xen-doc-html-4.12.1_06-lp151.2.9.1 4>$  Ap]} /=„ȻSv0FVۙK`b!8 y0 jb'KAߪO6u(V9FJY!cG詯CS;Y=J@ٚCY(iɆbV^V~;z[!cy>-z op.MUv̎6""]WFmiqL68dk^,CvR~|HS]8 IkZ<é\Zzd<1Ep z_~mXae2ee715d31cdbe6edc0d4aa30e0e5b2ffb1257ce16153feb6ed357f2eeaa5235d59c87f3810b2153ad16f7ce15039e68a94fa1cT]} /=„i 0zCdF}zo: (m}zZx #Lܣ? (!]8J^9Uwul^AS:6 [!:~mn:|Ȝq%X 7` \#vHLbQhͤaW4r|^kE*' jWo82sb܀ڂ Ig782k$eeqB?$q~L ؞wr&]2Q;HaG s >p9hT?hDd % L EKTMM "M M M M  M@MMBdMO(s8|89"\8:7i8GZMH[4MI\hMX\Y\\\M]^ M^b bdceBdeeefeleueMvg gggh@Cxen-doc-html4.12.1_06lp151.2.9.1Xen Virtualization: HTML documentationXen is a virtual machine monitor for x86 that supports execution of multiple guest operating systems with unprecedented levels of performance and resource isolation. xen-doc-html contains the online documentation in HTML format. Point your browser at file:/usr/share/doc/packages/xen/html/ Authors: -------- Ian Pratt ]|cloud121 openSUSE Leap 15.1openSUSEGPL-2.0-onlyhttp://bugs.opensuse.orgDocumentation/HTMLhttp://www.cl.cam.ac.uk/Research/SRG/netos/xen/linuxx86_64ot9DA'6@7x3#B( W c e $,76H"yjQ <3 "z29 ;\xAAAA큤A큤A큤A큤A큤A큤A큤A큤]{]z@]z@]{]z@]z@]{]z@]{]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]z@]{]z@]z@]{]z@]{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-4.12.1_06-lp151.2.9.1.src.rpmxen-doc-htmlxen-doc-html(x86-64)     rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PartialHardlinkSets)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0.4-14.0-15.2-14.14.1]B]*]X]d@]@]@]]fl]M`@]B@]@]]@\\ޢ@\ڭ\\@\@\@\,@\7\\N\@\\+@\\M\M\\\@\}@\k\X)@\J@\I\A\?\=@\9\73\4\$\l@[H[k@[@[^[^[/[@[@[9@[v[W[CN@[<[6@[0@[0@['[!@[5@Z@ZnZ@ZZZ@ZmZԐ@ZZZ@ZZ}@Z}@Z}@Z}@Zz@Zz@Zo Zk@ZV@ZS]@ZOhZ:PZ1@Z.s@Z&@ZOZOZ Z Z Z@Z@Z }ZC@ZYYYY|Y@Y{Y*@Y5YA@Y4YYYbYY@Y3Y@YJYJY@YYV@Y@Ym@Yw2Yp@YlYh@Yh@YS@YJ_YI@Y5GY0Y-^Y(Y"YY;@YYY@YtY.X@XQ@X@XۡXg@X@XƉX@X @X@X@X@X@XXX@XXXwoXs{@XlXWXRXQ4@XEVX43@X.@X*X lX&X@XX@W@W֘W֘W^@WiW:Wt@W.@W9WW@Wk@Wi,@WbWZWZWZWYZ@WV@WEWBW=W;W3W1@W1@W,@W(W(W(W(W(W#LWVbV(@V3VJVxV'@VV2V͛@VŲ@V`VwVVV=@VV@VHV@VvV%@VV<@V@VS@VV@V^VwVqR@Vn@VXEVUVTQ@VMVMVMVA@V;DV9@V7P@V0V*!@V V@VCVVVf@VqV@UYU@U@UUݪ@U@UnU4@UUK@UU@UU>U@Ux&Un@U\w@U[%UUUPUKSU>$U6;U%@UU@UUU.@TgT-@TT@TZ@TZ@T@TT@T5T@TLTLT~@Tl@Ti@Ta@THT?@T=@carnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comJim Fehlig ohering@suse.deMartin Liška ohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comJan Engelhardt Guillaume GARDET Guillaume GARDET Bernhard Wiedemann carnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deBernhard Wiedemann ohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comtrenn@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.dejfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.deohering@suse.derbrown@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comjfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.dejfehlig@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comohering@suse.dejfehlig@suse.comcarnold@suse.comjfehlig@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.commlatimer@suse.comcarnold@suse.comcyliu@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.derguenther@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comrguenther@suse.comcarnold@suse.commeissner@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.com- bsc#1158003 - VUL-0: CVE-2019-19581,CVE-2019-19582: xen: XSA-307 - find_next_bit() issues xsa307.patch - bsc#1158004 - VUL-0: CVE-2019-19583: xen: XSA-308 - VMX: VMentry failure with debug exceptions and blocked states xsa308.patch - bsc#1158005 - VUL-0: CVE-2019-19578: xen: XSA-309 - Linear pagetable use / entry miscounts xsa309.patch - bsc#1158006 - VUL-0: CVE-2019-19580: xen: XSA-310 - Further issues with restartable PV type change operations xsa310-1.patch xsa310-2.patch xsa310-3.patch - bsc#1158007 - VUL-0: CVE-2019-19577: xen: XSA-311 - dynamic height for the IOMMU pagetables xsa311.patch - Upstream bug fixes (bsc#1027519) 5dd6b229-add-va_end-to-hypercall_create_continuation.patch 5dd8126b-x86-vLAPIC-allow-APIC_SPIV_FOCUS_DISABLED.patch 5dd93ce0-vVMX-fix-livelock-with-XSA-304-fix.patch 5ddbb3d3-x86-mm-adjust-linear-usage-accounting.patch 5ddcff90-libxc-x86-dont-bump-ApicIdCoreSize-past-7.patch 5ddd2555-IOMMU-always-quarantine-PCI-devs.patch (Replaces xsa306.patch) 5ddd25f9-EFI-fix-efi=attr-handling.patch 5ddfa851-VMX-always-sync-PIR-to-IRR.patch 5ddfd62b-x86-internal-IRQs-honor-PEOI-stack.patch 5de0007e-VMX-early-task-switch-failures-semantics.patch 5de0007e-SVM-always-intercept-ICEBP.patch 5de0007e-SVM-write-correct-eip-into-outgoing-task.patch 5de1632a-x86-IOMMU-scratch-page-in-quarantine-dom.patch 5de19115-rationalize-max-grant_frames-maptrack_frames.patch 5de52a86-x86-PSR-dont-write-out-of-range-COS.patch 5de65f84-gnttab-map-always-do-IOMMU-part.patch 5de65fc4-x86-avoid-HPET-use-on-certain-Intel.patch- bsc#1157047 - PCI passthrough failed on AMD machine xen host 5dca846c-x86-fix-clear_IO_APIC_pin-raw-writes.patch 5dca84a2-AMD-IOMMU-dont-needlessly-trigger-errors-on-unmap.patch - bsc#1157888 - - VUL-0: xen: Device quarantine for alternate pci assignment methods xsa306.patch - Upstream bug fixes (bsc#1027519) 5dcae816-VT-x-runtime-modification-of-exec-sp.patch 5dcae816-VT-d-hide-superpages-for-SandyBridge.patch (Replaces xsa304-1.patch) 5dcae816-VT-x-work-around-executable-EPT-superpages.patch (Replaces xsa304-2.patch) 5dcae816-x86-introduce-tsx-option.patch (Replaces xsa305-1.patch) 5dcae816-x86-spec-ctrl-mitigate-TAA.patch (Replaces xsa305-2.patch)- Minor adjustments to these security patches for bsc#1155945 and bsc#1152497 xsa304-1.patch xsa304-2.patch xsa305-1.patch xsa305-2.patch- bsc#1154448 - VUL-0: CVE-2019-18420: xen: XSA-296: VCPUOP_initialise DoS 5dbaf89f-dont-use-BUG-for-parameter-checking.patch - bsc#1154456 - VUL-0: CVE-2019-18425: xen: XSA-298: missing descriptor table limit checking in x86 PV emulation 5dbaf8e0-x86-PV-check-GDT-LDT-limits-during-emulation.patch - bsc#1154458 - VUL-0: CVE-2019-18421: xen: XSA-299: Issues with restartable PV type change operations 5dbaf990-x86-mm-L1TF-checks-dont-leave-partial-entry.patch 5dbaf9b2-x86-mm-dont-re-set-PGT_pinned-on-partial-page.patch 5dbaf9ce-x86-mm-split-partial_pte-tristate.patch 5dbaf9f5-x86-mm-use-flags-for-_put_page_type.patch 5dbafa13-x86-mm-rework-get_page_and_type_from_mfn-conditional.patch 5dbafa46-x86-mm-alloc_lN_table-clear-partial_flags-when-preempting.patch 5dbafa5c-x86-mm-always-retain-general-ref-on-partial.patch 5dbafaa4-x86-mm-properly-handle-linear-pt-promotion-failure.patch 5dbafabd-x86-mm-fix-nested-devalidation-on-error.patch 5dbafad5-x86-mm-dont-drop-type-ref-unless.patch 5dbc0d64-x86-fix-CONFIG_PV-build-following-XSA-299.patch - bsc#1154460 - VUL-0: CVE-2019-18423: xen: XSA-301: add-to-physmap can be abused to DoS Arm hosts 5dbafb0d-Arm-p2m-avoid-aliasing-guest-physical-frame.patch 5dbafb4e-Arm-p2m-avoid-off-by-1-check-on-max_mapped_gfn.patch 5dbafb72-Arm-p2m-dont-check-p2m_get_root_pointer-ret-with-BUG_ON.patch - bsc#1154461 - VUL-0: CVE-2019-18424: xen: XSA-302: passed through PCI devices may corrupt host memory after deassignment 5dbafba5-passthrough-quarantine-PCI-devices.patch - bsc#1154464 - VUL-0: CVE-2019-18422: xen: XSA-303: ARM: Interrupts are unconditionally unmasked in exception handlers 5dbafbda-Arm32-entry-Split-__DEFINE_ENTRY_TRAP.patch 5dbafbfd-Arm32-entry-fold-SAVE_ALL-into-vector-macro.patch 5dbafc3a-Arm32-dont-unmask-interrupts-on-trap-without-level-change.patch 5dbafc4f-Arm64-dont-unmask-interrupts-on-trap-without-level-change.patch - bsc#1155945 - VUL-0: CVE-2018-12207: xen: Machine Check Error Avoidance on Page Size Change (aka IFU issue) xsa304-1.patch xsa304-2.patch - bsc#1152497 - VUL-0: CVE-2019-11135: xen: XSA-305: TSX Asynchronous Abort (TAA) issue xsa305-1.patch xsa305-2.patch - Upstream bug fixes (bsc#1027519) 5d9ef2a1-EFI-deref-pointer-in-set_color.patch 5d9f454a-x86-EFI-pixel-reserved-0.patch 5db2b4a2-x86-is_xen_fixed_mfn-off-by-1.patch 5d9ee2f0-AMD-IOMMU-allocate_buffer-avoid-memset.patch 5db892ac-VT-x-fix-Haswell-Broadwell-LBR-TSX-errata.patch 5d948bdb-IOMMU-add-missing-HVM-check.patch 5d9ee312-AMD-IOMMU-prefill-all-DTEs.patch 5d9ef2c5-EFI-gfx-mode-for-MB2-boot.patch 5db892ac-VT-x-correct-BDF93-workaround.patch 5d947b01-x86-crash-force-unlock-console.patch 5d8ce179-sched-dont-leak-XEN_RUNSTATE_UPDATE.patch 5d9ef2ef-PCI-clear-maskall-fields-on-assign.patch 5d9ee2a8-AMD-IOMMU-alloc-1-devtab-per-PCI-seg.patch 5db07974-x86-update-time-info-on-TSC-adjustments.patch 5dbafa7f-x86-mm-collapse-PTF_partial_.patch- bsc#1120095 - add code to change LIBXL_HOTPLUG_TIMEOUT at runtime The included README has details about the impact of this change libxl.LIBXL_HOTPLUG_TIMEOUT.patch- bsc#1135799 - Partner-L3: Xen crashes on AMD ROME based machines 5ca7660f-x86-entry-drop-unused-includes.patch 5cf8da09-adjust-sysdom-creation-call-earlier-on-x86.patch 5cab2a6b-x86-ACPI-also-parse-AMD-tables-early.patch 5cab2ab7-x86-IOMMU-introduce-init-ops.patch 5cab2ae8-x86-IOMMU-abstract-iommu_supports_eim.patch 5cab2b4e-x86-IOMMU-abstract-iommu_enable_x2apic_IR.patch 5cab2b95-x86-IOMMU-initialize-iommu_ops-in.patch 5cac9a4b-x86-IOMMU-abstract-adjust_vtd_irq_affinities.patch 5cdeac7f-AMD-IOMMU-adjust-IOMMU-list-head-init.patch 5d0cf4e4-AMD-IOMMU-initialize-IRQ-tasklet-once.patch 5d149bb0-AMD-IOMMU-dont-add-IOMMUs.patch 5d1b3fab-AMD-IOMMU-restrict-feature-logging.patch 5d358508-x86-IRQ-desc-affinity-represents-request.patch 5d358534-x86-IRQ-consolidate-arch-cpu_mask-use.patch 5d358a67-AMD-IOMMU-pass-IOMMU-to-iterate_ivrs_entries-cb.patch 5d358a92-AMD-IOMMU-pass-IOMMU-to-amd_iommu_alloc_intremap_table.patch 5d39811c-x86-IOMMU-dont-restrict-IRQ-affinities.patch 5d417813-AMD-IOMMU-bitfield-extended-features.patch 5d417838-AMD-IOMMU-bitfield-control-reg.patch 5d41785b-AMD-IOMMU-bitfield-IRTE.patch 5d41787e-AMD-IOMMU-pass-IOMMU-to-gfu-intremap-entry.patch 5d4178ad-AMD-IOMMU-128bit-non-guest-APIC-IRTE.patch 5d4178fc-AMD-IOMMU-split-amd_iommu_init_one.patch 5d41793f-AMD-IOMMU-allow-enabling-without-IRQ.patch 5d417a16-AMD-IOMMU-adjust-IRQ-setup-for-x2APIC.patch 5d417ab6-AMD-IOMMU-enable-x2APIC-mode.patch 5d417b38-AMD-IOMMU-correct-IRTE-updating.patch 5d417b6a-AMD-IOMMU-dont-needlessly-log-headers.patch 5d4a9d25-AMD-IOMMU-drop-not-found-message.patch 5d80e7c0-AMD-IOMMU-free-shared-IRT-once.patch 5d80e80d-AMD-IOMMU-valid-flag-for-IVRS-mappings.patch 5d80e82e-AMD-IOMMU-alloc_intremap_table-callers-handle-errors.patch 5d80e857-x86-PCI-read-MSI-X-table-entry-count-early.patch 5d8b72e5-AMD-IOMMU-dont-blindly-alloc-intremap-tables.patch 5d8b730e-AMD-IOMMU-phantom-funcs-share-intremap-tables.patch 5d8b733b-x86-PCI-read-max-MSI-vector-count-early.patch 5d8b736d-AMD-IOMMU-replace-INTREMAP_ENTRIES.patch 5d8b7393-AMD-IOMMU-restrict-intremap-table-sizes.patch - bsc#1145240 - [Migration]Can't pre-allocate 1 shadow pages 5d70bfba-x86-shadow-dont-enable-with-too-small-allocation.patch - bsc#1137717 - [HPS Bug] Unable to install Windows Server 2016 with 2 CPUs setting (or above) under SLES12 SP4 Xen Server on AMD ROME platform 5d89d8d9-libxc-x86-avoid-overflow-in-CPUID-APIC-ID.patch - Upstream bug fixes (bsc#1027519) 5d67ceaf-x86-properly-gate-PKU-clearing.patch 5d779811-x86-fix-CPUID7-0-eax-levelling-MSR.patch 5d77b40f-fix-hvm_all_ioreq_servers_add_vcpu-cleanup.patch 5d80ea13-vpci-honor-read-only-devices.patch 5d8b715f-ACPI-cpuidle-bump-max-num-of-states.patch- bsc#1145774 - Libivrtd segfaults when trying to live migrate a VM Fix crash in an error path of libxl_domain_suspend with libxl.helper_done-crash.patch- Upstream bug fixes (bsc#1027519) 5d419d49-x86-spec-ctrl-report-proper-status.patch 5d43253c-x86-ucode-always-collect_cpu_info-at-boot.patch 5d4aa36f-x86-apic-enable-x2APIC-mode-earlier.patch 5d4afa7a-credit2-fix-memory-leak.patch 5d4d850a-introduce-bss-percpu-page-aligned.patch 5d516531-x86-xpti-dont-leak-TSS-adjacent-data.patch 5d5bf475-x86-PV-fix-handling-of-iommu-mappings.patch 5d6524ca-x86-mm-correctly-init-M2P-entries.patch - Drop 5d419d49-x86-spec-ctrl-facilities-report-wrong-status.patch- Update to Xen 4.12.1 bug fix release (bsc#1027519) xen-4.12.1-testing-src.tar.bz2 - Drop patches contained in new tarball 5c87b644-IOMMU-leave-enabled-for-kexec-crash.patch 5c87b6a2-x86-HVM-dont-crash-guest-in-find_mmio_cache.patch 5c87b6c8-drop-arch_evtchn_inject.patch 5c87b6e8-avoid-atomic-rmw-accesses-in-map_vcpu_info.patch 5c87e6d1-x86-TSX-controls-for-RTM-force-abort-mode.patch 5c8f752c-x86-e820-build-with-gcc9.patch 5c8fb92d-x86-HVM-split-linear-reads-and-writes.patch 5c8fb951-x86-HVM-finish-IOREQs-correctly-on-completion.patch 5c8fc6c0-x86-MSR-shorten-ARCH_CAPABILITIES.patch 5c8fc6c0-x86-SC-retpoline-safety-calculations-for-eIBRS.patch 5c9e63c5-credit2-SMT-idle-handling.patch 5ca46b68-x86emul-no-GPR-update-upon-AVX-gather-failures.patch 5ca773d1-x86emul-dont-read-mask-reg-without-AVX512F.patch 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch 5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch 5cd921fb-trace-fix-build-with-gcc9.patch 5cd9224b-AMD-IOMMU-disable-upon-init-fail.patch 5cd922c5-x86-MTRR-recalc-p2mt-when-iocaps.patch 5cd9230f-VMX-correctly-get-GS_SHADOW-for-current.patch 5cd926d0-bitmap_fill-zero-sized.patch 5cd92724-drivers-video-drop-constraints.patch 5cd93a69-x86-MSR_INTEL_CORE_THREAD_COUNT.patch 5cd93a69-x86-boot-detect-Intel-SMT-correctly.patch 5cd93a69-x86-spec-ctrl-reposition-XPTI-parsing.patch 5cd981ff-x86-IRQ-tracing-avoid-UB-or-worse.patch 5cdad090-x86-spec-ctrl-CPUID-MSR-definitions-for-MDS.patch 5cdad090-x86-spec-ctrl-infrastructure-for-VERW-flush.patch 5cdad090-x86-spec-ctrl-misc-non-functional-cleanup.patch 5cdad090-x86-spec-ctrl-opts-to-control-VERW-flush.patch 5cdeb9fd-sched-fix-csched2_deinit_pdata.patch 5ce7a92f-x86-IO-APIC-fix-build-with-gcc9.patch 5cf0f6a4-x86-vhpet-resume-avoid-small-diff.patch 5cf16e51-x86-spec-ctrl-Knights-retpoline-safe.patch 5d03a0c4-1-Arm-add-an-isb-before-reading-CNTPCT_EL0.patch 5d03a0c4-2-gnttab-rework-prototype-of-set_status.patch 5d03a0c4-3-Arm64-rewrite-bitops-in-C.patch 5d03a0c4-4-Arm32-rewrite-bitops-in-C.patch 5d03a0c4-5-Arm-bitops-consolidate-prototypes.patch 5d03a0c4-6-Arm64-cmpxchg-simplify.patch 5d03a0c4-7-Arm32-cmpxchg-simplify.patch 5d03a0c4-8-Arm-bitops-helpers-with-timeout.patch 5d03a0c4-9-Arm-cmpxchg-helper-with-timeout.patch 5d03a0c4-A-Arm-turn-on-SILO-mode-by-default.patch 5d03a0c4-B-bitops-guest-helpers.patch 5d03a0c4-C-cmpxchg-guest-helpers.patch 5d03a0c4-D-use-guest-atomics-helpers.patch 5d03a0c4-E-Arm-add-perf-counters-in-guest-atomic-helpers.patch 5d03a0c4-F-Arm-protect-gnttab_clear_flag.patch - Refreshed patches libxl.pvscsi.patch- bsc#1143563 - Speculative mitigation facilities report wrong status 5d419d49-x86-spec-ctrl-facilities-report-wrong-status.patch- bsc#1138563 - L3: xenpvnetboot improperly ported to Python 3 fix-xenpvnetboot.patch- bsc#1138294 - VUL-0: CVE-2019-17349: XSA-295: Unlimited Arm Atomics Operations 5d03a0c4-1-Arm-add-an-isb-before-reading-CNTPCT_EL0.patch 5d03a0c4-2-gnttab-rework-prototype-of-set_status.patch 5d03a0c4-3-Arm64-rewrite-bitops-in-C.patch 5d03a0c4-4-Arm32-rewrite-bitops-in-C.patch 5d03a0c4-5-Arm-bitops-consolidate-prototypes.patch 5d03a0c4-6-Arm64-cmpxchg-simplify.patch 5d03a0c4-7-Arm32-cmpxchg-simplify.patch 5d03a0c4-8-Arm-bitops-helpers-with-timeout.patch 5d03a0c4-9-Arm-cmpxchg-helper-with-timeout.patch 5d03a0c4-A-Arm-turn-on-SILO-mode-by-default.patch 5d03a0c4-B-bitops-guest-helpers.patch 5d03a0c4-C-cmpxchg-guest-helpers.patch 5d03a0c4-D-use-guest-atomics-helpers.patch 5d03a0c4-E-Arm-add-perf-counters-in-guest-atomic-helpers.patch 5d03a0c4-F-Arm-protect-gnttab_clear_flag.patch - Upstream bug fixes (bsc#1027519) 5c87b6c8-drop-arch_evtchn_inject.patch 5c87b6e8-avoid-atomic-rmw-accesses-in-map_vcpu_info.patch 5cd921fb-trace-fix-build-with-gcc9.patch 5cd9224b-AMD-IOMMU-disable-upon-init-fail.patch 5cd922c5-x86-MTRR-recalc-p2mt-when-iocaps.patch 5cd9230f-VMX-correctly-get-GS_SHADOW-for-current.patch 5cd926d0-bitmap_fill-zero-sized.patch 5cd92724-drivers-video-drop-constraints.patch 5cd93a69-x86-spec-ctrl-reposition-XPTI-parsing.patch (Replaces xsa297-0a.patch) 5cd93a69-x86-MSR_INTEL_CORE_THREAD_COUNT.patch (Replaces xsa297-0b.patch) 5cd93a69-x86-boot-detect-Intel-SMT-correctly.patch (Replaces xsa297-0c.patch) 5cdad090-x86-spec-ctrl-misc-non-functional-cleanup.patch (Replaces xsa297-0d.patch) 5cdad090-x86-spec-ctrl-CPUID-MSR-definitions-for-MDS.patch (Replaces xsa297-1.patch) 5cdad090-x86-spec-ctrl-infrastructure-for-VERW-flush.patch (Replaces xsa297-2.patch) 5cdad090-x86-spec-ctrl-opts-to-control-VERW-flush.patch (Replaces xsa297-3.patch) 5cd981ff-x86-IRQ-tracing-avoid-UB-or-worse.patch 5cdeb9fd-sched-fix-csched2_deinit_pdata.patch 5ce7a92f-x86-IO-APIC-fix-build-with-gcc9.patch 5cf0f6a4-x86-vhpet-resume-avoid-small-diff.patch 5cf16e51-x86-spec-ctrl-Knights-retpoline-safe.patch- Fix some outdated information in the readme README.SUSE- spec: xen-tools: require matching version of xen package bsc#1137471- Remove two stale patches xen.build-compare.man.patch xenpaging.doc.patch- Disable LTO (boo#1133296).- Remove arm32 from ExclusiveArch to fix build- bsc#1111331 - VUL-0: CPU issues Q2 2019 aka "Group 4". CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 xsa297-0a.patch xsa297-0b.patch xsa297-0c.patch xsa297-0d.patch xsa297-1.patch xsa297-2.patch xsa297-3.patch - Update 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch and drop 5cac6219-xen-cpu-Fix-ARM-build-following-cs-597fbb8.patch Refresh 5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch- bsc#1131811 - [XEN] internal error: libxenlight failed to create new domain. This patch is a workaround for a systemd issue. See patch header for additional comments. xenstore-launch.patch- bsc#1125378 - [xen][pygrub] Can not restore sle11sp4 pv guest after upgrading host from sle11sp4 to sle15sp1 pygrub-python3-conversion.patch - Fix "TypeError: virDomainDefineXML() argument 2 must be str or None, not bytes" when converting VMs from using the xm/xend toolstack to the libxl/libvirt toolstack. (bsc#1123378) xen2libvirt.py- bsc#1124560 - Fully virtualized guests crash on boot 5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch - bsc#1121391 - GCC 9: xen build fails 5c8f752c-x86-e820-build-with-gcc9.patch - Upstream bug fixes (bsc#1027519) 5c87b644-IOMMU-leave-enabled-for-kexec-crash.patch 5c87b6a2-x86-HVM-dont-crash-guest-in-find_mmio_cache.patch 5c87e6d1-x86-TSX-controls-for-RTM-force-abort-mode.patch 5c8fb92d-x86-HVM-split-linear-reads-and-writes.patch 5c8fb951-x86-HVM-finish-IOREQs-correctly-on-completion.patch 5c8fc6c0-x86-MSR-shorten-ARCH_CAPABILITIES.patch 5c8fc6c0-x86-SC-retpoline-safety-calculations-for-eIBRS.patch 5c9e63c5-credit2-SMT-idle-handling.patch 5ca46b68-x86emul-no-GPR-update-upon-AVX-gather-failures.patch 5ca773d1-x86emul-dont-read-mask-reg-without-AVX512F.patch 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch 5cac6219-xen-cpu-Fix-ARM-build-following-cs-597fbb8.patch- Install pkgconfig files into libdir instead of datadir- Update to Xen 4.12.0 FCS release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2 * HVM/PVH and PV only Hypervisor: The Xen 4.12 release separates the HVM/PVH and PV code paths in Xen and provides KCONFIG options to build a PV only or HVM/PVH only hypervisor. * QEMU Deprivilege (DM_RESTRICT): In Xen 4.12, this feature has been vastly improved. * Argo - Hypervisor-Mediated data eXchange: Argo is a new inter- domain communication mechanism. * Improvements to Virtual Machine Introspection: The VMI subsystem which allows detection of 0-day vulnerabilities has seen many functional and performance improvements. * Credit 2 Scheduler: The Credit2 scheduler is now the Xen Project default scheduler. * PVH Support: Grub2 boot support has been added to Xen and Grub2. * PVH Dom0: PVH Dom0 support has now been upgraded from experimental to tech preview. * The Xen 4.12 upgrade also includes improved IOMMU mapping code, which is designed to significantly improve the startup times of AMD EPYC based systems. * The upgrade also features Automatic Dom0 Sizing which allows the setting of Dom0 memory size as a percentage of host memory (e.g. 10%) or with an offset (e.g. 1G+10%).- bsc#1130485 - Please drop Requires on multipath-tools in xen-tools. Now using Recommends multipath-tools. xen.spec- Update to Xen 4.12.0 RC7 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- Update to Xen 4.12.0 RC6 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- bsc#1026236 - add Xen cmdline option "suse_vtsc_tolerance" to avoid TSC emulation for HVM domUs if their expected frequency does not match exactly the frequency of the receiving host xen.bug1026236.suse_vtsc_tolerance.patch- Update to Xen 4.12.0 RC5 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- jsc#SLE-3059 - Disable Xen auto-ballooning - Add CONFIG_DOM0_MEM to the spec file for managing dom0 memory. xen.spec - Disable autoballooning in xl.con xl-conf-disable-autoballoon.patch- Update gcc9-ignore-warnings.patch to fix build in SLE12- bsc#1126325 - fix crash in libxl in error path Setup of grant_tables and other variables may fail libxl.prepare-environment-for-domcreate_stream_done.patch- bsc#1127620 - Documentation for the xl configuration file allows for firmware=pvgrub64 but we don't ship pvgrub64. Create a link from grub.xen to pvgrub64 xen.spec- Update to Xen 4.12.0 RC4 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2 - Tarball also contains additional post RC4 security fixes for Xen Security Advisories 287, 288, and 290 through 294.- Update to Xen 4.12.0 RC3 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- Update to Xen 4.12.0 RC2 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- bsc#1121391 - GCC 9: xen build fails gcc9-ignore-warnings.patch- bsc#1122563 - Virtualization/xen: Bug no Xen on boot, missing /proc/xen, after 4.11 -> 4.12 upgrade on X86_64/efi. Keep xen.efi in /usr/lib64/efi for booting older distros. xen.spec- fate#326960: Package grub2 as noarch. As part of the effort to have a unified bootloader across architectures, modify the xen.spec file to move the Xen efi files to /usr/share/efi/$(uname -m) from /usr/lib64/efi.- Update to Xen 4.12.0 RC1 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2 - Drop 5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch 5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch 5b8fae26-tools-libxl-correct-vcpu-affinity-output-with-sparse-physical-cpu-map.patch 5b8fae26-xen-fill-topology-info-for-all-present-cpus.patch 5b8fb5af-tools-xl-refuse-to-set-number-of-vcpus-to-0-via-xl-vcpu-set.patch 5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch 5b9784d2-x86-HVM-add-known_gla-helper.patch 5b9784f2-x86-HVM-split-page-straddling-accesses.patch 5bdc31d5-VMX-fix-vmx_handle_eoi.patch gcc8-fix-array-warning-on-i586.patch gcc8-fix-format-warning-on-i586.patch gcc8-inlining-failed.patch xen.bug1079730.patch- bsc#1121960 - xen: sync with Factory xen.spec xen.changes- Replace old $RPM_* shell vars. - Run fdupes for all architectures, and not crossing subvolume boundaries.- Do not run %fdupes on aarch64 to avoid the hardlink-across-partition rpmlint error- Require qemu-seabios only on x86* as it is not available on non-x86 systems- Avoid creating dangling symlinks (bsc#1116524) This reverts the revert of tmp_build.patch- Update to Xen 4.11.1 bug fix release (bsc#1027519) xen-4.11.1-testing-src.tar.bz2 - 5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch replaces xen.2b50cdbc444c637575580dcfa6c9525a84d5cc62.patch - 5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch replaces xen.b8f33431f3dd23fb43a879f4bdb4283fdc9465ad.patch - Drop the following patches contained in the new tarball 5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch 5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch 5b3cab8e-2-VMX-improve-MSR-load-save-API.patch 5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch 5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch 5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch 5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch 5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch 5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch 5b3f8fa5-port-array_index_nospec-from-Linux.patch 5b4321f6-x86-correctly-set-nonlazy_xstate_used-when-loading-full-state.patch 5b4488e7-x86-spec-ctrl-cmdline-handling.patch 5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch 5b4c9a60-allow-cpu_down-to-be-called-earlier.patch 5b4db308-SVM-fix-cleanup-svm_inject_event.patch 5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch 5b5040f2-x86-AMD-distinguish-CU-from-HT.patch 5b505fe5-VMX-fix-find-msr-build.patch 5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch 5b508775-2-x86-possibly-bring-up-all-CPUs.patch 5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch 5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch 5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch 5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch 5b56feb1-hvm-Disallow-unknown-MSR_EFER-bits.patch 5b56feb2-spec-ctrl-Fix-the-parsing-of-xpti--on-fixed-Intel-hardware.patch 5b62ca93-VMX-avoid-hitting-BUG_ON.patch 5b6d84ac-x86-fix-improve-vlapic-read-write.patch 5b6d8ce2-x86-XPTI-parsing.patch 5b72fbbe-ARM-disable-grant-table-v2.patch 5b72fbbe-oxenstored-eval-order.patch 5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch 5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch 5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch 5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch 5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch 5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch 5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch 5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch 5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch 5b72fbbf-x86-Make-spec-ctrl-no-a-global-disable-of-all-mitigations.patch 5b72fbbf-xl.conf-Add-global-affinity-masks.patch 5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch 5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch 5b75afef-x86-setup-avoid-OoB-E820-lookup.patch 5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch 5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch 5b8d5832-x86-assorted-array_index_nospec-insertions.patch 5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch 5bacae4b-x86-boot-allocate-extra-module-slot.patch 5bae44ce-x86-silence-false-log-messages.patch 5bb60c12-x86-split-opt_xpti.patch 5bb60c4f-x86-split-opt_pv_l1tf.patch 5bb60c74-x86-fix-xpti-and-pv-l1tf.patch 5bcf0722-x86-boot-enable-NMIs.patch 5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch 5bd076e9-x86-boot-init-debug-regs-correctly.patch 5bd076e9-x86-init-vcpu-debug-regs-correctly.patch 5bd0e0cf-vvmx-Disallow-the-use-of-VT-x-instructions-when-nested-virt-is-disabled.patch 5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch 5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch 5be2a308-x86-extend-get_platform_badpages.patch 5be2a354-x86-work-around-HLE-host-lockup-erratum.patch xsa275-1.patch xsa275-2.patch xsa276-1.patch xsa276-2.patch xsa277.patch xsa279.patch xsa280-1.patch xsa280-2.patch- bsc#1116524 - Package xen-tools-4.11.0_09-2.1.x86_64 broken: Missing /bin/domu-xenstore. This was broken because "make package build reproducible" change. (boo#1047218, boo#1062303) This fix reverses the change to this patch. tmp_build.patch- bsc#1115040 - VUL-0: CVE-2018-19961 CVE-2018-19962: xen: insufficient TLB flushing / improper large page mappings with AMD IOMMUs (XSA-275) xsa275-1.patch xsa275-2.patch - bsc#1115043 - VUL-0: CVE-2018-19963: xen: resource accounting issues in x86 IOREQ server handling (XSA-276) xsa276-1.patch xsa276-2.patch - bsc#1115044 - VUL-0: CVE-2018-19964: xen: x86: incorrect error handling for guest p2m page removals (XSA-277) xsa277.patch - bsc#1114405 - VUL-0: CVE-2018-18883: xen: Nested VT-x usable even when disabled (XSA-278) 5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch - bsc#1115045 - VUL-0: xen: CVE-2018-19965: x86: DoS from attempting to use INVPCID with a non-canonical addresses (XSA-279) xsa279.patch - bsc#1115047 - VUL-0: CVE-2018-19966: xen: Fix for XSA-240 conflicts with shadow paging (XSA-280) xsa280-1.patch xsa280-2.patch - bsc#1114988 - VUL-0: CVE-2018-19967: xen: guest use of HLE constructs may lock up host (XSA-282) 5be2a308-x86-extend-get_platform_badpages.patch 5be2a354-x86-work-around-HLE-host-lockup-erratum.patch - bsc#1108940 - L3: XEN SLE12-SP1 domU hang on SLE12-SP3 HV 5bdc31d5-VMX-fix-vmx_handle_eoi.patch - Upstream bug fixes (bsc#1027519) 5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch 5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch 5bacae4b-x86-boot-allocate-extra-module-slot.patch 5bae44ce-x86-silence-false-log-messages.patch 5bb60c12-x86-split-opt_xpti.patch 5bb60c4f-x86-split-opt_pv_l1tf.patch 5bb60c74-x86-fix-xpti-and-pv-l1tf.patch 5bcf0722-x86-boot-enable-NMIs.patch 5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch 5bd076e9-x86-boot-init-debug-regs-correctly.patch 5bd076e9-x86-init-vcpu-debug-regs-correctly.patch 5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch- bsc#1114405 - VUL-0: CVE-2018-18883: xen: Nested VT-x usable even when disabled (XSA-278) 5bd0e0cf-vvmx-Disallow-the-use-of-VT-x-instructions-when-nested-virt-is-disabled.patch- Use SMBIOS_REL_DATE instead of SMBIOS_DATE for reproducible binaries- make package build reproducible (boo#1047218, boo#1062303) * Set SMBIOS_REL_DATE * Update tmp_build.patch to use SHA instead of random build-id * Add reproducible.patch to use --no-insert-timestamp- Building with ncurses 6.1 will fail without xen.2b50cdbc444c637575580dcfa6c9525a84d5cc62.patch - Building libxl acpi support on aarch64 with gcc 8.2 will fail without xen.b8f33431f3dd23fb43a879f4bdb4283fdc9465ad.patch- bsc#1106263 - L3: The affinity reporting via 'xl vcpu-list' is apparently broken 5b8fae26-tools-libxl-correct-vcpu-affinity-output-with-sparse-physical-cpu-map.patch 5b8fae26-xen-fill-topology-info-for-all-present-cpus.patch 5b8fb5af-tools-xl-refuse-to-set-number-of-vcpus-to-0-via-xl-vcpu-set.patch- bsc#1094508 - L3: Kernel oops in fs/dcache.c called by d_materialise_unique() 5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch 5b9784d2-x86-HVM-add-known_gla-helper.patch 5b9784f2-x86-HVM-split-page-straddling-accesses.patch - bsc#1103279 - (CVE-2018-15470) VUL-0: CVE-2018-15470: xen: oxenstored does not apply quota-maxentity (XSA-272) 5b72fbbe-oxenstored-eval-order.patch - bsc#1103275 - (CVE-2018-15469) VUL-0: CVE-2018-15469: xen: Use of v2 grant tables may cause crash on ARM (XSA-268) 5b72fbbe-ARM-disable-grant-table-v2.patch - Upstream patches from Jan (bsc#1027519) 5b6d84ac-x86-fix-improve-vlapic-read-write.patch 5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch 5b75afef-x86-setup-avoid-OoB-E820-lookup.patch 5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch 5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch 5b8d5832-x86-assorted-array_index_nospec-insertions.patch - Drop 5b741962-x86-write-to-correct-variable-in-parse_pv_l1tf.patch- bsc#1078292 - rpmbuild -ba SPECS/xen.spec with xen-4.9.1 failed xen.spec- bsc#1091107 - VUL-0: CVE-2018-3646: xen: L1 Terminal Fault -VMM (XSA-273) 5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch 5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch 5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch 5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch 5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch 5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch 5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch 5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch - bsc#1103276 - VUL-0: CVE-2018-15468: xen: x86: Incorrect MSR_DEBUGCTL handling lets guests enable BTS (XSA-269) 5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch - Upstream prereq patches for XSA-273 and other upstream fixes (bsc#1027519) 5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch 5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch 5b3cab8e-2-VMX-improve-MSR-load-save-API.patch 5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch 5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch 5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch 5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch 5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch 5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch 5b4321f6-x86-correctly-set-nonlazy_xstate_used-when-loading-full-state.patch 5b505fe5-VMX-fix-find-msr-build.patch 5b56feb1-hvm-Disallow-unknown-MSR_EFER-bits.patch 5b56feb2-spec-ctrl-Fix-the-parsing-of-xpti--on-fixed-Intel-hardware.patch 5b62ca93-VMX-avoid-hitting-BUG_ON.patch 5b6d8ce2-x86-XPTI-parsing.patch 5b72fbbf-x86-Make-spec-ctrl-no-a-global-disable-of-all-mitigations.patch 5b72fbbf-xl.conf-Add-global-affinity-masks.patch 5b741962-x86-write-to-correct-variable-in-parse_pv_l1tf.patch- Upstream patches from Jan (bsc#1027519) 5b3f8fa5-port-array_index_nospec-from-Linux.patch 5b4488e7-x86-spec-ctrl-cmdline-handling.patch 5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch 5b4c9a60-allow-cpu_down-to-be-called-earlier.patch 5b4db308-SVM-fix-cleanup-svm_inject_event.patch 5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch 5b5040f2-x86-AMD-distinguish-CU-from-HT.patch 5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch 5b508775-2-x86-possibly-bring-up-all-CPUs.patch 5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch 5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch 5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch 5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch gcc8-fix-format-warning-on-i586.patch gcc8-fix-array-warning-on-i586.patch - Drop xen.fuzz-_FORTIFY_SOURCE.patch gcc8-fix-warning-on-i586.patch- Update to Xen 4.11.0 FCS (fate#325202, fate#325123) xen-4.11.0-testing-src.tar.bz2 disable-building-pv-shim.patch - Dropped patches 5a33a12f-domctl-improve-locking-during-domain-destruction.patch 5a6703cb-x86-move-invocations-of-hvm_flush_guest_tlbs.patch 5a79d7ed-libxc-packed-initrd-dont-fail-domain-creation.patch 5a9985bd-x86-invpcid-support.patch 5ac72a48-gcc8.patch 5ac72a5f-gcc8.patch 5ac72a64-gcc8.patch 5ac72a69-gcc8.patch 5ac72a6e-gcc8.patch 5ac72a74-gcc8.patch 5ac72a7b-gcc8.patch 5ad4923e-x86-correct-S3-resume-ordering.patch 5ad49293-x86-suppress-BTI-mitigations-around-S3.patch 5ad600d4-x86-pv-introduce-x86emul_read_dr.patch 5ad600d4-x86-pv-introduce-x86emul_write_dr.patch 5ad8c3a7-x86-spec_ctrl-update-retpoline-decision-making.patch 5adda097-x86-HPET-fix-race-triggering-ASSERT.patch 5adda0d5-x86-HVM-never-retain-emulated-insn-cache.patch 5adde9ed-xpti-fix-double-fault-handling.patch 5ae06fad-SVM-fix-intercepts-for-SYS-CALL-ENTER-MSRs.patch 5ae31917-x86-cpuidle-init-stats-lock-once.patch 5aeaeae4-introduce-vcpu_sleep_nosync_locked.patch 5aeaeaf0-sched-fix-races-in-vcpu-migration.patch 5aeb2c57-x86-retval-checks-of-set-guest-trapbounce.patch 5aec7393-1-x86-xpti-avoid-copy.patch 5aec7393-2-x86-xpti-write-cr3.patch 5aec744a-3-x86-xpti-per-domain-flag.patch 5aec744a-4-x86-xpti-use-invpcid.patch 5aec744a-5-x86-xpti-no-global-pages.patch 5aec744a-6-x86-xpti-cr3-valid-flag.patch 5aec744a-7-x86-xpti-pv_guest_cr4_to_real_cr4.patch 5aec744b-8-x86-xpti-cr3-helpers.patch 5aec74a8-9-x86-xpti-use-pcid.patch 5af1daa9-1-x86-traps-fix-dr6-handing-in-DB-handler.patch 5af1daa9-2-x86-pv-move-exception-injection-into-test_all_events.patch 5af1daa9-3-x86-traps-use-IST-for-DB.patch 5af1daa9-4-x86-traps-fix-handling-of-DB-in-hypervisor-context.patch 5af1daa9-x86-HVM-guard-against-bogus-emulator-ioreq-state.patch 5af1daa9-x86-vpt-support-IO-APIC-routed-intr.patch 5af97999-viridian-cpuid-leaf-40000003.patch 5afc13ae-1-x86-read-MSR_ARCH_CAPABILITIES-once.patch 5afc13ae-2-x86-express-Xen-SPEC_CTRL-choice-as-variable.patch 5afc13ae-3-x86-merge-bti_ist_info-use_shadow_spec_ctrl.patch 5afc13ae-4-x86-fold-XEN_IBRS-ALTERNATIVES.patch 5afc13ae-5-x86-rename-bits-of-spec_ctrl-infrastructure.patch 5afc13ae-6-x86-elide-MSR_SPEC_CTRL-handling-in-idle.patch 5afc13ae-7-x86-split-X86_FEATURE_SC_MSR.patch 5afc13ae-8-x86-explicitly-set-Xen-default-SPEC_CTRL.patch 5afc13ae-9-x86-cpuid-improve-guest-policies-for-speculative.patch 5afc13ae-A-x86-introduce-spec-ctrl-cmdline-opt.patch 5b02c786-x86-AMD-mitigations-for-GPZ-SP4.patch 5b02c786-x86-Intel-mitigations-for-GPZ-SP4.patch 5b02c786-x86-msr-virtualise-SPEC_CTRL-SSBD.patch 5b0bc9da-x86-XPTI-fix-S3-resume.patch 5b0d2286-libxc-x86-PV-dont-hand-through-CPUID-leaf-0x80000008.patch 5b0d2d91-x86-suppress-sync-when-XPTI-off.patch 5b0d2dbc-x86-correct-default_xen_spec_ctrl.patch 5b0d2ddc-x86-CPUID-dont-override-tool-stack-hidden-STIBP.patch 5b150ef9-x86-fix-error-handling-of-pv-dr7-shadow.patch 5b21825d-1-x86-support-fully-eager-FPU-context-switching.patch 5b21825d-2-x86-spec-ctrl-mitigations-for-LazyFPU.patch 5b238b92-x86-HVM-account-for-fully-eager-FPU.patch 5b2b7172-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b31e004-x86-HVM-emul-attempts-FPU-set-fpu_initialised.patch 5b323e3c-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b34882d-x86-mm-dont-bypass-preemption-checks.patch 5b348874-x86-refine-checks-in-DB-handler.patch 5b348897-libxl-qemu_disk_scsi_drive_string-break-out-common.patch 5b3488a2-libxl-restore-passing-ro-to-qemu-for-SCSI-disks.patch 5b34891a-x86-HVM-dont-cause-NM-to-be-raised.patch 5b348954-x86-guard-against-NM.patch libxl.Add-a-version-check-of-QEMU-for-QMP-commands.patch libxl.LIBXL_DESTROY_TIMEOUT.patch libxl.qmp-Tell-QEMU-about-live-migration-or-snapshot.patch xen_fix_build_with_acpica_20180427_and_new_packages.patch- Submit upstream patch libacpi: fixes for iasl >= 20180427 git commit 858dbaaeda33b05c1ac80aea0ba9a03924e09005 xen_fix_build_with_acpica_20180427_and_new_packages.patch This is needed for acpica package to get updated in our build service- Upstream patches from Jan (bsc#1027519) 5b02c786-x86-AMD-mitigations-for-GPZ-SP4.patch (Replaces Spectre-v4-1.patch) 5b02c786-x86-Intel-mitigations-for-GPZ-SP4.patch (Replaces Spectre-v4-2.patch) 5b02c786-x86-msr-virtualise-SPEC_CTRL-SSBD.patch (Replaces Spectre-v4-3.patch) 5b0bc9da-x86-XPTI-fix-S3-resume.patch 5b0d2286-libxc-x86-PV-dont-hand-through-CPUID-leaf-0x80000008.patch 5b0d2d91-x86-suppress-sync-when-XPTI-off.patch 5b0d2dbc-x86-correct-default_xen_spec_ctrl.patch 5b0d2ddc-x86-CPUID-dont-override-tool-stack-hidden-STIBP.patch 5b150ef9-x86-fix-error-handling-of-pv-dr7-shadow.patch 5b21825d-1-x86-support-fully-eager-FPU-context-switching.patch (Replaces xsa267-1.patch) 5b21825d-2-x86-spec-ctrl-mitigations-for-LazyFPU.patch (Replaces xsa267-2.patch) 5b238b92-x86-HVM-account-for-fully-eager-FPU.patch 5b2b7172-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b31e004-x86-HVM-emul-attempts-FPU-set-fpu_initialised.patch 5b323e3c-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b34882d-x86-mm-dont-bypass-preemption-checks.patch (Replaces xsa264.patch) 5b348874-x86-refine-checks-in-DB-handler.patch (Replaces xsa265.patch) 5b348897-libxl-qemu_disk_scsi_drive_string-break-out-common.patch (Replaces xsa266-1-<>.patch) 5b3488a2-libxl-restore-passing-ro-to-qemu-for-SCSI-disks.patch (Replaces xsa266-2-<>.patch) 5b34891a-x86-HVM-dont-cause-NM-to-be-raised.patch 5b348954-x86-guard-against-NM.patch- Fix more build gcc8 related failures with xen.fuzz-_FORTIFY_SOURCE.patch- bsc#1098403 - fix regression introduced by changes for bsc#1079730 a PV domU without qcow2 and/or vfb has no qemu attached. Ignore QMP errors for PV domUs to handle PV domUs with and without an attached qemu-xen. xen.bug1079730.patch- bsc#1097521 - VUL-0: CVE-2018-12891: xen: preemption checks bypassed in x86 PV MM handling (XSA-264) xsa264.patch - bsc#1097522 - VUL-0: CVE-2018-12893: xen: x86: #DB exception safety check can be triggered by a guest (XSA-265) xsa265.patch - bsc#1097523 - VUL-0: CVE-2018-12892: xen: libxl fails to honour readonly flag on HVM emulated SCSI disks (XSA-266) xsa266-1-libxl-qemu_disk_scsi_drive_string-Break-out-common-p.patch xsa266-2-libxl-restore-passing-readonly-to-qemu-for-SCSI-disk.patch- bsc#1095242 - VUL-0: CVE-2018-3665: xen: Lazy FP Save/Restore (XSA-267) xsa267-1.patch xsa267-2.patch- bsc#1092543 - GCC 8: xen build fails gcc8-fix-warning-on-i586.patch- bsc#1092631 - VUL-0: CVE-2018-3639: xen: V4 – Speculative Store Bypass aka "Memory Disambiguation" (XSA-263) 5ad4923e-x86-correct-S3-resume-ordering.patch 5ad49293-x86-suppress-BTI-mitigations-around-S3.patch 5afc13ae-1-x86-read-MSR_ARCH_CAPABILITIES-once.patch 5afc13ae-2-x86-express-Xen-SPEC_CTRL-choice-as-variable.patch 5afc13ae-3-x86-merge-bti_ist_info-use_shadow_spec_ctrl.patch 5afc13ae-4-x86-fold-XEN_IBRS-ALTERNATIVES.patch 5afc13ae-5-x86-rename-bits-of-spec_ctrl-infrastructure.patch 5afc13ae-6-x86-elide-MSR_SPEC_CTRL-handling-in-idle.patch 5afc13ae-7-x86-split-X86_FEATURE_SC_MSR.patch 5afc13ae-8-x86-explicitly-set-Xen-default-SPEC_CTRL.patch 5afc13ae-9-x86-cpuid-improve-guest-policies-for-speculative.patch 5afc13ae-A-x86-introduce-spec-ctrl-cmdline-opt.patch Spectre-v4-1.patch Spectre-v4-2.patch Spectre-v4-3.patch- Always call qemus xen-save-devices-state in suspend/resume to fix migration with qcow2 images (bsc#1079730) libxl.Add-a-version-check-of-QEMU-for-QMP-commands.patch libxl.qmp-Tell-QEMU-about-live-migration-or-snapshot.patch xen.bug1079730.patch- bsc#1087289 - L3: Xen BUG at sched_credit.c:1663 5aeaeae4-introduce-vcpu_sleep_nosync_locked.patch 5aeaeaf0-sched-fix-races-in-vcpu-migration.patch - Upstream patches from Jan (bsc#1027519) 5ad600d4-x86-pv-introduce-x86emul_read_dr.patch 5ad600d4-x86-pv-introduce-x86emul_write_dr.patch 5ad8c3a7-x86-spec_ctrl-update-retpoline-decision-making.patch 5adda097-x86-HPET-fix-race-triggering-ASSERT.patch 5adda0d5-x86-HVM-never-retain-emulated-insn-cache.patch 5ae06fad-SVM-fix-intercepts-for-SYS-CALL-ENTER-MSRs.patch 5ae31917-x86-cpuidle-init-stats-lock-once.patch 5aeb2c57-x86-retval-checks-of-set-guest-trapbounce.patch 5af1daa9-1-x86-traps-fix-dr6-handing-in-DB-handler.patch (Replaces xsa260-1.patch) 5af1daa9-2-x86-pv-move-exception-injection-into-test_all_events.patch (Replaces xsa260-2.patch) 5af1daa9-3-x86-traps-use-IST-for-DB.patch (Replaces xsa260-3.patch) 5af1daa9-4-x86-traps-fix-handling-of-DB-in-hypervisor-context.patch (Replaces xsa260-4.patch) 5af1daa9-x86-HVM-guard-against-bogus-emulator-ioreq-state.patch (Replaces xsa262.patch) 5af1daa9-x86-vpt-support-IO-APIC-routed-intr.patch (Replaces xsa261.patch) 5af97999-viridian-cpuid-leaf-40000003.patch- Fixes related to Page Table Isolation (XPTI). bsc#1074562 XSA-254 5a6703cb-x86-move-invocations-of-hvm_flush_guest_tlbs.patch 5a9985bd-x86-invpcid-support.patch 5adde9ed-xpti-fix-double-fault-handling.patch 5aec7393-1-x86-xpti-avoid-copy.patch 5aec7393-2-x86-xpti-write-cr3.patch 5aec744a-3-x86-xpti-per-domain-flag.patch 5aec744a-4-x86-xpti-use-invpcid.patch 5aec744a-5-x86-xpti-no-global-pages.patch 5aec744a-6-x86-xpti-cr3-valid-flag.patch 5aec744a-7-x86-xpti-pv_guest_cr4_to_real_cr4.patch 5aec744b-8-x86-xpti-cr3-helpers.patch 5aec74a8-9-x86-xpti-use-pcid.patch- bsc#1092543 - GCC 8: xen build fails 5ac72a48-gcc8.patch 5ac72a5f-gcc8.patch 5ac72a64-gcc8.patch 5ac72a69-gcc8.patch 5ac72a6e-gcc8.patch 5ac72a74-gcc8.patch 5ac72a7b-gcc8.patch gcc8-inlining-failed.patch- Update to Xen 4.10.1 bug fix release (bsc#1027519) xen-4.10.1-testing-src.tar.bz2 disable-building-pv-shim.patch - Drop the following patches contained in the new tarball 5a21a77e-x86-pv-construct-d0v0s-GDT-properly.patch 5a2fda0d-x86-mb2-avoid-Xen-when-looking-for-module-crashkernel-pos.patch 5a2ffc1f-x86-mm-drop-bogus-paging-mode-assertion.patch 5a313972-x86-microcode-add-support-for-AMD-Fam17.patch 5a32bd79-x86-vmx-dont-use-hvm_inject_hw_exception-in-.patch 5a4caa5e-x86-IRQ-conditionally-preserve-access-perm.patch 5a4caa8c-x86-E820-don-t-overrun-array.patch 5a4e2bca-x86-free-msr_vcpu_policy-during-destruction.patch 5a4e2c2c-x86-upcall-inject-spurious-event-after-setting-vector.patch 5a4fd893-1-x86-break-out-alternative-asm-into-separate-header.patch 5a4fd893-2-x86-introduce-ALTERNATIVE_2-macros.patch 5a4fd893-3-x86-hvm-rename-update_guest_vendor-to-cpuid_policy_changed.patch 5a4fd893-4-x86-introduce-cpuid_policy_updated.patch 5a4fd893-5-x86-entry-remove-partial-cpu_user_regs.patch 5a4fd894-1-x86-rearrange-RESTORE_ALL-to-restore-in-stack-order.patch 5a4fd894-2-x86-hvm-use-SAVE_ALL-after-VMExit.patch 5a4fd894-3-x86-erase-guest-GPRs-on-entry-to-Xen.patch 5a4fd894-4-clarifications-to-wait-infrastructure.patch 5a534c78-x86-dont-use-incorrect-CPUID-values-for-topology.patch 5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4-updates.patch 5a5e2cff-x86-Meltdown-band-aid.patch 5a5e2d73-x86-Meltdown-band-aid-conditional.patch 5a5e3a4e-1-x86-support-compiling-with-indirect-branch-thunks.patch 5a5e3a4e-2-x86-support-indirect-thunks-from-asm.patch 5a5e3a4e-3-x86-report-speculative-mitigation-details.patch 5a5e3a4e-4-x86-AMD-set-lfence-as-Dispatch-Serialising.patch 5a5e3a4e-5-x86-introduce-alternative-indirect-thunks.patch 5a5e3a4e-6-x86-definitions-for-Indirect-Branch-Controls.patch 5a5e3a4e-7-x86-cmdline-opt-to-disable-IBRS-IBPB-STIBP.patch 5a5e459c-1-x86-SVM-offer-CPUID-faulting-to-AMD-HVM-guests.patch 5a5e459c-2-x86-report-domain-id-on-CPUID.patch 5a68bc16-x86-acpi-process-softirqs-logging-Cx.patch 5a69c0b9-x86-fix-GET_STACK_END.patch 5a6b36cd-1-x86-cpuid-handling-of-IBRS-IBPB-STIBP-and-IBRS-for-guests.patch 5a6b36cd-2-x86-msr-emulation-of-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-3-x86-migrate-MSR_SPEC_CTRL.patch 5a6b36cd-4-x86-hvm-permit-direct-access-to-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-5-x86-use-SPEC_CTRL-on-entry.patch 5a6b36cd-6-x86-clobber-RSB-RAS-on-entry.patch 5a6b36cd-7-x86-no-alternatives-in-NMI-MC-paths.patch 5a6b36cd-8-x86-boot-calculate-best-BTI-mitigation.patch 5a6b36cd-9-x86-issue-speculation-barrier.patch 5a6b36cd-A-x86-offer-Indirect-Branch-Controls-to-guests.patch 5a6b36cd-B-x86-clear-SPEC_CTRL-while-idle.patch 5a7b1bdd-x86-reduce-Meltdown-band-aid-IPI-overhead.patch 5a843807-x86-spec_ctrl-fix-bugs-in-SPEC_CTRL_ENTRY_FROM_INTR_IST.patch 5a856a2b-x86-emul-fix-64bit-decoding-of-segment-overrides.patch 5a856a2b-x86-use-32bit-xors-for-clearing-GPRs.patch 5a856a2b-x86-xpti-hide-almost-all-of-Xen-image-mappings.patch 5a8be788-x86-nmi-start-NMI-watchdog-on-CPU0-after-SMP.patch 5a95373b-x86-PV-avoid-leaking-other-guests-MSR_TSC_AUX.patch 5a95571f-memory-dont-implicitly-unpin-in-decrease-res.patch 5a95576c-gnttab-ARM-dont-corrupt-shared-GFN-array.patch 5a955800-gnttab-dont-free-status-pages-on-ver-change.patch 5a955854-x86-disallow-HVM-creation-without-LAPIC-emul.patch 5a956747-x86-HVM-dont-give-wrong-impression-of-WRMSR-success.patch 5a9eb7f1-x86-xpti-dont-map-stack-guard-pages.patch 5a9eb85c-x86-slightly-reduce-XPTI-overhead.patch 5a9eb890-x86-remove-CR-reads-from-exit-to-guest-path.patch 5aa2b6b9-cpufreq-ondemand-CPU-offlining-race.patch 5aaa9878-x86-vlapic-clear-TMR-bit-for-edge-triggered-intr.patch xsa258.patch xsa259.patch- bsc#1090820 - VUL-0: CVE-2018-8897: xen: x86: mishandling of debug exceptions (XSA-260) xsa260-1.patch xsa260-2.patch xsa260-3.patch xsa260-4.patch - bsc#1090822 - VUL-0: CVE-2018-10982: xen: x86 vHPET interrupt injection errors (XSA-261) xsa261.patch - bsc#1090823 - VUL-0: CVE-2018-10981: xen: qemu may drive Xen into unbounded loop (XSA-262) xsa262.patch- bsc#1089152 - VUL-0: CVE-2018-10472: xen: Information leak via crafted user-supplied CDROM (XSA-258) xsa258.patch - bsc#1089635 - VUL-0: CVE-2018-10471: xen: x86: PV guest may crash Xen with XPTI (XSA-259) xsa259.patch- Preserve xen-syms from xen-dbg.gz to allow processing vmcores with crash(1) (bsc#1087251)- Upstream patches from Jan (bsc#1027519) and fixes related to Page Table Isolation (XPTI). See also bsc#1074562 XSA-254 5a856a2b-x86-xpti-hide-almost-all-of-Xen-image-mappings.patch 5a9eb7f1-x86-xpti-dont-map-stack-guard-pages.patch 5a9eb85c-x86-slightly-reduce-XPTI-overhead.patch 5a9eb890-x86-remove-CR-reads-from-exit-to-guest-path.patch 5aa2b6b9-cpufreq-ondemand-CPU-offlining-race.patch 5aaa9878-x86-vlapic-clear-TMR-bit-for-edge-triggered-intr.patch- bsc#1072834 - Xen HVM: unchecked MSR access error: RDMSR from 0xc90 at rIP: 0xffffffff93061456 (native_read_msr+0x6/0x30) 5a956747-x86-HVM-dont-give-wrong-impression-of-WRMSR-success.patch - Upstream patches from Jan (bsc#1027519) 5a79d7ed-libxc-packed-initrd-dont-fail-domain-creation.patch 5a7b1bdd-x86-reduce-Meltdown-band-aid-IPI-overhead.patch 5a843807-x86-spec_ctrl-fix-bugs-in-SPEC_CTRL_ENTRY_FROM_INTR_IST.patch 5a856a2b-x86-emul-fix-64bit-decoding-of-segment-overrides.patch 5a856a2b-x86-use-32bit-xors-for-clearing-GPRs.patch 5a8be788-x86-nmi-start-NMI-watchdog-on-CPU0-after-SMP.patch 5a95373b-x86-PV-avoid-leaking-other-guests-MSR_TSC_AUX.patch 5a95571f-memory-dont-implicitly-unpin-in-decrease-res.patch (Replaces xsa252.patch) 5a95576c-gnttab-ARM-dont-corrupt-shared-GFN-array.patch (Replaces xsa255-1.patch) 5a955800-gnttab-dont-free-status-pages-on-ver-change.patch (Replaces xsa255-2.patch) 5a955854-x86-disallow-HVM-creation-without-LAPIC-emul.patch (Replaces xsa256.patch) - Drop xsa252.patch xsa255-1.patch xsa255-2.patch xsa256.patch- bsc#1080635 - VUL-0: CVE-2018-7540: xen: DoS via non-preemptable L3/L4 pagetable freeing (XSA-252) xsa252.patch - bsc#1080662 - VUL-0: CVE-2018-7541: xen: grant table v2 -> v1 transition may crash Xen (XSA-255) xsa255-1.patch xsa255-2.patch - bsc#1080634 - VUL-0: CVE-2018-7542: xen: x86 PVH guest without LAPIC may DoS the host (XSA-256) xsa256.patch- Remove stale systemd presets code for 13.2 and older- fate#324965 - add script, udev rule and systemd service to watch for vcpu online/offline events in a HVM domU They are triggered via xl vcpu-set domU N- Replace hardcoded xen with Name tag when refering to subpkgs- Make sure tools and tools-domU require libs from the very same build- tools-domU: Add support for qemu guest agent. New files 80-xen-channel-setup.rules and xen-channel-setup.sh configure a xen-pv-channel for use by the guest agent FATE#324963- Remove outdated /etc/xen/README*- bsc#1073961 - VUL-0: CVE-2018-5244: xen: x86: memory leak with MSR emulation (XSA-253) 5a4e2bca-x86-free-msr_vcpu_policy-during-destruction.patch - bsc#1074562 - VUL-0: CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 xen: Information leak via side effects of speculative execution (XSA-254). Includes Spectre v2 mitigation. 5a4caa5e-x86-IRQ-conditionally-preserve-access-perm.patch 5a4caa8c-x86-E820-don-t-overrun-array.patch 5a4e2c2c-x86-upcall-inject-spurious-event-after-setting-vector.patch 5a4fd893-1-x86-break-out-alternative-asm-into-separate-header.patch 5a4fd893-2-x86-introduce-ALTERNATIVE_2-macros.patch 5a4fd893-3-x86-hvm-rename-update_guest_vendor-to-cpuid_policy_changed.patch 5a4fd893-4-x86-introduce-cpuid_policy_updated.patch 5a4fd893-5-x86-entry-remove-partial-cpu_user_regs.patch 5a4fd894-1-x86-rearrange-RESTORE_ALL-to-restore-in-stack-order.patch 5a4fd894-2-x86-hvm-use-SAVE_ALL-after-VMExit.patch 5a4fd894-3-x86-erase-guest-GPRs-on-entry-to-Xen.patch 5a4fd894-4-clarifications-to-wait-infrastructure.patch 5a534c78-x86-dont-use-incorrect-CPUID-values-for-topology.patch 5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4-updates.patch 5a5e2cff-x86-Meltdown-band-aid.patch 5a5e2d73-x86-Meltdown-band-aid-conditional.patch 5a5e3a4e-1-x86-support-compiling-with-indirect-branch-thunks.patch 5a5e3a4e-2-x86-support-indirect-thunks-from-asm.patch 5a5e3a4e-3-x86-report-speculative-mitigation-details.patch 5a5e3a4e-4-x86-AMD-set-lfence-as-Dispatch-Serialising.patch 5a5e3a4e-5-x86-introduce-alternative-indirect-thunks.patch 5a5e3a4e-6-x86-definitions-for-Indirect-Branch-Controls.patch 5a5e3a4e-7-x86-cmdline-opt-to-disable-IBRS-IBPB-STIBP.patch 5a5e459c-1-x86-SVM-offer-CPUID-faulting-to-AMD-HVM-guests.patch 5a5e459c-2-x86-report-domain-id-on-CPUID.patch 5a68bc16-x86-acpi-process-softirqs-logging-Cx.patch 5a69c0b9-x86-fix-GET_STACK_END.patch 5a6b36cd-1-x86-cpuid-handling-of-IBRS-IBPB-STIBP-and-IBRS-for-guests.patch 5a6b36cd-2-x86-msr-emulation-of-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-3-x86-migrate-MSR_SPEC_CTRL.patch 5a6b36cd-4-x86-hvm-permit-direct-access-to-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-5-x86-use-SPEC_CTRL-on-entry.patch 5a6b36cd-6-x86-clobber-RSB-RAS-on-entry.patch 5a6b36cd-7-x86-no-alternatives-in-NMI-MC-paths.patch 5a6b36cd-8-x86-boot-calculate-best-BTI-mitigation.patch 5a6b36cd-9-x86-issue-speculation-barrier.patch 5a6b36cd-A-x86-offer-Indirect-Branch-Controls-to-guests.patch 5a6b36cd-B-x86-clear-SPEC_CTRL-while-idle.patch- Fix python3 deprecated atoi call (bsc#1067224) pygrub-python3-conversion.patch - Drop xenmon-python3-conversion.patch- bsc#1067317 - pass cache=writeback|unsafe|directsync to qemu, depending on the libxl disk settings libxl.add-option-to-disable-disk-cache-flushes-in-qdisk.patch- Remove libxl.LIBXL_DESTROY_TIMEOUT.debug.patch- bsc#1067224 - xen-tools have hard dependency on Python 2 build-python3-conversion.patch bin-python3-conversion.patch- bsc#1070165 - xen crashes after aborted localhost migration 5a2ffc1f-x86-mm-drop-bogus-paging-mode-assertion.patch - bsc#1035442 - L3: libxl: error: libxl.c:1676:devices_destroy_cb: libxl__devices_destroy failed 5a33a12f-domctl-improve-locking-during-domain-destruction.patch - Upstream patches from Jan (bsc#1027519) 5a21a77e-x86-pv-construct-d0v0s-GDT-properly.patch 5a2fda0d-x86-mb2-avoid-Xen-when-looking-for-module-crashkernel-pos.patch 5a313972-x86-microcode-add-support-for-AMD-Fam17.patch 5a32bd79-x86-vmx-dont-use-hvm_inject_hw_exception-in-.patch- Update to Xen 4.10.0 FCS (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Rebuild initrd if xen-tools-domU is updated- Update to Xen 4.10.0-rc8 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Increase the value of LIBXL_DESTROY_TIMEOUT from 10 to 100 seconds If many domUs shutdown in parallel the backends can not keep up Add some debug output to track how long backend shutdown takes (bsc#1035442) libxl.LIBXL_DESTROY_TIMEOUT.patch libxl.LIBXL_DESTROY_TIMEOUT.debug.patch- Adjust xenstore-run-in-studomain.patch to change the defaults in the code instead of changing the sysconfig template, to also cover the upgrade case- Update to Xen 4.10.0-rc6 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Since xen switched to Kconfig, building a debug hypervisor was done by default. Adjust make logic to build a non-debug hypervisor by default, and continue to provide one as xen-dbg.gz- fate#316614: set migration constraints from cmdline fix libxl.set-migration-constraints-from-cmdline.patch for xen-4.10- Document the suse-diskcache-disable-flush option in xl-disk-configuration(5) (bsc#879425,bsc#1067317)- Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468)- Update to Xen 4.10.0-rc5 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - fate#323663 - Run Xenstore in stubdomain xenstore-run-in-studomain.patch- bsc#1067224 - xen-tools have hard dependency on Python 2 pygrub-python3-conversion.patch xenmon-python3-conversion.patch migration-python3-conversion.patch xnloader.py xen2libvirt.py- Remove xendriverdomain.service (bsc#1065185) Driver domains must be configured manually with custom .service file- Update to Xen 4.10.0-rc3 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - Drop 59f31268-libxc-remove-stale-error-check-for-domain-size.patch- Adjust xen-dom0-modules.service to ignore errors (bsc#1065187)- fate#324052 Support migration of Xen HVM domains larger than 1TB 59f31268-libxc-remove-stale-error-check-for-domain-size.patch- Update to Xen 4.10.0-rc2 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Update to Xen 4.10.0-rc1 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - Drop patches included in new tarball 592fd5f0-stop_machine-fill-result-only-in-case-of-error.patch 596f257e-x86-fix-hvmemul_insn_fetch.patch 5982fd99-VT-d-don-t-panic-warn-on-iommu-no-igfx.patch 598c3630-VT-d-PI-disable-when-CPU-side-PI-is-off.patch 598c3706-cpufreq-only-stop-ondemand-governor-if-started.patch 5992f1e5-x86-grant-disallow-misaligned-PTEs.patch 5992f20d-gnttab-split-maptrack-lock-to-make-it-useful-again.patch 5992f233-gnttab-correct-pin-status-fixup-for-copy.patch 59958e76-gnttab-dont-use-possibly-unbounded-tail-calls.patch 59958ebf-gnttab-fix-transitive-grant-handling.patch 59958edd-gnttab-avoid-spurious-maptrack-handle-alloc-failures.patch 599da329-arm-mm-release-grant-lock-on-xatp1-error-paths.patch 59a01223-x86-check-for-alloc-errors-in-modify_xen_mappings.patch 59a0130c-x86-efi-dont-write-relocs-in-efi_arch_relocate_image-1st-pass.patch 59a9221f-VT-d-use-correct-BDF-for-VF-to-search-VT-d-unit.patch 59ae9177-x86-emul-fix-handling-of-unimplemented-Grp7-insns.patch 59aec335-x86emul-correct-VEX-W-handling-for-VPINSRD.patch 59aec375-x86emul-correct-VEX-L-handling-for-VCVTx2SI.patch 59afcea0-x86-introduce-and-use-setup_force_cpu_cap.patch 59b2a7f2-x86-HVM-correct-repeat-count-update-linear-phys.patch 59b7d664-mm-make-sure-node-is-less-than-MAX_NUMNODES.patch 59b7d69b-grant_table-fix-GNTTABOP_cache_flush-handling.patch 59b7d6c8-xenstore-dont-unlink-connection-object-twice.patch 59b7d6d9-gnttab-also-validate-PTE-perms-upon-destroy-replace.patch gcc7-arm.patch gcc7-mini-os.patch- bsc#1061084 - VUL-0: xen: page type reference leak on x86 (XSA-242) xsa242.patch - bsc#1061086 - VUL-0: xen: x86: Incorrect handling of self-linear shadow mappings with translated guests (XSA-243) xsa243.patch - bsc#1061087 - VUL-0: xen: x86: Incorrect handling of IST settings during CPU hotplug (XSA-244) xsa244.patch- bsc#1061077 - VUL-0: xen: DMOP map/unmap missing argument checks (XSA-238) xsa238.patch - bsc#1061080 - VUL-0: xen: hypervisor stack leak in x86 I/O intercept code (XSA-239) xsa239.patch - bsc#1061081 - VUL-0: xen: Unlimited recursion in linear pagetable de-typing (XSA-240) xsa240-1.patch xsa240-2.patch - bsc#1061082 - VUL-0: xen: Stale TLB entry due to page type release race (XSA-241) xsa241.patch- bsc#1061075 - VUL-0: xen: pin count / page reference race in grant table code (XSA-236) xsa236.patch - bsc#1061076 - VUL-0: xen: multiple MSI mapping issues on x86 (XSA-237) xsa237-1.patch xsa237-2.patch xsa237-3.patch xsa237-4.patch xsa237-5.patch- bsc#1056278 - VUL-0: xen: Missing NUMA node parameter verification (XSA-231) 59b7d664-mm-make-sure-node-is-less-than-MAX_NUMNODES.patch - bsc#1056280 - VUL-0: xen: Missing check for grant table (XSA-232) 59b7d69b-grant_table-fix-GNTTABOP_cache_flush-handling.patch - bsc#1056281 - VUL-0: xen: cxenstored: Race in domain cleanup (XSA-233) 59b7d6c8-xenstore-dont-unlink-connection-object-twice.patch - bsc#1056282 - VUL-0: xen: insufficient grant unmapping checks for x86 PV guests (XSA-234) 59b7d6d9-gnttab-also-validate-PTE-perms-upon-destroy-replace.patch - bsc#1055321 - VUL-0: xen: add-to-physmap error paths fail to release lock on ARM (XSA-235) 599da329-arm-mm-release-grant-lock-on-xatp1-error-paths.patch - Upstream patches from Jan (bsc#1027519) 59a01223-x86-check-for-alloc-errors-in-modify_xen_mappings.patch 59a0130c-x86-efi-dont-write-relocs-in-efi_arch_relocate_image-1st-pass.patch 59a9221f-VT-d-use-correct-BDF-for-VF-to-search-VT-d-unit.patch 59ae9177-x86-emul-fix-handling-of-unimplemented-Grp7-insns.patch 59aec335-x86emul-correct-VEX-W-handling-for-VPINSRD.patch 59aec375-x86emul-correct-VEX-L-handling-for-VCVTx2SI.patch 59afcea0-x86-introduce-and-use-setup_force_cpu_cap.patch 59b2a7f2-x86-HVM-correct-repeat-count-update-linear-phys.patch - Dropped gcc7-xen.patch- bsc#1057358 - Cannot Boot into SLES12.3 with Xen hypervisor when Secure Boot is Enabled xen.spec- bsc#1055695 - XEN: 11SP4 and 12SP3 HVM guests can not be restored update from v6 to v9 to cover more cases for ballooned domUs libxc.sr.superpage.patch- bsc#1026236 - remove suse_vtsc_tolerance= cmdline option for Xen drop the patch because it is not upstream acceptable remove xen.suse_vtsc_tolerance.patch- bsc#1055695 - XEN: 11SP4 and 12SP3 HVM guests can not be restored after the save using xl stack libxc.sr.superpage.patch- Unignore gcc-PIE the toolstack disables PIE for firmware builds as needed- Upstream patches from Jan (bsc#1027519) 592fd5f0-stop_machine-fill-result-only-in-case-of-error.patch 596f257e-x86-fix-hvmemul_insn_fetch.patch 5982fd99-VT-d-don-t-panic-warn-on-iommu-no-igfx.patch 598c3630-VT-d-PI-disable-when-CPU-side-PI-is-off.patch 598c3706-cpufreq-only-stop-ondemand-governor-if-started.patch 5992f1e5-x86-grant-disallow-misaligned-PTEs.patch (Replaces xsa227.patch) 5992f20d-gnttab-split-maptrack-lock-to-make-it-useful-again.patch (Replaces xsa228.patch) 5992f233-gnttab-correct-pin-status-fixup-for-copy.patch (Replaces xsa230.patch) 59958e76-gnttab-dont-use-possibly-unbounded-tail-calls.patch (Replaces xsa226-1.patch) 59958ebf-gnttab-fix-transitive-grant-handling.patch (Replaces xsa226-2.patch) 59958edd-gnttab-avoid-spurious-maptrack-handle-alloc-failures.patch- bsc#1044974 - xen-tools require python-pam xen.spec- Clean up spec file errors and a few warnings. (bsc#1027519) - Removed conditional 'with_systemd' and some old deprecated 'sles_version' checks. xen.spec- Remove use of brctl utiltiy from supportconfig plugin FATE#323639- Use upstream variant of mini-os __udivmoddi4 change gcc7-mini-os.patch- fate#323639 Move bridge-utils to legacy replace-obsolete-network-configuration-commands-in-s.patch- bsc#1052686 - VUL-0: xen: grant_table: possibly premature clearing of GTF_writing / GTF_reading (XSA-230) xsa230.patch- bsc#1035231 - migration of HVM domU does not use superpages on destination dom0 libxc.sr.superpage.patch- bsc#1051787 - VUL-0: CVE-2017-12135: xen: possibly unbounded recursion in grant table code (XSA-226) xsa226-1.patch xsa226-2.patch - bsc#1051788 - VUL-0: CVE-2017-12137: xen: x86: PV privilege escalation via map_grant_ref (XSA-227) xsa227.patch - bsc#1051789 - VUL-0: CVE-2017-12136: xen: grant_table: Race conditions with maptrack free list handling (XSA-228) xsa228.patch- Add a supportconfig plugin xen-supportconfig FATE#323661- bsc#1026236 - add suse_vtsc_tolerance= cmdline option for Xen To avoid emulation of TSC access from a domU after live migration add a global tolerance for the measured host kHz xen.suse_vtsc_tolerance.patch- fate#323662 Drop qemu-dm from xen-tools package The following tarball and patches have been removed qemu-xen-traditional-dir-remote.tar.bz2 VNC-Support-for-ExtendedKeyEvent-client-message.patch 0001-net-move-the-tap-buffer-into-TAPState.patch 0002-net-increase-tap-buffer-size.patch 0003-e1000-fix-access-4-bytes-beyond-buffer-end.patch 0004-e1000-secrc-support.patch 0005-e1000-multi-buffer-packet-support.patch 0006-e1000-clear-EOP-for-multi-buffer-descriptors.patch 0007-e1000-verify-we-have-buffers-upfront.patch 0008-e1000-check-buffer-availability.patch CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch CVE-2015-4037-qemut-smb-config-dir-name.patch CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch CVE-2016-7908-qemut-net-Infinite-loop-in-mcf_fec_do_tx.patch CVE-2016-7909-qemut-net-pcnet-infinite-loop-in-pcnet_rdra_addr.patch CVE-2016-8667-qemut-dma-rc4030-divide-by-zero-error-in-set_next_tick.patch CVE-2016-8669-qemut-char-divide-by-zero-error-in-serial_update_parameters.patch CVE-2016-8910-qemut-net-rtl8139-infinite-loop-while-transmit-in-Cplus-mode.patch CVE-2016-9921-qemut-display-cirrus_vga-divide-by-zero-in-cirrus_do_copy.patch CVE-2017-6505-qemut-usb-an-infinite-loop-issue-in-ohci_service_ed_list.patch CVE-2017-8309-qemut-audio-host-memory-leakage-via-capture-buffer.patch CVE-2017-9330-qemut-usb-ohci-infinite-loop-due-to-incorrect-return-value.patch blktap.patch cdrom-removable.patch xen-qemu-iscsi-fix.patch qemu-security-etch1.patch xen-disable-qemu-monitor.patch xen-hvm-default-bridge.patch qemu-ifup-set-mtu.patch ioemu-vnc-resize.patch capslock_enable.patch altgr_2.patch log-guest-console.patch bdrv_open2_fix_flags.patch bdrv_open2_flags_2.patch ioemu-7615-qcow2-fix-alloc_cluster_link_l2.patch qemu-dm-segfault.patch bdrv_default_rwflag.patch kernel-boot-hvm.patch ioemu-watchdog-support.patch ioemu-watchdog-linkage.patch ioemu-watchdog-ib700-timer.patch ioemu-hvm-pv-support.patch pvdrv_emulation_control.patch ioemu-disable-scsi.patch ioemu-disable-emulated-ide-if-pv.patch xenpaging.qemu.flush-cache.patch ioemu-devicemodel-include.patch - Cleanup spec file and remove unused KMP patches kmp_filelist supported_module.patch xen_pvonhvm.xen_emul_unplug.patch- bsc#1002573 - Optimize LVM functions in block-dmmd block-dmmd- Record initial Xen dmesg in /var/log/xen/xen-boot.log for supportconfig. Keep previous log in /var/log/xen/xen-boot.prev.log- Remove storytelling from description in xen.rpm- Update to Xen 4.9.0 FCS (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update block-dmmd script (bsc#1002573) block-dmmd- Update to Xen 4.9.0-rc8+ (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 gcc7-arm.patch - Drop gcc7-error-xenpmd.patch- Update to Xen 4.9.0-rc8 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1042160 - VUL-1: CVE-2017-9330: xen: usb: ohci: infinite loop due to incorrect return value CVE-2017-9330-qemut-usb-ohci-infinite-loop-due-to-incorrect-return-value.patch- bsc#1037243 - VUL-1: CVE-2017-8309: xen: audio: host memory leakage via capture buffer CVE-2017-8309-qemut-audio-host-memory-leakage-via-capture-buffer.patch- Update to Xen 4.9.0-rc7 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update to Xen 4.9.0-rc6 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1031343 - xen fails to build with GCC 7 gcc7-mini-os.patch gcc7-xen.patch- bsc#1031343 - xen fails to build with GCC 7 gcc7-error-xenpmd.patch- Update to Xen 4.9.0-rc5 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 - Drop xen-tools-pkgconfig-xenlight.patch- bsc#1037779 - xen breaks kexec-tools build xen-tools-pkgconfig-xenlight.patch- Update to Xen 4.9.0-rc4 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1036146 - sles12sp2 xen VM dumps core to wrong path xen.spec- Update to Xen 4.9.0-rc3 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 aarch64-maybe-uninitialized.patch- Update to Xen 4.9.0-rc2 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update to Xen 4.9.0-rc1 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 ioemu-devicemodel-include.patch - Dropped patches contained in new tarball xen-4.8.0-testing-src.tar.bz2 0001-xenstore-let-write_node-and-some-callers-return-errn.patch 0002-xenstore-undo-function-rename.patch 0003-xenstore-rework-of-transaction-handling.patch 584806ce-x86emul-correct-PUSHF-POPF.patch 584fc649-fix-determining-when-domain-creation-is-complete.patch 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch 58510cac-x86emul-MOVNTI-no-REP-prefixes.patch 58526ccc-x86emul-64bit-ignore-most-segment-bases-in-align-check.patch 5853ed37-VT-d-correct-dma_msi_set_affinity.patch 5853ee07-x86emul-CMPXCHG16B-aligned-operand.patch 58580060-x86-emul-correct-SYSCALL-eflags-handling.patch 585aa3c5-x86-force-EFLAGS-IF-on-upon-exit-to-PV.patch 585aa407-x86-HVM-NULL-check-before-using-VMFUNC-hook.patch 585bd5fe-x86-emul-correct-VMFUNC-return-value-handling.patch 586ba81c-x86-cpu-dont-update-this_cpu-for-guest-get_cpu_vendor.patch 587d04d6-x86-xstate-fix-array-overrun-with-LWP.patch 587de4a9-x86emul-VEX-B-ignored-in-compat-mode.patch 5882129d-x86emul-LOCK-check-adjustments.patch 58821300-x86-segment-attribute-handling.patch 58873c1f-x86emul-correct-FPU-stub-asm-constraints.patch 58873c80-x86-hvm-do-not-set-msr_tsc_adjust-on-.patch 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5887888f-credit2-never-consider-CPUs-outside-of-pool.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5888b1b3-x86-emulate-dont-assume-addr_size-32-implies-protmode.patch 5899cbd9-EPT-allow-wrcomb-MMIO-mappings-again.patch 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch 58a44771-IOMMU-always-call-teardown-callback.patch 58a48ccc-x86-fix-p2m_flush_table-for-non-nested.patch 58a59f4b-libxl-correct-xenstore-entry-for-empty-cdrom.patch 58a70d94-VMX-fix-VMCS-race-on-cswitch-paths.patch 58ac1f3f-VMX-dont-leak-host-syscall-MSRs.patch 58b5a2de-x86-correct-Xens-idea-of-its-memory-layout.patch 58b6fd42-credit2-always-mark-a-tickled-pCPU-as-tickled.patch 58b6fd42-credit2-dont-miss-accounting-during-credit-reset.patch 58cbf682-x86-EFI-avoid-overrunning-mb_modules.patch 58cf9200-x86-EFI-avoid-IOMMU-faults-on-tail-gap.patch 58cf9260-x86-EFI-avoid-Xen-when-looking-for-mod-kexec-pos.patch 58cf9277-x86-time-dont-use-vTSC-if-host-guest-freqs-match.patch 58d25ea2-xenstore-add-missing-checks-for-allocation-failure.patch 58d91365-sched-dont-call-wrong-hook-via-VCPU2OP.patch CVE-2017-2615-qemut-display-cirrus-oob-access-while-doing-bitblt-copy-backward-mode.patch CVE-2017-2620-xsa209-qemut-cirrus_bitblt_cputovideo-does-not-check-if-memory-region-safe.patch glibc-2.25-compatibility-fix.patch xs-09-add_change_node-params.patch xs-10-call-add_change_node.patch xs-11-tdb-record-header.patch xs-12-node-gen-count.patch xs-13-read-directory-part-support.patch xs-14-command-array.patch xs-15-command-return-val.patch xs-16-function-static.patch xs-17-arg-parsing.patch xs-18-default-buffer.patch xs-19-handle-alloc-failures.patch xs-20-tdb-version.patch xs-21-empty-tdb-database.patch xs-22-reopen_log-fix.patch xs-23-XS_DEBUG-rename.patch xs-24-xenstored_control.patch xs-25-control-enhance.patch xs-26-log-control.patch xs-27-memory-report.patch xs-28-remove-talloc-report.patch xs-29-define-off_t.patch xsa206-0001-xenstored-apply-a-write-transaction-rate-limit.patch xsa206-0002-xenstored-Log-when-the-write-transaction-rate-limit.patch- bsc#1022703 - Xen HVM guest with OVMF hangs with unattached CDRom 58a59f4b-libxl-correct-xenstore-entry-for-empty-cdrom.patch- bsc#1015348 - L3: libvirtd does not start during boot suse-xendomains-service.patch- bsc#1014136 - Partner-L3: kdump can't dump a kernel on SLES12-SP2 with Xen hypervisor. 58cf9260-x86-EFI-avoid-Xen-when-looking-for-mod-kexec-pos.patch - bsc#1026236 - L3: Paravirtualized vs. fully virtualized migration - latter one much faster 58cf9277-x86-time-dont-use-vTSC-if-host-guest-freqs-match.patch - Upstream patch from Jan 58cbf682-x86-EFI-avoid-overrunning-mb_modules.patch 58cf9200-x86-EFI-avoid-IOMMU-faults-on-tail-gap.patch 58d91365-sched-dont-call-wrong-hook-via-VCPU2OP.patch- bsc#1022555 - L3: Timeout in "execution of /etc/xen/scripts/block add" 58d25ea2-xenstore-add-missing-checks-for-allocation-failure.patch 0001-xenstore-let-write_node-and-some-callers-return-errn.patch 0002-xenstore-undo-function-rename.patch 0003-xenstore-rework-of-transaction-handling.patch - bsc#1030144 - VUL-0: xen: xenstore denial of service via repeated update (XSA-206) xsa206-0001-xenstored-apply-a-write-transaction-rate-limit.patch xsa206-0002-xenstored-Log-when-the-write-transaction-rate-limit.patch - bsc#1029827 - Forward port xenstored xs-09-add_change_node-params.patch xs-10-call-add_change_node.patch xs-11-tdb-record-header.patch xs-12-node-gen-count.patch xs-13-read-directory-part-support.patch xs-14-command-array.patch xs-15-command-return-val.patch xs-16-function-static.patch xs-17-arg-parsing.patch xs-18-default-buffer.patch xs-19-handle-alloc-failures.patch xs-20-tdb-version.patch xs-21-empty-tdb-database.patch xs-22-reopen_log-fix.patch xs-23-XS_DEBUG-rename.patch xs-24-xenstored_control.patch xs-25-control-enhance.patch xs-26-log-control.patch xs-27-memory-report.patch xs-28-remove-talloc-report.patch xs-29-define-off_t.patch- bsc#1029128 - fix make xen to really produce xen.efi with gcc48- bsc#1028235 - VUL-0: CVE-2017-6505: xen: qemu: usb: an infinite loop issue in ohci_service_ed_list CVE-2017-6505-qemut-usb-an-infinite-loop-issue-in-ohci_service_ed_list.patch - Upstream patches from Jan (bsc#1027519) 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5899cbd9-EPT-allow-wrcomb-MMIO-mappings-again.patch 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch 58a44771-IOMMU-always-call-teardown-callback.patch 58a48ccc-x86-fix-p2m_flush_table-for-non-nested.patch 58a70d94-VMX-fix-VMCS-race-on-cswitch-paths.patch 58ac1f3f-VMX-dont-leak-host-syscall-MSRs.patch 58b5a2de-x86-correct-Xens-idea-of-its-memory-layout.patch 58b6fd42-credit2-always-mark-a-tickled-pCPU-as-tickled.patch 58b6fd42-credit2-dont-miss-accounting-during-credit-reset.patch- bsc#1027654 - XEN fails to build against glibc 2.25 glibc-2.25-compatibility-fix.patch libxl.pvscsi.patch- fate#316613: Refresh and enable libxl.pvscsi.patch- bsc#1024834 - VUL-0: CVE-2017-2620: xen: cirrus_bitblt_cputovideo does not check if memory region is safe (XSA-209) CVE-2017-2620-xsa209-qemut-cirrus_bitblt_cputovideo-does-not-check-if-memory-region-safe.patch- bsc#1023948 - [pvusb][sles12sp3][openqa] Segmentation fault happened when adding usbctrl devices via xl 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch- Upstream patches from Jan (bsc#1027519) 587d04d6-x86-xstate-fix-array-overrun-with-LWP.patch 587de4a9-x86emul-VEX-B-ignored-in-compat-mode.patch 5882129d-x86emul-LOCK-check-adjustments.patch 58821300-x86-segment-attribute-handling.patch 58873c1f-x86emul-correct-FPU-stub-asm-constraints.patch 58873c80-x86-hvm-do-not-set-msr_tsc_adjust-on-.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5887888f-credit2-never-consider-CPUs-outside-of-pool.patch 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5888b1b3-x86-emulate-dont-assume-addr_size-32-implies-protmode.patch- bsc#1023004 - VUL-0: CVE-2017-2615: qemu: display: cirrus: oob access while doing bitblt copy backward mode CVE-2017-2615-qemut-display-cirrus-oob-access-while-doing-bitblt-copy-backward-mode.patch- fate#322313 and fate#322150 require the acpica package ported to aarch64 which Xen 4.8 needs to build. Temporarily disable aarch64 until these fates are complete. xen.spec- bsc#1021952 - Virutalization/xen: Bug xen-tools missing /usr/bin/domu-xenstore; guests fail to launch tmp_build.patch xen.spec- No systemd presets for 42.3+ and SLE12SP3+ (bsc#1012842)- bsc#1007224 - broken symlinks in /usr/share/doc/packages/xen/misc/ xen.spec- 585aa3c5-x86-force-EFLAGS-IF-on-upon-exit-to-PV.patch Replaces xsa202.patch (bsc#1014298) - 585aa407-x86-HVM-NULL-check-before-using-VMFUNC-hook.patch Replaces xsa203.patch (bsc#1014300) - 58580060-x86-emul-correct-SYSCALL-eflags-handling.patch Replaces xsa204.patch (bsc#1016340) - Upstream patches from Jan 58526ccc-x86emul-64bit-ignore-most-segment-bases-in-align-check.patch 5853ed37-VT-d-correct-dma_msi_set_affinity.patch 5853ee07-x86emul-CMPXCHG16B-aligned-operand.patch 585bd5fe-x86-emul-correct-VMFUNC-return-value-handling.patch 586ba81c-x86-cpu-dont-update-this_cpu-for-guest-get_cpu_vendor.patch- bsc#1015169 - VUL-0: CVE-2016-9921, CVE-2016-9922: xen: qemu: display: cirrus_vga: a divide by zero in cirrus_do_copy CVE-2016-9921-qemut-display-cirrus_vga-divide-by-zero-in-cirrus_do_copy.patch- bsc#1016340 - VUL-0: CVE-2016-10013: xen: x86: Mishandling of SYSCALL singlestep during emulation (XSA-204) xsa204.patch- bsc#1012651 - VUL-0: CVE-2016-9932: xen: x86 CMPXCHG8B emulation fails to ignore operand size override (XSA-200) 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch- bsc#1014298 - VUL-0: CVE-2016-10024: xen: x86 PV guests may be able to mask interrupts (XSA-202) xsa202.patch - bsc#1014300 - VUL-0: CVE-2016-10025: xen: x86: missing NULL pointer check in VMFUNC emulation (XSA-203) xsa203.patch - Upstream patches from Jan 584806ce-x86emul-correct-PUSHF-POPF.patch 584fc649-fix-determining-when-domain-creation-is-complete.patch 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch 58510cac-x86emul-MOVNTI-no-REP-prefixes.patch- Update to Xen 4.8 FCS xen-4.8.0-testing-src.tar.bz2 - Dropped xen-4.7.1-testing-src.tar.bz2 0001-libxc-Rework-extra-module-initialisation.patch 0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch 0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch 0004-firmware-makefile-install-BIOS-blob.patch 0005-libxl-Load-guest-BIOS-from-file.patch 0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch 0007-hvmloader-Grab-the-hvm_start_info-pointer.patch 0008-hvmloader-Locate-the-BIOS-blob.patch 0009-hvmloader-Check-modules-whereabouts-in-perform_tests.patch 0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch 0011-hvmloader-Load-OVMF-from-modules.patch 0012-hvmloader-Specific-bios_load-function-required.patch 0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch 0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch 57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch 576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 5769106e-x86-generate-assembler-equates-for-synthesized.patch 57a1e603-x86-time-adjust-local-system-time-initialization.patch 57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch 57a30261-x86-support-newer-Intel-CPU-models.patch 5810a9cc-x86-emul-Correct-decoding-of-SReg3-operands.patch 581b2c3b-x86-emul-reject-LGDT-LIDT-with-non-canonical-addresses.patch 581b647a-x86emul-L-S-G-I-DT-ignore-opsz-overrides-in-64-bit-mode.patch 58249392-x86-svm-dont-clobber-eax-edx-if-RDMSR-intercept-fails.patch 582c35d6-x86-vmx-correct-long-mode-check-in-vmx_cpuid_intercept.patch 582c35ee-x86-traps-dont-call-hvm_hypervisor_cpuid_leaf-for-PV.patch 58343dc2-x86-hvm-Fix-the-handling-of-non-present-segments.patch 58343df8-x86-HVM-dont-load-LDTR-with-VM86-mode-attrs-during-task-switch.patch 58343e24-x86-PV-writes-of-fs-and-gs-base-MSRs-require-canonical-addresses.patch 58343e9e-libelf-fix-stack-memory-leak-when-loading-32-bit-symbol-tables.patch 58343ec2-x86emul-fix-huge-bit-offset-handling.patch 58343f29-x86-emul-correct-the-IDT-entry-calculation-in-inject_swint.patch 58343f44-x86-svm-fix-injection-of-software-interrupts.patch 58343f79-pygrub-Properly-quote-results-when-returning-them-to-the-caller.patch CVE-2016-9381-xsa197-qemut.patch CVE-2016-9637-xsa199-qemut.patch- bsc#1011652 - VUL-0: xen: qemu ioport array overflow CVE-2016-9637-xsa199-qemut.patch- bsc#1009100 - VUL-0: CVE-2016-9386: XSA-191: xen: x86 null segments not always treated as unusable 58343dc2-x86-hvm-Fix-the-handling-of-non-present-segments.patch - bsc#1009103 - VUL-0: CVE-2016-9382: XSA-192: xen: x86 task switch to VM86 mode mis-handled 58343df8-x86-HVM-dont-load-LDTR-with-VM86-mode-attrs-during-task-switch.patch - bsc#1009104 - VUL-0: CVE-2016-9385: XSA-193: xen: x86 segment base write emulation lacking canonical address checks 58343e24-x86-PV-writes-of-fs-and-gs-base-MSRs-require-canonical-addresses.patch - bsc#1009105 - VUL-0: CVE-2016-9384: XSA-194: xen: guest 32-bit ELF symbol table load leaking host data 58343e9e-libelf-fix-stack-memory-leak-when-loading-32-bit-symbol-tables.patch - bsc#1009107 - VUL-0: CVE-2016-9383: XSA-195: xen: x86 64-bit bit test instruction emulation broken 58343ec2-x86emul-fix-huge-bit-offset-handling.patch - bsc#1009108 - VUL-0: CVE-2016-9377,CVE-2016-9378: XSA-196: xen: x86 software interrupt injection mis-handled 58343f29-x86-emul-correct-the-IDT-entry-calculation-in-inject_swint.patch 58343f44-x86-svm-fix-injection-of-software-interrupts.patch - bsc#1009109 - VUL-0: CVE-2016-9381: XSA-197: xen: qemu incautious about shared ring processing CVE-2016-9381-xsa197-qemut.patch - bsc#1009111 - VUL-0: CVE-2016-9379,CVE-2016-9380: XSA-198: xen: delimiter injection vulnerabilities in pygrub 58343f79-pygrub-Properly-quote-results-when-returning-them-to-the-caller.patch - Upstream patches from Jan 581b2c3b-x86-emul-reject-LGDT-LIDT-with-non-canonical-addresses.patch 581b647a-x86emul-L-S-G-I-DT-ignore-opsz-overrides-in-64-bit-mode.patch 58249392-x86-svm-dont-clobber-eax-edx-if-RDMSR-intercept-fails.patch 582c35d6-x86-vmx-correct-long-mode-check-in-vmx_cpuid_intercept.patch 582c35ee-x86-traps-dont-call-hvm_hypervisor_cpuid_leaf-for-PV.patch- Update to Xen Version 4.7.1 xen-4.7.1-testing-src.tar.bz2 - Dropped patches contained in new tarball xen-4.7.0-testing-src.tar.bz2 575e9ca0-nested-vmx-Validate-host-VMX-MSRs-before-accessing-them.patch 57640448-xen-sched-use-default-scheduler-upon-an-invalid-sched.patch 57973099-have-schedulers-revise-initial-placement.patch 579730e6-remove-buggy-initial-placement-algorithm.patch 57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch 57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch 57ac6316-don-t-restrict-DMA-heap-to-node-0.patch 57b71fc5-x86-EFI-don-t-apply-relocations-to-l-2-3-_bootmap.patch 57b7447b-dont-permit-guest-to-populate-PoD-pages-for-itself.patch 57c4412b-x86-HVM-add-guarding-logic-for-VMX-specific-code.patch 57c57f73-libxc-correct-max_pfn-calculation-for-saving-domain.patch 57c805bf-x86-levelling-restrict-non-architectural-OSXSAVE-handling.patch 57c805c1-x86-levelling-pass-vcpu-to-ctxt_switch_levelling.patch 57c805c3-x86-levelling-provide-architectural-OSXSAVE-handling.patch 57c82be2-x86-32on64-adjust-call-gate-emulation.patch 57c93e52-fix-error-in-libxl_device_usbdev_list.patch 57c96df3-credit1-fix-a-race-when-picking-initial-pCPU.patch 57c96e2c-x86-correct-PT_NOTE-file-position.patch 57cfed43-VMX-correct-feature-checks-for-MPX-and-XSAVES.patch 57d1563d-x86-32on64-don-t-allow-recursive-page-tables-from-L3.patch 57d15679-x86-emulate-Correct-boundary-interactions-of-emulated-insns.patch 57d1569a-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch 57d18642-hvm-fep-Allow-test-insns-crossing-1-0-boundary.patch 57d18642-x86-segment-Bounds-check-accesses-to-emulation-ctxt-seg_reg.patch 57d7ca5f-x86-domctl-fix-TOCTOU-race-in-XEN_DOMCTL_getvcpuextstate.patch 57d7ca64-x86-domctl-fix-migration-of-guests-not-using-xsave.patch 57da8883-credit1-fix-mask-to-be-used-for-tickling.patch 57da8883-credit2-properly-schedule-migration-of-running-vcpu.patch 57dfb1c5-x86-Intel-hide-CPUID-faulting-capability-from-guests.patch 57e93e1d-x86emul-correct-loading-of-ss.patch 57e93e4a-x86emul-don-t-allow-null-selector-for-LTR.patch 57e93e89-x86-AMD-apply-erratum-665-workaround.patch 57ee6cbc-credit1-return-time-remaining-to-limit-as-next-timeslice.patch 57f3a8ee-x86emul-honor-guest-CR0-TS-and-CR0-EM.patch 57fb6a91-x86-defer-not-present-segment-checks.patch 5800c51d-x86-hvm-Clobber-cs-L-when-LME-becomes-set.patch 5800caec-x86emul-fix-pushing-of-selector-registers.patch 5800cb06-x86-Viridian-don-t-depend-on-undefined-register-state.patch 580e29f9-x86-MISALIGNSSE-feature-depends-on-SSE.patch 57dfb2ff-x86-Intel-Broadwell-no-PKG_C8-10_RESIDENCY-MSRs.patch- bsc#1004981 - Xen RPM doesn't contain debug hypervisor for EFI systems xen.spec- bsc#1000106 - VUL-0: CVE-2016-7777: xen: CR0.TS and CR0.EM not always honored for x86 HVM guests (XSA-190) 57f3a8ee-x86emul-honor-guest-CR0-TS-and-CR0-EM.patch - bsc#996191 - [XEN][acpi]residency -n 88 -c will cause xen panic on broadwell-ep 57dfb2ff-x86-Intel-Broadwell-no-PKG_C8-10_RESIDENCY-MSRs.patch - Upstream patches from Jan 57d7ca5f-x86-domctl-fix-TOCTOU-race-in-XEN_DOMCTL_getvcpuextstate.patch 57d7ca64-x86-domctl-fix-migration-of-guests-not-using-xsave.patch 57da8883-credit1-fix-mask-to-be-used-for-tickling.patch 57da8883-credit2-properly-schedule-migration-of-running-vcpu.patch 57dfb1c5-x86-Intel-hide-CPUID-faulting-capability-from-guests.patch 57e93e1d-x86emul-correct-loading-of-ss.patch 57e93e4a-x86emul-don-t-allow-null-selector-for-LTR.patch 57e93e89-x86-AMD-apply-erratum-665-workaround.patch 57ee6cbc-credit1-return-time-remaining-to-limit-as-next-timeslice.patch 57fb6a91-x86-defer-not-present-segment-checks.patch 5800c51d-x86-hvm-Clobber-cs-L-when-LME-becomes-set.patch 5800caec-x86emul-fix-pushing-of-selector-registers.patch 5800cb06-x86-Viridian-don-t-depend-on-undefined-register-state.patch 580e29f9-x86-MISALIGNSSE-feature-depends-on-SSE.patch 5810a9cc-x86-emul-Correct-decoding-of-SReg3-operands.patch- bsc#1007941 - Xen tools limit the number of vcpus to 256 when the system has 384 xen-arch-kconfig-nr_cpus.patch- bsc#1007157 - VUL-0: CVE-2016-8910: xen: net: rtl8139: infinite loop while transmit in C+ mode CVE-2016-8910-qemut-net-rtl8139-infinite-loop-while-transmit-in-Cplus-mode.patch- bsc#1005004 - CVE-2016-8667: xen: dma: rc4030 divide by zero error in set_next_tick CVE-2016-8667-qemut-dma-rc4030-divide-by-zero-error-in-set_next_tick.patch - bsc#1005005 - VUL-0: CVE-2016-8669: xen: char: divide by zero error in serial_update_parameters CVE-2016-8669-qemut-char-divide-by-zero-error-in-serial_update_parameters.patch- bsc#1003030 - VUL-0: CVE-2016-7908: xen: net: Infinite loop in mcf_fec_do_tx CVE-2016-7908-qemut-net-Infinite-loop-in-mcf_fec_do_tx.patch - bsc#1003032 - VUL-0: CVE-2016-7909: xen: net: pcnet: infinite loop in pcnet_rdra_addr CVE-2016-7909-qemut-net-pcnet-infinite-loop-in-pcnet_rdra_addr.patch- bsc#995785 - VUL-0: CVE-2016-7092: xen: x86: Disallow L3 recursive pagetable for 32-bit PV guests (XSA-185) 57d1563d-x86-32on64-don-t-allow-recursive-page-tables-from-L3.patch - bsc#995789 - VUL-0: CVE-2016-7093: xen: x86: Mishandling of instruction pointer truncation during emulation (XSA-186) 57d15679-x86-emulate-Correct-boundary-interactions-of-emulated-insns.patch 57d18642-hvm-fep-Allow-test-insns-crossing-1-0-boundary.patch - bsc#995792 - VUL-0: CVE-2016-7094: xen: x86 HVM: Overflow of sh_ctxt->seg_reg[] (XSA-187) 57d1569a-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch 57d18642-x86-segment-Bounds-check-accesses-to-emulation-ctxt-seg_reg.patch - bsc#991934 - xen hypervisor crash in csched_acct 57c96df3-credit1-fix-a-race-when-picking-initial-pCPU.patch - Upstream patches from Jan 57c4412b-x86-HVM-add-guarding-logic-for-VMX-specific-code.patch 57c57f73-libxc-correct-max_pfn-calculation-for-saving-domain.patch 57c805bf-x86-levelling-restrict-non-architectural-OSXSAVE-handling.patch 57c805c1-x86-levelling-pass-vcpu-to-ctxt_switch_levelling.patch 57c805c3-x86-levelling-provide-architectural-OSXSAVE-handling.patch 57c82be2-x86-32on64-adjust-call-gate-emulation.patch 57c96e2c-x86-correct-PT_NOTE-file-position.patch 57cfed43-VMX-correct-feature-checks-for-MPX-and-XSAVES.patch- bsc#979002 - add 60-persistent-xvd.rules and helper script also to initrd, add the relevant dracut helper- bnc#953518 - unplug also SCSI disks in qemu-xen-traditional for upstream unplug protocol- bsc#989679 - [pvusb feature] USB device not found when 'virsh detach-device guest usb.xml' 57c93e52-fix-error-in-libxl_device_usbdev_list.patch- bsc#992224 - [HPS Bug] During boot of Xen Hypervisor, Failed to get contiguous memory for DMA from Xen 57ac6316-don-t-restrict-DMA-heap-to-node-0.patch - bsc#978755 - xen uefi systems fail to boot - bsc#983697 - SLES12 SP2 Xen UEFI mode cannot boot 57b71fc5-x86-EFI-don-t-apply-relocations-to-l-2-3-_bootmap.patch - Upstream patch from Jan 57b7447b-dont-permit-guest-to-populate-PoD-pages-for-itself.patch- spec: to stay compatible with the in-tree qemu-xen binary, use /usr/bin/qemu-system-i386 instead of /usr/bin/qemu-system-x86_64 bsc#986164- bsc#970135 - new virtualization project clock test randomly fails on Xen 576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 5769106e-x86-generate-assembler-equates-for-synthesized.patch 57a1e603-x86-time-adjust-local-system-time-initialization.patch 57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch - bsc#991934 - xen hypervisor crash in csched_acct 57973099-have-schedulers-revise-initial-placement.patch 579730e6-remove-buggy-initial-placement-algorithm.patch - bsc#988675 - VUL-0: CVE-2016-6258: xen: x86: Privilege escalation in PV guests (XSA-182) 57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch - bsc#988676 - VUL-0: CVE-2016-6259: xen: x86: Missing SMAP whitelisting in 32-bit exception / event delivery (XSA-183) 57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch - Upstream patches from Jan 57a30261-x86-support-newer-Intel-CPU-models.patch- bsc#985503 - vif-route broken vif-route.patch- bsc#978413 - PV guest upgrade from sles11sp4 to sles12sp2 alpha3 failed on sles11sp4 xen host. pygrub-handle-one-line-menu-entries.patch- bsc#990843 - VUL-1: CVE-2016-6351: xen: qemu: scsi: esp: OOB write access in esp_do_dma CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch- bsc#900418 - Dump cannot be performed on SLES12 XEN 57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch - Upstream patches from Jan 575e9ca0-nested-vmx-Validate-host-VMX-MSRs-before-accessing-them.patch 57640448-xen-sched-use-default-scheduler-upon-an-invalid-sched.patch- fate#319989 - Update to Xen 4.7 FCS xen-4.7.0-testing-src.tar.bz2 - Drop CVE-2014-3672-qemut-xsa180.patch- bsc#954872 - script block-dmmd not working as expected - libxl: error: libxl_dm.c (Additional fixes) block-dmmd- Convert with_stubdom into build_conditional to allow adjusting via prjconf - Convert with_debug into build_conditional to allow adjusting via prjconf- bsc#979002 - add 60-persistent-xvd.rules and helper script to xen-tools-domU to simplify transition to pvops based kernels- Convert with_oxenstored into build_conditional to allow adjusting via prjconf (fate#320836)- bsc#983984 - VUL-0: CVE-2016-5338: xen: qemu: scsi: esp: OOB r/w access while processing ESP_FIFO CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch - bsc#982960 - VUL-0: CVE-2016-5238: xen: qemu: scsi: esp: OOB write when using non-DMA mode in get_cmd CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch- fate#319989 - Update to Xen 4.7 RC5 xen-4.7.0-testing-src.tar.bz2- fate#319989 - Update to Xen 4.7 RC4 xen-4.7.0-testing-src.tar.bz2 - Dropped xen.pkgconfig-4.7.patch xsa164.patch- bsc#981264 - VUL-0: CVE-2014-3672: xen: Unrestricted qemu logging (XSA-180) CVE-2014-3672-qemut-xsa180.patch- bsc#980724 - VUL-0: CVE-2016-4441: Qemu: scsi: esp: OOB write while writing to 's->cmdbuf' in get_cmd CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch - bsc#980716 - VUL-0: CVE-2016-4439: xen: scsi: esp: OOB write while writing to 's->cmdbuf' in esp_reg_write CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch- fate#319989 - Update to Xen 4.7 RC3 xen-4.7.0-testing-src.tar.bz2 - Dropped libxl-remove-cdrom-cachemode.patch x86-PoD-only-reclaim-if-needed.patch gcc6-warnings-as-errors.patch- bsc#954872 - script block-dmmd not working as expected - libxl: error: libxl_dm.c (another modification) block-dmmd- fate#319989 - Update to Xen 4.7 RC2 xen-4.7.0-testing-src.tar.bz2- bsc#961600 - L3: poor performance when Xen HVM domU configured with max memory > current memory x86-PoD-only-reclaim-if-needed.patch- Mark SONAMEs and pkgconfig as xen 4.7 xen.pkgconfig-4.7.patch- bsc#977329 - Xen: Cannot boot HVM guests with empty cdrom libxl-remove-cdrom-cachemode.patch- fate#319989 - Update to Xen 4.7 RC1 xen-4.7.0-testing-src.tar.bz2- fate#316614: set migration constraints from cmdline restore libxl.set-migration-constraints-from-cmdline.patch- Remove obsolete patch for xen-kmp magic_ioport_compat.patch- fate#316613: update to v12 libxl.pvscsi.patch- Update to the latest Xen 4.7 pre-release c2994f86 Drop libxl.migrate-legacy-stream-read.patch- bnc#972756 - Can't migrate HVM guest from SLES12SP1 Xen host to SLES12SP2 Alpha 1 host using xl migrate libxl.migrate-legacy-stream-read.patch- Add patches from proposed upstream series to load BIOS's from the toolstack instead of embedding in hvmloader http://lists.xenproject.org/archives/html/xen-devel/2016-03/msg01626.html 0001-libxc-Rework-extra-module-initialisation.patch, 0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch, 0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch, 0004-firmware-makefile-install-BIOS-blob.patch, 0005-libxl-Load-guest-BIOS-from-file.patch, 0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch, 0007-hvmloader-Grab-the-hvm_start_info-pointer.patch, 0008-hvmloader-Locate-the-BIOS-blob.patch, 0009-hvmloader-Check-modules-whereabouts-in-perform_tests.patch, 0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch, 0011-hvmloader-Load-OVMF-from-modules.patch, 0012-hvmloader-Specific-bios_load-function-required.patch, 0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch, 0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch - Enable support for UEFI on x86_64 using the ovmf-x86_64-ms.bin firmware from qemu-ovmf-x86_64. The firmware is preloaded with Microsoft keys to more closely resemble firmware on real hardware FATE#320490- fate#319989: Update to Xen 4.7 (pre-release) xen-4.7.0-testing-src.tar.bz2 - Dropped: xen-4.6.1-testing-src.tar.bz2 55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch 5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch hotplug-Linux-block-performance-fix.patch set-mtu-from-bridge-for-tap-interface.patch xendomains-libvirtd-conflict.patch xsa154.patch xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa170.patch- Use system SeaBIOS instead of building/installing another one FATE#320638 Dropped files: seabios-dir-remote.tar.bz2 xen-c99-fix.patch xen.build-compare.seabios.patch- spec: drop BuildRequires that were only needed for qemu-xen- bsc#969377 - xen does not build with GCC 6 ipxe-use-rpm-opt-flags.patch gcc6-warnings-as-errors.patch- bsc#969351 - VUL-0: CVE-2016-2841: xen: net: ne2000: infinite loop in ne2000_receive CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch - Drop xsa154-fix.patch- Use system qemu instead of building/installing yet another qemu FATE#320638 - Dropped files qemu-xen-dir-remote.tar.bz2 CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch CVE-2015-4037-qemuu-smb-config-dir-name.patch CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch qemu-xen-enable-spice-support.patch qemu-xen-upstream-qdisk-cache-unsafe.patch tigervnc-long-press.patch xsa162-qemuu.patch- bsc#962321 - VUL-0: CVE-2016-1922: xen: i386: null pointer dereference in vapic_write() CVE-2016-1922-qemuu-i386-null-pointer-dereference-in-vapic_write.patch- bsc#968004 - VUL-0: CVE-2016-2538: xen: usb: integer overflow in remote NDIS control message handling CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch- bsc#954872 - L3: script block-dmmd not working as expected - libxl: error: libxl_dm.c block-dmmd - Update libxl to recognize dmmd and npiv prefix in disk spec xen.libxl.dmmd.patch- bsc#967101 - VUL-0: CVE-2016-2391: xen: usb: multiple eof_timers in ohci module leads to null pointer dereference CVE-2016-2391-qemuu-usb-null-pointer-dereference-in-ohci-module.patch CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch - bsc#967090 - VUL-0: CVE-2016-2392: xen: usb: null pointer dereference in remote NDIS control message handling CVE-2016-2392-qemuu-usb-null-pointer-dereference-in-NDIS-message-handling.patch- Update to Xen Version 4.6.1 xen-4.6.1-testing-src.tar.bz2 - Dropped patches now contained in tarball or unnecessary xen-4.6.0-testing-src.tar.bz2 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 5632129c-free-domain-s-vcpu-array.patch 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 563212e4-xenoprof-free-domain-s-vcpu-array.patch 563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch 56549f24-x86-vPMU-document-as-unsupported.patch 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch xsa155-qemut-qdisk-double-access.patch xsa155-qemut-xenfb.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa159.patch xsa160.patch xsa162-qemut.patch xsa165.patch xsa166.patch xsa167.patch xsa168.patch- bsc#965315 - VUL-0: CVE-2016-2270: xen: x86: inconsistent cachability flags on guest mappings (XSA-154) xsa154.patch - bsc#965317 - VUL-0: CVE-2016-2271: xen: VMX: guest user mode may crash guest with non-canonical RIP (XSA-170) xsa170.patch- bsc#965269 - VUL-1: CVE-2015-8619: xen: stack based OOB write in hmp_sendkey routine CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch- bsc#965156 - VUL-0: CVE-2015-6855: xen: ide: divide by zero issue CVE-2015-6855-qemuu-ide-divide-by-zero-issue.patch - bsc#965112 - VUL-0: CVE-2014-3640: xen: slirp: NULL pointer deref in sosendto() CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch- bsc#964947 - VUL-0: CVE-2015-5278: xen: Infinite loop in ne2000_receive() function CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch - bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch- bsc#964644 - VUL-0: CVE-2013-4533: xen pxa2xx: buffer overrun on incoming migration CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch - bsc#964925 - VUL-0: CVE-2014-0222: xen: qcow1: validate L2 table size to avoid integer overflows CVE-2014-0222-blktap-qcow1-validate-l2-table-size.patch - Dropped CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch- bsc#964415 - VUL-1: CVE-2016-2198: xen: usb: ehci null pointer dereference in ehci_caps_write CVE-2016-2198-qemuu-usb-ehci-null-pointer-dereference-in-ehci_caps_write.patch - bsc#964452 - VUL-0: CVE-2013-4534: xen: openpic: buffer overrun on incoming migration CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch- bsc#963783 - VUL-1: CVE-2016-1981: xen: net: e1000 infinite loop in start_xmit and e1000_receive_iov routines CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch- bsc#962758 - VUL-0: CVE-2013-4539: xen: tsc210x: buffer overrun on invalid state load CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch- bsc#962632 - VUL-0: CVE-2015-1779: xen: vnc: insufficient resource limiting in VNC websockets decoder CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch - bsc#962642 - VUL-0: CVE-2013-4537: xen: ssi-sd: buffer overrun on invalid state load CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch - bsc#962627 - VUL-0: CVE-2014-7815: xen: vnc: insufficient bits_per_pixel from the client sanitization CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch- bsc#962335 - VUL-0: CVE-2013-4538: xen: ssd0323: fix buffer overun on invalid state CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch - bsc#962360 - VUL-0: CVE-2015-7512: xen: net: pcnet: buffer overflow in non-loopback mode CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch- bsc#961692 - VUL-0: CVE-2016-1714: xen: nvram: OOB r/w access in processing firmware configurations CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch- bsc#961358 - VUL-0: CVE-2015-8613: xen: qemu: scsi: stack based buffer overflow in megasas_ctrl_get_info CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch - bsc#961332 - VUL-0: CVE-2016-1568: xen: Qemu: ide: ahci use-after-free vulnerability in aio port commands CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch- bsc#959695 - missing docs for xen xen.spec- bsc#960862 - VUL-0: CVE-2016-1571: xen: VMX: intercept issue with INVLPG on non-canonical address (XSA-168) xsa168.patch - bsc#960861 - VUL-0: CVE-2016-1570: xen: PV superpage functionality missing sanity checks (XSA-167) xsa167.patch - bsc#960836 - VUL-0: CVE-2015-8744: xen: net: vmxnet3: incorrect l2 header validation leads to a crash via assert(2) call CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch- bsc#960707 - VUL-0: CVE-2015-8745: xen: reading IMR registers leads to a crash via assert(2) call CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch - bsc#960726 - VUL-0: CVE-2015-8743: xen: ne2000: OOB memory access in ioport r/w functions CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch- bsc#960093 - VUL-0: CVE-2015-8615: xen: x86: unintentional logging upon guest changing callback method (XSA-169) 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch- Adjust xen-dom0-modules.service to run Before xenstored.service instead of proc-xen.mount to workaround a bug in systemd "design" (bnc#959845)- bsc#959387 - VUL-0: CVE-2015-8568 CVE-2015-8567: xen: qemu: net: vmxnet3: host memory leakage CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch- bsc#957988 - VUL-0: CVE-2015-8550: xen: paravirtualized drivers incautious about shared memory contents (XSA-155) xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemut-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa155-qemut-xenfb.patch - bsc#959006 - VUL-0: CVE-2015-8558: xen: qemu: usb: infinite loop in ehci_advance_state results in DoS CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch - bsc#958918 - VUL-0: CVE-2015-7549: xen: qemu pci: null pointer dereference issue CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch - bsc#958493 - VUL-0: CVE-2015-8504: xen: qemu: ui: vnc: avoid floating point exception CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch - bsc#958007 - VUL-0: CVE-2015-8554: xen: qemu-dm buffer overrun in MSI-X handling (XSA-164) xsa164.patch - bsc#958009 - VUL-0: CVE-2015-8555: xen: information leak in legacy x86 FPU/XMM initialization (XSA-165) xsa165.patch - bsc#958523 - VUL-0: xen: ioreq handling possibly susceptible to multiple read issue (XSA-166) xsa166.patch- bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch - Upstream patches from Jan 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch) 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 56544a57-VMX-fix-adjust-trap-injection.patch 56546ab2-sched-fix-insert_vcpu-locking.patch- bsc#956592 - VUL-0: xen: virtual PMU is unsupported (XSA-163) 56549f24-x86-vPMU-document-as-unsupported.patch - bsc#956408 - VUL-0: CVE-2015-8339, CVE-2015-8340: xen: XENMEM_exchange error handling issues (XSA-159) xsa159.patch - bsc#956409 - VUL-0: CVE-2015-8341: xen: libxl leak of pv kernel and initrd on error (XSA-160) xsa160.patch - bsc#956411 - VUL-0: CVE-2015-7504: xen: heap buffer overflow vulnerability in pcnet emulator (XSA-162) xsa162-qemuu.patch xsa162-qemut.patch - bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142) 5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch- fate#315712: XEN: Use the PVOPS kernel Turn off building the KMPs now that we are using the pvops kernel xen.spec- Upstream patches from Jan 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 5632129c-free-domain-s-vcpu-array.patch (Replaces CVE-2015-7969-xsa149.patch) 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 563212e4-xenoprof-free-domain-s-vcpu-array.patch 563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch) 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch - Dropped 55b0a2db-x86-MSI-track-guest-masking.patch- Use upstream variants of block-iscsi and block-nbd- Remove xenalyze.hg, its part of xen-4.6- Update to Xen Version 4.6.0 xen-4.6.0-testing-src.tar.bz2 mini-os.tar.bz2 blktap2-no-uninit.patch stubdom-have-iovec.patch - Renamed xsa149.patch to CVE-2015-7969-xsa149.patch - Dropped patches now contained in tarball or unnecessary xen-4.5.2-testing-src.tar.bz2 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch 54f4985f-libxl-fix-libvirtd-double-free.patch 55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 551ac326-xentop-add-support-for-qdisk.patch 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch 5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 554cc211-libxl-add-qxl.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch 5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch 5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch 5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch 5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch 5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch 5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch 55b0a218-x86-PCI-CFG-write-intercept.patch 55b0a255-x86-MSI-X-maskall.patch 55b0a283-x86-MSI-X-teardown.patch 55b0a2ab-x86-MSI-X-enable.patch blktapctrl-close-fifos.patch blktapctrl-default-to-ioemu.patch blktapctrl-disable-debug-printf.patch blktap-no-uninit.patch blktap-pv-cdrom.patch build-tapdisk-ioemu.patch ioemu-bdrv-open-CACHE_WB.patch ioemu-blktap-barriers.patch ioemu-blktap-fv-init.patch ioemu-blktap-image-format.patch ioemu-blktap-zero-size.patch libxl.set-migration-constraints-from-cmdline.patch local_attach_support_for_phy.patch pci-attach-fix.patch qemu-xen-upstream-megasas-buildtime.patch tapdisk-ioemu-logfile.patch tapdisk-ioemu-shutdown-fix.patch udev-rules.patch xen.build-compare.ipxe.patch xen.build-compare.mini-os.patch xen.build-compare.smbiosdate.patch xen.build-compare.vgabios.patch xen.build-compare.xen_compile_h.patch xl-coredump-file-location.patch- bsc#954405 - VUL-0: CVE-2015-8104: Xen: guest to host DoS by triggering an infinite loop in microcode via #DB exception - bsc#954018 - VUL-0: CVE-2015-5307: xen: x86: CPU lockup during fault delivery (XSA-156) CVE-2015-5307-xsa156.patch- Update to Xen 4.5.2 xen-4.5.2-testing-src.tar.bz2 - Drop the following xen-4.5.1-testing-src.tar.bz2 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 559bdde5-pull-in-latest-linux-earlycpio.patch 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch 560bd926-credit1-fix-tickling-when-it-happens-from-a-remote-pCPU.patch 560e6d34-x86-p2m-pt-tighten-conditions-of-IOMMU-mapping-updates.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch CVE-2015-4106-xsa131-9.patch CVE-2015-3259-xsa137.patch CVE-2015-7311-xsa142.patch CVE-2015-7835-xsa148.patch xsa139-qemuu.patch xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch xsa151.patch xsa152.patch xsa153-libxl.patch CVE-2015-5154-qemuu-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemuu-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch"- bsc#950704 - CVE-2015-7970 VUL-1: xen: x86: Long latency populate-on-demand operation is not preemptible (XSA-150) 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch- Upstream patches from Jan 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch- bsc#951845 - VUL-0: CVE-2015-7972: xen: x86: populate-on-demand balloon size inaccuracy can crash guests (XSA-153) xsa153-libxl.patch- bsc#950703 - VUL-1: CVE-2015-7969: xen: leak of main per-domain vcpu pointer array (DoS) (XSA-149) xsa149.patch - bsc#950705 - VUL-1: CVE-2015-7969: xen: x86: leak of per-domain profiling-related vcpu pointer array (DoS) (XSA-151) xsa151.patch - bsc#950706 - VUL-0: CVE-2015-7971: xen: x86: some pmu and profiling hypercalls log without rate limiting (XSA-152) xsa152.patch - Dropped 55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch 5604f239-x86-PV-properly-populate-descriptor-tables.patch- bsc#932267 - VUL-1: CVE-2015-4037: qemu,kvm,xen: insecure temporary file use in /net/slirp.c CVE-2015-4037-qemuu-smb-config-dir-name.patch CVE-2015-4037-qemut-smb-config-dir-name.patch - bsc#877642 - VUL-0: CVE-2014-0222: qemu: qcow1: validate L2 table size to avoid integer overflows CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch- bsc#950367 - VUL-0: CVE-2015-7835: xen: x86: Uncontrolled creation of large page mappings by PV guests (XSA-148) CVE-2015-7835-xsa148.patch- bsc#949138 - Setting vcpu affinity under Xen causes libvirtd abort 54f4985f-libxl-fix-libvirtd-double-free.patch- bsc#949046 - Increase %suse_version in SP1 to 1316 xen.spec - Update README.SUSE detailing dom0 ballooning recommendations- bsc#945167 - Running command ’ xl pci-assignable-add 03:10.1’ secondly show errors 55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch - Upstream patches from Jan 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f239-x86-PV-properly-populate-descriptor-tables.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch 560bd926-credit1-fix-tickling-when-it-happens-from-a-remote-pCPU.patch 560e6d34-x86-p2m-pt-tighten-conditions-of-IOMMU-mapping-updates.patch- bsc#941074 - VmError: Device 51728 (vbd) could not be connected. Hotplug scripts not working. hotplug-Linux-block-performance-fix.patch- bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142) CVE-2015-7311-xsa142.patch- bsc#945165 - Xl pci-attach show error with kernel of SLES 12 sp1 pci-attach-fix.patch- bsc#945164 - Xl destroy show error with kernel of SLES 12 sp1 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch- Upstream patches from Jan 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch- bsc#944463 - VUL-0: CVE-2015-5239: qemu-kvm: Integer overflow in vnc_client_read() and protocol_client_msg() CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch - bsc#944697 - VUL-1: CVE-2015-6815: qemu: net: e1000: infinite loop issue CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch- bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch- bsc#907514 - Bus fatal error & sles12 sudden reboot has been observed - bsc#910258 - SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984 - Bus fatal error & sles11-SP4 sudden reboot has been observed - bsc#923967 - Partner-L3: Bus fatal error & sles11-SP3 sudden reboot has been observed 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 55b0a218-x86-PCI-CFG-write-intercept.patch 55b0a255-x86-MSI-X-maskall.patch 55b0a283-x86-MSI-X-teardown.patch 55b0a2ab-x86-MSI-X-enable.patch 55b0a2db-x86-MSI-track-guest-masking.patch - Upstream patches from Jan 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch - Dropped for upstream version x86-MSI-mask.patch x86-MSI-pv-unmask.patch x86-MSI-X-enable.patch x86-MSI-X-maskall.patch x86-MSI-X-teardown.patch x86-pci_cfg_okay.patch x86-PCI-CFG-write-intercept.patch- bsc#939712 - VUL-0: XSA-140: QEMU leak of uninitialized heap memory in rtl8139 device model xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch - bsc#939709 - VUL-0: XSA-139: xen: Use after free in QEMU/Xen block unplug protocol xsa139-qemuu.patch- bsc#937371 - xen vm's running after reboot xendomains-libvirtd-conflict.patch- bsc#938344 - VUL-0: CVE-2015-5154: qemu,kvm,xen: host code execution via IDE subsystem CD-ROM CVE-2015-5154-qemuu-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemuu-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch- Remove xendomains.service from systemd preset file because it conflicts with libvirt-guests.service (bnc#937371) Its up to the admin to run systemctl enable xendomains.service- bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow CVE-2015-3259-xsa137.patch - Upstream patches from Jan 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bdde5-pull-in-latest-linux-earlycpio.patch - Upstream patches from Jan pending review 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch 5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch 5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch 5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch 5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch 5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch x86-MSI-pv-unmask.patch x86-pci_cfg_okay.patch x86-PCI-CFG-write-intercept.patch x86-MSI-X-maskall.patch x86-MSI-X-teardown.patch x86-MSI-X-enable.patch x86-MSI-mask.patch- Adjust more places to use br0 instead of xenbr0- bnc#936516 - xen fails to build with kernel update(4.1.0 from stable) 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch- Update to Xen Version 4.5.1 FCS (fate#315675) xen-4.5.1-testing-src.tar.bz2 - Dropped patches now contained in tarball 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch qemu-MSI-X-enable-maskall.patch qemu-MSI-X-latch-writes.patch x86-MSI-X-guest-mask.patch- Replace 5124efbe-add-qxl-support.patch with the variant that finally made it upstream, 554cc211-libxl-add-qxl.patch- bsc#931627 - VUL-0: CVE-2015-4105: XSA-130: xen: Guest triggerable qemu MSI-X pass-through error messages qemu-MSI-X-latch-writes.patch - bsc#907514 - Bus fatal error & sles12 sudden reboot has been observed - bsc#910258 - SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984 - Bus fatal error & sles11-SP4 sudden reboot has been observed - bsc#923967 - Partner-L3: Bus fatal error & sles11-SP3 sudden reboot has been observed x86-MSI-X-teardown.patch x86-MSI-X-enable.patch x86-MSI-X-guest-mask.patch x86-MSI-X-maskall.patch qemu-MSI-X-enable-maskall.patch - Upstream patches from Jan 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch - Dropped the following patches now contained in the tarball xen-no-array-bounds.patch CVE-2015-4103-xsa128.patch CVE-2015-4104-xsa129.patch CVE-2015-4105-xsa130.patch CVE-2015-4106-xsa131-1.patch CVE-2015-4106-xsa131-2.patch CVE-2015-4106-xsa131-3.patch CVE-2015-4106-xsa131-4.patch CVE-2015-4106-xsa131-5.patch CVE-2015-4106-xsa131-6.patch CVE-2015-4106-xsa131-7.patch CVE-2015-4106-xsa131-8.patch- Update to Xen 4.5.1 RC2 - bsc#931628 - VUL-0: CVE-2015-4106: XSA-131: xen: Unmediated PCI register access in qemu CVE-2015-4106-xsa131-1.patch CVE-2015-4106-xsa131-2.patch CVE-2015-4106-xsa131-3.patch CVE-2015-4106-xsa131-4.patch CVE-2015-4106-xsa131-5.patch CVE-2015-4106-xsa131-6.patch CVE-2015-4106-xsa131-7.patch CVE-2015-4106-xsa131-8.patch CVE-2015-4106-xsa131-9.patch - bsc#931627 - VUL-0: CVE-2015-4105: XSA-130: xen: Guest triggerable qemu MSI-X pass-through error messages CVE-2015-4105-xsa130.patch - bsc#931626 - VUL-0: CVE-2015-4104: XSA-129: xen: PCI MSI mask bits inadvertently exposed to guests CVE-2015-4104-xsa129.patch - bsc#931625 - VUL-0: CVE-2015-4103: XSA-128: xen: Potential unintended writes to host MSI message data field via qemu CVE-2015-4103-xsa128.patch - Upstream patches from Jan 5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch- Add DefaultDependencies=no to xen-dom0-modules.service because it has to run before proc-xen.mount- Update to Xen 4.5.1 RC1- Update blktap-no-uninit.patch to work with gcc-4.5- bsc#927967 - VUL-0: CVE-2015-3340: xen: Information leak through XEN_DOMCTL_gettscinfo (XSA-132) 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch- bnc#929339 - VUL-0: CVE-2015-3456: qemu kvm xen: VENOM qemu floppy driver host code execution CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch- bsc#928783 - Reboot failure; Request backport of upstream Xen patch to 4.5.0, or update pkgs to 4.5.1 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch- bnc#927750 - Avoid errors reported by system-modules-load.service- Add xen-no-array-bounds.patch and blktap-no-uninit.patch to selectively turn errors back to warnings to fix build with GCC 5. - Amend xen.stubdom.newlib.patch to pull in declaration of strcmp to avoid implicit-fortify-decl rpmlint error. - Fix quoting of __SMBIOS_DATE__ in xen.build-compare.smbiosdate.patch.- xentop: Fix memory leak on read failure 551ac326-xentop-add-support-for-qdisk.patch- Dropped xentop-add-support-for-qdisk.patch in favor of upstream version 551ac326-xentop-add-support-for-qdisk.patch- Enable spice support in qemu for x86_64 5124efbe-add-qxl-support.patch qemu-xen-enable-spice-support.patch- Add xen-c99-fix.patch to remove pointless inline specifier on function declarations which break build with a C99 compiler which GCC 5 is by default. (bsc#921994) - Add ipxe-no-error-logical-not-parentheses.patch to supply - Wno-logical-not-parentheses to the ipxe build to fix breakage with GCC 5. (bsc#921994)- bnc#921842 - Xentop doesn't display disk statistics for VMs using qdisks xentop-add-support-for-qdisk.patch- Disable the PIE enablement done for Factory, as the XEN code is not buildable with PIE and it does not make much sense to build the hypervisor code with it.- bnc#918169 - XEN fixes required to work with Kernel 3.19.0 xen.spec- Package xen.changes because its referenced in xen.spec- Update seabios to rel-1.7.5 which is the correct version for Xen 4.5- Update to Xen 4.5.0 FCS- Include systemd presets in 13.2 and older- bnc#897352 - Enable xencommons/xendomains only during fresh install - disable restart on upgrade because the toolstack is not restartable- adjust seabios, vgabios, stubdom and hvmloader build to reduce build-compare noise xen.build-compare.mini-os.patch xen.build-compare.smbiosdate.patch xen.build-compare.ipxe.patch xen.build-compare.vgabios.patch xen.build-compare.seabios.patch xen.build-compare.man.patch- Update to Xen 4.5.0 RC4- Remove xend specific if-up scripts Recording bridge slaves is a generic task which should be handled by generic network code- Use systemd features from upstream requires updated systemd-presets-branding package- Update to Xen 4.5.0 RC3- Set GIT, WGET and FTP to /bin/false- Use new configure features instead of make variables xen.stubdom.newlib.patch- adjust docs and xen build to reduce build-compare noise xen.build-compare.doc_html.patch xen.build-compare.xen_compile_h.patch- Drop trailing B_CNT from XEN_EXTRAVERSION to reduce build-compare noise- Update to Xen 4.5.0 RC2- Update to Xen 4.5.0 RC1 xen-4.5.0-testing-src.tar.bz2 - Remove all patches now contained in the new tarball xen-4.4.1-testing-src.tar.bz2 5315a3bb-x86-don-t-propagate-acpi_skip_timer_override-do-Dom0.patch 5315a43a-x86-ACPI-also-print-address-space-for-PM1x-fields.patch 53299d8f-xenconsole-reset-tty-on-failure.patch 53299d8f-xenconsole-tolerate-tty-errors.patch 5346a7a0-x86-AMD-support-further-feature-masking-MSRs.patch 53563ea4-x86-MSI-drop-workaround-for-insecure-Dom0-kernels.patch 537c9c77-libxc-check-return-values-on-mmap-and-madvise.patch 537cd0b0-hvmloader-also-cover-PCI-MMIO-ranges-above-4G-with-UC-MTRR-ranges.patch 537cd0cc-hvmloader-PA-range-0xfc000000-0xffffffff-should-be-UC.patch 539ebe62-x86-EFI-improve-boot-time-diagnostics.patch 53aac342-x86-HVM-consolidate-and-sanitize-CR4-guest-reserved-bit-determination.patch 53c9151b-Fix-xl-vncviewer-accesses-port-0-by-any-invalid-domid.patch 53d124e7-fix-list_domain_details-check-config-data-length-0.patch 53dba447-x86-ACPI-allow-CMOS-RTC-use-even-when-ACPI-says-there-is-none.patch 53df727b-x86-HVM-extend-LAPIC-shortcuts-around-P2M-lookups.patch 53e8be5f-x86-vHPET-use-rwlock-instead-of-simple-one.patch 53f737b1-VMX-fix-DebugCtl-MSR-clearing.patch 53f7386d-x86-irq-process-softirqs-in-irq-keyhandlers.patch 53fcebab-xen-pass-kernel-initrd-to-qemu.patch 53ff3659-x86-consolidate-boolean-inputs-in-hvm-and-p2m.patch 53ff36ae-x86-hvm-treat-non-insn-fetch-NPF-also-as-read-violations.patch 53ff36d5-x86-mem_event-deliver-gla-fault-EPT-violation-information.patch 53ff3716-x86-ats-Disable-Address-Translation-Services-by-default.patch 53ff3899-x86-NMI-allow-processing-unknown-NMIs-with-watchdog.patch 54005472-EPT-utilize-GLA-GPA-translation-known-for-certain-faults.patch 540effe6-evtchn-check-control-block-exists-when-using-FIFO-based-events.patch 540f2624-x86-idle-add-barriers-to-CLFLUSH-workaround.patch 541825dc-VMX-don-t-leave-x2APIC-MSR-intercepts-disabled.patch 541ad385-x86-suppress-event-check-IPI-to-MWAITing-CPUs.patch 541ad3ca-x86-HVM-batch-vCPU-wakeups.patch 541ad81a-VT-d-suppress-UR-signaling-for-further-desktop-chipsets.patch 54216833-x86-shadow-fix-race-when-sampling-dirty-vram-state.patch 54216882-x86-emulate-check-cpl-for-all-privileged-instructions.patch 542168ae-x86emul-only-emulate-swint-injection-for-real-mode.patch 54228a37-x86-EFI-fix-freeing-of-uninitialized-pointer.patch 5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch 5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch 542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch 542bf997-x86-HVM-properly-bound-x2APIC-MSR-range.patch 54325cc0-x86-MSI-fix-MSI-X-case-of-freeing-IRQ.patch 54325d2f-x86-restore-reserving-of-IO-APIC-pages-in-XENMEM_machine_memory_map-output.patch 54325d95-don-t-allow-Dom0-access-to-IOMMUs-MMIO-pages.patch 54325ecc-AMD-guest_iommu-properly-disable-guest-iommu-support.patch 54325f3c-x86-paging-make-log-dirty-operations-preemptible.patch 54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch CVE-2013-4540-qemu.patch qemu-support-xen-hvm-direct-kernel-boot.patch qemu-xen-upstream-blkif-discard.patch change-vnc-passwd.patch libxc-pass-errno-to-callers-of-xc_domain_save.patch libxl.honor-more-top-level-vfb-options.patch libxl.add-option-for-discard-support-to-xl-disk-conf.patch libxl.introduce-an-option-to-disable-the-non-O_DIRECT-workaround.patch x86-dom-print.patch x86-extra-trap-info.patch tmp_build.patch xl-check-for-libvirt-managed-domain.patch disable-wget-check.patch - Xend/xm is no longer supported and is not part of the upstream code. Remove all xend/xm specific patches, configs, and scripts xen-xmexample.patch bridge-opensuse.patch xmexample.disks xmclone.sh init.xend xend-relocation.sh xend.service xend-relocation-server.fw domUloader.py xmexample.domUloader xmexample.disks bridge-vlan.patch bridge-bonding.patch bridge-record-creation.patch network-nat-open-SuSEfirewall2-FORWARD.patch xend-set-migration-constraints-from-cmdline.patch xen.migrate.tools-xend_move_assert_to_exception_block.patch xend-pvscsi-recognize-also-SCSI-CDROM-devices.patch xend-config.patch xend-max-free-mem.patch xend-hvm-default-pae.patch xend-vif-route-ifup.patch xend-xenapi-console-protocol.patch xend-core-dump-loc.patch xend-xen-api-auth.patch xend-checkpoint-rename.patch xend-xm-save-check-file.patch xend-xm-create-xflag.patch xend-domu-usb-controller.patch xend-devid-or-name.patch xend-migration-domname-fix.patch xend-del_usb_xend_entry.patch xend-xen-domUloader.patch xend-multi-xvdp.patch xend-check_device_status.patch xend-change_home_server.patch xend-minimum-restart-time.patch xend-disable-internal-logrotate.patch xend-config-enable-dump-comment.patch xend-tools-watchdog-support.patch xend-console-port-restore.patch xend-vcpu-affinity-fix.patch xend-migration-bridge-check.patch xend-managed-pci-device.patch xend-hvm-firmware-passthrough.patch xend-cpuinfo-model-name.patch xend-xm-reboot-fix.patch xend-domain-lock.patch xend-domain-lock-sfex.patch xend-32on64-extra-mem.patch xend-hv_extid_compatibility.patch xend-xenpaging.autostart.patch xend-remove-xm-deprecation-warning.patch libxen_permissive.patch tmp-initscript-modprobe.patch init.xendomains xendomains.service xen-watchdog.service xen-updown.sh- bnc#901317 - L3: increase limit domUloader to 32MB domUloader.py- bnc#898772 - SLES 12 RC3 - XEN Host crashes when assigning non-VF device (SR-IOV) to guest 54325cc0-x86-MSI-fix-MSI-X-case-of-freeing-IRQ.patch - bnc#882089 - Windows 2012 R2 fails to boot up with greater than 60 vcpus 54325ecc-AMD-guest_iommu-properly-disable-guest-iommu-support.patch - bnc#826717 - VUL-0: CVE-2013-3495: XSA-59: xen: Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts 541ad81a-VT-d-suppress-UR-signaling-for-further-desktop-chipsets.patch - Upstream patches from Jan 540effe6-evtchn-check-control-block-exists-when-using-FIFO-based-events.patch (Replaces xsa107.patch) 54216833-x86-shadow-fix-race-when-sampling-dirty-vram-state.patch (Replaces xsa104.patch) 54216882-x86-emulate-check-cpl-for-all-privileged-instructions.patch (Replaces xsa105.patch) 542168ae-x86emul-only-emulate-swint-injection-for-real-mode.patch (Replaces xsa106.patch) 54228a37-x86-EFI-fix-freeing-of-uninitialized-pointer.patch 5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch 5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch 542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch 542bf997-x86-HVM-properly-bound-x2APIC-MSR-range.patch (Replaces xsa108.patch) 54325d2f-x86-restore-reserving-of-IO-APIC-pages-in-XENMEM_machine_memory_map-output.patch 54325d95-don-t-allow-Dom0-access-to-IOMMUs-MMIO-pages.patch 54325f3c-x86-paging-make-log-dirty-operations-preemptible.patch (Replaces xsa97.patch) 54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGH3AKDM4.12.1_06-lp151.2.9.14.12.1_06-lp151.2.9.1  xenhtmlhypercallarmindex.htmlindex.htmlx86_32index.htmlx86_64index.htmlindex.htmlmanindex.htmlxen-pci-device-reservations.7.htmlxen-pv-channel.7.htmlxen-tscmode.7.htmlxen-vtpm.7.htmlxen-vtpmmgr.7.htmlxenstore-chmod.1.htmlxenstore-ls.1.htmlxenstore-read.1.htmlxenstore-write.1.htmlxenstore.1.htmlxentop.1.htmlxentrace.8.htmlxentrace_format.1.htmlxl-disk-configuration.5.htmlxl-network-configuration.5.htmlxl-numa-placement.7.htmlxl.1.htmlxl.cfg.5.htmlxl.conf.5.htmlxlcpupool.cfg.5.htmlmiscamd-ucode-container.txtarmbig.LITTLE.txtbooting.txtdevice-treeacpi.txtbooting.txtguest.txtindex.htmlpassthrough.txtearly-printk.txtindex.htmlpassthrough.txtsilicon-errata.txtblock-scripts.txtconsole.txtcrashdb.txtdistro_mapping.txtdump-core-format.txtgrant-tables.txtindex.htmlkconfig-language.txtkconfig.txtkexec_and_kdump.txtlibxl_memory.txtprintk-formats.txtqemu-backends.txtstubdom.txtvtd-pi.txtvtd.txtvtpm-platforms.txtxen-error-handling.txtxenmon.txtxenpaging.txtxenstore-ring.txtxenstore.txtxsm-flask.txtmisccrashdb.txtvtpm-platforms.txtxen-command-line.pandocxenpaging.txtxenstore-paths.pandoc/usr/share/doc/packages//usr/share/doc/packages/xen//usr/share/doc/packages/xen/html//usr/share/doc/packages/xen/html/hypercall//usr/share/doc/packages/xen/html/hypercall/arm//usr/share/doc/packages/xen/html/hypercall/x86_32//usr/share/doc/packages/xen/html/hypercall/x86_64//usr/share/doc/packages/xen/html/man//usr/share/doc/packages/xen/html/misc//usr/share/doc/packages/xen/html/misc/arm//usr/share/doc/packages/xen/html/misc/arm/device-tree//usr/share/doc/packages/xen/misc/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:11704/openSUSE_Leap_15.1_Update/34e9715f7efbea0286217a5ba39e2f6e-xen.openSUSE_Leap_15.1_Updatecpioxz5x86_64-suse-linuxdirectoryHTML document, ASCII textXML 1.0 document, ASCII text, with very long linesXML 1.0 document, ASCII textC source, ASCII textASCII textASCII text, with very long linesAlgol 68 source, ASCII textutf-853db32d4a7688bd1a8d3e64e095c892b2810fa9b22cbdba30d45892c98c4a6e0?p7zXZ !t/,] crt:bLL I؇+gO(,s0>~{XWoˬ7[}U_EtXB1p[D ;Қ7!rw {z4sވ+tG6͜KOJr2"b -/KXPJ>ؘJXRL]ўqE >6w&v-Tq*¢Qk@`QE֗@6.(9vm<"%03*\KCAb~cOn9SH#%͚%=; G7N"A u`*C潦Z!:/|v?Eys3=P՗X} m,Ct". ^V@R-͓{JS굕5 ivE#M AO]m³J߈:QkL[kTLjszlPUSiK|EAIS%0J,E!3zcwܼ/ՇMT;Va "Gf`{Kb `Ez]ft1ՍJ'x1ޖcB0Wgu1XH"e^[=0z;їt6YtI+ofNaպ=qOUguS/xǡO]G<rK%, uN)^- (1EHU A>E8vI ׬Jq ˷zyF%ZneI*I 7 ^<(`\8)C6d @<}:ĵ L|tWK6}a9Vh&?y#~/qj~&şL\ՌG)v}U 5Og'KCYIm( -NQto%lrԟ0bgemG+L$a=; 3'V,)6WƑ8;kx<>H&C>:o|QōtSn1i ] '?.~END>!z-O ^xɴlMdM,~=H'AEPw! ,c(6H˲yHR|V ر~ *meܻs/8QYe7&x4̟6Ǝ(0:'W3ʥD[5⣇|qm(>i#WVY檇eI`2d5,nq10z),Bw!ݡE ?'BΫ?2{F BA-@o,^[B; <¸wDa@)d$85]Rz6IIoCG/4֙w pn[kԝT:T DY.Q2 83L%x2* |X *̬v] 'Љɱ,`c@'fK 3C4?$Q,1f=am{D .m$/4rcp,( E;|1r^̽g% >%ɢԬjz0RK9%մ $EA(0yV#}FC]}TnþAh;^+he̿]s1R5J͑V! aχsJJP$6Ts}Re!"})8j7v]U}V =X ]KyhJ雏s1qNj)"x09d<w%+FxjZtD:8U~wVqp.uNQ/pj d-n]s/ -Xa\#LmB 6(0o7AdP /"ОםR:mf?bkgUђS>""$\  FGJ_-a\[4 zs y!LiQZR9;͟R~Q97k; KҧOp`q|e'xig%nc^K05 v3Ps&AG+%&CnŎwu;9v:  5*dq265LS,>2#oپlJq৥S`'ةMP[ _TB%_jS\i9u0b&}Pl3٣mT, Q?V9_i4Ue2$).z ik\ 5H,h )Y0 /iVav +ץg|G\#fז1(tJK_aZ}Q\x{jڤ$ EVO-m\()@#U/QR6&8g8FX)uLjj7<7Z=o5]L9- A6Uj4T a.ntWT.u'H HsSj7,|]L ( Bxt#?s: 1/ol~#Ri)<1 ԗO)E??YFWI5X:,X~EFիqOM鄛xUV&fc8~ƸT<~jOmGmG"՞3C||tϧ]vxX"t@/[> ~{^_SXzо˥C7M$U|/ z`J0ѥ4i#$\$\s}}'bsN: 6"Pwy>ۘF\\i09`w 7 M Iz$"(PtT7zS4V<hU!{W|шOPey;ucjÂkzJ*'vЬv`ș[h8(&-;"|ۜqI;.D& 3SkxEƚ,J&);±j[ Buہ$gI-1ԆU" I,hQX9(MqDh4 )w֗)SYN(LM&:\J+iy u>|^\<3cm+>% A"wS|O#7A":4PH4FzȑwXRὢ֡lw-e!_A79)>C^ذqj+8/ EtVVO~p4zv>_L7d V9 2Ӟ(C˩/[[5L2uz,{c}uA|%<=z: w=/ѩWp5&BX OQ٫Pk~|Ȅ=t`Ω8=!\yR&YN߲PX齻phȨpUgzRXW A:IFEd.-NAɸkv"B"!ӪB@~ĖH:-]%ש.8ɲa:Qsz2h^,U;"0곫%T.!/U;nJ1'|*-{ g#ۛd(xu#`ˏȊ wfTLReK)bdViF6Y ރS$Y)6DͲVuX̌KDJHZi-yM$˲i ֋3g@VI"BqO[::2xN0 h;s+8<Ϳ?(Q|*!$>xxځBbe *wyKך./1#,763/ RC&}՜Y8Jɦ`SwjzOUN%uC2 mDvjc)qo0:z&)6w ?i䊗<1U +t9 [8.7@/ vsU\Csx?jPp8 Ղ2k=Q_]z!6P!$O0 Cc&"Ogm@c  +Vqa? hdF_'={ VZ_7̉Oޠ4wkSCSc" o%`%i{q]]:Oj o.̮C$<v=o Te1iFD=5х?u<MTXPnIgF}BcfXx^ylqcp)@%;i?\DGFȭ N?焧%/ >4 à:yb[կ8I):Q1>Q[kt^hK)֓Al 55QYYImhw8:;`%L=7U@i0f&KXJwCqlF5o[R[oŮHLɞ3+5{![G~yXIPgy=E-/CZD([qҹiYO9; j2nHrwX1|Dbc)-&9bq(u]9zÌa69 l@7I%*UDST۲lzҷA`<>e t=~lw}'η$jSn_fHa 鰠,$r 4C)߃ЦwһnbxxjYY` >W*x$茙#Q 6s =gM򋻝7ȃbF<]q\4yvn:X@Ԟ:E)A~R[{٢In.C(磍u[J&J M%$ h"TAXjo~u 4b~V0`vg2Z8ZE-+# )|74B74׀6{I ~On:?얆I'?U"[lƝq; HGFR.70ANœ5V<9z15nYZ);#؝ȒQ<׭;ܛ(e23tYKӊ*3DT23ȴ՛7GKa']}+*7Ռ~dB1X d|M2\waq^c <M˙K:v E[&A 9wW$q΍ t аW~`8' "LByBY:ASY r.e'+`+?,D5RW eurl#)^7>PRi aZKμM[ V#18ǣ>9N i ڗ~Qk:6]W?ΈBp kٽUbvۛ:.Q5dܒUz0Y֚ztC57p/ ƒ3z@ʙ8tz$2)m iyqCy뇉{՝W?AX`F+Ur8.ljБ[YJUHOL   C .X>5Fs +`erc5f «!R mIp5U.!WO>UBggLFylnTWP}s5S oZtRZXC441RU0d)V^sH.y\)T聐>ukR@xM'l{,hKEJ-NRPLJWm'졃| iOTDY~Õ {kh4 g+FBRԕ̉ C4t6Y9v{SEbL4v JdiEN1*BvwGSt{3k+cZs؃YĀz IdǺک?tf]W@.li1i&+t;BFhvX(ѰזPj*8-)*A67wub\xgV4A`$vhBz{I2[py%j>o9*qufv^cBw.y_uH_\;2\>]\\ mioa~bq |=-h;nWsvTkЊi*H칁;pf3gWC}Nt +ntGr.$!{}4i'~p!o({&p U?gWk2GT;SꕠRCn*@IA/پ:} EtDPq\/ڮ ;H2%@ b [5=|(Z{^4fA!vw~~.HtWKF :o5"4|r,Tlk`Ce-8p瑨cƬY8Ӣ+ZP\?^[{68C /_$ud'wg.S4uͮ3L~a| GIv n{Z-;ȫ䤫?E8O35W3D(ooCq&))X9M3q!+/ȴvZsZk8uw䱼8q}dyhiSMZ>5Q`A+nWb`Sbh%L[]Ћxeq!<{'VϲqCJ?v|}Zv T)GjZJ:Rdؕfû(&h.gmё]x,IDJx蛆RB̔杆e:$|;|%fSR @wn1<޿;l QIM |,=UNA׻;lL-yl>qNOo^V3o9+CS1/k>^l4&{^RI-߆yn^sY.)KE=ҢLti j~^']vB R=It,kT4^|;F@:hTEnpY32#a;*he ˼0z{`uD;2NI EdLKhT;U#}@2g6O85.R3>^h! VW|F&D4kH #V :Χ冱:I<?ֽɎWcd?bf9e79Mgns0s,[Uن&{a lbN3=:lP^|Xli2I:b:S\I,R@0I<^"4oƒ$5 ovS)TׯzD-ϰ|LN e{73 +o,6d'<VB,u=L[ErUye!Hvْn>m ^:/e [r7{o[EÔ/ʤjK2) W.vu'*;H>±x'rL TL xҳ҅⋃ϣY&7.gxZ!H1-j C %!-U؎ VzN>6&ZAFQ۹64 \~hY'Tn VgϮK>*B0 m-04$*U9 W ~Yw89I_V.Lfާ5[zzyu>[/%'䥛_C. FD+C$%tgZϿOJ0lIu@x]5&:pI #=($@!Yi>3.\Ja.)06 XC~ ~&aw&O~/6#&9㶞'ܽDzf9 7Ңwk,8XvT(lON8%Ӗw$IyXg{#M\2{S*'d.Y\=M^}'STQ}L}lZaΖ"S`ґWn!XqwNkyAMȇc$~2FՆEzg7.z0_NZ&)V'ǜ‹ d9V"R=M{艦_)A?ƮoO?V*^VV&uuhwh0C;}MwJT8̾ZAeszzgpZ„_7Ҩʖ c/Vɒm`%o82>et\3&S?0LD)REh ѝVST&Vؿ rNr4 4;4E~˥P!7qߖf +=~CeCw8XvNjW/7(d?IKq ;)nqGcHK7Q[ß֏%[9p#('&7ϯf[/py<>*qE+,5?b& P}{5tT pF5pIs 20N\*"Qm6㼏AoaJ$d $.c=?$$(/bZ"?#LՅMM dy:j/$bfVVIQۂ-k:V^iS@)D^FsƛȞ\C_aa*gXiq[$Z͑<(|0f4L&pz>-F+c;YMΩP}VF(H+k zm>&Xm5a)*#>:D읔v9fSeoЗ:NQǛSwG^ȦYuFRJk|pD!a@JE>E0: `)?DCG=ۛÒByM,ACnNp/ďɌ:nvxmۋchZE8V͆3W'( ,B8O*X.VjQ\pE K' Z2 eF\f&MQَ2f.谥Mі{9>!}`£ t[6.'PcMR3bz~oVJ[e:曅]~ex6N펷 "r4MxDA16wٲm' #ʈ!@&4hXhF_C EN:3CDOzzVՙvrڲ#h,`1끬5( WUC4U9yp6Ba[М _dٷ͘!)LRNkMҩ`exO\^EI>,([2*ɡ^`G eGAS?"]*={)~{<)Н\*)i`SmҺdֈUZj+*}(-24œ%~^]y)Fh*9tNudNAcsϽMy-^ YC|bd U>UޒcITH}ia.}V%-qg%j Ӌqz{t`y<Sb;Uc{$.z,D*E?ܜiA<\eه,H5=Fók'͍?N+r׌w_O|WS5W }' {,D'%vD;7`p57fd0|۞FBϳRY@oʅPr@&Z,Cr  aG#l S~A3\ꅛSVi2%v\=t~d 'WGc%@P hQ 7[3F}p7jW!G+AE%c ."NN.d cY=LX(Jcb1} cQDގ? Moh"麴y|.BnuOO#[ evpSwZr=P4yBZ Y׃+ ͑q_* `SusQ;k5vlp,^ cNiYTl٘狖⃵8!;4n!ߚ^HqnʿfQc`D D^$Vmy_S 3Ї'V 1[lV#_&)])|آ! $cpҁEڳ% G^WY E:k<9ɽc^Z`[<L5"% G x/ lIo!cB1#j&u\*Z C(oא>3ݹx'b(OITsX#+XSk/Z~-6H&IzAWC^iW?OŎQO-fu.;pWB R? Q+; L|68/&ݸu+WLby#z{hҊKzX 8IgKlAahZӯEL(n6 Ζ0nGw_$5Ke/JhIgڽFYƇ He e .JO@~#oE )3{45bjة=I7FB؆-Mr#AtUKQ1{U5]Bg:RH|XDzrޓq4eߢ1 Qe1&}w-+,Oms+q-B=/l֤p3f"drtÐEƖ0u aeHvցMj=?j^ezU-Uٷ4_/Š%D· PԈηJ2}( KZȅε#qmtˍ=!Bpf"Qhx۪:!Bd;_Vkqߩf|ۈz]Gj/;{mX<xScrʤd`}zC} |s?KSB}3ěÏؙ<-bX򷭆6y2ݙsruW^bl72G܊Ǿak+D#loxs4b0RϤ$DJ0T-04~vX]vii q=F\QubvйOX4ŌWs;*lHU a_GPjH H-@QصqBO}Ո-sq/$TŽAWhuLюu  tFK:?/BɸtP 뗿tQczlDxώ4o:nnZ2CxN4Κ ِM)9^ {K7h_2}(*v*vK9ėkPirLNEBSCNux1 Q3 *"F0czٜA)g|:hKP1*}#q`ɚ6-_\6 &AxqxݛK.н0ڨ$LY(%DyVI2(Je6Nl5`zVqN9XUq^쓽YĻf5[QR8UfG,_1u5ŋqHV j4t1(Իl}HRp:7 CLaׯkKbTSCɷ ' ,h<ˉ^G,e<گRֈR,R2)_em^T@Ra($:.B)S$ X%zՎ(X)І+XmUa.A58砧d_Z>.W> ?.+S"5%V6F_g%NTo?2{ecJ^a>l L9k|?d.gؐn8{xd|ՇH~$MMexhKL*KT_'Jb&'+ <\[]H-/bĔ 2y?aKN<ƋC\]D`b`_LtS/c_\(}{zcO;pLJ'ݷ^2brJe 7p vVʉ$p|揮;Q`W*١pÁ`(v$?`хooFuUK?ZF+Q7"X%Xs˰"f!ِǤTiN W9_*mqTs앉54um>伶KqJ"`! ;Ѳ11k&FMd]u?dڧ4^'KR|>@k.mD"Q4x*ގYu6)[zAL bӱb?2@‡B-$+ʹ1b9 y$w4kvPu7tܺcGJ 9l%q7 e KKkh~ e 1ڮƷDWia.A^m)_у;x%]jG`97RBfɕOY}ʟA06ͮbW&QWp.0AT/@;Rá8<| VxQ?2T'!n" .7~ yV3t+,9|f谜C7Tfjb0( +FBF%*OlL]R7,f{?oE5}AFd.]HdقQ:}vTQ(ms f1BT(nh 9S:kH --s£vPIM6,6iy-jm\ ߷Oib^c;Dw~[ʔqczly7@(K S`ŋFb}~fa;:ekSXIm?KPNv H-zܨf|E}Me&8>Ӡs,<]8+ؾGL~MehvFv"4+֦5S-} &umD`ݐ~D5Tc˗SN]ʋ%ZR+٬_5M5ps:Eڷٹw< a#U煳vveJ|IZz2*l^n Yx61=,z] ZuT%inaGG-8(C_ۏ' \egZ[e MVC(;Z<#TytOeϨPwI<e,k>xR̜beUlwӽzLIn'gޛv49PE/8J2g( ɉQn1eD)ٷn;{KRK'iOQ'Rő`F̂z8$xZI Tm/O@$Wo篖hCp@߃^uzgai6&%bDGX)JT'iQ#a-ЬeπMy4OY }Ͱl'ܺ$HjBVf՛+/st@F(O_ F[5XTU_^pψX=; .2.wmm׽oHWE&Ϛ3mh:hԻg$>0ɯ|\۹SJ`?Ôv3KЧXs  s=*Ǿˍza <82f΁zwd=P8Ĩ _Nʐ!;LOqϪ{ }I{r0hM$Z\%IXU  4j -|t~dXRma@D?\J~\&-RVm$3ޑvg1Cylٱ^\.Re٫ Pɿ/)DS<]87F.])D3TOL: Oj J!}KKiL /,EL8Lk#gtfRޖxNP%a]rFH #D\nBZ$6TdB3G`?)t͵"3/h8XQp(<J)bۀe%V k$1 Mi> L= =Im9m<ۣ\*͘o୎HdR`bΗEDf) Dkh-\,ٍ_"rIl`AYI;gV}{XA̜A:"ɋDf5[ԛ˧UPa᪷07[Qg[fُ, #!u4]R 򲞭b"U@00]*`s򍁈s|[m3(V|mNb˄G`Qx&E:w)3hhL"ּFYǨ?UbϋM69F] *۞AJb#mml)} q<t) 8M&957Hݰ䡐+[+ЅTeSo˦B*`mzdA/,u|r8ACŴ x:};^|WcnPlw+!PNn][p "^f)tFA>\&U:`hI*H~S.r8xoޠt%4~ uk~a4$ M sH$RVݡ~rny"T4C(yp;i #W "ӀvJ鄣Id(BNv- HCn$WìsA!K^gDe.Ye9՜// YO{ȃbu ~ hI(&}UlQQu/4UKk\Z(ta|A)CVKiʓh7oN=UZjgHhnC+~-s<z#PT"7U C5dl0UuFݍp4 {Uf`gz|Kp{- tơd&z'Itfrc쐨YHV؅h_3żGAͨZ=yL]lV%DJ_!gd!M(y/̾.LCl#Xs{d_01^QLV;?SäUk_"㰝 :"he|V0GmExj;rO@f6 &t<x_AeV,{ 7zX@ZG. &- B֧to<-WAVY+ۏ*nP9ުVr] =FZ\xZХCc31OxPkM}nf."py`T!sӭ/w0;Vdƃsj }$CjVִ7 Up\\V]zYPb溦_QY+n6h3t[mT#^=v ~즳!:]9Vm\I,Ԋ1S1?Z#g8p ș'Ȧ~o,kցF@t~OTK-5X:]]lbz'z޿/bx0naʬ7.lJ2*7@v' n>qعVSmLԙʁpo>W]]SЙ \Rts*$.1{?r.z南/ewryOj7~T%8ѓ5r|= KK*r+p?MH4~肽uc|55 - GPeêVp*1d^2_!+ ,A^Xd}5U @Ȍ)PC8n[KR 0; /^;2!}0&AvSQ<˚r9H[QFuzׅ1'ɵ\n3,LhZL;՛ڑ}cgx֞sI, K[#ZK(Egi.UZHzX0!θ?ЮϪf}{lF>+ b/TTlCPm?VÚh&9Q5^)SEOG2@MGdEdFhqGwuЇk$s j#]BqK{tKl0mBbw wy/ {O+%K۵XzL_/frA*% Ci#DBsVOK>|!V$uGpp} 8^ƅ]xPaF)oa&VI^@"ō9KоIl@M_ @,Nqݮ.KC: C8p >g-"0۲d8M/9G9'zXNYDc1c~)r=}-uBА풨BOʾ;Ag m5ܤ,]☠* #1%US7'lS궳^/S^M+pwRҩVIi\V-r[-"-FыRY3~mWZJX.*nhv+0EίᵍK6eNB(E҂߈8rJ-Q;zE7tIW\45W jdHx\ ~MB^UDS_71/}7LD,>/KGh;ot~s><^vqDRQY vb%%٪:q8(Mk?,ż- ncMXAM` EGLͭu 2`s~*>[Km[) _ϰs1v8Tǚ<$הUD(諢 QoGXGj t"+p݆[mlujm0,&vD̃㆞8AC:g$,Y^‹bqhKlF6#!a" z@(NϑLXwd\>Q7Չ>jziXmoіwkv/DmAB3 yRG Şݱ;IǑfbCS}Ra#;_ks0OsH) NP񩁞Њér ?;`E.#Uz=sך5RNg=C``eq ۢ&%(kW!`%B)_a 3#r[ _@Dڧɐbŋkjpvj(dA.^Qq<|#8gKVe,1H`]r/a_rPmmg{;bG҇m_sɧlq#s8‡uj2R f/Յ}QL dq_7#o$ kG"IoP^|//==#4do ouėʞflsZ<DaXEޣ51 $oitz=z]w&^Toy1Ga˴3\WOAnL.Ag!$3UgjJ2Folw/?jHu߄d:)hI.'ܸRCA܍TܱFHU;[jkڬQs˝bC)AӶFۄp4P_7V Os}CO>"0&Т(&fVz%Us8eNARxjxw0)[ZirS].ֽEk&אY#X4k+ fLJo~'Q O:W\m Wt#QXIF 4peVy+{4NY'%kXiՁ/A(lW5gO!ߴ)Y̲ i@&P{=Ra>ߐi?hsi 8;n-NkCޚdz$r$ɽ뎵1`{Ʌ ʂTG;TvՕ:ff;f2(H!:{=眕:C!T:MAJ[E~l^n pγ2Z#̫f_|r}VSߤGPZo+'?,o:A 4"{?v@U+ìǦ`i_W}hEGg<9 *;DL*^ѺT>B9u]BԁEbjV:)L&ubR*yc>3Vd(TJ!~7FD%;khZUf{F }BI[3]\O F= زQ3]} p@hNmH>攨~³ԕ XW2D)0= fC9Bp^)]<|< e`%n8c˪b2gNggדT*-$B*#Vm<or o b}Xq#esfD#i^Jĕ#Pp sjzZ?F#6Il?rAM$E`Go"#*[$ǨC<$UzX޿ H@Zd.k Afcqۯ;$g))RI jp%K%C^ `SD ؕRݰKɘ%[t%mg76̨A5߸k |2 WB!do5TNQkY@l \;`)@r0 !qcj tL1}E5ՎOf3s+ A"ؼXo)̲Ё0ڹ菪8+h퉞C$Yr+~Ȏ).c_͑vGq 5MkXD`d5'?{fx[oG$lÀntUř*? 09]$#|~Lu|o! g<$m76 ,);ˈ]=GQ>L[=땕,YhxGdʹl"^B=uX{?:ci~l~M~?RSf{0;lx vsd[*? DZayt6Z(JE9M3Y@ȩi=\fӓ Z /;ηXeWIb_Vڂ>VlfECnÉ}/9}( l[> P)F/<^7Pg&u0~`*iRR+˚g(~$W2ԙQReWQRO,5$5pݩ T33ON5/PaF5),,1ihL6_Ej瑓P)1+IjCkmW{,ݚYqW0SR=>LH\26:kJ ә}RI\ө8gb,;9;/|0̃q@ !*w„(YvՒ{^ HC U|̸:CyȢdzTˢh^PR(O.&j[ܼ8J/D荝^;' Dvow@ޮPFH$dʮQpt?*x;jM9?1J2x$ kch,FSm4Qy%g6,3wMӍ${0`78#J h"},+AJ_]}݂sށ*&G jO}]^-d!0܆)Jq@f.#_vଖG^7j4^H-'*DE+=Yus h'dئ_o=n_Db(rgQnq;.TuZTe.3S.Y Utaχ;`R#I]Wd-ڣ涇t^ J&)%@n\|' I@|VPejK,)bӺ Sס>h5B;吒ȹM|3WvLM7>%KWЋ]/+\(d(UJ\ H23Zj|hxuEymɼ|:7GmZ&]61kP7XfR[&}",⑆>&}m<{:WfOw7QWקPA >,-Z=)Q1z,m=P&Rc8RNlWgxtwKџ`PAԏ.Ksc3W*|Rr3mf}^n̪:,65yۙ"# {YYDsB i邅Ä;=H^Y/eW\t]:aT9DW06"`rIEtxٕL#H s=Q3YOBbOT UJwjg| m~R{~,^>qpyKAaQ=D:l{W%E<쇖GlV\5٤Kc!q(7`5 ҃ nܧ1؝2eǁ׫Hg_9DP-w :CVf3L\C~c@8~j嬌G(yeWږ.~(}<7. *3vmVkD2,nd"B{^ޣ:KY$jfR-Xt!xpU%YCфfaHVmOTD%ݟC,f"%qܯy{oʼnof^B&}-)$5hCw )l۸b@o!')]沚3O7 `/ H` Rzx\GNXhL+ce}Ä(zVݍKUJ_LJfhsdY LJ 'M&ž`4;7ˊ(m$le銀J2fd|˗QJP^#K/O#LkdV4Ԑ"{;3fYwo%.Gq'Y8SßXX}{>*/Ϫw-DT3)h\O%褊IѾ[$ɚ7GݔעpBd~m/|ݝPenaX]?}ղ3 H;@L~j*Y&Shi/V"] '^ 7 )hf YyK M=_N$~XDL]+Ǖo˰XZ&^ح5WĨO6IE"Q%O2)tpMHD@Älojh򕣔95wJhw#4|/PygUs҈3+ .rnUtB'4}C,y\ۙ:p_TZ56jPSbl?w;x?F(K3<=|N㫘P{2ZVq,Ŷ[p[w9ȿYh476C_5ZXE,vvaãҚ}~M`#7cIr!3GPb7M,.FV .HVig)x;{| (Mb@[qe_W1NgYUbڟ p+ IvLrڶIaߝ4OSu==1\ېQI6~VqKf mj-9llMM%{-%=l9Min~J >`q.)fv&K-R7ܡxcrP d=6<ȸlNCF}h6O҆\B3&fLyCSLm-S$VDQe5 ~* H\$},ɉ^0F~C>/ z2Taܱ֝l^g(p(lf!JK;|%}E"B4Gܖ=F jFsr\L`b%tG8lg\ҙ"HlguCBїo;wI "!T ޖÔYFdBYhX֓4 nΨ~ rR䈎%DPy&W_a\6ɿ1Rw+J EXk9 I" P]osD!#TvϸSv@Bif+(ι6"nĿ9%PMVL*mE`)<35!)~-@堯L0+퓵&= J#oɋl@Vx ܛ)ZtL geصA^˂JZ1t6/j͕;Uu*.R9dpf" Irz-2( z'%N>a]eX7j24˥PcmìorI[7Xk z E%F?WBRoI(TZbO~~椐5yamaTߘ!sٵY0$VF'ϕz\)(9xHP0_O`VĴ /oC%bX쥈,(z4DF(7/=?:UYe9w2iOjn$، BX4&1MWN[RPXR^$rrYj*? z`b]#RIlF M[V\])6'25wmDC-IsDd* 0lE>gMd(L! <}>%x$lFN^)'} 8K^ZIʽ]+r/lj+F(#};z1 8E5EMɝYbM.fksOl毇-e{ɨxvot/Y'%?9&><#y| #J[y<$}&DPPTEM=.]),o_eYOw38с\vfaA!8d}%`~xk1Bk[THv(y70R[A/3zM2="Q*phUj&!}+.i)ulVI6)n)A+tta q>=+*̟[ku3lܐ+sj" c+g3{1`+΍{QR88ț"~hQhj giK})pLgfʐ(OtKf'N|'n_S0?츈ۂ)pC ŃuOB]i%QD,Wu~IԐNk|;wf:BW6Q4f7 $y8JڜBDKUV{θo#m6yI!B+x*% $iAᕧZ.cޣۘD<`O* kaJG_%'`B;vDES0=}qu"|̷\?{OϺ2. ԁ,Pr0$M%v8-Dv8Ē1kkzL:-Oc̡ck^QB|'KuB=C_Ki>``Ao΅ mD>ʫe2+럇V2R$1{Kd[p,. Vf0 ["{Uך "t#1Ήm׌U1oOOOy2)rA@Vq( x/A:+at6y"aX{ `u* dD@ xΣ6m*DJ]|%hU#XH p#Z^޽CU_1X`UD0 kwdĿ֮@+0TݐgFn)ODF8S~ &/C aA̓] ̭mkLƙFA cIg1a˯PRRBO*snJtMz$+ CB@#UC*jKف+vhmxw16\1Gr'.I'ՏpLlUiO17/MPϖbLaeST{,hpR 0)Sd[i_ׄ<*Vh˩%oJiܔRÐ^VHHz/ wPW%vUȀ~GvIG+-IW9|(e7GML#}=yYϊ+}8s%jED&s*1H7 3A_ 0@\B*E:#.1]k B4@I2w Z3/x`ޖQU[<`m3ԉ{.j]!QߣRg ##\3.%:Ti'3 2ڀGǶhy.!JuSd4'ba6Gop{kP9 (X"k IZ>մu"HmT\Kgp_/G;Ǧ0 g8~k&=kܷ1rȚXv3@O8=E<C`ƩS=-pa[YE?Mͺ=3QM7JɃ=6崡IQ%D=CHkc̯ł۟Ы-[H1HϷiB6HlNՔ(ӯ ֥!ͽٰ4H^twz8)"8=TԲ ̢*%oyx?y舂&k!HҖʃcK5_COpNjښ11ZD虼|bF[E2Ϳ<,EN_@*;cX@{#܁8:&EZh+>p #Ԓ{vkd}q[|Q\ ,'I)dRc"rz'R$ ӅU\1lLU吏@߇NLPQc۹ ~xjҦxmoֺa-+!hOzf j-SFj]&V6HX#x SG٠8I:(Wv$YnD?4^g})8fCk9cK{KS}_Eɭ,V2N{,OJMVONR>rЂ-{&E%^JY(b 6 V3Ch %b #x?;0!>3@KxRt^//MvtP;FPBǖקc(9Ps*>}.-A^++t/K+qp7#@M)=-!{o0©Cfs."00O{8=L5/Ns$/>}#nR,'( CDωy(IǢK,;wYAz$t04%@L8 "{ V4s0.BC Ղ3n(e㼕XE^lr_=YR ̹:J3͵àS ۿ>RJf+X 0_ ɤn~rc| YC- KQWH.Uq6]рW֬Cgi1j'u\P*SP6k{\ȍ"0y-.y<u$x ڡ>*Lj6 OhSt32S^+`2oI&(Do v"Vo A6}J lA*b*k?#Uyp .:/Zfan#4o+>(Ĺ_tȊ3v{ \kjɟ%֏)p|L`m<ĂZ6̖->~3Pq_U5ɇW3-ߖVGyFGc([p 2D5>;͘Z`YGFh"K`Xxm*f]BX]( J\ UZnW\UZ4Nc4%NL,LT}ڕS!TtFD\&J;{$WF(#57 %_i_Źkњmq5lcXaJsP5c\8sw _E B! rɴ*%ar<w\NMmbi3ƅbr:ro6'Sv]2%naM:wlC% s*%M2:gRB); gwؿ4(H?( G{9iWA_.-JIKt h@2Cz(nԴAþP1CAݙa累f>ZO," Z9'QYLԻ,L>U^Ei)$uOoEmk}Hns=UwS W![ vشݫw{lֲV?c2-Ӑ Gc+YQp&rsƖ /[=5gggdVb`]H<]q]6CmwO?\~UCAW &Z'B9xS:[fsZz;z8{҂Q ~>Sj-VJUgƛ+Xx]!T7דn[buZpb1x˵ ܢ#P2bu[0o E Hdky_gw͆jӫ[/ !"* 1'Is" V >92VK[SFrHޔz͈*Tv

(yr3W/OfU(V'}J7O̫~ݖ] I'C۔ґ*$O9ENHĿ\x/Mow[}Vy|xk zy´_nrlFX]sj6N )kS&/5L#MMɊ 2Z$w;t#&͇qN/T*B %3ywGÐ2k~(^H~;/#5c;9/1i+D5u;dcF 6*}`hvXb5fd(j#quMXiY]YAi&S~B%rՎ #{R | Oz f}A9/?>YXDN Hof2vRHv cDfy'tGy~5\w|ͬ 【-(Py$cZeE?SqY#J=pmFo+չe*¤C*ĕ][$i6QA#QhfM1XVs{tUE, k.bRj|ɤNݔ'}J-BC̨KyB#gVɰڄM12h x:^1m' Jf϶%CcA0@ o;6@= D+a xWc?J7f.m 3#Jݬ -YS 9bNlW[~%Lf1cQJW|e `(P5T n4\ cwi [XJ(gIr4,o -SVMs!.6,;t^^8P{Z^QS iu"4}6mMurI^Ok~m&5%p3l1RR0'hl$!”sԺ7 1QKm_Q]SӂaI •_WG ZN.P]w"LC+jD2 B\HG+y_/W`KSG3?QdVU a>vh"RdyAY7{Cٕ@JmB~,81dV Is߂4Ǿp[0U-,]^Qʓ/)3f񱼇rS63 Q2* l_Hpݛg(2d+y*qLJ6[ũ5,&p ~aA~|+ Gw<%)[KW8fK:ݳLƜ]*EX}T3F;ӄ= ٦"h/k}1]@|ُ.ۣ7-?=S^gdz]-}CkR` |-M<ݿ"pWTCEdXIЭlZv!cTFm `k.E큳b Qx!lק{79_2 k<ug)ÉS D~]3$G^jJ2`G6g?8u G~Ʀ8//MLfk\ W),>í// *ƱE!ZٌXID ~07EF3[!hdCBny2䄟g).0*VQ42SkFE=d!íQnnbxp z8G4(5 ƀw9DD!N$&)JPg,#92%0qIʀ(Y|D^Wb R^owvFE7M 6%NJuUE\=18S5xxCiTُ^lpEV5=x젟 ˖XYLQB@P?1 {<@G: ɎqѲW@\: (3lrdD7ɞ 1O+-@|"xu=E Z>Ei̧]űcv.+̆Jސ&;9W3#fЩ/ zd6g0RD ~-jb0 [X3D8;UJhUVZxf:Ćm(}5^ACaw1Op&v\G H< 1%pk E6Y)GYG"l Ĉ?ԡոV̡A}+"J:uW/ܮ f=Bx1*wws:??RU%Ð/۱pT>TiS׼HX C70a7.^UlVt0%wޓ ў5Wojwq̏nbUZ{u@V"֊ŊoGd>m.h=-L9-YPDh -@ɺUᨢO[pޢvRp$@&3sZ&ҵ1`9fo`b_V );tD_{ɞ)] kW6f=U)2rz#@J`Qd) wgM?^Pho ~9xe*xQu<,-F%T@DBbyf6HnA?)gR`A7IH.[^,MNL.J}Bu7z4Hv,C 06aE T>,@n;kwUX,2F +A ^rl?aN45Ye!qAR)+2ʿV` Qu8DWtxq<6pEu^Qz ~( 謾dV\E(V(ƅ@hU4NyCgOnD輈Q@D"˰D\v RWL-]oOsvY}ހ~%3/.bS_XbBa#К3nus㙎%kh7NiE1_ :cLœ!UUIOB]g_̍e_ I㬓~c3[9CUxRnS˥jZ]÷Q/$Al֧p#ܭ4'8d:]fS_G<77ts]8D4:kz+I:]}}YJPJӣr,SiRg]}]ƔGdWirBVH 3Hؘs @SOD>!pv>JJjZut=U޺Ȅd=|䚠jFaKG8[GkE 80\NMԱ#9gGNP*2o?3y4φE|bgTihN;*G:C^jy/1;Nrj:@;$MLn,Q3fbR DH-(Gs]h {zt}R|?V,&x(>| A-Gs"G8aCa`͞ሢ1lAV*xƕ Ј CHeÀ9!Bw $sy*SyEzg=*`6M-n/A/0Hv Ox&VAd%:sLQ QޔB8ls,B.NΖywvul 5'=Rm1 # Kc]<^Sc7&KaZǰV1vbP„'Wsb|-un:diԊbۺUj3iLm[ $v3)Zq/F֤g;bɵOʙZ,esCz7F?}nql⨌ NR)aeCY kme6ENU0i&oW7lǍ-,C<21ٌ3O)4?G'5Fg~zYԀl*?rߖZ?Rf'?7"$,)+d >,CAg pJ38K%ucW o~摛.K(X׏겭+ ֜T"IDfE*>܍FXPsG{@3OiHoQ^ Sl@ -(cJQ;xzqh5Oݰ\aC$-G(EI{凨MᣃR C åC$rl!y`9HHׁiO|NU$kǧ'-rOF[Lb!' c4,\]I<^SiXH'Esح%cG@{e^t30PU (i~mY(}@Vw.T/8ub,q=SQjyPD|83/ڍgR#[躵쨣 B~MN=]PY 85ʰNWH] ϟ? 9i<eؽ͙z~@ĺQءFWf7>R\ YgG2}`+\&´@z:7v| i& Jkp+2+&$A!L"F?yh,:V?sH6ӤnƵZC?3؁$j%ŽGoGo3~'vCH( ԄB|&TC? 0RKCnW -&E;Nc k< !WV'F n%S>B|-i˱C1ȉ-/#ύ`hψ-wwe(sUiVe\"_L|wnΧK z1J wBO>f Xt_aˤIYqa wgU0M Șrw?v>| O^^/zy^OW 3 BpBi2-T$ 3PG=AbmlmȤPN3YpMďz#6_ľp~~z%A @<&@r`K(MFVd \xۨ}N=jok7RjSîGO(SO" ;moFSȒ_(n*aUm7^%l1=,c=h>3N+ziVd)#י2+J.wI{j~<ݟWV#Nn{9H v{.WmWy 'f6uVJ"ȢkFni>E %iRz.auxW3WF|HT|p@~+k/Gbɡaz^Nh*7 yum.l(,\-5XCJ-.93G@Ӿ'R\$0 CGCc>٘bSEAk@ 8lᅗ^d?$.i88VxU!2nl  D`= /(.CGBØ"+zT ytyOV\O- 'O; $ٵ>q)npn : 2z~RgR}hKV+UI*y :$HRm8lݏYY-s}S5ӍYHr}ɨCOoe 7g~UHb4gA9=/ LxT d6U>gf+ia)J$Q? K-#:Qk,0O +' B׋U*gS{$:v,6K3f LKMQ(.*]tLk*?"(bd3 MWj_3!/^=5UQJ@ uNu)8n̐K/Ŏ54&3"x׆񭅱? $|144Hx{8>,3;q0"Fi*Awpre \p&dD#@) N(9 ]%ySOްZдuz\N9桁.ʝ<}B 6̚kHv$Y~KHGDr8ЗW8 .#g%ePw䛸YB-‘ԛ$ĉ`Ykt]Y 9;3ƿN4rQPWRy0si0k2ͩ!n[̯$ӯ`@@\Yٚ)j?Wt1s᜚O&]P^N:`:/*>ޘc {<:ɉy+z-t@7ӣUFܟc9 1;ZGse 8-]_r p0N<Xi :ُbbY- W׶_@}5K@>})4&?E 5G,7gQHEm'KKo3~W-NqW!sq%,P=B"!a!c 'Y|u=rqWamep.{Ҧ[oQbתQ"e#vaڑRNgxT'qtjF [y % E:cV,P!*S FdJXʘ9L/r:̤6E yto!WJ̬;?5MNeF撵 :leU|Xp37bvFi-.p7SS%86 x4{eeBwa _[ \ХȊ ;1Kc%DbH.Iȸ@T<tԇ $vt:'7p ~CĘt=F/0oa릣S:?k Zʴv9̔ -?` Ų>#^m4sI2Nm*A$0I^oYη 3dޟ{FGk{&/)bv\%A:B?"ʏ ,Ǥ,{koh +VbOgNg";=]5܄#\C5ii#p BeL%3ٌӝYcY,>{j4\,@[ {llPT/#]?ٻk{xXP&ɣ (:]ϡ+uBgϮ =ձPSzw$3RT2 ZRSa 乐ۺ]2olVOn-Hkj3#!J]V-)o6cS`M1Pm yt]JЙaX-1u[h1 [,% Mg 4p9w8ӇgL%X=UO@h7v7 ÷ŕ([`˚#/>qN_:cut Q-wPCQ#)5c܎G "c)QALbm Vixy Q'^Y=4e>x)+wXf vۯodz(]Tꦚ/eM݂%Xn>ެvMxt!,FuOl_ioٿ [$[~uk}ȩWpڿjt Va2sDG[XY{QmgjT NmWs؉n`T3|l>TQhQ "ݭ`𣭊-[VS[{;}k!aɿW}D f; :q{vyc邹ح'X&}1=^[eA_C\g`@)~M XИhp/| Myd.7S&F_icpx?lI[hg+R8e 曖|+tJV/>J'$VnC[ܺRnj}xZ!>&|Íee xJP\eO:W[!$g2520B5ALf4#䂠TMBMgg_ޣoAùl}}mOPqYi՟.0{-.GQ&υ%M#N jxm\uMM VB1 gv+ z(yzX jƶdK|8B1b,A5@dJy)<|TZp'l.~#QBPD 5F-%$昕g%ïoWЉo7%`vӐE3[_6Rgl:" eCrk,NQQ';n*UJSҾ}`R_u2+V%A;Ԏ/".iq< w,]`"a0ej:;IhBq0~o!FLC`fvK޹"hH{2 wDpL@gě0J੼~)HaLֵŨs?iKz`H8'Z:ଊL n[][a˳Y/Sʑhb(-a{C藜L#xIVᜊ_JeT{j.Sw`Io#@ k#wѪԴՑ '& Hi@q=5pQvS9(g1.t0:Z +*ϟ #M]Tl؊MG>i!QbB&'kdEDɇMdOmy:6 Pza93*oQfT4xG])>Qe\ceŘ#xƜ$=i XHw+9V}wyhrYx+v0%lg;ɨGI>7w8?T7/}6$7S?=ۊMC6=$C?uL>   >n:6@ \y/cpk,BvD4ׯiyan?x&+}uTcȃYAvtç#^\ɞ?D )at AWRD`^0 fCi QA;Q fGr/I ,|s(jC9A<#v"Vz_W\JSwR.ʤ59$(O?!g ɓ!ֵ V6sdN e=))hQ%KEM# E4D 3z)xlKwKrw3d E黔SW{tObӌ*.xgcPP|So7‹ejg 'AIIhB%MVU5/N먶4d\|Fy$  =RV&믭^x*Iu"SçHL U}tUdiaҢE:XJtFaվ#>~Ƃm['OSa}3NS_SlXY \bl*gZXzqKC&rǠ䖷Dbބٓ|=ܰZ=1W. n%iOR c1O{.}s[i"DpF9^ *QDvFy՟}$()rT5P?\b_.;`'̸o@7*qTFIxɐ-9݈ &6̟J$,6<>/BUT܃fΐ=yKik5VB6l&Crs Q4-~9f҈Z .Rg!4/5AA KٿTZȑ.*nr<59/〔]h?߂$\~m ݭ:Tۯ3CHdS6+~62&{4CcaƆz  ǞhM?,LJx\ӬK DqZ{}}y%sX=Vx6s/aJw&)a: qVY$oJ[%,{7|E *q 62vdlZe,ku`[{v#i6ب.[9]ou#ɨԛ\jzx0|$h&UڃͭNQ Qj9ʁ¨h#sGR;q~ $0}VSDބS{>r9Z8AKFU*lp Xrdq*Qa%L=#u[؜!Qi#!iQLk }jV˟2-7s:nYMpVR"1R%N0|uX=2qHԟC@̟UuxVrr4WQQѧe;;Q^"U fDjeG1A 8?xLJbbNt?Z8_:͂ӓR_b7hDɦ"9P雭8i%cVڋhSyrˊ{ 67sFNC3@Q.~tJ@Fl-+S2ݔL*MJ8CZ£K^Se5"XTDDg{''c%?Irr~_ʎXZYEc@ dpaHmWC8@^۱%uBJEk`~y*қR.9`KE a <:゚G+pb =Pkve:> M -(Ȣ>UylzYӍ HnK^!;  ke.M`B5 m _hOY!݌fوЖȈU_)Jpժ8YhOvse VXy0bc'NNS:L=ᬉ|9&})ayWcŜhV3&rrĊ3IDYZ+`)U P, h%_8ڧrQ8Ӓ*qRddg~s;,*P_Ui$d&-/91)&ߛ5 RgeмԲAg2%Z+1Q >&t!r C;yҢ_\>%d3"s3A;@gRJdXrsP۳d7LlڿJ_*d 傌waT \jm ѶٛbzS~={;CoEQ,۠t{M o4^2[lL*#dw&sɻ!8DZwe@ɽGi ^~n _Aēj#~b'u&2 Тܟ<o] od>v途" 1/djqm~m XNiJ=tL^fRwJѲe/;BTRpOA Ak,B. nY|ӬQp Iz(|A,_j!]KdzlL/`[L15c= Ṫ`ƾS 6ÀA@a=W{4 h%+r"N=@oŏ+ c+ډY^Gw>?|;&o}g|F5e)l'IE`msh+Iַ Z+ym$Ŭc̯j W5bWVԨ'^/QBr,D%t?Ens1{zDwsMy1uۻ:Sp>0}&.Z5\k6;bN5EY0zaE/'Nbz"K_ݾ!N<=667d(E0QEDvãEx~s?@f?Bi,UcEĆ#\Ld]u^nP%BTǡ KG,u\qBAE 5*VO{{c̛e/(#v[\3%%+YDNEDžq[P\>1̉ZIZsUԧm9X]+QirU½&(1/`7> q=ڂiߏ9,}C? A0摶=wnSF-Pi!ґxsA忢ܻ@׸llB@2EFՊq`.Bм]N(Y۲ Fk IY.D{7 [NW$3cHvW*mͷ'gYiΊP"a!\NF_Ky@;48Bڝ|?JUݮ2Fa;BGN6_Lv`5QwCqo#kLM;)ҕC _8ڦ$_B]_=;hR͏ 6}t{EjFHC/G[hBj1|,+4˱ -v2z3WÒcaAQi4g:m aTu*X_0O*0=zk j(Z@f2BdXQ+wq79Hy`o(g%D*p}?2aB]󰸮Wۿ_~3U;؋n=W߆>VEk04 Fr3iVE!a%BjOU*9G1]|5RP۽EXn]A=sWeN4#@I+6-]Uy!lp`A}x&e[*s@D *H&4E7͎ T*EQmL!#ӔŒhJ[[lcPݤ)\Jeк [Q(d#o+Ѫ|@m7G'0ЈVQ(DҦ7ͳ~z#Ȩ5SC$Gg?RL'zoez#vit:"A!]VTL$$tb@Dqhl6c,bbۂu}Fl ,R_FuA$7GJI _J!Sq)n u@Ts7M  y>R { #

>2ʈK‥Q+g-!|u"haA+0r ɘ]HUI M|.K?>M]G8D?@rMq8m3^Y[};FQ^u}t%8ʑT^sFu .\J9PQHUۈ ;hj\u}(=/=!Ǖȧ;JTC51M:PKuxQMneGoH;ZH(o~FoLj++ÙzwW`DA`ZnvȰMfJdARH3V-Q\Lw* 2(APT]7ćb )!enoxQak\TF{V-׭xH/c }x֖QoIϪKDaZ!#v9 {BzK)KtlePpkJ8w{qR7-&2Kh8nZLVi FVhēZStfZI`}>Ԡ@,9J E2;De촻'!h6P)x}9G+(v) p4+'NeҎJjkɈT3Y?{(bv\? z}3$| c8\8R-wazIe`5m_$y|bL]xOC5;A9)ê[LkcnD,7- {@?_}<)j2!ݗu0_^l!VJ*֞φ|+C/4pS۪{5X9+>ۿw5좷+np篓YMѶ J(d Dr9oUD;WRoQx`^QBe4cuŮ&K \DwH5o;cd?L4O֠jSd~ZԱpZ 05V{9)"(ݩ4n2*BQ}[dhGN!ͧf-V~nOeiyN< $fh,~yY'rH.llŔm ;Ng~Eͱƹ 2rK~DGO,B (`FK yn`Xp[-D)68k ߚdsklCn'W\6+aezv8g+lhĔ?VVk'"|1ĸZ&$!O9I9xoEs%b.x"o8抒aF[1čʍ{  5A$Aw"FT3ӥz՞ ǡ)9\E 6Q'?q |2=lOAkQR*hfyI &A'$A{cz^k@[)P+0׌Xf ;,|uPFVr L1_˒= {:ŅnhsyŤJ :0bTBd3 :sj(זliQ0_o:ɞwIV>=Mhn'}JM @Ӆ2n S5 !D|\EːN\2kkBhs1dʽ4&pJF7[z876S`ks$JSfdD'!>/]?wm[v,4IǍi!hrt(9p7,VﻃE7 *Dr8J Yߟlikũ]@ go!%Q 87\ҙET4 w6Oܫ{;RҨ`&%?MͫF33 s'ij;: #if6ϯ_MAȳ]!| <)Q!=A%DCg(JuZaCPe2 3ޠ[^%*͗sOO0ȤᩃZԽQ5vڻY)7w : EU9/ϴL`sV'ϩ,M bvo6&r&q"PDzUkgI4BcS>}ۓ̺y-FOu %ſa=j?wI/h5Msv{rR~Y o* N- NA`=[vc3Z  p;KfjTe2(!n^Ru%4T2q9F]..((2m| _тO_YM]|Ӕ4&s (TY)p"trYWs6)#>Գ_>} ̔5݅WkJe/ YNdf~; <j8{G'I;de(ݼwϋuL:N-h]YV7YPL|Z 2ױdC$h·NDMpf̏O#*lЏUey =FgEQ3c7̀y9 U5-ۂ1#:XPFԓUfݹ}#$нWH$Qh;:D3sB5e1D\wHǮLϡb9VғkGZRJN9@Fe=5 ]M} pzt\򒯹ߛ.1Bth^ru‰C2p^߬2DjNpGkY YgخK ˭VK^--Hqm;g,iQe@(7v,a/ m 첦9aOBn\*b茢fppn IP#-i9uO bfCl,y1Oõ": 7 ݀.{nR'sBb7f@o3]?WZrA}^qf"LWڝpz  Q('ݳ]{T9k`IT#݆u@;6+ yݓܭvnz! {%%!ώܴH=[YuŸWj= FWh"pbxw@5!hxz$ iJ4cs4C~مL~&ݑ0i./Þ,M^vi?>]uB{QNR1cڸ$WE,?v}`J"3!6:m_eؑWAMP GK[ϻrB@h`Y2uxrCᣝ/^-` ԇ׵ez?A+2mF-%2KBM ѸLrpD#l4(9eqEaĴz+`*$fAQ_&I~_ ?_|[ !ڱ9&^IGyhʉS|uυkZ% WGbXk A$wE\MDGEml1OQї!|WK0̒|{44"AAwwM[~AvjߩK$B8Ysu g+>:ܠ`EGKFwł(+xsE ܍#Mufs?vP*D~{|$&N}t'Ǡ=#Hhy>e@2IOdaf +[oUqgyF/ 7nUR,gA0;j򻳣ET e2GtJR`ؽ(C;!{fNr*ƽJvbd};/+=_ W)a%^aԢxrF hHpbZ6b7d}W[6dmc`cIA%=%C`;f{VmCDabLҨ 1MZrpb|3;;=8XVOŔiU*P[!Lp5Q_VkI;U5qoڥ=zarebQsہ+bC%i!J Dy-~Yx=jTl;80S j)0aw7PCJD4iVQ'u|W7 r%X'KN?$u%'%yB+jR }q4Pw"lV:eV}ݗ–}!螐3>Rp4/RDLFICз|BILY꼳juGLtk~T9&Q1/Pi)^IhSs ]!U~EO%?EUL:2v{@XOi㐷qꇻ+m,%T"u&F)`pevVAږ/V7_>net;HF4Tu@#:!=ZH1:i7E{`p @ңsgO܇GD.Rz?}r_c X-B9dQ'>ґCOw g{ZV>^ ;B$9!B|IDM %US+Kf(5RufQkcs8Ő~(w?L%C\:N3SЏ[WV)".9!5vU-yX)u:;CقB؎[s^mGHMv1}Apjm2t0rтeur h b"oF7߂TiEf0MH R{tJ}K} hb?DC v3:g-e:LVd2| jk2de#O;EJJW FFuܚMmOMk_n)6Pd>qSKHKk &yn{D4[dxID~8P }%Q”$KWuC&|ʛn0@v:wƔ9o_f%$'.ȷ݀94< l/^vVATކAKxHؼԛzr&لQ,6q]T@ KPSpm9+ٹaӠ$ɨ({!`{!ϖ[꺸 ЂZ.]E6KsF;F1Z h{2= 6Xq|SFȾjypw3"=A#X_S.Rxq "Đ)ݻ! 5'fzcۥ9r40iy8 E :B<9+GMzR{k7ЈU"qax x @цV׾NX'Sq_,XG}y:NNr&ƭѪDl$~J$Wת#G~ ֐v%b36Q5Lˤ lARV5s@E"iV}7UT6 29Sɩa^ԌFїAP2QrL:eGUMq,ȶ#Mu ^N؏N6gla9Eb>,wY`A{`c09*q{^*y-@ z_?w#mH&o}i,._R%)ϩŒ\g,f&f5!En*QH g\47 R嫍&]sԼpCq~{_a H%ڬkL,/2p6@*lM/<s5KZ<OFxGRgV/þW߂k>hX0_V)E7Y +M 5]Վ#YW_[ըȭ;  ho겣;iDb]]08s*փz6»-A4vCŻ1'$gܚ tFv%1zC]6 ?A&ŽWdIJ li#vy^\ɡ^Bxs(#- =8z!g+Ƴ'JddvQMyDsax^ܤ0(߻kcW_=ӄYU#ާq)aOu>B]J}<$ILR#H`Fim`PİzSyc|l9(u7ljzIK];%Ĭc * EwmR]m68p[D!k:pŌI\lML.ZgTs?ùzE>{1C p&$p hb2N{IJ~xGk~, > rWgM༼  ç+(\:aXͥN PAk!0t5 iz(B~wG#ռ(5YB ^t`k=uQs 87) hPCcёV(G=(2 ˥,!UI~p }ƽoGpčQWD DBNsq#4.-h,nz~1A/ ] M3x,>k߬:f`CڢO5H?Ǻ >:m+*M{Vڀ#3Ɣ=Uˍ]qGG*2xQ7Þ7I u lYlfE󫎝Oɮx ւ?!w2+RϻKr;;PѺa&8pV'R{7_g칲oRVΰv4Aj<:"B#xyo0&p Ȓ wxq||_~#:g5iq$Fl@L`pd }}ߚ+L-M\fi?~/4 0^Dڟ̗[vɖ X  McZ Rok. {#7m" @䞧= _c{AGβ9>u~%]g///È1/9.487>d}Jz1kXS\' #Ħk4IGM-)ա~Z$(Jj{ڗB7K"!}9G ըK=J,aI&Eg3gુ%0~)5FGz{jO %q J)JTϜ\X)j+^hK hGl,/JynHaa0~b6eP-ŏhA·S*U>.*~kt(nrZhEA>8k-]aF/4*?<&~D]PQ_T;S.e$@h|j%X`Q8#,2+!:g+Q:l>!| 2Q(@w=wCC qNb|97*bԸP jY{Yy• {!=§47Yq? FˈlIa(Ew^bk}6;(d2 /mRhueոW Mv-e~x+9/f >ٌأj~e^F$&bz'`Ur:ۺh*$z:&d|㧍GMЋF4vg]B^ІDRV41BJ.P/FoEb1 @oή JE}~)ÁB[DFMs?x4xܹ+sS*KN\Yɮ威P<&)B@7|65UR >Dl$4ԓjr LYJxd8PF:Ş$%MB^cuy3o)2x8 D2e -ܔaKsnūM ؿ`,g(Nq /2%` XZ&T,YjwcX!m*–)Ci_̜وsKܿd,.(4ڵ'>Qc:oQ})xnA@kzn T'OJA 1AF_rsϦR~DlT N>,_^oߴթ4(/Mh3Z~`pbkaIh"&Q=&iFQP2R-4\&P֯wkdpX/? %AiPkB[oSګ#e[a$rl IDhXss 13ݵ:^5d힯!4\-ŮA[9'U_ tQ,nZ5KIg`i]JAsάR.Hf<܌Rz|2t37:`H}y) pc~{1szڬ;$jlm2 3 ,2o2Y[i#aIw5B̩\svMm,COfrE6VhDQ04͓_Yqիn>*i-fJP$Lr9En)PEMg8]uE (S/̤JS S^6H.:g[9 l O{jR& L&~d$PG_g[LCT]IboGؚ`}"ڪ"7D7+x꒴X5^2BM>+/[,᪎¶$1tI:H[3&9c´@uގR!6"9|UI!m wM /PxsiisBcixջ^){Lݥ3zt(']|ڡ3Rҷÿn9%-ճN?haA>mcƢMA։ /RA%ASdN7?#qђ9vM]]day'nq M^Vx]fG 4XAZ,rD'mf|3M#m#s3)jwX1pLK`/YC D(?Fio o 8*DB0Cill yi1 b,תWo=]tbiζw^w 70\DB%?-na [-OgV Fq` r Gɮ[S?R$xՌJLxMmׁXPhe^\F^{pMr6׀ Ғ: nVK\@f jyq|f vJ l~诬]rBR6 ;p-$.o >r[tZv7͔URgb  *!JcTk:;Fˍ/-eSHj_tl_05`ps.ˍ?azeLZQ hs`%,lĈ&T-*Y#g=)]g'?4yԓ31s- Sz±m0Z&e BлH!nСZKT|ts>䆲x]T$̦ni[*/9eO/ɤi+0G^<ћ5}sC>kL&vJ~i2b;dzrLRⴿpjxFV F$,\ۛH*!7| v@>[ QV[A*f -rAMp`%7=t<6 ҩ-4G]qmVD G YjI勪>s0+uH' e,8C6>}d7dc18 w#Ezz`#N)q7wǶ_̸B.לN0꧁R;J9qUONmSdҨא늴HI#gN~2zH y%-j򚿘[7|}S ]U^;RcW}*~`,r; Y 媊xRsN )wP% .t'X ҬW G6Hbܐ.*rQ6|sB@ O:WM@S{N+!oMySXǾPNdT3F FddXյ2=hOpmhe,&kYSAѶ+U3cRZؕBs$3xdTCwx#pz`8a'jvRs٥Pz[Ⱥސ.<lo%y_ `_#|6Nې`|+2ODon5=SU? bR# 3Bqo\mvO5dbjQ^G|{Kv<=h+{i7$85;r?$픓i;y㮏b$jd(30_qVlM^SI|hQl2bQo}V~-mHx&ws1( 1lvvZdW^W@ ˸umYeer$5bRKZ)].""$ĖBH Rv 8EɿWay9Im6L;OVLH/?cz/IDjSzU%=97?m(-d7 <\~cOEu q h]>>Fw .b~ñ+xtV}AA$:+6"c'.7nTasVE}呫M+k< qR| TʬcrVI=^rY(&.xmܶ(.)ؠ18Non9oJed RrM-uIԊA6H3)pejw[2$4U\kuĒC@,5,wa KS$rmţԻݠ~SAivjla:7@ /5TXKOmn*OƁa\:Э`?/YbM$~ Bxh޶p}b-Xx.yvh DIJ!PlI;dR1 _dH@\Xs)>99'f덦Y_͡-v ]:qc!n#bWAiYrV 1,=?qT6.|(iWzO K")GJFraOtQ)Z?~>.\y\K#+&OKDٻڷku軓#h-l,L-OHk7ogj{yP#yNV!CIkqBwsBp#O'bZ!w,(dqo, 3eO(_h3֟;efپ\+U7}]肜E2+=(qҭӿ߽`$3݂)q@ #annġ㗜;3 KJu) Z&~P":0\RT5IR!V*\j24Ԧ7cM!Z^"CpXlspu!%yMYָAܴ tϡ")v Q+"FR$0&ɡ^̨2%bRiabo_{ -AǪCaɨh}q̀z}kU{t p@)w !EaK("dR(, DT[Ձ+5c5JW1wX<6D\VjZe"ZȻ֜L |Erϔ>'ؓ&:9t*(T*HlK fm8h=))g3THL_nK Oy㛿ڞ_ix5hi:ߩ΄МRg*Cp{4&%.L&m/K s3nMHU:yXԂqXxu*0ݍe""ҭM[Z%^R7<g0h6wy!miP>m( eKoeu$)μ/<zs6èZx G=4J`&q qp&Ƅʼjz8[?s; Z-73n%9ǻ~&~/-e>!8 DB0_[i$4 ˟Ku:{\ߥWukEwV.ع"2YX >$o)Գ%ybxS f%l*ǵZ&cgb@`ex/(,+ pK:Ӻ/,qs_>zϥەW1yse=>l\s?xWSJJCڍŽ{Yr7`<^%6^\鱲7wi 5 d92{Fp W6CbǷG)[aז^Z`9Ӑsu+ X#rpHPHf f 6Of}`H!xsؒz &2gS)gj gd$膢m4(,뤧B_-"L93Eg°Oo8 Ҟ@-l4íGíN]=L&ĕVHy6J $mk= #G=SVpq :8\ñ`l}>VJQJKLs%7vR>#@`¶5ąFR 0]&i>Kh:F…SMz{dB- `xf(#5ѼØj`r% t"]JU5A#=7ge^lB!nPxzۯW)sNg!_h> ?ܑ۟jX~~`\+>]#7}hn2QN T@*]k0A mu8.ZJ ˾xHGZqppz_M׫tlxl+v)~2g+EP:aLvkS:,s?R (;B?1/=/3KSȰN~PƝCk~[%<Br̜K3!)"?<N4Rs[=|'{8Wu ( t^ERFyϭ([eöIȤ>`!$1WYRs-Bm1Nٔ/^M^a)>ggvqXʀV˹؃YN?:Ђ_dh, Z)J(Pyd3%([`H$Ӆtr&ƀ,q(k+S?:]=q`7l*3J6u$kCwws; W$Q췔`'zB|&MOD:J6JW"Ebi,ꚄCL(qh8J4MINKt1q5G4@H^ڪb"*{W}]6Ol]Q .:S5.,l&#Rng.jNCe]A` Xhc]i'ROINY;GO.`yh(ȼ:%>p_"`1)r|Ŕ',(JlӃlsR69',y)pD6Ç{L6Vص嬼<}"=2HWDc@n}:|lk/V\rXkq]Hh4Bvٚ$i7<6Dx @l5׾o j?O杅9/Fxr 4<`h!#e1!.iA" yȷV~9/$tߐXs;f,#Qѡ3W_k܏ll7#KzI pg孎<~[E \hvWrјTH2eyH߫)2\wDxݡL%5CS*wЮw".,0bA%1Mv >3}\Yn?lCA01oqL! ,#%AM-m:wRb.&E4p4Ҭ";us& .[6fj\Ñ(H{|Wsi{Z8O{=۰Uifn&C܇BM^v'ŝ7Mc>b $ ,5/a"GW+n5F? ED}jT>vL) BeȄ|p[M9@<S N5qjM~h "c+]^$38sK ;KƹH.{K9; ~_:+[:k ɵ-~3򲮓9@'GGX$ґt,fRzY)4NOQA(~ɤ*%mlBA ?6;MLO%=e:Îz$16r\(dS-Jpvy *]85W2KdSly&åXZ'#&@ p?H ";L IL8t>s t=*HBa'h8MUv2 8=6Rn,.lVe*)W1QEfTa5;pY.vLrlS4> 5xq"|n폋Jk'YЗoS ɳSɐ=0s-L6+ Ur5DE[adIJ:=6CI G-l~ѳR|l)jcJkUAQWS"SvdnhK[ 8iH9c o޾0^AQ!\=Ž D0te(:H+4ഛ7 G`(l%ٻã>-4%|[yD0*iivEp/j}X4Ӊ$ TD[m =9&pGN'lQ_.eƶH< T# )oxhf?k_q#%0YF`CtPKtO>:8i$$= =%@[#^qV:bY0@,1?+SȹU\X& WQ6B84Tyk"|u]2]UZw`f6όxl duCt]Z:OZͬ~:~ +9I{@ T;?1knYpFpfq2&f;T:!p&JkqƪBπ_@!be~޻r3#cr`Wx1"Z,ًVCFUChOt <>tjù0^';5{2)In}/P\9qqR]rx d ?/mhr<'GN. nh_}}gR~WN2iXYgOiVrVq%XD_Ĭ細E?:iC77DCq}]~v}p` W&Zfr|xR$諽L3`84[)||tـBLpO'R/PͼXЍT6_m[n{ѣun*=1L+_ҵrDF/Wac!̜ ֈL$o |L?lb v#k+d(GcAML|RF;KXٚt^gnM÷}b+h6\{K9Y/eT F?lr g-@\8`@2KAee}@мJc^\)4z(kbShqilab/0sK^({^/Guۖ @_dm!ֲ-KYSI}2d+ߺ[y[ƌ8K{" ۻ =e/~%?D^[|9&"Y;cWXU=+4&<3/W>44.w%K!_J2^):y 7Jib:7¿}[r ".-s}*3w2S;A(I ixˍ7>!Ekqmbuֈ9QstW5<5j/o}Y,JHbu@ m ,F(8R<l(W9bm m;*u6m(2:ĩԣv+y鴍OO]hhs;Jb,WHmvڀQ2<#:F)$T=8##Djߕ9opDʘ+&/Pԛnz#/ N֤䓮s*2ڄWg׾kZD6>zio8!9=B< glBB{¶+ 7e,T5KdS׎.WpZMu @YH%R3GihѱxsHxʄIK 5ِI(OOzb*/lvEŞN!.+^6W". NjeQI;5)Vg]JǎJ,w3vRl&`yLe;݁;8 =s tQ>}*R 0WTJd #\"`nzFxe˼u02t a79S@۴'CyQT3X'_p=08STf3z'DR:r,U $ K{kzJm&Pz͌_7}"G R+6$`DZΪf P| 'n/l/g L)hfβ А2y"sBiQ[4n}X߫@io0/+J+aR9W`jU;rv Y"4=ҴiS\| mU]wz`Zslpf78Dmbg9!-O":QЫ EGo"!2W45@ya81dtJ ! wg~4DTFN(ٜd՛|,̬I}Lٲ_=װcܾ-To_cOWEXh&Lz#)jBDFP5bBշLȊws(L3 fmμ5jX5έ酿*?2(LA<.ں牀U+@1~Y-ى”mnkkLf1\nxn&eP6鮱[#j[G+FG^?@Bז\@?_8K#Y}̓k8[i #e`C/GWP/Lh6W/ k[[C`q0(0Ln *hd7ZEnj3uod5x.F~g/XάSb2jE v3󗞰2B!>VB5TRlm|8j0IдҢ|'֬Cf?yѼU6 aRgXv$:P4)j%:D]l]ⶦo/ ޾ UdXGNgvL khH]O&r0xx(Bd'$hHmT^YVU_jΪU2o5Z@*bC(ɍԲ9lRM|ew+&(A8<~GVgU/xB1aūf4R =K7xA"{n2|}`1:V|1[K/|#WM6qHS#7x7Q X4wVǨ_兦iT1ݾyiǟRBr.Hi9*#2/iĨƋ70ڇTcSl޹/ Nƻ*bxad{i `:ANqR9̐4T@o /QIGm-%\dP9O')IaLTZ][&X+O-cTf)M,^7(R1ejqن#kr̈́&A'lа z[jNjr7)_ VT6sX/2^FD&g!2sɆA1[VYF,ApmK34L`OVl m'獸rW}#pc٫Tdf*U Hμ͒źHi,/x(\d}\ӞO7R\A#6o |XPg5+#I:0|+$M>3n7Q2 ei9OSpY0g[)71&a뀢V1XHgbqBA\\ #CnfnxEoݧ{HlٰQĥ廅)9LK^l5@VEaSk1MtLPLllƻa\yC|=nGn )vk}'Q>t3/_ 4Fgr="xZ|Teq,abcz4h>p j'+:"u^A ,q!>WxɣFǨp7W*<0i"/ =°iTZQD;A.<,l{EٽѨ`_ٱeLw#+f$.?'_mxHS{`k`y=d=Bx6T%^-)\S1硬&q&DWnD4uo2}8A#o4HLkD?G$\}=':`B΀!,GYRrKd&@:cJ2|"fg\vfƣd#dIҮ[9 ~,AMUIl\5 ,i{ڌTK`.Ẫ`4IR˾>n2mIoFSe?~ Yy<^Ƃ3k={7$${]59q # c4c^ӹaI.0<L#|I QR8*Dɥ55 }\,\xzNqkA? S/n>ϗb&P@3WMK ς6uv= 0LX E*(eM1R;Q̍ }PI0W20D=;Xm:l,޸!c^K&fEk#RVGK)xăN3SE2݁֎K 0 dK=+6j2egմ}8PL%Up7`%W-107ёw~D4~Y<, " RѓNnv/ 0zgZˑEe)D}"kx3L .&8eR(1>h9t<ϔ%Yj 8ĪuYc'=9]#wC! C X7ýȁ/oa_8""6Js~*Å2h,!,6z- 2,d +Z *׾:={Odyqh̺VF%"* &q̮.0OȻu+Jgzf@B܌DVv;xdެA>{<@ezI漮Daxt={l '6x-;+١(B=ui=ˠc4R-} ;' )mSyǥڙv{ v`]FcK4QYYC[2D.Y>"Xg]/dʴwɤYp<)~"{(Sٛ?&?H1Zxg@ nߦC}^tIѽw)skouؗͼg(t\G{ }.N-Cy "c1 -l_D)ԔF, aŒd{7W?Lps0PQ>ԳvL["|d1tf~=4pʗ=a.Nw8ZbWJ"Km:iΔhpGwד&:Wǧ&k: [KfQ)E^</p^<7\Tv@ԕܹ yV"|2.@aK$,ѳ $ҩQFUH2jֈ<%^#(hEh[//wȁ@Y.w㏕܌xH YC4;klE8 q zNX-I am8KI]M%N썃N3RO-zՙAxqr&%ڋ!vu%'ݚ>1@w6Tڶ-D9hWjbD$l[~QQ.rOa+S~qôdV:/8.eviWTMyw^D(ѕ U>uʈʅ 4&bUٓڪ0ө;aA7dÄ1/'1"ʳ8!gVU m>e0s k_Y ˀG2eu^t8=kSvc;Cהh_$Y''b[*!TH{5B$C'pÔL|5D>(MwYry5Z;Hgsp""B+1t)N5] w(Y_.׊'[y`DA "/L7`7\Pv5[ !|}k`#dݗ+^0 -3@VCzhq':ݖ^4T|DHC4]N ,! [w27,ha`"̍*ݾۖ}V2 P%=ű6pæ,ů؜, :7/=X4֓Y֟22hAF OzK5xl-f@g)`76#g8:`Tk2TŅ +p?vAYT=ys(ϟ )⁏h/Q'jJG-;\3_8_nE:kiI}bT˔|h۝4OA%>fsuLJzZd`GC*tXQwӐ*,zZ,s+mh$MSݒw%*T7Hzy69 AE<}x\>QLxê|y22twݪ/ v^ 8$߄;u9v)B4CX?̌Vj25eiO pV7d=g@H f7$$q+)Frۭ޼k-;xo9-%wͽĂ%'tx+'aK`]r39cRxY?)904x򍉭 \KԽھ*s ZX*odC-6FÛ`aеCM=FS`a)uY7#`ի@p{Q>vq*WW^H|'kQm0DIE|{tLEjk&%檭2!&6e6^qzUjgci"H0;+=rc_rʈm}#S!y(S"Hx\dW^`ũt؋}F 4%q;XiE~bUS]O'jy 6[9U"N\X. wM0sEB ZZa+ѥj=Q2õ2OLh+#婏@|q<˿(o4rwրsy1(Սxs`ZNK/ YW.,[m& k29hbx3*c&[ɛb4㇒/X/# Բ>$ly &T=(bIO+g1ʹ[˷׿ &QqktB):)HJ7X,*y>^,>I1?qOdn4 )CCgƹgLT? Wa(϶ Dlp*C7`J8Z ci'Q,S-^=Zϼ~ 8%4hXq[4p@e> -gQBCc3cSTosc]Z eiur`q7hذjϑ}/y|Gk]<|Cy&1*xTXb;.ڢ§zCpZ|?xu$K:jH:1N,( krw 2*gWavZ,ƄF~*0@y Tˊ/ ܘW֚涔$8NͳB+ܱHFKxP LwW'CC+e ?47+ h {l}oIF[[~*DH0Ɗ( g_(Ll52ՌtԠGųex;F۪?]KߡQF=T?Aa1gs3[?h3-EBmWzb!- ZhK0#Z+!Dv@ĄL"f|~1}yWH۩,u kJPYr<_o]*jitL {"a~@v5 ﵖ*Z.A(*pd #|\JYM K#0d|^B|pA* To0A]Oot8~d\mh4|GHB .!{-J CK Y$~İY=lc"FKwoúhfnRq9-yS} bP}7K i7K}!Vڕ14sN so#z^\=8f4!}D.FJ%nDn~WTo@.룤8@.>[]ues|2AV 8ܠԭ2 CZ8-caEU9y5%!Qr 2J 1qa[㒔#į>EcwgZ^_Tx3 c/lVy J3u W^XAE, zb"ds5@v [ޅ-b =f13棬!! @ hC=xV4t_qd`hbx.Ne }Rj}Z yzA.]~ §Z'DL_ i oEv|쑧\tb4}%GNa&2(ꦔ@;7;.ғVjRL:.{$ 7S%p\mh6>۔͗MʞL_N^c[½ /3ggʤﶅu,RoV|Ny$]_VAޣl>1:uuY>+Y$!w?!_hr}r  ~=物@$*g˃V^ݢ~LUQlm8>/NKlI"))(Qmt5zwU=#'h3d 2:s` ~U$JF ;p7ԍI\sRmdydj8j}TIe&B8Vxa(7Kt.NC`jo֜S 0=i$+E-xKٟijA<%nrWKuO|GY͇ {w|rd a>E`䠔![bx<خ8=g!X?glLG Κ Z͛6rI^Y>Ku27 i)j/j }b&6&KH#N^+ % zR9w]z܇Ng# 8;aMeLF͋#Jt~뻁Ρ.&'=,E?E1ߎB`dHo8TY. (5j˙q}NB=8sCʵ>GJ%_ T 4բȬeBTۆc53,QW"ſYvɤ=Smj8̴_ީ]¬S&x3HID{qxɤ:HS$&MoYu'tCɾE)Pm~&$f!XԨLfj w]yPFa%ZkJye@ h%pXѼYWZPO t텇T[o!e@Gb8ZgdMR'%V%7CېZP4$/K$tO0e>,aI#Т0.B'jtO>aՍ \)`[AB^I{%Ĥ4t14\»&T OxM#dD)x;gpt}QQk>/sYR.Jhʮa3!AS䎵džה8# #9gWvx%؎ ?HF9*6 O+cIB,CJ*öZg=e{vw1Μ&*s;kQK7''feӿM6W H]г(H Y@,gmelnϋObS% riýÊ0on?;ã0v:|Ha"X^f`˾T{5E؉LG7 n?~pah`ZFY/Sդ;${s}w]i '=l dh7e+Y oa$7 *mvwXہ:U|8|1KvG&FϱͣpOnڳ"n>m6܈KE [S>iPeV,u[ *؄ ѿ ߇u& txEk';Y/x]lqYzP͌vCȍ9?Ŕ- Xcm`}m3Ҙ_~P}$A)X}4Mj=KoD05 KHYk5z6m5vR:)*dzA}O|LuL zFsݤT lgu#CjL9FM8K' C#4Q ty鉌RjlEښ3,~Sa&-4j{hB Zl 5SSl$5+,Q /Cգ4AGsra6Gn9C:~+Z}JZO<ݞ4dmqa.K !&MrCZ}1M+X/A#_AUqʫ9teErTX;+;sk.6TzԜ8-tQkɝ5QiqkWe|s<3/,H643hr;rߣH&n("b3ރ(/uamQdMyr=''4_ҒHP"xZBHe*גjFПXpli(UrΔk'BL,BHs".%۫_-%dT{p ѻrh5Qi8Fyod4ȳ2oX΍Kлv. zTa]#xϴ>i@qO] |g4&Dq [<ֈ֕H$oh  Q= NUp>˰V5Ur(V0;VNi`F۳S>Ŗ))b fBnD(M)r5 +:;?%N|eʌ?v,tC(EHr |d(U끂3!iya74 `͘2aͯ2t7P¯H.! _ro (!hXxp<`xZp cl=,b7۹ӑ/Lu g"^~%`R~@UC琭O׬ 8 \B[ $:)ØFE2\]m'V"Rk"eI3$@$8 D9tҦlN1j<"57?j/wqn W;+KFvД[@M`l - a(KD@VtCm2U^?25t#¬|CɶE0 up|:=iB"~KC`-?Vg39@p*nƾxK~'I'WHթ]ܨ@PcEs$u,#j+bB1Ԡ+\'qAZ'9O}vmhg<2!~5XIWR{.pE?Kq>}"/paLJH ױG,)_}@zWERI3 XP87@&}5e v?\AQE%W*7[d h.!1)S`T%NԜD])ʲ<8cIK_ ~֑QWHڶ шOx;θB-\ن{/꒚&n*;/5d̑`'kt,L#0!?UoGa gࣱ8JFo7^;9N&4%O|Rk^odQ5S i+YS*%cm"a0E"a|?/q߿-5QB.YwCC ynػ~8ҩ=6k ୩4H=Sa=}P^i;`RUc;<"w7T֪6u)yU`wWD2mqJӊ4Pm_"yezm<'ԥ\rRoq^/i"ZBjKFIlD5پG?ߗ R' F*O:AAZ"ē9ĸ$ o)Қٌ}cչ-qɼr9+%}n_UčeSj,[QcfHIaz-aB=5ɏx-rVN{pިݨߨSvUҶD9D_Sen(x^ w&29`,^ӭ ACkEMc*mߤhUHz| XH(сA݇b=W7O? $2V?T0f 8xȦ¥C-$8Zf1 udt Q.hʥ/)Y[;Lf}ǵx}HY {n=5tɘGcs-%%^G(‱ ڒwB(KRqQzCh0'"~`:߱b lAXY/(ѣ4e2,aOpbȷ{]9نefFeaxb&? 3NMoNR(|Œ83(G&gŚTV/|\䒡xsDlwE-ː6DԻ栞"`q[X;1.elmҾdEFzeO !pn"PABA}wBy mo,%YS׸9H[ FM޵ HsZHj ~Gh<ޭwdUƅ6a+g% PE N5w?҈=9q'c9AQ;v'Rn-WSH3 ; ;Ƕ,x7b8.ow+Ǚm{Y-On)|ƣXcx4(.g75Oew[5}C5ޟAb* ;^_%7@pyhl|]h4bW8~(:hc5ܱɛ{.č<7v7N w]RȖOEθvt@vsrnm'>T,+9t&W3mx>v<-VF ^TlHdCWv6J=>3+PެubFU.O^d_jVS9?$O|`(+4-Je-hzՊ"IRxI֥)]2$=I ـX79iEY .x zYR*q39j0"5oP|2]a%JaUB@%Z#ƫI,Gu:q(ݤFbcs!>mk' $YwO* Tw"]|* wj'u ouzXf̓rÌ\nC_)&ڂJ p{K<(0퉘#u'Tb@哌!OUTI EhnQUmO؊0[ʍP~ɛ}bFk 2E,o>`$ %`ח6aemnFPme.#[?{|jv[j]~T9"¸6=DNMRsI]biX@&KMEEADT㸿SF8[ DMc BF +/UsQ”g(J!Ѕ{ȸ?ft3&70@O䱅-na"iȡl ¸;!p!;: Mzx97sX;rSw wOzdt7!d)I,jpmrg>'2sGنRe#wߒ_J.℅ :X ;Y])quHMۉ=_̤~>+AGoNBx{}}Z9) >{+_p]re-9j)(JseI:ʍ"E,\*8d潺^|=Rn]uҞebws1`H#.tV6G #Ef rb'tGiava&a߶DE&vD 96j-֥#@2` %68WYH9&984XfŝI>EO] m4_wF0'+5몝X{'6c3T/%3.(]%'hwI|>mj&һbQG5x;^sxpH߻!h {EA6\rZ"X_8,Qy/X+F'[ѳՄ$ E _V,^>ˢoDH!$Vٸzq$ w3ʮwT_l/b8#MςTbcC&g'P GhodGbbr'1n^pz|# H4DԀ JRjKDz^FuW=*qrNWpPNQpG4_XȻ1bq;as}αQ)h$uz1LD$;ܼ|W%|;MkozܱEnzբc/Q,$- +]ō p6*zǰqg(MгZ?ݚ$ތZshQq&Ƴ?y ^r 0ʵ{. Gb7WAuZPˇZ:*Ŋxa@~]NƝ`d8iO%a϶@KQ EY.x 6eaTl^b2ÜҟФ >oqs܆aOXtcjE"Zr)YT"Q{S"wH&Þb0]Fo6 Oy|w3r HT.)9Q^ˡRGȮ4X* "\e0T)ݠFB(I/,;SWqc)wr/ /Z)JcndgȎ܆Vc }^b}݅t)`/t! AG RRt5O C1? -U SusQw7rxw"n8jBX2<1:*;!N_EW2!sF=p'蒖Cyjՙ:<ȡDd oZz煚lVI䏬KY*[兿_7}VBo=aq+!6^P]F҄;G/̗9} j bl"$* K[x D0ܦ6_A>gAoZʅÑÏDl (;m{n} y຀˖=;'2Z& u0%jr 1*VU#z﹅hMR,Y8@<2N#׀ꕃ l>1Ǯ R9w5լM"WgД}BJB /ݷp^_إD~(EzgL:O7}>̱=]meM5g;&E#ŠVr@\oQT@~lw (yfq&nQ}P /Zݘ.Ȥ9\9-[4AW_Qe}Q y_ 瀅9kw*Ȇ)OӱԞŴx9H8Cs&68A]Or8ߌYm^3Uw a=Z,,ƾ˂'u'HtβL I{79qd%2'›&+LY+OItß68{>nJ|V MP?誆]pEƘBf0~-2)O9~PA!2"][TZl+YHs8͚Y.~) Zмp_##(9Sز3m0=i08$kcsEK@EGj&!is#tHC R(ˁ&'4ڟl3zF3Ŵ]V ybh?ckzr7}#x}Ui&SIi)BbF ƀ3ZH/p2krr}IA-eBPM@wezAlTlcXJc59A 9YQCm{&_r? N !I5S*cT04YvXa'IK!5ۣJzʹ6DcRHtq1Ҫزyъ*!:9A21fIp-bļ3w~m+F&ZW6匵dlz\RbT]>Ɵދj{ ȉ8q 3EhXxI~P̺#=-/ xl$ઌDԭ+71]Z+tuE-| [\:0-JӉˑ3gY©aFc& y˔Yn^gSG]6JHn] OY(UcTZCצTnAsE1`ٺ(]$0TǬrP^Hi՝ [/|k#rn%YAGM \U3 f]qݷwLzt~ec,p2L9*ЧIW&kyqHtvM/Msm_6U{q*Owp-Y#f1 ==%6㭲%MZƗ2xb9H~{e%w*;"OK07WS WA2-m'UFjCF{F;mԇ@hVH1LO%еJ_#u͛]9HnŀG=!3wἻXdHs|[*AB*fM钺`@(!([lo6~?|klukكơrPC.p7@@v+_LI=wTмx<"Io6^CPDyd$:2GV \+ dۡH*sV>w`7(wyB΅UHX_JK֢W4ߣJ[jRpw7F{ZqI^UΜ*u|E6j^MgSv=BNZ*+ʞċX9êRv۾Ĵ\4`s:j'|HqXxIN¨#!=RN[>8&W}G4D|\޳\N܋b~qE݌K}g2,U'yt&d)F5jTC L~Z"s_=jGdh)m,;]+8Z?;']K=+U ؈0.yʕ:S+>LʸQ'~5]՚Lh@F3Ic7z8;T'̓Bp+ H>Pjhh))3fQ M˦gU|Xݶ 0M-+; yjcBZP; .(E _mDێ}OЊ<  a]}sh7? R7]~`xܯO8._u'@MYO b#ED6Q#4NJƬD:2}ac:&Fj} _|6vd][|Es̔[_ȖѓKW lH.v?D?tI8UL3ٖ0:1oH 5ֽOsٙ) 6]}V.t$؅|m koTTŲ:=Y+p`r_$~g]d3oy6{׺wK$T_ OR|%=p@Jڕh*3Ջ?{ŧnG"#|KEIWٖ[`P>$>t,ļ025{ڥgKx3.C0ؓ4hmwmGO"'l:)dk^xUS9{[% kRֈoQ|a#wk'vETCC {oæP D&̂1DۂT0/cƊ"U'BѹC>~/'aTh fϼ 9MwiIlGf4:3HSTLe:,';WEz7cϠ;qRyW z~zLξl+H#3td@1޴ZTfm2} ^BnA. ʙ u"Fc]pkL$#BVOw%їO>B? h^qHp+Qٷ4{ߡ\2ĭo0Ut>ph^fg v t5rh >ܮ"NB 7g/s|XÆ6w;dҼG>#sH֊-T(M)0 @_:axą3NT`ge[$dlSZFd>\JEp}dݜ;o˅+0xDnUL6l<-]1'%;Uݠ2bi\ Ǐ(Ia-E~iO됭N3-;+7/eQ%~+]5ĮH⦘(o6n,.&/G'Ln^#/ѵh\iHCQv 4MeVX Yre6~ m*zޤEVޛW$Lĺeuh'8O&D7u؃[ hukfuaXJ/DDeN8&N=- f\ZnqiH8 H+ Nx*0V\3U6qO.l[.ݮA&g躪5+{IX+V`j(ToH$IܷASoATjIT=IkQTtqɽ֔Eq&W7g=D/ )~y`}~W Αm>C*_atfzm Vs% %PbO|~QGU2 ?U}sL*9L-`Y)34njݿ5ڛ{Lm0ai&U7$&͕'e;ΫzћQ7yJ~~^+ex-@mGua<>etx#q:$ g`hohe%^¡ iFNWbaփcބ F~( <,tyJpV;8߭OSB|Vex{ mFI`,#VC2^= PhhIj sRԆ^NDS+<RYZ}qtx-a"9$$![$sRaP!1t#L8g 'n==E](lsGX5jwք&EWqLaU\g@L(x{@vFSSC;z | $eϾ}cu^x):g@w܁c5‘t{U{?pwljU7?4PW}B˿?u̜(xΞ ]򼴸yj]'2PuKA^r YjD'@,՘:Cv,OEx3۠>^'/@'6!yl)F<^z2rĴpWQS'@%ܛ<)756iȎK'ʕYz58I_ &)a0T*>⒭QD^Sd*Xv/fZhIu Y6vBOҕwCk'VaCGfryd_K`'kd٨ܞ G5['F_k.՟Mb BaD9m ȥI:0̭5 tlB1~8HϢd\!LWu|7`+s;ςK}DcT 2|j5fwWP |y0϶D)mR2X FE6^Uw%Oy BIu;54 *Y9&VSEHyH WPZXEK4 6C)sp cEVUsuP A}#VF}Go3@ZʏLY/ !\>pL(!c5Mh ;?C6^ݒ>4ԇ2W`SY8Nk A0䦢Ik ٫ЦJN,ꛡ!VEtKEު\2L02Dl$~T x@PR`߃~ظøͬx>b12Q޲'=utw+N澚UlLKxm[Sx5 cԢrRdRmAG2q_e3(R'K˾ꀭQ}&vcaʲ#z7pFȤ"vdIM}[5w_+}YY S6pR (VHHw::ReN?xSDmq --!EԷ%Է%k,bۿ @/ywTNf&=qVa-3 oRH(~&57C ɹϺjb5r$Έ90N".—aQeUYB'4-;ܕ0| I$SD9@@LSJjW3Kz)ibM,u.>' zʐ,:ipcy:KPc F`hA 8Fh]4tO c~E,>VPIgM0jzy̝Ưizhm*kd#,6!Gˏ6 L.UE:1L0\@e"3gв`[K9RՓ\^ O 9OiC\F%K $O5sn$/V'!z67c%pbvxl&o"V?4n Oeq7]+opxfp${igjl)ǾUaX,]V^!RP_kVK 7ԲyN/Hid'%kq^:0}jRt4A /\P`p N樕^>Pd hrn3,` ԏ>|/"T㊩x7}_szJV=aجWi Jަ{_)C)`/:`V_C+*5o#Bsr9лI0VTo.4+UeÓˠՁ v7'GⲬmo'GV/Cc;hw =Q?4r,dSEABsBmW^A9d\ME*“ I|tA 0Uui|ca᠓v @jsSD4ezl"G~Ex*cC"2Ka,`Etwf W˙ y"Gq-FFn< e(h‚b2B^8mj 5NE ̰=MT wVUҳ̆vݺvA[XƧ9`Yxcɦv-ZSlzOI62/p@]j%s`_|E 5Ki'lXLb'AT?|6ZPo*}\F ijs.ljhmh%5!WyQH5aN>UuU7ˆdIuϋתņ hLQ-!C2#bEE0:l`ՂM(* Q\8w}*(vcQz`^ ڒ / i{uh0;ud7geA9AuHoB(ͥ5u Sip윤UO宾Zol O2 ?_8R16U_CRsLѐ( 7C+ #^w-c#fkh}G! Q^,j=C*3ҝ?ӑ/`='t A]5¹@pq֜ 3R1ovޓ$y=3l!ۂvJ\7ߞ#YJʄOo]ȤP+&E! 8i}F2,̊{ I#~WHWkpTvc긡d.ak!3 >Ɵ@{(h &x\fĬk26$\HJ6Q&GWY7|߃>iZ}'ةH@k>D+ ?'F ^ Cg5\Ot)?8WҸaaNT~32mG<\69<`@ZPkWV{ >DvQmO Oٯo.q @_#Zq-f'N~wR`Bo^Hr U!Xjˮ-Xf;ˆAlx"]Dz~jAOW=zhQ;>DJb,YdpGEFA,DԊ_j#!$3Q}]Iăs;,+940Z[-gϟ|1y]<=JĥˎD RW%_Q3Qͱ7 vZ>1&nIꉹ,koԲݠȭs>'ғ?§9Mt\U)*Ŧ }1h"]j[tQ'%ާJW|qUp]] :_Vз-KtWkoI1-Q!Yp+v*M1o*™ '2Fgju/ݎTpӨ^v/nؙ2|C<"Y$^󻠉cDVƈX kÃv?I7wbQHM8KTg7,`cB2zMo4i䠘vcJA,ΉEy!Z,A &PMk]pG4/>~G$CRTZGy~uv`G+z sTvV.)uh9*lt"@+;B 2_%' ݣ_K#F/N^3IFb9l:r8 ˥z]}{;LWOL.+:Vc7܋ P(RF-Vm6KP娓ʻߦ_ !ufvg{.܆~K_ g68q vTu_<1fu&Y.۬_ PfJ)^Gl1:zB^'zd>qfShWH=BůI;rj Ӑj@Hw[(J0W,<zqjDY"Vx@Cp}z<`Yj$*~nIy nMZ MfŒm$8Az%{1I>1tC>z?],_Bns*>d w)VwCN _+peKՒiH.cENۚP/jӐM(wL蔡Pyvp2.[4N3n=imÂH!b1O^G@xS#;Aฬ{CFxTgIEB:"oD<xg˖mӽ4>YEh*Z"J'֘v$D$ˁ_J3IoAL0q,t\G'FXYIJR+v:҂T<}=/.gW aT3o!1iJҀ$KAܶp^kYs@: ΙIUh/rPWO.!. G!rHՅ&-&d1VhmU)׷J\[t$cfĞ tQ|zH#Zv"ڏ j~M,ڋ3є*i ЊMAIħa\Pwrv}Z傽c$y[2 }̌RB~=)PƟ:H Js [w.;xғ6c)wXB7`QfՏ۲ltz&aԡNz4@淝3<4DKadh PaS mx4k., mS/;ʐwY(9z:’} vu(1DT˥Hw<з' "gT_}Czk0JRHÿD([WJ&̉vu#*&u Sqsx4ybmt BxzdX4R5PJ^c=zE|[Umu(i4pT!&04wvsPu pF Z:dK3ŔL'Lu4+d5}lz3SSـآ/ĵ~(L-gk16N[lvsoH']QKfAwt.#ӷs d[m#"q7mlC7+D!:qVQx6] fn=cbT.<3U 1oZtw$iIy#P埊)]>8zA ǵT}O.;,=";84L+ * /qm^L&egGç !@NG2&8c/@%&=z@ABXlŠ9>M>Ob MvCMpuzKR Vl(MLU[ML6okL^]R4A&vW@Mj6Y6| @1C.K`N'?wجl? xWHE$UF?dOD׾pCdTZ,#^niqFFzȟvЕ;qU̟b~cF C MqNh x|±p7aw*^ ȧ. Ҁ֘U{w С`+j,[Ba<1XιnT?_lO21qz#Pc=A4؁ Efc7q4&˸sn9&Dvw4qx>25ȵ0EAJ*4S%C57µIe0}ofέވj5=xF՞k7Yc|+q])Ϊx_b˽۶2S#y2.TUw d0ۙ2ɼ7li5Gš_~!wY]3}k0)zus[ZlzG2rCwTI|0_ R|(E[}yx-l.Wi 61D"S)M˚&@k5zRc^ mPs瞃W-P`Q/ĺ(>y<7%'L6o4pf)]tNU3lvj`@2*L*dh}n_ʫ\@_͆A'K1C Djvq,+5O[IU&{lNaʔCMһ)0@9|(`oY؆9ܾttꄧh$Ɉ ~% 3ׯB3`cOխ VFJCKDDLAgO+)BS F ?ݝMZv$: y¯ڛqHÚ&vAS֜[nTw.p Y>+5<=oht/ |ڢhEnCr>&<ˉTkRlDq}p6^d ~!= ΁i.B1yH:}ة?`"aTH{bq{:Lu#tq粅۝.m1hLLt&C1o\PU.D#HU@Md VٙHD&xiLBplm,C\5N f~;t`%%Cy m0aa ?K?8c`5cUXt$Jzg8>Ll2 S;@.zX,0}K`JUqk|m85VJ7d,W_g2A֡$ R[뿶\pVtNMȁnuᄯw V[אQwi! ýG(p;^)>oNu)fTlAa>x2<u 걶usֵK R -GFtaKqfz;H>L`m t簾7 'oJx7,{`7\,\-)VvQC("A5M63.d餪|7+*+nvl,mFZoĘDzlMi-p׊&N 065yDD>~\w2)凗}=K*WjZXxbuECVYi&Ћxc?K\LH EtkV٭6u7s}JiY?Ojҹ xX^zj: ƍ`= EձiM,]C jvM\*b-}1hC Gqnc@uTrC~R_ؕ+N2zotfA(p/H2c9^}P.IPlnxQ8o)p*Pfzp̵׶ߖ4 rʋ tw;$ AaIea%o ZpBJ+X=cr;Ef0RGoj۞wDhskRNeHIc7_C#n,@d=*K/J,Χ d4|^qG0̻֜Nފ%mhͫ4-LwJ¾/JWP& ^rTLY h ך|m.FE!&32v)Cz401@+ԇ3xȖ)̙=v~?u^bP/2Cqho&zk3` s|x-!$iWGY1pKMGxE=7ƜC+csu[JSbYu6.-yY*sȌn~:y .ChfMP549 }W k}9ζƳW}$L'w )Qvǖ[7MMǤ OUHG8lD7fnlFu;oHb$U|ˏ}B4D@Y8mxnbb}ݰW,M*-UV`Bt~_aW9[)Go5{ Kh)tP+~D50OfklYyN˪hZ ~s]c/ ⚨fDZЍ(]!Z.Tv*W͎5GG\٣-_נ v*،tUR.jrXwF­c$݆=N( -a!} ,dъMPZ(d's 軣; | Iݚô@ެ^ݳf-1tL&1wu:[x*΢;z  9'>jp&\1 cY_ +gp82JX1@Tw4T˄g|{zNEt0;FܨT:cɯFγT!<ܫI(I1U]4w {bǗkPϔ se*D8IфD񂵭79h ABdP&pV*A5-Cn;u_MRr BӉB֔4 'i$JԆ ?4#NvYrDwb[kb=GXW Zu(LJ<:Dr;QtJտ_=|cGCnnq fT1G: K[l׭-0A/*k5Jq7v.ы02JuL!3C]kw'lIt[lΐdK} æ\.!sR Mfc_ewt riŽU$&!Uy_fp=v_Tt.I?QtNJ3vp/ (c+%n6q50 ^pMVMFS}7';%Qʢ%ItCB<~]cy{+>_g4}Y>u"Ot蜺P֘HiN K iA6oMIМR Ϧ‘Bmf]7ྀ aUͩ1x~YHTaVz_1!OMY2l$^{TqJ1U{j ԜbsSq#K I[mkXq$%>emlO5p D} LB9[Ե&T|~v % nкX_ aAE1"ޢMIBD<( pw>g:1t0|al(EwקjkM1ZF3 O="nְ:]ˀi} 4D/?"c/K@VTGT v?j!;yHB {ww_hߘPqB)^Ϗ$Tg3,tFpWZTɔɄ@b=GͭEտ^Ab\1ƇDghD'ac!vXJKF ߣP3.alZsDk"~Cou>dh$ kja;z3Omxaj(߭6i|T%F)cʕۦamM?ZlxܘtZ ֳ;B}F%\9vy &ٗ ;&iXюi݋rH-sOp%Hz֘8sc+$ZяU ΊP׼Y;Ngi^F6ʊOv !A>ij p4!t.Q~6Uu;eC )ZȾ~C;~J{>VNV&퍌] 0 #VQ8Kbٔ$˜"+ʈ@F%1\I eb@e,ɪs`w [B/߆%  w>f#*yUyeXN9ܦ*Zfc`=UѤetѰc '#i~iTU7*nN[tӼ.&/ "\<6Sc[-8 ֔ƣ]w١AEe74;=?!b^[ڤ:3Q ` + ^6\vnD Bګ%"fk҈irO@;,4Pnh?(a^ :c'~-J4pLMJuɅ_!CJ4 /~ 5KOcF;((|rJM0x8C H=_{S2I|xpk.lHXEyeQ tEʰ+vFԗ!{V*]&?6Ԅ _.+OxxwuYƛ R*lt5֧ J=j`c8Xcr)V^ ZDO[}r\"1,"w23 ]^,Q}3`0mkMaV&[PW.U3KsAV=sKH^'5@Aow=v(Dx1H4x c:.+>(N2Z\IMW,;0݌<XpHap;I*34ţ6AaA^rX(RGPݯ`f衣d mHkWeM7}8: StsBTR&AzM^gTOuiz"tG5tMLοL Dt*p"T$u1*V?P(S82v+jRDӜv~4/O[O&Z_\GOMsS'HŊ}؁dn>Al;ZW?0K%Nx޳dѥwLg  bPr 0IE;i82 $uxRG5dsӅ[fˣU۹>b-=^RQϹ>҈: o1"8K4 D X8[# [TW+ͻ{/2R- .b*d7Ǎb |ګ7ZR&ߨQ2O>|ٕ/xN6CqĴy DN2zS$m-Df-# {U7!Iu~:k<5J P%Xܩ_9{!hg+H:o'5ܱodWJ:G$}^j࣊L"+nq,6W\@ ?թU?[]G|=ØYbDRl?aԓOoM\|OBvNsjX'4~(mlv˂7=kC V B.!Z1j.lK7aܩ IOGOkm_Tqvtkqpjƍ鋀5mUNFwQh9t[etfuɔ. T1م [x) O?CmJʌzYxxH9=0aftl,% ]K0J#5;ߖ|+:ZM8CJu{=$&^(DҶ.$ Ħ".cl7ȰMSpk`>qfD$)on{f$..Fs MZ>q?jI6¢8v&'e6aY7dUǟlIN,87w7`ЋYУ##eEG6Յmœ sá-.+[ {极gZ0%{I)P?W鏅jY k` {AL\2NHwYŒ1F6bnZ#dӝqEBKEAqz7^\(0 AB1Nubjt?H>PUڒ[!MV&Axo@cɳl^Ujt`Y}*RY&oHSxh_\y6kGզ\dՕ`*K?)]r=To1A&INnhҞ<(hYoTܟ@SˌW=e: ?y ܛ~h_=WyDg)ނo_Ǎ!<}pAӻ.q|Zr<1acϟV"qlqr $Q2I +x68=[n+y1Kx~+\,-=vk+qb_< 3qc̾`<_ b$2s#\yr.7j"?#Z .ـ]AbGmΆSh=?gGkD {t1lIpbe$G.LKw/͜h 6z&To au%+3vU[^q]Geٗ7kiX s 8s_Թ'VlҴ>U6̳T,|e)Ht^جULquR\@ߜA7alPXn-ѳYh1Qع_.mvdNBk9-Ġq%.L{%9 __ڙӆT@>N  Iޣ]1RjDp|gέ6 yñe5uK޳gL3H@ŮCb` /hvu)ZxQ{#hEsilPf=0J5MALHQ/4`G+ѕu# ŕEȁ-ȏ OkBdVٝx|~+-y獍&!N{᯿xQPq6J7[?IYgUq^>]Y3(5d4ei/}@YNh')r7Cx;P郾$2@OV9mSpm+vq ^/c!Um[Ɯ\s{.ZpLSؙ̛ u{~Ot~aJzfWT[&sC܍Åף1@V2|G!;KlQ}^,bGK|R8*jClސ}C4:RYꬊ7vўn</i/sn B(p8RRKD2_F03uR3NwNw<&!)Ҡ?}aH"vyROdō+J+[ Zܡ2iG&#la9H~b/uMI ϗhݭkM[AB1os2jVjy;T2mٺ啇7^J2{^ Rp>JhS&ˁuWyIDERI [dlXR8ڊ Ƞ7b8 'n SN"ƟXP; u/ةFd_Э+=L(E02FyEjqH‘cCgFא OӺu'UBt@kJJmW}4XwI d,dO^I&1goqp7Pf)6!~Z2.}TB5sr԰4=+b=k+3D͒_ , .5ѭeS7ƅwu0T;`XѾJN&]hk %HЫ1\$j.H %姚{-y&%j*v(>!^7# ;:T[ZX2Nӿނ3[{|ICBLcHX809gv!.^Dr-,،R庽d`i#Mx74]$º%Ё&lߢ* i5߷x{ &Y2&휕c3D==].b1fE۪D4p?ʟmłHRrX֮o ĮOS˔p8EJ(㸄|ʠ|0 ,y8 fOcmc$ݿb.Hyqֿ.NVw3Kz.&*3w$w6LO8z|o~yLCGxٜ>'Hy\wo@`o[c'(qiDce!>P頃s*qL@qn|Fn(olۉi¸ZB&j]ӂjG ghdv ڼr/%酑k>pa,IC-et/ CЇ.g%lWfsGdrҳ$d5ZaehE8>Tj]&AJQƤ*5xiأf{\n=O_BO $Ӵqki57Z~1y1\_=%cd}zM.#}5r۴}#Q':a µJߙMv`v+!D:7 )'Wp B׻m(O |3ҏ] vJ^߼o^lmBEωr旇ԓMHZW㘑w|y򼀚a)>% d=eJr\:e$ Šń1t:G Tۤ osg~ewkhv'2V#5Y]ڊtKDvn"`n.9py(ls)AH>98ju)}Pka/ê~H|r=Y8LHu6&ixfYFkE@~{E&/V\# k(ߟ ݏ8.{TEPhMw=9W KThۜK>Vf=DkabAՀ/ Aͥ6%o`4',Gʽ %vllEڛOa(p z]k[rN8HsqW`qKɸ}B@ȗl'=,޵vx~Jn$h*z3y_`IW^nL Ἐ#,w>]h ~ΏKԓSD#h!MTmh:y<Ҭ&& `AoA5Zf:ٿ崗Tŧh 8_Ģ~YԼXrr1ƍ=| rK~C)Y&T吽hcS)32ecKҼ#c0EW_up[9ƺ!gB%vԘRPzDfdV5d9bgDw:n=MͼxV641gi#x]a^x4$‘-4\´T^BQI|~Qowq'G_>HnCdnMf)\]29yݷhYGҨWjInlG&pY*F=ܥ#I9hP&@zGb- /nFvԳ)c\ nl 闖)Bמ.l\N6\N&23<\+N j#`:r<@\4nxD7۲x^~4R}JxުZt mR5 sn1/FT@;Jɟe̥{#tEaqIxm+Y K/b ijiTuK C] y U>(d^܉φpT4[ "bNv xQ3λ?J!eTuS\tV9b`1i~&~,H k{x8"y$GO~6[Dc[pل'˖`wԲ}{,d6|6{n CL%iشB )w%!YG@ORg1KU4 )>7kIȟ94Ps)xCc=ecb:#[ yg$ |(xA/QyhvXe /w*~q)W6t,@HK rجkIY};8&U3:[Oܮ>e?#Sz,.pW_wh1C!> 7Kpr teVA)Upc#x0VVx}|/5Rdy[9/BͰTr)@iY>ORnAlZ$jf ֫η.Dr *Gs6TZJ\Agz1^u3B!U,=G)a3{dF0cБo;K?=e-eBm{lJsy.zch6HWNV%a N31 =Kpp>3#yGЧ8~55pҐ#ip,ށ nѷBY,a;.%L偳OC&;DiVS ͟up[1ZԁTJvB>ڈ `w@Vy5P oz:Jz#B1T0*5@!bT/w`h ﱦ\{v/i7+HT 075D`>%l#F"mCKì#51\9E8r )V9)eٟhହ….3RƥCƔW]B{4z_DWz$ۅ0G^,ˁ ;lBm_r+E0E&:$뜎4j%hFiLIBVM"Qyk`jӱ~ǤKKD9:qj l*?*> sq ؜ňdJn,?A:vsTefX~[Đ[t욫,:(呝;*b%3 6۪?k3NEש(s/F(rkS OE%O2a"6RaW=o 1a ԥV&SYXy17>q4Kӊ;m>iB]ReF8$GN,4uz4+3\ylu 2@n="tZOL2IXnsWA~<,*v,UNߧ0~IQi6 gZ{jaF~Xy4)IDw?P|U/^0\yL)[5f;G!=ZEkVuhqڬRp^qrOR~0U#>'0(>de.h^SɄ:HQIE22 #?Q \~F.at(1<^ց$iV4яK^Zm a(,F=V튌hgng?.Ȍq ?ȸ0_lx"lɶB hj n,]9錃!ILp΀O}gȿWG 7ЫY)FBeh΢rgZ\X*ɘ &&%bWc%ZES",Iw7 LmW':stODT a1FotI׳ &g)}̮H !7 }Ն3]腭ynvI/;bc< pPrspd>~E/sy?x TzCp7loUC9 (n;~jcb)'ҧ>0}Lqn Շ@ו&|Li@\TȚ8|oH;QxlHnQc-oM/uoP:PHq F9bԍ$5}_FXoA1œĥ_7dzDmB:瑫0g&RA- [*p 6 aT8;e} i=b m%c,s3{k4, .Z0);qnZl[O :&v?*wC՗y!V_5*Mm^?)-b(/5BcO^,ՔmV% ό'C+Z-ɩBa񲷦Œ frwrυ쫭Yя44?v+AD ]څ$#h. ]2㐨+[I¹EY9hǑBUgizz(&|$D/0@f#qϥ7~wTkµp(Z7(B-V[r RAp]&*پ"<~dM9,&(M`9ccCq=a ;`+D|9P۱Nw~ T(앨7r\* DNY}aTQBl #s)]݊H,c\9 A*P"]Vd΢B%5pfs evWNO71%#M^ Kz D67 yؾ0alvS|sYjYH k=~#C0gv,Q9s8_U: +ܢ_"ʺRVaܪr?qf^-]6Ž*_S`r 6Q8)%UH(_*A2 U[;j NmDq cCloքYPݩ$R=:7Hp$S աŽYMH)uƎ8΅H4K7e  va9 ^H[Fza{MO[ IVl5Q,lνeȹEswc,N*oo&0I`HV$ N7^‹7דY|Ϡ@S p3m65b+Z1(w? />HT'"Idʴj %2ĕ=݋_X[#pU0oSdv,glvf0BJWfj֍V@~CeCSLyY%⬉0RmNQ' :Y|fwozgǚ(OO)xY7J<|d =KuaG -:'38О)j+Jޫd _<2,䴨~+C—6(\D"k/U|/Ff^'Z'ܖ&Ӱ^_\[YHq1F*4<, 8 j<26aB[l{e f&O^=X'3/bs ]]1o f/8jB cTDS=IL *F`5fe/l6R`K|nKЏ=J<_q ѣnguGF77C0?*XwB>[QCd{1bYg2QGaX .|Qm3HgzUؤ͉v .~RKV%2?!i_{۽4ry Ald5Y{󁁚2,΀_8)\ J?^ AJ˜8Φ~ZihOg($/I!=aHfѳn-_jUb%_6XFw{FH=8EK:+)4fn!D@>tEmf`U&\H7X.-XK!DC`7ct[oYS lBAv]vZ nf~2C-'ϯal)$0N>L0W`R1PƧ2bZER`$v*o$<T7>#O90\H1Ubt %?Op|A2@֙WėÔo@O!҈==E{eXԗa(Cё7^~Ǎ)zQX+ily {H\Z IhxwRM؜4k.`qeϣ0wr49vr)oI(TWk4:wjZZ,4 @H)lMDZýI nserrlJBKO>s!xo[4q}PK3Zމ]$=6. dwKݛɷI;%0Zܠ&-is,C3όdkt],BDEd%-D@+==[kzwKqfl̺AkԪ>u\(Z-$Uԉ".FC2: /_Ҩ׾˗ř\`.cM(CgVմPi5cd8=0=I4>>15H3UL^+G[@`tTӀv^pt{NSf;KCL/Ú;!m!QjiR.h>:Y M 6= i ,-CAjcӛϏ=b74 0Q.2:6|E&:kЫ~ϙx{zY-:BڹjgZzC;B (]ƶH@_Dr+32 iKۆZ(FZғ_{g*{Mwfg@_dca$mi( xAXSLIeOvOc'Ogws?(ep bO=hp}y6*noMz] }/-bhf8(\}EaCx{?ECF&I0aR,KDS |2JS 4Zw) ɧa;q@7s@U UJJ* Yhҫ!nL)cCF%qz6`*."QZ<Ⱥ|13ӇQךx*C8˺ּ}ꛒl,gv<YlDMIm+gq=uOM19]aMm)XHw7.A0+Vz4iqG{x˲ I}(M"p^м"똃5?*tZ<'F6+[ V|ʌA$, UHMh."ؒS! Stß*J8C! A?{OGnPyP3 $*Y* z=~z}Md'0(PEP{)ȐL}w++þ=BKМÉ [|]>||D%jqn rA#`q:,Q;׷^p 5k5!KJ~1h#(DV[YyhEQ=)٣ꛀ̠UA5NLτsYEWdNED4 aɈQ[:L҄t֜|jn hHEo9Vs ø1KiMFRӍ pRT`q.R}eOƇF4"ebd? ʤnSU0pN<0{immVk)״XNe^ϥԖ_?Q"JH$/| "tFT[zDdNw}u/WITm!S3k?F}Hԥ>{ԕn+~6?J|DHu JЬtXW6Cw w%G}"PLLmS/Ց_$|ZUK'ꪤ=yW(}H<ɴ9[E{]y$uQ &OF{X|>+Ak94CsDWreQh[K%a676.\Z&_ˈ^.t "ǣhRH~RXk1J N~cND@Rxlc@mSj\,+FqEwK3/C]=Jf-]rӷ yy8<0R_?^SRRu*T$ӘquAE_zʟ37h89C+ :m9ΨۮDf<~x D /n3Y%7|䨥$z E)ҰBgܱNOaӆEV8O?{7/|r5_(j|N x`T g{9צ,4G}m( dm& /*ɹįd|U1di!LHC[cyȿSs4JB 1]7-o8.aC3ݴg;ǵyNEgwGjÄ(,^gn]ZGus'n^)o>#QEOvz.$]s8i_B*,IJvaU:.4dh]hߧN1SV cks <1`\o;1U5[gL;`5}Au僌sbA?E2K;Xҙy.#A^C}EI(!gRB|:24@ A= i [vͬڟ #25^ⷋ:}C#nf@Y Qimd[t ֽl܏Ô7w ewf@",̢Q#S]Q3IlxF3iBΦCmQUNW̑kVtkijQdKKIREn,IO/lWwPme9 mN91ht^MqcL`@iO)o_VfW &ɤ4\7sڪ K3h$=djs|do 26wd)M{{S~-ֳ|Ob_/rCJ M<Wlp>YAŅ78+ެ/֮[aׇc|,Mr_ LqZAF^꫄/ 1(Ld%w`@w@؈nc_k1SM?\ɌZNYnH(+~u8M+M>.W*qH[1S}{IJ[z`- :}Ad? ]ؙzxeJJ*cCp7 +&}w[unƶ ӏ +8I"04<'=6AW=B}UMˬHR`J~JMbJ=Rc'FA}du= kz1$6|~k0;B dǖ-Ũ@[՘ ,단SsːM:1G}^nc< ﮬ-QltĕOs(EI ߆셟&4{.TbWqh % ^=W"E=OaQ*M9% @?7JdQ#nfg>\~?Nl>d~>AUp<DӃ,ph$LB,tZ7o.Af3XзEt٩# dݰLRl_.5Qn6O" }ۅo!L .Kn6Auimttݽf㸎Xo|#z(Ybi n nP4Z&͈Ӌd!g.EiMH9o1fr8+n]BIp4{vd'ws!zPk:' C;y{&6{ yʂ[u>o7 Xxt6O:ꉳ05[S :q~?]hF( uFV$Ϯ2c4;2t*}2%pFYU!!B>l)4īEtnEt)2CN[zi~ >AnvVi"܋AA9g͡!1%TǂN9u~:ѶUpE}SAl$8V3S1d#E 4:;!P=`ܨN|:SUW%I߇`W,y g1Y4F + :s?}Dr{V- &51NSusX$i5zZV]>T>}_{l AA Ypƈ ؗB 5-:^8QWhaAsM#& aj+q,-LZ-$.Ƚ4p T>Eӗ󺳵VD-OԞ&͜eA),N_N HNiVj-5]lȮC `2 FY!Ga(p1P!Ҏ3.uiqxD檍  |'9}T$]8|=p{"֫7h M_3Beq+mnj1x  cuinN`_Zljnଟ!e5+hntM:D[!,.;5Ⱦˎg﹄'w@\#3tU3V ú7VE>C|]Btꈴxhy?ҧɁ"jKk-Ԃ|C]7 )OH ڻkEj|f7m︧/4I(#J6,@){{b@ʘk)ɷ3B,uLp*kŧ3i8t8':aaԵRZ9) (sc'^,=:]PĈiqG5-{E5k-Nl 7m U@k1иj*US5wZ0"# RSyCcRN4+({SKW=+6Ӊ11B\.ٝQ>7kq_ tk`MwZJ- m C(+t}@E6gH(2'"ֱxV1[i~_G*z8f$+s  2:%r.0Pdu}(ıy&z'}J&=fcsR$aZkwlt Q1Z/L.J~Sg a=<]JmG1U!t,2SI]e_AFYpU{'\ݗkbx^H%ɧ[6u)zu]( +`RϧVu(zYw0hKeq~Ҹvl>ɚuU'dxmV3u74MVlx TLG"T&:6U't /60cxxK7pn"#'+To^^ WE8* +~RNuYpnLMJ% D{ReԬi]cMs#4nw?M +| ?~nX@&vaܤpA3$'R$"[+lȭ1Awhϐ6=xeq}@cLʸ62zww(V-s'FuVVU*g淡VxmlFLv~OPV{e~]2QQAQ`ڍNpTfs߽q~*9RzºFɣR;NJ]|7Ga`|[Cֳs&b'At 9˒ e=%{+~ݻd|u?$q35>{Lcv+ Cƣ= )N/b."ev_f̩2L"QMh G60ǽ}稡=ۛN`5 m-xLE-RJ SUCĽ"󲒨H#QL& *W2to,0`"`$3>$bYEHd\(-)o^¹+XOUǀ {Z$1/ ۘmQ43[vh`^eC"BewRV?mեZat9sl :>.afi?c& ec}3e۳|#,5UEVMBTmZ1+|Ls:vYjG(ꇡwC[߉}ѧ?de&ƽlЗEW֘b;|'-|R ,)&Gdgm-lĽxu ?{wˤh7q.E0th;uҮae(ȼm'(vRzQcvy,'=P~f)W^k 'pc']Vg$ 2Z ~j!vp~˕qH|?݋G`1EW c1G?s.GND2~tOWS&Cr'ƁtF9dBY {vp/IO0$ m͟ }b Zs,WGYRR4Ǝ$>)x`K `X̟_i$\ .\T2iG?.Ǎۺ,b1ÆsB[*z6۱o1(oA6&}]T@?ȕ1}ĥR|cخo8E}s٠@OfCI?[4Oj9cHt# #q'u_^ f]zK%I1"m'9P1C=b(oPhdy ϤDu[6-艎<r0&ܹ+Ɍ6,nBVf>WX?sj4r?3ﴳ iN$.؝Of&Rٍ@:۱=uf ERtDwpBp9yQ ozj>CCQB?X?-y3Z@wGuk=xDlpm"u-EDfh0/M8Qif rYJeΫď A>6(vŠ;n#)1^AS HN+j&BBL&v<<*(䓰$g @splo4>NGdv\Bp>P=)ׁW;nӯu@:^y>9,K3 Tq5g/G5[31*-js &s^E;Wx.d~ܴ R ۙ}O6J|؀"@K;ĊVJXn; wNێ345^Tx-")a[nRvsz8/u™KpNpJcI(e.XmNʲK㚱ƣeM,TwY9'XijmW O\2f]k.zkOhKË3UZ{x"l r!'W6z+x'\0R*Q\sHS1G~W5?Mz+{MگΫvuDJȤ8`9UI=|@93{)8{T]2*ULAd՗r!; sNaʲ3jK]OF!8f0]%Tf(1p<76 1ni06F!032RJB1}3Ab~Y F[jlXcN'|*7;, dm[4]>\.Z7hzI}ue&Cts ŅG.n)4{p 70<ׁЙKܖ1V4V{m3,I27I4dOA'4`&Ďkq2^[h'5HϤQ(MuxmOPzJ)0Y Ps $9.Rq΂Ĺdg`0fpG ϫw.4$zc3GM/.W 7!oD}(HOGy&>Oh~Rml=QNE՞kzg4>f?*sk}(ܕxuք%Z1Yŧ[ɝp~a 8c8,5}_mt|uAod{ZruÃ8FhI3'7?df- dSyq9ԶMuYXt|.28DΠ[O9vꜼi%yFzs5g'TtA^ 8ڥӳ9c oĤãD@ v!2W4̽Lq\z' W^ /qTVbˉ/ЧqNIm;?$M|JIvu`?A ߠ_U,] )4 /1zs/n`1XPYs 5*L34 ic?p?o$q+_f9{? th8wg@\V̳#!JCɪUښ#*#g˅ń,q^mE ˳u%koԮalڅ7yI}<|i>cȢd͓ Ǯ`ɻ.u ](#ڛ,r}}ԾiE兦SoQܯT˺"9Uw~x8-N0J&eM8ЪWd}jEkؖO, gm ZyW{A#|`@zI$(xԧO)9WNr ۀۯa0]?|f=?ݱv9L) ZKNdhW /qʪ#u \sر^^k* VjoYmA;x\U-x.v5QJOe#BBXeqWo`FB|4I鳿F" (W sm[.^Dt[BYeZ6?\(5:۠\gx>| HؽmJ)$ K''{7!IluK} &΁c YZ