xen-devel-4.10.4_06-lp150.2.25.1<>,o]4/=„ari\81fL=^gK& ,E(.T*>!e&EtG'|lrZ&Pbk{|j0Vܶ2}vM:>`u4km=lɅ/qFpS:8@2TXJ\P&qů^tه n(E򱉊]9lT?lDd  # ] 7=D  T   + -0h3669h::]4lamb21AopenSUSE Leap 15.0openSUSEGPL-2.0http://bugs.opensuse.orgSystem/Kernelhttp://www.cl.cam.ac.uk/Research/SRG/netos/xen/linuxx86_64\?]m $gq i  S?8>8N<)5W f"1Mc38es (~p&8u8] 'Da>3 $Y4 ,Ykf ?y 65;&.6o0O}:-<IU'C Wsb8 `{>*!n4͌^"(,%BفA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤]]]]zs]zs]zs]zs]]zs]zs]zs]zs]]m]zs]m]]n]zs]m]zs]zs]m]zs]zs]zs]zs]zs]zs]zs]zs]zs]zs]zs]zs]zs]zs]zs]zs]n]]]]]zs]n]zs]zs]zs]zs]zs]zs]zs]zs]zs]zs]n]zs]zs]zs]zs]zs]zs]zs]zs]zs]zs]zs]zs]zs]zs]zs]zs]zs]zs]zs]zs]zs]zs]zs]]zs]zs]n]zs]zs]zs]zs]zs]zs]zs]zs]zs]zs]zs]zs]zs]zs]zs]n]zs]zs]zs]zs]zs]zs]zs]zs]]zs]u]zs]zs]zs]zs]zs]zs]u]u]}]]q]]r]]q]]p]]q]]p]]r],]] ]{]]u]]o]]o]]]']]]]]]]]]]]]]]]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.hxenstore-compat/xs_lib.hlibfsimage.so.1.0libxencall.so.1libxenctrl.so.4.10libxendevicemodel.so.1libxenevtchn.so.1libxenforeignmemory.so.1libxengnttab.so.1libxenguest.so.4.10libxenlight.so.4.10libxenstat.so.0libxenstore.so.3.0libxentoolcore.so.1libxentoollog.so.1libxenvchan.so.4.10libxlutil.so.4.10rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootxen-4.10.4_06-lp150.2.25.1.src.rpmpkgconfig(xencall)pkgconfig(xencontrol)pkgconfig(xendevicemodel)pkgconfig(xenevtchn)pkgconfig(xenforeignmemory)pkgconfig(xengnttab)pkgconfig(xenguest)pkgconfig(xenlight)pkgconfig(xenstat)pkgconfig(xenstore)pkgconfig(xentoolcore)pkgconfig(xentoollog)pkgconfig(xenvchan)pkgconfig(xlutil)xen-develxen-devel(x86-64)    /usr/bin/pkg-configlibuuid-develpkgconfig(xencall)pkgconfig(xencontrol)pkgconfig(xendevicemodel)pkgconfig(xenevtchn)pkgconfig(xenforeignmemory)pkgconfig(xengnttab)pkgconfig(xenguest)pkgconfig(xenlight)pkgconfig(xenstore)pkgconfig(xentoolcore)pkgconfig(xentoollog)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)xen-libs3.0.4-14.6.0-14.0-15.2-14.10.4_064.14.1]d@]@]@]]@]@]]#0@];]@]@]:\@\ޢ@\@\\\8\\\@\~d\w@\n\mA@\f\N\[k@[@[][t[[9@[qr[i[Y[6@[0@[0@['[!@Z@ZnZ@ZZ@ZmZԐ@ZZZ@ZZ}@Z}@Z}@Z}@Zz@Zz@Zo Zk@ZV@ZS]@ZOhZ:PZ1@Z.s@Z&@ZOZOZ Z Z Z@Z@Z }ZC@ZYYYY|Y@Y{Y*@Y5YA@Y4YYYbYY@Y3Y@YJYJY@YYV@Y@Ym@Yw2Yp@YlYh@Yh@YS@YJ_YI@Y5GY0Y-^Y(Y"YY;@YYY@YtY.X@XQ@X@XۡXg@X@XƉX@X @X@X@X@X@XXX@XXXwoXs{@XlXWXRXQ4@XEVX43@X.@X*X lX&X@XX@W@W֘W֘W^@WiW:Wt@W.@W9WW@Wk@Wi,@WbWZWZWZWYZ@WV@WEWBW=W;W3W1@W1@W,@W(W(W(W(W(W#LWVbV(@V3VJVxV'@VV2V͛@VŲ@V`VwVVV=@VV@VHV@VvV%@VV<@V@VS@VV@V^VwVqR@Vn@VXEVUVTQ@VMVMVMVA@V;DV9@V7P@V0V*!@V V@VCVVVf@VqV@UYU@U@UUݪ@U@UnU4@UUK@UU@UU>U@Ux&Un@U\w@U[%UUUPUKSU>$U6;U%@UU@UUU.@TgT-@TT@TZ@TZ@T@TT@T5T@TLTLT~@Tl@Ti@Ta@THT?@T=@carnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.dejfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.deohering@suse.derbrown@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comjfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.dejfehlig@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comohering@suse.dejfehlig@suse.comcarnold@suse.comjfehlig@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.commlatimer@suse.comcarnold@suse.comcyliu@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.derguenther@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comrguenther@suse.comcarnold@suse.commeissner@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.com- bsc#1155945 - VUL-0: CVE-2018-12207: xen: Machine Check Error Avoidance on Page Size Change (aka IFU issue) xsa304-1.patch xsa304-2.patch - bsc#1152497 - VUL-0: CVE-2019-11135: xen: XSA-305: TSX Asynchronous Abort (TAA) issue xsa305-1.patch xsa305-2.patch- bsc#1154461 - VUL-0: CVE-2019-18424: xen: XSA-302: passed through PCI devices may corrupt host memory after deassignment xsa302-0001-IOMMU-add-missing-HVM-check.patch xsa302-0002-passthrough-quarantine-PCI-devices.patch- bsc#1154458 - VUL-0: CVE-2019-18421: xen: XSA-299: Issues with restartable PV type change operations xsa299-0001-x86-mm-L1TF-checks-don-t-leave-a-partial-entry.patch xsa299-0002-x86-mm-Don-t-re-set-PGT_pinned-on-a-partially-de-val.patch xsa299-0003-x86-mm-Separate-out-partial_pte-tristate-into-indivi.patch xsa299-0004-x86-mm-Use-flags-for-_put_page_type-rather-than-a-bo.patch xsa299-0005-x86-mm-Rework-get_page_and_type_from_mfn-conditional.patch xsa299-0006-x86-mm-Have-alloc_l-23-_table-clear-partial_flags-wh.patch xsa299-0007-x86-mm-Always-retain-a-general-ref-on-partial.patch xsa299-0008-x86-mm-Collapse-PTF_partial_set-and-PTF_partial_gene.patch xsa299-0009-x86-mm-Properly-handle-linear-pagetable-promotion-fa.patch xsa299-0010-x86-mm-Fix-nested-de-validation-on-error.patch xsa299-0011-x86-mm-Don-t-drop-a-type-ref-unless-you-held-a-ref-t.patch- bsc#1154456 - VUL-0: CVE-2019-18425: xen: XSA-298: missing descriptor table limit checking in x86 PV emulation xsa298.patch- bsc#1154448 - VUL-0: CVE-2019-18420: xen: XSA-296: VCPUOP_initialise DoS xsa296.patch- bsc#1145240 - [Migration]Can't pre-allocate 1 shadow pages 5d70bfba-x86-shadow-dont-enable-with-too-small-allocation.patch - bsc#1137717 - [HPS Bug] Unable to install Windows Server 2016 with 2 CPUs setting (or above) under SLES12 SP4 Xen Server on AMD ROME platform 5d89d8d9-libxc-x86-avoid-overflow-in-CPUID-APIC-ID.patch - Upstream bug fixes (bsc#1027519) 5d419d49-x86-spec-ctrl-report-proper-status.patch 5d43253c-x86-ucode-always-collect_cpu_info-at-boot.patch 5d4aa36f-x86-apic-enable-x2APIC-mode-earlier.patch 5d4d850a-introduce-bss-percpu-page-aligned.patch 5d516531-x86-xpti-dont-leak-TSS-adjacent-data.patch 5d6524ca-x86-mm-correctly-init-M2P-entries.patch 5d67ceaf-x86-properly-gate-PKU-clearing.patch 5d779811-x86-fix-CPUID7-0-eax-levelling-MSR.patch 5d8b715f-ACPI-cpuidle-bump-max-num-of-states.patch 5d8ce179-sched-dont-leak-XEN_RUNSTATE_UPDATE.patch- bsc#1145774 - Libivrtd segfaults when trying to live migrate a VM Fix crash in an error path of libxl_domain_suspend with libxl.helper_done-crash.patch- Upstream bug fixes (bsc#1027519) 5d08f651-x86-AMD-correct-Fam17-checks.patch 5d08f68b-x86-AMD-limit-C1E-disable.patch 5d160571-x86-cpuid-restrict-OSXSAVE-leak.patch 5d1b395a-x86-MSI-fix-loop-termination.patch- Update to Xen 4.10.4 bug fix release (bsc#1027519) xen-4.10.4-testing-src.tar.bz2 - Drop the following patches contained in the new tarball 5bc4977d-1-XSM-remove-unnecessary-define.patch 5bc4977d-2-XSM-introduce-boot-param.patch 5bc4977d-3-XSM-SILO-mode.patch 5c7e6f86-gnttab-set-refcount-for-transfer-copy.patch 5c7e6fe8-IOMMU-x86-fix-type-ref-counting-race.patch 5c7e7008-x86-get-rid-of-bogus-page-states.patch 5c7e7020-x86-make-coherent-PV-IOMMU-discipline.patch 5c7e70c6-x86-mm-L2-unvalidation-preemptible.patch 5c7e70e2-x86-mm-L3-unvalidation-preemptible.patch 5c7e70ff-x86-mm-dont-retain-page-typeref-on-IOMMU-fail.patch 5c7e711c-x86-mm-properly-flush-TLB-in-switch_cr3_cr4.patch 5c7e714c-x86-pv-rewrite-guest-cr4-handling.patch 5c7e716d-x86-pv-restrict-cr4-fsgsbase.patch 5c7e7192-x86-pv-toggle_guest_pt-TLB-flush-for-shadow.patch 5c7e9d9c-x86-mm-fix-GP-0-in-switch_cr3_cr4.patch 5c87b644-IOMMU-leave-enabled-for-kexec-crash.patch 5c87b6a2-x86-HVM-dont-crash-guest-in-find_mmio_cache.patch 5c87b6c8-drop-arch_evtchn_inject.patch 5c87b6e8-avoid-atomic-rmw-accesses-in-map_vcpu_info.patch 5c87e6d1-x86-TSX-controls-for-RTM-force-abort-mode.patch x86-cmdline-parse-fix.patch 5c8f752c-x86-e820-build-with-gcc9.patch 5c8fc6c0-x86-MSR-shorten-ARCH_CAPABILITIES.patch 5c8fc6c0-x86-SC-retpoline-safety-calculations-for-eIBRS.patch 5c9e63c5-credit2-SMT-idle-handling.patch 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch 5cd921fb-trace-fix-build-with-gcc9.patch 5cd9224b-AMD-IOMMU-disable-upon-init-fail.patch 5cd922c5-x86-MTRR-recalc-p2mt-when-iocaps.patch 5cd9230f-VMX-correctly-get-GS_SHADOW-for-current.patch 5cd926d0-bitmap_fill-zero-sized.patch 5cd92724-drivers-video-drop-constraints.patch 5cd93a69-x86-spec-ctrl-reposition-XPTI-parsing.patch 5cd93a69-x86-MSR_INTEL_CORE_THREAD_COUNT.patch 5cd93a69-x86-boot-detect-Intel-SMT-correctly.patch 5cd981ff-x86-IRQ-tracing-avoid-UB-or-worse.patch 5cdad090-x86-spec-ctrl-misc-non-functional-cleanup.patch 5cdad090-x86-spec-ctrl-CPUID-MSR-definitions-for-MDS.patch 5cdad090-x86-spec-ctrl-infrastructure-for-VERW-flush.patch 5cdad090-x86-spec-ctrl-opts-to-control-VERW-flush.patch 5cdeb9fd-sched-fix-csched2_deinit_pdata.patch 5ce7a92f-x86-IO-APIC-fix-build-with-gcc9.patch 5d03a0c4-1-Arm-add-an-isb-before-reading-CNTPCT_EL0.patch 5d03a0c4-2-gnttab-rework-prototype-of-set_status.patch 5d03a0c4-3-Arm64-rewrite-bitops-in-C.patch 5d03a0c4-4-Arm32-rewrite-bitops-in-C.patch 5d03a0c4-5-Arm-bitops-consolidate-prototypes.patch 5d03a0c4-6-Arm64-cmpxchg-simplify.patch 5d03a0c4-7-Arm32-cmpxchg-simplify.patch 5d03a0c4-8-Arm-bitops-helpers-with-timeout.patch 5d03a0c4-9-Arm-cmpxchg-helper-with-timeout.patch 5d03a0c4-A-Arm-turn-on-SILO-mode-by-default.patch 5d03a0c4-B-bitops-guest-helpers.patch 5d03a0c4-C-cmpxchg-guest-helper.patch 5d03a0c4-D-use-guest-atomics-helpers.patch 5d03a0c4-E-Arm-add-perf-counters-in-guest-atomic-helpers.patch 5d03a0c4-F-Arm-protect-gnttab_clear_flag.patch XSM-fix-Kconfig-names.patch- bsc#1138294 - VUL-0: CVE-2019-17349: XSA-295: Unlimited Arm Atomics Operations 5d03a0c4-1-Arm-add-an-isb-before-reading-CNTPCT_EL0.patch 5d03a0c4-2-gnttab-rework-prototype-of-set_status.patch 5d03a0c4-3-Arm64-rewrite-bitops-in-C.patch 5d03a0c4-4-Arm32-rewrite-bitops-in-C.patch 5d03a0c4-5-Arm-bitops-consolidate-prototypes.patch 5d03a0c4-6-Arm64-cmpxchg-simplify.patch 5d03a0c4-7-Arm32-cmpxchg-simplify.patch 5d03a0c4-8-Arm-bitops-helpers-with-timeout.patch 5d03a0c4-9-Arm-cmpxchg-helper-with-timeout.patch 5d03a0c4-A-Arm-turn-on-SILO-mode-by-default.patch 5d03a0c4-B-bitops-guest-helpers.patch 5d03a0c4-C-cmpxchg-guest-helper.patch 5d03a0c4-D-use-guest-atomics-helpers.patch 5d03a0c4-E-Arm-add-perf-counters-in-guest-atomic-helpers.patch 5d03a0c4-F-Arm-protect-gnttab_clear_flag.patch - Upstream bug fixes (bsc#1027519) 5bc4977d-1-XSM-remove-unnecessary-define.patch 5bc4977d-2-XSM-introduce-boot-param.patch 5bc4977d-3-XSM-SILO-mode.patch 5c87b6c8-drop-arch_evtchn_inject.patch 5c87b6e8-avoid-atomic-rmw-accesses-in-map_vcpu_info.patch 5cd921fb-trace-fix-build-with-gcc9.patch 5cd9224b-AMD-IOMMU-disable-upon-init-fail.patch 5cd922c5-x86-MTRR-recalc-p2mt-when-iocaps.patch 5cd9230f-VMX-correctly-get-GS_SHADOW-for-current.patch 5cd926d0-bitmap_fill-zero-sized.patch 5cd92724-drivers-video-drop-constraints.patch 5cd93a69-x86-spec-ctrl-reposition-XPTI-parsing.patch (Replaces xsa297-0a.patch) 5cd93a69-x86-MSR_INTEL_CORE_THREAD_COUNT.patch (Replaces xsa297-0b.patch) 5cd93a69-x86-boot-detect-Intel-SMT-correctly.patch (Replaces xsa297-0c.patch) 5cdad090-x86-spec-ctrl-misc-non-functional-cleanup.patch (Replaces xsa297-0d.patch) 5cdad090-x86-spec-ctrl-CPUID-MSR-definitions-for-MDS.patch (Replaces xsa297-1.patch) 5cdad090-x86-spec-ctrl-infrastructure-for-VERW-flush.patch (Replaces xsa297-2.patch) 5cdad090-x86-spec-ctrl-opts-to-control-VERW-flush.patch (Replaces xsa297-3.patch) 5cd981ff-x86-IRQ-tracing-avoid-UB-or-worse.patch 5cdeb9fd-sched-fix-csched2_deinit_pdata.patch 5ce7a92f-x86-IO-APIC-fix-build-with-gcc9.patch 5cf0f6a4-x86-vhpet-resume-avoid-small-diff.patch 5cf16e51-x86-spec-ctrl-Knights-retpoline-safe.patch XSM-fix-Kconfig-names.patch- bsc#1138563 - L3: xenpvnetboot improperly ported to Python 3 fix-xenpvnetboot.patch- bsc#1129642 - L3: xen domU loses attached pci device after reboot (since dom0 upgrade to sle12sp4) 5ba5188c-libxl-keep-assigned-pci-devices-across-domain-reboots.patch- bsc#1133818 - retry XEN_DOMCTL_getpageframeinfo3 accessing the list of pages may lead to a temporary EFAULT backport a mainline patch to retry the domctl, which may fix live migration on the sending side libxc.do_domctl.EFAULT-retry.patch- bsc#1131811 - [XEN] internal error: libxenlight failed to create new domain. This patch is a workaround for a systemd issue. See patch header for additional comments. xenstore-launch.patch- bsc#1079730, bsc#1098403, bsc#1111025 - live migrating PV domUs simplify and fix the required change. The previous variant broke PV with device-model libxl.pv-qemu-migration.patch- bsc#1120095 - add code to change LIBXL_HOTPLUG_TIMEOUT at runtime The included README has details about the impact of this change libxl.LIBXL_HOTPLUG_TIMEOUT.patch- bsc#1111331 - VUL-0: CPU issues Q2 2019 aka "Group 4" CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 xsa297-0a.patch xsa297-0b.patch xsa297-0c.patch xsa297-0d.patch xsa297-1.patch xsa297-2.patch xsa297-3.patch - Upstream bug fixes (bsc#1027519) 5c7e6f86-gnttab-set-refcount-for-transfer-copy.patch Replaces xsa284.patch 5c7e6fe8-IOMMU-x86-fix-type-ref-counting-race.patch Replaces xsa285.patch 5c7e7008-x86-get-rid-of-bogus-page-states.patch Replaces xsa287.patch 5c7e7020-x86-make-coherent-PV-IOMMU-discipline.patch Replaces xsa288.patch 5c7e70c6-x86-mm-L2-unvalidation-preemptible.patch Replaces xsa290-1.patch 5c7e70e2-x86-mm-L3-unvalidation-preemptible.patch Replaces xsa290-2.patch 5c7e70ff-x86-mm-dont-retain-page-typeref-on-IOMMU-fail.patch Replaces xsa291.patch 5c7e711c-x86-mm-properly-flush-TLB-in-switch_cr3_cr4.patch Replaces xsa292.patch 5c7e714c-x86-pv-rewrite-guest-cr4-handling.patch Replaces xsa293-1.patch 5c7e716d-x86-pv-restrict-cr4-fsgsbase.patch Replaces xsa293-2.patch 5c7e7192-x86-pv-toggle_guest_pt-TLB-flush-for-shadow.patch Replaces xsa294.patch 5c7e9d9c-x86-mm-fix-GP-0-in-switch_cr3_cr4.patch 5c87b644-IOMMU-leave-enabled-for-kexec-crash.patch 5c87b6a2-x86-HVM-dont-crash-guest-in-find_mmio_cache.patch 5c87e6d1-x86-TSX-controls-for-RTM-force-abort-mode.patch x86-cmdline-parse-fix.patch 5c8f752c-x86-e820-build-with-gcc9.patch 5c8fb92d-x86-HVM-split-linear-reads-and-writes.patch 5c8fb951-x86-HVM-finish-IOREQs-correctly-on-completion.patch 5c8fc6c0-x86-MSR-shorten-ARCH_CAPABILITIES.patch 5c8fc6c0-x86-SC-retpoline-safety-calculations-for-eIBRS.patch 5c9e63c5-credit2-SMT-idle-handling.patch 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch- bsc#1079730, bsc#1098403, bsc#1111025 - live migrating PV domUs An earlier change broke live migration of PV domUs without a device model. The migration would stall for 10 seconds while the domU was paused, which caused network connections to drop. Fix this by tracking the need for a device model within libxl. add libxl.pv-qemu-migration.patch remove xen.bug1079730.patch- bsc#1026236 - add Xen cmdline option "suse_vtsc_tolerance" to avoid TSC emulation for HVM domUs if their expected frequency does not match exactly the frequency of the receiving host xen.bug1026236.suse_vtsc_tolerance.patch- bsc#1126325 - fix crash in libxl in error path Setup of grant_tables and other variables may fail libxl.prepare-environment-for-domcreate_stream_done.patch- bsc#1127620 - Documentation for the xl configuration file allows for firmware=pvgrub64 but we don't ship pvgrub64. Create a link from grub.xen to pvgrub64 xen.spec- Upstream bug fixes (bsc#1027519) 5c6d7b01-x86-pmtimer-fix-hvm_acpi_sleep_button.patch 5c6d7b35-x86-shadow-dont-pass-wrong-L4-MFN.patch 5c75615a-viridian-fix-HvFlushVirtualAddress.patch 5c7561aa-x86-shadow-dont-use-map_domain_page_global.patch 5c77c30b-x86-hvm-increase-triple-fault-log-level.patch 5c77e5c8-x86-nmi-correctly-check-MSB-of-P6-perf-counter.patch- bsc#1127400 - VUL-0: CVE-2019-17348: xen: XSA-294: x86 shadow: Insufficient TLB flushing when using PCID xsa294.patch- bsc#1126192 - VUL-0: CVE-2019-17342: xen: XSA-287: x86: steal_page violates page_struct access discipline xsa287.patch - bsc#1126195 - VUL-0: CVE-2019-17343: xen: XSA-288: x86: Inconsistent PV IOMMU discipline xsa288.patch - bsc#1126196 - VUL-0: CVE-2019-17344: xen: XSA-290: missing preemption in x86 PV page table unvalidation xsa290-1.patch xsa290-2.patch - bsc#1126197 - VUL-0: CVE-2019-17345: xen: XSA-291: x86/PV: page type reference counting issue with failed IOMMU update xsa291.patch - bsc#1126198 - VUL-0: CVE-2019-17346: xen: XSA-292: x86: insufficient TLB flushing when using PCID xsa292.patch - bsc#1126201 - VUL-0: CVE-2019-17347: xen: XSA-293: x86: PV kernel context switch corruption xsa293-1.patch xsa293-2.patch- bsc#1126140 - VUL-0: CVE-2019-17340: xen: XSA-284: grant table transfer issues on large hosts xsa284.patch - bsc#1126141 - VUL-0: CVE-2019-17341: xen: XSA-285: race with pass-through device hotplug xsa285.patch- Update to Xen 4.10.3 bug fix release (bsc#1027519) xen-4.10.3-testing-src.tar.bz2 - bsc#1114988 - VUL-0: CVE-2018-19967: xen: guest use of HLE constructs may lock up host (XSA-282) Fix included in tarball - bsc#1120067 - Libvirt segfault when crash triggered on top of HVM guest Fix included in tarball - Drop the following patches contained in the new tarball 5ae31917-x86-cpuidle-init-stats-lock-once.patch 5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch 5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch 5bacae4b-x86-boot-allocate-extra-module-slot.patch 5bae44ce-x86-silence-false-log-messages.patch 5bb60c12-x86-split-opt_xpti.patch 5bb60c4f-x86-split-opt_pv_l1tf.patch 5bb60c74-x86-fix-xpti-and-pv-l1tf.patch 5bcf0722-x86-boot-enable-NMIs.patch 5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch 5bd076e9-x86-boot-init-debug-regs-correctly.patch 5bd076e9-x86-init-vcpu-debug-regs-correctly.patch 5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch 5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch 5bdc31d5-VMX-fix-vmx_handle_eoi.patch 5be2a308-x86-extend-get_platform_badpages.patch 5be2a354-x86-work-around-HLE-host-lockup-erratum.patch 5be9634c-x86-dom0-avoid-using-1G-superpages.patch 5bed93e1-x86-hvm_copy-no-write-to-p2m_ioreq_server.patch 5bf4118c-amd-iommu-fix-flush-checks.patch 5bf41242-AMD-IOMMU-suppress-late-PTE-merging.patch 5bf41311-x86-dont-flush-after-L1e-update-failure.patch 5bf41331-x86-shadow-move-OOS-flag-bits.patch 5bf4135a-x86-shrink-page_info-shadow_flags.patch 5c011aaf-x86-dont-enable-shadow-with-too-small-allocation.patch 5c17ce93-x86-hvm-correct-RDTSCP-intercept-handling.patch 5c18f5ad-x86emul-fix-3-operand-IMUL.patch 5c190203-x86emul-work-around-SandyBridge-errata.patch 5c3608fa-fix-MEMF_no_dma-allocations-for-single-NUMA.patch 5c3dd8fa-cmdline-fix-strncmp-LITERAL-construct.patch- Upstream bug fixes (bsc#1027519) 5c17ce93-x86-hvm-correct-RDTSCP-intercept-handling.patch 5c18f5ad-x86emul-fix-3-operand-IMUL.patch 5c190203-x86emul-work-around-SandyBridge-errata.patch 5c3608fa-fix-MEMF_no_dma-allocations-for-single-NUMA.patch 5c3dd8fa-cmdline-fix-strncmp-LITERAL-construct.patch- Upstream bug fixes (bsc#1027519) 5be9634c-x86-dom0-avoid-using-1G-superpages.patch 5bed93e1-x86-hvm_copy-no-write-to-p2m_ioreq_server.patch 5bf4118c-amd-iommu-fix-flush-checks.patch replaces xsa275-1.patch 5bf41242-AMD-IOMMU-suppress-late-PTE-merging.patch replaces xsa275-2.patch 5bf41311-x86-dont-flush-after-L1e-update-failure.patch replaces xsa279.patch 5bf41331-x86-shadow-move-OOS-flag-bits.patch replaces xsa280-1.patch 5bf4135a-x86-shrink-page_info-shadow_flags.patch replaces xsa280-2.patch 5c011aaf-x86-dont-enable-shadow-with-too-small-allocation.patch 5c0f786c-parse_size_and_unit-percent.patch 5c0f7894-x86-dom0_mem-variants.patch- bsc#1115040 - VUL-0: xen: insufficient TLB flushing / improper large page mappings with AMD IOMMUs (XSA-275) xsa275-1.patch xsa275-2.patch - bsc#1115045 - VUL-0: xen: x86: DoS from attempting to use INVPCID with a non-canonical addresses (XSA-279) xsa279.patch - bsc#1115047 - VUL-0: xen: Fix for XSA-240 conflicts with shadow paging (XSA-280) xsa280-1.patch xsa280-2.patch - bsc#1108940 - L3: XEN SLE12-SP1 domU hang on SLE12-SP3 HV 5bdc31d5-VMX-fix-vmx_handle_eoi.patch - bsc#1105528 - L3: xpti=no-dom0 not working as expected 5bb60c12-x86-split-opt_xpti.patch 5bb60c4f-x86-split-opt_pv_l1tf.patch 5bb60c74-x86-fix-xpti-and-pv-l1tf.patch - Upstream bug fixes (bsc#1027519) 5bae44ce-x86-silence-false-log-messages.patch 5bcf0722-x86-boot-enable-NMIs.patch 5bd076e9-x86-boot-init-debug-regs-correctly.patch 5bd076e9-x86-init-vcpu-debug-regs-correctly.patch 5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch 5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch 5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch 5be2a308-x86-extend-get_platform_badpages.patch 5be2a354-x86-work-around-HLE-host-lockup-erratum.patch- bsc#1114405 - VUL-0: CVE-2018-18883: xen: Nested VT-x usable even when disabled (XSA-278) 5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch- Upstream bug fixes (bsc#1027519) 5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch 5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch 5bacae4b-x86-boot-allocate-extra-module-slot.patch- Update to Xen 4.10.2 bug fix release (bsc#1027519) xen-4.10.2-testing-src.tar.bz2 - Drop the following patches contained in the new tarball 5a6703cb-x86-move-invocations-of-hvm_flush_guest_tlbs.patch 5a957d0e-gnttab-introduce-cmdline-feature-controls.patch 5a9985bd-x86-invpcid-support.patch 5ad4923e-x86-correct-S3-resume-ordering.patch 5ad49293-x86-suppress-BTI-mitigations-around-S3.patch 5ad600d4-x86-pv-introduce-x86emul_read_dr.patch 5ad600d4-x86-pv-introduce-x86emul_write_dr.patch 5ad8c3a7-x86-spec_ctrl-update-retpoline-decision-making.patch 5adda097-x86-HPET-fix-race-triggering-ASSERT.patch 5adda0d5-x86-HVM-never-retain-emulated-insn-cache.patch 5adde9ed-xpti-fix-double-fault-handling.patch 5ae06fad-SVM-fix-intercepts-for-SYS-CALL-ENTER-MSRs.patch 5aeaeae4-introduce-vcpu_sleep_nosync_locked.patch 5aeaeaf0-sched-fix-races-in-vcpu-migration.patch 5aeb2c57-x86-retval-checks-of-set-guest-trapbounce.patch 5af03009-x86-pv-hide-more-EFER-bits-from-PV.patch 5af1daa9-1-x86-traps-fix-dr6-handing-in-DB-handler.patch 5af1daa9-2-x86-pv-move-exception-injection-into-test_all_events.patch 5af1daa9-3-x86-traps-use-IST-for-DB.patch 5af1daa9-4-x86-traps-fix-handling-of-DB-in-hypervisor-context.patch 5af1daa9-x86-vpt-support-IO-APIC-routed-intr.patch 5af1daa9-x86-HVM-guard-against-bogus-emulator-ioreq-state.patch 5af97999-viridian-cpuid-leaf-40000003.patch 5afc13ae-1-x86-read-MSR_ARCH_CAPABILITIES-once.patch 5afc13ae-2-x86-express-Xen-SPEC_CTRL-choice-as-variable.patch 5afc13ae-3-x86-merge-bti_ist_info-use_shadow_spec_ctrl.patch 5afc13ae-4-x86-fold-XEN_IBRS-ALTERNATIVES.patch 5afc13ae-5-x86-rename-bits-of-spec_ctrl-infrastructure.patch 5afc13ae-6-x86-elide-MSR_SPEC_CTRL-handling-in-idle.patch 5afc13ae-7-x86-split-X86_FEATURE_SC_MSR.patch 5afc13ae-8-x86-explicitly-set-Xen-default-SPEC_CTRL.patch 5afc13ae-9-x86-cpuid-improve-guest-policies-for-speculative.patch 5afc13ae-A-x86-introduce-spec-ctrl-cmdline-opt.patch 5aec7393-1-x86-xpti-avoid-copy.patch 5aec7393-2-x86-xpti-write-cr3.patch 5aec744a-3-x86-xpti-per-domain-flag.patch 5aec744a-4-x86-xpti-use-invpcid.patch 5aec744a-5-x86-xpti-no-global-pages.patch 5aec744a-6-x86-xpti-cr3-valid-flag.patch 5aec744a-7-x86-xpti-pv_guest_cr4_to_real_cr4.patch 5aec744b-8-x86-xpti-cr3-helpers.patch 5aec74a8-9-x86-xpti-use-pcid.patch 5b02c786-x86-AMD-mitigations-for-GPZ-SP4.patch 5b02c786-x86-Intel-mitigations-for-GPZ-SP4.patch 5b02c786-x86-msr-virtualise-SPEC_CTRL-SSBD.patch 5b0bc9da-x86-XPTI-fix-S3-resume.patch 5b0d2286-libxc-x86-PV-dont-hand-through-CPUID-leaf-0x80000008.patch 5b0d2dbc-x86-correct-default_xen_spec_ctrl.patch 5b0d2ddc-x86-CPUID-dont-override-tool-stack-hidden-STIBP.patch 5b150ef9-x86-fix-error-handling-of-pv-dr7-shadow.patch 5b21825d-1-x86-support-fully-eager-FPU-context-switching.patch 5b21825d-2-x86-spec-ctrl-mitigations-for-LazyFPU.patch 5b238b92-x86-HVM-account-for-fully-eager-FPU.patch 5b2b7172-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b31e004-x86-HVM-emul-attempts-FPU-set-fpu_initialised.patch 5b323e3c-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b34882d-x86-mm-dont-bypass-preemption-checks.patch 5b348874-x86-refine-checks-in-DB-handler.patch 5b348897-libxl-qemu_disk_scsi_drive_string-break-out-common.patch 5b3488a2-libxl-restore-passing-ro-to-qemu-for-SCSI-disks.patch 5b34891a-x86-HVM-dont-cause-NM-to-be-raised.patch 5b348954-x86-guard-against-NM.patch 5b3f8fa5-port-array_index_nospec-from-Linux.patch 5b4488e7-x86-spec-ctrl-cmdline-handling.patch 5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch 5b4c9a60-allow-cpu_down-to-be-called-earlier.patch 5b4db308-SVM-fix-cleanup-svm_inject_event.patch 5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch 5b5040f2-x86-AMD-distinguish-CU-from-HT.patch 5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch 5b508775-2-x86-possibly-bring-up-all-CPUs.patch 5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch 5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch 5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch 5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch 5b56feb1-x86-hvm-disallow-unknown-EFER-bits.patch 5b56feb2-x86-XPTI-parsing-on-fixed-Intel-HW.patch 5b62ca93-VMX-avoid-hitting-BUG_ON.patch 5b6d84ac-x86-fix-improve-vlapic-read-write.patch 5b6d8ce2-x86-XPTI-parsing.patch 5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch 5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch 5b3cab8e-2-VMX-improve-MSR-load-save-API.patch 5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch 5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch 5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch 5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch 5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch 5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch 5b505fe5-VMX-fix-find-msr-build.patch 5b72fbbe-ARM-disable-grant-table-v2.patch 5b72fbbe-oxenstored-eval-order.patch 5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch 5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch 5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch 5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch 5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch 5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch 5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch 5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch 5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch 5b72fbbf-9-spec-ctrl=no-global-disable.patch 5b72fbbf-A-xl-conf-add-global-affinity-masks.patch 5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch 5b75afef-x86-setup-avoid-OoB-E820-lookup.patch 5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch 5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch 5b8d5832-x86-assorted-array_index_nospec-insertions.patch- bsc#1094508 - L3: Kernel oops in fs/dcache.c called by d_materialise_unique() 5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch 5b9784d2-x86-HVM-add-known_gla-helper.patch 5b9784f2-x86-HVM-split-page-straddling-accesses.patch - bsc#1103279 - (CVE-2018-15470) VUL-0: CVE-2018-15470: xen: oxenstored does not apply quota-maxentity (XSA-272) 5b72fbbe-oxenstored-eval-order.patch - bsc#1103275 - (CVE-2018-15469) VUL-0: CVE-2018-15469: xen: Use of v2 grant tables may cause crash on ARM (XSA-268) 5b72fbbe-ARM-disable-grant-table-v2.patch - bsc#1103276 - VUL-0: CVE-2018-15468: xen: x86: Incorrect MSR_DEBUGCTL handling lets guests enable BTS (XSA-269) 5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch (Replaces xsa269.patch) - bsc#1091107 - VUL-0: CVE-2018-3646: xen: L1 Terminal Fault -VMM (XSA-273) 5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch (Replaces xsa273-1.patch) 5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch (Replaces xsa273-2.patch) 5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch (Replaces xsa273-3.patch) 5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch (Replaces xsa273-4.patch) 5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch (Replaces xsa273-5.patch) 5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch (Replaces xsa273-6.patch) 5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch (Replaces xsa273-7.patch) 5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch (Replaces xsa273-8.patch) 5b72fbbf-9-spec-ctrl=no-global-disable.patch 5b72fbbf-A-xl-conf-add-global-affinity-masks.patch - Upstream patches from Jan (bsc#1027519) 5a957d0e-gnttab-introduce-cmdline-feature-controls.patch 5b6d84ac-x86-fix-improve-vlapic-read-write.patch 5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch 5b75afef-x86-setup-avoid-OoB-E820-lookup.patch 5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch 5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch 5b8d5832-x86-assorted-array_index_nospec-insertions.patch- bsc#1078292 - rpmbuild -ba SPECS/xen.spec with xen-4.9.1 failed xen.spec- bsc#1091107 - VUL-0: CVE-2018-3646: xen: L1 Terminal Fault -VMM (XSA-273) xsa273-1.patch xsa273-2.patch xsa273-3.patch xsa273-4.patch xsa273-5.patch xsa273-6.patch xsa273-7.patch xsa273-8.patch - Upstream prereq patches for XSA-273 (bsc#1027519) 5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch 5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch 5b3cab8e-2-VMX-improve-MSR-load-save-API.patch 5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch 5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch 5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch 5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch 5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch 5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch 5b505fe5-VMX-fix-find-msr-build.patch 5b62ca93-VMX-avoid-hitting-BUG_ON.patch 5b6d8ce2-x86-XPTI-parsing.patch- bsc#1103276 - VUL-0: CVE-2018-15468: xen: x86: Incorrect MSR_DEBUGCTL handling lets guests enable BTS (XSA-269) xsa269.patch- Upstream patches from Jan (bsc#1027519) 5af03009-x86-pv-hide-more-EFER-bits-from-PV.patch 5b3f8fa5-port-array_index_nospec-from-Linux.patch 5b4488e7-x86-spec-ctrl-cmdline-handling.patch 5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch 5b4c9a60-allow-cpu_down-to-be-called-earlier.patch 5b4db308-SVM-fix-cleanup-svm_inject_event.patch 5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch 5b5040f2-x86-AMD-distinguish-CU-from-HT.patch 5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch 5b508775-2-x86-possibly-bring-up-all-CPUs.patch 5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch 5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch 5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch 5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch 5b56feb1-x86-hvm-disallow-unknown-EFER-bits.patch 5b56feb2-x86-XPTI-parsing-on-fixed-Intel-HW.patch- Upstream patches from Jan (bsc#1027519) 5b02c786-x86-AMD-mitigations-for-GPZ-SP4.patch (Replaces Spectre-v4-1.patch) 5b02c786-x86-Intel-mitigations-for-GPZ-SP4.patch (Replaces Spectre-v4-2.patch) 5b02c786-x86-msr-virtualise-SPEC_CTRL-SSBD.patch (Replaces Spectre-v4-3.patch) 5b0bc9da-x86-XPTI-fix-S3-resume.patch 5b0d2286-libxc-x86-PV-dont-hand-through-CPUID-leaf-0x80000008.patch 5b0d2d91-x86-suppress-sync-when-XPTI-off.patch 5b0d2dbc-x86-correct-default_xen_spec_ctrl.patch 5b0d2ddc-x86-CPUID-dont-override-tool-stack-hidden-STIBP.patch 5b150ef9-x86-fix-error-handling-of-pv-dr7-shadow.patch 5b21825d-1-x86-support-fully-eager-FPU-context-switching.patch (Replaces xsa267-1.patch) 5b21825d-2-x86-spec-ctrl-mitigations-for-LazyFPU.patch (Replaces xsa267-2.patch) 5b238b92-x86-HVM-account-for-fully-eager-FPU.patch 5b2b7172-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b31e004-x86-HVM-emul-attempts-FPU-set-fpu_initialised.patch 5b323e3c-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b34882d-x86-mm-dont-bypass-preemption-checks.patch (Replaces xsa264.patch) 5b348874-x86-refine-checks-in-DB-handler.patch (Replaces xsa265.patch) 5b348897-libxl-qemu_disk_scsi_drive_string-break-out-common.patch (Replaces xsa266-1-<>.patch) 5b3488a2-libxl-restore-passing-ro-to-qemu-for-SCSI-disks.patch (Replaces xsa266-2-<>.patch) 5b34891a-x86-HVM-dont-cause-NM-to-be-raised.patch 5b348954-x86-guard-against-NM.patch- Fix more build gcc8 related failures with xen.fuzz-_FORTIFY_SOURCE.patch- bsc#1098403 - fix regression introduced by changes for bsc#1079730 a PV domU without qcow2 and/or vfb has no qemu attached. Ignore QMP errors for PV domUs to handle PV domUs with and without an attached qemu-xen. xen.bug1079730.patch- bsc#1097521 - VUL-0: CVE-2018-12891: xen: preemption checks bypassed in x86 PV MM handling (XSA-264) xsa264.patch - bsc#1097522 - VUL-0: CVE-2018-12893: xen: x86: #DB exception safety check can be triggered by a guest (XSA-265) xsa265.patch - bsc#1097523 - VUL-0: CVE-2018-12892: xen: libxl fails to honour readonly flag on HVM emulated SCSI disks (XSA-266) xsa266-1-libxl-qemu_disk_scsi_drive_string-Break-out-common-p.patch xsa266-2-libxl-restore-passing-readonly-to-qemu-for-SCSI-disk.patch- bsc#1095242 - VUL-0: CVE-2018-3665: xen: Lazy FP Save/Restore (XSA-267) xsa267-1.patch xsa267-2.patch- bsc#1092631 - VUL-0: CVE-2018-3639: xen: V4 – Speculative Store Bypass aka "Memory Disambiguation" (XSA-263) 5ad4923e-x86-correct-S3-resume-ordering.patch 5ad49293-x86-suppress-BTI-mitigations-around-S3.patch 5afc13ae-1-x86-read-MSR_ARCH_CAPABILITIES-once.patch 5afc13ae-2-x86-express-Xen-SPEC_CTRL-choice-as-variable.patch 5afc13ae-3-x86-merge-bti_ist_info-use_shadow_spec_ctrl.patch 5afc13ae-4-x86-fold-XEN_IBRS-ALTERNATIVES.patch 5afc13ae-5-x86-rename-bits-of-spec_ctrl-infrastructure.patch 5afc13ae-6-x86-elide-MSR_SPEC_CTRL-handling-in-idle.patch 5afc13ae-7-x86-split-X86_FEATURE_SC_MSR.patch 5afc13ae-8-x86-explicitly-set-Xen-default-SPEC_CTRL.patch 5afc13ae-9-x86-cpuid-improve-guest-policies-for-speculative.patch 5afc13ae-A-x86-introduce-spec-ctrl-cmdline-opt.patch Spectre-v4-1.patch Spectre-v4-2.patch Spectre-v4-3.patch- Always call qemus xen-save-devices-state in suspend/resume to fix migration with qcow2 images (bsc#1079730) libxl.Add-a-version-check-of-QEMU-for-QMP-commands.patch libxl.qmp-Tell-QEMU-about-live-migration-or-snapshot.patch xen.bug1079730.patch- bsc#1087289 - L3: Xen BUG at sched_credit.c:1663 5aeaeae4-introduce-vcpu_sleep_nosync_locked.patch 5aeaeaf0-sched-fix-races-in-vcpu-migration.patch - Upstream patches from Jan (bsc#1027519) 5ad600d4-x86-pv-introduce-x86emul_read_dr.patch 5ad600d4-x86-pv-introduce-x86emul_write_dr.patch 5ad8c3a7-x86-spec_ctrl-update-retpoline-decision-making.patch 5adda097-x86-HPET-fix-race-triggering-ASSERT.patch 5adda0d5-x86-HVM-never-retain-emulated-insn-cache.patch 5ae06fad-SVM-fix-intercepts-for-SYS-CALL-ENTER-MSRs.patch 5ae31917-x86-cpuidle-init-stats-lock-once.patch 5aeb2c57-x86-retval-checks-of-set-guest-trapbounce.patch 5af1daa9-1-x86-traps-fix-dr6-handing-in-DB-handler.patch (Replaces xsa260-1.patch) 5af1daa9-2-x86-pv-move-exception-injection-into-test_all_events.patch (Replaces xsa260-2.patch) 5af1daa9-3-x86-traps-use-IST-for-DB.patch (Replaces xsa260-3.patch) 5af1daa9-4-x86-traps-fix-handling-of-DB-in-hypervisor-context.patch (Replaces xsa260-4.patch) 5af1daa9-x86-HVM-guard-against-bogus-emulator-ioreq-state.patch (Replaces xsa262.patch) 5af1daa9-x86-vpt-support-IO-APIC-routed-intr.patch (Replaces xsa261.patch) 5af97999-viridian-cpuid-leaf-40000003.patch- Fixes related to Page Table Isolation (XPTI). bsc#1074562 XSA-254 5a6703cb-x86-move-invocations-of-hvm_flush_guest_tlbs.patch 5a9985bd-x86-invpcid-support.patch 5adde9ed-xpti-fix-double-fault-handling.patch 5aec7393-1-x86-xpti-avoid-copy.patch 5aec7393-2-x86-xpti-write-cr3.patch 5aec744a-3-x86-xpti-per-domain-flag.patch 5aec744a-4-x86-xpti-use-invpcid.patch 5aec744a-5-x86-xpti-no-global-pages.patch 5aec744a-6-x86-xpti-cr3-valid-flag.patch 5aec744a-7-x86-xpti-pv_guest_cr4_to_real_cr4.patch 5aec744b-8-x86-xpti-cr3-helpers.patch 5aec74a8-9-x86-xpti-use-pcid.patch- Update to Xen 4.10.1 bug fix release (bsc#1027519) xen-4.10.1-testing-src.tar.bz2 disable-building-pv-shim.patch - Drop the following patches contained in the new tarball 5a21a77e-x86-pv-construct-d0v0s-GDT-properly.patch 5a2fda0d-x86-mb2-avoid-Xen-when-looking-for-module-crashkernel-pos.patch 5a2ffc1f-x86-mm-drop-bogus-paging-mode-assertion.patch 5a313972-x86-microcode-add-support-for-AMD-Fam17.patch 5a32bd79-x86-vmx-dont-use-hvm_inject_hw_exception-in-.patch 5a4caa5e-x86-IRQ-conditionally-preserve-access-perm.patch 5a4caa8c-x86-E820-don-t-overrun-array.patch 5a4e2bca-x86-free-msr_vcpu_policy-during-destruction.patch 5a4e2c2c-x86-upcall-inject-spurious-event-after-setting-vector.patch 5a4fd893-1-x86-break-out-alternative-asm-into-separate-header.patch 5a4fd893-2-x86-introduce-ALTERNATIVE_2-macros.patch 5a4fd893-3-x86-hvm-rename-update_guest_vendor-to-cpuid_policy_changed.patch 5a4fd893-4-x86-introduce-cpuid_policy_updated.patch 5a4fd893-5-x86-entry-remove-partial-cpu_user_regs.patch 5a4fd894-1-x86-rearrange-RESTORE_ALL-to-restore-in-stack-order.patch 5a4fd894-2-x86-hvm-use-SAVE_ALL-after-VMExit.patch 5a4fd894-3-x86-erase-guest-GPRs-on-entry-to-Xen.patch 5a4fd894-4-clarifications-to-wait-infrastructure.patch 5a534c78-x86-dont-use-incorrect-CPUID-values-for-topology.patch 5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4-updates.patch 5a5e2cff-x86-Meltdown-band-aid.patch 5a5e2d73-x86-Meltdown-band-aid-conditional.patch 5a5e3a4e-1-x86-support-compiling-with-indirect-branch-thunks.patch 5a5e3a4e-2-x86-support-indirect-thunks-from-asm.patch 5a5e3a4e-3-x86-report-speculative-mitigation-details.patch 5a5e3a4e-4-x86-AMD-set-lfence-as-Dispatch-Serialising.patch 5a5e3a4e-5-x86-introduce-alternative-indirect-thunks.patch 5a5e3a4e-6-x86-definitions-for-Indirect-Branch-Controls.patch 5a5e3a4e-7-x86-cmdline-opt-to-disable-IBRS-IBPB-STIBP.patch 5a5e459c-1-x86-SVM-offer-CPUID-faulting-to-AMD-HVM-guests.patch 5a5e459c-2-x86-report-domain-id-on-CPUID.patch 5a68bc16-x86-acpi-process-softirqs-logging-Cx.patch 5a69c0b9-x86-fix-GET_STACK_END.patch 5a6b36cd-1-x86-cpuid-handling-of-IBRS-IBPB-STIBP-and-IBRS-for-guests.patch 5a6b36cd-2-x86-msr-emulation-of-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-3-x86-migrate-MSR_SPEC_CTRL.patch 5a6b36cd-4-x86-hvm-permit-direct-access-to-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-5-x86-use-SPEC_CTRL-on-entry.patch 5a6b36cd-6-x86-clobber-RSB-RAS-on-entry.patch 5a6b36cd-7-x86-no-alternatives-in-NMI-MC-paths.patch 5a6b36cd-8-x86-boot-calculate-best-BTI-mitigation.patch 5a6b36cd-9-x86-issue-speculation-barrier.patch 5a6b36cd-A-x86-offer-Indirect-Branch-Controls-to-guests.patch 5a6b36cd-B-x86-clear-SPEC_CTRL-while-idle.patch 5a7b1bdd-x86-reduce-Meltdown-band-aid-IPI-overhead.patch 5a843807-x86-spec_ctrl-fix-bugs-in-SPEC_CTRL_ENTRY_FROM_INTR_IST.patch 5a856a2b-x86-emul-fix-64bit-decoding-of-segment-overrides.patch 5a856a2b-x86-use-32bit-xors-for-clearing-GPRs.patch 5a856a2b-x86-xpti-hide-almost-all-of-Xen-image-mappings.patch 5a8be788-x86-nmi-start-NMI-watchdog-on-CPU0-after-SMP.patch 5a95373b-x86-PV-avoid-leaking-other-guests-MSR_TSC_AUX.patch 5a95571f-memory-dont-implicitly-unpin-in-decrease-res.patch 5a95576c-gnttab-ARM-dont-corrupt-shared-GFN-array.patch 5a955800-gnttab-dont-free-status-pages-on-ver-change.patch 5a955854-x86-disallow-HVM-creation-without-LAPIC-emul.patch 5a956747-x86-HVM-dont-give-wrong-impression-of-WRMSR-success.patch 5a9eb7f1-x86-xpti-dont-map-stack-guard-pages.patch 5a9eb85c-x86-slightly-reduce-XPTI-overhead.patch 5a9eb890-x86-remove-CR-reads-from-exit-to-guest-path.patch 5aa2b6b9-cpufreq-ondemand-CPU-offlining-race.patch 5aaa9878-x86-vlapic-clear-TMR-bit-for-edge-triggered-intr.patch xsa258.patch xsa259.patch- bsc#1090820 - VUL-0: CVE-2018-8897: xen: x86: mishandling of debug exceptions (XSA-260) xsa260-1.patch xsa260-2.patch xsa260-3.patch xsa260-4.patch - bsc#1090822 - VUL-0: CVE-2018-10982: xen: x86 vHPET interrupt injection errors (XSA-261) xsa261.patch - bsc#1090823 - VUL-0: CVE-2018-10981: xen: qemu may drive Xen into unbounded loop (XSA-262) xsa262.patch- bsc#1089152 - VUL-0: CVE-2018-10472: xen: Information leak via crafted user-supplied CDROM (XSA-258) xsa258.patch - bsc#1089635 - VUL-0: CVE-2018-10471: xen: x86: PV guest may crash Xen with XPTI (XSA-259) xsa259.patch- Preserve xen-syms from xen-dbg.gz to allow processing vmcores with crash(1) (bsc#1087251)- Upstream patches from Jan (bsc#1027519) and fixes related to Page Table Isolation (XPTI). See also bsc#1074562 XSA-254 5a856a2b-x86-xpti-hide-almost-all-of-Xen-image-mappings.patch 5a9eb7f1-x86-xpti-dont-map-stack-guard-pages.patch 5a9eb85c-x86-slightly-reduce-XPTI-overhead.patch 5a9eb890-x86-remove-CR-reads-from-exit-to-guest-path.patch 5aa2b6b9-cpufreq-ondemand-CPU-offlining-race.patch 5aaa9878-x86-vlapic-clear-TMR-bit-for-edge-triggered-intr.patch- bsc#1072834 - Xen HVM: unchecked MSR access error: RDMSR from 0xc90 at rIP: 0xffffffff93061456 (native_read_msr+0x6/0x30) 5a956747-x86-HVM-dont-give-wrong-impression-of-WRMSR-success.patch - Upstream patches from Jan (bsc#1027519) 5a79d7ed-libxc-packed-initrd-dont-fail-domain-creation.patch 5a7b1bdd-x86-reduce-Meltdown-band-aid-IPI-overhead.patch 5a843807-x86-spec_ctrl-fix-bugs-in-SPEC_CTRL_ENTRY_FROM_INTR_IST.patch 5a856a2b-x86-emul-fix-64bit-decoding-of-segment-overrides.patch 5a856a2b-x86-use-32bit-xors-for-clearing-GPRs.patch 5a8be788-x86-nmi-start-NMI-watchdog-on-CPU0-after-SMP.patch 5a95373b-x86-PV-avoid-leaking-other-guests-MSR_TSC_AUX.patch 5a95571f-memory-dont-implicitly-unpin-in-decrease-res.patch (Replaces xsa252.patch) 5a95576c-gnttab-ARM-dont-corrupt-shared-GFN-array.patch (Replaces xsa255-1.patch) 5a955800-gnttab-dont-free-status-pages-on-ver-change.patch (Replaces xsa255-2.patch) 5a955854-x86-disallow-HVM-creation-without-LAPIC-emul.patch (Replaces xsa256.patch) - Drop xsa252.patch xsa255-1.patch xsa255-2.patch xsa256.patch- bsc#1080635 - VUL-0: CVE-2018-7540: xen: DoS via non-preemptable L3/L4 pagetable freeing (XSA-252) xsa252.patch - bsc#1080662 - VUL-0: CVE-2018-7541: xen: grant table v2 -> v1 transition may crash Xen (XSA-255) xsa255-1.patch xsa255-2.patch - bsc#1080634 - VUL-0: CVE-2018-7542: xen: x86 PVH guest without LAPIC may DoS the host (XSA-256) xsa256.patch- Remove stale systemd presets code for 13.2 and older- fate#324965 - add script, udev rule and systemd service to watch for vcpu online/offline events in a HVM domU They are triggered via xl vcpu-set domU N- Replace hardcoded xen with Name tag when refering to subpkgs- Make sure tools and tools-domU require libs from the very same build- tools-domU: Add support for qemu guest agent. New files 80-xen-channel-setup.rules and xen-channel-setup.sh configure a xen-pv-channel for use by the guest agent FATE#324963- Remove outdated /etc/xen/README*- bsc#1073961 - VUL-0: CVE-2018-5244: xen: x86: memory leak with MSR emulation (XSA-253) 5a4e2bca-x86-free-msr_vcpu_policy-during-destruction.patch - bsc#1074562 - VUL-0: CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 xen: Information leak via side effects of speculative execution (XSA-254). Includes Spectre v2 mitigation. 5a4caa5e-x86-IRQ-conditionally-preserve-access-perm.patch 5a4caa8c-x86-E820-don-t-overrun-array.patch 5a4e2c2c-x86-upcall-inject-spurious-event-after-setting-vector.patch 5a4fd893-1-x86-break-out-alternative-asm-into-separate-header.patch 5a4fd893-2-x86-introduce-ALTERNATIVE_2-macros.patch 5a4fd893-3-x86-hvm-rename-update_guest_vendor-to-cpuid_policy_changed.patch 5a4fd893-4-x86-introduce-cpuid_policy_updated.patch 5a4fd893-5-x86-entry-remove-partial-cpu_user_regs.patch 5a4fd894-1-x86-rearrange-RESTORE_ALL-to-restore-in-stack-order.patch 5a4fd894-2-x86-hvm-use-SAVE_ALL-after-VMExit.patch 5a4fd894-3-x86-erase-guest-GPRs-on-entry-to-Xen.patch 5a4fd894-4-clarifications-to-wait-infrastructure.patch 5a534c78-x86-dont-use-incorrect-CPUID-values-for-topology.patch 5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4-updates.patch 5a5e2cff-x86-Meltdown-band-aid.patch 5a5e2d73-x86-Meltdown-band-aid-conditional.patch 5a5e3a4e-1-x86-support-compiling-with-indirect-branch-thunks.patch 5a5e3a4e-2-x86-support-indirect-thunks-from-asm.patch 5a5e3a4e-3-x86-report-speculative-mitigation-details.patch 5a5e3a4e-4-x86-AMD-set-lfence-as-Dispatch-Serialising.patch 5a5e3a4e-5-x86-introduce-alternative-indirect-thunks.patch 5a5e3a4e-6-x86-definitions-for-Indirect-Branch-Controls.patch 5a5e3a4e-7-x86-cmdline-opt-to-disable-IBRS-IBPB-STIBP.patch 5a5e459c-1-x86-SVM-offer-CPUID-faulting-to-AMD-HVM-guests.patch 5a5e459c-2-x86-report-domain-id-on-CPUID.patch 5a68bc16-x86-acpi-process-softirqs-logging-Cx.patch 5a69c0b9-x86-fix-GET_STACK_END.patch 5a6b36cd-1-x86-cpuid-handling-of-IBRS-IBPB-STIBP-and-IBRS-for-guests.patch 5a6b36cd-2-x86-msr-emulation-of-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-3-x86-migrate-MSR_SPEC_CTRL.patch 5a6b36cd-4-x86-hvm-permit-direct-access-to-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-5-x86-use-SPEC_CTRL-on-entry.patch 5a6b36cd-6-x86-clobber-RSB-RAS-on-entry.patch 5a6b36cd-7-x86-no-alternatives-in-NMI-MC-paths.patch 5a6b36cd-8-x86-boot-calculate-best-BTI-mitigation.patch 5a6b36cd-9-x86-issue-speculation-barrier.patch 5a6b36cd-A-x86-offer-Indirect-Branch-Controls-to-guests.patch 5a6b36cd-B-x86-clear-SPEC_CTRL-while-idle.patch- Fix python3 deprecated atoi call (bsc#1067224) pygrub-python3-conversion.patch - Drop xenmon-python3-conversion.patch- bsc#1067317 - pass cache=writeback|unsafe|directsync to qemu, depending on the libxl disk settings libxl.add-option-to-disable-disk-cache-flushes-in-qdisk.patch- Remove libxl.LIBXL_DESTROY_TIMEOUT.debug.patch- bsc#1067224 - xen-tools have hard dependency on Python 2 build-python3-conversion.patch bin-python3-conversion.patch- bsc#1070165 - xen crashes after aborted localhost migration 5a2ffc1f-x86-mm-drop-bogus-paging-mode-assertion.patch - bsc#1035442 - L3: libxl: error: libxl.c:1676:devices_destroy_cb: libxl__devices_destroy failed 5a33a12f-domctl-improve-locking-during-domain-destruction.patch - Upstream patches from Jan (bsc#1027519) 5a21a77e-x86-pv-construct-d0v0s-GDT-properly.patch 5a2fda0d-x86-mb2-avoid-Xen-when-looking-for-module-crashkernel-pos.patch 5a313972-x86-microcode-add-support-for-AMD-Fam17.patch 5a32bd79-x86-vmx-dont-use-hvm_inject_hw_exception-in-.patch- Update to Xen 4.10.0 FCS (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Rebuild initrd if xen-tools-domU is updated- Update to Xen 4.10.0-rc8 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Increase the value of LIBXL_DESTROY_TIMEOUT from 10 to 100 seconds If many domUs shutdown in parallel the backends can not keep up Add some debug output to track how long backend shutdown takes (bsc#1035442) libxl.LIBXL_DESTROY_TIMEOUT.patch libxl.LIBXL_DESTROY_TIMEOUT.debug.patch- Adjust xenstore-run-in-studomain.patch to change the defaults in the code instead of changing the sysconfig template, to also cover the upgrade case- Update to Xen 4.10.0-rc6 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Since xen switched to Kconfig, building a debug hypervisor was done by default. Adjust make logic to build a non-debug hypervisor by default, and continue to provide one as xen-dbg.gz- fate#316614: set migration constraints from cmdline fix libxl.set-migration-constraints-from-cmdline.patch for xen-4.10- Document the suse-diskcache-disable-flush option in xl-disk-configuration(5) (bsc#879425,bsc#1067317)- Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468)- Update to Xen 4.10.0-rc5 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - fate#323663 - Run Xenstore in stubdomain xenstore-run-in-studomain.patch- bsc#1067224 - xen-tools have hard dependency on Python 2 pygrub-python3-conversion.patch xenmon-python3-conversion.patch migration-python3-conversion.patch xnloader.py xen2libvirt.py- Remove xendriverdomain.service (bsc#1065185) Driver domains must be configured manually with custom .service file- Update to Xen 4.10.0-rc3 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - Drop 59f31268-libxc-remove-stale-error-check-for-domain-size.patch- Adjust xen-dom0-modules.service to ignore errors (bsc#1065187)- fate#324052 Support migration of Xen HVM domains larger than 1TB 59f31268-libxc-remove-stale-error-check-for-domain-size.patch- Update to Xen 4.10.0-rc2 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Update to Xen 4.10.0-rc1 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - Drop patches included in new tarball 592fd5f0-stop_machine-fill-result-only-in-case-of-error.patch 596f257e-x86-fix-hvmemul_insn_fetch.patch 5982fd99-VT-d-don-t-panic-warn-on-iommu-no-igfx.patch 598c3630-VT-d-PI-disable-when-CPU-side-PI-is-off.patch 598c3706-cpufreq-only-stop-ondemand-governor-if-started.patch 5992f1e5-x86-grant-disallow-misaligned-PTEs.patch 5992f20d-gnttab-split-maptrack-lock-to-make-it-useful-again.patch 5992f233-gnttab-correct-pin-status-fixup-for-copy.patch 59958e76-gnttab-dont-use-possibly-unbounded-tail-calls.patch 59958ebf-gnttab-fix-transitive-grant-handling.patch 59958edd-gnttab-avoid-spurious-maptrack-handle-alloc-failures.patch 599da329-arm-mm-release-grant-lock-on-xatp1-error-paths.patch 59a01223-x86-check-for-alloc-errors-in-modify_xen_mappings.patch 59a0130c-x86-efi-dont-write-relocs-in-efi_arch_relocate_image-1st-pass.patch 59a9221f-VT-d-use-correct-BDF-for-VF-to-search-VT-d-unit.patch 59ae9177-x86-emul-fix-handling-of-unimplemented-Grp7-insns.patch 59aec335-x86emul-correct-VEX-W-handling-for-VPINSRD.patch 59aec375-x86emul-correct-VEX-L-handling-for-VCVTx2SI.patch 59afcea0-x86-introduce-and-use-setup_force_cpu_cap.patch 59b2a7f2-x86-HVM-correct-repeat-count-update-linear-phys.patch 59b7d664-mm-make-sure-node-is-less-than-MAX_NUMNODES.patch 59b7d69b-grant_table-fix-GNTTABOP_cache_flush-handling.patch 59b7d6c8-xenstore-dont-unlink-connection-object-twice.patch 59b7d6d9-gnttab-also-validate-PTE-perms-upon-destroy-replace.patch gcc7-arm.patch gcc7-mini-os.patch- bsc#1061084 - VUL-0: xen: page type reference leak on x86 (XSA-242) xsa242.patch - bsc#1061086 - VUL-0: xen: x86: Incorrect handling of self-linear shadow mappings with translated guests (XSA-243) xsa243.patch - bsc#1061087 - VUL-0: xen: x86: Incorrect handling of IST settings during CPU hotplug (XSA-244) xsa244.patch- bsc#1061077 - VUL-0: xen: DMOP map/unmap missing argument checks (XSA-238) xsa238.patch - bsc#1061080 - VUL-0: xen: hypervisor stack leak in x86 I/O intercept code (XSA-239) xsa239.patch - bsc#1061081 - VUL-0: xen: Unlimited recursion in linear pagetable de-typing (XSA-240) xsa240-1.patch xsa240-2.patch - bsc#1061082 - VUL-0: xen: Stale TLB entry due to page type release race (XSA-241) xsa241.patch- bsc#1061075 - VUL-0: xen: pin count / page reference race in grant table code (XSA-236) xsa236.patch - bsc#1061076 - VUL-0: xen: multiple MSI mapping issues on x86 (XSA-237) xsa237-1.patch xsa237-2.patch xsa237-3.patch xsa237-4.patch xsa237-5.patch- bsc#1056278 - VUL-0: xen: Missing NUMA node parameter verification (XSA-231) 59b7d664-mm-make-sure-node-is-less-than-MAX_NUMNODES.patch - bsc#1056280 - VUL-0: xen: Missing check for grant table (XSA-232) 59b7d69b-grant_table-fix-GNTTABOP_cache_flush-handling.patch - bsc#1056281 - VUL-0: xen: cxenstored: Race in domain cleanup (XSA-233) 59b7d6c8-xenstore-dont-unlink-connection-object-twice.patch - bsc#1056282 - VUL-0: xen: insufficient grant unmapping checks for x86 PV guests (XSA-234) 59b7d6d9-gnttab-also-validate-PTE-perms-upon-destroy-replace.patch - bsc#1055321 - VUL-0: xen: add-to-physmap error paths fail to release lock on ARM (XSA-235) 599da329-arm-mm-release-grant-lock-on-xatp1-error-paths.patch - Upstream patches from Jan (bsc#1027519) 59a01223-x86-check-for-alloc-errors-in-modify_xen_mappings.patch 59a0130c-x86-efi-dont-write-relocs-in-efi_arch_relocate_image-1st-pass.patch 59a9221f-VT-d-use-correct-BDF-for-VF-to-search-VT-d-unit.patch 59ae9177-x86-emul-fix-handling-of-unimplemented-Grp7-insns.patch 59aec335-x86emul-correct-VEX-W-handling-for-VPINSRD.patch 59aec375-x86emul-correct-VEX-L-handling-for-VCVTx2SI.patch 59afcea0-x86-introduce-and-use-setup_force_cpu_cap.patch 59b2a7f2-x86-HVM-correct-repeat-count-update-linear-phys.patch - Dropped gcc7-xen.patch- bsc#1057358 - Cannot Boot into SLES12.3 with Xen hypervisor when Secure Boot is Enabled xen.spec- bsc#1055695 - XEN: 11SP4 and 12SP3 HVM guests can not be restored update from v6 to v9 to cover more cases for ballooned domUs libxc.sr.superpage.patch- bsc#1026236 - remove suse_vtsc_tolerance= cmdline option for Xen drop the patch because it is not upstream acceptable remove xen.suse_vtsc_tolerance.patch- bsc#1055695 - XEN: 11SP4 and 12SP3 HVM guests can not be restored after the save using xl stack libxc.sr.superpage.patch- Unignore gcc-PIE the toolstack disables PIE for firmware builds as needed- Upstream patches from Jan (bsc#1027519) 592fd5f0-stop_machine-fill-result-only-in-case-of-error.patch 596f257e-x86-fix-hvmemul_insn_fetch.patch 5982fd99-VT-d-don-t-panic-warn-on-iommu-no-igfx.patch 598c3630-VT-d-PI-disable-when-CPU-side-PI-is-off.patch 598c3706-cpufreq-only-stop-ondemand-governor-if-started.patch 5992f1e5-x86-grant-disallow-misaligned-PTEs.patch (Replaces xsa227.patch) 5992f20d-gnttab-split-maptrack-lock-to-make-it-useful-again.patch (Replaces xsa228.patch) 5992f233-gnttab-correct-pin-status-fixup-for-copy.patch (Replaces xsa230.patch) 59958e76-gnttab-dont-use-possibly-unbounded-tail-calls.patch (Replaces xsa226-1.patch) 59958ebf-gnttab-fix-transitive-grant-handling.patch (Replaces xsa226-2.patch) 59958edd-gnttab-avoid-spurious-maptrack-handle-alloc-failures.patch- bsc#1044974 - xen-tools require python-pam xen.spec- Clean up spec file errors and a few warnings. (bsc#1027519) - Removed conditional 'with_systemd' and some old deprecated 'sles_version' checks. xen.spec- Remove use of brctl utiltiy from supportconfig plugin FATE#323639- Use upstream variant of mini-os __udivmoddi4 change gcc7-mini-os.patch- fate#323639 Move bridge-utils to legacy replace-obsolete-network-configuration-commands-in-s.patch- bsc#1052686 - VUL-0: xen: grant_table: possibly premature clearing of GTF_writing / GTF_reading (XSA-230) xsa230.patch- bsc#1035231 - migration of HVM domU does not use superpages on destination dom0 libxc.sr.superpage.patch- bsc#1051787 - VUL-0: CVE-2017-12135: xen: possibly unbounded recursion in grant table code (XSA-226) xsa226-1.patch xsa226-2.patch - bsc#1051788 - VUL-0: CVE-2017-12137: xen: x86: PV privilege escalation via map_grant_ref (XSA-227) xsa227.patch - bsc#1051789 - VUL-0: CVE-2017-12136: xen: grant_table: Race conditions with maptrack free list handling (XSA-228) xsa228.patch- Add a supportconfig plugin xen-supportconfig FATE#323661- bsc#1026236 - add suse_vtsc_tolerance= cmdline option for Xen To avoid emulation of TSC access from a domU after live migration add a global tolerance for the measured host kHz xen.suse_vtsc_tolerance.patch- fate#323662 Drop qemu-dm from xen-tools package The following tarball and patches have been removed qemu-xen-traditional-dir-remote.tar.bz2 VNC-Support-for-ExtendedKeyEvent-client-message.patch 0001-net-move-the-tap-buffer-into-TAPState.patch 0002-net-increase-tap-buffer-size.patch 0003-e1000-fix-access-4-bytes-beyond-buffer-end.patch 0004-e1000-secrc-support.patch 0005-e1000-multi-buffer-packet-support.patch 0006-e1000-clear-EOP-for-multi-buffer-descriptors.patch 0007-e1000-verify-we-have-buffers-upfront.patch 0008-e1000-check-buffer-availability.patch CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch CVE-2015-4037-qemut-smb-config-dir-name.patch CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch CVE-2016-7908-qemut-net-Infinite-loop-in-mcf_fec_do_tx.patch CVE-2016-7909-qemut-net-pcnet-infinite-loop-in-pcnet_rdra_addr.patch CVE-2016-8667-qemut-dma-rc4030-divide-by-zero-error-in-set_next_tick.patch CVE-2016-8669-qemut-char-divide-by-zero-error-in-serial_update_parameters.patch CVE-2016-8910-qemut-net-rtl8139-infinite-loop-while-transmit-in-Cplus-mode.patch CVE-2016-9921-qemut-display-cirrus_vga-divide-by-zero-in-cirrus_do_copy.patch CVE-2017-6505-qemut-usb-an-infinite-loop-issue-in-ohci_service_ed_list.patch CVE-2017-8309-qemut-audio-host-memory-leakage-via-capture-buffer.patch CVE-2017-9330-qemut-usb-ohci-infinite-loop-due-to-incorrect-return-value.patch blktap.patch cdrom-removable.patch xen-qemu-iscsi-fix.patch qemu-security-etch1.patch xen-disable-qemu-monitor.patch xen-hvm-default-bridge.patch qemu-ifup-set-mtu.patch ioemu-vnc-resize.patch capslock_enable.patch altgr_2.patch log-guest-console.patch bdrv_open2_fix_flags.patch bdrv_open2_flags_2.patch ioemu-7615-qcow2-fix-alloc_cluster_link_l2.patch qemu-dm-segfault.patch bdrv_default_rwflag.patch kernel-boot-hvm.patch ioemu-watchdog-support.patch ioemu-watchdog-linkage.patch ioemu-watchdog-ib700-timer.patch ioemu-hvm-pv-support.patch pvdrv_emulation_control.patch ioemu-disable-scsi.patch ioemu-disable-emulated-ide-if-pv.patch xenpaging.qemu.flush-cache.patch ioemu-devicemodel-include.patch - Cleanup spec file and remove unused KMP patches kmp_filelist supported_module.patch xen_pvonhvm.xen_emul_unplug.patch- bsc#1002573 - Optimize LVM functions in block-dmmd block-dmmd- Record initial Xen dmesg in /var/log/xen/xen-boot.log for supportconfig. Keep previous log in /var/log/xen/xen-boot.prev.log- Remove storytelling from description in xen.rpm- Update to Xen 4.9.0 FCS (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update block-dmmd script (bsc#1002573) block-dmmd- Update to Xen 4.9.0-rc8+ (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 gcc7-arm.patch - Drop gcc7-error-xenpmd.patch- Update to Xen 4.9.0-rc8 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1042160 - VUL-1: CVE-2017-9330: xen: usb: ohci: infinite loop due to incorrect return value CVE-2017-9330-qemut-usb-ohci-infinite-loop-due-to-incorrect-return-value.patch- bsc#1037243 - VUL-1: CVE-2017-8309: xen: audio: host memory leakage via capture buffer CVE-2017-8309-qemut-audio-host-memory-leakage-via-capture-buffer.patch- Update to Xen 4.9.0-rc7 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update to Xen 4.9.0-rc6 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1031343 - xen fails to build with GCC 7 gcc7-mini-os.patch gcc7-xen.patch- bsc#1031343 - xen fails to build with GCC 7 gcc7-error-xenpmd.patch- Update to Xen 4.9.0-rc5 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 - Drop xen-tools-pkgconfig-xenlight.patch- bsc#1037779 - xen breaks kexec-tools build xen-tools-pkgconfig-xenlight.patch- Update to Xen 4.9.0-rc4 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1036146 - sles12sp2 xen VM dumps core to wrong path xen.spec- Update to Xen 4.9.0-rc3 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 aarch64-maybe-uninitialized.patch- Update to Xen 4.9.0-rc2 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update to Xen 4.9.0-rc1 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 ioemu-devicemodel-include.patch - Dropped patches contained in new tarball xen-4.8.0-testing-src.tar.bz2 0001-xenstore-let-write_node-and-some-callers-return-errn.patch 0002-xenstore-undo-function-rename.patch 0003-xenstore-rework-of-transaction-handling.patch 584806ce-x86emul-correct-PUSHF-POPF.patch 584fc649-fix-determining-when-domain-creation-is-complete.patch 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch 58510cac-x86emul-MOVNTI-no-REP-prefixes.patch 58526ccc-x86emul-64bit-ignore-most-segment-bases-in-align-check.patch 5853ed37-VT-d-correct-dma_msi_set_affinity.patch 5853ee07-x86emul-CMPXCHG16B-aligned-operand.patch 58580060-x86-emul-correct-SYSCALL-eflags-handling.patch 585aa3c5-x86-force-EFLAGS-IF-on-upon-exit-to-PV.patch 585aa407-x86-HVM-NULL-check-before-using-VMFUNC-hook.patch 585bd5fe-x86-emul-correct-VMFUNC-return-value-handling.patch 586ba81c-x86-cpu-dont-update-this_cpu-for-guest-get_cpu_vendor.patch 587d04d6-x86-xstate-fix-array-overrun-with-LWP.patch 587de4a9-x86emul-VEX-B-ignored-in-compat-mode.patch 5882129d-x86emul-LOCK-check-adjustments.patch 58821300-x86-segment-attribute-handling.patch 58873c1f-x86emul-correct-FPU-stub-asm-constraints.patch 58873c80-x86-hvm-do-not-set-msr_tsc_adjust-on-.patch 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5887888f-credit2-never-consider-CPUs-outside-of-pool.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5888b1b3-x86-emulate-dont-assume-addr_size-32-implies-protmode.patch 5899cbd9-EPT-allow-wrcomb-MMIO-mappings-again.patch 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch 58a44771-IOMMU-always-call-teardown-callback.patch 58a48ccc-x86-fix-p2m_flush_table-for-non-nested.patch 58a59f4b-libxl-correct-xenstore-entry-for-empty-cdrom.patch 58a70d94-VMX-fix-VMCS-race-on-cswitch-paths.patch 58ac1f3f-VMX-dont-leak-host-syscall-MSRs.patch 58b5a2de-x86-correct-Xens-idea-of-its-memory-layout.patch 58b6fd42-credit2-always-mark-a-tickled-pCPU-as-tickled.patch 58b6fd42-credit2-dont-miss-accounting-during-credit-reset.patch 58cbf682-x86-EFI-avoid-overrunning-mb_modules.patch 58cf9200-x86-EFI-avoid-IOMMU-faults-on-tail-gap.patch 58cf9260-x86-EFI-avoid-Xen-when-looking-for-mod-kexec-pos.patch 58cf9277-x86-time-dont-use-vTSC-if-host-guest-freqs-match.patch 58d25ea2-xenstore-add-missing-checks-for-allocation-failure.patch 58d91365-sched-dont-call-wrong-hook-via-VCPU2OP.patch CVE-2017-2615-qemut-display-cirrus-oob-access-while-doing-bitblt-copy-backward-mode.patch CVE-2017-2620-xsa209-qemut-cirrus_bitblt_cputovideo-does-not-check-if-memory-region-safe.patch glibc-2.25-compatibility-fix.patch xs-09-add_change_node-params.patch xs-10-call-add_change_node.patch xs-11-tdb-record-header.patch xs-12-node-gen-count.patch xs-13-read-directory-part-support.patch xs-14-command-array.patch xs-15-command-return-val.patch xs-16-function-static.patch xs-17-arg-parsing.patch xs-18-default-buffer.patch xs-19-handle-alloc-failures.patch xs-20-tdb-version.patch xs-21-empty-tdb-database.patch xs-22-reopen_log-fix.patch xs-23-XS_DEBUG-rename.patch xs-24-xenstored_control.patch xs-25-control-enhance.patch xs-26-log-control.patch xs-27-memory-report.patch xs-28-remove-talloc-report.patch xs-29-define-off_t.patch xsa206-0001-xenstored-apply-a-write-transaction-rate-limit.patch xsa206-0002-xenstored-Log-when-the-write-transaction-rate-limit.patch- bsc#1022703 - Xen HVM guest with OVMF hangs with unattached CDRom 58a59f4b-libxl-correct-xenstore-entry-for-empty-cdrom.patch- bsc#1015348 - L3: libvirtd does not start during boot suse-xendomains-service.patch- bsc#1014136 - Partner-L3: kdump can't dump a kernel on SLES12-SP2 with Xen hypervisor. 58cf9260-x86-EFI-avoid-Xen-when-looking-for-mod-kexec-pos.patch - bsc#1026236 - L3: Paravirtualized vs. fully virtualized migration - latter one much faster 58cf9277-x86-time-dont-use-vTSC-if-host-guest-freqs-match.patch - Upstream patch from Jan 58cbf682-x86-EFI-avoid-overrunning-mb_modules.patch 58cf9200-x86-EFI-avoid-IOMMU-faults-on-tail-gap.patch 58d91365-sched-dont-call-wrong-hook-via-VCPU2OP.patch- bsc#1022555 - L3: Timeout in "execution of /etc/xen/scripts/block add" 58d25ea2-xenstore-add-missing-checks-for-allocation-failure.patch 0001-xenstore-let-write_node-and-some-callers-return-errn.patch 0002-xenstore-undo-function-rename.patch 0003-xenstore-rework-of-transaction-handling.patch - bsc#1030144 - VUL-0: xen: xenstore denial of service via repeated update (XSA-206) xsa206-0001-xenstored-apply-a-write-transaction-rate-limit.patch xsa206-0002-xenstored-Log-when-the-write-transaction-rate-limit.patch - bsc#1029827 - Forward port xenstored xs-09-add_change_node-params.patch xs-10-call-add_change_node.patch xs-11-tdb-record-header.patch xs-12-node-gen-count.patch xs-13-read-directory-part-support.patch xs-14-command-array.patch xs-15-command-return-val.patch xs-16-function-static.patch xs-17-arg-parsing.patch xs-18-default-buffer.patch xs-19-handle-alloc-failures.patch xs-20-tdb-version.patch xs-21-empty-tdb-database.patch xs-22-reopen_log-fix.patch xs-23-XS_DEBUG-rename.patch xs-24-xenstored_control.patch xs-25-control-enhance.patch xs-26-log-control.patch xs-27-memory-report.patch xs-28-remove-talloc-report.patch xs-29-define-off_t.patch- bsc#1029128 - fix make xen to really produce xen.efi with gcc48- bsc#1028235 - VUL-0: CVE-2017-6505: xen: qemu: usb: an infinite loop issue in ohci_service_ed_list CVE-2017-6505-qemut-usb-an-infinite-loop-issue-in-ohci_service_ed_list.patch - Upstream patches from Jan (bsc#1027519) 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5899cbd9-EPT-allow-wrcomb-MMIO-mappings-again.patch 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch 58a44771-IOMMU-always-call-teardown-callback.patch 58a48ccc-x86-fix-p2m_flush_table-for-non-nested.patch 58a70d94-VMX-fix-VMCS-race-on-cswitch-paths.patch 58ac1f3f-VMX-dont-leak-host-syscall-MSRs.patch 58b5a2de-x86-correct-Xens-idea-of-its-memory-layout.patch 58b6fd42-credit2-always-mark-a-tickled-pCPU-as-tickled.patch 58b6fd42-credit2-dont-miss-accounting-during-credit-reset.patch- bsc#1027654 - XEN fails to build against glibc 2.25 glibc-2.25-compatibility-fix.patch libxl.pvscsi.patch- fate#316613: Refresh and enable libxl.pvscsi.patch- bsc#1024834 - VUL-0: CVE-2017-2620: xen: cirrus_bitblt_cputovideo does not check if memory region is safe (XSA-209) CVE-2017-2620-xsa209-qemut-cirrus_bitblt_cputovideo-does-not-check-if-memory-region-safe.patch- bsc#1023948 - [pvusb][sles12sp3][openqa] Segmentation fault happened when adding usbctrl devices via xl 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch- Upstream patches from Jan (bsc#1027519) 587d04d6-x86-xstate-fix-array-overrun-with-LWP.patch 587de4a9-x86emul-VEX-B-ignored-in-compat-mode.patch 5882129d-x86emul-LOCK-check-adjustments.patch 58821300-x86-segment-attribute-handling.patch 58873c1f-x86emul-correct-FPU-stub-asm-constraints.patch 58873c80-x86-hvm-do-not-set-msr_tsc_adjust-on-.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5887888f-credit2-never-consider-CPUs-outside-of-pool.patch 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5888b1b3-x86-emulate-dont-assume-addr_size-32-implies-protmode.patch- bsc#1023004 - VUL-0: CVE-2017-2615: qemu: display: cirrus: oob access while doing bitblt copy backward mode CVE-2017-2615-qemut-display-cirrus-oob-access-while-doing-bitblt-copy-backward-mode.patch- fate#322313 and fate#322150 require the acpica package ported to aarch64 which Xen 4.8 needs to build. Temporarily disable aarch64 until these fates are complete. xen.spec- bsc#1021952 - Virutalization/xen: Bug xen-tools missing /usr/bin/domu-xenstore; guests fail to launch tmp_build.patch xen.spec- No systemd presets for 42.3+ and SLE12SP3+ (bsc#1012842)- bsc#1007224 - broken symlinks in /usr/share/doc/packages/xen/misc/ xen.spec- 585aa3c5-x86-force-EFLAGS-IF-on-upon-exit-to-PV.patch Replaces xsa202.patch (bsc#1014298) - 585aa407-x86-HVM-NULL-check-before-using-VMFUNC-hook.patch Replaces xsa203.patch (bsc#1014300) - 58580060-x86-emul-correct-SYSCALL-eflags-handling.patch Replaces xsa204.patch (bsc#1016340) - Upstream patches from Jan 58526ccc-x86emul-64bit-ignore-most-segment-bases-in-align-check.patch 5853ed37-VT-d-correct-dma_msi_set_affinity.patch 5853ee07-x86emul-CMPXCHG16B-aligned-operand.patch 585bd5fe-x86-emul-correct-VMFUNC-return-value-handling.patch 586ba81c-x86-cpu-dont-update-this_cpu-for-guest-get_cpu_vendor.patch- bsc#1015169 - VUL-0: CVE-2016-9921, CVE-2016-9922: xen: qemu: display: cirrus_vga: a divide by zero in cirrus_do_copy CVE-2016-9921-qemut-display-cirrus_vga-divide-by-zero-in-cirrus_do_copy.patch- bsc#1016340 - VUL-0: CVE-2016-10013: xen: x86: Mishandling of SYSCALL singlestep during emulation (XSA-204) xsa204.patch- bsc#1012651 - VUL-0: CVE-2016-9932: xen: x86 CMPXCHG8B emulation fails to ignore operand size override (XSA-200) 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch- bsc#1014298 - VUL-0: CVE-2016-10024: xen: x86 PV guests may be able to mask interrupts (XSA-202) xsa202.patch - bsc#1014300 - VUL-0: CVE-2016-10025: xen: x86: missing NULL pointer check in VMFUNC emulation (XSA-203) xsa203.patch - Upstream patches from Jan 584806ce-x86emul-correct-PUSHF-POPF.patch 584fc649-fix-determining-when-domain-creation-is-complete.patch 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch 58510cac-x86emul-MOVNTI-no-REP-prefixes.patch- Update to Xen 4.8 FCS xen-4.8.0-testing-src.tar.bz2 - Dropped xen-4.7.1-testing-src.tar.bz2 0001-libxc-Rework-extra-module-initialisation.patch 0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch 0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch 0004-firmware-makefile-install-BIOS-blob.patch 0005-libxl-Load-guest-BIOS-from-file.patch 0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch 0007-hvmloader-Grab-the-hvm_start_info-pointer.patch 0008-hvmloader-Locate-the-BIOS-blob.patch 0009-hvmloader-Check-modules-whereabouts-in-perform_tests.patch 0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch 0011-hvmloader-Load-OVMF-from-modules.patch 0012-hvmloader-Specific-bios_load-function-required.patch 0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch 0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch 57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch 576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 5769106e-x86-generate-assembler-equates-for-synthesized.patch 57a1e603-x86-time-adjust-local-system-time-initialization.patch 57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch 57a30261-x86-support-newer-Intel-CPU-models.patch 5810a9cc-x86-emul-Correct-decoding-of-SReg3-operands.patch 581b2c3b-x86-emul-reject-LGDT-LIDT-with-non-canonical-addresses.patch 581b647a-x86emul-L-S-G-I-DT-ignore-opsz-overrides-in-64-bit-mode.patch 58249392-x86-svm-dont-clobber-eax-edx-if-RDMSR-intercept-fails.patch 582c35d6-x86-vmx-correct-long-mode-check-in-vmx_cpuid_intercept.patch 582c35ee-x86-traps-dont-call-hvm_hypervisor_cpuid_leaf-for-PV.patch 58343dc2-x86-hvm-Fix-the-handling-of-non-present-segments.patch 58343df8-x86-HVM-dont-load-LDTR-with-VM86-mode-attrs-during-task-switch.patch 58343e24-x86-PV-writes-of-fs-and-gs-base-MSRs-require-canonical-addresses.patch 58343e9e-libelf-fix-stack-memory-leak-when-loading-32-bit-symbol-tables.patch 58343ec2-x86emul-fix-huge-bit-offset-handling.patch 58343f29-x86-emul-correct-the-IDT-entry-calculation-in-inject_swint.patch 58343f44-x86-svm-fix-injection-of-software-interrupts.patch 58343f79-pygrub-Properly-quote-results-when-returning-them-to-the-caller.patch CVE-2016-9381-xsa197-qemut.patch CVE-2016-9637-xsa199-qemut.patch- bsc#1011652 - VUL-0: xen: qemu ioport array overflow CVE-2016-9637-xsa199-qemut.patch- bsc#1009100 - VUL-0: CVE-2016-9386: XSA-191: xen: x86 null segments not always treated as unusable 58343dc2-x86-hvm-Fix-the-handling-of-non-present-segments.patch - bsc#1009103 - VUL-0: CVE-2016-9382: XSA-192: xen: x86 task switch to VM86 mode mis-handled 58343df8-x86-HVM-dont-load-LDTR-with-VM86-mode-attrs-during-task-switch.patch - bsc#1009104 - VUL-0: CVE-2016-9385: XSA-193: xen: x86 segment base write emulation lacking canonical address checks 58343e24-x86-PV-writes-of-fs-and-gs-base-MSRs-require-canonical-addresses.patch - bsc#1009105 - VUL-0: CVE-2016-9384: XSA-194: xen: guest 32-bit ELF symbol table load leaking host data 58343e9e-libelf-fix-stack-memory-leak-when-loading-32-bit-symbol-tables.patch - bsc#1009107 - VUL-0: CVE-2016-9383: XSA-195: xen: x86 64-bit bit test instruction emulation broken 58343ec2-x86emul-fix-huge-bit-offset-handling.patch - bsc#1009108 - VUL-0: CVE-2016-9377,CVE-2016-9378: XSA-196: xen: x86 software interrupt injection mis-handled 58343f29-x86-emul-correct-the-IDT-entry-calculation-in-inject_swint.patch 58343f44-x86-svm-fix-injection-of-software-interrupts.patch - bsc#1009109 - VUL-0: CVE-2016-9381: XSA-197: xen: qemu incautious about shared ring processing CVE-2016-9381-xsa197-qemut.patch - bsc#1009111 - VUL-0: CVE-2016-9379,CVE-2016-9380: XSA-198: xen: delimiter injection vulnerabilities in pygrub 58343f79-pygrub-Properly-quote-results-when-returning-them-to-the-caller.patch - Upstream patches from Jan 581b2c3b-x86-emul-reject-LGDT-LIDT-with-non-canonical-addresses.patch 581b647a-x86emul-L-S-G-I-DT-ignore-opsz-overrides-in-64-bit-mode.patch 58249392-x86-svm-dont-clobber-eax-edx-if-RDMSR-intercept-fails.patch 582c35d6-x86-vmx-correct-long-mode-check-in-vmx_cpuid_intercept.patch 582c35ee-x86-traps-dont-call-hvm_hypervisor_cpuid_leaf-for-PV.patch- Update to Xen Version 4.7.1 xen-4.7.1-testing-src.tar.bz2 - Dropped patches contained in new tarball xen-4.7.0-testing-src.tar.bz2 575e9ca0-nested-vmx-Validate-host-VMX-MSRs-before-accessing-them.patch 57640448-xen-sched-use-default-scheduler-upon-an-invalid-sched.patch 57973099-have-schedulers-revise-initial-placement.patch 579730e6-remove-buggy-initial-placement-algorithm.patch 57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch 57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch 57ac6316-don-t-restrict-DMA-heap-to-node-0.patch 57b71fc5-x86-EFI-don-t-apply-relocations-to-l-2-3-_bootmap.patch 57b7447b-dont-permit-guest-to-populate-PoD-pages-for-itself.patch 57c4412b-x86-HVM-add-guarding-logic-for-VMX-specific-code.patch 57c57f73-libxc-correct-max_pfn-calculation-for-saving-domain.patch 57c805bf-x86-levelling-restrict-non-architectural-OSXSAVE-handling.patch 57c805c1-x86-levelling-pass-vcpu-to-ctxt_switch_levelling.patch 57c805c3-x86-levelling-provide-architectural-OSXSAVE-handling.patch 57c82be2-x86-32on64-adjust-call-gate-emulation.patch 57c93e52-fix-error-in-libxl_device_usbdev_list.patch 57c96df3-credit1-fix-a-race-when-picking-initial-pCPU.patch 57c96e2c-x86-correct-PT_NOTE-file-position.patch 57cfed43-VMX-correct-feature-checks-for-MPX-and-XSAVES.patch 57d1563d-x86-32on64-don-t-allow-recursive-page-tables-from-L3.patch 57d15679-x86-emulate-Correct-boundary-interactions-of-emulated-insns.patch 57d1569a-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch 57d18642-hvm-fep-Allow-test-insns-crossing-1-0-boundary.patch 57d18642-x86-segment-Bounds-check-accesses-to-emulation-ctxt-seg_reg.patch 57d7ca5f-x86-domctl-fix-TOCTOU-race-in-XEN_DOMCTL_getvcpuextstate.patch 57d7ca64-x86-domctl-fix-migration-of-guests-not-using-xsave.patch 57da8883-credit1-fix-mask-to-be-used-for-tickling.patch 57da8883-credit2-properly-schedule-migration-of-running-vcpu.patch 57dfb1c5-x86-Intel-hide-CPUID-faulting-capability-from-guests.patch 57e93e1d-x86emul-correct-loading-of-ss.patch 57e93e4a-x86emul-don-t-allow-null-selector-for-LTR.patch 57e93e89-x86-AMD-apply-erratum-665-workaround.patch 57ee6cbc-credit1-return-time-remaining-to-limit-as-next-timeslice.patch 57f3a8ee-x86emul-honor-guest-CR0-TS-and-CR0-EM.patch 57fb6a91-x86-defer-not-present-segment-checks.patch 5800c51d-x86-hvm-Clobber-cs-L-when-LME-becomes-set.patch 5800caec-x86emul-fix-pushing-of-selector-registers.patch 5800cb06-x86-Viridian-don-t-depend-on-undefined-register-state.patch 580e29f9-x86-MISALIGNSSE-feature-depends-on-SSE.patch 57dfb2ff-x86-Intel-Broadwell-no-PKG_C8-10_RESIDENCY-MSRs.patch- bsc#1004981 - Xen RPM doesn't contain debug hypervisor for EFI systems xen.spec- bsc#1000106 - VUL-0: CVE-2016-7777: xen: CR0.TS and CR0.EM not always honored for x86 HVM guests (XSA-190) 57f3a8ee-x86emul-honor-guest-CR0-TS-and-CR0-EM.patch - bsc#996191 - [XEN][acpi]residency -n 88 -c will cause xen panic on broadwell-ep 57dfb2ff-x86-Intel-Broadwell-no-PKG_C8-10_RESIDENCY-MSRs.patch - Upstream patches from Jan 57d7ca5f-x86-domctl-fix-TOCTOU-race-in-XEN_DOMCTL_getvcpuextstate.patch 57d7ca64-x86-domctl-fix-migration-of-guests-not-using-xsave.patch 57da8883-credit1-fix-mask-to-be-used-for-tickling.patch 57da8883-credit2-properly-schedule-migration-of-running-vcpu.patch 57dfb1c5-x86-Intel-hide-CPUID-faulting-capability-from-guests.patch 57e93e1d-x86emul-correct-loading-of-ss.patch 57e93e4a-x86emul-don-t-allow-null-selector-for-LTR.patch 57e93e89-x86-AMD-apply-erratum-665-workaround.patch 57ee6cbc-credit1-return-time-remaining-to-limit-as-next-timeslice.patch 57fb6a91-x86-defer-not-present-segment-checks.patch 5800c51d-x86-hvm-Clobber-cs-L-when-LME-becomes-set.patch 5800caec-x86emul-fix-pushing-of-selector-registers.patch 5800cb06-x86-Viridian-don-t-depend-on-undefined-register-state.patch 580e29f9-x86-MISALIGNSSE-feature-depends-on-SSE.patch 5810a9cc-x86-emul-Correct-decoding-of-SReg3-operands.patch- bsc#1007941 - Xen tools limit the number of vcpus to 256 when the system has 384 xen-arch-kconfig-nr_cpus.patch- bsc#1007157 - VUL-0: CVE-2016-8910: xen: net: rtl8139: infinite loop while transmit in C+ mode CVE-2016-8910-qemut-net-rtl8139-infinite-loop-while-transmit-in-Cplus-mode.patch- bsc#1005004 - CVE-2016-8667: xen: dma: rc4030 divide by zero error in set_next_tick CVE-2016-8667-qemut-dma-rc4030-divide-by-zero-error-in-set_next_tick.patch - bsc#1005005 - VUL-0: CVE-2016-8669: xen: char: divide by zero error in serial_update_parameters CVE-2016-8669-qemut-char-divide-by-zero-error-in-serial_update_parameters.patch- bsc#1003030 - VUL-0: CVE-2016-7908: xen: net: Infinite loop in mcf_fec_do_tx CVE-2016-7908-qemut-net-Infinite-loop-in-mcf_fec_do_tx.patch - bsc#1003032 - VUL-0: CVE-2016-7909: xen: net: pcnet: infinite loop in pcnet_rdra_addr CVE-2016-7909-qemut-net-pcnet-infinite-loop-in-pcnet_rdra_addr.patch- bsc#995785 - VUL-0: CVE-2016-7092: xen: x86: Disallow L3 recursive pagetable for 32-bit PV guests (XSA-185) 57d1563d-x86-32on64-don-t-allow-recursive-page-tables-from-L3.patch - bsc#995789 - VUL-0: CVE-2016-7093: xen: x86: Mishandling of instruction pointer truncation during emulation (XSA-186) 57d15679-x86-emulate-Correct-boundary-interactions-of-emulated-insns.patch 57d18642-hvm-fep-Allow-test-insns-crossing-1-0-boundary.patch - bsc#995792 - VUL-0: CVE-2016-7094: xen: x86 HVM: Overflow of sh_ctxt->seg_reg[] (XSA-187) 57d1569a-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch 57d18642-x86-segment-Bounds-check-accesses-to-emulation-ctxt-seg_reg.patch - bsc#991934 - xen hypervisor crash in csched_acct 57c96df3-credit1-fix-a-race-when-picking-initial-pCPU.patch - Upstream patches from Jan 57c4412b-x86-HVM-add-guarding-logic-for-VMX-specific-code.patch 57c57f73-libxc-correct-max_pfn-calculation-for-saving-domain.patch 57c805bf-x86-levelling-restrict-non-architectural-OSXSAVE-handling.patch 57c805c1-x86-levelling-pass-vcpu-to-ctxt_switch_levelling.patch 57c805c3-x86-levelling-provide-architectural-OSXSAVE-handling.patch 57c82be2-x86-32on64-adjust-call-gate-emulation.patch 57c96e2c-x86-correct-PT_NOTE-file-position.patch 57cfed43-VMX-correct-feature-checks-for-MPX-and-XSAVES.patch- bsc#979002 - add 60-persistent-xvd.rules and helper script also to initrd, add the relevant dracut helper- bnc#953518 - unplug also SCSI disks in qemu-xen-traditional for upstream unplug protocol- bsc#989679 - [pvusb feature] USB device not found when 'virsh detach-device guest usb.xml' 57c93e52-fix-error-in-libxl_device_usbdev_list.patch- bsc#992224 - [HPS Bug] During boot of Xen Hypervisor, Failed to get contiguous memory for DMA from Xen 57ac6316-don-t-restrict-DMA-heap-to-node-0.patch - bsc#978755 - xen uefi systems fail to boot - bsc#983697 - SLES12 SP2 Xen UEFI mode cannot boot 57b71fc5-x86-EFI-don-t-apply-relocations-to-l-2-3-_bootmap.patch - Upstream patch from Jan 57b7447b-dont-permit-guest-to-populate-PoD-pages-for-itself.patch- spec: to stay compatible with the in-tree qemu-xen binary, use /usr/bin/qemu-system-i386 instead of /usr/bin/qemu-system-x86_64 bsc#986164- bsc#970135 - new virtualization project clock test randomly fails on Xen 576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 5769106e-x86-generate-assembler-equates-for-synthesized.patch 57a1e603-x86-time-adjust-local-system-time-initialization.patch 57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch - bsc#991934 - xen hypervisor crash in csched_acct 57973099-have-schedulers-revise-initial-placement.patch 579730e6-remove-buggy-initial-placement-algorithm.patch - bsc#988675 - VUL-0: CVE-2016-6258: xen: x86: Privilege escalation in PV guests (XSA-182) 57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch - bsc#988676 - VUL-0: CVE-2016-6259: xen: x86: Missing SMAP whitelisting in 32-bit exception / event delivery (XSA-183) 57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch - Upstream patches from Jan 57a30261-x86-support-newer-Intel-CPU-models.patch- bsc#985503 - vif-route broken vif-route.patch- bsc#978413 - PV guest upgrade from sles11sp4 to sles12sp2 alpha3 failed on sles11sp4 xen host. pygrub-handle-one-line-menu-entries.patch- bsc#990843 - VUL-1: CVE-2016-6351: xen: qemu: scsi: esp: OOB write access in esp_do_dma CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch- bsc#900418 - Dump cannot be performed on SLES12 XEN 57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch - Upstream patches from Jan 575e9ca0-nested-vmx-Validate-host-VMX-MSRs-before-accessing-them.patch 57640448-xen-sched-use-default-scheduler-upon-an-invalid-sched.patch- fate#319989 - Update to Xen 4.7 FCS xen-4.7.0-testing-src.tar.bz2 - Drop CVE-2014-3672-qemut-xsa180.patch- bsc#954872 - script block-dmmd not working as expected - libxl: error: libxl_dm.c (Additional fixes) block-dmmd- Convert with_stubdom into build_conditional to allow adjusting via prjconf - Convert with_debug into build_conditional to allow adjusting via prjconf- bsc#979002 - add 60-persistent-xvd.rules and helper script to xen-tools-domU to simplify transition to pvops based kernels- Convert with_oxenstored into build_conditional to allow adjusting via prjconf (fate#320836)- bsc#983984 - VUL-0: CVE-2016-5338: xen: qemu: scsi: esp: OOB r/w access while processing ESP_FIFO CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch - bsc#982960 - VUL-0: CVE-2016-5238: xen: qemu: scsi: esp: OOB write when using non-DMA mode in get_cmd CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch- fate#319989 - Update to Xen 4.7 RC5 xen-4.7.0-testing-src.tar.bz2- fate#319989 - Update to Xen 4.7 RC4 xen-4.7.0-testing-src.tar.bz2 - Dropped xen.pkgconfig-4.7.patch xsa164.patch- bsc#981264 - VUL-0: CVE-2014-3672: xen: Unrestricted qemu logging (XSA-180) CVE-2014-3672-qemut-xsa180.patch- bsc#980724 - VUL-0: CVE-2016-4441: Qemu: scsi: esp: OOB write while writing to 's->cmdbuf' in get_cmd CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch - bsc#980716 - VUL-0: CVE-2016-4439: xen: scsi: esp: OOB write while writing to 's->cmdbuf' in esp_reg_write CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch- fate#319989 - Update to Xen 4.7 RC3 xen-4.7.0-testing-src.tar.bz2 - Dropped libxl-remove-cdrom-cachemode.patch x86-PoD-only-reclaim-if-needed.patch gcc6-warnings-as-errors.patch- bsc#954872 - script block-dmmd not working as expected - libxl: error: libxl_dm.c (another modification) block-dmmd- fate#319989 - Update to Xen 4.7 RC2 xen-4.7.0-testing-src.tar.bz2- bsc#961600 - L3: poor performance when Xen HVM domU configured with max memory > current memory x86-PoD-only-reclaim-if-needed.patch- Mark SONAMEs and pkgconfig as xen 4.7 xen.pkgconfig-4.7.patch- bsc#977329 - Xen: Cannot boot HVM guests with empty cdrom libxl-remove-cdrom-cachemode.patch- fate#319989 - Update to Xen 4.7 RC1 xen-4.7.0-testing-src.tar.bz2- fate#316614: set migration constraints from cmdline restore libxl.set-migration-constraints-from-cmdline.patch- Remove obsolete patch for xen-kmp magic_ioport_compat.patch- fate#316613: update to v12 libxl.pvscsi.patch- Update to the latest Xen 4.7 pre-release c2994f86 Drop libxl.migrate-legacy-stream-read.patch- bnc#972756 - Can't migrate HVM guest from SLES12SP1 Xen host to SLES12SP2 Alpha 1 host using xl migrate libxl.migrate-legacy-stream-read.patch- Add patches from proposed upstream series to load BIOS's from the toolstack instead of embedding in hvmloader http://lists.xenproject.org/archives/html/xen-devel/2016-03/msg01626.html 0001-libxc-Rework-extra-module-initialisation.patch, 0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch, 0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch, 0004-firmware-makefile-install-BIOS-blob.patch, 0005-libxl-Load-guest-BIOS-from-file.patch, 0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch, 0007-hvmloader-Grab-the-hvm_start_info-pointer.patch, 0008-hvmloader-Locate-the-BIOS-blob.patch, 0009-hvmloader-Check-modules-whereabouts-in-perform_tests.patch, 0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch, 0011-hvmloader-Load-OVMF-from-modules.patch, 0012-hvmloader-Specific-bios_load-function-required.patch, 0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch, 0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch - Enable support for UEFI on x86_64 using the ovmf-x86_64-ms.bin firmware from qemu-ovmf-x86_64. The firmware is preloaded with Microsoft keys to more closely resemble firmware on real hardware FATE#320490- fate#319989: Update to Xen 4.7 (pre-release) xen-4.7.0-testing-src.tar.bz2 - Dropped: xen-4.6.1-testing-src.tar.bz2 55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch 5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch hotplug-Linux-block-performance-fix.patch set-mtu-from-bridge-for-tap-interface.patch xendomains-libvirtd-conflict.patch xsa154.patch xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa170.patch- Use system SeaBIOS instead of building/installing another one FATE#320638 Dropped files: seabios-dir-remote.tar.bz2 xen-c99-fix.patch xen.build-compare.seabios.patch- spec: drop BuildRequires that were only needed for qemu-xen- bsc#969377 - xen does not build with GCC 6 ipxe-use-rpm-opt-flags.patch gcc6-warnings-as-errors.patch- bsc#969351 - VUL-0: CVE-2016-2841: xen: net: ne2000: infinite loop in ne2000_receive CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch - Drop xsa154-fix.patch- Use system qemu instead of building/installing yet another qemu FATE#320638 - Dropped files qemu-xen-dir-remote.tar.bz2 CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch CVE-2015-4037-qemuu-smb-config-dir-name.patch CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch qemu-xen-enable-spice-support.patch qemu-xen-upstream-qdisk-cache-unsafe.patch tigervnc-long-press.patch xsa162-qemuu.patch- bsc#962321 - VUL-0: CVE-2016-1922: xen: i386: null pointer dereference in vapic_write() CVE-2016-1922-qemuu-i386-null-pointer-dereference-in-vapic_write.patch- bsc#968004 - VUL-0: CVE-2016-2538: xen: usb: integer overflow in remote NDIS control message handling CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch- bsc#954872 - L3: script block-dmmd not working as expected - libxl: error: libxl_dm.c block-dmmd - Update libxl to recognize dmmd and npiv prefix in disk spec xen.libxl.dmmd.patch- bsc#967101 - VUL-0: CVE-2016-2391: xen: usb: multiple eof_timers in ohci module leads to null pointer dereference CVE-2016-2391-qemuu-usb-null-pointer-dereference-in-ohci-module.patch CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch - bsc#967090 - VUL-0: CVE-2016-2392: xen: usb: null pointer dereference in remote NDIS control message handling CVE-2016-2392-qemuu-usb-null-pointer-dereference-in-NDIS-message-handling.patch- Update to Xen Version 4.6.1 xen-4.6.1-testing-src.tar.bz2 - Dropped patches now contained in tarball or unnecessary xen-4.6.0-testing-src.tar.bz2 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 5632129c-free-domain-s-vcpu-array.patch 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 563212e4-xenoprof-free-domain-s-vcpu-array.patch 563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch 56549f24-x86-vPMU-document-as-unsupported.patch 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch xsa155-qemut-qdisk-double-access.patch xsa155-qemut-xenfb.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa159.patch xsa160.patch xsa162-qemut.patch xsa165.patch xsa166.patch xsa167.patch xsa168.patch- bsc#965315 - VUL-0: CVE-2016-2270: xen: x86: inconsistent cachability flags on guest mappings (XSA-154) xsa154.patch - bsc#965317 - VUL-0: CVE-2016-2271: xen: VMX: guest user mode may crash guest with non-canonical RIP (XSA-170) xsa170.patch- bsc#965269 - VUL-1: CVE-2015-8619: xen: stack based OOB write in hmp_sendkey routine CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch- bsc#965156 - VUL-0: CVE-2015-6855: xen: ide: divide by zero issue CVE-2015-6855-qemuu-ide-divide-by-zero-issue.patch - bsc#965112 - VUL-0: CVE-2014-3640: xen: slirp: NULL pointer deref in sosendto() CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch- bsc#964947 - VUL-0: CVE-2015-5278: xen: Infinite loop in ne2000_receive() function CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch - bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch- bsc#964644 - VUL-0: CVE-2013-4533: xen pxa2xx: buffer overrun on incoming migration CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch - bsc#964925 - VUL-0: CVE-2014-0222: xen: qcow1: validate L2 table size to avoid integer overflows CVE-2014-0222-blktap-qcow1-validate-l2-table-size.patch - Dropped CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch- bsc#964415 - VUL-1: CVE-2016-2198: xen: usb: ehci null pointer dereference in ehci_caps_write CVE-2016-2198-qemuu-usb-ehci-null-pointer-dereference-in-ehci_caps_write.patch - bsc#964452 - VUL-0: CVE-2013-4534: xen: openpic: buffer overrun on incoming migration CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch- bsc#963783 - VUL-1: CVE-2016-1981: xen: net: e1000 infinite loop in start_xmit and e1000_receive_iov routines CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch- bsc#962758 - VUL-0: CVE-2013-4539: xen: tsc210x: buffer overrun on invalid state load CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch- bsc#962632 - VUL-0: CVE-2015-1779: xen: vnc: insufficient resource limiting in VNC websockets decoder CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch - bsc#962642 - VUL-0: CVE-2013-4537: xen: ssi-sd: buffer overrun on invalid state load CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch - bsc#962627 - VUL-0: CVE-2014-7815: xen: vnc: insufficient bits_per_pixel from the client sanitization CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch- bsc#962335 - VUL-0: CVE-2013-4538: xen: ssd0323: fix buffer overun on invalid state CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch - bsc#962360 - VUL-0: CVE-2015-7512: xen: net: pcnet: buffer overflow in non-loopback mode CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch- bsc#961692 - VUL-0: CVE-2016-1714: xen: nvram: OOB r/w access in processing firmware configurations CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch- bsc#961358 - VUL-0: CVE-2015-8613: xen: qemu: scsi: stack based buffer overflow in megasas_ctrl_get_info CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch - bsc#961332 - VUL-0: CVE-2016-1568: xen: Qemu: ide: ahci use-after-free vulnerability in aio port commands CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch- bsc#959695 - missing docs for xen xen.spec- bsc#960862 - VUL-0: CVE-2016-1571: xen: VMX: intercept issue with INVLPG on non-canonical address (XSA-168) xsa168.patch - bsc#960861 - VUL-0: CVE-2016-1570: xen: PV superpage functionality missing sanity checks (XSA-167) xsa167.patch - bsc#960836 - VUL-0: CVE-2015-8744: xen: net: vmxnet3: incorrect l2 header validation leads to a crash via assert(2) call CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch- bsc#960707 - VUL-0: CVE-2015-8745: xen: reading IMR registers leads to a crash via assert(2) call CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch - bsc#960726 - VUL-0: CVE-2015-8743: xen: ne2000: OOB memory access in ioport r/w functions CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch- bsc#960093 - VUL-0: CVE-2015-8615: xen: x86: unintentional logging upon guest changing callback method (XSA-169) 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch- Adjust xen-dom0-modules.service to run Before xenstored.service instead of proc-xen.mount to workaround a bug in systemd "design" (bnc#959845)- bsc#959387 - VUL-0: CVE-2015-8568 CVE-2015-8567: xen: qemu: net: vmxnet3: host memory leakage CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch- bsc#957988 - VUL-0: CVE-2015-8550: xen: paravirtualized drivers incautious about shared memory contents (XSA-155) xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemut-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa155-qemut-xenfb.patch - bsc#959006 - VUL-0: CVE-2015-8558: xen: qemu: usb: infinite loop in ehci_advance_state results in DoS CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch - bsc#958918 - VUL-0: CVE-2015-7549: xen: qemu pci: null pointer dereference issue CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch - bsc#958493 - VUL-0: CVE-2015-8504: xen: qemu: ui: vnc: avoid floating point exception CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch - bsc#958007 - VUL-0: CVE-2015-8554: xen: qemu-dm buffer overrun in MSI-X handling (XSA-164) xsa164.patch - bsc#958009 - VUL-0: CVE-2015-8555: xen: information leak in legacy x86 FPU/XMM initialization (XSA-165) xsa165.patch - bsc#958523 - VUL-0: xen: ioreq handling possibly susceptible to multiple read issue (XSA-166) xsa166.patch- bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch - Upstream patches from Jan 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch) 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 56544a57-VMX-fix-adjust-trap-injection.patch 56546ab2-sched-fix-insert_vcpu-locking.patch- bsc#956592 - VUL-0: xen: virtual PMU is unsupported (XSA-163) 56549f24-x86-vPMU-document-as-unsupported.patch - bsc#956408 - VUL-0: CVE-2015-8339, CVE-2015-8340: xen: XENMEM_exchange error handling issues (XSA-159) xsa159.patch - bsc#956409 - VUL-0: CVE-2015-8341: xen: libxl leak of pv kernel and initrd on error (XSA-160) xsa160.patch - bsc#956411 - VUL-0: CVE-2015-7504: xen: heap buffer overflow vulnerability in pcnet emulator (XSA-162) xsa162-qemuu.patch xsa162-qemut.patch - bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142) 5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch- fate#315712: XEN: Use the PVOPS kernel Turn off building the KMPs now that we are using the pvops kernel xen.spec- Upstream patches from Jan 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 5632129c-free-domain-s-vcpu-array.patch (Replaces CVE-2015-7969-xsa149.patch) 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 563212e4-xenoprof-free-domain-s-vcpu-array.patch 563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch) 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch - Dropped 55b0a2db-x86-MSI-track-guest-masking.patch- Use upstream variants of block-iscsi and block-nbd- Remove xenalyze.hg, its part of xen-4.6- Update to Xen Version 4.6.0 xen-4.6.0-testing-src.tar.bz2 mini-os.tar.bz2 blktap2-no-uninit.patch stubdom-have-iovec.patch - Renamed xsa149.patch to CVE-2015-7969-xsa149.patch - Dropped patches now contained in tarball or unnecessary xen-4.5.2-testing-src.tar.bz2 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch 54f4985f-libxl-fix-libvirtd-double-free.patch 55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 551ac326-xentop-add-support-for-qdisk.patch 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch 5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 554cc211-libxl-add-qxl.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch 5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch 5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch 5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch 5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch 5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch 5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch 55b0a218-x86-PCI-CFG-write-intercept.patch 55b0a255-x86-MSI-X-maskall.patch 55b0a283-x86-MSI-X-teardown.patch 55b0a2ab-x86-MSI-X-enable.patch blktapctrl-close-fifos.patch blktapctrl-default-to-ioemu.patch blktapctrl-disable-debug-printf.patch blktap-no-uninit.patch blktap-pv-cdrom.patch build-tapdisk-ioemu.patch ioemu-bdrv-open-CACHE_WB.patch ioemu-blktap-barriers.patch ioemu-blktap-fv-init.patch ioemu-blktap-image-format.patch ioemu-blktap-zero-size.patch libxl.set-migration-constraints-from-cmdline.patch local_attach_support_for_phy.patch pci-attach-fix.patch qemu-xen-upstream-megasas-buildtime.patch tapdisk-ioemu-logfile.patch tapdisk-ioemu-shutdown-fix.patch udev-rules.patch xen.build-compare.ipxe.patch xen.build-compare.mini-os.patch xen.build-compare.smbiosdate.patch xen.build-compare.vgabios.patch xen.build-compare.xen_compile_h.patch xl-coredump-file-location.patch- bsc#954405 - VUL-0: CVE-2015-8104: Xen: guest to host DoS by triggering an infinite loop in microcode via #DB exception - bsc#954018 - VUL-0: CVE-2015-5307: xen: x86: CPU lockup during fault delivery (XSA-156) CVE-2015-5307-xsa156.patch- Update to Xen 4.5.2 xen-4.5.2-testing-src.tar.bz2 - Drop the following xen-4.5.1-testing-src.tar.bz2 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 559bdde5-pull-in-latest-linux-earlycpio.patch 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch 560bd926-credit1-fix-tickling-when-it-happens-from-a-remote-pCPU.patch 560e6d34-x86-p2m-pt-tighten-conditions-of-IOMMU-mapping-updates.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch CVE-2015-4106-xsa131-9.patch CVE-2015-3259-xsa137.patch CVE-2015-7311-xsa142.patch CVE-2015-7835-xsa148.patch xsa139-qemuu.patch xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch xsa151.patch xsa152.patch xsa153-libxl.patch CVE-2015-5154-qemuu-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemuu-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch"- bsc#950704 - CVE-2015-7970 VUL-1: xen: x86: Long latency populate-on-demand operation is not preemptible (XSA-150) 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch- Upstream patches from Jan 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch- bsc#951845 - VUL-0: CVE-2015-7972: xen: x86: populate-on-demand balloon size inaccuracy can crash guests (XSA-153) xsa153-libxl.patch- bsc#950703 - VUL-1: CVE-2015-7969: xen: leak of main per-domain vcpu pointer array (DoS) (XSA-149) xsa149.patch - bsc#950705 - VUL-1: CVE-2015-7969: xen: x86: leak of per-domain profiling-related vcpu pointer array (DoS) (XSA-151) xsa151.patch - bsc#950706 - VUL-0: CVE-2015-7971: xen: x86: some pmu and profiling hypercalls log without rate limiting (XSA-152) xsa152.patch - Dropped 55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch 5604f239-x86-PV-properly-populate-descriptor-tables.patch- bsc#932267 - VUL-1: CVE-2015-4037: qemu,kvm,xen: insecure temporary file use in /net/slirp.c CVE-2015-4037-qemuu-smb-config-dir-name.patch CVE-2015-4037-qemut-smb-config-dir-name.patch - bsc#877642 - VUL-0: CVE-2014-0222: qemu: qcow1: validate L2 table size to avoid integer overflows CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch- bsc#950367 - VUL-0: CVE-2015-7835: xen: x86: Uncontrolled creation of large page mappings by PV guests (XSA-148) CVE-2015-7835-xsa148.patch- bsc#949138 - Setting vcpu affinity under Xen causes libvirtd abort 54f4985f-libxl-fix-libvirtd-double-free.patch- bsc#949046 - Increase %suse_version in SP1 to 1316 xen.spec - Update README.SUSE detailing dom0 ballooning recommendations- bsc#945167 - Running command ’ xl pci-assignable-add 03:10.1’ secondly show errors 55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch - Upstream patches from Jan 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f239-x86-PV-properly-populate-descriptor-tables.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch 560bd926-credit1-fix-tickling-when-it-happens-from-a-remote-pCPU.patch 560e6d34-x86-p2m-pt-tighten-conditions-of-IOMMU-mapping-updates.patch- bsc#941074 - VmError: Device 51728 (vbd) could not be connected. Hotplug scripts not working. hotplug-Linux-block-performance-fix.patch- bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142) CVE-2015-7311-xsa142.patch- bsc#945165 - Xl pci-attach show error with kernel of SLES 12 sp1 pci-attach-fix.patch- bsc#945164 - Xl destroy show error with kernel of SLES 12 sp1 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch- Upstream patches from Jan 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch- bsc#944463 - VUL-0: CVE-2015-5239: qemu-kvm: Integer overflow in vnc_client_read() and protocol_client_msg() CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch - bsc#944697 - VUL-1: CVE-2015-6815: qemu: net: e1000: infinite loop issue CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch- bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch- bsc#907514 - Bus fatal error & sles12 sudden reboot has been observed - bsc#910258 - SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984 - Bus fatal error & sles11-SP4 sudden reboot has been observed - bsc#923967 - Partner-L3: Bus fatal error & sles11-SP3 sudden reboot has been observed 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 55b0a218-x86-PCI-CFG-write-intercept.patch 55b0a255-x86-MSI-X-maskall.patch 55b0a283-x86-MSI-X-teardown.patch 55b0a2ab-x86-MSI-X-enable.patch 55b0a2db-x86-MSI-track-guest-masking.patch - Upstream patches from Jan 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch - Dropped for upstream version x86-MSI-mask.patch x86-MSI-pv-unmask.patch x86-MSI-X-enable.patch x86-MSI-X-maskall.patch x86-MSI-X-teardown.patch x86-pci_cfg_okay.patch x86-PCI-CFG-write-intercept.patch- bsc#939712 - VUL-0: XSA-140: QEMU leak of uninitialized heap memory in rtl8139 device model xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch - bsc#939709 - VUL-0: XSA-139: xen: Use after free in QEMU/Xen block unplug protocol xsa139-qemuu.patch- bsc#937371 - xen vm's running after reboot xendomains-libvirtd-conflict.patch- bsc#938344 - VUL-0: CVE-2015-5154: qemu,kvm,xen: host code execution via IDE subsystem CD-ROM CVE-2015-5154-qemuu-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemuu-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch- Remove xendomains.service from systemd preset file because it conflicts with libvirt-guests.service (bnc#937371) Its up to the admin to run systemctl enable xendomains.service- bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow CVE-2015-3259-xsa137.patch - Upstream patches from Jan 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bdde5-pull-in-latest-linux-earlycpio.patch - Upstream patches from Jan pending review 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch 5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch 5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch 5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch 5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch 5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch x86-MSI-pv-unmask.patch x86-pci_cfg_okay.patch x86-PCI-CFG-write-intercept.patch x86-MSI-X-maskall.patch x86-MSI-X-teardown.patch x86-MSI-X-enable.patch x86-MSI-mask.patch- Adjust more places to use br0 instead of xenbr0- bnc#936516 - xen fails to build with kernel update(4.1.0 from stable) 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch- Update to Xen Version 4.5.1 FCS (fate#315675) xen-4.5.1-testing-src.tar.bz2 - Dropped patches now contained in tarball 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch qemu-MSI-X-enable-maskall.patch qemu-MSI-X-latch-writes.patch x86-MSI-X-guest-mask.patch- Replace 5124efbe-add-qxl-support.patch with the variant that finally made it upstream, 554cc211-libxl-add-qxl.patch- bsc#931627 - VUL-0: CVE-2015-4105: XSA-130: xen: Guest triggerable qemu MSI-X pass-through error messages qemu-MSI-X-latch-writes.patch - bsc#907514 - Bus fatal error & sles12 sudden reboot has been observed - bsc#910258 - SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984 - Bus fatal error & sles11-SP4 sudden reboot has been observed - bsc#923967 - Partner-L3: Bus fatal error & sles11-SP3 sudden reboot has been observed x86-MSI-X-teardown.patch x86-MSI-X-enable.patch x86-MSI-X-guest-mask.patch x86-MSI-X-maskall.patch qemu-MSI-X-enable-maskall.patch - Upstream patches from Jan 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch - Dropped the following patches now contained in the tarball xen-no-array-bounds.patch CVE-2015-4103-xsa128.patch CVE-2015-4104-xsa129.patch CVE-2015-4105-xsa130.patch CVE-2015-4106-xsa131-1.patch CVE-2015-4106-xsa131-2.patch CVE-2015-4106-xsa131-3.patch CVE-2015-4106-xsa131-4.patch CVE-2015-4106-xsa131-5.patch CVE-2015-4106-xsa131-6.patch CVE-2015-4106-xsa131-7.patch CVE-2015-4106-xsa131-8.patch- Update to Xen 4.5.1 RC2 - bsc#931628 - VUL-0: CVE-2015-4106: XSA-131: xen: Unmediated PCI register access in qemu CVE-2015-4106-xsa131-1.patch CVE-2015-4106-xsa131-2.patch CVE-2015-4106-xsa131-3.patch CVE-2015-4106-xsa131-4.patch CVE-2015-4106-xsa131-5.patch CVE-2015-4106-xsa131-6.patch CVE-2015-4106-xsa131-7.patch CVE-2015-4106-xsa131-8.patch CVE-2015-4106-xsa131-9.patch - bsc#931627 - VUL-0: CVE-2015-4105: XSA-130: xen: Guest triggerable qemu MSI-X pass-through error messages CVE-2015-4105-xsa130.patch - bsc#931626 - VUL-0: CVE-2015-4104: XSA-129: xen: PCI MSI mask bits inadvertently exposed to guests CVE-2015-4104-xsa129.patch - bsc#931625 - VUL-0: CVE-2015-4103: XSA-128: xen: Potential unintended writes to host MSI message data field via qemu CVE-2015-4103-xsa128.patch - Upstream patches from Jan 5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch- Add DefaultDependencies=no to xen-dom0-modules.service because it has to run before proc-xen.mount- Update to Xen 4.5.1 RC1- Update blktap-no-uninit.patch to work with gcc-4.5- bsc#927967 - VUL-0: CVE-2015-3340: xen: Information leak through XEN_DOMCTL_gettscinfo (XSA-132) 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch- bnc#929339 - VUL-0: CVE-2015-3456: qemu kvm xen: VENOM qemu floppy driver host code execution CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch- bsc#928783 - Reboot failure; Request backport of upstream Xen patch to 4.5.0, or update pkgs to 4.5.1 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch- bnc#927750 - Avoid errors reported by system-modules-load.service- Add xen-no-array-bounds.patch and blktap-no-uninit.patch to selectively turn errors back to warnings to fix build with GCC 5. - Amend xen.stubdom.newlib.patch to pull in declaration of strcmp to avoid implicit-fortify-decl rpmlint error. - Fix quoting of __SMBIOS_DATE__ in xen.build-compare.smbiosdate.patch.- xentop: Fix memory leak on read failure 551ac326-xentop-add-support-for-qdisk.patch- Dropped xentop-add-support-for-qdisk.patch in favor of upstream version 551ac326-xentop-add-support-for-qdisk.patch- Enable spice support in qemu for x86_64 5124efbe-add-qxl-support.patch qemu-xen-enable-spice-support.patch- Add xen-c99-fix.patch to remove pointless inline specifier on function declarations which break build with a C99 compiler which GCC 5 is by default. (bsc#921994) - Add ipxe-no-error-logical-not-parentheses.patch to supply - Wno-logical-not-parentheses to the ipxe build to fix breakage with GCC 5. (bsc#921994)- bnc#921842 - Xentop doesn't display disk statistics for VMs using qdisks xentop-add-support-for-qdisk.patch- Disable the PIE enablement done for Factory, as the XEN code is not buildable with PIE and it does not make much sense to build the hypervisor code with it.- bnc#918169 - XEN fixes required to work with Kernel 3.19.0 xen.spec- Package xen.changes because its referenced in xen.spec- Update seabios to rel-1.7.5 which is the correct version for Xen 4.5- Update to Xen 4.5.0 FCS- Include systemd presets in 13.2 and older- bnc#897352 - Enable xencommons/xendomains only during fresh install - disable restart on upgrade because the toolstack is not restartable- adjust seabios, vgabios, stubdom and hvmloader build to reduce build-compare noise xen.build-compare.mini-os.patch xen.build-compare.smbiosdate.patch xen.build-compare.ipxe.patch xen.build-compare.vgabios.patch xen.build-compare.seabios.patch xen.build-compare.man.patch- Update to Xen 4.5.0 RC4- Remove xend specific if-up scripts Recording bridge slaves is a generic task which should be handled by generic network code- Use systemd features from upstream requires updated systemd-presets-branding package- Update to Xen 4.5.0 RC3- Set GIT, WGET and FTP to /bin/false- Use new configure features instead of make variables xen.stubdom.newlib.patch- adjust docs and xen build to reduce build-compare noise xen.build-compare.doc_html.patch xen.build-compare.xen_compile_h.patch- Drop trailing B_CNT from XEN_EXTRAVERSION to reduce build-compare noise- Update to Xen 4.5.0 RC2- Update to Xen 4.5.0 RC1 xen-4.5.0-testing-src.tar.bz2 - Remove all patches now contained in the new tarball xen-4.4.1-testing-src.tar.bz2 5315a3bb-x86-don-t-propagate-acpi_skip_timer_override-do-Dom0.patch 5315a43a-x86-ACPI-also-print-address-space-for-PM1x-fields.patch 53299d8f-xenconsole-reset-tty-on-failure.patch 53299d8f-xenconsole-tolerate-tty-errors.patch 5346a7a0-x86-AMD-support-further-feature-masking-MSRs.patch 53563ea4-x86-MSI-drop-workaround-for-insecure-Dom0-kernels.patch 537c9c77-libxc-check-return-values-on-mmap-and-madvise.patch 537cd0b0-hvmloader-also-cover-PCI-MMIO-ranges-above-4G-with-UC-MTRR-ranges.patch 537cd0cc-hvmloader-PA-range-0xfc000000-0xffffffff-should-be-UC.patch 539ebe62-x86-EFI-improve-boot-time-diagnostics.patch 53aac342-x86-HVM-consolidate-and-sanitize-CR4-guest-reserved-bit-determination.patch 53c9151b-Fix-xl-vncviewer-accesses-port-0-by-any-invalid-domid.patch 53d124e7-fix-list_domain_details-check-config-data-length-0.patch 53dba447-x86-ACPI-allow-CMOS-RTC-use-even-when-ACPI-says-there-is-none.patch 53df727b-x86-HVM-extend-LAPIC-shortcuts-around-P2M-lookups.patch 53e8be5f-x86-vHPET-use-rwlock-instead-of-simple-one.patch 53f737b1-VMX-fix-DebugCtl-MSR-clearing.patch 53f7386d-x86-irq-process-softirqs-in-irq-keyhandlers.patch 53fcebab-xen-pass-kernel-initrd-to-qemu.patch 53ff3659-x86-consolidate-boolean-inputs-in-hvm-and-p2m.patch 53ff36ae-x86-hvm-treat-non-insn-fetch-NPF-also-as-read-violations.patch 53ff36d5-x86-mem_event-deliver-gla-fault-EPT-violation-information.patch 53ff3716-x86-ats-Disable-Address-Translation-Services-by-default.patch 53ff3899-x86-NMI-allow-processing-unknown-NMIs-with-watchdog.patch 54005472-EPT-utilize-GLA-GPA-translation-known-for-certain-faults.patch 540effe6-evtchn-check-control-block-exists-when-using-FIFO-based-events.patch 540f2624-x86-idle-add-barriers-to-CLFLUSH-workaround.patch 541825dc-VMX-don-t-leave-x2APIC-MSR-intercepts-disabled.patch 541ad385-x86-suppress-event-check-IPI-to-MWAITing-CPUs.patch 541ad3ca-x86-HVM-batch-vCPU-wakeups.patch 541ad81a-VT-d-suppress-UR-signaling-for-further-desktop-chipsets.patch 54216833-x86-shadow-fix-race-when-sampling-dirty-vram-state.patch 54216882-x86-emulate-check-cpl-for-all-privileged-instructions.patch 542168ae-x86emul-only-emulate-swint-injection-for-real-mode.patch 54228a37-x86-EFI-fix-freeing-of-uninitialized-pointer.patch 5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch 5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch 542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch 542bf997-x86-HVM-properly-bound-x2APIC-MSR-range.patch 54325cc0-x86-MSI-fix-MSI-X-case-of-freeing-IRQ.patch 54325d2f-x86-restore-reserving-of-IO-APIC-pages-in-XENMEM_machine_memory_map-output.patch 54325d95-don-t-allow-Dom0-access-to-IOMMUs-MMIO-pages.patch 54325ecc-AMD-guest_iommu-properly-disable-guest-iommu-support.patch 54325f3c-x86-paging-make-log-dirty-operations-preemptible.patch 54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch CVE-2013-4540-qemu.patch qemu-support-xen-hvm-direct-kernel-boot.patch qemu-xen-upstream-blkif-discard.patch change-vnc-passwd.patch libxc-pass-errno-to-callers-of-xc_domain_save.patch libxl.honor-more-top-level-vfb-options.patch libxl.add-option-for-discard-support-to-xl-disk-conf.patch libxl.introduce-an-option-to-disable-the-non-O_DIRECT-workaround.patch x86-dom-print.patch x86-extra-trap-info.patch tmp_build.patch xl-check-for-libvirt-managed-domain.patch disable-wget-check.patch - Xend/xm is no longer supported and is not part of the upstream code. Remove all xend/xm specific patches, configs, and scripts xen-xmexample.patch bridge-opensuse.patch xmexample.disks xmclone.sh init.xend xend-relocation.sh xend.service xend-relocation-server.fw domUloader.py xmexample.domUloader xmexample.disks bridge-vlan.patch bridge-bonding.patch bridge-record-creation.patch network-nat-open-SuSEfirewall2-FORWARD.patch xend-set-migration-constraints-from-cmdline.patch xen.migrate.tools-xend_move_assert_to_exception_block.patch xend-pvscsi-recognize-also-SCSI-CDROM-devices.patch xend-config.patch xend-max-free-mem.patch xend-hvm-default-pae.patch xend-vif-route-ifup.patch xend-xenapi-console-protocol.patch xend-core-dump-loc.patch xend-xen-api-auth.patch xend-checkpoint-rename.patch xend-xm-save-check-file.patch xend-xm-create-xflag.patch xend-domu-usb-controller.patch xend-devid-or-name.patch xend-migration-domname-fix.patch xend-del_usb_xend_entry.patch xend-xen-domUloader.patch xend-multi-xvdp.patch xend-check_device_status.patch xend-change_home_server.patch xend-minimum-restart-time.patch xend-disable-internal-logrotate.patch xend-config-enable-dump-comment.patch xend-tools-watchdog-support.patch xend-console-port-restore.patch xend-vcpu-affinity-fix.patch xend-migration-bridge-check.patch xend-managed-pci-device.patch xend-hvm-firmware-passthrough.patch xend-cpuinfo-model-name.patch xend-xm-reboot-fix.patch xend-domain-lock.patch xend-domain-lock-sfex.patch xend-32on64-extra-mem.patch xend-hv_extid_compatibility.patch xend-xenpaging.autostart.patch xend-remove-xm-deprecation-warning.patch libxen_permissive.patch tmp-initscript-modprobe.patch init.xendomains xendomains.service xen-watchdog.service xen-updown.sh- bnc#901317 - L3: increase limit domUloader to 32MB domUloader.py- bnc#898772 - SLES 12 RC3 - XEN Host crashes when assigning non-VF device (SR-IOV) to guest 54325cc0-x86-MSI-fix-MSI-X-case-of-freeing-IRQ.patch - bnc#882089 - Windows 2012 R2 fails to boot up with greater than 60 vcpus 54325ecc-AMD-guest_iommu-properly-disable-guest-iommu-support.patch - bnc#826717 - VUL-0: CVE-2013-3495: XSA-59: xen: Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts 541ad81a-VT-d-suppress-UR-signaling-for-further-desktop-chipsets.patch - Upstream patches from Jan 540effe6-evtchn-check-control-block-exists-when-using-FIFO-based-events.patch (Replaces xsa107.patch) 54216833-x86-shadow-fix-race-when-sampling-dirty-vram-state.patch (Replaces xsa104.patch) 54216882-x86-emulate-check-cpl-for-all-privileged-instructions.patch (Replaces xsa105.patch) 542168ae-x86emul-only-emulate-swint-injection-for-real-mode.patch (Replaces xsa106.patch) 54228a37-x86-EFI-fix-freeing-of-uninitialized-pointer.patch 5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch 5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch 542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch 542bf997-x86-HVM-properly-bound-x2APIC-MSR-range.patch (Replaces xsa108.patch) 54325d2f-x86-restore-reserving-of-IO-APIC-pages-in-XENMEM_machine_memory_map-output.patch 54325d95-don-t-allow-Dom0-access-to-IOMMUs-MMIO-pages.patch 54325f3c-x86-paging-make-log-dirty-operations-preemptible.patch (Replaces xsa97.patch) 54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~1.04.10.01.11.11.21.14.10.04.10.00.03.0.31.01.04.10.04.10.04.10.4_06-lp150.2.25.14.10.4_06-lp150.2.25.1  _libxl_list.h_libxl_types.h_libxl_types_json.hfsimage.hfsimage_grub.hfsimage_plugin.hlibxenvchan.hlibxl.hlibxl_event.hlibxl_json.hlibxl_utils.hlibxl_uuid.hlibxlutil.hxenCOPYINGarch-armarch-arm.hhvmsave.harch-x86cpufeatureset.hcpuid.hhvmsave.hstart_info.hpmu.hxen-mca.hxen-x86_32.hxen-x86_64.hxen.harch-x86_32.harch-x86_64.hcallback.hdom0_ops.hdomctl.helfnote.herrno.hevent_channel.hfeatures.hforeignarm32.harm64.hx86_32.hx86_64.hgrant_table.hhvmdm_op.he820.hhvm_info_table.hhvm_op.hhvm_vcpu.hhvm_xs_strings.hioreq.hparams.hpvdrivers.hsave.hio9pfs.hblkif.hconsole.hdisplif.hfbif.hfsif.hkbdif.hlibxenvchan.hnetif.hpciif.hprotocols.hpvcalls.hring.hsndif.htpmif.husbif.hvscsiif.hxenbus.hxs_wire.hkexec.hmemory.hnmi.hphysdev.hplatform.hpmu.hsched.hsysevtchn.hgntalloc.hgntdev.hprivcmd.hxenbus_dev.hsysctl.htmem.htrace.hvcpu.hversion.hvm_event.hxen-compat.hxen.hxencomm.hxenoprof.hxsmflask_op.hxencall.hxenctrl.hxenctrl_compat.hxendevicemodel.hxenevtchn.hxenforeignmemory.hxengnttab.hxenguest.hxenstat.hxenstore-compatxs.hxs_lib.hxenstore.hxenstore_lib.hxentoolcore.hxentoollog.hxs.hxs_lib.hlibfsimage.solibxencall.alibxencall.solibxenctrl.alibxenctrl.solibxendevicemodel.alibxendevicemodel.solibxenevtchn.alibxenevtchn.solibxenforeignmemory.alibxenforeignmemory.solibxengnttab.alibxengnttab.solibxenguest.alibxenguest.solibxenlight.alibxenlight.solibxenstat.alibxenstat.solibxenstore.alibxenstore.solibxentoolcore.alibxentoolcore.solibxentoollog.alibxentoollog.solibxenvchan.alibxenvchan.solibxlutil.alibxlutil.soxencall.pcxencontrol.pcxendevicemodel.pcxenevtchn.pcxenforeignmemory.pcxengnttab.pcxenguest.pcxenlight.pcxenstat.pcxenstore.pcxentoolcore.pcxentoollog.pcxenvchan.pcxlutil.pc/usr/include//usr/include/xen//usr/include/xen/arch-arm//usr/include/xen/arch-arm/hvm//usr/include/xen/arch-x86//usr/include/xen/arch-x86/hvm//usr/include/xen/foreign//usr/include/xen/hvm//usr/include/xen/io//usr/include/xen/sys//usr/include/xen/xsm//usr/include/xenstore-compat//usr/lib64//usr/share/pkgconfig/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:11478/openSUSE_Leap_15.0_Update/2ff7bbfe6252b11e375926823eedd926-xen.openSUSE_Leap_15.0_Updatedrpmxz5x86_64-suse-linuxC source, ASCII textASCII textdirectorycurrent ar archivepkgconfig fileutf-8261123e86e48373794f05c0e11fae65f5c21e8ec77a4d3f1d310c04f241f2195?p7zXZ !t/q]"k%A9d xU=iY HZ%ĦFC-ho쉻D.&}$ӿJWCZdSHt/ė za;%=_~v^I39pij 3: 9zF^MhE'uJ-nܙ~]AT#R@"0=N[0iAiBA*sD=pG큝:zom=ӦOCxU!!ӴG +[>OsYVa@_Ңh;h+{QS!B~dCߥ9MǽI-Qie!}zF׃vwh W+QFSMX%H*'3:Ӆ&EF  1X,qS(kerكAh h ^n+)(LfQV))(c٪f>cxy fPЊ7lJj =<_067c`A^GIH LU6`]ō]1dGIԉdW%!! &:0䌷ݷpwFxo5 3 {P^C4-L;#>9@H.JDwCLīn3xnQLp LSs`ǒ˙>6eJČCKQËt8yCTQU,>@MuI?6Očf[x%.ȑ@~ِ\;.O]AP@-Y{T~Ǝ\rqui|Vt0poL7{]l62 mr<݊i,%y">;ZR@ @y IB4k=ôރEj`b<7f W ڜ,^s*Аຄc?K6aMiG(ZT+qGK-M67gkC x'5IC`.лzaHwn@`_6hm:D^4 /54=c:i\ZJS:Nٸ#8lP^S:왢N2tiiպ1Uvwv>h pyXEɟJ@O*Ѭu_ <)>ZL̥ZW!uFh(ŤdeM_-Ղ%Swy*Y/1 ž UO6y^IP6"Q zGrf"0T>2e@ 97@3Xs| [{Ms),P? ObD]`Z%J r@^eKGV~>;oA'܍]Geuӛyv0 ckCZL2%8H1aHoJC'{w($֭tO )0.Gk=iYVGV!ҔYP oI#@[A^{FDd?uəy\Fe'eFc_YY W= Oza8YB?]%++a3בxj0Ha`@sNa]y6S  0)ØFy*!ގz̑ar:Ny+!)Q`U Ѯ. !l½N/~3 |VI L{Cq8Յk wHلQ~rÏ ۱(L ^% bQ*ApAuDJ?<VI}V )./|z{`T&RB2S#ϺFC[x/>xi$n\rUl`jF>BլīTh*bqρh <z]n慙MRVwڞfd4uPނەQ{ݺ\ˌ 02L,༨\^z|{FYd-CW41\-V'*_X.##{ E{ml+w7+ ++<{л(`&.Eƥ#h5}"Mr|L[\"xڢ#\*۫Iߏ}njۛ6JLf?&35Ͼ˼xզywBIr? @F4AQ`K3vۚa/mL`84@* dj>n#od5mgbi8fyo^BʜЈ`ʼnCѝE~@(֤m[(H"+7ӐT6p5k8zus4o'~H G>3;-sp:,EP9a1lZ'Wa?) "=q6tI ٩׽D 5a11 PxhɌV8 X5RfjG%Q7G]^"vqao!Ĭ{kmB$)熝0">,\0sH w @!ʸVC kiu UR-_DMJzBǶO-%Tkau0^~U>~O[yn3Ut{\< ≱n}ҞxǾq'sTAa۱O ݜ²P,aF&rCc?7 {?Sx9ٻu5䊬*L*Hfn_@暨9&Y<آRˎ]|8Gdl0LS0+Ui ^T[bVry."{dU˅ Z m Sd7FɇI,UAͲfjS~OP%]߅h[X;!^FSI2VJIoQWKv *j'Hu什ǛNzr}(uHhƌYŠЮpX@QD2? a˰,~ ?2qkM!8bPU:]ɛ:5yMFdhKzF[KwP變YC𻣴 }-F6H`{3@ED<\`hQo:WOUaRS>鈑ţIگR1a$m8((hI 6e{Ψ,ٔFݹm Xߛ8H~2W%* ʂ*+;(T17:s;O,RF2D: NahV%I+Ԁ܎ㅂ2 \vnIbA):ܬ_Kpi iퟅkwWgO:Q6V.ǀyz:7._ ւuLtMKք0Xv!rrYH4 Lni7Nʇ> gwX{ ^nFYf[6 g!OQ5h0x5q߲jwfDE&$&K1-{3Oh  OkyQxU,IB5V^I oN_^<+͉_?S|3sNQq <Y{R͋ 9*L0\<&km7{y*n_"HRBg7`CшJ`VR7 mO49]uyȥ5~C?%D)/lF8Ϊ [ͫ𲢾,Fo(#km[@{Рŝܑݿ_gp˰GV+z7qD'?~3$%SX&Uʜz0OaJŊ{Ղ[JI$΁Isg)$k\xG1e7q# :V7zb+os"{CCt>؄ \Y9BJ,dwC)ub l.gI?bTSi^Fh)З]VAR@ހٻ9~*k/pvê0WUI;܉wJoZC_}*63uLqYx4>m}mti6C *]؟ؽyWJ7o9ڮuM.CДoanZf'}r#v7嵈#k@` R6NqtҴ\fc_x ȲTQK-bc+a,^(K*r(eRn^?߬ΛӺFFW?Pz' !UH_àx JFD$8L.ɂ?#t{31Tp1cTcK|q%3K BgHф/9]FqEo+q%!y#t{k@ޙq,){L~t͟@1 s&3;}qg7ˣߚ?}ee+D+S^tA{dI'S"p8GJ4i^muV*ʭ}&kWw"e v *5 T3.FXIxI.mFq=scJbvHE Xze*gsy7D! %Uc_|8Vf\ |Ї ]^Q n }qzJ#l \$Tsf=-&6kf愸ŦaBvQNNAPS %^ĒeȜIpd]_JVQ$56"LC0CoOK>Ʃص\DMVS6߰Bk)UsԾrFy !`yh˜cZr=P#OpLU 0tJ?jIip}}(n\7M䵽lj@i00s^~¼3AS iyIT;-8ڬLqyU-:tmoh-4j&{:k]c DۯPq د1F5bhAҼ\5ϑ*xտ)6v*<:!r7ʚ1:HjK-3Po1ρ+ɭ^p\E̸~%'׀:pkJSg" CՖ~\SDBd6d&=/a WmHzz<{Jzz+_I (vyO*U# :ϻ!ۀr /5o쉬F&hU.s2Wy L!T$!Qyoyo}5Ց~ NO3;XC1"`?-W^ٕ{|D(LJbb9hMYUM_|:mKGF:kEQZ끵y@Kha&ZGk)8!'1pWԢn5a ހxpL򑟩N[&M &.H9ԴW(_wbZy]C^#7pE2YSٿ8̈́> ?AuÖt\ oՕ%֡&2Е]:|uFMՅR$D@zY|: k>K7O}-D e&8w{Ń ]_q*0(ED~Mڍ›st쯁 ^Xq%9',I" 8{Jk1885l̝o*+'R'}b:usa)im t<T {6'aKcjD$F ,%ӆY<^Qq*i~5>]sk~9HlZy@zR:(UG(v5>?<`^ E>kωVkƚgg vս",9tr:R1η2o.i䅳 dŌ NeEI\xJ3U:J)ŭtbs0a5 8{|UXdT il 2v%k4oL[BK!S}U{}8~:H_io$[8i3tBZq0. zg5 u:ƙu8U<+UЕ3Wg.t ~L$:pQsU*Ow]xaMl~(]{EqΏ Wj10j/IĽ<(` #dh='lK:"yO{']K{Vxp@166~btcīA/DJkz>"h /cAMs.:SB[ Ψ)r TT &RiWfU|5/~O'<8G1+52R{𓽄r?M0߬>4@.,rYϔSO\O P )$<kuWxXa>{󊝤x,sVdCWv^ D/_:+zH΀$>A O `VϵcMI P HŁ  +:[MSGP~ev2:h``JCGm3Tɿ*lFg >Ɇ%삹܅!o7ݮX_I/)QTg$:?Th:M Wu<+fRHWfM^sA>\y6׿0F%Tsl9QR */O !X8lB.tKj6,DϏKCm7ƊR)d'-Mt}zI>A)kUG@g"OFE9r{Xw=bA[#Rci0}ד )!!V@ Y\.lOqj1-`@ƩoDgQV=U*", bG01ONb_Qh!78OY{>9pյ)Gahߌ.x ۿ sU^W@F[YqKP'6Uѭ)}s4ޝW;8C0 s7iu~we9H:Iḅ!Ց/"pJ7lJY؉?@k~FDł!H81Cd#HyE#N}jzULQ:jk%nK!4c 'SE'YvwoqK

VJ8ˮgƄPOƇ1 8'ۨt*BN~.^ͽj&F7Z ?I87G37^soB2RAFWw^Ź]wUkD^.|#3yGWV2"ܜ|Dk{ƂZOz.u8XD]%ԞJpT"Q+8Ds,+*=օ|F~ICoϰV'" ԓv®Ș|%<ח5 WtJjQ}|%r}>HI&7nKփX?UQ8E!}m JP.$sDUYhx]3ˢPS$LIWUנfX?7 4BŴj1D 4,:QY+C`ڒE Zm JCY[>E%uz ;T!*hmauY\%'b$N+8^c *F)7mxo/t"׀dSl)P0iƞr?Gc7X306&Į69\uD. V|}w>,G$VP]U9mA\6Egk 8a:،n;:C3y>V x:h|(ƝlGBb* T]a EVU\JޕM ‘:&ʻUp<§5==?YjGTa iqIJ3i|Q_"e~hE<z->Bv7qri+9\rs T(TI|y*=밢YwJPYV*fG_fN-ӫ!j쪅%) r|Wә pKuP2FZX,  596?8U^I! @Q8UVXdYFm >џywpRx̍/#ra>(@Us6.ȳS,ڌYVA(kTK!f@-xtYhK2U_#qcKaBA~Dq9d0w"<G/&_ dRj&[K_f*(߱bpJs ddP"ዽi]o2"K6Pk(JR_d 8LIBg{_o܊Qӝ^tKvT/@ni%DPO v̺xAWvA\QѥIOW;yb'^GI m6>WNIg:4^yT%Oktl&'QyHgq|ucx 㥘*E K+OE͎ E~Ek;-+of&8z< /,|cfQsQԩVQݛRoJNF"8ف`QLR/,YH_ƒV.b(/BQfz0iY,5P;׻h*!=ۣ? SD/|U/>~Tݢ#N|mPq:ғqNy ~؏w`P@>)_##6E* p^OY|}'ictbmT/<ElBTdQ 7{#?fo(PH8I6ͷ_7uPƫ4靓_sc2Y1ݭI^q 2?c]oS*udYbdp%ZwsoR/K Ȱ#A2CwQߢg)lSAj02yvaMD,Ft yR&"p*Y#F8"M0S@E^q 3fZ2kXkc烌xwMwKks2cx[RGySe5U!9]tf3kޚ3q)Ez%@f{s]@{?\>{;]ղd9F9QLv=Y8x~ cG|6c{%tUzrnudNhA>FpGNk#QT"'dSTb\ߙх3~b7jiw{޳J t^ ]ХYܴdktZm*ODoDAg< rauaS?Q~Quax;(|JId" )uGTh-=r~]kX9kq"/gBL~82wK <Ԡw<3?k4 . TzG.brma3B.rqpN WyMɏ>}񴝴z-ŚФ 4$dZoOy rׯF͠M uh^WL7sWH#x';S K}Acٰ=_%N;%`L0oȑLT~!RyeփT d jk/PsuYPt{{m6ңu[md$uc -efH9n'(=@j?dq7]I?uϡ>e-% k^R5a0S5ϩP;m%_1|+q:ǿ]h4&9 ,<+W0 NJ,#`?7SO/+y)tXXis3G'|~A/8nvsMt呴sBqV̋AU2: jƚK&is؁|~D 0my)}GR(P 9Em NXDЮT|4yme'?gB!EJVR9 TÐM,f:w6giqd}tDM w"aG Q.s=!?]*0ܗg!c ]z'+0V󷜹*~a@kdj;Vf$ v%] [a_^N\ng|[dnU+Gi1ȟxK}! 8Z$%:br*n':G}L:Hw`15.|Xw[(C(b (ç}Kyw$TfVNƚKw>5Ѧ:gj eZof& xsNr5Π|٢o&:rһwݟvC3f񩑸1U?ɗ[&D 3R!RB#~$вKC785sg5qӥC>zg-=^ʇہ֠KO| sjuٓ;x[o&*Ġb[.~H4ϥ<q> G\ 03"^ w9w޵>4FF`BQ՗3+غ 3ɔ%Ulhq'5!sA8dfRԲYjNBW'[zpjۣv ߀XA.kۯKxr!](dn -j6 xJʓtw&S+ QkoǙV\wYFuy]Еfz'6+&)mԫE 6lvƸ9@'%T&A R`4ѼOq[ C "rlē*bĤ1ڂ72e/7$D"%.3&AӠ%m MEݰNQ-xQpEXz>w=&f턹oUR ¢$rD@SHPJlz ù-ƫxb,0Ԯ \tx+l y}:P>+?q>F@JNsi@b% t*6d3z\#R.j'O /2X|G܎:c$1&ozZ;q2gv+Y{@C钊s6 ž/BG&8"g@?ե$:ӹc+4n#x>S"8e_gRľFA'?7>7x(hsijy )1qF!6xeo=8c[o'q@wT]K('<@Ҭz`bAVFf`jvg/ue":|ㅫ$$m0—&_漼/* [RV%[vƺ5\JLYͨEӚa^vT.t&5n{+SqW,PV _"YX;eMQևhC@. 6_T }Ȁ{Ƞ'`)-D>6t/FY0R9wÀg/Fp(*ӎ\έvŻYT6UV~E4>1j~F9e%c!.B#/E'Φ\ju`YWι{bM"V>ODIh6bs,=_yl)Zuj:J]AC n@'b.pVz `QJ7BH~ #at؆N^Z|w1ծ[0.75Q#h);:8Ut]ZS1?.ͷwhPc)Յ\t6$t ecN{ON!O3w΀9}xWsxSxH DBQa8;,ze{GA9QK*ñ/0y\|7+Ouڨȳ >^D&/fTvN!9ЅRMaV^Q(7cOlY8}=Թ ?dIw2 YL2X yZDR Vf5CE*9*\îG5ez>-ώ8ɔVqmE4Ss 'Ex {}pz4oi6^֣޼4,*r۷2S)C7o#|_뫨$Gi?0T=BP~9ww(:ݶSP8^Y :J=:ú LH\V'zWج!W%y܊+tyN L8Fۆ]W—j#_'Mt3&SfLM`ۈ~Ky齨 LvS.[ ;< .̨J|YGyAGh"mց)Z5L/fWN?hb.Pf'Nfҧ,yVLg_EE"=`,*j!IkW vb160ߔ#|@n[fALQ^``pw|d;e hBT-=l{7ws[HB(Z myH1b+M6hXMNeU;N,Trjx챙ZCmB_ڴ)f69Z3J/}"z_G !;uC+e9_#לyJr6&(3/^~lZ)(BJ׉Ƒط ĢAuHgI~4=;x . d^%=n(P8S8. %7Fvo YAex(bS~t F&,Or7c`)|J@dH< MfK:nwT5zŎ/;nt|)$FC( 8_ gjғjB+&V-A A. CfNV5SSxS0,ֻ&SZk|dȜ T!3U=At0*km =7y}&l!x9Hy3j`m^U&yf >J,0nLr-i"vEnuUj)cf:F6Dr|L|P\{l}R={wP 6g :qO`xjW[$XA40Aj cBh[ @Q 8fXL[]q5@ }~߈ .>n?ҲyMb5e&e2u4jmzaoXU HX 38* <;C.[<+oꢁoAiP̹`i_g"ioaX8-C+ eAҲ,>%3$ ;̓p۬'b̴ WG38Nw\rnUL/4NF-a3\uӸxMC @E/{ UHtD (xF7yDHØ݊z5LDRc\RwG fŤY1MffVдk;ץr  d5?pʑv˷YTRť:g*e` =ɘfŚ45vm3jܼU.L@m+~؉Fo de}8j{O G~Xd룁& #'4ݏ gO~ӻe f V_0yr{ˀw $IQV AWW6QZ[)&s9EuGZm5hxҲ b!c(V^[2xU#0D=־QDt>M~r :#׍m= 30*7f>y S"|gZRҐ%0ml#:3j|*c} W`:_7*$$(wlnM,XE)r \cʊ6l@0X'D`1~=H)5R\r'X/JDk A@=;@풏-IiZ0r*xIcceAxH=ͯԯ܉l=N>Ip^Id_kܥ>,JOߩ܆2K'U+aPyf3n%p S1 zAW , %;+S$0IV/b!&KS*PzR,Sք]'PdQeZiYagN|c FL; pH4 |˦p jz9F֤ Uk.UABgQZ^{TTh'޷os - hb/i˲ڑW>߽C:,7?ǠhWO,/Ũ EyWkwr+ǓOEO'UߗOĖx< w][ D;nqL)!kB \pK~(%1 \6=c*rf,HD  xlniݎ?4C(aPj{&7uuçTaTm5r|x[ʹ8wTK.F>Y'+JcŚ/ޱЋKQ텱*SI+ݻ"et9NQX>\F%U*_gZnߨ ^oPJP >պ$=$y 'B]}s\Bi~$qw}a!wxأYes<_fhxAe?dcMlR݂षL&9 0~oq@hH'<*&0tq??ʶ׼ɯQ5PQ.J\m6ξ[# }`M^|%Z,c@ :+Mp,:J8mI/;;IF\󧔍  ;;Ar<LVx%5Xa>ᑯzFI0?s֢Q|}T>-%L'ij ѯ;3l3g')DNIݐj':vkLHxIWKV%^܉qz csb,OІihDixkCb.t:LSG#i-׵ 2ytsxJ2WiɆ"O ̞\}HJ [~F2adfVVw*IL2+W,%GyWG b6@EQ΍`\Ec;srL4Є +J^K+W3{8+3>V8SPj'~rjTjz>sU1h3ܕ8oc7 [йH4cEt>ѝp&da>I n @րX\BC†}D:-R&B:.3bW`r%^BWɺ PlnÒH7Ȼ 8#2a5 ѕ S\Zވ!:|5]Dfdj1opc{%h O;j)LL@$Q>uW-?;BHaG+M@/ )G;ߪ:\#2b*,/ڑGAZjvpENT\0ugx3 ʂYrDLHJU\4Z-t^w։Dnwߩn;=~Rҙ֒Hʤ1JJ Bb},*N"8YLJrC:ɧb{%a"oz*t@oimVav`Cl$װihj;iq8G_9c=Qwā$TxG=*cLrzrz}oL1zT=* ̙/-U0+y33\9" ޶*ՈVsW >W';"zٍ+7g>+PZP?Z= V!}.)mgQ 7o 4pd!Nӓ=]qP7`s *`tR@Agxϣ p㩦Rbr'R_*d$xw aD\6H\+:3Taw/>) t>x&WcfFy%n/o!מPM8pxKL24R V-,r~eq%ɎM;!S ܰ+547 6ݰmxtCke@>ф {<usk6l>x-KST CkęF_T߆rLzcf7Z``'[K I3Xd[jK󼠴AcƤ&w 4?GJ~S+Je}5m(U %-lē ^o"jY`ס]FDDY xWg糭vxnc \Ga[):ۻ{!qY0c=vr(ɈE!oKx' ު.eBTD*д8݅L9PB)G&ױU抱;z904=д4 AvN׬D~e@ }3J-)쌀kd0J 'ca;LJ?e@RԏOGkvqFLw}l}BIQ"BxJ:q _C1 ՟qPLZ?)nO(:ƶgɖtY#l{4N c\@03`A8 GeT>F&STcqLxQTڱR`#& ?׬*UCl ^r8I%&!dR,Mܤ*0x~|^@<lrbg,aH!_ ۠kjTo8u8&ui 3hr0$?`1Ց.*ݛqb}i7 M*z ǰ[UWjJrBTUf^?>/ i^׭UƪK?!#ZQø(z.㳴0]pp!z&]"ȉ>* JQ~f5mӣ*2@k{g-:3CJD \״E|Ks˲3Uɒc6hS|/hxЀ_뺭V=qlPs@U?}:miBQwvO#Vڡh™Z%Zs. z1LZ>O1jQ)Kkx^sJHщf}RJRy \Y5"r&fpy&e1[!&:)/J"GYV9l~2S+D#Թ4 &U-)^d@ y|D<{HWbӭ+Mr,:) &s)g}6VuA`,`%!ܩ[Z"*}AKEC԰7 -?ΝIHb:ZdVQtvSO?"3P^iGOSZR!)ǧBB*Lp|rѨ6 *nUxP*sX5˰ įw>ʥӠ`Y|%>74^[1Ac^KHXe7cؙ@ե8:h^7aa/(y*4Ț `b֍esR--Q-O2€iBb!Ez+$-Zv&<̌>!g[рGt2'Ţ9pJ*!0׏NvD (XUGiŦQc|,^FR|3K\ ZL/T0L2|d̢;jaIA@BRZ6_PhkWl \!`mxmVZ| "^+e ޴{YrKMNԷ@>e!7`+g2;AK@5$:Ժ %e0ʋwl3F _:!! Kr_ &)lu2:mȝTO$ȵHIBٞ{Q}aoKt1gj5`&ތb2;y}PV|UHG7 hm2K"t4&7|gAS_. tĥαt| \z݃)VP.qA"MMeISҿ֭H_b.ژYG$t*|c_6-4( F(nQJļ_b|r7L Y:Ƈpf Vz>f49u^0u@強.'P$.˲}a&CO|8o0aQZ+M2ꅵv}Hݔ! Vq6 ;u#."51-+z>ZކM[lO\^쇓l9$?Jwᾦ)FH-K3)rPd^ T zh-!dSa~-QY10\ȼ*d*enzH-pE4B]#ѿ*NJ1:)/q ԣar~92e*Ϡu2muE3!(-%|Э c=4eА-ʘdG[ U=ٿ"]k([/8FG w BJkꋶc x|5幹5R_ǪS甾%Ɯ>cHg aG?:;\+{SCQYhO$)(#wG?|v[O'C-,NNe`(7"6)ۃE?m&O7QثwdTk`vj/x+zFP]{B%Bߎ."1-\s+yzwuPI}'pJ'8,qTx(Eb  [3Z&7t}_8D Ŵ, 1$I+7'Fy^Agd#|! ̥WփQ#6 cx%`\v͸~Ċpr19W[4kxrQ'(q>~!=UF)LA٪ 6uAANFAex jsyR-5>H0}J} g^Ų+l,`v19F[8c$g^)J$N{6˓"D}r'G!EÀZ_(?Ox|1'zQ<c3<iU55=bPw(;]k TA2e' Gh'ŬÓ#^9&[( a>ηDj0_Kk,e19v$: #aWn]nC,CwzIQ0MnQPiTB?P2D ̥ڄu3RX.7yƄo:>J|%|%߉/ BSϾiؖ$pG~p=[q;<4&J:6#6r8 &2>3&O@Ndr?KJ ;t,\حAR75N??Q52`T_a5Q4-z=A9N bk0TcTlw&-6mPs.'Da%f٥8ZsN5ʓ[O.Rx t A߈۪Y?a,&!0)?|}5FJUJpj۠oףN;SnӴ-97k_O[UO_y#Rh w]ikp+ߑLmq]7KrC+]|`BdgqiXF Lli﹔m dҰB'<5,&Z[ojy5lOTdApf֧:@Ȱl(K -*KTjYŜճNul^,\JP_w;LA/Yw$"cc+IqL-P :"|H_B4vMʦg BZR;Bɧؙee5Tw%Y/FP6HoWL˖M\,Ze)11kA9FH N^25,yijO ck'я/nnofW6yHx>!=X6d3Kv@<ωxO渠\jB,3~e3VV?vΘ/P21Ik?;~ 䈁6z"gDZQ*BDҙL 4_kT|rSEQvӛmѷZdk^P.4k`2򃮵:O@Z43,*e02CO6M gd*@+[07 BJ^XG_<:j;`=E 6u v{czWevw׻)IV9v鑡'6>ChANϏz*o"zMOךwPHqj{ \c\Ľ.1'qU9ɥc)\IuzE~GԄ Y8VTna*i"F< !L>eB{,~+a74bMJ(zl;#BsLU;2_Re;%,.LkqM;+ Z|V@M~zuPHZgndH<ǠvleY{LS65e < #'¶*x'ڿ%O;L-:PЬgY ?|D[~eq 2Ҝe*,M7˾ 4%p=lIR4Z'TԞsZ >1s tQ$::)> `H-GjXzl |Tg5D 'YW! zF̾3wu*p8~rTw`˥MGߊ96|ഴ+ǪhMVA0};[l̺ξ7Jn*HEaD<%]5WGaUr0GxxP#(7|Afo@#]S̓,V[f!] Lfl0]$xAiU7Bo4s4 PyӻSbyfҷm۫"dWwu(ׁL~7S~Bz/ gxi oޯ7OsJs4 6؍W!Nv$>&.kH؝w\Jv,Z+{BpgD`+۷C/Hj?&vק}O%NHCe9t_!iL/ ~ i^ Jhkງ$k0,*CỰ+-hrL܈zI7\`U].XюXD9G ᭹8\?:rk̆ޞ-ٴәH6t 5ixSsDߣ9^KW *b]B]89ϙ9a1QiύO051ep YUK`P~jjg@4SXvtpl%wF0 2Zb0$ =fMl, :0OVUCD~ dqxqRh!hGמB+~z6n2WO88þ*cKe${A'>,M.Y 8׺To4g]u:27һ7AByjXs/zyjQ=Reb^tgQrF8` PYP7[V/&VdtL!w4]@Є4Rl'#\ԼBx}fOz7Q|OGHt/O CX&uB#JY'dɒҼ4WA8B<nUsphVMOD{>za)yW(-f9Na 驰 }9h1Oe60?`fݡoBeM$ڀXUSN6M.nh%Z~mc:{K$S{4A9Mv!R}Bw08y?Uz{eU[Z@x `jk..K5Ѣx]sǣ VUoI/IR~@[TW!1RѵQX$a5g|~=:Zun%%RPcp*7M,шg?uuúbozR8rwnyJ"ɓME/~Q=fg…>2]ɱg^έZzź؈ rVi81Gc`U Rb^/d3aNS2}K,`%\Q@.Kvƛ?q3AЪQ?pm*37tDzD|nGF-iiA({1؊J@]/N,<|B (Zg]:2qLe|{M"bȾR9ݔ/"^w4zI ۓoFzw1k_o0fi3L h{[Sd#r 6^ , v4䭖R;6( u^4vgnd(o|#w9^vn!}QKjC&΁bKg>+2[^?KF55;$&qy fH3{GO_@q\=P^l(IfaKCZMyCw!+ %ڦGNXO񾒽bo1dN-#nu#dj>k˗ $Fk*\|%BwճȜ)b}?#NkF^VIm|0$,lp a.`A939T7'[{[q7U^UIywLh47o 8[J}ntZDž$Q<^ >,q ̉1ɑRp?%7=[#VGS bȕ)%a?,OɷD:nN[ V*KT'qK'm]\' oΎ]^ 4O.>jsV9k0Tq/\dxBEg. J2o򱤽#^TxuX'tl{Mp kQ v2 ZR _l(cDX`ӃN?,98K:I sdu92MGX#_[fbX3)A~Yx&VR XC Xn~adT4h9Ph6Q"ua+9HoX.=_y-vfTSE0X) !Bkѓ+kS]hec4szt$>45[c}zVGZT]>ZƣVwzR[>U $Pek)M+n'{3?w){p4,t:SY:%T,u0<b4l?,"ԏ`&= |ca%61Dk[lM@9 ۑaNփ(XTLHK!UTe'e>̉f(B 4wI -OfyƀCUY[7k̵7=.oB^mr5xZc"u66=|ڭY"ӚS8}" n{cm89gs{;0'Е jp(vá{ۡ! SK=gGMwH)r|%|A&sIrSٕ%Vy?^}͔w#T :5`_`7.d'ћ̈ELM "1{3JCr9 ~f0yQq}i]K)EbٹLJ+ i-9w!j2?](m>Cto?:ycO kX9x $ WF+aRrdYg J`!]_qmO 0Al@%Ix 7V] F짊E if I)t.nM$p=]]^0#9P"i%.'0H?@;hIH {Re@mխzaz#Bl&>x;O )BUDXEk!ê<89+5cC[͸DCQT+=26|iVi sÏ(I'HmMnTDvگ xй`P-2Fݫt2kڂ g1F|x zPaqjY\LN̈́* K^ݨ&%}Cc4{:i0T͸180yuip@}Lm bDOK.2%nߧ.E:>W۷/跄p{P%值UbVwNxc9C*BpU{@oDԞx)|ٲuQqS~4._X16V@ZV7I82V qsȩ`o &AffԆجc x.FՈp4^D2mmCTWx J%VPf7W;ᵏE-hwXzMt}ſ]ڶ;RĎYVDcJzO$)p/ΒRTj Ҥ-f6t6YjD&{ںfSF`xu 趫0Rk)|Onw乿(OlcJp_veyW7Q`o Y|u/ ;3xBZЅqv$5GGEu_QJGBB"_dgR/dnOivE޵2AUЎߏ~Gfƅ|1;}+i,a; I >u<Π=vyx aqs=G5ϭc`}6|nlhLlt}ňĐjj`inAU*%oVh;DobXn ȗrdT3B#bKƮi)G!*JB-y fl UKBhϝ}Sm"lZ˝~Tk8ȍ$7*NQj1!e%ev7?$ߜ:w&$q*+'Gl㽀T= se!gD\m1XSL~q&"=-b/W5*smؚA(,)W>V%b{囆9a$Ȁ \ԛcmWH?A1XZE]X7;R]wrcwkųaQָ;N=|`~Jٱ٫ng2|B)+X|qXyS|bL`+aX/0^ :.oRƷ,#0)zM_HKSO YpR@(jz4W$s[ւy,BIEud.UѵXZ,7pﲪP= OI>K}k5CV"N!څ~jR Qڤ KXZnl` gE\C`=@`Zd#?hsxeYG$>. wd=KvӎR#X6a3`''BI\3n:` J)Zj4BA5ǔWxՄŔ^QQ` 05j@dz=X MH {gFCL9=T%-C\#ˋr wv%,Zâ-ĕ/Swuz\/i銧;B`тټ\΀!%Ѧ,c.{_H-x;`Y˹_0^'E>{k%@-Ŋٳ*i}_ XNpm: ̭mWݷ_Q <fG*[擅ϲ] {^0T(Z 9xP/+8೷>7wsS e{R)&hO=hr{@/G}[L&)tO D7an-~QsTͽ4* rf {[eutW.G^~`Z.7 f;~(ʺH"NmIkfRw"kY ѰK+օj\=QR<\pUŲ2nhNrx&_ G6uD^#Imw\ D㉴u|F\ >,C68 CBId|I }U[NPԮyVA0;vqaaovx wHE!-8IuǿXf1ZrM<_6Om= Z .[<8)m0|oY{'@. r7tK7"iyen)c .}Jϒv)>1B,,yJV _ Vj$BC5qeTfo%l~,9 ! z %Fk]"l75ڝ}E H"x [lvG65!_hP[Jp MҸAN1;~m.*^XJ䆒N> ^0rOUNRRp5Cʅ’ h&\=lLl8! C|.ugKi4 }1R併X i!u%Zpx^g c d̞ܲyWe"(Szxua,MGm}Şi \%_ȭMdg,HjapGR}SxK4Z@F4nج _4U !<H=}t8aluTQ>i3Qb?E8V'f3"=#-"&Q$DSJb0%!R(}=qㄫ7(qټt9Df?,3zJ+ @1ʧ !r:Qeqf  /FzE!;$Ae<+tJߟOx\%=vn"IWl'ADOZgdm\&VC{S r>޶K_GIV,ɝKcDsjv8Vb>tޗ16G[⡆DSvnCyi2{u`3y!)?[f Gq5/'rĎkVyh*69sd1n+5ܮ^S,8B-!dWR7c{ʙk8;rwGz6yY1`*(|#[4\0KU(3mmn2 B{Ō`mTN 4N"SgB/dXemQD j9$Dn48Jq5!(\Nvov QQQb/qGr\ 0P"Cзpa~эVUCJR# E{?td")9.r]N/? (tD߹r6a{vbХʙ27 {Cvݗr;V!<ׅ FuH^>>JM1*=m>It;߿JQ%x<k )6X '_@tҟPLYy Tx2̰xQq-0"?(RSh@aAꦵ8#NMRɒ>>sɁwdcPxO$`yR9K;}\PeU 4?mg3sq.J|:D >W<` L :v-FIC5xDIO͚~݄c ?~Rd9+v6;̌ v-δ je@HfZ WucEpٸx#*y4l+] c13EeqR\6OmHsv<~[ }gŠ?r)r{%k&5yAkjsךaQ;($Eqj&q>b ļN=7}G- qw4;-ڽƶ!f`=dȤGfu@ tJP@ Ԇ/ N-÷*'\t)~6iJ;QiatV2:ܠݠx/ىa ŃgBG-6+m ) ݠPd܉Ps%&<ͼTWV2OR,[]]J' B0}ӫgTݨñ'>ҏĽpFށD Xz7,eaM<Vg[`bH=/y6Q p7|bwyΟ;f?(I6 NtGߐxU'͝|wk˥r"",Ī~;/=cW&,PXP)PWKѶG F1֙ዓicJ3zäv1ؒdNXCs[Z=p/mHRh[S=׭y~ރfoxĴ;kh{q7?E,T|w'a1^_sm5Cf$q2j^J6ncgn 9nmK訍{KM" 0s.tV>/}Z~'h^ >0l Xf ֍톃 x4k${15ėpsdQcgE2`bU#^uPa\9. z+J+\ eYuPdO_p F6?U$+Gpu p~`f' @+-y[ejETbg>\M'Wgl PB?Y(TϮǻBe)s^㇬3zD-gXt䒱[#@܊ 7Rv!ԓIm|Uvhݟ m1R_QZAODctts3[1v:l55.!R!51Wō5">骾q(BS6}AԒ+mh+,ODIH}L?ӴW31&$Yl5,,t$aDu-q߲:2 >Al& vWc17yl% QTZIM w&z& ZQ6)"T(Bn?7s})١^hQ~3 ?. IeC iǿ\Wo@^*3jiqW˰ߥK* cq 9xX?PĦз:)B`7)C잧6//3P牐{jmٳʹ¥su8ʝ DdvpƂ;rSѤ;^nIC"9hUiIcL?/Oi;>5*,B3B*IA~v[$JõqKYrU%:ڈT>io3k棶3&f&bGL7- {<5vLri{59*~v-ۯLғ-U`2lPJw7`+b3uDq~vV4h@zd,Ťurf7UGٙz.k5_Z30HN H[ߠ/Tݭ0s#%~âթ֏h":f,#UfXhۋhÉui1(JiEJ{;hk/ ={d2GbOL&Ή65e {/Cg5& >/(V:݁iS XϢO^ONSJE{ⷜsvخ;!Ls fA`|.CL~V9rX]z/ V6pt㸹kh}x'Y6ܛXBl*ena6R~XV' @jXrR/WC1\vapeEB-eIAJWz#DeP/%݄hqv!h$8 (Oߝ3Ц:8VG9ꗐn2iyd_[:!\4<RiEM{%!\d$Bƌlp鲻ޓ''+#ai↌å_Ƥj,pljJ|TN Cxc!E2}v+ՉR.w. vx%V ֥߂=6ePPzJ% }?V]P*25GtUkh͍_HYܯΏ{lRʡ$ª:ҤJ,5Azpz.+° ^U$ 8dqѐ@U-ST2l 6n#$벢ƥhT50=n7Ă''V CgodH _|ңS'k&uJ(klw̏foRXvuhٞ'Xҫ[Θi,&#ElObuMtѤ5CBfiR.nٞQ] SS4oҴe:7Sߧ>3ytGrFvDOlЄh =CVnFEp(S $2?ُf݃(SGDPץXNr7+:ݎBd/2 3;(L躠"OpEiY1u6.TÃ{ާҏ -5v8,\a(q`S9 ^<[X]{8g akycHzϑ2P@%*~A0A5 ntL[-XzOCr)5A#Ͼ]|2Vθ`E(>>jB;>y}~_> U;B8)CnZ>9a [+}?!ɚ6?0Mvg7,_OkAyr2, R ۶^A,se )6: qb 3m*vz&}APJZ+(‘z8a,ų蘣\[:Mkn`oy}a.-B/{=emHUX[To~nQ$"| 6hcI\ EEʺia1Dz\*?}D  !m)Tm@bHה`]&WFI'&'Yt=Či^҃qlvb6JfvBL,1'E.tdL0ԯڠ?[ڷ?b"DIZ*>%j\8|O̡ &k&{ 1,a)k x4ڄV'EW@D?yFo|d .Wv|ٿ 1!"!yAipnV55;Kqy܀lWQ7O_ R9!|d}AG%/jWpMtG7I ikF.-w٨ޝWw EI 1?h6a Bgȯ4T{hXT?6-L;SS`v"~oͼ3zD,ndUexoj/%F ,[`qF:J(OE՜sfwř}D£2ZoYg,hF߂*7#)ӵ?ـV+wy=KZ&w9DxP^lωnae !cLzdXU_E>kB^@| hXLY+VבBC%#wolsX&R i$A-{ EB$,׭ug݆)cp *ިsq,q9b5[/i`qbPy n^qAÉ "H:\hyaѰADe_)V;-,G(jDvWKhOXʓ5O #qѻ˻GT.'UNwaRe‚-nnOz'u mq5tR#NY49Wcb읏$w]o-1ź$Apũ ]*(B%g|xVZ,`ȹ*[ ~ʀk4ZЫ%oVEGڪ \ fFao*vdrkRJͅO3&Qs^MB08<ɮLz^b4q]1d&:+GCbf L6FV6渂YEtXu0bdKfځr.٥dm[`{ |gٚu"Zv++U6|㘧=a?Iˁlj"t!=NpM|Fs[e HYH8MɲLs61厭ϺeHr`>r- =]AtMfeĞke~*ywɪ̝,]S`NѾE 74N<]铁k!<_q,l4gk!'/?9,YusY\Q7+9: lF<+$Gxڒ#RB<ڧ2n!f\>E@v*v㣫umxLb{'0xăLaRod$lEβuLjڝFBȽDb"hwm /?t@ŤO-7oa~MB"v].GNmOvDDdh^tBTK# Գٵ&Laˆ=vٳB՜ͯ_XgjS n;,n=J?,[Eϑ<#@=IFcHO=Iύk0wV%G}%>Qw;;d迮 8DPxD,> ! F%Ȝ䛙1WQƙ]:$҄'lO({g-٪54J-`ZlAkŰK EM[\֡$WdКMEۀq[.Gxynw6{25r4ntU)$e";B ]=YO1Un؛>1rU7g|XFZtx$+U&7p[ [V8{fX5!2=,@pr=51I)[YO7 *,LʓC6YI6O B)u?3nu zK/gf\Wѓ}^z{>2w%vmVD$S]H+#@R# M˷*:&_3(nvqC~\@dҺϧFx63)VDZV9Ys9q4) -"7rw]KC1j1?@/Z?)B-m&2ƎBԔD6i '&[ Z !ОJGq2qf:|ѳ|muŃ3CAm> m_\hGER^:yuԙݎ1I1Ul>Ln-I`.E-a52K4-MKE=`8M\sEYX#Ó^$"?ZػT<l}{*;Ŗ5HLѺn6 t5@7k"r_X@@ *}b>G0Ѷ0rOX! ;ܒE bJFAvyzj-Le_%hl naP3=n%9h$jagŒ}p#[_Fh[,n Af)sD3Wv@PjJ_ F7,ZJLGa[-A2.,jZRH^ف% 11>"cQ;PCv=ʵ(Ӵmu HM0qLjRW.Z'd=#ZKx#  9BG*:]c=]51]ܲ=7LH.10Y69[ꎂ*Hyo9R[I~ȹX*fv%nF$9 |3"HJ$QW ;F:J讽xp30f ROj# ·%XqnF- KZ @v_p4$rp|aSTC@ï!mq_d|MwDځU%µYrx{כ) hUUw\Lj+C'j3wxEbv2y>1생gkQRI*:|rkУJf%7mK426XO(T? 8OJyYl"뉱nZ1fG320XV]<b n_Vg5 Ӈ pWIƽ9]Szj~ .'uE!PsA&Ȩq S-g&&JY6'`\cMRmGb< H3>]=o˥ߤ$`L+aڣi6:(۳ZV8ҳWO2S_w9P8ХGZD: =jՉӳ9v8G^0'YlQQ/CkKhwS6f7B!WMHyշJ&9Is)‹* Y3՚|m(n I>_~' ~bc=slÊA3UV6d S)0GYk4t$ 'ߵc~ޖ9a| AJ="qvE l̃χ2Wy"K)y.pPo LSZe.Y`VJ=0U׬1qVWG'mwƈK" K0?` qr1c73}f||粩#`%/F ';;xXxrb.!eY?ъg{+Hc(81n\9Z)_c~3' <_SohիBDŽV/LWf mYJ%-7mV A-\Y+TQ5Bmq (S?4H6opH@(TS1HO>uǿGڛMO{7x4NSv^*`UtgApl'wco*;Y-rabXgq{ uPĽr?Og%4]KygoȦN9*\M$hjX,a(; 5@*$x zXHAўpohqݻn.Kmɡ=˕ҷ/ 1}ӵFzQ-:nxf!fTnoJ 9^&0[pզ{zԄݼ":Yi6> Iъ]ZT: J,qӸn>pl $(KֲqFts/4b͒gl.3.i@z_Kدd/\aKl 'L<p4SZ!aKCeVEw78Wɜ|g%Q?wV]b55 k_'j@&e@MdpX3՝bb2RW}l෍oV_ ) wAy}oU=1,Mn0%(|ھEgL*#勲w{5c^,w)8XzA;SUcX ʵjp4 eKٕF3􂎟,=@-'瑨i"+`wd`uhBQӱBi Og3z٭FXq4 |4ʼJވcG@x$C\ FB99cКJb1&0kD2wTEi304~y1qV%Y-밗tI^]sݯYNM=PžZVǬJ]v]ӜZc EMu/ Y:7*s ´8&׃ߡƯiE !%UvIبXYɲabJn>KtqcȖAYJB/&_4'=eFFQ Z 墎EQau:Q XjkTS$$ZAAO랟I}FM,jo{?O9hto#й9(S=gЮUx :9X27E@NbViWk$qct Yl5w29Y0;kוC1Q6ǿ3_VB_`GĆZ;Z\#7kl;R xRԤ1E aohK A]j^Ju\P{EuQyYxn9}5nӚMdB?5+xoSo_&!U!!l[ϾҶ8*9D~|9ANy*ǹmN54<Lxۍp J%5qxÇS[#z:^qd[ tk-:8k 9m@їCg?Iy;ȅ¤!:`*w26Dtse罉tMt\˃ڥSx*?Fn z?%[Xɇgv 9 4_YQ޵,Il~n"WFUTBʥ iׁzcd "~$[&~&hԩd~YOgC@r8IY~Ik3$[}zrvXf{I #zC?A}&<QUB:XN ް(LJn=Yup]?zbjңݪ']$Xhw\"sD{?=;\Z3p2[rZ;NՑZ~@SZ 3 3WLhnTRvvǛΫV55Le~:hGΫ6 gH&tDTj|`T>`߅0# sި8 PLK-@>ǴCsHG,];O]iWs[t|e݋b! ri x o率UGĞ&X[hXhU52u eZ<~0TiycfAs6rUE@NP Ƞ }TGtR؎{eQe=fns F @XVTG gbcWN<iVr7@)U W8ƙDPHH9  AUL>@{9!sA"ZZru՛Da#F#Oɰlrv HRI!>BCuHjȜR[G,*۷TNWHz`EkG/b4X}AG4%x$Λx0V n/IJ¼h#2 _A ,@-cSnL "ԧF՚/4˹r5A5Tgcy^%4I)_8' h׸L T٧6٦ok {Fj U2%<$ahzxʟ7<֓>tShj&8͂r`d{-c[}&.3g/3aK<C4;2d9,Y$^Gx1@7 mEdE!Hm֗FimV">,}jDm]W3DUq_L{c" h*jڂZisQ$8|#TϨvE_~er4 C]#zh9ez]~~ ¤W^XsoUA C]䱥_GGNmG}lF\I -wvZv`j'M ?)uEJڷ2]9hȅ3dI?wk ,٩JEby1#b@O_q,iھAg-*B^M~BF _i4𽟸۶9ëڥ0gVgylKcRU1mR 1̓yB*a9#/H,G6E%~"bST;o&]M5 9>cU9A qi-z)_ *k< tDhW*dlM߻#Xpz\4FfHU/>\;ww̓)ڻSl=`yN:x3y55FYL pȗa`ZIpܤJRQV¯< (c"/vR\9GcTFh5_ `#ȼq,өޕW 2=Uɯ$(%T<9]8F䍀 mpF#Vc CRDt>Pm q\]IO>lFkQѮ9!ߛVW`jmB<- `؊̲R ˨JtCƆ ]pE/RC]e2WD$H) ۗZ\aXЧsJ/ʿcer ̈́N?}:7k - @2I LSIНGq@Q 0z~-AjtNL# S]kQm:D7PnS}?aX~Zf_V=bL߈_F/g:˜\'5[^dE3V :1`4aepC ݌y{vKȆ'ّ -~)8 |L4uX3ibUC 37 Dbd&04%ʒsOs=>( @z 6\Y2lś[j7OCM4(L ט(y'Rhu%V?.*:Iب/1‰I󓙕aF 7uĔ1w峃dd ł;ڿFq/Xf2؎$ꔥ( ~}6̩\qݓgGw:Dl sBm,'}\Njw)^ǡ->ȹ&!4ިl.݄, ?]-iirC8RͲFmO4bO4ҡ8Lq'0hTNN%kZA~iM5H*q:gZ1`<\B2kq ٗ쓂}mfϣy%J`PLV^1Pe#j4mS+6jT1$u[}$ƒ|*ϼ<S۪ ۢ9+ !or<]RՆj 64= g*TZL 3CUjm?mO1dE"R}z{Xs9>gh.D,%Ѩ|(0fgΚB+;rmz7[jymL2&l&TuQ-߻ױ۷5drm+gl=I-2D`_ fhRk_rM>UJd|sֲkyA?Aco1rqM`-%ploj 菮&RXVCΜIWDP?Α|7WCV[|T͍^VA.qHgLɏZQILj[@n$<0 z?u Jw,IsklW7k8W2̺#zvOK5ag즎RF_u;h[6l_f.+D"EO`AZIWa@BOn0v+J(TQzi["M]h/ '\=@1Wsn#1RخQY{4o ]GrQ bWU^v&,zLFr0,U4b Sr_}:SP W )3mYdyE*kVCX4y\&U@ֱ.pgV? JX- kt']"F?4jB*0eij1@19kmsHO7-l5Yb7z† $Knɍg:J r7V# Ԑ0@X2jn&̢oWmbzHA.9i.zj.gjshTY ةs?$`N1YK>T .9kX=:P@W< OQ}n+ޡJ)7u[Sfс\ p|KfseO|^,JO`ߢQt | ]NӆO+*`JrTlǁIP`$p `tW/τA_-^'ׂS~zt{8MI*HhA X溨pd%t־1^5~}{©x[2AvL-d`j7e9t\s/ ȑa%F8$n;FK\NM^QC_AfȒ C:cMI0S[CI}9bCuM%h7&S恥NrDnwJtÅ.s@w`X,pQ+)vRV*Yy-; ( ӈzi*jD:Gku M۔.DOtrY|2|/CX7 ̪ *[S`IǤbwp/k`,fBQ?-7ۃpӻ3 ]Y;xZÐqpwEv:RsD#RÇΠt[T$\ ^.|D!9QSQJ.HY٤epci>1%6AE灻Ug:!@eKʤ:afSh1aZwOZeldhA=aPIM-VmdN+@#DG{-"6.:0Wo)gg Ƞ9B4 L& _f ئxi:/XAr|Sy9YMI_&h (pFOD3dz)\2zX5iD)׼cK/#KBtwy\N=~F:(+d|Lf^ٜ| ۪ь#zY Sa䯼ebK_ '~! Xb/Vpd8 @S9I=3aO (qJB0 $+U2Zuj[PXĉ>GuD3>X)oA.d18A:poNޡOe*]=]܈ǦQ\aBrDp 窹!(M!W :o35-;n"38b;!Ї hG>l*gƺņ圲QS% T ;BZ c"ZƸ7Uc{#Frr?!O?!aDYmXb\hTܪfp%&o8Sd`r $}eaSd2|2W?[P ;Jsq'jsnځ#rb(R c"]cSWg8Ą?N ݇ݫp)\v}*M_#)Wz*;esz"LLIJk1 %(f;LPn7w) V'L&Ώ^] S 1X̐^2]ϝl';J^w;ٮ!A}CtV8FZLp?:=Ra5ǒԛgV;-2MbP 6H;S.vXuP&ĭ-9jbV'bĥpIySߓYt?-t<V^72r@.0\~1'b ךhp(Fn_ች%`RW;R+v*MOsjYd͹Q~y# C:뜠zF X<3 r&jR`nEN&)vlbT~}jG iGk|ݔkfWEçLaky=X==u!<]~5 ϕψw۟ c_#fntejrf6,Nm/?3c@D5 y_8pg*?I=Z>5q[]:Dp*UI "|RzDh,Ҭ8po˯î!}EZ6Zp3鷈wY?%Y O)+OnΖCu\t|*~j\슞IM헙!x])H2ܣ(x+'α.2rɲ5CNFO,^Dhi'5 Q)C?9sV׹lA2}8VXT#b1 FĽ0cP0)/`ױmDA;_f9wVr[xƱqTOQjYg~$ K} DhƇh|#z_d'F 49޻Pli:'?i.P |8;c$O44zG,T>s,e^G  bO@ʸ.]y~UHd1{Fss6 ?U,Ϋ)kS0phTdy27 JSһqdq{Sm tϣm"H qM:Mzv|֏Tl%sƲ4em6$tl,$KI%X^rLf\kB'# >8( v: F7(0 ?+!,*OEUDn@cyWQ`EA%Rn@rJ{}qŔ/+ˌNgGk3_%JQdy:m"#J$; Bg|Rs5!GBr:&q~MAdYg iM8Eá+eP@vZYl_Ebu#Sƀ#BVW<)%\ޗ IyֽE/5-cm3@& 6(TCf,ab#Dxε9RaqΗR!?eRQ&+UiSɉ c! 4u\I!cPnf/%#a{@ XX-c^w8 ;EjθAD.xpp@>,#Tx䖽LLe N~8`W@#VtæۜK [)2 a%_xjJ޴6• ûjth|V|UB '`ע'}Nrg"#&I]Ǐ~h%9#*Ƶ0|L~vBZSiZ▬3 f& w6l Rc+ZRZ.Y/4ٲ(4sB^ii܁тǼCdj",G"A 265}N))_&3Ƴ0Sk__6_ȣhs;'d49 î3V/'HV7yIwX^.VsP/$ey %"2gJRd`IP]w&ReQO_}Q#6HC (}]R5: Dު/KX󧃫^`w&e=S Y5jBM*HF!O=q^hعB}L=-P%HOӵ9Sa-?%6[+P*|2lp*Vv}AO 0 {qhf0imu:\4C|!GUU9^?Ju?3x3? e~"bYa% GΫDJVE&Km7䉊'2I}3%UT8p\YgOR"Oֳo`KS1_L}A x֠8d $lJR-$Sxd>ԅw;Ze^ $8h`*]c|pM" Xb>t7.nGE 2 *٩S $O( *k4o(l~o!항 l (j#K74@ajI[&lY9Id d dO`VnnL+ JucU^]ol58F:i"F5g4t9נ\`ң4B;ҭOY1q.w'Fyqnׅ`AsR;η$CT)7vEH(?Ψ/@B"GUdݺO[gLffg? !G3[3As(\?'z'ϔxTU)r4.̣ lgJpx@]_/-$c D? WY:sj[lum,= =p[6T߄^u{ש u^9=+,ǮԮg.Mzy_;Dr-sҷR]gIjK2 Krtvb9u1qtJn#34!*5\ L7ɿ(=>+ "}jPOy,AנY  K[*xycYHULa6ꥬi&'2,eOK(l!폾'%Ұmn{UYG7g(^/1vbk2kLC=)ߊk ]>,,=nϏ>L`х<{6vfF2d ň<_96Ɓ(L3GRVmn5w_/N̟GM?nsu@5Ѩ4;R6F`3ToVoxicOt#Z-.*SQPMKV .d|:u 0VTC䱓_cjXWJW#Kq{덁WQ7Fh(ݽ@e$7DV=Ue1K`^;cۤ|I<`&14T};DmUs2(*Kwb21B(-!564xyb' Ӎze8GI,o[** *ŚՁ̲hVV~[v Mv etse8HO&sVZ1=H>*!FdW\1!Kv#̫>iQ; U2C%?(ǖ*B=0`K{ЈKklՒ4h汮Drⱑh19 A9z/IaF+ަa0ã"%qS)lFƞVά雵irw?|SۋO1 XesOJ4f{QdfJ&9 bsd0WNH2Zt%ZޖLM,AuŹjjmjn'07t RŅRjkMtfaZ `lE,`)ҡ)&5D7H{n:?e;8,H6gG?9~>yK3[/>Eȣn8O:Vok:#"b١=)L|qv;Rsuxē|$-F&M?@Wi5pz%KP,3A!h,oαP|ڑND=j+#J] ˯C-k$u*{"'pcE;;_O^7l;'5LA.^֮oR؎M'3HfscVM5wͩ%+W(i:WoGo`ur՟v۾yst^ɳpa\$HrZ5FT-bAw+  5XEvmSPOФ^ l*aUXNo[L'Zh\$ BB7HbJ89( du(N0 E>Ulٵ;"{Д KLP*`4_R>kB^ˉ$۟*"QWu3Pz1Gm"h͕ϓRMFJVsAp|]MΓuōj\//Cݚ!V2eD否y̩WńsO8+\=mDXtYEa>i!6-+t0)C9]PNaH8ZBOF8'޶}Wwq ,[ryx(l I'&vY}S؀jTuaЅ̙B72Gڥϴ8H, zɏȞ@=G෋#n`B>i&\J4ˆh^,FPc]?qU|CN?d2J`[ROuFa"whRR܅ˈݗin~As\S6,O 7?Y G juMx GP1V`k~߻ H +db Pn$ƥCs`OhSGߕjez} f72T/|fz5$1f:]~sA]bLnHiG;RFMЍN<ҫk2+_jn匙|m!ΎrG Xۑו\F+3q0+?WwOGBn"yXsgG|bNb歠alQ~R.a-ciR.CyRBŒm,%?V!gwJ{ZP`N3zeG$ z\%fYE_.}uV54[(Z[f+H5+0 >yscHGȒR+ʜ$]W6,XGxɬs;<|a DWS̝D7;X[.w)E+aE'Ζ:d.{Xj2oͅ\R{#O=ܠ SQ^=V]j/-).4#StZƃyvs\U7r|j`UG99lA.$~81?7J4 rPc~C?L"3-p$,,Z}JzZ!Fؘ,Ql_;bH㽧ʐܨ7ZrmE#y$x^x.) X~:8oNeAmX};Yu` : heIдFf2bF 9ήa]́xE!i}FzQܔ 5pt.U`Em4tsbYxO#i|QfW<3zaٞd|HAoLʈg|a QWgqR G(ǽR򘟯Xl iSRv?)x<> Uo܊$^g"&ЩgҮO=SL <fRVWgk&76>{T!"8?ȇ,5)Sa/bbrwz COp9,լ>LCUN5Ǔ8-)EL2xu\L:LJ0cU-W`$ pRж`/?Gf.UTֆMda~Az O:?fPSa>ɼT_]5 ARR gC2Pͪg|GF q5{jI\ aHx*Є`= 5)6(-b B㞣T~P5_Njh0]ҝz uܠKd^}Xm}7O)ֆ{3')aHc9>{JǕFiX|]ClehCIRjVW/k:+/7/v]iVS P`!5C hD`buU`gR.BAMa-9m=DޓCm ӀZ`x -q do֝VGX&4v<8aG!W_܎ʲ0IE;'1O!L9&.2y=jC <$nL_'@Έ*cz>Ƒ)^@Ll8dyJ~ >|Ĉ+E) {Ca 6[eV0VD~̶VBExTɏTLᡌKғey, "5D"0(nGeZ7tWKm|/! {;@glrqKҵY#Hs_{)|7{x>=TA:hB?pX].%$}EFA.kƾOR;[c(!h.pA9Ij!?5(\ivs|؄b;'h\(nߛ<[I(ed$}flBK̟t {z~/ 2Y%V՞`~W- W5}r -OX|8}~A2KҲlıQVȜbmSzjE_eZk~S<, e;~2Bjp<0Zd`&׮f,:-ma}}-Vj摆T^Gm8}(oXݪ-1NtkD ;]DY4+w&՛A̴;m\]lݮ\af$u (JjC^(6cŕp 2+CA83/+0N\WPn, əb `i-ѡž 8XqK ;>{])>,dtx>&#]9Ng(R+Æ@xWU/Y1XW,Cx#khB>j!Ë,^_{{kw>C w޳mSN~P /JEp{:d9Co@}wv)>cK/FɜEf^Gc3Qm# <6AK!UޙdlCˣEn8`$6bm;S;[?Mq&Ժg&5~Lƫ7OwS8„iEO|cLw<HVkNc# .x$Ra˂)1]Tw>LZkMG;:  ^Z'ER?7IꢬE9omW8c}*rw[6Gct>r ˱di_B//k,30Z@{ӄ/Y֧B.6,o oRnp6\"q_O9fsv++`5!M):ejȏLɵcY.argĨ\ uB1vR| 6R6(2=a~rnv|šP5qZ_k0Ys۾@f4-8W-G=N H!L֎S2`gL ʶ_߫b}ǀƻZ nj̗QG 9;Zw~38ɲ ^٠}hC E"̢i&|p#K8۸@3Ũq];l2bRy9u[!PR_"C!@A.oñPpncel\Ѽ4"F$XPs͂&L])ٶWpHjM:ϼU-~d;&ksVc9/jTZBMZfd6$;<DB٩PzmC>޲ `JU%͕bnN#4Et"U"/U8M ;\}X1˶Aq59 53pybW (cE%R|$;͛ko`BS~\98zZË5:pk4ы6诛ҫ%;$<t%~B^( 9^8 ^MJC(ٲyh_F+s*~L@>II6yw*Vou//'p)a׿ig I9iKJ^74j ѓS J`y"CŔxD΃>ZQ,L wmw#^!/RwAMFUPxM`X =6 . WxJڧd\KYdd0 mYz j8+vdvZ˗?GWBBnMDlSg%'<66nHYS_~<R,Aâ?Mg䢁 ?Ya=}( [P7ME)d*"}e2n " p2t%f76`'W], ܣ.6>pa?( N˶X-݇@S)yfK |37 ``s  vT$}1> 2l"DI4Y/F av3`{a-ȱ=." u*ޝoÐhS^v2ws8U}D8hܮH/|΂ -| !QhrXlU6[-|KmXs>@{um;aJjY8}?5_r!cœ-4^['@ ."70%!,YwHn7STը3 k5TLZĺOmfll4M7H%wE|~t1hO׉;B?>H[A&bXLc;UipZ8<ց#H"T)5;E"=† KXC$-2Vj"|>Q(C|'v=ǝ|-q츧i}{ogYF1B,WuXAQfjRL+k5^?%&,H#b Ibu[ LOdabX8∳b3}v0 f({)UI@Bc<NYr<0  |p}S y_Bi;ik"rN'눧 FK˥CߎY&ϯHF&x,GJchSxo@yj^kyzD hW`#PQp;g#~׼,Nߩ 5K }=]l@U]9oO,Xwssm4b]&[m\M?B@P.Pv X.jwGWWX\/kC3:* 0ZTCI"*=MRb/\;lVS--H}>Ž3Ҩ_9yE)x"?mfj'hs5R1V`3֛m8  s =qm󂃕5?q9L7GK=ɺts:0TJ\3d"n:_7'HaSw?W =8MU'`%˖R};6$#C-#cޙ N(;b5[ `;7V"嗦>Oj]cSp.HBr{w휝 oC z;`B8F㨭P@J1K5 \V ,6{!:Pu0'}5u'(k NQ{$n%h!5Pͣ@IawCo'Zm рo70Q2 hT8G5v\&ZA'BS]Wo?R߬VY `946F؉G)!j^Ju<f?s7P 9>U+I n5;gfkkp?"[:f)GHi3YH`gtb`>׼b1%"*NTdz$JزjhoS" apꊗޣoCܩ5ºyD06Y5 匂#vI1To{Γ"|MK8 a! h/I<0 qlH `G1ҫ׸%S}!*7`q{3l*Pcmȍk!&}8hӭuenJ2Ü6pj%& Ӑ=o\@Җޝ-QӚsFr_<ͧN, ïRު"$Q'avRp0IhٻI &`̙=>$ Cj^ z |Knq69 Q,7CpBtl(XCIZ`G"_r>>7h;8r4:P1Ϳ$u o7δÆ ->KcqtniHe WL`s] P?+J]mffжTʋܟrv! H>2Aơ52=VMlQAVB# YlcNټx;&{oҢ#|75ш x^hbD i 99|nxRC=tu~M HX3(YAJ)5:;Q]R]DjhgtO>20E> {aTVmld rakƱaO-V6K'crԁ9R6*2|bB_ŁQnW&UkkzU޿ nĦ[j43o̕1pUξn}V<5V-Q 3 G)ظ-xWXB:Z}++F<#fd:%->F'͛)ml>9גg{q0gW19 d~{b )\?<=%=p\75yhs7"ZYo^صߛ6/t7g|=tjG]<<?^.dھ8ߊt>zEcqH|M%h\NytF$R! X_-e;}pelwI†XuAD( `YQ衉ζ?"Gj=1rR^F?3Q}9 cSJჟ?睁4GAV' \ UJ%YhxZ=FዸϸxPxvV>S4`2%nvLAg#vT^H#NVfYvYf P0GnאH}>GPz@UdzlQYuoSt ?.n6f*GrD W5X&W3e6YW82<Ub(XKݙE<@>:6Z)Ĝ[EL]z/Ғ:Od+D mliImn z/#ِ|C|Dlt]Q1I=Q]9wf!`>z55^ev}pZ"[Z:Ô4]{8U֬\5p-8뚪nA/0_YCBM4;%E1 Q(Zx$ Vt*z;G>-JO]:Il5::G,V+gƞ0Fi~'%-b+W1Ƌ E!虦 ƴ\ cM1j'p0# $;x #L݄o%]%N'F`1$[iz_}ZtD.R;lWG)ң q4͡a`Mjp^Ov&"*2s νg3 6ݭ?,]G9s sϨ_EcnBS,EB%80t2j#*0'.'Ҵ\Т/5 .?R),߾/ZNY,` /ּ">_H}00ڹXP8d/%mˬ綻v0+tl%dD8?-Zprg{O8rtDc y䈮{""} !/.\f ` F-+pЬް3|qcCd^W2B ۾:FWD#&jBJ8 6%ioT,hxb^H _}wy=͇8}6!h@^H!:pgڌ1)}묜-'!JȩU{F^i8#* o820/]PYk\^ 7S}(ձ '-lTϑ]Ȁ~d60(CCzF5nusOl®9&/+:K|Pl Cw~RL@mQ#$[Td A,3yhU\+0Ħmw$6gg2A ~ jח҅%y̦'|2q?R`^ 0U5|o/r/ȴ=]Pɪ^ XY/JJi$G)J99x#k52Wq$1!"8,y0^ԕ{kC*̊?ʺIڵյ̶ XMɋ6QYEw`·ݜ2^QYi\X:$㨢+M%Hia r4L'%1tJe*DkUrt$ d%gh>J$A52? !|H+ֵ/"-቙A$F 1$bʥ]L߮;Uʡ6%'@)<xiO*1δLN"TH]l˗Нc`Oa'V G 㓻HWlMJEaVqg6GxS>AL!^ ڈ?H,7iݞ$h[Ql #ay\_1P)' R39ӘL=pb1u k/n?~ߋqYV {wFLl!鮻9'Do+g餹j/zC_)}5E%$^݌QՉ9].\y<5aDMLWOFiJ[H>]/]ދht>XfD`сk94tj 7r$zu+;UUF ٞ=l~X8h hlSzfǍnuSֺ&Y)Uƨ^O%3$h0Q,_8S'oW_㭊'e< "J˪ /v3D~B!m@PRL+{ϡɈdXvOi7"}.,M3#ðSbH]U(qŠ6'D+@)dS,;zjT/AIyeLSJ`pIn"P P fj0~xƩKwq/L 7%_u2$1ŇawQ#0|XнmDJ>[Q&g$ls/p!>&|:A6@wHO-ڸ &l?OlY?kޞ7Pr~F8I&BMWW2ZnaF_#M)`v-w` _"`-)Qm|LhՙS*uA3BQ.V702gR[aRD(/SUC}D&e?]cՂWp xrIC{9 VK6ҽM@e*x?ypC_MU2 1i2cF:@& ֕&Da*s; Qn"%)W0a^ #18K?xh msn`1 պe1 =/kc̖kJnJfhk9I=$n2qOvw@ټYÍ%7E_Y4 T7RJv2CP1X][i _ dI?x M1XrNHu7ɖзa4>>^G[,`u2cOF'F*$|(J$!}(le]?wo }ú؝kTԌFEdrjbi$&["L˷,ck`e=.۽1p52G3q;@5:}v )vWCq:~fYch_[~"zyNI.]wCU@# @q%2 J%0ʈoA$D4y'476p/%,~ SEܶ'"&>@X!ֈӤnQ1 PS\p+D$=U.߅K{ Z$c*P&w 1✂w4<[= }t,#]z4D% FBy<*wByr1ƅ;0Kb˱.TAtט-#3KN?94 2*%4ڈ~ȿ5WGt y9t"+ӀM'5{Ӎ8~=\%n'GߗC%/@!thcBm e`\ڬr7ё\ qy}aW;Um:u,K@-Sfq`[Ǐ JrdS4 B@X#LěuK1B52t eM E.t0ܡBU8^@1S\NPʳo)]`Krw6?Uʮo4E[zӎ4z>-.ghO34+kVʝ\'xńZnM0ސmC$6=qiJfNSǞ+i1 W}ȴ=r*U7f(Dmdb*20ިSǪÄ0eFS7s\%2Z;EFsDaRE##1=.bc?4bCd|E=P>ٱ\1p.Bfܤ|/sHvDOy _ Q;dmtG?9HF#>*EUI%C̫ .kH'm9Sxgc$m Jlѐ2a*CzSj89S2>/2%-ws2tu.0ސih?vR/y%bRou3 ޺qdy\ a3*zl]]\3 0IR|2b2bQrG?K2K3g^Q 2۸rmSi &J+6q d;f7 wHA/K9``;Ұї鿭;2AskW;vS8C˙(Nzhy.c".Y/Z4*w.qNį{*#Vir =KZ4~_-.#Lr\ޟ|5FȺ&ed}Pc\YÒjGF0w9̣ږN˜&b)1\p>؝U}Jb";:b`?AZ"XG1qhy05Ojl=-i]&IR#G*f../fuX&=u:!4RVns @֌/.UL BDSu$|!5j$@UR|:=C~:t"@[ߋ>|#aޠ, lzn¥zl8,h>3jEæIHa\|ri&2wep.7ɈV;29qACkq:ECqym ǟ0HS iaŘ7!B<5;w PJMPrHubf]0 XoN`ܠ(؇lwPnZɻΌ-q0E"LN<0[nb0uo"!πۂ˖E ??']-8w4ͰU5l (}ehI>0 O13O$Q{nw64ODflD{< F12A.a^B9.oVg33݄ev @ȉw% QSXA5q@0p hzcLєj.f7byΨm/m$(G2$]ciqUm 59WH8g˪`ꢝ`tO ~N5Joq&Oxhm`%tΑe',qsAw=KFR(%Or Rkp}!9dhu87ן|(<gΟ'_7> @$YZ<=-[1r~DP={3\1= \H>]T~p䠩oqN[71ˣ4z) gu($`q9Î'ǦOZ}Ufi|@=ҳ+6PrVxyr!gD+wTYb.O=FAcㇱ/vV,ƽPSH%xa$t\59@ <`;q&К5R-&(SoY1 /+JmX^Zi@ Zv]Q?q&ŏFc[xu[XMpo ??D4?SQ.}z^zyw D1(ѣ-5 "NlMK//I&[kTaIpo݀^qNjZ+6Z)~Ϛ]u%ߤ'̦|ZpgS$sZ{ެgO1ڴ=8/[j![~ yvIO=3CIjIER/Nֈ&&A띏pN_ 3 z5 ZAql ՠWˎ 1dz+#WO^-K|Jk#J Q^\z<| ҫB&Q{ frgUvJ"[sb{\k ZW~-C[A +> I ЈqT3/VaQs`X T|Y^ tY@ܒu)d,s igaD~* ?z3/4 Q/Hig3+"5xUs1nz Â?>1213̆*;Wn/pQ7M)y9FPaz @͔n{dElfCmuIg&(תQ^-(:Kb 7$8vgԖ+ ^X6'nѱ%`Eۢ4wH2`'8˶mTҶ-Bd1lD={y$ivΈfHFQKZҽ@j-Sq{O\ &9ȥJAqEqԢjkJ~N+|2T|aMh0Vȗd@)XTK ¼uO'x=2)jd^)Yi76ڼ:"IXг7yhHǎ+X|~M u;w 1,?\Y>R0uAȱu3)A3V#  PD4/U3dg=Ȋ%iQK6£ :Qkl$rwk̟/OvmK}Ėic\D4)b/n5Gɤ/ Q&r@VI 'EWƌ"F'j#H+hV9 g픞bc~v9Tl_'c-F u&-@&=*cxX[AlɉΜm itl*3_ofDx8y*V22rOC`: Xחmx9~Cy<2is@/0D閲c=%V(.%ɉ@ciY߿h D4ODuh 0&&|.tJ!e$:F]zӀq$ *ɊlӐ wTLc[GW@`w/bd)[dgo͈ue,ѸF>SS]\@GeBLf]ut1}GEr&%}jMwQ*@N5A\,jpP6~He~iH$Yʩyu%t)şvGn 1*8"_=3P腜c[Іu}FLpҺ'wfN;JUNwpm?ËSLKl^8qNy0E/u hQ)kOI< ne_`qu5@"X&!` C9B9?4 Ě!d"&ڭa H}B8;# BF;B= Tg"%E/.yIbp`{Z]WX'a*Ttcf\)#HwEMUg0 uŇȝD]٘$دP;Q~H0I4';`Nس0rse딂g (-f▞_rmL6N2|߁vL\MWS %cDfpF*PQ5ȩV%va=ڱ0Up@9ISznӿZɹmD]tElT-bJm.L7"qJZ ՗W|;iЀaP$^;FAٔ 7W왟 %Vc{G60M,7x܉lÑ5{ ]qv8׀[hE _j?0EnfH$sv7 AwN;*I2PmHlGC뀻gg#K.cE+f3louL) oa63PB݁i)rLq ƴV5_ ecs mVZ=Sg4d /74Y)H[^pCrB۬4]~]P̒]S)<\G頼^)9VĴ$ "au?g`֛smY.1XDVMMjYrO&:. 2Ɖs q=>k[U Gn\|_5 Թ]JXPZʤP{f\Wwlg]a}3Hx1dK|V$`þp/,j8hnݦȈ="XTW<>'DgHܜl`on9*# zS%NsI-m1F!VV[ Vȯ9fAWgs:w06!# 6y<~4?z7Qջu1NtȊEB/FЍ` ju߈FR_BK1n5z"'65^J/NiQ:WeXYvr[9,RJ iU2 ~7ɯQS`*{ɯjKć i h-kQbkR ݬʴ_H}ҩs,R6k:IMU̓FR *U;s?M3L%ݣc߽bul#j V|f_BS+=bn{%J ?Ƕ5:NѫUO[?lE?^q(|בqjyeռ򽑘L .BSzyx6YpXq6Ga/^Hz4 f+Ԟ~Qi M`0l+q'/=51s#.O'5K->'ȹ^hk{k(Z7wS>d 3c$,hl(Ő7؝3d]|֩3̃qOkl,RPS=Rqf}ςy|jg8wp.30}zCf!ӥD@$y+%pBAcQL5%vRFi*VLW/I0&R?v2l"ұ[nAҚ wk݀Ilw$EzUܑnVއRJNթ3Ly_`΅T1z"[\ ^Fuo*9;*[EQ'v%q`V2I  D̊$(8D. ?sR0b|ȡ`ܣgU6TW6Ͷ ^҄Ԧ"xO5@Q?cc뼫 >{<(gĞa' z4B!abVp⼟L0xc`r]C1bPs$i`l mhxha9 +;.^T̎zPȪ˫1Y|o6Q.۾U-ڊ#x~xiJ(U N8 X8YrunO{JbtPwv~O'"g -|aQfSm\,)wx 4)u6̚\!,*^EZ ڐx\r9dPLVM*n>dl)i-{nhPUyniWhd[)M|d OH2":.z @ tMQSIPؙ2/L3BlaܗB?l^=uC\ɪ)g+Wܱ:@>2<7}\$b67ZIS~`0.Fd-P2\Q/l`:=Kri@09={ڕQXez f_=HKOv2]P5#O.Ҝc~FE^+$+TU <#ٔ9i]ѝoJ$_]|eU~y&_?@"搆e?W]/Qys$C-c7<<ȎQ @yV*:Ղt~(+ {D5ubMA9$ oԟȃ|첎@sE) xpʩ([<*E^M s^T&TE(D{o&gZ؜$I\{[׀E{է 3W3_$QC[f+ӉC`wAllK׬п]xuv7WmE>pT9)%#hUwɔPO~s/ũqQ*gDhoԽԓ?5fi4Gk3_Z&.fzU|5; 02 F$_ bR:(HCՙl8| 0DZjUB ƿZ.Ap TN[<OY cz@?UQȿa݈)c?f# M"fIeH,?# ^nE}#JknN姜diݟR>S^gz4V.[r{f79\J~LhA^=gp'Qg piк'z(S[9 .ڰV O;+*5X8?EtM`좷t=axKxi4r?-C?'LV-FGO jy ^/ʲ]PMX<$wx"vppn0s].y}S"5MHZ(Bbҗg1#XeCMzT Qp&V[aG6k=tC[`}v2b'Bm`X/P$w?E:d|@6xUa УۜakEÖK'+k@ hBtO'Mzp)Զ@ӳ0 BO}H&0L"wjS>R8 SZ~Il`$k,4`Nu[GV!̶JߒSeT;+ɪ!}FEl2߿# d*w~Q"R> 1I`zO/o Jdjtz `]M1!*AtiH.p*L[$`z'   # #qܧP3kSm-߆QQr^5e\JXmGxjB{}#1^M'fʗʍpZ;w_n3À* ;*`^#G"N1kuկ\c͓XEt?;JRږoA@~/o[Ԉ$E `E 7JX}Pԙt9}J=ʈM;W91WeRdI)ܽH=nQGuT52Ҋ3 I SA]ho={ǿ=B/Fk 0.J8m$V꡺{cYȧo{'=hU1auq0#aulh6Jn\/Zj*ᛶeg0RmT@E6KR약DXieLd"!/3Ж?t'~@`;$@&H9[-QB WVn3|f^ȐKyԓJEIHvS+ΎՒ o3ߖB%yl%F9U=Gq盂pV+?!JKA^l3G ҡ@ eі7' {Zy'ubYKy(@B]4лgӯFr6n#16"{Xu i#⾧f›sQڴyG${|EvH=pZ,Fk)t2~}jX:7c˅&ZGzkHP5t3ѥQ6gv"QԸUC;7Bp0- g&HXB f%w 4oكjMGD@  q/kI t %G=~s+:68,fL s޾d;T7̖jO ~ MKdBx/wχe$=!݅ saFm8Gj0x{4X^l͈ 1(D.W$Gy".V&zmښWlOgjKS3,>Y+& 8Džl2y)3[}BIwd {E+=1OhM)hÛɂFWg6m0aL(Hޏ ?*e@CAdA{QV.CDLQb=0M! ƣv,{`],(<fy:RX-PX<ղBI6t)!E[BL@`TCgV9I+sv&j-O:>a$HEqe.ZA/a< K( ֬@L9&lvvdS1)M77|,,ȹ8k9~'>#dBӗegáܹ4ؔC˓pdFȅ^dMimJ.MǕu莀 r\l qGbͳ 诅(Q-\@5T]dق+r9o[raݮy?y<ϖ)2W;`TW=ݟhH""N3+:IxgZwˀtbsKfe9%;Nx?˽5)׻?/km'pLPKq7zc|r:o6||2{rD(Y~mM0Je E:t "tdJ4~WGnzKJ96ŕDӤP|2 % -艩v;sl-up]sdØxF%,qj^rBj-Su)$@uHc S̪Lh?0Y\_Aalrz9)o8R_K&Ikܐ4ٝ3he=85&n哃ᘆF1VRj!XC5<0-g9>[Kɒ]*V)h"yB\QJ,fʲSISF%pg6"E>; !i+aV Ч֊v?`e"SRT'QRC#=6m=}E@;xML hb^[)Pވe%wwh6et47FcSNɂ}ꢙchkkC 9%L뾔{DeQkC{ "$,@Ӡm3j!YNs | j'U0'FL'B<gAqiH":E{KA[!MCTv퇔Q(Td@c1$c2-Sq X)䇺}FYoLC~,I,>6h.c3O?!}r۳`KD%LD g+NؘYKu}y/ =Nnd^d0d5M)2 ©c *]H[u#F1EnU(uф_&Ao·W>1bSr"EfDh^U 0MP5~#KZpXyx b-m{u&)g5bi'!pe:zG8 r.ҎKU,B`%^QGӀЯn%fυu S>(jG֬ α*2hLua\+JғK|kďRM(cޚPgEGR-ßf{WϺl}ܗdiU"m^C)i-Z{ڦ0aN i̒oi06-+>nP3ߞ91l³zIabԎD늍 Yͻk Fk?9ŷ Ld(𰑁E!hgMR+"ӛ2KP#wށ 1S'|qte9YuG׻vgW; *?b=`>|wQNjJ,>(8R5!I<Ylk iozkɕ/USrd>}uo0ȓ%jߕ{5m72ȿaN-=pFN DC=R3r#UqJkEm qV7?7ճe|HX?2!+%=~r ^"RزWZBkSȫ rBe34l ȸ@N~`m%\ڰ!7BxrS*V:rhxwI\I*7׹n@궸?@D׸Ȭâ7m^Jy7c;`~ 3#NOiOv?XEJXcqs5tBf2Ԝ r٠%ެghsc,$v>1֣fW'yu;5/6'-}\,ΰ^(ܵ3w-EȴkB` sxXOh鿲4 @"=~Cgՠ{N1tbG^YyM]>kH.\S@-#WOϻE&ׂO l `ʑXu@h#K:K-" #7%3eOX VG:7InLWi, x8v#Sh\bͶ^r;#_S̄KF.D=aNe WִT)b c,9Tk1?Ƅ7-V07MgE4Ojha]@,Cpn'P$ǒN7#> `ɳej"~_aCĜ-'sJ G/TB.}Mj1bM,ɇڞfB-NZ=Kn]Cv8GWY_3:99 #kO3тI@QXSʂX#՞|u"xo|z) G^_۩GWK*6E7fh(Cj!H~cuM lD~=Sp 8e^rpMTV@% p %uD&fJI¸tƠtQۏrՁ2%dt+9soey\,$C ^"UOo~fA8X=]E PT^Hx*O݄Ӟ~{nΙg0!.L)-]G1M3M[p`櫢 %/Ef!rP˱!> vl8LZ,9K7]u4ٝwl9"55lD$*f%i& \Z Tae_Z"? XSf̥<*h)f pLpC"㑅~Y|\: <$EPZnd۩`i~Fr><7ppڵqxHLc1p+*s>7OiRk. ·kcW" bA1ehc7 o!+ zJ}~:pp2a1^Jɕ[>j#V\M a2]ohXEmb뇈e~ mt)/O{LjO=$|ˡC tq%jf9Qp ZN l̵a@[8z]`+ڿIM7vz-xk8Gcf .femEm"OҸ5&g͊VlGa/J2{I[zWĔw1Vۯr@niRҲv=rRϩoA'Bus"?{vRX;Jww@y1:0x8~g~4sᦏ"v Ld8joi;Eaw ֜ p^3pOGm’6*UF$׎efi@v8~5G?$z#'AԜ/DV{N chf+QH{^D^mL0Řb< Q0xݞۿ$eХ 0r,x`ޥu%7u!{1ތKj0'lMi]WUNt"!_ 8C''X՗RkHZ{3~@zPRktM$ym <0ERmm4ڀ>ЯK='fR?U3˷>=~nn$zoiiMtܹ<>Vdgqo/H}>ik}بԈSIk>t{.H_XMR?Ժa>~NnuȪeZa?0&Rlv,Q6GGw G Ab/XTq#>=r EcW%1FRʰ!8OIU&'4Ԟ`F.=Pqgq*dB/5+WK3~aye;)*%C"&ՃRmN>#6S mvt)o]#;aͨ-v\[,/NE;H҇?wX*$O/ĞIPKb)%B!U's QJWE]N|:E#Q3FT7b[0*5[l-K: ؘ ;LO Li}lbѡL٤> 6y4 .E1+ݎYŝ~ X 2z'a!/C.ޭ/ חȣZ(l밵%3"6D.9qB(.y qt!s%J@U|j ^r'Ȩ5p!WLg^+Vʄ.BRb]? J. = vXu)#re+ZN7n)"_Xkm<ś`&[#jphL2Ap%Ekn7v~0+i Z4-[ 8p3⮘BLٞ;iƑefye˺=\\ S74#]L;/ZO/U,_rLPT(P ([;:,f$j 1I}nv00 l%Ćq׺blfU{M ]1{|ڜXܮV!qF\ЌWm =yBȆڀgG9ܬpR"ڇ4vwjY h[tEM^V6քs;h?l[dْ]TWz.+o S,9ۥ;_,BInZx甍ab(YE/o}y /üi(KV)bC;ع]QU,=Szg ml^q:[VNCÏNI%:uڊv5_VW^TR} ĠP9ܣ !9X^0*b.k'\A*OKʫh'kH١_G,TQ6te8YwkIh H=F+Eh7NsjOQ`Py ʙ JM,KC}ia8rl}a#s9}6%M&r߭'곐*ZԎGHs|/1 ƥŷ?Iy"1}QB%S9DC7;jVPNfCgav%Q(')9czFI+rǂ(h?I@4_殀a' GUߔl[| HG$MCRv_qxL+wr~]< |Ԁ{mdP*=M=Od7E݁CY\ wB#VȻi0O`{7BttY:bzH Gy :z a=;;SP~FVH\#A3;'ꥲ"A,b ȺIJD=|/*i҃agu=|aUBVTV AaO.7;yLe$p {WtNw ONI(GTW{WaҲU{`TԎD+2G'*'T8l/Ò?IUٖћ[ F9oo:pn wqYi2mW.5la. xcӓVuZϏnlW(w<<)a}mxEoM #Rq]m\VE<[2ZL\"3_E#[X: ښb1J5Pcqz}s}\H^ X{}yX1vc`w%8f/u +m^~n PD3ZmK2= ߷l׆Sgf /鼫 ԛ5HɿJ,&iOYiH`EY@j%3jb~3"'r^̃~sjvق]CҹB{"][(1زiѣ>a'd@b)ֳDfɥa. 3x礬K?izm J\d˿՟N`W*ʵhq X 8B :3# xT!q#S5RN]=_~3i]/f)9 ;PlV3|lQH {'9q# PA{?!ڠ=/Uq^ooE?8b8Q8 R1 U:wϞL/ U\g1_;-7pwӁC< z΅ >Yq,;`|拄v2&>GIzO̵9 3( ne57_/=8UԄMNi&:8ڣ]C%4 S%ڿ ?m7yVzSJ7U*=dy._5DFeQ })#NiR ou(2t }3OI|aGDb9f-Gل]j^AW,ƊZd,V@jl>gGd$, >A_x{MEDn0w$R?9Vk'HΆ̚L9#c!_a~u%oޯ(sY*0h-q |M|v,2V^?}T4 $M^ Dhuty;`YD'/oLQ,:d9Ή&QO}"%hOS Tmw7rޓ*tUSglK%5 Tuh"7,3.Su: X") }s% x/%r؇ڼ"&iP":IiߟzWNI刃՘' ̇J|nyEԳ5xRN+ن|>=_ u`!ൔ,gݜA4m"ө9FK$.EQ_#[M%0xs̤FU+"5B ޜqZ2KW^ӎV#yʽ<}qYz~VkK}w#ԏs,CV媰۸Gpp%5E#Юz95 vX]U97o6}mR(5J䏉 # Ab('"L;}N 1veseUpؼ Z5p-Y+LCY/#s^TDHɄ&4CdbBi WkinaT;5bϷȋLS]O】.ofpw5ܡeĉ=%AѼ =fbɳR<}`O_~.wNQ ZSLHjH`m(RkF}9Lnuix 5-(&7$1?ity D1]}h!Pج5bQ1]ҬߨJ^mt9,Yi"%ƕW'S *LCLKjACSq 7$$7&PLԡo j 揈 Ai^G{"9hǙ`'ϘE1/,XY$WYH2˱D F/0%H*]`A.yCգWppA9O}5(i(7p,/ݬ3 k3;=VA'x2ZEe а'r[&gVWÝyMspQ8D&AGُ;=eCkrxƨvhXN Ch@7HQEmTo:G%t1H,tjeP@-```67EK04*-Xa/^ڣ}OZE/@*a{ѨOYu>e7P/iL|% $_B:ueygԡXu۳p&g |Y04IJ46EA> L(U}"j`_ ~A_[ |ó_=n4Ps}$Yx t'zk^8ϣL)`cz+='+̱懿rk^3}vݠεK^XG-Xb!g$5Q /b iIppE̯֤i-iOqFGdn_YIVZԨRm%*ù5pFPm*knan8fO-$04c<ʀWY~FdTQQ0{8g.Z1ԤHHҵOAߟiʪG[.6KPeE/ƙ WlDM(?S5gdve)Edm32 4wkҹ? 7J=Rbkw"?MgF`+zq+3m>SIOqG,>Т[lm-YJs'%#9@J(Fa%wO_{@\j{6 z赼Ákna=CNmJFQW}Vm ySA!"66@AJXXj^<8y?aYfsI} Bds&$x@ -mT:gsV~K%)ֺ}؟Tv B犠_ tD֜͠bl3Yee,%&٪T4ͪtBf7hlQXM^oȋYR*9`Jx=9\Ux@~*qlY满iWܗ} ~d}%2քb7r+X_IQneטLIApg J`3,Ζdgg[rg_A¸?;\~-k PL>bnLfge'ɼ^<u,Os:WKDb5Qh!@&ewji{x7 #wͧ#֏3d7eYD __TlD4|$pm~_({eSG|PoK> >+vjκ<"l9ܹ|bTiAm*[t|P.U}h#݂뭥8=bjW;AuHIܧ2j ^\32;<=4T[XzD:3=9yD3wV) r:c˞&FfR=Gl0ܤBڻTT-˹/Yv.螡[#{H=\j){&1ԓ.g7@xyTR %WTO$5Sso)@#>Kk'NsNzpsJ"%r*OB6[R9XYۆFAzܱм]y(+qʋ.'Wv]4ȟE:= [E,z^LV^{"!PǝmZ2t"i|EHRFe% l"h얟V2Dc%vֺs ,x? ſq2%.}ݳZl;_cHX@IpddòsJ(IC7EُW`Ϡ)0[O$A/K6Ae|\?IGn2-??BkUͥ 2?(X< lV\d 0* JfBr6BfJB]HK胰"L(@ʂh=| ,SFmGqYępxGd^ÀEc-Ufݾ@fo$zTw|7_|O `ضK:^Q8j& Q.@p&j sLT/(|6v[qw*;K^8rVP\/'"Ϛ\Xh? l+K{66n$}4fgNtە;;0ZewwϬf$ B_z2ꝎDW#Ќ?k&fn_ X6(W+2i_gz{$mk"~zDL?QNr ;#eemJt'q+$A1>|_ɉ֎+fIb cG1XS#l7r1r39>(zEM!4.es z0GEFhޓ["\ܙB"ѿmu&p[bBX>^=PDD2N W^N@pIb3笼ǃxZ |3ƣr}x6!u.6L1CҰ8f[ ,~×ъjLZs^Nbh `kH ^n2)C9^2\S~ 1YCaYR.0MF>Z!̗-;OǸ!-0d-~fG݅4v^j hg RjLA~κƖ&Λ,Q⎤1fi,So߳kϛ*"G̱[i6@=CHr23 _,F@ٶpY5A!K0:&DI1EiSN'ؙtO;ƹhpD͞@R6~fg3JtC6Yk/+0k0t#?wz8HYlO5B@``,-̢]cF+uvXNѽ kL "txf;QiK>"ٰ ["k% Д#E5n>pRt#obol1]ߩ,Om[΅1EBY ޲c +I.O%vZpQ Kn]%^g՜Ӕ`Xfűآw_u'FY_V [ef ;mX]#/ތkQ8v4jp! 4\@TF" itCм'w},VW9֮̉HkDw^ԈN՛Vw+*\~5J!iF_55F *jaMVڀN$̫>0<ߟ-\'>xڍLHQ7iyyv>W5@V"S:b=ҡrR~(*##⬩I.m) ?P`|Et#J<,o?v!0hvXCBGX^WïvY }9|#&z \ Q#Rx-N} XbtP9N4 xˏVDA?Ww2xÇ75`@53'1" /;z6p.nzͥTU73@B]e80 _ ,$K]5!4IG3mm8@ :A  DHI;>*,WRDOVuJ (dJ+oL 7TFGXs$-to6g_/GV!2}׳;PenKP3 {.{vZ^U Q&ߓUU]^ i,[GwLk٘~'6%re:֤)Ll @?C40غud]qQ7CLjA+f  rwgcbR T$ETV=׾ 8dAE"ք)4h "[,U;r{yNT{&94dK ͂ID9l<2 RiMh6UOKŗg:#GmDS.ej d[γ=["N^BwyDVo\śy0Wn̮ԨI=';|}4VPJ7,,OSXdPm韄LĚ9SlWT&N'4)QfЏt8xt!K{XyG@f/6{V}iR5Zď6$ě7f?QȽy/17&7|+2ˀ4M7乫`h/zY\3}v$'p<}Rqf φY|R!s>'8l!+ȣwf2\$>(1}hZjL V<&j}!<ˀ!$wX1!3N!^s))(jJ됰%p4:|4:ڔ(nC0Tda,bF=bYt$_&ڱ_a~Z)OT;h~pFT]Lc蘠_eb^H2.d [*zՏo>ŝ~~ֲTu +?%2C(Tz :JJ ʥ;-VXJPT&+Mȁ>2>cD9n,Gg.1_fZ\ul3e|OBS26 :5dqjOjq:e$L!̒#$R+PcZ]Ip< 0NI`ZHP^ceNV>\6g\] b4V7aZ&Oi#U*(w.Z߉vzP='|yBVOC+LLNs'߬)=><)\O%3? '$S 9}>ʉY_1uQrӹ3]U{uVOdѝAr+OmYH"+(*?r+V[fק„h.Ӛe8b)9*Bhf։h=McbYiR$[a)mtsҝuK'Js/i[QN%jq[ΈLY6cGHЕ.̔:BLmmY!yaa5gz=^5<#ج4wT;u#PrUEnj%P=S[\{`v3Ux|ٝϒ$DvB^1֔߫%CNuYM2Q7@! mYMga.֟,^ݼ@h-#Ah*sË>?X9f}ok:%lvA:dP"8JRSfL'+{4Z s(p-) |x[qs[:a\57y?rrG[E:#g{BICkq֍ ĵUF3Td*ڪj R}:kG:MwhTx\@z2nTuyݣ2Nh1F%|@{,'<23ڸRP2bUg_(niM_l囹L[2IX2D 9zRl>[ "3e`Դ =1Q $" zLw4Q\gL_Js2*1Qf$S K_+ SFR;lIOh`2~f|d4Tih@#>AWZ8ϻ7q{giQqJ" wh뮆$[@a38_\Zr'(XIWaE>.^Upn6 ~=~wnO&9^;ag@ KF1lu95gT5o=Cr!j!cAq,DЀT`-pU3rE(m-ޘ\ݥ[Hfً1@)UTv{am#7ӸMzP΢S_aK!N%BX!OuQ}W-)RԹB+etXڟCQuܷ"MjI{3 ጠKP#P̶X>oX}A1Ƨd *J=opW1{_LDw3) 'wKؘ ] (.7O\]M&ֆz7 8$#'Y!ucyΦ $+Nڑlc0xR"h3XR[N -9CNL'JV!,ᎢgG8Sܥ"t*i(Y M9g%ji @rfM9#)| &< _WO\Y$ku&/¼>\<h/:[Qf! ҵ 2HT5>AH#/]~kݢ*:n'0h1^amZsZ2(LN" g4k02a"aR/)-T)23:.€Ƅxa!yip;1UZ#o0WN"T)[>@8/@^(jEL;1iƣUYC9mH|w118lfxuvV]t 6w CwejɵW'"A xIbSAP0נȴX܎ {.u? K3``C7*d5'gxhՉyKLs.HXEdm|8N=eGD[>-݃MwW-1LY{?~ިFzxWE)o K6a`t g~8 #cO{B#HEOeA<Ӳˍn1%VD&ZJ|ѤN\6*h{CQm}, a0ٰT;#ǃU~RPiP8W,_oGfӤ3Nۼ? r}()H}C)JT3?Y} Q2'}S0{PgǕ! 0zCIGC YDL /O@lz:8YYdb+j*H N+ 08?snݛie/nS'TT B![SVJ-*0< ┥sI|wԫTx'#U ʳcU7/ Q^1!g(')ъI5~?$@2<;Gfo~ W0TSu-1l|,Hx맼F.ăԭw&K=Aɭ.*$-Żԅ,u2iz9O&3HՏ'\қL>)HC/_qǒ8<Ί+ނ_J_=&̠d-ž\j3W ި!Q 1ABMg^gz\skk yE^أۮ ZT Svs*=ڤu Т4b6xFzyn"<墯]⋮o+Ze*Q%F~scM{{'fr6 sNݺۜ)RQ&#qUӪ(/\|kO|j-ZU_47]gR7v5ƽ[q7.^/m@cN8}+BiˤhlzRXzH {yO%z=5l-҅l<&fcd;0U"4;}1>^U7l9e`<1Ņ@ehݑ3eTIfKy K j?*MV67#.ڏP 6Ao V5XN} Q,7B1Fiس&c|N K%\Dp${`/^s !-Cj"&ƣFTγ=>tT'h)gVԥrcBC @oqW}d7! ➔?ŽHv?]]&!ޏ.h`)% k1Kjsciz^0Oe)F!U@|ߚslt!@QR#wZpBQrT8ݪEJ \s6r:KI}lgBFJ)Ԡ*:;\|C2[*yZ %+~wd./ JUc[ ckG@KN;D9<?˧P B e_㳪FZMHam] `1u#Yo|/[myIl(f㐬""Qy)4!̡@*i-MB+g) +i<2~p[dMaq?_?AK*x / |Vs77{RL# 0XwK.9eźeef[4%z!i%(stEI8vHUQq/-Bl<鑫%/b;xn SԹcνxJe$Pɫo|Pσ<.'; JՎۙ~A~mk>-=x߫_4d$ :iw0SDZ(t:_iJͦ%Z 7 iq5YL…MiN_J)}]5s{9zQEm9nкrxΥёz=@Q)hE[eɘl+GMGj泘 l)!pLZc ogrlp&Fj0{Q]Ly<&f)S3Q2,|cb ewDj*T.eغRb*$"B#TprX!oTb]@.֥4kC4sΰ",F`ѽY\'n&(/^,^109.J[ S(XR>ֿ L Y"EOkd6SGa*U{q)ڙb쩃=Ii0ɽ\iT5A&CZ&Ԗ+ Z 9 C9IMɢB;ݱ߀k˜O^) Ҏ!/nM70Pc<4Y)c_X<8+ UeyϏ9W\'h׼dٽXrr XZjVJjnnxFXImiJSZ-)nDu,2xmr)Wnƃ%gwϦ%:ښsQ7-16jh 6dDR \s/}vMѬjǀ6m}.;z8Y34MwXH9} ZGYTc>&<w(g?yf-27h'1yB7CtS?ua)K$$663*)F`$G{B!p?D&+/fb4 `#jB^>ƈI&ذ_0(SU1tF{J52ak [))!v; ܸR41kf( D+ynnj F .,zt׶i+;|W>5+%%O3%Y T`w,;5}j4fĆ/:O;5Cje7UXfenlJ eW亄ٺ8*k>\-m^=rA { 1nCzcld7ӤO nLC$hksQپN@ѹyE7" &J5(--#06yO˴D%Юn <`/yk0o1\JД'* tZ'۹c;ĥU|H@#E)p5#0XXJQjZuYڛr'h 2p>;pzmH`0q9B;YwSsmdёIK`a0&dCAIW3'~vnDAsEN毤ap2ЉWSyObj#vHrPQi`:/CM-鲛| WM5Ѡ2*^,g OxE} FA< QYfl:Q?iAC$j>Z t<1ڜ&Ӏ:{Gw`ට5l1T!Bl{@ےA ݚwSеpE@6.JZ- > ~ٓ{lN|T^${ގ o20Jo5U|F QX$v܌VF-J((P/miVkb"1*6XqR'_9yDVna@2?b پ~ =3+d:S;Ci|~k.S% QId aHEςfco5e2lPLE7!삗O4:tYYFcޯu#RbB0vՐ$.AFrK`jlO$FːcU12Q]\񻶑0ز}!N|cd#)&T0_iQnY«0}^:odt1ZQ?qhb֕< vqh읉ڎ9ԙQ6ȒҒ.w8|{ٶaP*CDH6) ~#*U@Ȭ?o3sYYIBhV:w%8n22 x!@pb0 8>[6$q:} g+gܽ+NL(&cc8U06w 2BsF<@s䛴#?e"2b yзG])JLS& 6?Pe}pg.1>Q$c˖4pVh3L4O8eY'ia Fouth Y`b\(f1(KVmn3&[\P\tA/F'0l='."u/ƾ4H.Kh3oqwB|9j8:#;&ry K5{2zAĪb:WN~+);`}9e*jhK,k2 ILM@7r;e[ ~uΒ($ x95 "RzOޠP g(n]nm{i!H<%>]Y$!L3Ydes#0alDVvJ0FKi9#D9B- _/e?6k}[0(]y) Z^cZeɡA*yb_ٕ=Dv)0`[Oe?E8BiXi& #H̻}|C T s8}Y C&Mިѷ ԕ`h+g\w(Ϋ:K4 BalKZv-j07ZG޷?%`8 nQ%&Nbj3lg?xCgf1Z{#pz!,!`sCmd--ui-E-݄5yp*Pmo^|6t7$݂\i1tDNkFw'xw21d?Ci^"vmgSﯴ-{^/PZ ,@[z3-gSv<@Yxo2MD^w9< mD^Ȋ'v@zٕ#MM][J]e]/Rl '`$]벱2o2֧W1oSh/Ok?1H)kP$/86ߐjUc-ME=x.~,6b9@̖lZqjǘb¼;Zʯ pdBlmSfE&t>5JO؜:gE݁W+DȰs'BξZy`K0g) U*VtWy>j4ML% #gb2$pKcݭԈ p?d.N 4TըlxvQ-OޫS!84KVjM ?Z2qVyNBi67\Mo䃋yKl}* /OZ6Dyy<\ rkcX!UFAضęWł/1nT7Ϊ]$_» ӂ_D:Ά9zK񑫤 vo^JD7|GG7nѷmmԗ.5yhƦ(2xQC{ڌiq汙&BWM)?Ѻr90pCDT.y| 7w3T`6rpC"$,ntR^}k!:A=KE/-EB? =4頷2|'>5`{i}`4g9%IςʲDm#Q]i1,Szbv=jpHhTbj{F(ku}XZRc$tˠ%;t%bNu8mu)=*nLɸg,wZy<)D1O4aؓΘ["3>I.FӉpL+j$+|m|Z# +ǦE(q#;$' Ԣz+ai;b5[F)f=b3Sz1Zmi=m>$rv>9ڴ$/=N$7E #1']k$6¨X#FmYGB4|0v`ٌV2e5Gi=_ݫt>bz^I%.\O5B^~F _wE1|~l0 !xOfe<'HHo~0'H+ߥK~nN-콜-'-ГN75dI`bA#Ha$ \Y6Ya P-}V^HGȽ'kr-+ h#.HżE} QT>9{-mpC{K違xdoH\#%OVs)bgzO!yCu*ľ-Cc 9"#rH!x` f8>Fu[kƷ{t{FѼ_fN< ( frѺ-#7r)kdzƦQonvu&vxԯjkغ7OnS,a/YsnӪ^,+Vrt^nh1=zT!| BI h^p䔆G#V9 W2XX#tsnQϭ %e/4>&R;OUF "q7} =[`I@6Rp/[4AT/k.k dbUxubJpa5zcYV&\&uCwW2Ab  */Lj ӬJWZk]xlr턛GdsF Gq(o;4cUO?drΫl!"I̜AR%RWǢ⭪rXcdcʏÕJW*[*+lxLpp.;e&&tG\e9N:ɨ&# -/1>(p`qnJ)tfvKOLA{ꃪ Cs}he`ߥUg&\2\Ӻ=0 H;| L0*sߟ,0qXR8Bm!žxq).vB0txa.^ :toG%Hr~$> Wxq]xGpRTAY$z$=}z(PY@PBqmRb&gΠIXxUBǝ{cdR e(*\C^pq=ʪeIF5A`/ZoY ^\j:*4{5Cf)MK6,LvDC;chλ+X`4!._#$#).{`0Bee: "BR!2XU/n`0s>(a4̢5]lF6 .>^˒(y#,3P m(o1cPfPc{;[-sFD{p`oT0x^,`:,H^8ّ{H٭jvy^>J- ݼ ";8*pzЋX|\w>?LWeKD1|ǤX287~%]N)'Z.:f|5> 4yoGj)al_OL')_CS_?lesOS[=(㍓$e{tKpy '%̂Z0^jeR.wca$W>kn{\1=B2Us!ugz KlM=S'>xv IwsF>-741?rxHh77ٔrmSV^_V^= 1T%6eUZ,s^_vw6\<_G+fٛA)qVQedpqw-_"7[gm|+D7fƺBŞbEjxځǽtNlWys(_\3WcRoᲂ˵G.w#|΁䤳2/bv|~hp?5^7)УS8s2 h7A ^VOQa`G{<_L7 e:Tzp]lՂ=r7Իw\Ԛwh*\y۷1e PT2\xw+tdXzAٖOΏ٪'ܻx+1X=cp2]S.-KK\'~.ìAV9L~fIyp:[?b`ۇw96t3竝y]`wkRҖmcx: ڶgjAm?-%Sh9s1rWOc=6Cs:f+g@W3>hNo-ؓR.q!^tdaVV-W?|2Foi*L۷p A'`_- Xa]t!Ut3=߈ 3?Kxa```bdP€?xTn0 ?KǰA:`kE/vp$H~2y:}^z)e9s [H`Nk]]Қe@,8ˤ*d+d(Z.X9~."wa߶8cn%}FVTv?C/ߋEQ|ͼ1:Ŋ"{1x#R4m8BeCw-}RqF@?Wã]K#'³mrJw<\>.n$͇n]IJ:&(FoZ_rcqhq26u@IS2]_:go-ͽ_'1FѦ]d4 \>7T$<)*km3>">?]gkV?g/=;;@M2+Qҋ( GIYb$"TTW%#7S"%]_RTZg28bg:+ ~(>I趁ҞЕ*fg+,Z>%'|wlB~b'qRM>v=TOkb$k$Ɠm;cB"A)d,DP,iFУve$lLqfH-(ХH"qCN,YzvSG}V{ԣНx3tDtB=;v+Ѩ"Ɏ\:æmzJLؾ. 7nd$F[  g$ٱFrb {ܰl7V*b5vLp2l{+f85]4vߝnTVqʸ0Hs=bSh/A UBUvwc@i3Ӄkr¦/!eP 8c RLX},U,+׽K.JVj1#y[#- 6˞l?$O2pA*7 @҆ * *T Wl!^/*ڶKeЯ6L#mc+=^#]jro05^٤;!_$ʯ 5!@-" r9e%W6QErxiaFZlEi<qK0s ٲ5,:ի48#[I;~= >kS{4Hӈ֠;wkWi(sNY-{F ڄ)[[3o5D[WF?~s>!Oa+7Mp^,: Zk'T) pJ|f6wE'e~Q,i;VMUeϱj&$~c%֠7T 1X/=ZNp+,^6 u9ɍoҗyiFZV-׭c K>XFW-8Wond5/VN}ëf˦rPGY} ?<34Xr@7.ܑ,$j;D5Y7H}mp0 X1R!lʬo$UNKC[pGcx5H8CEXmtjq2ݢ7e1㈽v0| Yg8DK"Oi=1%Ur"T탬/OȐpv;#g׾vtmS JsWRE0]iBPGe3v|j HIZ<=G8U<™r213*Dv} q1cn=̹909wKF`|?geu5T TuzKXEs"B:*JS&Jxc``P;A{* A⹚ br-/G2DO+V=ݟSUKؕvjJ*4o>Rh%gkz",Ss+ã/iUn}ޞT*EM:ªJ&i|R%)}W1h9Pi9ŃV0Fh0$gW&%wmJq),/"]a〸5Ćtٷ"$wU3Ob(`Tߛq! _R&(\ lנ'^\eqfs:J:9d- 73O#0X]0@afF.m3Q lG*Yb <\g|ف'<q@xл2𬟅ko26|D$H٢g͡ō ?-x kުp~|./.Qv.$3T|R w[Fٞ A:TYYx{E1?÷Ѐz&l>Uux~v݃ N79ӫ.b.mç5iF#p.C}Z3Cl:[cfv(ۚBk-v=h)W/ɯ+07(Ó |C$&5`FMb\9Fe;>hYX*&"?LV0cPL 3iG;6{~p&:M>0`Ia-,em9ӥKӎRTRY/%~8&xT)_##-Xa\;51UR"$󫴢||HP}茣RKyVh"n1 n ̩ϥmR1nYGƥ$^G/'%Oz 3^ 5pa 2R\Fic97-{3KÀ]Q;(8saXȲ |CY Ō(tTg{fAOVcrG] ں@]S7t#)YZN)j\ Zg6mWkTԩD1ݔL7_3ɌG:1"g= &h(MGVg5`ӌَHytx0®eЁ4Iը,bӰ>eRHݑBݮ`,Upw`E m%ehq1lOCFz4a4N{e.JgPb¼Q>m2xx>)jA(VhP4@.m=7y$: ͰI!UKҗa~Db@6CK E4Zv#-&.U-5eX8D5;vv0mf_gy %a7cL j4K11Դ`ʆ)Rc.jtƸl Sa{Q7;Xx͛Vƃ Ed 7٬Ip=Gp%A-c}ۉ d 23-OC*pf{}d>8Veٱ&/s9l #|LVnn'r,$N͙\JRgoo޵{ l~(yl%u=k׮$wl/ju7™^6:x1z c3G_v{ڒXK߰ v@Ki|QM9"Nf8'K" Dx RtmaI-}ln  ­bO|^  (TA*7L@rD"l+ ~0T|D:䎸V4ao.0d}U\msrw ѡT\LDZl3frOc xa```bd.ePf8pxc``Q@pn`rw<|¡_4tAQv4N'#mb,d׆6 P U333]J ,۩^0gϡNB} q?E {qm۹"MMz7_t=cp:POh/$[~ݐe%3.5žb}y(u.`qHG؅~K !~8], •}G.Ѝ珛W۷ty0DiD!ZECvFQL0 ._ĵ^=#e@;0w+dg5iNF@3shX?RM wrQgjNNۖ K7?FU7·ʁM .?{x !G.WEnw &<-+:~yvawhc'NJW/l)Cڽe`K tY|+Um !֤ep/7b>f%y.:Fۚӆ##Dkz#Y磃p~# 8д޺ ^qx̯^_>SsJWOpni里G 6G`l k)4O^Fu"'h~;#h2x 8Μ: u~;ȪBW <'Z@O\zM Do.OIAZ 2Yإjiw%b(qg)8:~Q }*E/pvPO:ـRYp=,ÚYs ={,/׿ <:(ZOMgS5 u4 jl#מӪC&#˩ 2rzU`$g%F*2v &= Wd.vQW=yqnH1틘wr8zt 7^ƅo(ǚ皘3;M{ڱ#X0]6Lp/B #CI!A/"3!Ii\}cxM&CCPCd-[952 jUbͰC  28PCzVhhjvI'wliQ$2v{&>1<2?…:OTGkՔ[YSZlޑy2[gKsK2Srϕk2Q{dڟ  5u3M<Em=s 5n}nW;VOt4eP"d0+fMke^w?).Jęr/xm2f*zU[ϮRfS,+ÐE`'Z>n!eЋH%R_\/ZA FSN\1I> grS.Ӿ54Y"%,á:{ں!Ll>F]>fw^(:UN{ΜZ7(׭>UH@P4jX017$cGʴmLgqq:ǝsi&{+ek31ؕ9Clb쀥 0|R׽l<] / \;;ݷͿJbͺa lltJ\@*=|.XF$/x'f\=R^;]2~S049M؋Cx%~,C'+س-IxYx_ ߱MzP"LgmS(U:s0V5"TE-BQf? s#l0ڍJ KXy4~iwJ'Jq>Mw.ga74/)GtJH=)8.! lmM#PLđ/֡g<<|ǵ:HuPX&=kOᢩ{ٓvG<}#%=-Ra-YtÒ쬿8 ħIH)+B$ۨfV4m+M༙NE[<8AO᭓őɝ@EOw ;qs&x<@# %πB)4D0O[{I++wړӲAB+ggƛD ?2ߠk+S?o4*ͫdxw{?lI0ILݣ)c3uMLNo:E?#%L _-E(gע{0Қl¾'Fo\B=k-MMV[Zo Z̾fW{:(o߽G vv{VU[UT [jGG(TBvͬDn5|]#zhmB$rU">WLYddcCAn,W(Wau JrQ=@hbڜB鍖[Vyn9QeG![Tv &BZ%Ԇ8Z\bEPRROp1e`@ ڎՙZP:D}Ӛz֥$3#t~-hsܱ]S5zS;<{UX6) A,a >+XhwLR _a}{Z:$Ynip;Emf('wy(/w4cu%(7O(-y U|+Oq6q=6J)%(^CgQ^[J1sf gyE",$whRjcFȱYMVR㽉{Y2ny0c^ڣϏc0@+ɷ '80 s9r+Y!=t4'~~Khyb4u{MqډGs-ږı]̙'nY> FQO:9!3ouz'8[a Z:E\v3Yc7@Lq<"+\Qþ4icu8YiY傘 i%ت=?ژd"+?mԆ2̄K]X9"$2?  zz-20.-RA?M])RVoОqVǽSV{ >ܼV1՛ ~G[tRj1R疑8ҟxR0͂J{q:ܩM_74~~ڃ;^œ :6kW1Qt6LTBA6y88KM,n }oa 7r?k:RCr"R Ana.7D4WUQE46hC$ } q胢E#bD/`A̿)c&- RЖqV;$*>jK&$l-׮䅹4@=V+֓*ʅiabm߭_ =aRc&,j蕟QMByj^S'% st˿R>zOCzJ'' )hՍGRhI s m2COv :x.~6(ez$y6!z}",Jg2Y!V{[>"jew;nmjBKypgf[7V:82} &ȝF~f-_^q{##qs.=w ̣[m|Bu+ =eYhOAUCƇ;C֙KsCd2Nl:io\}nMKp(M򛯶C}Mp.&ā6E[٣˙&.D :9IOX(1\mcbVa"c#$}@c.k9pe_j/ރ!>2Ls \kgʫ<}/o6,8(UQ=aPr+$'}L yd@P`{: d8MM')NM3&=  /n'qy.dž^n/O8VC3kZ; Sb['LU;`tt>cOyPw=㟂Hs,plKv؜B?ci:CpDiE=##|e7-| 0g*jv+5νuTXOZe?A f5 ] 00~ -/bs|*'r6ǺIVd;XRѪ70>O1'?'Cs}%|px\ZЬUg(Z~D|;}sY=Fa|) T?wb.P W$M[Y3$үܴzp`_.tV9e ج*9oP&>)7Z>e:tڠ8m?|OL6ɰP,OXU (n; :PK(1?cO/4ؘpa iKr 'zt2*_c?IҙơoB*aoIEǡv1:`֕z򚅦fJR# 滊I_}ןF60\(2֑d]ofa;?^Ə;s8y-k=A޶sۧT糔=9D(Ifv\>76qC1lX;dm9r{<7|Z,޿WI? fV {4CO=xdC_IkNH<%mCo 31XK24W!'czy >H5!hiRn R &gօMӬ.:@zRU҂O7"A1v  KA uR^MԳTrfΊ/D櫸J+W杻U#j"*?w0`½$4Iȑ:3?ڋr>K2X@˙yNLFބ&$0+Rٸ ?j`xv<ϡ{lںT1ǭ2dފZH\u?'zGE˴<{h+!JNڈoZVʑrAFmOzWie8Y$oYB-%{Y]Ӧ@#(VdZez~Hc:ks\݆DvM_8.LN9iU*x8/8.3 &5Rp=LfԵ5 }8 l:!ȌK8~ޱPg(;"I$I*0GㄘVhl޳/A2l `3aW^SAExUt%y: L /9vvhgvT3híS,i l|۱s,A^`@s P<3m/O.JiEPgq0N >*.148q k[߂ٚʥܯYix`;d E"8P9lcU>Gav W"6!e nmbq7Sr+춛o) Ѝ[f5|p:,!Ye~gT4=|)%vNWk?\=yJf]y9h(at.Wd X,FE s!-}pƥ9\𦤜O^Za ,yԇV;}8`*BYkV-M [ٚ drD8B#S)Zӽ`3ތ͠`2^a5QCSvchڏ;i1=W%v+n%nWgIP75}e ۛ&GWI^ 3 )HRz`]n(C lP ;7nml ʳ -Ҿ~xJ.IK)qb ^Z¾-H)Qgӑ2 E%nW`/-"jɯ2#< +I³2[)z l*XzBSDks2gD):swad1Q{v>4s 4p 긕e6ƣ21x[Jj?/<.< 7q248p06cZuiZ49-6CأjWL$}d3kZP;pMZkN~v@jsVv+iCHѳwj&!O<Ҙ ښ΂U1X@)L4L9.ͦ"V5zO4 atl//dL"nW)DJGs\Ňb{ya~f<.'~d"2]2O/, , ©S J,Ÿlatnclrև{=d&})7u\JF iQ̹a$+ nQ|da5=)%㑑z M;LUZؾZr]/9`'ϋW~D}=$}n3Jԩ,dR?qp޳kGc8 ڭ?{t0/XwnZ"lA#=A7*cK p`ޥa UIJMC?tB)L$=oå /XUߚ~+W, 's1920?@[bnO(%;_VͣIfG[a}st 'yBuXF-rYVS #)MCW Z!;Ff O/ލpʚ#m--ԺC!3ޜohHkvacn<:[ :>ߝC u4?.i8T,DS0?l۽w'F{_,^"r=9, gr2]l=aaN= s޶z՚| ɓ4B˳GZH:i;D:Vzغ'X/5'xwy@JjRrq%@I75~x׏w@[}I 'V ǿB݁ `r_7L8OˇIxG6MSpe8(#U j D:BōMݩt"3+ԙtPQPjYPdlꈤFW٢_1ILfRhz6 Ҝ- xc`` xc`` s>EQ?RUTҍRd2W nLho>ٞjo ێE߬Dq^0pbV][]#nֶjmal4Hlkꌭa)%6?k05af~3LTjsbȊIRlEF+R9F`Yd0̗\n6JYt9qH]Ͳb Oqc }8{e\,ΆBbCeaт:r,dzF#&8*F).J ^,)^4lrJ1ϸ9S쭗 mfvYkj `wŝ{Tک=C1m{+ -TKT`uHڲe>w[jmP[Tגmfq+JQnc1k"Sѻ?u;^ӪdThAA꙰+G^TaɌul2HW-R8ԉp^Mt1nSyht"Y !A9~H_E*pLQ}GcNvZOptݖ7>_IRUW;>5$F᳷wW5qx\;jκ@ӐXl!bBЉy4Ս1C~fXRN:mլG,? Kpg`IRI6?тrQ[6\G3oD:-Y xX'=ø8_ʹ⑇YNn&J"1-8&\hE*qc/p9 +]t!K֓IePh4[1\M &ѵ^I!}1F$Ìɛfeґل?CSZLDTT-3v⤃hiE>SІE6lƐf2Eb#h1ϺCg}gԐ k'QX$vɤ+N=at?Cӣh QtôsYiRc3Cf_jB̦c F#XƶsU蜔Shb'7<(|U TG h-n&^&{,KTk$6\m!񔖍d2Qۿſ{*kbahs}Xt(IUL|`J2!1|aFӐ|vg M8 =:[p1Ic/֏yg- 5EI82w,i_fW{/z잆,]坚{pG7>tR=kdH?s)`:\bk,'m *%H >'.N^1 ͨm>;!1A]+AmY&p]DiQGkj96x#0'qY/dXnt+%k109#pΐt8\vs+5!^+,1N _c*vog~|_ӕę웄.qpOR|Uh=y($^ŷ9 ҽvX/ p_tg\ k> 6-Cuduonzw] !lyl;ƚ]tsw& hsSpy7^yaloK3s[Dn ?nAvD!&dsD0PYM>m]WqHbSd :lC,:Ks/tL75ӕ:Woa'Ԙ`a,̍yLov],ࢡ'!Eg+QUn]S҂=VozP9MJvco0.W򓘭87yZQj.U5GWPkFA:&۰!P3&c Jq?H4 J*$>~֪SyIBϬ>=8)A jkȊ@=m$<A2HBlk㑈<65mS&=!σekrT37I F49Ԅ§3pu!w\X'H.mq~4λOBai؂w 36{gv_>sR]|J`.uof;Q ˊfQ? ÒO*+tlEarVac{9.+a2Tv^[ZjEBoQ\^LpgUjJrAj۹KE׈I ug'|EۥYפnf$7J^+O<,lC5~ A[>oІ3+PBI}Բ(b#@Ѓu0{Oɽ!@r;:Y\ξ yFw?U!j:[`,H䡁-܅{Vx^6Ta|Lkvmλ'f:z=T y#D7kza;ʌL73S6,G*@=n/鐢p(KMXcc;{ے= GfcQ2$@V |7!Mr^N s|/ONB:) Enugz300?3]rɽ0};&%-i8,gQ̟g1yiPdo?>Sdf؞Kl2y3xCqb /Cj0eXm+G/r~>2pTxq}ux>Q%0q~;wU%U?_.q'!3R5u ҏbLdPʲ>4=j9[ܗv{"öi0hف@>Sm jH+l/p8[Jtҝf4XIt<v81GO&U|/S/lLgSVƤs@o3j>w=lAvvMJRR4*AIs!ǭ IqV7mPDi ! ^4l 3"'XTɒLut%nѢe1sv*;asbL\Aq0Ukٔu=m=Ҳg?gJ両J~Ju*_}cWzt\|y4}X)亡.v6L'SI}2jƧ[P6,Wl<}&O0#5&FFMO9 5IL}n K1eW{ 5޸&{S!%Hz3)Cb<%adrrHy{YM95V` TB2mԕx"a K-hvSt^|2+4cG5ʉ9jAHݣP|KȮqlvC B7%VsqÈɸ"ijp7&L(`D`F$9Vb͵kp1 T— 觇L)#*]i@{P?5YPdMblW9 qV}EU4 \`ֳֽei#:U޽33gǠ! %_l,ڼnRf?M6vo}5 N6`'훻W0J(MAnCp]O@+)"٨#E`lH->cu6Yy} QlLoggq/Ij.;uO@ q '%vyGtuGuۭߚz`ijД{ʃ#Xq(ayԿ oyRzIMW|Ӌ<緯D& Ҡr[_pNV rvt4'DWzS=wB&І7'1G7>Lb!؄"E,2xnI[ 4aClH M}]QGڒ84h0}-D--&kESZ8ڴX,["6˴C`cDZh>Iؔa^Gp죲JSZ,|ފ@p6SSEVIL}OPք"%8YZ8V6@g Z80|`80&.A(A+O[Ztx<2,Xr.1 +%ŕme-n3c K70ӌs*x4V6VQi<W ,( H8>$AUbCڀV>A/CFR6#7Dim*4t,#H"11?,L/c.1Ae01heĒ|Z./ψV&0?[4`(hqp) ߰20P~,?QRx7b/ #X$fȾDBkFPY@LUx1iպt^ h;}PQ4w#hn!ݧN<&V!UzV9 sAJrWxv{CqMΎw$IGxK*ml Ʀʺ:e4yhIHAuIlk8حk]Yec-ԣ\7:1KR(Dp@R8[Tdh>#AWp7lC+>h!*Mf8g,A_ߪf;Փ5PP6J]Ms[OSGޗ>0SgYHfaZ zaKql={E9إg`m5衂w&y3.Lɖ3 ϙki?Re|gX|INGW1Q,_m ^TWDZ?Cl}_r=.>0͝"5qAgb(gDx\L5PM~@XVsۙ#tg r8mBu|CrZ"l`_b[WbN ].2s>!,.tⰶ[i]?ݼup\"I^Qӯ]x1EpI'}4iTJq8h9!(NB?"yqyBMS:|A4At;/Yl{'p3Ukù T1-Ne*K$WMz>Q>ߎ,Ꮱd[{0wR_ľ&lUڌn?&C/YM߀ 蠛Cf4Fܨ qwSvs_Bţy'r6J=B ;z:p/+=8C/Y5Ip@vFo>d}R7) w\M7wY4m;@<|bΝ=xyf7 !؎Vx5-!n3*-5.R&2AlIyk]%`WINS5<xc`` xU 0 ES˨`]c}3|18prs/*xi7s>i7f0I@O=aQxlslkZPyL ^~؅%Ny&<;IJFG4Z 9n T Oe `@ xa```bd8:A]0(p3tI*KȒ1` 1.؂:ۥT<.6vF:3dh mX:?Dr}4*t6#KSԄ26n_ kvO:OOI4U GA<?HJ6Y5zЈMM|.G,H,j6uOo`(m`bIWѨkQkT]oۭYXY(YS<'ѬHI;L^gqJF[-99n+iZ r=dζJ5nƉf{ɺeF\i()\m<0oRs n#Mԕ*ojܘi6G#.@)ך&z>Z |s!.~ʃ1\^lqkse1$[Qoڜ mi'U:?աZKh&77n:VSD]pImC~UGLxON{q fX⁑! pGn M}aXUy,pƻnuXyRZ$k\HA%[Dp`uiY/Hz/B{`oh M8!d.am/I|X[' 7E6-*Gqm=xa^8>}_u|/xG ,+)wcUJWO{ q4b(MbW.#_ȱ~*:cftoxJgg-`0񉰂pJ|\wBh- A^\ym50o 0(P.Dolq'aSX S_0M!::ݒ ̮pqo&y*2pBX:|i"88C bvf0};FbPb.5L|o3K&dI-8ExTM04 .H q@\rRg6ֵ#{\8qf=7r7o+rd߷ox2 e "K&ZJ)Oj)|Xhe KJ= |F$/QԻt#\O?M)?~(7VGcexy2vc^"m/82r-ƒ؝~+%_Tv61Xxj|`G삤f=DRn b!ݧr3^ŌҞPx2 3vJ֌3? |Gs)pG_r<%`6)"ٞ*iNɎn$܃t8|š~QKrQfjC8.jBP-@G+C\}Lg+]^/MBx c (] kt3^€yxTAkAKtb{*cXT$DLK%lvnؙI{[t$ߦ2I"#!Hdc Dk3JړVD2LiIcl6U*d!K^M'wx!B@*_6%ް. ]P)G^gk"Ͱ2=QMK8ɂmD]Òá9M,Kh&f2teq9FHg^u܎}FW47ƲE?5}jlffJq-h4`=$4){i L|N=!pMFG/1$djxl[~][[]<`Jn۠>Peߋܢu.%WH.oNWYiڭ?ovWk/oo[w[ze(56Qî/߯=M`n'~0oオв]aT^އM A>y^?Bw9|ZAo9RcM+W#k4N["@]fAY /&D^4 <'}͌OL** ~5s*85n<pSX^ryL3i^VtgЕ&PBHƲB AvGJsH 1QiMs50}GNȰdA&D!jf̽UvP:*Ң Is7_=S/jۅs=6R̯%q֫g0yo~:3e9I Io#voA`V]]QF;0k/YΕGKcP~o2rv2 ~[7Wz{xC9>Tભ?!7b_R+P~U{y ~mO>xTMkAmUQ+=AAAQ,MC)TZ\ʹ0iA_޴ۃG=zW?C"xq>Ҙ ^a>3̻A@(u\@?D NX&*dI$libaHZxQ(A KU\;߉v#RzFIXXs\vhZ/]X/J*,K)R<=Eڔa=SXVk&Y%왖SNFRGBZ ˀlJuVHXfmCɍpݞRNӔb|'^ZomMܔ儶΃<rNАE\NUŚ:U[X~p˴E|\1xzp޻@}Z/}L6(?(G_~z+TyNx+%^}g_񙩚6L Zz,^Ze>P6u3k5jp5I`fw.oӵ맢IОeX1Vf`l^; ;84ra^<<ÝJ aB~٤aMw;?E, P0=#OR"y1jE+!i̗Py{wޙ/YL0l$]th8iC,=f0'P+nc6 }D;m >m'hzo-u)6bPa*VQȡG嶥D'u`p=rڅnYӪ 5߶&5hs[fϫkZe~RY]p#Tgpdj^[U(AȥUf-Ϩ>2q+^n)7+%!;,ћFͧ0ojî17cI\MB%$03f̢+ m7rLrbiI&8k#]!6K&5m1#;7`v@kd[z2x]~otЫTJM3iyQDusSVl,eZ8-+gV3ioH.,h6Vi0ADm"95F2ͼ95?l)XF1Ƥ F#<іHkhb(* sUKA7QqE%炳zQS'N/A?Bm~n}t,C K!QފSK-'Tk%|cC(6ѭ7y4ezyw Ċ٠Ϟn{Mq6ZE,`#05pZÕ5@unCQ2"Ԣha~B{'I+nvb @AYEHtSQ4J[D!6|+ v7Ju g"024{s;#i[a:R a/%*|YC<%4GI R } j \tLݯJGpId6]-?:UySiHJFU|t#/Zt䉍[{ qAgj$ ׈l u':9ĺݴg߆P E>3>~z[{=?Et`Jwf]}2 a\ED¬!Q/}O9}'|qt8(^""A>҃oQGeZg&Q- Uݼ5?SFӣ<[6+YNJ E)UgVTb!0{1:)O )(%J'弪( f<ꮑb-s %"J|j=_9Ԃw]1G]REZ!i;iOb̆eSz^q5Wh@#\H{8GMdn V-W$FҜKt3t}Yx0ZR+'e(T.<7y^HgӠ⺶2X٠I\VD(=LM4a]M#QhhfPHQY:9˺i=Xt!!>lNmɭ!F]/]Z]P ǭƅ~$ݡ$:YAHܻR9I6tBI3yR]W~ tJB{m≋N-6t6 Gi Yix$BBӄi<6ZG(MxuQL3[̛7kɷFoX?D'P_ԏ&v;i蔵_(npiNuAJ ۀ2HCҙPւ"6>i&zMV)7/A!<%2|z(<@=ua8tiҩ~FR2t׿>={u.H qy DP5 8Mh4n &|Q+A5h_qAy{ K7SiMi,t:11yZEU5g\^U.5o{\_ןr-$|Vk qX#qqMTP=:ez~M0$?S_scMTnܷ;W/2߬B$AJ*[[a XP]ZMi lY5~2qnLMS+ZbKԎ`.[ ɢqVFpZPٜ*C‹DJvB Vfw.bx#R, vLl -gU TnRX9 pS6O1V/e|o񡘼[]<[ 5޹YDw%\Y$]пkGx~ug'Y}+rjbte{aQ>>~gߛ?s\ekE9?lq+xgyR=q;/ upٜ.zpT$//q->LL}Wn,G/*2j;+w)}k*KxWml[>羷㴴 $4loKB!ujk`sc{;Z)SU i`HM($Znn[Ǿh@sJd9y^)B(?3ei-y;Ԝ.vk+h Yl pv6\.j{K!7'm]GL>ii[l}Edu-Z: k y dlݼ8ua~"G,|qG\W] } frKI̓vt"y 1,.wpi,sd(HУLڹ^ZN*sV ɜOx}Xs䝎Oθc% p!摿<>~8\3hrsĺ866N#ڹ.>73}|a-Dα r\x2~aYM[R4X-yeu>ė˼^.w6+_ExhO8mQ|DžgX=X %[تήyOaFْИbNaR+<Ļ^CoŤǤJa <[l%ۜdl xfdlF bTc;*22dmg!0T O{tEqrf@ghEUQN 9E$"&OBP'aL}6$?/ ~L0OIEA;ʢ# ;z }a9ggDaa3YGMMp{DNiݓ]AaB%/`zA y#|) asTX9~|@p p??#evEB-Zy!APұ9t|/z3.!1ImD̾(C9I{|~%2!Gg*:=t$zŒAwʁTB;X}T`[ɈU3RIFw/yA]fWk *.'ǩF #6yGbQ6@)Q` Yь!uRa?p֛4S'7[%؁4 \y87&Ǽ7])x*,yA Pg).-.iކvB7S/]f O}FOz(e?Q&rj2[ ܕ%4 C>7 –Yѝۙt^+|[/Pbį"3ieu\|LRxP8 9s>s۶\!j& 7 {vzS1覽n+cT9ZMKQdS({fV3J(.w2nL ef30y~E ,!<"Ⱦ[feaqX6g/l!MД*8%4hQ1J6Kb -Ӿǰ kn->WBy2O:|9mLdYǏ uL!*(xvDU7=iJ*sk~ 꽝cVPBڪ`$Krf'Sy&D 19q/|(]Ҋ|ן 'H &7 gSX@-POTy@71 jVb mJb'Wr#98AUar Z*qjxY 2acŒ 3dU_E9  U|BK=*q\b!|""75)(mȒX00ݭ0оz?gѻBZS 61PކZ߹Sç@%Ӽ8 4`_EПI#q<H,G:"EXH,^3 ųPvb=kAC[ލֺ]Jڙ1O/ν Zڔ0PãZs9AlrB 7V7Bm\+EJ"½w(.q%a,Go㟆tU e[\hV.nKl!ˉh %I'Auk'`iƂf =5?2OD&`X= mFbxB"L+M)a}29 hdgxV]LUCW>t5M6ĆTバbdR4 ,?<ι=w?*HiH&VJ 3?n}*MRZަxShZ&UErRC6f,&%/ O;I9];"&St]5Z9UdzBb0䌈MFPp bJtmͧG7aGTfwXIzq`2dbSBs7I/*(Yg(Le.%H5Ge2M$E30hRPl,(mYGʖ0<චhLpѼ$yq(s5 M/e(im+!yQuU6㘮*& XIϙLcqY7hi8uD2iBan&iI"nޅ@U3>ЕYݰj%*W VJڢnqPAO5{IV)ӚͲg[9.Vj-ݑRi.a ox4Q:0/y>$M*AOͿ(8T'<' 0Ġ8%s1xfۅ{&Omb>2C'Á2AWiG6]dZOGDf.*_p'3=vg Hs]&{$_>QyQEv]xWW'|W:E6H`TX!q'n$MnD‘(| " 8:EI?/XWbgz"Ȓ"h, H1T$F.a"Mܠ}܏d6' NJh/B96 u$JhP<G+vy0>nĨ"Q|AXaAZ_J݆ 4LUߥ* & "œPиOu||#H w P_n.`jM>Xk$w B~Y*Oq+xu#N;w,ttoGdSwO]-eZɇ%|/oo?ҹ+[b|z;硹P  ee^o؂ =\/?OZMJ _^ٕ٪)_! 6h`Ty?>FA@ۧƽ1Gf91O6=~k&:M>$?80`gh%Θ{;(&OTi,vL]W? rP^?aԠAFRRAӁ 0NV`#ۀ^׈Vc}&'$wyz8$)7ҳhT!R!!E(Ok1rqCH0?td :}"ڼ̙3(,Pqu/գ"Zg2UWH-]xvݎ? qzf])S_g˰o*?EXXzptjnP^yũK^PT/pYEEمt1dN`Aп f[=+lbsAÃXYq +gϐQDςC'-8_׿:Rtc:#rf$k8 Xj8d'y>+%,k8?\g,upsfݷ Ma%ZW=*_ ,,, xݻe޺|zU_ق$.!i`A@en1ޝYoG1un6*H\ף \5'-l A;܂$@zY}d]Tx:ILQW=OT\1#p ilb4MMOf*Qe1D ͓I&zlD{.O"hmE-t( &R_-w_$XA5lJI4TO߀-NOȈ&X=]tYOru6htEk,Р)vGȏNn G|pKD =[HOuhU)kKRZ[WO,+wjwxW( {w?0A,d.0;F;&EDi("{ 8FuF?/a\dfݬ[ I4H.[cLlYu>EWPT+*GQYCk*Y(Tȑm ! b?ԄŚAroq|iл^kl 6E%{PAO9$2OT;TuFxj >g}]K+{s.i2b<Ք__֡Zp|#\*|d72DX2O)\.lr5]f,|";8buЄ#`hIʆÌNئtN]1!K:Ձfs͙j0{/ Sym:/TS >= i;=C=\g To{M>]4{ Av#3C.{"!tVțUUzNI #NEGDO%X#{vME | U$ҿ Q`ѿ .^6s5[ >`Z:e!p`|$}&$M&?APQ;a{@)EY ~s3n%#sΞdϢPDm -OΊ {{Qةeϕ! 2KP |I'dj@'vh'ç;éhBICDL0Ɣ׈==r:wCAǫ ja:RQDψ2?EFSUz~6n0m+z[wcJ{o0x;!Mf[@گwmCo0f^f"7)e$͓:xmKPg*>M?;2FADv=pmC4E̗2H5)?b@a>"4UѬ$BVpg P_\hp#`‡x44igG!n~@+4൹(GF)u\$39뵍?eڸwG4.>2C޵# t9azVEEUBb6'&Pi N6&$2KNvoRHS+ +ַ^~ŠjC/ M0;(˝Ӣ  ?]jd,*0)̆,5mwa,$.F#GĪXKr9cL n^gnq;8€4N+{w*>):(&QnC*Zp 8" Vv:u *vviݎ$5cMZ9f37t(Y 1OEϒ#5>:4\5e\~NC,e 5Z h(==C@Hfr @ԵZ9KP<[ )nf .6eQ#-̛0P@j-<,XkrVJidfwdfv 1mC i,1Ir !7 r%7 ::oWtvA,wwc4G%O湨 \U=Gobw ݙ7 g匀B\zj?;W:OR@%RHyV6.p\)DmqP-EKq< 2Pː8g7΂$.߹:#Wq RI`L t|r:.V⸫ȑ?1~;)-P;Fј'⥁Ɏa|XkxCW0/%g<˜Zgx|΂k< QHQ] 8>@e>[ˡFdOa;6Vufok/U d[9$w{H].tRB8@mD\}X@#ЉB<ϱ):pjkl;ְډmPbH7T} 0W$s2. `G&ު4>'! BKP'|Jx U0781Oh(!}TvE! =A 4fPd IilJ%Z4}[$|h,^s0>piOcԃͰ3:4qޯTceY\R8qk2Zzwqq+^F88׉~;VޙhI ㉒*RO$alWD9/cLs--Ķ0FDb"{̉(b PvD1po& D7&6`'o fg!H UBlI9$k-1@e#Q ٕHy)U'KHD s"B|$jHl*E,R吨̦JGb6*$R0SDJ d5#s5+LVtw>:IlD.~l[`m~}y@oEsjxJ }g0 6%ʤgG*Vtk)(@LnR=']/h_ڀre  ઐ*yWrS*V|T4c75Am@~*%.~Kgez+qZnmpq4@lW|lH9,&@T#N?;:]hjQ` ' `0+]a0`L=VClmb[-6މ+7{/Om!u*ߚ(ueu9]O< nj[[[Ճr41L/n2C':eMV<c]]b?L ;vPJXq܏BҨǤ8ßZt*{Vv{.(E j^'0|I2_y-NHӮd#썳5j_vy) :.mtb@DtHOt>Þ3J]<^9i֍ E>M3/Eyz҃VvamvSV//q" r>HYzEbYŖ)W'>-TvGeNlwIeĚP7fY%0r.VŦ=v-#9y \l!!YؾWGbyэS%vh]xyNj teb5GWx@.5xUQ o.JeUr.A ^zWl⛛a(u N"/j}/ǺflXf5-YW19w(i;Z,WoQNU˚Iu&J0C;5|+b\_//l:G¦{$_UJ _(Ɗ;;՝&q !у|ϏL{֑lϙγɹ +/ݖݬdS?F J~U@yRVDܬr>xEZ4x#\Zh,";/-/gMľDb?P>9,j1 #%>C|GUo0kID_Zh+kQqVN 1,V^dŭF| #E/6MD?;TߢS;#xhU]I {#_kV d@ T3^TܳG,8Tы*AH[ު]U{zt|;!y$2d*_kmjԪ98 ȅqUUAVf~zL*~,Zrj p2VW=ٕɐ/7Guʴ0f>6mbWl<7X )7pFʚ_g*_fI>wU2FDB7ʚ@Op[-XWL\ㄪC>uKJU)O:JwYFt!z8kxJi1jX52ds!joO5.S4_ఋDuNg[ qȸz/9oQC<v91<)סu'XC{u[u.Dmi4vY^$=+e78ͦ:&h4\R_'5tt >Vmimt]xEV]WQsd#ȔvP=Wo[ȸO&[=J⩏@y~SB,h 2KԼ*nMv4ECr9~V(vYY 0 GfmcIX wݙHKf<:?TbOv)h ˯vlG#K 66D-)X,).meܼmgtI/VaWV׍'fyuoڇ3{e'R_Nfn+,cjyGx7"T>{UtQ*GNb.ߦTcøpuEF.yGÀ >g*jm[b i Y'%bu}S?Y&r`^&7>R'+5!3Ibeu}{U/1C qV=U~s4_yq\i~L_, g?dCB<'nퟴG AۮҞ蒴JАQC;}kB%]Ҿ"h>Խ@ViRwL ]viY *Mi')*_9(2 !H<# _ 3/*9kScD:%?Kaz60sCv w7lvUΰNk.Q_9`r@RgW|wd]0-XHL_SN7$bgϛF= 3Qy7h BUW[1i3bcqn9A3ogFQOfq`r]ͭx$^Gt=Pðj_: Lkm.^ܪB2-50pʭ45I٬ k\a QUaHsf=YW40-pN[/ íz3S#)tbx ح覔\*H;ZuLզNchD>HyikJ.BYh}(jRZiT;>E5d^H5!xa```bd;!P0>xT͎0v-h@ r4ֵ#97qatύoƟgƣ2%3\3\/PZ8KL4XrZ1F۷b[HPoCJ8֣vP~z \{!956O_?-4^]fyb|E҆ZI,c)]b>d['M8@Sg6ft!F&c8lƄ8 i3W8])qIW(yjOGMÍ ()K=.*F1JNQpB;\*P$mۥ.jyGgN7`@ ?c5)97"$/4iәw*^t6s&H? 8EH !E$M"`Đ4Gx=q/X=!n y9e>yq6~r]ޞOJxUMlE30i ^{$⠠cUBbNC7lƑZjQA NC$H&\8T؅ ›cW|{=|˺?yetQS:n {y\_#Nl)+7Cu,]ǴX>N (I"4>: MJZ8M\3Ebva8\1si>ce3psZNT|!|C?x?-#Ÿv=wXxߒtaߨE}~}o[xbܰf'B pC QnᕅZ˴T;@W5Y3Un}63e诗ι4-Wh ƺ}9SV _O.-U>{/!R} [VW%ܸ4 iNEZʩW+[[[Y.:Oo/.,ʻѥ)?ֽ۟LFa9 ;zw+ϷƞNtcz(YKt NF;ai"GPnsDg>ǜ9L @?G$D@ű5A;bZ6ԕi9%kL;)H8Ygӕ鼑M*l#^T )wB2fiYVM1^NC!_zoV nTc߅Zwhw͸fw~`HaIes3'R͌'dRO!fu3cEBstI趝5MIϙ֙5v0G0=KIa oW1kAX'%ƲNvn;aln8^/8 <0+Dm_}KG̔9}.N4 O b8T"7Z c\D@KK p1ЋťA䵀!f7_܁c7 [ڤ8%V1?Ap +"Mww.,2sCHkQ4Z-hcQgdkG뉆a&cqpWJaOm/!>NnAn-Ϋ [|^H][u*|gxCeڑÝ.]d+sqg8k 8mϝQs OmY[FcgWck8}m>Daqb/|^Bfq2!⥋ozdˣj*, N;_>x_DŽV]'gdUaB>R^mEס<(͓ʤ4|'ߓ_^-)))9v-)&+EYOI+$ɵxv@mʿj:nFFۂQ('p~qO{Uo`&GsF7n>c`e;(u=3:pp47: J:.c[wyKτc~q>oq5}rᤴi<'P@*у}∞ryߘKP~PAo?ܯ[n`f0t@=@T(W|ilYMی00a`LV{0щ0>žn4]b*LJn+2Z+ʜAMlIpe2Í-莾.,9JQ{!LoސNhH_$N؝#·WE/'}KE?,p cMiVWCP0܎.B-ݎe*y82HFx&"ȿ']'Ӣ8D,/t4"' KwOga25}u~a9ʓxi~ ^HAܤwD'"wv$"4ы*Ox":FtZk6 SPm}(0c7RYhGX> jp!F6`{Z%[cUNff3qw+an1~z8܀cUx|_es',o8' ;2u$~,q"΄jԸ}a%9.a&dvS:~ksXT-{i*\=*OVʟ&A0ڄu{/(_x)5pъPYOS)}},Giтe&j[jd;HXUӉZ-҃#k*Z[Zr˺hj,ՙkjAGae4(uKٴ*s\=(g)Ke-nV댒pjɤ;,1jy*.Q>ITΔFлQ=>L{ɤ" )ȉ#H{*::릙! enE9SISO+Xm|+ڋ$c~ˠoחLu36 XgWjȈ|/&Ê%En <@Tů!|KE#C:oAI'HEeNcTmKm(a11 .Dƈ~>\J}{Wv^C=&HD/"fd֙pa9üoe L(G{wޥA^X#Qո19gFȯax (MO)̄VW|lV{!odDVY8e{%|a:v%_`0ߢ/+) L%RVYC t 4씘ICdoBk"6NWTU4b Txd&$#Uy[E2rvA"]&ޔU ;{,onrPe .^b>bd\*2N"eJNIZu5X|u+¼W?]OfsWר. |f4Va:Ÿ6/ 穀v 2Fߴ1/3'Y bjɽ,Y}QEh@E[6x5udvP#hB_^,i^4؅r;F]r#؉AGH7.zg_6gS,s y0!0 Wyk ,Ud4p4an.e>0!Iz|@}l\:9k4ݢӅ|>Ay SR;K|=Ȱư1)CxUrbݣ1HWY$^yЮX )f{#csKs7T" yD{}zesH8c-,kBm8ZBPR/G6m5FM7Pa'OCdV ~ $-I"_m4iJxpᤠ PMiţw' -`~"eGxo6TԽ^aAnqv <~zݵ`^؁`υnzW>IfL(DJ"13YG t MjKA҇4\&p~ˁ.H(H#|NS4'v)B@{*APkb~@a9K[QҖb]YY%R땲Z"WiVEYT -)'*j~o+=Y[e_.Zi;j0V};JwIcJ{!r09#fDtFM4e0i Lf.p )ypսU32I<JKhJhۻx_ΛFxįg+.ZTub^s\u!if8gQC<}d`qk~ɇW%~_1V0qz/Op `S#;Sǥ;O<||`b6%"uC]r?S0=ᐒ`g<)lxMN0/q,P (# (+@IXJ(v7v> OK1!p(|OI!6 ~WZPP92L XN8 FH"g'gKϧ{4WZ1i(0Ls(_#x `~2@(97P1ʠґ+Hsv!j AC~ T<2cN )p0: nTϵ:46i[^ٝc Hwݘt! ߹lѡW/sF3%t朳&alk5WCҚ/4V"-K񒼆>x[ Ke-3=oQᤲZ\hFTC03Fh@Cw9: B'AOG{I9x|'|y:?<^e[z߃eKweUyxekAga`S #+RS-E/!+-kn6egFS`A*_P S{ dMyoG <)2ѵDbg)Ƞڌ黮ٻUsj3UW H١k&M2ڪ'1R 0}/qb 2Ɗ΃11Wރ]@j MbM8^٨81c%zNL+J}MQ;WƉ7ʌK\ 7$ g(-۾c0Qw]p~Nl@A#Np#nXRd׿m@®PbKmo`} NCv9RaKyV;߄4\8ɚU Z|*@\Y gZ3m ߷})9ៗ@s4yAewzqW6ka͕ص8lZ߬e6$Qi-E ڃ[I53B NBH_ͻ+I~ ' ܯe|g 8 IFp>}6I,%/O!fG@A Jp]4+8|'Nx#CyO2,h1fq9gkAn|Pp*4Z0au} @hoMydP -9/eJI$n8{u{SsB6Ǯ 3 #o 4gФ0rT=@nzyY$5 ꦐJqiVĜd-a etIߐָr Y3t7,s<d6мAܙɣOh[}*!f:;Sx{ZH#G%PdYhrgmiRUn3^┻*7}T`ReNpI+NZI}Wq5,)va'4EZ_4k(y]6gl7Ux$$c}RRLȲ hp$<~kj0IbkZjݵkr[rԴ~VkǓI{ؿ$01=[ja)$/DmJs6m^ZyE1Hf{}r{C!f㵉AeC2b?s,perEƟ!W8P,ٱF% _, 7Ȗ=V-smpX=0MaVauu>(C+l.厲,*thG'5n#q؁pF\gVBx"8 pMx.t8966bَջ9tBL"Ma,pϔWh~ <Ѧ ziizB[?MCIK>J$`̦H6A_ *mhإ"x QW'f9D'pD*U@ɀXjz8u7 I$!^J}ɵ`ӕ'oG ,Fx?exm g]xҐ1R8w(Hؙõg'Srxh'*X&FpFC"Pԋ'|tmTUGzoB'Q Ad({D'm^RU%@_,,;m^[+mk>a;n(2'F{!>9Tﱏ# 8-|M>džv;}6o!GiC% n S|@w?cog.v )f>%bf-L_1rV0kPhf-i|^E 58&gre\ 3~ KG(4oOp4NW8oE_,{Opw9 Bˬ]_L* \xnEB28d0E\nAaE)'0Ҍ_I5 *ѹ["#!5֧DhnU %5~0_)TWaW.'x")FpT}0 -aߌ|6͗e`5-1IufAXx?6[ Ocwq&" [-a5c⡴kVht=Z|>kX#./߹0# GuE.b 5M '1V8ߵj/U78#y좢}= ~Wl0|hj<ݷvu{@X¹&)mJ\n&/Jo3Y%?ij%hE[pE_yL_ [y N ])U/B L0,:yp2s1"3eA< #v h6_&fAtf¢ts3|RҶ[RG|)2Xg`5o€;Μu2/p7:D?ĊT}(>iChݾz_g1YxǏxc< ҿ"'lS,NDIJtixcn%~42.҉9Mt",# ýŤ{/+.wA:aٝڑt[ۺ`; 8{]4-yr<#5-/gd:8go(A6+k@`q\*;eİqG Ѝcs$}YF[?,DU+/7k1 I UF.ބF .d ,@*%Np>;(:61C^ .szUu^gkw4ǷKvqmB&,ݾG5dIKɢ22TV4۳a"m/G~A -G_^koͼx~c\{R{SGcNMhK({&LP/}F\5ϴ'Zdu.C8NGA *- a.%IJh}@]Yvµ!^C8 +=/n?tl&,ޝ>~ʗHIP|+}V\A,ߵN2^rg)dau/n%86TAZ+nZV-Ss <2IxYLWf̞#= lCS*]boomܦ&"U &L/CߌE!]hTWvmӧ05Au%y/xО.)ea4?iVe}t_oOj9y>#v\Qt|t3+UJ[|XNKD( f2?bmxeRAk@~E뽂AVRś7El23驇# z߫_2ŐސȪmk\mz}&i8̶|8LYS|d[&32!Li'>0ώfgmI|֢ypGےipzI[/xeKA̬2sB*Qڀ&;Y7ag6l1zʡAOȥͿŷ3|w`'W@"،Ud bOMdJ w]3٪92ṡbW3gm~W&/vLV@iOvWߧSfu92@bwdd6k+qJGDQ 1oERaE+1>aѸ㶏lB" ?&뚣n?EtǺ]ZVҲ5nI&llB}"F4=o%b91G@R1,-6Խ9-&jZtRRJ2V+zW7^8#' r-ÍR6q1i4$1UÄc̄38UVRN/hW#sQwV3/NdZϾKac! 2`m/oRiM94_RW}iӚSC{sp 3XX/)3d&5]t7R 3TI!*"ԣhVBB)f%ӺFr4U-Ăad>v`>OjvqDYEYA0/|v [> &qL.fM Bk_0LX0k[b6(dmZpVOx <@@uSI:J-A5Â]Eg6;7_6k ہ+ɚ'z&+.12:=bJ]*G3q/8 񇩶 YZ