xen-doc-html-4.12.0_12-lp151.1.1 >  A \%/=„~E\+$:2v$ $@91"D`c,O%RR^Ulӻ`v1{rE9:RÛ/M,WbN:͒Ԗf/!-k IP ƉPZu+խ.|8O{mQJWqdϔ l1PyoJ$ nťVwǞ{ּbvZDQc530c06271563c572ea4b4009a8677c820f090c924932caed5db39072565e272db7b676a36f99cbc8b14898e82a206b64f34efffD\%/=„%+0fKr9^ҏv.&hG&DlOqUT*🼹,wL⮟Fƨ:Bh-`qAMʋR{/~Pay]H {#'}]v&یWT) kb<3DT] 'X4rmi%H1zmaqލZ (> @=:,^W]!I8;tgǠaOS٫ѷ\B!w&?j"?ڔ( >p9.t?.dd # J BHPMM M M M M M<MM>`MK(o8x'9"':5'G XMH!MI"MX#Y#\#@M]$tM^) b*c+d+e+f+l+u, Mv-@....`Cxen-doc-html4.12.0_12lp151.1.1Xen Virtualization: HTML documentationXen is a virtual machine monitor for x86 that supports execution of multiple guest operating systems with unprecedented levels of performance and resource isolation. xen-doc-html contains the online documentation in HTML format. Point your browser at file:/usr/share/doc/packages/xen/html/ Authors: -------- Ian Pratt \$sheep82 {openSUSE Leap 15.1openSUSEGPL-2.0-onlyhttps://bugs.opensuse.orgDocumentation/HTMLhttp://www.cl.cam.ac.uk/Research/SRG/netos/xen/linuxx86_64ot9DA'6@7x3#B( W c e $,76H"yjQ <3 " Sz29 0 S\xAAAA큤A큤A큤A큤A큤A큤A큤A큤\$g\#M\#M\$g\#M\#M\$g\#M\$g\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\#M\$g\#M\#M\$g\#M\$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-4.12.0_12-lp151.1.1.src.rpmxen-doc-htmlxen-doc-html(x86-64)     rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PartialHardlinkSets)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0.4-14.0-15.2-14.14.1\@\@\,@\7\\N\@\\+@\\M\M\\\@\}@\k\X)@\J@\I\A\?\=@\9\73\4\$\l@[H[k@[@[^[^[ā@[@[@[9@[v[W[CN@[<[6@[0@[0@['[!@[5@Z@ZnZ@ZZZ@ZmZԐ@ZZZ@ZZ}@Z}@Z}@Z}@Zz@Zz@Zo Zk@ZV@ZS]@ZOhZ:PZ1@Z.s@Z&@ZOZOZ Z Z Z@Z@Z }ZC@ZYYYY|Y@Y{Y*@Y5YA@Y4YYYbYY@Y3Y@YJYJY@YYV@Y@Ym@Yw2Yp@YlYh@Yh@YS@YJ_YI@Y5GY0Y-^Y(Y"YY;@YYY@YtY.X@XQ@X@XۡXg@X@X@X@X @X@X@X@X@XXX@XXXwoXs{@XlXWXRXQ4@XEVX43@X.@X*X lX&X@XX@W@W֘W֘W^@WiW:Wt@W.@W9WW@Wk@Wi,@WbWZWZWZWYZ@WV@WEWBW=W;W3W1@W1@W,@W(W(W(W(W(W#LWVbV(@V3VJVxV'@VV2V͛@VŲ@V`VwVVV=@VV@VHV@VvV%@VV<@V@VS@VV@V^VwVqR@Vn@VXEVUVTQ@VMVMVMVA@V;DV9@V7P@V0V*!@V V@VCVVVf@VqV@UYU@U@UUݪ@U@UnU4@UUK@UU@UU>U@Ux&Un@U\w@U[%UUUPUKSU>$U6;U%@UU@UUU.@TgT-@TT@TZ@TZ@T@TT@T5T@TLTLT~@Tl@Ti@Ta@THT?@T=@carnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comJan Engelhardt Guillaume GARDET Guillaume GARDET Bernhard Wiedemann carnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deBernhard Wiedemann ohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comtrenn@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.dejfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.deohering@suse.derbrown@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comjfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.dejfehlig@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comohering@suse.dejfehlig@suse.comcarnold@suse.comjfehlig@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.commlatimer@suse.comcarnold@suse.comcyliu@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.derguenther@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comrguenther@suse.comcarnold@suse.commeissner@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.com- bsc#1111331 - VUL-0: CPU issues Q2 2019 aka "Group 4" xsa297-0a.patch xsa297-0b.patch xsa297-0c.patch xsa297-0d.patch xsa297-1.patch xsa297-2.patch xsa297-3.patch - Update 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch and drop 5cac6219-xen-cpu-Fix-ARM-build-following-cs-597fbb8.patch Refresh 5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch- bsc#1131811 - [XEN] internal error: libxenlight failed to create new domain. This patch is a workaround for a systemd issue. See patch header for additional comments. xenstore-launch.patch- bsc#1125378 - [xen][pygrub] Can not restore sle11sp4 pv guest after upgrading host from sle11sp4 to sle15sp1 pygrub-python3-conversion.patch - Fix "TypeError: virDomainDefineXML() argument 2 must be str or None, not bytes" when converting VMs from using the xm/xend toolstack to the libxl/libvirt toolstack. (bsc#1123378) xen2libvirt.py- bsc#1124560 - Fully virtualized guests crash on boot 5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch - bsc#1121391 - GCC 9: xen build fails 5c8f752c-x86-e820-build-with-gcc9.patch - Upstream bug fixes (bsc#1027519) 5c87b644-IOMMU-leave-enabled-for-kexec-crash.patch 5c87b6a2-x86-HVM-dont-crash-guest-in-find_mmio_cache.patch 5c87e6d1-x86-TSX-controls-for-RTM-force-abort-mode.patch 5c8fb92d-x86-HVM-split-linear-reads-and-writes.patch 5c8fb951-x86-HVM-finish-IOREQs-correctly-on-completion.patch 5c8fc6c0-x86-MSR-shorten-ARCH_CAPABILITIES.patch 5c8fc6c0-x86-SC-retpoline-safety-calculations-for-eIBRS.patch 5c9e63c5-credit2-SMT-idle-handling.patch 5ca46b68-x86emul-no-GPR-update-upon-AVX-gather-failures.patch 5ca773d1-x86emul-dont-read-mask-reg-without-AVX512F.patch 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch 5cac6219-xen-cpu-Fix-ARM-build-following-cs-597fbb8.patch- Install pkgconfig files into libdir instead of datadir- Update to Xen 4.12.0 FCS release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2 * HVM/PVH and PV only Hypervisor: The Xen 4.12 release separates the HVM/PVH and PV code paths in Xen and provides KCONFIG options to build a PV only or HVM/PVH only hypervisor. * QEMU Deprivilege (DM_RESTRICT): In Xen 4.12, this feature has been vastly improved. * Argo - Hypervisor-Mediated data eXchange: Argo is a new inter- domain communication mechanism. * Improvements to Virtual Machine Introspection: The VMI subsystem which allows detection of 0-day vulnerabilities has seen many functional and performance improvements. * Credit 2 Scheduler: The Credit2 scheduler is now the Xen Project default scheduler. * PVH Support: Grub2 boot support has been added to Xen and Grub2. * PVH Dom0: PVH Dom0 support has now been upgraded from experimental to tech preview. * The Xen 4.12 upgrade also includes improved IOMMU mapping code, which is designed to significantly improve the startup times of AMD EPYC based systems. * The upgrade also features Automatic Dom0 Sizing which allows the setting of Dom0 memory size as a percentage of host memory (e.g. 10%) or with an offset (e.g. 1G+10%).- bsc#1130485 - Please drop Requires on multipath-tools in xen-tools. Now using Recommends multipath-tools. xen.spec- Update to Xen 4.12.0 RC7 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- Update to Xen 4.12.0 RC6 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- bsc#1026236 - add Xen cmdline option "suse_vtsc_tolerance" to avoid TSC emulation for HVM domUs if their expected frequency does not match exactly the frequency of the receiving host xen.bug1026236.suse_vtsc_tolerance.patch- Update to Xen 4.12.0 RC5 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- jsc#SLE-3059 - Disable Xen auto-ballooning - Add CONFIG_DOM0_MEM to the spec file for managing dom0 memory. xen.spec - Disable autoballooning in xl.con xl-conf-disable-autoballoon.patch- Update gcc9-ignore-warnings.patch to fix build in SLE12- bsc#1126325 - fix crash in libxl in error path Setup of grant_tables and other variables may fail libxl.prepare-environment-for-domcreate_stream_done.patch- bsc#1127620 - Documentation for the xl configuration file allows for firmware=pvgrub64 but we don't ship pvgrub64. Create a link from grub.xen to pvgrub64 xen.spec- Update to Xen 4.12.0 RC4 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2 - Tarball also contains additional post RC4 security fixes for Xen Security Advisories 287, 288, and 290 through 294.- Update to Xen 4.12.0 RC3 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- Update to Xen 4.12.0 RC2 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- bsc#1121391 - GCC 9: xen build fails gcc9-ignore-warnings.patch- bsc#1122563 - Virtualization/xen: Bug no Xen on boot, missing /proc/xen, after 4.11 -> 4.12 upgrade on X86_64/efi. Keep xen.efi in /usr/lib64/efi for booting older distros. xen.spec- fate#326960: Package grub2 as noarch. As part of the effort to have a unified bootloader across architectures, modify the xen.spec file to move the Xen efi files to /usr/share/efi/$(uname -m) from /usr/lib64/efi.- Update to Xen 4.12.0 RC1 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2 - Drop 5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch 5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch 5b8fae26-tools-libxl-correct-vcpu-affinity-output-with-sparse-physical-cpu-map.patch 5b8fae26-xen-fill-topology-info-for-all-present-cpus.patch 5b8fb5af-tools-xl-refuse-to-set-number-of-vcpus-to-0-via-xl-vcpu-set.patch 5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch 5b9784d2-x86-HVM-add-known_gla-helper.patch 5b9784f2-x86-HVM-split-page-straddling-accesses.patch 5bdc31d5-VMX-fix-vmx_handle_eoi.patch gcc8-fix-array-warning-on-i586.patch gcc8-fix-format-warning-on-i586.patch gcc8-inlining-failed.patch xen.bug1079730.patch- bsc#1121960 - xen: sync with Factory xen.spec xen.changes- Replace old $RPM_* shell vars. - Run fdupes for all architectures, and not crossing subvolume boundaries.- Do not run %fdupes on aarch64 to avoid the hardlink-across-partition rpmlint error- Require qemu-seabios only on x86* as it is not available on non-x86 systems- Avoid creating dangling symlinks (bsc#1116524) This reverts the revert of tmp_build.patch- Update to Xen 4.11.1 bug fix release (bsc#1027519) xen-4.11.1-testing-src.tar.bz2 - 5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch replaces xen.2b50cdbc444c637575580dcfa6c9525a84d5cc62.patch - 5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch replaces xen.b8f33431f3dd23fb43a879f4bdb4283fdc9465ad.patch - Drop the following patches contained in the new tarball 5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch 5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch 5b3cab8e-2-VMX-improve-MSR-load-save-API.patch 5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch 5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch 5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch 5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch 5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch 5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch 5b3f8fa5-port-array_index_nospec-from-Linux.patch 5b4321f6-x86-correctly-set-nonlazy_xstate_used-when-loading-full-state.patch 5b4488e7-x86-spec-ctrl-cmdline-handling.patch 5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch 5b4c9a60-allow-cpu_down-to-be-called-earlier.patch 5b4db308-SVM-fix-cleanup-svm_inject_event.patch 5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch 5b5040f2-x86-AMD-distinguish-CU-from-HT.patch 5b505fe5-VMX-fix-find-msr-build.patch 5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch 5b508775-2-x86-possibly-bring-up-all-CPUs.patch 5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch 5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch 5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch 5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch 5b56feb1-hvm-Disallow-unknown-MSR_EFER-bits.patch 5b56feb2-spec-ctrl-Fix-the-parsing-of-xpti--on-fixed-Intel-hardware.patch 5b62ca93-VMX-avoid-hitting-BUG_ON.patch 5b6d84ac-x86-fix-improve-vlapic-read-write.patch 5b6d8ce2-x86-XPTI-parsing.patch 5b72fbbe-ARM-disable-grant-table-v2.patch 5b72fbbe-oxenstored-eval-order.patch 5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch 5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch 5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch 5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch 5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch 5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch 5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch 5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch 5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch 5b72fbbf-x86-Make-spec-ctrl-no-a-global-disable-of-all-mitigations.patch 5b72fbbf-xl.conf-Add-global-affinity-masks.patch 5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch 5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch 5b75afef-x86-setup-avoid-OoB-E820-lookup.patch 5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch 5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch 5b8d5832-x86-assorted-array_index_nospec-insertions.patch 5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch 5bacae4b-x86-boot-allocate-extra-module-slot.patch 5bae44ce-x86-silence-false-log-messages.patch 5bb60c12-x86-split-opt_xpti.patch 5bb60c4f-x86-split-opt_pv_l1tf.patch 5bb60c74-x86-fix-xpti-and-pv-l1tf.patch 5bcf0722-x86-boot-enable-NMIs.patch 5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch 5bd076e9-x86-boot-init-debug-regs-correctly.patch 5bd076e9-x86-init-vcpu-debug-regs-correctly.patch 5bd0e0cf-vvmx-Disallow-the-use-of-VT-x-instructions-when-nested-virt-is-disabled.patch 5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch 5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch 5be2a308-x86-extend-get_platform_badpages.patch 5be2a354-x86-work-around-HLE-host-lockup-erratum.patch xsa275-1.patch xsa275-2.patch xsa276-1.patch xsa276-2.patch xsa277.patch xsa279.patch xsa280-1.patch xsa280-2.patch- bsc#1116524 - Package xen-tools-4.11.0_09-2.1.x86_64 broken: Missing /bin/domu-xenstore. This was broken because "make package build reproducible" change. (boo#1047218, boo#1062303) This fix reverses the change to this patch. tmp_build.patch- bsc#1115040 - VUL-0: CVE-2018-19961 CVE-2018-19962: xen: insufficient TLB flushing / improper large page mappings with AMD IOMMUs (XSA-275) xsa275-1.patch xsa275-2.patch - bsc#1115043 - VUL-0: CVE-2018-19963: xen: resource accounting issues in x86 IOREQ server handling (XSA-276) xsa276-1.patch xsa276-2.patch - bsc#1115044 - VUL-0: CVE-2018-19964: xen: x86: incorrect error handling for guest p2m page removals (XSA-277) xsa277.patch - bsc#1114405 - VUL-0: CVE-2018-18883: xen: Nested VT-x usable even when disabled (XSA-278) 5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch - bsc#1115045 - VUL-0: xen: CVE-2018-19965: x86: DoS from attempting to use INVPCID with a non-canonical addresses (XSA-279) xsa279.patch - bsc#1115047 - VUL-0: CVE-2018-19966: xen: Fix for XSA-240 conflicts with shadow paging (XSA-280) xsa280-1.patch xsa280-2.patch - bsc#1114988 - VUL-0: CVE-2018-19967: xen: guest use of HLE constructs may lock up host (XSA-282) 5be2a308-x86-extend-get_platform_badpages.patch 5be2a354-x86-work-around-HLE-host-lockup-erratum.patch - bsc#1108940 - L3: XEN SLE12-SP1 domU hang on SLE12-SP3 HV 5bdc31d5-VMX-fix-vmx_handle_eoi.patch - Upstream bug fixes (bsc#1027519) 5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch 5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch 5bacae4b-x86-boot-allocate-extra-module-slot.patch 5bae44ce-x86-silence-false-log-messages.patch 5bb60c12-x86-split-opt_xpti.patch 5bb60c4f-x86-split-opt_pv_l1tf.patch 5bb60c74-x86-fix-xpti-and-pv-l1tf.patch 5bcf0722-x86-boot-enable-NMIs.patch 5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch 5bd076e9-x86-boot-init-debug-regs-correctly.patch 5bd076e9-x86-init-vcpu-debug-regs-correctly.patch 5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch- bsc#1114405 - VUL-0: CVE-2018-18883: xen: Nested VT-x usable even when disabled (XSA-278) 5bd0e0cf-vvmx-Disallow-the-use-of-VT-x-instructions-when-nested-virt-is-disabled.patch- Use SMBIOS_REL_DATE instead of SMBIOS_DATE for reproducible binaries- make package build reproducible (boo#1047218, boo#1062303) * Set SMBIOS_REL_DATE * Update tmp_build.patch to use SHA instead of random build-id * Add reproducible.patch to use --no-insert-timestamp- Building with ncurses 6.1 will fail without xen.2b50cdbc444c637575580dcfa6c9525a84d5cc62.patch - Building libxl acpi support on aarch64 with gcc 8.2 will fail without xen.b8f33431f3dd23fb43a879f4bdb4283fdc9465ad.patch- bsc#1106263 - L3: The affinity reporting via 'xl vcpu-list' is apparently broken 5b8fae26-tools-libxl-correct-vcpu-affinity-output-with-sparse-physical-cpu-map.patch 5b8fae26-xen-fill-topology-info-for-all-present-cpus.patch 5b8fb5af-tools-xl-refuse-to-set-number-of-vcpus-to-0-via-xl-vcpu-set.patch- bsc#1094508 - L3: Kernel oops in fs/dcache.c called by d_materialise_unique() 5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch 5b9784d2-x86-HVM-add-known_gla-helper.patch 5b9784f2-x86-HVM-split-page-straddling-accesses.patch - bsc#1103279 - (CVE-2018-15470) VUL-0: CVE-2018-15470: xen: oxenstored does not apply quota-maxentity (XSA-272) 5b72fbbe-oxenstored-eval-order.patch - bsc#1103275 - (CVE-2018-15469) VUL-0: CVE-2018-15469: xen: Use of v2 grant tables may cause crash on ARM (XSA-268) 5b72fbbe-ARM-disable-grant-table-v2.patch - Upstream patches from Jan (bsc#1027519) 5b6d84ac-x86-fix-improve-vlapic-read-write.patch 5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch 5b75afef-x86-setup-avoid-OoB-E820-lookup.patch 5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch 5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch 5b8d5832-x86-assorted-array_index_nospec-insertions.patch - Drop 5b741962-x86-write-to-correct-variable-in-parse_pv_l1tf.patch- bsc#1078292 - rpmbuild -ba SPECS/xen.spec with xen-4.9.1 failed xen.spec- bsc#1091107 - VUL-0: CVE-2018-3646: xen: L1 Terminal Fault -VMM (XSA-273) 5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch 5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch 5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch 5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch 5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch 5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch 5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch 5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch - bsc#1103276 - VUL-0: CVE-2018-15468: xen: x86: Incorrect MSR_DEBUGCTL handling lets guests enable BTS (XSA-269) 5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch - Upstream prereq patches for XSA-273 and other upstream fixes (bsc#1027519) 5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch 5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch 5b3cab8e-2-VMX-improve-MSR-load-save-API.patch 5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch 5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch 5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch 5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch 5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch 5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch 5b4321f6-x86-correctly-set-nonlazy_xstate_used-when-loading-full-state.patch 5b505fe5-VMX-fix-find-msr-build.patch 5b56feb1-hvm-Disallow-unknown-MSR_EFER-bits.patch 5b56feb2-spec-ctrl-Fix-the-parsing-of-xpti--on-fixed-Intel-hardware.patch 5b62ca93-VMX-avoid-hitting-BUG_ON.patch 5b6d8ce2-x86-XPTI-parsing.patch 5b72fbbf-x86-Make-spec-ctrl-no-a-global-disable-of-all-mitigations.patch 5b72fbbf-xl.conf-Add-global-affinity-masks.patch 5b741962-x86-write-to-correct-variable-in-parse_pv_l1tf.patch- Upstream patches from Jan (bsc#1027519) 5b3f8fa5-port-array_index_nospec-from-Linux.patch 5b4488e7-x86-spec-ctrl-cmdline-handling.patch 5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch 5b4c9a60-allow-cpu_down-to-be-called-earlier.patch 5b4db308-SVM-fix-cleanup-svm_inject_event.patch 5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch 5b5040f2-x86-AMD-distinguish-CU-from-HT.patch 5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch 5b508775-2-x86-possibly-bring-up-all-CPUs.patch 5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch 5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch 5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch 5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch gcc8-fix-format-warning-on-i586.patch gcc8-fix-array-warning-on-i586.patch - Drop xen.fuzz-_FORTIFY_SOURCE.patch gcc8-fix-warning-on-i586.patch- Update to Xen 4.11.0 FCS (fate#325202, fate#325123) xen-4.11.0-testing-src.tar.bz2 disable-building-pv-shim.patch - Dropped patches 5a33a12f-domctl-improve-locking-during-domain-destruction.patch 5a6703cb-x86-move-invocations-of-hvm_flush_guest_tlbs.patch 5a79d7ed-libxc-packed-initrd-dont-fail-domain-creation.patch 5a9985bd-x86-invpcid-support.patch 5ac72a48-gcc8.patch 5ac72a5f-gcc8.patch 5ac72a64-gcc8.patch 5ac72a69-gcc8.patch 5ac72a6e-gcc8.patch 5ac72a74-gcc8.patch 5ac72a7b-gcc8.patch 5ad4923e-x86-correct-S3-resume-ordering.patch 5ad49293-x86-suppress-BTI-mitigations-around-S3.patch 5ad600d4-x86-pv-introduce-x86emul_read_dr.patch 5ad600d4-x86-pv-introduce-x86emul_write_dr.patch 5ad8c3a7-x86-spec_ctrl-update-retpoline-decision-making.patch 5adda097-x86-HPET-fix-race-triggering-ASSERT.patch 5adda0d5-x86-HVM-never-retain-emulated-insn-cache.patch 5adde9ed-xpti-fix-double-fault-handling.patch 5ae06fad-SVM-fix-intercepts-for-SYS-CALL-ENTER-MSRs.patch 5ae31917-x86-cpuidle-init-stats-lock-once.patch 5aeaeae4-introduce-vcpu_sleep_nosync_locked.patch 5aeaeaf0-sched-fix-races-in-vcpu-migration.patch 5aeb2c57-x86-retval-checks-of-set-guest-trapbounce.patch 5aec7393-1-x86-xpti-avoid-copy.patch 5aec7393-2-x86-xpti-write-cr3.patch 5aec744a-3-x86-xpti-per-domain-flag.patch 5aec744a-4-x86-xpti-use-invpcid.patch 5aec744a-5-x86-xpti-no-global-pages.patch 5aec744a-6-x86-xpti-cr3-valid-flag.patch 5aec744a-7-x86-xpti-pv_guest_cr4_to_real_cr4.patch 5aec744b-8-x86-xpti-cr3-helpers.patch 5aec74a8-9-x86-xpti-use-pcid.patch 5af1daa9-1-x86-traps-fix-dr6-handing-in-DB-handler.patch 5af1daa9-2-x86-pv-move-exception-injection-into-test_all_events.patch 5af1daa9-3-x86-traps-use-IST-for-DB.patch 5af1daa9-4-x86-traps-fix-handling-of-DB-in-hypervisor-context.patch 5af1daa9-x86-HVM-guard-against-bogus-emulator-ioreq-state.patch 5af1daa9-x86-vpt-support-IO-APIC-routed-intr.patch 5af97999-viridian-cpuid-leaf-40000003.patch 5afc13ae-1-x86-read-MSR_ARCH_CAPABILITIES-once.patch 5afc13ae-2-x86-express-Xen-SPEC_CTRL-choice-as-variable.patch 5afc13ae-3-x86-merge-bti_ist_info-use_shadow_spec_ctrl.patch 5afc13ae-4-x86-fold-XEN_IBRS-ALTERNATIVES.patch 5afc13ae-5-x86-rename-bits-of-spec_ctrl-infrastructure.patch 5afc13ae-6-x86-elide-MSR_SPEC_CTRL-handling-in-idle.patch 5afc13ae-7-x86-split-X86_FEATURE_SC_MSR.patch 5afc13ae-8-x86-explicitly-set-Xen-default-SPEC_CTRL.patch 5afc13ae-9-x86-cpuid-improve-guest-policies-for-speculative.patch 5afc13ae-A-x86-introduce-spec-ctrl-cmdline-opt.patch 5b02c786-x86-AMD-mitigations-for-GPZ-SP4.patch 5b02c786-x86-Intel-mitigations-for-GPZ-SP4.patch 5b02c786-x86-msr-virtualise-SPEC_CTRL-SSBD.patch 5b0bc9da-x86-XPTI-fix-S3-resume.patch 5b0d2286-libxc-x86-PV-dont-hand-through-CPUID-leaf-0x80000008.patch 5b0d2d91-x86-suppress-sync-when-XPTI-off.patch 5b0d2dbc-x86-correct-default_xen_spec_ctrl.patch 5b0d2ddc-x86-CPUID-dont-override-tool-stack-hidden-STIBP.patch 5b150ef9-x86-fix-error-handling-of-pv-dr7-shadow.patch 5b21825d-1-x86-support-fully-eager-FPU-context-switching.patch 5b21825d-2-x86-spec-ctrl-mitigations-for-LazyFPU.patch 5b238b92-x86-HVM-account-for-fully-eager-FPU.patch 5b2b7172-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b31e004-x86-HVM-emul-attempts-FPU-set-fpu_initialised.patch 5b323e3c-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b34882d-x86-mm-dont-bypass-preemption-checks.patch 5b348874-x86-refine-checks-in-DB-handler.patch 5b348897-libxl-qemu_disk_scsi_drive_string-break-out-common.patch 5b3488a2-libxl-restore-passing-ro-to-qemu-for-SCSI-disks.patch 5b34891a-x86-HVM-dont-cause-NM-to-be-raised.patch 5b348954-x86-guard-against-NM.patch libxl.Add-a-version-check-of-QEMU-for-QMP-commands.patch libxl.LIBXL_DESTROY_TIMEOUT.patch libxl.qmp-Tell-QEMU-about-live-migration-or-snapshot.patch xen_fix_build_with_acpica_20180427_and_new_packages.patch- Submit upstream patch libacpi: fixes for iasl >= 20180427 git commit 858dbaaeda33b05c1ac80aea0ba9a03924e09005 xen_fix_build_with_acpica_20180427_and_new_packages.patch This is needed for acpica package to get updated in our build service- Upstream patches from Jan (bsc#1027519) 5b02c786-x86-AMD-mitigations-for-GPZ-SP4.patch (Replaces Spectre-v4-1.patch) 5b02c786-x86-Intel-mitigations-for-GPZ-SP4.patch (Replaces Spectre-v4-2.patch) 5b02c786-x86-msr-virtualise-SPEC_CTRL-SSBD.patch (Replaces Spectre-v4-3.patch) 5b0bc9da-x86-XPTI-fix-S3-resume.patch 5b0d2286-libxc-x86-PV-dont-hand-through-CPUID-leaf-0x80000008.patch 5b0d2d91-x86-suppress-sync-when-XPTI-off.patch 5b0d2dbc-x86-correct-default_xen_spec_ctrl.patch 5b0d2ddc-x86-CPUID-dont-override-tool-stack-hidden-STIBP.patch 5b150ef9-x86-fix-error-handling-of-pv-dr7-shadow.patch 5b21825d-1-x86-support-fully-eager-FPU-context-switching.patch (Replaces xsa267-1.patch) 5b21825d-2-x86-spec-ctrl-mitigations-for-LazyFPU.patch (Replaces xsa267-2.patch) 5b238b92-x86-HVM-account-for-fully-eager-FPU.patch 5b2b7172-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b31e004-x86-HVM-emul-attempts-FPU-set-fpu_initialised.patch 5b323e3c-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b34882d-x86-mm-dont-bypass-preemption-checks.patch (Replaces xsa264.patch) 5b348874-x86-refine-checks-in-DB-handler.patch (Replaces xsa265.patch) 5b348897-libxl-qemu_disk_scsi_drive_string-break-out-common.patch (Replaces xsa266-1-<>.patch) 5b3488a2-libxl-restore-passing-ro-to-qemu-for-SCSI-disks.patch (Replaces xsa266-2-<>.patch) 5b34891a-x86-HVM-dont-cause-NM-to-be-raised.patch 5b348954-x86-guard-against-NM.patch- Fix more build gcc8 related failures with xen.fuzz-_FORTIFY_SOURCE.patch- bsc#1098403 - fix regression introduced by changes for bsc#1079730 a PV domU without qcow2 and/or vfb has no qemu attached. Ignore QMP errors for PV domUs to handle PV domUs with and without an attached qemu-xen. xen.bug1079730.patch- bsc#1097521 - VUL-0: CVE-2018-12891: xen: preemption checks bypassed in x86 PV MM handling (XSA-264) xsa264.patch - bsc#1097522 - VUL-0: CVE-2018-12893: xen: x86: #DB exception safety check can be triggered by a guest (XSA-265) xsa265.patch - bsc#1097523 - VUL-0: CVE-2018-12892: xen: libxl fails to honour readonly flag on HVM emulated SCSI disks (XSA-266) xsa266-1-libxl-qemu_disk_scsi_drive_string-Break-out-common-p.patch xsa266-2-libxl-restore-passing-readonly-to-qemu-for-SCSI-disk.patch- bsc#1095242 - VUL-0: CVE-2018-3665: xen: Lazy FP Save/Restore (XSA-267) xsa267-1.patch xsa267-2.patch- bsc#1092543 - GCC 8: xen build fails gcc8-fix-warning-on-i586.patch- bsc#1092631 - VUL-0: CVE-2018-3639: xen: V4 – Speculative Store Bypass aka "Memory Disambiguation" (XSA-263) 5ad4923e-x86-correct-S3-resume-ordering.patch 5ad49293-x86-suppress-BTI-mitigations-around-S3.patch 5afc13ae-1-x86-read-MSR_ARCH_CAPABILITIES-once.patch 5afc13ae-2-x86-express-Xen-SPEC_CTRL-choice-as-variable.patch 5afc13ae-3-x86-merge-bti_ist_info-use_shadow_spec_ctrl.patch 5afc13ae-4-x86-fold-XEN_IBRS-ALTERNATIVES.patch 5afc13ae-5-x86-rename-bits-of-spec_ctrl-infrastructure.patch 5afc13ae-6-x86-elide-MSR_SPEC_CTRL-handling-in-idle.patch 5afc13ae-7-x86-split-X86_FEATURE_SC_MSR.patch 5afc13ae-8-x86-explicitly-set-Xen-default-SPEC_CTRL.patch 5afc13ae-9-x86-cpuid-improve-guest-policies-for-speculative.patch 5afc13ae-A-x86-introduce-spec-ctrl-cmdline-opt.patch Spectre-v4-1.patch Spectre-v4-2.patch Spectre-v4-3.patch- Always call qemus xen-save-devices-state in suspend/resume to fix migration with qcow2 images (bsc#1079730) libxl.Add-a-version-check-of-QEMU-for-QMP-commands.patch libxl.qmp-Tell-QEMU-about-live-migration-or-snapshot.patch xen.bug1079730.patch- bsc#1087289 - L3: Xen BUG at sched_credit.c:1663 5aeaeae4-introduce-vcpu_sleep_nosync_locked.patch 5aeaeaf0-sched-fix-races-in-vcpu-migration.patch - Upstream patches from Jan (bsc#1027519) 5ad600d4-x86-pv-introduce-x86emul_read_dr.patch 5ad600d4-x86-pv-introduce-x86emul_write_dr.patch 5ad8c3a7-x86-spec_ctrl-update-retpoline-decision-making.patch 5adda097-x86-HPET-fix-race-triggering-ASSERT.patch 5adda0d5-x86-HVM-never-retain-emulated-insn-cache.patch 5ae06fad-SVM-fix-intercepts-for-SYS-CALL-ENTER-MSRs.patch 5ae31917-x86-cpuidle-init-stats-lock-once.patch 5aeb2c57-x86-retval-checks-of-set-guest-trapbounce.patch 5af1daa9-1-x86-traps-fix-dr6-handing-in-DB-handler.patch (Replaces xsa260-1.patch) 5af1daa9-2-x86-pv-move-exception-injection-into-test_all_events.patch (Replaces xsa260-2.patch) 5af1daa9-3-x86-traps-use-IST-for-DB.patch (Replaces xsa260-3.patch) 5af1daa9-4-x86-traps-fix-handling-of-DB-in-hypervisor-context.patch (Replaces xsa260-4.patch) 5af1daa9-x86-HVM-guard-against-bogus-emulator-ioreq-state.patch (Replaces xsa262.patch) 5af1daa9-x86-vpt-support-IO-APIC-routed-intr.patch (Replaces xsa261.patch) 5af97999-viridian-cpuid-leaf-40000003.patch- Fixes related to Page Table Isolation (XPTI). bsc#1074562 XSA-254 5a6703cb-x86-move-invocations-of-hvm_flush_guest_tlbs.patch 5a9985bd-x86-invpcid-support.patch 5adde9ed-xpti-fix-double-fault-handling.patch 5aec7393-1-x86-xpti-avoid-copy.patch 5aec7393-2-x86-xpti-write-cr3.patch 5aec744a-3-x86-xpti-per-domain-flag.patch 5aec744a-4-x86-xpti-use-invpcid.patch 5aec744a-5-x86-xpti-no-global-pages.patch 5aec744a-6-x86-xpti-cr3-valid-flag.patch 5aec744a-7-x86-xpti-pv_guest_cr4_to_real_cr4.patch 5aec744b-8-x86-xpti-cr3-helpers.patch 5aec74a8-9-x86-xpti-use-pcid.patch- bsc#1092543 - GCC 8: xen build fails 5ac72a48-gcc8.patch 5ac72a5f-gcc8.patch 5ac72a64-gcc8.patch 5ac72a69-gcc8.patch 5ac72a6e-gcc8.patch 5ac72a74-gcc8.patch 5ac72a7b-gcc8.patch gcc8-inlining-failed.patch- Update to Xen 4.10.1 bug fix release (bsc#1027519) xen-4.10.1-testing-src.tar.bz2 disable-building-pv-shim.patch - Drop the following patches contained in the new tarball 5a21a77e-x86-pv-construct-d0v0s-GDT-properly.patch 5a2fda0d-x86-mb2-avoid-Xen-when-looking-for-module-crashkernel-pos.patch 5a2ffc1f-x86-mm-drop-bogus-paging-mode-assertion.patch 5a313972-x86-microcode-add-support-for-AMD-Fam17.patch 5a32bd79-x86-vmx-dont-use-hvm_inject_hw_exception-in-.patch 5a4caa5e-x86-IRQ-conditionally-preserve-access-perm.patch 5a4caa8c-x86-E820-don-t-overrun-array.patch 5a4e2bca-x86-free-msr_vcpu_policy-during-destruction.patch 5a4e2c2c-x86-upcall-inject-spurious-event-after-setting-vector.patch 5a4fd893-1-x86-break-out-alternative-asm-into-separate-header.patch 5a4fd893-2-x86-introduce-ALTERNATIVE_2-macros.patch 5a4fd893-3-x86-hvm-rename-update_guest_vendor-to-cpuid_policy_changed.patch 5a4fd893-4-x86-introduce-cpuid_policy_updated.patch 5a4fd893-5-x86-entry-remove-partial-cpu_user_regs.patch 5a4fd894-1-x86-rearrange-RESTORE_ALL-to-restore-in-stack-order.patch 5a4fd894-2-x86-hvm-use-SAVE_ALL-after-VMExit.patch 5a4fd894-3-x86-erase-guest-GPRs-on-entry-to-Xen.patch 5a4fd894-4-clarifications-to-wait-infrastructure.patch 5a534c78-x86-dont-use-incorrect-CPUID-values-for-topology.patch 5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4-updates.patch 5a5e2cff-x86-Meltdown-band-aid.patch 5a5e2d73-x86-Meltdown-band-aid-conditional.patch 5a5e3a4e-1-x86-support-compiling-with-indirect-branch-thunks.patch 5a5e3a4e-2-x86-support-indirect-thunks-from-asm.patch 5a5e3a4e-3-x86-report-speculative-mitigation-details.patch 5a5e3a4e-4-x86-AMD-set-lfence-as-Dispatch-Serialising.patch 5a5e3a4e-5-x86-introduce-alternative-indirect-thunks.patch 5a5e3a4e-6-x86-definitions-for-Indirect-Branch-Controls.patch 5a5e3a4e-7-x86-cmdline-opt-to-disable-IBRS-IBPB-STIBP.patch 5a5e459c-1-x86-SVM-offer-CPUID-faulting-to-AMD-HVM-guests.patch 5a5e459c-2-x86-report-domain-id-on-CPUID.patch 5a68bc16-x86-acpi-process-softirqs-logging-Cx.patch 5a69c0b9-x86-fix-GET_STACK_END.patch 5a6b36cd-1-x86-cpuid-handling-of-IBRS-IBPB-STIBP-and-IBRS-for-guests.patch 5a6b36cd-2-x86-msr-emulation-of-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-3-x86-migrate-MSR_SPEC_CTRL.patch 5a6b36cd-4-x86-hvm-permit-direct-access-to-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-5-x86-use-SPEC_CTRL-on-entry.patch 5a6b36cd-6-x86-clobber-RSB-RAS-on-entry.patch 5a6b36cd-7-x86-no-alternatives-in-NMI-MC-paths.patch 5a6b36cd-8-x86-boot-calculate-best-BTI-mitigation.patch 5a6b36cd-9-x86-issue-speculation-barrier.patch 5a6b36cd-A-x86-offer-Indirect-Branch-Controls-to-guests.patch 5a6b36cd-B-x86-clear-SPEC_CTRL-while-idle.patch 5a7b1bdd-x86-reduce-Meltdown-band-aid-IPI-overhead.patch 5a843807-x86-spec_ctrl-fix-bugs-in-SPEC_CTRL_ENTRY_FROM_INTR_IST.patch 5a856a2b-x86-emul-fix-64bit-decoding-of-segment-overrides.patch 5a856a2b-x86-use-32bit-xors-for-clearing-GPRs.patch 5a856a2b-x86-xpti-hide-almost-all-of-Xen-image-mappings.patch 5a8be788-x86-nmi-start-NMI-watchdog-on-CPU0-after-SMP.patch 5a95373b-x86-PV-avoid-leaking-other-guests-MSR_TSC_AUX.patch 5a95571f-memory-dont-implicitly-unpin-in-decrease-res.patch 5a95576c-gnttab-ARM-dont-corrupt-shared-GFN-array.patch 5a955800-gnttab-dont-free-status-pages-on-ver-change.patch 5a955854-x86-disallow-HVM-creation-without-LAPIC-emul.patch 5a956747-x86-HVM-dont-give-wrong-impression-of-WRMSR-success.patch 5a9eb7f1-x86-xpti-dont-map-stack-guard-pages.patch 5a9eb85c-x86-slightly-reduce-XPTI-overhead.patch 5a9eb890-x86-remove-CR-reads-from-exit-to-guest-path.patch 5aa2b6b9-cpufreq-ondemand-CPU-offlining-race.patch 5aaa9878-x86-vlapic-clear-TMR-bit-for-edge-triggered-intr.patch xsa258.patch xsa259.patch- bsc#1090820 - VUL-0: CVE-2018-8897: xen: x86: mishandling of debug exceptions (XSA-260) xsa260-1.patch xsa260-2.patch xsa260-3.patch xsa260-4.patch - bsc#1090822 - VUL-0: CVE-2018-10982: xen: x86 vHPET interrupt injection errors (XSA-261) xsa261.patch - bsc#1090823 - VUL-0: CVE-2018-10981: xen: qemu may drive Xen into unbounded loop (XSA-262) xsa262.patch- bsc#1089152 - VUL-0: CVE-2018-10472: xen: Information leak via crafted user-supplied CDROM (XSA-258) xsa258.patch - bsc#1089635 - VUL-0: CVE-2018-10471: xen: x86: PV guest may crash Xen with XPTI (XSA-259) xsa259.patch- Preserve xen-syms from xen-dbg.gz to allow processing vmcores with crash(1) (bsc#1087251)- Upstream patches from Jan (bsc#1027519) and fixes related to Page Table Isolation (XPTI). See also bsc#1074562 XSA-254 5a856a2b-x86-xpti-hide-almost-all-of-Xen-image-mappings.patch 5a9eb7f1-x86-xpti-dont-map-stack-guard-pages.patch 5a9eb85c-x86-slightly-reduce-XPTI-overhead.patch 5a9eb890-x86-remove-CR-reads-from-exit-to-guest-path.patch 5aa2b6b9-cpufreq-ondemand-CPU-offlining-race.patch 5aaa9878-x86-vlapic-clear-TMR-bit-for-edge-triggered-intr.patch- bsc#1072834 - Xen HVM: unchecked MSR access error: RDMSR from 0xc90 at rIP: 0xffffffff93061456 (native_read_msr+0x6/0x30) 5a956747-x86-HVM-dont-give-wrong-impression-of-WRMSR-success.patch - Upstream patches from Jan (bsc#1027519) 5a79d7ed-libxc-packed-initrd-dont-fail-domain-creation.patch 5a7b1bdd-x86-reduce-Meltdown-band-aid-IPI-overhead.patch 5a843807-x86-spec_ctrl-fix-bugs-in-SPEC_CTRL_ENTRY_FROM_INTR_IST.patch 5a856a2b-x86-emul-fix-64bit-decoding-of-segment-overrides.patch 5a856a2b-x86-use-32bit-xors-for-clearing-GPRs.patch 5a8be788-x86-nmi-start-NMI-watchdog-on-CPU0-after-SMP.patch 5a95373b-x86-PV-avoid-leaking-other-guests-MSR_TSC_AUX.patch 5a95571f-memory-dont-implicitly-unpin-in-decrease-res.patch (Replaces xsa252.patch) 5a95576c-gnttab-ARM-dont-corrupt-shared-GFN-array.patch (Replaces xsa255-1.patch) 5a955800-gnttab-dont-free-status-pages-on-ver-change.patch (Replaces xsa255-2.patch) 5a955854-x86-disallow-HVM-creation-without-LAPIC-emul.patch (Replaces xsa256.patch) - Drop xsa252.patch xsa255-1.patch xsa255-2.patch xsa256.patch- bsc#1080635 - VUL-0: CVE-2018-7540: xen: DoS via non-preemptable L3/L4 pagetable freeing (XSA-252) xsa252.patch - bsc#1080662 - VUL-0: CVE-2018-7541: xen: grant table v2 -> v1 transition may crash Xen (XSA-255) xsa255-1.patch xsa255-2.patch - bsc#1080634 - VUL-0: CVE-2018-7542: xen: x86 PVH guest without LAPIC may DoS the host (XSA-256) xsa256.patch- Remove stale systemd presets code for 13.2 and older- fate#324965 - add script, udev rule and systemd service to watch for vcpu online/offline events in a HVM domU They are triggered via xl vcpu-set domU N- Replace hardcoded xen with Name tag when refering to subpkgs- Make sure tools and tools-domU require libs from the very same build- tools-domU: Add support for qemu guest agent. New files 80-xen-channel-setup.rules and xen-channel-setup.sh configure a xen-pv-channel for use by the guest agent FATE#324963- Remove outdated /etc/xen/README*- bsc#1073961 - VUL-0: CVE-2018-5244: xen: x86: memory leak with MSR emulation (XSA-253) 5a4e2bca-x86-free-msr_vcpu_policy-during-destruction.patch - bsc#1074562 - VUL-0: CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 xen: Information leak via side effects of speculative execution (XSA-254). Includes Spectre v2 mitigation. 5a4caa5e-x86-IRQ-conditionally-preserve-access-perm.patch 5a4caa8c-x86-E820-don-t-overrun-array.patch 5a4e2c2c-x86-upcall-inject-spurious-event-after-setting-vector.patch 5a4fd893-1-x86-break-out-alternative-asm-into-separate-header.patch 5a4fd893-2-x86-introduce-ALTERNATIVE_2-macros.patch 5a4fd893-3-x86-hvm-rename-update_guest_vendor-to-cpuid_policy_changed.patch 5a4fd893-4-x86-introduce-cpuid_policy_updated.patch 5a4fd893-5-x86-entry-remove-partial-cpu_user_regs.patch 5a4fd894-1-x86-rearrange-RESTORE_ALL-to-restore-in-stack-order.patch 5a4fd894-2-x86-hvm-use-SAVE_ALL-after-VMExit.patch 5a4fd894-3-x86-erase-guest-GPRs-on-entry-to-Xen.patch 5a4fd894-4-clarifications-to-wait-infrastructure.patch 5a534c78-x86-dont-use-incorrect-CPUID-values-for-topology.patch 5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4-updates.patch 5a5e2cff-x86-Meltdown-band-aid.patch 5a5e2d73-x86-Meltdown-band-aid-conditional.patch 5a5e3a4e-1-x86-support-compiling-with-indirect-branch-thunks.patch 5a5e3a4e-2-x86-support-indirect-thunks-from-asm.patch 5a5e3a4e-3-x86-report-speculative-mitigation-details.patch 5a5e3a4e-4-x86-AMD-set-lfence-as-Dispatch-Serialising.patch 5a5e3a4e-5-x86-introduce-alternative-indirect-thunks.patch 5a5e3a4e-6-x86-definitions-for-Indirect-Branch-Controls.patch 5a5e3a4e-7-x86-cmdline-opt-to-disable-IBRS-IBPB-STIBP.patch 5a5e459c-1-x86-SVM-offer-CPUID-faulting-to-AMD-HVM-guests.patch 5a5e459c-2-x86-report-domain-id-on-CPUID.patch 5a68bc16-x86-acpi-process-softirqs-logging-Cx.patch 5a69c0b9-x86-fix-GET_STACK_END.patch 5a6b36cd-1-x86-cpuid-handling-of-IBRS-IBPB-STIBP-and-IBRS-for-guests.patch 5a6b36cd-2-x86-msr-emulation-of-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-3-x86-migrate-MSR_SPEC_CTRL.patch 5a6b36cd-4-x86-hvm-permit-direct-access-to-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-5-x86-use-SPEC_CTRL-on-entry.patch 5a6b36cd-6-x86-clobber-RSB-RAS-on-entry.patch 5a6b36cd-7-x86-no-alternatives-in-NMI-MC-paths.patch 5a6b36cd-8-x86-boot-calculate-best-BTI-mitigation.patch 5a6b36cd-9-x86-issue-speculation-barrier.patch 5a6b36cd-A-x86-offer-Indirect-Branch-Controls-to-guests.patch 5a6b36cd-B-x86-clear-SPEC_CTRL-while-idle.patch- Fix python3 deprecated atoi call (bsc#1067224) pygrub-python3-conversion.patch - Drop xenmon-python3-conversion.patch- bsc#1067317 - pass cache=writeback|unsafe|directsync to qemu, depending on the libxl disk settings libxl.add-option-to-disable-disk-cache-flushes-in-qdisk.patch- Remove libxl.LIBXL_DESTROY_TIMEOUT.debug.patch- bsc#1067224 - xen-tools have hard dependency on Python 2 build-python3-conversion.patch bin-python3-conversion.patch- bsc#1070165 - xen crashes after aborted localhost migration 5a2ffc1f-x86-mm-drop-bogus-paging-mode-assertion.patch - bsc#1035442 - L3: libxl: error: libxl.c:1676:devices_destroy_cb: libxl__devices_destroy failed 5a33a12f-domctl-improve-locking-during-domain-destruction.patch - Upstream patches from Jan (bsc#1027519) 5a21a77e-x86-pv-construct-d0v0s-GDT-properly.patch 5a2fda0d-x86-mb2-avoid-Xen-when-looking-for-module-crashkernel-pos.patch 5a313972-x86-microcode-add-support-for-AMD-Fam17.patch 5a32bd79-x86-vmx-dont-use-hvm_inject_hw_exception-in-.patch- Update to Xen 4.10.0 FCS (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Rebuild initrd if xen-tools-domU is updated- Update to Xen 4.10.0-rc8 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Increase the value of LIBXL_DESTROY_TIMEOUT from 10 to 100 seconds If many domUs shutdown in parallel the backends can not keep up Add some debug output to track how long backend shutdown takes (bsc#1035442) libxl.LIBXL_DESTROY_TIMEOUT.patch libxl.LIBXL_DESTROY_TIMEOUT.debug.patch- Adjust xenstore-run-in-studomain.patch to change the defaults in the code instead of changing the sysconfig template, to also cover the upgrade case- Update to Xen 4.10.0-rc6 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Since xen switched to Kconfig, building a debug hypervisor was done by default. Adjust make logic to build a non-debug hypervisor by default, and continue to provide one as xen-dbg.gz- fate#316614: set migration constraints from cmdline fix libxl.set-migration-constraints-from-cmdline.patch for xen-4.10- Document the suse-diskcache-disable-flush option in xl-disk-configuration(5) (bsc#879425,bsc#1067317)- Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468)- Update to Xen 4.10.0-rc5 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - fate#323663 - Run Xenstore in stubdomain xenstore-run-in-studomain.patch- bsc#1067224 - xen-tools have hard dependency on Python 2 pygrub-python3-conversion.patch xenmon-python3-conversion.patch migration-python3-conversion.patch xnloader.py xen2libvirt.py- Remove xendriverdomain.service (bsc#1065185) Driver domains must be configured manually with custom .service file- Update to Xen 4.10.0-rc3 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - Drop 59f31268-libxc-remove-stale-error-check-for-domain-size.patch- Adjust xen-dom0-modules.service to ignore errors (bsc#1065187)- fate#324052 Support migration of Xen HVM domains larger than 1TB 59f31268-libxc-remove-stale-error-check-for-domain-size.patch- Update to Xen 4.10.0-rc2 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Update to Xen 4.10.0-rc1 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - Drop patches included in new tarball 592fd5f0-stop_machine-fill-result-only-in-case-of-error.patch 596f257e-x86-fix-hvmemul_insn_fetch.patch 5982fd99-VT-d-don-t-panic-warn-on-iommu-no-igfx.patch 598c3630-VT-d-PI-disable-when-CPU-side-PI-is-off.patch 598c3706-cpufreq-only-stop-ondemand-governor-if-started.patch 5992f1e5-x86-grant-disallow-misaligned-PTEs.patch 5992f20d-gnttab-split-maptrack-lock-to-make-it-useful-again.patch 5992f233-gnttab-correct-pin-status-fixup-for-copy.patch 59958e76-gnttab-dont-use-possibly-unbounded-tail-calls.patch 59958ebf-gnttab-fix-transitive-grant-handling.patch 59958edd-gnttab-avoid-spurious-maptrack-handle-alloc-failures.patch 599da329-arm-mm-release-grant-lock-on-xatp1-error-paths.patch 59a01223-x86-check-for-alloc-errors-in-modify_xen_mappings.patch 59a0130c-x86-efi-dont-write-relocs-in-efi_arch_relocate_image-1st-pass.patch 59a9221f-VT-d-use-correct-BDF-for-VF-to-search-VT-d-unit.patch 59ae9177-x86-emul-fix-handling-of-unimplemented-Grp7-insns.patch 59aec335-x86emul-correct-VEX-W-handling-for-VPINSRD.patch 59aec375-x86emul-correct-VEX-L-handling-for-VCVTx2SI.patch 59afcea0-x86-introduce-and-use-setup_force_cpu_cap.patch 59b2a7f2-x86-HVM-correct-repeat-count-update-linear-phys.patch 59b7d664-mm-make-sure-node-is-less-than-MAX_NUMNODES.patch 59b7d69b-grant_table-fix-GNTTABOP_cache_flush-handling.patch 59b7d6c8-xenstore-dont-unlink-connection-object-twice.patch 59b7d6d9-gnttab-also-validate-PTE-perms-upon-destroy-replace.patch gcc7-arm.patch gcc7-mini-os.patch- bsc#1061084 - VUL-0: xen: page type reference leak on x86 (XSA-242) xsa242.patch - bsc#1061086 - VUL-0: xen: x86: Incorrect handling of self-linear shadow mappings with translated guests (XSA-243) xsa243.patch - bsc#1061087 - VUL-0: xen: x86: Incorrect handling of IST settings during CPU hotplug (XSA-244) xsa244.patch- bsc#1061077 - VUL-0: xen: DMOP map/unmap missing argument checks (XSA-238) xsa238.patch - bsc#1061080 - VUL-0: xen: hypervisor stack leak in x86 I/O intercept code (XSA-239) xsa239.patch - bsc#1061081 - VUL-0: xen: Unlimited recursion in linear pagetable de-typing (XSA-240) xsa240-1.patch xsa240-2.patch - bsc#1061082 - VUL-0: xen: Stale TLB entry due to page type release race (XSA-241) xsa241.patch- bsc#1061075 - VUL-0: xen: pin count / page reference race in grant table code (XSA-236) xsa236.patch - bsc#1061076 - VUL-0: xen: multiple MSI mapping issues on x86 (XSA-237) xsa237-1.patch xsa237-2.patch xsa237-3.patch xsa237-4.patch xsa237-5.patch- bsc#1056278 - VUL-0: xen: Missing NUMA node parameter verification (XSA-231) 59b7d664-mm-make-sure-node-is-less-than-MAX_NUMNODES.patch - bsc#1056280 - VUL-0: xen: Missing check for grant table (XSA-232) 59b7d69b-grant_table-fix-GNTTABOP_cache_flush-handling.patch - bsc#1056281 - VUL-0: xen: cxenstored: Race in domain cleanup (XSA-233) 59b7d6c8-xenstore-dont-unlink-connection-object-twice.patch - bsc#1056282 - VUL-0: xen: insufficient grant unmapping checks for x86 PV guests (XSA-234) 59b7d6d9-gnttab-also-validate-PTE-perms-upon-destroy-replace.patch - bsc#1055321 - VUL-0: xen: add-to-physmap error paths fail to release lock on ARM (XSA-235) 599da329-arm-mm-release-grant-lock-on-xatp1-error-paths.patch - Upstream patches from Jan (bsc#1027519) 59a01223-x86-check-for-alloc-errors-in-modify_xen_mappings.patch 59a0130c-x86-efi-dont-write-relocs-in-efi_arch_relocate_image-1st-pass.patch 59a9221f-VT-d-use-correct-BDF-for-VF-to-search-VT-d-unit.patch 59ae9177-x86-emul-fix-handling-of-unimplemented-Grp7-insns.patch 59aec335-x86emul-correct-VEX-W-handling-for-VPINSRD.patch 59aec375-x86emul-correct-VEX-L-handling-for-VCVTx2SI.patch 59afcea0-x86-introduce-and-use-setup_force_cpu_cap.patch 59b2a7f2-x86-HVM-correct-repeat-count-update-linear-phys.patch - Dropped gcc7-xen.patch- bsc#1057358 - Cannot Boot into SLES12.3 with Xen hypervisor when Secure Boot is Enabled xen.spec- bsc#1055695 - XEN: 11SP4 and 12SP3 HVM guests can not be restored update from v6 to v9 to cover more cases for ballooned domUs libxc.sr.superpage.patch- bsc#1026236 - remove suse_vtsc_tolerance= cmdline option for Xen drop the patch because it is not upstream acceptable remove xen.suse_vtsc_tolerance.patch- bsc#1055695 - XEN: 11SP4 and 12SP3 HVM guests can not be restored after the save using xl stack libxc.sr.superpage.patch- Unignore gcc-PIE the toolstack disables PIE for firmware builds as needed- Upstream patches from Jan (bsc#1027519) 592fd5f0-stop_machine-fill-result-only-in-case-of-error.patch 596f257e-x86-fix-hvmemul_insn_fetch.patch 5982fd99-VT-d-don-t-panic-warn-on-iommu-no-igfx.patch 598c3630-VT-d-PI-disable-when-CPU-side-PI-is-off.patch 598c3706-cpufreq-only-stop-ondemand-governor-if-started.patch 5992f1e5-x86-grant-disallow-misaligned-PTEs.patch (Replaces xsa227.patch) 5992f20d-gnttab-split-maptrack-lock-to-make-it-useful-again.patch (Replaces xsa228.patch) 5992f233-gnttab-correct-pin-status-fixup-for-copy.patch (Replaces xsa230.patch) 59958e76-gnttab-dont-use-possibly-unbounded-tail-calls.patch (Replaces xsa226-1.patch) 59958ebf-gnttab-fix-transitive-grant-handling.patch (Replaces xsa226-2.patch) 59958edd-gnttab-avoid-spurious-maptrack-handle-alloc-failures.patch- bsc#1044974 - xen-tools require python-pam xen.spec- Clean up spec file errors and a few warnings. (bsc#1027519) - Removed conditional 'with_systemd' and some old deprecated 'sles_version' checks. xen.spec- Remove use of brctl utiltiy from supportconfig plugin FATE#323639- Use upstream variant of mini-os __udivmoddi4 change gcc7-mini-os.patch- fate#323639 Move bridge-utils to legacy replace-obsolete-network-configuration-commands-in-s.patch- bsc#1052686 - VUL-0: xen: grant_table: possibly premature clearing of GTF_writing / GTF_reading (XSA-230) xsa230.patch- bsc#1035231 - migration of HVM domU does not use superpages on destination dom0 libxc.sr.superpage.patch- bsc#1051787 - VUL-0: CVE-2017-12135: xen: possibly unbounded recursion in grant table code (XSA-226) xsa226-1.patch xsa226-2.patch - bsc#1051788 - VUL-0: CVE-2017-12137: xen: x86: PV privilege escalation via map_grant_ref (XSA-227) xsa227.patch - bsc#1051789 - VUL-0: CVE-2017-12136: xen: grant_table: Race conditions with maptrack free list handling (XSA-228) xsa228.patch- Add a supportconfig plugin xen-supportconfig FATE#323661- bsc#1026236 - add suse_vtsc_tolerance= cmdline option for Xen To avoid emulation of TSC access from a domU after live migration add a global tolerance for the measured host kHz xen.suse_vtsc_tolerance.patch- fate#323662 Drop qemu-dm from xen-tools package The following tarball and patches have been removed qemu-xen-traditional-dir-remote.tar.bz2 VNC-Support-for-ExtendedKeyEvent-client-message.patch 0001-net-move-the-tap-buffer-into-TAPState.patch 0002-net-increase-tap-buffer-size.patch 0003-e1000-fix-access-4-bytes-beyond-buffer-end.patch 0004-e1000-secrc-support.patch 0005-e1000-multi-buffer-packet-support.patch 0006-e1000-clear-EOP-for-multi-buffer-descriptors.patch 0007-e1000-verify-we-have-buffers-upfront.patch 0008-e1000-check-buffer-availability.patch CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch CVE-2015-4037-qemut-smb-config-dir-name.patch CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch CVE-2016-7908-qemut-net-Infinite-loop-in-mcf_fec_do_tx.patch CVE-2016-7909-qemut-net-pcnet-infinite-loop-in-pcnet_rdra_addr.patch CVE-2016-8667-qemut-dma-rc4030-divide-by-zero-error-in-set_next_tick.patch CVE-2016-8669-qemut-char-divide-by-zero-error-in-serial_update_parameters.patch CVE-2016-8910-qemut-net-rtl8139-infinite-loop-while-transmit-in-Cplus-mode.patch CVE-2016-9921-qemut-display-cirrus_vga-divide-by-zero-in-cirrus_do_copy.patch CVE-2017-6505-qemut-usb-an-infinite-loop-issue-in-ohci_service_ed_list.patch CVE-2017-8309-qemut-audio-host-memory-leakage-via-capture-buffer.patch CVE-2017-9330-qemut-usb-ohci-infinite-loop-due-to-incorrect-return-value.patch blktap.patch cdrom-removable.patch xen-qemu-iscsi-fix.patch qemu-security-etch1.patch xen-disable-qemu-monitor.patch xen-hvm-default-bridge.patch qemu-ifup-set-mtu.patch ioemu-vnc-resize.patch capslock_enable.patch altgr_2.patch log-guest-console.patch bdrv_open2_fix_flags.patch bdrv_open2_flags_2.patch ioemu-7615-qcow2-fix-alloc_cluster_link_l2.patch qemu-dm-segfault.patch bdrv_default_rwflag.patch kernel-boot-hvm.patch ioemu-watchdog-support.patch ioemu-watchdog-linkage.patch ioemu-watchdog-ib700-timer.patch ioemu-hvm-pv-support.patch pvdrv_emulation_control.patch ioemu-disable-scsi.patch ioemu-disable-emulated-ide-if-pv.patch xenpaging.qemu.flush-cache.patch ioemu-devicemodel-include.patch - Cleanup spec file and remove unused KMP patches kmp_filelist supported_module.patch xen_pvonhvm.xen_emul_unplug.patch- bsc#1002573 - Optimize LVM functions in block-dmmd block-dmmd- Record initial Xen dmesg in /var/log/xen/xen-boot.log for supportconfig. Keep previous log in /var/log/xen/xen-boot.prev.log- Remove storytelling from description in xen.rpm- Update to Xen 4.9.0 FCS (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update block-dmmd script (bsc#1002573) block-dmmd- Update to Xen 4.9.0-rc8+ (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 gcc7-arm.patch - Drop gcc7-error-xenpmd.patch- Update to Xen 4.9.0-rc8 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1042160 - VUL-1: CVE-2017-9330: xen: usb: ohci: infinite loop due to incorrect return value CVE-2017-9330-qemut-usb-ohci-infinite-loop-due-to-incorrect-return-value.patch- bsc#1037243 - VUL-1: CVE-2017-8309: xen: audio: host memory leakage via capture buffer CVE-2017-8309-qemut-audio-host-memory-leakage-via-capture-buffer.patch- Update to Xen 4.9.0-rc7 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update to Xen 4.9.0-rc6 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1031343 - xen fails to build with GCC 7 gcc7-mini-os.patch gcc7-xen.patch- bsc#1031343 - xen fails to build with GCC 7 gcc7-error-xenpmd.patch- Update to Xen 4.9.0-rc5 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 - Drop xen-tools-pkgconfig-xenlight.patch- bsc#1037779 - xen breaks kexec-tools build xen-tools-pkgconfig-xenlight.patch- Update to Xen 4.9.0-rc4 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1036146 - sles12sp2 xen VM dumps core to wrong path xen.spec- Update to Xen 4.9.0-rc3 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 aarch64-maybe-uninitialized.patch- Update to Xen 4.9.0-rc2 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update to Xen 4.9.0-rc1 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 ioemu-devicemodel-include.patch - Dropped patches contained in new tarball xen-4.8.0-testing-src.tar.bz2 0001-xenstore-let-write_node-and-some-callers-return-errn.patch 0002-xenstore-undo-function-rename.patch 0003-xenstore-rework-of-transaction-handling.patch 584806ce-x86emul-correct-PUSHF-POPF.patch 584fc649-fix-determining-when-domain-creation-is-complete.patch 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch 58510cac-x86emul-MOVNTI-no-REP-prefixes.patch 58526ccc-x86emul-64bit-ignore-most-segment-bases-in-align-check.patch 5853ed37-VT-d-correct-dma_msi_set_affinity.patch 5853ee07-x86emul-CMPXCHG16B-aligned-operand.patch 58580060-x86-emul-correct-SYSCALL-eflags-handling.patch 585aa3c5-x86-force-EFLAGS-IF-on-upon-exit-to-PV.patch 585aa407-x86-HVM-NULL-check-before-using-VMFUNC-hook.patch 585bd5fe-x86-emul-correct-VMFUNC-return-value-handling.patch 586ba81c-x86-cpu-dont-update-this_cpu-for-guest-get_cpu_vendor.patch 587d04d6-x86-xstate-fix-array-overrun-with-LWP.patch 587de4a9-x86emul-VEX-B-ignored-in-compat-mode.patch 5882129d-x86emul-LOCK-check-adjustments.patch 58821300-x86-segment-attribute-handling.patch 58873c1f-x86emul-correct-FPU-stub-asm-constraints.patch 58873c80-x86-hvm-do-not-set-msr_tsc_adjust-on-.patch 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5887888f-credit2-never-consider-CPUs-outside-of-pool.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5888b1b3-x86-emulate-dont-assume-addr_size-32-implies-protmode.patch 5899cbd9-EPT-allow-wrcomb-MMIO-mappings-again.patch 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch 58a44771-IOMMU-always-call-teardown-callback.patch 58a48ccc-x86-fix-p2m_flush_table-for-non-nested.patch 58a59f4b-libxl-correct-xenstore-entry-for-empty-cdrom.patch 58a70d94-VMX-fix-VMCS-race-on-cswitch-paths.patch 58ac1f3f-VMX-dont-leak-host-syscall-MSRs.patch 58b5a2de-x86-correct-Xens-idea-of-its-memory-layout.patch 58b6fd42-credit2-always-mark-a-tickled-pCPU-as-tickled.patch 58b6fd42-credit2-dont-miss-accounting-during-credit-reset.patch 58cbf682-x86-EFI-avoid-overrunning-mb_modules.patch 58cf9200-x86-EFI-avoid-IOMMU-faults-on-tail-gap.patch 58cf9260-x86-EFI-avoid-Xen-when-looking-for-mod-kexec-pos.patch 58cf9277-x86-time-dont-use-vTSC-if-host-guest-freqs-match.patch 58d25ea2-xenstore-add-missing-checks-for-allocation-failure.patch 58d91365-sched-dont-call-wrong-hook-via-VCPU2OP.patch CVE-2017-2615-qemut-display-cirrus-oob-access-while-doing-bitblt-copy-backward-mode.patch CVE-2017-2620-xsa209-qemut-cirrus_bitblt_cputovideo-does-not-check-if-memory-region-safe.patch glibc-2.25-compatibility-fix.patch xs-09-add_change_node-params.patch xs-10-call-add_change_node.patch xs-11-tdb-record-header.patch xs-12-node-gen-count.patch xs-13-read-directory-part-support.patch xs-14-command-array.patch xs-15-command-return-val.patch xs-16-function-static.patch xs-17-arg-parsing.patch xs-18-default-buffer.patch xs-19-handle-alloc-failures.patch xs-20-tdb-version.patch xs-21-empty-tdb-database.patch xs-22-reopen_log-fix.patch xs-23-XS_DEBUG-rename.patch xs-24-xenstored_control.patch xs-25-control-enhance.patch xs-26-log-control.patch xs-27-memory-report.patch xs-28-remove-talloc-report.patch xs-29-define-off_t.patch xsa206-0001-xenstored-apply-a-write-transaction-rate-limit.patch xsa206-0002-xenstored-Log-when-the-write-transaction-rate-limit.patch- bsc#1022703 - Xen HVM guest with OVMF hangs with unattached CDRom 58a59f4b-libxl-correct-xenstore-entry-for-empty-cdrom.patch- bsc#1015348 - L3: libvirtd does not start during boot suse-xendomains-service.patch- bsc#1014136 - Partner-L3: kdump can't dump a kernel on SLES12-SP2 with Xen hypervisor. 58cf9260-x86-EFI-avoid-Xen-when-looking-for-mod-kexec-pos.patch - bsc#1026236 - L3: Paravirtualized vs. fully virtualized migration - latter one much faster 58cf9277-x86-time-dont-use-vTSC-if-host-guest-freqs-match.patch - Upstream patch from Jan 58cbf682-x86-EFI-avoid-overrunning-mb_modules.patch 58cf9200-x86-EFI-avoid-IOMMU-faults-on-tail-gap.patch 58d91365-sched-dont-call-wrong-hook-via-VCPU2OP.patch- bsc#1022555 - L3: Timeout in "execution of /etc/xen/scripts/block add" 58d25ea2-xenstore-add-missing-checks-for-allocation-failure.patch 0001-xenstore-let-write_node-and-some-callers-return-errn.patch 0002-xenstore-undo-function-rename.patch 0003-xenstore-rework-of-transaction-handling.patch - bsc#1030144 - VUL-0: xen: xenstore denial of service via repeated update (XSA-206) xsa206-0001-xenstored-apply-a-write-transaction-rate-limit.patch xsa206-0002-xenstored-Log-when-the-write-transaction-rate-limit.patch - bsc#1029827 - Forward port xenstored xs-09-add_change_node-params.patch xs-10-call-add_change_node.patch xs-11-tdb-record-header.patch xs-12-node-gen-count.patch xs-13-read-directory-part-support.patch xs-14-command-array.patch xs-15-command-return-val.patch xs-16-function-static.patch xs-17-arg-parsing.patch xs-18-default-buffer.patch xs-19-handle-alloc-failures.patch xs-20-tdb-version.patch xs-21-empty-tdb-database.patch xs-22-reopen_log-fix.patch xs-23-XS_DEBUG-rename.patch xs-24-xenstored_control.patch xs-25-control-enhance.patch xs-26-log-control.patch xs-27-memory-report.patch xs-28-remove-talloc-report.patch xs-29-define-off_t.patch- bsc#1029128 - fix make xen to really produce xen.efi with gcc48- bsc#1028235 - VUL-0: CVE-2017-6505: xen: qemu: usb: an infinite loop issue in ohci_service_ed_list CVE-2017-6505-qemut-usb-an-infinite-loop-issue-in-ohci_service_ed_list.patch - Upstream patches from Jan (bsc#1027519) 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5899cbd9-EPT-allow-wrcomb-MMIO-mappings-again.patch 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch 58a44771-IOMMU-always-call-teardown-callback.patch 58a48ccc-x86-fix-p2m_flush_table-for-non-nested.patch 58a70d94-VMX-fix-VMCS-race-on-cswitch-paths.patch 58ac1f3f-VMX-dont-leak-host-syscall-MSRs.patch 58b5a2de-x86-correct-Xens-idea-of-its-memory-layout.patch 58b6fd42-credit2-always-mark-a-tickled-pCPU-as-tickled.patch 58b6fd42-credit2-dont-miss-accounting-during-credit-reset.patch- bsc#1027654 - XEN fails to build against glibc 2.25 glibc-2.25-compatibility-fix.patch libxl.pvscsi.patch- fate#316613: Refresh and enable libxl.pvscsi.patch- bsc#1024834 - VUL-0: CVE-2017-2620: xen: cirrus_bitblt_cputovideo does not check if memory region is safe (XSA-209) CVE-2017-2620-xsa209-qemut-cirrus_bitblt_cputovideo-does-not-check-if-memory-region-safe.patch- bsc#1023948 - [pvusb][sles12sp3][openqa] Segmentation fault happened when adding usbctrl devices via xl 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch- Upstream patches from Jan (bsc#1027519) 587d04d6-x86-xstate-fix-array-overrun-with-LWP.patch 587de4a9-x86emul-VEX-B-ignored-in-compat-mode.patch 5882129d-x86emul-LOCK-check-adjustments.patch 58821300-x86-segment-attribute-handling.patch 58873c1f-x86emul-correct-FPU-stub-asm-constraints.patch 58873c80-x86-hvm-do-not-set-msr_tsc_adjust-on-.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5887888f-credit2-never-consider-CPUs-outside-of-pool.patch 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5888b1b3-x86-emulate-dont-assume-addr_size-32-implies-protmode.patch- bsc#1023004 - VUL-0: CVE-2017-2615: qemu: display: cirrus: oob access while doing bitblt copy backward mode CVE-2017-2615-qemut-display-cirrus-oob-access-while-doing-bitblt-copy-backward-mode.patch- fate#322313 and fate#322150 require the acpica package ported to aarch64 which Xen 4.8 needs to build. Temporarily disable aarch64 until these fates are complete. xen.spec- bsc#1021952 - Virutalization/xen: Bug xen-tools missing /usr/bin/domu-xenstore; guests fail to launch tmp_build.patch xen.spec- No systemd presets for 42.3+ and SLE12SP3+ (bsc#1012842)- bsc#1007224 - broken symlinks in /usr/share/doc/packages/xen/misc/ xen.spec- 585aa3c5-x86-force-EFLAGS-IF-on-upon-exit-to-PV.patch Replaces xsa202.patch (bsc#1014298) - 585aa407-x86-HVM-NULL-check-before-using-VMFUNC-hook.patch Replaces xsa203.patch (bsc#1014300) - 58580060-x86-emul-correct-SYSCALL-eflags-handling.patch Replaces xsa204.patch (bsc#1016340) - Upstream patches from Jan 58526ccc-x86emul-64bit-ignore-most-segment-bases-in-align-check.patch 5853ed37-VT-d-correct-dma_msi_set_affinity.patch 5853ee07-x86emul-CMPXCHG16B-aligned-operand.patch 585bd5fe-x86-emul-correct-VMFUNC-return-value-handling.patch 586ba81c-x86-cpu-dont-update-this_cpu-for-guest-get_cpu_vendor.patch- bsc#1015169 - VUL-0: CVE-2016-9921, CVE-2016-9922: xen: qemu: display: cirrus_vga: a divide by zero in cirrus_do_copy CVE-2016-9921-qemut-display-cirrus_vga-divide-by-zero-in-cirrus_do_copy.patch- bsc#1016340 - VUL-0: CVE-2016-10013: xen: x86: Mishandling of SYSCALL singlestep during emulation (XSA-204) xsa204.patch- bsc#1012651 - VUL-0: CVE-2016-9932: xen: x86 CMPXCHG8B emulation fails to ignore operand size override (XSA-200) 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch- bsc#1014298 - VUL-0: CVE-2016-10024: xen: x86 PV guests may be able to mask interrupts (XSA-202) xsa202.patch - bsc#1014300 - VUL-0: CVE-2016-10025: xen: x86: missing NULL pointer check in VMFUNC emulation (XSA-203) xsa203.patch - Upstream patches from Jan 584806ce-x86emul-correct-PUSHF-POPF.patch 584fc649-fix-determining-when-domain-creation-is-complete.patch 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch 58510cac-x86emul-MOVNTI-no-REP-prefixes.patch- Update to Xen 4.8 FCS xen-4.8.0-testing-src.tar.bz2 - Dropped xen-4.7.1-testing-src.tar.bz2 0001-libxc-Rework-extra-module-initialisation.patch 0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch 0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch 0004-firmware-makefile-install-BIOS-blob.patch 0005-libxl-Load-guest-BIOS-from-file.patch 0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch 0007-hvmloader-Grab-the-hvm_start_info-pointer.patch 0008-hvmloader-Locate-the-BIOS-blob.patch 0009-hvmloader-Check-modules-whereabouts-in-perform_tests.patch 0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch 0011-hvmloader-Load-OVMF-from-modules.patch 0012-hvmloader-Specific-bios_load-function-required.patch 0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch 0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch 57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch 576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 5769106e-x86-generate-assembler-equates-for-synthesized.patch 57a1e603-x86-time-adjust-local-system-time-initialization.patch 57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch 57a30261-x86-support-newer-Intel-CPU-models.patch 5810a9cc-x86-emul-Correct-decoding-of-SReg3-operands.patch 581b2c3b-x86-emul-reject-LGDT-LIDT-with-non-canonical-addresses.patch 581b647a-x86emul-L-S-G-I-DT-ignore-opsz-overrides-in-64-bit-mode.patch 58249392-x86-svm-dont-clobber-eax-edx-if-RDMSR-intercept-fails.patch 582c35d6-x86-vmx-correct-long-mode-check-in-vmx_cpuid_intercept.patch 582c35ee-x86-traps-dont-call-hvm_hypervisor_cpuid_leaf-for-PV.patch 58343dc2-x86-hvm-Fix-the-handling-of-non-present-segments.patch 58343df8-x86-HVM-dont-load-LDTR-with-VM86-mode-attrs-during-task-switch.patch 58343e24-x86-PV-writes-of-fs-and-gs-base-MSRs-require-canonical-addresses.patch 58343e9e-libelf-fix-stack-memory-leak-when-loading-32-bit-symbol-tables.patch 58343ec2-x86emul-fix-huge-bit-offset-handling.patch 58343f29-x86-emul-correct-the-IDT-entry-calculation-in-inject_swint.patch 58343f44-x86-svm-fix-injection-of-software-interrupts.patch 58343f79-pygrub-Properly-quote-results-when-returning-them-to-the-caller.patch CVE-2016-9381-xsa197-qemut.patch CVE-2016-9637-xsa199-qemut.patch- bsc#1011652 - VUL-0: xen: qemu ioport array overflow CVE-2016-9637-xsa199-qemut.patch- bsc#1009100 - VUL-0: CVE-2016-9386: XSA-191: xen: x86 null segments not always treated as unusable 58343dc2-x86-hvm-Fix-the-handling-of-non-present-segments.patch - bsc#1009103 - VUL-0: CVE-2016-9382: XSA-192: xen: x86 task switch to VM86 mode mis-handled 58343df8-x86-HVM-dont-load-LDTR-with-VM86-mode-attrs-during-task-switch.patch - bsc#1009104 - VUL-0: CVE-2016-9385: XSA-193: xen: x86 segment base write emulation lacking canonical address checks 58343e24-x86-PV-writes-of-fs-and-gs-base-MSRs-require-canonical-addresses.patch - bsc#1009105 - VUL-0: CVE-2016-9384: XSA-194: xen: guest 32-bit ELF symbol table load leaking host data 58343e9e-libelf-fix-stack-memory-leak-when-loading-32-bit-symbol-tables.patch - bsc#1009107 - VUL-0: CVE-2016-9383: XSA-195: xen: x86 64-bit bit test instruction emulation broken 58343ec2-x86emul-fix-huge-bit-offset-handling.patch - bsc#1009108 - VUL-0: CVE-2016-9377,CVE-2016-9378: XSA-196: xen: x86 software interrupt injection mis-handled 58343f29-x86-emul-correct-the-IDT-entry-calculation-in-inject_swint.patch 58343f44-x86-svm-fix-injection-of-software-interrupts.patch - bsc#1009109 - VUL-0: CVE-2016-9381: XSA-197: xen: qemu incautious about shared ring processing CVE-2016-9381-xsa197-qemut.patch - bsc#1009111 - VUL-0: CVE-2016-9379,CVE-2016-9380: XSA-198: xen: delimiter injection vulnerabilities in pygrub 58343f79-pygrub-Properly-quote-results-when-returning-them-to-the-caller.patch - Upstream patches from Jan 581b2c3b-x86-emul-reject-LGDT-LIDT-with-non-canonical-addresses.patch 581b647a-x86emul-L-S-G-I-DT-ignore-opsz-overrides-in-64-bit-mode.patch 58249392-x86-svm-dont-clobber-eax-edx-if-RDMSR-intercept-fails.patch 582c35d6-x86-vmx-correct-long-mode-check-in-vmx_cpuid_intercept.patch 582c35ee-x86-traps-dont-call-hvm_hypervisor_cpuid_leaf-for-PV.patch- Update to Xen Version 4.7.1 xen-4.7.1-testing-src.tar.bz2 - Dropped patches contained in new tarball xen-4.7.0-testing-src.tar.bz2 575e9ca0-nested-vmx-Validate-host-VMX-MSRs-before-accessing-them.patch 57640448-xen-sched-use-default-scheduler-upon-an-invalid-sched.patch 57973099-have-schedulers-revise-initial-placement.patch 579730e6-remove-buggy-initial-placement-algorithm.patch 57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch 57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch 57ac6316-don-t-restrict-DMA-heap-to-node-0.patch 57b71fc5-x86-EFI-don-t-apply-relocations-to-l-2-3-_bootmap.patch 57b7447b-dont-permit-guest-to-populate-PoD-pages-for-itself.patch 57c4412b-x86-HVM-add-guarding-logic-for-VMX-specific-code.patch 57c57f73-libxc-correct-max_pfn-calculation-for-saving-domain.patch 57c805bf-x86-levelling-restrict-non-architectural-OSXSAVE-handling.patch 57c805c1-x86-levelling-pass-vcpu-to-ctxt_switch_levelling.patch 57c805c3-x86-levelling-provide-architectural-OSXSAVE-handling.patch 57c82be2-x86-32on64-adjust-call-gate-emulation.patch 57c93e52-fix-error-in-libxl_device_usbdev_list.patch 57c96df3-credit1-fix-a-race-when-picking-initial-pCPU.patch 57c96e2c-x86-correct-PT_NOTE-file-position.patch 57cfed43-VMX-correct-feature-checks-for-MPX-and-XSAVES.patch 57d1563d-x86-32on64-don-t-allow-recursive-page-tables-from-L3.patch 57d15679-x86-emulate-Correct-boundary-interactions-of-emulated-insns.patch 57d1569a-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch 57d18642-hvm-fep-Allow-test-insns-crossing-1-0-boundary.patch 57d18642-x86-segment-Bounds-check-accesses-to-emulation-ctxt-seg_reg.patch 57d7ca5f-x86-domctl-fix-TOCTOU-race-in-XEN_DOMCTL_getvcpuextstate.patch 57d7ca64-x86-domctl-fix-migration-of-guests-not-using-xsave.patch 57da8883-credit1-fix-mask-to-be-used-for-tickling.patch 57da8883-credit2-properly-schedule-migration-of-running-vcpu.patch 57dfb1c5-x86-Intel-hide-CPUID-faulting-capability-from-guests.patch 57e93e1d-x86emul-correct-loading-of-ss.patch 57e93e4a-x86emul-don-t-allow-null-selector-for-LTR.patch 57e93e89-x86-AMD-apply-erratum-665-workaround.patch 57ee6cbc-credit1-return-time-remaining-to-limit-as-next-timeslice.patch 57f3a8ee-x86emul-honor-guest-CR0-TS-and-CR0-EM.patch 57fb6a91-x86-defer-not-present-segment-checks.patch 5800c51d-x86-hvm-Clobber-cs-L-when-LME-becomes-set.patch 5800caec-x86emul-fix-pushing-of-selector-registers.patch 5800cb06-x86-Viridian-don-t-depend-on-undefined-register-state.patch 580e29f9-x86-MISALIGNSSE-feature-depends-on-SSE.patch 57dfb2ff-x86-Intel-Broadwell-no-PKG_C8-10_RESIDENCY-MSRs.patch- bsc#1004981 - Xen RPM doesn't contain debug hypervisor for EFI systems xen.spec- bsc#1000106 - VUL-0: CVE-2016-7777: xen: CR0.TS and CR0.EM not always honored for x86 HVM guests (XSA-190) 57f3a8ee-x86emul-honor-guest-CR0-TS-and-CR0-EM.patch - bsc#996191 - [XEN][acpi]residency -n 88 -c will cause xen panic on broadwell-ep 57dfb2ff-x86-Intel-Broadwell-no-PKG_C8-10_RESIDENCY-MSRs.patch - Upstream patches from Jan 57d7ca5f-x86-domctl-fix-TOCTOU-race-in-XEN_DOMCTL_getvcpuextstate.patch 57d7ca64-x86-domctl-fix-migration-of-guests-not-using-xsave.patch 57da8883-credit1-fix-mask-to-be-used-for-tickling.patch 57da8883-credit2-properly-schedule-migration-of-running-vcpu.patch 57dfb1c5-x86-Intel-hide-CPUID-faulting-capability-from-guests.patch 57e93e1d-x86emul-correct-loading-of-ss.patch 57e93e4a-x86emul-don-t-allow-null-selector-for-LTR.patch 57e93e89-x86-AMD-apply-erratum-665-workaround.patch 57ee6cbc-credit1-return-time-remaining-to-limit-as-next-timeslice.patch 57fb6a91-x86-defer-not-present-segment-checks.patch 5800c51d-x86-hvm-Clobber-cs-L-when-LME-becomes-set.patch 5800caec-x86emul-fix-pushing-of-selector-registers.patch 5800cb06-x86-Viridian-don-t-depend-on-undefined-register-state.patch 580e29f9-x86-MISALIGNSSE-feature-depends-on-SSE.patch 5810a9cc-x86-emul-Correct-decoding-of-SReg3-operands.patch- bsc#1007941 - Xen tools limit the number of vcpus to 256 when the system has 384 xen-arch-kconfig-nr_cpus.patch- bsc#1007157 - VUL-0: CVE-2016-8910: xen: net: rtl8139: infinite loop while transmit in C+ mode CVE-2016-8910-qemut-net-rtl8139-infinite-loop-while-transmit-in-Cplus-mode.patch- bsc#1005004 - CVE-2016-8667: xen: dma: rc4030 divide by zero error in set_next_tick CVE-2016-8667-qemut-dma-rc4030-divide-by-zero-error-in-set_next_tick.patch - bsc#1005005 - VUL-0: CVE-2016-8669: xen: char: divide by zero error in serial_update_parameters CVE-2016-8669-qemut-char-divide-by-zero-error-in-serial_update_parameters.patch- bsc#1003030 - VUL-0: CVE-2016-7908: xen: net: Infinite loop in mcf_fec_do_tx CVE-2016-7908-qemut-net-Infinite-loop-in-mcf_fec_do_tx.patch - bsc#1003032 - VUL-0: CVE-2016-7909: xen: net: pcnet: infinite loop in pcnet_rdra_addr CVE-2016-7909-qemut-net-pcnet-infinite-loop-in-pcnet_rdra_addr.patch- bsc#995785 - VUL-0: CVE-2016-7092: xen: x86: Disallow L3 recursive pagetable for 32-bit PV guests (XSA-185) 57d1563d-x86-32on64-don-t-allow-recursive-page-tables-from-L3.patch - bsc#995789 - VUL-0: CVE-2016-7093: xen: x86: Mishandling of instruction pointer truncation during emulation (XSA-186) 57d15679-x86-emulate-Correct-boundary-interactions-of-emulated-insns.patch 57d18642-hvm-fep-Allow-test-insns-crossing-1-0-boundary.patch - bsc#995792 - VUL-0: CVE-2016-7094: xen: x86 HVM: Overflow of sh_ctxt->seg_reg[] (XSA-187) 57d1569a-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch 57d18642-x86-segment-Bounds-check-accesses-to-emulation-ctxt-seg_reg.patch - bsc#991934 - xen hypervisor crash in csched_acct 57c96df3-credit1-fix-a-race-when-picking-initial-pCPU.patch - Upstream patches from Jan 57c4412b-x86-HVM-add-guarding-logic-for-VMX-specific-code.patch 57c57f73-libxc-correct-max_pfn-calculation-for-saving-domain.patch 57c805bf-x86-levelling-restrict-non-architectural-OSXSAVE-handling.patch 57c805c1-x86-levelling-pass-vcpu-to-ctxt_switch_levelling.patch 57c805c3-x86-levelling-provide-architectural-OSXSAVE-handling.patch 57c82be2-x86-32on64-adjust-call-gate-emulation.patch 57c96e2c-x86-correct-PT_NOTE-file-position.patch 57cfed43-VMX-correct-feature-checks-for-MPX-and-XSAVES.patch- bsc#979002 - add 60-persistent-xvd.rules and helper script also to initrd, add the relevant dracut helper- bnc#953518 - unplug also SCSI disks in qemu-xen-traditional for upstream unplug protocol- bsc#989679 - [pvusb feature] USB device not found when 'virsh detach-device guest usb.xml' 57c93e52-fix-error-in-libxl_device_usbdev_list.patch- bsc#992224 - [HPS Bug] During boot of Xen Hypervisor, Failed to get contiguous memory for DMA from Xen 57ac6316-don-t-restrict-DMA-heap-to-node-0.patch - bsc#978755 - xen uefi systems fail to boot - bsc#983697 - SLES12 SP2 Xen UEFI mode cannot boot 57b71fc5-x86-EFI-don-t-apply-relocations-to-l-2-3-_bootmap.patch - Upstream patch from Jan 57b7447b-dont-permit-guest-to-populate-PoD-pages-for-itself.patch- spec: to stay compatible with the in-tree qemu-xen binary, use /usr/bin/qemu-system-i386 instead of /usr/bin/qemu-system-x86_64 bsc#986164- bsc#970135 - new virtualization project clock test randomly fails on Xen 576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 5769106e-x86-generate-assembler-equates-for-synthesized.patch 57a1e603-x86-time-adjust-local-system-time-initialization.patch 57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch - bsc#991934 - xen hypervisor crash in csched_acct 57973099-have-schedulers-revise-initial-placement.patch 579730e6-remove-buggy-initial-placement-algorithm.patch - bsc#988675 - VUL-0: CVE-2016-6258: xen: x86: Privilege escalation in PV guests (XSA-182) 57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch - bsc#988676 - VUL-0: CVE-2016-6259: xen: x86: Missing SMAP whitelisting in 32-bit exception / event delivery (XSA-183) 57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch - Upstream patches from Jan 57a30261-x86-support-newer-Intel-CPU-models.patch- bsc#985503 - vif-route broken vif-route.patch- bsc#978413 - PV guest upgrade from sles11sp4 to sles12sp2 alpha3 failed on sles11sp4 xen host. pygrub-handle-one-line-menu-entries.patch- bsc#990843 - VUL-1: CVE-2016-6351: xen: qemu: scsi: esp: OOB write access in esp_do_dma CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch- bsc#900418 - Dump cannot be performed on SLES12 XEN 57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch - Upstream patches from Jan 575e9ca0-nested-vmx-Validate-host-VMX-MSRs-before-accessing-them.patch 57640448-xen-sched-use-default-scheduler-upon-an-invalid-sched.patch- fate#319989 - Update to Xen 4.7 FCS xen-4.7.0-testing-src.tar.bz2 - Drop CVE-2014-3672-qemut-xsa180.patch- bsc#954872 - script block-dmmd not working as expected - libxl: error: libxl_dm.c (Additional fixes) block-dmmd- Convert with_stubdom into build_conditional to allow adjusting via prjconf - Convert with_debug into build_conditional to allow adjusting via prjconf- bsc#979002 - add 60-persistent-xvd.rules and helper script to xen-tools-domU to simplify transition to pvops based kernels- Convert with_oxenstored into build_conditional to allow adjusting via prjconf (fate#320836)- bsc#983984 - VUL-0: CVE-2016-5338: xen: qemu: scsi: esp: OOB r/w access while processing ESP_FIFO CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch - bsc#982960 - VUL-0: CVE-2016-5238: xen: qemu: scsi: esp: OOB write when using non-DMA mode in get_cmd CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch- fate#319989 - Update to Xen 4.7 RC5 xen-4.7.0-testing-src.tar.bz2- fate#319989 - Update to Xen 4.7 RC4 xen-4.7.0-testing-src.tar.bz2 - Dropped xen.pkgconfig-4.7.patch xsa164.patch- bsc#981264 - VUL-0: CVE-2014-3672: xen: Unrestricted qemu logging (XSA-180) CVE-2014-3672-qemut-xsa180.patch- bsc#980724 - VUL-0: CVE-2016-4441: Qemu: scsi: esp: OOB write while writing to 's->cmdbuf' in get_cmd CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch - bsc#980716 - VUL-0: CVE-2016-4439: xen: scsi: esp: OOB write while writing to 's->cmdbuf' in esp_reg_write CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch- fate#319989 - Update to Xen 4.7 RC3 xen-4.7.0-testing-src.tar.bz2 - Dropped libxl-remove-cdrom-cachemode.patch x86-PoD-only-reclaim-if-needed.patch gcc6-warnings-as-errors.patch- bsc#954872 - script block-dmmd not working as expected - libxl: error: libxl_dm.c (another modification) block-dmmd- fate#319989 - Update to Xen 4.7 RC2 xen-4.7.0-testing-src.tar.bz2- bsc#961600 - L3: poor performance when Xen HVM domU configured with max memory > current memory x86-PoD-only-reclaim-if-needed.patch- Mark SONAMEs and pkgconfig as xen 4.7 xen.pkgconfig-4.7.patch- bsc#977329 - Xen: Cannot boot HVM guests with empty cdrom libxl-remove-cdrom-cachemode.patch- fate#319989 - Update to Xen 4.7 RC1 xen-4.7.0-testing-src.tar.bz2- fate#316614: set migration constraints from cmdline restore libxl.set-migration-constraints-from-cmdline.patch- Remove obsolete patch for xen-kmp magic_ioport_compat.patch- fate#316613: update to v12 libxl.pvscsi.patch- Update to the latest Xen 4.7 pre-release c2994f86 Drop libxl.migrate-legacy-stream-read.patch- bnc#972756 - Can't migrate HVM guest from SLES12SP1 Xen host to SLES12SP2 Alpha 1 host using xl migrate libxl.migrate-legacy-stream-read.patch- Add patches from proposed upstream series to load BIOS's from the toolstack instead of embedding in hvmloader http://lists.xenproject.org/archives/html/xen-devel/2016-03/msg01626.html 0001-libxc-Rework-extra-module-initialisation.patch, 0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch, 0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch, 0004-firmware-makefile-install-BIOS-blob.patch, 0005-libxl-Load-guest-BIOS-from-file.patch, 0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch, 0007-hvmloader-Grab-the-hvm_start_info-pointer.patch, 0008-hvmloader-Locate-the-BIOS-blob.patch, 0009-hvmloader-Check-modules-whereabouts-in-perform_tests.patch, 0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch, 0011-hvmloader-Load-OVMF-from-modules.patch, 0012-hvmloader-Specific-bios_load-function-required.patch, 0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch, 0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch - Enable support for UEFI on x86_64 using the ovmf-x86_64-ms.bin firmware from qemu-ovmf-x86_64. The firmware is preloaded with Microsoft keys to more closely resemble firmware on real hardware FATE#320490- fate#319989: Update to Xen 4.7 (pre-release) xen-4.7.0-testing-src.tar.bz2 - Dropped: xen-4.6.1-testing-src.tar.bz2 55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch 5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch hotplug-Linux-block-performance-fix.patch set-mtu-from-bridge-for-tap-interface.patch xendomains-libvirtd-conflict.patch xsa154.patch xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa170.patch- Use system SeaBIOS instead of building/installing another one FATE#320638 Dropped files: seabios-dir-remote.tar.bz2 xen-c99-fix.patch xen.build-compare.seabios.patch- spec: drop BuildRequires that were only needed for qemu-xen- bsc#969377 - xen does not build with GCC 6 ipxe-use-rpm-opt-flags.patch gcc6-warnings-as-errors.patch- bsc#969351 - VUL-0: CVE-2016-2841: xen: net: ne2000: infinite loop in ne2000_receive CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch - Drop xsa154-fix.patch- Use system qemu instead of building/installing yet another qemu FATE#320638 - Dropped files qemu-xen-dir-remote.tar.bz2 CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch CVE-2015-4037-qemuu-smb-config-dir-name.patch CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch qemu-xen-enable-spice-support.patch qemu-xen-upstream-qdisk-cache-unsafe.patch tigervnc-long-press.patch xsa162-qemuu.patch- bsc#962321 - VUL-0: CVE-2016-1922: xen: i386: null pointer dereference in vapic_write() CVE-2016-1922-qemuu-i386-null-pointer-dereference-in-vapic_write.patch- bsc#968004 - VUL-0: CVE-2016-2538: xen: usb: integer overflow in remote NDIS control message handling CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch- bsc#954872 - L3: script block-dmmd not working as expected - libxl: error: libxl_dm.c block-dmmd - Update libxl to recognize dmmd and npiv prefix in disk spec xen.libxl.dmmd.patch- bsc#967101 - VUL-0: CVE-2016-2391: xen: usb: multiple eof_timers in ohci module leads to null pointer dereference CVE-2016-2391-qemuu-usb-null-pointer-dereference-in-ohci-module.patch CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch - bsc#967090 - VUL-0: CVE-2016-2392: xen: usb: null pointer dereference in remote NDIS control message handling CVE-2016-2392-qemuu-usb-null-pointer-dereference-in-NDIS-message-handling.patch- Update to Xen Version 4.6.1 xen-4.6.1-testing-src.tar.bz2 - Dropped patches now contained in tarball or unnecessary xen-4.6.0-testing-src.tar.bz2 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 5632129c-free-domain-s-vcpu-array.patch 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 563212e4-xenoprof-free-domain-s-vcpu-array.patch 563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch 56549f24-x86-vPMU-document-as-unsupported.patch 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch xsa155-qemut-qdisk-double-access.patch xsa155-qemut-xenfb.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa159.patch xsa160.patch xsa162-qemut.patch xsa165.patch xsa166.patch xsa167.patch xsa168.patch- bsc#965315 - VUL-0: CVE-2016-2270: xen: x86: inconsistent cachability flags on guest mappings (XSA-154) xsa154.patch - bsc#965317 - VUL-0: CVE-2016-2271: xen: VMX: guest user mode may crash guest with non-canonical RIP (XSA-170) xsa170.patch- bsc#965269 - VUL-1: CVE-2015-8619: xen: stack based OOB write in hmp_sendkey routine CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch- bsc#965156 - VUL-0: CVE-2015-6855: xen: ide: divide by zero issue CVE-2015-6855-qemuu-ide-divide-by-zero-issue.patch - bsc#965112 - VUL-0: CVE-2014-3640: xen: slirp: NULL pointer deref in sosendto() CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch- bsc#964947 - VUL-0: CVE-2015-5278: xen: Infinite loop in ne2000_receive() function CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch - bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch- bsc#964644 - VUL-0: CVE-2013-4533: xen pxa2xx: buffer overrun on incoming migration CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch - bsc#964925 - VUL-0: CVE-2014-0222: xen: qcow1: validate L2 table size to avoid integer overflows CVE-2014-0222-blktap-qcow1-validate-l2-table-size.patch - Dropped CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch- bsc#964415 - VUL-1: CVE-2016-2198: xen: usb: ehci null pointer dereference in ehci_caps_write CVE-2016-2198-qemuu-usb-ehci-null-pointer-dereference-in-ehci_caps_write.patch - bsc#964452 - VUL-0: CVE-2013-4534: xen: openpic: buffer overrun on incoming migration CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch- bsc#963783 - VUL-1: CVE-2016-1981: xen: net: e1000 infinite loop in start_xmit and e1000_receive_iov routines CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch- bsc#962758 - VUL-0: CVE-2013-4539: xen: tsc210x: buffer overrun on invalid state load CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch- bsc#962632 - VUL-0: CVE-2015-1779: xen: vnc: insufficient resource limiting in VNC websockets decoder CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch - bsc#962642 - VUL-0: CVE-2013-4537: xen: ssi-sd: buffer overrun on invalid state load CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch - bsc#962627 - VUL-0: CVE-2014-7815: xen: vnc: insufficient bits_per_pixel from the client sanitization CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch- bsc#962335 - VUL-0: CVE-2013-4538: xen: ssd0323: fix buffer overun on invalid state CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch - bsc#962360 - VUL-0: CVE-2015-7512: xen: net: pcnet: buffer overflow in non-loopback mode CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch- bsc#961692 - VUL-0: CVE-2016-1714: xen: nvram: OOB r/w access in processing firmware configurations CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch- bsc#961358 - VUL-0: CVE-2015-8613: xen: qemu: scsi: stack based buffer overflow in megasas_ctrl_get_info CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch - bsc#961332 - VUL-0: CVE-2016-1568: xen: Qemu: ide: ahci use-after-free vulnerability in aio port commands CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch- bsc#959695 - missing docs for xen xen.spec- bsc#960862 - VUL-0: CVE-2016-1571: xen: VMX: intercept issue with INVLPG on non-canonical address (XSA-168) xsa168.patch - bsc#960861 - VUL-0: CVE-2016-1570: xen: PV superpage functionality missing sanity checks (XSA-167) xsa167.patch - bsc#960836 - VUL-0: CVE-2015-8744: xen: net: vmxnet3: incorrect l2 header validation leads to a crash via assert(2) call CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch- bsc#960707 - VUL-0: CVE-2015-8745: xen: reading IMR registers leads to a crash via assert(2) call CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch - bsc#960726 - VUL-0: CVE-2015-8743: xen: ne2000: OOB memory access in ioport r/w functions CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch- bsc#960093 - VUL-0: CVE-2015-8615: xen: x86: unintentional logging upon guest changing callback method (XSA-169) 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch- Adjust xen-dom0-modules.service to run Before xenstored.service instead of proc-xen.mount to workaround a bug in systemd "design" (bnc#959845)- bsc#959387 - VUL-0: CVE-2015-8568 CVE-2015-8567: xen: qemu: net: vmxnet3: host memory leakage CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch- bsc#957988 - VUL-0: CVE-2015-8550: xen: paravirtualized drivers incautious about shared memory contents (XSA-155) xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemut-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa155-qemut-xenfb.patch - bsc#959006 - VUL-0: CVE-2015-8558: xen: qemu: usb: infinite loop in ehci_advance_state results in DoS CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch - bsc#958918 - VUL-0: CVE-2015-7549: xen: qemu pci: null pointer dereference issue CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch - bsc#958493 - VUL-0: CVE-2015-8504: xen: qemu: ui: vnc: avoid floating point exception CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch - bsc#958007 - VUL-0: CVE-2015-8554: xen: qemu-dm buffer overrun in MSI-X handling (XSA-164) xsa164.patch - bsc#958009 - VUL-0: CVE-2015-8555: xen: information leak in legacy x86 FPU/XMM initialization (XSA-165) xsa165.patch - bsc#958523 - VUL-0: xen: ioreq handling possibly susceptible to multiple read issue (XSA-166) xsa166.patch- bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch - Upstream patches from Jan 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch) 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 56544a57-VMX-fix-adjust-trap-injection.patch 56546ab2-sched-fix-insert_vcpu-locking.patch- bsc#956592 - VUL-0: xen: virtual PMU is unsupported (XSA-163) 56549f24-x86-vPMU-document-as-unsupported.patch - bsc#956408 - VUL-0: CVE-2015-8339, CVE-2015-8340: xen: XENMEM_exchange error handling issues (XSA-159) xsa159.patch - bsc#956409 - VUL-0: CVE-2015-8341: xen: libxl leak of pv kernel and initrd on error (XSA-160) xsa160.patch - bsc#956411 - VUL-0: CVE-2015-7504: xen: heap buffer overflow vulnerability in pcnet emulator (XSA-162) xsa162-qemuu.patch xsa162-qemut.patch - bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142) 5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch- fate#315712: XEN: Use the PVOPS kernel Turn off building the KMPs now that we are using the pvops kernel xen.spec- Upstream patches from Jan 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 5632129c-free-domain-s-vcpu-array.patch (Replaces CVE-2015-7969-xsa149.patch) 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 563212e4-xenoprof-free-domain-s-vcpu-array.patch 563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch) 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch - Dropped 55b0a2db-x86-MSI-track-guest-masking.patch- Use upstream variants of block-iscsi and block-nbd- Remove xenalyze.hg, its part of xen-4.6- Update to Xen Version 4.6.0 xen-4.6.0-testing-src.tar.bz2 mini-os.tar.bz2 blktap2-no-uninit.patch stubdom-have-iovec.patch - Renamed xsa149.patch to CVE-2015-7969-xsa149.patch - Dropped patches now contained in tarball or unnecessary xen-4.5.2-testing-src.tar.bz2 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch 54f4985f-libxl-fix-libvirtd-double-free.patch 55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 551ac326-xentop-add-support-for-qdisk.patch 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch 5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 554cc211-libxl-add-qxl.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch 5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch 5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch 5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch 5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch 5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch 5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch 55b0a218-x86-PCI-CFG-write-intercept.patch 55b0a255-x86-MSI-X-maskall.patch 55b0a283-x86-MSI-X-teardown.patch 55b0a2ab-x86-MSI-X-enable.patch blktapctrl-close-fifos.patch blktapctrl-default-to-ioemu.patch blktapctrl-disable-debug-printf.patch blktap-no-uninit.patch blktap-pv-cdrom.patch build-tapdisk-ioemu.patch ioemu-bdrv-open-CACHE_WB.patch ioemu-blktap-barriers.patch ioemu-blktap-fv-init.patch ioemu-blktap-image-format.patch ioemu-blktap-zero-size.patch libxl.set-migration-constraints-from-cmdline.patch local_attach_support_for_phy.patch pci-attach-fix.patch qemu-xen-upstream-megasas-buildtime.patch tapdisk-ioemu-logfile.patch tapdisk-ioemu-shutdown-fix.patch udev-rules.patch xen.build-compare.ipxe.patch xen.build-compare.mini-os.patch xen.build-compare.smbiosdate.patch xen.build-compare.vgabios.patch xen.build-compare.xen_compile_h.patch xl-coredump-file-location.patch- bsc#954405 - VUL-0: CVE-2015-8104: Xen: guest to host DoS by triggering an infinite loop in microcode via #DB exception - bsc#954018 - VUL-0: CVE-2015-5307: xen: x86: CPU lockup during fault delivery (XSA-156) CVE-2015-5307-xsa156.patch- Update to Xen 4.5.2 xen-4.5.2-testing-src.tar.bz2 - Drop the following xen-4.5.1-testing-src.tar.bz2 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 559bdde5-pull-in-latest-linux-earlycpio.patch 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch 560bd926-credit1-fix-tickling-when-it-happens-from-a-remote-pCPU.patch 560e6d34-x86-p2m-pt-tighten-conditions-of-IOMMU-mapping-updates.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch CVE-2015-4106-xsa131-9.patch CVE-2015-3259-xsa137.patch CVE-2015-7311-xsa142.patch CVE-2015-7835-xsa148.patch xsa139-qemuu.patch xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch xsa151.patch xsa152.patch xsa153-libxl.patch CVE-2015-5154-qemuu-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemuu-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch"- bsc#950704 - CVE-2015-7970 VUL-1: xen: x86: Long latency populate-on-demand operation is not preemptible (XSA-150) 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch- Upstream patches from Jan 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch- bsc#951845 - VUL-0: CVE-2015-7972: xen: x86: populate-on-demand balloon size inaccuracy can crash guests (XSA-153) xsa153-libxl.patch- bsc#950703 - VUL-1: CVE-2015-7969: xen: leak of main per-domain vcpu pointer array (DoS) (XSA-149) xsa149.patch - bsc#950705 - VUL-1: CVE-2015-7969: xen: x86: leak of per-domain profiling-related vcpu pointer array (DoS) (XSA-151) xsa151.patch - bsc#950706 - VUL-0: CVE-2015-7971: xen: x86: some pmu and profiling hypercalls log without rate limiting (XSA-152) xsa152.patch - Dropped 55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch 5604f239-x86-PV-properly-populate-descriptor-tables.patch- bsc#932267 - VUL-1: CVE-2015-4037: qemu,kvm,xen: insecure temporary file use in /net/slirp.c CVE-2015-4037-qemuu-smb-config-dir-name.patch CVE-2015-4037-qemut-smb-config-dir-name.patch - bsc#877642 - VUL-0: CVE-2014-0222: qemu: qcow1: validate L2 table size to avoid integer overflows CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch- bsc#950367 - VUL-0: CVE-2015-7835: xen: x86: Uncontrolled creation of large page mappings by PV guests (XSA-148) CVE-2015-7835-xsa148.patch- bsc#949138 - Setting vcpu affinity under Xen causes libvirtd abort 54f4985f-libxl-fix-libvirtd-double-free.patch- bsc#949046 - Increase %suse_version in SP1 to 1316 xen.spec - Update README.SUSE detailing dom0 ballooning recommendations- bsc#945167 - Running command ’ xl pci-assignable-add 03:10.1’ secondly show errors 55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch - Upstream patches from Jan 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f239-x86-PV-properly-populate-descriptor-tables.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch 560bd926-credit1-fix-tickling-when-it-happens-from-a-remote-pCPU.patch 560e6d34-x86-p2m-pt-tighten-conditions-of-IOMMU-mapping-updates.patch- bsc#941074 - VmError: Device 51728 (vbd) could not be connected. Hotplug scripts not working. hotplug-Linux-block-performance-fix.patch- bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142) CVE-2015-7311-xsa142.patch- bsc#945165 - Xl pci-attach show error with kernel of SLES 12 sp1 pci-attach-fix.patch- bsc#945164 - Xl destroy show error with kernel of SLES 12 sp1 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch- Upstream patches from Jan 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch- bsc#944463 - VUL-0: CVE-2015-5239: qemu-kvm: Integer overflow in vnc_client_read() and protocol_client_msg() CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch - bsc#944697 - VUL-1: CVE-2015-6815: qemu: net: e1000: infinite loop issue CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch- bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch- bsc#907514 - Bus fatal error & sles12 sudden reboot has been observed - bsc#910258 - SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984 - Bus fatal error & sles11-SP4 sudden reboot has been observed - bsc#923967 - Partner-L3: Bus fatal error & sles11-SP3 sudden reboot has been observed 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 55b0a218-x86-PCI-CFG-write-intercept.patch 55b0a255-x86-MSI-X-maskall.patch 55b0a283-x86-MSI-X-teardown.patch 55b0a2ab-x86-MSI-X-enable.patch 55b0a2db-x86-MSI-track-guest-masking.patch - Upstream patches from Jan 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch - Dropped for upstream version x86-MSI-mask.patch x86-MSI-pv-unmask.patch x86-MSI-X-enable.patch x86-MSI-X-maskall.patch x86-MSI-X-teardown.patch x86-pci_cfg_okay.patch x86-PCI-CFG-write-intercept.patch- bsc#939712 - VUL-0: XSA-140: QEMU leak of uninitialized heap memory in rtl8139 device model xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch - bsc#939709 - VUL-0: XSA-139: xen: Use after free in QEMU/Xen block unplug protocol xsa139-qemuu.patch- bsc#937371 - xen vm's running after reboot xendomains-libvirtd-conflict.patch- bsc#938344 - VUL-0: CVE-2015-5154: qemu,kvm,xen: host code execution via IDE subsystem CD-ROM CVE-2015-5154-qemuu-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemuu-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch- Remove xendomains.service from systemd preset file because it conflicts with libvirt-guests.service (bnc#937371) Its up to the admin to run systemctl enable xendomains.service- bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow CVE-2015-3259-xsa137.patch - Upstream patches from Jan 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bdde5-pull-in-latest-linux-earlycpio.patch - Upstream patches from Jan pending review 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch 5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch 5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch 5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch 5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch 5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch x86-MSI-pv-unmask.patch x86-pci_cfg_okay.patch x86-PCI-CFG-write-intercept.patch x86-MSI-X-maskall.patch x86-MSI-X-teardown.patch x86-MSI-X-enable.patch x86-MSI-mask.patch- Adjust more places to use br0 instead of xenbr0- bnc#936516 - xen fails to build with kernel update(4.1.0 from stable) 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch- Update to Xen Version 4.5.1 FCS (fate#315675) xen-4.5.1-testing-src.tar.bz2 - Dropped patches now contained in tarball 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch qemu-MSI-X-enable-maskall.patch qemu-MSI-X-latch-writes.patch x86-MSI-X-guest-mask.patch- Replace 5124efbe-add-qxl-support.patch with the variant that finally made it upstream, 554cc211-libxl-add-qxl.patch- bsc#931627 - VUL-0: CVE-2015-4105: XSA-130: xen: Guest triggerable qemu MSI-X pass-through error messages qemu-MSI-X-latch-writes.patch - bsc#907514 - Bus fatal error & sles12 sudden reboot has been observed - bsc#910258 - SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984 - Bus fatal error & sles11-SP4 sudden reboot has been observed - bsc#923967 - Partner-L3: Bus fatal error & sles11-SP3 sudden reboot has been observed x86-MSI-X-teardown.patch x86-MSI-X-enable.patch x86-MSI-X-guest-mask.patch x86-MSI-X-maskall.patch qemu-MSI-X-enable-maskall.patch - Upstream patches from Jan 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch - Dropped the following patches now contained in the tarball xen-no-array-bounds.patch CVE-2015-4103-xsa128.patch CVE-2015-4104-xsa129.patch CVE-2015-4105-xsa130.patch CVE-2015-4106-xsa131-1.patch CVE-2015-4106-xsa131-2.patch CVE-2015-4106-xsa131-3.patch CVE-2015-4106-xsa131-4.patch CVE-2015-4106-xsa131-5.patch CVE-2015-4106-xsa131-6.patch CVE-2015-4106-xsa131-7.patch CVE-2015-4106-xsa131-8.patch- Update to Xen 4.5.1 RC2 - bsc#931628 - VUL-0: CVE-2015-4106: XSA-131: xen: Unmediated PCI register access in qemu CVE-2015-4106-xsa131-1.patch CVE-2015-4106-xsa131-2.patch CVE-2015-4106-xsa131-3.patch CVE-2015-4106-xsa131-4.patch CVE-2015-4106-xsa131-5.patch CVE-2015-4106-xsa131-6.patch CVE-2015-4106-xsa131-7.patch CVE-2015-4106-xsa131-8.patch CVE-2015-4106-xsa131-9.patch - bsc#931627 - VUL-0: CVE-2015-4105: XSA-130: xen: Guest triggerable qemu MSI-X pass-through error messages CVE-2015-4105-xsa130.patch - bsc#931626 - VUL-0: CVE-2015-4104: XSA-129: xen: PCI MSI mask bits inadvertently exposed to guests CVE-2015-4104-xsa129.patch - bsc#931625 - VUL-0: CVE-2015-4103: XSA-128: xen: Potential unintended writes to host MSI message data field via qemu CVE-2015-4103-xsa128.patch - Upstream patches from Jan 5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch- Add DefaultDependencies=no to xen-dom0-modules.service because it has to run before proc-xen.mount- Update to Xen 4.5.1 RC1- Update blktap-no-uninit.patch to work with gcc-4.5- bsc#927967 - VUL-0: CVE-2015-3340: xen: Information leak through XEN_DOMCTL_gettscinfo (XSA-132) 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch- bnc#929339 - VUL-0: CVE-2015-3456: qemu kvm xen: VENOM qemu floppy driver host code execution CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch- bsc#928783 - Reboot failure; Request backport of upstream Xen patch to 4.5.0, or update pkgs to 4.5.1 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch- bnc#927750 - Avoid errors reported by system-modules-load.service- Add xen-no-array-bounds.patch and blktap-no-uninit.patch to selectively turn errors back to warnings to fix build with GCC 5. - Amend xen.stubdom.newlib.patch to pull in declaration of strcmp to avoid implicit-fortify-decl rpmlint error. - Fix quoting of __SMBIOS_DATE__ in xen.build-compare.smbiosdate.patch.- xentop: Fix memory leak on read failure 551ac326-xentop-add-support-for-qdisk.patch- Dropped xentop-add-support-for-qdisk.patch in favor of upstream version 551ac326-xentop-add-support-for-qdisk.patch- Enable spice support in qemu for x86_64 5124efbe-add-qxl-support.patch qemu-xen-enable-spice-support.patch- Add xen-c99-fix.patch to remove pointless inline specifier on function declarations which break build with a C99 compiler which GCC 5 is by default. (bsc#921994) - Add ipxe-no-error-logical-not-parentheses.patch to supply - Wno-logical-not-parentheses to the ipxe build to fix breakage with GCC 5. (bsc#921994)- bnc#921842 - Xentop doesn't display disk statistics for VMs using qdisks xentop-add-support-for-qdisk.patch- Disable the PIE enablement done for Factory, as the XEN code is not buildable with PIE and it does not make much sense to build the hypervisor code with it.- bnc#918169 - XEN fixes required to work with Kernel 3.19.0 xen.spec- Package xen.changes because its referenced in xen.spec- Update seabios to rel-1.7.5 which is the correct version for Xen 4.5- Update to Xen 4.5.0 FCS- Include systemd presets in 13.2 and older- bnc#897352 - Enable xencommons/xendomains only during fresh install - disable restart on upgrade because the toolstack is not restartable- adjust seabios, vgabios, stubdom and hvmloader build to reduce build-compare noise xen.build-compare.mini-os.patch xen.build-compare.smbiosdate.patch xen.build-compare.ipxe.patch xen.build-compare.vgabios.patch xen.build-compare.seabios.patch xen.build-compare.man.patch- Update to Xen 4.5.0 RC4- Remove xend specific if-up scripts Recording bridge slaves is a generic task which should be handled by generic network code- Use systemd features from upstream requires updated systemd-presets-branding package- Update to Xen 4.5.0 RC3- Set GIT, WGET and FTP to /bin/false- Use new configure features instead of make variables xen.stubdom.newlib.patch- adjust docs and xen build to reduce build-compare noise xen.build-compare.doc_html.patch xen.build-compare.xen_compile_h.patch- Drop trailing B_CNT from XEN_EXTRAVERSION to reduce build-compare noise- Update to Xen 4.5.0 RC2- Update to Xen 4.5.0 RC1 xen-4.5.0-testing-src.tar.bz2 - Remove all patches now contained in the new tarball xen-4.4.1-testing-src.tar.bz2 5315a3bb-x86-don-t-propagate-acpi_skip_timer_override-do-Dom0.patch 5315a43a-x86-ACPI-also-print-address-space-for-PM1x-fields.patch 53299d8f-xenconsole-reset-tty-on-failure.patch 53299d8f-xenconsole-tolerate-tty-errors.patch 5346a7a0-x86-AMD-support-further-feature-masking-MSRs.patch 53563ea4-x86-MSI-drop-workaround-for-insecure-Dom0-kernels.patch 537c9c77-libxc-check-return-values-on-mmap-and-madvise.patch 537cd0b0-hvmloader-also-cover-PCI-MMIO-ranges-above-4G-with-UC-MTRR-ranges.patch 537cd0cc-hvmloader-PA-range-0xfc000000-0xffffffff-should-be-UC.patch 539ebe62-x86-EFI-improve-boot-time-diagnostics.patch 53aac342-x86-HVM-consolidate-and-sanitize-CR4-guest-reserved-bit-determination.patch 53c9151b-Fix-xl-vncviewer-accesses-port-0-by-any-invalid-domid.patch 53d124e7-fix-list_domain_details-check-config-data-length-0.patch 53dba447-x86-ACPI-allow-CMOS-RTC-use-even-when-ACPI-says-there-is-none.patch 53df727b-x86-HVM-extend-LAPIC-shortcuts-around-P2M-lookups.patch 53e8be5f-x86-vHPET-use-rwlock-instead-of-simple-one.patch 53f737b1-VMX-fix-DebugCtl-MSR-clearing.patch 53f7386d-x86-irq-process-softirqs-in-irq-keyhandlers.patch 53fcebab-xen-pass-kernel-initrd-to-qemu.patch 53ff3659-x86-consolidate-boolean-inputs-in-hvm-and-p2m.patch 53ff36ae-x86-hvm-treat-non-insn-fetch-NPF-also-as-read-violations.patch 53ff36d5-x86-mem_event-deliver-gla-fault-EPT-violation-information.patch 53ff3716-x86-ats-Disable-Address-Translation-Services-by-default.patch 53ff3899-x86-NMI-allow-processing-unknown-NMIs-with-watchdog.patch 54005472-EPT-utilize-GLA-GPA-translation-known-for-certain-faults.patch 540effe6-evtchn-check-control-block-exists-when-using-FIFO-based-events.patch 540f2624-x86-idle-add-barriers-to-CLFLUSH-workaround.patch 541825dc-VMX-don-t-leave-x2APIC-MSR-intercepts-disabled.patch 541ad385-x86-suppress-event-check-IPI-to-MWAITing-CPUs.patch 541ad3ca-x86-HVM-batch-vCPU-wakeups.patch 541ad81a-VT-d-suppress-UR-signaling-for-further-desktop-chipsets.patch 54216833-x86-shadow-fix-race-when-sampling-dirty-vram-state.patch 54216882-x86-emulate-check-cpl-for-all-privileged-instructions.patch 542168ae-x86emul-only-emulate-swint-injection-for-real-mode.patch 54228a37-x86-EFI-fix-freeing-of-uninitialized-pointer.patch 5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch 5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch 542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch 542bf997-x86-HVM-properly-bound-x2APIC-MSR-range.patch 54325cc0-x86-MSI-fix-MSI-X-case-of-freeing-IRQ.patch 54325d2f-x86-restore-reserving-of-IO-APIC-pages-in-XENMEM_machine_memory_map-output.patch 54325d95-don-t-allow-Dom0-access-to-IOMMUs-MMIO-pages.patch 54325ecc-AMD-guest_iommu-properly-disable-guest-iommu-support.patch 54325f3c-x86-paging-make-log-dirty-operations-preemptible.patch 54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch CVE-2013-4540-qemu.patch qemu-support-xen-hvm-direct-kernel-boot.patch qemu-xen-upstream-blkif-discard.patch change-vnc-passwd.patch libxc-pass-errno-to-callers-of-xc_domain_save.patch libxl.honor-more-top-level-vfb-options.patch libxl.add-option-for-discard-support-to-xl-disk-conf.patch libxl.introduce-an-option-to-disable-the-non-O_DIRECT-workaround.patch x86-dom-print.patch x86-extra-trap-info.patch tmp_build.patch xl-check-for-libvirt-managed-domain.patch disable-wget-check.patch - Xend/xm is no longer supported and is not part of the upstream code. Remove all xend/xm specific patches, configs, and scripts xen-xmexample.patch bridge-opensuse.patch xmexample.disks xmclone.sh init.xend xend-relocation.sh xend.service xend-relocation-server.fw domUloader.py xmexample.domUloader xmexample.disks bridge-vlan.patch bridge-bonding.patch bridge-record-creation.patch network-nat-open-SuSEfirewall2-FORWARD.patch xend-set-migration-constraints-from-cmdline.patch xen.migrate.tools-xend_move_assert_to_exception_block.patch xend-pvscsi-recognize-also-SCSI-CDROM-devices.patch xend-config.patch xend-max-free-mem.patch xend-hvm-default-pae.patch xend-vif-route-ifup.patch xend-xenapi-console-protocol.patch xend-core-dump-loc.patch xend-xen-api-auth.patch xend-checkpoint-rename.patch xend-xm-save-check-file.patch xend-xm-create-xflag.patch xend-domu-usb-controller.patch xend-devid-or-name.patch xend-migration-domname-fix.patch xend-del_usb_xend_entry.patch xend-xen-domUloader.patch xend-multi-xvdp.patch xend-check_device_status.patch xend-change_home_server.patch xend-minimum-restart-time.patch xend-disable-internal-logrotate.patch xend-config-enable-dump-comment.patch xend-tools-watchdog-support.patch xend-console-port-restore.patch xend-vcpu-affinity-fix.patch xend-migration-bridge-check.patch xend-managed-pci-device.patch xend-hvm-firmware-passthrough.patch xend-cpuinfo-model-name.patch xend-xm-reboot-fix.patch xend-domain-lock.patch xend-domain-lock-sfex.patch xend-32on64-extra-mem.patch xend-hv_extid_compatibility.patch xend-xenpaging.autostart.patch xend-remove-xm-deprecation-warning.patch libxen_permissive.patch tmp-initscript-modprobe.patch init.xendomains xendomains.service xen-watchdog.service xen-updown.sh- bnc#901317 - L3: increase limit domUloader to 32MB domUloader.py- bnc#898772 - SLES 12 RC3 - XEN Host crashes when assigning non-VF device (SR-IOV) to guest 54325cc0-x86-MSI-fix-MSI-X-case-of-freeing-IRQ.patch - bnc#882089 - Windows 2012 R2 fails to boot up with greater than 60 vcpus 54325ecc-AMD-guest_iommu-properly-disable-guest-iommu-support.patch - bnc#826717 - VUL-0: CVE-2013-3495: XSA-59: xen: Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts 541ad81a-VT-d-suppress-UR-signaling-for-further-desktop-chipsets.patch - Upstream patches from Jan 540effe6-evtchn-check-control-block-exists-when-using-FIFO-based-events.patch (Replaces xsa107.patch) 54216833-x86-shadow-fix-race-when-sampling-dirty-vram-state.patch (Replaces xsa104.patch) 54216882-x86-emulate-check-cpl-for-all-privileged-instructions.patch (Replaces xsa105.patch) 542168ae-x86emul-only-emulate-swint-injection-for-real-mode.patch (Replaces xsa106.patch) 54228a37-x86-EFI-fix-freeing-of-uninitialized-pointer.patch 5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch 5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch 542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch 542bf997-x86-HVM-properly-bound-x2APIC-MSR-range.patch (Replaces xsa108.patch) 54325d2f-x86-restore-reserving-of-IO-APIC-pages-in-XENMEM_machine_memory_map-output.patch 54325d95-don-t-allow-Dom0-access-to-IOMMUs-MMIO-pages.patch 54325f3c-x86-paging-make-log-dirty-operations-preemptible.patch (Replaces xsa97.patch) 54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGH3AKDM4.12.0_12-lp151.1.14.12.0_12-lp151.1.1  xenhtmlhypercallarmindex.htmlindex.htmlx86_32index.htmlx86_64index.htmlindex.htmlmanindex.htmlxen-pci-device-reservations.7.htmlxen-pv-channel.7.htmlxen-tscmode.7.htmlxen-vtpm.7.htmlxen-vtpmmgr.7.htmlxenstore-chmod.1.htmlxenstore-ls.1.htmlxenstore-read.1.htmlxenstore-write.1.htmlxenstore.1.htmlxentop.1.htmlxentrace.8.htmlxentrace_format.1.htmlxl-disk-configuration.5.htmlxl-network-configuration.5.htmlxl-numa-placement.7.htmlxl.1.htmlxl.cfg.5.htmlxl.conf.5.htmlxlcpupool.cfg.5.htmlmiscamd-ucode-container.txtarmbig.LITTLE.txtbooting.txtdevice-treeacpi.txtbooting.txtguest.txtindex.htmlpassthrough.txtearly-printk.txtindex.htmlpassthrough.txtsilicon-errata.txtblock-scripts.txtconsole.txtcrashdb.txtdistro_mapping.txtdump-core-format.txtgrant-tables.txtindex.htmlkconfig-language.txtkconfig.txtkexec_and_kdump.txtlibxl_memory.txtprintk-formats.txtqemu-backends.txtstubdom.txtvtd-pi.txtvtd.txtvtpm-platforms.txtxen-error-handling.txtxenmon.txtxenpaging.txtxenstore-ring.txtxenstore.txtxsm-flask.txtmisccrashdb.txtvtpm-platforms.txtxen-command-line.pandocxenpaging.txtxenstore-paths.pandoc/usr/share/doc/packages//usr/share/doc/packages/xen//usr/share/doc/packages/xen/html//usr/share/doc/packages/xen/html/hypercall//usr/share/doc/packages/xen/html/hypercall/arm//usr/share/doc/packages/xen/html/hypercall/x86_32//usr/share/doc/packages/xen/html/hypercall/x86_64//usr/share/doc/packages/xen/html/man//usr/share/doc/packages/xen/html/misc//usr/share/doc/packages/xen/html/misc/arm//usr/share/doc/packages/xen/html/misc/arm/device-tree//usr/share/doc/packages/xen/misc/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Leap:15.1/standard/f5e428da73b7b14272744fc6c0bef136-xencpioxz5x86_64-suse-linuxdirectoryHTML document, ASCII textXML 1.0 document, ASCII text, with very long linesXML 1.0 document, ASCII textC source, ASCII textASCII textASCII text, with very long linesAlgol 68 source, ASCII textutf-8c840c733c4332ea12ea663bf489bbb4334f637ce02cf8ca3d99b479417afaa3b?p7zXZ !t/,] crt:bLL %ɢ eh%ݯ!U*xQ۩&4i":B bꇿE(:JEeA@5VJO3WaԜeU hx~9&rBtTW3)c"G(}N;p,5E#|4*{+eqbbMdL"sh̔XvBD ~>|Cq<h%;ciTLK0+z;bh5)vC/Pd^r- nB0P{b܀etL}s#Xo(p^םW W+w1:l73ģ>9X; V P-}wUC{ȫWR!7gIdHK uiW9sb,{f#z֊[ޫ\cjÀr3w5> e8ۍZt(APg91m#DaOHڇWYZ58/4a(Zjϼq6f&j^ 8UdMD c T5FL绮RONюh3-],KT{lkat׉wz?CIȧP0qy+pnַUj*$K0 4G<ws3UU׾G gG6˘ kt2/[Фz"䱕pDly^%l"\> MkqS(c3ޢD$6f5롽1p@ROAuߝ.#8ҥlG/]4I$kT-%F7oX_LDfkSj%x&k"q;GMjZ4z5.fNjQFtvP,NaA@e"zS,It؎11xSwȦm1]YJpg\W 7UhKgKMя27rߠ@dÝzM ĎX~xӽfo:yfav*?XA?\9aV4jFFTYjܠ}J5[ z`nkmGƼLpZZņz@sf5o_ކUa!ݷ㠡qQ6MC-d}։0Yu^5/pꫳDz&_ r2n6U0AhF])qsZH#ΰvzG"i0+a fr `crgt 'a)QдqIlNY}|QC{΃l_lt=+OUd}U"Xuy<)h=TOj&Ͽ@Ɯi~F!SԶ:O+UkhQ%q=6Y Ϧ:l.~G[Ab{F}B%/F~ _XDcYznUqi2h8`2iG2|0{瑏R'(Њ2褜@& X-`mT&#~Ug3w6'J]xzyg`* +UtE=Ppz=]foGCTXPvˑH2aR 1tHX1ִmq; o.H* ~߯|{O6Jbn@%(|8e wݿ{SkBHe>bYOzS!67s*n9Aye&"͊1jF=)LNSX!2Dߩi2Ԁ4]/X@%JL4Wyj-1dCscVNӆ1Wje[UجSmT?錰T/p3r>afDv_[,`7ݯK)Yx׊4[_IU  xe9u5ugLv !x+o%ׇy6Ґ%_+ϖ7CT71>:vȧ >Z1:|(Ǧi$;\\BD"H~.zg^ RJ[F籏76/:(emSM6(]a{`[_&2MUî= /MIInd2E*3M".\r+X|-;&f'5Pլǜ,8Qq^2f,J*,xNɽf[' SyùDK-uO:""`6#gh\ܥ=96,#{}$[ ĄwkG p=GG6zGt i3ҍOx^(*8wpy9?4nHEF%2.Ȑ Ml{QK }:_-v 58-[rL2;U(=<͑vQˍ*Q J'yˍ[RX!V=T#lDCԾF4^R}:ˡ4]I<(2럠?aubtQSu\~N⨋ o* Ic lw iX%$+.S D 1>;,4!a7^&I|I~o@dJ[#v$L$/ts3Rі%!7.[r ePE495r!0ҏqRl. lD3^AV4v߱vcۣ6k駍W򝚿ɈVOH+<|Э^EI0d T F0?BC$:b6{8~EC[Z1УC@0U1VϘIq3+~_2>n1AnlC wIqnC~Ҁ};AwL8ӓF]sàvJ< {&XY&a> fs(<6ٍ|+x:os qDm4W6x+%*TM8^Z8:@AN==*A {,{yrp|"oXHU|uqT,l;UGy,h"_uh7׺jX&{2.s"K]TJ3 ۹"ȚFsfv0bh |B 80v'Ÿ72#m5֭B~W`\^+We2B`s%[Oh: ,ft8xT#|*%@Nd;ݘ #T!dx0ech?HNwOjvIQ]7jBzC@]b Du}=g',2=2'C]e㷦SШ OJzOWNJI\#tTt;M3 ?kM,lh&k֖L`ͨ΁/M0dy{U/*3v:vcQe~Y`:9_ < /ۚUJcs|in]ZKg<1N!D C/0%\l)qRX|3Wj N$;ZO=4y'IxJj`Jp̣*ΰGmzu?=!ado UsND<͕Ld0"ȳКLu#<3p%'1O|BΪg8L}Ki @U'ے\`:!#h?84Pi+_"W Ԋ W8UDP:تЇY(Ej%U8~oej.IŔy$Is xOTX)tŻ'~MCbH8{|~ʿ=U$geƹޢ䯞 oqb+g۶t6{vfH/z" Dy @ISwN~mxZ,ȈH1zG^\= ݫ뗻[n9MMk5VoEz s'uT#C`s@@trQ)dX8}(}D8XJoUn*{c!}mqQ\#Zb9ma$'ktLVk󚠘cS?7nbV6uR5~ }`iP~Hߠ07F;JZʎ^R=H=mwEFz}Ymö|\ۑnM]籜Օ(jBdihNgʝ;0 g+~EU 3 F/UTٌk L |qjRD3Zȋ{XcŕqB5stjC |3PN 7->1p+5El}>7e}tpb: ~Sp-_i_I2ϧ6ZEea6Z民gXۄUaf$ z^$G)\ b` FR[3fp6)аl3xXc*52XAu}qQ{WzUe<-Ts7XY>PW< (]?_c9ڎ"@#:y >6Ũ=kvG9Rk 'm_ĕG#1=U[AmngӬbb: Ӎ~|,OnwSp?x9y}uk+TbD& @쟸uoԩuRMڃت-V2V`p</al{?3-}k[9y4bbx2Ӧ'\ejŜA,ƑH=zciA U ˁF-;aז"Bu2R\]ȂW ǿwM~nMEɻ q7TAR|_Q*1$@F7cdN9]Oce&NOW?iiFl'g8 pî@LjiJG s*@)l!ixJzX fÑ+3u׼0q%o=ev/fjƕ-4 Bzf"!/{ߠKrr-&O7 BkθX+*kif Xh'uHNݺ|ɰY0_W<얘k\9zú8EjywyEZFЯC9}'4sH곖PjxfD}$Z"&Jhϗ稼BpERQۅJq귣Vن_9/qa/Z5?ldL+,,uu}GPGygD|6J"{ JK \BPۨ:͏Pex |LI}NJco&8e:'b5<2jZ4Tf^nFC(miz5Zs{o-2ij \ xkͪ(14=풨-Yk|a9^:81W?m~$y O79G #&\d(J"&: D$p.hH0 e%3[ߛDw>NЛb0FFY-)IVy(rC!E9wEN*a}] &<`jW(k/(x@JKa)iΟMAm< u'!%c59kpJr[Yic'IA/`+V:dsGg\Lz"=ǟ+u@9؍c'`= JfօZd*TT{1fݜ$"rp8'_cfLQb7Bt("jy¼{,R@' \

#ٿBJXܓȼ&dz6P@Z3#}\v0nW >)[ѹ1 P1B:V&%ɷ 2a'eDH,-Cawr"=~3I wwNB8oHd(] C-5>qͰ8FmK_ŒVҽї"0EIcHLW}qleR2#v@fHU\ ~[kp`.U^8{+V2G })<7h{L{^9p[5rj|+E1v7/8A|JJ7OA z { mc/8U N󒼸m᜞;D=L3?5cIf#a '/H=~ "#) ͈\j?I=e)Z=@-A )bd6qK6}B:0]qE$bUPGps/stf5ݦK?J ||D{a A}}$ i~T?n@]ɖG4O4oS7JT^ul%:'H~ۓq 5BBV_ɇ`m XTт4vuMJL"Y M~ԧS3 Աtc"zj|ޫ0.`vMpx[J q\}8L4:gVF#KQ1_?p9Ky,ORvLù*@( a ddQp?Y*U#`;@#ׇjBUCCXs]ڂ觸7ոF: f4@#{CiЋgC'ͣ 6%R15 |EB͇ 2O-k"eڀFY|0GF[:>1ΤڅՄx\ka,!Nw^0"z}HB2ClU*kXlȖpa.cw˽i]|yQĥ.̣I:%C3}HaI6tLB|$_;T8 LAӝ'rw7imjh8d EQ0MUuBO &@yˇ"2sV'~Y{-Mo/SJXO>/$_#gFI԰X ae9]_$VMN%Ч*?q2sky2n@LRgC@`S%z?ڝE-Im"[2έ\xUx'^u; N#oxZ뉈,WN.֩"m˨;PPK6ku)zq@`SqTځq9 0_!ft=7.lPͭJmn~Д!mND/?c-3wұw5Owr<`ww{,:|$6hzzP{'!?)\(jqPHVƝrDT-PD KfCY@h ֜Bp*?%nIE Uyh ϓw;rɟ ܄rQ6ZFC5p?<W$3h T:; FM 6AuڔvyPT0Z瑬pEr&ڜ"<Ő&-getvj%Myn` B '=; L: VAWud7VW .!Wf.-I yW2VcXwYB`ϴn|Hj_R%~ ƥx&"Qi ` clǚg;Z퐆X:niN5o5(88/ s/mP5t_ɍG!A𻧽wˤ ދ=S?!YdVIRa`{8/^b֍#_A7q aO/wCuf"nkٳ7Od$QvK*PҬiNPHZ/{Q1oLG0򀅥H slu$!{laScpSA&̊ZJC陵2N N8\GlK} b3'X~Zo%١cR#:k#s7es 35yZ)ѵwJ`6`DQ)C/VQ Y>W8s+1OmoT_QY *zgϒL@Z¸|^S0"qƸNe܏RWHGˣe}Q@}Dn 2uT9/?I|/Ӓw D2%bJrDd;gI Ct^Gf:J1E=,U],# c]4JGH9C30 Unll*aĥZ6<(.PR$#{:ӑ^!ֈA5"tu~bL5& \hGߑ蜪K1ΎbGt1nR ucT!&h7"!LvGx;ig*FmC-D3j]^˙"]8rϠT~,CH6DP4d-g8^@!=NII\W0ijSY=f8t->VD;YZGͽQ&"Zu, L6:-9Tӛ;6me*"-4$]Yk.1ϼv/|+eIg jo]M_&lWoJ h`f+twef4ҥS-0. jLFNtF _oucPIƘ]2TVVaWk` X5BOdy 8Eu P];Gh9JkK@Ϩ5,R盠~嫊A%\!z%'oH'z\v!H@O d 1 ghycp[T,)G2r;CO!oVm _M. *[BߘfD-8ِxn t%OX(;b'xF[P:Pd/{'m8e>D\uj;¦ #Э:kjY^_c5FiC(EY9Hԇ_^+ WrkRТ)ce\suHE!e#]CQI]+Hx}x:ڋ8cQA ,xxĬ}LfPXsovxQ0';w`'<--5& qڼgOX>ApYxЌwֲ"74J fNLtx DͶ/ ?FTۖ"flKTv`h@ vw9`F|J^EyCSiD.'zH=~JY)CIVJul'4ւ&d0BYwbb{%]VO䍦Bֳ͛p<>Dcrb 'K ct- fxgR@FEǻpa{n9sȧj2ۙU+U.†؜53 @2b˦[&sx:c@]cJ=`fp cR[ՈS|בS QI Aʹ%WXz: ؼxUy#][KGK͸},:(/+j V8lܸ*"bi|T$?'B´$;BϞ2LAW`zOC6xg&IԽ{vZ2&{3iʒaAʋ9Dm?d kE'(K"\ƶ5x4 $T.] JB gXf̓E*z 4H-fж؛7.MYQl" k$J(EuWAl:ɿ_@ŋz >%?Zr[~~5v?Qg餜W}2F8~ Hy *1@ Wq" KrS%kTNE!Ml^[$b)T=];^ }ׯ ꯳DlQf-.[Vg`(x՛{ˈJL{+~qNp'6PNjZ*3hp= 0 W)ʬ?˶A랷QbMe@}ձO^;6-[R'wW?2 CI-=N]ud*0 Cpm\|Ǜvll:RTdCV_f7:jȈS¿A=5>k[.4vlz*;8,=t7%ݼWc l\3$Gم(P#bh@Q`8mſ>mGise4- imh 4j oxfXWf]@9~*)+㼅ԏ[v[ݮ-Ty6iivKS|ǍMojfS챶BF,xEN'_^{ɉsdj6+r#cu2$=Jz;DF feA{m`ޟKe\TJ7ٗvbo9ћ2PhB9|5Y;uЎZNVcI=>ϩk&sreyL,si?)PuvWl<CrooT)E6`Z(K״'ϷJjMitG @j,Mn+\B o_--&@:M܂/.+Mn׶H;r2(PG>/Q.d'D' :A!y9seobr'I5RhxPww%;T01(sF 4؊-#(Wf)?MQzꊾK< lލWQ2GOk>h >"]~A; J\z r6Mi1ӂT@ Rs?^28/''aV8UzǁVG6N޻n_.ޚ;L!lM SUk꭯_`x 2)QԔjBه1[qIU <;mM>աiSkrVfӟAL y;aqORQd=]m x+@vϟ{HQmu|tzLPKgZ<xXK{5dp/eiVh@l tQNpl X&B\ ;U gpNF7j&= >jL.AVyEHlDnH4E˶R{|^*EC# NKW{AS@)ՒAG3!gdY`m3=jrGodOJ\3C{x(g@N#}|nh7RQh^wnZN,\r"_f}ee H:)6jqt V`=R!6yd.ت%y2\dgYJL$iz"*IEd;W}zo̡!lq7d_ Ҵ",%qKi=m7oqIn?VTdi=^~ݕ3 *t4dS#x UIVDN`ӡD'ȭ'B3S)˄-A{]gՊ4ְ*7 ܼJ h}cA@U;G*eƚ/$a R5]7ڛoGx#U[jJٍ>%¾ol;헴ᝀ}Մ]ܭbC1ҳɆb'(yJ`P,ؗ& Wuj9>i1}3J>cH ?I¡ :d,>(xrԱ}nS~ !Et٘z l#D3zD^oJlZ#/<^54 Y?Hro0esccFW s)pEs7lg9JEʏݾl GH7DYwRǽ]~0ɜyQelV8&2|KSD&4UKl$uh CG}x񙡣>t-_3@ḧYpݔ0M |!tL17S0A./݌Ka{#gέWj&̽ Ϝ~BS$2 D!bC'{y1t֝$/ې)9"NWR?a1O_%vAq+7f.ͪf܎8U $y žxľz:,[}BdKkf0:zZ]ChFt+ 777 zi{a!4a?Q[p9e,RGMFy?+jV^!IỊjyX`Yn s!1.01+NpGmޙl2z$9/%X06/h\)FF,-)??e?=fWkߒ Zusr)4ȉrnP7OZErJYֶhDw,,0+Ĵz* wő ~G@؂TVWAbXX)Wb.OQG҉ sRl;D^3M:or/pn+W;}ئ-& 4e,_`Q( вS8I3 ORv?GkփS@%Tqh>aZp=n_VWJ"p&)Ecj6ސ7g&,d`~ jNwW4 7W%il!iSi.?`5;녕 k{key q5qL;N)*n U-*2VEsMͣXzOqvl9{*C~R"v:&Q?&K:A6}juxZ +hpdxj8.^>ظWe.t}]@c 2>v+aN(W;^(p6GcpU9((0W[mS5yKH9mz >c YKn io2",̱ȾUMzNDTUݘoֲ[&H$cOՖz<A#P>>gP+ $މMH&;wt>wYU3<'wqrhD6r(298'Lgլ*#lj]C)0sy7s"?M8fh 0I)pW :m3YUL==93rQV]ɸ2 i udF8`+{=>ۥ٩pa/;3[^FsŒEMphuaaz©Z q^Z|$?v4Bg(yhJ -#M)U70'Qh%L aO^e{7?e5F` ²nXYU58v|NiY~jx;? LiaNDtҦ>v@QJ%όU/Sɾk2#wӔ!Ԇp.Vc/ q,Bmkx\CLURuۘ^ QL~X%( Ж z${TWIQ[4=&Jqd&C3$(En%^P+ؿ A%yDŽasߜګI?pqg3gX+4gD ׬ \t ) Dy~P$r?SኣV8zdiA~Jr^4&667NiJVRjpD8T\xMmPaZ<!iMzR-M H-/;f4 wBTMR+2T-F6: d%X ju u(Sq4=K8f]v[4!1qWr]zQbA3 bfmL^6KWiLF./ D^/[#}'ȁ? !GHd*|c1K n ‘, hQ^N|='f'<M7+Z|D .AaN^ + ]F }PUO" ޳ Pl*OAԨv>'h&7-7d Ըo) QUueq*(wRC,z Dp~w8͞ dsf쎳Q0 p%̉G'kgdˏ,F9&V%wJЮ[EPe.K`_g;t#r7?N F4nGSA4Ο\ɮ-PxH+eaWr* ˌ8OϞ|AQ JOY2̦,ңdJi<;pK|"U>M"[T !2"GFԬ]P4"J+.P[sESXShԶ} WPZ@*ύ3 i&Lw#l1$BA]E:GrATd>kJ+t vҟmI;}tfo)&Dx7ٙٮٷck]0 4FgB?I~"y:p u1ͿĚ7,+q`N<>t8ENKBpOeR B^h0 0d`^+#wQ-P7c¼5xC+$:HE~I5#b3dj@JN,R32J-ܺ&[ZJQb,'i2{bt`Vp?<ڂ)̜"_ ަEcy"hƴuQthNdj񕅠U|v]oNc0%@GJ#asv|!LiQ/{$6 (5*# ̕Z*( wrF\UH)3RkE^i `i##t|< _K|I%T -,Y.v.vV0/~z-5Dѡ )r7Dq**@oZ'p{IV6|'?;.YWv>8z}0 )eS^ kvT`}8 %lNbm ̤!Th0qo^wQ D~jkKuXJ9ÎN7v~{?(zAT>quƬ[ϔGl4a$n]HWp!U&՜#?Vǫ!V̯tsc*_UjbŗIGưw?pԞ%Yw_Q*\;MۮBiH1X ^$cR܅: OXyp' ],=ڈ]G RWA_4Ov7L >ֵ ye'3 "D?݋11k?HDo @Rt3,_.N62c2f'ߺX{>/rajEc'TȂK7tg)W#+cmM+M -{O~{s~Jae9!ZI$ARVˈɔ$r Q_BD3u8>4h v3BVc$%DjJ ضW$_?)sy"Rqy_C7y#":̮8~PpKqx(a:9u+LEn^La -̽mB0I&u&n?RNw%4p6N'7l4["1w$>nd, ݤJ 5 ǽ ZZEQ2״mH7@zHCfÖ<=Hi,*mDGr=hB}& b[2ĚgL+lYr[KN]0z5q*YM>:BˀD ı(0,WڈnAhS+#z# ,+'A.I/iA/~2/E|`QrPu/ qJ&R+Ԡf-oVI@a=}/7#NX_s'Rajk}nN D~ټ7WM2M\e(ʽ+2%EHp!Z9F1/Scyٌ Wj2JMWgn5}أy?b.ʎj (.\iV\Y*|])nN*;"ĩ •B]= q  Ukǟiܠ}ʡ_Xiа]¦Dedʁ^mcL{s; rg>݋)Nbݙ2ǐ M#;ۦhNXϓ5B2lYA ģfW/#HN}F[J)O"3veQ<Zm/uk<ʖycC:!Oů+&:?4K>ώgI~ vhՋ\S\qKq@)kƣ"vJ5[d樱K+Ս6A#{EcY `UTW~ "L}kJ:(nP#(M%"1ٞ:Sx2j0Nhb-+8+XyB} KSUR4j=],UR!oMSЩU3Q]i&ꀩ[̹>g) LD]_Pka))dDiB  [2E";V\X_C])ſZps mvͮكBC2X K6"jdQ[56=mqt_hJҹt.Hڷx C'} 2I=W_Y[)WR`Aa #3e=r=oCN *avs5NVХ#_x֘foFo!hQE9~kPCgVM6/uiMbE8`1N-%z#KTU[ߵ+bs|u`ɌylTF*S?C%;#39 . ,hl E|UVNқ9"Z9X ݋4{\1piUB4GT>K8נ=2ٓo;IJ?3$9EEcՖ"AɳeG-~y.b|i5ph(C?Ms0{5:"K1$Y b"fZj]4Uve1ֽ-TpMTR L-;.{so@+b0҂ˁ?6Vwbة]_Q=CY>u**9܎acP Qq?ώpB=&OQ:P2Xȝdn5%60ξy9 >TY &ZѠkNCаPÎR}I׎ QNsx'{1} z,318TMۺ(ui'P;iVШxfO ˔Ҥ 7h@`3y8-eI ";%ᚇtA0 6RFSC,B"V{=G޻8,o 5M2iw"w@s!&NŝY!4Criz?FhO(VcO0ֈ"BϕC*bʳ q!/TXw qbԇc\nz/%#BY|HeqxWѝQ4mtEهY8mCC·䤪2% iLyAJ}b8ti?ώ<;͹OmR*βK!p?՘c}!x؇v&?QfP%f1*l^;ϖǸB ?U~_N""u3;~8,vFԗRGpv,V_φPc"x.htaxM$P1*{bIDZ:2NWY})a!Y.fz^:f5wK3oʞzT]wWqtG,cIVVLAj4t*v`?X;$70fxﴊmK:;ۨO 1a7NnL&as.P[sH$TucBW09"d:@/:ƺ4O&$oQ7Ki9IөTk\i ՀoU0 2ی=a|1(-szDXE^B::q-}`{~r 1jWwA*(oV8 X:Bvj\|#&kIwxLU#/7^mg&­1u?Cg'C J;`@z kWx*f#&b԰՟_ _aEpd5d+xr 4w5|aP(N~kCYJ7_#HHmvxT\ d}3Z8X/Q[sl}x{,;aΩ\8jҎ̒_p)} ˃O8\yԶ”'@_`֐< w{LU|-~w6 ^]lO+^Ƨvf@Tbطg7ѾD nـwp[h+pEU V`~S+wRӁ&`y(څoPyj5'}uB+ܲ Y\.Bq"O o^ϧo:߾MqdI:a(ٜ$fڣel"ZRp΃_(E@lM,8)k 'KĊUڴ=)U^I(X`.br eͷdOH;dbgh.UY*xW(#}sOΥ[ }DzJ&̩kؓX]cc4 ' >H0wGY;T/|ꘘSh[ U,gXB* : P |e}be Rdj8yh BK$VK? zؠڟ ck5)_;\J&aQ~=t{FF'_LaOh n}fj,$| .R?%,f[8Her`ZWt_YLozan?ZYKFvl/?%_["|CBv3sw+jۺ!-N#k}/f\Kzpmi; -IdjFQ ٱ[h[L蓼]K\ -Cqf@\Ҝ.j',CS}֤اp77ܼ\қz xd.x3ݏ0 l|+Yk@ SM8sx ZYŔqr+thT=wwk1Uƛi7Gs.ϥ%\} Jgb"C|1uZ/˅O8nM}cuOhgčfBbЮR 2E< ZN6׃:o= N@!Jd4XYdRwLuIJY8xy3f L#cAh^NFq ^JW?drv@2HL}ux5^ ^7?}D8PO Kňà-!8Mz`:g?[J(RFN8&kL9o.1M.qnbP_tKc'ޚ1_$J3^ŲH uQOVU"4#_A@#XuRpF b${ECa~/ʿbKX a{IֵO"8u l ͫcD 1ZY0yFƢP5%?J 5\̢Kâ6FFnϨwχ#+wv/q [7^O£`(cV[kRA+J@&`UOx1 wJ rOb;=AunwKXT;P\ jnA?q '\9ɤd Vij?vX'.3N?/( : ׆$5X.fqUn)R m 723tW"ˉ*MDW?W aE!{Iu@oTs6"LB HQ" Wdrur/u2R"OE1FrTKټp}ѽ3^8m6\ኍ ؤm缣wH!%‡PVw?~\Ju F?#eDCPbmʨxsDc{/.{N}KWU ߚꖊ6G%0=?Ml[Ft7Ky]Yrڵ}ZDžXj]x1EVe0B~>A_&͑])Ɓdq?C I8:+oW?>#j/}Hl,=&l҃E)j #  ]aiv s -Km'jof5D@:as 8V5?<[76XQ9ϫQiܔwqG0 Io;粡T${x py)S/e4L sB#kj ɔ wPou; V7}>Gz-?>bͳ蹟0agvUu:Lj,1ܺVpFR?_ʬAӺ [WWv%TJU^WThQ9Jߩ1KAr Ym Bj~Ԁ;F#c&Y1cPDb128H+8sڵ`'dC>I77r;OI "ڷ ӳPšXwʁ@ ͬ=0e{DYb!f2*APr-ZrAKt kHЙ-e"A+[5¸vEW1ͫ4b;*\U{QT.+QrbS@[u~Z2#qYm ۄV{`CAT .U:JMNS:m';ݳB{/3Oæ~f )5|2g]5ﶽgr75gkH ~i:\XX.]ŕ+v#ʏ.LgW}*Hf`4`[⤝>n79#y%V6@j^Vg&,F] ω%k d>plzus:qm >mJR %M#[*<,ue%:ԣ !wQ^G_gbTX {X5./ cEtG6uzm[7\)b`ToÃ,M7r'XeYZ:Rw̋ð 9#h>w'2tV@:.](:'XBܖ{PFqQT/(g;nZpR^=Qvi~c~Vw*K ͚=9 K 4/1~BIvȽwR) iA`?/[Q᜾ά%L>vR5J83$‘G\+Â2W>oRx4]8 R2{xx"t6~SUGb _,Ĕ}Eml2,@|•D!vW Z[se+ž b rJvL}Q09 g4h{@?Fin2y%^[Rg/FBk<9w=m\$LACs)J6HNBAO($cneGZmo5OeCxͤM :2G᪖7xI{Cm4;P}L]{! ܦMξ"SsrTe> >:3kFL:ȑ+|[`vxw>D:=19.<@#YbA%>ʳF"x:,>Eѳ/(+f#c>pi0v|ِ4KdJ2wDt"(jlᕧ0OE_ ]*"K%w0i/`2=(О}h U$(LR, yDpk~zRr;1^Y` f]/ "qؾ h{?4 쎚=/9PIssyBhlR~j,ijnXGKA X.64f@('>HHmeѐzLƂ>-<`%WYdzj?KuwwAT 71e(j+&g:i98 vON}DV;/pz0wkg5MéIv&OI)02E-J ' 99N50ڨ]bwgߨ3qP'ڈihF,̙z5P=f!]sߑ]wIT<LfR0CơDWW'Rk2uF7 m|?ZiIKanu'E^4'?{B[`)V[]>{w)1jeWO;*+2# aFP*/@Z@rk'6ZΠW!4A"$q|Z}qS%HY:$i=i`Mz+ZLպH Vpu:p>QⶭcxZTi^͋ԧ o[WC:M2&L^i5I/:1ic*ɻy]7tH`H;j])B];^TpV8Uʭ>;+oD_ ʩD!0{bnb'{G! [c ,E@f#318Seע4J|kPۈ,W 1 qCoZtʄ1L^AO>ٚO2"uʮ`ٗ6{b~eSDV;#ZV݀7^ ۊ;s#גD tʒ :M5%ZNS,UQj<.s~B<^2ƺiD twAݜ^[ӣ*^ɧ& KV-o8{LZp„b?'_i9q` `kNBdlRD *\L҂U?}a aT%F(p ]s٨cmA"ҝ (>ًq2SQ 68w]׻b2]E6'B\fn0pW}l"4ƿ5oy<TtC_8F(#PҠC gh"S o^`n}dyn6| =w݅C yqn!S  ]S,ym`hL Ȧu}i {Iy˿sHk;,"<']qA3|rr!{lHZJdZ(Hy埫E сR|(s;Nz C$KvLue+/oDn0񎏋\>{~ ({B=ZsO'Q,Zp+(`z ] Z[5ZKA>ӱ#}ϒ 'dM"aE~<@w疢$a쀴b` Ք~@z#_º4XjJrHڸQ5¼[u_.GHwY! ; #iɶEXۻ8f2;bX56ML_9; lwST"3-P \gS~^2Q\FӼepr6QfP=V8d0/g3`ңg !-uQp[D71i,G:7j{Faۍ 1KF>WA7ofvb(.Q:jKlYqbݧƓ4nN-@)rėp(>)j;Sp3HEt[0²b|8z*eWC+fs J[Cӳ_ÑO7eB>fHF!=Q<KHG[p3<}E}L9( 4R7'0y(WIꔠ.߂D~K5>~x|PSDc8`[.ABO t. 3M6 $B}1 MtEw M0C>tԙ6)*%4{7VfhϪJ߶LRY4ZJF GX zcQw*YM5X{g mX X9iD9ҥS}ѷi\Vd{ Lrw֫5WK؎Bٗth8q΢YXG8h!жyE弹:CUY5qnxR7uV"f-v`)^W.kf]@X4yfo(Dv%tD5S fk_Dy }FS$n̞VM=zs̖+L 8HT .4`LP E5:7>v.籔j:pO5O%}?*Yj+ޏ%%Œlj.P*kGeqߚR:GS7mAb7Dѯ "$勃eaFR͝wS~̆H7#CE?(KsC5S8SeMA>yn6VyFp2-?:nAY{>:Ct"zA~1diq-ʿA/ -bn!@(X)πnqB"vyKDϠ!1)v#TDD0mS!.K)$T{!㶷㷣VH{4aN1voi9Id` h $a~8-sV |C`t}:UpVVJ@J (ik!)Rs4,XڜJnahЀ t,U&qGtFzߦ9pFńo|j{USo_OWүJ%Nfiċe\0f|$8al Zr;IUlNǦ26M"|]kmS]et1C:&%SB2󭁹BX'o5xIGnR=x&FK>d.JyQRZxqPkTar/J(,E\(t"NltJ@V6m elZ5f9α:u)HwTL$KmDV:a$Nk)k,U&lqҏUBn;MCrYt.2Uwx_qYIOlng_OP'oDw:#V;"⤐guU2:ԉ1@^K&s -b6CTV涢 q=咥r_,Wob D)`t\Nn0k#i )͢1D CӎTuqz;-;l@s׍ JǣJLff&cr7pegF quk1n@ؚͅg݆-Z% ` *lFz4 ![tf/,@=8l-$5:,꾔XefR`$Z#-& {$hx\}nÈ#T^( ZI=C{1h|0R͌]v=$]Ԋ<2jK>!pۏt,0fY#7/>YtsRnA 1Hb-i'3`+ L,i(Gb׹P>$6EVi+[; HF˜:@5i<~ֶ2h4N8_sxou@@'8|  Ug@ո;v݁jcxެvD3Mz'"-$*H$6ĥ8D Tj_&a~-N1O[fHFEȠ:Vl+5۴1Pb N,tM@˹/u 1;;I>TfƙS{fJTԔn@۾"GGQ_d„ wLΝ(I8{%tg8: t僤o0#j'.wuiFlTHwdN"sle/h&[+SA37XZq|J^D?L'iSqQ426jzۧƱ2]#Xh#r(;:кs#Qc6I/}M0VrIr/o.t\cSy,h }s4 0gRyYցԧ@P`F/tVh6D-”T;pwp=/Sit]nZADTQ*E'^bEto=@<$jK:n-4N``CX?dnt6K*#)T}IίP{-פ5A6"jHxƵP]½ 7; O\cyΦMm#?o{m}5S<%ƒҭ 3ڦȖj>@4xޚPmC(*:m$y[=QH5u)Rd~>s۩՚%d6t',tE{@UxBupQ; |n~ cq`ؙ7`W Ȏrpym+ׯGO99:L)n?u-1B[RWgѭc  _އ ih7y ,j\'U#`̄(sO~3mUݎP _Ý(8եV¦=&$@,ViĶIǡzbSXo4,Ew_;LPץ;iN}@]iٌvnse5p&5ɆXEmOc5ΠƦkxIDDBzѫqbQz_>)oCS,a.ء.3 JQmDuw#qC\lK\Hb.4)o:{]~Giw oLPOY[|ɝJ*8F:-^b" &ͨ[pmPvα8[@,CL7,!r"]%U <k2 1Z8b1У2i#G?v>%zCޙQWP>M6G%)Ci ʡһZ[s5< XlOٹ3 " =^R[ FVQFgPRBxbG7Xok7f^hVgR4k -=S\dO!(=t2b 6pu7>"stfGv{W(_XB(kOOBKX$FȉJn6 =̝y.|5#4[ə \g@Gd/]Tt]O& "M\:lw1J%2Ukݎ,6SeXb v?97pK8 1 ^!oafhvlT*)ى?J!Ȇe(g6-ؚ^e>Ƈo6tˌ,wrƻ1}u5NḨ!¼us e0HE{򟁌Ș)εjS`&9n]K(Eb3` .h(R;urLMpȬ1MpbVGBXZ|: w LC@'3a7wg϶ѹQf+yw6X=Tf〉"T 9,Q.n] `g c-t.Ǵ䖠!Hf5!B"Z9SuhV z!W}\S.lY@ + {1)_p6ާ\`d)-#r{rZG OPg1KDP7KMαB*dP 5( ㈠oxW("Bq9N=&^h3~f<_ݼJޮƱ*=w`+ͪ|=^z*DD-@0A`kSuDzK/t39}擃&򞭠 zf |[NU gSN`S4ytg8g,տ!@ݿ syjNdMj4d.C 1㍦Ƞɓbq!>5dY4S@棹QiHX)ʤ@Z(TxY-\Oԛ lep yM})o,$ -;_4k}pk)Cj'#gNQf8A[Hyco o_QbgC@}ZFa&7-kv} ܯsryH%QkٺѦW't-yˆg8AiNeq=6e8 =Bwl[Wwh+:.XF0-=mU콒{8@sOJ@VL؟A~\Kdo@Y2F}8Q.YKi H(> jWd)nz(/"yT >  O"pdSw3w{<-̀rȳCDJX; ,1e*&чSm 1ܵT k/ RiAmoOjoOw}N?V:X:U\yGC0 ,e6< qX7wd "Y} S!6ݥ!u[mc% ucZ.=rˣi@*}jξ3"{-[ Ue4vqBWM-TFnUsY:%S-*QjJ({͏BāB$*6>@,;\JygY'#3k5va⚈k"qCW}rt%mjkXE(ld]XdXըņy3&Jh@.Yʝ&fl\'gÑ5Iֽghj 3#MxTCu7r^;c͆Nvt_G_ pKY*YmΏۋe@^}w*xL;[5]8 jsWI7Ir8z%>Q48Utnef_q‹W'|{.W$6~WAeqtat" dCW.2 h-rHnl ~g_a`vJydt q6Hvݐs~:XȔi 8ěħl[~w5뗅M>=M+ D#ZD^]Pdkm9lW窄r1|6$VkolM>s#lԴJVn`u=wHuʭ<;Lt +)Zϛųf]C$r"e]4B!)[ߝuXGpg>%'2q9^Ǧ,$l]c&أl$t80} pF[NEpvS--)sFo,&?MQiC:_2Nr<]/gdG_^9ƷVn&<2xPWn 3ovk,BY=9w 5+RWlI'r1p i ? `L9e?P3 *P']E $'Elp*ϏP i2ƴguN,+.nw˾ʐA[oyE2_ `jj7* ? Jhї~VJҶ98 V;X霽HU KLK~ɤ&V`"՜NS7+k-v\f/hKm ~ɇp5&W!,3~|El0)]8V7S&};ЧYo\_يÓrinrN0Je> tË\ֳA(h˲I!=+B7IAzWb7l#1-麪$b^=`Gu$.O^(}RBƱ :B)ЂfB*TPVЉYqU1;q0;V<_BxMQ0X؈a@ Q9 i/w&w?a/`J&NqndzNO$AܣcDH'`c4F,<֟>@>xs'$mQC{}]+n创&&۱//d-:o/)j; ֏9rS._ޮTVOϙYS TYfh/"\b2e$E0z}@QkcP> iG ^m(1FJ@Pɖ,C"ZR5hD@P±WRKO369nuxx.ش>AС7:1B=~lӀ2-c*SEZ.hyO@VW{5ٖ _QNx d9JgڰY#kZۯWqWR~S))z_R8/K^< sEnݶ8#98C?:XZZq(!åd|t:#|.Rͯ,x#Oh=tQ&Q)-L:L`pE ]Ĝ j;22!qliB`@MJR'Mz+0$Be d~!\z=4o''j&W0)XBt-Tu;͍@r20؅ ?LGrTʯV0B}B!r?i\)~wxSl\8E{^ٷdf-uwje*uU+gнh V:姞!7p#o]q ^ƣXϐf{)vтɩ5׹(/+֫"&^ftX.<EjBoOX4&aa3tVB郢1_׬<ӅC@Ec}s?sA,* nű`Ԗ#G2e?6C,|l[׏%5K3 A0|,M'mOlUW\*+ O@L{D8ڦi-T||L KD 3]n0'?ea [X2C,}+ZHZ.:}[CYpW.?W]Iu~,{ @89mReX2!Ԙf[κr+OM`"BR8w{MR~>B8 ۍe52ΞsIp#M wƱ;Y="͇3U) ](|{ݪvf&wO)OCxj2G&7(cj%#yg쟍) k<}L7YgkҴbr0r jF/քa|@~wF1hs,-b 9xStJjXlr$T|2Uw#WEI(U $mE~+cWh8)B%Tb.<ݣH"reK/ :e/;Wo$@;aRAN%2^ݽb)ԝq,զ7%;It(tj@TyB{(ƀBF8|r&scn2$2XxA1V"[ G0\p[Nӄ§d4NC%HSЫ|d>*#j E z%cXq52ExOi\_uZxzU@*݋iO"CyyQ )G6N?|՚x]YMIglЄ^Q:%Q8M&SQ- GqޥzP-6LL.fG̟;%fG4pP;֮m n¨x[>fHDym0HIu)UzMUVKÉQ2 c"2}T{^dX ֡rDv \8 qr[ ֘C/Ls0`NU?j3:hj%,eoiI'Cj/\c /ҁax!RVAz'Pѵ4M,Pn vA M"PN$w]IZ g֯zr ΄[VYyt (n^\ H3Kczl̓ iI~RkRq+ϖ%XDқTXДw*csy&(vv]Ƴ:2 `e>^M-S }RgRe"Y(Z眉ݧ}Mdws[S5>䡠.=58L!ɲ5D~cHiGzPQtLG)uTy8JZ AJA3A&0ψ537-z+uIL7a=% ֚r0ʳns3fߋRM}FV3#:Z|b9U0]jb1mT}Pfr_oU!}d ,M7~ߒ||tBy"|'.ZP=ɄD[>N> [ADZ3Z*t]כHi: ;.Π C:߮+ ?$ȣ=@!xq}X/6I6?LʩF5BaI5I4 [ TW&&o WܔPX r 16KeQ=J&E)u $!y"*IזGղ~IDxQ@ y9zq G3^ړy$ьSӯ?ix9F\Uzn՘K3Y, iK*${'rr 7[Y23||ˁIO0{-Sw;9ab?)Q2Qc1k0klΆ獫e*n D8?ݯLK;1Z3:3&aop`&󯲖 r9]5cW MT?}H·Rf20DORjө;ܬ"4Il7k8TOuܲ|l@1hE+YD=]4-{ 4((Pa{WY6 o0C{cZ4)f~J\G W1r;U~,cYzj QqrCZDeE<'`$Pցع ϧݳ^X[.-An2.B`BBܡt<U6aY\\*I<'}Ylc=<ɠ:ްa q7!H/(#)F@D&#B^X񧜕U5_kBn08х2 aм{>bMz' Χ1҈eVCMNchhK .Z_DP<[3)[VJF$n cwiHϺ+7P;~8dW_9񘃃vw"MxB:(tx֌ԩƮ8 y)5cpƃ& ]/Yڠ=MåS7lHh'sE9f^?{%Ѱd=y KnhOGM5N[N!Tݎ"D2Lԭgp'kwo -pUO:P"]_|-<"U%Xl FF1xH~(9- s.-a&3䅱2r> ]Y4c5n 0wi%L> fr,QEe%wVTB=IJ:dzr"Z1#53SfTέ@< u?&Z纷+2hAܤĥE' -ԁ3+DqV9n$9:zp<%o{ZRRki|S@0fUpV E-}ajljq.:߉,[ؾUMw$VNZČk !g|\Di*orw6@<ۜn11  Ō "G]ec4&~9*~0ĊXߜ/O1}A-I%G疹yil)S]$}:–݃yh˩'~ɞo pGF5Zsܘ֯F}ŽHOmlL :R-&%(,.My~=f#[ÂnÒ ۶P\J, 7BޱNA~?Ϳ+25=H\x!٭SGqȼZ|ZӏD ifގ/r뵄׹$gg#RX(' UD=\ !1-C$ r=CvD{a"?6UW% zr!j42K ®$) iǹӕK(c`}-H\ySpfD\`4!οXXS)ǷS+ B6Fp!YUguVPj1> Uހ |(DAG ތ8Ȝ:CDs+6:"+A͗ײH~"]k%̐Z^ Iv (k+[ }4x<꡽C=iE"Xȏ2h4ZoՌszMlv>U"c| 4دt4W2䟔DM9R.$zEEkˡz#A^_~߀iJMLoWbQZ8geuD5xaKC6)5gBsfGJO^Fa]5XOb"rZxjrֺe,ׁG I+1E#"/WRnMTa!,)J=ZuJoڕ&T;<5JWb#bفwT]D.B  Yr=@;/$(SiyrFv*/He YB#eЃtbọuNr `0B^DM&.c~*ϫbA[JթYP׭S4p@;MaP̍{vz}[K-o-&yO !+0hE\XYkc (M$7ۏ2r.Sr2ďҽnR+!NN*2-4r_2 V܋ˏ5¦钰^ \օioQ1W&TLO?u0|7QeL(9h|\r1zP;*3҇Oѣ&,}"m1CuKYe~MK]NIV+RĉM&FOd(۸neۮJ,*`,Yqnn8{G,94 8*β k@P^*_Ul#uA`:Cb2@WK t'ra/Fٓ+vfIH_[q>- ' KGP*檂K1N 80pKRtfO]cUz3S䆦Ob&C=rx(*YG!9!A%tRW]o1̷pi<]4exvͬsyMheF$]ͼ]%&6]wp9I5yZY ZAKw,P@XpcAOI2 p54 Bjժ7&<3/ҾCO 'ŴY ?rQL7] -\C@ PEMS,.ݳ 7݊S"w$oPTj 1\Otꔇ4U@7hW bz%l´h3r=7+_–;AdyWjsS L.ȩnxB֏L W#J9ihCKhZi, $ J= \|hB`Q'-IgpƎA{b; /b2/@='w@"N^(ddӵ*(|i 2oiIڄxK G_ﲂ1 e c(Б GvV$0h|( 3`i_=8 2*lӗؐ -bh@J˷AZܮݘ0}UUk|50ݡbZ@:(x-9\"=80fu ķz'L,+I>Xj[⯩B骏2"tkz/W^Y-^Ԣ7yo+FI1\7}h$x3jJ1H=[`z4\[ѷ+o _qDO{Yr'tEȖ |Y:M<6}_Ê&SCɇ`Ju'S@Q-N(np!5Bw3 Kw R&֋ٗvi/Ec0޷C/,|o>#aL1!Z6M7țg޽Wv)xg]"|%g|:0ˡ$al^>T\4FE:[)VΈc(F{()M_簛dMegj !>՜H>%,f~I5% C[4C\z h?7 Ƣ1Qէ; nHYԃٵxndr gɬJwOQ轘S .'q6ae2e.[4'tè*OY>͚`Bhf5nD_ YRE11/1LMR5‚/AHC0dd}-~`}GWF!jDqG6mR"@ XdDI.d t[&/񭰳a@٫ݣ@æ#yqԵ&b9cAv.&uRqВ ⋧%i^dye^_0,b9<2׼Zy-Ќۙ?}S!![M͡ M%7f1/9IY<خFO=RZr| iQgVD fT9AS,F/ď.'o=pշS^x (u&i4?0x(Ұb|S5Hu;VZp XV ?ET}8[F D+&SAKnV +0E)G\yDS=N(eX",zm֕?rG]]wi:J|,͎a*M-l=W:!U2X \DT2_ha}Me%bS|v#)T[uR| [{ˍˠ@~0AO xaI ݦ{ꌤO @2ϐDZ]hϜYdS\dF2eYkՈdv:li1dìe)T bsu%H匀7CE't ڵt'SS9 LZz QB͕z+QgN'n^TxE/A1Ms: VdT P8O/xC={nB3OX"(BœR9)f}(STi i|-QNa|Qg)K>Hハ&ɦ9h2` ŭ85>r c E%B,oJ!ŹPq:E_%9٦zd51fuK₨8x˧H5g:l`Ɏ٫>1I2!2p1ΌT,ۡj}2+ JS!@'JȪG5e iRDM?N>2M8S'IhjӼxd,GU+^ [%@u~vAn˟C:pp{a{*Qo0cX4M?!< G%F~]Og~"cX%n-agzdza370Ͽ+ }-e${WaұQ*b&~AHFѻKR\vF _R~w7^ 7v?ikVL):\iy C??R^첛J  G {BM>& hjQY礼3V 6|&|%e1fm~(6fᗖi{wj1ɆX(BS'ehOBQtLVǨhbi*hӰRU%eL-Bȴ]r`1ɫqbL{&IѻVʱLE-V%5+sHE*@,ɻ,̥p%/q#{ATʍn eC4D-5? zy"86@hjut{ΚDUk&BNFdތ'l1{kBdg ʭ6ՃT9z7~o/}b[ fs[kS1ǎONvf}4Y*IZg-M>[z&0}mN'?fLwwAzur2jv" 0rFkhѮPK G.4`]\Ytr?T|r.x{bD`8 o% \h׶Ԥ1sYED / v(] %'Z:#/Re7},.uvKQVdެ΍Ձ ա451! BHteǞ2 8YޝX~Ζk&^^[g:7zjVR8 `*'DV\F 9;ĞVkӚGJBN6&0/DFLSb!!2BOՋ$oE1ۿӆimpj%hQ Yp⸜&U4ɽ1}] =BU#1Z1JAlJ42 r[ ʆw<4l3f2sιzc T$ "rcEo68b!:K$W nREzm!#GƞLjALuضPO᥀>x^wgΜqC{$|2?[8j2U.&vޗ\ Ffa6K*GjŷHCpsռcqPPnA* JyH;A)Pm}godh"ki*>lpB ΤDeCkI4 [ :+6؜;%m&R~_b_E avX%]WNJiŅ[jA8͂PfÞh#S]ԖjEfc> 0@g;2;{`.[(cFefJ,rf0R"%anM"#%mTb^_ƌI2@zVP_jT'ŌJum#2HeAm9DDC}6}(2iɄ9 N&yQh@2 RdWIۡt&X m#5T-ӋHxm2 vOypiʁ,S?_k ȠlcӡI6Đj 9gZwg1iW:V4yr p0ΥmFb:5-(`⑑5 ytNsqI̤RMӦ́$rO'nt٘yAIsFk&l4,='{py\ruKx*A}+l,trx֣^sxBz:hͰѲJ4)}` dy'V|Um Qjҽ A;QCrz`MmtCTLU#,ugpn?'[m}Фtӗ@s[KbY\+Rtxhng5%>roJ&h=Ps <DLu!'ڻ8||22@t++ km Oo5]ZaBLF1_ϲZ;S7Dsn#?K0.BC=k$g!sIRh0U̪6mlϾ1蚋7o8z$iy[Ԯk~'}~9=ng49POܖCJn?7;+rֵK3 i +0seM}z+^Q#q ˆAYfWi;cxGyg|t=~RI=i,ʸ-u J^JB;_/C iA:!v}eN㲳܋3B!'reGpȴ/Տ;B]IH"cA}ES344@?j·ʁ4N;)0M(WnpXrKev=|BJBǔUs3}/] طqXrkrA2&P:^܈w3$BVrbi) WXcIvhGcU)*0 +VL &G_4*]R9dgnC¸*"m2?^Q7.W<۲J FRT>9Ak&;L0\HP@S *r>*k4IQ E[}sqYҭ!Z $HB! zևҔ >Rf<|NMNWmj|O.C8UW~9E,9=[%14=Go"r/hB(㭴<|K"IμBww%qw*V;J) ݳbϚb\IJ/fІ$P .@#Y1.JfU,=asMxX0965P܏F>ti#l\R}YY|gP"F0bsqB,C/L[E"͍bQq(.CjZ/xRw0YG݆܅.KQhOXR|W3R(ītXp%)kTTGL")Y0$dy0P8 E+'r+ ?=8'v6cMg_/6[ m8 ~D [wUhi&Ս) -3xϭN5`aB8̔cGpkmfHj>= 1P`."tHBzz)K%Bo mW!r(4cjk|< צ^NҺ"as;P5`%yvgtՉaX ޑ9ߡBgYDԐڱ URWSc5kkɎi*O wspd)Οa`Jq;Sj>(8xUM Ylt}Yϝވ+7G3%_7CzRA9rhYU-"}T_ ]B1~Z^S7t eS=K\ H`ayoΦylSFBm*INVWM{o$8d>04:.@ VQ,ex%WꉤCI+W+t.3굴z'\ ISU. \ʯ<3d? d=qc7c;ҟ$sWlpw["H^eF"wKPxI,2N8zy3[ V@%!ҪK_xCAr}DN7&v1Ǖdķgw d1}`+x|;I5dDR3L+s~g{8#;Akr P?AAGaT,JFU&Lx°hhP\@TqMhHM#v B~d 87D غͱG=D9!H 싁lC2Bהp]eGv{h}v;8`>R< RHU *# aL't-9.y7AE0ڦXj")ر)~ܴBIqĂy*LYi4n5>sɊ* Nبv- 5SW~-jq m'>6k-N>پ]4l8F#ѤZj"k/}=,ێ*\N?90N Mz/҉#3$ȔDDViմm7%<]_KJC !_Rk$9T Ľ-yИu.W:sZ҈v2:N?7b#L 2Kqa27 -HeEH%a~Ԥ[b}dWEnUPUh1u/sH__}"Y՚8GȲ<ϫ@K \kW-FX+zӜT@d_蛯&>g5`uʱhoC! }֟j9ֈͩ0gt r:QjWmF+v3kڏ6! ~2tx/Lp{H(ط}X6DRBitE.3p*"[Gq;'b0F}3;Q ŽW@q P@+ hEpf6qM껑-$6$9;|WS¦D[銜T= }R3Z꧂3~k.^V*5QQ Xq'w]en.&XغXkԧ^˟Pe'OWxw3'u몴 P$Lr''s6Ev,DnL)Nn~=M;"ɾ >GNO'rxhKfToni$s͉* ܒhM!ܢ/^P]3A2jy `g۪+SBu_8%$c>k #&W=ĩMa00rϏW՗L8+KSP83;}EMǽEv E[Yo]NQ_GAo_9%ꆚ]'t}Yoa JRF(&`{[&cd_qu:?+xctԪ2~0+a"5:7K|LMHyn 2(HN\a-qeQv%YCH*Bi",!:}13S06@:0"aK̨ @hy|'|Jph}.f]n% 8KJѷc:a]kb~ O^3!uruЬ3;YM;Oy8M{4_vqز6jA~s:Tp!hѵ󅭏)syR:lcHDn(y_K N;{Ul]6^}h>= .M gdT+.dq?{z E}hnZ#1I[cBKlpkʔ~.WKB,gⴺh~6F$dC"<N+ {U1oStU(~zߜ)f瘘39Yh/OxlCyisl]bp< ne71 s" ċ/91I?IDO 'ysX<,͒$Afޱ9Wd`=+etL܀5 ~Ph#3fyDbR4RӢ6E>Ch D qDZkYl٫C E;OG LbL{1sSRMg'`֪zݔx[ާA:̩4p*UriK+nF{@țYzg h1Xߧo7GUˌP#/X Y%"OMi%XqnԖ[5Ra4eSCVo d d"rvN}&.<π.qcsJ7\/ i9VHU$Jp## &i$J ;~'b-b4fH5 *39sM#~nDX}W2єZ!8uthVXTOiO8Pt=ENBw0V@P5>F]eB%T ʮ-~6yޒ NK#!ec*HWrlCh 4Ee!jsb-S%ߋ)1?~xȗ<=.("aj"@xxzvn,YoVm;x^K%3 T a!ZW:Vp2=Emtm _Yԋ2W` y w#Hx,+av%t?=0ib= R4T&$4`1PlKN1~TJߙ6nzq2 8-yZ 7LKe_j.&Q7XPc AY6R͆~VLyݕ}/js:y^eGJ qn%EZy~VHp<΂~m. ќ5 "d_Haj2׷qW#k$yK;ps_OdeQ3`)ۇk;Lb<Ο] !1+&Z:zIB2m~!Mٻ0 ; @y`o4abE]q˰NH3U0PA+jx>t)bqinZ|sX;pWΎ^ڱ O''=!ڴ.ܕVx闛FRٜή'"8 ^XîIs-Z Or.7mP[[pXs+-570W {@Ŝ!6\H 4 qk'GьPF˜> wb=X@ps[_O_!(Zi _C{7ih8zۧU҈ )«\+v>Nv\i2 eRUS,wMH|~XZcxujdZp̨`jA ST<\3[qςζd/V=G.R餯Ǝ?pSvHcrzMdDyRh%xKA<+|3eD@l+٤1Db#Õ21' ,:=,='v)Fv96vNRLc&-_j:<9Q>q,'D#BHLTv" (Nj>$@Pt<*@ENN]ˍP%c|xBFBY}!xo0\P,,|  VW?{j2 а/X{K3S!%Ρq̮6:s]&!s=ʼ+,i\;’1Ms%YVA j҇7M;]sWy_0xO*9oL+ 5[3j|'o5^6X# m{ iRG *N 6j+G)}E`h|AAv RG~6:[!3ƑaV-&09!ELQ9__.>yr<&7oDqr*:2Zf<#Ƞ(@絭w&Cy Ŀ+D~nmv { flNNP)"_V _yŭ R0*2քT6٪ dNPᲹޡ`.g/пZtIuKU0*ņ>e9zKE-`ݒm-W6";0hh`nr4Z]UQ!ěJQTh͹gHpi,^ ?COtU_q{BuHL,ez<&Vے҇U޷&3A!;h-Z7#: XJv E`\V*9~6? [g)\ugu5vķ\"K RY=iIMh8'*{A\hӷZ*ʓHI?i]=,2jzcYK~7{[w2է@v!{+]V ~gՈ9ZlUU'g Ϳɽ)[""}h6QVZꉽ3V ^#'s`2s#{Ɖ"ӁA\XyQQ([oQy7"”k󟜌bn$FF CXo2(j9\n Ⱦ/W>.JXS0)iaqi|H/W,e_mEy㜲mZ3Vѱӎ1%}F]u(׏ I;\IكPs訢JU+CCd;|0{䗠nq6 0 ;U*t x"X1}]xIԪNxMupL Ҽc&"^U]^/ ǨޘK'f!q_uQ!tdƇYh4+)m !֭]9b5.P]J Y ߀;\RSCčp "W;SܪT.iJD=T]edץ'0.{pM{qRLWz(h'N;M_/=!ՙ~_ҡVq@rZ1if3a{l]`'pl_@r1~0ܗbC>o&RxC Ҟ?TR4Du*\\z-/Ą/D)>]f+{cyٻ n8I'J['l o="x"y:{ r+R]}a^|vOe8})]Z0Ɩ=ʀ_,1d*ͦJ[Js%2޼3綏pbQQ M0ka}5sLxPy K_-Yy;j#^S0Yof̫ozy[e J|)Թv( X3iCv;ם ]VhhT"TK 0_sܜDj[0vBluIt|ѯ/ GB2]fKN&DulD)&l"pJ%b/' e8>r_+hY[z"8g `6˓Vߡ˄?|r_{#ܘ9KI\0'GXID=iԼ|&ĨKf, \ 1 0I;@V(`6pl^| s5R0HUj0j^7prȸ=R$bFsZJb!U]EXvrK&Eodt,s A8V]Qܨa' \fɆɾřSؤ?^\$ !:-ֈGW63V5 7;cg5 FXmf0DeWO,T|dL4cG7O@ngJ.BA H?'Q T ,h\&S[>ǕWYfvVr!T1jhAj4E-> )p>_b6sHO*d\t4xf\7pȽLn{3"'mq}䓏敭ٶg֜} h!uCQ s({\?SI"4~ Y.NF}7iuv8}NVAT($ g*$J.&'Eo- OeQ(s(@EhG!Ji4-E#\(]3ˮO1H66ccLj'Yn-N[|@t+zwþ*}W[r56/+8V6uCm/gN%:wQ@hEͱIAp.mV9~ԟl# 61z%9ث#Ղ!h;Dx FW3=, +ZŒs@&wOBt`V3*!?uD(_I47:YbOD!wz0)O- $GJ41kq,}C 1gx>bƠY3Sߕ0)aZ-7I &1 , Ǘj6QI6caGG߆[9-ZE)<=H@gjD!]{hPX^!<7ahZ!S냽;[=o{8as> ],J_2x/,̲A]p6Q]0x7ԛ[|>}%'TiL20diMeyM{Nt'ҹkg%pG/\`z0KzKV ̓:{0dع @LupQ2įujc$˼g!2ZOug6A!`v <|q&3B `шn| 1SY\ J#&%CHepHO`0q"iSaڼ 4Epp7rw8+]k/H M½p@Vs«anh.XH2/6!B)6BҾŇNn*/8#`VzUS4TAE5q󼺸"KAON HJLz<J[>i7}\^k@/Sp^5z?2;ak5[z$EE0W}2UX.K%n9Zx)(_O_ĻHTljZ+4 $tq^rL^NzNm2`O0oގ/: ͩ].U sl܎rZf,g낔/ANLDPr-&w;\'2gE.vVsh<"a)JU|9:be#.74nKU܆âͥ7h Y*q@Z#SJza){ؗI azs3:¸rtv&hhN:ZG>pA_ >FnwIORUzq8^bbtgca@Qnc!직kF{Nqc.D3De@WR?;:NhƵ5W.h|DAoO+GOFn7[WӼ\3pZuzeK}G6|2o(dIC,Zu?*̯yFOfo#nզ|T3!&\tM( g++9UKz \V©یAۓٮUI?ae"6H-U%r] RxV;XRVu[cW#(P SfedU:5Ar9[=QΕԩҫG˩\Q (<\Ļwz*$3OR(l<)i\!5y/.Mkt.b+/k~T8!&5v4,R'p;AB.ɀR,;?t /E+o,JKΧւN=IDW)c+a#5Ò$d2gh?N>BphS^' (]u8%TFk>p*P1bnF}|o3kN C|$nWKUa_6cZͿMp`rzOYaW~2[((o'tt+e U[Ye rΛM4N?9 Z3{B" Z\2|cDMs<ҡr{l4.913Rq:Xe "@X?zxԛ 9WJ+M~CC$\7gCdAZqnL[JO`춵=qK RlAs=lӦ@+^7|;$ g&VuMۧbƾ+(wΠN۟+!)Pd1WiFh_3p^&}lV*s:Y~fcXpF6E IY ?QD3th}ޫφPK6[d o~VzqLȾg.go1xj\TȆ2Q4?Bu,_l =E žS㫕 ",$6BoҔ yUWЈѝ.78jiHLj,y:QOP2)PYoij6?B5:GH5,uzXt$B$޳:F/>z^k3[0[L4&D$ǻ# W`%/gka't== !}RH1l P"EmGLxW/=Ip=Z<"H+>nrHhT@J'p)W7i"3Ki缺IP;(?\tQФ1v@R0A~.&$u 1Α{UtS"w7\aL\#q7Eys8$xEju6Dp/"!=z?K񔵀ͰNjC:Z~uNf{xlMGJ}O8HƱKg&U}rr*=԰q;4x `jbJ^fWz긕)܁-y[>sj~TmHIˉ =5+i5F,0hЖ3?}e??2^  m*+uvE16wl,~6ޗ5fda)ma01! b.~LI440RiOA=]}_ vtƙMj IƸgj9F젨@Tz$AgY{^{ox⠆J2|8V 8Ecف,.R'x$M6HYbkZvq6MI=j1 ((^jУ@)T 3x$Gr#46u\Ċ!2&EU'P}uDٮҪL(jtgyhA (=uA&mvjʉRUG[S̰ӰoC؍ `_ l׼OD xMPtUUK~7ۮ 0 Fqj]N٥yƒ,\;1Kz9>b XfKS^`4%[Oo:"7^yi+MZ>Z>- haRɞ\ql&V؅T.7Z#&rmwcNLs"R'lz[CT2cb/5 awa[:z5F)Ax!^OCJl* U3RX'F',: 1^E1ѴW: `mq_;F، A. D;8=>:uR3t*_0:c;7^ q\mQVƐi9tY2'@FjVS" l$+tʽbMЉvM楛M#6Fmy{D0@H  VH;= b&X?U FZU#:w[+엝g蛡d\"16cƞ\kԏ{TKgqi}cJ~^A3.E!@Xj3Z**l;oXhe#6[!Tg_<ꫛx2D@G216]w jI: g.^YE彊ŚiH(-&_N,Eg_ď\9ؓء VC=կ 8S'EE#lTłNۚq`)홐G9 L , LWHJqkbݲ5w3\Hԗ*gd|K}iۻVF %M$0j8KAg`;JH[omb;f&˜gSt~EѤROn!BoNܗ|\7'Fܚp=-|] #6?>fPԕV1|!YOF=3jCLTŽ Q4 :|Rc2ᕶ# u@J|[k&X[;^ :s2b%2 /VvE se^P:צ:9˖Y{3xCOg:zqFÐbq#]"`qA=L,cyl6UjL@9=m7[M}paeLVR1ݤvE)N#nq)HM.u/ ;% J#JW&EBc}(:zf cu脃c-={c;qgvy:%,%fb+hcf|rJ!úTbƧ]r$tv1K2[]}ï3MtouJ@4^Nz˳[3q9y<0>#؅ S `3?fpY(>GyOSԕ:.){q) &a GO~JA^`?WGͥf j, 01'w=FI"x~trH`w87q!u:Gvg2$OneSox K*?儝oف\WYjpbJ~ ,_d xUPEY >{܎ziFbi`zy,CAQ?yM/w:ԗ.[9{E?m!"OW?,%1zTGS.I@No});.] v#"]ݥmA12q(hJ;c$F]bu2xʊ=+6K.px?x 5(PK 8i"H<^PK9=FU:/=Mm>br d<*D7 aq6V:p_ z(Ni+<URBA޵&6xR`.*BD:u˵ĬfJ2o'hIFKՀ,R.sQi^p@S\MFZ6-f8ْٔe'o 6+U 0N,رaHYM9ܮk#ai.WMWğDB#'*70?=yCĖT8,僊g يBEܜz41NU1JM2 HɱFjrcsV!Vab/ܰP d,N_md0bTDd=Bv($ Q$gaL!,(I\$ul90MRaȪnoV F/,'3 YLxֿ|Ȥ"-9$[ ;{3p  сU>}Lma8g{|89x!@X=kXoZZ6[LՄdWo+ai ]3ԄSxjdg$s|+aGeN%˶hoXȍ_1mhGY\.`P{d$ "zHT;klNo,Nk Q~T7-n&V<vTl@3miB (ҳr,k6{ɇ}|+vi0l_UW:U'.,aJ}k`}K;3TP"@UZP_j=v kj t!2S Dmә,o̺1$~Fs=֣laMײlo7۞y>Fy:ғ<wXNbkʇ<\AC|XEMp񔶑뾆?}̪^N7 |^ghhxGgiqf*-r#b0(W#uO/^jב|١TP?-fɌ#n6Ɏٌ$`d/|{2xpt:7DQςt$TE͵!`/kY?xltЍZPIc"2~Цt^h#&m*c_(9dFmۜgc_Q^ʏi(c}H͗d}o/hgIg\T e(ㄅ\+rmE|k%PJ!g!=Lstmw5)FbɾwX]4e+?`C4 D޿'g,K23-CAiIį SKuK8c7󶵾̙Cyw<`{*ojrQFkVs6rVqr^Sڢ%"$B {eC7RL4MOtǷ'9xwSԕL3VE0KrZVqT%7γPr/-gan'Je!r4[ynB11d |2p|~S$,S*WsdӬ"iG[uzL4q@zYb;ijC@<:WɲG5M*Ke9Tn26a%Ko$NiG u6UG/s(S&}`Ww/z´L@~Jz3McSsbQU8 QOfLqM]:+@꼷R`юA*_d!R [˪jA_5>1 2o#Z8=nKDeB :z*aHe q Ƚ1"1%5rEUۖX6 +3۶;LgJm7vZgZ J#<@f-ޯnBkVYE"&.NckXEI~fwG\@OC񼭯Ro:مÞWpts""s2fQKyYNfxI;c;b)Ր Jzs2Ur 4vMHrY$ 0y=GUj?[؊):8-qM`]b $KFkWSҀH$7,1d٪W!{4A W=DfUc_Q+߈A':mnE'9mZױ"0U}f]EC_M}'zɋۄ?etGW{}$V٪ߓzGd>dhCu*ݓCgK.c'%2Gf'":ܴtgH(ab43? VxƸЌ!ߋ@vkWڑ-}v_gnd s0oebemS=?iE@lz9-!4xAo ٰ"e{|pxپ˴|,?iM,|u/LAiO95(!ql[Ͱ'q=gCBSj>jƱ͒=aƑՀ(Jw׶.lҠݧO 'Rq:\[{j+{Sqߠ9[cӭb=\op}טn5ylI9\u &\@RȠ}Mj80`D6@vJs'PCwHܣ kRLGIj{@$@֫F(ypsm;)5zq~uLY 蔼{(:RV6tŏyоJg%VUUS jQ)hGH^yuƯquW1 ()27G'ə!{|4OpÏ@Ƥ \:y-6k { GdπD|ET+ 'v"c<d/A0T?(n|[/ݳ+䔧3֏߂+؅eNTM}=7l ݊]SRNk&{:Yfqw5?jpv/{\ +52(5s)G1ZE#c|Ta"8[.| %:3ԫ_>I* }a2@@aSHht!^zm0?>_Xy-U ?34ւnhOC]az~NseXXqi{2d2M GI)̖dwY$94v8[3>hD' &}'`4r{ZGxʵ9. &`|P*`aѼTBekbČ5uƵ+4Wʋ=@.]踏muܾP,_ |;C;%4S`<<3ՍJHq+yrЁOdm4oAEuϹJʴax'nYq} b3NMW (%候e䢘l}CV? $;N:Q'#r(a%Po \}oW(iG.[o8A{B͂NㄍJ qjpל1FssKSA,N!߳?%\H,f"[C_MW{ Cyo5̍j@oyomi+$ ^I:mq;%':tP黄RQ5-.#T0Q) MNvՌ[MjcO[+ޖ/ ƵI݃kNJm=)t^雩5D1N@8Zt{.JĮHtCcG)-'DZpšd}VRn<#9dBRnU ~ ޲QTM1y@lJ=#ױ`!^xwӂѢU{ 2OsϏ*Mz; aK  *uӃAo+Hp=Fw5,[|8K@Cpy&.S Ơ/% qjۤ9#4g -!J)w|{x ݩŒm~as6z=O݆S)EiΓLJMI?-}IrAzRn;i4wӞlxXN}1})С{ړA̫$95B4g4mz7hGF.">Eڃ!QFmك`7P&܅lzfޘL˶'-Yzz8a8-*s:Q̍Z/lfY'{ ;~yin_8Ie}Fz3~o/@ý`6DjlPʩy;46{"-\)oi_+y )udV|lRbCғ^귔٢ȻZyp~7>?`!xS9Kv|5sÞ|Tlmzrz/SW{4ؓV8>gՕd7"D0GMxz"Edڄ{:#QNxZQclW7/4^HLTay xeic!Z}JsUzz :Aś:^Ew:G-q9bAQDQwbM_'2wf\ _@ V}e4GpM}谧s" l-yi{#A\.U˄nN?ͱ)gCDm$w"L(P H`@AoaZcdʫy#VD[)&1ڜ3AraOhp1ΘwQa~zkjI 1xz~|. _.g?sлvr:5J+MJ2μ^:46e՛k;p,D&,D7L4qXe%>cI&C5@8=7cB}^ݎ'~t3 ьGW!%ypCo0/6zHX+jG:,LPnRC~(F< =1Æ5.' ,ORQy=A9`Wmgۑ(v [B>"=m+ΝCm -5+qH)OB^̔2i7V+5tD˞;:mKLѬFQKfYdOk_T=fPF2/v!OyPsg< PR\T;[d NCV`_CO5l3dYupA A>!A,~ !}|v?EH ߿ 4kP?v|ҡVs,ނh'{Gjz:ە'^ܝVP#Do(hC:OfE(P߹ ߨ\cz)GVU{2T`!>C2ka63$ iow=Ob>ǃ2=/ҳ'"p4[TH/(ѩFɘ8 ӬdR:5[ײݷ~WE߶vbQP8 $(_Cn⟶>z>Д]>04΂pb'CJr v]n69=9T`5w~X]&<]ܭrCڨဋS^sjoXJu2/=F!B^\``;wD"dRk'ܘ*oz(.Yb=mz1ؕ .JfzNLRA>zd,*&'Ct@לPz~$Z%f~&BĩQR*d[ľуa`a V/p^ pARe`|Ǣfrj @UMUޱ)2"'cI_ 6-𘃩d'p*+A]l𲚌Hq h*¢ 5d(ev]*hhko=JV;.X{`gsC !-8(63' ;j3RCow5T}ʼt)?XMXfiRSaFC4mW|ySo D0??]kfwa$ПWiѰfasڂļᰈY^U P5 ?~gмwk`qь70*t2@yWDcƈK=dfҏZ8? Twy^3f){w!J2rZzVHbSe 1PI2VGӫ?%8oa,4a9 p1E(qZl+ՅeQ/G!S&-uo\eȡFwЍa9D<Z6EYj4 |vv^ ֥2"P9 N[^O3ݢ[HZ/nCm}H\U ,mH]ƫmX]٪ز>#:ޜ {T"͎?-^Q6~,n+>M6$:%~o*U.E*Ra`t+U$k#(p!DGBׄ+D^6(6vjPj&F+˜[TDO5ƃ] )>Ā|q"L O6"F_d_e4xƶDZh7%sR^=p^8MRV7rHkb2np19c <ªJWKeL)EX9n(mjƵ|7iO* vrRCM=IZ4?c>o. =6rOgD&snYST$G{ZӮ? Gy$ LohϖzO=JLJ+mq\ұ(ԱO ^ED3Xл0Ѹ@av$pk ψbЉ?it;k+S\@lȾWxjGAmecB~8 ÌK'Cm\}_xZ}5rnfP"U]A2Or|K1r v޼u _B ]$X/J4.f癟O> 69笶-];^Gc8m/9f YeA ]CI800b3W.8M<-N*..Slr]uĨ#sdmeeyxH^cI]m]9gmlo-n͎a0*Ki|0s!KW)k\wgsu3i X+'ţG0SJtUE9* ll}3-`.&iX! ~ Weo70|k|W ǞU02VN6\f%t:Q_x*E le_b@wpr v1UE T$@$=qS@@.JI2v*k8D>|9HLI我M [`JjlNx_YmI>ؐo/g<#ڙݗnCMxn}h!l?pip}e&,4>ޫJxEΥl1n#ψp]*Y}¤;ECdwc/ \zLoLBZ )1=W&|f?nKfC~doaD'Q*<^)# u -e YmiOė.kL-O@ R)^YVS$jn'=dwb(jlT(،.Ep< y)}YZieH|qB+c,2P1m0S-fLz^G5v[v] $+dZC3dd$2 k?ӊI KŬ"*ռ2oT|~\c7~W%74-!@SisZ!棍= /˽8SgE嗟$ю;&㋕p/彫z8[h#}sCc| Ɛ9f\)۫ i'_7-承dqK $$/W b# -.xj}E ((O-7dr8Mg/;U89?y1AmKm-CTG4ՠ%'sy@]N\?; 1Gavz 2wd/TE;BmJu1a ̤ z$6|3*0MjW*vyMZqhYTn"Ԗ»ChoϺ[8CFFxC9kpOD|pifĺ>9Z-=nݫ7T+yp#2̤+z-@/5:Ce{,זlQHP`u(;acΌQ nFP g s7PP#⎱d88ԋzo{:ݥ%V> + j yhVu[_\)yv.Q+ׇZ\ I띸_:+u-RȺ>w`pk9lu #1 tڣZm"bAW9#qV_?<AQE5{c`P*àΘ(OG`df#ÁWȊO[x_axLlP24@ɻKMWEbB,}+ ufO}KsMcO%pcv]Gu(_xdݚ5{rL.+ WXXXn_}VWLrOFџE29CE;F4 7]LЦڌv̔S0lZz'=ցs}-}Т S?݂^ft>40lCon_wg-hQӕ*auҢ5xZ2k\OփpD\b$8Y5+"^x@^AmRl&%]wlK(U  |mP%^z bB,w)D[ؐPV.;T/ rz2zQsz`eG!+LX7׎y8PVXk7UZQa)Q=mw(%3_?l^ ,h6ib2W2Ss=&N& xb<8VHi7qfL{G78(OK-e5 pļ]+8ٟ'MPne1=/dt~,`i /dQ/ػCus0&:]<;.jXKOlEQ-$\fǞ}mHәN&XZ&'ܗ4 7$>g{]+MYx?ABXSaU'GT . 8cG CVӺf_w:x}m$IߖA\}yop'mxZ7Th՗m=]Y9SCM͏_fmI{ Hd^i>q櫛>` wnk>Ce![vY #CHc-cS^[Z,PȁƜR\Ha|&n[q9}"V eOd[}_>E'˪8Z້͸|M">{q{6K$(<7ؗRM}MӅEp=X 3ǰ&ryiٱϮ"pW*(l'iB-I՝hR$fuЭKe:1_I6/٬Sy~ݠ D)^ l7}$@9-h h:D?rlEȾt~%l)k~~(Q5'4:SgI暓 ;'kse6,ăZU)-5&oE=6#,`nad)4 S'\-˜sCONPSB>FG͛,^Kz) ~ ЧѷW>! HAX!OX45R.+Ψ;/ٜ^oٛ@ ǥx%I.HpJ5Bde *}stKJ m2Gwܦu^h['((%Ff/=9_ˁ /쭿3qq M~nOnԲqPp* Q'xϰD('0$>U@a#- Gqe%=,^cߕWzRiL!g;5P=P!#F?0_< p>ׅ;'/X'y9$+c4O-ᅡgC@>[0O{jXB#6S6|,a=Ɖܽad#N)T7|b:Yظ$[-e72Ay슀Lu\!*@NuG.\Ǐ2%^C'^e墭no5r|KŌ|xǠJ ӺE~?Rh/ʒY#/zzSw8{ 0Pu&uDV"AD9Pt,Z駟c [vйJO Kv q8yo=,Ly%ڙ~6hGܚw`Uh ݳ|8ʓ#׀62be?<o7VMb 1)iIh=nUAw2!! W=UI=-J}_.q ;Ɓn-GPsF^4$g፵ǒ$EtxƵOשR-Z&E/7k6 "[ɍ>J"GOҽ#gocM䯙g Bcc*"Wee ~ D~ |jЅbˆ;Hȍu,7,k1eM3sa߇n劇?HNU}`ID e"k y+̞䈤 !6}K\Pk p#x< I޳UN'y$uZ3Xc"0ٷXӠiC"TCA^"VxGjmUtJ',<a1~)W;|] b{fá]C1A@+{mLZVN,y5g`@Nn6z s^b!z`ܯaMmOԇ(Ҁˡ7lmJ.txz2=)T)m3n "~Y1|FUW?PY|sە3޽gtke v!1sGcI-~Wg>s<ڇE.QݯGiku#m&^jg#5ZqEB=+L , (JъyIfT68mq u%"].10H&c3N 9SwdKzO\*lV4b=N r]5ts$N% 9/켵D!ݖr#`="`O"Àa} -13RʫW? y.b9G|riϮK v"_KK6"vtL+Riog5E_1'Pe#SSzmW?wLF5#f6BL ur\BI(MNG2pMb1wck=wY`;*I RS R1 3=.>a 3Oe[ؘ+:j ԫ-^oc:E)-01oSO#F C?ZԳ#PhAI*W,3Bۉ.*'nbӊ#ꛯ~&OmS ͑z5u&omSu:P>7bFFY Y|Ѻ}[xu*\oբ,Jkh %O1QNz{M<|T#I_n52=6U8[۝4\vG\'W!~}uYu eT˾c?h8(~WjSTvvfW}D2_^_٘gQ􏿱G }p?攧RHla'sկW؁@ߠdU-޵4)!2usr^ނS'6VVV+⤾ћnڧ R/{#=;3>t TV3H[љ($fyX ^~^S!Rco6ͧ $X3틀s1l3hzgtQdIwoEIQSe8p_b[bܮ&10C<@K[qs+ŸUK(:IHH;s/`fn "‹Q+Y1_Lwsޣa=50gBy'~)}urv6tS(@}Mi}CH99qdO4kUKF53WYls+$Qc;RM|PFE|EjZx؆y06d2^ Ds#wwcV&:0>1ZyvG~ ̬ǰٽ5 w,;r餾!VsqyP6]ad{~\mq"R/4 L8MRZG0д 3:$TitY0> ix3GAM4ag=FEKbQ,W+89u)Gp yՄpL?NE-DgͼSޜV&(ULB8&0qGzt':ZSqNE@Y(]wCc&t3 HW1F ]W_piEcIrEkOb#XyJ?(7Dr,H?XJ#FU3~=u'7 K}Yyp)MPHqRN75EByjy]j3[!xSo6?-Ƀ|dQp4fiwE>}(CdMSe.UUE;yx6gU]Tw"Ql8_Vr~YAAb:%laئ`+d7-V`eT<d%qxZ/(" πpz]cU(mb=*52y!_yǕ͓7 +$Sץ+0גun⛴ڛ鱙-g@@Xg.eo~1?{z6˭I GP"Йbr?12.uwyYhhv%d^>VeScR;nmv˨c%DE'd  =<M8>xnOu-fvcý1H?kKH }p[.%!6x% ;JC(Bߎ[۷p4;{^>"'FA {^Fg3Dq\8)g\3zۧ:Ƃe2'Mck(Ř/\I#:f;nv`& 9gUM[0yY1m%,uNI&r\nZ&$ ~#kj\vH %ʔv.q._RtGVj#aRGt{ 캔ROB_egt:P،_0X۸'{c]K,_:&ӭ7F%$#u8`:UwP: %Bы+*rrي}ʼn:᧸@`R*Rˊҡ'sU\lri|HSJ|y00Lm&^^ri $ok?A]i'LrGdDV}u;IZJc~'.db)˟$Bq{-.zLl\Xк鶿/+e7RO:#6$&PE{WhW}/0m;W}'͝,|uʟ~nU]F>$bBT7(3kzR&ԋڌKnHpBlγ}ʶ 7}~ߪsT-bߓd_Nn( QtX罭>r\`z"ڊm(wK r$L7g/A6H I %K&?t'H"6ZD856aGpH(i eZmR(|'&Ӕ3$#HƁ>zslI2pf͝g |wpu};8a f8Wmk!~foi| Ԇ+fxI->ʫx1>Иb]A_[(%μ1 L^$倻Sna iaƨp&.X( ]Mf^IOr >aj`^P j2$~XKUò# 3zF1}%vHX)<eβ;'9LeuNΪǍNO^ v(L!We'ㅢx#?Ȼ3K3 :Mu(_~1#7ʽb^K@.2#C_pDH\3 $XBX|M=Ҥ-} 7W<:YmOZksH<|CgeIK=»x~\!]]6ء4#4Z~o|K.y#P`.18v1ìV67:;#rk&vPu\ ٿ juV˶z@.ˀr9IUv^FBOe %_:Џ~Cwt)eR\So=2)(.ۊAr$7)r=0 OcZ$~Uhm(}07e)}E.,y*;PfV `^!ۂhuWZF=<)j:ĥw}5$/ܕ"sAYaJ{r%L4HGn׈jҏ2>8ZMÁ -7r8w1$YSȈ@IOf5l-M=A̡ nxEw]"1%/]LKV4j pdBgM [nIQ\})Z:Y93Ɩ"7΁QhZԩ:{Ngy?)DpNugQѠ-L=>"n- 7g)tX٥|C"XOT\ݹnyQNPp} Mx99~mPt%BUr˹$4&_ GpgI^EPrI5Wfg& eQbQV :Ǒ*TS m70WI hX[+ڿӟF f G]ɖ}?#h'xgr(y):s7p_e,ƒUrJsG#|\/8&3탶N4 "/!8ReL P-Ym#N8 #k <Ƭ T: =wB{5EPz2TJQY]lOhV[Hq &( cZ |'(۷q\O 6KYc kum`'K<ɗzr6b@:#)2c:=*b*0؞_U}(ի&2 jPwn%% z HҲ0wa, 7D>[##Le0FXc̀* 2Qv z*1G=UXӝ=4`$_f;NQ/9 _76(x;/sfGΥ0TFdf +{ ˎ\zXP 4z =XljS''%ۣh쵘/1tډfS&Ӳdx]ۍO&mh=UR-7&ЋVQXXalaT9sQ ԝdȰc _}yVޤSo! fUFр~kSϰ;HE*'>«?γ%ϸDۺH(/IT,>/ȣҬ14"bɛa f9 G~*juxy({ħ* kkC;ia6+ V ]CkZN7*+J/H~ǠoDrgXSׇw^@]ȱt 6B !Bkf7t! VI{ẉ#j6Ur.JQqLI@vU̐`#94#wFm_P Rna-iG6,e@D?zܨx]a| V5܍θ&&[,tP6dY%=k_7->cʌ!&M Ǚݬ" e eDIsǖBm;$3,\[|BAf9sL%h':(2# }-`Ŀ6X8C$H\{_]ȓ!%05|Gߠd'pj?A w7XleOsY;$p)P KB>Z>|bt> "n𦶋D1s#Zp86*M;madQnk.%" =h|yG$ OX{"Y1ѵf!*r1}`?x_FW{1sbrlsQ^5cj+l. .'w匰64JŤ M/L1"߸NB];VI/p_09h/v%,Fe/qͬg8RT` d $MJx{a|'janu+I>L( \3,=0xZ_EkA ؇E7&xNcrpw_yhǖWԞe/uInSXm5n& 錁8ԛrya{S;{ .v@)Br@JXU3,֎lȦ`@ Z0)?m?# ^+=C;X>]ĺDվ*V=&Q,0 j]vG! yyO4z71c^y6l&$I9C̯jʖuPcW2fmEc -Nm;j]SӼ?@^Bߤ.,BJ"4XP e5UTl}6x>i gx7d_D4hݏkU3lO%0/=hOY@ Ԓ4fK&NJPA`a,ajk՞ ;_i^ĻbKg Bb&$ `iCЄ+x m8"E56 piE#^R4TԈ6aSjfrC|=MXɆ`]̴&aO2C3~ѻDOMtS09 [=ΫP@ Ñ d5}2,Ó8 A BD֨b 9ПKm8O"XρkC0l$:ÒyĔ+Ү|A;s_jS#u [Q8r {M #ڷ[܏s̔8% 2Ӕ)|M`ٵ|1td183ZK`ҺGa$9\2Cnhn"H=5rBgOgn1f,$=`Ac43b$.E\5CBI2API،xև^d\|G,;5PV}ԯhrA??h< (#M 'hHěHJ@Aֻdk@f^pʿnPϡ'Dw!aL:_ |26h"pnp~*ʹ4.^M:;9ÌIk,Vѵm$(I%'bJ-QĽ f;rOt*#w&7մ`0;]s#a[~59I7FCBK嶁]E7 zZˏr(HN ۚJ{/ͦOS@NkP[Dt&p,F6Bw÷>5JW~Dpܻ~u2J1qKtpȕ1uv)xFU]1D=R 1 䕍kS&mP#<&.a91K{mr!;6z# xM-f^Q3eN#$3;2uU;Ws@i4 {n[G}4rN˰cEr[ !J =7> \Zz[ /$PI0AL}GdѶޛm*NSIl:7-ahR: w)SZek{Mz,DrT=tCa'7*]pv;upPrHpqMcak.m>Ɠo倛96@E 01bbdEf_8r i.55iо6%Nwj!,h\&Rw7|SS2+MR]=LjjՐԛP NQ{M 3@Օ쫭i ڷmg$tvŤ]nц9fKa4[I 1.nEmDQN{@R fO_Qy3>ks6ZgI׭  Ug*A*9QLem}A0KH6RgjUdn2(e:HB1f!GQjD`/Rv!qIm.\b[[[ۡ~0"'5 o6b16a\lk4,Jn#dՍ[$SNg {qe>qZv!z({_s@7P[CϔU%hُR,oCfidQa[fƚAJì7lal6]tOt=yJ4Wi6 !=~Oc\m{ʸYNywV(Yw*^h CF)'a~]f"753w.n]TY ILZ lx닁yeW#. -ag"#c !G QQ41\DsM >6;@Z5 ,fG5(q ըZ(.eaa_NfsɚAHʣ!̉slM)?pf,. o(q {(Czʓ*˂rQ.J/zΠPmÖ) H&oG*f^?C%㓄 T{wkXfšYZ4e@Xzr}_%/O,y? :AUQfehN^1St{yTr \NJM&N!Ŭy_(wcgH>}S(l mAD<@h3"<0*_*(>k4ٷlpކ$nX@v{LiSEO':2n`bk {T3OwEJ}g^<8w>s7{4|{Nq@kc,ۛy&D˜A jG L7ۜ`}oDڹUH?Uô,>BgcX"nCF`ܐ59~‰MBՏ ̡JzO!n=C[Ȉ!BbCh5=@z(|_t\pe%qb-1Ӌ]FMNѡm8VX 4ۮ|.vSOǤi"wfFJZ־B,|in{5濩'NJ3 6(XnJ\LO:ՙ'%kmƓnCŰ Ep G@ 5 )ʭ$SEUaqq73,B>:ro]by-Dd(:~){M"%0X^V-gKPIPR轍 :hKLTx@SH|UEu'nP?yC\&oTSK ̠|yPA&O58.#,"B@2!®{XPڠyc~!gyLܖF^U x&'{tIpA?њS(ɇ1PøIɊ#ׂCsj'gaO5!"nx>&|Fp¨lBs^ߡDB17Z%F B:ngAtԙ6 l %as1C[ e:n.C9ES$nWq[A҆WgaMvV! 5Nz-ajCi a3̘/OK]NyfY*,w X<^1!ʳheڸZ'qvkޖUY^Hap#nMᇄWj"Cb QU<*q%3\*8@5 TGBb(&I/w8Q:D3{'h_W2 cwLLoiq؊*˝=cy?f̴7LJ3OjώPєN ul$_FmE5^5t#K4CJfs "A]TK1"CoG\Yjo(d=ׄPlE߂-n&1*b+ -295F1V 9 {TgQ(?KtQĬ@!; Rh1T %s>B_N'D/8v%8}JAC;hbq`w _7[V{ߏ{ZӖ~ˇj9ЉVJ< L[ށ2whSE V{ڗ;5;cl:1ٖl !E=Fv(`Hby֓0=bǷ^V_~X-t K7 #๹>]jb-j\ujϴ 6Qx&Vi2*q 1(ror# Rx9Ў*%y@;3nۈ;gܾ?Y)cFlx(]Q$Yї~4Z„7]n .ϢVBW#e\Ny$U(1 簑f6gpCѣhapʐt]P-1g|>&'C{.kz|˓t)@tnAAElN T *Ň( &kl<_*2HiEڰt}"E_VT}xm5n줕`2MʔCo"+oU'HoxԽ bʱY[_UqEK}>HYj+ŧ/rM!3 h"'+ }yxh >Dbo*GʊCS.8- `,Wg}ͳ&bsn0QL1ҍ!C(^f-B ,Bp)˂[|؊3mKQ t8UxoV[wP1shzMùʢ+8Ǟl9~w b;fhaZ1|;.oH/O(TM!vt[ԇi9(n$IK#k3wd=Yj[Rx.j2XECqXN%l?RVCI `j rW4L[,(b741$aZwR1L6SiFSH rEҎ͚jB˙YiVEցG^I^v>}(4e@`n7I,PKRk D,a ;l+MU``g?,w*{ @V=i%e>Շ7fy^HQ0qkqُCL1y3;譲_pԯׯrA,i1'bBNdi@Hv<. EcĖ\!ׯְ1#Pj2Ȫe= k9ЗI_tk@!3P-Y7G@zapUf~y6遉س쿸AoɁ̀56Ƹ2˺Y,s;D*>>SY D61bN 99Ew/u9YտĐ\w@{^r7 @^V oxt %8a=6m?=gd$lc#Y(j-Jի 0j~/hO~OX }>t*Y]c%z@T_.pt ' vvˤig  C,!~+GTNLbЛ%"|{XJG!$Q 8lj"dGAW^cLERxk޿;q[n$o}aDS&iàWpE6L_jOڵM0K0ې&Lx]֧&{ PAڤ8iNXdp9n֫Qta Zw`r@%Fkwe3rH2PEӋH!',Nٛm^EԌ/\@1~E5 *\"tiPtsνj6!Q uk9]xlAKH<-f}IJt̯Foܰ\3+mO42xxNnBsK(|ʯ;ăF[RO]<^mZ`*x[U$h$@Ҿ0}^ Njf^(~tSS0d9RqrdFShAKF5sR R}r l{&{54[f'IJm.k%l~H|Rg$k}k$W@-ThQ,1ʺא0 ќ1De6#[I1+M朓Z놲_+md/~&$^vJӉk lzj'.,w\V61wj6PbNf!Bs.xM*$|Wp"'f:HvT|YeҹK_q<ϵ!IKH7V3kr) ℮88b/,+&bccD3Xnף{]> tP9ƥdG}>BBv`c<킏Jk$v#WfSF.Uj t(T6WuHvką J#@rV K4kw8߉%Ӯ]tbP Ǘ^[ 3ΞӨ+|?j mO"!2XmWlx3CųTr:DvX[xҁX+հ3LSLoN kGзr#),rM!7:.>}+-5](3z"NNbiy)tYNT6[W3s K^lLLo?ԏhV~u)ˢ$79a:'hcr`LS;(D66^|z`϶ɟoTl 8nšɩqt%PBD{>JL婭wvzlv8hFo `Gf+yDd$Y\طifD _{m8 _wyE@ç`%v y hcŁ0Rb epWx5覡2}r}lTKj6/؆~__"0{73ibnRrX$UvI]~%V>(8-,Y]lFQt'W38ܺKgQo5'{PFo7VH'"C'm$Խ~MTZڷ`- ٦B70ׂʜ@ -w8T=Ph<(UӪkmmEʏďP1,4Dv]Wy~RGF}ՠc`P|u2x3jfk?Zx|́ L1l;VR>&v_&BAThI'PȖ?9*6qn>0\ڥn+wv*T`kš>~/>QN̬єSͧ*TEbCCՏ @#AhuOJp,;fm"ia燂zo[o5RKWzHii-!D:)Qg%QV9ywfISce@=k!?ZӀћ-5GԒ|Nǰ0TbuT"(~&#4:c양!eh*v`yhRrU %qsrmHb^",8Lx[bC (C3ԛi~!:Uw%oeK"^lKVj 93 0;D6g8p_M>4u^y4I +o[ohbfXoRysYiq?ei%͒.oJN94Fq+LB-&fj6G]a43 a'\!kz 7Kf}r~y<r/д,D:h1۽JDb3-tVF;5p i'_ BH 6肋 xI_Hy 8Vi|ΕtUĽ7`1a1ӎ=xeTexljңS3GK?¶ Hʘ)\AnwpG%jJ$f |q?L: :/Է%ڿ{\,"YD!mȜKFO?";nrhSb%wzfxnc^?lNEvU#XH0ω [Ά.*2b5l5ECNg?0N2b3`3 qf^UEy`1G8YFԭ}K鷾Ӱ/=_N>p5y !6~jkK/ jHpĢ#lkVYƁ{Ҭ__XT SYײJd5rh)ѵfxRS3:Oe27hhhcu %ZGFxgf츘̵@1P~BHH%|h!  &ޭ ZH&*,Bhb6H8Q' + 3&L&.-DML?`+  a;5@P:&I'ѿ+I.Ut{^w>} >۩9T|';P3CV{W?1N0b* Q[(iζprI8at+;DWtA&kG q ,*rY-ԢMnTǼx1Ru%LlNk2 v%_/C0uƃQDs`: ԾA2*/3lese ZC\vux B+VJ"t%kHr|Njcvyl#?}G#xN[x]L=>3pMt,q}8A\OkoG!L:8I3WCivS:ms-uCw0_pW o); -TVvo -H[ S i=/=A[c 0uq Fd"um`/0y3Zi<4^S` _2? BkQK!!mj>X%g.j9C F,nZ<:te)ǒrSt tI%x!]L-nL]T V=> .J0N^ Woִ_Z)@`6^$2m/M8ېztgM;/Br':X'E t ;Da4Qh#xYE$Wp! +Ga2s'35 R9/R]|,t}l5XzH~aJqspK*6êãgW9n XHp0(w,+b]w/r"Ê;e(d %E3g[%Tʤ4.[dQ&'gOQg:(ޠ#&CnrKwEy&X/"(a i->h0us(TwxV*jlBT5AӚ&u\>Ư.AeM rt%-WѸv; n?Lj)NO8nԹ6M">p5Qw?= !e,!浇kq A+lPx!wSB *`BňB*wkSzZ>ăO1a4X֕:f,2Ԙ\;!9~]3RYCP|Bz|QA*jǷ<~*hߞUin6$4[/d?̍bڝ㷞]fz::~^M4EsvGPLvIP.LE5X VheECmE4k2}gzyFPU>g+ -9Pr(} ~y^ɹ䚏.yp߄f|`l%A'>6:-/HPwvmɂ GbDd:F)P%8bdЋ{ ž#dgР1=\ یC_ Lp&g Kdx$M繨݀,3MdqfٯB6cXvJ{[ct|vNX$:ZN-K& C mg44{H9u 8|B@f HĔKg\a2F!&4q6v z7h)u\!eזֳP.rr>g%SɕfT3/[9}-HF9icHI%O'9&^Qi/~k"N'e{֨ OJ30 SSS rxb~kD;dN1Z4yZfbWB 'پ ,?U]>C'{6C:t<+"MImR6HkĐ6Il">̮) <љF#Qsa.qڞ?\biD%q]ԁF*eF4DEYT+-߱w ep]M6gBy|/TI;HӏGW$\lEBYoJbmws[M6>Xjj=cJ6:~e V'VVDqmpKP`w\>VtC";95Vt#eW` b}-!/$ֽv8U&Zg? 9N/'HlFmdh_xB25ioXd6t7]=kFf8pxymOȋNK9-SK "␀kE*!5i&XW 0xˌгyO۠qORH)bSx}DWI맢 ر[.5վzip<֏k"f `$׫.p~ݫ94Z_Ȁ"FCmn@'.c\ŕ 0:i-[:AT2 T(V&[]Ğ̹&8N"93V5DR`(qbQ<%JkBъ]9 r1zmGEXtxKO2iNئ.섙0vQZuH%9@4uxI"M Шd=Ⱥ"ɊXſ*!l#h2xg?tlfi]}؜{8 cb遈8LnuZ8"4d4 & yƞ |Li:k{KsQX]Y5S|MS q0eG.frÆښV/q>R+ PRs3 '\[b逝k!F9=e!KJʸ1 6| [>l8 IE\&ˎMԯ*3[vFNئid@z h%<Cr_9VR.ngH(YBdʹaNVN(;+)3 ER~DG2JrJߣ^:0 q.Y`f ]l/;Lh ^"oxRBWI p3VOn9 >0Q5<$*N_ynT{J/-@f\Q'WSU:FMT0Ow$_ u0w/dlfЎ)K><%ՉnZo RfѮVJj6 ڻL m {edTK`˕6ֵYb|iD|?PW92,H*T ܌4ZoD n0B.y \jWE QH`ZU&>\jRD;j|Lc @A냍8iBܪuPb-x7 75#ĒYUGhI~D/l(sglBJP툫0H3+Usŷ >FDXjVt&m,]W nJCaGܴYeUL 0g Q vh& Kb6ng $)>Xܡ$I;GR "$^ 9Egw5ZaE~bi2Ԗ\uP[%G(T$tJY\.x#FzWTDG~{wcbGÄj@vxCy!?w96p# XSRIiAE9Ng7#ѕ?XZ17+`C-D]ljt-[s Ƃ eE}[~*?&MXWJI{Y ma.J~?}[ LH/U񰯴E?//o&H3^9D0uwW'~QNLZ~8̤0`El#-V2/00>Ls>6+TGJufUTVpknh oR.s:JlAjq`~$M}0{.j}hUiW W6a591MT\n8es\ZF2W%#W Z /d@u| GTܣhs?2w`w p[/zwo#bf16xA sNI{}#y2DMqX5|30['n27H_2z#zF;͉NYۮ~Y.bdrCϡ(OǐB+yLъ'- b׼1V4x\NF M)|l;8Z69KpZN<چ3$`Vץx٤ڃW{"S:-@XB{(X}2Rg.\C13VfzA%[4)tvcQ4Dӷ=ˑv!*fvIV̩\5a@RkOEǽ| z1C&`a -}:Y t@zSSf(l[D< h !VADŽڊP_vaApzHtʶG).7 mI$PeUFu1e}* f7-8UTdgOFm{cgF Zh_ڇ+cIS:*6xLaʱh2P~N"~u}s`n*LT9"I =q33BDuJF|o/C_cDD{-YTnMkb[躲ĦwGaTz:zvQ j/0L{vi&@N1L b\^]r(uA.qb;kytJp6AJ3{"(1~+'S"+ CqEZV7sW~DWL6?P` ]l8!v #ptR{salTj~F3ayr7 tG۶hnw t} E~i?A)kIl5( I)?u;#Cj[LYjG{lKR2mn]yj&spe U[pV,o!]<+n)6Mgz@K8inwyNxhnF\]F4/3_.K]䯁>:Be᳾Etw$νPkJ/(x?;`J_}#0bJ"\_:D /;I)]i$&'ˎϻ%rӋƒ[cRGKnc9mca%%$WJ>Pcv-7:.ErG` f( VY9 fqTAE84 2^Ƹ w9ت5ٵ\Lq(Xv^2BH3A⺡4aIL@q]a|B20rq Lj4vi6,bZh㹙Rҿ6ٔ| /'w0]59ũ D&\FoM5_?˿@rO/<9#~5݃.4ߡlEɀ8EKG4QFPcHfx( +\) ݲH@Xe|jf{r=S^N˕)Pq (*(_wB -{|rʨēsZ 3^ ľޯnة{TD,u`umj9w^:[>a㯏HYѵ,gZmIUK|1$tc8uYPʄLTۇIRmq6 ->#SWa)6!վ!bgT ρ:tG+EH*:FzD; Uyf&10_E5-F'4}˚ _aT:Ơ'l@CeyIr> :ݐ_WcQ+f>*=o5<+ ٳ,G},PEffr>P H"i bs#>-`3wn_m/J p(?C 4܍V*1uH`q/қgUrW1;p)-#pi̹0r +Vܺo#(~^w1dP_ GFhGVgFgC2@*:%'36&~:̭M~=Q0‘јV_+ޙYj}&Ptm! s",a'DѰN`]cwsќ]MABԯy1N.֢X}M;Eρ:L _CuH O+ ġJ"zU.'ad>`k͜<@v-H@x js1ݺGA%t`E%ݤ8(4xf nijz4?7:j,A;:j@`!t?x&lp380^6 R lNg&|f(.hlp{Ш<~jJiA%%Қv #3d; gRU\✌ī9p3i,.⅛aq$.0=I[-GO GhIoQKW+& m#1buҘ!M/!+:,DM1Nw62 7HZ/4)U1K_$>֟\7x@YU%7սe<͟C T𹄡]v3@^^ BS| gV?xBqц??ͫ7=&4rDdZo3=uNs|/z\lAYۮ+^TCuJ!!7boR;]d("NgA;ekƳ_ˏ욳]]Lҷ#?'v_@Bl:Acl85K~NhDvDbr$"7+)fxt!w#K/|.ߥ3ӝ2TE@ fޮՈk?ʎ$ =e^yw}ث;t@>]u~."?"BvaƏQ ]}'y، ?wv4B{~Ev5[ln졙2//g;gX'?&fpbY5H:B`žÒ W* .iy9vv>61RNֻCÀ M3h]G: j)arDRO Z]R+"ckv !:4+c jp" &N~oFLH)hAT_?$b'4Ú>)~ -kC2w3ЛN=EsRKrFV/bu[^vi #k㗈U#kͪ{8m2;=AI]2 $^Z7bpa|)ϩH_Z,"95˨ Vҡ3`HB}q^x\fgs_~<T.}qI^w)'z3{Ύz/c>6QwɔL/fc$xu2-د6TknvY|6?ا0@rꖀSOsS͟px:uٲol7$ `VV :Fc!}@~ ipq]&qx @62`z.9Ռ dMxLsbY@HUH&G=q ^& w\,+jfΐSI*,[$hpWTtݦb b M^Gk?^! qPgb!H_S(" NMmWt iE ΜJf]x? _$Tn ˇ꬚aN~ϔrRtΗʆü$#<-Λ 'ؤ[%:i۟EZmYqHnIuohGnh՗rE)DzO}^"2 yۓZ3HP啹E2ڏpB57 -!;,'+DQ`U}1]1_#HYO+u \}y4_lYŢ u%PSC<ᅜ#8/Jk9 0bAQ]j_0dcN,40,Q$x=3VJ2*7Nx\f2 KXGtQ; %XB!wC%whY L u8 4|pTD!O@́»G915 '+3&CTIsfvMï-D@gOKX,1ivI-(\*疢 +mMu" ;UNq E[/21u@UrAQDpAy<BhPjuݴU$c ZukJA>|طD#KDP'uUx>VS@?6գWEKET,_#SUr2YTHV0+8>c4;M:L$ wɘi<&nH'aNȎ%v8;ýI2^* FI-Ӯ ‰vuq P펝p9`GJLMT,壜U^6D(瀄OLP[}OXv_D]lm@O Dq0{PcI CwiEwL M_2Y\BbhEII8`D˨]^ePB'La,NL2V :wGRbuzYLm;̜ÌGG("<zM}Z]HT pd*.9V5av}lHsv#qC2Pᤱ!RKꖀ[JCκlGs'Z;w<y5e@nآ~n/ Sth~t2tTdv2+:rjzf~sf1]{dz s* Mk9S BtP9@@ށOK5[ЩYQ6@gFX_{!S7deUlǪ-8"wG +;QêxKmQp^սގR| O%5C1y#Fi uӇQH\ӕC &?Lg5nCK͝^Agj@]Y]`u}d=cg4cp]f N0x?XM8b l1$W9(gj'[p' OhXQ"%l8Gizڣi_zdFo_;']{z!:Ԍ'|~HzM6rɳTP&mώ6G> h1TV:' j7z^37ލW.q bɚ̌Y‹fnMV<[4D](Z[{Ɗ]+z]7z;l9 EjYID˙=nn`wnbԪ}*ZdXh~әtW+,Ϫ,hw~K=t@VtTC5݊WG3й#Fâ7Ug0s*LX W6G/-^wɽcљ'vH'}g $00K6 S6IS+ߵ^+dN8 W%&C|;c;6Z__*1(oO73-v[pvd ia,j. 5Ј`%ĪgQZ3͋+]_^>gY+a9ydL!T_l؝W.ObتO .{hGE\LvPrQf[''< ~`V%lwˬ*U}RCNf⩾ =@_Z=i4glM ^CZ?&ޜ|2ɗ3^~Rt77XgnNn[o E^ˌ-B37%F`l{w#) 7tpSs`8*ޑZy>vףR::|w.q_EME6="\x 9Or)jݫR޶/m;zDt9Ȑ~nmЖe p|dP (~Aw!Kse7ēK䘿{9gtpoKSq')M:2!|]6`{ưaH 7X$^=LtJBRP C,, vƇbQ&3H/aeau R鮇wMY&٣D53ZMv+F(&_}K) < oC;7@N[8PФrC/<̟;Rbo!.hek&!׍⾥2 UÐ]bN:̫K+A>d6x_<^b%tu|NX9ޢ0~nVV=oZpܾBM 0K.}6 !2ؕB~ a ZL啈$lc[*PնkmM,pΏ^Ē9Zv oV+ْ}ZVZM.&}ҵhxhQE!syb==Re_2&U4WmD&62`k! {ؚVgi UH@j \;>E! bB=n+t6'$MwJi*,P{jl .ÞtZ!HC9QG.CҁS}$ѹQm*/H'DZz$l#HO"<Q}3{I}3O:A_ם?]8R=S9x;8+\“ヒHB~@ve,3k19f}k~㽟gv_|ZNyu-be)AlP] #SS,YQ' Ҥc I_.]Δ+,qadu"ACdV:nGWϰlKδO;tmR`ELf 1lG[Lp" & IIY (X~T~QIHp@Xb|ߓQ\Kb0PRc!g(Ww&_XI]`ٛG'[Pd=v۱"&"X6=GAdMfqZ__M (0^'ȶ2V 1b7ڃF',V d.YI,H~ 0t<\Vmj4KEJ&Fcgɦߨ|55@IݗLo O@4rש1|泮dklB0h_[ ^Q{#׽I8+*M_}|FzdBln*%g3}^0ԒE#Zꬊ8iUfd8@zy `ۋ5n?g#טA&9)]`:y֛WyLJf>_rUӟמ1YT sRZD\.25*Y*@r] ^<er+Mԑ8:If!. )߉BV` ぇ= &f /wy +2,ӹ\U.A,czqEw;pxr'I(T[T~Dw-vQDL`a~9ec͘),Q^Ns1b涕%\wz(D` VgǃQ4xo-{Z%߂NIӌ\)誢<%s CTuz>Ʌس:f=C4Yql&'S-|,#\(v) +3Y 8/ғ]WrƖ*e)^ÓeU{+d_kڇ[w$c^;EE6gCswMZ Ji0#oP䮚#z REsJ; 4H޻󏮇tV_z-)JzBT󕭥uŏl"Vnpk߄[i:²0?Ta&inKgЙ> n&ưzNdWk?s]nkR4/bGuY7Q\O )i__SvrebZS8< CEA^ gjhE*HF%7_yۄ/0rpK2"mQb03 fexPM-AHʴQg!HF1!jJ g⪟\ʞjOC*fL6=;ČB:k#^ 5;RFG9%;g-d8-,):FpR?21 Vǰ®Oݎ( ȕ"5Ip0DSr2Hf9aC 8 6Wv}ލƂAd4Z'@ݣcrQfǸ?f@Urۏj!EDS; A=vcuf:nθ 8 fOr+4ࡾ䔧%8Z%G j;Fj= JUgU_f#:mpM t I2r2nj^s퇡K_({Yp4t]h.)D|7 y(BG4s6Ӌ^7s{)JuM+ :*d1c`=?}PX#r&:Ώ8/e=,Z Le&j'ؾnפȧI/80|6.qGHHgU>f1O3^ΙyIPQᛀ^.$vlͣ+g;S(S:~'PMb !̱`Btgjb#X:)wrVֿ'a);00ɹ)UzYbP} POʡ̡!~φҁ-ȶ!>L)]Ta=< -~丢D!湖0RAB-xf;[gH%0Ϣw2ZpE)i$0wIcw)xcuʲ,:&sLnm/cvS voVMk%@4-j QK$$*أOr| p}cQP{kGHsnٷKح% {ZwZh6u fs9V4SvtÛtpoWTY{}/4qoJѧ2@0D_, 씎.˳#rbzUHBHi= GD'M{;J38W_R8 iZM /IEz#([KRa7OTD+ڂ zס,[tX^Rb 8I3QU3Io>ԍ)Uw uI] >̗ƕqzV?@îTkJp/FM)'jO֩beenk:jwknAja:. 6uV7&"z8WՋyNG]o&)L.|DYMʐXT]0?Uш>H?1lssmjl,{͊^SvzR|8\4`Zy]gkq{yۣͲ{cv}YkLadH+D%xwa OKUة(EcU&Ojl =IuOjNƄY0u,R=\r v4U-O9gzs;|nt|>yM0*xkXշJa)utב`g"&Yzz|K:Ѿ,{ڶ ?nc7 3J] i`;n9y“yyn%EM;KAəf2G㌈T!?7m"]Y?ӮSw+]qla%Ҳ @Yf`ӑFĪxИs"iW>)4r?g:rvMG7Rκ#TPQPY+*Wq裛kr;=2ؓ&Eׄ9Uek? hd~>顢i  $U`g-hz(%Nhwo7s7|D;!Rc ظ6,vXEqg6R%879ddG̰JlT3cו͚>l^Ÿ[Ҟ?!Isu6¾cj #{>R 9(CaS5; #9C 1Eb%𕈸n+1?|K+1xlTw,aty3@"FAk|3+BrGWd@%ecw o1qua^1 ìG- \U(58"#;orbAK 73q %'U| p8m BSX,ĕy- +l@!g?q.<-ٰ=57TJ 1Ii_ Uu>6$74obҸcЯNgy67imc"g'Ux~CMz_b'2̑XMt+c79aUjiGp~b&eK D~21}x%@ qZ==Z"#[jZXavMu@l" m{%g6YBN'O|WяJ@"$]K8Ib@jΎmv魱Ao~oϑfSXva-Ƹ[Zo\9v%ݵםȜC @)CspKx]Et :9dƤԘ&Qt5 V@-ۼa?_:w05mW`n=2pU`%b$ymjq%P^;,+u^8qY6xѬҰ&^ߢ$aZ-yA=&rd&_{Oy,%s/]0+/SXn!ŝ:_ț5M\%](>OTX 0(6O߳5H܎v š# ޒ$`Ͼ@Uy~'ÿJF\FHH.jdgl,r?䧞1}jN`ݹ!m,f6pnA3N p0Bz H$S<nTg0TF,鍙&i"42O:Ia"kތ rBLWHA\rZ>P@3OT(`ת8ưoB9f @;Ľq w荤{D9t!Ⱥ#ԦDG;\@Q6x}qQᙳ]9L/H]c3lz%"]^õ$ƫ lՀbR6PiL&k/Ker)H:žKd5aً2K-;z-d԰iّޱ+^\Ni2=R[^~ݯPW9 M^(}7 8_:_ͤn7ujʑ_ rMlRŚLB byC-୤jRCv8+tYwhCVK1憾@O]+sIO";yq\%ձdqs`pvɵb;bƋx>D5:AM2 #oI9GUY'OhU¾+PpE6'B 4BFz:8'D>c}'>1,,&݁#@W{))$?Q9ccLgpr-Xzҳ u/i$M_3291{͛PǛo0_cGa⩣tџܓ4ZC2p(N|PZȻo!&,(ZMvɜ2. 5cH vK2I*?<:utv=j2?~S&٦XAå՚|! Auli*[㔩nsWP0FMWF(LG8mvJNvgFqw\HU&S{PU-ߗOg\(<3 /bfjJƀ#ϏGO.cGHn; h\NXpj}wNT8JXz {Pg>FLxT_[18Ľ{ HWPcqqw{<*NF^ND ĹN=Y8nv d*BDY,;lq7{Zw6r>P:𗗳Y8`gM癑ʅ^T:rϴ!ƺ/44fà A-H^ZBy›꽢-”vBXzQ~_xePd-]!&/,@,Niۤw怏nmEl ͛EHZ0`I]gx ,Bw ;1Q\b(AkqnMK L&@^Vd0Ygf]*~[\/C@k~. h"̆SČ>,xm̆%m,zUUB RC#xwȌC*цmTeJz9@JmDm(a`ͳp;x~nyꉿ䄵~^ݹLh ]>˸ TNK%!_^ rv4;;((X\d} - 5U1K,w6$?[zw:Qu*?JMqNpbEe$ -M$ RYb*Oڒe42I^mG:*(Is[oO8@V}ؘǒZ̀Le.tBy<yq 瀦7Fנs%c>?H@`}?s~q_Kcm5FP[պ@;{S}k\ϟkէ;ok7!Nkm"CsTaڝli@d.YD˃p TЎap8>+EhG/S2&_Xamf MX֑ *X7i-NX!SoIdĿbk҅|v# FJYւ0|%KMgO<ԭ@;dEuSYd䮜3 #MqrE-jA#IbJ&IЍϵb )?)bZ<0"T !fMKfXIO,jF|J.2T8oV&_;J)2w8 ]rV>p<`S<[O' C/,OJa}5V f Tr(v jq}NV`yg&[Oa`DoH*Ǯ4`X_((M{Dm [1.j_9 + Ea,q3 vv[Lg^+ e-f͠+:_X1S>J1ML[wV IVyC5ز1NwZZdٗJ,rddfF3嚾sgʆ%?s];ai=Y&5Lv+6NJ=rnn2h.edneNYLȌYu篺PBFR#l_Z>ӷAK )lmb,h1)#oʰz$Pn;&Ov3 K"0ZFۑc#ukHw.|?;%F߯/Zn6k>ڷeH.pQKFY̨x$vHb6 ye, 40Xh0xP r&ޖN|H' /x+4 3&׀Y2d:r\>J;kK$۠w)/yL~k˨\fɗ5*;% ]5rj"75SlBK=yt`O~Ae㔳.Ib/4Wrw dWׅ?# $uW GW;/PLDt ^, /!YVgcUtգkZ_gIQ;zgOTTMB4Тx!TT>; ϔCnN8!UY {9BVL'I7(⛨d)ӵEtd]™8:C]s> @XHYVZa_כt~ɐu7Lo9ՏZ<}3$IM|FQ'J["%4dz7vP :')\2-?d4ٛh/8x), ddsb#PK-K#c*Q$$t(+v: a Њ:~]Qh 5_Rzjwr`LD䕸J_Q$ <.MڗRG/酳_ ?_0 * ( gƍ1kai Xrw^1I,]/C>#4Dj"b2WXY7?PF7n+xҼJ 2'^`sVx~W_vzcd<w\9bl1ɒ 45M4Do[Ee8eQQՙ&ԛh2Ц*t7z&%mʓ0rl~- T 2< Z>#?~ B;Vp+ =,y:f[L>M)S5\6m?o^ sZW2dsU;ܘBjHA\BX2i{.mB1KM//֪B$D0MaѽJ6%|@❊HG];,)}3"҉ m_1}{xt&v?(`Z0"Oz"P PS p'k 20Υn9f|Dg\_ sAXD"ҳ?6+Mrbn]:!D.ޜ$ t㕑:z n*Ѣeohy ;SP9 ODK?o2u\g3]=H&.4v-D5i+ku -EC/v)@>Zq5\Oh;^F˒'|K!U+4h.M4Rm{uExbR@=x"0 9n8Wg&1}N2m4)v }I"Z >a] FObf[?[f \UZCt㒜)(fn9S+%l``fح5ߙ|a{< a;|)"qg8Ж0y-צ͗[qH. ᕡ,9֌"eIxܧ jZ2yN^wdwJoq [.$/kѧAަMP ÂZ{%\dnSr f+ȉd̒gQЕYfrM{s=d\GŀHfcO /.Eo"HHRt* \Ɖ\/gPc+y6,6}`TA+U3j*!Sj,`B,?^U HmíioP VR;%ǚ@S0ڝGjim$ǀ$(%ZEqcܻ 9%쳂De@(>βۨt7{uvZjO@ ^jVU}PBc}nBGkYr K:WF"y1xpoug;n;ų2] D؟n=v葡֮o8ݿȊ69xfXzZ)wK.NkЈdcIuk+ݿ0r5jd5q #B7P{1>"a-i]!1߆"O,p:9^R)Mq N5 <;L{&G.t'6 {lC?I1b"h' qB%1&(TI!"Zɞ0RD,r+ ZԾz|_ee|!c 2V@+4iU!6W#| ZR<.*^6itKzo}3DMJY>K5(cN|96K$uD vi<[h8ҜQ\Ѵ9%jN !}*.b!07(qê .ZFJĘu"aRX#}.C`&:,孊k"ζzx)dGN6FQI17UƳ*4(Zk1ݍP`G3O δ:⤎p>Sy,;Zl#l2,?[bdm'VVoߗkn5RWسU&V1 -a^3 ɐ 6ReK?n;Cl”N$ꁃ ZgC^VGOU ^UCiQJhJ+qhKW ;Z%Ƣ)%GB!d 'J5oF:^/Wm9 ʢp-#w -sd$V!;[5vs߱=\nn'×r gԄ@i 6P-0aiAQYXӱaV{ZpD<-C5ɂ-=$ * 9sB5մhAE?/?0pS`xL xőoёZSo kSMqxFͨq_.+{|,5UJQ犋U[@(/MZo<7! O)|xbN:.Gvud)2wu.Wl=z8|C42CSBMLtLX tg^sv6c#ڏt`V;N!kBPLvNƠ%uh!1i9?scK j 4پGY /.t~*ԕCoCkyM Wf8@sĦ?˧k!y#gAТ_ ir34fߐ:jh:ٱ(UojZZ=щ"pYctPX,@%c_KIlK-: I^, V/ Сo;&j~xNnelK3JR2W!(xȽ䥲 pdbO.; Z/%dm'<2BS̐Ơͭ%vϵjf:oFK¾s#JdBG/ kuflJc>T k8߫(5eNVQ:Xڔnu3wh ̐A.$!Қ v; NЈaT+T?[N~<ΒZ`>GO{w6ȫ\8Г0~}}Ty)!NDRw(E 0F u4{MC,C U5xUc7TF6/J*+f5+f07oҤGrs9I6"Bdq빒[ᮘy S}Z &xSph[ ޶|3Q ˽'8XMǬ|di9!llJJ }"[ofHf0{{Dhq'y~v }X57ec*xFFe#]M(a2{~# 9̇zǀJ܆:PU-æ ,mjB; Eg, UZul1wrwꥁ@DAa|\+L>:vyO7:D<GD K䀹/eޢ 6NTk,I$^ h=DGOWg#cO/FXqBqNv_=)|pR`!:Y*O^BPbzq+&B-:^[meC<[ daEC]]5/!j{>8Dr?ޥ^v>cvKӉ+oo!1j*aeI=\UL۶ÏHƝήb=iWxxj Pw`MHNfq<:^уIݒ4B2{;.A<$\JUlzZ5QBǘ `T R `+ /K0Z좄GOmD)G#:diK2-4VoPE{3%IRU@I(*arc/lUGeTO6)Όɇ,mh(,dEd-Jk]1S`%Q0V2g%?u=f)%X<`fZJSb7-#"JrD2B9=Mor)&ﱁ񴘞lb~()CGOA2J,q5<PA"Z%;qar-z DZPa`VȚYXJRC!c4:/FBh`0 H]hlmxa(:"7Sage>B56e;mmĸ,{$^j6Ubas۲ǕuO5hRh3m\. V2]^O0B"'_HQ;],O*IGf|9Rˉ(j/!ԬO\I݂@5 4 TM0ڨGL;Eg5坻 #L{6x`KƁNI^e<.X'h䶷]mmG2ATһ03&*pLpE3=bGb"逅%M4l1!Ў _Vi\s)k!fIh+/OTD&VY.iPm>v5A(wPx=h Rf4N`s& MSۜ4\ZUӒD2rK;FoOpOOZ)eCyVayU-_k~‘;w7nv7fr<$[1[hLH P4YT5tW9X٢8^K'6y7A2 ICQ0W~jv𚩻@ [G<ޯ;@!@u5&,EWc@G~E:' IJ(]Jsa5~WA_a[P vV:c=F 5)$$~t e6gnŏYYA <},)ZVNuV[iR[L(ҼrW큄v([i -Wɱ^+{0`(c&Y(m}c>{DS#YfY^36Q9a#PQ k K\eɋ4S4߄kn4]j<3!ÞO\C܊c'an ,;<ޖ*lح,Eb~U_&hZ8YifT9fd!T!a"a}?> 8]$9>o1 3T-yCi`4j<6#%Q`v߇dp F.& nͶ3kN ;sLIa{}pM^y NDX׷JL-"$T?:r0 ùz ;sZnPerTCzx^d-QC:Nƚ4"(uOR\< F:aBI]os Ɂ%&{U`gBfMb MRXg{xCR 7pǷ?^?qCWZyRSu/acHwb"p*㉲| ׽5mר$^PX~L?Ρĸ)y*^CCjiӧɓHuD*k-&K';c#f;s9 n7{4X <,C$xב|?DZɡrLIO> Wπhniewoa6IVVt7}e8{B^:zY;o4~bhjaƽ)NjT2U<+dL<#tWs3$>:U;*0׊ECUFGC!$:IL<EMJc$`Mr#:?IT" 3Տf ] `s!ކ~Ȍw)w5GWyXT<1QF=‰\O/m}VW2)Tސ#-^hD]]B*iKJ`bѻe5Z-I1N*spCZҚǢiYL3VZPVZyAMʘ0vz,j0,}࿯VX<щ1l&ZzedH^bj@l]=C Y$8Jlflmp]ZFjJKal0f> 2j۴xFN$a($? D;|d@]Q_ℰ/*:Tu!R'7V俹$ ({}PPKsAׇJ6jZJO e&mPeO5 '2k(ơ64։:^{F1mb[')F[Cm4~Kv6ҝ,8^ߙOWn pkƍ$(!l|!LGN{oP_nyV{{Fim_UOHX1:mxW2Fj΅im@vr)KNUd}Kͻi`]lXE2j-^" lޚL6w:XWh1hy9N7޿8 ='pp1LA<-~W1ub HJ#ػ+a"2ㄶʛp[Žm-jTb^E'ĥYkD:*ŊR]&Ŕ:^ph5Uʠ+ٚ?,-zh{2Dz"Y!+cR\&5&/Z'~O0Ry$Iʉ:1 ^=_ol޳n0FAjr0gCc 4S .s_.ޒt~G_SBnMB*l\A1D;C'_R]P;ϙxG< 8عjAtG^*5KڱզoJrvu][ ݦyʅϺw" vtmQ(+fP$ >*N2% [zEd"،1?#LN܁P ϋ *߬Lk_T_AK]ϋdY>q|^=:?SP%3@'X8]C>ž3s(!BGQ>"%(;bO49A#+SF"BOptP|X=|mbbm)$Yk}wt-,Ciye$ieQ+I\ Y8 Zv;C3 Vp:MT靾-W>Ec 4o]݆! l+p;4=%`W1*t6C ,f$%u[z𣕐I/j -ڧGkTAJ6iR%߉ `-B7*cќ8@ɾB_LC}N>=ՁKJH3X~yJ+d?Sd5xm-L ębJ#Gq a: q`:Wed% j+ u]qGj(dq_-|AQXb]]D]Ѭ p?7(J/OiJ $y_ŁE`>Y7,%ݨ-i[JBٚ T}Ϥ3Bys? n+rWNUNDi6XTcA.ұ謁fu.pjP>R*~!֢b)̾yN4P}4g;]۱#UH&}|,`y*9vޤZ#5i9ŢM{|k| 6 l W6D>G:i$Gn tI8+/KGr4Vڢ|6CF $b_)PC\ScNz٦nG[8;14<a|7rԠ`hDUy_L}mFj>dBFCJDT&6 )R/YARG_ބ|3/ !j<o#P`7 ! PMXr7CswV&QHm6ߩTk,ۊ4T33/`> <OR>} E%)UT3 a~%;~ Ť*AJ, ʠd3y#h/ (Rґ5nx0WUH^gZz2M]=z|W FLX1*bW&Bw'~8 |vu{>7: pZ ^'E)t_!G$C?#%H_> G5 Z'ghRC6K&MB sB˜"Qٕ|vyRS_V*u} <) o` q-RLd(}ž(bP>AkbD d}c摙j Ca~b#*d3z[ŧ|_M46 YYg2P5n3Cbm{Y³N87qûEcÎo i͡=rW,9E1-߇yӥ) iGFN[|v;aD~MO%tHlD ey W3莡"PڀtnpB[l ~17ӽaF*dz WxG:9 oyv\$" opO֑OvTXQL䞍,#:̬1xA,,=)=W.9U&xAz4ND\eJJ62gHE٤gB؛-!(}g"X(3a9[`E!r\Xѻ~ֳ Y{Wn5Ǿ$TTw'=[q6#<R./{bˊ߆&FCaW?.Zq5d3tZXrz5TrG[C A+4\9w֦3{@ LIVzq ǵ I~:K5%:?J[7u`i!k l>~w7 7V1*6#` iˣt̟h;=ZĢ1T2DXioHz=rA^Gƥ)PBpmQG{n5PjlwTlikPqMf_:[zfGb$`[$57i%u;  Kl! DQinD7rHZI4D ^ttoyc xL̙ͻbs ٟIS5gŤ{~˗q`-0oɊ=jk9O^s+@$Bx͘|3wNv"*>0XLZ0R)L<嗴o!ΜvF;}84(OwJU]9cJQ>ABI7FŨdos*{?,Ïߎ\ɥL*Ŏ4T6%ͺPn AC:P}SQ/ @[8젠pat-P`RS晉یQ1:}6Y{樢-1 FLYx/No3 bmq+&O_"m'cxE/̒__O監$.1S(k^4βU٩Ə%]ufGi6\YdhɉL{%by1H[R,nq8 cV=*?ᕓ4-- +Shk<%8b }@#kPޫЙ!^Lug G(;=%$(%0j_O&+o򠋋 Л`n\ג:-weiud\s_畸&y9WEy*\VW81L/%-rىzW8" D4ipDUq |%3n㛛Nzd)\2ib>dmlB S"+Ss߮.U s=Hk{q+%HI4SV[rRRJF[) & \:.{NoIHByG}s1y^FK3AoI6-rDQyCp7JgƜb *@r?;AQ%Qgƨ>k kHJbQzL 2tr?6,D2 2S=D՚gSW |T@73IQa]տ$ׯDD|L &x YZ