xen-doc-html-4.12.1_02-lp151.2.3.1 4>$  Ap]޸/=„+_<0\ ՙ)7-AjQNY~:ƖZKrlQU=wAiiYZ?j0A[ %ۅx/ė\!eg66ٕ`!+doh'{,޶ 9?C/+[Bf<~ʆ}ߊWRKScfI#,G;fbf634898053d1cdfce422b2b7caa3ca4a063624c4a04151a2eb582214e0b2347e58d484600df2911398477ff7b5643a8f0b52fe]޸/=„/58 j*" \ U}YBCʵZE<T&xIi0WT&s쮢?yOj<3YH8Dp5L`T]rK| v\ ltP 2,F0 "( ! 0w_C!@\/Ȫime;M^ zԶ$`b:C~1&Zsӕ[cL>װEƸd7jQآ/*D&&-Fn >p9R?Rd % L AGPMM M M M M M<MM>`MK(o8x49"H4:74GDMHEMIFMXG8YG@\GlM]HM^M. bOcOdPOePTfPWlPYuPlMvQRtRxR~RCxen-doc-html4.12.1_02lp151.2.3.1Xen Virtualization: HTML documentationXen is a virtual machine monitor for x86 that supports execution of multiple guest operating systems with unprecedented levels of performance and resource isolation. xen-doc-html contains the online documentation in HTML format. Point your browser at file:/usr/share/doc/packages/xen/html/ Authors: -------- Ian Pratt ]lamb24 y+openSUSE Leap 15.1openSUSEGPL-2.0-onlyhttp://bugs.opensuse.orgDocumentation/HTMLhttp://www.cl.cam.ac.uk/Research/SRG/netos/xen/linuxx86_64ot9DA'6@7x3#B( W c e $,76H"yjQ <3 "z29 1w\xAAAA큤A큤A큤A큤A큤A큤A큤A큤]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]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-4.12.1_02-lp151.2.3.1.src.rpmxen-doc-htmlxen-doc-html(x86-64)     rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PartialHardlinkSets)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0.4-14.0-15.2-14.14.1]@]@]]fl]M`@]B@]@]]@\\ޢ@\ڭ\\@\@\@\,@\7\\N\@\\+@\\M\M\\\@\}@\k\X)@\J@\I\A\?\=@\9\73\4\$\l@[H[k@[@[^[^[ā@[@[@[9@[v[W[CN@[<[6@[0@[0@['[!@[5@Z@ZnZ@ZZZ@ZmZԐ@ZZZ@ZZ}@Z}@Z}@Z}@Zz@Zz@Zo Zk@ZV@ZS]@ZOhZ:PZ1@Z.s@Z&@ZOZOZ Z Z Z@Z@Z }ZC@ZYYYY|Y@Y{Y*@Y5YA@Y4YYYbYY@Y3Y@YJYJY@YYV@Y@Ym@Yw2Yp@YlYh@Yh@YS@YJ_YI@Y5GY0Y-^Y(Y"YY;@YYY@YtY.X@XQ@X@XۡXg@X@X@X@X @X@X@X@X@XXX@XXXwoXs{@XlXWXRXQ4@XEVX43@X.@X*X lX&X@XX@W@W֘W֘W^@WiW:Wt@W.@W9WW@Wk@Wi,@WbWZWZWZWYZ@WV@WEWBW=W;W3W1@W1@W,@W(W(W(W(W(W#LWVbV(@V3VJVxV'@VV2V͛@VŲ@V`VwVVV=@VV@VHV@VvV%@VV<@V@VS@VV@V^VwVqR@Vn@VXEVUVTQ@VMVMVMVA@V;DV9@V7P@V0V*!@V V@VCVVVf@VqV@UYU@U@UUݪ@U@UnU4@UUK@UU@UU>U@Ux&Un@U\w@U[%UUUPUKSU>$U6;U%@UU@UUU.@TgT-@TT@TZ@TZ@T@TT@T5T@TLTLT~@Tl@Ti@Ta@TJ?@T?@T=@ohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comJim Fehlig ohering@suse.deMartin Liška ohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comJan Engelhardt Guillaume GARDET Guillaume GARDET Bernhard Wiedemann carnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deBernhard Wiedemann ohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comtrenn@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.dejfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.deohering@suse.derbrown@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comjfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.dejfehlig@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comohering@suse.dejfehlig@suse.comcarnold@suse.comjfehlig@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.commlatimer@suse.comcarnold@suse.comcyliu@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.derguenther@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comrguenther@suse.comcarnold@suse.commeissner@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.com- bsc#1120095 - add code to change LIBXL_HOTPLUG_TIMEOUT at runtime The included README has details about the impact of this change libxl.LIBXL_HOTPLUG_TIMEOUT.patch- bsc#1135799 - Partner-L3: Xen crashes on AMD ROME based machines 5ca7660f-x86-entry-drop-unused-includes.patch 5cf8da09-adjust-sysdom-creation-call-earlier-on-x86.patch 5cab2a6b-x86-ACPI-also-parse-AMD-tables-early.patch 5cab2ab7-x86-IOMMU-introduce-init-ops.patch 5cab2ae8-x86-IOMMU-abstract-iommu_supports_eim.patch 5cab2b4e-x86-IOMMU-abstract-iommu_enable_x2apic_IR.patch 5cab2b95-x86-IOMMU-initialize-iommu_ops-in.patch 5cac9a4b-x86-IOMMU-abstract-adjust_vtd_irq_affinities.patch 5cdeac7f-AMD-IOMMU-adjust-IOMMU-list-head-init.patch 5d0cf4e4-AMD-IOMMU-initialize-IRQ-tasklet-once.patch 5d149bb0-AMD-IOMMU-dont-add-IOMMUs.patch 5d1b3fab-AMD-IOMMU-restrict-feature-logging.patch 5d358508-x86-IRQ-desc-affinity-represents-request.patch 5d358534-x86-IRQ-consolidate-arch-cpu_mask-use.patch 5d358a67-AMD-IOMMU-pass-IOMMU-to-iterate_ivrs_entries-cb.patch 5d358a92-AMD-IOMMU-pass-IOMMU-to-amd_iommu_alloc_intremap_table.patch 5d39811c-x86-IOMMU-dont-restrict-IRQ-affinities.patch 5d417813-AMD-IOMMU-bitfield-extended-features.patch 5d417838-AMD-IOMMU-bitfield-control-reg.patch 5d41785b-AMD-IOMMU-bitfield-IRTE.patch 5d41787e-AMD-IOMMU-pass-IOMMU-to-gfu-intremap-entry.patch 5d4178ad-AMD-IOMMU-128bit-non-guest-APIC-IRTE.patch 5d4178fc-AMD-IOMMU-split-amd_iommu_init_one.patch 5d41793f-AMD-IOMMU-allow-enabling-without-IRQ.patch 5d417a16-AMD-IOMMU-adjust-IRQ-setup-for-x2APIC.patch 5d417ab6-AMD-IOMMU-enable-x2APIC-mode.patch 5d417b38-AMD-IOMMU-correct-IRTE-updating.patch 5d417b6a-AMD-IOMMU-dont-needlessly-log-headers.patch 5d4a9d25-AMD-IOMMU-drop-not-found-message.patch 5d80e7c0-AMD-IOMMU-free-shared-IRT-once.patch 5d80e80d-AMD-IOMMU-valid-flag-for-IVRS-mappings.patch 5d80e82e-AMD-IOMMU-alloc_intremap_table-callers-handle-errors.patch 5d80e857-x86-PCI-read-MSI-X-table-entry-count-early.patch 5d8b72e5-AMD-IOMMU-dont-blindly-alloc-intremap-tables.patch 5d8b730e-AMD-IOMMU-phantom-funcs-share-intremap-tables.patch 5d8b733b-x86-PCI-read-max-MSI-vector-count-early.patch 5d8b736d-AMD-IOMMU-replace-INTREMAP_ENTRIES.patch 5d8b7393-AMD-IOMMU-restrict-intremap-table-sizes.patch - bsc#1145240 - [Migration]Can't pre-allocate 1 shadow pages 5d70bfba-x86-shadow-dont-enable-with-too-small-allocation.patch - bsc#1137717 - [HPS Bug] Unable to install Windows Server 2016 with 2 CPUs setting (or above) under SLES12 SP4 Xen Server on AMD ROME platform 5d89d8d9-libxc-x86-avoid-overflow-in-CPUID-APIC-ID.patch - Upstream bug fixes (bsc#1027519) 5d67ceaf-x86-properly-gate-PKU-clearing.patch 5d779811-x86-fix-CPUID7-0-eax-levelling-MSR.patch 5d77b40f-fix-hvm_all_ioreq_servers_add_vcpu-cleanup.patch 5d80ea13-vpci-honor-read-only-devices.patch 5d8b715f-ACPI-cpuidle-bump-max-num-of-states.patch- bsc#1145774 - Libivrtd segfaults when trying to live migrate a VM Fix crash in an error path of libxl_domain_suspend with libxl.helper_done-crash.patch- Upstream bug fixes (bsc#1027519) 5d419d49-x86-spec-ctrl-report-proper-status.patch 5d43253c-x86-ucode-always-collect_cpu_info-at-boot.patch 5d4aa36f-x86-apic-enable-x2APIC-mode-earlier.patch 5d4afa7a-credit2-fix-memory-leak.patch 5d4d850a-introduce-bss-percpu-page-aligned.patch 5d516531-x86-xpti-dont-leak-TSS-adjacent-data.patch 5d5bf475-x86-PV-fix-handling-of-iommu-mappings.patch 5d6524ca-x86-mm-correctly-init-M2P-entries.patch - Drop 5d419d49-x86-spec-ctrl-facilities-report-wrong-status.patch- Update to Xen 4.12.1 bug fix release (bsc#1027519) xen-4.12.1-testing-src.tar.bz2 - Drop patches contained in new tarball 5c87b644-IOMMU-leave-enabled-for-kexec-crash.patch 5c87b6a2-x86-HVM-dont-crash-guest-in-find_mmio_cache.patch 5c87b6c8-drop-arch_evtchn_inject.patch 5c87b6e8-avoid-atomic-rmw-accesses-in-map_vcpu_info.patch 5c87e6d1-x86-TSX-controls-for-RTM-force-abort-mode.patch 5c8f752c-x86-e820-build-with-gcc9.patch 5c8fb92d-x86-HVM-split-linear-reads-and-writes.patch 5c8fb951-x86-HVM-finish-IOREQs-correctly-on-completion.patch 5c8fc6c0-x86-MSR-shorten-ARCH_CAPABILITIES.patch 5c8fc6c0-x86-SC-retpoline-safety-calculations-for-eIBRS.patch 5c9e63c5-credit2-SMT-idle-handling.patch 5ca46b68-x86emul-no-GPR-update-upon-AVX-gather-failures.patch 5ca773d1-x86emul-dont-read-mask-reg-without-AVX512F.patch 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch 5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch 5cd921fb-trace-fix-build-with-gcc9.patch 5cd9224b-AMD-IOMMU-disable-upon-init-fail.patch 5cd922c5-x86-MTRR-recalc-p2mt-when-iocaps.patch 5cd9230f-VMX-correctly-get-GS_SHADOW-for-current.patch 5cd926d0-bitmap_fill-zero-sized.patch 5cd92724-drivers-video-drop-constraints.patch 5cd93a69-x86-MSR_INTEL_CORE_THREAD_COUNT.patch 5cd93a69-x86-boot-detect-Intel-SMT-correctly.patch 5cd93a69-x86-spec-ctrl-reposition-XPTI-parsing.patch 5cd981ff-x86-IRQ-tracing-avoid-UB-or-worse.patch 5cdad090-x86-spec-ctrl-CPUID-MSR-definitions-for-MDS.patch 5cdad090-x86-spec-ctrl-infrastructure-for-VERW-flush.patch 5cdad090-x86-spec-ctrl-misc-non-functional-cleanup.patch 5cdad090-x86-spec-ctrl-opts-to-control-VERW-flush.patch 5cdeb9fd-sched-fix-csched2_deinit_pdata.patch 5ce7a92f-x86-IO-APIC-fix-build-with-gcc9.patch 5cf0f6a4-x86-vhpet-resume-avoid-small-diff.patch 5cf16e51-x86-spec-ctrl-Knights-retpoline-safe.patch 5d03a0c4-1-Arm-add-an-isb-before-reading-CNTPCT_EL0.patch 5d03a0c4-2-gnttab-rework-prototype-of-set_status.patch 5d03a0c4-3-Arm64-rewrite-bitops-in-C.patch 5d03a0c4-4-Arm32-rewrite-bitops-in-C.patch 5d03a0c4-5-Arm-bitops-consolidate-prototypes.patch 5d03a0c4-6-Arm64-cmpxchg-simplify.patch 5d03a0c4-7-Arm32-cmpxchg-simplify.patch 5d03a0c4-8-Arm-bitops-helpers-with-timeout.patch 5d03a0c4-9-Arm-cmpxchg-helper-with-timeout.patch 5d03a0c4-A-Arm-turn-on-SILO-mode-by-default.patch 5d03a0c4-B-bitops-guest-helpers.patch 5d03a0c4-C-cmpxchg-guest-helpers.patch 5d03a0c4-D-use-guest-atomics-helpers.patch 5d03a0c4-E-Arm-add-perf-counters-in-guest-atomic-helpers.patch 5d03a0c4-F-Arm-protect-gnttab_clear_flag.patch - Refreshed patches libxl.pvscsi.patch- bsc#1143563 - Speculative mitigation facilities report wrong status 5d419d49-x86-spec-ctrl-facilities-report-wrong-status.patch- bsc#1138563 - L3: xenpvnetboot improperly ported to Python 3 fix-xenpvnetboot.patch- bsc#1138294 - VUL-0: CVE-2019-17349: XSA-295: Unlimited Arm Atomics Operations 5d03a0c4-1-Arm-add-an-isb-before-reading-CNTPCT_EL0.patch 5d03a0c4-2-gnttab-rework-prototype-of-set_status.patch 5d03a0c4-3-Arm64-rewrite-bitops-in-C.patch 5d03a0c4-4-Arm32-rewrite-bitops-in-C.patch 5d03a0c4-5-Arm-bitops-consolidate-prototypes.patch 5d03a0c4-6-Arm64-cmpxchg-simplify.patch 5d03a0c4-7-Arm32-cmpxchg-simplify.patch 5d03a0c4-8-Arm-bitops-helpers-with-timeout.patch 5d03a0c4-9-Arm-cmpxchg-helper-with-timeout.patch 5d03a0c4-A-Arm-turn-on-SILO-mode-by-default.patch 5d03a0c4-B-bitops-guest-helpers.patch 5d03a0c4-C-cmpxchg-guest-helpers.patch 5d03a0c4-D-use-guest-atomics-helpers.patch 5d03a0c4-E-Arm-add-perf-counters-in-guest-atomic-helpers.patch 5d03a0c4-F-Arm-protect-gnttab_clear_flag.patch - Upstream bug fixes (bsc#1027519) 5c87b6c8-drop-arch_evtchn_inject.patch 5c87b6e8-avoid-atomic-rmw-accesses-in-map_vcpu_info.patch 5cd921fb-trace-fix-build-with-gcc9.patch 5cd9224b-AMD-IOMMU-disable-upon-init-fail.patch 5cd922c5-x86-MTRR-recalc-p2mt-when-iocaps.patch 5cd9230f-VMX-correctly-get-GS_SHADOW-for-current.patch 5cd926d0-bitmap_fill-zero-sized.patch 5cd92724-drivers-video-drop-constraints.patch 5cd93a69-x86-spec-ctrl-reposition-XPTI-parsing.patch (Replaces xsa297-0a.patch) 5cd93a69-x86-MSR_INTEL_CORE_THREAD_COUNT.patch (Replaces xsa297-0b.patch) 5cd93a69-x86-boot-detect-Intel-SMT-correctly.patch (Replaces xsa297-0c.patch) 5cdad090-x86-spec-ctrl-misc-non-functional-cleanup.patch (Replaces xsa297-0d.patch) 5cdad090-x86-spec-ctrl-CPUID-MSR-definitions-for-MDS.patch (Replaces xsa297-1.patch) 5cdad090-x86-spec-ctrl-infrastructure-for-VERW-flush.patch (Replaces xsa297-2.patch) 5cdad090-x86-spec-ctrl-opts-to-control-VERW-flush.patch (Replaces xsa297-3.patch) 5cd981ff-x86-IRQ-tracing-avoid-UB-or-worse.patch 5cdeb9fd-sched-fix-csched2_deinit_pdata.patch 5ce7a92f-x86-IO-APIC-fix-build-with-gcc9.patch 5cf0f6a4-x86-vhpet-resume-avoid-small-diff.patch 5cf16e51-x86-spec-ctrl-Knights-retpoline-safe.patch- Fix some outdated information in the readme README.SUSE- spec: xen-tools: require matching version of xen package bsc#1137471- Remove two stale patches xen.build-compare.man.patch xenpaging.doc.patch- Disable LTO (boo#1133296).- Remove arm32 from ExclusiveArch to fix build- bsc#1111331 - VUL-0: CPU issues Q2 2019 aka "Group 4". CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 xsa297-0a.patch xsa297-0b.patch xsa297-0c.patch xsa297-0d.patch xsa297-1.patch xsa297-2.patch xsa297-3.patch - Update 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch and drop 5cac6219-xen-cpu-Fix-ARM-build-following-cs-597fbb8.patch Refresh 5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch- bsc#1131811 - [XEN] internal error: libxenlight failed to create new domain. This patch is a workaround for a systemd issue. See patch header for additional comments. xenstore-launch.patch- bsc#1125378 - [xen][pygrub] Can not restore sle11sp4 pv guest after upgrading host from sle11sp4 to sle15sp1 pygrub-python3-conversion.patch - Fix "TypeError: virDomainDefineXML() argument 2 must be str or None, not bytes" when converting VMs from using the xm/xend toolstack to the libxl/libvirt toolstack. (bsc#1123378) xen2libvirt.py- bsc#1124560 - Fully virtualized guests crash on boot 5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch - bsc#1121391 - GCC 9: xen build fails 5c8f752c-x86-e820-build-with-gcc9.patch - Upstream bug fixes (bsc#1027519) 5c87b644-IOMMU-leave-enabled-for-kexec-crash.patch 5c87b6a2-x86-HVM-dont-crash-guest-in-find_mmio_cache.patch 5c87e6d1-x86-TSX-controls-for-RTM-force-abort-mode.patch 5c8fb92d-x86-HVM-split-linear-reads-and-writes.patch 5c8fb951-x86-HVM-finish-IOREQs-correctly-on-completion.patch 5c8fc6c0-x86-MSR-shorten-ARCH_CAPABILITIES.patch 5c8fc6c0-x86-SC-retpoline-safety-calculations-for-eIBRS.patch 5c9e63c5-credit2-SMT-idle-handling.patch 5ca46b68-x86emul-no-GPR-update-upon-AVX-gather-failures.patch 5ca773d1-x86emul-dont-read-mask-reg-without-AVX512F.patch 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch 5cac6219-xen-cpu-Fix-ARM-build-following-cs-597fbb8.patch- Install pkgconfig files into libdir instead of datadir- Update to Xen 4.12.0 FCS release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2 * HVM/PVH and PV only Hypervisor: The Xen 4.12 release separates the HVM/PVH and PV code paths in Xen and provides KCONFIG options to build a PV only or HVM/PVH only hypervisor. * QEMU Deprivilege (DM_RESTRICT): In Xen 4.12, this feature has been vastly improved. * Argo - Hypervisor-Mediated data eXchange: Argo is a new inter- domain communication mechanism. * Improvements to Virtual Machine Introspection: The VMI subsystem which allows detection of 0-day vulnerabilities has seen many functional and performance improvements. * Credit 2 Scheduler: The Credit2 scheduler is now the Xen Project default scheduler. * PVH Support: Grub2 boot support has been added to Xen and Grub2. * PVH Dom0: PVH Dom0 support has now been upgraded from experimental to tech preview. * The Xen 4.12 upgrade also includes improved IOMMU mapping code, which is designed to significantly improve the startup times of AMD EPYC based systems. * The upgrade also features Automatic Dom0 Sizing which allows the setting of Dom0 memory size as a percentage of host memory (e.g. 10%) or with an offset (e.g. 1G+10%).- bsc#1130485 - Please drop Requires on multipath-tools in xen-tools. Now using Recommends multipath-tools. xen.spec- Update to Xen 4.12.0 RC7 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- Update to Xen 4.12.0 RC6 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- bsc#1026236 - add Xen cmdline option "suse_vtsc_tolerance" to avoid TSC emulation for HVM domUs if their expected frequency does not match exactly the frequency of the receiving host xen.bug1026236.suse_vtsc_tolerance.patch- Update to Xen 4.12.0 RC5 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- jsc#SLE-3059 - Disable Xen auto-ballooning - Add CONFIG_DOM0_MEM to the spec file for managing dom0 memory. xen.spec - Disable autoballooning in xl.con xl-conf-disable-autoballoon.patch- Update gcc9-ignore-warnings.patch to fix build in SLE12- bsc#1126325 - fix crash in libxl in error path Setup of grant_tables and other variables may fail libxl.prepare-environment-for-domcreate_stream_done.patch- bsc#1127620 - Documentation for the xl configuration file allows for firmware=pvgrub64 but we don't ship pvgrub64. Create a link from grub.xen to pvgrub64 xen.spec- Update to Xen 4.12.0 RC4 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2 - Tarball also contains additional post RC4 security fixes for Xen Security Advisories 287, 288, and 290 through 294.- Update to Xen 4.12.0 RC3 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- Update to Xen 4.12.0 RC2 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- bsc#1121391 - GCC 9: xen build fails gcc9-ignore-warnings.patch- bsc#1122563 - Virtualization/xen: Bug no Xen on boot, missing /proc/xen, after 4.11 -> 4.12 upgrade on X86_64/efi. Keep xen.efi in /usr/lib64/efi for booting older distros. xen.spec- fate#326960: Package grub2 as noarch. As part of the effort to have a unified bootloader across architectures, modify the xen.spec file to move the Xen efi files to /usr/share/efi/$(uname -m) from /usr/lib64/efi.- Update to Xen 4.12.0 RC1 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2 - Drop 5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch 5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch 5b8fae26-tools-libxl-correct-vcpu-affinity-output-with-sparse-physical-cpu-map.patch 5b8fae26-xen-fill-topology-info-for-all-present-cpus.patch 5b8fb5af-tools-xl-refuse-to-set-number-of-vcpus-to-0-via-xl-vcpu-set.patch 5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch 5b9784d2-x86-HVM-add-known_gla-helper.patch 5b9784f2-x86-HVM-split-page-straddling-accesses.patch 5bdc31d5-VMX-fix-vmx_handle_eoi.patch gcc8-fix-array-warning-on-i586.patch gcc8-fix-format-warning-on-i586.patch gcc8-inlining-failed.patch xen.bug1079730.patch- bsc#1121960 - xen: sync with Factory xen.spec xen.changes- Replace old $RPM_* shell vars. - Run fdupes for all architectures, and not crossing subvolume boundaries.- Do not run %fdupes on aarch64 to avoid the hardlink-across-partition rpmlint error- Require qemu-seabios only on x86* as it is not available on non-x86 systems- Avoid creating dangling symlinks (bsc#1116524) This reverts the revert of tmp_build.patch- Update to Xen 4.11.1 bug fix release (bsc#1027519) xen-4.11.1-testing-src.tar.bz2 - 5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch replaces xen.2b50cdbc444c637575580dcfa6c9525a84d5cc62.patch - 5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch replaces xen.b8f33431f3dd23fb43a879f4bdb4283fdc9465ad.patch - Drop the following patches contained in the new tarball 5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch 5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch 5b3cab8e-2-VMX-improve-MSR-load-save-API.patch 5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch 5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch 5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch 5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch 5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch 5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch 5b3f8fa5-port-array_index_nospec-from-Linux.patch 5b4321f6-x86-correctly-set-nonlazy_xstate_used-when-loading-full-state.patch 5b4488e7-x86-spec-ctrl-cmdline-handling.patch 5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch 5b4c9a60-allow-cpu_down-to-be-called-earlier.patch 5b4db308-SVM-fix-cleanup-svm_inject_event.patch 5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch 5b5040f2-x86-AMD-distinguish-CU-from-HT.patch 5b505fe5-VMX-fix-find-msr-build.patch 5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch 5b508775-2-x86-possibly-bring-up-all-CPUs.patch 5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch 5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch 5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch 5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch 5b56feb1-hvm-Disallow-unknown-MSR_EFER-bits.patch 5b56feb2-spec-ctrl-Fix-the-parsing-of-xpti--on-fixed-Intel-hardware.patch 5b62ca93-VMX-avoid-hitting-BUG_ON.patch 5b6d84ac-x86-fix-improve-vlapic-read-write.patch 5b6d8ce2-x86-XPTI-parsing.patch 5b72fbbe-ARM-disable-grant-table-v2.patch 5b72fbbe-oxenstored-eval-order.patch 5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch 5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch 5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch 5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch 5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch 5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch 5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch 5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch 5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch 5b72fbbf-x86-Make-spec-ctrl-no-a-global-disable-of-all-mitigations.patch 5b72fbbf-xl.conf-Add-global-affinity-masks.patch 5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch 5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch 5b75afef-x86-setup-avoid-OoB-E820-lookup.patch 5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch 5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch 5b8d5832-x86-assorted-array_index_nospec-insertions.patch 5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch 5bacae4b-x86-boot-allocate-extra-module-slot.patch 5bae44ce-x86-silence-false-log-messages.patch 5bb60c12-x86-split-opt_xpti.patch 5bb60c4f-x86-split-opt_pv_l1tf.patch 5bb60c74-x86-fix-xpti-and-pv-l1tf.patch 5bcf0722-x86-boot-enable-NMIs.patch 5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch 5bd076e9-x86-boot-init-debug-regs-correctly.patch 5bd076e9-x86-init-vcpu-debug-regs-correctly.patch 5bd0e0cf-vvmx-Disallow-the-use-of-VT-x-instructions-when-nested-virt-is-disabled.patch 5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch 5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch 5be2a308-x86-extend-get_platform_badpages.patch 5be2a354-x86-work-around-HLE-host-lockup-erratum.patch xsa275-1.patch xsa275-2.patch xsa276-1.patch xsa276-2.patch xsa277.patch xsa279.patch xsa280-1.patch xsa280-2.patch- bsc#1116524 - Package xen-tools-4.11.0_09-2.1.x86_64 broken: Missing /bin/domu-xenstore. This was broken because "make package build reproducible" change. (boo#1047218, boo#1062303) This fix reverses the change to this patch. tmp_build.patch- bsc#1115040 - VUL-0: CVE-2018-19961 CVE-2018-19962: xen: insufficient TLB flushing / improper large page mappings with AMD IOMMUs (XSA-275) xsa275-1.patch xsa275-2.patch - bsc#1115043 - VUL-0: CVE-2018-19963: xen: resource accounting issues in x86 IOREQ server handling (XSA-276) xsa276-1.patch xsa276-2.patch - bsc#1115044 - VUL-0: CVE-2018-19964: xen: x86: incorrect error handling for guest p2m page removals (XSA-277) xsa277.patch - bsc#1114405 - VUL-0: CVE-2018-18883: xen: Nested VT-x usable even when disabled (XSA-278) 5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch - bsc#1115045 - VUL-0: xen: CVE-2018-19965: x86: DoS from attempting to use INVPCID with a non-canonical addresses (XSA-279) xsa279.patch - bsc#1115047 - VUL-0: CVE-2018-19966: xen: Fix for XSA-240 conflicts with shadow paging (XSA-280) xsa280-1.patch xsa280-2.patch - bsc#1114988 - VUL-0: CVE-2018-19967: xen: guest use of HLE constructs may lock up host (XSA-282) 5be2a308-x86-extend-get_platform_badpages.patch 5be2a354-x86-work-around-HLE-host-lockup-erratum.patch - bsc#1108940 - L3: XEN SLE12-SP1 domU hang on SLE12-SP3 HV 5bdc31d5-VMX-fix-vmx_handle_eoi.patch - Upstream bug fixes (bsc#1027519) 5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch 5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch 5bacae4b-x86-boot-allocate-extra-module-slot.patch 5bae44ce-x86-silence-false-log-messages.patch 5bb60c12-x86-split-opt_xpti.patch 5bb60c4f-x86-split-opt_pv_l1tf.patch 5bb60c74-x86-fix-xpti-and-pv-l1tf.patch 5bcf0722-x86-boot-enable-NMIs.patch 5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch 5bd076e9-x86-boot-init-debug-regs-correctly.patch 5bd076e9-x86-init-vcpu-debug-regs-correctly.patch 5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch- bsc#1114405 - VUL-0: CVE-2018-18883: xen: Nested VT-x usable even when disabled (XSA-278) 5bd0e0cf-vvmx-Disallow-the-use-of-VT-x-instructions-when-nested-virt-is-disabled.patch- Use SMBIOS_REL_DATE instead of SMBIOS_DATE for reproducible binaries- make package build reproducible (boo#1047218, boo#1062303) * Set SMBIOS_REL_DATE * Update tmp_build.patch to use SHA instead of random build-id * Add reproducible.patch to use --no-insert-timestamp- Building with ncurses 6.1 will fail without xen.2b50cdbc444c637575580dcfa6c9525a84d5cc62.patch - Building libxl acpi support on aarch64 with gcc 8.2 will fail without xen.b8f33431f3dd23fb43a879f4bdb4283fdc9465ad.patch- bsc#1106263 - L3: The affinity reporting via 'xl vcpu-list' is apparently broken 5b8fae26-tools-libxl-correct-vcpu-affinity-output-with-sparse-physical-cpu-map.patch 5b8fae26-xen-fill-topology-info-for-all-present-cpus.patch 5b8fb5af-tools-xl-refuse-to-set-number-of-vcpus-to-0-via-xl-vcpu-set.patch- bsc#1094508 - L3: Kernel oops in fs/dcache.c called by d_materialise_unique() 5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch 5b9784d2-x86-HVM-add-known_gla-helper.patch 5b9784f2-x86-HVM-split-page-straddling-accesses.patch - bsc#1103279 - (CVE-2018-15470) VUL-0: CVE-2018-15470: xen: oxenstored does not apply quota-maxentity (XSA-272) 5b72fbbe-oxenstored-eval-order.patch - bsc#1103275 - (CVE-2018-15469) VUL-0: CVE-2018-15469: xen: Use of v2 grant tables may cause crash on ARM (XSA-268) 5b72fbbe-ARM-disable-grant-table-v2.patch - Upstream patches from Jan (bsc#1027519) 5b6d84ac-x86-fix-improve-vlapic-read-write.patch 5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch 5b75afef-x86-setup-avoid-OoB-E820-lookup.patch 5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch 5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch 5b8d5832-x86-assorted-array_index_nospec-insertions.patch - Drop 5b741962-x86-write-to-correct-variable-in-parse_pv_l1tf.patch- bsc#1078292 - rpmbuild -ba SPECS/xen.spec with xen-4.9.1 failed xen.spec- bsc#1091107 - VUL-0: CVE-2018-3646: xen: L1 Terminal Fault -VMM (XSA-273) 5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch 5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch 5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch 5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch 5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch 5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch 5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch 5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch - bsc#1103276 - VUL-0: CVE-2018-15468: xen: x86: Incorrect MSR_DEBUGCTL handling lets guests enable BTS (XSA-269) 5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch - Upstream prereq patches for XSA-273 and other upstream fixes (bsc#1027519) 5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch 5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch 5b3cab8e-2-VMX-improve-MSR-load-save-API.patch 5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch 5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch 5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch 5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch 5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch 5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch 5b4321f6-x86-correctly-set-nonlazy_xstate_used-when-loading-full-state.patch 5b505fe5-VMX-fix-find-msr-build.patch 5b56feb1-hvm-Disallow-unknown-MSR_EFER-bits.patch 5b56feb2-spec-ctrl-Fix-the-parsing-of-xpti--on-fixed-Intel-hardware.patch 5b62ca93-VMX-avoid-hitting-BUG_ON.patch 5b6d8ce2-x86-XPTI-parsing.patch 5b72fbbf-x86-Make-spec-ctrl-no-a-global-disable-of-all-mitigations.patch 5b72fbbf-xl.conf-Add-global-affinity-masks.patch 5b741962-x86-write-to-correct-variable-in-parse_pv_l1tf.patch- Upstream patches from Jan (bsc#1027519) 5b3f8fa5-port-array_index_nospec-from-Linux.patch 5b4488e7-x86-spec-ctrl-cmdline-handling.patch 5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch 5b4c9a60-allow-cpu_down-to-be-called-earlier.patch 5b4db308-SVM-fix-cleanup-svm_inject_event.patch 5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch 5b5040f2-x86-AMD-distinguish-CU-from-HT.patch 5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch 5b508775-2-x86-possibly-bring-up-all-CPUs.patch 5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch 5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch 5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch 5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch gcc8-fix-format-warning-on-i586.patch gcc8-fix-array-warning-on-i586.patch - Drop xen.fuzz-_FORTIFY_SOURCE.patch gcc8-fix-warning-on-i586.patch- Update to Xen 4.11.0 FCS (fate#325202, fate#325123) xen-4.11.0-testing-src.tar.bz2 disable-building-pv-shim.patch - Dropped patches 5a33a12f-domctl-improve-locking-during-domain-destruction.patch 5a6703cb-x86-move-invocations-of-hvm_flush_guest_tlbs.patch 5a79d7ed-libxc-packed-initrd-dont-fail-domain-creation.patch 5a9985bd-x86-invpcid-support.patch 5ac72a48-gcc8.patch 5ac72a5f-gcc8.patch 5ac72a64-gcc8.patch 5ac72a69-gcc8.patch 5ac72a6e-gcc8.patch 5ac72a74-gcc8.patch 5ac72a7b-gcc8.patch 5ad4923e-x86-correct-S3-resume-ordering.patch 5ad49293-x86-suppress-BTI-mitigations-around-S3.patch 5ad600d4-x86-pv-introduce-x86emul_read_dr.patch 5ad600d4-x86-pv-introduce-x86emul_write_dr.patch 5ad8c3a7-x86-spec_ctrl-update-retpoline-decision-making.patch 5adda097-x86-HPET-fix-race-triggering-ASSERT.patch 5adda0d5-x86-HVM-never-retain-emulated-insn-cache.patch 5adde9ed-xpti-fix-double-fault-handling.patch 5ae06fad-SVM-fix-intercepts-for-SYS-CALL-ENTER-MSRs.patch 5ae31917-x86-cpuidle-init-stats-lock-once.patch 5aeaeae4-introduce-vcpu_sleep_nosync_locked.patch 5aeaeaf0-sched-fix-races-in-vcpu-migration.patch 5aeb2c57-x86-retval-checks-of-set-guest-trapbounce.patch 5aec7393-1-x86-xpti-avoid-copy.patch 5aec7393-2-x86-xpti-write-cr3.patch 5aec744a-3-x86-xpti-per-domain-flag.patch 5aec744a-4-x86-xpti-use-invpcid.patch 5aec744a-5-x86-xpti-no-global-pages.patch 5aec744a-6-x86-xpti-cr3-valid-flag.patch 5aec744a-7-x86-xpti-pv_guest_cr4_to_real_cr4.patch 5aec744b-8-x86-xpti-cr3-helpers.patch 5aec74a8-9-x86-xpti-use-pcid.patch 5af1daa9-1-x86-traps-fix-dr6-handing-in-DB-handler.patch 5af1daa9-2-x86-pv-move-exception-injection-into-test_all_events.patch 5af1daa9-3-x86-traps-use-IST-for-DB.patch 5af1daa9-4-x86-traps-fix-handling-of-DB-in-hypervisor-context.patch 5af1daa9-x86-HVM-guard-against-bogus-emulator-ioreq-state.patch 5af1daa9-x86-vpt-support-IO-APIC-routed-intr.patch 5af97999-viridian-cpuid-leaf-40000003.patch 5afc13ae-1-x86-read-MSR_ARCH_CAPABILITIES-once.patch 5afc13ae-2-x86-express-Xen-SPEC_CTRL-choice-as-variable.patch 5afc13ae-3-x86-merge-bti_ist_info-use_shadow_spec_ctrl.patch 5afc13ae-4-x86-fold-XEN_IBRS-ALTERNATIVES.patch 5afc13ae-5-x86-rename-bits-of-spec_ctrl-infrastructure.patch 5afc13ae-6-x86-elide-MSR_SPEC_CTRL-handling-in-idle.patch 5afc13ae-7-x86-split-X86_FEATURE_SC_MSR.patch 5afc13ae-8-x86-explicitly-set-Xen-default-SPEC_CTRL.patch 5afc13ae-9-x86-cpuid-improve-guest-policies-for-speculative.patch 5afc13ae-A-x86-introduce-spec-ctrl-cmdline-opt.patch 5b02c786-x86-AMD-mitigations-for-GPZ-SP4.patch 5b02c786-x86-Intel-mitigations-for-GPZ-SP4.patch 5b02c786-x86-msr-virtualise-SPEC_CTRL-SSBD.patch 5b0bc9da-x86-XPTI-fix-S3-resume.patch 5b0d2286-libxc-x86-PV-dont-hand-through-CPUID-leaf-0x80000008.patch 5b0d2d91-x86-suppress-sync-when-XPTI-off.patch 5b0d2dbc-x86-correct-default_xen_spec_ctrl.patch 5b0d2ddc-x86-CPUID-dont-override-tool-stack-hidden-STIBP.patch 5b150ef9-x86-fix-error-handling-of-pv-dr7-shadow.patch 5b21825d-1-x86-support-fully-eager-FPU-context-switching.patch 5b21825d-2-x86-spec-ctrl-mitigations-for-LazyFPU.patch 5b238b92-x86-HVM-account-for-fully-eager-FPU.patch 5b2b7172-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b31e004-x86-HVM-emul-attempts-FPU-set-fpu_initialised.patch 5b323e3c-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b34882d-x86-mm-dont-bypass-preemption-checks.patch 5b348874-x86-refine-checks-in-DB-handler.patch 5b348897-libxl-qemu_disk_scsi_drive_string-break-out-common.patch 5b3488a2-libxl-restore-passing-ro-to-qemu-for-SCSI-disks.patch 5b34891a-x86-HVM-dont-cause-NM-to-be-raised.patch 5b348954-x86-guard-against-NM.patch libxl.Add-a-version-check-of-QEMU-for-QMP-commands.patch libxl.LIBXL_DESTROY_TIMEOUT.patch libxl.qmp-Tell-QEMU-about-live-migration-or-snapshot.patch xen_fix_build_with_acpica_20180427_and_new_packages.patch- Submit upstream patch libacpi: fixes for iasl >= 20180427 git commit 858dbaaeda33b05c1ac80aea0ba9a03924e09005 xen_fix_build_with_acpica_20180427_and_new_packages.patch This is needed for acpica package to get updated in our build service- Upstream patches from Jan (bsc#1027519) 5b02c786-x86-AMD-mitigations-for-GPZ-SP4.patch (Replaces Spectre-v4-1.patch) 5b02c786-x86-Intel-mitigations-for-GPZ-SP4.patch (Replaces Spectre-v4-2.patch) 5b02c786-x86-msr-virtualise-SPEC_CTRL-SSBD.patch (Replaces Spectre-v4-3.patch) 5b0bc9da-x86-XPTI-fix-S3-resume.patch 5b0d2286-libxc-x86-PV-dont-hand-through-CPUID-leaf-0x80000008.patch 5b0d2d91-x86-suppress-sync-when-XPTI-off.patch 5b0d2dbc-x86-correct-default_xen_spec_ctrl.patch 5b0d2ddc-x86-CPUID-dont-override-tool-stack-hidden-STIBP.patch 5b150ef9-x86-fix-error-handling-of-pv-dr7-shadow.patch 5b21825d-1-x86-support-fully-eager-FPU-context-switching.patch (Replaces xsa267-1.patch) 5b21825d-2-x86-spec-ctrl-mitigations-for-LazyFPU.patch (Replaces xsa267-2.patch) 5b238b92-x86-HVM-account-for-fully-eager-FPU.patch 5b2b7172-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b31e004-x86-HVM-emul-attempts-FPU-set-fpu_initialised.patch 5b323e3c-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b34882d-x86-mm-dont-bypass-preemption-checks.patch (Replaces xsa264.patch) 5b348874-x86-refine-checks-in-DB-handler.patch (Replaces xsa265.patch) 5b348897-libxl-qemu_disk_scsi_drive_string-break-out-common.patch (Replaces xsa266-1-<>.patch) 5b3488a2-libxl-restore-passing-ro-to-qemu-for-SCSI-disks.patch (Replaces xsa266-2-<>.patch) 5b34891a-x86-HVM-dont-cause-NM-to-be-raised.patch 5b348954-x86-guard-against-NM.patch- Fix more build gcc8 related failures with xen.fuzz-_FORTIFY_SOURCE.patch- bsc#1098403 - fix regression introduced by changes for bsc#1079730 a PV domU without qcow2 and/or vfb has no qemu attached. Ignore QMP errors for PV domUs to handle PV domUs with and without an attached qemu-xen. xen.bug1079730.patch- bsc#1097521 - VUL-0: CVE-2018-12891: xen: preemption checks bypassed in x86 PV MM handling (XSA-264) xsa264.patch - bsc#1097522 - VUL-0: CVE-2018-12893: xen: x86: #DB exception safety check can be triggered by a guest (XSA-265) xsa265.patch - bsc#1097523 - VUL-0: CVE-2018-12892: xen: libxl fails to honour readonly flag on HVM emulated SCSI disks (XSA-266) xsa266-1-libxl-qemu_disk_scsi_drive_string-Break-out-common-p.patch xsa266-2-libxl-restore-passing-readonly-to-qemu-for-SCSI-disk.patch- bsc#1095242 - VUL-0: CVE-2018-3665: xen: Lazy FP Save/Restore (XSA-267) xsa267-1.patch xsa267-2.patch- bsc#1092543 - GCC 8: xen build fails gcc8-fix-warning-on-i586.patch- bsc#1092631 - VUL-0: CVE-2018-3639: xen: V4 – Speculative Store Bypass aka "Memory Disambiguation" (XSA-263) 5ad4923e-x86-correct-S3-resume-ordering.patch 5ad49293-x86-suppress-BTI-mitigations-around-S3.patch 5afc13ae-1-x86-read-MSR_ARCH_CAPABILITIES-once.patch 5afc13ae-2-x86-express-Xen-SPEC_CTRL-choice-as-variable.patch 5afc13ae-3-x86-merge-bti_ist_info-use_shadow_spec_ctrl.patch 5afc13ae-4-x86-fold-XEN_IBRS-ALTERNATIVES.patch 5afc13ae-5-x86-rename-bits-of-spec_ctrl-infrastructure.patch 5afc13ae-6-x86-elide-MSR_SPEC_CTRL-handling-in-idle.patch 5afc13ae-7-x86-split-X86_FEATURE_SC_MSR.patch 5afc13ae-8-x86-explicitly-set-Xen-default-SPEC_CTRL.patch 5afc13ae-9-x86-cpuid-improve-guest-policies-for-speculative.patch 5afc13ae-A-x86-introduce-spec-ctrl-cmdline-opt.patch Spectre-v4-1.patch Spectre-v4-2.patch Spectre-v4-3.patch- Always call qemus xen-save-devices-state in suspend/resume to fix migration with qcow2 images (bsc#1079730) libxl.Add-a-version-check-of-QEMU-for-QMP-commands.patch libxl.qmp-Tell-QEMU-about-live-migration-or-snapshot.patch xen.bug1079730.patch- bsc#1087289 - L3: Xen BUG at sched_credit.c:1663 5aeaeae4-introduce-vcpu_sleep_nosync_locked.patch 5aeaeaf0-sched-fix-races-in-vcpu-migration.patch - Upstream patches from Jan (bsc#1027519) 5ad600d4-x86-pv-introduce-x86emul_read_dr.patch 5ad600d4-x86-pv-introduce-x86emul_write_dr.patch 5ad8c3a7-x86-spec_ctrl-update-retpoline-decision-making.patch 5adda097-x86-HPET-fix-race-triggering-ASSERT.patch 5adda0d5-x86-HVM-never-retain-emulated-insn-cache.patch 5ae06fad-SVM-fix-intercepts-for-SYS-CALL-ENTER-MSRs.patch 5ae31917-x86-cpuidle-init-stats-lock-once.patch 5aeb2c57-x86-retval-checks-of-set-guest-trapbounce.patch 5af1daa9-1-x86-traps-fix-dr6-handing-in-DB-handler.patch (Replaces xsa260-1.patch) 5af1daa9-2-x86-pv-move-exception-injection-into-test_all_events.patch (Replaces xsa260-2.patch) 5af1daa9-3-x86-traps-use-IST-for-DB.patch (Replaces xsa260-3.patch) 5af1daa9-4-x86-traps-fix-handling-of-DB-in-hypervisor-context.patch (Replaces xsa260-4.patch) 5af1daa9-x86-HVM-guard-against-bogus-emulator-ioreq-state.patch (Replaces xsa262.patch) 5af1daa9-x86-vpt-support-IO-APIC-routed-intr.patch (Replaces xsa261.patch) 5af97999-viridian-cpuid-leaf-40000003.patch- Fixes related to Page Table Isolation (XPTI). bsc#1074562 XSA-254 5a6703cb-x86-move-invocations-of-hvm_flush_guest_tlbs.patch 5a9985bd-x86-invpcid-support.patch 5adde9ed-xpti-fix-double-fault-handling.patch 5aec7393-1-x86-xpti-avoid-copy.patch 5aec7393-2-x86-xpti-write-cr3.patch 5aec744a-3-x86-xpti-per-domain-flag.patch 5aec744a-4-x86-xpti-use-invpcid.patch 5aec744a-5-x86-xpti-no-global-pages.patch 5aec744a-6-x86-xpti-cr3-valid-flag.patch 5aec744a-7-x86-xpti-pv_guest_cr4_to_real_cr4.patch 5aec744b-8-x86-xpti-cr3-helpers.patch 5aec74a8-9-x86-xpti-use-pcid.patch- bsc#1092543 - GCC 8: xen build fails 5ac72a48-gcc8.patch 5ac72a5f-gcc8.patch 5ac72a64-gcc8.patch 5ac72a69-gcc8.patch 5ac72a6e-gcc8.patch 5ac72a74-gcc8.patch 5ac72a7b-gcc8.patch gcc8-inlining-failed.patch- Update to Xen 4.10.1 bug fix release (bsc#1027519) xen-4.10.1-testing-src.tar.bz2 disable-building-pv-shim.patch - Drop the following patches contained in the new tarball 5a21a77e-x86-pv-construct-d0v0s-GDT-properly.patch 5a2fda0d-x86-mb2-avoid-Xen-when-looking-for-module-crashkernel-pos.patch 5a2ffc1f-x86-mm-drop-bogus-paging-mode-assertion.patch 5a313972-x86-microcode-add-support-for-AMD-Fam17.patch 5a32bd79-x86-vmx-dont-use-hvm_inject_hw_exception-in-.patch 5a4caa5e-x86-IRQ-conditionally-preserve-access-perm.patch 5a4caa8c-x86-E820-don-t-overrun-array.patch 5a4e2bca-x86-free-msr_vcpu_policy-during-destruction.patch 5a4e2c2c-x86-upcall-inject-spurious-event-after-setting-vector.patch 5a4fd893-1-x86-break-out-alternative-asm-into-separate-header.patch 5a4fd893-2-x86-introduce-ALTERNATIVE_2-macros.patch 5a4fd893-3-x86-hvm-rename-update_guest_vendor-to-cpuid_policy_changed.patch 5a4fd893-4-x86-introduce-cpuid_policy_updated.patch 5a4fd893-5-x86-entry-remove-partial-cpu_user_regs.patch 5a4fd894-1-x86-rearrange-RESTORE_ALL-to-restore-in-stack-order.patch 5a4fd894-2-x86-hvm-use-SAVE_ALL-after-VMExit.patch 5a4fd894-3-x86-erase-guest-GPRs-on-entry-to-Xen.patch 5a4fd894-4-clarifications-to-wait-infrastructure.patch 5a534c78-x86-dont-use-incorrect-CPUID-values-for-topology.patch 5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4-updates.patch 5a5e2cff-x86-Meltdown-band-aid.patch 5a5e2d73-x86-Meltdown-band-aid-conditional.patch 5a5e3a4e-1-x86-support-compiling-with-indirect-branch-thunks.patch 5a5e3a4e-2-x86-support-indirect-thunks-from-asm.patch 5a5e3a4e-3-x86-report-speculative-mitigation-details.patch 5a5e3a4e-4-x86-AMD-set-lfence-as-Dispatch-Serialising.patch 5a5e3a4e-5-x86-introduce-alternative-indirect-thunks.patch 5a5e3a4e-6-x86-definitions-for-Indirect-Branch-Controls.patch 5a5e3a4e-7-x86-cmdline-opt-to-disable-IBRS-IBPB-STIBP.patch 5a5e459c-1-x86-SVM-offer-CPUID-faulting-to-AMD-HVM-guests.patch 5a5e459c-2-x86-report-domain-id-on-CPUID.patch 5a68bc16-x86-acpi-process-softirqs-logging-Cx.patch 5a69c0b9-x86-fix-GET_STACK_END.patch 5a6b36cd-1-x86-cpuid-handling-of-IBRS-IBPB-STIBP-and-IBRS-for-guests.patch 5a6b36cd-2-x86-msr-emulation-of-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-3-x86-migrate-MSR_SPEC_CTRL.patch 5a6b36cd-4-x86-hvm-permit-direct-access-to-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-5-x86-use-SPEC_CTRL-on-entry.patch 5a6b36cd-6-x86-clobber-RSB-RAS-on-entry.patch 5a6b36cd-7-x86-no-alternatives-in-NMI-MC-paths.patch 5a6b36cd-8-x86-boot-calculate-best-BTI-mitigation.patch 5a6b36cd-9-x86-issue-speculation-barrier.patch 5a6b36cd-A-x86-offer-Indirect-Branch-Controls-to-guests.patch 5a6b36cd-B-x86-clear-SPEC_CTRL-while-idle.patch 5a7b1bdd-x86-reduce-Meltdown-band-aid-IPI-overhead.patch 5a843807-x86-spec_ctrl-fix-bugs-in-SPEC_CTRL_ENTRY_FROM_INTR_IST.patch 5a856a2b-x86-emul-fix-64bit-decoding-of-segment-overrides.patch 5a856a2b-x86-use-32bit-xors-for-clearing-GPRs.patch 5a856a2b-x86-xpti-hide-almost-all-of-Xen-image-mappings.patch 5a8be788-x86-nmi-start-NMI-watchdog-on-CPU0-after-SMP.patch 5a95373b-x86-PV-avoid-leaking-other-guests-MSR_TSC_AUX.patch 5a95571f-memory-dont-implicitly-unpin-in-decrease-res.patch 5a95576c-gnttab-ARM-dont-corrupt-shared-GFN-array.patch 5a955800-gnttab-dont-free-status-pages-on-ver-change.patch 5a955854-x86-disallow-HVM-creation-without-LAPIC-emul.patch 5a956747-x86-HVM-dont-give-wrong-impression-of-WRMSR-success.patch 5a9eb7f1-x86-xpti-dont-map-stack-guard-pages.patch 5a9eb85c-x86-slightly-reduce-XPTI-overhead.patch 5a9eb890-x86-remove-CR-reads-from-exit-to-guest-path.patch 5aa2b6b9-cpufreq-ondemand-CPU-offlining-race.patch 5aaa9878-x86-vlapic-clear-TMR-bit-for-edge-triggered-intr.patch xsa258.patch xsa259.patch- bsc#1090820 - VUL-0: CVE-2018-8897: xen: x86: mishandling of debug exceptions (XSA-260) xsa260-1.patch xsa260-2.patch xsa260-3.patch xsa260-4.patch - bsc#1090822 - VUL-0: CVE-2018-10982: xen: x86 vHPET interrupt injection errors (XSA-261) xsa261.patch - bsc#1090823 - VUL-0: CVE-2018-10981: xen: qemu may drive Xen into unbounded loop (XSA-262) xsa262.patch- bsc#1089152 - VUL-0: CVE-2018-10472: xen: Information leak via crafted user-supplied CDROM (XSA-258) xsa258.patch - bsc#1089635 - VUL-0: CVE-2018-10471: xen: x86: PV guest may crash Xen with XPTI (XSA-259) xsa259.patch- Preserve xen-syms from xen-dbg.gz to allow processing vmcores with crash(1) (bsc#1087251)- Upstream patches from Jan (bsc#1027519) and fixes related to Page Table Isolation (XPTI). See also bsc#1074562 XSA-254 5a856a2b-x86-xpti-hide-almost-all-of-Xen-image-mappings.patch 5a9eb7f1-x86-xpti-dont-map-stack-guard-pages.patch 5a9eb85c-x86-slightly-reduce-XPTI-overhead.patch 5a9eb890-x86-remove-CR-reads-from-exit-to-guest-path.patch 5aa2b6b9-cpufreq-ondemand-CPU-offlining-race.patch 5aaa9878-x86-vlapic-clear-TMR-bit-for-edge-triggered-intr.patch- bsc#1072834 - Xen HVM: unchecked MSR access error: RDMSR from 0xc90 at rIP: 0xffffffff93061456 (native_read_msr+0x6/0x30) 5a956747-x86-HVM-dont-give-wrong-impression-of-WRMSR-success.patch - Upstream patches from Jan (bsc#1027519) 5a79d7ed-libxc-packed-initrd-dont-fail-domain-creation.patch 5a7b1bdd-x86-reduce-Meltdown-band-aid-IPI-overhead.patch 5a843807-x86-spec_ctrl-fix-bugs-in-SPEC_CTRL_ENTRY_FROM_INTR_IST.patch 5a856a2b-x86-emul-fix-64bit-decoding-of-segment-overrides.patch 5a856a2b-x86-use-32bit-xors-for-clearing-GPRs.patch 5a8be788-x86-nmi-start-NMI-watchdog-on-CPU0-after-SMP.patch 5a95373b-x86-PV-avoid-leaking-other-guests-MSR_TSC_AUX.patch 5a95571f-memory-dont-implicitly-unpin-in-decrease-res.patch (Replaces xsa252.patch) 5a95576c-gnttab-ARM-dont-corrupt-shared-GFN-array.patch (Replaces xsa255-1.patch) 5a955800-gnttab-dont-free-status-pages-on-ver-change.patch (Replaces xsa255-2.patch) 5a955854-x86-disallow-HVM-creation-without-LAPIC-emul.patch (Replaces xsa256.patch) - Drop xsa252.patch xsa255-1.patch xsa255-2.patch xsa256.patch- bsc#1080635 - VUL-0: CVE-2018-7540: xen: DoS via non-preemptable L3/L4 pagetable freeing (XSA-252) xsa252.patch - bsc#1080662 - VUL-0: CVE-2018-7541: xen: grant table v2 -> v1 transition may crash Xen (XSA-255) xsa255-1.patch xsa255-2.patch - bsc#1080634 - VUL-0: CVE-2018-7542: xen: x86 PVH guest without LAPIC may DoS the host (XSA-256) xsa256.patch- Remove stale systemd presets code for 13.2 and older- fate#324965 - add script, udev rule and systemd service to watch for vcpu online/offline events in a HVM domU They are triggered via xl vcpu-set domU N- Replace hardcoded xen with Name tag when refering to subpkgs- Make sure tools and tools-domU require libs from the very same build- tools-domU: Add support for qemu guest agent. New files 80-xen-channel-setup.rules and xen-channel-setup.sh configure a xen-pv-channel for use by the guest agent FATE#324963- Remove outdated /etc/xen/README*- bsc#1073961 - VUL-0: CVE-2018-5244: xen: x86: memory leak with MSR emulation (XSA-253) 5a4e2bca-x86-free-msr_vcpu_policy-during-destruction.patch - bsc#1074562 - VUL-0: CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 xen: Information leak via side effects of speculative execution (XSA-254). Includes Spectre v2 mitigation. 5a4caa5e-x86-IRQ-conditionally-preserve-access-perm.patch 5a4caa8c-x86-E820-don-t-overrun-array.patch 5a4e2c2c-x86-upcall-inject-spurious-event-after-setting-vector.patch 5a4fd893-1-x86-break-out-alternative-asm-into-separate-header.patch 5a4fd893-2-x86-introduce-ALTERNATIVE_2-macros.patch 5a4fd893-3-x86-hvm-rename-update_guest_vendor-to-cpuid_policy_changed.patch 5a4fd893-4-x86-introduce-cpuid_policy_updated.patch 5a4fd893-5-x86-entry-remove-partial-cpu_user_regs.patch 5a4fd894-1-x86-rearrange-RESTORE_ALL-to-restore-in-stack-order.patch 5a4fd894-2-x86-hvm-use-SAVE_ALL-after-VMExit.patch 5a4fd894-3-x86-erase-guest-GPRs-on-entry-to-Xen.patch 5a4fd894-4-clarifications-to-wait-infrastructure.patch 5a534c78-x86-dont-use-incorrect-CPUID-values-for-topology.patch 5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4-updates.patch 5a5e2cff-x86-Meltdown-band-aid.patch 5a5e2d73-x86-Meltdown-band-aid-conditional.patch 5a5e3a4e-1-x86-support-compiling-with-indirect-branch-thunks.patch 5a5e3a4e-2-x86-support-indirect-thunks-from-asm.patch 5a5e3a4e-3-x86-report-speculative-mitigation-details.patch 5a5e3a4e-4-x86-AMD-set-lfence-as-Dispatch-Serialising.patch 5a5e3a4e-5-x86-introduce-alternative-indirect-thunks.patch 5a5e3a4e-6-x86-definitions-for-Indirect-Branch-Controls.patch 5a5e3a4e-7-x86-cmdline-opt-to-disable-IBRS-IBPB-STIBP.patch 5a5e459c-1-x86-SVM-offer-CPUID-faulting-to-AMD-HVM-guests.patch 5a5e459c-2-x86-report-domain-id-on-CPUID.patch 5a68bc16-x86-acpi-process-softirqs-logging-Cx.patch 5a69c0b9-x86-fix-GET_STACK_END.patch 5a6b36cd-1-x86-cpuid-handling-of-IBRS-IBPB-STIBP-and-IBRS-for-guests.patch 5a6b36cd-2-x86-msr-emulation-of-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-3-x86-migrate-MSR_SPEC_CTRL.patch 5a6b36cd-4-x86-hvm-permit-direct-access-to-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-5-x86-use-SPEC_CTRL-on-entry.patch 5a6b36cd-6-x86-clobber-RSB-RAS-on-entry.patch 5a6b36cd-7-x86-no-alternatives-in-NMI-MC-paths.patch 5a6b36cd-8-x86-boot-calculate-best-BTI-mitigation.patch 5a6b36cd-9-x86-issue-speculation-barrier.patch 5a6b36cd-A-x86-offer-Indirect-Branch-Controls-to-guests.patch 5a6b36cd-B-x86-clear-SPEC_CTRL-while-idle.patch- Fix python3 deprecated atoi call (bsc#1067224) pygrub-python3-conversion.patch - Drop xenmon-python3-conversion.patch- bsc#1067317 - pass cache=writeback|unsafe|directsync to qemu, depending on the libxl disk settings libxl.add-option-to-disable-disk-cache-flushes-in-qdisk.patch- Remove libxl.LIBXL_DESTROY_TIMEOUT.debug.patch- bsc#1067224 - xen-tools have hard dependency on Python 2 build-python3-conversion.patch bin-python3-conversion.patch- bsc#1070165 - xen crashes after aborted localhost migration 5a2ffc1f-x86-mm-drop-bogus-paging-mode-assertion.patch - bsc#1035442 - L3: libxl: error: libxl.c:1676:devices_destroy_cb: libxl__devices_destroy failed 5a33a12f-domctl-improve-locking-during-domain-destruction.patch - Upstream patches from Jan (bsc#1027519) 5a21a77e-x86-pv-construct-d0v0s-GDT-properly.patch 5a2fda0d-x86-mb2-avoid-Xen-when-looking-for-module-crashkernel-pos.patch 5a313972-x86-microcode-add-support-for-AMD-Fam17.patch 5a32bd79-x86-vmx-dont-use-hvm_inject_hw_exception-in-.patch- Update to Xen 4.10.0 FCS (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Rebuild initrd if xen-tools-domU is updated- Update to Xen 4.10.0-rc8 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Increase the value of LIBXL_DESTROY_TIMEOUT from 10 to 100 seconds If many domUs shutdown in parallel the backends can not keep up Add some debug output to track how long backend shutdown takes (bsc#1035442) libxl.LIBXL_DESTROY_TIMEOUT.patch libxl.LIBXL_DESTROY_TIMEOUT.debug.patch- Adjust xenstore-run-in-studomain.patch to change the defaults in the code instead of changing the sysconfig template, to also cover the upgrade case- Update to Xen 4.10.0-rc6 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Since xen switched to Kconfig, building a debug hypervisor was done by default. Adjust make logic to build a non-debug hypervisor by default, and continue to provide one as xen-dbg.gz- fate#316614: set migration constraints from cmdline fix libxl.set-migration-constraints-from-cmdline.patch for xen-4.10- Document the suse-diskcache-disable-flush option in xl-disk-configuration(5) (bsc#879425,bsc#1067317)- Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468)- Update to Xen 4.10.0-rc5 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - fate#323663 - Run Xenstore in stubdomain xenstore-run-in-studomain.patch- bsc#1067224 - xen-tools have hard dependency on Python 2 pygrub-python3-conversion.patch xenmon-python3-conversion.patch migration-python3-conversion.patch xnloader.py xen2libvirt.py- Remove xendriverdomain.service (bsc#1065185) Driver domains must be configured manually with custom .service file- Update to Xen 4.10.0-rc3 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - Drop 59f31268-libxc-remove-stale-error-check-for-domain-size.patch- Adjust xen-dom0-modules.service to ignore errors (bsc#1065187)- fate#324052 Support migration of Xen HVM domains larger than 1TB 59f31268-libxc-remove-stale-error-check-for-domain-size.patch- Update to Xen 4.10.0-rc2 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Update to Xen 4.10.0-rc1 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - Drop patches included in new tarball 592fd5f0-stop_machine-fill-result-only-in-case-of-error.patch 596f257e-x86-fix-hvmemul_insn_fetch.patch 5982fd99-VT-d-don-t-panic-warn-on-iommu-no-igfx.patch 598c3630-VT-d-PI-disable-when-CPU-side-PI-is-off.patch 598c3706-cpufreq-only-stop-ondemand-governor-if-started.patch 5992f1e5-x86-grant-disallow-misaligned-PTEs.patch 5992f20d-gnttab-split-maptrack-lock-to-make-it-useful-again.patch 5992f233-gnttab-correct-pin-status-fixup-for-copy.patch 59958e76-gnttab-dont-use-possibly-unbounded-tail-calls.patch 59958ebf-gnttab-fix-transitive-grant-handling.patch 59958edd-gnttab-avoid-spurious-maptrack-handle-alloc-failures.patch 599da329-arm-mm-release-grant-lock-on-xatp1-error-paths.patch 59a01223-x86-check-for-alloc-errors-in-modify_xen_mappings.patch 59a0130c-x86-efi-dont-write-relocs-in-efi_arch_relocate_image-1st-pass.patch 59a9221f-VT-d-use-correct-BDF-for-VF-to-search-VT-d-unit.patch 59ae9177-x86-emul-fix-handling-of-unimplemented-Grp7-insns.patch 59aec335-x86emul-correct-VEX-W-handling-for-VPINSRD.patch 59aec375-x86emul-correct-VEX-L-handling-for-VCVTx2SI.patch 59afcea0-x86-introduce-and-use-setup_force_cpu_cap.patch 59b2a7f2-x86-HVM-correct-repeat-count-update-linear-phys.patch 59b7d664-mm-make-sure-node-is-less-than-MAX_NUMNODES.patch 59b7d69b-grant_table-fix-GNTTABOP_cache_flush-handling.patch 59b7d6c8-xenstore-dont-unlink-connection-object-twice.patch 59b7d6d9-gnttab-also-validate-PTE-perms-upon-destroy-replace.patch gcc7-arm.patch gcc7-mini-os.patch- bsc#1061084 - VUL-0: xen: page type reference leak on x86 (XSA-242) xsa242.patch - bsc#1061086 - VUL-0: xen: x86: Incorrect handling of self-linear shadow mappings with translated guests (XSA-243) xsa243.patch - bsc#1061087 - VUL-0: xen: x86: Incorrect handling of IST settings during CPU hotplug (XSA-244) xsa244.patch- bsc#1061077 - VUL-0: xen: DMOP map/unmap missing argument checks (XSA-238) xsa238.patch - bsc#1061080 - VUL-0: xen: hypervisor stack leak in x86 I/O intercept code (XSA-239) xsa239.patch - bsc#1061081 - VUL-0: xen: Unlimited recursion in linear pagetable de-typing (XSA-240) xsa240-1.patch xsa240-2.patch - bsc#1061082 - VUL-0: xen: Stale TLB entry due to page type release race (XSA-241) xsa241.patch- bsc#1061075 - VUL-0: xen: pin count / page reference race in grant table code (XSA-236) xsa236.patch - bsc#1061076 - VUL-0: xen: multiple MSI mapping issues on x86 (XSA-237) xsa237-1.patch xsa237-2.patch xsa237-3.patch xsa237-4.patch xsa237-5.patch- bsc#1056278 - VUL-0: xen: Missing NUMA node parameter verification (XSA-231) 59b7d664-mm-make-sure-node-is-less-than-MAX_NUMNODES.patch - bsc#1056280 - VUL-0: xen: Missing check for grant table (XSA-232) 59b7d69b-grant_table-fix-GNTTABOP_cache_flush-handling.patch - bsc#1056281 - VUL-0: xen: cxenstored: Race in domain cleanup (XSA-233) 59b7d6c8-xenstore-dont-unlink-connection-object-twice.patch - bsc#1056282 - VUL-0: xen: insufficient grant unmapping checks for x86 PV guests (XSA-234) 59b7d6d9-gnttab-also-validate-PTE-perms-upon-destroy-replace.patch - bsc#1055321 - VUL-0: xen: add-to-physmap error paths fail to release lock on ARM (XSA-235) 599da329-arm-mm-release-grant-lock-on-xatp1-error-paths.patch - Upstream patches from Jan (bsc#1027519) 59a01223-x86-check-for-alloc-errors-in-modify_xen_mappings.patch 59a0130c-x86-efi-dont-write-relocs-in-efi_arch_relocate_image-1st-pass.patch 59a9221f-VT-d-use-correct-BDF-for-VF-to-search-VT-d-unit.patch 59ae9177-x86-emul-fix-handling-of-unimplemented-Grp7-insns.patch 59aec335-x86emul-correct-VEX-W-handling-for-VPINSRD.patch 59aec375-x86emul-correct-VEX-L-handling-for-VCVTx2SI.patch 59afcea0-x86-introduce-and-use-setup_force_cpu_cap.patch 59b2a7f2-x86-HVM-correct-repeat-count-update-linear-phys.patch - Dropped gcc7-xen.patch- bsc#1057358 - Cannot Boot into SLES12.3 with Xen hypervisor when Secure Boot is Enabled xen.spec- bsc#1055695 - XEN: 11SP4 and 12SP3 HVM guests can not be restored update from v6 to v9 to cover more cases for ballooned domUs libxc.sr.superpage.patch- bsc#1026236 - remove suse_vtsc_tolerance= cmdline option for Xen drop the patch because it is not upstream acceptable remove xen.suse_vtsc_tolerance.patch- bsc#1055695 - XEN: 11SP4 and 12SP3 HVM guests can not be restored after the save using xl stack libxc.sr.superpage.patch- Unignore gcc-PIE the toolstack disables PIE for firmware builds as needed- Upstream patches from Jan (bsc#1027519) 592fd5f0-stop_machine-fill-result-only-in-case-of-error.patch 596f257e-x86-fix-hvmemul_insn_fetch.patch 5982fd99-VT-d-don-t-panic-warn-on-iommu-no-igfx.patch 598c3630-VT-d-PI-disable-when-CPU-side-PI-is-off.patch 598c3706-cpufreq-only-stop-ondemand-governor-if-started.patch 5992f1e5-x86-grant-disallow-misaligned-PTEs.patch (Replaces xsa227.patch) 5992f20d-gnttab-split-maptrack-lock-to-make-it-useful-again.patch (Replaces xsa228.patch) 5992f233-gnttab-correct-pin-status-fixup-for-copy.patch (Replaces xsa230.patch) 59958e76-gnttab-dont-use-possibly-unbounded-tail-calls.patch (Replaces xsa226-1.patch) 59958ebf-gnttab-fix-transitive-grant-handling.patch (Replaces xsa226-2.patch) 59958edd-gnttab-avoid-spurious-maptrack-handle-alloc-failures.patch- bsc#1044974 - xen-tools require python-pam xen.spec- Clean up spec file errors and a few warnings. (bsc#1027519) - Removed conditional 'with_systemd' and some old deprecated 'sles_version' checks. xen.spec- Remove use of brctl utiltiy from supportconfig plugin FATE#323639- Use upstream variant of mini-os __udivmoddi4 change gcc7-mini-os.patch- fate#323639 Move bridge-utils to legacy replace-obsolete-network-configuration-commands-in-s.patch- bsc#1052686 - VUL-0: xen: grant_table: possibly premature clearing of GTF_writing / GTF_reading (XSA-230) xsa230.patch- bsc#1035231 - migration of HVM domU does not use superpages on destination dom0 libxc.sr.superpage.patch- bsc#1051787 - VUL-0: CVE-2017-12135: xen: possibly unbounded recursion in grant table code (XSA-226) xsa226-1.patch xsa226-2.patch - bsc#1051788 - VUL-0: CVE-2017-12137: xen: x86: PV privilege escalation via map_grant_ref (XSA-227) xsa227.patch - bsc#1051789 - VUL-0: CVE-2017-12136: xen: grant_table: Race conditions with maptrack free list handling (XSA-228) xsa228.patch- Add a supportconfig plugin xen-supportconfig FATE#323661- bsc#1026236 - add suse_vtsc_tolerance= cmdline option for Xen To avoid emulation of TSC access from a domU after live migration add a global tolerance for the measured host kHz xen.suse_vtsc_tolerance.patch- fate#323662 Drop qemu-dm from xen-tools package The following tarball and patches have been removed qemu-xen-traditional-dir-remote.tar.bz2 VNC-Support-for-ExtendedKeyEvent-client-message.patch 0001-net-move-the-tap-buffer-into-TAPState.patch 0002-net-increase-tap-buffer-size.patch 0003-e1000-fix-access-4-bytes-beyond-buffer-end.patch 0004-e1000-secrc-support.patch 0005-e1000-multi-buffer-packet-support.patch 0006-e1000-clear-EOP-for-multi-buffer-descriptors.patch 0007-e1000-verify-we-have-buffers-upfront.patch 0008-e1000-check-buffer-availability.patch CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch CVE-2015-4037-qemut-smb-config-dir-name.patch CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch CVE-2016-7908-qemut-net-Infinite-loop-in-mcf_fec_do_tx.patch CVE-2016-7909-qemut-net-pcnet-infinite-loop-in-pcnet_rdra_addr.patch CVE-2016-8667-qemut-dma-rc4030-divide-by-zero-error-in-set_next_tick.patch CVE-2016-8669-qemut-char-divide-by-zero-error-in-serial_update_parameters.patch CVE-2016-8910-qemut-net-rtl8139-infinite-loop-while-transmit-in-Cplus-mode.patch CVE-2016-9921-qemut-display-cirrus_vga-divide-by-zero-in-cirrus_do_copy.patch CVE-2017-6505-qemut-usb-an-infinite-loop-issue-in-ohci_service_ed_list.patch CVE-2017-8309-qemut-audio-host-memory-leakage-via-capture-buffer.patch CVE-2017-9330-qemut-usb-ohci-infinite-loop-due-to-incorrect-return-value.patch blktap.patch cdrom-removable.patch xen-qemu-iscsi-fix.patch qemu-security-etch1.patch xen-disable-qemu-monitor.patch xen-hvm-default-bridge.patch qemu-ifup-set-mtu.patch ioemu-vnc-resize.patch capslock_enable.patch altgr_2.patch log-guest-console.patch bdrv_open2_fix_flags.patch bdrv_open2_flags_2.patch ioemu-7615-qcow2-fix-alloc_cluster_link_l2.patch qemu-dm-segfault.patch bdrv_default_rwflag.patch kernel-boot-hvm.patch ioemu-watchdog-support.patch ioemu-watchdog-linkage.patch ioemu-watchdog-ib700-timer.patch ioemu-hvm-pv-support.patch pvdrv_emulation_control.patch ioemu-disable-scsi.patch ioemu-disable-emulated-ide-if-pv.patch xenpaging.qemu.flush-cache.patch ioemu-devicemodel-include.patch - Cleanup spec file and remove unused KMP patches kmp_filelist supported_module.patch xen_pvonhvm.xen_emul_unplug.patch- bsc#1002573 - Optimize LVM functions in block-dmmd block-dmmd- Record initial Xen dmesg in /var/log/xen/xen-boot.log for supportconfig. Keep previous log in /var/log/xen/xen-boot.prev.log- Remove storytelling from description in xen.rpm- Update to Xen 4.9.0 FCS (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update block-dmmd script (bsc#1002573) block-dmmd- Update to Xen 4.9.0-rc8+ (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 gcc7-arm.patch - Drop gcc7-error-xenpmd.patch- Update to Xen 4.9.0-rc8 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1042160 - VUL-1: CVE-2017-9330: xen: usb: ohci: infinite loop due to incorrect return value CVE-2017-9330-qemut-usb-ohci-infinite-loop-due-to-incorrect-return-value.patch- bsc#1037243 - VUL-1: CVE-2017-8309: xen: audio: host memory leakage via capture buffer CVE-2017-8309-qemut-audio-host-memory-leakage-via-capture-buffer.patch- Update to Xen 4.9.0-rc7 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update to Xen 4.9.0-rc6 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1031343 - xen fails to build with GCC 7 gcc7-mini-os.patch gcc7-xen.patch- bsc#1031343 - xen fails to build with GCC 7 gcc7-error-xenpmd.patch- Update to Xen 4.9.0-rc5 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 - Drop xen-tools-pkgconfig-xenlight.patch- bsc#1037779 - xen breaks kexec-tools build xen-tools-pkgconfig-xenlight.patch- Update to Xen 4.9.0-rc4 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1036146 - sles12sp2 xen VM dumps core to wrong path xen.spec- Update to Xen 4.9.0-rc3 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 aarch64-maybe-uninitialized.patch- Update to Xen 4.9.0-rc2 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update to Xen 4.9.0-rc1 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 ioemu-devicemodel-include.patch - Dropped patches contained in new tarball xen-4.8.0-testing-src.tar.bz2 0001-xenstore-let-write_node-and-some-callers-return-errn.patch 0002-xenstore-undo-function-rename.patch 0003-xenstore-rework-of-transaction-handling.patch 584806ce-x86emul-correct-PUSHF-POPF.patch 584fc649-fix-determining-when-domain-creation-is-complete.patch 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch 58510cac-x86emul-MOVNTI-no-REP-prefixes.patch 58526ccc-x86emul-64bit-ignore-most-segment-bases-in-align-check.patch 5853ed37-VT-d-correct-dma_msi_set_affinity.patch 5853ee07-x86emul-CMPXCHG16B-aligned-operand.patch 58580060-x86-emul-correct-SYSCALL-eflags-handling.patch 585aa3c5-x86-force-EFLAGS-IF-on-upon-exit-to-PV.patch 585aa407-x86-HVM-NULL-check-before-using-VMFUNC-hook.patch 585bd5fe-x86-emul-correct-VMFUNC-return-value-handling.patch 586ba81c-x86-cpu-dont-update-this_cpu-for-guest-get_cpu_vendor.patch 587d04d6-x86-xstate-fix-array-overrun-with-LWP.patch 587de4a9-x86emul-VEX-B-ignored-in-compat-mode.patch 5882129d-x86emul-LOCK-check-adjustments.patch 58821300-x86-segment-attribute-handling.patch 58873c1f-x86emul-correct-FPU-stub-asm-constraints.patch 58873c80-x86-hvm-do-not-set-msr_tsc_adjust-on-.patch 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5887888f-credit2-never-consider-CPUs-outside-of-pool.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5888b1b3-x86-emulate-dont-assume-addr_size-32-implies-protmode.patch 5899cbd9-EPT-allow-wrcomb-MMIO-mappings-again.patch 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch 58a44771-IOMMU-always-call-teardown-callback.patch 58a48ccc-x86-fix-p2m_flush_table-for-non-nested.patch 58a59f4b-libxl-correct-xenstore-entry-for-empty-cdrom.patch 58a70d94-VMX-fix-VMCS-race-on-cswitch-paths.patch 58ac1f3f-VMX-dont-leak-host-syscall-MSRs.patch 58b5a2de-x86-correct-Xens-idea-of-its-memory-layout.patch 58b6fd42-credit2-always-mark-a-tickled-pCPU-as-tickled.patch 58b6fd42-credit2-dont-miss-accounting-during-credit-reset.patch 58cbf682-x86-EFI-avoid-overrunning-mb_modules.patch 58cf9200-x86-EFI-avoid-IOMMU-faults-on-tail-gap.patch 58cf9260-x86-EFI-avoid-Xen-when-looking-for-mod-kexec-pos.patch 58cf9277-x86-time-dont-use-vTSC-if-host-guest-freqs-match.patch 58d25ea2-xenstore-add-missing-checks-for-allocation-failure.patch 58d91365-sched-dont-call-wrong-hook-via-VCPU2OP.patch CVE-2017-2615-qemut-display-cirrus-oob-access-while-doing-bitblt-copy-backward-mode.patch CVE-2017-2620-xsa209-qemut-cirrus_bitblt_cputovideo-does-not-check-if-memory-region-safe.patch glibc-2.25-compatibility-fix.patch xs-09-add_change_node-params.patch xs-10-call-add_change_node.patch xs-11-tdb-record-header.patch xs-12-node-gen-count.patch xs-13-read-directory-part-support.patch xs-14-command-array.patch xs-15-command-return-val.patch xs-16-function-static.patch xs-17-arg-parsing.patch xs-18-default-buffer.patch xs-19-handle-alloc-failures.patch xs-20-tdb-version.patch xs-21-empty-tdb-database.patch xs-22-reopen_log-fix.patch xs-23-XS_DEBUG-rename.patch xs-24-xenstored_control.patch xs-25-control-enhance.patch xs-26-log-control.patch xs-27-memory-report.patch xs-28-remove-talloc-report.patch xs-29-define-off_t.patch xsa206-0001-xenstored-apply-a-write-transaction-rate-limit.patch xsa206-0002-xenstored-Log-when-the-write-transaction-rate-limit.patch- bsc#1022703 - Xen HVM guest with OVMF hangs with unattached CDRom 58a59f4b-libxl-correct-xenstore-entry-for-empty-cdrom.patch- bsc#1015348 - L3: libvirtd does not start during boot suse-xendomains-service.patch- bsc#1014136 - Partner-L3: kdump can't dump a kernel on SLES12-SP2 with Xen hypervisor. 58cf9260-x86-EFI-avoid-Xen-when-looking-for-mod-kexec-pos.patch - bsc#1026236 - L3: Paravirtualized vs. fully virtualized migration - latter one much faster 58cf9277-x86-time-dont-use-vTSC-if-host-guest-freqs-match.patch - Upstream patch from Jan 58cbf682-x86-EFI-avoid-overrunning-mb_modules.patch 58cf9200-x86-EFI-avoid-IOMMU-faults-on-tail-gap.patch 58d91365-sched-dont-call-wrong-hook-via-VCPU2OP.patch- bsc#1022555 - L3: Timeout in "execution of /etc/xen/scripts/block add" 58d25ea2-xenstore-add-missing-checks-for-allocation-failure.patch 0001-xenstore-let-write_node-and-some-callers-return-errn.patch 0002-xenstore-undo-function-rename.patch 0003-xenstore-rework-of-transaction-handling.patch - bsc#1030144 - VUL-0: xen: xenstore denial of service via repeated update (XSA-206) xsa206-0001-xenstored-apply-a-write-transaction-rate-limit.patch xsa206-0002-xenstored-Log-when-the-write-transaction-rate-limit.patch - bsc#1029827 - Forward port xenstored xs-09-add_change_node-params.patch xs-10-call-add_change_node.patch xs-11-tdb-record-header.patch xs-12-node-gen-count.patch xs-13-read-directory-part-support.patch xs-14-command-array.patch xs-15-command-return-val.patch xs-16-function-static.patch xs-17-arg-parsing.patch xs-18-default-buffer.patch xs-19-handle-alloc-failures.patch xs-20-tdb-version.patch xs-21-empty-tdb-database.patch xs-22-reopen_log-fix.patch xs-23-XS_DEBUG-rename.patch xs-24-xenstored_control.patch xs-25-control-enhance.patch xs-26-log-control.patch xs-27-memory-report.patch xs-28-remove-talloc-report.patch xs-29-define-off_t.patch- bsc#1029128 - fix make xen to really produce xen.efi with gcc48- bsc#1028235 - VUL-0: CVE-2017-6505: xen: qemu: usb: an infinite loop issue in ohci_service_ed_list CVE-2017-6505-qemut-usb-an-infinite-loop-issue-in-ohci_service_ed_list.patch - Upstream patches from Jan (bsc#1027519) 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5899cbd9-EPT-allow-wrcomb-MMIO-mappings-again.patch 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch 58a44771-IOMMU-always-call-teardown-callback.patch 58a48ccc-x86-fix-p2m_flush_table-for-non-nested.patch 58a70d94-VMX-fix-VMCS-race-on-cswitch-paths.patch 58ac1f3f-VMX-dont-leak-host-syscall-MSRs.patch 58b5a2de-x86-correct-Xens-idea-of-its-memory-layout.patch 58b6fd42-credit2-always-mark-a-tickled-pCPU-as-tickled.patch 58b6fd42-credit2-dont-miss-accounting-during-credit-reset.patch- bsc#1027654 - XEN fails to build against glibc 2.25 glibc-2.25-compatibility-fix.patch libxl.pvscsi.patch- fate#316613: Refresh and enable libxl.pvscsi.patch- bsc#1024834 - VUL-0: CVE-2017-2620: xen: cirrus_bitblt_cputovideo does not check if memory region is safe (XSA-209) CVE-2017-2620-xsa209-qemut-cirrus_bitblt_cputovideo-does-not-check-if-memory-region-safe.patch- bsc#1023948 - [pvusb][sles12sp3][openqa] Segmentation fault happened when adding usbctrl devices via xl 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch- Upstream patches from Jan (bsc#1027519) 587d04d6-x86-xstate-fix-array-overrun-with-LWP.patch 587de4a9-x86emul-VEX-B-ignored-in-compat-mode.patch 5882129d-x86emul-LOCK-check-adjustments.patch 58821300-x86-segment-attribute-handling.patch 58873c1f-x86emul-correct-FPU-stub-asm-constraints.patch 58873c80-x86-hvm-do-not-set-msr_tsc_adjust-on-.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5887888f-credit2-never-consider-CPUs-outside-of-pool.patch 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5888b1b3-x86-emulate-dont-assume-addr_size-32-implies-protmode.patch- bsc#1023004 - VUL-0: CVE-2017-2615: qemu: display: cirrus: oob access while doing bitblt copy backward mode CVE-2017-2615-qemut-display-cirrus-oob-access-while-doing-bitblt-copy-backward-mode.patch- fate#322313 and fate#322150 require the acpica package ported to aarch64 which Xen 4.8 needs to build. Temporarily disable aarch64 until these fates are complete. xen.spec- bsc#1021952 - Virutalization/xen: Bug xen-tools missing /usr/bin/domu-xenstore; guests fail to launch tmp_build.patch xen.spec- No systemd presets for 42.3+ and SLE12SP3+ (bsc#1012842)- bsc#1007224 - broken symlinks in /usr/share/doc/packages/xen/misc/ xen.spec- 585aa3c5-x86-force-EFLAGS-IF-on-upon-exit-to-PV.patch Replaces xsa202.patch (bsc#1014298) - 585aa407-x86-HVM-NULL-check-before-using-VMFUNC-hook.patch Replaces xsa203.patch (bsc#1014300) - 58580060-x86-emul-correct-SYSCALL-eflags-handling.patch Replaces xsa204.patch (bsc#1016340) - Upstream patches from Jan 58526ccc-x86emul-64bit-ignore-most-segment-bases-in-align-check.patch 5853ed37-VT-d-correct-dma_msi_set_affinity.patch 5853ee07-x86emul-CMPXCHG16B-aligned-operand.patch 585bd5fe-x86-emul-correct-VMFUNC-return-value-handling.patch 586ba81c-x86-cpu-dont-update-this_cpu-for-guest-get_cpu_vendor.patch- bsc#1015169 - VUL-0: CVE-2016-9921, CVE-2016-9922: xen: qemu: display: cirrus_vga: a divide by zero in cirrus_do_copy CVE-2016-9921-qemut-display-cirrus_vga-divide-by-zero-in-cirrus_do_copy.patch- bsc#1016340 - VUL-0: CVE-2016-10013: xen: x86: Mishandling of SYSCALL singlestep during emulation (XSA-204) xsa204.patch- bsc#1012651 - VUL-0: CVE-2016-9932: xen: x86 CMPXCHG8B emulation fails to ignore operand size override (XSA-200) 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch- bsc#1014298 - VUL-0: CVE-2016-10024: xen: x86 PV guests may be able to mask interrupts (XSA-202) xsa202.patch - bsc#1014300 - VUL-0: CVE-2016-10025: xen: x86: missing NULL pointer check in VMFUNC emulation (XSA-203) xsa203.patch - Upstream patches from Jan 584806ce-x86emul-correct-PUSHF-POPF.patch 584fc649-fix-determining-when-domain-creation-is-complete.patch 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch 58510cac-x86emul-MOVNTI-no-REP-prefixes.patch- Update to Xen 4.8 FCS xen-4.8.0-testing-src.tar.bz2 - Dropped xen-4.7.1-testing-src.tar.bz2 0001-libxc-Rework-extra-module-initialisation.patch 0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch 0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch 0004-firmware-makefile-install-BIOS-blob.patch 0005-libxl-Load-guest-BIOS-from-file.patch 0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch 0007-hvmloader-Grab-the-hvm_start_info-pointer.patch 0008-hvmloader-Locate-the-BIOS-blob.patch 0009-hvmloader-Check-modules-whereabouts-in-perform_tests.patch 0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch 0011-hvmloader-Load-OVMF-from-modules.patch 0012-hvmloader-Specific-bios_load-function-required.patch 0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch 0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch 57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch 576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 5769106e-x86-generate-assembler-equates-for-synthesized.patch 57a1e603-x86-time-adjust-local-system-time-initialization.patch 57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch 57a30261-x86-support-newer-Intel-CPU-models.patch 5810a9cc-x86-emul-Correct-decoding-of-SReg3-operands.patch 581b2c3b-x86-emul-reject-LGDT-LIDT-with-non-canonical-addresses.patch 581b647a-x86emul-L-S-G-I-DT-ignore-opsz-overrides-in-64-bit-mode.patch 58249392-x86-svm-dont-clobber-eax-edx-if-RDMSR-intercept-fails.patch 582c35d6-x86-vmx-correct-long-mode-check-in-vmx_cpuid_intercept.patch 582c35ee-x86-traps-dont-call-hvm_hypervisor_cpuid_leaf-for-PV.patch 58343dc2-x86-hvm-Fix-the-handling-of-non-present-segments.patch 58343df8-x86-HVM-dont-load-LDTR-with-VM86-mode-attrs-during-task-switch.patch 58343e24-x86-PV-writes-of-fs-and-gs-base-MSRs-require-canonical-addresses.patch 58343e9e-libelf-fix-stack-memory-leak-when-loading-32-bit-symbol-tables.patch 58343ec2-x86emul-fix-huge-bit-offset-handling.patch 58343f29-x86-emul-correct-the-IDT-entry-calculation-in-inject_swint.patch 58343f44-x86-svm-fix-injection-of-software-interrupts.patch 58343f79-pygrub-Properly-quote-results-when-returning-them-to-the-caller.patch CVE-2016-9381-xsa197-qemut.patch CVE-2016-9637-xsa199-qemut.patch- bsc#1011652 - VUL-0: xen: qemu ioport array overflow CVE-2016-9637-xsa199-qemut.patch- bsc#1009100 - VUL-0: CVE-2016-9386: XSA-191: xen: x86 null segments not always treated as unusable 58343dc2-x86-hvm-Fix-the-handling-of-non-present-segments.patch - bsc#1009103 - VUL-0: CVE-2016-9382: XSA-192: xen: x86 task switch to VM86 mode mis-handled 58343df8-x86-HVM-dont-load-LDTR-with-VM86-mode-attrs-during-task-switch.patch - bsc#1009104 - VUL-0: CVE-2016-9385: XSA-193: xen: x86 segment base write emulation lacking canonical address checks 58343e24-x86-PV-writes-of-fs-and-gs-base-MSRs-require-canonical-addresses.patch - bsc#1009105 - VUL-0: CVE-2016-9384: XSA-194: xen: guest 32-bit ELF symbol table load leaking host data 58343e9e-libelf-fix-stack-memory-leak-when-loading-32-bit-symbol-tables.patch - bsc#1009107 - VUL-0: CVE-2016-9383: XSA-195: xen: x86 64-bit bit test instruction emulation broken 58343ec2-x86emul-fix-huge-bit-offset-handling.patch - bsc#1009108 - VUL-0: CVE-2016-9377,CVE-2016-9378: XSA-196: xen: x86 software interrupt injection mis-handled 58343f29-x86-emul-correct-the-IDT-entry-calculation-in-inject_swint.patch 58343f44-x86-svm-fix-injection-of-software-interrupts.patch - bsc#1009109 - VUL-0: CVE-2016-9381: XSA-197: xen: qemu incautious about shared ring processing CVE-2016-9381-xsa197-qemut.patch - bsc#1009111 - VUL-0: CVE-2016-9379,CVE-2016-9380: XSA-198: xen: delimiter injection vulnerabilities in pygrub 58343f79-pygrub-Properly-quote-results-when-returning-them-to-the-caller.patch - Upstream patches from Jan 581b2c3b-x86-emul-reject-LGDT-LIDT-with-non-canonical-addresses.patch 581b647a-x86emul-L-S-G-I-DT-ignore-opsz-overrides-in-64-bit-mode.patch 58249392-x86-svm-dont-clobber-eax-edx-if-RDMSR-intercept-fails.patch 582c35d6-x86-vmx-correct-long-mode-check-in-vmx_cpuid_intercept.patch 582c35ee-x86-traps-dont-call-hvm_hypervisor_cpuid_leaf-for-PV.patch- Update to Xen Version 4.7.1 xen-4.7.1-testing-src.tar.bz2 - Dropped patches contained in new tarball xen-4.7.0-testing-src.tar.bz2 575e9ca0-nested-vmx-Validate-host-VMX-MSRs-before-accessing-them.patch 57640448-xen-sched-use-default-scheduler-upon-an-invalid-sched.patch 57973099-have-schedulers-revise-initial-placement.patch 579730e6-remove-buggy-initial-placement-algorithm.patch 57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch 57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch 57ac6316-don-t-restrict-DMA-heap-to-node-0.patch 57b71fc5-x86-EFI-don-t-apply-relocations-to-l-2-3-_bootmap.patch 57b7447b-dont-permit-guest-to-populate-PoD-pages-for-itself.patch 57c4412b-x86-HVM-add-guarding-logic-for-VMX-specific-code.patch 57c57f73-libxc-correct-max_pfn-calculation-for-saving-domain.patch 57c805bf-x86-levelling-restrict-non-architectural-OSXSAVE-handling.patch 57c805c1-x86-levelling-pass-vcpu-to-ctxt_switch_levelling.patch 57c805c3-x86-levelling-provide-architectural-OSXSAVE-handling.patch 57c82be2-x86-32on64-adjust-call-gate-emulation.patch 57c93e52-fix-error-in-libxl_device_usbdev_list.patch 57c96df3-credit1-fix-a-race-when-picking-initial-pCPU.patch 57c96e2c-x86-correct-PT_NOTE-file-position.patch 57cfed43-VMX-correct-feature-checks-for-MPX-and-XSAVES.patch 57d1563d-x86-32on64-don-t-allow-recursive-page-tables-from-L3.patch 57d15679-x86-emulate-Correct-boundary-interactions-of-emulated-insns.patch 57d1569a-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch 57d18642-hvm-fep-Allow-test-insns-crossing-1-0-boundary.patch 57d18642-x86-segment-Bounds-check-accesses-to-emulation-ctxt-seg_reg.patch 57d7ca5f-x86-domctl-fix-TOCTOU-race-in-XEN_DOMCTL_getvcpuextstate.patch 57d7ca64-x86-domctl-fix-migration-of-guests-not-using-xsave.patch 57da8883-credit1-fix-mask-to-be-used-for-tickling.patch 57da8883-credit2-properly-schedule-migration-of-running-vcpu.patch 57dfb1c5-x86-Intel-hide-CPUID-faulting-capability-from-guests.patch 57e93e1d-x86emul-correct-loading-of-ss.patch 57e93e4a-x86emul-don-t-allow-null-selector-for-LTR.patch 57e93e89-x86-AMD-apply-erratum-665-workaround.patch 57ee6cbc-credit1-return-time-remaining-to-limit-as-next-timeslice.patch 57f3a8ee-x86emul-honor-guest-CR0-TS-and-CR0-EM.patch 57fb6a91-x86-defer-not-present-segment-checks.patch 5800c51d-x86-hvm-Clobber-cs-L-when-LME-becomes-set.patch 5800caec-x86emul-fix-pushing-of-selector-registers.patch 5800cb06-x86-Viridian-don-t-depend-on-undefined-register-state.patch 580e29f9-x86-MISALIGNSSE-feature-depends-on-SSE.patch 57dfb2ff-x86-Intel-Broadwell-no-PKG_C8-10_RESIDENCY-MSRs.patch- bsc#1004981 - Xen RPM doesn't contain debug hypervisor for EFI systems xen.spec- bsc#1000106 - VUL-0: CVE-2016-7777: xen: CR0.TS and CR0.EM not always honored for x86 HVM guests (XSA-190) 57f3a8ee-x86emul-honor-guest-CR0-TS-and-CR0-EM.patch - bsc#996191 - [XEN][acpi]residency -n 88 -c will cause xen panic on broadwell-ep 57dfb2ff-x86-Intel-Broadwell-no-PKG_C8-10_RESIDENCY-MSRs.patch - Upstream patches from Jan 57d7ca5f-x86-domctl-fix-TOCTOU-race-in-XEN_DOMCTL_getvcpuextstate.patch 57d7ca64-x86-domctl-fix-migration-of-guests-not-using-xsave.patch 57da8883-credit1-fix-mask-to-be-used-for-tickling.patch 57da8883-credit2-properly-schedule-migration-of-running-vcpu.patch 57dfb1c5-x86-Intel-hide-CPUID-faulting-capability-from-guests.patch 57e93e1d-x86emul-correct-loading-of-ss.patch 57e93e4a-x86emul-don-t-allow-null-selector-for-LTR.patch 57e93e89-x86-AMD-apply-erratum-665-workaround.patch 57ee6cbc-credit1-return-time-remaining-to-limit-as-next-timeslice.patch 57fb6a91-x86-defer-not-present-segment-checks.patch 5800c51d-x86-hvm-Clobber-cs-L-when-LME-becomes-set.patch 5800caec-x86emul-fix-pushing-of-selector-registers.patch 5800cb06-x86-Viridian-don-t-depend-on-undefined-register-state.patch 580e29f9-x86-MISALIGNSSE-feature-depends-on-SSE.patch 5810a9cc-x86-emul-Correct-decoding-of-SReg3-operands.patch- bsc#1007941 - Xen tools limit the number of vcpus to 256 when the system has 384 xen-arch-kconfig-nr_cpus.patch- bsc#1007157 - VUL-0: CVE-2016-8910: xen: net: rtl8139: infinite loop while transmit in C+ mode CVE-2016-8910-qemut-net-rtl8139-infinite-loop-while-transmit-in-Cplus-mode.patch- bsc#1005004 - CVE-2016-8667: xen: dma: rc4030 divide by zero error in set_next_tick CVE-2016-8667-qemut-dma-rc4030-divide-by-zero-error-in-set_next_tick.patch - bsc#1005005 - VUL-0: CVE-2016-8669: xen: char: divide by zero error in serial_update_parameters CVE-2016-8669-qemut-char-divide-by-zero-error-in-serial_update_parameters.patch- bsc#1003030 - VUL-0: CVE-2016-7908: xen: net: Infinite loop in mcf_fec_do_tx CVE-2016-7908-qemut-net-Infinite-loop-in-mcf_fec_do_tx.patch - bsc#1003032 - VUL-0: CVE-2016-7909: xen: net: pcnet: infinite loop in pcnet_rdra_addr CVE-2016-7909-qemut-net-pcnet-infinite-loop-in-pcnet_rdra_addr.patch- bsc#995785 - VUL-0: CVE-2016-7092: xen: x86: Disallow L3 recursive pagetable for 32-bit PV guests (XSA-185) 57d1563d-x86-32on64-don-t-allow-recursive-page-tables-from-L3.patch - bsc#995789 - VUL-0: CVE-2016-7093: xen: x86: Mishandling of instruction pointer truncation during emulation (XSA-186) 57d15679-x86-emulate-Correct-boundary-interactions-of-emulated-insns.patch 57d18642-hvm-fep-Allow-test-insns-crossing-1-0-boundary.patch - bsc#995792 - VUL-0: CVE-2016-7094: xen: x86 HVM: Overflow of sh_ctxt->seg_reg[] (XSA-187) 57d1569a-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch 57d18642-x86-segment-Bounds-check-accesses-to-emulation-ctxt-seg_reg.patch - bsc#991934 - xen hypervisor crash in csched_acct 57c96df3-credit1-fix-a-race-when-picking-initial-pCPU.patch - Upstream patches from Jan 57c4412b-x86-HVM-add-guarding-logic-for-VMX-specific-code.patch 57c57f73-libxc-correct-max_pfn-calculation-for-saving-domain.patch 57c805bf-x86-levelling-restrict-non-architectural-OSXSAVE-handling.patch 57c805c1-x86-levelling-pass-vcpu-to-ctxt_switch_levelling.patch 57c805c3-x86-levelling-provide-architectural-OSXSAVE-handling.patch 57c82be2-x86-32on64-adjust-call-gate-emulation.patch 57c96e2c-x86-correct-PT_NOTE-file-position.patch 57cfed43-VMX-correct-feature-checks-for-MPX-and-XSAVES.patch- bsc#979002 - add 60-persistent-xvd.rules and helper script also to initrd, add the relevant dracut helper- bnc#953518 - unplug also SCSI disks in qemu-xen-traditional for upstream unplug protocol- bsc#989679 - [pvusb feature] USB device not found when 'virsh detach-device guest usb.xml' 57c93e52-fix-error-in-libxl_device_usbdev_list.patch- bsc#992224 - [HPS Bug] During boot of Xen Hypervisor, Failed to get contiguous memory for DMA from Xen 57ac6316-don-t-restrict-DMA-heap-to-node-0.patch - bsc#978755 - xen uefi systems fail to boot - bsc#983697 - SLES12 SP2 Xen UEFI mode cannot boot 57b71fc5-x86-EFI-don-t-apply-relocations-to-l-2-3-_bootmap.patch - Upstream patch from Jan 57b7447b-dont-permit-guest-to-populate-PoD-pages-for-itself.patch- spec: to stay compatible with the in-tree qemu-xen binary, use /usr/bin/qemu-system-i386 instead of /usr/bin/qemu-system-x86_64 bsc#986164- bsc#970135 - new virtualization project clock test randomly fails on Xen 576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 5769106e-x86-generate-assembler-equates-for-synthesized.patch 57a1e603-x86-time-adjust-local-system-time-initialization.patch 57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch - bsc#991934 - xen hypervisor crash in csched_acct 57973099-have-schedulers-revise-initial-placement.patch 579730e6-remove-buggy-initial-placement-algorithm.patch - bsc#988675 - VUL-0: CVE-2016-6258: xen: x86: Privilege escalation in PV guests (XSA-182) 57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch - bsc#988676 - VUL-0: CVE-2016-6259: xen: x86: Missing SMAP whitelisting in 32-bit exception / event delivery (XSA-183) 57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch - Upstream patches from Jan 57a30261-x86-support-newer-Intel-CPU-models.patch- bsc#985503 - vif-route broken vif-route.patch- bsc#978413 - PV guest upgrade from sles11sp4 to sles12sp2 alpha3 failed on sles11sp4 xen host. pygrub-handle-one-line-menu-entries.patch- bsc#990843 - VUL-1: CVE-2016-6351: xen: qemu: scsi: esp: OOB write access in esp_do_dma CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch- bsc#900418 - Dump cannot be performed on SLES12 XEN 57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch - Upstream patches from Jan 575e9ca0-nested-vmx-Validate-host-VMX-MSRs-before-accessing-them.patch 57640448-xen-sched-use-default-scheduler-upon-an-invalid-sched.patch- fate#319989 - Update to Xen 4.7 FCS xen-4.7.0-testing-src.tar.bz2 - Drop CVE-2014-3672-qemut-xsa180.patch- bsc#954872 - script block-dmmd not working as expected - libxl: error: libxl_dm.c (Additional fixes) block-dmmd- Convert with_stubdom into build_conditional to allow adjusting via prjconf - Convert with_debug into build_conditional to allow adjusting via prjconf- bsc#979002 - add 60-persistent-xvd.rules and helper script to xen-tools-domU to simplify transition to pvops based kernels- Convert with_oxenstored into build_conditional to allow adjusting via prjconf (fate#320836)- bsc#983984 - VUL-0: CVE-2016-5338: xen: qemu: scsi: esp: OOB r/w access while processing ESP_FIFO CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch - bsc#982960 - VUL-0: CVE-2016-5238: xen: qemu: scsi: esp: OOB write when using non-DMA mode in get_cmd CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch- fate#319989 - Update to Xen 4.7 RC5 xen-4.7.0-testing-src.tar.bz2- fate#319989 - Update to Xen 4.7 RC4 xen-4.7.0-testing-src.tar.bz2 - Dropped xen.pkgconfig-4.7.patch xsa164.patch- bsc#981264 - VUL-0: CVE-2014-3672: xen: Unrestricted qemu logging (XSA-180) CVE-2014-3672-qemut-xsa180.patch- bsc#980724 - VUL-0: CVE-2016-4441: Qemu: scsi: esp: OOB write while writing to 's->cmdbuf' in get_cmd CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch - bsc#980716 - VUL-0: CVE-2016-4439: xen: scsi: esp: OOB write while writing to 's->cmdbuf' in esp_reg_write CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch- fate#319989 - Update to Xen 4.7 RC3 xen-4.7.0-testing-src.tar.bz2 - Dropped libxl-remove-cdrom-cachemode.patch x86-PoD-only-reclaim-if-needed.patch gcc6-warnings-as-errors.patch- bsc#954872 - script block-dmmd not working as expected - libxl: error: libxl_dm.c (another modification) block-dmmd- fate#319989 - Update to Xen 4.7 RC2 xen-4.7.0-testing-src.tar.bz2- bsc#961600 - L3: poor performance when Xen HVM domU configured with max memory > current memory x86-PoD-only-reclaim-if-needed.patch- Mark SONAMEs and pkgconfig as xen 4.7 xen.pkgconfig-4.7.patch- bsc#977329 - Xen: Cannot boot HVM guests with empty cdrom libxl-remove-cdrom-cachemode.patch- fate#319989 - Update to Xen 4.7 RC1 xen-4.7.0-testing-src.tar.bz2- fate#316614: set migration constraints from cmdline restore libxl.set-migration-constraints-from-cmdline.patch- Remove obsolete patch for xen-kmp magic_ioport_compat.patch- fate#316613: update to v12 libxl.pvscsi.patch- Update to the latest Xen 4.7 pre-release c2994f86 Drop libxl.migrate-legacy-stream-read.patch- bnc#972756 - Can't migrate HVM guest from SLES12SP1 Xen host to SLES12SP2 Alpha 1 host using xl migrate libxl.migrate-legacy-stream-read.patch- Add patches from proposed upstream series to load BIOS's from the toolstack instead of embedding in hvmloader http://lists.xenproject.org/archives/html/xen-devel/2016-03/msg01626.html 0001-libxc-Rework-extra-module-initialisation.patch, 0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch, 0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch, 0004-firmware-makefile-install-BIOS-blob.patch, 0005-libxl-Load-guest-BIOS-from-file.patch, 0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch, 0007-hvmloader-Grab-the-hvm_start_info-pointer.patch, 0008-hvmloader-Locate-the-BIOS-blob.patch, 0009-hvmloader-Check-modules-whereabouts-in-perform_tests.patch, 0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch, 0011-hvmloader-Load-OVMF-from-modules.patch, 0012-hvmloader-Specific-bios_load-function-required.patch, 0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch, 0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch - Enable support for UEFI on x86_64 using the ovmf-x86_64-ms.bin firmware from qemu-ovmf-x86_64. The firmware is preloaded with Microsoft keys to more closely resemble firmware on real hardware FATE#320490- fate#319989: Update to Xen 4.7 (pre-release) xen-4.7.0-testing-src.tar.bz2 - Dropped: xen-4.6.1-testing-src.tar.bz2 55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch 5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch hotplug-Linux-block-performance-fix.patch set-mtu-from-bridge-for-tap-interface.patch xendomains-libvirtd-conflict.patch xsa154.patch xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa170.patch- Use system SeaBIOS instead of building/installing another one FATE#320638 Dropped files: seabios-dir-remote.tar.bz2 xen-c99-fix.patch xen.build-compare.seabios.patch- spec: drop BuildRequires that were only needed for qemu-xen- bsc#969377 - xen does not build with GCC 6 ipxe-use-rpm-opt-flags.patch gcc6-warnings-as-errors.patch- bsc#969351 - VUL-0: CVE-2016-2841: xen: net: ne2000: infinite loop in ne2000_receive CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch - Drop xsa154-fix.patch- Use system qemu instead of building/installing yet another qemu FATE#320638 - Dropped files qemu-xen-dir-remote.tar.bz2 CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch CVE-2015-4037-qemuu-smb-config-dir-name.patch CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch qemu-xen-enable-spice-support.patch qemu-xen-upstream-qdisk-cache-unsafe.patch tigervnc-long-press.patch xsa162-qemuu.patch- bsc#962321 - VUL-0: CVE-2016-1922: xen: i386: null pointer dereference in vapic_write() CVE-2016-1922-qemuu-i386-null-pointer-dereference-in-vapic_write.patch- bsc#968004 - VUL-0: CVE-2016-2538: xen: usb: integer overflow in remote NDIS control message handling CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch- bsc#954872 - L3: script block-dmmd not working as expected - libxl: error: libxl_dm.c block-dmmd - Update libxl to recognize dmmd and npiv prefix in disk spec xen.libxl.dmmd.patch- bsc#967101 - VUL-0: CVE-2016-2391: xen: usb: multiple eof_timers in ohci module leads to null pointer dereference CVE-2016-2391-qemuu-usb-null-pointer-dereference-in-ohci-module.patch CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch - bsc#967090 - VUL-0: CVE-2016-2392: xen: usb: null pointer dereference in remote NDIS control message handling CVE-2016-2392-qemuu-usb-null-pointer-dereference-in-NDIS-message-handling.patch- Update to Xen Version 4.6.1 xen-4.6.1-testing-src.tar.bz2 - Dropped patches now contained in tarball or unnecessary xen-4.6.0-testing-src.tar.bz2 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 5632129c-free-domain-s-vcpu-array.patch 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 563212e4-xenoprof-free-domain-s-vcpu-array.patch 563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch 56549f24-x86-vPMU-document-as-unsupported.patch 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch xsa155-qemut-qdisk-double-access.patch xsa155-qemut-xenfb.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa159.patch xsa160.patch xsa162-qemut.patch xsa165.patch xsa166.patch xsa167.patch xsa168.patch- bsc#965315 - VUL-0: CVE-2016-2270: xen: x86: inconsistent cachability flags on guest mappings (XSA-154) xsa154.patch - bsc#965317 - VUL-0: CVE-2016-2271: xen: VMX: guest user mode may crash guest with non-canonical RIP (XSA-170) xsa170.patch- bsc#965269 - VUL-1: CVE-2015-8619: xen: stack based OOB write in hmp_sendkey routine CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch- bsc#965156 - VUL-0: CVE-2015-6855: xen: ide: divide by zero issue CVE-2015-6855-qemuu-ide-divide-by-zero-issue.patch - bsc#965112 - VUL-0: CVE-2014-3640: xen: slirp: NULL pointer deref in sosendto() CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch- bsc#964947 - VUL-0: CVE-2015-5278: xen: Infinite loop in ne2000_receive() function CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch - bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch- bsc#964644 - VUL-0: CVE-2013-4533: xen pxa2xx: buffer overrun on incoming migration CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch - bsc#964925 - VUL-0: CVE-2014-0222: xen: qcow1: validate L2 table size to avoid integer overflows CVE-2014-0222-blktap-qcow1-validate-l2-table-size.patch - Dropped CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch- bsc#964415 - VUL-1: CVE-2016-2198: xen: usb: ehci null pointer dereference in ehci_caps_write CVE-2016-2198-qemuu-usb-ehci-null-pointer-dereference-in-ehci_caps_write.patch - bsc#964452 - VUL-0: CVE-2013-4534: xen: openpic: buffer overrun on incoming migration CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch- bsc#963783 - VUL-1: CVE-2016-1981: xen: net: e1000 infinite loop in start_xmit and e1000_receive_iov routines CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch- bsc#962758 - VUL-0: CVE-2013-4539: xen: tsc210x: buffer overrun on invalid state load CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch- bsc#962632 - VUL-0: CVE-2015-1779: xen: vnc: insufficient resource limiting in VNC websockets decoder CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch - bsc#962642 - VUL-0: CVE-2013-4537: xen: ssi-sd: buffer overrun on invalid state load CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch - bsc#962627 - VUL-0: CVE-2014-7815: xen: vnc: insufficient bits_per_pixel from the client sanitization CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch- bsc#962335 - VUL-0: CVE-2013-4538: xen: ssd0323: fix buffer overun on invalid state CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch - bsc#962360 - VUL-0: CVE-2015-7512: xen: net: pcnet: buffer overflow in non-loopback mode CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch- bsc#961692 - VUL-0: CVE-2016-1714: xen: nvram: OOB r/w access in processing firmware configurations CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch- bsc#961358 - VUL-0: CVE-2015-8613: xen: qemu: scsi: stack based buffer overflow in megasas_ctrl_get_info CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch - bsc#961332 - VUL-0: CVE-2016-1568: xen: Qemu: ide: ahci use-after-free vulnerability in aio port commands CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch- bsc#959695 - missing docs for xen xen.spec- bsc#960862 - VUL-0: CVE-2016-1571: xen: VMX: intercept issue with INVLPG on non-canonical address (XSA-168) xsa168.patch - bsc#960861 - VUL-0: CVE-2016-1570: xen: PV superpage functionality missing sanity checks (XSA-167) xsa167.patch - bsc#960836 - VUL-0: CVE-2015-8744: xen: net: vmxnet3: incorrect l2 header validation leads to a crash via assert(2) call CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch- bsc#960707 - VUL-0: CVE-2015-8745: xen: reading IMR registers leads to a crash via assert(2) call CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch - bsc#960726 - VUL-0: CVE-2015-8743: xen: ne2000: OOB memory access in ioport r/w functions CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch- bsc#960093 - VUL-0: CVE-2015-8615: xen: x86: unintentional logging upon guest changing callback method (XSA-169) 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch- Adjust xen-dom0-modules.service to run Before xenstored.service instead of proc-xen.mount to workaround a bug in systemd "design" (bnc#959845)- bsc#959387 - VUL-0: CVE-2015-8568 CVE-2015-8567: xen: qemu: net: vmxnet3: host memory leakage CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch- bsc#957988 - VUL-0: CVE-2015-8550: xen: paravirtualized drivers incautious about shared memory contents (XSA-155) xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemut-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa155-qemut-xenfb.patch - bsc#959006 - VUL-0: CVE-2015-8558: xen: qemu: usb: infinite loop in ehci_advance_state results in DoS CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch - bsc#958918 - VUL-0: CVE-2015-7549: xen: qemu pci: null pointer dereference issue CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch - bsc#958493 - VUL-0: CVE-2015-8504: xen: qemu: ui: vnc: avoid floating point exception CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch - bsc#958007 - VUL-0: CVE-2015-8554: xen: qemu-dm buffer overrun in MSI-X handling (XSA-164) xsa164.patch - bsc#958009 - VUL-0: CVE-2015-8555: xen: information leak in legacy x86 FPU/XMM initialization (XSA-165) xsa165.patch - bsc#958523 - VUL-0: xen: ioreq handling possibly susceptible to multiple read issue (XSA-166) xsa166.patch- bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch - Upstream patches from Jan 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch) 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 56544a57-VMX-fix-adjust-trap-injection.patch 56546ab2-sched-fix-insert_vcpu-locking.patch- bsc#956592 - VUL-0: xen: virtual PMU is unsupported (XSA-163) 56549f24-x86-vPMU-document-as-unsupported.patch - bsc#956408 - VUL-0: CVE-2015-8339, CVE-2015-8340: xen: XENMEM_exchange error handling issues (XSA-159) xsa159.patch - bsc#956409 - VUL-0: CVE-2015-8341: xen: libxl leak of pv kernel and initrd on error (XSA-160) xsa160.patch - bsc#956411 - VUL-0: CVE-2015-7504: xen: heap buffer overflow vulnerability in pcnet emulator (XSA-162) xsa162-qemuu.patch xsa162-qemut.patch - bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142) 5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch- fate#315712: XEN: Use the PVOPS kernel Turn off building the KMPs now that we are using the pvops kernel xen.spec- Upstream patches from Jan 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 5632129c-free-domain-s-vcpu-array.patch (Replaces CVE-2015-7969-xsa149.patch) 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 563212e4-xenoprof-free-domain-s-vcpu-array.patch 563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch) 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch - Dropped 55b0a2db-x86-MSI-track-guest-masking.patch- Use upstream variants of block-iscsi and block-nbd- Remove xenalyze.hg, its part of xen-4.6- Update to Xen Version 4.6.0 xen-4.6.0-testing-src.tar.bz2 mini-os.tar.bz2 blktap2-no-uninit.patch stubdom-have-iovec.patch - Renamed xsa149.patch to CVE-2015-7969-xsa149.patch - Dropped patches now contained in tarball or unnecessary xen-4.5.2-testing-src.tar.bz2 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch 54f4985f-libxl-fix-libvirtd-double-free.patch 55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 551ac326-xentop-add-support-for-qdisk.patch 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch 5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 554cc211-libxl-add-qxl.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch 5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch 5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch 5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch 5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch 5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch 5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch 55b0a218-x86-PCI-CFG-write-intercept.patch 55b0a255-x86-MSI-X-maskall.patch 55b0a283-x86-MSI-X-teardown.patch 55b0a2ab-x86-MSI-X-enable.patch blktapctrl-close-fifos.patch blktapctrl-default-to-ioemu.patch blktapctrl-disable-debug-printf.patch blktap-no-uninit.patch blktap-pv-cdrom.patch build-tapdisk-ioemu.patch ioemu-bdrv-open-CACHE_WB.patch ioemu-blktap-barriers.patch ioemu-blktap-fv-init.patch ioemu-blktap-image-format.patch ioemu-blktap-zero-size.patch libxl.set-migration-constraints-from-cmdline.patch local_attach_support_for_phy.patch pci-attach-fix.patch qemu-xen-upstream-megasas-buildtime.patch tapdisk-ioemu-logfile.patch tapdisk-ioemu-shutdown-fix.patch udev-rules.patch xen.build-compare.ipxe.patch xen.build-compare.mini-os.patch xen.build-compare.smbiosdate.patch xen.build-compare.vgabios.patch xen.build-compare.xen_compile_h.patch xl-coredump-file-location.patch- bsc#954405 - VUL-0: CVE-2015-8104: Xen: guest to host DoS by triggering an infinite loop in microcode via #DB exception - bsc#954018 - VUL-0: CVE-2015-5307: xen: x86: CPU lockup during fault delivery (XSA-156) CVE-2015-5307-xsa156.patch- Update to Xen 4.5.2 xen-4.5.2-testing-src.tar.bz2 - Drop the following xen-4.5.1-testing-src.tar.bz2 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 559bdde5-pull-in-latest-linux-earlycpio.patch 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch 560bd926-credit1-fix-tickling-when-it-happens-from-a-remote-pCPU.patch 560e6d34-x86-p2m-pt-tighten-conditions-of-IOMMU-mapping-updates.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch CVE-2015-4106-xsa131-9.patch CVE-2015-3259-xsa137.patch CVE-2015-7311-xsa142.patch CVE-2015-7835-xsa148.patch xsa139-qemuu.patch xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch xsa151.patch xsa152.patch xsa153-libxl.patch CVE-2015-5154-qemuu-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemuu-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch"- bsc#950704 - CVE-2015-7970 VUL-1: xen: x86: Long latency populate-on-demand operation is not preemptible (XSA-150) 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch- Upstream patches from Jan 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch- bsc#951845 - VUL-0: CVE-2015-7972: xen: x86: populate-on-demand balloon size inaccuracy can crash guests (XSA-153) xsa153-libxl.patch- bsc#950703 - VUL-1: CVE-2015-7969: xen: leak of main per-domain vcpu pointer array (DoS) (XSA-149) xsa149.patch - bsc#950705 - VUL-1: CVE-2015-7969: xen: x86: leak of per-domain profiling-related vcpu pointer array (DoS) (XSA-151) xsa151.patch - bsc#950706 - VUL-0: CVE-2015-7971: xen: x86: some pmu and profiling hypercalls log without rate limiting (XSA-152) xsa152.patch - Dropped 55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch 5604f239-x86-PV-properly-populate-descriptor-tables.patch- bsc#932267 - VUL-1: CVE-2015-4037: qemu,kvm,xen: insecure temporary file use in /net/slirp.c CVE-2015-4037-qemuu-smb-config-dir-name.patch CVE-2015-4037-qemut-smb-config-dir-name.patch - bsc#877642 - VUL-0: CVE-2014-0222: qemu: qcow1: validate L2 table size to avoid integer overflows CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch- bsc#950367 - VUL-0: CVE-2015-7835: xen: x86: Uncontrolled creation of large page mappings by PV guests (XSA-148) CVE-2015-7835-xsa148.patch- bsc#949138 - Setting vcpu affinity under Xen causes libvirtd abort 54f4985f-libxl-fix-libvirtd-double-free.patch- bsc#949046 - Increase %suse_version in SP1 to 1316 xen.spec - Update README.SUSE detailing dom0 ballooning recommendations- bsc#945167 - Running command ’ xl pci-assignable-add 03:10.1’ secondly show errors 55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch - Upstream patches from Jan 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f239-x86-PV-properly-populate-descriptor-tables.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch 560bd926-credit1-fix-tickling-when-it-happens-from-a-remote-pCPU.patch 560e6d34-x86-p2m-pt-tighten-conditions-of-IOMMU-mapping-updates.patch- bsc#941074 - VmError: Device 51728 (vbd) could not be connected. Hotplug scripts not working. hotplug-Linux-block-performance-fix.patch- bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142) CVE-2015-7311-xsa142.patch- bsc#945165 - Xl pci-attach show error with kernel of SLES 12 sp1 pci-attach-fix.patch- bsc#945164 - Xl destroy show error with kernel of SLES 12 sp1 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch- Upstream patches from Jan 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch- bsc#944463 - VUL-0: CVE-2015-5239: qemu-kvm: Integer overflow in vnc_client_read() and protocol_client_msg() CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch - bsc#944697 - VUL-1: CVE-2015-6815: qemu: net: e1000: infinite loop issue CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch- bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch- bsc#907514 - Bus fatal error & sles12 sudden reboot has been observed - bsc#910258 - SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984 - Bus fatal error & sles11-SP4 sudden reboot has been observed - bsc#923967 - Partner-L3: Bus fatal error & sles11-SP3 sudden reboot has been observed 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 55b0a218-x86-PCI-CFG-write-intercept.patch 55b0a255-x86-MSI-X-maskall.patch 55b0a283-x86-MSI-X-teardown.patch 55b0a2ab-x86-MSI-X-enable.patch 55b0a2db-x86-MSI-track-guest-masking.patch - Upstream patches from Jan 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch - Dropped for upstream version x86-MSI-mask.patch x86-MSI-pv-unmask.patch x86-MSI-X-enable.patch x86-MSI-X-maskall.patch x86-MSI-X-teardown.patch x86-pci_cfg_okay.patch x86-PCI-CFG-write-intercept.patch- bsc#939712 - VUL-0: XSA-140: QEMU leak of uninitialized heap memory in rtl8139 device model xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch - bsc#939709 - VUL-0: XSA-139: xen: Use after free in QEMU/Xen block unplug protocol xsa139-qemuu.patch- bsc#937371 - xen vm's running after reboot xendomains-libvirtd-conflict.patch- bsc#938344 - VUL-0: CVE-2015-5154: qemu,kvm,xen: host code execution via IDE subsystem CD-ROM CVE-2015-5154-qemuu-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemuu-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch- Remove xendomains.service from systemd preset file because it conflicts with libvirt-guests.service (bnc#937371) Its up to the admin to run systemctl enable xendomains.service- bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow CVE-2015-3259-xsa137.patch - Upstream patches from Jan 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bdde5-pull-in-latest-linux-earlycpio.patch - Upstream patches from Jan pending review 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch 5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch 5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch 5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch 5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch 5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch x86-MSI-pv-unmask.patch x86-pci_cfg_okay.patch x86-PCI-CFG-write-intercept.patch x86-MSI-X-maskall.patch x86-MSI-X-teardown.patch x86-MSI-X-enable.patch x86-MSI-mask.patch- Adjust more places to use br0 instead of xenbr0- bnc#936516 - xen fails to build with kernel update(4.1.0 from stable) 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch- Update to Xen Version 4.5.1 FCS (fate#315675) xen-4.5.1-testing-src.tar.bz2 - Dropped patches now contained in tarball 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch qemu-MSI-X-enable-maskall.patch qemu-MSI-X-latch-writes.patch x86-MSI-X-guest-mask.patch- Replace 5124efbe-add-qxl-support.patch with the variant that finally made it upstream, 554cc211-libxl-add-qxl.patch- bsc#931627 - VUL-0: CVE-2015-4105: XSA-130: xen: Guest triggerable qemu MSI-X pass-through error messages qemu-MSI-X-latch-writes.patch - bsc#907514 - Bus fatal error & sles12 sudden reboot has been observed - bsc#910258 - SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984 - Bus fatal error & sles11-SP4 sudden reboot has been observed - bsc#923967 - Partner-L3: Bus fatal error & sles11-SP3 sudden reboot has been observed x86-MSI-X-teardown.patch x86-MSI-X-enable.patch x86-MSI-X-guest-mask.patch x86-MSI-X-maskall.patch qemu-MSI-X-enable-maskall.patch - Upstream patches from Jan 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch - Dropped the following patches now contained in the tarball xen-no-array-bounds.patch CVE-2015-4103-xsa128.patch CVE-2015-4104-xsa129.patch CVE-2015-4105-xsa130.patch CVE-2015-4106-xsa131-1.patch CVE-2015-4106-xsa131-2.patch CVE-2015-4106-xsa131-3.patch CVE-2015-4106-xsa131-4.patch CVE-2015-4106-xsa131-5.patch CVE-2015-4106-xsa131-6.patch CVE-2015-4106-xsa131-7.patch CVE-2015-4106-xsa131-8.patch- Update to Xen 4.5.1 RC2 - bsc#931628 - VUL-0: CVE-2015-4106: XSA-131: xen: Unmediated PCI register access in qemu CVE-2015-4106-xsa131-1.patch CVE-2015-4106-xsa131-2.patch CVE-2015-4106-xsa131-3.patch CVE-2015-4106-xsa131-4.patch CVE-2015-4106-xsa131-5.patch CVE-2015-4106-xsa131-6.patch CVE-2015-4106-xsa131-7.patch CVE-2015-4106-xsa131-8.patch CVE-2015-4106-xsa131-9.patch - bsc#931627 - VUL-0: CVE-2015-4105: XSA-130: xen: Guest triggerable qemu MSI-X pass-through error messages CVE-2015-4105-xsa130.patch - bsc#931626 - VUL-0: CVE-2015-4104: XSA-129: xen: PCI MSI mask bits inadvertently exposed to guests CVE-2015-4104-xsa129.patch - bsc#931625 - VUL-0: CVE-2015-4103: XSA-128: xen: Potential unintended writes to host MSI message data field via qemu CVE-2015-4103-xsa128.patch - Upstream patches from Jan 5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch- Add DefaultDependencies=no to xen-dom0-modules.service because it has to run before proc-xen.mount- Update to Xen 4.5.1 RC1- Update blktap-no-uninit.patch to work with gcc-4.5- bsc#927967 - VUL-0: CVE-2015-3340: xen: Information leak through XEN_DOMCTL_gettscinfo (XSA-132) 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch- bnc#929339 - VUL-0: CVE-2015-3456: qemu kvm xen: VENOM qemu floppy driver host code execution CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch- bsc#928783 - Reboot failure; Request backport of upstream Xen patch to 4.5.0, or update pkgs to 4.5.1 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch- bnc#927750 - Avoid errors reported by system-modules-load.service- Add xen-no-array-bounds.patch and blktap-no-uninit.patch to selectively turn errors back to warnings to fix build with GCC 5. - Amend xen.stubdom.newlib.patch to pull in declaration of strcmp to avoid implicit-fortify-decl rpmlint error. - Fix quoting of __SMBIOS_DATE__ in xen.build-compare.smbiosdate.patch.- xentop: Fix memory leak on read failure 551ac326-xentop-add-support-for-qdisk.patch- Dropped xentop-add-support-for-qdisk.patch in favor of upstream version 551ac326-xentop-add-support-for-qdisk.patch- Enable spice support in qemu for x86_64 5124efbe-add-qxl-support.patch qemu-xen-enable-spice-support.patch- Add xen-c99-fix.patch to remove pointless inline specifier on function declarations which break build with a C99 compiler which GCC 5 is by default. (bsc#921994) - Add ipxe-no-error-logical-not-parentheses.patch to supply - Wno-logical-not-parentheses to the ipxe build to fix breakage with GCC 5. (bsc#921994)- bnc#921842 - Xentop doesn't display disk statistics for VMs using qdisks xentop-add-support-for-qdisk.patch- Disable the PIE enablement done for Factory, as the XEN code is not buildable with PIE and it does not make much sense to build the hypervisor code with it.- bnc#918169 - XEN fixes required to work with Kernel 3.19.0 xen.spec- Package xen.changes because its referenced in xen.spec- Update seabios to rel-1.7.5 which is the correct version for Xen 4.5- Update to Xen 4.5.0 FCS- Include systemd presets in 13.2 and older- bnc#897352 - Enable xencommons/xendomains only during fresh install - disable restart on upgrade because the toolstack is not restartable- adjust seabios, vgabios, stubdom and hvmloader build to reduce build-compare noise xen.build-compare.mini-os.patch xen.build-compare.smbiosdate.patch xen.build-compare.ipxe.patch xen.build-compare.vgabios.patch xen.build-compare.seabios.patch xen.build-compare.man.patch- Update to Xen 4.5.0 RC4- Remove xend specific if-up scripts Recording bridge slaves is a generic task which should be handled by generic network code- Use systemd features from upstream requires updated systemd-presets-branding package- Update to Xen 4.5.0 RC3- Set GIT, WGET and FTP to /bin/false- Use new configure features instead of make variables xen.stubdom.newlib.patch- adjust docs and xen build to reduce build-compare noise xen.build-compare.doc_html.patch xen.build-compare.xen_compile_h.patch- Drop trailing B_CNT from XEN_EXTRAVERSION to reduce build-compare noise- Update to Xen 4.5.0 RC2- Update to Xen 4.5.0 RC1 xen-4.5.0-testing-src.tar.bz2 - Remove all patches now contained in the new tarball xen-4.4.1-testing-src.tar.bz2 5315a3bb-x86-don-t-propagate-acpi_skip_timer_override-do-Dom0.patch 5315a43a-x86-ACPI-also-print-address-space-for-PM1x-fields.patch 53299d8f-xenconsole-reset-tty-on-failure.patch 53299d8f-xenconsole-tolerate-tty-errors.patch 5346a7a0-x86-AMD-support-further-feature-masking-MSRs.patch 53563ea4-x86-MSI-drop-workaround-for-insecure-Dom0-kernels.patch 537c9c77-libxc-check-return-values-on-mmap-and-madvise.patch 537cd0b0-hvmloader-also-cover-PCI-MMIO-ranges-above-4G-with-UC-MTRR-ranges.patch 537cd0cc-hvmloader-PA-range-0xfc000000-0xffffffff-should-be-UC.patch 539ebe62-x86-EFI-improve-boot-time-diagnostics.patch 53aac342-x86-HVM-consolidate-and-sanitize-CR4-guest-reserved-bit-determination.patch 53c9151b-Fix-xl-vncviewer-accesses-port-0-by-any-invalid-domid.patch 53d124e7-fix-list_domain_details-check-config-data-length-0.patch 53dba447-x86-ACPI-allow-CMOS-RTC-use-even-when-ACPI-says-there-is-none.patch 53df727b-x86-HVM-extend-LAPIC-shortcuts-around-P2M-lookups.patch 53e8be5f-x86-vHPET-use-rwlock-instead-of-simple-one.patch 53f737b1-VMX-fix-DebugCtl-MSR-clearing.patch 53f7386d-x86-irq-process-softirqs-in-irq-keyhandlers.patch 53fcebab-xen-pass-kernel-initrd-to-qemu.patch 53ff3659-x86-consolidate-boolean-inputs-in-hvm-and-p2m.patch 53ff36ae-x86-hvm-treat-non-insn-fetch-NPF-also-as-read-violations.patch 53ff36d5-x86-mem_event-deliver-gla-fault-EPT-violation-information.patch 53ff3716-x86-ats-Disable-Address-Translation-Services-by-default.patch 53ff3899-x86-NMI-allow-processing-unknown-NMIs-with-watchdog.patch 54005472-EPT-utilize-GLA-GPA-translation-known-for-certain-faults.patch 540effe6-evtchn-check-control-block-exists-when-using-FIFO-based-events.patch 540f2624-x86-idle-add-barriers-to-CLFLUSH-workaround.patch 541825dc-VMX-don-t-leave-x2APIC-MSR-intercepts-disabled.patch 541ad385-x86-suppress-event-check-IPI-to-MWAITing-CPUs.patch 541ad3ca-x86-HVM-batch-vCPU-wakeups.patch 541ad81a-VT-d-suppress-UR-signaling-for-further-desktop-chipsets.patch 54216833-x86-shadow-fix-race-when-sampling-dirty-vram-state.patch 54216882-x86-emulate-check-cpl-for-all-privileged-instructions.patch 542168ae-x86emul-only-emulate-swint-injection-for-real-mode.patch 54228a37-x86-EFI-fix-freeing-of-uninitialized-pointer.patch 5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch 5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch 542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch 542bf997-x86-HVM-properly-bound-x2APIC-MSR-range.patch 54325cc0-x86-MSI-fix-MSI-X-case-of-freeing-IRQ.patch 54325d2f-x86-restore-reserving-of-IO-APIC-pages-in-XENMEM_machine_memory_map-output.patch 54325d95-don-t-allow-Dom0-access-to-IOMMUs-MMIO-pages.patch 54325ecc-AMD-guest_iommu-properly-disable-guest-iommu-support.patch 54325f3c-x86-paging-make-log-dirty-operations-preemptible.patch 54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch CVE-2013-4540-qemu.patch qemu-support-xen-hvm-direct-kernel-boot.patch qemu-xen-upstream-blkif-discard.patch change-vnc-passwd.patch libxc-pass-errno-to-callers-of-xc_domain_save.patch libxl.honor-more-top-level-vfb-options.patch libxl.add-option-for-discard-support-to-xl-disk-conf.patch libxl.introduce-an-option-to-disable-the-non-O_DIRECT-workaround.patch x86-dom-print.patch x86-extra-trap-info.patch tmp_build.patch xl-check-for-libvirt-managed-domain.patch disable-wget-check.patch - Xend/xm is no longer supported and is not part of the upstream code. Remove all xend/xm specific patches, configs, and scripts xen-xmexample.patch bridge-opensuse.patch xmexample.disks xmclone.sh init.xend xend-relocation.sh xend.service xend-relocation-server.fw domUloader.py xmexample.domUloader xmexample.disks bridge-vlan.patch bridge-bonding.patch bridge-record-creation.patch network-nat-open-SuSEfirewall2-FORWARD.patch xend-set-migration-constraints-from-cmdline.patch xen.migrate.tools-xend_move_assert_to_exception_block.patch xend-pvscsi-recognize-also-SCSI-CDROM-devices.patch xend-config.patch xend-max-free-mem.patch xend-hvm-default-pae.patch xend-vif-route-ifup.patch xend-xenapi-console-protocol.patch xend-core-dump-loc.patch xend-xen-api-auth.patch xend-checkpoint-rename.patch xend-xm-save-check-file.patch xend-xm-create-xflag.patch xend-domu-usb-controller.patch xend-devid-or-name.patch xend-migration-domname-fix.patch xend-del_usb_xend_entry.patch xend-xen-domUloader.patch xend-multi-xvdp.patch xend-check_device_status.patch xend-change_home_server.patch xend-minimum-restart-time.patch xend-disable-internal-logrotate.patch xend-config-enable-dump-comment.patch xend-tools-watchdog-support.patch xend-console-port-restore.patch xend-vcpu-affinity-fix.patch xend-migration-bridge-check.patch xend-managed-pci-device.patch xend-hvm-firmware-passthrough.patch xend-cpuinfo-model-name.patch xend-xm-reboot-fix.patch xend-domain-lock.patch xend-domain-lock-sfex.patch xend-32on64-extra-mem.patch xend-hv_extid_compatibility.patch xend-xenpaging.autostart.patch xend-remove-xm-deprecation-warning.patch libxen_permissive.patch tmp-initscript-modprobe.patch init.xendomains xendomains.service xen-watchdog.service xen-updown.sh- bnc#901317 - L3: increase limit domUloader to 32MB domUloader.py- bnc#898772 - SLES 12 RC3 - XEN Host crashes when assigning non-VF device (SR-IOV) to guest 54325cc0-x86-MSI-fix-MSI-X-case-of-freeing-IRQ.patch - bnc#882089 - Windows 2012 R2 fails to boot up with greater than 60 vcpus 54325ecc-AMD-guest_iommu-properly-disable-guest-iommu-support.patch - bnc#826717 - VUL-0: CVE-2013-3495: XSA-59: xen: Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts 541ad81a-VT-d-suppress-UR-signaling-for-further-desktop-chipsets.patch - Upstream patches from Jan 540effe6-evtchn-check-control-block-exists-when-using-FIFO-based-events.patch (Replaces xsa107.patch) 54216833-x86-shadow-fix-race-when-sampling-dirty-vram-state.patch (Replaces xsa104.patch) 54216882-x86-emulate-check-cpl-for-all-privileged-instructions.patch (Replaces xsa105.patch) 542168ae-x86emul-only-emulate-swint-injection-for-real-mode.patch (Replaces xsa106.patch) 54228a37-x86-EFI-fix-freeing-of-uninitialized-pointer.patch 5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch 5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch 542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch 542bf997-x86-HVM-properly-bound-x2APIC-MSR-range.patch (Replaces xsa108.patch) 54325d2f-x86-restore-reserving-of-IO-APIC-pages-in-XENMEM_machine_memory_map-output.patch 54325d95-don-t-allow-Dom0-access-to-IOMMUs-MMIO-pages.patch 54325f3c-x86-paging-make-log-dirty-operations-preemptible.patch (Replaces xsa97.patch) 54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGH3AKDM4.12.1_02-lp151.2.3.14.12.1_02-lp151.2.3.1  xenhtmlhypercallarmindex.htmlindex.htmlx86_32index.htmlx86_64index.htmlindex.htmlmanindex.htmlxen-pci-device-reservations.7.htmlxen-pv-channel.7.htmlxen-tscmode.7.htmlxen-vtpm.7.htmlxen-vtpmmgr.7.htmlxenstore-chmod.1.htmlxenstore-ls.1.htmlxenstore-read.1.htmlxenstore-write.1.htmlxenstore.1.htmlxentop.1.htmlxentrace.8.htmlxentrace_format.1.htmlxl-disk-configuration.5.htmlxl-network-configuration.5.htmlxl-numa-placement.7.htmlxl.1.htmlxl.cfg.5.htmlxl.conf.5.htmlxlcpupool.cfg.5.htmlmiscamd-ucode-container.txtarmbig.LITTLE.txtbooting.txtdevice-treeacpi.txtbooting.txtguest.txtindex.htmlpassthrough.txtearly-printk.txtindex.htmlpassthrough.txtsilicon-errata.txtblock-scripts.txtconsole.txtcrashdb.txtdistro_mapping.txtdump-core-format.txtgrant-tables.txtindex.htmlkconfig-language.txtkconfig.txtkexec_and_kdump.txtlibxl_memory.txtprintk-formats.txtqemu-backends.txtstubdom.txtvtd-pi.txtvtd.txtvtpm-platforms.txtxen-error-handling.txtxenmon.txtxenpaging.txtxenstore-ring.txtxenstore.txtxsm-flask.txtmisccrashdb.txtvtpm-platforms.txtxen-command-line.pandocxenpaging.txtxenstore-paths.pandoc/usr/share/doc/packages//usr/share/doc/packages/xen//usr/share/doc/packages/xen/html//usr/share/doc/packages/xen/html/hypercall//usr/share/doc/packages/xen/html/hypercall/arm//usr/share/doc/packages/xen/html/hypercall/x86_32//usr/share/doc/packages/xen/html/hypercall/x86_64//usr/share/doc/packages/xen/html/man//usr/share/doc/packages/xen/html/misc//usr/share/doc/packages/xen/html/misc/arm//usr/share/doc/packages/xen/html/misc/arm/device-tree//usr/share/doc/packages/xen/misc/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:11304/openSUSE_Leap_15.1_Update/316b716a1569e38f29a8806abdd8cd8d-xen.openSUSE_Leap_15.1_Updatecpioxz5x86_64-suse-linuxdirectoryHTML document, ASCII textXML 1.0 document, ASCII text, with very long linesXML 1.0 document, ASCII textC source, ASCII textASCII textASCII text, with very long linesAlgol 68 source, ASCII textutf-8e4f86fac69ef3afc3444fdee11896983f8b8e5e64a44fc23fce2c22929ea8c28?p7zXZ !t/-] crt:bLL DD~THj"GLC4"ȵiMс(,)wKq ;<䲘e&yj DvSPxYϪ37$d%t2173m[`#5ۇP0֤ݰ ٴvt'(dꆿhFx]:7^ZwZ)zQqsE~yk410A2_ԩKjDjFmIy$KAn2q‘I"ߝ-t} #6H]4#yx(3 =2!BO%KI7w [S.SdX@"#Z3!/.;_M0Y0KGH@8MθrvLp.A{ ھkb&nզ)#7]|-zLqQ+'}%0ٔtPmx!Mв k[ I.?8DpX@]Q2Ηt67o6?T(4|LeX82_A=v( PvsFOCPg^VvxM[XIj z/ây,Vi XEAAn߾˫ Ts8b Nh=BjA/J;nq"ׂs6IEH_Vw`W $y,Ow␝,!֎Ǻ< %DQw#4tp8oû￀19ڊwX\ǝ3$BFq޾Q^" [0@{Y&YV}kH33/KTK֠0qRDD1F][3_.@v5L~M,Y[\|r4GVFڿwlns3]*FO)TP{'zXZplRy13AkCiեH0܃sX|Q[wpH͡X-{T~LH}+`OmQr's\$2:b^nm 7ق&a+xJ&  i0>UdnMt@p>H<,+43&&u ;P:PFM%bK`d 乜\RĞ([B VSR^ubh јJ >8狏\mSRT*KUpCQMOl8C^ԙi}.3t5gP%LtC /te+"sz^17N~TIN%J) = 3}k{VXUͫ?,AbɢՒ\%g{I|H2Zh|Wo/8(~O10I㫅[_R8@fE}F 9]znH粩RԀ 4ڧW$#kPW@gXt5`6i_WbqnφUhC~㽨5)Dmo?ނsS!g(Eau L rP\$os|+Q6P(H'N\.V OZz+Lpm =Bw阜t)tpJ޵Zq0 _(E~bj/L(P g\W ţC"Z}O0*_x>3 ˸f*Z6l:젊`C6Xiڞ}C{^,COTeh$18<]`k:ٚi5r' oG;8eR@Z1'Аc\S'mMD;_Ȅ; 8AWZb>HKNI  ߣEw[gfL!ɣaWLMPQϼiG=l[p=;vjx돻5qǔV'-Xwkp9 poI0DgSWv&SRAL Ny-нqR#CםBL+1(G?~or6LhEJ>=אƑfr i4<'WR!76@>9ƯS<3hzdC9KD^Bn_3ܕ硩1XGLXSDen#׾3|$+˄Y UT^<xpmC-uR-,<_wǎ>vSvï3WNK6!`^%md~3oG?%zN-%6j,*Bs_Դ~#I5 D\kL؃ j!wid @))(7=]֦>{I- \i$#{B Ӽ5#S ?{An Xm{Jfiɘ>c=c9xjJ8yt]}zͼSH9%aLVu%MU& ~?%&$bi`VLQ('!hw?O}$5 ^kJhNpYS֡2 ?Nf}鵌o&4;ÛRJ X1F Q%lC k\ή=m[G6;X;#f$2dKLsMl1W\\QP̜M`pСʵ㰪Q}ALUQgR@O"cuLxiXI|=f`oB± č!HPLBPu^q;Ta~Ԯx|^@t{&/y%qd>7 is,֔t ( Ni|Sl5p2.!5"6JY1n3pYokΜx6@Ou2XGvn>ޮabn+\yNRe:4Vmkod 6~$o6Ud/(HkhoMCPГ]hzGObƒ8u\婄#ռ~Wszg?%LKeuE@*@RB֔;.*C:ܱӏA?Il~J'yMe#TThm[ٵ*#ػHfB[ )fߎ|ǜ;]Tf83԰d hә@Eu/TcdE0ίLY$>|GxnkaHd,v0NHΠevB"_PoY:+=(Ǯl=TW'SϛCpPNTo6`U%Mp'xɰLfMO+9D^fV凤}m-ȤeY1wH _E3J9oUcdi8MXR8KBm <#F ep%]ƫH8>Y*H eێPv%8*@z‰^&J(:s7$HG%\/*.<+>Ka+<72/⍀:G`zesi:ZF7f$-+vcN9T JwR:(`ގ1AjWi>E]_)Y Vgb _d@L:U#,W㏈[Q93VWe7k5}a+ɨ+PG 9+3Ypgd}5ݾ{WGPwT2y[:eOQCU\:UhK'͡Tz#*jD8v̈́ ?t9GK q:NKq 8H\9cRh fh.i+wގϬ#b:^nL]60{Mg3pt as~mIo;L$ȊS2]娵DT& wݿ#x0lJF"rx,Dv~ՍuMn۞^%KLW!] 6(6b42Zҿs:J}\MۏogE&!1"RQx]{?q:g:y~ >^mCff \,tBtPκ Ī6惎AZzA+dU-)TWZhy{GA}\яo툤޸#+Vm/@?e-8J$Tl.:}ՐH ]Qeh2R# ƫʆ–@oY[ԔlD~^jlP)*H !s_%RUZ"C0߈C@^"W)QX~ 嬿C=W$-[h ,eN^ asPJ6)q*g?xLc6?1! _%BC@q zI3x.|S6ȳ{ 5Y,MؠLhfRy.>zaY3HV(*T^ْ0r,A!)^̌B,<\Vq#v(Dc6Qu? !l09C>G@/AWAl8'0R]\{yQ"eϥeCoiݜU9" IqA`jm" Ql$.x7Fͩ5UpycELKl"}}2⩨9wX)E\6h72%2gpc΍ײ-@["q;:r=XH7>Ve ?D}҈f|#ő ! -luXgJ-UV!RebI%}*3|(7H:C (QMa[Z;oץW(T``EK)T z $D*ZY]~R;ݗ,)_z J73U2 `}_ϫXB#BޮK76슼Md>{Gum)&{8yЖX^ I;O@G- tdJkc+lpH:)n%&)(7ogX[" mpsTUpF5?"ۆN{D uFYc [L8w2ow߬ r(L7 :at_XB]_1 Y7yl'+`D8$)$6*E]ez1EkrYYȳ$_џ3z{E1[m㹑&NI䔼:ZD_,`j%AV1oY9& Ifh9ǁT_ܣhK4ڣE=uTL>OҗF}m A;gB>(+ T@ʐg?D$EH2HL#3J dQa؈hY#>Fq/ شS(QR:c}˼uT,CȚw65$I76:U8e؃3k9NaAa@<3p1FwyF<8=AJ'pT{U"a6tK0NVϼucN{|FXk C9%YZk_aToj`p*[RۋZ´pk,(7a;> 1?P-_Q?lKf_"ȼwɵpp$̆_; (@?q Ky~Vۇk xe]g~I/Na9Y.OOF9ux r邜Jks% k:wz\^xx&{ į$L%ړ: =/|j8t y A6:B٨q8D<!k`8w4>. v7TL1+X+'P &LʧW ߨ] Gdv|Ķc¥AKđK=ΐ1T/"]ͫiq^sp_HnEVY^޴ WFWU`L.;حbn3J)axcn^-b]%C]-NTWl"g.쓶6ukI33>Eu`MF.٭@QS! 9![+nSSl[GO17a| u/Zɥr bokTO (B*$0X9NU¾}sbĮgmO).~?ΗW?7n=i!V]#OCνId<ԄmMP;IXk Q~ k?.@yhqZhe7 Z&F;9`0[<)xgCH.D +Hb- uC|=4εwƓA F+M}/M>qߴAٽ94F_5}|W HtgPGL uU٢>8-#.V/Kʅct]rν.zuH?u2Pyŧޤ'ߗOob) @jՇî -7N2$oAFe Q|Fz;LIG]dhn+jAd=>%gcley&ʜruMLJF Ĺ~o'$ֻZDUɏGKGj5#ċI+m- 2T#'xj SE+dZ"aKQasj_YpD8>m5ԙpTmEO#U0U) !$u$f&e|ʓl*(=APv/(dc0<w+!jԉ;7R_},5DlOSDڸm#|dC`v = /:m!DoF0!?飆0+1E*È KehPɔ)ֹ%PH}wa<^W 6K.5t2PG[*[L)b3֝n3_]$Zd0`N'xAP2:BS9hp.ݾ / bCȹLVݣE53+6㽅7V cB;0GimO'ƆI}Ku}VxC\XAz.J 9H%* E4Wh>>AײOSDAG8!Lw_dj p}Ic[s΄)3ɘBLBgV5`7:bԕ k,3-DVk@m6|1S?# Sd>(*|#3I1n{,M+$HeP&chvy }gH_wkSY!NUy[Uxݩ։ >߮) P#AyqrNyUIAOn$ dOdA7f#޴Q O8gQuS?-{8KM}S譶 *eu\uEo yoE% 0+r@b.J`=\$;NWQPBX(A"ܴ)(1Roo\@ÙGe\(vgcCkEN?\CE<gV΁p7k qJ]`ќCjPa)ΔNCnh. VȬ<. baAX^CRsO3=7˟؛=._pRR|@ʚ35ܒYp7ѽ>%\ >eZr|@}?T1ܶx#4ri>jIakJu`\veE^fQZ|7|aIh}h#o N4Fs-օ9竗AoH8q2N|gnEeKľsRߔ\#OUErz+W LJ TC%X-p+usQJDqpآ }Y0 "9ud ГYkY#3qዐ2+U-G!}/scH(JT 0iL?.V{Rwh+3._%@ |>N{յ< )AvsȲX8!z}&9#C[Uk1}ǜϒP,Q-U, CpE(!?TYeO:,/¶LҰn0(`b)ٓo L; #Fִ, ~+NpJy |OBwqM__vK (hѴ꫐:u?}r*r3y wQ,)}:Y 蹙^sC[YY;ftXV@!闲O?mqعl&cMQ+vgIc<|Vߦ'D\׉u7д wQRtD)3Dk2 /='ӏb/ol5 :% Ͷ/Shj $06i3ӎ4 k$!΃"\| yw݌ *S1`8wP?zsHrfTWO[NXѸ}ִi2G>xkmqvcG$z8~p\Jp/&PgrۯXȸya9= > wV/FVi/XLh؃QZ2@p->b_P4 [$i9ww>XYZ-畉[hUK0-:鐕(:][}`?=*5gd⊔:Dž\0%.ЉM|"ʥ"T;8a.=M.C eS`7Zu!n`7Yđ}aBh k?(-Uv˦Ǯyp,áMj% s8#N,dZQDpG 2!pBZ#-9 +쿞N۹[{J7=X-F4EO'(BwmĐPtx8+ih j+4*)~}CPTd+:^f Ӷe+lӃ/u94 DM<9݈On@A-8Ƅ ܽԕUS$9o&3axZnӴqTͅnǂ"@;cMty、i(WjU ѶƱĨ&2pJTrCyCO%b 5D%1o }=g6[70~8 鞎}뢲D8OSjej=Mp5G+ j-9vH}L%-ΦL"1'1R6Bu)Sˈ_73~NY!Ceh7'.`_jř8"=ң¡َanGϻUkكȔ"ـ/eLO4 ɭ)dk^h?GKwQd1jKy| Fjp?/LtGy"{AV߃75X2(("0; ZfVNq^_ϒgIE#gѽl+ %BoBܿg CSq_-j.DvP2a>AcLJ(/HMD2#;‰Aי1C–=]u4 i?3~R4R;O>clzQ $eߝC0 o%^фͶ O1TPl Zi &=eJ6d!DaIbDIR#^U;>_T]S1/PJ7bVwQ+t |T>W,S[Y- oTcq #;Pq] =L_Itɝɨ-k^F$/+HFQ[SϏDtш0b/M)"4IM3bf?>NX.a;Q3;A+(Z?rA?=1Xy4B zz| IřWת;>ZAƿJ;8bSU!0dk޳?|_l%,F ܆v6`â@J UԶm-pvCϾ7-$+ʸcTk('. k1;ēr"dg;| ~ ڦ` 1ǣyؠ%f6iPH^diz)*GC [8FQNI{t6Zy\ Ϲ!j)WLfpde p2B&:'v?<.5Ê 3`0А_knPiPnϽ)l0gk1}kiDg)ֲ0.c--.#kl:w:q37D a`.z̚A2Atk? hEUS*q8_rk!*ɝl3q&o7{NHW> n)bjs)m%^4Ji QY @ژb=qG[DdSOI K#nZqȲug 9w}}Ȫ=q>?ߝMtS:NQѾ? 8\ma/ݙi|8@"EF w5l:H-D5Up<"m 9YO1am{u(C h8? dh7jּMT+ˆ{.3qaxR$; G6HTVgC/Y ?tw, ɠf(0%Ԏ*ah"ֹNϙz;հOEW taěBK{/xܸXq ¯pd GAz7$rpE0Er/ y Iq7h(nAe@t"{l;Vl|TLfT UQޝN5Vr޴c,f)w K'\ DCK}VpZ~PY<(9˅Ma4I.SPJB J"جbȯmt%d툂N'%`hndEdiwO;(9O0a,i92/:(Tb_|yʃka7?YրQ7^? ۊ{o>[6 ^znVde*7kT5ryA\pCFECm ɒi+eMa4L^l^vh.(1Kw e=J>f0dYpqzڕ bg C}([dOιB˷q*q $VШ)7'QGLn 8ZX'l+8թG5ZWH:{29l9)79:8 ??tZCSCh+Y+26pL'*0qWZi&Bx&{3bY\lӥV}OK[5>_ ^sl%dT-/m}[{W!T|A*'Y)""[f(Vd 9 !Rhٕa7%Pέ̚W#lxR^К&FsT K9`ԧѶI%5|Ͽ\35!]1fGG _>jN k ywfE&ۏe:?] ĸPBR iy#'F|SPj7el.WE*JBoJ Jcg( 3do_5Z:GN-  vz LΏОX'R,,i9vjFu#2\dbq# "IT-@.!w(Of3BkQA I`BT_exH̩T}=`N %Ղq{;#xcMM67E`=jר9; +ڶTg)|n+ AYXx=\_f<[.z,}wU}rv6QjX;Ma3{iM@]1sG€^5CW,dH5>]ی "/T`. "ɌZCܲQĭ=.y͘ۆ7[I>db r9XXR h ܘ\ޜ5'^تq~6d_BWDyblf5Ħl*"Ǹʴa+J,T ih2eg2znltOȣ;,BOe;bX~n-4MiHj!:s=kû(W>lH@bR\(c'8z5o9gq&oA8g&DNB+A/zḃF>i6׼TQѦ ϪnR_LC5XIJ XNIiP!g<% qJ ˽*/w\M5Q 7| 68vh9COlM7X.o FHk\;ם>v!Ӻ G=b+;A?ND"tDV\r(c朲F/`&AQ\s3j=ZD8BmG"bh~ƺ!O+g-|W/1ҙ=+ UC+ù;3尉\Cyp+7me!/ZHyԇ%M!`V=?M r}Ӌ3 pIR.TזwN[)kr=lNI49cb͉KqT^vxK)H[ws ("#prTkk tsּxmMM-g{Kޘ /16 ۖ\m#k"6V+ T͟rI"_βTpf26-C7F_L+tH$&ZK-H~hFTۣ8S!ƲCHṠ֬/Զmpu#:ñwG6+`_Q5!LEf>2$|n10Hgfg7 b'CƋEuq{f)h[;yeU|-., l&T6[ %>QިPIZE6X)ƋCYP!.ڞSzVOywjT ƍi<{qGfiĿ~n'sY;#'(B$A/RLJ9˞}чD(geV#[*; )zjt7־%b?Y0MdjzfmOSǃao!9Kh,77?Vo\tҷgIU:ݢ$cdĄࣣbn1(s u!g߉g%$e̪67\E$(!ARbjl$[hC zeJoԵ;-C@dbVgQ_eDr!jr~* -VlL\Q-FFĸGȕsy,G>-H삑!cQzynawЏ=O#; 휡Y6нx;=bx|j#Lba ɜFϩ#Cࡎ,U)D>' r tڰ*cA)^_/ 2;0QB6>+<4O dE&oҦ":\I.ɿWqh#IІ3/ɓ2>~ L#ãȌ8Ci .)t?kЧaf-5zB]VgK+;' 4%ֆu,ZilWǮ˓E2" ͒ ^%kJ  An/mNX@WM^hV>]̫{t?'-.@\K`\AzL 3@(Q#[Ajn6_*x E@ ABKs̢)uf]drE >Ô& ;CoBMmu$BD?n &H6B-tæW|7gsX܏ 3\asP>*w `HoE"OR&V&f P]^dCԮMժH6-R~J] _cqjRD"f )qRoǸWC IHRb4>t"ոiz%\g\Fye)PO;QY7R̒(ylEk#i&o}tx]J7_bHEAsf+լj5j/|0Pri7/9 gLC!hބ\ߑҒ4@ȳ n]1X:^!ewoEbX/6ml) b>l`y\{n&2'yk#{h!>^ O~U75L`uy+> ͥvٷX{D]⬜xE"-IrD4eHP*ѱ쒽JBB1+,md9}*֨tg *A\ ǂLg 8OkHg|3aIڻCo|HU9[k2XD%e J]B"=* A)O7_bjAbErE0*]*{{?_GA_q 'g3}⠡w"8N箄@n"RMڿ4|rkE`g ě DV[{M\}o;`bzr jPcfN#E}sMN,997P"^^.sz|Wpr=GTɶY?Wui'p6G` j1Гj=޳u!`_嬙s_˿/eWu6jnt9PY!`|,4%3Ԑ_H\ U1<@BυRe&vO8% f|=|9n2Z mRK^6"PSl!ԛ"E~]vR wk+aw_oڈ@v^]ÇZy# :ňU1靀>/b;T|7y= b$xoYКP}ӥΩ^9{d^D˙4CJIE9Dm%ԱlE8D5܊Bw$"8pR{hHUXk_/{][ZK;N8Ǔg5_*Y;D6k dg-!US!_yYNQHk@a|h6^=jFXp'}6U,ZP=OV^o?| Gs+.B#B! m#msJ]c?ӺLZq>"s̕=7'N?Ɯ^|2+d/na*GP)F葌9H en MJSa6/;כ<0L5f'C?R6ֈ7\otj}NRM+⒧AI1IzYi$q[Q*IՆ۹+HZq @6ѼOmGHB`(Չv$Y o&7 q. -'] Rk] _UHSC||ŏc6I^["eX:N.X#ܨ,fS)$q"?{tُ!*J)B%b9|-Bd,gH![05yk7ἥnʹR_6)AVVβ0hVK׭i݇ȫ:n DJ\s&`uBe󤫅rPq0 >zO=tC T/d0ze$/lZvS_dU!mY\SnLJb֬F$`k(%I2._ .,O3/x?4UdSR3ZEԘ>XEﰧ‹5Kڊ:n۔9VOJAج_RZ72è^: wz<;hx%_b̙A&~sLZgf&<20LJ}yA+Uܰ%h}?+KwѺ"'c:_ פOQ^~=OJ+m~n)ODӗzF &4'5`g :cO Hyp<Lt[9Zzn`d)/gJvo8޲yO4RƸnxIo ZARs֑&< DI~Vj鰶ߌ.@S7nwC*dEkxw A{1wE]R3v2EIm&H/:2ZRCI5iXps`.N*˅}HXv!^ij%/uȱYtțyR(~<md>pc@-v/&YHba 1Fȟ['=]Kx"55tHh6` @^?ݑOHX봍3 o3Dl׳j;jɁ+Ԣױjj/ܻmhi@+FU-"5+ku#ĪR;mClސ枬Mp2쾀ExͩVkk;$Yͅć*[{oM^bpQOp@Cy'{^)eP! knUَD WQ]О֭$ BۮGHD~4SCX3= p(Q e(4R< ,d!l-Ou _55l^0e! &*n:qY(|I}vWކYDv@-Ȗ|.w!-Y_ /I2 .1@B+.wucvWLx̊ 5f9j{^V˼ &($hJ¤0r3TA^;YpZ^Q[)a!v% xK)ۧ:X%km4V9Es}TP/S F_P*d}?$`{_kSg_7~9Xƍ`jo7 d@1d ] =-ƈ?*feذҘVˣMkkOB~W1~0|cAhřՂ`dVɀCȊxV4%$c^ ѕnVt!3clqAg Z@@|fuz%li:RC7TbOq;? H/XM7zdvВV+XX2zYC, @7'5䭶W, @/gPr2&8kPǪ_0+EgS;grzxsֺҁM ye߉YNe1E/.;7-=עx/ygӀc+bI3Ⱦ-,䣿#=| k{KL:G>@yP\d74lѠ SU:źZ]Hx7`rv  (Q g. 3Oso[_fcNtA  RJfr-ep`P;#Fx$O G(U--moE-i7O@4zVlj`eDfkl! DR!N'n-UB*Rq $C{6嫄[P7jT#ZVý}hmgi B ҸU`J|~lvI5dl$gahb39HhH6B$`:*nxu{~Xo?*Nu tg-*lFC*qOF`xs'>|5,F9X[ZDײ%7gHy#Wq|jxr&5 %sv&QwFf%ݾl+_qWB|{I\Ĕ IDD泴rSgoYIUCp͛_r{v 0L *fƒ*ho;4 Dރ4cɃV׈sLZ$9 +~'ZKuQ:W"i%lL\?r'y (L\ C8jyF{1OC_rn_]C7E7KL!DhfXdӋ; t8K `db,@^'lUqZ |GP:M~`g%r#4aoc\bEyX-Z&* n$:۹cYwg'Q uΫٗt7q0) jb7hpNC'xjWI8H%NZziOREgLJ{hܗZ%2dl-]G*\le.(A,a#JjLu ]py,~a@by +tMq4=:iN~ eô40v_!Baa-e5J1ʡΙgEawj\ Aym^B~fKc>Yc[D/u~%UxΣ+莶d%`e>qmS eY.H&tOeyLe 0¡0Fs 8t_MRMfZT:j1r{jfgWAqC)ں.ەTfwXbɗQS+jlK<\24Xn3@jG$ɢD!1}nKHF{T*q"/SCCD7XGqUq}0"}kW5|NCaA7\X"kY)iѩ(;wA_8Wa wM]=6wZqLV{OhKK 7-y*lUtO!_wI,huݹ {OZȢLJ:P灷JG*AZbCLTa]ꦛӉ3 -<ñ|g< Y>4b9]+']G})wMʑ,Os[V| LKFrf"Z AdV/yH6\gIpt{Pf/`"8 q1Et[*3r_ :vB?–`k3ɭu)ʚce-__.q!>Zm"up u LvXҩuf>q@ê'$|T[㽠3Բرy%QŌ6;%)קcʚQKjAIp~M{omZ0!;D$Rꦻkk yoI x[L!_a1cGv5R'Am=LaMʓ uC\(kDIL} ߓ]"3n?*hݗpX.Ud2 (}?֟VB|AFcHg&A!{ ԞM^lB8%Z:Ono']e[O8Pc[}$nӁ\.!ޢŇX tlbFsR]6gnOqG-dL#-[@{YdnJ[*NS/nҖBnJpPHӏg{EcGY4a?8*OFgP9۰[Z:nb=:ěHs-`R7}': 3pEb#,+Zv6<Ω.,t`D3Yq==$`EQ8[Bqq"O_Kk-1`s4,Ҭ/ݓɼDV*3U|@bM HZ6, ?KL 0YT}`徦mL1c UkΧFZ2EtA3Q-0dek ,-H:l6shrk~n֍21/s$(}L~Y/f0X Ed|}Yq[$;VTYs{n ኼ, mA4*\f8A^zL[tG//OΘ0Hp*/۴ϊC⥻.FB :;݉~57+TݐdSZos>C 5_:h9Ֆ# ,b!iZ\$-7`o t6Vu|{L`v0/>B( RRr*3{Itڱ(4ۗ'%Q8:p $q9dDX;7c }_A4QZAB/j#K笒_ˆ:႑Gh%L;}ÔF1!#z! jfmɤQl;?Q< cְue{i.:VV NZЏPoCnOJW8$G:$۹!,!  Xg+EhøU9+!8!9+ Y죜9zdNMZa:4 qG (9%ߛY:ͬ)-rSB >[~~v-|?U8=eL1`M28gzqBhvv'(pM^gEӹ>eͰl{dz,XƏ,q9ϸNہTt phfrDZr|qcL|[hHM'bfxqhxxN#Xk8`D, Lgф𬺄o'~ /˹W>PO,D QDC>\KTByvՈXUarTY[K_hv0!'j[]e6YWzjtiZ\d3>MՂ Fʪ$H^WԃmΤyw.j`b8O'>ءPucZ/"/A=kIu5vkxUB0b3T^A*&EL0~Wk`y*hS~EC7Z݋j7@B'(pJ@\:Ady.qSs`B]9Avk8:7žܬc=;m`((@>?McmxKd(ݎ͖${u\0k3}eG(㨾(W/J|mte NT ZpEydF]u&#ZmƈND=[WQVPvɐ2K B`':t]Ǝsfqt"yl; ;5śMpkE[ P_,)J F.62I+>B > )9"Py ^߀ɒ{}2;+K@15Y@2h2f>'X歇w{ ( b#mϿ&|`WhU߆U &`wE1,L#rC8H1>8]e[hHy! ;IuLHg1QVqXpbSZj)5 Em磖2jI [d?|Iy 8= `XsQa#YȐ "diI/{X`c,}mb+XQy}#*1}:j`18o&VIjQz/CH8-a%NkYF_˦ <"쾽&9O} ɻբ}^}X\̌UfJ)&l:mMp_R{68FTqu^w;o3Äaٕ܀9*\cz]NڂC㱨TY5VLG&@\Bu8SgU_BjHV+oTc<"˨if؆{1LZw\ws"1\M? hL:!ƩR\չT1CW*+G>?̋u\툆acKWH0$[`U'1!yL4;[_5 p o2~[, .CɊԳc&_Ϻ[ҋџ8@9& 0WtHю 1AAR`?nU87j&u&21^\|"ʿ4b ^O'x`SŲ0!-gɑ(&gs)miñW/CsZm,dPF؟qA2UU݌EǬX YA:_|LNt}|<:j \yc3#knW79)#Jnc `SDDCgCb.Y pk Dp6[! Cړ?%ak%$h<ߜ}1gWtfMˍm#cZJxì}yQH?b Ώz%BNgwju_G"+'y=)6PK#RZ4t&E)ԙh=Mſ` X7Ņw#qVdXW,Bf TeZeFIC4-<+{L(W[ɮ[w]fROeHCn}gȻeg"FعzZ">va2U\/5)E>I+C3pI8c~<, nO\H Ig-0Wɟ6f\6E SZsT\l+ Ғmb7?pSY}m5'2൉y~jZT)<e@zBZbg\\^FhbQ I&7հC9Ygpm[e'E9FoN(=uVĴ⢓6kċ^%"HrF0Í^W1 0|$qك]G||Fq{F";т\p{U,/b> v‹Xc #Ko|Qn+<ڕ 6A?Xg$T\OO&4ZjBu.XہK%`Bn8#\Kc^# {` YxHNG  n~ jq}W1e.@p& QuUIL8UGlKkw[vy%?zb#Ď\9[JSOCT }t(0J4WH-Ŵvf} PB}Bb-^W?Ӿ'Ƌ!@ύb =E_?ZG$!cN 03PD uGy<ǵ7sCBXIJ)mWjxή -R Q_ |&7+[PW82k6 b*UA79n[ |{9ne Ȱ+DKcVdi[%'O+d~=@[|ܦ;]O,5*ʔ6RdO{k.Q{#%Bw*/GZE{1 PDO̾2݊ af$'@K1s 43IΰѮkCBA6dWg`Uf49A!%/MLDzcn?R~/ 4]Rpn /+-W?Va# 4b&\cWݺ%acU lBZ*xF  e=}}XdX@V `+ }؁^99 a[BG%0IdFXEPMf=} M&(\6N)k cOFXxDRs(VӣS}ƃ;nd]l@Emq##wZKRv&IǂZK35٥kV7\ $s^vusBv 1C_0"yj[נxvc&>hUwX !H,(o"R!cHQNXvҕl j׆#0m{u{gr`h24Cn"c쟶ﺀW:^ [ct<%['U򮮖t.a}OƩW:!G$Uz"D2>F댃^ "S|L6nۯg.}o̪|RɦdE %,l+k镙ZXn^1A hb،  WVDY`t0Q=~{`ǤEZ)MQ6xZesVrb$J ¹m*x?ұL Tbn6,G}&!B0P Qԣ^-9W)?kjc _cS a,䑼.P0ڿvr? Iu[sJ짂)1_H+|'FkBiIbYl$8 ٝЮִsFI.?2m= +Jznߢ . e$ /LWd4^fqvkr :'J>h7hvq0(7ǿ qN"X[H:E.J[K?/`- uOn0Q iPҥUsFdiH/,&ˎIj8jRaJR澦z]=7E1ŬDr?&q>yzrd/~lE[{uJ<΋lGyRW^` eDeOa?9ˍ!"WmBV|p9E\ ce\g|u{i?ͮa# X@jۜڿ3AB>i 9&M iSU<ͷ@A&+!{)D#w3fi?tzW(P㪼>4aFW Q{息E6llb` ڤ)]W4n'lfi iȢ'>X {r7348PT+%DMJ l̆F`hqtFO JUD5mpG#_eBhnyz E+wc +o~׼UhSDQD<؎unFhI,0UhI;("7Dy_Jw۾w/xk !s0!!kAIyH;yrs(g%sj;K#p#SAA.;BL+m~5s' jՑf8'+2soa6]'84Cs]+Ī5uzow̨7bIcW-b8ExuhJ7' T}GU n 犺!Kؖ7:T0*ԭ#ҺldycOveȊd=L-" f0Tq$+o^"%|S;ru>;'YUrL'"TeؕE筞bTHAsas@h_Kh)639@ w`G]"I`}wr\[&o{USa$\ȁ\ۦg4F}\)=\1S0h.-_/`]\ J^d]iҕrcAxеAUJ\kl‹#,f[{X?s[^2j 1'n# *U{&&6B!3ž sƾsKq[J`Wb~lC)|B9^X]]3 dy7n48NP?ZMJ?7+ɷ9[ ?XR ztg",gSWɑ;5˩)Ӽ9܊WCJhKzتRT^[6)XhPs. @4ߴ89I RJ[T%K.>ãs7Vx銷fRӷ;ESߢ^RNpi W q^@J{j"11iEFd2L\tZޟɾBޖmX?'UUP^ArW՛^Ƥ14fRdqjk.SXj+`SXsTq!dEs<"r{A{ZedN)!t(xN ڶ˙3xf̐FwӄK7oI;(pvx'Pd!g`΁NϿ))v=m5 vH@ ȇةw u!}Y.^]iF#@UJk1ԝj]o|- <.b#c]cGPgg.N{[ @Of{ $FoRQ'l wުAȘ |S-Cn"d!_eV Ϫɸ-0ڶ$2? C>,w%Z=F+v)ve4b6ND$&vᄑ-}f;gD2?>/%4bYtQxr#gߟ`;JJɲ@\ *,57ѭ(u9|GɿZj$]3g6Tˑ5&w3iVnalrу(P ̝+]h=JJ%E捲OHWI=x)ڼ#5u~ JCHŷ9#\f.fлa?4ӹ:tR$߃+yk$n0i(:&;MˎsK»wsyYG9gq3ƣ:e\&ޒ-kxmWzBmX ]~dnjmS?)GCi-T;K7Nk9bs?" վz ῀PG\@q`5}HzFΆVCߜWX ÷iy%iR"(&QJ ALVL~F:t<>&@#H^m=xԒ/Kv`{gۇʻʺ` 3NAR/'=u'ar*sRV"-17tOJP Vmzۇmu, M c3ZGoBM9LU{R@<ԍD%ENNQA~јTHÕKtՋ$te3!o@Pyx =2k}'JBYELQd%SOyWg<1Z։Y*I`XD(rXӂ,>S_T/kF|VHD ہ,K Gyed\|vhH0^:倯G 6V} 1ju@p,YiUݐf~<13jX"Ilu_F: 82mS٧QerӾ:xO|¨@ ]=[>%N疜>_v.M8 Vw H@ciUN LzkW~AEBt_!Z*iqrnUm Frgbw~i@wwU{Ԇodr4J]~6yW,Sݙ>u\.ihBOR@f+bw55x9% pyFVK˕iQqm\[82b4CA? f{g [?_=|BPA1Re/7]>{}M8bFB9;?{c1ѠjDk5KSrB# xk:[@r+V]儣6i_auy\iWb^.8ҸE:.ecQ,y^^{:V]~:#q!3vnc/p͢JAqjg#sA.)|Jl4.UK2}XGwO740"lWɼOR"ڔ?2tmK0CRko/]sēt9hH1V-0s1 YWnRc>PyW6 #KLҪ55b>ΧcO4O:qb@w#4,2tH9LAqTL`uUU)]Oݳ* 9 PGAvv8h4 %='19Dp@vP$[x{!IX~/Zf ϋ׷oƋ@ou;Ez_͓ese63C"T&_ґ%- 95M༈ i&ozj䞚yl@)%c+2!z2T``WDx6, WDs!T{ko\`b_)>JW9H[Ta*|Y%V*:8s{)l1R~t X Ur@?I HU6[(8>kٯGdQ^nXM?#@-o\!ء(Dt>Co\$;cYӺS2 iqsS_M46Q8g.e= W5ֲ;Bt½_ۻ)o Tu=d3}l/q ײ!I4ۣo,'7OF^/?ZKŸtо&agQ+[%4$zU귡^7Mz{niyz&)ΨeƼS$alzg}_i̛ [7QN+_]e4 wH/rx.cͯ#Eh9 |#” $U2uD!>-8ca W7)'184 YF!x5&+PV4:|C]a.D,Z;;E2V,1ĦJ|@`PFhߛ䫊7ቌSQXʴ/ˠ`\k8O.3a?ks~ n~s )@T >7k}aXK1Ȭih26V֜3qa9VxuO C*M\z pSpB&3EJp"UT>OxZ*u\v \ۉߺ78e}YM.Ǩֹ`~*/Un<euԕ!noNC F]Zv&6@kmQmA6@uS$lFSwW:2tY:D]iLhaFe~8N @yn ۀmQ#|YzAPv:OOr^F>um2'/{lKBǫ-g R,] p$#IÙlp7}qӋaMp4rqRm.$ D^g^C2rJ[=-J7=e)AH*ȘV\,T: օɝbt=)$Ȭa?ִ=$  RUlH[_$ļP ʽO0M(G%g,2A!sF0b3 %z_NPV9d 6\:0m ;V2#6P09mKnץ0=.%:Ymʝ Y$ᐧp֧؂ÍFԏ΄ٓ@ߡg *oVt |a?=#ٞ7?ghFy @B.܈"t uK; 9c 6Ҹpl $1L(t`$+D¦p++!!Г֑(\lI*ʞNn%cK<~bɢ{{qF͠\|)q᫬&D^Vӝ6磭Ulp\wAFǜKeJ{rrVg̫0]lmg3ؓZ9h/s [x55+$Hy {sr vԁpkG uyپqz>ŅUp Op[/9WO$jj8* ۵ 6C>T:UT 6nf\bCݶQ-W`Ra~`pLh%6ak+w3{.a KĆtiIGLAxܐS-h nLu~n:q%&L%T0BRXE21 U[Gel;vE13hOTͽis.e4 U}5‡VT9@ ,nw<ӚؚvXx2G(Jm y+h ; 0o@Dmviy4?ф[/ʵOK8t:G/*pBvR qwvoU7;bGN'(zk~: Cb ?\PDmĶ=w y=v'-W|" .V2:W\b3pw0m+WSqpϋؗ5FTkg'Cb%#u[I5%Yπ3NjTdȵ+72:LP2ڍq#ڧ6_۞yG"㑻WhGFmtF>6 u< p\E,݋hZ"Kޑۮ "5?.Ca6 {pb,^W#2>ŦN;=Ĕ!p'j_яV†,+U؁놰3[-ג2:6z21oɭ3 t-M.b&x׸v+kD& [T./AL/61 N}fGSll&2 ܁'L28/PvH|By[TCg}102GbvloH"uEjKe[‡u"5`ҾvxPFmZw֬D%G;i.{V~û}r=mUO6ÇLAte">V0Q U:,8 eTqTUK +U9Zgvw{Ӆ|NA{M3DRGipNS1k &%b]S>ߔ8w{rp{<֗HVS|qU2 c)s.(^]xE%| m׽d#W,h'ӽ\ޱm"mi.d23Q}"ȣ,ơ h2Hz/&Şga-6FBEso_a7PrзJ s2 X'V 58PPjbM1 ƍ&NK@`:2e35XܸsMaR҇ueH5tY]?< Έ]Di]lV%#DwISrYE˗B@&cٽ|p WK 8(Vn"m F/tRfߍ&ޔ 6@3YR{ f5MZ6!Qg]4/LM*ʟS_EL$u`X6/GwyXۻ0l0h}NX!}8^fHy,;&q) p[! 4qkش`H 3 $*N5 h:Sj>դ<'n#nݽtNL\:M3SO/4惋Qpg\"{@\B``t$n+l˒s[jTLZlc̶cTKOi:Mi^fk b?q֤W'V!/]6SUeO]c : MwʸyBYbyc1M)$NJQғgI9蒎ϟP5 ]D%~Ya3!s^)oxtֹͯL8cWkZ9c>v0eظO$$Q0323H6DCtMUyF:ЧǴpV b뫁 :z9e*ҽl\R~RҽB/rqΐelM!!+{?(VAMj[;9H9_1\! sɜH7m;&s㟖̎W; Ifhj3b-hEg81]o[<|ڀCrA__hЀM&R"eYnBGvFl!'W%/ՒVYq>0EwQuܲtb37K֜mğtUH5lP^W%ӊo HdkF 1*(\Y&]N@L*-I9CiKFc@ veY;\" to7RIbLs"E9tUR`aN=뭝Q` V\:Gǟ@Dc$;E&o9 1grM cu}@-fHa ]-W5V*#u;؃l @zڽ~ٸSg]Eڙy[z6; i,;{CJWW~:b>ۑV"2?ߣ{0 *H65qZ&e&!3vqWecneLО`h#x"vxUl`s  8Ǩ N a3U$}kCLz($py  Q蒯b `+)1xCen!+#$ \#C(.߁D]! ^B_'ýt5HgCus*,'cxІ*\s;nO+ -VrQ #ON_l$2}˺JLpF2M뚡K7rw,>R %։hA=7PQ dctyOIaGgmv3k޳묙hp6̰Ow]KoK_+O)J'a: 5\wj -~17|$t{o+PkȬ\"AF07G2>E迆ΑW/n5PEaE5U+vpŹ:6v n(0c6mxg>=TT8&v>?!aK -B h"{@EJ-P}C O)n$&ɹc&n$() &ϿÑ[zB'Xv:ʸ[,IXlQ=؂l!{mxI&|h`ZH -xq6iR@S*x'+鑲႔x 9[K;ȆqJ0L'\biAh@FA}D)Y±7? ";{RŨ\_VHbK=1哾oq[o,p4BR @7Vh5qyCCLU=kEzbfU\ 4/W <DZmуjD MȦR ۰,i{Vq#HGq~bq͔ڇj)saqw:6p= g~:3l,|卝x#D/6vxD#TJ,aP∁޶U)`駏[Z$ zcŇ#{? _hms{yؔ+@Hs-2?4ӖmŁ%,cg+S )߇*A'r~լJ&D]4[[_jBt7:~/ZY?-fjо\<*/JWG >p̶D:Q7D%fA8!s .z͈ĥ_@y`}83{ HĜ\‘ >v2[ uO?hJ̍9+) ܺIj\6X)lbn Xcy]9L##EL(Е:24x <)bxިHJJ1H.x/1-RZ KQhJ~(A\ 3=4c;<>yUp]S͕ӝ}`+4ģBu 2g2`Tʳ{r"+o? %_ΜK9Y9x!p_q70xMC%wrz}z19N#CrT0d \ +;^xd_Zw(hqP>QSTƐ'Y]^xF;"{ #VORKXnDCZ D|7t˲~N,<j\P*iQl1rd"T\;8g\NX?4U"@YR8 i1j3ZwEH`į7>l9T=GZ]M^^lU`3hVRD Pj;[y#1d;ReX@$#~?uIP!j4uxw9[tʈbҞ

=rx27!'\>!r=1Y~WFgH\-I MAR(kDhӧ߄5ɅUSNJQC ?$K\.% Sz1|c~P"^}/OezYs$gJ!boYs;suռavD U =’BZ3eu0ndJ75lЕ_Ȧ_7.͋$~SR,:y<\Z=3-Tw]SW#+[բF\j`1Ȑ}xBKQ@?vMQ8UrM=[s&_-|tܓڔ?QgR"{*ٓ/mQ쿇)u'!_ 駸X0 pw6& 'ZA6)7 ߍS0f,Q̐33@t.%hoޘd4Qɛn #UTMQ Xi3Gusf'Y0(&0ck a0Di;}cA+k3 v5M7U boĬ-3FD.|R2sA)-|#ft2*d8}9Aa.3}c77XSA2$S N/cA׸+ }E?;{mNt+^ 7d#z?bKݥ%>H" 'nݔDxo\"\?r= >(=Y@|e0"%g052mbF-A0rG+j)ELs1|Ѭ.ۿ*CyV}n4 m$5/'Z% >KgwQUh,[%o5I"tR&fߊ/d+z;BG*+73ƒ`B;9{ZM8@E7F8Kjڣԫ`hL 4kx@2 D"z:눁| ӑ9! 7qP0#zX9}cĬNi"]X HT2pp;gΓ7Lg3=r$ '?bǚɣD ӣh!mں]`dbK;|*yH</.Pxਠ m9Tx.Vd!0.I|ZE 6IBE)P?8}@aOqs\ǜ'#L ,.A?"rx@|>ߎ|Y_1a=FMPkYvl` 8~HG7=edHrUh _j@Tu3vmab ;;b$PQ*MS@5_vg092z6 8Q]k*f{pQu/>>NHJ^&JnD74-8c 4 'f#G$lɽe^ʆE|(dpT&@fsx>*#dD*nOsZw87 {`C=N+K,g~bN9W (x]z\(+~e% <}܃m|>|oaPT8 ӺvHGq}8wBK9| BjtuϰsBsgO|T|hy$ $37\<aPDKt#8SC  u-nZ]9*3$0с/tՅ y2 Il!~G oY N/ۯɌ%\|~j?|uQ`ZmWoǘ\Nm4ul}6cTw5?/и5x4*-*sE167N(pFGWd:KRM&qK*ޡKAPg"lBG9;y̱`;wy̨gV 7!& R;wb}0=7PTc@*_U%[|-h n9lb`& ZިkQB<9JC,ɺ9ǀI@qౕ,X y 2f1$ %qVj~JEuđ<6C/MGxla3u';¥alJܿqNF)2eNfPb.J!Q?*M V EN=5ۜZR"Y%T];g"2%]œQ\$#_lziA1W&WyZ4Cn=YfZi,xja6ۢ/?s:-]1^$K%dKmZkj|LL`YK=Tg[!!T p|Y ^\1#a~۰]9@ [vs漢ʻynL$fI Khj2ZMx_z}V*tEuM-d26-;*t|P9$]iTӺf^}`kй1c t-wwtƗ|avC pau$C̝zəa~Ky 8|J>:'Kj,Nع|Bwާ{S1n7nz/ , GQՕH| ]۽¤BAx+w#ĩw 08,sj-&qڂ.Tlφ\k-2Fka3>&'@p R mm9U/dɦ'DpdX^6KIf8΋=sɞpR,Ev:?Z뾸U& #RtR 6RFݠm|ӁGz,:7V3.FKuh=`v`Ng}%E=% mg[ߏ28L#ޝi 1:~X䛝z M1VK4KFPe0zjt"HJXOddLKX>Gs@!(jȔ/+ ɯO׺FO-OAbM X\W:&1Sw2}F2%@y"RA!z4Tom\e}_"j-M`pKAZhǺϙP ,9ABiHUC9 tU/3E'W3"7il9J4q N + ɝ2EHm{Df;̇ AP7M<_YgIG=w{\Ğ\PrDUR !C}iiRF3N(U3;LC}{ uX@^6 tv(O%`^9+uե0̵1+Ri~>>C}|' ~n/H;9e8{}Sgr Ovu7!tEW7=e 4ZX\ Bۀ(yǯհmf!~ψqݼ0B!NQfx'MdW*8b<p[$ˢ4k!(䢼@%EYG ݦ|Fw A>ܿa!W`0[zY8,¼^$'IO(AbF3MZ@~/̀k)ZLapWfBCF1"gn="Ls6*ZЃBqwJz"[1ncYk /?6@mbߡ}J`Ehh]>HttJʫW^IXPK=r y ?w+KwH!'|‷!'i RfGEdZDyMj1zr{>6zoz!5{8شXVش.;\/V犋Su,4~!f-nʭ'|0E f"&#`/ÉUbGEl L_ZVwbwSi|6ȊDNbyqwI*ub kCщ ){e)+΋)|Vn,BGҷ]Wfغ-y93& $W lFPʸ0t#ܻ8iirR9wl3MTf2bTd)6 kFBl=&\FgA1h?4*זƴ qdɍ&LLlp-JZ\g{\/#mNUُnHEN\,Lw7vdC%is .*.S5S7H8fΔff矜J7b*Cyc/1*!x{J*b^_UH篈;2r8t^(PەKL:PúRQhEt>; ]yY͗Y!"AұbPQJc";T[ No8bͤhLvN%)Z'*S. qp#rʤ+25\jWI@$Ozźx0ɰɐ|N [ %)i=oM\\_a:TC}Wܲ㦏r⡎ ~[9$R?djz Q󤉡}{ ;H$ќ!²Ux,H ͗M` yWmWY/;qؙu6xo QNxu^C ʗL+XXX%m,i/`٩,l$1Mr^ ֏h}2`8^d luԧp=E1该ߑ.2>l?[1Y 2̓JY 6ΔSN_/ Tk[͙(iSr.1uGz<9ѦHX8Wo+-zT6iY&sT|M;%>䏽gW5ڭ>0|(vGο$lxĝľ2΢I>KC#ġAKfQK4ܯ| :O~c5^^̙ G F}&4$Vg6dD@bXAtZ$j0bTU@E,'TΉ 'Nݙ̩㈫ʗJfǤ3~|:܃nAр[e'q+&jwkW-zK0#uLn$s*$U/mwI._k=BۃX]{'G%m~Oڷ;ꌧ9|wzzHln-nuT1yRf*}76B4D)e&BUGoH'{5[P] bqϏPJ{رP@uI!"K5W׃h?fo^cAw.*֌%\ORxfj'C/v+z Oi75ԨfNU{>YYpGɟʩ[_v_1Ϳ~;"aC x"WK(8G!*:G,q+1c vߨRj率O5ۯ[szk>+b0Fd 4\jErb!ڗr=!pd'I? 36!hЮ\Jcr5n lס6C-<5 a_pAEgg(km-[.:: k[ߚ7X=Y@h^ݜͨeY;.<a5n&^m_'&:Wbij ؘb/0-yBoJbҎ_Riؖ! &:u77.$ M؈@m:-dJڽґlM؎XyhfVxޓgO+훯=Q+"Ȅ'qKYθQŠ$Λz-R)őė4XMM:H Vɸmf[[VGXD㿥X@jYG'OVJ[#ٲp={N+c6=ĭvt:H9ҹzNQk浼InE VAa HW+%ynRC(,T=BsAa^4t9i s\K/}4(FԚ߱{MCUq ڥ,HRMbmC[tE-%>rhMbyH[9;ޤ@63**&៱ %Bkj嶉x.c8`J@̈u]7Em4Yp /L&Kf+}W;6dzEX3DLf:O>W!h-hꉼw y7.ÑZ[ۯ&[.tOq'cL5>TW46d6A4*nY8&䬚g2t(RZVdxۨ1}CUy L܄#v [V:(- wO*ْ!E֣0Q-H\B.o'Y$|0z>g|fJU)bE"BEp0 ?5_6L=6kGFӞvs8&FEK/fnR1uj|Db_0!PΩ.<C޹F@n$^Հ1kuGȵ9GKNUV#<hs&%]MH#Qarی3u ]Elo}Nb!|W$ca>c1(l#HDrOd iJtyFu0ug <J? 0סVNDF7o9&<(l"[ p + C -pnqD>RsR'1'Dgq<+ 7~>7Nԣ Դvﯿyysn*Saߩ+^wAܦX dOQtZ5va{?7qxWjf[@qgcGռ{CćGMuLuAā7+Uu:|u}d>d6.+Z{8s2#9CE;,J@3qG+uyGG@bXؕvGgCdzEd{`s="mKΛ&Mц<ء>.wF9HdjYa#QI"):2GsqA>yu͝diH0 #O1Ku3ƥSA]J.֑mqyXU)`]Ɍ|.![x-Mwr輻`ǓqmL421N>w@V9đ$\SxSވFˠ黠e$В&ƝalHM0XJ86 ܳuT%0\g~:rJMЕhmjëcjFyKM'ܗMπzH4Y4u߅5;y+@}U먰·NJ+OPzUcN[$X͓zV+`^Y0Py9c(f5tMYR6#>UisrJ1 zGqc"CAŞX_2߯i܃c.j:2$SJڐ m5~@<bQ67Ƞk>JOȞ༁P/~ϕAlݯ=c=o(T'$Q^Y[u>)Zx*MPI{ Uk= p]d"㥓! ל>"m;nn(& ,x 2pS~րQl 1}4 'yȿ~A?rTY WIFo:^qa40) d1yt> H$c(GX0WJ/ Ó yXCO}RKctg{U#dr(Df~3O]ELR ~O񃴏P;+D/ǷnGT v%yhemSbH;0Ϳ-~(Vn`)x"|R1/peᠵʌ ]F(\1zI`ja2Շ 46Խ]X]\</h׫cF|+^^ƕPu]{{cD\L zV s/7$ 2jA~xM!}G= +ΆWtqy- %oe-+""7x!Ie).=܃j̰LH*+9PuՓT|;qGỸؕ dSSL\ ?i0aa7cĨfO$?l{(y=%)1- P*?9iA \+أBUfg+mjXj^4'Yn۫>FQ皥S1n*׳G(n~[A9*3p N:g܎@* pM&BˆC3D^tb`baEtC0*ې%g%P`, Z_鲈* !bKjDY>k CO!BwD ѮzE[G 7-9$_H\XS3j  ^o=oׄ|[kH] }I%V˙@pD_;R\.*Ab=Y=Qt%`nT>:7Iq!ݍNhjjfW]w4u.ao!#2i3j9ݎ ]D,Uiq=z]2z*j?_dEY@MЉ(G@oZ^=U*Kauy:u8=)caj9qi#`d$1kf!3lfq+BF2 LWuu $;>YD p7v50%:ČZvzuTXg[AUlBxe=SŶ`v*ݣWtX*!؞Wvn oUK~vη2+;=5%a|݁4)PQQⷘ`( ݙqZ<ҿx~^5n)Q'"\ҔW­+Id[&AIċTG@q^q_ʈ)cȓ] "!H5Ք;v:8'tI>ʠg_͹U9h~HE([kP$/7Hp ^i3kM/z2ČHG#H_i6`U隃u[P:#r^"}꣞5_-6 )dDLI7 156fI(OvLcM 0W5:gJ@ b yT1ek<mBZяtؐ& dV"oտ_:sTk+NsIOZqdJvv^nOWd'Ei g 2KPbf9Jb''Esa:O4xJkθ{q8z•l1Aɿn/KS G[ާB&<\?mnSJ-2:Xxmx!f?Jn@Y5H~zbHj8"L COlGe2X?uWpVtg\[j #썽S@$P?>ʉo7qn6IFϥP\)n#cq g9)<>R|I `^bMl*lO-"C m^y_>@EmjL] ;La<^9-r`|GE7qځHdFB>LhQ7B6: /To@N 5y>ºMo-a00mGw4Y&/5#\l K Xo]1e_D?  d 6zpK7l5YXO gOGSY" -%6/5@`3a-[`NiEسgjxl *MD$1P<:<N}{Z^Q O/%Ջ&gFvlj$2ڗeȚ.Y߄0%`:o잢7}KSQI]М #u@TMȉv΂k'u w!Kd w=nr{īP5f,hǕzIuY9r42;ܗ| I[&O9,3tԨi/ˋD| `>>x%fHػ%CV_Zj2mG͚;;1W1uU&,˗~0u.~Fc pHd3eK欹!&%9%0S!8֌b|&{R6^k`U<2e{ TizQsNyvQ_Ue3.6|V.ϖ6j7ľԢA"4SklF$\bwLR*^FFi_W~3~>PNRӖOYo& b6VOJ؊N?kCOGK:OOQHl e}Ux>5ČpX ,O9p%0W?UPCY偕FB gï.ݠ_\qg= fְĸ:ĝ歽PT`Os&Yj)HGs.|E1,DJa;M7:cFN/N"|Phmx#b)_w%,bѨ VUGOd8 n^1|pb? ,ek{jyLXvk1y 5xz%'7>'Ebc''yXr&kA-`Q? O.Ԕ+7O5"e3tTpG!7JPaZ"s>eBlgr?iTdȡ|˸$d q []{It4HMS7=K@>5M12?NOʸlևiH% ƏI1o%K6ҧvm#"Y;v@:L:›MpWu|fg'Fݚ[ S _ftͰ?v=X+g3ױEG\&9VYEeҎm }Og \oಠ ]5ۨ505JB0-М|hK?ZI3>5.CCXߞ ?f;ζqwg`Usm3$iO4![u"]>qV f "г@`E޲|_FN+_#Ģ$kDF}I E9K/u oiDᗔ~FZ-WӚs θTnU8VT|:XZygmՈ:Xm^/JKŰjG<Y19,% R( Zz]xACe[*%\X^ϼI؊`e,TL$n긶tyvnէvD,-x|e(9kQf4l ɚΛտx;xe뗬^=E~NgMZ'T0/% I4s: < Z{0 u0qu#tk fcPr@o8T8!/1s:Ιa )Y{0!N'h\>c3F9V4eGUN82#}|K^G'[l=)WpG@Ǡf$:#-ԟu20$>L\$Jfg B}^^ny>~^Cj"ܢ՜$| 8gָ4az͝X ѣԱ|gp2j>aC0CBfam `V)寕a@(RnCP;WB$@Ղ|]~\O«Gzx:ێ/QceK`wtwi_d"4Veo;wlU,wY;MQ<ڰa f{}AMltUp]iޭW+XinWw&[EEni9Wd+ؖf]6jZUrCa[NfMahۗ߅ENǓZE=rfфRXIPkɖkae+.ҨsEqy]!tGz##ӖMfAkH~`&;|ZΙY+7 huk:$}ЙҐg">;5#b{(_sӸBKΣH8h5|nΘ:h3@ z溅d ]WA:TaQccw!O:E779m6[ll.=Imbnn1˴CV#U8ƒI Prv4K2dn؁z2P ^n," F,bݬ3G6jZ[(U YP 0e4 ' 55spNE Hn#C%Es h۸I7Yz I᭵g/뼾>)=Bp$/ 6ICwr] ^lcڭ^ݟG9lhi_и9XBB+ψ`e9yؗ/t-eBtZ{ }&j7I!9azfJ݉dd Flm?Bl8ryuC_!m%3JGvT^iCA^yF-J#x ?>U`Ǻ. eɭX,EH2ԚJ2~!+K^5Y)OOjJ [Oȁp肭A6SdUqNr4 o"٦H(@ }f X%gtƪ Λ lDGa .*@]磠4@ * W&ࠖaUzǣDݖH2]U0#(L`]CDyamS3ֆ Ueut a~/t;Q#Cw jnϦG#F4+BN~li[6J'CƻRl4ˌ*ZbCf̳!H9t!Yb;kD-i +u$u'0BFEo.UX4id !`*323x1CRB\#{SCثE)pXER0fBpD+AeELn n`u46Uf$صo7_Zs U$ф}`ibzp=Y3̘SD'fr:{"K1Jewݼ-&@r6SB@j:6uW 3BȍZt}C $-6M I)9AIKB|-1ds;%7N'o$Ǣb"%|^N:fhXOv-8ϝ_29]W<fX >J_ͶhT;LF7é.׳aat%lUj?+Oh36SY}j3³7PQ[k,0I!8\չ9v}Kdр) `0c) 2x\Sr2c5EFݨBT)*(;Y zmD2SSy=3c)^!ߺA@b"f̒ozD󖓠sRߜYSeIeIꒇUG%.'U+Rb`~uk!x.TcoUҴqԸq_G840aQWs^5Sw|r|9aC~f Q '™+Dtp;-/vrT/ոy*vPq p^2 f> !@3xWHyv\7ኢ?#\f0B Rq.G^}`<DNzQ. ߍçqfI3vj6Ls`٩=6?> _-QSX5-gk:aMR_m6 2Bܫ\Cg J0Av(uUbQtu[wWvu'Hh䜊 MR<^ pm_eƧwUH4Vk*kX3k9}{xT_[SP7M%fzz$wćIn΢ҫh}M*o`BNXjA;ThA\p 4r-*ƈ>Rx:\<ȘOsR/9h`~F(Qd/caO$<)@1B=jbܤڔ܍p+܌k`kJzt5St;V\w\/'dhq\A9e(T #ѧ9ШQ#]8J%-2Pgk#|C=舐І` >o7>C&,RCfS#?V罣~^ JXJO_e&TGW<4#ۧܟwcr,3i1piU*&:^N__′Nݶ+vηZěgǣN^YSM }@tTxa`Pt=4bp5ej:k"yW %GY{`_~ P d4Җ+lT0/8".m&+T!(eFd/>H% 5l8#.ݑP(i00;OE?d-R;\!ݷH"_!/>p]xDEK!4"\ҭ"oئ]zbP^l˗ Fey2VdO,xi1E+nJ7Gѩs|a?o Y/аHA*߈*mxLL A7ElK|6^ur³nl-x}*TŃ}VA({ԪfJmd+~\آlnЇ쇰q^;^vVAA=b wx^sw<ro[<Ys.U.rqϒcXœ$;|hDP-+!\K{ .',1}@FΖ w&K_aB',Yh<S(hz"^v\ālWP?Ƣ-v,grLc+=rBUݗtK!*JMM'/(ÓIp}T)"2D^,πҺq0h{K_0@( (G28uҺ#MաDhS)Uo êj"nthV]Bㇺ)4@IxIM\E ,P"1jeReEqB'bXh1TE7 ٕ $3?j~2h.:,*mzW%?®o8TvjAIK*ih &C641zd2&k9G2**SR L෕C;nQq염Ә%1ZN_"t AȞlPGpp"ӱQf:D+VE"ɣʨ2I)1A H#7k_~ WJ'ǀ;O>b.znBi]4: CO2h{IV?4eVj RZu%*(CoIÀ:ٱ ۯQg6zwGPP]eHǖ3*d]$++Pc`[i|ydvtŧ:eG@ I ? )Qy<ѤjM [6RrZNȿ]r[`sЋr&P2*My_9} OTe d[ux $1;7Eޢ YF.c!-H#TU$ʴ{ck+iZZղ1^_KFb2SEJW# Yɧk(Q md {n͞<.z=-zGRD-̾87oHz.m8J\rL+ 7߇^^%&[O|SaFtמ>\1U¶Ecޣ07|!'5 ʔ*49'⯹BV)DF4 D"쵒ûf$tg#_ ?%FiqKz%ϫ1#A hka%QHyl1v ùL?dWgW OZ2e2rg-f_'S4(S֛5¼5<$ mIa~vh1ȆD bia"F3)343:Ĩ,;"3IC/O@~$R: 78Ih0;~*/(o7vCjPѡ>ϵɯ'̧]p!:C7eALNEd4'+SX} 8c(r%21 mFd4 *Eh$.-H}R g86RLxXr fpr{vu*1)lWՄ)\+S>*LBZg}CCݷQ#孑0X n|ftS"&= QhSX)T A*gYADUKGbLXD;+%'%&e%,@~1jT-`QnHڙh)z#}ы!Mi-HҏjѤaE7pNJ\gh$bE! zɒMU ;X#T\Utޅ1m,3У*Vbl;ߜG'J([,Jq33p~qo4ҡ{||:ա(No\ͯ2BCs}׃K[.N @[텑CL A gݱ1jrP}$<ӹ.]"-ל x~.6cS?9a1yXޗQwrkW+,%;+w^cYIT,_u j[aDtRs_ۨLf2F2]_Cp}Rc,g=T|W4'XIғኰvyŧտjox8T*uni.O "Q^FkI<Q Cmt)>o>v*:ymFw 6>|=M7^*n"㏗# *ۗɦ(9teōS7lT#`xa,//"+!vGÚy=pMZr+pQl`BqH3ErvYǁo4EpqDH=J,zĉ?/Î"d2$$'Zcjh&jGMxͥrm%LZ-$F s^:ŕ*3@j;kӜfN %HL<ҕ<٥ whC WB'7B:H*#b=qN;Cdʼni)Ek{Ç8'R">z\!lڲɸU0) 34pMf|777C E,;^yd楲jX&)&V^MϜ r~l{8 x5LG gXR(e":B/_H goVi4geeiK6JVXV*ʹz*nW#miw*w<ɿ`lԓzS:BM$ôݬ9BXc*[bk sGc(K a [VpqN%f-wʌjjMFj@&pC>W)0\X >C;hdI^n2f"}Y[B|HYp(|䎦/̔Hu ӹ2τPMXX6 :jm9824*f786"]otIrUbft(#HzgHbFBS6<9 #ܑTQ-Ի4jK >,PϺ鎃JҒ͚-8A6 kxDrhF> ˼~_`3J3%1b+zUX׬$syYlH^*&gf5 ?V?򒨀l:FYUssc=tjԏnIdM0\uu> c?_.U0HƆץϹ8GL&M 45O{Mz}ZL@ ?5e +5!͹K}Sax$< NY1=W֯c E/2MO(n PAAAfRߛeh!B6E"0bSS0 2eT R+q/y mw0b+qMFiv 2n/XنRƣXz@n=z 4Sh<\PE\T[SJb.|q{F+ϝ-.X9𢃁8x90{ "2\&>|ʄIFp#-޴\M4}yQx‚#g nCYm]qWgm:J*uq/Yt \T}2i0-*S[!9GO `hwRkKKB8 TAjɀoЌq(ti |%ʄAv_痢f"(Df>S;a:| /SZwwĕIК?ST{lpHT 3P87/1LܭRtv^]3SθhpK`NHaϩg~E*#ahc0m ڻ4vr;Gݟ, *8pHSP.T1qPn4]x\c(Tj;TSq5XmUy!5x̓+,=!mIi,Z st" =~1U/"E+<}$sTڠfABp`ӿt|Wl+\V`E0H&k~ϙDgjI`QF[C7ĕ᫖R[Db84iL1$D8Dd796#_–7%K\tB8v|b<ػ!A'9kQbgE)<Yny\GX-_r+G J^1֫l}^9!0.NǍ4 kxtiLɝya#{Wܿ&@=-A尷_g/GD |3`7DrYr욼^yϯS2r:`}LGЅ{9a/))5L0q-U"Iq:zм~+DeÛL&8t1U4* HO#>O.1SGrg<7ׂK.Pf7`5SS*rpU^LGÖ,l5@7^LUpT ;o9LU̥&l]OPM4!>%>EYO_)vVxvҞ~G'zVXg8yl a!-|hJ{RX)2n;=ag'h+ }VWeR-?Za!:)d**ue$i\ɪʶM0Ĝ K`GJc8a+%քBD7hy+B'ۅ AQJ˼r K6~&tˎ/JrcL<m.D|- Q?=C8rgvf ]8te#;4#IHVS?E(H1?/ෑMr]B_YdmMŅqhwWw;˻ܳQ{ϓLC!]Ɵ@R!WݠGJkGW˜}:iRp;KcFA(t|kV>CRXA-ZJ$Ҳx*ɫ}׳C4tlĀ-[ O={;d }'n dx)XE॑ ^_8~/BKqt)Jޭ,Vn-hC*Sקz̀Z'7u1k\=;s4Ae Dz }yK|_:e]8Xg^ ^勢d^_f?D5|+nU'f{fxF ]tŴH%v)Z{sPwr!1*dr Ԓ/grFiĀl;v99_XMwwL&6.|_ju~qt5[+X9k-9@O\źۡzTk4>nZ $*Xb ]r]_Wux<+/=ϴRk%&ӂ^ [%Aj3m8׸XDzxL+<_aW<W+ßm0a)<*uVJ,*_ITD#m~yeI\a9A9 B qD膪L}K>N$M) '!TAwE[,%Oy&mAtđ?D /dM٘sYʏׄXeG5S]N>{0(osn'Pb:#in*h'#0*Hd3V 8wX*2lZ;-bBOM\A-TU]D[z 1>45l.g%a_11;>u;9}z^ްrsWW!ߓ. g΋0l ;ib嘗,ԥf4QK=c  x2ҌYGsKSjJ &fuBɖŸtc VzbKq_=Ip妀AAS1{4n(7 :UЂ밴 θ P6~{s?t=C݊C4ZgRM1˳rog^팕ܜ֧x[wZSu.ӧˇ#tu j}X_:-ZD3&p5Q$E8%k=|>bVb0DЫ`{fKt~dqj|xH% wFa ZD GK?T4|\wc.:~ͼiiy+v,PU< wbiХxj6%Ń7QGffdlF&;p־1lUzSW\I\< Lf$>8uQ<'>&}9XdOP>JXgu,cALss&}fcg-ՉUEpfiV9tO:7AtgAG,</)9ʙڸ_ER<LȽnJ6!87ϼ32f='r\ ",:DQLΑ}l/Pł3=^ ցH2HdO@c)*@F}P`aĴv%ۉWb O?;3\ |jh9޽.np3ubn;7ZwN5ޞO&ّZb^S30Bngݖ\56uJ^#MU hh7jfzJ@l1]Y p|Ff\& 1;No#W8;h3?8>敫+iz"*Xs>,@s:l&CW."L? cÌ&1:@ઊCuflT2@Fkug{q\z,?+ (pHCK/<ϫZH:T(7y@a-%F)t`/SZ="UvuI$0xl{! &s4rLjTTp!=jRQ@Y>|I+\7h>b*pBS'T5 7H7J&h9ΪM|?j-L{T«<>sܺLH7P&jd"n.xK;YD 'M" `1(x@F,сX=\9z +nY.uilPPi\]f~ (qEdH ĶûPsA{m R7SdL ψXQ=PI@Gf/^Aft}Q)ӂ&ftzPT薮b-DjZ9+oPdyV+'3Wer7WjMX$8:\*p'zjld{L$ 5lC.][DNgi=VݐsN.tᄡ&yl%Xn^sƃﮑgh/EQNj! lg}h#^x }?B6N"AVdzsx&+t<djrIx1L^|GQGf{7_ܞ]38V1L,9g4S-0E(>FNkΠ CF 5^Ev=YΙa0™s;r0@+^ 1y & FU=t$oq4$h]-\7մF|焛&"l:nud$-R ʉGy6ñħ! 2-hH$a; TӸYhUy 7C[ LԮ@ĹqTj"A_~3:{őV]G4ŷϭo %$D8g`T` ̏慺Z&TvM [XT ft%hdy? O*Dk!X欠 vƂQ^neq8.& xCY e /?2qإڝ3~CT@n[?3@҅dڬ*tBp_{9f,.f[}a[Wb,4 srȤY+߳po&bSSv޴5QN:]79*H=¹|gS-7>%=Qޕ &a[Q½T6 :{M*.˚&5㗹h[mo ^m) m ʢ7(iuvH4-g`FY'm374syyh:#ʈÌvao V3]t (Z|r8&5?o^6MgSʯLobINt-4 WCVڨ;' %t)8\֊-P yXw"ŧCV/;gT,i=dGkLՖ&1?g?paBT(*mKlaoӒ,0z)Ŗu:\5 UQ{ m6-APͽ}/&nNw?#޿2㕝z>_'a}st)0:"~HV~](F0&C/{n]:jq!أܟ䖏佶Dx|N}T|}ztkd$sf83=gŸU]vm%Q\<3ư-_̾tz:iQ`PP~ް ^1?p3?c3HuS)w#3#*4;c8k! %aMc)NȈWbn+'@́#GRįS< k:{'A:S=I `]B&=f;Xжq;ZkJ H͑"M1f(yhX^Gh7nc:헐d϶@chҟ҄_ d;69p`5rhtۗF  ]]KXQS)p kUSbd ۸̓HހK՝)%)ɵ% kݧ@,Z3#nqWRw#<(lÑ/=Mc,,H4'ON,@:Hjs$_'` _{gv+sA{׾ + Uqz3T?@-'UV0B&UeE$tV/ntIjo^g.\CşAr3'-Ml/-z @'>k!*ΏӤiYo׫+TEFM @O=$Ql3(qJ`6UD!Wwsm-.́o¬59P+T XE=%oZ6^='jqu;;AzwpiVi:k׏ɖyW?Umgي8߲euO+/M2(#arBrXeY-'șM4'"$ kmu*-Su'q/c^GdԨָR͓^ktboN$L2|?CJ0'1ފ6HR0L@D ХƞKIaș.Iiא!kHTQ =#l7:fXi7{?D^"+>? wo{ƚ $q4, bEh lri@YȾ_#SS`靕k\N2_N! 8q5YW"[O/K籵ױ/A/KnBvV2XuD_;VIO#`1bbK1J'SIF[nscɈR @A숤SGM슻p)ptj뇌G!z$n5zv@rp/4}5q1W i$XOR8b$tiI 9,Tw|W `}-HWlwb7 ExM^:Utc;wǘņ> (*OQ?=OԽ#M 8Ġ}! [[m[Xn&XH5_IRl]0 u@Zg[%^0H\ נ:^MѵD퉔0?EeO, P 9ʬ+ ï_ÔUi݅촉8?C!t 1/sܝmtrה(Lhe !ޝ<s ώ?c*Ni4xsA:u>QGM,]ӾS'nLDwPr d6(uYadA<=zHb=Ƈ Q \W5.T_kM߈)K-z=1)E/~T4Oj7o{-1O u?l~57 !:@mej #6jbShU5bobw4Gñ[E&g̕$ '$)BH;_>q2|yeGPQ.4KRv$Emϴ 'P6͌gn|}nCGEL+rq"mwÞF@ؚ(QxqEWaQH /Wi-MybcxxA9w(bO)2yw1bW8 MVұQo%M C5宻Pj4f9u47]3띋S 'Q_y(z֫kAotyB4Iqa In9$xȋ7(#d&WɼZr!wGrJB,֥8w:Ūv U,,['nh蘻 t9WGsH{֌K6U_(){>cYpƅ*-Uj6؎^A ?.Ifs [ݗ u[TdmBU|4 JlGqm wyHZfS_ E {\Sr;.)1R_tc>S#w46F %Mvg PNt~|݄$X0l^dV ?52p8N$9SU|ViFU)m[YfIkUE 0ʍ7-xja$lD)kk>eqI[^ YmWmF:yx o04 .rmz1E"POqOB #[׋,6K_4}`-[Tk6DbIjzi[٠4z7ɼ! [DGq|t7oq^ir< AֹqqKoRajIC֛= ~SouKؒBgLNI2G-Pup t֖X]A=n=>)Ja؆Bawfu03\о2NZ1?С' i 5Z`\??δA9O' IDd b~ `[Ljvi4y)Wk;bBdeSvVcܾJ#FHwJ c99HetL9^Xͫ7z_~㐳8*wh&䄉w(?$S,kA[WJ;JL g.lp[dݾӜ<[kV |EZDa ҫ7^mlOlu 2}Rl^75(DN ׸D77SX FjGjG_\-U#B.iiuZ%YKMNǨ+-̹}Ryf#&o3)B#;.G ,|aIM% # æ??J8Q>$<ԙgҏ?E~A2VH괙sP_,d5A "Ħ쪠IuLFw7Er~˯s-4 DZn: c1=R2M(啅T4i 4\jB#n$ j:<0k(Px|EM㋸mʃj:2t u"u\ԔKCsPw"(QKA'p.v4r!KGHWBHNM# UVV(w%P TP.=3 WR _+M@0[=pˡ1>a%{t04p|3Z/(s["iG!;O&wkku%k AQ }VTOOWDP^,~~l^Zc_u`*zyM*AxC}z&!RB5όٗxUg5/A#B{V ü}.e'+\'m4C PV Jw TTF h^RvB{z3|A֙Zy[%B8Y!'Yw[Hc9ƒjK!1ʮdIk_"4Qph1Ս(YrmE{Z;6v;AͲhWQp*Sbt;gxzzDy ;=dI5B @y?0Rrmki&/R'0O YL"NN|AxipiG>VV^-- ;яb[]ue/1fmsʞ]EzŚ6E}e̜4_TF[+'k2>`&C:{+m Qx+P] G<5s&̋W^sm$EN|(Qu#,*o.ŘU DQ)Me%d0x+dV=]ud.>N ~\ÚD6شȹW l _QPkSYO&YNPLlf*A ~-Vc"(i@"+f=M Tx*+9cg5l԰)(i<sv." 5 Y"HGM1@<=-bm=>fo*oJNσq%|>ް ?079EGm;,,.73Wp߱z׊ŮZcZa$lwUr15XO 9{SހRrQd 8 ${5׶K!ƀZj&ŹsXc`oLy}~X|wNnQ̆AJDDv&Z^ұ#s8sx{ uG,$~Sk,=Y~MvqAYIrA )醩qS=E-~vٻm߾ET[.h2X?n6?_a_FBqt7+JĊB`|؊lB+%S; -J6Fr=M<MϞvbS [GR|]Ǚp'NO;d2wRQ"@">ab; ڽRˈbE>X{vkCYf; *`\>QTa*к|({*(JY/Q4T//"-bӉZq(v."J8usN->K_*P(RJrlج&!G%+A!kV!` yP -x1I淗g4Уu.],&g&PgH jȧbw|b eQ1u\qyjֽ;piq= h6y n3b;'zA…AGs.BpK*)tJz\Η|Zč<{fvm\n8\"@ɃpNL?Q`ϓ;d|56RfF"@352]=2݆A"0qP`&< p Lxt sT_#}ڔl;=J+/HGp@q@G] $~"N<{oPç8,&2X/$y\=OHճS\h(i:KLhutfCtD`zRt; ?Y@q"Pi?PT %䫾!mFf>%4-36J ޮ펧=XiLG]}dCnq. }l(H ,]7$2Rc 脗\#~9p5'ֲDr4E? .;N&}r:0[}%?y9G5q d!kl(j@'Rv3:DHQ 敤$pwS13Hb4>Aq(}#٩:*U4 $.Jr*B"ݯ%v ɇPliP"Kr©H^2K1a^Zyx5ƽ)w#2]̪et,>eNVfS%DNf TJ)\ߤڼn>Fr'¤V'^7Vpɲ(p3ǍĎp<^W?y\δ('mqC_\T,1Z' \5rmXr]'+У\J6PRtjgb ߁:0`8NvZ4uFт߰ ҙO>a oj܄SQ1zcܚ+k0xSkl\fb{`}ofc :Owz~J`M_"^ 7_R vtY(|-/w2Az'_-k|[PxtXDA*ďAm" P"S#٥mn%=IHb6 5cihUKzns UŚ:q.Y"h[6Vؚv*,8-, O$LN,% |YorwH&Thj[ &M^ ˾j'ӼH&dJY[1BkD2\njV]_;F3Ƥ|Lzz$U7y|@EB (Fӯrl A u$%nPcNE@՘aPlKPМ5k̚eY9&;ex{51ނbXaԚt\ve~+ˆI4yڰ*l ! $iPu"sFd }]ؽmR Wh|zAPueU/Wv \k)wqu٤qvbhwaI@8)Esۉ{p;(='}Ńe,u_G8KO3ы<Ҏl,_dT*xӂbաz$JNn`ieH +b+3̈I;Ŵa< ]PG~0&j`py̍iZ-lӯ|ʀ Ӹe/>F@DH`gDzBoR(/ftN#X9;gl <7`(rDmx']gZv-i:j]X'׼)iB2ƣLqP :"d%qs|$ !0S47r5m,*-R FOYtE <_w[ 9ruT+nN/:V7\&h?`? o01 l?9t#66f^l, /paCY̘`T%E#LQgz}x!fc ^6@wFޣuw2']?P jG`H?֟0|S= li[Bn | SKo7Ge& ߎAgMSsz[}{tayq qF^i3+o+OБuw'z~->MKzv_7% 8Յ硏}G?l6u,=i.j2<ơyL &A>-"p ay~iZékz$Mxir?݄~qFq -69o!idXb]6;w׸ C[ SN?g ol(qX475m!(N~D{\d9o<+g~F&Շ}1IcjKv`j0ٱ>Ӎ*6kaᡵ4.q(t@??+MK _&#&QLH3h h 8a9SȜh^l-S &{~S[Y3D(.# yU]ĵV0/ȓa~ X0˝5-hFKM ̑6#{)u ;Lk\SB!P;^Fyo A*FKl͝q7rE>¡ g'Nof"=?wBLP,TS@Ala&Mi :,5[(UP`͉Třh |ЉO8Q'8]sU˱#d2HmZTa(o>9&Uw|{m70W;;QKm DO<éy/l~[rꝴDgćDq:O?SH6@+=qpwa/r647u OAJaʬrZW'}1@^JMly˘hKq-qCj8xw}}P(Ep} {@y>URe;HilឿA >?flZw KB+V}o5PPCoƜRFN}ןQ4Y>! RcB6[ l-F*WIO1XNI03賮[G+-rf*1۞d չANhρ_{NޣnFVC7۫-4Բ°RHjMxf- Ґ5  RatU0IdhRX`DG_6fX>Z 4"g]nc;@f9˅OhZ UѬ]^fX?,D1IQVzlU)' Z3Iڮd|oY}ճ4c~{rj45A%I{*>u[!7Cݪ+PStaTBzYtbCתTUGlP$?iBCO/Va[~ TTY {btYWlFll0j'|kD{i;Kz 0z-7pdְg<^ Ea2 p IN29}+D, ;3 f'!yN!ڃrjTps}S-;"r)VAoOc3d:@H!Ǘ+Ό#k1 Eթ<(  0 Sl Ӈ*2v?|Xs; K_8OF2Zl2jvEH$āj- 6ՈNt;?o MEhHg -/gyr|l͍b1a*¬iÞmu "(s=MK)"k ~J'z-{hcj#䐔[Da'S~aQl ahs1( jq,zRzԕLҧgt#& 2lY@ >g(S?֭COԑcͧt4qE(ujo3 C?U|D̛`eIm2f.b9P's[㈥dVFFԘEzi7]ȃހ`vD G%[PNѨZ[Mw}e^(3}-#__aÈYž?DmCiɢmФ&07X/fbRuh-eawp2/̛cL ޝ nZ#YG?OOK>X2Q劘ˏYg1hemmwv:rBu@IO,zܚt܁\ys2U/0)Wo-8xzCn]2tl,rc5 #BmN6[%Ebޟ [8鮘pUw*ZS+/5x9TFwNF'z_s[OIyDKyaVPO-iƖRZ,66ܹBT|*{3>1`DPѬ!@ytWm=~É71`njlٙvsr/ۍg`d.=/=gRg1u{4Z 4?7՝S{e7S$d!Gפ#=1[ar5p~):Jalʷ' " 08˜*>Yx8XG"U i-fOAN˫8IrFYy&)y:$;R; uK~-A'Ic@)wAB^ #6lj.PQd>);;RrL_jAS$&"eTyď2l1B[p%OEM8oaN[>@}}\*&F#RzFN|jkjT?[o-.*7 ը=N!t̖aR|nZKzcݻ,)usgи!5~%N{CF:2P7yP5Dh*ǡ?-O+IY~ήȇ%JI$4Hu;&{ż(<\D^vxXʿ>vģ~CA76PLS-$Lb_gh[oĚԈw,J*U 4L .'iR}Lt닠^gۼ,M&+a*4[h-zWٺ{{Suu4vBg#\;HG~Bz~,XJ~1*z۠Qjt_\"۹|]::rHm",YٱfuE fRq)xRڪ39#9ԛ*ztj7\;!VIEGx`YU߲aG6<0 :iv~Qؤ4 [(-ZU$]5,>,lfN*|Y#Gu8{6[Z{ISnɨ;mQ__k> $!mA[G_&*w֕kpʃ;$ ?4赝ǏCmFBP=(_$-AVY3( *Wq6îJE-0T *;f3>}Dp{;@sc%πLYWtSqslgpFL}iYۖ,qC -E3L#39ٺ?՟!t 4U3P c81zW(ql>ќwkp%b*$j,E*62h*.yO`Di/0Ȉ -uˏds듳R|_1` @W_}&$qWOsA(|(7]nNdͱVw6FX~d.ΓI)mOMjJG_~x?|bd*ҢXC- }2QsƗ9 a``&^w-!)u&P lZx.ʙ(Ei; 9E+{~Mv, 4HB mR]Pl J((v |禎:2Ԫ(r0Fׄ @_M9Dyxxk=vDlڲVi,)Ƞ*^ٛ>@92ƹc=H\6a%F'~]}PH?)up*.,g Fl㟎a/A#*NLYr5AN0VV>ў:o}&a!z!9\"f|;J!_߅E7!-CDeO3 M[jbHe=O$ ^xVQTm l-a*uv!{xD^s4gcuǖx\v)kn{>}[k:W* MV g4;TynhpiI $cȭ32xe\"Z?K;* 4\b62{LH!xrsSz$,]*T1wY|>yr$dfrJ6{# r>oV3w -SJGWޗvb[o²6x)aoy Xɼe'c߇.XjvΟq 0>51@tŭ=i 唼nvP%7ƪIK5i-_f=}ؘψ}[p!a,8 :1^yYdc ?u$68Y_eFRYμC8y ޯ7;T[5NǼ:q[gzoR̤ީuym?x5hRdSlK\^(mF*T`pVr{* ,%Tu9%kMr?4BC-8kTSBkôw)A+K_^Or#(@!,cZhP۲'[DhԼ(^!Apg=gtO&{[NV\ݤe|y]![C! ]ܛFu.lN}S! -J}yPػ7jIO"zɊ7..vU YbSq`aGsNoTp-nh†[h /u2J~bU40mYh|$;ͥo: j8-y}ضDqcn,+KE>j|uX 337=]Bi%dCUxKWɖŴfK'1$vmիspߕJ&i!=JaҐo!aJ_[):g wD|l e=De`>&w0 Y*UҁW_њe[0C ldG@p.A͎/޷9>M~z,[C9Z (=uT Q"1N!yqyP"TQTc+!46LX[H4":s\u'p9Qx:9F*qb;d]|Z42ƀ>J#o[tiBzkU[FfTD`sBFx$\ 4r|]!DuZEV&j֒&h:HKIZ@q8a]<#L :-29" y jC$UR^ɩ?+3K%<ҌpKrka-S fV3NړA^i󺹂Q[sW _1ugLFt׵ł|eg֘7c[Y `b<'98Qeˑj=FB'^:T lY'oHЋbQkHZKUATaLB|[F@X(?ZS˥„L59?h⟣Bp;o.]ElE@\LARce-#?B͜׫&yAh59EblȈ"k,flg}߁K"V0y~3O8ꄽNI2ZN}is,㒅(]rF$f`bKOi1^h|#aH?lrT$pO W_ M=kVS>E/K4F!=}" ,MZK]##"ٜW4>::h>,H)@$pn| [y{ SE}MK,o Rt7Bof|6.NϸrRMplåv=.iК8 #i vٺcJ#@N/8~O'6ԈcY+>h2Vg^TY}h>Y 0F{ wg/Y5Yp riGN%1f R^iƵ1f~Pv&ߑ=],!s=-ia5G&[m1. 4rQF ؑ%'Y11If󟚐~eqCϵ1xp; f+]Xa}2C,u$R`-`DI4(X2d,&2EJ3_K鍇1_68]V6 7BTDY3Y'huFqZ'6}]zuD#acpU^_H12~iBXݓ D7C" |p摡Tn1D2Xèo<z|eu=rr BI`3.t?,\~ӹ06=F3.G#IV7G0CrH¸qQb(*`h\˕.7{ )IcDc.Vx2HHH˓7FYd 2}v3s%Pt9;卋Sm]'dgz80*!N]Z]>+Cx8w/CgHf[nW7!ڼtU6~7í$SBo=-F[rٶ+̈~i F-+S85Mg}5V i5 Brlѐ6BD0ߋ7f uMq )3*zwq*s :,%wBQl|q,lY`zIKz])/djNB#Irvȋ94wY.9$5d<1$[O0#VТ JGյQ}@M%L1r9]- v*: 2W\9 Vv9&mhJo@(L]٨žl m灼iӠ/9 'jfԕ:ɠ{ ʎAsM]i+k :\"J'ƼuR^Eo`c[a*A< 0m9εoeδ:SUXrRTdh Ci9%AB~6]Z%` Uo`(ʞ~&U='w'S.KNLAۨPíIɆ#`$I%J ^n;N΍POVG%Eވ܎Ui5*d84LceZO$G5qQ H1% A8Vh#S_1ۭg.t`&Cc01fpvT_64;2g* 6Q]'\T&2pkYPWiQJ2t xn&`:$4xL~M6P֤ټ 5ȇ깁Qʛ:w͋0$#H]47ʮj{Tڰ]3$K0\P*1 O"[n o3;D8c$D TJ0 azpҡ-K~7*1@+_w)7Ո{쪅sz<'M!˅(8.{v."ĽcJ jIpfȄSSm;3Ƕ6e&|;ܼlb?YRPe[d*bKvv4>Ui Q$`=ϳ&Jݍ,,HA\F;]Fzq<42|U"ugKf5*vy\ Rq2'9ƤpaXO6 ZU)i\@ca^(s0Jnjo 8$fB^.ṼwY=\{y5qWFțjޠI!+.# 3!7{Tx{迗KTfsv{|Ls_b9Ie[}+M]X1]ߗ/xu0Z+z_5%ҜMj9,olNfŽVlRr?kG <OcյS}J`qu~vwHZ OfJG`Nhs)W`,b(?bwGς?G*,(?Hd8j(1_+2'_H*VJC'| #.olf(ۦ]֏o%zK"u6.a]|N<4L" W!(M:sdY+'X9V^A3t: WW{ܶVh@8\A|(nJD+7ɄԅGS$eW45YU"25K¤hD\1u%kw(rиLG,`رT-ؒ{Ө;띔ٹd:8җ&m۸A g!=*8, NC?MPImTw#{=% ~ ba` {bΣZ鐾VkEE.>;S/;>EVTRﮑ_7}1Kc@+Y=uLk-cQ/i(;42-gF KJp[{O Pq?ǬnM(PD Q-]mΗoi{U"UJ-= }\C~촨^F!vw`m" ,E Rl}Q& )qTnoB.A&[hACg2)-)3|ѕlv`C) IYpC! +{6E㢝}jU`f B00~'NF A/{q쪰,PQ떾a֮"Yѕ /Qj3;w.ܸ%W"m΅g T/ǻBc2%]<#44Tq|3,gcK3D>nB w2_gT['x*g Jhfۧ/.EPʋ!]anbwZϔ/t \1?|UdwCZ_=UuWvwMsXll. !=&hƉƞ{Wӊ.Q8$4L7`TX u _z[@oGl 4't 2́ .duHmvv9?1iw(¡tϣsUPEўv޿]ǧ1XK"o([(ރdObrb:)pt}WTK'Jf}| ׼S 'j|3ʯȫFT*omos W; 6کE:K6 8#l fhiuuW$wrZ0?0vxsa4*ù8)C%֧2[,hG HPr_q?'}?mFZp;C r8Oj8bP[BX%lrĐ+RQ`Wlh'+4CҾx@th,.~MFaW|\A3}vhتm"DԦ~? JYЃ 4 6@ݡcmr\;]ߔ l?dD2IE]J>A.*~lxz=.g"Lp~[Ё M{ON*..t~㸯S-xH#6q@J_xpfmbӟvlNdž"g{Ǽmu 15W9RLCRCкT L~V#!:*x+SDؖ9  cϕ2ntm}| OT u.KjXa6pe c3խ@պV7 T/y>2]T(@/4#H/ %\ q,3m"Js&O9c`ݞެdBK?y@Y} ]}!4aM[sah.vɚ!%ncgܸC{@B:za_(Ml[[!iT`1X?+҉f ӬäW { +Ualeܔ<\U/-EpI{47.6f}(9bxD.NuΉ2@B'6j9 \ڹy4 M) ,|x3Kwˀ]W-طmA=u~u~*Gl #Z%ltߔ9 Iۦn@EZh[ڸVfʱ/dx.6k:ZarA-vT9cnBF0FKZ%/rUu"rv3koy qCJyZa͵= bFK'ԑg)w A-i%7bJ5v3sn{"_:#МN&6un8k&M_pL^ bc&F&x IoǹDbkR#Z5$bry$=VԬv9[NdRQ5R+KN,z;!}wHhG.fzNsYn6ݠ**dU ~ u\8z>u_0gZ{2W*\},uHs)m"Ar*Yx-[]V7~;A-TQ.׌>`LNYy?  ;npK5iog~_O7 *Ny]J}#R{VG}Jr`Y&xD:"z ʲ:9j&!|R3r>K3Ya1.}6SӅ_|[)XE 9Tӱ^OVygK*d99F$ 4*m זּ?}RcG!B>F ,mqf5Z\ޅe3<zL(; x,Ƽa@Kh>K-=[>#b33=NpEjnEژ8TE'/Ԛ("0{d{J7! '2eˣ.k4ɒ]q1 NN^K|$ aǣ`~G@ Ƒ4-dnQ`f yNLe}JXd1%g."Kq2suJzپA?tUW*X>XBٸ' \9c+8np bȖhʞt9'↴S}!/W<cFݭ+m ۮCZ;aog P05E;\9WG"N.J+bu ʂ!tZ7 +=7iӏ)h>¢K>7+AmT~,pAXV,>jǪU1e!o;'%v̋k8㉙ﯾ|ArB/)9`ך֝3̌_'Z4ĕB 8Q./w 1.i8`Zt/VNkV$< \kNp9"ߎڸTd8*pգ3*VWYljx) E:'] up!aƮkB2 V^ =\OvijހGT" x"'ombL! ol]vgeum_bL Ī2|>G[N>y3aĸrrhfٕپʅA=jiN*/D杽i/rf6!0c:CW4ަrp`,{upw;7.F{5 B{UX 3ϵ@k~4x!ɒKSt2Ӿ9TBtrL\!-}ɽOl j;ܶ3cs:](ni 3<:FDntC?|V/S-q;vN_w%!IUQ:޷Ke o{)3Zw9 |3hͳGE0`f#D|5.X%wCMTm!^MQ)W ,;7PXZ =$䲽clyBqذE7CF>4f.w¦UXm,փTz7-d?N,kt[JqԟN)N?dՈbM$/w :l$b.Ϡ-?8 =˝@0OcXIREuXKqi}`qoژLK;.l6nPKG ި€`^#[YF4WlÆ"O}6bZ&;yK@JhD1TE^*JZק(R&g_W:⧁H/٥xWv&GsDY e$wU59ۅO".eZIO=50g>F/=vYvsCxYJ@&\Kj:r XMߔz'nٓSkK *?^{/چ98yy*viK k<%uB5Cz!'^lX7pD #"pUY$)mAtWv2э*]8 u  %ޣ܀ŠW`zXݞptKINT;M0CA ULn{.o[um*>'eH,u* /VB)ÈF Y,#;2B䉝#7s wbs=c|>ڭC%' 'A'iSe?W(ؙ@L\|4DDn䞈K}TJ<-,9Β1Zj\;ϧ[vӣccrvf>1sxeu+QBx`2lHuV#*̃8iol* DpqV1t3d!p1_M 'uظyh>/m>y})(mi<~^^_pW)^EΜH,qwJǢ.>\Z)30Rf-2#g2ƄVgەViAMcAw_͑@lBۼ۵05d\{̙f ,( Yr.5M,հV?y8M5j#Džͣh#όjQVHR#i\pSU\ 7'<'$EYh&S!ygU=]w8G?QT&:}7α]2&-&96#9K+ X_xcr:MF=l4ں <  x82y"Sr.q[!a|Z,~uKnZ) _ԃɒڇ*^ N9%&FCg,}J>#0!X=az)4T@XY5ӈ51E,v}:WiG׉ yvݔEgoR .Y] m=ԅ-"OӁPc<8 tݜ ,ш+N- ߬bՑ q㜣w2-@ Aj/#.ѭmw@g*=Ʀfa Y_0kՌ s624_˯I_-UP{i렓kIY==L. =`I(-y\Tmh ZqAܬJLzcb&6"fF"ޕ4ߔK;ƚ1engmYbeR|a<(z٠QB\;!qjdY";אY8fH $ԱԶ XϜ.2{& h{{ h +@+Un붭'HiWB|7\]MIqtx4(vo i~7b;nm1̲ Pѯ{IWCE@T( wqNJP3 j6W /YaNyMgDpGFȔ/K47@eZ`n™8Aj#86-LG+ ?hk镛kr[I0z+ޙᤦcMcz6LpTeUV'WG!M1Jp F8U5 ze-22;Rnrڄ†wj<]K솗 b뮍tk: <:bQJ7|뮜,5Dd;pM2^؋|rRHdyH"tho.(inorh=s:b4:t 0w=I oWd"[0ߏq]LQcYJI&S]^Vn\&[['&cU7Tk&:*8f<=hg{LBtVT&'rQӮb9Q\z,,ߵ6G5HbϿ>"hS=Y!I(WB ?z#:jPiUE|gZOKB{w`pXHa0kI}k" 'qm3V'wn  .,3&+̘dѓwOOQՖ;\Ј݁o ġ9fP65S mϤܶSDC:z!m&\ϓ=݋q.\gaQc":Ne~b&WGqTe)Mr'j I>d+XDVa;.i(1mӈ4FuhQO7-1qHQ5n}T23i\2%W|Ļ?4d(PM*Ș.[zrrf1I>)(Q[j4R& Wuk'&rUExڔ Ov'̇\iUU\ 7uȪ*4߀.N V"@P9QMG1oBX:CÕs(+pX?3|gN*#rD ! ]~wi)Jb5$1GzA#\GN0*:j Jh5:r)}U_Mp̑ dV,*x?6:;U}D!կ?Ucsvs澩F/NP1*n\ wsɋ!E55J}8~T<}MeIeZT&!()?יK[u*:ŌRé5,M kƨb<|"%i2s1E C#D?D&'4j3D5MoK9\ʸvumДW`2b$tkߑu-n[^`)jtCzrx\kgq6`Kfa_rkUC43 3XѦŹ> Kͮp!ݦgKE ZjBMӶni xC('zMclٽP_0j8WV_zu.~cE,qsaδcwvD%LPJt[ضV f:ux)r !I$uV/R?)Dfˍ 4~ס Nj"LH5h#NOJ97mwSn*y=^)LjmBo-4M qԤӱFt>;UQDQf4 ,Bs2BMfw7% v-FMF}dI7P|Pg%ǽChW`H&: joM&R;l c@$Hx3Sqy[l[NR:,k7k?oyhh#$bp` EQ#_5KG:z*d2T2zX \6o#+;sj۸"TQy[6{$:=sVɝ2lSzkont`<գUU= Fg{vJn0z괼+zs$ViמO{1TRyI;>-^ |)vHFטbࡪg9W}AٻCxw )vJ<dӇ3#;o{.CWi "|ZN<RR+K;K4Z S}Vho'W0=]d "s5.k`Y=uD/R9AEY5-f`͠n\cB^6nT]Vo9-~7n 6VC[(AϙŸs|w^e#*$|xQE62;pncV?zyR4\}THnkAM6X76BcEDT G=kɟ~+.%Fha}F0೶{amNnXEۉjpR𗞯֙ OI}_7](ܰPkHTO[H1F9 oӨ PjG iIU=ʢ *XrÌ[aPw\lWX{_6_U]yc*׌ࡲ8ib p=ءk~# NvAJ/+"xlT.Ԣc @Yu '圞zz$MQM:IlM#?3n3䏋# q ^4*Tx"u.݀Q?Ew β ߤCLQ"C=˗ |LhGq#OxHSV$Z|!JUQpcrK3 BI[w^2b6zkv#IrK"TaM,^̈́ԆǗ%~M /E{*;;7;}Ouz ;JK_ז^歏 Ww:*A޲?Agvpv ڙf@z~,լ $[MbBq+WL*z<݈ցh@^Z=ZYSD۬8A]'|$4Gc_A@b7¤? QܒCX5k7nm_[rYߛ9RH ޔJ[~ }m@UR9t ]l!W֒vbHUb޴iZw((%Vs hT:aT4QA.ߒk C:"lgME̩tAe)sPXR٭ޯ0 ,d37="BDfNAFip ~f۽g 11T(ص,g h #ҹG֙#cov)Z/EeE*Xy9c.qJcD, a(6U*qol &3dN>sĜ{9鏟m8k @M{/LMQ9$*~8 |tYRvM E1<<_ NߠɥhtO Z@xr'l@(/' 44TjRJvX3zXޱ?u[op;8&5_(+ ksmE)QʭkorW/(O~$cO~ ;.TؠlQD>jz-z8;dM6e !+mӖXvcEBQ$vsgڂ 6O]'D>t@Q47֥'@25=;/t2dM1ݐ V0L(]8 .S\ S` uW#C~ !HZ9n2Vcb[Q4sD fco{à pI4wjx1G6 vtEV!xpm%oDbiBЀD<[ UjѺ*I.;H*Z>Qx R5aOM[u]kSNpЍ'qV^f$(_ &̑2]fy;+NӏS/~iA0BP3\0»%K;HZ.eDq*;XgfkS:4E|sŀɟٰ= ~އNƃwB|3 sQTS>Yddɇ\22'o|p.[Y*_Lsn)@ )}("*‹tSÖCV8D0)Za$T('!<5s\D+&'Ɲ1fԪpNj{wlys/FZ[Y3؂>#a6jPY(q@Md I$#D2oQh,v=;`0"mg09M` _bԽT´rh_&^ˇ @NUj&"%LjѣAR)PS2)DnY4O7DƯR1$ajntr?~D^@AKEDo = > ;Mup[tɆtg1BE*Qj~?xJͳt8(`~K:x+JdDWcޟ%9*l gQ@֛ XWTkXŗV`}#*=IFN m47#XFBư9ϼm/Y۴`tYO&+)"K/,kMkVR Y2݉a]`7(nGXYf 2LN}@5SCD}Qݯ1Jp#Cr=Gh# 0Yy@FxA5r$dӶ}2vd:M b5(F9ܤpDb^l{l7 R|ՐHjZl#'J kG{rÌ!TA&:rр&k6PBnE2RPgyfrC̓G|| 1jȚ=a jez* e'zG1m]o ? Yv~AH3pF]bmwQ5fzٔ-<\ҍh=M} +c7ȕ.I;B lA|ʍ>Cf֣ن:u;A_rV9.&/UleIc(MZHNJJNiHҥ47.YI|[qs}q[?1Qn]/4\}uE״Enjզ'5 ։*F]>(^ B(2d";=π6ƽ_Ӳ "^ 5!!MvSY{԰ETgAp; IMm̙4CD7eXg$fRv {# 1 -X//UN_J7#w,Nc&ifXr"Uj|GSf){>ÌFrnPΗyqNT'QpvP'I8> ' G@J>GlC YEBF~4 |rlI `da9(țtu=Ϭ?% g%GpkVʱ#6HM&TdEQ'}?єьa9B$op~#ۉ^(s)ʅA9>_6i|-^A&Oe}ݱUsy>F nTCҭq (hx@6ؖ8zPi4ʷq;[? nBaBmoJutGauL=[[ظ >'oc Y^Aq+E%9[kܦBrR < !>k_Լ(m/KRv(ku e:z/_@ò pXWǟG߅~ψ{p 4218::U{.d~uw$piNzţ2olDk&O$_\j*UoHVXy1i: /rN5{^X%DYߘ*ΫhG6Ml!f&Xoȭ_c˄(gHoGky+Iϓܱ` af=껸ЃD,!\0{ YWdӘ鯸gr[Di0r!8##8 O͚@>eyx:6[sYaRA?y62Gwce4? |PK:Vn7=>;8*(#PӔf`i ɬVyN\~T(Cܸ,dtXk.+#Z q@?&̇0>K 3%1cE*&>%#i*.hdPWZ KZA2weektOWGP(ePB&Y:eBPd8˟Ɋ}C5 ]d LjÊv]Kغ3-AYcJߵC;*g& _@[AE+98Ă d[-z}4fyA_[S_låQwNT`X>z[l.qrXw#S ,8Pqr=Ede9fǣxsQ@[a5tHYaH呓a p F9DH썁XDrL(MK\﯐GE \ T]iOͬb+bpt~RFLrz)q ǒc46N$$z5]rX +bUJ]hw[ۢXKCxC 499"愝QPrqui6QMl-`4>ͫNb=s?9˰p.1ڍ3s12L"=T@ DxC{i˗)C[^ ю^ty9OfBÞ0W?=j ..NQZ0=PF1ciu{koemzW{@P423wkQlBڃl~_1D~|]-"\f.&Z k?=G/s` ԜA ;D#m]'7,5_{-z3#pGυ u9!hޟJ y(/d1ƺTa]\;r/Laq\PA NИ8H;Yʟ%濎^2F+ ceUsE[ڃ{xи, q(6Aj9G=sPMQdl 6#4 F{^ݰ`40T|i8LM3KJ-ŝAF]*'p{'0:;,Sss<*!ANwbΈXFcSDen #(R% q_CqĞ<7FoInYmL\ ㇬t T]C mq~DW&{*l4ōƒ\јvjaVKQ.y53I`#M:T/7~_L#n g8RM2ri0k9N񞨇l &"תU.5bxgZWEpHcM{VU:$軬znf*70PduA'o&@93pt=xd^QkB0*X<fNN bs>Z KOLm&P - "1K5BMEF=42L.wF,,|:sy蘓c;i=KǢ)׶К C^:[^uݫyDxr֊)mcUp*s;~ Aܘ,J#3fž>mMJ<eOދܴ]1[jӣO 8ؤ3x)V=H}A5A砌J gd/~=?Wk " 9~݉.==N01/U" 9s,u<{oLu9uJAv,#Eg-,-=s$$i:z9|u#OgxGT=7rR.{PB8Ft–Bxr{=\7n;I+n)N7H;@ \pʈj^sq~Oe{" GM:#!iwӧ-2TVPA`l-eRGw ((,mdEȤ}beO@cwe {["# gCap//UnȗNJ%pH.2o~_(S $Ⱦ ^[ d#qLF ح햆ؓ0Cǿޯ?o%9REwbE .unЉO)ˎ:z?teإ5̓Uآ"@,ø`9 h09g=pzkB,C ӷôS:޺=TzN*AnȭJ b).s#DQ)lgu7!{+DM;3"&~tA>>C@.2Z9kؤu˺U HY H>tCdK#3,uBw?\55FDX4ۺ|&0>NZ{`ֻ^l Oiv1n ?2 LaRi0nl0@ UآSZ2~uo$'[L  6Q̥bָTrʨ&U =[~wW.5~ /1Xe&q;u7eg_`bh}i,i7sfӛs,3CCҋu5G֫K:_KQgℋNdk3Q 5VU0荱 Ak6'!h׌W cY .{0}Sv+]%O (ޚ"]G^㾦2T8>:/?"~Kn_n2X ?ZѧX0^QGZUUtOvԉ@x'fb\󞭀YR'Nm=˕PvRQI31G[[ MI&+; ?,$csn?h 5*:\)B)gxuZ# !9wf^fAbc,Y-ةM.V0kIޫF@}rpwYeUzCqW"/]pm s(O6nfO7 kK}4iǹe-"8$*](*/ίs=m+pەfI=aK2 >|a_S㺂74L'8Vs{0=43O硐<5P&e1~'q>w1H6W.+1ݨWwjV]sRXe2c5ͨjPߦ5B'-#6i4'9Bnj8p^xtg 14S'cwk\Z/7eemsI(5%.X~8GWD:6!<陉7vf*TF "SuBl^'H=Tm``Ik4j٥= I̞Hkj!zIL\0{E`JysU.Vmq늈Rۉv.X;~Ph愮1NKϏ&9켦hjV<fkhr~T`FUS({ dcfy 86I?9>."]z=$c;j酨EC1)إmI~HmTN(*Qfwԛ u׊KV/8ZNK| d}L:Eju;5ۨVVҎf NrJT+jRF( # aifSCO1ZխǍ`=[M I8|#sz<*Xst|3/CƕQ8XY(vg!`-_qEBI!R_M75ZM!DL)w%2)=9 ,wY7 2u &P =6lSFts~fžc@cMH Wy?l8H3oV5g>5?46Ʒ|2خDcz@˻WQʥӧL]E  |݁@ `(=iZ_ oYsFXMpf_5RiOCTy]1DY|DQ? :3QW63<[s$~yZ<ׯ"正\GHjv# .GM(gT݆MG %p(JTXmR{Fnf.VTCTf}F37֯ʋ_ FD e2ڼl[pZ6/ `;s-mEQtOs1E)|8C6ˏ6R.T/'zxƸ /SBc6q^鏈fE 8w[%3X8V4+e;Yl~BH{Ft%R0#"D#۫p?X$P]KBt"TKpf eQS͗#k8S"mNu{2SK" "=| N2+j-)k|hΞC5%KaAE؋npUܱoY7.TIzփ*Pݘ)5cgG*3P}߷ r<'AvS{+m2 O#+i; !$nI#d8o&(nuNI^F> K p/I&DN}ߔuYᲒsr kZc':xBw`K.10eOB4fa’֍YȄZ HآN皊(R8y1ۇ,lmH#S?[/ϧEA (n\1R [P|=C&1D' g|PKۙVfB #ŋ~ch䉺 $$172(tp88sO?^ DBȭCLUC|oxRҖaG?VNqiT+:;2{Zr|tN+V)Zx,= FQ Q4-|P w?!=ϻ=S2Crg餞K)crOwqvɔ]N<4M}4FJ"`/Y\%RP$5<nR$vE_{0iQ8sJ/+g#W ׏((ƆJK6;ut;-R.8?22ށ@3R cz~OcE rvooi6 'tZHt.5-3MS@EZIg[V{Fn#ar8YU ̹A+TO>8'kFY`]rf2%8c:\_U_gv 3~=@q7 šh}v<& ؟0 z%Z"de1L_m&ato]R4wE}Pl9kp!>bU.)<%[D4AvK=*/(5eH@kF8_SFUa (ZFkPsʫuUg59[$#'5cu]WYҶCc!m%EMij uy>>JJ ;z#Lj;I 1?sZN0FzӸgUz:󂑝iDpx8rIɝLsO@`|H>1Ϣ}b)M2\z􏟮V|,Zʝ5WmMx?^^o(F}@DEATjsTW #vt]RʧUZW9\(2q3.Nݞbdw3hQ7CÍG7X׫Bߝ3Q'~ٳmvn-&[fqڐGLY1ch|p^|6h8BJe_R ہ kͮK`3 +~f/3xwֲEMܢM\%\ `do6YD s vb.5?)B2tƕ@fus-(19\ґ|;蟎 bnW_y@vl_Ujʝ丫LUN)c9! dU-@QbG5d &y)4CHrS0?(=>A.$ AP ++.nBFe ˯KH2eެa Sb+v}Pݡ&ٺ@#B'{R4  z6Tnn4}Lo`PDl :R_Q6 N%**5 fMb۞!P_ 9Uñ`J > oaCJSS|ίm {],k]:Zh`DMOa?Hin{hb'3d)'foT$ۅ 1^/A$PVTJ A~vpwSaaN"M( JE[>+Zh3Pߛp--uMhM?¦%\@UP(gzJWEi]шR9-o*p#`$Ρ9,(\ 0[=&XkLJԯO8{9,oKG\>,v ug;ldC2oSFDP_ïSNz )ZVhP|\S!3~Cc:HdZhW Ԏ S4i R*H~T$Jze e_ؚm f~8N8P2h|i 3J2U9d{ed|v"]_c#ɟ:x|[PC avai;XA~ *UQn;VьhU=³jjR岾˴>YIB2R"KX`kl1^_z_|2qa>,M eaދa(푃}^o.T6SwT&*d`?P>.hָ0}nZI Rs e[.}Rڞش̈!I.:}98Zkb1.b .arAYb.Y=k6V\ׁ ΘL4,B*Jփ$prNae%Ou"!?c53PA<@iRY]/*Q@ݜ@TԔ[==BAֈ6i~zqtp#G}!”\(k0qu\4Gw)p0݋3?IA2?XBBF64a;ai"앐xs07pZ\Gᾴ 07z2/fBzwߺ*{kd0筮v OV ^?'D cy)?;;y|{t"W:%8kaWĿ.\hSrLjF$q@E. #8Ԡwt_7,K=9e9s hz+Y |m 3k3B3|r/ۡE~c )kZypze6bȵL?Lf-a=ns^>F/ uH'mSԜdRz;{8@.E+?EhUBn La.ʨKL]L!(pjƕdrD/d/tBM5ĜkP>;%)6ԭ}C.Zߛr*`Lޛ(N4օU'%/РwXS)2.}9Cy4y8lWbHVqWԙiDi Ǩ5A_ϷG>0.Bt<Ծ݉%)^rj|7(.7aFZE;OP:B]v-.5*PЧؓHU׏0k%SLV&V8<x@j¤:{oOO҇.a3z<4K@]#-֬aQǰln KSbx%ֵ"o+p}zytу1A~5E4-3V/E؅^gvpFąN^<ssŝ*\v+U#26(u(v d9[X<ɉ^^WԐ=6౮~+PEVaM ̡iy(Ih133?8:B;[GZNUҲ۱vG~Yyq|/F^jfn\x$]iDsTaHp$|,5gW>,EdLUlOgH_ާLksR/= +)Xnh95O%2Uf,b<ߥoTyǚ:u;hx펩7U%n; (TujM\QˍJ(:mM 7łnVI1)Cjgxu,EsъA(&tYaIIQ̝'? ZGIP=ڼ0gEŋϱ h}j|ocnSj6 B KKrl9%'?β ֍!]jiu o14`Ŀ{W[[ͥqw z1f{?"S1]' x`?K;B cCU\E]KT6Lm}Y)$ WK3=Hʝ䫥@]WXQ]DDSjO2X­tLp@t! ]Ήm7ȧ3O g]Y~͞s1Cz# mMju)w_ {%2{Z lt$xUŕ3hPg=n0A1ͳ-Q{ۅNjCr4~vn XFzs 8͵&a6.oʱ7̴L R]y-L9ٽWO".lv47hX 2pV͕،C/s-bp.8g˃>2'O|FL!> >CH [dZY9rsG(TZCDž3rhg[æDŽxnueb3/RnaEHzT A: enDla`栉yUF}.M1lwM0&vӮAvGi=&j᠄xEuJ/#T/$W%h(O& ITB)$eNϜ:*{F}YxXg _]!6b??pn9E(sا, i|QXشj-%!C~ #`k˵+eM :c>u^Fo ?E6i[>|?zGS,9.쉩`x%6.tR-p)}%^?wK~aO<+^,_Yџ7:u9C`;iySF?֟bjM> yR;ڠYƩn-|QU$a.Thz-c%и9;˝TQF }!q"E,Q-Ṻ~' {rpI+RCV:]{=()ِ??B'ĉA_GWuXT:^fR'nqr< "gp]"ӗ[Xn93S1qߘ:8Q]!eK+D.U+1֣P[p(KRy}\<*(wVzlOT*f\&HO,QeQh>̨ /i}_K|?Q>țծ|=pG'reCs0ޫ y&]ohxqS.V? "FveÎ=]u%/`#HaJ40twYYLmIp@"ߪ>-HXBxg2?& T\X!·_>k%h|߮jja5ArRmGD¼D6MrXϱJ'0?.QFC (aGd+X7R}4/5EM$OPLWbL2iۗ [fޓdہ@c&8,Pɯ7 Wa1(%.(hHv= )4M5[F,@ V2W@yto_k',8-PY!}i VC\ޓ8*^y}C Dz>.ҏ۾>GAh.,-IX\~5=u9̓Qf/A +ш5~;~#D;vC/roޚ4z""Uf|]Rݮt6}|lɋ.#^rİwCX)@jiݦS7l3טCq]N T.9 7l_SڍQ- ,,]{HfpLH% ]&?ՖmTWe9.\_bnu3!Zk%C ;3̓̃wxlHu/5ʪHs8"ág&DLk7{-p_3{ CڙﺒxX h^G E%hgXhh@xX)S7FShza)kFӈyJihTBBݦ-2HnICeLp̥^?Z}~ÐaҗbkBI6/o~c6ih~k5KVf&qkma|/::=nf-CHNHW-6;R lohAi:+e.2f|VNĭ#a#hdaVVlCĠ+PIpM$$H ,mVhaL(d$.,tJP t R"`j>#jY VGNiX'6_îirY).!Iv"m0F98_>$SC' I ^+5#ZJv[!`"ˑ =.^WM))Ȉ!;%ŒE]ԠC)a=/nRae-&,Ɏk4Ǽ8ybf9_ᵤYDN|١>J&گ*[W1eC{ҥ4M dpZi+nXרe_e5+Rl `/O3NYb #'0qdC]4:hi*%{J{6a;8qa5zYmi pA :Yd} ?r FWv{ J.v;#(9[ݟkxZ~ЬiY2%y"jz#@(a e:Jb5RhQtz= JkF~)6+YheҥB$Ni=7&\+ӟ+dGȴǟO8ŠH Cय%Gm}8M8cT{ sY"ekTT'oixjO0SSTP[!PBu'hԯ>꜏cIJҏӀ2RRJYr\Y)*C8ڏ@6+ zݨgˤ0K1'dE TA?va26/T!6tP+V3&"Q;eWD8 b-MbpfxqUv"YSLJW g}d 3u{I9RxRs%)'Ys16z;$ CP =M;jM}ÔI=}7ZZ. v7=-]c F AuLo-\(P5:t@7mGzZ#,CVBrVG6(IH8{O 2a2T17(ˬTt P1'1Pk) @w4 Ef_g.0%MK鼙J"gxe |pBUrX5tbcZ9 _}[B 뚚mֵUP?z8/ z<^{'r-.&HFYn+tGQ'pp#1'Z>ETpG!HX+z|qwz]:*tfWʣs=v +flyYdNDކ"#Gw:Zb{>%1TB0]v`y -3Za\ B9f&$q$ᾦ@ e<YbVkj?8x u1)umA]=cS_ǜ8 iS]oqyOK"W{?w/5Vu΃lJDN6/hsЛL$`֋E{[W#/l5tɘ<=Z43-a$}Z45Y*G p:jtuOk+Ag9dD<×:šrVK.ѢeD\#,gox+dȹ .IK-w'S mBemp*4Z 㘔cBl//,a_bJSIb.1ЄNz 00TP<&ʿ P h#7%anÞءI,%1YhfU< q1]u 8]ux2Gj;Nabs#1"r.=/BzdKDRaѲUs٥-gL&u7 e٨[w<'I{6RL4WSVW^/Qe`sCl?*]y!I *Cҭ~\.Zh HmޓR4oO߷ Ie4UW<|^Hyua>SEǮeOҹ:j/_5+@s8O` dݢ+(p×M(V}sL9!k:i* W f2P(1GU}1yq{E4>\y3i kք#<>8ب|&/\ph>b~w"Fvڊ'År۠F'N!?&l[~AQ& ]g*Tu2BY6^Wj_aj_ DUk6oUm ,1gHs0J-t (mN`J1p8í.D sSGW`,~=0f>wbt#I&t!dSҴ?h2KdہɳD#B[W](&!tG˘"b@@7Ɂy$@I"vԗϿ[TB{ݨVA]νE}7Zb xσK%jS|V'b|)~‚ϼ.P|޷ 1ؽj`W|h8ez_6܄X|VBvk&~~89&uO`̐'շ 2ރumA-bt$%.yKfֳvUʬy涜yH6@=bNREadߝI8PA xךz=HTa=,ȵ3.yARf.vXY?soSlEł؈KB.庇|!-/##<@B~<*oQM쒏G64z!.i cd~ߨuX5㻞g)BATXbj51xFO9d.-9(1sWɇܿ\X8Hm9;'3d;$3͞>0`1z* B}[ KHOFAP!\-aQvGG]g sRTM`3WH;Ѷ11^Vl]L#YBHc1_54݉=n?GdOj4( u[/p x1tpQ qkRIXVh(!t7 :`Fҝ\ sFf`ިo : |RZɌr ⑜7=~ݞ罠K_xw8mXȺ{W FB+Z Q@ojZֺv:/Bg@ h7 8%M;z`y ӋV-<p]"3F~$#2ml+Ҷ_rcKôd! d|`Sj/IHdb;X@0s/>&6hp𴮀H#5-'2#BOYŪIAx`huS0yOhsVS |7k-%AB..7iFi2h1'53༬շKyx^B7]Nf ~S<IF+ (>,R>^ ^&@60f&qImxy>S0qH;#UPM !. jОrH:#U@q-n!}r+Eу\ݮk6/RzH8^[i51|纃狹}>&+@q nthK la\ R_&}< nEQjEQDK8S`T\4t 冑V?gpVP s).jr~˂9ϓ ?OCL1pH/N*"VPE_iˮ*x7L,Nܲ܉8ަi{Nϊ+d~ כU*/ȋ?m/T+9ST ܜg‰Zؼ}ĉO^gqhcWY?~Kv^"_2|3dV)BP7Zr\A52}Pi|E؎BNA_ y]!$\D0(OVQ(_KX4x<a.KX4bj nxЕ&>j73,ܴu5bqUZ|(|Jx}i-{ T̓7nMD]r)Dmh@g܎}eiV4?%3A 1E2Ƭ2f/JCUkYYHF-iZzD@j!&No: /WHgG%r9g1]eUUu:?zRY@u| T?P9'mGBZs>醿Y#Kw!W )gqG~24,ޱ MU) ZjV: m,CA-S'a,R,-E)NtT\kE}w;JVU <>iP ڄ~G͢8?MnkW`es+:ӧqvЦ Xz{͔LSP N@3H-0~sВWz'ɒ<:^+/C{YTy, $c D ruQ<8d9d8M/r㻗\3~io&P $bi2`#ۨq`KYY9k4[raTQe9xJkmʶ{^({v5^~G<|M^D[\cMpcx *wO9.slbc  ^3$Ӌ&- F[g'YJ5a5T۔0OçWYȻ1utj+)'{LEU6囯Dlakn^ q)@Ө"_H!vyCg8in?f`fK4"Sbs ղ@/)]O3cwوsXNȓS+b2lwOt>iC(ɨ͢PzFhq2!tfSgi^7/It渴.MໞDZڹ )@obn?H 6~xorb@ Eg# `536j ?~?j*ެX{DP'`mgml"Zn60*N V&U̍sS!^Fb#? h7t)[vȗXXȅ : jZh#at*T] ?;Wx>~j.ᖢZ8hʄ-[Vߝf=OR[%u%D^YrΥRa2T#^"̈́:ESk"jcXfŠتLZ@*6^kw^"`{*~iE" g~m>lri*" HL`i$Gui\P>7mgnƷ-PD׍ tG~ă2 鱵e dEu|6*a𷃍I>ÁLPjeI&N_Bb o YO2%+|ѳ"4t"w=mʤ:?pGi}5p()qnɽFC0iܸ[:" $+rX0f S;#I$_xvEP@"cjE^xnbeۗryC\V=y1,*<qFxA͸JVXư1vܡ 'FF_ws~v'J7ݽ vzB\[^kG@P`갋=pn`_mTYp| \(yPUY5z DCk(4a%y]gjhz!$JMuÐoΕ]>I @M$Q-O/}h(auwb_>iJT\TUbZΗ>Bu{أ8l5_$ n?sJ}/A(S>B5$}u'WЍܼ D}'1;̴vw|F?}؊;SF;wک!_9OwuW>1"`/_]GxׁȖ|26Z_P, QEߜsbͼ*h}>n 68=xHW=ZP)AGWw6ZsEUVuW1&K|hiL6d܃ o)otc>ğ/V nuD qd+Jh:GrХ?{ SNAno`X80N+%7ܯA'[-,|vbN,2L9B˦ S\ լtBm z fN# ͳp@W"ᴄ Ebh^AMтD:0ٛt.]0|F!<ZtO.jgm!'챃tx Ӕ`eY iO\&ew̪ (ZO.~NbhQnVZ*y5t|MNA0УQ,wdrHz\v[2+=EyZmͣ$#~; cV)>⶟$8Ұh`!01wץ?ݚ{mj[[ HM .`_nuiȊWaѯ)~ ά®}H9oUx2o=W Hʷ&>}'PKo> q`zXam09P558#}%<&)P|kuM`j;H01A[ͨ;Z߀.T mQ%e#5Clr ~t;-3SwJGic'r1@c|/nr!G:C &zRV]?%,)f˞w\lT=u0rOmAjOVvhȍKz֫ٮN&)<`a2^T o֜<.2IO"THl+ӌ|xMNP= Tv2("NJ΃>hQRG_P7GH8Lr3FLڿNoM8P1EQ{1:]꙯4,VgSU,' 4Н SgEY6h87&}<8hgy_ djFffOO!}KHG: C`={'ř\U'Z0BׄfjwԆ??i0]4jjj17,AQׅ S kF?hwF6hJF Iiq؞Pwٟ秾|8ez!ueveֵy7TU}:x'5!ղ]6 `ys(2r#wߦZhV|G, wo΄w۠ [j}ΩTv q^"gws %F@UqcnQe-A"Uʼqxyאt Ih˔3ga]]PX8 ri3/^ϰPd?I0LtL7ru|:x?*?g]V'a*iF7yB/]&:3Ĭ'H_]"S4|]?Bϧ}n3Acݡ#~QLHu$ zXFD^ҷ:!4ZVWͮDmݐ5Ģu\tf-ٯ| JkҢaqO&Ɏ01w$dC :R4RHIÜz zPSH렣='SasCos Wo\O^WUE: $a@Bf#xe\aM-^ V{ynXOjVѦ4 A-\Dž R<2]eNVJ%i6\f)/kh*T-HR0׻"vHbe}+OʅltZ#Q_B89/-Y Xry\PLvef1@-hIE#]3)$> /s`Ws|3֥sYm'Ciѭ?;wje5?BڏL뮍yr{ޒDzmZ~7I,".8_nRV_E@YpY dLHH՗g>0|yx:oVzSF!UL} 3Zpm? fmJ?mޟ}fu^68cf]ٲ\&S=N&`y:sQ=]tc(wyS2 N3(0ɂ-%3e9@"F;m!ztpB>b?F!=RH D/#oa1%wEWj̮ t8Ӥ~Eb M# \`A׋=u[!,C9Z\?.zF/0/QI@ 14r&MZyъl+b@q˸579}@X mLk4|uqv80ƣ/hh:N3_@37{̹j]b(#Pٽ)䮠]I;1&ADmk8%߸  _7PVԫV\i*<%J<84PVN0ED0ܳ$fm_F,oԪ,UHTlT*w@8jӕ|Z ›žcJѯW Y;L)%]zJ5y8wؼ92qvq?3љ8\;o}D1sɮ- wװu;?n@F9H97fbhP‚17gG6ٰ';KLXuV-،V3-a(7#&<8m ghy;i=)d-\D|i[b ~;~wh+qRzqGy"COs;F4DގG.EYvѢWM-N2҆iGJƌ$+ԳB2? O'k+ 1gWԼá;҈B]4;pO}[0\ہkX._Z~}XTT,R0 vE 1xdnI1*8EmwUM@ϓ}F +#̓r5vJ1zYfm ҫVkLR?4@Ұq:P9}Aqټ>Emxz|gSU`8Iߛ2w(HΒ1Yc!žO/g!5fQO¶28x {厈.ᶛ#or`}5@}V=:E&$+P!ʦ۫ !ʯ{DőE7nӊ[ rg˴&mv1Xyw80j'=߹Dw>~hYY6=dG21 0 KZibEb}g K1l!>2DG*\<.KrHl*agl-GވB8xJF(e^u^F3&-}țK,0,bPfI6eܱI{mE<@U>=Wr.i 7"A߆Fv`%?g#DUup Iic/~Av|>xat.)'XD9DlQyҧ"ClJ$0ZQaGs0aaIv ;._V } ,: U>H5I@>~sP{x _aI_慔SK|y@'H*PA!wZT}5L(ka?y &> YZ