d/HChþ:꪿ {sMhLUB]Wň`M q]oHoǁ/B⦜fVHs9C#zo#O,$GRD@U*lF')$|qqhOrhgqωOͯ;䚺 4\ilmЄւv/qXi{Zf:=f f\Ⱦ*/;lÌr9JZC)#>'hX3JZ&& 5Ƹ^N;|]a^݇U#Zo/r&? ewoй)iu>V412$g<<*Z݌ e HL&Z 3KE1{p& #F!jr1-]W"6tK:&T~֦e%S+l$H)ӛ pi,#,k{\eW=w}8/٩ {A L(ҏd}ye:>(EepY&2YAWHP.]5wUBU2Tg@LZ:ӗ%5Vd;q+$2450RMtyk#PLmCN8]YmFAN~ TKN#>AV);{8fSnp`gIL`|*Y{9> DonWE 2ɽ?8+unM#*edX=ߦ1hw lX}*P Mmy,"i ]=7~(,&rPIWmu*Ԓ!JH _# >QNҫ5qU_.B~5Zd/s䉳PMTWx l S.W9Y;S]X(>e2U\umן0Bpšȩ/39*)ߴ7oZfj nAf`T7mpt%*x2ֈJDvga@ 1;T򋸰U&Q7/#RA\BIG;_xl /8Bp<` DR3]KeqD=\hӛ*S0Xk9% 4F[B.$l=J)G5P:ӂuKeOXծȂVR?3U5];&~TBO1ǨpҞhVv 5:0{74\`R ~a>p.s-cuw%10SyUO5H@m_%9#U enta{YFP,ӓtyR>ـzRZօÞ,s&s`=]SSB[+A>!F3yiG"DK3?0H|\٠x-c[4,phs d6L&09m'hZ=O@ƪR;5ar3]́AqG5E@i)%[A\_ȢlQMClE7H2yܣ9s+W;S~_-@^7&]l>AgPpE00ip}!([~ % R#6e´VP@-X.,>{H*Vmz&<{HR"+0rnz {֟c@ɯ!C =p4{|/p!+ 1qqNҶMA8"-9vF\opkދC"`!}~ VaO!s$ui%@!RC*G{גxJЗ8IW?%rl=z 6/inL,o::sn@|UTO͛RST"O3Za #v'5u{{'t-7. Ό@hꪖ]up󜙀RSݭ/c}A) V36@YcR /5{RH(O?m|hshh 8Iy@SFX$5ض> 2W 8:7|3˛S> 'f(D ;0%H_*7@ -06İD כ(&>Ķm iFP };X@R9i56Bhn 'BUM{\ dW.c'"2T_8 &PP(Cdt}ϯB,g}ˀa4\8_m`!kF{)sk"e ? :WoRbP!fr1T6b%S+,21}ʦ>9 K0qw[).ȋ`/AC]=[pDL,hl Xg, +`\]m V'=rh ]>_xbRkmu?ُPr^@N) x \9.Œ˲A'+ɶ}lj巢Ğe+7z;Ŀ ({mNZPN؞b}*31k^iai>'Z@`;10,zcm/I /={"lzEe5QAڰuwvZb\Ю&EPuzz*7P?e,x<=>1Pƍ=00wHL+unSy:;2\& ^]42Ä܄. ldD|Tj&OtptWL.BGX(a09 ql>'*%?*r,KIؚTwԅ ]Q"'lkGtkRvvnc`YFS珬s |7$1y=ԀYd_)4"Q^ ֬xp( 6f.p;=ˉuR즧uSAh/P= T 6zJn l.ү&~`h[5#mNo(%&ڭ6(@6y ox?;DR[H$Wx1/Y%Z _^00MHR@9wB천FMȯ3ۦ2ANVoZI3+~U8hTBUrxׇqJy^i# gbA}90 ?Lm,Q{xl{92LI0h}"%Wefb0ptW0<,ic&+%}"GTX;Ks߳ #FoauYmzϿrT`-qf]87HQ ޡDxx#+KU.H_4Ad;bTضW24)YϩU3]K=' :< <b|&$?;)aq6A"W ækRiaoEj3>)z!j F,trQgQյ%8[0DH8ג_˩Ʋ' Mܮrqs"g"y"!uU0IL4C[X$|{5Qoxx<(Qc^S~W `Ke,f;h]!h%^)72tzof<0G~8d0f~t4_73h6ZBI[]&\$$=`u/9,D[26'HC+SO$ԷV:,>[ f)ל6%t9w2qPN T-RFa~g=nu}0wD IHPkÕLBq&Q;hNSo}"㈌Ƿ6t)rT@0 zRFI3[9fԦBf uy;NA2mKr Ű7+0a-e]V~ej4%׼PR.EơCf=f%<=j+:IY Jyo?́ *BQ#.7;n\X)|ݦu8A!+a]` \R[թ I=I^˖7~R%A|#Syv0b5hy=gs]׾C"o>|`ǎpj>LH%v%}wA4KR HX}.m !FH. ?GQJx`(Q0.ۧT+#K'8q# L(46Q< R*+Skguwf# t'@.g2xjSSL!^4uB|j ^-Hk#R&gF eB/1&IR{X3Dʳ$'bEZ(`|vFbh < ~D +tixjj$gS[=GV[;0"0B!z'dWG .YD([8_mR0{=`Pfw0|%t1M-LY\byX!E!XK|%cJqR5o+g@T+:2;2,UF0Mw=hoR;U\.&Sq~!8|2NL{Jfr Z*M>?N\8 { O%i*o ~/HQ3ȥX yu+qWe &M9GiۯQZK]GlXp9g]QZwrAp#0F-r3|5N<բ OCLt"[{5GGVoâiR$[ye:QP$)FXƺ |#fs04Ï7EvcdlUk\\6)1H07 t7';rBL-HLthk1iZ6۩\g3p兌iw4_tWZ@ RԺt%Y!n{V^W4bxapz lZoDXهb~0Rg Fd O(ѩ۵з^ޭ"T $(Hi j^n8#g_Fkz3ZDB(%ɓP`Q$h)rWzs/͏'Y~QBL m$i(7ӎ,^sJ:|zP|pCC•l&3/d(;@Yfȕ+.Vc̈́vr8:ķLS*Gբ!?  B-Ԋu\Т4MEM((u#SE3f2-ȋOP sZݟæc\a%G8>w<2MS-(Ek2ѩy&F("-%9#ԑk}dWh gׂKF PC38ӓ| GA7-[^y OΏ*& YPj B~ ʀ2DV옏 e̅Ju ) 㕷 ;MSg ,!A: C1fv@Ίu1~r:R7 Ƚ s5纰pͰ" Le2DM7TBJ3QMEz f(iNاuuB((&54[#nmY{T$qU:M/bUo*i!e: v =oTl{퉉,Y`3^޻{WZ3r)>=v63Uc>!:֮AV.┛9#{ =%0?WЮg&-S: fNHjOmhՠb`k% "%"^LT*jXPB8u7?LT*:[~\e'FK޺RRPugo fJk.w^o-HG$c)IcX&(.nZX8ԟt%=E ЌP;)=W1:c灗k󒌉E$R។]fIyuszc $@X.4ۙ i牌CtI(ٔr6W7-RWOOZ\x Po j #M[l|β)}8,\o-s$@sMcL{]rlKIٛɄ]ē% ~7-0aY*rIm{;3dxZu pCUPTJՔ >bFkVwtM4\/v:ۤX%J5kG@w>CQyn~ JLg9Y=hba5ZZ9~!kduoBxi7|U hSو :.YN` !rSӰk\ָٗ /Evglj&0+>o9OCOc(9ֻmQ;m|Gp˄x}*3?/>J@ l%"!]6/6N\í^#>Wi\(=]Qo zYBB=Cy:l  ẢtT& XA65w'yŧ-zdg?Xss'r^Qwϑ8) ޗ|o^HPIg.Xa]/dlNȆUp[Aǵ{=Sa 0r ǭ~S7=GKЌq2_JZIqGAaQpqֱ-#߲vn#5yƄ.0ę>2 AU랿g٫/pu8`M2;27j(R\> }H G~vnYD+1.-MiOҀ@kS EPv1θfmR ?eTB6F(' #T%֢z`i5\ND=D-.Їsg}l&i~y8#yn&$ Y[ +X=rlfT>Y ;-á1MGzV8omҵk9U*56%(jkSX6iL?J:.| H7PǩɁ,BSLS17=61m x{Su^evyծ'՟^2!c;/w*rvݕ! ah"%+%}h=1F9U^,@1+vOw݌~isN_pJ']ȟPaj$2*6rpM/q CX~_N֒ 8. }fC.}񂯌w*l,N/h1NOKcZ"-h{KpQTWB]м#/ELF[H3$0F-bE1PGr ezcNbIwAjպf 4Tܩzz@zYS;`H%T2tc PǬZF3+!eVxu ڗ `f^!`>[ZǤ1hM2SD#!:R.Ng|=Ē7!ghu6k1b|snI_{WC0Ҟi3'N[V'lue) .lti&˸FCtO+sv77Q&)S{pchXg"Ͼ7 ]:Vp1BHǎlCJwťW\]57mhdJR-3Ƨ"܏|6ZY'rD"[UIz`)u{M{-8xy9<|{xȐ4uE,3xt9GUQD8np@JE[ *CʈU}>nra(u 'm.,Yrq#htA5z,`W2f+6FDs@-:|ӥO'pC/;u0ZBd;ާʯb7e" ÿVh•V]HL%OU`!I1LbopR|np8")VJS8 DJj :2;KHhr(Zν-_N!qs?tyIWhf`UG3QL%Kp $дW,u4\.R!JՎ.$~5&(',V@!Hv5o" :y8n(t8#J귞05!(ז<~i"s!ɢ| \@LJCi t]UH[n~VTBpM,^7>LD@H)4fKVâWAd%LG}6* 203|en 2;IY\d@xWFV?j9 >d_~/QZ1ΛWEz+^sG2Ss[3]%*(+!:kY9_@=amJR&4RY 9<$Q!Ѐ~"U95VCq3G@~hNJzl CXZ.Ep ,?^/l0qH1m|$u#r>U)..} ^) uBc&ɤ+c_>2É1~(Ew|Y,[n,[vsص@T݋ ~ihp썹!smXEo ѻ  L P8$`XwrI6z؀ջ2H)ϔXnueWQe ^ޫ"G}Rj#cRYVek{)?d)I/p&s!J%5^qWl`Pꕍri~#(G֩x2wF_=^VftA-K >¢%/KTz@;F*U|I@ٱۡ$.]8XsS_Ѿ’1jlHSk0dySPwI R{'N+Ÿ?cڈoh)!`|#8 Ҧ>L!t>8}BI#;Ay̖9X$:()wˠ{qxsZ >#ݜi`t;?W9 mtNmoY P :k>DՖ D~ Ih6$nƸJ)`ϚXљ8=NR ܈~9,n*O2x;@}$2i_ kv6􋅥$Ao;x=rqD k a<8?ϊ|u7-S̟L@VKGNnt\.ˡBctRVM27$YZ=@8:UɅ_6VCJ|}j"7.fuq(/[i^8z#"_ၟ>HWjO|Qg.Hrsy,q7Y%wg ;/C IaUJzD]sa_(j$(="@;)̶8>|}^-a_PLZ:JE&'HUf,e8-7 ڠJm^ ^PCh!g36^Le_Mќ*@$u`TAC] 0`%=:D^) &{jw92/ k,m1F0ivF";'}Ic嗎BD?4AA6|I HБFϨv"8[( fZ>qmr8 A+⍁/^ r`}b(R4W&)rr m#-hL31lymK U9=>9K(I#Z̶;u5 -"|Jl50l_, s<