xen-doc-html-4.12.1_04-lp151.2.6.1 4>$  Ap]/=„bvcF9 %]F~g-vMR V;B۱h/u(ʔΘ|PHXy$a´Fp*moe&pb9 ǙfNs1.Gp9^?^d % L EKTMM "M M M M  M@MMBdMO(s8|59"P5:7*5GPXMHQMIRMXSYS\SDM]TxM^Y bZc[d\'e\,f\/l\1u\DMv]x^L^P^V^Cxen-doc-html4.12.1_04lp151.2.6.1Xen Virtualization: HTML documentationXen is a virtual machine monitor for x86 that supports execution of multiple guest operating systems with unprecedented levels of performance and resource isolation. xen-doc-html contains the online documentation in HTML format. Point your browser at file:/usr/share/doc/packages/xen/html/ Authors: -------- Ian Pratt ]cloud125 ~openSUSE Leap 15.1openSUSEGPL-2.0-onlyhttp://bugs.opensuse.orgDocumentation/HTMLhttp://www.cl.cam.ac.uk/Research/SRG/netos/xen/linuxx86_64ot9DA'6@7x3#B( W c e $,76H"yjQ <3 "z29 74\xAAAA큤A큤A큤A큤A큤A큤A큤A큤]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]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-4.12.1_04-lp151.2.6.1.src.rpmxen-doc-htmlxen-doc-html(x86-64)     rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PartialHardlinkSets)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0.4-14.0-15.2-14.14.1]d@]@]@]]fl]M`@]B@]@]]@\\ޢ@\ڭ\\@\@\@\,@\7\\N\@\\+@\\M\M\\\@\}@\k\X)@\J@\I\A\?\=@\9\73\4\$\l@[H[k@[@[^[^[/[@[@[9@[v[W[CN@[<[6@[0@[0@['[!@[5@Z@ZnZ@ZZZ@ZmZԐ@ZZZ@ZZ}@Z}@Z}@Z}@Zz@Zz@Zo Zk@ZV@ZS]@ZOhZ:PZ1@Z.s@Z&@ZOZOZ Z Z Z@Z@Z }ZC@ZYYYY|Y@Y{Y*@Y5YA@Y4YYYbYY@Y3Y@YJYJY@YYV@Y@Ym@Yw2Yp@YlYh@Yh@YS@YJ_YI@Y5GY0Y-^Y(Y"YY;@YYY@YtY.X@XQ@X@XۡXg@X@XƉX@X @X@X@X@X@XXX@XXXwoXs{@XlXWXRXQ4@XEVX43@X.@X*X lX&X@XX@W@W֘W֘W^@WiW:Wt@W.@W9WW@Wk@Wi,@WbWZWZWZWYZ@WV@WEWBW=W;W3W1@W1@W,@W(W(W(W(W(W#LWVbV(@V3VJVxV'@VV2V͛@VŲ@V`VwVVV=@VV@VHV@VvV%@VV<@V@VS@VV@V^VwVqR@Vn@VXEVUVTQ@VMVMVMVA@V;DV9@V7P@V0V*!@V V@VCVVVf@VqV@UYU@U@UUݪ@U@UnU4@UUK@UU@UU>U@Ux&Un@U\w@U[%UUUPUKSU>$U6;U%@UU@UUU.@TgT-@TT@TZ@TZ@T@TT@T5T@TLTLT~@Tl@Ti@Ta@THT?@T=@carnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comJim Fehlig ohering@suse.deMartin Liška ohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comJan Engelhardt Guillaume GARDET Guillaume GARDET Bernhard Wiedemann carnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deBernhard Wiedemann ohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comtrenn@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.dejfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.deohering@suse.derbrown@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comjfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.dejfehlig@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comohering@suse.dejfehlig@suse.comcarnold@suse.comjfehlig@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.commlatimer@suse.comcarnold@suse.comcyliu@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.derguenther@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comrguenther@suse.comcarnold@suse.commeissner@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.com- bsc#1154448 - VUL-0: CVE-2019-18420: xen: XSA-296: VCPUOP_initialise DoS 5dbaf89f-dont-use-BUG-for-parameter-checking.patch - bsc#1154456 - VUL-0: CVE-2019-18425: xen: XSA-298: missing descriptor table limit checking in x86 PV emulation 5dbaf8e0-x86-PV-check-GDT-LDT-limits-during-emulation.patch - bsc#1154458 - VUL-0: CVE-2019-18421: xen: XSA-299: Issues with restartable PV type change operations 5dbaf990-x86-mm-L1TF-checks-dont-leave-partial-entry.patch 5dbaf9b2-x86-mm-dont-re-set-PGT_pinned-on-partial-page.patch 5dbaf9ce-x86-mm-split-partial_pte-tristate.patch 5dbaf9f5-x86-mm-use-flags-for-_put_page_type.patch 5dbafa13-x86-mm-rework-get_page_and_type_from_mfn-conditional.patch 5dbafa46-x86-mm-alloc_lN_table-clear-partial_flags-when-preempting.patch 5dbafa5c-x86-mm-always-retain-general-ref-on-partial.patch 5dbafaa4-x86-mm-properly-handle-linear-pt-promotion-failure.patch 5dbafabd-x86-mm-fix-nested-devalidation-on-error.patch 5dbafad5-x86-mm-dont-drop-type-ref-unless.patch 5dbc0d64-x86-fix-CONFIG_PV-build-following-XSA-299.patch - bsc#1154460 - VUL-0: CVE-2019-18423: xen: XSA-301: add-to-physmap can be abused to DoS Arm hosts 5dbafb0d-Arm-p2m-avoid-aliasing-guest-physical-frame.patch 5dbafb4e-Arm-p2m-avoid-off-by-1-check-on-max_mapped_gfn.patch 5dbafb72-Arm-p2m-dont-check-p2m_get_root_pointer-ret-with-BUG_ON.patch - bsc#1154461 - VUL-0: CVE-2019-18424: xen: XSA-302: passed through PCI devices may corrupt host memory after deassignment 5dbafba5-passthrough-quarantine-PCI-devices.patch:This is XSA-302. - bsc#1154464 - VUL-0: CVE-2019-18422: xen: XSA-303: ARM: Interrupts are unconditionally unmasked in exception handlers 5dbafbda-Arm32-entry-Split-__DEFINE_ENTRY_TRAP.patch 5dbafbfd-Arm32-entry-fold-SAVE_ALL-into-vector-macro.patch 5dbafc3a-Arm32-dont-unmask-interrupts-on-trap-without-level-change.patch 5dbafc4f-Arm64-dont-unmask-interrupts-on-trap-without-level-change.patch - bsc#1155945 - VUL-0: CVE-2018-12207: xen: Machine Check Error Avoidance on Page Size Change (aka IFU issue) xsa304-1.patch xsa304-2.patch - bsc#1152497 - VUL-0: CVE-2019-11135: xen: XSA-305: TSX Asynchronous Abort (TAA) issue xsa305-1.patch xsa305-2.patch - Upstream bug fixes (bsc#1027519) 5d9ef2a1-EFI-deref-pointer-in-set_color.patch 5d9f454a-x86-EFI-pixel-reserved-0.patch 5db2b4a2-x86-is_xen_fixed_mfn-off-by-1.patch 5d9ee2f0-AMD-IOMMU-allocate_buffer-avoid-memset.patch 5db892ac-VT-x-fix-Haswell-Broadwell-LBR-TSX-errata.patch 5d948bdb-IOMMU-add-missing-HVM-check.patch 5d9ee312-AMD-IOMMU-prefill-all-DTEs.patch 5d9ef2c5-EFI-gfx-mode-for-MB2-boot.patch 5db892ac-VT-x-correct-BDF93-workaround.patch 5d947b01-x86-crash-force-unlock-console.patch 5d8ce179-sched-dont-leak-XEN_RUNSTATE_UPDATE.patch 5d9ef2ef-PCI-clear-maskall-fields-on-assign.patch 5d9ee2a8-AMD-IOMMU-alloc-1-devtab-per-PCI-seg.patch 5db07974-x86-update-time-info-on-TSC-adjustments.patch 5dbafa7f-x86-mm-collapse-PTF_partial_.patch- bsc#1120095 - add code to change LIBXL_HOTPLUG_TIMEOUT at runtime The included README has details about the impact of this change libxl.LIBXL_HOTPLUG_TIMEOUT.patch- bsc#1135799 - Partner-L3: Xen crashes on AMD ROME based machines 5ca7660f-x86-entry-drop-unused-includes.patch 5cf8da09-adjust-sysdom-creation-call-earlier-on-x86.patch 5cab2a6b-x86-ACPI-also-parse-AMD-tables-early.patch 5cab2ab7-x86-IOMMU-introduce-init-ops.patch 5cab2ae8-x86-IOMMU-abstract-iommu_supports_eim.patch 5cab2b4e-x86-IOMMU-abstract-iommu_enable_x2apic_IR.patch 5cab2b95-x86-IOMMU-initialize-iommu_ops-in.patch 5cac9a4b-x86-IOMMU-abstract-adjust_vtd_irq_affinities.patch 5cdeac7f-AMD-IOMMU-adjust-IOMMU-list-head-init.patch 5d0cf4e4-AMD-IOMMU-initialize-IRQ-tasklet-once.patch 5d149bb0-AMD-IOMMU-dont-add-IOMMUs.patch 5d1b3fab-AMD-IOMMU-restrict-feature-logging.patch 5d358508-x86-IRQ-desc-affinity-represents-request.patch 5d358534-x86-IRQ-consolidate-arch-cpu_mask-use.patch 5d358a67-AMD-IOMMU-pass-IOMMU-to-iterate_ivrs_entries-cb.patch 5d358a92-AMD-IOMMU-pass-IOMMU-to-amd_iommu_alloc_intremap_table.patch 5d39811c-x86-IOMMU-dont-restrict-IRQ-affinities.patch 5d417813-AMD-IOMMU-bitfield-extended-features.patch 5d417838-AMD-IOMMU-bitfield-control-reg.patch 5d41785b-AMD-IOMMU-bitfield-IRTE.patch 5d41787e-AMD-IOMMU-pass-IOMMU-to-gfu-intremap-entry.patch 5d4178ad-AMD-IOMMU-128bit-non-guest-APIC-IRTE.patch 5d4178fc-AMD-IOMMU-split-amd_iommu_init_one.patch 5d41793f-AMD-IOMMU-allow-enabling-without-IRQ.patch 5d417a16-AMD-IOMMU-adjust-IRQ-setup-for-x2APIC.patch 5d417ab6-AMD-IOMMU-enable-x2APIC-mode.patch 5d417b38-AMD-IOMMU-correct-IRTE-updating.patch 5d417b6a-AMD-IOMMU-dont-needlessly-log-headers.patch 5d4a9d25-AMD-IOMMU-drop-not-found-message.patch 5d80e7c0-AMD-IOMMU-free-shared-IRT-once.patch 5d80e80d-AMD-IOMMU-valid-flag-for-IVRS-mappings.patch 5d80e82e-AMD-IOMMU-alloc_intremap_table-callers-handle-errors.patch 5d80e857-x86-PCI-read-MSI-X-table-entry-count-early.patch 5d8b72e5-AMD-IOMMU-dont-blindly-alloc-intremap-tables.patch 5d8b730e-AMD-IOMMU-phantom-funcs-share-intremap-tables.patch 5d8b733b-x86-PCI-read-max-MSI-vector-count-early.patch 5d8b736d-AMD-IOMMU-replace-INTREMAP_ENTRIES.patch 5d8b7393-AMD-IOMMU-restrict-intremap-table-sizes.patch - bsc#1145240 - [Migration]Can't pre-allocate 1 shadow pages 5d70bfba-x86-shadow-dont-enable-with-too-small-allocation.patch - bsc#1137717 - [HPS Bug] Unable to install Windows Server 2016 with 2 CPUs setting (or above) under SLES12 SP4 Xen Server on AMD ROME platform 5d89d8d9-libxc-x86-avoid-overflow-in-CPUID-APIC-ID.patch - Upstream bug fixes (bsc#1027519) 5d67ceaf-x86-properly-gate-PKU-clearing.patch 5d779811-x86-fix-CPUID7-0-eax-levelling-MSR.patch 5d77b40f-fix-hvm_all_ioreq_servers_add_vcpu-cleanup.patch 5d80ea13-vpci-honor-read-only-devices.patch 5d8b715f-ACPI-cpuidle-bump-max-num-of-states.patch- bsc#1145774 - Libivrtd segfaults when trying to live migrate a VM Fix crash in an error path of libxl_domain_suspend with libxl.helper_done-crash.patch- Upstream bug fixes (bsc#1027519) 5d419d49-x86-spec-ctrl-report-proper-status.patch 5d43253c-x86-ucode-always-collect_cpu_info-at-boot.patch 5d4aa36f-x86-apic-enable-x2APIC-mode-earlier.patch 5d4afa7a-credit2-fix-memory-leak.patch 5d4d850a-introduce-bss-percpu-page-aligned.patch 5d516531-x86-xpti-dont-leak-TSS-adjacent-data.patch 5d5bf475-x86-PV-fix-handling-of-iommu-mappings.patch 5d6524ca-x86-mm-correctly-init-M2P-entries.patch - Drop 5d419d49-x86-spec-ctrl-facilities-report-wrong-status.patch- Update to Xen 4.12.1 bug fix release (bsc#1027519) xen-4.12.1-testing-src.tar.bz2 - Drop patches contained in new tarball 5c87b644-IOMMU-leave-enabled-for-kexec-crash.patch 5c87b6a2-x86-HVM-dont-crash-guest-in-find_mmio_cache.patch 5c87b6c8-drop-arch_evtchn_inject.patch 5c87b6e8-avoid-atomic-rmw-accesses-in-map_vcpu_info.patch 5c87e6d1-x86-TSX-controls-for-RTM-force-abort-mode.patch 5c8f752c-x86-e820-build-with-gcc9.patch 5c8fb92d-x86-HVM-split-linear-reads-and-writes.patch 5c8fb951-x86-HVM-finish-IOREQs-correctly-on-completion.patch 5c8fc6c0-x86-MSR-shorten-ARCH_CAPABILITIES.patch 5c8fc6c0-x86-SC-retpoline-safety-calculations-for-eIBRS.patch 5c9e63c5-credit2-SMT-idle-handling.patch 5ca46b68-x86emul-no-GPR-update-upon-AVX-gather-failures.patch 5ca773d1-x86emul-dont-read-mask-reg-without-AVX512F.patch 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch 5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch 5cd921fb-trace-fix-build-with-gcc9.patch 5cd9224b-AMD-IOMMU-disable-upon-init-fail.patch 5cd922c5-x86-MTRR-recalc-p2mt-when-iocaps.patch 5cd9230f-VMX-correctly-get-GS_SHADOW-for-current.patch 5cd926d0-bitmap_fill-zero-sized.patch 5cd92724-drivers-video-drop-constraints.patch 5cd93a69-x86-MSR_INTEL_CORE_THREAD_COUNT.patch 5cd93a69-x86-boot-detect-Intel-SMT-correctly.patch 5cd93a69-x86-spec-ctrl-reposition-XPTI-parsing.patch 5cd981ff-x86-IRQ-tracing-avoid-UB-or-worse.patch 5cdad090-x86-spec-ctrl-CPUID-MSR-definitions-for-MDS.patch 5cdad090-x86-spec-ctrl-infrastructure-for-VERW-flush.patch 5cdad090-x86-spec-ctrl-misc-non-functional-cleanup.patch 5cdad090-x86-spec-ctrl-opts-to-control-VERW-flush.patch 5cdeb9fd-sched-fix-csched2_deinit_pdata.patch 5ce7a92f-x86-IO-APIC-fix-build-with-gcc9.patch 5cf0f6a4-x86-vhpet-resume-avoid-small-diff.patch 5cf16e51-x86-spec-ctrl-Knights-retpoline-safe.patch 5d03a0c4-1-Arm-add-an-isb-before-reading-CNTPCT_EL0.patch 5d03a0c4-2-gnttab-rework-prototype-of-set_status.patch 5d03a0c4-3-Arm64-rewrite-bitops-in-C.patch 5d03a0c4-4-Arm32-rewrite-bitops-in-C.patch 5d03a0c4-5-Arm-bitops-consolidate-prototypes.patch 5d03a0c4-6-Arm64-cmpxchg-simplify.patch 5d03a0c4-7-Arm32-cmpxchg-simplify.patch 5d03a0c4-8-Arm-bitops-helpers-with-timeout.patch 5d03a0c4-9-Arm-cmpxchg-helper-with-timeout.patch 5d03a0c4-A-Arm-turn-on-SILO-mode-by-default.patch 5d03a0c4-B-bitops-guest-helpers.patch 5d03a0c4-C-cmpxchg-guest-helpers.patch 5d03a0c4-D-use-guest-atomics-helpers.patch 5d03a0c4-E-Arm-add-perf-counters-in-guest-atomic-helpers.patch 5d03a0c4-F-Arm-protect-gnttab_clear_flag.patch - Refreshed patches libxl.pvscsi.patch- bsc#1143563 - Speculative mitigation facilities report wrong status 5d419d49-x86-spec-ctrl-facilities-report-wrong-status.patch- bsc#1138563 - L3: xenpvnetboot improperly ported to Python 3 fix-xenpvnetboot.patch- bsc#1138294 - VUL-0: CVE-2019-17349: XSA-295: Unlimited Arm Atomics Operations 5d03a0c4-1-Arm-add-an-isb-before-reading-CNTPCT_EL0.patch 5d03a0c4-2-gnttab-rework-prototype-of-set_status.patch 5d03a0c4-3-Arm64-rewrite-bitops-in-C.patch 5d03a0c4-4-Arm32-rewrite-bitops-in-C.patch 5d03a0c4-5-Arm-bitops-consolidate-prototypes.patch 5d03a0c4-6-Arm64-cmpxchg-simplify.patch 5d03a0c4-7-Arm32-cmpxchg-simplify.patch 5d03a0c4-8-Arm-bitops-helpers-with-timeout.patch 5d03a0c4-9-Arm-cmpxchg-helper-with-timeout.patch 5d03a0c4-A-Arm-turn-on-SILO-mode-by-default.patch 5d03a0c4-B-bitops-guest-helpers.patch 5d03a0c4-C-cmpxchg-guest-helpers.patch 5d03a0c4-D-use-guest-atomics-helpers.patch 5d03a0c4-E-Arm-add-perf-counters-in-guest-atomic-helpers.patch 5d03a0c4-F-Arm-protect-gnttab_clear_flag.patch - Upstream bug fixes (bsc#1027519) 5c87b6c8-drop-arch_evtchn_inject.patch 5c87b6e8-avoid-atomic-rmw-accesses-in-map_vcpu_info.patch 5cd921fb-trace-fix-build-with-gcc9.patch 5cd9224b-AMD-IOMMU-disable-upon-init-fail.patch 5cd922c5-x86-MTRR-recalc-p2mt-when-iocaps.patch 5cd9230f-VMX-correctly-get-GS_SHADOW-for-current.patch 5cd926d0-bitmap_fill-zero-sized.patch 5cd92724-drivers-video-drop-constraints.patch 5cd93a69-x86-spec-ctrl-reposition-XPTI-parsing.patch (Replaces xsa297-0a.patch) 5cd93a69-x86-MSR_INTEL_CORE_THREAD_COUNT.patch (Replaces xsa297-0b.patch) 5cd93a69-x86-boot-detect-Intel-SMT-correctly.patch (Replaces xsa297-0c.patch) 5cdad090-x86-spec-ctrl-misc-non-functional-cleanup.patch (Replaces xsa297-0d.patch) 5cdad090-x86-spec-ctrl-CPUID-MSR-definitions-for-MDS.patch (Replaces xsa297-1.patch) 5cdad090-x86-spec-ctrl-infrastructure-for-VERW-flush.patch (Replaces xsa297-2.patch) 5cdad090-x86-spec-ctrl-opts-to-control-VERW-flush.patch (Replaces xsa297-3.patch) 5cd981ff-x86-IRQ-tracing-avoid-UB-or-worse.patch 5cdeb9fd-sched-fix-csched2_deinit_pdata.patch 5ce7a92f-x86-IO-APIC-fix-build-with-gcc9.patch 5cf0f6a4-x86-vhpet-resume-avoid-small-diff.patch 5cf16e51-x86-spec-ctrl-Knights-retpoline-safe.patch- Fix some outdated information in the readme README.SUSE- spec: xen-tools: require matching version of xen package bsc#1137471- Remove two stale patches xen.build-compare.man.patch xenpaging.doc.patch- Disable LTO (boo#1133296).- Remove arm32 from ExclusiveArch to fix build- bsc#1111331 - VUL-0: CPU issues Q2 2019 aka "Group 4". CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 xsa297-0a.patch xsa297-0b.patch xsa297-0c.patch xsa297-0d.patch xsa297-1.patch xsa297-2.patch xsa297-3.patch - Update 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch and drop 5cac6219-xen-cpu-Fix-ARM-build-following-cs-597fbb8.patch Refresh 5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch- bsc#1131811 - [XEN] internal error: libxenlight failed to create new domain. This patch is a workaround for a systemd issue. See patch header for additional comments. xenstore-launch.patch- bsc#1125378 - [xen][pygrub] Can not restore sle11sp4 pv guest after upgrading host from sle11sp4 to sle15sp1 pygrub-python3-conversion.patch - Fix "TypeError: virDomainDefineXML() argument 2 must be str or None, not bytes" when converting VMs from using the xm/xend toolstack to the libxl/libvirt toolstack. (bsc#1123378) xen2libvirt.py- bsc#1124560 - Fully virtualized guests crash on boot 5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch - bsc#1121391 - GCC 9: xen build fails 5c8f752c-x86-e820-build-with-gcc9.patch - Upstream bug fixes (bsc#1027519) 5c87b644-IOMMU-leave-enabled-for-kexec-crash.patch 5c87b6a2-x86-HVM-dont-crash-guest-in-find_mmio_cache.patch 5c87e6d1-x86-TSX-controls-for-RTM-force-abort-mode.patch 5c8fb92d-x86-HVM-split-linear-reads-and-writes.patch 5c8fb951-x86-HVM-finish-IOREQs-correctly-on-completion.patch 5c8fc6c0-x86-MSR-shorten-ARCH_CAPABILITIES.patch 5c8fc6c0-x86-SC-retpoline-safety-calculations-for-eIBRS.patch 5c9e63c5-credit2-SMT-idle-handling.patch 5ca46b68-x86emul-no-GPR-update-upon-AVX-gather-failures.patch 5ca773d1-x86emul-dont-read-mask-reg-without-AVX512F.patch 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch 5cac6219-xen-cpu-Fix-ARM-build-following-cs-597fbb8.patch- Install pkgconfig files into libdir instead of datadir- Update to Xen 4.12.0 FCS release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2 * HVM/PVH and PV only Hypervisor: The Xen 4.12 release separates the HVM/PVH and PV code paths in Xen and provides KCONFIG options to build a PV only or HVM/PVH only hypervisor. * QEMU Deprivilege (DM_RESTRICT): In Xen 4.12, this feature has been vastly improved. * Argo - Hypervisor-Mediated data eXchange: Argo is a new inter- domain communication mechanism. * Improvements to Virtual Machine Introspection: The VMI subsystem which allows detection of 0-day vulnerabilities has seen many functional and performance improvements. * Credit 2 Scheduler: The Credit2 scheduler is now the Xen Project default scheduler. * PVH Support: Grub2 boot support has been added to Xen and Grub2. * PVH Dom0: PVH Dom0 support has now been upgraded from experimental to tech preview. * The Xen 4.12 upgrade also includes improved IOMMU mapping code, which is designed to significantly improve the startup times of AMD EPYC based systems. * The upgrade also features Automatic Dom0 Sizing which allows the setting of Dom0 memory size as a percentage of host memory (e.g. 10%) or with an offset (e.g. 1G+10%).- bsc#1130485 - Please drop Requires on multipath-tools in xen-tools. Now using Recommends multipath-tools. xen.spec- Update to Xen 4.12.0 RC7 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- Update to Xen 4.12.0 RC6 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- bsc#1026236 - add Xen cmdline option "suse_vtsc_tolerance" to avoid TSC emulation for HVM domUs if their expected frequency does not match exactly the frequency of the receiving host xen.bug1026236.suse_vtsc_tolerance.patch- Update to Xen 4.12.0 RC5 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- jsc#SLE-3059 - Disable Xen auto-ballooning - Add CONFIG_DOM0_MEM to the spec file for managing dom0 memory. xen.spec - Disable autoballooning in xl.con xl-conf-disable-autoballoon.patch- Update gcc9-ignore-warnings.patch to fix build in SLE12- bsc#1126325 - fix crash in libxl in error path Setup of grant_tables and other variables may fail libxl.prepare-environment-for-domcreate_stream_done.patch- bsc#1127620 - Documentation for the xl configuration file allows for firmware=pvgrub64 but we don't ship pvgrub64. Create a link from grub.xen to pvgrub64 xen.spec- Update to Xen 4.12.0 RC4 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2 - Tarball also contains additional post RC4 security fixes for Xen Security Advisories 287, 288, and 290 through 294.- Update to Xen 4.12.0 RC3 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- Update to Xen 4.12.0 RC2 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- bsc#1121391 - GCC 9: xen build fails gcc9-ignore-warnings.patch- bsc#1122563 - Virtualization/xen: Bug no Xen on boot, missing /proc/xen, after 4.11 -> 4.12 upgrade on X86_64/efi. Keep xen.efi in /usr/lib64/efi for booting older distros. xen.spec- fate#326960: Package grub2 as noarch. As part of the effort to have a unified bootloader across architectures, modify the xen.spec file to move the Xen efi files to /usr/share/efi/$(uname -m) from /usr/lib64/efi.- Update to Xen 4.12.0 RC1 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2 - Drop 5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch 5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch 5b8fae26-tools-libxl-correct-vcpu-affinity-output-with-sparse-physical-cpu-map.patch 5b8fae26-xen-fill-topology-info-for-all-present-cpus.patch 5b8fb5af-tools-xl-refuse-to-set-number-of-vcpus-to-0-via-xl-vcpu-set.patch 5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch 5b9784d2-x86-HVM-add-known_gla-helper.patch 5b9784f2-x86-HVM-split-page-straddling-accesses.patch 5bdc31d5-VMX-fix-vmx_handle_eoi.patch gcc8-fix-array-warning-on-i586.patch gcc8-fix-format-warning-on-i586.patch gcc8-inlining-failed.patch xen.bug1079730.patch- bsc#1121960 - xen: sync with Factory xen.spec xen.changes- Replace old $RPM_* shell vars. - Run fdupes for all architectures, and not crossing subvolume boundaries.- Do not run %fdupes on aarch64 to avoid the hardlink-across-partition rpmlint error- Require qemu-seabios only on x86* as it is not available on non-x86 systems- Avoid creating dangling symlinks (bsc#1116524) This reverts the revert of tmp_build.patch- Update to Xen 4.11.1 bug fix release (bsc#1027519) xen-4.11.1-testing-src.tar.bz2 - 5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch replaces xen.2b50cdbc444c637575580dcfa6c9525a84d5cc62.patch - 5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch replaces xen.b8f33431f3dd23fb43a879f4bdb4283fdc9465ad.patch - Drop the following patches contained in the new tarball 5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch 5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch 5b3cab8e-2-VMX-improve-MSR-load-save-API.patch 5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch 5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch 5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch 5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch 5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch 5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch 5b3f8fa5-port-array_index_nospec-from-Linux.patch 5b4321f6-x86-correctly-set-nonlazy_xstate_used-when-loading-full-state.patch 5b4488e7-x86-spec-ctrl-cmdline-handling.patch 5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch 5b4c9a60-allow-cpu_down-to-be-called-earlier.patch 5b4db308-SVM-fix-cleanup-svm_inject_event.patch 5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch 5b5040f2-x86-AMD-distinguish-CU-from-HT.patch 5b505fe5-VMX-fix-find-msr-build.patch 5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch 5b508775-2-x86-possibly-bring-up-all-CPUs.patch 5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch 5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch 5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch 5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch 5b56feb1-hvm-Disallow-unknown-MSR_EFER-bits.patch 5b56feb2-spec-ctrl-Fix-the-parsing-of-xpti--on-fixed-Intel-hardware.patch 5b62ca93-VMX-avoid-hitting-BUG_ON.patch 5b6d84ac-x86-fix-improve-vlapic-read-write.patch 5b6d8ce2-x86-XPTI-parsing.patch 5b72fbbe-ARM-disable-grant-table-v2.patch 5b72fbbe-oxenstored-eval-order.patch 5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch 5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch 5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch 5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch 5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch 5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch 5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch 5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch 5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch 5b72fbbf-x86-Make-spec-ctrl-no-a-global-disable-of-all-mitigations.patch 5b72fbbf-xl.conf-Add-global-affinity-masks.patch 5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch 5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch 5b75afef-x86-setup-avoid-OoB-E820-lookup.patch 5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch 5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch 5b8d5832-x86-assorted-array_index_nospec-insertions.patch 5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch 5bacae4b-x86-boot-allocate-extra-module-slot.patch 5bae44ce-x86-silence-false-log-messages.patch 5bb60c12-x86-split-opt_xpti.patch 5bb60c4f-x86-split-opt_pv_l1tf.patch 5bb60c74-x86-fix-xpti-and-pv-l1tf.patch 5bcf0722-x86-boot-enable-NMIs.patch 5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch 5bd076e9-x86-boot-init-debug-regs-correctly.patch 5bd076e9-x86-init-vcpu-debug-regs-correctly.patch 5bd0e0cf-vvmx-Disallow-the-use-of-VT-x-instructions-when-nested-virt-is-disabled.patch 5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch 5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch 5be2a308-x86-extend-get_platform_badpages.patch 5be2a354-x86-work-around-HLE-host-lockup-erratum.patch xsa275-1.patch xsa275-2.patch xsa276-1.patch xsa276-2.patch xsa277.patch xsa279.patch xsa280-1.patch xsa280-2.patch- bsc#1116524 - Package xen-tools-4.11.0_09-2.1.x86_64 broken: Missing /bin/domu-xenstore. This was broken because "make package build reproducible" change. (boo#1047218, boo#1062303) This fix reverses the change to this patch. tmp_build.patch- bsc#1115040 - VUL-0: CVE-2018-19961 CVE-2018-19962: xen: insufficient TLB flushing / improper large page mappings with AMD IOMMUs (XSA-275) xsa275-1.patch xsa275-2.patch - bsc#1115043 - VUL-0: CVE-2018-19963: xen: resource accounting issues in x86 IOREQ server handling (XSA-276) xsa276-1.patch xsa276-2.patch - bsc#1115044 - VUL-0: CVE-2018-19964: xen: x86: incorrect error handling for guest p2m page removals (XSA-277) xsa277.patch - bsc#1114405 - VUL-0: CVE-2018-18883: xen: Nested VT-x usable even when disabled (XSA-278) 5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch - bsc#1115045 - VUL-0: xen: CVE-2018-19965: x86: DoS from attempting to use INVPCID with a non-canonical addresses (XSA-279) xsa279.patch - bsc#1115047 - VUL-0: CVE-2018-19966: xen: Fix for XSA-240 conflicts with shadow paging (XSA-280) xsa280-1.patch xsa280-2.patch - bsc#1114988 - VUL-0: CVE-2018-19967: xen: guest use of HLE constructs may lock up host (XSA-282) 5be2a308-x86-extend-get_platform_badpages.patch 5be2a354-x86-work-around-HLE-host-lockup-erratum.patch - bsc#1108940 - L3: XEN SLE12-SP1 domU hang on SLE12-SP3 HV 5bdc31d5-VMX-fix-vmx_handle_eoi.patch - Upstream bug fixes (bsc#1027519) 5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch 5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch 5bacae4b-x86-boot-allocate-extra-module-slot.patch 5bae44ce-x86-silence-false-log-messages.patch 5bb60c12-x86-split-opt_xpti.patch 5bb60c4f-x86-split-opt_pv_l1tf.patch 5bb60c74-x86-fix-xpti-and-pv-l1tf.patch 5bcf0722-x86-boot-enable-NMIs.patch 5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch 5bd076e9-x86-boot-init-debug-regs-correctly.patch 5bd076e9-x86-init-vcpu-debug-regs-correctly.patch 5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch- bsc#1114405 - VUL-0: CVE-2018-18883: xen: Nested VT-x usable even when disabled (XSA-278) 5bd0e0cf-vvmx-Disallow-the-use-of-VT-x-instructions-when-nested-virt-is-disabled.patch- Use SMBIOS_REL_DATE instead of SMBIOS_DATE for reproducible binaries- make package build reproducible (boo#1047218, boo#1062303) * Set SMBIOS_REL_DATE * Update tmp_build.patch to use SHA instead of random build-id * Add reproducible.patch to use --no-insert-timestamp- Building with ncurses 6.1 will fail without xen.2b50cdbc444c637575580dcfa6c9525a84d5cc62.patch - Building libxl acpi support on aarch64 with gcc 8.2 will fail without xen.b8f33431f3dd23fb43a879f4bdb4283fdc9465ad.patch- bsc#1106263 - L3: The affinity reporting via 'xl vcpu-list' is apparently broken 5b8fae26-tools-libxl-correct-vcpu-affinity-output-with-sparse-physical-cpu-map.patch 5b8fae26-xen-fill-topology-info-for-all-present-cpus.patch 5b8fb5af-tools-xl-refuse-to-set-number-of-vcpus-to-0-via-xl-vcpu-set.patch- bsc#1094508 - L3: Kernel oops in fs/dcache.c called by d_materialise_unique() 5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch 5b9784d2-x86-HVM-add-known_gla-helper.patch 5b9784f2-x86-HVM-split-page-straddling-accesses.patch - bsc#1103279 - (CVE-2018-15470) VUL-0: CVE-2018-15470: xen: oxenstored does not apply quota-maxentity (XSA-272) 5b72fbbe-oxenstored-eval-order.patch - bsc#1103275 - (CVE-2018-15469) VUL-0: CVE-2018-15469: xen: Use of v2 grant tables may cause crash on ARM (XSA-268) 5b72fbbe-ARM-disable-grant-table-v2.patch - Upstream patches from Jan (bsc#1027519) 5b6d84ac-x86-fix-improve-vlapic-read-write.patch 5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch 5b75afef-x86-setup-avoid-OoB-E820-lookup.patch 5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch 5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch 5b8d5832-x86-assorted-array_index_nospec-insertions.patch - Drop 5b741962-x86-write-to-correct-variable-in-parse_pv_l1tf.patch- bsc#1078292 - rpmbuild -ba SPECS/xen.spec with xen-4.9.1 failed xen.spec- bsc#1091107 - VUL-0: CVE-2018-3646: xen: L1 Terminal Fault -VMM (XSA-273) 5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch 5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch 5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch 5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch 5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch 5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch 5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch 5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch - bsc#1103276 - VUL-0: CVE-2018-15468: xen: x86: Incorrect MSR_DEBUGCTL handling lets guests enable BTS (XSA-269) 5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch - Upstream prereq patches for XSA-273 and other upstream fixes (bsc#1027519) 5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch 5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch 5b3cab8e-2-VMX-improve-MSR-load-save-API.patch 5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch 5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch 5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch 5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch 5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch 5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch 5b4321f6-x86-correctly-set-nonlazy_xstate_used-when-loading-full-state.patch 5b505fe5-VMX-fix-find-msr-build.patch 5b56feb1-hvm-Disallow-unknown-MSR_EFER-bits.patch 5b56feb2-spec-ctrl-Fix-the-parsing-of-xpti--on-fixed-Intel-hardware.patch 5b62ca93-VMX-avoid-hitting-BUG_ON.patch 5b6d8ce2-x86-XPTI-parsing.patch 5b72fbbf-x86-Make-spec-ctrl-no-a-global-disable-of-all-mitigations.patch 5b72fbbf-xl.conf-Add-global-affinity-masks.patch 5b741962-x86-write-to-correct-variable-in-parse_pv_l1tf.patch- Upstream patches from Jan (bsc#1027519) 5b3f8fa5-port-array_index_nospec-from-Linux.patch 5b4488e7-x86-spec-ctrl-cmdline-handling.patch 5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch 5b4c9a60-allow-cpu_down-to-be-called-earlier.patch 5b4db308-SVM-fix-cleanup-svm_inject_event.patch 5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch 5b5040f2-x86-AMD-distinguish-CU-from-HT.patch 5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch 5b508775-2-x86-possibly-bring-up-all-CPUs.patch 5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch 5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch 5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch 5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch gcc8-fix-format-warning-on-i586.patch gcc8-fix-array-warning-on-i586.patch - Drop xen.fuzz-_FORTIFY_SOURCE.patch gcc8-fix-warning-on-i586.patch- Update to Xen 4.11.0 FCS (fate#325202, fate#325123) xen-4.11.0-testing-src.tar.bz2 disable-building-pv-shim.patch - Dropped patches 5a33a12f-domctl-improve-locking-during-domain-destruction.patch 5a6703cb-x86-move-invocations-of-hvm_flush_guest_tlbs.patch 5a79d7ed-libxc-packed-initrd-dont-fail-domain-creation.patch 5a9985bd-x86-invpcid-support.patch 5ac72a48-gcc8.patch 5ac72a5f-gcc8.patch 5ac72a64-gcc8.patch 5ac72a69-gcc8.patch 5ac72a6e-gcc8.patch 5ac72a74-gcc8.patch 5ac72a7b-gcc8.patch 5ad4923e-x86-correct-S3-resume-ordering.patch 5ad49293-x86-suppress-BTI-mitigations-around-S3.patch 5ad600d4-x86-pv-introduce-x86emul_read_dr.patch 5ad600d4-x86-pv-introduce-x86emul_write_dr.patch 5ad8c3a7-x86-spec_ctrl-update-retpoline-decision-making.patch 5adda097-x86-HPET-fix-race-triggering-ASSERT.patch 5adda0d5-x86-HVM-never-retain-emulated-insn-cache.patch 5adde9ed-xpti-fix-double-fault-handling.patch 5ae06fad-SVM-fix-intercepts-for-SYS-CALL-ENTER-MSRs.patch 5ae31917-x86-cpuidle-init-stats-lock-once.patch 5aeaeae4-introduce-vcpu_sleep_nosync_locked.patch 5aeaeaf0-sched-fix-races-in-vcpu-migration.patch 5aeb2c57-x86-retval-checks-of-set-guest-trapbounce.patch 5aec7393-1-x86-xpti-avoid-copy.patch 5aec7393-2-x86-xpti-write-cr3.patch 5aec744a-3-x86-xpti-per-domain-flag.patch 5aec744a-4-x86-xpti-use-invpcid.patch 5aec744a-5-x86-xpti-no-global-pages.patch 5aec744a-6-x86-xpti-cr3-valid-flag.patch 5aec744a-7-x86-xpti-pv_guest_cr4_to_real_cr4.patch 5aec744b-8-x86-xpti-cr3-helpers.patch 5aec74a8-9-x86-xpti-use-pcid.patch 5af1daa9-1-x86-traps-fix-dr6-handing-in-DB-handler.patch 5af1daa9-2-x86-pv-move-exception-injection-into-test_all_events.patch 5af1daa9-3-x86-traps-use-IST-for-DB.patch 5af1daa9-4-x86-traps-fix-handling-of-DB-in-hypervisor-context.patch 5af1daa9-x86-HVM-guard-against-bogus-emulator-ioreq-state.patch 5af1daa9-x86-vpt-support-IO-APIC-routed-intr.patch 5af97999-viridian-cpuid-leaf-40000003.patch 5afc13ae-1-x86-read-MSR_ARCH_CAPABILITIES-once.patch 5afc13ae-2-x86-express-Xen-SPEC_CTRL-choice-as-variable.patch 5afc13ae-3-x86-merge-bti_ist_info-use_shadow_spec_ctrl.patch 5afc13ae-4-x86-fold-XEN_IBRS-ALTERNATIVES.patch 5afc13ae-5-x86-rename-bits-of-spec_ctrl-infrastructure.patch 5afc13ae-6-x86-elide-MSR_SPEC_CTRL-handling-in-idle.patch 5afc13ae-7-x86-split-X86_FEATURE_SC_MSR.patch 5afc13ae-8-x86-explicitly-set-Xen-default-SPEC_CTRL.patch 5afc13ae-9-x86-cpuid-improve-guest-policies-for-speculative.patch 5afc13ae-A-x86-introduce-spec-ctrl-cmdline-opt.patch 5b02c786-x86-AMD-mitigations-for-GPZ-SP4.patch 5b02c786-x86-Intel-mitigations-for-GPZ-SP4.patch 5b02c786-x86-msr-virtualise-SPEC_CTRL-SSBD.patch 5b0bc9da-x86-XPTI-fix-S3-resume.patch 5b0d2286-libxc-x86-PV-dont-hand-through-CPUID-leaf-0x80000008.patch 5b0d2d91-x86-suppress-sync-when-XPTI-off.patch 5b0d2dbc-x86-correct-default_xen_spec_ctrl.patch 5b0d2ddc-x86-CPUID-dont-override-tool-stack-hidden-STIBP.patch 5b150ef9-x86-fix-error-handling-of-pv-dr7-shadow.patch 5b21825d-1-x86-support-fully-eager-FPU-context-switching.patch 5b21825d-2-x86-spec-ctrl-mitigations-for-LazyFPU.patch 5b238b92-x86-HVM-account-for-fully-eager-FPU.patch 5b2b7172-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b31e004-x86-HVM-emul-attempts-FPU-set-fpu_initialised.patch 5b323e3c-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b34882d-x86-mm-dont-bypass-preemption-checks.patch 5b348874-x86-refine-checks-in-DB-handler.patch 5b348897-libxl-qemu_disk_scsi_drive_string-break-out-common.patch 5b3488a2-libxl-restore-passing-ro-to-qemu-for-SCSI-disks.patch 5b34891a-x86-HVM-dont-cause-NM-to-be-raised.patch 5b348954-x86-guard-against-NM.patch libxl.Add-a-version-check-of-QEMU-for-QMP-commands.patch libxl.LIBXL_DESTROY_TIMEOUT.patch libxl.qmp-Tell-QEMU-about-live-migration-or-snapshot.patch xen_fix_build_with_acpica_20180427_and_new_packages.patch- Submit upstream patch libacpi: fixes for iasl >= 20180427 git commit 858dbaaeda33b05c1ac80aea0ba9a03924e09005 xen_fix_build_with_acpica_20180427_and_new_packages.patch This is needed for acpica package to get updated in our build service- Upstream patches from Jan (bsc#1027519) 5b02c786-x86-AMD-mitigations-for-GPZ-SP4.patch (Replaces Spectre-v4-1.patch) 5b02c786-x86-Intel-mitigations-for-GPZ-SP4.patch (Replaces Spectre-v4-2.patch) 5b02c786-x86-msr-virtualise-SPEC_CTRL-SSBD.patch (Replaces Spectre-v4-3.patch) 5b0bc9da-x86-XPTI-fix-S3-resume.patch 5b0d2286-libxc-x86-PV-dont-hand-through-CPUID-leaf-0x80000008.patch 5b0d2d91-x86-suppress-sync-when-XPTI-off.patch 5b0d2dbc-x86-correct-default_xen_spec_ctrl.patch 5b0d2ddc-x86-CPUID-dont-override-tool-stack-hidden-STIBP.patch 5b150ef9-x86-fix-error-handling-of-pv-dr7-shadow.patch 5b21825d-1-x86-support-fully-eager-FPU-context-switching.patch (Replaces xsa267-1.patch) 5b21825d-2-x86-spec-ctrl-mitigations-for-LazyFPU.patch (Replaces xsa267-2.patch) 5b238b92-x86-HVM-account-for-fully-eager-FPU.patch 5b2b7172-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b31e004-x86-HVM-emul-attempts-FPU-set-fpu_initialised.patch 5b323e3c-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b34882d-x86-mm-dont-bypass-preemption-checks.patch (Replaces xsa264.patch) 5b348874-x86-refine-checks-in-DB-handler.patch (Replaces xsa265.patch) 5b348897-libxl-qemu_disk_scsi_drive_string-break-out-common.patch (Replaces xsa266-1-<>.patch) 5b3488a2-libxl-restore-passing-ro-to-qemu-for-SCSI-disks.patch (Replaces xsa266-2-<>.patch) 5b34891a-x86-HVM-dont-cause-NM-to-be-raised.patch 5b348954-x86-guard-against-NM.patch- Fix more build gcc8 related failures with xen.fuzz-_FORTIFY_SOURCE.patch- bsc#1098403 - fix regression introduced by changes for bsc#1079730 a PV domU without qcow2 and/or vfb has no qemu attached. Ignore QMP errors for PV domUs to handle PV domUs with and without an attached qemu-xen. xen.bug1079730.patch- bsc#1097521 - VUL-0: CVE-2018-12891: xen: preemption checks bypassed in x86 PV MM handling (XSA-264) xsa264.patch - bsc#1097522 - VUL-0: CVE-2018-12893: xen: x86: #DB exception safety check can be triggered by a guest (XSA-265) xsa265.patch - bsc#1097523 - VUL-0: CVE-2018-12892: xen: libxl fails to honour readonly flag on HVM emulated SCSI disks (XSA-266) xsa266-1-libxl-qemu_disk_scsi_drive_string-Break-out-common-p.patch xsa266-2-libxl-restore-passing-readonly-to-qemu-for-SCSI-disk.patch- bsc#1095242 - VUL-0: CVE-2018-3665: xen: Lazy FP Save/Restore (XSA-267) xsa267-1.patch xsa267-2.patch- bsc#1092543 - GCC 8: xen build fails gcc8-fix-warning-on-i586.patch- bsc#1092631 - VUL-0: CVE-2018-3639: xen: V4 – Speculative Store Bypass aka "Memory Disambiguation" (XSA-263) 5ad4923e-x86-correct-S3-resume-ordering.patch 5ad49293-x86-suppress-BTI-mitigations-around-S3.patch 5afc13ae-1-x86-read-MSR_ARCH_CAPABILITIES-once.patch 5afc13ae-2-x86-express-Xen-SPEC_CTRL-choice-as-variable.patch 5afc13ae-3-x86-merge-bti_ist_info-use_shadow_spec_ctrl.patch 5afc13ae-4-x86-fold-XEN_IBRS-ALTERNATIVES.patch 5afc13ae-5-x86-rename-bits-of-spec_ctrl-infrastructure.patch 5afc13ae-6-x86-elide-MSR_SPEC_CTRL-handling-in-idle.patch 5afc13ae-7-x86-split-X86_FEATURE_SC_MSR.patch 5afc13ae-8-x86-explicitly-set-Xen-default-SPEC_CTRL.patch 5afc13ae-9-x86-cpuid-improve-guest-policies-for-speculative.patch 5afc13ae-A-x86-introduce-spec-ctrl-cmdline-opt.patch Spectre-v4-1.patch Spectre-v4-2.patch Spectre-v4-3.patch- Always call qemus xen-save-devices-state in suspend/resume to fix migration with qcow2 images (bsc#1079730) libxl.Add-a-version-check-of-QEMU-for-QMP-commands.patch libxl.qmp-Tell-QEMU-about-live-migration-or-snapshot.patch xen.bug1079730.patch- bsc#1087289 - L3: Xen BUG at sched_credit.c:1663 5aeaeae4-introduce-vcpu_sleep_nosync_locked.patch 5aeaeaf0-sched-fix-races-in-vcpu-migration.patch - Upstream patches from Jan (bsc#1027519) 5ad600d4-x86-pv-introduce-x86emul_read_dr.patch 5ad600d4-x86-pv-introduce-x86emul_write_dr.patch 5ad8c3a7-x86-spec_ctrl-update-retpoline-decision-making.patch 5adda097-x86-HPET-fix-race-triggering-ASSERT.patch 5adda0d5-x86-HVM-never-retain-emulated-insn-cache.patch 5ae06fad-SVM-fix-intercepts-for-SYS-CALL-ENTER-MSRs.patch 5ae31917-x86-cpuidle-init-stats-lock-once.patch 5aeb2c57-x86-retval-checks-of-set-guest-trapbounce.patch 5af1daa9-1-x86-traps-fix-dr6-handing-in-DB-handler.patch (Replaces xsa260-1.patch) 5af1daa9-2-x86-pv-move-exception-injection-into-test_all_events.patch (Replaces xsa260-2.patch) 5af1daa9-3-x86-traps-use-IST-for-DB.patch (Replaces xsa260-3.patch) 5af1daa9-4-x86-traps-fix-handling-of-DB-in-hypervisor-context.patch (Replaces xsa260-4.patch) 5af1daa9-x86-HVM-guard-against-bogus-emulator-ioreq-state.patch (Replaces xsa262.patch) 5af1daa9-x86-vpt-support-IO-APIC-routed-intr.patch (Replaces xsa261.patch) 5af97999-viridian-cpuid-leaf-40000003.patch- Fixes related to Page Table Isolation (XPTI). bsc#1074562 XSA-254 5a6703cb-x86-move-invocations-of-hvm_flush_guest_tlbs.patch 5a9985bd-x86-invpcid-support.patch 5adde9ed-xpti-fix-double-fault-handling.patch 5aec7393-1-x86-xpti-avoid-copy.patch 5aec7393-2-x86-xpti-write-cr3.patch 5aec744a-3-x86-xpti-per-domain-flag.patch 5aec744a-4-x86-xpti-use-invpcid.patch 5aec744a-5-x86-xpti-no-global-pages.patch 5aec744a-6-x86-xpti-cr3-valid-flag.patch 5aec744a-7-x86-xpti-pv_guest_cr4_to_real_cr4.patch 5aec744b-8-x86-xpti-cr3-helpers.patch 5aec74a8-9-x86-xpti-use-pcid.patch- bsc#1092543 - GCC 8: xen build fails 5ac72a48-gcc8.patch 5ac72a5f-gcc8.patch 5ac72a64-gcc8.patch 5ac72a69-gcc8.patch 5ac72a6e-gcc8.patch 5ac72a74-gcc8.patch 5ac72a7b-gcc8.patch gcc8-inlining-failed.patch- Update to Xen 4.10.1 bug fix release (bsc#1027519) xen-4.10.1-testing-src.tar.bz2 disable-building-pv-shim.patch - Drop the following patches contained in the new tarball 5a21a77e-x86-pv-construct-d0v0s-GDT-properly.patch 5a2fda0d-x86-mb2-avoid-Xen-when-looking-for-module-crashkernel-pos.patch 5a2ffc1f-x86-mm-drop-bogus-paging-mode-assertion.patch 5a313972-x86-microcode-add-support-for-AMD-Fam17.patch 5a32bd79-x86-vmx-dont-use-hvm_inject_hw_exception-in-.patch 5a4caa5e-x86-IRQ-conditionally-preserve-access-perm.patch 5a4caa8c-x86-E820-don-t-overrun-array.patch 5a4e2bca-x86-free-msr_vcpu_policy-during-destruction.patch 5a4e2c2c-x86-upcall-inject-spurious-event-after-setting-vector.patch 5a4fd893-1-x86-break-out-alternative-asm-into-separate-header.patch 5a4fd893-2-x86-introduce-ALTERNATIVE_2-macros.patch 5a4fd893-3-x86-hvm-rename-update_guest_vendor-to-cpuid_policy_changed.patch 5a4fd893-4-x86-introduce-cpuid_policy_updated.patch 5a4fd893-5-x86-entry-remove-partial-cpu_user_regs.patch 5a4fd894-1-x86-rearrange-RESTORE_ALL-to-restore-in-stack-order.patch 5a4fd894-2-x86-hvm-use-SAVE_ALL-after-VMExit.patch 5a4fd894-3-x86-erase-guest-GPRs-on-entry-to-Xen.patch 5a4fd894-4-clarifications-to-wait-infrastructure.patch 5a534c78-x86-dont-use-incorrect-CPUID-values-for-topology.patch 5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4-updates.patch 5a5e2cff-x86-Meltdown-band-aid.patch 5a5e2d73-x86-Meltdown-band-aid-conditional.patch 5a5e3a4e-1-x86-support-compiling-with-indirect-branch-thunks.patch 5a5e3a4e-2-x86-support-indirect-thunks-from-asm.patch 5a5e3a4e-3-x86-report-speculative-mitigation-details.patch 5a5e3a4e-4-x86-AMD-set-lfence-as-Dispatch-Serialising.patch 5a5e3a4e-5-x86-introduce-alternative-indirect-thunks.patch 5a5e3a4e-6-x86-definitions-for-Indirect-Branch-Controls.patch 5a5e3a4e-7-x86-cmdline-opt-to-disable-IBRS-IBPB-STIBP.patch 5a5e459c-1-x86-SVM-offer-CPUID-faulting-to-AMD-HVM-guests.patch 5a5e459c-2-x86-report-domain-id-on-CPUID.patch 5a68bc16-x86-acpi-process-softirqs-logging-Cx.patch 5a69c0b9-x86-fix-GET_STACK_END.patch 5a6b36cd-1-x86-cpuid-handling-of-IBRS-IBPB-STIBP-and-IBRS-for-guests.patch 5a6b36cd-2-x86-msr-emulation-of-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-3-x86-migrate-MSR_SPEC_CTRL.patch 5a6b36cd-4-x86-hvm-permit-direct-access-to-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-5-x86-use-SPEC_CTRL-on-entry.patch 5a6b36cd-6-x86-clobber-RSB-RAS-on-entry.patch 5a6b36cd-7-x86-no-alternatives-in-NMI-MC-paths.patch 5a6b36cd-8-x86-boot-calculate-best-BTI-mitigation.patch 5a6b36cd-9-x86-issue-speculation-barrier.patch 5a6b36cd-A-x86-offer-Indirect-Branch-Controls-to-guests.patch 5a6b36cd-B-x86-clear-SPEC_CTRL-while-idle.patch 5a7b1bdd-x86-reduce-Meltdown-band-aid-IPI-overhead.patch 5a843807-x86-spec_ctrl-fix-bugs-in-SPEC_CTRL_ENTRY_FROM_INTR_IST.patch 5a856a2b-x86-emul-fix-64bit-decoding-of-segment-overrides.patch 5a856a2b-x86-use-32bit-xors-for-clearing-GPRs.patch 5a856a2b-x86-xpti-hide-almost-all-of-Xen-image-mappings.patch 5a8be788-x86-nmi-start-NMI-watchdog-on-CPU0-after-SMP.patch 5a95373b-x86-PV-avoid-leaking-other-guests-MSR_TSC_AUX.patch 5a95571f-memory-dont-implicitly-unpin-in-decrease-res.patch 5a95576c-gnttab-ARM-dont-corrupt-shared-GFN-array.patch 5a955800-gnttab-dont-free-status-pages-on-ver-change.patch 5a955854-x86-disallow-HVM-creation-without-LAPIC-emul.patch 5a956747-x86-HVM-dont-give-wrong-impression-of-WRMSR-success.patch 5a9eb7f1-x86-xpti-dont-map-stack-guard-pages.patch 5a9eb85c-x86-slightly-reduce-XPTI-overhead.patch 5a9eb890-x86-remove-CR-reads-from-exit-to-guest-path.patch 5aa2b6b9-cpufreq-ondemand-CPU-offlining-race.patch 5aaa9878-x86-vlapic-clear-TMR-bit-for-edge-triggered-intr.patch xsa258.patch xsa259.patch- bsc#1090820 - VUL-0: CVE-2018-8897: xen: x86: mishandling of debug exceptions (XSA-260) xsa260-1.patch xsa260-2.patch xsa260-3.patch xsa260-4.patch - bsc#1090822 - VUL-0: CVE-2018-10982: xen: x86 vHPET interrupt injection errors (XSA-261) xsa261.patch - bsc#1090823 - VUL-0: CVE-2018-10981: xen: qemu may drive Xen into unbounded loop (XSA-262) xsa262.patch- bsc#1089152 - VUL-0: CVE-2018-10472: xen: Information leak via crafted user-supplied CDROM (XSA-258) xsa258.patch - bsc#1089635 - VUL-0: CVE-2018-10471: xen: x86: PV guest may crash Xen with XPTI (XSA-259) xsa259.patch- Preserve xen-syms from xen-dbg.gz to allow processing vmcores with crash(1) (bsc#1087251)- Upstream patches from Jan (bsc#1027519) and fixes related to Page Table Isolation (XPTI). See also bsc#1074562 XSA-254 5a856a2b-x86-xpti-hide-almost-all-of-Xen-image-mappings.patch 5a9eb7f1-x86-xpti-dont-map-stack-guard-pages.patch 5a9eb85c-x86-slightly-reduce-XPTI-overhead.patch 5a9eb890-x86-remove-CR-reads-from-exit-to-guest-path.patch 5aa2b6b9-cpufreq-ondemand-CPU-offlining-race.patch 5aaa9878-x86-vlapic-clear-TMR-bit-for-edge-triggered-intr.patch- bsc#1072834 - Xen HVM: unchecked MSR access error: RDMSR from 0xc90 at rIP: 0xffffffff93061456 (native_read_msr+0x6/0x30) 5a956747-x86-HVM-dont-give-wrong-impression-of-WRMSR-success.patch - Upstream patches from Jan (bsc#1027519) 5a79d7ed-libxc-packed-initrd-dont-fail-domain-creation.patch 5a7b1bdd-x86-reduce-Meltdown-band-aid-IPI-overhead.patch 5a843807-x86-spec_ctrl-fix-bugs-in-SPEC_CTRL_ENTRY_FROM_INTR_IST.patch 5a856a2b-x86-emul-fix-64bit-decoding-of-segment-overrides.patch 5a856a2b-x86-use-32bit-xors-for-clearing-GPRs.patch 5a8be788-x86-nmi-start-NMI-watchdog-on-CPU0-after-SMP.patch 5a95373b-x86-PV-avoid-leaking-other-guests-MSR_TSC_AUX.patch 5a95571f-memory-dont-implicitly-unpin-in-decrease-res.patch (Replaces xsa252.patch) 5a95576c-gnttab-ARM-dont-corrupt-shared-GFN-array.patch (Replaces xsa255-1.patch) 5a955800-gnttab-dont-free-status-pages-on-ver-change.patch (Replaces xsa255-2.patch) 5a955854-x86-disallow-HVM-creation-without-LAPIC-emul.patch (Replaces xsa256.patch) - Drop xsa252.patch xsa255-1.patch xsa255-2.patch xsa256.patch- bsc#1080635 - VUL-0: CVE-2018-7540: xen: DoS via non-preemptable L3/L4 pagetable freeing (XSA-252) xsa252.patch - bsc#1080662 - VUL-0: CVE-2018-7541: xen: grant table v2 -> v1 transition may crash Xen (XSA-255) xsa255-1.patch xsa255-2.patch - bsc#1080634 - VUL-0: CVE-2018-7542: xen: x86 PVH guest without LAPIC may DoS the host (XSA-256) xsa256.patch- Remove stale systemd presets code for 13.2 and older- fate#324965 - add script, udev rule and systemd service to watch for vcpu online/offline events in a HVM domU They are triggered via xl vcpu-set domU N- Replace hardcoded xen with Name tag when refering to subpkgs- Make sure tools and tools-domU require libs from the very same build- tools-domU: Add support for qemu guest agent. New files 80-xen-channel-setup.rules and xen-channel-setup.sh configure a xen-pv-channel for use by the guest agent FATE#324963- Remove outdated /etc/xen/README*- bsc#1073961 - VUL-0: CVE-2018-5244: xen: x86: memory leak with MSR emulation (XSA-253) 5a4e2bca-x86-free-msr_vcpu_policy-during-destruction.patch - bsc#1074562 - VUL-0: CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 xen: Information leak via side effects of speculative execution (XSA-254). Includes Spectre v2 mitigation. 5a4caa5e-x86-IRQ-conditionally-preserve-access-perm.patch 5a4caa8c-x86-E820-don-t-overrun-array.patch 5a4e2c2c-x86-upcall-inject-spurious-event-after-setting-vector.patch 5a4fd893-1-x86-break-out-alternative-asm-into-separate-header.patch 5a4fd893-2-x86-introduce-ALTERNATIVE_2-macros.patch 5a4fd893-3-x86-hvm-rename-update_guest_vendor-to-cpuid_policy_changed.patch 5a4fd893-4-x86-introduce-cpuid_policy_updated.patch 5a4fd893-5-x86-entry-remove-partial-cpu_user_regs.patch 5a4fd894-1-x86-rearrange-RESTORE_ALL-to-restore-in-stack-order.patch 5a4fd894-2-x86-hvm-use-SAVE_ALL-after-VMExit.patch 5a4fd894-3-x86-erase-guest-GPRs-on-entry-to-Xen.patch 5a4fd894-4-clarifications-to-wait-infrastructure.patch 5a534c78-x86-dont-use-incorrect-CPUID-values-for-topology.patch 5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4-updates.patch 5a5e2cff-x86-Meltdown-band-aid.patch 5a5e2d73-x86-Meltdown-band-aid-conditional.patch 5a5e3a4e-1-x86-support-compiling-with-indirect-branch-thunks.patch 5a5e3a4e-2-x86-support-indirect-thunks-from-asm.patch 5a5e3a4e-3-x86-report-speculative-mitigation-details.patch 5a5e3a4e-4-x86-AMD-set-lfence-as-Dispatch-Serialising.patch 5a5e3a4e-5-x86-introduce-alternative-indirect-thunks.patch 5a5e3a4e-6-x86-definitions-for-Indirect-Branch-Controls.patch 5a5e3a4e-7-x86-cmdline-opt-to-disable-IBRS-IBPB-STIBP.patch 5a5e459c-1-x86-SVM-offer-CPUID-faulting-to-AMD-HVM-guests.patch 5a5e459c-2-x86-report-domain-id-on-CPUID.patch 5a68bc16-x86-acpi-process-softirqs-logging-Cx.patch 5a69c0b9-x86-fix-GET_STACK_END.patch 5a6b36cd-1-x86-cpuid-handling-of-IBRS-IBPB-STIBP-and-IBRS-for-guests.patch 5a6b36cd-2-x86-msr-emulation-of-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-3-x86-migrate-MSR_SPEC_CTRL.patch 5a6b36cd-4-x86-hvm-permit-direct-access-to-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-5-x86-use-SPEC_CTRL-on-entry.patch 5a6b36cd-6-x86-clobber-RSB-RAS-on-entry.patch 5a6b36cd-7-x86-no-alternatives-in-NMI-MC-paths.patch 5a6b36cd-8-x86-boot-calculate-best-BTI-mitigation.patch 5a6b36cd-9-x86-issue-speculation-barrier.patch 5a6b36cd-A-x86-offer-Indirect-Branch-Controls-to-guests.patch 5a6b36cd-B-x86-clear-SPEC_CTRL-while-idle.patch- Fix python3 deprecated atoi call (bsc#1067224) pygrub-python3-conversion.patch - Drop xenmon-python3-conversion.patch- bsc#1067317 - pass cache=writeback|unsafe|directsync to qemu, depending on the libxl disk settings libxl.add-option-to-disable-disk-cache-flushes-in-qdisk.patch- Remove libxl.LIBXL_DESTROY_TIMEOUT.debug.patch- bsc#1067224 - xen-tools have hard dependency on Python 2 build-python3-conversion.patch bin-python3-conversion.patch- bsc#1070165 - xen crashes after aborted localhost migration 5a2ffc1f-x86-mm-drop-bogus-paging-mode-assertion.patch - bsc#1035442 - L3: libxl: error: libxl.c:1676:devices_destroy_cb: libxl__devices_destroy failed 5a33a12f-domctl-improve-locking-during-domain-destruction.patch - Upstream patches from Jan (bsc#1027519) 5a21a77e-x86-pv-construct-d0v0s-GDT-properly.patch 5a2fda0d-x86-mb2-avoid-Xen-when-looking-for-module-crashkernel-pos.patch 5a313972-x86-microcode-add-support-for-AMD-Fam17.patch 5a32bd79-x86-vmx-dont-use-hvm_inject_hw_exception-in-.patch- Update to Xen 4.10.0 FCS (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Rebuild initrd if xen-tools-domU is updated- Update to Xen 4.10.0-rc8 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Increase the value of LIBXL_DESTROY_TIMEOUT from 10 to 100 seconds If many domUs shutdown in parallel the backends can not keep up Add some debug output to track how long backend shutdown takes (bsc#1035442) libxl.LIBXL_DESTROY_TIMEOUT.patch libxl.LIBXL_DESTROY_TIMEOUT.debug.patch- Adjust xenstore-run-in-studomain.patch to change the defaults in the code instead of changing the sysconfig template, to also cover the upgrade case- Update to Xen 4.10.0-rc6 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Since xen switched to Kconfig, building a debug hypervisor was done by default. Adjust make logic to build a non-debug hypervisor by default, and continue to provide one as xen-dbg.gz- fate#316614: set migration constraints from cmdline fix libxl.set-migration-constraints-from-cmdline.patch for xen-4.10- Document the suse-diskcache-disable-flush option in xl-disk-configuration(5) (bsc#879425,bsc#1067317)- Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468)- Update to Xen 4.10.0-rc5 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - fate#323663 - Run Xenstore in stubdomain xenstore-run-in-studomain.patch- bsc#1067224 - xen-tools have hard dependency on Python 2 pygrub-python3-conversion.patch xenmon-python3-conversion.patch migration-python3-conversion.patch xnloader.py xen2libvirt.py- Remove xendriverdomain.service (bsc#1065185) Driver domains must be configured manually with custom .service file- Update to Xen 4.10.0-rc3 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - Drop 59f31268-libxc-remove-stale-error-check-for-domain-size.patch- Adjust xen-dom0-modules.service to ignore errors (bsc#1065187)- fate#324052 Support migration of Xen HVM domains larger than 1TB 59f31268-libxc-remove-stale-error-check-for-domain-size.patch- Update to Xen 4.10.0-rc2 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Update to Xen 4.10.0-rc1 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - Drop patches included in new tarball 592fd5f0-stop_machine-fill-result-only-in-case-of-error.patch 596f257e-x86-fix-hvmemul_insn_fetch.patch 5982fd99-VT-d-don-t-panic-warn-on-iommu-no-igfx.patch 598c3630-VT-d-PI-disable-when-CPU-side-PI-is-off.patch 598c3706-cpufreq-only-stop-ondemand-governor-if-started.patch 5992f1e5-x86-grant-disallow-misaligned-PTEs.patch 5992f20d-gnttab-split-maptrack-lock-to-make-it-useful-again.patch 5992f233-gnttab-correct-pin-status-fixup-for-copy.patch 59958e76-gnttab-dont-use-possibly-unbounded-tail-calls.patch 59958ebf-gnttab-fix-transitive-grant-handling.patch 59958edd-gnttab-avoid-spurious-maptrack-handle-alloc-failures.patch 599da329-arm-mm-release-grant-lock-on-xatp1-error-paths.patch 59a01223-x86-check-for-alloc-errors-in-modify_xen_mappings.patch 59a0130c-x86-efi-dont-write-relocs-in-efi_arch_relocate_image-1st-pass.patch 59a9221f-VT-d-use-correct-BDF-for-VF-to-search-VT-d-unit.patch 59ae9177-x86-emul-fix-handling-of-unimplemented-Grp7-insns.patch 59aec335-x86emul-correct-VEX-W-handling-for-VPINSRD.patch 59aec375-x86emul-correct-VEX-L-handling-for-VCVTx2SI.patch 59afcea0-x86-introduce-and-use-setup_force_cpu_cap.patch 59b2a7f2-x86-HVM-correct-repeat-count-update-linear-phys.patch 59b7d664-mm-make-sure-node-is-less-than-MAX_NUMNODES.patch 59b7d69b-grant_table-fix-GNTTABOP_cache_flush-handling.patch 59b7d6c8-xenstore-dont-unlink-connection-object-twice.patch 59b7d6d9-gnttab-also-validate-PTE-perms-upon-destroy-replace.patch gcc7-arm.patch gcc7-mini-os.patch- bsc#1061084 - VUL-0: xen: page type reference leak on x86 (XSA-242) xsa242.patch - bsc#1061086 - VUL-0: xen: x86: Incorrect handling of self-linear shadow mappings with translated guests (XSA-243) xsa243.patch - bsc#1061087 - VUL-0: xen: x86: Incorrect handling of IST settings during CPU hotplug (XSA-244) xsa244.patch- bsc#1061077 - VUL-0: xen: DMOP map/unmap missing argument checks (XSA-238) xsa238.patch - bsc#1061080 - VUL-0: xen: hypervisor stack leak in x86 I/O intercept code (XSA-239) xsa239.patch - bsc#1061081 - VUL-0: xen: Unlimited recursion in linear pagetable de-typing (XSA-240) xsa240-1.patch xsa240-2.patch - bsc#1061082 - VUL-0: xen: Stale TLB entry due to page type release race (XSA-241) xsa241.patch- bsc#1061075 - VUL-0: xen: pin count / page reference race in grant table code (XSA-236) xsa236.patch - bsc#1061076 - VUL-0: xen: multiple MSI mapping issues on x86 (XSA-237) xsa237-1.patch xsa237-2.patch xsa237-3.patch xsa237-4.patch xsa237-5.patch- bsc#1056278 - VUL-0: xen: Missing NUMA node parameter verification (XSA-231) 59b7d664-mm-make-sure-node-is-less-than-MAX_NUMNODES.patch - bsc#1056280 - VUL-0: xen: Missing check for grant table (XSA-232) 59b7d69b-grant_table-fix-GNTTABOP_cache_flush-handling.patch - bsc#1056281 - VUL-0: xen: cxenstored: Race in domain cleanup (XSA-233) 59b7d6c8-xenstore-dont-unlink-connection-object-twice.patch - bsc#1056282 - VUL-0: xen: insufficient grant unmapping checks for x86 PV guests (XSA-234) 59b7d6d9-gnttab-also-validate-PTE-perms-upon-destroy-replace.patch - bsc#1055321 - VUL-0: xen: add-to-physmap error paths fail to release lock on ARM (XSA-235) 599da329-arm-mm-release-grant-lock-on-xatp1-error-paths.patch - Upstream patches from Jan (bsc#1027519) 59a01223-x86-check-for-alloc-errors-in-modify_xen_mappings.patch 59a0130c-x86-efi-dont-write-relocs-in-efi_arch_relocate_image-1st-pass.patch 59a9221f-VT-d-use-correct-BDF-for-VF-to-search-VT-d-unit.patch 59ae9177-x86-emul-fix-handling-of-unimplemented-Grp7-insns.patch 59aec335-x86emul-correct-VEX-W-handling-for-VPINSRD.patch 59aec375-x86emul-correct-VEX-L-handling-for-VCVTx2SI.patch 59afcea0-x86-introduce-and-use-setup_force_cpu_cap.patch 59b2a7f2-x86-HVM-correct-repeat-count-update-linear-phys.patch - Dropped gcc7-xen.patch- bsc#1057358 - Cannot Boot into SLES12.3 with Xen hypervisor when Secure Boot is Enabled xen.spec- bsc#1055695 - XEN: 11SP4 and 12SP3 HVM guests can not be restored update from v6 to v9 to cover more cases for ballooned domUs libxc.sr.superpage.patch- bsc#1026236 - remove suse_vtsc_tolerance= cmdline option for Xen drop the patch because it is not upstream acceptable remove xen.suse_vtsc_tolerance.patch- bsc#1055695 - XEN: 11SP4 and 12SP3 HVM guests can not be restored after the save using xl stack libxc.sr.superpage.patch- Unignore gcc-PIE the toolstack disables PIE for firmware builds as needed- Upstream patches from Jan (bsc#1027519) 592fd5f0-stop_machine-fill-result-only-in-case-of-error.patch 596f257e-x86-fix-hvmemul_insn_fetch.patch 5982fd99-VT-d-don-t-panic-warn-on-iommu-no-igfx.patch 598c3630-VT-d-PI-disable-when-CPU-side-PI-is-off.patch 598c3706-cpufreq-only-stop-ondemand-governor-if-started.patch 5992f1e5-x86-grant-disallow-misaligned-PTEs.patch (Replaces xsa227.patch) 5992f20d-gnttab-split-maptrack-lock-to-make-it-useful-again.patch (Replaces xsa228.patch) 5992f233-gnttab-correct-pin-status-fixup-for-copy.patch (Replaces xsa230.patch) 59958e76-gnttab-dont-use-possibly-unbounded-tail-calls.patch (Replaces xsa226-1.patch) 59958ebf-gnttab-fix-transitive-grant-handling.patch (Replaces xsa226-2.patch) 59958edd-gnttab-avoid-spurious-maptrack-handle-alloc-failures.patch- bsc#1044974 - xen-tools require python-pam xen.spec- Clean up spec file errors and a few warnings. (bsc#1027519) - Removed conditional 'with_systemd' and some old deprecated 'sles_version' checks. xen.spec- Remove use of brctl utiltiy from supportconfig plugin FATE#323639- Use upstream variant of mini-os __udivmoddi4 change gcc7-mini-os.patch- fate#323639 Move bridge-utils to legacy replace-obsolete-network-configuration-commands-in-s.patch- bsc#1052686 - VUL-0: xen: grant_table: possibly premature clearing of GTF_writing / GTF_reading (XSA-230) xsa230.patch- bsc#1035231 - migration of HVM domU does not use superpages on destination dom0 libxc.sr.superpage.patch- bsc#1051787 - VUL-0: CVE-2017-12135: xen: possibly unbounded recursion in grant table code (XSA-226) xsa226-1.patch xsa226-2.patch - bsc#1051788 - VUL-0: CVE-2017-12137: xen: x86: PV privilege escalation via map_grant_ref (XSA-227) xsa227.patch - bsc#1051789 - VUL-0: CVE-2017-12136: xen: grant_table: Race conditions with maptrack free list handling (XSA-228) xsa228.patch- Add a supportconfig plugin xen-supportconfig FATE#323661- bsc#1026236 - add suse_vtsc_tolerance= cmdline option for Xen To avoid emulation of TSC access from a domU after live migration add a global tolerance for the measured host kHz xen.suse_vtsc_tolerance.patch- fate#323662 Drop qemu-dm from xen-tools package The following tarball and patches have been removed qemu-xen-traditional-dir-remote.tar.bz2 VNC-Support-for-ExtendedKeyEvent-client-message.patch 0001-net-move-the-tap-buffer-into-TAPState.patch 0002-net-increase-tap-buffer-size.patch 0003-e1000-fix-access-4-bytes-beyond-buffer-end.patch 0004-e1000-secrc-support.patch 0005-e1000-multi-buffer-packet-support.patch 0006-e1000-clear-EOP-for-multi-buffer-descriptors.patch 0007-e1000-verify-we-have-buffers-upfront.patch 0008-e1000-check-buffer-availability.patch CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch CVE-2015-4037-qemut-smb-config-dir-name.patch CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch CVE-2016-7908-qemut-net-Infinite-loop-in-mcf_fec_do_tx.patch CVE-2016-7909-qemut-net-pcnet-infinite-loop-in-pcnet_rdra_addr.patch CVE-2016-8667-qemut-dma-rc4030-divide-by-zero-error-in-set_next_tick.patch CVE-2016-8669-qemut-char-divide-by-zero-error-in-serial_update_parameters.patch CVE-2016-8910-qemut-net-rtl8139-infinite-loop-while-transmit-in-Cplus-mode.patch CVE-2016-9921-qemut-display-cirrus_vga-divide-by-zero-in-cirrus_do_copy.patch CVE-2017-6505-qemut-usb-an-infinite-loop-issue-in-ohci_service_ed_list.patch CVE-2017-8309-qemut-audio-host-memory-leakage-via-capture-buffer.patch CVE-2017-9330-qemut-usb-ohci-infinite-loop-due-to-incorrect-return-value.patch blktap.patch cdrom-removable.patch xen-qemu-iscsi-fix.patch qemu-security-etch1.patch xen-disable-qemu-monitor.patch xen-hvm-default-bridge.patch qemu-ifup-set-mtu.patch ioemu-vnc-resize.patch capslock_enable.patch altgr_2.patch log-guest-console.patch bdrv_open2_fix_flags.patch bdrv_open2_flags_2.patch ioemu-7615-qcow2-fix-alloc_cluster_link_l2.patch qemu-dm-segfault.patch bdrv_default_rwflag.patch kernel-boot-hvm.patch ioemu-watchdog-support.patch ioemu-watchdog-linkage.patch ioemu-watchdog-ib700-timer.patch ioemu-hvm-pv-support.patch pvdrv_emulation_control.patch ioemu-disable-scsi.patch ioemu-disable-emulated-ide-if-pv.patch xenpaging.qemu.flush-cache.patch ioemu-devicemodel-include.patch - Cleanup spec file and remove unused KMP patches kmp_filelist supported_module.patch xen_pvonhvm.xen_emul_unplug.patch- bsc#1002573 - Optimize LVM functions in block-dmmd block-dmmd- Record initial Xen dmesg in /var/log/xen/xen-boot.log for supportconfig. Keep previous log in /var/log/xen/xen-boot.prev.log- Remove storytelling from description in xen.rpm- Update to Xen 4.9.0 FCS (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update block-dmmd script (bsc#1002573) block-dmmd- Update to Xen 4.9.0-rc8+ (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 gcc7-arm.patch - Drop gcc7-error-xenpmd.patch- Update to Xen 4.9.0-rc8 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1042160 - VUL-1: CVE-2017-9330: xen: usb: ohci: infinite loop due to incorrect return value CVE-2017-9330-qemut-usb-ohci-infinite-loop-due-to-incorrect-return-value.patch- bsc#1037243 - VUL-1: CVE-2017-8309: xen: audio: host memory leakage via capture buffer CVE-2017-8309-qemut-audio-host-memory-leakage-via-capture-buffer.patch- Update to Xen 4.9.0-rc7 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update to Xen 4.9.0-rc6 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1031343 - xen fails to build with GCC 7 gcc7-mini-os.patch gcc7-xen.patch- bsc#1031343 - xen fails to build with GCC 7 gcc7-error-xenpmd.patch- Update to Xen 4.9.0-rc5 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 - Drop xen-tools-pkgconfig-xenlight.patch- bsc#1037779 - xen breaks kexec-tools build xen-tools-pkgconfig-xenlight.patch- Update to Xen 4.9.0-rc4 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1036146 - sles12sp2 xen VM dumps core to wrong path xen.spec- Update to Xen 4.9.0-rc3 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 aarch64-maybe-uninitialized.patch- Update to Xen 4.9.0-rc2 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update to Xen 4.9.0-rc1 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 ioemu-devicemodel-include.patch - Dropped patches contained in new tarball xen-4.8.0-testing-src.tar.bz2 0001-xenstore-let-write_node-and-some-callers-return-errn.patch 0002-xenstore-undo-function-rename.patch 0003-xenstore-rework-of-transaction-handling.patch 584806ce-x86emul-correct-PUSHF-POPF.patch 584fc649-fix-determining-when-domain-creation-is-complete.patch 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch 58510cac-x86emul-MOVNTI-no-REP-prefixes.patch 58526ccc-x86emul-64bit-ignore-most-segment-bases-in-align-check.patch 5853ed37-VT-d-correct-dma_msi_set_affinity.patch 5853ee07-x86emul-CMPXCHG16B-aligned-operand.patch 58580060-x86-emul-correct-SYSCALL-eflags-handling.patch 585aa3c5-x86-force-EFLAGS-IF-on-upon-exit-to-PV.patch 585aa407-x86-HVM-NULL-check-before-using-VMFUNC-hook.patch 585bd5fe-x86-emul-correct-VMFUNC-return-value-handling.patch 586ba81c-x86-cpu-dont-update-this_cpu-for-guest-get_cpu_vendor.patch 587d04d6-x86-xstate-fix-array-overrun-with-LWP.patch 587de4a9-x86emul-VEX-B-ignored-in-compat-mode.patch 5882129d-x86emul-LOCK-check-adjustments.patch 58821300-x86-segment-attribute-handling.patch 58873c1f-x86emul-correct-FPU-stub-asm-constraints.patch 58873c80-x86-hvm-do-not-set-msr_tsc_adjust-on-.patch 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5887888f-credit2-never-consider-CPUs-outside-of-pool.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5888b1b3-x86-emulate-dont-assume-addr_size-32-implies-protmode.patch 5899cbd9-EPT-allow-wrcomb-MMIO-mappings-again.patch 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch 58a44771-IOMMU-always-call-teardown-callback.patch 58a48ccc-x86-fix-p2m_flush_table-for-non-nested.patch 58a59f4b-libxl-correct-xenstore-entry-for-empty-cdrom.patch 58a70d94-VMX-fix-VMCS-race-on-cswitch-paths.patch 58ac1f3f-VMX-dont-leak-host-syscall-MSRs.patch 58b5a2de-x86-correct-Xens-idea-of-its-memory-layout.patch 58b6fd42-credit2-always-mark-a-tickled-pCPU-as-tickled.patch 58b6fd42-credit2-dont-miss-accounting-during-credit-reset.patch 58cbf682-x86-EFI-avoid-overrunning-mb_modules.patch 58cf9200-x86-EFI-avoid-IOMMU-faults-on-tail-gap.patch 58cf9260-x86-EFI-avoid-Xen-when-looking-for-mod-kexec-pos.patch 58cf9277-x86-time-dont-use-vTSC-if-host-guest-freqs-match.patch 58d25ea2-xenstore-add-missing-checks-for-allocation-failure.patch 58d91365-sched-dont-call-wrong-hook-via-VCPU2OP.patch CVE-2017-2615-qemut-display-cirrus-oob-access-while-doing-bitblt-copy-backward-mode.patch CVE-2017-2620-xsa209-qemut-cirrus_bitblt_cputovideo-does-not-check-if-memory-region-safe.patch glibc-2.25-compatibility-fix.patch xs-09-add_change_node-params.patch xs-10-call-add_change_node.patch xs-11-tdb-record-header.patch xs-12-node-gen-count.patch xs-13-read-directory-part-support.patch xs-14-command-array.patch xs-15-command-return-val.patch xs-16-function-static.patch xs-17-arg-parsing.patch xs-18-default-buffer.patch xs-19-handle-alloc-failures.patch xs-20-tdb-version.patch xs-21-empty-tdb-database.patch xs-22-reopen_log-fix.patch xs-23-XS_DEBUG-rename.patch xs-24-xenstored_control.patch xs-25-control-enhance.patch xs-26-log-control.patch xs-27-memory-report.patch xs-28-remove-talloc-report.patch xs-29-define-off_t.patch xsa206-0001-xenstored-apply-a-write-transaction-rate-limit.patch xsa206-0002-xenstored-Log-when-the-write-transaction-rate-limit.patch- bsc#1022703 - Xen HVM guest with OVMF hangs with unattached CDRom 58a59f4b-libxl-correct-xenstore-entry-for-empty-cdrom.patch- bsc#1015348 - L3: libvirtd does not start during boot suse-xendomains-service.patch- bsc#1014136 - Partner-L3: kdump can't dump a kernel on SLES12-SP2 with Xen hypervisor. 58cf9260-x86-EFI-avoid-Xen-when-looking-for-mod-kexec-pos.patch - bsc#1026236 - L3: Paravirtualized vs. fully virtualized migration - latter one much faster 58cf9277-x86-time-dont-use-vTSC-if-host-guest-freqs-match.patch - Upstream patch from Jan 58cbf682-x86-EFI-avoid-overrunning-mb_modules.patch 58cf9200-x86-EFI-avoid-IOMMU-faults-on-tail-gap.patch 58d91365-sched-dont-call-wrong-hook-via-VCPU2OP.patch- bsc#1022555 - L3: Timeout in "execution of /etc/xen/scripts/block add" 58d25ea2-xenstore-add-missing-checks-for-allocation-failure.patch 0001-xenstore-let-write_node-and-some-callers-return-errn.patch 0002-xenstore-undo-function-rename.patch 0003-xenstore-rework-of-transaction-handling.patch - bsc#1030144 - VUL-0: xen: xenstore denial of service via repeated update (XSA-206) xsa206-0001-xenstored-apply-a-write-transaction-rate-limit.patch xsa206-0002-xenstored-Log-when-the-write-transaction-rate-limit.patch - bsc#1029827 - Forward port xenstored xs-09-add_change_node-params.patch xs-10-call-add_change_node.patch xs-11-tdb-record-header.patch xs-12-node-gen-count.patch xs-13-read-directory-part-support.patch xs-14-command-array.patch xs-15-command-return-val.patch xs-16-function-static.patch xs-17-arg-parsing.patch xs-18-default-buffer.patch xs-19-handle-alloc-failures.patch xs-20-tdb-version.patch xs-21-empty-tdb-database.patch xs-22-reopen_log-fix.patch xs-23-XS_DEBUG-rename.patch xs-24-xenstored_control.patch xs-25-control-enhance.patch xs-26-log-control.patch xs-27-memory-report.patch xs-28-remove-talloc-report.patch xs-29-define-off_t.patch- bsc#1029128 - fix make xen to really produce xen.efi with gcc48- bsc#1028235 - VUL-0: CVE-2017-6505: xen: qemu: usb: an infinite loop issue in ohci_service_ed_list CVE-2017-6505-qemut-usb-an-infinite-loop-issue-in-ohci_service_ed_list.patch - Upstream patches from Jan (bsc#1027519) 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5899cbd9-EPT-allow-wrcomb-MMIO-mappings-again.patch 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch 58a44771-IOMMU-always-call-teardown-callback.patch 58a48ccc-x86-fix-p2m_flush_table-for-non-nested.patch 58a70d94-VMX-fix-VMCS-race-on-cswitch-paths.patch 58ac1f3f-VMX-dont-leak-host-syscall-MSRs.patch 58b5a2de-x86-correct-Xens-idea-of-its-memory-layout.patch 58b6fd42-credit2-always-mark-a-tickled-pCPU-as-tickled.patch 58b6fd42-credit2-dont-miss-accounting-during-credit-reset.patch- bsc#1027654 - XEN fails to build against glibc 2.25 glibc-2.25-compatibility-fix.patch libxl.pvscsi.patch- fate#316613: Refresh and enable libxl.pvscsi.patch- bsc#1024834 - VUL-0: CVE-2017-2620: xen: cirrus_bitblt_cputovideo does not check if memory region is safe (XSA-209) CVE-2017-2620-xsa209-qemut-cirrus_bitblt_cputovideo-does-not-check-if-memory-region-safe.patch- bsc#1023948 - [pvusb][sles12sp3][openqa] Segmentation fault happened when adding usbctrl devices via xl 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch- Upstream patches from Jan (bsc#1027519) 587d04d6-x86-xstate-fix-array-overrun-with-LWP.patch 587de4a9-x86emul-VEX-B-ignored-in-compat-mode.patch 5882129d-x86emul-LOCK-check-adjustments.patch 58821300-x86-segment-attribute-handling.patch 58873c1f-x86emul-correct-FPU-stub-asm-constraints.patch 58873c80-x86-hvm-do-not-set-msr_tsc_adjust-on-.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5887888f-credit2-never-consider-CPUs-outside-of-pool.patch 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5888b1b3-x86-emulate-dont-assume-addr_size-32-implies-protmode.patch- bsc#1023004 - VUL-0: CVE-2017-2615: qemu: display: cirrus: oob access while doing bitblt copy backward mode CVE-2017-2615-qemut-display-cirrus-oob-access-while-doing-bitblt-copy-backward-mode.patch- fate#322313 and fate#322150 require the acpica package ported to aarch64 which Xen 4.8 needs to build. Temporarily disable aarch64 until these fates are complete. xen.spec- bsc#1021952 - Virutalization/xen: Bug xen-tools missing /usr/bin/domu-xenstore; guests fail to launch tmp_build.patch xen.spec- No systemd presets for 42.3+ and SLE12SP3+ (bsc#1012842)- bsc#1007224 - broken symlinks in /usr/share/doc/packages/xen/misc/ xen.spec- 585aa3c5-x86-force-EFLAGS-IF-on-upon-exit-to-PV.patch Replaces xsa202.patch (bsc#1014298) - 585aa407-x86-HVM-NULL-check-before-using-VMFUNC-hook.patch Replaces xsa203.patch (bsc#1014300) - 58580060-x86-emul-correct-SYSCALL-eflags-handling.patch Replaces xsa204.patch (bsc#1016340) - Upstream patches from Jan 58526ccc-x86emul-64bit-ignore-most-segment-bases-in-align-check.patch 5853ed37-VT-d-correct-dma_msi_set_affinity.patch 5853ee07-x86emul-CMPXCHG16B-aligned-operand.patch 585bd5fe-x86-emul-correct-VMFUNC-return-value-handling.patch 586ba81c-x86-cpu-dont-update-this_cpu-for-guest-get_cpu_vendor.patch- bsc#1015169 - VUL-0: CVE-2016-9921, CVE-2016-9922: xen: qemu: display: cirrus_vga: a divide by zero in cirrus_do_copy CVE-2016-9921-qemut-display-cirrus_vga-divide-by-zero-in-cirrus_do_copy.patch- bsc#1016340 - VUL-0: CVE-2016-10013: xen: x86: Mishandling of SYSCALL singlestep during emulation (XSA-204) xsa204.patch- bsc#1012651 - VUL-0: CVE-2016-9932: xen: x86 CMPXCHG8B emulation fails to ignore operand size override (XSA-200) 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch- bsc#1014298 - VUL-0: CVE-2016-10024: xen: x86 PV guests may be able to mask interrupts (XSA-202) xsa202.patch - bsc#1014300 - VUL-0: CVE-2016-10025: xen: x86: missing NULL pointer check in VMFUNC emulation (XSA-203) xsa203.patch - Upstream patches from Jan 584806ce-x86emul-correct-PUSHF-POPF.patch 584fc649-fix-determining-when-domain-creation-is-complete.patch 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch 58510cac-x86emul-MOVNTI-no-REP-prefixes.patch- Update to Xen 4.8 FCS xen-4.8.0-testing-src.tar.bz2 - Dropped xen-4.7.1-testing-src.tar.bz2 0001-libxc-Rework-extra-module-initialisation.patch 0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch 0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch 0004-firmware-makefile-install-BIOS-blob.patch 0005-libxl-Load-guest-BIOS-from-file.patch 0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch 0007-hvmloader-Grab-the-hvm_start_info-pointer.patch 0008-hvmloader-Locate-the-BIOS-blob.patch 0009-hvmloader-Check-modules-whereabouts-in-perform_tests.patch 0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch 0011-hvmloader-Load-OVMF-from-modules.patch 0012-hvmloader-Specific-bios_load-function-required.patch 0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch 0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch 57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch 576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 5769106e-x86-generate-assembler-equates-for-synthesized.patch 57a1e603-x86-time-adjust-local-system-time-initialization.patch 57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch 57a30261-x86-support-newer-Intel-CPU-models.patch 5810a9cc-x86-emul-Correct-decoding-of-SReg3-operands.patch 581b2c3b-x86-emul-reject-LGDT-LIDT-with-non-canonical-addresses.patch 581b647a-x86emul-L-S-G-I-DT-ignore-opsz-overrides-in-64-bit-mode.patch 58249392-x86-svm-dont-clobber-eax-edx-if-RDMSR-intercept-fails.patch 582c35d6-x86-vmx-correct-long-mode-check-in-vmx_cpuid_intercept.patch 582c35ee-x86-traps-dont-call-hvm_hypervisor_cpuid_leaf-for-PV.patch 58343dc2-x86-hvm-Fix-the-handling-of-non-present-segments.patch 58343df8-x86-HVM-dont-load-LDTR-with-VM86-mode-attrs-during-task-switch.patch 58343e24-x86-PV-writes-of-fs-and-gs-base-MSRs-require-canonical-addresses.patch 58343e9e-libelf-fix-stack-memory-leak-when-loading-32-bit-symbol-tables.patch 58343ec2-x86emul-fix-huge-bit-offset-handling.patch 58343f29-x86-emul-correct-the-IDT-entry-calculation-in-inject_swint.patch 58343f44-x86-svm-fix-injection-of-software-interrupts.patch 58343f79-pygrub-Properly-quote-results-when-returning-them-to-the-caller.patch CVE-2016-9381-xsa197-qemut.patch CVE-2016-9637-xsa199-qemut.patch- bsc#1011652 - VUL-0: xen: qemu ioport array overflow CVE-2016-9637-xsa199-qemut.patch- bsc#1009100 - VUL-0: CVE-2016-9386: XSA-191: xen: x86 null segments not always treated as unusable 58343dc2-x86-hvm-Fix-the-handling-of-non-present-segments.patch - bsc#1009103 - VUL-0: CVE-2016-9382: XSA-192: xen: x86 task switch to VM86 mode mis-handled 58343df8-x86-HVM-dont-load-LDTR-with-VM86-mode-attrs-during-task-switch.patch - bsc#1009104 - VUL-0: CVE-2016-9385: XSA-193: xen: x86 segment base write emulation lacking canonical address checks 58343e24-x86-PV-writes-of-fs-and-gs-base-MSRs-require-canonical-addresses.patch - bsc#1009105 - VUL-0: CVE-2016-9384: XSA-194: xen: guest 32-bit ELF symbol table load leaking host data 58343e9e-libelf-fix-stack-memory-leak-when-loading-32-bit-symbol-tables.patch - bsc#1009107 - VUL-0: CVE-2016-9383: XSA-195: xen: x86 64-bit bit test instruction emulation broken 58343ec2-x86emul-fix-huge-bit-offset-handling.patch - bsc#1009108 - VUL-0: CVE-2016-9377,CVE-2016-9378: XSA-196: xen: x86 software interrupt injection mis-handled 58343f29-x86-emul-correct-the-IDT-entry-calculation-in-inject_swint.patch 58343f44-x86-svm-fix-injection-of-software-interrupts.patch - bsc#1009109 - VUL-0: CVE-2016-9381: XSA-197: xen: qemu incautious about shared ring processing CVE-2016-9381-xsa197-qemut.patch - bsc#1009111 - VUL-0: CVE-2016-9379,CVE-2016-9380: XSA-198: xen: delimiter injection vulnerabilities in pygrub 58343f79-pygrub-Properly-quote-results-when-returning-them-to-the-caller.patch - Upstream patches from Jan 581b2c3b-x86-emul-reject-LGDT-LIDT-with-non-canonical-addresses.patch 581b647a-x86emul-L-S-G-I-DT-ignore-opsz-overrides-in-64-bit-mode.patch 58249392-x86-svm-dont-clobber-eax-edx-if-RDMSR-intercept-fails.patch 582c35d6-x86-vmx-correct-long-mode-check-in-vmx_cpuid_intercept.patch 582c35ee-x86-traps-dont-call-hvm_hypervisor_cpuid_leaf-for-PV.patch- Update to Xen Version 4.7.1 xen-4.7.1-testing-src.tar.bz2 - Dropped patches contained in new tarball xen-4.7.0-testing-src.tar.bz2 575e9ca0-nested-vmx-Validate-host-VMX-MSRs-before-accessing-them.patch 57640448-xen-sched-use-default-scheduler-upon-an-invalid-sched.patch 57973099-have-schedulers-revise-initial-placement.patch 579730e6-remove-buggy-initial-placement-algorithm.patch 57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch 57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch 57ac6316-don-t-restrict-DMA-heap-to-node-0.patch 57b71fc5-x86-EFI-don-t-apply-relocations-to-l-2-3-_bootmap.patch 57b7447b-dont-permit-guest-to-populate-PoD-pages-for-itself.patch 57c4412b-x86-HVM-add-guarding-logic-for-VMX-specific-code.patch 57c57f73-libxc-correct-max_pfn-calculation-for-saving-domain.patch 57c805bf-x86-levelling-restrict-non-architectural-OSXSAVE-handling.patch 57c805c1-x86-levelling-pass-vcpu-to-ctxt_switch_levelling.patch 57c805c3-x86-levelling-provide-architectural-OSXSAVE-handling.patch 57c82be2-x86-32on64-adjust-call-gate-emulation.patch 57c93e52-fix-error-in-libxl_device_usbdev_list.patch 57c96df3-credit1-fix-a-race-when-picking-initial-pCPU.patch 57c96e2c-x86-correct-PT_NOTE-file-position.patch 57cfed43-VMX-correct-feature-checks-for-MPX-and-XSAVES.patch 57d1563d-x86-32on64-don-t-allow-recursive-page-tables-from-L3.patch 57d15679-x86-emulate-Correct-boundary-interactions-of-emulated-insns.patch 57d1569a-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch 57d18642-hvm-fep-Allow-test-insns-crossing-1-0-boundary.patch 57d18642-x86-segment-Bounds-check-accesses-to-emulation-ctxt-seg_reg.patch 57d7ca5f-x86-domctl-fix-TOCTOU-race-in-XEN_DOMCTL_getvcpuextstate.patch 57d7ca64-x86-domctl-fix-migration-of-guests-not-using-xsave.patch 57da8883-credit1-fix-mask-to-be-used-for-tickling.patch 57da8883-credit2-properly-schedule-migration-of-running-vcpu.patch 57dfb1c5-x86-Intel-hide-CPUID-faulting-capability-from-guests.patch 57e93e1d-x86emul-correct-loading-of-ss.patch 57e93e4a-x86emul-don-t-allow-null-selector-for-LTR.patch 57e93e89-x86-AMD-apply-erratum-665-workaround.patch 57ee6cbc-credit1-return-time-remaining-to-limit-as-next-timeslice.patch 57f3a8ee-x86emul-honor-guest-CR0-TS-and-CR0-EM.patch 57fb6a91-x86-defer-not-present-segment-checks.patch 5800c51d-x86-hvm-Clobber-cs-L-when-LME-becomes-set.patch 5800caec-x86emul-fix-pushing-of-selector-registers.patch 5800cb06-x86-Viridian-don-t-depend-on-undefined-register-state.patch 580e29f9-x86-MISALIGNSSE-feature-depends-on-SSE.patch 57dfb2ff-x86-Intel-Broadwell-no-PKG_C8-10_RESIDENCY-MSRs.patch- bsc#1004981 - Xen RPM doesn't contain debug hypervisor for EFI systems xen.spec- bsc#1000106 - VUL-0: CVE-2016-7777: xen: CR0.TS and CR0.EM not always honored for x86 HVM guests (XSA-190) 57f3a8ee-x86emul-honor-guest-CR0-TS-and-CR0-EM.patch - bsc#996191 - [XEN][acpi]residency -n 88 -c will cause xen panic on broadwell-ep 57dfb2ff-x86-Intel-Broadwell-no-PKG_C8-10_RESIDENCY-MSRs.patch - Upstream patches from Jan 57d7ca5f-x86-domctl-fix-TOCTOU-race-in-XEN_DOMCTL_getvcpuextstate.patch 57d7ca64-x86-domctl-fix-migration-of-guests-not-using-xsave.patch 57da8883-credit1-fix-mask-to-be-used-for-tickling.patch 57da8883-credit2-properly-schedule-migration-of-running-vcpu.patch 57dfb1c5-x86-Intel-hide-CPUID-faulting-capability-from-guests.patch 57e93e1d-x86emul-correct-loading-of-ss.patch 57e93e4a-x86emul-don-t-allow-null-selector-for-LTR.patch 57e93e89-x86-AMD-apply-erratum-665-workaround.patch 57ee6cbc-credit1-return-time-remaining-to-limit-as-next-timeslice.patch 57fb6a91-x86-defer-not-present-segment-checks.patch 5800c51d-x86-hvm-Clobber-cs-L-when-LME-becomes-set.patch 5800caec-x86emul-fix-pushing-of-selector-registers.patch 5800cb06-x86-Viridian-don-t-depend-on-undefined-register-state.patch 580e29f9-x86-MISALIGNSSE-feature-depends-on-SSE.patch 5810a9cc-x86-emul-Correct-decoding-of-SReg3-operands.patch- bsc#1007941 - Xen tools limit the number of vcpus to 256 when the system has 384 xen-arch-kconfig-nr_cpus.patch- bsc#1007157 - VUL-0: CVE-2016-8910: xen: net: rtl8139: infinite loop while transmit in C+ mode CVE-2016-8910-qemut-net-rtl8139-infinite-loop-while-transmit-in-Cplus-mode.patch- bsc#1005004 - CVE-2016-8667: xen: dma: rc4030 divide by zero error in set_next_tick CVE-2016-8667-qemut-dma-rc4030-divide-by-zero-error-in-set_next_tick.patch - bsc#1005005 - VUL-0: CVE-2016-8669: xen: char: divide by zero error in serial_update_parameters CVE-2016-8669-qemut-char-divide-by-zero-error-in-serial_update_parameters.patch- bsc#1003030 - VUL-0: CVE-2016-7908: xen: net: Infinite loop in mcf_fec_do_tx CVE-2016-7908-qemut-net-Infinite-loop-in-mcf_fec_do_tx.patch - bsc#1003032 - VUL-0: CVE-2016-7909: xen: net: pcnet: infinite loop in pcnet_rdra_addr CVE-2016-7909-qemut-net-pcnet-infinite-loop-in-pcnet_rdra_addr.patch- bsc#995785 - VUL-0: CVE-2016-7092: xen: x86: Disallow L3 recursive pagetable for 32-bit PV guests (XSA-185) 57d1563d-x86-32on64-don-t-allow-recursive-page-tables-from-L3.patch - bsc#995789 - VUL-0: CVE-2016-7093: xen: x86: Mishandling of instruction pointer truncation during emulation (XSA-186) 57d15679-x86-emulate-Correct-boundary-interactions-of-emulated-insns.patch 57d18642-hvm-fep-Allow-test-insns-crossing-1-0-boundary.patch - bsc#995792 - VUL-0: CVE-2016-7094: xen: x86 HVM: Overflow of sh_ctxt->seg_reg[] (XSA-187) 57d1569a-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch 57d18642-x86-segment-Bounds-check-accesses-to-emulation-ctxt-seg_reg.patch - bsc#991934 - xen hypervisor crash in csched_acct 57c96df3-credit1-fix-a-race-when-picking-initial-pCPU.patch - Upstream patches from Jan 57c4412b-x86-HVM-add-guarding-logic-for-VMX-specific-code.patch 57c57f73-libxc-correct-max_pfn-calculation-for-saving-domain.patch 57c805bf-x86-levelling-restrict-non-architectural-OSXSAVE-handling.patch 57c805c1-x86-levelling-pass-vcpu-to-ctxt_switch_levelling.patch 57c805c3-x86-levelling-provide-architectural-OSXSAVE-handling.patch 57c82be2-x86-32on64-adjust-call-gate-emulation.patch 57c96e2c-x86-correct-PT_NOTE-file-position.patch 57cfed43-VMX-correct-feature-checks-for-MPX-and-XSAVES.patch- bsc#979002 - add 60-persistent-xvd.rules and helper script also to initrd, add the relevant dracut helper- bnc#953518 - unplug also SCSI disks in qemu-xen-traditional for upstream unplug protocol- bsc#989679 - [pvusb feature] USB device not found when 'virsh detach-device guest usb.xml' 57c93e52-fix-error-in-libxl_device_usbdev_list.patch- bsc#992224 - [HPS Bug] During boot of Xen Hypervisor, Failed to get contiguous memory for DMA from Xen 57ac6316-don-t-restrict-DMA-heap-to-node-0.patch - bsc#978755 - xen uefi systems fail to boot - bsc#983697 - SLES12 SP2 Xen UEFI mode cannot boot 57b71fc5-x86-EFI-don-t-apply-relocations-to-l-2-3-_bootmap.patch - Upstream patch from Jan 57b7447b-dont-permit-guest-to-populate-PoD-pages-for-itself.patch- spec: to stay compatible with the in-tree qemu-xen binary, use /usr/bin/qemu-system-i386 instead of /usr/bin/qemu-system-x86_64 bsc#986164- bsc#970135 - new virtualization project clock test randomly fails on Xen 576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 5769106e-x86-generate-assembler-equates-for-synthesized.patch 57a1e603-x86-time-adjust-local-system-time-initialization.patch 57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch - bsc#991934 - xen hypervisor crash in csched_acct 57973099-have-schedulers-revise-initial-placement.patch 579730e6-remove-buggy-initial-placement-algorithm.patch - bsc#988675 - VUL-0: CVE-2016-6258: xen: x86: Privilege escalation in PV guests (XSA-182) 57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch - bsc#988676 - VUL-0: CVE-2016-6259: xen: x86: Missing SMAP whitelisting in 32-bit exception / event delivery (XSA-183) 57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch - Upstream patches from Jan 57a30261-x86-support-newer-Intel-CPU-models.patch- bsc#985503 - vif-route broken vif-route.patch- bsc#978413 - PV guest upgrade from sles11sp4 to sles12sp2 alpha3 failed on sles11sp4 xen host. pygrub-handle-one-line-menu-entries.patch- bsc#990843 - VUL-1: CVE-2016-6351: xen: qemu: scsi: esp: OOB write access in esp_do_dma CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch- bsc#900418 - Dump cannot be performed on SLES12 XEN 57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch - Upstream patches from Jan 575e9ca0-nested-vmx-Validate-host-VMX-MSRs-before-accessing-them.patch 57640448-xen-sched-use-default-scheduler-upon-an-invalid-sched.patch- fate#319989 - Update to Xen 4.7 FCS xen-4.7.0-testing-src.tar.bz2 - Drop CVE-2014-3672-qemut-xsa180.patch- bsc#954872 - script block-dmmd not working as expected - libxl: error: libxl_dm.c (Additional fixes) block-dmmd- Convert with_stubdom into build_conditional to allow adjusting via prjconf - Convert with_debug into build_conditional to allow adjusting via prjconf- bsc#979002 - add 60-persistent-xvd.rules and helper script to xen-tools-domU to simplify transition to pvops based kernels- Convert with_oxenstored into build_conditional to allow adjusting via prjconf (fate#320836)- bsc#983984 - VUL-0: CVE-2016-5338: xen: qemu: scsi: esp: OOB r/w access while processing ESP_FIFO CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch - bsc#982960 - VUL-0: CVE-2016-5238: xen: qemu: scsi: esp: OOB write when using non-DMA mode in get_cmd CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch- fate#319989 - Update to Xen 4.7 RC5 xen-4.7.0-testing-src.tar.bz2- fate#319989 - Update to Xen 4.7 RC4 xen-4.7.0-testing-src.tar.bz2 - Dropped xen.pkgconfig-4.7.patch xsa164.patch- bsc#981264 - VUL-0: CVE-2014-3672: xen: Unrestricted qemu logging (XSA-180) CVE-2014-3672-qemut-xsa180.patch- bsc#980724 - VUL-0: CVE-2016-4441: Qemu: scsi: esp: OOB write while writing to 's->cmdbuf' in get_cmd CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch - bsc#980716 - VUL-0: CVE-2016-4439: xen: scsi: esp: OOB write while writing to 's->cmdbuf' in esp_reg_write CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch- fate#319989 - Update to Xen 4.7 RC3 xen-4.7.0-testing-src.tar.bz2 - Dropped libxl-remove-cdrom-cachemode.patch x86-PoD-only-reclaim-if-needed.patch gcc6-warnings-as-errors.patch- bsc#954872 - script block-dmmd not working as expected - libxl: error: libxl_dm.c (another modification) block-dmmd- fate#319989 - Update to Xen 4.7 RC2 xen-4.7.0-testing-src.tar.bz2- bsc#961600 - L3: poor performance when Xen HVM domU configured with max memory > current memory x86-PoD-only-reclaim-if-needed.patch- Mark SONAMEs and pkgconfig as xen 4.7 xen.pkgconfig-4.7.patch- bsc#977329 - Xen: Cannot boot HVM guests with empty cdrom libxl-remove-cdrom-cachemode.patch- fate#319989 - Update to Xen 4.7 RC1 xen-4.7.0-testing-src.tar.bz2- fate#316614: set migration constraints from cmdline restore libxl.set-migration-constraints-from-cmdline.patch- Remove obsolete patch for xen-kmp magic_ioport_compat.patch- fate#316613: update to v12 libxl.pvscsi.patch- Update to the latest Xen 4.7 pre-release c2994f86 Drop libxl.migrate-legacy-stream-read.patch- bnc#972756 - Can't migrate HVM guest from SLES12SP1 Xen host to SLES12SP2 Alpha 1 host using xl migrate libxl.migrate-legacy-stream-read.patch- Add patches from proposed upstream series to load BIOS's from the toolstack instead of embedding in hvmloader http://lists.xenproject.org/archives/html/xen-devel/2016-03/msg01626.html 0001-libxc-Rework-extra-module-initialisation.patch, 0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch, 0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch, 0004-firmware-makefile-install-BIOS-blob.patch, 0005-libxl-Load-guest-BIOS-from-file.patch, 0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch, 0007-hvmloader-Grab-the-hvm_start_info-pointer.patch, 0008-hvmloader-Locate-the-BIOS-blob.patch, 0009-hvmloader-Check-modules-whereabouts-in-perform_tests.patch, 0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch, 0011-hvmloader-Load-OVMF-from-modules.patch, 0012-hvmloader-Specific-bios_load-function-required.patch, 0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch, 0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch - Enable support for UEFI on x86_64 using the ovmf-x86_64-ms.bin firmware from qemu-ovmf-x86_64. The firmware is preloaded with Microsoft keys to more closely resemble firmware on real hardware FATE#320490- fate#319989: Update to Xen 4.7 (pre-release) xen-4.7.0-testing-src.tar.bz2 - Dropped: xen-4.6.1-testing-src.tar.bz2 55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch 5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch hotplug-Linux-block-performance-fix.patch set-mtu-from-bridge-for-tap-interface.patch xendomains-libvirtd-conflict.patch xsa154.patch xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa170.patch- Use system SeaBIOS instead of building/installing another one FATE#320638 Dropped files: seabios-dir-remote.tar.bz2 xen-c99-fix.patch xen.build-compare.seabios.patch- spec: drop BuildRequires that were only needed for qemu-xen- bsc#969377 - xen does not build with GCC 6 ipxe-use-rpm-opt-flags.patch gcc6-warnings-as-errors.patch- bsc#969351 - VUL-0: CVE-2016-2841: xen: net: ne2000: infinite loop in ne2000_receive CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch - Drop xsa154-fix.patch- Use system qemu instead of building/installing yet another qemu FATE#320638 - Dropped files qemu-xen-dir-remote.tar.bz2 CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch CVE-2015-4037-qemuu-smb-config-dir-name.patch CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch qemu-xen-enable-spice-support.patch qemu-xen-upstream-qdisk-cache-unsafe.patch tigervnc-long-press.patch xsa162-qemuu.patch- bsc#962321 - VUL-0: CVE-2016-1922: xen: i386: null pointer dereference in vapic_write() CVE-2016-1922-qemuu-i386-null-pointer-dereference-in-vapic_write.patch- bsc#968004 - VUL-0: CVE-2016-2538: xen: usb: integer overflow in remote NDIS control message handling CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch- bsc#954872 - L3: script block-dmmd not working as expected - libxl: error: libxl_dm.c block-dmmd - Update libxl to recognize dmmd and npiv prefix in disk spec xen.libxl.dmmd.patch- bsc#967101 - VUL-0: CVE-2016-2391: xen: usb: multiple eof_timers in ohci module leads to null pointer dereference CVE-2016-2391-qemuu-usb-null-pointer-dereference-in-ohci-module.patch CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch - bsc#967090 - VUL-0: CVE-2016-2392: xen: usb: null pointer dereference in remote NDIS control message handling CVE-2016-2392-qemuu-usb-null-pointer-dereference-in-NDIS-message-handling.patch- Update to Xen Version 4.6.1 xen-4.6.1-testing-src.tar.bz2 - Dropped patches now contained in tarball or unnecessary xen-4.6.0-testing-src.tar.bz2 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 5632129c-free-domain-s-vcpu-array.patch 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 563212e4-xenoprof-free-domain-s-vcpu-array.patch 563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch 56549f24-x86-vPMU-document-as-unsupported.patch 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch xsa155-qemut-qdisk-double-access.patch xsa155-qemut-xenfb.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa159.patch xsa160.patch xsa162-qemut.patch xsa165.patch xsa166.patch xsa167.patch xsa168.patch- bsc#965315 - VUL-0: CVE-2016-2270: xen: x86: inconsistent cachability flags on guest mappings (XSA-154) xsa154.patch - bsc#965317 - VUL-0: CVE-2016-2271: xen: VMX: guest user mode may crash guest with non-canonical RIP (XSA-170) xsa170.patch- bsc#965269 - VUL-1: CVE-2015-8619: xen: stack based OOB write in hmp_sendkey routine CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch- bsc#965156 - VUL-0: CVE-2015-6855: xen: ide: divide by zero issue CVE-2015-6855-qemuu-ide-divide-by-zero-issue.patch - bsc#965112 - VUL-0: CVE-2014-3640: xen: slirp: NULL pointer deref in sosendto() CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch- bsc#964947 - VUL-0: CVE-2015-5278: xen: Infinite loop in ne2000_receive() function CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch - bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch- bsc#964644 - VUL-0: CVE-2013-4533: xen pxa2xx: buffer overrun on incoming migration CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch - bsc#964925 - VUL-0: CVE-2014-0222: xen: qcow1: validate L2 table size to avoid integer overflows CVE-2014-0222-blktap-qcow1-validate-l2-table-size.patch - Dropped CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch- bsc#964415 - VUL-1: CVE-2016-2198: xen: usb: ehci null pointer dereference in ehci_caps_write CVE-2016-2198-qemuu-usb-ehci-null-pointer-dereference-in-ehci_caps_write.patch - bsc#964452 - VUL-0: CVE-2013-4534: xen: openpic: buffer overrun on incoming migration CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch- bsc#963783 - VUL-1: CVE-2016-1981: xen: net: e1000 infinite loop in start_xmit and e1000_receive_iov routines CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch- bsc#962758 - VUL-0: CVE-2013-4539: xen: tsc210x: buffer overrun on invalid state load CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch- bsc#962632 - VUL-0: CVE-2015-1779: xen: vnc: insufficient resource limiting in VNC websockets decoder CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch - bsc#962642 - VUL-0: CVE-2013-4537: xen: ssi-sd: buffer overrun on invalid state load CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch - bsc#962627 - VUL-0: CVE-2014-7815: xen: vnc: insufficient bits_per_pixel from the client sanitization CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch- bsc#962335 - VUL-0: CVE-2013-4538: xen: ssd0323: fix buffer overun on invalid state CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch - bsc#962360 - VUL-0: CVE-2015-7512: xen: net: pcnet: buffer overflow in non-loopback mode CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch- bsc#961692 - VUL-0: CVE-2016-1714: xen: nvram: OOB r/w access in processing firmware configurations CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch- bsc#961358 - VUL-0: CVE-2015-8613: xen: qemu: scsi: stack based buffer overflow in megasas_ctrl_get_info CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch - bsc#961332 - VUL-0: CVE-2016-1568: xen: Qemu: ide: ahci use-after-free vulnerability in aio port commands CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch- bsc#959695 - missing docs for xen xen.spec- bsc#960862 - VUL-0: CVE-2016-1571: xen: VMX: intercept issue with INVLPG on non-canonical address (XSA-168) xsa168.patch - bsc#960861 - VUL-0: CVE-2016-1570: xen: PV superpage functionality missing sanity checks (XSA-167) xsa167.patch - bsc#960836 - VUL-0: CVE-2015-8744: xen: net: vmxnet3: incorrect l2 header validation leads to a crash via assert(2) call CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch- bsc#960707 - VUL-0: CVE-2015-8745: xen: reading IMR registers leads to a crash via assert(2) call CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch - bsc#960726 - VUL-0: CVE-2015-8743: xen: ne2000: OOB memory access in ioport r/w functions CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch- bsc#960093 - VUL-0: CVE-2015-8615: xen: x86: unintentional logging upon guest changing callback method (XSA-169) 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch- Adjust xen-dom0-modules.service to run Before xenstored.service instead of proc-xen.mount to workaround a bug in systemd "design" (bnc#959845)- bsc#959387 - VUL-0: CVE-2015-8568 CVE-2015-8567: xen: qemu: net: vmxnet3: host memory leakage CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch- bsc#957988 - VUL-0: CVE-2015-8550: xen: paravirtualized drivers incautious about shared memory contents (XSA-155) xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemut-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa155-qemut-xenfb.patch - bsc#959006 - VUL-0: CVE-2015-8558: xen: qemu: usb: infinite loop in ehci_advance_state results in DoS CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch - bsc#958918 - VUL-0: CVE-2015-7549: xen: qemu pci: null pointer dereference issue CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch - bsc#958493 - VUL-0: CVE-2015-8504: xen: qemu: ui: vnc: avoid floating point exception CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch - bsc#958007 - VUL-0: CVE-2015-8554: xen: qemu-dm buffer overrun in MSI-X handling (XSA-164) xsa164.patch - bsc#958009 - VUL-0: CVE-2015-8555: xen: information leak in legacy x86 FPU/XMM initialization (XSA-165) xsa165.patch - bsc#958523 - VUL-0: xen: ioreq handling possibly susceptible to multiple read issue (XSA-166) xsa166.patch- bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch - Upstream patches from Jan 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch) 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 56544a57-VMX-fix-adjust-trap-injection.patch 56546ab2-sched-fix-insert_vcpu-locking.patch- bsc#956592 - VUL-0: xen: virtual PMU is unsupported (XSA-163) 56549f24-x86-vPMU-document-as-unsupported.patch - bsc#956408 - VUL-0: CVE-2015-8339, CVE-2015-8340: xen: XENMEM_exchange error handling issues (XSA-159) xsa159.patch - bsc#956409 - VUL-0: CVE-2015-8341: xen: libxl leak of pv kernel and initrd on error (XSA-160) xsa160.patch - bsc#956411 - VUL-0: CVE-2015-7504: xen: heap buffer overflow vulnerability in pcnet emulator (XSA-162) xsa162-qemuu.patch xsa162-qemut.patch - bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142) 5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch- fate#315712: XEN: Use the PVOPS kernel Turn off building the KMPs now that we are using the pvops kernel xen.spec- Upstream patches from Jan 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 5632129c-free-domain-s-vcpu-array.patch (Replaces CVE-2015-7969-xsa149.patch) 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 563212e4-xenoprof-free-domain-s-vcpu-array.patch 563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch) 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch - Dropped 55b0a2db-x86-MSI-track-guest-masking.patch- Use upstream variants of block-iscsi and block-nbd- Remove xenalyze.hg, its part of xen-4.6- Update to Xen Version 4.6.0 xen-4.6.0-testing-src.tar.bz2 mini-os.tar.bz2 blktap2-no-uninit.patch stubdom-have-iovec.patch - Renamed xsa149.patch to CVE-2015-7969-xsa149.patch - Dropped patches now contained in tarball or unnecessary xen-4.5.2-testing-src.tar.bz2 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch 54f4985f-libxl-fix-libvirtd-double-free.patch 55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 551ac326-xentop-add-support-for-qdisk.patch 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch 5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 554cc211-libxl-add-qxl.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch 5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch 5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch 5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch 5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch 5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch 5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch 55b0a218-x86-PCI-CFG-write-intercept.patch 55b0a255-x86-MSI-X-maskall.patch 55b0a283-x86-MSI-X-teardown.patch 55b0a2ab-x86-MSI-X-enable.patch blktapctrl-close-fifos.patch blktapctrl-default-to-ioemu.patch blktapctrl-disable-debug-printf.patch blktap-no-uninit.patch blktap-pv-cdrom.patch build-tapdisk-ioemu.patch ioemu-bdrv-open-CACHE_WB.patch ioemu-blktap-barriers.patch ioemu-blktap-fv-init.patch ioemu-blktap-image-format.patch ioemu-blktap-zero-size.patch libxl.set-migration-constraints-from-cmdline.patch local_attach_support_for_phy.patch pci-attach-fix.patch qemu-xen-upstream-megasas-buildtime.patch tapdisk-ioemu-logfile.patch tapdisk-ioemu-shutdown-fix.patch udev-rules.patch xen.build-compare.ipxe.patch xen.build-compare.mini-os.patch xen.build-compare.smbiosdate.patch xen.build-compare.vgabios.patch xen.build-compare.xen_compile_h.patch xl-coredump-file-location.patch- bsc#954405 - VUL-0: CVE-2015-8104: Xen: guest to host DoS by triggering an infinite loop in microcode via #DB exception - bsc#954018 - VUL-0: CVE-2015-5307: xen: x86: CPU lockup during fault delivery (XSA-156) CVE-2015-5307-xsa156.patch- Update to Xen 4.5.2 xen-4.5.2-testing-src.tar.bz2 - Drop the following xen-4.5.1-testing-src.tar.bz2 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 559bdde5-pull-in-latest-linux-earlycpio.patch 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch 560bd926-credit1-fix-tickling-when-it-happens-from-a-remote-pCPU.patch 560e6d34-x86-p2m-pt-tighten-conditions-of-IOMMU-mapping-updates.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch CVE-2015-4106-xsa131-9.patch CVE-2015-3259-xsa137.patch CVE-2015-7311-xsa142.patch CVE-2015-7835-xsa148.patch xsa139-qemuu.patch xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch xsa151.patch xsa152.patch xsa153-libxl.patch CVE-2015-5154-qemuu-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemuu-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch"- bsc#950704 - CVE-2015-7970 VUL-1: xen: x86: Long latency populate-on-demand operation is not preemptible (XSA-150) 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch- Upstream patches from Jan 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch- bsc#951845 - VUL-0: CVE-2015-7972: xen: x86: populate-on-demand balloon size inaccuracy can crash guests (XSA-153) xsa153-libxl.patch- bsc#950703 - VUL-1: CVE-2015-7969: xen: leak of main per-domain vcpu pointer array (DoS) (XSA-149) xsa149.patch - bsc#950705 - VUL-1: CVE-2015-7969: xen: x86: leak of per-domain profiling-related vcpu pointer array (DoS) (XSA-151) xsa151.patch - bsc#950706 - VUL-0: CVE-2015-7971: xen: x86: some pmu and profiling hypercalls log without rate limiting (XSA-152) xsa152.patch - Dropped 55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch 5604f239-x86-PV-properly-populate-descriptor-tables.patch- bsc#932267 - VUL-1: CVE-2015-4037: qemu,kvm,xen: insecure temporary file use in /net/slirp.c CVE-2015-4037-qemuu-smb-config-dir-name.patch CVE-2015-4037-qemut-smb-config-dir-name.patch - bsc#877642 - VUL-0: CVE-2014-0222: qemu: qcow1: validate L2 table size to avoid integer overflows CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch- bsc#950367 - VUL-0: CVE-2015-7835: xen: x86: Uncontrolled creation of large page mappings by PV guests (XSA-148) CVE-2015-7835-xsa148.patch- bsc#949138 - Setting vcpu affinity under Xen causes libvirtd abort 54f4985f-libxl-fix-libvirtd-double-free.patch- bsc#949046 - Increase %suse_version in SP1 to 1316 xen.spec - Update README.SUSE detailing dom0 ballooning recommendations- bsc#945167 - Running command ’ xl pci-assignable-add 03:10.1’ secondly show errors 55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch - Upstream patches from Jan 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f239-x86-PV-properly-populate-descriptor-tables.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch 560bd926-credit1-fix-tickling-when-it-happens-from-a-remote-pCPU.patch 560e6d34-x86-p2m-pt-tighten-conditions-of-IOMMU-mapping-updates.patch- bsc#941074 - VmError: Device 51728 (vbd) could not be connected. Hotplug scripts not working. hotplug-Linux-block-performance-fix.patch- bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142) CVE-2015-7311-xsa142.patch- bsc#945165 - Xl pci-attach show error with kernel of SLES 12 sp1 pci-attach-fix.patch- bsc#945164 - Xl destroy show error with kernel of SLES 12 sp1 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch- Upstream patches from Jan 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch- bsc#944463 - VUL-0: CVE-2015-5239: qemu-kvm: Integer overflow in vnc_client_read() and protocol_client_msg() CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch - bsc#944697 - VUL-1: CVE-2015-6815: qemu: net: e1000: infinite loop issue CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch- bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch- bsc#907514 - Bus fatal error & sles12 sudden reboot has been observed - bsc#910258 - SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984 - Bus fatal error & sles11-SP4 sudden reboot has been observed - bsc#923967 - Partner-L3: Bus fatal error & sles11-SP3 sudden reboot has been observed 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 55b0a218-x86-PCI-CFG-write-intercept.patch 55b0a255-x86-MSI-X-maskall.patch 55b0a283-x86-MSI-X-teardown.patch 55b0a2ab-x86-MSI-X-enable.patch 55b0a2db-x86-MSI-track-guest-masking.patch - Upstream patches from Jan 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch - Dropped for upstream version x86-MSI-mask.patch x86-MSI-pv-unmask.patch x86-MSI-X-enable.patch x86-MSI-X-maskall.patch x86-MSI-X-teardown.patch x86-pci_cfg_okay.patch x86-PCI-CFG-write-intercept.patch- bsc#939712 - VUL-0: XSA-140: QEMU leak of uninitialized heap memory in rtl8139 device model xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch - bsc#939709 - VUL-0: XSA-139: xen: Use after free in QEMU/Xen block unplug protocol xsa139-qemuu.patch- bsc#937371 - xen vm's running after reboot xendomains-libvirtd-conflict.patch- bsc#938344 - VUL-0: CVE-2015-5154: qemu,kvm,xen: host code execution via IDE subsystem CD-ROM CVE-2015-5154-qemuu-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemuu-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch- Remove xendomains.service from systemd preset file because it conflicts with libvirt-guests.service (bnc#937371) Its up to the admin to run systemctl enable xendomains.service- bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow CVE-2015-3259-xsa137.patch - Upstream patches from Jan 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bdde5-pull-in-latest-linux-earlycpio.patch - Upstream patches from Jan pending review 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch 5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch 5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch 5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch 5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch 5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch x86-MSI-pv-unmask.patch x86-pci_cfg_okay.patch x86-PCI-CFG-write-intercept.patch x86-MSI-X-maskall.patch x86-MSI-X-teardown.patch x86-MSI-X-enable.patch x86-MSI-mask.patch- Adjust more places to use br0 instead of xenbr0- bnc#936516 - xen fails to build with kernel update(4.1.0 from stable) 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch- Update to Xen Version 4.5.1 FCS (fate#315675) xen-4.5.1-testing-src.tar.bz2 - Dropped patches now contained in tarball 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch qemu-MSI-X-enable-maskall.patch qemu-MSI-X-latch-writes.patch x86-MSI-X-guest-mask.patch- Replace 5124efbe-add-qxl-support.patch with the variant that finally made it upstream, 554cc211-libxl-add-qxl.patch- bsc#931627 - VUL-0: CVE-2015-4105: XSA-130: xen: Guest triggerable qemu MSI-X pass-through error messages qemu-MSI-X-latch-writes.patch - bsc#907514 - Bus fatal error & sles12 sudden reboot has been observed - bsc#910258 - SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984 - Bus fatal error & sles11-SP4 sudden reboot has been observed - bsc#923967 - Partner-L3: Bus fatal error & sles11-SP3 sudden reboot has been observed x86-MSI-X-teardown.patch x86-MSI-X-enable.patch x86-MSI-X-guest-mask.patch x86-MSI-X-maskall.patch qemu-MSI-X-enable-maskall.patch - Upstream patches from Jan 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch - Dropped the following patches now contained in the tarball xen-no-array-bounds.patch CVE-2015-4103-xsa128.patch CVE-2015-4104-xsa129.patch CVE-2015-4105-xsa130.patch CVE-2015-4106-xsa131-1.patch CVE-2015-4106-xsa131-2.patch CVE-2015-4106-xsa131-3.patch CVE-2015-4106-xsa131-4.patch CVE-2015-4106-xsa131-5.patch CVE-2015-4106-xsa131-6.patch CVE-2015-4106-xsa131-7.patch CVE-2015-4106-xsa131-8.patch- Update to Xen 4.5.1 RC2 - bsc#931628 - VUL-0: CVE-2015-4106: XSA-131: xen: Unmediated PCI register access in qemu CVE-2015-4106-xsa131-1.patch CVE-2015-4106-xsa131-2.patch CVE-2015-4106-xsa131-3.patch CVE-2015-4106-xsa131-4.patch CVE-2015-4106-xsa131-5.patch CVE-2015-4106-xsa131-6.patch CVE-2015-4106-xsa131-7.patch CVE-2015-4106-xsa131-8.patch CVE-2015-4106-xsa131-9.patch - bsc#931627 - VUL-0: CVE-2015-4105: XSA-130: xen: Guest triggerable qemu MSI-X pass-through error messages CVE-2015-4105-xsa130.patch - bsc#931626 - VUL-0: CVE-2015-4104: XSA-129: xen: PCI MSI mask bits inadvertently exposed to guests CVE-2015-4104-xsa129.patch - bsc#931625 - VUL-0: CVE-2015-4103: XSA-128: xen: Potential unintended writes to host MSI message data field via qemu CVE-2015-4103-xsa128.patch - Upstream patches from Jan 5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch- Add DefaultDependencies=no to xen-dom0-modules.service because it has to run before proc-xen.mount- Update to Xen 4.5.1 RC1- Update blktap-no-uninit.patch to work with gcc-4.5- bsc#927967 - VUL-0: CVE-2015-3340: xen: Information leak through XEN_DOMCTL_gettscinfo (XSA-132) 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch- bnc#929339 - VUL-0: CVE-2015-3456: qemu kvm xen: VENOM qemu floppy driver host code execution CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch- bsc#928783 - Reboot failure; Request backport of upstream Xen patch to 4.5.0, or update pkgs to 4.5.1 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch- bnc#927750 - Avoid errors reported by system-modules-load.service- Add xen-no-array-bounds.patch and blktap-no-uninit.patch to selectively turn errors back to warnings to fix build with GCC 5. - Amend xen.stubdom.newlib.patch to pull in declaration of strcmp to avoid implicit-fortify-decl rpmlint error. - Fix quoting of __SMBIOS_DATE__ in xen.build-compare.smbiosdate.patch.- xentop: Fix memory leak on read failure 551ac326-xentop-add-support-for-qdisk.patch- Dropped xentop-add-support-for-qdisk.patch in favor of upstream version 551ac326-xentop-add-support-for-qdisk.patch- Enable spice support in qemu for x86_64 5124efbe-add-qxl-support.patch qemu-xen-enable-spice-support.patch- Add xen-c99-fix.patch to remove pointless inline specifier on function declarations which break build with a C99 compiler which GCC 5 is by default. (bsc#921994) - Add ipxe-no-error-logical-not-parentheses.patch to supply - Wno-logical-not-parentheses to the ipxe build to fix breakage with GCC 5. (bsc#921994)- bnc#921842 - Xentop doesn't display disk statistics for VMs using qdisks xentop-add-support-for-qdisk.patch- Disable the PIE enablement done for Factory, as the XEN code is not buildable with PIE and it does not make much sense to build the hypervisor code with it.- bnc#918169 - XEN fixes required to work with Kernel 3.19.0 xen.spec- Package xen.changes because its referenced in xen.spec- Update seabios to rel-1.7.5 which is the correct version for Xen 4.5- Update to Xen 4.5.0 FCS- Include systemd presets in 13.2 and older- bnc#897352 - Enable xencommons/xendomains only during fresh install - disable restart on upgrade because the toolstack is not restartable- adjust seabios, vgabios, stubdom and hvmloader build to reduce build-compare noise xen.build-compare.mini-os.patch xen.build-compare.smbiosdate.patch xen.build-compare.ipxe.patch xen.build-compare.vgabios.patch xen.build-compare.seabios.patch xen.build-compare.man.patch- Update to Xen 4.5.0 RC4- Remove xend specific if-up scripts Recording bridge slaves is a generic task which should be handled by generic network code- Use systemd features from upstream requires updated systemd-presets-branding package- Update to Xen 4.5.0 RC3- Set GIT, WGET and FTP to /bin/false- Use new configure features instead of make variables xen.stubdom.newlib.patch- adjust docs and xen build to reduce build-compare noise xen.build-compare.doc_html.patch xen.build-compare.xen_compile_h.patch- Drop trailing B_CNT from XEN_EXTRAVERSION to reduce build-compare noise- Update to Xen 4.5.0 RC2- Update to Xen 4.5.0 RC1 xen-4.5.0-testing-src.tar.bz2 - Remove all patches now contained in the new tarball xen-4.4.1-testing-src.tar.bz2 5315a3bb-x86-don-t-propagate-acpi_skip_timer_override-do-Dom0.patch 5315a43a-x86-ACPI-also-print-address-space-for-PM1x-fields.patch 53299d8f-xenconsole-reset-tty-on-failure.patch 53299d8f-xenconsole-tolerate-tty-errors.patch 5346a7a0-x86-AMD-support-further-feature-masking-MSRs.patch 53563ea4-x86-MSI-drop-workaround-for-insecure-Dom0-kernels.patch 537c9c77-libxc-check-return-values-on-mmap-and-madvise.patch 537cd0b0-hvmloader-also-cover-PCI-MMIO-ranges-above-4G-with-UC-MTRR-ranges.patch 537cd0cc-hvmloader-PA-range-0xfc000000-0xffffffff-should-be-UC.patch 539ebe62-x86-EFI-improve-boot-time-diagnostics.patch 53aac342-x86-HVM-consolidate-and-sanitize-CR4-guest-reserved-bit-determination.patch 53c9151b-Fix-xl-vncviewer-accesses-port-0-by-any-invalid-domid.patch 53d124e7-fix-list_domain_details-check-config-data-length-0.patch 53dba447-x86-ACPI-allow-CMOS-RTC-use-even-when-ACPI-says-there-is-none.patch 53df727b-x86-HVM-extend-LAPIC-shortcuts-around-P2M-lookups.patch 53e8be5f-x86-vHPET-use-rwlock-instead-of-simple-one.patch 53f737b1-VMX-fix-DebugCtl-MSR-clearing.patch 53f7386d-x86-irq-process-softirqs-in-irq-keyhandlers.patch 53fcebab-xen-pass-kernel-initrd-to-qemu.patch 53ff3659-x86-consolidate-boolean-inputs-in-hvm-and-p2m.patch 53ff36ae-x86-hvm-treat-non-insn-fetch-NPF-also-as-read-violations.patch 53ff36d5-x86-mem_event-deliver-gla-fault-EPT-violation-information.patch 53ff3716-x86-ats-Disable-Address-Translation-Services-by-default.patch 53ff3899-x86-NMI-allow-processing-unknown-NMIs-with-watchdog.patch 54005472-EPT-utilize-GLA-GPA-translation-known-for-certain-faults.patch 540effe6-evtchn-check-control-block-exists-when-using-FIFO-based-events.patch 540f2624-x86-idle-add-barriers-to-CLFLUSH-workaround.patch 541825dc-VMX-don-t-leave-x2APIC-MSR-intercepts-disabled.patch 541ad385-x86-suppress-event-check-IPI-to-MWAITing-CPUs.patch 541ad3ca-x86-HVM-batch-vCPU-wakeups.patch 541ad81a-VT-d-suppress-UR-signaling-for-further-desktop-chipsets.patch 54216833-x86-shadow-fix-race-when-sampling-dirty-vram-state.patch 54216882-x86-emulate-check-cpl-for-all-privileged-instructions.patch 542168ae-x86emul-only-emulate-swint-injection-for-real-mode.patch 54228a37-x86-EFI-fix-freeing-of-uninitialized-pointer.patch 5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch 5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch 542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch 542bf997-x86-HVM-properly-bound-x2APIC-MSR-range.patch 54325cc0-x86-MSI-fix-MSI-X-case-of-freeing-IRQ.patch 54325d2f-x86-restore-reserving-of-IO-APIC-pages-in-XENMEM_machine_memory_map-output.patch 54325d95-don-t-allow-Dom0-access-to-IOMMUs-MMIO-pages.patch 54325ecc-AMD-guest_iommu-properly-disable-guest-iommu-support.patch 54325f3c-x86-paging-make-log-dirty-operations-preemptible.patch 54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch CVE-2013-4540-qemu.patch qemu-support-xen-hvm-direct-kernel-boot.patch qemu-xen-upstream-blkif-discard.patch change-vnc-passwd.patch libxc-pass-errno-to-callers-of-xc_domain_save.patch libxl.honor-more-top-level-vfb-options.patch libxl.add-option-for-discard-support-to-xl-disk-conf.patch libxl.introduce-an-option-to-disable-the-non-O_DIRECT-workaround.patch x86-dom-print.patch x86-extra-trap-info.patch tmp_build.patch xl-check-for-libvirt-managed-domain.patch disable-wget-check.patch - Xend/xm is no longer supported and is not part of the upstream code. Remove all xend/xm specific patches, configs, and scripts xen-xmexample.patch bridge-opensuse.patch xmexample.disks xmclone.sh init.xend xend-relocation.sh xend.service xend-relocation-server.fw domUloader.py xmexample.domUloader xmexample.disks bridge-vlan.patch bridge-bonding.patch bridge-record-creation.patch network-nat-open-SuSEfirewall2-FORWARD.patch xend-set-migration-constraints-from-cmdline.patch xen.migrate.tools-xend_move_assert_to_exception_block.patch xend-pvscsi-recognize-also-SCSI-CDROM-devices.patch xend-config.patch xend-max-free-mem.patch xend-hvm-default-pae.patch xend-vif-route-ifup.patch xend-xenapi-console-protocol.patch xend-core-dump-loc.patch xend-xen-api-auth.patch xend-checkpoint-rename.patch xend-xm-save-check-file.patch xend-xm-create-xflag.patch xend-domu-usb-controller.patch xend-devid-or-name.patch xend-migration-domname-fix.patch xend-del_usb_xend_entry.patch xend-xen-domUloader.patch xend-multi-xvdp.patch xend-check_device_status.patch xend-change_home_server.patch xend-minimum-restart-time.patch xend-disable-internal-logrotate.patch xend-config-enable-dump-comment.patch xend-tools-watchdog-support.patch xend-console-port-restore.patch xend-vcpu-affinity-fix.patch xend-migration-bridge-check.patch xend-managed-pci-device.patch xend-hvm-firmware-passthrough.patch xend-cpuinfo-model-name.patch xend-xm-reboot-fix.patch xend-domain-lock.patch xend-domain-lock-sfex.patch xend-32on64-extra-mem.patch xend-hv_extid_compatibility.patch xend-xenpaging.autostart.patch xend-remove-xm-deprecation-warning.patch libxen_permissive.patch tmp-initscript-modprobe.patch init.xendomains xendomains.service xen-watchdog.service xen-updown.sh- bnc#901317 - L3: increase limit domUloader to 32MB domUloader.py- bnc#898772 - SLES 12 RC3 - XEN Host crashes when assigning non-VF device (SR-IOV) to guest 54325cc0-x86-MSI-fix-MSI-X-case-of-freeing-IRQ.patch - bnc#882089 - Windows 2012 R2 fails to boot up with greater than 60 vcpus 54325ecc-AMD-guest_iommu-properly-disable-guest-iommu-support.patch - bnc#826717 - VUL-0: CVE-2013-3495: XSA-59: xen: Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts 541ad81a-VT-d-suppress-UR-signaling-for-further-desktop-chipsets.patch - Upstream patches from Jan 540effe6-evtchn-check-control-block-exists-when-using-FIFO-based-events.patch (Replaces xsa107.patch) 54216833-x86-shadow-fix-race-when-sampling-dirty-vram-state.patch (Replaces xsa104.patch) 54216882-x86-emulate-check-cpl-for-all-privileged-instructions.patch (Replaces xsa105.patch) 542168ae-x86emul-only-emulate-swint-injection-for-real-mode.patch (Replaces xsa106.patch) 54228a37-x86-EFI-fix-freeing-of-uninitialized-pointer.patch 5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch 5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch 542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch 542bf997-x86-HVM-properly-bound-x2APIC-MSR-range.patch (Replaces xsa108.patch) 54325d2f-x86-restore-reserving-of-IO-APIC-pages-in-XENMEM_machine_memory_map-output.patch 54325d95-don-t-allow-Dom0-access-to-IOMMUs-MMIO-pages.patch 54325f3c-x86-paging-make-log-dirty-operations-preemptible.patch (Replaces xsa97.patch) 54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGH3AKDM4.12.1_04-lp151.2.6.14.12.1_04-lp151.2.6.1  xenhtmlhypercallarmindex.htmlindex.htmlx86_32index.htmlx86_64index.htmlindex.htmlmanindex.htmlxen-pci-device-reservations.7.htmlxen-pv-channel.7.htmlxen-tscmode.7.htmlxen-vtpm.7.htmlxen-vtpmmgr.7.htmlxenstore-chmod.1.htmlxenstore-ls.1.htmlxenstore-read.1.htmlxenstore-write.1.htmlxenstore.1.htmlxentop.1.htmlxentrace.8.htmlxentrace_format.1.htmlxl-disk-configuration.5.htmlxl-network-configuration.5.htmlxl-numa-placement.7.htmlxl.1.htmlxl.cfg.5.htmlxl.conf.5.htmlxlcpupool.cfg.5.htmlmiscamd-ucode-container.txtarmbig.LITTLE.txtbooting.txtdevice-treeacpi.txtbooting.txtguest.txtindex.htmlpassthrough.txtearly-printk.txtindex.htmlpassthrough.txtsilicon-errata.txtblock-scripts.txtconsole.txtcrashdb.txtdistro_mapping.txtdump-core-format.txtgrant-tables.txtindex.htmlkconfig-language.txtkconfig.txtkexec_and_kdump.txtlibxl_memory.txtprintk-formats.txtqemu-backends.txtstubdom.txtvtd-pi.txtvtd.txtvtpm-platforms.txtxen-error-handling.txtxenmon.txtxenpaging.txtxenstore-ring.txtxenstore.txtxsm-flask.txtmisccrashdb.txtvtpm-platforms.txtxen-command-line.pandocxenpaging.txtxenstore-paths.pandoc/usr/share/doc/packages//usr/share/doc/packages/xen//usr/share/doc/packages/xen/html//usr/share/doc/packages/xen/html/hypercall//usr/share/doc/packages/xen/html/hypercall/arm//usr/share/doc/packages/xen/html/hypercall/x86_32//usr/share/doc/packages/xen/html/hypercall/x86_64//usr/share/doc/packages/xen/html/man//usr/share/doc/packages/xen/html/misc//usr/share/doc/packages/xen/html/misc/arm//usr/share/doc/packages/xen/html/misc/arm/device-tree//usr/share/doc/packages/xen/misc/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:11481/openSUSE_Leap_15.1_Update/e2db486383f3e2513e206dd08b943b52-xen.openSUSE_Leap_15.1_Updatecpioxz5x86_64-suse-linuxdirectoryHTML document, ASCII textXML 1.0 document, ASCII text, with very long linesXML 1.0 document, ASCII textC source, ASCII textASCII textASCII text, with very long linesAlgol 68 source, ASCII textutf-8a473591d58c717721cfe39418c03b28d095fa348942230d87062a92e9c5dd8d8?p7zXZ !t/-)] crt:bLL FzsĪ;}ظ6(inWEp.1([Fc[`?[G(q?Ou>s V/|GI֢QV\=vpWꩧ.dInD .R|>ŒZII0zN\3|lΠ/\U+F C\}+B VPz@7Գ砳?tfdhZtƟ?g.B-ic[7õq-@ؠd%k`:n1N죦63udMg,TXd`#7e]N*VA!Rkvrƹh⣃SOL'톰|?qP79)EMŸ2% 2 ?F%/Ue!KietޕVWqx>:E~˜+\Z}3V"pfŘ:}Gm%$%='BR(Mhi!]DFꔡznP%E_E>jVQ?g)NCTh%5_^iv1a _(J#P zJƱVGI٭ߛo2ZG Oۓv91M!U7<S OccL ĔTPJa6@%7 (!r->2!l87"Jd6Jo p JG=ίd+Nf~ >,gt!ܶw!Wp ACڏh:٭ 39F|d$kZgW' z{UL'-5_h rtRSJ@^wᖭjM+r;S(^tNx| 乂=^Bu0iIPj;`k(G0u q9OgK{` C4e!Lx0 ':$"ħa[Z+0 u̯ ZBVk# CfoZ$t!{I4i.rZuCk>0r䩌 a2ijDKyX&A- 0\W@UgPWՀ=/W6B'mE0|tε+Y[ h[K_b ?poʱejawS^eV|[uY)#t*<'-cPq@o%B)Oj\L"r_n;YP^Ԫ۩>&ޏp}S@XhR-}O4xhd%H':r]kVU{+D gsdDJ1g%8eV22uk  vrr@YPSWUԊVSކŔ?I=d ҌՄ0>H }6U\UK"_&f֓ +\V@;{߻_U+2} ac-|chK_-^cqms \֡lIf"6|3. 2\i.A灺eQС ,ngB}=r"AG5T2*H"co|Yn;֓߱k1 -YAX\ѩƁD:5{JZmCH`2z=}=IiYI`s=+ ac*stEЊجWas$o1|Ne#ΦidrP[?1 gPޛ}gEClNF<̊*qq}3eixfyqzk v;V' Bz?s}t tq(joԉFL2mz_P2p!'?rSr]? PƷZ(V_32&\u:5@y-'443uU|=xȒ@c*Fq&<c3%gCJGe_!SW/Z\C.5>pJ\¯d@nv? { ̹!puU;^m '4Gs&M{ͯT>i&d7}b ӸF;} Y-#T ]0* T!/Gf0j3=i[ Y#4Ր bx$jEq |q Lr1JfuX,ql5&uC2;?$1CZ'd =a[m FFٳ3>6Ŵq:Gx,'xq&3WR5 }+NBR1S21-enw>vAv{i۰8c0B~fZ/c_S6>"D7cꮓpvZ XdI4R*NpR{Y|?d.RJ|S^5yduPқ֠ p>#E=PP2Y޲#&7y#噧 1k/*Ss_!@nUYp(D\4'qnCAĹ}kj^tҮ"$0{]"l+SQjVM;Rxe$j3}[Q(𹞴D 21id@X78" ]U#]Ӷƽ-FVH9$}f`k6(g:>DOR݄F,= ߿" ,;YIS~C6)jTI7䳌>yU@_-[ V x+& !w\ܷ)J xV ޸C$ÈUƿnl;_}Y\"H찃%ZWK΢@GQIuvQЙڿ~j"eD %X+c!=z3}( $#Gv[2^ 1 >4r@[ xeX \[d ;Ll bK31}a]H4hRH ]Qx\dX5lO;pSFkΧ atlwtn5СƆrzF:) &D/WrИ@8DVf.NOū2CxM௬S1@EG]i;JMfܰwKg!r N<*Jd-!n|D Ww:}Bli}{[;ǰo4"UAEJ  K B.wVտz`:$o܋RX2+Q^Tn.>ω2ø"T]|P1n8Fii ob? uG[π k,hP®M~X*E EW_]`pF97 fGMjE?ɣ}W$kuJk1r "`()_C6[_``bX鳾|}&!cޝs(3hZl/J~4ņ-@uޕζ-b[%zpɆ/"Th:1;z< :D>rTa9:#\ 1fbS_[<~?QYXh.2eArb7y$ tBcFnzqti'lK{/FZ*G4_1\D7"'UU ";WeaX5-M(`gR/UK$co? 4 "n-1ҏ@IvBS`Z4.>rq w9x2?D9-[ܕ0hVUϔ˸|d}ڥ.{=Cm#0(R=ZAB{1F B5yBh{ImRoK5 r(OO hE]fUw{}[jf`DrD0<˒͗l'/[\M8aIe5zq)OWRJVW17,1\ڏkMn0r:U0`S647(=:ؙV0hf͉hT]V]5eC7sG"3R1ﺸ$lToQYT{ Dm6@]8 51 3*>F*fךR^v<#YS.њb]-noK_5OQu|-73%qZՄZٝC@y8|lH!cBbkQkg}Jte8ZfpuH,t|~8:j'ûpn?~KxWΦI#RZf3;*}lޱS < *\RmɎDz5KjVS+[fᾋquVpG2M7FE$Nh@ [hEu ) T'I3V @5DԄ(#)c-Haȧ8ҟeC m-G6; N[R6=b`䩗A 90<\qzx9Ak.3y@۞t2PC.; +21цy_1nz,bJOFѢ)8V\ŪfK%Z*g3)@+c +c)CW:OlbМv**rg;/OtXrc,Q<4ethXUp4ח+#5"v[+6egW Kn`6> |lցB1t?))ǽT82or_JSh lu9xNOw(yu\'~rbP!.:vhexbF8z#cn'IؑVSClk%xs"GiXef}V"LHHl ѥpiZOlDu {R<`?v}A{X!Ahbpyo҆wO)2(T"rƥM(e؁چ;.&hLarGNs:ybku5%jbC1X:|! eZˉLbG+,qH`&.AӷUmne жg5 \ +n3@Wؐ_B ;P ՗yDU)p>y.oR[s/Z?6'=46Iu8ܳFNv!-}RT[Xwl$d}UR̿S(Ti;3]IwrgTNE"`G%Y.3E}\"^fqytrZt)90SGLmf(8'mbV(\SƝc:9VD3+7>BNb%F]е~_6P0h?ݷ#.e='lpF=yg} 5߭ٱ<暪 sǣD*zlLi R>J sC;/5&"C˹[IјPK htͧgSeNvȮGؤU77h%xVM9+-ml 4sY?U"GDb8Z_p柩VRF|%JNyJst,0wؐP~d+MyhFg E%;s*w*sENwJ_ٚ$5l)05ZoJQ->2A %@Sx釾aԲf ؝7*x$mN >ȷ0i)Icq%\vϺ*V|6JUς̕T`xWۼHͤ+3gp_>##cMX/&4Γ Y98hz'NVRp[y&OSze叜fQt[YĄ?[witfvr Clݨ8u 1 5>3b`t4 {WAºN @{4L2sZҒphW\Ee'U;L"2=|1R cw]^ z Wa}C,ToX=s8ުM,6kgZ%aeQ{Z^RA8=F7׬j1o'u ,ϽE.J RשmV @u}]m6JM{cQM-CP/vq<!w c۶jC8fuz~}}DWwfӖ_.SjyC~#W$-\ݛ Nd`!QN3\\[xnHVO17= ^ܷ)lX Q} KOu+mq.ECܙ\†i3"*]mJ}z+Q:pq6&Pss;l1xKW|C9C;]G`;?)N͒Ӓ:'0VO4'R2ǶuD9Ἰ)y|<3<sǀ7)*-\?#,P^J8ӟX;h_; YcB6VBFгj3aWzoɣxHyMU~4#+?;E*ۏ^`pvW/,Qc> Xmi22fവ>؛Hi ~KM$>k?/ Ns'x01 {9aD9 ;#q V8smEN&A,(MS|,lPN+1n2 [9L=չ8CS߲g&ـ :I^L0nw1$^Ntr-q{bhjj)]&8uُ0-zW1gh"mpQBB:W:n@n]@6@4T;TF5?1K-ЭFIImFU31K~D7^ƴJM⢩ {7<4moCxryV&J N8-@##l\y81973~O(ĦR4]mz]v,HX Xx {*{l r1 +SW:ӄ~S;8ye, ' Neި´Lxb#+)?^Px'${.80A.Z$.˱mNӈ;P#сBOmohs9N4 -f>ٜ696|ȿe؊՗(IT}Չ-HRڨHօ`9q/kb"6xt!?NWr#ɸu>Cީ2$iGuɻI3ŝ{{n7} 8Ϧ_$ͷvA5C|xe2,\M0o=ՖA_LǎӅy=$P%RL\Yi/5e@tR#<ފdT3'5y/}2FI,A0myaAb˯A=/rUSxMT9о;iuʻKKy-xī{ dKQ&!*NEGyϾX hsdSPa F͚(dݹo4Yie%]`~xi"'}Rl*&_ v\ہ-C/ܝKKt3lUg K"t kF8WY-n; c4OQ *US7C32Lo, {$bG xV[ X{*Frd]S^N靋&9FxAҗ4kn(q)moY}.Ot9xI;9s*UBm>ݯEbmhS4$r*0w0CG ¾*5^Ö jXFRffO.0ۂ셞ݨ/ۖ/֢XjOe`1ղC ")] ?;`2].V@$P!a f.V`JTbz4 a⓷*=LqHNoS ^O3<(Z@CU6u,*O)rI^nz,A~lu΢ޟ?fw<>&,>eYA-QdnbTiДˤ 2r)xںz2 : x9hqR2M*$ADshR7qDžma?jQO#.lzv* YhXc&F`QK4 As1%KJL} b"A ZPo#8y@!7`QGxCcxI뀞ơh".9gO8Y}*ْnmkw'jWrV弋ܤXJV2U@j# ,dLWAQ % F~ vߵ0l_MSQlw@F&M.%6M-W!ڢqZfs=`] GA5z}8@|(l±?9ImHyvy=QsS8Y< ͅx_Nv@DYW?0N-DEHCⓤ^;;4Rվ݊PѾةj&!nef T5%A"D}[5LIG[PcS0H<p7~Yފ"˾ I!gzP蒰Wܙa.jynpJTII'($%p㹦ṼdtG(Q ~6o%22 X; Q_ʒ;/v "98yƕ#)yFex"/ů9T+]ںQPkM=;9iMn"09  +ɅY܃i2=š~HX UV1fgQhkOy(#J}fؓ8Dُ7ڈ ߒ!$ ;5_&o^JWHo>T$W U,*䚰6}jzx- _ /Epn$WMn=_Jvzk =.wB]vKry** O]eg8eN}sv9Ӗk= {Kway38HCrMGooؑٽûjp[TEXJ~ߕoy- %$i|UY^Jz)g1C(7#| )We|DF24-~͆NiX_1q7.S~0^3#u_Oxefʽu;/8G^83 k R_o̬|w& DtS=d{܆$*"z" @Rs|hM1_)+{amFlIН^&nu[/=cۀڀ$Y9V^a6X@iլI}o~떳x=LeNo \[P4?u~IQ߅6OG+HdtqrApcbHڒX$lX)쏂,qK (d\1eߵ6w膗ˈ vyvΞe:?">>.7==ҼK&R_.x|R116ݼU\N}c<$_ecu,DƖho!/(j3?9[''3yR{`ɏ "Nצ;y@Qv!g|R>L5iST5dXbmbŠBELt|_̽|'vo=APFQŁo7[M8슀V-p~نd'C5):OD2)ԿjA G(rWcayI g)ޡmR\62Ʊ44@Jb\J|Kw"Ug-=p@ DհC q7y3 fWJ'w:2 I_I BbcX J$%n8Q3#? ;GQΜBͬaP{v])KFT){cW7i;Q.E,#XZzqǽaScl>kO~E 4EgD]e}_>&έ4_F;KIq>Xդ_ %cks7cۧyv#,ToB@]b۶05ZO%U2`[Vf SNZQ43-g&/0BCwgw^*֟̍a- p#Pȿ9HK 䟝LVWSܯs, 4 /V\@bv˛$AZ+Y(F/'K*vnQk Ӕڴй4=$yJM`홖& pオEPOGM~G` FLs-Q$0xf'Eݠ'BQ8w>kC A< ,*L*mjr bܷQ8wz!۝\!׌ͫ@W:unh+&s5gřy>,2)hR!$6FI M &<XWDYj6*ܻ%Oe 'O*}-rbu)Y*YQ`CRi|6R mM neބݳ7EtHiiv`FV؄@_Bc~$|4SN%س4TFh8)sauM w|QS`, wrXޝ)h9pFf >>@yQc?}Ǡ p0d|Lj" Qm/y$|}9ǵ ĈkZPfRGNWaSc[z2pI1peB@j(B H4qZ"'kyT6!m[Skn,sxP(j!Z+G'KӘd1^zk [rK[>O; oBZyM^dYjFLP+ S. j|DnM1\-shXbImNZq ϝ^BxJ9GP7Ta+;3x(EJNʽs_F ^^~>h*5m26FIAȰGlo+:%5zB[-ymH~RO,X y+Q0\> bW?:Z-O,/gvr,aBpaXf}px| [aM]gߛ\ /No YIBcu/P8Yzc>uIO}J,hZN}v3T5ј дx}wNT+˚>ezsLVǿ{ Af8rJ5>Y.qs\|hd2FӘ%[@ -!6Y3\<;e{.y*}b$0Y(bPooњCAiddm\ ̬ ^Ƀ!XbbtSG~8u~y˄g.HfZxR;h&&{ &l mMH[LDoM$?; !hf%8,N?9F!ͼMg,#HE*Xt"jѯ'};BP[ "5Fgnhܣ$EvʉTA[Jm>VCݩV<%< l4у2.)ONvR/>ڝ^+ t4kԽUPpiS3+IUWnLT뷸͆ &biCMv3+kq8}$qR g{յv>v^TWLYrJ!Aj ߋrSQw,IBLK1ϵl -|Ke*Z"UBuUl[6qL22KZqxPOgmW7tjQ`i4xNЪ/K,TC O$r?hTA?.0FyԤKOGזHX۲i/ 3V0W 6.(|N3ue~H"~8KGBy:,5>Pli#&IY$٣,ա3-1Wk8%b` k.bϝ$&$NoY}t=l]9|Q01BT! ^AYRE,+1`%'a&H-vNiVskdS˔p88> }+{Qv>Df !voщ?ͧѱ˵[G eu.V| U0QIg]h#)?NIɋyTvf*CIF&lд˩L]_(6-4!;B|  6ܑS/ ]C$FI=klh{GנN'r&Y͜`K>N25:mSrvǜDqG;( PH,fN@Pk|KC-8q[%ǑEZc&WK|}ڽANjއgN3\J;8^-șw=oQ-A#s Lg*9@*HiE*Teч푽Dm?rfn}FC ' #ϣh>DS͊;B͗ʣA,;$X-E9ǽqs1Q (-e=7*XX^^ivܺ-Oc6?!M{n0uu-nd'E;B_XeEx@Jbsq4^ED5 @{Cy (ZyIM96"rDޞ9\v(@HW Xy:(y;a;}$WU8+AЎ≠2{}Dpk=Cyi'8iYBK³ԩM,s̹uQȎG-͉!J*yR?oNG{:۾*Q TF) Xߛ,^z~p*Qѻ,s!Jt˵S~Q"xlHۮO b)d{A{rşwx,13n4ԸveZ ?v 1gzAr ŷ$Ұh4يxF4xd{:a OqOVsRpct^ ݫS@d0p3)T#Rf2py/?^jHb_-zB p $ ɟjsHַ͇[reYޗEy k#mРmJg$VOr'v2'6!EbKElq}9u )E[lfz1jiGwA. 7˒L2Ќj *UHpEB;X*QXk`#[Gh߆9Bz$Z{Dwh Nۜ6WLr)(thY.ss"s^"DZ8j?aJbZ=,j:+=N{a*JQَ㵑զ缌h#0K7#?7 竣$:!h5VB-_/ 3dN9 <>W̶ePFskmoe]g҇RC!23r iW"HѓB: QUBڸɷ;PB7+fu,*aѡb3|-А.&jh.ltNư |B8PXF θ`6ˁݍ[\tM`8Yk~͸8@{‚h_A䮽'"l.'=(wd~Gtufس"hgčX)((/ H$ҶE83%T$ /T*8L1SEsی*VU؂-խ`?HgGNij¸_h_Im5u vZ'~>'owֱdzzkt" /}\g+h&,6wn[KGe4S*S`.k֋Ÿn%1Y/t7D=]x):ϕo* _j,e8=ȱWK).hڶI'Ku4\m)yC˕",?}Zyu?V1oEi ,ۃ%de&H'M5@N*KS>a,pƪ@ م#Lt M U;s Q|q%ᰭld3LBi*Tv-[X}bxUdzb8%|k]D蟂bCm]xlc2FF41dj[[M)@PEoW&f29)y0ŕW"c4iLP]ڧ.̍ƈ0)^X4l/+mλb]tos =$Ow G~r0nLƘ&j gǡSzO|7jv7:&^w .E! c-rzũ5lߪy7y1S8ij*_=R(c1Uj]}n/9brNZ*QA$y%s݇/7mMspu1mc(Koެ# ~Ζ !4;Sb 0 k4/oP)N>?"(ΙW-05 eEo%]Ѓ@bA:cQ_1EȳBjU#;ӰOXS:h:;Ju #3遉R1hy]B>w;o 7[rD[GlbuSZx8̼`wy/Qޜ ?NPK"קgu¡=֬h:mץr%&6+ff*YNd)U؎!$[@< {ōzDOm pr5wHBJOoԡUzEp|] C?qknK@GoWשXpaRUu %: Gp`DE(?1y4`u/jo,DB3/ȃ+>: z˨4c"/T  F &Bbu)umO\3u)~ .@ ul=#l1v]%l$WÖ aQ77B镮]JI2qhxD(:WZ~c8cY\na< $Y)AJGd0NgȻ`6oo;'FM6 ԲԳxLxh327!ui"M1J{Jˠ N:>`/~~ρm'Txܲ]Uz);`dcX_JMD *;R`Dlx* Pp<*j<ׄqr]IM0L/y4Nj;Ev`&\C"GbTtQŬ )UB*K0QҒ&3| Z츹HO&ې߈fKI u|(er݃Z /J;ƈ9; iv0y CVtVa.uT6)`q롡[b IgȋE|/T%'Ej+>8LQê=beZ‚b}0F*-X%ܫV} x ,?\A&hCҁ+g(m?^5:xlZh)D5Xmb3ӶȗON5TT(\ob*OȐMw_g{4JİwZ;z몉IJQp/mF/=ϑ6 vye^.GӾў2+#lE Vl +"+*Q{dn~(CEFM`(_aY`!h] 3Vh5M @07ͦq >[d5tuX}9{yyv!1evLxՌ%J˧iy If*ӋwO,q|SA|6Y֌X); <ʷ~̾u $$D״N۽o6?71PXE5r HML`q}3[ =WQ=z4V.VX%y1G%%' Euoڌ~d "[XXrEOp>ޙLˈRc6Beu~+|R&,,B: A9xx9T`Aw<#E_)ш@Yteh_[d* PYO1=!NDigS ]9w,^QZ? %qGA眍E(U5EaD\Y9mBa&AJiA÷M7^>`k'FWo (k4%5yuT՚6F9b]s!̺N*o= b4J*{J&A|i,p5}LTSv \*ATND1WBCqBj*zDMb F8wc+6S/ȧ5d~%v ^0o"XN6rИ x8O䘝P!Qb@MA^=*c(_FSp/ʨD8Tte?ۃu!҄%٧zBx_l>T*X1mۧ/7mP#[ aCV;$k_r$wO'G<,愡Dek&Mٖ fAYK $Kz*.Op1jvx`3mmgЂ%ihUpJ7$.bUlt YϦƣȧ\ 鷉HZ島V}h/[#cIԽʯn'"Ѥ$4z\dLzӜ"á2Bב@ ̈́l)}H'Ma77GQHƹ§- "Л?Q{H& قn, 0>M< VF+\v>'%`ʥzSa0"~6ry-ca$$;VWZk`BBb9G ո9=|SjctZ:E~+L=+jp/Icwv)A\e$gN{a̪54p刨Uӄ Žw_XU+Ik⛺OwBx;^2VUܟ%/e&ָ^@i\|m~ۑEU62 sֆTƭ-GLjBV ҶGJ]ǮֱlbFn]Yi+owITp9 ekGJt9^`߿&Dt†) 꺐NRp mr p"LpbdmJё:`C7kPdt;ʰVK2؏2!]>=*#dFt%^j&ǽɈ.KZkBO3B#^sl(ݮl |"V Y| \R<`z-sc.kdG.Q?cVsXla*5L mv֛]/̶f*{=xfCZL 0R݉!VkL+E1KcO\a5K vѼ8ҷw|6\qsYlg_>^QmnO9 kT~3f?r258% 0eKαU:$AzTr=2!OPazL0_aL{XxMrT\9MOvERCYv~IʀEC~TY6C&<04#9ZыAGq\A˨n|[!/XrѰ_y%2AD΃ 9WNcΦDJ˖DGwhMD:,?<.FF~`p{'ǟ:zwwόٕ` 11[QE1o aYdHK?N0!hd\'lTp4 ߉{ikCENh*zF0؜ѨҁCKxFno[/F`"8\ܔ-d۝/#'n(׭u#>EE$*oZ5*X(="04G?%?X̺GI>{VZk} iB#dt0+F3o'MYen !-fҾ+`ZA޼&FzN0wQK￲7t-K^`{5r_Mw,9W!Fԁ !nʱ Wb fe_^AMNvUh dNW^OеNbu(B7$׆IBe&VݾW6kV@նd6VWs̒b,3d1<;w?9ɖM䠰|s5ժ+1_}dRrXȖF_,ݞݓ@^Z1KLוWi-:\m]Yjee"Ұϰ ~ (=}:n))TjDE;2G:CT(1αǧHܲJ0MC_De=e؂;lF(;l =?ƛbK.ɓck?aBk::_yٺ2L,b="U:qd5 ӯrhaGV,TsAV Qӓ^@y[DՌc\g>8uckN?zRP:ƸRNPAʥfs])j"9F4V'm$$hcz[х'-ª]}_^ y 9U@=ShV-6xa/, э gi@ sEO&q67.w@5T)-} 7,9;Y?~FǞ~V^ܨSE&;oYk2D$^#A <}ITgP ԯ'Ay14M ڈ1Gk_Zչ=@׽W9(6Fv֒5b=B3=@wd,_Pծ1%.^#ϫxe}]YkG:Ds&7s5(]s+:ZE3}#eξ2ƾspֻEh#?MiQy_70D  s}YircopIlSJPa= ~%.k7:wd C^qsk[] <|~UJЯjKWCU{yԴFեޥ*Atm*{e5{(#;P bqkqg lT׫(UHӯiZI}MZz7~蟐_&,}Gk&vjjMY%oSL8Gr?Ġ#&Y3 %d)Nr ]qW҇g!]Gu'Z= -_Z\L v]Tc(s/=uNqR;aZ0hj):QTw I#i<ȹN61hEV@XT-3bЀ # Y]EgᖈI}"-|d>C,Wm bԶPLiP[ jApwnbl-aF1a#A֭r-^Eޡmܨnkc~񑂟#$F^ ƻKi"wkU3rUV3x`= w+M t%5Y{"ƒ70nY-mۗF8 ɽ\ 3ѶW^gFSgLnMa+lykj&&jC1[b},,cLJ>C2Du'D  r*VX|*HDzdH M|iN9؜)6~!dxjVTӮw*283f!6[sC_ dޏ|]z#y\+Q! p /(T :x6%߉LcdS @&w:Jٱ !ӡMB@S+u#z>s5o/d2{0(KTT:u2J,BLsS{ePR綯s/1!& M@Tė▀%\6  1a+h+xt)Y$vgk2[C:?;}~:$A{?,jױwq Tj^ }eSMv#S!"*R+ߚz%A`odEuyT:à v5@#}67;5>6#)f҃s#sLe2KZz_;S…frleռ2N 8?- N`lvpsW/mZg(0 rBz.ոAx9Z O3oO-]?;Md nr Qa\|T1^*|D2XJ*#u V~Loq1TZ:#zIFժwxϲkT|+wVΚZ?zG[KZ`ӠQ8dOQK0^j|iL%bC!H?ӲiÍ&%W.}4ClxwЦv=,N|ͼbᝓ\PҚ͝v;_RfW_+Q,"F?8G+O~a uy!tݤr/⡔ݢUm=;m0`,Jm 0C(P*堠cU uoT&:T4뀝X`.v֋(e o35k8^{]Ogj~*M`_=p@ћƍfE*"z])oN,Ӧ K׽{U>ªG(&<,,U:!y]^GC:ֹ7#`M"om8Yӆ # }JD]2-s<ؘ5"0gt/3"ܡTX^>#ɩ'!^{m[Pॿ~i+GJ\RBJY BQ]VMw %ނިbeZm8ASES3cܵUst@3ֽHfeCaDf 1f-Wwhp͋h 8A^T=LufW߆4ZSE 0"~3h \)x"&mn8zHa7s/i(;pߴDLDC0uO[6ćz$$ZXăp"p'Xxc( dp~-`Z?dX>s"TyMf`6>m# [$(1<|~"N"OY0 'c^2R4}H}WNz#C[@"k]?#t1YFi] xΡX#kAR(Ӣ&C !|sE?}]\ x N]Kb?dAdX-wFX/wKqw;3YQIz "rCnMKdB2`nɧUZ!7^OpvjvJǧ:DpiT#XU>v4JOz;2~2V܆O:Sn P-- T3qޏ~bʁ+PE D*Jc d =H͕ڪE ase<*ѷV+D֎٫f;|'_c:W]rjBmQz Nn .T( \q̿֫[M|j}`Z}: թ7w Il@غA9ͣJ8):,A';\ub'q)>XZiBdK'#Cx&>9KNs\Qp-J,{vc՟YSR%zY^`zeHne>r#-LDfPi;)T`oBR4DY;B˸|nɒc9i+dN1SFCz *P_Biu,r{_&;]_de}}A MgJủk[<%V;_ֈފ}YI?T-fsZ1jS ^›F[guѐi8Ѹ{@-&W@42 \uʗlVq]IM`-Htݳ2 4~El6==}SJo vzFsO0ҥjr1"|3>47E)>cQ {Upt#Z ;4]mC9B#Bh3I)42(eN*r](}Bv7LCHd(NqG@UL\?hvD̒Ubeal>17w/8ˆ-:R$Sh'qLMs= ͐K Re\ӿ*(`)lYh΢obg/5)m 9M>?;KtZƪUZ/8*EO 4wLER@Y>~r `_MgFߴ0͝.q.]yIhfl~^f rA2 T%5 yjecz*8D`WaTt+3:Zv%5di= QK.yN$6 J!UKMv>?6KaSfK&ܤxضvܯmrrAbȢCx?ZZy(K r>O5,}OS`@cR؋9xCSqE?qק$Oh+{}R"5ovQУ" ϦCUD#B( |H~sTHI*aJB3Pwi9E c$Z Vu5߸rL0lZ@8oM9+rߕA^\!\\)CZ+EY Ntu@9UeZ pˇxH8@SpH/3xW ZiUi؀l_(]/H+BxK̳Jq5fť EwF5Ls%HcuxLKRdàNٲN/:AfE|!b.&6Gdgj@q&qn]rie]vkxI?IA=8& /PM,\}3>&QS3dA,B1aC6:Z2,}͵v]=-H򡤐"Xt$67 Kwg~\\|~V丩h ʉfB'LBKԇHx?F?$f"=x:cIb~A/gq0xw?o~~-n7D0T:tARCT?<6cV7@ M-|3# ~Q_HÃ936dYs0?'B0GIuJ=^ L MD'zWZ_)L¥) C tgo> "tj3G9YWF˽f9e\CmS( \OQsA]I#̻I;35LZӤw79P%Axˇ9kgٵo*BVڀ-f1&FRnti}PiⲦn,8-..c>}7HE(uMJF,qPV" dPƛ]Q}Baa%GDFzm/ofhr;Of|Ji6=Nvm،=Q) ΌY>[IUZk0/aY10HV^4M8Net Ybq!3k af:hf[In/: t kYA1=^PZ[g`gVs) c"87Džx7pWiICV.ҞzRuLXBlEd`IEfp4{f#Û^P%>?h{ Ie WF+~uI8&`j}, vIw;&!E J1y5'x GxP4 1 Hmq%64wý"ߌ ?Jb_vy!WfXLnWRf܂=0ixb 7ꉕ:p(4l]<(Izy_{5Ed XxwI ~V?*".#΂UFK;4XB+aeGU-i}0ן%#@aKV֏C#>Bhij"ۈ]LD4.݆ov:BGqNީ(1a<G%K7' t6|5khZ#bBg|G+bLV3ئM "`d6&H גB r@bjI ) PNh{mʹb2(Q1r)Un>_\2ͅ= V6 u97NgE<"Q'oCl|#hx.+ֽ,tnқ\9nNl\PK4}~1kx0PJTsW?Cu$saJf`MF18٢᫬]vsZ*6柃%?WkDqW򱇱AeRSId~p}scb2 X6>M\Q|ajRqk>/ ctln' Kyo%/"k%վ~-5:`e/\^m3fg"N)|eġXnBz8.t6ICEMt/4?wwVhi$eޮӑ{oX!l>fjGG1>4kIdhal.%De=)5RЂH7Jڹbxts]%7j@fnW^rb(^jExe,- x NACx;g7:Xͣ0*+o p(Qd5ђRZ 7%#SwMӱ. JKY)Ŵnǟv2vB 1MO Eޥ˩d^P4|t'-P2ٸR<H0M> e;=>B|j'jkCPG*Nx; Pw,u̪[i[4kF}c817Xm-R=RNCm&q324)ul%Kྯ6Tj 4LWV{2()]hj|wt)pIˢw8N?sĀ2" y|&ld:2#S3u 2losi)*ܳSlriU˽t>8j ç<ַM` y1 ~85O\F~ ~JC"j_;…mNz~%_5/7 iG8C ,Nދ>"%IGttN'_U_SM \Xƪ3yf-I ˧}V!\܋z)=Ջx&b"MIM%%sS?B::W:)@=red 20mbZd2e0S.<πp(@E2A̤Rz QtKbYqmr3㞝6Lc'08p|ۥh- 鮢{#Sg=maoeiW}sZe=C@^z ߨ :t[I4>y%{veE!4ܴp}n2)ʷ[d49 z (~SۄZq!?# n1 vjpo" Zs,ﶨb^>ijxUҦ"ߋWQBLoMVYAq#XZɗ3oHE18O'Xf V)!NI=m.}0sخH߲(eo]f~Ր'3[O?!Z_Rk;) AH٧h%KuG6޼#8ȧe&'9ܼSx83:@pšz"Ԏ[A_"kyzV`h}APQs-'ssbZ$:0Fp>61ޱ !k>}nĸ0zPC;aٍ3~ f7R[UroPb\Q-v1::aUlik%# j~ J~9a52 \MsBǬ{^^v*azH|:V#(3n α9Ty%ɑO=hb @-V2 ߯}^b5o;lSg.g% Y!\4ב#xpHPfLJU2ƆfƆC^ͅ"Do0$-B9Rs(J L aq'IK-+ dD7 cha^kED)9m^yX.i޳d{u8[3-B2T3dfV` q>d]BlI1O+,'`=]/?z5CdW$P!}Y,}ܽRpvo YU+H2ai!h ' mۺ~20cj3cԘ:o|#_NtIbǔRuW ZXLN*g'ft PqR]1geV{GhhKt`:%>Q176 ' J}:75GGTMDRɓ|kfN"s6Wάf=Q^1Ğ/LѢ}z7pԡU["*fTmBi#Z YtjPrɱcŦd_ܯu%a I3B?N ë#B2塂JTS^멞\<{7Ubjޡ]NHtQ0f<9l6D -.Bn!Kv=Vs,g>L֝.MU\Z2-#IMWsa jPTv_;$m%5IW}E}S4+7*c&'}}`IMg]zC@+r^yk9 qo䝾kqͲZ/E?'w<9R/72+0|0s=)ZK ¦cxy$_(sH׎;Od9]x͞ж/h0NxP1O Yj /qZ7y(h`Z/kdӱf.~Ӄ ar.^zFnGg{Jti.:pq'~Cjʋ] 7OwKޚȪ/|5}E]Sj&)j"gxnUъ/27(_GoP\(r f4qrUw#נ%_-y;V kFqSGZ/~3E(9JҟE^Q@E;es {zvLcF2!kdT*)ww*ѽ1fsyߠYF 4NxT/=V.g`h#[[ utQXuU#QJpuؓ^Vkh-W23tGE"+W,wY`zʝKg VMJ'd^~dpԹRPazi-j:$(/^݃H8ZaKM IEjɠ_`r]n#uׅ%t4!MiM}znzsBEq]`7ܗQdn*]Ay3-b\?DҢ.lm•F :;Zdp3_axzGj =JpqiY]e MfBVf^^EqT0 3e''e G>@Q4rznh|Đ:֟uqس[x,^k{P#pi&g~@)uMo/m'owOa乹{k[n{yLs@&A.vUçLSGػY;IۈiTm12 f^̍KiU) 7%m*?x|Oe y} ۄ\&˰8|ԤvL!~Wu'S'i3q^r'|OBȠ$6 Yۅ[0eJȷ?f3DWa8dzҶlP!l_G^z] )ȥ wA!N֐CUu%( @Š+gpqCb/*8$B6;cԸeAl~OB[^ LT q5%lՅ'9lƇ-@2RƓPZ'D~B0O[91CB,UL9P+QФ0#c;)Q}5:`&gJ,DlnkP>(tKi y>6ym<6U5-S_Y"|, t,K;?@w`EY#3AbV;]) g}H7q_:F8`{b{TIܩSpFvg'>۠Y9͛˹>.(D ( ]Wx;os*}G7IVkAI]Ŀ(A ҄i8ȩ5qfw98PCSlE'&7pT@& 9H3"z r*e67Xjj9]u|Z#_~p;{s,W lW#_J؁t;ڿʰ8p跢}^a\) ^x@hd%W7ȿi8o?"'wZ[%U*0VQ:XƧ\}yV.y5ba}J6+pS(bvA /KjJ- L5&{3NC}'9'an)/5.\b7!'U&'(D/2 e.[v(:?mb⢵},2^4dE84"QzN; i}y=JxpH,=P93U*k,Sb6:%ڨoD{5v*'&TUz‰zhd>)WJ%F`ń%L"8Xt?|&߉b-^zWOńYn~$b|/086 "M87{[\f r Bu>zNCPCf;F )΁SôtA vބAmu7iw~T_?:v+B.7YN0BuS΍QW gO!sK.4:L)cc`$%$ˍ$v3̊B-FE~8Ol*vDh4Em\9TV9iF T!UvǬ.]~Gl%bS[1R!j*Ę|^f8` VS@zN7YVԬ"kS f2.SVU4.qZHS);+8I֑n]ߋD4<Ѐ4όAڐj9HA7V([Zg[ %`L#ڡ]]8ŷሡSS~C’0 <2Jš{U63 YrpHedj@sTg(xQEtC9E Bn`+$8Ua٩@HRD@c$}^@P@/7ȼ&MB{ -ē'Ś"ib*@lF#Ǵ"PwдHR =O6څ" 0`x>0C3Z-X֛RsCʁ?$1qON$p:I-c4p#bt1cMt(NE#tfz$[1-1/D"-#:\9Br\W`KI=A 4^7x>kzX;?! *j%Κem*-P$\R,|L#m݈|9P*3੪@f^k< &_]ji8*0'z=* Rzn`/ 0hZY zٱTSBm9 uX_[Si(|i ?'z!(֔ÛŽt e2ײ 2TL){<(0-9o &@Yڛe-+,ZFnnaPeb=3/YӖlDPaBrPr\MJ#ύs^-Z>nS4 !b3'4TxD\pmC7:px6w ;d<'^B8<1XyuuZ}IzB&:)+,?<9W(4,oJamFR08C%=bf+w ¦rBɬm -L5N4uz:SX4?s~#ȝ*V~5/m=!.s4C>rO, L(<4b:ȧN*"T7;Oݜ~Jݻ]5E3\ײ:mbGMEпzc.'KNƓ;CKUhQ]w#82#{iq(͉VL=K&3f`FkgD>) '9uJ3ɋH";BuҎۑbލ0A;<ZFdg8JgzÏ$ʿ mWg$icu~Spok.!={Qg.n#xAJHHκ\ʂMm)4M<(u%ͰTw{)^TRLdk&M#B%R=lS! g>WU-{fJTTm/8Kb2y %zH3u.XUD7vdZvL f(*z?fgo{\g ~ H5 $< c|hQlR.(nP޹{[ꤷ,bioǩ'!$H"/HJf6BNT`Ntrn H3dP:l2)$f;gy;(ͤtPM NpPE 'upU}$gt4IyV=@"q6~}gߪ*oh_o{,]X>ӮbΠ 6ݤ"Tx+B:# SX nf4%"{l)}B~#V#FW@ÎK@tx d_4D!L#5|R -[ksr2Pǰn(Q,uFꐰ4c`^(/RsC=TJkMm(FVDx ё[WU9ӊTh,쯾K̨ 6 ǝ)RoH9@Žxwփڨ+aԉpR9}F`fxm&}ך` `mY!vql#oL8@o?yh50 8o`ȮRB^cODOvǔ4b %4,ܕC͡'_ lO@)n"Q2Y!}[iB Qt-F`׌Mn`Pe!ЪjvyBD /Yj' MTt"s2f|`0Xt @+=HHQ@[ÕH.XfD˽CǤ 5g WYp=8|ɷpeZYO@^j *L T$q%˪dRq[X,~5%e/V&V;e6T[͍|rֹ-feʫH-NE0 D}. +0(IhG;l,w3jL^9\p,s8[^xEy $(]w1.٠)CJ:oiť٩ז#=:!qc\ԲC>̾rxfgaDۚɯq{[ꋳt]Vm*ZPܵ9J<&jѤH tqΚWOnZNB'5M}*M Sna,䚳TT(a%+P @,@NAgOstyGbXMa e>9j1 F)": xcܫtT@LЋtJ_(\OOIJ2)D8a ZCєrؗQɘf=Pin *]"5#iq z'oi㸉hwJh?T@XBi+!hSRT3ĥXڞ_ ( 5uSjG#˯R% -%6c#4ޚ78^:Jd b쮍ƀoo7P=O9:xGWBM 0.;%K;O Mb,.dU8mVN8I pekWSUϒ{$ќ4b:q &P sqo͋[guNo|dT:Y7:^56w,͗'U~y Ωrr\Tk{yBOyѪN-g-6TX_ގj,b{HډQ*?cJeg.+p~bM}l4j<uefgHF|^`Kw_gT\P\xcNkF8cEozyl3CU9tډ+/k̓iDkBj%LgfV/ع0.zih^k<-T $HN9YcZtިWUj쌙SubEke(g}٠KtLZ gv4IX@#nc Q%VVԨ ×Ft난_OlD#V<Pf ;@Z0{Zq[*<(='#-3 @1S+dehR09$fᾝ&&ؚ6M?B`Nǒ?a/85"܎QV|zA#cެ6gdݨ2ka~>OPD) Q]riJE#D(Q?FDb+Azc/*E"7>7^lʅ CȽ[Hn0s[cf!&¥?V\ NFr=H JF: e,!*)OUanMMV@JY}\ߒBVL125ݡtYpH2;C۪Aވ=Jpu=d13 O Bl;tF d'Vea:AUCWPw ;MOFֻ[u'k9n>v1~a'@>tֵo pnywN5鏇ky-PP^bZ~hϱSguJii ,Io,;_x沕fkѦM3 ;$ӬdxlJu!HOSZ 7e 1vg\t&jOD_d/:9lhD a`Ujz~;+ԥT(e 3e!`.]faEvh?x vYxe!xŒ"yx)o6ۏo9 kt~N?P̏HjqjJɱi5݂PeKZ|̚=ـ9УEeM3L u4['TVaB|eP#\l Aj;##VP;i:loɶ-([?Ԁw*XUeA OCn&s.B<3uD&B=GlUT`LIGOߌ9/ڇ!ہT.Z# |+57;ӿ Qh*f3vk)zDQO ق6'X~H~;lI}SBDp6-y6FmxGt8MU$m%(\3*`EɨȠ'N %&Fr%sKp]Jj:J7G3܁3G\|2ER8 Cu.Nft6NmncûpS wJnwAW yt 2]t-mtV?HwkQҥX5Xʨ]M!ݫKZKFeGřP5 jFyiLɅ(7٥$'W0GM5|[#>m'շ5d'>A rPsD(ls'=ŏvyCWtwE ai1itsѦo/ڂ }T.VZ}Bn?B6϶Knٷ ?P_w(ypz` J`H&N"^,J( boFCtAȇ+ ~W@:!h1.-HrYr"ހʇ][pMeq *[KTP99+]O_^0cGrf2(IdzK Ⱥm6[U"d,{50q_ljNE")S#YmN\$eGGһg.=#Xr1F9Xx{;_kqO8^[*2cP- El6YTqRƀj(!~,A]\0Xn7V =8A>)!O@Ac'2zY]# l0 XAmULGl?nZ#XT xdWe]ϳ*5E$ Ts&q/cWORKܦhʔK2hO|bF%? @ui#ݞV8nX,yAc <]x%2]Y-FHj%uY4 vH []o4_"y83 `f4"lׂ WܬiHÇkD0gHɲr֣XόAX͋ZxӒd\Y]jF.Yt>5*X/eOvݵt`2&B9(P"'!o0. goxVOjL [=햙 QgufIx.埢މ!aWQn|̡+%@KzvO?3l8gh2 'uS 5NeںW*}iʣj9 Zڋ,By@d$\g`[7)lBܬ{SG\ >0:45[zbzA>, #(u05uઁMR!-ēA586,DxRPZoEیP `hg5N%Lhf7³Qh#R:UެUW6d RT~6*.9Ԫc/ g W,kx잃u4zOyd$_JN_H<*%$a9na.ώ 7o/;Ui!nytTTa&ʅn,E2?sf3h@M^F]cn0Տ\_B;7MQ;K˾E 7)e{Ǣ(%`6!눫j<%N`x;j(& ?CǍ"wkXDZi^R໚p(5}C<> 5媷Igw:7]# Qt5p7ȡZ#sbJ!Os{I/c'0P( ,L?! M^D'؉_OSsi Q 9vz{KKs>IIXd/]~4UGgnm෼%W[SU,?lcek_VW|CMsѷRQ?=Zd^Mfוh5v60wTDE7'PC^`!RV)<:U Drlg3s_I޵ . $;"];BZAD#4dE!( Rj' I69 6&+EU]A'lMG#D*MVWoSmG9S™Id:Qċ {S̘40_\8ZxS΁Ju ]M켣;=C"ЮȦ.˂ۖЀ`KoN[Kw\/l B)u1GaP8BCr}cqj*R35 R'}i}x˚W.^ʥ5ki`bD~^ ]>(g|%N/%;$y;.@)K{2󫰡NeP=ZM,QAW>K:[WQ߽6eC+Q)c\#:]~ :i9f= ȣkK!.~%Nwᦌ;']%r#yAHrD,WہG7\A؛u5F^5c'»49UqGz]먗]qY\t WEEc')*Q&pTH'Ktt㪵{=BxQFWxVHOm8PrQ9(^5@FL '6Rt~~V^teۿb'5}c[%8u%ωӢ8]az:WGPF]|ot=cJ ]v]ó!5>XVk镺kbuڹ#M #.բտW^+膞~wE؊s a%O8xN֟({HpBa·x,pƟ)h lE;]50AoQyԟ{7v!o?V_aps'H=mri(VxB-*sW˂h 4MfW'^5Mv:ZB9-\ˢR|ax |oK ꡔI~aR9H Jo>֝Ԏr'SuLh/Xaqխa|%\Yqy C*T=Q6yS[Q9Soq?a]}BјtVN~b| k>zn-D M-GMro9+e֨9PGkR+ΦDḆ;J{7Vװ>Y޵Ћvx2ͩRu96GxEq$h0];@g'ވ+g2EäzK0ɒe{ڍxӅ.ήIwЭbr8AR=$#P"z4j%E%nX rSJ~v1h2!ij7yn l6קSǒvcn5:+<աHz4Pq܆"pEN &R*i`Pmz]p5 *|t_j^ۊB+ bZ;$\λΕU p|9-GXŚ"/S~ɯFY[&f*(mgn;UfAtuʹ'dUfTʙ, СOW 2KvCC(XS3tJW M__{?.,9  ,!omүOn><^<-Z(kXG4TA5p,yاoa!xPS[^~aP)zs"ZLάqa4ke5_CfAuĹ?pǐΖ}EͰ,lA$wEE30 CUS\˵AK' ? Y Á}2;"8((D;aիL56b fw2\ PQWu)`gu]>Dq@;v>5gZXdMRNa A2 b&kU ٩BŹ}]8D[FqWE sR5sw~Nu܄Hl"./FfPL]iIxOY̚lMP}/KO"V@gv<WuLC@Uc1dߑEq#iZcstF, [#p|̥jP&GN7Blӗ^7NuAsEW:8-cB 'u0:3#M?3/W}^=}e%gQs AR!-MD$aW iƂǧ?S, hlu۞ $$OmK[s"m,47;ڭkkr` .Il(g0?`<[.7&,4gڱd:vҗ* @A+mmR5@.Us ޅ+ QmHHYkaMAfwPʨ.$FͷqJt@gd"7-O$I]y4:\#jo윔oH P3zLtbD\օQUo)S.s7o.=xUL8 Cv \񑗠`T!/#O%s^Pa̴ 6*PYg-0Јꛗ]:,~CE E4בcPyX k56f]DYN"suE]t#?5<[yP<ޡ #ot`Ȫ!\ךeP;|AC*H~ 1wA:0+BWf\1PLHV`Uf}*,AK~)IÎIW:^wYS&J5%t l'<,62{ޕ4izfW3&yt= k_:LvXdfT=FXT޳]0^FWg8\Iݱ ;sv`)#YE>وʼnUFb\`D%JYೀ}bUsWͼV!0o(lu} 4*)MyQyPg!"K_Xcf܄O:J4!E l\)`&;>~I;|FHSU9}.Boiن84Ha!Ajȅ.y﨣NJ=M"h ;GumKa!c'}J_ބ sgVe[JL>=XlMs71zqM jdn 5c=)=;w6r֎4 csl> pW6QF8aRqHT#?8+;WK[-cR 2[S*\Jl_K3"T"E c1!LQ ƖbPfox9%|;UifkZز}wTI[ IA9q= vme7{01H!Sʲ>/5d i(Mxdl0~}zy iF>ږM%QN:(JfEk {t_'[ڵctuLlRB%UKXe95f -E"ȏ[6|Ir UHK}=b#=|J%NBKz\3_-4 }kGK!yBpBw*-^"` X[lZ+dS4{EthkMs)OcJQмDf8 <2}* Sq5E]OM@3"DۄY%)ϐilN›z8j 4{kGgUlk魺(`mk )'xkB/":_? rɦh* oQsƬz敾.*Թ?e!HU6\dI8E}`# 3R'R]sI[QyXf4u^uZ/oc9Ya4/zVDI7V+ahIJ ~KZo}U_.Dl4?P 7:7i ߗo H]Jl\j'm#WU3Q?.%Nډcڍ-@j׺xXj_&)w%V89r V xlN-EVT;RxFE?m/H?$~ܮwA|7bk2n3'"ibc2,[ݥqH{W`j&0!$nbܟ&^v*jśmq U- ԒaâD3)P1$,cK"gc£룱)o [n1Kb1eai2 k)2< PW;!wB[1uGX#agz4h^#ڦuInT* JGwMШ"7$0m0F%H^F :vV6{nΖoA 8>h04 <1WMdܻ£ϭxZP75Mi=ջ!fex0ؼE((p؊V0J)fR%4 IԆ5;0AI,9wIqi#3Oݰ&sMI%g+ʏGa\ wM0%T+$@Ž 21$as&"p)Dwiŝz+ |Z?I(<$e>i+(Y^>+FErYSΏK u 3DCG! šM^_M*5<H*gkn(ELٵ !HsB`D7d=>I^+ys/=o6¨BJcW9k֘h=Nj2\.[Ȏp8p>rB=.蜙s)FASIXΌ;%kz僎RHV1)fH9$rx DiJVv̶9=-KxS _ TI*IY%&>6Fc[{*Ssw+Ŷ:OSgizoO݂wB!E4_19 XhCB1  gA{Du=AFt^DA ]h>|?LUX>wEypIL;>Gph{c35h)L CqI@'8<"3ӓ RO W{WoYr~r*o(r<6ܟ!-RBc[GjeAaI lObC.qtG^_ zeT0j;1cYYMz׶_ͶA*x!!y7V !VnxJkTkG0!Uᖸ>[h焺@ Qׇ5L"Dy}#Aiٱ);f/h(갈'b$Q^{!J,iy5]mb׺_Lu\&+)m٪nhZPdZhBHN_WGvy`~:g E,' K#'d&$Ђ&vI.YͶ/)/Ca~_mݰ[`g#2++a?NZ]>6uk|@p 0:JAR߾~TbeL ȚO)\﵇!a 1Y5 +8-͠k@b7TpP\7P>_q6 P{֡|g_&k,g^dՇڗlu4y9)⇞*}Po˂#՝ԯ/0KuM-d"fBzm`dcb(am$ebƜ쨵U^o!Ȯ<8ki:[8ͦ1{4ie+O8tG溛0}0p[ħ J|1 MH=x~QQƣ;c2|w$/H=gC ϋ?ہchUQrAB81oW|'Z?A#2BxW RzAO҈7Hn6-]vgn|=zU ;d5Ppk1z!8УB/n8#ՕN^q1Zn"r yM}d3|]\L' <픽l}'R6x.Xj}EF* *Hpb㭗.b_%4_VFnj4VKKu}ϑ!_fvEB1@j)k*k<…ZZ JX~F١6O`hP f{∲roz2|A ~D֍g_ˡP2޷r,a{E5ʱspZA9btTdV_:$./.n!by!ߦ!)g`'(,VDgDS߁\3zU:th܎A!$<;R+]E,,!Czuo~O-Nʀ[^LM?+hsO:6 q/7;A֒4]̰2@".nV*~ݥj/nyFbfvW¿ӑbm0%;bH&8MZ,&_G]O. *sIbltBIbԛ_؃ɏ ZGtVt*2NGشe>2Qk}ŠRVzc9rtfDoLùg:Tqtk {ws{M竄/WLYq73 =!8TL3S,N=gz2$lLy='!_%((^6yo UFcBQ3RgoNj] oJO1' t,${<8Ӫi?EWSm byXYM9weiRBOI o Hu$Ÿa^7TyĹls+ ;,s63J/dzsz/0\%{[;n;4,i?0J=M w1(o{ $߷kzOYaR-,Ic_+]0Y* 7^Qp^3v9cR*)f 3BtĢeBF&H7N\U%AS]3.õjA{.J4Qb:x F͹-iyc#u|}o=5uʱjKuunrʣ3/6[gV8wQ_ODŽ{y3vA""ѯ^zcZ.^ɤFO H(Y۱("f Tg^w>wHPn N@.ͮX,BXǴ@? A^/wrKm4pQ uj(~qsww$z<0XXE[=Vhmp:_*(A]ɠg}+ >\ea"}B\'n/G! eB d aSEU؋cu#|Fnݴ p0/ uܰ3ZgfDa|FJ]gسRo$Wu%+ Q&~ڱ W(4콸W KK-{pa`olM]~񒥉y]j:(G=/Y,r:U/Ȗ$b*e]>)h+T:o{tTրrkޢ^:KEQ%SH5z~PW >w>PX7}2ľeu#'/\IXe/9"jI\0SZSۋ|Sz#zr6:#CZ,j?N/gRG1I? BO}(y^F7J羢&[zOqPʲGGows!H+YiP #zd.5;-S6YgS{%"dJZ(ΞtP-[o21 #&9jYtc sGTjI;@_|[uŁ"|(k9qƱ-IL,́g$XS@ɣ1\;i9kvN&$XaO\DI3-jrTfc/22ow'h0}z[HǗ!JX d=Q ANs'>S #mq2xvQzPu2˱[ p{| qc>A}z(H}g5M:}7~\9#ON\k% io؊S[kW Y.GLV[UK"փbrp|kԡ6s3/gҦOTdTlk1)ƻ Y+⢈zA++e8(k/y-~~! >L*,+1x0Q}шC8%!6έM(""#:]:G6$\lyb 7|2%!{``M<n2"J]f E c,VdM&2_:c~f_`.G5__34lpٓ=!P3B83~,AHa^¹9-_^޹b2l󡭊iEN ?Nϧ{i /n<9 7>NF*M39vi̮X_/@krD#qT^^DV|̺GYхDI=N}mQۄҏ쮁*3v~.AQ C;\i-u8hH c4a@=ݨzV;f! QC6yl*qQ15Na?,&NgB)oLͪTnU &1[A-3u&fiN1ؙwܑ4z=!Lx(F62Rz$W+mk.͊O֨=ke~/,Gj` (xR;9796L4X-a"63/݁l"l$._Y,Q5RUfsI9E.BLMDGp%E_, wjOi5Džق}?L Z3w܊>LYz-"h1,a;>݊!i9mr̆pIwz]0w&U_ nS-5oܳZֽ.[0\8Itؠ?/؄}Y-m^IcYa+t2Ce =4>(N/gKj.\*Ӥs#A[)X\ޝxBHVE I0sUV6u(yl|SGw>yjq]3m_ڛQ`an+5W# Ÿ YFgIS.$$ѫS ))h)~>z ™ ۊ{V^*\`)/jWEm& Zr3n R7]YMX߿vjtp䉅 yݳw[,e%\Kz0C?a&K- k=ce+Q'Ċ Hb,:|%]I}F6X>`6qRS?Ԃ}KY5Yޥ&S.oY[2h"%)g?{Ԣdݫ{KGsu#J']ܟ8Gu"0O/ԟ3SBpx2hdpͮ+&5*qs\\|/V(d=QYIh̖}tÉsvͫ{dƌ/%?=@WJ@$栉@J'na 4M+C3b;!OegAƔQ9.NF,! tO"#'205F:@gH{R0R%z`%R`H[kϙ-B`:ʼ !Ɵkx8m0Fle2^.k6V_f << XDyzʵǙڅ5';Щ-4+fi#>\SF͸ůṅP fp'tK5TцuZBsۓqmAkyFc{x^?JjB~6O,K.cfXotX^(^S$ڇEFn%1_Lcæ~ ,C9@3+0b7:iw*1{٘P$u+#0%dKb:Ǩ/O9q{3=3,b 2t:lwhqƲ$7_l蹃V8l?/t, i=R^ɯn`+z /Hܯ  )IpBUL).aRK%:XypS| u;MSu kc*hKƯIg;h߾>i/A供o#\)dluWuQEh}Cj[wpfJ_,>u%Lտc/DpT5!mQ!T"rć1fѠX@ *UcG&Q1{| b\\P3*zrDngp|0Ȳy0ۇz. Nzl%X^UyT9%իX͹+-a+ _L \rweK*0 []sd*UP+7G_k.*O k` H͛܈}MY3Sv.H._8f b3J/kxP ,s3v\٣C5; 2EnKԫǿEn|8Kٽ`)eULqz|= f?n*FMa,ۚ,"HT7g7}$vExv©l~" 'U3k Ѡ>8k-K!OԷnBv+ z!IoX?Je1f{"cirayWLSE8Dqו6ޱ#evǼե=Pϲh$C]ڊJ OGI]9/+JQ>WnX ى3`.iH@Ӥ5ycP0-+ |6=>f1~RyYhɰT;+%9kbu8gڮ4" -66rnb!*GVY!\F(?aWNwad :2̞e"+E4!= -{4̝+ZF T92&gg=V/J: ;Gl":n_E쾵~N elx)p3?,6ݰm\UɈy?>Uq|kuś5lt<OMAK776 {9bW/8xRV*'@YNi ~)pb|uqQN֨bg zyu:4 Cʷ)Gg V Y$H3\sÌ+ jK0e;OEG^!^'d 5j.Zlx@0`p[s7Ĵdy;KC ;F%7Q&N>'2t=Fx 1gQ[,&phR U.2!y2[XvUw Z)&m(vi L)seWXζΎ DM7ΒiKV6V)35"|HAYQ_'uDyu\yFcHߐ4wpqqؼ/m|-YvD_X)-D̮*_?;' PSHNb`Ad̉ 1ɢcpsOIRdTt,7Xͪ&F < d6zFDeA-`7l8=]3䲂Zk[.JIzj)a|Y}[ZK/~F^jRF BbIB6SI21xgU=G)Rjƨy30; D)KۍtFBJ!-*o]\:Pu`T .ceI'EH4Յ w*[K6zN =2"ZorF&g60䨒,oye 2=) ԭT0%:.!Dka#hYPrO6 5|K|x]y:И;hEk̙͟osa w9sSU4'~ _f^w7!ɤob;"?P!zò7<hoB21.ם5MutWI y"L3 C=gIcE4ZI|ok~ 8oyTLtv04uV"GK&u)4zi[RRrx}!*bb)iq+(aoNF\2P㤴1CӢÁJ8.j@P,1xш42r aϑ 0BJMNh|i‰D`7d)Ŀ5 GEZ-[ ~6ۏ4谫 &ұKĀq8%]O>Cɦ 59V'^|.r $uIa_m*zva[oTp=PBsbT-,NmocEF5yf> be-RG<B>_a9ų{zݥfV_نS]kԓ4::sb.9Pi^ETO|9 lLo c I=h6P |tSF+PS5kQ.Q N1;5?%] H0\M \ganDF鎿Y4j6qI&(VQ%'IR{J5 a{ ]A7sÙfuz5 Mݠ͂4[o>JGd!l.() ~KJV)?dw05Ŏ$o'A)g`-U O58tY# ~!0V6`;Wyϲyj CN;I,D.;FU+P"g/ZʌYn?eZs3?n:.gz@I5'T<8\Ak: j`ŷkɴmCjmɸp i?䈬Fs4L(oJ 6cF<mg&Hۇq$$JԜhObز?b #*1n~_gXaos0RCd#bL3'P\ |.;g(5eKU:sXʣ;Ёx߃T}NA6Ѹ]:rMX~t&sJl D6"Ȭp[XZ:% qPhW08z8>i:yP{v}RS ]dSȝ8 [tafZA<0"i>EgѮ=$iFϱ.Ȅkuǩ#3\4 Z0t|l}V'GҎbl–A/'\k%g޾LZh_*߼vEzJyR@AFxZ1|/_57W*`0ksͧwM R0{yH%`_b# kƚ_МGZ=@D!{.Zm·%?,R#؉*4b悤W=Ւ<4䇒I|yp;ՐpE5Q $x,(NiķuoWݢ͍O'G'T:ȪCrZ.amǑu}=q:'W;ԁ㋔\LrdߢM J\JtgVBϯEqx6b⊑!<C%t;3BȻD_ZEasTIi-Ke:$rÃ.Q~ETuuko+u!Ȕ]LD;!A5 {ėPXzDzg.#q>SYOSTuҔI ;lV\cVR*{գ tfJ܇n֌k?3*E/6%CK$ "qsCG V=}KY^3{u<^K;{ 7eO vS=|`ҭA|<9uo,{_l2FQ!N\?^GA:m-u4 v2ΡWMK1ޘVS$hm 'y? |3+5V#2Fxdk~L,̑6_yvD;ߜtG$w.Bp`٨ {~2ˉQ,s!\ͥm Uw-)/sK!6o$wD@3!!/uJ/ș`a#yo`}ّI,񆲁=ft\u s RÀ!+4N?NB\ W\.7Fn099ǡcAll=mY?Q rc$?.oEx})bIa%-AJOZqs_jM/p]ąX9ÞT\rTqk,3*U8Pέ=xwEZD(N5f@ z`zc4w|.JOG{.O |69Ά-u-mQG?H:PmkU-G[ߦ`?mOMt $7* fÈe?`/^vs)BC(qW2o#Z:,[%Wވ9踼z]g\VNOg{+MdSU%T D 4qt3FlQ~lNA{4`-MlEM1Y]xok\!@(u[lyb@Y]μBدmƋbKKqqG'r |Ҳ %6r1 $_=_m3l-BUY:ǺLH0(Zm_*t3K0y^_2t @1>;k!G![`t4tFtXVD[=d$섦YA2 b`؏p !}J ? y3;i^6!cIR>m "zmQե;ImyDeGu~\~.xkbL{rdO HUMJ=rI֐½8Q#Ь1n%,<`^4$/nbBjewޣ7&<_dRvl{kh&1L^(vl\͎-:$Vi콓E90\G;:s$:pLFx P{j GiFc͟_S-F۷V$AJL:\錯*Ըdd`2]wԋ~ثȪIIP3ĴHLG${Kտ+;ֶeG*t*+Z{Tw.PU ;YYc"dD c3r{|šzu]k5M~uvRڙ=?֬S"DVՊE"qMpqDXSY:gG:&o#n` Th+\^1%{-܂?}~^j jWϘ_m!Q; (ms-@d}/Hځ"@%C5֦ >EL?I`1|Q枭6.yfk*̡IU+tHE"+XQ,,0bItXeL*3Aj>g `%`43DsGJN%X% O>9*ij2T1OqJgy,/'+R}ԠVpx'꓏+Qh*$(-oL< ’a_Հ(4O=[,] G-nSI+cNWJ\^e5-os1\_XkA-z>bBS÷~&1hJ^$ƤD"AbYߖV1PԨvvN#m3=X" ͱMPb'DŽH[)]{"Kɮmd",J&&t h% `'ύL_GBs͙Y=o:2q;";)H|8Ɵ-'qS1zN[Py2@i6;v"VucF>Af~1ԣ(1/uj@ppSLM*H_A&_\vt*fAU&J!g@eDoLt;U|,k:vV:iT/W k0RҟJ&14QSA1IS܂s fG#91-='MIpIv92rPC|wuaȋ/< "ж򂱜9R{e5!u).>XEeֽ곑P$/F;]L#s߳xSOB68|K`jQSkR$&q#3Qظ 1-uFݙ[m;MAf$%hL>GdMT߉X*sXm]Gu+Vvc=n.*M6QN^Pvd޷_t;F &A"Q0EւyWƇB/SJ%2yziǴJ:kq3@A#NZos<!"8)Zn/;vX#7Y1T†]@TŲgm_(d0&F;ci@:|RGQkejD#cyLPMy_Gqw\,!y]-9)9b$1&^QC@oDLقұ:Щڶxş) 4iX~蛝 W0At˃_lJ{6V*6_dybйVƖ=#9 Umv~-,3XN;#X{@SX+a^2E”(?oYXM:.JHM]2#`A[ *0ʅP`ՈxQ {Q>[ ^p=˴M>ԛx!r.y.u%I?h)(N*Ca,lwĵhav_껍. `#Ws騀J2"a#kMV|2?=ohڨxs﵀LZc^u<!wFf%90cO,D1Q]@VVy/S`W=;V_X{ />|R,2wb"5VSra^/cp6̗;)+F`@.׭~=8K^r|weB*ÔWl? `! 5X{A}u9]_HE~vQ& H2° EtME`< ڕ@,`rҌުPWsdf3;XUDYu@.ͣsTpy|LTɧw.H.WgbPj"/H=_c!6BrFhgIh(ƨW썐=k}Μl*MdthUSM;]{^t3`]@N)A1/:G3R%7p.Xɞ#g//ؘ6Η}r٠ ^>sDh"?YFYM1$pWp9)7ݾN4J2}o |!!JyG'wbxU'a IqRV" ͡|,l?)CldGǾ|-l,ةD-UHgRC0CY=v]:ϣn+)?e6?4AOasbh} *B }kt. fzP}I1U )xP_5Ô40eaL{~~&ܭNl]PbVNt]~.ՅkCT¸WY6 dBsNV5BЅ U~Ťu2wkHWƏ}C-8]^!˜FQ1[^[1{`&r-,;55cWs"I.vJH 7ZmbU= Ғ}v_(&2wbQTb:pnIjbFSLF%o> r+4WHv3\@;,P-"Dl˟^ 7a9B0GG @|Ĩp4^eE_~brrk>itD[dK=gq挢Љ(z L~3{#&OS6eJE4ܑ󊺯tg1ݕ _~ĦaHUuaOQlՌ({q@UC{oW>3)0#A5h<U%-/մ ;PLBHyc~QʯϷ_Mwko1${iVy}L%u3]Gďw 'jyxyvCjXǴN+>~(و)|8 |dnDesϾoq*I3Wi5ijaҝnW #QqIWYςMյ%0gc4)t:R'cW`a*n|> X\)XO*k\-j]>bhAbJB`&#l RrmUL d%LZ I p ׿6 V_N:Q3rFK>sÈ%7Vbw]=/. f6q };ĆpMgҝY"A*JEȿ]+ۻQRwgNHLv:Rb/]M~gֿ s9K2 .]q*8PwM"(#î ($K5 f^/R8ʗMrTLKŪ#8Ww'Vwh|y%^?{OUP.Ycfooë `hlESeixܑ l'[:jґM A$31$&˥"i-TPU[u\xB5Yalk\»[0A0K``28` ,mxl.%RlAn pV#EN03*!} RMiAƔtIQ!GuQ$(V)hlU9vO~nyܷp=sw ft*@fւJ1XOFJJZ$7|Tw>^tm}Dg&غT.H:'O^{RTf$ɝt%⟁\4tXXaJ#֚WhfjbEu,P~ bU\Kqa'(ihHG5zoǬjW9s-W7 7X Ժ)̫!Sc̻%s=V?<񜟃Ę|+~h(C<==)8rygO3Xio@//lvNCZNF "fp,xrdGy~:T^7oC=u 5"!zſU"Tp{rۻ#B'[H T\ Y GM0ީ4rk5@Cj^OrS@84 0YPrb`7[/2qֶ6Xd)X+Py6[y5Npy)Q\͋cо-3V-6m`<ǧ6$'?\ ?V3[ֶ\(+:6HM!V f&|CH5Jm&nL)rպ6 oonÅ ĘQv\XEgl{Î׷}Fa%9vވ~m ] t0N7seRXL:Gz.MZgT ҥʑ "].&bKLkLe" GjPm* zx`1hӭW 1\‘+ätE|?]ʢˇY|sOM9Uow_W6ي`}? ؏@l0DήȂgx1;4gx6HM>/$'~0$-irrvSF\S_U&#ȁ>بJϦr)_jVᾱ% ccehlkp\Ԉuχ 7CgAQ_^ Q')mEzhfcu{Ys6,Pyr/6>ITOt _d%0/Z|.]sTrmk{̍Z92ڈ `e~"Gz+ Z G '}t[6V~Ν~KZ/ ~F^1Il6l)sWMv!^φ3p԰R.GF0p"FNhǟ];n=[N{xuHAө2BaB-:4+1LzH)oL+^JOf L4ny,q8Z@p*;F9ZwrZfR ,I3]`a]:1>h:؛[EXOOH}imK2ESb^Rylfa>#\#LũNnL۰!c*fw : o~?Zb~EA +wԛ.HM,~mWT3:Fd3q]5OJo{=Xٞ-[VI3U4 +)a@ IcŜ _/KNh LĠ#Vt^]&u+988Ld#(>lѼlL'!Mg(FR!`!JYՁ'f5;_GCzùտ]͘\=&! ϮE21gTdR3ak(oP|uxk}Rq!+C88vE27 r}8s2a0joX>[}X#t^ lc*D#|?8=J5^9ڗR=y*ީ'43+g* I%MɷWßXFFk'Y gz)6c8^à`ІB 5}IyҰrU掠`sky.>gRږFE~ -\雀lt)|a7b[c;UN)놇@"6h!LH,ėz+"o SX܀b+r$TC@e ;ZEi, kR.*@*qri<&Hmnj՞rtaN9iԲ{&wN19)xy *UpFٻ #ZU] V+ KdafII2>e]x!9pjUˁlYFP,kC5'=v02 <2[oi1B_x"{w"IԹ@,>zu FB|?L,LݧQ㵊SY߹4H|[Hn`׷(\!/S=nԉU53ćloBU>-x+0>`[}3/`$,|J 74͟2_i6/*Qa;#ΐ*|xB~ [uߊrjH)k0z`# ]DB(crH\⿁5iWE ϩ:0 4ɂPbK<1lrq(k>8HGĤdg=,/^rx3@7rW֕@''~PrA%'˛|UhHLKi"L{Wg*OiZmr]Κh|]7-t&]n/2/oL-Fp?h6ɠU}MbƬa׫<2JoDL☯ދAgF̚RkoG)t)784h qab ~ObEM0øM`cC 1[a5tP-^ArX7zHlePt e>luAfI; l?.brhaZtJ޺5s\!҂s޸Oae$DI"pϰVZpd``:$qSzE/uTI2l]ϧAZv}%)zy4i*Oc`:_,{#  :^21yH`M#T<(0SJ#Y[5YLhJB-Ԍq.rG sdobOv t( ݢU'\% hK`yLw`=@8>ۨv|cWK&%B? XuZ)ϼe (Q)80׶*4+¬wF6\Qn ͳ1'K.@<-:0P߱%y{wGGmeكk2m1xn%r Sfe:ik';櫽t^8cpn*j$i 8ϼ CfFv"dbk pW_ŞL{+khS8ePkKL&h9)~_A lZ :eL;M&a`8d( dvp^ɶ'd]1Awr> jzֺ_Ssl8$X«_ʝ!*= |7WAA σDRX)Řnv 2vRX[d1wD!ͯ1 ݠTT "|8ڌGED40izE=;_{avg)W![*7N(@gb!;SC_/ȥ 4 LƮpY-+E:paژ[T}7v%V\d &P ږ2{+ȎG SmU'Y"=4 C,TOo; ,FwE5jE& i vWϮeKjH \NX X WIU`8NܐR[J+c~"?,RÝMlKY KWVKl EHTӹ1o3)y{VYG)'P_ :,0U7-F;\^OաD;Rd 2O,<h}}! P9?"dˀX͑W*-%52sb+HZT $E7t:Oٴ9 ּL=Nӷk:b728hlPd&]Z{0fadצ5(K jHɣ?0)qb iS&[r#|| EJ`3 ΅FLAEzm7.&= U}/[-K $~A6̋'8(\w~,Qw@'kZ~K^OͶ%G$hBD9:ʈW([YcԂLY"gmcמeskH^R~%X9&0Hi!LZ#Fr4y,QbYQqm>^rq:aO^(V4%.0қF;+Wbn-0GYV0k\=a@,;V~1~dAr->Q5EP;JVPk[QL:&$ڏ&Cq M/?i2!j+`<77YwH Iu{oϭ< ] ;+%d͋9 B א6$/ Ah27lKE*݈bFby:fy(+o E;zFm3/}2R Ң~5N Lqz|w? P|-|CU͗jZP=6,, |AcϖՎ_COm`;Œq-dVL ֵ+i--lWL E3~t"cP.M6p#6*n;erX݉qk<։K*b<3 no+m=kk3wJ]Z t 忡C./P[/1y_BrP{gq^g'0ްd~ЀѾ,m5x5ܠW,Kۡ#0Ƣ  m1#(" N9el8+u dψquuȉx]V%#_Mk58++w@HU\#w38~'$۳ \PږQq^Y 2Eg:5X5۷-ͨ%$ĆF+dcȎ3 /)Pg]\P`-^lYj> QVT$R:ZdCb}Z-6!x^:9(@|^N_ u1Ư/Y&N. GmY_%3j tuudBn.:p'yξڀaC)y,[ JűL0+V9xM sxũd~6[vfxz wV` [L /_^5E7Ko !-7&iËt}Dp~@lO![fS56b$ό]$7'}K:Lc7u׹7 ,8?X⺧GiCWLEτvlsXz #a!JѲL8:-k|#fc,%1Azmh_!r-oiIC5J4 q)ӈ9#@p嵪XE"(t9<_1Rc׮n◤G=p&3e> m|t<ȞU1_y*c;Ze'5+?/\S0D1'JqbehfqN[꿀>Z5"cu3(]NNLe*i83s9 SΛY &/8#$|J<qdw31ȟ旘)ep*8kyIl0yݾ'h"j I33bdo^ٗ5EUbM뼁ý| 7k3YOIjDjZ't=' dž{)5g3ޘ^r fw|Z#gr<- 0z.hHQ-B+0c51Go)eCM@+l8yC?K4kW|QvUVr Q*d{}+^H/>Ge2<'EZwU~nȣt;z\% qZ^p`BYLg=4߫@ybʛbnݟߋ?hЈ_ ӕ @ {ݑ.+v [2)k>K#&&:LL-_(f݄$Nq Tt퉓.^LZ|aX*G&8@|_vxta LAEr͒g;&/~(:h?,aݐM:*:) GV|G'/);lnX9 eؠq'вTϙmO4YcNy7NE$QZvn;8 ߩV?_+K,#W0uk"b,ow!>'q_ǐB^ktm$۸lKR[<`*F5 5|2C}>?=+Zyf@6Hleeҟ_>Z_[m $a޶ gsha}0s/$1 @C[jS@͋zjm>_~qY_S  zT udYj2Z&,KΤix m9mn6Q-,=Gw\W14maq*<]?p-ȩUBmgmLL^͆5^tC/hxe g?8Iʍ\'V|uˢ /J_`ft+=⸚ΕpOE dzuZ0oBt_FL2>___ '^t)mxL^[L\x<=6F1;2uCƚq,彋ExOĨIOJoCa-\_*fŽAH|>{"- $VVψ|g7u{f鼃}#U3(=se=ݜõ7 M=RW N}J-d8]MÖ&G{Tw9 %ޣ tڻn$>j#nV3*A羘Ɂ}m J|ZB$z:%0`㽔JV}'؏V큩..毉5fQUx\#MH ]T}_1rPFGcA fG\ᚾo(Tp.]á+IYc6s ,lLWLsCU#jF#<&D#XD'^ ‘֞6*=# (Rk&e(7`GPs1x&-2NWln Q= OYIvy{q$Hhd~d>(]}]t=r9ٓ蘦"s!թL(9\,32KeUaenzD1 taq˳?E@;P Bo2ghFBjTP^! >(U|PTs,- FZU]؛yj3Vx(Ki0_B\RTT*{rknoֵ,M{t3˗ACo:&`4ԳC={6(%dLBM|18WTr/ww{"#Z'f>Ցu(:59M5=5{Ô:Ͷ?Kg"gp-2V_Cbk rKͲ. Z[_BB'lw]&<߄3_l#v0NLl$u옺yTk |;^,bHji%(E-95֔ SIlԘĊtAMF3[8jb#Vؼeg $mq ~L^RR/~+2:{Bx{_/ej L aa"ԯ ?g8l;s% V7hiuq3>W3"aq‰3KXS%R#zm+ բM&R\{TzQiF3 zg!gl!MV6#?Ɏ~#Q 3ftUb< _v kO56{Cï@8mR2ƈA/?iQߐɋ'x/)*i^<)(0&:Ը ~i~ޥ'~ٌ.`*-ǁ3;FjFꈮYeX7g&K"%2@S5ry&Ԕr]_js;hyes@G.Q{%xN WK WQc+)0exP&{29@ #=mUP? k悥+G6a\.MKZKԷ\8p7pAfUnh(muJn~v.H׆(vL{lKL )q8)ӡ dM {蔡 ew$3XmbA (]vl"-7eU{p5Po)[p-6\?lޭљ Q"S\̈́ xZjKc=y21&=49[xTNŭ+ [P쩘vrdC}[l,ںY6rlf 9C} zdLbEbM^tbA@%uod&[Ya>6dg.׉uqGRg9.GT  ӫ_/ydfj&|"[hkVܷfj%|ˍO.:!W[3ճCtFU tN[C=68hJ8H cǕj4{aM9_iij# 4Ǚt.z[ P0hiR3Nv6p.X(.؎-a  mjT|SDE|};Y.ţ O w^?erKR#Zܔ 5- oKp) G{,JŚ^_kbt~u _+yxcXI)P` v#1Eø#l;~P*|(G͒ 9S2nE+y{ޫ3DF1j&9[,6xGc޵-ཹmfiKSy&)Q@ PRkLƜ C;5:BdCm2$۸rJޝG9:DXeDž98A.Y>dȪWIa6R9 K@+|*]fKWe$umX#+bOE4݂,;: #{s͠cŌD@$NX34F̊&щ]b<ϰ&vvɐߑb|8 +ү\?Sa4Z33G.FQS]{-XP 1؛1Sؕm7)%YX“Z٨PKSLPK#P |iK4c%[KNY)~=NsWhvO埻CZ۫DK 9Ї[i`s޼^R/?1XO_B< {".Q!Ӯcȑ;5Pqk ġ*:ʎ)Ze>]W}V$Չ,1.ѲT](Zb;-ȋv s$zҏx(iQ9I,$hŏ$YZk0 4^gVdfC"wϑ겑֢nm"wbXBPA)qq;ag=U4] ?3.S8" 31y%^RtaqA1^I_GmYNxb.&YfME71y OU6V@51'M\xR*;D*,u65UcӾQ'-=Lwz> J!(G+{23b9XHqU0]BundBoB)촋QƶoLtDWDnE2\yJsn *A-#/(3m>UA!n ŎEx%^nQ|?Y4k.z]B>Z[ё;uÍ{F{-@d%`I?;_̕!<~=59R9)(b6!R @&y|lvs:j%zf 4+5C:56`sJMANyOuWNU@p='u7r}q].㘢(W=[ {] : ״v`!amNOJvSBL.Ngy̥.C@|,]|>!9kp8L9T [Wxib0z:nliŮ52}<w zn–_ Z__32?+NL_$naŴӲXI3+iip~:E(}#+-%^ZXΛuXA`Z- ՆQ0̔dӆ_ysvCqi?i+iMJhx\¡sU+.Lˏi+_߀}5lM]nv}3[NImj 9ȫr}HH>=nm_|M^ оˌMyCaU֓phqJ f1>qyf'ʸ(S07~Zm)RMw{~읹"3F Ns{x./@uQ[}{TǫVeO-NZgˠbjQV"1Lq|a:<{x ߳f3'HaIen ]lD;=JV}#oA|WX n nӢ=[yCf0=UE,ٖIhd)psr #JҜ|D,YC|NBrƷTnݽ@N7vFT>}!4m8!); C`0%2 G玊<|G "0ӁcVL<@|ƭ*dRœq{Iq~?hqS[Xb*%)R0o!kdpZUTߎmxE@oBff+,7Sc'.3$-i5< ,$O(ICb޽eCaHl(o|9L:g8ijJq{ۓں CT#H{q4{@):pGi;U'=,PkQ,6 &B qIԋWЈu4ӿF3Q@=?U)ѿ#[8; }HyTΝLѣ~k Ӵel o)W=ڠpa,ћRq]/JY.\&R.Q 0?'H ]՚xʒXNf?/ 毋ޣRsJfgs$d|2zb%)GKp?3FcJSeJ*tv0Rpokv;'Qx68|/|@2沙 K8b"}DjNslXvf7BrإJLG)=t$(x0@e.jRPkYfbXz> J)=Ӄ{dC4*DwiE* Wg#rNwJhVu C{! K~{46sa・7e 0zCr;JCL}eD,2%6eJ%*L6R`P՟WXnjPRTtrYd:S/S|>lh}f҃KIH□!$?zP|;e9. TR/-!o2)1nB`p*kczH!耹_Ժ*H8:$e~H8'&yڐ]4<Ÿw,ʮqݭ+. a|l][*p@ZvTT6&w T*ÌTd;4v-3u2Ybح2*=U E[ B>ֈ)AemGIJDB)!%6' ,,x ؚ_fhQk?{|o3GUFq E*~wYP۱͍w[b$(ti;ny٨GBxO~Uy[/<*C@hK GDzLȖ@%j9=9)gm {:8 l4_KXRT2"%Po$("V~IfE>LMÛplth?5&c_Pa9Xi#1[x{k?!h&8g *N ئ_mu%OvFO(;Qy=T[N=E]im&ImD$pXy0VdqQz?AKfg4$ӕtɄj#ɝ>\3yv qHh!ԁ% *mq8 AeFKQ㉏f,; 6H' wDޮjuTo}zrwkn˛g |'TUHМ')Ou3n"-&ţmU>}cnޚ$l|n0׽c֔XV6vlotA$QֆXr/q"Lm}r҇pXĞF5_A>󂱾^R<"LVzgu|]8X-ʆN720|miT~h<zLJQ9j-نYb]ƖJ:r_* y*M6|Ҳ:É"BەA&aN5?cY3ZwP Ld3BKЮNd-xwģ[ e< Q >h{\vX^E(m8zhUOYa" Xx1V"ސ94֒;Q9;LS ,7Zќf12M*5aT6npwC4.H:N%8ki6 0|H)1*򑗃EOB+ Oey٣yQD%ln{/]UO+@fAMcz0@oĎ`uzB7Ɲ]6*}yt=>SC uf ²6P-,TnITF+$F{Sn=Q,t_PVV Q?eaĘ-xnoW{ C޺6ix} HBrueO|UDZDR<"ZloOm&2PJʞ`2nMvvqaT;tɊI@H@]G-zX'ĔoDVIw`}ap7l(G$i"-1f~s)uE|Y_r:pbB؇ؗF8S/ w!;vU?Xdɶ̔ [" {+6ǐ_;ʢܡQ5 #Φ&roڤ __#I+l1#/ W,f@ Fs: RC> %<Ô Ѭ.hf7P/ڳ8]U y& M(/g*EWo 3.T^vxvCaWa<\ /\_2.ihqv.a/&Oq9$6&,Y5zi1.B_PŸHJ;Ė͗0:}^! rړ/ >t.9)p/#쾷#u(q~\Tדv-)8=ᶸHBhƼO,}0j\YYZ%(8 ,Kɔzjq!ݜ]=_*?t ?Ut ~s4FVID9<^^cS<ɿRGj) ڦaTWPVÒV,h7=EIw{e `s UJft5ڧUh#ִgl#_̰d!0n+wsx@mtް_#\)\jMKZMcffCJ3:+Fc<FOmu6v0؞bLm=~HRu~sc@kݣAN~lOE}8tPS#eH:x# /ìlMh :m}B j3UeW+ s*F)YJ1p,}+w$ ]Բ/T?˫JBTmz=&+=E sS^fK{DK4{hfW{XvTj7JYq7N%-(0'1l1s>i6O7ǔnAJVBp:lwKǺ;a٠5{T&d20DlAMYW8Qj]f>nޒѤɇp G9K[*}!ΌW|DTO63 P`F(P+  G@Z(`'~cK)庉OQ7]ov /63+_tupuI~{A4]P j,-%k_k8(?5KַCfTbA`@V瀥P_(K;e5^Ka֚K6! +D͑} E -=4Y ʪ7KZ7WPx&8suJvEd_ b o6JaJv#s3 {@~i`=}vom~2#Et3\TSX M8:E˭6楅q"N$t)YΤBuEOK^z6x Xpo vmʟ`qe2ɐeb 6ݏWG0-i_dlK PNpFv-A28^l`vQ-b`~zU)epK40y6?]7^sZ1vWXF׶sM[#yNU/k+DC v GYzq"5cԪn ȶ/7m+h]Զ&L3 /ƫ3Oor>V,"} [xښϢ|#M1%gZfh`ꌙv'!^$ۡZb#: : lY7L{"9m;ޣ]w Y\zۼRxh63e `fY0DCaL;9ӡp ¯F6c?3,VtV]=bV RUӡ m#IltH +1Өo)$ErmGh]Dôp10%Ȣ'J~J V]mX*VXN~S\1ʭ#<*T]JD=Ϗ'4G'䢸@p获Yy|A?㥟xoy*l;Y sXoVs?$"1LX4ri05F(:ܽ8xeߠCZszcdwuI_R#`6MLF.%rL efH)ܛDr@KW;hdeB3 bU:($*K]eX0 K 'Ik0 ,XfNXn 2+!H ]Oa=>ym7d!r8-^tKgiDisToS1FeROmNj@=n'QSeu臒FQF4 ruErvE vw>ybd X߼+؃oc,"A@ݹssT^k0V!_fخ}Lq0h0tcdp_g\ 곪@Nx3W]13B'8{AY(WcHk}KNݪ9'x!f eטtR@1t$Ɉہ0EC*mz2ISf2LɈ!_.OcQ*OejGAipIttds j5krt`3vݜ4?̀ HTO)׻@~H8]Ũ@SQBލ&&]CŨ剟Lec#8Ǯxp47Ѓێ oj K咝@M>o!/h@s9ͱs9->@_mEN)!>& A}K5:#A|~T(;뷖,*)?մ\i'nK8[qWY4`nIA=.6]ez_bTLrU~~_ƸA2EpH$gBj]f\܄Fa>jǞsWlj%O1, -bŐ.ЬNgH|d(ˮH>`:`xYLP`7y]+7%$=ne)b>Y 9}Q?۾}ycvf,Ϡ^_`QP픣+ 71;ro}rOQ_)V1G|!S:\ӹg!yCgۯ"F*iC.jWW[ x]֘[s9]ELAGhhMMS2KM6bX ۦm7 |Ktm~;ba5r6e 9P闲傊843 AT +\F.4C\}eg6֬Pg1͵ B`6d9m2KJ4uJl$G8@2bRJ4h855:T&_5+V \=)mKS@18]Hl}K/,as{P| C/!Ʋ=M0b`V x b$lewU?܁u`p\fw}oq:<%bB@'/GTkK|~FLC^u2ʎ) d[wO*0$2Y+nmAMZFO@Jl͞FAV[,w+4$g]mJ06.?@6qZW{;9űo^e}~5*9pKD\[8! iNIݛ GKNGo[u%}{WBEo\TYW-S{f0tdquͿ!}\/-#m:[x]Yg;8YCKڷw}mob\h5#)Ѵ{I'=jP#좨2WĨrd -86V؀Sz.g*BP ڃ3oȜ<6jP} q\p*O =^Tp4=VK %;Dւ`}6)HKЃmsSlzu1: ׻?Yd«UzBsG}#$JgJ [x9l`PhuaNܵ`A/EL֪{3?Oy X`0:"X4f H0)P~WΔ#Љ 8p_ 6ޞ1yjM]&4Y(;Oc!\{09G>?mB[h5?<.qؑvkhGUg*2κi/\qaQs ַN6o{؞ϱk75WqHMoD@𭍮}A΄A4h9 O,qs^:T?:yЩnй_)C'zdWRm!%ibSbԚk%NZU~ڝ,fsLdb3v"E 3XwK~9iA, /PZ jCMwfzemˡfqIM}=#VYSWirHupEM/W,>u G/\ND,]{|/GUgJnI0JPg7IF A<ȇG::-acʡL˔dbzupgcƃ8GkOb}d#n,1 sg+ۆE[OOD85i?,hiׂ5:78l&v{ 4~V-\̖Cq-hM%:/)v㗗#qڢŜTk_r*?DuMGD A$kkcו& 0m6Hu]n5Cr[JAڔ D HKi٫*1~"W=FO{ )~ ]0tXc7o>4hi5ojVka~ 5 8hbc"^PW ڗt Ӯ(ebAum5bV6YSL֨d^6MQR&KNGsff,4mDޔce! ܗdRMrW'o?kdo}C">|=fHow&m0vZ+)7|[iIӪoyXW9gĈkdS4v&f7fCwz 8lt""!ݠ᪉P5r cX9~ǥt僬dC_}P-   #Vmr=G?9|eP .*F(QӈayC8,LD)\wfb"n2z>b֡Ϛ-14ԕ,]^N=_~"+֢ǭSP91h{Hucdc?8柼\  טD2WI`?(=1`)i>rz^ N%5Nscri6QAZ Qa=MvcBucc!#uA3(GJ뗂ʡk)`߽;Q4tco)`vS+oST!"i$\/Ir/4Dl\TCod1楶V>Ӽ&8qy);VP- RLT; FH>4T50y3Wn}Iu 1|&+*b61סCTUjhy0YWUߕ&~z~ݰ?{-v ʒ/R]N0Po<,\wArOxmR22L(q=wN隇lB+ [eO3(] 9;4hW;({?hGB1a'ưOciukL+B0mxƟUOF̾F!o0ӋFq ሥuw&DNfy>AijsVPۃbv0HL'̝ 庛><ؤ5j'Lm"^~#%ɜ=D˶xiqY%ۻ`J̸Fbpbxê(6}Mv6cy%JYZfN>srY0'@&+NLʈ 9ӱ|Mÿv.wbyNBlaJdLdٶMb; .O:~n0s41SfRՇV͉|uz%Kmѷr@o V/tDy@r;\c2C aݭpjxb1 =f K."2<,,E#w~9yK.64))|VY?MvW8Lğ0]c"hj.׉ޛJԩq$JK]y"xvX`O?sꊳw K(wF?DTvWR5?-N|= JAw&$U7I}њ~Jp+do_x1fm*ԙF $JՁoc:.i;_P.n s(;*eXЩrIQ.*`WaÝϺ ,YÒOm4yYYO[&cծY\x.uY]blq0COx7ד\l`j~݊vxϘ#B.l7m*|Eq,,I)b?oXl0ُPDމnrRf32EVw8zeiE@Jg(YkLʹDSe(igcxԄIޖ=oVVtʄ>U ]Gy' [{}p'>IΙeP.v6E}hTܩ c.bT2I>,LY?l0a+.ڑ]F ݬwSJz g3.@s`~hӯ]ykB`\MGoWLw5,zb%}uFW>B3L[h>ûRBEQoU:X@=$z깘\l1z?,AI0) LOfPa8,0tĦUȽ!Wab7x@PrzmU4oݾrȱNh8zWd]&vbvS=AY~J9k@tRgl^n  ;c^ǃ5ͪRݡoyWW:)irWk)b&*[U3?K)<ߘc/Þv"L)0hY[0ղ){-`wPrOWi,\mN pQ"+^{PDpfKb]~'Hܑ2qr@u =M=~4*gg"\U>mS/3GF&s@)jmAjj92 )d "}Z3E.t!x'|>*[bD kfUp4qj ^NA`NkpF./?RsZ ZQa6jͅs`x9C$; }ݷJN[^ Mf*ry܉%?+o)驟2$lJ*p_d?R(3ةZdE9\Ho Ѭ+CS{ M6e.˄7H|{Mš~U UMV-ͧ#8p:= V26F 4_ ໡bB'&>`L!NVX\ ΫC TYla펨7G-d\mƽtAؑjD:-M@%a;fuhA=AYNnՁS~Hȍ#amѴ Hcm^ܖ9vӍ *ao^'*ᰶrE1GM$+M(E@Qm"˿3lNX1ޣ#6( ^Rrj/XE6Nΰg$OāX]ܖ)Ms~"ֵ^~(Eؗ `ըUlǫ{e !'E<QXX?\4㹷vu23d#RIOza`$zlۘ-2%E$CT"^: Y+KP[?S~ L24إ=XFVWF,!V*3RԿG|}޺bP@}(tGϦXq AHP \3/Bm@zi:pca<ܩ?jJOᛃ12r7%K#GOy„"vV#懲 y^U7RC}N7܋cHȋ:$նTOooc" $|cIzViJz3}3L4lGTh`FU5_w |@ ⥬ hكEuga oeޕ"8K(1;0Hp} GjJwfwN*ֵ}ߞSuy%Od ZǁgSBGb&Ph/S[_/go8$?N$:*5h}>c#EMjC=-wիRbuv'2sy T_ڤԊBf +9@7 le|-Ihf_3'Oܒe5CPEX5|Yɶ Jˢ0BUyv|M6 g5p+zG2YVXXD bć}ClYb YtTɮg߹)1Tz|fIV&džeDZm$.y8u ضBeTaKHi>{@HŒpߩG˦dr^/cJ@͵aD.kF "~ i*ڑ6BnyUԮ 1R(#3 h1N(j휟>0fuQҐzv֝h.xzQq=r&?X*ATrD+4:_o ŎJx 6lW3!@[+aIGQ7/GWq=*=,Y]wh}[й`9ʡn+:pU^"!Ѥq'[ĤL]cr87ii0Ɉ0$C@A=}2t+"umgY5ea~A-Ic D6s)]Ѣۦw#69j<{`]y׀l9NkU'q4H\;eO:/U`%E) sO8% GW#8 eƌA~q +eYw^" sSUTTakr\1_Lr9x+2;GIqAܩ/XwK 3s4OO⾋3~XeoMg.(VXṭnJϦ˙i,8y3Z*lgQ,*^97bbdI#[ . M4,ڕϼ=;wb<Wk>/+8t0*[trWK# jUmG\$>Z z"ee0D;crGzZ_R*Ym5Y+u`פR93N5E@Z[vn#d7Sɱ ᄷs *"H7)Ǔ=`{8e^8QO- ݓiΦ+;u;Fe<㚦Ň]^~>NK:Pl\5LZ- ΎyxmLQ+n+f AA l =v/J3^G/b Y)\kr"E6h&^(uGYU<|cDzGbZK$ 8K fzi]d,A< Sȥ]XC( Żp mLi?$Q2wlGo5&o4PŇsPmByONmԎNV4{(/ӌcϥu`F q Aa A4siscOpޓJu\&ё.HZ-׳lݐjU 82eS0e;^I۞Ƙ=]%X<:!)OE_;T6Ӿmx~exN]bDlpP+8+iS|дKMno16IJJD<+|!9]L M+ F^Y"'?2"6ln7Nuk2/R.ÏPz=;B4=n F0F7n (w{b*ou4[M%bZB(')}+lhNLExl.̪Xac{Ap$-^.1 .FP^O6nIzt30ٔ@pwJ1ܴl/~㏵)1\/`]԰Ul3q.h%sﳇfVnd6y.uw!P/%EPڬIt0w#ث@W)XW?)Yd8IJ[mnьqߧο`'o,ZU݉hB9%>Wh5-@\c^GU;./UI,Ӎ0+DŊ QNGKBo^ \C?O((g|)nG[Z,r,2=lE劻% BG>E_b\<[y?X4݆|g'^bL$E(t•i|B &g8_l󦨋cҎ +K":auU Sc5K;a[}W)azPyd_ͳ}!}JTY X`Ԡ1?p$nÐfz=qGk.(XN){ɲO\~UA[{$y.7G5`y4ܚ=7-F P f"8\)hĝuqk $3 PLn&Ws&@S_wnjHoi5 ;*$$Ղk(*Vf ;8>>_s}_P ˏu`rz-r` IYJ t-Q?jjl-`>m_;%unq{ OQ@6'^Ǎ>rf0lV޲sI)bwL$~/}}-zz%ⱘ;ȡ aܗ-D =jew^?C)ɚU[ǟIR% )Cy(%h0&pw1kh[|'YW18h=1"!JD嶪CZ+HﶕymTuЫ ǣ^]mC;߾1~g"-:[|JeWo+T`gDPظ;>nBR2(G݇я|#GFڻ:/+[*JX.>cn ~ ףzsInϫ7{"YPC PtޕwŚNV,Dg;t cufTQLu, 4?𙅿l߇WyV y%SA.Y0)̧rD=q忆-_JhWbfdCy!1 Y3 _Ŷ1Wi}ޫx %S~G]((0rJҽAtɔDNp 0:g4vݪ{ss"ԭuE 3Iٮ'!tJ-uYKKIfp l 8;`NGЂ0`i[=d^y[zҒ:$6[x:P5d_l){[,)f|e>B_wwVX@#t<>F5DCT+^K?rC%:uPzvZyF/uDM6'm] ;l78ˊ ZFQ s!?|#vT+Nݻ;vӴLmMGl דPdKP&;qm枩6ʻxzSU{^Wg<`-4\%O;-!!{= :X*N3F8\ e!Zyr],'TG}`K|vt^N_4"8->'IAN/˅dm 2]n:U}I$Tl܎W#ݙӸ3Wb 7O ~cHM|9,F5>0Ebxh˯Ձ6;)|-^皟HAݬzRQ8:ҵfՅ=9d&T=rP7O3e OWKL+ b/IbuqFZ%t}A pI<( S^0[y>vIJ/@=F຾ݾa0 }`RH!wؾ O_j<>IrBg5|2Z.|Bp1BKUx L^&'AK_k.>:_ٮwKS6f1'5%'e 4i;&9Iet겭J/Q F6b qw~3_gˀq%']bp),WxCK;0 !}h`2|CJk8kNz< OG&I#ITiV!j&qG}$ȑ;.߄-CԝE 4ژ6tLW4jR>< J>Pp4^Ccn.u\EGО $ʨ ^7zepCI_0ǚ?擣0FYQ7*xX1Fjn5~oU-ՈV(NG3H9 ̈́`j5x&cq!H 4yiKq y˗LIu}l}LyiD&|hs!~aO gig{}dyuMCc;\JT\&BT M,ja\_q$K}&Fm o (c%T үDA`>Q)Cxg; xcàܯ)|qSJޞ+(QlBC[g"1 nO뜘7D GO ?S)V7A\JWǓor:|aY*7bl5 gh?,B\ u7oznu 68\5p9@'a;Spo 9o Cc ,ZZ_)gQkh~n*M>l-f8 z\Z?w0bhF+ ]\Vk)W8NfŚz ~} x™ǯ$9IYA8 ]ok cm?be#W/^[b*ΤǙcx XI!TrV.XWa]g#3M>3ԺK|O[ PU#hRjҒyrs8%FWG >ĨŞCJB%Ui~/~bO-ݫ5D6#<3 xxWJ% _n[O1 .1QTl}HMM}u0D4;U_a t:rvZ%C9K?hʡ|T5S: KP÷B!=a#JXy9yzkamuq~HY8*-jǫ2jEB<R]q3<*:Nj%݀ˎ{;e7s0[EՏyNUk0"Fm(IyC^ejͷ:Kc킀P\)He50hK!{q [_pQ}j&U;$8E͆jAS<e׌Zv}T),+^X,mBiJ?©/Ro*oE&ФMr>70(DXM2\u:;s(F`E$9 [s L|SEY|~K;qP!!53qv$=ӵH%vU8߬'Z$v͸at88bNbj73rF^!G7-EP| w9j`4g  2ej*Sv] uoٟyCGt{v_-uqZfs,|4IQ&Ock F{[́2@#*hh3~Aeyh1FfkF_O&J7LqѨ­Q>樬ZOpaxB.NddJCX|XwޓRG8e s/deXUYB@n|DA;J.M!cgZAZ!\^%{;W~m5&Y_^r+Bbd zФOt1vM0n-%d;, %AO'g?P1@ˁ4|pHƉi H #/`7y_W/3/-2Ǥv3K8cw.njsjRۛɩKg ѽa4Xң`vtb ^C.uupC; `בn_$# , 38# {z}ҁW&j 'Pv$ca9v2cX#ņ0 I;YmFWh+n 9vNeۙJ3%68{LʵJNY.FB hH9dPͤ8TPOY"¼$[(2}H'0֔߀~OWǿ8NtgI8D1k` fQ(N.^DNQ^pZ议; "1X Tk_vNlW]0d# P@\N'mL=˛Ц9>nxŰ8Os ]|q&)JMRV ,.\n092;4F69@bL^OQț75-8ؼ}Q&qO1IMtLh(\~V x?`:7(TcslAԣR)?KMEoF;Nz53Tg%92vإ~: iQ5-79=(@5[)`f`b2+4Eqö۴~:ߚ6|< =;Gx47t6D_ ؟F!//9ZߛZpeTЇ*-~,}B^ƽԪYA_CG3t1jf d3̾F .;j̺R+uTJED >HVDdn(' 6<K2HDZqY4_1Iެ)4?F1/.ߵ}CrAtJ~アL'eG &}]?J{c[OKt9HmL}اַ>xat檛 8wy"kV?<D :<6rS7\b1h]*"[1 c[3.K3BaQ[,WD,,uy쓣rZ&̯.pð#_fcHlaf8Y$wj|0:PZ<46/1?5J-vaK{?UrL%|(C(˿)nB$zͲҼv`S\t=gts͎trGxGOq3fԐ2Nn/wæ꟠Fa6ΑkG:B4}DDvbU(CJ.~siYiū l1:"'Ѥ4t;Lr٥iDQ:f$_'+>U6G m9`3)Nv-(EG mn 3F#~B G.DGkB ›RWvk#J*YNKJ~Rn9hK$5\it+6 FI=ZVT\%N`Q~$C!^_f5 }2^_6k l?c) Mp )UtmDԼP&+ J!]I,deMd6^sL|c8-Aloi&ʠHU#nĩL=ۺrw{> )0W >z4ah>EsfU;iț@{ֽ9$`9,C_ǜC2l_l`!v:2;z: @/~:`?0t@]4q? qcyS٥|&Eα/D 4UkLC({߱ ]6Oݖ[Z2:5|wViGoB' A!>4*`8|| JHmF2-oÝg|m 5ECN,P?e&9WV*eF% ޓcTOȹ;3`b U`42=H[SHzTz2*$5w7lHb2%Ro #tZp4ffaGپ.JHB~Q%H ]<@9L(R-?8hwO..765?ziF8f>avGFxk5,4wDS NsX; Bt4UX_' >{i=9Me l?ƫ cNޤHdm<It큟e>3-6@JVl%'餹"n"mV[bꮈ@&u_1l1!a2Vqg%$rqk$hw"Pr B-^#ؗtFK::6Rh"!1aS#U+KӅu U^9"%hYa6~ "$qeT6%tMT$r(И[_V.o fk?k.2r3nɜpVr8yV!"1 `FefؔCo8] wneӯ6Ub9`{C,35cTպepYlȏ}y!1/ ߧ7Z"ok>eE?wrpD*vvN TOK HXpq!a'xeS\e.X2zhC)g`Ƈ"I;ZB&Z'+8?e Ef[sڳR f*8-g|yӢw/z*{̋4o(@1H>?>N-$LgzítLH-ThrV!Id0F}5\-}a4!AG^$;{ޞWPwfsNř4z3GO$q  ' ģQ[!YCbs_&"iMy>4U:DXuaf, ڍ;<ؕ̕t-T6](l!orU9Bp!]fJ.NpM!r#bNKs8Rr|qkS/߼JWa,T 1% 3wZ!,4G!gS3ǍI,\ZJfIK*ԫq*w#dWMMޮFם2U ft¤bOȁx_2"Ket?*k;pTa(,9C|{N[浑Iq>ݎ@Q|`%mI~ /lIޥFx RHރJǫʲD]Bazfsq4 y~!)AuzzX+p0?)@a^N M-hq`5G* j4:mY )a9Jg WC4[?3wT'K|TbܩWFH蕫!.G)|Ƌ0}j9<?-E~Nޫg %,[o~Wl U{= [6e^]DQ*' G".(RE 4e ԁ9qQ&oRqq4럃K4290q~}g3q{ :e4 `ң%ö~6/}I@9nhbO[jV#̊dmŒpFSMs]LbcT ŧ{4zUcKżgT{O[%2Cq])v{Ѝ) ?͜=Vs|Sm*=v=~m3BygHATUg𗙫gJEANG -*KV|߹Ǻ ~^klRS)TU儕7׫D篅'EVg&Rcu uňwtCY.>"x2>Пla.*|[gF~3Rx4z1zAF"3ԨE֨2+Z e~}9zMQzcvt//8;A"ڧAW8\:6?iOF~=/*\8SxA#I^y/ByO3oDAxC *[u` w=8M+XǟAR G !TKhBKi+vHԐ0N3q;(ۘ6%" gX.ǧLe8w 0^,Ed  i|c>fI5Mucܼ0)EyV.o\Ed X2fU''RvEU/6[^߭K|^jD+&?>;92:y٣R8w0WX@~fp^—Լړ= _2~3¦Gcȉ19ؔ,`U۩HRkR/!ʃY˺*!of,*(twbז",*YVXLq3r9*@xە u)lЙ$i 9;!M3>em-LJL.hzdBVH־Sj5F~/c:)N$4'1y1Nӳ˳A2TI(*1fѮFz6Ïy5b 0_= =x{@Q->ƝydLPG@'Gdjw!4¯޷Zy5A(/@*}/u<7U Vk6L‰x7t)ȡKEemW={H<;d{rNۂU6-iIz 8A"b'JsMi㺦jK,5aW8=]tp19?W%ՌY} Y1C]eL$b|4`XG$ y۟VkJl)_^$]JWI2H$kQiZlBʌ`+xEh{ zTة4-9k <FeӻrY~B;z W&PV[Fo5UiG/m <Ekd;ųa/ڠ%^؉ 7 S,nbS`%(J8[WuK4ź[;Q/s?l%O 6r'ߺ;"j[^3jѠz ]Jb=ҫEyBS.}hŹ]f3Cٍm[%ň2}oA m:Lsħ~$9bOz`/ª]||XvS28{^т~ 0p'$e؏# Y_ynH~9l]wT`m&oe(vпc^L z1nrI6y5f VL*נ{bgBWDBćX{ iA3j%im͓`O2v~rmAI{-[v`6Mڸ;8̎kƊ*3Un*G~*èA8  KUF4)Ť/w40J)ړ;Ӭr7(jɪ[bVڗYOOF1 /ɾ nac:Cު뻛o(w ;ǀA]ݠva r'zJ`wʼnfܪMYoZIaN8o{%?5xggSa:eSyL/ldno=\"F_rhHj<+FlJ|2uVHh'I3b5MU0mB $C{)g: M<:Uppd:J(<<H4,_=ώcղ[ZvHn _xw,tsNS=Mӳ-)K}b/l;k|Jq&ATj/:魧d.=^dKW"y-;UmMcvOSFC"/QkYSK2LiVuȣSуmT `qt4ZWe&CՄVU!g+ k5<"rXYeփtFL^{O.d;.ӧS0ㅹ,x JRA!}3E8<|"A~o0Va5}"#~ߤm ăB!2 ,Q1Yo|ԥIn ΔNqˁ5/~Jb6ҺH"*- vʎ6KUKmMZY ˈ_.F0s6az4SMݏ.3ʹ`1kقFGJ4[nO_H> A=TB]4|/.f( Rq 9G>[! |DBNVc*,3R$I⎁b Yg\/="ʑ0XGl^N2qǀ5{Ԛ0>y`X@YMKG[_<~By#ldJQٓ+)ֲt Ik;^ [A5arykk`g΄HL^ OE([vpϪnئk oOpadL83#L͐R0cj1Ubw11-U1% H2]Okܟ!zzZ M=6n{E Ldey6,Hwzg-^ReT6qg|xi#]M>ʧLjyW`Ma@-)4S+&dX7D0,U&iD_MX}7LdF߃H9@Vbqb0wX'`jan)cZUյBG_\V3 )d {*ÏHe 1_1=|EXvɨb7npՖ|x3V<2s;QCT"?ӈ3trYqp24 k v-_{2O)ϔczkBTd95D2ҙ|&ɷw!ǁ;i]\b'?ґ&,V}hOM ב;C*v,'BO=Ty裗^fӅ_VSĵtROnƻK)2 r2l/P!P`QH4t^\5)Z%DA8%캘G:g~e5FO`(o +Ѝg|lw2GqZѕt;44)hB 9m(h0H1ҰW[FpAOOeB.>S 5ż ZgJV$^ZZ}B(fI,t,ܣx:Y ZxU [1ZN +@NI#+ $&wqQ!3}iprS@XT8ߚQ|%Ńx~WeG6i P.²EF:!T0Ƽf)\eݭZ8;ե^2Ybd GGQLo=?$pTNaY2԰?m\ă ݑa˶1֦ #s<Ⓑimrp?*&3,ɪ (h.PrĢpFeQ %<:9U Zw?=%peg<LP 1(fGOILh ,g|j{R*uShkOAz- ~Izj/_J۠fxKǾ- Xue0c߄%"tEBrluE}B2r?1x؀sӐsMpCz^1!vǏs"`"LY6z 8=B1) >أQ /dl^YJ3٣|ExZ>DGhMՕ!5[ELʌzv[HU`D{w$}GR6*" ;Ӑ%F0pHg w:K]e!zUk f.4ro4Qc61g_|%;SM 3nvm̓U)m.=^}Le |2f҄/Ɩ֑H>8 H`BRgk8KNv}ʓ4@/VYB)@"' 2 ͐:B /s8yRE;K߷+ md~涝958(J1lDPTA/}H<&gps܏G 1?7ڥn3S;Q\t(󟪲RO5z_ /(_h%r&٣zs mr; <{`d٥9MLY;>q Q_p(ܥG's֢si[X IeUCOU&Gi#Lع}VaK|pJ PR\Dn8Npg I=&.RX[ H)#>CP̴@mKLTugn x Y a.^gw66Mvb;?R" C jTL7/J:t:ȄRUcOՏ)Ly& 􊁠^PC$JR#@dft,}!>#&D|jly`vN#]ٽ .[{dÅ"iS꼢eboioec1SҲnvKę.땲޸*Ѓ7]GOy8 vGxHFb;$!>tv٨fRZCwVu؈ŕ(FbwTAL8Bf L?+0Pdvj;1N.T"h#'B俷8)Ⱥm^ frgb.HYWq|+5g)+wSMR$mS:h5?d% `H 1oϹ"b#:f$)FV*T(> `5.p\;~ ZoUXL<ؚ=Ս6y/A(oGvV.v\nv첁b+Z-T|A⦻>L'&M#l.ÉI2LWY`GmZ5T6QzA)$qKM(ZN Oa}1&rn uYЅJW<=M+{ף@1 Юkr  6]qރws+%(_R^vNU"evoETۤJc%T.WOw3Ps,}4nqj2 ]H?tl3 ȩ壔 GfZ} a-]"Sgb\Ic> J>(D VEꢕݛ_rs`IqЏ)Cqs} S"/|Wno('.)3+ ̫D!Ŭyjk=`*]ڶ.D\ν'Uv3iL0Uqs>1P1NjT$$髺vOulSq.NuGp^-&wV2}Fҷ\u%}ΗW[e?Wf:Bhd ">bZo&R /Xd,m U&w#,-H=C*Ȏ᧘nW0F(N8YTgņo&Dx+if`D*r,bwu&߇=6r((8'w8%n9srI/@G2.GEKּxqƺ5dTe\W"ɸ^Mk*ubF/͉77]gtx:x3ar @\h I#Sedeܥ(aZ[=}s\QFJiGDU3G_ 9]SP8HyE*R ԯL/zRЭ=D iƢxoaO ;+^"qpžچ :=?0ekk뿂"Asrf5sHV&sͦ+Tvsq??d"i ̜wl+uUϿp9-A4o]0Zh 2tpy~[-fl(:`=TU{77CW+䛋Qێfq^5JɱrKR暓R%xnly#91z}vӼq"TÄ́>^«B7 dT.Ma-xʓ[.>gQ"ݧ[^Q|1㓸X$yY~*(a@GO@vJ@3Y',&r*3 W!rRezW1OH/ˣL [fkFigMU櫗䜄PM<\RnxX۷;C&!6T]=?gj'@A2G;GYJy=oNn)K+8+߷9YS$]txj*+X:N%a!,?L盨ht *SL&Rܙl[tᗞ`z+?E)@sA62ټK MVPŜk!̍U'hf]\m* qa%2KC"|񗂩4VR^HᏬL^ MEg[C4.-Xqg6RKc\dY)N7l}l28^;\Gz EВrPٔx^*n{LgYAcDy—Rܢ5I9>q VF^Z."Js{)wӫHY@@zfnOf[)kP+Rp քj*UfwϹaϿ?r#-k.6{UnvUnp0OH/PwY/z;$,:i$oSߛHx`XpbGj … _@N!㧫FuszÏR,KXӳnCZE>*LMI:>]_j%m$i4goE5ȭ{AgR5<ޟb~8IYĬs ;,DĞ4 [fQ~}ܠ ng38'/w ~wm+c gZ ~T(yڴ1ZOdJubGk^J8w?-H'=X9btX*+<+VˮF5/)/K5<R7L*sqö1bGZ PMPSP@t>`4UV,*ݟݞNnp,!O1'@%QD BA#CV>߂@0e^lDc/'X yXAs%hˢ6^5,:\΁[?E3rvÔWn|K.m45UgnFoZWI  NyG"K^jۂr%[ff /dctO$NDa%ͪlf/)nbo<-4`J/Ġ 4M=M4<+\>b}WygaeIlFE!аX[td^R!2J.?9O>*w 0 t9ܱBN_o٣8עh#z7}` Ś*^-}> S&lrh{mHxxG'8 SgUzNT1Ù&x$ЍεeĂl?BG3{H'ƽ}uDIlΑ@9#\FIwa?&K5a>nlu%I}6Dߺ-Q׊'=Yr3*9e9啚 ض}8uQvb~oFי/,0 ?/1V7Loq pk"!t]o~JL˷8,_}08~"U&(O4p.YɁ5uuSըr`ˮ!CznQ G0^爳Mj=H;-cJ7?uw 0,VvfI/RLJ϶~ixJ&p?eG\B_hRcߤ5ףev[G_ J{R :l7aRQ\R3v2Gf-d0"|5ӷ"]+1f/Pe&LF;A[ztt9',C a϶Ssk]t[ș"Te.o8@!@69ӵK"{&T_))P4kg猆̮bԜ;L+B:haXn_@R-0Ӟ -lda&Eo>aʿHוP7XŬf7$#+e6dGTb(0&{[{00FW!vVzMeRed"0yd,iKMC{ʵDv G*>&EAКu"n Ċ?fu3{Gg U`jYbE"1</,U8Rcڹk;8p0Mvp̟$>9|Kecrg.?(2&u!=>=B5֢Eo+(Jea3Ͱ5}DʡY-`W٤,^oAn\c5!2{ /uX'3(:ńJ`Nq] v6}. \[6NP ^^Q0˓B5Hj5d)XH 1^Tzv $#H0p0R6fDB-X(OT{r@\K7joQWx*𵕬>T \M|3&l>C Y&ݰ#)OP"XpF bwǭ( Ђ`LSíqSֶ2oZ|.涏fu 6n-SGmm43Cw:B*HFo0E )’Խ$yt3EaT."֏VCzckԎw/B '77Xc# Eu5|Ѯg尭oQ3 cѼ#ߌ CVR t#B٫c nXHL93P уCL`%v#I'߇^75v;2 !ܱݠ^YuMAfjߖyt/ydbݹ,ԦD&>h"ޫG d-_γ;2 h|%tP>K05^ZHxX#1!]U";-M='kѬsE*F-f9c6LME+5Hfh&?fÖX7/xDJRŒ4]WNXT"׫e'ύvdiI|E] 8YXk+ c2&I$ {=O:Z-*l$ O%֋"eq -gF#|\_Շnʈ֊8%(YrD 6ߋz,- #s[ГZʕѷߝ)&Rt耠rH1d+IzۜY2KPn- (i0' e (!ȹYnqmA?' BA.;CK J li 6Ǝ:.6.6ܥW c~7o{ 0wZPT`Oc,mǴ]˳ۡˬ;_* h8-tlh%9ׁ"vYnLw u#̦ȕӂuM4oZ6()"/>M&txE[=LD*$nysl џtFaT%s\c!Cz &h|_(̎jcD MEe[4WX)n=g/*Y]Fb Ub̴YZ@YTAG~q-L Cr|z>} þ'GzsOO*0ԬJn03\ PP G6Hx-u˚XY1֕Ұ#$PJ+@L5kXz'~q4Hpp:8˖(|Kk'T崷:kg2ͽy':nfZ9e+5PPoJH%˓ F !VʼXs'V7CdB.~.A}ORه$ ׉BB#ᩴ[AIIꐓB8^6VPyByZ$0 hQ̞l6)h8!$:av% zYkIzH>.GB<%%^ڮU0J>(/~jwE\|_S| Bڡ}g -,oOGp rl G~+S ̍2YWw+AseS-` eD7K~^ 4>pX`0uFD0CZ'C#*YLzSOW4 6<~1^LCF猻j^[8׬4U6ۈžLH~nDgb+#j ǁr] ]jNt85ea:/w\w z{W(bx(! @=jc5[WPRBb+ݠiam^/߻DPɵ(Ÿ5b4W,_c|,\QԖ`M"?e Pa`h7SfXTDJg:ZY)3$uߵk3]dʏ}J s͆pUxXd "uϸ#{z"DFՒZQb/(@(5ŜsUr埲J0knG[ lv vzĘ+TD|s90+@56%,`țfFࣀ2Gvlx ͪ ayU`!>"H>SSRܔgOy᝻>?pylV@7 xLܟLYƊ {V]٘T- ZύU@It4a,?yB}SjOd:uWo7BP|L sEE5j`ѩּbFvOIaFcN)c]N-{5>lf(tOWBBhMc/ Rw=qĵ'fB6B8g2ʯOOWX®(f+LlˉiE/;Ïj-x{}_:R0BcYu!ۡUMy9Lƍ5A0 2ymZ̯OaA.>KM*c?'1"L^k1hՄ