xen-4.16.5_02-150400.4.31.1 >  A dp9|!(=(5-Tzph`ڲ|?t;W(9p=2js\-kGݥAG-}ҹXT`IM@1r*6ׄrl𥹪.{A'cK-qlz7`Yt9iI6)ؕvp!/y%.bgUx79̧pڳD=Y-iVVH&+u]w$>5X~@_ܟ8qsil"W86۷;ẓ[ё=nDbkt'j~eăd/hT5_0 >p=Z<?Z,d  WTXdh  l     o X*P   (89:,>UGFUOGUdHUIUXUYU\V,]Vh^WMbWcXMdXeXfXlXuXvY$zYYYYZ(Cxen4.16.5_02150400.4.31.1Xen Virtualization: Hypervisor (aka VMM aka Microkernel)Xen is a virtual machine monitor for x86 that supports execution of multiple guest operating systems with unprecedented levels of performance and resource isolation. This package contains the Xen Hypervisor. (tm) [Hypervisor is a trademark of IBM]dibs-arm-3/SUSE Linux Enterprise 15SUSE LLC GPL-2.0-onlyhttps://www.suse.com/System/Kernelhttp://www.cl.cam.ac.uk/Research/SRG/netos/xen/linuxaarch64if [ -x /sbin/update-bootloader ]; then /sbin/update-bootloader --refresh; exit 0 fi UF5AAA큤ddddddddddddddd56b36c16f8358443b3928db8dcfdc9849f1d954b3863a54d4c586e611b23b3b48322d6fe7e88ed6855680b5994eff56049f47175bcfd240e5f93257933e3b0f0b4c226b9250d51a0b4b2b94fd72dafc61435158f9e78837a71e9d05b6cb28781d06d886a2a219b70c2d3f95849751bfd85537bf71c0edf5a8620d673499af26e56b36c16f8358443b3928db8dcfdc9849f1d954b3863a54d4c586e611b23b3b4xen-4.16.5_02-150400.4.31xen-4.16.5_02-150400.4.31xen-4.16.5_02-150400.4.31../../share/efi/aarch64/xen-4.16.5_02-150400.4.31.efixen-4.16.5_02-150400.4.31.efixen-4.16.5_02-150400.4.31.efixen-4.16.5_02-150400.4.31.efirootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootxen-4.16.5_02-150400.4.31.1.src.rpminstallhint(reboot-needed)xenxen(aarch-64)     /bin/shcoreutilsdiffutilsfillupgreprpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)systemdsystemdsystemdsystemd3.0.4-14.6.0-14.0-15.2-14.14.3d.@ddíd@dD@dS@dJcddd'@c@c@cccR@clc[@cWcOcOc47@c @c@b)bz@bγbγbb@b@b@b@bzSbV@bP#bJb/.@b b D@a@aaq@aa6a@aaca@@a7T@a,@aGa $@a @`@` @`@`E` @`` @`!@`@``7@``}p`\{@`KW`F`B@`8`4@`.V`#`>` l___@_H@__إ@_إ@_S_$_______@_"__E@_i@_h_d@_cO_[f_X_O@_N7_*@_'@_@_{_^)@^^@^3^ϧ^x^@^@^^^{G^r @^j$@^g@^_@^Nt^K^=Q@^:@^0"@^@^@]]]N@]@]ʞ])]c@]@]@]@]]fl]fl]M`@]B@]/ ],j] ]@]@] ] ] #]]@\\ޢ@\ڭ\\@\@\@\,@\7\\N\@\\+@\\M\M\\\@\}@\k\X)@\J@\I\A\?\=@\9\73\4\$\l@[H[k@[@[^[^[ā@[@[@[9@[v[W[CN@[<[6@[0@[0@['[!@[5@Z@ZnZ@ZZZ@ZmZԐ@ZZZ@ZZ}@Z}@Z}@Z}@Zz@Zz@Zo Zk@ZV@ZS]@ZOhZ:PZ1@Z.s@Z&@ZOZOZ Z Z Z@Z@Z }ZC@ZYYYY|Y@Y{Y*@Y5YA@Y4YYYbYY@Y3Y@YJYJY@YYV@Y@Ym@Yw2Yp@YlYh@Yh@YS@YJ_YI@Y5GY0Y-^Y(Y"YY;@YYY@YtY.X@XQ@X@XۡXg@X@X@X@X @X@X@X@X@XXX@XXXwoXs{@XlXWXRXQ4@XEVX43@X.@X*X lX&X@XX@W@W֘W֘W^@WiW:Wt@W.@W9WW@Wk@Wi,@WbWZWZWZWYZ@WV@WEWBW=W;W3W1@W1@W,@W(W(W(W(W(W#LWVbV(@V3VJVxV'@VV2V͛@VŲ@V`VwVVV=@VV@VHV@VvV%@VV<@V@VS@VV@V^VwVqR@Vn@VXEVUVTQ@VMVMVMVA@V;DV9@V7P@V0V*!@V V@VCVVVf@VqV@UYU@U@UUݪ@U@UnU4@UUK@UU@UU>U@Ux&Un@U\w@U[%UUUPUKSU>$U6;U%@UU@UUU.@TgT-@TT@TZ@TZ@T@TT@T5T@TLTLT~@Tl@Ti@Ta@THT?@T=@carnold@suse.comohering@suse.deohering@suse.decarnold@suse.comjbeulich@suse.comcarnold@suse.comcarnold@suse.comjbeulich@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comjbeulich@suse.comjbeulich@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comjbeulich@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comjbeulich@suse.comcarnold@suse.comschubi@suse.comjbeulich@suse.comjbeulich@suse.comdmueller@suse.comcarnold@suse.comjbeulich@suse.comcarnold@suse.comjbeulich@suse.comcarnold@suse.comjbeulich@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comjbeulich@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.dejbeulich@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.dejbeulich@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comjbeulich@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comguillaume.gardet@opensuse.orgcallumjfarmer13@gmail.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcallumjfarmer13@gmail.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comdimstar@opensuse.orgcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.commcepl@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comjfehlig@suse.comohering@suse.demliska@suse.czohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comjengelh@inai.deguillaume.gardet@opensuse.orgguillaume.gardet@opensuse.orgbwiedemann@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.debwiedemann@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comtrenn@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.dejfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.deohering@suse.derbrown@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comjfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.dejfehlig@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comohering@suse.dejfehlig@suse.comcarnold@suse.comjfehlig@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.commlatimer@suse.comcarnold@suse.comcyliu@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.derguenther@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comrguenther@suse.comcarnold@suse.commeissner@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.com- Update to Xen 4.16.5 bug fix release (bsc#1027519) xen-4.16.5-testing-src.tar.bz2 * No upstream changelog found in sources or webpage - bsc#1214082 - VUL-0: CVE-2023-20569: xen: x86/AMD: Speculative Return Stack Overflow (XSA-434) - bsc#1214083 - VUL-0: CVE-2022-40982: xen: x86/Intel: Gather Data Sampling (XSA-435) - Dropped patches contained in new tarball 645dec48-AMD-IOMMU-assert-boolean-enum.patch 646b782b-PCI-pci_get_pdev-respect-segment.patch 647dfb0e-x86-missing-unlock-in-microcode_update_helper.patch 648863fc-AMD-IOMMU-Invalidate-All-check.patch 64bea1b2-x86-AMD-Zenbleed.patch- Handle potential off-by-one errors in libxc-sr-xg_sr_bitmap.patch A bit is an index in bitmap, while bits is the allocated size of the bitmap.- Add more debug to libxc-sr-track-migration-time.patch This is supposed to help with doing the math in case xl restore fails with ERANGE as reported in bug#1209311- bsc#1213616 - VUL-0: CVE-2023-20593: xen: x86/AMD: Zenbleed (XSA-433) 64bea1b2-x86-AMD-Zenbleed.patch- Upstream bug fixes (bsc#1027519) 645dec48-AMD-IOMMU-assert-boolean-enum.patch 646b782b-PCI-pci_get_pdev-respect-segment.patch 647dfb0e-x86-missing-unlock-in-microcode_update_helper.patch 648863fc-AMD-IOMMU-Invalidate-All-check.patch- bsc#1209237 - xen-syms doesn't contain debug-info 643e3810-CONFIG_DEBUG_INFO-no-EXPERT.patch 6447a8fd-x86-EFI-permit-crash-dump-analysis.patch- Update to Xen 4.16.4 bug fix release (bsc#1027519) xen-4.16.4-testing-src.tar.bz2 * No upstream changelog found in sources or webpage - Drop patches contained in new tarball 63a03e28-x86-high-freq-TSC-overflow.patch 63c05478-VMX-calculate-model-specific-LBRs-once.patch 63c05478-VMX-support-CPUs-without-model-specific-LBR.patch 63e53ac9-x86-CPUID-leaves-7-1-ecx-edx.patch 63e53ac9-x86-disable-CET-SS-when-fractured-updates.patch 63ebca9c-x86-spec-ctrl-Mitigate-Cross-Thread-Return-Address-Predictions.patch 63f4d045-x86-ucode-AMD-apply-early-on-all-threads.patch 63fe06e0-x86-ucode-AMD-apply-late-on-all-threads.patch 641041e8-VT-d-constrain-IGD-check.patch 6419697d-AMD-IOMMU-no-XT-x2APIC-phys.patch 64199e0c-x86-shadow-account-for-log-dirty-mode.patch 64199e0d-x86-HVM-bound-number-of-pca-regions.patch 64199e0e-x86-HVM-serialize-pca-list-manipulation.patch 64199e0f-x86-spec-ctrl-defer-CR4_PV32_RESTORE-for-CSTAR.patch libxl.fix-guest-kexec-skip-cpuid-policy.patch- Upstream bug fixes (bsc#1027519) 63e53ac9-x86-CPUID-leaves-7-1-ecx-edx.patch 63e53ac9-x86-disable-CET-SS-when-fractured-updates.patch 63f4d045-x86-ucode-AMD-apply-early-on-all-threads.patch 63fe06e0-x86-ucode-AMD-apply-late-on-all-threads.patch 641041e8-VT-d-constrain-IGD-check.patch 6419697d-AMD-IOMMU-no-XT-x2APIC-phys.patch - Use "proper" upstream backports: 64199e0c-x86-shadow-account-for-log-dirty-mode.patch 64199e0d-x86-HVM-bound-number-of-pca-regions.patch 64199e0e-x86-HVM-serialize-pca-list-manipulation.patch 64199e0f-x86-spec-ctrl-defer-CR4_PV32_RESTORE-for-CSTAR.patch - ... in place of: xsa427.patch xsa428-1.patch xsa428-2.patch xsa429.patch- bsc#1209245 - fix host-assisted kexec/kdump for HVM domUs libxl.fix-guest-kexec-skip-cpuid-policy.patch- bsc#1209017 - VUL-0: CVE-2022-42332: xen: x86 shadow plus log-dirty mode use-after-free (XSA-427) xsa427.patch - bsc#1209018 - VUL-0: CVE-2022-42333,CVE-2022-42334: xen: x86/HVM pinned cache attributes mis-handling (XSA-428) xsa428-1.patch xsa428-2.patch - bsc#1209019 - VUL-0: CVE-2022-42331: xen: x86: speculative vulnerability in 32bit SYSCALL path (XSA-429) xsa429.patch- bsc#1208286 - VUL-0: CVE-2022-27672: xen: Cross-Thread Return Address Predictions (XSA-426) 63ebca9c-x86-spec-ctrl-Mitigate-Cross-Thread-Return-Address-Predictions.patch- bsc#1205792 - Partner-L3: launch-xenstore error messages show in SLES15 SP4 xen kernel. 63e4da00-dont-log-errors-when-trying-to-load-PVH-xenstore-stubdom.patch- Upstream bug fixes (bsc#1027519) 63c05478-VMX-calculate-model-specific-LBRs-once.patch 63c05478-VMX-support-CPUs-without-model-specific-LBR.patch- Upstream bug fixes (bsc#1027519) 63a03e28-x86-high-freq-TSC-overflow.patch- Update to Xen 4.16.3 bug fix release (bsc#1027519) xen-4.16.3-testing-src.tar.bz2 * No upstream changelog found in sources or webpage - Drop patches contained in new tarball 62fde97e-tools-libxl-Replace-deprecated-soundhw-on-QEMU-command-line.patch 6306185f-x86-XSTATE-CPUID-subleaf-1-EBX.patch 631b5ba6-gnttab-acquire-resource-vaddrs.patch 63455f82-Arm-P2M-prevent-adding-mapping-when-dying.patch 63455fa8-Arm-P2M-preempt-when-freeing-intermediate.patch 63455fc3-x86-p2m_teardown-allow-skip-root-pt-removal.patch 63455fe4-x86-HAP-monitor-table-error-handling.patch 63456000-x86-tolerate-sh_set_toplevel_shadow-failure.patch 6345601d-x86-tolerate-shadow_prealloc-failure.patch 6345603a-x86-P2M-refuse-new-alloc-for-dying.patch 63456057-x86-P2M-truly-free-paging-pool-for-dying.patch 63456075-x86-P2M-free-paging-pool-preemptively.patch 63456090-x86-p2m_teardown-preemption.patch 63456175-libxl-per-arch-extra-default-paging-memory.patch 63456177-Arm-construct-P2M-pool-for-guests.patch 6345617a-Arm-XEN_DOMCTL_shadow_op.patch 6345617c-Arm-take-P2M-pages-P2M-pool.patch 634561aa-gnttab-locking-on-transitive-copy-error-path.patch 634561f1-x86emul-respect-NSCB.patch 6346e404-VMX-correct-error-handling-in-vmx_create_vmcs.patch 6351095c-Arm-rework-p2m_init.patch 6351096a-Arm-P2M-populate-pages-for-GICv2-mapping.patch 635274c0-EFI-dont-convert-runtime-mem-to-RAM.patch 635665fb-sched-fix-restore_vcpu_affinity.patch 63569723-x86-shadow-replace-bogus-assertions.patch 636a9130-x86-spec-ctrl-Enumeration-for-IBPB_RET.patch 636a9130-x86-spec-ctrl-Mitigate-IBPB-not-flushing-the-RSB-RAS.patch xsa326-01.patch xsa326-02.patch xsa326-03.patch xsa326-04.patch xsa326-05.patch xsa326-06.patch xsa326-07.patch xsa326-08.patch xsa326-09.patch xsa326-10.patch xsa326-11.patch xsa326-12.patch xsa326-13.patch xsa326-14.patch xsa326-15.patch xsa326-16.patch xsa412.patch xsa414.patch xsa415.patch xsa416.patch xsa417.patch xsa418-01.patch xsa418-02.patch xsa418-03.patch xsa418-04.patch xsa418-05.patch xsa418-06.patch xsa418-07.patch xsa419-01.patch xsa419-02.patch xsa419-03.patch xsa421-01.patch xsa421-02.patch- bsc#1205209 - VUL-0: CVE-2022-23824: xen: x86: Multiple speculative security issues (XSA-422) 636a9130-x86-spec-ctrl-Enumeration-for-IBPB_RET.patch 636a9130-x86-spec-ctrl-Mitigate-IBPB-not-flushing-the-RSB-RAS.patch- bsc#1193923 - VUL-1: xen: Frontends vulnerable to backends (XSA-376) 61dd5f64-limit-support-statement-for-Linux-and-Windows-frontends.patch- bsc#1203806 - VUL-0: CVE-2022-33746: xen: P2M pool freeing may take excessively long (XSA-410) 63455f82-Arm-P2M-prevent-adding-mapping-when-dying.patch 63455fa8-Arm-P2M-preempt-when-freeing-intermediate.patch 63455fc3-x86-p2m_teardown-allow-skip-root-pt-removal.patch 63455fe4-x86-HAP-monitor-table-error-handling.patch 63456000-x86-tolerate-sh_set_toplevel_shadow-failure.patch 6345601d-x86-tolerate-shadow_prealloc-failure.patch 6345603a-x86-P2M-refuse-new-alloc-for-dying.patch 63456057-x86-P2M-truly-free-paging-pool-for-dying.patch 63456075-x86-P2M-free-paging-pool-preemptively.patch 63456090-x86-p2m_teardown-preemption.patch - bcs#1203804 - VUL-0: CVE-2022-33747: xen: unbounded memory consumption for 2nd-level page tables on ARM systems (XSA-409) 63456175-libxl-per-arch-extra-default-paging-memory.patch 63456177-Arm-construct-P2M-pool-for-guests.patch 6345617a-Arm-XEN_DOMCTL_shadow_op.patch 6345617c-Arm-take-P2M-pages-P2M-pool.patch - bsc#1203807 - VUL-0: CVE-2022-33748: xen: lock order inversion in transitive grant copy handling (XSA-411) 634561aa-gnttab-locking-on-transitive-copy-error-path.patch - Upstream bug fixes (bsc#1027519) 6306185f-x86-XSTATE-CPUID-subleaf-1-EBX.patch 631b5ba6-gnttab-acquire-resource-vaddrs.patch 634561f1-x86emul-respect-NSCB.patch 6346e404-VMX-correct-error-handling-in-vmx_create_vmcs.patch 6351095c-Arm-rework-p2m_init.patch 6351096a-Arm-P2M-populate-pages-for-GICv2-mapping.patch 635274c0-EFI-dont-convert-runtime-mem-to-RAM.patch 635665fb-sched-fix-restore_vcpu_affinity.patch 63569723-x86-shadow-replace-bogus-assertions.patch - Drop patches replaced by upstream versions: xsa410-01.patch xsa410-02.patch xsa410-03.patch xsa410-04.patch xsa410-05.patch xsa410-06.patch xsa410-07.patch xsa410-08.patch xsa410-09.patch xsa410-10.patch xsa411.patch- bsc#1204482 - VUL-0: CVE-2022-42311, CVE-2022-42312, CVE-2022-42313, CVE-2022-42314, CVE-2022-42315, CVE-2022-42316, CVE-2022-42317, CVE-2022-42318: xen: Xenstore: Guests can let xenstored run out of memory (XSA-326) xsa326-01.patch xsa326-02.patch xsa326-03.patch xsa326-04.patch xsa326-05.patch xsa326-06.patch xsa326-07.patch xsa326-08.patch xsa326-09.patch xsa326-10.patch xsa326-11.patch xsa326-12.patch xsa326-13.patch xsa326-14.patch xsa326-15.patch xsa326-16.patch - bsc#1204485 - VUL-0: CVE-2022-42309: xen: Xenstore: Guests can crash xenstored (XSA-414) xsa414.patch - bsc#1204487 - VUL-0: CVE-2022-42310: xen: Xenstore: Guests can create orphaned Xenstore nodes (XSA-415) xsa415.patch - bsc#1204488 - VUL-0: CVE-2022-42319: xen: Xenstore: Guests can cause Xenstore to not free temporary memory (XSA-416) xsa416.patch - bsc#1204489 - VUL-0: CVE-2022-42320: xen: Xenstore: Guests can get access to Xenstore nodes of deleted domains (XSA-417) xsa417.patch - bsc#1204490 - VUL-0: CVE-2022-42321: xen: Xenstore: Guests can crash xenstored via exhausting the stack (XSA-418) xsa418-01.patch xsa418-02.patch xsa418-03.patch xsa418-04.patch xsa418-05.patch xsa418-06.patch xsa418-07.patch - bsc#1204494 - VUL-0: CVE-2022-42322,CVE-2022-42323: xen: Xenstore: cooperating guests can create arbitrary numbers of nodes (XSA-419) xsa419-01.patch xsa419-02.patch xsa419-03.patch - bsc#1204496 - VUL-0: CVE-2022-42325,CVE-2022-42326: xen: Xenstore: Guests can create arbitray number of nodes via transactions (XSA-421) xsa421-01.patch xsa421-02.patch- bsc#1204483 - VUL-0: CVE-2022-42327: xen: x86: unintended memory sharing between guests (XSA-412) xsa412.patch- bsc#1203806 - VUL-0: CVE-2022-33746: xen: P2M pool freeing may take excessively long (XSA-410) xsa410-01.patch xsa410-02.patch xsa410-03.patch xsa410-04.patch xsa410-05.patch xsa410-06.patch xsa410-07.patch xsa410-08.patch xsa410-09.patch xsa410-10.patch - bsc#1203807 - VUL-0: CVE-2022-33748: xen: lock order inversion in transitive grant copy handling (XSA-411) xsa411.patch- bsc#1201994 - Xen DomU unable to emulate audio device 62fde97e-tools-libxl-Replace-deprecated-soundhw-on-QEMU-command-line.patch- Things are compiling fine now with gcc12. Drop gcc12-fixes.patch- Update to Xen 4.16.2 bug fix release (bsc#1027519) xen-4.16.2-testing-src.tar.bz2 * No upstream changelog found in sources or webpage - Drop patches contained in new tarball 625fca42-VT-d-reserved-CAP-ND.patch 626f7ee8-x86-MSR-handle-P5-MC-reads.patch 627549d6-IO-shutdown-race.patch 62a1e594-x86-clean-up-_get_page_type.patch 62a1e5b0-x86-ABAC-race-in-_get_page_type.patch 62a1e5d2-x86-introduce-_PAGE_-for-mem-types.patch 62a1e5f0-x86-dont-change-cacheability-of-directmap.patch 62a1e60e-x86-split-cache_flush-out-of-cache_writeback.patch 62a1e62b-x86-AMD-work-around-CLFLUSH-ordering.patch 62a1e649-x86-track-and-flush-non-coherent.patch 62a99614-IOMMU-x86-gcc12.patch 62ab0fab-x86-spec-ctrl-VERW-flushing-runtime-cond.patch 62ab0fac-x86-spec-ctrl-enum-for-MMIO-Stale-Data.patch 62ab0fad-x86-spec-ctrl-add-unpriv-mmio.patch 62bdd840-x86-spec-ctrl-only-adjust-idle-with-legacy-IBRS.patch 62bdd841-x86-spec-ctrl-knobs-for-STIBP-and-PSFD.patch 62c56cc0-libxc-fix-compilation-error-with-gcc13.patch 62cc31ed-x86-honour-spec-ctrl-0-for-unpriv-mmio.patch 62cc31ee-cmdline-extend-parse_boolean.patch 62cc31ef-x86-spec-ctrl-fine-grained-cmdline-subopts.patch 62cd91d0-x86-spec-ctrl-rework-context-switching.patch 62cd91d1-x86-spec-ctrl-rename-SCF_ist_wrmsr.patch 62cd91d2-x86-spec-ctrl-rename-opt_ibpb.patch 62cd91d3-x86-spec-ctrl-rework-SPEC_CTRL_ENTRY_FROM_INTR_IST.patch 62cd91d4-x86-spec-ctrl-IBPB-on-entry.patch 62cd91d5-x86-cpuid-BTC_NO-enum.patch 62cd91d6-x86-spec-ctrl-enable-Zen2-chickenbit.patch 62cd91d7-x86-spec-ctrl-mitigate-Branch-Type-Confusion.patch xsa408.patch- bsc#1167608, bsc#1201631 - fix built-in default of max_event_channels A previous change to the built-in default had a logic error, effectively restoring the upstream limit of 1023 channels per domU. Fix the logic to calculate the default based on the number of vcpus. adjust libxl.max_event_channels.patch- Added --disable-pvshim when running configure in xen.spec. We have never shipped the shim and don't need to build it.- bsc#1199965 - VUL-0: CVE-2022-26362: xen: Race condition in typeref acquisition 62a1e594-x86-clean-up-_get_page_type.patch 62a1e5b0-x86-ABAC-race-in-_get_page_type.patch - bsc#1199966 - VUL-0: CVE-2022-26363,CVE-2022-26364: xen: Insufficient care with non-coherent mappings 62a1e5d2-x86-introduce-_PAGE_-for-mem-types.patch 62a1e5f0-x86-dont-change-cacheability-of-directmap.patch 62a1e60e-x86-split-cache_flush-out-of-cache_writeback.patch 62a1e62b-x86-AMD-work-around-CLFLUSH-ordering.patch 62a1e649-x86-track-and-flush-non-coherent.patch - bsc#1200549 VUL-0: CVE-2022-21123,CVE-2022-21125,CVE-2022-21166: xen: x86: MMIO Stale Data vulnerabilities (XSA-404) 62ab0fab-x86-spec-ctrl-VERW-flushing-runtime-cond.patch 62ab0fac-x86-spec-ctrl-enum-for-MMIO-Stale-Data.patch 62ab0fad-x86-spec-ctrl-add-unpriv-mmio.patch - bsc#1201469 - VUL-0: CVE-2022-23816,CVE-2022-23825,CVE-2022-29900: xen: retbleed - arbitrary speculative code execution with return instructions (XSA-407) 62cc31ed-x86-honour-spec-ctrl-0-for-unpriv-mmio.patch 62cc31ee-cmdline-extend-parse_boolean.patch 62cc31ef-x86-spec-ctrl-fine-grained-cmdline-subopts.patch 62cd91d0-x86-spec-ctrl-rework-context-switching.patch 62cd91d1-x86-spec-ctrl-rename-SCF_ist_wrmsr.patch 62cd91d2-x86-spec-ctrl-rename-opt_ibpb.patch 62cd91d3-x86-spec-ctrl-rework-SPEC_CTRL_ENTRY_FROM_INTR_IST.patch 62cd91d4-x86-spec-ctrl-IBPB-on-entry.patch 62cd91d5-x86-cpuid-BTC_NO-enum.patch 62cd91d6-x86-spec-ctrl-enable-Zen2-chickenbit.patch 62cd91d7-x86-spec-ctrl-mitigate-Branch-Type-Confusion.patch - Upstream bug fixes (bsc#1027519) 62a99614-IOMMU-x86-gcc12.patch 62bdd840-x86-spec-ctrl-only-adjust-idle-with-legacy-IBRS.patch 62bdd841-x86-spec-ctrl-knobs-for-STIBP-and-PSFD.patch - Drop patches replaced by upstream versions xsa401-1.patch xsa401-2.patch xsa402-1.patch xsa402-2.patch xsa402-3.patch xsa402-4.patch xsa402-5.patch- bsc#1201394 - VUL-0: CVE-2022-33745: xen: insufficient TLB flush for x86 PV guests in shadow mode (XSA-408) xsa408.patch - Fix gcc13 compilation error 62c56cc0-libxc-fix-compilation-error-with-gcc13.patch- Moved logrotate files from user specific directory /etc/logrotate.d to vendor specific directory /usr/etc/logrotate.d.- bsc#1199966 - VUL-0: EMBARGOED: CVE-2022-26363,CVE-2022-26364: xen: Insufficient care with non-coherent mappings fix xsa402-5.patch- Upstream bug fixes (bsc#1027519) 625fca42-VT-d-reserved-CAP-ND.patch 626f7ee8-x86-MSR-handle-P5-MC-reads.patch 627549d6-IO-shutdown-race.patch - bsc#1199965 - VUL-0: EMBARGOED: CVE-2022-26362: xen: Race condition in typeref acquisition xsa401-1.patch xsa401-2.patch - bsc#1199966 - VUL-0: EMBARGOED: CVE-2022-26363,CVE-2022-26364: xen: Insufficient care with non-coherent mappings xsa402-1.patch xsa402-2.patch xsa402-3.patch xsa402-4.patch xsa402-5.patch- fix python3 >= 3.10 version detection- Update to Xen 4.16.1 bug fix release (bsc#1027519) xen-4.16.1-testing-src.tar.bz2 - Drop patches contained in new tarball 61b31d5c-x86-restrict-all-but-self-IPI.patch 61b88e78-x86-CPUID-TSXLDTRK-definition.patch 61bc429f-revert-hvmloader-PA-range-should-be-UC.patch 61d5687a-x86-spec-ctrl-opt_srb_lock-default.patch 61d6ea2d-VT-d-split-domid-map-cleanup-check-into-a-function.patch 61d6ea7b-VT-d-dont-leak-domid-mapping-on-error-path.patch 61e0296a-x86-time-calibration-relative-counts.patch 61e029c8-x86-time-TSC-freq-calibration-accuracy.patch 61e02a1c-libxl-PCI-PV-hotplug-stubdom-coldplug.patch 61e98e88-x86-introduce-get-set-reg-infra.patch 61e98e89-x86-MSR-split-SPEC_CTRL-handling.patch 61e98e8a-x86-spec-ctrl-drop-ENTRY-EXIT-HVM.patch 61e98e8b-VT-x-SPEC_CTRL-NMI-race-condition.patch 61eaaa23-x86-get-set-reg-infra-build.patch 61efec1d-Arm-P2M-always-clear-entry-on-mapping-removal.patch 61efec4d-gnttab-only-decrement-refcounter-on-final-unmap.patch 61efec96-IOMMU-x86-stop-pirq-iteration-immediately-on-error.patch 61f2d886-x86-CPUID-disentangle-new-leaves-logic.patch 61f2d887-x86-CPUID-leaf-7-1-EBX-infra.patch 61f2dd76-x86-SPEC_CTRL-migration-compatibility.patch 61f7b2af-libxl-dont-touch-nr_vcpus_out-if-listing.patch 61f933a4-x86-cpuid-advertise-SSB_NO.patch 61f933a5-x86-drop-use_spec_ctrl-boolean.patch 61f933a6-x86-new-has_spec_ctrl-boolean.patch 61f933a7-x86-dont-use-spec_ctrl-enter-exit-for-S3.patch 61f933a8-x86-SPEC_CTRL-record-last-write.patch 61f933a9-x86-SPEC_CTRL-use-common-logic-for-AMD.patch 61f933aa-SVM-SPEC_CTRL-entry-exit-logic.patch 61f933ab-x86-AMD-SPEC_CTRL-infra.patch 61f933ac-SVM-enable-MSR_SPEC_CTRL-for-guests.patch 61f946a2-VMX-drop-SPEC_CTRL-load-on-VMEntry.patch 6202afa3-x86-clean-up-MSR_MCU_OPT_CTRL-handling.patch 6202afa4-x86-TSX-move-has_rtm_always_abort.patch 6202afa5-x86-TSX-cope-with-deprecation-on-WHL-R-CFL-R.patch 6202afa7-x86-CPUID-leaf-7-2-EDX-infra.patch 6202afa8-x86-Intel-PSFD-for-guests.patch 62278667-Arm-introduce-new-processors.patch 62278668-Arm-move-errata-CSV2-check-earlier.patch 62278669-Arm-add-ECBHB-and-CLEARBHB-ID-fields.patch 6227866a-Arm-Spectre-BHB-handling.patch 6227866b-Arm-allow-SMCCC_ARCH_WORKAROUND_3-use.patch 6227866c-x86-AMD-cease-using-thunk-lfence.patch 6229ba46-VT-d-drop-undue-address-of-from-check_cleanup_domid_map.patch 624ebcef-VT-d-dont-needlessly-look-up-DID.patch 624ebd3b-VT-d-avoid-NULL-deref-on-dcmo-error-paths.patch 624ebd74-VT-d-avoid-infinite-recursion-on-dcmo-error-path.patch xsa397.patch xsa399.patch xsa400-01.patch xsa400-02.patch xsa400-03.patch xsa400-04.patch xsa400-05.patch xsa400-06.patch xsa400-07.patch xsa400-08.patch xsa400-09.patch xsa400-10.patch xsa400-11.patch xsa400-12.patch- bsc#1197426 - VUL-0: CVE-2022-26358,CVE-2022-26359, CVE-2022-26360,CVE-2022-26361: xen: IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues (XSA-400) 624ebcef-VT-d-dont-needlessly-look-up-DID.patch 624ebd3b-VT-d-avoid-NULL-deref-on-dcmo-error-paths.patch 624ebd74-VT-d-avoid-infinite-recursion-on-dcmo-error-path.patch- bsc#1197423 - VUL-0: CVE-2022-26356: xen: Racy interactions between dirty vram tracking and paging log dirty hypercalls (XSA-397) xsa397.patch - bsc#1197425 - VUL-0: CVE-2022-26357: xen: race in VT-d domain ID cleanup (XSA-399) xsa399.patch - bsc#1197426 - VUL-0: CVE-2022-26358,CVE-2022-26359, CVE-2022-26360,CVE-2022-26361: xen: IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues (XSA-400) xsa400-01.patch xsa400-02.patch xsa400-03.patch xsa400-04.patch xsa400-05.patch xsa400-06.patch xsa400-07.patch xsa400-08.patch xsa400-09.patch xsa400-10.patch xsa400-11.patch xsa400-12.patch - Additional upstream bug fixes for XSA-400 (bsc#1027519) 61d6ea2d-VT-d-split-domid-map-cleanup-check-into-a-function.patch 61d6ea7b-VT-d-dont-leak-domid-mapping-on-error-path.patch 6229ba46-VT-d-drop-undue-address-of-from-check_cleanup_domid_map.patch- bsc#1196915 - VUL-0: CVE-2022-0001, CVE-2022-0002,CVE-2021-26401: xen: BHB speculation issues (XSA-398) 62278667-Arm-introduce-new-processors.patch 62278668-Arm-move-errata-CSV2-check-earlier.patch 62278669-Arm-add-ECBHB-and-CLEARBHB-ID-fields.patch 6227866a-Arm-Spectre-BHB-handling.patch 6227866b-Arm-allow-SMCCC_ARCH_WORKAROUND_3-use.patch 6227866c-x86-AMD-cease-using-thunk-lfence.patch- bsc#1196545 - GCC 12: xen package fails gcc12-fixes.patch- Upstream bug fixes (bsc#1027519) 61e0296a-x86-time-calibration-relative-counts.patch 61e029c8-x86-time-TSC-freq-calibration-accuracy.patch 61e02a1c-libxl-PCI-PV-hotplug-stubdom-coldplug.patch 61e98e88-x86-introduce-get-set-reg-infra.patch 61e98e89-x86-MSR-split-SPEC_CTRL-handling.patch 61e98e8a-x86-spec-ctrl-drop-ENTRY-EXIT-HVM.patch 61e98e8b-VT-x-SPEC_CTRL-NMI-race-condition.patch 61eaaa23-x86-get-set-reg-infra-build.patch 61efec1d-Arm-P2M-always-clear-entry-on-mapping-removal.patch 61efec4d-gnttab-only-decrement-refcounter-on-final-unmap.patch 61efec96-IOMMU-x86-stop-pirq-iteration-immediately-on-error.patch 61f2d886-x86-CPUID-disentangle-new-leaves-logic.patch 61f2d887-x86-CPUID-leaf-7-1-EBX-infra.patch 61f2dd76-x86-SPEC_CTRL-migration-compatibility.patch 61f7b2af-libxl-dont-touch-nr_vcpus_out-if-listing.patch 61f933a4-x86-cpuid-advertise-SSB_NO.patch 61f933a5-x86-drop-use_spec_ctrl-boolean.patch 61f933a6-x86-new-has_spec_ctrl-boolean.patch 61f933a7-x86-dont-use-spec_ctrl-enter-exit-for-S3.patch 61f933a8-x86-SPEC_CTRL-record-last-write.patch 61f933a9-x86-SPEC_CTRL-use-common-logic-for-AMD.patch 61f933aa-SVM-SPEC_CTRL-entry-exit-logic.patch 61f933ab-x86-AMD-SPEC_CTRL-infra.patch 61f933ac-SVM-enable-MSR_SPEC_CTRL-for-guests.patch 61f946a2-VMX-drop-SPEC_CTRL-load-on-VMEntry.patch 6202afa3-x86-clean-up-MSR_MCU_OPT_CTRL-handling.patch 6202afa4-x86-TSX-move-has_rtm_always_abort.patch 6202afa5-x86-TSX-cope-with-deprecation-on-WHL-R-CFL-R.patch 6202afa7-x86-CPUID-leaf-7-2-EDX-infra.patch 6202afa8-x86-Intel-PSFD-for-guests.patch - Drop patches replaced by the above: xsa393.patch xsa394.patch xsa395.patch libxl-Fix-PV-hotplug-and-stubdom-coldplug.patch libxl-dont-try-to-free-a-NULL-list-of-vcpus.patch libxl-dont-touch-nr_vcpus_out-if-listing-vcpus-and-returning-NULL.patch- bsc#1194576 - VUL-0: CVE-2022-23033: xen: arm: guest_physmap_remove_page not removing the p2m mappings (XSA-393) xsa393.patch - bsc#1194581 - VUL-0: CVE-2022-23034: xen: a PV guest could DoS Xen while unmapping a grant (XSA-394) xsa394.patch - bsc#1194588 - VUL-0: CVE-2022-23035: xen: insufficient cleanup of passed-through device IRQs (XSA-395) xsa395.patch- bsc#1191668 - L3: issue around xl and virsh operation - virsh list not giving any output libxl-dont-try-to-free-a-NULL-list-of-vcpus.patch libxl-dont-touch-nr_vcpus_out-if-listing-vcpus-and-returning-NULL.patch- bsc#1193307 - pci backend does not exist when attach a vf to a pv guest libxl-Fix-PV-hotplug-and-stubdom-coldplug.patch Drop libxl-PCI-defer-backend-wait.patch- bsc#1193447 - Slow execution of hvmloader+ovmf when VM contains an sriov device 61bc429f-revert-hvmloader-PA-range-should-be-UC.patch - Upstream bug fixes (bsc#1027519) 61b31d5c-x86-restrict-all-but-self-IPI.patch 61b88e78-x86-CPUID-TSXLDTRK-definition.patch 61d5687a-x86-spec-ctrl-opt_srb_lock-default.patch- Collect active VM config files in the supportconfig plugin xen-supportconfig- Now that the ovmf package has been updated, reset the configure script to use ovmf-x86_64-xen-4m.bin from ovmf-x86_64-ms.bin References bsc#1194105, bsc#1193274 xen.spec- bsc#1193307 - pci backend does not exist when attach a vf to a pv guest libxl-PCI-defer-backend-wait.patch- Update to Xen 4.16.0 FCS release xen-4.16.0-testing-src.tar.bz2 * Miscellaneous fixes to the TPM manager software in preparation for TPM 2.0 support. * Increased reliance on the PV shim as 32-bit PV guests will only be supported in shim mode going forward. This change reduces the attack surface in the hypervisor. * Increased hardware support by allowing Xen to boot on Intel devices that lack a Programmable Interval Timer. * Cleanup of legacy components by no longer building QEMU Traditional or PV-Grub by default. Note both projects have upstream Xen support merged now, so it is no longer recommended to use the Xen specific forks. * Initial support for guest virtualized Performance Monitor Counters on Arm. * Improved support for dom0less mode by allowing the usage on Arm 64bit hardware with EFI firmware. * Improved support for Arm 64-bit heterogeneous systems by leveling the CPU features across all to improve big.LITTLE support. - bsc#1193274 - [Build67.2][Xen][uefi] xen fullvirt uefi guest can not be created with default 'type=plash' in virt-manager xen.spec- Update to Xen 4.16.0 RC4 release (jsc#SLE-18467) xen-4.16.0-testing-src.tar.bz2 * Xen can now export Intel Processor Trace (IPT) data from guests to tools in dom0. * Xen now supports Viridian enlightenments for guests with more than 64 vcpus. * Xenstored and oxenstored both now support LiveUpdate (tech preview). * Unified boot images * Switched x86 MSR accesses to deny by default policy. * Named PCI devices for xl/libxl and improved documentation for xl PCI configuration format. * Support for zstd-compressed dom0 (x86) and domU kernels. * Reduce ACPI verbosity by default. * Add ucode=allow-same option to test late microcode loading path. * Library improvements from NetBSD ports upstreamed. * x86: Allow domains to use AVX-VNNI instructions. * Added XEN_SCRIPT_DIR configuration option to specify location for Xen scripts. * xennet: Documented a way for the backend (or toolstack) to specify MTU to the frontend. * On detecting a host crash, some debug key handlers can automatically triggered to aid in debugging. * Increase the maximum number of guests which can share a single IRQ from 7 to 16, and make this configurable with irq-max-guests. - Drop iPXE sources and patches. iPXE is only used by QEMU traditional which has never shipped with SLE15. ipxe.tar.bz2 ipxe-enable-nics.patch ipxe-no-error-logical-not-parentheses.patch ipxe-use-rpm-opt-flags.patch - Drop building ocaml xenstored in the spec file. There are no plans or need to support this version. - Drop patches contained in new tarball or no longer required 5fca3b32-tools-libs-ctrl-fix-dumping-of-ballooned-guest.patch 5ffc58c4-ACPI-reduce-verbosity-by-default.patch 602ffae9-tools-libs-light-fix-xl-save--c-handling.patch 608676f2-VT-d-register-based-invalidation-optional.patch 60a27288-x86emul-gas-2-36-test-harness-build.patch 60af933d-x86-gcc11-hypervisor-build.patch 60afe616-x86-CPUID-rework-HLE-and-RTM-handling.patch 60afe617-x86-TSX-minor-cleanup-and-improvements.patch 60afe618-x86-TSX-deprecate-vpmu=rtm-abort.patch 60ba695e-tools-libs-ctrl-fix-xc_core_arch_map_p2m-to-support.patch 60be0e24-credit2-pick-runnable-unit.patch 60be0e42-credit2-per-entity-load-tracking-when-continuing.patch 60be3097-x86-CPUID-fix-HLE-and-RTM-handling-again.patch 60bf9e19-Arm-create-dom0less-domUs-earlier.patch 60bf9e1a-Arm-boot-modules-scrubbing.patch 60bf9e1b-VT-d-size-qinval-queue-dynamically.patch 60bf9e1c-AMD-IOMMU-size-command-buffer-dynamically.patch 60bf9e1d-VT-d-eliminate-flush-related-timeouts.patch 60bf9e1e-x86-spec-ctrl-protect-against-SCSB.patch 60bf9e1f-x86-spec-ctrl-mitigate-TAA-after-S3.patch 60bfa904-AMD-IOMMU-wait-for-command-slot.patch 60bfa906-AMD-IOMMU-drop-command-completion-timeout.patch 60c0bf86-x86-TSX-cope-with-deprecation.patch 60c8a7ac-x86-vpt-fully-init-timers-before-enlisting.patch 60c8de6e-osdep_xenforeignmemory_map-prototype.patch 60d49689-VT-d-undo-device-mappings-upon-error.patch 60d496b9-VT-d-adjust-domid-map-updating-on-unmap.patch 60d496d6-VT-d-clear_fault_bits-should-clear-all.patch 60d496ee-VT-d-dont-lose-errors-on-multi-IOMMU-flush.patch 60d5c6df-IOMMU-PCI-dont-let-domain-cleanup-continue.patch 61001231-x86-work-around-GNU-ld-2-37-issue.patch 61122ac6-credit2-avoid-spuriously-picking-idle.patch 611a7e38-x86-CET-shstk-WARN-manipulation.patch 611cba4e-VT-d-Tylersburg-errata-more-steppings.patch 611f844b-AMD-IOMMU-dont-leave-pt-mapped.patch 6126339d-AMD-IOMMU-global-ER-extending.patch 6126344f-AMD-IOMMU-unity-map-handling.patch 61263464-IOMMU-pass-access-to-p2m_get_iommu_flags.patch 6126347d-IOMMU-generalize-VT-d-mapped-RMRR-tracking.patch 6126349a-AMD-IOMMU-rearrange-reassignment.patch 612634ae-AMD-IOMMU-rearrange-ER-UM-recording.patch 612634c3-x86-p2m-introduce-p2m_is_special.patch 612634dc-x86-p2m-guard-identity-mappings.patch 612634f4-x86-mm-widen-locked-region-in-xatp1.patch 6126350a-gnttab-release-mappings-preemption.patch 6126351f-gnttab-replace-mapkind.patch 6126353d-gnttab-get-status-frames-array-capacity.patch 61263553-Arm-restrict-maxmem-for-dom0less.patch 6128a856-gnttab-radix-tree-node-init.patch init.xen_loop libxc-bitmap-50a5215f30e964a6f16165ab57925ca39f31a849.patch libxc-bitmap-longs.patch libxc.migrate_tracking.patch libxc-sr-3cccdae45242dab27198b8e150be0c85acd5d3c9.patch libxc-sr-add-xc_is_known_page_type.patch libxc-sr-arrays.patch libxc-sr-batch_pfns.patch libxc-sr-page_type_has_stream_data.patch libxc.sr.superpage.patch libxc-sr-use-xc_is_known_page_type.patch libxl-0c0b3a7e4a2d65fd252b89b46bdcdb048bb24b6c.patch libxl-0ff26a3225d69ffec76fe5aca8296852fa951204.patch libxl-4e217db45e83fc3173382306c8b03da86099a25d.patch libxl-7c313e8365eb663311a0cf39f77b4f5880244765.patch libxl-85760c03d664400368a3f76ae0225307c25049a7.patch libxl-d5f54009dba11d04bfe2a28eee47b994de66b84a.patch libxl-f3f778c81769075ac0eb93b98d4b2803e7936453.patch libxl-fe6630ddc4e8a8fbf8dd28a1bc58e3881393f9c1.patch libxl.fix-libacpi-dependency.patch libxl-qemu6-scsi.patch libxl-qemu6-vnc-password.patch libxl.set-migration-constraints-from-cmdline.patch reproducible.patch stubdom-have-iovec.patch x86-cpufreq-report.patch xenstore-launch.patch xenwatchdogd-options.patch xsa384.patch- bsc#1189632 - VUL-0: CVE-2021-28701: xen: Another race in XENMAPSPACE_grant_table handling (XSA-384) xsa384.patch - Upstream bug fixes (bsc#1027519) 61001231-x86-work-around-GNU-ld-2-37-issue.patch 611a7e38-x86-CET-shstk-WARN-manipulation.patch 611cba4e-VT-d-Tylersburg-errata-more-steppings.patch 611f844b-AMD-IOMMU-dont-leave-pt-mapped.patch 6128a856-gnttab-radix-tree-node-init.patch 61122ac6-credit2-avoid-spuriously-picking-idle.patch (Replaces credit2-avoid-picking-a-spurious-idle-unit-when-caps-are-used.patch) 6126339d-AMD-IOMMU-global-ER-extending.patch (Replaces xsa378-1.patch) 6126344f-AMD-IOMMU-unity-map-handling.patch (Replaces xsa378-2.patch) 61263464-IOMMU-pass-access-to-p2m_get_iommu_flags.patch (Replaces xsa378-3.patch) 6126347d-IOMMU-generalize-VT-d-mapped-RMRR-tracking.patch (Replaces xsa378-4.patch) 6126349a-AMD-IOMMU-rearrange-reassignment.patch (Replaces xsa378-5.patch) 612634ae-AMD-IOMMU-rearrange-ER-UM-recording.patch (Replaces xsa378-6.patch) 612634c3-x86-p2m-introduce-p2m_is_special.patch (Replaces xsa378-7.patch) 612634dc-x86-p2m-guard-identity-mappings.patch (Replaces xsa378-8.patch) 612634f4-x86-mm-widen-locked-region-in-xatp1.patch (Replaces xsa379.patch) 6126350a-gnttab-release-mappings-preemption.patch (Replaces xsa380-1.patch 6126351f-gnttab-replace-mapkind.patch (Replaces xsa380-2.patch) 6126353d-gnttab-get-status-frames-array-capacity.patch (Replaces xsa382.patch) 61263553-Arm-restrict-maxmem-for-dom0less.patch (Replaces xsa383.patch)- bsc#1189882 - refresh libxc.sr.superpage.patch prevent superpage allocation in the LAPIC and ACPI_INFO range- bsc#1189373 - VUL-0: CVE-2021-28694,CVE-2021-28695, CVE-2021-28696: xen: IOMMU page mapping issues on x86 (XSA-378) xsa378-1.patch xsa378-2.patch xsa378-3.patch xsa378-4.patch xsa378-5.patch xsa378-6.patch xsa378-7.patch xsa378-8.patch - bsc#1189376 - VUL-0: CVE-2021-28697: xen: grant table v2 status pages may remain accessible after de-allocation. (XSA-379) xsa379.patch - bsc#1189378 - VUL-0: CVE-2021-28698: xen: long running loops in grant table handling. (XSA-380) xsa380-1.patch xsa380-2.patch - bsc#1189380 - VUL-0: CVE-2021-28699: xen: inadequate grant-v2 status frames array bounds check. (XSA-382) xsa382.patch - bsc#1189381 - VUL-0: CVE-2021-28700: xen: xen/arm: No memory limit for dom0less domUs. (XSA-383) xsa383.patch- bsc#1188050 - L3: Xen guest yval1a80 SLES11SP4 hangs on cluster See also bsc#1179246. credit2-avoid-picking-a-spurious-idle-unit-when-caps-are-used.patch- Drop aarch64-maybe-uninitialized.patch as the fix is in tarball.- refresh the migration patches to state v20210713 removed libxc-sr-add-xc_is_known_page_type.patch removed libxc-sr-arrays.patch removed libxc-sr-batch_pfns.patch removed libxc-sr-page_type_has_stream_data.patch removed libxc-sr-use-xc_is_known_page_type.patch removed libxc.migrate_tracking.patch removed libxc.sr.superpage.patch removed libxl.set-migration-constraints-from-cmdline.patch added libxc-sr-383b41974d5543b62f3181d216070fe3691fb130.patch added libxc-sr-5588ebcfca774477cf823949e5703b0ac48818cc.patch added libxc-sr-9e59d9f8ee3808acde9833192211da25f66d8cc2.patch added libxc-sr-LIBXL_HAVE_DOMAIN_SUSPEND_PROPS.patch added libxc-sr-abort_if_busy.patch added libxc-sr-f17a73b3c0264c62dd6b5dae01ed621c051c3038.patch added libxc-sr-max_iters.patch added libxc-sr-min_remaining.patch added libxc-sr-number-of-iterations.patch added libxc-sr-precopy_policy.patch added libxc-sr-restore-hvm-legacy-superpage.patch added libxc-sr-track-migration-time.patch added libxc-sr-xg_sr_bitmap-populated_pfns.patch added libxc-sr-xg_sr_bitmap.patch added libxc-sr-xl-migration-debug.patch- bsc#1176189 - xl monitoring process exits during xl save -p|-c keep the monitoring process running to cleanup the domU during shutdown xl-save-pc.patch- bsc#1179246 - Dom0 hangs when pinning CPUs for dom0 with HVM guest 60be0e24-credit2-pick-runnable-unit.patch 60be0e42-credit2-per-entity-load-tracking-when-continuing.patch - Upstream bug fixes (bsc#1027519) 60bf9e19-Arm-create-dom0less-domUs-earlier.patch (Replaces xsa372-1.patch) 60bf9e1a-Arm-boot-modules-scrubbing.patch (Replaces xsa372-2.patch) 60bf9e1b-VT-d-size-qinval-queue-dynamically.patch (Replaces xsa373-1.patch) 60bf9e1c-AMD-IOMMU-size-command-buffer-dynamically.patch (Replaces xsa373-2.patch) 60bf9e1d-VT-d-eliminate-flush-related-timeouts.patch (Replaces xsa373-2.patch) 60bf9e1e-x86-spec-ctrl-protect-against-SCSB.patch (Replaces xsa375.patch) 60bf9e1f-x86-spec-ctrl-mitigate-TAA-after-S3.patch (Replaces xsa377.patch) 60bfa904-AMD-IOMMU-wait-for-command-slot.patch (Replaces xsa373-4.patch) 60bfa906-AMD-IOMMU-drop-command-completion-timeout.patch (Replaces xsa373-5.patch) 60afe617-x86-TSX-minor-cleanup-and-improvements.patch 60afe618-x86-TSX-deprecate-vpmu=rtm-abort.patch 60be3097-x86-CPUID-fix-HLE-and-RTM-handling-again.patch 60c0bf86-x86-TSX-cope-with-deprecation.patch 60c8a7ac-x86-vpt-fully-init-timers-before-enlisting.patch 60c8de6e-osdep_xenforeignmemory_map-prototype.patch 60d49689-VT-d-undo-device-mappings-upon-error.patch 60d496b9-VT-d-adjust-domid-map-updating-on-unmap.patch 60d496d6-VT-d-clear_fault_bits-should-clear-all.patch 60d496ee-VT-d-dont-lose-errors-on-multi-IOMMU-flush.patch 60d5c6df-IOMMU-PCI-dont-let-domain-cleanup-continue.patch - Dropped gcc11-fixes.patch- bsc#1183243 - L3: Core cannot be opened when using xl dump-core of VM with PTF 60ba695e-tools-libs-ctrl-fix-xc_core_arch_map_p2m-to-support.patch- bsc#1180350 - some long deprecated commands were finally removed in qemu6. Adjust libxl to use supported commands. libxl-d5f54009dba11d04bfe2a28eee47b994de66b84a.patch libxl-f3f778c81769075ac0eb93b98d4b2803e7936453.patch libxl-4e217db45e83fc3173382306c8b03da86099a25d.patch libxl-85760c03d664400368a3f76ae0225307c25049a7.patch libxl-0ff26a3225d69ffec76fe5aca8296852fa951204.patch libxl-7c313e8365eb663311a0cf39f77b4f5880244765.patch libxl-0c0b3a7e4a2d65fd252b89b46bdcdb048bb24b6c.patch libxl-fe6630ddc4e8a8fbf8dd28a1bc58e3881393f9c1.patch libxl-qemu6-vnc-password.patch libxl-qemu6-scsi.patch- Update logrotate.conf, move global options into per-file sections to prevent globbering of global state (bsc#1187406)- Fix shell macro expansion in xen.spec, so that ExecStart= in xendomains-wait-disks.service is created correctly (bsc#1183877)- bsc#1186428 - VUL-0: CVE-2021-28693: xen: xen/arm: Boot modules are not scrubbed (XSA-372) xsa372-1.patch xsa372-2.patch - bsc#1186429 - VUL-0: CVE-2021-28692: xen: inappropriate x86 IOMMU timeout detection / handling (XSA-373) xsa373-1.patch xsa373-2.patch xsa373-3.patch xsa373-4.patch xsa373-5.patch - bsc#1186433 - VUL-0: CVE-2021-0089: xen: Speculative Code Store Bypass (XSA-375) xsa375.patch - bsc#1186434 - VUL-0: CVE-2021-28690: xen: x86: TSX Async Abort protections not restored after S3 (XSA-377) xsa377.patch - Upstream bug fixes (bsc#1027519) 60a27288-x86emul-gas-2-36-test-harness-build.patch 60af933d-x86-gcc11-hypervisor-build.patch 60afe616-x86-CPUID-rework-HLE-and-RTM-handling.patch- Upstream bug fix (bsc#1027519) 608676f2-VT-d-register-based-invalidation-optional.patch- Add xen.sysconfig-fillup.patch to make sure xencommons is in a format as expected by fillup. (bsc#1185682) Each comment needs to be followed by an enabled key. Otherwise fillup will remove manually enabled key=value pairs, along with everything that looks like a stale comment, during next pkg update- Refresh xenstore-launch.patch to cover also daemon case- Update to Xen 4.14.2 bug fix release (bsc#1027519) xen-4.14.2-testing-src.tar.bz2 - Drop patches contained in new tarball 5fedf9f4-x86-hpet_setup-fix-retval.patch 5ff458f2-x86-vPCI-tolerate-disabled-MSI-X-entry.patch 5ff71655-x86-dpci-EOI-regardless-of-masking.patch 5ffc58e8-x86-ACPI-dont-overwrite-FADT.patch 600999ad-x86-dpci-do-not-remove-pirqs-from.patch 600ab341-x86-vioapic-EOI-check-IRR-before-inject.patch 6011bbc7-x86-timer-fix-boot-without-PIT.patch 6013e4bd-memory-bail-from-page-scrub-when-CPU-offline.patch 6013e546-x86-HVM-reorder-domain-init-error-path.patch 601d4396-x86-EFI-suppress-ld-2-36-debug-info.patch 602bd768-page_alloc-only-flush-after-scrubbing.patch 602cfe3d-IOMMU-check-if-initialized-before-teardown.patch 602e5a8c-gnttab-never-permit-mapping-transitive-grants.patch 602e5abb-gnttab-bypass-IOMMU-when-mapping-own-grant.patch 6037b02e-x86-EFI-suppress-ld-2-36-base-relocs.patch 60410127-gcc11-adjust-rijndaelEncrypt.patch 60422428-x86-shadow-avoid-fast-fault-path.patch 604b9070-VT-d-disable-QI-IR-before-init.patch 60535c11-libxl-domain-soft-reset.patch 60700077-x86-vpt-avoid-pt_migrate-rwlock.patch 60787714-x86-HPET-factor-legacy-replacement-mode-enabling.patch 60787714-x86-HPET-avoid-legacy-replacement-mode.patch- bsc#1180491 - "Panic on CPU 0: IO-APIC + timer doesn't work!" 60787714-x86-HPET-avoid-legacy-replacement-mode.patch 60787714-x86-HPET-factor-legacy-replacement-mode-enabling.patch - Upstream bug fixes (bsc#1027519) 60410127-gcc11-adjust-rijndaelEncrypt.patch 60422428-x86-shadow-avoid-fast-fault-path.patch 604b9070-VT-d-disable-QI-IR-before-init.patch 60535c11-libxl-domain-soft-reset.patch (Replaces xsa368.patch) 60700077-x86-vpt-avoid-pt_migrate-rwlock.patch- bsc#1137251 - Restore changes for xen-dom0-modules.service which were silently removed on 2019-10-17- bsc#1177112 - Fix libxc.sr.superpage.patch The receiving side did detect holes in a to-be-allocated superpage, but allocated a superpage anyway. This resulted to over-allocation.- bsc#1167608 - adjust limit for max_event_channels A previous change allowed an unbound number of event channels to make sure even large domUs can start of of the box. This may have a bad side effect in the light of XSA-344. Adjust the built-in limit based on the number of vcpus. In case this is not enough, max_event_channels=/maxEventChannels= has to be used to set the limit as needed for large domUs adjust libxl.max_event_channels.patch- bsc#1183072 - VUL-0: CVE-2021-28687: xen: HVM soft-reset crashes toolstack (XSA-368). Also resolves, bsc#1179148 - kdump of HVM fails, soft-reset not handled by libxl bsc#1181989 - openQA job causes libvirtd to dump core when running kdump inside domain xsa368.patch- bsc#1177204 - L3-Question: conring size for XEN HV's with huge memory to small. Inital Xen logs cut 5ffc58c4-ACPI-reduce-verbosity-by-default.patch - Upstream bug fixes (bsc#1027519) 601d4396-x86-EFI-suppress-ld-2-36-debug-info.patch 602bd768-page_alloc-only-flush-after-scrubbing.patch 602cfe3d-IOMMU-check-if-initialized-before-teardown.patch 602e5a8c-gnttab-never-permit-mapping-transitive-grants.patch 602e5abb-gnttab-bypass-IOMMU-when-mapping-own-grant.patch 6037b02e-x86-EFI-suppress-ld-2-36-base-relocs.patch - bsc#1181921 - GCC 11: xen package fails gcc11-fixes.patch- bsc#1182576 - L3: XEN domU crashed on resume when using the xl unpause command 602ffae9-tools-libs-light-fix-xl-save--c-handling.patch- Start using the %autosetup macro to simplify patch management xen.spec- bsc#1181921 - GCC 11: xen package fails gcc11-fixes.patch - Drop gcc10-fixes.patch- Upstream bug fixes (bsc#1027519) 5fedf9f4-x86-hpet_setup-fix-retval.patch 5ff458f2-x86-vPCI-tolerate-disabled-MSI-X-entry.patch 5ff71655-x86-dpci-EOI-regardless-of-masking.patch 5ffc58e8-x86-ACPI-dont-overwrite-FADT.patch 600999ad-x86-dpci-do-not-remove-pirqs-from.patch (Replaces xsa360.patch) 600ab341-x86-vioapic-EOI-check-IRR-before-inject.patch 6013e4bd-memory-bail-from-page-scrub-when-CPU-offline.patch 6013e546-x86-HVM-reorder-domain-init-error-path.patch - bsc#1180491 - "Panic on CPU 0: IO-APIC + timer doesn't work!" 6011bbc7-x86-timer-fix-boot-without-PIT.patch- bsc#1181254 - VUL-0: xen: IRQ vector leak on x86 (XSA-360) xsa360.patch- bsc#1180794 - bogus qemu binary path used when creating fv guest under xen xen.spec- bsc#1180690 - L3-Question: xen: no needsreboot flag set Add Provides: installhint(reboot-needed) in xen.spec for libzypp- Update libxl.set-migration-constraints-from-cmdline.patch Remove code which handled --max_factor. The total amount of transferred data is no indicator to trigger the final stop+copy. This should have been removed during upgrade to Xen 4.7. Fix off-by-one in --max_iters, it caused one additional copy cycle. Reduce default value of --max_iters from 5 to 2. The workload within domU will continue to produce dirty pages. It is unreasonable to expect any slowdown during migration. Now there is one initial copy of all memory, one instead of four iteration for dirty memory, and a final copy iteration prior move.- Update to Xen 4.14.1 bug fix release (bsc#1027519) xen-4.14.1-testing-src.tar.bz2 Contains the following recent security fixes bsc#1179516 XSA-359 - CVE-2020-29571 bsc#1179514 XSA-358 - CVE-2020-29570 bsc#1179513 XSA-356 - CVE-2020-29567 bsc#1178963 XSA-355 - CVE-2020-29040 bsc#1178591 XSA-351 - CVE-2020-28368 bsc#1179506 XSA-348 - CVE-2020-29566 bsc#1179502 XSA-325 - CVE-2020-29483 bsc#1179501 XSA-324 - CVE-2020-29484 bsc#1179498 XSA-322 - CVE-2020-29481 bsc#1179496 XSA-115 - CVE-2020-29480 - Dropped patches contained in new tarball 5f1a9916-x86-S3-put-data-sregs-into-known-state.patch 5f21b9fd-x86-cpuid-APIC-bit-clearing.patch 5f479d9e-x86-begin-to-support-MSR_ARCH_CAPS.patch 5f4cf06e-x86-Dom0-expose-MSR_ARCH_CAPS.patch 5f4cf96a-x86-PV-fix-SEGBASE_GS_USER_SEL.patch 5f560c42-x86-PV-64bit-segbase-consistency.patch 5f560c42-x86-PV-rewrite-segment-ctxt-switch.patch 5f5b6b7a-hypfs-fix-custom-param-writes.patch 5f607915-x86-HVM-more-consistent-IO-completion.patch 5f6a002d-x86-PV-handle-MSR_MISC_ENABLE-correctly.patch 5f6a0049-memory-dont-skip-RCU-unlock-in-acquire_resource.patch 5f6a0067-x86-vPT-fix-race-when-migrating-timers.patch 5f6a008e-x86-MSI-drop-read_msi_msg.patch 5f6a00aa-x86-MSI-X-restrict-reading-of-PBA-bases.patch 5f6a00c4-evtchn-relax-port_is_valid.patch 5f6a00df-x86-PV-avoid-double-exception-injection.patch 5f6a00f4-evtchn-add-missing-barriers.patch 5f6a0111-evtchn-x86-enforce-correct-upper-limit.patch 5f6a013f-evtchn_reset-shouldnt-succeed-with.patch 5f6a0160-evtchn-IRQ-safe-per-channel-lock.patch 5f6a0178-evtchn-address-races-with-evtchn_reset.patch 5f6a01a4-evtchn-preempt-in-evtchn_destroy.patch 5f6a01c6-evtchn-preempt-in-evtchn_reset.patch 5f6cfb5b-x86-PV-dont-GP-for-SYSENTER-with-NT-set.patch 5f6cfb5b-x86-PV-dont-clobber-NT-on-return-to-guest.patch 5f71a21e-x86-S3-fix-shadow-stack-resume.patch 5f76ca65-evtchn-Flask-prealloc-for-send.patch 5f76caaf-evtchn-FIFO-use-stable-fields.patch 5f897c25-x86-traps-fix-read_registers-for-DF.patch 5f897c7b-x86-smpboot-restrict-memguard_guard_stack.patch 5f8ed5d3-x86-mm-map_pages_to_xen-single-exit-path.patch 5f8ed5eb-x86-mm-modify_xen_mappings-one-exit-path.patch 5f8ed603-x86-mm-prevent-races-in-mapping-updates.patch 5f8ed635-IOMMU-suppress-iommu_dont_flush_iotlb-when.patch 5f8ed64c-IOMMU-hold-page-ref-until-TLB-flush.patch 5f8ed682-AMD-IOMMU-convert-amd_iommu_pte.patch 5f8ed69c-AMD-IOMMU-update-live-PTEs-atomically.patch 5f8ed6b0-AMD-IOMMU-suitably-order-DTE-mods.patch xsa286-1.patch xsa286-2.patch xsa286-3.patch xsa286-4.patch xsa286-5.patch xsa286-6.patch xsa351-1.patch xsa351-2.patch xsa351-3.patch xsa355.patch- Pass --with-rundir to configure to get rid of /var/run- bsc#1178736 - allow restart of xenwatchdogd, enable tuning of keep-alive interval and timeout options via XENWATCHDOGD_ARGS= add xenwatchdogd-options.patch add xenwatchdogd-restart.patch- bsc#1177112 - Fix libxc.sr.superpage.patch The receiving side may punch holes incorrectly into optimistically allocated superpages. Also reduce overhead in bitmap handling. add libxc-bitmap-50a5215f30e964a6f16165ab57925ca39f31a849.patch add libxc-bitmap-long.patch add libxc-bitmap-longs.patch- boo#1029961 - Move files in xen-tools-domU to /usr/bin from /bin xen-destdir.patch Drop tmp_build.patch- bsc#1176782 - L3: xl dump-core shows missing nr_pages during core. If maxmem and current are the same the issue doesn't happen 5fca3b32-tools-libs-ctrl-fix-dumping-of-ballooned-guest.patch- bsc#1178963 - VUL-0: xen: stack corruption from XSA-346 change (XSA-355) xsa355.patch- Fix build error with libxl.fix-libacpi-dependency.patch- Enhance libxc.migrate_tracking.patch Hide SUSEINFO messages from pause/unpause/resume from xl command. They are intended for libvirt logging, but lacked info about execution context. Remove extra logging about dirty pages in each iteration, the number of transferred pages + protocol overhead is already reported elsewhere.- Remove libxl.libxl__domain_pvcontrol.patch It is already part of 4.14.0-rc1- bsc#1178591 - VUL-0: CVE-2020-28368: xen: Intel RAPL sidechannel attack aka PLATYPUS attack aka XSA-351 xsa351-1.patch xsa351-2.patch xsa351-3.patch- bsc#1177950 - adjust help for --max_iters, default is 5 libxl.set-migration-constraints-from-cmdline.patch- jsc#SLE-16899 - improve performance of live migration remove allocations and memcpy from hotpaths on sending and receiving side to get more throughput on 10Gbs+ connections libxc-sr-3cccdae45242dab27198b8e150be0c85acd5d3c9.patch libxc-sr-add-xc_is_known_page_type.patch libxc-sr-arrays.patch libxc-sr-batch_pfns.patch libxc-sr-page_type_has_stream_data.patch libxc-sr-readv_exact.patch libxc-sr-restore-handle_buffered_page_data.patch libxc-sr-restore-handle_incoming_page_data.patch libxc-sr-restore-map_errs.patch libxc-sr-restore-mfns.patch libxc-sr-restore-pfns.patch libxc-sr-restore-populate_pfns-mfns.patch libxc-sr-restore-populate_pfns-pfns.patch libxc-sr-restore-read_record.patch libxc-sr-restore-types.patch libxc-sr-save-errors.patch libxc-sr-save-guest_data.patch libxc-sr-save-iov.patch libxc-sr-save-local_pages.patch libxc-sr-save-mfns.patch libxc-sr-save-rec_pfns.patch libxc-sr-save-show_transfer_rate.patch libxc-sr-save-types.patch libxc-sr-use-xc_is_known_page_type.patch adjust libxc.sr.superpage.patch adjust libxc.migrate_tracking.patch- Upstream bug fixes (bsc#1027519) 5f479d9e-x86-begin-to-support-MSR_ARCH_CAPS.patch 5f4cf06e-x86-Dom0-expose-MSR_ARCH_CAPS.patch 5f4cf96a-x86-PV-fix-SEGBASE_GS_USER_SEL.patch 5f560c42-x86-PV-rewrite-segment-ctxt-switch.patch 5f5b6b7a-hypfs-fix-custom-param-writes.patch 5f607915-x86-HVM-more-consistent-IO-completion.patch 5f6cfb5b-x86-PV-dont-GP-for-SYSENTER-with-NT-set.patch 5f6cfb5b-x86-PV-dont-clobber-NT-on-return-to-guest.patch 5f71a21e-x86-S3-fix-shadow-stack-resume.patch 5f76ca65-evtchn-Flask-prealloc-for-send.patch 5f76caaf-evtchn-FIFO-use-stable-fields.patch 5f897c25-x86-traps-fix-read_registers-for-DF.patch 5f897c7b-x86-smpboot-restrict-memguard_guard_stack.patch - Renamed patches 5f560c42-x86-PV-64bit-segbase-consistency.patch Replaces 5f5b6951-x86-PV-64bit-segbase-consistency.patch 5f6a002d-x86-PV-handle-MSR_MISC_ENABLE-correctly.patch Replaces 5f6a05a0-pv-Handle-the-Intel-specific-MSR_MISC_ENABLE-correctly.patch 5f6a0049-memory-dont-skip-RCU-unlock-in-acquire_resource.patch Replaces 5f6a05b7-xen-memory-Dont-skip-the-RCU-unlock-path-in-acquire_resource.patch 5f6a0067-x86-vPT-fix-race-when-migrating-timers.patch Replaces 5f6a05dd-vpt-fix-race-when-migrating-timers-between-vCPUs.patch 5f6a008e-x86-MSI-drop-read_msi_msg.patch Replaces 5f6a05fa-msi-get-rid-of-read_msi_msg.patch 5f6a00aa-x86-MSI-X-restrict-reading-of-PBA-bases.patch Replaces 5f6a061a-MSI-X-restrict-reading-of-table-PBA-bases-from-BARs.patch 5f6a00c4-evtchn-relax-port_is_valid.patch Replaces 5f6a062c-evtchn-relax-port_is_valid.patch 5f6a00df-x86-PV-avoid-double-exception-injection.patch Replaces 5f6a065c-pv-Avoid-double-exception-injection.patch 5f6a00f4-evtchn-add-missing-barriers.patch Replaces 5f6a0674-xen-evtchn-Add-missing-barriers-when-accessing-allocating-an-event-channel.patch 5f6a0111-evtchn-x86-enforce-correct-upper-limit.patch Replaces 5f6a068e-evtchn-x86-enforce-correct-upper-limit-for-32-bit-guests.patch 5f6a013f-evtchn_reset-shouldnt-succeed-with.patch Replaces 5f6a06be-evtchn-evtchn_reset-shouldnt-succeed-with-still-open-ports.patch 5f6a0160-evtchn-IRQ-safe-per-channel-lock.patch Replaces 5f6a06e0-evtchn-convert-per-channel-lock-to-be-IRQ-safe.patch 5f6a0178-evtchn-address-races-with-evtchn_reset.patch Replaces 5f6a06f2-evtchn-address-races-with-evtchn_reset.patch 5f6a01a4-evtchn-preempt-in-evtchn_destroy.patch Replaces 5f6a071f-evtchn-arrange-for-preemption-in-evtchn_destroy.patch 5f6a01c6-evtchn-preempt-in-evtchn_reset.patch Replaces 5f6a0754-evtchn-arrange-for-preemption-in-evtchn_reset.patch- bsc#1177409 - VUL-0: CVE-2020-27674: xen: x86 PV guest INVLPG-like flushes may leave stale TLB entries (XSA-286) xsa286-1.patch xsa286-2.patch xsa286-3.patch xsa286-4.patch xsa286-5.patch xsa286-6.patch - bsc#1177412 - VUL-0: CVE-2020-27672: xen: Race condition in Xen mapping code (XSA-345) 5f8ed5d3-x86-mm-map_pages_to_xen-single-exit-path.patch 5f8ed5eb-x86-mm-modify_xen_mappings-one-exit-path.patch 5f8ed603-x86-mm-prevent-races-in-mapping-updates.patch - bsc#1177413 - VUL-0: CVE-2020-27671: xen: undue deferral of IOMMU TLB flushes (XSA-346) 5f8ed635-IOMMU-suppress-iommu_dont_flush_iotlb-when.patch 5f8ed64c-IOMMU-hold-page-ref-until-TLB-flush.patch - bsc#1177414 - VUL-0: CVE-2020-27670: xen: unsafe AMD IOMMU page table updates (XSA-347) 5f8ed682-AMD-IOMMU-convert-amd_iommu_pte.patch 5f8ed69c-AMD-IOMMU-update-live-PTEs-atomically.patch 5f8ed6b0-AMD-IOMMU-suitably-order-DTE-mods.patch- Update libxc.sr.superpage.patch set errno in x86_hvm_alloc_4k (bsc#1177112)- bsc#1176339 - VUL-0: CVE-2020-25602: xen: x86 pv: Crash when handling guest access to MSR_MISC_ENABLE (XSA-333) 5f6a05a0-pv-Handle-the-Intel-specific-MSR_MISC_ENABLE-correctly.patch - bsc#1176341 - VUL-0: CVE-2020-25598: xen: Missing unlock in XENMEM_acquire_resource error path (XSA-334) 5f6a05b7-xen-memory-Dont-skip-the-RCU-unlock-path-in-acquire_resource.patch - bsc#1176343 - VUL-0: CVE-2020-25604: xen: race when migrating timers between x86 HVM vCPU-s (XSA-336) 5f6a05dd-vpt-fix-race-when-migrating-timers-between-vCPUs.patch - bsc#1176344 - VUL-0: CVE-2020-25595: xen: PCI passthrough code reading back hardware registers (XSA-337) 5f6a05fa-msi-get-rid-of-read_msi_msg.patch 5f6a061a-MSI-X-restrict-reading-of-table-PBA-bases-from-BARs.patch - bsc#1176346 - VUL-0: CVE-2020-25597: xen: once valid event channels may not turn invalid (XSA-338) 5f6a062c-evtchn-relax-port_is_valid.patch - bsc#1176345 - VUL-0: CVE-2020-25596: xen: x86 pv guest kernel DoS via SYSENTER (XSA-339) 5f6a065c-pv-Avoid-double-exception-injection.patch - bsc#1176347 - VUL-0: CVE-2020-25603: xen: Missing barrier barriers when accessing/allocating an event channel (XSA-340) 5f6a0674-xen-evtchn-Add-missing-barriers-when-accessing-allocating-an-event-channel.patch - bsc#1176348 - VUL-0: CVE-2020-25600: xen: out of bounds event channels available to 32-bit x86 domains (XSA-342) 5f6a068e-evtchn-x86-enforce-correct-upper-limit-for-32-bit-guests.patch - bsc#1176349 - VUL-0: CVE-2020-25599: xen: races with evtchn_reset() (XSA-343) 5f6a06be-evtchn-evtchn_reset-shouldnt-succeed-with-still-open-ports.patch 5f6a06e0-evtchn-convert-per-channel-lock-to-be-IRQ-safe.patch 5f6a06f2-evtchn-address-races-with-evtchn_reset.patch - bsc#1176350 - VUL-0: CVE-2020-25601: xen: lack of preemption in evtchn_reset() / evtchn_destroy() (XSA-344) 5f6a071f-evtchn-arrange-for-preemption-in-evtchn_destroy.patch 5f6a0754-evtchn-arrange-for-preemption-in-evtchn_reset.patch - Upstream bug fix (bsc#1027519) 5f5b6951-x86-PV-64bit-segbase-consistency.patch- Fix problems in xen.spec with building on aarch64- Make use of %service_del_postun_without_restart while preserving the old behavior for older distros. - In %post tools, remove unnecessary qemu symlinks.- Fix error in xen-tools %post when linking pvgrub64.bin - Make paths below libexec more explicit - Create symlink also for pvgrub32.bin- Revert previous libexec change for qemu compat wrapper The path is used in existing domU.xml files in the emulator field - Escape some % chars in xen.spec, they have to appear verbatim- Enhance libxc.migrate_tracking.patch Print number of allocated pages on sending side, this is more accurate than p2m_size.- jsc#SLE-15926 - Dev: XEN: drop netware support Dropped the following patches pygrub-netware-xnloader.patch xnloader.py Refreshed pygrub-boot-legacy-sles.patch- Fix build on aarch64 with gcc10 - Package xenhypfs for aarch64- Correct license name * GPL-3.0+ is now GPL-3.0-or-later- Upstream bug fixes (bsc#1027519) 5f1a9916-x86-S3-put-data-sregs-into-known-state.patch 5f21b9fd-x86-cpuid-APIC-bit-clearing.patch- Update to Xen 4.14.0 FCS release xen-4.14.0-testing-src.tar.bz2 * Linux stubdomains (contributed by QUBES OS) * Control-flow Enforcement Technology (CET) Shadow Stack support (contributed by Citrix) * Lightweight VM fork for fuzzing / introspection. (contributed by Intel) * Livepatch: buildid and hotpatch stack requirements * CONFIG_PV32 * Hypervisor FS support * Running Xen as a Hyper-V Guest * Domain ID randomization, persistence across save / restore * Golang binding autogeneration * KDD support for Windows 7, 8.x and 10 - Dropped patches contained in new tarball 5eb51be6-cpupool-fix-removing-cpu-from-pool.patch 5eb51caa-sched-vcpu-pause-flags-atomic.patch 5ec2a760-x86-determine-MXCSR-mask-always.patch 5ec50b05-x86-idle-rework-C6-EOI-workaround.patch 5ec7dcaa-x86-dont-enter-C6-with-in-service-intr.patch 5ec7dcf6-x86-dont-enter-C3-C6-with-errata.patch 5ec82237-x86-extend-ISR-C6-workaround-to-Haswell.patch 5ece1b91-x86-clear-RDRAND-CPUID-bit-on-AMD-fam-15-16.patch 5ece8ac4-x86-load_system_tables-NMI-MC-safe.patch 5ed69804-x86-ucode-fix-start-end-update.patch 5eda60cb-SVM-split-recalc-NPT-fault-handling.patch 5edf6ad8-ioreq-pending-emulation-server-destruction-race.patch 5edfbbea-x86-spec-ctrl-CPUID-MSR-defs-for-SRBDS.patch 5edfbbea-x86-spec-ctrl-mitigate-SRBDS.patch 5ee24d0e-x86-spec-ctrl-document-SRBDS-workaround.patch xsa317.patch xsa319.patch xsa321-1.patch xsa321-2.patch xsa321-3.patch xsa321-4.patch xsa321-5.patch xsa321-6.patch xsa321-7.patch xsa328-1.patch xsa328-2.patch- bsc#1172356 - Not able to hot-plug NIC via virt-manager, asks to attach on next reboot while it should be live attached ignore-ip-command-script-errors.patch- Enhance libxc.migrate_tracking.patch After transfer of domU memory, the target host has to assemble the backend devices. Track the time prior xc_domain_unpause.- Add libxc.migrate_tracking.patch to track live migrations unconditionally in logfiles, especially in libvirt. This will track how long a domU was suspended during transit.- bsc#1173376 - VUL-0: CVE-2020-15566: xen: XSA-317 - Incorrect error handling in event channel port allocation xsa317.patch - bsc#1173377 - VUL-0: CVE-2020-15563: xen: XSA-319 - inverted code paths in x86 dirty VRAM tracking xsa319.patch - bsc#1173378 - VUL-0: CVE-2020-15565: xen: XSA-321 - insufficient cache write- back under VT-d xsa321-1.patch xsa321-2.patch xsa321-3.patch xsa321-4.patch xsa321-5.patch xsa321-6.patch xsa321-7.patch - bsc#1173380 - VUL-0: CVE-2020-15567: xen: XSA-328 - non-atomic modification of live EPT PTE xsa328-1.patch xsa328-2.patch- bsc#1172205 - VUL-0: CVE-2020-0543: xen: Special Register Buffer Data Sampling (SRBDS) aka "CrossTalk" (XSA-320) 5ee24d0e-x86-spec-ctrl-document-SRBDS-workaround.patch 5edfbbea-x86-spec-ctrl-CPUID-MSR-defs-for-SRBDS.patch (Replaces xsa320-1.patch) 5edfbbea-x86-spec-ctrl-mitigate-SRBDS.patch (Replaces xsa320-2.patch) - Upstream bug fixes (bsc#1027519) 5ec50b05-x86-idle-rework-C6-EOI-workaround.patch 5ec7dcaa-x86-dont-enter-C6-with-in-service-intr.patch 5ec7dcf6-x86-dont-enter-C3-C6-with-errata.patch 5ec82237-x86-extend-ISR-C6-workaround-to-Haswell.patch 5ece1b91-x86-clear-RDRAND-CPUID-bit-on-AMD-fam-15-16.patch 5ece8ac4-x86-load_system_tables-NMI-MC-safe.patch 5ed69804-x86-ucode-fix-start-end-update.patch 5eda60cb-SVM-split-recalc-NPT-fault-handling.patch 5edf6ad8-ioreq-pending-emulation-server-destruction-race.patch- Fixes for %_libexecdir changing to /usr/libexec- bsc#1172205 - VUL-0: CVE-2020-0543: xen: Special Register Buffer Data Sampling (SRBDS) aka "CrossTalk" (XSA-320) xsa320-1.patch xsa320-2.patch- Update to Xen 4.13.1 bug fix release (bsc#1027519) xen-4.13.1-testing-src.tar.bz2 5eb51be6-cpupool-fix-removing-cpu-from-pool.patch 5eb51caa-sched-vcpu-pause-flags-atomic.patch 5ec2a760-x86-determine-MXCSR-mask-always.patch - Drop patches contained in new tarball 5de65f84-gnttab-map-always-do-IOMMU-part.patch 5de65fc4-x86-avoid-HPET-use-on-certain-Intel.patch 5e15e03d-sched-fix-S3-resume-with-smt=0.patch 5e16fb6a-x86-clear-per-cpu-stub-page-info.patch 5e1da013-IRQ-u16-is-too-narrow-for-evtchn.patch 5e1dcedd-Arm-place-speculation-barrier-after-ERET.patch 5e21ce98-x86-time-update-TSC-stamp-after-deep-C-state.patch 5e286cce-VT-d-dont-pass-bridges-to-domain_context_mapping_one.patch 5e318cd4-x86-apic-fix-disabling-LVT0.patch 5e344c11-x86-HVM-relinquish-resources-from-domain_destroy.patch 5e3bd385-EFI-recheck-variable-name-strings.patch 5e3bd3d1-EFI-dont-leak-heap-VIA-XEN_EFI_get_next_variable_name.patch 5e3bd3f8-xmalloc-guard-against-overflow.patch 5e46e090-x86-smp-reset-x2apic_enabled-in-smp_send_stop.patch 5e4c00ef-VT-d-check-full-RMRR-for-E820-reserved.patch 5e4d4f5b-sched-fix-get_cpu_idle_time-with-core-sched.patch 5e4e614d-x86-spec-ctrl-no-xen-also-disables-branch-hardening.patch 5e4ec20e-x86-virtualise-MSR_PLATFORM_ID-properly.patch 5e5e7188-fix-error-path-in-cpupool_unassign_cpu_start.patch 5e6f53dd-AMD-IOMMU-fix-off-by-one-get_paging_mode.patch 5e7a371c-sched-fix-cpu-onlining-with-core-sched.patch 5e7c90cf-sched-fix-cpu-offlining-with-core-sched.patch 5e7cfb29-x86-ucode-AMD-fix-assert-in-compare_patch.patch 5e7cfb29-x86-ucode-fix-error-paths-in-apply_microcode.patch 5e7dd83b-libx86-CPUID-fix-not-just-leaf-7.patch 5e7dfbf6-x86-ucode-AMD-potential-buffer-overrun-equiv-tab.patch 5e846cce-x86-HVM-fix-AMD-ECS-handling-for-Fam10.patch 5e84905c-x86-ucode-AMD-fix-more-potential-buffer-overruns.patch 5e86f7b7-credit2-avoid-vCPUs-with-lower-creds-than-idle.patch 5e86f7fd-credit2-fix-credit-too-few-resets.patch 5e876b0f-tools-xenstore-fix-use-after-free-in-xenstored.patch 5e95ad61-xenoprof-clear-buffer-intended-to-be-shared-with-guests.patch 5e95ad8f-xenoprof-limit-consumption-of-shared-buffer-data.patch 5e95ae77-Add-missing-memory-barrier-in-the-unlock-path-of-rwlock.patch 5e95af5e-xen-gnttab-Fix-error-path-in-map_grant_ref.patch 5e95afb8-gnttab-fix-GNTTABOP_copy-continuation-handling.patch- spec: Remove invocation of autogen.sh - spec: Recommend qemu-ovmf-x86_64 to provide UEFI firmwares- bsc#1170968 - GCC 10: xen build fails on i586 gcc10-fixes.patch- bsc#1169392 - VUL-0: CVE-2020-11742: xen: Bad continuation handling in GNTTABOP_copy (XSA-318) 5e95afb8-gnttab-fix-GNTTABOP_copy-continuation-handling.patch- bsc#1168140 - VUL-0: CVE-2020-11740, CVE-2020-11741: xen: XSA-313 multiple xenoprof issues 5e95ad61-xenoprof-clear-buffer-intended-to-be-shared-with-guests.patch 5e95ad8f-xenoprof-limit-consumption-of-shared-buffer-data.patch - bsc#1168142 - VUL-0: CVE-2020-11739: xen: XSA-314 - Missing memory barriers in read-write unlock paths 5e95ae77-Add-missing-memory-barrier-in-the-unlock-path-of-rwlock.patch - bsc#1168143 - VUL-0: CVE-2020-11743: xen: XSA-316 - Bad error path in GNTTABOP_map_grant 5e95af5e-xen-gnttab-Fix-error-path-in-map_grant_ref.patch - bsc#1167152 - L3: Xenstored Crashed during VM install Need Core analyzed 5e876b0f-tools-xenstore-fix-use-after-free-in-xenstored.patch - bsc#1165206 - Xen 4.12 DomU hang / freeze / stall / NMI watchdog bug soft lockup CPU #0 stuck under high load / upstream with workaround. See also bsc#1134506 5e86f7b7-credit2-avoid-vCPUs-with-lower-creds-than-idle.patch 5e86f7fd-credit2-fix-credit-too-few-resets.patch - Drop for upstream solution (bsc#1165206) 01-xen-credit2-avoid-vcpus-to.patch default-to-credit1-scheduler.patch - Upstream bug fixes (bsc#1027519) 5e4ec20e-x86-virtualise-MSR_PLATFORM_ID-properly.patch 5e5e7188-fix-error-path-in-cpupool_unassign_cpu_start.patch 5e6f53dd-AMD-IOMMU-fix-off-by-one-get_paging_mode.patch 5e7a371c-sched-fix-cpu-onlining-with-core-sched.patch 5e7c90cf-sched-fix-cpu-offlining-with-core-sched.patch 5e7cfb29-x86-ucode-AMD-fix-assert-in-compare_patch.patch 5e7cfb29-x86-ucode-fix-error-paths-in-apply_microcode.patch 5e7dd83b-libx86-CPUID-fix-not-just-leaf-7.patch 5e7dfbf6-x86-ucode-AMD-potential-buffer-overrun-equiv-tab.patch 5e846cce-x86-HVM-fix-AMD-ECS-handling-for-Fam10.patch 5e84905c-x86-ucode-AMD-fix-more-potential-buffer-overruns.patch- bsc#1167608 - unbound limit for max_event_channels domUs with many vcpus and/or resources fail to start libxl.max_event_channels.patch- bsc#1161480 - Fix xl shutdown for HVM without PV drivers add libxl.libxl__domain_pvcontrol.patch- bsc#1165206 - Xen 4.12 DomU hang / freeze / stall / NMI watchdog bug soft lockup CPU #0 stuck under high load / upstream with workaround. See also bsc#1134506 01-xen-credit2-avoid-vcpus-to.patch- bsc#1158414 - GCC 10: xen build fails gcc10-fixes.patch- bsc#1165206 - Xen 4.12 DomU hang / freeze / stall / NMI watchdog bug soft lockup CPU #0 stuck under high load / upstream with workaround. See also bsc#1134506 default-to-credit1-scheduler.patch- bsc#1160932 - VUL-0: xen: XSA-312 v1: arm: a CPU may speculate past the ERET instruction 5e1dcedd-Arm-place-speculation-barrier-after-ERET.patch - bsc#1164425 - x86: "spec-ctrl=no-xen" should also disable branch hardening 5e4e614d-x86-spec-ctrl-no-xen-also-disables-branch-hardening.patch - Upstream bug fixes (bsc#1027519) 5e21ce98-x86-time-update-TSC-stamp-after-deep-C-state.patch 5e286cce-VT-d-dont-pass-bridges-to-domain_context_mapping_one.patch 5e318cd4-x86-apic-fix-disabling-LVT0.patch 5e344c11-x86-HVM-relinquish-resources-from-domain_destroy.patch 5e3bd385-EFI-recheck-variable-name-strings.patch 5e3bd3d1-EFI-dont-leak-heap-VIA-XEN_EFI_get_next_variable_name.patch 5e3bd3f8-xmalloc-guard-against-overflow.patch 5e46e090-x86-smp-reset-x2apic_enabled-in-smp_send_stop.patch 5e4c00ef-VT-d-check-full-RMRR-for-E820-reserved.patch 5e4d4f5b-sched-fix-get_cpu_idle_time-with-core-sched.patch- bsc#1159755 - use fixed qemu-3.1 machine type for HVM This must be done in qemu to preserve PCI layout remove libxl.lock-qemu-machine-for-hvm.patch- jsc#SLE-10183 - script to calculate cpuid= mask add helper script from https://github.com/twizted/xen_maskcalc domUs may be migrated between different cpus from the same vendor if their visible cpuid value has incompatible feature bits masked.- jsc#SLE-10172, bsc#1055731 - handle degraded raid for xendomains add helper script and systemd service from https://github.com/luizluca/xen-tools-xendomains-wait-disk in new sub package xen-tools-xendomains-wait-disk See included README for usage instructions xendomains-wait-disks.LICENSE xendomains-wait-disks.README.md xendomains-wait-disks.sh- bsc#1159755 - use fixed qemu-3.1 machine type for HVM qemu4 introduced incompatible changes in pc-i440fx, which revealed a design bug in 'xenfv'. Live migration from domUs started with qemu versions prior qemu4 can not be received with qemu4+. libxl.lock-qemu-machine-for-hvm.patch- Upstream bug fixes (bsc#1027519) 5de65f84-gnttab-map-always-do-IOMMU-part.patch 5de65fc4-x86-avoid-HPET-use-on-certain-Intel.patch 5e15e03d-sched-fix-S3-resume-with-smt=0.patch 5e16fb6a-x86-clear-per-cpu-stub-page-info.patch 5e1da013-IRQ-u16-is-too-narrow-for-evtchn.patch- BuildRequire pkgconfig(libsystemd) instead of systemd-devel: Allow OBS to shortcut through the -mini flavors.- bsc#1159320 - Xen logrotate file needs updated logrotate.conf- Update to Xen 4.13.0 FCS release xen-4.13.0-testing-src.tar.bz2 * Core Scheduling (contributed by SUSE) * Branch hardening to mitigate against Spectre v1 (contributed by Citrix) * Late uCode loading (contributed by Intel) * Improved live-patching build tools (contributed by AWS) * OP-TEE support (contributed by EPAM) * Renesas R-CAR IPMMU-VMSA driver (contributed by EPAM) * Dom0-less passthrough and ImageBuilder (contributed by XILINX) * Support for new Hardware- Update to Xen 4.13.0 RC4 release xen-4.13.0-testing-src.tar.bz2 - Rebase libxl.pvscsi.patch- Update to Xen 4.13.0 RC3 release xen-4.13.0-testing-src.tar.bz2 - Drop python38-build.patch- Update to Xen 4.13.0 RC2 release xen-4.13.0-testing-src.tar.bz2- Add python38-build.patch fixing build with Python 3.8 (add - -embed to python-config call)- Update to Xen 4.13.0 RC1 release xen-4.13.0-testing-src.tar.bz2 - Drop patches contained in new tarball or invalid 5ca7660f-x86-entry-drop-unused-includes.patch 5cab2a6b-x86-ACPI-also-parse-AMD-tables-early.patch 5cab2ab7-x86-IOMMU-introduce-init-ops.patch 5cab2ae8-x86-IOMMU-abstract-iommu_supports_eim.patch 5cab2b4e-x86-IOMMU-abstract-iommu_enable_x2apic_IR.patch 5cab2b95-x86-IOMMU-initialize-iommu_ops-in.patch 5cac9a4b-x86-IOMMU-abstract-adjust_vtd_irq_affinities.patch 5cdeac7f-AMD-IOMMU-adjust-IOMMU-list-head-init.patch 5cf8da09-adjust-sysdom-creation-call-earlier-on-x86.patch 5d0cf4e4-AMD-IOMMU-initialize-IRQ-tasklet-once.patch 5d149bb0-AMD-IOMMU-dont-add-IOMMUs.patch 5d1b3fab-AMD-IOMMU-restrict-feature-logging.patch 5d358508-x86-IRQ-desc-affinity-represents-request.patch 5d358534-x86-IRQ-consolidate-arch-cpu_mask-use.patch 5d358a67-AMD-IOMMU-pass-IOMMU-to-iterate_ivrs_entries-cb.patch 5d358a92-AMD-IOMMU-pass-IOMMU-to-amd_iommu_alloc_intremap_table.patch 5d39811c-x86-IOMMU-dont-restrict-IRQ-affinities.patch 5d417813-AMD-IOMMU-bitfield-extended-features.patch 5d417838-AMD-IOMMU-bitfield-control-reg.patch 5d41785b-AMD-IOMMU-bitfield-IRTE.patch 5d41787e-AMD-IOMMU-pass-IOMMU-to-gfu-intremap-entry.patch 5d4178ad-AMD-IOMMU-128bit-non-guest-APIC-IRTE.patch 5d4178fc-AMD-IOMMU-split-amd_iommu_init_one.patch 5d41793f-AMD-IOMMU-allow-enabling-without-IRQ.patch 5d417a16-AMD-IOMMU-adjust-IRQ-setup-for-x2APIC.patch 5d417ab6-AMD-IOMMU-enable-x2APIC-mode.patch 5d417b38-AMD-IOMMU-correct-IRTE-updating.patch 5d417b6a-AMD-IOMMU-dont-needlessly-log-headers.patch 5d419d49-x86-spec-ctrl-report-proper-status.patch 5d43253c-x86-ucode-always-collect_cpu_info-at-boot.patch 5d4a9d25-AMD-IOMMU-drop-not-found-message.patch 5d4aa36f-x86-apic-enable-x2APIC-mode-earlier.patch 5d4afa7a-credit2-fix-memory-leak.patch 5d4d850a-introduce-bss-percpu-page-aligned.patch 5d516531-x86-xpti-dont-leak-TSS-adjacent-data.patch 5d5bf475-x86-PV-fix-handling-of-iommu-mappings.patch 5d6524ca-x86-mm-correctly-init-M2P-entries.patch 5d67ceaf-x86-properly-gate-PKU-clearing.patch 5d70bfba-x86-shadow-dont-enable-with-too-small-allocation.patch 5d779811-x86-fix-CPUID7-0-eax-levelling-MSR.patch 5d77b40f-fix-hvm_all_ioreq_servers_add_vcpu-cleanup.patch 5d80e7c0-AMD-IOMMU-free-shared-IRT-once.patch 5d80e80d-AMD-IOMMU-valid-flag-for-IVRS-mappings.patch 5d80e82e-AMD-IOMMU-alloc_intremap_table-callers-handle-errors.patch 5d80e857-x86-PCI-read-MSI-X-table-entry-count-early.patch 5d80ea13-vpci-honor-read-only-devices.patch 5d89d8d9-libxc-x86-avoid-overflow-in-CPUID-APIC-ID.patch 5d8b715f-ACPI-cpuidle-bump-max-num-of-states.patch 5d8b72e5-AMD-IOMMU-dont-blindly-alloc-intremap-tables.patch 5d8b730e-AMD-IOMMU-phantom-funcs-share-intremap-tables.patch 5d8b733b-x86-PCI-read-max-MSI-vector-count-early.patch 5d8b736d-AMD-IOMMU-replace-INTREMAP_ENTRIES.patch 5d8b7393-AMD-IOMMU-restrict-intremap-table-sizes.patch 5d9ee2a8-AMD-IOMMU-alloc-1-devtab-per-PCI-seg.patch 5d9ee2f0-AMD-IOMMU-allocate_buffer-avoid-memset.patch 5d9ee312-AMD-IOMMU-prefill-all-DTEs.patch CVE-2014-0222-blktap-qcow1-validate-l2-table-size.patch blktap2-no-uninit.patch libxl.prepare-environment-for-domcreate_stream_done.patch pygrub-python3-conversion.patch fix-xenpvnetboot.patch- bsc#1135799 - Partner-L3: Xen crashes on AMD ROME based machines 5d9ee2a8-AMD-IOMMU-alloc-1-devtab-per-PCI-seg.patch 5d9ee2f0-AMD-IOMMU-allocate_buffer-avoid-memset.patch 5d9ee312-AMD-IOMMU-prefill-all-DTEs.patch- bsc#1120095 - add code to change LIBXL_HOTPLUG_TIMEOUT at runtime The included README has details about the impact of this change libxl.LIBXL_HOTPLUG_TIMEOUT.patch- bsc#1135799 - Partner-L3: Xen crashes on AMD ROME based machines 5ca7660f-x86-entry-drop-unused-includes.patch 5cf8da09-adjust-sysdom-creation-call-earlier-on-x86.patch 5cab2a6b-x86-ACPI-also-parse-AMD-tables-early.patch 5cab2ab7-x86-IOMMU-introduce-init-ops.patch 5cab2ae8-x86-IOMMU-abstract-iommu_supports_eim.patch 5cab2b4e-x86-IOMMU-abstract-iommu_enable_x2apic_IR.patch 5cab2b95-x86-IOMMU-initialize-iommu_ops-in.patch 5cac9a4b-x86-IOMMU-abstract-adjust_vtd_irq_affinities.patch 5cdeac7f-AMD-IOMMU-adjust-IOMMU-list-head-init.patch 5d0cf4e4-AMD-IOMMU-initialize-IRQ-tasklet-once.patch 5d149bb0-AMD-IOMMU-dont-add-IOMMUs.patch 5d1b3fab-AMD-IOMMU-restrict-feature-logging.patch 5d358508-x86-IRQ-desc-affinity-represents-request.patch 5d358534-x86-IRQ-consolidate-arch-cpu_mask-use.patch 5d358a67-AMD-IOMMU-pass-IOMMU-to-iterate_ivrs_entries-cb.patch 5d358a92-AMD-IOMMU-pass-IOMMU-to-amd_iommu_alloc_intremap_table.patch 5d39811c-x86-IOMMU-dont-restrict-IRQ-affinities.patch 5d417813-AMD-IOMMU-bitfield-extended-features.patch 5d417838-AMD-IOMMU-bitfield-control-reg.patch 5d41785b-AMD-IOMMU-bitfield-IRTE.patch 5d41787e-AMD-IOMMU-pass-IOMMU-to-gfu-intremap-entry.patch 5d4178ad-AMD-IOMMU-128bit-non-guest-APIC-IRTE.patch 5d4178fc-AMD-IOMMU-split-amd_iommu_init_one.patch 5d41793f-AMD-IOMMU-allow-enabling-without-IRQ.patch 5d417a16-AMD-IOMMU-adjust-IRQ-setup-for-x2APIC.patch 5d417ab6-AMD-IOMMU-enable-x2APIC-mode.patch 5d417b38-AMD-IOMMU-correct-IRTE-updating.patch 5d417b6a-AMD-IOMMU-dont-needlessly-log-headers.patch 5d4a9d25-AMD-IOMMU-drop-not-found-message.patch 5d80e7c0-AMD-IOMMU-free-shared-IRT-once.patch 5d80e80d-AMD-IOMMU-valid-flag-for-IVRS-mappings.patch 5d80e82e-AMD-IOMMU-alloc_intremap_table-callers-handle-errors.patch 5d80e857-x86-PCI-read-MSI-X-table-entry-count-early.patch 5d8b72e5-AMD-IOMMU-dont-blindly-alloc-intremap-tables.patch 5d8b730e-AMD-IOMMU-phantom-funcs-share-intremap-tables.patch 5d8b733b-x86-PCI-read-max-MSI-vector-count-early.patch 5d8b736d-AMD-IOMMU-replace-INTREMAP_ENTRIES.patch 5d8b7393-AMD-IOMMU-restrict-intremap-table-sizes.patch - bsc#1145240 - [Migration]Can't pre-allocate 1 shadow pages 5d70bfba-x86-shadow-dont-enable-with-too-small-allocation.patch - bsc#1137717 - [HPS Bug] Unable to install Windows Server 2016 with 2 CPUs setting (or above) under SLES12 SP4 Xen Server on AMD ROME platform 5d89d8d9-libxc-x86-avoid-overflow-in-CPUID-APIC-ID.patch - Upstream bug fixes (bsc#1027519) 5d67ceaf-x86-properly-gate-PKU-clearing.patch 5d779811-x86-fix-CPUID7-0-eax-levelling-MSR.patch 5d77b40f-fix-hvm_all_ioreq_servers_add_vcpu-cleanup.patch 5d80ea13-vpci-honor-read-only-devices.patch 5d8b715f-ACPI-cpuidle-bump-max-num-of-states.patch- bsc#1145774 - Libivrtd segfaults when trying to live migrate a VM Fix crash in an error path of libxl_domain_suspend with libxl.helper_done-crash.patch- Upstream bug fixes (bsc#1027519) 5d419d49-x86-spec-ctrl-report-proper-status.patch 5d43253c-x86-ucode-always-collect_cpu_info-at-boot.patch 5d4aa36f-x86-apic-enable-x2APIC-mode-earlier.patch 5d4afa7a-credit2-fix-memory-leak.patch 5d4d850a-introduce-bss-percpu-page-aligned.patch 5d516531-x86-xpti-dont-leak-TSS-adjacent-data.patch 5d5bf475-x86-PV-fix-handling-of-iommu-mappings.patch 5d6524ca-x86-mm-correctly-init-M2P-entries.patch - Drop 5d419d49-x86-spec-ctrl-facilities-report-wrong-status.patch- Preserve modified files which used to be marked as %config, rename file.rpmsave to file- Update to Xen 4.12.1 bug fix release (bsc#1027519) xen-4.12.1-testing-src.tar.bz2 - Drop patches contained in new tarball 5c87b644-IOMMU-leave-enabled-for-kexec-crash.patch 5c87b6a2-x86-HVM-dont-crash-guest-in-find_mmio_cache.patch 5c87b6c8-drop-arch_evtchn_inject.patch 5c87b6e8-avoid-atomic-rmw-accesses-in-map_vcpu_info.patch 5c87e6d1-x86-TSX-controls-for-RTM-force-abort-mode.patch 5c8f752c-x86-e820-build-with-gcc9.patch 5c8fb92d-x86-HVM-split-linear-reads-and-writes.patch 5c8fb951-x86-HVM-finish-IOREQs-correctly-on-completion.patch 5c8fc6c0-x86-MSR-shorten-ARCH_CAPABILITIES.patch 5c8fc6c0-x86-SC-retpoline-safety-calculations-for-eIBRS.patch 5c9e63c5-credit2-SMT-idle-handling.patch 5ca46b68-x86emul-no-GPR-update-upon-AVX-gather-failures.patch 5ca773d1-x86emul-dont-read-mask-reg-without-AVX512F.patch 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch 5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch 5cd921fb-trace-fix-build-with-gcc9.patch 5cd9224b-AMD-IOMMU-disable-upon-init-fail.patch 5cd922c5-x86-MTRR-recalc-p2mt-when-iocaps.patch 5cd9230f-VMX-correctly-get-GS_SHADOW-for-current.patch 5cd926d0-bitmap_fill-zero-sized.patch 5cd92724-drivers-video-drop-constraints.patch 5cd93a69-x86-MSR_INTEL_CORE_THREAD_COUNT.patch 5cd93a69-x86-boot-detect-Intel-SMT-correctly.patch 5cd93a69-x86-spec-ctrl-reposition-XPTI-parsing.patch 5cd981ff-x86-IRQ-tracing-avoid-UB-or-worse.patch 5cdad090-x86-spec-ctrl-CPUID-MSR-definitions-for-MDS.patch 5cdad090-x86-spec-ctrl-infrastructure-for-VERW-flush.patch 5cdad090-x86-spec-ctrl-misc-non-functional-cleanup.patch 5cdad090-x86-spec-ctrl-opts-to-control-VERW-flush.patch 5cdeb9fd-sched-fix-csched2_deinit_pdata.patch 5ce7a92f-x86-IO-APIC-fix-build-with-gcc9.patch 5cf0f6a4-x86-vhpet-resume-avoid-small-diff.patch 5cf16e51-x86-spec-ctrl-Knights-retpoline-safe.patch 5d03a0c4-1-Arm-add-an-isb-before-reading-CNTPCT_EL0.patch 5d03a0c4-2-gnttab-rework-prototype-of-set_status.patch 5d03a0c4-3-Arm64-rewrite-bitops-in-C.patch 5d03a0c4-4-Arm32-rewrite-bitops-in-C.patch 5d03a0c4-5-Arm-bitops-consolidate-prototypes.patch 5d03a0c4-6-Arm64-cmpxchg-simplify.patch 5d03a0c4-7-Arm32-cmpxchg-simplify.patch 5d03a0c4-8-Arm-bitops-helpers-with-timeout.patch 5d03a0c4-9-Arm-cmpxchg-helper-with-timeout.patch 5d03a0c4-A-Arm-turn-on-SILO-mode-by-default.patch 5d03a0c4-B-bitops-guest-helpers.patch 5d03a0c4-C-cmpxchg-guest-helpers.patch 5d03a0c4-D-use-guest-atomics-helpers.patch 5d03a0c4-E-Arm-add-perf-counters-in-guest-atomic-helpers.patch 5d03a0c4-F-Arm-protect-gnttab_clear_flag.patch - Refreshed patches libxl.pvscsi.patch- bsc#1143563 - Speculative mitigation facilities report wrong status 5d419d49-x86-spec-ctrl-facilities-report-wrong-status.patch- Update xen-dom0-modules.service (bsc#1137251) Map backend module names from pvops and xenlinux kernels to a module alias. This avoids errors from modprobe about unknown modules. Ignore a few xenlinux modules that lack aliases.- Gcc9 warnings seem to be cleared up with upstream fixes. Drop gcc9-ignore-warnings.patch- bsc#1138563 - L3: xenpvnetboot improperly ported to Python 3 fix-xenpvnetboot.patch- Move /etc/modprobe.d/xen_loop.conf to /lib/modprobe.d/xen_loop.conf- Remove /etc/xen/xenapiusers and /etc/pam.d/xen-api- Remove all upstream provided files in /etc/xen They are not required at runtime. The host admin is now responsible if he really needs anything in this subdirectory.- In our effort to make /etc fully admin controlled, move /etc/xen/scripts to libexec/xen/scripts with xen-tools.etc_pollution.patch- Move /etc/bash_completion.d/xl.sh to %{_datadir}/bash-completion/completions- bsc#1138294 - VUL-0: CVE-2019-17349: XSA-295: Unlimited Arm Atomics Operations 5d03a0c4-1-Arm-add-an-isb-before-reading-CNTPCT_EL0.patch 5d03a0c4-2-gnttab-rework-prototype-of-set_status.patch 5d03a0c4-3-Arm64-rewrite-bitops-in-C.patch 5d03a0c4-4-Arm32-rewrite-bitops-in-C.patch 5d03a0c4-5-Arm-bitops-consolidate-prototypes.patch 5d03a0c4-6-Arm64-cmpxchg-simplify.patch 5d03a0c4-7-Arm32-cmpxchg-simplify.patch 5d03a0c4-8-Arm-bitops-helpers-with-timeout.patch 5d03a0c4-9-Arm-cmpxchg-helper-with-timeout.patch 5d03a0c4-A-Arm-turn-on-SILO-mode-by-default.patch 5d03a0c4-B-bitops-guest-helpers.patch 5d03a0c4-C-cmpxchg-guest-helpers.patch 5d03a0c4-D-use-guest-atomics-helpers.patch 5d03a0c4-E-Arm-add-perf-counters-in-guest-atomic-helpers.patch 5d03a0c4-F-Arm-protect-gnttab_clear_flag.patch - Upstream bug fixes (bsc#1027519) 5c87b6c8-drop-arch_evtchn_inject.patch 5c87b6e8-avoid-atomic-rmw-accesses-in-map_vcpu_info.patch 5cd921fb-trace-fix-build-with-gcc9.patch 5cd9224b-AMD-IOMMU-disable-upon-init-fail.patch 5cd922c5-x86-MTRR-recalc-p2mt-when-iocaps.patch 5cd9230f-VMX-correctly-get-GS_SHADOW-for-current.patch 5cd926d0-bitmap_fill-zero-sized.patch 5cd92724-drivers-video-drop-constraints.patch 5cd93a69-x86-spec-ctrl-reposition-XPTI-parsing.patch (Replaces xsa297-0a.patch) 5cd93a69-x86-MSR_INTEL_CORE_THREAD_COUNT.patch (Replaces xsa297-0b.patch) 5cd93a69-x86-boot-detect-Intel-SMT-correctly.patch (Replaces xsa297-0c.patch) 5cdad090-x86-spec-ctrl-misc-non-functional-cleanup.patch (Replaces xsa297-0d.patch) 5cdad090-x86-spec-ctrl-CPUID-MSR-definitions-for-MDS.patch (Replaces xsa297-1.patch) 5cdad090-x86-spec-ctrl-infrastructure-for-VERW-flush.patch (Replaces xsa297-2.patch) 5cdad090-x86-spec-ctrl-opts-to-control-VERW-flush.patch (Replaces xsa297-3.patch) 5cd981ff-x86-IRQ-tracing-avoid-UB-or-worse.patch 5cdeb9fd-sched-fix-csched2_deinit_pdata.patch 5ce7a92f-x86-IO-APIC-fix-build-with-gcc9.patch 5cf0f6a4-x86-vhpet-resume-avoid-small-diff.patch 5cf16e51-x86-spec-ctrl-Knights-retpoline-safe.patch- Fix some outdated information in the readme README.SUSE- spec: xen-tools: require matching version of xen package bsc#1137471- Remove two stale patches xen.build-compare.man.patch xenpaging.doc.patch- Disable LTO (boo#1133296).- Remove arm32 from ExclusiveArch to fix build- bsc#1111331 - VUL-0: CPU issues Q2 2019 aka "Group 4". CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 xsa297-0a.patch xsa297-0b.patch xsa297-0c.patch xsa297-0d.patch xsa297-1.patch xsa297-2.patch xsa297-3.patch - Update 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch and drop 5cac6219-xen-cpu-Fix-ARM-build-following-cs-597fbb8.patch Refresh 5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch- bsc#1131811 - [XEN] internal error: libxenlight failed to create new domain. This patch is a workaround for a systemd issue. See patch header for additional comments. xenstore-launch.patch- bsc#1125378 - [xen][pygrub] Can not restore sle11sp4 pv guest after upgrading host from sle11sp4 to sle15sp1 pygrub-python3-conversion.patch - Fix "TypeError: virDomainDefineXML() argument 2 must be str or None, not bytes" when converting VMs from using the xm/xend toolstack to the libxl/libvirt toolstack. (bsc#1123378) xen2libvirt.py- bsc#1124560 - Fully virtualized guests crash on boot 5cac6cba-vmx-Fixup-removals-of-MSR-load-save-list-entries.patch - bsc#1121391 - GCC 9: xen build fails 5c8f752c-x86-e820-build-with-gcc9.patch - Upstream bug fixes (bsc#1027519) 5c87b644-IOMMU-leave-enabled-for-kexec-crash.patch 5c87b6a2-x86-HVM-dont-crash-guest-in-find_mmio_cache.patch 5c87e6d1-x86-TSX-controls-for-RTM-force-abort-mode.patch 5c8fb92d-x86-HVM-split-linear-reads-and-writes.patch 5c8fb951-x86-HVM-finish-IOREQs-correctly-on-completion.patch 5c8fc6c0-x86-MSR-shorten-ARCH_CAPABILITIES.patch 5c8fc6c0-x86-SC-retpoline-safety-calculations-for-eIBRS.patch 5c9e63c5-credit2-SMT-idle-handling.patch 5ca46b68-x86emul-no-GPR-update-upon-AVX-gather-failures.patch 5ca773d1-x86emul-dont-read-mask-reg-without-AVX512F.patch 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch 5cac6219-xen-cpu-Fix-ARM-build-following-cs-597fbb8.patch- Install pkgconfig files into libdir instead of datadir- Update to Xen 4.12.0 FCS release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2 * HVM/PVH and PV only Hypervisor: The Xen 4.12 release separates the HVM/PVH and PV code paths in Xen and provides KCONFIG options to build a PV only or HVM/PVH only hypervisor. * QEMU Deprivilege (DM_RESTRICT): In Xen 4.12, this feature has been vastly improved. * Argo - Hypervisor-Mediated data eXchange: Argo is a new inter- domain communication mechanism. * Improvements to Virtual Machine Introspection: The VMI subsystem which allows detection of 0-day vulnerabilities has seen many functional and performance improvements. * Credit 2 Scheduler: The Credit2 scheduler is now the Xen Project default scheduler. * PVH Support: Grub2 boot support has been added to Xen and Grub2. * PVH Dom0: PVH Dom0 support has now been upgraded from experimental to tech preview. * The Xen 4.12 upgrade also includes improved IOMMU mapping code, which is designed to significantly improve the startup times of AMD EPYC based systems. * The upgrade also features Automatic Dom0 Sizing which allows the setting of Dom0 memory size as a percentage of host memory (e.g. 10%) or with an offset (e.g. 1G+10%).- bsc#1130485 - Please drop Requires on multipath-tools in xen-tools. Now using Recommends multipath-tools. xen.spec- Update to Xen 4.12.0 RC7 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- Update to Xen 4.12.0 RC6 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- bsc#1026236 - add Xen cmdline option "suse_vtsc_tolerance" to avoid TSC emulation for HVM domUs if their expected frequency does not match exactly the frequency of the receiving host xen.bug1026236.suse_vtsc_tolerance.patch- Update to Xen 4.12.0 RC5 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- jsc#SLE-3059 - Disable Xen auto-ballooning - Add CONFIG_DOM0_MEM to the spec file for managing dom0 memory. xen.spec - Disable autoballooning in xl.con xl-conf-disable-autoballoon.patch- Update gcc9-ignore-warnings.patch to fix build in SLE12- bsc#1126325 - fix crash in libxl in error path Setup of grant_tables and other variables may fail libxl.prepare-environment-for-domcreate_stream_done.patch- bsc#1127620 - Documentation for the xl configuration file allows for firmware=pvgrub64 but we don't ship pvgrub64. Create a link from grub.xen to pvgrub64 xen.spec- Update to Xen 4.12.0 RC4 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2 - Tarball also contains additional post RC4 security fixes for Xen Security Advisories 287, 288, and 290 through 294.- Update to Xen 4.12.0 RC3 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- Update to Xen 4.12.0 RC2 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2- bsc#1121391 - GCC 9: xen build fails gcc9-ignore-warnings.patch- bsc#1122563 - Virtualization/xen: Bug no Xen on boot, missing /proc/xen, after 4.11 -> 4.12 upgrade on X86_64/efi. Keep xen.efi in /usr/lib64/efi for booting older distros. xen.spec- fate#326960: Package grub2 as noarch. As part of the effort to have a unified bootloader across architectures, modify the xen.spec file to move the Xen efi files to /usr/share/efi/$(uname -m) from /usr/lib64/efi.- Update to Xen 4.12.0 RC1 release (fate#325107, fate#323901) xen-4.12.0-testing-src.tar.bz2 - Drop 5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch 5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch 5b8fae26-tools-libxl-correct-vcpu-affinity-output-with-sparse-physical-cpu-map.patch 5b8fae26-xen-fill-topology-info-for-all-present-cpus.patch 5b8fb5af-tools-xl-refuse-to-set-number-of-vcpus-to-0-via-xl-vcpu-set.patch 5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch 5b9784d2-x86-HVM-add-known_gla-helper.patch 5b9784f2-x86-HVM-split-page-straddling-accesses.patch 5bdc31d5-VMX-fix-vmx_handle_eoi.patch gcc8-fix-array-warning-on-i586.patch gcc8-fix-format-warning-on-i586.patch gcc8-inlining-failed.patch xen.bug1079730.patch- bsc#1121960 - xen: sync with Factory xen.spec xen.changes- Replace old $RPM_* shell vars. - Run fdupes for all architectures, and not crossing subvolume boundaries.- Do not run %fdupes on aarch64 to avoid the hardlink-across-partition rpmlint error- Require qemu-seabios only on x86* as it is not available on non-x86 systems- Avoid creating dangling symlinks (bsc#1116524) This reverts the revert of tmp_build.patch- Update to Xen 4.11.1 bug fix release (bsc#1027519) xen-4.11.1-testing-src.tar.bz2 - 5b505d59-tools-xentop-replace-use-of-deprecated-vwprintw.patch replaces xen.2b50cdbc444c637575580dcfa6c9525a84d5cc62.patch - 5b76ec82-libxl-arm-Fix-build-on-arm64-acpi-w-gcc-8.2.patch replaces xen.b8f33431f3dd23fb43a879f4bdb4283fdc9465ad.patch - Drop the following patches contained in the new tarball 5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch 5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch 5b3cab8e-2-VMX-improve-MSR-load-save-API.patch 5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch 5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch 5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch 5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch 5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch 5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch 5b3f8fa5-port-array_index_nospec-from-Linux.patch 5b4321f6-x86-correctly-set-nonlazy_xstate_used-when-loading-full-state.patch 5b4488e7-x86-spec-ctrl-cmdline-handling.patch 5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch 5b4c9a60-allow-cpu_down-to-be-called-earlier.patch 5b4db308-SVM-fix-cleanup-svm_inject_event.patch 5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch 5b5040f2-x86-AMD-distinguish-CU-from-HT.patch 5b505fe5-VMX-fix-find-msr-build.patch 5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch 5b508775-2-x86-possibly-bring-up-all-CPUs.patch 5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch 5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch 5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch 5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch 5b56feb1-hvm-Disallow-unknown-MSR_EFER-bits.patch 5b56feb2-spec-ctrl-Fix-the-parsing-of-xpti--on-fixed-Intel-hardware.patch 5b62ca93-VMX-avoid-hitting-BUG_ON.patch 5b6d84ac-x86-fix-improve-vlapic-read-write.patch 5b6d8ce2-x86-XPTI-parsing.patch 5b72fbbe-ARM-disable-grant-table-v2.patch 5b72fbbe-oxenstored-eval-order.patch 5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch 5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch 5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch 5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch 5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch 5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch 5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch 5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch 5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch 5b72fbbf-x86-Make-spec-ctrl-no-a-global-disable-of-all-mitigations.patch 5b72fbbf-xl.conf-Add-global-affinity-masks.patch 5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch 5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch 5b75afef-x86-setup-avoid-OoB-E820-lookup.patch 5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch 5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch 5b8d5832-x86-assorted-array_index_nospec-insertions.patch 5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch 5bacae4b-x86-boot-allocate-extra-module-slot.patch 5bae44ce-x86-silence-false-log-messages.patch 5bb60c12-x86-split-opt_xpti.patch 5bb60c4f-x86-split-opt_pv_l1tf.patch 5bb60c74-x86-fix-xpti-and-pv-l1tf.patch 5bcf0722-x86-boot-enable-NMIs.patch 5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch 5bd076e9-x86-boot-init-debug-regs-correctly.patch 5bd076e9-x86-init-vcpu-debug-regs-correctly.patch 5bd0e0cf-vvmx-Disallow-the-use-of-VT-x-instructions-when-nested-virt-is-disabled.patch 5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch 5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch 5be2a308-x86-extend-get_platform_badpages.patch 5be2a354-x86-work-around-HLE-host-lockup-erratum.patch xsa275-1.patch xsa275-2.patch xsa276-1.patch xsa276-2.patch xsa277.patch xsa279.patch xsa280-1.patch xsa280-2.patch- bsc#1116524 - Package xen-tools-4.11.0_09-2.1.x86_64 broken: Missing /bin/domu-xenstore. This was broken because "make package build reproducible" change. (boo#1047218, boo#1062303) This fix reverses the change to this patch. tmp_build.patch- bsc#1115040 - VUL-0: CVE-2018-19961 CVE-2018-19962: xen: insufficient TLB flushing / improper large page mappings with AMD IOMMUs (XSA-275) xsa275-1.patch xsa275-2.patch - bsc#1115043 - VUL-0: CVE-2018-19963: xen: resource accounting issues in x86 IOREQ server handling (XSA-276) xsa276-1.patch xsa276-2.patch - bsc#1115044 - VUL-0: CVE-2018-19964: xen: x86: incorrect error handling for guest p2m page removals (XSA-277) xsa277.patch - bsc#1114405 - VUL-0: CVE-2018-18883: xen: Nested VT-x usable even when disabled (XSA-278) 5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch - bsc#1115045 - VUL-0: xen: CVE-2018-19965: x86: DoS from attempting to use INVPCID with a non-canonical addresses (XSA-279) xsa279.patch - bsc#1115047 - VUL-0: CVE-2018-19966: xen: Fix for XSA-240 conflicts with shadow paging (XSA-280) xsa280-1.patch xsa280-2.patch - bsc#1114988 - VUL-0: CVE-2018-19967: xen: guest use of HLE constructs may lock up host (XSA-282) 5be2a308-x86-extend-get_platform_badpages.patch 5be2a354-x86-work-around-HLE-host-lockup-erratum.patch - bsc#1108940 - L3: XEN SLE12-SP1 domU hang on SLE12-SP3 HV 5bdc31d5-VMX-fix-vmx_handle_eoi.patch - Upstream bug fixes (bsc#1027519) 5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch 5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch 5bacae4b-x86-boot-allocate-extra-module-slot.patch 5bae44ce-x86-silence-false-log-messages.patch 5bb60c12-x86-split-opt_xpti.patch 5bb60c4f-x86-split-opt_pv_l1tf.patch 5bb60c74-x86-fix-xpti-and-pv-l1tf.patch 5bcf0722-x86-boot-enable-NMIs.patch 5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch 5bd076e9-x86-boot-init-debug-regs-correctly.patch 5bd076e9-x86-init-vcpu-debug-regs-correctly.patch 5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch- bsc#1114405 - VUL-0: CVE-2018-18883: xen: Nested VT-x usable even when disabled (XSA-278) 5bd0e0cf-vvmx-Disallow-the-use-of-VT-x-instructions-when-nested-virt-is-disabled.patch- Use SMBIOS_REL_DATE instead of SMBIOS_DATE for reproducible binaries- make package build reproducible (boo#1047218, boo#1062303) * Set SMBIOS_REL_DATE * Update tmp_build.patch to use SHA instead of random build-id * Add reproducible.patch to use --no-insert-timestamp- Building with ncurses 6.1 will fail without xen.2b50cdbc444c637575580dcfa6c9525a84d5cc62.patch - Building libxl acpi support on aarch64 with gcc 8.2 will fail without xen.b8f33431f3dd23fb43a879f4bdb4283fdc9465ad.patch- bsc#1106263 - L3: The affinity reporting via 'xl vcpu-list' is apparently broken 5b8fae26-tools-libxl-correct-vcpu-affinity-output-with-sparse-physical-cpu-map.patch 5b8fae26-xen-fill-topology-info-for-all-present-cpus.patch 5b8fb5af-tools-xl-refuse-to-set-number-of-vcpus-to-0-via-xl-vcpu-set.patch- bsc#1094508 - L3: Kernel oops in fs/dcache.c called by d_materialise_unique() 5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch 5b9784d2-x86-HVM-add-known_gla-helper.patch 5b9784f2-x86-HVM-split-page-straddling-accesses.patch - bsc#1103279 - (CVE-2018-15470) VUL-0: CVE-2018-15470: xen: oxenstored does not apply quota-maxentity (XSA-272) 5b72fbbe-oxenstored-eval-order.patch - bsc#1103275 - (CVE-2018-15469) VUL-0: CVE-2018-15469: xen: Use of v2 grant tables may cause crash on ARM (XSA-268) 5b72fbbe-ARM-disable-grant-table-v2.patch - Upstream patches from Jan (bsc#1027519) 5b6d84ac-x86-fix-improve-vlapic-read-write.patch 5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch 5b75afef-x86-setup-avoid-OoB-E820-lookup.patch 5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch 5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch 5b8d5832-x86-assorted-array_index_nospec-insertions.patch - Drop 5b741962-x86-write-to-correct-variable-in-parse_pv_l1tf.patch- bsc#1078292 - rpmbuild -ba SPECS/xen.spec with xen-4.9.1 failed xen.spec- bsc#1091107 - VUL-0: CVE-2018-3646: xen: L1 Terminal Fault -VMM (XSA-273) 5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch 5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch 5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch 5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch 5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch 5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch 5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch 5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch - bsc#1103276 - VUL-0: CVE-2018-15468: xen: x86: Incorrect MSR_DEBUGCTL handling lets guests enable BTS (XSA-269) 5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch - Upstream prereq patches for XSA-273 and other upstream fixes (bsc#1027519) 5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch 5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch 5b3cab8e-2-VMX-improve-MSR-load-save-API.patch 5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch 5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch 5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch 5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch 5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch 5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch 5b4321f6-x86-correctly-set-nonlazy_xstate_used-when-loading-full-state.patch 5b505fe5-VMX-fix-find-msr-build.patch 5b56feb1-hvm-Disallow-unknown-MSR_EFER-bits.patch 5b56feb2-spec-ctrl-Fix-the-parsing-of-xpti--on-fixed-Intel-hardware.patch 5b62ca93-VMX-avoid-hitting-BUG_ON.patch 5b6d8ce2-x86-XPTI-parsing.patch 5b72fbbf-x86-Make-spec-ctrl-no-a-global-disable-of-all-mitigations.patch 5b72fbbf-xl.conf-Add-global-affinity-masks.patch 5b741962-x86-write-to-correct-variable-in-parse_pv_l1tf.patch- Upstream patches from Jan (bsc#1027519) 5b3f8fa5-port-array_index_nospec-from-Linux.patch 5b4488e7-x86-spec-ctrl-cmdline-handling.patch 5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch 5b4c9a60-allow-cpu_down-to-be-called-earlier.patch 5b4db308-SVM-fix-cleanup-svm_inject_event.patch 5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch 5b5040f2-x86-AMD-distinguish-CU-from-HT.patch 5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch 5b508775-2-x86-possibly-bring-up-all-CPUs.patch 5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch 5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch 5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch 5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch gcc8-fix-format-warning-on-i586.patch gcc8-fix-array-warning-on-i586.patch - Drop xen.fuzz-_FORTIFY_SOURCE.patch gcc8-fix-warning-on-i586.patch- Update to Xen 4.11.0 FCS (fate#325202, fate#325123) xen-4.11.0-testing-src.tar.bz2 disable-building-pv-shim.patch - Dropped patches 5a33a12f-domctl-improve-locking-during-domain-destruction.patch 5a6703cb-x86-move-invocations-of-hvm_flush_guest_tlbs.patch 5a79d7ed-libxc-packed-initrd-dont-fail-domain-creation.patch 5a9985bd-x86-invpcid-support.patch 5ac72a48-gcc8.patch 5ac72a5f-gcc8.patch 5ac72a64-gcc8.patch 5ac72a69-gcc8.patch 5ac72a6e-gcc8.patch 5ac72a74-gcc8.patch 5ac72a7b-gcc8.patch 5ad4923e-x86-correct-S3-resume-ordering.patch 5ad49293-x86-suppress-BTI-mitigations-around-S3.patch 5ad600d4-x86-pv-introduce-x86emul_read_dr.patch 5ad600d4-x86-pv-introduce-x86emul_write_dr.patch 5ad8c3a7-x86-spec_ctrl-update-retpoline-decision-making.patch 5adda097-x86-HPET-fix-race-triggering-ASSERT.patch 5adda0d5-x86-HVM-never-retain-emulated-insn-cache.patch 5adde9ed-xpti-fix-double-fault-handling.patch 5ae06fad-SVM-fix-intercepts-for-SYS-CALL-ENTER-MSRs.patch 5ae31917-x86-cpuidle-init-stats-lock-once.patch 5aeaeae4-introduce-vcpu_sleep_nosync_locked.patch 5aeaeaf0-sched-fix-races-in-vcpu-migration.patch 5aeb2c57-x86-retval-checks-of-set-guest-trapbounce.patch 5aec7393-1-x86-xpti-avoid-copy.patch 5aec7393-2-x86-xpti-write-cr3.patch 5aec744a-3-x86-xpti-per-domain-flag.patch 5aec744a-4-x86-xpti-use-invpcid.patch 5aec744a-5-x86-xpti-no-global-pages.patch 5aec744a-6-x86-xpti-cr3-valid-flag.patch 5aec744a-7-x86-xpti-pv_guest_cr4_to_real_cr4.patch 5aec744b-8-x86-xpti-cr3-helpers.patch 5aec74a8-9-x86-xpti-use-pcid.patch 5af1daa9-1-x86-traps-fix-dr6-handing-in-DB-handler.patch 5af1daa9-2-x86-pv-move-exception-injection-into-test_all_events.patch 5af1daa9-3-x86-traps-use-IST-for-DB.patch 5af1daa9-4-x86-traps-fix-handling-of-DB-in-hypervisor-context.patch 5af1daa9-x86-HVM-guard-against-bogus-emulator-ioreq-state.patch 5af1daa9-x86-vpt-support-IO-APIC-routed-intr.patch 5af97999-viridian-cpuid-leaf-40000003.patch 5afc13ae-1-x86-read-MSR_ARCH_CAPABILITIES-once.patch 5afc13ae-2-x86-express-Xen-SPEC_CTRL-choice-as-variable.patch 5afc13ae-3-x86-merge-bti_ist_info-use_shadow_spec_ctrl.patch 5afc13ae-4-x86-fold-XEN_IBRS-ALTERNATIVES.patch 5afc13ae-5-x86-rename-bits-of-spec_ctrl-infrastructure.patch 5afc13ae-6-x86-elide-MSR_SPEC_CTRL-handling-in-idle.patch 5afc13ae-7-x86-split-X86_FEATURE_SC_MSR.patch 5afc13ae-8-x86-explicitly-set-Xen-default-SPEC_CTRL.patch 5afc13ae-9-x86-cpuid-improve-guest-policies-for-speculative.patch 5afc13ae-A-x86-introduce-spec-ctrl-cmdline-opt.patch 5b02c786-x86-AMD-mitigations-for-GPZ-SP4.patch 5b02c786-x86-Intel-mitigations-for-GPZ-SP4.patch 5b02c786-x86-msr-virtualise-SPEC_CTRL-SSBD.patch 5b0bc9da-x86-XPTI-fix-S3-resume.patch 5b0d2286-libxc-x86-PV-dont-hand-through-CPUID-leaf-0x80000008.patch 5b0d2d91-x86-suppress-sync-when-XPTI-off.patch 5b0d2dbc-x86-correct-default_xen_spec_ctrl.patch 5b0d2ddc-x86-CPUID-dont-override-tool-stack-hidden-STIBP.patch 5b150ef9-x86-fix-error-handling-of-pv-dr7-shadow.patch 5b21825d-1-x86-support-fully-eager-FPU-context-switching.patch 5b21825d-2-x86-spec-ctrl-mitigations-for-LazyFPU.patch 5b238b92-x86-HVM-account-for-fully-eager-FPU.patch 5b2b7172-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b31e004-x86-HVM-emul-attempts-FPU-set-fpu_initialised.patch 5b323e3c-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b34882d-x86-mm-dont-bypass-preemption-checks.patch 5b348874-x86-refine-checks-in-DB-handler.patch 5b348897-libxl-qemu_disk_scsi_drive_string-break-out-common.patch 5b3488a2-libxl-restore-passing-ro-to-qemu-for-SCSI-disks.patch 5b34891a-x86-HVM-dont-cause-NM-to-be-raised.patch 5b348954-x86-guard-against-NM.patch libxl.Add-a-version-check-of-QEMU-for-QMP-commands.patch libxl.LIBXL_DESTROY_TIMEOUT.patch libxl.qmp-Tell-QEMU-about-live-migration-or-snapshot.patch xen_fix_build_with_acpica_20180427_and_new_packages.patch- Submit upstream patch libacpi: fixes for iasl >= 20180427 git commit 858dbaaeda33b05c1ac80aea0ba9a03924e09005 xen_fix_build_with_acpica_20180427_and_new_packages.patch This is needed for acpica package to get updated in our build service- Upstream patches from Jan (bsc#1027519) 5b02c786-x86-AMD-mitigations-for-GPZ-SP4.patch (Replaces Spectre-v4-1.patch) 5b02c786-x86-Intel-mitigations-for-GPZ-SP4.patch (Replaces Spectre-v4-2.patch) 5b02c786-x86-msr-virtualise-SPEC_CTRL-SSBD.patch (Replaces Spectre-v4-3.patch) 5b0bc9da-x86-XPTI-fix-S3-resume.patch 5b0d2286-libxc-x86-PV-dont-hand-through-CPUID-leaf-0x80000008.patch 5b0d2d91-x86-suppress-sync-when-XPTI-off.patch 5b0d2dbc-x86-correct-default_xen_spec_ctrl.patch 5b0d2ddc-x86-CPUID-dont-override-tool-stack-hidden-STIBP.patch 5b150ef9-x86-fix-error-handling-of-pv-dr7-shadow.patch 5b21825d-1-x86-support-fully-eager-FPU-context-switching.patch (Replaces xsa267-1.patch) 5b21825d-2-x86-spec-ctrl-mitigations-for-LazyFPU.patch (Replaces xsa267-2.patch) 5b238b92-x86-HVM-account-for-fully-eager-FPU.patch 5b2b7172-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b31e004-x86-HVM-emul-attempts-FPU-set-fpu_initialised.patch 5b323e3c-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b34882d-x86-mm-dont-bypass-preemption-checks.patch (Replaces xsa264.patch) 5b348874-x86-refine-checks-in-DB-handler.patch (Replaces xsa265.patch) 5b348897-libxl-qemu_disk_scsi_drive_string-break-out-common.patch (Replaces xsa266-1-<>.patch) 5b3488a2-libxl-restore-passing-ro-to-qemu-for-SCSI-disks.patch (Replaces xsa266-2-<>.patch) 5b34891a-x86-HVM-dont-cause-NM-to-be-raised.patch 5b348954-x86-guard-against-NM.patch- Fix more build gcc8 related failures with xen.fuzz-_FORTIFY_SOURCE.patch- bsc#1098403 - fix regression introduced by changes for bsc#1079730 a PV domU without qcow2 and/or vfb has no qemu attached. Ignore QMP errors for PV domUs to handle PV domUs with and without an attached qemu-xen. xen.bug1079730.patch- bsc#1097521 - VUL-0: CVE-2018-12891: xen: preemption checks bypassed in x86 PV MM handling (XSA-264) xsa264.patch - bsc#1097522 - VUL-0: CVE-2018-12893: xen: x86: #DB exception safety check can be triggered by a guest (XSA-265) xsa265.patch - bsc#1097523 - VUL-0: CVE-2018-12892: xen: libxl fails to honour readonly flag on HVM emulated SCSI disks (XSA-266) xsa266-1-libxl-qemu_disk_scsi_drive_string-Break-out-common-p.patch xsa266-2-libxl-restore-passing-readonly-to-qemu-for-SCSI-disk.patch- bsc#1095242 - VUL-0: CVE-2018-3665: xen: Lazy FP Save/Restore (XSA-267) xsa267-1.patch xsa267-2.patch- bsc#1092543 - GCC 8: xen build fails gcc8-fix-warning-on-i586.patch- bsc#1092631 - VUL-0: CVE-2018-3639: xen: V4 – Speculative Store Bypass aka "Memory Disambiguation" (XSA-263) 5ad4923e-x86-correct-S3-resume-ordering.patch 5ad49293-x86-suppress-BTI-mitigations-around-S3.patch 5afc13ae-1-x86-read-MSR_ARCH_CAPABILITIES-once.patch 5afc13ae-2-x86-express-Xen-SPEC_CTRL-choice-as-variable.patch 5afc13ae-3-x86-merge-bti_ist_info-use_shadow_spec_ctrl.patch 5afc13ae-4-x86-fold-XEN_IBRS-ALTERNATIVES.patch 5afc13ae-5-x86-rename-bits-of-spec_ctrl-infrastructure.patch 5afc13ae-6-x86-elide-MSR_SPEC_CTRL-handling-in-idle.patch 5afc13ae-7-x86-split-X86_FEATURE_SC_MSR.patch 5afc13ae-8-x86-explicitly-set-Xen-default-SPEC_CTRL.patch 5afc13ae-9-x86-cpuid-improve-guest-policies-for-speculative.patch 5afc13ae-A-x86-introduce-spec-ctrl-cmdline-opt.patch Spectre-v4-1.patch Spectre-v4-2.patch Spectre-v4-3.patch- Always call qemus xen-save-devices-state in suspend/resume to fix migration with qcow2 images (bsc#1079730) libxl.Add-a-version-check-of-QEMU-for-QMP-commands.patch libxl.qmp-Tell-QEMU-about-live-migration-or-snapshot.patch xen.bug1079730.patch- bsc#1087289 - L3: Xen BUG at sched_credit.c:1663 5aeaeae4-introduce-vcpu_sleep_nosync_locked.patch 5aeaeaf0-sched-fix-races-in-vcpu-migration.patch - Upstream patches from Jan (bsc#1027519) 5ad600d4-x86-pv-introduce-x86emul_read_dr.patch 5ad600d4-x86-pv-introduce-x86emul_write_dr.patch 5ad8c3a7-x86-spec_ctrl-update-retpoline-decision-making.patch 5adda097-x86-HPET-fix-race-triggering-ASSERT.patch 5adda0d5-x86-HVM-never-retain-emulated-insn-cache.patch 5ae06fad-SVM-fix-intercepts-for-SYS-CALL-ENTER-MSRs.patch 5ae31917-x86-cpuidle-init-stats-lock-once.patch 5aeb2c57-x86-retval-checks-of-set-guest-trapbounce.patch 5af1daa9-1-x86-traps-fix-dr6-handing-in-DB-handler.patch (Replaces xsa260-1.patch) 5af1daa9-2-x86-pv-move-exception-injection-into-test_all_events.patch (Replaces xsa260-2.patch) 5af1daa9-3-x86-traps-use-IST-for-DB.patch (Replaces xsa260-3.patch) 5af1daa9-4-x86-traps-fix-handling-of-DB-in-hypervisor-context.patch (Replaces xsa260-4.patch) 5af1daa9-x86-HVM-guard-against-bogus-emulator-ioreq-state.patch (Replaces xsa262.patch) 5af1daa9-x86-vpt-support-IO-APIC-routed-intr.patch (Replaces xsa261.patch) 5af97999-viridian-cpuid-leaf-40000003.patch- Fixes related to Page Table Isolation (XPTI). bsc#1074562 XSA-254 5a6703cb-x86-move-invocations-of-hvm_flush_guest_tlbs.patch 5a9985bd-x86-invpcid-support.patch 5adde9ed-xpti-fix-double-fault-handling.patch 5aec7393-1-x86-xpti-avoid-copy.patch 5aec7393-2-x86-xpti-write-cr3.patch 5aec744a-3-x86-xpti-per-domain-flag.patch 5aec744a-4-x86-xpti-use-invpcid.patch 5aec744a-5-x86-xpti-no-global-pages.patch 5aec744a-6-x86-xpti-cr3-valid-flag.patch 5aec744a-7-x86-xpti-pv_guest_cr4_to_real_cr4.patch 5aec744b-8-x86-xpti-cr3-helpers.patch 5aec74a8-9-x86-xpti-use-pcid.patch- bsc#1092543 - GCC 8: xen build fails 5ac72a48-gcc8.patch 5ac72a5f-gcc8.patch 5ac72a64-gcc8.patch 5ac72a69-gcc8.patch 5ac72a6e-gcc8.patch 5ac72a74-gcc8.patch 5ac72a7b-gcc8.patch gcc8-inlining-failed.patch- Update to Xen 4.10.1 bug fix release (bsc#1027519) xen-4.10.1-testing-src.tar.bz2 disable-building-pv-shim.patch - Drop the following patches contained in the new tarball 5a21a77e-x86-pv-construct-d0v0s-GDT-properly.patch 5a2fda0d-x86-mb2-avoid-Xen-when-looking-for-module-crashkernel-pos.patch 5a2ffc1f-x86-mm-drop-bogus-paging-mode-assertion.patch 5a313972-x86-microcode-add-support-for-AMD-Fam17.patch 5a32bd79-x86-vmx-dont-use-hvm_inject_hw_exception-in-.patch 5a4caa5e-x86-IRQ-conditionally-preserve-access-perm.patch 5a4caa8c-x86-E820-don-t-overrun-array.patch 5a4e2bca-x86-free-msr_vcpu_policy-during-destruction.patch 5a4e2c2c-x86-upcall-inject-spurious-event-after-setting-vector.patch 5a4fd893-1-x86-break-out-alternative-asm-into-separate-header.patch 5a4fd893-2-x86-introduce-ALTERNATIVE_2-macros.patch 5a4fd893-3-x86-hvm-rename-update_guest_vendor-to-cpuid_policy_changed.patch 5a4fd893-4-x86-introduce-cpuid_policy_updated.patch 5a4fd893-5-x86-entry-remove-partial-cpu_user_regs.patch 5a4fd894-1-x86-rearrange-RESTORE_ALL-to-restore-in-stack-order.patch 5a4fd894-2-x86-hvm-use-SAVE_ALL-after-VMExit.patch 5a4fd894-3-x86-erase-guest-GPRs-on-entry-to-Xen.patch 5a4fd894-4-clarifications-to-wait-infrastructure.patch 5a534c78-x86-dont-use-incorrect-CPUID-values-for-topology.patch 5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4-updates.patch 5a5e2cff-x86-Meltdown-band-aid.patch 5a5e2d73-x86-Meltdown-band-aid-conditional.patch 5a5e3a4e-1-x86-support-compiling-with-indirect-branch-thunks.patch 5a5e3a4e-2-x86-support-indirect-thunks-from-asm.patch 5a5e3a4e-3-x86-report-speculative-mitigation-details.patch 5a5e3a4e-4-x86-AMD-set-lfence-as-Dispatch-Serialising.patch 5a5e3a4e-5-x86-introduce-alternative-indirect-thunks.patch 5a5e3a4e-6-x86-definitions-for-Indirect-Branch-Controls.patch 5a5e3a4e-7-x86-cmdline-opt-to-disable-IBRS-IBPB-STIBP.patch 5a5e459c-1-x86-SVM-offer-CPUID-faulting-to-AMD-HVM-guests.patch 5a5e459c-2-x86-report-domain-id-on-CPUID.patch 5a68bc16-x86-acpi-process-softirqs-logging-Cx.patch 5a69c0b9-x86-fix-GET_STACK_END.patch 5a6b36cd-1-x86-cpuid-handling-of-IBRS-IBPB-STIBP-and-IBRS-for-guests.patch 5a6b36cd-2-x86-msr-emulation-of-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-3-x86-migrate-MSR_SPEC_CTRL.patch 5a6b36cd-4-x86-hvm-permit-direct-access-to-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-5-x86-use-SPEC_CTRL-on-entry.patch 5a6b36cd-6-x86-clobber-RSB-RAS-on-entry.patch 5a6b36cd-7-x86-no-alternatives-in-NMI-MC-paths.patch 5a6b36cd-8-x86-boot-calculate-best-BTI-mitigation.patch 5a6b36cd-9-x86-issue-speculation-barrier.patch 5a6b36cd-A-x86-offer-Indirect-Branch-Controls-to-guests.patch 5a6b36cd-B-x86-clear-SPEC_CTRL-while-idle.patch 5a7b1bdd-x86-reduce-Meltdown-band-aid-IPI-overhead.patch 5a843807-x86-spec_ctrl-fix-bugs-in-SPEC_CTRL_ENTRY_FROM_INTR_IST.patch 5a856a2b-x86-emul-fix-64bit-decoding-of-segment-overrides.patch 5a856a2b-x86-use-32bit-xors-for-clearing-GPRs.patch 5a856a2b-x86-xpti-hide-almost-all-of-Xen-image-mappings.patch 5a8be788-x86-nmi-start-NMI-watchdog-on-CPU0-after-SMP.patch 5a95373b-x86-PV-avoid-leaking-other-guests-MSR_TSC_AUX.patch 5a95571f-memory-dont-implicitly-unpin-in-decrease-res.patch 5a95576c-gnttab-ARM-dont-corrupt-shared-GFN-array.patch 5a955800-gnttab-dont-free-status-pages-on-ver-change.patch 5a955854-x86-disallow-HVM-creation-without-LAPIC-emul.patch 5a956747-x86-HVM-dont-give-wrong-impression-of-WRMSR-success.patch 5a9eb7f1-x86-xpti-dont-map-stack-guard-pages.patch 5a9eb85c-x86-slightly-reduce-XPTI-overhead.patch 5a9eb890-x86-remove-CR-reads-from-exit-to-guest-path.patch 5aa2b6b9-cpufreq-ondemand-CPU-offlining-race.patch 5aaa9878-x86-vlapic-clear-TMR-bit-for-edge-triggered-intr.patch xsa258.patch xsa259.patch- bsc#1090820 - VUL-0: CVE-2018-8897: xen: x86: mishandling of debug exceptions (XSA-260) xsa260-1.patch xsa260-2.patch xsa260-3.patch xsa260-4.patch - bsc#1090822 - VUL-0: CVE-2018-10982: xen: x86 vHPET interrupt injection errors (XSA-261) xsa261.patch - bsc#1090823 - VUL-0: CVE-2018-10981: xen: qemu may drive Xen into unbounded loop (XSA-262) xsa262.patch- bsc#1089152 - VUL-0: CVE-2018-10472: xen: Information leak via crafted user-supplied CDROM (XSA-258) xsa258.patch - bsc#1089635 - VUL-0: CVE-2018-10471: xen: x86: PV guest may crash Xen with XPTI (XSA-259) xsa259.patch- Preserve xen-syms from xen-dbg.gz to allow processing vmcores with crash(1) (bsc#1087251)- Upstream patches from Jan (bsc#1027519) and fixes related to Page Table Isolation (XPTI). See also bsc#1074562 XSA-254 5a856a2b-x86-xpti-hide-almost-all-of-Xen-image-mappings.patch 5a9eb7f1-x86-xpti-dont-map-stack-guard-pages.patch 5a9eb85c-x86-slightly-reduce-XPTI-overhead.patch 5a9eb890-x86-remove-CR-reads-from-exit-to-guest-path.patch 5aa2b6b9-cpufreq-ondemand-CPU-offlining-race.patch 5aaa9878-x86-vlapic-clear-TMR-bit-for-edge-triggered-intr.patch- bsc#1072834 - Xen HVM: unchecked MSR access error: RDMSR from 0xc90 at rIP: 0xffffffff93061456 (native_read_msr+0x6/0x30) 5a956747-x86-HVM-dont-give-wrong-impression-of-WRMSR-success.patch - Upstream patches from Jan (bsc#1027519) 5a79d7ed-libxc-packed-initrd-dont-fail-domain-creation.patch 5a7b1bdd-x86-reduce-Meltdown-band-aid-IPI-overhead.patch 5a843807-x86-spec_ctrl-fix-bugs-in-SPEC_CTRL_ENTRY_FROM_INTR_IST.patch 5a856a2b-x86-emul-fix-64bit-decoding-of-segment-overrides.patch 5a856a2b-x86-use-32bit-xors-for-clearing-GPRs.patch 5a8be788-x86-nmi-start-NMI-watchdog-on-CPU0-after-SMP.patch 5a95373b-x86-PV-avoid-leaking-other-guests-MSR_TSC_AUX.patch 5a95571f-memory-dont-implicitly-unpin-in-decrease-res.patch (Replaces xsa252.patch) 5a95576c-gnttab-ARM-dont-corrupt-shared-GFN-array.patch (Replaces xsa255-1.patch) 5a955800-gnttab-dont-free-status-pages-on-ver-change.patch (Replaces xsa255-2.patch) 5a955854-x86-disallow-HVM-creation-without-LAPIC-emul.patch (Replaces xsa256.patch) - Drop xsa252.patch xsa255-1.patch xsa255-2.patch xsa256.patch- bsc#1080635 - VUL-0: CVE-2018-7540: xen: DoS via non-preemptable L3/L4 pagetable freeing (XSA-252) xsa252.patch - bsc#1080662 - VUL-0: CVE-2018-7541: xen: grant table v2 -> v1 transition may crash Xen (XSA-255) xsa255-1.patch xsa255-2.patch - bsc#1080634 - VUL-0: CVE-2018-7542: xen: x86 PVH guest without LAPIC may DoS the host (XSA-256) xsa256.patch- Remove stale systemd presets code for 13.2 and older- fate#324965 - add script, udev rule and systemd service to watch for vcpu online/offline events in a HVM domU They are triggered via xl vcpu-set domU N- Replace hardcoded xen with Name tag when refering to subpkgs- Make sure tools and tools-domU require libs from the very same build- tools-domU: Add support for qemu guest agent. New files 80-xen-channel-setup.rules and xen-channel-setup.sh configure a xen-pv-channel for use by the guest agent FATE#324963- Remove outdated /etc/xen/README*- bsc#1073961 - VUL-0: CVE-2018-5244: xen: x86: memory leak with MSR emulation (XSA-253) 5a4e2bca-x86-free-msr_vcpu_policy-during-destruction.patch - bsc#1074562 - VUL-0: CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 xen: Information leak via side effects of speculative execution (XSA-254). Includes Spectre v2 mitigation. 5a4caa5e-x86-IRQ-conditionally-preserve-access-perm.patch 5a4caa8c-x86-E820-don-t-overrun-array.patch 5a4e2c2c-x86-upcall-inject-spurious-event-after-setting-vector.patch 5a4fd893-1-x86-break-out-alternative-asm-into-separate-header.patch 5a4fd893-2-x86-introduce-ALTERNATIVE_2-macros.patch 5a4fd893-3-x86-hvm-rename-update_guest_vendor-to-cpuid_policy_changed.patch 5a4fd893-4-x86-introduce-cpuid_policy_updated.patch 5a4fd893-5-x86-entry-remove-partial-cpu_user_regs.patch 5a4fd894-1-x86-rearrange-RESTORE_ALL-to-restore-in-stack-order.patch 5a4fd894-2-x86-hvm-use-SAVE_ALL-after-VMExit.patch 5a4fd894-3-x86-erase-guest-GPRs-on-entry-to-Xen.patch 5a4fd894-4-clarifications-to-wait-infrastructure.patch 5a534c78-x86-dont-use-incorrect-CPUID-values-for-topology.patch 5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4-updates.patch 5a5e2cff-x86-Meltdown-band-aid.patch 5a5e2d73-x86-Meltdown-band-aid-conditional.patch 5a5e3a4e-1-x86-support-compiling-with-indirect-branch-thunks.patch 5a5e3a4e-2-x86-support-indirect-thunks-from-asm.patch 5a5e3a4e-3-x86-report-speculative-mitigation-details.patch 5a5e3a4e-4-x86-AMD-set-lfence-as-Dispatch-Serialising.patch 5a5e3a4e-5-x86-introduce-alternative-indirect-thunks.patch 5a5e3a4e-6-x86-definitions-for-Indirect-Branch-Controls.patch 5a5e3a4e-7-x86-cmdline-opt-to-disable-IBRS-IBPB-STIBP.patch 5a5e459c-1-x86-SVM-offer-CPUID-faulting-to-AMD-HVM-guests.patch 5a5e459c-2-x86-report-domain-id-on-CPUID.patch 5a68bc16-x86-acpi-process-softirqs-logging-Cx.patch 5a69c0b9-x86-fix-GET_STACK_END.patch 5a6b36cd-1-x86-cpuid-handling-of-IBRS-IBPB-STIBP-and-IBRS-for-guests.patch 5a6b36cd-2-x86-msr-emulation-of-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-3-x86-migrate-MSR_SPEC_CTRL.patch 5a6b36cd-4-x86-hvm-permit-direct-access-to-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-5-x86-use-SPEC_CTRL-on-entry.patch 5a6b36cd-6-x86-clobber-RSB-RAS-on-entry.patch 5a6b36cd-7-x86-no-alternatives-in-NMI-MC-paths.patch 5a6b36cd-8-x86-boot-calculate-best-BTI-mitigation.patch 5a6b36cd-9-x86-issue-speculation-barrier.patch 5a6b36cd-A-x86-offer-Indirect-Branch-Controls-to-guests.patch 5a6b36cd-B-x86-clear-SPEC_CTRL-while-idle.patch- Fix python3 deprecated atoi call (bsc#1067224) pygrub-python3-conversion.patch - Drop xenmon-python3-conversion.patch- bsc#1067317 - pass cache=writeback|unsafe|directsync to qemu, depending on the libxl disk settings libxl.add-option-to-disable-disk-cache-flushes-in-qdisk.patch- Remove libxl.LIBXL_DESTROY_TIMEOUT.debug.patch- bsc#1067224 - xen-tools have hard dependency on Python 2 build-python3-conversion.patch bin-python3-conversion.patch- bsc#1070165 - xen crashes after aborted localhost migration 5a2ffc1f-x86-mm-drop-bogus-paging-mode-assertion.patch - bsc#1035442 - L3: libxl: error: libxl.c:1676:devices_destroy_cb: libxl__devices_destroy failed 5a33a12f-domctl-improve-locking-during-domain-destruction.patch - Upstream patches from Jan (bsc#1027519) 5a21a77e-x86-pv-construct-d0v0s-GDT-properly.patch 5a2fda0d-x86-mb2-avoid-Xen-when-looking-for-module-crashkernel-pos.patch 5a313972-x86-microcode-add-support-for-AMD-Fam17.patch 5a32bd79-x86-vmx-dont-use-hvm_inject_hw_exception-in-.patch- Update to Xen 4.10.0 FCS (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Rebuild initrd if xen-tools-domU is updated- Update to Xen 4.10.0-rc8 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Increase the value of LIBXL_DESTROY_TIMEOUT from 10 to 100 seconds If many domUs shutdown in parallel the backends can not keep up Add some debug output to track how long backend shutdown takes (bsc#1035442) libxl.LIBXL_DESTROY_TIMEOUT.patch libxl.LIBXL_DESTROY_TIMEOUT.debug.patch- Adjust xenstore-run-in-studomain.patch to change the defaults in the code instead of changing the sysconfig template, to also cover the upgrade case- Update to Xen 4.10.0-rc6 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Since xen switched to Kconfig, building a debug hypervisor was done by default. Adjust make logic to build a non-debug hypervisor by default, and continue to provide one as xen-dbg.gz- fate#316614: set migration constraints from cmdline fix libxl.set-migration-constraints-from-cmdline.patch for xen-4.10- Document the suse-diskcache-disable-flush option in xl-disk-configuration(5) (bsc#879425,bsc#1067317)- Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468)- Update to Xen 4.10.0-rc5 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - fate#323663 - Run Xenstore in stubdomain xenstore-run-in-studomain.patch- bsc#1067224 - xen-tools have hard dependency on Python 2 pygrub-python3-conversion.patch xenmon-python3-conversion.patch migration-python3-conversion.patch xnloader.py xen2libvirt.py- Remove xendriverdomain.service (bsc#1065185) Driver domains must be configured manually with custom .service file- Update to Xen 4.10.0-rc3 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - Drop 59f31268-libxc-remove-stale-error-check-for-domain-size.patch- Adjust xen-dom0-modules.service to ignore errors (bsc#1065187)- fate#324052 Support migration of Xen HVM domains larger than 1TB 59f31268-libxc-remove-stale-error-check-for-domain-size.patch- Update to Xen 4.10.0-rc2 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Update to Xen 4.10.0-rc1 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - Drop patches included in new tarball 592fd5f0-stop_machine-fill-result-only-in-case-of-error.patch 596f257e-x86-fix-hvmemul_insn_fetch.patch 5982fd99-VT-d-don-t-panic-warn-on-iommu-no-igfx.patch 598c3630-VT-d-PI-disable-when-CPU-side-PI-is-off.patch 598c3706-cpufreq-only-stop-ondemand-governor-if-started.patch 5992f1e5-x86-grant-disallow-misaligned-PTEs.patch 5992f20d-gnttab-split-maptrack-lock-to-make-it-useful-again.patch 5992f233-gnttab-correct-pin-status-fixup-for-copy.patch 59958e76-gnttab-dont-use-possibly-unbounded-tail-calls.patch 59958ebf-gnttab-fix-transitive-grant-handling.patch 59958edd-gnttab-avoid-spurious-maptrack-handle-alloc-failures.patch 599da329-arm-mm-release-grant-lock-on-xatp1-error-paths.patch 59a01223-x86-check-for-alloc-errors-in-modify_xen_mappings.patch 59a0130c-x86-efi-dont-write-relocs-in-efi_arch_relocate_image-1st-pass.patch 59a9221f-VT-d-use-correct-BDF-for-VF-to-search-VT-d-unit.patch 59ae9177-x86-emul-fix-handling-of-unimplemented-Grp7-insns.patch 59aec335-x86emul-correct-VEX-W-handling-for-VPINSRD.patch 59aec375-x86emul-correct-VEX-L-handling-for-VCVTx2SI.patch 59afcea0-x86-introduce-and-use-setup_force_cpu_cap.patch 59b2a7f2-x86-HVM-correct-repeat-count-update-linear-phys.patch 59b7d664-mm-make-sure-node-is-less-than-MAX_NUMNODES.patch 59b7d69b-grant_table-fix-GNTTABOP_cache_flush-handling.patch 59b7d6c8-xenstore-dont-unlink-connection-object-twice.patch 59b7d6d9-gnttab-also-validate-PTE-perms-upon-destroy-replace.patch gcc7-arm.patch gcc7-mini-os.patch- bsc#1061084 - VUL-0: xen: page type reference leak on x86 (XSA-242) xsa242.patch - bsc#1061086 - VUL-0: xen: x86: Incorrect handling of self-linear shadow mappings with translated guests (XSA-243) xsa243.patch - bsc#1061087 - VUL-0: xen: x86: Incorrect handling of IST settings during CPU hotplug (XSA-244) xsa244.patch- bsc#1061077 - VUL-0: xen: DMOP map/unmap missing argument checks (XSA-238) xsa238.patch - bsc#1061080 - VUL-0: xen: hypervisor stack leak in x86 I/O intercept code (XSA-239) xsa239.patch - bsc#1061081 - VUL-0: xen: Unlimited recursion in linear pagetable de-typing (XSA-240) xsa240-1.patch xsa240-2.patch - bsc#1061082 - VUL-0: xen: Stale TLB entry due to page type release race (XSA-241) xsa241.patch- bsc#1061075 - VUL-0: xen: pin count / page reference race in grant table code (XSA-236) xsa236.patch - bsc#1061076 - VUL-0: xen: multiple MSI mapping issues on x86 (XSA-237) xsa237-1.patch xsa237-2.patch xsa237-3.patch xsa237-4.patch xsa237-5.patch- bsc#1056278 - VUL-0: xen: Missing NUMA node parameter verification (XSA-231) 59b7d664-mm-make-sure-node-is-less-than-MAX_NUMNODES.patch - bsc#1056280 - VUL-0: xen: Missing check for grant table (XSA-232) 59b7d69b-grant_table-fix-GNTTABOP_cache_flush-handling.patch - bsc#1056281 - VUL-0: xen: cxenstored: Race in domain cleanup (XSA-233) 59b7d6c8-xenstore-dont-unlink-connection-object-twice.patch - bsc#1056282 - VUL-0: xen: insufficient grant unmapping checks for x86 PV guests (XSA-234) 59b7d6d9-gnttab-also-validate-PTE-perms-upon-destroy-replace.patch - bsc#1055321 - VUL-0: xen: add-to-physmap error paths fail to release lock on ARM (XSA-235) 599da329-arm-mm-release-grant-lock-on-xatp1-error-paths.patch - Upstream patches from Jan (bsc#1027519) 59a01223-x86-check-for-alloc-errors-in-modify_xen_mappings.patch 59a0130c-x86-efi-dont-write-relocs-in-efi_arch_relocate_image-1st-pass.patch 59a9221f-VT-d-use-correct-BDF-for-VF-to-search-VT-d-unit.patch 59ae9177-x86-emul-fix-handling-of-unimplemented-Grp7-insns.patch 59aec335-x86emul-correct-VEX-W-handling-for-VPINSRD.patch 59aec375-x86emul-correct-VEX-L-handling-for-VCVTx2SI.patch 59afcea0-x86-introduce-and-use-setup_force_cpu_cap.patch 59b2a7f2-x86-HVM-correct-repeat-count-update-linear-phys.patch - Dropped gcc7-xen.patch- bsc#1057358 - Cannot Boot into SLES12.3 with Xen hypervisor when Secure Boot is Enabled xen.spec- bsc#1055695 - XEN: 11SP4 and 12SP3 HVM guests can not be restored update from v6 to v9 to cover more cases for ballooned domUs libxc.sr.superpage.patch- bsc#1026236 - remove suse_vtsc_tolerance= cmdline option for Xen drop the patch because it is not upstream acceptable remove xen.suse_vtsc_tolerance.patch- bsc#1055695 - XEN: 11SP4 and 12SP3 HVM guests can not be restored after the save using xl stack libxc.sr.superpage.patch- Unignore gcc-PIE the toolstack disables PIE for firmware builds as needed- Upstream patches from Jan (bsc#1027519) 592fd5f0-stop_machine-fill-result-only-in-case-of-error.patch 596f257e-x86-fix-hvmemul_insn_fetch.patch 5982fd99-VT-d-don-t-panic-warn-on-iommu-no-igfx.patch 598c3630-VT-d-PI-disable-when-CPU-side-PI-is-off.patch 598c3706-cpufreq-only-stop-ondemand-governor-if-started.patch 5992f1e5-x86-grant-disallow-misaligned-PTEs.patch (Replaces xsa227.patch) 5992f20d-gnttab-split-maptrack-lock-to-make-it-useful-again.patch (Replaces xsa228.patch) 5992f233-gnttab-correct-pin-status-fixup-for-copy.patch (Replaces xsa230.patch) 59958e76-gnttab-dont-use-possibly-unbounded-tail-calls.patch (Replaces xsa226-1.patch) 59958ebf-gnttab-fix-transitive-grant-handling.patch (Replaces xsa226-2.patch) 59958edd-gnttab-avoid-spurious-maptrack-handle-alloc-failures.patch- bsc#1044974 - xen-tools require python-pam xen.spec- Clean up spec file errors and a few warnings. (bsc#1027519) - Removed conditional 'with_systemd' and some old deprecated 'sles_version' checks. xen.spec- Remove use of brctl utiltiy from supportconfig plugin FATE#323639- Use upstream variant of mini-os __udivmoddi4 change gcc7-mini-os.patch- fate#323639 Move bridge-utils to legacy replace-obsolete-network-configuration-commands-in-s.patch- bsc#1052686 - VUL-0: xen: grant_table: possibly premature clearing of GTF_writing / GTF_reading (XSA-230) xsa230.patch- bsc#1035231 - migration of HVM domU does not use superpages on destination dom0 libxc.sr.superpage.patch- bsc#1051787 - VUL-0: CVE-2017-12135: xen: possibly unbounded recursion in grant table code (XSA-226) xsa226-1.patch xsa226-2.patch - bsc#1051788 - VUL-0: CVE-2017-12137: xen: x86: PV privilege escalation via map_grant_ref (XSA-227) xsa227.patch - bsc#1051789 - VUL-0: CVE-2017-12136: xen: grant_table: Race conditions with maptrack free list handling (XSA-228) xsa228.patch- Add a supportconfig plugin xen-supportconfig FATE#323661- bsc#1026236 - add suse_vtsc_tolerance= cmdline option for Xen To avoid emulation of TSC access from a domU after live migration add a global tolerance for the measured host kHz xen.suse_vtsc_tolerance.patch- fate#323662 Drop qemu-dm from xen-tools package The following tarball and patches have been removed qemu-xen-traditional-dir-remote.tar.bz2 VNC-Support-for-ExtendedKeyEvent-client-message.patch 0001-net-move-the-tap-buffer-into-TAPState.patch 0002-net-increase-tap-buffer-size.patch 0003-e1000-fix-access-4-bytes-beyond-buffer-end.patch 0004-e1000-secrc-support.patch 0005-e1000-multi-buffer-packet-support.patch 0006-e1000-clear-EOP-for-multi-buffer-descriptors.patch 0007-e1000-verify-we-have-buffers-upfront.patch 0008-e1000-check-buffer-availability.patch CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch CVE-2015-4037-qemut-smb-config-dir-name.patch CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch CVE-2016-7908-qemut-net-Infinite-loop-in-mcf_fec_do_tx.patch CVE-2016-7909-qemut-net-pcnet-infinite-loop-in-pcnet_rdra_addr.patch CVE-2016-8667-qemut-dma-rc4030-divide-by-zero-error-in-set_next_tick.patch CVE-2016-8669-qemut-char-divide-by-zero-error-in-serial_update_parameters.patch CVE-2016-8910-qemut-net-rtl8139-infinite-loop-while-transmit-in-Cplus-mode.patch CVE-2016-9921-qemut-display-cirrus_vga-divide-by-zero-in-cirrus_do_copy.patch CVE-2017-6505-qemut-usb-an-infinite-loop-issue-in-ohci_service_ed_list.patch CVE-2017-8309-qemut-audio-host-memory-leakage-via-capture-buffer.patch CVE-2017-9330-qemut-usb-ohci-infinite-loop-due-to-incorrect-return-value.patch blktap.patch cdrom-removable.patch xen-qemu-iscsi-fix.patch qemu-security-etch1.patch xen-disable-qemu-monitor.patch xen-hvm-default-bridge.patch qemu-ifup-set-mtu.patch ioemu-vnc-resize.patch capslock_enable.patch altgr_2.patch log-guest-console.patch bdrv_open2_fix_flags.patch bdrv_open2_flags_2.patch ioemu-7615-qcow2-fix-alloc_cluster_link_l2.patch qemu-dm-segfault.patch bdrv_default_rwflag.patch kernel-boot-hvm.patch ioemu-watchdog-support.patch ioemu-watchdog-linkage.patch ioemu-watchdog-ib700-timer.patch ioemu-hvm-pv-support.patch pvdrv_emulation_control.patch ioemu-disable-scsi.patch ioemu-disable-emulated-ide-if-pv.patch xenpaging.qemu.flush-cache.patch ioemu-devicemodel-include.patch - Cleanup spec file and remove unused KMP patches kmp_filelist supported_module.patch xen_pvonhvm.xen_emul_unplug.patch- bsc#1002573 - Optimize LVM functions in block-dmmd block-dmmd- Record initial Xen dmesg in /var/log/xen/xen-boot.log for supportconfig. Keep previous log in /var/log/xen/xen-boot.prev.log- Remove storytelling from description in xen.rpm- Update to Xen 4.9.0 FCS (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update block-dmmd script (bsc#1002573) block-dmmd- Update to Xen 4.9.0-rc8+ (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 gcc7-arm.patch - Drop gcc7-error-xenpmd.patch- Update to Xen 4.9.0-rc8 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1042160 - VUL-1: CVE-2017-9330: xen: usb: ohci: infinite loop due to incorrect return value CVE-2017-9330-qemut-usb-ohci-infinite-loop-due-to-incorrect-return-value.patch- bsc#1037243 - VUL-1: CVE-2017-8309: xen: audio: host memory leakage via capture buffer CVE-2017-8309-qemut-audio-host-memory-leakage-via-capture-buffer.patch- Update to Xen 4.9.0-rc7 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update to Xen 4.9.0-rc6 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1031343 - xen fails to build with GCC 7 gcc7-mini-os.patch gcc7-xen.patch- bsc#1031343 - xen fails to build with GCC 7 gcc7-error-xenpmd.patch- Update to Xen 4.9.0-rc5 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 - Drop xen-tools-pkgconfig-xenlight.patch- bsc#1037779 - xen breaks kexec-tools build xen-tools-pkgconfig-xenlight.patch- Update to Xen 4.9.0-rc4 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1036146 - sles12sp2 xen VM dumps core to wrong path xen.spec- Update to Xen 4.9.0-rc3 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 aarch64-maybe-uninitialized.patch- Update to Xen 4.9.0-rc2 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update to Xen 4.9.0-rc1 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 ioemu-devicemodel-include.patch - Dropped patches contained in new tarball xen-4.8.0-testing-src.tar.bz2 0001-xenstore-let-write_node-and-some-callers-return-errn.patch 0002-xenstore-undo-function-rename.patch 0003-xenstore-rework-of-transaction-handling.patch 584806ce-x86emul-correct-PUSHF-POPF.patch 584fc649-fix-determining-when-domain-creation-is-complete.patch 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch 58510cac-x86emul-MOVNTI-no-REP-prefixes.patch 58526ccc-x86emul-64bit-ignore-most-segment-bases-in-align-check.patch 5853ed37-VT-d-correct-dma_msi_set_affinity.patch 5853ee07-x86emul-CMPXCHG16B-aligned-operand.patch 58580060-x86-emul-correct-SYSCALL-eflags-handling.patch 585aa3c5-x86-force-EFLAGS-IF-on-upon-exit-to-PV.patch 585aa407-x86-HVM-NULL-check-before-using-VMFUNC-hook.patch 585bd5fe-x86-emul-correct-VMFUNC-return-value-handling.patch 586ba81c-x86-cpu-dont-update-this_cpu-for-guest-get_cpu_vendor.patch 587d04d6-x86-xstate-fix-array-overrun-with-LWP.patch 587de4a9-x86emul-VEX-B-ignored-in-compat-mode.patch 5882129d-x86emul-LOCK-check-adjustments.patch 58821300-x86-segment-attribute-handling.patch 58873c1f-x86emul-correct-FPU-stub-asm-constraints.patch 58873c80-x86-hvm-do-not-set-msr_tsc_adjust-on-.patch 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5887888f-credit2-never-consider-CPUs-outside-of-pool.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5888b1b3-x86-emulate-dont-assume-addr_size-32-implies-protmode.patch 5899cbd9-EPT-allow-wrcomb-MMIO-mappings-again.patch 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch 58a44771-IOMMU-always-call-teardown-callback.patch 58a48ccc-x86-fix-p2m_flush_table-for-non-nested.patch 58a59f4b-libxl-correct-xenstore-entry-for-empty-cdrom.patch 58a70d94-VMX-fix-VMCS-race-on-cswitch-paths.patch 58ac1f3f-VMX-dont-leak-host-syscall-MSRs.patch 58b5a2de-x86-correct-Xens-idea-of-its-memory-layout.patch 58b6fd42-credit2-always-mark-a-tickled-pCPU-as-tickled.patch 58b6fd42-credit2-dont-miss-accounting-during-credit-reset.patch 58cbf682-x86-EFI-avoid-overrunning-mb_modules.patch 58cf9200-x86-EFI-avoid-IOMMU-faults-on-tail-gap.patch 58cf9260-x86-EFI-avoid-Xen-when-looking-for-mod-kexec-pos.patch 58cf9277-x86-time-dont-use-vTSC-if-host-guest-freqs-match.patch 58d25ea2-xenstore-add-missing-checks-for-allocation-failure.patch 58d91365-sched-dont-call-wrong-hook-via-VCPU2OP.patch CVE-2017-2615-qemut-display-cirrus-oob-access-while-doing-bitblt-copy-backward-mode.patch CVE-2017-2620-xsa209-qemut-cirrus_bitblt_cputovideo-does-not-check-if-memory-region-safe.patch glibc-2.25-compatibility-fix.patch xs-09-add_change_node-params.patch xs-10-call-add_change_node.patch xs-11-tdb-record-header.patch xs-12-node-gen-count.patch xs-13-read-directory-part-support.patch xs-14-command-array.patch xs-15-command-return-val.patch xs-16-function-static.patch xs-17-arg-parsing.patch xs-18-default-buffer.patch xs-19-handle-alloc-failures.patch xs-20-tdb-version.patch xs-21-empty-tdb-database.patch xs-22-reopen_log-fix.patch xs-23-XS_DEBUG-rename.patch xs-24-xenstored_control.patch xs-25-control-enhance.patch xs-26-log-control.patch xs-27-memory-report.patch xs-28-remove-talloc-report.patch xs-29-define-off_t.patch xsa206-0001-xenstored-apply-a-write-transaction-rate-limit.patch xsa206-0002-xenstored-Log-when-the-write-transaction-rate-limit.patch- bsc#1022703 - Xen HVM guest with OVMF hangs with unattached CDRom 58a59f4b-libxl-correct-xenstore-entry-for-empty-cdrom.patch- bsc#1015348 - L3: libvirtd does not start during boot suse-xendomains-service.patch- bsc#1014136 - Partner-L3: kdump can't dump a kernel on SLES12-SP2 with Xen hypervisor. 58cf9260-x86-EFI-avoid-Xen-when-looking-for-mod-kexec-pos.patch - bsc#1026236 - L3: Paravirtualized vs. fully virtualized migration - latter one much faster 58cf9277-x86-time-dont-use-vTSC-if-host-guest-freqs-match.patch - Upstream patch from Jan 58cbf682-x86-EFI-avoid-overrunning-mb_modules.patch 58cf9200-x86-EFI-avoid-IOMMU-faults-on-tail-gap.patch 58d91365-sched-dont-call-wrong-hook-via-VCPU2OP.patch- bsc#1022555 - L3: Timeout in "execution of /etc/xen/scripts/block add" 58d25ea2-xenstore-add-missing-checks-for-allocation-failure.patch 0001-xenstore-let-write_node-and-some-callers-return-errn.patch 0002-xenstore-undo-function-rename.patch 0003-xenstore-rework-of-transaction-handling.patch - bsc#1030144 - VUL-0: xen: xenstore denial of service via repeated update (XSA-206) xsa206-0001-xenstored-apply-a-write-transaction-rate-limit.patch xsa206-0002-xenstored-Log-when-the-write-transaction-rate-limit.patch - bsc#1029827 - Forward port xenstored xs-09-add_change_node-params.patch xs-10-call-add_change_node.patch xs-11-tdb-record-header.patch xs-12-node-gen-count.patch xs-13-read-directory-part-support.patch xs-14-command-array.patch xs-15-command-return-val.patch xs-16-function-static.patch xs-17-arg-parsing.patch xs-18-default-buffer.patch xs-19-handle-alloc-failures.patch xs-20-tdb-version.patch xs-21-empty-tdb-database.patch xs-22-reopen_log-fix.patch xs-23-XS_DEBUG-rename.patch xs-24-xenstored_control.patch xs-25-control-enhance.patch xs-26-log-control.patch xs-27-memory-report.patch xs-28-remove-talloc-report.patch xs-29-define-off_t.patch- bsc#1029128 - fix make xen to really produce xen.efi with gcc48- bsc#1028235 - VUL-0: CVE-2017-6505: xen: qemu: usb: an infinite loop issue in ohci_service_ed_list CVE-2017-6505-qemut-usb-an-infinite-loop-issue-in-ohci_service_ed_list.patch - Upstream patches from Jan (bsc#1027519) 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5899cbd9-EPT-allow-wrcomb-MMIO-mappings-again.patch 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch 58a44771-IOMMU-always-call-teardown-callback.patch 58a48ccc-x86-fix-p2m_flush_table-for-non-nested.patch 58a70d94-VMX-fix-VMCS-race-on-cswitch-paths.patch 58ac1f3f-VMX-dont-leak-host-syscall-MSRs.patch 58b5a2de-x86-correct-Xens-idea-of-its-memory-layout.patch 58b6fd42-credit2-always-mark-a-tickled-pCPU-as-tickled.patch 58b6fd42-credit2-dont-miss-accounting-during-credit-reset.patch- bsc#1027654 - XEN fails to build against glibc 2.25 glibc-2.25-compatibility-fix.patch libxl.pvscsi.patch- fate#316613: Refresh and enable libxl.pvscsi.patch- bsc#1024834 - VUL-0: CVE-2017-2620: xen: cirrus_bitblt_cputovideo does not check if memory region is safe (XSA-209) CVE-2017-2620-xsa209-qemut-cirrus_bitblt_cputovideo-does-not-check-if-memory-region-safe.patch- bsc#1023948 - [pvusb][sles12sp3][openqa] Segmentation fault happened when adding usbctrl devices via xl 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch- Upstream patches from Jan (bsc#1027519) 587d04d6-x86-xstate-fix-array-overrun-with-LWP.patch 587de4a9-x86emul-VEX-B-ignored-in-compat-mode.patch 5882129d-x86emul-LOCK-check-adjustments.patch 58821300-x86-segment-attribute-handling.patch 58873c1f-x86emul-correct-FPU-stub-asm-constraints.patch 58873c80-x86-hvm-do-not-set-msr_tsc_adjust-on-.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5887888f-credit2-never-consider-CPUs-outside-of-pool.patch 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5888b1b3-x86-emulate-dont-assume-addr_size-32-implies-protmode.patch- bsc#1023004 - VUL-0: CVE-2017-2615: qemu: display: cirrus: oob access while doing bitblt copy backward mode CVE-2017-2615-qemut-display-cirrus-oob-access-while-doing-bitblt-copy-backward-mode.patch- fate#322313 and fate#322150 require the acpica package ported to aarch64 which Xen 4.8 needs to build. Temporarily disable aarch64 until these fates are complete. xen.spec- bsc#1021952 - Virutalization/xen: Bug xen-tools missing /usr/bin/domu-xenstore; guests fail to launch tmp_build.patch xen.spec- No systemd presets for 42.3+ and SLE12SP3+ (bsc#1012842)- bsc#1007224 - broken symlinks in /usr/share/doc/packages/xen/misc/ xen.spec- 585aa3c5-x86-force-EFLAGS-IF-on-upon-exit-to-PV.patch Replaces xsa202.patch (bsc#1014298) - 585aa407-x86-HVM-NULL-check-before-using-VMFUNC-hook.patch Replaces xsa203.patch (bsc#1014300) - 58580060-x86-emul-correct-SYSCALL-eflags-handling.patch Replaces xsa204.patch (bsc#1016340) - Upstream patches from Jan 58526ccc-x86emul-64bit-ignore-most-segment-bases-in-align-check.patch 5853ed37-VT-d-correct-dma_msi_set_affinity.patch 5853ee07-x86emul-CMPXCHG16B-aligned-operand.patch 585bd5fe-x86-emul-correct-VMFUNC-return-value-handling.patch 586ba81c-x86-cpu-dont-update-this_cpu-for-guest-get_cpu_vendor.patch- bsc#1015169 - VUL-0: CVE-2016-9921, CVE-2016-9922: xen: qemu: display: cirrus_vga: a divide by zero in cirrus_do_copy CVE-2016-9921-qemut-display-cirrus_vga-divide-by-zero-in-cirrus_do_copy.patch- bsc#1016340 - VUL-0: CVE-2016-10013: xen: x86: Mishandling of SYSCALL singlestep during emulation (XSA-204) xsa204.patch- bsc#1012651 - VUL-0: CVE-2016-9932: xen: x86 CMPXCHG8B emulation fails to ignore operand size override (XSA-200) 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch- bsc#1014298 - VUL-0: CVE-2016-10024: xen: x86 PV guests may be able to mask interrupts (XSA-202) xsa202.patch - bsc#1014300 - VUL-0: CVE-2016-10025: xen: x86: missing NULL pointer check in VMFUNC emulation (XSA-203) xsa203.patch - Upstream patches from Jan 584806ce-x86emul-correct-PUSHF-POPF.patch 584fc649-fix-determining-when-domain-creation-is-complete.patch 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch 58510cac-x86emul-MOVNTI-no-REP-prefixes.patch- Update to Xen 4.8 FCS xen-4.8.0-testing-src.tar.bz2 - Dropped xen-4.7.1-testing-src.tar.bz2 0001-libxc-Rework-extra-module-initialisation.patch 0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch 0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch 0004-firmware-makefile-install-BIOS-blob.patch 0005-libxl-Load-guest-BIOS-from-file.patch 0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch 0007-hvmloader-Grab-the-hvm_start_info-pointer.patch 0008-hvmloader-Locate-the-BIOS-blob.patch 0009-hvmloader-Check-modules-whereabouts-in-perform_tests.patch 0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch 0011-hvmloader-Load-OVMF-from-modules.patch 0012-hvmloader-Specific-bios_load-function-required.patch 0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch 0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch 57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch 576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 5769106e-x86-generate-assembler-equates-for-synthesized.patch 57a1e603-x86-time-adjust-local-system-time-initialization.patch 57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch 57a30261-x86-support-newer-Intel-CPU-models.patch 5810a9cc-x86-emul-Correct-decoding-of-SReg3-operands.patch 581b2c3b-x86-emul-reject-LGDT-LIDT-with-non-canonical-addresses.patch 581b647a-x86emul-L-S-G-I-DT-ignore-opsz-overrides-in-64-bit-mode.patch 58249392-x86-svm-dont-clobber-eax-edx-if-RDMSR-intercept-fails.patch 582c35d6-x86-vmx-correct-long-mode-check-in-vmx_cpuid_intercept.patch 582c35ee-x86-traps-dont-call-hvm_hypervisor_cpuid_leaf-for-PV.patch 58343dc2-x86-hvm-Fix-the-handling-of-non-present-segments.patch 58343df8-x86-HVM-dont-load-LDTR-with-VM86-mode-attrs-during-task-switch.patch 58343e24-x86-PV-writes-of-fs-and-gs-base-MSRs-require-canonical-addresses.patch 58343e9e-libelf-fix-stack-memory-leak-when-loading-32-bit-symbol-tables.patch 58343ec2-x86emul-fix-huge-bit-offset-handling.patch 58343f29-x86-emul-correct-the-IDT-entry-calculation-in-inject_swint.patch 58343f44-x86-svm-fix-injection-of-software-interrupts.patch 58343f79-pygrub-Properly-quote-results-when-returning-them-to-the-caller.patch CVE-2016-9381-xsa197-qemut.patch CVE-2016-9637-xsa199-qemut.patch- bsc#1011652 - VUL-0: xen: qemu ioport array overflow CVE-2016-9637-xsa199-qemut.patch- bsc#1009100 - VUL-0: CVE-2016-9386: XSA-191: xen: x86 null segments not always treated as unusable 58343dc2-x86-hvm-Fix-the-handling-of-non-present-segments.patch - bsc#1009103 - VUL-0: CVE-2016-9382: XSA-192: xen: x86 task switch to VM86 mode mis-handled 58343df8-x86-HVM-dont-load-LDTR-with-VM86-mode-attrs-during-task-switch.patch - bsc#1009104 - VUL-0: CVE-2016-9385: XSA-193: xen: x86 segment base write emulation lacking canonical address checks 58343e24-x86-PV-writes-of-fs-and-gs-base-MSRs-require-canonical-addresses.patch - bsc#1009105 - VUL-0: CVE-2016-9384: XSA-194: xen: guest 32-bit ELF symbol table load leaking host data 58343e9e-libelf-fix-stack-memory-leak-when-loading-32-bit-symbol-tables.patch - bsc#1009107 - VUL-0: CVE-2016-9383: XSA-195: xen: x86 64-bit bit test instruction emulation broken 58343ec2-x86emul-fix-huge-bit-offset-handling.patch - bsc#1009108 - VUL-0: CVE-2016-9377,CVE-2016-9378: XSA-196: xen: x86 software interrupt injection mis-handled 58343f29-x86-emul-correct-the-IDT-entry-calculation-in-inject_swint.patch 58343f44-x86-svm-fix-injection-of-software-interrupts.patch - bsc#1009109 - VUL-0: CVE-2016-9381: XSA-197: xen: qemu incautious about shared ring processing CVE-2016-9381-xsa197-qemut.patch - bsc#1009111 - VUL-0: CVE-2016-9379,CVE-2016-9380: XSA-198: xen: delimiter injection vulnerabilities in pygrub 58343f79-pygrub-Properly-quote-results-when-returning-them-to-the-caller.patch - Upstream patches from Jan 581b2c3b-x86-emul-reject-LGDT-LIDT-with-non-canonical-addresses.patch 581b647a-x86emul-L-S-G-I-DT-ignore-opsz-overrides-in-64-bit-mode.patch 58249392-x86-svm-dont-clobber-eax-edx-if-RDMSR-intercept-fails.patch 582c35d6-x86-vmx-correct-long-mode-check-in-vmx_cpuid_intercept.patch 582c35ee-x86-traps-dont-call-hvm_hypervisor_cpuid_leaf-for-PV.patch- Update to Xen Version 4.7.1 xen-4.7.1-testing-src.tar.bz2 - Dropped patches contained in new tarball xen-4.7.0-testing-src.tar.bz2 575e9ca0-nested-vmx-Validate-host-VMX-MSRs-before-accessing-them.patch 57640448-xen-sched-use-default-scheduler-upon-an-invalid-sched.patch 57973099-have-schedulers-revise-initial-placement.patch 579730e6-remove-buggy-initial-placement-algorithm.patch 57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch 57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch 57ac6316-don-t-restrict-DMA-heap-to-node-0.patch 57b71fc5-x86-EFI-don-t-apply-relocations-to-l-2-3-_bootmap.patch 57b7447b-dont-permit-guest-to-populate-PoD-pages-for-itself.patch 57c4412b-x86-HVM-add-guarding-logic-for-VMX-specific-code.patch 57c57f73-libxc-correct-max_pfn-calculation-for-saving-domain.patch 57c805bf-x86-levelling-restrict-non-architectural-OSXSAVE-handling.patch 57c805c1-x86-levelling-pass-vcpu-to-ctxt_switch_levelling.patch 57c805c3-x86-levelling-provide-architectural-OSXSAVE-handling.patch 57c82be2-x86-32on64-adjust-call-gate-emulation.patch 57c93e52-fix-error-in-libxl_device_usbdev_list.patch 57c96df3-credit1-fix-a-race-when-picking-initial-pCPU.patch 57c96e2c-x86-correct-PT_NOTE-file-position.patch 57cfed43-VMX-correct-feature-checks-for-MPX-and-XSAVES.patch 57d1563d-x86-32on64-don-t-allow-recursive-page-tables-from-L3.patch 57d15679-x86-emulate-Correct-boundary-interactions-of-emulated-insns.patch 57d1569a-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch 57d18642-hvm-fep-Allow-test-insns-crossing-1-0-boundary.patch 57d18642-x86-segment-Bounds-check-accesses-to-emulation-ctxt-seg_reg.patch 57d7ca5f-x86-domctl-fix-TOCTOU-race-in-XEN_DOMCTL_getvcpuextstate.patch 57d7ca64-x86-domctl-fix-migration-of-guests-not-using-xsave.patch 57da8883-credit1-fix-mask-to-be-used-for-tickling.patch 57da8883-credit2-properly-schedule-migration-of-running-vcpu.patch 57dfb1c5-x86-Intel-hide-CPUID-faulting-capability-from-guests.patch 57e93e1d-x86emul-correct-loading-of-ss.patch 57e93e4a-x86emul-don-t-allow-null-selector-for-LTR.patch 57e93e89-x86-AMD-apply-erratum-665-workaround.patch 57ee6cbc-credit1-return-time-remaining-to-limit-as-next-timeslice.patch 57f3a8ee-x86emul-honor-guest-CR0-TS-and-CR0-EM.patch 57fb6a91-x86-defer-not-present-segment-checks.patch 5800c51d-x86-hvm-Clobber-cs-L-when-LME-becomes-set.patch 5800caec-x86emul-fix-pushing-of-selector-registers.patch 5800cb06-x86-Viridian-don-t-depend-on-undefined-register-state.patch 580e29f9-x86-MISALIGNSSE-feature-depends-on-SSE.patch 57dfb2ff-x86-Intel-Broadwell-no-PKG_C8-10_RESIDENCY-MSRs.patch- bsc#1004981 - Xen RPM doesn't contain debug hypervisor for EFI systems xen.spec- bsc#1000106 - VUL-0: CVE-2016-7777: xen: CR0.TS and CR0.EM not always honored for x86 HVM guests (XSA-190) 57f3a8ee-x86emul-honor-guest-CR0-TS-and-CR0-EM.patch - bsc#996191 - [XEN][acpi]residency -n 88 -c will cause xen panic on broadwell-ep 57dfb2ff-x86-Intel-Broadwell-no-PKG_C8-10_RESIDENCY-MSRs.patch - Upstream patches from Jan 57d7ca5f-x86-domctl-fix-TOCTOU-race-in-XEN_DOMCTL_getvcpuextstate.patch 57d7ca64-x86-domctl-fix-migration-of-guests-not-using-xsave.patch 57da8883-credit1-fix-mask-to-be-used-for-tickling.patch 57da8883-credit2-properly-schedule-migration-of-running-vcpu.patch 57dfb1c5-x86-Intel-hide-CPUID-faulting-capability-from-guests.patch 57e93e1d-x86emul-correct-loading-of-ss.patch 57e93e4a-x86emul-don-t-allow-null-selector-for-LTR.patch 57e93e89-x86-AMD-apply-erratum-665-workaround.patch 57ee6cbc-credit1-return-time-remaining-to-limit-as-next-timeslice.patch 57fb6a91-x86-defer-not-present-segment-checks.patch 5800c51d-x86-hvm-Clobber-cs-L-when-LME-becomes-set.patch 5800caec-x86emul-fix-pushing-of-selector-registers.patch 5800cb06-x86-Viridian-don-t-depend-on-undefined-register-state.patch 580e29f9-x86-MISALIGNSSE-feature-depends-on-SSE.patch 5810a9cc-x86-emul-Correct-decoding-of-SReg3-operands.patch- bsc#1007941 - Xen tools limit the number of vcpus to 256 when the system has 384 xen-arch-kconfig-nr_cpus.patch- bsc#1007157 - VUL-0: CVE-2016-8910: xen: net: rtl8139: infinite loop while transmit in C+ mode CVE-2016-8910-qemut-net-rtl8139-infinite-loop-while-transmit-in-Cplus-mode.patch- bsc#1005004 - CVE-2016-8667: xen: dma: rc4030 divide by zero error in set_next_tick CVE-2016-8667-qemut-dma-rc4030-divide-by-zero-error-in-set_next_tick.patch - bsc#1005005 - VUL-0: CVE-2016-8669: xen: char: divide by zero error in serial_update_parameters CVE-2016-8669-qemut-char-divide-by-zero-error-in-serial_update_parameters.patch- bsc#1003030 - VUL-0: CVE-2016-7908: xen: net: Infinite loop in mcf_fec_do_tx CVE-2016-7908-qemut-net-Infinite-loop-in-mcf_fec_do_tx.patch - bsc#1003032 - VUL-0: CVE-2016-7909: xen: net: pcnet: infinite loop in pcnet_rdra_addr CVE-2016-7909-qemut-net-pcnet-infinite-loop-in-pcnet_rdra_addr.patch- bsc#995785 - VUL-0: CVE-2016-7092: xen: x86: Disallow L3 recursive pagetable for 32-bit PV guests (XSA-185) 57d1563d-x86-32on64-don-t-allow-recursive-page-tables-from-L3.patch - bsc#995789 - VUL-0: CVE-2016-7093: xen: x86: Mishandling of instruction pointer truncation during emulation (XSA-186) 57d15679-x86-emulate-Correct-boundary-interactions-of-emulated-insns.patch 57d18642-hvm-fep-Allow-test-insns-crossing-1-0-boundary.patch - bsc#995792 - VUL-0: CVE-2016-7094: xen: x86 HVM: Overflow of sh_ctxt->seg_reg[] (XSA-187) 57d1569a-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch 57d18642-x86-segment-Bounds-check-accesses-to-emulation-ctxt-seg_reg.patch - bsc#991934 - xen hypervisor crash in csched_acct 57c96df3-credit1-fix-a-race-when-picking-initial-pCPU.patch - Upstream patches from Jan 57c4412b-x86-HVM-add-guarding-logic-for-VMX-specific-code.patch 57c57f73-libxc-correct-max_pfn-calculation-for-saving-domain.patch 57c805bf-x86-levelling-restrict-non-architectural-OSXSAVE-handling.patch 57c805c1-x86-levelling-pass-vcpu-to-ctxt_switch_levelling.patch 57c805c3-x86-levelling-provide-architectural-OSXSAVE-handling.patch 57c82be2-x86-32on64-adjust-call-gate-emulation.patch 57c96e2c-x86-correct-PT_NOTE-file-position.patch 57cfed43-VMX-correct-feature-checks-for-MPX-and-XSAVES.patch- bsc#979002 - add 60-persistent-xvd.rules and helper script also to initrd, add the relevant dracut helper- bnc#953518 - unplug also SCSI disks in qemu-xen-traditional for upstream unplug protocol- bsc#989679 - [pvusb feature] USB device not found when 'virsh detach-device guest usb.xml' 57c93e52-fix-error-in-libxl_device_usbdev_list.patch- bsc#992224 - [HPS Bug] During boot of Xen Hypervisor, Failed to get contiguous memory for DMA from Xen 57ac6316-don-t-restrict-DMA-heap-to-node-0.patch - bsc#978755 - xen uefi systems fail to boot - bsc#983697 - SLES12 SP2 Xen UEFI mode cannot boot 57b71fc5-x86-EFI-don-t-apply-relocations-to-l-2-3-_bootmap.patch - Upstream patch from Jan 57b7447b-dont-permit-guest-to-populate-PoD-pages-for-itself.patch- spec: to stay compatible with the in-tree qemu-xen binary, use /usr/bin/qemu-system-i386 instead of /usr/bin/qemu-system-x86_64 bsc#986164- bsc#970135 - new virtualization project clock test randomly fails on Xen 576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 5769106e-x86-generate-assembler-equates-for-synthesized.patch 57a1e603-x86-time-adjust-local-system-time-initialization.patch 57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch - bsc#991934 - xen hypervisor crash in csched_acct 57973099-have-schedulers-revise-initial-placement.patch 579730e6-remove-buggy-initial-placement-algorithm.patch - bsc#988675 - VUL-0: CVE-2016-6258: xen: x86: Privilege escalation in PV guests (XSA-182) 57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch - bsc#988676 - VUL-0: CVE-2016-6259: xen: x86: Missing SMAP whitelisting in 32-bit exception / event delivery (XSA-183) 57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch - Upstream patches from Jan 57a30261-x86-support-newer-Intel-CPU-models.patch- bsc#985503 - vif-route broken vif-route.patch- bsc#978413 - PV guest upgrade from sles11sp4 to sles12sp2 alpha3 failed on sles11sp4 xen host. pygrub-handle-one-line-menu-entries.patch- bsc#990843 - VUL-1: CVE-2016-6351: xen: qemu: scsi: esp: OOB write access in esp_do_dma CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch- bsc#900418 - Dump cannot be performed on SLES12 XEN 57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch - Upstream patches from Jan 575e9ca0-nested-vmx-Validate-host-VMX-MSRs-before-accessing-them.patch 57640448-xen-sched-use-default-scheduler-upon-an-invalid-sched.patch- fate#319989 - Update to Xen 4.7 FCS xen-4.7.0-testing-src.tar.bz2 - Drop CVE-2014-3672-qemut-xsa180.patch- bsc#954872 - script block-dmmd not working as expected - libxl: error: libxl_dm.c (Additional fixes) block-dmmd- Convert with_stubdom into build_conditional to allow adjusting via prjconf - Convert with_debug into build_conditional to allow adjusting via prjconf- bsc#979002 - add 60-persistent-xvd.rules and helper script to xen-tools-domU to simplify transition to pvops based kernels- Convert with_oxenstored into build_conditional to allow adjusting via prjconf (fate#320836)- bsc#983984 - VUL-0: CVE-2016-5338: xen: qemu: scsi: esp: OOB r/w access while processing ESP_FIFO CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch - bsc#982960 - VUL-0: CVE-2016-5238: xen: qemu: scsi: esp: OOB write when using non-DMA mode in get_cmd CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch- fate#319989 - Update to Xen 4.7 RC5 xen-4.7.0-testing-src.tar.bz2- fate#319989 - Update to Xen 4.7 RC4 xen-4.7.0-testing-src.tar.bz2 - Dropped xen.pkgconfig-4.7.patch xsa164.patch- bsc#981264 - VUL-0: CVE-2014-3672: xen: Unrestricted qemu logging (XSA-180) CVE-2014-3672-qemut-xsa180.patch- bsc#980724 - VUL-0: CVE-2016-4441: Qemu: scsi: esp: OOB write while writing to 's->cmdbuf' in get_cmd CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch - bsc#980716 - VUL-0: CVE-2016-4439: xen: scsi: esp: OOB write while writing to 's->cmdbuf' in esp_reg_write CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch- fate#319989 - Update to Xen 4.7 RC3 xen-4.7.0-testing-src.tar.bz2 - Dropped libxl-remove-cdrom-cachemode.patch x86-PoD-only-reclaim-if-needed.patch gcc6-warnings-as-errors.patch- bsc#954872 - script block-dmmd not working as expected - libxl: error: libxl_dm.c (another modification) block-dmmd- fate#319989 - Update to Xen 4.7 RC2 xen-4.7.0-testing-src.tar.bz2- bsc#961600 - L3: poor performance when Xen HVM domU configured with max memory > current memory x86-PoD-only-reclaim-if-needed.patch- Mark SONAMEs and pkgconfig as xen 4.7 xen.pkgconfig-4.7.patch- bsc#977329 - Xen: Cannot boot HVM guests with empty cdrom libxl-remove-cdrom-cachemode.patch- fate#319989 - Update to Xen 4.7 RC1 xen-4.7.0-testing-src.tar.bz2- fate#316614: set migration constraints from cmdline restore libxl.set-migration-constraints-from-cmdline.patch- Remove obsolete patch for xen-kmp magic_ioport_compat.patch- fate#316613: update to v12 libxl.pvscsi.patch- Update to the latest Xen 4.7 pre-release c2994f86 Drop libxl.migrate-legacy-stream-read.patch- bnc#972756 - Can't migrate HVM guest from SLES12SP1 Xen host to SLES12SP2 Alpha 1 host using xl migrate libxl.migrate-legacy-stream-read.patch- Add patches from proposed upstream series to load BIOS's from the toolstack instead of embedding in hvmloader http://lists.xenproject.org/archives/html/xen-devel/2016-03/msg01626.html 0001-libxc-Rework-extra-module-initialisation.patch, 0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch, 0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch, 0004-firmware-makefile-install-BIOS-blob.patch, 0005-libxl-Load-guest-BIOS-from-file.patch, 0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch, 0007-hvmloader-Grab-the-hvm_start_info-pointer.patch, 0008-hvmloader-Locate-the-BIOS-blob.patch, 0009-hvmloader-Check-modules-whereabouts-in-perform_tests.patch, 0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch, 0011-hvmloader-Load-OVMF-from-modules.patch, 0012-hvmloader-Specific-bios_load-function-required.patch, 0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch, 0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch - Enable support for UEFI on x86_64 using the ovmf-x86_64-ms.bin firmware from qemu-ovmf-x86_64. The firmware is preloaded with Microsoft keys to more closely resemble firmware on real hardware FATE#320490- fate#319989: Update to Xen 4.7 (pre-release) xen-4.7.0-testing-src.tar.bz2 - Dropped: xen-4.6.1-testing-src.tar.bz2 55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch 5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch hotplug-Linux-block-performance-fix.patch set-mtu-from-bridge-for-tap-interface.patch xendomains-libvirtd-conflict.patch xsa154.patch xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa170.patch- Use system SeaBIOS instead of building/installing another one FATE#320638 Dropped files: seabios-dir-remote.tar.bz2 xen-c99-fix.patch xen.build-compare.seabios.patch- spec: drop BuildRequires that were only needed for qemu-xen- bsc#969377 - xen does not build with GCC 6 ipxe-use-rpm-opt-flags.patch gcc6-warnings-as-errors.patch- bsc#969351 - VUL-0: CVE-2016-2841: xen: net: ne2000: infinite loop in ne2000_receive CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch - Drop xsa154-fix.patch- Use system qemu instead of building/installing yet another qemu FATE#320638 - Dropped files qemu-xen-dir-remote.tar.bz2 CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch CVE-2015-4037-qemuu-smb-config-dir-name.patch CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch qemu-xen-enable-spice-support.patch qemu-xen-upstream-qdisk-cache-unsafe.patch tigervnc-long-press.patch xsa162-qemuu.patch- bsc#962321 - VUL-0: CVE-2016-1922: xen: i386: null pointer dereference in vapic_write() CVE-2016-1922-qemuu-i386-null-pointer-dereference-in-vapic_write.patch- bsc#968004 - VUL-0: CVE-2016-2538: xen: usb: integer overflow in remote NDIS control message handling CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch- bsc#954872 - L3: script block-dmmd not working as expected - libxl: error: libxl_dm.c block-dmmd - Update libxl to recognize dmmd and npiv prefix in disk spec xen.libxl.dmmd.patch- bsc#967101 - VUL-0: CVE-2016-2391: xen: usb: multiple eof_timers in ohci module leads to null pointer dereference CVE-2016-2391-qemuu-usb-null-pointer-dereference-in-ohci-module.patch CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch - bsc#967090 - VUL-0: CVE-2016-2392: xen: usb: null pointer dereference in remote NDIS control message handling CVE-2016-2392-qemuu-usb-null-pointer-dereference-in-NDIS-message-handling.patch- Update to Xen Version 4.6.1 xen-4.6.1-testing-src.tar.bz2 - Dropped patches now contained in tarball or unnecessary xen-4.6.0-testing-src.tar.bz2 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 5632129c-free-domain-s-vcpu-array.patch 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 563212e4-xenoprof-free-domain-s-vcpu-array.patch 563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch 56549f24-x86-vPMU-document-as-unsupported.patch 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch xsa155-qemut-qdisk-double-access.patch xsa155-qemut-xenfb.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa159.patch xsa160.patch xsa162-qemut.patch xsa165.patch xsa166.patch xsa167.patch xsa168.patch- bsc#965315 - VUL-0: CVE-2016-2270: xen: x86: inconsistent cachability flags on guest mappings (XSA-154) xsa154.patch - bsc#965317 - VUL-0: CVE-2016-2271: xen: VMX: guest user mode may crash guest with non-canonical RIP (XSA-170) xsa170.patch- bsc#965269 - VUL-1: CVE-2015-8619: xen: stack based OOB write in hmp_sendkey routine CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch- bsc#965156 - VUL-0: CVE-2015-6855: xen: ide: divide by zero issue CVE-2015-6855-qemuu-ide-divide-by-zero-issue.patch - bsc#965112 - VUL-0: CVE-2014-3640: xen: slirp: NULL pointer deref in sosendto() CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch- bsc#964947 - VUL-0: CVE-2015-5278: xen: Infinite loop in ne2000_receive() function CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch - bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch- bsc#964644 - VUL-0: CVE-2013-4533: xen pxa2xx: buffer overrun on incoming migration CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch - bsc#964925 - VUL-0: CVE-2014-0222: xen: qcow1: validate L2 table size to avoid integer overflows CVE-2014-0222-blktap-qcow1-validate-l2-table-size.patch - Dropped CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch- bsc#964415 - VUL-1: CVE-2016-2198: xen: usb: ehci null pointer dereference in ehci_caps_write CVE-2016-2198-qemuu-usb-ehci-null-pointer-dereference-in-ehci_caps_write.patch - bsc#964452 - VUL-0: CVE-2013-4534: xen: openpic: buffer overrun on incoming migration CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch- bsc#963783 - VUL-1: CVE-2016-1981: xen: net: e1000 infinite loop in start_xmit and e1000_receive_iov routines CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch- bsc#962758 - VUL-0: CVE-2013-4539: xen: tsc210x: buffer overrun on invalid state load CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch- bsc#962632 - VUL-0: CVE-2015-1779: xen: vnc: insufficient resource limiting in VNC websockets decoder CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch - bsc#962642 - VUL-0: CVE-2013-4537: xen: ssi-sd: buffer overrun on invalid state load CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch - bsc#962627 - VUL-0: CVE-2014-7815: xen: vnc: insufficient bits_per_pixel from the client sanitization CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch- bsc#962335 - VUL-0: CVE-2013-4538: xen: ssd0323: fix buffer overun on invalid state CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch - bsc#962360 - VUL-0: CVE-2015-7512: xen: net: pcnet: buffer overflow in non-loopback mode CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch- bsc#961692 - VUL-0: CVE-2016-1714: xen: nvram: OOB r/w access in processing firmware configurations CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch- bsc#961358 - VUL-0: CVE-2015-8613: xen: qemu: scsi: stack based buffer overflow in megasas_ctrl_get_info CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch - bsc#961332 - VUL-0: CVE-2016-1568: xen: Qemu: ide: ahci use-after-free vulnerability in aio port commands CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch- bsc#959695 - missing docs for xen xen.spec- bsc#960862 - VUL-0: CVE-2016-1571: xen: VMX: intercept issue with INVLPG on non-canonical address (XSA-168) xsa168.patch - bsc#960861 - VUL-0: CVE-2016-1570: xen: PV superpage functionality missing sanity checks (XSA-167) xsa167.patch - bsc#960836 - VUL-0: CVE-2015-8744: xen: net: vmxnet3: incorrect l2 header validation leads to a crash via assert(2) call CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch- bsc#960707 - VUL-0: CVE-2015-8745: xen: reading IMR registers leads to a crash via assert(2) call CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch - bsc#960726 - VUL-0: CVE-2015-8743: xen: ne2000: OOB memory access in ioport r/w functions CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch- bsc#960093 - VUL-0: CVE-2015-8615: xen: x86: unintentional logging upon guest changing callback method (XSA-169) 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch- Adjust xen-dom0-modules.service to run Before xenstored.service instead of proc-xen.mount to workaround a bug in systemd "design" (bnc#959845)- bsc#959387 - VUL-0: CVE-2015-8568 CVE-2015-8567: xen: qemu: net: vmxnet3: host memory leakage CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch- bsc#957988 - VUL-0: CVE-2015-8550: xen: paravirtualized drivers incautious about shared memory contents (XSA-155) xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemut-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa155-qemut-xenfb.patch - bsc#959006 - VUL-0: CVE-2015-8558: xen: qemu: usb: infinite loop in ehci_advance_state results in DoS CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch - bsc#958918 - VUL-0: CVE-2015-7549: xen: qemu pci: null pointer dereference issue CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch - bsc#958493 - VUL-0: CVE-2015-8504: xen: qemu: ui: vnc: avoid floating point exception CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch - bsc#958007 - VUL-0: CVE-2015-8554: xen: qemu-dm buffer overrun in MSI-X handling (XSA-164) xsa164.patch - bsc#958009 - VUL-0: CVE-2015-8555: xen: information leak in legacy x86 FPU/XMM initialization (XSA-165) xsa165.patch - bsc#958523 - VUL-0: xen: ioreq handling possibly susceptible to multiple read issue (XSA-166) xsa166.patch- bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch - Upstream patches from Jan 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch) 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 56544a57-VMX-fix-adjust-trap-injection.patch 56546ab2-sched-fix-insert_vcpu-locking.patch- bsc#956592 - VUL-0: xen: virtual PMU is unsupported (XSA-163) 56549f24-x86-vPMU-document-as-unsupported.patch - bsc#956408 - VUL-0: CVE-2015-8339, CVE-2015-8340: xen: XENMEM_exchange error handling issues (XSA-159) xsa159.patch - bsc#956409 - VUL-0: CVE-2015-8341: xen: libxl leak of pv kernel and initrd on error (XSA-160) xsa160.patch - bsc#956411 - VUL-0: CVE-2015-7504: xen: heap buffer overflow vulnerability in pcnet emulator (XSA-162) xsa162-qemuu.patch xsa162-qemut.patch - bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142) 5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch- fate#315712: XEN: Use the PVOPS kernel Turn off building the KMPs now that we are using the pvops kernel xen.spec- Upstream patches from Jan 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 5632129c-free-domain-s-vcpu-array.patch (Replaces CVE-2015-7969-xsa149.patch) 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 563212e4-xenoprof-free-domain-s-vcpu-array.patch 563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch) 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch - Dropped 55b0a2db-x86-MSI-track-guest-masking.patch- Use upstream variants of block-iscsi and block-nbd- Remove xenalyze.hg, its part of xen-4.6- Update to Xen Version 4.6.0 xen-4.6.0-testing-src.tar.bz2 mini-os.tar.bz2 blktap2-no-uninit.patch stubdom-have-iovec.patch - Renamed xsa149.patch to CVE-2015-7969-xsa149.patch - Dropped patches now contained in tarball or unnecessary xen-4.5.2-testing-src.tar.bz2 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch 54f4985f-libxl-fix-libvirtd-double-free.patch 55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 551ac326-xentop-add-support-for-qdisk.patch 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch 5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 554cc211-libxl-add-qxl.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch 5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch 5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch 5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch 5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch 5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch 5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch 55b0a218-x86-PCI-CFG-write-intercept.patch 55b0a255-x86-MSI-X-maskall.patch 55b0a283-x86-MSI-X-teardown.patch 55b0a2ab-x86-MSI-X-enable.patch blktapctrl-close-fifos.patch blktapctrl-default-to-ioemu.patch blktapctrl-disable-debug-printf.patch blktap-no-uninit.patch blktap-pv-cdrom.patch build-tapdisk-ioemu.patch ioemu-bdrv-open-CACHE_WB.patch ioemu-blktap-barriers.patch ioemu-blktap-fv-init.patch ioemu-blktap-image-format.patch ioemu-blktap-zero-size.patch libxl.set-migration-constraints-from-cmdline.patch local_attach_support_for_phy.patch pci-attach-fix.patch qemu-xen-upstream-megasas-buildtime.patch tapdisk-ioemu-logfile.patch tapdisk-ioemu-shutdown-fix.patch udev-rules.patch xen.build-compare.ipxe.patch xen.build-compare.mini-os.patch xen.build-compare.smbiosdate.patch xen.build-compare.vgabios.patch xen.build-compare.xen_compile_h.patch xl-coredump-file-location.patch- bsc#954405 - VUL-0: CVE-2015-8104: Xen: guest to host DoS by triggering an infinite loop in microcode via #DB exception - bsc#954018 - VUL-0: CVE-2015-5307: xen: x86: CPU lockup during fault delivery (XSA-156) CVE-2015-5307-xsa156.patch- Update to Xen 4.5.2 xen-4.5.2-testing-src.tar.bz2 - Drop the following xen-4.5.1-testing-src.tar.bz2 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 559bdde5-pull-in-latest-linux-earlycpio.patch 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch 560bd926-credit1-fix-tickling-when-it-happens-from-a-remote-pCPU.patch 560e6d34-x86-p2m-pt-tighten-conditions-of-IOMMU-mapping-updates.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch CVE-2015-4106-xsa131-9.patch CVE-2015-3259-xsa137.patch CVE-2015-7311-xsa142.patch CVE-2015-7835-xsa148.patch xsa139-qemuu.patch xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch xsa151.patch xsa152.patch xsa153-libxl.patch CVE-2015-5154-qemuu-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemuu-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch"- bsc#950704 - CVE-2015-7970 VUL-1: xen: x86: Long latency populate-on-demand operation is not preemptible (XSA-150) 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch- Upstream patches from Jan 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch- bsc#951845 - VUL-0: CVE-2015-7972: xen: x86: populate-on-demand balloon size inaccuracy can crash guests (XSA-153) xsa153-libxl.patch- bsc#950703 - VUL-1: CVE-2015-7969: xen: leak of main per-domain vcpu pointer array (DoS) (XSA-149) xsa149.patch - bsc#950705 - VUL-1: CVE-2015-7969: xen: x86: leak of per-domain profiling-related vcpu pointer array (DoS) (XSA-151) xsa151.patch - bsc#950706 - VUL-0: CVE-2015-7971: xen: x86: some pmu and profiling hypercalls log without rate limiting (XSA-152) xsa152.patch - Dropped 55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch 5604f239-x86-PV-properly-populate-descriptor-tables.patch- bsc#932267 - VUL-1: CVE-2015-4037: qemu,kvm,xen: insecure temporary file use in /net/slirp.c CVE-2015-4037-qemuu-smb-config-dir-name.patch CVE-2015-4037-qemut-smb-config-dir-name.patch - bsc#877642 - VUL-0: CVE-2014-0222: qemu: qcow1: validate L2 table size to avoid integer overflows CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch- bsc#950367 - VUL-0: CVE-2015-7835: xen: x86: Uncontrolled creation of large page mappings by PV guests (XSA-148) CVE-2015-7835-xsa148.patch- bsc#949138 - Setting vcpu affinity under Xen causes libvirtd abort 54f4985f-libxl-fix-libvirtd-double-free.patch- bsc#949046 - Increase %suse_version in SP1 to 1316 xen.spec - Update README.SUSE detailing dom0 ballooning recommendations- bsc#945167 - Running command ’ xl pci-assignable-add 03:10.1’ secondly show errors 55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch - Upstream patches from Jan 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f239-x86-PV-properly-populate-descriptor-tables.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch 560bd926-credit1-fix-tickling-when-it-happens-from-a-remote-pCPU.patch 560e6d34-x86-p2m-pt-tighten-conditions-of-IOMMU-mapping-updates.patch- bsc#941074 - VmError: Device 51728 (vbd) could not be connected. Hotplug scripts not working. hotplug-Linux-block-performance-fix.patch- bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142) CVE-2015-7311-xsa142.patch- bsc#945165 - Xl pci-attach show error with kernel of SLES 12 sp1 pci-attach-fix.patch- bsc#945164 - Xl destroy show error with kernel of SLES 12 sp1 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch- Upstream patches from Jan 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch- bsc#944463 - VUL-0: CVE-2015-5239: qemu-kvm: Integer overflow in vnc_client_read() and protocol_client_msg() CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch - bsc#944697 - VUL-1: CVE-2015-6815: qemu: net: e1000: infinite loop issue CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch- bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch- bsc#907514 - Bus fatal error & sles12 sudden reboot has been observed - bsc#910258 - SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984 - Bus fatal error & sles11-SP4 sudden reboot has been observed - bsc#923967 - Partner-L3: Bus fatal error & sles11-SP3 sudden reboot has been observed 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 55b0a218-x86-PCI-CFG-write-intercept.patch 55b0a255-x86-MSI-X-maskall.patch 55b0a283-x86-MSI-X-teardown.patch 55b0a2ab-x86-MSI-X-enable.patch 55b0a2db-x86-MSI-track-guest-masking.patch - Upstream patches from Jan 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch - Dropped for upstream version x86-MSI-mask.patch x86-MSI-pv-unmask.patch x86-MSI-X-enable.patch x86-MSI-X-maskall.patch x86-MSI-X-teardown.patch x86-pci_cfg_okay.patch x86-PCI-CFG-write-intercept.patch- bsc#939712 - VUL-0: XSA-140: QEMU leak of uninitialized heap memory in rtl8139 device model xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch - bsc#939709 - VUL-0: XSA-139: xen: Use after free in QEMU/Xen block unplug protocol xsa139-qemuu.patch- bsc#937371 - xen vm's running after reboot xendomains-libvirtd-conflict.patch- bsc#938344 - VUL-0: CVE-2015-5154: qemu,kvm,xen: host code execution via IDE subsystem CD-ROM CVE-2015-5154-qemuu-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemuu-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch- Remove xendomains.service from systemd preset file because it conflicts with libvirt-guests.service (bnc#937371) Its up to the admin to run systemctl enable xendomains.service- bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow CVE-2015-3259-xsa137.patch - Upstream patches from Jan 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bdde5-pull-in-latest-linux-earlycpio.patch - Upstream patches from Jan pending review 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch 5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch 5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch 5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch 5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch 5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch x86-MSI-pv-unmask.patch x86-pci_cfg_okay.patch x86-PCI-CFG-write-intercept.patch x86-MSI-X-maskall.patch x86-MSI-X-teardown.patch x86-MSI-X-enable.patch x86-MSI-mask.patch- Adjust more places to use br0 instead of xenbr0- bnc#936516 - xen fails to build with kernel update(4.1.0 from stable) 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch- Update to Xen Version 4.5.1 FCS (fate#315675) xen-4.5.1-testing-src.tar.bz2 - Dropped patches now contained in tarball 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch qemu-MSI-X-enable-maskall.patch qemu-MSI-X-latch-writes.patch x86-MSI-X-guest-mask.patch- Replace 5124efbe-add-qxl-support.patch with the variant that finally made it upstream, 554cc211-libxl-add-qxl.patch- bsc#931627 - VUL-0: CVE-2015-4105: XSA-130: xen: Guest triggerable qemu MSI-X pass-through error messages qemu-MSI-X-latch-writes.patch - bsc#907514 - Bus fatal error & sles12 sudden reboot has been observed - bsc#910258 - SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984 - Bus fatal error & sles11-SP4 sudden reboot has been observed - bsc#923967 - Partner-L3: Bus fatal error & sles11-SP3 sudden reboot has been observed x86-MSI-X-teardown.patch x86-MSI-X-enable.patch x86-MSI-X-guest-mask.patch x86-MSI-X-maskall.patch qemu-MSI-X-enable-maskall.patch - Upstream patches from Jan 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch - Dropped the following patches now contained in the tarball xen-no-array-bounds.patch CVE-2015-4103-xsa128.patch CVE-2015-4104-xsa129.patch CVE-2015-4105-xsa130.patch CVE-2015-4106-xsa131-1.patch CVE-2015-4106-xsa131-2.patch CVE-2015-4106-xsa131-3.patch CVE-2015-4106-xsa131-4.patch CVE-2015-4106-xsa131-5.patch CVE-2015-4106-xsa131-6.patch CVE-2015-4106-xsa131-7.patch CVE-2015-4106-xsa131-8.patch- Update to Xen 4.5.1 RC2 - bsc#931628 - VUL-0: CVE-2015-4106: XSA-131: xen: Unmediated PCI register access in qemu CVE-2015-4106-xsa131-1.patch CVE-2015-4106-xsa131-2.patch CVE-2015-4106-xsa131-3.patch CVE-2015-4106-xsa131-4.patch CVE-2015-4106-xsa131-5.patch CVE-2015-4106-xsa131-6.patch CVE-2015-4106-xsa131-7.patch CVE-2015-4106-xsa131-8.patch CVE-2015-4106-xsa131-9.patch - bsc#931627 - VUL-0: CVE-2015-4105: XSA-130: xen: Guest triggerable qemu MSI-X pass-through error messages CVE-2015-4105-xsa130.patch - bsc#931626 - VUL-0: CVE-2015-4104: XSA-129: xen: PCI MSI mask bits inadvertently exposed to guests CVE-2015-4104-xsa129.patch - bsc#931625 - VUL-0: CVE-2015-4103: XSA-128: xen: Potential unintended writes to host MSI message data field via qemu CVE-2015-4103-xsa128.patch - Upstream patches from Jan 5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch- Add DefaultDependencies=no to xen-dom0-modules.service because it has to run before proc-xen.mount- Update to Xen 4.5.1 RC1- Update blktap-no-uninit.patch to work with gcc-4.5- bsc#927967 - VUL-0: CVE-2015-3340: xen: Information leak through XEN_DOMCTL_gettscinfo (XSA-132) 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch- bnc#929339 - VUL-0: CVE-2015-3456: qemu kvm xen: VENOM qemu floppy driver host code execution CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch- bsc#928783 - Reboot failure; Request backport of upstream Xen patch to 4.5.0, or update pkgs to 4.5.1 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch- bnc#927750 - Avoid errors reported by system-modules-load.service- Add xen-no-array-bounds.patch and blktap-no-uninit.patch to selectively turn errors back to warnings to fix build with GCC 5. - Amend xen.stubdom.newlib.patch to pull in declaration of strcmp to avoid implicit-fortify-decl rpmlint error. - Fix quoting of __SMBIOS_DATE__ in xen.build-compare.smbiosdate.patch.- xentop: Fix memory leak on read failure 551ac326-xentop-add-support-for-qdisk.patch- Dropped xentop-add-support-for-qdisk.patch in favor of upstream version 551ac326-xentop-add-support-for-qdisk.patch- Enable spice support in qemu for x86_64 5124efbe-add-qxl-support.patch qemu-xen-enable-spice-support.patch- Add xen-c99-fix.patch to remove pointless inline specifier on function declarations which break build with a C99 compiler which GCC 5 is by default. (bsc#921994) - Add ipxe-no-error-logical-not-parentheses.patch to supply - Wno-logical-not-parentheses to the ipxe build to fix breakage with GCC 5. (bsc#921994)- bnc#921842 - Xentop doesn't display disk statistics for VMs using qdisks xentop-add-support-for-qdisk.patch- Disable the PIE enablement done for Factory, as the XEN code is not buildable with PIE and it does not make much sense to build the hypervisor code with it.- bnc#918169 - XEN fixes required to work with Kernel 3.19.0 xen.spec- Package xen.changes because its referenced in xen.spec- Update seabios to rel-1.7.5 which is the correct version for Xen 4.5- Update to Xen 4.5.0 FCS- Include systemd presets in 13.2 and older- bnc#897352 - Enable xencommons/xendomains only during fresh install - disable restart on upgrade because the toolstack is not restartable- adjust seabios, vgabios, stubdom and hvmloader build to reduce build-compare noise xen.build-compare.mini-os.patch xen.build-compare.smbiosdate.patch xen.build-compare.ipxe.patch xen.build-compare.vgabios.patch xen.build-compare.seabios.patch xen.build-compare.man.patch- Update to Xen 4.5.0 RC4- Remove xend specific if-up scripts Recording bridge slaves is a generic task which should be handled by generic network code- Use systemd features from upstream requires updated systemd-presets-branding package- Update to Xen 4.5.0 RC3- Set GIT, WGET and FTP to /bin/false- Use new configure features instead of make variables xen.stubdom.newlib.patch- adjust docs and xen build to reduce build-compare noise xen.build-compare.doc_html.patch xen.build-compare.xen_compile_h.patch- Drop trailing B_CNT from XEN_EXTRAVERSION to reduce build-compare noise- Update to Xen 4.5.0 RC2- Update to Xen 4.5.0 RC1 xen-4.5.0-testing-src.tar.bz2 - Remove all patches now contained in the new tarball xen-4.4.1-testing-src.tar.bz2 5315a3bb-x86-don-t-propagate-acpi_skip_timer_override-do-Dom0.patch 5315a43a-x86-ACPI-also-print-address-space-for-PM1x-fields.patch 53299d8f-xenconsole-reset-tty-on-failure.patch 53299d8f-xenconsole-tolerate-tty-errors.patch 5346a7a0-x86-AMD-support-further-feature-masking-MSRs.patch 53563ea4-x86-MSI-drop-workaround-for-insecure-Dom0-kernels.patch 537c9c77-libxc-check-return-values-on-mmap-and-madvise.patch 537cd0b0-hvmloader-also-cover-PCI-MMIO-ranges-above-4G-with-UC-MTRR-ranges.patch 537cd0cc-hvmloader-PA-range-0xfc000000-0xffffffff-should-be-UC.patch 539ebe62-x86-EFI-improve-boot-time-diagnostics.patch 53aac342-x86-HVM-consolidate-and-sanitize-CR4-guest-reserved-bit-determination.patch 53c9151b-Fix-xl-vncviewer-accesses-port-0-by-any-invalid-domid.patch 53d124e7-fix-list_domain_details-check-config-data-length-0.patch 53dba447-x86-ACPI-allow-CMOS-RTC-use-even-when-ACPI-says-there-is-none.patch 53df727b-x86-HVM-extend-LAPIC-shortcuts-around-P2M-lookups.patch 53e8be5f-x86-vHPET-use-rwlock-instead-of-simple-one.patch 53f737b1-VMX-fix-DebugCtl-MSR-clearing.patch 53f7386d-x86-irq-process-softirqs-in-irq-keyhandlers.patch 53fcebab-xen-pass-kernel-initrd-to-qemu.patch 53ff3659-x86-consolidate-boolean-inputs-in-hvm-and-p2m.patch 53ff36ae-x86-hvm-treat-non-insn-fetch-NPF-also-as-read-violations.patch 53ff36d5-x86-mem_event-deliver-gla-fault-EPT-violation-information.patch 53ff3716-x86-ats-Disable-Address-Translation-Services-by-default.patch 53ff3899-x86-NMI-allow-processing-unknown-NMIs-with-watchdog.patch 54005472-EPT-utilize-GLA-GPA-translation-known-for-certain-faults.patch 540effe6-evtchn-check-control-block-exists-when-using-FIFO-based-events.patch 540f2624-x86-idle-add-barriers-to-CLFLUSH-workaround.patch 541825dc-VMX-don-t-leave-x2APIC-MSR-intercepts-disabled.patch 541ad385-x86-suppress-event-check-IPI-to-MWAITing-CPUs.patch 541ad3ca-x86-HVM-batch-vCPU-wakeups.patch 541ad81a-VT-d-suppress-UR-signaling-for-further-desktop-chipsets.patch 54216833-x86-shadow-fix-race-when-sampling-dirty-vram-state.patch 54216882-x86-emulate-check-cpl-for-all-privileged-instructions.patch 542168ae-x86emul-only-emulate-swint-injection-for-real-mode.patch 54228a37-x86-EFI-fix-freeing-of-uninitialized-pointer.patch 5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch 5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch 542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch 542bf997-x86-HVM-properly-bound-x2APIC-MSR-range.patch 54325cc0-x86-MSI-fix-MSI-X-case-of-freeing-IRQ.patch 54325d2f-x86-restore-reserving-of-IO-APIC-pages-in-XENMEM_machine_memory_map-output.patch 54325d95-don-t-allow-Dom0-access-to-IOMMUs-MMIO-pages.patch 54325ecc-AMD-guest_iommu-properly-disable-guest-iommu-support.patch 54325f3c-x86-paging-make-log-dirty-operations-preemptible.patch 54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch CVE-2013-4540-qemu.patch qemu-support-xen-hvm-direct-kernel-boot.patch qemu-xen-upstream-blkif-discard.patch change-vnc-passwd.patch libxc-pass-errno-to-callers-of-xc_domain_save.patch libxl.honor-more-top-level-vfb-options.patch libxl.add-option-for-discard-support-to-xl-disk-conf.patch libxl.introduce-an-option-to-disable-the-non-O_DIRECT-workaround.patch x86-dom-print.patch x86-extra-trap-info.patch tmp_build.patch xl-check-for-libvirt-managed-domain.patch disable-wget-check.patch - Xend/xm is no longer supported and is not part of the upstream code. Remove all xend/xm specific patches, configs, and scripts xen-xmexample.patch bridge-opensuse.patch xmexample.disks xmclone.sh init.xend xend-relocation.sh xend.service xend-relocation-server.fw domUloader.py xmexample.domUloader xmexample.disks bridge-vlan.patch bridge-bonding.patch bridge-record-creation.patch network-nat-open-SuSEfirewall2-FORWARD.patch xend-set-migration-constraints-from-cmdline.patch xen.migrate.tools-xend_move_assert_to_exception_block.patch xend-pvscsi-recognize-also-SCSI-CDROM-devices.patch xend-config.patch xend-max-free-mem.patch xend-hvm-default-pae.patch xend-vif-route-ifup.patch xend-xenapi-console-protocol.patch xend-core-dump-loc.patch xend-xen-api-auth.patch xend-checkpoint-rename.patch xend-xm-save-check-file.patch xend-xm-create-xflag.patch xend-domu-usb-controller.patch xend-devid-or-name.patch xend-migration-domname-fix.patch xend-del_usb_xend_entry.patch xend-xen-domUloader.patch xend-multi-xvdp.patch xend-check_device_status.patch xend-change_home_server.patch xend-minimum-restart-time.patch xend-disable-internal-logrotate.patch xend-config-enable-dump-comment.patch xend-tools-watchdog-support.patch xend-console-port-restore.patch xend-vcpu-affinity-fix.patch xend-migration-bridge-check.patch xend-managed-pci-device.patch xend-hvm-firmware-passthrough.patch xend-cpuinfo-model-name.patch xend-xm-reboot-fix.patch xend-domain-lock.patch xend-domain-lock-sfex.patch xend-32on64-extra-mem.patch xend-hv_extid_compatibility.patch xend-xenpaging.autostart.patch xend-remove-xm-deprecation-warning.patch libxen_permissive.patch tmp-initscript-modprobe.patch init.xendomains xendomains.service xen-watchdog.service xen-updown.sh- bnc#901317 - L3: increase limit domUloader to 32MB domUloader.py- bnc#898772 - SLES 12 RC3 - XEN Host crashes when assigning non-VF device (SR-IOV) to guest 54325cc0-x86-MSI-fix-MSI-X-case-of-freeing-IRQ.patch - bnc#882089 - Windows 2012 R2 fails to boot up with greater than 60 vcpus 54325ecc-AMD-guest_iommu-properly-disable-guest-iommu-support.patch - bnc#826717 - VUL-0: CVE-2013-3495: XSA-59: xen: Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts 541ad81a-VT-d-suppress-UR-signaling-for-further-desktop-chipsets.patch - Upstream patches from Jan 540effe6-evtchn-check-control-block-exists-when-using-FIFO-based-events.patch (Replaces xsa107.patch) 54216833-x86-shadow-fix-race-when-sampling-dirty-vram-state.patch (Replaces xsa104.patch) 54216882-x86-emulate-check-cpl-for-all-privileged-instructions.patch (Replaces xsa105.patch) 542168ae-x86emul-only-emulate-swint-injection-for-real-mode.patch (Replaces xsa106.patch) 54228a37-x86-EFI-fix-freeing-of-uninitialized-pointer.patch 5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch 5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch 542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch 542bf997-x86-HVM-properly-bound-x2APIC-MSR-range.patch (Replaces xsa108.patch) 54325d2f-x86-restore-reserving-of-IO-APIC-pages-in-XENMEM_machine_memory_map-output.patch 54325d95-don-t-allow-Dom0-access-to-IOMMUs-MMIO-pages.patch 54325f3c-x86-paging-make-log-dirty-operations-preemptible.patch (Replaces xsa97.patch) 54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch/bin/shibs-arm-3 1692008180 4.16.5_02-150400.4.31.14.16.5_02-150400.4.31.1xenxen-4xen-4.16xen-4.16.5_02-150400.4.31xen-4.16.5_02-150400.4.31.configxen-syms-4.16.5_02-150400.4.31xen-syms-4.16.5_02-150400.4.31.mapefixen.efiefiaarch64xen-4.16.5_02-150400.4.31.efixen-4.16.efixen-4.efixen.efi/boot//usr/lib64//usr/lib64/efi//usr/share//usr/share/efi//usr/share/efi/aarch64/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:30240/SUSE_SLE-15-SP4_Update/0901e6251417687048411388b87fb851-xen.SUSE_SLE-15-SP4_Updatecpioxz5aarch64-suse-linuxASCII textELF 64-bit LSB executable, ARM aarch64, version 1 (SYSV), statically linked, BuildID[sha1]=90036053896bbd1b9b7b35b955ac5e95f2b32c00, not strippeddirectoryXp50"#|Dutf-8c6621d4e8e55306acc37e81b74641818295f49ba4de08bd1da473a564036daf4?07zXZ !t/] cr$x#HC+w1Z\NeF]I;^@'J]U7)iY"H^6b0<1FEi ﮀFmw5glB8d\%"a yYOpÄRb@A|x.+}Q1B-tWj?%~w؟hOm(i>"& |1Ze_&ozxGHG/E u\gk%YIڮwy~^ Oi9 K]abM9p ha޴ t֟8璛H̉ O BKQRLw_FTNZhHj:n哷GX))J{t?v;>;.~;HFV v*+:Վt?SJbė撛s1f+ v^$h;w.a Fg"SVp)PYټ,:^™Dg(Ms뗕"iM(mx[BLbhb<9 h Yy/!|X9ۄ?_Ŷdh+3Z:u4| gsq08{cOU;G%ce*p8YࠡoR/ rnN[ dJʙ7C:bD){KbWr3I[){ƿR.cFi T|nO܉(EV(8am~!v(*'6JG?L*P [I55Vx M*i4)bldټ&toThrA1sO Âíߜ;?o.B_[OH&|d.ƈ\U}A78lK3zE?iX*mvD{|mSt\0woGŵP`9c[+[mK@d׎,Kh#. uu"R.rc)P`b3݆JV|([~[`C?IlpsJ,HA?5ޝ4n#cNnd(V/h}v$>z^I{lQҸATh 3Jo"L̯H43qcK6$$A]4VtGs]$? nnVS HC54 ~^_ 9Vv>6=(c~ Rރi ⚸0k)vAA?F}J/&m7t} SsM$߮F:`fYa%79bF=m Yy9p Z&$U1YjKD)EV=b6XWGtm0ZKdRL'56B`KWq[3emBd"tŒM ~@`9 Ӕp\b1Fq_RE$Va?eP!Ϙnז3uEw\X/fCu!cng7m. VqT|ɨT9) J"wI["Jnm- PkbmgܖpfnnXVprS[`Snn Hj!YhVj3DFqxF*u Wѽ|-\*E`\ďdSl1 ہZ\Ҧ1&}ZoR+&Po&ʱS'ysEIob1?RNvcD H٭ n~;a8-{Hfht_4OzEO0d:pX0c1pS4Yd--N_u X_8gѠݑ~4ʹ/W[Vh3^+y`L^1n7RWw(n=5p n]:.Ylu WͅY{SR0ezPL WQkOZyȺp0 };y*Li%+ױF{-}Pj:KYcmn!ּ{t`Ϳ?_|v,ReVek.CezCWȟcc]Yް8eeJ%kl-w?YXC r(Vƫݴ1Ӣ'` ۛdߩ~R8d1GkN#[4Gʱ¼u/ P/ݷh^tys㥡^ \n6>I?&=_X– <;ωm !yP'%haKTt3aS#sb֐鄵 ,jn|smޓ/n-ZH  *$ eב<2mX96pSRQT_%c8.8ԡw"`[?8}{i5{/τPIB$eIڂWċoT4dO7;U^ed2z7[eBDYyX8xZ-fcq wRiӔU3%@&-dlI'n\g CKֳLPe<:#w9r%.# V f+PQDP Qg3aWzF^9fYqƛex}-vo~bNF:M>}Rl,{_;VHC)(fdFrGUs\_NŽ߈GiIL?s AҴ zⱟ5 ߈$1bWOcՐHĒ? dnV`5:&lCLR:8>R3*ئ)IWznώ<;Yty]̹sbsN5xQRKPgjmld{2B3iu7jҿhGp-;01پBXbݾL֎TMeX#6,t9{u,)tML4,3>LOb^љg+ڍ 8Eo59 ʒ$S p?G؉ZÉ7Zyޘ0 "=v$ EBMn->b,=T% kZɔa F.bz2 2< w+*g@r_\dBF!]0Z%YPV&ZWLsST#;Y6#2rR}ꯆWvc x0yb,OewB8Ϭ-[j>~IMe y0G#?Hv\V)~/F.fV*.@|5݌┼M= *N@egd3k(ѯǗ_:{jʘ .2g}Ir7yhpտ yH KyMnMxZӿŐW dvm ^`;0+/|DۂO[7x=l=>TN0{Mia'Lb_HVҌ-Lެ,rM Рo32Ұ?n壉&|.8D+J'L)P0qəSVL w3FU';T|T˸&jg~yJ҈R~*q?:lqSiHIݾ! DOQnȺskbӻ5$#Fscx ~,{m5,ƍ"QFyUQN)\ ]'Y] .6R~#5m,LwO m臨#GPcr0$9 Qcb ] 5bTVS [⭒|aY\4|DІL;PΪ:^YyTDQ[prLZYc4 9 ̢CVfOlnԾk2=%6OV mYdqjrr+ Gu&PwR̝,z{Sjb v_S`2dhTS?Χ ix D..; R{Th|vDW 8#>(݉jEQ|hPG }S7"f׆nDxF,,4 ^H#[]j["3[ߴuO@> p.[cr] +NƦxӐ1!Zh`J oDhgS5[9xT,/]/S g6riIzMy8#WNG4Q nf{h\ܺ$L8J[u`+9:y5+Ġ#6jz$;0^۹G9wYVYj8**MYEI&I&tѢ N vt:tZ' aKjn:kE0,MM?9S")xX"\_^R_a[@+*V0z}DVlUе6O Y|eٮ™9Ci8/s_Jm\TII#pP9t91xJ\U4]5gK-mO ɬ?IN4#Su.MKx,[ױ!`QBRP„/ϏB*oȸ$d\lHGp⤃fr ykk-ył~;IYrBJh㐰& vxB)dǹ?WT> 5y^ɥoO:xψ HF&/ܚ*ǔ(j"kVn-W8OF0eV!MPeV^[h}DJ?u3x8%) JL"QRûC%51jp`F$&%We;Z?cCt꼣&ꑌ r>]#čJn5QQtQ%7!hw8Nֳ`gvdfS}(Q^G.Q ˘ o wMZ".mEԍ5 ΗOw$ܕ S>A? i,(p /z8g晀S͌UT_{2vXN*s(;=)ܯZ4n8GDVIjs٣ .} i#ûnnI' N`M~SX T>nM]FŏOinN=A_pMT[g1PGIO\X@n 7D/P!_-C = ]3S>}[dy*e2j`y3 9}2EQ3fl V OJYK҉t4;'~.c-]4"\|$fqw ."Q !jtNسqn_4d*0؂ ;OHKDĢd|#z\-8=#UYӴ=p#؛?:˹6cBF.5mcлS`9:CXbE9ǛֽJFaF6#w+G.~ $ )kɔ,_P LjǩU=u>1vPT/u;or2hX46=~~| |nҧuHu즼~q]NxA-*D1KUKk7=͒(KJҡ.Ic8zQnѰ{y[ҏ5֠cּjZG8gPӊO"yu˜[@pV @ާ) i:POy~3ύS8Y/'gљ '|cʋ51O-)P]aײVQQ`hH@ Pb6eKxl [|߀ VaE3^ܭAS=\\RG_2ӜƊ}LDM?OBZKtϡMPDLkq}8]~H8\D]Sagk`؝.O"vΨ5yN7 AX|;j8!+ԣƄ\t(˯hRCGbYXmܤZ}ge7 Ӻ| RXS%q>((a ^zTk&+>әZ1RB\gL UܼL>(5R~[ #`"TlUQ*;/.*E"Yۃ>rr@nQB  %ng4)CgqW'w]Nth 91 m/zY֫VdN3+ V.R*P<%pIBe:Ho 43%У g":VyA*$9Sq3VbB+`$D//(bS+eew0m7 iv ZIIꊘ`#USfB|*<=fTosEc/f$7[+BJGCNV cp(jW)wX-0DY (=$mA$m.Ρ*asC1sș21w>ƷMqp" hRu1`qЎ=XBl$o2*pw5^$8%sYbVW yH>q"?d&5(?Ctd[|z к'4# cj\\{Y FVuvcp#ph${> \2mQ ) /sF2tt$NՀ1@tꔎXb&sƿhySefQ$#"&LqeF!La4,gƘl-'!_e&A".@1$ (cK 2WNԶRUK7 K6pX[HBL4=;`&!)՜녑xi7!J8U.(4 eoN~>oύ2R]qz6WmRg!Yd6qc_fr^H³'q~!zP2Fbի>Nn,*/adph<%jX3Q#=#Jh_~槚,m~zWfZ/ᅾ#_etٸKqu*TggG(:t̄H.Q3Vq-72{)fě<dJi!ZY\ kKI|!sk{JlKCkZ_<)ԅk{, 1_pg أ46FeU\q,t%,87\ k]7-Ve X]A7ٚj&ig 6i fY`zn1TdhTϦݍScUɝD@NÊvjfiiuYTpU| g\<<Y:( {AM: F芥Q ˽OnIRZ[qf$[iˈ15q+pU L$mNsZMU]MlP_"UhtJ`77\,ޒ,ʱG@6 :Y6,Űo#B @ٟLw"OiXjo.}OGb9R̘exP֋DahɣJ9B{|iZ}v`E;V"oDa}liT]ta.=ۦ ~<!IEM5tJ0ij=ITk*UEeUIVfڄ4ɇq9ِlܞx䀡jmGePkGn9w'pӀxoTRK#oF%?dHy=>&ň`f8 R?W9K\H:AHzNGGπ6JFw@_W|T|&zgt^j*1;!Hғg WBF&:eES|XAYQO %vi`1ps ]C5u9+UP܏ -uV,*E&nD6mRyy`O%n?W#Ԅwtww՜ 쉨r:~Du.6ia1}i eN'Hj(ZG)(~< "j||h!Gm۹NgQ_ܭ:ՓO_1p.[3#Ke@M`d/=k(Bǂ;4AsGfO$РpEZjMRzԠDJHMԖow8˭Y&aȃi,Mz[oΕl7 hB <C_j |}@Ƞ  |02H\6a[s-AL0mFԏeiq s>Q}h{%mD+Z_jD+i5Z"{X`#lF% Z)11,\ЋO櫁bhcqvӳPҭ̨?DFXiNcAQe&@@6"~|kNƹ]`D Z8g:[Zdjzձ^@{8ς`\BVP/"pyT :ehYkB~BZmuymyKDnA<P<·4v)ѮO:A¼e"ծ\u O9J(l5X gOx9Wٟg/YS`Pʿ\?3d'Zz 2g~c>@ƑIT;/Qzb_Sa::"#ت[@u@˸\w$gG7-Hς~H_|ʣH@YtoT"/7#sν@3jv1j#P򿨧ϏAJҼO-3]:јҲ SM7VjD,"D0,:p3J8~r^ZlGȗ6AWF9tG9 q(NiՉ\h2X+YG}$EXCtfLFFD*>6= P)Gq.*BiuӸR9O̟ ̂ n 4ƀKvY`}vK܁OL}tsٮV2ER bC̔3($rl]5w@( ؊Jie}g~mԶâБo ˫[ykNU+^je*KIYZPM%7;0qiͿ\ AQ`xkUO-%|I4; 9 7ќ񊯥hlbA+Wx^GM׫Svtkh@ xdҴjJ-xק%ڹ륂d9D/SU~`w࠳%d#};4-c?ZfoyLG%K(ľ6GT>P}by= $K}xC1`V<2-pq?վC]5im[u V~jV77ۛ|$~n_$5[210RG6 'Ö.:S&`XU?fڜh?/ůw`zt߁KUʂ&?$A2$C <{TBi|ˠ~gJxdAϚ%;c+xBi}J$JgzW•F"v9푐gь&BV[_ߤpD^-! %f'x5hObQŌС}Η:vL.-Mzl$)zr "?'֬ouT`4qŽX?u!ôt'p^1:}Ѷ[i D{`lj$S(/GF;9=f_S>CN ixYa  n \cpi+y1w@7&voB6EVڽgo;uz]Kb}&3¿lmxEs?^*aIЄH50?P0:N0 RC?pur a3 }Hɬ% c꒨G4f>Y$x#{GNH/WlI`-g"nq|*KWgo*rRHYh.O]cjQ[ bsϗA7o= GOGZ|7HKNٿ=b+0CxP]Ntye-\%u6a:6ѫ نWq4.)МRӺ2L5`0f6+NFsR|yfQ߽\[K/$eTmVǞF~N &bF+*-DW^vhP|E% 7 (gZ2uXxOE_~ZJ*.c`D[[z/ 6-zvU Mgǘ5C5]yA= Lad5{:*ÔP xl`P3: l {fB:^q-M Sv'O xm1Zc,8 R{$ڍBU]{%'n&$@vX@>*6BUHcOk[T՘~PDoc\GmDӿn;!ô ,QǵVS1=~!T|EXd8YTBz-9- eHg~/rc7l5V@Slr8$b|KdwIFE*= mvk6B *]'zGt:dA%#]a3*,9̀ݗ,bX#̭F7dE,$?0zH}~c@, ~-vɆNą36OA*(_|*2:4|G\$x5 Ѩ /li7) 8WXR@2VoPdO'Dk/UΖD)JkaW%pL'?+al G&d#-N2ǰh7*@o0e?eP(*oS^nX$]wwjopA%7[9X"}yeΔ1Rwy zt _~=HjqRhUU0w.8魅0C=-84 J# !8­a-)ͅA#w'a~vSm5Q~0ah} C0IRɱ `O)9Ȱ,!V&GJ}*!ҬSɯ˾;Է/\Mtm^!v@ iHc Zi~ ycdd|$R:U^/]w뱛@ueLgd.#[ޫYP 1ɷYaȁ%2oh׎˾0-(|5]o V""&A8LlʮߣͅcKJ2)PCI-ȇcpvlQi33|o䯊YO/=RK d"Rw1P kw8J0"}{rMs 5P> U"9ߔ&`)+lHE5m}H3~?*Uur5bշC:cr6Z\}+q/me=:.bi^j'SJ= 5hISOX@ Cupi9ccO  :'<[mEvCUNL䗹ߠgvSVe"iS/KU5 0o5i!ǹ*%jΤ(a4ΓBR#uq["?0S<ye U&43s#*r4y$Paa6m+{)f IXZD| NDq~ B5jٻʉ!&t;N ZS4vh`}Dk\JG0TW5LFu:L\^ep ;m,VMġnrݕ]5hoVl2O&u,vk!e<=@y,GPuB_@XĿP6]G +MlO9qC;.N7I2Bm0Y$B#kl@OaȈ IaK.bn>t ضaFb3N*Ku Qgdd.+Rš>[;t%Aj1& Xl9l|\,SIq;q.]w%)iy[Stfee╋IhɵV ?S3T$0wNJ7M"6JtŒ-g  )DS?HhYJOi,*kЪh=9F|RW TJx:iݮ${;K L$lfxkk6R:^L7-KsXoe[Wݔ_^*f6zT=c-%xg 8HO`LO:ZOaK4DQRʁeՍmxpB 6MLEio"Hp[$DÁ6{o)GL qŮb#38F;DϨBo62)^.OY(uJ6+NJ, Y' MiVt#ZR*]yM 0յZZt>s#f֋HVܟW v)7tMZU7?Hi-^s_UVW#٫ P ǹϽ]8|MpV7'`4;[EUbSe_>m;+[nS/>O75#ٙ %sHtD lA)J'˼gD y^*;+)tZG(^m]J~EGg1˖krn>|M=thoOy-oVbO!%,+gh5AM8U RX5\cz|76H)aV@S[r}o9)Sm|А iʐa]4J!2z^q࠴%960tCY'g:NwW#]_ӸPPV & = ?dg]* Pu3p;j* ZMiJ*1nCj쇦KWΘ = 8D7Af]05cm#{E QaK=_vzȄDX2LWͲ`r ̉VT7nG}芀(umIE_kJcuq7/#m*,dSq=0nMgUrvHDn{Jd "[ wmS*WOp޽(a8m/E4rj1lIJ6"GK"X1+UgwcR1M]OKmFZ&)rfR@q[RMR%7ɖd5p _J3vx+ܢ7w9q-_Q9J1˳:H_Dub95E?kZ! z;ƿ(ľ}x.N?BMۼ0A ܔ,StlJ*AjzW?M^~3.wq?뜳>uq nl00b fH}D4YT$m!"tQKS=ݻUp{3&ppPRL o[(V$LZlg~!S;K[4bV< l+꿝QM@ >~4 xRP\@ u8v$/~?;a_)Xugr5#K8=4 +EӯCsoA wЎ- Q ^e| .@-+o CCw 6\% ֡ k>2Ys%=}qϛPL:j N#K BZYfΏ8R^-`?y"8xQx:/Y_PzloY/>( ç 8F"PqEhhd#}![M~>{lKC1hIJ.58C ]Uq963ţKL3btn=1,=/;N[UA:ͼ~^Q4fEXH{06ȡxa?IS`b:TVm; 4Npc -/$' 9գ[˴܋ؗbc ]]~D;/n}GV O9:9e4oڀ!R!~/8%"7)WW o؟tVmX #?t HУ琀aw"l5w1txGF"i\@ f:ZNjc II=- oA{΅Ոe Q[֑s=Sn(S(P젡9 ''rg.Z LrSY^Pv 2 ; jU32o*ucz8'oצ3㦏&60TWVz`h*q1|Zʼn3L{c0v Ii&*^c(_K9A;W,|8Ƨҳ*"9@.LXxRp6k%0r>C}XZWEwkÍV[gC# BveP"92%gͲ_@PEafAlJ$w;hg(82*Ng4Ia^6qadv, M$5ʤr7Z#|VnHL3ky>;d@V>btlAOج +U$ PkM`U5{<sgpl9w[\i:.gW2Ҝ%ScnQޤ-!;5N\TJwa*KlyJuKLjv'?4RsdשWͲcn/V!N̻ ( Z*/@4VW¸7kggXh (?4)u"!$F#.!7ARci~}tٺt:ir&$qX bOZ ⱪ2koE"AwsGK+H~"j+vӺka$ٛ-$,8P&A/ fWԹ4LSz0w s, խpr.%%Sj @WԳ3* ١ pl"V54桇(+m4)pxY/^4o"U]VSAG(Trר!{d|RRT%5X9PKd6omr ܞ>SF[1'넒n+wي lz뎷Xt-_5yZF_̷LW&{.[ZNf4l'Fy|;eVPn<^0*)=e|JC7ii6WxB7v=1tl2"ov$FY]=/;ov)A'2cѵDI5%q2(@3Pu{sewMؙ(h#G@>Y(k2r.T,-8~f&lw z? >f^d@D& R;t̎`fUp4iH@bJ~1l^%@H^W^oc΄}Fz^fK-pN&aU IפE%l}}Vrj*Gȼ*\geAk ^,N:!)زL .i y nh,dg*PPa)mz PAփ*ZHH]l1\YL֯IVxgJ~F[߄yW8p!ʛF/iF27?}uE:d0eeEO-e[ ׼] _LԊiAө-??,}PAAXfcUS>,5Q}iD+&Q\~w)Ǫ$Q!0 iVH{E5^*F9[UUUlv]g$rO( mr}Aϩ4EwUW[tLnNjW(oa-Y+_,_YGTB_UaحF>möp툟V2 }㒠ɓ3t :`;Y)1Y:Gf>SWSGHBT oGrg|NKE`}YrbWreXPSPʳi߀a"JhNa^~`@e;M|d4hEJ_9zJwv|X*ez.Гi<`Nأԩ*2KQ{#G`{kW#Ɩ@4MtBQĝm k&]WHM}5 #VO7eUw;5BY2U/|g7{86Z˛-1kgÈc:$5(^Fc]r˹ "$s㠽ĎlOB$*[@V%UDjeDlA?H8:lpgL'XI^ޖ> (p06s0Fh{mOטj5S 6"F+!Ct -֨YP-L m_2ߕػ$~X##1#¤ې0|t{K~Wڬ,s$8zpo[O^˖3h.2r <22ebѷ~ϼe ]7_ԕbڃW՚LNFk,pz׉]O$ =u~lҋтg6(n>12ލı|8ٓ㵈6K¬`'4|Q)‹-~ >Y-!ANä:{ȫ7L‘"{KG|Hx6^t%QDL Qu~.(3m l["8TwB'9ӭ;5@*ѯkFB."ptOخr6H&к+6,,!oޙ?:"tw1pPU iPfx#-׶`Mf$t3$v8X.:`v['rO@̌bpU%P1 <&9#wP.1#wWvɾ2snj5Yv~IQo85*x!*%FQx߻W:t-mdЭBvZf=Vl: ]4:׹s"TwhKWKzHuIkD*~ ]h'fC ҳ$|VNbiJqPfq;is<S_2Ue&jT܇`k̺b0ztmV:މv݊Ce7C \KhW]vwCw6~"-+v , Ŕ; )CJ$*61P҈"a\*xO~ET1c7CMjʤ+pPHPockNN<4{V8^=OX2|rB1;~JdhωG>';'B7dlK|/ߢgиoA 1ghwfNr`aN5xGIϡUqM7r:7G{$>PmttxE>pz{֮NasEsW" )eӍDJHIpi~8֪e" 0:qʕ3AU$5VtpԈ󚈳kŇdSZ4)tۤҺHHv4Ҙ 41xҟY~7"Ss\ ;AmeR!us2LAb-3hr޺3jQiTp:ˡ 2(G!WX;WAk9D+#Z"ufcI)}: S?/©~T&M*BfH4,tlōPu>1NwnqI{tJWE_T-_|W'ck  !VbdQv}Jy*QANԽLz9j{1Jb+h+Q;5,~f`XH!pr )Uf|1Hv_\㦰E!KK}woҩ^Vݽrd,d|2! 8z°Dƕw9T?gΛ|YiVIs>3 f u6ߟ.>;N2 -NԒ!gY HG/Ξ:y;d@} #~*Ic൳2>9@u"K,)"F`j)2ԭr~i 9 S Rr&u%ۨitJMmOH{9# iw9.s"fꕴ^_V| < h7ܶmĂT[y}cRo*Ds73GNDOV I[m 8j[roQ!WP9>/8If?.9 4.lS݁7q}&KOuNpc^RW\Xf39~Aڕ'1ѧ*BVIhvUT.Ԗl" >t[ x]Uu+6ȏ(ejV0\d 8U{&A_E0 ai:zE4TEWV22A yX`4򈽧\%k> hR : ~'{nRgI‡yh#t?8f}u?\!d`Y]'$a"H+%h &DK,i -%TO qUDXPdh!j / ϼMXpJ`0oy 4 $GC:WVLs\D2P_ҦO0 >s 4g$K^gLwy !K:u&ņi]W&)%:EI?LZ(BL-'F`Z,Ji5/eT>ujRy4|~}?m΀ĕ: Z$/ά}iQ0tjjSlJ։U`(*+A:k)dM ^b[9STGui=- LJ 6z!8Εf} YeGf^r%,8nbTcf;ԫj *#'qȒ?ӗ%ͮ{Q.g?TPZ/'KA69r)LIIks]q|{!^X+Ӄdp h>pg:A˗=㘨ߴnӞ`W)H=PW/)4!u髞rqSnUvgGjfMNF!U[슟^lǯ8`Az[7yJ/&oK$cڛx"Lr0;?JЄeag׌[)95ZCM<^ Ab>H2O ;c02yvNs'aloYvmR3Y{,0pkN8YV g[ł l9eF)IJptv$U´ʾS&pe"qh>lyo* N,D׻%?߂a [t1<*rX+[7޳?I?" K)IzZwKKB˦)] +-`>g,(fOnG!αm,9ᚴkn}W[":xw﨤Q }EISM FaiIΩfnU<`/ uYEKNvWԒY֔>=W ͚ч5X슠0i#jdw/,O!LqB^˯'dOj-Mÿ7 cӿE7֘L _&W*} sQZ;U8#cOWF35[ 85+B*PPs㚱e5i )>?ZQyeU5X2o֐zS&/dXoQ*\v^Pabܘ ;D5'Y"Rkbs$s ۩s_xAtm Cfk{>>tϤYNX._蓱h9騧K呓֘`*e/у.er5܎*ۄA/ee&^O>_ٗkD/^xd-U@bg Ǯ2jMCt&Fx\A@崪PVSr;rejUH wL!|PŸn ]j?!̎1M4kxg )jR[=~%w}{Xaev&5j{@H6T%_J:-rV=g$;=HjF|膝寣t؉ۼh]ߖ!GA:|% u\1<Ͳm3{H*J 8HRB\qIbqS  ,~6b5vA5cwz {\:}Ѳ 9YT/VE kx;,":d>;ơ/'Ao10e txOHb]ma}eo۝ϘZ`ZU@kzH`]&f_C"J('Wd V͞gkZ]qҪse)w~7Pbj1Yv8#&4)+V4QMؾ|`ÑkZ-5csr|#%P{ͣP/Ȫyf!,IVK&#aD_3`s7iaK)Fdj+&vi#IR1!)~KU͜ng>p"_d9`!´7`$B:"ZdzπMW^I<1C5ؑ#b/2y5Lfzo!2:ؑYEU)rͤLbqWyL$oZ9LwXa,dhcC=QJ}^ TܛX!39%:Mea:[Q'pb@ r11gR1h-ҁ̮|XF|$MVT8(Jr0;B1|cf\' nQ[`~Ȱ7ׯy&RۋOlWa<9s\>`fQym@Uˋ+oBMD4mPefXK锍P%yCK{\|Qrnf.bjRc87.Og' KȦ '1s#kP3n>I}Z֠l* e̽]c۸i9E@\67#Ϝ{[qJYsJ׶sj;T;Uj/&%d9aכ*E-^)EM}䏀eMP%SL$x\IhmTRcF ^RBgJwc?S`IVGKG^jAonL >~M/:aHz.Wo(ύo49$'2v@, +JBjgr\ (@JB>fH#S_笣ʋG+K@F/vDfjO8n׊b5}+v{+scl45uW6?ST$͒Kmᛲ$hqC2nF'iՂ[dNz+c r`fKS_O#i#S }q x{R\9 Ri-8)~ʆA @?[73.+tp٠%g8BQ:ytoy;J^}{B^TEM펂 >ku%PT[Gy"[c>ך|̀6Uq=:P=8*LoJ4>_"'m 3J"Drɟ8`՟'2 73"e8R1qx|H $mv%y2m0:c9(TEGk!bUOwLCSFA%@}Z+]ԣ@mBaID2Ԝ Y!W~Sx}݂s P"gsMx3bHlm`R@eQb>e2q `;m^EE vzU> %{+f.Rfm"iԆpnO-I` ᓈl(+$Q;;4$ (s6 }GAvdpً@&dnLYLSbN|Cq=[稦le gr;(R5Gmb<;*14t%1Ԗa5,t>;ER ڦɥ,GHt >--:c/TDF` [Z r)i﨨jAr u廙,g 9~gXOBmH%᯾)w>ۂWwW?}Љd 3T@1tFiػA@ksr^&kń[6ʭK)X*%q3=b頞h$y МIDk259TI%!37]+ho:~iZrAO)* [ۥ@DHA~:I rDKxBl4]6*Ҡgt@; `|"jUBmd clD͒Q7u01ބlYNTF}ԲiF1|v&QCQS3EiARxXY!0߬k 3O)Co)^lS`+V͑8+x ,,D&cT!$!GCF91\ A=m&n,2 cl JFn@h`%-ɵR]KtCɇ^Ey1󖏙!_e  tkUA~;]i?~o}[ݰ{C;~~ӕb$R}!碪lI(%7᮸xe~-Lb-ȍ_IH@nӷIܪ@ Mo !/FRmPžE,>"GP1"HE\w1#T͊Ӷgx}_BR|4CfOj.ꮋfQRnd^40<Нz,b 0қǓN}I/5o3upٚ8Ѐn٪.о;hZ逊dg#y"y=ӕЯ.Rt6 a5.rZ\C^PVwcW`D٥DX۴oK Gު xeu1E^@k\6cè {+]ߠCVPBLn4"s'K*:Kb?`/oKO5*bYpZg'-&kds?p{)i`QB?2- 5=<^V1n;Ef&eZ]=Z{>{>i.bd #X񿿸:WAk4: ,q]c7[,3*kY 3CZx ?wm+ޛrNB￳[RŠ3"Z- 7z6፱?K'˸(H wVE"x֢ZIt;Jh0ԜBg,}I;838')[T ~1c3 n⇬'f9W5e%(ʱPJ#ƍle8ݡK~͈j!lBwf^9A9 ,._M`‚C $ Pk*6ޢR3$9 DT}>Ƙ^ґ3if1-] E_YIM%eRCLUC;;k04E O+΁tR2AJVWCQP8Q Τ|(l(/Yd3g2BorS `:NY|tX]qޡG`Ƅ)N FٞS y3> E, n [O;#h0 (xҶx,= hgR(}Pw.-o^gf/浒@Vb}l\' #vMD;wVD䇧Ap_=:`8^?)WBiMqqeXF/TbRIW!p쥈M~Vr4'4?,Tjlucڕ vLƠ> _U֑K{+ |L@ yAC7>K&f$uI :b狇QsҔK{9m-/a#4JR? J܅q[}PB=Vyy??m'z/r}(q~zϟ* EJRP `ñ}H,`,W{}u|y%/+dЏ'ٮદ[o <Ɖխ'I 'ZsX+\q?4 "sV` }+ R@ Q:` %:。A }h_m/)*̉‚w!acq2ʼ!pB|ήx @*kS#SK)1!4"*sP.?$*y-4 <}q'[Su ݐX"Q^CE}Irlڽ_ԧnCLvIժ2z4>ǧ@Ҽ)d;WaulL|DžCHjvNt6xN4̂x! n][(k>^03y:h]+4sB]>,>ohX+aa(#*.`kCYU[򜋰6<&mXDk46 u1d.tA֚0'W3\9/)^)t+ >:59o_@V"⾻Gp)A9XF;) 7{4'ܣi*NtzX1ܧuunKO8*lg;=ă]9^e_bH_;*9. !.djw a<~~T,n|U1Q1-oVȞe<=)N~6Y- գoJ՞TTw.^$8R-:xXl^WPQCa/ Krr9c*Vdmq{ dI)oU#{*4nEPvv#'>m{zv csхoJQZE5,jBeWTTvClN/ؐ?Sv_kd-~^ Q2yPB1I k*j2KtW :I7nC b0 J~$PхDQ =TfGsBׯZۄzanJU5U< 'wE玠=->FnӜNrhS.Γ kyG!rK}<@,+W!72iQQxaMg ,I^D?#+ O vr-~7@oߢM(i ٣ MmE8NzĜܦ@:}@ʦBBɐ`n4s4#q/1 =P*4!,/0yuf_++][54R-G+ئ ȯHnM31[#=0g6# L=&A􃼒*c ƭSUzSBs%؊kqmfۻw{j٨7F)x2 )8ѻh)So|7Gە{AE2GFD~ܧDv'- Moגw5`L0i/T;r U!SK8ˍ%$8@̰jir\R.Uh\1cU(FZ_ݓÝN0gڞ|ʶ䯮deV{ KR,Fe> l|?y䑪Sg*anL,K|¡)RF_o7Ox Z>pWw;=RTpN\J=PzCϣkvi o?pcQorx#Y9Fjc\Do)¨֡g#Z4>3r_yLn\nAi;tn;ǻwsu`z}k(8kď9ы(dCf^C!+oPmUBS_}rcHb]twCt (eIhŴj>U[ r?֊&AO`OȄ9,([:=Q+fe|n,?+_%r>֜%[pz,$.Y8_-f47<aaԯذm<xfpMaV8нkWHy8g4T'9CIU[Z 1v'i>SuMh=k944Q  cZl:<ͅxn` -8ׯn.gc@JZx &KPEHCTH)zZ2tJ ~%1A0q&mc8/bG <# n/傽\=b}%,ܮ>qQkĥF|~ !/Њ9OגFN6?QTk^!T - ^Q[U)&la(&ʝ}{FH6D:Y8}&[uoh/vjm@!|Fۭ8M#|W0-rnf`61yyEqV}~o {\2YmRZ ::SY)2 *L@s7` L۞dop#i-𓙪B{ u1s}95: ?7p$9l}҇c2OWxz'-0LatŹ>ptqfmb+^gPf B73EcϑQ54$qzErgr!cΘd;RxA{aJRDvt/O4wcbUs$h疿$Cc'C~Y~UUCAK1c^+3rr[u-Ɛ̜3XT,[(3 OmG*_WQMcg8<7ܿaY: r88enD1ّK`:‘ecS-K#ϼqzTls%~[  [!N{5S]K,Egaf}>Г4~9A9 'zpf9Y@@KM0䨹P`[ڄuɍ'АcD߫AK="x#77׎ޥsjw'7F0juNQw 1@]KQ62\ j /] l|&ChU$P }h ك1 d޼I`F'E`l`o]e#f_cC+faӽ0ao7&Ci3>7ĨW7w7ء_!UP;c6jaȚ&fb-Ơ9϶hbmPfP+'Glabϫ4"A%{K4j5K %P@*C@B:ju6ޥZ6.s%,;2@!J4Cup8|bO2c#ԧDu*THc]~b͔(;PĠ$y/#$<97Ɨ#mPɤ> pA\3b:=-*8߽>T8N4& M*kmM5<ڇ!Y*B,ѻl$^ʖX>fw@ wسA`Zc\keXY=V-| 0{KƔV"lJQ џ_k#.X/dlHD*p4>OpP;G?E T8vЩ<:}Y3ʯODm3ô?n_~'o ?rTC klDd r~epF2tg߹W~4Яw:F:BN3KY;Aų/')2ϐ$DטwDϋY] bj{}R5K{|/B:M|4!uE޹ QVAa@|u:1[Gl~"b_N/*nd' [;\ uQΥ;!peF8.w qVZ'sbٰe_pomhCSڼ<2/j!xЎEfU yumq4l.1+[F\AK ͥ]cpgWy؛`y=Dr_陳I E1MF)˗,P qyڭ_xɋCxXfb)"q?M~/5:00ԩH"#\_A$n)fvhF>`aT}I7'KʃzzSd͍ du޵DW5km^͗^y"3qyn Q#N;أW!ynPIoi_|Q8+5c?l.?CAhRWr9x}(S0RW@:n,+5&T<؀yޘ^*}Kz[0"kGt(v^}v("'7 G1jr'qEOXY8|@cVKJB7JЬLou#h3Xm\'9YCؽ.2CB9G3ft\wܾjM_ab.T.8axڂ ~eFG wHl MukHyc_<}ĺ}SwχuEU >f% INs.˰ :jA{P,lܡfȡawwF{IA2x M~ KgAI@6 ޔgi5(i*]<.#N u/?p\5jIQc[fH8luڄo81R09BK[Vc3E5/ȴlg窺(]M t??<,Qbە0h+\;zq4z/[P2vR6l`!Ep©.KKHcUkڽ'nҢ~-N#R1+31Ў }Q2 bF?ٶڧUcd9=Yr-!HA;J0\h; я' Hf$RgGC7h$9OWGZIJ"鈦vDwaෛP^ 8=LvwN&pn;%Z|Wjp$ 'iq^)[Idᬬ&Jt}FL]CYE~9J~Suʬ\ۼska ̃>\啳v ]b &ZvEȱGM ':dBCܾE9Wb`%hg\95Qډ AM Nq7:Sdj=no,g6H2=\k_P0sӤ6Hsv:̌%`DGb)аfjyqK-2q O\~;.Ѯ@P4ЌC֋ft 8ˉbsFo&+RN\j|J9Κ CSv93|n/=ጣze+T>L1#~kXTuz5az+K[˂e 33^\ uaN>q/(ˉBFJj#B=$I_ANh;hZ,ڤT9=frb8͈ޟ/ Cg\bדņ'F߽82N%hq}׆-/EVh񒜗iUY;D=mFŷyÜϧ@%%-zsg1Rtss bΕ+<|`^L)>õl( ?F6m:Hݫ^&S8;a3@<5ĥ>4;/Gܠaw+>K QMFk ¾}bPT|-ZrJ5S a]l(iBkhYsTF>@]ض=qk ti cv$@[>WvN 0&U$1z1҃ j} *y ^y7Zc^mVyMiHc@ۆ@9(ugrדg7<ɑo I^RᛈʨXh>lV:wƧ`qte3 4%$U:/hQr*߉lyWM4^UC2Ja$oi䵄iΌQbd <ڍ*, w$Wx* L{q>eZmA1W Q競,v@D }iSG<д;%qV+3]iI_nO庇H@ԦMChI ͳ`?z.y3Y^"4X*y8Fm, &1nCQ|.5`y$9}rsYmF5#ȿmE2)r&xm/hpuz0 p4k^nXA uF=Pe lJȽn*N=!ߒ+BxCM~Tܦo*֥}v`rf~UU)>Wne:;^(kYeZTUVCh [_AiSd{ur1L~B&<`gg΀-(cO  # j)[>qLѹhl\BM_}7O_fHRᏏoz02 (i(KZtB6jr/FP1ߏ0'{|JB9u|f\oJZ2AR_\t~l|g-UY[yiiAe0*wX_Be5\?W32M)^1#PP9S vփX )kX(u4igrAH(&3K(&6}~,Y_*fn٪-A/ nT2'[ .ݦe )S-1yk) +W; 5?+ Dvg0^@s#Ox~+F g=@uko @ @/E2ry:Ԍ𽄥;5+dnRx|ye iF3&䆢XRȒ8uǻ1p:BYjA-T$;/ƥGZN; &|tb> q*1i:9;`MoB;10PsK3 I/l45'l;=M(%60 J;m\UMf']aZK<̠H? |r 6DX* un`S1X įfcHw?W)V%WCjS,-g%MȏmSi$ZY;ro V-1SoioV̕|`FX%qvݻ*3L|h6',SV犘N 3{g 'bG#vZ-00,T%^w^1BM˺[LpJqhp?Q (LFt'KY$!+,⊳ xwƒKM:*nETYwDqÅtjCORHM1褐:e!aLbȌ]UwRPNM0? :p3a KeV7ZE4d0*.IP,XS>?)@SS_*PV5ǭհ8ڻ(9(<=3m,s%-XڨC2i2႙xD{Kbָ74/ lb%ْTI P?[G@i~5]5o{ϴ4Dx N7z2% kd#݌CDk1`s1*bITbr}#;H0p]B7^]'󦝂̳.SM, : \úpbc60=8$%$\l1⊵m`*j^ >h[vHFDˮ<ʉw@1Ԥ*.4iB@C5=J87"d JLnw8abUc CK|<}D˸džBׄSgj%|~!n*I3Lf7a+e^%Nk u[+lӄ;+hZ47Y+I[AM?s}#8==&[Mԑ96.~ҟw9^->Պ}W$DƔ-lEk_3J%\YKņ7}Ў MD>*̊,yxrh`u;RHʝL2i>|"TJ[,KE=40f_w<N'nVk<_ C@~G䁞wm stLB+^M,FL:b ҪQ2/Ά|UQŸ5ʔᗀ-HoYaat1s8cZڵF5OQ\ikć@j/@˲j5O(N^L02htV;JbJ/ >|4MIk j3^gxw]#6Jn|U*-jۇGv>ʾvhE!يΐ/{ =W!9iFJ ͹5n= r-Wx} 5hӛ@YD@w;8VF@pe 86钀Jjۜ%mo %zr([n2HLbO$w91y/Ng.;!#[D@)F§4RJXx_xyW)vE$ROV<BNxà&(`M)<9Aڔ- !}Pnƞ"e%hDvak:GL70,}BvN0Z#5:ǒqIEs>SOPE-l⨢Za鹥#n״n qzGM .F˳3SB\E-Tf`.(77X6A]5D@b 2h/` K{ }-Ҕi'\mc@]$\y;)g#6-]+kAM|Ab.x4`(gxTCى@9* F޵jv~m{I\5 ],9j:(Ʊx&XCчRW?Z-6G+8i<\󧥛wNaOz!Hek%,zATOpZ=&^Ǎ:$x(cʿƤ|P*`&F Ŀ]^XIȡ ,w&GfG}#~= uY ]_,zFD)i\3cϹă.D'7][`sQ(UA .~AD&.Ȗ%?>H^|(R-עxk]R[ \FQ;L&XNvsITa8t.vPG(X5b ]yπmGC=7<2H?^85K@F ;":PF=OM^b`[6ѧEv7.%8ypffM! EJ)8BGK:EaaNT0XE_g\ <W-dju~zGsxhC'bKWzw*\؊`4N]/zTg%͉KḥWzU⨮wtd$j_<_IRWI 7Xzg&7Jw `j7=L/؊"RSBxld%邓:1OH?ksFel3=[ؐ Nj6weAdH,"}|6yşVt8Ve GSq3+`*9J lB梚}0Λ2`G3E8u5ut_rbE}#^! Bt,R?h~@B+'[_]Rrz|S[a2Eh#Q> SSĘ*-0R0OapM'Y;WQ64Lb҉2Fv"N.(:ۑV>$i>V#A<?gvvnCk/I5P^ЈU˴ˋea>Ё?gAuΰR~l9ZBbcep@[ٶU3z OSf/xѹCPuo.ÁϘTa{Ll=Ul`slUx1,=ISamqIb -B7hAJ摩)]-`Ꞇ@3/ڪ37ŭM jPU_WQ6NC<2yw25,:$εJՈL7 ijy4$GHc͛#21#!ssbv:C FֱeeX%[q6svSu1IW~~jscڂMf'0""/b{.J}r712e/ oY'9Ueb`.S E ð?#Z /Kyc!VO I!/7K0;HKߋJ`"q|KW^*:m;6 TX2 Pm-tiOqL+@QtQxk:& @JM/q\vTWJ8 MbEd-"uJ0U DEj– j9<deޤFtnvPBiE)lqP@F%eLB&ۺeҴ,_t" %zu|qa^߂om]#$:*]n丛]EuߪD Ղս4~mR<=%(yZ8$DFkb4SڼL׵xMÙo(hÜe d>EIkM}{?G8Y{BoW{nd#6J8LQS(sY?Ԕs#wygd)Ӭk#fMT:Խ:% ^ $MњrS|U卛'Ć( qd#w^.Aڤ\x_G#A ~[= Ni߄eb1m]9&>ZXJZ%KrStX6} SUvBLn#ʊ ɀklwXv Ŭeߋ~>)*VZt8OH\r|b[ߥ^MvrW Vi58Qa8[gϷdLȾj厲#TBiJv@':O޵ "G(u՟̺ c;F+ٮ݅2$\JsUqJW}C8| 0KoH_͵Q5[iלgѻ bnBVbjxtv1tAW&!d#gjrI.®-,>+ sXLATNgĜvެmEDRNE.Dq}W=fM|rKjqRZg85$ۀX$UѬ= gp%{UEᇐЛg1ɵ/%/ f C, ]VRpmLY-rE<R`7X}*\k6i34BMH=;6fi0$* BOQ⹰X_?\ѸDͳx?FobJ5 _(j&q!Yl!eO._.mf6ƈVy}WuGcs4h+]v"#PLY+vnN`Z(ioGcgm4%c6j! IYTzZC@P-63uW_%^+_%jQM$&D3I7m/zH#z%qĦT xY&kHS=VM9QO$˄\d1,eNBGe IAv Lnc<#Rp뢼c^椦QIyr 0f9Ŝ`srJV/sT_pw6:%\{R$샲Jܫ17 *zg&;Zeӈ6 o>#`30smޡN<eMPF;nzilw`RDq"Fґ+d溊35yI(my7B" DMV[(}ɚC i4ǡ#B2R}v,[q}1k\mDzR<\)H+IC&2DwC(5ȝ`jhᎄnD<4!ZD$ ҦL/1}%Cm&&;EU>5ɉ5UYr.:`%q oꨀAވ׃H ?yՄrQԇAMBVHN_X^ j:;_M)r!`_u%);}]ۉad8$|STUMv#(, ZLYK.TBNC%0%n{ʠN@̸qQt*pk.҂QLLLk֧M2JhYeK 'HW4!Ԛ]tΝ ;npNR9Hi]K4WC0TC. )S7 /{FeI\ dAbQ2j_djE$E QPעZ9܂+ p"!T`6.mak"aoN$uծ~:-=.i0eI±ƉǓ^>njSȣYMzx ҿ ؑ軣n I};|yZ$ f,tօ[{[UMw-R /ZTd͌ͷŭ<ՔўXvB VD3L4ЩHt~8'-cTHhFennaza/o~㏱d@eWVpe} ó\ %vUjTKDI_Thq 7O!LY?r[ SԿ0Hsت K&Kƥr-*BM "i{{hd@/0_{OhR:JR4䎧LbOHP!Rd6s_QmrAp,3s :)v1b^rs}pzpm3Ηd܇] W&xSVXJ!tGʷ VS?7i0~1]Dl1`Oqi#񅵪(ҹ#6 ɐy pL32l*H@^L1e;H%b|b⺔bS/.#:}IA ς,vω<큻渎-XۉifUtW@}Dsa?ablpRS]aO%(BĹM4e_l5ҙ;]B9kLjRfmIC~~У>]{6^$}=ap@Pߜ1P]tkpLFqmĕzR!5~L坥P"Z mb5%$w(VՍK̎T yJ҄WqT1~=bT!h+soPʯݎ%$>[15VfBGȢak>6^jzo{wK`ݽ~l t}T{*)vPj=$ԼGUym31k ;"Mdž[@*|:R䊡B hvQߣ>L8Y ZqHءJvZ; ۀ5 {,=T\f,2nMP"FjzjZHBDI z6ϭ9􃊚zW=fZGNH%/BRL!G^0r-'>Mf xh$ceQgEasW^h='UiG}%m+/rb}xEpy2w8<2S LUڵ[g?T:SǼuwWЏLIQzHx5U7n>=D@N3h+S_) eфi,E;ͳ Q39rIDak4A2ФVd#,p(K`u[fo>#|DƯGpNm3T;! zZS49Irf`*ŢA."s/|&ԏH MZ<) /rU]>szX}١"_K.DLU6{/ Mw̚'4*61z=wC:[ 7*l\_eezAR(a#}!wf ;VyQ:0~{;rnN&ғ,ǐ/bcHJ^K5[IX0l!$3..!C3C^g߹l YJ65$_gR3A8>fߪ3woZn;*fv䡚Jl'+@8dxM{֠kᓆ݄< R9×wk0Vf>1()uus0h\~Dpi2pHsQruK[Tp A+yf~ U9eO{lP(ίwx,Go݋&L pUT4Ow~+)M' #.j|L)zI%FVTgwUYsKe5 ȩԔ|Idd%a Ti%tT}l cBaHgx.=6uSP_&fk5B0} _sXdl1<[v&.if&huVRګa%sԴ&3sM1( X]wB,i3@M俷Hq?FF ik@PGv$͝.3ʹG"WȖ`:0\nAY<(GVRP2{1z{h8!bH9IgZ2k;>8L^;mq1DHk" a O^XU|,*a1dvY*TAÞ 2o=#t{2.QGZ=zT$ OcRlj+\Kcr:jETIu]Z9NMsl9pM;Y׎c`eX6`sZU0=N&~ؒh҇|"8x-GgaB*jqYMׄiM34k,bç /#`H,4y eUPbhZQajuzaiSm"԰!!hAbx:t.@.>wOqw\vEwVj\5T]Q1vi0@ᄿ/(cC *C2*fcT:x3(qQxVԌ[!ݍtX(@*t\TtyÂSC޶{"=k"4Ǖz#?1NPMc.ɦ=x4#D8{23R[C2KاA1r?ۓ,ߚ.gl&W_{LeXX>-J 4;]H̛,ɞ~5b]4;ͭF3AэP6o5:T8)t#7jvIeXܜLm9:MJ+nU=yHm2`gg*a6 Qm{=^NXDFmkc[S"kQu˸qJ &3O/WKS$y?` XI#]G@ 2vlhyli C9ӱQ2 NoaRuu`p.}s]#vL&^hzZv6 Lhkc:f pP`r٬Ѳu?IAaB榨P?KDze^P7'z\/Pz.~~U qfG4v ~@k »5~'| -m25a愨O{b,eArs)6j51d"١U-n*|w3ٔ3{P=$ѹ\]u޶>^l"c}!XDs,[Rs`^Hl]f^=R)ɳID̕EE)O$gOyȃ{iyb;:)~xYi$vD;Yǿ/2ʎ꧎JmۦD$j:+eg0_\&DzY<4>niQO(q mIP2rTc0Tl$ ;l3CCcLOxc14{Ҝ#j͗B{2O|{ \"U8W ^">LЙ&tbs6zRBnFcv5$@0ojDJjjB?8+ ?4M/x9-U'Fyzс@ne+qꅷW-w`HITHZhn+]k{KPjȱ=/ߺ ȸ__*/l2`K-" *`pVݍwhH?n }P^@꣣J'E8nG+qZ0 |tی 70DHGk{νؑ6}Y7>!1q+W|K)A2O9[@$_% (qtPYX?{<$`[?6myBQZEY VY竀> KQ}b$o:ׂٶf'o8ȽioKEBYC #,gY[ff!m9Wh2#}~4/5\j;F]ȫ߿r0s-96nH,e$/WW ]H]L]zΙɸ6s7Kŵ)Vj15mU ZD1sgR;?kK|/w9ewG*VQJų*mP;0^X3c:U!oQ̯|q%ZjWK崈]:s8S3F6\7?AQ-fq-2/f/^}^]\`K1S})t(k\0aLNq2Pie؞ZN~hHG1`p QM6/o j-'I|{D(I"yѯK(cRk^ &E ّm[ڑ5`s?Je\Zk4HGmOt@.A*PI7/*lpmg _A3؍*T;Г'sBfpFdRB1)^@^[48bƨo: 3&7!Lk&y%-_zf_٨*J`5ג]ҨWchg i9%|&}XO.WVG@3~y_l^`w3JF3V$#q`75}Imqk7V~#pUgjs3N|c{f3tߪtri\җ4`8D U֊Ϩtqp_Eà܍9`mk"3=^/zLn)4lVV<>w7ƲT\sBJ%el1. 9Ѳ'Eø(ᦽʚ%#78EUVUӓ";tOϾ& q!æj403X-eq.74jv 1XMKR=!F U R.pz $^##T,? ,QEm.2p;+z{tU^8*)&Y&#CTwb,UWޥdLt:h"O/H&>{|}#I+НD9&]eJJ ])<ۯ4(1B5cP` $2yJ@r,D\=6TrX&+41tN*./CdsÒ(EmmtBB(XTI7hT%GpL~ |FY?.ZԽɪ ~k |viQP$[̕sǃ7 gg ݨtBY'fsAxQ;]Cx&f|jr:[Ⱦ| Bg@lfmB 8/(;p6+ru3gFtfkTL4It`Vq YZ(~G˖18WNГ.tveHsҍ=:dQ0xbc}s0oIOs +:3(ʭoi{C oEB ҙYe/h-a?a~/* kiQЩRྡ|JiJfhsGjzITPĚ\v?0=DORfDGmz _gj;E67en+km+l/0}aSyzRDZUI3i c9 H}ʭC 2?3|8fAOd^帿{h"F <\oFoF5qbx*5Ǽ"A*Ѵ3Y w;dF{05P>'hOo 3S j"9tHk 3P'ARin[~*K_׻n&:MiST+ @Jg>j=?Ͼ.^g+793Cl((rOT@hR Uu x{081Bۛ *ҪheVFxV&-f=>-gP?\N?w,9'4ڠXY2p.vQ`JD[5r);xu׬ k=5Ί{/C~>{c۞?03˺fcߜ*MςLjǰq6MF5x+,@ԥ]$V1m*E椱:eV? zo-ww Bfrz퉡:^(PekSӢJ|jfCj *};8*6]dL~74շeiU[/$n[Ytr,ՅT*fݚEXK2_{B>0i N cĝci :{LkuBh6E98T[=RnS5n<JK1fNuBi&i@νn!:!Ȼ p+`}|Ť{fh5sB1 +,b-#?h vG:g&jKQ2\j;B{.瘣mYvz3T~*0l&f- xA%`ab|Q2FV9ôЬA/>|SL7e4m*Db]1t| `>75;]o!P&6(ݲ! v%NH=N Ct(x{̧,"3U2N>zijt`CXivcaG2W Gܬ2;򷦁"} 7J: y܏fWY/`A7#xv@;Xb&*Z]# &1J5O+%_!:;e91tX9低B l2;/9Ӻ,T齮O@+{ru[R"Cn#|6j8z`L;U:iB(:n!kuL8'Ktqϳ.|V^ \O+/t8hTǵ&8FN3ՁijOBӽpxl< y&52=E}f苸?;ViA Ё64R=S{iٛ2SPUPXTU%P'QHJYql}=bw9x[$`{= H[$Wٶr^:=,>/Mj"ڐJN8DR=Xh :Zo=75ZmgK<xa;i2.mFsѯEO9=)W}>KK ݩ K&w5lC^Hh*cbPJb̭bYQ#Xa2'dp{Xnt_ɠ 6@vhYB< 6sE-Ov~m grYgW:qMUSbZԯ"T)w()>FVDCDP$Fl d*Sʖ6>"m|/mSǬ4dlۍ)#@js%+? <MQB?489W)Ia!xФzdl"<r15_CK+ d[Kέ%h Rt_$Ek#x}Pwm2|TgN_4#OdsBNH}wM Q7`te38HSAnͼ޹7LDž 9~b y@ryҔufr$ٚx|qS]T!3ӅlT`u͚@Y}ʋל&\BV}!I 0WUrź :CiQ qBta^>,6+.4(dB~ ' k.Tr~9->U ,/QN1P2vEP7qj9`ZVIʁ!V+! kVe0Xw(ƜL4z@|k]'+)V >]:/̱皒sf>M"mzJk09KHIw 4Z5N WJ kTIН$KO:3 SXzDh-+ṳ8_Of(0>mGZmITjc7ۭoڍȘ@d%x=šGi?"jXq* [pf~[ϫJ&/*7f`m;l6ƒj qRy xU|@wpب7Vw8d!-r\%ܬ 'kʉ] (ĩ0h_> YdCO1oEtd((-"7u#<횐-a^+ҥCIjȴ>+j;.nDL$>!4G2qT1]6>,al M%]:) Nu}W>0ȐѨ㣊($Hd>9j!x( &n‘tl*OawBR7׋>&ͫ_f.kh\U^qUqI&Ng>/ad:-(U˻N6?F;ޟUһ0V0W`8~1`ə\r|,D%ԞSdv>"cUeE:i!̂j1WI1ۢsd.޿q:X  ym¯~$R]h0Cy7*&Np8V?7ʩ˞RQN*y$B-W,Z #<U"ގc;q<[Ԝ8scJo}|i;"Az>#$2/H~W.m{rD%Nmny%@wK\TmNL5ށ`}^\ U xy%dc/(j,ƶn MH(i.M h6ƙxGm@f PyB捧FZA$|+18bȣ "hY.R(sT@䷩3&N@#hեy;rX=5!`_2pS(kuvJ)~ wb(EAP!PӔfnlԜUO 5t:ǒC]n(}G`;E/)Z-z?PO,5gHqQ7e(gr, UQud U'Z_B'fxQhRҾKD=w¨aj/U^0|rU^$-WB|1y2;K0ҫ5fЪ[NaPrCAN/zvC֕c$A]v\%.E3,J+bЄ]ZK뢸cAOH+\V5}ZpcvV)d4v\FB[+2F7t)/mlܣŨTB kŏoB8ecQfD;:5< 5U҆Π{$&b;cxȫUk(ߊ53̝t83[DHkAK MB)tZ53pkīZ`YhP{]:[!'x;e(ZYk$o~Tg7h79nl-X!ߊuUY`G qR:ㅻIC\Z_kF{uGz?U D|Vp -@/j"ax jsAzzOW[Vm]U{ 5qu#4V_Ȟzo{G؜",od#Ýc {О''^߈͢5KܻUwQML=c}{J,˃NLy 7RIP|gu]PR~E6t=> ),޽&a iᬫ>)`p}/7+W^w(^W9Z,Y5*Ŝ4LKWu* o.HfY^N.1+i~kM_F"DdœNVÅM"+kz@ 1BEX/)Vsy"ֱ=Pt@Ư(MXe迏L\6ld61^J{Ԟr,M^$20 T$jbs65ľ6>G֣$I:QXq}߈U >̌@؏LKkI_ܶ q&] T)V#Fܽa;c~v"k)I.hEQnjZ|9w!`M<6(Cꗌ3JqIO#>Oo\D]xvpv7 |^$+Ρ{ 'H%MY֖d> z1O[~ uP[gv DጯFDgPbi0S/')+=q{P`o3Z?, ^:1UՒ'ӡ$gY_t+YIL0U8#V(Ď<6!do[T>ZF(|qk0N2(qli3 PN9 y&Iؑؒ\msInDh873ΜjͼhF>%#R&TxSloJVPEc.\S 8o{lDDzq`<ۓR[,q^~Űt~_^ 0 &ǫ.5|;YiÆKAi1ǻP/Ҏ1]oRAJxl?2hbiZbEnKXxaI6rWj̈́ pv5ExXND)A k6B%oȹѕꉒT<șb:nr*ZD4LOR;2LI2wh rǒ^ԜtK/-51r.k` ܂G~vJRzMnl+\2 w`ob{; yY_ee2+qM9x"CMŊݽ{qQ67r xD}G%d^.U-veئ)+*tH,F5f>+C{[@[pG. q7%${BÃlm?HO^UYBKVE߽ C1{ Y~o|#ApMt{˧A:FqA+#P߹ rcC(*22AIe+wf*Mzד.%ҷ$]a͉Ōc7]UV4qNҭspGyX˯Κ?ͱ5h^÷wh_o+sݔ+:[M>z ­?=ڌJ=QN=F)1A=y=HJ N-o;)lFdv/Ke22]c; I%! 4,^kҬg|dԋ끓k E=G<ɮa q̪8Cg?Ɖo5dYg)>;BTέ7B ){iзBrףH ; å7͈ 4c(0CVkLje9)uL$ha>ͭe @ ;sHD 81MU\s'gMELT"ffr4+ 0Ta)VomR5M¨H9zi=&ۉvXmB|noͼ4W|.NcNtЎqsWZV|ƲWD5p1 )!w HgRW}X~qa %+ J%OG師˸[m5Ո<},Rw󋅅FxYfm4&fX2:˨㙕|48+o!SåKBP5@VsZs<7eYj RN}< {]HzUgNf~o†;7;4ؗpq *n؉qQR˘ .fߡA㶅3FQ7YfXУeb,5$M"2kW3͠ Mܼ<ˆkǣlGbEZSfG}k<ڰ|섏s+88A)} k*-)p*IKH۴#;Rj< ̴~rjťN?Y(I 9(m_b}!EnRهC3bksqǫ/!pPMt6VpIl!EP]/V*QX]wBXg]x-Lh_zn3Fn2pq`ljO(t^!9c\'?t2|:z:aPUGDQ!::3a~):QB}G iuUhqv c rapٰS^Jw$S+ĶldTr7 )i#p1_~(YDKbDsrXmvUxɳyA!0g X ~C}ZV{ F|_5pƓ]ˊIq&CSNf-߼ԍ\^Nvl1=/Ydw ޿ȦeϝBߋ :qdQϽT傅D5aA\$[B6Kdo"(d3asdY_RR-_O7,1 `u̵' *-9Z>.^]7sh쭒lQX T[+qdLO3c8-xlYu\MG;'kObm?@ln_S#7Ĥ,OXҽK9~HN-f,@8h%"P+Z37/UG@iBŐ%[EҮCfYl©e=ElnK}6.ҵ.\-(G,zFaY2 h@ XeBM-^R#!b)YI[﮸?dpSh0GWT}~;R0Q%+Q;R*fQ3(2+S]x"􍝔[|u)l &؏mw;d onِB{Z壷-;OـkK}g`ݰm%I9uVc޾Ȏys+K{./v&8x*\?qU 1|]4PQL*)+"!l8anN2 `ACSsw'OYueBn>zb:Mɹ;8zs 5|J_cF<'P])ʲ@-8cngmp]:E 4G *%-:*wMДݖ+/ lyI ԛ - 6Ve3{mWJ7ײ"2HǾ0H|m߅Q* }5+qaì2&F2{heiAoH ,x}kix!D6*\hvMa^k6 t2yPBBpsۆJ,D}Za8FDw~O7Zspi3)B'2E;ݟiۈ!TЯpmV˽c9G-eAk9O[ Tdo 4ӷ`KdkbRqFJOT cRGm$r\.i >v2y֢^yٜè11M0:3].iNX|썸&. r37u/Bic9]b^™Cx(o==V}ë`4:!2rɘAd}mox*)dmSu9Z[!zV7p̣2Q%o?2jx5c8ecY…aEoN>"N ƪݬ[wCH`&[erB\$!+%ArȃfME_w AƇ8֤L0s~,㬛*"$؞0վey\gFX_t O)GTr\X(HԻLz]~~7_%Wiu:?}YdDsTԍJTTZ& 㵂o^䤰'=Yq͌2 T+Ҕ^:b,ꘫY/<3gN".9G-Ԁ&҂x~ѦzwiE={56+{kzQ>>Î$15ELbAx@g$nrH cFtqG;P!Tv3i>ͳYB!C[m ˁ1ʢ.jޏRJ>a[(!LƎ(tDy G@[7bɚLdau8&ICf>n5eDYN3ԅ pf~ o5* 2os=>J HZS>I̳2E:% $'W=5 %e^E})mHH("bu>ݡ %Rt )YW:j S`E,mb#+sWZ:DvSVq,_v-CY}Iq |jlUM30MEϣwGSqߕ6q팲2_#u B\la)mQ פ4X1F ֓b;#I% Vc?,~ Q RQn5)4Bhm F=N*t}5AՄڃ/agZwg/\CHLnSӜ28x)奃REJ7 )fxd *^f;QmۗY|Ƴ^؛x2f)E)r{K]XcClgɤ?905b>jX9Dar} ?YT^{/mF2.YE7j[#aĭ϶V`F$ps=٭6hOak{q("d=> pX6kv.d7 O\2m}DjgvQq}A  K#| ӊ[m-C'E+p@Oč,cQNvo:*Ye|0N۽:?(z(/גlgJ /"oG6]GSZWyAݝrkH4e18yJ._6%S ͎Aԋl~d|]b-T(9|0L>+z8ŋ L9f 7_+XGeӬ$+\g=afF[41hI\O{i*5\*!g>t5~"5RÚwmVE;i,p xOb,nr􁠡C|O`oXֱ{dclWS޷y߁q@e- < 9gzk!ңuQcRIpAw9Qv|0N*ۣ~x(` rqϏ Ho*GjYhV,UR͢ayyư N9>*Wz[wVʭP|f[Q="Coȃ]F2>6Z*;s)_heT/NNvH*GLx-)Hbإ޹~Їjr̀B wFsz}caa3F8ɱHh70gU&hgWآA[O`*57s4IK% ODD5g5BCR,9 u<ŀ| Al:b t@h$Oi8`gэc{ɛ\433 XfcDDpY`azioI8{U GSSҢ%AnԈl.${d4ذ3BX5d& ?uIXbČg9aцzE%=>L#Z8 Ėbb`Ry6Y9-~,4= yO&i#. :XhGE'Fl@l{N^,CV:Ѻ{I(R!ҙf,ݬ;hܜnoXW'%rR)dxѰRvM4-.0@7Ea՛ʡw*#tmȞ?аq(FAQ4kc=Q,Ȱ&drq%oz35UIӅnws-9 7&ˑ? & OJxgiƚL5IV Ե5$1u2@$//'gh?_̋Ѝ%,VO%7⏠aJʪFmLaǧl/ӨczT:xc;l#TDnk`Z-4ͣqJb+"(Pݳ[/b t-1OL~X;5اwTf渪B`wj+p]p;4̲NA6&|A< Ƚ1I㹽}ALt +ޏ8*A^Ƕy˝#dH¦.A(0|tEq u@J;_e&Y"uy{Lk]G^(ĶzQڳ|{s$&ceK͟N$~h NKpVzlTmםyJT.NFomڜzvO9 [ZRcHXZu`Ozrѯ3h-nF!5[Ha,YW>5Cw&rfI2ł"$"yw,ٟ ;u[)!B=_܊6Q 1*kho m:ˆhLeiwsRan=ui!5DO?XHJ\asP_p/HX=Z>q]ĉ{xi.1 J?{ ::{pf)OZ Ӛ BGa+?P@r&, ;++u+ҹ"kXzn12,IÇ9kwN/#}z 6x+SUB;zM4&dCMP̐4 D<\R j3XN]gxu_u-2Ig䐑Ȇ Q;#o[?0i7BTY`TV'aXP)OS32Ty+GxJh j 9B Ö¬ zM]y6GMUF5-M5r~_ICUX eaU#(B|>{ܯkNpa xE _u_upboV=jnDL\Xl3|xoڗo˷w SBqgyXÑ )%Ӌ-bu gN˹ ҉ME_sr26ھ9Ykb[b;Zϯx HʙK@WU-:=׎WA5vyNeg !1[/-lQLPh,FeZș }4Chea'?|QFJJCމ>/\J#w?z$~6ߒB[`ǀyIjY2S LGO}G=g1qJhGS[WE7[&Tśh[(sDv8C3LʯAIF׋{+VUaoK38}2'mwmL]B8&h9* #N1`Ojk. 7 uVZŽU.M駜gR`]Js6bB_A~7lMz?C"չIk+ j3 i F1E WͲNy ;|h(,_cQv;%l 60{үR\Hv;pGP8p9:vw$yǛH: 4^dѭ J)Pݠ,~}Ok' McsUd2#Iu,5c;jycL Aй(:=P.-<zoxbyDzW jrmT"\V8YWb{F|< @Gmj !yG/3EU~]a% ,:ckR$]ޕ%NºU "bZ~wXp-WU)eB/Ѐ0s~]6eo_q3cZK@TTXDGMS7lTi._Nl K_toGΰmM"v+JVڽ.(p%܌gw|&>bC0p#rC5[?EQW0#vŭ˷CqF S`(~CVd^bOE>)u7(]!Du_ϑ?&6Sݚ $9#K2'DMabzXDCKb>Y_'y&qۋBjDZA̍/Hv[{b냧Q~f5RY bZpZo+AxaESHG}}\I݋)r0hɝ. >ޭ{}\o{Xϒ{z˯aZ"/91?- wh 91Oߊ%G_x HkTVumnx*su= $2 嶌jlّ0 A

qŽM}jI*^3we-@:q巺;W.Ba}m!yQlm- hƷ?6[Q37(YJ mNHDA"8ǺNg䰙<@29|YCMRqMa<X7g$gk J(D`j6k[dBQX>G%Pkeyu$Fm&4oU-VާrNJ/tiпvLA#sN:}&AE%NW]BNɥ_p"p9 p"+p6d$6@ͥg̼eL;7.): ] `1`f 8?vһ-|+ 9%ZD\JOp AH9 2B̲VJppg asN┺ihv;Wk;FlC-W)L0l|F 9sNYC-om|p/͌mocKAͭnF7'hhP TG}1P\{H4R!]$Bciw<2{RpϨY gyH}%1D1X =EQZGu G hb00f*& G\ë&L F޸?.7 Bqs|jx]_LM{eoB ܎Q3Ɣ2CR*Hb3)6 q8{L܅' ng,zkimpLzH*{3Yl$5DdסЃ7ջ6lqv]}u7RQхө$|$R".b+ztVWn3(NReVy7 S5ʤ7CuMu`$:Ky5Flm>Tc!A?؏f§}aim] y*w#,'sF$-kܲ՚{A|`ayىP,,R!4>l=JNc?ı!K#.>o0/cab7EA*Ԗ 0)A'u.B?t+k$~<7_?IT ^eh6| >ΰ]9Ly؁̺Uj+a㗳8l*4[.EuIt Ɋ 3e}=I@ʚX7I`^G \nlS4Ϙ¦e*!$+}J@GyˑTqW8P:Ji [ ۖUm`"p괟h-t?5k!t~y4R4&C83Yߔ dvþM-  wDDAldm!_Fm)@|96Il{kiy"X_$dd|aPWy7{C%x$M|oQ2`:ޢ 6Y_yߚA2N1iLGigᅱ m8 {J"oCO Њ+i$LPf YF:R&a~=DX9%wBB|sv|8/*Q̛e ;*JX%CMCZSV]-90|a=Wir*O{0C`@NO_!0{2Pn}*>>@XBEbt[rٜMH^8HZuCr}ҋbved!Vj5p,@h>kϧdTLq+e/nXӦ/[6h< 7Ot`{P JX?]m ʨʮ0"Ey,VF448'/,/ӱso>:b4<#Z/曃JV)#c @fܗEˉ 'n2*+WG;_L`]Y5*"{9C9ܸCթrb߽K崐qppqEHqO `܄oؚ6b$8pn]*U#^ 8\OUZ8\(G^C_mx5Z&F$J-ŵwO%UF4VK߽PUJbaj./95`*>KܫW6\W(3 7j_P6\?hj%1R3^ЀgƋ1LP-+VA}>Y۬HƺAkK]lPRǟUhI^15qW/ ÁD/ls% R [=_7%G?XzCJbDd}zN Ie?7˕~[Ď@Rf`U^1&yF MG= 3D3nI0ny,K5Z-qd[XwT_t'` ٘ Bf=5\ORf1IQ.%NTs: Gİ`HbKbXݑ K`%Y'?cR l r0{ F.B;8F5ęLhhD,qj72ֺl-:B2dh-cNgKp X]g'*TL+R3[ PqCs̀ĠUkMrƉ`#u /gf!@K? 4j+'GֶW- <RIn@y$|#u69OPQ"a u1/buuĀSMBv,MFK_t:;ɃX)&+R6-YNJ+HbR{9\rs5T5<'bɠ8P7G̐k POgɐE~ whSMNI}֣l䩗\.Lw)j]u.!\hrUSX%8QLp36k|VPޑiLzᴀH> 8 kD+-Z9 I~Ǘ#I) r%IAIk-l&gPKPuxN9_cù7 }ĘlhXY ,uTmnZUݩU$PE9HKdGBqMoYfXpg#SHgC%-E!{ u"=ë͢#_qmemzDF)Vo}TAqa bF)*7)٤}e$;SMPFr+3JTA0RheEX+W7f(nYKM7Fie۫ Nʧ[/%X̢8#Yb9X"1'cKd@z(Tx'e:1>WDMrd8$5 AC&Ԗ_ K"k Ao`Q"s`MK2];z(q*>궿#%p.k jA@}PqC6yX`etkOXb eYή+r]y̸i4{$yL,U͈~} 1=H M@gl^tS6Bo]j%z $$;ub&a9'8-fΨ X3AyG$x=~muy%g8{֚ni=+|"TNVI)0vJa)@力-nNp1/f0"A7u ׿2J>;$ĭf6 VzK:۽gGzH&@'AP z)HP5]lS 8Ɣ*1%_ƾ[ayǠœ`^z cX" M 94#x VCv ϱcY g$N2( &e6AЮIeq6=`Xlf5s^4pD% X|JCZS(C +}zV6 h䰬EDY_%H>LTX KGEgΒO⫯b,Ow>QnCK z< h QR?ú7v;AB:g "nTz_H̀s]nHpZi՝;Ngm[, kd$^Lj]`BkS//D`A`)L(֒ʼn<=(~t s,]otm|&A` 0s˔j*psYAo5J=c- F%Nыՠ6X :ԫ=]f:P`'rr/ P(hwwi_Vwvhlʥ$j[v53m) FA \a@:߂5*rg~i+5˳>Q]MRXY/he9GMcAՙ=3(p ubZl)o9ssn7G4c3tW4.'"EYbrTC jXh{wWD%*Vb3UkAIdЉ pny^ؠ@G.~wh8FX1 Ww|[Swcs9yXAT!36qtH 뇧,Nai<Pgn:,m*/EP(\w]qzK X;?_['?"@ C?syEfP@Xum\܁ancSǓl3> ;bU16H =QUIT#us9 FJ* [. h8 ]#|)+pIyXuhh 4f7{!M !b}JНJ]hg\alwyb9U /:4shbNNRU/z/?!w#/!F|Ycܸ#m?M!;WbG)bꓘ) \I@yHX/W+`B!e2#WTbFɒ ij9(dg,#tNNȉpg8PٺjӗYY5ۺ,*0&[gb\rkj2-y; uH.\F1lquh oC=բ.MX@#$GƍoH )WHH[7xɘ)Uk]NM/YXu@} m_7Ϯs3~e F(N\Yg1M.tªlUРi]|Puw@I/>]0#BxnS0t{w {$lWovN"3^4n[;i=bkRЭJˬˎVaD9ܴ!˘,§p%D 5?_(Є8CaOϱP?8,A$manJBFyG۬\=o%Պ#z ^rtYxV|L\9bHm0pFcrlgbFc͋p;Zi !". 3Xm =.du[$J2e/\RSzu7.F*q PL&OwXAVm$X7 ko %\Jm|L 4!B: fnZi;WxDO>)Ui/n$%O6e=?KZĩ%q'@jjOd4^JvescՕ9*)t"Ñc+CUQ[$ؚ])?_LR#1 ),AM.xz$kUs0 P(1ehɺA|Ɖ_]KZOUněICwי'Gݛ8)2(eblI/^{N,PEI٣zځBܽ JlyA GE铔?1վ}*nȪ&-QhhGkEsQ2?u)~>5Xܪ96? G;Fgaf&I)p>ׂ8aVZ`[*IKҍl;k04.GKynpMCxf] 8L6Tn!sKu;L@'f) 817~"1G:b׏Alhf?`C#PQ4tzf| 3cRSW9vhC>?ֿ^ cUח|"Qj*|D@P-ie/bu;!%@ ]* HR4gH~L#V:D#30T 1[ 0+p_{!-qk7fQ6§:C \gB^yfW@'M{xp8ʤ6\L+~;:Tj{2Rjg*[{)R=?h=Qi^=(tvTr̼M?bjXOdմdpPB^bS<՘--ySl-5`&`_~$m1l30^P! ijr:5}D#Wׁ`*!<޳+x,~O!fb՜R3~xסvWj7 _ P :塏JǢ>$X܆%Kk8E'6~0))9 O.j= I@ʘi /$M0)S%ȼcնo /"}﫟-<3T$ ɢ;llUB`!1w;2"A1_HmaAm {h:^挐)-SU246M^Cߓ)PIp aޞɠ=r-^訄npO<& uAE>R&LxU9ѷ=Pvm(5E'A<2 FlwkD2_\ƨhj8.*o$VF3M9$`ޒse={Rѧ / Mvzֺdh0eDžhaQ Xƴj2G-+g~rm;]JyrƵB*Q[{+(CǷRLf}O'9& o7w5*-bCoWꢖ<(4}n-]xO5[I\0VBƭ2w$p0;)4X iz_H#cXSe# 6q`ShLRbkU"IQ3>Vfh,qI+98C麪L :@J.Cp5%?#3 *T P[Qa:]]lyL= ^_URt!:fcCʤrhjj#dt|ȔyZ{b>|ύLv N />1O ̄",(NKA2@7fcIl ;XDZ+2ZޥMn.Djvܚ 3uxAɒ SV/AR$ǝg\4?s~ rPfq r@,lB9#B˦ *5E3vOJDn$f_cC{Mi,ԃCh?M9JdLcn3y}9*$HGS `: 2~͛ޢ޴?|{a!åվղ## tTsu͖@"!I+CjL8$K:nEkl2T–O_3}zN'ٍ&O*Ө9|%T=2.~O0Ek]dsp $}'ChZ&OީxT`֨y1i3'F@;Y0zL< w$zK|+}^nh[>ZpEr,S"[:U}AN~F-VJ砸W6,炰A฻<8W|dZrӰOEҠ L$ӮYJEXp.V1,0Il-dbUɹv%09[;"%IPlbuY}4l~w&ʞ%#9LP"9%\ŀ**zhJz7 Amo3TA9U}+7̨t0ʁ94Yi3\:ͼHΤp5gz;u4_ϸCq(ve|[9ء4iη5<<pȗˮ>]l0@-^a6_d)9/K )?ue ?Å9x*'uKnŠŢۣLw|9n#'do_" /T;](@e;/}Qcq\[zF-+:ȌtRޢ݋>앀5lCQM2 o`S1$B*J| Ko.>adFGLՊsBh-}ErXl"d^9b 9KI~'哄]rhRAv_f>J\,pI{? oWCg+1V΀5(O']=L;>=`~q_ߢ'zaJȚ#u/i캳9\; HKԶl{а`ĵ|]rzW`õv;.`II|Ezffv2P .)BAnCGr^F"*Ϡ=LL9T^YgL`+Ol'[v) =Fpطk CN\}xIeq?o 4V,bi}dZ _%RD PW7yz/UO,@W W 16إ6crO*Da {X~r<`dr+mm\h3D"ӹЪ  kk8f&2;L$IGICjC}q9g~>Jh|Gxꝅr|& @ 8`Z}fnb6%!@|sg:iQ('Kޔci%oeD| BF!fť(*a/|̎x񹤇@C9){܁q/|Y2$}7@>x$'&^Q˻agqw}P^X{7;񑲅bFvr2_߇80v wGBpe+Y~nLv74mѦQ&Q^OA^aꮦڈ>F(*cIhBd-ܰRKʛDQz $2RVR:Do/PUSmj*f:3mC,RAPWLM?ky zR UO2]331$rutWTQTq'Fõ=T۾ #nrn*tKOտuo99+B" ybۥ1EL¯}ΪD@Oӣ@  __$JyIT,B-|jmX}6-cZdchBma$"gl.ry:W1}fH>/? 1=^/`g7ػNH$)*UL]3 CoҴcy5@|d܂{4Wh'wG1NJ,{ .c >y0|l3/;Gou>=x? Ԝ?vn(`K} ZYg@lFpgɊfDP^+7dşzCřC8Vi]s:V  <.&60XjPxǪm%惬Bp=liDy={ig*xņ(J2`V@q=#P0rsdtJ7&=;X1(w4S1"ՏH݃&߶c DAi;_=C-5x(%{n<ڑÁnfe0%vB;{ߺƳOp=m夆"ikthq_ a=9M8U&N?I3;8P}n i1kP)qirx.vYr+;MA1b]\.$,p*י*[PGw58 5CNܻK&<5䰪w{%d D<^,0x_ZoOAU?6TGK]kS͂NƧކ~C}?&7ǓV+MBgC"˟*XʱTW` f ;L +RpHeѣӿר+`-P_dvԑ(TkbWn#lp1>ǚpuBLqbܜ!wO8RxS0?".Dl{2,N]E WXiV#jEs#S8?gBzi^$ pݩ|OAi찬:] |aSHmW@XE?ʖ`Gs1w/KæWh5龗 "G2NQAQn7WDf><,&Uჾe}^~"^T AS]gpCU &W !okmC1_zi!toռ&s):d!d i#yudt ~Ww{[ft?FI6ŤwGBݢ@\ O!Xt"v-(F4pL&l40k^* WJC\WA& w $KDC򑕽洄i3U ..N)xr=`{0)҃ Ꝕ^֔jC16V^P;>}@x'R' d, FRN)˅ 7BCEt!$0gQ'b1ӗ5e"` H6#>M(ߟm6˗Rd[":ԃ댉H 52nQvgq sƙBFc! XfIB !w&p}t4~*W 9ub1B[鰄 N9Q_]L܃HAW`LӦ(v!68.|Bq61D7?|'Ї98uzgjnEi)g 1emfÝlK,XnRhJ3NNOJ\lOTտ6?$$v%{tٖt4Y1πEdIMBmE_h+b{u5 {)pIXnц!=+=r=cF"\KI+w^}'PN\g*}U/k3œ 4=hK gM]JQ4I_/,D3BAR-gEQzHw*%T(VM3*O5P [leF@ՓߡQ/; E"d+4 TYyĄ.KZs5\ f0{E5!M(#YM (A$RQLmw M2a?@aia(6Rp&p #vbdCڣ[h&J.u{"+~Gk%JӁZX32e 0 6[UD*KonoGNd.*oN.X[Lx7q+^M)'Doow5 LI8ĿFf!ȗьu7V`Io=* G~He@w ), :Yoh~`msY-N e{ՕEB1B2\7INL60]蜿ױBt' ' C8%lq8 ƞQ:6xCOg2m6MwPi;T.Z av<RmGxM@Ю ^bK,OrG4zHUгQw桟-DPqEI5pcnJ5߇  ,aLApNKa2!}Fdp8{xS kw |O5J[v k9&ҀWF9 ͜9_D/y ؿ0Уn}&=0ì_^'U@c- NDhi9NiC'^57w@k&h{ߝ/xKx̋LFf`gAcw4dag,y|ͱ'zFPPrĿ24ҰnoYÂ!j͢2~3U$14,jGk?Fk`$bB*G֥w:p=- y_z`LV dmP{m }PuXu C8|mv+qyUF%M3q_>j#Qk6cd~Nc*f,K΀ D- ;‡cHnPyic!Jlu|h3 Ӎ g˃FX\ xL3佥nRiE1_zՐXn [5&]/h*B$Qߌ%aUm穓7yλk|X|=)v1ӂ fkt$I3x-))u6d.,=g?ہmiԅ0ؼOX3ʂ-ۦ$:VSh}/X˔'%ٗMPF5K 7'd?>GbOuB p N^?Z G҃*W4!cCwoNA35Hq\Fon[ޗO~ovO`e;&`Šɚ2LQpU1Z۱e4wg!2WwZ2SuI*XxD%Ux֋ 0k=%şfe;]PЂ2/kY&poyqqÑ]¬ra)"G^Qb4s✕Yt ^1qV8OQ^Z1cBJ@]]`vZKe-UӑV|]u4NEHcOðY+Tui仜0$.f[Pa04'U_ NTy8B5/ꧯzg$m%>/ [b7BҩA(z.>vz;Q+BGeg1%y^|s*b _HkW¥ 3 \ G9R.2ف-VfOrmjz I.z"5T'0v!]v25Ѫ#SN-4 ldGtBv>-'T(UxW)C= "&K[%Ԫk}BǝJ1m@{sM -hwed>ï[!qyj:#ppyT,%NϐC?e6Q`(߷eB/H \OոJpr|9ϧr|{>]ݶxh㘴?>9dJ='UCv ן45svRvs7`/LXAo,bv}j:yMĪ- ]bɊDl[@&(@u}Bn^ {=4V{ROM\ 4`nƟriNHӛ<<+J#$-LPЭW|4!Nybo7*x8pWQS2p;{ɉ ԐP?,k OՆJh =1)Нl,5%xћ CZ~$H,нXh;DI.'AܬN.EKv+Gf8GkJȩsyܐG-\#/G%Y7S bA|9@] =H%XdxePNK\!y3 ٴ4rcfGU.qjIMxK69 kqb> @ZJM" !EmaH,7' 0f@ɰ3ӹg{E(NiLTɗg^w Fǎ}C1<ڌo+Gfrll[DWGFIJb) 6ơ 4jc5-]ˣ˜&ΕBʴAB}q+ (sH+hhE1bR';ჶު{mI-!`bU~Ã=P ]e3#T3,"1Dv}2ɇHHͼ'\K$~6i,mjʘ ]1Ot@Gefy[Fb#-o ܭ$IFlWO2o[N|ƫVGfwjwo ;Mg2oĬDE!źʓcѱ&{NIK{Bѝ%Jt#)xEmsFh0RwW(|Y{5'*y*.)1vovNX Kpfl|F# t4qf?Vz EJu4YCC :!v2h!R(n 6 O6; OJ{o衿EIPk L4#_ǭFK]Plc B4wv?7#0 /*/ImSL=~I?bY{:Yw\N٨;G kY{DɆwMnQ t"Zt.,[:8ׁԽrϤgAf`-MsïZ"FOL#E41.ٸfyGO#= S:Ju8&Cĺ2N7#]X~WO H=^HMry G-^dmS >XΈ6tS;!\ A0 : W lNtueR*]DFI坑rvf:OH J[.>T|ڋB ,}'ȑ{9r<ib *R9NxP. &a0 }T;E{ظ_?[oT\%L xy"Z$ѝP6Jʒu#Hrfޔ:e2 7"If_'GϙaÐxtR Њrumgu\+I4 Ac!*AŊ.ĥY Eiu M*)GK"7[ &ș_c$Ĝ`+مCR2$b^vMC kͤ6~C9< 퐏 /%!ҕ@qݶZN/? Ji9§1wi5,kdzWpLm?agVH.F%Q7GH6Q)2ayL&h6ZY-qaXݔ〃t}>>fѢΩχOqsA>Z& ~B bDBWN_ rj8)=ى*]yɩ u߳y(aJsyRoi1G|ʐ{=HuM܂9 r_$Ż渁`vZG/ UHa!R%&P΍π1 Z̟4h Y~FR=eڔ9}HoZR@+Si2OQr a {$Zt385!?K{?ىaY\Ms&5қ ۏdSsViSe6x{äRs;"X30䀀U g1Ĭኟr_'jŽ#7Bl+tF^<._HʉC!9={i R*WrZ $z<-g{ma_nWgdo%"M4{9UK75Uv0æ2AH{zQSҳ>jBQjR1d#ESB*'G ` ZKGKXAF/[@cȃBr0zbͺW㯁ګԥr;7M!A踜Sd1 _@ep*X #刌3"}Kz[尅)x U5M/oo*|a.m|K Qg VD8 N2ez=) ^X Afr3x_ʥ GS {;]Z K0x"[wc-RC4jYt9D0Q=?þ) "tUHʜX~H N(EYAm:eUnjF>gK8:ڨgJH g2W]?\]djKjU3Uu?V=0}>!va`yqRLޞ:i%@g= AL!V@c$Q=7yYa*={&ELH`c\aFZB>pZqft:$n'`se*neʽI ۥ(m꒰%$اd2u >" ˝3ȫ)|[ӰqW;ڢx$ǽ}"-q&0+AG> Ů** 3S=,اJIU䣴P$ɒC*MfX9qYf2RM9,m|A:K׶D'*"Ö9sIuQ҆dD+Ri$\4n> s-]tEIZ٣2"\+-;@pBґ9s/ՒKЫ|xQP'-9_ HuZ8L_:DWZuS~B;W[14׮ 8|fuajnU~@)$[c 5G( ]y@|Ip.@}*pd_x 85ξH@;Tp! HSd"][ki٠/%SbTOY¶jӈ]U5V_],I$j[b%( LCf^xA=W~Sْlh:Sv}+|O q0~s ܴbi3:0a"Q F>k6S[Bfi|t5[G;1)}%laL;dK$ïQ%̗6xnV{y(Ye8Fn *k kf s>TRONQ\6LyD`Ԋa6GKk}4 AB;J݂A EQbP4O@fj2H\tD\;?6| +H8 /yCڨ70R#BmiKQTVXo,mϏ?lt6v+l&'|Y{V2x2X%9 ^ P/͒hrAܐ-n&|t@|{b 9o8NCJA^Ni~-Ȼv3P= "`Zr3>6 xEDD|t0Ewyeڻ"vޔ+\4b!ofu* d%%Fw#~R$.d["7#u,hG4ʩaȖ+ r*n 5Z&:>Skl5c` G񅉛dj^:MmQ lx\Lح̓uMt1.N<|jA?q )c"0GRz=#,[J1}34qn= =;DͼrƗBýBq-kQߚZ"#pg>r"G`9pj! ʷh?XawA[|[=_r/;\`ܬY& 8R~~`F} Hx17\]NqB2-~)jv? '0A$Ԑ,Y7X֢^U;&[{NÇ} Bx fb7k~ PSN*$%O',y\CCtҀ$ر` [wkW`DuXVD!+h#ϥD [fCs^fBӞr~|""Ȅ*͠%qs 39 >.)lP5 2dwH1S%tH=H(+&zj'wӝ$_KLѕ̉V)D_'e]C:}E,OX3WV?|[ 4x9X q>8(')qx\Ռ^X+EV8D@񝁑}n)v+7Ӆd;:k+nnH62?&H(~,Q$\qK@$pFd)DtarDxͩleڶ]g/)*rp= <2q VhXػ k(wl"śUԎqM':@~FJ]\|GķzlYΣ;[ GcHQ!xHcKr Ȃu #}W#0%HHXP'&tmtG>|E:*K*fw%ِ_Qj׻J@^:ӽW]9&;o* oo@dF H!yMIEK#ӱ7F'n=F$4EN䆒:]_!=𹓥"oL#&,=x$[BoWDy)S%P *iw}IvOãQP~:-B hsV$r buUgd˧%hT)6<.'!o&F/N"y[_h]"'Rc?L䗷W` 504>A`X o K e) Q? #[RG\ׄ pҳrEkcupi0GDWxy0/u>TQҘVe]SZj'tjDv*:oLB?L~$%\碣V\&N'vp Y@v'@Cy`V E019U[ٲAti͏>g3v \0IF1`W/RJjZ lPE2Į.x;Y,7mLe0[ۊz6c"1Nqq  FEJOnx{Ab'癃c/{Ųz߹VPRDs:*W8I~y!+iޖsxZ6("X.,/D"KRKɿIexC rs_+Zyg崩9Ոٯd-&IfxSyQ# B6ϭ-cA5^m(V/[Z&ѷ zH18|\V W#.j&f`)cq^=|: k5| ecLXXn=V% ! ΡTX}mkG(dSmsy==| Ǽ"8}֋'`Ȗzd"v9z~6l ;#/O@1$#}ĥ'v c)k5.v_@,iZ7-ǯ'?u E0cQA nxۧ,%]vb !K~&DL_Oq0S)K^9ZaEV%[pQlUٻ`s.\̨3!y]BTY-Pfn Rc廑b4sI O-2hB 9)EiA,7!ڛLtK=cHbWQ)S!n=͍zL-rܢ(]0D;ܾ _IX}զ}6pAy ;z%u`5FX +)i ;81^S,S3 ,(odM 5O5-<> =,pG3=or3iĺq4o7ٰP5nT7icTe~13WÈqfQl✼͡ ޘ29c[iƳ,9}ǝWMN^JRXIQ=|صbct7}F]r@Jrq?cMz- eT5<'0 9vH&*7/&-jB&(.̄-aDj{*tl-hZ=T#KDPCtҽ _AjIe5`M]eYåzp<,vqYk;KS? 4Eٻ..04Lѝ1_kz# 3~8.r Dj#{YS'0tFH<)q1im2fD=ϔ7-:L<0 W0xh1-Yۧ"ZRW4[$|$hXMlIבkmE=jjԛɘ*;C;4\) )Q30W€HZ݂ibץ>1(;k~ӫI8MKȽg]W>B@ʑaqé96t1Η#*@!$wTaD!׭93{=kpd}i}ðr[1  k]b_fփvK k;itO fq+ 6DA_YS /ݡu.L&y.S 14lݎe"]r>TbOR1ڝAn_o[ Wx:Penthϳť͠ kmBө`Le+dA'C=\ODzi(AZ3Ѫ#LFzK&}~A$ThKH, *܅^,,EI(7pe)ɥA&H%BRuxdҡbgkv Mj'Bu_G(R$rH ǩ 7wcwc+}+FI q?7%Yzx 7dLr<`p7 4$tpbB}č34G>_@:+ o|Lt@i jt*uUҀ5vN^)TVo@|T Pt7,@-ө#%ejhчC;HGrWK•רl$4C¯RVռq\db\{`98O&Gsx}4h7I轇lR}?cClv6B͂;c,0!ٿquZhxT~lH DZ )KXLEm ~ eOKF[23!'"h,Șm,PhdagoQEX@|6}~}fS0P/L70PKTíaV#1<R8=wg@NO!jxZ!L*\'?0[jާ8 ,JMM/̊И%˂EU y/^xc\"?Ȉ i$(vK }T~5hƶؓ+wTX*I[/9a}=i@BGLb4}:jMИqnj".AqE_@ͫ@ xԳ0n͗ZJt:k=`S4s]nE%yqnʭcF ^5JևQn C9=X#OY Ý ŎCs,)4ot8])#Յb!2Q uCTs)INUYEI$ Ve4m¨sC$Sj(6I(^AHŋ<ڠpVq5v KhȬޖd;TE_'tU ]=׎W<6L%$s̉ϡ;1v(loI/+:v˚ l?-]rv:kX87Fo `s <;p~;A+(GiN \ȎۣD$962 E`xOpVæi0yڽۄ# KLDaPƊ@ٖ*򡠡 }R4)k_7Ie2)cP7ofe LI߃ǠV`(ǂ|}a)Q-@/^bB.mBcPx PN;|f}`dzZaz.BL/RA"V9$&ȸf*mbS6f0A'ߜpI N29y\ ^$ ޑzVcy\ΝWӀy,dR1mV,#/Z񉥆uf8s%]St8[!Yt,됬+p?Qd[D$I: =G<;jBc*!>ϛPGz=zoP:٢(ah{A14f5[?[L==;O\0:)eaRmfe'wZҾ+> }?(>7ލNA D@08s&~OA+XPX V|skꗦr=$Ɋ[ʅ7.xK; \(QH o+D|gjhpvWH0jg>ɋķ\meʎL9oz$X:* cLA„EdiS H\(j\-MD+NV`<|[\F_ aoIn/8=>O*>Fj8%!oț)W/"6xaυu mDGL.!`R>$#*}& WF`5<\/PYbC CKeq SY*%+6{oD@ t&XhlW[trF{=`R،V >XvR{hl, ց!?v9 zN`Űv~ϱ7f0"*q+28 m6!Qz` ǔ(QFT 6s JLa1oN,-]hw ?`>G-+ǥnWhu2S4ŰrBUK0{e44Y(?ZF)%l-v?f=ЁK`K"#W֊7Ɔj#`X{].!*UW@ڲ逮=T>BJ/8: :y„S[ҼŢQW6d>M[ сG21eOXzP\n<)7d#GSK-Mg}s:Ypm#2;l)/ Բd^ƕ~\)Ilw?yD e,e7z ڪ`SvEHx$ٮt$j*xEkxn.5,ZQ~<GWDmyj.#V ސ1(A~T]%vuc0(Ll \f!k2O[/r/ 4FgBkUI^n/f! Y;Bx5Eӱ)v :ZsBXäNF.u0ZXKKFުjc1CMHgSmTa__?z3fa* V¶R#wz<(+Fo+k# 2D3U\$$*AV(Wx6ω ңWވɽ1kzh+%)c Tj=`f':N)5$J.b7zyklgeڄbλY{!!v"Z4B,pe%n5p]eII?!DQB)n)P}NT X̨( cPz F._53ʑj܋D '+M;ţI1s֠zscԖєj$#îUf>P[럪rU6 ezdf\Js`Z.l)>tiz b 2%>qen:{4P^Ia=D#Ū#\5PI|D=g KS[oj!I1 3f^ac^8(wLE뱧cN_g}3GWpgk@mn֎Rq^K ِ,"kҀ4 ^y8?\+q0@'$k>f-=w])^*KDf,'!÷GkF\/n9yWCQO%Gܺlo+Ҁ@q CD6AR ,evh[߽4#ճ ѡqW^0̽Hi]'ǽv36)~C r@Z[J4הAOj'uqЈE|OϷc=%ВC336,a*`LZJnRd94y0`f@{]))m B̝'HX3=+TsMq:-fH&AEq9a$=8U>Xߎ>FBJASbW&0~̃65#*o_ߪI?~Qs0GD7T^24UrKy/UyhZؑEPRh2pkk$SCi&ɖn~CEwݫXnI760dFƀTbN [yfQ6d(W4#Z߯% X!]o͢) ƯoL6Dc1bX "9&₫~_ǏL+W{yvze,0c "?>"yq+:zyNڸ=-WhpjZ0^U a|Oso)h>ki R3v-*-C+YNi61T`{ct ђao]28M^> 9n\kJh{Nƴy<^1]OvI#2-3 1gIoa*28%WL3"lR okKn[Q1{wqGjyz$C>kЪۍldӪ$ԌfjKTlaHPbJF!< ek(&giD QX4rB+,e{)}@nh jŀj _|Aqj3'L# 'IcqP `0697Ү,F=>xN-94gCoZ ȋJ8M4f4L_9z3qMbIºPqIºc|C @~,}8U5߅Tu&fCǥ4r&<8eC/%ψoqɤ,Z9 so Hg+47{ Bz{ysәYyI~G{;MKa0)dsUSq&ԻtB<# Zg{cWm0zI:XSU^>e{sA:ȠZP61_gM Ŀ:H6Yt`b!,%4BIJi(لhm4(_ÃPTSy旳>8qa<7MTg_mħcDlbS|_x}_4Y\~˷,;ܜC+,4?dž:e)3ڠښ B&?FOk%X&QcN@uD0g%W$^̜m׋<*eJcH+T9\U-!~MRwm AKoQu@`mC+ъ)lS6/}g:謹<҆EQ$vVlbXbJ(ጇzq3SkPiYA,Dgj.01MKCjδWa覣e O`Ý2h)S9ER_,0 :V {G@o2a4 3@_iP dmIn_e@ ^x͕ޡe崙`C=cGqeⷨHHRq&ur>T/~eZp}N+>f, *n5^MDzf w?اYtKw;8+_HtSTVaDI uznq8dY]gamN(3(֌ [2#)iNJ]`f +؜KFfU#9魞e\tLki p&էK;7C/ #aܮ<; +hJQnU ރzXz,ѓ@%ծFKs3D =;H=[#3@ .MRu(3)?.Bt% otz 0͠15kQF~kȪlK`[6ރܴ:]KB.릑%+ki*<|b< Vv鈣Mf'k6b.E̩a ''^!n5 ~?l5[]E~ "E~> aPqA0E=«{|Eu뜸($x/{tmQ=2dt]ǡFEA$0 t>L!N3q|iGƑVXwg1oh}?%&=kKh(-{lcw@"i҃u;%jRߘP4YS>aE ֝ YhXEM] z8/#5H[<~{F&WIxmHp]f9n2Y?~+5®}=emʶ2]p .*~|A>NpGOݖ,'Y}fp_R]PBԜkVµI4ޟxŗ6ß.daH=iWWju`N~#$4(C8t=*I)-[VZr$qfkf&M>WYq1?`]99Ary ۅ -AG OIBpʜϛT6 ȴR>2+vj#,)"K5ȍ}hUD.XZL 4GBJ 7ҲGF>7"KcA nzLOӟTY6QDKbU4 Ffe "_öSS&ZKZ$(; !`Y{&PVJߥ2G(zx'OB; sZg`kMi^1]ݖ-Efat?M|/i(Rf{ؙ|AI քTf2{.f|q)7.ǻ-mu_Hĝ|>ԪU}.Ax/ȓ91V5W`rG_Ě8|.'R QdEс|gxm :_ ɻOG){A}MbꏜZ>: Jz,FHd!?Uac.]O2&4Yxo V\& A /JU˙CZG 2z@&D#\z ѷrD>a'+rU*hX?ˍY1f13IئBH3y q2m$ݑdz8m(򪙕I%m+V:kZ+!6OAZH/6\95|3gt(&UX$? +gfpNkT2\a`Vq䱛De%&şd Nqe7ra=W! 4lN9>5iP;_/93;:u;NsX%}91 !EZr)$5+jD[9\#FfAWЯ# CSF4gJu6=;@,Ӛ[3NO7̸wSbl cbxĩc3 @!#|5%y)l=hI#RMR= ~,yF FM6ؕ.ևdtsN9FagJ`vJ<,|҆/98)J܄/'IQl? Հ%IV.~cMzȋpt]ԗt$LaAoE@y~I mRZ(({,$m)hr jgAd'Gpjӎg^Q\3)j]Ŀz[*+'Q㇘E ]g #JaAÜ0f,p-g01@2Vɸ>|\fX|ZY/ްRg,ϛR)+QN4$H_+ =[HbGH#4*C B0 uQ u,AO05bGbu$gI46@Vў@CD yeC#eƑaUp>^;_  QL!UKYv=ZPp6 t'V@4ou7+-a7{!1R ѸQP* La~a.,LOڸk|Oʃ;CXUVYF*PV*(?I\T7]B]h9d %_V cb\"PBKxEc@~h@Ě|w):%/t\A#0DZ`zU/u9 4A*@|Lyp͎`W#v4ZLZN/,z;Z~nign 'PoS+1ebiWE jF y3Wҍ쾤L%ywVm*s];ˢ ®#H xukK΁8!xq]Hb4^1ّgͫ&f6'd#37OZGUhBz.X*ˣB2ʤO+uN5K, `!j{+\*Ug >[㍲h}P]QaX<742Tͦ6X#;_$0PVF%v:#=Ĉwg19ψ ^Z^ "QPy&ȇ>MRw8BT* T!;] Xǧf,4)^bדi!W Bg DV!9떡r-R;&<~ɯ U~?iU2^*CQЕE3Qۮo3T:ɡM>2bհ%_|]敽-`C o Tk@'KAF%R)GпuUeTm8̔V0ȉ /"4iI18UtGvBW$RFr m{2W ksPd}G:MX}:MƴfbZrL\rr=sߒA)µr :ۻ-iYx(gݬG>5ʩ’kxc)+s7 ؛|P)Ϯ}n#:gԚ6t50D2HMs$CWF} _wIh ֛!>[D.;<S_l \K}h5KU cuYCȭsem|o(QJ72,> >A/y5*/p0#ޑK0%z~)0bywh%~G1XfRP6ƬP` rRdo&7EX?`)|wRLv_x 5He}e3/1>? *(Q>d3xsp!Υvw!|`[,j P +^wpk._ALjXj=믱oFoC%!s}"`pA 1.9;$bc>x&D}F.wp5P_+H [dqާe .hlVʛ V&ĐBaHŸ 9"k ./# |I2 Tri̤/)rP5./(>LPioiu vLnQLJ{-<[HaZu s_Y^{TcIk0^}/@5zނq>G;%e[[[3 2#H%YQV1.acp53 L \_JH܆yewe&[ȀjFI+b86ȷ]}5#ă9sd7EkAuyqljmPWV܌C|mg#ƸRxb{ģ~4 bKvQJpcK@M%؜-,4Hfz~PN?HR(l\̾}D`]x#7e?WLrx0oXsݔԫxl#]֢V}>r.]Auuï_Jtuty ?c yUF讀2BuIMFyzAf=J\2\ OZ[5{ܜ?-yKâ[yCXCckIֈ%9t ̈ tUi1W"tv}LiA-sjX#HR٦iё!V4AW` 'NѥF./w3ehM40 ^ [q-gEwV-=dD?F;\53~krfK!+zZN:e(Ď0Sjm3~;Y vkb3Q-d،UhuzXϗ8l##'J5{Uf ˄ё>hx Qz}d[u[; $\y   cGД6,\Ut4Y0ɥQml F vvs!%p 'f40[J)l5"eJe'S*mKS'Z r}Yâ,pK OBH9-&,2JlY): '|OQEkh &znݳw ;4תQR!O9,.C[qӖ6jk#A@  Am5ǝN?7Ndǯ6OKT#܆v@Moc~[ۼtZY+WQSrXXDtbdJrr7$2k'z5 e_Uwya ɴ !"S=f.oK֭},`ig6F`"=XWKy 0s^Ohj\LB@Y>6w7K2&|9|нsR ("P; ;h*~P5MƮN[.?? t w_ ( )i iuEdds 8=^Pp]jE/LM5vRtBl["rjDlF# &N6 <2:ZnE^RCWMZ'sC+[/D1q d~&]OUXF/ꀗAC aM! aXJy=%h5$ 1$"AI ~Ǩ|d5&>*g0m:ajB,agUcX%J08)^Hڤ4,f(.Ö_A8^`߹ד%gAܫ?9:Rи)ws ?]R؇ӽ.xFCz6ПHLK'lZI3JΕFDz3el.m;! H̬-Չ2o*{>ON'Qn?zvV ':V,z $Sgc$m!=v%YsLۢ %NN8F OXzKq0^2Uh cH(t#AK*gT 8OUbQ>,?~XT2O/!DD/qzߵy :םn/Ȟ࿳v"!TߛJ]@Z9!D!jg_͟;pt=7|M(umy$񁧝hE!kS ;x]LV-YT?Qtn[n9I)2174 -'G'ryV~I["~Ebo} w7[795KDC5kpA{:-f}wO ?Wޡ͕)Xx"/i$ c]B q;CQFT/qLe*CB$5{K_IV+u 8 WR]9iUx2N!k{rtTC> źbwxDxt `L-Ԇ"ᨹ7#S|axʎ܅IPIwx-_A JEzjs^懛ϋ&iRIu&h7 "9jpc”%']Q͌9?NW{Rg* @說y Nj>Dn4 )\W THe۔ʝ*ݵXۘ @CYd?psA̬[P dWP W^vI[L߻hSgʦ6&J3p/𷞡#4K5O羾_?Iyx<e~$P 'dx S1:Ŝڢ/  rQl+6”cx"if EvuF uM1D+CLF5Y&˿C2!yB3iGMyI^Z7?yMXm>"?#5z7`=(Z*ܔK*}NjFD%7Vg9X'>?Ňt^ῶG6tss QjzJ_q=;PC=XfFKVw^L+R\}ؽ CT5pHf~ö+ xPN18B 0*t*XWJL Nq[q@>-KNpۣݣW"GZnIUS9 -w=?۽NaPDIBlPho뛾+&8 E I5yj:7i}AE_,"+O⹸M"Ѡ*=eYUԡΓ=*]DHh}#uDE8a䴯:jk8*W4ķ~k_k־&?1NK_@D)zc @rt<aIώ>WP`p#3уo s&)}/[îf|rXXF|jãl8aqT x xG+FkH.el!5%g+!B$-+g4i΢R!N5Ert 3Ώ+x JC3!ñpq߽%ڠh;h'b<9ӱw 8,8?V^!ljMZ ,oY4 mλ* S_`*tle}L!q@Swbc=h⋝lFqzE^1d`1vyC(:hf~g3h* Ĉ)q׌!TV^?ylr׺:D$YAwOţEcZdT&+t-) g=C\LRZJr+i zqa+|{=W4~=y`!* Y ‘zI٨7/6zH]s{+ Pڤ,Ўqj^ 1~mL68ͤnK-P)OU&z,X|+Uͤ֏miO-(jep)I%j Ѝdjj=~pcF#oBEZv20 .;Zxˏ .<>v$q +h@aР:dsgw8eayIٺTENhm}黡r>:]RZQ€@bnt#Wb?W6h5i :{~b=u1 ~HUZY [49nRrfa '|=lx:$AwH‡&>MY,;sjKNgswDYJϫyP{>UB"9y- #𔃀x[3B8>瓼x| kg)]]/n: 5$M|ϼDf)|JCRF_RvjuXK |^pš6 C)m#qoh4!36,+OvOͅQ0ZJHrV`4/4^Li$o%s qS j.ĜA2q2r[M [@s*U[y] KYW(|9ޖK'(  UnGZ Uӷ'Kț:O8QϫOGu&X|e|P+7)cCIwص1pמ Z%"2 _d+wm$MPngRޢ5] CJ c{8/rl"G 8" ]P)5cJr2eLǺزfRT4]{B-o!UdQhyk8 hKh+!UVRO3iRdp9U EJNIވ"#hxY~o$(26UD8 v<&\h2;`q= ],7OqZi"q5i WJ {p3}EkR'E\115zmLhIwj!#(yL}G(%U{)Sts$aJ#\E5kȇɿIDGQp*Σ,8#捞̬?春r?.¿^?{_ydݡF gLjXk[lțm!ܑ`mvӿjjk)jb?^"ǽUL4QMWw@4S1A92N12<Ud2eJ2)%-ɾtd)᚞^Vpm# škE˵h`dW'0Cjډ)։ByhQ/?MM*o2dNޏY,+rիԸ,!g`yL#Oxq9 |:zAc| u!fz=JԾiMJ`d— %H{FZ#T\ HW U<dv<ɨ7npɎ ;XٲSwTʥYhQ QVv2;NP+-F95T~sC.x+mtQUqhz(%a#SH)ZrA:+$\P/zuK Iw^>Mu 䇛D~}x.s1 D5oUI\u V-t N=ƨhb_S 2[= rL| Epr|lhtF'k5! lDn^Oo4nQ e|CaJAd c=9Q)1Kaџ5NmY2g0"#-SM(@ G96 "z~A49IF<.bEN  ly8٥K7P (zV*!6o*6MO#߷hiV’pC)i7C)=,ϭ%DWAlNV=Ak\V%GxDʱ',n7GI2v?%lsLi's#/g*2萰'4f+eqr4~=t'BHkJkgd5sTlNE 京!`_*PVs_(7\S#+assRW_gI5ބk6r:RCc}~XnK=xM&F'NWXyZ'_ԪPN'}4`X~ M.D~3d 2Cn,Z5q7ūp"<[@Ze<fLl˿ ݻK$3^.=.tprcA;jM^UtIc 'ܳ["w>7i{{Q^`v eު5?N')clԽ*8cتe{S1X$[ۜL'g/ZFXiȓqi`~O1 ^YrCwΫt JmO9ָ ߍdU2b`~fcmvŽn3òfF0)0D朗yQߣkaz s/G Z2$0-ytxhf -G6Ň~Jǒ-Iu0wDT (H`.?Bg(O'*,,LUnOՕU~XoېF9$b?ᇘ;Y# NTlK >N) Lzy}4iHӏ8Ըނ+F@Qq\m{BM!U}yaSc:SBu:{ȳ˦Zw}-J]~Ĥ.Rv]S{B<^~^:fױ^#WOq+Mtڀa@ݽuS { tc`Q}쫣 餤IT`0>ָ:ʱӷ@ R\f?7-tT`1 :s 1c&?ߟ>֭812BvWE%˕9%k"YמbXX@qlLc@GVݢxzk 5 Mq !onǞTL!=O{i4z)dy A6g_!w:Ku˪teyլ-CvTcJR Իr{1cWpo+aV]:L?IS@k-чKrkz5o%ux/2VGھy I+N wājQƂQ- 0)1j;nPb~W}:ީ3K6 G F£%c̞#@:|x; \\`DEn3MR|k5O@*Ca #Xʥ 0z䙔7tOFw:>z+[$tF"o b)I -,~8D@I0ԑG=>PS>)ч,ԃ̵X ɍV7_R~NOmSC.'BGMD֫dGd1X >f؏IW4lF \ 7];> ziTnoxTt^c %$4T eHϾAQߧmYYP̕Rn3Bf6$u%`8X_ Lڐ+߆k0F֧¤Y>RZ+èK/kߴ ).'z2X^c6& T}L }Kwg=~C-݄^ť>Λ}}}V+f%mPF+ \N]gma,,'U f׺ɞ D<A׫03g)1a;e}hyuc~aR> .Ц'swT)6HI `8G )8[z:(_9;lƦӴI6y* mQ}8P0fS7=~zOYOwX'Gn{_S=8V_B[X%#KRV[rۙ3*kõU jlHèMdY8#OBҨ1q%۶ɡ$vm7/4(NhJ#6;/֩C3ѿɂuY9樵9m{VAŽJ!)VT/ʂHM'<]RXVHGWUgMFX!+OOH|3NE]WG§-Ģro~6,I΍XÎQysWJ!;\5܁(}s)aHG̓sSVBK(p^ {)dG E9N gfBF xA[cG֥DPhr^)͠ ٻz?qߔ5ܮ3!o)Do-kp>83Z8uGR1YpY]W`J{G @8$͝GpEdF>** _B[q8TN,R0Y6/ل@Z{˨v몫{"*}P&CnubdwU| Eܜ ~HQm{TE1]|du6 ff|BZ84nXJ}*5;_qurpL^4Xכ,6$i&[RI$l_z{b~@S &!uvzB15/m%!^&`nǻ9%8O=Oݓ.a0,s5epJP0# *Vl2&+{ 19?ܨ5̔!Mݓ! ,1!໅>x$ C*oHqwEX׌:-;}^liE#+q*&%nTIe}˼qVqÝ:+q]8/Z=-8J~h3I 4.*'C9吚ǰ8L4孚&2qU8b\ K&Xq]1"랔eƖe(m%1DVUJ}8dš{*PDf2`[=PX%5W\jo]?iUyױ-E"TǬlceZ`y؝F[p~6`= 2cNn~"D5+>aM{qAWHchD7Ds9`e ߸ (IQ5[7E^(SS۞Ы4lTJT=qlHWCρO;Gr$6:T"S 8*Yzx[e9\) ]Z4,XSЏ yƗ /|Z ]X\[#ms[<]#GuP YnKm8RN ȇ/iToKEZ_+ N$yOs47@l;Zo?6+C^OcIm բ-mr< 1pyg۲Og= ܒ.ѨOgp2ީH'1/fHq9l*t,w"P$&G0#jmy0҉p'9@fsѤns$9w)݌MJ/0;^Qz1[rLdޕ?e4]pz'W88=,&T_\55>ah(wz~։S>cFșMh0 ) 5-ޕ4s)r`Ԥe 3MsAG2^@.mze?qZy(F/ ׿BVwu+r(+P~Rvƃ 5,j|L.p1HeAߩkT94 71#jZr߰M'hXNx ˰Je^*_v^Ȫ6pzsy^貋Bȧ6? AK,* g`-k M&YU-򐴍/,E X\$ƶbW.TRK*ǧAJn{װ}ˢ;"LQlb)+cM+k/ ,_9=߉"ג3HR;vyV17:ݛYGu?OnD ]M׋zYP!i􇋌v5Tzuh(߀ZO=Ǝhl(?JtP.p @X5=)D)9/BG\82+i I,5WFHy=LhNwn`j:NrNiOOzt jO0`oEhw]yH c$N1ǻ:HN(jR_YGw{xA\? Vo,m3L@ZK4#{1zЫxpx?9kNk*Дi@ij,Z[<2N]LMp[V(y)_hϕAmi_&\cfmTζx[DppWVXN.N&sX Qv!ɟкRM0RJ^JD$ԫ, X#E}c?< rR.0|!GH̟=HѢs"P!_ bkp& "lF!FUZƂ`'Q.Bߓ' a:ozp97٧j͖; dC##S(}Mu84nHZϱZ|ݟsqcz\{g>½Fm6D[Aɏ_v$rrnllT6G"&T(:۪f=>A< H¬ AVfyydQQ!%!ME53FU8m>({jY{?\|nJhfnZun}kmIxU&*Gg3yWpfO?=N= '۬q\P0ecfhv]="v.A9~ņ Drv!;rPʦ?IԻ:G~#37?;VFc5yCD> lFҽ>6VlLR/AjOGR# Ru.pqrxz]th0|8Їw.ԚaPo h2 -0Qf W_"mN)oea쏱 %6B^୓To;.OB.sljK?V zLj cP1i2z)wA*o{ !([*eX: ъ]q)8BSВaZ_%Ȉ!xXB>V<&JخƔfV Ns0foxi7 9|\{)Om>ꋍ"y&JpߖQ5*ލ<Ws*rٞf$e˓O7,*JClKSQ{z˭' hw n uְ4`! zKw7?٦i?W^ _T5w1Y깗ۆ+7@W3*dttļV)%4c,h? IҚlbqHŨ?pQkS#E N|=d4V;% ^I}HnuYӡ}Z?n4/7T0pPt}@yYnLOJasN}lf ~/F(H,~\ 8"OUc,›C^ Ky+$g1 ڄtjHvgϯքƿUF('!PrDl^!I'ch!#<&M2~~C%W:o&2߾t_?$F aYq7tP?G}q FQKF#SC+襒OӟBEk?,a* - @3Z10j3ĭ9C'CLs ޭ #9%Ḥ:%~+!X+ٷȌBv^l!c9"rdY= n ,EsSbϏR~ Oc sCk3KDm#=n _ P\p'_I_M0tkm*f)!Q"Rd^=ETd2T0]ꬁ1Q'{UMw(0']o9 G?7AT-#vfk 3|b(jTBhxمTPl: ox8ޫb*ib"F0ލ4~3GEL\ϡfaR@?fI\Bhg'[[Bz0&Ö 'dslOl)k`y_Y㰫yY ܟ=I:ApOtŐc[`5wGBF Xqܹ )){0u"2v@ *lRS>o{#r.(Mt_'߭1>ߪ>9䝅IS"5ue14\מ{&| *^A vQ Z:8Am(wI%kQbưEiά\< OlEwvS*1խ-|GQ:w>ב;v=i2`|?K|Tzj~tٙsSGs Lw rEHA"{ KpJ2¹>8ă^ko#l;3B?ZEKKY54>sabM>PՉ&sb]+I&̯50 i˕GL 6+VZ2^+q3]=K5]RcvqÐF*3oE1Α$=;Ig̪Di\؁hhnd>+TZYbw:j64خ"Ro__`C{˵aD\#g`$U_mEB#o]d<6H~O=HΔVy,sQ-&:>UݒO:;EuJ$`7 t99矀_žbwܪoR]RkDsz;H`igzBi,#" q /чE v_G>q>1w7@"~@*N/=fCƆ]vJ7zIZ +Oz+!ܑDó =yC#7W`^yf~l=)iJCax"ʔVf> @[tDŽs'M< ;I9:`pOayq1]X8ƻ>.%*c[SݏTlIHH 1v{@j~ѻK!1&lG5? {[oC3cftה.W, Za模܍fRqޏ}2ou uZtYGC,9*-+kp;|jGzOoS09 RwoRŸy T%XP;bS)PML؍z(6L3I1W3mrG;kkVɅsͳ)o`VO:{ QE}[DO tE|S(`j?%u=C\Ni̪ػ cn^3{,u>"9QNgGzrcu`sAvF?W}Md' ؈ԆC !洇zn^-pE#oTZȬl$Nͦ.ŢT(M Y*)V{K!hm!ߟ]>DI<;@H>뼏Xx0?~Krf]7m,Ge9FH+|k Y! Q1IZ᎘AT[S Ȧt!\xE*[]ޔhF"}޻# vU3Pn. Ǧ-Hܨ#ԷO(=fہ͇=37m{v?tVEn^bF}%(Dh ˢ=@RMѩB%KLte^SqiF:&S 9cq>I5-l:A"rR'N%s54Ҭ>U*حSRH& ي8*1]rZԵ&PF^n>}Y_XG 8`?;5-if_wdBc?pj֟Ww>?#^[܎2r4/{./bx/n <}.~ xe%nyb* Շ=omU"eV9n<}fODĶCvsĆ1зCh _`^53m%I{OKPzF$zK\tA٧Co k]=7TA MWnx" 6Nru9bCɀ +~P!ca?:'lt\ 9ku4ﶂxlMlUo sDe%l{̥^t},Riwk@N2I&>:ec-c = #7&-Md>mcK]dtL 7Nٲ/b.b0SM9n r@X[j7c B5] >&b)|ϫm y)dH,N=I%oϋPƑumr T՘&A+TY4vJs2˸l{ Y͕eZB§iS;@NCWP E?b`->l:XzhݞM`Tᰐ$H~zjdHFv4]wȎF>fs45޻ӭ{L6*Ƹ@;T0WI عWǂ#-+軺W" LJ/Ń\H器UlV#ԕ\[;CƟ]Ml' Abpl-ue$jGE|䫥 V&۷R8rt3fby @-[iQ5l&АCi<^k/Arm p*,I}uФxOӕs+LnXb nB4^h?xM|Df r=j;S1;!R͏ ܷ\3'小AR0#Szt,cR[hR<< h́ ۜ$!}'/N9-W}%|Pf?Cݿ>CZ7ྜྷCRxHo*%U)NZ'Df{n<_ iH(1=uKڒ[-Zړ`4>Pxݎy6 'EClfҐ%B!Y2U7WHLmNp8Wy=,iNhe$ ϤjZ4 |qty  ɲ315< _¦=vZjs_d.rv2ʈqi9@[O:(+_؁[i"Z(,4^x/)m/[OP-m#pcxr~t39(09޽(>|4i0`lm-(pMw 9]6"XH{8_R9_y*EuviD&\@ JRߟ} =8 ؕMk)%k@)Yht a )A i4oV{%ԵœRJ[[io=s-(Hfu̫:<΃{A%9CRQ7"2|-Rs{C(6b/:dǓx B4]ħGD8mTE:I&M_^Z)T#A,\,T%ܯ$Aa|:M!q!柇jN5n&`u[#oR4̂?q9C/q*F(`]a 6,_ cP>_KD#aCh=A,#-40gc5വSڜKL|7>YpSEԳp9& gf6Y9&r9}~#ool`%a`E#/<'h-J\ 3-" ;%.a}ĸEQ/Zxnj] AAfs})P ZnL휫)ף5 TD9@jlm0@vy1EThHa&mjG(DdJ[~ܞl4^Qy ➽ T9ܟ90!!W_ͩ.S$ $#b{ѩW9mX%Fg~jPruĜ (Ov3,.{,6OygGζp41?58BW" [>n Z͈,c!eWfiyޫkayvhUHTpNud!ې<4yÇ맿k)ؽb3 |^0+U(A &;׀,7=j䇵#?EO wЂu'إZ]"36/A7 ?ub^a~sJCc;9L̹~l,Y?Ӗ2 'nSzBƫ`GwzvL#QA<rwuRpd"<?7۷EgCT[pwVؾp&kYΟ{;-)A V *%m^qKB~(S|52w=. 3*D4;VsU+YfH0tIζ<B$ikPuNی&Q_ #e4J9/UtB۫[cm6񎢡Adu?~-N]B气? .XD' 8BzF '%{]46 >NƜ"W6 >-A:+?vLN Z'# B_qXl[e;­<{%A-L&?Rp"}m H ˥qA\5>O ojRc{*kRA9'1 J\>KKóNe9cM܎ctS%o%MZᦌ-%1jndXVKjQy&PC5f7[n,uj6 aݮi"y@X%Om{Wz4UXeMUZ{PX 9bS^iVZr5Q2\7fX^u-g w mTΤfBcg%&͗O?u *ΜYx4 ! |j}樀3WA 5pT h1u-,rHAUi5e7XS.¼p`'lu.L jAmKwf>`X0d.a雾c]1R,WP)ӑRZC6aWB2Ջ)vE< 9@Emfn pЈuFs,zD[P"'-ڻZd'6^}quGsCvlHٌJ˽ҟu{})|7g8UmZL;uIc5>m</B6[+7?gF#df Ys%綽:~:4gl$[wfFR |wssC#kRgN_3ܰ-{ sj 󸦿/Q(4QVz0wyLB B`DlD6+8NrdZ)Б}O*m؞5sm--^a胥5tpvFTsŎй[N<*)hߴzzXFZLg(448m4:/[E*_K vث/*3(^^[*;m)^A8CVé͚qfQn4;u;Q'*]upTW6`"cVlܼ3I~pos.&js˺y␎9d;Bl,P#T I83%QpiĸO=aJc߉[u9%tNq5柁cAG-%XvܧHc S)_'mH"Ӓ(#,e)wM2 ǑյY<p l`1D +tC}DDg5xh)hTplb^Uo|"cnYRY3&dshE6iVԟ:qU&Od='D9i]3Q*嫣Uj0B[ RʍA M'3CKH|T]Ĕz(V Ot &iA\ћ')dM'ef1=rOx L/B<$9K7H0#nM6(D'</F{~3.[ÀacjB݋_qhU%1@tXh#׎^?Q R$_]qNhlw«ۿ$H5 tiM0W&dEhmqVU=/GjMK'V-~^ۖ͟ W+-Gh^,7Kq <q=3CP.ǎ&#Z` u&,}Kr3Y= @U(* 3 W~*F81/"eSvRAVϭqZ͌@ewr}?@1LT=Q:7e`|l6h]uwP  8N'Y>O;аňwVz58a"h+v<]p}W>f/Ğh_."mU3POV8{hB,6_Ilތr*\ǡtVfAQٯqn%ӓٗvˤWg47DEa;}sf>t8+i=Xw=z8.\BT}!lARPtF_Ց/2 |'GPwT`50%VAnMS* }Țn֓\N;ݗ%s8'IwH! ,Lm ww|E B;>XދiiIDۤqǒϨY=N8poCRw;=6UAX"%ȭibEކ&K[08ԇ2"r0Q"0a?eCSx#DP7Mxp_ F{;-SOq(`7w8 cCkaAG~}-woKw>Z-;AxBOhGɚqglS9qȆ"B1k*-xR+'v$Fd\cTo$ij292I >aI]׶y٨ް᧐_/rtSpx\it '_ƱH@nJ9q Tq5Ol'Ѭ5^2cg)_q y;xMWΞ׸_I(6u'斣:%t`>| ;h%}jbNJQH"p)4NbCJav dRi̞MKoR Kp gVoJF7[sWq@U C5*Ƌ1tA6=I5և d핳vfW2W.E G S5Ǚ,x>1w[~4RT< #vuwpu%p U׷LPO-ng;"&}~wvho(!RݐBO`8[WurPSBBor-6ݔKVD^EhA(`MHө]DSQƓ24dI`#ڴ3dXyHBpOqrBÑL{FL8K'R>- JWӏ2D%lw8rD!!ѡa2jR.R3t?TwU$cWp"@f D\X Gq_HkW[eA *i{f=bv`:? l2U<Tv׊2DHYiT W!]B ֠cC$)y=Ŧ͹g `(5Am "9v5. лșR@95z$!99'}RZGFgj55dHAﻂ"~g#TLPNvuHDωyCs%1.ʁF^a% ÆUiQ-Dyq4(mx,B7j$VцoS r;"ʨ\r5s#'&\ľ$oWu L! Đ,ؕ徧@78] P AϏqLۛpZ`M&qhL$nk!6 M5JT#~-58f >PBi''h=ɾӭ" ~=,2Q{Rz]F+[ )_sQB =tPN=J<#0GWNr& 7LxXHRמpJELNSί~oKꝴtVsQU0ˍbk荶bEj-sbkBټih9zud#![i:Q-_ zu+nu‚uSvm+TyatP:E.Ǹ1Ae'ī`{jE=pK;qm<供{)|l.x?O=Do4$=;=eެYG'<"cE? `и *o))&u"7\E }I-Zu s1"3Eتꮄýw(b^EZKoY$b(R7kO7G#YjG7H2MDUiͤԾSgDzߋ D'7 [}n[sF8RRz5F'3e.dv"ݛ3\lܔopVZʌ^zHҠ HaJ D<)ΫT_;.fL*6Ḡ|12A5ަ&vbCӤrtxY=A{1xYG튑'v4+mLz wjv˦x 1(STY2=؃j%~3בp?\w&ZIL9j53ȳ бjNcÉnX)2kh% V[#c+hfaZü 6W(C'Rƣ~5zU+-pW>TR*`ԩ\Z/#uRT7 FuЍSZۊsƉD\ԕl9]wl/0rP0躯s,jhÄtRgK$xr ZhC/`ș*50Gw9D]T^BjԲm(d:oCn :ѱs؆fR)#n*é晆8QXQ~8),H(:b&a {u8eJ5WYRb? uMYz !PNY˲ѝK S@!cO*ߏw)꯻L0I44%:`ǂ!BF ;bL1ԉ*Uaވw/"/fs~,+Dۄ"=ԃZjbme"a*%9VEnOP WZ#A@XRKokպTnY:k~%F" )93gB/%BYBy[՘0dlBgO[| k ʢW^K@{n=5W_#6jB,/ozr{39[5)!n)`%u94'"VFǗ-Z|vɑIFcS# u$W)[q[hG]Нôh?4g+u6 Nsǝj>?C6;v#NpMi]} I4Ϥs' 孉U/XamxQgͶH[F;ec욉mDԌ瀊z<ߔ4 -izQ> xps)xNB8$]>KmLqIv{0tW /6\: M*rX(ektPr2='s]jr[ 'Zr OB<`IԝV"evՍO#d?ơS+:d&7(p|#pґ с4%3K"ybAeC!@8y TUKVWdI^[=;#i;\'<06Nۍ3 ke/e%6вBohNUbR2c"V˿r. ) U{#]DglyP;b5-^e_Hs+UDR yESָ6Ԣ +~pUaU}:ϦP̤@bA'HԴo6,Noh-[^+UE^Ubp D?KO L󦨉1<pܥ F&!bOvB_>=zxŽX>[_h a12S6:!JNQ0-]-?LwBd*ObE^IB#%-GR9sMhDQ) m}6ug iS{ұDkM巤ڊz ulЭJN1鎧_;bkժZX惏ɽoY&=2t8W*3h%z $}JJf<|7讘 zʲ#26:%i4.)B>':BZѩ%*aDXly*)ÃL3NrZtGsV6uN.̕雅oB=%WÝǎJ++c槍EXf2R# G@1̥8/MSN+SSq4(+jÛ=E ZZ-cD(OI<_ 8{JW^r'.(g EG'>MeLoAYDM`<(QՁ"Z_:۷AƠK6~ڍNj]wA1ޙ3.0B~pa("'n{;Åu:,ؽejJT S}ʪuh&%|A̗* q,Д!MJ["K|i$}z])oj$8Oð`!"f[ tFDc/S2'ep#E}-I;OSRY׻ l cUtM;IMX\ojMC~ "cFbfYy A;n/|Cθ$bgu`[B$w!b;wX.cՠ(CU=%ANάthLOkث~RNH, Ѱ7=,µW:? 1(Pȶ$ Fb5qgʕrCSvt C-L~7a*>ٴx`ѾEp|:`)`:Iu5W+k̃3UyA琌󧙐MNek;`ȬA;JHqn&*/e5O-(ZuZb.._!51P~ F2I]d#uUamͽjK3axџiw/27 :6vj&"b4Msӷxq]m[>ȷ@6.O>7=}Lжm}7i׷}Y۔FH  rK݁WNU_~uddܕ~v\?.:^FjzR/e31_i1[)h{W7Be xW8Eh"vWԟVC5+׻JJUFų&0d{ض4 +f=i׊k<_theV=YҳꉪuҙTMA 1hSq^`8`r\fJƕC!VU2Zņ 8szOR Z?Vh7=}ʦr,pa^xO$.9BOק4"%MLW*ZXǍx20Qל {M'W&A /?0IdԳ9G3Vb8j=lE̓A`W817ͣLJA2ĞZaV\6d6 1ֱV7MqW64=ڃUz⦥kQENjXb]'XN}ΊNzd{<CJC^D> |nu`E7`Cm:{H0 h='ɨ 7ԝE-04Q_إ~óz-NݏfT" cGBr$`h$&F. ,OisE "a" ~ r;b>D1b**:I8R)ު@ϿĚF|g͗4y𘤠3KhP>[T+~ΰmrJjDN @B"#"+OPq s]q N6ܒyfs!_ 7`qmX0c4@qukGKqHɥRoȑHiщ۹&:D U{m1~F RZc"u3) 4Wȿe-4'm3vspN#DUt Tl㨅Ӄ`ʕTlLw_YGD',\&+:p_\& 5&q6 kۻd+MP؝7{mAHPvK`-ϖV2l t: 0 9pF$ T1oථgl;2$. (Mj4\{tձ!I=`A3kСzo=rEP)($J]P$] IAC1E06̫oHgBB9q xmaR4Ӯe 'Ýht5mS^~]8bd %9 X&ޞ<<\ Ǩ^UއX,cu~K}o!ZEg쾬UG]lk{4ev̓Z݋psy~:p$EVH&UQqqǟ˾y/H33!Aaݻ -zidOotғ)~,ߥ33WTsѡz6\$4)21#(AxOBTӁ~[l*sX+ val)*d;o͑3%bU BXrmϗoAYB8sul?lԧ8vǓ^2o=! Y"/ BۍF&bAmAz8 .3?%6 8Y$EAX?UVU=f{~,K~KPT `,a)ԍ*EмRKchj%貿2f9R|j` v0wN n],ݢs;'z$Rn-!c]' 6{$zѼObʪ#B;)8Q0gaw1\L7&ǃD_&)TZn<i mAk;4|*9J\*(vAHD %[!1D]0m4ܸϿk$Wr lY?,@9JCmjm٣6#;ً*AƢTӖlJ:j6s Ϧo2V[ ^ 1[O_!UZ=\3ʹI5l/_*(Cߟ3 )G=&*;|~M`1j9GkWVD&Jx">ѷ0,BWӣ@ RT:@ +QIPH i&E-2.Ca'U2u";$VeRE|:b= v'5Xq̴4IފA=(ӊmd,W aS!-C=WD,ԯj.xcW(LO\1*.[5G-^^ itu@{ K')BhpD!IMSXF`ffI6=8/8߸,|k3t2Cm8^2T r=-L/\S 1_S4{qg4x%}o$Pj|6_j l/0STAzw9MS_уv'gE9%$ tףC @aŠl藫j<D:hGP"˻?[FM)2| IM.PMe\<{-Qmlװ͇kܦV*PQB'gēI#{)'ƕ0A}lJaA.F?mƜb0pLRmBFfllG|/ Dgl3Xttzz[ʻ);Swa[+\))p%JQ/^,?{U7/|ėV;Wd IpZf(˸ia@UĆCr}vFL:"aq4Qxdh^qD&_3q!NrNi)p"8g\=iDVw p"0ҌTLnRN9i4 ,3*tasN@]0k o1H"7&^d~a#q f I2T"iau)vƵ͌1[#՚F}YI_[^tA nsY-V*]kSjEeaQc@{1|"i%k'ii{d4^ gd$W׎i7y~Oi/V16omw׼`tz-2#TpA냋 ;"X"IFZ6[L)lN2ԧ(j4p^Vȱ鿂c[k<ж-q>[ʼcإNx.k?즚%Qoqg/U 4Rhw?]i 4X밸׿5Ahwwcoe9] rth2]j&8 lS:l/&)-+Y9 A&:H³Qf~0[< QWPzҌJb౏'W v[@xpBl#_~ ]7Uhﭦ,l?dfg5:RvQɒj˜X//IdDBDj'KkYˍ6o9R:b_(_KXƋPXɴk⮫_DMLpefR^?J"!J֪77)u[Hֆ`@;o& U' MI9 >rw=^vMx>fK6 tA3ï 2?T*IBs[ ɴZWwZkI;NՆ¦šKD|}V22KU}mYD*mǺ<% e Q?ck4׺׋ӋW@C m¦5UE܎xm&!4iVdӗSO~Lt.u쳼QѷA(i`Fcb;U y47{ݰBa+*/߃N&6&]U\K~1_99.'%7.%.=Hh,$#%xjX/ih -%@I@1VNda18 P$lt>D[/ah*_tM=b10X'>S`j,2_I<_q*%)9HJ)06>qnK+L O2D |f(qt~,mŌ 7A rQ/d~me?o:EkխmY/b*Stm 1]ۓ]s))T~wxQ%I9c/#;hQhjLo~oT*#+G7.֒wt#.\ȰP-u-%D2='š5b: `SM) 3h^+;[4Cuk|IvvCTN:4, K ?@}@tL?)lϤg~'''0l ϒ__nlRw=wXFmadt: FPxJ@rñPue/R yC9h^UEw7>i> E&*&U_KZ *7ȝq!P2b3'7~a ܉Ƽc\UuYiDr )Jmx*<>46dtn\*Qj~4&ѿJ.QÃ8*V5+T=JF~ 92) e}&7Xn`v}~I4U :HtxU߾@YWNǿuJUQ)cA;崡sʶE俄<%3Ḛ:U:t+2( y{R"vs`3c_a<|KpĿahr,dA[in 扁J@"𧥂Y"a&I% m J=4GP/S1n&'.4){[cEzCǽ-y#^nA2iП:!T+&qeA+v2{O7Z9$u-I%6W cE~*b7H=;!NFt[J,}Ka;.aBA~`39cce_ )1I8AjЈΐ:o-̈́Un[/%k7YdoT (:*ol`ӹ߾g[^xORަ4rT<_hNk_Z]בl#HͧO-kz~GRɢHy u3KM~/!NJ/Ăx;Fr̷qXv\ J8fĨe\ 7sX1kΛRjheމE9l䜚#S|4֪[x*tX*<5$uܘR@sQFuW^xx'PkTC-c*˜sزbC NgYi n̑iEԥ}viUT'fJ#O[ͽQz&ٿ]x?չ[70#C= h *:I1/)FPFjdf_8ϐ,rCFRinv浠L<>)`JW=-݊t\*j.RG^e+: (2K(S&Zq+ E3ZH;~_I^SXړDD^AE(e!B3,Nq*ik&b@ aU )֙gf=i;E(bCFU pS^_I >~AN #u݊ãu֏PCqd"=BH2G@AH5%*jZNkHtJ(e5S*ѝZiΕJR=*it?f,^[@^H 565ubO|:/9ޘdKӐ17,d+5m֦^m|hȹg QG^H|!TM¶c/i@)萣I Ih>mkYN2% 0:DeK{C1ɋE C]!xۮHZ2̵!|G\PѨڋ69No#b,HH sLUGbVcV )jiU{HVJ"p`Ӄrc3e7ø7.:FƺYyB{C#jE? Ib5b10܌C NBDGq{)j3&M$.$ O]`59 U/{"tIc.~N ;/6= 1+=+fSQinTdF+ )a[̔c LHBآ[0)g7 "Kc2yJ lK1ݞ 6[.""0`yrz)MӶ|oMP决L1Jј}hլ,*n.s^Ҭߗ1"79 D [H)B3覹?=C15n[FK{xW7ďrhZ3۝] KYZ♇`&uȨއB}F%"4O.>Fs`< oq WN[TF8ՁLIS\ih7VlR;vM*j}7vx(ʈ}#ڇQ-cdٖt!O&YύC[ͭ 7|SR kt{XDi89dQk㊆Wfjv!.Cji/<-]OA;`w{u׎a2j3سjy Iĉ͢1w_!ԩN Ik;2B؋fUHdJXO[pJvtȐCqOW8y)wqn%d4M~aTq@;^ﺦg$ UB5Pmv~ze [>ViH|KZ!qsZ<k<_BOmhj1Zkc0ǮtxhDB;ұFCD-iQ3L3Ћ~E~8!sŔrA5~KXUB.(l*QkuȊlM],h:r?D4)+*6:"crD^e3ΊD ޙ7wH<d[979֊ols'*XND/J҅8}9$D임9_[kIaJ^\ CoWdˑ5|.cuYJc$ zE(Ѕk%o6q=؎~V-SJEd,J% "#ToF lk^:` vcRkƍwwQïh .k{};hW5˩ӿP^9}FD aAss>3$i b[^_Wn,UΔ.oLEFZ)1ܔ m2SlɨfA1!M}^dzLrN[0cq8;3[ T0Z}àj-ԑ}-]^q{XsIP{B_,˝mz*OE/!uep#3-5fсZ jG*D㗚0. Hh[B{92Y ./rOe-߿}9c&_zJv?]\07ݤ&;?n1y7k _mU5dS}9"ɨ5-ҕvsB C2?O uRH,ףsմp~eKWxT8IC~'>{hfDsPBf;V#Q\}V/2٘_sW?RLrnibx,w扒IsMN-loZ`酕`Y 0Ȗ#2߯.^O쥝=sFu4}>z 9t($nu ɵSی{hsVZOCi n4 ]?K6d9>떾3igD)Q3:;vF'Rl$A, @:lphSGvkcx@<3JVp9,1Ca4 HeHO"U$=r?xWn]©U:j!$ʧ~& c>(+h[zUE)2!ļ@-߀ќԊ~t;'KY4k>&Z亄+c$G]'剄'!^' ($}g;(Lsp sdBѲH:kf"n&A)ـwW*{f{>e)M0$`N>:̵IaAay=NdAwdwdS;wV?ClŴ?k=Q'YџIy݈!ڎC!\?V'"stukFؽtȋ b5U-0Y!JnMx  Κ? DzgHMf!( /l̊q0JU8=+yP :}E KS _i>$#1M q=}T:Ʀ -D^ޓo]`!,fٱz3P'yo%88 k!o!IRlu)ښP!&IBJYg2r1jM7?7f\^Цg="=Mץ3z0qel͹^l6AQ< á>*A |}x'Wñk3$e[34MiEmXwV1~TUtm5j03"0+gpAآ(H9ca^*auHm[\-A:^χX_7\ [lS8'#x]E GA2EDΉK%j8s:łA)H%zXUfrx67%rRʡ)#=<ݔ@>c0H ͵}43ҢhUӜ Ƭո؃v' +hVX #MR$+x%ò#N7Zx6 Io'$Ծtl<٫h[s=@Nkiw\Ղd-֚e|R004Tn7wbB딛iTAզㆯˢBY7&)h3 I+Q^bu1,v!>]] @ }̺r:۝H>cpci+|v #,GD]ơ+zXyc+e>03vGÎ;K|4}Cvv6z:*`{whgDw <Qq!E(`?Qa@#F 4(q)_c_X h>Cǟjb9m SzL@,3Cz3J lJZIˈ.KUZ` t5By Zu?;#Zl|,@/wI7&.@13_o+`<ۨ FhQjp1ݬ/aijbyxB|=?dZmTm WrA{ HR92=_^>A.޲Aӆ~Γ.DQdļ&;^l*`%1ߑg )ke^N R%<( wF+P!HɑB̟ @`?麴UkvL!m̦b8BRUو0zT]J{NoѺ[}գ\GD+]F:HZv VQ~>W/k[B|\5 9o{oZJKq46:<,wZآ:( |ooZ]wRup{g|v,\: _8!, >Hż9Cݕa5M߄qɬ3o-襭eԮRlQ* c.|#܋C^ل`^P)w[Pp „. I6O*O[V>-qEro u*$VXHND-B:r+8/Td,p56 |Sn}u4C [Aβrz<@i(h iW Ԟkjܯ5Lq70&4&{1mh@Ӻsx*&˩'U4Jr̜⮛ ԏ"A_ql(K+08nNZVPEv'DH.<ѸQ%|Dw{;8E]y1m%кmI{?[(<|B۷y]vE1;Dس$^JW,Z$Cikdڏa)7f41|lma,>>e09,;j6 ǭTW"{MNn4}"ן0qv(0OfdY/RKvC~)f⫿1Fһ:؇67lN4(W=*U㜠L[!*d#Sf:ʈ ^71ȥKqx Ad3 Ï瓔C 1 vJcg@$ԮW0}=(t;NwΗ/"ZPƖhws+N8Z3)^u,*_Nsaia@Zͽ, W;VrEn4Op{X4;>sR,Q~t Wש(ko$pV| gjANŦv`<z#$eHR9˞1*=_43tuc9RS䞕 F rOqŷjnG mc(9j">kԧiHt+G)k|ff$i{: ~j5j?6XiOfki-(Λ3>rH/\me-P{ (2m m|3"1MO]ITiD 6Wji ](>vhCDNUTy mˊA9V=ϝUPS0@ne VC3X^sOW[Akh*zY(f 8TS=rz!)-^W[}l:O&LO*Ur(j3H*d& C/"Xq^ u VYK>F$t47ҋ/[cLOr- c^瀆OK| \sZET(P ߄_')E׍~rSl%ǔ(qs?(7v-.%\vhzĖ5O'ELkp zeMbF9VXaVΆWN6|YWtQwKYx+ dz Wp {!+ˆ pWe˜Dd#\~^52{9㈲[U%"$+qR6jZ+mߍ-pl:)hCs͖W)R\;[9hc,۔X'}8nANhY32[*#8?B>X /J Myuf2ֻD}ѩLڱQ;y6z aU /jPp2S-_E[+H1k 15W`t7]2) #xl;3ASl. lcpc8"{˹g)D(8ˮN*6DR@p,#w!.x! ="E؍`b[Uja=Y/dgԟ Cnw]v&VG;WGf#6U_3:FG1A`<T\fQ_ Zku= x|#,cF; Z,|@!##0:X#(V gM?U 0͌wZ 䄖 S`B}}]ټx؊s"zkΐ$@Qn@ەڻϷIsP |ΈPMQF> z:ϑzO-х)ZOrUd/V X[ֻ& ,TyS肧ddQ<rP !5,b݉4<Ǔ9묒A\9;/X<05᪐Ab![Oq4Ԡv,Ss+Q+ȕV]lI_$(]:P%k#gvoG[=]@^"˗}v|3tz8yWx̀2_D=7N=/ ÁH>AKsH]U*Mf#1EƋ?qo+ZQ+Yd_Rd|{C{nZ;[nfɵ-'p3*o5"j%^mj'Y֢>UjrQ\r  Pu'SCqQH7 )}ͩΦ~S=0SĆ^vx8 Wjy'X͖[(]1 #l'g! tHƎζٜτPJ4U;Ì`h;:O>i `vpWZoYyNW7v~0 f2/~~pE "\7v5,!n~"4S]7gލHi՜F/Jk͒dVjRRۑĜi]k:tM9EF6`AϤ˭7 N1-.s S5yHTPyUoKc0GRESimI5;_5a6hP4cl;MZ1G3 HA L[ ˈ|s!Bs¿bE`2?ݵEGȀ j1DItB?Ni4:J]b@ \bvZOOLFqjzCO~CwwsXs%yK" E!sfT?wf!=)x<`;1Fd|/VϷ?Wri!$&h,Pr}?8rJ)Vo[?4%-Gqb?0^񇑁u ]@^u%RZ߲]'".X@;dVN0_IDtuTBj].n𔝇 ⢗!-Kۘf(b -QȍbqE:.43\`#O3S 5kі.9x~N`m-nW8%7ZogEQ Oћo:i 08E^^!Sήd#<݇mbzIO{t҄»a%#MiOb[ÉPn$:!\lTե[KʱGq /{~Y]p??õ2{(#@ԕM9Av_(yPxG9=`vqqݻ |h3"E6{ϑMloP$`?VNC;qȀwCw4c"j ,WbeUbé TMWŢ3Qφܩ^Ue$D߱ Քj (nl7-;Sl|o*8TA}7 9"~76\SkhH0Ѝ`#ujMJgy{W>VAC݃1t}B*v;x[u/l?W9;PߎP#Mxs_zL25n)uzQ*v|⅜5Af2k1^ޡB8,}_ά(H(E#܎Nʊn`ϴ# 0ǎtNd;lf(_p/?L7JoEWeq.d+AVJpBg|jNȝyVة,:.@LP]#whXO!YK(p.Vz &!;4,<OaR12:5\Z /U L \Y[dO!8FIL`$OG{D54ʿ/rA=-Dnu#.NAGLX/2k^H+x1GqNR|Dv$d )ש\wl59@xhu1]ݟNJñ@E$WDl{0Ի3 4rGYUQ>R&8&Xnwh<Տ-_*rpgWeiSҐ=ݣoI}Y)אVR5B3JR:j V)0/Ѡ/ BYg*;2/6GT@c6 &T cگ%e5$S]/:E>7 2y ~R-N#Բ F=}YՐ^T(eܒd_-I1'rN*tl0MfdZ1):ܙ 6Β>wGAmXG`>&;G[V0E: Q%tn@JyvHqrJF.dG v\d#lxV5:}U+gmd6ZeҐ}a8hEQL0t!`ҴqorOEbSPU{@ٝÖdy|ŵ䧭q$Hy=ڣ[{8ghȏ}Ѐ=r*+3=S Y C&OZmI@_O(EȟD*ˬڵsWʩtSK#`5 bilaTfo\ۺtPrΟh.OU@SGFuk5br>O}6w]5`U>#C@eBe kX*}-dħ8Ty6 0 R9ֻr\ K+ΘQ0tjC?͑1Γu/L~Ϊ8sqgrd=ƛAr]6A_0UA`}Fچ5ϓ_Ս"dk3Jl Wch9ɅqCۤӕ#C1@OJ4^_#ԩ„H+>nNj;u ž$&ճ2؂fUWq4[*G(!~_{A[':1#OXvf.Vbp"$0fB4D>f))*݉k13E>E #=iڹ7ʈU{=3 J PFʹ);t/#-.bl]_rKv?}K& VIiz&VDwd()ͯynڡӫdyPik6N3~=|<~e0% `#X1K- v,ϐin23t埵95#t5hHZ%0UURlf*`͒zm b5o1v+&O5O|usfPP;6&2./Jif)!xDV }w8h,;#yֺ(g@cTT>EWRf.+ԠKYkT"Y@&™CUro@Kh2:Nˬ:rT-Sg>I X0q|s3+6cq#Oe^VhqՀkjyrlٞfAƛHWU@p6˄lNbW0ôԁ|0 07 ` U[V|O3e ̙dPϙt<Ʒ[O$soBx> 6{(؏t!)XKH+@Ŏ^m3^ݙfHfW0 6 urV"˭bČ~S}Z,.Px֦a[{2ah#}v6 %Y='wDU1b̦b!rBY|+"m?Bs/NI,U%a3duAmaR/afe$.\Es8.ƸǯhPy0+П}g.?"E-p5Zd4|Fٳ w3|ReUK/ѥmr udRNfɩKaERj(X9&tM&ez$ӎKETTutx 4FH)L F {1MYO(HX߈~c ÜκlFNIdh8@N CeOIy=ڿaS (z.R6v6C+WO9D1DXt݆-nqsQ>>Pg:ס]eIJ.%U1PC9ygCD <$KXAp:x A04Y z77#i'+ﺛҺ75G_O+S{ICdZI̙2_409ͨBH0pG)EUiAݥɘ5|BJCRo DKѤxPW@7>WW+D\]) 0IW\MT؋k&E)P4|wF+ab4lUT%D Wu0bj$gU1v[({Q8K-ȰW)A#-[xS"R(֑Ɨ+O\P?D[(OKmgnR 9ia }旞ݑNۚnG ~1\<3[.ݙ)EoZ P\24'Eܵ:7/^^ 6&K*+S3a.S\_]\RrmYE}0]&Nג7&;l*hQ\ZcXc#!vtp1[5pQHwkMř`sԶ5/E,;w]wy 8n)AjrwDpY8LnbeN}1Ygc/Sͣȅ Ty#H1,5@~ƒ:+f%,rH("_s)9*;(3e.V@|Pq|Sٮ( ^o9*8_ٽP1p^*f٦_n]鷓׿Q3.:+//f7~G, \oJt^]2._v́{Nkzmj ^l|nOt+zY*|WbۂeJOV} -zR#q5m頬0 Q_F14@`H%c8A:ԙw, l܄'q/>CoKb^>1 n5q _)].]:0N%2g,IAuwt;\5KiOXR\oovһ,ORA"R..΋Z]sެꊌbMзEKg9hA}{ WEj5phD4>34j\`4#HN2CSh\k ZmSKi1M^ˢ /MƅkoxľmUZ vx*M}K'wLZFu=fB%ia^p` U}X(TĂSq d3'=d`JF VbnX[BddA\|Dl.֊ĨF~H2J~ܳPy(8mZzjn4)3xP=|-ʧ,+reʤWp7ֲfoeNk  B f{EJ~Qg扫_, { /:f> &M9LlQa w!+~%oP\K9F#4:cA-5d ۑDwwmG*G/zL F}c;MK.޶e7b;/Su歙y2 Afω=X'96Hvu"LeTE 24V)k6`O4Wp:#H ǻdl+)Y|wR3 ҵe2출jzڔZeL=>rpgyy{L +x^`N%W@J榪x(!`iT{-Ւ($^'CO5H ̥LmNx !,7fGE\r("ӈ|yK3BVr]t@ ђ]W~B>7=ߞ@;Wհ|XUZƜɥ] >9[0["A ֞HΌfXχ'bT9${ZA܆ ~R`4hg;W#* /dRϷl2foҁ8\szoJ)fi;sեd*̽GVa%c1{7 Onh17b/d^mSn;ĚSf>CԏqMtcuGgGaًi@vʰ]9/I`1xxBd\A59_a\plN}^nWrO7) 36!]sƐ/p1~:nw8#1 cO!?V]BU_n<+$Kq9Vbilٕf\ʀ\]&>~ |RZ=cZ~͔~!`rSM"7$]~w xʢA&MJL/}i`e)c'& 4{ H[TEw`g{U71);;seGQonT 'pGCgy,etȳ-Ty \ 8{.'Wg4J&4hk2N"yI[9 C5SХyIC!0&k~8"D:7p%CD.e( %N2>WM΅a'Yw,`:&lqP# 귝?njWHͣ[~` EjDlh;>Ы(lD(>RWnəa+%56'(%QuOCKvƈ9/8F"iłXl% ERɦS&&B>w&c%t{r{W6ҫ<"ax+؝ҞA]|iGcf o< :zeK^2,룖Y\ IjUmQ^Dr.(2)X7WdB f" @} ]4^8MƝ) W`n^/mU .SU*?S"4j-* k(/U ҍvce6B0PMPAHxcEQlI%T 2ع5ٳtײ Fq=lASZ:@Iܢ @Ћޘ$v*rQs`P ER-HBCC0$z[u25/<,W uQIO+Pa? ^bH67"Vt#$ V ~h5 hÓtDy|[":[f12jf=$TlB/5n{ivɌgvy[rTC͸B4E@Ka*~[Gin7^h= :OdUqW:+6k/q$A9]9JdhYj ,&__D:e3Oc (͒{$-ai-8;Is52ђRX)TwN)5o{OAH%7*wDf-}$#m_}JkhNÿVEsֱzid%N(ďِj> Sؒpda>Ntx,)DJ / 92sƫFMyFmܯwoWyx|֞ x},ώ ldi4\dked w rd;+KK@'[JymEysGb z V:ֵʪx~+yf#\?#SI@{1ΫHų9}璤}h+\<ǣ [p uەi<{ v=Ǵ(T.eRRRS?u8Y 47skjrO-A$#Cf/05VX~T5Dsh8bY|# {k3/f7[Uef CVN!-hgɰ"ﷻ#Zz|[~ҔYPژ(B o?}}\6bɞ#U.h^ O{- {$3=v2P?/fgLSE r!h^`ߌ}J!\P4\30 wK\a&d[4XhEw;@)5c ,+s½z<8XcMrWIP2h[3N!DQ/H{wW,<..;'YPgq5e#g)CJz_)k;4l/ʓp/ր15cWlsAչ _JUǎo'{F{@p}lpnIHyNmS16H3\>vilt^w"}goѤvS(g2߷-#}DVsz y DFp-_+ ^ +H8xEhJ6Bӈ2͈BWJڛHZrb#göyeTPmn%,ĺWư48L}y.êsmzIhk ` M{{ vV < ] USWk> FۇmO XH]*/ ,OvXhɘ;Vp+' I=7RJ]Y:H5j$GE94We QoR'UZu]Dlv1|s{'&&B(l Kn"Q&(Q`*t) y{òy|VPUVL2DZk P1huuxҠ0|;+bi)ٗh=y:TsuMRc"Qgi CcՊ>`SҳUAy<ֿxK}(٪ybe ,g ѳ,.3fN b?p)bOm"A]x>q%P U#ʐg0rѕҥ y&m {‡sI˽g+~ܔki؄="pџYЛ\*\G 'w_GmO/[liFpO#-yg: ©ya6J|uH>E_ x&oՖ<STsS`# 2q 2{ ؙ/f{aYYl!cEyyԍ sQSX\ .s K z准Sˮ6}~C/7ڣ6P5.?U##UA$&;\`ۏ-Y  ndXfC ҦujRd(BztG! >h [$J$ps;5qiBe_Sve <,V- 1z<>miTRH($my\,*&ڤ||Po4)՘{(P`\xs!PKL7&=bV /ϝYAQEΔJ,bF;rKQ $CUͫoDh 8y~i26Z #9mر&rzˑg&>D$m[ RQsq^nmqcYh3/ڸ߽Տ(,!O15$Ƀ:'Ɠn" J!{4M}:ޣѬ -D/O[, мX7޷'T#sވVGO6U+ǖ:ɲa^xmW VZђWv7['ѭY{|V0ÌEHf_+-0FI1LW+J"vsF*bh+6^|7̧adP1-Zdg$}c'v1KX}oFT$̊9-ɀ[ סЋ)`cXL@ SJp(U!B1|!u<2˩%|?5J , {`A= $Ra ZK糗s1Jiw7MP#lmfc+F}Bݍigaf0'buX'e.=3>xclɥCC+q&vSW>jUinS %ik‰n6#\^[jSA"]_ 7Z)g (}8nωq?FdQz:vw٨vLm$'^1R-Ƭ9RgOl8cgv!uIoaѨE<7e97x3.+yiqqWZvM~a#mЙXM0ZlB8֔)":d e*HXz;teܢhg-^#"CeAEI7A#kf8i.M=^ko6些FLS&syymkT{RzG jR|0A=i8b;lHweJVuП~ ȇ5w-71m׌YqyJav}`m6G۶wY ^TvP@G@7~(DRgq9*MCOs&ʰxpW4B=.BĞ~ s_ [7OIX]/aꥴnCqن}{xe*N5>MVTi]E~\iS$hyOi%. X.`c)RY1Y>ugM(e%&Ɲōxo79sΉh P=aw;ULx&:E.)\hQ#q84sZB(Ԭ;8޾O6nz5*[ ǒY-D#{0tL4W>#/I"vg+|9(lyU!}nǺD"Ƣ+|"x%F 탂WLEIjE(^:XܙkxB_N9|vϽm1:eUB 3=0;x.i͞xf`C[P<*hB*P[+u-TOP_>Co<# ݳ2Cf; GQ1u *nH: ]otܮS+@7:`vę2\1 ټ7%=%AEgS'_#0tK̂F-31oןS!`w'TLUldyV̅26y}}5Ie?l\Vwa0]Cuf+c!<Z Hh=Rf"]HxNvx͐!mF4 a e(KjA zmTd0WL|XVǼ!vf7Z1b%q'E-׆ tl8L|ZfP7=2EP X/-3+/G.I@ӾtF>H(v"eu gM xip%$Nx9zVeWGcFy \ pJO, z9/Hߡ5YLuړ)] :qts-!y7'p."N=zZvv22⌋ACQdH8Ya!|/W}ObBWZIs\,j{)hc#`$2,B3@|aZ"̇=j| }}9%imdm>b wh&G~8#-"x@ӵ<nMn", 3.^p+BwCiG+lrN&d<Ġ;G!dXTE[=#A+/1+m ~ߦe]r^6`Bȝ"osڥIsVBnkIkzEIyFuX4fq qy>N)Ϛ$a>VU"'|FƟúן>:߃H7wݱVr JrU7wx™tz8իlIg۰lCbx! ab ED7%JZ-zӽ`KI~dn0r4:\=ä]mi"`OSax^k|>*6x-p4]ryYoŁAT]-s>8-)@brb &gs(Z}"2u<$~~g{ۤ3&ڏaa:z֧޷Dˤ͛˃s\8K,X%kʴZh[n{b< ϾWK&ߩrp/Fēw;8z9TY0D>ױgC7˔]Lph҆bNw'"X괐l|[0m^r!eՊJ׌) 5 )ٽK3J |"ezA ]6@%٘y(錥ڼHM=n(vbE9-p馗|wR|^ !O{xGĠvWe7r mҘ1ROf/ ]^}cSÇl!&8k$O^C7k4!]8KZ󸏴}MpK/rPB(PwVf4L!_ )A@E6@{2Wܘ_PmDvD,oSX˥ALW]/IG gѸhN(PAmS朣ve p̄F1gkt/:H4 yn8reϫDzϓ#zM;zh^.2v5ܲ\.iưrY>7*T.W%wmui6Bn:M7[#y1e;^Z?ve+)a8sPm t 0"P|'"=-V6S|&3_68WCt'WA* mSt&Vz9W2ݪyKwoXYEPiPGR;rVԙ[z|nɧgsAF\v\'X̙{oa8cT)"D?p` S^a0b+c&|Me nk'LK5cN'e]C#l׍HaIo?La;m3*Rpס0NVnď~L$~zB#^Tg\G3O@'Lm?x]1*Uu J뮃!Ɏrp?ZP0k)-t4_\eޯ:,Otu¾P$ J߈?`v9ta)xkx v =nWh`VYĘ҄}&x4\7{GO^4(9g?lwxq0ꢔPO#;@ )Ops} vݳǦh鿸'FnM蔒f.oe.kSB:KN6~x[Ҩgq?Bvb.IWQ y$6q3lHOh`5Y9j/ HȾꄸx$i4T`Dy?}4s/yD ?HFd 4N[_ f)ȏ[j$F׶'2Ep3G 5Hh8Irzj-^.g=xY `+Ӧ; N6̐\ )T|P θr>g>N+dD8WLHN)ИueGK%00-FI<5 ψ8\#Z[cֽ}]Ca̷5֘,Γj_Cu!D䪜?Bw0$w!!C/'k&IC ܾ4m^ϿtCor_$11'.1xϟVF6r,Ahg.;Nj4tI} q8J * n2\c"zZ"+ Uq(cWT *Y\uؼs5ZwWGrf&LzO8մw,smCHJ㉨g`7XN 鰑!Tn֣Ru&pBZ&f<%P`tq&G)׀:t``d§ǴkiˇMl>th9E+m{pL!Yzc9w0~;ҎD&s'y!P@`"xݪ'i5`h" `lI%E8cp^ko̝4s.L< di-\.W}\lܡ'0wi0.ŊtYjP<3AATk'.->h0z=.u$;o<&<@ ]t3l QU5HpWoh5X |jZ_ ]d"ezZ]KXo߿S][JF5T YWpMi3oz"wi#p:}9ػH h҆hvH]}gE-@QC! ̎<}ϛ FU~~ש%s}WK3rn"~4bvmN-" ݨte-Okgܢk"*cG,p/p I?~'r?J!qsX-O<6 53R dsٱ~ a 3cO$Vq|i)lrUU_* <]C*ZbU2tʤg3E\nHZ~d?[LY8! +BFߚYCX޷ Q-DaZʊ) nQzP^_q" Rœ>|wz0RaUƖêZ("Y1ă 6GڸSut$9YsȰw4t:0 / S#B";lnAU(>]D&zEdͽ&{kPZH+.4] ِ]>Hߕ}w NJj>KZqH8bWU L,߷bej7" v G-)Y܌տ܀[@myϦ~$~]EkG0RTԫ)I/E0kx91{&.sTU6:QQekr{RFetTqP_C6sk Pɰ^_6`Gvzw@gtv~̥=dJGK"mu,b-[)NXM͖6Ԡk vO/"`*XSp[6|YtUfin@pT`x‡`$sUPgoD6z.Kͽ&wI'KGB~lM1|*OAn:/!vz^l M2g8gbڨCmv`"1"E<ӭ_}f^ƑJJu("PG-lɇSn[X󈁬Nֱ ( 1y:I@4+Z%"ݝVӭ%Hiq+H`x 2zש*O |m ߃2CŪ<7T`{0Z3  .,!d2p *1lEm!(zfG1H窗dӖ9R -\F;{1qd`OaL_g<,#$<ռ"8WBUP%)Z`: LA }ո9^0Էy#JD{!TXE4@9[KdD]/)a)54&3XhÒ)nRMV62>Ubb={w[R>eOBRNuJ4졽G&{1-௔ԽS^{>N& - Ӈ%:<=87KS"Zrh*Ό&&+Rrc˸0{6uI9'2k DH虢"Z @C°NDHšb0#n&ZWWk#@89eSwtHO[pKwC=  便725Ď/Ot簉}3v(Օ[x8-oYD(VsVUBgN>b=voF,}9/Ng@MߗugȐ@ z/(4w( ֺClʪQc G<>PC[ b}*[r=16"Am;Xf~`; \TZWS$T-j챳l 8,戴%9vI])'3%nhOSxf=` .WV (s`UF=ߤO3ZДɋ7KW"FB#~|`$ )] .JW$QyuD*q St^ś; 1AzF݀aQ3ƹ lxh}Krձ=?D $D' \/.|[fg_vo{^rtacARSsYR펶^.O؄;JJ1[N[)C ء|\SVwåFMWa~e@}wD^C]a W?9DcdƮ1 p[ϕ>(` ]!՟Y~v1@r}#?=] DZ-ճ#i 3ʥ . QzFP`O!aRXeqӀs+H j󾧻vl0%\[%d&:цoV-K*bnu&")UͮvBikpbu-q $38opI5My %{":lZ  Ak׊N 6dֈOm:0"{y\邭PNҫ =kH2= N4/`W_ #cd+ ic4tM~ ?K% ޞqz( OnƩDxel:CK,@u>b6Q]U. +/[@!ti̭ F@_UF?kَ1o\&Ơ %.r_v y\raXJ1f :|ᏉOX︗DfpdվɒS4q \~LE$'H]7V%t ]aa֝SU|j:haV5lap[ (j(⏋=$D3B9 D3ħc N(ފ-uvAf;Ă~Bi˂k{[5?af i GoK99WR^.l Ht?!YMCnM;s윯Z,KZ-_"\ٷ~nmL"--g}ɑ\gdlO>vII2Q/edHq9\hGv~Z|5.RQj0t80jU1f_v5-˼t߈$ Grkq^ZMdEwMkf2_X{n5?k0 ;Bd!>n)J1 畣m@Am5z{hduo'TdQO>ŮH@S/]"y?RxtH97x]y6;LO$ !奡YCt[ f$aR6Q4Xg)E.RJBT~H[7Qk̍bMZ @>ukcj'%Ù ̪OIM4fTs8{^ _|Xb :!D#g?83( ^*U`}[aRp8,WVAq{N5S9 2ﰟWe8_\mH~%L߽aѨ )}fxX^krt?Tj DԓǼw).Gnl1dkȃsØ~G+saK\sM\OF;B_ʯZO'Gi;Xe*ZHR`sr`) }s + +)/ϯ>*h X1ǯ1 W)ˌee^n˅ϞƷSW]R%^+B!dljJOA?(>62ų* ~ /7{qGΖu%tO;zBerT9C-g:*(j>Xo |*r3`ؖґDŏܥd04ؽ /Q :@ 9< gLC" =-VoR[ VW+#.r?%ץɟ@ ܙӑޅ}\sܻÐƝ:_U 5ͼ껨-M+VlbڷN-1wZ3

;2ؐyf>_PC^0LhtjJ\qq@nN#] *r8N`Oֈ:6$yq2y뚶[+;@wAܵ,9s[?䘒PO̾h*YzzhSW!O[b;O5x薌~rnd *{a?1r(1d>ɦ9la( À"~5/BMǍp}Ϥ!=r-N9Ú<ɍ_2>.n1D1[jmk9K"N$nߟޡ&s?үT6Z躰>c-C / "rTF+gt]R }aJ\4$p%?.Kp8@YlTY"~n^-iH ~ŰhX:IO☽1!qNz$KɏgmU*(U(GS'ɳEL4Mtԗ̫XlqW$dl, - Ksny z~8t- 4'3ܐmE8TL&nF G7y1o9?[ָD36SQE|X.Ad "*VfICUpXB F] ͢FJWȸjW0PdKkU_s5#fSM>hCgGX`D)A32v}+ް[xdQ6`FLʞwXt- /g!$o|@mw U7¡O[=e]!XF*wVtf1 |*} ]6La ߂7'cɲ[CH !GڏP8:ah7F_S BOBVqP 29!0*^:L1qD;1MP83ذB%oڄQ.6^dZJ-8m`4W1)쌎6~T#:u0Wۄm.7E0Q!-`b:pPYx.8\d l+r`ThKJ =wQ_zeoS J(́s K'YԆ&r$ E=I:!я*cDgLnRd}C[g> TN@IK''l65GHũCWB7+\ .byjs{~'yev8>Kwމxg;QnߘzUS#Y:U?R×<52ϊBӚX,n`0P~W-6P%#QUn?Z(∗R-J~Tm2Cwkf>!J<YGHAͳmF\+}v,-* Jk84̞ yאwI}LqjN$g'LxQm 'l'Ratt4>c{~8`<uR\Ua3Lhf]mT^UG0,y8_QzVAl)3iJ$whg»'jƐ)wFk b!7E2?b4k Wuxzo,p +h+Qi{S۶ YY|g*4 FׯBa}:cY}yFhVa_LP %^Sۄ c`t- l7/&nS@3a2ؿ, !Z׈ لj2^Cf#J9};\kvݔb G1Ǡ[j} Vc0$oO˜d[n~:uurPp_qUA(Bo]<0RpɡCd y|Ygz.Z1غ?̉zEq+807xTK&5k V?=.p-x1G߻K]ga9g tWSa@C2Ǽ|KbbeadZ@<{hPT=0: H⼰GWڌf[gs܏7`t\nl ]!4@35o?SHUv<yw}q̽l`Rٷ ʹdmJDӄUA=-D]20k ƄǺ;v%pK0WBif!ܡ8ncGnqh[~6Xl_ J)C=*nb=DL}XOՖ2(dNj 7`?^`pFJ˂!%zQA\"[H 0RK5jHTh\G.y0+n*w|D M~R{XVTHN)CkY(]5MC m **sv $uzNpCfa€%d[:/aeaI[0q ݽAL#g?IVJg %![S4OkUw{ӥIPd^^y|'h#Im:o]B,:@hH&\bay'SViYm Yb G*mb:Ӓpz vV Q0JNzl8$D?KF!;@Q!me2 ,_ܽ| WKvqf] hKQ?7DAxA:o3Kƴ4nydeBWG 1?P"2 Yás|;IR`7_٨0G`1#PeQ}{ RJ^`J8A,cJQML̲XoqT*(,(Z۽/Oq{~Y~aoӼ$'#L,PsbRFLz10Rdj_Hр"$+Q.=N}9p7kߙAh ԆL1 ʂW Is@fk-=QƌHo2ܠ [*9RONN^U[NW)`=eBP. S K 5Ze:ݔs=wgoxa~#]9a5i} Ď~x4?si0n:AEh̲9׊-4 Ԟ*`NM+;2$gA<𮝱6] jVrh宇ܯK%wUn̮+D[c4س=hc$v;#7oGeV!G_ %=葛NR2H Jni%[)T ߹- T'% I5\;glo -0Dg>OTS`988dg L(䮡M궅n{^#XHW$JD s@*^4?&5>L/naIuI&o P;tkOpzTZ'zF޷m {lj 46V͚pT ]3{ O8o2G}|ïok'Dg(5 dkQItB\ZLrͪozeEU[7A|[J/daM ܔuVj+ YD~7s*DG{ZSu",^uV!Fxäz8yVw \8ѓKN21-5Q!-Zgu:ϕmwh "1:3RXS]R P&957Jy+gL Q N %pa3#wITU|oGfY;BcDm*#k^e[f;tqA3 1J *? kb!4iTeգ DRpj$-X4Oj.,Ur[Beє0~2c^yEXܰ*vذ4VJSE߰RIhRnO&}D>LaJbwVg<E 9ǧkRSX7X`"[9]mj %].]_:K'A) ,c*H#}Uٿز>@NDPv6 '!RJE k_} =: B27d$Xqrޤ~?d)Bb ܋m7w2W$1g[:aˋ>]7! UӢ\k;a3Ԇ엧:jG;Y ;-Hs4.(a&ӆ2.:CVCz%>w}k "Ю(j|eħR+ '+l W]A|Y$걄HV(nZ@Tphѥ,߽ -ip]ruN]qh)~JUFSPQ% ?q D;$wU縨xֶ(sۢ\z ٺ?\%]P'}^zt6­*qif3{G@-yBg= vD:YV{1 ͦe:/vkҘ64$~.a{ڟ40D"Df(gSkzzGB^ذc.bE6@r'*#/;FQ/HM^ha֣<*WzF&̄rDu`  Oǽ48Ojd (%HF?A&Y8A< ތ.ڡ39 ed`pj5{ >Q\+&{pFYf hh0SW \qVl |i}Nb.$p q䆃O;[-<A7o>AC8Er"Bta幊G9[-|_zV>uSIVSh4oR/ӗPkߗ$ql\RyPZBШ˓lS<¸Z寕 0cOgBxy4]B,aޡ#N͏%lJZXrC !B082sSd9BiVS((~1q~n nmq?H ?+9wʥkGN-3bDX``~?7k2(:n1I7b` >U̒[hFo~>^Ve{IfJ@S/ L&tQ~MMPBS{zQy;N654U.%փѥtA$POnkR~ 7UVg"3AH,刈/-aa NCmqWRm%kƔ)n6g$,ʔOWg,X; jg{Uld ?̝iZ^l[f2Nrg46$*Grbi'& leN!%X]ƃr\Eл0,>Iz.iV/~C ^jA~PL+ofb*fRjxAT1gź1OC$`^#xR< ?LrjmNw "̊*t_0x#]!wiZra[Ou4)kfg(tr8♮ywq{|iӉ` wn:iT}h"x P|'"~u1t>n{b'Ӎ  { AY^+A'RE'TgTڵȐ,jTkvš&l< /}3KP@[ުz󠶟 ^^oT|:UW,ߟ=zZr^yM5 =8.kY_{..If dF 2MM: ppdP^4ިQ>k$5h41L9aJ]QtyM34@Ѳ7q4~6'--9j3\åu'HT8s͂Rq po/As0!z<>ȿѮ8aPΡH&1#+oo];?ǡt<0jU5#6<l,`hQa]̄nڧqI9bBf$dJ9*Vfn^ z۪/Ϳ#ZJ8:rH)z͹! P?5pGzr()Q]vq^y uV1L}Viދ*0낞$}i-vP,8frUr@-P-;oEV)*ɗ(.R$HZrҰְ-ٮAeW7lFH%!g^kGÍ.m]剑@AJ"㨋H4eӐ]@lZ+L%"t,e28ZMUa, +[ťR"JK^ J:D+Q/w^5緕Gy:-44ڹHKy+;U͗EdXf!ʍHA+%YVh=RY18_"Ha'3ZO@g]/>wFHW, ~7wȿrۂ(d\ g쫃aH^IYUg$AZ7abpsPgɆ9+1Eoi$sשjkRmCe  ՛8>_i'DDDgq5v oA,xaB#pGQo-!P5}/ij}:t-u.Z:g߃ȟi=VEڄ5 ^$̥Yy;> |V50S0k6.b7lEi[k|!?%L\4󢨡 wUfG 䯻! Q8r>`p̫-`H0Otx9E|tk`0_.6{iLjSw\NoP9ozzt{aBSY 6 /m3sZ7dնI@GEi0$^ `Ss}u) A%ӢvifP7E+;$$yeX{U07iGB@Kj Hf zBM.чi:H/0džJ\m`E|r{WL9W:*H#5#sJ Oʊ#X-zG|o"p6 "or+c\8濇ΐdcA?A1mNa}ĉ\I%2=쏘GqɎ!@f8U ʋ ΔWد]vSðR%"E.$ ө[/ri]0,ζeM=Z xz6_?ZK4h5XХ v&cP9 %p9! F?d2ƮdP)5;\[_w* sW&pd8M/:1LؚHA(gY?D"ST~1[խaC00aFi 4J@Xl-]1mSrX--R2DRJ| E|Ϥ]٣6YW\ ۜfE8L̓Ap-3"^i_ee79GeOZN/$!G0PJ) lPsxX ںTIqɁy? PhL4AQYDĥ8tnS7Z;[IFiC![*?~Tm`~OljtQMfg!+Qcµ)yok;Q\,֨/I/c`U-=_|,ӸYб/]xG_C1*nB4x3Dׯw_xqHf$d$ؽpҿts󰮧sY|sC\8-h{t= ֟XhصVZR%1џuYP.hua>&ڛx @߬="LNz j{nͽ> d 旗}P-Vh"ҨcF}m/kTz5ƖTz?€h$Ԅ什mɉ`i|jЁUf3 [ ^l6Fi9$djB #Ȱ C4JC;&[pᱜ![!s-nҵ0[ejTFU=u-[@IW M>pYsX,xx ǍƺbpQ.HyED}l4 VCenUùa@Uy7Cȴ`A}r3/IL⾵yq)Ì<U5t:ct4Ŵ#\D >ڣ-z1OϬYϹ9L"sz ͋(jz+tfWUT W(;W/ CDz <miM\wdɂUB6F$ujN#zbB|J[ש-opoS9PC:b)[qCYK*"Ntk}&v0,]T փ Crl1$.p ,\l%'o\NMC±)MS< SVs;\6+x&䉲wX),NX۱Ҍp)O6nJeu읠T} 1U/ rE$R>2vwx4E2̴2gV|;ذޚx"J" 7}#B3!>% TbXCF^9/S"0$Vz61,¿vz(`wN_=IJzQM-}0k|ݮgLhFԥJ+eo}2eԭkhO ΌW/Og1x !$s%zBz  fbwH ZVgUl7d %~^|_؏̥ }EA'ߦiAo?-h]69S GCЯ` +|dFH` OxRܖ;0BlŃml6yk)=nA:ij veX02[.9}xfnkmgOqV@d竱XQi໙lAmڤ{l9rg7OvC擑Ž jhT`s{’Aze"U/'SQ~ZD {'Awio: 9NK!p)e!,nK&±9|gވ"\Vwâ =KcG'3TJ|`_+cOi2vz8vq6]%T+Cׄ6k|F)jwVG=Md R\K ;ipBűQ'ˏgh $38#DƌK`۽]F[ݚox\QU4xr"4:&t=>G뺺 т-#2geiGw,dOJ#d`%"P_G7JuwZZҗDY?On,.O3m&Aش% ?ae#0g4oGj(‰l{8pfsJ>\SM0ߞzRʹ /hP#S߷Ȅ Ҙ5J3:ԡ@Ti?[ox)O;ͨ<$҃z'NbԸJ QD.lS$Teaزo ":j!Fp%%]=/V 7|;ٜTDGenm%pyuu>lLySGG݇80(E~YM둥F0wS? }9v4 1.dsﲁq:G1v\Olt%-MoGe*k:c,߲ojMGfX'H-3UazO(O(P3ܧ6<끌j0!2N ~v53\ sكgsbMbzbs&}9h..:rbu̳[;r]az6RLZ;WE}!L*5D/ayv`;a'"/'^h؈yd(4:`cᓕ&ks1!fc($4JgwBRL9z.*)RKtQg$ʝ/$sfV J20.LO k:뒎wU BXm;ܹi Y7@@iyF 5q#3";;Qs҉&P xI%iمvݤ|dr~ȳr;j$2sOR^]⯈nG I9˵hL5yY[v|l͐ɖ|fj|2›Hj>x*l)JJ.Ly% _}qdLh|(6o=#sƑj} s #5VֆVVkU,e3_`l2Р'?&^~-]3N}!\Y UȖ$<Aw`N޿7d̆bt `F &l{v"C*e0Ե3[?yUΎɜ0) l$i)}1h=ŴLv 5n#j =%Ӓj yO+T ͟@l#;+]+ܧ۰_4r SdQ0""* ? -)k{ƺe`V^y.eìA6|&q]|NO,NoITF8QnĪ.'f , Ydȗo 5QC5Gq򤸥Jp|'7o=Pi81#[~ȂbρŔ*T'up}@3CC=Sl:{l]Gl1kȩS*KyZ[-bu@,q$)$@xI߯ )OTہbT6n>/Kr]=tjL ;%8,TW~f0~,&/W,8{okk}o: ě5L|;h[Mn;*]QSٔ% }޹/ܡ`X!R_i2Y Ꝗ?DѾ#[W@m_ jn,{K6K1%1FF5zi. )5-m>RM< c}1>9 ELj t27ꕓ^SuKCw9\ܖ|X3PX 죥{2)S%6`r @seHՙxy6$ZUQ+!x',U K $2s\9!^"uDz@ޤ|z"]"4zי2* 9TosAAzV62gkzYgTlFB 5+ԅTWE[nW\3Fe!nֻ'Y KҴZlE-&0 u4]"v ټz|Φ/*OT&+XщpF_aX`J9J."H?#@8Luկ8Q'0I A$id6k30oTq;3\c(Of沎;x"InLȱ%'yIR[LX0(Wc/] S%ބ,Wɪ9SH]bV&4G;bl B5vR/@=la<b%z Y[ A ۽A 4Rdbp&2:?wff0*OlJ9WeIم:}&ȴFӁLbP< ,CYɴDL(7n4]kUDЃ*}ɷ$];zf{m"f7/lP21MyMf3p+ K!~eL߭Y1$-A}0'!Fn tYUQt5wz\Wb98&@x? -EΞ`%OŖR.`B^G߬1OY߈@P>PӳU?3x},d[_?ܚz8OR2aʋ+:I(9KI2>šW '!8P9z3 C %gI]9Sw68ƘIwq'`ůdSY`pewt)W\Ru {NGb Z\6E vi$[q9Wɐ+IV֓}IUs*(|ġ~֒Wz+w)_7I_'?bEV6HYP]99y=W˽%m[ȷ3 Ɨ%Jӷ{̢<&уP d$2VȬ?j5-A}[1'U2v~gbnv̕T-a:r! y,\gjޢ7"2'-0RQ=^HGa&k=$Tk$#q5{9R_ဩ})Qӈ1Hs8cuS x!DRgE\Oʃ=[Y" nùE>K*ZFLfy!oJ*ӌcsqrT0,ﶃE+m|3qgkx1bC Afh_вB|e9ZV`DTDS\4)9s'͞">1^*;TTʰ` Ru fx.0[ gVtBPxRc⧸2^@x3ݚ6&{zG2Tuʰmr\-;B+pCPM#XY+vԤ[S3$OxsՔ>7S @LMTM\.b7l-,T'Ghƣ.{$kUIW"v9RO(íh]WĬ1㴧|v407Jj'3Aa>qd^a13]SkPƬwnX6Ahq:drc4/5]¡x,z4n8EUǔo!N15!È|Iui3cJ14MSFQsaڼN0Kiw6rA1U˔ R*b<]X1z|uyJzhX'\ix{^i:o='CA{H^t}AZ+h;y[[\D>[İkŕg0Ld T"I# >b=>D\.i H,.2D$KLz|:t`G$EmYt pņ/a?헙)ǰ'l5eD P|xǽ^^S'U7b8Ύ4juDk P/_l)9Vaø{WBf. 7{%T#+&*.__X1ڸ%mXWJn[eV&=V/ TJ=}8 u2 a&䫟wN mUou X#%) '78?FM~c5} {-eU,Y\|/}EҀ^dۜ$ry`vq0]mIOXFHܣpc׌{u.YK+b]L̏t:;<$%H`fTW:lѤ 5E.G"_ŅćB0lh9!Z2 <^KNceNVe: -wI5{VywXnv:_C_fĂMFQ'EZž1B2zB #-0uvVF{'7 jou[%ㅎZ4aKe%_++¨Ի8=CEݙ /"Zxw9secmc!HPOA3-}bXh#qlgCU \YhO&gIPOqv5{8M E9lkY16@Y0-5}Mfͨb(LK$^7DνEW D6T7|r2N;c3!Hy5㥉I=kJ5\pz=Kj-MK1jNh( X͇GczX%ߴC:2~.I{N]L*,L #`nE;wgqG f?S׎郟!( drb/X)6Qd:ٯ(ى{qs㝾 &?؏<`iP-45畗?*vJ__d~d.i ۯBbMo#ᒤbH3mkGHO:yLّϬQFKPŅ qmASA\17diY &$ C(Qg= I ]{˧XR'׶=YIUʼn!z)S!'Bo@plM? f!D*+dN<9h;ÈIhebYGD(Y=%K^{MԾGqW6vV4BcRK:kY]p~Μ=̾!?WGxc4)h I;FO_ *f6ҵ~-Yd%ѱl)mnqeHWٰ?m:n7%]5xI^Ai^#Uv5_E#`uޜKu[eE,;gQl#ďDȘz; ?O`};ˋ]D,} FH-[Ab峕D;U14;ߥ*nk~^b4 |U 7Jgd|@ h(e!ȟ̕":5*l ʖ ԭ4׬% c"~;(đhnm?)*T\FB"Ac^FGA-T@ j2t4~BE 9AzF^j>-kqMT'ofsN5* UF3 wc@3TX`i),R U4⿷f!i,[QT_1׶ DP4s#-xO@nmXxMMYP/ [ٮaOsqaӞ-xY=n 懧 I>CJd-TQB*F41b2,+f(EZfŏ5\-~VY/#G'?=}2ڿ<ݜa(- U+D-^B9Qq*{[ [=U-)kgoAOQ!h\R`ؼ 9尨C(x,$grc@kuإ(cre1 ew5ʺㆨ|'{SWXmw=wXe|=1.#yƲ89bqǸECEM ~pB#m0k94]_AepR?hlr n7f;+ʌy}jy`^w>1X83˵OZ,SeB0 :_ BmwjMt!"(#~T{!٣ÌMR?d\o|8nZic'&öm-?w2<r[ٶ1Luz>a*rE3VxH-CȕHgyuHTR/dVGąLeqfcqPבջ:Az|eYc0{ 7![LYyA(>6p=b?ݑB40jSQq4> BxMެYfįMѶAEl$=;dCiV©p?jj(RW.T-`Z9r>A& O:]lԗF*)C&QM?N@P 6~Xh ^Ч-rG9yD};(c׏d: zZw >8`V@5uvdxpg)E[x3L Q|*t(%rF8|0j d  k2ß;L|HIDh@G%̈< y3؜6m 0Pws.Yzm ۿ5MJ)~i FzMKb|@\P2Faq^O;r! ;"|DVo|ZSo!(88@$LzkQ/#xoᛐkBڞty jy$ů96Oz5Tզ|hY컘,4{N!_@:S 卛)z>]~ `T]9MS7u.fy޸eم8K޳ c_1I6bbXcD!T[+ g/1h}ݹ1P 5q˛@bW]2;I^/!wHdUY-- I_!`gUzV"H6}%v6Ppnd7<Ly{bw Ʌ+HB>?wT"ۮOw3/r:I=in8?v= 7EOat>uBp&b3e؁YN^k&gA %iIZgK~-B֡ܩ Qq²"U!'}| j%p`#Zrj[|z uN:ϢJ!wADmIumYO': [:*5 Da1Qvg7s&*d~;/ׂ W,iW^N9b4(cW:)qN;;-'%Y?o3J#h痶қ:^-[>5؅)XUYQEbًɺ|ǫ0 loy'Ix9ZCO#q&BA7Hg"]%N*d4[@sЄ#qziP<@gZ ?* m;iQTyځeYiokoҚy$2@4qr]BF([b}c$>2%aEB| U'&#*u-"+_0U@gܷd4-ut"7/ O),s mxK$85`im>: Kh "(+چ,[33|.Z=ZHy]% D6@$tX\햀 V-U lǕٮ DՐOܴbo~OiOU=Z=(PBR#o,C*3S8Mfҁ?yg֫ƞbh]V%ԠisʖB_*N_P/Էէ/jIuM}'W jm^xagn7-d īn@#ӊQ®{.*mnՑiH퉄n1DTN  _DŽj50OLphV=Yv'ՅcLOQ"TVW]nQ]IdP3/'iЊ ̟V&H^@{/Ԑ;~JbяOx6 ܒܠ j-cwewTLtԶkrSQMB Km)18ZuZNnM +4"5D;BCYBvSlx.?9 ? BN`PO)7@ɏ?m1idGlRO{ufNJރ1 %xBEBg'Mj4Û@fxYAZ?nLZǎbf6PH>Ffs}*ͧK}!-4 n@o60OVe"NNkSgޘ?Ig?pKa:E4܂II9c U"nϵE!"_VRaR^ϫ̺,'koM KiL]{0?L4 7.~Yu؅fb }дʊ+Q\Si=[y0Q$]$u飈ĀZX,Ol ,-UZN4/ne @ C: +hNZH1~\zfJX!K̉TC^+gx~ƞbm!|q(\"g\|}Ǐ; Pk2F'V܋pDS<Egq;a8J2w U2RG]Z.oNEPŭ'ZІf$7Yyo]BPp 4 s<rKc(,u: AN6Y~dU\Dxӯ(^ٌ\HvL=̑'k jZ>&idR>= 4(6MK[kcYHoU{24-Iz9q( :YdYw]2;H]@)Wyt4,. K^Qa:*~Xy}saZ Gfa"=0yV{OLGaw:I'!J)Jf9.8FCE~-3K4̣E-q1f C7r 9rQob!tdUߌo#`]Pd ymKMdt\ yGnN?QꞹI?PDL'{T,b>YtW#*v՚ ?<ʁ2arRc_Pʙ9[_bski`CK/R ۸*Ѝ=wlLV u?-f詝R 1!vndb1 xz`enTIss #oLVbGb8 J+lfw k$Ne1t"uw䏚T؊5"0 e) ⼝?P O *,b2?~QTHӼxuҹgF1EZWWɑR\h-D ڴab9 rjIʖQ3[-{2jY .8*+M)H\]Z]IbsqjJI-wwkhe4Nvj6!#_, dǽRx'ڊpQD+݅͜ʶ-V[E;dQӥD$PCW&BS"=Z}dBHg;B˚ aDWn>>q91\ی8PPhCv·8=Zr9in36ns/G7ԣEw#W#yj G2[$.O e֚lk㫧דAPHuדnd'S@LYGfDF|`dZ}jKo19Ң=gF|_"3H<^,TJ{u\[OgԞlq@倆qWc<> ֌Ϧ|A`b=Hlu0f7ggIh {xE RLt8}8>Il,3r.T~ڗN}E-q$8e'bo9ҀSL_:~bex*KGET+' .Γ^W2Q²j1@S@-`I;)"0UƧ ]w7b l}QdFjO>'./WFR; g`:Z}j /b>8} UB&K~B @w䆞S}v AcQNl7ikCC.v=N&K{8=LC +g2!') Ҩ#XGco"5MDmVu e Ƥ^EImm,Vc(06y{IW‚Bv˲BmMkmIy|yɄK-*~ z'0Β.⵸iuciidՇѽhĭ:œfBGyhdKl1$;_N"Mrΐ/޿8#WԀb3,y0`%$tb Dvf<,mNYiP28^JM8Dv7JZ}O3۸~N E% h C[fHwz0HqCq5cM_@i-r.D ATHoVxTъ~$-т=$5q'޹P^HOgAuĵIEr&\(ЎX)b |R OpM G>P8w\4AQOl^$Zr/! :՝6I2j7L^6 V Kh ho9/vxxv0z kGͅw `QJ6|殢TSxx2z Ϻ˶.? W_qM΃`LBwim/JG[rq(kXQWc| \&U_L2^kRt vJtxr+TM1K79eb a<>TAn-K鰶CҹÔUg#! Ԑ1\h֢/?Hu 'tӘ,lɪi a n=.?}%*8_1t32]q}`Hu,l.T@tirhm߱Lǃf*UdH-MLݚoA;8 #-Tyt.@}c"%Ir<9hphM4M-HMjQm4%D0x=FQhPSV)(GA2~jb8ߥ;hm17#\^xDqЖRUAjWJ? q9nD0M~7<n,eR.V ͬ tV$MBwEFf],FqJP Hm0d]T$6/>1ЬTO+y̎x"=L}V0 qjxHK_UySFmΑɉ;Ɉ*ܼEVf*Qt T6g;zG/ i7 H̪@y&}p$G^xi"ݱJd=W: BY/2ᬔ>Rɟ͘hWi͹S\xMl$]_@%lc㊝;2r$˵kroD>$W1e"CvsgeiBJOOf[nvjy%[T=?_׆vY@AvȜ"㒺#iNuA7\QȽs٩.R4r]g$L ڷ')BZb$2<M=ol \̯2骋-Il2 pՐ=PݿRI2/eS&6̝$uƻ*d*mM R9`&qrr  ͦ>! 2V ȁķCy| ӡh0nك \i}z%Coz/VW4c Pbڂ8*d+A|,6OKm~Cĸ+% ΰC%FiIL~;Dg|~/ad8]u{N[΋VPAvhIRpPN}8n z_ K JjܖMB4nB@2,O/6+I#A5lXD`vI&,]ܚ͸ܯ<7eLHEQA=w6-:,wWMPLEGzR>}"p+t@KN]HlU^nq#+GeZBښvufNBP A"? [ܚQ0Th 3[[$A ~MT'w2ŒZ߶o+ٛХyŐȳ;ui$w@Jؿ,6 kES3M>77 6%VsHT*=~m?X'e+͇?QeEch uF'X!1^Pdx#U 5 9lq \6\YA7 Z7@>w (W @˽oJƍCXoe 0aW]; nYX8ƈNrVu!-؜,([tmf #:«5 et$l̂&h n :A&7vַiڂx aI6hUg8 d9.-vd^_v\8:{a_ @pO* c5 ;OM4Y;]j\nK/ Y romz"|>n5$vi)b_}9D:s63-S3g(I>r9ۃ x3M#3Vl}k'd{ wEmZ -H釪t/\$GaXڰq>3RӜJg gMF#X{cY5xi7hAIh0-jEe4B߆r;ڙI Aj2ׇ6@5xrDmt3tZDn4dDjt}+ =* 3fy0F"if&⁜/IxSD'jߠ7@Vo|wI:b;G>[eM΂a.fPwk$kmG,\rb`h'\5%I+4ciz,ڪ,E8Ei5iWLg}MJ/BBd*.ԝ,%r}l;uP6Zډ,.t\Kj #ZWbؗPfʋ&hAsݾHrMig5͍oE>fqyW٨:nle;+KZγ#\Sl\&cШIenX!!abYAIup(hHZ04AǭM7$)~Ud;x#gФrTEBVf:u8VԬ$MLseͨk(@&f6GC%cfvR)wyʭ?.~xNz'vO Dvq49+-ړF—Q:Z/6;ĥҼDߌb+51{$CSD)xq{l|ݕqi+R 5LNUzU˲dptj+@+RY"ϔ"w67cOt!ߞjؚTXZMfn^ N3*`yRcmm4U V}F`Jco JaP92Q1ؒ }| 4(᜽ISE␶DgGn5T_SҧlG;gN;{Ne1N ľxGBÉ!&,[91;ZC>ɂ@DZ+Zb#sc䵴S9nbU zD:gYNɡM/e.w3:y u#;$#s'z *f=anIL-,*Wh~rcyw;2L.|JirF,MìLWs3.xyw(Kz)&/:Mf)[对MJTs04䞺>b $u,[PIp^#5-=բ11vK4CS,/1gMR* 5yT݄6/E)g]]!-s/; V,Z/>|o¢yXi'.LcDmzM!vOLBPiR\= q#{t>1a[Q񅳂^Qjb7 TN%dߨ5.#`)X#xKNuIϸ蛶NL-q.9 q`ϷsWgI}מ-:pS D$s#R+d&obg´lt(\~;mC,P%"pt};`uL8s OFFлti!@6y*7]W|"uؘ oyD n_c_?=>_ )Cx_lA$͸.*+ ,fT0` #T~"G= &08NkJGMՋPd"$- ?h@Ԏ{ gΈHF*a~l"-O\.#KiR?όAyhӲUX3ɿXUb0 Le-J_{+KW&C;PmWfl#kPlW-AA¥2Jk|I) o?g7 "ŎnnX#W,=+ `8I'Qy`#>G[akVhbɱ9_H2<Ҽ'i->plQ@1wxwg`Pv5c*ʳ'Jnfw6uZZZEDU"[Q]A;R1ӕp0Hv duXN@wp)pJ /]6P/pw`;5\rɎF7H=<JmLj'oTDTHBbv,!Lb[ T ltE:Qs]uJ+CX_x~fF߄c3t,z'jk.Ii΢Ԓws4mUAȜq|Q7f1i-Cא13QVڒψ ke?'J꿝ޣ*p¶IGJNZoOT]0:G W(4_aN_P8Δ#i̓ؼ+KcAc wqP9g£/{tTD !Ƌ`+ņB62?LmZk ]LXwqfɮ _ݒ>ߘ4 ` hk2T'v]H$:fRFaqѷv-+π:rZم~ `:rHo1Wj9 ÀYǔ2x.uZf/bsݞ`hX$hy +Y?ԁ;UJ#G>e/W//pꑸ>%kD#R˚jpLx&JV측e*+a3m#ٺ2 ~+fQ?is/s82:O`Wvvy ӂ [;Vi0W0w':_SgA/Uaqʜ#}Lj][rey:)MRb2F-;h ZRx>n4Na5U/7՟s\9} Kn6Il>ƀ:@-L,=E;9)9~ydZuE#wa+Q|E6m`(AٗX68"šF3C3)4#u18umD2҇|9..MvGdbw~2!`N0|r>S(iȞBX`ۃt?$(7rEvV' 5ե_F55Bse\V-#VKqIjxdmF2DҽLyθ& UzEI7"m7wv{D/Wշgqg-fʕB;U(LW0oi%]&u5~+/ %Q*2?6r ]ڹj]}k&"fkV6;bE} Cu]ځzJ]Glm>ÆP& P6+3>D*{b<2JEso%dQ v!AQ#:CLly-D ^d;$0bc@%Pғ¤, b0%۝kje紶I/ag!K =x H ?֖s' g5tOKdb;#>^' w`ewVa/ZτWh͓7զ8lNLH$e:,Kp\y#a*;Si͋-٣l+?@q5%[IbS+i}j˼=D/f&JƝQ7iml /ݙ;խ>t$AY/+^NmE K :9j!-QMu <Qx6ҕ`?> >Jt<*5=O!M$̷ne MU7{Wk'*_`YTuF}ΩNc} F&b+x=iZ-2/臶}I$XÉ:Gܸ/S (^.o[d?4~ >zI>/q"z>t#) NN+k QbC. B3 W1rCVFY,`#k\zNXMmv]+^!@3.2qyǕ}\f۸ m&nn/HCoJJD'3~eAG&/1) ~%= 8.3gT4-w̳k5*V~{oCσzo]ˀK /,֭ ]XƀwZ9X[qaIkyًGY f3C!oõ+FI<մ6"Nc;{UmuRN&b? c]I[BEUEt>&si' gDXƁJ &&z,s,kc ~[Hfv$Y2t8y֟hAi4c.7Um{3ؕV]¨Tm.a$pEl_+WCGF|O(첖{K]ŧ')5y 2|M/AlRɹl.òKc[XW L ua22մz 8 _NeDKO/"vc0lhM]%X ̩y[QP[]i*f}- H؈J7IIN^͆ Y*Lz!FŨM`pet$8f1/Iץr@2A%3Xk7":E61#)Q 1QAL6},lD/B26u/=|t-k1ՉXkuPnfXt5Pסeӻ]2h#R?@HY0Cޝ< (~W@:NH)K- 35#ȵppJ%;LGЭJ뼈w3ҕo'#^eJpO^(5\m;VfG{\=8a.Q0$`c}\߯q`21k%v͚W}MMT%EM!ǽ??rA HW{Eǜ/Ȥ=ղ #W"|}zNbBy8~ި }y_V,^mb2x~ dnWtDPv_N vC@7!֢t$` p@*(ӎX$QvpyU0S 7O6s+eUou5.eY9lGms.2UG_ 㽠f=ȵȉZ|u*j"L2&5/d%=9feG#y1IqVEa^%2q  ʼnQ"}{78{zG3߷+UM@پ!h+IKÓ&%z7>ر᥇xt.{ `cXc"Wf)@mWFA6pLٕuKם; EvL[ AF5FJ>29DF1=8jT^*tpetE,Y 톞j8ח%Z<Fxh3-w}cW%TԚM`0ҭȐR;KA  KVn2Q{[0&K~T= v&<f<7Va!*>V$gL'e4ro11òtOEh2 9~BJT CCx}qa?ZQ(AvY4\gl1Na\QVfaf/{1 Pu P& 3T3|Zn$*'kN kY]2Mp[ƚ^JsZ6]~n)]5 x{5Xvzsg+,Պ}JL42?((fndGE81Cj| MtըQSUT׫.B,yk?tgnOb^w(198YnVR=+axhkUhsYq{&Pm(/I&l  (]|u\8@-Y'!%0N/l=Z3M(&GEZr")s;[ll(&f=Ո\L6yhdD8M@R,=SMLք_3Yx'P0*IQݵƦb1k[e;U 87G~yj ʋqr(E~öLtHndZbK%?YN.BL~P1zdfSMeeQ>ݛe`Icu, b\ dXȍx9^vP"B^YG^d ދjΆT;k^kլT%:䆌u 5jxtĆ2OzgVc&Pආ[&Zc46f%Fb/֪Vte'G0xTWRLs/zPf` ^#[i6f"V@R e_(D^5d >/c*ދ!WQ4>Ijά 8Rι(hw#>/4"ՕA@JL[\JR wP(dhƝvpܺs sHN'@RF!Fo[YH^BF_lk*feȎluWX0kjv(b,ϋ?u!օq Z^$ i(]?0&]1JQ]L|Z_13U/(skQ1LtM"UPqa; lBͤ<5`JcÃMfĶޣ2 710s,$4?lN|7$" WS5bQSc 6r"Pq!$-֭lB[ڙ3:`E4tX@[PWEh3,aGP;1֥|QgPHM8"Jhϰ9Q@Łx|X(&ywSN0Շ@sFz=tKbM?<0I…IAF4hr,dwޱPN .I7tVj$mڣũۂr722~J['Hs4N'xR=\U墩N©#w- aJyo v X} 5 Q&6'ĉED{ Pϒ1aq Uٌ &Tr*⑚^&h9oVC/8<$Ky0ҎY#s9jFo74O.DnA_; 0iU窷PXD8HEzp}98n [6 ܥQTk rG"6ڬhF7',zIw鉆|bK4sT[%$+{`-y Wxv='ޡKí͆dlzSl%ß2 el^۟:CD&L 1D4b*#]MmP6!NrښD.\Xt#8ZԲUg="|-jk f?L\Hin'tXZv]ޱ|XY*$H ͢q^:Pwb+};v8?/ĽDSkڋ(%TJLJm&$2?V <@P'_S+Ho,6嵸)SUP}WB7WO$ IF\&nĊSb$b9ߪx.l3? Vz_NXnj_u;dNSSr(ja6 SYNjtwbkח`!cpS꙳R$ٛ'Іղuu;2idc-ޥT$<@\aX_/V[CzA[-)Yf(m';_+yq~~[9jm lf0ryNM8XVe]}3B Ei/K}7ٟ%u _n uQ0HNA@֋*I_Fo nl*I'S ZG>y]X]oXd{ Y'RnôQeHf섆p Pk9GtJ+OaCfRKqR=jvTvJ9n6z&8Y'env}?S-*"oTj]ee@PFX`K0f)^aNq5nѲ2e^nUVjX:UQv/Â(-E vPuS>\se#c,2V^3+)km@歇38!?qʄ]=m%ȽUȏ@(ۂQѦFؾb= >dslNQk=#CI VET?.Q 5v8FyU)T]KctڨAzy "kY=|g!W&N<ث,+Xo?5~sbs-)uj$Qh(TGVTN-D+(x~yZ ԘMЖ[w ^ȵ/r5JЈ1r!qI;IZI,BKpKqQHD}"᫦@b .=yS'3e]@,xdH8a !duz獏r GqGpy5l}$gsf]Rv=p)8{$/MT= L)\l!ʡDyvޒZ\Um#D0AZS3!,0y#^ :0<4,aY_é [P)7\黅?`Y@ #W 9}?O PFDDEF&*r*>a O!=S.!ƳWiJSc%/2jm!SHjƒ6nN;e,9ܰ\Ws+O!-J˴NRR KWvxR Ԩwe)=Z&KGna[MSH]`FIApdb" @z<ć*.*:+Fps+&>铙!ts!D@@f0 flӔ-HEvP13Ilg3!UKg@c Akߛ:;Qeu1pٝ0)ؖ "hm笐C7rⶑQ3)[ɺXi I^}H 2t^Z/;xq;'#* N.ZI[bb[j48\*,&x!+Ȇo0N_<2Eqf([R%8N@a@`I3;/.Qrϸ=O..]hCK ^ c׻-ekU08QSfwUyrb@ޥ񘧉E 1;:DžlBZ>;Jx8<ˊ(_M =w8o۝ЬW}/tʰ iϤܮ( N m|GDp}L$L8Ms"fwiU&N/0+U0HS^k)D'w}e`7w7y;dvB,pP9%ח5hs%=qD[mi^xůׁ^6ԓWtmu1h]1ww+@7GyqtKؐ>̎I2R;F'E{#hw#(̈3!}Y!e`fubytگ$.w- } P@$c`nqz+V̒"]ݦ짒b֎bۯ:73#hL6DMZ m6J(pϣEҪ*TA^-z'vu:.GI`k#~гC!qCڟj-:^a"MKؾMNIetG@ [cV^Xlz<ˈVoXMl}_];Z8]J8;[늡OC=;[M+-Ec 럑fWBC8&ؼ`֮[ƃ[#Tx⎘吋*?L]Jg6o"DʍkL3GS\ h(=+8FLko}$nq$rM=Ëœ>Ȉ8]v 'n \H[N9Tؾ.]}=\jbJ)>9]:+恃'V Z78s~>6W[_G;(ta4l803*='O@Li"Ҩyp sB,T;GL.gzD0|sSiqwtf(71T'{o>*:Q6u-/b4U ړs8tϝX![A9'RZ!! B?$Y'axcYVF:2r'kTav[':.,̴xC{=4ْ)ťV%O,U,AD?3P0̾ƔgdP>Pdn/s<6go#+i样]lV,ϼq~RݡJ f]>$4Eì.jqeR^@X޾rsKe ?ߦ]˕F/ )ʡKaLI{__Ly4V0OQuiiR1Y?kۂh~~ …Z8d~2Ƙ1vaw`r9'{5D I`4XQ뢛}a&v(6* I8Z!"Coi!{@W78:V9dTgMUxei~1B DvS}~U>1YkW;Ō7qkd1|> G )ꟿN*>|se2T'Ą6 hnw8L!7WE4IaK%>1ve{$Td,fΕ: $2yG+=忖q0{X();m'3\l]6#IK=>-{! g^~N8?ԙt>2 hޥvtcE:?0\jAdųD&g:GF:/')~)xSI,Z!fܑA~9YrF* >SaJ[{|GUx LFIImx5V!C d B"?/Ag!@Ԡy2V.ODzC$DayZ@C+^'g^׸ Vaj &:͉íoW"ɟ];Tъ.b a<9Ko޹PgH#gSYo{qH'*v ٹPd@v=[KiM4Taj)#qݍh^m |6 GQ A(Jdg:Vn ؉yl=8Q' "rP,89 gM(t&ሼɁXal'Ă; WԥCFS_)6MZ$d[/vHH_rQ Hbď7}2,^9mtjmHI኉%dPm'U lTXh>gg#_H)5:g-v&" 筄A uv"8bTǰh &DS? N܂&od4t/@)&bf8݊A{ؽh).̶fZIYa(1,dm' U!/; )[4E %=% Dy|;/ гά:Lh)!^\fEW%_xEQnd.\ց(intO8Vc鉿`?"#,Umgg\ocJ>%`{=, '^+}v4Pgs12jR#t]Z 7dY惘ŲTV"qeD \uH_a2'!Iʧ@RRɃ?( -mjp„a>k>wzY}VtoL/1~(|ޠKb ({XJ_ $duVxXS/]9O`}$7Q [roQUxk͑8{IdI\JLzIIԦ\Zג @ TdBD7' K5?/qCvO,NK)Cǁt#,K)gqy6z7rTȳI(XF5xڂE; #=.Vf&aBh@(BN2eQխ~A"ؽUXcR8pYu+wC hȩOI,]?Hgltwq!pD~^:ٜV5 }7#vW\~ED`X6M%Nh=ƽOˉZeop!=t)EEFT^hKWLYR= 9İ/.] pC9qW6$Z Mj@[A\\@k!M(*{ȸU|#֖8zrfVQ!UIgҐfEW*E}Y^ps^ ="T0Y$$tU9'&6ʔ7Pxuβ%߫4([G.µ0>h8@q|-/ E' ;$c/ )S}2h :ab_]q5. B!&gў%qރ:@ 5/'h,1w?-ssHY8 C<Œ^EhFau;ӇpFB,û;YwW&膗5,.bb7;u4$%~BfnωL^vHji81Fle^$N7,!tﯶ5,l'xËK_'A. w@^-sԺ"g]*k/5~ |C^9W06_sM^E96\QJ4hݛ}l򝸇?܎h}nؓ|HmƉ\a$:(`r$J{ϟUv_j+ %c k(< lH'.ohX~IC>KһLxv#*=yTM1rl@Nrnq@&_b\%<~omڜ$AA;0M(iδZ@#A2چ~޸ g>*Bs*6Mgt(P>{eiM y;GRƥ ݠnR0!5g|&]CKy䅐o;Jp{Cԫ0t߸C7D!w}?Ƕ2j!iSW(u plaԒYO~hdC RBpt(uM.0-ss4 Ȯ)+ٌhJ9kާb-=]cʞ&YhVqoxzGYxD3 k!P_lH ұT|kIrᾖ xV Ρ[EHkn%Y$-c##yVQYTZN}1 &ijR7kSIad dA1d Ϟp m:,z,nyT-x՞n䠚b)<v€viס'YڧPjQ wM$^]^EhWi_o_C@~*Q@ٰyBCP^#=B8CɆwr5ŌD6Jfŗ M0GO”Lk 3nUZSP8&VmβL; srJVPZM"TKS8[[ $W1y$LI6~vOW n͐FfvEѱփѯ!6 !0Џ's83bbn1|ibn8 ߰ hidkΖÇE`sL} gö1lMb49nRcZŖd+<h9t!nsAbL(X]JMş_.Fw$hYT,]b9ekr 2޽ ~~"ƴWC¼vk.z"DPdEZƩ ):ǶMœj`cx+$_D3HX䌸t CCL*+s# Vc-Xw>,a5cM"!l'sѲ`ܠe^702{7藽5Eb;s9MR@)Dٻˑs  Y#B2ml[pfhFq^WrtFЛٱ,αW[D#@={v(36Yg%C:bM_)αQ( uy ŗל_Y:e7#t )/(Lф,#ACLaÐ\IHG6c3=ABtD_?+F:;Yw=ENe#Ҷ>'g&JTwCRgۨP_Ģۣ0v0’6uN:-1׹v,RJ bz& Wl,Zt /%^R^MGCB Nxx? ه30.R|Hh18SՖ뒌[>e8TvXXЇgd`աm՗7}99'ɥ*FtL>m`2ag4\!tVaϏd qgg 4*ɥ&Mxq 8Rt/k] )Ǜʜ{R0V\)c X+ia*mܯL#H>D1R 'ᔗ}v ='!biU8ԮTPKH[ uhIVc'<win~7a>֨anN !xn3`M ̫`4T Jg+tsZw^A{=*-8gl[ʒ"8Frh 1hv[^r+MQƵ*'ٙ< q)tW-r%+rA? ;I:VkP%|_^v҇m|lx$P@R9 LQb˗HXS(4$pi"..$l#mhf嵣rmDiM Bws<#ՌZX҈ơP|hE= Q)ۙ[)Et1auCȋꀵA[v4 b4:6AX33Snбl-:KVޔ,}ڑ̇%cAP熅 [,1+`ux "#ݙ3C/foH rsސ;LbUn$'\i@𣱌'" ܕ#wR8O2"g,c [?핦iCtMa\;%w[DZZE9r1l߹P]=ê%az$h7,\(Y gze`R)m⊵YxX 8۵CI@u /s[]t]'K6Ak8'jMHr6l@hA"C}% *Dz( <xQA6Du {!rѤ]mtې"}z 4TחtUtooYX+⳥L1`6b:VJz5ga`B RӣZ#efI}N\ q؁9AWe[VXxxیEmѲ{H} {GCѵߏÈ+?D%-:lf1;?PnOo9Đ!Boܽe# #G+=NQJg J7K7U3i1Ez3Éy+,5T[s%}3V>w.us**ʽ!$AT؄ ' In#7I9mM>d ue0v0poKfSFu1(VDUEFҦbpX%U0D.4r;vlYRxLM7Cl> NY!f$EEV0I xw o,|#~j4G(Tll#N H2zwhH[\j{dePf+}AvL@JXL]PpogY=:z_VSuJ̱&o(kՒAӋf)"u. 5 LǨ.>In PȆaC( q:C'W2Eo&wO`@=,9Lcj]yLA}0Q׼c #E%WWFU緙ny^j%٘LUoK(+ʟ`M@4(HB՝g+OTi%qiE(A[@ޓ<+M]~T 6Ndj=)Ȋ+&ȸ(7G1Upѳ3 jpEp^An{en}ߨϱ2w3PՋ)%NCe`O-<1$*uXYd)tUC2_:23#nc bAp@~k3eTٞuE`Ss_dR9KI l$@4r>U{mV//dL|.x34(1+Vi!{(/)ī-^H\7(ژb/ !;\ |*sS5 Ni?؄ǽʻz_չY/bmq#y^F9_OW3_HP>>=2DXxz WG4r74 ̒t- X!haFʔDj.R]Dݝ"&> 4!*ZsŞjNoL)풇 Co>A2aQ;ԽjTDU"h؉hC uIy6a3]7>z WIc1$+2-7sr來WtaH ~8h|ag++AL8ezU]-BNa. !G2-عQ RX0`?yJϻv͑GoV)ū9+7 <&Ydt#|xmP "-G%NРx48ōu& x@+@aq+SW}ުE#%6ϙ[FbV q˴ūXr\D:'̃,v}ޞߘ4-Fe&oٽMf)S1zTuQ`IuC}Z';l+IGq5Vv" fj]_z2mu!c4$Zz [|t'ʣ`uZDz5Ѿn4R=A73:3\g :rHs5vj lS_uî-dW4YuL뢸mH:칓7qJ}OOlX-\u~ɣg#TĔi4U 14̧kW!H 81P~YVpW-q$\sxUtYC)ns|6l]U}* Ǿ'\HWHv1(&zc0)Fu>B,=OM :P<PcY%5yK~\^FU6<"B^;q@xwg雯tpwq #A`Bכ M+_T'hWQHN6Pf26QNc>=OVfFfGTk`h>937o+ݨinEZ?3oӶ>a]S`0z1=+XSݶ>wǻ$ )KgUSG&L~/"8^$drU\θ~|mp+pAB2|Z_YLqڣyI*jjjywOΥjK?qҕoHd&SV5쮠:,s?BK{t&q4bߊjv S;깘i؏Ia]]zOT&Sn]"de.؍/MB|Sw/ -bpdHxل - Nx|y,F% mŴ~PqBz+Iq> Z,MCbmQQ=&~ɗF \Zj욷Cq։Q#.iAn\h`*Iķۚ?!fUtI1B +Vc'80248蘻\&03,v#f9?Y[J  rHWI߉w_] ta2'W#rwvFA,ٔ_(Ev mV€}:Cf6*Cp+SeezpZ'Ckkxm*/CjN}M8`u[?xDPХ3m JY[vv<_S5#lz8>Y^A^VhlmҨH""_EJ']>aL[Cг%+kl ki\25g⿂ yKuSH!B2?` o mlÔX]G,"-DCaz~} ZJLz}Ng86 d:t6R y尿=Cz5$Ct\k#ITjKKy&  k"SQ s?\}̧؎|$KZ7El񖪏ʣ?*1eIg3ilh襎 ` d߂'}3@Lx!/Y9s!5%#vL 8qE^i~)BD-L*nҳ*5Vw<h`M-i1xv";)C@wʼzCQrY$W-%J^lEb]mi_[3U\i *Vmp ?M[oo:aCgʖp 2KDYT{41X\^(MzŸDƱtXl2?#\lzPKh7C#%7kb7L f,aR 2 4픫'%76W9;ޅJ!+eswyh)әP7Nd*uUvq@&l'bp_IŔF$| ׯILk4 ec\U<@Mq0?l|\^/Iu#ɭ 6+ΌBnkj厎RLg?yL }hkFy'DBLemiMP+rX.+A6xQs9i~ S1ᐌN4W{7Ľ~R7PM Ho)HN/Y6p@,zq48LWjwV1BHg_ ,n fTfs__p郠Z05η@`h21k7sˈO`@,l2zs3^HҾuc%O@Goh3_BMj[Cn.CD5W6FG][KpYM枟-dQÕ)svWpEɸv+veT^D;r`ܹ$-vnp3p}QgԶN}Aho/hzcfƦV=ޔovZ.Mʹ9sF֙PSr>M v` S՝h+DOӧvkHB /KB2-eVBrZ^`/ ߄I$mcRo '$E|̖FiB:4)s h>5ȘVm)A҉[' `PM+3uJZXmX~tN k Myܞ,6 XF52Z s_厳͜~'IgK4@5\ e1;oʋUW#\lmI Q77~tz[~BLIcF?9n6T8xMg?ƋDvsU3|C2Ka})x5qP"kZMq(2 b < ׇSGnWU)5 &V`^TXu)P.\1FW&OO2.6 h/sclVݤ 8YaQ]hXۏ'Ln '0z v.,Y d$Wiys07Ԧꮅ}2i2n+/k/^חzwl2hk #ͱ<Ԍ#^@ t 7 ICtB Ԍee6DHksqXU:v@ _33 ׵SzR` da};Qʵ.;Wu S`4\t8VM%deM? 4_WH,&>A3m| 9)jA&q/R@Tۺ:ߥ$~ (6UrLY&`Fn4]?n W.sڄhGFfخ7]sTK O6z77S`pP]ny0v<@޷.oY51]yBpA= i<StEκJ"u5h %n5狛тE(|緄9\+1D>:)]!\z%z9*5+t w3b1BhK{I_EQ$9~ݵ\;p3\,?aLW 3YF9ŏYIȈ2HVxFu{@lUI|g21G6QAu/4r[d׾A: 6; ;kJ9ڍ2oYx#0 :ʾ2L:Rw}xPԤݠjf0|PcSRj@㍥2~*aCmh뿀 deIŴ$f.=&>OߢOnhbm3wAF2f:@[dQE=te\)Qιzg]=):¸24nv غ#L.gyqzbx1BB7"(\-0#N"YUqr[R>c5tQBf[gOOtU.nvƶ|~ie<3n!K^˥V M(6)trUJ1D#rD. *۟̇ w% O]ԑNA*`S,q9V;v' i1$wLM?ر0oI#!W𕛫^q頢yf (~BSW2]cx\'KmMBT-Z4GRVyFt.s3n8H}QdMbtgWgJ@Z_5e~;W"8nwiq^8H"3F]bulBik9\9{sUoupIۣý"USPQ{hWBh] 쪳$[X燖wن5/h=jw\1 stR!A~<دF*sE`"*E/Jk 4>p(h8&@K\fz56bi"i$9< 3K$-XBcܒpԄ9Vtߙ! *|"A$\4hf`/h^vwE׺C Wc_ߎrx-:Dz՗Q=W8gd]M&Cݴ|.e2r?)OA ]Zl̊l(Z'F `L0gNߝhf-VN^Q;{"Rs`J6^ &uLhq>·pTzـWrr{*WT]\QO|r9(M30_ƌn{cN 6횪 5&.Imf7U #v] O{WIܧ |k0~%<8AFr׶M餼iJ6JLj߁;N5dڇNNin-#"fwTꖌ핖_mvN;ffG]C><~2/$3윊1wgy]_^4:v[ADYe Ev֧P؎0" s}orUOdX9AD4UrSp1" ,BT6ɦz= ]lJ-zSK@1}-qǘqkO4>"  ۷&n;;['k7- z]eViyC ) 89 NV6[4s/>W~%F2_-+:ǪS -q˄Mi. UMAMTQ]ɅlNMg5E{;2]WN K6{h.w*^m 6%f EUc^W8ΎzNat5BNu]ݹuZ6ۙ ^f%'Oitpd$Rk%WSYgoKiѩ+?>T35Ed'[h̃yöX tdu0ʹI/ @){V0q-4J8,O:T2)pj7o^&<퀒Vos˞H 7s}9QT%GP'T"6}]flm1|>Jn?ьχQT"va)ŵhlvm =T4f K=FD ei <20i=eZ&Xᯪ:lpّD{D06"VMTrU^YtK(q-55)M築 eN9>##TYbԂ =y6Jo8쀹qkcÉȃhsYCng? )q2Sʂ:x,~_P\$< Ki=#Djzƽ.᫐~˜ *K ;g p ]ftLdI5|r ;w66u_J¯tco}GkHL)jxrU݅;㫸wRř[v\B 7$l~hةer-H_``#Dϓ-q@Y$M|Sohq8E+_#u5Δ+ <ю`y}i6-Rb{Hw*83Y}HmBpPL'?Nr@64Fen;0>\uR.dXKsĎ=YB@AĠ,(M܌YP;wxp\k A=H72A iw 0~Lߴ; nӈ%3H<\> yDͦb9!U 6I{ĘI 6NpZen}x"4& 4\=l> Roh>C_$kݢ~]|AFgӽ&uRˤh۶='S\cls2$q!݀'}Z9Yې,RdhRgѠ>l QW7U p's3Uan//C~e7֦AU 2x*Y|@Sef?syЩKwj\w?XLljg,L44ORXh;ʒ}᳕ F(zqI;Wta6G_{´l`@2@Un>FO-N'˚vvTo)*/wIfdsA\ͱWX.y]Az;Q\غq H:WꤚHI\m$K*i6ɑFxHl6u36kNߪݕ_qXHr vlbiG=uynyRA4_T]"Ϧr,09LaJ$j#֬ 1^(D@ڸ!1nӜK]?R.$>R|<}>Fey*[d**z9cvڟ:LCRP=)eWMfIxG'~ҊfTwC' 1{}a"M9lѭeCx褞pK#9i ͙Z*aTdE#O($I-bX[\a׊R+HiY3$]p,jHgp0b=ti cQ4Ĵѻ{(No v7nYo11r%u7eF&KLI1dѓG"8\h5R9V5[H֒e [tU:I s)}`\Ng( hɪf5(7Gq+5RwWoSuO*NN`CB^-8xm 5`Fi]zP9鐪[.Vy+h >Pq<_$TY-TY̦-+3J+(,JmHbLd)ՄёہlY;& Gv?oGE{V62g1a/SA_6.t.Oɿ$zmT80qR]-l ]W:rixAᎳ戟 ^a!ᨨa̷<%t5Oy;aj=tQJsu+QHA،m $$z4RnW6 C]h4l<4i`рT]tނo3Dz.pvjdw/XmW ,~Mnwmk# 4!+[;F>7e5I˂%#dqjЃJ)NC5hax[3\{-qЕ ,@GdMkXPҺ>CFZN-sƊ;ٿkZom^<`aOo9$o *hN˹wObvrIJIXTZΖ( -v^Ysr\z\j*.{nLPKP[PtpZj@A7Vɭ`-IK;M3flZf8LO#Mp07 ;%%4D׋Kˡv؊/0,7G8 }V+cISzVM8~8Z0)<b%!C@4dlO%-MWSE0F-1ad<ڸ Zv966#ioVZ`$x^KƺAL {4AYN2Vv{iV}8|x[ Ɏ3D= B%ܔHH4)jb1fZhc#A4X9f ԫ4Ɣ,gpu]d&&nT jkMM8*6K]->^aquc탳[И/pHnSYLJjv|:&n]᭩$ \![| pN|#C'l7-Ir|' ,h7DLDHS6D(^ y cJ cg>t4j% ù'(JH{rU=c̜0|(Qr aW%Bofk.]j)8I@Kx$-94#py(ޟ)(A^szZFuqh2Ƨ+[O9xNH6}&UOp+R2T{6) tb |HUg''hLk@&{ÆޒcLI}L7$ yl? K;X*MDA_fծBwI/⧇#!Ǭķ!n8t4jX!.ڑ}wKDY\+W 4܄*pN6LS.8zI}eC艶ljw$ <2Ӹ\ſ7:5EsQZL~ Sx@(3m}@'vsܵqpGz -뎒gA׶]n> X*jߡ@Jq:0SL/I^B0C5hP9_~fRy&*@iP8sZY>t̲Aָ ,/(m;y:H̵F(v=.Gl %2dbv]CwUu<3,1H}NE›&ͷGí=w2ݬn_Ed98#zK5`Eҩ> ЦeBS njOӁw?u5O&jO$F)Etum&ה KcY[A6<0_;(A*S=vzf~xt u'}ݣ4+ Uo8YO"x! +w M<hL'/JMKBvW=6,f `#G=: X1 9"1a"y&H9 ݖ z+*V3N#LfnpP쮹$ 7T?T퉿 7L4iFOh2jd@z}J " 8txS[Me/)P}bosU".\pP.H]LJ ?ٹfG"sMʜ:C&ʗ}0(k6BDYq񵚈se1]9tg7 RNi!АpԙZigſfD`gnsq$? `'1-Eb'>8h(Z+ |F4(^wC* wL\Lo6Q~ҘxG| Sw!w:-÷Cpiû4)yN+fMCHv8vaF,G( pqQ51ri4 \X*;*`doT癙kȆ[5.z[v'牭xA@]S>Ag4 K-Y ;-[7q)GE ~4>pu4ba8LآQ#T骞sC}H1a>řnpنMx^ ʠUPpTQr!THW~Z _(waHڊ]<Ͽ)!#8?T ͥ>c49t\;Zۿ;+% oW;A(L_ڽ{2J/$sޜ0);VAm@n-Qd$H Z QNQ$HF+wtڣ$*%Ȏ옧DE6@)fMA{wV,{v@ -; Z}qs%}79w/L-CaZ.nciD-S, 7J8ax`33=yXUDD Sϫfz.3 ְ=Ykc!0c(wA*w/X#'YĜ_% F2Le~؅⸟01+&gUK]LT0aN5"lr+zN/͉:v S>nzo4ЬG$7f~rW{hB,FF6,;qꇱC}A>5ǵEGg+(ϳ5^ {&nlfFWjݦ6*ѯǚ~F t<@۝@[>U)Pdd F"4Cܾyl~qTŠo#]Cp,L.Xss<&t f zL p|`$1ƞB~l/ɧSţ&^JTI@:HTMrm^lPLf]hd޼}੽KNœ1a1y3U jT C,Usw,É+ Np0fD{yt#7sCWqE]$@PsT pi5@^x?UfD~~V=&o*/<=;(/nyN֋;=fv^wt/C rXJ `SGA3!hb&EQކXPBj"9|˓>ie\G)9?^u*rտj, i"(OaݢۼXmD\OZOq0 I3{0{OXVՉFTN< ^y)IXi`Bئݩc n] i^FnFiTd77< a,dpHS|޴|nB(vIQ㲍shY]@Yk-:b @ySD5L (@` sXhXGJ U wH[3eFM kYpa.$е0mZqC2z2}< ^|Q2.SCC?H-fz%D,єo+ì1-@X^nOz$3 d6\UVN+Nު}V5Z۾B-ࡀySK-o<&|Q7s7]-FcAzOYx맱6P!AZ DBB^GSܑ !vŪ#% p?L 7 _8}6+TL1+C_n`P IcNF &"g1υ>!=bq෼&]ǐgsh8:ךIQqŘ?yB?~#rʿמXo PeC2!g儲[D``ڪu(-?&]ݫ[(s)J+VJ:ŧ E=iG<x9#F5eY:0I׷; #DQb#nd!ohOkNhsiU%:;m`(nw|qSneNj&`@ˏa5S&S[pj[޺x xaL3˪‚[D_6oqTFs#ӟ /l+#(6E Af@2rib18~p/7k o. m"%,T#\}SޣPuv E`tY$!38{K}QiDZwYvmMbw[G]׬Ղ L)  N9AvCU˽:aYŚd ;]Q_!)bur1oRo5@򵋽<8n P3jml8"gWo0@)K'6-|Qy295-vH P؈r u*Fa~MH<=MMU9qGw밂K (;k@Ƞ^>i0Ssc~,7trG]L-%k*?d@9N;>k g} ؈x?O{ &;YĘLize^ዒY* wO)ºH4Ut>";TG@#=3 tcK0lMK&lH4Y >.-h%nP[! %Q5i0F!LgZfIpp*5~$:"ag…z\_*yC(Ȉ\|P7ƛEx^QZ|2E/`ˠyzd*mOgVQ[<3BL@g\˱Jd^bw BCɴ߱w6EN&~01 2 N0J !E7;,b)GqL0# m諒x;1oq<IFkh KLOՠtǝ$da׼eccy? 0C8/[؝U#pҝPf aŹ@-:D#ő|fU–㐨,]0i+4Nuz4Femr0>hTֻХxt~^sT%ੰqW V`\Ӧ9qGu?L*g G 6Inެds9T*[`&;zC9E;2&kǶ6X0r& "g\; r/x~Tw.Ip!H#ր@ݫhXw=b܅9^͠Hama.+ks*xC@|6]|\&hyrM%u JAe2o;Z3t$~yŤ\fŰ7P1u}gգscm R߳A?̩ Gі9J6%oЍ7v/r {#ٞHr&9xZ.]˲E* L*! /8gAXѧ&ea%ȋ3ɱ~> d)Iӡѧ 'i1̣x"hgP uOAd.۠~rWng4Ű]^+>-%}dPosT?%tCz9w(j ͌-)VpD3ѿAi:/W |ȝ([}ªd Ƶ "U^Szu:U4wڙ8O}+0<-TLt;$,7}#/E kN閫!R/##&HP-QB^J":[}L]W;gĹ+* DМJ>y PCxvʭ<}VMLYN)o*!E ;K,G$,TcfD✻w|شpDCq^lx8ng||8rUNJI̐Yu4gV֎1q) V-Wٔ@g\To3a Np/T@:%{C5Á>"Li[p\Ǜf5 v|WK;~5vB?fܼYS8[/OV 9BiJZ Ò |YgNA,ShqB a|כPLX]uiIx\)rRO4D<~镍0cm)HhYq:&9OKM} h Mt~{}! $/AސoHtOWǂJ1ծB:U9Y{N[[K#j8+0 ewZ}ߪbRiݸcje ,r"Kߓi\(5YHسR |4Jy'͑Ԇ!#o_K0Ŝf hAMa :?Gm KB~)oY:#ڂUF!j;O!zpH3Cv8?'\ %-b,ZfjC h!J̣B=0F$ (alg.xhīm410nsPղW_ :4(5_dXi1# 3*@b'1.s t{k/=tDsUII>i)F;W}=8ϓ z3xkijh4"h;D:%?nzsci"&9 JJ[-5j^#kauz=z*q y*[†bl㢱e4Uz}I R8\F@kj>+68Ďx9.I5 raZuVJT%x0Axށ:L5 nj\wn͘jwpZsܷT3o6#lW ܴ i(KNt`!)uuj3Mv6/7%*͒P6; $ox zEe1xy15d.kIn" eQ9\i(nU-|_=pn`\_>mPZ!%yTѰdoO7?<{=Usz2mDI}b&*N.uq.kt- mz< ܻlW+ӱbu>X}b*r}*:kV|+HbЄPgвOphj SdveX}0Mw*>VqKx0@::?FoR2HQ:Ix+}+摣PQ%-\2We!>_/yo@:0͏iS=fuN+aIU &=J?c鈙ԿQp\05kM.)J4*Uqsl2{)ij3WK jKfBqxY (F|0.Ve%S61opMG ё`α'\YfRXvY[ڭ5YfMK\lA $Wf|$AěXπe;/`?YF/5 k(odz_*6[$p3 d3_7P23& ͇aۼX by[hy:9]ls!hq# ?nQ= FZDI DJ`8Z^{Ds TS4<úeT-eZS8r$EO s4@teT4oPp @y+%OS]㩮xGp Ǘ(uB/'^1W4VaXl]aw'Xǃ,'|}h WfAq #G"(a@| aߣn ˪ӘC_ cˀU U"En|`hJXY׋w hٺ̵e!p E܉q^M0s%zHoe]n"|Z`\K!o7eK g ;M^@ &#O7&V[pH::oN q$73SyyRy!$p՟4Y9 s,{fO"pOZ{ELMl$!!{n“x"S-ICs~^2zd]2%JN^dX/ق\lD{;NzK./\'Bj yJ:q`dz%"]05}O0nsޔ3s`kYUK^~حcy'c {&pbWݸuFbQҦe?d;a iզ)?-X\oBwWiITم^-u>"g3__AAt"d'S%(n tcl뤈?w@GY~5qI2Q)5G(9ttzu6L"d(%qV(EKS^op uTi$2|n鹰 NabZo\pIe]-6kj5`ds?2aި|fHσ*z=Ž`"kdJ0mp u`%=}Y jD wX]JCdAJyc (FLm-A0|k-|I@ImxIx0J ' q.v%PXffK>ܶ@=x ;f{Iyn-2d $Ih;a:>B7??Uv!d&QkMkAJ%^[S\;˒pIQ.Nz"ͮ:? ycI-?5L>KN垊'0}RS%c矵QJZD"w8~JÈ|ȡCwQIiIPؐZT1jeP{$:Mc$Pd/~t)c/kCh,Sv.3ӖtH{nvh?p/_^sֿgz.4jiHx@UJYni2bi7|+U65vؼ +[Oq*,,1WRŋMi0$$ $^E=#QxɵMiפy@Tn`1g*:Տp %Wq~-5L KX_Xw앁9 aͱE=]OV]HnlUCR-y9wj=Co3̛`.L'*S@1QGos zG-XF|Y[a,!=3V{Y j  = !rw'D bN 5낻=A|.H}we6*xˉ t\thTZQ(-Xc5 P/￷Su6"N{i?B0ze`R&jwD|oD"IzN0`[35j5w;B'=4QLَ#f FyBo3l8$9|0}&^=\O y{ _"M%y34*"8oܢ1`GB'E;t{TnJ>z8 ~R5F$_fpE5УGEf \Lس~vHTq"žŕ?b ]R2Ewȋ ?, dzetf\nG W zpBǜ/dӎ,X;|. 3XBq 8ig 7kNgB|o<l"GaSBRs9,KK8 E+9siOh>X,lpL"WRW7$t*.#P Ϥ0|ʳE]2t`Jve_٠u=x=Oݯ`!z"$.ʳJŸb |w5@Aq݅nEC&ҰY ȓ/QTGYͅ2&v.?o11qX>"cЖW2$VS(Z3 ç(kַxYRmK5=Ax 6uSpjl?n v.-H2+!-G˥oT<8E Bc_|[[iYAg:-7jQB)P#2G)ߛ^"֛C sO]N<ܯ@ib& }±>{ GfHq0G ߂/  9rdсN`y!Ssu ks1W`[̏ $ Oȋ=_s~S1$7좩 hߟhwn,m!]`HW:jpC8%g؏z X&=gҬp4q? _;;|LBD<#;h/!i]f#(IY7솊6]CuL<#.CW*]thPϬ g{y>co[b^Á<Q[,cviB#Ԉ7n{{X*CF}UA!ɖx:'kqzQAׇxF u `.ގyEy4c1fqAV OF sF7ّyz|1\MbzGccVA]|uѮ̷.4Rw|DVu6>hK"|ėp*>Xv W} Chч/I[ijq4' t k-$ Dˍ}V3Me)PET+o39,В1O "p5Ad, G(2xw,uU0ж ]^H3`B>M5yrXUJI HA6BQl~ۭyFD%? fāVNg2s*G[!rf>Zߤ?,M%;M՟z GƯXJB S~AֲgN'˿of ,^,FzD s_'82Z-gGfO 4 >[\#xoY.x+{fw6 ]/jR2+p /33 3ŠR+|_e3HO8x~> iX.;hl[U]Wu J$olVZtşyc%M+W3`6)26p%$Q7TN:̮L} E=do"FWZ![`D[_lCNiELfsHCh' }X5lH)Qmߐ%[bZ6(%cɏHM5Qz~bݠv^P*Gss!D>ob]ac( J/>-,29!GH1jLUq8PyISH}YZ0jBeI?gQ~XA:EІ,F3LEC9dn,f4ۂ\(~'apfPO-Mv>@'0d $@!(PZ?`jF6rE-10稍%lr T-zHp7O6vΎM:w[8Uwb{Hyj;CxBH`sp/I (@FyyMJ@F6" P_a,/&>1b6Q.ZMXoħX:@5:z-zo+I"NGr2wzqܴm/feְӀh-|7Ӝ?20n /Ӆs]rU,i;}H1=ܽq闀1 WQyWd8f`[ۧoQq` ͋HAD: G܅vrh߅a<yV GQjch 4bUNs>(}Guy[:vu|Vsп_NO1-x,Sn{ W ]ąo73t쐨0[U0By<|ׯJP5Ŀ[\QC(wGXZKz>/! ˃~X a-#IRpGRKQ]-Yқ*Du`:ł͎VnG5`G YlI$Y̯ %R 5 K1G:Z H!-k}߻6< rs% s42 }iu r)*EPGqc+=,XBjdK%d^(rHQ!޷;xMA-܌z13 c+qws'X+U+7 $=Q~Qs;)+i*6Zs1?d9Q !raWQVFʙGzoЩvPa 0 7ʠvY{b5F@l}]gS/UZ;sf#~83&2M^ΊmS*T 1JuJ^/M<<$u ǒ-_SGu>SFQ8OƵPK|HxzXCqP_Ti ) n;gU}2H"%G1DOA͖n8Ȏl+eGah-砳cFv>&3 ?fuOۗ"Tz}b]s,K}_Rf $&Ee1DQ uscxA ]HܦxZWPGXYOwU@jQx:ky【쬬l8!GAPWcC)SIAŴe1ymWp-',`>ofr ҨeL h@.:G,qqm9xR( |Ёj jbaъ? .X \ZcMCH6-R{$S/IH `;eC5 zF4U_ eȃ>wUD@#i÷8/8b}h`Ʋ`RW"Nx* D`x-&[w5u窆8޺MP(5/\>b'jʐ.ɿi Q#U,E* ȷ.wnO4\Vɇdfy5|dpA,Gߙ3RUP)VD8.DBۦXxL*b PV<'>͒EHO1FB=C%H1OvP>=/ ;]ZČ4Jl5"IaGqr座5F=~JRD#r^Bm{T*rAF T9C{s0Us=*`OYNW=_vYj#(ӜI-4,dMAL1d0% VWOqZ tՠYon8޿3e?G`$Ɓd+$Z^ʀdPb^'HSB(( zqȶQDX ի+ N;tf%/OGD14)wI$]_&kY'~U@):n49ڗ䟎FaWuϜmMm` Fj~hc!ꬋi8$n3צuxЕ'%gᇷ25 `;9Ak-'ŤϽ`SDG],$oҐ08]ȭY!,4S٫GԨ!Fnjp y! ~VK RZ.[鸺JB r-xE늋!>3o4ڈ>ft=\xͮ~$s=bu7AتԪkfr\BPsGe8"=c6z\ކpYn~VÍ(2XB͛9>e=wdI$}jţ5M7ߙ"''V,%/|*5GY 8{]WoN6Hi/Ϣ$:CYf2%3TQ87aKܐn#ukQG*1klp?hh#C577g'X YUt`>,E;[ 呓-uSR>jz caפ"qcAed'7&4zY;[Z@]w&7p-c& EFa 6ڟ 1zJlgu=hrS;ߛEF0prUF9zXa ko̸!6*7xb$y ]iFA>eaۆ ofs6hm-йD&('F ?%) WuObrWasI!=؀ZQ/zt>3}yEZ勸I _T&t<|hgSNf=4b''TI+"tsy Z?{?*s19. ͧpEqWJ&fJ]5AȘĦ CQ 3Sw]Q}ImˤA2}5PBTdרՀsv\L̩mG{M9s~pcn}◎왽J?%"eLVWƹ$hPTIz8rފq:b(?XbXmt3 [&9]"(i 24^̛B$l *Ac\xVcFGRBu1P0MF p %qS3&8 Dn r.WVTB~ϗG`_jǼJV݄L >١ԷpuMfa81 RήhTdc(;L* nV7)@ipI,ҿ| 7GI6@ٸXC_Weȃ7if~fksI5 _myyj--P,)=lULB˾3WK]yB6&X1(bjdg?\uZX@qZ'F7l?${LM_h;AxU~rqÌ.tbV2QIgLIGδ?dU$J39^X3Mzo P1`κ4).>LDǥDd<K!} iS}H'2{ɝsl0yK2Z-];I$<7^H= ul8>zr[9Qn߳RBN[ti\}h) 9h2g:@%ga8X-eo^9]P*~pO2_uk8+)qӛkJޚPgn^n<2/k l(I=GW>$~v}-zl-}$Bs199M QH!]2!P֐A! Eح DJ1 p,(*/4QuHҴ ` c*1˹&m;ЀXyp̩_zJ[gcG*3eMv4RՎ{鿄6L3\f>DSC8>LY4^CJLԶ.Q "Tו/Sֲ>a!7`B<Q k2ʍOá"&!qHi$?hKÃb4aSTFX BLAv ??:xw~1\:Sf+F]%yN>ASEdB\5-7.s#g]D.hiO~R6km)cP\S%]fQDYDlWVb) >1Q͌/jcq;էNh}ɚF#A1R*[=m-V[$1opK 7UVzρ5wT pҗU|&-!( R&.`fOkY:ms~>̫ 0p& E5P;Ӕ+Ԟ?yfh$.x*j=UIN&WB.9t#tы (fDj,Jυ#Ƥ1Ha LҨmتРSj lWMƫx4,F␒׺.33{!3Hޜ^ml+/"ꗵх-DJ{`E!t3sHWNaW"VT~D̠T1]?h Hhi:+38EМ;N-}tVIs=5VyË+~D:03Y gb5^VjAבtA&&$loYSGrC@a4S.0`u*S77 Q5n'(ܭçuh BJoq1 -u/ĿLf5"p/Ba*#:Q;"T) tEk.xTӭ ϯ䕙,<Y[ 4֚R;W$Ql]}$4Z,*cwfjzq\=Xem0]N)Y;Q#9W66b8D9MVѵ_ \_|9 'gbWQR(?|59ϔwuȢ4̬_Xe>z]VaQ` qxgX&1u}oōe Gg$meì>x2syHҿ@0{{oJ: 50PX߁":룎"/K-:V4⍏n8Wk(y.U-:ܱX⏏0/ o #?0\yR(e9#R(nWm4V:4^T?/%x0 H2AʼG p$\W5[{;b)0Սw 'Ùi-SJY\)x牟䠿y_7 `_hOR<߅=/ Ki; xLeTT$Ư6#VۡUa.5@Z7$P*웤%]Uծ<d4n=cz˵t:jLW+r' ȶLzŏ0?diy8pW|h]4jS)p]c"|kk膻컭;ISdW12/} ~_"o襦)':hxw)IԖx7d5F}ψM'D)p@|MsӇ7 5Du![}IQک86}}x ~p-qVaΚ^0+nam\!2k0))3ŵ1y~6-3$V?8/Dwxx7Uak롮2sN=d#H)*t@/` d:A{Sx]ۛK9hYIBmY"% Л>ݰ ĹtiAJ>>y7}7i0=KKl^|0 EDtb p,52üg"y:Pc,sP;+˟5H%CY*Q x3/uȯdҨ(+S$|mB5VVX7,)zG`%ùkBo c?a?M\廙]%oXZH4~Ap^8$$hk},N|q@ǰ4YA/a5ˈ|7Ӆl ~]!A6=KwQ/=l-Yf6 M8F a=ZϽ{*i~ڸuC%Tf-sq㳅jA%-~t8gـY5Zc3^fN v=BRedG/ I. ҾoJq1+kiaVw=G{5uɡtB9*3K:oz^5 mUG=_B8 Ut,D֟Zr.*Bd=}[?T abY2,ΰ}>.C &N=0Lqd[9ȾT~aSu 3yk&s$RԀ%G>"pco 条\=fߕ<4Psrzf=Nk]@j5BɊ PpwC/Eޮ, "m)2y{ },7,GQ7Y"ڭ|l+o׮iNν]}VC}֙eN;`mU_oa<Ro@7o@u#&&`1L )$m,1G3w\̬ < WI$ /jzR6.Րqr\屹hhRv19:4L)/cg]-Rʂ'v҄}B;>r>Q__;bk˴(H-w7L1 ƅ]9fMUy4 r3&Rl0-jЉ<,둏`:vqk9_@L_Lc|lg[\^Qq$1|jaV^=olT͖1;ʨȴ#)ST^wR*9Q4b_+EM'B6D9lhꀞv,!utO] fb=jYv([?T'sk~)8Tes&/iLΓko~˷w+߫nX>_-lOYIxT[d2. *Āgp!h#$')\]n*vA >U!'GaûEX_Jayc)d&n!kID~~hR -v619Og| \Z1JdڝHXkfirN_6Yɤu,Jܻųnl]7t}^2%4I=_8- /_.Z+^;xB>4I}6td-bh%|cG O̞,P"&I @VvE1$Cvt40lR9q;I VSy;SU:EWw-^Cʄ:wٽYԴTE\ m}m!?,V¶ o!#'>YD͔1e2ned Sٲt^vϲQD+x1h/_̤.?i.#;N_U u 'jr%hf=uwnT0h]ȅj&c6jJgt/dR.,B7h{zrzLvJNG08[i% քwA7t‹5,ˎn+v4YZѴ{9kٶkzB{j%}4tyظJHSQE9n"x\(6j P&Kn?ҎhpĉXE>mq"xɝW?w2Y|OnGI!@Ʃ}^/·{u[Z׸!jG;4+_olB'^B]'av21 ^ "da[U) (XG!biϣ4whf/||)YW|d<}ʄ:p3dw|PR);E݁c!fK }skovbL}\-=ڒpg"KΖ+qVa؛t{#ʀ(|*S b,v{jv{`nY}uij}/wG--|OEFW9jN]?foM F[ZE*r=(]Wz|`ϷMЎ_ Eu)G0&m uQ:w8Tu7gst; U\*Jl=o ԸJj$Ν0I9SX6Gʼn.m%K3톸hLv)qul@@w,sQV\.tu1΍Lw]|]Ơz˘H:<+H) n ZSo3c #88X in갆r/]r\ZǩT6Y 'K1#ψg~vf'*B,S`[A~'0?|{e@0 oT?(]&[\JJIX持ؖT .yAbZ (VTe0svQRN?r-mwHSe ~L7 ~`.]vTC{C]x8ޗߜ&{G>>,r#<;)i9o}%Qiy;S|hŽnlOfEږ$].GZHw)]錀sGAU7Q"TpH➽})C\Eƺgk|l&''4 NuF ^ȣ݁}xQ W~h n,؅4Sv/zq$`Վ7~,j#pXTQ߶vWeU04#kv? aA_,S GP"SaU)iCBb.8ݟI /GoN'۸,bZ( "9)5vrsS24С#myKB1ߵ:*4`UݥhM7 U}pORM=w=٪c>Rd>y#(R!;E >qPQv*vv(mf0| IajiR\<81üM0/Fnw%Uen?[bs0*n˽e` 5!9S| pNlLzav7g8xa%I\ @Yfh6YX~Ѳ; n1İE} 0<02p{jͻie ^E+9N]Q/! cCOtZULX 7dp04Kme/fқgjXYR]Phh]^4# 1S ~sjC|uoLxCr);pY0r&?H)IXhD?Ҵ[#Ƚ׹ 1Πc~4Ikxz_ky*h3QelcT+Vbg_HH2,ttg<*.9 =ax^ r\BatyoVE)MU3|t6ڭ&uXq (&IQ23`x k5!^ 0*V<Ɖ~;OJ3dXs>t{ϯCEjl.ⷿẁ=@/ 29ڤE΀ljh]F:䪓tUKBy,],!.XZ-Iڱve]ōi r<sV&^^;#qKt.H31OhiE*eWLOx`Rp~Bqpc'>U5nh-fa]K &X2c)Qu/춴kzfJA3ŭx{dH<VĔE*8Is/X]*"s RnM3Z2(YpCe-3W -~ws2ڹ(ШKxa$mxm!H3:h`=` 9F:#movvz*(Ar?Of)>fPMDaqv(t"w_rpd,@(]YBdū@=wKF9i{ũ}⁓bӹݥK/4i_ i뤩S*$nN\ÃoWJ[BvI~[,M%"Ti+S [= } k7i7 hbNMo$ˆHc7( mw ~ʼ\]ΠE NMYZȑ'0t*lc[ 삈E02ؕ@aOeuyXʇ93`OZ^? U];-f-us-x ܄Br&Wp<圝g;A90KBbݐ&LyQC\6KoD}`1J/Dm5#D\,#LTq T+H$D P+]i W'/ǜ5(&@6("^omT `UhUv&ysP̋;ɡw IJI8;w>&WNJޘf@pLWռx>6 iS&Ņc951+ajٺmey%F8*F-d $>ї: ]{uaLU9?ȼ;_U^@zjnN=\_r(: ӃGwZUK#m) W%'*+Tv_g"o [:;7O!=e1Y eG8w n/d&EmXO5|2Y|[zcCu%߰/gsPe,N94anlĨbw2 ~]>E{0TUog!]>E4ϱ nVzvMaZ9Lb\L&eܓd]rwQB=(~ot *lv>yZ*b.d7\-ov f`ƲK1T&=#潂-bfTi{O/J&889rVmwJ>>Չ]Osgպ܈ً7/e d#9at&=c/o{'r[l HL䫯pRj+^$Ri>r6uQ##10VPN?, c9P5,W1+jηLn_ʇq0< mTxY%pX3{?0?@Г(Ea[D8tR.FHB5sbTBb=142uZ#G¯c$JZys?=Vj3{ћ@v $I}N/#Q搐h4/ f*\^c,O>`\IXa0L&d1l(g%>2`69Y zzgnO >DYG&Eyۘ|iGeLOiAdH r~<C<{80U0dqEp2 }r:~Ӏm h/2y6;xaEk; A~uu'`7!u"EX7ٌZi"*G7JjMXR K7-6`r kV7X J.}iP)3^!  ytKdS~M~[m8-х\pi%jy,uglKə2}^peE_`rѢl(CTr DV,K!kfϟ41msS0/~1E.o <@h5x3HVn-+ja4^TvN>qf̣51؄/.ԕ7?lӓA"S~VE\eVۋ5 c0!^Zaq@H@vjEáz2$6ԟQZ5L!<=MU|\t5R3ydKx;r^J = cE#Ԙ`TYUͱAWŚbRMq…2§_7hiЦ(!gEp"U¥\͖>E 0IX*wE1C'>]+v>fdl(@ 9zxs{&uQ@O92oW<\{LW Έǭ\0 W) ˿)Q԰6"aa3~F_f9UkgcRJN8A1`mYL)%t~# PpRHHy JA2w5XI\L3ht"IBЙrxBhY୆%\+\;\:P{PRV[/5䔠~hC4&έn!MmYcuo,jL.^6 &^N[.jXQg*do\8\)I޿22iy_)N |QQ--!_T%fOci ܧۡ@`¨uF>d@ lT߬>I7`=uNWP<!^>+l q{z^5T/ ,!Go5=1줍<|5#Q_b窹 :@{ ( MjZqlFeHnX-*ީ7)Fx H]t8KNƮW6l{~vG@Or7W|~kD>1M %c8lM?UQ ̸W (^E @5ELN"@g9p;9L;PV#dw-4!F-rť@;:"E[wbL[]TnlSN$b=_t\)I1B+-жT(uInwf!y:!>\?kQFqM m4}P>P';uO rށ%vfmd֫7x 4)<$aJzJlq>Raҭ7j (ihZ[404v>~0HF\zJ7q&QCd V"pL0W,gQhYt4pO7g #j،xDzhYo<3ظq' zu«nuMo;w;zѴ SӐ>4c}çh5;_毠J[ *j: yLd$:a&Ktt&1oX]Q$p, )zXC+;-'DbP f54Byn%s~Od'Meނb[hjjk:R&q шa Kw&ro@.z!ILo)̱` 7<)n<_d(n :hV C)&sE9v|Eź~9 ^ />/i|]Yqx>-MS펨gݒn+bRe#S+K<_ev xȐ[&%=w+V`+ BgZ+Ö&i?5 3ѝ+pJs* 19SfyN;ug7AH%nv$d icپ8 KR͕Ml쁽(d@wU"iZp*$7 = uZc_+YNNg2g_=f=]yr۲ ]|n`Q q=3ΜwKmcP_sxuw$opK?ϹA(2A"4)W-lIiC%cC\v'Y?yIw?cӺa5(A4Kq\Pns<<*lå/w,v

sY_g8Nd᭳u~O}1G1N@0 =5t0t_OɒgٻLPZ$&ڤӗQSď8s'<a?4g:QFUD/XZӔ b{;LrYR7Ҿgڙ@2@3 s 0J49,w`t_m FzfLg.HaXkMC/&Ȍ_4<8t*)9+b\u^TbUOR\ +!6:Ir(iJUI{A]* 7DaGfH[pnhn@2fJ.p{uՋc 愙}dMTU5b;lN"<7.}>fߊ54h z>e\ޮƏ:hyƠ~;>k@}sjT)]_uhTI5'71,> KxtGj_qv}|#K~^C5WzЮCHZlmw L }'$CLHǕ2Ddy  Vm؞ [="x)z#`T[MA?GZU$U_/ B#n$M*79`O?^z!q8%$rHGzF p4Du6\wb@Ĝuom$Q,~UYھ8b-¼ŠØUł,58,K w"R$XwϺ׵Ul2c^jV~6^~+ٮ **[m+ӣeݘ9ZIOؘ` t"~q +@dedGO\7ELfA8LRՌndW$l?aKPgryBiKU혗 Mi4Qi|TW8%f7pa!@Vq~>'fέ]*IV K**_@<S&iw8YX>\WN>鶲{f$—ݯOb [|4׼j% aCB[D򹃕e!1YjrijIs3c!PLF\F `LJ/Koi~u> ld\c%̊06_06S`[X4({P IB Qd'ڄ~Yrbs g[QaR ҷf#I-HvI[0~,D%k4 @.Oyd$)9\[ +~5tpF cBi?-$ c=g5)[gr9t 6F]x"5RdzlFڅƒޓ\bҽ7Jģe#(tpI/xNJ!8YX "ځJ[!v |JRVYyX؅銂i78T_՚6op:wafyF@ġ_\ޫ Ȗs:(KPNGvMM xPNw;IXwDm ) C]ٲW1ӡY5ojC]Fc˼uT_I f.n \rc߅2˽oP)2ZI>4N%kE\͈Ruc".U e9]?2tN l6aD4!ρú{>ؼ;P:bXcڠWԸV"0>F铡1Qv]e{)HM|B̑'[O$ؔ#D* tX<!N=9{*^[:@ݫ]q .)S;b@ӐgȍUO9t!.)/N35Ro};hy =M@*vivqqXOShr :R^1c-dx,u1= `#`2|.PmdMz=zF0_<@Y \ WqbB"=N}>_JˁqA'!v/OUCWVo#@x<4qgT 9uqSJB-ĢMY'Iz@_(}(-2h \+w"z*>![QP|HYeRYVa 60 !n7DBV|!PrzܵEBh%vJg7\RY')-6]h>J$t3E>g53T iۭ,m)cGx,4*@:g,0ɰݙ!  }DIMi^}&pZcB~)'w!0mqQ<)aCuWϙQ;AXs[h161\RfnS -R7'Jꨧ&L7MNʽvxU2H^-XcpA&\ tol٤zPh]\|Xv*r*ːJ08f.yn2Smsw7>MrB5Q~J Fޖ [nÑdIK_Ɓx~`BTzlet֧YwYdź#΅]K;Z6/b#W]`v< 7~` (ɏDQy}27X8PF_ڀQAw1I]?7&M |sZ[}[+ E*muZ?{7va.gB@nLa= vA=[_$^[HrN3Ǯ`-KUX9}15oGl1M+Xꬅ 7; .1X9GuVDGvKқ7P_/čkӒ]pR V-_ BЪкLF;< u^6.7>ɂNyQg# kY-ɂ T) bmQAw/F>ZrI^x4e,vՉ3ЃzOKWL j2v4k?B3(.;WSdGQ4ljMFƏ.$R K-'a"f7" R@pX(^Rm#& 4?!1C<٭f[Ғѱ{1?йtAcsXZl^}f'ɷ !:)nJsG{ /#R$G~]:,A]J)LmY>oK_v,D U"x .2pl쭻)YJ֦+M (+-0ǚ)bXWO%&:Cn$uR$̢7_h1e \EN 8:8U4(4._d9\-e|wJ:~қuD;/ﰏbGxb3G/lP3o]57ZֲT`֡#2 Ђ(3kdnG_EZnj{?r]K1֋Dgүd`fu|믂o *^Q)2?NXga3vOJE4 YW?+qVGkrΝ&&AaH𐊒wc0/ $Pǖj^_?~ o>q2̆fU톘**Iht*ƖPv.AwA<.1`&_ص,!o0hm^78)iOxܦ$h$ѕV'&퓷aQشpR?(,˒x(MFh X0 뽐f=PؼD&Evjf}CHn |Ŵaͻ5xLA:PKtn-R\R`l}0)؂z3t=ٜDR+Vms';\!=uovdq6h~i:XG=t5R-_Yqk`бuXص̾swˍX48TI&ᙝL%ʔ4l}Lz?5 OT<8:Vg(]_bZ?SX$^X*`mݔ6zQv"3J3OzNi|I- @: 4kOhu>݌|d/-2![YBpe5Hvصh y3鏋y~7hQ@M1Y'jc z/3 )6,_ Go%LOC ߵH%EwT e8_߼UH8t<~e)fj^ 6 *v myixkO0lUE?-?I;#[jM xF(l=b`awkuw΋ߕͱNsÙ7˳tOjQ5%Ga@p/%Kd@ժI&ՄS:pA Yrk4`6d&!&cϙXL@p4'i:ʶR VN Xlsq-tZɩ5v _igDԎ8h{)Fl3Ln|B7 ZgK8=S "1kIs>lK-Z #8;vM sP<}X2uC7:'A*~`ᐨjsL2!VY C?>犭57tbu+oL#k!ŦMXV-`3Aι p@g%V8VQ^X}ɑW m&W}D5% gR􋡝К='(|5c U1nv?d$v\bZ0m j8AH#epQRpK=_:?kTBH71U0KGϖ>G*QnñPEav_Jm)})mb9HYǟfix4gf"Ri=:LR9_nU<1薸?iZ"e^}BޘZήxbtx>SĈ!/:AsP˾0$\]j{q12N'm[5g ^{IIĠӰW[ eS Cb79wnf̵*$&'ǫ:TC^ٲ)Ķa;!R&Ѐ8s49PP<*B~~f.'"kJ{]"a.iDٿwfێ2 k2NlcQaD^^3:Y}#t&>e-ZWGgˠ(^V.\f| $;H+_1sf}Bl5ɂ> Qg- V]$0.[)QڸZ 9rH4Vp9 wC\hV`7u25$՝ -LFyi+W]A}0n)3neT#}O}Yi2^`|Ϫ$ZdFE#P^,v~nYӆ<<"[ԬXM}q42) DS6˲qc{ QCւW&+=!M时Zf Rؙ# t!= <49XL. x+ eM?ڴkPϨ# U| Eۨ_'WSC-~$x]98Ue?FiW`pjVUޥt}Ó=hWW: 5f夀LEm2ֽs)9&U-9mN,h(4kLNRg\=+AMĦuAVN}S)zꓛ"۱kgڳ5lD+[qA7jU!dYWQm-j˾UaWa qS75F^ T x hD#=. }Έ..;4$crYg1-$@M!ғ=ȋRHd8r#<Rq8}+Zto#_d0ڣ^B1BoA:YOJ,Ueɵ{UccqjmՒ)N^r1-H?W†/C_`jBP0L xi,31*j03%~M^Ժ# !'/M.B/6:n'G?^+zrrĴŪr$`= 2 ̀d9g|&_0 H3`{kKe98 u5<9p wQ<-&耥 #P\h HJQ'>k_`j(ٜ62Ъ-;/7z -d7n3 cy%ciITU0%]rݚH>9̜+7잦#nwPO(LpHELEqK`AJqG!^ݎB/P[Dwtդ3/-Hb;(.?Que~JL=ux*嬰?itji"u7uzbJO+:V 0+17coxn/ƶ^(%?1S(. WWx.ӽxK,UEm#api( >"M;Ɖd%FnA7N-vW~ѨTCkN<,:KPٰ֟LeV#\ JJDqi-mk g˂]sB| G4o~7mIW $Rx!PPlW~hh3 AQ3 D6RNW.Y!hر皲 Ƽc+#a"w7 Uav}/6 ux< 3nӧ=p"듭;t[ΨXa5K,@/~\: RB`cQߣ}뫵QqNa)@hZU^[Fz+~Æ$Qi3Q:̾%a~򤒸`>T#",nTȐs#ȉ|lہ߱D^d֞,A`B5HW:/_Oz̅S 9U`x8>Ǖq?g }\ 5uj[rpeiu,wӼ`4x#_6~iZr|_ZC9 H#M -/֩lb)^HwKVK`r5c l _Ynu%Us6K6,-JJhX˶E#a êƒɑ642w9,/ܮ^7B>:>@#R&?8ܐއO`XЭ^f 7 ftͿrPTR@ Mm܈>F)뢫1Pp =áECzނ;uc, / +!Ķw'gxFaOۻF7oOnήFe=},Zܳ}T> EFk *7/Iv-sDFgXںSsDdo>N D'y@훇1emV@{B-g{I˽4!gxm,9\{?d)@9cN뺭hRUE8 oT_ Rp4Sc8dy[c4#]؄Q9f;=c65DB lH_ 8EsxCHdvfY| un㓵 :ivV,WۤCOsn(D!hf^6 zs/+*Hgc04>.f*h Glj.=/,HI'@I-]*Ȗfx;B"ιW1“S@V? Ђ,TcJf;|eIVEd+HnM]hu0K?m\4 %:گ1KgT\"ȣ5Z/P\ǚ6S1"'+7˦zâ԰e$ jR ֙qtҭssՄWcM8kh?SK)^›C{caLWJAe`a#MHE(ҋԯZ{XsPd4im2<UؙW(-XNY`3 Fu[~m#lEg%*er{fQTlQ[c0t"n4yiJ#&k zf8U`(u#&4\_rż <(Xo:?%EGLBb:rdS#S­/1'9soX˺J{p ufΜ Is9C^J4\ŽrGͦӆSrO@3WT*uIGEA64e80;/RDEwyI>jF]P1FOd+<ʍu-/ĥgnP}ҝ/[ENz,{COaE?IRyq4:;( ATc0c|RWOh*^-8k~i-*6Yzj՗wEN ttl Zu ۪$n4x&'anÙm%7 \*+ ~,1$KQ QnwasNVOwA]46LD%X`afW L_1I;>@LI]oCHUؿ+x U; mw.U{ 5Do4Iv$ekˡ7ok[X/X:BYg{5Vǚ?Z.ş7P\uTӢie^ʠJۥ}4L!}@=+8!,-eIoRyW9̠rp{ 9 L is!5o#bvuO˔҇ȁ^:sN;곔j%,nDbܪ/(AU9 `Nn^V'z,бY c,;,#k#/ݟp%6EW ζv7s\@T)8\ 5Qț{1Ghd mEolpb<2KV B^zپ;M'Kk@jdQP\vF@U'i~YfOIA9\"oZrP߳JkRɚb! _B*Uх}#e20:?&i(tE5T*]7%-xLfcU^,1uCs%Tx| N$gv8nse "3% M"dAY(cW)X K:Nf1l֫@$9.!LKhfJ{F!3K! i˛%_']%KAC'=Gt#(apQ52}! ב0>[+D*y]n +$>z B+˯F!||)P@P&Mw~3ba .P$:G 0fJTMwO  m~Bqg]Hjʯ˾ej ܘ^bĨjYJ >YF0y^ kN(g&:WR!cktT j?4JjCeynZE" Hd0CثD>=VBqi?=kcݑ%BnKtɦ}X]Z2WA7#{ϹbWC;6TDDr5 HOP˘e#-ۺ!['"VPJƧv^0rY'-c$E4]F~1iQGdԀBՅ}m4uuG8o9$~B)> .>+al*}l(_Sֿ`P9?x4 M#aͅCilh,'ȢI՟Em)QySD=6^n@ ;B>1[edrυԦU*JOF/%VDI2?YSGwmV8} IJANPzhnvy~\<:- [-LsMGJo k{I0ΣDX@W w6Ω}L"w\JO$.Uw|1~ΊZL3{4w-t#u|ޤ(m#4> ^w9nDpN>)g{?aSx_l^FU-$u{u"Ws&4B\ҷq4#k$ʈʋ)s[L/=l|ZfuQMh j1TFCyca=IMBj2?nbKpr;qb̷MDނw=T֘2 +{=G{{F*rii+f?L׌ظZ)&b౼Wi(2x&d`IW*`+l>hek XG8fHiQ~)rxi7\'? B$e6XmQȨuEsWtJZ^JʰЖru@Qv)~mR{!I.9UǬ榑`\[$% lFJHntXiy,X 7h1֏,CmY^C= W-3TVInTCG®mzw,)P<h1 F0L(9#u_yL{ODDMZ^R^In^ y/ȝmZ^7#Ҍ aM *x0ŏz92g=ႱGUGb'}#s/€HR=,(*A 2&]}Q&Jϣ ժ)"UԾ>Բz'* PSDZtFچi:o{6Ho_A"*qɑkK't#η"D,A&4Vj'ҭXFQ!Č8lfsnZOvT!Ї -HP@ȍ?xdo8ޞ|n\8 7+6<ӯ;<=vw7$RlVC@ܼ}sL]%/峒Dy [8gF2.KNzzwp=r Efey6g+*̊/&hY2*N( #ŏOt4;lƶmxAL`]4V$t)SxZ`'gwۿ1۠1Lf6uŗ8K!NO@'&!4malnuҹ*W63 37)i yPbKTg +y̬8=EM42Rؾh9Y=_n{N?Av 'zF|34CoV6ަen#PAqOt/cBBJU/9Mߺ{=_`%A/w}~K}^gfMunepz0jqښ|NI5C jMA" xU2%be)I6>CU>L_QĔZ̑Iǽ#`~MrVϩwjo( \FшOn.Eǖc'K)L±Dž,1ӽVnHDfU&\YAwlG!4ip$z9Ӗ|4(K"hŬU]g0u?,W@O4$KdÜs*zv(4ų3JYΔ+3ԇm᭾ MY..` @W$m#ᕘ1ۨ*NrU]1N9Ff[-  3 |ihKUS{? /PX\1c R*ƺ:_/bm5h6,+˒%d1QHUĵ`VnP/gbH;ܸ&=[bjqezQ,?\ƶjwJ/'|gJω+:iEz#܀Qj('k^ԗVwM L8sl%BL&$t+q{Ylw#yѴ^&leޙo3;rnVHumpn7+h^L'0,y MR#y*>>Z( EKA@gyUInCBf}l i㤣xm_) 7$wpo8@ԘTGf20\MMorf*1`6Na;yBfA;J ГsTPPGi]7y[  S/JyB +CJj0q:FP!Y K_80;-Қ8cwОjtNUS"F詫zEM.V$FJDx)*(rgUokg+.~|ÄMѤkc~2gsˉѳ9o.{k{Y޸>-55zuos)VQX)D7E GE5 !.,1llY$aqqar]5eH@N ut='vo[B7|,'Vj%o Fv}W*Ѐ:Y ŸoUg ^`v͈ʓajZ솜=b(d^?U$˱lDE<}2JB%'O ۤ,Bs&slơ ~fX$'3%F p%.#|Jo ׁ~YhQ96sie夑FKAj KG8G8RIINK`J!*.nT\ a?g\2j*a-ANGjQ~HBZߵ]ijKdMhHn^:qT[QJsG0~:#lc% ?7fؚ֏6HפK 2U:f$r hh2?i Lvt\_7Ɖ"lWA4`:FUnQC!8(qZ4aZvM&WVAk(@11zҹ5'LUgP7g^$`2Iw;8{7i|'c30˗(<%C7dxxA "]iD,gXÑ^ C}h-?D*OBip$'F0] 2d_ j`,tA`kSVf?% cC>_LT(1{ߊy6Q7:$\GʿNַڴ N8>Rm/6 &SqǴ7^mQ/kŒBD~SL*Z3wßLBВ))TKK^$zdTr@9UioXc1119Ӆ!ҷ !ُXhݟl_.K$7'|6s މ%ŖWqK%$Д [ɜKeS#vtHlL#X~3pF\kNC[Da~!9N³iM;XW{?sXšY=nPb9!~(чΐg0,y0>aEE4T-ș.nƣVR#O-FҚ6+b>C }2ӧ 2W_`?CanWKik'0JϢHvLsfTA5VA7o^tfe[ & XB(xf=5"#8h>R{,?Ѫ>)O,lЋޯ΀7U*=ua_6}F\D+?Ol$'Hۗy+H<^Y𙞞SRȮk7 h,ܿ;T f `{LVgŚx 5u҆%a5i`KqU{7=ijϷI@_>ʷޒ2^NpGvsyOs$-,&6|@NAMk.rb .X5$b R#k2=5AM/:&uݖ^(TуsT/[ܿ[/$VCK_9xx lYի#{J/_8Q+%& ]NJw-")>e c^*#$_,-쫯˾V)chA˕\$)b"\<3 cLm 2/3*(1V]H3] fGSۡ^ZX y 7rUK:J܊yem7jȞd{1:6%G8* z Vi_#O X5<{H1%iOmSiOͰ[:@>^Xp@?<)11h k<kVB>DnWV]2gG F|˾7HJUPSHf5SL92?^ySvگjӾ1mEWMXa~W&'h#1gY$ISL !4Z:s nMX޸s2>R *Z&r 9$p#_(˅ѕ~*'uMدՐ%S61opMG ё`α'\YfRXvY[ڭ&!L! )=3nXAwΙVaBTdg/mt;K @ϛ ƀ1 a6):t-_~HV}2U^S9> 3<7x0: YZ