xen-libs-4.10.4_06-lp150.2.25.1<>,@]4/=„0pB4dLץ)k$U4] TO/ꩠ9H"Mx?n/6(b.6b!uhibs@saų"{?lUjM{sIhj[c3іvS-g6wLO)!+F7 *ҿB9 :,OU7xUtJu΄ْ0Bt/CCe _0 )cvR-5f@Sf`w#oE)Fs٤DgW>;H?Hd  " @  %3cip-$- ~- - -  9-  - L- --4-6t66(8!9d!:1T!>3@3G3-H4\-I5-X5@Y5\6-]6-^9 b:<c:d;re;wf;zl;|u;-v]4lamb21openSUSE Leap 15.0openSUSEGPL-2.0http://bugs.opensuse.orgSystem/Kernelhttp://www.cl.cam.ac.uk/Research/SRG/netos/xen/linuxx86_648((8(8j998((8 58zzx)@9 ;AAAAAAAA]]M]M]M]M]M]M]M]M]M]M]M]M]M]M]}]M]q]M]r]M]q]M]p]M]q]M]p]M]r]M]]N]{]M]u]M]o]M]o]M]]M]]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.so.1.0.0libxencall.so.1.0libxenctrl.so.4.10.0libxendevicemodel.so.1.1libxenevtchn.so.1.1libxenforeignmemory.so.1.2libxengnttab.so.1.1libxenguest.so.4.10.0libxenlight.so.4.10.0libxenstat.so.0.0libxenstore.so.3.0.3libxentoolcore.so.1.0libxentoollog.so.1.0libxenvchan.so.4.10.0libxlutil.so.4.10.0rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootxen-4.10.4_06-lp150.2.25.1.src.rpmlibfsimage.so.1.0()(64bit)libfsimage.so.1.0(libfsimage.so.1.0)(64bit)libxencall.so.1()(64bit)libxencall.so.1(VERS_1.0)(64bit)libxenctrl.so.4.10()(64bit)libxendevicemodel.so.1()(64bit)libxendevicemodel.so.1(VERS_1.0)(64bit)libxendevicemodel.so.1(VERS_1.1)(64bit)libxenevtchn.so.1()(64bit)libxenevtchn.so.1(VERS_1.0)(64bit)libxenevtchn.so.1(VERS_1.1)(64bit)libxenforeignmemory.so.1()(64bit)libxenforeignmemory.so.1(VERS_1.0)(64bit)libxenforeignmemory.so.1(VERS_1.1)(64bit)libxenforeignmemory.so.1(VERS_1.2)(64bit)libxengnttab.so.1()(64bit)libxengnttab.so.1(VERS_1.0)(64bit)libxengnttab.so.1(VERS_1.1)(64bit)libxenguest.so.4.10()(64bit)libxenlight.so.4.10()(64bit)libxenstat.so.0()(64bit)libxenstore.so.3.0()(64bit)libxentoolcore.so.1()(64bit)libxentoolcore.so.1(VERS_1.0)(64bit)libxentoollog.so.1()(64bit)libxentoollog.so.1(VERS_1.0)(64bit)libxenvchan.so.4.10()(64bit)libxlutil.so.4.10()(64bit)xen-libsxen-libs(x86-64)    /sbin/ldconfig/sbin/ldconfiglibbz2.so.1()(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.15)(64bit)libc.so.6(GLIBC_2.17)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.2)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libc.so.6(GLIBC_2.7)(64bit)libc.so.6(GLIBC_2.8)(64bit)libfsimage.so.1.0()(64bit)libfsimage.so.1.0(libfsimage.so.1.0)(64bit)liblzma.so.5()(64bit)liblzma.so.5(XZ_5.0)(64bit)libnl-3.so.200()(64bit)libnl-3.so.200(libnl_3)(64bit)libnl-route-3.so.200()(64bit)libnl-route-3.so.200(libnl_3)(64bit)libpthread.so.0()(64bit)libpthread.so.0(GLIBC_2.2.5)(64bit)libpthread.so.0(GLIBC_2.3.2)(64bit)libpthread.so.0(GLIBC_2.3.3)(64bit)libutil.so.1()(64bit)libutil.so.1(GLIBC_2.2.5)(64bit)libuuid.so.1()(64bit)libuuid.so.1(UUID_1.0)(64bit)libxencall.so.1()(64bit)libxencall.so.1(VERS_1.0)(64bit)libxenctrl.so.4.10()(64bit)libxendevicemodel.so.1()(64bit)libxendevicemodel.so.1(VERS_1.0)(64bit)libxenevtchn.so.1()(64bit)libxenevtchn.so.1(VERS_1.0)(64bit)libxenforeignmemory.so.1()(64bit)libxenforeignmemory.so.1(VERS_1.0)(64bit)libxengnttab.so.1()(64bit)libxengnttab.so.1(VERS_1.0)(64bit)libxenguest.so.4.10()(64bit)libxenlight.so.4.10()(64bit)libxenstore.so.3.0()(64bit)libxentoolcore.so.1()(64bit)libxentoolcore.so.1(VERS_1.0)(64bit)libxentoollog.so.1()(64bit)libxentoollog.so.1(VERS_1.0)(64bit)libyajl.so.2()(64bit)libz.so.1()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.1]d@]@]@]]@]@]]#0@];]@]@]:\@\ޢ@\@\\\8\\\@\~d\w@\n\mA@\f\N\[k@[@[][t[[9@[qr[i[Y[6@[0@[0@['[!@Z@ZnZ@ZZ@ZmZԐ@ZZZ@ZZ}@Z}@Z}@Z}@Zz@Zz@Zo Zk@ZV@ZS]@ZOhZ:PZ1@Z.s@Z&@ZOZOZ Z Z Z@Z@Z }ZC@ZYYYY|Y@Y{Y*@Y5YA@Y4YYYbYY@Y3Y@YJYJY@YYV@Y@Ym@Yw2Yp@YlYh@Yh@YS@YJ_YI@Y5GY0Y-^Y(Y"YY;@YYY@YtY.X@XQ@X@XۡXg@X@XƉX@X @X@X@X@X@XXX@XXXwoXs{@XlXWXRXQ4@XEVX43@X.@X*X lX&X@XX@W@W֘W֘W^@WiW:Wt@W.@W9WW@Wk@Wi,@WbWZWZWZWYZ@WV@WEWBW=W;W3W1@W1@W,@W(W(W(W(W(W#LWVbV(@V3VJVxV'@VV2V͛@VŲ@V`VwVVV=@VV@VHV@VvV%@VV<@V@VS@VV@V^VwVqR@Vn@VXEVUVTQ@VMVMVMVA@V;DV9@V7P@V0V*!@V V@VCVVVf@VqV@UYU@U@UUݪ@U@UnU4@UUK@UU@UU>U@Ux&Un@U\w@U[%UUUPUKSU>$U6;U%@UU@UUU.@TgT-@TT@TZ@TZ@T@TT@T5T@TLTLT~@Tl@Ti@Ta@THT?@T=@carnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.dejfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.deohering@suse.derbrown@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comjfehlig@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.dejfehlig@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comohering@suse.dejfehlig@suse.comcarnold@suse.comjfehlig@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.commlatimer@suse.comcarnold@suse.comcyliu@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comjfehlig@suse.comcarnold@suse.comcarnold@suse.comohering@suse.decarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comohering@suse.derguenther@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.comrguenther@suse.comcarnold@suse.commeissner@suse.comcarnold@suse.comohering@suse.decarnold@suse.comcarnold@suse.comohering@suse.deohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.decarnold@suse.comohering@suse.deohering@suse.deohering@suse.deohering@suse.decarnold@suse.comcarnold@suse.comcarnold@suse.comcarnold@suse.com- bsc#1155945 - VUL-0: CVE-2018-12207: xen: Machine Check Error Avoidance on Page Size Change (aka IFU issue) xsa304-1.patch xsa304-2.patch - bsc#1152497 - VUL-0: CVE-2019-11135: xen: XSA-305: TSX Asynchronous Abort (TAA) issue xsa305-1.patch xsa305-2.patch- bsc#1154461 - VUL-0: CVE-2019-18424: xen: XSA-302: passed through PCI devices may corrupt host memory after deassignment xsa302-0001-IOMMU-add-missing-HVM-check.patch xsa302-0002-passthrough-quarantine-PCI-devices.patch- bsc#1154458 - VUL-0: CVE-2019-18421: xen: XSA-299: Issues with restartable PV type change operations xsa299-0001-x86-mm-L1TF-checks-don-t-leave-a-partial-entry.patch xsa299-0002-x86-mm-Don-t-re-set-PGT_pinned-on-a-partially-de-val.patch xsa299-0003-x86-mm-Separate-out-partial_pte-tristate-into-indivi.patch xsa299-0004-x86-mm-Use-flags-for-_put_page_type-rather-than-a-bo.patch xsa299-0005-x86-mm-Rework-get_page_and_type_from_mfn-conditional.patch xsa299-0006-x86-mm-Have-alloc_l-23-_table-clear-partial_flags-wh.patch xsa299-0007-x86-mm-Always-retain-a-general-ref-on-partial.patch xsa299-0008-x86-mm-Collapse-PTF_partial_set-and-PTF_partial_gene.patch xsa299-0009-x86-mm-Properly-handle-linear-pagetable-promotion-fa.patch xsa299-0010-x86-mm-Fix-nested-de-validation-on-error.patch xsa299-0011-x86-mm-Don-t-drop-a-type-ref-unless-you-held-a-ref-t.patch- bsc#1154456 - VUL-0: CVE-2019-18425: xen: XSA-298: missing descriptor table limit checking in x86 PV emulation xsa298.patch- bsc#1154448 - VUL-0: CVE-2019-18420: xen: XSA-296: VCPUOP_initialise DoS xsa296.patch- bsc#1145240 - [Migration]Can't pre-allocate 1 shadow pages 5d70bfba-x86-shadow-dont-enable-with-too-small-allocation.patch - bsc#1137717 - [HPS Bug] Unable to install Windows Server 2016 with 2 CPUs setting (or above) under SLES12 SP4 Xen Server on AMD ROME platform 5d89d8d9-libxc-x86-avoid-overflow-in-CPUID-APIC-ID.patch - Upstream bug fixes (bsc#1027519) 5d419d49-x86-spec-ctrl-report-proper-status.patch 5d43253c-x86-ucode-always-collect_cpu_info-at-boot.patch 5d4aa36f-x86-apic-enable-x2APIC-mode-earlier.patch 5d4d850a-introduce-bss-percpu-page-aligned.patch 5d516531-x86-xpti-dont-leak-TSS-adjacent-data.patch 5d6524ca-x86-mm-correctly-init-M2P-entries.patch 5d67ceaf-x86-properly-gate-PKU-clearing.patch 5d779811-x86-fix-CPUID7-0-eax-levelling-MSR.patch 5d8b715f-ACPI-cpuidle-bump-max-num-of-states.patch 5d8ce179-sched-dont-leak-XEN_RUNSTATE_UPDATE.patch- bsc#1145774 - Libivrtd segfaults when trying to live migrate a VM Fix crash in an error path of libxl_domain_suspend with libxl.helper_done-crash.patch- Upstream bug fixes (bsc#1027519) 5d08f651-x86-AMD-correct-Fam17-checks.patch 5d08f68b-x86-AMD-limit-C1E-disable.patch 5d160571-x86-cpuid-restrict-OSXSAVE-leak.patch 5d1b395a-x86-MSI-fix-loop-termination.patch- Update to Xen 4.10.4 bug fix release (bsc#1027519) xen-4.10.4-testing-src.tar.bz2 - Drop the following patches contained in the new tarball 5bc4977d-1-XSM-remove-unnecessary-define.patch 5bc4977d-2-XSM-introduce-boot-param.patch 5bc4977d-3-XSM-SILO-mode.patch 5c7e6f86-gnttab-set-refcount-for-transfer-copy.patch 5c7e6fe8-IOMMU-x86-fix-type-ref-counting-race.patch 5c7e7008-x86-get-rid-of-bogus-page-states.patch 5c7e7020-x86-make-coherent-PV-IOMMU-discipline.patch 5c7e70c6-x86-mm-L2-unvalidation-preemptible.patch 5c7e70e2-x86-mm-L3-unvalidation-preemptible.patch 5c7e70ff-x86-mm-dont-retain-page-typeref-on-IOMMU-fail.patch 5c7e711c-x86-mm-properly-flush-TLB-in-switch_cr3_cr4.patch 5c7e714c-x86-pv-rewrite-guest-cr4-handling.patch 5c7e716d-x86-pv-restrict-cr4-fsgsbase.patch 5c7e7192-x86-pv-toggle_guest_pt-TLB-flush-for-shadow.patch 5c7e9d9c-x86-mm-fix-GP-0-in-switch_cr3_cr4.patch 5c87b644-IOMMU-leave-enabled-for-kexec-crash.patch 5c87b6a2-x86-HVM-dont-crash-guest-in-find_mmio_cache.patch 5c87b6c8-drop-arch_evtchn_inject.patch 5c87b6e8-avoid-atomic-rmw-accesses-in-map_vcpu_info.patch 5c87e6d1-x86-TSX-controls-for-RTM-force-abort-mode.patch x86-cmdline-parse-fix.patch 5c8f752c-x86-e820-build-with-gcc9.patch 5c8fc6c0-x86-MSR-shorten-ARCH_CAPABILITIES.patch 5c8fc6c0-x86-SC-retpoline-safety-calculations-for-eIBRS.patch 5c9e63c5-credit2-SMT-idle-handling.patch 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch 5cd921fb-trace-fix-build-with-gcc9.patch 5cd9224b-AMD-IOMMU-disable-upon-init-fail.patch 5cd922c5-x86-MTRR-recalc-p2mt-when-iocaps.patch 5cd9230f-VMX-correctly-get-GS_SHADOW-for-current.patch 5cd926d0-bitmap_fill-zero-sized.patch 5cd92724-drivers-video-drop-constraints.patch 5cd93a69-x86-spec-ctrl-reposition-XPTI-parsing.patch 5cd93a69-x86-MSR_INTEL_CORE_THREAD_COUNT.patch 5cd93a69-x86-boot-detect-Intel-SMT-correctly.patch 5cd981ff-x86-IRQ-tracing-avoid-UB-or-worse.patch 5cdad090-x86-spec-ctrl-misc-non-functional-cleanup.patch 5cdad090-x86-spec-ctrl-CPUID-MSR-definitions-for-MDS.patch 5cdad090-x86-spec-ctrl-infrastructure-for-VERW-flush.patch 5cdad090-x86-spec-ctrl-opts-to-control-VERW-flush.patch 5cdeb9fd-sched-fix-csched2_deinit_pdata.patch 5ce7a92f-x86-IO-APIC-fix-build-with-gcc9.patch 5d03a0c4-1-Arm-add-an-isb-before-reading-CNTPCT_EL0.patch 5d03a0c4-2-gnttab-rework-prototype-of-set_status.patch 5d03a0c4-3-Arm64-rewrite-bitops-in-C.patch 5d03a0c4-4-Arm32-rewrite-bitops-in-C.patch 5d03a0c4-5-Arm-bitops-consolidate-prototypes.patch 5d03a0c4-6-Arm64-cmpxchg-simplify.patch 5d03a0c4-7-Arm32-cmpxchg-simplify.patch 5d03a0c4-8-Arm-bitops-helpers-with-timeout.patch 5d03a0c4-9-Arm-cmpxchg-helper-with-timeout.patch 5d03a0c4-A-Arm-turn-on-SILO-mode-by-default.patch 5d03a0c4-B-bitops-guest-helpers.patch 5d03a0c4-C-cmpxchg-guest-helper.patch 5d03a0c4-D-use-guest-atomics-helpers.patch 5d03a0c4-E-Arm-add-perf-counters-in-guest-atomic-helpers.patch 5d03a0c4-F-Arm-protect-gnttab_clear_flag.patch XSM-fix-Kconfig-names.patch- bsc#1138294 - VUL-0: CVE-2019-17349: XSA-295: Unlimited Arm Atomics Operations 5d03a0c4-1-Arm-add-an-isb-before-reading-CNTPCT_EL0.patch 5d03a0c4-2-gnttab-rework-prototype-of-set_status.patch 5d03a0c4-3-Arm64-rewrite-bitops-in-C.patch 5d03a0c4-4-Arm32-rewrite-bitops-in-C.patch 5d03a0c4-5-Arm-bitops-consolidate-prototypes.patch 5d03a0c4-6-Arm64-cmpxchg-simplify.patch 5d03a0c4-7-Arm32-cmpxchg-simplify.patch 5d03a0c4-8-Arm-bitops-helpers-with-timeout.patch 5d03a0c4-9-Arm-cmpxchg-helper-with-timeout.patch 5d03a0c4-A-Arm-turn-on-SILO-mode-by-default.patch 5d03a0c4-B-bitops-guest-helpers.patch 5d03a0c4-C-cmpxchg-guest-helper.patch 5d03a0c4-D-use-guest-atomics-helpers.patch 5d03a0c4-E-Arm-add-perf-counters-in-guest-atomic-helpers.patch 5d03a0c4-F-Arm-protect-gnttab_clear_flag.patch - Upstream bug fixes (bsc#1027519) 5bc4977d-1-XSM-remove-unnecessary-define.patch 5bc4977d-2-XSM-introduce-boot-param.patch 5bc4977d-3-XSM-SILO-mode.patch 5c87b6c8-drop-arch_evtchn_inject.patch 5c87b6e8-avoid-atomic-rmw-accesses-in-map_vcpu_info.patch 5cd921fb-trace-fix-build-with-gcc9.patch 5cd9224b-AMD-IOMMU-disable-upon-init-fail.patch 5cd922c5-x86-MTRR-recalc-p2mt-when-iocaps.patch 5cd9230f-VMX-correctly-get-GS_SHADOW-for-current.patch 5cd926d0-bitmap_fill-zero-sized.patch 5cd92724-drivers-video-drop-constraints.patch 5cd93a69-x86-spec-ctrl-reposition-XPTI-parsing.patch (Replaces xsa297-0a.patch) 5cd93a69-x86-MSR_INTEL_CORE_THREAD_COUNT.patch (Replaces xsa297-0b.patch) 5cd93a69-x86-boot-detect-Intel-SMT-correctly.patch (Replaces xsa297-0c.patch) 5cdad090-x86-spec-ctrl-misc-non-functional-cleanup.patch (Replaces xsa297-0d.patch) 5cdad090-x86-spec-ctrl-CPUID-MSR-definitions-for-MDS.patch (Replaces xsa297-1.patch) 5cdad090-x86-spec-ctrl-infrastructure-for-VERW-flush.patch (Replaces xsa297-2.patch) 5cdad090-x86-spec-ctrl-opts-to-control-VERW-flush.patch (Replaces xsa297-3.patch) 5cd981ff-x86-IRQ-tracing-avoid-UB-or-worse.patch 5cdeb9fd-sched-fix-csched2_deinit_pdata.patch 5ce7a92f-x86-IO-APIC-fix-build-with-gcc9.patch 5cf0f6a4-x86-vhpet-resume-avoid-small-diff.patch 5cf16e51-x86-spec-ctrl-Knights-retpoline-safe.patch XSM-fix-Kconfig-names.patch- bsc#1138563 - L3: xenpvnetboot improperly ported to Python 3 fix-xenpvnetboot.patch- bsc#1129642 - L3: xen domU loses attached pci device after reboot (since dom0 upgrade to sle12sp4) 5ba5188c-libxl-keep-assigned-pci-devices-across-domain-reboots.patch- bsc#1133818 - retry XEN_DOMCTL_getpageframeinfo3 accessing the list of pages may lead to a temporary EFAULT backport a mainline patch to retry the domctl, which may fix live migration on the sending side libxc.do_domctl.EFAULT-retry.patch- bsc#1131811 - [XEN] internal error: libxenlight failed to create new domain. This patch is a workaround for a systemd issue. See patch header for additional comments. xenstore-launch.patch- bsc#1079730, bsc#1098403, bsc#1111025 - live migrating PV domUs simplify and fix the required change. The previous variant broke PV with device-model libxl.pv-qemu-migration.patch- bsc#1120095 - add code to change LIBXL_HOTPLUG_TIMEOUT at runtime The included README has details about the impact of this change libxl.LIBXL_HOTPLUG_TIMEOUT.patch- bsc#1111331 - VUL-0: CPU issues Q2 2019 aka "Group 4" CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 xsa297-0a.patch xsa297-0b.patch xsa297-0c.patch xsa297-0d.patch xsa297-1.patch xsa297-2.patch xsa297-3.patch - Upstream bug fixes (bsc#1027519) 5c7e6f86-gnttab-set-refcount-for-transfer-copy.patch Replaces xsa284.patch 5c7e6fe8-IOMMU-x86-fix-type-ref-counting-race.patch Replaces xsa285.patch 5c7e7008-x86-get-rid-of-bogus-page-states.patch Replaces xsa287.patch 5c7e7020-x86-make-coherent-PV-IOMMU-discipline.patch Replaces xsa288.patch 5c7e70c6-x86-mm-L2-unvalidation-preemptible.patch Replaces xsa290-1.patch 5c7e70e2-x86-mm-L3-unvalidation-preemptible.patch Replaces xsa290-2.patch 5c7e70ff-x86-mm-dont-retain-page-typeref-on-IOMMU-fail.patch Replaces xsa291.patch 5c7e711c-x86-mm-properly-flush-TLB-in-switch_cr3_cr4.patch Replaces xsa292.patch 5c7e714c-x86-pv-rewrite-guest-cr4-handling.patch Replaces xsa293-1.patch 5c7e716d-x86-pv-restrict-cr4-fsgsbase.patch Replaces xsa293-2.patch 5c7e7192-x86-pv-toggle_guest_pt-TLB-flush-for-shadow.patch Replaces xsa294.patch 5c7e9d9c-x86-mm-fix-GP-0-in-switch_cr3_cr4.patch 5c87b644-IOMMU-leave-enabled-for-kexec-crash.patch 5c87b6a2-x86-HVM-dont-crash-guest-in-find_mmio_cache.patch 5c87e6d1-x86-TSX-controls-for-RTM-force-abort-mode.patch x86-cmdline-parse-fix.patch 5c8f752c-x86-e820-build-with-gcc9.patch 5c8fb92d-x86-HVM-split-linear-reads-and-writes.patch 5c8fb951-x86-HVM-finish-IOREQs-correctly-on-completion.patch 5c8fc6c0-x86-MSR-shorten-ARCH_CAPABILITIES.patch 5c8fc6c0-x86-SC-retpoline-safety-calculations-for-eIBRS.patch 5c9e63c5-credit2-SMT-idle-handling.patch 5cab1f66-timers-fix-memory-leak-with-cpu-plug.patch- bsc#1079730, bsc#1098403, bsc#1111025 - live migrating PV domUs An earlier change broke live migration of PV domUs without a device model. The migration would stall for 10 seconds while the domU was paused, which caused network connections to drop. Fix this by tracking the need for a device model within libxl. add libxl.pv-qemu-migration.patch remove xen.bug1079730.patch- bsc#1026236 - add Xen cmdline option "suse_vtsc_tolerance" to avoid TSC emulation for HVM domUs if their expected frequency does not match exactly the frequency of the receiving host xen.bug1026236.suse_vtsc_tolerance.patch- bsc#1126325 - fix crash in libxl in error path Setup of grant_tables and other variables may fail libxl.prepare-environment-for-domcreate_stream_done.patch- bsc#1127620 - Documentation for the xl configuration file allows for firmware=pvgrub64 but we don't ship pvgrub64. Create a link from grub.xen to pvgrub64 xen.spec- Upstream bug fixes (bsc#1027519) 5c6d7b01-x86-pmtimer-fix-hvm_acpi_sleep_button.patch 5c6d7b35-x86-shadow-dont-pass-wrong-L4-MFN.patch 5c75615a-viridian-fix-HvFlushVirtualAddress.patch 5c7561aa-x86-shadow-dont-use-map_domain_page_global.patch 5c77c30b-x86-hvm-increase-triple-fault-log-level.patch 5c77e5c8-x86-nmi-correctly-check-MSB-of-P6-perf-counter.patch- bsc#1127400 - VUL-0: CVE-2019-17348: xen: XSA-294: x86 shadow: Insufficient TLB flushing when using PCID xsa294.patch- bsc#1126192 - VUL-0: CVE-2019-17342: xen: XSA-287: x86: steal_page violates page_struct access discipline xsa287.patch - bsc#1126195 - VUL-0: CVE-2019-17343: xen: XSA-288: x86: Inconsistent PV IOMMU discipline xsa288.patch - bsc#1126196 - VUL-0: CVE-2019-17344: xen: XSA-290: missing preemption in x86 PV page table unvalidation xsa290-1.patch xsa290-2.patch - bsc#1126197 - VUL-0: CVE-2019-17345: xen: XSA-291: x86/PV: page type reference counting issue with failed IOMMU update xsa291.patch - bsc#1126198 - VUL-0: CVE-2019-17346: xen: XSA-292: x86: insufficient TLB flushing when using PCID xsa292.patch - bsc#1126201 - VUL-0: CVE-2019-17347: xen: XSA-293: x86: PV kernel context switch corruption xsa293-1.patch xsa293-2.patch- bsc#1126140 - VUL-0: CVE-2019-17340: xen: XSA-284: grant table transfer issues on large hosts xsa284.patch - bsc#1126141 - VUL-0: CVE-2019-17341: xen: XSA-285: race with pass-through device hotplug xsa285.patch- Update to Xen 4.10.3 bug fix release (bsc#1027519) xen-4.10.3-testing-src.tar.bz2 - bsc#1114988 - VUL-0: CVE-2018-19967: xen: guest use of HLE constructs may lock up host (XSA-282) Fix included in tarball - bsc#1120067 - Libvirt segfault when crash triggered on top of HVM guest Fix included in tarball - Drop the following patches contained in the new tarball 5ae31917-x86-cpuidle-init-stats-lock-once.patch 5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch 5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch 5bacae4b-x86-boot-allocate-extra-module-slot.patch 5bae44ce-x86-silence-false-log-messages.patch 5bb60c12-x86-split-opt_xpti.patch 5bb60c4f-x86-split-opt_pv_l1tf.patch 5bb60c74-x86-fix-xpti-and-pv-l1tf.patch 5bcf0722-x86-boot-enable-NMIs.patch 5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch 5bd076e9-x86-boot-init-debug-regs-correctly.patch 5bd076e9-x86-init-vcpu-debug-regs-correctly.patch 5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch 5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch 5bdc31d5-VMX-fix-vmx_handle_eoi.patch 5be2a308-x86-extend-get_platform_badpages.patch 5be2a354-x86-work-around-HLE-host-lockup-erratum.patch 5be9634c-x86-dom0-avoid-using-1G-superpages.patch 5bed93e1-x86-hvm_copy-no-write-to-p2m_ioreq_server.patch 5bf4118c-amd-iommu-fix-flush-checks.patch 5bf41242-AMD-IOMMU-suppress-late-PTE-merging.patch 5bf41311-x86-dont-flush-after-L1e-update-failure.patch 5bf41331-x86-shadow-move-OOS-flag-bits.patch 5bf4135a-x86-shrink-page_info-shadow_flags.patch 5c011aaf-x86-dont-enable-shadow-with-too-small-allocation.patch 5c17ce93-x86-hvm-correct-RDTSCP-intercept-handling.patch 5c18f5ad-x86emul-fix-3-operand-IMUL.patch 5c190203-x86emul-work-around-SandyBridge-errata.patch 5c3608fa-fix-MEMF_no_dma-allocations-for-single-NUMA.patch 5c3dd8fa-cmdline-fix-strncmp-LITERAL-construct.patch- Upstream bug fixes (bsc#1027519) 5c17ce93-x86-hvm-correct-RDTSCP-intercept-handling.patch 5c18f5ad-x86emul-fix-3-operand-IMUL.patch 5c190203-x86emul-work-around-SandyBridge-errata.patch 5c3608fa-fix-MEMF_no_dma-allocations-for-single-NUMA.patch 5c3dd8fa-cmdline-fix-strncmp-LITERAL-construct.patch- Upstream bug fixes (bsc#1027519) 5be9634c-x86-dom0-avoid-using-1G-superpages.patch 5bed93e1-x86-hvm_copy-no-write-to-p2m_ioreq_server.patch 5bf4118c-amd-iommu-fix-flush-checks.patch replaces xsa275-1.patch 5bf41242-AMD-IOMMU-suppress-late-PTE-merging.patch replaces xsa275-2.patch 5bf41311-x86-dont-flush-after-L1e-update-failure.patch replaces xsa279.patch 5bf41331-x86-shadow-move-OOS-flag-bits.patch replaces xsa280-1.patch 5bf4135a-x86-shrink-page_info-shadow_flags.patch replaces xsa280-2.patch 5c011aaf-x86-dont-enable-shadow-with-too-small-allocation.patch 5c0f786c-parse_size_and_unit-percent.patch 5c0f7894-x86-dom0_mem-variants.patch- bsc#1115040 - VUL-0: xen: insufficient TLB flushing / improper large page mappings with AMD IOMMUs (XSA-275) xsa275-1.patch xsa275-2.patch - bsc#1115045 - VUL-0: xen: x86: DoS from attempting to use INVPCID with a non-canonical addresses (XSA-279) xsa279.patch - bsc#1115047 - VUL-0: xen: Fix for XSA-240 conflicts with shadow paging (XSA-280) xsa280-1.patch xsa280-2.patch - bsc#1108940 - L3: XEN SLE12-SP1 domU hang on SLE12-SP3 HV 5bdc31d5-VMX-fix-vmx_handle_eoi.patch - bsc#1105528 - L3: xpti=no-dom0 not working as expected 5bb60c12-x86-split-opt_xpti.patch 5bb60c4f-x86-split-opt_pv_l1tf.patch 5bb60c74-x86-fix-xpti-and-pv-l1tf.patch - Upstream bug fixes (bsc#1027519) 5bae44ce-x86-silence-false-log-messages.patch 5bcf0722-x86-boot-enable-NMIs.patch 5bd076e9-x86-boot-init-debug-regs-correctly.patch 5bd076e9-x86-init-vcpu-debug-regs-correctly.patch 5bd076e9-dombuilder-init-vcpu-debug-regs-correctly.patch 5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch 5bd85bfd-x86-fix-crash-on-xl-set-parameter-pcid.patch 5be2a308-x86-extend-get_platform_badpages.patch 5be2a354-x86-work-around-HLE-host-lockup-erratum.patch- bsc#1114405 - VUL-0: CVE-2018-18883: xen: Nested VT-x usable even when disabled (XSA-278) 5bd0e11b-x86-disallow-VT-x-insns-without-nested-virt.patch- Upstream bug fixes (bsc#1027519) 5b752762-x86-hvm-emul-rep-IO-should-not-cross-GFN-boundaries.patch 5ba11ed4-credit2-fix-moving-CPUs-between-cpupools.patch 5bacae4b-x86-boot-allocate-extra-module-slot.patch- Update to Xen 4.10.2 bug fix release (bsc#1027519) xen-4.10.2-testing-src.tar.bz2 - Drop the following patches contained in the new tarball 5a6703cb-x86-move-invocations-of-hvm_flush_guest_tlbs.patch 5a957d0e-gnttab-introduce-cmdline-feature-controls.patch 5a9985bd-x86-invpcid-support.patch 5ad4923e-x86-correct-S3-resume-ordering.patch 5ad49293-x86-suppress-BTI-mitigations-around-S3.patch 5ad600d4-x86-pv-introduce-x86emul_read_dr.patch 5ad600d4-x86-pv-introduce-x86emul_write_dr.patch 5ad8c3a7-x86-spec_ctrl-update-retpoline-decision-making.patch 5adda097-x86-HPET-fix-race-triggering-ASSERT.patch 5adda0d5-x86-HVM-never-retain-emulated-insn-cache.patch 5adde9ed-xpti-fix-double-fault-handling.patch 5ae06fad-SVM-fix-intercepts-for-SYS-CALL-ENTER-MSRs.patch 5aeaeae4-introduce-vcpu_sleep_nosync_locked.patch 5aeaeaf0-sched-fix-races-in-vcpu-migration.patch 5aeb2c57-x86-retval-checks-of-set-guest-trapbounce.patch 5af03009-x86-pv-hide-more-EFER-bits-from-PV.patch 5af1daa9-1-x86-traps-fix-dr6-handing-in-DB-handler.patch 5af1daa9-2-x86-pv-move-exception-injection-into-test_all_events.patch 5af1daa9-3-x86-traps-use-IST-for-DB.patch 5af1daa9-4-x86-traps-fix-handling-of-DB-in-hypervisor-context.patch 5af1daa9-x86-vpt-support-IO-APIC-routed-intr.patch 5af1daa9-x86-HVM-guard-against-bogus-emulator-ioreq-state.patch 5af97999-viridian-cpuid-leaf-40000003.patch 5afc13ae-1-x86-read-MSR_ARCH_CAPABILITIES-once.patch 5afc13ae-2-x86-express-Xen-SPEC_CTRL-choice-as-variable.patch 5afc13ae-3-x86-merge-bti_ist_info-use_shadow_spec_ctrl.patch 5afc13ae-4-x86-fold-XEN_IBRS-ALTERNATIVES.patch 5afc13ae-5-x86-rename-bits-of-spec_ctrl-infrastructure.patch 5afc13ae-6-x86-elide-MSR_SPEC_CTRL-handling-in-idle.patch 5afc13ae-7-x86-split-X86_FEATURE_SC_MSR.patch 5afc13ae-8-x86-explicitly-set-Xen-default-SPEC_CTRL.patch 5afc13ae-9-x86-cpuid-improve-guest-policies-for-speculative.patch 5afc13ae-A-x86-introduce-spec-ctrl-cmdline-opt.patch 5aec7393-1-x86-xpti-avoid-copy.patch 5aec7393-2-x86-xpti-write-cr3.patch 5aec744a-3-x86-xpti-per-domain-flag.patch 5aec744a-4-x86-xpti-use-invpcid.patch 5aec744a-5-x86-xpti-no-global-pages.patch 5aec744a-6-x86-xpti-cr3-valid-flag.patch 5aec744a-7-x86-xpti-pv_guest_cr4_to_real_cr4.patch 5aec744b-8-x86-xpti-cr3-helpers.patch 5aec74a8-9-x86-xpti-use-pcid.patch 5b02c786-x86-AMD-mitigations-for-GPZ-SP4.patch 5b02c786-x86-Intel-mitigations-for-GPZ-SP4.patch 5b02c786-x86-msr-virtualise-SPEC_CTRL-SSBD.patch 5b0bc9da-x86-XPTI-fix-S3-resume.patch 5b0d2286-libxc-x86-PV-dont-hand-through-CPUID-leaf-0x80000008.patch 5b0d2dbc-x86-correct-default_xen_spec_ctrl.patch 5b0d2ddc-x86-CPUID-dont-override-tool-stack-hidden-STIBP.patch 5b150ef9-x86-fix-error-handling-of-pv-dr7-shadow.patch 5b21825d-1-x86-support-fully-eager-FPU-context-switching.patch 5b21825d-2-x86-spec-ctrl-mitigations-for-LazyFPU.patch 5b238b92-x86-HVM-account-for-fully-eager-FPU.patch 5b2b7172-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b31e004-x86-HVM-emul-attempts-FPU-set-fpu_initialised.patch 5b323e3c-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b34882d-x86-mm-dont-bypass-preemption-checks.patch 5b348874-x86-refine-checks-in-DB-handler.patch 5b348897-libxl-qemu_disk_scsi_drive_string-break-out-common.patch 5b3488a2-libxl-restore-passing-ro-to-qemu-for-SCSI-disks.patch 5b34891a-x86-HVM-dont-cause-NM-to-be-raised.patch 5b348954-x86-guard-against-NM.patch 5b3f8fa5-port-array_index_nospec-from-Linux.patch 5b4488e7-x86-spec-ctrl-cmdline-handling.patch 5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch 5b4c9a60-allow-cpu_down-to-be-called-earlier.patch 5b4db308-SVM-fix-cleanup-svm_inject_event.patch 5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch 5b5040f2-x86-AMD-distinguish-CU-from-HT.patch 5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch 5b508775-2-x86-possibly-bring-up-all-CPUs.patch 5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch 5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch 5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch 5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch 5b56feb1-x86-hvm-disallow-unknown-EFER-bits.patch 5b56feb2-x86-XPTI-parsing-on-fixed-Intel-HW.patch 5b62ca93-VMX-avoid-hitting-BUG_ON.patch 5b6d84ac-x86-fix-improve-vlapic-read-write.patch 5b6d8ce2-x86-XPTI-parsing.patch 5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch 5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch 5b3cab8e-2-VMX-improve-MSR-load-save-API.patch 5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch 5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch 5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch 5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch 5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch 5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch 5b505fe5-VMX-fix-find-msr-build.patch 5b72fbbe-ARM-disable-grant-table-v2.patch 5b72fbbe-oxenstored-eval-order.patch 5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch 5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch 5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch 5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch 5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch 5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch 5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch 5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch 5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch 5b72fbbf-9-spec-ctrl=no-global-disable.patch 5b72fbbf-A-xl-conf-add-global-affinity-masks.patch 5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch 5b75afef-x86-setup-avoid-OoB-E820-lookup.patch 5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch 5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch 5b8d5832-x86-assorted-array_index_nospec-insertions.patch- bsc#1094508 - L3: Kernel oops in fs/dcache.c called by d_materialise_unique() 5b9784ad-x86-HVM-drop-hvm_fetch_from_guest_linear.patch 5b9784d2-x86-HVM-add-known_gla-helper.patch 5b9784f2-x86-HVM-split-page-straddling-accesses.patch - bsc#1103279 - (CVE-2018-15470) VUL-0: CVE-2018-15470: xen: oxenstored does not apply quota-maxentity (XSA-272) 5b72fbbe-oxenstored-eval-order.patch - bsc#1103275 - (CVE-2018-15469) VUL-0: CVE-2018-15469: xen: Use of v2 grant tables may cause crash on ARM (XSA-268) 5b72fbbe-ARM-disable-grant-table-v2.patch - bsc#1103276 - VUL-0: CVE-2018-15468: xen: x86: Incorrect MSR_DEBUGCTL handling lets guests enable BTS (XSA-269) 5b72fbbe-vtx-Fix-the-checking-for-unknown-invalid-MSR_DEBUGCTL-bits.patch (Replaces xsa269.patch) - bsc#1091107 - VUL-0: CVE-2018-3646: xen: L1 Terminal Fault -VMM (XSA-273) 5b72fbbf-1-spec-ctrl-Calculate-safe-PTE-addresses-for-L1TF-mitigations.patch (Replaces xsa273-1.patch) 5b72fbbf-2-spec-ctrl-Introduce-an-option-to-control-L1TF-mitigation-for-PV-guests.patch (Replaces xsa273-2.patch) 5b72fbbf-3-shadow-Infrastructure-to-force-a-PV-guest-into-shadow-mode.patch (Replaces xsa273-3.patch) 5b72fbbf-4-mm-Plumbing-to-allow-any-PTE-update-to-fail-with--ERESTART.patch (Replaces xsa273-4.patch) 5b72fbbf-5-pv-Force-a-guest-into-shadow-mode-when-it-writes-an-L1TF-vulnerable-PTE.patch (Replaces xsa273-5.patch) 5b72fbbf-6-spec-ctrl-CPUID-MSR-definitions-for-L1D_FLUSH.patch (Replaces xsa273-6.patch) 5b72fbbf-7-msr-Virtualise-MSR_FLUSH_CMD-for-guests.patch (Replaces xsa273-7.patch) 5b72fbbf-8-spec-ctrl-Introduce-an-option-to-control-L1D_FLUSH-for-HVM-HAP-guests.patch (Replaces xsa273-8.patch) 5b72fbbf-9-spec-ctrl=no-global-disable.patch 5b72fbbf-A-xl-conf-add-global-affinity-masks.patch - Upstream patches from Jan (bsc#1027519) 5a957d0e-gnttab-introduce-cmdline-feature-controls.patch 5b6d84ac-x86-fix-improve-vlapic-read-write.patch 5b74190e-x86-hvm-ioreq-MMIO-range-check-honor-DF.patch 5b75afef-x86-setup-avoid-OoB-E820-lookup.patch 5b76b780-rangeset-inquiry-functions-tolerate-NULL.patch 5b83c654-VT-d-dmar-iommu-mem-leak-fix.patch 5b8d5832-x86-assorted-array_index_nospec-insertions.patch- bsc#1078292 - rpmbuild -ba SPECS/xen.spec with xen-4.9.1 failed xen.spec- bsc#1091107 - VUL-0: CVE-2018-3646: xen: L1 Terminal Fault -VMM (XSA-273) xsa273-1.patch xsa273-2.patch xsa273-3.patch xsa273-4.patch xsa273-5.patch xsa273-6.patch xsa273-7.patch xsa273-8.patch - Upstream prereq patches for XSA-273 (bsc#1027519) 5b34b8fe-VMX-defer-vmx_vmcs_exit-as-long-as-possible.patch 5b3cab8e-1-VMX-MSR_DEBUGCTL-handling.patch 5b3cab8e-2-VMX-improve-MSR-load-save-API.patch 5b3cab8e-3-VMX-cleanup-MSR-load-save-infra.patch 5b3cab8f-1-VMX-factor-out-locate_msr_entry.patch 5b3cab8f-2-VMX-remote-access-to-MSR-lists.patch 5b3cab8f-3-VMX-improve-LBR-MSR-handling.patch 5b3cab8f-4-VMX-pass-MSR-value-into-vmx_msr_add.patch 5b3cab8f-5-VMX-load-only-guest-MSR-entries.patch 5b505fe5-VMX-fix-find-msr-build.patch 5b62ca93-VMX-avoid-hitting-BUG_ON.patch 5b6d8ce2-x86-XPTI-parsing.patch- bsc#1103276 - VUL-0: CVE-2018-15468: xen: x86: Incorrect MSR_DEBUGCTL handling lets guests enable BTS (XSA-269) xsa269.patch- Upstream patches from Jan (bsc#1027519) 5af03009-x86-pv-hide-more-EFER-bits-from-PV.patch 5b3f8fa5-port-array_index_nospec-from-Linux.patch 5b4488e7-x86-spec-ctrl-cmdline-handling.patch 5b471517-page_alloc-correct-first_dirty-calc-in-block-merging.patch 5b4c9a60-allow-cpu_down-to-be-called-earlier.patch 5b4db308-SVM-fix-cleanup-svm_inject_event.patch 5b5040c3-cpupools-fix-state-when-downing-a-CPU-failed.patch 5b5040f2-x86-AMD-distinguish-CU-from-HT.patch 5b508775-1-x86-distinguish-CPU-offlining-and-removal.patch 5b508775-2-x86-possibly-bring-up-all-CPUs.patch 5b508775-3-x86-cmdline-opt-to-avoid-use-of-secondary-HTs.patch 5b508ce8-VMX-dont-clobber-dr6-while-debug-state-is-lazy.patch 5b50df16-1-x86-xstate-use-guest-CPUID-policy.patch 5b50df16-2-x86-make-xstate-calculation-errors-more-obvious.patch 5b56feb1-x86-hvm-disallow-unknown-EFER-bits.patch 5b56feb2-x86-XPTI-parsing-on-fixed-Intel-HW.patch- Upstream patches from Jan (bsc#1027519) 5b02c786-x86-AMD-mitigations-for-GPZ-SP4.patch (Replaces Spectre-v4-1.patch) 5b02c786-x86-Intel-mitigations-for-GPZ-SP4.patch (Replaces Spectre-v4-2.patch) 5b02c786-x86-msr-virtualise-SPEC_CTRL-SSBD.patch (Replaces Spectre-v4-3.patch) 5b0bc9da-x86-XPTI-fix-S3-resume.patch 5b0d2286-libxc-x86-PV-dont-hand-through-CPUID-leaf-0x80000008.patch 5b0d2d91-x86-suppress-sync-when-XPTI-off.patch 5b0d2dbc-x86-correct-default_xen_spec_ctrl.patch 5b0d2ddc-x86-CPUID-dont-override-tool-stack-hidden-STIBP.patch 5b150ef9-x86-fix-error-handling-of-pv-dr7-shadow.patch 5b21825d-1-x86-support-fully-eager-FPU-context-switching.patch (Replaces xsa267-1.patch) 5b21825d-2-x86-spec-ctrl-mitigations-for-LazyFPU.patch (Replaces xsa267-2.patch) 5b238b92-x86-HVM-account-for-fully-eager-FPU.patch 5b2b7172-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b31e004-x86-HVM-emul-attempts-FPU-set-fpu_initialised.patch 5b323e3c-x86-EFI-fix-FPU-state-handling-around-runtime-calls.patch 5b34882d-x86-mm-dont-bypass-preemption-checks.patch (Replaces xsa264.patch) 5b348874-x86-refine-checks-in-DB-handler.patch (Replaces xsa265.patch) 5b348897-libxl-qemu_disk_scsi_drive_string-break-out-common.patch (Replaces xsa266-1-<>.patch) 5b3488a2-libxl-restore-passing-ro-to-qemu-for-SCSI-disks.patch (Replaces xsa266-2-<>.patch) 5b34891a-x86-HVM-dont-cause-NM-to-be-raised.patch 5b348954-x86-guard-against-NM.patch- Fix more build gcc8 related failures with xen.fuzz-_FORTIFY_SOURCE.patch- bsc#1098403 - fix regression introduced by changes for bsc#1079730 a PV domU without qcow2 and/or vfb has no qemu attached. Ignore QMP errors for PV domUs to handle PV domUs with and without an attached qemu-xen. xen.bug1079730.patch- bsc#1097521 - VUL-0: CVE-2018-12891: xen: preemption checks bypassed in x86 PV MM handling (XSA-264) xsa264.patch - bsc#1097522 - VUL-0: CVE-2018-12893: xen: x86: #DB exception safety check can be triggered by a guest (XSA-265) xsa265.patch - bsc#1097523 - VUL-0: CVE-2018-12892: xen: libxl fails to honour readonly flag on HVM emulated SCSI disks (XSA-266) xsa266-1-libxl-qemu_disk_scsi_drive_string-Break-out-common-p.patch xsa266-2-libxl-restore-passing-readonly-to-qemu-for-SCSI-disk.patch- bsc#1095242 - VUL-0: CVE-2018-3665: xen: Lazy FP Save/Restore (XSA-267) xsa267-1.patch xsa267-2.patch- bsc#1092631 - VUL-0: CVE-2018-3639: xen: V4 – Speculative Store Bypass aka "Memory Disambiguation" (XSA-263) 5ad4923e-x86-correct-S3-resume-ordering.patch 5ad49293-x86-suppress-BTI-mitigations-around-S3.patch 5afc13ae-1-x86-read-MSR_ARCH_CAPABILITIES-once.patch 5afc13ae-2-x86-express-Xen-SPEC_CTRL-choice-as-variable.patch 5afc13ae-3-x86-merge-bti_ist_info-use_shadow_spec_ctrl.patch 5afc13ae-4-x86-fold-XEN_IBRS-ALTERNATIVES.patch 5afc13ae-5-x86-rename-bits-of-spec_ctrl-infrastructure.patch 5afc13ae-6-x86-elide-MSR_SPEC_CTRL-handling-in-idle.patch 5afc13ae-7-x86-split-X86_FEATURE_SC_MSR.patch 5afc13ae-8-x86-explicitly-set-Xen-default-SPEC_CTRL.patch 5afc13ae-9-x86-cpuid-improve-guest-policies-for-speculative.patch 5afc13ae-A-x86-introduce-spec-ctrl-cmdline-opt.patch Spectre-v4-1.patch Spectre-v4-2.patch Spectre-v4-3.patch- Always call qemus xen-save-devices-state in suspend/resume to fix migration with qcow2 images (bsc#1079730) libxl.Add-a-version-check-of-QEMU-for-QMP-commands.patch libxl.qmp-Tell-QEMU-about-live-migration-or-snapshot.patch xen.bug1079730.patch- bsc#1087289 - L3: Xen BUG at sched_credit.c:1663 5aeaeae4-introduce-vcpu_sleep_nosync_locked.patch 5aeaeaf0-sched-fix-races-in-vcpu-migration.patch - Upstream patches from Jan (bsc#1027519) 5ad600d4-x86-pv-introduce-x86emul_read_dr.patch 5ad600d4-x86-pv-introduce-x86emul_write_dr.patch 5ad8c3a7-x86-spec_ctrl-update-retpoline-decision-making.patch 5adda097-x86-HPET-fix-race-triggering-ASSERT.patch 5adda0d5-x86-HVM-never-retain-emulated-insn-cache.patch 5ae06fad-SVM-fix-intercepts-for-SYS-CALL-ENTER-MSRs.patch 5ae31917-x86-cpuidle-init-stats-lock-once.patch 5aeb2c57-x86-retval-checks-of-set-guest-trapbounce.patch 5af1daa9-1-x86-traps-fix-dr6-handing-in-DB-handler.patch (Replaces xsa260-1.patch) 5af1daa9-2-x86-pv-move-exception-injection-into-test_all_events.patch (Replaces xsa260-2.patch) 5af1daa9-3-x86-traps-use-IST-for-DB.patch (Replaces xsa260-3.patch) 5af1daa9-4-x86-traps-fix-handling-of-DB-in-hypervisor-context.patch (Replaces xsa260-4.patch) 5af1daa9-x86-HVM-guard-against-bogus-emulator-ioreq-state.patch (Replaces xsa262.patch) 5af1daa9-x86-vpt-support-IO-APIC-routed-intr.patch (Replaces xsa261.patch) 5af97999-viridian-cpuid-leaf-40000003.patch- Fixes related to Page Table Isolation (XPTI). bsc#1074562 XSA-254 5a6703cb-x86-move-invocations-of-hvm_flush_guest_tlbs.patch 5a9985bd-x86-invpcid-support.patch 5adde9ed-xpti-fix-double-fault-handling.patch 5aec7393-1-x86-xpti-avoid-copy.patch 5aec7393-2-x86-xpti-write-cr3.patch 5aec744a-3-x86-xpti-per-domain-flag.patch 5aec744a-4-x86-xpti-use-invpcid.patch 5aec744a-5-x86-xpti-no-global-pages.patch 5aec744a-6-x86-xpti-cr3-valid-flag.patch 5aec744a-7-x86-xpti-pv_guest_cr4_to_real_cr4.patch 5aec744b-8-x86-xpti-cr3-helpers.patch 5aec74a8-9-x86-xpti-use-pcid.patch- Update to Xen 4.10.1 bug fix release (bsc#1027519) xen-4.10.1-testing-src.tar.bz2 disable-building-pv-shim.patch - Drop the following patches contained in the new tarball 5a21a77e-x86-pv-construct-d0v0s-GDT-properly.patch 5a2fda0d-x86-mb2-avoid-Xen-when-looking-for-module-crashkernel-pos.patch 5a2ffc1f-x86-mm-drop-bogus-paging-mode-assertion.patch 5a313972-x86-microcode-add-support-for-AMD-Fam17.patch 5a32bd79-x86-vmx-dont-use-hvm_inject_hw_exception-in-.patch 5a4caa5e-x86-IRQ-conditionally-preserve-access-perm.patch 5a4caa8c-x86-E820-don-t-overrun-array.patch 5a4e2bca-x86-free-msr_vcpu_policy-during-destruction.patch 5a4e2c2c-x86-upcall-inject-spurious-event-after-setting-vector.patch 5a4fd893-1-x86-break-out-alternative-asm-into-separate-header.patch 5a4fd893-2-x86-introduce-ALTERNATIVE_2-macros.patch 5a4fd893-3-x86-hvm-rename-update_guest_vendor-to-cpuid_policy_changed.patch 5a4fd893-4-x86-introduce-cpuid_policy_updated.patch 5a4fd893-5-x86-entry-remove-partial-cpu_user_regs.patch 5a4fd894-1-x86-rearrange-RESTORE_ALL-to-restore-in-stack-order.patch 5a4fd894-2-x86-hvm-use-SAVE_ALL-after-VMExit.patch 5a4fd894-3-x86-erase-guest-GPRs-on-entry-to-Xen.patch 5a4fd894-4-clarifications-to-wait-infrastructure.patch 5a534c78-x86-dont-use-incorrect-CPUID-values-for-topology.patch 5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4-updates.patch 5a5e2cff-x86-Meltdown-band-aid.patch 5a5e2d73-x86-Meltdown-band-aid-conditional.patch 5a5e3a4e-1-x86-support-compiling-with-indirect-branch-thunks.patch 5a5e3a4e-2-x86-support-indirect-thunks-from-asm.patch 5a5e3a4e-3-x86-report-speculative-mitigation-details.patch 5a5e3a4e-4-x86-AMD-set-lfence-as-Dispatch-Serialising.patch 5a5e3a4e-5-x86-introduce-alternative-indirect-thunks.patch 5a5e3a4e-6-x86-definitions-for-Indirect-Branch-Controls.patch 5a5e3a4e-7-x86-cmdline-opt-to-disable-IBRS-IBPB-STIBP.patch 5a5e459c-1-x86-SVM-offer-CPUID-faulting-to-AMD-HVM-guests.patch 5a5e459c-2-x86-report-domain-id-on-CPUID.patch 5a68bc16-x86-acpi-process-softirqs-logging-Cx.patch 5a69c0b9-x86-fix-GET_STACK_END.patch 5a6b36cd-1-x86-cpuid-handling-of-IBRS-IBPB-STIBP-and-IBRS-for-guests.patch 5a6b36cd-2-x86-msr-emulation-of-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-3-x86-migrate-MSR_SPEC_CTRL.patch 5a6b36cd-4-x86-hvm-permit-direct-access-to-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-5-x86-use-SPEC_CTRL-on-entry.patch 5a6b36cd-6-x86-clobber-RSB-RAS-on-entry.patch 5a6b36cd-7-x86-no-alternatives-in-NMI-MC-paths.patch 5a6b36cd-8-x86-boot-calculate-best-BTI-mitigation.patch 5a6b36cd-9-x86-issue-speculation-barrier.patch 5a6b36cd-A-x86-offer-Indirect-Branch-Controls-to-guests.patch 5a6b36cd-B-x86-clear-SPEC_CTRL-while-idle.patch 5a7b1bdd-x86-reduce-Meltdown-band-aid-IPI-overhead.patch 5a843807-x86-spec_ctrl-fix-bugs-in-SPEC_CTRL_ENTRY_FROM_INTR_IST.patch 5a856a2b-x86-emul-fix-64bit-decoding-of-segment-overrides.patch 5a856a2b-x86-use-32bit-xors-for-clearing-GPRs.patch 5a856a2b-x86-xpti-hide-almost-all-of-Xen-image-mappings.patch 5a8be788-x86-nmi-start-NMI-watchdog-on-CPU0-after-SMP.patch 5a95373b-x86-PV-avoid-leaking-other-guests-MSR_TSC_AUX.patch 5a95571f-memory-dont-implicitly-unpin-in-decrease-res.patch 5a95576c-gnttab-ARM-dont-corrupt-shared-GFN-array.patch 5a955800-gnttab-dont-free-status-pages-on-ver-change.patch 5a955854-x86-disallow-HVM-creation-without-LAPIC-emul.patch 5a956747-x86-HVM-dont-give-wrong-impression-of-WRMSR-success.patch 5a9eb7f1-x86-xpti-dont-map-stack-guard-pages.patch 5a9eb85c-x86-slightly-reduce-XPTI-overhead.patch 5a9eb890-x86-remove-CR-reads-from-exit-to-guest-path.patch 5aa2b6b9-cpufreq-ondemand-CPU-offlining-race.patch 5aaa9878-x86-vlapic-clear-TMR-bit-for-edge-triggered-intr.patch xsa258.patch xsa259.patch- bsc#1090820 - VUL-0: CVE-2018-8897: xen: x86: mishandling of debug exceptions (XSA-260) xsa260-1.patch xsa260-2.patch xsa260-3.patch xsa260-4.patch - bsc#1090822 - VUL-0: CVE-2018-10982: xen: x86 vHPET interrupt injection errors (XSA-261) xsa261.patch - bsc#1090823 - VUL-0: CVE-2018-10981: xen: qemu may drive Xen into unbounded loop (XSA-262) xsa262.patch- bsc#1089152 - VUL-0: CVE-2018-10472: xen: Information leak via crafted user-supplied CDROM (XSA-258) xsa258.patch - bsc#1089635 - VUL-0: CVE-2018-10471: xen: x86: PV guest may crash Xen with XPTI (XSA-259) xsa259.patch- Preserve xen-syms from xen-dbg.gz to allow processing vmcores with crash(1) (bsc#1087251)- Upstream patches from Jan (bsc#1027519) and fixes related to Page Table Isolation (XPTI). See also bsc#1074562 XSA-254 5a856a2b-x86-xpti-hide-almost-all-of-Xen-image-mappings.patch 5a9eb7f1-x86-xpti-dont-map-stack-guard-pages.patch 5a9eb85c-x86-slightly-reduce-XPTI-overhead.patch 5a9eb890-x86-remove-CR-reads-from-exit-to-guest-path.patch 5aa2b6b9-cpufreq-ondemand-CPU-offlining-race.patch 5aaa9878-x86-vlapic-clear-TMR-bit-for-edge-triggered-intr.patch- bsc#1072834 - Xen HVM: unchecked MSR access error: RDMSR from 0xc90 at rIP: 0xffffffff93061456 (native_read_msr+0x6/0x30) 5a956747-x86-HVM-dont-give-wrong-impression-of-WRMSR-success.patch - Upstream patches from Jan (bsc#1027519) 5a79d7ed-libxc-packed-initrd-dont-fail-domain-creation.patch 5a7b1bdd-x86-reduce-Meltdown-band-aid-IPI-overhead.patch 5a843807-x86-spec_ctrl-fix-bugs-in-SPEC_CTRL_ENTRY_FROM_INTR_IST.patch 5a856a2b-x86-emul-fix-64bit-decoding-of-segment-overrides.patch 5a856a2b-x86-use-32bit-xors-for-clearing-GPRs.patch 5a8be788-x86-nmi-start-NMI-watchdog-on-CPU0-after-SMP.patch 5a95373b-x86-PV-avoid-leaking-other-guests-MSR_TSC_AUX.patch 5a95571f-memory-dont-implicitly-unpin-in-decrease-res.patch (Replaces xsa252.patch) 5a95576c-gnttab-ARM-dont-corrupt-shared-GFN-array.patch (Replaces xsa255-1.patch) 5a955800-gnttab-dont-free-status-pages-on-ver-change.patch (Replaces xsa255-2.patch) 5a955854-x86-disallow-HVM-creation-without-LAPIC-emul.patch (Replaces xsa256.patch) - Drop xsa252.patch xsa255-1.patch xsa255-2.patch xsa256.patch- bsc#1080635 - VUL-0: CVE-2018-7540: xen: DoS via non-preemptable L3/L4 pagetable freeing (XSA-252) xsa252.patch - bsc#1080662 - VUL-0: CVE-2018-7541: xen: grant table v2 -> v1 transition may crash Xen (XSA-255) xsa255-1.patch xsa255-2.patch - bsc#1080634 - VUL-0: CVE-2018-7542: xen: x86 PVH guest without LAPIC may DoS the host (XSA-256) xsa256.patch- Remove stale systemd presets code for 13.2 and older- fate#324965 - add script, udev rule and systemd service to watch for vcpu online/offline events in a HVM domU They are triggered via xl vcpu-set domU N- Replace hardcoded xen with Name tag when refering to subpkgs- Make sure tools and tools-domU require libs from the very same build- tools-domU: Add support for qemu guest agent. New files 80-xen-channel-setup.rules and xen-channel-setup.sh configure a xen-pv-channel for use by the guest agent FATE#324963- Remove outdated /etc/xen/README*- bsc#1073961 - VUL-0: CVE-2018-5244: xen: x86: memory leak with MSR emulation (XSA-253) 5a4e2bca-x86-free-msr_vcpu_policy-during-destruction.patch - bsc#1074562 - VUL-0: CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 xen: Information leak via side effects of speculative execution (XSA-254). Includes Spectre v2 mitigation. 5a4caa5e-x86-IRQ-conditionally-preserve-access-perm.patch 5a4caa8c-x86-E820-don-t-overrun-array.patch 5a4e2c2c-x86-upcall-inject-spurious-event-after-setting-vector.patch 5a4fd893-1-x86-break-out-alternative-asm-into-separate-header.patch 5a4fd893-2-x86-introduce-ALTERNATIVE_2-macros.patch 5a4fd893-3-x86-hvm-rename-update_guest_vendor-to-cpuid_policy_changed.patch 5a4fd893-4-x86-introduce-cpuid_policy_updated.patch 5a4fd893-5-x86-entry-remove-partial-cpu_user_regs.patch 5a4fd894-1-x86-rearrange-RESTORE_ALL-to-restore-in-stack-order.patch 5a4fd894-2-x86-hvm-use-SAVE_ALL-after-VMExit.patch 5a4fd894-3-x86-erase-guest-GPRs-on-entry-to-Xen.patch 5a4fd894-4-clarifications-to-wait-infrastructure.patch 5a534c78-x86-dont-use-incorrect-CPUID-values-for-topology.patch 5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4-updates.patch 5a5e2cff-x86-Meltdown-band-aid.patch 5a5e2d73-x86-Meltdown-band-aid-conditional.patch 5a5e3a4e-1-x86-support-compiling-with-indirect-branch-thunks.patch 5a5e3a4e-2-x86-support-indirect-thunks-from-asm.patch 5a5e3a4e-3-x86-report-speculative-mitigation-details.patch 5a5e3a4e-4-x86-AMD-set-lfence-as-Dispatch-Serialising.patch 5a5e3a4e-5-x86-introduce-alternative-indirect-thunks.patch 5a5e3a4e-6-x86-definitions-for-Indirect-Branch-Controls.patch 5a5e3a4e-7-x86-cmdline-opt-to-disable-IBRS-IBPB-STIBP.patch 5a5e459c-1-x86-SVM-offer-CPUID-faulting-to-AMD-HVM-guests.patch 5a5e459c-2-x86-report-domain-id-on-CPUID.patch 5a68bc16-x86-acpi-process-softirqs-logging-Cx.patch 5a69c0b9-x86-fix-GET_STACK_END.patch 5a6b36cd-1-x86-cpuid-handling-of-IBRS-IBPB-STIBP-and-IBRS-for-guests.patch 5a6b36cd-2-x86-msr-emulation-of-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-3-x86-migrate-MSR_SPEC_CTRL.patch 5a6b36cd-4-x86-hvm-permit-direct-access-to-SPEC_CTRL-PRED_CMD.patch 5a6b36cd-5-x86-use-SPEC_CTRL-on-entry.patch 5a6b36cd-6-x86-clobber-RSB-RAS-on-entry.patch 5a6b36cd-7-x86-no-alternatives-in-NMI-MC-paths.patch 5a6b36cd-8-x86-boot-calculate-best-BTI-mitigation.patch 5a6b36cd-9-x86-issue-speculation-barrier.patch 5a6b36cd-A-x86-offer-Indirect-Branch-Controls-to-guests.patch 5a6b36cd-B-x86-clear-SPEC_CTRL-while-idle.patch- Fix python3 deprecated atoi call (bsc#1067224) pygrub-python3-conversion.patch - Drop xenmon-python3-conversion.patch- bsc#1067317 - pass cache=writeback|unsafe|directsync to qemu, depending on the libxl disk settings libxl.add-option-to-disable-disk-cache-flushes-in-qdisk.patch- Remove libxl.LIBXL_DESTROY_TIMEOUT.debug.patch- bsc#1067224 - xen-tools have hard dependency on Python 2 build-python3-conversion.patch bin-python3-conversion.patch- bsc#1070165 - xen crashes after aborted localhost migration 5a2ffc1f-x86-mm-drop-bogus-paging-mode-assertion.patch - bsc#1035442 - L3: libxl: error: libxl.c:1676:devices_destroy_cb: libxl__devices_destroy failed 5a33a12f-domctl-improve-locking-during-domain-destruction.patch - Upstream patches from Jan (bsc#1027519) 5a21a77e-x86-pv-construct-d0v0s-GDT-properly.patch 5a2fda0d-x86-mb2-avoid-Xen-when-looking-for-module-crashkernel-pos.patch 5a313972-x86-microcode-add-support-for-AMD-Fam17.patch 5a32bd79-x86-vmx-dont-use-hvm_inject_hw_exception-in-.patch- Update to Xen 4.10.0 FCS (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Rebuild initrd if xen-tools-domU is updated- Update to Xen 4.10.0-rc8 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Increase the value of LIBXL_DESTROY_TIMEOUT from 10 to 100 seconds If many domUs shutdown in parallel the backends can not keep up Add some debug output to track how long backend shutdown takes (bsc#1035442) libxl.LIBXL_DESTROY_TIMEOUT.patch libxl.LIBXL_DESTROY_TIMEOUT.debug.patch- Adjust xenstore-run-in-studomain.patch to change the defaults in the code instead of changing the sysconfig template, to also cover the upgrade case- Update to Xen 4.10.0-rc6 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Since xen switched to Kconfig, building a debug hypervisor was done by default. Adjust make logic to build a non-debug hypervisor by default, and continue to provide one as xen-dbg.gz- fate#316614: set migration constraints from cmdline fix libxl.set-migration-constraints-from-cmdline.patch for xen-4.10- Document the suse-diskcache-disable-flush option in xl-disk-configuration(5) (bsc#879425,bsc#1067317)- Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468)- Update to Xen 4.10.0-rc5 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - fate#323663 - Run Xenstore in stubdomain xenstore-run-in-studomain.patch- bsc#1067224 - xen-tools have hard dependency on Python 2 pygrub-python3-conversion.patch xenmon-python3-conversion.patch migration-python3-conversion.patch xnloader.py xen2libvirt.py- Remove xendriverdomain.service (bsc#1065185) Driver domains must be configured manually with custom .service file- Update to Xen 4.10.0-rc3 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - Drop 59f31268-libxc-remove-stale-error-check-for-domain-size.patch- Adjust xen-dom0-modules.service to ignore errors (bsc#1065187)- fate#324052 Support migration of Xen HVM domains larger than 1TB 59f31268-libxc-remove-stale-error-check-for-domain-size.patch- Update to Xen 4.10.0-rc2 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2- Update to Xen 4.10.0-rc1 (fate#321394, fate#322686) xen-4.10.0-testing-src.tar.bz2 - Drop patches included in new tarball 592fd5f0-stop_machine-fill-result-only-in-case-of-error.patch 596f257e-x86-fix-hvmemul_insn_fetch.patch 5982fd99-VT-d-don-t-panic-warn-on-iommu-no-igfx.patch 598c3630-VT-d-PI-disable-when-CPU-side-PI-is-off.patch 598c3706-cpufreq-only-stop-ondemand-governor-if-started.patch 5992f1e5-x86-grant-disallow-misaligned-PTEs.patch 5992f20d-gnttab-split-maptrack-lock-to-make-it-useful-again.patch 5992f233-gnttab-correct-pin-status-fixup-for-copy.patch 59958e76-gnttab-dont-use-possibly-unbounded-tail-calls.patch 59958ebf-gnttab-fix-transitive-grant-handling.patch 59958edd-gnttab-avoid-spurious-maptrack-handle-alloc-failures.patch 599da329-arm-mm-release-grant-lock-on-xatp1-error-paths.patch 59a01223-x86-check-for-alloc-errors-in-modify_xen_mappings.patch 59a0130c-x86-efi-dont-write-relocs-in-efi_arch_relocate_image-1st-pass.patch 59a9221f-VT-d-use-correct-BDF-for-VF-to-search-VT-d-unit.patch 59ae9177-x86-emul-fix-handling-of-unimplemented-Grp7-insns.patch 59aec335-x86emul-correct-VEX-W-handling-for-VPINSRD.patch 59aec375-x86emul-correct-VEX-L-handling-for-VCVTx2SI.patch 59afcea0-x86-introduce-and-use-setup_force_cpu_cap.patch 59b2a7f2-x86-HVM-correct-repeat-count-update-linear-phys.patch 59b7d664-mm-make-sure-node-is-less-than-MAX_NUMNODES.patch 59b7d69b-grant_table-fix-GNTTABOP_cache_flush-handling.patch 59b7d6c8-xenstore-dont-unlink-connection-object-twice.patch 59b7d6d9-gnttab-also-validate-PTE-perms-upon-destroy-replace.patch gcc7-arm.patch gcc7-mini-os.patch- bsc#1061084 - VUL-0: xen: page type reference leak on x86 (XSA-242) xsa242.patch - bsc#1061086 - VUL-0: xen: x86: Incorrect handling of self-linear shadow mappings with translated guests (XSA-243) xsa243.patch - bsc#1061087 - VUL-0: xen: x86: Incorrect handling of IST settings during CPU hotplug (XSA-244) xsa244.patch- bsc#1061077 - VUL-0: xen: DMOP map/unmap missing argument checks (XSA-238) xsa238.patch - bsc#1061080 - VUL-0: xen: hypervisor stack leak in x86 I/O intercept code (XSA-239) xsa239.patch - bsc#1061081 - VUL-0: xen: Unlimited recursion in linear pagetable de-typing (XSA-240) xsa240-1.patch xsa240-2.patch - bsc#1061082 - VUL-0: xen: Stale TLB entry due to page type release race (XSA-241) xsa241.patch- bsc#1061075 - VUL-0: xen: pin count / page reference race in grant table code (XSA-236) xsa236.patch - bsc#1061076 - VUL-0: xen: multiple MSI mapping issues on x86 (XSA-237) xsa237-1.patch xsa237-2.patch xsa237-3.patch xsa237-4.patch xsa237-5.patch- bsc#1056278 - VUL-0: xen: Missing NUMA node parameter verification (XSA-231) 59b7d664-mm-make-sure-node-is-less-than-MAX_NUMNODES.patch - bsc#1056280 - VUL-0: xen: Missing check for grant table (XSA-232) 59b7d69b-grant_table-fix-GNTTABOP_cache_flush-handling.patch - bsc#1056281 - VUL-0: xen: cxenstored: Race in domain cleanup (XSA-233) 59b7d6c8-xenstore-dont-unlink-connection-object-twice.patch - bsc#1056282 - VUL-0: xen: insufficient grant unmapping checks for x86 PV guests (XSA-234) 59b7d6d9-gnttab-also-validate-PTE-perms-upon-destroy-replace.patch - bsc#1055321 - VUL-0: xen: add-to-physmap error paths fail to release lock on ARM (XSA-235) 599da329-arm-mm-release-grant-lock-on-xatp1-error-paths.patch - Upstream patches from Jan (bsc#1027519) 59a01223-x86-check-for-alloc-errors-in-modify_xen_mappings.patch 59a0130c-x86-efi-dont-write-relocs-in-efi_arch_relocate_image-1st-pass.patch 59a9221f-VT-d-use-correct-BDF-for-VF-to-search-VT-d-unit.patch 59ae9177-x86-emul-fix-handling-of-unimplemented-Grp7-insns.patch 59aec335-x86emul-correct-VEX-W-handling-for-VPINSRD.patch 59aec375-x86emul-correct-VEX-L-handling-for-VCVTx2SI.patch 59afcea0-x86-introduce-and-use-setup_force_cpu_cap.patch 59b2a7f2-x86-HVM-correct-repeat-count-update-linear-phys.patch - Dropped gcc7-xen.patch- bsc#1057358 - Cannot Boot into SLES12.3 with Xen hypervisor when Secure Boot is Enabled xen.spec- bsc#1055695 - XEN: 11SP4 and 12SP3 HVM guests can not be restored update from v6 to v9 to cover more cases for ballooned domUs libxc.sr.superpage.patch- bsc#1026236 - remove suse_vtsc_tolerance= cmdline option for Xen drop the patch because it is not upstream acceptable remove xen.suse_vtsc_tolerance.patch- bsc#1055695 - XEN: 11SP4 and 12SP3 HVM guests can not be restored after the save using xl stack libxc.sr.superpage.patch- Unignore gcc-PIE the toolstack disables PIE for firmware builds as needed- Upstream patches from Jan (bsc#1027519) 592fd5f0-stop_machine-fill-result-only-in-case-of-error.patch 596f257e-x86-fix-hvmemul_insn_fetch.patch 5982fd99-VT-d-don-t-panic-warn-on-iommu-no-igfx.patch 598c3630-VT-d-PI-disable-when-CPU-side-PI-is-off.patch 598c3706-cpufreq-only-stop-ondemand-governor-if-started.patch 5992f1e5-x86-grant-disallow-misaligned-PTEs.patch (Replaces xsa227.patch) 5992f20d-gnttab-split-maptrack-lock-to-make-it-useful-again.patch (Replaces xsa228.patch) 5992f233-gnttab-correct-pin-status-fixup-for-copy.patch (Replaces xsa230.patch) 59958e76-gnttab-dont-use-possibly-unbounded-tail-calls.patch (Replaces xsa226-1.patch) 59958ebf-gnttab-fix-transitive-grant-handling.patch (Replaces xsa226-2.patch) 59958edd-gnttab-avoid-spurious-maptrack-handle-alloc-failures.patch- bsc#1044974 - xen-tools require python-pam xen.spec- Clean up spec file errors and a few warnings. (bsc#1027519) - Removed conditional 'with_systemd' and some old deprecated 'sles_version' checks. xen.spec- Remove use of brctl utiltiy from supportconfig plugin FATE#323639- Use upstream variant of mini-os __udivmoddi4 change gcc7-mini-os.patch- fate#323639 Move bridge-utils to legacy replace-obsolete-network-configuration-commands-in-s.patch- bsc#1052686 - VUL-0: xen: grant_table: possibly premature clearing of GTF_writing / GTF_reading (XSA-230) xsa230.patch- bsc#1035231 - migration of HVM domU does not use superpages on destination dom0 libxc.sr.superpage.patch- bsc#1051787 - VUL-0: CVE-2017-12135: xen: possibly unbounded recursion in grant table code (XSA-226) xsa226-1.patch xsa226-2.patch - bsc#1051788 - VUL-0: CVE-2017-12137: xen: x86: PV privilege escalation via map_grant_ref (XSA-227) xsa227.patch - bsc#1051789 - VUL-0: CVE-2017-12136: xen: grant_table: Race conditions with maptrack free list handling (XSA-228) xsa228.patch- Add a supportconfig plugin xen-supportconfig FATE#323661- bsc#1026236 - add suse_vtsc_tolerance= cmdline option for Xen To avoid emulation of TSC access from a domU after live migration add a global tolerance for the measured host kHz xen.suse_vtsc_tolerance.patch- fate#323662 Drop qemu-dm from xen-tools package The following tarball and patches have been removed qemu-xen-traditional-dir-remote.tar.bz2 VNC-Support-for-ExtendedKeyEvent-client-message.patch 0001-net-move-the-tap-buffer-into-TAPState.patch 0002-net-increase-tap-buffer-size.patch 0003-e1000-fix-access-4-bytes-beyond-buffer-end.patch 0004-e1000-secrc-support.patch 0005-e1000-multi-buffer-packet-support.patch 0006-e1000-clear-EOP-for-multi-buffer-descriptors.patch 0007-e1000-verify-we-have-buffers-upfront.patch 0008-e1000-check-buffer-availability.patch CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch CVE-2015-4037-qemut-smb-config-dir-name.patch CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch CVE-2016-7908-qemut-net-Infinite-loop-in-mcf_fec_do_tx.patch CVE-2016-7909-qemut-net-pcnet-infinite-loop-in-pcnet_rdra_addr.patch CVE-2016-8667-qemut-dma-rc4030-divide-by-zero-error-in-set_next_tick.patch CVE-2016-8669-qemut-char-divide-by-zero-error-in-serial_update_parameters.patch CVE-2016-8910-qemut-net-rtl8139-infinite-loop-while-transmit-in-Cplus-mode.patch CVE-2016-9921-qemut-display-cirrus_vga-divide-by-zero-in-cirrus_do_copy.patch CVE-2017-6505-qemut-usb-an-infinite-loop-issue-in-ohci_service_ed_list.patch CVE-2017-8309-qemut-audio-host-memory-leakage-via-capture-buffer.patch CVE-2017-9330-qemut-usb-ohci-infinite-loop-due-to-incorrect-return-value.patch blktap.patch cdrom-removable.patch xen-qemu-iscsi-fix.patch qemu-security-etch1.patch xen-disable-qemu-monitor.patch xen-hvm-default-bridge.patch qemu-ifup-set-mtu.patch ioemu-vnc-resize.patch capslock_enable.patch altgr_2.patch log-guest-console.patch bdrv_open2_fix_flags.patch bdrv_open2_flags_2.patch ioemu-7615-qcow2-fix-alloc_cluster_link_l2.patch qemu-dm-segfault.patch bdrv_default_rwflag.patch kernel-boot-hvm.patch ioemu-watchdog-support.patch ioemu-watchdog-linkage.patch ioemu-watchdog-ib700-timer.patch ioemu-hvm-pv-support.patch pvdrv_emulation_control.patch ioemu-disable-scsi.patch ioemu-disable-emulated-ide-if-pv.patch xenpaging.qemu.flush-cache.patch ioemu-devicemodel-include.patch - Cleanup spec file and remove unused KMP patches kmp_filelist supported_module.patch xen_pvonhvm.xen_emul_unplug.patch- bsc#1002573 - Optimize LVM functions in block-dmmd block-dmmd- Record initial Xen dmesg in /var/log/xen/xen-boot.log for supportconfig. Keep previous log in /var/log/xen/xen-boot.prev.log- Remove storytelling from description in xen.rpm- Update to Xen 4.9.0 FCS (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update block-dmmd script (bsc#1002573) block-dmmd- Update to Xen 4.9.0-rc8+ (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 gcc7-arm.patch - Drop gcc7-error-xenpmd.patch- Update to Xen 4.9.0-rc8 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1042160 - VUL-1: CVE-2017-9330: xen: usb: ohci: infinite loop due to incorrect return value CVE-2017-9330-qemut-usb-ohci-infinite-loop-due-to-incorrect-return-value.patch- bsc#1037243 - VUL-1: CVE-2017-8309: xen: audio: host memory leakage via capture buffer CVE-2017-8309-qemut-audio-host-memory-leakage-via-capture-buffer.patch- Update to Xen 4.9.0-rc7 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update to Xen 4.9.0-rc6 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1031343 - xen fails to build with GCC 7 gcc7-mini-os.patch gcc7-xen.patch- bsc#1031343 - xen fails to build with GCC 7 gcc7-error-xenpmd.patch- Update to Xen 4.9.0-rc5 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 - Drop xen-tools-pkgconfig-xenlight.patch- bsc#1037779 - xen breaks kexec-tools build xen-tools-pkgconfig-xenlight.patch- Update to Xen 4.9.0-rc4 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- bsc#1036146 - sles12sp2 xen VM dumps core to wrong path xen.spec- Update to Xen 4.9.0-rc3 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 aarch64-maybe-uninitialized.patch- Update to Xen 4.9.0-rc2 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2- Update to Xen 4.9.0-rc1 (fate#321394, fate#323108) xen-4.9.0-testing-src.tar.bz2 ioemu-devicemodel-include.patch - Dropped patches contained in new tarball xen-4.8.0-testing-src.tar.bz2 0001-xenstore-let-write_node-and-some-callers-return-errn.patch 0002-xenstore-undo-function-rename.patch 0003-xenstore-rework-of-transaction-handling.patch 584806ce-x86emul-correct-PUSHF-POPF.patch 584fc649-fix-determining-when-domain-creation-is-complete.patch 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch 58510cac-x86emul-MOVNTI-no-REP-prefixes.patch 58526ccc-x86emul-64bit-ignore-most-segment-bases-in-align-check.patch 5853ed37-VT-d-correct-dma_msi_set_affinity.patch 5853ee07-x86emul-CMPXCHG16B-aligned-operand.patch 58580060-x86-emul-correct-SYSCALL-eflags-handling.patch 585aa3c5-x86-force-EFLAGS-IF-on-upon-exit-to-PV.patch 585aa407-x86-HVM-NULL-check-before-using-VMFUNC-hook.patch 585bd5fe-x86-emul-correct-VMFUNC-return-value-handling.patch 586ba81c-x86-cpu-dont-update-this_cpu-for-guest-get_cpu_vendor.patch 587d04d6-x86-xstate-fix-array-overrun-with-LWP.patch 587de4a9-x86emul-VEX-B-ignored-in-compat-mode.patch 5882129d-x86emul-LOCK-check-adjustments.patch 58821300-x86-segment-attribute-handling.patch 58873c1f-x86emul-correct-FPU-stub-asm-constraints.patch 58873c80-x86-hvm-do-not-set-msr_tsc_adjust-on-.patch 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5887888f-credit2-never-consider-CPUs-outside-of-pool.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5888b1b3-x86-emulate-dont-assume-addr_size-32-implies-protmode.patch 5899cbd9-EPT-allow-wrcomb-MMIO-mappings-again.patch 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch 58a44771-IOMMU-always-call-teardown-callback.patch 58a48ccc-x86-fix-p2m_flush_table-for-non-nested.patch 58a59f4b-libxl-correct-xenstore-entry-for-empty-cdrom.patch 58a70d94-VMX-fix-VMCS-race-on-cswitch-paths.patch 58ac1f3f-VMX-dont-leak-host-syscall-MSRs.patch 58b5a2de-x86-correct-Xens-idea-of-its-memory-layout.patch 58b6fd42-credit2-always-mark-a-tickled-pCPU-as-tickled.patch 58b6fd42-credit2-dont-miss-accounting-during-credit-reset.patch 58cbf682-x86-EFI-avoid-overrunning-mb_modules.patch 58cf9200-x86-EFI-avoid-IOMMU-faults-on-tail-gap.patch 58cf9260-x86-EFI-avoid-Xen-when-looking-for-mod-kexec-pos.patch 58cf9277-x86-time-dont-use-vTSC-if-host-guest-freqs-match.patch 58d25ea2-xenstore-add-missing-checks-for-allocation-failure.patch 58d91365-sched-dont-call-wrong-hook-via-VCPU2OP.patch CVE-2017-2615-qemut-display-cirrus-oob-access-while-doing-bitblt-copy-backward-mode.patch CVE-2017-2620-xsa209-qemut-cirrus_bitblt_cputovideo-does-not-check-if-memory-region-safe.patch glibc-2.25-compatibility-fix.patch xs-09-add_change_node-params.patch xs-10-call-add_change_node.patch xs-11-tdb-record-header.patch xs-12-node-gen-count.patch xs-13-read-directory-part-support.patch xs-14-command-array.patch xs-15-command-return-val.patch xs-16-function-static.patch xs-17-arg-parsing.patch xs-18-default-buffer.patch xs-19-handle-alloc-failures.patch xs-20-tdb-version.patch xs-21-empty-tdb-database.patch xs-22-reopen_log-fix.patch xs-23-XS_DEBUG-rename.patch xs-24-xenstored_control.patch xs-25-control-enhance.patch xs-26-log-control.patch xs-27-memory-report.patch xs-28-remove-talloc-report.patch xs-29-define-off_t.patch xsa206-0001-xenstored-apply-a-write-transaction-rate-limit.patch xsa206-0002-xenstored-Log-when-the-write-transaction-rate-limit.patch- bsc#1022703 - Xen HVM guest with OVMF hangs with unattached CDRom 58a59f4b-libxl-correct-xenstore-entry-for-empty-cdrom.patch- bsc#1015348 - L3: libvirtd does not start during boot suse-xendomains-service.patch- bsc#1014136 - Partner-L3: kdump can't dump a kernel on SLES12-SP2 with Xen hypervisor. 58cf9260-x86-EFI-avoid-Xen-when-looking-for-mod-kexec-pos.patch - bsc#1026236 - L3: Paravirtualized vs. fully virtualized migration - latter one much faster 58cf9277-x86-time-dont-use-vTSC-if-host-guest-freqs-match.patch - Upstream patch from Jan 58cbf682-x86-EFI-avoid-overrunning-mb_modules.patch 58cf9200-x86-EFI-avoid-IOMMU-faults-on-tail-gap.patch 58d91365-sched-dont-call-wrong-hook-via-VCPU2OP.patch- bsc#1022555 - L3: Timeout in "execution of /etc/xen/scripts/block add" 58d25ea2-xenstore-add-missing-checks-for-allocation-failure.patch 0001-xenstore-let-write_node-and-some-callers-return-errn.patch 0002-xenstore-undo-function-rename.patch 0003-xenstore-rework-of-transaction-handling.patch - bsc#1030144 - VUL-0: xen: xenstore denial of service via repeated update (XSA-206) xsa206-0001-xenstored-apply-a-write-transaction-rate-limit.patch xsa206-0002-xenstored-Log-when-the-write-transaction-rate-limit.patch - bsc#1029827 - Forward port xenstored xs-09-add_change_node-params.patch xs-10-call-add_change_node.patch xs-11-tdb-record-header.patch xs-12-node-gen-count.patch xs-13-read-directory-part-support.patch xs-14-command-array.patch xs-15-command-return-val.patch xs-16-function-static.patch xs-17-arg-parsing.patch xs-18-default-buffer.patch xs-19-handle-alloc-failures.patch xs-20-tdb-version.patch xs-21-empty-tdb-database.patch xs-22-reopen_log-fix.patch xs-23-XS_DEBUG-rename.patch xs-24-xenstored_control.patch xs-25-control-enhance.patch xs-26-log-control.patch xs-27-memory-report.patch xs-28-remove-talloc-report.patch xs-29-define-off_t.patch- bsc#1029128 - fix make xen to really produce xen.efi with gcc48- bsc#1028235 - VUL-0: CVE-2017-6505: xen: qemu: usb: an infinite loop issue in ohci_service_ed_list CVE-2017-6505-qemut-usb-an-infinite-loop-issue-in-ohci_service_ed_list.patch - Upstream patches from Jan (bsc#1027519) 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5899cbd9-EPT-allow-wrcomb-MMIO-mappings-again.patch 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch 58a44771-IOMMU-always-call-teardown-callback.patch 58a48ccc-x86-fix-p2m_flush_table-for-non-nested.patch 58a70d94-VMX-fix-VMCS-race-on-cswitch-paths.patch 58ac1f3f-VMX-dont-leak-host-syscall-MSRs.patch 58b5a2de-x86-correct-Xens-idea-of-its-memory-layout.patch 58b6fd42-credit2-always-mark-a-tickled-pCPU-as-tickled.patch 58b6fd42-credit2-dont-miss-accounting-during-credit-reset.patch- bsc#1027654 - XEN fails to build against glibc 2.25 glibc-2.25-compatibility-fix.patch libxl.pvscsi.patch- fate#316613: Refresh and enable libxl.pvscsi.patch- bsc#1024834 - VUL-0: CVE-2017-2620: xen: cirrus_bitblt_cputovideo does not check if memory region is safe (XSA-209) CVE-2017-2620-xsa209-qemut-cirrus_bitblt_cputovideo-does-not-check-if-memory-region-safe.patch- bsc#1023948 - [pvusb][sles12sp3][openqa] Segmentation fault happened when adding usbctrl devices via xl 589b3272-libxl-dont-segfault-when-creating-domain-with-invalid-pvusb-device.patch- Upstream patches from Jan (bsc#1027519) 587d04d6-x86-xstate-fix-array-overrun-with-LWP.patch 587de4a9-x86emul-VEX-B-ignored-in-compat-mode.patch 5882129d-x86emul-LOCK-check-adjustments.patch 58821300-x86-segment-attribute-handling.patch 58873c1f-x86emul-correct-FPU-stub-asm-constraints.patch 58873c80-x86-hvm-do-not-set-msr_tsc_adjust-on-.patch 5887888f-credit2-use-the-correct-scratch-cpumask.patch 5887888f-credit2-never-consider-CPUs-outside-of-pool.patch 5887888f-credit2-fix-shutdown-suspend-with-cpupools.patch 5888b1b3-x86-emulate-dont-assume-addr_size-32-implies-protmode.patch- bsc#1023004 - VUL-0: CVE-2017-2615: qemu: display: cirrus: oob access while doing bitblt copy backward mode CVE-2017-2615-qemut-display-cirrus-oob-access-while-doing-bitblt-copy-backward-mode.patch- fate#322313 and fate#322150 require the acpica package ported to aarch64 which Xen 4.8 needs to build. Temporarily disable aarch64 until these fates are complete. xen.spec- bsc#1021952 - Virutalization/xen: Bug xen-tools missing /usr/bin/domu-xenstore; guests fail to launch tmp_build.patch xen.spec- No systemd presets for 42.3+ and SLE12SP3+ (bsc#1012842)- bsc#1007224 - broken symlinks in /usr/share/doc/packages/xen/misc/ xen.spec- 585aa3c5-x86-force-EFLAGS-IF-on-upon-exit-to-PV.patch Replaces xsa202.patch (bsc#1014298) - 585aa407-x86-HVM-NULL-check-before-using-VMFUNC-hook.patch Replaces xsa203.patch (bsc#1014300) - 58580060-x86-emul-correct-SYSCALL-eflags-handling.patch Replaces xsa204.patch (bsc#1016340) - Upstream patches from Jan 58526ccc-x86emul-64bit-ignore-most-segment-bases-in-align-check.patch 5853ed37-VT-d-correct-dma_msi_set_affinity.patch 5853ee07-x86emul-CMPXCHG16B-aligned-operand.patch 585bd5fe-x86-emul-correct-VMFUNC-return-value-handling.patch 586ba81c-x86-cpu-dont-update-this_cpu-for-guest-get_cpu_vendor.patch- bsc#1015169 - VUL-0: CVE-2016-9921, CVE-2016-9922: xen: qemu: display: cirrus_vga: a divide by zero in cirrus_do_copy CVE-2016-9921-qemut-display-cirrus_vga-divide-by-zero-in-cirrus_do_copy.patch- bsc#1016340 - VUL-0: CVE-2016-10013: xen: x86: Mishandling of SYSCALL singlestep during emulation (XSA-204) xsa204.patch- bsc#1012651 - VUL-0: CVE-2016-9932: xen: x86 CMPXCHG8B emulation fails to ignore operand size override (XSA-200) 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch- bsc#1014298 - VUL-0: CVE-2016-10024: xen: x86 PV guests may be able to mask interrupts (XSA-202) xsa202.patch - bsc#1014300 - VUL-0: CVE-2016-10025: xen: x86: missing NULL pointer check in VMFUNC emulation (XSA-203) xsa203.patch - Upstream patches from Jan 584806ce-x86emul-correct-PUSHF-POPF.patch 584fc649-fix-determining-when-domain-creation-is-complete.patch 58510c06-x86emul-CMPXCHGnB-ignore-prefixes.patch 58510cac-x86emul-MOVNTI-no-REP-prefixes.patch- Update to Xen 4.8 FCS xen-4.8.0-testing-src.tar.bz2 - Dropped xen-4.7.1-testing-src.tar.bz2 0001-libxc-Rework-extra-module-initialisation.patch 0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch 0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch 0004-firmware-makefile-install-BIOS-blob.patch 0005-libxl-Load-guest-BIOS-from-file.patch 0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch 0007-hvmloader-Grab-the-hvm_start_info-pointer.patch 0008-hvmloader-Locate-the-BIOS-blob.patch 0009-hvmloader-Check-modules-whereabouts-in-perform_tests.patch 0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch 0011-hvmloader-Load-OVMF-from-modules.patch 0012-hvmloader-Specific-bios_load-function-required.patch 0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch 0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch 57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch 576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 5769106e-x86-generate-assembler-equates-for-synthesized.patch 57a1e603-x86-time-adjust-local-system-time-initialization.patch 57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch 57a30261-x86-support-newer-Intel-CPU-models.patch 5810a9cc-x86-emul-Correct-decoding-of-SReg3-operands.patch 581b2c3b-x86-emul-reject-LGDT-LIDT-with-non-canonical-addresses.patch 581b647a-x86emul-L-S-G-I-DT-ignore-opsz-overrides-in-64-bit-mode.patch 58249392-x86-svm-dont-clobber-eax-edx-if-RDMSR-intercept-fails.patch 582c35d6-x86-vmx-correct-long-mode-check-in-vmx_cpuid_intercept.patch 582c35ee-x86-traps-dont-call-hvm_hypervisor_cpuid_leaf-for-PV.patch 58343dc2-x86-hvm-Fix-the-handling-of-non-present-segments.patch 58343df8-x86-HVM-dont-load-LDTR-with-VM86-mode-attrs-during-task-switch.patch 58343e24-x86-PV-writes-of-fs-and-gs-base-MSRs-require-canonical-addresses.patch 58343e9e-libelf-fix-stack-memory-leak-when-loading-32-bit-symbol-tables.patch 58343ec2-x86emul-fix-huge-bit-offset-handling.patch 58343f29-x86-emul-correct-the-IDT-entry-calculation-in-inject_swint.patch 58343f44-x86-svm-fix-injection-of-software-interrupts.patch 58343f79-pygrub-Properly-quote-results-when-returning-them-to-the-caller.patch CVE-2016-9381-xsa197-qemut.patch CVE-2016-9637-xsa199-qemut.patch- bsc#1011652 - VUL-0: xen: qemu ioport array overflow CVE-2016-9637-xsa199-qemut.patch- bsc#1009100 - VUL-0: CVE-2016-9386: XSA-191: xen: x86 null segments not always treated as unusable 58343dc2-x86-hvm-Fix-the-handling-of-non-present-segments.patch - bsc#1009103 - VUL-0: CVE-2016-9382: XSA-192: xen: x86 task switch to VM86 mode mis-handled 58343df8-x86-HVM-dont-load-LDTR-with-VM86-mode-attrs-during-task-switch.patch - bsc#1009104 - VUL-0: CVE-2016-9385: XSA-193: xen: x86 segment base write emulation lacking canonical address checks 58343e24-x86-PV-writes-of-fs-and-gs-base-MSRs-require-canonical-addresses.patch - bsc#1009105 - VUL-0: CVE-2016-9384: XSA-194: xen: guest 32-bit ELF symbol table load leaking host data 58343e9e-libelf-fix-stack-memory-leak-when-loading-32-bit-symbol-tables.patch - bsc#1009107 - VUL-0: CVE-2016-9383: XSA-195: xen: x86 64-bit bit test instruction emulation broken 58343ec2-x86emul-fix-huge-bit-offset-handling.patch - bsc#1009108 - VUL-0: CVE-2016-9377,CVE-2016-9378: XSA-196: xen: x86 software interrupt injection mis-handled 58343f29-x86-emul-correct-the-IDT-entry-calculation-in-inject_swint.patch 58343f44-x86-svm-fix-injection-of-software-interrupts.patch - bsc#1009109 - VUL-0: CVE-2016-9381: XSA-197: xen: qemu incautious about shared ring processing CVE-2016-9381-xsa197-qemut.patch - bsc#1009111 - VUL-0: CVE-2016-9379,CVE-2016-9380: XSA-198: xen: delimiter injection vulnerabilities in pygrub 58343f79-pygrub-Properly-quote-results-when-returning-them-to-the-caller.patch - Upstream patches from Jan 581b2c3b-x86-emul-reject-LGDT-LIDT-with-non-canonical-addresses.patch 581b647a-x86emul-L-S-G-I-DT-ignore-opsz-overrides-in-64-bit-mode.patch 58249392-x86-svm-dont-clobber-eax-edx-if-RDMSR-intercept-fails.patch 582c35d6-x86-vmx-correct-long-mode-check-in-vmx_cpuid_intercept.patch 582c35ee-x86-traps-dont-call-hvm_hypervisor_cpuid_leaf-for-PV.patch- Update to Xen Version 4.7.1 xen-4.7.1-testing-src.tar.bz2 - Dropped patches contained in new tarball xen-4.7.0-testing-src.tar.bz2 575e9ca0-nested-vmx-Validate-host-VMX-MSRs-before-accessing-them.patch 57640448-xen-sched-use-default-scheduler-upon-an-invalid-sched.patch 57973099-have-schedulers-revise-initial-placement.patch 579730e6-remove-buggy-initial-placement-algorithm.patch 57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch 57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch 57ac6316-don-t-restrict-DMA-heap-to-node-0.patch 57b71fc5-x86-EFI-don-t-apply-relocations-to-l-2-3-_bootmap.patch 57b7447b-dont-permit-guest-to-populate-PoD-pages-for-itself.patch 57c4412b-x86-HVM-add-guarding-logic-for-VMX-specific-code.patch 57c57f73-libxc-correct-max_pfn-calculation-for-saving-domain.patch 57c805bf-x86-levelling-restrict-non-architectural-OSXSAVE-handling.patch 57c805c1-x86-levelling-pass-vcpu-to-ctxt_switch_levelling.patch 57c805c3-x86-levelling-provide-architectural-OSXSAVE-handling.patch 57c82be2-x86-32on64-adjust-call-gate-emulation.patch 57c93e52-fix-error-in-libxl_device_usbdev_list.patch 57c96df3-credit1-fix-a-race-when-picking-initial-pCPU.patch 57c96e2c-x86-correct-PT_NOTE-file-position.patch 57cfed43-VMX-correct-feature-checks-for-MPX-and-XSAVES.patch 57d1563d-x86-32on64-don-t-allow-recursive-page-tables-from-L3.patch 57d15679-x86-emulate-Correct-boundary-interactions-of-emulated-insns.patch 57d1569a-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch 57d18642-hvm-fep-Allow-test-insns-crossing-1-0-boundary.patch 57d18642-x86-segment-Bounds-check-accesses-to-emulation-ctxt-seg_reg.patch 57d7ca5f-x86-domctl-fix-TOCTOU-race-in-XEN_DOMCTL_getvcpuextstate.patch 57d7ca64-x86-domctl-fix-migration-of-guests-not-using-xsave.patch 57da8883-credit1-fix-mask-to-be-used-for-tickling.patch 57da8883-credit2-properly-schedule-migration-of-running-vcpu.patch 57dfb1c5-x86-Intel-hide-CPUID-faulting-capability-from-guests.patch 57e93e1d-x86emul-correct-loading-of-ss.patch 57e93e4a-x86emul-don-t-allow-null-selector-for-LTR.patch 57e93e89-x86-AMD-apply-erratum-665-workaround.patch 57ee6cbc-credit1-return-time-remaining-to-limit-as-next-timeslice.patch 57f3a8ee-x86emul-honor-guest-CR0-TS-and-CR0-EM.patch 57fb6a91-x86-defer-not-present-segment-checks.patch 5800c51d-x86-hvm-Clobber-cs-L-when-LME-becomes-set.patch 5800caec-x86emul-fix-pushing-of-selector-registers.patch 5800cb06-x86-Viridian-don-t-depend-on-undefined-register-state.patch 580e29f9-x86-MISALIGNSSE-feature-depends-on-SSE.patch 57dfb2ff-x86-Intel-Broadwell-no-PKG_C8-10_RESIDENCY-MSRs.patch- bsc#1004981 - Xen RPM doesn't contain debug hypervisor for EFI systems xen.spec- bsc#1000106 - VUL-0: CVE-2016-7777: xen: CR0.TS and CR0.EM not always honored for x86 HVM guests (XSA-190) 57f3a8ee-x86emul-honor-guest-CR0-TS-and-CR0-EM.patch - bsc#996191 - [XEN][acpi]residency -n 88 -c will cause xen panic on broadwell-ep 57dfb2ff-x86-Intel-Broadwell-no-PKG_C8-10_RESIDENCY-MSRs.patch - Upstream patches from Jan 57d7ca5f-x86-domctl-fix-TOCTOU-race-in-XEN_DOMCTL_getvcpuextstate.patch 57d7ca64-x86-domctl-fix-migration-of-guests-not-using-xsave.patch 57da8883-credit1-fix-mask-to-be-used-for-tickling.patch 57da8883-credit2-properly-schedule-migration-of-running-vcpu.patch 57dfb1c5-x86-Intel-hide-CPUID-faulting-capability-from-guests.patch 57e93e1d-x86emul-correct-loading-of-ss.patch 57e93e4a-x86emul-don-t-allow-null-selector-for-LTR.patch 57e93e89-x86-AMD-apply-erratum-665-workaround.patch 57ee6cbc-credit1-return-time-remaining-to-limit-as-next-timeslice.patch 57fb6a91-x86-defer-not-present-segment-checks.patch 5800c51d-x86-hvm-Clobber-cs-L-when-LME-becomes-set.patch 5800caec-x86emul-fix-pushing-of-selector-registers.patch 5800cb06-x86-Viridian-don-t-depend-on-undefined-register-state.patch 580e29f9-x86-MISALIGNSSE-feature-depends-on-SSE.patch 5810a9cc-x86-emul-Correct-decoding-of-SReg3-operands.patch- bsc#1007941 - Xen tools limit the number of vcpus to 256 when the system has 384 xen-arch-kconfig-nr_cpus.patch- bsc#1007157 - VUL-0: CVE-2016-8910: xen: net: rtl8139: infinite loop while transmit in C+ mode CVE-2016-8910-qemut-net-rtl8139-infinite-loop-while-transmit-in-Cplus-mode.patch- bsc#1005004 - CVE-2016-8667: xen: dma: rc4030 divide by zero error in set_next_tick CVE-2016-8667-qemut-dma-rc4030-divide-by-zero-error-in-set_next_tick.patch - bsc#1005005 - VUL-0: CVE-2016-8669: xen: char: divide by zero error in serial_update_parameters CVE-2016-8669-qemut-char-divide-by-zero-error-in-serial_update_parameters.patch- bsc#1003030 - VUL-0: CVE-2016-7908: xen: net: Infinite loop in mcf_fec_do_tx CVE-2016-7908-qemut-net-Infinite-loop-in-mcf_fec_do_tx.patch - bsc#1003032 - VUL-0: CVE-2016-7909: xen: net: pcnet: infinite loop in pcnet_rdra_addr CVE-2016-7909-qemut-net-pcnet-infinite-loop-in-pcnet_rdra_addr.patch- bsc#995785 - VUL-0: CVE-2016-7092: xen: x86: Disallow L3 recursive pagetable for 32-bit PV guests (XSA-185) 57d1563d-x86-32on64-don-t-allow-recursive-page-tables-from-L3.patch - bsc#995789 - VUL-0: CVE-2016-7093: xen: x86: Mishandling of instruction pointer truncation during emulation (XSA-186) 57d15679-x86-emulate-Correct-boundary-interactions-of-emulated-insns.patch 57d18642-hvm-fep-Allow-test-insns-crossing-1-0-boundary.patch - bsc#995792 - VUL-0: CVE-2016-7094: xen: x86 HVM: Overflow of sh_ctxt->seg_reg[] (XSA-187) 57d1569a-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch 57d18642-x86-segment-Bounds-check-accesses-to-emulation-ctxt-seg_reg.patch - bsc#991934 - xen hypervisor crash in csched_acct 57c96df3-credit1-fix-a-race-when-picking-initial-pCPU.patch - Upstream patches from Jan 57c4412b-x86-HVM-add-guarding-logic-for-VMX-specific-code.patch 57c57f73-libxc-correct-max_pfn-calculation-for-saving-domain.patch 57c805bf-x86-levelling-restrict-non-architectural-OSXSAVE-handling.patch 57c805c1-x86-levelling-pass-vcpu-to-ctxt_switch_levelling.patch 57c805c3-x86-levelling-provide-architectural-OSXSAVE-handling.patch 57c82be2-x86-32on64-adjust-call-gate-emulation.patch 57c96e2c-x86-correct-PT_NOTE-file-position.patch 57cfed43-VMX-correct-feature-checks-for-MPX-and-XSAVES.patch- bsc#979002 - add 60-persistent-xvd.rules and helper script also to initrd, add the relevant dracut helper- bnc#953518 - unplug also SCSI disks in qemu-xen-traditional for upstream unplug protocol- bsc#989679 - [pvusb feature] USB device not found when 'virsh detach-device guest usb.xml' 57c93e52-fix-error-in-libxl_device_usbdev_list.patch- bsc#992224 - [HPS Bug] During boot of Xen Hypervisor, Failed to get contiguous memory for DMA from Xen 57ac6316-don-t-restrict-DMA-heap-to-node-0.patch - bsc#978755 - xen uefi systems fail to boot - bsc#983697 - SLES12 SP2 Xen UEFI mode cannot boot 57b71fc5-x86-EFI-don-t-apply-relocations-to-l-2-3-_bootmap.patch - Upstream patch from Jan 57b7447b-dont-permit-guest-to-populate-PoD-pages-for-itself.patch- spec: to stay compatible with the in-tree qemu-xen binary, use /usr/bin/qemu-system-i386 instead of /usr/bin/qemu-system-x86_64 bsc#986164- bsc#970135 - new virtualization project clock test randomly fails on Xen 576001df-x86-time-use-local-stamp-in-TSC-calibration-fast-path.patch 5769106e-x86-generate-assembler-equates-for-synthesized.patch 57a1e603-x86-time-adjust-local-system-time-initialization.patch 57a1e64c-x86-time-introduce-and-use-rdtsc_ordered.patch 57a2f6ac-x86-time-calibrate-TSC-against-platform-timer.patch - bsc#991934 - xen hypervisor crash in csched_acct 57973099-have-schedulers-revise-initial-placement.patch 579730e6-remove-buggy-initial-placement-algorithm.patch - bsc#988675 - VUL-0: CVE-2016-6258: xen: x86: Privilege escalation in PV guests (XSA-182) 57976073-x86-remove-unsafe-bits-from-mod_lN_entry-fastpath.patch - bsc#988676 - VUL-0: CVE-2016-6259: xen: x86: Missing SMAP whitelisting in 32-bit exception / event delivery (XSA-183) 57976078-x86-avoid-SMAP-violation-in-compat_create_bounce_frame.patch - Upstream patches from Jan 57a30261-x86-support-newer-Intel-CPU-models.patch- bsc#985503 - vif-route broken vif-route.patch- bsc#978413 - PV guest upgrade from sles11sp4 to sles12sp2 alpha3 failed on sles11sp4 xen host. pygrub-handle-one-line-menu-entries.patch- bsc#990843 - VUL-1: CVE-2016-6351: xen: qemu: scsi: esp: OOB write access in esp_do_dma CVE-2016-6351-qemut-scsi-esp-make-cmdbuf-big-enough-for-maximum-CDB-size.patch- bsc#900418 - Dump cannot be performed on SLES12 XEN 57580bbd-kexec-allow-relaxed-placement-via-cmdline.patch - Upstream patches from Jan 575e9ca0-nested-vmx-Validate-host-VMX-MSRs-before-accessing-them.patch 57640448-xen-sched-use-default-scheduler-upon-an-invalid-sched.patch- fate#319989 - Update to Xen 4.7 FCS xen-4.7.0-testing-src.tar.bz2 - Drop CVE-2014-3672-qemut-xsa180.patch- bsc#954872 - script block-dmmd not working as expected - libxl: error: libxl_dm.c (Additional fixes) block-dmmd- Convert with_stubdom into build_conditional to allow adjusting via prjconf - Convert with_debug into build_conditional to allow adjusting via prjconf- bsc#979002 - add 60-persistent-xvd.rules and helper script to xen-tools-domU to simplify transition to pvops based kernels- Convert with_oxenstored into build_conditional to allow adjusting via prjconf (fate#320836)- bsc#983984 - VUL-0: CVE-2016-5338: xen: qemu: scsi: esp: OOB r/w access while processing ESP_FIFO CVE-2016-5338-qemut-scsi-esp-OOB-rw-access-while-processing-ESP_FIFO.patch - bsc#982960 - VUL-0: CVE-2016-5238: xen: qemu: scsi: esp: OOB write when using non-DMA mode in get_cmd CVE-2016-5238-qemut-scsi-esp-OOB-write-when-using-non-DMA-mode-in-get_cmd.patch- fate#319989 - Update to Xen 4.7 RC5 xen-4.7.0-testing-src.tar.bz2- fate#319989 - Update to Xen 4.7 RC4 xen-4.7.0-testing-src.tar.bz2 - Dropped xen.pkgconfig-4.7.patch xsa164.patch- bsc#981264 - VUL-0: CVE-2014-3672: xen: Unrestricted qemu logging (XSA-180) CVE-2014-3672-qemut-xsa180.patch- bsc#980724 - VUL-0: CVE-2016-4441: Qemu: scsi: esp: OOB write while writing to 's->cmdbuf' in get_cmd CVE-2016-4441-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-get_cmd.patch - bsc#980716 - VUL-0: CVE-2016-4439: xen: scsi: esp: OOB write while writing to 's->cmdbuf' in esp_reg_write CVE-2016-4439-qemut-scsi-esp-OOB-write-while-writing-to-cmdbuf-in-esp_reg_write.patch- fate#319989 - Update to Xen 4.7 RC3 xen-4.7.0-testing-src.tar.bz2 - Dropped libxl-remove-cdrom-cachemode.patch x86-PoD-only-reclaim-if-needed.patch gcc6-warnings-as-errors.patch- bsc#954872 - script block-dmmd not working as expected - libxl: error: libxl_dm.c (another modification) block-dmmd- fate#319989 - Update to Xen 4.7 RC2 xen-4.7.0-testing-src.tar.bz2- bsc#961600 - L3: poor performance when Xen HVM domU configured with max memory > current memory x86-PoD-only-reclaim-if-needed.patch- Mark SONAMEs and pkgconfig as xen 4.7 xen.pkgconfig-4.7.patch- bsc#977329 - Xen: Cannot boot HVM guests with empty cdrom libxl-remove-cdrom-cachemode.patch- fate#319989 - Update to Xen 4.7 RC1 xen-4.7.0-testing-src.tar.bz2- fate#316614: set migration constraints from cmdline restore libxl.set-migration-constraints-from-cmdline.patch- Remove obsolete patch for xen-kmp magic_ioport_compat.patch- fate#316613: update to v12 libxl.pvscsi.patch- Update to the latest Xen 4.7 pre-release c2994f86 Drop libxl.migrate-legacy-stream-read.patch- bnc#972756 - Can't migrate HVM guest from SLES12SP1 Xen host to SLES12SP2 Alpha 1 host using xl migrate libxl.migrate-legacy-stream-read.patch- Add patches from proposed upstream series to load BIOS's from the toolstack instead of embedding in hvmloader http://lists.xenproject.org/archives/html/xen-devel/2016-03/msg01626.html 0001-libxc-Rework-extra-module-initialisation.patch, 0002-libxc-Prepare-a-start-info-structure-for-hvmloader.patch, 0003-configure-define-SEABIOS_PATH-and-OVMF_PATH.patch, 0004-firmware-makefile-install-BIOS-blob.patch, 0005-libxl-Load-guest-BIOS-from-file.patch, 0006-xen-Move-the-hvm_start_info-C-representation-from-li.patch, 0007-hvmloader-Grab-the-hvm_start_info-pointer.patch, 0008-hvmloader-Locate-the-BIOS-blob.patch, 0009-hvmloader-Check-modules-whereabouts-in-perform_tests.patch, 0010-hvmloader-Load-SeaBIOS-from-hvm_start_info-modules.patch, 0011-hvmloader-Load-OVMF-from-modules.patch, 0012-hvmloader-Specific-bios_load-function-required.patch, 0013-hvmloader-Always-build-in-SeaBIOS-and-OVMF-loader.patch, 0014-configure-do-not-depend-on-SEABIOS_PATH-or-OVMF_PATH.patch - Enable support for UEFI on x86_64 using the ovmf-x86_64-ms.bin firmware from qemu-ovmf-x86_64. The firmware is preloaded with Microsoft keys to more closely resemble firmware on real hardware FATE#320490- fate#319989: Update to Xen 4.7 (pre-release) xen-4.7.0-testing-src.tar.bz2 - Dropped: xen-4.6.1-testing-src.tar.bz2 55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch 5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch hotplug-Linux-block-performance-fix.patch set-mtu-from-bridge-for-tap-interface.patch xendomains-libvirtd-conflict.patch xsa154.patch xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa170.patch- Use system SeaBIOS instead of building/installing another one FATE#320638 Dropped files: seabios-dir-remote.tar.bz2 xen-c99-fix.patch xen.build-compare.seabios.patch- spec: drop BuildRequires that were only needed for qemu-xen- bsc#969377 - xen does not build with GCC 6 ipxe-use-rpm-opt-flags.patch gcc6-warnings-as-errors.patch- bsc#969351 - VUL-0: CVE-2016-2841: xen: net: ne2000: infinite loop in ne2000_receive CVE-2016-2841-qemut-ne2000-infinite-loop-in-ne2000_receive.patch - Drop xsa154-fix.patch- Use system qemu instead of building/installing yet another qemu FATE#320638 - Dropped files qemu-xen-dir-remote.tar.bz2 CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch CVE-2015-4037-qemuu-smb-config-dir-name.patch CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch qemu-xen-enable-spice-support.patch qemu-xen-upstream-qdisk-cache-unsafe.patch tigervnc-long-press.patch xsa162-qemuu.patch- bsc#962321 - VUL-0: CVE-2016-1922: xen: i386: null pointer dereference in vapic_write() CVE-2016-1922-qemuu-i386-null-pointer-dereference-in-vapic_write.patch- bsc#968004 - VUL-0: CVE-2016-2538: xen: usb: integer overflow in remote NDIS control message handling CVE-2016-2538-qemuu-usb-integer-overflow-in-remote-NDIS-message-handling.patch- bsc#954872 - L3: script block-dmmd not working as expected - libxl: error: libxl_dm.c block-dmmd - Update libxl to recognize dmmd and npiv prefix in disk spec xen.libxl.dmmd.patch- bsc#967101 - VUL-0: CVE-2016-2391: xen: usb: multiple eof_timers in ohci module leads to null pointer dereference CVE-2016-2391-qemuu-usb-null-pointer-dereference-in-ohci-module.patch CVE-2016-2391-qemut-usb-null-pointer-dereference-in-ohci-module.patch - bsc#967090 - VUL-0: CVE-2016-2392: xen: usb: null pointer dereference in remote NDIS control message handling CVE-2016-2392-qemuu-usb-null-pointer-dereference-in-NDIS-message-handling.patch- Update to Xen Version 4.6.1 xen-4.6.1-testing-src.tar.bz2 - Dropped patches now contained in tarball or unnecessary xen-4.6.0-testing-src.tar.bz2 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 5632129c-free-domain-s-vcpu-array.patch 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 563212e4-xenoprof-free-domain-s-vcpu-array.patch 563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch 56549f24-x86-vPMU-document-as-unsupported.patch 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch xsa155-qemut-qdisk-double-access.patch xsa155-qemut-xenfb.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa159.patch xsa160.patch xsa162-qemut.patch xsa165.patch xsa166.patch xsa167.patch xsa168.patch- bsc#965315 - VUL-0: CVE-2016-2270: xen: x86: inconsistent cachability flags on guest mappings (XSA-154) xsa154.patch - bsc#965317 - VUL-0: CVE-2016-2271: xen: VMX: guest user mode may crash guest with non-canonical RIP (XSA-170) xsa170.patch- bsc#965269 - VUL-1: CVE-2015-8619: xen: stack based OOB write in hmp_sendkey routine CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch- bsc#965156 - VUL-0: CVE-2015-6855: xen: ide: divide by zero issue CVE-2015-6855-qemuu-ide-divide-by-zero-issue.patch - bsc#965112 - VUL-0: CVE-2014-3640: xen: slirp: NULL pointer deref in sosendto() CVE-2014-3640-qemut-slirp-NULL-pointer-deref-in-sosendto.patch- bsc#964947 - VUL-0: CVE-2015-5278: xen: Infinite loop in ne2000_receive() function CVE-2015-5278-qemut-Infinite-loop-in-ne2000_receive-function.patch - bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch- bsc#964644 - VUL-0: CVE-2013-4533: xen pxa2xx: buffer overrun on incoming migration CVE-2013-4533-qemut-pxa2xx-buffer-overrun-on-incoming-migration.patch - bsc#964925 - VUL-0: CVE-2014-0222: xen: qcow1: validate L2 table size to avoid integer overflows CVE-2014-0222-blktap-qcow1-validate-l2-table-size.patch - Dropped CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch- bsc#964415 - VUL-1: CVE-2016-2198: xen: usb: ehci null pointer dereference in ehci_caps_write CVE-2016-2198-qemuu-usb-ehci-null-pointer-dereference-in-ehci_caps_write.patch - bsc#964452 - VUL-0: CVE-2013-4534: xen: openpic: buffer overrun on incoming migration CVE-2013-4534-qemut-openpic-buffer-overrun-on-incoming-migration.patch- bsc#963783 - VUL-1: CVE-2016-1981: xen: net: e1000 infinite loop in start_xmit and e1000_receive_iov routines CVE-2016-1981-qemuu-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch CVE-2016-1981-qemut-e1000-eliminate-infinite-loops-on-out-of-bounds-transfer.patch- bsc#962758 - VUL-0: CVE-2013-4539: xen: tsc210x: buffer overrun on invalid state load CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch- bsc#962632 - VUL-0: CVE-2015-1779: xen: vnc: insufficient resource limiting in VNC websockets decoder CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch - bsc#962642 - VUL-0: CVE-2013-4537: xen: ssi-sd: buffer overrun on invalid state load CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch - bsc#962627 - VUL-0: CVE-2014-7815: xen: vnc: insufficient bits_per_pixel from the client sanitization CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch- bsc#962335 - VUL-0: CVE-2013-4538: xen: ssd0323: fix buffer overun on invalid state CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch - bsc#962360 - VUL-0: CVE-2015-7512: xen: net: pcnet: buffer overflow in non-loopback mode CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch- bsc#961692 - VUL-0: CVE-2016-1714: xen: nvram: OOB r/w access in processing firmware configurations CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch- bsc#961358 - VUL-0: CVE-2015-8613: xen: qemu: scsi: stack based buffer overflow in megasas_ctrl_get_info CVE-2015-8613-qemuu-scsi-initialise-info-object-with-appropriate-size.patch - bsc#961332 - VUL-0: CVE-2016-1568: xen: Qemu: ide: ahci use-after-free vulnerability in aio port commands CVE-2016-1568-qemuu-ide-ahci-reset-ncq-object-to-unused-on-error.patch- bsc#959695 - missing docs for xen xen.spec- bsc#960862 - VUL-0: CVE-2016-1571: xen: VMX: intercept issue with INVLPG on non-canonical address (XSA-168) xsa168.patch - bsc#960861 - VUL-0: CVE-2016-1570: xen: PV superpage functionality missing sanity checks (XSA-167) xsa167.patch - bsc#960836 - VUL-0: CVE-2015-8744: xen: net: vmxnet3: incorrect l2 header validation leads to a crash via assert(2) call CVE-2015-8744-qemuu-net-vmxnet3-incorrect-l2-header-validation-leads-to-crash.patch- bsc#960707 - VUL-0: CVE-2015-8745: xen: reading IMR registers leads to a crash via assert(2) call CVE-2015-8745-qemuu-net-vmxnet3-read-IMR-registers-instead-of-assert.patch - bsc#960726 - VUL-0: CVE-2015-8743: xen: ne2000: OOB memory access in ioport r/w functions CVE-2015-8743-qemuu-ne2000-OOB-memory-access-in-ioport-rw-functions.patch- bsc#960093 - VUL-0: CVE-2015-8615: xen: x86: unintentional logging upon guest changing callback method (XSA-169) 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch- Adjust xen-dom0-modules.service to run Before xenstored.service instead of proc-xen.mount to workaround a bug in systemd "design" (bnc#959845)- bsc#959387 - VUL-0: CVE-2015-8568 CVE-2015-8567: xen: qemu: net: vmxnet3: host memory leakage CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch- bsc#957988 - VUL-0: CVE-2015-8550: xen: paravirtualized drivers incautious about shared memory contents (XSA-155) xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemut-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa155-qemut-xenfb.patch - bsc#959006 - VUL-0: CVE-2015-8558: xen: qemu: usb: infinite loop in ehci_advance_state results in DoS CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch - bsc#958918 - VUL-0: CVE-2015-7549: xen: qemu pci: null pointer dereference issue CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch - bsc#958493 - VUL-0: CVE-2015-8504: xen: qemu: ui: vnc: avoid floating point exception CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch - bsc#958007 - VUL-0: CVE-2015-8554: xen: qemu-dm buffer overrun in MSI-X handling (XSA-164) xsa164.patch - bsc#958009 - VUL-0: CVE-2015-8555: xen: information leak in legacy x86 FPU/XMM initialization (XSA-165) xsa165.patch - bsc#958523 - VUL-0: xen: ioreq handling possibly susceptible to multiple read issue (XSA-166) xsa166.patch- bsc#956832 - VUL-0: CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list CVE-2015-8345-qemuu-eepro100-infinite-loop-fix.patch CVE-2015-8345-qemut-eepro100-infinite-loop-fix.patch - Upstream patches from Jan 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch) 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch 56544a57-VMX-fix-adjust-trap-injection.patch 56546ab2-sched-fix-insert_vcpu-locking.patch- bsc#956592 - VUL-0: xen: virtual PMU is unsupported (XSA-163) 56549f24-x86-vPMU-document-as-unsupported.patch - bsc#956408 - VUL-0: CVE-2015-8339, CVE-2015-8340: xen: XENMEM_exchange error handling issues (XSA-159) xsa159.patch - bsc#956409 - VUL-0: CVE-2015-8341: xen: libxl leak of pv kernel and initrd on error (XSA-160) xsa160.patch - bsc#956411 - VUL-0: CVE-2015-7504: xen: heap buffer overflow vulnerability in pcnet emulator (XSA-162) xsa162-qemuu.patch xsa162-qemut.patch - bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142) 5628fc67-libxl-No-emulated-disk-driver-for-xvdX-disk.patch 5649bcbe-libxl-relax-readonly-check-introduced-by-XSA-142-fix.patch- fate#315712: XEN: Use the PVOPS kernel Turn off building the KMPs now that we are using the pvops kernel xen.spec- Upstream patches from Jan 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 5632129c-free-domain-s-vcpu-array.patch (Replaces CVE-2015-7969-xsa149.patch) 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 563212e4-xenoprof-free-domain-s-vcpu-array.patch 563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch (Replaces CVE-2015-5307-xsa156.patch) 5644b756-x86-HVM-don-t-inject-DB-with-error-code.patch - Dropped 55b0a2db-x86-MSI-track-guest-masking.patch- Use upstream variants of block-iscsi and block-nbd- Remove xenalyze.hg, its part of xen-4.6- Update to Xen Version 4.6.0 xen-4.6.0-testing-src.tar.bz2 mini-os.tar.bz2 blktap2-no-uninit.patch stubdom-have-iovec.patch - Renamed xsa149.patch to CVE-2015-7969-xsa149.patch - Dropped patches now contained in tarball or unnecessary xen-4.5.2-testing-src.tar.bz2 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch 54f4985f-libxl-fix-libvirtd-double-free.patch 55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 551ac326-xentop-add-support-for-qdisk.patch 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch 5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 554cc211-libxl-add-qxl.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch 5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch 5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch 5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch 5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch 5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch 5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch 55b0a218-x86-PCI-CFG-write-intercept.patch 55b0a255-x86-MSI-X-maskall.patch 55b0a283-x86-MSI-X-teardown.patch 55b0a2ab-x86-MSI-X-enable.patch blktapctrl-close-fifos.patch blktapctrl-default-to-ioemu.patch blktapctrl-disable-debug-printf.patch blktap-no-uninit.patch blktap-pv-cdrom.patch build-tapdisk-ioemu.patch ioemu-bdrv-open-CACHE_WB.patch ioemu-blktap-barriers.patch ioemu-blktap-fv-init.patch ioemu-blktap-image-format.patch ioemu-blktap-zero-size.patch libxl.set-migration-constraints-from-cmdline.patch local_attach_support_for_phy.patch pci-attach-fix.patch qemu-xen-upstream-megasas-buildtime.patch tapdisk-ioemu-logfile.patch tapdisk-ioemu-shutdown-fix.patch udev-rules.patch xen.build-compare.ipxe.patch xen.build-compare.mini-os.patch xen.build-compare.smbiosdate.patch xen.build-compare.vgabios.patch xen.build-compare.xen_compile_h.patch xl-coredump-file-location.patch- bsc#954405 - VUL-0: CVE-2015-8104: Xen: guest to host DoS by triggering an infinite loop in microcode via #DB exception - bsc#954018 - VUL-0: CVE-2015-5307: xen: x86: CPU lockup during fault delivery (XSA-156) CVE-2015-5307-xsa156.patch- Update to Xen 4.5.2 xen-4.5.2-testing-src.tar.bz2 - Drop the following xen-4.5.1-testing-src.tar.bz2 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 559bdde5-pull-in-latest-linux-earlycpio.patch 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch 560bd926-credit1-fix-tickling-when-it-happens-from-a-remote-pCPU.patch 560e6d34-x86-p2m-pt-tighten-conditions-of-IOMMU-mapping-updates.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch CVE-2015-4106-xsa131-9.patch CVE-2015-3259-xsa137.patch CVE-2015-7311-xsa142.patch CVE-2015-7835-xsa148.patch xsa139-qemuu.patch xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch xsa151.patch xsa152.patch xsa153-libxl.patch CVE-2015-5154-qemuu-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemuu-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch"- bsc#950704 - CVE-2015-7970 VUL-1: xen: x86: Long latency populate-on-demand operation is not preemptible (XSA-150) 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch- Upstream patches from Jan 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-0.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-handling.patch- bsc#951845 - VUL-0: CVE-2015-7972: xen: x86: populate-on-demand balloon size inaccuracy can crash guests (XSA-153) xsa153-libxl.patch- bsc#950703 - VUL-1: CVE-2015-7969: xen: leak of main per-domain vcpu pointer array (DoS) (XSA-149) xsa149.patch - bsc#950705 - VUL-1: CVE-2015-7969: xen: x86: leak of per-domain profiling-related vcpu pointer array (DoS) (XSA-151) xsa151.patch - bsc#950706 - VUL-0: CVE-2015-7971: xen: x86: some pmu and profiling hypercalls log without rate limiting (XSA-152) xsa152.patch - Dropped 55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch 5604f239-x86-PV-properly-populate-descriptor-tables.patch- bsc#932267 - VUL-1: CVE-2015-4037: qemu,kvm,xen: insecure temporary file use in /net/slirp.c CVE-2015-4037-qemuu-smb-config-dir-name.patch CVE-2015-4037-qemut-smb-config-dir-name.patch - bsc#877642 - VUL-0: CVE-2014-0222: qemu: qcow1: validate L2 table size to avoid integer overflows CVE-2014-0222-qemuu-qcow1-validate-l2-table-size.patch CVE-2014-0222-qemut-qcow1-validate-l2-table-size.patch- bsc#950367 - VUL-0: CVE-2015-7835: xen: x86: Uncontrolled creation of large page mappings by PV guests (XSA-148) CVE-2015-7835-xsa148.patch- bsc#949138 - Setting vcpu affinity under Xen causes libvirtd abort 54f4985f-libxl-fix-libvirtd-double-free.patch- bsc#949046 - Increase %suse_version in SP1 to 1316 xen.spec - Update README.SUSE detailing dom0 ballooning recommendations- bsc#945167 - Running command ’ xl pci-assignable-add 03:10.1’ secondly show errors 55f7f9d2-libxl-slightly-refine-pci-assignable-add-remove-handling.patch - Upstream patches from Jan 55f2e438-x86-hvm-fix-saved-pmtimer-and-hpet-values.patch 55f9345b-x86-MSI-fail-if-no-hardware-support.patch 5604f239-x86-PV-properly-populate-descriptor-tables.patch 5604f2e6-vt-d-fix-IM-bit-mask-and-unmask-of-FECTL_REG.patch 560a4af9-x86-EPT-tighten-conditions-of-IOMMU-mapping-updates.patch 560a7c36-x86-p2m-pt-delay-freeing-of-intermediate-page-tables.patch 560a7c53-x86-p2m-pt-ignore-pt-share-flag-for-shadow-mode-guests.patch 560bd926-credit1-fix-tickling-when-it-happens-from-a-remote-pCPU.patch 560e6d34-x86-p2m-pt-tighten-conditions-of-IOMMU-mapping-updates.patch- bsc#941074 - VmError: Device 51728 (vbd) could not be connected. Hotplug scripts not working. hotplug-Linux-block-performance-fix.patch- bsc#947165 - VUL-0: CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142) CVE-2015-7311-xsa142.patch- bsc#945165 - Xl pci-attach show error with kernel of SLES 12 sp1 pci-attach-fix.patch- bsc#945164 - Xl destroy show error with kernel of SLES 12 sp1 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch- Upstream patches from Jan 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch- bsc#944463 - VUL-0: CVE-2015-5239: qemu-kvm: Integer overflow in vnc_client_read() and protocol_client_msg() CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch - bsc#944697 - VUL-1: CVE-2015-6815: qemu: net: e1000: infinite loop issue CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch- bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow 55a62eb0-xl-correct-handling-of-extra_config-in-main_cpupoolcreate.patch- bsc#907514 - Bus fatal error & sles12 sudden reboot has been observed - bsc#910258 - SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984 - Bus fatal error & sles11-SP4 sudden reboot has been observed - bsc#923967 - Partner-L3: Bus fatal error & sles11-SP3 sudden reboot has been observed 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 5576f143-x86-adjust-PV-I-O-emulation-functions-types.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 55b0a218-x86-PCI-CFG-write-intercept.patch 55b0a255-x86-MSI-X-maskall.patch 55b0a283-x86-MSI-X-teardown.patch 55b0a2ab-x86-MSI-X-enable.patch 55b0a2db-x86-MSI-track-guest-masking.patch - Upstream patches from Jan 552d0f49-x86-traps-identify-the-vcpu-in-context-when-dumping-regs.patch 559bc633-x86-cpupool-clear-proper-cpu_valid-bit-on-CPU-teardown.patch 559bc64e-credit1-properly-deal-with-CPUs-not-in-any-pool.patch 559bc87f-x86-hvmloader-avoid-data-corruption-with-xenstore-rw.patch 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch 55a77e4f-dmar-device-scope-mem-leak-fix.patch 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch - Dropped for upstream version x86-MSI-mask.patch x86-MSI-pv-unmask.patch x86-MSI-X-enable.patch x86-MSI-X-maskall.patch x86-MSI-X-teardown.patch x86-pci_cfg_okay.patch x86-PCI-CFG-write-intercept.patch- bsc#939712 - VUL-0: XSA-140: QEMU leak of uninitialized heap memory in rtl8139 device model xsa140-qemuu-1.patch xsa140-qemuu-2.patch xsa140-qemuu-3.patch xsa140-qemuu-4.patch xsa140-qemuu-5.patch xsa140-qemuu-6.patch xsa140-qemuu-7.patch xsa140-qemut-1.patch xsa140-qemut-2.patch xsa140-qemut-3.patch xsa140-qemut-4.patch xsa140-qemut-5.patch xsa140-qemut-6.patch xsa140-qemut-7.patch - bsc#939709 - VUL-0: XSA-139: xen: Use after free in QEMU/Xen block unplug protocol xsa139-qemuu.patch- bsc#937371 - xen vm's running after reboot xendomains-libvirtd-conflict.patch- bsc#938344 - VUL-0: CVE-2015-5154: qemu,kvm,xen: host code execution via IDE subsystem CD-ROM CVE-2015-5154-qemuu-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch CVE-2015-5154-qemuu-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-accesses.patch CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch- Remove xendomains.service from systemd preset file because it conflicts with libvirt-guests.service (bnc#937371) Its up to the admin to run systemctl enable xendomains.service- bnc#935634 - VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow CVE-2015-3259-xsa137.patch - Upstream patches from Jan 558bfaa0-x86-traps-avoid-using-current-too-early.patch 5592a116-nested-EPT-fix-the-handling-of-nested-EPT.patch 559b9dd6-x86-p2m-ept-don-t-unmap-in-use-EPT-pagetable.patch 559bdde5-pull-in-latest-linux-earlycpio.patch - Upstream patches from Jan pending review 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch 552d0fe8-x86-mtrr-include-asm-atomic.h.patch 552d293b-x86-vMSI-X-honor-all-mask-requests.patch 552d2966-x86-vMSI-X-add-valid-bits-for-read-acceleration.patch 554c7aee-x86-provide-arch_fetch_and_add.patch 554c7b00-arm-provide-arch_fetch_and_add.patch 55534b0a-x86-provide-add_sized.patch 55534b25-arm-provide-add_sized.patch 5555a4f8-use-ticket-locks-for-spin-locks.patch 5555a5b9-x86-arm-remove-asm-spinlock-h.patch 5555a8ec-introduce-non-contiguous-allocation.patch 55795a52-x86-vMSI-X-support-qword-MMIO-access.patch 557eb55f-gnttab-per-active-entry-locking.patch 557eb5b6-gnttab-introduce-maptrack-lock.patch 557eb620-gnttab-make-the-grant-table-lock-a-read-write-lock.patch 557ffab8-evtchn-factor-out-freeing-an-event-channel.patch 5582bf43-evtchn-simplify-port_is_valid.patch 5582bf81-evtchn-remove-the-locking-when-unmasking-an-event-channel.patch 5583d9c5-x86-MSI-X-cleanup.patch 5583da09-x86-MSI-track-host-and-guest-masking-separately.patch 5583da64-gnttab-use-per-VCPU-maptrack-free-lists.patch 5583da8c-gnttab-steal-maptrack-entries-from-other-VCPUs.patch 5587d711-evtchn-clear-xen_consumer-when-clearing-state.patch 5587d779-evtchn-defer-freeing-struct-evtchn-s-until-evtchn_destroy_final.patch 5587d7b7-evtchn-use-a-per-event-channel-lock-for-sending-events.patch 5587d7e2-evtchn-pad-struct-evtchn-to-64-bytes.patch x86-MSI-pv-unmask.patch x86-pci_cfg_okay.patch x86-PCI-CFG-write-intercept.patch x86-MSI-X-maskall.patch x86-MSI-X-teardown.patch x86-MSI-X-enable.patch x86-MSI-mask.patch- Adjust more places to use br0 instead of xenbr0- bnc#936516 - xen fails to build with kernel update(4.1.0 from stable) 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch- Update to Xen Version 4.5.1 FCS (fate#315675) xen-4.5.1-testing-src.tar.bz2 - Dropped patches now contained in tarball 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch 5576f178-kexec-add-more-pages-to-v1-environment.patch 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch qemu-MSI-X-enable-maskall.patch qemu-MSI-X-latch-writes.patch x86-MSI-X-guest-mask.patch- Replace 5124efbe-add-qxl-support.patch with the variant that finally made it upstream, 554cc211-libxl-add-qxl.patch- bsc#931627 - VUL-0: CVE-2015-4105: XSA-130: xen: Guest triggerable qemu MSI-X pass-through error messages qemu-MSI-X-latch-writes.patch - bsc#907514 - Bus fatal error & sles12 sudden reboot has been observed - bsc#910258 - SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984 - Bus fatal error & sles11-SP4 sudden reboot has been observed - bsc#923967 - Partner-L3: Bus fatal error & sles11-SP3 sudden reboot has been observed x86-MSI-X-teardown.patch x86-MSI-X-enable.patch x86-MSI-X-guest-mask.patch x86-MSI-X-maskall.patch qemu-MSI-X-enable-maskall.patch - Upstream patches from Jan 55780aaa-efi-avoid-calling-boot-services-after-ExitBootServices.patch 55780aff-x86-EFI-fix-EFI_MEMORY_WP-handling.patch 55780b43-EFI-early-add-mapbs-to-map-EfiBootServices-Code-Data.patch 55780b97-EFI-support-default-attributes-to-map-Runtime-service-areas.patch 55780be1-x86-EFI-adjust-EFI_MEMORY_WP-handling-for-spec-version-2.5.patch 55103616-vm-assist-prepare-for-discontiguous-used-bit-numbers.patch 5548e95d-x86-allow-to-suppress-M2P-user-mode-exposure.patch - Dropped the following patches now contained in the tarball xen-no-array-bounds.patch CVE-2015-4103-xsa128.patch CVE-2015-4104-xsa129.patch CVE-2015-4105-xsa130.patch CVE-2015-4106-xsa131-1.patch CVE-2015-4106-xsa131-2.patch CVE-2015-4106-xsa131-3.patch CVE-2015-4106-xsa131-4.patch CVE-2015-4106-xsa131-5.patch CVE-2015-4106-xsa131-6.patch CVE-2015-4106-xsa131-7.patch CVE-2015-4106-xsa131-8.patch- Update to Xen 4.5.1 RC2 - bsc#931628 - VUL-0: CVE-2015-4106: XSA-131: xen: Unmediated PCI register access in qemu CVE-2015-4106-xsa131-1.patch CVE-2015-4106-xsa131-2.patch CVE-2015-4106-xsa131-3.patch CVE-2015-4106-xsa131-4.patch CVE-2015-4106-xsa131-5.patch CVE-2015-4106-xsa131-6.patch CVE-2015-4106-xsa131-7.patch CVE-2015-4106-xsa131-8.patch CVE-2015-4106-xsa131-9.patch - bsc#931627 - VUL-0: CVE-2015-4105: XSA-130: xen: Guest triggerable qemu MSI-X pass-through error messages CVE-2015-4105-xsa130.patch - bsc#931626 - VUL-0: CVE-2015-4104: XSA-129: xen: PCI MSI mask bits inadvertently exposed to guests CVE-2015-4104-xsa129.patch - bsc#931625 - VUL-0: CVE-2015-4103: XSA-128: xen: Potential unintended writes to host MSI message data field via qemu CVE-2015-4103-xsa128.patch - Upstream patches from Jan 5548e903-domctl-don-t-truncate-XEN_DOMCTL_max_mem-requests.patch 556c2cf2-x86-don-t-crash-mapping-a-page-using-EFI-rt-page-tables.patch 556d9718-efi-fix-allocation-problems-if-ExitBootServices-fails.patch 556d973f-unmodified-drivers-tolerate-IRQF_DISABLED-being-undefined.patch 556eabf7-x86-apic-Disable-the-LAPIC-later-in-smp_send_stop.patch 556eac15-x86-crash-don-t-use-set_fixmap-in-the-crash-path.patch- Add DefaultDependencies=no to xen-dom0-modules.service because it has to run before proc-xen.mount- Update to Xen 4.5.1 RC1- Update blktap-no-uninit.patch to work with gcc-4.5- bsc#927967 - VUL-0: CVE-2015-3340: xen: Information leak through XEN_DOMCTL_gettscinfo (XSA-132) 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch- bnc#929339 - VUL-0: CVE-2015-3456: qemu kvm xen: VENOM qemu floppy driver host code execution CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch- bsc#928783 - Reboot failure; Request backport of upstream Xen patch to 4.5.0, or update pkgs to 4.5.1 5513b458-allow-reboot-overrides-when-running-under-EFI.patch 5513b4d1-dont-apply-reboot-quirks-if-reboot-set-by-user.patch- bnc#927750 - Avoid errors reported by system-modules-load.service- Add xen-no-array-bounds.patch and blktap-no-uninit.patch to selectively turn errors back to warnings to fix build with GCC 5. - Amend xen.stubdom.newlib.patch to pull in declaration of strcmp to avoid implicit-fortify-decl rpmlint error. - Fix quoting of __SMBIOS_DATE__ in xen.build-compare.smbiosdate.patch.- xentop: Fix memory leak on read failure 551ac326-xentop-add-support-for-qdisk.patch- Dropped xentop-add-support-for-qdisk.patch in favor of upstream version 551ac326-xentop-add-support-for-qdisk.patch- Enable spice support in qemu for x86_64 5124efbe-add-qxl-support.patch qemu-xen-enable-spice-support.patch- Add xen-c99-fix.patch to remove pointless inline specifier on function declarations which break build with a C99 compiler which GCC 5 is by default. (bsc#921994) - Add ipxe-no-error-logical-not-parentheses.patch to supply - Wno-logical-not-parentheses to the ipxe build to fix breakage with GCC 5. (bsc#921994)- bnc#921842 - Xentop doesn't display disk statistics for VMs using qdisks xentop-add-support-for-qdisk.patch- Disable the PIE enablement done for Factory, as the XEN code is not buildable with PIE and it does not make much sense to build the hypervisor code with it.- bnc#918169 - XEN fixes required to work with Kernel 3.19.0 xen.spec- Package xen.changes because its referenced in xen.spec- Update seabios to rel-1.7.5 which is the correct version for Xen 4.5- Update to Xen 4.5.0 FCS- Include systemd presets in 13.2 and older- bnc#897352 - Enable xencommons/xendomains only during fresh install - disable restart on upgrade because the toolstack is not restartable- adjust seabios, vgabios, stubdom and hvmloader build to reduce build-compare noise xen.build-compare.mini-os.patch xen.build-compare.smbiosdate.patch xen.build-compare.ipxe.patch xen.build-compare.vgabios.patch xen.build-compare.seabios.patch xen.build-compare.man.patch- Update to Xen 4.5.0 RC4- Remove xend specific if-up scripts Recording bridge slaves is a generic task which should be handled by generic network code- Use systemd features from upstream requires updated systemd-presets-branding package- Update to Xen 4.5.0 RC3- Set GIT, WGET and FTP to /bin/false- Use new configure features instead of make variables xen.stubdom.newlib.patch- adjust docs and xen build to reduce build-compare noise xen.build-compare.doc_html.patch xen.build-compare.xen_compile_h.patch- Drop trailing B_CNT from XEN_EXTRAVERSION to reduce build-compare noise- Update to Xen 4.5.0 RC2- Update to Xen 4.5.0 RC1 xen-4.5.0-testing-src.tar.bz2 - Remove all patches now contained in the new tarball xen-4.4.1-testing-src.tar.bz2 5315a3bb-x86-don-t-propagate-acpi_skip_timer_override-do-Dom0.patch 5315a43a-x86-ACPI-also-print-address-space-for-PM1x-fields.patch 53299d8f-xenconsole-reset-tty-on-failure.patch 53299d8f-xenconsole-tolerate-tty-errors.patch 5346a7a0-x86-AMD-support-further-feature-masking-MSRs.patch 53563ea4-x86-MSI-drop-workaround-for-insecure-Dom0-kernels.patch 537c9c77-libxc-check-return-values-on-mmap-and-madvise.patch 537cd0b0-hvmloader-also-cover-PCI-MMIO-ranges-above-4G-with-UC-MTRR-ranges.patch 537cd0cc-hvmloader-PA-range-0xfc000000-0xffffffff-should-be-UC.patch 539ebe62-x86-EFI-improve-boot-time-diagnostics.patch 53aac342-x86-HVM-consolidate-and-sanitize-CR4-guest-reserved-bit-determination.patch 53c9151b-Fix-xl-vncviewer-accesses-port-0-by-any-invalid-domid.patch 53d124e7-fix-list_domain_details-check-config-data-length-0.patch 53dba447-x86-ACPI-allow-CMOS-RTC-use-even-when-ACPI-says-there-is-none.patch 53df727b-x86-HVM-extend-LAPIC-shortcuts-around-P2M-lookups.patch 53e8be5f-x86-vHPET-use-rwlock-instead-of-simple-one.patch 53f737b1-VMX-fix-DebugCtl-MSR-clearing.patch 53f7386d-x86-irq-process-softirqs-in-irq-keyhandlers.patch 53fcebab-xen-pass-kernel-initrd-to-qemu.patch 53ff3659-x86-consolidate-boolean-inputs-in-hvm-and-p2m.patch 53ff36ae-x86-hvm-treat-non-insn-fetch-NPF-also-as-read-violations.patch 53ff36d5-x86-mem_event-deliver-gla-fault-EPT-violation-information.patch 53ff3716-x86-ats-Disable-Address-Translation-Services-by-default.patch 53ff3899-x86-NMI-allow-processing-unknown-NMIs-with-watchdog.patch 54005472-EPT-utilize-GLA-GPA-translation-known-for-certain-faults.patch 540effe6-evtchn-check-control-block-exists-when-using-FIFO-based-events.patch 540f2624-x86-idle-add-barriers-to-CLFLUSH-workaround.patch 541825dc-VMX-don-t-leave-x2APIC-MSR-intercepts-disabled.patch 541ad385-x86-suppress-event-check-IPI-to-MWAITing-CPUs.patch 541ad3ca-x86-HVM-batch-vCPU-wakeups.patch 541ad81a-VT-d-suppress-UR-signaling-for-further-desktop-chipsets.patch 54216833-x86-shadow-fix-race-when-sampling-dirty-vram-state.patch 54216882-x86-emulate-check-cpl-for-all-privileged-instructions.patch 542168ae-x86emul-only-emulate-swint-injection-for-real-mode.patch 54228a37-x86-EFI-fix-freeing-of-uninitialized-pointer.patch 5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch 5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch 542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch 542bf997-x86-HVM-properly-bound-x2APIC-MSR-range.patch 54325cc0-x86-MSI-fix-MSI-X-case-of-freeing-IRQ.patch 54325d2f-x86-restore-reserving-of-IO-APIC-pages-in-XENMEM_machine_memory_map-output.patch 54325d95-don-t-allow-Dom0-access-to-IOMMUs-MMIO-pages.patch 54325ecc-AMD-guest_iommu-properly-disable-guest-iommu-support.patch 54325f3c-x86-paging-make-log-dirty-operations-preemptible.patch 54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch CVE-2013-4540-qemu.patch qemu-support-xen-hvm-direct-kernel-boot.patch qemu-xen-upstream-blkif-discard.patch change-vnc-passwd.patch libxc-pass-errno-to-callers-of-xc_domain_save.patch libxl.honor-more-top-level-vfb-options.patch libxl.add-option-for-discard-support-to-xl-disk-conf.patch libxl.introduce-an-option-to-disable-the-non-O_DIRECT-workaround.patch x86-dom-print.patch x86-extra-trap-info.patch tmp_build.patch xl-check-for-libvirt-managed-domain.patch disable-wget-check.patch - Xend/xm is no longer supported and is not part of the upstream code. Remove all xend/xm specific patches, configs, and scripts xen-xmexample.patch bridge-opensuse.patch xmexample.disks xmclone.sh init.xend xend-relocation.sh xend.service xend-relocation-server.fw domUloader.py xmexample.domUloader xmexample.disks bridge-vlan.patch bridge-bonding.patch bridge-record-creation.patch network-nat-open-SuSEfirewall2-FORWARD.patch xend-set-migration-constraints-from-cmdline.patch xen.migrate.tools-xend_move_assert_to_exception_block.patch xend-pvscsi-recognize-also-SCSI-CDROM-devices.patch xend-config.patch xend-max-free-mem.patch xend-hvm-default-pae.patch xend-vif-route-ifup.patch xend-xenapi-console-protocol.patch xend-core-dump-loc.patch xend-xen-api-auth.patch xend-checkpoint-rename.patch xend-xm-save-check-file.patch xend-xm-create-xflag.patch xend-domu-usb-controller.patch xend-devid-or-name.patch xend-migration-domname-fix.patch xend-del_usb_xend_entry.patch xend-xen-domUloader.patch xend-multi-xvdp.patch xend-check_device_status.patch xend-change_home_server.patch xend-minimum-restart-time.patch xend-disable-internal-logrotate.patch xend-config-enable-dump-comment.patch xend-tools-watchdog-support.patch xend-console-port-restore.patch xend-vcpu-affinity-fix.patch xend-migration-bridge-check.patch xend-managed-pci-device.patch xend-hvm-firmware-passthrough.patch xend-cpuinfo-model-name.patch xend-xm-reboot-fix.patch xend-domain-lock.patch xend-domain-lock-sfex.patch xend-32on64-extra-mem.patch xend-hv_extid_compatibility.patch xend-xenpaging.autostart.patch xend-remove-xm-deprecation-warning.patch libxen_permissive.patch tmp-initscript-modprobe.patch init.xendomains xendomains.service xen-watchdog.service xen-updown.sh- bnc#901317 - L3: increase limit domUloader to 32MB domUloader.py- bnc#898772 - SLES 12 RC3 - XEN Host crashes when assigning non-VF device (SR-IOV) to guest 54325cc0-x86-MSI-fix-MSI-X-case-of-freeing-IRQ.patch - bnc#882089 - Windows 2012 R2 fails to boot up with greater than 60 vcpus 54325ecc-AMD-guest_iommu-properly-disable-guest-iommu-support.patch - bnc#826717 - VUL-0: CVE-2013-3495: XSA-59: xen: Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts 541ad81a-VT-d-suppress-UR-signaling-for-further-desktop-chipsets.patch - Upstream patches from Jan 540effe6-evtchn-check-control-block-exists-when-using-FIFO-based-events.patch (Replaces xsa107.patch) 54216833-x86-shadow-fix-race-when-sampling-dirty-vram-state.patch (Replaces xsa104.patch) 54216882-x86-emulate-check-cpl-for-all-privileged-instructions.patch (Replaces xsa105.patch) 542168ae-x86emul-only-emulate-swint-injection-for-real-mode.patch (Replaces xsa106.patch) 54228a37-x86-EFI-fix-freeing-of-uninitialized-pointer.patch 5423e61c-x86emul-fix-SYSCALL-SYSENTER-SYSEXIT-emulation.patch 5424057f-x86-HVM-fix-miscellaneous-aspects-of-x2APIC-emulation.patch 542405b4-x86-HVM-fix-ID-handling-of-x2APIC-emulation.patch 542bf997-x86-HVM-properly-bound-x2APIC-MSR-range.patch (Replaces xsa108.patch) 54325d2f-x86-restore-reserving-of-IO-APIC-pages-in-XENMEM_machine_memory_map-output.patch 54325d95-don-t-allow-Dom0-access-to-IOMMUs-MMIO-pages.patch 54325f3c-x86-paging-make-log-dirty-operations-preemptible.patch (Replaces xsa97.patch) 54379e6d-x86-vlapic-don-t-silently-accept-bad-vectors.patch/sbin/ldconfig/sbin/ldconfig  !"#$%&'()*+,-4.10.4_06-lp150.2.25.14.10.4_06-lp150.2.25.1fsext2fsfsimage.sofatfsimage.soiso9660fsimage.soreiserfsfsimage.soufsfsimage.soxfsfsimage.sozfsfsimage.solibfsimage.so.1.0libfsimage.so.1.0.0libxencall.so.1libxencall.so.1.0libxenctrl.so.4.10libxenctrl.so.4.10.0libxendevicemodel.so.1libxendevicemodel.so.1.1libxenevtchn.so.1libxenevtchn.so.1.1libxenforeignmemory.so.1libxenforeignmemory.so.1.2libxengnttab.so.1libxengnttab.so.1.1libxenguest.so.4.10libxenguest.so.4.10.0libxenlight.so.4.10libxenlight.so.4.10.0libxenstat.so.0libxenstat.so.0.0libxenstore.so.3.0libxenstore.so.3.0.3libxentoolcore.so.1libxentoolcore.so.1.0libxentoollog.so.1libxentoollog.so.1.0libxenvchan.so.4.10libxenvchan.so.4.10.0libxlutil.so.4.10libxlutil.so.4.10.0/usr/lib64//usr/lib64/fs//usr/lib64/fs/ext2fs//usr/lib64/fs/fat//usr/lib64/fs/iso9660//usr/lib64/fs/reiserfs//usr/lib64/fs/ufs//usr/lib64/fs/xfs//usr/lib64/fs/zfs/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:11478/openSUSE_Leap_15.0_Update/2ff7bbfe6252b11e375926823eedd926-xen.openSUSE_Leap_15.0_Updatedrpmxz5x86_64-suse-linux     directoryELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=0af08e74b2dd5466c05cd12f352389bc8b205769, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=8b89047acafa8b376a36ce2e3b40e34277fde221, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=106c549ba0782693bd3cf97bdb93f4be7c0b4ea1, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=7864156c74bd17da386168368fe103d62cd557c0, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=602656a80eb37ac9da05c5cb7a94b56517c96c5f, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=da635a9d2287302316d99d93be1123d21996b9fa, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=69a30f9b452ce63daf614050513a3f695630d0ef, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=0e125392f5a2f59f7d11f410b370620e4cb291d0, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=04ff0ff37e1d758daba505538ef74a782a9c315e, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=a0ac6090fa2cbda61767171f7116ce8a07090116, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=6f07d489d05cca23af1564a9439fd2ce8a70f2ba, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=d293fe5a2afd5050682bcb636faf2f0a027e227f, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=516938fa801ee51846169b736ef32b12c41a2a6a, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=6d387359ee5ba43f40723e94533637661e68782e, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=66db049cbb2633f52267efb495f9ec21b759a440, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=5aaeed380cd66ff0bdd16460688e88c72e4e8a3c, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=72e646ca1479e64f3abd38ce6a81edfa61b883c4, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=acfb113c79c0c61bd3bf585304db2389a59745b4, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=71cb9dbf9987d2ea3816c6a09fb0a9c7fb7b5203, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=a503f57a2e825ba2784c8794ade955db0e50c19e, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=61b097642489be64996503139f60e04df5e4065f, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=e2313b4a86e53439b9fa196a4c025dc87953e239, strippedutf-8456462d48f8381adfc7217afb0db61af12f3550be07e48d04363cafd014c26df?P7zXZ !t/G]"k%=!P.OT1u.S.^s6ъ]E5Kk /FRn@ d-(UHX¯k$]k䥎{ʨv=K-h &Ku_g(ᐏ3!E0M@=CC(D%؇yQ2"eyXyvI{8Nj0ĮalQyeSK k,K(%Š&@2PdM0bfT~|I6ӐWd5Xlv tf-*DYEw4Yp6B"Oh~ap(YWWR]զ㑄oDk2z`'D (g,' Vxc>u1)(fn$qcb⭕kxcl8#e.ŵECHψW7C,~0UUDkbU ~ G]*^koMۘY/)QfPυ+3RzE%F*g_߉:nKk$Usu{ 1-#-<v^ 8orÜ\\~n.b< *?+h =Ϡׁ10,qvh@sבK#a;~bxzEw:ﯹ@.-*!MttA| r%bzV߱tfEo1:}FqbHJ1g OBLV$ j"YkiLJX챻6I,ZDD;-TEBFnH'7PƒB:X )-y$Phtf5&Ív>lo| h{3 }KRfӮSGHp!ÿ x:piZXЏTF }q'd<* ,cW:cV${b;ބ|=fʑ'O{ZF#^xIYËFY?g6&3exr`0Ssm^I)dUH(@j4M# >\wVoB1Y6_nڮΔ;ecj<~L}\<^\R>SRRc><]ZM·8l :E\v?4-:~.P')>RrlI^2r?|ꐉ]~[szjI|غ7IП\'5d[0ksYhuPG y2 ʋMayL0c8 ;O7+BL>wEWGV^:E%TS;Bc`7XXMlH^/U`S^&a<¶נXΧhV,ZΌ4yI^;NL.6GwB|n/}jp?ǁ57 't|du)K\t6"ZEpm)P0ڀD n7*)g|>Wń_YE9%P>0;nf~&auN؄uHowe+*ϓZ"% *jА>- ]5>0T8o>dʏ=ZD/e8f6|ڨU#PT< E Xq)DZ>kXa5v{=!8gZ-B=uD B.P(NDNqdV.3rp/թį6!bC!$i\rFP9]!6"K3$VX)a0P0 @|.р@KF>$w׳5r-T˜;={{-FrRN]nAMF}Z݌4Z ܤw(F?& EjʆDh'{4iqcɞ۱• kE$:, =gAu2kfwH~RsͰ6Ɓɶeބ6 oW] l([ H'Nĩ*9c~6)>:B&8b}ou kѻ*__>`+r E{fTQc{y?MB~ZAhD&hAsbP;&|HPiL ;M#s/9"d3jvGQq"2NnRDؾkV~ڱ4u Ƚh>4ϕs!r^:a0u_Sa ='N_g.%mՏ#Ѫf* /Xz/&&̤`¦\#pspo %ԺZC-FE5;2v#&fj2@IlxLOkR^̆̆4rPf7t G&jŔ@*h@>Q~j}ɡ{|sntqj6ؽeWCV5<i DCMrɈb00E+(Pxe)Z[bmC!GDŽJ6Y i4z%X7>&gÍ89D݊ZJTvXaB8PwB.߀)K^XPEqLtOluғ=ήM8UE ϣVε094jǖZgfW95b~(}m5o✞l ,N[s<$) ߻/pD ZQ|7.|/zYbJ? Os Ɯ%!I>H9s#>VUNmKI0E ‹a>O?`Fsw2w꽌ZcJjM\抋|hKYg%sjJ) _X __(:Tں>G#FDJL\+ ,V02N&24NHuD?M Y]Cը(aVi_WQ #G& Tnm:R׻4x5ߋ+3i魌\^l U)u*ik|Է6`De ^r}4hRTYoS~mUflVT_]@vZG;!rSsK_țrIykh֚]ϷI:?S*?P{Ӣȗ>2& cZ"J4.s QN7Z\惒R`k-s” QpxdwEIp4u~hԖK>rFS&1]4m3I㷒$/;A3xޛ'x~heU.1p敳 G!EjvUޖlt `}7%5Ko;F;0(lS>k Mf?}%eW:%A/s!!{p|3A &¬|ŦŴ(겘YH7`Y4b33pnx Z"Ɠ_."RV`n~m#V7ڱNgt9 + n$(-÷&KR@f}k3C̈́A&{}.AFPBWg#M!)=;~cMhGpoJ=#MFA-7ݾDjQǡoP. 2S+ *}=Ts8|iCƇb5}ޝ,xE2vvU60 -* ^, -|arJS(Э);aRQ~?5+< m/o[ks!4iBPcxVn =:qRs)+@U1^H,O>>ƂUp^8fYIky{fwVE@]I1X)u₴,i0N}xⶨ<-<{bP.B!#MaPh79Þy܊pdYD5هAx0b2c]Z| /'KO.%Gqaa۹7p^ %#HqS6K> wf+dp(Ćиo o[V[Ij'naD훡l}vakA!vTw#vѥcy1> j(LNq./􊤟}-pCx2tSH~D~y +_rf@R6({m{qXٻd2s$w0CeAŹRtYPoބ|A<#n<`Td jlfv2(wCOWvUTJ%Wծ26~(;:ƭs$w5+j6gZG#6Pn@A$앪CCvF -JKfԇg/N0>%&rG =oHC@Bc-;T⍐EKHvPjeѿ57FP@\-yСd߂^ ''C+1H0`RG|oMr (ZBx5 ߆%H (4!@2dR8Gb %U#Ae}.1Iw>]ʙHap)T0Qs{ꘘpU6UC8/Lpꛄl&$Q\g8<ߙw3n`^#~ v&2&V V05% t 冫 D[sW\6Zh1 +'[5ϣMhL 0[f^ ֟#`֎hbGy-0o#fL߇[7>CjE?y050} `epN֖~3\ /* ϥad/"4{IX|\ EYs ^#Q > E}6x*7D*H 0OB^4 %)9I(SO/8UF|XhS#7 5c#-J}'rx|TLc'6VWcDmN[$yd/A|2rIŢr+ڤa0P1S$ԓ@eYk1Rȣfo 7J8Ւ%Tk ZZү鎱{@E|#YLϿBe;5iN/w||x-EYXV>CGPS64]/ .tGb>(qTsVCW|QM9PE{y/"8_%C }i(VG'By/^-$1r )Udv~vmʾh1( 3-d(59d6d ңjYԊ*-;Sss\t!b d'{8|w5oD&}~K#I!dQ?Us<59+XV&Kcom_C?+/tIb<.6/,qOScWqjdY{OQ:kH9âCRPIQD\ B-+{g3dgSI>Nm?C9UqgT!e;V,D:L#I+=v=dD%DB{  h_x,&^͑;uW>%qȲk2' X2o$̂;NĖ >24 CQnʢ[wt G&/v6͐F4{ ] Jqߟl ؂Ѡ;U/wY)mr|m2lbdFЅo%$uh~}&F4[2!'~xy Gt;AfQ4unPSX62yDI'k rYCc!{Z1'YӕFՍ6#-"N£.Q_-`xjWqY6YsmOs!; 1x'* %0v5KH3Kjc (Lm1=o u z?Dݔ00Y@)/>8w{Z} c~T =Q\mf`65XӉh 4Xa'5JhŐw8&JFq=@DNLܴl-"꺈e$,/{ەIqFF0ymb =bNBDe%qUh ]Q~pg}Z?">oCR)B{i4Te5W=*4 'ԍ]_dQ~$ uh kf1l_v8ツ&OʥV{  @t96:ٳt\,`^%ֹx7[Uonv wX;hJ$e CQv>#ND|P^[9jPĿAG-]z;pfz3x~E2F@ 4̧mF7La^ /ʒ(F7\awVܡS^cJN1 _ T4HB@op?QYR\g 5WfCbL!h3oTŴRW$%4LRTs .݉i-b~4rɷ pRt/sw GU VFی7ʶr]36M:7ydF9Ս)⚭_%# MgLׄA#.XO; _F^:QUdYj<887P#Ĉ;18RZU;6_\գ.d%ҥbJs%=q:04RqF,Ÿ'ڕmYulNR/Im>>ۃȫi\nlnKb9O XDgeU.-^8WP>>C,:]W)j a&,ή?u LӄRW}w${jurF񷄫t>V L㟰s[F-~am.(HG] rlcQfs _((FOB4o}`gTa=).,Z'cviC;0HztXo[*IK'!Z|(*4F"C.A=;?DWiM]NGn0ѳtxivwYN8ΰvr EMM2qjX9G!x y9L2$ ߦP0īnN+afA&߫t)\,4~\V䭖nFb.=Avա譲c?g`Hcm7='ЅG2n(ESZ&*iɿ6O{PlH]Χ$iQD-O^``Ѳr6$xSLQQX̑1xi [91kkN+2S;h5@螥*1R@/) w~ xz] =`ڙXV:)64/:uf7dG轟9*]waj=P.6ϖ'up)7 _5*2Aº5N3*…Jqj) L7Ve˽b=jƗ(8a0NC/lu''<@DU+ձZrUX3NhP%Iu!/H^$xs? у”4\~Ψ͛6ڊj^dg5εBm#Gx#k ]TF#)ġĽݖg׽-jL'g ~3%n|d,oKW`Z?[R8tIrMXΏTr#Aخ,*OmtW/ ZEDEymETjO *G6/[h8zpPs~5Yggz\I \TZCHQ&(B\7TH7ՇrO"69xKӠ:"B p\hdTxV?Tq rew`IhӚp{$yz-,nZ y~x2D̃kDLǿ,h{Co0|z;G;S4.>^Ӟf.wrnm@p\._3X-+DP6J!ׇe v0E_ $F]ج`~L["6wriQ'xI=0üdԯt 8ݾ!W=7SwdcN!I|`O(9d1Ϥ5ќN vv'ti3OFm &F#闳d>Ku̸PmvG=-eyFYC܍EP@k0zWV耏ŊI#3(+e>Paŷ1'p/֓\K[!=40LsqkJ!V$DmYk-ؠJmzWZiDuكfUzZn2!d}o YfzFhh5KB\t$0!HvE->HHs{Z)M]N"hR5#zY|Bk)?^׸І,=Z$LGm5THyH,U `ۉ\O{ȁ>O41uca"P?kf]_zJ8(/ qjT |Vi'܆enUū_%)R'&Gip4FcUC[j~;߁$O8dF8a-5#x$mX#:VS.?UȎ\E99}8>s/'Lg[o6$0C/)R,60J BɔfyZ|^^_V]0r5*4Ӹ >ΦG&}ƹ[N $ǒo_Hsk :g#~+pSyumDrZXՓe Xس};rgugkvsg<#Mn.90SMMw92:{6F)p3WS\\Gʙ屹HnMnu 0eFS#PXb9ވ1BVoY344emڤ}*<<" !a=~{OGl( M~-˼y1( "{~N]P] =_n^gI 75/vФ p|{7v!`rSqh^e;#&BOn􇜙9t3 7:=EMx%g* @:tDY_wȢv?Vyqi'u?M6kL7Äp*{Ю_SƬRz8h*CXL~Xp=x[>Y0rK{)dƟnyBBjN : e?c4!42*5 첌Uc)Wshdip䦓Y^Ϲk`)4RqlA> wEt\<{s=g)y5]XdqkƢMBE̺6c Ik3r=LO}o88K~R> B)G`QO]2)Omg d& }/(=oE[d2Cj6u/P׍67Rz6mKJʗ_Ơm*,F$7bkdmŰ۬ ޷71** Op4EX74CwZ$1 GβY'M-7WDS+RVE.F*}2򡞎iM>={?DTw+Vo"H侳(Z}"2t OQw,> Hp.fy(Fo!~k .k1-%܄%أ6͖t{:V>fzSۜ3@h${6M jM‹ZoCivMpaC\vS8V4+i_Eby9fvM.5OI;wqn q3svygbϜ 6{z4SC%0Db,FDBΘT@ G i쌰Si]|̞F!2V}p)^c'vgVe0X`y6bwHKdɊCrжŶO#R= 24[m9g/BS^b>dibڠϯ͟Cq 鐢${1}<_\&Ysx{B? 쇹mCjnujL=Zktcchnot?)/ճhhXA G; :rY@M8mc̆Ys1tM~=074^M[x^{./Woqr.WMUmݩS&΁kCbsX#wlZD. ^ GaBTZ&m\-7B8]KqnyZFOTIa٢q5({g ex2&Gf1yRqCVP9,ˀ+N¬26؉~U̇a,- D2 nao+B[6(r;TJ>[uLݷUlXO\ۻ>MpQ3 (i'7`Fⷻ\nrRS)SpksAhg@§;>{#菐q}cCJ@BE!z;T(XɶvפuXsѣvӽhfUt5U 320EC}fi(seDMɴ<9Ny-2 ?+]H3`G9Q˅(UrUЩ QڛqX#/ Q"7mӂ,/CGS}s;v2`'5o`X[hrkN~~M;ykW> F͍ .{B 4awJphiT G+p gMv=@ ȋ$l*s+: e., "Ďyʩ] !3 KRN *3sch3t/}D&iT]HI `Vu鵙*ʉ)D Vpβvpg#ʘ;g}<,GP]ifnvؓG/P IP2pQVo&KԄw~8z-†sҦƔ8`}O#f%t7Ql_3W E$PX&2{p[Bu/{vT J1? eD/:"'B?$[m1YGB9@*rjw(rMjw)eԷT¸lX˸՟_-dc\"A?{hU!j-WQhʮf,PQfY obr67[F! K0(fY\&#`>CG _Fˆ("J1wy4E1>Brl wUZV˝c.T]t_u9Uq?m4 -)!L>nM]#[5DCzq s n>T[jr_`3҉AޱSM3+OFmL-R3|Q0'cl;>oQ&7u$hP:i(V |={] }fqi?*R?qn_4[Wkj+>b:P0*K佲0D ml>mm)!PGu{)k}5/Cr{#8QfK,YN@$4IHnYӌ:O_o;|JɎ< Qn)Mujf: %׵F̅Al+&@Cy<\? 5v 95B'TaxOClD젷d7?`P^iJXuXTlcIXK Q=r/zص2Vi2={dREb jWΞaiP8`> 9v`U{7`& 8b~*Qf=G^8zare'\ &Qɉ aϝ3TF[C$F`T gYϏb$k9d AhЂ%Kģe_JJD%]5E[dn}ʠ.Qu%˟xp4; 64s*GuVa'!WceB>AБ-rNq:|ݘWGA$<;`︐rA)sd?`O~"8}֏詖\cw'|EċRT2GZa?&)yv|kفV˥\ǣS_.Oy5_{r &$ZicVw "m<(m౜Ǡޭ0X4 ©ʳ{(kRO$1S$ވx!S4X)g[O !Buo&^ܨ ҨU\Xs8ޚDeBR0234fQ {7RǞ2浉QgS-Nښ5h :3uH?)Q8g˜_6c !c6;[b9 뻵0`p/XS⬐E96[r$ l튭Z#z`~44h“6r4B.\T#-K2B.k|܏؋S&ӣDwKmT.l#l z<?D qECƼݟ(C: m[Qiz TtUS;V{(Wo>I??\2*|@=`XMSAl`a\zi]_0盝3w>zsNen{Oϑ 9/4YJjMѿs;4(^70XaC\e6;z/> 9J';tNn7b+^`6j|S_z]gvm" muHFD8UE ',:2=GruT<*.w6v$h afҕCP7"yMa"Qnfkzf <H۽&&0YX0 Upne\A,ڐ@Q7Ryw7uSډ JOs `g>{2P_Bۅ?8hs?0vh%̘h ޙ}7a)cxnmZ 0޻HCE:?_v P ;+I%"1% +jj IѢRUʬ^Ok{¯6%WR|LyC$B豅 3odLIAͫ1elMnevD|R#%ʊ"7+俹n%*ݬc'~A|r*ԑ۸VZqQK+},ՁER,7*G[lpRt8tB;oB8t)og܏d162L:)U{57oj?[c/ Jq')or:u6 :s{8Jx pǠnnotH8|aA-k-x04n&WD5Ԭc"Jv$6?dP$D_pyw0 ZdHL#$Ӵ&^r1s,3O5 ݚ=7O,ՒJcZIB' 睄OVy/3^0ծ)YB;~P @@VѝY4v/O#S`+i~jN'bE [ ꓋6&x#^~_uJ]ߊ_5dhO0Y+Ռ#VJ1'fkF#Uwos&g?Z`Q{\`FB )yd>C9ҰO9vւ(oAMS{Ƚ#sHvัg=q"0qv= M"fK"i+7!e3l!1> \g|-*Gp8Rk{=XC?Ms-4 t)oSV{ﺝnoQ{(6h,# QlfC{]Ű_8wϹֹ͚J?z5$J W1tb$/HA}%~aq3xm="[n'xZ͵G8,uYkC >;.Ckaϭiõ ꃪ"@K# C$v\4<񢬓=R:\-M*`$—E%C 'lrl|68a~E! f3[%1xK;K.\z짩lZI*24Sy!O]l\=L]TWk5Βgp' &cOrx҄K/2/*,6?Ӊς?nƑr;&fVaFC:!jUӫ]Z`Sڑ(*u\d|#ZoNˇN1n(GcQW5{YչؑBؤQ+>ɪ5?Vה"GКYL~)&f e/KS,6_[GR[.%V<$C@/xWIV,@\D+D(8*5ʋǮ | 㘍9͵/.L4UI|.*}NvJ:gPb%qq,;HzȈLHMxZMN#ZB[SRf |Vv-!C,| wq ']$]`P~׎mmF };ۋ!)ic˜D{7^tD[@\T[/3@{6mWB(9+, S>GM l57B'MH%CH ma:"d{ l7l8!;]fƱ%O >uTP,;xEERoᆗV]ַAG> 8O44sgnV;/QYzxiKOߋ[k WNU``!S,(^=+S)qu7Q!1=>E}u~;]oz"')Ke .-*J^h: 60x$f V?L.svu )~"q:✁Z'}ܺ.=Ґ 2\La3*lD׃/C%_ ^ Jy.+1Q`g6הn4xdVoċ} $̯~DOJg7i `ugPT>aϯXw;E$BQKKld>)z{D>^9‚ٮIɚ35ʶcZ43/GRc ML+F5k??2HؾшBI]6nVWgte0@}n@V `dƜ-HX_0#20s[0:Ti0 զDc)͔ \? ,Ae>Z.4G?fNgWhdzz?f~$[XfE?ob`M$g-v"{k8v-G9N9ʃ@f?o^=`: ๔?qbܣRD:GCW?e?bR?= /]p]m:d h8b{ Vo{:+ED:XE^ DXE {Q7Bx+c#ti;лVCa+kW.9ORV!{<0h'%I?ҏ$,r$zX⿩?E@"vsFqSgF94e ;YQ=;<.{ε>ϼ2=J VSY'ުZ'EM]AJs'Ȑ&M݋>R@F^yN`]-+:Ys0e7S;'V^USzb<HEZ/kAX& T]!MS94C|LՖWVē3 J.' =̛´hr0-]wu,M|ؐ%B8n2Q=]9Gf1 ڝK4Ybk"" B\ygᅃ=:aٗ6 WJ ѩS&%%羚ߡ'gnLu֐^*9rq~4 `6)(/S"k^ZYC+뽔j9K;ؓ>Q&@Ľ!W {M\xnՍz9N%0hn ՔX0䓷Ƈo$y/n"N~b/_չ( $lsDNΰjg= m7cz.SaudOX-JI/tBRŻf}|4Jh%@&8n̐=81.ՔX5 +tY_?YռZH hJkJD$X:"|4A%~?T]іRCŒrڋ/\z= ftϊ*ɹ`x&-С|='YSaXv (6zZK`1C2sL# %g.M>:0B [o*4KpY ^2IԜXx>t]MYo_tgAdZkCB.^:[H1*mf~8w.z̽8`l!%UՋ: ]D[g+܋RbectbS8B4 |L#jJr8oM;+߿8p>iuKn]EX׊o_yY ;[!pjD<9`e1t`Th?t9*4S{^ NtO"v L3ѧ#"&h`},- hG\4Q{- }p\5-1Y@1ԮpibIRWR]}$/$8XeG8&5o@MϬN kVn>i?c,X^薩fyu~+. Lcy޿g D=Q 'n{1e0s?"0Pw0mm s?sLZdTJ p>ڷ5"^Х7 Eތ\̈́{νFU7L[=f.x?ifAީ"rBƫf@^? _袩i^`ѯjogd|toܴAo=)+>UBYa>6Z Ks$d<%/ɣ5;0;Pn]nz/8Zϧ~ށo*wo- V}<2geO}=`ZNޕ 97deHzvjVJ-6V1SM\+X>P\y$OHiW ^8\mlZU#%e{psCP&& ZeCHa'B3F8:rNx ڳ jމ"?_4{v`)增1^{Sp;&º"^sas"z].{Sucon9p){'.ѣ|=mh>oĆ6S@૝f3T?n^ '.\$ױMsY <}.Xt #ŽZ6rPB9Њ7"i MK&ûeMFkçݱiټ1ksI5HO mY!?Օ 92 H,p`|J˂6,l~Uq#>&^ܱߟ}Do2_wD+:yK82hZ=$<9'烐SBT om~3ϔoli8-**$Zg%*KSrh] !]?0 A]0PvĽ5`9YD\dMlFvYxIDLrKn?$$PgYRP7p ;7roe 5*u-JEYgM)]~q+;t&к$UdtW^;a}Q|^G5!-Wb~NbUzWLљ B_}H_c\V$ MblшvNyo?#[܈?[ B3CSk.;EF*Ytz<[;v3,6"qf7^ Ey.~p̫uy.Kݩjak@(.H8T Q8{.|сԡĄ5$=RhB̯Z6x 4 zBR6m#֞44UpkUޗE!C\D6="J6N]%3- rEi^!rۗ-uOڅ"?xÁZ-_(19La2&}"Y> &U^;'-Um&F=5SKa򐿵 Yúk벊( M zFr@c$%u;4ђ@b0zkX@S5kO3oM~Y`_i [xuqBN /#ruW QN;tqylT׼5am"Wb K,z<|AdQWXoyҞ(,V 8]³cuhR!'~Y3v%!< V{wŝ:_fRrbz\$,8 B񅢣C1ğם&ASMmgD#lM^&-׽Udh&W {DZ<ГpdTЄƪ(>^6A3E}.%{=Z"00m"Va3bKyHu%UPd,cUiה+>F:Q"E tH\1.8_ɾxNfg7vg Tݷ[O=3/ڇy<k^kRy 4bmjØX$X8d<3}uDW74MR`kӀ}Y~/Z74/&D31("uFHme?J#7`Sat5{*)4z>.H&ʓ#01qiI*FWф¶&Lu;Ev~H_d$"&߿?[dC-C nA\/`,.Pf 0u5[XwFgVqwd\iBSTomo[I h6*,&_` Ww aefũMTnd_>UNh߽(h 5?'EP \:A$~ƚæQDnėJ0h',3 =WE -ndHݮ:/a&]R oᖜAy {82" iWb?ȩ"pͥb1ʸe䬵52)4A&ǏIUT)rd=sBnʑS.kw@ RJnaRF$'q&JO!K3T~/ 0dT )Љ7% Θ][:r/W?i )P%<;)Yqx4;zlED8X}Qʡѵ tkRݢ0I0fތTL @i"gϤP 4!;l!pj%Y':oVUI[bQ.Xօ٠ݡ%5`6ttr=m.\Nn^CeИ= sF: t)k qMxЗ:σRu^$`V?ͳ@ ؛P~Ф!ߖ`B#.E%z-.6t覴AogRǀe`ZSD4wN۹PDQb>=lq7-Mif͵>(*o2ۑHW'l0:fLHI7xq,Gr48S3O "D ϖZcLlKV q*ۻ߭,0U'_Klf{<"{^[-`o3ȱ*!0𫑀4~D|Μ Xyܳo(kQRO % "z{?VCL:VYرFnsD8:3:Os x%C1vwƍJz/kL7Ts-:.~mE8m?u_s:>  U 4nb.4ij 'LYn!:v#G;XR,@ps dKi9w!,VLi7A1:TN $S%gh0LsKsB2̵!y1m)$܊~mh>ՙ s<l\-r1FrWD*RZ\V*l}: 3#gtK5X.VݼFBH.-Rxa=Ɏ1(t>9Pyafż(h8#)_ŰKFb[6J2mS4yuC]F4+"m!u|ڎ^]@#XCs\>>8[%~ C .>fu*Xz}Bu?&w91%OM4Pb>{ *FmAf.eid%g} ɤ" V,f1%×C_oc'sj4q5_(M]/tlR?9R܉TIDUĎie<@ @%*|:1 EͅV['K foN*å89RѢ5ۄ~&xMPF-لZ hRLuB) UliCe՟,qPv^AK]AFYPvAs/V{hqZ$V6?Qh a й.vU)ö W O$ExG?Z\k4ΒB\s@K+p!N2J=rpipB%Ca ܮ1hr~Y)떦گFm؆VyxȭK6lnאnk]'pMҴFFʇ _nQ2sF"76 oQtD:=R:73ʶ12lBwo:zDH.쮓΄k&$TxN)8X3IaJm Pc4+ЌVȢ(9Ywԑ uV9:P%=9ߵ dv#[HZ.2@dN} |>܌K,%#s\-.HExUL5YTp|؛gS ϳߵwEk.)`_b4%ZgTVU;bW>[)H~^vQ2m˧EFAH*|@%<6E{xqaZ|M)x~\,Y囊 blQFnea2դD)P!opð'700LB lu:zA(s)]IOjD(fb o9W=S cH FQ̂Ey?(XZj̧ =D,`m dj(ui~W wF)tSЏv V*~'0.T$} ? {$pv 3s2"J?d"y݄

P/.QDtBI <B{yd,t|cy m>SӎָA23{ ԏ(]Ui.lGWZ݉Vjair\~)*Kݖ .849vR(>\=K'hY]Ctd "CJɩr?:gXnΠxv78uo\379D+)p\U∞HwDnÒe^ɵW7e=ZF[įI+D!d cHCg؍h^%sH:I%s {Iz{ `==T#{uOJ7YmOXh2hWTPopwꢖ 7fx`}MUb6M(:{qYo,AeFZ!= fzuPـ YdYP?$n`1e0$smkaJg ?#EnZܒ!>/5FFZmpkCM!m&+.w39z5;%x+#$dշfCFQԲגY܃!>^Ru+VWLj}=Rogץ1djڶ;?N0"׀W549\ ;wpr{tl/\M@y.1躑B夜/N Ò\,~dY\v>MH:)~&uc8wYUPC+_/ G6 g1AДes<q$S=׉2,H !H2U˱}e)hqŻXw bֿ)ZEm'l) G"47 MM"{K~vu %jr_-g_yS -U%^ U{ַ[R7 EYW/J<d"UA{WgvXBp_5iN@ -4'^zu* kU6)]䈁O'\)%+cI>:0l+)}yҢ7XvRZ]| ITHdS=MpWVZ<,_ta:I Vٷ;(8DҊ"d ˔▬l/jw" 2ы0;RR# /L7LX[#f8& #WH*\!~gjL袉LZl?f}( fZ3ľwwH$˥X0kzK8ئ+ Ps)W&ˮ9': mq`7C-PnaSamNw R*TpN"?G~ުre2O剮Y} .Ӄ'a[ 0\ݫp5ur,hYP}.XdEb㟱L)EjGO@u]iԈ^-f;%b@oCi|{RD>Fioo>Q|m)a>! $-ސ⩢*1O\:'Br as$l>\崎r'hD*.i} #et Km@)X| ,-rj"(~11͑-J*]Ds7|r 'C|ܩ_?jbSً*Y%AR"A+.z)`suc?S`:П1DU3/U hr'ێuIYqr]pZiVB iD0!Iv*Ym O˩-4k&( kɎ^󯬌Lt$a-ɯFCbRZ'Q+j B 5yZO0oDȕe,),Ei$} !z\Ag2:BpN.#_dUCk`W'K T@*bemB"JE*#(FS-"l}t͑w~Xh,gV}d?3ٚ~  HIip ?! 3ʩW(VU߁I:MmmG{P K)U9hE;R{d>򜈚 ɭ¡f)3='(6#IނL2xLHBv}]!؋KOE0zp3k _dPǫ!ש<)еGt?>Z̧ @U-W4K;j&M~*~^L{(hEs w)tAHK?.&n(D$涝 u7veCe7~cnmL?ъhL"F͢..XEU*;R,X[*7w\ x^{o>Į6~xuI3gL#d,sz-%mOMqӦqŜ( `,%J@ǡ"8*If$A%cYhb1.~$#_"M1iw!)(گaN!j~aoH;)j u_Eml$ͯ8L,<b͸xHM,QVؠO!UըNub;I!йcSj}(^_N'W(pDw{?p8B åum|܎^G R )\Jb!) q*q:^~X)?Կ2 :h6[ ?O'INYS8葬.%|/ >JM1"stB]`ףf2!_O1PE8A\ʠD>#q)ɘ@+ xIkB:f'0SI+H0@߲:ڬ// H w#jmvS_JT'd^nS^4+!IQmo!vN[o~*0PȚVyHdaN3j Փo3k&[nK/eutMbAV'u;W::/CGrckJ߬_\\O׌6sk 4 lu%O"d~@8,|=n(wQQU;K-6sT9lJJwc2"P-L29nB-'f.0i uЛlu$,aa(Jw-=NS&s䉛YoJo~JstNsyDtj?JRs6Ey# "oq+/TXUzz֠:[~hDĻyx"׌Nf h .b#i|̔) E%n8okKUk.Qꇪg!$c!>zaRAV " kO+SmT2/aّ؉1Ewz%-+2Ajqʢ6\k/}Ji}ΔI}$žW( I3 M9ƒP Ro8zlyљj2?9q,Dk>?/gǻډ?j4͚T=v \'s= 5!EEz|Ύa?Έ7>}i". 멹/h$<6>mpu7i zb%<(Fo!2LCu׼dW39{jջ`OB&P>o~+ҁQ&>̛^7w!:ɋ6ӿXǪX%OW}-ǫUpg;Yv.2E`hKF:qHa&qyzپܥ>Zon"ܴ*k)B~+)=ܡO t|b1?UEmUg@NU*UlJp,X{0`.X8fjS8f9cƯZAogm:݅_|h3;Uu1bʐYߧS^O[Q,xXQ%8hr52`N5d&`7z6q;v\%1I9 e=x6#%7(In pb<9tEF^ \yX8x^ZgXVH<½ԡ l27jbBw̘FJS"05xehgH9dեMG'3>0SjcH|.4߱P@ҥS^ Tfu!Jg'0 pʮr~FyˆBDcd3]kR5fe,2>īO ]6/D.Q@R"|C\ᡬ\ 6i /3yP0J6OD1E"ˮN/- ٲ9U?_{,Zz {EV^=2 D#]SK5>z74Bb@; PyeԹŻksW˨zuίj3,`k۬dLEBX;/w/QLWk/$?9L1 7|~:k箼)xt*3HQ~ "QN@r:!?2Pԏ(⑲X.YWLCk aQ)7 tؾ (eR.sbDŽHUzkLg^6<zqL(;P"( Г{P}yQC \=_ҊH@8 ʆvH:mASFoN+$+d2;SRBGF{lWw`o޳jZ>vjb$Xcۚ_=,]+2S 1sl-uDdfBy9&l JzeJW_RA򗓩88:;OщKYWL7cɘd+tQĪmq6UN{4 ,Nw~UJeA/H+1:I?1CDAQToյ3Can|RGvөZ `*_MCS!Ւ5#@p]Lv 5h SlXPVVt:! rF^| 8wQK3grŲN)NsbhfJ:5:T=ѐ_me m"C$ŸiDa] x !ϭN;-j$w|$S\*$nFњ+h l6|ץOᕚ՜dK;׉˷O;ZXNBQ^犮b.ȫ917խbvCLkrYTíff' )Ue$$2F02Zgw vZ{> ?)php^+=9`…s ]a.H]8I#M/ǐ1a[q6ypTq!G3򹈋J`XziGrR/.d; qZƺVhFi4rRh|ҴMY|<ژ Ek܁sGOilS 4o"Ɠef)dϑljػI15KJB}`46*/Q5h@øAЁ dž=w;[kхx+CMa":ԾoB;`^+|ncϞMs >[vٰtQY3^7~=e9Ls)>Oٰ ͆p_Z~bLv|l R=zWdSZVg=A򁕮'Fv?PK w»\B-,7]0Axy^;T؈/tK)-i0 02e7W86e6gR;,5o9nkwqeT&hr^?4ȼ,@ON.jz`tɮXeoe ;fXJ̾K̩h%,{U\+j rw@ihǀ9lTڹ*˷ %w֜'Jh"7q^:r{&k)It: E;#YXVm$aJc= $:tbD)D-=hvXòϗr|h`1lM@^p>Npʑ )OQ"в"1WdlqȮL'RHXV~rTC]f`M'lG#%3م1(FFCg)PQzF4M H,(9uj'mWP6/Q;-\@ AiЃhcY1}SZT Dҙn$R.1A#]> = ^C )FNƔ{=5nlMцX|zYq ċ:ɗ|ë#/"уPDVʦ3c/N@Jv#+S^_D/c= GPCd=m4FR/5*h}4j?׼Jv7_``^fv'u'GԮNtLzaשMu`[ߵdɝta>zm.k&1L:T#'v /3=Hyz~]~*m2IЀNGW< &fio_B :t'"pGX kt3K3 r5":rKMw RXvWLvh6RK?nY&mh2-DA _?yNr?<5*Co"ਜ਼H׶+]GSsLCmfB(n=Jh!Iq~MpE3t4l߻?u'-%02.f5A!-pH)Bicg`B? kauS_!Z2”K<@ ?"\bCdtJ 3&\z.`1y{ܼ}gK{g)څFLzGf"Q.x^rN6̆J #n M> f&LJn٣]K*tU6j:%92O?#pA/TjB{(8:f}N&]6P;xœx+PGF[:QEH_jF'9!`!|:>Y埓 ,=NMxcs譓rz v&{;o&J_0wU`J̓-kQhvCyR+"9ÚMeCv]*"#̱@b p{GRÐ6GVp~eA^Wl[RTEH^>T7xya{yֻ(Oh$G _s lxL4}86| Yz}d%/TG1o`fOӾZ e>0Mm+5.\*s3xG{؎n<(0)C7F/d/sjgNr}ջ# Y#"? V6ԑ}]qHK[E,;molXodDXċJtŝ fjl!X[&v(KchN\z^6au>:)~Y}4p0LI'̅HI@famY[g>mnTѠ`Bz T.s7&(bG:,"ԉi4e8jߓ> Q{Qz1Jpt. QPo~MۺRHڡ6g]dG$Ng1wrDGq@'HT"~pXZF\t@(,E<L_$qr.sZy2!a8}[@7`(>[u1M PWҠĩ#)x̚1i! OFO("]NWFf*7<±(80C>~fT4gt.^2~k2֟Lt{&z @,xBw$=VR[$}g?נL4$]6{0 xoG2M+Z{|l eZ`CRR.ESZ }Jh꿆QZFnMTl{?YCUHp ;,0MI9R-ՆBm Qϑ(Wc}&~ZF&db؁$nRJ}5桿F=_!#9O$ٴj)V[Gidݒ8hڬLTF 0xb#]UXdeF܇5^ChYm:|_=o01ʿ |"{<2nm(<PuZ:ApbI!;WЖkKsTi={lH}M U(8@#HPA* 6#-<~_@Uf]=!غt v'RM&_'깴hw+:Z\fA /1kONtOftxj7" 2FU-` ̗*T 5k nS(\m5laϰQޚv|0ET\TR6vtᛨQ.0ib!6ߖx-u^*8*mzs"&ߜюy;eC=q9:_ Kx@@dr( y"<]ʆD a B> ǩ [~4`F,pABF}IL+L&,/`alf0*'R~d sturb-<؄\]vI=asDx} -@lԳGiTw%ոȿhّ/3+1 !'vuw 6QqA[9 Z1cvfH- \ǫHrB`; P|д t BY67{Qd~4ts"{xn?|6G>ur̔ ϻe1\V`vH"ડVE[[}x%{?-CN•iIVOEM8t?ܤ՞ZGpLD-.1h^F.aVq\X$#EA(j\uWi#jv_+J;~p…8[E3̇^(ЂD 8o 7-'Fsa RbS<d3@TGގ "hyLa5=Va1xg1+ØcoU55/<{tO1HIR_5%pml[wG}SM8O2Շ6Tu؈ 15u=(i\xX'wQЊҷ,"9Z2n"`(q=x}cw`(C8Ti_dҞT~"RKeHˤdFj' ܛc{h`)Etx#]-={3bdה;ز35r%ZWU^ίq(ͮDx 2C[ߴĪ#H iPy WSG8xféyJV4 />(Y]xQ ldųb6h^@W'VbM#\I-E{\FQ4cԚoÕȖBzTa\k{I|U~φ!6 ,$GWL'jWFn75 _c/Hlr| 7F"IthaѥsF?bMK-a'Ӽ&2ajMZVŖ]Xfص:ErSȞttA[O0N01U{uYBkx#GO0-,g~#8nѤ:i6M &DԮ`BT{8b&_U<8״ޅ_ dr %Lo?Io~v}.NL/ 3߈1.ۛV513?>LKƥUYC8u$\ʩNe%`_Tx^㋧G4@w餜C%q7tMZ ީ*A0oou2eFӽͯ=[f=<TmRqJmJT=~U/s!kn*`ܣOUPs[y/t &bl9t?h7w @Y[$V\d [Gi&Keiwd^"ݵ>zOP{6m? BqXXƹ*иc1$ p/S$5.p'"͔NA2 oe#ЃػfzpAL'W~EIٴ;!ޮ/(cU^9rpJ| hN0|CJ¯TtŬ(w*IG%3~f&v~AF >C6ĻV,4VfVBBBcuժ+/͘ˌY^KQoOIK^GZbeRͻv͉ƊcxCF54SÇ+2}2 `*Tnᯬ]=O;ګ/ݺ<v; tCdٱ\<2.; |3CZpS=L(Na~B|xӈr']&Ym5k]4nԪSzMy\1uMїSю0?~vQ?_OlGQo7$?TrF^_OHj?ե91JUD!rL6ާ[Am"ut7K&:(I&$c^,~Bse~CnL B9bhl{;8*v9sc٣ +];RVK=S|(Ptq}<*r ʯJz.*{2mlHN"XK\cY1z qʭn Axp?dE2]#?x-nn/'xL"c %$%;DTxU6eRΝPYsE<-mnT(dRǣ$}"5W:dBGXPa9LfH;6[,,Ԟ`q_}%p$x4K$2v B%f͉𐌰?iqD4[@;nLY׉g I%^/JPò.:*"6Up3T.ض/K`k:OӿJחں&I"lҁVIp;Y N*mEK1oB#}BZl,lLA}Gw =;B.Zk]3|*!uzq`^ݸq|Tu7I5b*غl5o5EuNkQH 09\!^CtɗhhGHJCO-N?7ձY:voz {>ߡGFш4S{aM_q(-NT1kRO)US&e 3n\lhoPnOxx`7⡰]Eއ:AaoI%h[<kE62 @㥘Ez@< qV RpQ!HXf$J6O4R) ո"fAuyM ˌa0|U}1GEQw|ȣ  g1 𿊅$B(Y;[S#RIVos,ءvӗgޓ |;wor J7,rFD>uǰ(8p`glbG2&*w56ċ@{pt[ >:`@]rr8v[g 0]NŵN+ɼ2"QzEm )j/f[qLב.d ݁@qL S{gO0m=YJKyXSUi} 3䃹z";0oĺAൄnEG^=e y/n6qbM^lU % u*r[$''Eu7,ibp1/t=I2<y2` AQ43j؞\MB0W-^P0{/D(/b̧Ko%O sޓ{ti91fh -r:%_唖ך!}`\Ls,nLo^pkdj4\#sDMkv U,h M%lx`$L"%UWXs.PY3-e>'RW&L9l$KsstE s q}/oIuˉGsr-4ɽU?c)'e6delL6 ega$&\x({5w%\Lhz∢t{Ņ_PV;$,A @kf_+b7PsuDD2߆kKa3.Ud.$Uipf|ZfL2沈aArZɽjZ\ PtL% Mq-q:q`;Wk P$)k22Xё]mRaw4tYi$˾mwz=Yh]+x ~$?ѤRq*|N.mzF8M`_$A2+%n1IJ~)-#t%/.5b[J7Hvtz$v/.*Y,X kmMʕY&Ճa4MDa썗} S0xt 8[#B޳5)w](E .<)JY$bsF7q<Å2bW4pG(Λ.L$*g ͘üwګ er*{Ky9V8A;Ou+)ݺ{/%[,Pexʞ>Ӊ]&H1EDD[YL?VS6m\:#Y|G ̤" 88KimX~@2Rz`+:"3e™$X2q.w'@j`̡FnP8̴sQL"RHO*35kĥRf,]_8e̮~8L H5(} 4 bqKamMu4R:\c y*1srDyfd:khd=% 3 /@ Lj;%J_mйel8q~|GY6T[4.u,,_Av* {  kC;βf=?־cƺnӇR߾;jÂٚ?s ܩg8KN]@NC1;B2$\|)n>}Ct,cH"kG@>h`J-U|8҅.lrdeqoy/Vz"P%]4-ꀲ^P'L`|+7+ bidP/U%?k An=*~q3D5@KAcq,p."TL"<&̈́עR=K(*5DFjFElKpxNdSN" >3[~B`r}AhQ}>JhIHA?pй6m*~$~-]##? FHJ6OtPҵ2lpU d5|?T#C\t`Höq~f);%Z $2}##ͯNZ:lW}&,Z}Ԕ{歺a(v33߯$_i8ng{Çy4*C0`ȗ"\J2\CSae1r %sSr*Q~Nt^:~}GsLH˵I @b&G 7CCyQ׌RMn&]z(W=@ks5ձvF;<8'^<&|o s߳_'ڦc6ڌCrbSH,jd  ~S4wK4Q,G0s|7}ɋw"->}R9ګ!n1UdhW f 6>PԍyY +%0IF8cvq:-c l/k3z*=r{190X)wNv<9O ȝ͑'"h+T80^ ݍ|{8-R 댟Sm˹I0@Ne\󴾭l%o pi]K[#|le{ K0%_DRZK3AO-8n ({TȂ#D6;ŝ˶ʖQa2cJhZ;'@D(`Mv*ΣcWig^ƂN;}9boLvl_6zOfW|m> *qI0mJwim>*cמzQ)U=D+"Q wVPԟׂ#lCF>Γ1j wMYO;ݫ 2#ݰt~AT5V} ,`u9aIި{E+DN䮛G'.\0ykRqN| .=c" adZcsJWK v[(7^Ʀt GL0j;Fڹ8<3ewOC m7.rQ6q D`RG@cXDj~L6ш@TbS'P*#=Po }>}46c8xUaaϗ#U*sgd}|Ea+ %{VG+nqKi 8b[qwtBvu,O9^w4{k.|:-/Փh̉ rdzGvqZz%YZBs}vq <%L=^PbNHTN TlV(*VMS/#fI mΈ]: SrXKH29o$_<3kXF֦xHaFĿLBmYe`h7cq_ _?T P o]7|dQ- [t-^x}m^.!]vD9쉆FcVz4'a0%_I9sY? aLF`l{\  8եa &W#.KI3bwl6X1hLG'C)z@j$.w(0cJ=LXl-giH*ό  c\bpVM;&~TKD\.! Ǻ{IN ֒5ʺ&ǬS퀶z4௹OǤnhh~0#wB]ã9z雺6tVze[" ËY<ˍ*ӂUSɸwji?Ssk*t73ng@.f Y];=L!bB[yEIt-_.* n~ۛ)P*rWA$Y9A Ќ'zLBSg1T&4BkH±AcR'Oo 6Eݼ$azQap8rip1r& 鑮B_@jk"kV'255 S7=fR}}@LgE Ji*D셺)'\'};|7 %h_vu٪*=T h5gܠGsnwv ,98S>z @֨v? xpSq-g$Čʹ`9Dk=78ԝ-JshB|!fo" i_‰P.!Ai 9W=2Q-W)KE,hf]oS@j":nz$3%yN/|ٻ@.Jͽס`fլ;/*FJQ9?C7~tI1H;ggO\Moqf%%ɚO;[ 1#Nۛ&/rsH -FVzT2 a0O[ i] ;50; ] 2)m6YtG1 ?Ed;Ks/Ei$u$`5l&ej"Pxo7yVM 6lQW8Wƭ$_mxt˄D )SP2c_H}]D^o9褝a/^bJMh~mJmO`!Ok(;5tZGxm g(d]]ei&w/%pQ" xBr8Y,ŧF֊96P'?_heRq@u4 -7@n5r9m>a1A_FV"="NJS^eϛr|wCaGg+U91>X,rDw GGs#.x\Dkot1٭?8 o^ȈF[~u`DznIΊg)9+a9#`r-0gO3R`/ƭC4 I({AR\ -; Ps9ŋo'~ÛfJfy;Zրrƙfc?/.1ƙhT`^gC0[SF=.\I_ #RgA"w JgWFhiaaE۰Q4X(Zױ6\GSW2?_ώBDE Ntv؈˟x'nj(OxD2)[`(SHogaBndR{VԉQBMPZ7c|%st뙵8"qK#X<+[*Q\앵yyOq}(jqĬ1鎾Sv+jlG}(0Rv,97EH96kJA (T7/!cɻI[ 0/1-ReGm]| z 08HAV$7%\h& L`A&}ŁKn_.Å X ?=V:Ov#m 2LMRQ|(7 sf ׮^DԺ+emAn4$A+8~G8vҀCl#$ ܐ[> Y̴in^7u$zs5= >$(0yfvX^{oWg">l[{ȝh&3Y~Epq}],,a͡#l4T>-.nTҏ|)FeCp]4ˏ*~bRa3C*N>`*Pgv7d6I0Q Uf@}lMQߑ0G{bڌiŤFƠYSma3H{0XnF;Сf%NFsf^  #t)jL%XF}`Oarz,DjYuRV!ց۫F35Mt}Dc>ٚ15OSB/\h$7 ѫ|i/9Yґ]Vi4Eirwp/{֬\BLw@ܰblѵ'q1w|V: kFyy̙ T^p_dYq2,Ӄ'&4n$x^\jRH9ŧ~uF(Zh 2ce!I\A*e4N^P8ύEĂuޚ} o*dA)J`kLV&DG:?Sll iU[Ul00*<6tR: [x[FCzetX BEڛnWj<ڵ9ތلGjD!Ɛ ȦK Ht,{ [(ʏh V;xﳪn/8"u(N3oT6( ?uKO-3EO <ОpV3|ģ&S0Xt>̺y/ Z΍7-aҿRtjT@V&]1jASpܝgn}@)9 %G+uƒT,񩠷120 U|f1^})ZNSs.BO@i`n?LDґ,9||IAHw?֩ e ~,+7/c4&RC;*dBa1 hbq!N}|gݻ]i@ߘךF^㔯ur{?S|C&+Cv"@45Qc4 s/fۋKaꅵ I^T.qb&z5FF)2 A̐rjbݣpRM|.sj*5Sgh9'4K9 2g4C8n 9U7Y^>bޛͫ]%DGm1sv,4uÑhUwi (Fι8_dȑL @Ysk >o^w\Ŋk?GH.T.& o; r|?l|)R |D[&$^eDa1tYҽfNa(5J3XIÅ7FQ}  9! =K8+ JXdΐY 6۫oL iJqmV!(:=Aװ:ݴY34a Z6#uВ4#^F(Z'Ϝ7v{q$ MJi2-6A#GLoax5jayGS哐n>K|b` Cj*I}jp0UAMV (bWyAVmcؔ 1|lM,?t^lȫV #~ejo_)C[@Uh}$[zn{ pR3TbJ aM$.->`n0C4 1J/r |= `N g\)e5xIķyH'#U#.;9InG-X:mUE)IxDοri}2xQ.4(U&@zz  z5uJa؂c'n|B@kNc{MȎ5yzsR[՞,;d=KnӞCe&eF1@PӪ4$+P"K['L^+z wHGrZ5h2Vv>}4hL R. sFE\:3=_ddRGy^ei{"`Q ?v]ݟ!%(HOI<۲Dt1ͥW"甴01APP8:yH} <0kq[爔 W"vmW^yNM]sn'#Тӈ{ 0PīDv wb9肞FM /۷]ZV~;Jh4};eO%UXIF T^^S% y1krެdPG\n+1#;/Gi"HjY+C@Itd@mP\J+DJ se0_^ b:C^Ӟg>?|M*YwC0H(Zi-Yf3U"9 a=)v{m'7E퓤M FǩB.&~So"]ʊ(hZ0:R&Bb׷@ʬ?t); 6^UC ~7Dpo6S(z=Tu'Z8t$zɨ^nlMl@y8LL(/oHF# ;1ޒ TJ)Ghyd jY1w&3_E=Ma\^,;WUC_ӈK9oQ#)V5 ֶ( b%2i^Ǘ[~61)R+Qm^2rV4)<zy {GO3AC$xѦ8OJھ4@uaٲ~ZФXSt3 ݏd}]7]+~)Yr m#cQi0ߍ.!w@5D J˦/qǑh yB ZN,?`Q jc7<Eb3s`l6]cf) evWgл:7*;yh3~L / %c? fv2m0蘸V wL8{ګt3 6$9">15Ծ-+;yt޻ U'Y^Ns8^U$qTLRvW HabJq7%G}γtY{:DGі6vqq,vTպ'Mb 6a Ye(j-qCSWG*ZCt$<~ j*İ b PR4Jwz1Z<3UP r}OB qZ}NLfmIE朏\:H_9Le82 `j cI"p} FZj'V{Od?fRC 7NNCm%6WͼSϊ6Uw˜j  b5`jck: ޳{Bvb,DJRVоG<ӱ1[l=1dt;NWzh/\Aq]+XHP)`^3`sDj3C*nW-{1¨`Ix<9-Cٜ<7_M^y 7X_IoyY%׏D@:LlGOWr545>-}W$Ur!# tV^Fng%_ݺfeh)ѕ0]&GYHPL b乒t)+fSH>Kho"*V-OL9bj̾=x$ۣ(aRgq= ޜ&B JbiTU͹Ked}x\ JKL:˦|'M 'l3"-GL(Xcq:+ϻOlsbKP꯵Ǧ '3yb5?HqVhVlF7'npadΦT D=آ4( Z$172,xBU\% RuRg2u=r3 LU|\pV,[fYSqݗ_I9tg:} ?2UV&MWQ s5ӅǠlŭC/gTβyrv}L&i5j)ٶ3G={֛Ĝf c6(BHEv[5fEǓ$Wt L}tWC s o3>ۘQ`K2NDCCS'X5-I t͟=}< +]݆Q Z7F'}q MW\%Ґ^WT<(TePhb8?eW\0s$;WK%SұuQ޺Mz:i)ً; GhnaC{VXz/n{[<4M쿦@]cbߙgL_!tWX#/%:^1Rf u3*em1qYZ"ڱR &/Wӳ.UvƇ%Ϟ<+_~Y`dk3Q QR 6电d\C~M|{ H+x(0 eD +J]P{b 5ljhtS44 14@`}Up(EQ!<3&VOX_ej!Azڻ7;;A߯ Mf|_(E]9b$D-2uLdwi3_1n5zǀa%&ZFkx+ގy}.Z nc78T~#^SH:Q)XAb"i1 s'P|G镠NƖu:'[1Uyv& P\eg--0T e`&`T;xٚ:bN[ ?^ F:(AjOmnQEۢ!n?Dw(P^B~EFxr$wSY2t-rbpRb|)IIJ#VF:w Mf&z$'f}W8W-oB )TY毊8[]..!͏#ڻ:Yz!G> VɵbC/ȫ̘\}ӏ[v :|F) J \PLb+KƫQytS`[qCߟ?e6H۴R^xl0+QֽadSz+̀W3օtkO*'2Atv[c:T* b3J# ~IS }}\4ZTz9 @F5Ź\ڗ=DAV6z?`2 omd*sV,ugʴZ%CX7Jaܐ),@/1p*G2+M"T.ɒ 3'')Cfcr&kb|M՛FltoZ"[KeVQRN{~jO.==:dnP㇖S%CGU+\#bxDh,9sL7o2`7zK 6ʖڮ}*7BԻB7w+t~Ds>֤I-u e[,MA qoiUT|dxk'`V$çg9VZ"a5z"ᮓzF#8ZwĿ@")x7y*Aȉ-{Q KVokWj,{ENǑ>޲MF+w OHJriP5>P0}*ԙ U" Oۿޟ)* br3$Z8i\L%0'B!B _,#a(3C!MѺj> Nvr>}]pCIxVlYw"InGSsf2A\/a(!2rE嬺VI'ʟCq92MߩE.jT&k`MMMRYW"Luֽf,)UB; $YG~d7\.>A;v8?/3JLtLpzfq ~1y p@v.j k1V'V@AS _R6$i(? Fq;1U 2Y4d|Ldz|9wl6s61o?f|&J!օs0DS| ,02cfiU*1Hțq,SԉBwl_2؋ h9]7./޽ =(Jr iԾs>(@M VMkHv8sm6P}0xHX4_{Gu[ۮ熙[EZapq:Fcg'uԈ/~i2@örm ݒK=ʜ뎗kcF!j'^(ʷrÿx-i<m:1[/P|y 67*Jk/N)i(ZW6Phyu-TSQZL5O撄ôƲ}1)gcMhVPYՅv#maRﺓC xVXz5LAir@_7eލYBSE(sjj[}evJǔ?{ +SRݔgVȺY YG.ogHjU]ʠ4{kVÎ6-Z~ }<9WQDDE>tI5qbW"&Alyrrd3G+“ɪ=X]t]JZf;u✣$$@H-7R4綔L/מ Cys"oح!˕)"_bÒ!녛:_*Ve~-7^ҤU8HvbI#TVT7w*8tSnxHD˖fэv':m5|&G鵪e-_ @=)3jG$Y14Q累$ybRlW 'VMaxe9q8Rϖ SYʏfx^0QU`m>(~qTl1ls%9ؾ1IV',bdEr4pWҚT#?؈9Fo!٬|s 4]}v9V<+vmt[ҳ]rẰ h ,stUdRsWN.;EnlH1yU{%/{y]ʌŢ,iC;{Ģlە@}e \x͎5F^_;z:0!"F1}K@s~{gM]vDNms=O4qTtЇoT!43ߪ87F9M}#쯐oT K@0S A]Zˡ%(cvddgpI+4{SN>MZ \cyr,ls1sqR_5bR@Q w`%\3Ҵy>ԝX4<]r|Q!"@c,yr%5*#TCd;]YB֠ lmp8mI"DdN8t<>$\'? >}F %'Ԕ.%wF|%ԻmBa/-.&(PlI [o:iK7ǾK7$T PѲOLwNP@ucidQӁҙGw>I\lFtqD mMECL˔ªtDڵO^Q ~\"^JSH,7y{9skGRxN.Wk;Y gB b5QlJ[5ELwo*w[<\1DEHjs$EAt+N3-s \ź%ZE!{d>89ؠ<:S _=Mq1:VuWB *cS*yjx(7o^\9Շ?ͱlNЪ|LQi7ESQ'ar*Լޏ~E@ 9y?4#8v?MQq`dOS~`L̿^r(V4sEꂂXRa|sS/J.{T]L/DlG;kY74KZ`KJjp ÓWhBV Ge(:ᖗ-ͯ?T%iu0TWbsU5:YgqaC Ͳ!)AhҀ*yjԆpL{e AsdT,0V:tqSd ɢh.>rXGlO"+WU/,ن/hug4] 2m.6>exB<ch{$ċ RuC^HY+vD.IXaErPJ$e2z ާ ~,K6 _^j&Sl5u{deNUp^payvs,_LrƆY ^]xm,/6AĮJl]g7ӅUuP_7셎.b#HRjK˳x5q |x3P[j6yn vJ"qx%&m,,l꜅Yr^gv'@h<Mq1_nuPh$>6vZnyM"WpV<037MoEFL4"#2?٩6+zT?:s]㫩r)pRh$^$ kYytcZ X, `-I18h fBVש/'(M!@{ `DR ҌJb<B͚jx'{&{dNpO~"G<JIXFDwVZ:nQX5-ZfD, XDOw.?UmT! o T443KLB {=Q= mķD5.2Lwk/fyڍi'´IDPr.C|f̘;}Qfxx gL`BLJt$8e+?"Bzoy3v8ur !T]~ȟ8}[r0e@ :F=R=! /΄uöf5QR*rAM:!g"߭%Df' ;6Mpy z Ҹ }QÔ\P(REі( rHfQ+NGDv/cC(5g&ήIGA3,5tWxZPȟӝL|t_5uQp lWQp4YSE)6"&ޤ"~\Ege9KEY4%T6XǠDkyWk:`t/BcqiTV8ax9]uǟj+ j _P__]L70,%D_JYwо": ^d4)j%"ˍ?L(XҦu[E:1qُ ~DxI/ ; iRՙ| #KV꿿x=7!:Rpf6;\g4@dV0HWDM12G4<}Z@_45eL\D8M406뛶=͐v㵡M/Sj~ C!(VY}]wﻌQez8ntDah?f1ˤ,/=WHnum +OL22] W]P819Ǫg=(b#g ] CcNXiyPMonOIOiG4?GLx<"6\Kt15QST Yʔ7)2>.NJ0'Qxxяh*' 0A!V0pHKq@G -jF{x q?.@h*;7eImgܢՉ΁rcv1匞YSf>pa9NH_u ^Qrߤ1,+ 7Bs `=403)w4¬[0~{Ly~WVUQW*o3M)9_Nq ƒIy֦P]v1*bn}Γ1jb}Ct 9@CqhtgS*4-!14ݜ;=| *zٷ׻tFtF CCdԗ[?9 7(uSx I܏E&Vc1 Jo0;-}>-D: /Ssd<ڠEH񿔮Ryaپ^6LJB$d"K^*@\a ?mAׯ$~\X`ARz:$dc_./KZjG,Zx9ӏߋ-.6 ac1%ع:\Α*[矷]DT$@1} MFmgxBI@p]],Yx<''B2+VrRsqːJGИ/S)ŘT/ z[es:`7m0j8MܠrOI qUQq`q.ٶtηg1$ 1uZ#y˷ݚBEgN5(oagj҃2=n/n֤JkaKl[Fu.φF`TlN;\Ja(+pª25W%D{ā6ŪW>wQ` 'd{ɵ8:N+G-]DT<65(Xp{~=bFFvl>[Q{[b98?|i-#kl Tx+&ҿTԕ33To۸[4FH}IG (Cu~%E?ABWHˆ;NI᫄UWrsb&`E0ghؐ՞u%5W[G抪hjm+[0oazM(,1m }=+~=DⴑKRwѹAᥲ2&_cdY bn+Է6 rx(Zž?A4K |-*m;j1pU  |IShr Hntg"-z*K$3bi0Zk[L`_:>Q >tp!) LśUEvv5˹HsA Ғ~Ȏ=&ﭽ4ݥZa6d¿>SX̡c_ NxBȿWm8б*ok,7)ʝ~Lu) 2#9j9&ƌbzOnq0 ud7,iz|qǗ39B8d -̲4 df"+R vچlH?@S/Pv@:K3m5'ۻ*s[j+M/VA_.L\yv| MfH=P&)`$Nyr$ϓtǛ舏J &V+/4Pn\U[sG=?U0^\<wS# \IӸ`^q>kz؃rjkgH@P@li7ҫRim?d8%EQ1vn<vy-uƭa@Ks?~ Z}"GLM+OX@d RMI-2.$ LO;OxhWdvEQ_3ߨelݣ%hG?[,GaM0BB{U֋ \ޜ$Px"bI945EM]z~d Gղ͎8. i}KY.=DK{lӤq BPY7_Ɛ$2^MubN;d_T><#^ U>"~4u̟aFU! mx>6MF(w:*;z%\:Th*hbN(m$zp\46/ /M@%ZԺO-0aK!T>帵JkP"A@ؔM2j$g.Zv16(Ǟ`>=)}'b:Az&p.wlab@Xn16x܉{Ďm~\lʩ`2}J ӈq/Q?YUCTL0D`[3trϗ1,p"2 {T{VlZmŮvΛշDQtpd[OJ=d+}G5 :LlVˉ[HF_պmoB'*bGfJk(m|әWJ0XS`*GlLr vբ MuPì gƙIgT!T8_ nJri c(|Wb&DS~Xl\K/AM&I zw=Ju vUrPY**/\2LyàóKu4 :TE7y+T ?Eф$zu~/U߽zA$IKW{ޥ05 Nܙ{]8fgǯ-?]gOZ F~EO*Z򌴘ά).1h dS7#zF^acEvvAgD1R4) +LcauBuj(yEٟuԓ&E 56.P*(Q~\*6tqTa;-wk -ГЉԜvZ4C%N CC<%+~K\2G<ݢjbZNs4j_d-#gܻн%ύxcbݯ\ԛph̘N ڧ\$\nm&ֈwS9M{эmN4CL*emb7!3^ޡӡ~VڽMyNAe=@q6+J[#yU8qf-#/,E*I3%@A>;x7:݇(^LA{ʴ(WR6 S@4"V[Ϧv,RylK!q LQ=]5`)hҽ ~::+yHTVOMV! 0zt>d`ӴHJ+.%Vk=nE3!A<~fCcсCd+qu }Bp.y$j Ve݄X)7vGW} 꼝_ sS/QE'* Y=$WJ(ZqtOh@o ^#|ft/1$V<^{RgIp3^ ]E@Qy@RDw_ԝ#F4 y(-+BkJ6=^z-H)ccƎIglLz]r7tSBDS9yoϦ~:BװCmd^a&8RȘ[% fZǹ3*1%JnX5 e4ZNLk %Jo0uiA뷥A Z'3RJ0t÷2kߴTI;EAp3D v),,_3 @HUP Q $ݟ\dvgm2JlK1K"[/1p:z3bxZN):>Q9ςF pwY~;o_"gE*70AQv7i+fo0>)_߿%J@91ME]҂Z.ufdH:/3e1Q\?[!jkP:&EV Nz4&[Pb=F.Yp`cAa3ņ^A峕5Ʀ55%8$P0/@,KS˂Q2JcۍΗ݆%ji?ۂz@n0=kQX0Zc9{5g :q tG.@c2/\w}ҹ0 \L-F8Qdo:wؚEHWJ),IB2.ᡞa{,-UP¾Th5s`PzU+@_Kk<h&3#RpK.Ȧ^3<7 d_n8gBUk7o[@ ?HdYaEZFL`&0W$7-ei}I ǿRbA_Aຊ#DOM;zK/"Y<_0TXkZP,$eBژu TyqEL)g4]Ɓb=R<7N]htH ۰`דf7ԠÅ{F{6!uoL(.;{RH `!a:8Oŀ#V1&Gwom9yQnz۟?y~-;i&iל^^gr&G31 ?VnmJrNb|U8ލ08?Ϩ;g]p(=r/8AÈ>/6rilqeͱ7wh`;w]ЪdVe63.l8 ' _D[0bMLPO%d؜@R?6^'H_;zSkBȌ~V$8'|% 1L33]ؗQ.[īB^E+J_:)S35]lFS!cGJ/IzV2rL3i4R0SW^YU-w ˥8-j!lrjI3tY Chg6)Eο匚۹A9.4bUˆG H/sca\WMLlcJW :Ւ4&!q~+ ʍ`_A+TdJ_Yq܀]|9\I- yȜKr$oYcTqY5DAmsF@q ,1'$-}aYl?dW,v߬?fɲϧS" y^W@&|MdşBCEyTN"mg6淥>i,g(K#ߏ>l?:Pν)&Ĕ.@N!! uࣴf3)%:byyBRGYZܴImQ!Lu: =4F8@;9P\{2G τa3tDkOj|~mc-)0 zm_uw|ꑧ$Mӊ|+B_|kP~^zxFjm5rDGgf^4{3?PhBpd:)Gqh C%,N{P-ڑS4gatQkQs;Y0~#D(LK(EKۡS#mp TG$]9f1"^)@;@yTl#m]tǫ]4-Gvx0])\O+7m(I\K?ٸ*&ׯx,$ %:zx ȷ#\αp5X?7?njLZVqY%u}z{`K4Z50e`Yּ]R8ɸi@YKEg|ʞxwRzQqLToub4GN>Λ0uoCpO24VY-gXucTSN%4&~\ʒm#bd=n[,NKɉ]qH }xI ̘4t5CLs.*=]ɛ(MCPѓmBIdI)7vٜ/S  MEDQ&?FmBn}ޢ✯g*\x̥FʴyFSjXNe`'dJ`E_]! ( <r" ÂP訷Cu T 6 I.A#C?ÐPتN;H鋑81T sji)ETj$#WP-P{unKԇ~ᆅLQQvϸy!oDE s5d>V[#}D7X',Yb,lcֱCn]\#.E>3wƛId 0C-Q,?*F]W*CEpF;a@$YwVf+PheUMuSQEDh*vx'ks|IGօ=[s\~LaU٠[ŵ(@DהUTiX~@No3bwt?.B#ԡm͜s9I3_6eYc^{˜OVXmZDqD.WIJ.u>,0ruQ(%S8̐bI98 !=xt'gQ|BܽnD8 ,*/ ) W'򴏞^;u#%ZFl i\)̙&3J g”#mqd$\SS 7gY"acM̲^p':<^)' ʺbJyn1L{4w>N1YkPVV L.d\@?1!rܠblxmD﷧^͚ox.jx9PlEN~{0 2C$vFfxtVeSLť@~<*HCK" .7!r )Q|@WeaRg6 4ZjQG5Oe I=wCIr|q-?u/oF$J{ذT$Lx,۔} nεvnι=k4U!FU][5 v@t0ϮaA]Zqmsr &Zf3#S:`lJv}T\գE] S0_K[%RvG^a޴ZyAaxWkDߢ+@KXxVJ97^ƆeCDb_&>B?4OLepom̲HBJ< G8uŃs%'>Հ]U3#\:HQ7lgT?&xxȳ3yyѶmqGPe"PǏIlo @se#m{C#5oM{GRm@Cb;yqq?vI_ NҮ(#$DRWy χGI|ͷն aAO͑(sd=[qԻg{&J*s-8#xBCϝ)-fPDvC;nu6߷ZBndi2ٷHFr)ULOYg'/)!ș9}7qFiu"W{A zpطZF50lgu?/OY&ҧΕ6g1+=fBZk#2/VC'1dv!.0@1<1Dt(bJlzU4aC!>9AH'#%d (#}(hV@i̩ đQ|΀(6ʦmy-nُЄkxp!=-D«o;h+=)_%H"g 7zRL.ɕWhh u0SEϟnHZzY $yč2FT+EZPUu5"uB7sKj d?DwP*%4i]εμ]휐gPo,6VnM25 Z)d؋UηAU_6]ۍ3leLƬ"%{E-}\Q͒ht4`Lhxfqo1p3zftEEcF=7mANw=p}26ޱEUc1DGpўhs T&&sJWjdS"6P%i}pЂJam3=#P ]RVzժ J1~As1&/T$s!)|7d9f4Gh<l(4-G@&w̳yx(bicA(xPm^H4yp oz:N4?eWw5k5ugCP5CSս=AquHz){5CLxy!>!J-Q-Li#EWt&V-D~g8b3UQ$i]0mqON7f V9^סRWY[Md8{kSyF>#+oXN}΁磑vcDgvE03<З9R抖 󂆌irNm䱿=!!WeS@8#@~Mrjϡڇk練Ȕ 0@"T]D (Ʒ އ$q*$;$-,l3REUi##q D>մQ֋FGhv. <޴.^NjZst7;un+iL*Q>1r7%}-6 Yas=ACgJ||p ϒsOr~ӟi wbvVd~ ˶FI1LFc80){.tL7"HY={%KPDػ}_ b[6޹ft&(^kg0IUb^FkXhk2*P?ۗx,nxKU>N0{O4B$|CR#2r;%(Ce8%vLjwxF8d _\_@1iEz#3͑EMZՕSٜ;Yg$ЦPc%R3Z &UǕ7{1+>r\ zEZD3Ϩ())$.l瀅G`N*r awW MدG\O,hBεp]L,>ypڬ=2/. YV\;o0h֯gSf9OJ^JCAM:GJ=2 Ը9a͜WP[?H,aǩmUR* B!sN<mOTF$w`ɉYD0l1cOO JK mk;}H>yF-*B!jmA 4%CyGh@F;0EQ ]\wh>IXǺTC*ucՊC }98:rQ$G }*FS]Ks} 6oC_yfԕ,aĴΝ4r3BH.^^wq7gHI"5pfa^R ]`)˯5zsc?>E a QBnЮ]pz5Hb$9M"ŮA^/Ax.K% QT`ˉ%#ˊyKoM0΅sXrp+V͔ >kGY:T"*̓2*gIl0ίJfbLnGc&FF:C0n`tF.MM5n: XPw؆ۀ>dVs{"j)4O 'ܽ>;dTI&<-`zv QAC5 -[ҙ"|si#G.j7{j.͑Omf"m'b&(Oa'PP-?+ȉhcA6 %W#n[ $*jxU喖U*q.J} 4ʌ_ob&>WITH BQƞ9űEXGzr˜$aaˮuNG!9p|musGf#Vlbr=U]䊱 %Iƚ nkq@!?j%a#ͯ 99#,;hRC> T0\ΖT682KbVc1`N#gP&>ԅ/GiVЕp42 AUX[gY!%b^EF~ftalږCpm[J|[xX 9:!X(o-ϑXUo[HPz E;yHc,O\"Gt ϑH :P:Ea\4dA lanY5  5?Pg97^J2~3^ nĔѧڑ.o=~#@a{T MZ~c}&]CI} ̂hE>qxO x5Rؾ>I oǧq(~yS "~(ɴ/g/sL6/O问_'{L WS BWryem]uvn$_*M23)lHŻUISt@cOتqCf0`灗6\IŬf wΤ:0/5)!:z my'FDg3i$ ]~ )d]"~v8♣f,Ѫ(|JD5+PƎh4!Rǚl9r? R-834.{Q9Jc#G:;wlPS,ݰl2;2 |\WD"xLϗQ0 yYdR s RH1EaS/PՇIoeN mKKO1B Iv)\r^ҵZϑ";:"StQaq6CmigL~+I&o9WΈ=51fe꡼ZqeU"9b>='?7KQfD?}8}|3ft?ޢv>Ccfvcl`w\{Fѥ\<~/jtH`a y/; 56 \1ޕG\yS3ԓP'O/*oLJ Ox:wZ\\(uA48Evsy ?@ ff!l&9|.E1<=}Eu9X\py_ko,jh'CZUS}G|-7~p-ؕenwE$MKƐ hBrXUf(ME>xB1P/In-e(Ө^@~枭Rj(N5ϋԒcGPE[ٰx6IN& {=$ oPLSp𜸺EewC>`s;[O5Tpks LYa\h)`@-0HEVŨ86[dtT"YdOI#S@'-775B$n[ko( FϏ#UcX~$e N쬤^gw #yP3`baoR=Y:qi@`Q%YL1wgf7=hXmzo'2 (#ryLZ~܌![+a,-=YrÍ7á#LcjCfbbA)H("^2Ma\ n qw][*Cg!- }vхU3xcRܧ/v},AMhlF7oVӶb*$D0f::7AKWkq`S |1z_>Y~B: &] ~8ɯ mJ=^/NQd1I' pX_06)n)R!u\"9[yM*DJz? ۫hI 5)fRW0XVFA;@ kYStuʉkn@ԏș,K{]a\jfDrS <1f{s V,1] ĚFջ?VzO }@%J$1ɗhɠkl{-H[&GM_9ja&Aa *1 O@   )zzO نTHXRRŐy> d4|ۥZ &œLݿg5k4U| ^,y7xJRlX(=fߔ3RҮ{ (ފ&FZ"5"KsG1ьsZ~];,g؄hk|\k;k. ʆP-[mji_}pv+ݝ!,ԱR| 9=7!Lb]ŗ/u2$¦WցAщZ:e'V21Mrɫ*Sj!vo@5̘<뺧SnTe/G-;?OXHC$ypT5,І1-KKnh$S@tK:<ĥKÅ;sӻmfr$|OMCX- L∬F߬ mj{L2 ȸ4Qbz(ĭ6gqw#jBU,L4 y*D]ubhԚ-/=M:Tɖ`0- ҫ4ȍ z©N76%ID)3WT//I⫦pu(ɏ>2)BbkXnU !kP~|n%9!\apܼXd%'[*4Eف H=̈S]L{r0OHk2%}suAR\=;C)ChpWx=&kܕI=o I7\yayx*Wz]xPMD&Wf ~&0Dt8D|֪F9P<cl^k2u4r]Џ* QUYd䧌$1'd w"vݔhڪ'ZA9[*3EC b_YR6Fz݇ :Um*1_5Z";HþDFz@h PtKŲ '[^$ '}R}ufg<=-\j!~7Kwf^j֌Izz4Ȋ|nSwkCli /%.8!A ŬxP 0_$S1B}"80 {ČLvHd`JJŽ!BnfK3ׇ Pф6@n hEYGȲJa*. oi^r )0q܁yQu_)F7+|luAV7w0g0ut'"3;e$e/:Y6L!ND*GjUđP$:߰De'$>, .Xַ$L< ̮ZW OFD03iUIfܒLHʊQ~8SJ= t%Kãvah)(\4(hdP5 W 6I-FĮA[ L1x[x}\ӌ"-/r\ۏ#{ պC<f+[_MHZ xF,hOΟn+\LW/&`]dz`en>l\*ޡCpРT]璚<Aj~tУ?%sk8;2JB~DyZ+no%Y~|MR,[-cR -7w{df8ecs $;PV{v5WM 8kNe|* ׷jawc0LG4¿J-j[*ީNh28F %Ο)] :*ظ xmHJAEa9UDR.V̉t014@8΂Tw1>gCu u0 86C4%c/q-?4Nb#zj-CI>2(<ᆼclmݯ/@pw_[tZ:"k@bZs*P9~zFVtNpG=x[(RRM9̐pFH (M<ʷrFETX#ܸuIp@߅VS]~ti5l,\|!:6r1b$Oی Y5H)IF6HAp{cZ7ĸJ-4 \+$gRʹoLS#tZcJb#!gh, kه1jqI1̳x wp7'é[[v=f-(BBXJ17 X#;IT41 _Oؑue19EH ##OGB(,¢f?(t؍n%؈}L#څi(ڤdaɆ5+0$Ka0rgbܾ˅DPIsT q+.-%fMd4TKx P 4;kYHncp| G4>R|`J&3fD`Uk;̱٩DMԂ5wJ嗞j joĸ(3aH; 1gݞ#aʺ٫r|CiE`zmHӎ5W۟>a$?ya+@V<}Wo Z:n.r0 qmIDGѼ7LT\0 @=T dgVM6?ya0+#a"zlDWъMՂkug휄Nb{'-ݿ#zj~H7jI*>Wh>emVW3C ߝs?ՈXio+Ik- HJ&Jࡓ,Ҿ;KJyޯkTt1#hPĪ(6ު% ʙ^Z9Ѣ>L&+#( \3dGUUT!ݎzi(daxb^?'QP VDGeޚ i\3`l`EZBBvO)o! F"װ.Űe{^ʩM{YжS8KXW=6^P4NV* 9O9T @Xk#UXd#бQ@Hqd n@=.v0yYd`՘3hx1Ȅ *N%sz' &ΥiZ\ِ*9[ɟIeMueNB sinz̆v 魱ܕ4,q*V@ȃp_[xeq9 ew%X>K̮ը꺢#UW`Q u*sѩ QIBqONҶŽ0W/`xX~(M'6s=ZXנTG]J[-qުS͕5[1!G)BP?A$pdlP6h p!moUfc#yY:?"C^1r}ʫN~}Qc]N6Ul K8י6'_̤Yu+aXE)il.,G61SnaھH Dk-ͭ7rtMΝ a%+vu&P_t =,U˜`4Ќ 4F;r 34GX/d+?̖I-F'P 4Zv` F1<;W*I:\J NVr^%}9g74:–g'K!qN8!,B2xp h ˄$pBX*td>޵cDp0/_y)tӜg^edӨtt0X~ SJk,o)uONݪHCjER'^*-ޗ_ b*H2gd͠VVh(N<,ix kHŵip ?= ք|lN{З&uzSC!=`6^GEP4j5<>hcD۩+JKaRD"ս/I|LȠtBO&eQTZϣun5 nK=mLA5}Wkט.``>avUaBNle7^o 4&I[∗7 GϊU4BIp/*ݶy|A*n F8SR_Or;0K>Z"ڔBvRHI 3n["-mT;Dlt\eȽT;r|xKcL}@xI/02G>:,),Q0 ѣ .,|} +PO4T\VP'QU*V\#M3N~ꌇSfBo'0[>[ӷ!PL H㝆ȅg̔ȍQGq _6;?Y $!H>.a HjDɳ?/ C1Y@/-G4]Aofg2CUWy2j*E.O.KnГqXaJTO94UU޸rER)tBIl|32JR!ȠEX(504H+c)x{ BVHN;Vx?##[5ZD"x$6.yvTK_eDt k>qycwBqC Mâs_qbvvɺiuR}8j$@zђԬpmA9Fh.)KbG HFJBB'gjXBFA'!BmA]X ]} s1FA?N4Xf>tΠ7 ɲ]89pxmM$| $l/Oz_:7g*iB7_LhG'SxO/ſɳr6oq`?uNEk/c"V" Y@4zLd] h 03.ˣ>uL\_{ʹ%EO#8DU片/87 g`5!DZ=nR2˅-]xkZB,ʰC™g '[Kƭ7 y`^PTI VJ\UߎG}ۚgLYx9ȡw;E3O\id+[ %r8i"N:]D*E>(ʈ( Z_N:/RЧ>=6Jbtz DKX4 B>g@J+hQ?$CM~ cdmϼ$ n)SB7NM)]=š,ڭyd[ ZԀ-w綢" JO .`giCXZHd.0vE#m81H[$F'zpj>&z4Xs LX9ub  ji[h'm8PEF]/-Q}FMn2Y2{' j\:w" T fBB'9BBb Nq1rxomh}Spq&h &gȉ$&NMG,rPȪvg r0PGNa~m@~u #- r~uNb&]o}{m=,Wt=I@#.4#bMIPAdA&րЊk+|A6`sBЂ ҀV؎l[Zqhc]Ь2-kcp|Í7nų>'X - =iAyؐlَ$JgAֳ;$ iW0}Ǔ6۱Tyx]Ѻ~\Z$2i'ww\ǫEŪ0/%w,O\ŋKHhj^0O|V8zð9u2GThjȏŠE&0Vŭz=JVĚ6&EL:/a XSW^=UG6u#DvgAha+ZJ`eVlQ%n.GHP( 4L;͍:4dc)hi^9-1 AW4+=ՐKei?~cm<"pܘ /4:`9r;nV 0$ = |y=^Au[m[+N7`.MNf,b >JM)׌a<3~}3+RKS"q9xyKAG,CO"ek+nIz)0~Hf|o'|w]>6K %ZDKeI*[5Ya/̸H RLh<kRsT `o.y] [C-d'h1 8ΫY!;D˃[2 Hy)k6G@WBm[75oV ,>&EէkNSV ~ob:I EYar,]L1xhۙE~* \ݜZ&m$ $#֟j>D/_lS1xMa_I( C/@=9}x{IĀ?q2ŋȼm5!g =BImjX.jƄY2催֤. *LWFֽrJF::aln)1H3EGA^.g1:oxQUN۟3-rZɯ[J61M@Ȁ^ۤ΋m⃾"F5>*|E9~?=EQF$"a>dJPP\UZecqF]<ˌTaNBwhSr7YÑ\G'-hף.cC~QDS9+ɑN=~R0>eM'h . '^PsSBQMiLO=SrL0~|[BV ݿ6ۇ@onw&+ZVtcPk> 3 ]0 }ٿĆP]?ݥ֧,%!ӕi^8|CPT=4TRoV&o91zUEkƢJb [*#]}j#뽕K8Y#Po(*Y8f12W)c:J +bBxpP-bKO!T h%7cTR7 ~xM4YlBM,mhSk >,j vq "B:`}l>7uR5aۈtu㿷Lx\^b1iݑbPe7Ygu FZ %W(.1 n, 3zZCy}c= {y : %p-^[Y DqaМ8̷}=tp'#kG2`~ lB2&['; 4n3~x(UukGv0@@Y +ɤM7:H92=9^0bLƔEQ#RkMzSs7wms)ȶVn׊}9ћ~hk}{jDʺo}AoGW@tty"/$a}=9y1w]J HÔ\HtMs6j;!:4\yO}RL0K|10n@d:|E@{ t>p!]'XPŪ+9xY0ut)uF,= 2C42FKxt$!s/U~.Yq Rn+Q@ e*' ?J0oڌ7Y eeL\~[UpyS~Ah3`̡ njz*.ŕn?D&GG#̠BW:4؀R0BȄW6bn>v=-F-vdIp|"~x_*&_A{ -Ui2k_8n^` wfs.W!"ޒN΃0jv Vi7ύ7j X nZ@L*\i*~u9PcxCDn/S)2+瑛h:la{%ȇN=4Eȱ/gwi9czI o2l%1/9 G2D\AnY*U@ӀSJ|_KLW yie/Yf'UY,Qȕv~EvYGii/.5QC֑ d! jTHエĭ8IPe ג `د$=KB@pXeyBh!d|Q7Ws~NtUͿ}!ר_W1V: hJDDg _1XZUr-Ht˨YyW9;08y%?ƠX^2hg{xzOʓMJApe]CS=vn1O)zNn߅3vOdHX8z<2|\K嬬 ?|_)eU=9nМ1@as3S)P >ZhŌ|dܠu5"9Ґ[.G5hu7XiMr6S_aa]|=OޛS{$gшR8%z{(LSE@BU sfDz M__&6Q7 ٩p Jfc"EZdsB?"zl/H+Q^W9c>'!ՄxO^o<=YBL)CV|4%M8m5[T?5!z模 c=p}7b7\]?Ri7U,[v=oA-zqKkQMcM=G5,aSȪY([)G> 1GhZ,y8O7my ʛpDxUhr7/5=t\S?rھg~ 0F$]ϐ-P), oxbѐq_h tYRi/ 'گ4HUba є2apBt j߆pm=M;˞mZ92Dw^yRFwF:aʺ·5I[$^rMM$i݉ҽZ36'* B6l/J]ZceIOH!IŇ4|*BC^5\YtW k%,bhǂ xΩt|+!d#rscPMonJ~,(P^>pMot'.9"; =OeG-f/:kɨWp<;H("tiFy\w2ʹc๖ǒA3UZx8gsq0x`lT=Kk M3nރ}9 䐁=#(!\+$?fmn,w 蟃b(b-aL;!k]"~ߩר̓? d!=O y'viX7“^reŠ$Q:؋in6]й,^k}90|ʁY$?U/CDq`=!Wu%PXXHsrge&3﷦Kb=}M[I>hs%T1dAPkm W'-HX&GKf4)B)vnQրt a!m6g) ais^2CU>.F(\C)]:`rدv!2OQI<:`zVfQ-#_8bӨA_z| /S0x X.F.=Q8]H6[Sj9ٹAʍYj*nmV튦GEgz1奇 ubnCe[O2KU?H/?yМ<6z5!$+]9A:u\6Ųu±' )cO!Gkk(o4.SjLLZAe:f> BbFۊٗ9hÿ˸ .^D9-ϵqB=YZ' =L0K AggNIm1ll<؎PyAcgϏSa2TE0uulT@FW6ʋc ] 9xWFmy@`)an#|iEo;ubs[2 P\5_ݣLjVAipҤixbL@`c/mvۄ'_vG!]5Ӝwjs[O'0[Efޱ~]XT>8k|\GT}OJJ[U1#mbS_oV#:$ e΄~Z?6&Α?ijڸ`T6yfM!U^2O$+Nzل9f@s,IP^d7붳`y|:ZbzRQGS :IQ@Q0GLvflj*u L^=RHjDDr̐ uRT&Óu>?5rYFz`b٩bnoz UNWD%Ny9 )U[cR S{NoWcnmɾ& # iI\._eFʷl)s@y[2;'{Ԙqǟnf$y8={*S۽3oO]R.Fs˸ Z'bЖifɝ=v Ya/<ԏRyy^]GNxŏu}gwꔵ$(0"~.#шMT'1}ӥhPVk(1]l66+$Jװǭ)48iT{eUR2 h ^Y7ɶ@qh^>.pkUՖ?Hlm m)C"# ? L^lu)a֣5p#PI^(5~ TޢhQ ){i-8F-a}J-GA;FZp* ?)t+YFhR !Hd jQ^r/OsTz('7AD7m?0utKr2Q>uhd"x+`؇g1T\l p0dЊ|w}Lx.Z5rYSD D,E|f#f}xC5Z6K狰r2UD߳AGKA Bƞ)7AnN"L}<+-3"˛]Ÿ 2R!il^A3e#L*^:"Zw.ߊ D)s6kRLAEG}y0j K-V*9"Ij!xl>.ܹɮ- IM=* 8o=WUU1/s!KhS/>NV' `|_ϯwUu"Y%l<,H>I9w#>ޖ Mկ%)j2s%';kqEAaBN,UEn gF," "X6=惆&gCXzCe,akHkVםVy4&B|qR9 ayI GW y\HY0!-"K6LM24&@L ;R$h$pP% cG(cFsDŽ"c<|Ac)pI 4^YiF~hᮐ5VH[zEv;3-T\]c|Y5=Bgx}竕!GQT=82)[ ]]-|w\R}2'(E (6 :]f ӗ}_~*_Y}tZI*C GtskGM#8zDSK+~A3Ǹ'ŋ1x}8w~nOĴEbxq#^s%pj0g/Un(JOYE<(bZz _X3(8U#ٚk.42Q{ q#r<pQ~G־wo~}N5IwZ<;eNٶ<FL+}x:m]liކ<؆Z>AID:gfqÀ4[#1C ,<Dе}4D!,Ĺ ed=- ۗJ"+.Χak{_t`Jĉm(<L12 ֪ VD 8~g]%\ $*A ]03y#w|u@7p ;rOЏp P@(!=Rs'|CEآry[b=W__y "&pc8B?2=4ԩ|Eϔ$<̎Đ/f\cѶApGnE^1ߔQɗfS(9ɜ'ϗq~7:M=p&=NK23|_,u=1,.QH'8#-<)ym gNk?Ϗ*gPe#]sQ2H } 3udzΣILHHK:FR/H \!y1)yL$U%XqPᄻq_N!6B@đL}O^ 7E-r cd[VY9 lU 3,VW>/9hDƆTE5M#ذ EJ%rb-+ b/yDk:H>l9״680qPjQdCdڻn |-\KX'ۻeRsa2`D0xOE˷b~[@/Y=z b2(?׮܄cn`= g #$üPd;jgrN&k֑`(Ww_^1HԤDoΠ8DƿmGpn \i # *b]߇qi9IυOB*e%;aԷCw$g-Pq?q`A "tU|B&@8e"3\!͘058PFcv0 *B ,Q=F7iN) ]T\n1koQ # nx~A}6v$t2NŻn]ٴ <ټk^qĬ2ֳ[6 A!3kz{Xt3 ^"Xʼn7pq2c~6͢jkMjK{R0 /%fP)v|B:ͨ?94DcN3ˬeivȮ }K§]#;<%BPRctDLN7O'vOHgtYJm0atO2K%}\tC|+j3] ڏt6ڬUfs񽄪Z{qBMT8y\'F [69DW{9M9ԱO\O/=)㳋^e:Qx>u8puH'kѫ:,b/.-"GG cWj=w,ػIRw%Z{!S<Ø0 &q9Ϳ&""!qq:cCYHBdWzeĝX3;Ϝ Cn ՗E4?B tz"U#@3X)Bލ7B (E OMɈ Ĺk) M0d ?dM4;hbݷ门H.kQp-] 0a>xGN'7r'}Hcg?%޳%V޾YMGB(TJDI$(>ϚΚnᾣf㽫u~_%L3#9h|"Q6ػ]B--0f( Eڳr~ń&_ uxϔ@z "8 9hPn9=cZesOO9ujxV.UJWB3Ke~eulSUx!" O=#z~Ƒf j0p0 jH=rF! 31+\$5Ѽ 65|m)nd qW֤AD?2(/#͟OAh!y%ѵ 5bנDOl*8܉!bAY|w@9 .@m; ~A>d`%10"Z `P ^p ;9ّZ9 .#J5ӢĐ$? @ͽYz :ǩ-87g#`lZ3ř[&mAVoX2lKmb}TQ |Ӗu-`oJ;} ÇDE']޽joh?JW صQv3oZgLFBK=xqe2ъ5&..MQ!ÁC'9DP6=b7۳6ll#o݆PUJ"X]v*] )7r}u{,*\ ,GQWuGijF,X:!+2#|3@.}?:("}BP[8Dq~`*7tYBp Iҩ2f[UߖD1IJ5;2<'Ԍr}>j\9#F#9HlKbߝ{Ŕ/ ,<-%_*}QA,wx$:@UcUUH_Ȃye!*n/IJdK_8'9Ә:7IA\{"} ۂ+xG<7ij7@-yCj4&5Ыp["R y\鿟ip+P*B _nV[I-!SԴsJV_ ԸbQ![74%9|ʠ!5 6(giKTʢ0KbWoWsmem7Eif×ԙ^muUmCԺ Aݥ=ЛblDev4I<=3PEn'b)Ipb,̟[I9ك"HmQoކ4xmS >_6{{zB4+Ѕ0c)hZ`{5i|E,k՘~M=eF>Wdh7γb39gqE6d1dI y]x7HJQ|p'D@/3}u Lu[::tg MV,W6螾2;1Ry&8 <~O͎#in.*5% y"Lr3 |I϶)y*x:O~ezp,Lfi\Ak3zi8kTjuANjAkEAF_*V,&K*I%5=Mm,˅OZwpB*wc Ѻ_ueG+3iL [4 |"=2;XLPOhCn% >IU8Ab È0+ǣfwVy.TqN$<nv9`Gy0.G(f}*k6Qqvߢо1G{K: ϴ`Bۯ?]bJ=" Bja 08R.p.`ZWC0Ny)z@{.n.wvr5&iՊ{j /,.{pJO )sh WLH)&ouLjW[eE{=pfzSk=\p_ʿra),W4^J|ǫ'\g I)mEGiPwfAgMeU`=z-*-ߴ֊PnI=:);pqg<&JmI}<_K0Ujw,-=*+s@Khi'PM#)ɜWT`;3<9:55aDя/B 1Dt)* U焗ub%\&aT#WR +wk~?fj"uJkb-IQƋז 6 1%n ??M~s|_󔔤(L,) BleKh;n'х"(`kW15-]j&9朘"2 _r#nv`|e8vV^w'=n5';_Fc[d~x8sQLH:4@TDQz yc<'23uN"' QwF =^L`k$1xu:|/u]T,2M6@P wqȱV:OEvXW_\sڇo_M+P u[Ŋ븞/6feϞYeɑU8(|8f_4?:5>S"ߠHAɖIG \= ppw;h/B\|]C]F[ѲU F n*@^ hkCBy2M. J1ez|^&dg{&iWws3NA;w3@\ Je6'LbmR[@齭WA"ۄ+]&XR4a>!7xfT_;FU6fYIXgx¢7+똭ZT|1ǚgcA86`ZMSy~ܒ7%,vMĬItN`۵tF ϖ[6Gg"v1v(E&j$_xoWKzveNhχW'&>pn~&1h&- t[Vp= oռU*^Wv\烓ʔ#/J+QeI>$tXEsߏ 1DfqMdG[A%L6ąogUsۢzHUk7 fK2Ȼ[]}Pe4y>BĞOd0^蝱MWH@r! F79/j Z &UH"OoZ[&H>S(J?Dpdn`Z9˴{QrH&fo:V>s:ƦI͝ T0WY5E4F}ߓ3ہgvŴ51L+t+l& @1./Sj*Dm3H(X :4:E?xWe(E,i#\}=q.7 ֧Rxi!_ 22/eb.uUbMw7dfxtCMNy !4M \wݔrdyBR sXq W+Y+J>UoȢMڒ:wg/y2]GtUFVh,J90W @&!?0*^0Yh -+udT:VkwͩWa&b2m(G,-ѽ 2~`;xt_ A}&('}˚ ]'ӚItF&@tNn~{ƹ(/k>ј;4Z/TSvwD]imQu϶5ki, O PHS}Vb9$P6! NۊjGZE%lPST0-ZKޜ'w;@Q c[Y@[չgCzx Uvvؠr:"Vs/c=Sƹrx"ONuW sma*knah}v_mKY|4ܹdK*'tVԭ@ZXv6]ǼwaM]J&/{Mo㍀M2z. z(lF}f1CJ/*{Ŝs50_ʮ8(epNo)ѷ7"- :2jDpIO1' `8y"i3:45u_J8,գAg VT@B臥~\6 I0 ;+ "] R_^2AZz2g]]jqlVR;u|q3JI+K}b`E-w98byDVץ\6b:M)3zfz1 ־G?QpO`.2*S?WېNtvre S=s.ź;$fn]MSyKbԴWA @J=.9\0IHz}7R}n~aK|açavz$59@̱R)z*bf&Ud` -VDPVZ9|KL֤,IJ=H 5FO2^%mv/ %]j:RknF;m )]á5dlt'hwe(ܼQ X5X 8d" u=E&5ߘYJqD~z*Y5id2'1{HAcA8Pq{+51X7U MNyتsݧc.8WOmP ? dl ,y#ESQtP SmYH9xz̲ħlG[,wy~aj tyAz-9h680c")'j\(oQ; 'd @k2*'&wլ\ZzG5HS&JCݰn6jPa䳘L'+QPIf /IZG&7 8{ pyMJ=B|HPs]]ިH&]h_ Hvu.cw*;꬛ tQտz[YSgIct *>%o19eS* 17d KH:(Y0J% |\oVUqM6&{[rmN5˜w=ߑ 8 i9IXg>#6#&G%o?!*N~, Ӱ-h#-^(샶^`2_SY'\h2 ?;o?"=yE&"6'[S^ܕMMe<5n+ z]6!<}a~0r'Aknw5(8|w^ĖZahJ#}%\A(o8>UVul`D̙.؁v#A|.(Kap b~cۋ L JW7<0&jt3#0d] X46i  qڡ&:~I^QJO2o19(> - sO<; 9c|7x]ě&WUOq[ gffܖhS7j#3vN!"oCp/Į~}BǞ9H1M $b>9bb姯_l y$e~n2zaexq [*qLF; %m/<ΎN뭏RUV~~!7ʛ6B+]L y$+&l m}cHK ,7I?Sئwp"9alSWxyHyxY$ųJa1+7,k{ JiMQ$qM%nQwu3鉎267dtڵT{l<82Y6Z!,1WCa<: &gXzdkvG.gr+r|L+'0pUCr#ߎxJfTPİ!Um'`aWA3^V,3wP,A)DkLw'Vr|l{Z&T~ LŠDz]%1w_uyG=vz&!x)$3(cK}&S ÊPzMu5_ɢ JBCD;xJX]쥛BY۽ހR%sf3wQgVgնWmbЗ%f׵~Ҿx`iiI .*^g&U㱇kk3DonMCP}<9=z&ME:_E\!/58jZ[#??Rİj1 z<I.= NCoMz5=PwcYz_ޯz/ T몸+P;Q4hYZ+JsϼG(")8x] DuKCH0GIm& e=[8h߷Usz ʆb7(;]dg}@f^{j(|5{W}9X_㍠;%V#I2>mhw&c^1<ڍkHd i_c{RI\['X x&ß/vئXʭ{w^i P\j%OfBs{MƄZaN10]S#P@_!wrH :ƾ4BO*Yi1R9f_.iYvb{&&=|Ia:iܟ+hyD ;<(K;M $Xf׻M:<# !y>ƀ OJς@'+pKONr .o? $__J@P8' 2qPmbфlJmNF;1hZ:$,Rw?.1&tl9Ρp& N@;@`vDIQ9U\7"<}_rc5?Wj C[=i&2L LnzZnZ.0&%5I:7>J$enhXiT7Ko.-vRQTxUQ-?W#OI ^keYl%ww<&S&_x~u4C@GA[ ވF}#d~_y7"ol&Ee pe>ϝg{RK} #ޘM3OlDf\LJTQߺϣvJ)o'ܢ]WS?#}7ot {>I@9GMweiGv4(8odR33ism-RdKխW73g%R7 @7`G |&H tBR 19_-+"1ݽUnׂ2' +o7ZIa>(vݼ_ɶF>L.W7ݍulj||p: ˘KYJQ8#3{5/~3q{ys[37K7č'OțvLX/Wzq_T\6FݎF#slAjqg45, AGmj}p-VJn^ m*qR0!9޷1&Qk( c8g30V$| y#nKhdys"$Er{"AdщxipIeY̍*/b(EjpO_o`T_0x6V ΨrR&yfDˢ04AЅ§ X`yj c>sc fU`}Nr'FP_(pbKQu@.$=O/ % qs\řeRh{H>D|`9BʸdBT|{X Hn@2ݰ,Ӣuvtl~P4lʧY 0a-6vŠ03˜-5)Q[HtԤr-آ.`_3O8, Nסx`|ŮQDjkJYP!q͓"BčiѡCN bA#`7l#6rf xDA!Y:ՙ8u 57~Xj ܎1 =i52b!!X*%$bŋ,3m6iayG_"r#.qj}S RQ40z *UŴ!x5+E5уm6?G$M{]y&ZH]vt:-g,2GU%TɫĝI쨈RoK#r*␂ `\|0ͻBOG,t]+6U bW)8/[:GU~ކy(z,smMhtھMFƜ¡["ΰ 6]~vDwȰi%$c3y$CQπ}$~[r[ĵޗCDjIrk' s+F(ݷ0˓b5 4((W]jP:i\;_E͵0ҝ.{eKk_64>^J3UB/ɯMްhtpE4"}v.bWW;^w3]s5x5POs"h7uz7|բOb͆*hi0UϮCț#p<΍Ț[7#W_^g. P(tm-N>bW':zB7hʐNXiP MBLG!`X ,\o_UabhA9-ikXeAR(ap,$CfJTmDŽU]! {[D$iK߁$yj1dVM<^?CYgn+ 4tΉ"v)c<2n˅˅ބI SpLƚ]bO^`J?0_)1=#ɮʇ$CtkiL25yOz؉maBlVIV"Qu>$[dꏞ e$pkčDA꜀e}_50?ٮ.]OfCF૰F|fbȡD~.T /;p 2&nҒINUͭt ~%3țrIO[/IpM8Z5DC]x S8CBJUe v5 Oq'WF+=5k,΃%Q~ `rH; Rܯ`i_nS鰕Fheλ_0J>dI8-(̝@%Go'X0$Ui "i&hbBQ^m~E.}_LSfd`Iu6!UܥQ&HS(hd ؊Olٝ8'?sK1v1]Oٞ߇H[N!^B eoZּ*I^yq.>N͞^։YΑ-DƋF>% _( k "}JJ$wI#j;gx7ښQfH *8wH4 761QMtfJV5qhv󪧩#[cfo&5|U'\Hǟ/_ Ȁ7lilbTBނGy'7{ {"o@L-@UI|="_/cc&IhKwvҤȡC(#u#zfxjLۮ:{jc5={RoqژT!ve퀉mpj}fZDx!]ׅ'e&y>|mVHka0r+21+}dSxa>T(Dhhו+,[Mfțb;k93;Iy>J㷕vaM.1ӟ+,1K %#_En}K,v_,=^8;nyD[-xb1꺣}JK{a%jAXvB v[>Q w񑔱YߊI=M*{S\8~svST~7~:Pm=o;H)5,sЏp;uߤ"WlieNmu 8,sV.?auURxm'-H">X<,iFHũuC_aym.V!?;gSi`"P57.~<|)ڈ/Ghlc[۝omיT !Mc+9wp||ئ[+6 N2F $BM+(,ׄ{[8G!PbؾNG: _Μ wqvv_ )z"jN\[O >$Xyo+x#T> 'v2ѳOص.gAIGhƕ2Vgʫ ˫@@Qv@p'샴d^⒋Cu7!Ts0AI0Oe6r*"prp>1vj-qq1{'EpN)=-eW">,~&ML_4|[.X7Ne741w~&,_x|ufP`aQr4vǢk¶iLu65COB)e|GGXxd{ZUeuUY&{XkK'3h1U"} EHQ=hOFDA[ڭu BTR.t[ٌƒUP՗Ε:|I4=bҚ `- &K =Jg_Ч C?xV])hw78 2/W+ A~i?(B>=8'0ӱá>s t2A }FKJMLpUP@RLRFѭm`bVɴ+%# 3kIC nQDYNH]x⦆)hg&r8IXX7(O6tcCp9|{&*]:('RoWk1v犄7Cʵ)jHp OGu^CucKuhRm5ݾcW!ZkkGuzv2c?Y6E5.bb.wlVo\HNFmc/[s_ ."jEfd_~; NK4d'/Y-M,Tu|3H –E *85.8KL]&3؀wg֭vUπew6WwO'w72 q:iӣ+=Mɶ]{NfW10Eqw8>'MTjDđ5edNϑخ_jL&cva,kė=j9~ a9򚸅[?odTi`AJocEf"}v4O -ވ OmEyހQڱ؈Mph BжWIE""ǰӽYl=s "%kEaHS*C $4xFcGnrct*#PMSu1[z^B;DfM]$APV52;5 Nl; 奯<)ؐɴM7k2U Cl %t@ ?ܼ==[aIS0V;?VLwP -ˏ=:j3Ҽץf8617S'k"+n΍dCCq-&i%m6s 78޸TPAюˆXnc"mń;Dzvì|\5$)HZ!g?  ea{o}"N:R[ 51"]%cOLvs=_gVpH bRFoggo%vgC8c',ZԙE8+M4+_sJ}0r+ll cFF|5o6 J۲YD!#Yl_Y,"ՁKŶ 7թn~L(^yu$moZq3 !kU`|׮px!VgT>.>wèl܂twQMѝb`HdCxf'O0{T,_4DS?L9R hq1' o7<,{UboEԹzʡV )%@7|qwd8($p۲ G*+@' =)_̞\)O332U%\f4||q]U/C,&,q";ɵ3ƕu5kvyb|ir bX|PG=57=LI q6Xק_^&Ŗm8s+ Oeb|4VQw.0٭SGbA`Ks;$`wXHz$uB]zKU,})𜬱3pd0h#4"Ye% Ak9 ً2W6b0- ,a\2\7*'3.p,/HQ}e66Ab@ j#ft2RrNf^J8XSA^bhu-.y=&ux$'--v:@f7zw<8}9=+譻]hx[7LCSd6׹`h*51zՂ[[_ps8KWJTl 61NK.FOc+`S=EkC xAlMS("{5AQN#.uJ ,=d:Go p1p|3АeU +R*ܬY<~P'5q Eo[k4VXJ7u^X[+-}s %$OpOOuRތ< O<%$;{VYPc1tSJmouG 9A,ۼJb-^𜾂!c)o ZXt!2@7'(9Bk3C@|eD80cqܺ]X[䅿+EPսn.pjI1#tE<EA#> /|dz;xmc'0in_.RfP:0C-X%XwaDzfUM!E2i7}S1>JMTJ=LU7K Z$.f_Od,4S]\#ON>۸'W!Z_-?=\!`J.?֒N6U5SkbRTà~T/¥4o$D(WBrqGn`}EgXˌ'NW<wVOƗ IÝN=t@̱.*,IX("T^[fo,P`y 42 bMk.b}֢3g.zJ逭|5¬B'* -WbO@s-E߰ yd]: N_LeoX;p>N!Tfv"Ґ#V;q&,ߑd%fEwU,W@>'C bpB 6vn+8n#۔S ~fsnҴ؝ ;f|Έ{JobYv.=%XjP6E1,X>*KlZcG; Rd b;XudwւkuM̽ehuY!Aqtt8C |Wcy#.?C[46Z@;+*({ N,>Ӂx:Sր0V (6T0{/ ImkmQUt’/Vj凇s Ұ{ֆ0 |x\wgqVZ>Tu(h ~b̕TonnspUelV2x~S݉+UUM򗬎s0~CbZ2qGʡRGKZp[1LA_? n{/e0qت"RնCdob%\6U1ZD`$X@Wh$%kql8p.8V%wD!sKyU7uA7T;n/#)^Uê6``h`d1BB^DC+qأ:q#hx؁fV7MGxH$O+C־:xG=97;"Bikm`g'z`h'7hOt?mc/Oʅ&`;*C; HpO{ JJ0NW}!c$vr(>˾gϣ!1koNJчR5 bHn_sSH#ʜv?Rq7mڮz:$AjǨ82"UR5̝O!/Pf=-,NgUiz`0Lz|yk!x ?JEO/"*MSv+-J,Zy){xա?f3v9Dm]|,-GG! EK#]S17G ,Tsi}ې+OR GZ8U1J>V%`YzV$DN7 >|7׋GoQegpuc,'"Gs,_>8x'э冏Cx#E{%A_\@SXSF@* B`<һ 3HlZ  OZz7()oBrzZs0^=EzrE./#r**<_KW Nϻtg䵔:.ޤuQUuNJ)]F~@Ki9xŊmH`g@B#8n(d:IW7]5hHY'wpW2Oɱ jK!:HWGJz8sp{#dGUt\!gn|MK{5\xĚ Cw]LZCf?DIx/^11%S֣cRN%i֬#v f-G b%W=E+Պ|L Lâ\jq@7JrhĪZO՗ۄƞ_O88mQcG0{۸ +Z7,3rl7 NvT/yiyV.88P1mhr?K *J./qyTMsbks;6ohV/qb3BVz vնYݛ)DJۚn͜d6SD Ej~ZcmqR!aZ3{ g4nJ @_Ϩsa^^$Ɇ7On& g2}ԨrDۋA>LP&*3p+ yŇŖ磛eI*p ~.MGt` b9csltBWh2=7Ez/1/hXˌ'y0D &Uoίl@̲P@}yjh 7xLߘ!hT ޲s(cOӞ|:6AKD1WZiSC< )pKXE>|10t1!GעuU\M K.RGԵ:D^rL3\H0ڭva-PD',8m'c38on;z-gqǠD%ye: Z-99 @BW$9ǔBw#2h0 .uڨ(+7Dp1J nHw; n7 8qrFWEb'3g>d59.-, +k^ N29< ⏻,Noʓ*ϯ 3LOshݶM~ _̗a3I)@3vbgpӂރ.Tt-Q%,1u+N_ vU~鏥ˆr5V{mojq@xi9ƞ6,Lpe+BL)+'LuoU=KATc] 31]?)NVkG}3C&?(U 0kJ2? p#`4/I4 %. j(~UNv2qwU|$JdɧdJpݎyRpfErr2T4J$7$ֿp[=s?qz`qՆ?M2A'Όϭed` c+ֈȟfʮK(/"2 l{,>nBv,*kI. yLjvpc'1y#LwbYA[y _7}>hDRT*c1Xq"4m-jrcNjtK Pkljm":r(^ɺcIuj~ KYFƌg!K'ɌbC5h:7ۦw5iNVbgrXWsC )V=Pƛ˦d}$Kٿ7չ5m&Z?[ӡp'I;H1*LP0BC5)bt4.ŀ[K)[Fiԭ]XX~ +tWW(<$|[SJ5r$iOYʢT il֣_<kC )]Ըx\6􈀂GY&N5,C}J`WX}7 F&$2c&1Q9̳c;dKDS%Gێ'c5Q%֔U'@:Q.|rem`-53e<d7p^%*9(I*9veiV6.QaAקnխJ]Y3d3Ezc΃ei>72Om o+Nff=/םF1SK;l v/j-(``!ҰvaM5S^S "<$Bo 7ݭiDA|JZ3r~g[ ^79[pj=~vͷaAq$CV*SVhvuT""3dgEwm)H)KAx\I`wOrygRa hYnyr;CC‘&28ōe@Ŕw=|63R }+i*oXot8{;>wY_!7z/%Vtf((5Fw<:$>z%.NSh6~wdPQeq ~ͪ{BL_hlO)`A1mf?h:Lu/Q(A\_G֡"|ݭx1t`-F\=X.^(`3dN{о1(|Ϝd\g@b>C LڟP9Zf : ; p2^u}f4P *`#5rÑ211NUj/$Qn}J Ԝ?%U7]nX,]J%)Vwi8تNj΀r &AbbUIo|}>lT)1ܴ|Ytys)dŢoBu!bˑ)8!;`걡UBB:[_D҄!hkX3>phal `mDe3$_pڡx #Ȑ`|[CITG);6;'W{% ֪ۙ(LLLr ˠ0+e*KE#5F2v̯h$@ԇVKivi4R"7̦ktZjl4'l<e<lF͔ѥ,2:YR0S7_M ߮js:A; pn\;_ Cyյp/pЧLJl|_[QVH>~0NLu'eΣEeν4ksJ8N|LxҸDul'"3+]\ 2 ˣdm}lq%V)ۓ(a [SoUcO9)[duBJqQE4eP:H9Lg#?uߌv3~AM#fj"m3$U7ˣJ]$UHYb$Sǃ Rjda@*t\lm/j3|JwfIŃmQu#2!_\-F, U -ŭ.:n10@77Γzմ'(h7-q+ fn&Nn&~Opg6twl/פF5bL oX&5O^-ڐx>]DlgiJGγNfaļig!k}e) 7Dʏ${~;gu.|9cC-<Ӆ {4?_R 1{C ]QJcuN -x<|԰SZle`)T9FIޛB%[\&BPr&.{,q'q_GYs/QPd0uLy?BH)/)e0U6b *"_Kj{ rO |IA0)k%W}ȑ)$9j[)Wm"]pnH`c I$9Ӑi, " Da.-@j!DPs/J.PElѩϤbR&0jh1i¯QMdSMM(\vmY 8 H:)mP2oa>E8;[ڽo:'g+|?~ fKR^ogWDPEw 0;4;?EM#-O@!^x H:Rf{[tGŔxla~:: T7c:[1_p`Rx9&:=@R9Еn9p&$E&EUAr@:zam=,'N0Q!#Sm6, 0败L^_euKE"#hyy;h4mADPaz--_քg^[;/o Lhu*I,WP<~ͯ\EsS">zҢ=^’H#7сkIhE3<"ɼ4 GH}A/d`XZtDM/Kȟnojw:Ya,2er\S^Blo7mw@^"TyEMrAkL6ptff̎Ng8w\)՝nO?H^_URy@"VCCeyUVJQSDKܾ7ӗ[ %*3t+xFtfzw@!{3 SDOď;"ÌZ;!}:"YSe܋4vЕٓ &|BLjI9lEDAb5mpo] jd2yyԽ-6io04_F+ –Ҽ+u=nm@߁ʏcP- ).n{?艬7\q')m"aw5V'lfΦ$z5qS$Hv\ vy5sJ!Ngr,\\4!2r-Z\uvZk]gxDݱ^K]m_E:N|+WrG5F]NᜐKC nh *Cn)D&d/޺Ďkg81~.|ZIKI;-+^kѫT@۲gM2SvLCe[AL0o#QT:e#%9da3wρ!e.@X1z .-[}oWcwXM*z31Ķ2cziKuĵy$y޹E)uKh5}rSQ FKacA;7i}A*BPZ@0S2f}= {_Ƙǔ5~4Ig!mP֌;~ΐ;xlF入ƀ#$a"y7ml32.n1̵1)aruMK?@-1if %-yiEH -)y);uWäN/ m(Hl5'g48'fCs2MMumt+=nX#e3""#IrY߮-:) W[Z> z.2ή y&jb2of8+9 yԯ -d9N 6avCmz}cպ&M*/Z ?nkVȏA‡ 1(r{5w|SX꧇ ܋q#}c+<Œ }C-+_[W=)WN K߶\ٌ$ )cL+&rWLk"]`s#5c?Slz^ɜr@^Pa䐎KA)0k_׼D߯ex$$}MYfEF2 !h/Oj_7mt6YO@v\ܾԂj}V X4#XDfrc(3yl#×N}%t.AkҜZ%åFKd-E:/}[H NtA*E<5y6ܝ n$)T<)p6Q=z퀢WRT #Q6qG{)2&|"Q4'pz<)/oaYٯ,~bRBf|AtHU#R kd+tsمfcZ`Ãc;..Mo[!LU/O@v*l#t<_ʧ`"C6* j:;磸wQ(U [֭&aZF_T_O~wN_[mCL:3QaDNU@bPvov _{|wm'{ɻȴh-${5CُÅ2ʃedo9-"l`-;=xN>pCP<$"N N!x(+9ORfgmAS]S:l^>n3@:UűMG>:HU`AЯqrO첒op[ߪٵOC[i> KSg9C%pa"31 ʙ>yX6_oKC#Ԟwrj~%{g1 gGnlYB𺕋ڬGI2f]q;gͩxH]KɱXll%Iy *V(ȷޤbG<#p8ڕD<($FS<K!PD,$>([(oXlhIմϠjW܋řsSE:B2`9ac{:F8N8Vd'hR1+Fm~֙\#d@}&ghBަb~.W7YʼnKJ s_)^<j W ! 'sㅏ-N YWQCXە[xakUӡ'v'a.!_ߎ>Y#@꛵v /R畊 H)Y݅՝:ð'6,Z5UaTxںa:a t+,F4&&ckwT"`)`.9@IX%˾>Δ .{ԉ^sv"k{v.t%!2XPBή E9 KTf]8 80xɕ^2u&J&Xj1>`8m$X,!wa:@=guK:_=& D?vKL6DNH“̞=oRA%(7sVqm1cR7 7B+Ho+vLQYtyo\YË]Ln֏Ũ{(PbJ En3G6\3I06MMSH>EâHy 8 C79<*yiG 1L* (GuPi=?)BZQ2J}.⽈HaJֳ #t.z y" zNA׆͡Y\}Җm:NtiiFJ[}/*:ͪ1^8Q䢙{MY{ S;ZA(Ye@h` +3%txfB004(BA9|F[q2w|0Y)kT<\([wփD[V։صCթ-.r3X![q:hR KTxHėը5LIYM/UP:lL>șT7)^?Z=W5%AUhO2<Ҥ=IH|z;gDy rp{%ihTW\DV%ܖ\&Eq'Iݴƌ!D芙g}8~%~<*_0S+cNsܞ +{ഭ7OЖxE1SɱZ\f8&pꋑy"ռIT{kAxƿvڅ i܋qPcbCxՐ#B_Y.F|V22Ѭp)[j>@ GmQ 1-6Nˮwdb"g.:q,M-7=.a5z*S}<vOm%Ɖc$N褣LڲAS9E`8J2b|h +4/f_i@]d9`?oJ96_hlO[ĉ~[ڻ]0թs $X+˹ׇq*ⶂQ9FK-+|e,uiĕJ7`NCGq v  UC\X~ 1NƶF!v/ň^Mð"|e| 9ުq>cwTu(N ~d/cr|~|ꡣhjyF5 ;R)Xe:"_?[9'+cXqAHX°KrԤ!A5.RW$ h1Юaj0\+ ^QXJS PT``g'_hCTI#tpDyBEƂtq!|]M7BM1K#dWcC|/ L.$h%VK*Jf>d4tLYOGOB'q7GbX[݋'0ӘExp#Bc-IBePPƫЗj4;2ӑeGBCxٳ(؅}2 YmcYVn6 wڬj-U.vK[*8#kEXҵ+az:cr6RBũJäI R0`)ƱUP~HBhH& MkHMht2&F/m_69 ,U>=z9X 6T=‡,45SD0"lEА4|2ΤGZ~C2fϏm+ 0-rN.ڴ;ϡ~gH2ջMC0 P ;:B(ς4JZuu XE:594V0fðH1qVƫkh6eS;#A6$}91Aqgg/63k^O5[\YFz;޵)[_hFeئt$:j%eoX =^w/Ґ>ī <֢\;blDP+g#gB7՞ 1h!Ӝo*NjiBA&D kg%Q=F53Q3\NW7[{!ϭ|-ЂIN\j`^Nb +dJ\u!pHL_s#-䝌eep7ʕK|o ~G"u.^ tڿ'xT?Bv_C(!eZKb1e*=fYS^?~[gK!R+Д8Vc$E6@c "!q2ĊFU2v$fl]<+yhumNrrT Zw2!ϻmZNi|uN0CaFO\K!,7Ơ%O5XH- (bڧ>%Yw,h0I染z`VVFTΟTAd(eIb %b/J owqQl*s).Q6Q)€(MZ]DgZjBHrs,G ꈄ/W<_6]ڈ_k+MbwvcHQ aTU{{DšrC#7G>&ZO{.9NzC-" .`uL栱3od&ՙVͪg帮l1x.4]@ȇqjL/7U9?"(;v]"NS*Лpg1*YOGD7,Q߮bW81#aCl(iH%zX5}47h> o~znGBZX[ P?z 0;է2(tc׿EKJ$ Dt!tugȾ=FCF6/`&i1n5]G{_cҐ'KiO| d0@z[#Wt&^mL(x M^*('[Qn RR-f7 B/<_=:TTf.Wj۾9{%M,t$ݕYLi(aj2S#6oGS䕻HC1=;Pqڈat:bܘujf0lc95i8AZ0vXT)` 3e(y(}a/ÝOTd54} j,u`VLy1IRՓZ@yf@5b^pM/>&8150bi4EFڗF(BL8)4@N#%HuS ST{]u'Ri#F<+(XrrOYw2ݺ @rMn'?=W_ϳϮ%Ȅk>ȉFVViprBhp] = ` )1k*.P7Ӹj咰Hq8B}̐AA?G %yTŤ)9ޱ4x}54E0Ik;fVaah"HI68\rdR3&r'B^GLx*Q4x#&eAIrt ;'u[.?0;1c)+bpWYRF=r>V("ڐ_G<ڊnx($:Xˬv1;qQ*z\ bgx5)I5㶿.Z(8 X@:ٹv!+P[iSv#/(dn:Fy)=']%aȄ2>D\; "Ir3D-[>΁*~f.1}Y@LE58#KI$A-r i`&fsOOU^iS>^lA/nOp\a^38ai3~Kx䌠BCGmR_-)a6õ%̷gV.HF\ՄU[d=E4uAՉ$^$dD[pUe6('sqmj/#ʅ1M&>Qk޲Y^wՌ{:&_+f~6L.ɤ8LsSXкJhf@QL"jlc eL8y5{DΩ=2n3(HE2@-y`$pע,O3db"xU۴=C#H̥5٠0D*k>ʼW4<=YfI2;LXZVH7U8[9¼YŧTo@'Ac2X~VF՗%P":Pff;JI(G'Z8„tx(Nq D~cq+W}tKŐƶ+(jtIE$X?f/P5J7kjN8gPt-GzEE }uZr=O:uB/ N6-cLoqMD&9^ҕaY^{%Bɞ,F|=!ͤ7cP1MdȴXHqں䲨] ^nlAel*Bjxh^2^XB %4b54AaSIM`P bv;Md9_7 tQRsd e@A0+p1׸"AS@Dlw>twsk +4痍(zUEF {{9&Z ǀ],Zc9E!W U OC^~õ79@TJG]+gi}"=Ͼ2 +tn1IN"k o]:\єe{lF C/?䆧[戾@*fbj>9fec ĴL9w xAGmUQ4 :_cY,X[3=$9]Y**=)l#RB{녥:C3hj xs<NT}A2 ~5r2san9I;q>wm㠇JV}VՌ 3X D3$q 0zw1)a^xQz؄+\\ykM]] _٧ǻ:6Ajp,$uNia340(| /4!.!ݑx}[A3oOuƥ*N.2rק9$bY%l'Ah ÙBGl%Epy%M̒Qv=|He- a-8:$#c L#3eLZ_ m/"1<7`Ɓ@*Mz1bP,˂9Z2y%1Vf9fP`Vm\TJ[C4JA?Wй5NDEÄ 5<$ȐAkEq;MFؕ4&_cjjdZcLrL쇴'wƇys^g3Y&]ʮq77y53ͨ,Tl!]ɘ6&U>WZLb*T?|3W<%Ri8"fdq(6ޒ/թh喚eוm(OJwlڙ3S#ūz$1DZć.N恳A^O |m&Šx EQ3cݚzhe~ RwޝbK|!EЋoL;01+왈2*#]ray"4>9cg.؊1*rj"}Y3:V)MZ|.,\Le08ڝ ?qO,tEMGݜ5M7]FeX!ɹyeTS#f2@i7&.XQ-p_*)kWXUvuc35L{Kc xv98${?mUٹ-Vرx_[/KW<4ϽHWO VR"RGVEC-)|ٝQv Xh~6r"vy8+{o(,uc($b-L%ȵ$ Tb8$Y!\&.I!wc)‡-EB-m6T_Ah$-#ZkiKUtm!b'&,PkNuZ4Qe+D Q> P6ذ:(ƗoϡvڣS[@$C h׏5Q?~@C1:`DH%=8* TIW"ޘ biֿ{ѺBü,t!@k%#w۟ړJL&#tQԆ>^Jc ė2U(a pÏT^B=[k?*ǻ.տ?11i\ ,B5 VuytPȍ[YXz4xtOF$"կ V/+;N/F/86q\HŠGIԦ`IRLwvmSn|IuVɅ 4ڑ!Vd'5OdK z0zt`ĝZ{20[im.IPdz,=[e~W郥ғ|h[p7?zkǿU_1%Gitgi(Ҍ/4z9-c3Uvs݁N 7G~? :y'-IlIv} ÎYM+mPmkcdvvLێIM*m"մAQS}Q~SR4x (jg-YfT]{1Uv 3.B5\&b*8'vtcEE R|m4M]ejF HOg`uB &;ǀΐ%V8 +H];;YguQ~0nW.2!˼->TptN*}-,"gM*2'x OOV}S5gOWGU !A aPH< ¶&0|AoI/ʁa5mrw75;lsig&I?=0w| Ƹ>ޖ$Ȝ{CHgao .p;rU zl ^wO5CFP?G!T lT,OM \12P:x ×6wYs d 8wy*_}IUS*ߚ|qf{U ҝ9 V£P"f,@4éGK,0|399eO$^y8,KX9UO*' P>78~U억jE$V5c `䅅 ӝtThR1P?<8pWrћMxJ{Y}Qo HAy'q{> ߙgܷF(a|ދ @ !\aMstڭAY[ oygy8 8f7hOgSb|?90J ^YSW,,ZR ;S`y UEc ˇ@U?%olG7$.ZR+=LČA XٗK>u-.:qStAo\'& ?wGVEzfw8R!9xjLhX\Vm*D>sF74UWaUK!"*T4[ )w0'O2RsP"Ws;2_ KUJz_nb>tT;!+ꕼ}Y ͮȋ߳VC*3e\$:DƣE)']g( nu}vSvt >6 HȤr!0sDjd%BUK_%ruz 8V=ZX]s(!;֍2~\!kl/92>ylr}7ޏ},MGﯱTMb>5Y؂_J|]dI5 5iUM-TDӋXRS"?o֒dA)jy= \Df넺ē/dipw>A)EN)YvVeuj#Dmcgcv5&gP̶K`wC1 Jta ԹZ,ITE^WZA toǵWPSDU?u3<*m{Tˌ&Ȇ, '6tZf {H*D,Jc/̓؁S26M%9z uFh^2c@$!”t=p6:T[tPH]tFɃhѓ)?&nsΟ%{ mRYelv: jÔ]DVNBɍ|缛g4)xBj"%,xΕ]vT\;ƹCL$.Y z,5f R lJ> JC+dr56<✓xbxVǽh'SJrl̝ĆϘbjeF3)5 nQt+=[zh䉕W0 ̲{-ӧ HD-cR7qZ$ l mIVL*{2A^f>? ^a#ش"@qHF $Lb{ٵf*[6u$sn 慪ۭZ|9:D`0u>>ho2ڦO'X_oL;$_} 'cyeB[@6D>6gw i듚3ǵk8zySzi`sV7~4[ gsCVw]'aϽ/4` \EBh [ G}OZzRT|s]q3٨seodj,;&Y|Sv?gjeYRH_WAppВc#ٗC 3gq)pC䭯֏(ԏ0b !|I{ :B#m`X$RXslUp9wʧoepx0⾪o'pDc)0ڢkA(MGof4#:?5^q;IcVm]QO=IgNFl,m2 #B4u}l)}7VGd=A}>6`Ӷbޚtb!Hẹ+NIH͓/0> -<:J1$ q[x~ܽUe^~0² 웡tmMrZ;. z*Y?RlW> Hqd{`lrz{ y vM^4Nhi9Ix)va>sWY9T9H}z87=5Cz y.+MW^[8UTUcNÔy4O>wAȭzɚ\%:Ӫ•Ee5/7u ᕳjA zn)n "Kx +%x.\רw]7Dg+%[M-ќioBӂu-͙D 4@$;{l&VĀQ-bAwdsdsb<ˎtq@ą9~ e[ "45dHA&NQiqnH豆}mRG`J=]>%CV ^'5xíR F* `1&ua̿7_m:p8|mqL 9\; k(ĔJkuW@Hι4p[\F;-a-j@od|!UCMLJ14-_zJqW˶܁a!{Y/s9݋] πZ\lKD$ I] F[|Fw~P}첽lpRPg;rƾ{>aN`qJ;h>b w=^ehTWuB 솆4(O*\hl\|y=9K @o jȴ޳wC&6ggN^o_<;شb`ʦ|U[d,R\8&<36ol Msy :;k&w5*|M[73Se7ecJR \K]т U*26-c\}Xnmih/  z[M͘qb R_s|Wm#E{J*i(Hb؀ ߄` dH0p{xjAM؀ipIT@+͍oF4E 2烦p&@N_:(} @z+!9!W׍^EťG19yш5*IyGbtJ+i\y3 7ˏ%/u|smSHHٕ*>TΊ$SEJ0z oa|;X%\diaT٫7{ l%+$@{( 3[jGbG4nAaP{o݌D9W*ƃHs,Bc9j5_Xg޵AE)R6B|D, =`hƞP`Sbv~u%i֐+|&zgAw.%{zn?N0AF=PlkFS`K{F=bXZ`5O#};jcC!7f kt53t8Êb|OdX;V}7<-%o=ա^5@$"NqG@}ӓ3:w/Ʊ2R'ETSS2ܺ{hW,،57\VꩮҽRI:GvB xtO93F\H^J VitWSiF? uSg@E4GFoH7.lA[]J%.SusCS}yt17U#D!ʃM DŪLb+r7Նm8D zn 1-$XΨ[2J0"%t |@?BdA&Jcpa-z` GG? x U?3<9tDlsBq|XPΑ>WoKذ/_٩”OVpVaj]:Sssw\Bi󕟰^o,zo' L)`bЋf˅> KNnr+6,%Tƻ Fdrd? DNT+޸d*l7{AXEdot*8 C}q79  x\qn/E3\7z` ;d/ ]SH'8+).~:ܺP׉A,y;0B8\ 7y${ X?IgmQYH27v1r{_v3рU9`G뺱NN̂ZVՅ3fe|%>1m+u-ןb Ò-߻h#I\s3$okmJ޴cG xEgOضMJR< 龖3ϒ]>Zy>lb^lT+Ѭid:d΋:@:U.>S7QuTs,q[cgTWa {D`m>C 3M`X+"VMteVwѽqPCY1t[K%W ^i Ok,dj3vZlŽU'69f&X*wgnOq Y$+UvRȳI%,?F!/c.=_<HfN ҙk&+dO4[/4[``KN0:#W|O$n p l sruTDPV3[@ gL\)7 ^OEc[u"-ke~J&1 mc[@溡jcMnS!?T'yx~=Gڨ#:k_%ޕ o71D_ye46dϳ6i3UA%(NA*Buǚji 5Vo}:GgMtJ^j? s|J\Ԍ y YZ