xen-doc-html-4.9.1_08-16.1>t  DH`pZs/=„YU25(I[k]]02[JM !E4ΘwÒIf/MVDtj$5oAԖ<A4+ZDA5g771WԜeAc-Yb.00pAxT&-BVƏ^L5nSˇ;ĠUE;)s 5_!fJbtO"aтD sM2x]7042109fe845162eed33de5e735afaab21b4a8c4Zs/=„#\Vef(~ ̶õov`9wviFiv1{5ޣ'#\?D]yչq [ HPժts1 \{.KtP%xA%ʙB9o90K*؁Jt|B8jj~>#^6fEs6~`N!Ӕ"2*HЃ4//٫pD½~"Fq1)ZipwAk0ysBݗuUb 4>3N?>d  D 8>HXX XX X hX X lXXX<XX9(O8X<9$H<:\<GXH,XIXXY\X]hX^bcd e%f*l,Cxen-doc-html4.9.1_0816.1Xen Virtualization: HTML documentationXen is a virtual machine monitor for x86 that supports execution of multiple guest operating systems with unprecedented levels of performance and resource isolation. xen-doc-html contains the online documentation in HTML format. Point your browser at file:/usr/share/doc/packages/xen/html/ Authors: -------- Ian Pratt Z+cumulus3 DopenSUSE Leap 42.3openSUSEGPL-2.0http://bugs.opensuse.orgDocumentation/HTMLhttp://www.cl.cam.ac.uk/Research/SRG/netos/xen/linuxx86_643+xo=+K(hBj@7V@7i?'B W  eR $,76H"y1) <3 " Sz29L?Q٨UAAA큤AA큤A큤A큤A큤A큤A큤A큤A큤AZ^ZZZZZZZZZZZZZZZZZZZZZ^ZZZZZ^ZZZ^ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZgZgZgZ^ZgZ^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../html/misc/crashdb.txt../html/misc/vtpm-platforms.txt../html/misc/xenpaging.txtrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootxen-4.9.1_08-16.1.src.rpmxen-doc-htmlxen-doc-html(x86-64)   rpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)rpmlib(PayloadIsLzma)4.0-13.0.4-14.4.6-14.11.2Zp^@Zk@Z]@Z]@ZV@Z7Z1@Z/ZOZ@ZZ ,@YY@Y@Y{Y*@Y5YA@Y4YYYYYbY@YJYYV@Y@YYw2YlYh@Yh@Yh@YTYS@YJ_YI@Y5GY0Y-^Y(Y"YY;@YYY@YtY.X@XQ@X@XۡXg@X@XƉX@X @X@X@X@X@XXX@XXXwoXs{@XlXWXRXQ4@XEVX43@X.@X*X lX&X@XX@W@W֘W֘W^@WiW:Wt@W.@W9WW@Wk@Wi,@WbWZWZWZWYZ@WV@WEWBW=W;W3W1@W1@W,@W(W(W(W(W(W#LWVbV(@V3VJVxV'@VV2V͛@VŲ@V`VwVVV=@VV@VHV@VvV%@VV<@V@VS@VV@V^VwVqR@Vn@VXEVUVTQ@VMVMVMVA@V;DV9@V7P@V0V*!@V V@VCVVVf@VqV@UYU@U@UUݪ@U@UnU4@UUK@UU@UU>U@Ux&Un@U\w@U[%UUUPUKSU>$U6;U%@UU@UUU.@TgT-@TT@TZ@TZ@T@TT@T5T@TLTLT~@Tl@Ti@Ta@THT?@T=@T9T5'@T.T*@T*@T)IT @TwTT=@TT@T@T_Tk@S@SSj@Sہ@S@S׌S@S˯@S@S.SSSS\Sh@SS@S[S~@S~@S~@S~@S{CSuSpSl@ShS[SXSI*SE6@S=M@S=M@S=M@S;S:@S5d@S4S)S L@SS@Sc@S SRRRR@R@R@RR3@R3@RR@R>R>RJ@R@R@RlR@RRx@R&RΏ@RTR@R@RG@RG@RRRRRRw@RrF@RfhRe@RL RJ@RIgRB@RB@R-@R%@R @R @R @R @RC@RZ@R@R@R Q@QY@QQQ@Qֵ@Q)@Q@QQQ@Q(@QQ?@QxQ'@QQQ@Q@QIQU@Q@Q~`Q~`Qw@Qq1Qo@QkQkQ]k@QZ@QQQAQAQ=@Q=@Q=@Q9Q8@Q5@Q4Q/FQ$Q#i@Q#i@Q"Q@Q@QEQ@Q @Q @QsQ"@P@PP@PDP@P @P @P @P @PPPP@P@P|@P6@P@PP@PoP)P@P5@P5@P@P@P}L@P{PyWPtPr@Pr@PnPnPnPnPnPiPaP`K@PYPXb@PWPIPG>P?UPseg_reg[] (XSA-187) 57d1569a-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch 57d18642-x86-segment-Bounds-check-accesses-to-emulation-ctxt-seg_reg.patch - bsc#991934 - xen hypervisor crash in csched_acct 57c96df3-credit1-fix-a-race-when-picking-initial-pCPU.patch - Upstream patches from Jan 57c4412b-x86-HVM-add-guarding-logic-for-VMX-specific-code.patch 57c57f73-libxc-correct-max_pfn-calculation-for-saving-domain.patch 57c805bf-x86-levelling-restrict-non-architectural-OSXSAVE-handling.patch 57c805c1-x86-levelling-pass-vcpu-to-ctxt_switch_levelling.patch 57c805c3-x86-levelling-provide-architectural-OSXSAVE-handling.patch 57c82be2-x86-32on64-adjust-call-gate-emulation.patch 57c96e2c-x86-correct-PT_NOTE-file-position.patch 57cfed43-VMX-correct-feature-checks-for-MPX-and-XSAVES.patch- bsc#979002 - add 60-persistent-xvd.rules and helper script also to initrd, add the relevant dracut helper- bnc#953518 - unplug also SCSI disks in qemu-xen-traditional for upstream unplug protocol- bsc#989679 - [pvusb feature] USB device not found when 'virsh detach-device guest usb.xml' 57c93e52-fix-error-in-libxl_device_usbdev_list.patch- bsc#992224 - [HPS Bug] During boot of Xen Hypervisor, Failed to get contiguous memory for DMA from Xen 57ac6316-don-t-restrict-DMA-heap-to-node-0.patch - bsc#978755 - xen uefi systems fail to boot - bsc#983697 - SLES12 SP2 Xen UEFI mode cannot boot 57b71fc5-x86-EFI-don-t-apply-relocations-to-l-2-3-_bootmap.patch - Upstream patch from Jan 57b7447b-dont-permit-guest-to-populate-PoD-pages-for-itself.patch- spec: to stay compatible with the in-tree qemu-xen binary, use /usr/bin/qemu-system-i386 instead of /usr/bin/qemu-system-x86_64 bsc#986164- bsc#970135 - new virtualization project clock test randomly fails on Xen 576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 5769106e-x86-generate-assembler-equates-for-synthesized.patch 57a1e603-x86-time-adjust-local-system-time-initialization.patch 57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch - bsc#991934 - xen hypervisor crash in csched_acct 57973099-have-schedulers-revise-initial-placement.patch 579730e6-remove-buggy-initial-placement-algorithm.patch - bsc#988675 - VUL-0: CVE-2016-6258: xen: x86: Privilege escalation in PV guests (XSA-182) 57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch - bsc#988676 - VUL-0: CVE-2016-6259: xen: x86: Missing SMAP whitelisting in 32-bit exception / event delivery (XSA-183) 57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch - Upstream patches from Jan 57a30261-x86-support-newer-Intel-CPU-models.patch- bsc#985503 - vif-route broken vif-route.patch- bsc#978413 - PV guest upgrade from sles11sp4 to sles12sp2 alpha3 failed on sles11sp4 xen host. pygrub-handle-one-line-menu-entries.patch- bsc#990843 - VUL-1: CVE-2016-6351: xen: qemu: scsi: esp: OOB write access in esp_do_dma CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch- bsc#900418 - Dump cannot be performed on SLES12 XEN 57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch - Upstream patches from Jan 575e9ca0-nested-vmx-Validate-host-VMX-MSRs-before-accessing-them.patch 57640448-xen-sched-use-default-scheduler-upon-an-invalid-sched.patch- fate#319989 - Update to Xen 4.7 FCS xen-4.7.0-testing-src.tar.bz2 - Drop CVE-2014-3672-qemut-xsa180.patch- bsc#954872 - script block-dmmd not working as expected - libxl: error: libxl_dm.c (Additional fixes) block-dmmd- Convert with_stubdom into build_conditional to allow adjusting via prjconf - Convert with_debug into build_conditional to allow adjusting via prjconf- bsc#979002 - add 60-persistent-xvd.rules and helper script to xen-tools-domU to simplify transition to pvops based kernels- Convert with_oxenstored into build_conditional to allow adjusting via prjconf (fate#320836)- bsc#983984 - VUL-0: CVE-2016-5338: xen: qemu: scsi: esp: OOB r/w access while processing ESP_FIFO CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch - bsc#982960 - VUL-0: CVE-2016-5238: xen: qemu: scsi: esp: OOB write when using non-DMA mode in get_cmd CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch- fate#319989 - Update to Xen 4.7 RC5 xen-4.7.0-testing-src.tar.bz2- fate#319989 - Update to Xen 4.7 RC4 xen-4.7.0-testing-src.tar.bz2 - Dropped xen.pkgconfig-4.7.patch xsa164.patch- bsc#981264 - VUL-0: CVE-2014-3672: xen: Unrestricted qemu logging (XSA-180) CVE-2014-3672-qemut-xsa180.patch- bsc#980724 - VUL-0: CVE-2016-4441: Qemu: scsi: esp: OOB write while writing to 's->cmdbuf' in get_cmd CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch - bsc#980716 - VUL-0: CVE-2016-4439: xen: scsi: esp: OOB write while writing to 's->cmdbuf' in esp_reg_write CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch- fate#319989 - Update to Xen 4.7 RC3 xen-4.7.0-testing-src.tar.bz2 - Dropped libxl-remove-cdrom-cachemode.patch x86-PoD-only-reclaim-if-needed.patch gcc6-warnings-as-errors.patch- bsc#954872 - script block-dmmd not working as expected - libxl: error: libxl_dm.c (another modification) block-dmmd- fate#319989 - Update to Xen 4.7 RC2 xen-4.7.0-testing-src.tar.bz2- bsc#961600 - L3: poor performance when Xen HVM domU configured with max memory > current memory x86-PoD-only-reclaim-if-needed.patch- Mark SONAMEs and pkgconfig as xen 4.7 xen.pkgconfig-4.7.patch- bsc#977329 - Xen: Cannot boot HVM guests with empty cdrom libxl-remove-cdrom-cachemode.patch- fate#319989 - Update to Xen 4.7 RC1 xen-4.7.0-testing-src.tar.bz2- fate#316614: set migration constraints from cmdline restore libxl.set-migration-constraints-from-cmdline.patch- Remove obsolete patch for xen-kmp magic_ioport_compat.patch- fate#316613: update to v12 libxl.pvscsi.patch- Update to the latest Xen 4.7 pre-release c2994f86 Drop libxl.migrate-legacy-stream-read.patch- bnc#972756 - Can't migrate HVM guest from SLES12SP1 Xen host to SLES12SP2 Alpha 1 host using xl migrate libxl.migrate-legacy-stream-read.patch- Add patches from proposed upstream series to load BIOS's from the toolstack instead of embedding in hvmloader http://lists.xenproject.org/archives/html/xen-devel/2016-03/msg01626.html 0001-libxc-Rework-extra-module-initialisation.patch, 0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch, 0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch, 0004-firmware-makefile-install-BIOS-blob.patch, 0005-libxl-Load-guest-BIOS-from-file.patch, 0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch, 0007-hvmloader-Grab-the-hvm_start_info-pointer.patch, 0008-hvmloader-Locate-the-BIOS-blob.patch, 0009-hvmloader-Check-modules-whereabouts-in-perform_tests.patch, 0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch, 0011-hvmloader-Load-OVMF-from-modules.patch, 0012-hvmloader-Specific-bios_load-function-required.patch, 0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch, 0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch - Enable support for UEFI on x86_64 using the ovmf-x86_64-ms.bin firmware from qemu-ovmf-x86_64. The firmware is preloaded with Microsoft keys to more closely resemble firmware on real hardware FATE#320490- fate#319989: Update to Xen 4.7 (pre-release) xen-4.7.0-testing-src.tar.bz2 - Dropped: xen-4.6.1-testing-src.tar.bz2 55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch 5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch hotplug-Linux-block-performance-fix.patch set-mtu-from-bridge-for-tap-interface.patch xendomains-libvirtd-conflict.patch xsa154.patch xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa170.patch- Use system SeaBIOS instead of building/installing another one FATE#320638 Dropped files: seabios-dir-remote.tar.bz2 xen-c99-fix.patch xen.build-compare.seabios.patch- spec: drop BuildRequires that were only needed for qemu-xen- bsc#969377 - xen does not build with GCC 6 ipxe-use-rpm-opt-flags.patch gcc6-warnings-as-errors.patch- bsc#969351 - VUL-0: CVE-2016-2841: xen: net: ne2000: infinite loop in ne2000_receive CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch - Drop xsa154-fix.patch- Use system qemu instead of building/installing yet another qemu FATE#320638 - Dropped files qemu-xen-dir-remote.tar.bz2 CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch CVE-2015-4037-qemuu-smb-config-dir-name.patch CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch qemu-xen-enable-spice-support.patch qemu-xen-upstream-qdisk-cache-unsafe.patch tigervnc-long-press.patch xsa162-qemuu.patch- bsc#962321 - VUL-0: CVE-2016-1922: xen: i386: null pointer dereference in vapic_write() CVE-2016-1922-qemuu-i386-null-pointer-dereference-in-vapic_write.patch- bsc#968004 - VUL-0: CVE-2016-2538: xen: usb: integer overflow in remote NDIS control message handling CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch- bsc#954872 - L3: script block-dmmd not working as expected - libxl: error: libxl_dm.c block-dmmd - Update libxl to recognize dmmd and npiv prefix in disk spec xen.libxl.dmmd.patch- bsc#967101 - VUL-0: CVE-2016-2391: xen: usb: multiple eof_timers in ohci module leads to null pointer dereference CVE-2016-2391-qemuu-usb-null-pointer-dereference-in-ohci-module.patch CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch - bsc#967090 - VUL-0: CVE-2016-2392: xen: usb: null pointer dereference in remote NDIS control message handling CVE-2016-2392-qemuu-usb-null-pointer-dereference-in-NDIS-message-handling.patch- Update to Xen Version 4.6.1 xen-4.6.1-testing-src.tar.bz2 - Dropped patches now contained in tarball or unnecessary xen-4.6.0-testing-src.tar.bz2 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 5632129c-free-domain-s-vcpu-array.patch 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 563212e4-xenoprof-free-domain-s-vcpu-array.patch 563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch 56549f24-x86-vPMU-document-as-unsupported.patch 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch xsa155-qemut-qdisk-double-access.patch xsa155-qemut-xenfb.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa159.patch xsa160.patch xsa162-qemut.patch xsa165.patch xsa166.patch xsa167.patch xsa168.patch- bsc#965315 - VUL-0: CVE-2016-2270: xen: x86: inconsistent cachability flags on guest mappings (XSA-154) xsa154.patch - bsc#965317 - VUL-0: CVE-2016-2271: xen: VMX: guest user mode may crash guest with non-canonical RIP (XSA-170) xsa170.patch- bsc#965269 - VUL-1: CVE-2015-8619: xen: stack based OOB write in hmp_sendkey routine CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch- bsc#965156 - VUL-0: CVE-2015-6855: xen: ide: divide by zero issue CVE-2015-6855-qemuu-ide-divide-by-zero-issue.patch - bsc#965112 - VUL-0: CVE-2014-3640: xen: slirp: NULL pointer deref in sosendto() CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch- bsc#964947 - VUL-0: CVE-2015-5278: xen: Infinite loop in ne2000_receive() function CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch - bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch- bsc#964644 - VUL-0: CVE-2013-4533: xen pxa2xx: buffer overrun on incoming migration CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch - bsc#964925 - VUL-0: CVE-2014-0222: xen: qcow1: validate L2 table size to avoid integer overflows CVE-2014-0222-blktap-qcow1-validate-l2-table-size.patch - Dropped CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch- bsc#964415 - VUL-1: CVE-2016-2198: xen: usb: ehci null pointer dereference in ehci_caps_write CVE-2016-2198-qemuu-usb-ehci-null-pointer-dereference-in-ehci_caps_write.patch - bsc#964452 - VUL-0: CVE-2013-4534: xen: openpic: buffer overrun on incoming migration CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch- bsc#963783 - VUL-1: CVE-2016-1981: xen: net: e1000 infinite loop in start_xmit and e1000_receive_iov routines CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch- bsc#962758 - VUL-0: CVE-2013-4539: xen: tsc210x: buffer overrun on invalid state load CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch- bsc#962632 - VUL-0: CVE-2015-1779: xen: vnc: insufficient resource limiting in VNC websockets decoder CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch - bsc#962642 - VUL-0: CVE-2013-4537: xen: ssi-sd: buffer overrun on invalid state load CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch - bsc#962627 - VUL-0: CVE-2014-7815: xen: vnc: insufficient bits_per_pixel from the client sanitization CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch- bsc#962335 - VUL-0: CVE-2013-4538: xen: ssd0323: fix buffer overun on invalid state CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch - bsc#962360 - VUL-0: CVE-2015-7512: xen: net: pcnet: buffer overflow in non-loopback mode CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch- bsc#961692 - VUL-0: CVE-2016-1714: xen: nvram: OOB r/w access in processing firmware configurations CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch- bsc#961358 - VUL-0: CVE-2015-8613: xen: qemu: scsi: stack based buffer overflow in megasas_ctrl_get_info CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch - bsc#961332 - VUL-0: CVE-2016-1568: xen: Qemu: ide: ahci use-after-free vulnerability in aio port commands CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch- bsc#959695 - missing docs for xen xen.spec- bsc#960862 - VUL-0: CVE-2016-1571: xen: VMX: intercept issue with INVLPG on non-canonical address (XSA-168) xsa168.patch - bsc#960861 - VUL-0: CVE-2016-1570: xen: PV superpage functionality missing sanity checks (XSA-167) xsa167.patch - bsc#960836 - VUL-0: CVE-2015-8744: xen: net: vmxnet3: incorrect l2 header validation leads to a crash via assert(2) call CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch- bsc#960707 - VUL-0: CVE-2015-8745: xen: reading IMR registers leads to a crash via assert(2) call CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch - bsc#960726 - VUL-0: CVE-2015-8743: xen: ne2000: OOB memory access in ioport r/w functions CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch- bsc#960093 - VUL-0: CVE-2015-8615: xen: x86: unintentional logging upon guest changing callback method (XSA-169) 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch- Adjust xen-dom0-modules.service to run Before xenstored.service instead of proc-xen.mount to workaround a bug in systemd "design" (bnc#959845)- bsc#959387 - VUL-0: CVE-2015-8568 CVE-2015-8567: xen: qemu: net: vmxnet3: host memory leakage CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch- bsc#957988 - VUL-0: CVE-2015-8550: xen: paravirtualized drivers incautious about shared memory contents (XSA-155) xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemut-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa155-qemut-xenfb.patch - bsc#959006 - VUL-0: CVE-2015-8558: xen: qemu: usb: infinite loop in ehci_advance_state results in DoS CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch - bsc#958918 - VUL-0: CVE-2015-7549: xen: qemu pci: null pointer dereference issue CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch - bsc#958493 - VUL-0: CVE-2015-8504: xen: qemu: ui: vnc: avoid floating point exception CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch - bsc#958007 - VUL-0: CVE-2015-8554: xen: qemu-dm buffer overrun in MSI-X handling (XSA-164) xsa164.patch - bsc#958009 - VUL-0: CVE-2015-8555: xen: information leak in legacy x86 FPU/XMM initialization (XSA-165) xsa165.patch - bsc#958523 - VUL-0: xen: ioreq handling possibly susceptible to multiple read issue (XSA-166) xsa166.patch- bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch - Upstream patches from Jan 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch) 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 56544a57-VMX-fix-adjust-trap-injection.patch 56546ab2-sched-fix-insert_vcpu-locking.patch- bsc#956592 - VUL-0: xen: virtual PMU is unsupported (XSA-163) 56549f24-x86-vPMU-document-as-unsupported.patch - bsc#956408 - VUL-0: CVE-2015-8339, CVE-2015-8340: xen: XENMEM_exchange error handling issues (XSA-159) xsa159.patch - bsc#956409 - VUL-0: CVE-2015-8341: xen: libxl leak of pv kernel and initrd on error (XSA-160) xsa160.patch - bsc#956411 - VUL-0: CVE-2015-7504: xen: heap buffer overflow vulnerability in pcnet emulator (XSA-162) xsa162-qemuu.patch xsa162-qemut.patch - bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142) 5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch- fate#315712: XEN: Use the PVOPS kernel Turn off building the KMPs now that we are using the pvops kernel xen.spec- Upstream patches from Jan 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 5632129c-free-domain-s-vcpu-array.patch (Replaces CVE-2015-7969-xsa149.patch) 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 563212e4-xenoprof-free-domain-s-vcpu-array.patch 563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch) 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch - Dropped 55b0a2db-x86-MSI-track-guest-masking.patch- Use upstream variants of block-iscsi and block-nbd- Remove xenalyze.hg, its part of xen-4.6- Update to Xen Version 4.6.0 xen-4.6.0-testing-src.tar.bz2 mini-os.tar.bz2 blktap2-no-uninit.patch stubdom-have-iovec.patch - Renamed xsa149.patch to CVE-2015-7969-xsa149.patch - Dropped patches now contained in tarball or unnecessary xen-4.5.2-testing-src.tar.bz2 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch 54f4985f-libxl-fix-libvirtd-double-free.patch 55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 551ac326-xentop-add-support-for-qdisk.patch 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch 5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 554cc211-libxl-add-qxl.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch 5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch 5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch 5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch 5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch 5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch 5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch 55b0a218-x86-PCI-CFG-write-intercept.patch 55b0a255-x86-MSI-X-maskall.patch 55b0a283-x86-MSI-X-teardown.patch 55b0a2ab-x86-MSI-X-enable.patch blktapctrl-close-fifos.patch blktapctrl-default-to-ioemu.patch blktapctrl-disable-debug-printf.patch blktap-no-uninit.patch blktap-pv-cdrom.patch build-tapdisk-ioemu.patch ioemu-bdrv-open-CACHE_WB.patch ioemu-blktap-barriers.patch ioemu-blktap-fv-init.patch ioemu-blktap-image-format.patch ioemu-blktap-zero-size.patch libxl.set-migration-constraints-from-cmdline.patch local_attach_support_for_phy.patch pci-attach-fix.patch qemu-xen-upstream-megasas-buildtime.patch tapdisk-ioemu-logfile.patch tapdisk-ioemu-shutdown-fix.patch udev-rules.patch xen.build-compare.ipxe.patch xen.build-compare.mini-os.patch xen.build-compare.smbiosdate.patch xen.build-compare.vgabios.patch xen.build-compare.xen_compile_h.patch xl-coredump-file-location.patch- bsc#954405 - VUL-0: CVE-2015-8104: Xen: guest to host DoS by triggering an infinite loop in microcode via #DB exception - bsc#954018 - VUL-0: CVE-2015-5307: xen: x86: CPU lockup during fault delivery (XSA-156) CVE-2015-5307-xsa156.patch- Update to Xen 4.5.2 xen-4.5.2-testing-src.tar.bz2 - Drop the following xen-4.5.1-testing-src.tar.bz2 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 559bdde5-pull-in-latest-linux-earlycpio.patch 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch 560bd926-credit1-fix-tickling-when-it-happens-from-a-remote-pCPU.patch 560e6d34-x86-p2m-pt-tighten-conditions-of-IOMMU-mapping-updates.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch CVE-2015-4106-xsa131-9.patch CVE-2015-3259-xsa137.patch CVE-2015-7311-xsa142.patch CVE-2015-7835-xsa148.patch xsa139-qemuu.patch xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch xsa151.patch xsa152.patch xsa153-libxl.patch CVE-2015-5154-qemuu-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemuu-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch"- bsc#950704 - CVE-2015-7970 VUL-1: xen: x86: Long latency populate-on-demand operation is not preemptible (XSA-150) 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch- Upstream patches from Jan 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch- bsc#951845 - VUL-0: CVE-2015-7972: xen: x86: populate-on-demand balloon size inaccuracy can crash guests (XSA-153) xsa153-libxl.patch- bsc#950703 - VUL-1: CVE-2015-7969: xen: leak of main per-domain vcpu pointer array (DoS) (XSA-149) xsa149.patch - bsc#950705 - VUL-1: CVE-2015-7969: xen: x86: leak of per-domain profiling-related vcpu pointer array (DoS) (XSA-151) xsa151.patch - bsc#950706 - VUL-0: CVE-2015-7971: xen: x86: some pmu and profiling hypercalls log without rate limiting (XSA-152) xsa152.patch - Dropped 55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch 5604f239-x86-PV-properly-populate-descriptor-tables.patch- bsc#932267 - VUL-1: CVE-2015-4037: qemu,kvm,xen: insecure temporary file use in /net/slirp.c CVE-2015-4037-qemuu-smb-config-dir-name.patch CVE-2015-4037-qemut-smb-config-dir-name.patch - bsc#877642 - VUL-0: CVE-2014-0222: qemu: qcow1: validate L2 table size to avoid integer overflows CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch- bsc#950367 - VUL-0: CVE-2015-7835: xen: x86: Uncontrolled creation of large page mappings by PV guests (XSA-148) CVE-2015-7835-xsa148.patch- bsc#949138 - Setting vcpu affinity under Xen causes libvirtd abort 54f4985f-libxl-fix-libvirtd-double-free.patch- bsc#949046 - Increase %suse_version in SP1 to 1316 xen.spec - Update README.SUSE detailing dom0 ballooning recommendations- bsc#945167 - Running command ’ xl pci-assignable-add 03:10.1’ secondly show errors 55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch - Upstream patches from Jan 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f239-x86-PV-properly-populate-descriptor-tables.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch 560bd926-credit1-fix-tickling-when-it-happens-from-a-remote-pCPU.patch 560e6d34-x86-p2m-pt-tighten-conditions-of-IOMMU-mapping-updates.patch- bsc#941074 - VmError: Device 51728 (vbd) could not be connected. Hotplug scripts not working. hotplug-Linux-block-performance-fix.patch- bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142) CVE-2015-7311-xsa142.patch- bsc#945165 - Xl pci-attach show error with kernel of SLES 12 sp1 pci-attach-fix.patch- bsc#945164 - Xl destroy show error with kernel of SLES 12 sp1 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch- Upstream patches from Jan 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch- bsc#944463 - VUL-0: CVE-2015-5239: qemu-kvm: Integer overflow in vnc_client_read() and protocol_client_msg() CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch - bsc#944697 - VUL-1: CVE-2015-6815: qemu: net: e1000: infinite loop issue CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch- bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch- bsc#907514 - Bus fatal error & sles12 sudden reboot has been observed - bsc#910258 - SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984 - Bus fatal error & sles11-SP4 sudden reboot has been observed - bsc#923967 - Partner-L3: Bus fatal error & sles11-SP3 sudden reboot has been observed 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 55b0a218-x86-PCI-CFG-write-intercept.patch 55b0a255-x86-MSI-X-maskall.patch 55b0a283-x86-MSI-X-teardown.patch 55b0a2ab-x86-MSI-X-enable.patch 55b0a2db-x86-MSI-track-guest-masking.patch - Upstream patches from Jan 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch - Dropped for upstream version x86-MSI-mask.patch x86-MSI-pv-unmask.patch x86-MSI-X-enable.patch x86-MSI-X-maskall.patch x86-MSI-X-teardown.patch x86-pci_cfg_okay.patch x86-PCI-CFG-write-intercept.patch- bsc#939712 - VUL-0: XSA-140: QEMU leak of uninitialized heap memory in rtl8139 device model xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch - bsc#939709 - VUL-0: XSA-139: xen: Use after free in QEMU/Xen block unplug protocol xsa139-qemuu.patch- bsc#937371 - xen vm's running after reboot xendomains-libvirtd-conflict.patch- bsc#938344 - VUL-0: CVE-2015-5154: qemu,kvm,xen: host code execution via IDE subsystem CD-ROM CVE-2015-5154-qemuu-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemuu-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch- Remove xendomains.service from systemd preset file because it conflicts with libvirt-guests.service (bnc#937371) Its up to the admin to run systemctl enable xendomains.service- bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow CVE-2015-3259-xsa137.patch - Upstream patches from Jan 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bdde5-pull-in-latest-linux-earlycpio.patch - Upstream patches from Jan pending review 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch 5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch 5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch 5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch 5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch 5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch x86-MSI-pv-unmask.patch x86-pci_cfg_okay.patch x86-PCI-CFG-write-intercept.patch x86-MSI-X-maskall.patch x86-MSI-X-teardown.patch x86-MSI-X-enable.patch x86-MSI-mask.patch- Adjust more places to use br0 instead of xenbr0- bnc#936516 - xen fails to build with kernel update(4.1.0 from stable) 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch- Update to Xen Version 4.5.1 FCS (fate#315675) xen-4.5.1-testing-src.tar.bz2 - Dropped patches now contained in tarball 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch qemu-MSI-X-enable-maskall.patch qemu-MSI-X-latch-writes.patch x86-MSI-X-guest-mask.patch- Replace 5124efbe-add-qxl-support.patch with the variant that finally made it upstream, 554cc211-libxl-add-qxl.patch- bsc#931627 - VUL-0: CVE-2015-4105: XSA-130: xen: Guest triggerable qemu MSI-X pass-through error messages qemu-MSI-X-latch-writes.patch - bsc#907514 - Bus fatal error & sles12 sudden reboot has been observed - bsc#910258 - SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984 - Bus fatal error & sles11-SP4 sudden reboot has been observed - bsc#923967 - Partner-L3: Bus fatal error & sles11-SP3 sudden reboot has been observed x86-MSI-X-teardown.patch x86-MSI-X-enable.patch x86-MSI-X-guest-mask.patch x86-MSI-X-maskall.patch qemu-MSI-X-enable-maskall.patch - Upstream patches from Jan 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch - Dropped the following patches now contained in the tarball xen-no-array-bounds.patch CVE-2015-4103-xsa128.patch CVE-2015-4104-xsa129.patch CVE-2015-4105-xsa130.patch CVE-2015-4106-xsa131-1.patch CVE-2015-4106-xsa131-2.patch CVE-2015-4106-xsa131-3.patch CVE-2015-4106-xsa131-4.patch CVE-2015-4106-xsa131-5.patch CVE-2015-4106-xsa131-6.patch CVE-2015-4106-xsa131-7.patch CVE-2015-4106-xsa131-8.patch- Update to Xen 4.5.1 RC2 - bsc#931628 - VUL-0: CVE-2015-4106: XSA-131: xen: Unmediated PCI register access in qemu CVE-2015-4106-xsa131-1.patch CVE-2015-4106-xsa131-2.patch CVE-2015-4106-xsa131-3.patch CVE-2015-4106-xsa131-4.patch CVE-2015-4106-xsa131-5.patch CVE-2015-4106-xsa131-6.patch CVE-2015-4106-xsa131-7.patch CVE-2015-4106-xsa131-8.patch CVE-2015-4106-xsa131-9.patch - bsc#931627 - VUL-0: CVE-2015-4105: XSA-130: xen: Guest triggerable qemu MSI-X pass-through error messages CVE-2015-4105-xsa130.patch - bsc#931626 - VUL-0: CVE-2015-4104: XSA-129: xen: PCI MSI mask bits inadvertently exposed to guests CVE-2015-4104-xsa129.patch - bsc#931625 - VUL-0: CVE-2015-4103: XSA-128: xen: Potential unintended writes to host MSI message data field via qemu CVE-2015-4103-xsa128.patch - Upstream patches from Jan 5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch- Add DefaultDependencies=no to xen-dom0-modules.service because it has to run before proc-xen.mount- Update to Xen 4.5.1 RC1- Update blktap-no-uninit.patch to work with gcc-4.5- bsc#927967 - VUL-0: CVE-2015-3340: xen: Information leak through XEN_DOMCTL_gettscinfo (XSA-132) 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch- bnc#929339 - VUL-0: CVE-2015-3456: qemu kvm xen: VENOM qemu floppy driver host code execution CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch- bsc#928783 - Reboot failure; Request backport of upstream Xen patch to 4.5.0, or update pkgs to 4.5.1 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch- bnc#927750 - Avoid errors reported by system-modules-load.service- Add xen-no-array-bounds.patch and blktap-no-uninit.patch to selectively turn errors back to warnings to fix build with GCC 5. - Amend xen.stubdom.newlib.patch to pull in declaration of strcmp to avoid implicit-fortify-decl rpmlint error. - Fix quoting of __SMBIOS_DATE__ in xen.build-compare.smbiosdate.patch.- xentop: Fix memory leak on read failure 551ac326-xentop-add-support-for-qdisk.patch- Dropped xentop-add-support-for-qdisk.patch in favor of upstream version 551ac326-xentop-add-support-for-qdisk.patch- Enable spice support in qemu for x86_64 5124efbe-add-qxl-support.patch qemu-xen-enable-spice-support.patch- Add xen-c99-fix.patch to remove pointless inline specifier on function declarations which break build with a C99 compiler which GCC 5 is by default. (bsc#921994) - Add ipxe-no-error-logical-not-parentheses.patch to supply - Wno-logical-not-parentheses to the ipxe build to fix breakage with GCC 5. (bsc#921994)- bnc#921842 - Xentop doesn't display disk statistics for VMs using qdisks xentop-add-support-for-qdisk.patch- Disable the PIE enablement done for Factory, as the XEN code is not buildable with PIE and it does not make much sense to build the hypervisor code with it.- bnc#918169 - XEN fixes required to work with Kernel 3.19.0 xen.spec- Package xen.changes because its referenced in xen.spec- Update seabios to rel-1.7.5 which is the correct version for Xen 4.5- Update to Xen 4.5.0 FCS- Include systemd presets in 13.2 and older- bnc#897352 - Enable xencommons/xendomains only during fresh install - disable restart on upgrade because the toolstack is not restartable- adjust seabios, vgabios, stubdom and hvmloader build to reduce build-compare noise xen.build-compare.mini-os.patch xen.build-compare.smbiosdate.patch xen.build-compare.ipxe.patch xen.build-compare.vgabios.patch xen.build-compare.seabios.patch xen.build-compare.man.patch- Update to Xen 4.5.0 RC4- Remove xend specific if-up scripts Recording bridge slaves is a generic task which should be handled by generic network code- Use systemd features from upstream requires updated systemd-presets-branding package- Update to Xen 4.5.0 RC3- Set GIT, WGET and FTP to /bin/false- Use new configure features instead of make variables xen.stubdom.newlib.patch- adjust docs and xen build to reduce build-compare noise xen.build-compare.doc_html.patch xen.build-compare.xen_compile_h.patch- Drop trailing B_CNT from XEN_EXTRAVERSION to reduce build-compare noise- Update to Xen 4.5.0 RC2- Update to Xen 4.5.0 RC1 xen-4.5.0-testing-src.tar.bz2 - Remove all patches now contained in the new tarball xen-4.4.1-testing-src.tar.bz2 5315a3bb-x86-don-t-propagate-acpi_skip_timer_override-do-Dom0.patch 5315a43a-x86-ACPI-also-print-address-space-for-PM1x-fields.patch 53299d8f-xenconsole-reset-tty-on-failure.patch 53299d8f-xenconsole-tolerate-tty-errors.patch 5346a7a0-x86-AMD-support-further-feature-masking-MSRs.patch 53563ea4-x86-MSI-drop-workaround-for-insecure-Dom0-kernels.patch 537c9c77-libxc-check-return-values-on-mmap-and-madvise.patch 537cd0b0-hvmloader-also-cover-PCI-MMIO-ranges-above-4G-with-UC-MTRR-ranges.patch 537cd0cc-hvmloader-PA-range-0xfc000000-0xffffffff-should-be-UC.patch 539ebe62-x86-EFI-improve-boot-time-diagnostics.patch 53aac342-x86-HVM-consolidate-and-sanitize-CR4-guest-reserved-bit-determination.patch 53c9151b-Fix-xl-vncviewer-accesses-port-0-by-any-invalid-domid.patch 53d124e7-fix-list_domain_details-check-config-data-length-0.patch 53dba447-x86-ACPI-allow-CMOS-RTC-use-even-when-ACPI-says-there-is-none.patch 53df727b-x86-HVM-extend-LAPIC-shortcuts-around-P2M-lookups.patch 53e8be5f-x86-vHPET-use-rwlock-instead-of-simple-one.patch 53f737b1-VMX-fix-DebugCtl-MSR-clearing.patch 53f7386d-x86-irq-process-softirqs-in-irq-keyhandlers.patch 53fcebab-xen-pass-kernel-initrd-to-qemu.patch 53ff3659-x86-consolidate-boolean-inputs-in-hvm-and-p2m.patch 53ff36ae-x86-hvm-treat-non-insn-fetch-NPF-also-as-read-violations.patch 53ff36d5-x86-mem_event-deliver-gla-fault-EPT-violation-information.patch 53ff3716-x86-ats-Disable-Address-Translation-Services-by-default.patch 53ff3899-x86-NMI-allow-processing-unknown-NMIs-with-watchdog.patch 54005472-EPT-utilize-GLA-GPA-translation-known-for-certain-faults.patch 540effe6-evtchn-check-control-block-exists-when-using-FIFO-based-events.patch 540f2624-x86-idle-add-barriers-to-CLFLUSH-workaround.patch 541825dc-VMX-don-t-leave-x2APIC-MSR-intercepts-disabled.patch 541ad385-x86-suppress-event-check-IPI-to-MWAITing-CPUs.patch 541ad3ca-x86-HVM-batch-vCPU-wakeups.patch 541ad81a-VT-d-suppress-UR-signaling-for-further-desktop-chipsets.patch 54216833-x86-shadow-fix-race-when-sampling-dirty-vram-state.patch 54216882-x86-emulate-check-cpl-for-all-privileged-instructions.patch 542168ae-x86emul-only-emulate-swint-injection-for-real-mode.patch 54228a37-x86-EFI-fix-freeing-of-uninitialized-pointer.patch 5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch 5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch 542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch 542bf997-x86-HVM-properly-bound-x2APIC-MSR-range.patch 54325cc0-x86-MSI-fix-MSI-X-case-of-freeing-IRQ.patch 54325d2f-x86-restore-reserving-of-IO-APIC-pages-in-XENMEM_machine_memory_map-output.patch 54325d95-don-t-allow-Dom0-access-to-IOMMUs-MMIO-pages.patch 54325ecc-AMD-guest_iommu-properly-disable-guest-iommu-support.patch 54325f3c-x86-paging-make-log-dirty-operations-preemptible.patch 54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch CVE-2013-4540-qemu.patch qemu-support-xen-hvm-direct-kernel-boot.patch qemu-xen-upstream-blkif-discard.patch change-vnc-passwd.patch libxc-pass-errno-to-callers-of-xc_domain_save.patch libxl.honor-more-top-level-vfb-options.patch libxl.add-option-for-discard-support-to-xl-disk-conf.patch libxl.introduce-an-option-to-disable-the-non-O_DIRECT-workaround.patch x86-dom-print.patch x86-extra-trap-info.patch tmp_build.patch xl-check-for-libvirt-managed-domain.patch disable-wget-check.patch - Xend/xm is no longer supported and is not part of the upstream code. Remove all xend/xm specific patches, configs, and scripts xen-xmexample.patch bridge-opensuse.patch xmexample.disks xmclone.sh init.xend xend-relocation.sh xend.service xend-relocation-server.fw domUloader.py xmexample.domUloader xmexample.disks bridge-vlan.patch bridge-bonding.patch bridge-record-creation.patch network-nat-open-SuSEfirewall2-FORWARD.patch xend-set-migration-constraints-from-cmdline.patch xen.migrate.tools-xend_move_assert_to_exception_block.patch xend-pvscsi-recognize-also-SCSI-CDROM-devices.patch xend-config.patch xend-max-free-mem.patch xend-hvm-default-pae.patch xend-vif-route-ifup.patch xend-xenapi-console-protocol.patch xend-core-dump-loc.patch xend-xen-api-auth.patch xend-checkpoint-rename.patch xend-xm-save-check-file.patch xend-xm-create-xflag.patch xend-domu-usb-controller.patch xend-devid-or-name.patch xend-migration-domname-fix.patch xend-del_usb_xend_entry.patch xend-xen-domUloader.patch xend-multi-xvdp.patch xend-check_device_status.patch xend-change_home_server.patch xend-minimum-restart-time.patch xend-disable-internal-logrotate.patch xend-config-enable-dump-comment.patch xend-tools-watchdog-support.patch xend-console-port-restore.patch xend-vcpu-affinity-fix.patch xend-migration-bridge-check.patch xend-managed-pci-device.patch xend-hvm-firmware-passthrough.patch xend-cpuinfo-model-name.patch xend-xm-reboot-fix.patch xend-domain-lock.patch xend-domain-lock-sfex.patch xend-32on64-extra-mem.patch xend-hv_extid_compatibility.patch xend-xenpaging.autostart.patch xend-remove-xm-deprecation-warning.patch libxen_permissive.patch tmp-initscript-modprobe.patch init.xendomains xendomains.service xen-watchdog.service xen-updown.sh- bnc#901317 - L3: increase limit domUloader to 32MB domUloader.py- bnc#898772 - SLES 12 RC3 - XEN Host crashes when assigning non-VF device (SR-IOV) to guest 54325cc0-x86-MSI-fix-MSI-X-case-of-freeing-IRQ.patch - bnc#882089 - Windows 2012 R2 fails to boot up with greater than 60 vcpus 54325ecc-AMD-guest_iommu-properly-disable-guest-iommu-support.patch - bnc#826717 - VUL-0: CVE-2013-3495: XSA-59: xen: Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts 541ad81a-VT-d-suppress-UR-signaling-for-further-desktop-chipsets.patch - Upstream patches from Jan 540effe6-evtchn-check-control-block-exists-when-using-FIFO-based-events.patch (Replaces xsa107.patch) 54216833-x86-shadow-fix-race-when-sampling-dirty-vram-state.patch (Replaces xsa104.patch) 54216882-x86-emulate-check-cpl-for-all-privileged-instructions.patch (Replaces xsa105.patch) 542168ae-x86emul-only-emulate-swint-injection-for-real-mode.patch (Replaces xsa106.patch) 54228a37-x86-EFI-fix-freeing-of-uninitialized-pointer.patch 5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch 5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch 542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch 542bf997-x86-HVM-properly-bound-x2APIC-MSR-range.patch (Replaces xsa108.patch) 54325d2f-x86-restore-reserving-of-IO-APIC-pages-in-XENMEM_machine_memory_map-output.patch 54325d95-don-t-allow-Dom0-access-to-IOMMUs-MMIO-pages.patch 54325f3c-x86-paging-make-log-dirty-operations-preemptible.patch (Replaces xsa97.patch) 54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch- restrict requires on grub2-x86_64-xen to x86_64 hosts- bsc#900292 - xl: change default dump directory xl-coredump-file-location.patch- Update xen2libvirt.py to better detect and handle file formats- bnc#889526 - VUL-0: CVE-2014-5146, CVE-2014-5149: xen: XSA-97 Long latency virtual-mmu operations are not preemptible xsa97.patch - bnc#882089 - Windows 2012 R2 fails to boot up with greater than 60 vcpus 541ad385-x86-suppress-event-check-IPI-to-MWAITing-CPUs.patch 541ad3ca-x86-HVM-batch-vCPU-wakeups.patch - Upstream patches from Jan 540f2624-x86-idle-add-barriers-to-CLFLUSH-workaround.patch 541825dc-VMX-don-t-leave-x2APIC-MSR-intercepts-disabled.patch- bnc#897657 - VUL-0: CVE-2014-7188: xen: XSA-108 Improper MSR range used for x2APIC emulation xsa108.patch- bnc#897906 - libxc: check return values on mmap() and madvise() on xc_alloc_hypercall_buffer() 537c9c77-libxc-check-return-values-on-mmap-and-madvise.patch- bnc#897614 - Virtualization/xen: Bug `xen-tools` uninstallable; grub2-x86_64-xen dependency not available xen.spec- More cleanup of README.SUSE- Update xen patch with upstream patch so that latest libvirt patch can work. (bnc#896044) + 53fcebab-xen-pass-kernel-initrd-to-qemu.patch - xen-pass-kernel-initrd-to-qemu.patch- bnc#895804 - VUL-0: CVE-2014-6268: xen: XSA-107: Mishandling of uninitialised FIFO-based event channel control blocks xsa107.patch - bnc#895802 - VUL-0: CVE-2014-7156: xen: XSA-106: Missing privilege level checks in x86 emulation of software interrupts xsa106.patch - bnc#895799 - VUL-0: CVE-2014-7155: xen: XSA-105: Missing privilege level checks in x86 HLT, LGDT, LIDT, and LMSW emulation xsa105.patch - bnc#895798 - VUL-0: CVE-2014-7154: xen: XSA-104: Race condition in HVMOP_track_dirty_vram xsa104.patch- bnc#882405 - Only one key-press event was generated while holding a key before key-release in pv guests through xl vncviewer tigervnc-long-press.patch- Update to Xen Version 4.4.1 FCS xen-4.4.1-testing-src.tar.bz2 - Dropped patches now contained in tarball 53d7b781-x86-cpu-undo-BIOS-CPUID-max_leaf-limit-earlier.patch 53df71c7-lz4-check-for-underruns.patch 53e47d6b-x86_emulate-properly-do-IP-updates-and-other-side-effects.patch- bnc#882089 - Windows 2012 R2 fails to boot up with greater than 60 vcpus 53df727b-x86-HVM-extend-LAPIC-shortcuts-around-P2M-lookups.patch 53e8be5f-x86-vHPET-use-rwlock-instead-of-simple-one.patch 53ff3659-x86-consolidate-boolean-inputs-in-hvm-and-p2m.patch 53ff36ae-x86-hvm-treat-non-insn-fetch-NPF-also-as-read-violations.patch 53ff36d5-x86-mem_event-deliver-gla-fault-EPT-violation-information.patch 54005472-EPT-utilize-GLA-GPA-translation-known-for-certain-faults.patch - Upstream patches from Jan 53f737b1-VMX-fix-DebugCtl-MSR-clearing.patch 53f7386d-x86-irq-process-softirqs-in-irq-keyhandlers.patch 53ff3716-x86-ats-Disable-Address-Translation-Services-by-default.patch 53ff3899-x86-NMI-allow-processing-unknown-NMIs-with-watchdog.patch- bnc#864801 - VUL-0: CVE-2013-4540: qemu: zaurus: buffer overrun on invalid state load CVE-2013-4540-qemu.patch- Update README.SUSE with additional debug help- bnc#883112 - Xen Panic during boot "System without CMOS RTC must be booted from EFI" 53dba447-x86-ACPI-allow-CMOS-RTC-use-even-when-ACPI-says-there-is-none.patch - Upstream patches from Jan 53d7b781-x86-cpu-undo-BIOS-CPUID-max_leaf-limit-earlier.patch 53df71c7-lz4-check-for-underruns.patch 53df727b-x86-HVM-extend-LAPIC-shortcuts-around-P2M-lookups.patch 53e47d6b-x86_emulate-properly-do-IP-updates-and-other-side-effects.patch- Update to Xen Version 4.4.1-rc2 xen-4.4.1-testing-src.tar.bz2 - Dropped the following upstream patches and xen-4.4.0-testing-src.tar.bz2 537b5ede-move-domain-to-cpupool0-before-destroying-it.patch 5327190a-x86-Intel-work-around-Xeon-7400-series-erratum-AAI65.patch 534bdf47-x86-HAP-also-flush-TLB-when-altering-a-present-1G-or-intermediate-entry.patch 535a354b-passthrough-allow-to-suppress-SERR-and-PERR-signaling.patch 53636ebf-x86-fix-guest-CPUID-handling.patch 5347b524-evtchn-eliminate-64k-ports-limitation.patch 53a040c6-page-alloc-scrub-pages-used-by-hypervisor-upon-freeing.patch 53a1990a-IOMMU-prevent-VT-d-device-IOTLB-operations-on-wrong-IOMMU.patch 53732f4f-x86-MCE-bypass-uninitialized-vcpu-in-vMCE-injection.patch 531dc0e2-xmalloc-handle-correctly-page-allocation-when-align-size.patch 5331917d-x86-enforce-preemption-in-HVM_set_mem_access-p2m_set_mem_access.patch 531d8e09-x86-HVM-fix-memory-type-merging-in-epte_get_entry_emt.patch 538ee637-ACPI-Prevent-acpi_table_entries-from-falling-into-a-infinite-loop.patch 535a34eb-VT-d-suppress-UR-signaling-for-server-chipsets.patch 535e31bc-x86-HVM-correct-the-SMEP-logic-for-HVM_CR0_GUEST_RESERVED_BITS.patch 53859956-timers-set-the-deadline-more-accurately.patch 53636978-hvm_set_ioreq_page-releases-wrong-page-in-error-path.patch 535a3516-VT-d-suppress-UR-signaling-for-desktop-chipsets.patch 53cfdcc7-avoid-crash-when-doing-shutdown-with-active-cpupools.patch 5383175e-VT-d-fix-mask-applied-to-DMIBAR-in-desktop-chipset-XSA-59-workaround.patch 531d8e34-x86-HVM-consolidate-passthrough-handling-in-epte_get_entry_emt.patch 532fff53-x86-fix-determination-of-bit-count-for-struct-domain-allocations.patch 5357baff-x86-add-missing-break-in-dom0_pit_access.patch 530c54c3-x86-mce-Reduce-boot-time-logspam.patch 5383167d-ACPI-ERST-fix-table-mapping.patch 5390927f-x86-fix-reboot-shutdown-with-running-HVM-guests.patch 530b27fd-x86-MCE-Fix-race-condition-in-mctelem_reserve.patch 53709b77-Nested-VMX-load-current_vmcs-only-when-it-exists.patch 5396d818-avoid-crash-on-HVM-domain-destroy-with-PCI-passthrough.patch 531d8fd0-kexec-identify-which-cpu-the-kexec-image-is-being-executed-on.patch 5385956b-x86-don-t-use-VA-for-cache-flush-when-also-flushing-TLB.patch 539ec004-x86-mce-don-t-spam-the-console-with-CPUx-Temperature-z.patch 53909259-x86-domctl-two-functional-fixes-to-XEN_DOMCTL_-gs-etvcpuextstate.patch 53859549-AMD-IOMMU-don-t-free-page-table-prematurely.patch 533d413b-x86-mm-fix-checks-against-max_mapped_pfn.patch 535fa503-x86-HVM-restrict-HVMOP_set_mem_type.patch 53271880-VT-d-fix-RMRR-handling.patch 5390917a-VT-d-honor-APEI-firmware-first-mode-in-XSA-59-workaround-code.patch 538dcada-x86-HVM-eliminate-vulnerabilities-from-hvm_inject_msi.patch 53455585-x86-AMD-feature-masking-is-unavailable-on-Fam11.patch 537b5e50-VT-d-apply-quirks-at-device-setup-time-rather-than-only-at-boot.patch 53a199d7-x86-EFI-allow-FPU-XMM-use-in-runtime-service-functions.patch 53cfddaf-x86-mem_event-validate-the-response-vcpu_id-before-acting-on-it.patch 53b16cd4-VT-d-ATS-correct-and-clean-up-dev_invalidate_iotlb.patch 53cfdde4-x86-mem_event-prevent-underflow-of-vcpu-pause-counts.patch 53356c1e-x86-HVM-correct-CPUID-leaf-80000008-handling.patch 534bbd90-x86-nested-HAP-don-t-BUG-on-legitimate-error.patch 530b28c5-x86-MSI-don-t-risk-division-by-zero.patch 5396e805-x86-HVM-refine-SMEP-test-in-HVM_CR4_GUEST_RESERVED_BITS.patch 5370e03b-pygrub-fix-error-handling-if-no-valid-partitions-are-found.patch 5321b257-x86-make-hypercall-preemption-checks-consistent.patch 5321b20b-common-make-hypercall-preemption-checks-consistent.patch 538c338f-x86-amd_ucode-flip-revision-numbers-in-printk.patch 537b5e79-VT-d-extend-error-report-masking-workaround-to-newer-chipsets.patch 531d8db1-x86-hvm-refine-the-judgment-on-IDENT_PT-for-EMT.patch 53b56de1-properly-reference-count-DOMCTL_-un-pausedomain-hypercalls.patch 530b2880-Nested-VMX-update-nested-paging-mode-on-vmexit.patch 533ad1ee-VMX-fix-PAT-value-seen-by-guest.patch 53206661-pygrub-support-linux16-and-initrd16.patch 5315a254-IOMMU-generalize-and-correct-softirq-processing.patch- bnc#820873 - The "long" option doesn't work with "xl list" 53d124e7-fix-list_domain_details-check-config-data-length-0.patch- bnc#888996 - Package 'xen-tool' contains 'SuSE' spelling in a filename and/or SPEC file Renamed README.SuSE -> README.SUSE Modified files: xen.spec, boot.local.xenU, init.pciback xend-config.patch, xend-vif-route-ifup.patch- bnc#882673 - Dom0 memory should enforce a minimum memory size (e.g. dom0_mem=min:512M) xen.spec (Mike Latimer)- Upstream patches from Jan 5347b524-evtchn-eliminate-64k-ports-limitation.patch 53aac342-x86-HVM-consolidate-and-sanitize-CR4-guest-reserved-bit-determination.patch 53b16cd4-VT-d-ATS-correct-and-clean-up-dev_invalidate_iotlb.patch 53b56de1-properly-reference-count-DOMCTL_-un-pausedomain-hypercalls.patch 53cfdcc7-avoid-crash-when-doing-shutdown-with-active-cpupools.patch 53cfddaf-x86-mem_event-validate-the-response-vcpu_id-before-acting-on-it.patch 53cfdde4-x86-mem_event-prevent-underflow-of-vcpu-pause-counts.patch- bnc#886801 - xl vncviewer: The first domu can be accessed by any id 53c9151b-Fix-xl-vncviewer-accesses-port-0-by-any-invalid-domid.patch- Upstream pygrub bug fix 5370e03b-pygrub-fix-error-handling-if-no-valid-partitions-are-found.patch- Fix pygrub to handle old 32 bit VMs pygrub-boot-legacy-sles.patch (Mike Latimer)- Remove xen-vmresync utility. It is an old Platespin Orchestrate utility that should have never been included in the Xen package. Updated xen.spec- Rework xen-destroy utility included in xen-utils bnc#885292 and bnc#886063 Updated xen-utils-0.1.tar.bz2- bnc#886063 - Xen monitor fails (xl list --long output different from xm list --long output) - bnc#885292 - VirtualDomain: pid_status does not know how to check status on SLE12 Re-enable building xen-utils for sle12 and include xen-list and xen-destroy in the xen-tools package for HA. xen.spec- bnc#882127 - Xen kernel panics on booting SLES12 Beta 8 53a199d7-x86-EFI-allow-FPU-XMM-use-in-runtime-service-functions.patch - Upstream patches from Jan 538c338f-x86-amd_ucode-flip-revision-numbers-in-printk.patch 538ee637-ACPI-Prevent-acpi_table_entries-from-falling-into-a-infinite-loop.patch 5390917a-VT-d-honor-APEI-firmware-first-mode-in-XSA-59-workaround-code.patch 53909259-x86-domctl-two-functional-fixes-to-XEN_DOMCTL_-gs-etvcpuextstate.patch 5390927f-x86-fix-reboot-shutdown-with-running-HVM-guests.patch 5396d818-avoid-crash-on-HVM-domain-destroy-with-PCI-passthrough.patch 5396e805-x86-HVM-refine-SMEP-test-in-HVM_CR4_GUEST_RESERVED_BITS.patch 539ebe62-x86-EFI-improve-boot-time-diagnostics.patch 539ec004-x86-mce-don-t-spam-the-console-with-CPUx-Temperature-z.patch 53a040c6-page-alloc-scrub-pages-used-by-hypervisor-upon-freeing.patch (replaces xsa100.patch) 53a1990a-IOMMU-prevent-VT-d-device-IOTLB-operations-on-wrong-IOMMU.patch- Replace 'domUloader' with 'pygrub' when converting or importing Xen domains into libvirt with xen2libvirt. domUloader is no longer provided in xen-tools. Modified: xen2libvirt.py- fate#310956: Support Direct Kernel Boot for FV guests patches would go to upstream: qemu side: qemu-support-xen-hvm-direct-kernel-boot.patch xen side: xen-pass-kernel-initrd-to-qemu.patch- Modify how we check for libvirt managed domains xl-check-for-libvirt-managed-domain.patch- bnc#880751 - VUL-0: xen: Hypervisor heap contents leaked to guests xsa100.patch - bnc#878841 - VUL-0: XSA-96: Xen: Vulnerabilities in HVM MSI injection 538dcada-x86-HVM-eliminate-vulnerabilities-from-hvm_inject_msi.patch - Upstream patches from Jan 537cd0b0-hvmloader-also-cover-PCI-MMIO-ranges-above-4G-with-UC-MTRR-ranges.patch 537cd0cc-hvmloader-PA-range-0xfc000000-0xffffffff-should-be-UC.patch 5383167d-ACPI-ERST-fix-table-mapping.patch 5383175e-VT-d-fix-mask-applied-to-DMIBAR-in-desktop-chipset-XSA-59-workaround.patch 53859549-AMD-IOMMU-don-t-free-page-table-prematurely.patch 5385956b-x86-don-t-use-VA-for-cache-flush-when-also-flushing-TLB.patch 53859956-timers-set-the-deadline-more-accurately.patch- bnc#879425: handle cache=unsafe from libvirt to disable flush in qdisk libxl.add-option-to-disable-disk-cache-flushes-in-qdisk.patch qemu-xen-upstream-qdisk-cache-unsafe.patch- libxl: introduce an option for disabling the non-O_DIRECT workaround recognize direct-io-safe in domU.cfg diskspec libxl.introduce-an-option-to-disable-the-non-O_DIRECT-workaround.patch- fate#316071: add discard support for file backed storage (qdisk) update patch to allow more values in overloaded ->readwrite member- bnc#826717 - VUL-0: CVE-2013-3495: XSA-59: xen: Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts 537b5e50-VT-d-apply-quirks-at-device-setup-time-rather-than-only-at-boot.patch 537b5e79-VT-d-extend-error-report-masking-workaround-to-newer-chipsets.patch - Upstream patches from Jan 53709b77-Nested-VMX-load-current_vmcs-only-when-it-exists.patch 53732f4f-x86-MCE-bypass-uninitialized-vcpu-in-vMCE-injection.patch 537b5ede-move-domain-to-cpupool0-before-destroying-it.patch- Update README.SuSE with information on the toolstack change- fate#316071: add discard support for file backed storage (qdisk) update to recognize option discard/no-discard instead of discard=0,1 to match upstream change- fate#316613: Implement pvscsi in xl/libxl libxl.pvscsi.patch- bnc#875668 - VUL-0: CVE-2014-3124: xen: XSA-92: HVMOP_set_mem_type allows invalid P2M entries to be created 535fa503-x86-HVM-restrict-HVMOP_set_mem_type.patch (replaces xsa92.patch) - bnc#826717 - VUL-0: CVE-2013-3495: XSA-59: xen: Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts 535a34eb-VT-d-suppress-UR-signaling-for-server-chipsets.patch 535a3516-VT-d-suppress-UR-signaling-for-desktop-chipsets.patch - Upstream patches from Jan 535a354b-passthrough-allow-to-suppress-SERR-and-PERR-signaling.patch 535e31bc-x86-HVM-correct-the-SMEP-logic-for-HVM_CR0_GUEST_RESERVED_BITS.patch 53636978-hvm_set_ioreq_page-releases-wrong-page-in-error-path.patch 53636ebf-x86-fix-guest-CPUID-handling.patch- Fix pygrub to handle VM with no grub/menu.lst file. - Don't use /var/run/xend/boot for temporary boot directory pygrub-boot-legacy-sles.patch- When the xl command is used, check to see if the domain being modified is managed by libvirt and print warning if it is. xl-check-for-libvirt-managed-domain.patch- Upstream patches from Jan 53455585-x86-AMD-feature-masking-is-unavailable-on-Fam11.patch 5346a7a0-x86-AMD-support-further-feature-masking-MSRs.patch 534bbd90-x86-nested-HAP-don-t-BUG-on-legitimate-error.patch 534bdf47-x86-HAP-also-flush-TLB-when-altering-a-present-1G-or-intermediate-entry.patch 53563ea4-x86-MSI-drop-workaround-for-insecure-Dom0-kernels.patch 5357baff-x86-add-missing-break-in-dom0_pit_access.patch - XSA-92 xsa92.patch- Add # needssslcertforbuild to use the project's certificate when building in a home project. (bnc#872354)- Upstream patches from Jan 53356c1e-x86-HVM-correct-CPUID-leaf-80000008-handling.patch 533ad1ee-VMX-fix-PAT-value-seen-by-guest.patch 533d413b-x86-mm-fix-checks-against-max_mapped_pfn.patch- bnc#862608 - SLES 11 SP3 vm-install should get RHEL 7 support when released 53206661-pygrub-support-linux16-and-initrd16.patch - Upstream bug fixes 53299d8f-xenconsole-reset-tty-on-failure.patch 53299d8f-xenconsole-tolerate-tty-errors.patch- fix build for armv7l and aarch64- Remove compiletime strings from qemu-upstream qemu-xen-upstream-megasas-buildtime.patch- bnc#871546 - KMPs are not signed in SUSE:SLE-12:GA? xen.spec- Upstream patches from Jan 532fff53-x86-fix-determination-of-bit-count-for-struct-domain-allocations.patch 5331917d-x86-enforce-preemption-in-HVM_set_mem_access-p2m_set_mem_access.patch - Drop xsa89.patch for upstream version (see bnc#867910, 5331917d-x86-enforce...)- bnc#863821 - Xen unable to boot paravirtualized VMs installed with btrfs. Add 'Requires: grub2-x86_64-xen' to xen-tools. - Restore soft links for qemu-system-i386 and qemu-dm - Cleanup inconsistency in which version of qemu-system-i386 is being used (Xen vs qemu-x86). Use only Xen's version. xen.spec- Add conditionals for SLE12 when defining xend and max_cpus xen.spec- Upstream patches from Jan 5321b20b-common-make-hypercall-preemption-checks-consistent.patch 5321b257-x86-make-hypercall-preemption-checks-consistent.patch 53271880-VT-d-fix-RMRR-handling.patch 5327190a-x86-Intel-work-around-Xeon-7400-series-erratum-AAI65.patch - Dropped the following as now part of 5321b257 5310bac3-mm-ensure-useful-progress-in-decrease_reservation.patch- bnc#867910 - VUL-0: EMBARGOED: xen: XSA-89: HVMOP_set_mem_access is not preemptible xsa89.patch - Upstream patches from Jan 530b27fd-x86-MCE-Fix-race-condition-in-mctelem_reserve.patch 530b2880-Nested-VMX-update-nested-paging-mode-on-vmexit.patch 530b28c5-x86-MSI-don-t-risk-division-by-zero.patch 530c54c3-x86-mce-Reduce-boot-time-logspam.patch 5310bac3-mm-ensure-useful-progress-in-decrease_reservation.patch 5315a254-IOMMU-generalize-and-correct-softirq-processing.patch 5315a3bb-x86-don-t-propagate-acpi_skip_timer_override-do-Dom0.patch 5315a43a-x86-ACPI-also-print-address-space-for-PM1x-fields.patch 531d8db1-x86-hvm-refine-the-judgment-on-IDENT_PT-for-EMT.patch 531d8e09-x86-HVM-fix-memory-type-merging-in-epte_get_entry_emt.patch 531d8e34-x86-HVM-consolidate-passthrough-handling-in-epte_get_entry_emt.patch 531d8fd0-kexec-identify-which-cpu-the-kexec-image-is-being-executed-on.patch 531dc0e2-xmalloc-handle-correctly-page-allocation-when-align-size.patch- Add conversion tool for migrating xend/xm managed VMs to libvirt xen2libvirt.py (Jim Fehlig)- Update to Xen 4.4.0 FCS- bnc#865682 - Local attach support for PHY backends using scripts local_attach_support_for_phy.patch- bnc#798770 - Improve multipath support for npiv devices block-npiv block-npiv-common.sh- honor global keymap= option in libxl libxl.honor-more-top-level-vfb-options.patch- Update to c/s 28381 to include libxl fork and event fixes for libvirt xen-4.4.0-testing-src.tar.bz2- bnc#863297: xend/pvscsi: recognize also SCSI CDROM devices xend-pvscsi-recognize-also-SCSI-CDROM-devices.patch- fate#316614: set migration constraints from cmdline fix xl migrate to print the actual error string libxc-pass-errno-to-callers-of-xc_domain_save.patch- Include additional help docs for xl in xen-tools - Apply all patches including those for unpackaged xend xen.spec- fate#316614: set migration constraints from cmdline split existing changes into libxl and xend part added libxl.set-migration-constraints-from-cmdline.patch added xend-set-migration-constraints-from-cmdline.patch removed xen.migrate.tools_add_xm_migrate_--log_progress_option.patch removed xen.migrate.tools_set_number_of_dirty_pages_during_migration.patch removed xen.migrate.tools_set_migration_constraints_from_cmdline.patch- Enable ix86 32bit build for xen-libs to be built to support xen-tools-domU on 32bit VMs and also vhostmd running in 32bit VMs- Enable blktapctrl when qemu-traditional is required to satisfy build dependencies. Remove binaries after build if xend is disabled- update ifarch usage in xen.spec to cover also arm - blktapctrl is used only by xend - fix xend-tools-xend sub pkg handling - default to gcc47 for sles11sp3 builds - remove all latex packages from BuildRequires - aarch64-rename-PSR_MODE_ELxx-to-match-linux-headers.patch- add arch dependent install suffix for /boot/xen files- Set max_cpus==4 for non-x86_64 builds- Update to Xen 4.4.0 RC3 c/s 28321- Add flex and bison to BuildRequires, needed by previous patch- fate#316071: add discard support for file backed storage (qdisk) libxl.add-option-for-discard-support-to-xl-disk-conf.patch- On platforms where xend is still supported don't output a deprecation warning when using xm. xend-remove-xm-deprecation-warning.patch- Changed License to GPL-2.0 (from GPL-2.0+)- Dropped xen-changeset.patch. It is no longer needed.- BuildRequire libfdt1-devel on ARM- fate#311487: remove modprobe.conf files for autoloading of pv-on-hvm files. Rely on core kernel to skip initialization of emulated hardware Handle xen_emul_unplug= from xenlinux based core kernel-default xen_pvonhvm.xen_emul_unplug.patch Dropped xen_pvdrivers.conf- Fix the spec file to build for old distros The xm/xend toolstack will continue to be contained in xen-tools for older openSUSE and sles distros but it will be contained in xend-tools for os13.x- fate#316071: add discard support for file backed storage (qdisk) to qemu-upstream, enabled unconditionally qemu-xen-upstream-blkif-discard.patch- Update to Xen 4.4.0 RC2 c/s 28287- Restore 32bit ix86 support in spec file for kmps and domU tools - Restore a few missing xend patches xend-config-enable-dump-comment.patch xend-tools-watchdog-support.patch xend-vif-route-ifup.patch- fate#315692: XEN: Include Xen version 4.4 in SLES-12 Update to Xen 4.4.0 RC1 c/s 28233 - Drop 32bit support from spec file - Dropped numerous patches now included in the tarball- gcc-32bit pulls in the right gcc bits, so better buildrequire that- Upstream patches from Jan 5281fad4-numa-sched-leave-node-affinity-alone-if-not-in-auto-mode.patch 52820823-nested-SVM-adjust-guest-handling-of-structure-mappings.patch 52820863-VMX-don-t-crash-processing-d-debug-key.patch 5282492f-x86-eliminate-has_arch_mmios.patch 52864df2-credit-Update-other-parameters-when-setting-tslice_ms.patch 52864f30-fix-leaking-of-v-cpu_affinity_saved-on-domain-destruction.patch 5289d225-nested-VMX-don-t-ignore-mapping-errors.patch 528a0eb0-x86-consider-modules-when-cutting-off-memory.patch 528f606c-x86-hvm-reset-TSC-to-0-after-domain-resume-from-S3.patch 528f609c-x86-crash-disable-the-watchdog-NMIs-on-the-crashing-cpu.patch 52932418-x86-xsave-fix-nonlazy-state-handling.patch- bnc#851749 - Xen service file does not call xend properly xend.service- Add missing requires to pciutils package for xend-tools- bnc#851386 - VUL-0: xen: XSA-78: Insufficient TLB flushing in VT-d (iommu) code 528a0e5b-TLB-flushing-in-dma_pte_clear_one.patch- Make -devel package depend on libuuid-devel, since libxl.h includes uuid.h- bnc#849667 - VUL-0: xen: XSA-74: Lock order reversal between page_alloc_lock and mm_rwlock CVE-2013-4553-xsa74.patch - bnc#849665 - VUL-0: CVE-2013-4551: xen: XSA-75: Host crash due to guest VMX instruction execution 52809208-nested-VMX-VMLANUCH-VMRESUME-emulation-must-check-permission-1st.patch - bnc#849668 - VUL-0: xen: XSA-76: Hypercalls exposed to privilege rings 1 and 2 of HVM guests CVE-2013-4554-xsa76.patch - Upstream patches from Jan 52654798-x86-xsave-also-save-restore-XCR0-across-suspend-ACPI-S3.patch 526e43d4-x86-refine-address-validity-checks-before-accessing-page-tables.patch 526f786a-fix-locking-in-cpu_disable_scheduler.patch 5277646c-x86-ACPI-x2APIC-guard-against-out-of-range-ACPI-or-APIC-IDs.patch 5277a134-x86-make-sure-memory-block-is-RAM-before-passing-to-the-allocator.patch 5278f7f9-x86-HVM-32-bit-IN-result-must-be-zero-extended-to-64-bits.patch 527a0a05-call-sched_destroy_domain-before-cpupool_rm_domain.patch 527cb7d2-x86-hvm-fix-restart-of-RTC-periodic-timer-with-vpt_align-1.patch 527cb820-x86-EFI-make-trampoline-allocation-more-flexible.patch 5280aae0-x86-idle-reduce-contention-on-ACPI-register-accesses.patch- bnc#848657 - VUL-0: xen: CVE-2013-4494: XSA-73: Lock order reversal between page allocation and grant table locks 5277639c-gnttab-correct-locking-order-reversal.patch- Update to Xen 4.3.1- domUloader can no longer be used with the xl toolstack to boot sles10. Patch pygrub to get the kernel and initrd from the image. pygrub-boot-legacy-sles.patch- bnc#842515 - VUL-0: CVE-2013-4375: XSA-71: xen: qemu disk backend (qdisk) resource leak CVE-2013-4375-xsa71.patch - bnc#845520 - VUL-0: CVE-2013-4416: xen: ocaml xenstored mishandles oversized message replies CVE-2013-4416-xsa72.patch - Upstream patches from Jan 52496bea-x86-properly-handle-hvm_copy_from_guest_-phys-virt-errors.patch (Replaces CVE-2013-4355-xsa63.patch) 52496c11-x86-mm-shadow-Fix-initialization-of-PV-shadow-L4-tables.patch (Replaces CVE-2013-4356-xsa64.patch) 52496c32-x86-properly-set-up-fbld-emulation-operand-address.patch (Replaces CVE-2013-4361-xsa66.patch) 52497c6c-x86-don-t-blindly-create-L3-tables-for-the-direct-map.patch 524e971b-x86-idle-Fix-get_cpu_idle_time-s-interaction-with-offline-pcpus.patch 524e9762-x86-percpu-Force-INVALID_PERCPU_AREA-to-non-canonical.patch 524e983e-Nested-VMX-check-VMX-capability-before-read-VMX-related-MSRs.patch 524e98b1-Nested-VMX-fix-IA32_VMX_CR4_FIXED1-msr-emulation.patch 524e9dc0-xsm-forbid-PV-guest-console-reads.patch 5256a979-x86-check-segment-descriptor-read-result-in-64-bit-OUTS-emulation.patch 5256be57-libxl-fix-vif-rate-parsing.patch 5256be84-tools-ocaml-fix-erroneous-free-of-cpumap-in-stub_xc_vcpu_getaffinity.patch 5256be92-libxl-fix-out-of-memory-error-handling-in-libxl_list_cpupool.patch 5257a89a-x86-correct-LDT-checks.patch 5257a8e7-x86-add-address-validity-check-to-guest_map_l1e.patch 5257a944-x86-check-for-canonical-address-before-doing-page-walks.patch 525b95f4-scheduler-adjust-internal-locking-interface.patch 525b9617-sched-fix-race-between-sched_move_domain-and-vcpu_wake.patch 525e69e8-credit-unpause-parked-vcpu-before-destroying-it.patch 525faf5e-x86-print-relevant-tail-part-of-filename-for-warnings-and-crashes.patch- Improvements to block-dmmd script bnc#828623- bnc#840196 - L3: MTU size on Dom0 gets reset when booting DomU with e1000 device set-mtu-from-bridge-for-tap-interface.patch- bnc#839596 - VUL-0: CVE-2013-1442: XSA-62: xen: Information leak on AVX and/or LWP capable CPUs 5242a1b5-x86-xsave-initialize-extended-register-state-when-guests-enable-it.patch - bnc#840592 - VUL-0: CVE-2013-4355: XSA-63: xen: Information leaks through I/O instruction emulation CVE-2013-4355-xsa63.patch - bnc#840593 - VUL-0: CVE-2013-4356: XSA-64: xen: Memory accessible by 64-bit PV guests under live migration CVE-2013-4356-xsa64.patch - bnc#841766 - VUL-1: CVE-2013-4361: XSA-66: xen: Information leak through fbld instruction emulation CVE-2013-4361-xsa66.patch - bnc#833796 - L3: Xen: migration broken from xsave-capable to xsave-incapable host 52205e27-x86-xsave-initialization-improvements.patch 522dc0e6-x86-xsave-fix-migration-from-xsave-capable-to-xsave-incapable-host.patch - bnc#839600 - [HP BCS SLES11 Bug]: In HP’s UEFI x86_64 platform and sles11sp3 with xen environment, xen hypervisor will panic on multiple blades nPar. 523172d5-x86-fix-memory-cut-off-when-using-PFN-compression.patch - bnc#833251 - [HP BCS SLES11 Bug]: In HP’s UEFI x86_64 platform and with xen environment, in booting stage ,xen hypervisor will panic. 522d896b-x86-EFI-properly-handle-run-time-memory-regions-outside-the-1-1-map.patch - bnc#834751 - [HP BCS SLES11 Bug]: In xen, “shutdown –y 0 –h” cannot power off system 522d896b-x86-EFI-properly-handle-run-time-memory-regions-outside-the-1-1-map.patch - Upstream patches from Jan 520119fc-xen-conring-Write-to-console-ring-even-if-console-lock-is-busted.patch 520a2705-watchdog-crash-Always-disable-watchdog-in-console_force_unlock.patch 522d8a1f-x86-allow-guest-to-set-clear-MSI-X-mask-bit-try-2.patch 522dc044-xmalloc-make-whole-pages-xfree-clear-the-order-field-ab-used-by-xmalloc.patch 522f2f9f-Nested-VMX-Clear-bit-31-of-IA32_VMX_BASIC-MSR.patch 522f37b2-sched-arinc653-check-for-guest-data-transfer-failures.patch 5231e090-libxc-x86-fix-page-table-creation-for-huge-guests.patch 5231f00c-cpufreq-missing-check-of-copy_from_guest.patch 523304b6-x86-machine_restart-must-not-call-acpi_dmar_reinstate-twice.patch 5239a064-x86-HVM-fix-failure-path-in-hvm_vcpu_initialise.patch 5239a076-VMX-fix-failure-path-in-construct_vmcs.patch 523c0ed4-x86-HVM-properly-handle-wide-MMIO.patch 523c1758-sched_credit-filter-node-affinity-mask-against-online-cpus.patch 523ff393-x86-HVM-linear-address-must-be-canonical-for-the-whole-accessed-range.patch 523ff3e2-x86-HVM-refuse-doing-string-operations-in-certain-situations.patch- Use upstream version of unplugging in PVonHVM guests add 523c1834-unmodified_drivers-enable-unplug-per-default.patch remove disable_emulated_device.patch- fate#315714 - Support pvUSB in Xen HVM guests, add xen-usb.ko- Upstream patches from Jan 521c6d4a-x86-don-t-allow-Dom0-access-to-the-MSI-address-range.patch 521c6d6c-x86-don-t-allow-Dom0-access-to-the-HT-address-range.patch 521c6e23-x86-Intel-add-support-for-Haswell-CPU-models.patch 521db25f-Fix-inactive-timer-list-corruption-on-second-S3-resume.patch 521e1156-x86-AVX-instruction-emulation-fixes.patch 521ef8d9-AMD-IOMMU-add-missing-checks.patch 52205a7d-hvmloader-smbios-Correctly-count-the-number-of-tables-written.patch 52205a90-public-hvm_xs_strings.h-Fix-ABI-regression-for-OEM-SMBios-strings.patch 52205e27-x86-xsave-initialization-improvements.patch 5226020f-xend-handle-extended-PCI-configuration-space-when-saving-state.patch 52260214-xend-fix-file-descriptor-leak-in-pci-utilities.patch 52285317-hvmloader-fix-SeaBIOS-interface.patch- bnc#837585 - xen* pkg update DISables `xencommons` and `xendomains` systemd services xen.spec- remove unneeded patch, autoload is handled by PCI device, without PCI device xen_platform_pci would not work anyway xen.sles11sp1.fate311487.xen_platform_pci.dmistring.patch- Update our xen-3.0.4 version of unplug code in qemu-trad add comments about the usage of the code rename handler function reenable handlers for writing/reading from emulated PCI device- Change unplugging of emulated devices in PVonHVM guests Since 3.0.4 xen-platform-pci.ko triggerd the unplug by writing to the PCI space of the emulated PCI device. 3.3 introduced an official unplug protocol. The option to unplug wit the official protocol is disabled per default. Remove our version and enable the unplug via official protocol- Upstream patches from Jan 51e517e6-AMD-IOMMU-allocate-IRTEs.patch 51e5183f-AMD-IOMMU-untie-remap-and-vector-maps.patch 51e63df6-VMX-fix-interaction-of-APIC-V-and-Viridian-emulation.patch 52146070-ACPI-fix-acpi_os_map_memory.patch 5214d26a-VT-d-warn-about-CFI-being-enabled-by-firmware.patch 5215d094-Nested-VMX-Check-whether-interrupt-is-blocked-by-TPR.patch 5215d0c5-Nested-VMX-Force-check-ISR-when-L2-is-running.patch 5215d135-Nested-VMX-Clear-APIC-v-control-bit-in-vmcs02.patch 5215d2d5-Nested-VMX-Update-APIC-v-RVI-SVI-when-vmexit-to-L1.patch 5215d8b0-Correct-X2-APIC-HVM-emulation.patch - Dropped 520d417d-xen-Add-stdbool.h-workaround-for-BSD.patch- bnc#836239 - SLES 11 SP3 Xen security patch does not automatically update UEFI boot binary xen.spec- Upstream patches from Jan 51d5334e-x86-mm-Ensure-useful-progress-in-alloc_l2_table.patch 51dd155c-adjust-x86-EFI-build.patch 51e63d80-x86-cpuidle-Change-logging-for-unknown-APIC-IDs.patch 51e6540d-x86-don-t-use-destroy_xen_mappings-for-vunmap.patch 51e7963f-x86-time-Update-wallclock-in-shared-info-when-altering-domain-time-offset.patch 51ffd577-fix-off-by-one-mistakes-in-vm_alloc.patch 51ffd5fd-x86-refine-FPU-selector-handling-code-for-XSAVEOPT.patch 520114bb-Nested-VMX-Flush-TLBs-and-Caches-if-paging-mode-changed.patch 520a5504-VMX-add-boot-parameter-to-enable-disable-APIC-v-dynamically.patch 520a24f6-x86-AMD-Fix-nested-svm-crash-due-to-assertion-in-__virt_to_maddr.patch 520a2570-x86-AMD-Inject-GP-instead-of-UD-when-unable-to-map-vmcb.patch 520b4b60-VT-d-protect-against-bogus-information-coming-from-BIOS.patch 520b4bda-x86-MTRR-fix-range-check-in-mtrr_add_page.patch 520cb8b6-x86-time-fix-check-for-negative-time-in-__update_vcpu_system_time.patch 520d417d-xen-Add-stdbool.h-workaround-for-BSD.patch- The xencommons.service file handles the starting of xenstored and xenconsoled. Drop the following services files as unecessary. Update xendomains.service to reflect these changes. xenstored.service xenconsoled.service blktapctrl.service- Add xencommons.service to xendomains.service 'After' tag xendomains.service- Change the default bridge in xl.conf from xenbr0 to just br0 xl-conf-default-bridge.patch - Add network.target to xendomains.service 'After' tag xendomains.service- Spec file cleanups xen.spec - Renamed xend-sysconfig.patch to xencommons-sysconfig.patch- Added support for systemd with the following service files xenstored.service blktapctrl.service xend.service xenconsoled.service xen-watchdog.service xendomains.service xencommons.service- Upstream patches from Jan 51d277a3-x86-don-t-pass-negative-time-to-gtime_to_gtsc-try-2.patch 51d27807-iommu-amd-Fix-logic-for-clearing-the-IOMMU-interrupt-bits.patch 51d27841-iommu-amd-Workaround-for-erratum-787.patch 51daa074-Revert-hvmloader-always-include-HPET-table.patch- Dropped deprecated or unnecessary patches pvdrv-import-shared-info.patch minios-fixups.patch- Update to Xen 4.3.0 FCS- Enable ARM targets for Xen- Update to Xen 4.3.0-rc6- Update to Xen 4.3.0-rc5- Update to Xen 4.3.0-rc4- Fix xen-utils compiler time warnings xen-utils-0.1.tar.bz2- Enable building the KMPs xen.spec- Update to Xen 4.3.0-rc3- bnc#801663 - performance of mirror lvm unsuitable for production block-dmmd- Update to Xen 4.3.0-rc2- The xend toolstack is now deprecated and unsupported. Consolidate all xend and traditional qemu patches into one patch file. Rename '.diff' patches to '.patch' and reoder others. xend-traditional-qemu.patch- Create a xend-tools package for the legacy xend toolstack and traditional qemu files.- Update to Xen 4.3.0-rc1 c/s 27068 Drop all upstream changeset patches now included in 4.3 tarball - Removed the doc-pdf RPM as there are no more PDFs to include since the docs/xen-api sources were dropped.- bnc#818183 - VUL-0: xen: CVE-2013-2007: XSA-51: qga set umask 0077 when daemonizing CVE-2013-2007-xsa51-1.patch CVE-2013-2007-xsa51-2.patch- add lndir to BuildRequires- remove xen.migrate.tools_notify_restore_to_hangup_during_migration_--abort_if_busy.patch It changed migration protocol and upstream wants a different solution- bnc#802221 - fix xenpaging readd xenpaging.qemu.flush-cache.patch- bnc#808269 - Fully Virtualized Windows VM install is failed on Ivy Bridge platforms with Xen kernel 26754-hvm-Improve-APIC-INIT-SIPI-emulation.patch- Upstream patches from Jan 26891-x86-S3-Fix-cpu-pool-scheduling-after-suspend-resume.patch 26930-x86-EFI-fix-runtime-call-status-for-compat-mode-Dom0.patch - Additional fix for bnc#816159 CVE-2013-1918-xsa45-followup.patch- bnc#817068 - Xen guest with >1 sr-iov vf won't start xen-managed-pci-device.patch- Update to Xen 4.2.2 c/s 26064 The following recent security patches are included in the tarball CVE-2013-0151-xsa34.patch (bnc#797285) CVE-2012-6075-xsa41.patch (bnc#797523) CVE-2013-1917-xsa44.patch (bnc#813673) CVE-2013-1919-xsa46.patch (bnc#813675)- Upstream patch from Jan 26902-x86-EFI-pass-boot-services-variable-info-to-runtime-code.patch- bnc#816159 - VUL-0: xen: CVE-2013-1918: XSA-45: Several long latency operations are not preemptible CVE-2013-1918-xsa45-1-vcpu-destroy-pagetables-preemptible.patch CVE-2013-1918-xsa45-2-new-guest-cr3-preemptible.patch CVE-2013-1918-xsa45-3-new-user-base-preemptible.patch CVE-2013-1918-xsa45-4-vcpu-reset-preemptible.patch CVE-2013-1918-xsa45-5-set-info-guest-preemptible.patch CVE-2013-1918-xsa45-6-unpin-preemptible.patch CVE-2013-1918-xsa45-7-mm-error-paths-preemptible.patch - bnc#816163 - VUL-0: xen: CVE-2013-1952: XSA-49: VT-d interrupt remapping source validation flaw for bridges CVE-2013-1952-xsa49.patch- bnc#809662 - can't use pv-grub to start domU (pygrub does work) xen.spec- bnc#814709 - Unable to create XEN virtual machines in SLED 11 SP2 on Kyoto xend-cpuinfo-model-name.patch- bnc#813673 - VUL-0: CVE-2013-1917: xen: Xen PV DoS vulnerability with SYSENTER CVE-2013-1917-xsa44.patch - bnc#813675 - VUL-0: CVE-2013-1919: xen: Several access permission issues with IRQs for unprivileged guests CVE-2013-1919-xsa46.patch - bnc#814059 - VUL-1: xen: qemu-nbd format-guessing due to missing format specification CVE-2013-1922-xsa48.patch - Upstream patches from Jan 26749-x86-reserve-pages-when-SandyBridge-integrated-graphics.patch 26751-x86-EFI-permit-setting-variable-with-non-zero-attributes.patch 26765-hvm-Clean-up-vlapic_reg_write-error-propagation.patch 26770-x86-irq_move_cleanup_interrupt-must-ignore-legacy-vectors.patch 26771-x86-S3-Restore-broken-vcpu-affinity-on-resume.patch 26772-VMX-Always-disable-SMEP-when-guest-is-in-non-paging-mode.patch 26773-x86-mm-shadow-spurious-warning-when-unmapping-xenheap-pages.patch 26774-defer-event-channel-bucket-pointer-store-until-after-XSM-checks.patch 26799-x86-don-t-pass-negative-time-to-gtime_to_gtsc.patch- bnc#813156 - IndentationError in XendCheckpoint.py xend-domain-lock.patch- bnc#797014 - no way to control live migrations - bnc#803712 - after live migration rcu_sched_state detected stalls xen.migrate.tools-xend_move_assert_to_exception_block.patch xen.migrate.tools-libxc_print_stats_if_migration_is_aborted.patch xen.migrate.tools_set_number_of_dirty_pages_during_migration.patch xen.migrate.tools_notify_restore_to_hangup_during_migration_--abort_if_busy.patch- bnc#811764 - XEN (hypervisor or kernel) has a problem with EFI variable services x86-EFI-set-variable-permit-attrs.patch - Upstream patches from Jan 26060-ACPI-ERST-table-size-checks.patch 26692-x86-fully-protect-MSI-X-table-from-PV-guest-accesses.patch 26702-powernow-add-fixups-for-AMD-P-state-figures.patch 26704-x86-MCA-suppress-bank-clearing-for-certain-injected-events.patch (bnc#805579) 26731-AMD-IOMMU-Process-softirqs-while-building-dom0-iommu-mappings.patch 26733-VT-d-Enumerate-IOMMUs-when-listing-capabilities.patch 26734-ACPI-ERST-Name-table-in-otherwise-opaque-error-messages.patch 26736-ACPI-APEI-Unlock-apei_iomaps_lock-on-error-path.patch 26737-ACPI-APEI-Add-apei_exec_run_optional.patch 26742-IOMMU-properly-check-whether-interrupt-remapping-is-enabled.patch 26743-VT-d-deal-with-5500-5520-X58-errata.patch (bnc#801910) 26744-AMD-IOMMU-allow-disabling-only-interrupt-remapping.patch- Load blktap module in xencommons init script. blktap2 doesn't support qcow2, so blktap is needed to support domains with 'tap:qcow2' disk configurations. modified tmp-initscript-modprobe.patch- bnc#809203 - xen.efi isn't signed with SUSE Secure Boot key xen.spec- Fix adding managed PCI device to an inactive domain modified xen-managed-pci-device.patch- bnc#805094 - xen hot plug attach/detach fails modified blktap-pv-cdrom.patch- bnc# 802690 - domain locking can prevent a live migration from completing modified xend-domain-lock.patch- bnc#797014 - no way to control live migrations 26675-tools-xentoollog_update_tty_detection_in_stdiostream_progress.patch xen.migrate.tools-xc_print_messages_from_xc_save_with_xc_report.patch xen.migrate.tools-xc_document_printf_calls_in_xc_restore.patch xen.migrate.tools-xc_rework_xc_save.cswitch_qemu_logdirty.patch xen.migrate.tools_set_migration_constraints_from_cmdline.patch xen.migrate.tools_add_xm_migrate_--log_progress_option.patch- Upstream patches from Jan 26585-x86-mm-Take-the-p2m-lock-even-in-shadow-mode.patch 26595-x86-nhvm-properly-clean-up-after-failure-to-set-up-all-vCPU-s.patch 26601-honor-ACPI-v4-FADT-flags.patch 26656-x86-fix-null-pointer-dereference-in-intel_get_extended_msrs.patch 26659-AMD-IOMMU-erratum-746-workaround.patch 26660-x86-fix-CMCI-injection.patch 26672-vmx-fix-handling-of-NMI-VMEXIT.patch 26673-Avoid-stale-pointer-when-moving-domain-to-another-cpupool.patch 26676-fix-compat-memory-exchange-op-splitting.patch 26677-x86-make-certain-memory-sub-ops-return-valid-values.patch 26678-SEDF-avoid-gathering-vCPU-s-on-pCPU0.patch 26679-x86-defer-processing-events-on-the-NMI-exit-path.patch 26683-credit1-Use-atomic-bit-operations-for-the-flags-structure.patch 26689-fix-domain-unlocking-in-some-xsm-error-paths.patch- fate#313584: pass bios information to XEN HVM guest xend-hvm-firmware-passthrough.patch- bnc#806736: enabling xentrace crashes hypervisor 26686-xentrace_fix_off-by-one_in_calculate_tbuf_size.patch- update xenalyze to revision 149 Make eip_list output more useful Use correct length when copying record into buffer decode PV_HYPERCALL_SUBCALL events decode PV_HYPERCALL_V2 records Analyze populate-on-demand reclamation patterns Handle 64-bit MMIO Also strip write bit when processing a generic event Make the warnigns in hvm_generic_postprocess more informative Don't warn about switching paging levels unless verbosity>=6 Process NPFs as generic for summary purposes Add HVM_EVENT_VLAPIC- Add upstream patch to fix vfb/vkb initialization in libxl 26369-libxl-devid.patch- fate##313584: pass bios information to XEN HVM guest 26554-hvm-firmware-passthrough.patch 26555-hvm-firmware-passthrough.patch 26556-hvm-firmware-passthrough.patch- Upstream patches from Jan 26516-ACPI-parse-table-retval.patch (Replaces CVE-2013-0153-xsa36.patch) 26517-AMD-IOMMU-clear-irtes.patch (Replaces CVE-2013-0153-xsa36.patch) 26518-AMD-IOMMU-disable-if-SATA-combined-mode.patch (Replaces CVE-2013-0153-xsa36.patch) 26519-AMD-IOMMU-perdev-intremap-default.patch (Replaces CVE-2013-0153-xsa36.patch) 26526-pvdrv-no-devinit.patch 26529-gcc48-build-fix.patch 26531-AMD-IOMMU-IVHD-special-missing.patch (Replaces CVE-2013-0153-xsa36.patch) 26532-AMD-IOMMU-phantom-MSI.patch 26536-xenoprof-div-by-0.patch 26576-x86-APICV-migration.patch 26577-x86-APICV-x2APIC.patch 26578-AMD-IOMMU-replace-BUG_ON.patch- bnc#797014 - no way to control live migrations 26547-tools-xc_fix_logic_error_in_stdiostream_progress.patch 26548-tools-xc_handle_tty_output_differently_in_stdiostream_progress.patch 26549-tools-xc_turn_XCFLAGS_*_into_shifts.patch 26550-tools-xc_restore_logging_in_xc_save.patch 26551-tools-xc_log_pid_in_xc_save-xc_restore_output.patch- Set $BRP_PESIGN_FILES in the %install section so that modules are signed in the buildservice (fate#314552).- PVonHVM: __devinit was removed in linux-3.8- Add 'managed' PCI passthrough support to xend, allowing support for the same through libvirt xen-managed-pci-device.patch FATE#313570- Upstream patches from Jan 26287-sched-credit-pick-idle.patch 26340-VT-d-intremap-verify-legacy-bridge.patch (Replaces CVE-2012-5634-xsa33.patch) 26370-libxc-x86-initial-mapping-fit.patch 26395-x86-FPU-context-conditional.patch 26404-x86-forward-both-NMI-kinds.patch 26418-x86-trampoline-consider-multiboot.patch 26427-x86-AMD-enable-WC+.patch 26428-x86-HVM-RTC-update.patch 26440-x86-forward-SERR.patch 26443-ACPI-zap-DMAR.patch 26444-x86-nHVM-no-self-enable.patch (Replaces CVE-2013-0152-xsa35.patch) 26501-VMX-simplify-CR0-update.patch 26502-VMX-disable-SMEP-when-not-paging.patch- bnc#800275 - VUL-0: XSA-36: CVE-2013-0153: xen: interrupt remap entries shared and old ones not cleared on AMD IOMMUs CVE-2013-0153-xsa36.patch- Add # needssslcertforbuild to the specfile, to make the UEFI signing certificate available during build (fate#314511, fate#314552).- bnc#798188 - Add $network to xend initscript dependencies- Add upstream patches to fix libxl bugs. These patches have already been posted for inclusion in xen-4.2-testing. 25912-partial-libxl.patch 26372-tools-paths.patch 26468-libxl-race.patch 26469-libxl-race.patch- bnc#797285 - VUL-0: Xen: XSA-34 (CVE-2013-0151) - nested virtualization on 32-bit exposes host crash CVE-2013-0151-xsa34.patch - bnc#797287 - VUL-0: Xen: XSA-35 (CVE-2013-0152) - Nested HVM exposes host to being driven out of memory by guest CVE-2013-0152-xsa35.patch- bnc#793717 - NetWare will not boot on Xen 4.2 xnloader.py domUloader.py pygrub-netware-xnloader.patch Removed reverse-24757-use-grant-references.patch- bnc#797523 - VUL-1: CVE-2012-6075: qemu / kvm-qemu: e1000 overflows under some conditions CVE-2012-6075-xsa41.patch- Mask the floating point exceptions for guests like NetWare on machines that support XSAVE. x86-fpu-context-conditional.patch- fate##313584: pass bios information to XEN HVM guest 26341-hvm-firmware-passthrough.patch 26342-hvm-firmware-passthrough.patch 26343-hvm-firmware-passthrough.patch 26344-hvm-firmware-passthrough.patch- bnc#787169 - L3: Marvell 88SE9125 disk controller not detecting disk in Xen kernel 26133-IOMMU-defer-BM-disable.patch 26324-IOMMU-assign-params.patch 26325-IOMMU-add-remove-params.patch 26326-VT-d-context-map-params.patch 26327-AMD-IOMMU-flush-params.patch 26328-IOMMU-pdev-type.patch 26329-IOMMU-phantom-dev.patch 26330-VT-d-phantom-MSI.patch 26331-IOMMU-phantom-dev-quirk.patch - Upstream patches from Jan 26294-x86-AMD-Fam15-way-access-filter.patch 26320-IOMMU-domctl-assign-seg.patch 26332-x86-compat-show-guest-stack-mfn.patch 26333-x86-get_page_type-assert.patch- bnc#794316 - VUL-0: CVE-2012-5634: xen: VT-d interrupt remapping source validation flaw (XSA-33) CVE-2012-5634-xsa33.patch- Update to Xen 4.2.1 c/s 25952- Upstream patches from Jan 26195-x86-compat-atp-gmfn-range-cont.patch 26196-ACPI-set-PDC-bits-rc.patch 26200-IOMMU-debug-verbose.patch 26203-x86-HAP-dirty-vram-leak.patch 26229-gnttab-version-switch.patch (Replaces CVE-2012-5510-xsa26.patch) 26230-x86-HVM-limit-batches.patch (Replaces CVE-2012-5511-xsa27.patch) 26231-memory-exchange-checks.patch (Replaces CVE-2012-5513-xsa29.patch) 26232-x86-mark-PoD-error-path.patch (Replaces CVE-2012-5514-xsa30.patch) 26233-memop-order-checks.patch (Replaces CVE-2012-5515-xsa31.patch) 26234-x86-page-from-gfn-pv.patch (Replaces CVE-2012-5525-xsa32.patch) 26235-IOMMU-ATS-max-queue-depth.patch 26252-VMX-nested-rflags.patch 26253-VMX-nested-rdtsc.patch 26254-VMX-nested-dr.patch 26255-VMX-nested-ia32e-mode.patch 26258-VMX-nested-intr-delivery.patch 26260-x86-mmuext-errors.patch 26262-x86-EFI-secure-shim.patch 26266-sched-ratelimit-check.patch 26272-x86-EFI-makefile-cflags-filter.patch- bnc#757525 - domain destroyed on live migration with missing vif on target machine xen-migration-bridge-check.patch- NetWare will not boot or install on Xen 4.2 reverse-24757-use-grant-references.patch- fate#313222 - xenstore-chmod should support 256 permissions 26189-xenstore-chmod.patch- bnc#789945 - VUL-0: CVE-2012-5510: xen: Grant table version switch list corruption vulnerability (XSA-26) CVE-2012-5510-xsa26.patch - bnc#789944 - VUL-0: CVE-2012-5511: xen: Several HVM operations do not validate the range of their inputs (XSA-27) CVE-2012-5511-xsa27.patch - bnc#789951 - VUL-0: CVE-2012-5513: xen: XENMEM_exchange may overwrite hypervisor memory (XSA-29) CVE-2012-5513-xsa29.patch - bnc#789948 - VUL-0: CVE-2012-5514: xen: Missing unlock in guest_physmap_mark_populate_on_demand() (XSA-30) CVE-2012-5514-xsa30.patch - bnc#789950 - VUL-0: CVE-2012-5515: xen: Several memory hypercall operations allow invalid extent order values (XSA-31) CVE-2012-5515-xsa31.patch - bnc#789952 - VUL-0: CVE-2012-5525: xen: Several hypercalls do not validate input GFNs (XSA-32) CVE-2012-5525-xsa32.patch - Upstream patches from Jan 26129-ACPI-BGRT-invalidate.patch 26132-tmem-save-NULL-check.patch 26134-x86-shadow-invlpg-check.patch 26139-cpumap-masking.patch 26148-vcpu-timer-overflow.patch (Replaces CVE-2012-4535-xsa20.patch) 26149-x86-p2m-physmap-error-path.patch (Replaces CVE-2012-4537-xsa22.patch) 26150-x86-shadow-unhook-toplevel-check.patch (Replaces CVE-2012-4538-xsa23.patch) 26151-gnttab-compat-get-status-frames.patch (Replaces CVE-2012-4539-xsa24.patch) 26179-PCI-find-next-cap.patch 26183-x86-HPET-masking.patch 26188-x86-time-scale-asm.patch- remove obsolete pv-driver-build.patch to fix build- Fix build with glibc 2.17: add patch xen-glibc217.patch, fix configure for librt.- bnc#777628 - guest "disappears" after live migration Updated block-dmmd script- Fix exception in balloon.py and osdep.py xen-max-free-mem.diff- fate#311966: Fix XEN VNC implementation to correctly map keyboard layouts VNC-Support-for-ExtendedKeyEvent-client-message.patch- fate#310510 - fix xenpaging restore changes to integrate paging into xm/xend xenpaging.autostart.patch xenpaging.doc.patch- bnc#787163 - VUL-0: CVE-2012-4544: xen: Domain builder Out-of- memory due to malicious kernel/ramdisk (XSA 25) CVE-2012-4544-xsa25.patch - bnc#779212 - VUL-0: CVE-2012-4411: XEN / qemu: guest administrator can access qemu monitor console (XSA-19) CVE-2012-4411-xsa19.patch- bnc#786516 - VUL-0: CVE-2012-4535: xen: Timer overflow DoS vulnerability CVE-2012-4535-xsa20.patch - bnc#786518 - VUL-0: CVE-2012-4536: xen: pirq range check DoS vulnerability CVE-2012-4536-xsa21.patch - bnc#786517 - VUL-0: CVE-2012-4537: xen: Memory mapping failure DoS vulnerability CVE-2012-4537-xsa22.patch - bnc#786519 - VUL-0: CVE-2012-4538: xen: Unhooking empty PAE entries DoS vulnerability CVE-2012-4538-xsa23.patch - bnc#786520 - VUL-0: CVE-2012-4539: xen: Grant table hypercall infinite loop DoS vulnerability CVE-2012-4539-xsa24.patch - bnc#784087 - L3: Xen BUG at io_apic.c:129 26102-x86-IOAPIC-legacy-not-first.patch- Upstream patches from Jan 25920-x86-APICV-enable.patch 25921-x86-APICV-delivery.patch 25922-x86-APICV-x2APIC.patch 25957-x86-TSC-adjust-HVM.patch 25958-x86-TSC-adjust-sr.patch 25959-x86-TSC-adjust-expose.patch 25975-x86-IvyBridge.patch 25984-SVM-nested-paging-mode.patch 26054-x86-AMD-perf-ctr-init.patch 26055-x86-oprof-hvm-mode.patch 26056-page-alloc-flush-filter.patch 26061-x86-oprof-counter-range.patch 26062-ACPI-ERST-move-data.patch 26063-x86-HPET-affinity-lock.patch 26095-SVM-nested-leak.patch 26096-SVM-nested-vmexit-emul.patch 26098-perfc-build.patch- handle possible asprintf failures in log-guest-console.patch- bnc#694863 - kexec fails in xen 26093-hvm_handle_PoD_and_grant_pages_in_HVMOP_get_mem_type.patch- fate#312709: Pygrub needs to know which entry to select 26114-pygrub-list-entries.patch- merge changes fron xen-unstable, obsolete our changes 26077-stubdom_fix_compile_errors_in_grub.patch 26078-hotplug-Linux_remove_hotplug_support_rely_on_udev_instead.patch 26079-hotplug-Linux_close_lockfd_after_lock_attempt.patch 26081-stubdom_fix_rpmlint_warning_spurious-executable-perm.patch 26082-blktap2-libvhd_fix_rpmlint_warning_spurious-executable-perm.patch 26083-blktap_fix_rpmlint_warning_spurious-executable-perm.patch 26084-hotplug_install_hotplugpath.sh_as_data_file.patch 26085-stubdom_install_stubdompath.sh_as_data_file.patch 26086-hotplug-Linux_correct_sysconfig_tag_in_xendomains.patch 26087-hotplug-Linux_install_sysconfig_files_as_data_files.patch 26088-tools_xend_fix_wrong_condition_check_for_xml_file.patch- fate#311966: Fix XEN VNC implementation to correctly map keyboard layouts VNC-Support-for-ExtendedKeyEvent-client-message.patch- workaround bash bug in locking.sh:claim_lock, close fd- fix incorrect self-provides/obsoletes of xen-tools-ioemu- bnc#783847 - Virtualization/xen: Bug Xen 4.2 'xendomins' init script incorrectly Requires 'xend' service when using 'xl' toolstack init.xendomains- bnc#782835 - Xen HVM Guest fails (errors) to launch on Opensuse 12.2 + Xen 4.2 + 'xl' toolstack xen-pygrub-grub-args.patch- backport parallel build support for stubdom - rename 5 patches which were merged upstream- remove more obsolete changes: CFLAGS passing to qemu-traditional, PYTHON_PREFIX_ARG handling and pygrub installation- update blktap-pv-cdrom.patch handle allocation errors in asprintf to fix compile errors handle value returned from xs_read properly remove casts from void pointers- update xenalyze to revision 138 Fix dump time calculation overflow move struct record_info into a header correctly display of count of HW events update trace.h to match xen-unstable Remove vestigal HW_IRQ trace records Remove decode of PV_UPDATE_VA_MAPPING automatically generate dependencies Get rid of redundant hvm dump_header Introduce more efficient read mechanism Eliminate unnecessary cycles_to_time calculation Rework math to remove two 64-bit divisions Enable -O2 optimization level Remove --dump-cooked Remove spurious dump_header construction Improve record-sorting algorithm Use long to cast into and out of pointers Make max_active_pcpu calculation smarter Optimize pcpu_string Enable more cr3 output Sort cr3 enumerated values by start time Add option to skip vga range in MMIO enumeration Handle MMIO records from different vmexits Relocate pio and mmio enumaration structs to their own sub-struct Handle new hvm_event traces Introduce generic summary functionality Function-ize setting of h->post_process Reorganize cr trace handling Allow several summary handlers to register on a single vmexit Get rid of all tabs in xenalyze.c Handle new IRQ tracing Decrease verbosity Print exit reason number if no string is available Fix minor summary issue Add string for TPR_BELOW_THRESHOLD Raise MAX_CPUS to 256 cpus. Add --report-pcpu option to report physical cpu utilization. increase MAX_CPUS Handle RUNSTATE_INIT in domain_runstate calculation- update RPM_OPT_FLAGS handling in spec file pass EXTRA_CFLAGS via environment- remove obsolete xencommons-proc-xen.patch- Upstream patches from Jan 25927-x86-domctl-ioport-mapping-range.patch 25929-tmem-restore-pool-version.patch 25931-x86-domctl-iomem-mapping-checks.patch 25940-x86-S3-flush-cache.patch 25952-x86-MMIO-remap-permissions.patch 25961-x86-HPET-interrupts.patch 25962-x86-assign-irq-vector-old.patch 25965-x86-ucode-Intel-resume.patch- pygrub: always append --args 25941-pygrub_always_append_--args.patch- use BuildRequires: gcc46 only in sles11sp2 or 12.1 to fix build in 11.4- Upstream patches from Jan 25833-32on64-bogus-pt_base-adjust.patch 25835-adjust-rcu-lock-domain.patch 25836-VT-d-S3-MSI-resume.patch 25850-tmem-xsa-15-1.patch 25851-tmem-xsa-15-2.patch 25852-tmem-xsa-15-3.patch 25853-tmem-xsa-15-4.patch 25854-tmem-xsa-15-5.patch 25855-tmem-xsa-15-6.patch 25856-tmem-xsa-15-7.patch 25857-tmem-xsa-15-8.patch 25858-tmem-xsa-15-9.patch 25859-tmem-missing-break.patch 25860-tmem-cleanup.patch 25861-x86-early-fixmap.patch 25862-sercon-non-com.patch 25863-sercon-ehci-dbgp.patch 25864-sercon-unused.patch 25866-sercon-ns16550-pci-irq.patch 25867-sercon-ns16550-parse.patch 25874-x86-EFI-chain-cfg.patch 25909-xenpm-consistent.patch- Fixed the 32bit build.- Update to Xen 4.2.0 FCS c/s 25844- unmodified_drivers: handle IRQF_SAMPLE_RANDOM, it was removed in 3.6-rc1- bnc#778105 - first XEN-PV VM fails to spawn xend: Increase wait time for disk to appear in host bootloader Modified existing xen-domUloader.diff- Disable the snapshot patches. Snapshot only supported the qcow2 image format which was poorly implemented qemu 0.10.2. Snapshot support may be restored in the future when the newer upstream qemu is used by Xen.- bnc#776995 - attaching scsi control luns with pvscsi - xend/pvscsi: fix passing of SCSI control LUNs xen-bug776995-pvscsi-no-devname.patch - xend/pvscsi: fix usage of persistant device names for SCSI devices xen-bug776995-pvscsi-persistent-names.patch - xend/pvscsi: update sysfs parser for Linux 3.0 xen-bug776995-pvscsi-sysfs-parser.patch- Update to Xen 4.2.0 RC3+ c/s 25779- Update to Xen 4.2.0 RC2+ c/s 25765-bnc#766284 - compiled-in ata_piix driver issues with PVonHVM guests Update xen_pvdrivers.conf to match not only libata but also ata_piix This avoids IO errors in the piix driver caused by unplugged hardware- Update to Xen 4.1.3 c/s 23336- Upstream or pending upstream patches from Jan 25587-fix-off-by-one-parsing-error.patch 25616-x86-MCi_CTL-default.patch 25617-vtd-qinval-addr.patch 25688-x86-nr_irqs_gsi.patch- Build all files with optimization (fortify source does not work with -O0).- bnc#773393 - VUL-0: CVE-2012-3433: xen: HVM guest destroy p2m teardown host DoS vulnerability CVE-2012-3433-xsa11.patch - bnc#773401 - VUL-1: CVE-2012-3432: xen: HVM guest user mode MMIO emulation DoS 25682-x86-inconsistent-io-state.patch- bnc#762484 - VUL-1: CVE-2012-2625: xen: pv bootloader doesn't check the size of the bzip2 or lzma compressed kernel, leading to denial of service 25589-pygrub-size-limits.patch- Make it build with latest TeXLive 2012 with new package layout- bnc#767273 - unsupported /var/lock/subsys is still used by xendomains init.xendomains- bnc#766283 - opensuse 12.2 pv guests can not start after installation due to lack of grub2 support in the host 24000-pygrub-grub2.patch 24001-pygrub-grub2.patch 24002-pygrub-grub2.patch- Upstream pygrub patches for grub2 support and fixes 23686-pygrub-solaris.patch 23697-pygrub-grub2.patch 23944-pygrub-debug.patch 23998-pygrub-GPT.patch 23999-pygrub-grub2.patch 24064-pygrub-HybridISO.patch 24401-pygrub-scrolling.patch 24402-pygrub-edit-fix.patch 24460-pygrub-extlinux.patch 24706-pygrub-extlinux.patch- Revised version of security patch and an additional patch for bnc#764077 x86_64-AMD-erratum-121.patch x86_64-allow-unsafe-adjust.patch- remove dummy asm/smp-processor-id.h- removed dummy xenapi.tex which was added because of bnc#750679 (see the below entry dated "Mon Apr 2 13:07:20 CEST 2012") because "ps2pdf xenapi.ps xenapi.pdf" failed only for Ghostscript version 9.04 (now we have Ghostscript 9.05).- bnc#764077 - VUL-0: EMBARGOED: xen: XSA-9: denial of service on older AMD systems x86_64-AMD-erratum-121.patch - Revised version of security patch for bnc#757537 x86_64-sysret-canonical.patch- Upstream patches from Jan 25242-x86_64-hotplug-compat-m2p.patch 25247-SVM-no-rdtsc-intercept.patch 25267-x86-text-unlikely.patch 25269-x86-vMCE-addr-misc-write.patch 25271-x86_64-IST-index.patch 25327-pvdrv-no-asm-system-h.patch- add dummy asm/smp-processor-id.h for kernel-source 3.4-rcX- remove inclusion of asm/system.h from platform-pci.c- Upstream patches from Jan 25168-x86-memset-size.patch 25191-x86-tdt-delta-calculation.patch 25195-x86-cpuidle-C2-no-flush-or-bm-check.patch 25196-x86-HAP-PAT-sr.patch 25200-x86_64-trap-bounce-flags.patch- bnc#757537 - VUL-0: xen: CVE-2012-0217 PV guest escalation x86_64-sysret-canonical.patch - bnc#757970 - VUL-1: xen: guest denial of service on syscall GPF generation x86_64-trap-bounce-flags.patch- Upstream patches from Jan 25098-x86-emul-lock-UD.patch 25101-x86-hpet-disable.patch ioemu-9877-MSI-X-device-cleanup.patch- bnc#750679 - "ps2pdf xenapi.ps xenapi.pdf" fails for user abuild in Factory add dummy xenapi.tex until ghostscript is fixed- remove vcd.o rule from PVonHVM Makefile, not needed anymore- bnc#753165 - xen/scripts/network-bridge wont create bridge bridge-bonding.diff- Upstream patches from Jan 24950-gnttab-copy-mapped.patch 24970-x86-cpuidle-deny-port-access.patch 24996-x86-cpuidle-array-overrun.patch 25041-tapdisk2-create-init-name.patch- use BuildRequires: gcc46 only in sles11sp2 to avoid issues when gcc47 and newer is the distro default- bnc#745880 - cpuid setting is not preserved across xend restarts xend-cpuid.patch- Rename 2XXXX-vif-bridge.patch -> vif-bridge-tap-fix.patch- bnc#747331 - XEN: standard "newburn" kernel QA stress test on guest (+ smartd on Dom0?) freezes the guest 24883-x86-guest-walk-not-present.patch - bnc#745367 - MCE bank handling during migration 24781-x86-vmce-mcg_ctl.patch 24886-x86-vmce-mcg_ctl-default.patch 24887-x86-vmce-sr.patch - bnc#744771 - L3: VM with passed through PCI card fails to reboot under dom0 load 24888-pci-release-devices.patch - Upstream patches from Jan 24517-VT-d-fault-softirq.patch 24527-AMD-Vi-fault-softirq.patch 24535-x86-vMSI-misc.patch 24615-VESA-lfb-flush.patch 24690-x86-PCI-SERR-no-deadlock.patch 24701-gnttab-map-grant-ref-recovery.patch 24742-gnttab-misc.patch 24780-x86-paging-use-clear_guest.patch 24805-x86-MSI-X-dom0-ro.patch ioemu-9869-MSI-X-init.patch ioemu-9873-MSI-X-fix-unregister_iomem.patch- add BuildRequires: libuuid-devel- bnc#746702 - Xen HVM DomU crash during Windows Server 2008 R2 install, when maxmem > memory README.SuSE- bnc#745005 - Update vif configuration examples in xmexample* Updated xen-xmexample.diff- bnc#743414 - using vifname is ignored when defining a xen virtual interface with xl/libxl 24459-libxl-vifname.patch- bnc#740165 - VUL-0: kvm: qemu heap overflow in e1000 device emulation (applicable to Xen qemu - CVE-2012-0029) cve-2012-0029-qemu-xen-unstable.patch- bnc#744014 - blank screen in SLES11 SP2 guest with a VF statically assigned ioemu-MSI-X-fix-unregister_iomem.patch - Upstream patches from Jan 24453-x86-vIRQ-IRR-TMR-race.patch 24456-x86-emul-lea.patch- fate#310510 - fix xenpaging 24586-x86-mm_Properly_account_for_paged_out_pages.patch 24609-tools-libxc_handle_fallback_in_linux_privcmd_map_foreign_bulk_properly.patch 24610-xenpaging_make_file_op_largefile_aware.patch xen-unstable.misc.linux_privcmd_map_foreign_bulk.retry_paged.patch xenpaging.speedup-page-out.resume_pages.find_next_bit_set.patch xenpaging.speedup-page-out.evict_pages.free_slot_stack.patch xenpaging.speedup-page-out.policy_choose_victim.patch update xenpaging.error-handling.patch, flush qemu cache not so often- fate#310510 - fix xenpaging 24566-tools-libxc_fix_error_handling_in_xc_mem_paging_load.patch- fate#310510 - fix xenpaging 24466-libxc_Only_retry_mapping_pages_when_ENOENT_is_returned.patch- The xen kmp packages fail on the 09-check-packaged-twice script. Rename xen_pvdrivers.conf to xen_pvdrivers-.conf- fate#310510 - fix xenpaging xenpaging.speedup-page-in.gfn_to_slot.patch- bnc#739585 - L3: Xen block-attach fails after repeated attach/detach blktap-close-fifos.patch blktap-disable-debug-printf.patch- bnc#741159 - Fix default setting of XENSTORED_ROOTDIR in xencommons init script xencommons-xenstored-root.patch- bnc#740625 - xen: cannot interact with xend after upgrade (SLES) - bnc#738694 - xen: cannot interact with xend after upgrade (os12.1) - Other README changes included. README.SuSE- bnc#694863 - kexec fails in xen 24478-libxl_add_feature_flag_to_xenstore_for_XS_RESET_WATCHES.patch- fate#310510 - fix xenpaging xenpaging.speedup-page-out.patch- bnc#735806 - VF doesn't work after hot-plug for many times 24448-x86-pt-irq-leak.patch - Upstream patches from Jan 24261-x86-cpuidle-Westmere-EX.patch 24417-amd-erratum-573.patch 24429-mceinj-tool.patch 24447-x86-TXT-INIT-SIPI-delay.patch ioemu-9868-MSI-X.patch- bnc#732884 - remove private runlevel 4 from init scripts xen.no-default-runlevel-4.patch- bnc#727515 - Fragmented packets hang network boot of HVM guest ipxe-gcc45-warnings.patch ipxe-ipv4-fragment.patch ipxe-enable-nics.patch- fate#310510 - fix xenpaging update xenpaging.autostart.patch, make changes with mem-swap-target permanent update xenpaging.doc.patch, mention issues with live migration- fate#310510 - fix xenpaging add xenpaging.evict_mmap_readonly.patch update xenpaging.error-handling.patch, reduce debug output- bnc#736824 - Microcode patches for AMD's 15h processors panic the system 24189-x86-p2m-pod-locking.patch 24412-x86-AMD-errata-model-shift.patch 24411-x86-ucode-AMD-Fam15.patch- bnc#711219 - SR-IOV VF doesn't work in SLES11 sp2 guest 24357-firmware-no-_PS0-_PS3.patch - Upstream patches from Jan 24153-x86-emul-feature-checks.patch 24275-x86-emul-lzcnt.patch 24277-x86-dom0-features.patch 24278-x86-dom0-no-PCID.patch 24282-x86-log-dirty-bitmap-leak.patch 24359-x86-domU-features.patch 24360-x86-pv-domU-no-PCID.patch 24389-amd-fam10-gart-tlb-walk-err.patch 24391-x86-pcpu-version.patch- bnc#729208 - xenpaging=-1 doesn't work xenpaging.doc.patch- fate#310510 - fix xenpaging readd xenpaging.qemu.flush-cache.patch- bnc#732782 - L3: xm create hangs when maxmen value is enclosed in "quotes" xm-create-maxmem.patch- Upstream patches / changes from Jan Added 24358-kexec-compat-overflow.patch Removed 24341-x86-64-mmcfg_remove___initdata_annotation_overlooked_in_23749e8d1c8f074ba.patch Removed 24345-tools-libxc_Fix_x86_32_build_breakage_in_previous_changeset..patch- fate#310510 - fix xenpaging 24178-debug_Add_domain-vcpu_pause_count_info_to_d_key..patch Use wait queues for paging, improve foreign mappings. xenpaging.versioned-interface.patch xenpaging.mmap-before-nominate.patch xenpaging.p2m_is_paged.patch xenpaging.evict_fail_fast_forward.patch xenpaging.error-handling.patch xenpaging.mem_event-use-wait_queue.patch xenpaging.waitqueue-paging.patch Remove obsolete patch, not needed with wait queue usage xenpaging.HVMCOPY_gfn_paged_out.patch- fate#310510 - fix xenpaging Fix incorrect backport, remove double memset, use xzalloc 24171-x86waitqueue_Allocate_whole_page_for_shadow_stack..patch- fate#310510 - fix xenpaging fix typo in nominate, use lock instead of double unlock 23905-xenpaging_fix_locking_in_p2m_mem_paging_functions.patch- fate#310510 - fix xenpaging 24327-After_preparing_a_page_for_page-in_allow_immediate_fill-in_of_the_page_contents.patch 24328-Tools_Libxc_wrappers_to_automatically_fill_in_page_oud_page_contents_on_prepare.patch 24329-Teach_xenpaging_to_use_the_new_and_non-racy_xc_mem_paging_load_interface.patch- bnc#734826 - xm rename doesn't work anymore Updated xend-migration-domname-fix.patch- fate#310510 - fix xenpaging 24269-mem_event_move_mem_event_domain_out_of_struct_domain.patch 24270-Free_d-mem_event_on_domain_destruction..patch- fate#310510 - fix xenpaging 24318-x86-mm_Fix_checks_during_foreign_mapping_of_paged_pages.patch- fate#310510 - fix xenpaging 23949-constify_vcpu_set_affinitys_second_parameter.patch- fate#310510 - fix xenpaging 24105-xenpaging_compare_domain_pointer_in_p2m_mem_paging_populate.patch 24106-mem_event_check_capabilities_only_once.patch- fate#310510 - fix xenpaging 24272-xenpaging_Fix_c-s_235070a29c8c3ddf7_update_machine_to_phys_mapping_during_page_deallocation.patch- bnc#727081 - xend domains don't work anymore since update from 12.1 beta to 12.1 RC 1 24344-tools-x86_64_Fix_cpuid_inline_asm_to_not_clobber_stacks_red_zone.patch 24345-tools-libxc_Fix_x86_32_build_breakage_in_previous_changeset..patch- bnc#733449 - Panic in mcfg_ioremap when booting xen-dbg.gz on Xeon E3-1230 24341-x86-64-mmcfg_remove___initdata_annotation_overlooked_in_23749e8d1c8f074ba.patch- fate#310510 - fix xenpaging backport waitqueue changes from xen-unstable 24104-waitqueue_Double_size_of_x86_shadow_stack..patch 24171-x86waitqueue_Allocate_whole_page_for_shadow_stack..patch 24195-waitqueue_Detect_saved-stack_overflow_and_crash_the_guest..patch 24196-waitqueue_Reorder_prepare_to_wait_so_that_vcpu_is_definitely_on_the.patch 24197-x86-waitqueue_Because_we_have_per-cpu_stacks_we_must_wake_up_on_teh.patch 24231-waitqueue_Implement_wake_up_nroneall..patch 24232-waitqueue_Hold_a_reference_to_a_domain_on_a_waitqueue..patch- fate#310510 - fix xenpaging 24227-xenpaging_restrict_pagefile_permissions.patch- fate#310510 - fix xenpaging merge upstream version of our existing patches: 24218-libxc_add_bitmap_clear_function.patch remove old versions: xenpaging.bitmap_clear.patch- fate#310510 - fix xenpaging merge upstream version of our existing patches: 24138-xenpaging_munmap_all_pages_after_page-in.patch 24208-xenpaging_remove_filename_from_comment.patch 24209-xenpaging_remove_obsolete_comment_in_resume_path.patch 24210-xenpaging_use_PERROR_to_print_errno.patch 24211-xenpaging_simplify_file_op.patch 24212-xenpaging_print_gfn_in_failure_case.patch 24213-xenpaging_update_xenpaging_init.patch 24214-xenpaging_remove_xc_dominfo_t_from_paging_t.patch 24215-xenpaging_track_the_number_of_paged-out_pages.patch 24216-xenpaging_move_page_add-resume_loops_into_its_own_function..patch 24217-xenpaging_improve_mainloop_exit_handling.patch 24219-xenpaging_retry_unpageable_gfns.patch 24220-xenpaging_install_into_LIBEXEC_dir.patch 24221-xenpaging_add_XEN_PAGING_DIR_-_libxl_xenpaging_dir_path.patch 24222-xenpaging_use_guests_tot_pages_as_working_target.patch 24223-xenpaging_watch_the_guests_memory-target-tot_pages_xenstore_value.patch 24224-xenpaging_add_cmdline_interface_for_pager.patch 24225-xenpaging_improve_policy_mru_list_handling.patch 24226-xenpaging_add_debug_to_show_received_watch_event..patch remove old versions: xenpaging.XEN_PAGING_DIR.patch xenpaging.add_evict_pages.patch xenpaging.cmdline-interface.patch xenpaging.encapsulate_domain_info.patch xenpaging.file_op-return-code.patch xenpaging.install-to-libexec.patch xenpaging.low_target_policy_nomru.patch xenpaging.main-loop-exit-handling.patch xenpaging.misleading-comment.patch xenpaging.page_in-munmap-size.patch xenpaging.print-gfn.patch xenpaging.record-numer-paged-out-pages.patch xenpaging.reset-uncomsumed.patch xenpaging.stale-comments.patch xenpaging.target-tot_pages.patch xenpaging.use-PERROR.patch xenpaging.watch-target-tot_pages.patch xenpaging.watch_event-DPRINTF.patch xenpaging.xc_interface_open-comment.patch- bnc#733348 - Use 'xm' in various scripts if xend is running. Modified xmclone.sh and xen-updown.sh - Only emit xl warning when xend is running and -f (force) flag is not specified. Modified disable-xl-when-using-xend.patch- Upstream patches from Jan 24190-hap-log-dirty-disable-rc.patch 24193-hap-track-dirty-vram-rc.patch 24201-x86-pcpu-platform-op.patch- Upstream patches from Jan 23900-xzalloc.patch 24144-cpufreq-turbo-crash.patch 24148-shadow-pgt-dying-op-performance.patch 24155-x86-ioapic-EOI-after-migration.patch 24156-x86-ioapic-shared-vectors.patch 24157-x86-xstate-init.patch 24168-x86-vioapic-clear-remote_irr.patch- submit fixes for bnc#649209 and bnc#711892 xl-create-pv-with-qcow2-img.patch update suspend_evtchn_lock.patch- Update trace.c, merge patches from upstream 23050-xentrace_dynamic_tracebuffer_allocation.patch 23091-xentrace_fix_t_info_pages_calculation..patch 23092-xentrace_print_calculated_numbers_in_calculate_tbuf_size.patch 23093-xentrace_remove_gdprintk_usage_since_they_are_not_in_guest_context.patch 23094-xentrace_update_comments.patch 23095-xentrace_use_consistent_printk_prefix.patch 23128-xentrace_correct_formula_to_calculate_t_info_pages.patch 23129-xentrace_remove_unneeded_debug_printk.patch 23173-xentrace_Move_register_cpu_notifier_call_into_boot-time_init..patch 23239-xentrace_correct_overflow_check_for_number_of_per-cpu_trace_pages.patch 23308-xentrace_Move_the_global_variable_t_info_first_offset_into_calculate_tbuf_size.patch 23309-xentrace_Mark_data_size___read_mostly_because_its_only_written_once.patch 23310-xentrace_Remove_unneeded_cast_when_assigning_pointer_value_to_dst.patch 23404-xentrace_reduce_trace_buffer_size_to_something_mfn_offset_can_reach.patch 23405-xentrace_fix_type_of_offset_to_avoid_ouf-of-bounds_access.patch 23406-xentrace_update___insert_record_to_copy_the_trace_record_to_individual_mfns.patch 23407-xentrace_allocate_non-contiguous_per-cpu_trace_buffers.patch 23643-xentrace_Allow_tracing_to_be_enabled_at_boot.patch 23719-xentrace_update___trace_var_comment.patch Remove old patches: xen-unstable.xentrace.dynamic_tbuf.patch xen-unstable.xentrace.empty_t_info_pages.patch xen-unstable.xentrace.verbose.patch xen-unstable.xentrace.no_gdprintk.patch xen-unstable.xentrace.comments.patch xen-unstable.xentrace.printk_prefix.patch xen-unstable.xentrace.remove_debug_printk.patch xen-unstable.xentrace.t_info_pages-formula.patch xen-unstable.xentrace.register_cpu_notifier-boot_time.patch xen-unstable.xentrace.t_info_page-overflow.patch xen-unstable.xentrace.t_info_first_offset.patch xen-unstable.xentrace.data_size__read_mostly.patch xen-unstable.xentrace.__insert_record-dst-type.patch- Upstream patches from Jan 24116-x86-continuation-cancel.patch 24123-x86-cpuidle-quiesce.patch 24124-x86-microcode-amd-quiesce.patch 24137-revert-23666.patch 24xxx-shadow-pgt-dying-op-performance.patch- bnc#722738 - xm cpupool-create errors out xen-cpupool-xl-config-format.patch- Fix broken build when building docs 23819-make-docs.patch- bnc#720054 - Prevent vif-bridge from adding user-created tap interfaces to a bridge 2XXXX-vif-bridge.patch- bnc#713503 - DOM0 filesystem commit 23752-x86-shared-IRQ-vector-maps.patch 23754-AMD-perdev-vector-map.patch- fate#310510 - fix xenpaging This change reverses the task of xenpaging. Before this change a fixed number of pages was paged out. With this change the guest will not have access to more than the given number of pages at the same time. The xenpaging= config option is replaced by actmem= A new xm mem-swap-target is added. The xenpaging binary is moved to /usr/lib/xen/bin/ xenpaging.HVMCOPY_gfn_paged_out.patch xenpaging.XEN_PAGING_DIR.patch xenpaging.add_evict_pages.patch xenpaging.bitmap_clear.patch xenpaging.cmdline-interface.patch xenpaging.encapsulate_domain_info.patch xenpaging.file_op-return-code.patch xenpaging.guest-memusage.patch xenpaging.install-to-libexec.patch xenpaging.low_target_policy_nomru.patch xenpaging.main-loop-exit-handling.patch xenpaging.misleading-comment.patch xenpaging.page_in-munmap-size.patch xenpaging.print-gfn.patch xenpaging.record-numer-paged-out-pages.patch xenpaging.reset-uncomsumed.patch xenpaging.stale-comments.patch xenpaging.target-tot_pages.patch xenpaging.use-PERROR.patch xenpaging.watch-target-tot_pages.patch xenpaging.watch_event-DPRINTF.patch xenpaging.xc_interface_open-comment.patch- xen.spec: update filelist package /usr/lib*/xen with wildcard to pickup new files remove duplicate /usr/sbin/xen-list from filelist- bnc#725169 - xen-4.0.2_21511_03-0.5.3: bootup hangs 23993-x86-microcode-amd-fix-23871.patch- Update to Xen 4.1.2 FCS c/s 23174- bnc#720054 - Fix syntax error introduced during recent adjustment of Xen's tap udev rule. Updated udev-rules.patch- fate#310510 - fix xenpaging Merge paging related fixes from xen-unstable: 23506-x86_Disable_set_gpfn_from_mfn_until_m2p_table_is_allocated..patch 23507-xenpaging_update_machine_to_phys_mapping_during_page_deallocation.patch 23509-x86_32_Fix_build_Define_machine_to_phys_mapping_valid.patch 23562-xenpaging_remove_unused_spinlock_in_pager.patch 23576-x86_show_page_walk_also_for_early_page_faults.patch 23577-tools_merge_several_bitop_functions_into_xc_bitops.h.patch 23578-xenpaging_add_xs_handle_to_struct_xenpaging.patch 23579-xenpaging_drop_xc.c_remove_ASSERT.patch 23580-xenpaging_drop_xc.c_remove_xc_platform_info_t.patch 23581-xenpaging_drop_xc.c_remove_xc_wait_for_event.patch 23582-xenpaging_drop_xc.c_move_xc_mem_paging_flush_ioemu_cache.patch 23583-xenpaging_drop_xc.c_move_xc_wait_for_event_or_timeout.patch 23584-xenpaging_drop_xc.c_remove_xc_files.patch 23585-xenpaging_correct_dropping_of_pages_to_avoid_full_ring_buffer.patch 23586-xenpaging_do_not_bounce_p2mt_back_to_the_hypervisor.patch 23587-xenpaging_remove_srand_call.patch 23588-xenpaging_remove_return_values_from_functions_that_can_not_fail.patch 23589-xenpaging_catch_xc_mem_paging_resume_errors.patch 23590-xenpaging_remove_local_domain_id_variable.patch 23591-xenpaging_move_num_pages_into_xenpaging_struct.patch 23592-xenpaging_start_paging_in_the_middle_of_gfn_range.patch 23593-xenpaging_pass_integer_to_xenpaging_populate_page.patch 23594-xenpaging_add_helper_function_for_unlinking_pagefile.patch 23595-xenpaging_add_watch_thread_to_catch_guest_shutdown.patch 23596-xenpaging_implement_stopping_of_pager_by_sending_SIGTERM-SIGINT.patch 23597-xenpaging_remove_private_mem_event.h.patch 23599-tools_fix_build_after_recent_xenpaging_changes.patch 23817-mem_event_add_ref_counting_for_free_requestslots.patch 23818-mem_event_use_mem_event_mark_and_pause_in_mem_event_check_ring.patch 23827-xenpaging_use_batch_of_pages_during_final_page-in.patch 23841-mem_event_pass_mem_event_domain_pointer_to_mem_event_functions.patch 23842-mem_event_use_different_ringbuffers_for_share_paging_and_access.patch 23874-xenpaging_track_number_of_paged_pages_in_struct_domain.patch 23904-xenpaging_use_p2m-get_entry_in_p2m_mem_paging_functions.patch 23905-xenpaging_fix_locking_in_p2m_mem_paging_functions.patch 23906-xenpaging_remove_confusing_comment_from_p2m_mem_paging_populate.patch 23908-p2m_query-modify_p2mt_with_p2m_lock_held.patch 23943-xenpaging_clear_page_content_after_evict.patch 23953-xenpaging_handle_evict_failures.patch 23978-xenpaging_check_p2mt_in_p2m_mem_paging_functions.patch 23979-xenpaging_document_p2m_mem_paging_functions.patch 23980-xenpaging_disallow_paging_in_a_PoD_guest.patch Remove obsolete patches: x86-show-page-walk-early.patch xenpaging.23817-mem_event_check_ring.patch xenpaging.catch-xc_mem_paging_resume-error.patch xenpaging.guest_remove_page.slow_path.patch xenpaging.mem_event-no-p2mt.patch xenpaging.no-srand.patch xenpaging.return-void.patch xenpaging.xenpaging_populate_page-gfn.patch- xen.spec: use changeset number as patch number for upstream patches- do not use runlevel 4 in init scripts, it makes it impossible to "insserv xend" on 12.1- Upstream patches from Jan 23955-x86-pv-cpuid-xsave.patch 23957-cpufreq-error-paths.patch- Upstream patches from Jan 23933-pt-bus2bridge-update.patch 23726-x86-intel-flexmigration-v2.patch 23925-x86-AMD-ARAT-Fam12.patch 23246-x86-xsave-enable.patch 23897-x86-mce-offline-again.patch- Update to Xen 4.1.2_rc3 c/s 23171- bnc#720054 - Changed /etc/udev/rules.d/40-xen.rules to not run Xen's vif-bridge script when not running Xen. This is not a solution to the bug but an improvement in the rules regardless. Updated udev-rules.patch- Upstream patches from Jan 23868-vtd-RMRR-validation.patch 23871-x86-microcode-amd-silent.patch 23898-cc-option-grep.patch- Add pciback init script and sysconf file, giving users a simple mechanism to configure pciback. init.pciback sysconfig.pciback- update scripts to use xl -f, or xm if xend is running: xen-updown.sh, init.xendomains, xmclone.sh- bnc#694863 - kexec fails in xen xenstored: allow guest to shutdown all its watches/transactions xenstored.XS_RESET_WATCHES.patch- Upstream patches from Jan 23843-scheduler-switch.patch 23846-x86-TSC-check.patch 23848-vmx-conditional-off.patch 23853-x86-pv-cpuid-xsave.patch- fate#310510 - fix xenpaging mem_event: add ref counting for free requestslots xenpaging.23817-mem_event_check_ring.patch- bnc#717650 - Unable to start VM - Update to Xen 4.1.2_rc2 c/s 23152- bnc#716695 - domUs using tap devices will not start updated multi-xvdp.patch- Upstream patches from Jan 23803-intel-pmu-models.patch 23800-x86_64-guest-addr-range.patch 23795-intel-ich10-quirk.patch 23804-x86-IPI-counts.patch- bnc#706106 - Inconsistent reporting of VM names during migration xend-migration-domname-fix.patch- bnc#712823 - L3:Xen guest does not start reliable when rebooted xend-vcpu-affinity-fix.patch- Upstream patches from Jan 23725-pci-add-device.patch 23762-iommu-fault-bm-off.patch 23763-pci-multi-seg-x2apic-vtd-no-crash.patch 23765-x86-irq-vector-leak.patch 23766-x86-msi-vf-bars.patch 23771-x86-ioapic-clear-pin.patch 23772-x86-trampoline.patch 23774-x86_64-EFI-EDD.patch 23776-x86-kexec-hpet-legacy-bcast-disable.patch 23781-pm-wide-ACPI-ids.patch 23782-x86-ioapic-clear-irr.patch 23783-ACPI-set-_PDC-bits.patch- Include gcc46 only when its available (>11.4 && >sles11sp1)- bnc#711943 - [xl] Fail to create multi-guests with NIC assigned 23685-libxl-segfault-fix.patch- libxenlight and legacy xend toolstack should not be used together. If xend is running, print a warning and exit xl. Add a '-f' (force) option to xl to override this behavior. disable-xl-when-using-xend.patch bnc#707664- Upstream patches from Jan 23732-sedf.patch 23735-guest-dom0-cap.patch 23746-vtd-cleanup-timers.patch 23747-mmcfg-base-address.patch 23749-mmcfg-reservation.patch- bnc#704160 - crm resource migrate fails with xen machines update snapshot-xend.patch - bnc#706574 - xm console DomUName hang after "xm save/restore" of PVM on the latest Xen xend-console-port-restore.patch- update xencommons script to run only when needed xencommons-proc-xen.patch- Upstream patches from Jan 23726-x86-intel-flexmigration.patch 23706-fix-20892.patch 23723-x86-CMOS-lock.patch 23676-x86_64-image-map-bounds.patch 23724-x86-smpboot-x2apic.patch- hotplug.losetup.patch correct dev:inode detection, stat returns major:minor without leading zeros, while losetup -a includes trailing zeros- fate#310635: xen npiv multipath support update block-npiv* scripts for testing- Fixes for EFI support x86-EFI-discard-comment.patch- fate#309894: Xen needs to correctly understand family 15h CPU topology - fate#311376: EFI support in SP2 - fate#311529: Native UEFI booting under Xen (installation) 23074-pfn.h.patch 23571-vtd-fault-verbosity.patch 23574-x86-dom0-compressed-ELF.patch 23575-x86-DMI.patch 23610-x86-topology-info.patch 23611-amd-fam15-topology.patch 23613-EFI-headers.patch 23614-x86_64-EFI-boot.patch 23615-x86_64-EFI-runtime.patch 23616-x86_64-EFI-MPS.patch- Mark xen-scsi.ko supported (bnc#582265, fate#309459).- fate#310308: Hypervisor assisted watchdog driver ioemu-watchdog-support.patch ioemu-watchdog-linkage.patch ioemu-watchdog-ib700-timer.patch tools-watchdog-support.patch- bnc#702025 - VUL-0: xen: VT-d (PCI passthrough) MSI trap injection (CVE-2011-1898) Fixed in Xen version 4.1.1- fate#310956: Support Direct Kernel Boot for FV guests kernel-boot-hvm.patch- fate#310316: Support change vnc password while vm is running change-vnc-passwd.patch - fate#310325: Support get domU console log from Dom0 log-guest-console.patch- fate#311487: remove modprobe.conf files for autoloading of Xen and Hyper-V drivers xen.sles11sp1.fate311487.xen_platform_pci.dmistring.patch add dmi modalias to xen-platform-pci.ko- fate#308532: [NONCODE] Remove XEN 32-bit Hypervisor Modify ExclusiveArch in xen.spec to build only x86_64- fate#309900 - Add Xen support for SVM Decode Assist in AMD family 15h - fate#309902 - Add Xen support for AMD family 12h processors - fate#309903 - Add Xen support for AMD family 14h processors - fate#309906 - Add Xen support for performance event counters in AMD family 15h- fate#309893: Add Xen support for AMD family 15h processors - fate#309901: Add Xen support for SVM TSC scaling in AMD family 15h - fate#311951: Ivy Bridge: XEN support for Supervisor Mode Execution Protection (SMEP) 23437-amd-fam15-TSC-scaling.patch 23462-libxc-cpu-feature.patch 23481-x86-SMEP.patch 23504-x86-SMEP-hvm.patch 23505-x86-cpu-add-arg-check.patch 23508-vmx-proc-based-ctls-probe.patch 23510-hvm-cpuid-DRNG.patch 23511-amd-fam15-no-flush-for-C3.patch 23516-cpuid-ERMS.patch 23538-hvm-pio-emul-no-host-crash.patch 23539-hvm-cpuid-FSGSBASE.patch 23543-x86_64-maddr_to_virt-assertion.patch 23546-fucomip.patch- Fix libxc reentrancy issues 23383-libxc-rm-static-vars.patch- fate#310957 - Update to Xen 4.1.1 FCS c/s 23079- fate#311000 - Extend Xen domain lock framework to support more alternative xend-domain-lock-sfex.patch- fate#311371 - Enhance yast to configure live migration for Xen and KVM add firewall service file for xen-tools- Add man page for xen-list utility updated xen-utils-0.1.tar.bz2- Upstream patches from Jan 23233-hvm-cr-access.patch 23234-svm-decode-assist-base.patch 23235-svm-decode-assist-crs.patch 23236-svm-decode-assist-invlpg.patch 23238-svm-decode-assist-insn-fetch.patch 23303-cpufreq-misc.patch 23304-amd-oprofile-strings.patch 23305-amd-fam15-xenoprof.patch 23306-amd-fam15-vpmu.patch 23334-amd-fam12+14-vpmu.patch 23338-vtd-force-intremap.patch- fate#310957 - Update to Xen 4.1.1-rc1 c/s 23064- xentrace: dynamic tracebuffer allocation xen-unstable.xentrace.dynamic_tbuf.patch xen-unstable.xentrace.empty_t_info_pages.patch xen-unstable.xentrace.verbose.patch xen-unstable.xentrace.no_gdprintk.patch xen-unstable.xentrace.comments.patch xen-unstable.xentrace.printk_prefix.patch xen-unstable.xentrace.remove_debug_printk.patch xen-unstable.xentrace.t_info_pages-formula.patch xen-unstable.xentrace.register_cpu_notifier-boot_time.patch xen-unstable.xentrace.t_info_page-overflow.patch xen-unstable.xentrace.t_info_first_offset.patch xen-unstable.xentrace.data_size__read_mostly.patch xen-unstable.xentrace.__insert_record-dst-type.patch- fate#310510 - fix xenpaging update xenpaging patches for xen 4.1 xenpaging.guest_remove_page.slow_path.patch xenpaging.mem_event-no-p2mt.patch xenpaging.no-srand.patch xenpaging.return-void.patch xenpaging.catch-xc_mem_paging_resume-error.patch xenpaging.xenpaging_populate_page-gfn.patch xenpaging.autostart.patch- bnc#670465 - When connecting to Xen guest through vncviewer mouse tracking is off. - Upstream patch 23298-hvmop-get-mem-type.patch replaces xen.sles11sp1.bug684297.HVMOP_get_mem_type.patch - Upstream patches from Jan 23333-hvm-32bit-compat-hypercalls.patch 23337-vtd-malicious-msi-filter.patch 23338-vtd-force-intremap.patch (CVE-2011-1898) 23341-x86-ioapic-write-entry.patch 23343-vtd-error-path-leaks.patch- bnc#684305 - on_crash is being ignored with kdump now working in HVM xend-config-enable-dump-comment.patch- disable xend's logrotation for xend.log, use included logrotate.conf- bnc#684297 - HVM taking too long to dump vmcore xen.sles11sp1.bug684297.HVMOP_get_mem_type.patch new hvm_op hyper call option xen.sles11sp1.bug684297.xen_oldmem_pfn_is_ram.patch Use new Xen HVMOP_get_mem_type hvmop hypercall option and new Linux kernel register_oldmem_pfn_is_ram interface. (depends on two kernel-source changes)- Update to Xen 4.1.1-rc1-pre c/s 23051- Numerous cleanups when compiling with the unused-but-set-variable flag enabled and warnings equal to errors. xen-warnings-unused.diff- Add a 'long' option to xen-list utility Updated xen-utils-0.1.tar.bz2- bnc#691256 - move modprobe of xen backend modules from xend to xencommons initscript tmp-initscript-modprobe.patch- bnc#691738 - Xen does not find device create with npiv block xen-qemu-iscsi-fix.patch- Upstream patches from Jan 22998-x86-get_page_from_l1e-retcode.patch 22999-x86-mod_l1_entry-retcode.patch 23000-x86-mod_l2_entry-retcode.patch 23096-x86-hpet-no-cpumask_lock.patch 23099-x86-rwlock-scalability.patch 23103-x86-pirq-guest-eoi-check.patch 23127-vtd-bios-settings.patch 23153-x86-amd-clear-DramModEn.patch 23154-x86-amd-iorr-no-rdwr.patch 23199-amd-iommu-unmapped-intr-fault.patch 23200-amd-iommu-intremap-sync.patch 23228-x86-conditional-write_tsc.patch- bnc#691238 - L3: question on behaviour change xm list snapshot-xend.patch- update xenalyze to revision 98 * Unify setting of vcpu data type * Unify record size checks * Fix cr3_switch not to access hvm struct before it's initialized - add xenalyze.gcc46.patch to fix unused-but-set-variable errors- bnc#688473 - VUL-0: potential buffer overflow in tools cve-2011-1583-4.0.patch- hotplug.losetup.patch correct dev:inode detection and use variable expansion- bnc#623680 - xen kernel freezes during boot when processor module is loaded 23228-x86-conditional-write_tsc.patch - bnc#680824 - dom0 can't recognize boot disk when IOMMU is enabled 23200-amd-iommu-intremap-sync.patch - Upstream patches from Jan 23127-vtd-bios-settings.patch 23153-x86-amd-clear-DramModEn.patch 23154-x86-amd-iorr-no-rdwr.patch 23199-amd-iommu-unmapped-intr-fault.patch- bnc#685189: update vif-route-ifup.patch to use correct variable after upstream commit 22910:d4bc41a8cecb- bnc#688519: correct indention in xend-domain-lock.patch- bnc#687981 - L3: mistyping model type when defining VIF crashes VM xend-validate-nic-model.patch- bnc#685338: Fix porting of xend-domain-lock.patch- update scripts to use xl instead of xm: xen-updown.sh, init.xendomains, xmclone.sh- disable xend in openSuSE > 11.4 the xl command is the replacement for the xm command- mark runlevel scripts as config to preserve local changes by admin or dev during package update- enable xencommons runlevel script during upgrade if xend was already enabled- call /sbin/ldconfig directly in xen-libs post install scripts- Upstream patches from Jan 23103-x86-pirq-guest-eoi-check.patch 23030-x86-hpet-init.patch 23061-amd-iommu-resume.patch 23127-vtd-bios-settings.patch- add baselibs.conf as libvirt uses 32bit libraries- Remus support is enabled for now.- Enable support for kernel decompression for gzip, bzip2, and LZMA so that kernels compressed with any of these methods can be launched- Update to Xen 4.1 FCS- fix xentrace.dynamic_sized_tbuf.patch the default case did not work, correct size calculation- Update to c/s 23010 Xen 4.1 rc8- use _smp_mflags instead of jobs, jobs is not expanded everywhere- bnc#681302 - xm create -x returns "ImportError: No module named ext" xm-create-xflag.patch- bnc#675817 - Kernel panic when creating HVM guests on AMD platforms with XSAVE 22462-x86-xsave-init-common.patch- bnc#679344 - Xen: multi-vCPU pv guest may crash host 23034-x86-arch_set_info_guest-DoS.patch - bnc#678871 - dom0 hangs long time when starting hvm guests with memory >= 64GB 22780-pod-preempt.patch - bnc#675363 - Random lockups with kernel-xen. Possibly graphics related 22997-x86-map_pages_to_xen-check.patch - Upstream patches from Jan 22949-x86-nmi-pci-serr.patch 22992-x86-fiop-m32i.patch 22996-x86-alloc_xen_pagetable-no-BUG.patch 23020-x86-cpuidle-ordering.patch 23039-csched-constrain-cpu.patch- Fix xen-utils to cope with xen-unstable c/s 21483- bnc#678229 - restore of sles HVM fails 22873-svm-sr-32bit-sysenter-msrs.patch- xz-devel is available since 11.2, make it optional for SLES11SP1- Fix /vm/uuid xenstore leak on tapdisk2 device cleanup 22499-xen-hotplug-cleanup.patch- Upstream patches from Jan 22872-amd-iommu-pci-reattach.patch 22879-hvm-no-self-set-mem-type.patch 22899-x86-tighten-msr-permissions.patch 22915-x86-hpet-msi-s3.patch 22947-amd-k8-mce-init-all-msrs.patch- bnc#672833 - xen-tools bug causing problems with Ubuntu 10.10 under Xen 4. 22238-pygrub-grub2-fix.patch- bnc#665610 - xm console > 1 to same VM messes up both consoles Upstream rejected due to portability concern, see http://lists.xensource.com/archives/html/xen-devel/2011-02/msg00942.html xenconsole-no-multiple-connections.patch- Enable support for kernel decompression for gzip, bzip2, and LZMA so that kernels compressed with any of these methods can be launched.- bnc#651822 - xm snapshot-xxx scripts lead to an XP SP3 HVM domU to chkdsk Make sure we only apply the snapshot once, and the changes made after snapshot-apply hit the disk.- Update to Xen 4.1.0 c/s 22861- bnc#658569 - SLES 11 SP1 dom0 iptables gives lots of physdev messages 22385-vif-common.patch- update xenalyze, more 64bit fixes- allocate xentrace buffer metadata based on requested tbuf_size xentrace.dynamic_sized_tbuf.patch- fate#310510 - fix xenpaging xenpaging.runtime_mru_size.patch - specify policy mru size at runtime xenpaging.no_domain_id.patch - reduce memory usage in pager- bnc#625394 - set vif mtu from bridge mtu if kernel supports it vif-bridge.mtu.patch- fate#310510 - fix xenpaging xenpaging.autostart_delay.patch - decouple create/destroycreateXenPaging from _create/_removeDevices - change xenpaging variable from int to str - init xenpaging variable to 0 if xenpaging is not in config file to avoid string None coming from sxp file- Update to Xen 4.0.2 rc2-pre, changeset 21443- bnc#633573 - System fail to boot after running several warm reboot tests 22749-vtd-workarounds.patch - Upstream patches from Jan 22744-ept-pod-locking.patch 22777-vtd-ats-fixes.patch 22781-pod-hap-logdirty.patch 22782-x86-emul-smsw.patch 22789-i386-no-x2apic.patch 22790-svm-resume-migrate-pirqs.patch 22816-x86-pirq-drop-priv-check.patch- Don't pass the deprecataed extid parameter to xc.hvm_build- bnc#658704 - SLES11 SP1 Xen boot panic in x2apic mode 22707-x2apic-preenabled-check.patch - bnc#641419 - L3: Xen: qemu-dm reports "xc_map_foreign_batch: mmap failed: Cannot allocate memory" 7434-qemu-rlimit-as.patch - Additional or upstream patches from Jan 22693-fam10-mmio-conf-base-protect.patch 22694-x86_64-no-weak.patch 22708-xenctx-misc.patch 21432-4.0-cpu-boot-failure.patch 22645-amd-flush-filter.patch qemu-fix-7433.patch- Maintain compatibility with the extid flag even though it is deprecated for both legacy and sxp config files. hv_extid_compatibility.patch- bnc#649209-improve suspend eventchn lock suspend_evtchn_lock.patch- Removed the hyper-v shim patches in favor of using the upstream version.- bnc#641419 - L3: Xen: qemu-dm reports "xc_map_foreign_batch: mmap failed: Cannot allocate memory" qemu-rlimit-as.patch- Upstream c/s 7433 to replace qemu_altgr_more.patch 7433-qemu-altgr.patch- bnc#661931 - Fix fd leak in xenstore library 21344-4.0-testing-xenstore-fd-leak.patch- bnc#656369 - g5plus: sles11sp1 xen crash with 8 socket x2apic preenabled 21989-x2apic-resume.patch 22475-x2apic-cleanup.patch 22535-x2apic-preenabled.patch - bnc#658163 - maintenance release - Nehalem system cannot boot into xen with maintenance release installed 22504-iommu-dom0-holes.patch 22506-x86-iommu-dom0-estimate.patch - bnc#658704 - SLES11 SP1 Xen boot panic in x2apic mode 21810-x2apic-acpi.patch - Upstream patches from Jan 22470-vlapic-tick-loss.patch 22484-vlapic-tmcct-periodic.patch 22526-ept-access-once.patch 22533-x86-32bit-apicid.patch 22534-x86-max-local-apic.patch 22538-keyhandler-relax.patch 22540-32on64-hypercall-debug.patch 22549-vtd-map-page-leak.patch 22574-ept-skip-validation.patch 22632-vtd-print-entries.patch- bnc#661298 - maintenance release candidate - Windows VMs reboot too fast, triggering failsafe xen-minimum-restart-time.patch- bnc#659070 - Fail to input '|' in en-us keyboard qemu_altgr_more.patch- bnc#659466 - XEN drbd block device type not working on SLES 11 SP1 20158-revert.patch- Revert changes made to snapshot-xend.patch and snapshot-ioemu-restore.patch made on 2010-11-19. The changes were intended to fix bnc#651822, but testing revealed additional changes were needed to completely resolve the bug. bnc#651822 will be fixed in a subsequent maintenance release.- bnc#654543 - PV guest won't unplug the IDE disk created by qemu-dm a dirty hack, only add the device to drives_table[] if we are FV domU, that will be unplugged anyway if a PV driver is loaded later. ioemu-disable-emulated-ide-if-pv.patch- Upstream patch to replace xenfb_32bpp.patch 7426-xenfb-depth.patch- bnc#651822 make sure we only apply the snapshot once, and the changes made after snapshot-apply hit the disk. snapshot-xend.patch snapshot-without-pv-fix.patch- fate#310510 - fix xenpaging xenpaging.HVMCOPY_gfn_paged_out.patch - remove incorrect and unneeded cleanup from do_memory_op subfunctions add mainline tag to merged patches- bnc#613584 - If available, use kpartx '-f' option in domUloader- bnc#659872 - xend: Do no release domain lock on checkpoint operation.- Upstream patches from Jan 22431-p2m-remove-bug-check.patch 22448-x86_64-gdt-ldt-fault-filter.patch 22466-x86-sis-apic-bug.patch 22451-hvm-cap-clobber.patch 22388-x2apic-panic.patch 22452-x86-irq-migrate-directed-eoi.patch- bnc#658163 - maintenance release - Nehalem system cannot boot into xen with maintenance release installed iommu-dom0-holes.patch x86-iommu-dom0-estimate.patch- bnc#659085 - physical host is rebooted with unknown reason Regression: Remove the patch 22071-ept-get-entry-lock.patch- Removed 7410-qemu-alt-gr.patch and altgr_2.patch. It causes a regression (see bnc#659070)- make stubdom build optional- pass -j N to stubdom build- add xenalzye from http://xenbits.xensource.com/ext/xenalyze.hg- hotplug-block-losetup-a.patch allow hardlinked blockdevices - fate#310510 - fix xenpaging xenpaging.paging_prep_enomem.patch - retry page-in if guest is temporary out-of-memory xenpaging.print-arguments.patch - print arguments passed to xenpaging xenpaging.machine_to_phys_mapping.patch - invalidate array during page deallocation xenpaging.autostart_delay.patch - fold xenpaging.enabled.patch into this patch - set xenpaging_delay to 0.0 to start xenpaging right away- bnc#654591 - SLES11 SP0->Sp1 regression? (Xen, HVMs, NPIV) Fixed xen-qemu-iscsi-fix.patch- blktap2 patch - fix problem that blktap2 device info not cleared when block-attach fail. blktap2.patch- bnc#655438 - Using performance counter in domU on Nehalem cpus 22417-vpmu-nehalem.patch - Upstream patches from Jan 22389-amd-iommu-decls.patch 22416-acpi-check-mwait.patch 22431-p2m-remove-bug-check.patch- bnc#656245 - VUL-1: hypervisor: application or kernel in any pv Xen domain can crash Xen x86_64-gdt-ldt-fault-filter.patch- bnc#654050 - Python: a crasher bug in pyexpat - upstream patch needs backporting 22235-lxml-validator.patch- bnc#628729 - Add a small, fast alternative to 'xm list' for enumerating active domains. xen-list is a C program that uses libxenstore and libxenctl directly, bypassing the python toolstack. xen-utils-0.1.tar.bz2- bnc#628729 - Add a small, fast alternative to 'xm list' for enumerating active domains. xen-list is a C program that uses libxenstore and libxenctl directly, bypassing the python toolstack. xen-utils-0.1.tar.bz2- bnc#651822 - xm snapshot-xxx scripts lead to an XP SP3 HVM domU to chkdsk snapshot-xend.patch snapshot-ioemu-restore.patch- bnc#651957 - Xen: vm-install failed to start xenpaging.enabled.patch- fate#310510 - fix xenpaging xenpaging.signal_handling.patch - unlink pagefile in signal handler- Upstream patch for python 2.7 compatibility 22045-python27-compat.patch- bnc#641144 - FV Xen VM running windows or linux cannot write to virtual floppy drive bdrv_default_rwflag.patch- fate#310510 - fix xenpaging xenpaging.optimize_p2m_mem_paging_populate.patch xenpaging.HVMCOPY_gfn_paged_out.patch- bnc#649864 - automatic numa cpu placement of xen conflicts with cpupools 22326-cpu-pools-numa-placement.patch- fate#310510 - fix xenpaging xenpaging.populate_only_if_paged.patch - revert logic, populate needs to happen unconditionally xenpaging.p2m_mem_paging_populate_if_p2m_ram_paged.patch - invalidate current mfn only if gfn is not in flight or done xenpaging.mem_event_check_ring-free_requests.patch - print info only if 1 instead of 2 slots are free xenpaging.guest_remove_page.patch - check mfn before usage in resume function xenpaging.machine_to_phys_mapping.patch - check mfn before usage in resume function- bnc#552115 - Remove target discovery in block-iscsi modified block-iscsi script- bnc#649277 - Fix pci passthru in xend interface used by libvirt 22369-xend-pci-passthru-fix.patch- bnc#642078 - xm snapshot-create causes qemu-dm to SEGV snapshot-without-pv-fix.patch- fate#310510 - fix xenpaging xenpaging.num_pages_equal_max_pages.patch- bnc#647681 - L3: Passthrough of certain PCI device broken after SLES 11 to SP1 upgrade - bnc#650871 - Regression in Xen PCI Passthrough 22348-vtd-check-secbus-devfn.patch - Upstream patches from Jan 22223-vtd-workarounds.patch (bnc#652935) 22231-x86-pv-ucode-msr-intel.patch 22232-x86-64-lahf-lm-bios-workaround.patch 22280-kexec.patch 22337-vtd-scan-single-func.patch- bnc#497149 - SLES11 64bit Xen - SLES11 64bit HVM guest has corrupt text console stdvga-cache.patch- fate#310510 - fix xenpaging xenpaging.page_already_populated.patch xenpaging.notify_policy_only_once.patch xenpaging.guest_remove_page.patch xenpaging.machine_to_phys_mapping.patch remove xenpaging.memory_op.patch, retry loops are not needed- bnc#474789 - xen-tools 3.3 rpm misses pv-grub - PV-GRUB replaces PyGrub to boot domU images safely: it runs the regular grub inside the created domain itself and uses regular domU facilities to read the disk / fetch files from network etc.; it eventually loads the PV kernel and chain-boots it.- fate#310510 - fix xenpaging xenpaging.doc.patch - add /var/lib/xen/xenpaging directory- Some cleanup in the APIC handling code in the HyperV shim. hv_apic.patch- fate#310510 - fix xenpaging xenpaging.memory_op.patch, correct delay handling in retry loop- bnc#640370 - VM graphic console in VNC is corrupted xenfb_32bpp.patch- fate#310510 - fix xenpaging xenpaging.autostart_delay.patch delay start of xenpaging 7 seconds for smooth BIOS startup- fate#310510 - fix xenpaging xenpaging.tools_xenpaging_cleanup.patch- fate#310510 - fix xenpaging xenpaging.mem_event_check_ring-free_requests.patch- install /etc/xen/examples/xentrace_formats.txt to get human readable tracedata if xenalyze is not used- fate#310510 - fix xenpaging xenpaging.autostart_delay.patch xenpaging.blacklist.patch xenpaging.MRU_SIZE.patch remove xenpaging.hacks.patch, realmode works- Upstream patches from Jan including fixes for the following bugs bnc#583568 - Xen kernel is not booting bnc#615206 - Xen kernel fails to boot with IO-APIC problem bnc#640773 - Xen kernel crashing right after grub bnc#643477 - issues with PCI hotplug/hotunplug to Xen driver domain 22222-x86-timer-extint.patch 22214-x86-msr-misc-enable.patch 22213-x86-xsave-cpuid-check.patch 22194-tmem-check-pv-mfn.patch 22177-i386-irq-safe-map_domain_page.patch 22175-x86-irq-enter-exit.patch 22174-x86-pmtimer-accuracy.patch 22160-Intel-C6-EOI.patch 22159-notify-evtchn-dying.patch 22157-x86-debug-key-i.patch- fate#310510 - fix xenpaging xenpaging.signal_handling.patch xenpaging.autostart.patch xenpaging.hacks.patch- rename xenpaging.XENMEM_decrease_reservation.patch to xenpaging.memory_op.patch- bnc#632956 - fix VNC altgr-insert behavior 7410-qemu-alt-gr.patch altgr_2.patch- bnc#618087 - VNC view won't stay connected to fully virtualized Linux Xen VMs modified ioemu-vnc-resize.patch- bnc#639546 - Dom-U deleted after introduction of the parameter "change_home_server False" in the VM configuration change_home_server.patch- bnc#641859 - block-dmmd script does not handle the configuration when only MD is used modified block-dmmd script- fate#310510 - fix xenpaging xenpaging.populate_only_if_paged.patch- bnc#640773 - Xen kernel crashing right after grub 21894-intel-unmask-cpuid.patch - Upstream patch from Jan 22148-serial-irq-dest.patch- bnc#628719 - improve check_device_status to handle HA cases check_device_status.patch- bnc#628719 - multi-xvdp mutli-xvdp.patch- fate#310510 - fix xenpaging xenpaging.XENMEM_decrease_reservation.patch xenpaging.xenpaging_init.patch xenpaging.policy_linear.patch- bnc#632956 - fix VNC altgr-insert behavior 7410-qemu-alt-gr.patch altgr_2.patch- fate#310510 - fix xenpaging xenpaging.pageout_policy.patch xenpaging.xs_daemon_close.patch xenpaging.pagefile.patch xenpaging.mem_paging_tool_qemu_flush_cache.patch xenpaging.get_paged_frame.patch xenpaging.notify_via_xen_event_channel.patch- bnc#636231 - XEN: Unable to disconnect/remove CDROM drive from VM xend-devid-or-name.patch- Upstream patches from Jan 22019-x86-cpuidle-online-check.patch 22051-x86-forced-EOI.patch 22067-x86-irq-domain.patch 22068-vtd-irte-RH-bit.patch 22071-ept-get-entry-lock.patch 22084-x86-xsave-off.patch- bnc#638465 - hypervisor panic in memory handling 22135-heap-lock.patch- Update to Xen 4.0.1. This is a bug fix release.- bnc#635380 - Fix pygrub Grub2 support See update to Xen 4.0.1 for fixes- bnc#628701 - Improve performance when activate/deactivate dmmd devices modified block-dmmd script- bnc#628701 - Fix qemu-dm handling of dmmd devices modified xen-qemu-iscsi-fix.patch- bnc#626262 - Populate-on-demand memory problem on xen with hvm guest 21971-pod-accounting.patch- bnc#584204 - xm usb-list broken usb-list.patch- bnc#625520 - TP-L3: NMI cannot be triggered for xen kernel 21926-x86-pv-NMI-inject.patch- bnc#613529 - TP-L3: kdump kernel hangs when crash was initiated from xen kernel 21886-kexec-shutdown.patch- Upstream Intel patches to improve X2APIC handling. 21716-iommu-alloc.patch 21717-ir-qi.patch 21718-x2apic-logic.patch- bnc#623833 - Error in Xend-API method VM_set_actions_after_crash 21866-xenapi.patch- bnc#625003 - Fix vm config options coredump-{restart,destroy} Added hunk to xm-create-xflag.patch- bnc#605186 - Squelch harmless error messages in block-iscsi- bnc#623438 - Add ability to control SCSI device path scanning in xend 21847-pscsi.patch- Enable the packaging of create.dtd. This is needed for when xm is configured to use xenapi.- bnc#624285 - TP-L3: xen rdtsc emulation reports wrong frequency 21445-x86-tsc-handling-cleanups-v2.patch- bnc#623201 - drbd xvd will fail in new xen4 packages due to wrong popen2 arguments in blkif.py popen2-argument-fix.patch- bnc#620694 - Xen yast vm-install for existing paravirtualized disk fails with UnboundLocalError: local variable 'dev_type' referenced before assignment 21678-xend-mac-fix.patch- bnc#586221 - cannot add DomU with USB host controller defined domu-usb-controller.patch (Chun Yan Liu)- Upstream patches from Jan 21151-trace-bounds-check.patch 21627-cpuidle-wrap.patch 21643-vmx-vpmu-pmc-offset.patch 21682-trace-buffer-range.patch 21683-vtd-kill-timer-conditional.patch 21693-memevent-64bit-only.patch 21695-trace-t_info-readonly.patch 21698-x86-pirq-range-check.patch 21699-p2m-query-for-type-change.patch 21700-32on64-vm86-gpf.patch 21705-trace-printk.patch 21706-trace-security.patch 21712-amd-osvw.patch 21744-x86-cpufreq-range-check.patch 21933-vtd-ioapic-write.patch 21953-msi-enable.patch- bnc#599550 - Xen cannot distinguish the status of 'pause' 21723-get-domu-state.patch- bnc#604611 - Do not store vif device details when vif config contains invalid mac address. 21653-xend-mac-addr.patch- linux pvdrv: generalize location of autoconf.h Fixes error because of missing autoconf.h when building os11.2 Factory.- bnc#609153 - xm migrate localhost -l fails on Windows VMs 21615-dont-save-xen-heap-pages.patch - Upstream fixes from Jan 21446-iommu-graceful-generic-fail.patch 21453-shadow-avoid-remove-all-after-teardown.patch 21456-compat-hvm-addr-check.patch 21492-x86-pirq-unbind.patch 21526-x86-nehalem-cpuid-mask.patch 21620-x86-signed-domain-irq.patch- bnc#612189 - Clear APIC Timer Initial Count Register when masking timer interrupt 21542-amd-erratum-411.patch- bnc#610658 - XEN: PXE boot fails for fully virtualized guests - e1000 virtual nic. (see also bnc#484778) enable_more_nic_pxe.patch- bnc#608191 - /var/adm/fillup-templates/sysconfig.xend from package xen-tools is no valid sysconfig file xend-sysconfig.patch- bnc#608194 - /etc/xen/* config files are not packaged with noreplace- bnc#569744 - SLE HVM guest clock/timezone is incorrect after reboot 21460-xend-timeoffset.patch- bnc#606882 - Allow spaces in vbd path names 21459-block-script.patch- bnc#591799 - The status of Caps Lock is incorrect in domU capslock_enable.patch- Upstream fixes from Jan including a fix for Intel's ATS issue 21435-vmx-retain-global-controls.patch 21406-x86-microcode-quiet.patch 21421-vts-ats-enabling.patch- bnc#607219 - AMD Erratum 383 workaround for Xen 21408-amd-erratum-383.patch- Added modprobe of evtchn to init.xend. The kernel will also need to build evtchn as a module for this to be meaningful.- bnc#603008 - On an 8 Socket Nehalem-EX system, the fix for 593536 causes a hang during network setup. - Upstream patches from Jan. 21360-x86-mce-polling-disabled-init.patch 21372-x86-cross-cpu-wait.patch 21331-svm-vintr-during-nmi.patch 21333-xentrace-t_info-size.patch 21340-vtd-dom0-mapping-latency.patch 21346-x86-platform-timer-wrap.patch 21373-dummy-domain-io-caps.patch- bnc#605182 - /etc/xen/scripts/xen-hotplug-cleanup: line 24: [: !=: unary operator expected 21129-xen-hotplug-cleanup.patch- bnc#599929 - Hot add/remove Kawela NIC device over 500 times will cause guest domain crash passthrough-hotplug-segfault.patch- bnc#603583 - Fix migration of domUs using tapdisk devices 21317-xend-blkif-util-tap2.patch suse-disable-tap2-default.patch- Match upstreams cpu pools switch from domctl to sysctl - Upstream replacements for two of our custom patches (to ease applying further backports) - Fixed dump-exec-state.patch (could previously hang the system, as could - with lower probability - the un-patched implementation)- bnc#593536 - xen hypervisor takes very long to initialize Dom0 on 128 CPUs and 256Gb 21272-x86-dom0-alloc-performance.patch 21266-vmx-disabled-check.patch 21271-x86-cache-flush-global.patch- bnc#558815 - using multiple npiv luns with same wwpn/wwnn broken - bnc#601104 - Xen /etc/xen/scripts/block-npiv script fails when accessing multiple disks using NPIV block-npiv- bnc#595124 - VT-d can not be enabled on 32PAE Xen on Nehalem-EX platform 21234-x86-bad-srat-clear-pxm2node.patch bnc#585371 - kdump fails to load with xen: locate_hole failed 21235-crashkernel-advanced.patch- bnc#588918 - Attaching a U-disk to domain's failed by "xm usb-attach" init.xend- bnc#596442 - Preserve device config on domain start failure xend-preserve-devs.patch- bnc#597770 - insserv reports a loop between xendomains and openais. Remove openais from Should-Start in xendomains script.- bnc#569194 - Tools-side fixes for tapdisk protocol specification blktap-script.patch ioemu-subtype.patch Modified xen-domUloader.diff- Upstream bug fixes from Jan 21089-x86-startup-irq-from-setup-gsi.patch 21109-x86-cpu-hotplug.patch 21150-shadow-race.patch 21160-sysctl-debug-keys.patch- Updated to Xen 4.0.0 FCS, changeset 21091- Change default lock dir (when domain locking is enabled) to /var/lib/xen/images/vm_locks - Support SXP config files in xendomains script- Update to changeset 21087 Xen 4.0.0 RC9.- Update to changeset 21075 Xen 4.0.0 RC8.- bnc#584210 - xm usb-hc-destroy does not remove entry from xend del_usb_xend_entry.patch- Update to changeset 21057 Xen 4.0.0 RC7.-Fix bnc#466899 - numa enabled xen fails to start/create vms adjust_vcpuaffinity_more_cpu.patch- Update to changeset 21022 Xen 4.0.0 RC6.- bnc#586510 - cpupool fixes cpu-pools-update.patch- bnc#582645 - Xen stuck, mptbase driver attempting to reset config request- Update to changeset 20990 Xen 4.0.0 RC5.- bnc#556939 - Improve device map cleanup code in domUloader- bnc# 578910 - xm block-detach does not cleanup xenstore hotplug-cleanup-fix.patch- bnc#579361 - Windows Server 2003 cannot wake up from stand by in sp1 hibernate.patch- fate#308852: XEN CPU Pools cpupools-core.patch cpupools-core-fixup.patch keyhandler-alternative.patch cpu-pools-libxc.patch cpu-pools-python.patch cpu-pools-libxen.patch cpu-pools-xmtest.patch cpu-pools-docs.patch- bnc#558760: Disable scsi devices when PV drivers are loaded.- Update to changeset 20951 Xen 4.0.0 RC4 for sle11-sp1 beta5.- bnc#572146 - SLES11 SP1 beta 2 Xen - BUG: soft lockup - CPU#31 stuck for 61s! [kstop/31:4512] cpuidle-hint-v3.patch- Update to changeset 20900 RC2+ for sle11-sp1 beta4.- bnc#573376 - OS reboot while create DomU with Windows CD- bnc#573881 - /usr/lib64/xen/bin/qemu-dm is a broken link- Update to changeset 20840 RC1+ for sle11-sp1 beta3.- bnc#569581 - SuSEfirewall2 should handle rules. Disable handle_iptable in vif-bridge script vif-bridge-no-iptables.patch- bnc#569577 - /etc/modprove.d/xen_pvdrivers, installed by xen-kmp-default, to ../xen_pvdrivers.conf- bnc#564406 - Make the new PV drivers work with older hosts that do not understand the new PV driver protocol.- Upstream Xen version renamed to 4.0.0 in changeset 20624 & 20625.- fate#307594: HP-MCBS: XEN: support NR_CPUS=256 This is a spec file change (xen.spec)- bnc#555152 - "NAME" column in xentop (SLES11) output limited to 10 characters unlike SLES10 The update to c/s 20572 includes this fix (at c/s 20567).- Modify xen-paths.diff- Merge xend-tap-fix.patch to xen-domUloader.diff remove part of it which accepted by upstream- Load gntdev module in xend init script similar to blkbk, netbk, etc.- Backport dmmd from sles11/xen block-dmmd xen-qemu-iscsi-fix.patch xen.spec- Fix regression when create_vbd for tap xend-tap-fix.patch- Temporarily disable libxl because of libconfig dependency.- fate#302864 domUloader support lvm in disk domUloader.py Note: for test in Beta1, if not good, remove it- fate#302864 domUloader support fs on whole disk domUloader.py- Turn KMPs back on now that kernel side fix is checked in.- fate#304415 VMM: ability to switch networking mode Add vif-route-ifup to handle routed configurations using sysconfig scripts. vif-route-ifup.patch- fate#307540 USB for Xen VMs usb-add.patch- fate#305545 XEN extra descriptive field within xenstore add_des.patch- Update to Xen version 3.5.0 for the following features. fate#304226 XEN: FlexMigration feature of VT-x2 support fate#305004 Add SR-IOV PF and VF drivers to Vt-d enabled Xen fate#306830 T states in Xen controlling by MSR fate#306832 Fix for xen panic on new processors fate#306833 Westmere and Nehalem-EX: Add support for Pause Loop exiting feature for Xen fate#306835 Xen: server virtual power management enhacement fate#306837 VT-d2 - PCI SIG ATS support fate#306872 Xen: Node manager support P/T-states change when Vt-d enable fate#306873 Xen: SMP guest live migration may fail with hap=1 on NHM fate#306875 Westmere: LT-SX (Xen) fate#306891 RAS features for Xen: Add support for Machine Check and CPU/Memory online/offline features fate#307322 1GB page support in Xen fate#307324 Xen IOMMU support- bnc#541945 - xm create -x command does not work in SLES 10 SP2 or SLES 11 xm-create-xflag.patch- Minor enhancement to xen-updown.sh sysconfig hook- Add patch ioemu-bdrv-open-CACHE_WB.patch for install guest on tapdisk very very slow.- Add temporary workaround for race between xend writing and qemu-dm reading from xenstore. The issue is preventing PV domUs from booting as they have no backend console. qemu-retry-be-status.patch - bnc#520234 - npiv does not work with XEN Update block-npiv - bnc#496033 - Support for creating NPIV ports without starting vm block-npiv-common.sh block-npiv-vport Update block-npiv - bnc#500043 - Fix access to NPIV disk from HVM vm Update xen-qemu-iscsi-fix.patch- bnc#513921 - Xen doesn't work get an eror when starting the install processes or starting a pervious installed DomU 20125-xc-parse-tuple-fix.patch- bnc#536176 - Xen panic when using iommu after updating hypervisor 19380-vtd-feature-check.patch- bnc#530959 - virsh autostart doesn't work Fixing this libvirt bug also required fixing xend's op_pincpu method with upstream c/s 19580 19580-xend-pincpu.patch- bnc#534146 - Xen: Fix SRAT check for discontig memory 20120-x86-srat-check-discontig.patch- bnc#491081 - Xen time goes backwards x3950M2 20112-x86-dom0-boot-run-timers.patch- disable module build for ec2 correctly to fix build (at the suse_kernel_module_package macro)- bnc#524071 - implemented workaround for a windows7 bug. hv_win7_eoi_bug.patch- bnc#524180 - xend memory leak resulting in long garbage collector runs 20013-xend-memleak.patch- Upstream bugfixes from Jan. 19896-32on64-arg-xlat.patch 19960-show-page-walk.patch 19945-pae-xen-l2-entries.patch 19953-x86-fsgs-base.patch 19931-gnttblop-preempt.patch 19885-kexec-gdt-switch.patch 19894-shadow-resync-fastpath-race.patch - hvperv shim patches no longer require being applied conditionally- bnc#520234 - npiv does not work with XEN in SLE11 Update block-npiv - bnc#496033 - Support for creating NPIV ports without starting vm block-npiv-common.sh block-npiv-vport Update block-npiv - bnc#500043 - Fix access to NPIV disk from HVM vm Update xen-qemu-iscsi-fix.patch- Don't build the KMPs for the ec2 kernel.- Upstream fixes from Jan Beulich 19606-hvm-x2apic-cpuid.patch 19734-vtd-gcmd-submit.patch 19752-vtd-srtp-sirtp-flush.patch 19753-vtd-reg-write-lock.patch 19764-hvm-domain-lock-leak.patch 19765-hvm-post-restore-vcpu-state.patch 19767-hvm-port80-inhibit.patch 19768-x86-dom0-stack-dump.patch 19770-x86-amd-s3-resume.patch 19801-x86-p2m-2mb-hap-only.patch 19815-vtd-kill-correct-timer.patch - Patch from Jan Beulich to aid in debugging bnc#509911 gnttblop-preempt.patch- bnc#515220 - qemu-img-xen snapshot Segmentation fault qemu-img-snapshot.patch update- bnc#504491 - drop write data when set read only disk in xen config bdrv_open2_fix_flags.patch bdrv_open2_flags_2.patch- Upstream fixes from Jan Beulich. 19474-32on64-S3.patch 19490-log-dirty.patch 19492-sched-timer-non-idle.patch 19493-hvm-io-intercept-count.patch 19505-x86_64-clear-cr1.patch 19519-domctl-deadlock.patch 19523-32on64-restore-p2m.patch 19555-ept-live-migration.patch 19557-amd-iommu-ioapic-remap.patch 19560-x86-flush-tlb-empty-mask.patch 19571-x86-numa-shift.patch 19578-hvm-load-ldt-first.patch 19592-vmx-exit-reason-perfc-size.patch 19595-hvm-set-callback-irq-level.patch 19597-x86-ioport-quirks-BL2xx.patch 19602-vtd-multi-ioapic-remap.patch 19631-x86-frametable-map.patch 19653-hvm-vcpuid-range-checks.patch- bnc#382112 - Caps lock not being passed to vm correctly. capslock_enable.patch- bnc#506833 - Use pidof in xend and xendomains init scripts- bnc#484778 - XEN: PXE boot of FV domU using non-Realtek NIC fails enable_more_nic_pxe.patchcross-migrate.patch - bnc#390961 - cross-migration of a VM causes it to become unresponsive (remains paused after migration)- Patches taken to fix the xenctx tool. The fixed version of this tool is needed to debug bnc#502735. 18962-xc_translate_foreign_address.patch 18963-xenctx.patch 19168-hvm-domctl.patch 19169-remove-declare-bitmap.patch 19170-libxc.patch 19171-xenctx.patch 19450-xc_translate_foreign_address.patch-bnc#485770 - check exsit file for save and snapshot-create xm-save-check-file.patch snapshot-xend.patch-bnc#503782 - Using converted vmdk image does not work ioemu-tapdisk-compat-QEMU_IMG.patch- bnc#503332 - Remove useless qcow tools /usr/sbin/{qcow-create,img2qcow,qcow2raw} from xen-tools package.- bnc#474738 - adding CD drive to VM guest makes it unbootable. parse_boot_disk.patch- bnc#477892 - snapshot windows can't accomplish. snapshot-xend.patch- bnc#495300 - L3: Xen unable to PXE boot Windows based DomU's 18545-hvm-gpxe-rom.patch, 18548-hvm-gpxe-rom.patch- bnc#459836 - Fix rtc_timeoffset when localtime=0 xend-timeoffset.patch- bnc#497440 - xmclone.sh script incorrectly handles networking for SLE11.- bnc#477890 - VM becomes unresponsive after applying snapshot- bnc#494892 - Update xend-domain-lock.patch to flock the lock file.- bnc#439639 - SVVP Test 273 System - Sleep Stress With IO" fails Turned off s3/s4 sleep states for HVM guests.- bnc#468169 - fix domUloader to umount the mounted device mapper target in dom0 when install a sles10 guest with disk = /dev/disk/by_path- bnc#488490 - domUloader can't handle block device names with ':' - bnc#486244 - vms fail to start after reboot when using qcow2- bnc#490835 - VTd errata on Cantiga chipset 19230-vtd-mobile-series4-chipset.patch- bnc#482515 - Missing dependency in xen.spec- Additional upstream bug fix patches from Jan Beulich. 19132-page-list-mfn-links.patch 19134-fold-shadow-page-info.patch 19135-next-shadow-mfn.patch 19136-page-info-rearrange.patch 19156-page-list-simplify.patch 19161-pv-ldt-handling.patch 19162-page-info-no-cpumask.patch 19216-msix-fixmap.patch 19268-page-get-owner.patch 19293-vcpu-migration-delay.patch 19391-vpmu-double-free.patch 19415-vtd-dom0-s3.patch- Imported numerous upstream bug fix patches. 19083-memory-is-conventional-fix.patch 19097-M2P-table-1G-page-mappings.patch 19137-lock-domain-page-list.patch 19140-init-heap-pages-max-order.patch 19167-recover-pat-value-s3-resume.patch 19172-irq-to-vector.patch 19173-pci-passthrough-fix.patch 19176-free-irq-shutdown-fix.patch 19190-pciif-typo-fix.patch 19204-allow-old-images-restore.patch 19232-xend-exception-fix.patch 19239-ioapic-s3-suspend-fix.patch 19240-ioapic-s3-suspend-fix.patch 19242-xenstored-use-after-free-fix.patch 19259-ignore-shutdown-deferrals.patch 19266-19365-event-channel-access-fix.patch 19275-19296-schedular-deadlock-fixes.patch 19276-cpu-selection-allocation-fix.patch 19302-passthrough-pt-irq-time-out.patch 19313-hvmemul-read-msr-fix.patch 19317-vram-tracking-fix.patch 19335-apic-s3-resume-error-fix.patch 19353-amd-migration-fix.patch 19354-amd-migration-fix.patch 19371-in-sync-L1s-writable.patch 19372-2-on-3-shadow-mode-fix.patch 19377-xend-vnclisten.patch 19400-ensure-ltr-execute.patch 19410-virt-to-maddr-fix.patch- bnc#483565 - Fix block-iscsi script. Updated block-iscsi and xen-domUloader.diff- bnc#465814 - Mouse stops responding when wheel is used in Windows VM. mouse-wheel-roll.patch (James Song) - bnc#470704 - save/restore of windows VM throws off the mouse tracking. usb-save-restore.patch (James Song)- bnc#436629 - Use global vnc-listen setting specified in xend configuration file. xend-vnclisten.patch - bnc#482623 - Fix pygrub to append user-supplied 'extra' args to kernel args. 19234_pygrub.patch- bnc#481161 upgrade - sles10sp2 to sles11 upgrade keeps xen-tools-ioemu- Don't load 8139* driver if xen-vnif works [bnc#480164]  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWX4.9.1_08-16.14.9.1_08-16.1   xenhtmlfeaturesfeature-levelling.htmlindex.htmlmigration.htmlsched_credit.htmlsched_credit2.htmlsched_rtds.htmltemplate.htmlhypercallarmindex.htmlindex.htmlx86_32index.htmlx86_64index.htmlindex.htmlmanindex.htmlxen-pci-device-reservations.7.htmlxen-pv-channel.7.htmlxen-tscmode.7.htmlxen-vbd-interface.7.htmlxen-vtpm.7.htmlxen-vtpmmgr.7.htmlxenstore-chmod.1.htmlxenstore-ls.1.htmlxenstore.1.htmlxentop.1.htmlxentrace.8.htmlxentrace_format.1.htmlxl-disk-configuration.5.htmlxl-network-configuration.5.htmlxl-numa-placement.7.htmlxl.1.htmlxl.cfg.5.htmlxl.conf.5.htmlxlcpupool.cfg.5.htmlmiscamd-ucode-container.txtarmbooting.txtdevice-treeacpi.txtbooting.txtguest.txtindex.htmlpassthrough.txtearly-printk.txtindex.htmlpassthrough.txtsilicon-errata.txtblock-scripts.txtconsole.txtcrashdb.txtdistro_mapping.txtdump-core-format.txtgrant-tables.txtindex.htmlkconfig-language.txtkconfig.txtkexec_and_kdump.txtlibxl_memory.txtprintk-formats.txtqemu-backends.txtqemu-deprivilege.txtstubdom.txtvtd-pi.txtvtd.txtvtpm-platforms.txtxen-error-handling.txtxenmon.txtxenpaging.txtxenstore-ring.txtxenstore.txtxsm-flask.txtspecsindex.htmllibxc-migration-stream.htmllibxl-migration-stream.htmlmisccrashdb.txtvtpm-platforms.txtxen-command-line.markdownxenpaging.txtxenstore-paths.markdown/usr/share/doc/packages//usr/share/doc/packages/xen//usr/share/doc/packages/xen/html//usr/share/doc/packages/xen/html/features//usr/share/doc/packages/xen/html/hypercall//usr/share/doc/packages/xen/html/hypercall/arm//usr/share/doc/packages/xen/html/hypercall/x86_32//usr/share/doc/packages/xen/html/hypercall/x86_64//usr/share/doc/packages/xen/html/man//usr/share/doc/packages/xen/html/misc//usr/share/doc/packages/xen/html/misc/arm//usr/share/doc/packages/xen/html/misc/arm/device-tree//usr/share/doc/packages/xen/html/specs//usr/share/doc/packages/xen/misc/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:7797/openSUSE_Leap_42.3_Update/e6f530c816a2d4413ea0a3bcddf7220c-xen.openSUSE_Leap_42.3_Updatecpiolzma5x86_64-suse-linux?] crt:bLLl:vIQ',[> )I4J ͔<٬l.tio֞pk_XZX( _oM[F)4b3X=ﯙ2C85AvX 7 VK#h( DC iHѼ[󲐺nZs3(({xT%~cí6ḳD@q Q &bviHsrb(׾= i-@%wE`jc#i^<#._ 3t.0M]ly j]XWk_iSOh\9*Nx?`rq_ʹ7I7IImE9}&a}rE3=d]l=!GJRf>bLtvٸWt!RT>!x>F~]@l[r򭺕\7IOnuNQ+&km~r咳}=+䝡4_bujXRȅTZ=2Rr@<_6LϘUT ^zU ek OT0Ԋq)=6 }.׼x9ۙg–ϔ$St{| މsXY(w*pp5g&#XW^%GZVnR/*Qb*)d6"(x3@sd~=̊BC0'm=߳6@XeS8E\8-pwQl~ #q"dC7~&Ysll"2x:fwA@W78,VE>% T}`+R0##9Jgcmr-%DRjE(b,2!⡰PːmOo /MJE;/v-8[^A(.պRvBROT.݂zyN4H:×z36@8;zs70l@LΦCIUkɱ #4ص"fX8<ٰo<葿y/r!/Ib7=$ ptW2gy "R|=O0D+"^`Y}nOkmL`N %,G ꂝ"ժ-, %*!y=,y]Hz:򘟒m0Fru#]j] %EXU;udųQ9NaBM;2ZťSFד'̽c0SP7خC,Pغ DiF7 X"l3(z|Ef慴Vpyʐtz7S' 6RH[dὩh&B/V֤f1˲Ӊ ]P\ mXr$ŝy?"<H8q\@(Up<+G͚,}"Y֦fm&+ ,2D][-ut^d2Ϧw֐*J4dZ rDI#sZ)6CXõ8O>(`I Q8X?dnrwW<㾃~Xhj%Ot\Y, eSݩpQ;x5Xy-] r>ְ>xm=doJGР ͅQKm%bëq- jSkvqnB}#_c_,*8D, Nh Ihm5"yI G @ٛ(i?6c |xnۭ"C!zoKZœWɵ0hkwFgYQpˀL)uX㲒rk?K@Rki/o~K^=ۭh(Fc2zb[V1{OrIWkf~ /y{,t$l1hCID-Cg3^RzXRfO~Vd9\)ܤ5Xc1=HY˹ϒ"q_Ta4^|Y9\ ~A{41Cp鏩 g?D7HeAu0]">)YET-/1WXH)_1~^-} \vnŷUkv . dx&>9,Vd*oЇ ]$OCCPx0Cly@l "gh-.[JKcEEIX#˟sT~0E%Ā>9$_P}RsԚ3oTP]v$Ư,ry:FKCQK4C/W'92жඩ+- `&5Ѻ^g0ګQmE#Vv:(d~)7MU.JBǣ湷)#ڴR˒$p&$ǁ6bQ%j {+PQ^@(Y*wj*Κcko0qSjjZ0 d^cF'BR/`;/2 Tx%ZGodN&Gϣ!Y@.w񺘨ƵӠI –xUc# D)T~z`l֪_lgݢk0^ fLϤ.}TΓ̰~Ϩ2{OH]NSC@lPa}dcM#,6Li|;5L&Ë^ o&J&D"S]z/zӜ *ΤE GyU󠇹@ ` %I K27cH˘F5bd)ijNP*pH03+ۈB+e(!DlM/?Lt+8)탗t׳ ȭO42]Ui"[#ϕE )| CWejf)uhxG{eZ߂ϙXݖr)D=<XYP YT5+Xh&ukbf\{3{{e!1I % *֟r/t|$/UD @bW(8ٶ5k'Sɫf,2`89Jr}u2Жn9n|}xɿ]?a̗{]T9.頕ZcZ|K#Hи2}_`o!6l0!jtT;Keimfu#"k䁞GAֹ^-.lŐ36uSf$w^٫`d1qi=J෡;'GFr? zϋG~9 e.K< cukCwdL"cFLX_jQkZj;Le$<Y RKfBεڹ ަ%b'?2Äy]!9:Lޓ\m^/_u&,̶ǻy'M !)F(, Vnm[3iL%|za O$ܿM&{"YQdiT;I'4MQ.M?(<;{ypT]kxAxylE,,ڕ.b( 1EՉiu%Y.?MWU50{mlm j e#R݌[ IGziI`؂Uw;e--W ڳP8FQZtW{)=AC?vU_+UP<~~5{]A8>Uߚw@ dI2H`Z$OZw)lQJ> hvq⡨,[5㛰ReSiE F H?uyݣ )js1l١joraqTP?]qaۘK)]C1:X=&4۽:pu-EV%\VC$ ^A$ȫ(Bp͕ˎ.5;}ŏC,nw?5^[jcr骑D98>q`5M ;sZW_#>zi 8f~.8eu\ ǻDM^q= p/}pp4ƚߍ]3LUxT|{eċ%wpfbuz!^,0-RS,kY>9(T`eZ[k:/CL0­

ѱڒ>;~RZ}u%Wg6Iɩ.~w1`I.&??.ԔX>Nb\|ԑHTT!7豏/};cQ\ܦڥK䌏Ư4st`ko I|>x]8Uq >3=%Y$8Jz{O;P^*2t3kҷ%^olpGtU9jj8K JC~ 8eTk][=e7O m]?!oǘ!hu@&Pe-]4Nc!aM?+2A9FBKP⢼pqɓ1Ȍ(dEUNҟˮ+Yc1[Y!gƇi{F'HI/1((*5.O4:|kkSQDx}9q!N{9>D2\Ou֌qaY˵ Y3;?XKZ+*XҥP|b4OTtG_!L"(  [XWLœʅQ6*Bwg܆i+=q& PC!>Njur,Z0ZR65s mDzd겴K->Z:,!1MAhy'?h]7zvL#yfzyLW@DI8`> smS3! i<>mz&?4ѫ]t2Yy躩"^N;,ݪMMF{M6mqKR{-d5XGti+0Py1sQy@pt3y+@tc.3w ?lP@D-śaZ|<tL ]^4T;Q{G52ݛY|_= \vdBB i3443V+߱IܺaE{uis)9 u;fLK0T_Jz׍o,ĉBCw[X~`j./-Z*nU:cr5vgr > [S{Շ<:-\}k[,B7Օ'6=)@M$Ώ΄p5H Eú"%5@='ɖy'U|vYQɉR/T<elnisR ^+{o.8:LÜ|<#l 2_:.&uq35M@;bl VDZQ ra0-w'\(Wlٰ;M7\0.pZlXV e'R?9̙1VĶB]5Kp)30 7*L7d 6"}m?NV](+ᙃLOJD t<25 oзa%t5_ƮKz] )Ӛv~یk+JԳD 3n]?ut pݴ⻫kWgMcJ*/Ys%p(gP6V F6q!X:8ձΜ$ gEmE*ؼFgf:`Pt4%οڸOj}4?I^ӌ[ZO.>L6BE>()~ [Lw2㤌*.:9B*[DJDr%n; oaTaJEEWƩq%\301aG~ ۳?PmƹHh ُVʊUu6n?b ŸGh`"n%*þQ犭u7)C, $$73DBKDPzo݌(&AՂzl ׷-7lg()BC[Όb#1B~ͅ<za|t'ڽujR(WER&'6َ@]=Fᅵ5U3Zg<VM8&\+j"r=\.Dt{Rcl0kk%VeMexuU˶_$ZHzO$ԻIoE%8ibĵ2W-ڷAd3s ԟg 5zqD>hJ֖/bgvU-:,P>@II a慼>GlR ?\3y`ZdvQ!ZGS W@iԙ$t)>Z;3:ͽrL#O0vQgp: v#%rˑ)D @KH;6 5vZE1σwTs o?DAtFxWj1eYj(XuO)Cux,%ѷ95 ,5\3.k]vNa:J1ڭb+& i}ȃz} 8n ڭe4HB nX?V/xi|ݿ_!;9lA ۟vYMZ+,wV~W〡w>(3􂆅jiu![ f:YL29`D()O!a>7"Ï)Ǵi扪< Dl}!zL"(^:ƒٽBZZ+Pu \zcmIaץEv<)eMo!vl1u)FP)6fFjO[vo Ƈ>EĎn/V!'1ub7] vWOǼDeshcO_Hhw)'JB^Q54 RE ̰MsT<)&x(VAEdP(o rWiD\&Xt)+d4vw>`N!̆oǀ=y8䖂,)&> }@7+5=׏Ȓ55q|0`֣4HQ% @\8Qng\׮%i}Kx$r*h^RymO 68lMj/dFKP&Ž ˫R;. ҤQUS%M{ANZ)E}'~Z[SJRd+`C!/J؞y&Q}?`>?o0V>'Õ~OtGSjj[ "ɡ공pcoBղ81P`Rw?p<}E4b Ih|NU×73YDduIн jp;~: ^p:*a \t՗Zv msH.HAH;peՄG)pC%X"5nrh:;{;shZFYImd-|ZE!&}k *%eY q>D SG=~XbK3DC0+0Ko 67̶XwYBr;TZiU.mYmЩy +tƵ#~.ˣ\`{#Z7~T@ Wa`%B-)ӽ9do@S5.BCsO:ّ_LgML]+gDAbFaY nڡ"%AeSú;4 Zx1Hr/)!N<ŧAU|ReZ*41nNMLu!u,{+A!cܰwYW t1[ ?DE.ң$Dztò'4rwJVCaaiYR"Ť?hR_XQ" 4Թ3pWn,ߨ8ـ"XSIL ѓU[NY#GW듯 jI7V1c7)o>gA=OEZ11X;Q$6Dv`4p;dL y G.~)~,faLu+<`aK0ooK>+Ɖ}l^'d.Oҥaag &d8еwP~,ϥ fKᗫCǹ"~QeC0{=kM7[G98MS倰Tԗb+v.~%F[[x[WЃ_Pc@.Y6NQL`:4HZsfM8Bh޺y2.م*YZdǓSϿn(a,ŸizF@ҿ($W6%6(< }S8,c,6#J}K|zac\at-%־RnyCr})FI5IvBD03C|ϨivхRI-$[BAAs)=/3$VxIz|)]>'b!i9wѠ1zQdE')Ι[HB)4{\c} /މE.z^iMB ݣprЭ==7OaS=vI\u'[Tyio X$Rޝ% 6M59}֝8үU hxOd0/s!^-5@_I?ރ -%ɊUv U,=MG#ڪ ;>g7hI.-Nŧ#|m%y0B;{0enjг9tk(Zrys@ X d/LŤ2Uh ,du+B}N<ͼ]zijSC(P8Gqp|ࢺl4ۓ fu-{߆K;?iC8-4t-hd3 |J]}nUPvmv6g1yg'bfA,M>Ӕn_l^{v<>6"Z=kNj@bdS vqC`f'@:slfU:Vnٙ %xa~@GZLC3q{L?i}VǬK6$j2c3oy#Im#mK ̍t1ay fզ$p?t\QjfnSF?LkT"1\)k Kܐi 7r8.@>b#У~-2u\ #3g"Ejc~:$[.m&_-u_BV3.SE_g.OUIwĨyE ?]q(V:k"?"(ӜwhxN\Rgrܢڃ/W0X{Ljpzi̿ 0yt*dHJH0ٮGQxrl0|7M_^tA'vR'.'im)=gVχG uy Kgfbe.af#1  veIUxNt\Rʧ.[?`Q7TwqeOi,JKJ| U+BNdnH5oU6*0ckVw <+KdZ_H+EF@[PH|Ubd:Z\2[]O!5WlQjl"$+GZ?W`@2WgD prPFϝz g#-]U껩YlY )O"Q4zws-~ЖZ 9,Q݆2|VhI6 L@]]wz_YcQ|n:l,+as2:Hk=5f'樶,efҷ T,-,P el 7>Jdx,X4!T^e9(* z{m[dk17a<`y\|cD2m'Vg*(}+; _Q]7 hkh)b9dŚ)i_BcðTauXߑ7[ֻ7ٙF[G&x(O^N9G~bK+äO9&{{r&%7٬k3HnC՟;-i"4׌ +[DɍӝLo:k#~N1˘FAj!-'t[ C}G"rg*7vv*!C&|%Nb5!<α&}}j7L_<=Z4) P: &7p0u{1_W,m?yߞj7^D!]2U3=G=)voۂ T7cIu~MPb\B3EI]em)Zth4 "<)#B I-`*}G*%GnY5QW4wV͚\"縄Ԡ.|hח}a.AFq܄2)ow֋[Bm*m!V,@4*l{afY熻5Qet/Y*tu\,3騀W fVVh,OEE2O}-J6<q FD{~#|8іqMB.R>V43.@\Z!lyC]w> pdFO<_rpd lȇ?Ȃ Pv&_"-ݜl;\c\Q܍dgVo<).8޿kٌG[ q;G/rP\Fmsa^1}ßӐD7U#36L1VX۵q8C+߭2% z03@7.q`, Wk>'g9B1NhPno| skcCm0"u^!Vg1z&Nx¸( ,ylxask ݠä# jB J6$*y<9.<#E(K*y>*A(};-ƸPP+:Aיiv6Ȳ(t} 3W,Hs=x\(1m }6+ MUhS- 0ߌ3LYozrkD%ܛĦ9srD 2^RDm3A"Txr~k{-gSⴕSo9.ty+1a R.7t=w GՓjX? v.v)}Fc^ۗZPϷ4$B* ᲹJqޙ킋iHL"6ycaM8پ9e&$=CeлR+BkiZ5M'<+M#I`ZMŮPw\9azHKdpm _࣎JbHۀD) CDfՠB A#2n D#8$̊ N+ ذ93PE}:"p )oo*y)[oDͣI<+t)QL_hc-  &Ny YhGt@%Μ4@\9-m7⦩1+ll_/k;mKh6Z7´da2qC-f b)(" @Bf{]XU'6&$N;QWyI()n[6eRuSMXwzy߾ꈠL>8-C!27x(R::=e1C^+Yf`IܞT<IZ<ý24},g"B#M͎e.M:! goA%կ(pG`Bca-dћ8(w>( >+> 5ۻP1KPEԖ`}gXDCg1$.CmZ ݋ܻ-hhZhJH>T56zsTkocU>*PPWϛ*Y:-Ȳ̕k AQrg?%|NK/&4=2gh>I+%\/dɛ-ց= :t0!ۂx1>Ct(!1E qy~`~:5mȪIa?ht \E{qN$"Ѫ8$5S>WN۸(3v~x AY3vr= ȋD j! ,gc]2s7j#eA7!eF{mSѸX&ARU|Auޕ?`/jr)2؆2o_+oRwHzdpnt c7}u0(rAX; Tv%!/W|z͞vr"@* D:tPŤkãT> ֑AFttpWT^nnV蒸~eC# ? Wv [f}U;7D2A1\#BP)iÁꮇ˕L0;.l_1pD$kB'1##%awv  ~L{Ygf#[4"[ '&{5kpZ FyBihFo3;zM>B&:c!} thuL􂉽,z3ApN?qleca\mr-K|7Ҕώo[ {eh]nMM^Fqg8~‛kJ7=b̍GJ^>2Zq/2ת|Iý!ObĒR6AQp=$O*E|ٻ=xK =[F 0:;An~k\ɑj$dM܃(&!|{4STlўzƾ9+nV<> 9gIϢ+ЯĔh ;AXRvɼs,*- &1Gđ> /P`681,o!MNщ%5p,vv[Wx9JD}|3q50koHtݳo4< ?ݜl U(jrCuLkSd$IoUhʉM"?]ReAD Ƕ G"sMB4mQI\r\1)L}GY11[Qۀ^଼.OT8ԊMdU*G;PL|!_DQ.>=qz ت:COYy#݊rULE 64C\뽻{QnByŲ7U7h^(SG?1;׳1 Ntl5 QRy7{Dt1GܗJ#C%mMxU3TG4'}=)wx0dg} (Ʃ5r[j$?iłXP;8N{ꞀwÃ{|@:P// _?]` HI 2Q֢\vB: уMN"F"w|/gѾ:=([yj$EcF3akl3XՖHV%#av(C=Gz7щYA8Bl ufBHߪ?@ };8 _pMF$l 1!*:N^Jã.2=q'<[%o Ԅ6zɁ3S1JvS!~ة Lj^ɔ riF;SO{ƙ~iUMհybio*WY G]eI:N"d H)C'f(R{g֮c,xV;vKOhWeH=Cxp▂<YǕHM?[JxG\ o.gu"+6B@xb5A6W\Zƨ=]:d,5 Ht/;r3bvׂţܐވpd$*4-h.&AMQ|a0iIo`v_e0L9yMZ%p}?Zߕw܂ks ~]dx!NFgLt3x#_}j8k}"-U7e`eIJNs1Kd&?J7· s'aWykjA;ﲄΘ\) "E,$`_IS>" [\كatسWN1&Է If!ʶZw.)s(7_Հh CTqt$r Y۸V9B!.a(?abo05hm bxQSRK6#GL{տn2_VJ 2RX?*8; 7dVjMx' ( Fmx.hCQ0{pH"¯pzo%5! ٢th؎(gmw*KaJ)4 nm |J`'1u¥rdڣ&cTod+q3fb Y"G{Q&)bwLpR$ϡ i6xR8b%Ikt]r9hħُ+["iw=t .TtzKQ,u'{UdΉmGS0' f Q^$6}?8tTpZ~ߌC Vi5$ //^} ,h 1ަtƮ"~.DR X8d[wuVqIfQ-c ["HI g/.s:BϽ),&.[#Z2\]V)ҭ&Ol(TPiL?#xzPb-ehAcOe(WQwh-GL0=u0|#𸈁5HWbQTwO{gz k4`tz8nL^P:cꀲL^}4hp_n"kse U1]pcw$0_+&*d-`iNlO'¢D[B3̹Nn+M6(w#L)r:`\c)Snbj;Kz}i(r,%_Ie Az#ŵc"(.Sήu xa?aثf)@h }DCkV"mY~R3 &vN\:C ['ġ8qW P} }O\7Hy8 OHj">ȵܺ WHԖĕrP;$1G4m7%K>icNZMDY]/HjVDYZqؼO $h,!ݕg q>Lc;pg~n Pm08յlҶ.^^a" ⷱS*,ƀE̊7 Jkeaf K_=ܓȨb)uER{o9A.nM"m@4ҏ2f9f&+a.rysaЉnR zc@`}vޥ@d"+śu8_Wem}sgr 0ij| _l*"_jl ֋5ԇ.+,~R1n0 >z10\,dq U %"7?mjaMr3Y)*+Qa@+6^U߳_1c4>M9pzFZCkY״>5^WC+b7+/4@ٌin>%: 'FAdLMGq=89ٿi;#Mk'D6{;,ضV+ )ȉ+x 4 ]5nKOw5+]36Q c]ǜ)p̬y>x` s%xG01`EP5)# H\D֊\:7x+slaVn'T͂Le1]9vhg6T%cȊߞ +'8 x?ILBC,ÇRʼnuy~|a/a6͵dqOiפ'->P@ BFmojY*V3f:N_G88l3UXW/H!iTKHMv %t4+q\SLC-F".40bQw9|"ّ .Et>OSh|tV/ҲP/T_p'y W_fDjk#SIGPƂȅ=#m폲ؗX%d^+J}m$)1_opL'ԿeW}->:ڃ _ lr9+ZWݓ=~8{X 88nЄWDS^),#!^g1%e2lf5^uӡWÈwCaLI&9}3'HNà=g&!Գ =ક6~I/6C#l]G 7_[8؟'rT F-TG^@_|~(k `gRbdd)YMj!! ϮX)cqg(fw%ǼľH#Ob ?޾#knOG=\<3±ub<&~|=tNFE<6KRK$wjKe#d!ūzDРxe%N^y x`y+$5њO!X66v~SID\Pym7޽?A >6=,rBIM-ir8~RcR)+b鹳+1U!ȝ.L å$SіFT!@Gud.O zhrqwfϠ[H-3R~!:\U4] )bJAhI,'~`Լ&N=b 04 PT2׬VTW*AFv]7V5U)Jot9Bql.eӌo{mP{؜PrV-ŻceLν,lIvzW~M聝K%LJ7̘+'Wo>=/s9_ _JTaȈ$m9S-4it֘ U>~tîrB[YFb]D%1qP)ܧ(lIv2ڂs,(E8*o`_܋Mz(A619DH&lbX,\pf0j7.˿рnG̃V8bUAޅ%3V nѷXbE|ժAkg1M$ldKQ*j~ pfBr|]x痪(lVЅs@=  6C@h:GsL#q84#cY V]<}bb*Zd}ct;&Z%_U`w Ir[T!np\Gs|"TS3L \'ǖ5+}K*͈C~@Q!\F݊BsZQT ykk_3F?TyvA;"ON21rp={[r58=! PЮGq`#Ek@JI ,,٨I'̸ZdL8I io"#1۩ڜDN';TRh.n)@ˆtX38 4H칊Z"jo']y2́4Y=ܞ$by^SGމ-|e~'&169 {EVE >MK ;KL( JJߕwwt^\AOXNêjP^Fg6AmOl?>T.mBn` ԾEiYu h6ƈt=]X[% Ԕ\ݟ@NZ(Ts"s/v1-{aۇh [#. 4qbbi 篍{R{ٳ!ySF)Nk /)r<>E)yY>!u ].bE#g%G隃R3g4J/ b-ӷ9_:t>x32ro6W@ID+!▖l'0h-:LЊ'̖K)]y>]j)o)2 0t\zfX/!Ic!~%Ï]G69K h:M|Kugq`Ux#ە72{+ӓBy}}A0cr귭A?֯A(ңNQ( )펄-W 4<`Rj`ʠG{.F:ǥ.8ia<Sj(5 (QB~BF=\m_ W\Ci]J̗xQņg||uĖCW8n^"Ya>/ΧM3ןO*sE\٧yj'Q8qCj+"u1:p\ a! )ʯ]hSj\jRhFLq{x e 5T#08:Mf +}I|3D O8A&X+ ٲfξӜBڨ呥ޏqۭPv*0nn*t 6[ o*'M/u=TUKʬ.^O(t!ʳؖ{ r^Hgi[X%x+a7~ }<(Lp78cdJ>5bh3"yR.fƈS`Ԍ]VyH+5zS@rA!.?g>*-e2$:J +]ĺ%G-A Gs ܐ9w|mdxt7F֑qЉ //ɜ"j l5؎\۪C+B&6p@׻0P=UﳑD!jj}*~kfH?ϰIHFP DB=ZT8~BXlK/Z [Dl|Zqň[wF;637ޭF^tN@i1!7iC&1W/qե`%[{ӕPs*b՗9#T:+|s3J"O1Ca~xs`fŨY>@qePX"C%!ύ1)إ*/g23H*CrFP1uwfimxwoZeRviB1hǟQI@«v Kn/7,hxedKu/cf} N!o-KjQNm4)P]&_kd1o[U1ި O8eUP;n㖖)۬?gߓ4hHX|0u@IbgMIVH 'ͷh!E5Jk$0V;|"X9먠v]{u@nB%vȨ!}UH@@T$(@5u?nfH;Ea qJiy;3(lc<D.,x+-Ұ,nխ :JN@X7FRZ9ޓocnV/]jg\9ݗ'_[͠M;1)[2Y 0b?E=6dzȨAo3*-2qˬΎl74+>eB IȚ{mv[Ft?ۻ1)V$j43@OPW@ɔG 7R*܇鐩-|MVpMxaloAĚ+76`a  Bk{ޜYiAv!BGcA]G cւ88Yl7: <^E\˵aw(MsuJ$okJ8a(gy t)0r,!\68ӕA_u]$Y)cn\SG((}"Ns۟ kZRN5{Wo|>&W EV<BF|*E'YR L$R7 Op(!Ť \+2FI`25\kUՎZC; {)F OӴq꽟-FdUڇE3$ u ZF:X ^Vi:qFW"U͢C՗ T}3]ۡ*EN6k;yKJG;9Bb˫^RS $nGʫi|fT=zxŢH cWp+.ps3H?_nDq}(ZH 9V&׀tFG|fb'o_"Ι7BIm՚}/LmɯO6B\;R5"aX4 %ᘭ`>#N{)f@{!`>Q8@Gws VH56{9eozz]C*Gny(~>>ƖcGY'Rf;ng1»7jCKygM5&[ ?g|>[rl4SР7@$Amnīx4%Bt-59yqNz8Px'Mwʼ[Q=9wDuYe }RO^*[~`xƷ[[BөEPlau!`iʉ2I2`" $^ ?7H=aY( Ao{1!KqĕY#y1MzCZZC~Z'EL m0})\pn6ٜp0yKSGiXU ?\] }˪z3BR*XPp3iSQ aNlSLISZ^`a0]yυȾ+mO?Wcp+ ;H;2+1;L9Zo:voԄ'əO+xɰӦ<[K;DRTzy`UJu?MRE0Pv>a %qT{ܪ3-k1R'_|L…#?1Ҕ,씵M(m=TοX `ܬ`&hL}>jwGoݯ]e"xEZ+.̽ ssK(1 ?o֒ŋ ? g#F U?`U .:3RmLR1[9X&Wבs;6sd("UN^l[r/Ѐ4Q_i3EZ!2nל R@_nk@EX( .`ͤ槎ڌ/lM_1.[ eG O+qL]WġTZmQ-c`8Fߕ/g5`}rЎw0X$XWɰaQtS滆kx#9ݺ9/!0--2Mpg̟bn&Ld,3Hɩ|ќgb_N*䣡tA|лF*}5gH1brJƊ Kjkm^Pe@~p';6$1iT%TnZ.0Ǖ7!@ kv :㿩Ԅc9eh?*sH{nF=d6&ga% Tǰ:\1y lNb"f.s ,s&w=_@_jˆ}oR954V=<^T%s 5Gi(<0O3Oúk(l' "X1]ۃ߀0g7+@`Nf{RxxC技C2 #oA)i#B'fFYpވ=͌ck˧N=Ъ}BVlr#[n._rĺc0aU6+Hg@ qCg0ժXd!3GP}n _'|6n0hMBq~t +OpCMU,ky,%Cfvi#l6Tl`]z7:`ь?GI2/ ĕ3|;9jliͰ|x!YN8ߓ]`_AykwHw!v-3cI_:azXSIQs:=Y 1Ҵ}獚"/+:rF;ئi RY#ь%v?l1("4@V@8N&Vʔޮ({uBZWX(Fސ_n=jEakQCG#Pڊ"g>@O$+&2 t*\nMV}\''ca:+ݨk\wI51cw3hEK)-%HP9=?,8𤷃aBwi)J2iJ[$^gGk?Z9@97?0D̴1^zQ/йe,a$nB!6g`+n}KS;2 1{{w&O4KJ9/of趘j9ssR)T`O}wX߲ۺ}j {F>iݟ4.t' !y@_ij[xt+YB* ?_@8!݈=-dMgr'ʼnN;դIRݖ";ϢAmqKsz3\iÆD`4u1P&ݒŖdGZz-Y_|[@Cx#D#,(<kf5b+ \!Qv?5}Td%-ƁY (I8ՆIQ}*`Cߡi4D=uⓉ5q23e_Vk `eR^%=ay-TZ_5G=5G :/9EH pV''[Lp9e+APK1u+ ryJC^b映WF/>iATbX1I%ިZT툠#+]Mus)[w: iF*|8, p, ̞}Ur x%xtKJMxs_z2M׷Oc BZ;W$ڞu]0ulL.ԬldhN&:xXLjOv^wd Lhi7єIaP=r;#(wR̡/@ATneJ^I4}}XIJ90MW ~ݰq_ ^xL49'T8<. 8u~Wޥt{qsV/HFI. >ƈþXј2m>8RS^W _DLep~K.r39 vȾV ѥ#ZoM^lxt#{1KFFr,Q z{/jӛ!%{g {Vn,T=-~J˔z& C.xَX[_:%STf$1׏1;FS"q$ǭ$<2n5\ILDZ!n(x~S*vyD4%[T,@Q-&ٓ{'w)tM+Qϛf*h3#oiF٣+SE`u#TtrMvÈ3&u'X%T(nu–F {?ءN!;[k6 'L@Vز6("UcH|7H(I$Wݾ .ujk 5Sg+`[Ei\yOg:Ĭ]G/ ɊI>Up)N8FR*@i/j]9C0~J$$ش޾s8Įa̼V +4:-Ϥ> +[,W:^Om^ܼ {/qʦV,y@K2>l~¯,Qńwω, |_õ˯{Q6!n殥)2 =VlCeE ,/:(b!8B gKXNF]J;prL `a>BĐA4C4 R2@d0DEZI?s "8W5}6!G=nT˺V=s3iKGo}t\y3k;LMeq"=Â|g&Uo^TBP+KJCF{G_4r*# ,-F_>I.! t4F'43#f`F+F'h%A/˝81SE\[MF6D:~f8yv7EÌoϐ!k)n-Y.0erP ~U/KN=5rfޜ,W;`-TAI%鲰̘S_zڒrfT*"{x C"?`+Aޅ拡_a WeOY0_ڃqH=h"w]',e~!m k\TAnHQeX\+@ڳ@BXޓ'Y ƹfjjA~p v~Dal/|цc8kQ!cU':mhMyS =Z i%9~$VO,K!0KLQ1jslhN A9Hjxe;|A dpf i Os l+UX%Ȱ(;^.@qxL8D"e^> WIe]8[ K@$໊ovPeq7 $%4$n 4'7l"ZcNvK_>9;#[XCR9# t7+ ;)JW vvȆ%L1B7'.7v.  #NS{YV U ƹeL 9d**F\kJfFR@osE4rFds1 K #@mA6!tYdMQY Z= ;C,\ݏU"ʉsnRNDh @vulbwR-p-cT!0݄vzzҰ aI2g?K1 ;^/`Vr񛟪E/_>1([zeж*ttdgke:&RAD{(MgMŝ.߻%F*6->E~4erT1dqŌK Ma{Hdu? /Z5燶)H5=v>)Q7!jcSҋB'+ ?nx޿%ZP]]*轺-~{= 3">O ໑S{v]!0Wԉy g(m6u!A J=5vZ]Kx3˓B0H98J߷ƴ 2!E^, Q2i5ATo&n$DޗTy &bo.d¥ Id <4ɬ3|vw"e)̴͹mVw+ ccNJQpݲ 6xkލ1)d3 CCR2"5K4sƭb@龿ևT N7l.~?swAM߹X)pQI}ަtqqo 5@] W8YHB*?23uX_ ^'8`E61n]>HwldB! {x4H\+$ǔWȀ~gFTvU6rW.1#yW,-oqydNΎ澀@zOm'T~ Вn[u>(|ʳR/lDKUbhAĵxV fE BN-_Z#mt?()&]MdE\22NCkʻhڗ"fgVvzllM%SݹCs2(a( ^`G9scAF f̛$ tC(7ixz|Ĥ]r3h;MTϹ1[Ӳ 'Hz4úe?FF4}NPpP(?_a:iIE}St`=c[-6a:E8*]xCt9;qETTמiFO qn t?~vߥ:|qYmFbC,d-\8zÅ?(:nϥXv')ƻnfOWP0iiؽW FpKf1Z [S+`%QWD:xR*y!Ɵ+]e$c=_bf.qW i2A0F; <qޝSm-j YۏbQ`v`]>2M4 |Zek`íL?nFFu: 2"^h->ߓIj*8ȒLx3%]D6H|UpXH[2[H9%p줿IןMnGqMxl<@sQ}3}~0]*XXK,)^{F_OQD˽6Tjj]EȬ"᠁'I&vfR1Zj>I=TcIo9]Et1uSr0g^P0Uk*[vs꾻ZXWaS/KFc¯7Y)' NWNɱA)qt7lFҝe.&yĸصP%2l|,-\O]vO*0S# JLm,d`VY(i>cٟ?chNCZ|{rV:Du3e9ht""'wfBŏ~Y69/ۢT0{!YNwе^2]<sd*h)u8@DBS?p{ȇElF QXK'0bet Y jZW jֽ^>^RF[Os n9cyI>nCH#^nVzv¡qI!vރ7!AU~`q]YnWF|O+CHF[o ׸3@/+~U7QK.t K0wZ_*wj4 u?։8s}:qi(?R\sƱ!zr稶yV]p/%QPfik}"ɨI}<|=!Vm~3 Zu/gHKf`&uRJc:Q>dx.Y*z BeNyPȤMts;'B^Amaל ALu $کheQ}bQ ! 8ɁPvUK?h"l&ui3Cm>]1gf-4hVV 8jDuFzt~OB >z cWD 5uiM$"Q0g"Is5ٌPgp6!WQ2FG0{0Y ycCڟ/%5a]U;@gboQ "/J%Tӄ1i1ً\k$(GiIJsαʩ172S6ŹqwgչO_|NJZ/{wVuN OC@G[K!: snfDVEGA=j4}}ȗRzUI X>y]v{dG@eSĴf!a;APZSd_5F^VN5C[7̝'c=:zHwp\B ;*Q yD ;j~L{ .8 AapmGs%,,{* r5Fb:zG ) Wecq'wZT |Cr+Ωhsy RkB%\@ Yn^*։/J )(z1Plb{-AUqO0 V@xzfoާ\XkRw qioo$m]QɨE)B-YEB8ұy]n=X&*K+qO;2uH,-v0+s? x[Fٳz|q8`qTkNg3-J*%{AC>(Q5C9}0uӚt/9~lBk߽q5/; o[7ajt̟zk[X40WP MWǹ&"X' ;Q4G`2OOc!@D?JPQ&jjUw@;\aPI u%QWJ#h_3_ovǨYqURSkJ[ o jXJ~;#!'JEx需ENhѻ(bTI[}E#vtF Hib-9A D' E=Y0jg)Ii2Ǯ!|ń[hX*_CU f3b!8[Sd4(  ɵev Xh^9_okwtI6ΕG/p7ZV-=N5KaSήL#P:cP:#ooGmѳw T4aLUt~ [ LE9l΁1RD`OgD ssYT+Qʦ1xUnLoa,o6./r&0ȣJ l$V` OC 5fT!*^ ۋcSsO6=/j{.4 |qDW;rO/u{cg&q|jA U4G,5G\ %AWHLU:hB|)Eܔ<~2} yDSci[k5f'DeEr Ht,v=<տP>iR :̬5QFtn84ُ+tTRIxp+: MJE0 E[5BWLՎG/.Rr? 2NU?ڍvS$bQE =v$f0P'd*(fnWd(6} $Y \!)Z-|!!%rM®+>9Gg;U,3s(kIJ:2t @T@5kduLe>s{į"B mq}:r΁8MZ6~.`T{d86 C6f7*{Dù+׽+Ԟ /K'rW8Fl7>5yfj#s 4]|D2$qVmPm^ڇ]voAjPX;z_k5g]Af+F7廌{ZDJB+>JS)ґ΁$W7{hi@$}J-+M4&5ӬyL޽bU>}pBZдBp/~_$CSXw) $O,*5  )0ht&deJaߋE3UѮw)O |r_AE"_QJKng4=a$:'COp45,d'->Zv`<I=g]MxsVSTH@1#*0/anMrd붽78"98'/>93Y XЖ~~UGLCzmsiπ2G.C|QS{}2|3rI~j' v|NRlN2yBy]UE*S*Y.ނtčq^@Wt=BIUDs"0z:[k-i@A2.DRh<]L:fB<MQⱮ53j4c(8鷪YP݈UjmPO!Fl ܢyKGEb6MS -pqNrK e?U{QFW[PfPfvd6'䤴yF_Lҭk^q !A5Ar" 8FE+!P@`@֋'7ttqg`o?(cf\~AC ̎/*K}) V tS^#Bgs H_Ebjp<iYncY^`4FFugL4Cz?6qlkdžŧ,c2G-NRRcUuДNʙKbm&&0Š4W@˞Y;E!j7KQivp)KyYUjKaj5 MXSAǐ187J(_$10ىOף'ִIMQujXp;(X!)ͅVb46A$YȒie~d+B?_ -l2¡`@ݜ' O"(NTB,k*xҪc /V={ݝCYZi';qFM_3ZaB5VzǞdCɓ#ز S.T(=N|j|1OeVi296>,|AnƸ'^Cω'ѝ FXG**Q1wG;瀇XRmYQ#r{ -_ƞ*SΗc_1}<<@;nbB7޲k:w`LjR\ֆxi$+sྩs\ʽШ39p'J}zܣ}[(9WDPʰڟ979q>hM68#wǛXl IJ}"ɶo[߻a/F^CA4gJ76'&+'2 +Z-sY'8JصоOM'I;R`ܴvM Fn~5߇Wμ #5!>D_Ҥ|RS5ڞT;3h1xnD*h ҈0_<YߪRH swtޫCvUE.oI 5/ YBSkk |O:J%(8& ^ &ztuZuw4霶Z'?ͷ;*khк# އ$<:~] x%q4`i^øQ^n%u)_v %&axpuxǰ)),uiˆHBA5XQЫluO#H"fl)涃CIh!;Y}X|)V|pICʛ$bQcjc۠p'CjEd֙fW<(]EԀRAgF*Qn,v,26D,3T;ͦG b  $YsZu=κ,:j׎]@"g@1)1ҽu8Byd+29%y:kɾOr̉ u}i3-h/ڵcW>'ߊ=yQz"X2=;zvԮgPn܅aTTd(H=jOQh"(M#g}/KF4bk_[5 oy =A&qԙ_ wMscqvKs3!KyǏ,+? !(ĎdpD ᓯ #j҅ 7[giSDTHxUDTJ@xIShF rowsw c]5WP4b bGy1-`9z^lAH_mGI+n;f{WGGt6tGp5f%E~)T;뎌?Ғ+B~e~zϕ|Ei8lݱ){qv!~i;d,HnRR8&f'&U ҵiqDweǮ 殼C! ja0 ~"ݿLmN aT ^ tSUbwXv]^:} dVӓ̕cQtDe'loc-2S|}*ֲgA,0MdX, =NP!xIRN۠9,GH.d* Xso5eK`sp~tz Y0*`>7.wibU(aU !p W$4Ž&6gᆭκ[l+(oIx܀>/(r R7=WCqʒo[9 76z!zû]<6V*>$C$ss?iy##cHw7}F Pn 5ITf0ԭL?g_ב{)ͬCp9ɪV |:!~Ӱ D2O <+x mU'_hTH be_A>/a0q# aKӾϻւ4|i0-{{uю!\'ur@O@0e5>%Y'xڻqlA"L>I^' ak])}EXNMH[_HB&H5L!]L &btiWG<^hW D`wK8%I-놦z#<JeU`L`Jdt,PFZih}Rmt\#(ؒꥹs[[wW1>I&Є'겦uazarYFQY^gAfڸbPJN,HTLbPZcM AA;UqX^\f)Cl_J$blϺ oD@ hf>7j k:$'} fNnfUBSZ5 O@bxuqb_n uy!b&Ֆ9<ɵ,f$2-;XGHCCbkUxw Wmutov6W騄tc-0j :diWa@᥵ @u&= skO^[ !Tt݂|QZV{&G5C:+FhQ(4J+Uo0ፇћắ_ݯKl:nq?צGgvDsL@rMzOވjiHh۠~\AVeЛ"ִEڹ.爃tVGͥQ5&|዗ʱ!( ɰǚRcbl;h>2*}5dϽilE*9-vdްFHyH]2ϋOC}F/}BA&rY,aO^D0cFi|8bXMxÏ%[p?'"D7-Soq\+@@{Ф Jv2ET[E΢SUf`ĻY-򍟗;+% "ARq@2Xaݜyra".[У.|$DY4r_V/,So@)7bK`SJaA<A#zܘO_DGLRfF j,w A<ρ͒&?C‡T 3!',J 8Bw_9:wYqy#Vu"jnշu iJÖ%:z-T cc~1ak-B}) Lj~v!1ч(caK 8Lq~ "Leַ61!ֆu4Eg rC lF%# qnkJ"9 fH.1q,qU+oxnT>;aW> "|E[~_'?ɱTĥ!Ps/o7y5&}Zup!`ឰ"jN! 5WJ@i7dfs-SB 1 BmR`ɪ_iyts^7JjxyUO4z[M20֤%4Wd r,,W+:0p &bI_R,^g!-)6!ӗ}ݐ?`~ `[-:]BR5)*j ul;n=. ?@EPQCH=B>hnIlC]C|E%Ȧ(86qy,_Bޒv ( E +d%J/{y oT*Cf i{KBͯu8L$B{H'Wkϗ{FH?v6A\6dsDG&ISGcY/MDEMK%)(gͷdg$#7}yX]wM%Hoո`ŧETn Pk'U6ۣ@~e9 i'UDűVt\v7*PjJ)Գ\g+œһOEv]3sMi#z ;! S鈋/fREP#XO6-{5'f&f8mX-7]#;)# ؚ]a7 L1i_A0sa2(j  .9RH["TLG RlEHv]?$+8}\uR3KrP6S 1w5sdeo3X!&f^4{YI֜ݱb*'xoK{xz"}p8r@ 䙈k9 [H!Ȟ>[YfMâ_Pq^/z+ӽ?aQ s1 =4tj4+Yy͸g΢.Vp\15(]+nկ80#aUVYfކ"9ס͘ezOmdb'~j<{%EXh@8JB9ZpPK Q @|TZd0 9ݙg|YCLoOV# a+UNHh,:fQS4~jpKk>l,?ن lNq(-S.y0⇇Z%~n m*:j VV3\# <>%s3EM f8 9p̼Tpd",W .fym.5\NPV"ljPɰ{՛Ϟ_ZA chFiU:XKP|Ł]Iz{ ]vSQC}fVB5Fo˼cGruz".S@.ShGSgo¼qN,O]Ţi:>&qzlȪmXXe74Ӿg> u“yimO-@Dl=ZNl jArAOZѳ"OX1u"~ ] "Ѹ*"I- N9\e40 2PϘî68nvk~l6z(=TUQ(S\*u=9;ڞ iXWKw Q_ӉSnT6%bG#! Zb̮kY2ձHrݽ!svp&> j01:W|w}z 12:@ep>z4e.G[#Oʹη/:͑J9>q}^Y~kh 4o7 ('eBQ$H6?U_Q׋+bn>*0M:wZQZeD21&@2iZ*#U~h`+qI|YRF"AccaguRk(UI/w P&F`5 G9WGvgDELnꡭv b}Iu12FZ^Ե[Ý^z8qa<[kEy?m>cXxEU[/Gxjgs̬ۧ =20> Udzs9Ee#Ӕcl MKVDgz,(Vr9җ/p9 컟̀gL/+7|w.N}LNodgd({E9e C#AB61&A'ϫէb=uVyN%ĜOzL|,DD* g,I̞ULիh|Wyg8Eōlѳ?^ړ{f<| /JidFWUw8lb%qDd:JGme|(+ttͬ+ <)&L?SJpE֎Ō:r*A"]8J8v Go1gXr.,;mj5\ӽEaQ{B9W*^E߯SgfFOۥkA+ΛDuNF JDF0HMwPe H bk@z\A J_ zU/!D z\9(Y`3l_=b"eLY q3[LnǭkOXk)MS&'Ugؒ?C-|5K 4!nΟ[4"-h3= s#ƔSxKCqV6i6&,&As௳=lU@nLF5u`cd 30uʉݪAmƑ0ʿʐ+&8$pBY;yo&l|TAcocwJjND]-עYY`ivnmpl Oﯳj/4iIK5Hįe;Q lP9;TaEhoNjNnM@&7anp9"6%Q1\ߗ*#xc\"dq{!y~}?!LseeݎjDa{j#4R358wX +`@MK}rX(a;@͹YvU[kFRkw 㧤5~Sq~&i8-Wa97S:"_P}#碟ZC)DRd x@堧lX/`]u~ 8kx>/I8Es9,, d1xr 6}-BՕm>_*6OMqLg/s˅o؁Xt̮Kyct 4XwҬ8 2n&T+xﵒ~̈>x))p1^7FpЅYQ?p?VQ';3:,`q7CEĩH)⌽lMYϝz#vuF<oP˒:/i8Ai=}P.10 VmINaiM#o\FipHעs0#D/_f<.*Fr{Y`1rkYr96.DbP ҙƍ?a QI~>>GwcXϷ.2uPܹKX bT%&$C3;- UWBKf%Aط`Kݩ-[z=)וxTEK ){rh[TEZ_ȧ6tסؔ|zRcVeSU;KO*Y! #F߹5ԣTG9mԭ*t !•L@)pXDUE$Py* IAGKAk07 |Vo|h/Q #TE(L&]ZкS@X4M%'FH8 .R, GkQ8q{N XOtlHR!ǭ,kPMjfmU%Ȝ 3b%f(4E]+ِXN{#E+ٍ@r3-Mƶ N "DnN![aR 9 n[O,v3{CP>NAwvoj@Eo?=o3ֺɏ$ +} *G/Vbv5ݴQ l+L2ȥJMtrdRQfZOjnWt; )qo|(9Һ08 wɑi&4B E=uĻMhϷG^+ wN6H.o>s ݣi8p5 5~#YŲvXRbcL%C =Eom:i'{yG+)Ed wT-lM v{;YHn`:x mĀLqH|,A {}zIZYYT"[=u<^h2G"`_JC1{iX1$i]n1h v91A: yģU|!5G4YT X Y^͌< pza fyu˒/ŃQi1,o;mڱ5\t  H٧y*'+ t?e~!}v]Ѡr n$LVrC{q߿03=\]vNji֩" AׇqmP 4EoCW4' qGV(ÙFIe!w#|_GOtDk+[Aa=.9}Z9B`PG76?F%= n~6S(DatJjowhUp8(FbPB=-N*ecI;ܧ?i"%O 誙,xN3 lTN paYn* 5yWAܭ`؝sR'ǔ@K [S d`|]w(SlJazbh*M ^(*,+{g3zh,kYe%~[ѐ!5_ (9VO R˟-"(豃ۘ|!@ g :K#o\na}% hۚj{q{7PZ˪ CaC˙ՖihyopĔQs/î;'RZテqP[ěs|w " SڃQl\a>\dLG8&d.Z~;GZՆ{1mr r^闚&"nuMs&_-'DXJd|Σv0Volu !e NG Mnm6xS\ĪZݎU~y-C7dPōyɐ@x4:' $q1fyVD`*k}FK{boQ+tl^/7bعκVjM2P`Gh2<9%lØ dxz3tYN/E=@Hr2O3n[qEs?wz'ς2:d p W7;!2JC+jWUC H㢸t/Pfb~4qyKtH]iܰ{ ~OClԍT`b6$hrueU9C`4wKV'#do|E7]$dTZ|~oc/ݞr|˯z(/4I6!'~,$Ej0 MRH.R[!{w)eU/ܕT>r緛ilIL8H2.\=MlQ]1ۀtUDi$h\åa%e !~iY Nf,sl?81Y2uJ\Nv _zG,|k{φ1YV  !jff[!->N[Ej" 69d">; \ԖQ= c'7>HllHn'~`3ғv<JDuw&^ {rϟR<81vNHԒwNƐ{/ZhILפл%.J)nw!p৽$o =-k<]^+d,[4Ynԩg÷(z cN@q. j)AۚQR.@όPyHxn'4Vp>ݸQQ4زWƑ8^yj,Rq̄ m"n=O~]q6N ۬rPB#otFV&I̫1L6b Γe=bC(Px4`v HuDpA2i-ϊЉGmғ:>؆WVZ'~)z٪l'TOqeJ=+2#2ۓOQf6x|#$fώ҈uʫԵ'6vR}S8]Nӄ,wW6!w]ʡpa3Ml4 3^w|ЁLbתrߡ i~XCg$\ }옙w<:jF&/3ϋicUAJZN=W,9 EcFQmm6xw֩N:Me -^fFIzlU *7Z5,luC.BؠilrqdoU},Bm̓څIwf3u9]a,a; NGCj쿹̈ǭ dISHnCi@#{keC>f-kU*'Pv gr0B#`/P1}#e* ݛ^} n7ȣIӮw3gccZMAH \̓]}<a.}(:ƾE7ӹz`_E6j2e\Ŕ%Nރi9خx3g'apug Px2&Š=ԩ'XSKK` +]RQk$xciM<e%1ZpN8;zh]}P*$>Q wLiWrt6Kae_;Zev[k2du{߳~ɿ@)XڟY[³539߉$Y*2|e%^ƤU+ԉHpg'Z^mFv9cU[ѳЌxCkj$#kb-%bQPVՔ2lI;t68Zj}El$\_tjW6Ml֣S߽mM}ȮGY N8'BNw'm926P'.b]J#NmEL}eX}>HylEnW,xe؄;w)<2 &w{ADk&1"2 [j7h/ \U蒱De"քg`\w+m WFtdLEs.Pȉ pzF *v.m3Eq!? 8;j٢ui#zSǯ tꕻͧx53_R5Tkl@"781Z/ݴP^HvӰl4h4f &u2GgC,9[&djwhRw$Ʀ3GB6"Y7 ߤAURmUUP t_]Sn.jJo?8-K=B3:JD~B0T}q<@q,/b߂slxZt΂ps(aGŪq2 ,7lV)}+}xPi mhj'y=+UaseLVǡɳU \~0$I\Լk`a}xVu ެ*"L_ !T_h\B-_${. n8Nns0E[S:OHզt/]q#8򕝮nə){ku ZU=uT %W8ѳ[hΨTʊ#5JgAsR!䙩0 ˤwn!Q ˠ  \I8pEkXr?n|%CЕz85Y1eov=Y|rY^۞)iϩmSObo<怤VKUDC_,q67Ð=qeKmC !G A{d_פ'jn1_.xPqP<W@aIre)o2b3m^c!F{5D k99I s,A'lRZ>VmPz+ťH%ij?í'g|ąj& CpBj4sՐ܈f{L|Y~ $ =:{ءlSĐ*;i~# \Ē7!9#dۙҜvijMqZDqm?4t]!8Ó}*8ZDZ!gTUyO(:JE-BĒl,n+VyZ0 21R-{K )8*srx*^1f]-v6Szښjm40R<);zAdߒS>I rrBP#+XXRPĐ]_Z"T;zx Ԟ]q܊&#}c(ނ,E{lͳUirĞd`0,P9[LoՃcEeܟ(~:bQQfaGI" 9n{XԤ 稘=W2Y;zO7Z^%d-ő&ihAe6;oٞBn30Yg[)d4NOVwz&VeM[~}쀹QJ#6qd b?C8ub+$d)Ϭm, %' ɪ cwF],B l9ĥ-kl|7ûG 0&z\ )9O@h{Y]YYe4ս1gڎߜwTX(7Keth43MsIhH(rsm#XNBdt*3L)+a NUJ\NbОiLPkÌ':*pn?@u"~lgyMuۈE*y2 MqmQ~לv3,b0  {o%|ӍhЄvOWZ "0%i)sXC4:r2n1xWh<ڣ ;bFr5q<ā( PzK2IHi(acEΩ y8l%R1 PGc K||SG[Kp,k4慭}s[cm:XE7]MOE&VF"nW'ma4dWxv$˔޷*AV-iGZ&zpх!^/_giV?b'N֜W#͡PX=1NBiL9^:w^D{h<`#tY̠kf+T<2lVD7%;PXŔ=]Lq{܃8j1EУV[Z\0$P`nkjU 7"'ڻ+?"0u, ;ş\.˝ l&)":,0nU8g >#8Q"0q>YgG"V: gY+ ѯ5~f!;dK)NZAMx]97{H+u m vIDI(<>MnH&^S4=T[|})U^8:MlԣF%"}2՘Z20{Q}$j3wlHJcP:fXNn>X e WjdG#9LJ<"E=碖1NХ)h ss+ePGp[9 zT$&T !OceZ9pR޸ 1\mDqߘXt'2 zYbF v-3hh+٬]C6 إ㪭A|%ݛމ52սO4u ԹJ̕{=nAR Z1d[J} .C z*pHl[y(20I^f(@!"=Gnٗ A[mo\S)aoe68 McP;WP)r{ޛ׿lD:sP<47+ ]ɛ V@H<ǶPKqX<4O-г@3o ـO(o e{,~ORQلۣ ;ϛt˗T)'6+![Eqê-D)Τmkkr*Ko& cm uf\{ZNS hJF̚Z[ e p6;tT玄tf\]rl\@ҥKt^ Rlz̄(*_4:6,Zg A<% 6oɫ5)rN]^sX<̳+Ci )'16{~v:7,犠Ɔ< ʖcaEF䊩̍iˤk]>Ď>%zVI QAi׌>;He.K!OBD>5*Cd66o\:UHߚ7 ̉mc.0c-=Dɘ#LRW?h%.aEˊ Ѣ<_po"7h_~wovR\#378Q";hI8fʇr2UCh=YT򋇋"DtwQ7 Z!_?\DB;[LyryN5jnى7Ca0x1 -ה o@ |'fvv=5bJH11ܫ06;&[E,14;Sc݌BD'Mg+nuY5i͑u&$т[(ݿs:qOX@sD-{BK/6CH??7i)!fyH|^}ʫ[|j sE?wq4; zZu<=u'qw(PB*-f GKTzcx.Jm8X5B:Bвi`cy ns>}컺YI[9*Ҁdsm[ 꼷7@\X'8?'–I-1fuNPG^bC> *,@B*([!C6Ctoo셯|ZP燮F[ orW?䌖a KZ6{ `)=ޤV-w_#S[ ~!=2NLB@䕢a(1>Uf,ھɣT_Z՘)9?|W wnPJonnS*t[p 3&/E52Mw2җ*8[?J5Cb[ E2tv)z t߮gqڴ_Y}̝:2j}>@ȊK?^1 g۸_VvY3PIL`HOo*VAf:w_U\ҹM6WQP^t_@9I!t[yLv. 0q$aDti/g m^KcᆗjI$8F[FqYF6;RO"<:Yʻ9=/wj޽P YetV"̶&&IY<n$"A]?qqw}rb,Y ھ氌6)/TfQ[kM–:TQ&"p!|7*N#8;UKvN92M%^t  *GpP4ݚWq:i{~\"̾2;1-^E+ B3LcΤ[HjJz38hג> 0^e`޸/}~2g$Sr#ɻn 1E)+_k$iSZٔx4띥mZ@mY.x!"S7%}[2ˉB' 6@o)8&$љ *˲tApfM8=L>csZ]kȇ˗#[fn˲cK뒗CZ#)#KU{? d4B;NJ &rej`A_CteX[! sI}ɥ%qF㙲|T[jWcQт"*J,Է3E'5D-Evٵ_BH,BU=4TӾ$N A>:A^+ms1h|YƷ$۔-t]:-+.AHW"p]a3%;&YIT@B>* |KБD/т5g! }kY>-<^=[٘Q6߷%rOa։&KiV34 BKÐ)2p߽h Jg瓾2^@E25opaa|YxxjE\XL}_Dhϼ>;ۢ=Nؼ [dž&Aόhn o÷ ˽W/9S sT -(ȉ(X`ZM^)ӆ\z745hx/i^{;RYWoL8 uTƹ$9j$&}p$8>o]0[N `;8 |6}{䎑};*R@sT*zt4ɯi[Jt[5;K$<M!eyDҒ҉?ϓ >Nc%x@BhcԅAzxȽ52 K=ޞ7eOtcCD|U_ֆ"` 8IHlYByP mwLkƵ%2 _vBI AYci3,0TzH:D]B+&E?֠qY S_TyJb2E3m`5vJD^Dm50;KEͺEdC?C ܻe0N3|Ty'a3!<%җg#_ɔS2 >a27\?`3~}ekH=w,f-ZfX@8\c9l&`.^_P/p1) d^V .W x0~(d6J94*ٍMݽ^˖. #`^>uY*m~iT:Vw͊G8X2D"e>DFT _*t#ޱ"`2!CtG:Ed>YBZ /P?9g`@x&+M`1C xՓ1H9,Hi!PbYe(K4TsOY - }K%V-`Q+}WNQH'W xr틢9Ǩ^A&$>ޙR0;x.Cvɶ `.YwT:oNΓQ'=] ) SҥTJ܌ 8Ŗ_OC։ơ=[6'O7f3Ǻ4XtaWTkahpxchjŬ5_8|3׎wXxHjo n6} vڧ4a ^oѡԉ~@˔/hB|0BLk#⥭f'ɥކr#6/m`߆~DnGၽ8-H{Y^.@*M(<_Av$0+K#"OсguVշ#Ruzlh|ӹٝQM?b.]pIN*of^be[q7v`3CojWX)O?dE$Fg^ٳ66O8EqE侖Օd[;‰U*n`߷@ )eeJ_=Qq[te"a$ӳT%.4(7@X}Άe8"M9xϩ;?'}Kkb@W9P富B@x}_h)H[Š !ɲi"d-jt̓Z@B3%:RQzD"- z##vct4hφذA[ }b UăT_ 'FOaY,d2zy1QIn{nZZݎ7|=ٔqTZۡ 唩n5!qzXNg"wx~XM0ŽMi'W0J? GX;bXOĕUMnrXɊct)N|«Pu><Θ-2S}ed|aE'`vl"dл+~\˵=׌̿=*ݭ? " P>6u /J q$+.IZ#=nd'f!$E"AQrpؑbY2+"  LzmtU ӫc#rcw tvk{]9IT-(]pj9\ ҭrmYwb$Ki3(U4ncЅ{Ia.46w"A0VtPC>:MLx¾%;d(E?\TH@NvnD-H&mj*&N 1D2˴nn==,o9ED+UU'/M7kwĘY//'1gt~Y n. oڡ?ȯ w[x+f¢F/SXcr[uF0O V}cUwsh @>e\l2gEVv4nh5o}p(Qx'ۥ]UwB{cx0蠼7?wY`VTG4%% !E00M^S 8uUa;i5T+b\YtK KN`eH$3O}ƎLdܣ8 oF|k(7Ub Ǥ_,e&RKgnr@5@PӦ;"m`ӪOc[q T.?> ~{'@m1؀#`QžPHvso)=:b\xygrTԽsEO/;2@ Y1$Uv8}x!1mtQjσGn;Ue5M΄n8XZ'3E'Xn 8.%Rb C´JR[̶g[0K2s5cKq~G̴ĪMoY')W)}Q8k=ZQ* ,Ԧ#ߤ/t--n!v*h -ݸI|ձbz/ۤӦ:@>a>x&Ƃ ]/zO2$6 §-hAkQWޅ;%)g\ҵ 2KbairEf:؉埙u#t?l.IrxH=sr_Eb!rl!~U0,q)Wz:vbȕ"7?IUt>F+G S4kDxp\JMs\ \NƘF/*A,&w+ƶc-δ앣Y^}SoB!:p㏓ߢiqՕfբ8D\ Re%ma{`.dmHN#Gm\=dϦeNimFcjYG :Mj(nlE6a_=Ǝ`;^hjc{|C`>sv*(Mƽ^&54)sMi@sJ%Mk"N xI('ՇE?07ڵ0 Ac9/RRUJ 8#?a{Dm ԅ$B',FsrV|gYgBG^H `整T' Y)0}mm/V0vnc\aj&Ϸ,?llK"-^/ip%7ܘ"|f[$byn6Ϻ^l/'X/LiO91hy8w7&LPukhIztM~raġB⥁mrA׾TGd * h\}\Xke?{#nw$ڱ+< iv3*N+%$' 1a"2a(9ttPTY AF8A];]ub*zwЭizEf |jF\s47s<` `c6>*W {[8I$7).\fN},s3ocm- ){K5Qw{乁lԸ2jSFtv6[m!,"=6=Xz~2mgqVRBلyߒ\e,VU,:O=2sz?3-*- N Vb|:D&8rgXl+ZN %h|zqtڳ;Tuu8jD|EcqTq)\ 4 ZM\ɗwzj1W oqYIi?>輡[z14hA {|@?w`oK^b+5E&ݩf "k>TVM3`%^'n >KrK>U`H ^Cc#Eun|-|n.{*+LCXkŖ0ǡ:4h[oY!8E{}եu"SfgςU h;:ټgg4phui5SR]fj3IFӓ*c|ZRQEZ_|XǂMҺ5ߌK_FEִ8Ѣ&I˰~24&©xYv^ޥ;E;/(uP|"#Pr u%u7f@\ʧ+;̃ϰnUe|h15q-/.ecҋP`V􏇑OoٕStL,__\`;z ff5I}t&Xw5u/xw%ZU|QX5ƻ NiBֵCP*v(Db롐{ ɕ7g{?BO.)2f;`=Gho4m n"3R.drh΃#&; /M#Մ;Zq^b>mKf8@&$kE8,wq,YFXDvr>s;: O<Ő][wI& *}ȕGm[{FW!bq*eȽdF$@XKi"@:95ByWYdn@'hB^ī,$PH^D˥X~|^K"="3}fbW`!800G\& Y6|8;ot!rev= [ iHZOسpk(Kv `Q6S{윯?yWєխrм,".A:#哚epeQ&^ˮ:EB&JZI +4}H]Áq\mSHK* k32?+e[BC%Bo&%jX!%I07-#M}GϘ%6'*ܝ4fyRzR&h7 c4<(K 驇5m8* ͠KrԌ"5eFgC D2_+ZgjPd4wXW^J( 瑴-^(W|2==ޠ9bllW-V/<Ծq~Ϲui ƴ(N c4E6 [?z֙R΄ vԊh\ˌ8M֩< ֣z4hxq21WfYll8*ƁM}꺡.U4';>7G-_&Fq%Bܬ1qxk[Z1GJKO6!Tz8K*,=!mnu$z,y- |h 4rA4N- lb QΨTH>}GqAm2&ՐpH+PuYLxKy+$@}R4M̳4r0)M _ -6..R~j h@iF;kDV A(9]|_OC*~`< XH5NF5 Ƽ,>A)U/cWDnA al Eu˄qV;$2^KAr[D}zgɈ+ Ùi0RK]N]}*H=.=Mm +1>Ž#zDC~ȕAgA+Sp gQp)% 8WPф\nC  X7n;YU&% 'ʠxx[W5@gF}CsW>Ϯ1}ioI 0.V;^UyxڏR[9ڍ[&Zz2i${Y"y+#zk ٜ_HdM`h˥f3bmJ6qCwBE1>A`] 4JAS}SXk|N7Nek7UYDDU0pΣBoF M{/X=ZDAW_^~Dz+(*@Ko QE$2޼!qhT6Xhax[Tf3CScF4D#kؾ$1R9Z"՟ymf~DV1] _t9(LU܂lnU2ݺeZ ):Xe Nۭ6.F~V"wvH| ~lS\M[j [#0 Ox# $8c / \QהJ1-}uVB@$/Wp2T{PJ@s9Fp0[H\^sKOS$DԩٲӾOͩ 'Ls1De$ؽ.TFhb޴wɲÒx1xU`EqKU$'o,wBvZ3ygiWG7aX]#kϾ;^^b30[^4>N::޺gέ[0HG/ftqji S/"GK4rv6}ژr#Uבs 2p%I/x46^讻J13K?gmND%GWq-]C} q'j~f<.)x6jKȃ' s;m@C Xawl>g`_Br-"n?7uxyƹ>u5ۃH5qr;osTԵN=:ZddwyXn@ 5%7&zL!YnRn*t;Td_q㇯3?&UȆZjC}/Za&hpӍвǣBІUԅ`VkڱHe%0qRŅ "5uأ&=[ SrQw}\`CF \ XK`z $;rbbL"L $u_!}S(.3}!IbȺoC  U!x lmKpS'$? 8N$go.rl$M`@`IVy6z2՝*~<Bt&3_9Gvl-OuK5Pz,߃W EF$aa%rf&{l-kO\SBG%gl"a=,9!K4FAN M|#Qsp qMM*pt񅒞2izqz<Q?#j֬8%%M}eJpiu8z@D=?ZLlrַ9]`<\\M/b+b1kXLc^-nro7[cVHEιq3"r:lrgh,4R)\ݢ֞XPi{-sƃ<v50FnY)N$[_oV@?U"w58@O[\ʂg߾38m ``7bIP%hYgKpRGm@N\  "c9ohnL`J\$jht:̮ǴxVAcl9q8 |5JuPPРK/=J+S7@{w&GM$Y+X^HOn)jSSrW\֪ 쿉}iJl .]q&n!=[\KԊh.CUeKZʯT(ug \e /#fVfD*hhA)ZMFptRKvD6K UKnܨknZ.#׷J֋2fLwrKFkH1O5ĉX /EFRX2N 3<c|Dmb[gۣo4 քtlu, }j fU3tbIL}%Y*֒1R<|=~&B ֣XR|Q/> )G5~F sjڃ[Qu l-DOԪ ̎]%W8 $ ֮f_22\h3haEf̢IrJ@9:GR[j&^^H{?f"nw5ճЗ='4H=1(i|3)<2";K˻J[#R"Ӎ?6ѥ&,bvvO4u23vUxIZ s}C/D'm_ϊ($WTt []J=Ԁ8Cտi6_Bh2%~nv$v dOBʭ3x? |擘aLuEs[@cRcE|%x4 wijG\I#(@qHV})V,p Wgzf.ML`R-kOUH)NkAjG:ge&p 2oaS,τ(FJ>{~ O}); Yrp<# 4[\A-;m]^SWGBf=qR;kO,Q4ߪpHǝ~t94Dqƀڎ!eQf,-zר==TQ G,"ezm[/7ˎ{ ~Q<"4@÷/;ٯ["m+:2 pꌇܲecsf2:a>cGP|^(mޙTf*g!e{Tv~kfuXx ]Ej eLMY%gcwMZ]qOÈcəW]sA*65T D)@:W{zk9>Bzux^a<zSK=Kl#~EuaAl*ɮ>[Zr%I~ФfeݚĆkK}`$uxU 8 L :'el8?Ie= 蚖M syvκ،>lX:j\;6ka@9S4W!dVXiʁbbTh 63/N BğHvsbP`XTF9TnCX3c'uX4>?<7u2T16!2=?ՎOCcjN z;y>\z9AFV5R? ҉:pŽkI;u$wJ^%Ek'{y#3T|E 2%b%m/op+a2|floe|v 61s=#t<̎9SPb{,ՋfHebURMx a nŁL6@^`?-ZH^ܕҶ`%Q(nHhu."eP Aבp%Vtm*s5t 4Ru]Tj3ph2m'Q/3wSP>1Zu9-..,wc;R嘮Ŗ*1Ŷv@VȑުL,㣜ItWKc_2^0a[qagTvͪ1 ޙ[(8ȡūDǩWjk.p@?wr~;JݩET FAm`A8p{,q/ $̦%D2/uZ+n$ ͍\i{ `:A+ZD0x'-RS? ʲpxkBrb:f07'jRM6BK]2GyR;cgﯺXXH 9y T1A8V4R(`SKOHsZr>+l9 :#֭fF/YF{-ЪtlG b b3]hّD+eΛMSgw@Y9:yt:3._ϐJ\NuCAc TV&w &jm@ލ{ eDt0s3la1mCA4q LyeL@Ŀ_,p]X'R,xb΅f-ㄒx<O wF(&m [*4hjؓcn3Qa8;MY~vl OܿBΪ?:˜A1N"9.+OU#^nm~kdG<+ S`r{h=5ԝUC</+ټdE?-f@O3,nL;; ) 2]!SÉXc 9Sh!z8o2vu3jLf}Tqm,Z+~'xJ[&?> :ZSxEA6&^U᥮zH!Փ=3Q o1z~ɗ"ۇppd8.+L5 QƈNY鏖f!{*gë[~1b)x T D >ʠ Cd/47s؁(br ¶O4T~#:Q̐%"?.A~b޽qW!V3$QȰ {qAWE *r|NF }9ߕ O"aJ #]6b.[g4pDUp&9`}EqeSS)f"VGY okf7 4o:(-.60+:*ׁw}^;Dţ-7҄*TEZIH"4W@)>c-a;:mY?&DÊg`[UϠ#XA^e7~vob^:-qkMP@PK݆y3 Ը(M.US8{r=oXQGSTiesSGNS%$r Kgbmٚ Akl0\J}5??B(s$| }GsŢ.<65xsQ/?g*ꟊ'<U3ҏ`A>"x㕠ŭ6TBI[6a<ۼ\YζDd^9siQ06?` ۔Nϙ=kkDPH$܅+@Yx%3Q'?fRFFh}:~öt FF}QfhՌgȑ˪GE+vrGG,`fϠ6L)Uz(NP$آ9v?1f/ZXThM6_,3-3mațzjZLI>hU! tPlvtDǎSC-;:Κfp0f P5xﺧl| \JNA!Ęcs5@-)I4FtW(qn}~qR{%#=8FOSy 1uaUvG$tM“>MGZ5a%G [^)FMd 6oZnt:x#y2٬U@ķν`uZQN# 1fgn$،`{ 1{#o|'~;0wD HݹqU =H(3bޤՃDGɀŹ@s9#iS&")mkq\諿Q=#`5e_n| Hh7 !;ĖawtO….rzhF)dr֏WbOXFzC0K!QxҞُUjydWw-y& N X~q,0n5^.˷ 兣Y9@x8'+N$QJ2]C*&1,ݓ|Bߥ 6Ԇ͓0P.$=R\ .@ܔ!anKނ2p ܐ2{+;8PL%+cS~*t ec].؀%|3\X[ҪS>ܤ-w4eb,%~Ow3!NI}?^Xȵ fai B9h(z\~7[m|*$r)?fw{L W! &aPσ:FdVqS݂ ; AdXE zM:gr0 KFPfo%[Qj):\cM;.Rz&7.2wNM-:m;T W,~*bЛHF,+]|sfdn ]15ғW ҄c#p dŇLUf] ^?|Ҡ0[e!' <>W"}brtC9r=< qˀ-r]A ^ 5$ Y1u/y9w໓lEG8!ڞ3`]"8@{"@ҥth6L5e֬2Dz o99"3#-{=`TVǛP|g"V/uaqFe'D_tk`&mmUV &_WegsG+g+޸'IZ1Fߔjr 0{aoz1 woϕ(Eՙ67KYSA:VyRvm%ȩ})iPt .$(pM%~bIP$?>eNXP"WFO<]C]/}.4v%Ȏukp[ x]#VAr,rQOBȦ/zĥ}-]W%+Wm؟ J-Y$pd=v/͡|A.JDj)RP܏r㥩Bsr4I nʒʃ*h`\P#D‹ZAfti0iY sc{*z7X tS|&G3E^;,йJs$V+.m_kzN $-"nat ]k3<M[w݌G}b&5]1< {#/rW;Îi:wu.h1PBhۣx&/ɚ~DHW$-`Ftgm:f*2R O;~" c1ݝL2b鞭r2m| " _Έ31. 8HμR%;uzK][my=~.K8|qoW8AI uv G[w>_@9Y#mdj%5; =q*z,#C(ŷPrI~7=D/:*X_`SuvdmbDHɑn!aHOȷMI_篧 [ lJWŹ>xAT7,zCӢ7mwY0qfg|Y84@LuGI_9ڿ?8\4s!izjuY晎hL!>QGRiW s%XpR'@O+(ke0(GhJ{"L\_aУ 7b\($?´b|X~V&n4 8eVXreKU?/Cx5hff,fM_T-4SHYS"?5z&NM#^k}B9wK![VZ~2&5֝lY  6UFQw[O6P9(R%3B A#'\O= P\SNY(gu1 $uN_swG'Z* zՠ^P#\(7v" i0mcgJ*=ᄜuoŃX^$2*KC8!yWcuP4RD|>{)Č hnJ9gq1D]c"B˽رT:I)ӝ?JbAo]d&]Q[<Ѷ,r]1{K݉}g2&$%bc~TS#?tķ RԮ1P:,:;~譸-Ŏ %zіmfo ײV`WmH#ҍQR @P2IȘ1uDeשȫPMcxE!3w=ݮyEt;.M%fFwY= -F:.<ʞ5Ajp-)M e\['^.kx. pEٲc'm-̺,S}f'Ҡ*C<CSj\obשP1fO\-+һ{NJwYکF(NJjE DLYK৙bר\=B*k <|x3dH)6U(|Ѭm~]KoƵxKm}/͜庋4׌'`gBp)ѩL {]/"> }-rVa VXa,R 4^+A8_#AG$19-*jJF+ bWء&>VUli[;I8^&-;éQtĚ(ӫj4 r1I39 X.jB=c~&M-Z<WW#MDm]u;P²UU{)A޹I %'&^3Ìew$3"aLqPvȸw2:$ebSP"asF{Ee@7{" T%pjMTrkhLAC _ETY\Oٺu x{'׬FNL=u;?0 T]S KЃUԬ'k}9.QQTZb8*&u?jKz$v"\s;<E12?;vIeS)}^O{ y?a$6_:a6vqjؓfg4N(4{O.U7>?|o{zv{yt`eb- f8r\p8swTT'aC~n ʛ\wJ3o{ ʪia7M>HRꮸvt[W*COLf4`H{-]#J$V|ѝNN8t/Av*Mއ*k6)U jT×"wFLD>`(Ǫ#+e CK\;P}R,幰5^m4ɴYAy+56 3-W ^GKXT)ݫ]WƱEQs:5kR){R~'8,`_KC2'Y yJ `(X hiԠ"қ1ϲ'>">Op~ndOJ,ezBKQ5W W+ёٽ x@  Ge뿣p׵DbQ}0R!S>0p=U^x&!+aX ."]Vl)rjs1%m݉)ր/ķ1>Gbҁ$>ڂ;\oSѡ^|" W"Ӯ TuDfgrz5-.PMsʮb2m[ᚪZɽk*LՇف䫼@Yq-'l۩qd=5IG)v4B]/O2qh*53\TL=ل!`YPUʜfJFCڛyKF콏ؽ >}6%W3xg{ DBsWc:2Ɍw }nuX74B/'+@tz>ioqofGy *֠p!BҒ яDj |m߫>JkEK:K۾ܕSQVK{EWJ3VY#̀=s?2M7pSc,#12% X0}q F.L4-+P`9-IJ%L^EA Ϗ-dRQqB2]Ө"&fPɚpC.ݕ]1\~auJrKU(%@ÎU*Q-p3tfXώtS wܼş$w \tYŹ8e^St%=ok|aΉt+<,G4M.NnYE/n2|$&.~~6Ic[; }x %(m,H`j;Pu@ ?!E ư̓() nr2>AE* mvRLXȮt@Q1/"ԳGB(.){eHMKD+j*}MRd"?]k|nްpm[锪?z39mf㎧1Ae9#˒󦷁!qҀ Oƻʀ6  N vXwĴLIr'Շ3R'aWl"Nlu2s{)aDvۆ'}5#Uk3TV .+wy2b- s2q'Be4*2ăRc^iVV#S#[HC]OCdo^LB+RjAtWd*i-7bGxѿDPV9% @I?aVRq#YFB@Z~ ڝo?2G@ vPR !$-^:Z 2(e0 YXv;)ť;^m f9b@HQ "up[RZM_-@YȄ D|;P}<6,Y' G?|ګlo&pIYվKrAVֳd-AվЛ Pt #CL+4ī~xEvBOPf = 1ί8aZ@۪6rHDrcGxIȼHyd(oBGF!*/;weҞSO7MyTÞ"KPVfr$pob.8N\Ipc <"AJB'jrcH {vq:{lyjWRfA4uט#Z&zs=[?d5ÊT]n/I3(T 1gQ0 CrCH֊pD4H~U G" -3{wpXdZ*LEuΎlK[Xu!k}tA'ﴨ[BGTkMoõ6(Zz)M[_5D+p4=v׏[*ޤN7U(ⷽG(!$VLc6t-p -*@p[_u=gXa2OKsF˦qʑ@4C:╚^$7Xt9 ڗN> ?MSvYr7l;-i{}mhЙ_4JO+ex4`8v~x6$jh^$)OzGqNc?E} ՞bX7XiK[9ƙf!{q6v+JBw["G3/d?hǢ=m/Ր8j[-l&҇Á lV'x)c+nNTi>yZ2 p] tHh4Z-MGO^qCwoZih U%dHl.S91]2cKrBб|,}YBq?\;ьp(asJ/]~X*R[p=ɏsKnj;fPH>. whUA(CI4f'`g_D{U7y'!DSMSn02kpy StĮ=_}jC  ģ7F袴o: Cy0O8xƘ$T9'3VeY\_=[%rVӱ:`yA?2 QyمvY+(OӠzP?U xz-zMI( *]?bۅ`Hji2`'WsLlLQ4Rz<г _KNkyϢcW RqXVth-_0:!!1E~p=mo1Na_sA]̄ ,7ċS!Wz Rl†3u[U fmD {&%A5'j+!X 5iJNP_$T|^.Fo[3 =C G@@=!۝.Tv{힁$l%}eOE}*FWi=] 1ڰTEn|dsZ{Ѓh+x3vU" ֏޲4a|asPSAϬTvNԨ|DW@H>b<@/˧y(77oZ|7MMR_d2G_Mv0 &'%˿W1˹+Zj :`mW0IW lzrX@lW)E256ŢHzb-} S'VN88rH} m ~L` 9:q(\.+pLAF7xʪ6EŞs#ԈuvlTGѠ%nd%W#֧\ң@t"h@ל2Cm81Y~EyKsyL;[l7ܪ: ;] Gr:v95}C&Ķ4LNp?7F}CU)` X9ͺpE<7!V@ga:5 !X^UOlx<\͇ =mO4qˇ{䫩-nNb~$΂PvEdj0w%Fدزr>~[:7"Ǎ*u? h$OygҬ[-Xx4Lua^s,&JY0zQ6 ojG\B9ݵkKkcl˂C1b5`ʣF<0>(1l(KمPԬl!ܨG 2@Nwuy*IklpR. YEEjfߛueCiRU$0@ypJ-eQ>?Ÿ)Wir|f `QɇVٙul亿Ը9͗ OS}? SD`;u2>_iY4Q|SE*7^!yWVf;aC' _-WIZ2b&=h0UY<ɏNfKp"bkƑegVg{FBk*ms:0`A臆}U2> 0m?^5>Vkyo_{4-AR:Hsg[ Hgd|9"Kn-:SWЍqpE;$a槐!rrD 82tA̳vsxF.Gy~DPmL*2ŸU/w~2D#aQ i)Th=l@ (:jځTbփOXnjnr@0 ukŷ 6ӛ`Du )JXΉ5O’u׵N{aN_4 +wGIKx*zmR x! qܜsNwRAfV%Q |?zU붛NgWI>؀Fv{*3"2A;VLEvBgc߮s'DV}2,>da'腿6⌛ࣷQZ$"<}F4&HH'v q6.j 4[6̖NC@Ábmn^+BmbcȩINt² * ӃWO9(sRX[7?׬xC.$mtW4!$1d(w,PədOU+1^ZT o߫(Em.BH@kEa"QFMyJ;WrkyLP'']c?& ɎP-2$4U7^)QyghrACٕۛY|pPsU=xK icuBԦ>i=WEgqUm[ܐb0zlZb^@!K?XjH"}Q0dwfɗuMو J pV$덗{..6["9;+NY4B@.9E8vJb[W b*%x&g2هv=\g(SRNNLQBItv+Uۏ'C.~7AbZTl’iG8)P#F#Zy7RM.-wfVś !&E0۱gct^JmQwπÓ-pU\x57??oi^YpzL2];9{bѿwPrRg9j1^OIh:= I{FC^C?_%.`ef/Y3Lŋa Glq);Ў$U G$J>x ?Ãߚ̵D%5[/ѵf.FfW-`9DlGJd]D٩G@ $XRvRqI e(Xւ{W)⏥ޠ[G2Uh _^0Mt[݇'+=Gla췈4oL/nKg#×V{onBHx Jp7Q\I]q, cPjy v* >!$ȪCE RDups(` 2:X,A;O9.e`@}|!#NpL JjX-/V␅~GpsqJܴG!jzȺ<:;)jp:̘$)|uuv_z!͕ANh֙^vbh U5m6 sZH.gtw~w㚆n%6Cd? QV)3v>5?~S1컢ȹ$#錭9-2TyA9z\>9߼o(w9bP؋Hև-^P}c;N]0ݱw ",[Ÿ !\2RŋfK2j~pLؤ^M8d_NA~m 鈹fG MU]N^Jyuj^vS[1֝mLI)>,:Qk NKH-+:g.ZS+3 nTTܱnp#zxzuHUg0L(0Ě b DQ܅ia6Om7L6)͏Y+5t0r<{-+^% toCNT"5-O~bxs3@cgaU#y`gz/2:A='K:WL1[$z[Z<7ϋ ]dOco ym1: eO SHnՂ a `Lov%BC6 [>S^kSuէ ;AH\&tSP*[^\&,`\M[EjdtZWQ h Ed_&fr%p@BJ-O!OIVF' 7̢J,{kT0ȤmO~xqcݿITּ}c?aP%>րu-9s# P]_#D W=G-x"o <]SjDf^7$2XSȂK tD.S]DE2zt]@oJhޟ'NUMgI/ qg`Dz8Ygw'ca G٫#T=sh4=B'UZ@ vW`[2Z}L灐QG"습',ͳb`S,iΥX~DZ`t16qѭt֠BɞI 2z6/ji&JN#f0Cf6 D {5-_Bq oH+s'"nBOT^/hZc/k[M9NE0!DRYȎpV5M7i;)1H/l[Jo&d^sox/$&Lɟ1=,W}yK?ŨQ< 4 ,E,狤k]7냨0Kfi'*:wlNkӻ,` OEv>`xTĹLI0F^Jje\;Nٖy>Sp~8؆QhPAgSxf44奔} ǽy[Jt7~z|:g"} 9+DҸr7wm=P~eu+|$ڤahTc9& Ɠ;Xp瞮bSH0@gg#O` 3e`+a?JY|g~Uz=Ԁqbv_qi*,H̬{n*?@ ۯ+%WղȘt꽼mզ5&α%_D&x^MG'cU[p/2ۄSn.Z "ROZ'I*N6Ģox`BB0 Z0:[ irEaVSU7vt?*< hƚ~|^d'$l>4X(X84ҭzr2cikuͱ uid%2k Q=K3ݟ;9czڠDoge<7ocB8.BV#2OD Yߑhl~`1 Y@z ' J{vQFjk7*}zco6=AVQpcu)6׈*cc[iY3&nWѱ{[~lK+F[(XsTLΈ1tlZ*9_ƖmŢ4 t?=,0tcBÚUcAR}vkh4P.ɧ-f1rBzZ\{-N~ @jfg>GoKOM嗺^S_sCI9 :Y#Xc:m5: q4*v2Ty /Kc;nLHD >QeYVA\z4y0af?^UUGhr+QMy\²b-;j'лQF<#>fU<0&AąYzpq4  KNuJh'j@88|oW4!VAI ULI2r6!FWӢhOe02yb=i >(-[,جN;kOB4dd<@=ݏpfp0H~FݕE$g@)r+St/Y @.( CŁ1)2%WʣL݇ہmtuOJ wIo7ژ" ҫ=Z-wϸHJ*J(GӡW+R8K&c1rݮvWb'tA$h&pcF6AM+'%wWDO*!ht]2khN򏈇fFX޶?Ф~@=/C*lUb@hs.yA%%񚹁J*&mjҮKஷhk2b9O+JzI9n|,\"kۉ뙝V~ @Kź3Cӻm:K/T*%}(g4g`v:L"uh'}G}8%*YZe[p(9㔼5k*b[,-3T"ϑ/}B8Xv:2f,E))"NBfn Y+OEl{զA2QD1"*zyf_CqNL6\D{p}]ļ JUгldi?s!͚^6a\՗Ѓs nPS. VbyR)퓃1\E0P1Su'&0x2nY txw֧ih/aQH"YC5";δp0;oEr4t8$\(HϘ:b)iJ<XBRܕd@p 8#baQHseʩ_]ԖXQc#@gx)x^m\8]>^QDу>$Cy]߿QXTfzYn*'V%9viA3v;O-zxC`)yÃ?a-fr?YZ볟9U )Y߇@B4Shyv"D,W<FapS)jLH"\!0Jr)t~i7־5⤱q`wz:->WTBdil zAV%8+ ճv;rQh!} 0Ѵg,EFj,p#Cev38U^> J02 sV&%UG'>M3`eEYk ]tNZ[&B u&_"$!;CYx`>D{u, ˨h,zu=CN+rpu{H]͝cÐcF+ĊpM$TsyX3uҴ xM OOЫ" ڂUV-:/մ-R8.|lV*=uȘgLk* Zy@#Az2>n+BhSr_pt6VXԴr*-{1"-_+sf ltVi,)3o:XO|_ Wo Zcj@??XaM8UEyak֨~?ޙLC[Ln6n9sm53`Փ K4c}YKGLJWpx_G5C ?d^{b=b{ֱ.LE <ʷi%K|&d,ۏUX?>6ǀXcz7?LE0\Ȏ\?ZM{ZY "sq+c5v6{vRR}X{VC\5c EF Ke:y+3r%.7'1h1!bj9iUw=p(9&-j&N*pU+qN'ɽEMw+[_[h  E%Wi2NV[No aeD;^u(6f'(R>w.z0-L=Jف\O)~>"UJc,Ekk M9[̷Zg JRm,V2hڬ9<}?GL)talHj72K] zEUWTD+CT6f73A"='oNiIz6c* 8X UsS ES5do} X ǖfy(]~$ ʯ >?$oҗx%kq ̟b7`;: FU6pg]sҵ~>U݇PхMSC=G#NeS E\0mmBCM?_ϺN19Qi"LC#=J+ע;ޤo +xA_)/RnxAS5 l7_2A~N:xb_hBN Qͽv F9q|Tee8njRXT;cyqjT([N{Y5EGtL"k '=tR& R4l"jSٔMS/9xm31mv(aਕ:]WqlZ.G "6e[D:,]s~3^T@Z'TOqj>SΜ$pћw|\#TVׯ&DrZI)5/$ %gY1N[ʌ/kRIkN^5aSH#K?vwK^8}\4T,O!;dU Ǎkz&g1p efgiTRIPF ݱJymIxnh]rvFǒG5O&K D-*3G(zf_,*ngCѱ-R*޸Q,c %.6`mZ!\9bg>/}8c <Њ(aMA 14!VtPSk16ҚA/YyهG(=p78 }x+.I䩔$D%u[oڬ=ly^.B7{ \V EK3a7 >".Vyba}S{6z j*s (9+(C}'ΆVHp_8 R-6ߏc wj@;*-XSUXFAEKjqZ5\a@3ÄXwntWgUbT|NjnsN뷇,ѷMT~jPmM @LUCVO" > I r{R,~#gDx*UPLV0xQ = S\ rNvrumnܔh|mP|U{jDR);0a<͂ctz  􀥚Ol#>v';g$` hT7x*pq'V_qGkF܅gn /ScsaO;O$4 E+(Hρ48ŪK~ryzS3g5j9JZx4, ̡\.~W&ƅ?c9ǡ&-HPDc"qCPrqSY!N! d}\]ӓ qUwJ GkoNKmE藏rnxB&xgZ>Vׯkkё˛}DPqqބዊOzTHa"׮H2 lJ!p{ Jh *T筅4{".*&窑)ưz?M%!> o;UCWjy'*($J2H+Λݺ27X ^moZw1\we 3ۢ$6rcpRiEO$ݽ U&3(0L}CaF"rf>Fggzo!3wy5L/K.?x,G`fHCKQ6"c:m%O=tBr秞#;[&'9o$ۃ3f؞b|_B y/)hQfL:~wMdag˺LVwR$s&YoQiT F(LO/tF*SUTنMdY?.k?;bh+ K@T`;X+g2cS@ l&D{mnhkjyrm(R-c dG }RydՄHu(QԲaXjFadųP{VBeM5Ccٺ۞ ͂;̯͝[UPhúx?,ͻҝUָ{VZ5\@0EC\+ H:lv 0KLa9L^ 4L8<%vHEF}$H=92BIx<5T݉%9wՎϠ$t%dwr]K<1s\΁| K'(KL) :Q-=ZKX?ڊx*gTڜ{I$G/&}Ǫ ?#;Al~'dIqA˃F]- xdMb1h2Z޿dkTTAqYɜ2wh6n0x^,IDekDaɱ3k 8hUvfvT-B_B0 FxC_sH<Q*6E(U3d%9ڊ"j o 2'lFy^ ]L*5WkTkBAHGwaSo_* r7tB+8ܤIV5暀Q ovYIQt$[5HiP=HJJW h}EW.ÈIN.1S=TADU{%wdϙK'>Su5ܞOP&ľ3cEw.=,oc 䛕)5ꀵhtJl&l|M{#~㤴|#O cy(tB:Nm6 m.b's{z ?EaRZ@;YyȂ'F^^Qh^ckzɸ#QM'6rRew/J +cF-e&F,07葲90>k^#{|x=_yZhn]NHսT}Wa=p-6L5IzHEנ_F-c^):.g6sx@FK͚bq X )s-OUMy<,9cf[Oj1aLj:; h`y[iOg& bv*%H?aYGYc̤ȋ*m;%@퍼TxCj+~h0<:\p>y*.qZ$L 2¸ HEC~TRQ ̘K^ ]fh R)Vgn[Rڏv" =TTjvߵG 4TKp陵{ ʹ!h8jNKgTƽ~ T_0FZkElsWo&.c]2/lQsQC[}qZ2_ՆA%XFDU2e4]RMz[~޷|ƽyMNpwiZ8J*zaŵC< Lg5^`܅H{ٖ@׳|fi3_{ag?oj Kl־<lQG]r J{cC g7AӵZյ`uSTƽzN4vj~|WJ0Cˬ0\O%u+˯=b@:NHA< <Ʋ+bIR U)4;{Su3YBcB ˷&5ߔ<- rѨ,,6Af[H9"!wDjGX5 G.kıOH7vJ& 4 7TnIR̂;},_B/߫2oGȾ'qU;|'#G:a%kh9f[}遬Z5DT\(gTcȭ/8a _r+Fe${veĮ S63Fqʻ`8Xf6{fđ=]K;,/@Tj2S^E夗ɺ!''(hnk6Ib$Сy9w$P^M=Zp18%3~i e蠉OEdz򎦬w'8g:Uڻowi/ t?,E} Vo"眱ITi NmpgF>O?UQ:)J&?GGxU'o*d[HGn>A}=$[@_<Wknf+]T VG0ielO*ԍGG(ltjъDž^ms+ezPw"eMHm"q?UHEQmjZ5u kS(FW;>Ƙ.fߪr7*kofckYMsg*qi"gi z/l#OTp_,QTG K5kDuT]I|`dN~5\X)JXPgb!寙J݉BLSP`軦O{=(Zgr4\]Dz-0- Ƣ=כ]hG~m[H[]qKж,}hRI*+S#>A\5Ӗ PQ+,";%+wt0Dy)pHc .\3in.;7<~JoM>v,ns#T]dĵ cu.}R%%4PUvC$ :r R=aMнv/VkKI58ms͈Ŵe@Erl'P!{aAE[u|c`+k6QҜy>b刈Nz*_f"UɛCoDu􅦞 NbD #ѝem!b;Ydۧ\q JVreYusф,x |ƪP!uE%j( /U%"Ʈ{~ЛFL>z@,ȸ\ C{k:vmyӴ3ӛ//@!m|+_P֦Ur,{VUo!>?iP bQ,:6bI3gMY hPF43\fRlꄁ5 . (|\_}+AC|Džݞ_ Wt pZF00 x?P#M?1*)Q,+igh2H,!jSP;]{Xл{*͓c7gV<,z5&-gX0pI^j-FqqeN@9Mff}M>eA!j] $ 4ήZf6&!S $*}et`uetlD|ާrKM|xD Xd+?Mzd 78]TA8ꑮv-޳B0#zF,]HX(ܺl֗ONo{o;l$Ej蚾%/?/;:CUJH2dލeo vx5{0RN5y096n+ݲa* ,J|4,!v'9,MNPYl,9fTy)t;ݫ'(6ihn|(2\z0.\rQmq`XLFĿk N20; BNpF_8 ǀ稳(>#>2,69@)z6 bU(f**\كB25Zl ]47q?=A07. pVw>:l0d(T«`w!FM^!;3F^,λ-.ԃh:yå]*pe1mUKTݵwa1]DFӿ7AF%?NElz`hO}4y.AJ 56ɞwE-D{gD'WpX!ж{] h9CIgS yځZZp_NrϚЋ 51gK5Cyb4D /5M0ďO?yp[.?8|+Y1rZ͙[Zb&|/:m4i E /0^EUx8& `]ޫʬS$}, %nM*/)/f(\K,[)>M@7B }dIⷼϲJ*ɘ)͂m{o&i}#:DʕqhM77vm'?nӕIrʹ튾a<۽AGЉoǞx`zs8e }=4pRLcwj 1 2lQer 1.~6" gqB =ؓU0^[cgʏYc%8%a_85\еVn_ǁ??5J&$SNeJds-F)ZԙsDvۧ=NК~( OgJe0q^%ɇovʗ_&A6kRЦs^X^Ğ~q68ҩt;T"\gq"„]qǩ#QhHMAKbDtD%G!}|6&gIh6H_Ӿo[ؐxxHn"dJd'gJ3JOEEz SJڽwQFկK~6cO(G!Ǟ}_@R%Էd:Y2:j^@gB';x!ǨbOb8&2r *߸`D˄XY1^Ω|3r+_,LmiV݂6 7_kFFg+wZ7Kޛr%^a{TV4TlnHC!90mc |W H3ǨY7=?8t挥5I1Un֖ }Ql 1 EJ0miV`JDŽ΢4F d9QH}iM,k0y 3Bn"n;kd ":wQ-w! F1q0Rϰ퀮SȟHfZT~) Kf~75Z ܔuT%ꉄIAfc1(j"bn@QwxT.Yc+.icI}xtCH:Nj6V&ӤA<e;6C,4s;bśi5ȴ~0Yb`N[`ժg8QO[|sN[r;߲n]ebyMk|rrF@pM Ө,;7tnŖb4u7FWUױ5b!xGRq^ZjNZ;3d t&& ?kRϺ蹰'O{He+YdRGV(R*fZ!5V?c|m8.Q]*]KQ[2|gSE Yz8klXw:=H95])z؟=UѰ60)N8+x|,/1(3嫅pB`N oZOD32,bN{Z; 1KMq5}j5#:JqY1:`zcHn3HS'* zz CЂ2ZQa?m <3e$q%t4Gx)raSNٰ=':;=(ur6 tIK=>n9b?N ψRd!EOS$)ZFץ#@ǂ @-ɘߐXj'Ң"yQsͥE2%nq /֌2}~mCQKܝ2p͍Ǡ5ŵ_$NTcPੑNWND3,Y4d@%Eo$k.ߣ)#KV[4G/JCA[M ~M+'IHL6Ge;aRҞc$hӱ.Dw9`^e^r{ e|B}枹z#Š8윽&0h~իrcB`3sGE G %  ҧwoH:~z؋Ro+=K9էs%CgXOoe8^-dO7rGűygx%(H0am^W@J 6a7JI >yzHV 2unf J|Sl(@Ǎ`xթ=Ԗ"CTC<uX s;pDܳk9)Nɴ8w!М9XD/R O)UU/ S9)oGSgJ.f`Q_l%&L ^-QvUt+C3n|ƀ@yi'?GUhLVa,V~S%ZFqwX*`}Pod(?>]>7 O扉*) 4#[3г~ot:-'KI١dJ2"3_E?nrR"H }>3ўciSBC{!t>S?N71HMϘ8>tZF,c/ŷmܫ5{K;ΔT oF&cQ"CQYnxj7ITQltJg:!%geر s?\&?.xN>f^947yG}|eF'd) TɃKOrD"hJ)u٥m cfۗ .A d5] "MKD-0liee{MP.9t|=wL^_[꡴mQ2 +;׉\?@WDs]b4pfB]2YBp!N96&;xl#j8\wr$8j5\=[MaxjGy-ᣙgv~7H+U%.a&C,RhILywkz(ۡF 9 k `$ NkxegbBOO] w(UCfqmKy2^ X2I Klqv(1Asʕ8q[IhT,l&X$9(ۤ";I\r*gnߞU/1L㖊8wB{ɾ;`X7p ^GU 6*- [o@W$J6KeYFҦQƣ[0"1 K_}9JoN g@7T^=r^m2k,"1V7хds)T S_09FjPW5p j[YQjFS}A\DxBC5ǥ MFa7Z"7b^Z c[ǖNRgShGr/&ᴫa`['l`|>CP!x-"eLrXT~*'Fv/εl2 OuIV"̚D8fG(9tܼ}㝞<{hGEg@a cŨdZK1)kMT FM":pu{B JeHjܤ ry7tC&~݃ԫv٭J㾿v2 -| auZp휟\g9m[)]]B?=ej<%@:ǤS*ȆjuV!0iCCYyoi%ΌHZHr0osY<67y װ mf*_*WMG3f<# ӭzyj$;=:轁BDF-VJ= PۑTL6쭩;\/9qުq64KAu}EvLT~CyQ`\X?ߒK٠Uma_Ъ]efM^+'ta24/GËVW%3'L( j)#hOƍl5r2O!rVR(!C0sY]hV+ob_oҐjTҬ=`^!^le 3!oF%,{7..oҁ8OE+VMF 7RKʨ>7a݆&ϡfΦRԴv 0ʊUf:ì#[S-,Bin"|)M<Z|:o 2|1^~ nrIlHVsƮAGh'舊م UQ;foa7͆йLsCP)ÇrDP-SI7;VϑYARPB6s#uz:ӄ: *G pc2Wv;*۰t/q\h*tT]1 ,ԾJ?&n*Wg>u pTϦwHkLpՖ O} /,,9 =nH梁q氩+|{bEU}aˀ #'/Oa0j ڑ!D Ӂ m5=v'u~ ]?m1qO ?}yF B`;!ČA {|/WP=_׵CW7y Gm_V=L'ǩxR0{p4YS0֎>m=Nu5YxE|A>|T7Q!AVR+F(v 骆dZP.kI:X) JѸX] 嬤Uɖ}#9Z"i@ >S;uiRϜ8"(RW oB:W#"m࿈i)&; ֹb/T,]mlLh%s;zw% XJPmQ-^/7]׻ɉx 2&,YޫT) 2=oLIkȂq&4Ng2Xl]$tsbrAG򫏄52: ހyWbNsM}4hN} ]Nw0c ;/&P 6UFՃ!fٍxtSO04aͳFx3!>$OS:5Ѕ5P޾\CƍA2$uH4GlCO}핐yh@'r4\Dž5}Ʊ;GV̵fͬO ͷ 5ل_Z'3&/,' - Mmd<]?XbЯf:'^O&a"oZbCږ]}Dpx&*%?D߽=yCG+p`7 a7ZZiyP"9d,DZAi@hg:iB܀h;2 Xro5oتK9ҧ5}o (͊ $4]I4Z@XU~ c1_ P8ި1sw&CڸRjSPiK!\c+HF\!UTFyl ^7) s,37FvnQwY6j|UCFFEq(LAgZ @'ɳig:y7 c~]洝f8Ehe|Xum޶Mq|U|+o#u!&eg$ LF4t~M}.yShn͠2"byz@H ThAPDd,{S9hUpP[}|*P@deXڬ%kLBHȵ27"(VzYieÅVЉIó\kXOg/Yq$">䚐f~}ao&f/-u ~y$KZOm9Q\Aװy`Q/o|=%?uo-Аw4!Lt!}q54#nфf" yQE_>QjwC ]]Fdxq[38y3S-HjF>$6nl Ճs)t[H@[7j =21dM5Eℒ _2$0Wkb۳!+LLS?40e`BDHoPumuiK}ec@e!w%b7n"[tp7ɶ&f >ރt.nAʮb-u93Zn]994j pU;OXr ' 'nT~cɟM$.3McJ@+k]rU^9J4o~'@nVNâ4e7!k0];EwiߓnM@ٞPYs"Ѩ/ ssJÛLajZ@aTZߌgn=&7wȈzS!70g<,.c*~M^m븠e YԂMH-}N֓OUXUGn.snevڜS'|`,jrȬI8v*TyAfê&:@vlgj<d4&xǖk'"><*jY\sCY+>ܡԺKc/:-X>aM0gf4HA;L]*ѳqiZ{5Cy:": (bq7=N=&JLƠ!&2K2a#ެ) 9 h 4 `|Y `}Ɏs49%I3th$@(m$sgV8NrP0ɺ*%cR}YWe롢0zE9Ě)#x!e6p]dq-9 ^8X gZHf:Œ޾" qfa%1GOJ錽/Ґeoz f>%.h(8~9 rHBLj7Tޯ) "}DX#n}W/{<;dIAco$f&"lX|R\16*G;]8*V]pIstũI wa<iN@Ky$yqp>/hjN!1Z1iS= &LuaCQ('d qcjXm9oDzs'DZ4 $ WdOՆE滥 1/! DoT1ifPL/<;3eT^KVܗSTd:.NRJ_LkO\V߽Z{־p ˒u!W|Pj, n!EH ~YH$ Q\6#JHܻ [4|jO5O1tbio]JsRg0ޛ9D՝Ċ1]H 8EvQ=<`,fغ<<\n@j>+C3NjQv C\SF3V9GveeH5pr-Gڦ) z(,!;"@8DۇBͰ|bfZZrTnF@Y|s3:j_GD7K៥h@ɵzOUAAOZ~Dc)a%u&:sTyfsmeɤr|/F,k߻We }:$1Ĕ\9eRK{>m5DLfْ88uGhq'̣pZHX̲9:m̌>톞kFD"\u*T9Z0oL3Z_:@Hsmav(H#AX֞nZO-W}T`rIts޹l(ޚQf ^&UJUWb !KV- }Ohcb^i n+evqI$im͍`;~'j$Hv<>KgyZhAog.ҺQ=}MW HT.GS,DaKmCz$"OV-13uK4T/Ҩ咳,>[3{f6 dk .A 326*[Բ;~Z}0BC-6, @ .q2k]\;zqy.rڅ~3LuWODS/ "K~A-x>j>`1_C&"PVcy>cc̱UyO~$)hJ5a(h9:2n)kZڛ 0ِ3q2/FInҏY\sP0lm/+>O,ɖuJx eMźQ܉j33tz/U{}rSv~S7 &wE͘J/usU5g_9L@@$?l%XO ֕q ZEo95^Ch!mtG! uHW~#7rh#ӅY4Q&󣔓3j4o]uV1j>Q3u^g$6Y_|>T8LJsg`Bpfsk[ΑoӌŦjP^|?9BXivsTsz}>eِǀ}pz߲8h|Q*[ɝxH*m_‡,Ϩ[񃪮Э  Kqc&MC8ԙGݡ'|~AM-}nCK=Х[OO'طmO?^SJhGow|xزfqh[ ˀ:`CJ~Bٳ{RWx W杣u^_$)K+w/;,) UH>>ndtC/X`^#ΪOdy>o`[&_boo"եˁ!T_X_DF}<>bĝN sּdLRQu@BDqS+.uHC{GQ$V1W2 Scb R| |uCMֹ{1x !يҸs Ñ, d]l%!PJ GGGr`IGnFS0Sݕ-M(*`z;πrwץ[<2!H!) _ tˁ⠟eoѫ^g;>nY >Wld NU$'ҵGly־w =Y9l{/J`+<>֨4/*8$0Ȳ8@#mb2Xm;/ph艱sGr M[HħzlH8 qq188\꾏Cj3);srIXha6Em/M!PU?35@lL`6B`5)s3Բ`grf +b> _@Y`ڡ&N$)}BB{!-/)jv{f|oiC7 OA_{cK%Dm rʑKpgkomv4ѼrHf,,OȫX" 0 3sƇ]W)>@LNUD9\ڟ(H;d}ٿT !&4Š+< D~ū#x]wObD8 L',ofP& J[)N*$ɝ]_l'H=š%%?dz ^S.'ƇlYS\a6SP F&-m$>% IlHfi wXq( o?;X,aw8޼":%M`νe9ϙ*];ДH+ CkXD .MtS6 u>< W*i]u/ (ж0`}wEˬ<=_elʱ)8{6^5U նzTOZw!xQXsױFo6jqB~K~x~ҚuhJ1`^}Bk2YN7XL2h klװg^H{վ[R^N Wٷ*tW {rZ ^+ab?{hğh64mx],U ? [ե}ġE{ nee4ťgrхEG<|QgB ^Jx@bY\5%LRbPXgiׯ)8bbZ@yowFrtԿief}z_Qл9 ec![ pDkE"WRW ӗTG^Uu̖BӉK0]HcW#:S8L 9fLj¢%f'Ol G(mCS\ /cG>5Uq!u %Z :2,VvXHmq UoBw<ī"s{e]qkqQ*s"%j!u-Y[C#fd8]ƪnZ<5Ֆ>B/v:C~-2)!89A;Xy.%M,-=1zڣ˲$l=*TKrvA2QB(E+F#JbH~8scduݣ8rW5]*(+JLRqԈ8YtUPJ0EJ8Ec5Ǿ}\mUI쥨3A.>'pr>;ҨwcwYaBR?"Kby:MwFvfa)G N[8~53_X1~6 ?9BP,XMݰ{N4#C?ޱ4H"`M^_:a$ONEb'L2}ۃCSX (I%WTmYcH&d~2WO"Xg~1`^R ꉔzPWpQYq9%EFU#%fD{s#@'E#P s塌ѽIEN:؁:0w8N#@xzD-UzsB|nSr9فO?)ƈKL4[K*?QEw,) v_,3DJY(pb2 `@wZeި 9<2.dPk"jG9>_Uɿ)TQ Bpv:m<>Nԩhn1J8͢g]e$ vcP,)I^L##堷gka Cr#f&4+3._9æL&m! &o]f#rnuk7Lڕe QЙߊMTD"ܡ0&צ0->?Y-EV&,MbʨHSþKh9' $B^S4<ҏ\9qr_P?,VuRI־OCrBqGJULt]ǯU#j HL ϥMa_)A2cT/8^.s*#[Ҏ$SLrJ 2اPDNyk=wmq$J]0:$'a#޳hR\wP"l> kh%\( ,2zVV9:B >*D\U%rp>9Fýem\K-^T/)Sz"a͏n:YgTdyOw:1,Qt{sJf"mb@{x?V)΅Z`IUZ|d\%viO y=tVj *W-ð,na1P=+@:ğnn)M{% Piᜆ6B ;[j\$ E p,@~ߚ)X{4>?R'zP#r}9@pH}6$dp+!ƻwFmFxUcw8Bwff3tRMDb5&܌^EM@/B?[u@W.Wb/*x+['5SC'ϢL0f\Fl4yثxH_7;K'2~]*yhn[̟#J!y'4P3ڋBB1}5ǷfyKmPciIi@%S/a l+a[̉m*^^xCAVC1#s*5qX([UOW'"-z ? o+sͣ~7m$wed,A]>)Mi 8%*bY{c=bJg?!IC"fl|xt-JAk8ǝo XI ,㜵vp~1kZEiBu !xis avZ K^2+<ğ2 ,Ѻ*u]񺌲눍w$~{せ '1!՘ }\ R.$xiܦvH=Э9s觺p5ˎh!+o9m.J]be{C9&l 7Xs on<+_gXȹD7H[v4x웡9"ᎾظYcq{3x#(录dȚWˢX wÏضʴ6LH1i(LoM  h|m&M#bI_hmUel8)&Ӽ37+ƽt F VKJK vN8V=p@=Y:VsF.MF'Z[)8<._GoHFG+ᷞoM//oK5Tִ9m@ۄUGyizy44llR?w@Kx&ӟrVPT]h6"Ƴ%WfXRxc[p-۞w23fi;*.N$z ؐ9"Hf1 fM>c^⮿إZ-N9{&/_Y~y1˴(QWɋ-"_J*(Դp^pCypPTVjҼh6p&E.t#ڬC>Fu!Uo.IhzF'T UHaz5 &K{]LZcYZRopӅ\CN`[-kwݲZ1~4  ;S25s3Cxp.`H\ҐFoz{ Nc#Yw#)M>%WQSM%ԴMI _r@ht]3MmUNE}z#7VD%j+: e2-{?ja[?htIئ) <ŀ%k0&r)#.Ѷ:af33=(`D⁉!]5](Cay?1r׋djGgd>4t p'M*+j5>jp'F֕Oj"UIv~KC cﺘ['}AhkgyЩR#.;կCv9b̸%ؖ_ m au6ۡ=$x Fw)C5 .ߣ sFdn˙t ;{Ν7cгTrv/ՆQaN?֢} Ic:SyrY:ӇK=j }8ĘrǸg.+)iK/x$ k^z١Np^mOt#$I=>: $ =cGip*}ٳB1r;s$<[e.FV?Fꨰ̜Q~r]e<=ѵb*M7N"] ̧ KEN/ ܃a=Oq~1'8Or|L*ȇt}D7Ǔ1 $`>.yΔ${s2]Ax}a@L&O֩G_h;0+%QD/Y`yzvN+)sLEWԐAq~q!f !\u.vRH›ּ#be* -,_ X9K7_Y%@؁ jP"l٤z06ZHӔmũ6_DI,`4.uR{] "6e:;YZO9_urDy^9^ϤA}ղgI{'gڢ ż`#^ͮЪ#534Ҷ $Z"?*gpTBHNeBCR@_r+Wu)E&^,`U&k7axzOp@f FP8GGf.% %Qf;5WU2M$LO\XU4Vorgz6Z d96 8;۵(0>ԊXW=U#B@\9|>n qXϦB.@#0w*PT!: y÷.d59(E'5,hh;)'yfjR:]{/({8*ḱ%S0Iw 52i ْ צYcU}8wV}jZ 㣁IȬ:}!MJ $FU:?|RG{A;00 %F_ne6B!B3cK&`g U~ΩQmuEU2'LuF$آ֊"K]/Q˜/=BQ}Iէ䣄j,;%ZH(ۯ<|'`xw^>vKT$q4qSF0G7mGHch!^{Wۺ<zau_LF2`\+ʪQ߼G (qDNo J3;A ^ V/ROŁ.ֹ^!Yҭ8y\D8FxKl *&m"YqԹzx;uڷalm_گh{ # =nџw?Y)X!J(͸fW]5r5:H|UKZye(XG>i3O79C3 7ܰAУJl,7}wCX9$ !0Pddr =._N+\tNկv 68ͬbR7kGtqsښP׸e|_^G;3$dQ ۈ^_#8^=` 3_BȎ(mM5 s 2ߐ>h_ DӫM?<y!|Y |m2*vީ0@t֯b?FR/9D?;&ܹPkG a ao%D%AF+r@Kꄗ4Lrc9jK{>g듴1cđ.DQutᒍz g4\ag@o_ilF^os@J7]ڠY)8܋\oSٔV$.PzoH8,m4XDF'U_J2_|”`)P 6saZ-/#ʐ5y$48cmzR?ZরAUP yQ9 ڻ]+mr~Hc{#hMK(e<_J S%kfp˯/EC ]6qZ@q-bT~_?d4km&@{հj* D!6`+A!xyfmexk3XqSяA0e5~ŌO0/xK:i_{J8_ A 0]7fĎ͌&\:+Xj1\ޤ3|8G: w>ZLԠ@,*Alwғ;k6Bsz9ORGLp;kGʒmu聖 (BoMxސև eCw'K"X`jE${zEb ׍cibag.I()P+*|\N({'AtCx߁0`4;"Z;vIhnJ羭}SY_8PYqya"qI*f") (.rMUFf,Cx&Õ93ş*!pP'E} ^wKZ$IDc}T ,f_(dasj.6\׳,Nz^%FI]S<3@vLh]zM[2=:TLbK~)VV/{$_S:mZK{ Y-eꍹY%_ܙQ0kv~sbRKI~?nnjiIߛ MBMȺiǙ!AyPdFuJk9 "LQRLVZC)h|0 GٱxGɧ߅MK[S[{W.#E်⭳P.A"]44S΍V^`lg~@r_o o۩M־sT>*̗3*gLv|^8:OWg>uNV+?[ER 6:Ʈs:vQp~w;˰̤o9/ m-|ZN8IʼbQr \0G] O:\kc|1%HK$LaȐ,6O->԰ı5:EK͑6WY^3 +@it6.n9T눨@0k. mQS&D VO+ G?\wŒ ̉HxR*̷ _* ca4 4FOWf3 A(H'y\ 0Fn9N+>=ݗ/i/clJ+;]p0 ldm-M qctd7*M@.+UA2 PuI9N*Qo4'W#9%pKAbU7l&!lH .{As݇~'kN題1{&R7ΪژcmwT& G]NHvnf:YA6qXw?qwI6\~N!kt^V/ w\?2ݜnфt6Wdf%UH=4l!}9:WEZ2ر>>,k U٨%+k=/%qIUoB,X@(+b(`J]4jr W}[( y^Nd}2`B1s(!3X1y6^E0  ēǞ B]غer@0?F\:܃f8mQEI1_5XΙbje3,OtW z 5Nؓa"%̬*3Mۨű2DSvX$8ǣP~*g0wM Se/ݸr!FhI]-N^,4*Կմ pdCtX"QgWiITd,卜 1t~|1H},! qNI@Bk+r1'= 7jGfKg)wN~z+1Nmq0ƷYL4g%A\aD]o?Lެ+#*:'I~X@)˦ulޯdz|qdܓ)" AGa@JȀa]߲dcq6C #ѩk;O)Mn A@lG]u"C ƊE ɩK l6c{R|:qP~\ u9, ӧ܀h ʨlC<0ǎD~B<&9C]|ZDk;603ܖ'OPOe[Mī& tG6 -@GaIJJTa'BjOmnb8{YKq7-xb P#:$WF>:m7-IBϗ֏Y*>iC| lSXaleZ% #37y`:86ZdRCd2JuaۉźL/Aи)wȟUzuUNthRW&ݕbE>JK,Ǔ2ZQN33/uCB3%@r%vNybɌL@/7/R)O|>'9"cWe˳f)FQ8IM~ه!dH[2vt؇5|]LJIp]7b&~ޢ)?c(j,H< $,;F.D'#kh[gM}/Q^2!!ԏl5*_>uiP6IN3ĊB`oNtMq)B, ^4l>Uԫd|8 0m:.cF$q$OS{E򡁅odLSH3Q R+w4%VČH78 dסBL WGpjk!tlnT:SWP"aSp٤\jm #@} ΌLfW<2DLQ'/UmvU<d\U ŬO׭i9SK{Ĭ)Gg'B疍&3aDb&ʳ$6sPoUuRܙx/"Q&j-jO)hR҇Ii ؗ k) 7>^c1DcQc WdmMǝH-.{peR4PV+[X&*п(ChB](EQBk[dج($ ՓE@QoƤaiPJqqOFƫ& x`,e?HhǥMT3I͙U?.w~L㩂QXԴ!,SOaUjkem )Ff?";DD|ڏY{`V]8Sn:*"AI%c7<5Eq'OWsӄ&p}Ÿ:Y?'cU 6; d*d#/ْd3ڟl}ˁժ(cf?46ܼ([M= G~ ۬u++N#?ի? 2*]ZM"ǕT,9֔U!ԜFS~RxyLHCA:M!=)Y`C`\nPL'Ku%[~ငfe{8/N4j08Na%Brv4Ȯ `*BJc`sIwo_X) *2iŴM_G t2򣲥-p:,vVi#t[@7z\I ?<nŦCk*'ȐYYstY'eAɿ0 %pſԶGeȹ@~u K,J&vة{=w!imCC33'eqn9 K)&BZl`}M؅5Y9E ƉUR|!p"q]{,vnJif89wIR)'W^A)R̦V}&n(s 2?ݵ 5-ÍGR00q׋\"~'9au@J:ނbsg1WfgӔiݲ)}"*6o{`քn~g4lLU䱤F 䤡 ݒWR]NV_~ll3zkӎ,UP89Ca;kxpm]3iVP|nOMLih" "搁 ס` 1pͭ_@p맻Ҋy 7ClP&=imS+iYi O,P@m\}QzOxCwi2L{𐢥US'phj gʥ)hy3q8qO~伧l \<۲ם+ҠC&0Kjy݈#C(7(%k ל_Bүbq` DhK+M_S*hqp89n 1߃ˋ@^bj x CX96[\X0@c,9$dknf:Beڿ!3>' ʙCKpXPueQM ǹ=:$9Eh&w@ds<2Z0fEsl4[6?B #xp.uPq!*^[.jn^Bla+T"Ҡ H-7cdzOXxe14봏4XKz#V@[$ɱ64Ӈ` bƆ#w\u3VV8><~tFi0OR^("tʙ7^9y]Cߣ/ywRh_t)Dxh U5c5Nl_Sye\WC)n\fiA.K=8ux5\A*No h"!/OxYu*T]h)~wG~lTS,= ŀs>Fcc҉#zFey9]pǞ{O\L) ٰAȈ6F8AK2AmؽWm>704Xy[l;u(*:yZmvI}Z GegӃ˥Mő 6"Fsd\v %uxE@F42X" 8nI~Tjv(' ۿt&o6Q-(iZƅ2 9 6$"UO1\7!S ԫj,w+=v:n{ZV^Hi[g"99L*cL(^❯-PE 5nUwDp+f' ^58'V|OɬB a$%??BlЌn9 ѵ13w>A]La^KVdW+uy Td _f"8,b0C>{ѹ.,(ۄ{Ph͎mFAGyFlrE8?_׍t֘6bz4>RK+IP !Ƿ?AKԘn4H9Mw/b\c/99=3 d Bu6oӒ2i9TAp !2Lڋ^ tAqN(WIh jG۴a 0qcG"nA5V1%UZ:́)J/72ǂ*=S|G3yu;y0fn)2Tq0 圕zGiaGS|j*Zwngt,Y4QO٦Reu#pkMjIއ`噂2A 3օP|j˯(f:GbF}WNj2KJ0 L!x8-pz]e=׫D5,?N peӦg'A!IuҘr8aY_x) {H s*u$nJ']y-kod8]/N: rЛxns1k$q Zx|Afm~q?m8D',C,sxeNpkZa$e8g.GkJ-Ex #l  ;HTi-ti CkKksOX@4|wZVTe*p "Mp %,g#@N 1(z}e F5c! cPcL7/o{58pD_ پZG(B4Í n6w7y$"iyqb'z9\ߝ%Ӳ=Js^tr#?JA~<0,CK{<\î((: S KQO\29uw>XC7Z>*ȽE}q'cřڲ kUrX Oœ;0w_g)壞"?)k6_FZ`+]=) 1?t$_XP'4ڇV[~1ljunJQ8S8H9K8PM$1(}E7Fi'ݜPW9ޞ+A+57;5ZL% \Wd-mo2X]P[= Es\eR-Enaֶp\aH8=65̈́r,c #]i?qzG.;Nxk.tSL_^9®$z`kw'tI>6bI\(fp^`<sVɬ<3Q2 #Azу1b11'?u1s0rOK{,$sJ]-&V*/& -^ę'zj¹_$T<#@5[>+"6~'s`MElJk_ZX!e|_p 3K"=˛x4C4RL~eCfW)#;cFe/j2b2v|ͻߣ+;D&r=BkEY[#368j^Y(oѬЭO9:@yjׇTn𾦙 ϕhؕۗr}nb}6$୅|oϼog~:z%Y{ sliC0PNՓϠ9lV5==rΝD.|Kc?bayz:TSݑy+Y\1+Z0QJ9h"2ɾ=Zf [-ٖYyqg*ьUB~5?~p_N+[ƢE63pa 秭f>6y`mٌ.7L/?5ɳHme!tYݵsO>+ ċnV˫kzc֪тv. KV^LF>{XGl\h|O5ǰ-!M犨h)cWM5 /zm#ɶ_XsSBxĭ,YNߣGޓq̽[+#E.)+'WA{$+ VtAF|H[}h/:>GbJګ'큉p"a%-5uWksuL(O7_T{3٠I{G, WHA\o#1{M%_Ϧk48pJq.9l|iwzV0;/11/X^b9EH~kR?eܓHJ7>f67<ߨo }}>U07&>Q*e ?d>3ˀm"tΉAZhLt SnXOs回58uliy$}@‡rhrWMuvA{j7 epKw81ԳQgJdkdMenF>\j@20ݐИO @ H )?jUuIZKyxS3Z@/;W 2mG ^}Oda {, A7]hY^%Ixf1L~G|DnheA XԲF=n~h U<M|TCՆ-IvvE4QV½fkeS2_Uc#C@@IZާ( 0 Z#V0,@rbYlֿr),8!rfP5|c\amCS(tm [15_mf3w\+K@ɩOЙ{-Sמ,kc'yW;ooAZD7Ǫ:[FjW {_ d31SaX l: RiT(sK{h7 N`h lHM(Ձ;e݁{xX&icjGtt}LPlMC)&~cv X83s:2\.FHQ5T͢P-**֠}Epi2KGn!gRY[2?qZRc1+ܸ͟ja MhhLf^qk _`~9u7r)`(P(tSsTE޲@Gg2=]1b|@BAӟz,A\H ^U %\EƽpRz*i:nبEMoE`n7ˮİWweߡwj6;Z$h+C.\P_q\kfJy ip%Ϧ GQ2&- xΖcUDBˍSEE:LtVu8|=Go oDH./4TSs\Y.у}îlYgS_$JqY&.=6Cr(^3]hO,Ղ=OcjV :7t6̰&V8ٯ~W{79aq)@2;st[M+(KWMq@f{Zk0 51rjni iF@?B²c#yKR ]/<׌Y\!*eAҽ;PpN~N,و6^᳭VϚ4{!]_M:gdrG69ՉBJK &:wvd Q$y$6_SRyCTtZtq-;q8@׳w ?tユ75e19(Y YLFWY3 ?)ia!.|v _FX@'N;$֟j-T_e}&qKXv#׏Td 40z3#]0_ڈht,-~ި`>g".oY; RrɌO>J K_g|"qS~=pT#iy:jvˁW$$}m2k5_"聠@m|(VTp79KBBtpeWE0Om 6k劭02 P'MAn f\5~YByXfUTݭm-5f :78V+!~ڿOp*Wfn$eyn8SǷ%`?%;gL_&,d>| ɞjzAbcZF.~\gX#Etou7Í#1D1 aMJoo7+(+^3hBW$#A.ݾ~R_go,᫓|.C86m)&jIǏh"_ydtWIՈ'$I*A{X04؛$դG̷]jDKr0zw{6[NO%}]32Bݷ‰#gv," X%RoQV1reZ/$^p5lm68*5:[B0mZQS|4wp.Ҳj,=QxeZ*VTj1sߑ Z+눶uB?nޙ|0>+rv%ر!6+wbDib"UTڴuI/Լqߜ5_6^ )%|%VU<+~T:uy,o 7%ߪʃyWil>z+{K ɜ x꜏3=xU5VCIByB$4ּ"Iܼ 1UL%r@IAwV yM5{jOX DryRd)Ģڋ9#zJo SFST||s6?ZVMʵD ˄{&Kŧ%|~.ܣAdTOk/vfƘ 8Jt4}һīI;w@џKwGXݦ!srYOfŖKG}B5o+cP$ι{BkT)^ %J2'{Q!|JRwNJA@FmfG}OkN"lT%_(.[j`(:9뿘C.>PVikI7VV1b*q!] b p w@cFGpb2fd|uή y?Qi`<$|Ƅd[$zM0vr&x.o1<Zs_$MznBse~W9}Bpv^-AYv98Z}+z_ACO7S‡nxzP(3VM~^ ?qİj:ˤ4j"LMV`*_ʮEo\[U_19Ye@lk\j((|7cNT fC;ARTjJT,0pU/ Tؠ{o6)wkQV5թ!2Jj3Jzҡt;{+ KS$ xo"*ZITs\lm:!]>dx?di+NflfcziVo|fDr/Z,` ]T)٭=-%FHH QJ9F״~Q&ڍLe&FW:ѭ#[mT^R6/8{,>rMeU?ԒXl?Ϲʱgme)X'.eI1_ziTcL^%p-!͐qOa{8mYLjL &8åxB=8B/GШAG!صTkDY4 fk<1Զ?&t_}Klβȇ`Jbܠ#\FX*w:=\sP#"=S3N %>j{[}YBi[@ RmKKLHꃊ;[}\?#6zlV!\]zGVw g nցv-Π