qemu-kvm-block-ssh-15:6.0.0-33.el8 >  H a z뾂aln KC0au',ꂝП~}wo.Yw-PK}>PX}&[WV$8< Rb!ügG=BA xC(v.G/^|v\b3QlCᤡۣ*NRޘū&O!A5t9q/T-z*ZsK{ qz%<&ӲtUtIowfqwK$t7Ɛqv-6c69003885d9a2807ba14a1a33b5282726428c76a6042014a9de89ff52af4000df0ebe4442f021243b96c9e0038e35ec621037402xa z뾂alP>W[f5l6[mdz麙CMy{9U*ehA'%{=MGBdhI]GfY*<¬ZjH/sad$I%0 uNrA;l>h(8I~޷ 9?i2צfx̫:cR{n,IN,tw)Vȩ|>{YylS\Xɦqs'_vzwy:mA,>p=>?>d$ ( >) >Pekt     (<Pp   (8(9p:G:H;I;X;Y; \;@];P^;b;d=e=f="l=$t=@u=Pv=`w>x> y>0>H>L>R>Cqemu-kvm-block-ssh6.0.033.el8QEMU SSH block driverThis package provides the additional SSH block driver for QEMU. Install this package if you want to access remote disks using the Secure Shell (SSH) protocol.aZp8le02.rdu2.centos.orgCentOSCentOSGPLv2 and GPLv2+ and CC-BYCBS Development/Toolshttp://www.qemu.org/linuxppc64le+AAaZaZaZaY$f6344baf710694dda0f34c7fd080b609f559e5bc07cefd28030bc9f5915ac71d../../../../usr/lib64/qemu-kvm/block-ssh.sorootrootrootrootrootrootrootrootqemu-kvm-6.0.0-33.el8.src.rpmqemu-kvm-block-sshqemu-kvm-block-ssh(ppc-64)@@@@@    @libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libssh.so.4()(64bit)libssh.so.4(LIBSSH_4_5_0)(64bit)libssh.so.4(LIBSSH_4_7_0)(64bit)qemu-kvm-common(ppc-64)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)rtld(GNU_HASH)15:6.0.0-33.el83.0.4-14.6.0-14.0-15.2-14.14.3aqV@aexaTU@a?=@a&0a@a @a@``t```"@`@`P@`!@``Jon Maloy - 6.0.0-33.el8_5Jon Maloy - 6.0.0-32Jon Maloy - 6.0.0-31Danilo Cesar Lemes de Paula - 6.0.0-30Danilo Cesar Lemes de Paula - 6.0.0-29.el8Danilo Cesar Lemes de Paula - 6.0.0-28.el8Miroslav Rezanina - 6.0.0-27Miroslav Rezanina - 6.0.0-26Danilo Cesar Lemes de Paula - 6.0.0-25.el8Danilo Cesar Lemes de Paula - 6.0.0-24.el8Danilo Cesar Lemes de Paula - 6.0.0-23.el8Danilo Cesar Lemes de Paula - 6.0.0-22.el8Danilo Cesar Lemes de Paula - 6.0.0-21.el8Danilo Cesar Lemes de Paula - 6.0.0-20.el8Danilo Cesar Lemes de Paula - 6.0.0-19.el8Danilo Cesar Lemes de Paula - 6.0.0-18.el8Danilo Cesar Lemes de Paula - 6.0.0-17.el8Danilo Cesar Lemes de Paula - 6.0.0-16.el8- kvm-Fix-virtio-net-pci-vectors-compat.patch [bz#1999141] - Resolves: bz#1999141 (migration fails with: "qemu-kvm: get_pci_config_device: Bad config data: i=0x9a read: 3 device: 2 cmask: ff wmask: 0 w1cmask:0")- kvm-virtio-balloon-Fix-page-poison-subsection-name.patch [bz#2004535] - kvm-virtio-net-fix-use-after-unmap-free-for-sg.patch [bz#1999224] - Resolves: bz#2004535 (fails to revert snapshot of a VM [balloon/page-poison]) - Resolves: bz#1999224 (CVE-2021-3748 virt:av/qemu-kvm: QEMU: virtio-net: heap use-after-free in virtio_net_receive_rcu [rhel-av-8])- kvm-virtiofsd-Fix-fuse-setxattr-API-change-issue.patch [bz#1990697] - Resolves: bz#1990697 (virtiofsd: xattr remapping does not seem to work as expected)- kvm-usbredir-fix-free-call.patch [bz#1989928] - kvm-block-Fix-in_flight-leak-in-request-padding-error-pa.patch [bz#2002631] - Resolves: bz#1989928 (CVE-2021-3682 virt:av/qemu-kvm: QEMU: usbredir: free call on invalid pointer in bufp_alloc() [rhel-av-8.5.0]) - Resolves: bz#2002631 (Windows Installation blocked on 4k disk when using blk+raw+iothread)- kvm-file-posix-Cap-max_iov-at-IOV_MAX.patch [bz#1994494] - kvm-migration-Move-yank-outside-qemu_start_incoming_migr.patch [bz#1974366] - Resolves: bz#1994494 (VM remains in paused state when trying to write on a resized disk resides on iscsi) - Resolves: bz#1974366 (Fail to set migrate incoming for 2nd time after the first time failed)- kvm-iotests-Improve-and-rename-test-291-to-qemu-img-bitm.patch [bz#1946084] - kvm-qemu-img-Fail-fast-on-convert-bitmaps-with-inconsist.patch [bz#1946084] - kvm-qemu-img-Add-skip-broken-bitmaps-for-convert-bitmaps.patch [bz#1946084] - kvm-audio-Never-send-migration-section.patch [bz#1991671] - Resolves: bz#1946084 (qemu-img convert --bitmaps fail if a bitmap is inconsistent) - Resolves: bz#1991671 (vmstate differs between -audiodev and QEMU_AUDIO_DRV when no sound frontends devs present.)- kvm-migration-move-wait-unplug-loop-to-its-own-function.patch [bz#1976852] - kvm-migration-failover-continue-to-wait-card-unplug-on-e.patch [bz#1976852] - kvm-aarch64-Add-USB-storage-devices.patch [bz#1974579] - Resolves: bz#1976852 ([failover vf migration] The failover vf will be unregistered if canceling the migration whose status is "wait-unplug") - Resolves: bz#1974579 (It's not possible to start installation from a virtual USB device on aarch64)- kvm-acpi-pc-revert-back-to-v5.2-PCI-slot-enumeration.patch [bz#1977798] - kvm-migration-failover-reset-partially_hotplugged.patch [bz#1787194] - kvm-hmp-Fix-loadvm-to-resume-the-VM-on-success-instead-o.patch [bz#1959676] - kvm-migration-Move-bitmap_mutex-out-of-migration_bitmap_.patch [bz#1959729] - kvm-i386-cpu-Expose-AVX_VNNI-instruction-to-guest.patch [bz#1924822] - kvm-ratelimit-protect-with-a-mutex.patch [bz#1838221] - kvm-Update-Linux-headers-to-5.13-rc4.patch [bz#1838221] - kvm-i386-Add-ratelimit-for-bus-locks-acquired-in-guest.patch [bz#1838221] - kvm-iothread-generalize-iothread_set_param-iothread_get_.patch [bz#1930286] - kvm-iothread-add-aio-max-batch-parameter.patch [bz#1930286] - kvm-linux-aio-limit-the-batch-size-using-aio-max-batch-p.patch [bz#1930286] - kvm-block-nvme-Fix-VFIO_MAP_DMA-failed-No-space-left-on-.patch [bz#1848881] - Resolves: bz#1977798 (RHEL8.5 guest network interface name changed after upgrade to qemu-6.0) - Resolves: bz#1787194 (After canceling the migration of a vm with VF which enables failover, using "migrate -d tcp:invalid uri" to re-migrating the vm will cause the VF in vm to be hot-unplug.) - Resolves: bz#1959676 (guest status is paused after loadvm on rhel8.5.0) - Resolves: bz#1959729 (SAP/3TB VM migration slowness [idle db]) - Resolves: bz#1924822 ([Intel 8.5 FEAT] qemu-kvm AVX2 VNNI - Fast Train) - Resolves: bz#1838221 ([Intel 8.5 FEAT] qemu-kvm Bus Lock VM Exit - Fast Train) - Resolves: bz#1930286 (randread and randrw regression with virtio-blk multi-queue) - Resolves: bz#1848881 (nvme:// block driver can exhaust IOMMU DMAs, hanging the VM, possible data loss)- kvm-s390x-cpumodel-add-3931-and-3932.patch [bz#1976171] - kvm-file-posix-fix-max_iov-for-dev-sg-devices.patch [bz#1943653] - kvm-scsi-generic-pass-max_segments-via-max_iov-field-in-.patch [bz#1943653] - kvm-osdep-provide-ROUND_DOWN-macro.patch [bz#1943653] - kvm-block-backend-align-max_transfer-to-request-alignmen.patch [bz#1943653] - kvm-block-add-max_hw_transfer-to-BlockLimits.patch [bz#1943653] - kvm-file-posix-try-BLKSECTGET-on-block-devices-too-do-no.patch [bz#1943653] - Resolves: bz#1976171 ([IBM 8.5 FEAT] CPU Model for new IBM Z Hardware - qemu part) - Resolves: bz#1943653 (RHV VM pauses due to 'qemu-kvm' getting EINVAL on i/o to a direct lun with scsi passthrough enabled)- kvm-s390x-css-Introduce-an-ESW-struct.patch [bz#1968326] - kvm-s390x-css-Split-out-the-IRB-sense-data.patch [bz#1968326] - kvm-s390x-css-Refactor-IRB-construction.patch [bz#1968326] - kvm-s390x-css-Add-passthrough-IRB.patch [bz#1968326] - kvm-vhost-user-blk-Fail-gracefully-on-too-large-queue-si.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Make-sure-to-set-Error-on-realize-fai.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Don-t-reconnect-during-initialisation.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Improve-error-reporting-in-realize.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Get-more-feature-flags-from-vhost-dev.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-virtio-Fail-if-iommu_platform-is-requested-but-unsup.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Check-that-num-queues-is-supported-by.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-Fix-backends-without-multiqueue-support.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - Resolves: bz#1968326 ([vfio_ccw] I/O error when checking format - dasdfmt requires --force in quick mode when passed through) - Resolves: bz#1935014 (qemu crash when attach vhost-user-blk-pci with option queue-size=4096) - Resolves: bz#1935019 (qemu guest failed boot when attach vhost-user-blk-pci with option iommu_platform=on) - Resolves: bz#1935020 (qemu guest failed boot when attach vhost-user-blk-pci with option packed=on) - Resolves: bz#1935031 (qemu guest failed boot when attach vhost-user-blk-pci with unmatched num-queues with qsd)- kvm-Add-mtod_check.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-bootp-limit-vendor-specific-area-to-input-packet-mem.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-bootp-check-bootp_input-buffer-size.patch [bz#1970823] - kvm-upd6-check-udp6_input-buffer-size.patch [bz#1970842] - kvm-tftp-check-tftp_input-buffer-size.patch [bz#1970850] - kvm-tftp-introduce-a-header-structure.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-udp-check-upd_input-buffer-size.patch [bz#1970858] - kvm-Fix-DHCP-broken-in-libslirp-v4.6.0.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-redhat-use-the-standard-vhost-user-JSON-path.patch [bz#1804196] - Resolves: bz#1970823 (CVE-2021-3592 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (bootp) [rhel-av-8]) - Resolves: bz#1970842 (CVE-2021-3593 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp6) [rhel-av-8]) - Resolves: bz#1970850 (CVE-2021-3595 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (tftp) [rhel-av-8]) - Resolves: bz#1970858 (CVE-2021-3594 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp) [rhel-av-8]) - Resolves: bz#1804196 (inconsistent paths for interop json files)- kvm-redhat-Expose-upstream-machines-pc-4.2-and-pc-2.11.patch [bz#1897923] - kvm-redhat-Enable-FDC-device-for-upstream-machines-too.patch [bz#1897923] - kvm-redhat-Add-hw_compat_4_2_extra-and-apply-to-upstream.patch [bz#1897923] - kvm-ppc-pef.c-initialize-cgs-ready-in-kvmppc_svm_init.patch [bz#1789757] - kvm-virtio-gpu-handle-partial-maps-properly.patch [bz#1932279] - kvm-redhat-Fix-unversioned-Obsoletes-warning.patch [bz#1950405 bz#1967330] - kvm-redhat-Move-qemu-kvm-docs-dependency-to-qemu-kvm.patch [bz#1950405 bz#1967330] - kvm-redhat-introducting-qemu-kvm-hw-usbredir.patch [bz#1950405 bz#1967330] - kvm-spapr-Fix-EEH-capability-issue-on-KVM-guest-for-PCI-.patch [bz#1976015] - Resolves: bz#1897923 (support Live Migration from Ubuntu 18.04 i440fx to RHEL) - Resolves: bz#1789757 ([IBM 8.5 FEAT] Add machine option to enable secure VM support) - Resolves: bz#1932279 ([aarch64] qemu core dumped when using smmuv3 and iommu_platform enabling at virtio-gpu-pci) - Resolves: bz#1950405 (review qemu-kvm-core dependencies) - Resolves: bz#1967330 (Make qemu-kvm use versioned obsoletes for qemu-kvm-ma and qemu-kvm-rhev) - Resolves: bz#1976015 (spapr: Fix EEH capability issue on KVM guest for PCI passthru)- kvm-block-backend-add-drained_poll.patch [bz#1960137] - kvm-nbd-server-Use-drained-block-ops-to-quiesce-the-serv.patch [bz#1960137] - kvm-disable-CONFIG_USB_STORAGE_BOT.patch [bz#1866133] - kvm-doc-Fix-some-mistakes-in-the-SEV-documentation.patch [bz#1954750] - kvm-docs-Add-SEV-ES-documentation-to-amd-memory-encrypti.patch [bz#1954750] - kvm-docs-interop-firmware.json-Add-SEV-ES-support.patch [bz#1954750] - Resolves: bz#1960137 ([incremental backup] qemu-kvm hangs when Rebooting the VM during full backup) - Resolves: bz#1866133 (Disable usb-bot device in QEMU (unsupported)) - Resolves: bz#1954750 (firmware scheme for sev-es)- kvm-x86-Add-x86-rhel8.5-machine-types.patch [bz#1957838] - kvm-redhat-x86-Enable-kvm-asyncpf-int-by-default.patch [bz#1967603] - kvm-yank-Unregister-function-when-using-TLS-migration.patch [bz#1964326] - Resolves: bz#1957838 (8.5 machine types for x86) - Resolves: bz#1967603 (Enable interrupt based asynchronous page fault mechanism by default) - Resolves: bz#1964326 (Qemu core dump when do tls migration via tcp protocol)- kvm-pc-bios-s390-ccw-don-t-try-to-read-the-next-block-if.patch [bz#1965626] - kvm-redhat-Install-the-s390-netboot.img-that-we-ve-built.patch [bz#1966463] - kvm-sockets-update-SOCKET_ADDRESS_TYPE_FD-listen-2-backl.patch [bz#1967177] - kvm-target-i386-sev-add-support-to-query-the-attestation.patch [bz#1957022] - kvm-spapr-Don-t-hijack-current_machine-boot_order.patch [bz#1960119] - kvm-target-i386-Add-CPU-model-versions-supporting-xsaves.patch [bz#1942914] - kvm-spapr-Remove-stale-comment-about-power-saving-LPCR-b.patch [bz#1940731] - kvm-spapr-Set-LPCR-to-current-AIL-mode-when-starting-a-n.patch [bz#1940731] - Resolves: bz#1965626 (RHEL8.2 - QEMU BIOS fails to read stage2 loader (kvm)) - Resolves: bz#1966463 (Rebuild the s390-netboot.img for downstream instead of shipping the upstream image) - Resolves: bz#1967177 (QEMU 6.0.0 socket_get_fd() fails with the error "socket_get_fd: too many connections") - Resolves: bz#1957022 (SEV: Add support to query the attestation report) - Resolves: bz#1960119 ([regression]Failed to reset guest) - Resolves: bz#1942914 ([Hyper-V][RHEL8.4]Nested Hyper-V on KVM: On Intel CPU L1 2016 can not start with cpu model Skylake-Server-noTSX-IBRS or Skylake-Client-noTSX-IBRS) - Resolves: bz#1940731 ([ppc64le] Hotplug vcpu device hit call trace:[qemu output] KVM: unknown exit, hardware reason 7fff9ce87ed8)- kvm-virtio-net-failover-add-missing-remove_migration_sta.patch [bz#1953045] - kvm-hw-arm-virt-Add-8.5-machine-type.patch [bz#1957667] - kvm-hw-arm-virt-Disable-PL011-clock-migration-through-hw.patch [bz#1957667] - kvm-arm-virt-Register-highmem-and-gic-version-as-class-p.patch [bz#1957667] - kvm-virtio-blk-Fix-rollback-path-in-virtio_blk_data_plan.patch [bz#1927108] - kvm-virtio-blk-Configure-all-host-notifiers-in-a-single-.patch [bz#1927108] - kvm-virtio-scsi-Set-host-notifiers-and-callbacks-separat.patch [bz#1927108] - kvm-virtio-scsi-Configure-all-host-notifiers-in-a-single.patch [bz#1927108] - kvm-hw-arm-smmuv3-Another-range-invalidation-fix.patch [bz#1929720] - Resolves: bz#1953045 (qemu-kvm NULL pointer de-reference during migration at migrate_fd_connect ->...-> notifier_list_notify) - Resolves: bz#1957667 ([aarch64] Add 8.5 machine type) - Resolves: bz#1927108 (It's too slow to load scsi disk when use 384 vcpus) - Resolves: bz#1929720 ([aarch64] Handle vsmmuv3 IOTLB invalidation with non power of 2 size)- kvm-redhat-s390x-add-rhel-8.5.0-compat-machine.patch [bz#1951476] - kvm-redhat-add-missing-entries-in-hw_compat_rhel_8_4.patch [bz#1957834] - kvm-redhat-Define-pseries-rhel8.5.0-machine-type.patch [bz#1957834] - Resolves: bz#1951476 ([s390x] RHEL AV 8.5 new machine type for s390x) - Resolves: bz#1957834 ([ppc64le] RHEL AV 8.5 new machine type for ppc64le)- Rebase to qemu-kvm 6.0.015:6.0.0-33.el815:6.0.0-33.el8.build-id9d7f10be880c6a4cbe65133852e5e0aa824ea7bfblock-ssh.so/usr/lib//usr/lib/.build-id//usr/lib/.build-id/9d//usr/lib64/qemu-kvm/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fexceptions -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -mcpu=power8 -mtune=power8 -funwind-tables -fstack-clash-protectioncpioxz2ppc64le-redhat-linux-gnudirectoryELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, BuildID[sha1]=9d7f10be880c6a4cbe65133852e5e0aa824ea7bf, strippedRRRRRR utf-8ed4f2280e8b829ad8633490f8643b259d19bafe07c6c9c22ca507f65a1d80e79?07zXZ !#,6] b2u jӫ`(y-$$+{'+[v5g u¸-23(8P,Iۣ Nj8t w-# <&5O`!I&\!nW' ^#Gvl1 %}.Aӵ-IW:)v*^U/1)KE!8É&^J;J'`Rt:#]wI`mXg 'G}ĭ9y ykY{yNI΋S_Mܔy_0N@bh4݌B/"4sCfտ2WKJ!Kƍl!fm\PO?f~ >s*I:j}?ԪڞNd5à "KFˀr)n %N~Ns$*6v ڜ>Fv}VGyW 'YU>-ެ@(Cs*sv Isz;_t׶ȲHé]TȟC JCHG_3"G ғ ?04*wP:,+91BA1J F %*~>s%-\O=e}.}| 﨑HW0A%h j,N !|}fF.`LD?`_,'2V`YcбeDKOf?M ߗզ1qTT+f}˧ݕ$ [P"?lSd)xq>ꬹ2pcԸ ,%ax"#o&lz^I*NWf%ju^FL`zqD(h'&TS&Bl]>ͿS,`Gb䵱} o`Zs PqZG` %U0[ NxV 9EwҏOITrMt,rn-vk +LǞ%,RzrQNV<'W"nI׳u3 %2 dGG6U+閗WgQضa:6h5tCF)E1鳺fKB} 4yh)n57s7Pf x?sa@)b1)[(ܨ~;8j˿.pMKQ!TB):ӳ#8N`Uw߫a r焄h mLDXᡥxo7@@m71OE*o-gȷ9x2oC"2\iwKjj=A޿fa|Q.9zӟFN$ÐGUSʆ 9!Q5\> 2FA[Д+!`x[~b)j Ї)k~"͜Flx^b'U`y`6:G[5;/-@X/ ѰcjIK:akL1gw7ɶ&PdVSz1@xzʧl)n3 \, F&yN ,͚;ɺF/,ÊR>S@KSG@{)d A`_ir`N3}a(*Hd2IpZbf]TGXtiAYH6xŭ?f߷Ο\5lITU d*gkQŮQE<]EsYnM.ExO9'm~¼@UB-{UAW5=%ߜ7_ g!2"u7>Q47^b/|!U<emV&Ypt2~'kpACsٓ  bjLA_XP'eμ9ˇZT-Nc%[UFwulhY^uܭOSW LL4E'n$8x$6b~~)<Ei6'cQ.H5猃rb0 ^:WlfR2Isb=8>f`Y/ůbȷ.W}W//]U]2]u%J,3F.%Ô$/5SӼǎ;wqVC~'T06Apl: 넉6 AE+7"-Y%L1׸rileH81< cݲ6̾OxPNQ >j<*3NeqmYb`h,IP~^'T\ *OGIE|eh99%J=5dS3hHF Ŷ>v1&kW/9$;)d)Ox#g^(z3Ja7Z({v.V :HBҘgHȫKV%NU,w=lLWuv@p;VKyL'uQDp3&GBZJ*ZX~c\eAbVxM;9 DC!+.rkX=/ _ė3] ZPF9!avOס oWG~NGlV +̾s\L0ex5 pCci2y„<@Gņ8.g3Qh2r4U .T"@ɠS~ǠB,udDZ7H&+aRQ4;6.vB.1榇A?B9jusO!q&,ܬJ&pqBWu)Ñb0Zr_:?]0>NM)Bduu~zJBs+knTO |Ikz0|1@7xd2 Ɋ!0H"Oy({XېϕYXI3~aONpDr0jLvՏIa)88T } K$CD>Bͮi^3Pƺ>7r7:+ض 3uIx7Q:<C?L[1 O[^+ts[ ;~Pޠ '=n;:2:@ƮN{:5m y@I*!8n/7Gb )_ guؗ}× S4H#*)L`W9sghGz!3CjWtu؀[ C+_=@`*zKpTo$/=|l$% C qVo_ -%21u!7 g2H%u:G2ɌmoKusd*ŷ\@J=c/o,S]BR~بc ]L[l0nvov"ag):XXNP#1,`v,nCe Ow+: A*RWMczd+x볰<8̡A0Oa 'a$vN3!1Ys*Yg UAX"PNq| Y?'T@uOi J{O5-6q>TpvikWC\7w')mMMMRJSLҩgE+-O!y&l(EWmơ3Ll01 Q; ~<|Y $ZDOe[6Af.EnM9f^돧nҴR]Oe RJ9-Y.j>R4AB_ ~.4;۷_Ujn@yvk=Χ욦% .)N2Z V<5]8fm'y# tuW8nAcv -Wշ]k]LL^FJ}Qe( uTzk1bj\-;rX$Ts'grx( qŋHYrBX݄`USni.q:1H6\5bM&qtD\Zgs%DžOybW ng bVFW+Fnx>t"}"I]H`h)9 D_?֫Cڅ%)r{1 kYn+1x^aS,./[F ;| \?ݡuo6yZd//Y-V<O3 XZ??"Av1"q3݀!+H.p( Z*8 ۞[nd"AR7_d{ԒGeA\J nh/0Zk7$lvUّDp0~%̥WջVCӔhaYVèTޑK?9˺jXL4 \LK65n$"<8? QbTlU  %pn3}{x0ɔmat$Cq/'gPŢ 0 ;ǢO)=q^ʶf>:-}xD\2;(PkM%^hr\giʛWu40[\T{;t"fnAfD79 L]tH2E9m Z\ꕉJJމqpkh"ՇGbkKش29#wK0p7 ("9R4L{Ud5D0Z K11^;J WPvOw_Oj.#8qs$Z-Dk8($<fC^'9U9+B snCV<}Ouc aߴ448|=DDӹ J#nLۣQkHFZpI} r>#" lyԸq=9=> (j29%>qI|Cth34h" l :I1>0pUpeDlԭ1w/eo~-M79:Oœ xUs~XɄ4q '0ۘkTl %> Ybw; vGgW͇:.}J 4P ǥCR^Z0'XWZRY V(E f$.iQſd0a?n ^]tF~R e73^9dݶ;K֜n)b n;|lVĠ!ᚅF6`뫟L5Uw '~(OypMO~kv\S=Y_n?)?a81NnL[C}4{x쨠Cۣlk=lXeceК mElؾ/t\U4\(SLqr*y z'Ys7O2&l +_q1٬b:B2“-z4(<;+Ƌ*1]wUM/t4 r 1 ZsO3jrmpFQтZ$/YKcpЁ{buypvzl#8H‡du-/3C䖥ض@m֜"1HP'ϰ B`@zߏ(]ѿ,:Y?ɢpVj`Ky|&!Dl3 3~DΔ~><ŠR1IuYR;MEaz\L[uW`!A lqO%'=,b xKL^v,+6$ᱜL#?^tr+bbo{bnS!YOKˤ!2 <%SL}sWKifEZi@sW(sߜ7@0*@u_/|ϯ. 祍>pM`zMVE#bA3iUzv> Nƕ ى%phrU]XPU[Ρh+Hwd; E] :̡ː쁙|BNd`"hxdGi颤;ص7EGȋ .¹՝ 5'pJ0ZpKG>+9/p#Oz Fp `.AJ73>:WN; X]|7Ny&&Ra'﩮 X$]ía;BИ&ĩk1d)3%= \u3DO.m$?lFr-,{4 w RhZ^'C𹒿 j44ܟtxiO$tЖVv`@5si9em86?4Su}V A)Xl wJ @%Kfp)\F]oKVq ]e8o)pv8f&Xϗ s2ȱHF&k :2Y,ܸuGSLn9%` @x?ط7U{^P*gf&*hU4BѬViH#ֽ? y?.c&3DOWBzPgam`hU艺 ^$yMݣ5]8^ 5\x?WuY EIam5QR!{-:ƋKLeY%+)ɽakDO"!J{Cg wɎrc_:T,|!WlT'O>^Qs%`aA9^f7gE̠&qʣE<Öj}Vhe8fAw.2b>K̓BG*CSGEչ))~jxdf8u~-Nys*%yfU54H8'9`wB@8Ë2i[zͳE+6>]Q}:8.}&ڲ:8+bͣHJ15OEGz72WSAXgȖ$A_ \l2m߳?Qx.҃Uis\G҆ƙ8r1)10dp=ڸ8jL6{?kZ3 +$4ݞ2 @ T?$L~Nٰ"ѳӫϺz323 w TI:ɛjMk]>Udj[\Wj;B\AaQOK":B AgT(6|p5v0hwsg<_R!ND)U֋@VŦ4P]6Q`ܑKt3&97s_҄\!"D+ZNk X墖@ tjMXs\;jTD1JȄ>! @ 35jWhN</ayY%IϢs>c `6K8ii[A$Y*`*Kۚb,Y3拖܉e~`my󪳵B騳K `MH?9~pKWiԦO3%Rχ-S+ *n],eGnVy>TʠbN'z - S k3/|%XzCEЌwE9J~%܊{L,Ts͸(5#bIHܓQNUIFQ! ,0Ó< aGp.c'}QnaПrH v ;F/+]BA ȥJkg OZȵo(;%!A} %&K܏pZ9}7nef̶~['d? M;ms;7VwM͖>bP.9/" GbaK۩3 "Lf.\7,#^Be56 uiUZC,\r*~J2ƧȻ48dB-t:+ Ȥ<ـee9K嶐;q4˔羾XuIIpe3TGxNC | kʾR3g` M>: /%Z׋x7? T( W4z0E2RZBػd5y,ӋA|u-sB,T4E#ruH_6x ~R0軍gqn{%`[YTRwnn,ggw+@~DTIG$/ J)5oD0AJ'7mhΚ<}M;]f.ԹSn/9#c7) ]:>妺t7\;y*=/!kkWڞI%@oGȅ|q>EE ܧD|En Bk!h:DhmC.j%ζn3fJU H=t9zK9 CB'?Ǽ k?M+3rģHJ r|E(3JUJh j~Z(f5ÍN몈):5h4/eG-2h5GmGzC ,Ņ`" ;{XF_tuik iܥ '$ eE-RC:Mg<,xS'{M7&CB{p:X[D Ʌ,#pc}] b1hhj38\}5٤4^{Է1MV;wz}9bwV#kF}C&#SyJHU~&v+lk CdG>(9PuFO<Э6c B>d]åRI\<' ^5||BwxNW/k|0tn0VZga"XmZ}/p?ˬXf \D|  BQاEeOkRilMڶ YZ