qemu-kvm-block-ssh-15:6.0.0-27.el8s >  H a/-a z뾂altL:[YARLpTk$J`$f0ԾswV tc}V'6\kbR0$$o$:8skOw;jGh: }$n4W%d$ [Q^_toj6pGNV*u DLփ u#8+X?a W2֖NnzU Zzl;6woNvs=:dMp~In̆"Iqmb446598f65e792fe43201b2020c9f348104671887fc2d9945f68d90ffaf7a1ba263c2cd867ef6a900328e53e503aff29e2ac7b49ha/-a z뾂alHXW- {4A.fȅI7^~&-8P&k3V*{M5-a6:L[P?~_/N9$eYJ >iW bJz0Z p".N}ԻW<[U|V{!Ƽ#+1QҠN`/^G2){Ky+gZ>:7<}Fbڰ;e'%%# }cc05t_HN >p=5?5d$ ( > - BTiox     +:\h  ' (\8d 9 : G2LH2XI2dX2hY2p\2]2^2b3d4@e4Ef4Hl4Jt4du4pv4|w5x5(y545T5X5^5Cqemu-kvm-block-ssh6.0.027.el8sQEMU SSH block driverThis package provides the additional SSH block driver for QEMU. Install this package if you want to access remote disks using the Secure Shell (SSH) protocol.a9zaarch64-03.rdu2.centos.orgCentOSCentOSGPLv2 and GPLv2+ and CC-BYCBS Development/Toolshttp://www.qemu.org/linuxaarch64+Aa9]a9]a5e3824a42a49264126fc353a503ff6f9768fe061e20e1ad3fbfffcd486a4453fd../../../../usr/lib64/qemu-kvm/block-ssh.sorootrootrootrootrootrootqemu-kvm-6.0.0-27.el8s.src.rpmqemu-kvm-block-sshqemu-kvm-block-ssh(aarch-64)@@@@@@@    @ld-linux-aarch64.so.1()(64bit)ld-linux-aarch64.so.1(GLIBC_2.17)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libssh.so.4()(64bit)libssh.so.4(LIBSSH_4_5_0)(64bit)libssh.so.4(LIBSSH_4_7_0)(64bit)qemu-kvm-common(aarch-64)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)rtld(GNU_HASH)15:6.0.0-27.el8s3.0.4-14.6.0-14.0-15.2-14.14.3a @a@``t```"@`@`P@`!@``Miroslav Rezanina - 6.0.0-27Miroslav Rezanina - 6.0.0-26Danilo Cesar Lemes de Paula - 6.0.0-25.el8Danilo Cesar Lemes de Paula - 6.0.0-24.el8Danilo Cesar Lemes de Paula - 6.0.0-23.el8Danilo Cesar Lemes de Paula - 6.0.0-22.el8Danilo Cesar Lemes de Paula - 6.0.0-21.el8Danilo Cesar Lemes de Paula - 6.0.0-20.el8Danilo Cesar Lemes de Paula - 6.0.0-19.el8Danilo Cesar Lemes de Paula - 6.0.0-18.el8Danilo Cesar Lemes de Paula - 6.0.0-17.el8Danilo Cesar Lemes de Paula - 6.0.0-16.el8- kvm-migration-move-wait-unplug-loop-to-its-own-function.patch [bz#1976852] - kvm-migration-failover-continue-to-wait-card-unplug-on-e.patch [bz#1976852] - kvm-aarch64-Add-USB-storage-devices.patch [bz#1974579] - Resolves: bz#1976852 ([failover vf migration] The failover vf will be unregistered if canceling the migration whose status is "wait-unplug") - Resolves: bz#1974579 (It's not possible to start installation from a virtual USB device on aarch64)- kvm-acpi-pc-revert-back-to-v5.2-PCI-slot-enumeration.patch [bz#1977798] - kvm-migration-failover-reset-partially_hotplugged.patch [bz#1787194] - kvm-hmp-Fix-loadvm-to-resume-the-VM-on-success-instead-o.patch [bz#1959676] - kvm-migration-Move-bitmap_mutex-out-of-migration_bitmap_.patch [bz#1959729] - kvm-i386-cpu-Expose-AVX_VNNI-instruction-to-guest.patch [bz#1924822] - kvm-ratelimit-protect-with-a-mutex.patch [bz#1838221] - kvm-Update-Linux-headers-to-5.13-rc4.patch [bz#1838221] - kvm-i386-Add-ratelimit-for-bus-locks-acquired-in-guest.patch [bz#1838221] - kvm-iothread-generalize-iothread_set_param-iothread_get_.patch [bz#1930286] - kvm-iothread-add-aio-max-batch-parameter.patch [bz#1930286] - kvm-linux-aio-limit-the-batch-size-using-aio-max-batch-p.patch [bz#1930286] - kvm-block-nvme-Fix-VFIO_MAP_DMA-failed-No-space-left-on-.patch [bz#1848881] - Resolves: bz#1977798 (RHEL8.5 guest network interface name changed after upgrade to qemu-6.0) - Resolves: bz#1787194 (After canceling the migration of a vm with VF which enables failover, using "migrate -d tcp:invalid uri" to re-migrating the vm will cause the VF in vm to be hot-unplug.) - Resolves: bz#1959676 (guest status is paused after loadvm on rhel8.5.0) - Resolves: bz#1959729 (SAP/3TB VM migration slowness [idle db]) - Resolves: bz#1924822 ([Intel 8.5 FEAT] qemu-kvm AVX2 VNNI - Fast Train) - Resolves: bz#1838221 ([Intel 8.5 FEAT] qemu-kvm Bus Lock VM Exit - Fast Train) - Resolves: bz#1930286 (randread and randrw regression with virtio-blk multi-queue) - Resolves: bz#1848881 (nvme:// block driver can exhaust IOMMU DMAs, hanging the VM, possible data loss)- kvm-s390x-cpumodel-add-3931-and-3932.patch [bz#1976171] - kvm-file-posix-fix-max_iov-for-dev-sg-devices.patch [bz#1943653] - kvm-scsi-generic-pass-max_segments-via-max_iov-field-in-.patch [bz#1943653] - kvm-osdep-provide-ROUND_DOWN-macro.patch [bz#1943653] - kvm-block-backend-align-max_transfer-to-request-alignmen.patch [bz#1943653] - kvm-block-add-max_hw_transfer-to-BlockLimits.patch [bz#1943653] - kvm-file-posix-try-BLKSECTGET-on-block-devices-too-do-no.patch [bz#1943653] - Resolves: bz#1976171 ([IBM 8.5 FEAT] CPU Model for new IBM Z Hardware - qemu part) - Resolves: bz#1943653 (RHV VM pauses due to 'qemu-kvm' getting EINVAL on i/o to a direct lun with scsi passthrough enabled)- kvm-s390x-css-Introduce-an-ESW-struct.patch [bz#1968326] - kvm-s390x-css-Split-out-the-IRB-sense-data.patch [bz#1968326] - kvm-s390x-css-Refactor-IRB-construction.patch [bz#1968326] - kvm-s390x-css-Add-passthrough-IRB.patch [bz#1968326] - kvm-vhost-user-blk-Fail-gracefully-on-too-large-queue-si.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Make-sure-to-set-Error-on-realize-fai.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Don-t-reconnect-during-initialisation.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Improve-error-reporting-in-realize.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Get-more-feature-flags-from-vhost-dev.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-virtio-Fail-if-iommu_platform-is-requested-but-unsup.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Check-that-num-queues-is-supported-by.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-Fix-backends-without-multiqueue-support.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - Resolves: bz#1968326 ([vfio_ccw] I/O error when checking format - dasdfmt requires --force in quick mode when passed through) - Resolves: bz#1935014 (qemu crash when attach vhost-user-blk-pci with option queue-size=4096) - Resolves: bz#1935019 (qemu guest failed boot when attach vhost-user-blk-pci with option iommu_platform=on) - Resolves: bz#1935020 (qemu guest failed boot when attach vhost-user-blk-pci with option packed=on) - Resolves: bz#1935031 (qemu guest failed boot when attach vhost-user-blk-pci with unmatched num-queues with qsd)- kvm-Add-mtod_check.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-bootp-limit-vendor-specific-area-to-input-packet-mem.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-bootp-check-bootp_input-buffer-size.patch [bz#1970823] - kvm-upd6-check-udp6_input-buffer-size.patch [bz#1970842] - kvm-tftp-check-tftp_input-buffer-size.patch [bz#1970850] - kvm-tftp-introduce-a-header-structure.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-udp-check-upd_input-buffer-size.patch [bz#1970858] - kvm-Fix-DHCP-broken-in-libslirp-v4.6.0.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-redhat-use-the-standard-vhost-user-JSON-path.patch [bz#1804196] - Resolves: bz#1970823 (CVE-2021-3592 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (bootp) [rhel-av-8]) - Resolves: bz#1970842 (CVE-2021-3593 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp6) [rhel-av-8]) - Resolves: bz#1970850 (CVE-2021-3595 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (tftp) [rhel-av-8]) - Resolves: bz#1970858 (CVE-2021-3594 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp) [rhel-av-8]) - Resolves: bz#1804196 (inconsistent paths for interop json files)- kvm-redhat-Expose-upstream-machines-pc-4.2-and-pc-2.11.patch [bz#1897923] - kvm-redhat-Enable-FDC-device-for-upstream-machines-too.patch [bz#1897923] - kvm-redhat-Add-hw_compat_4_2_extra-and-apply-to-upstream.patch [bz#1897923] - kvm-ppc-pef.c-initialize-cgs-ready-in-kvmppc_svm_init.patch [bz#1789757] - kvm-virtio-gpu-handle-partial-maps-properly.patch [bz#1932279] - kvm-redhat-Fix-unversioned-Obsoletes-warning.patch [bz#1950405 bz#1967330] - kvm-redhat-Move-qemu-kvm-docs-dependency-to-qemu-kvm.patch [bz#1950405 bz#1967330] - kvm-redhat-introducting-qemu-kvm-hw-usbredir.patch [bz#1950405 bz#1967330] - kvm-spapr-Fix-EEH-capability-issue-on-KVM-guest-for-PCI-.patch [bz#1976015] - Resolves: bz#1897923 (support Live Migration from Ubuntu 18.04 i440fx to RHEL) - Resolves: bz#1789757 ([IBM 8.5 FEAT] Add machine option to enable secure VM support) - Resolves: bz#1932279 ([aarch64] qemu core dumped when using smmuv3 and iommu_platform enabling at virtio-gpu-pci) - Resolves: bz#1950405 (review qemu-kvm-core dependencies) - Resolves: bz#1967330 (Make qemu-kvm use versioned obsoletes for qemu-kvm-ma and qemu-kvm-rhev) - Resolves: bz#1976015 (spapr: Fix EEH capability issue on KVM guest for PCI passthru)- kvm-block-backend-add-drained_poll.patch [bz#1960137] - kvm-nbd-server-Use-drained-block-ops-to-quiesce-the-serv.patch [bz#1960137] - kvm-disable-CONFIG_USB_STORAGE_BOT.patch [bz#1866133] - kvm-doc-Fix-some-mistakes-in-the-SEV-documentation.patch [bz#1954750] - kvm-docs-Add-SEV-ES-documentation-to-amd-memory-encrypti.patch [bz#1954750] - kvm-docs-interop-firmware.json-Add-SEV-ES-support.patch [bz#1954750] - Resolves: bz#1960137 ([incremental backup] qemu-kvm hangs when Rebooting the VM during full backup) - Resolves: bz#1866133 (Disable usb-bot device in QEMU (unsupported)) - Resolves: bz#1954750 (firmware scheme for sev-es)- kvm-x86-Add-x86-rhel8.5-machine-types.patch [bz#1957838] - kvm-redhat-x86-Enable-kvm-asyncpf-int-by-default.patch [bz#1967603] - kvm-yank-Unregister-function-when-using-TLS-migration.patch [bz#1964326] - Resolves: bz#1957838 (8.5 machine types for x86) - Resolves: bz#1967603 (Enable interrupt based asynchronous page fault mechanism by default) - Resolves: bz#1964326 (Qemu core dump when do tls migration via tcp protocol)- kvm-pc-bios-s390-ccw-don-t-try-to-read-the-next-block-if.patch [bz#1965626] - kvm-redhat-Install-the-s390-netboot.img-that-we-ve-built.patch [bz#1966463] - kvm-sockets-update-SOCKET_ADDRESS_TYPE_FD-listen-2-backl.patch [bz#1967177] - kvm-target-i386-sev-add-support-to-query-the-attestation.patch [bz#1957022] - kvm-spapr-Don-t-hijack-current_machine-boot_order.patch [bz#1960119] - kvm-target-i386-Add-CPU-model-versions-supporting-xsaves.patch [bz#1942914] - kvm-spapr-Remove-stale-comment-about-power-saving-LPCR-b.patch [bz#1940731] - kvm-spapr-Set-LPCR-to-current-AIL-mode-when-starting-a-n.patch [bz#1940731] - Resolves: bz#1965626 (RHEL8.2 - QEMU BIOS fails to read stage2 loader (kvm)) - Resolves: bz#1966463 (Rebuild the s390-netboot.img for downstream instead of shipping the upstream image) - Resolves: bz#1967177 (QEMU 6.0.0 socket_get_fd() fails with the error "socket_get_fd: too many connections") - Resolves: bz#1957022 (SEV: Add support to query the attestation report) - Resolves: bz#1960119 ([regression]Failed to reset guest) - Resolves: bz#1942914 ([Hyper-V][RHEL8.4]Nested Hyper-V on KVM: On Intel CPU L1 2016 can not start with cpu model Skylake-Server-noTSX-IBRS or Skylake-Client-noTSX-IBRS) - Resolves: bz#1940731 ([ppc64le] Hotplug vcpu device hit call trace:[qemu output] KVM: unknown exit, hardware reason 7fff9ce87ed8)- kvm-virtio-net-failover-add-missing-remove_migration_sta.patch [bz#1953045] - kvm-hw-arm-virt-Add-8.5-machine-type.patch [bz#1957667] - kvm-hw-arm-virt-Disable-PL011-clock-migration-through-hw.patch [bz#1957667] - kvm-arm-virt-Register-highmem-and-gic-version-as-class-p.patch [bz#1957667] - kvm-virtio-blk-Fix-rollback-path-in-virtio_blk_data_plan.patch [bz#1927108] - kvm-virtio-blk-Configure-all-host-notifiers-in-a-single-.patch [bz#1927108] - kvm-virtio-scsi-Set-host-notifiers-and-callbacks-separat.patch [bz#1927108] - kvm-virtio-scsi-Configure-all-host-notifiers-in-a-single.patch [bz#1927108] - kvm-hw-arm-smmuv3-Another-range-invalidation-fix.patch [bz#1929720] - Resolves: bz#1953045 (qemu-kvm NULL pointer de-reference during migration at migrate_fd_connect ->...-> notifier_list_notify) - Resolves: bz#1957667 ([aarch64] Add 8.5 machine type) - Resolves: bz#1927108 (It's too slow to load scsi disk when use 384 vcpus) - Resolves: bz#1929720 ([aarch64] Handle vsmmuv3 IOTLB invalidation with non power of 2 size)- kvm-redhat-s390x-add-rhel-8.5.0-compat-machine.patch [bz#1951476] - kvm-redhat-add-missing-entries-in-hw_compat_rhel_8_4.patch [bz#1957834] - kvm-redhat-Define-pseries-rhel8.5.0-machine-type.patch [bz#1957834] - Resolves: bz#1951476 ([s390x] RHEL AV 8.5 new machine type for s390x) - Resolves: bz#1957834 ([ppc64le] RHEL AV 8.5 new machine type for ppc64le)- Rebase to qemu-kvm 6.0.015:6.0.0-27.el8s15:6.0.0-27.el8s.build-id8bc84919e246ef7028f9230cedc1b3ad8c8881block-ssh.so/usr/lib//usr/lib/.build-id/bb//usr/lib64/qemu-kvm/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fexceptions -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -fasynchronous-unwind-tables -fstack-clash-protectioncpioxz2aarch64-redhat-linux-gnudirectoryELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, BuildID[sha1]=bb8bc84919e246ef7028f9230cedc1b3ad8c8881, strippedRRRRRRRR utf-823b744da86754b1bb241652a9b642b9029b0dd5084c18cfa01ab4ea7fd6d5ff8?07zXZ !#,.] b2u jӫ`(y-k+AvV*W JOcXqʗVF9i u_dmc^@UĂ :SN6o~`k,͕U3 lQᯂ+X=nYDVIgW,wȎvk{Ne )V~Eh7EktA^rEhBm6]ߍ|P\CLyoR%Ɛ^n 9|e촕byw-*()Y ߁nN.pxJ#sġ4|W=D4)^HKalKS` jRCu$Vܝyc-Ц dGV5($-ζ:^(؏Tb`wS )a>tx+!]*ofg>\Y*<@oZduh4ޡb’28 wԫ䣈:NRo/pWX41t;T&`26Q]>ʿWJcIaRSI/xU AC~[bKxrI5и :>^LS.B ' IȕrY00DJv{OFCdvіHfpX>RdJb"M\ ZvVOQ,󦻜pٟMF3)aZ˟ds8/ڣȀ4ި! oq'70psoCkѿ}'+}PիWo]yģ ./;5ѳCD] UKf9[fMhPlmfq4釋.^ G&+M^x?ӢR!mh($z:v2 7#Epa.Q}hm F*!"(v/kXA? Fyj%U3h$R57V3w O3 bcy4x|`.a;[_e&;VH-iY]VB_5`ÂVM4ImDdD]ז-uFRD =BQUv*#(ݑC8b >0/\\<㍲Bܗ&G2#φ]H!ȗz{:$z7TSʤ^h䎦5gf $AUu?$#nJEn\4:IDCH˯N}@lOTG<֖e:E|Ub0}h5ËytY]>-Cxxoy,1g) cPfE,N EaPިOoIS"NY>KN]7XsD": 97EqAZܐqXU1r\Ie\vGND?\: p+D`i@i//KnaVKk}$ =-W bk߱aD!0CY@C^0R`36gyp ԭaiXJ]Kҹh( ֡WeՃgؒk =qk h ڎρlT*;AYݙ$O zYɎN>i9;^!lhᄌd65,`ϯ9])9JjXϐ;i*k}d&֚GeIR[X!.Y9̖l)%sO]nC]Ytyq E'ͺĐe4Uq}y.? vZ;!sW cch>_g9ȑՏЂi.*k)C-ivf`>xzكBT^[ ɶ^i@^˙B0g'R nѽUWF.]zwFJ8"fnK;0yɅ,M8!SھgKp/|*}v[kz GY%d$ߔ{7t"4SڿEb*W ƥJ ϸ`J֬/\=ހGY_kDIppE"SCGa0ڀ ߓ@F4>͋;T-;}W7_8V ψxd.qWP>b V7j?Fl ۻSz UN'L65*[xKx*Sd)YxlV,, JUaxcj{Yλ?ˉ ڼפ$#.$I|;vQtdT`˴q)(-QEpgn.,oΑ,o4(g(7{%!(ͼ{Q#yS<*K̈}M!r&- ,E+idyJ8+kd.)[JB܅^ψGԪjgDk8:oyQ AoMo-ёU ]T)Ew >&xݻ5T*ʒ9Ng>/DTM\8.m֚p=%d3:֌V.?$etGLXk'xu מ/> DJBp10sD_)|?ro#;8ki/yPIgZ14jm= :eWK s,Q5a/ r#S.ENzED^j?L!$}e䠷$yTՅwi'tˏ9_#M+*QFB??m%ݶU4'Σ?Io=Х_ "N2߯{i ,H?ds₍HB˲<y2ւQYtc4|JᦥU~ q8酜[KJ AyFKtS͹D !@/hډA+QUfs>X~uv]+v' _}طDOLx74H߷Z'_¥l|Wl B\;_Sϗ,鑤G\H?1i[ ѳJ]Š"1(7B?2ڇedc1IgՒ9FYj< ޔgwgƦ`6{Cbh,ncmPȭ`bsQECYݚ/ȝ{-hRމ}1uZ RϲߩX{gjTijFIfm^wޕwI. i[V+?bB^ j @G_f}b0pjcaMotkK(-poEO+_nXIiVslFP|D-FaHgLÿ.n{6ۈ5xRvpUCC#-B_RH04u tE.jV"ȚNf%6rzw%bw+&b 3|kϔA{yLk+/B`%a1ū+{XLÔ1z)D 3 :IoZ~myFdk{Q&`'HPC5FGy8/5=oU8D9Vz2~`aH-2yꬸyD2׽0Lڻ/o|ӳb涪th??#K`0|yv+%$ˎC$) Z-n M.N or9!=BN`KW=}WY?TQ:4o^|B  Ow0JE6r%i>C-sY"}b3rZy5 c?>2俋,һ6eڋ(-17q* uEC) # &°mM~'P>3԰hyHpJ+:A-Жʖ|lRmf"l5Yf8)OQ5g3 | @oKi樂5~~EI~fM/G4[s:SqDRl-}[ĸ ϡE;=q) ,DIEfLM/%K Է& (F]5:NsXfW3n/Jz#~2C݋j:7AxR0e6?P5Җfr(l(u&nT^yd:qp76RU-:&3M>">q@;3!Jی6,yZ_.hHMOĈ)hO1/T-HፊG $qH|l#f/>oBiW7jC^P`-ږN!FK>B!-t6`Nj`8E-S_\HM%y1Ze6E'ӏc]>y-GtQX6;5w`z}kܢ?OZgb]2a؅FȻJ1f>,)ؗZ`O QלG vA(rvވsŸ WtnjJU}O?&rg[&vf&V(Y 8IO.B?ajC&2fMP2hc҇@Otsz`KIޖ킽 A㧺~%\%|-Uz|LX%lp,lbZۡ4L_o+t:̯gbd˦+Gu9pG¢H8|&@:R|/C4/ DY= @>'іcn $xIeSc&M,h=n%}QnVdP3ha؝}Jc60.\|#1|ܓ_"rX‡ؾ ]N=^JU#&Smy,Mr9ju`Ƅ({ OƫI ,H !It訥YUALY}GG{q+=J{xx2_1I5T9Tdi LYlb 9`hU܄;Uą0.QvWۿ\Ya'^ wQąPKϤyoYn> *l`P'Ws},v0%%#x7>^K)<8_m;9E[]ĺ*\γF3262X"|l^-+r+T ~w,QJ)DFNFr]Eds4<!0{V? oKWvJͰ)QxOj&OZʧ;>9׳['ǂun *K>@*K[J =b=JW˶nacn~[XǗ! /amFtUZi*] cZ-kbW82͐]rGhw |l5!-K_#<8C'WN PyՁA8Bv6 uin8Y䠴fBmP:~ TÀ*U@7rAџ4k(GguQP6u:oF$iѰwY?52VEY e]:^ᢛpQ+ޛٺÎȇޚ\=.ht dod0¹:!L[j<_bѹsy ;$0o xhI~Tfj}S° K#_ yJUr]E6c |cdnS ĵZ2GRc|\e'_i%ew֚ϠUn;x=RGg)`a`b^$ ƯV"%qC8G+ 7')mћbx"}k^;`IF팹MR\SĂr^GYj#Z fY3.HNw F pOYө5jIN=I )*JS,UYc9иf$5+Әw[ AY }-\׺u'j֐JC.0Hiea%ȗ_JsW-P* 1#&f/K)atx}3z|7WN_4J}Ibࠐc?8kהɐQzrdsi! \f3;K*5r,Aqyjn5q p' |K7!x'gٸwpRIpvvMj_Tv u5hlEmTˬ*JqbێXe'x_z(ڙyw-nEet4K(slFb%EF/l` un-t" 8=1i>TJ`'W[M(Ȑ xY~Q C V2g\X1YlWVN>ԁ95b+-aPx<{K*6Co14A`{#?kV n,X돼"`T\qDVq*RqlTY@t;Խ8H-̼Oe:2֭3>njpA_ &Qc7S8h7^ ΈtMB Ԅ 9;,5\[u,f4H}qxG%ɕ^}9UKfU)u Ti0TZ@? }CiNfS_w0=85Pv- ٠9T5 ؅BVCa4qJF׷vC8d~BU򃒾'VR#tuKQ;~I;t_$Y<@wCN ?͠z5w?&۸Fk `'=64`z98:.8c4߇eCakMuT[.LE!#gq%18l^ЄwOӋ?]2̟#W G{\?wC9?0mGס)pC^8VZ6uMM \ 2"qvh~N %w7H\w m1USyL~(2Oɿ}*ðdG 1la]MKwFj{&ٔleo@b vPDNj4<ċ)Q?:tʹN+?5@Y=:6Ѿ͗)CnjҺ՞s&W?ci1&NYR%t*]ߔ)ۆ;#{eZ#sDB9(H7g+ t ڇlx!84ZN&#ϗMYR8k%pɤOc!i%|94LNݦpzdPv2,0ߒDHn;Ȯ .+D;NVQf}Xd-t}LmZ .)kqЀ~"f??MDjnKV 0;T(􃬮! op52Qݣ'p6"]K mdpIOX m~#$}Med{j*-՛ 1͝S&\wd碹ZСG(Ka$"$҆"5:P¯x'!K^yɄ1{n9%|[i֩(fΩb&Ćv̞# f։Vֿ!:-G ߬ 3$uKF՚Efa8-jYnMK Jhw\Z)]y7_Mf "yP# % 6F׬/>nY b"l.U19Z+`+,_4 zzSMbҠYEM&y8 ӌ9z`8g(X O?MY^Y1g~ +ZeJfpJ.om2YuQyiS2s9YW8 '-y񅲚J[M}qȅ[yZfJ+(liMe^jCU[Km޾d t~$5iޚukmގX b| U#3L,ޖ}MI+;dɘc8cyM %Yiky1šIV j(c"bdUO\,O>Z!ArfNj"yj8*F Oml8Z{a&XBԟڬ>ۻ|H)~fBFV2Kgqd^Kȶ YZ