xen-doc-html-4.10.4_06-lp150.2.25.1 4>$  Ap]q/=„^/U] s=&vwyzB?/ ~h_wQmA>a6G7^ 0/^5v[Ü(|*ifε5vɬ]zXRr0'Q8^~hk.I%zFT`reCK> Kl!bAe#"T˃!xA6gF[)d ƘjV  fR=-BNBge1af6c7ca4d4b9cae7ba48f75b9a4a7be947f333ba59ba5b38054ffcbcf160e98742bed2a4a2b4a5e7ce91a3f5e7ec5c452487d8]q/=„0K8GUx2``$VHYZ8\8T,oWh`=?qĚ4|aĻP, y3'd@t̰6r.3wE{ 2 ߮{` BdfY0C25PD8S` 2KϷXS.@HvBc)uߍdTܹa-c08BjVyIG6gPSq׮ˏl JI{1ɖNK9sejcyx8OqdWH _>p9C?Cd & M  <BLKxK K K K [K K$KK8Kd(8 !9 !:3!G5KH6KI8 KX8lY8t\8K]9K^>= b@(c@dA^eAcfAflAhuA|KvB C|CCCCxen-doc-html4.10.4_06lp150.2.25.1Xen Virtualization: HTML documentationXen is a virtual machine monitor for x86 that supports execution of multiple guest operating systems with unprecedented levels of performance and resource isolation. xen-doc-html contains the online documentation in HTML format. Point your browser at file:/usr/share/doc/packages/xen/html/ Authors: -------- Ian Pratt ]4lamb21 -openSUSE Leap 15.0openSUSEGPL-2.0http://bugs.opensuse.orgDocumentation/HTMLhttp://www.cl.cam.ac.uk/Research/SRG/netos/xen/linuxx86_64o  KBJ@6@7d$r#B W % e $,76H"yj1) <3 " Sz29ZZAAAA큤A큤A큤A큤A큤A큤A큤A]K]n]n]L]n]n]L]n]L]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]n]O]O]O]K]O]Ke171864f5cfbf7c7b3fecd9b9fbeb3da9e87f63a7284ee52eeed093f8ad303ecf53beaf653f26eae12ff7ced3bf0735dbedad0d8baf45d31e32d33e0b868bfa954e980d65bcde307bad2efeab9640ef5c720b4ebc78ac8cc1eb48bd6134a5280b3422df9c1ad850ce9b456e83713da51f123c2286cf1f9fd4eb97f57c3eca9adb90e1dc177d8ffbffeaf36a094b262001673e94d8769d118c7a2c29c53904f5d6e53bebbfebe06de376423d6d2f7fec4c016c39c16dc2ce9d06ce4476b57f44cbb68ed2cb6a4b54d6feec738d3463a49faf9e2ca9bba572d7ce9da6cba00f4ff2c53bc0e7a8d89ec8e6bba2ce1cafee74376d7217724cbd31656a42c26752d11c617598408f11b6494cc987064060296baa1fe3bf1c41e14de9d6ecdf719617769c6ea34b0f7688c4e53b0f1e9a65f44cec0d161a3514947966b5190c92fabee2a85512043aade40979b27cba1dc61b000fe9fcf1e9548ece8ecf57ba6ed18c7851050a5d238d9b38e13e23f494782688926fa6c7aa008016b3ea433277f32c6d7554269b2dc588684a32eea5da8b59ef1347b8fcebabf743127a8d51f8ed2838120ff82f7b4f74c4c6ef131e9ab6b6c731b94d7e25f5a5a55add95767e13e7ed07b7ee778bc7d235842e6fbfb0e33f9459e0d93dea5311bd00894c6495d7e8fe466c9be077fa0ef0ced23a246e92d14cc0cc8fd757931079cf928689b544b326b03382516373fc9221dc98277ed58043f0d5b49a8cf0913e57e5e47220c2c969dad085c979eea4c5f6e1ca0e67e04d3c61fd004a2c706af0ab31c32902047949a8c771f2fb58d22ee3f0764495a5a3a33d4b3fbe946ff9f9db3734ec8b211ad64fe308c11ae188b9cd59bc737047271e9b6831c15227da0a3d4a6b3e6327189ec6ec62e0ed44cadb13087b09edb544a567bba0868878648fa08b56d1f814a31c1dc9c7b00f8beeb7471ca92cdc3edb3dc56f696ade3474d58a9964ec4b375afa4a275b105f4a19cdc263a1ccca2876fb4f06ca6279cb7fe93c61e846fdda3d3b3e1c4bbda2c55f72a5a5a11d272e7d4ce4bb5c2d12c4c2d6b40de640b4912d3df5076c347e7cad2371f3dc0bc10c6877c8f5251a5a57ddc6c79e1f9b532f89ffbf590c80aef40b7e6ab58cefe9e4351ef6afaa6bcaf4e55d7809df6392fdb96aadfa0507b89d930b9500c7a95869685253e2082a4d704ad9ab9a720307e4e194f12fc75ec5d91d3942e661e3068ec7a290f1896b23f6f574703ca5d3242079a4faf9f22847781296550c42f0955595f5f23eff9cf7b00ca27ee70988aaee9f7ec2154a382909b7652464c29ad603492e27c76bd7d0de3b5198d0867fe0a75ebd93bafe2e73cf681a88dca3217d79376c353ff4e1e5ecee8c41c70e11b8c9e2d1e6d49bc98608f628aa5a910c433a17e2ede92773435ca0bbd4ab3bc88fd089b7bf3a73bdcf56aa5df3f94e730678dae5f6683886143660de48db28ecf7c6852738b1644bb9c4dfc41af8064e2a518120b48fbc4e08145393f66b0c5a021e938805815382a3a07bbbce6e4badf8566a6241c4d357f44ea2c5b96b4340205d3af91b95599c26b803f2c8bfb407d7ea7de55a783c40780dcb7f993af187e4d4200a7cd1ffaf63b68eb2cc3c3d663847edfeeeed22d3b1039b423ec94b5198ad7daba0315ada992171ac097279a5924539c83bc431e243edc9efd772f673fd5301bc159111fcd005b864ab1f4b803e059590043471e04d0ac7ec96fe74dbf857c003a9b4163966919de58c0d14d493b5d7c6826e43bd61f2eda3c2a4a33fd26f285982fb97cc7b4730fc7c1c5289c87cc4d1dfe6184c7908079cfb34de8b6d4d200623779cd80c0e754ea39d27b5754be3f24f6f40be56957ec3d705f3cf234da2e2c80a00b3c661489ab62333993243951154c8ffe56cf475ebcb8a54982ecbd145cbe19ee58416bcf16a88f474895a8626db19ae5f3654c894d7337bcf72c1fc59037f947f713649a84322888eb75d9dad867249c4c135787affea14ee1cf2c50b4403362cc91e5249e9a32270b77e1d08f1217206215cbdcbd7b4f179b7787b0e2cfbad142d02f0888f843af76344082251a554e5769516a18e9ec2109c44baeb1f10e378ccf028b0040d857506d6a2f9f9f7202547fb83347ebc6cf52cf4d32d0b149f51c8ce25e5f729f175c66f6512fd0c6b414be570b5cea99cb9eee95f928d603a99a49af40bf7589771dd6810ba68ffd01c20c7d7743ec76891e07a4851f086e043731368850e313269ca98ab91c156529ac3b961a67f54a522ef093965d6be4431b21e9ec2fc3e6c70050a26c3c78777e5200cad4282b96411eb4c871e9845d2b4b1163c8f2f71b3f232161df132b103360ee3fb48495eabd71c2be87437b2d33715486da3e3443c567a5b9cb6b8f54c07b3fac562cc7f7d20c570e6df66605f996aa6d38f8234276f2b8fa5c54a10903b7fa29d49d6dbdae30ef984b87af4bf000adede9346df973764ddf1073b60758e73caa479a3e676ccfdc95d0c4151eb9d4bb2e16e25f710099b13ab6c7b0dec076e76d504e091cf2642a805f8128ce2d59c9e5bfebe0a433ae1306e8a719631f940b74c2751182c03bf295439a80dbf1fabbfc82ede8ce1fe4f43a5c4bb36450cafa0e20cb488f196d3031a47fbb5ab8dcc90c9f7324d04f38470b2ce38098499b9b28d6add17b885523927c9a85a5223611ec41b4284133d6e2ada83e7b12bbbff004963b7c8e1dbe8f49ff../html/misc/crashdb.txt../html/misc/vtpm-platforms.txt../html/misc/xenpaging.txtrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootxen-4.10.4_06-lp150.2.25.1.src.rpmxen-doc-htmlxen-doc-html(x86-64)    rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.1]d@]@]@]]@]@]]#0@];]@]@]:\@\ޢ@\@\\\8\\\@\~d\w@\n\mA@\f\N\[k@[@[][t[[9@[qr[i[Y[6@[0@[0@['[!@Z@ZnZ@ZZ@ZmZԐ@ZZZ@ZZ}@Z}@Z}@Z}@Zz@Zz@Zo Zk@ZV@ZS]@ZOhZ:PZ1@Z.s@Z&@ZOZOZ Z Z Z@Z@Z }ZC@ZYYYY|Y@Y{Y*@Y5YA@Y4YYYbYY@Y3Y@YJYJY@YYV@Y@Ym@Yw2Yp@YlYh@Yh@YS@YJ_YI@Y5GY0Y-^Y(Y"YY;@YYY@YtY.X@XQ@X@XۡXg@X@XƉX@X @X@X@X@X@XXX@XXXwoXs{@XlXWXRXQ4@XEVX43@X.@X*X lX&X@XX@W@W֘W֘W^@WiW:Wt@W.@W9WW@Wk@Wi,@WbWZWZWZWYZ@WV@WEWBW=W;W3W1@W1@W,@W(W(W(W(W(W#LWVbV(@V3VJVxV'@VV2V͛@VŲ@V`VwVVV=@VV@VHV@VvV%@VV<@V@VS@VV@V^VwVqR@Vn@VXEVUVTQ@VMVMVMVA@V;DV9@V7P@V0V*!@V V@VCVVVf@VqV@UYU@U@UUݪ@U@UnU4@UUK@UU@UU>U@Ux&Un@U\w@U[%UUUPUKSU>$U6;U%@UU@UUU.@TgT-@TT@TZ@TZ@T@TT@T5T@TLTLT~@Tl@Ti@Ta@THT?@T=@carnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.dejfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.deohering@suse.derbrown@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comjfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.dejfehlig@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comohering@suse.dejfehlig@suse.comcarnold@suse.comjfehlig@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.commlatimer@suse.comcarnold@suse.comcyliu@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.derguenther@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comrguenther@suse.comcarnold@suse.commeissner@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.com- bsc#1155945 - VUL-0: CVE-2018-12207: xen: Machine Check Error Avoidance on Page Size Change (aka IFU issue) xsa304-1.patch xsa304-2.patch - bsc#1152497 - VUL-0: CVE-2019-11135: xen: XSA-305: TSX Asynchronous Abort (TAA) issue xsa305-1.patch xsa305-2.patch- bsc#1154461 - VUL-0: CVE-2019-18424: xen: XSA-302: passed through PCI devices may corrupt host memory after deassignment xsa302-0001-IOMMU-add-missing-HVM-check.patch xsa302-0002-passthrough-quarantine-PCI-devices.patch- bsc#1154458 - VUL-0: CVE-2019-18421: xen: XSA-299: Issues with restartable PV type change operations xsa299-0001-x86-mm-L1TF-checks-don-t-leave-a-partial-entry.patch xsa299-0002-x86-mm-Don-t-re-set-PGT_pinned-on-a-partially-de-val.patch xsa299-0003-x86-mm-Separate-out-partial_pte-tristate-into-indivi.patch xsa299-0004-x86-mm-Use-flags-for-_put_page_type-rather-than-a-bo.patch xsa299-0005-x86-mm-Rework-get_page_and_type_from_mfn-conditional.patch xsa299-0006-x86-mm-Have-alloc_l-23-_table-clear-partial_flags-wh.patch xsa299-0007-x86-mm-Always-retain-a-general-ref-on-partial.patch xsa299-0008-x86-mm-Collapse-PTF_partial_set-and-PTF_partial_gene.patch xsa299-0009-x86-mm-Properly-handle-linear-pagetable-promotion-fa.patch xsa299-0010-x86-mm-Fix-nested-de-validation-on-error.patch xsa299-0011-x86-mm-Don-t-drop-a-type-ref-unless-you-held-a-ref-t.patch- bsc#1154456 - VUL-0: CVE-2019-18425: xen: XSA-298: missing descriptor table limit checking in x86 PV emulation xsa298.patch- bsc#1154448 - VUL-0: CVE-2019-18420: xen: XSA-296: VCPUOP_initialise DoS xsa296.patch- bsc#1145240 - [Migration]Can't pre-allocate 1 shadow pages 5d70bfba-x86-shadow-dont-enable-with-too-small-allocation.patch - bsc#1137717 - [HPS Bug] Unable to install Windows Server 2016 with 2 CPUs setting (or above) under SLES12 SP4 Xen Server on AMD ROME platform 5d89d8d9-libxc-x86-avoid-overflow-in-CPUID-APIC-ID.patch - Upstream bug fixes (bsc#1027519) 5d419d49-x86-spec-ctrl-report-proper-status.patch 5d43253c-x86-ucode-always-collect_cpu_info-at-boot.patch 5d4aa36f-x86-apic-enable-x2APIC-mode-earlier.patch 5d4d850a-introduce-bss-percpu-page-aligned.patch 5d516531-x86-xpti-dont-leak-TSS-adjacent-data.patch 5d6524ca-x86-mm-correctly-init-M2P-entries.patch 5d67ceaf-x86-properly-gate-PKU-clearing.patch 5d779811-x86-fix-CPUID7-0-eax-levelling-MSR.patch 5d8b715f-ACPI-cpuidle-bump-max-num-of-states.patch 5d8ce179-sched-dont-leak-XEN_RUNSTATE_UPDATE.patch- bsc#1145774 - Libivrtd segfaults when trying to live migrate a VM Fix crash in an error path of libxl_domain_suspend with libxl.helper_done-crash.patch- Upstream bug fixes (bsc#1027519) 5d08f651-x86-AMD-correct-Fam17-checks.patch 5d08f68b-x86-AMD-limit-C1E-disable.patch 5d160571-x86-cpuid-restrict-OSXSAVE-leak.patch 5d1b395a-x86-MSI-fix-loop-termination.patch- Update to Xen 4.10.4 bug fix release (bsc#1027519) xen-4.10.4-testing-src.tar.bz2 - Drop the following patches contained in the new tarball 5bc4977d-1-XSM-remove-unnecessary-define.patch 5bc4977d-2-XSM-introduce-boot-param.patch 5bc4977d-3-XSM-SILO-mode.patch 5c7e6f86-gnttab-set-refcount-for-transfer-copy.patch 5c7e6fe8-IOMMU-x86-fix-type-ref-counting-race.patch 5c7e7008-x86-get-rid-of-bogus-page-states.patch 5c7e7020-x86-make-coherent-PV-IOMMU-discipline.patch 5c7e70c6-x86-mm-L2-unvalidation-preemptible.patch 5c7e70e2-x86-mm-L3-unvalidation-preemptible.patch 5c7e70ff-x86-mm-dont-retain-page-typeref-on-IOMMU-fail.patch 5c7e711c-x86-mm-properly-flush-TLB-in-switch_cr3_cr4.patch 5c7e714c-x86-pv-rewrite-guest-cr4-handling.patch 5c7e716d-x86-pv-restrict-cr4-fsgsbase.patch 5c7e7192-x86-pv-toggle_guest_pt-TLB-flush-for-shadow.patch 5c7e9d9c-x86-mm-fix-GP-0-in-switch_cr3_cr4.patch 5c87b644-IOMMU-leave-enabled-for-kexec-crash.patch 5c87b6a2-x86-HVM-dont-crash-guest-in-find_mmio_cache.patch 5c87b6c8-drop-arch_evtchn_inject.patch 5c87b6e8-avoid-atomic-rmw-accesses-in-map_vcpu_info.patch 5c87e6d1-x86-TSX-controls-for-RTM-force-abort-mode.patch x86-cmdline-parse-fix.patch 5c8f752c-x86-e820-build-with-gcc9.patch 5c8fc6c0-x86-MSR-shorten-ARCH_CAPABILITIES.patch 5c8fc6c0-x86-SC-retpoline-safety-calculations-for-eIBRS.patch 5c9e63c5-credit2-SMT-idle-handling.patch 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch 5cd921fb-trace-fix-build-with-gcc9.patch 5cd9224b-AMD-IOMMU-disable-upon-init-fail.patch 5cd922c5-x86-MTRR-recalc-p2mt-when-iocaps.patch 5cd9230f-VMX-correctly-get-GS_SHADOW-for-current.patch 5cd926d0-bitmap_fill-zero-sized.patch 5cd92724-drivers-video-drop-constraints.patch 5cd93a69-x86-spec-ctrl-reposition-XPTI-parsing.patch 5cd93a69-x86-MSR_INTEL_CORE_THREAD_COUNT.patch 5cd93a69-x86-boot-detect-Intel-SMT-correctly.patch 5cd981ff-x86-IRQ-tracing-avoid-UB-or-worse.patch 5cdad090-x86-spec-ctrl-misc-non-functional-cleanup.patch 5cdad090-x86-spec-ctrl-CPUID-MSR-definitions-for-MDS.patch 5cdad090-x86-spec-ctrl-infrastructure-for-VERW-flush.patch 5cdad090-x86-spec-ctrl-opts-to-control-VERW-flush.patch 5cdeb9fd-sched-fix-csched2_deinit_pdata.patch 5ce7a92f-x86-IO-APIC-fix-build-with-gcc9.patch 5d03a0c4-1-Arm-add-an-isb-before-reading-CNTPCT_EL0.patch 5d03a0c4-2-gnttab-rework-prototype-of-set_status.patch 5d03a0c4-3-Arm64-rewrite-bitops-in-C.patch 5d03a0c4-4-Arm32-rewrite-bitops-in-C.patch 5d03a0c4-5-Arm-bitops-consolidate-prototypes.patch 5d03a0c4-6-Arm64-cmpxchg-simplify.patch 5d03a0c4-7-Arm32-cmpxchg-simplify.patch 5d03a0c4-8-Arm-bitops-helpers-with-timeout.patch 5d03a0c4-9-Arm-cmpxchg-helper-with-timeout.patch 5d03a0c4-A-Arm-turn-on-SILO-mode-by-default.patch 5d03a0c4-B-bitops-guest-helpers.patch 5d03a0c4-C-cmpxchg-guest-helper.patch 5d03a0c4-D-use-guest-atomics-helpers.patch 5d03a0c4-E-Arm-add-perf-counters-in-guest-atomic-helpers.patch 5d03a0c4-F-Arm-protect-gnttab_clear_flag.patch XSM-fix-Kconfig-names.patch- bsc#1138294 - VUL-0: CVE-2019-17349: XSA-295: Unlimited Arm Atomics Operations 5d03a0c4-1-Arm-add-an-isb-before-reading-CNTPCT_EL0.patch 5d03a0c4-2-gnttab-rework-prototype-of-set_status.patch 5d03a0c4-3-Arm64-rewrite-bitops-in-C.patch 5d03a0c4-4-Arm32-rewrite-bitops-in-C.patch 5d03a0c4-5-Arm-bitops-consolidate-prototypes.patch 5d03a0c4-6-Arm64-cmpxchg-simplify.patch 5d03a0c4-7-Arm32-cmpxchg-simplify.patch 5d03a0c4-8-Arm-bitops-helpers-with-timeout.patch 5d03a0c4-9-Arm-cmpxchg-helper-with-timeout.patch 5d03a0c4-A-Arm-turn-on-SILO-mode-by-default.patch 5d03a0c4-B-bitops-guest-helpers.patch 5d03a0c4-C-cmpxchg-guest-helper.patch 5d03a0c4-D-use-guest-atomics-helpers.patch 5d03a0c4-E-Arm-add-perf-counters-in-guest-atomic-helpers.patch 5d03a0c4-F-Arm-protect-gnttab_clear_flag.patch - Upstream bug fixes (bsc#1027519) 5bc4977d-1-XSM-remove-unnecessary-define.patch 5bc4977d-2-XSM-introduce-boot-param.patch 5bc4977d-3-XSM-SILO-mode.patch 5c87b6c8-drop-arch_evtchn_inject.patch 5c87b6e8-avoid-atomic-rmw-accesses-in-map_vcpu_info.patch 5cd921fb-trace-fix-build-with-gcc9.patch 5cd9224b-AMD-IOMMU-disable-upon-init-fail.patch 5cd922c5-x86-MTRR-recalc-p2mt-when-iocaps.patch 5cd9230f-VMX-correctly-get-GS_SHADOW-for-current.patch 5cd926d0-bitmap_fill-zero-sized.patch 5cd92724-drivers-video-drop-constraints.patch 5cd93a69-x86-spec-ctrl-reposition-XPTI-parsing.patch (Replaces xsa297-0a.patch) 5cd93a69-x86-MSR_INTEL_CORE_THREAD_COUNT.patch (Replaces xsa297-0b.patch) 5cd93a69-x86-boot-detect-Intel-SMT-correctly.patch (Replaces xsa297-0c.patch) 5cdad090-x86-spec-ctrl-misc-non-functional-cleanup.patch (Replaces xsa297-0d.patch) 5cdad090-x86-spec-ctrl-CPUID-MSR-definitions-for-MDS.patch (Replaces xsa297-1.patch) 5cdad090-x86-spec-ctrl-infrastructure-for-VERW-flush.patch (Replaces xsa297-2.patch) 5cdad090-x86-spec-ctrl-opts-to-control-VERW-flush.patch (Replaces xsa297-3.patch) 5cd981ff-x86-IRQ-tracing-avoid-UB-or-worse.patch 5cdeb9fd-sched-fix-csched2_deinit_pdata.patch 5ce7a92f-x86-IO-APIC-fix-build-with-gcc9.patch 5cf0f6a4-x86-vhpet-resume-avoid-small-diff.patch 5cf16e51-x86-spec-ctrl-Knights-retpoline-safe.patch XSM-fix-Kconfig-names.patch- bsc#1138563 - L3: xenpvnetboot improperly ported to Python 3 fix-xenpvnetboot.patch- bsc#1129642 - L3: xen domU loses attached pci device after reboot (since dom0 upgrade to sle12sp4) 5ba5188c-libxl-keep-assigned-pci-devices-across-domain-reboots.patch- bsc#1133818 - retry XEN_DOMCTL_getpageframeinfo3 accessing the list of pages may lead to a temporary EFAULT backport a mainline patch to retry the domctl, which may fix live migration on the sending side libxc.do_domctl.EFAULT-retry.patch- bsc#1131811 - [XEN] internal error: libxenlight failed to create new domain. This patch is a workaround for a systemd issue. See patch header for additional comments. xenstore-launch.patch- bsc#1079730, bsc#1098403, bsc#1111025 - live migrating PV domUs simplify and fix the required change. The previous variant broke PV with device-model libxl.pv-qemu-migration.patch- bsc#1120095 - add code to change LIBXL_HOTPLUG_TIMEOUT at runtime The included README has details about the impact of this change libxl.LIBXL_HOTPLUG_TIMEOUT.patch- bsc#1111331 - VUL-0: CPU issues Q2 2019 aka "Group 4" CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 xsa297-0a.patch xsa297-0b.patch xsa297-0c.patch xsa297-0d.patch xsa297-1.patch xsa297-2.patch xsa297-3.patch - Upstream bug fixes (bsc#1027519) 5c7e6f86-gnttab-set-refcount-for-transfer-copy.patch Replaces xsa284.patch 5c7e6fe8-IOMMU-x86-fix-type-ref-counting-race.patch Replaces xsa285.patch 5c7e7008-x86-get-rid-of-bogus-page-states.patch Replaces xsa287.patch 5c7e7020-x86-make-coherent-PV-IOMMU-discipline.patch Replaces xsa288.patch 5c7e70c6-x86-mm-L2-unvalidation-preemptible.patch Replaces xsa290-1.patch 5c7e70e2-x86-mm-L3-unvalidation-preemptible.patch Replaces xsa290-2.patch 5c7e70ff-x86-mm-dont-retain-page-typeref-on-IOMMU-fail.patch Replaces xsa291.patch 5c7e711c-x86-mm-properly-flush-TLB-in-switch_cr3_cr4.patch Replaces xsa292.patch 5c7e714c-x86-pv-rewrite-guest-cr4-handling.patch Replaces xsa293-1.patch 5c7e716d-x86-pv-restrict-cr4-fsgsbase.patch Replaces xsa293-2.patch 5c7e7192-x86-pv-toggle_guest_pt-TLB-flush-for-shadow.patch Replaces xsa294.patch 5c7e9d9c-x86-mm-fix-GP-0-in-switch_cr3_cr4.patch 5c87b644-IOMMU-leave-enabled-for-kexec-crash.patch 5c87b6a2-x86-HVM-dont-crash-guest-in-find_mmio_cache.patch 5c87e6d1-x86-TSX-controls-for-RTM-force-abort-mode.patch x86-cmdline-parse-fix.patch 5c8f752c-x86-e820-build-with-gcc9.patch 5c8fb92d-x86-HVM-split-linear-reads-and-writes.patch 5c8fb951-x86-HVM-finish-IOREQs-correctly-on-completion.patch 5c8fc6c0-x86-MSR-shorten-ARCH_CAPABILITIES.patch 5c8fc6c0-x86-SC-retpoline-safety-calculations-for-eIBRS.patch 5c9e63c5-credit2-SMT-idle-handling.patch 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch- bsc#1079730, bsc#1098403, bsc#1111025 - live migrating PV domUs An earlier change broke live migration of PV domUs without a device model. The migration would stall for 10 seconds while the domU was paused, which caused network connections to drop. Fix this by tracking the need for a device model within libxl. add libxl.pv-qemu-migration.patch remove xen.bug1079730.patch- bsc#1026236 - add Xen cmdline option "suse_vtsc_tolerance" to avoid TSC emulation for HVM domUs if their expected frequency does not match exactly the frequency of the receiving host xen.bug1026236.suse_vtsc_tolerance.patch- bsc#1126325 - fix crash in libxl in error path Setup of grant_tables and other variables may fail libxl.prepare-environment-for-domcreate_stream_done.patch- bsc#1127620 - Documentation for the xl configuration file allows for firmware=pvgrub64 but we don't ship pvgrub64. Create a link from grub.xen to pvgrub64 xen.spec- Upstream bug fixes (bsc#1027519) 5c6d7b01-x86-pmtimer-fix-hvm_acpi_sleep_button.patch 5c6d7b35-x86-shadow-dont-pass-wrong-L4-MFN.patch 5c75615a-viridian-fix-HvFlushVirtualAddress.patch 5c7561aa-x86-shadow-dont-use-map_domain_page_global.patch 5c77c30b-x86-hvm-increase-triple-fault-log-level.patch 5c77e5c8-x86-nmi-correctly-check-MSB-of-P6-perf-counter.patch- bsc#1127400 - VUL-0: CVE-2019-17348: xen: XSA-294: x86 shadow: Insufficient TLB flushing when using PCID xsa294.patch- bsc#1126192 - VUL-0: CVE-2019-17342: xen: XSA-287: x86: steal_page violates page_struct access discipline xsa287.patch - bsc#1126195 - VUL-0: CVE-2019-17343: xen: XSA-288: x86: Inconsistent PV IOMMU discipline xsa288.patch - bsc#1126196 - VUL-0: CVE-2019-17344: xen: XSA-290: missing preemption in x86 PV page table unvalidation xsa290-1.patch xsa290-2.patch - bsc#1126197 - VUL-0: CVE-2019-17345: xen: XSA-291: x86/PV: page type reference counting issue with failed IOMMU update xsa291.patch - bsc#1126198 - VUL-0: CVE-2019-17346: xen: XSA-292: x86: insufficient TLB flushing when using PCID xsa292.patch - bsc#1126201 - VUL-0: CVE-2019-17347: xen: XSA-293: x86: PV kernel context switch corruption xsa293-1.patch xsa293-2.patch- bsc#1126140 - VUL-0: CVE-2019-17340: xen: XSA-284: grant table transfer issues on large hosts xsa284.patch - bsc#1126141 - VUL-0: CVE-2019-17341: xen: XSA-285: race with pass-through device hotplug xsa285.patch- Update to Xen 4.10.3 bug fix release (bsc#1027519) xen-4.10.3-testing-src.tar.bz2 - bsc#1114988 - VUL-0: CVE-2018-19967: xen: guest use of HLE constructs may lock up host (XSA-282) Fix included in tarball - bsc#1120067 - Libvirt segfault when crash triggered on top of HVM guest Fix included in tarball - Drop the following patches contained in the new tarball 5ae31917-x86-cpuidle-init-stats-lock-once.patch 5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch 5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch 5bacae4b-x86-boot-allocate-extra-module-slot.patch 5bae44ce-x86-silence-false-log-messages.patch 5bb60c12-x86-split-opt_xpti.patch 5bb60c4f-x86-split-opt_pv_l1tf.patch 5bb60c74-x86-fix-xpti-and-pv-l1tf.patch 5bcf0722-x86-boot-enable-NMIs.patch 5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch 5bd076e9-x86-boot-init-debug-regs-correctly.patch 5bd076e9-x86-init-vcpu-debug-regs-correctly.patch 5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch 5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch 5bdc31d5-VMX-fix-vmx_handle_eoi.patch 5be2a308-x86-extend-get_platform_badpages.patch 5be2a354-x86-work-around-HLE-host-lockup-erratum.patch 5be9634c-x86-dom0-avoid-using-1G-superpages.patch 5bed93e1-x86-hvm_copy-no-write-to-p2m_ioreq_server.patch 5bf4118c-amd-iommu-fix-flush-checks.patch 5bf41242-AMD-IOMMU-suppress-late-PTE-merging.patch 5bf41311-x86-dont-flush-after-L1e-update-failure.patch 5bf41331-x86-shadow-move-OOS-flag-bits.patch 5bf4135a-x86-shrink-page_info-shadow_flags.patch 5c011aaf-x86-dont-enable-shadow-with-too-small-allocation.patch 5c17ce93-x86-hvm-correct-RDTSCP-intercept-handling.patch 5c18f5ad-x86emul-fix-3-operand-IMUL.patch 5c190203-x86emul-work-around-SandyBridge-errata.patch 5c3608fa-fix-MEMF_no_dma-allocations-for-single-NUMA.patch 5c3dd8fa-cmdline-fix-strncmp-LITERAL-construct.patch- Upstream bug fixes (bsc#1027519) 5c17ce93-x86-hvm-correct-RDTSCP-intercept-handling.patch 5c18f5ad-x86emul-fix-3-operand-IMUL.patch 5c190203-x86emul-work-around-SandyBridge-errata.patch 5c3608fa-fix-MEMF_no_dma-allocations-for-single-NUMA.patch 5c3dd8fa-cmdline-fix-strncmp-LITERAL-construct.patch- Upstream bug fixes (bsc#1027519) 5be9634c-x86-dom0-avoid-using-1G-superpages.patch 5bed93e1-x86-hvm_copy-no-write-to-p2m_ioreq_server.patch 5bf4118c-amd-iommu-fix-flush-checks.patch replaces xsa275-1.patch 5bf41242-AMD-IOMMU-suppress-late-PTE-merging.patch replaces xsa275-2.patch 5bf41311-x86-dont-flush-after-L1e-update-failure.patch replaces xsa279.patch 5bf41331-x86-shadow-move-OOS-flag-bits.patch replaces xsa280-1.patch 5bf4135a-x86-shrink-page_info-shadow_flags.patch replaces xsa280-2.patch 5c011aaf-x86-dont-enable-shadow-with-too-small-allocation.patch 5c0f786c-parse_size_and_unit-percent.patch 5c0f7894-x86-dom0_mem-variants.patch- bsc#1115040 - VUL-0: xen: insufficient TLB flushing / improper large page mappings with AMD IOMMUs (XSA-275) xsa275-1.patch xsa275-2.patch - bsc#1115045 - VUL-0: xen: x86: DoS from attempting to use INVPCID with a non-canonical addresses (XSA-279) xsa279.patch - bsc#1115047 - VUL-0: xen: Fix for XSA-240 conflicts with shadow paging (XSA-280) xsa280-1.patch xsa280-2.patch - bsc#1108940 - L3: XEN SLE12-SP1 domU hang on SLE12-SP3 HV 5bdc31d5-VMX-fix-vmx_handle_eoi.patch - bsc#1105528 - L3: xpti=no-dom0 not working as expected 5bb60c12-x86-split-opt_xpti.patch 5bb60c4f-x86-split-opt_pv_l1tf.patch 5bb60c74-x86-fix-xpti-and-pv-l1tf.patch - Upstream bug fixes (bsc#1027519) 5bae44ce-x86-silence-false-log-messages.patch 5bcf0722-x86-boot-enable-NMIs.patch 5bd076e9-x86-boot-init-debug-regs-correctly.patch 5bd076e9-x86-init-vcpu-debug-regs-correctly.patch 5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch 5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch 5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch 5be2a308-x86-extend-get_platform_badpages.patch 5be2a354-x86-work-around-HLE-host-lockup-erratum.patch- bsc#1114405 - VUL-0: CVE-2018-18883: xen: Nested VT-x usable even when disabled (XSA-278) 5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch- Upstream bug fixes (bsc#1027519) 5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch 5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch 5bacae4b-x86-boot-allocate-extra-module-slot.patch- Update to Xen 4.10.2 bug fix release (bsc#1027519) xen-4.10.2-testing-src.tar.bz2 - Drop the following patches contained in the new tarball 5a6703cb-x86-move-invocations-of-hvm_flush_guest_tlbs.patch 5a957d0e-gnttab-introduce-cmdline-feature-controls.patch 5a9985bd-x86-invpcid-support.patch 5ad4923e-x86-correct-S3-resume-ordering.patch 5ad49293-x86-suppress-BTI-mitigations-around-S3.patch 5ad600d4-x86-pv-introduce-x86emul_read_dr.patch 5ad600d4-x86-pv-introduce-x86emul_write_dr.patch 5ad8c3a7-x86-spec_ctrl-update-retpoline-decision-making.patch 5adda097-x86-HPET-fix-race-triggering-ASSERT.patch 5adda0d5-x86-HVM-never-retain-emulated-insn-cache.patch 5adde9ed-xpti-fix-double-fault-handling.patch 5ae06fad-SVM-fix-intercepts-for-SYS-CALL-ENTER-MSRs.patch 5aeaeae4-introduce-vcpu_sleep_nosync_locked.patch 5aeaeaf0-sched-fix-races-in-vcpu-migration.patch 5aeb2c57-x86-retval-checks-of-set-guest-trapbounce.patch 5af03009-x86-pv-hide-more-EFER-bits-from-PV.patch 5af1daa9-1-x86-traps-fix-dr6-handing-in-DB-handler.patch 5af1daa9-2-x86-pv-move-exception-injection-into-test_all_events.patch 5af1daa9-3-x86-traps-use-IST-for-DB.patch 5af1daa9-4-x86-traps-fix-handling-of-DB-in-hypervisor-context.patch 5af1daa9-x86-vpt-support-IO-APIC-routed-intr.patch 5af1daa9-x86-HVM-guard-against-bogus-emulator-ioreq-state.patch 5af97999-viridian-cpuid-leaf-40000003.patch 5afc13ae-1-x86-read-MSR_ARCH_CAPABILITIES-once.patch 5afc13ae-2-x86-express-Xen-SPEC_CTRL-choice-as-variable.patch 5afc13ae-3-x86-merge-bti_ist_info-use_shadow_spec_ctrl.patch 5afc13ae-4-x86-fold-XEN_IBRS-ALTERNATIVES.patch 5afc13ae-5-x86-rename-bits-of-spec_ctrl-infrastructure.patch 5afc13ae-6-x86-elide-MSR_SPEC_CTRL-handling-in-idle.patch 5afc13ae-7-x86-split-X86_FEATURE_SC_MSR.patch 5afc13ae-8-x86-explicitly-set-Xen-default-SPEC_CTRL.patch 5afc13ae-9-x86-cpuid-improve-guest-policies-for-speculative.patch 5afc13ae-A-x86-introduce-spec-ctrl-cmdline-opt.patch 5aec7393-1-x86-xpti-avoid-copy.patch 5aec7393-2-x86-xpti-write-cr3.patch 5aec744a-3-x86-xpti-per-domain-flag.patch 5aec744a-4-x86-xpti-use-invpcid.patch 5aec744a-5-x86-xpti-no-global-pages.patch 5aec744a-6-x86-xpti-cr3-valid-flag.patch 5aec744a-7-x86-xpti-pv_guest_cr4_to_real_cr4.patch 5aec744b-8-x86-xpti-cr3-helpers.patch 5aec74a8-9-x86-xpti-use-pcid.patch 5b02c786-x86-AMD-mitigations-for-GPZ-SP4.patch 5b02c786-x86-Intel-mitigations-for-GPZ-SP4.patch 5b02c786-x86-msr-virtualise-SPEC_CTRL-SSBD.patch 5b0bc9da-x86-XPTI-fix-S3-resume.patch 5b0d2286-libxc-x86-PV-dont-hand-through-CPUID-leaf-0x80000008.patch 5b0d2dbc-x86-correct-default_xen_spec_ctrl.patch 5b0d2ddc-x86-CPUID-dont-override-tool-stack-hidden-STIBP.patch 5b150ef9-x86-fix-error-handling-of-pv-dr7-shadow.patch 5b21825d-1-x86-support-fully-eager-FPU-context-switching.patch 5b21825d-2-x86-spec-ctrl-mitigations-for-LazyFPU.patch 5b238b92-x86-HVM-account-for-fully-eager-FPU.patch 5b2b7172-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b31e004-x86-HVM-emul-attempts-FPU-set-fpu_initialised.patch 5b323e3c-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b34882d-x86-mm-dont-bypass-preemption-checks.patch 5b348874-x86-refine-checks-in-DB-handler.patch 5b348897-libxl-qemu_disk_scsi_drive_string-break-out-common.patch 5b3488a2-libxl-restore-passing-ro-to-qemu-for-SCSI-disks.patch 5b34891a-x86-HVM-dont-cause-NM-to-be-raised.patch 5b348954-x86-guard-against-NM.patch 5b3f8fa5-port-array_index_nospec-from-Linux.patch 5b4488e7-x86-spec-ctrl-cmdline-handling.patch 5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch 5b4c9a60-allow-cpu_down-to-be-called-earlier.patch 5b4db308-SVM-fix-cleanup-svm_inject_event.patch 5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch 5b5040f2-x86-AMD-distinguish-CU-from-HT.patch 5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch 5b508775-2-x86-possibly-bring-up-all-CPUs.patch 5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch 5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch 5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch 5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch 5b56feb1-x86-hvm-disallow-unknown-EFER-bits.patch 5b56feb2-x86-XPTI-parsing-on-fixed-Intel-HW.patch 5b62ca93-VMX-avoid-hitting-BUG_ON.patch 5b6d84ac-x86-fix-improve-vlapic-read-write.patch 5b6d8ce2-x86-XPTI-parsing.patch 5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch 5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch 5b3cab8e-2-VMX-improve-MSR-load-save-API.patch 5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch 5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch 5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch 5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch 5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch 5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch 5b505fe5-VMX-fix-find-msr-build.patch 5b72fbbe-ARM-disable-grant-table-v2.patch 5b72fbbe-oxenstored-eval-order.patch 5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch 5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch 5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch 5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch 5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch 5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch 5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch 5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch 5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch 5b72fbbf-9-spec-ctrl=no-global-disable.patch 5b72fbbf-A-xl-conf-add-global-affinity-masks.patch 5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch 5b75afef-x86-setup-avoid-OoB-E820-lookup.patch 5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch 5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch 5b8d5832-x86-assorted-array_index_nospec-insertions.patch- bsc#1094508 - L3: Kernel oops in fs/dcache.c called by d_materialise_unique() 5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch 5b9784d2-x86-HVM-add-known_gla-helper.patch 5b9784f2-x86-HVM-split-page-straddling-accesses.patch - bsc#1103279 - (CVE-2018-15470) VUL-0: CVE-2018-15470: xen: oxenstored does not apply quota-maxentity (XSA-272) 5b72fbbe-oxenstored-eval-order.patch - bsc#1103275 - (CVE-2018-15469) VUL-0: CVE-2018-15469: xen: Use of v2 grant tables may cause crash on ARM (XSA-268) 5b72fbbe-ARM-disable-grant-table-v2.patch - bsc#1103276 - VUL-0: CVE-2018-15468: xen: x86: Incorrect MSR_DEBUGCTL handling lets guests enable BTS (XSA-269) 5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch (Replaces xsa269.patch) - bsc#1091107 - VUL-0: CVE-2018-3646: xen: L1 Terminal Fault -VMM (XSA-273) 5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch (Replaces xsa273-1.patch) 5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch (Replaces xsa273-2.patch) 5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch (Replaces xsa273-3.patch) 5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch (Replaces xsa273-4.patch) 5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch (Replaces xsa273-5.patch) 5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch (Replaces xsa273-6.patch) 5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch (Replaces xsa273-7.patch) 5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch (Replaces xsa273-8.patch) 5b72fbbf-9-spec-ctrl=no-global-disable.patch 5b72fbbf-A-xl-conf-add-global-affinity-masks.patch - Upstream patches from Jan (bsc#1027519) 5a957d0e-gnttab-introduce-cmdline-feature-controls.patch 5b6d84ac-x86-fix-improve-vlapic-read-write.patch 5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch 5b75afef-x86-setup-avoid-OoB-E820-lookup.patch 5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch 5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch 5b8d5832-x86-assorted-array_index_nospec-insertions.patch- bsc#1078292 - rpmbuild -ba SPECS/xen.spec with xen-4.9.1 failed xen.spec- bsc#1091107 - VUL-0: CVE-2018-3646: xen: L1 Terminal Fault -VMM (XSA-273) xsa273-1.patch xsa273-2.patch xsa273-3.patch xsa273-4.patch xsa273-5.patch xsa273-6.patch xsa273-7.patch xsa273-8.patch - Upstream prereq patches for XSA-273 (bsc#1027519) 5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch 5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch 5b3cab8e-2-VMX-improve-MSR-load-save-API.patch 5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch 5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch 5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch 5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch 5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch 5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch 5b505fe5-VMX-fix-find-msr-build.patch 5b62ca93-VMX-avoid-hitting-BUG_ON.patch 5b6d8ce2-x86-XPTI-parsing.patch- bsc#1103276 - VUL-0: CVE-2018-15468: xen: x86: Incorrect MSR_DEBUGCTL handling lets guests enable BTS (XSA-269) xsa269.patch- Upstream patches from Jan (bsc#1027519) 5af03009-x86-pv-hide-more-EFER-bits-from-PV.patch 5b3f8fa5-port-array_index_nospec-from-Linux.patch 5b4488e7-x86-spec-ctrl-cmdline-handling.patch 5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch 5b4c9a60-allow-cpu_down-to-be-called-earlier.patch 5b4db308-SVM-fix-cleanup-svm_inject_event.patch 5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch 5b5040f2-x86-AMD-distinguish-CU-from-HT.patch 5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch 5b508775-2-x86-possibly-bring-up-all-CPUs.patch 5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch 5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch 5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch 5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch 5b56feb1-x86-hvm-disallow-unknown-EFER-bits.patch 5b56feb2-x86-XPTI-parsing-on-fixed-Intel-HW.patch- Upstream patches from Jan (bsc#1027519) 5b02c786-x86-AMD-mitigations-for-GPZ-SP4.patch (Replaces Spectre-v4-1.patch) 5b02c786-x86-Intel-mitigations-for-GPZ-SP4.patch (Replaces Spectre-v4-2.patch) 5b02c786-x86-msr-virtualise-SPEC_CTRL-SSBD.patch (Replaces Spectre-v4-3.patch) 5b0bc9da-x86-XPTI-fix-S3-resume.patch 5b0d2286-libxc-x86-PV-dont-hand-through-CPUID-leaf-0x80000008.patch 5b0d2d91-x86-suppress-sync-when-XPTI-off.patch 5b0d2dbc-x86-correct-default_xen_spec_ctrl.patch 5b0d2ddc-x86-CPUID-dont-override-tool-stack-hidden-STIBP.patch 5b150ef9-x86-fix-error-handling-of-pv-dr7-shadow.patch 5b21825d-1-x86-support-fully-eager-FPU-context-switching.patch (Replaces xsa267-1.patch) 5b21825d-2-x86-spec-ctrl-mitigations-for-LazyFPU.patch (Replaces xsa267-2.patch) 5b238b92-x86-HVM-account-for-fully-eager-FPU.patch 5b2b7172-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b31e004-x86-HVM-emul-attempts-FPU-set-fpu_initialised.patch 5b323e3c-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b34882d-x86-mm-dont-bypass-preemption-checks.patch (Replaces xsa264.patch) 5b348874-x86-refine-checks-in-DB-handler.patch (Replaces xsa265.patch) 5b348897-libxl-qemu_disk_scsi_drive_string-break-out-common.patch (Replaces xsa266-1-<>.patch) 5b3488a2-libxl-restore-passing-ro-to-qemu-for-SCSI-disks.patch (Replaces xsa266-2-<>.patch) 5b34891a-x86-HVM-dont-cause-NM-to-be-raised.patch 5b348954-x86-guard-against-NM.patch- Fix more build gcc8 related failures with xen.fuzz-_FORTIFY_SOURCE.patch- bsc#1098403 - fix regression introduced by changes for bsc#1079730 a PV domU without qcow2 and/or vfb has no qemu attached. Ignore QMP errors for PV domUs to handle PV domUs with and without an attached qemu-xen. xen.bug1079730.patch- bsc#1097521 - VUL-0: CVE-2018-12891: xen: preemption checks bypassed in x86 PV MM handling (XSA-264) xsa264.patch - bsc#1097522 - VUL-0: CVE-2018-12893: xen: x86: #DB exception safety check can be triggered by a guest (XSA-265) xsa265.patch - bsc#1097523 - VUL-0: CVE-2018-12892: xen: libxl fails to honour readonly flag on HVM emulated SCSI disks (XSA-266) xsa266-1-libxl-qemu_disk_scsi_drive_string-Break-out-common-p.patch xsa266-2-libxl-restore-passing-readonly-to-qemu-for-SCSI-disk.patch- bsc#1095242 - VUL-0: CVE-2018-3665: xen: Lazy FP Save/Restore (XSA-267) xsa267-1.patch xsa267-2.patch- bsc#1092631 - VUL-0: CVE-2018-3639: xen: V4 – Speculative Store Bypass aka "Memory Disambiguation" (XSA-263) 5ad4923e-x86-correct-S3-resume-ordering.patch 5ad49293-x86-suppress-BTI-mitigations-around-S3.patch 5afc13ae-1-x86-read-MSR_ARCH_CAPABILITIES-once.patch 5afc13ae-2-x86-express-Xen-SPEC_CTRL-choice-as-variable.patch 5afc13ae-3-x86-merge-bti_ist_info-use_shadow_spec_ctrl.patch 5afc13ae-4-x86-fold-XEN_IBRS-ALTERNATIVES.patch 5afc13ae-5-x86-rename-bits-of-spec_ctrl-infrastructure.patch 5afc13ae-6-x86-elide-MSR_SPEC_CTRL-handling-in-idle.patch 5afc13ae-7-x86-split-X86_FEATURE_SC_MSR.patch 5afc13ae-8-x86-explicitly-set-Xen-default-SPEC_CTRL.patch 5afc13ae-9-x86-cpuid-improve-guest-policies-for-speculative.patch 5afc13ae-A-x86-introduce-spec-ctrl-cmdline-opt.patch Spectre-v4-1.patch Spectre-v4-2.patch Spectre-v4-3.patch- Always call qemus xen-save-devices-state in suspend/resume to fix migration with qcow2 images (bsc#1079730) libxl.Add-a-version-check-of-QEMU-for-QMP-commands.patch libxl.qmp-Tell-QEMU-about-live-migration-or-snapshot.patch xen.bug1079730.patch- bsc#1087289 - L3: Xen BUG at sched_credit.c:1663 5aeaeae4-introduce-vcpu_sleep_nosync_locked.patch 5aeaeaf0-sched-fix-races-in-vcpu-migration.patch - Upstream patches from Jan (bsc#1027519) 5ad600d4-x86-pv-introduce-x86emul_read_dr.patch 5ad600d4-x86-pv-introduce-x86emul_write_dr.patch 5ad8c3a7-x86-spec_ctrl-update-retpoline-decision-making.patch 5adda097-x86-HPET-fix-race-triggering-ASSERT.patch 5adda0d5-x86-HVM-never-retain-emulated-insn-cache.patch 5ae06fad-SVM-fix-intercepts-for-SYS-CALL-ENTER-MSRs.patch 5ae31917-x86-cpuidle-init-stats-lock-once.patch 5aeb2c57-x86-retval-checks-of-set-guest-trapbounce.patch 5af1daa9-1-x86-traps-fix-dr6-handing-in-DB-handler.patch (Replaces xsa260-1.patch) 5af1daa9-2-x86-pv-move-exception-injection-into-test_all_events.patch (Replaces xsa260-2.patch) 5af1daa9-3-x86-traps-use-IST-for-DB.patch (Replaces xsa260-3.patch) 5af1daa9-4-x86-traps-fix-handling-of-DB-in-hypervisor-context.patch (Replaces xsa260-4.patch) 5af1daa9-x86-HVM-guard-against-bogus-emulator-ioreq-state.patch (Replaces xsa262.patch) 5af1daa9-x86-vpt-support-IO-APIC-routed-intr.patch (Replaces xsa261.patch) 5af97999-viridian-cpuid-leaf-40000003.patch- Fixes related to Page Table Isolation (XPTI). bsc#1074562 XSA-254 5a6703cb-x86-move-invocations-of-hvm_flush_guest_tlbs.patch 5a9985bd-x86-invpcid-support.patch 5adde9ed-xpti-fix-double-fault-handling.patch 5aec7393-1-x86-xpti-avoid-copy.patch 5aec7393-2-x86-xpti-write-cr3.patch 5aec744a-3-x86-xpti-per-domain-flag.patch 5aec744a-4-x86-xpti-use-invpcid.patch 5aec744a-5-x86-xpti-no-global-pages.patch 5aec744a-6-x86-xpti-cr3-valid-flag.patch 5aec744a-7-x86-xpti-pv_guest_cr4_to_real_cr4.patch 5aec744b-8-x86-xpti-cr3-helpers.patch 5aec74a8-9-x86-xpti-use-pcid.patch- Update to Xen 4.10.1 bug fix release (bsc#1027519) xen-4.10.1-testing-src.tar.bz2 disable-building-pv-shim.patch - Drop the following patches contained in the new tarball 5a21a77e-x86-pv-construct-d0v0s-GDT-properly.patch 5a2fda0d-x86-mb2-avoid-Xen-when-looking-for-module-crashkernel-pos.patch 5a2ffc1f-x86-mm-drop-bogus-paging-mode-assertion.patch 5a313972-x86-microcode-add-support-for-AMD-Fam17.patch 5a32bd79-x86-vmx-dont-use-hvm_inject_hw_exception-in-.patch 5a4caa5e-x86-IRQ-conditionally-preserve-access-perm.patch 5a4caa8c-x86-E820-don-t-overrun-array.patch 5a4e2bca-x86-free-msr_vcpu_policy-during-destruction.patch 5a4e2c2c-x86-upcall-inject-spurious-event-after-setting-vector.patch 5a4fd893-1-x86-break-out-alternative-asm-into-separate-header.patch 5a4fd893-2-x86-introduce-ALTERNATIVE_2-macros.patch 5a4fd893-3-x86-hvm-rename-update_guest_vendor-to-cpuid_policy_changed.patch 5a4fd893-4-x86-introduce-cpuid_policy_updated.patch 5a4fd893-5-x86-entry-remove-partial-cpu_user_regs.patch 5a4fd894-1-x86-rearrange-RESTORE_ALL-to-restore-in-stack-order.patch 5a4fd894-2-x86-hvm-use-SAVE_ALL-after-VMExit.patch 5a4fd894-3-x86-erase-guest-GPRs-on-entry-to-Xen.patch 5a4fd894-4-clarifications-to-wait-infrastructure.patch 5a534c78-x86-dont-use-incorrect-CPUID-values-for-topology.patch 5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4-updates.patch 5a5e2cff-x86-Meltdown-band-aid.patch 5a5e2d73-x86-Meltdown-band-aid-conditional.patch 5a5e3a4e-1-x86-support-compiling-with-indirect-branch-thunks.patch 5a5e3a4e-2-x86-support-indirect-thunks-from-asm.patch 5a5e3a4e-3-x86-report-speculative-mitigation-details.patch 5a5e3a4e-4-x86-AMD-set-lfence-as-Dispatch-Serialising.patch 5a5e3a4e-5-x86-introduce-alternative-indirect-thunks.patch 5a5e3a4e-6-x86-definitions-for-Indirect-Branch-Controls.patch 5a5e3a4e-7-x86-cmdline-opt-to-disable-IBRS-IBPB-STIBP.patch 5a5e459c-1-x86-SVM-offer-CPUID-faulting-to-AMD-HVM-guests.patch 5a5e459c-2-x86-report-domain-id-on-CPUID.patch 5a68bc16-x86-acpi-process-softirqs-logging-Cx.patch 5a69c0b9-x86-fix-GET_STACK_END.patch 5a6b36cd-1-x86-cpuid-handling-of-IBRS-IBPB-STIBP-and-IBRS-for-guests.patch 5a6b36cd-2-x86-msr-emulation-of-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-3-x86-migrate-MSR_SPEC_CTRL.patch 5a6b36cd-4-x86-hvm-permit-direct-access-to-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-5-x86-use-SPEC_CTRL-on-entry.patch 5a6b36cd-6-x86-clobber-RSB-RAS-on-entry.patch 5a6b36cd-7-x86-no-alternatives-in-NMI-MC-paths.patch 5a6b36cd-8-x86-boot-calculate-best-BTI-mitigation.patch 5a6b36cd-9-x86-issue-speculation-barrier.patch 5a6b36cd-A-x86-offer-Indirect-Branch-Controls-to-guests.patch 5a6b36cd-B-x86-clear-SPEC_CTRL-while-idle.patch 5a7b1bdd-x86-reduce-Meltdown-band-aid-IPI-overhead.patch 5a843807-x86-spec_ctrl-fix-bugs-in-SPEC_CTRL_ENTRY_FROM_INTR_IST.patch 5a856a2b-x86-emul-fix-64bit-decoding-of-segment-overrides.patch 5a856a2b-x86-use-32bit-xors-for-clearing-GPRs.patch 5a856a2b-x86-xpti-hide-almost-all-of-Xen-image-mappings.patch 5a8be788-x86-nmi-start-NMI-watchdog-on-CPU0-after-SMP.patch 5a95373b-x86-PV-avoid-leaking-other-guests-MSR_TSC_AUX.patch 5a95571f-memory-dont-implicitly-unpin-in-decrease-res.patch 5a95576c-gnttab-ARM-dont-corrupt-shared-GFN-array.patch 5a955800-gnttab-dont-free-status-pages-on-ver-change.patch 5a955854-x86-disallow-HVM-creation-without-LAPIC-emul.patch 5a956747-x86-HVM-dont-give-wrong-impression-of-WRMSR-success.patch 5a9eb7f1-x86-xpti-dont-map-stack-guard-pages.patch 5a9eb85c-x86-slightly-reduce-XPTI-overhead.patch 5a9eb890-x86-remove-CR-reads-from-exit-to-guest-path.patch 5aa2b6b9-cpufreq-ondemand-CPU-offlining-race.patch 5aaa9878-x86-vlapic-clear-TMR-bit-for-edge-triggered-intr.patch xsa258.patch xsa259.patch- bsc#1090820 - VUL-0: CVE-2018-8897: xen: x86: mishandling of debug exceptions (XSA-260) xsa260-1.patch xsa260-2.patch xsa260-3.patch xsa260-4.patch - bsc#1090822 - VUL-0: CVE-2018-10982: xen: x86 vHPET interrupt injection errors (XSA-261) xsa261.patch - bsc#1090823 - VUL-0: CVE-2018-10981: xen: qemu may drive Xen into unbounded loop (XSA-262) xsa262.patch- bsc#1089152 - VUL-0: CVE-2018-10472: xen: Information leak via crafted user-supplied CDROM (XSA-258) xsa258.patch - bsc#1089635 - VUL-0: CVE-2018-10471: xen: x86: PV guest may crash Xen with XPTI (XSA-259) xsa259.patch- Preserve xen-syms from xen-dbg.gz to allow processing vmcores with crash(1) (bsc#1087251)- Upstream patches from Jan (bsc#1027519) and fixes related to Page Table Isolation (XPTI). See also bsc#1074562 XSA-254 5a856a2b-x86-xpti-hide-almost-all-of-Xen-image-mappings.patch 5a9eb7f1-x86-xpti-dont-map-stack-guard-pages.patch 5a9eb85c-x86-slightly-reduce-XPTI-overhead.patch 5a9eb890-x86-remove-CR-reads-from-exit-to-guest-path.patch 5aa2b6b9-cpufreq-ondemand-CPU-offlining-race.patch 5aaa9878-x86-vlapic-clear-TMR-bit-for-edge-triggered-intr.patch- bsc#1072834 - Xen HVM: unchecked MSR access error: RDMSR from 0xc90 at rIP: 0xffffffff93061456 (native_read_msr+0x6/0x30) 5a956747-x86-HVM-dont-give-wrong-impression-of-WRMSR-success.patch - Upstream patches from Jan (bsc#1027519) 5a79d7ed-libxc-packed-initrd-dont-fail-domain-creation.patch 5a7b1bdd-x86-reduce-Meltdown-band-aid-IPI-overhead.patch 5a843807-x86-spec_ctrl-fix-bugs-in-SPEC_CTRL_ENTRY_FROM_INTR_IST.patch 5a856a2b-x86-emul-fix-64bit-decoding-of-segment-overrides.patch 5a856a2b-x86-use-32bit-xors-for-clearing-GPRs.patch 5a8be788-x86-nmi-start-NMI-watchdog-on-CPU0-after-SMP.patch 5a95373b-x86-PV-avoid-leaking-other-guests-MSR_TSC_AUX.patch 5a95571f-memory-dont-implicitly-unpin-in-decrease-res.patch (Replaces xsa252.patch) 5a95576c-gnttab-ARM-dont-corrupt-shared-GFN-array.patch (Replaces xsa255-1.patch) 5a955800-gnttab-dont-free-status-pages-on-ver-change.patch (Replaces xsa255-2.patch) 5a955854-x86-disallow-HVM-creation-without-LAPIC-emul.patch (Replaces xsa256.patch) - Drop xsa252.patch xsa255-1.patch xsa255-2.patch xsa256.patch- bsc#1080635 - VUL-0: CVE-2018-7540: xen: DoS via non-preemptable L3/L4 pagetable freeing (XSA-252) xsa252.patch - bsc#1080662 - VUL-0: CVE-2018-7541: xen: grant table v2 -> v1 transition may crash Xen (XSA-255) xsa255-1.patch xsa255-2.patch - bsc#1080634 - VUL-0: CVE-2018-7542: xen: x86 PVH guest without LAPIC may DoS the host (XSA-256) xsa256.patch- Remove stale systemd presets code for 13.2 and older- fate#324965 - add script, udev rule and systemd service to watch for vcpu online/offline events in a HVM domU They are triggered via xl vcpu-set domU N- Replace hardcoded xen with Name tag when refering to subpkgs- Make sure tools and tools-domU require libs from the very same build- tools-domU: Add support for qemu guest agent. New files 80-xen-channel-setup.rules and xen-channel-setup.sh configure a xen-pv-channel for use by the guest agent FATE#324963- Remove outdated /etc/xen/README*- bsc#1073961 - VUL-0: CVE-2018-5244: xen: x86: memory leak with MSR emulation (XSA-253) 5a4e2bca-x86-free-msr_vcpu_policy-during-destruction.patch - bsc#1074562 - VUL-0: CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 xen: Information leak via side effects of speculative execution (XSA-254). Includes Spectre v2 mitigation. 5a4caa5e-x86-IRQ-conditionally-preserve-access-perm.patch 5a4caa8c-x86-E820-don-t-overrun-array.patch 5a4e2c2c-x86-upcall-inject-spurious-event-after-setting-vector.patch 5a4fd893-1-x86-break-out-alternative-asm-into-separate-header.patch 5a4fd893-2-x86-introduce-ALTERNATIVE_2-macros.patch 5a4fd893-3-x86-hvm-rename-update_guest_vendor-to-cpuid_policy_changed.patch 5a4fd893-4-x86-introduce-cpuid_policy_updated.patch 5a4fd893-5-x86-entry-remove-partial-cpu_user_regs.patch 5a4fd894-1-x86-rearrange-RESTORE_ALL-to-restore-in-stack-order.patch 5a4fd894-2-x86-hvm-use-SAVE_ALL-after-VMExit.patch 5a4fd894-3-x86-erase-guest-GPRs-on-entry-to-Xen.patch 5a4fd894-4-clarifications-to-wait-infrastructure.patch 5a534c78-x86-dont-use-incorrect-CPUID-values-for-topology.patch 5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4-updates.patch 5a5e2cff-x86-Meltdown-band-aid.patch 5a5e2d73-x86-Meltdown-band-aid-conditional.patch 5a5e3a4e-1-x86-support-compiling-with-indirect-branch-thunks.patch 5a5e3a4e-2-x86-support-indirect-thunks-from-asm.patch 5a5e3a4e-3-x86-report-speculative-mitigation-details.patch 5a5e3a4e-4-x86-AMD-set-lfence-as-Dispatch-Serialising.patch 5a5e3a4e-5-x86-introduce-alternative-indirect-thunks.patch 5a5e3a4e-6-x86-definitions-for-Indirect-Branch-Controls.patch 5a5e3a4e-7-x86-cmdline-opt-to-disable-IBRS-IBPB-STIBP.patch 5a5e459c-1-x86-SVM-offer-CPUID-faulting-to-AMD-HVM-guests.patch 5a5e459c-2-x86-report-domain-id-on-CPUID.patch 5a68bc16-x86-acpi-process-softirqs-logging-Cx.patch 5a69c0b9-x86-fix-GET_STACK_END.patch 5a6b36cd-1-x86-cpuid-handling-of-IBRS-IBPB-STIBP-and-IBRS-for-guests.patch 5a6b36cd-2-x86-msr-emulation-of-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-3-x86-migrate-MSR_SPEC_CTRL.patch 5a6b36cd-4-x86-hvm-permit-direct-access-to-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-5-x86-use-SPEC_CTRL-on-entry.patch 5a6b36cd-6-x86-clobber-RSB-RAS-on-entry.patch 5a6b36cd-7-x86-no-alternatives-in-NMI-MC-paths.patch 5a6b36cd-8-x86-boot-calculate-best-BTI-mitigation.patch 5a6b36cd-9-x86-issue-speculation-barrier.patch 5a6b36cd-A-x86-offer-Indirect-Branch-Controls-to-guests.patch 5a6b36cd-B-x86-clear-SPEC_CTRL-while-idle.patch- Fix python3 deprecated atoi call (bsc#1067224) pygrub-python3-conversion.patch - Drop xenmon-python3-conversion.patch- bsc#1067317 - pass cache=writeback|unsafe|directsync to qemu, depending on the libxl disk settings libxl.add-option-to-disable-disk-cache-flushes-in-qdisk.patch- Remove libxl.LIBXL_DESTROY_TIMEOUT.debug.patch- bsc#1067224 - xen-tools have hard dependency on Python 2 build-python3-conversion.patch bin-python3-conversion.patch- bsc#1070165 - xen crashes after aborted localhost migration 5a2ffc1f-x86-mm-drop-bogus-paging-mode-assertion.patch - bsc#1035442 - L3: libxl: error: libxl.c:1676:devices_destroy_cb: libxl__devices_destroy failed 5a33a12f-domctl-improve-locking-during-domain-destruction.patch - Upstream patches from Jan (bsc#1027519) 5a21a77e-x86-pv-construct-d0v0s-GDT-properly.patch 5a2fda0d-x86-mb2-avoid-Xen-when-looking-for-module-crashkernel-pos.patch 5a313972-x86-microcode-add-support-for-AMD-Fam17.patch 5a32bd79-x86-vmx-dont-use-hvm_inject_hw_exception-in-.patch- Update to Xen 4.10.0 FCS (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Rebuild initrd if xen-tools-domU is updated- Update to Xen 4.10.0-rc8 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Increase the value of LIBXL_DESTROY_TIMEOUT from 10 to 100 seconds If many domUs shutdown in parallel the backends can not keep up Add some debug output to track how long backend shutdown takes (bsc#1035442) libxl.LIBXL_DESTROY_TIMEOUT.patch libxl.LIBXL_DESTROY_TIMEOUT.debug.patch- Adjust xenstore-run-in-studomain.patch to change the defaults in the code instead of changing the sysconfig template, to also cover the upgrade case- Update to Xen 4.10.0-rc6 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Since xen switched to Kconfig, building a debug hypervisor was done by default. Adjust make logic to build a non-debug hypervisor by default, and continue to provide one as xen-dbg.gz- fate#316614: set migration constraints from cmdline fix libxl.set-migration-constraints-from-cmdline.patch for xen-4.10- Document the suse-diskcache-disable-flush option in xl-disk-configuration(5) (bsc#879425,bsc#1067317)- Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468)- Update to Xen 4.10.0-rc5 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - fate#323663 - Run Xenstore in stubdomain xenstore-run-in-studomain.patch- bsc#1067224 - xen-tools have hard dependency on Python 2 pygrub-python3-conversion.patch xenmon-python3-conversion.patch migration-python3-conversion.patch xnloader.py xen2libvirt.py- Remove xendriverdomain.service (bsc#1065185) Driver domains must be configured manually with custom .service file- Update to Xen 4.10.0-rc3 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - Drop 59f31268-libxc-remove-stale-error-check-for-domain-size.patch- Adjust xen-dom0-modules.service to ignore errors (bsc#1065187)- fate#324052 Support migration of Xen HVM domains larger than 1TB 59f31268-libxc-remove-stale-error-check-for-domain-size.patch- Update to Xen 4.10.0-rc2 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Update to Xen 4.10.0-rc1 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - Drop patches included in new tarball 592fd5f0-stop_machine-fill-result-only-in-case-of-error.patch 596f257e-x86-fix-hvmemul_insn_fetch.patch 5982fd99-VT-d-don-t-panic-warn-on-iommu-no-igfx.patch 598c3630-VT-d-PI-disable-when-CPU-side-PI-is-off.patch 598c3706-cpufreq-only-stop-ondemand-governor-if-started.patch 5992f1e5-x86-grant-disallow-misaligned-PTEs.patch 5992f20d-gnttab-split-maptrack-lock-to-make-it-useful-again.patch 5992f233-gnttab-correct-pin-status-fixup-for-copy.patch 59958e76-gnttab-dont-use-possibly-unbounded-tail-calls.patch 59958ebf-gnttab-fix-transitive-grant-handling.patch 59958edd-gnttab-avoid-spurious-maptrack-handle-alloc-failures.patch 599da329-arm-mm-release-grant-lock-on-xatp1-error-paths.patch 59a01223-x86-check-for-alloc-errors-in-modify_xen_mappings.patch 59a0130c-x86-efi-dont-write-relocs-in-efi_arch_relocate_image-1st-pass.patch 59a9221f-VT-d-use-correct-BDF-for-VF-to-search-VT-d-unit.patch 59ae9177-x86-emul-fix-handling-of-unimplemented-Grp7-insns.patch 59aec335-x86emul-correct-VEX-W-handling-for-VPINSRD.patch 59aec375-x86emul-correct-VEX-L-handling-for-VCVTx2SI.patch 59afcea0-x86-introduce-and-use-setup_force_cpu_cap.patch 59b2a7f2-x86-HVM-correct-repeat-count-update-linear-phys.patch 59b7d664-mm-make-sure-node-is-less-than-MAX_NUMNODES.patch 59b7d69b-grant_table-fix-GNTTABOP_cache_flush-handling.patch 59b7d6c8-xenstore-dont-unlink-connection-object-twice.patch 59b7d6d9-gnttab-also-validate-PTE-perms-upon-destroy-replace.patch gcc7-arm.patch gcc7-mini-os.patch- bsc#1061084 - VUL-0: xen: page type reference leak on x86 (XSA-242) xsa242.patch - bsc#1061086 - VUL-0: xen: x86: Incorrect handling of self-linear shadow mappings with translated guests (XSA-243) xsa243.patch - bsc#1061087 - VUL-0: xen: x86: Incorrect handling of IST settings during CPU hotplug (XSA-244) xsa244.patch- bsc#1061077 - VUL-0: xen: DMOP map/unmap missing argument checks (XSA-238) xsa238.patch - bsc#1061080 - VUL-0: xen: hypervisor stack leak in x86 I/O intercept code (XSA-239) xsa239.patch - bsc#1061081 - VUL-0: xen: Unlimited recursion in linear pagetable de-typing (XSA-240) xsa240-1.patch xsa240-2.patch - bsc#1061082 - VUL-0: xen: Stale TLB entry due to page type release race (XSA-241) xsa241.patch- bsc#1061075 - VUL-0: xen: pin count / page reference race in grant table code (XSA-236) xsa236.patch - bsc#1061076 - VUL-0: xen: multiple MSI mapping issues on x86 (XSA-237) xsa237-1.patch xsa237-2.patch xsa237-3.patch xsa237-4.patch xsa237-5.patch- bsc#1056278 - VUL-0: xen: Missing NUMA node parameter verification (XSA-231) 59b7d664-mm-make-sure-node-is-less-than-MAX_NUMNODES.patch - bsc#1056280 - VUL-0: xen: Missing check for grant table (XSA-232) 59b7d69b-grant_table-fix-GNTTABOP_cache_flush-handling.patch - bsc#1056281 - VUL-0: xen: cxenstored: Race in domain cleanup (XSA-233) 59b7d6c8-xenstore-dont-unlink-connection-object-twice.patch - bsc#1056282 - VUL-0: xen: insufficient grant unmapping checks for x86 PV guests (XSA-234) 59b7d6d9-gnttab-also-validate-PTE-perms-upon-destroy-replace.patch - bsc#1055321 - VUL-0: xen: add-to-physmap error paths fail to release lock on ARM (XSA-235) 599da329-arm-mm-release-grant-lock-on-xatp1-error-paths.patch - Upstream patches from Jan (bsc#1027519) 59a01223-x86-check-for-alloc-errors-in-modify_xen_mappings.patch 59a0130c-x86-efi-dont-write-relocs-in-efi_arch_relocate_image-1st-pass.patch 59a9221f-VT-d-use-correct-BDF-for-VF-to-search-VT-d-unit.patch 59ae9177-x86-emul-fix-handling-of-unimplemented-Grp7-insns.patch 59aec335-x86emul-correct-VEX-W-handling-for-VPINSRD.patch 59aec375-x86emul-correct-VEX-L-handling-for-VCVTx2SI.patch 59afcea0-x86-introduce-and-use-setup_force_cpu_cap.patch 59b2a7f2-x86-HVM-correct-repeat-count-update-linear-phys.patch - Dropped gcc7-xen.patch- bsc#1057358 - Cannot Boot into SLES12.3 with Xen hypervisor when Secure Boot is Enabled xen.spec- bsc#1055695 - XEN: 11SP4 and 12SP3 HVM guests can not be restored update from v6 to v9 to cover more cases for ballooned domUs libxc.sr.superpage.patch- bsc#1026236 - remove suse_vtsc_tolerance= cmdline option for Xen drop the patch because it is not upstream acceptable remove xen.suse_vtsc_tolerance.patch- bsc#1055695 - XEN: 11SP4 and 12SP3 HVM guests can not be restored after the save using xl stack libxc.sr.superpage.patch- Unignore gcc-PIE the toolstack disables PIE for firmware builds as needed- Upstream patches from Jan (bsc#1027519) 592fd5f0-stop_machine-fill-result-only-in-case-of-error.patch 596f257e-x86-fix-hvmemul_insn_fetch.patch 5982fd99-VT-d-don-t-panic-warn-on-iommu-no-igfx.patch 598c3630-VT-d-PI-disable-when-CPU-side-PI-is-off.patch 598c3706-cpufreq-only-stop-ondemand-governor-if-started.patch 5992f1e5-x86-grant-disallow-misaligned-PTEs.patch (Replaces xsa227.patch) 5992f20d-gnttab-split-maptrack-lock-to-make-it-useful-again.patch (Replaces xsa228.patch) 5992f233-gnttab-correct-pin-status-fixup-for-copy.patch (Replaces xsa230.patch) 59958e76-gnttab-dont-use-possibly-unbounded-tail-calls.patch (Replaces xsa226-1.patch) 59958ebf-gnttab-fix-transitive-grant-handling.patch (Replaces xsa226-2.patch) 59958edd-gnttab-avoid-spurious-maptrack-handle-alloc-failures.patch- bsc#1044974 - xen-tools require python-pam xen.spec- Clean up spec file errors and a few warnings. (bsc#1027519) - Removed conditional 'with_systemd' and some old deprecated 'sles_version' checks. xen.spec- Remove use of brctl utiltiy from supportconfig plugin FATE#323639- Use upstream variant of mini-os __udivmoddi4 change gcc7-mini-os.patch- fate#323639 Move bridge-utils to legacy replace-obsolete-network-configuration-commands-in-s.patch- bsc#1052686 - VUL-0: xen: grant_table: possibly premature clearing of GTF_writing / GTF_reading (XSA-230) xsa230.patch- bsc#1035231 - migration of HVM domU does not use superpages on destination dom0 libxc.sr.superpage.patch- bsc#1051787 - VUL-0: CVE-2017-12135: xen: possibly unbounded recursion in grant table code (XSA-226) xsa226-1.patch xsa226-2.patch - bsc#1051788 - VUL-0: CVE-2017-12137: xen: x86: PV privilege escalation via map_grant_ref (XSA-227) xsa227.patch - bsc#1051789 - VUL-0: CVE-2017-12136: xen: grant_table: Race conditions with maptrack free list handling (XSA-228) xsa228.patch- Add a supportconfig plugin xen-supportconfig FATE#323661- bsc#1026236 - add suse_vtsc_tolerance= cmdline option for Xen To avoid emulation of TSC access from a domU after live migration add a global tolerance for the measured host kHz xen.suse_vtsc_tolerance.patch- fate#323662 Drop qemu-dm from xen-tools package The following tarball and patches have been removed qemu-xen-traditional-dir-remote.tar.bz2 VNC-Support-for-ExtendedKeyEvent-client-message.patch 0001-net-move-the-tap-buffer-into-TAPState.patch 0002-net-increase-tap-buffer-size.patch 0003-e1000-fix-access-4-bytes-beyond-buffer-end.patch 0004-e1000-secrc-support.patch 0005-e1000-multi-buffer-packet-support.patch 0006-e1000-clear-EOP-for-multi-buffer-descriptors.patch 0007-e1000-verify-we-have-buffers-upfront.patch 0008-e1000-check-buffer-availability.patch CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch CVE-2015-4037-qemut-smb-config-dir-name.patch CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch CVE-2016-7908-qemut-net-Infinite-loop-in-mcf_fec_do_tx.patch CVE-2016-7909-qemut-net-pcnet-infinite-loop-in-pcnet_rdra_addr.patch CVE-2016-8667-qemut-dma-rc4030-divide-by-zero-error-in-set_next_tick.patch CVE-2016-8669-qemut-char-divide-by-zero-error-in-serial_update_parameters.patch CVE-2016-8910-qemut-net-rtl8139-infinite-loop-while-transmit-in-Cplus-mode.patch CVE-2016-9921-qemut-display-cirrus_vga-divide-by-zero-in-cirrus_do_copy.patch CVE-2017-6505-qemut-usb-an-infinite-loop-issue-in-ohci_service_ed_list.patch CVE-2017-8309-qemut-audio-host-memory-leakage-via-capture-buffer.patch CVE-2017-9330-qemut-usb-ohci-infinite-loop-due-to-incorrect-return-value.patch blktap.patch cdrom-removable.patch xen-qemu-iscsi-fix.patch qemu-security-etch1.patch xen-disable-qemu-monitor.patch xen-hvm-default-bridge.patch qemu-ifup-set-mtu.patch ioemu-vnc-resize.patch capslock_enable.patch altgr_2.patch log-guest-console.patch bdrv_open2_fix_flags.patch bdrv_open2_flags_2.patch ioemu-7615-qcow2-fix-alloc_cluster_link_l2.patch qemu-dm-segfault.patch bdrv_default_rwflag.patch kernel-boot-hvm.patch ioemu-watchdog-support.patch ioemu-watchdog-linkage.patch ioemu-watchdog-ib700-timer.patch ioemu-hvm-pv-support.patch pvdrv_emulation_control.patch ioemu-disable-scsi.patch ioemu-disable-emulated-ide-if-pv.patch xenpaging.qemu.flush-cache.patch ioemu-devicemodel-include.patch - Cleanup spec file and remove unused KMP patches kmp_filelist supported_module.patch xen_pvonhvm.xen_emul_unplug.patch- bsc#1002573 - Optimize LVM functions in block-dmmd block-dmmd- Record initial Xen dmesg in /var/log/xen/xen-boot.log for supportconfig. Keep previous log in /var/log/xen/xen-boot.prev.log- Remove storytelling from description in xen.rpm- Update to Xen 4.9.0 FCS (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update block-dmmd script (bsc#1002573) block-dmmd- Update to Xen 4.9.0-rc8+ (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 gcc7-arm.patch - Drop gcc7-error-xenpmd.patch- Update to Xen 4.9.0-rc8 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1042160 - VUL-1: CVE-2017-9330: xen: usb: ohci: infinite loop due to incorrect return value CVE-2017-9330-qemut-usb-ohci-infinite-loop-due-to-incorrect-return-value.patch- bsc#1037243 - VUL-1: CVE-2017-8309: xen: audio: host memory leakage via capture buffer CVE-2017-8309-qemut-audio-host-memory-leakage-via-capture-buffer.patch- Update to Xen 4.9.0-rc7 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update to Xen 4.9.0-rc6 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1031343 - xen fails to build with GCC 7 gcc7-mini-os.patch gcc7-xen.patch- bsc#1031343 - xen fails to build with GCC 7 gcc7-error-xenpmd.patch- Update to Xen 4.9.0-rc5 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 - Drop xen-tools-pkgconfig-xenlight.patch- bsc#1037779 - xen breaks kexec-tools build xen-tools-pkgconfig-xenlight.patch- Update to Xen 4.9.0-rc4 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1036146 - sles12sp2 xen VM dumps core to wrong path xen.spec- Update to Xen 4.9.0-rc3 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 aarch64-maybe-uninitialized.patch- Update to Xen 4.9.0-rc2 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update to Xen 4.9.0-rc1 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 ioemu-devicemodel-include.patch - Dropped patches contained in new tarball xen-4.8.0-testing-src.tar.bz2 0001-xenstore-let-write_node-and-some-callers-return-errn.patch 0002-xenstore-undo-function-rename.patch 0003-xenstore-rework-of-transaction-handling.patch 584806ce-x86emul-correct-PUSHF-POPF.patch 584fc649-fix-determining-when-domain-creation-is-complete.patch 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch 58510cac-x86emul-MOVNTI-no-REP-prefixes.patch 58526ccc-x86emul-64bit-ignore-most-segment-bases-in-align-check.patch 5853ed37-VT-d-correct-dma_msi_set_affinity.patch 5853ee07-x86emul-CMPXCHG16B-aligned-operand.patch 58580060-x86-emul-correct-SYSCALL-eflags-handling.patch 585aa3c5-x86-force-EFLAGS-IF-on-upon-exit-to-PV.patch 585aa407-x86-HVM-NULL-check-before-using-VMFUNC-hook.patch 585bd5fe-x86-emul-correct-VMFUNC-return-value-handling.patch 586ba81c-x86-cpu-dont-update-this_cpu-for-guest-get_cpu_vendor.patch 587d04d6-x86-xstate-fix-array-overrun-with-LWP.patch 587de4a9-x86emul-VEX-B-ignored-in-compat-mode.patch 5882129d-x86emul-LOCK-check-adjustments.patch 58821300-x86-segment-attribute-handling.patch 58873c1f-x86emul-correct-FPU-stub-asm-constraints.patch 58873c80-x86-hvm-do-not-set-msr_tsc_adjust-on-.patch 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5887888f-credit2-never-consider-CPUs-outside-of-pool.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5888b1b3-x86-emulate-dont-assume-addr_size-32-implies-protmode.patch 5899cbd9-EPT-allow-wrcomb-MMIO-mappings-again.patch 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch 58a44771-IOMMU-always-call-teardown-callback.patch 58a48ccc-x86-fix-p2m_flush_table-for-non-nested.patch 58a59f4b-libxl-correct-xenstore-entry-for-empty-cdrom.patch 58a70d94-VMX-fix-VMCS-race-on-cswitch-paths.patch 58ac1f3f-VMX-dont-leak-host-syscall-MSRs.patch 58b5a2de-x86-correct-Xens-idea-of-its-memory-layout.patch 58b6fd42-credit2-always-mark-a-tickled-pCPU-as-tickled.patch 58b6fd42-credit2-dont-miss-accounting-during-credit-reset.patch 58cbf682-x86-EFI-avoid-overrunning-mb_modules.patch 58cf9200-x86-EFI-avoid-IOMMU-faults-on-tail-gap.patch 58cf9260-x86-EFI-avoid-Xen-when-looking-for-mod-kexec-pos.patch 58cf9277-x86-time-dont-use-vTSC-if-host-guest-freqs-match.patch 58d25ea2-xenstore-add-missing-checks-for-allocation-failure.patch 58d91365-sched-dont-call-wrong-hook-via-VCPU2OP.patch CVE-2017-2615-qemut-display-cirrus-oob-access-while-doing-bitblt-copy-backward-mode.patch CVE-2017-2620-xsa209-qemut-cirrus_bitblt_cputovideo-does-not-check-if-memory-region-safe.patch glibc-2.25-compatibility-fix.patch xs-09-add_change_node-params.patch xs-10-call-add_change_node.patch xs-11-tdb-record-header.patch xs-12-node-gen-count.patch xs-13-read-directory-part-support.patch xs-14-command-array.patch xs-15-command-return-val.patch xs-16-function-static.patch xs-17-arg-parsing.patch xs-18-default-buffer.patch xs-19-handle-alloc-failures.patch xs-20-tdb-version.patch xs-21-empty-tdb-database.patch xs-22-reopen_log-fix.patch xs-23-XS_DEBUG-rename.patch xs-24-xenstored_control.patch xs-25-control-enhance.patch xs-26-log-control.patch xs-27-memory-report.patch xs-28-remove-talloc-report.patch xs-29-define-off_t.patch xsa206-0001-xenstored-apply-a-write-transaction-rate-limit.patch xsa206-0002-xenstored-Log-when-the-write-transaction-rate-limit.patch- bsc#1022703 - Xen HVM guest with OVMF hangs with unattached CDRom 58a59f4b-libxl-correct-xenstore-entry-for-empty-cdrom.patch- bsc#1015348 - L3: libvirtd does not start during boot suse-xendomains-service.patch- bsc#1014136 - Partner-L3: kdump can't dump a kernel on SLES12-SP2 with Xen hypervisor. 58cf9260-x86-EFI-avoid-Xen-when-looking-for-mod-kexec-pos.patch - bsc#1026236 - L3: Paravirtualized vs. fully virtualized migration - latter one much faster 58cf9277-x86-time-dont-use-vTSC-if-host-guest-freqs-match.patch - Upstream patch from Jan 58cbf682-x86-EFI-avoid-overrunning-mb_modules.patch 58cf9200-x86-EFI-avoid-IOMMU-faults-on-tail-gap.patch 58d91365-sched-dont-call-wrong-hook-via-VCPU2OP.patch- bsc#1022555 - L3: Timeout in "execution of /etc/xen/scripts/block add" 58d25ea2-xenstore-add-missing-checks-for-allocation-failure.patch 0001-xenstore-let-write_node-and-some-callers-return-errn.patch 0002-xenstore-undo-function-rename.patch 0003-xenstore-rework-of-transaction-handling.patch - bsc#1030144 - VUL-0: xen: xenstore denial of service via repeated update (XSA-206) xsa206-0001-xenstored-apply-a-write-transaction-rate-limit.patch xsa206-0002-xenstored-Log-when-the-write-transaction-rate-limit.patch - bsc#1029827 - Forward port xenstored xs-09-add_change_node-params.patch xs-10-call-add_change_node.patch xs-11-tdb-record-header.patch xs-12-node-gen-count.patch xs-13-read-directory-part-support.patch xs-14-command-array.patch xs-15-command-return-val.patch xs-16-function-static.patch xs-17-arg-parsing.patch xs-18-default-buffer.patch xs-19-handle-alloc-failures.patch xs-20-tdb-version.patch xs-21-empty-tdb-database.patch xs-22-reopen_log-fix.patch xs-23-XS_DEBUG-rename.patch xs-24-xenstored_control.patch xs-25-control-enhance.patch xs-26-log-control.patch xs-27-memory-report.patch xs-28-remove-talloc-report.patch xs-29-define-off_t.patch- bsc#1029128 - fix make xen to really produce xen.efi with gcc48- bsc#1028235 - VUL-0: CVE-2017-6505: xen: qemu: usb: an infinite loop issue in ohci_service_ed_list CVE-2017-6505-qemut-usb-an-infinite-loop-issue-in-ohci_service_ed_list.patch - Upstream patches from Jan (bsc#1027519) 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5899cbd9-EPT-allow-wrcomb-MMIO-mappings-again.patch 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch 58a44771-IOMMU-always-call-teardown-callback.patch 58a48ccc-x86-fix-p2m_flush_table-for-non-nested.patch 58a70d94-VMX-fix-VMCS-race-on-cswitch-paths.patch 58ac1f3f-VMX-dont-leak-host-syscall-MSRs.patch 58b5a2de-x86-correct-Xens-idea-of-its-memory-layout.patch 58b6fd42-credit2-always-mark-a-tickled-pCPU-as-tickled.patch 58b6fd42-credit2-dont-miss-accounting-during-credit-reset.patch- bsc#1027654 - XEN fails to build against glibc 2.25 glibc-2.25-compatibility-fix.patch libxl.pvscsi.patch- fate#316613: Refresh and enable libxl.pvscsi.patch- bsc#1024834 - VUL-0: CVE-2017-2620: xen: cirrus_bitblt_cputovideo does not check if memory region is safe (XSA-209) CVE-2017-2620-xsa209-qemut-cirrus_bitblt_cputovideo-does-not-check-if-memory-region-safe.patch- bsc#1023948 - [pvusb][sles12sp3][openqa] Segmentation fault happened when adding usbctrl devices via xl 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch- Upstream patches from Jan (bsc#1027519) 587d04d6-x86-xstate-fix-array-overrun-with-LWP.patch 587de4a9-x86emul-VEX-B-ignored-in-compat-mode.patch 5882129d-x86emul-LOCK-check-adjustments.patch 58821300-x86-segment-attribute-handling.patch 58873c1f-x86emul-correct-FPU-stub-asm-constraints.patch 58873c80-x86-hvm-do-not-set-msr_tsc_adjust-on-.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5887888f-credit2-never-consider-CPUs-outside-of-pool.patch 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5888b1b3-x86-emulate-dont-assume-addr_size-32-implies-protmode.patch- bsc#1023004 - VUL-0: CVE-2017-2615: qemu: display: cirrus: oob access while doing bitblt copy backward mode CVE-2017-2615-qemut-display-cirrus-oob-access-while-doing-bitblt-copy-backward-mode.patch- fate#322313 and fate#322150 require the acpica package ported to aarch64 which Xen 4.8 needs to build. Temporarily disable aarch64 until these fates are complete. xen.spec- bsc#1021952 - Virutalization/xen: Bug xen-tools missing /usr/bin/domu-xenstore; guests fail to launch tmp_build.patch xen.spec- No systemd presets for 42.3+ and SLE12SP3+ (bsc#1012842)- bsc#1007224 - broken symlinks in /usr/share/doc/packages/xen/misc/ xen.spec- 585aa3c5-x86-force-EFLAGS-IF-on-upon-exit-to-PV.patch Replaces xsa202.patch (bsc#1014298) - 585aa407-x86-HVM-NULL-check-before-using-VMFUNC-hook.patch Replaces xsa203.patch (bsc#1014300) - 58580060-x86-emul-correct-SYSCALL-eflags-handling.patch Replaces xsa204.patch (bsc#1016340) - Upstream patches from Jan 58526ccc-x86emul-64bit-ignore-most-segment-bases-in-align-check.patch 5853ed37-VT-d-correct-dma_msi_set_affinity.patch 5853ee07-x86emul-CMPXCHG16B-aligned-operand.patch 585bd5fe-x86-emul-correct-VMFUNC-return-value-handling.patch 586ba81c-x86-cpu-dont-update-this_cpu-for-guest-get_cpu_vendor.patch- bsc#1015169 - VUL-0: CVE-2016-9921, CVE-2016-9922: xen: qemu: display: cirrus_vga: a divide by zero in cirrus_do_copy CVE-2016-9921-qemut-display-cirrus_vga-divide-by-zero-in-cirrus_do_copy.patch- bsc#1016340 - VUL-0: CVE-2016-10013: xen: x86: Mishandling of SYSCALL singlestep during emulation (XSA-204) xsa204.patch- bsc#1012651 - VUL-0: CVE-2016-9932: xen: x86 CMPXCHG8B emulation fails to ignore operand size override (XSA-200) 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch- bsc#1014298 - VUL-0: CVE-2016-10024: xen: x86 PV guests may be able to mask interrupts (XSA-202) xsa202.patch - bsc#1014300 - VUL-0: CVE-2016-10025: xen: x86: missing NULL pointer check in VMFUNC emulation (XSA-203) xsa203.patch - Upstream patches from Jan 584806ce-x86emul-correct-PUSHF-POPF.patch 584fc649-fix-determining-when-domain-creation-is-complete.patch 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch 58510cac-x86emul-MOVNTI-no-REP-prefixes.patch- Update to Xen 4.8 FCS xen-4.8.0-testing-src.tar.bz2 - Dropped xen-4.7.1-testing-src.tar.bz2 0001-libxc-Rework-extra-module-initialisation.patch 0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch 0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch 0004-firmware-makefile-install-BIOS-blob.patch 0005-libxl-Load-guest-BIOS-from-file.patch 0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch 0007-hvmloader-Grab-the-hvm_start_info-pointer.patch 0008-hvmloader-Locate-the-BIOS-blob.patch 0009-hvmloader-Check-modules-whereabouts-in-perform_tests.patch 0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch 0011-hvmloader-Load-OVMF-from-modules.patch 0012-hvmloader-Specific-bios_load-function-required.patch 0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch 0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch 57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch 576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 5769106e-x86-generate-assembler-equates-for-synthesized.patch 57a1e603-x86-time-adjust-local-system-time-initialization.patch 57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch 57a30261-x86-support-newer-Intel-CPU-models.patch 5810a9cc-x86-emul-Correct-decoding-of-SReg3-operands.patch 581b2c3b-x86-emul-reject-LGDT-LIDT-with-non-canonical-addresses.patch 581b647a-x86emul-L-S-G-I-DT-ignore-opsz-overrides-in-64-bit-mode.patch 58249392-x86-svm-dont-clobber-eax-edx-if-RDMSR-intercept-fails.patch 582c35d6-x86-vmx-correct-long-mode-check-in-vmx_cpuid_intercept.patch 582c35ee-x86-traps-dont-call-hvm_hypervisor_cpuid_leaf-for-PV.patch 58343dc2-x86-hvm-Fix-the-handling-of-non-present-segments.patch 58343df8-x86-HVM-dont-load-LDTR-with-VM86-mode-attrs-during-task-switch.patch 58343e24-x86-PV-writes-of-fs-and-gs-base-MSRs-require-canonical-addresses.patch 58343e9e-libelf-fix-stack-memory-leak-when-loading-32-bit-symbol-tables.patch 58343ec2-x86emul-fix-huge-bit-offset-handling.patch 58343f29-x86-emul-correct-the-IDT-entry-calculation-in-inject_swint.patch 58343f44-x86-svm-fix-injection-of-software-interrupts.patch 58343f79-pygrub-Properly-quote-results-when-returning-them-to-the-caller.patch CVE-2016-9381-xsa197-qemut.patch CVE-2016-9637-xsa199-qemut.patch- bsc#1011652 - VUL-0: xen: qemu ioport array overflow CVE-2016-9637-xsa199-qemut.patch- bsc#1009100 - VUL-0: CVE-2016-9386: XSA-191: xen: x86 null segments not always treated as unusable 58343dc2-x86-hvm-Fix-the-handling-of-non-present-segments.patch - bsc#1009103 - VUL-0: CVE-2016-9382: XSA-192: xen: x86 task switch to VM86 mode mis-handled 58343df8-x86-HVM-dont-load-LDTR-with-VM86-mode-attrs-during-task-switch.patch - bsc#1009104 - VUL-0: CVE-2016-9385: XSA-193: xen: x86 segment base write emulation lacking canonical address checks 58343e24-x86-PV-writes-of-fs-and-gs-base-MSRs-require-canonical-addresses.patch - bsc#1009105 - VUL-0: CVE-2016-9384: XSA-194: xen: guest 32-bit ELF symbol table load leaking host data 58343e9e-libelf-fix-stack-memory-leak-when-loading-32-bit-symbol-tables.patch - bsc#1009107 - VUL-0: CVE-2016-9383: XSA-195: xen: x86 64-bit bit test instruction emulation broken 58343ec2-x86emul-fix-huge-bit-offset-handling.patch - bsc#1009108 - VUL-0: CVE-2016-9377,CVE-2016-9378: XSA-196: xen: x86 software interrupt injection mis-handled 58343f29-x86-emul-correct-the-IDT-entry-calculation-in-inject_swint.patch 58343f44-x86-svm-fix-injection-of-software-interrupts.patch - bsc#1009109 - VUL-0: CVE-2016-9381: XSA-197: xen: qemu incautious about shared ring processing CVE-2016-9381-xsa197-qemut.patch - bsc#1009111 - VUL-0: CVE-2016-9379,CVE-2016-9380: XSA-198: xen: delimiter injection vulnerabilities in pygrub 58343f79-pygrub-Properly-quote-results-when-returning-them-to-the-caller.patch - Upstream patches from Jan 581b2c3b-x86-emul-reject-LGDT-LIDT-with-non-canonical-addresses.patch 581b647a-x86emul-L-S-G-I-DT-ignore-opsz-overrides-in-64-bit-mode.patch 58249392-x86-svm-dont-clobber-eax-edx-if-RDMSR-intercept-fails.patch 582c35d6-x86-vmx-correct-long-mode-check-in-vmx_cpuid_intercept.patch 582c35ee-x86-traps-dont-call-hvm_hypervisor_cpuid_leaf-for-PV.patch- Update to Xen Version 4.7.1 xen-4.7.1-testing-src.tar.bz2 - Dropped patches contained in new tarball xen-4.7.0-testing-src.tar.bz2 575e9ca0-nested-vmx-Validate-host-VMX-MSRs-before-accessing-them.patch 57640448-xen-sched-use-default-scheduler-upon-an-invalid-sched.patch 57973099-have-schedulers-revise-initial-placement.patch 579730e6-remove-buggy-initial-placement-algorithm.patch 57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch 57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch 57ac6316-don-t-restrict-DMA-heap-to-node-0.patch 57b71fc5-x86-EFI-don-t-apply-relocations-to-l-2-3-_bootmap.patch 57b7447b-dont-permit-guest-to-populate-PoD-pages-for-itself.patch 57c4412b-x86-HVM-add-guarding-logic-for-VMX-specific-code.patch 57c57f73-libxc-correct-max_pfn-calculation-for-saving-domain.patch 57c805bf-x86-levelling-restrict-non-architectural-OSXSAVE-handling.patch 57c805c1-x86-levelling-pass-vcpu-to-ctxt_switch_levelling.patch 57c805c3-x86-levelling-provide-architectural-OSXSAVE-handling.patch 57c82be2-x86-32on64-adjust-call-gate-emulation.patch 57c93e52-fix-error-in-libxl_device_usbdev_list.patch 57c96df3-credit1-fix-a-race-when-picking-initial-pCPU.patch 57c96e2c-x86-correct-PT_NOTE-file-position.patch 57cfed43-VMX-correct-feature-checks-for-MPX-and-XSAVES.patch 57d1563d-x86-32on64-don-t-allow-recursive-page-tables-from-L3.patch 57d15679-x86-emulate-Correct-boundary-interactions-of-emulated-insns.patch 57d1569a-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch 57d18642-hvm-fep-Allow-test-insns-crossing-1-0-boundary.patch 57d18642-x86-segment-Bounds-check-accesses-to-emulation-ctxt-seg_reg.patch 57d7ca5f-x86-domctl-fix-TOCTOU-race-in-XEN_DOMCTL_getvcpuextstate.patch 57d7ca64-x86-domctl-fix-migration-of-guests-not-using-xsave.patch 57da8883-credit1-fix-mask-to-be-used-for-tickling.patch 57da8883-credit2-properly-schedule-migration-of-running-vcpu.patch 57dfb1c5-x86-Intel-hide-CPUID-faulting-capability-from-guests.patch 57e93e1d-x86emul-correct-loading-of-ss.patch 57e93e4a-x86emul-don-t-allow-null-selector-for-LTR.patch 57e93e89-x86-AMD-apply-erratum-665-workaround.patch 57ee6cbc-credit1-return-time-remaining-to-limit-as-next-timeslice.patch 57f3a8ee-x86emul-honor-guest-CR0-TS-and-CR0-EM.patch 57fb6a91-x86-defer-not-present-segment-checks.patch 5800c51d-x86-hvm-Clobber-cs-L-when-LME-becomes-set.patch 5800caec-x86emul-fix-pushing-of-selector-registers.patch 5800cb06-x86-Viridian-don-t-depend-on-undefined-register-state.patch 580e29f9-x86-MISALIGNSSE-feature-depends-on-SSE.patch 57dfb2ff-x86-Intel-Broadwell-no-PKG_C8-10_RESIDENCY-MSRs.patch- bsc#1004981 - Xen RPM doesn't contain debug hypervisor for EFI systems xen.spec- bsc#1000106 - VUL-0: CVE-2016-7777: xen: CR0.TS and CR0.EM not always honored for x86 HVM guests (XSA-190) 57f3a8ee-x86emul-honor-guest-CR0-TS-and-CR0-EM.patch - bsc#996191 - [XEN][acpi]residency -n 88 -c will cause xen panic on broadwell-ep 57dfb2ff-x86-Intel-Broadwell-no-PKG_C8-10_RESIDENCY-MSRs.patch - Upstream patches from Jan 57d7ca5f-x86-domctl-fix-TOCTOU-race-in-XEN_DOMCTL_getvcpuextstate.patch 57d7ca64-x86-domctl-fix-migration-of-guests-not-using-xsave.patch 57da8883-credit1-fix-mask-to-be-used-for-tickling.patch 57da8883-credit2-properly-schedule-migration-of-running-vcpu.patch 57dfb1c5-x86-Intel-hide-CPUID-faulting-capability-from-guests.patch 57e93e1d-x86emul-correct-loading-of-ss.patch 57e93e4a-x86emul-don-t-allow-null-selector-for-LTR.patch 57e93e89-x86-AMD-apply-erratum-665-workaround.patch 57ee6cbc-credit1-return-time-remaining-to-limit-as-next-timeslice.patch 57fb6a91-x86-defer-not-present-segment-checks.patch 5800c51d-x86-hvm-Clobber-cs-L-when-LME-becomes-set.patch 5800caec-x86emul-fix-pushing-of-selector-registers.patch 5800cb06-x86-Viridian-don-t-depend-on-undefined-register-state.patch 580e29f9-x86-MISALIGNSSE-feature-depends-on-SSE.patch 5810a9cc-x86-emul-Correct-decoding-of-SReg3-operands.patch- bsc#1007941 - Xen tools limit the number of vcpus to 256 when the system has 384 xen-arch-kconfig-nr_cpus.patch- bsc#1007157 - VUL-0: CVE-2016-8910: xen: net: rtl8139: infinite loop while transmit in C+ mode CVE-2016-8910-qemut-net-rtl8139-infinite-loop-while-transmit-in-Cplus-mode.patch- bsc#1005004 - CVE-2016-8667: xen: dma: rc4030 divide by zero error in set_next_tick CVE-2016-8667-qemut-dma-rc4030-divide-by-zero-error-in-set_next_tick.patch - bsc#1005005 - VUL-0: CVE-2016-8669: xen: char: divide by zero error in serial_update_parameters CVE-2016-8669-qemut-char-divide-by-zero-error-in-serial_update_parameters.patch- bsc#1003030 - VUL-0: CVE-2016-7908: xen: net: Infinite loop in mcf_fec_do_tx CVE-2016-7908-qemut-net-Infinite-loop-in-mcf_fec_do_tx.patch - bsc#1003032 - VUL-0: CVE-2016-7909: xen: net: pcnet: infinite loop in pcnet_rdra_addr CVE-2016-7909-qemut-net-pcnet-infinite-loop-in-pcnet_rdra_addr.patch- bsc#995785 - VUL-0: CVE-2016-7092: xen: x86: Disallow L3 recursive pagetable for 32-bit PV guests (XSA-185) 57d1563d-x86-32on64-don-t-allow-recursive-page-tables-from-L3.patch - bsc#995789 - VUL-0: CVE-2016-7093: xen: x86: Mishandling of instruction pointer truncation during emulation (XSA-186) 57d15679-x86-emulate-Correct-boundary-interactions-of-emulated-insns.patch 57d18642-hvm-fep-Allow-test-insns-crossing-1-0-boundary.patch - bsc#995792 - VUL-0: CVE-2016-7094: xen: x86 HVM: Overflow of sh_ctxt->seg_reg[] (XSA-187) 57d1569a-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch 57d18642-x86-segment-Bounds-check-accesses-to-emulation-ctxt-seg_reg.patch - bsc#991934 - xen hypervisor crash in csched_acct 57c96df3-credit1-fix-a-race-when-picking-initial-pCPU.patch - Upstream patches from Jan 57c4412b-x86-HVM-add-guarding-logic-for-VMX-specific-code.patch 57c57f73-libxc-correct-max_pfn-calculation-for-saving-domain.patch 57c805bf-x86-levelling-restrict-non-architectural-OSXSAVE-handling.patch 57c805c1-x86-levelling-pass-vcpu-to-ctxt_switch_levelling.patch 57c805c3-x86-levelling-provide-architectural-OSXSAVE-handling.patch 57c82be2-x86-32on64-adjust-call-gate-emulation.patch 57c96e2c-x86-correct-PT_NOTE-file-position.patch 57cfed43-VMX-correct-feature-checks-for-MPX-and-XSAVES.patch- bsc#979002 - add 60-persistent-xvd.rules and helper script also to initrd, add the relevant dracut helper- bnc#953518 - unplug also SCSI disks in qemu-xen-traditional for upstream unplug protocol- bsc#989679 - [pvusb feature] USB device not found when 'virsh detach-device guest usb.xml' 57c93e52-fix-error-in-libxl_device_usbdev_list.patch- bsc#992224 - [HPS Bug] During boot of Xen Hypervisor, Failed to get contiguous memory for DMA from Xen 57ac6316-don-t-restrict-DMA-heap-to-node-0.patch - bsc#978755 - xen uefi systems fail to boot - bsc#983697 - SLES12 SP2 Xen UEFI mode cannot boot 57b71fc5-x86-EFI-don-t-apply-relocations-to-l-2-3-_bootmap.patch - Upstream patch from Jan 57b7447b-dont-permit-guest-to-populate-PoD-pages-for-itself.patch- spec: to stay compatible with the in-tree qemu-xen binary, use /usr/bin/qemu-system-i386 instead of /usr/bin/qemu-system-x86_64 bsc#986164- bsc#970135 - new virtualization project clock test randomly fails on Xen 576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 5769106e-x86-generate-assembler-equates-for-synthesized.patch 57a1e603-x86-time-adjust-local-system-time-initialization.patch 57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch - bsc#991934 - xen hypervisor crash in csched_acct 57973099-have-schedulers-revise-initial-placement.patch 579730e6-remove-buggy-initial-placement-algorithm.patch - bsc#988675 - VUL-0: CVE-2016-6258: xen: x86: Privilege escalation in PV guests (XSA-182) 57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch - bsc#988676 - VUL-0: CVE-2016-6259: xen: x86: Missing SMAP whitelisting in 32-bit exception / event delivery (XSA-183) 57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch - Upstream patches from Jan 57a30261-x86-support-newer-Intel-CPU-models.patch- bsc#985503 - vif-route broken vif-route.patch- bsc#978413 - PV guest upgrade from sles11sp4 to sles12sp2 alpha3 failed on sles11sp4 xen host. pygrub-handle-one-line-menu-entries.patch- bsc#990843 - VUL-1: CVE-2016-6351: xen: qemu: scsi: esp: OOB write access in esp_do_dma CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch- bsc#900418 - Dump cannot be performed on SLES12 XEN 57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch - Upstream patches from Jan 575e9ca0-nested-vmx-Validate-host-VMX-MSRs-before-accessing-them.patch 57640448-xen-sched-use-default-scheduler-upon-an-invalid-sched.patch- fate#319989 - Update to Xen 4.7 FCS xen-4.7.0-testing-src.tar.bz2 - Drop CVE-2014-3672-qemut-xsa180.patch- bsc#954872 - script block-dmmd not working as expected - libxl: error: libxl_dm.c (Additional fixes) block-dmmd- Convert with_stubdom into build_conditional to allow adjusting via prjconf - Convert with_debug into build_conditional to allow adjusting via prjconf- bsc#979002 - add 60-persistent-xvd.rules and helper script to xen-tools-domU to simplify transition to pvops based kernels- Convert with_oxenstored into build_conditional to allow adjusting via prjconf (fate#320836)- bsc#983984 - VUL-0: CVE-2016-5338: xen: qemu: scsi: esp: OOB r/w access while processing ESP_FIFO CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch - bsc#982960 - VUL-0: CVE-2016-5238: xen: qemu: scsi: esp: OOB write when using non-DMA mode in get_cmd CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch- fate#319989 - Update to Xen 4.7 RC5 xen-4.7.0-testing-src.tar.bz2- fate#319989 - Update to Xen 4.7 RC4 xen-4.7.0-testing-src.tar.bz2 - Dropped xen.pkgconfig-4.7.patch xsa164.patch- bsc#981264 - VUL-0: CVE-2014-3672: xen: Unrestricted qemu logging (XSA-180) CVE-2014-3672-qemut-xsa180.patch- bsc#980724 - VUL-0: CVE-2016-4441: Qemu: scsi: esp: OOB write while writing to 's->cmdbuf' in get_cmd CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch - bsc#980716 - VUL-0: CVE-2016-4439: xen: scsi: esp: OOB write while writing to 's->cmdbuf' in esp_reg_write CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch- fate#319989 - Update to Xen 4.7 RC3 xen-4.7.0-testing-src.tar.bz2 - Dropped libxl-remove-cdrom-cachemode.patch x86-PoD-only-reclaim-if-needed.patch gcc6-warnings-as-errors.patch- bsc#954872 - script block-dmmd not working as expected - libxl: error: libxl_dm.c (another modification) block-dmmd- fate#319989 - Update to Xen 4.7 RC2 xen-4.7.0-testing-src.tar.bz2- bsc#961600 - L3: poor performance when Xen HVM domU configured with max memory > current memory x86-PoD-only-reclaim-if-needed.patch- Mark SONAMEs and pkgconfig as xen 4.7 xen.pkgconfig-4.7.patch- bsc#977329 - Xen: Cannot boot HVM guests with empty cdrom libxl-remove-cdrom-cachemode.patch- fate#319989 - Update to Xen 4.7 RC1 xen-4.7.0-testing-src.tar.bz2- fate#316614: set migration constraints from cmdline restore libxl.set-migration-constraints-from-cmdline.patch- Remove obsolete patch for xen-kmp magic_ioport_compat.patch- fate#316613: update to v12 libxl.pvscsi.patch- Update to the latest Xen 4.7 pre-release c2994f86 Drop libxl.migrate-legacy-stream-read.patch- bnc#972756 - Can't migrate HVM guest from SLES12SP1 Xen host to SLES12SP2 Alpha 1 host using xl migrate libxl.migrate-legacy-stream-read.patch- Add patches from proposed upstream series to load BIOS's from the toolstack instead of embedding in hvmloader http://lists.xenproject.org/archives/html/xen-devel/2016-03/msg01626.html 0001-libxc-Rework-extra-module-initialisation.patch, 0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch, 0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch, 0004-firmware-makefile-install-BIOS-blob.patch, 0005-libxl-Load-guest-BIOS-from-file.patch, 0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch, 0007-hvmloader-Grab-the-hvm_start_info-pointer.patch, 0008-hvmloader-Locate-the-BIOS-blob.patch, 0009-hvmloader-Check-modules-whereabouts-in-perform_tests.patch, 0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch, 0011-hvmloader-Load-OVMF-from-modules.patch, 0012-hvmloader-Specific-bios_load-function-required.patch, 0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch, 0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch - Enable support for UEFI on x86_64 using the ovmf-x86_64-ms.bin firmware from qemu-ovmf-x86_64. The firmware is preloaded with Microsoft keys to more closely resemble firmware on real hardware FATE#320490- fate#319989: Update to Xen 4.7 (pre-release) xen-4.7.0-testing-src.tar.bz2 - Dropped: xen-4.6.1-testing-src.tar.bz2 55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch 5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch hotplug-Linux-block-performance-fix.patch set-mtu-from-bridge-for-tap-interface.patch xendomains-libvirtd-conflict.patch xsa154.patch xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa170.patch- Use system SeaBIOS instead of building/installing another one FATE#320638 Dropped files: seabios-dir-remote.tar.bz2 xen-c99-fix.patch xen.build-compare.seabios.patch- spec: drop BuildRequires that were only needed for qemu-xen- bsc#969377 - xen does not build with GCC 6 ipxe-use-rpm-opt-flags.patch gcc6-warnings-as-errors.patch- bsc#969351 - VUL-0: CVE-2016-2841: xen: net: ne2000: infinite loop in ne2000_receive CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch - Drop xsa154-fix.patch- Use system qemu instead of building/installing yet another qemu FATE#320638 - Dropped files qemu-xen-dir-remote.tar.bz2 CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch CVE-2015-4037-qemuu-smb-config-dir-name.patch CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch qemu-xen-enable-spice-support.patch qemu-xen-upstream-qdisk-cache-unsafe.patch tigervnc-long-press.patch xsa162-qemuu.patch- bsc#962321 - VUL-0: CVE-2016-1922: xen: i386: null pointer dereference in vapic_write() CVE-2016-1922-qemuu-i386-null-pointer-dereference-in-vapic_write.patch- bsc#968004 - VUL-0: CVE-2016-2538: xen: usb: integer overflow in remote NDIS control message handling CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch- bsc#954872 - L3: script block-dmmd not working as expected - libxl: error: libxl_dm.c block-dmmd - Update libxl to recognize dmmd and npiv prefix in disk spec xen.libxl.dmmd.patch- bsc#967101 - VUL-0: CVE-2016-2391: xen: usb: multiple eof_timers in ohci module leads to null pointer dereference CVE-2016-2391-qemuu-usb-null-pointer-dereference-in-ohci-module.patch CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch - bsc#967090 - VUL-0: CVE-2016-2392: xen: usb: null pointer dereference in remote NDIS control message handling CVE-2016-2392-qemuu-usb-null-pointer-dereference-in-NDIS-message-handling.patch- Update to Xen Version 4.6.1 xen-4.6.1-testing-src.tar.bz2 - Dropped patches now contained in tarball or unnecessary xen-4.6.0-testing-src.tar.bz2 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 5632129c-free-domain-s-vcpu-array.patch 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 563212e4-xenoprof-free-domain-s-vcpu-array.patch 563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch 56549f24-x86-vPMU-document-as-unsupported.patch 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch xsa155-qemut-qdisk-double-access.patch xsa155-qemut-xenfb.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa159.patch xsa160.patch xsa162-qemut.patch xsa165.patch xsa166.patch xsa167.patch xsa168.patch- bsc#965315 - VUL-0: CVE-2016-2270: xen: x86: inconsistent cachability flags on guest mappings (XSA-154) xsa154.patch - bsc#965317 - VUL-0: CVE-2016-2271: xen: VMX: guest user mode may crash guest with non-canonical RIP (XSA-170) xsa170.patch- bsc#965269 - VUL-1: CVE-2015-8619: xen: stack based OOB write in hmp_sendkey routine CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch- bsc#965156 - VUL-0: CVE-2015-6855: xen: ide: divide by zero issue CVE-2015-6855-qemuu-ide-divide-by-zero-issue.patch - bsc#965112 - VUL-0: CVE-2014-3640: xen: slirp: NULL pointer deref in sosendto() CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch- bsc#964947 - VUL-0: CVE-2015-5278: xen: Infinite loop in ne2000_receive() function CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch - bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch- bsc#964644 - VUL-0: CVE-2013-4533: xen pxa2xx: buffer overrun on incoming migration CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch - bsc#964925 - VUL-0: CVE-2014-0222: xen: qcow1: validate L2 table size to avoid integer overflows CVE-2014-0222-blktap-qcow1-validate-l2-table-size.patch - Dropped CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch- bsc#964415 - VUL-1: CVE-2016-2198: xen: usb: ehci null pointer dereference in ehci_caps_write CVE-2016-2198-qemuu-usb-ehci-null-pointer-dereference-in-ehci_caps_write.patch - bsc#964452 - VUL-0: CVE-2013-4534: xen: openpic: buffer overrun on incoming migration CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch- bsc#963783 - VUL-1: CVE-2016-1981: xen: net: e1000 infinite loop in start_xmit and e1000_receive_iov routines CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch- bsc#962758 - VUL-0: CVE-2013-4539: xen: tsc210x: buffer overrun on invalid state load CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch- bsc#962632 - VUL-0: CVE-2015-1779: xen: vnc: insufficient resource limiting in VNC websockets decoder CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch - bsc#962642 - VUL-0: CVE-2013-4537: xen: ssi-sd: buffer overrun on invalid state load CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch - bsc#962627 - VUL-0: CVE-2014-7815: xen: vnc: insufficient bits_per_pixel from the client sanitization CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch- bsc#962335 - VUL-0: CVE-2013-4538: xen: ssd0323: fix buffer overun on invalid state CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch - bsc#962360 - VUL-0: CVE-2015-7512: xen: net: pcnet: buffer overflow in non-loopback mode CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch- bsc#961692 - VUL-0: CVE-2016-1714: xen: nvram: OOB r/w access in processing firmware configurations CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch- bsc#961358 - VUL-0: CVE-2015-8613: xen: qemu: scsi: stack based buffer overflow in megasas_ctrl_get_info CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch - bsc#961332 - VUL-0: CVE-2016-1568: xen: Qemu: ide: ahci use-after-free vulnerability in aio port commands CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch- bsc#959695 - missing docs for xen xen.spec- bsc#960862 - VUL-0: CVE-2016-1571: xen: VMX: intercept issue with INVLPG on non-canonical address (XSA-168) xsa168.patch - bsc#960861 - VUL-0: CVE-2016-1570: xen: PV superpage functionality missing sanity checks (XSA-167) xsa167.patch - bsc#960836 - VUL-0: CVE-2015-8744: xen: net: vmxnet3: incorrect l2 header validation leads to a crash via assert(2) call CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch- bsc#960707 - VUL-0: CVE-2015-8745: xen: reading IMR registers leads to a crash via assert(2) call CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch - bsc#960726 - VUL-0: CVE-2015-8743: xen: ne2000: OOB memory access in ioport r/w functions CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch- bsc#960093 - VUL-0: CVE-2015-8615: xen: x86: unintentional logging upon guest changing callback method (XSA-169) 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch- Adjust xen-dom0-modules.service to run Before xenstored.service instead of proc-xen.mount to workaround a bug in systemd "design" (bnc#959845)- bsc#959387 - VUL-0: CVE-2015-8568 CVE-2015-8567: xen: qemu: net: vmxnet3: host memory leakage CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch- bsc#957988 - VUL-0: CVE-2015-8550: xen: paravirtualized drivers incautious about shared memory contents (XSA-155) xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemut-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa155-qemut-xenfb.patch - bsc#959006 - VUL-0: CVE-2015-8558: xen: qemu: usb: infinite loop in ehci_advance_state results in DoS CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch - bsc#958918 - VUL-0: CVE-2015-7549: xen: qemu pci: null pointer dereference issue CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch - bsc#958493 - VUL-0: CVE-2015-8504: xen: qemu: ui: vnc: avoid floating point exception CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch - bsc#958007 - VUL-0: CVE-2015-8554: xen: qemu-dm buffer overrun in MSI-X handling (XSA-164) xsa164.patch - bsc#958009 - VUL-0: CVE-2015-8555: xen: information leak in legacy x86 FPU/XMM initialization (XSA-165) xsa165.patch - bsc#958523 - VUL-0: xen: ioreq handling possibly susceptible to multiple read issue (XSA-166) xsa166.patch- bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch - Upstream patches from Jan 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch) 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 56544a57-VMX-fix-adjust-trap-injection.patch 56546ab2-sched-fix-insert_vcpu-locking.patch- bsc#956592 - VUL-0: xen: virtual PMU is unsupported (XSA-163) 56549f24-x86-vPMU-document-as-unsupported.patch - bsc#956408 - VUL-0: CVE-2015-8339, CVE-2015-8340: xen: XENMEM_exchange error handling issues (XSA-159) xsa159.patch - bsc#956409 - VUL-0: CVE-2015-8341: xen: libxl leak of pv kernel and initrd on error (XSA-160) xsa160.patch - bsc#956411 - VUL-0: CVE-2015-7504: xen: heap buffer overflow vulnerability in pcnet emulator (XSA-162) xsa162-qemuu.patch xsa162-qemut.patch - bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142) 5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch- fate#315712: XEN: Use the PVOPS kernel Turn off building the KMPs now that we are using the pvops kernel xen.spec- Upstream patches from Jan 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 5632129c-free-domain-s-vcpu-array.patch (Replaces CVE-2015-7969-xsa149.patch) 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 563212e4-xenoprof-free-domain-s-vcpu-array.patch 563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch) 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch - Dropped 55b0a2db-x86-MSI-track-guest-masking.patch- Use upstream variants of block-iscsi and block-nbd- Remove xenalyze.hg, its part of xen-4.6- Update to Xen Version 4.6.0 xen-4.6.0-testing-src.tar.bz2 mini-os.tar.bz2 blktap2-no-uninit.patch stubdom-have-iovec.patch - Renamed xsa149.patch to CVE-2015-7969-xsa149.patch - Dropped patches now contained in tarball or unnecessary xen-4.5.2-testing-src.tar.bz2 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch 54f4985f-libxl-fix-libvirtd-double-free.patch 55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 551ac326-xentop-add-support-for-qdisk.patch 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch 5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 554cc211-libxl-add-qxl.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch 5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch 5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch 5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch 5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch 5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch 5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch 55b0a218-x86-PCI-CFG-write-intercept.patch 55b0a255-x86-MSI-X-maskall.patch 55b0a283-x86-MSI-X-teardown.patch 55b0a2ab-x86-MSI-X-enable.patch blktapctrl-close-fifos.patch blktapctrl-default-to-ioemu.patch blktapctrl-disable-debug-printf.patch blktap-no-uninit.patch blktap-pv-cdrom.patch build-tapdisk-ioemu.patch ioemu-bdrv-open-CACHE_WB.patch ioemu-blktap-barriers.patch ioemu-blktap-fv-init.patch ioemu-blktap-image-format.patch ioemu-blktap-zero-size.patch libxl.set-migration-constraints-from-cmdline.patch local_attach_support_for_phy.patch pci-attach-fix.patch qemu-xen-upstream-megasas-buildtime.patch tapdisk-ioemu-logfile.patch tapdisk-ioemu-shutdown-fix.patch udev-rules.patch xen.build-compare.ipxe.patch xen.build-compare.mini-os.patch xen.build-compare.smbiosdate.patch xen.build-compare.vgabios.patch xen.build-compare.xen_compile_h.patch xl-coredump-file-location.patch- bsc#954405 - VUL-0: CVE-2015-8104: Xen: guest to host DoS by triggering an infinite loop in microcode via #DB exception - bsc#954018 - VUL-0: CVE-2015-5307: xen: x86: CPU lockup during fault delivery (XSA-156) CVE-2015-5307-xsa156.patch- Update to Xen 4.5.2 xen-4.5.2-testing-src.tar.bz2 - Drop the following xen-4.5.1-testing-src.tar.bz2 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 559bdde5-pull-in-latest-linux-earlycpio.patch 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch 560bd926-credit1-fix-tickling-when-it-happens-from-a-remote-pCPU.patch 560e6d34-x86-p2m-pt-tighten-conditions-of-IOMMU-mapping-updates.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch CVE-2015-4106-xsa131-9.patch CVE-2015-3259-xsa137.patch CVE-2015-7311-xsa142.patch CVE-2015-7835-xsa148.patch xsa139-qemuu.patch xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch xsa151.patch xsa152.patch xsa153-libxl.patch CVE-2015-5154-qemuu-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemuu-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch"- bsc#950704 - CVE-2015-7970 VUL-1: xen: x86: Long latency populate-on-demand operation is not preemptible (XSA-150) 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch- Upstream patches from Jan 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch- bsc#951845 - VUL-0: CVE-2015-7972: xen: x86: populate-on-demand balloon size inaccuracy can crash guests (XSA-153) xsa153-libxl.patch- bsc#950703 - VUL-1: CVE-2015-7969: xen: leak of main per-domain vcpu pointer array (DoS) (XSA-149) xsa149.patch - bsc#950705 - VUL-1: CVE-2015-7969: xen: x86: leak of per-domain profiling-related vcpu pointer array (DoS) (XSA-151) xsa151.patch - bsc#950706 - VUL-0: CVE-2015-7971: xen: x86: some pmu and profiling hypercalls log without rate limiting (XSA-152) xsa152.patch - Dropped 55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch 5604f239-x86-PV-properly-populate-descriptor-tables.patch- bsc#932267 - VUL-1: CVE-2015-4037: qemu,kvm,xen: insecure temporary file use in /net/slirp.c CVE-2015-4037-qemuu-smb-config-dir-name.patch CVE-2015-4037-qemut-smb-config-dir-name.patch - bsc#877642 - VUL-0: CVE-2014-0222: qemu: qcow1: validate L2 table size to avoid integer overflows CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch- bsc#950367 - VUL-0: CVE-2015-7835: xen: x86: Uncontrolled creation of large page mappings by PV guests (XSA-148) CVE-2015-7835-xsa148.patch- bsc#949138 - Setting vcpu affinity under Xen causes libvirtd abort 54f4985f-libxl-fix-libvirtd-double-free.patch- bsc#949046 - Increase %suse_version in SP1 to 1316 xen.spec - Update README.SUSE detailing dom0 ballooning recommendations- bsc#945167 - Running command ’ xl pci-assignable-add 03:10.1’ secondly show errors 55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch - Upstream patches from Jan 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f239-x86-PV-properly-populate-descriptor-tables.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch 560bd926-credit1-fix-tickling-when-it-happens-from-a-remote-pCPU.patch 560e6d34-x86-p2m-pt-tighten-conditions-of-IOMMU-mapping-updates.patch- bsc#941074 - VmError: Device 51728 (vbd) could not be connected. Hotplug scripts not working. hotplug-Linux-block-performance-fix.patch- bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142) CVE-2015-7311-xsa142.patch- bsc#945165 - Xl pci-attach show error with kernel of SLES 12 sp1 pci-attach-fix.patch- bsc#945164 - Xl destroy show error with kernel of SLES 12 sp1 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch- Upstream patches from Jan 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch- bsc#944463 - VUL-0: CVE-2015-5239: qemu-kvm: Integer overflow in vnc_client_read() and protocol_client_msg() CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch - bsc#944697 - VUL-1: CVE-2015-6815: qemu: net: e1000: infinite loop issue CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch- bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch- bsc#907514 - Bus fatal error & sles12 sudden reboot has been observed - bsc#910258 - SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984 - Bus fatal error & sles11-SP4 sudden reboot has been observed - bsc#923967 - Partner-L3: Bus fatal error & sles11-SP3 sudden reboot has been observed 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 55b0a218-x86-PCI-CFG-write-intercept.patch 55b0a255-x86-MSI-X-maskall.patch 55b0a283-x86-MSI-X-teardown.patch 55b0a2ab-x86-MSI-X-enable.patch 55b0a2db-x86-MSI-track-guest-masking.patch - Upstream patches from Jan 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch - Dropped for upstream version x86-MSI-mask.patch x86-MSI-pv-unmask.patch x86-MSI-X-enable.patch x86-MSI-X-maskall.patch x86-MSI-X-teardown.patch x86-pci_cfg_okay.patch x86-PCI-CFG-write-intercept.patch- bsc#939712 - VUL-0: XSA-140: QEMU leak of uninitialized heap memory in rtl8139 device model xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch - bsc#939709 - VUL-0: XSA-139: xen: Use after free in QEMU/Xen block unplug protocol xsa139-qemuu.patch- bsc#937371 - xen vm's running after reboot xendomains-libvirtd-conflict.patch- bsc#938344 - VUL-0: CVE-2015-5154: qemu,kvm,xen: host code execution via IDE subsystem CD-ROM CVE-2015-5154-qemuu-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemuu-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch- Remove xendomains.service from systemd preset file because it conflicts with libvirt-guests.service (bnc#937371) Its up to the admin to run systemctl enable xendomains.service- bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow CVE-2015-3259-xsa137.patch - Upstream patches from Jan 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bdde5-pull-in-latest-linux-earlycpio.patch - Upstream patches from Jan pending review 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch 5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch 5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch 5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch 5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch 5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch x86-MSI-pv-unmask.patch x86-pci_cfg_okay.patch x86-PCI-CFG-write-intercept.patch x86-MSI-X-maskall.patch x86-MSI-X-teardown.patch x86-MSI-X-enable.patch x86-MSI-mask.patch- Adjust more places to use br0 instead of xenbr0- bnc#936516 - xen fails to build with kernel update(4.1.0 from stable) 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch- Update to Xen Version 4.5.1 FCS (fate#315675) xen-4.5.1-testing-src.tar.bz2 - Dropped patches now contained in tarball 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch qemu-MSI-X-enable-maskall.patch qemu-MSI-X-latch-writes.patch x86-MSI-X-guest-mask.patch- Replace 5124efbe-add-qxl-support.patch with the variant that finally made it upstream, 554cc211-libxl-add-qxl.patch- bsc#931627 - VUL-0: CVE-2015-4105: XSA-130: xen: Guest triggerable qemu MSI-X pass-through error messages qemu-MSI-X-latch-writes.patch - bsc#907514 - Bus fatal error & sles12 sudden reboot has been observed - bsc#910258 - SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984 - Bus fatal error & sles11-SP4 sudden reboot has been observed - bsc#923967 - Partner-L3: Bus fatal error & sles11-SP3 sudden reboot has been observed x86-MSI-X-teardown.patch x86-MSI-X-enable.patch x86-MSI-X-guest-mask.patch x86-MSI-X-maskall.patch qemu-MSI-X-enable-maskall.patch - Upstream patches from Jan 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch - Dropped the following patches now contained in the tarball xen-no-array-bounds.patch CVE-2015-4103-xsa128.patch CVE-2015-4104-xsa129.patch CVE-2015-4105-xsa130.patch CVE-2015-4106-xsa131-1.patch CVE-2015-4106-xsa131-2.patch CVE-2015-4106-xsa131-3.patch CVE-2015-4106-xsa131-4.patch CVE-2015-4106-xsa131-5.patch CVE-2015-4106-xsa131-6.patch CVE-2015-4106-xsa131-7.patch CVE-2015-4106-xsa131-8.patch- Update to Xen 4.5.1 RC2 - bsc#931628 - VUL-0: CVE-2015-4106: XSA-131: xen: Unmediated PCI register access in qemu CVE-2015-4106-xsa131-1.patch CVE-2015-4106-xsa131-2.patch CVE-2015-4106-xsa131-3.patch CVE-2015-4106-xsa131-4.patch CVE-2015-4106-xsa131-5.patch CVE-2015-4106-xsa131-6.patch CVE-2015-4106-xsa131-7.patch CVE-2015-4106-xsa131-8.patch CVE-2015-4106-xsa131-9.patch - bsc#931627 - VUL-0: CVE-2015-4105: XSA-130: xen: Guest triggerable qemu MSI-X pass-through error messages CVE-2015-4105-xsa130.patch - bsc#931626 - VUL-0: CVE-2015-4104: XSA-129: xen: PCI MSI mask bits inadvertently exposed to guests CVE-2015-4104-xsa129.patch - bsc#931625 - VUL-0: CVE-2015-4103: XSA-128: xen: Potential unintended writes to host MSI message data field via qemu CVE-2015-4103-xsa128.patch - Upstream patches from Jan 5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch- Add DefaultDependencies=no to xen-dom0-modules.service because it has to run before proc-xen.mount- Update to Xen 4.5.1 RC1- Update blktap-no-uninit.patch to work with gcc-4.5- bsc#927967 - VUL-0: CVE-2015-3340: xen: Information leak through XEN_DOMCTL_gettscinfo (XSA-132) 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch- bnc#929339 - VUL-0: CVE-2015-3456: qemu kvm xen: VENOM qemu floppy driver host code execution CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch- bsc#928783 - Reboot failure; Request backport of upstream Xen patch to 4.5.0, or update pkgs to 4.5.1 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch- bnc#927750 - Avoid errors reported by system-modules-load.service- Add xen-no-array-bounds.patch and blktap-no-uninit.patch to selectively turn errors back to warnings to fix build with GCC 5. - Amend xen.stubdom.newlib.patch to pull in declaration of strcmp to avoid implicit-fortify-decl rpmlint error. - Fix quoting of __SMBIOS_DATE__ in xen.build-compare.smbiosdate.patch.- xentop: Fix memory leak on read failure 551ac326-xentop-add-support-for-qdisk.patch- Dropped xentop-add-support-for-qdisk.patch in favor of upstream version 551ac326-xentop-add-support-for-qdisk.patch- Enable spice support in qemu for x86_64 5124efbe-add-qxl-support.patch qemu-xen-enable-spice-support.patch- Add xen-c99-fix.patch to remove pointless inline specifier on function declarations which break build with a C99 compiler which GCC 5 is by default. (bsc#921994) - Add ipxe-no-error-logical-not-parentheses.patch to supply - Wno-logical-not-parentheses to the ipxe build to fix breakage with GCC 5. (bsc#921994)- bnc#921842 - Xentop doesn't display disk statistics for VMs using qdisks xentop-add-support-for-qdisk.patch- Disable the PIE enablement done for Factory, as the XEN code is not buildable with PIE and it does not make much sense to build the hypervisor code with it.- bnc#918169 - XEN fixes required to work with Kernel 3.19.0 xen.spec- Package xen.changes because its referenced in xen.spec- Update seabios to rel-1.7.5 which is the correct version for Xen 4.5- Update to Xen 4.5.0 FCS- Include systemd presets in 13.2 and older- bnc#897352 - Enable xencommons/xendomains only during fresh install - disable restart on upgrade because the toolstack is not restartable- adjust seabios, vgabios, stubdom and hvmloader build to reduce build-compare noise xen.build-compare.mini-os.patch xen.build-compare.smbiosdate.patch xen.build-compare.ipxe.patch xen.build-compare.vgabios.patch xen.build-compare.seabios.patch xen.build-compare.man.patch- Update to Xen 4.5.0 RC4- Remove xend specific if-up scripts Recording bridge slaves is a generic task which should be handled by generic network code- Use systemd features from upstream requires updated systemd-presets-branding package- Update to Xen 4.5.0 RC3- Set GIT, WGET and FTP to /bin/false- Use new configure features instead of make variables xen.stubdom.newlib.patch- adjust docs and xen build to reduce build-compare noise xen.build-compare.doc_html.patch xen.build-compare.xen_compile_h.patch- Drop trailing B_CNT from XEN_EXTRAVERSION to reduce build-compare noise- Update to Xen 4.5.0 RC2- Update to Xen 4.5.0 RC1 xen-4.5.0-testing-src.tar.bz2 - Remove all patches now contained in the new tarball xen-4.4.1-testing-src.tar.bz2 5315a3bb-x86-don-t-propagate-acpi_skip_timer_override-do-Dom0.patch 5315a43a-x86-ACPI-also-print-address-space-for-PM1x-fields.patch 53299d8f-xenconsole-reset-tty-on-failure.patch 53299d8f-xenconsole-tolerate-tty-errors.patch 5346a7a0-x86-AMD-support-further-feature-masking-MSRs.patch 53563ea4-x86-MSI-drop-workaround-for-insecure-Dom0-kernels.patch 537c9c77-libxc-check-return-values-on-mmap-and-madvise.patch 537cd0b0-hvmloader-also-cover-PCI-MMIO-ranges-above-4G-with-UC-MTRR-ranges.patch 537cd0cc-hvmloader-PA-range-0xfc000000-0xffffffff-should-be-UC.patch 539ebe62-x86-EFI-improve-boot-time-diagnostics.patch 53aac342-x86-HVM-consolidate-and-sanitize-CR4-guest-reserved-bit-determination.patch 53c9151b-Fix-xl-vncviewer-accesses-port-0-by-any-invalid-domid.patch 53d124e7-fix-list_domain_details-check-config-data-length-0.patch 53dba447-x86-ACPI-allow-CMOS-RTC-use-even-when-ACPI-says-there-is-none.patch 53df727b-x86-HVM-extend-LAPIC-shortcuts-around-P2M-lookups.patch 53e8be5f-x86-vHPET-use-rwlock-instead-of-simple-one.patch 53f737b1-VMX-fix-DebugCtl-MSR-clearing.patch 53f7386d-x86-irq-process-softirqs-in-irq-keyhandlers.patch 53fcebab-xen-pass-kernel-initrd-to-qemu.patch 53ff3659-x86-consolidate-boolean-inputs-in-hvm-and-p2m.patch 53ff36ae-x86-hvm-treat-non-insn-fetch-NPF-also-as-read-violations.patch 53ff36d5-x86-mem_event-deliver-gla-fault-EPT-violation-information.patch 53ff3716-x86-ats-Disable-Address-Translation-Services-by-default.patch 53ff3899-x86-NMI-allow-processing-unknown-NMIs-with-watchdog.patch 54005472-EPT-utilize-GLA-GPA-translation-known-for-certain-faults.patch 540effe6-evtchn-check-control-block-exists-when-using-FIFO-based-events.patch 540f2624-x86-idle-add-barriers-to-CLFLUSH-workaround.patch 541825dc-VMX-don-t-leave-x2APIC-MSR-intercepts-disabled.patch 541ad385-x86-suppress-event-check-IPI-to-MWAITing-CPUs.patch 541ad3ca-x86-HVM-batch-vCPU-wakeups.patch 541ad81a-VT-d-suppress-UR-signaling-for-further-desktop-chipsets.patch 54216833-x86-shadow-fix-race-when-sampling-dirty-vram-state.patch 54216882-x86-emulate-check-cpl-for-all-privileged-instructions.patch 542168ae-x86emul-only-emulate-swint-injection-for-real-mode.patch 54228a37-x86-EFI-fix-freeing-of-uninitialized-pointer.patch 5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch 5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch 542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch 542bf997-x86-HVM-properly-bound-x2APIC-MSR-range.patch 54325cc0-x86-MSI-fix-MSI-X-case-of-freeing-IRQ.patch 54325d2f-x86-restore-reserving-of-IO-APIC-pages-in-XENMEM_machine_memory_map-output.patch 54325d95-don-t-allow-Dom0-access-to-IOMMUs-MMIO-pages.patch 54325ecc-AMD-guest_iommu-properly-disable-guest-iommu-support.patch 54325f3c-x86-paging-make-log-dirty-operations-preemptible.patch 54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch CVE-2013-4540-qemu.patch qemu-support-xen-hvm-direct-kernel-boot.patch qemu-xen-upstream-blkif-discard.patch change-vnc-passwd.patch libxc-pass-errno-to-callers-of-xc_domain_save.patch libxl.honor-more-top-level-vfb-options.patch libxl.add-option-for-discard-support-to-xl-disk-conf.patch libxl.introduce-an-option-to-disable-the-non-O_DIRECT-workaround.patch x86-dom-print.patch x86-extra-trap-info.patch tmp_build.patch xl-check-for-libvirt-managed-domain.patch disable-wget-check.patch - Xend/xm is no longer supported and is not part of the upstream code. Remove all xend/xm specific patches, configs, and scripts xen-xmexample.patch bridge-opensuse.patch xmexample.disks xmclone.sh init.xend xend-relocation.sh xend.service xend-relocation-server.fw domUloader.py xmexample.domUloader xmexample.disks bridge-vlan.patch bridge-bonding.patch bridge-record-creation.patch network-nat-open-SuSEfirewall2-FORWARD.patch xend-set-migration-constraints-from-cmdline.patch xen.migrate.tools-xend_move_assert_to_exception_block.patch xend-pvscsi-recognize-also-SCSI-CDROM-devices.patch xend-config.patch xend-max-free-mem.patch xend-hvm-default-pae.patch xend-vif-route-ifup.patch xend-xenapi-console-protocol.patch xend-core-dump-loc.patch xend-xen-api-auth.patch xend-checkpoint-rename.patch xend-xm-save-check-file.patch xend-xm-create-xflag.patch xend-domu-usb-controller.patch xend-devid-or-name.patch xend-migration-domname-fix.patch xend-del_usb_xend_entry.patch xend-xen-domUloader.patch xend-multi-xvdp.patch xend-check_device_status.patch xend-change_home_server.patch xend-minimum-restart-time.patch xend-disable-internal-logrotate.patch xend-config-enable-dump-comment.patch xend-tools-watchdog-support.patch xend-console-port-restore.patch xend-vcpu-affinity-fix.patch xend-migration-bridge-check.patch xend-managed-pci-device.patch xend-hvm-firmware-passthrough.patch xend-cpuinfo-model-name.patch xend-xm-reboot-fix.patch xend-domain-lock.patch xend-domain-lock-sfex.patch xend-32on64-extra-mem.patch xend-hv_extid_compatibility.patch xend-xenpaging.autostart.patch xend-remove-xm-deprecation-warning.patch libxen_permissive.patch tmp-initscript-modprobe.patch init.xendomains xendomains.service xen-watchdog.service xen-updown.sh- bnc#901317 - L3: increase limit domUloader to 32MB domUloader.py- bnc#898772 - SLES 12 RC3 - XEN Host crashes when assigning non-VF device (SR-IOV) to guest 54325cc0-x86-MSI-fix-MSI-X-case-of-freeing-IRQ.patch - bnc#882089 - Windows 2012 R2 fails to boot up with greater than 60 vcpus 54325ecc-AMD-guest_iommu-properly-disable-guest-iommu-support.patch - bnc#826717 - VUL-0: CVE-2013-3495: XSA-59: xen: Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts 541ad81a-VT-d-suppress-UR-signaling-for-further-desktop-chipsets.patch - Upstream patches from Jan 540effe6-evtchn-check-control-block-exists-when-using-FIFO-based-events.patch (Replaces xsa107.patch) 54216833-x86-shadow-fix-race-when-sampling-dirty-vram-state.patch (Replaces xsa104.patch) 54216882-x86-emulate-check-cpl-for-all-privileged-instructions.patch (Replaces xsa105.patch) 542168ae-x86emul-only-emulate-swint-injection-for-real-mode.patch (Replaces xsa106.patch) 54228a37-x86-EFI-fix-freeing-of-uninitialized-pointer.patch 5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch 5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch 542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch 542bf997-x86-HVM-properly-bound-x2APIC-MSR-range.patch (Replaces xsa108.patch) 54325d2f-x86-restore-reserving-of-IO-APIC-pages-in-XENMEM_machine_memory_map-output.patch 54325d95-don-t-allow-Dom0-access-to-IOMMUs-MMIO-pages.patch 54325f3c-x86-paging-make-log-dirty-operations-preemptible.patch (Replaces xsa97.patch) 54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJK4.10.4_06-lp150.2.25.14.10.4_06-lp150.2.25.1  xenhtmlhypercallarmindex.htmlindex.htmlx86_32index.htmlx86_64index.htmlindex.htmlmanindex.htmlxen-pci-device-reservations.7.htmlxen-pv-channel.7.htmlxen-tscmode.7.htmlxen-vtpm.7.htmlxen-vtpmmgr.7.htmlxenstore-chmod.1.htmlxenstore-ls.1.htmlxenstore.1.htmlxentop.1.htmlxentrace.8.htmlxentrace_format.1.htmlxl-disk-configuration.5.htmlxl-network-configuration.5.htmlxl-numa-placement.7.htmlxl.1.htmlxl.cfg.5.htmlxl.conf.5.htmlxlcpupool.cfg.5.htmlmiscamd-ucode-container.txtarmbooting.txtdevice-treeacpi.txtbooting.txtguest.txtindex.htmlpassthrough.txtearly-printk.txtindex.htmlpassthrough.txtsilicon-errata.txtblock-scripts.txtconsole.txtcrashdb.txtdistro_mapping.txtdump-core-format.txtgrant-tables.txtindex.htmlkconfig-language.txtkconfig.txtkexec_and_kdump.txtlibxl_memory.txtprintk-formats.txtqemu-backends.txtqemu-deprivilege.txtstubdom.txtvtd-pi.txtvtd.txtvtpm-platforms.txtxen-error-handling.txtxenmon.txtxenpaging.txtxenstore-ring.txtxenstore.txtxsm-flask.txtmisccrashdb.txtvtpm-platforms.txtxen-command-line.markdownxenpaging.txtxenstore-paths.markdown/usr/share/doc/packages//usr/share/doc/packages/xen//usr/share/doc/packages/xen/html//usr/share/doc/packages/xen/html/hypercall//usr/share/doc/packages/xen/html/hypercall/arm//usr/share/doc/packages/xen/html/hypercall/x86_32//usr/share/doc/packages/xen/html/hypercall/x86_64//usr/share/doc/packages/xen/html/man//usr/share/doc/packages/xen/html/misc//usr/share/doc/packages/xen/html/misc/arm//usr/share/doc/packages/xen/html/misc/arm/device-tree//usr/share/doc/packages/xen/misc/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:11478/openSUSE_Leap_15.0_Update/2ff7bbfe6252b11e375926823eedd926-xen.openSUSE_Leap_15.0_Updatecpioxz5x86_64-suse-linuxdirectoryHTML document, ASCII textXML 1.0 document, ASCII text, with very long linesXML 1.0 document, ASCII textC source, ASCII textASCII textASCII text, with very long linesAlgol 68 source, ASCII textutf-841fc7448747463dded61583ecaa8f14439a5171b63f01fdff3e2383a8d6825ee?p7zXZ !t/] crt:bLL Fݼhse{A&ʘ=61(I!UA hG`)Z0q$׬4AJjʵyY&B4 +JDBWOgp|x1jesTQ!/FTt1wi)0b9]݋Ys$3unf=Tέ/z$^8iQʝk W*O֜]oqΤ7PWӵ8S6X:)AB֗:CZ;>$\ʥ'ʗl.UrԟBa@]m!f5iԚYQCSj"MqΣ jhtE 3]M8R"ABjѴOnH[zgG= ,|N9nYUu^-?g[/tǞ֞[`r*NWh`@ָ3eMZ|RUSgD` Ѫwj;U <=VO&IIK\M'R^q%Pbj) +1 _}+G$`Ő2mb=bQuM;}HU?())4}{_Y h#ҶcajS˜n Ɓ&wm>es h2U1d៉3+ȿ&{Nv& +bHPmuzif(8ZW Ȉ e6\@r!xD[&gh諦34xB )É,CٵMYlJtq,䘩3 ί 󿲩 &p\m08x-P߮$sb 5)A=0Lt,0Pr(3Trѭu葽 VЄK{쀰>ܮ8 2,:/RDzC+♽D? b>E/'<{spmxN3g4_rv[P IGO`긕!џd9!Yl"Y@l  Z# !7yّn\kh|BbAà*{ͨ[Q{IpՈ@3kRBZF,6q4K+$}ͺF<2+x~ypJpi50w>~=f(Fcũ$ĥ8ʓHwb1"FY(яKAq}$7d<,R=h@e UabFY-K\"Λ'+KcxSCvW@6\mwKi~&3׆qJ']SWQqP|ꤰT7gl728 *mV11?n绋GE[x2aꉟ565CX!Hfuv.d?rHR)9FVQ)*F?IG<&흉m@u {ko{Q1$iƂA%5'uhr(D, N }W.m1La A7lLI:xf68Ư=o##QvG1E&I3X]QP,FQ bPjgWkC[i nyK%_}>^|jcӱ}mg<2fhvۖ\ӻ(oxTfN=Y]{:5AC͉eY%/˞葜;_5>W#V>-]cڊ蓚Uk aQ'`*Pbxĩ1ܙ4"jSk?}eNR`o"-"OR5/3#~0ފאq᷸ǧ3= .>G m *o$V\|jOCEpbiߣa ~Ѣ=/ڒ҄mIcsՑH-2p(C]6b;8VL\֑zI3=</p"S E t]9ށVOA@ r #X9찊>6e3&~΍$ǎ9zKyktFsJWj_T NX ߘ`7?j#5vRY׉!Lဂx6(~*!F"jmp=#E/kuW\6o+oE(OP"6@Y4(Hb#|V+" /%T#.m| D|( 5N%"=M ̉.w #YBEÎFNr`>ۜA\fIjkׅo馃Ajԍo%/|ZN oVh1lһ1. ƬHhOϤ,BIxوN9\38Gnxx5n5']XiuhJs yZt!m{E M&K_T.lz-z >vz8+a}Cx݌fzRVā.J"Yܷ4/ "9so0` 4Wz)^[Buf4X#s*nZ> %T6rV@(m tc!Ysf.pF>Tvq%09ECif&b>}FOƓD2Smu.iG좩iM!2v"%:,"t[N\|q]uq~Ӭ :4îM"B# x/G\ d<#6_I!YԖu[X')8sK>Qi X4*L{7v9LU.0*\a̚'`uv`K\vⷓs=Rֳ1rAiaVp!c1._ăro!;T.e1r*39W*=Lۚrd]Jy!uLusj&!~*z-$W5|/lz2Lãi}bA@dd#ٿbk-Z`J㻭0!r|z+檘[ ,ޱi%Wc)2[H8 'AoF;:EP96 [Zp+^kC DKl=<_z/DgSD$ |-C ;˙OYBbp>,sUhCSjuObdAqۇB̿TjG0v +Y+(95m Ouup|\)|,"?&DDUxPA 1%K[Uɵt݉@/'oB"X1b( ZYd("]dzxrcI1+'LC!$O.@kqDyof:F x|LC{}5ۅ]yFN0:^Ivbt_>,=o .#"64P\bSXi# ByNtyp)τG%~U ;GܴsFT{ o>feŽBxU[%.준AW&R@p/)rR*n߾}Xo|Ņ`*CQ0Oxf2cLJ8t] Y5%ޛPmm&Nݶ-_hb X* ȵx2S D\Lp7vo)f 0>4LlhF9:#9gnl {JƎwQ(6m7f]H t:*.T2um.Y>0Q=;J&ˁyzJ=Y?D#uePpR!LD[n c~6zV bO[yz!uC҈S;&h]sh9@X`3L IIu+Scϟ8||ueWF濾 ;՚qM^#yt0k͊OR)\Wh i4F;L Zպ_ЯۜܝV Jg;cdfo;Y,ѮhHn2Rc殜#2)2 Eu[do# p;U^-:۽/t0`%$g0Pfݔsz<UD[ )f(6 qɉqAc6q\@$O e^UlL tED{|UqL&}g~RZD ށA0\o"m3bUU^^|< " 80gܭ7Hq%2]d YTq0mgD z{,XroKΒ3D˿`2Wb$V yi"9s> H/g,|MՉPbzDhbvv 0:ZMf:HfSȹ<2 @)Tk6zJ@>r-B&3s<᳿Éb5h$ ;XyL{r^cf79cj>l͕q`F77:jGRF >lB%@}4Z ى#EH.aJvVwu)"M3tr&]vS*a?Sq4͗8ǽ^r{?x= h(ZLxwȑ}SqfX؅ΜaˎݠiE.jh4` \@?+DRԋNU>b \ɴ-92/к5+guOy_Bw 끤3hWL;d52`d2}ΰҬZfEY5MUnXΐQm!"YL.Z2^o@ikO }V)=DܘGT(m #UL$@CI*=Dյ圤kIĻVd1x&h*WΎJKT>Z#ƅt8`9kF̱O$ E,$J gjSuOc\vT/2u,ں^(mIa[y+ʛ`.џ[ٜ(EΆq3n/ݰ.ņo\TtWWj ۿFvZ[!Z'])پYã={ԳasΛHDuKO=:|RfE eE_Vja6si9V[]@M/?'k&HrL=3sѨm ]z|RY|Z.fZ+I;G-%,iV^_ְƎLVUə0$t3R_a _"E&#U[LGFTHn/ziFٞ3{|l[du֛hT5W~sIw{*LkUҧ2nƫր%'=$aڎ|9)fWĦ]\,Bސ0ͣIGGqhǗsc^џ6[DwF.s>L~;9(~YoǝЛTk+;Kkb03MR8YP LNҥaMh0 =XlNv?5ʶIZ tY?) icD^t ڂo|]i}QXun±BϭVP~X=nۓ"rkSf@2kAGzߎy-|y 5{QO]/e8N䘐~7F 7M̌W}8=888zZǶS^ƒX{˲_1Fru;՗aP"r.BJti<q|&o`uf Xo&Y5N3p3P9бGĽ| qpd4@16-i61SHWɲz1YFt K dWQv}ZC 걯#ϠqN($ĸHh;"y$5[>xcRO(O}J1ӨB_aPp+Ib|F&]7E۟0%.%K(NL]-q>\F=f9#lJxb3/;uTy<_@a5LS"w.:V3 ,<~5]3GdX$+o'>{,gpyCɲ=~y!΂Cy--F~DyÚΉ8ƪg^Of̳7j*_SHʖєbl~PR̈́G7"HC =AjRw*S(~bOrh+u&C ƚHEBǔM9tjE7Ldי8rg ONY崬?ηY:@^4׸!C~j:,6%r8MIi7ָٮ$=|:R3c];a)CI;rͪK^Ǫ\NOvX%z#J&ZBLiw OPҠ"3CkvE)3_ flhCo^` \ݭPOraǮ͍Tsě=\..gJ1`sDt4K6`x6 *9\:\ \ZJPz44Р9B[uGKM~EuHQ#ఘA,Qûi/0~ DF@G yWvL^TFFKQܼ\b2أAW~W< [{"JOڔ+ƐUH^ۨAl/ilME+]fMxv"w#ȿΝc)r^?KrrF:t? = xz'6oMq(^L/#MvCay_sオ0$}ƭjŻ١=~5 lcNr3/'Śmf͛%ز;nQQ/s}c`6I/jKVqS>q7U *RX gv|PZq2ҏaЁ){Lj.pLU7ȥP)X6n/,p;ӻPB3aYYK{*G@BEZ")^\_).'嫿ˤcA5xNB(٭>B{ލXKԢ $bO ^-XY3O%GMg*%,O kX㏞J t+N^;.zKL 6s9KfD vvKg #*Mp8O^LY>R;|ŮԐj 1?( DkDc]$<Z$w=5n:`q%~7_S}۝jqULY2$?G%zFHUayiv DrDbZ ?3:s]m+uJhꑵY=C;.Ikm|YY i_cK6DNvOul4 Y`}Z>#Q1TR$]vkE.1\)|e` xO|Z+%w߭7!֓q[;(mbx+6s:#U"k,0Se*`Ob6A+mdVb؞~86b8ߌYEAMd#"lꑕ>lE( #+ %~"~KEv8Uʵyotw<&eL4(efQBE KTɥ1٬yAYǹã<U b<V6?b" *Jg-i)#V"%B 1bb j55n%x֖ۜ {fUF%*݈Mi+t߉V;{9L;~+'^}b v8W: ~T4䷱m630v<5;QFED fKB9llW c74 <7"tոnG,k> 699štPkL?Oc{-9V>5cwи9jb8Cuޙ=#[3&'0?r _j_8Gi=!nYnϊ0XW TdE.ǫκ4$bh0JDN(\jgd1cS1vWHjssٔ`yZ], ,f_ETlL'Q/l2irr}[ W>gt2mƶϢQV\0M/"He>b{0t qRO -' ")wE= '+#77H`&)?Z O~罳p cpβiÌbv\_Pzeq(QPDL>qfAwUl+N.3*69DZ&!2-r *6$'LAblˆ螎_bxLG?zUwb cC!Mc:Ѕx .i>a yk4I [fny&a]5]|G(&X' }q _}!\Hɑk7K=E !U~ DȻMcTS%2bDrt?׫Oj]TVKq oWI-ɑ 9bS>cjAϫk/1?/1ޯ(n26:br(gQj`W0T-z6~u؍lvE\0En4M^0=z&Jx6}cQ Г- -0nnЫTJ38D"%չq/4|0|%cJ,}:ku$ @'RG7J3c'="X,W0m.y}Trjz,d&X,u䲗t#0FB)WUs1,U z^%#@ k쀽ۣp2`1Is>XsHN3cAãuOϱh5J ?lɌ׺9.)] :EAeY=WL/{7("ûPsI}AC#\>Mh`SDۇx~jA? =K4ǫȸ~N=< \A66klg&R.-Q?J|:w8tTC\# #n2xegbfQhK]v!8yc+ e3w42N-4i;[y8(ZՑ"Y'7- +4 aV$F\ɻZF}3~@Lxxc:Ay|r%2NF㲈08dr6AmrA[P7왚TϥND7G4 MyERd -`b_Y#X5@ m5+fg߽{@()s?|/׈n.Ԩ jPWtjS,K-W=x,_Ti3WGX3pDb)2Lݹ4hՈl zqI%ȻBjRA؇: Iժ5gsq1!YexuNi@m<$J ?* ?^xU4DܰS\(`%=a::m['-ãA(C2Bi k' /eX6dۭ|Z+?~KLHU{ڵ 1,IuttU-WmMJ`Bϔc .g89d>`2.9?is{Q[#<͐QUz-z鵓se0Cxj?:"b5ԅ󀥁yف3 $9.y?vTqo [hkܚ{lr͏ 2|B2iH׹ln`6Aglwz÷c?jȠI8`PKÿTL\VPƲrW)BFݛLBPa]/?]:?("3_7~(O2". $:U'IHi^Zyܵ#imߤOOIr26]-PuZ3>&/*./a5L%Ey}"Ad={HHVfEL%P؊C.=9aC5l`6 y RB ъs|_kճW0֌ugPdz8~cAH | 2S,*]_KC~ZϺȘ"o$0h+݅J놑<@oxZtG,k ݤZs0.h:]kv= n9/ͥuOCOʯ:<'QJ9x¯ yy:0a$wT¡ !||P6|9!8F];ESTu;@*4n`vl|L>4x q/ECz&m\OD]}jOI"9oke=P0 WHӇO! hܧq};|@O%΍qÃiOőF6tm.Hp`݆Uo t!nAQvň 1WUht6۟OT}6Y)Xe{{ a$&/G-8W]k$Ca= Bap*e bKNy1fZMe۽ DI2vª7Ǜ^~brC::8ȉmlOQb&"5{XEU(e*Mxйp.2|19"YPeIj{y3Ƣ ﵱn˽~ ho݆kM3UQގ&`\OJJ;^79XcKe M)H&/VC`; -S[B#J|di-h3|#Ix{ &9̻JY|UөxQ3b+2.!;)f( =jeF. r3V{msn\qݠ$]W эBp27Hx.)$E)%O1DG8檙lPJ"MZR۝(sN =J[q>VQ6ޮ3G" Hm4t d`T1(Qmǽʡ!a ,NZ+'2:T&qQc;t[ gvR g˞o( 7›՗7tՋP㽬w>N"GOhWM?k3wׁV8#zha KHl8O:SˈDcс#T  _t юo6(DPl b=}>ʛ9;{ȓpm}Pb^cޣJUIی_)KUA8KO% Yoѽ~7v0K R0ݘi?Tw|hTDiJ:|ړyuurc:$HSExˈ:H+[y.RڍJ nJ[l/pvkeĜ[E =MԤM Dc8GU1M91;!%e]6vR@շNFyUF]Mv}M5As:>LS}YK7XABh"(t!"tggFa`[Nʚ2a׌| B,nFu(?Iqqvv`L)&[o#x$UYR_S|(y6f@-AAFNxμhkB#R _|B!& qS2Nf2/+|uKOUPg-n3p,\ӊ~FUή`YAb,SnŮO8:RtVߚJ!Xx$"l8*%b n !#k&1 0`;,/@LPٵM%b@N*2[NWJ f}ʡkk1f>ZqSPֲpp!M_J-aKI,5s6-ͨo#͠c%&:松ջqG1`@YM\0ͱJGn>Ah3t)$zX\tw.ove)g x{Q j BO'gˢm:75dÆx )) B?vνP5M\19,W{BC]X6wh2@n-fi[&\21zꝁiߌz8 .K\cݣ<Cl2s ui1w53?hue'V0TaƠbojZd ;͔.w-h!1\q]?>K\0WEh)z~9آ5]=^(02݋srx|ѳS_GgF?_` xWhKyN"-v_J̅߹ enJ>W|,#0UE_~<̓nF!dŵ4rx83*\*"H7 ҵa11! ~^J q($0V6 Fnc;ˤW}EBdǽ(t^sRz:Bx=1bxDh} Pi{լG](ڊ igvǼ)G2%o *a˚q[rq^mpNr]X.wFgN]b‰v+ SoRՏȫj(!|ʧ*BV=F'M`UShaM'T aK$sl4GVZhaS ZTw3Jt6AqO^P`M&4hN\9*/hTXRG<=XɏG 83@(Ĺ_OzR0"%I%'NSLj z4M.UNťz(?KbHvfR9p57oļ|WOA RAb1DD,M#zLkU~M7㶓?/ǻ0y3<[u0^?~sSݰm.1oq,(iسCޖᵭݜ*t?'Fɽv6`S>{*彷w7R!╌zXPkrtb$!NG$I&ҕˈDE`qulƊa>9nlrN$WnexҝRXkcB\`Tȸ4{ĴzFdzYr\#&/fLV&Ѻ %C1;%o-ѱ_T!(JPlT2F&>JT)MW%Ԇrª+o,_4oIݿJTzS 'm$^sk'^\!i $En:2nZOY\UR#W>֠p_A쵦-t+bwQ*黀{[rjw0Fb$V߸ VСWf^ƕ狢"uD&yhK +Tj%P_1 >qN͸T(9c@!ڏ7L[c lT<٦'ٗkN-oY,.5A]I=Q4BG fU]BO[,zG:"p=UC\_{[לԫ[Rc |qCʰpwUv?oyZgճs!$d&&y謍QU6TG{Ń)(OGrij*\YG YO**w˓&[J{_U0pWFiyV*ɲ5}v LjJ uJN48cEa l9A*5|adYrݮWΰ}2Jb:Sm ؠH6ax9<I/ĢYw A,wқ|j.=qH:WcHGk}wb̀9/uޗ+._a,CP^k4dK|Q@'61]cAꫡf zz3Wf8]U& U;Zz_\vr Г'LUNbș2JGˠXKp')dzVzN JԞ&/Rhw,+=BֶUGS7DGtzѫ 8 -ӅpMX(څ}5R! P ȱֆƖ6g"%lkknp\#CeP),&0 !(m֓`+tp{#g+{^Twֿz<շԉ@ |5Z<\nM\kbs1]5Wv&%ZYϩ #Q)̬FA|G6\)8k3WUiNzct0խava)|)<ktPw_8V;ڐ16Zf;^AR`'޼-R%gRMzr⧫ZJ!6{MzuP՘ܚ%v[c6[(KE\o*@T Yɱ$[ćx3N7|aXfM!73E`jdk^s[0؟QWjPwVn&C LŅu1 aca^t+ƤBa/W44Ŀ PXεX 1҉.~b,(K9ypOrJ8SCbؕQ=wA{n]iSi\wd*IҡDpk1:k/yfwm:䪊M^7Y(@6 |MKTzwuN޷9X[oy<`6̗=˟_;$R|zNY|$@N\l:DZv$0aR&VzR+cFR1ɐ&c`!Fr;7GЩ }KDGj}v፿wsSbĩN~UL;xF5{oYR;8 'r6IY^U}K5Oˎ j|e|jwXps~ 7j` CVC޹Q"Ӹ(5;P5( ZQ]0a0#| Y2-xQ!h&5tH)wq.PKjgJ7NI4vP`?](сqG PH⿣HAY+ŒB> ı6"]g|uoڲdcSJ#uU 1__9AYrS`ni T y s:Z+yhm7|[h}\'_nљO#M fFSptL6,AE &O<8D||ΏwvihsIm,}yP!_'SgcS_3xg;l aMN|g#;{_WYt/?4E]^ vb %t@jTI=2iZb|ś$gW0  k ݉ܡXy;>-xxl(ϊ(|q;6w>|_2?ܬ1X\&X-1rL&誖Ƥ`pU,SFfH]RLyQWQ}gs%U0+nV6͠WՎ*.]Y9f( u4-"JK/,IqN;s5i&B?~J$ɉe#=sFm?ʲ7~, ,NUn9#g2:7Jzȏ6FVb/K$'?0R.#_SJKE>HQE `Msh[[u6 ˋ\#Y>}XYf# b+9k\b"7:+^F7>B∅l {q)NL=F2D*BA;|bEz\,kKOr$x+5x_I`s.ִX&v V/6+$cSP6惚gyNHHVN'GD5lDHE%I;w&6vl晃w`g:&N4f'GW'HǣF7 NfZ<?0SqK^< Yۍ6A'oFrC,}9Pywo)H^~_wK{+\dLpԭgG 2 &MŎ}W%m1.( $7C!p0 w3J]!O~zCϸNڃ TENP,n0hW#?"PFp7pBmdk םODYu.caKq{?TeJd])?:WEDlUq#<fY;z8D:ÅmdjDdjCYF{X1aQLL 2cF xܷr9f >z35zj% ^au'V6_=9$-ͦ!{|"ۃE0 s*?cD ݨ*e^.b T..'_xa2hAWY gGiЙ UJGv7bNг8N1K>2ӱ}~IdSg +lA/uU-8 #LXĮFYƃuaVXP:5醄yͩ{wXeJE0TB8aU9Idv"hzXԳɤ"x"{D s}F@ Jz2E ιɨCP9өs)p]Ϡ髖bРݼcf;,<.ZVVl,$jLJ~hQnvDžZ <6 1|x9I<_6H`u(P JO^hZc.m%xYKΘFsixCBA!ztJɴeZ.YizDGO;!o@] %U%_dfN; rق}}\'$P阧,=a'#hb>_l5ܯ'K5u&E.8WdTw<]Vcd쓌ƀ9VB`ykB:4%5%I'`6_j}wELz껋Z lflQ,U c|tO&`U׺/'J0# 0d=W ^w,VtMC~˯[{0hatXWFbNQfb y4%7p}I/}FD7G0CΙR|K[1axleoJ8, P鉥K=wʵ%D v~&igW%bG1*D++q4Qa [.\.a>6Ke|z` &+ -z" nFBE'J2|#A-ٷB$ٔÂSgKlr#3RLT:vc]=& (uذ [O4W|.&OkWZCͽz с/TO: 4njX_gfKrLl{,|r<eާ%#=9=xǴxknsgӫ$~)pEcY??)08ڤ֠\˘y 9*i'h3L|P!Ni[>q솓A-<ڂٶpo,[5cЫ+ցޙBZϹLT{Y.fZpc%bGF+rgA6[nE) I5fVNr6F[0ՖʀHRS$m.y6{Qh3]tfdqQxUp1_Z)cT/*W_*ăUʄ OuzY?ﰣ4$A%}Mj'؋˜i,b}L92CK­rR#VN^w'Ha+ź0ݪGב?{,D~&UƩ\fMOo 22Y's'H{4ETm.aޫܞA8G;0 5;g*+A[GٿO{IG-UKp݃i|0OZ,GKssF'6w!@Bz"y FT q`|1dѸ,ylCY<Kuz{wv~ py}5 7P[@ `*k%m%0LC5L4Td $L蚭kk/f;ўv/i^P.Wo` Db\skθlO<BᏙfzրT+ˉ%'a,CPvD uv]t \gg*<1z}[HB0+sHUXh@^w,AP#WO0:qDDs@AxFU"$vviKICw479zp+U O׽̤n3_Fm?fϸmę/=9zR&Y^TH 4c(RSVO\0akWb|z?+>~dē|O!=')TR~i<ꭴ|I7K݁p^w KHxB ҫm۱q  ՓS3gw›Ca1 orEx&>8@Lܫv3<A M2Ȱ?ggv2hJJfIb%P% |` ȶf.E#]KA8d?(]&2ٮ] qWA\ Vm047+mgC0gN)t:EᄉV3pׯCSmMgğDD: y$Ԇ M[J3A7İBO#²vWOrw-!O>.MNhf@;kEz?"i%͒Cu|fT7G*4U*), 4h ҄bz=H(e,*EILLJağNJtjd9`ڎn$gdZI'*\\-KgywS$fMEnD!t[Ud6,JL3aN:mne2@qmyrZZ%^o㲹#\Ўl2늙|wZR\L8тsI=T!/@$jW0 -J$XsN]'m.M|w8u,ȷgH\lLY°K X5;]'Ϭ)):jђ.aJƘ@"6d[gF s*B#?:}p"iJ}ůcLw~AhV.`Pǧثbk'J~ߘeiTtC+8rPC2#{sHH38`Hh4[G&&Fa1+MgeZG{;׽PNg Ға&AπQh҃8M^Z+Zu7;[<)TC#F3h( qXBy36w}{ԞD'Fô( %ΔaREa`+V1x_(xK~Q-p"'\žN62D}2OE í~R9r`II*_: nΤ8tLD=wFKQ준 Blzg&B ]J 0Ć.+jh.Hkp%o,(gqjOg2wZLDD.<J 2״esSI:(ŧ TDs,%o4+/U,ͅPl@$q?aC>ptpbjs =BI(Qv䊄4dE.Gh1tP]R1= K"W޳p:jȀrrژ&\*[57s*~EϽH (SN3* l)$VD\i5W^e]G 2Spؑ k k-}тK#YehvPɵïbJI0_bR Q3xg )PmjÀhoW̗Jgtz|ReL&"Y, mr mBhGn6 iP*i6y1+N?rhe2G]J[an#<ܚ\Vd|H$s|/ݤm |4,I448Cd߸]JG6 Nx"LG+܃ 8`@UM 4}Eԓda(ˁWvx,ˇzG'ӗWc}~'PVdwxM[ĺ~* }V _:3w9-z弝h1OL ߶Ah}:-Gk=S1cFS%7t!b ]q@#=Axxx!(ҠŐ(д•-/x)o υՉ6p}XhP^3EuHEɮNf}pN/ Wtvk&꫇'"nnvcw@)W3KC2Q٨ \m4d+Kvԕ{o"2 ikrD7k̲ҵ3)F`u%GS$d!5FFy52FOFmrbkñ;{=_{v 30<K;qƗ]29ZYʳ3qM29mWV~gXϧQ re;33{Lsdg=΂״34^PšY]b/튣H †~n j^83%)ܲn+!j:vʳ^#K#lG<XA8V&)yUhc~5t%`|ؑIkZ$ID,;yKoOs~J*9 5&hg@h!,'FfD19ͷQc\L;*:;tfm,U#2t8IaIzn(ǞM}xHcDa-=[jj>Afi<ڗ 4 ۦSݟµx@;@ TH>>̀*hJIu =y艧7o]@\61 ^ "sN 3 QmzVIoRz8ҍ|bvNpٖhfϘE$x3!M* w X)b'|y48G˗'#Ƶn5t9Ky%c>Y;75E Yy %~mR*64,-,0V9 M͕@ ҎN49Emж7kb($sKpoYwGyR[Y^37XAҳhhŶ:^enC`5`^bnj3㗝 ޜno+qB-~6(.r9 3֨]Ʋ f!m̟o_ 8˒8@ Z85"@0#%~1_B"87LgcF*dUĄw⦤alqSG"5!D>вɴ$]Ê{Fa|iTcذjk >* iPJ!PL3uBb/4Gw՗;ma (R0_":8dơ#ۼzWٴq=HTDŽVJļ)r¤Eeq`I:d+WyCU&zėcW2r>d # ^s˔:SQH :92'*Ё2hҀ? .@UGn:Ӗ,ΐ4/m{j'W"o öWUŰWY8zL#;KQeqȠrtݴ+55 Xg4j@+,CA@@OZZ;Ŏ[c#2Dp [5*p/`>T(MxV[DY=I5M DI\3):rlKȏUVFR55qӵSy>&`C+uDQDD:e1<-t(ɨ]粰ƳwriW n/ 7+&;1/rŋo'l#sדFn (W$d3O['.S6Ɋz‘`.Fcv&ÖSv2_ٗ>Sl <~,XA Lhp{Rv})_tm|]m}mzV23s/j8PA A jT-hnygp ] DՀ7_̖΢нjtA$" 埖zNX ^\yFMΠSrH _r_] 4Z5`mSf60*gnJG[F=w>6C5Xb#f]`.Dءg1Téa((!mz;XB-]d_,Ԁ x+~qF{b ORWRPB0I;"[Sk}8,#pݩp,8Zؽ9F`T||S!;a<µXV[| LpCygtZgX~TvLeRI-'mxu_rOF;JMҠog b"7qJ΋sădp6典r߇4W5!vh{(rRu/ =SN{I^- 'Cu:Ft5 71 w .:d@]e=P^}\ (쀤>C8zyeH_#r#mf[]Hh$BEŸFQ|eA$%"'jF+1M ; kS e`19:a )XG;\F iIJCATJLu/fze%NIJ}E.E(,՞Ssm}u"¥ x|-fP;2g~儛"'Y轿Ϙ Ò] G#5T>癥0S]ha]0'͘ vVNfIUa'ྕrt8F[cߗڿ׷p ^.:XO_#}z5M0w&[ #QJ*\9hV!>Қ?I邮Ŧ&Hc6 Z>eT 4[Mi5QAf_bQ=MKW*[?㐪eΰ]FCg^oQ=fW+{,n@#99?8rV]j: 96>!?t “?'-8)Fsr.r&Է[/ n s6Sen:.y-/9Kx+i7" K|5)'0Z&f YxI[xKNums7t&du eV3sN4t+|neD#iEo_Ni"ғR̉UMY-y!0J$8te`d{GfO۴w@E=!4C쮿Mc`Omt(6fV}ݭZF$"BoӼh_]Z ;+RQڊ~i"nυ|\$!$tƫ^G=_HvmN4^]]s|ذ1j^ \ 5_[-J`[w_Cs hV"U21"?O0IJ(K$ ZtgA&%M\,)WSNFȋMFS- m˩&|vk 4"0E6T)9 ^6SO (*JqcD*ħKP6q u*㦕ѲYvwMV6Tc,{39HZt>N$Qgcl |ͣo穧DK} 3fǓ=B3ޖ|yЪ!leѣ|]c"9W꒮_U;gXLmDg_.FR( *lov׏G5FĊ솒R< +'ŻN}yVb!NrS!y* iaUFWJ$ ž3Mij"UbLYo/Si{"A70t^$mc?6ge-=c"6~<_pw[h*Z:'{?_rF BD@ҥS 1aPfp :+&+Q$|c\5{DŁWpʮX!NuBG9iW;X/‘82Z^&B }ux.47Fgyn(XhxO~G(0@0'LwK!6enW'4Q͸Kׇ#]|ݕZrS&6>78 \ښSaV킇)4r0t6JH)I gM3#h+e"O"n 2xYʀ-A:MYgVpەtTS8>xPDaydnTT;Mi,O&p'M;nM]==(Y˓/J8.6A_T[`e~AdU9'!/s7j JlS/Hg?fh;oNiy0%J傺1muJh"JɐE[y_ɚq01:NT[ H=%L=agHԿT^K:sSzVhPMcgMK=#{% PdÒ݅(-3'l]¤[0dYCi9q1C^ !D+ @>l ꯋV9{rmKH4{J#?|\y1~|}x}z>L6fMhMHHeI{UZ{puo״)ԁSu &iw>%#_u`ۋ+Yu=fC*ʶbz#f4=᳠{ņjp.ܜ}۱r8뢺N\ CT 1ȷƘ S R 6ioo:8P̱} ,8$֏*,*}^8 "$Sn%f3;˔T+9 >G`@ ޙC萧YKY©R5P|9+i,q|Xv.Cwxā 0SSN U(EoHB-/[ Z?@#{^dKQ$<ϱş+=d Qq\m&=k!xU6/Z ;>χiP^vÜA|S{3  `Ȯ39.n~{aK^ sFplh4:&t׿R7P>0ه+mׁctvYֲܞMad=nƎ(]6yҚ?G U]ՍR=gMKP^>94T"";4)CnWפl) g\/x#jW]>BB k 7moՇ._F.c$"4eUɮS%(! ^7JS. 8^$:ɚApSyy@1D"[Eܔ-UJ& d! ~"$ 1oDyӯta+.7T4_NE 1>4Tfy'.YK~NNEUh q ڢ\x sv2`٤_d>!@_+^lg:1LM/DT$=[oΠ{/9nDSQf;S6RFYtVW|e#!ҾiKh`f< 4q0 #W)K]ԯtQֻsDH47,F!! H71-8jU^c 8zqe6lMeZ ʠOnHiؘTyOocE `~X~lbcm\!ߨⳮ:{6(ߓN}rSEJyjs'.W,t${ K/|{*% dQ=4]\;[@+N6&Çu m\%m Zh%@կRÉج3d&3MEAŖBģ!R^lrJĘτe= -1K%Ц VPRRWӬ٩)7(8 pHϪrD㭰.%÷,&nkxCKL$6Θܸu):?u# U3u0!Gn~[Napa]s/,*)[ZaM\|4#=%pLrχRYE (+)CLЙ%>\WcnRYˆR9b I'^PP沣~d}>qLZ?ga">mRO0@rS5<`)'\K֧{^ozX’PB"j&;ͣJq'L y AwPJ%{u_tv8fUi8ɁrעF:q<$V_U\.ڝOy}.*d1L޻ zk:^(EC/&+šu\c l5q.]14Lװ9pb|G6P&srJSkWm,۔;^,tY@m5> _N6McZ:@0+`5g6Wº5YR#djf'h!P*R"\TS?;KM_\g}d#͔хQqO9WƮKqsK2tE3ߛIYLVv=r*0ؘ8$F2ұǐDۗq׏tEۅ)x)dfX!|/r']@b[i]yº؊KI7uYfR*8(|RW\]쥜IW.~O ː"ȗ"ʹ`;3(hA% ۶FFN߭eY{6.r };BHѕ u{5ޛ;y`+u=~mυ0`9Unn*],G8BՈ&sP LN B$gE\Vq}4R40mpR)%~{zX|3#L2T֊+D!cĕFꇪB&]Jk6{W8ȪgJ8dB 8;R#D x·R+,QanHCmsC]IعL: `B~S$5X}ӫ <5iDt~.>Ö6*# GG֏nW=_WB" Ɩlt np9k(G{=!elv > Ahi2#XiXI!˾Z{)>#85{uד(QQ0IQPS0˘譸aJA1KYYQxYمG/4ofֳ/"]h8n}N*ջ_u(y/34; ^v&˯5SL te)pƑ#'Kot˯Π'xvHzUH^gPȴ(HN\z]aáׄm+ؙs|g,8R9+ H+DHwYPzkC{R$hHg ELB`k30CC^5o1`UwC9ѯ(1y' Mܹ_:AM$ҾmCT1pn A0/HG07gSc:mŧyP즜Mv51=T!uda%GHō5 a)~%j -47}7NʇoT t%HqG'~{ۓ^[&༸|XEC}!Eo&U ԫ'W$i)18j_b)GnL@nU:Q ]Wnb. ,zS Yxvc}[MfsO5jL(:CԶzeKOH=-_Eo<GoU0DDJBVO1NSz9e1iC]Np$[$b; MV W sqŪ:װۼ8|At54[+>tԀ|*)6lRVzywD`ʪRPȑ'r8u2hϷ,<7M,T)< A ڽp׋64;uqax=e}'ù&qš/؈JL~^1/*Q_*ޱ#]uiy;?HWLl mt:ꫭO~tmQTKaPM#^1ǣoen=)-d~2Xְ_*5.2M94ozH a3Sg9wejlA?I@+eŰ#엌}8G]ړ3}65HvA#} 4[@#<#Q 9!^vaZ^jbri\L֫F4e;Lʮ'|kL"P_(~n!3dF$ [&B1#]y@_7F޲OӞ KRD2W$~ ȡ7L.H.FPi/XXHvY pEY7OMbNn@heV{rcȦ)a>Hϩ|OO9׭%?˦ܒㄍ4̠*|0O(.'۹V"fV5ʳqqG=m ]Ԧ 4rKwG|25T:Ο۪#]I=̤@6WJA 7[L,dL)ʻw;}=FxُŇjCݿK7ecK]w}70=%$%L+Q6,~ȳl1qshT[Ok8Yȫ-4L-f^N)#i IdErr0h&h yn]y  Le :EŖ,'64uUsE>%+(.4ݦgsʔ[7dT یũ1\ASV9Jь>!75{ 2!}QLVq! BADQs~7G=#A -|9VHO,zs'eիvVQė65#$ DQ 4L +5~l=:tNhMTpޏtAo^Fsιo+&o0YWH,u<5J]b!p;!Ɲ ̱l\K|N׹km-ZarYR/ 02v=Fefr.".7 9Gڿ2J$!ݓN鞲.SX%̞:yti|\RLJ{ f<4ڧ>zKdvRpC)ԐLa^_,GL]KY'6Pu,DU(g@aY!Eu~?p;z+ߔ ~n#;FE5=^'4ZCtg`®a`'OӐ1 I%u9O"ohalodzu6 B0IEBe{M9VS#=f f|Lmf q󓐑ҳ0#akH=U?ZJe|uvdh{SjIw'Y+d'2h,j3+}dt~ϟ(ypm9m\p7eM~A҃ΉBDjxY\z"|Σuϡ^eoLׅf%B8BͫX Y33dy~!]`OoBi+$oY3Sj/=z#B#BeFBsǟqu6^\7=]*ub!}7n0ķMДx4J8pI9ᴆ”ysY!W. w`X6%N H\.]D*{DjQNH/P~+Lgv6 ciI?Rnp,$޴Tl B]$KpimůAQLV(k|gF Ń)K(L]C M]!j Ԛ2#jrk7ܜ+;ј Jǧ]PۊtudbF~|&B$ˍqj8f4լğfW( $‚< %r%M';`xڪN=j@ԍ\| et,ԍitne|?%}3*rv{^mR>coa.`fErf5cxCr۝'XpntQa<G3uLjثS=^AO_$TiRŨ͍c{#c\5[r붶:EL!De)oi @I;%'Ze@4K̮'5yG]ٰԬmձi1Y REYP|# 6pMBu6k)2us\f4?]n)BZ*B'Oe8j@.%vd4"ԜAY_", @12sLW&jg(hՎƜE2;-#w( w@*"osq7Z? rYpnf-&v_sX7~#-b8E~{3i/ʘVhRTe3OcaH͉"=4ȟJQI~zQ®ESm--bEBKQp2LUl Tں>"B*5,^{N-*{~:uAעĝi0vx$n?{vtmN|9ߍG \ Ur!%ɜfkۇg!ŦI*#7)t[A7NfxOa&;v/9Tf 4n'*Tг`(Yp"Wq7xrkN .F#D@ e l?+]҄ \^]s(N7EzĝqnOIyښ?p#׵?0ҿ%kEg09C@iLLDJNa [MղTޡզVQ.dD!18W9]0l=bb0Jšsq2(5_hpG <EB\@'%~>|Ik mCK?Iޖ춟\)fcшijYa@} q”m\%}}]%/*" 3vBc{DmM>AIz7,넡5pZ|(% Kx#i#P2K̔;~w]PoZT ׃5A+TZ=,L!r vkd7㑽pp̪e-vbH0MŻ1Q%{l$qRO6G$ e}| 0(n\>>eM6">5X k+~0kwHu#G4h|& 1/ީUu߇='bGg-2ƱC iS58-IS%^KU{TU{̮Q/m6xjfGejp*9 JЊ]Ntd K=ή9%c'x,ۥ,dWLj{l?wUiy*QX[|-vKT@7%Dƚ+̡(Ԁ<^evxa޹w O[@ Tp,6ryT?M5YަtMQ ^ Dm")E#f"; 8;DZ5pn*]ݰmsnJgq;nt_nZ4Ԫ& FfO*U;_[iPwS ͡T GTU)< k(e/ !VImWΨ4b׈VT\lO[0֔`OOO.:01o"D<$ dW~rC_yMȂ}LM#iZtRSQj>S{F2/*,w1^DQ_SK8MhdJP{)n[h; ;LZRz N4\EܯD|r |:fl^qșn^"™ͨ»aTݨbVv~ !Q"#}Q)'e OI."?|I:ۅӗ OyY0 LFz:xcrzjbW[Y>ic7ATT{ŗ.%;c0+ .nbLܩ+Bd1 G4Ҿ2$sȌ?Oħ P&E޽3jwQa'FG*3'"Σ^ҞsHoT(bcl(r944C %~̬A>ăt+zgaٴԊ~ Ta)bFƜ&5]~dra[87ޗ_?L4^z},&x`a]ܖwwsRb5\35AI τB!ӊf ]U8K}XAļ Xcm߿t.{|6势߆!oאF`/|j}x v>^q? V+IJN 4Y7S 9mehĨ1R 3z5@ev;zߎg#SJxC]660isl#v})JIKQKWbgNo {-GG|΂_k@z{?ίZDoS |*Q3Dc(ׇAjpzFw?ImqWq:峊luݟ&=] IɃFg.xm|vg WReμjsFgVdB:"9IhWy99cJ-51.JA0=X_Zm {JKoVbNܓY.ܐuXJdɺb@~;-e:dj;_NJUmKqqqTNޫGϻs%yy O+Ms԰ vI0Q[L؟d [`Gl[{Bjp8Fk׌6 lswn͂q3nu1Ғ4)yO8hDtd 6?٬4#@b6;BW.@[XU)\X|W>C2~MM$ZVYooAgio|)hMiGl*($yЉhCSdל>ٿ{HZ5\vWvAu!B5 '+"m cƸv%CoS1V'hL3[~QxpHBaɐTχ+"C%_Y HbGz8 "4<;<qtŜ 9OCh+K|V Zw%u9F-Og(5 @@2}BuQձg<>%VѳY0qxzo)B7X ՟r!Mdlw& Ȩ/x_ZQ9/ Yɔ.$(jZ&=ti3v|/fds)=&7߱%;J#!a z;݊JpmBfҝ4d0 3bV=;[hZG#"jR%KaO0 )1i'Z3Oa:ۨK B`!ᯌϻѰ Ig tv#곧 % xnrJIcnp;U4;G9lL]e ~ ~rk;wX)pDy@r!"nt.CzD ,$*R8QX/RCD"ledxv5bJ [LR(K) 'I3{dتZ'Cm֜PAk.M]+1eI~0 iN7Q/\n͸%0n s:$RnMR:vYB*Qo30ɞdHk#a,W[zfkVfReTruŏK삵Ц9@dԪŌo0\,M58Wв>R̥^z;3P8Y85rkN%ܝH|34kB{/[o9 bsaOO?t7<;ʺFE*{(7aJƖĸ]iJZv0v?rV:,tkjrUKJq( 0cVQ01{U˞7ŵyvKxxiy&GggTZd&E7mW~߆=]2Q7+3E^Ԩl IB/~%6 ~o7.dH͎z0?ىUF'xW"PBTŷiJry2ު!R' &e[i>*ń !h>o7Il9%o%dXo$I0_ElW>|T, j$*TSV//c;>LlNbYp O1 ~(xђuv1ѠF B3"VmmG[e3kڛcgZ?/c$W}b|Us W&1\5` ޮ,{ _dC-qX^N'HB^!8.tE\tl|:lMRU~_[wy'T=WR,1- ʗIBaj7M: 2r:!颤I($BJ΁^G#=2f}&,](\‘xE!7ALÆ' ;>ܓpl]%+ rj_905 (Vlg57y@祺eҁuIyUP1^d':|}n`;E;*HO'bRz S2m]#2sZ~l[S'#ĶY\ti(;:yFa.;KpQH]ymKV4VM\gcr$?u`,VM45b8& oi7H+ůxFvv̂_dqNG67NmX̖2wP> ')̨%BqzNS&mc|i /pS2w..R|3!*p_W#3s #!Z_RʢyInZ <bh1P>]v}T߰1]P‚䳯e}~₮~yJ'[GN/hdm,jBC(0}7 a_Tdn]'yTJ4tn:aI.91L=a=Exv[o{jȼeMr15lD 4zʂPHdBP ֬H(~ ԹhS[i%p'et28[D{6mPUCUrj:S ]=ڸȑOFm6 #20_N)h SCct j7˦N UʁflJ˒u_I?v5SΨߧ*3mz C Y]J|Oog}~p-;0E^1dAn&4)K4F^IàxA= nanu^& pE(vĭ{o)SX)8x *a(蕃ϵ.RFV8@7CMјM< qw!N 6)EI4'W-IM Z H~4_N-C5ћ9y(AI*X1ZID0M7aH|:Q>]͑*Yˤm)(geZ*h|_̀Y8VR,<4jETOyIF1WnZ8ruVrc=q) 9s,ݯ #vxFPFq4V[:iDٽV/9(hML@kTZ9>"<|Iہ m 8MǿkF[Xf'j, nhj'NRO3lv`޲B n)Z+Wl8h<3/\!9[)qI#pjM6teYI8P^t^%e`B?n;/;Ltʱ @l gްdSjR8l4*{_:3aƟCg#O o<67%/R;b&]Z|e稴yb f!HJ0],!ŭ䈼Ď(]_tO7:-5" brKـleG=d3[BIbțmaPMdoփLfy}y=PRAHPq.&A#L8*jӲK5`<^:OxE]N}uuƑ;$1XI"}Cq N*uRYNf89*B>,;8lK季rI'yZ?&vu'LoVu :IDx䋦/c{.>٨Y"XO{ 92X mv%:ٗOAA[$TW楔yaj@>K*:FYN$z AGZQ﹡GV!e{v=+j \Zs;[}ꣂW&kTjkpKhW9<"ҟ;Ig/+E? yYOwW)'iYNÎ/%Ht&[ ?,IgbMRoϚG9&_D?y7XjIٗh&JRK0.o%ue<& Ghm't?āVDeAD Ibd"KUtuOaN_@eB[#r )zbl/gEuÏgxON)-*\}.B"W8P l)pw="YwaJH1{i醙A] )G"<4=ӌr Jw'<6PN)>p]r{䁏 C'%4qUY۪ ZwEQ:<~3y"g8 qK|xG߲+b߬f }Q~ݝgZ#D땎V"MbU U]Z6@2ź͏yF ?Ηv`Ku dG3;':, IP;)=,t m=Of{L%(%lvgbІDP8"k*Xj*w%[[u{mekQC- ~{ |4 Q;;`7%* 4Qyg&6ވ/&x2Qy<P(bʉȍ1oC g 7[mW02O cQ-22VD,>##Yc7أ-gQECZ+Gt䯦 ky1wp"{Ү؜/e XW7ЁԈ:Р"O&b fQԝd59:mvP2)rPɜ=|-K`%8v  Cj: IKZ2ڻ"\x' 60 ̈U ۮ\RrnQ>jo@pavfx@GKadRjG蹺~Rɫnn s$@*-;>ƶ.XAraAg_ukkal/ˋV:Bx,d*.;D4I1<_SIyŮOZ"عZOV,pbo!o8b%26&;flY٣C ]~|LqX3? J.83y HMj4*kН@ oCYUsNtvg)ˣ:]Oxa)zJpa1ì;jNwY#Ϧ%ˍʯ‘j]?Vw9_؃^L7)HJ@Hf@T9w.7Is0S0E8@W!LDU籟iBKoRۦPrvL_%)K*4ǔO:] ]γlI*~Da!d$֕7w@Z'-Bo"aѧ{%Ǹ_V rbpҲ'U&ZQkapo| u_zT`U]>2!4 ٘6bhۂ䮳OB(=2T=c&*$ jFݟ~.Po aR}9(vRodI/23ׯ(P,霫U"lƄQ-8a=p:i%- Z/H) <`bZ%Rpm _**$ `pՑzl.sD-L v2S1hK-H2Hd6S=PL/%iuX*+wED Ӳ}6as477 EljmkURQ"pY˕A)zWv~̈"6ō8ΟetQ6kHxvXv Y|~b[ r#d*VB"Zt$G?^W wWɹ Xrdi }wO)yKXf4wG&wC{qrf;KtmL+<&0?FDI nxVRMМ57̊d&eJBjS?/ MY> $_g3=LH)@+Dk}R4W$A"*~p䅅I#'W/] Ŝ#1lŝUOuXk%wjvpau<$d`3~0 {:D7T,djDŽʍ;,?zm+T7qY{zKQOvK{3~¿ǫRkk <Ƞ@ 5 jѫ9i 1DQɺN*0F9 >ZF)^ _`aEDXrK-VfVfi-WxI@8aOAd(RIYjf)7!(K|vzP[v/؀"H5UHzK]jS zAL w] ]-̖o3 QDߥ6k$,T3nI?OIޔB*{S C]ALV*>uUK04lIC7=vJȉREOSA1@b|X;N/+1;s"su Gg4x{Xw &t+wK/s}STEZIc!ÌMPuq~ăh]o$4s%.ŗ5Ww3$\,O0F[PKj*utETh`,VW^5Zuv@z>w.Mjx/L1[5݌-z{!%ܞ9SˎӴzhƖg+({8]Fs>*T ڝeq&PGzpN!?NSfҔg`81K,13X>h8Г+ D@b-b&&'7FA$s( [iΟt?_FķGc*AIpFWJ.{gM(shח(j}I<"eV U^ TR@}v u$H-pNb|*Q3Ue(Mqb:9#{Pxub`J: D7é;Sݮ8%UK쒢S2lJPF% # V4Aj,T:qW0 GnZ~QQj8V[SY 1k0nԴl`),,~ڲ"u?s@`1ws5($0=Oe,j,̪QkFm1GXKelG6gfH|ZyZWS %֫/1(j":NFwVdVb ml@V+@2la֤\b:\v(1_UiL}Nc+.rX_'#V\ ́k:^Qs푮ͭǒ FM۲hQu8WoLp_PXzXQmލe\ {6KY4Έm ,>;E=9`FM'HmhSC/utbSP+?)F Ω|28=?AԖ**7`#LKV#̧sAA:BOA#ͣ` Oz̚ K4q#q e`~ANWc)1y@<] t_e9o86" [Tw4$oiْw-d0&Uҥ:|/wqx-QN υEx7 QIyS<'Ʌ,SFI* C+;x2:{ ә.#wU_vdi훏xd"Q0?R0)|f''C6|1c}>z=NGٲef[\ <9k-)R'Vi%b,>!缑@:[T.wk(ky!w2R̈́sw@؇K̴mJFHPcZe4[;&ʎJʽ34mt91S{z`YX9CZId *g =i\BIs/Tftf%d9 ȇ [Ml/o->Za.ĚR3V<Ë0J̴}y%#Fès(|d)l{`R "Rh])8UiQI8 k%&7%Tpghkv[ZQ/SUSYSڼ+g_C&{d}s'A":V=?JhLev&܋9 d2g\ʐ&P(*;uK#8uP?{, ,d`r* 嗝Pa8_qKpϪsGLpÓܵdufܽip؈t95W?m̕nՅ1Ư*hLC;eq>Uo|.3TQ /2\ X"$ B`wi&m>w,&VZ]gԚt1)nۡ4޷_2[kAc%!T=U^FZϔ8G|e2`׊hyvg``J1=G1K\3Lpo*wTFljNbV IW lv\ ,H9^6UF^N0ljوB _+tglC$jO-oEԅpeo3OsV տ4~r"{@bbeyOgGbG=UZbV"m O2[֎)Zm Ğ_4H ʴ)i!f&(?BН0]He x@qddk I#nh _ȭP_`C>Yy"@Y4'DFB`a}~Io;!jv0Hi Xev&6 e}tg *%vElgWч$ˤi*L+Z31?jW>tEg>Fl KӅ'Gom_^2F%v16xS6*k{ anIP/,O9-MX@!Z-w7y$b ˛6OSUy̔ݷFIrג?0#x;$4>ٶ_w3kJl7V)Ɓ8}ȧӏk2tL PC^Xv9z4eh΍B2`"؎e]2a= r4ט@cű-6RʅJ;R4ev9ETf *M' /d@L0_* ']ܟZ 5Kq8'767VdC+(-n09S:(j{\XOӣF|0Ă kN6e{BRuzG!jwm.zmL^MwtG-RWL55]Ia #kk4'Vc)^nzgR 8H4:%^Q;v^\Y?S*mP7?ioqe1"p[hYq+U(o"6Ire7^%6w`k*) I!a{\ Hά$)N@gݬJQU0hG|<]IH[_)!6,UMC. /( h(>ײ0/:~_ՒN-p+2=wNvvl3CdZYQn7>K2F\6bY ɨObtz5ujvpi!h~IaՉ:.x)mEzH>4px6NL0bCtJܚ4v^d(]J }? qGŲKv@-cEQBG%Gm ~)U= a~ CņaǦ˝:7Clpq{w KѹF>[Q*h .ʘ+vu! @L~ţjNjxxydsԇׁ̛h۩b;ؗuӛ(.’lSX%g }s~ J@3 uSޒPhc~oACUo_(*URG{Ri](Rb(Rn$ [{CVb߈)/4* 8H-O%I 3X{!&3MYwќJi<&;M}H+X،x ^xFrwȊt",CWmħf[%ˀa~x.M9L@"id˶vwbO?M@&Q:ZwShn_/tgV&.GGHoV9)^h#I\3L񈔩ƨ ] ´输|vLn/9~d%|[.!^KfWߵ=oκ-훡Wa``"N4P~od&)PlF N7':c=\[6McP)X'6KWt^3Ml T!oGϿvIݚF څf2KPE87.|gbR#p;F!f 38m)!o,XIQҬ'g15!tގB nd<)CF3DMΩSH 2E9BKu ЧK\ĴQo XajӺ2?10 ߱;F W?lw(P[fǥ3{S95y_6g ́ ?M*lZ#ӞWĂ\mLϠJ;wO8;m+pb'j@p؍"h"!eׯW3rAjXfchV},^8KQ6keB㿶SֵT1fi:[[ n+|=(C2DR7|?;##\Wo7VN4'k>ߺmmK%qN}ZR/##)4lu͉MA.Y 1=Q.Z_24lځ}I3Kmw^̙:t''#Z9 8Ga.Vrnͺ_zߏÝK<*]UE~TuD0Qs9$ȿ:xr-8&#K&L;)Ԓ*| uk&!D'K6z-,ɊH* *QM? a(bV?S|?)(BfH N;V!t) &Ge# Tdk "=^5gHPg\'Q DJYwٺ?w橄DsJPJ4`*ڊO)e筰gq!oWlZ䮍J֧LjA>Gr'½`tPvZX%"e琸 U+(45Ey|\20gxƭnWhDYm(xJ*``s?]CLx:fYS Zz5g1N(j(bh l]ص4_v)|X6r($N)y5DXsޭ{ܬxvϘ qQBuBR_YrC`8 ΗAr Q.~KZ|ӐjdkЈwy m=r5Oiq&2+ R^kN6h;£1Ϸ~ ;/&$]YpA 9`YY=]8\4”yǡBlTTXp7&8ʒԸp([9{>G`<ރFydDULF;nyc* YgkG9-hZ-*&I=-*w\.7@,pJG"L[Vw)u*Bo 5oEOjUs#>]Hѿ|kB}K8DGVG=&W 3Lo'|[:XdUN݇)Uʐ03l#Pv$$Uz;[XMaVȅN#܄.ig/  ɉ?-$&8,>A̕~ 91.! 5;b_33m p] .yG)ey(bU+֛L:t{pWgqN^c9sz_a!N[]:#az)?'6pVKv\CT!ٍ&gre;̊ʎUlf y`p q#:< C%t|-!)MI$~#ʉ s9ҰߗQA OՕ-Z`0'14N$ٷCF`dK.ZM/<=57~B[Bax83+s &FO dli Ygqx݈]"ugrFggcGtlj˄"ټ_c#zCgkuOV_Y@{xi;PgJ<ؽyA|ʴ9k,&B(a>{!Q&\4UR&((dpeZ dL1Y=4Mn/KG(aTql:wp|^qװP9Chd('6ςϢcB #8FʩaGԍ♝UYѶ0Cb9!Pl#P@dV[ j$hTs@)2BIEF͵ji0]ߢ-w+ %Ç,±B}TO 0ёAJRa6l!Ǒ9f4j?V$gNw/p [&\禥'~m}A M|/Z|`b y@8pzKFNFbmٖ[0K*W6H$~?{6ُ,JOl Jf#KrnmӖP}DTDk8j2u)`OMoszJĿQ}p>Kx<ۙ4+r?0)#]|CQJd[4m{8NGMȰ\qh x9@QX)>fi:|#iCnnwx%z3?ߔUtĹj8b`.KjI^yL,IYڝ"#"Ak~vyz֋^Q s ZVMc#}ѯH}޸Cբw<åɺ:ZV瑒.iF-Zkf(k"VRۍ܉e|9UVvu5){ߑG{vpP`"ZRTȁ_aP 7.JZ^f!B' ϐbV]<>9D3opR/ n_F%fQ#(;=ZX7RT;F0Fov0 ?dOx2ڎ}*Z.%j=j+ǟtLN L2Q~ܰLİ`@0g6G2(cLl-AqȾ_ʘdZw kvfQ(I D#MgiO\GzGANc[ve{v{-Lacm{j`D/μLO$Kgu}ά21=Nbv[+JsW.e k;~ ?i ֊VT~g?4|w_{BǨVWέt r۟ T[!UW0pۀzp׮WWUdK ddZi]#|'kafRO IU4N~G˓ מI2lk65;ptj6z۠{yaY@Rjw-ES)D^0 a,po}F1w@""%tU*H1Sr1?Do{,1)X.o[3ٗk6 F̯>i#N<Ȩ[_h;(.ZbH͏SW'>6xOv U,?o1w0w1fGoav=Ҙ )whEsg޼8.H\3>֊ʨJ5]I I-qJ/rc) 8I ZK ' y;*~^՚NcG\>؎WW9L| ~?aUu7\+9-,zu[lm\率_{y|Z^jAVm" ouG}B^ 4S-X H`W;Z/q|K|UO#[j!$5*K|+FIh^MxAE';%sS\PwLf[ hiaē&!R=%%G}Fwud?VʌooMO]*%Tdrk`NWwBH6c Ng.'%{*3'ڟ6~7=Q1ӯ%S5iY?)iH -`Ve%b"'\eKoƇu;7fJril/"D;"nmpao=2ֵ_XkDzkYHAi tdo*ﲅAC޵BUydQ` ΐ%W1h6EfW"j=*Shx%D0Wq-}<Kn%_E={wJb[ x)Pcd 3Kӧy :ς-%fZlQO V m>3^7""S0Fp}}9ߢc1XKKU1+VT9i?H a[F~gS8և8iZD $C߷&TmywwQͥd-X+KC[ˠx*89Cʖ&SՑo6sʅ>E;[Hظz~T+φ^bJB=ĠJ2nov>J++EVz%XvXjtWF`纛lU.~s΃uC3U~, $4 aWQrR)Թ+WNXL4\?,mόU$tvEM MӁЉ5D𩊄UjUN;7%|&yK7>Λ)֏vZ?O:wC!-$N|pߟWfo #CHZ g'e7MH0E}c~)Gm5J7#"HIn:wnG^SوR+ltIK߄B LŸ)fJ9SJmb&yC L S IF^m'T)<,{VPh5aT%uXˉjyƹnTO7 H.\DZ&n,)%FA=G1=S+bx}yK-,/x&.TFVڔa&n%Tbޢi!7vM3+}c5-qR#ffmYuŸ7 N(CAځhIH(PPz3vsZS3$*AfG iZOvfv*ᥥ}V TdE$6 NXqhͣĬ=[&ZW$6kz RDڰW̖MV ps?=";F,O]f|E% X|,zݱ =Aypi" ds ̼~oƢGn'F?= As6{`6llU 'Y^)3XA zm`Ϧ) 9YjBPUf): ?+)e/:IػZw;"o4UYB 憮~fOew Rᄏ aU& ^vJVM֏0H'4eCK2Ot0?HZ.`ǃLQƕɂ nՂC`v1Š.Hܾ+A7 /]ꋻ ܥHTj SlN+f{`yױ'!(Q`۔L$ֶ߯opQsyn LkE.U>F4n,BAYLz bpҗN:KC~NP)C]1XBRnU22DH3S IjAƒy!*q!!#u󃩺`eRg:T[>ۘB(e"j' )===΢/SZoW(k4־]!T /@4kmuI 3)bN{\s;*QmJoM˼__[:z4\[E% 1h])?B*v$vo[r Mfj_z ]NraCA1*b"|~EG幑`J]+ȨCVv0 "=[\hngr,Iv k)3͂P´7qo>#AĔu1]G A:~Vbm7F~ J׽r63[np-lso^-NpJdS$+$-S欅Vmތt k0w # !??^ip叻bv`.Z^ :Aι8;@NDԃ>_l,x~[`0=/E F\/q!$P jj1Z2GQي~D㚉aoʋhhlx%E4CZUZ> .GOM+lF ѲgS@>wSAͧ5m9~xr(ܬUO&`\R~ndZnL Hd8\Mj܋Aa]z uɺ,_*+A#$5ފD75)Bz̽S|WZv倫aCQTCeF&b[QW_R&8sw7֦iv3?HmeNHm^׋@,9֏4$mwc!e67RL*7;-{8̩DHF)>j꿈,E}&&S֪eDJ+֢QXfr#K{h'` RdOVT岭ޗ*M9\? "#lSXO#9hו牛HέB9-zmݐ 74CAa 7!Z4Tpw-%=!m~װ&=T69i4aT.g5x ζ8,XH5r=&rLF_<Zlv>@_DNv} #,f ]dxRUIC.2b;<EJgwE"=y6e|۽TPVh'Rᡀ >mTa͓>'F܀i`LqN| 'puN),VXetQ6DQ̒F"y, _^-}W,n 6sr $~uSC+-kh]Ʒ5gQsw筝ެNr iҕ~*79o@*%Et/|c4;TJ̎59+j.3_{>`ע giXz @['[8/- rM{=Ы޹T:FBј-**>-W;1{=یq}00=▫zEزq8QBoUL QV :GS|it@qŧK#lD;Bטy9KWyO:q :iIrۓ;D# s.8z{8oHoz+pXm;poN|}OSȷ&s]xisiS8Ҙ/#l?V$:wPA?.83o3E.y"QqDuHŪ/U;GOʯrL.'!Z*,V S&!b_K_+<3L @%E }v!b 3TK 9Cq2hHyg!#dҼ3c a N̖ ed{ &%0J p5;FtA=@0¦*\"~fPxğ9;c!CRfRfk.7tBS.jj>/kzfvʼgKdPFdVX˲N*vTFhb]1DPfj4F$?rL{ls`BNhY΋IǤSq`r0+ǞIa{}ľ(z`N"jNxOa h7 %0=  :RݐK Ǫ%g] gB RH7b>@0vJWpܱuks4خU2d46>b=ZmSa <@cijdChrb8vr er/3/ɷ!PwD 5??C)rq J(?-p(_OժL-Wܻ% y>Ѣq;փcY}"1xpc &&i5 p5 fC{_3b~5̖gE!횂d@Wg+Ɋ˳і=BLlxf)\/D!\1BϰEQ؉QJvأYt;\dsE}D*#FzJY:(Ω2[MU> Lz4V˦a3&ضțy Olv(oSM~dCơI\+1I$9RFXMJJ}u8V2YA;X~*@yR +(9g D?L!cN33w q*ŒykwVTW-Zs,.(m sa$t2rj͸hQe9҅?蝴/u>&š85q'ŽsO/Qd|J%Q З<=ykPmm^_7V+MX}V':W?ٯ]!$.$r@8<%IN"%<}7ƝA y˷da{̞=vw#:#KB]%@Ԭȇ_%.Њb.lKALb|~m,+_L~ybwvՑ~&G;t`䂚!A6q9<ADJt;͐:n "&"&~I.zμԷ9XQ,G sV?(D[LSP43"׫G/ęݫo*ٯgÆ\^P:-̸D<+hY]QgcW Cc06s9gEIpUNI{n=l%Ct>[8\qӯMcػ`Sk*"wF[ܪeJ>lo\HO/[{=m ry"ȦTmAE|N.f(}',kIcbR*CA&3,; CT oJ[n2)/Hq^lj=S;b!3ԏdf4/7hP,wEv~I˻sSs_ d,{({5f&5l;sŲklGβ])WJހ$U9$ؿ^i}>uH xR p[Y_Xߏ&*ͨ)< GB K/lFik^Χߊ'%a3U)c0>jγa5*|f13:Fq(L;8<ú3*9&i3[*#+M !v6?wѥ:+$З)X$D'>)Oqyp®IF",8.{jrkq/W2P'X1Z-Rv Sh8o~YɎ,??-@pHaԭ?O8Gx V[ ! t?$!yZX@s6<(D$ 5} ^uhChE,ul,V{0v$S Wb96Kٷ ՘+߆h1tYk[2ǰ3 ˲HN~j0l_}RIJ~D`-;o *i9Oz˴POy(P1@)]5Jgr_c:sTt[xtqeCH {FG/-ҀAeL1D)qU&X\;#YOߝ-_3FlLaEȬΎ|oZu$+6G ,}]:TKBvX-GuGO-.'V9orf7HFP70c=zgXCwYU%@;'efM#>MCvn֊-◪/!aep!vnE*ȣu6Eμ?qbEYk֞7'^<y8lxg_+쯧ɺx@PeHc G=|a{0ﬔ-)"S-"C]d IC_ CW[CCi$8$6; Ly-#l]]`S.{a w@ f ֽr 0? n啃g+ZTAΞI$,~ˋyS4҂CNrr^UJ>PmMLO7Q,I/55|fzWK %Zl6QP;Y_6PK@fe30]:hH=,L䧰~/ڌgkr%xӧu<(ɋco3rkMA"*-[tJr/Gtq5IqW94j yח&=P<{bƔX`'4 px8"zM T[__:Ĭ9窉@# |9> GTzLƬ,pHNZ7jtli,C`9mL ]OpH~0 SGg4p?YGHp}jIKWҵrq/ Bƒ t\/и/q.B$n,m JNG W$N񏀹h i^Os:(ɂ :IԻ۩,Pz"5Nj(ٴi)X2._`@',h,& Ϥ9]3&P\%Kk"*!>bʒu*ӌı lTlf3 wFuEmuԤ5`0✘ -4mlS;ԔAW8Y}@ߚ Et ˒!D nx 3 Y]+c,sf,))DAQLЋ3Y|Vy}`UMX((xԖ|JB4:F8`^]w!·nzX}bCGqɽ.^eq4yʏIP<"5熳޸ktU.'F^ b\ :X~1h #i2Ƹ9 鱼.{%-CyV[auKE}]b_{.^W U_wL$CT}0\DJӍ&ގݗ lv;|b518nl%0fٷz~onTJ\K@VHw趜j۲aNuM34lh0~I7lGH;]Z+)ntq9(0x yGUO{*LκF!k$1͑zty{ĎÊl醼Ju:-HgtKEvv4 >@kfm &TI*8Y})z=;"ۿZ[>[[ bln=$B\#ɪ"K-;oSX/Ǜ12HY؄[c?̄dSiy,ջ`@9IfX6̈́ojKuwRL*=Ed+U=|GfIgA5bV{'rm ԰ۻ)O6vI\q] ;/P*̺H% GJU+mʸ J.$mn(+r|+ in1Dv  Hpdlu!$@t)u~/}E+[(ј94M W؂匵Ny3Þ@ Y.rUc-r0T.O]ޔ*sn'Gg#|mU"2}H~]㶬(jhd+)kbb eDv%Z&BO`Lf_q% ~*Q.yj_d\?kB=҃pm 43$Wu>PE9(`rm3Âб+V ܉6ײ#9g^.$|VaVE2>)ɴ {U=LBh`ܙִ%(Ƚ[X5%e ]HBnxóNSyGtk9+қ=N6r |w(vHe)G8cS;(bs8hM[(0l(Ww_cϼUz&1 [F~=Vw4R||>Qb2)} :Ī?B0"-6U-R =[&i6RQpU;?Z}ŌTWDFM7-FxchSaf{߹ 4M?`iC8ofct Px$^e!A/۾czt@vm#Aldd}:qS:+lCDu[ ~ú[g;PO{2\.Ϫ'Rt^oRMX+5HNEga'J Q5c,; ^;iWМhҩ1ީǒUV}n y1a|Q )2#HH 61.Y=4nߤ%'9'' = !(:mx/]M-#7*挍T`z~l̒$BzI~͔m)if3!P_V;̵U?9/6PDK$Z5-"RYd]=\J5v6[~$}RK[*D;S騸NLl0\!_E&`m O_Iݙq:uطt5w|  $v#<="_K MS>,nH'Y jB>SofZ:^CyijA8BcTyB+u]++-X|mdYIrPyoU 㓾Bc3g)˳>hu"#k%e_G\͛@ C : dO'0X}iׅC]A.FMK rf4e9te+Hzi_"d ,*-^daE/ sW?YTX$ a5;-jX`8"6L{7!g @Ŵ XW|iy1J4@9c$롫d' 'm[X!ڥv i.ZE  +~BR&G1߀ÚdKMZ/Dsvfo}; ;I.{@-=mH/o銒"ָzB ֋S3ʽ-گcb3h[fo3mirK7ؒ{ke\5i۝wn)/ a,AXDžSpHY'aī`Cd9ӞDEk=FO"@5'OE?_8[N:e5IZgbxxlUX `ILLCrP|Aȫ,Pݩvh6% *UlMzrB( _ ["D 34r^dwȳbCCb*\5h=ʂ[֐j)ǡ m/FC1Eicr%$$lC%cR * /9bY5 3)֤~fUHZyI 1dP,Zi_kSQNl8a6 W|rpZIjl ۍO"̞їFn u} in:za""6VQP@/ө6SVP,e!܏D^LCpvI)>T%Jx*G[٣%ij#GP7dݚe&B|߻ hA*s /AcS6S^`S\۞+R?ꓞP@d5lӵ,W;>=Xvvc NOb{6j!Wθ6j8JjuՈ(_rR\PYOϖ>%=W&IGfXó_fFy(+lv5sD>뿌=t>އ1JlLV9+9'+!ɥ3y&6&Fo\|~m 06t53"fv׾]+C#zڏh eMFSZ*2u=Y I+,t ?`+wXpTn̑:_bU\52ntՐh p\.pnoXRsoHOR"<アl)!T}NPP~^ԣ:VG+KCkD$dqIUdr#L24>cä_fK=K_xױQY[$4jj+Ydo 񶣠 p2(X~c(ѭ-&w6I= CHh/IyOzḶu[X\z1q#VVv$pPyƛ? KEwBaUSK.i"WĨ͉~ >/"G *4ž3?RF紎/>2΁@:LUce8V洁,4w ;܂)o}0cw 9敢u= -Nq'֪- Ag ybiiZ}5QW /pd!$qA (rL{Xm-ؒĤ%1], U?BOW-f<`bv¢ ŝi);T@Æ0f/LQL9>l$>U-yBE?Zk~~m-0pe=yp0pF⧷r']oXtw QW[^`.fx-l &JKܙ1!s5mE f]}DLR#\-u^@CFyGbxCC^KrM5NؓiVD4zIFq75F^kjjxFO&!t5C߯}DhQnvJuy 3{E]EQTEsKOpvbz.M[{X42o0QGzxW߰\D_=h̃4JAEM18 Rʴ7i7Go\GR#GˏrƳAn/ȝF ﮃԯaPj"wϒr5껩pv\%9:eb]<7×qA-N߂* ! #O*USR$}dgJ6ZtYx|v,<[gj7RZyM8r]1ˍқM[W ݆x+]XZh|iQ oq!eBŠs!b/A}NE .\91vw/ ^Bshay<Ȕ6Ve²U-hBʕhJ~h{]޹:/u} σ+mL/oTgyKd|z0ٌ3&V`ɘiGObIe C9a2滤үՀ aO#ծ}pS5IsR-d%[B BR_wvPy)͋m}lks0Ɋ08̱[wmbA`*uaȘSc~Pѿ 2/vum&i 6Vm'Q+jBI7'I$HtnM<֜K _?.;ꮿ G JCXκ|0]2ϞЁQH \ӮRuİ;R 45ٿ٨Zk I`,M_\2kF1T96\\?zH"E%UPWs~.*êL0<6EF`B/C2 -)e=i|.xA_N=2yFvO0cՇû xyTJ KGij!hb*xlrZŌYԯp< =]΅ FҊ~(u. # U㼱yHĊ/%L+0\ITzҧzMFAb{Vw܏v? 㽕=GvGQq /WPE8( yX!SA Зq0N+ Jlo[FA3d_y7{DJm ^;@}tTEF _̈*NtXr3Kk A*8;eNzbEs ,wH>$hMND c$aA2U"M޼`qI3_2[r>jÂSRw류OЁp]f_/L+-1ml"x!Bw~D &0+V'8{0/x2o"؞|j[wu\^R(a L§>1#9ǮEҧ 'cHO(MXں҅aiS}5E FpVq5GFP0#rz9,UcdsΗC䮱im&2JJ BXCb1m?|5`km0BD8dK)r6LHϩm;Ÿ\ƒΒzq\IaӉφ;#o; TZ lJ33j}a[T. b43q]CY"=X̺h??l!V,pr%7\ڀVIP*|¥ ABV |W'RK#Jkp50OO%ܥ"u#,lR_DZN|Α$;i(taTIf9/)Sp ˖U荎2VQv?al#!k!%8 }kwX[knS#ǪvX?~4T+N7uwcYZK"Ox{=*lh$kֈ}{Z6\ لF"3b\u'3eCJ*z=ڙ]^zM >`MNgV{Ydx0D*)i'!E!퇐@4f#NT8ϴd-йv//5f-񵶹uC},\?ipLefy"Oa,L6[kdj+ucl ԟbSJo}T͖1k/^˄ &WD]VP*?4Z+8tÜ2BҋCxqpQgH`nލ9ve<2eSCU~Ԛ9F*;/V]E66"d`CR͆cQf]`m|X6"-η9kJl5k{lݞ͆?|g3Ԯy̚m}kPIG (>.(U(HrSI4f-~w;IR>pSr8?ED%m:\xPcDCp0̏Y#!o62*5e< R*IT/U1>jctzGn~Tk1F "jd06^% ׈Nd>wТiLKӊ [taXnΚ=i$w@=?x:( ϑB >#ȐEԃ4Ip@?(5PUO ?4R'VgFk5HTSvkW?sD->< w+2Vl|YZOMf1b"W#ʑS7,0hEEʦElrc,=+X}0kJ>/JC3b,S}7d(P:oȄbONj4|!D£^q1 :Hꗑ iq!YG!f4eOAh id?Ԃok3l#3i@n>5jyHnt\Ci3!J9|9$9a%}"= PvA~71>c5>T63m>=QVϼBA%}gȰ#C6jEgeܙwX΁+(C'o,G4E W ~V-)Lʇ ]G+Q-ƫǩ尼y@oKA/o BJ&P_S9׾W|zHDhqA:xXۮcOqZFKo;9f ]YDlqsxYʶbk4-n C Te,bE#5kl#Nt/m;"97Zj#GICg̿(!];S#Ϭpr#D+f~MPy:?d&!}ZC'RH K r0 -RQ\4䯃9*{)$Ʒ\ʘgjAGnO>*z1p5aPusN <6FˏKV̥1e0~!"KYƌ]+]y*VOtrQBcmJ?tğo..ns/|c {]v\[$6EY?Mn1Wyҡ6DkϖZn>_2Z,Z˦dJy>E`zppӡGEN2NfG?TT zSG|M|lOɼ1e]ӽֆQWӪN'/DU\8 \Jl3)jdIoiCrZ~HudO܆5[YXdׅunzSd.[*ujA&@g=RBkox+EĖ ߢ1oJn6xZ7U0u, oH>YK/dgnmfqGdnLu# okmGjǮ$_{UuUMlF12 FH*Ԉ8@|B8 >s4 {K]tn'yu?=`qFBVFd64 oP_Ale;># ȽT:^yF&р _ˋDiBt諁؄@2={6r'EG-[e/ڟSJS\ڤ)ilv8^*lsUJoeL+;\KGL$8ؙpg@k{LK#WD5Eʗ'ҍ,u$fZ2]=0swhcZi5lظ)"o Nxnޣ;C+i~ܞ;?e:h@cmR !b>g3G)*DΩl|be<]_>5[ (r \}Q[g?k[օs0vLklx`).AηdE|awbVQǞ< ^#:LlXǚ%[Ca !u=t%HU1C2q=M`Zej}bbW| }2Vz^@USY(*6ʵ g ZIp NGuR3ob IZljr{pz@9/ u9g* z7.ǬdN\L*ހv eu'`{|r6!Z&"S4- nIOC,pϵc7=+ o#ٚY@c% m"{ M)x@nCê)Xph\GӜWL wWl}C[n0ʪlq|PHpϯS6ުȩ6Ey{c Ϲ]WY42uBPX!kGZEC&`կBz=yfҡ_ HXc9N,9-q%hۦ"`)K?bXV}9*/qױf^UN%xa`d2](E0O+Nvzax:M:6*@?H}3Πy+ 'L ʋSBDu.%F<_*UY/+S>KۙC ^49~`r0C8SaPMYڵ$bV*l &?>RKhbR򜫿|} QW* :g$8<줧ǝM+E fB3cTyCKJ;'|NTu2ԏFZZÄZۡ3ɰmn7{b~KJypuxˎ K-5LuE"PV !83LeE)<;n#,&Dv|C}vVJ>)Y}wW_| =v=ۘ)Lwe k[gblÅ6"R_5}h@me=ƨobD } ŕp\b2RIs-C"AW(&sS/犍bA9&wNId< .@OA]1H͖dw$ف(vh$N[fG 6ls1ߌ3ɀJJ"]kgi-jo:wE~V9AJӲ @rd&m=E1Zoı4 k("* I:ޒJ>?9"K(?.D~dÆҦ^e"|t JB#el=3#WJ 6n?>]:wB0wJDL/sH[X՘?u$11DK~\UAݡviO@][D'YBۅ*[o3;)B]!$q0{K%n [e5l귈׾UHmZd섧FqI@޴V{2q'zs}u 5zԳ\SGʮf5o U<:FKh ]8AK"mg57dwM+CRcLTڮ,2S]'q!{YUL/nqJ C@L&Ұ?( ΅MEXPTRł xǕSi)PU`_w>=>B{>tu J 3*iDjd[cp?-TVƶ\2%X(2u]~ʻ2o8gM`Q^@NM]j`#KRL7tq1ߞ+!@EXe6VSxW`g{!$)Ğ]@* j vF &q@ (Gt"=JYI ܎qYh[rOTy\yfnΜh +V{|Y}\=NG XzTeS-N OvOޱBYF/"ݔ!KnWZG|/V'3Jj5jIK"Yhɾe8輎Q I"`ޡcfAO9ŀi^?bm*Y3}a_,淞WgVո R5_gK`]!Ik:T3$?_c@ h_e9|LwWCb  F‹\LxK,$KoCf)l~΋ש:{c1C 0hj82Gy qV6\&ز֦$-&opm&/35K ʾҧ͚,KZ1;#/}JrL [B:s]} ml;WudKyT>zz5=>RxSýphyd/;/qf`s o zJtPmU8@f$7(ϗJ+)5fLrakk؄JzT>icvې*pe2bgHXeDEMQ!ae$m9m!{zT왤7| q6hPRP5s{p띨^or$:SlcFx0 Џֿ!KQ ٕ*~f;ԓCwGvӥWѵ|`K>W({_Od Dyw2Mgs'_U;S`M V1Wx:;^MٍBdnEY!Aʴ 0B9":("/ΐ՚ROu0OU9Ezۨ $S֗ha37@5IfxְZpTQ R81;d> /SF b0WߏgLk~ b!l?be=ݝHʿ`?譢Ky,^zdaXh[渊ܢPo%=ZXImB@v;7ʮ Ul/ 7{`o1JX3f91wWy^%B[$:K92ص7:ZVa<BH+i+X)kT#R5ߧ.)ڜύ se=3-(nA@_|5Dyl[ bH nd-ҝGr;X25z⓴lRZA$xUm_OwcSP 5wsP)Е(MbUsw#WS 0.'Wwye͝ jw4 >+,H %I̺2* \ 5 _ b7č'?|^{ ;k%xi oҶ̝_'M ZM-0Qi8\8e (՚ҫڳ]ق} ݗ(Z=xm) '<:Esz#Bo@,W MeEVJҁՒƂt%ѽHu0l,m轔g/{sК Pvϊx.-&ָX۬*z\RpW⦒/O'/*$/[Mi_׋1 cpi8τ۰>hqHfI{aj ݞGEa3}vQn9C&c 'tgeP]0"Ⱦf`x6ӎpL3>4 tiՐKJN^ۘ35Nkܺ'QڇҀnU,1?j œ/y[) W9|Ւ8Q rJXu"7 $T3&t'Lɡb2 LشZXᆼ>$VǰSؼM> ж\S?]RxJ  W Yuhf|¼(NG~p<|kIn)l !в|_9"TE8-{6|T&7K7&c`zHNNX}rbKI&?-r, ;53zEXk&@BiF&H|/FlDBP|5OpdOivv?fX!WcYve%!g歧m:U\cf[jpH {}v`J6E -0qrAoew >KJlg)NuT-qs %S`H)~: G, 06a־SDNo{8.w8e(~! p=΃9l[|Qd"s#&slƼ0\M<ٹ'O2_.:#iTGfAp`EV$o0S8wu/)ZeǸ}i$L|D&‘< jހiտv:<(Wq*~>̵ac%GR,oIV;ȴ?eQ^U)fC+f\H3 m7%^Ӎ B$cTEn<ތ7bD1^\0wZjHei`h'䨐C,k:Vi. ly2+[?VC|;bWFdxD5*ܯ^1r3KD7E)p&}תAW۟K~X!q Ă^jɁ[mY ([n7`G | O9Y@ UsAdlՅT? 1F5@>Z^ТAzcWZ@>1Xɐ'g թ nT#yYޥ*<&'x -dR PE~ts$Ux.Amk*Xh ȝ7f{U-ajkr\4^G]Bazzj}37"P|$ 4_aw|le]&U:v˾ O^ABђVBd6zdjrɵ#ϒbٳB1l@sE[%9ƙ/9 1\Q6bKq?YGZY?M})$5;°ؠ~[cdk=Lڀ~a<.n$A̘$NHp눊Ou>Bk#b[R2W& ྙmԜN_OxE n*%_ !Z2, CD +Ca 0ZAUS;,c|v>\xkLCaPʅƳ- F麭I!_-ʯ߼sq QHg>BH5Oy -J6}>5<#~R4q^y}5>\H"x]Cҽ#ƶblIhq4%NWBUxY!.}-NŇ/@IpV.2_?ջ\}(]㭞!ҨU.9a] 4jn'?:eCfIGҐ^!;[fG 2,wʷ7#trl+N*敩HYO4)'86*ft YzFt(2::`'1#nQ1g%XgIZ|{eR̨?  |Z~ݾUP(#OMRRbGÛUY1uTYd55?K&0Gf}"D:\9fTKM42xܽ~,3MɅR~ ~UdH$Wx˻=裪p)j~*ҙMD 3/X@+4a&E5M+Ses)7ex+Xۛ~~ä Տ08q|nnc  {AjZx=宭Ln-*?zlʹ;kےZiC{z? –`b0M(Y5%m\E*K,f__/|T C$XUO knwScLrЫF> `ӧH(W ܶ9q̦<уI'C/e dyЬ<Ƕ9l!ZpΊI/I.S0ѐ_ d9@ش$YAKA+{ hMtb̏{C*^ >mG$o b/`C 6)ϙ +y>n,]A0Fhԭ;%\;Bq7{e%Ve*ACi<<;N?z\spG:lr|C;iX-AXk^]>@`+Jlsyh0#])Fm:k 60 LBޓxͥ!݌%QN{?c;|YeK]ҺҘng 7>uh?Db(.sPB35,Fwɥg(iZ֮b-)*O\vDh2A=YT>CbUrT_*ss:ߏ[`gÿ5ޔ74ݗWkfuƔ $~Jv51*I; ^Ah0)krzqRwR[wa)@E)5 h>- &sxSMkIzޕnA3tπCܣf  @b-2%Zf?4֒n7#n&)INd~ w>}<=<܀}(4ƭW>]?$JJѶ]W9fe<۩02-_q X-pxLHBndR^݌r"WjI#f':2?hD'ǥYzڬMFVfRvH%nŘvk R\ڙMUȘW,{l]YRSQ]nSFI$.Bj^*npnS@[iE-3$EnDz``~0֕E0@.)u[;XXh2Zޕ/,(wT43QмG60؅.=^tK~ Ņ,Eӂ'0R43%@b 0`!@+C'k4Fbե\'EڂAL񍎨R9WĿD^ YSM t9 m|ӫԺFi_y gys85 $2 TI)-W\\YjF\X 1a0Q۽,eGYf3܂"S)|0$Iɇ(ZuX`))G`LZDJyBGS3g (Ho3r.^T9'Մt6ౝ{WU$=Z׶et/{ 7-u[ q pr`2ͤ"b5^vܮQ^ҡ8_so^kD,)-=ـ`MHcmQ}$ҍfi#=U<{OCO9G:r0g V&hu9)r$Z}D RrXT}ޕ_Ϣ2ٮPzuY"IK%2iN;݄96e^&/.k 0(mpT"*5wqTOY$*Ex-nKZ:(ib7hJb{+bܷͷ`ݤe?2 |ȩ?w~6]Wd-.BhrdlU´w"m g]jzOH_0cφZpmkΙ湷LαR' Mapm/$ڵT !JInn,ޕ7+;`o E d8NHv~B G}3UDYƒHZ@Q_Bʚ!#= '&4V'[2K a(Ǜ'`{N弭<ҡ8mL<qf ,ȱDA~ng.2)IrD6MOeQ/U}NdW?'O /x748}/i2f3 m"rI(Y*B z=o̢/-.s!+\ Z}f>'͠/ƺ5jdA-aTŵ-ſ_kNIxQ/ND$eTF %_50t${x+4y> o~1@nCFy I{nQ:Ϗevt$m8 *(}B âN69]A#h9!_ aDR=1 +F 3&N*\ݫ(*+5)%D< oZ 9R_|JYG˙t15CSKaTBrEejo~:7nA/`zcm{uͤjLuCå#~<#4wH k27*ÒM+&V4L(6CwX٧_wW@LJMBvB҅k?>t'Qt1X< f!qMbDV7IE %'u3r^;-iJXa 4F,vfl*ElsiWM#Nۤ'Vw1?ĢkW6MtK1.Fq;m5@QQĬѕ1g$Lg(ԁ%n㉭Ȼs<0*ਸ਼QO1 mi|V iEF#m?qgs>[;-TE62&HG:ViC0Z`]5,-gV)uAJ0_ x>Jp#/~!Ȃ5Tq vsg_i(\%1CtZ˰ ]G7ّ뺼E:1Loeqsx˄׮`jD!nO}KX*y>.ImE*T]-VZi-sF2'aDh-p5݋*ݔeBj-2]*!"CprMOMRt+KM=F+"ǡ(.CSF1וвь;bʃD>@) _z~.ZN` (|ڧ\0LZhZRd*B):lSڒ/P u/_T^&9ʶDOAɊ Yj(3K &V2A 8D$IZgj$w7M%8s!cf\/Ղ1AA0S㔁B}3jf8{מJց}VSGٲeKfvg&pt&I /6ǧ_A9Eg1~w@W,m,{zHv¼U.,Fd &xOwF'ܔbRjQ@GZ6&2́GǷt,3>wo 'RUMFgNc!7NmgEiYXoUuT̏.%ۈn,*OevJ)QR0]][ste72$y[&x#N˧"#/٧6#!A2i<:]*쥺`ǫ@t[vo-eF)R#e$U{[>e}lX">MRgu1,fo ȋ]ɰrVYkn F{w1zg'vKXSc7%eH2ޡ#@[?Dq$LJydF"=n\]<rE}2 IwFs1 ^!F ]*=֨a2l&FW9qA@wuV/RaI""Ph$)k+~L!#3hsZ7@E:)6!=Y拚]Զ;7cirdWvDuI`(+[^cx, vdy__dѺgx>lѦ/V>)#b7u &{#9(.K sk35TsLPq?bi~) AYQZ!}R[7q9f1?Bp?v4>Lo]t뎫ӳ `@3Bm.#Lm_|c*[0 $ORH݋Cċxٽ(9LĂ6\Z^KJķڹ6LК"k6(AT\dc@51XY2(5஽#wOT>bPlR04kGi/s?.&J킌 @xݖzrGʹ1AnC;DZ Ǫyzbz{7N|Kvs WyEP[s "ܿbv|Y;-R5KZUYr J+?pDȫLt s%#eP8jeVʉkvs>_4)*U&Ɇ=&՟bl2eND*tIqrftEbCG8z8"A@F*R*0M\ؾS, MQ1-虫3ML Iڥ1aI Ab,gE,/94j|wdzY$F *tntVrZ1IP}S-[.`w.Όg' } .:a{6#mTD{GL֤^k TʷҪ2(-Dhأ&őskkk cQ;2|)yɑ5qƒliw&j `k|pT 6i[dIr(033W!#u4:(HqZQ n^[^ny8}NQb&ړ0O)\C#,޾Z@ w4ok䡹G1 (P}8[7bq Wdنeh@b y;Z+|9@1Ũ/Old`^E󢥮CDh;Y"FE$:!.W, mVP8&0s:{ڇM.nd*x1WMl?qx22WS#YPM4vfbZ`N~,| zå0.PKD3/ ?W5XԵ-b'.%IN_oVL.(fv':ٔ"ɳ+eqFTA6~7xn |΄$^b!;g<{$cC%]?{*`/{sSe^qƸBˏrj#&2?,ܬV_B3dGy'd$C)dQXu`.`~\f~цQFab |ПkЀv;! |t=S)+!|u"UZ.ݾ$I17b\DK3Wwh]̚ C-C(" !˭I2˻!!_פu}Jڇ-Z\j8EVsI]Y?SAA֡49[Vo1T 09UF/CAf/m ,Y}<t@H(mnQˀˤW( <^ɰ-O (DC%3/4TQy6K5⠲]BNW#дe2dћP'D{ Y=v2_? ֊n!:]ocW"R^I#8jK$i-c eiVUgXsdsctv, `o ǧB7>ᣈnFY=O}d[R]BkB?Kus BO|COC56 ;c-wskQ!M>p:qʑWW`A ]~ مb6.\(0|0|N%Aap?`Vl6cc=&.pߙ;{ 4cR10!UͨfI/  |AYMD3K,Hݛ*[溏`6Aė{)]ev!"J$- 0oؑ|4>Z6c؛CsR/9 ڕ-k ͏=F8<-{DMb@-}ʼe.LzKz3D|{K$*Oj jO4%_G+hO#-T+mc}HNjpb.QRDp] <*loOo%(^UWtWGm[hsjfH\״PyV ||vMfE% 3?#,-)'T'WdTgFX8d3Vy:_*L8=ÔoZ EC"#'z8:=} ȣf|=FUk%=Ub0aey܀g`H3n#!/^hR{څ֡j<͈$o98z OS#Ԍr2Ue1eubW4,CRt4ytkQۧhTD: 072 dTnZٵ?{Uݺ _K`rHBCP| 39ދ<@WIs g9C8V!=X@YHψy?qT 팰5-2asQ oTt 23 0a#!7BD?,}T2NfFn dNMA-~bэўSHhoo; Z2#:2x.d^/"nR΄GBzpm$瘤mT!`P{qYRg(PH؎p9)NdެkQdv@zT)ÉY~p|aU|viY2/dwp"z)+)n$cE2Gdٞ$T:=}1mКHi<]둯ilGNPKݧ큘džPk4>\ym=lwGWoO!iЗVOG{aeYͱ;apfCrWq927곺IũeD\IAwbrvaѳ).u y P1EB!@%th"x~pgl.b%P]␁b*9+$1ZTj| D ]ˠjݿ3AKi6<2l{2+#4%V\*NSs7Ԁ,5c1W=-tЀo=QWr7mZ W%t:Ǩ >(Fq/y\MTcpH6ŒQbM[Xݳ/6WfԘ,7%^\#wX8$HWgLy,7E#nDDdg*%k-BѲ꺚NxHEmPrQFOIm<P!U.)vwkG2N;9Y<*+R\r : Ĵ$HZKo̮(C̍ %$,+@݊Mdz<  D.C3p5"k+y ,,]B؞<3U)Afe Uz+x6\RwזM  [hu;+g +no^0:8JSVd' h; f"-l3uV`ʉU2#s.7'JV=xt* <)%Ց"+-Dc ]mѢwhnxo3_h:LB9T|%JupqOGG{*뱚AԴD Y}/:p@ BWnd _#q礴Ǣ/#!nͰ2b=H7AʥV;<^zLW,xī @@L `gZ =%[E;8D/B/!N2E F,mW7@b5,ff2XefzÄ-iuxȭ{Ug")y2R >mWUQY+=xҜqII~ӥ\[}E{g'Xx n7pn^wsdIWv4GصM' t X==gs/ vKc֦g Ldnr8]/3]5ëx 4#aXtt޵#AߨKPX^zyAܜxaP}CPNmɨ05Q7NWc]OFɇ =3{ڡ? ')=%ܰ@ uEO1SCVrnKmN4,3)c@Æq_wF<| :/VCLyGƣ`! 3wT'=+:[DJW#w>7:(=H~($Zg<;l(WW}N+ͨx [@%d?i1z[l6T q,%e#ϘPfh!mK1GpWdƲ_)k^?cT mŽq Իwh6F3Bzk5:'D U垸'l9Pz4p3`;Q(H[| " WJ{ϊ~@Mk&_H)2L,+JX<ޟ5n/KfQwu j|+)ǿ \8'﹓6 _ wRq}>3xSh/ҌC w\j ,jeUPaIG5==PO0[ma}êx^{ P $Vq{1~oYI )= fm nl#VCy6.VMGޚxZjBfx_0Wc1zcT8Tj i?lhr]⢌t˅W(8^u"2$WrF؄͎rԛ=UN,a9Vn>H0gN%c7 ޟ:&01&QʦgSBWw!:0{;LKHt1v-Xjс), S9 ݨ(h5*jd >Z"2Tx`bPW3?Gy옪7h/G~(~N蔿ׅ:4M؄R>eګh,=?EP]1 xsgBv]ɳ!9 f>3|TQy%;ڳsRA3-pބ{sQcN$A,C0W#}>#:>o 3)5yEBB7^کVY R@8-?g=6sbףsqZJX1LVj¹ Yۯ6B.vt2gP9CytcWz08?o'We-+ )p438 ,=X˦+@t34lVSh`\O(c=F~!'UTW N\5: 4CxF}Pu&H[Exܗpgo!5+͚=Jq;Mz "-yOXB6ǔ[V6t^?Jf7V%dj6Ao O fN(WÔ1'@v 4.F[*jg:zw>-XҀ}< =h 0(9ʻPW`cK"Q~(*.c}.(GQReGUk!dd{s(%V:74qRe/ mӷQS4 HQd?Bln.Dpm%(9rD'y 6+bH]l xua͜m\^qomtt  ;EBJ mȲ4L+lb'eM\* :^Fٕq& 9{̘fJEXK } l}.a}/M7-r۸j[ik2$)g&tbzYvbtcaaP[咻 i8,l; X//`86^r1PV};&E~X2Du^OB-%6 0wRE'édVmaO@ZH6 С7͗ ө9NFBEw3;!R8gmj5ɦy f}vԚ" I> Bqy(`f"@m ~}G *4h&`#hndvmܦAx0Q QI[%z5"իkZ|Fx !aXTr G@ngٖ_[ Yƻ,ߦ^ ៷J+8)U>jyvftJ[R"rS[&F؃iꞝ}I*ˈAgy| +euV4OYT{MB"VQqHP:^ r@3]P=cqndp wgB"|[vl綔ln^OsY{i;8؎ mgK%D*p܅q O\ U^uPFӾʾAl=*­wn'~= σNLn2esY!o}s^(el5tZҭWĥً>j2*Z116s87j]%cGf} d)dV,w}wԑ"GQi4;skUȦ[dP06Z?YCuHI8r#to5nL c+O^ٺCnWG8 ֪J3$:#+AX 5at'YYCMSkIGZ=EȮXBa!xar(%ղ: (JT@ks 7HP VDӦʡl`Lwd"0*.JIcd(pY9ЮפQNlR2ckvۏ2)qmq"5&4VUT'J[?~&JLz'x\TwjTk0pTrQ 'NCi :_\XZ%Q򸦹4D[' @}%Ǝo`(;hlEI(uN5C;o"pa(Gq1n L-R}M|Zȝa"TPy`R0UEZ=:ܖRt KhGI.?誚WLrWt*te"ԥj``DOyeGkg*CV*&w[S]AsDhBdRouxD">$,lKKӏMQVG1Z6A{2>~wlÔ30'm3(,,8.rMa[gz(d'jişFWahf0C4@m0 2S$ +GfpyC!(L*S&t`87Cp2̿Ì(͵$? ВiBiֳvI:@{+B9hG+2*#h0a*Rf6xeu֪~Ih[*WS_(Pcܬbt Yy*TZB_2<$"BnUj;+Xh/Mi՗iWOl#NBץ3&HAgZisN04jM?BxMwm؍Uz8_1&AElFBMh,krD{սm7JwVc!9z̋ &M=G&L^; :ʬ4dsFb~>i]0up#( |q׵B^t6}|^:v%~wEn+|O;0i^=k|IOWXQr׮_| ;%/"ߜ="Ϭ" 0аy~_M?j@4L婍 (wJ[ bմI B-9#@LYxL3L|LZs@gORH[\p4R;#MS>**d ]F,mK^kV+ҐǴ@*2[sJ--:Zv\I 2w!=yNg-NfH;\gX,Ss%6g3a!-$,*sFyS.&#]v)Fb/1PdI|gfkKyp~Esޜp@{Cc#بM #ȍ惉MZК*c;cuD`B[/Fa]p᠅+fTOw1<E;dI&6ڎ@Hw\.Dۀ GÔz z2G&T%`Z&C4hQQ)ķc֍-'SNM@7+RCp0.hvp&&ȍ=$Urԇ88PcjT"@eGZ/Nَs 2"S1>w5cBCGkLq<\ie 5 [Z.[2 l0$Qv@N&ŦE論P,L5i(XSZ*4nݬPY{~‹P=)໅q{梃\˱V%/ `1*nd `\bDiNK])Uq`"V'9`$Oe>}riAL S*U|,zqYo-8kɅ&!bɱbHy?& \ĦT_H^ⱦmGSPܘeneiVw qw}A;s,d%eX"R_8\`~(A-qi2_?5ޗHtohaԐ?g[o=xʠC[C}\=UPGʨ]CGK[rR +ma{#Ǟ_! 3\k8ޭ*o0 fXU:NbVQ*>b/9BgW((ZCm!WJeS~_apEҴK3*2}uMW̚,4Gȍړ'Bo?n6Iڶƽzn?1܀{(IDSgPiefW,b㛶`v"KqZ s @vDOFv]!Ҋ _} ژCj%I#/4>VAmeŻl[x FuVE :dܐWͪY/#zs2r)ZK4ƭ=Y]vv%u C٤!Diq2`'0 ZrST^=տhFJ^:/0 qԤkv 3v?l; ?ahU >fb哸By#~S]6jwz7j@ hC'-0vDYG}:U*wk?`ϒJ2OsJLgTMr ^1Z* dž%žK񭉜nh:'qs)3NO>|]y6ӹmXːTDOU*A9&6VDw1Mp)2"u!Tk Y9:A֖I풾ZƒNն7[mܤ^zz*&͹Kxmſ *LlS֌@9k硽9H钌ḷ)oWP[9Alu\CD3>so^/xܽ(r.3 aqQ_L=dlIXLG3+ φdl"wG6i 9 `zފ7M]׺/|jq΁o{vxo7`@/|(b)e2eA@û>X﵀-k/.NRl@L q6.pV>~~3?`9eP؟"Fd mŰ=9hO1\YlD:xO .{~j\OP&p>G{GǡvxY䗋7=uXHG%:i3lMÛ9 zu4yF^K_tE cE |1</pcUv)V)ox;%!jF~Oiv*SJ&5,AaP6q>}IlhFS|{I ((vhz$]|ڧsY:%KU孿=/h@V'2ce^A=uiX𫞶;MY"EsѤ*#c$'ՙ_>KT !\w /] 5^JgϹ#Z>ƭr';Șӛ=:\ vW{IɣP$UO[#nmfs83n;/Ⱥ[jzW{4g 7Փ=o_.ZxCsufda)r82 ˎh3_V`aVm)>i¬H4wl+R6&4 ^ԎL\.O6:"*Q]`sLhzuYaJt-O}Aş烡@W~Mk({ ޛû"6!v qkl34'1ٖ;f0\sCar;OUoe e J5W;&Nj7<)8oA;Ƽq >I}\ gUnk7<5P[akdIٞuیkIߣZ1| ":=o)iPy*P8~3f2 eJMw҇9!ԕA1NA)a#^kn,G$n9&k،2aPm n 3o¥LO^{vۄ@UcjSkw=S֒U=hTK ӻ@@S-7{mWwPωȞN7GXJd~&2Zy0ͨ-ژ76B D+%W"gQ ՟:5:i.G l3 qQf957#!? pv8:$AQ8[ lǸ?i`ɀoCy~[_~7]+a9,"_#p W<=ͳJp6+zHcwj)YWTJPx8a*Z|6e_!:.*MTs`t#n[A ðel䔵\B^rD4 bSjcacp3^.f1bWhնw,@^Ciޱ>Ź !<|ZmP` aG'vP/y<oOֶar\_5O/U?q43MKPyza ͣ}xQ-f7>6GB0y/4fAM6Ķ%mcK7G`~m2bq %.B{R X+|nI%+0N%HuVj:޳\4/.3zv~ZDќpzǾOW\e}v=FزUuGdvMњ9 &$K -$;/ AV]h2=$MP} ~ [KbjjHHK4z`fWAS$W^:pkdcT@[ B 1}>]z7s||Q3<RW% hX1XAy_{ ]2|[5%4Bعɝ.~T(Eq1zD "̧gB-d0%%g6%^_tyZ_ ƬZuSIy.$c21b>1},,!W,ftaưG{sFxA?nRЛ!)4ٮ8k>^4|r?ax8eӬn_;+SrR)f6i<>#汛KX"gEڸGQ6LNGw7SN1Bg6?Ǒ\r E N~Ӯuj-^> Y(`xĢv}ʷlR,X.og]Ÿa: =7Uk7? ɖλjWpqݧQ)"}&H hd F-Fmp2U|9lghiLO%9WJ(1;REmz DF1:ԝ"jz€JRܵ[L'6de{bj.zp薲)FZ $n xT7p=_1[4K3r';i)Nv0:U7~&ׄƆɌF?y8x?ĤN_v7ޘ,;'/?Xȥk掴%u{d&BaTBavͧKn (E!#|vP}ԜwV[ Ffxcg煲=$e\9LC*aXxC$Zrԛd&$q'+dTPu,D܄˜dz" Pk=@W6 5_=&YR }?[arK,,p}i9$ՁӡtP=,\]Gbz0YF6썌v oÒR4//2"ݕ*-6k -Dm#Kkn)fዖpTƴ? kϛ+̆ +]dN =-E(ڗHGa3A"< i.aeR f}8^TCϫg8eQoVe1UXy:XzOVgduzZAP&Hqf! ^khoL^5W|գװ LC .kq]kM,!pLWR&5u3|y["бCE%@}EǑ"I**&F08l+ˇU[ T Hj3M_ n;53ٟrye^ʗ/olQHX(yseZb<[}#4KE+ej7|#6z"?IbzYu;*<"Iv3Gp3\G8[PA޻ޖ4.1t?, Փ甎l+}QmQ*@'=C39xIS(L,ӏHBvWȇ_Կ ! @Gv3/]( 6?>6ߋ\^@q=D":a0[bj`D?zVۇҳ#xU!ӉNn;tT@# >WG_۸6[oq7ehP\N;E1Yijى $ Cǭv`aA|$_ϻ=Zʕ˿66{h=lw%hY@h tiڒ=ʾ<ÆZ[Np~X ځ aȵ(_V2 {Zs&3[1!j> VAO.ʄe>N*mV*|<6Ur>TiW qI |*=.1yz} \gZRZOJbRM+v-,Vkײ7?L=5#7w$f֓ xΟ`Bq˜)@RmLC=| ~ #ROr.iZ"ь'_r!P̥[\{b<☝J[뚮} vTpH>2qGL_aŁH&ZLv g$"g%aʇGHI%*N,az@]2P)brJ^j|$p.~'z"u SR?Τ^XG`+0ņHuRH4(=반ɈhqxbO'_F% Vt䐓я6 ?'H zۃ|w/mY7XnjzϜhͩLkeUT#Gh;P=1ZW806O4ӥ H9U -CN̓@$njhlR@Q+jxI5:TU *΀J"oQ%'5Hy(NBq4 5!h34eaோnzTf.9o >> #5YM8H s2of̵(P`/P\Ģ* B*~h}Ϫ\)UbS೨"?LYgkl*__=.~'yg{Qw IR =(~tZ%f bS?ځްOwE|Jmi8'e]*c?\Fd[")yIIB"!A'i[a?maFĿXZ0 O(/{,3H 1˙f{eAEqɼ΍*"8eJٚX@qx 52|j>%,~9[q@ Ǡߕ%­8ߍvR\XʆD u -EW曶U?q}C J2 wʲƂIXwvU%ٞDԏ(iw"H#g̓tt*ͫ0)w RxQ:+?NZ]8't m9ViA:O]hC 0I>GJGBս/>٧fiSSqF=%&_jUM=D7imQ\v┕}]Z򊋃۞7s5-\~b ,Y% HJ(A`XƙX$8v>?i?aw'my0E5j5n:bڜBqF[ܷx LyA?CqRD@0#vuƮ\ "-ԩqa 5P,A% 5OT3 OKM@=J>@ mlL#q#!!'򥵇EED>so̮aM#ųj5IqBQz]miIL'[-F []99jR)6mn*fypl(\2br V>_MiN'ޤ+VB<`kʮn1[5{!}`ixr\DִCb8+&w%2u  ~.vj+~pSg BiHv1q#&=?_<&̎\ڷfmZ1~3FO~z[#D1 +э3{yW5C(ZjTYDw `$} _XcDh_2} /A[Иa֙DǁUрyiA2tͥZjtc2CV>;C#S.h<~V !D4.敤pet_GgE5NUqw.렀of& j\d~8L kLŲa7kוԮaFi7CA&R UXc$R5aᘫ߫u6N}"!sXJ-]S1D S=w<ߕ;|[Q[Q2&ʻMtD~[$RE3ZZ.=<\nLlAL~$Ic\E:iLK '_S>HxdD=߱Pn֕|7yZxlJYBctaԉE+}l kS0zE(!Η'gOCk}naV^Pj(ύ<s Gu̝ӐI2Ep6XL9S͜L@(ΞQtX"L*ݼM zּaN@m)T|T>|FGb(t)S j9Md^ye!]ĭo8P>mv!̀QFc> /VP)]8Mg^9QBL!^4@lǪ^ScoV<< r)j N~U̳(m3^ Chg+ÆL(eKZG4e,U'uf<Ŷf0*MtNL)`ɦg)6CvRw e}TV" RCbv-7mAbdrt4 s- r"aFt+9p3\{\joӂiB콨L/\*%U RFtIOg+k[Y:ș4ho-߃G ??+9QUД6-v{{xĹ ?$T%@_Xvۨ-34Ll_2 8X@MR*" T:?P}=,sw.?L\pK |Ȍ^~ߵB/ *^"i cog: *{u-[emx*r ~tN@mA)n.vv;fZHKvEl{ˢ>Rr[A@M"k4:q a̚o[nHxb9k 1P elNlۗS Ys7j>LY P=_@|NZʛ0TNҜJs4Ec7lAw%R[ 7I5 HRiX476sWɩ\]zIJY'TM~RFG=7<ԭxI)optkv}8Y|UJ&HeC%c$KX:bvᢽ.V?+e}b[{ ؀!$4-8)!|lGYq NqgN!o#"J!Q S3x0Oiңi^ƯGP}-?S WyŅth "([tѸhbùZiԚSYP``lT:h)?/#C/nfyGhe.fw{[7p2߹^P`$؄yJJhh펻r`AՙC bU?$=9[g,u6_EJ%.xmP )_uOᚪȨ RpP{ƸSFzXm dǂ =lsSVX0ʛk?"xA*htD+h|X-(Ӧ6DCPvؼ] I cga` y{}50A1+@YUy Pb s(-mn\ξjg)z'1—u'JdKtt9 b1i`V%QHc:|R^# ^3*n{^VE;1Rk͟'2$!mcM1De0~t =Q*j Kn{j$v 4nZ}|+n hƧdNBBA І#@:Mivlq cPY -ʎxh/C6(~Me9tC[RDY|SzMGQ8|sE$W BÝh5`l8ĹV,h=K ogf"9/)W<%wiU8Vدuf<wb$ޕAY9\i}wvmik:WN/|}c}iyb īP6qP:LC%4<;o\L=NAr܋uzvd3 u3RٖcH; 2R˒@LB_6`eBTZo2uHjcF9rn #*M¨T{{y8{[ݦ<,-mXk9Xe_0RJ%Qt"$^\̃b-w4{)Bpm3Q4t.^/\~ ֹ)E bwF$#F) eQY/w0i ;1_0H .L+%$ѕr! ¾R-wYgYWl"ؾmK ayͳwq+ Y\N<t Ʊ< a~C(V'q 'g495ve%(c.v8YiYһZtR{׳  vQ~-e*=oFs c 9UI48rE*\ 6%U\VR}^/Q]>`JZgޟhNo<%vKNovbaN29sIal|x*$˳5 U!]Rq Dϗ/?'ǝx&23pÚ>=H DW U`v {SEH꣥ӯĭTm]5tNiФ]G /Z/5wYk*Ŭ4i~Ͷ_va0]S7HՇ1qGw殄r+iJAΤE\ j,m +f\Lȋ3&)0TB^D?\ɾyvg,.zׅg!,̅UHƋU.)猈uRҞGܿZa*.=HWÃYYEJK#(HK,Қ2($I~*-TJo۩P,ĶN/Ii5Pi >_(Rnl"^p}}M`u :OqV_6?7ZM\R/$;VD؜8j Q}y]I3~}e] CJBOeΦ}j_M!.+n 6X% GGJ|+e25vE11\>F)*|o'jJ\ɏѭ Z1 ;I5d @3F:$۞vHȎ%%b/6EaB)1/ +KlR&?ɏC?Us㦏5$Iw|R/m|$/)njNA PP>Ȓ ǧEq.U|I*.Y4˷!IiigbIVn6$*ydz|ABx3[U((Ao%|bu-@\|\Q8g4=_?}PeÕxQ>j?.R0N7YPp=)6nwΎcMnNY%&v,`n[|5 I*ĺmJ v4";*FaĿ L ZLWHx-9P: r)lDukwh3GdۣZ=lW=ae1|^29lC*y~Пh8rnFIyhҳZ vyu;VvUY{Q^DdQ~gBaya:41 [^pM|J89kqN' g%pK[&9|"|GCԊivͭu N{ E5auPj>7v,V/87ԨXÀ<1|)SHs,XH"pVO/Efއj}BMvxax/&~Q-ضyS1$CU+>SS"|XDZ\k(ZTҖ7VV\|Y/ F)D68t1x=Փxo=P\Y"yv)AEȵ TIbza٭ɧuS3|>u{o`@[^iF1lOŶ/|/ co^Ky0T9V?ǝf~I=dJFz{xB~r=asKJ}:QdQk9bF+I`%xVd^}'⯫溛&%JHL.`OJnWM*RN@ 'F>n1:kuI?ݚD!׿y1ށ )X2 d3Jʲe(yQruc}fgՅ/EoҦ4 *Io 7NeYCEo]gW8mGdCeҍ|N+Ͼ9?*Eʙ6P_*|씮u8O:0Fp_{}/,[=ll$(ɐ`;׍Ia.Im-ѯ }Gp'R)ɼ/9r kLgE'XQ7dix&\SM^e,\W웶ϪQ{jݱNۣ^h[-mhg},b|gհ*2|TՓ O8Ϳ9KٞDImiub(Ў Mn {㛋gP-\b5#3cCf.cV@s}y+ڇ;Hޘx' Ӹb'ОYwA;PK*,$"n[vO=S*X3fA{0Dmk:B>DIҋ/LqFF6a<3ƶxo Oh"q_ةr45~@WOlcx( mK]2@D* $s6z u;K(. u> c{t!wUve 7! #t~66oG^ؤt% (E+ve26hQeC QmN򲶸8El*q@RKF=s/,zW*Jhlm2gXaVU7u'ޠ␉GfR$>1hʉ`GʃQQɘ5t3l*_<(9I) GsZdDzA}Wpz7B|bꈛBxalrtKv酆!YIWJEn*_Vwdra*ϖBI8&!ۑ! om8k ]裹%ل*G,TCQm$'N|n;\`"X-p}b;ȣwf> J%jrlAvfp3/`cGJ` U*X <^Έ ` C׻k4 `b$ɝ]@), dk<MT/q9iV%_nqfb :pC-9NiQ+Y8orB I Kv?ԧ &G] j 3뼭v5a>=J8kp$[*&NO?;'5ːo~ȭO!ž;؇vܧTFF\GȟrTt`m{160rĮG"ԲEPXxf &#;~JS&1k'xR@Kzj8$Z@PwR+VZE ;$zj "JK6晲^ôg7%݇d$@w{}`Ŭe㨋51vgh @M4I5?fҡYWmT2^PҥQL\mo--c ߝ_0_mk5O0I>Pд@I&\ʛA3orApn0\a4H䬈;jiB6JE]Dq/K5:NOBx+,%wńF?wvE I}&{ͩbwO*ݏ#ʊE# r1orvs:k@b<nȣ-rBvy{g-SSQnlC|sZ.C)sh&29IAR 8(3؛Т ڂ.}L`y (_qt+TQ0 1٪-F/5O?]+ю.uVH$A r_ / ERmf8Bp I%11'7K'ީQê 9zB{$wh~$ viO>YсWLu /kst}&@H:ʴPJ!8` JKQ]gTUcHs PX\[쵗ejfQLL)'~؝Idyi{s,bT*ȧW9|%X00 ðaY85A܇]Aj6f5 6ujҟt ]-&>?-3 u%MdFNOy+bb-^(fl v^jaOgQ8{XQ#1l_w@IČ>T%UKaT3HS3ќRqROǕ@RBwt3Hk2aXye@'!(}! Ea(IJ2B\E9`zMfV{*]%fUI}O[3$I;P ^=c॒)ER\@K!`.o\G6q` E!a|ǟGV-z?J-W%>Iю^OS@Kªh7,ՎL3c']Chi!7*yj yEoF9, eWod1!7 #ҠA\x\u"dp`m&`s\ScLClȖac|IbO3M-\О6_&qP30 *o{EʅFQf"`QZqZ,-ΥԈ!08V(}0F$d>~,J(3҆:?qÄ&\q+/Û&V}2~j v0S E1p9Z^8[Hl5<OM>4;|Kvl;hOG~qe6?V + TiW}W=Wk(wi;h_#}R1 b_# `F5ԫ!MpD#|:H?8 "5GV亘%azkڠe@J`maD퇴G^D4/J x ˏs_4#*yOb1\4ufKKJJŲ>bZB8if0{֑Bd2˸fa1ڵ!umgP xщZ;c9%gKDUݟ2T5arUv 8*C<%fKt?LYkt'("@ֿ>>2ZK׉WT2hI cbOb^jd?!ᛓ 04O*'QtNb vDy \Ƶ(wGY'C*fcf"[ߗqÛιL ;x1!1]N7EQhsejEŀޘʼp͢}֪hUZVZJE9`mӈ:ҟ\r{=ȅ<(8mgoM~F0&KP13zWp%3dH$Wl֪7QK$LC ї ~^4qR`nrh}ź;UF6Zs7tG.3usLdwHR}]$anK\x@h[{>ܧ;>g_GlzVq.dr|(?QEyS˦Wt{xKR)ل*JFJT܋SYP%E=1osiNt؂h޽mPt ,1I":7)]L EqeHBVٴ_ӤX]Vj|iS=OpF QM}O,7Zy=a7;/^I;g oIfQ/iS^uy,CN,c2^p=g2E/8r)cWdfۛ}V؍t)?ܐ*$ʌyE= #:=dzk|ڧPwŽP'ӹ,U4AE~xd;֪tO?u:gvk ɉ%J^~=*%@ɭߥcBa5';!];"wE8z=x.pDuSdzvUu_W3E˘ʠJ /p-@M:,+UY35>=7ac$65d`3#+/'veO`@VTސ@J.l1SAj;Z)+pib= =bb 㓳r9yhyDP=dgVk!s\8+h8dz{~ 򢮿#;7vEobX%HI$-N ߯9,tM-sA(.h]'k8[Hʬݓ.D*AZ `?V^,hQJB7zS.k"Fsy%.dMǑT:w/!\uЧHjb8`A*UaHF6U[GxIEHшSt?hEB S7'RxD4iA %ITͤx@wмb:9ĎqD.i*oO}d>kX,q/̗S),\7,o>P`rU|}A>lGbROo9ƍ!%2*ݠHLv < U -_j"]wcIy-x6JEe~3l mQ;K (QgEREVF\/u> &%q^o!B܍#JW)-楉;u_6tdzȚǓ|*.S]J_TLA)wçȖBz*ֈ%붜^]t)̸{. 8LIFk&cg64T~2 _wء @3Q )/ "\ μhK0-N غeUzϾXa5Zx-/EE"f[rvD_9ITSVWC`Y FKc2K3 zLՏ'S7:71p= ;B9 xV5 t𐷃dA|SRz$h[' ^8GzſO͗~CQsm'q쉿s\Saܪ~|ͼ! E)] xOj'rP<hɒŲaَfg$Qia?<4eu÷Z'qk0u甑Rc8komU.Z:|-0:(eOڃ ͏_R=qD78;#齱sSRf$EaaCleG]ȦA}| htGjK0b c]2 hm˲в;r;EC/t8SS)`aNOɥLtkƮ*iw9Vo4bdlFDx;A̴%m] "1vc屮N$mp5Oֿ  \)#C0,b%SO5 TK!1C\XFN'qjꅳ-cL-F.~i FBBɅ]BhZVDITQ\oB \+X*n7?Tv/]Y0(įS0\s qa4|coz6ߘİ`1lA@h!1560J/ڱjGw^@'U \- TI8I`y\pA-Hmdg@Ba^}:ba-Kmw`yRαj!.Q ńläHYg*?0)xw$!pqN~G`hH/?5T3gAkY׼in>]b"u薚oP(grI;yeZ5*a/fC )bkL엹'41 + s3㥜;x0Cȕ7Ovc0"h[~eWZO0zg"c$搗 ;]%B?A5(ŵ|PEP4^[2? o>q'(>V~f#fj+DOڽ~A[/ |ЀVh)6h%?^a3 ꭶW&dәVݼqW-W B┘v֝jtߨK0GHvBE: -mw@m{̿|gi mm'Caa8h}v$LB%9.uyf%<0DNk3\2,)(Vi2*?mC|k&=*6O`^DR{K,Y!\]\%1=7Ѳ[/3叉h!=a;QkrQ;XECհt?IؓI M~VA B{Q&!}ZW:UL8'C-[85"S`_'ͪopţdƪڛ;doΪƤkRv/o]THp@̟K|?,N~7 o0vkc%t^1ld)є z*h_$@W@-Gv%8 }Ź/= m'(G̻Sl3q0+ :Y!5΄ҥgeO7:$=DmJ-zުB@ja<`97e+kJ@`>T5l ʼLKW //9