xen-4.12.2-2.fc31$>o~/tw7"?>s>AM?Md   5! 0<LRY3x3 3 D3 3 3 3|3{3z3`H(8+9X+:+>=?=G=3H>3I?3X?Y?\@3]@3^DYbFddGeGfGlGtG3uH3vItwJ3xK3yL8M`MdMMMCxen4.12.22.fc31Xen is a virtual machine monitorThis package contains the XenD daemon and xm command line tools, needed to manage virtual machines running under the Xen hypervisor^6buildhw-09.phx2.fedoraproject.org$Fedora ProjectFedora ProjectGPLv2+ and LGPLv2+ and BSDFedora ProjectUnspecifiedhttp://xen.org/linuxx86_64 if [ $1 -eq 1 ] && [ -x /usr/bin/systemctl ] ; then # Initial installation /usr/bin/systemctl --no-reload preset xendomains.service || : fi if [ $1 -eq 0 ] && [ -x /usr/bin/systemctl ] ; then # Package removal, not upgrade /usr/bin/systemctl --no-reload disable --now xendomains.service || : fie ]]/wwww1tww,,MM((XX-=Rfx!QBAAAAA큤A큤A큤A큤A큤A큤A큤^6^7 ^7 ^8H^8H^8H^8H^8H^6^7V^7V]_^8G^8G^8G^8E]_^8G^8G^8G^8F^8F^7V]_^8G^8G^8G^8G^8G^8G^8G^8G^8G^8G^8G^8G^8G^8G^8G^8G^8G]_]_]_]_]_]_]_^8H]_^6cde361b3ba1429081c6608db63ea8b51c7925c2916b291d33b647ffb9e4bd5b3e7d4ae6b1aadab172153c9ed4f00fdf691badf7b7bbd092fd8ccd743bb16470d1c1319d8468e5c9bc69e413b020e85f93c13893a253425300ccf3482cc5118fbcb0a90a9aaf665915c62bd5bf4e4ccbde1004b48f33eb6f3c9ee12bcad943478e16f1596201850fd4a63680b27f603cb64e67176159be3d8ed78a4403fdb1700ce318228cc95dcac536976ebf908f90274f17414b6c5f5904222c5d3a46353dfce318228cc95dcac536976ebf908f90274f17414b6c5f5904222c5d3a46353dfe16f1596201850fd4a63680b27f603cb64e67176159be3d8ed78a4403fdb1700ce318228cc95dcac536976ebf908f90274f17414b6c5f5904222c5d3a46353dfce318228cc95dcac536976ebf908f90274f17414b6c5f5904222c5d3a46353dfde87bd02ad1d23fd255e147903d70e7a5d809f8b98309b87c70fdf816bfc83dfd6173a4e4a04944b29152c7b5697ab5f52ba2430cd2a21d9f1fb4717a545e2afe3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b85560db94ece9b3cb0f8e88f5a0f996d30df77e12411df3fdb919c434a34a1512ca60db94ece9b3cb0f8e88f5a0f996d30df77e12411df3fdb919c434a34a1512cabc660c756ced7386e1645d626346a2c340fd23aafb88321d584644e7664bee16bc660c756ced7386e1645d626346a2c340fd23aafb88321d584644e7664bee162a9df95a88c684cf10af9d6e409282d65408643a679f24e5dd65e613ea752e1a2a9df95a88c684cf10af9d6e409282d65408643a679f24e5dd65e613ea752e1a6d99d0b3d737cdf1cf1727fbf78964cd17d28934be859927c2da977deb2668226d99d0b3d737cdf1cf1727fbf78964cd17d28934be859927c2da977deb266822b9bb7b41c525d7030f9c9a1ec7e3007c604b1de7e10db6075b8c6137fdc519bdb9bb7b41c525d7030f9c9a1ec7e3007c604b1de7e10db6075b8c6137fdc519bdf115983142798c985a8d2307071a33ebe012bc109da26a25a8e3a5c24961bbb9f115983142798c985a8d2307071a33ebe012bc109da26a25a8e3a5c24961bbb9e078883174a170cba7ea35925923dba1e7e74bd72368caf7a1adbf4f75558e0ee078883174a170cba7ea35925923dba1e7e74bd72368caf7a1adbf4f75558e0e2fc961ec36d74d6e8098091126d17d8ad1ecaf6b788d781983e0c19005b3b25b2fc961ec36d74d6e8098091126d17d8ad1ecaf6b788d781983e0c19005b3b25bfde9b3242a3903eb3d332557c140e3e08c77511e84a230fde0d6bdc4481578370b38d4d8c1f7f306f7d089c7976a5fd736cea9e10f890aedfd7b5cefed2c76c10736af1fb20f7a96d1777cc4f501fc66d738663d5bb67eb9f3aa6a1bfcb2b1b377cb7416a8757b66e9c7fe56524d7cbc31cdd32ead43c8e85eedc26f495bc497e8ba2ffc2a46891e2a3f49d4563fc87b04fba6bafa282ec4cf3e171cd74efd795fa7f77bedf4db82a023b5d3b0f3fd8578a70f48392d45164ac5342787b47ee1fcfb4359def1ec17bc84f03448d203891600dc79459907ca1dd15f18511af5badba0d79260259c013c52e5d4daeaea564a2fbb9ff7fc6778c377a401ec3898de399cf37666cc8290df386f28f6ce4c033a1171f7feeaaa5c39a8cfba52fe51c4../../../../usr/lib64/python3.7/site-packages/xen/lowlevel/xs.cpython-37m-x86_64-linux-gnu.so../../../../usr/lib64/python3.7/site-packages/xen/lowlevel/xc.cpython-37m-x86_64-linux-gnu.sorootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootxen-4.12.2-2.fc31.src.rpmconfig(xen)python3.7dist(xen)python3dist(xen)xenxen(x86-64) @@@@@@@@@@@@@     @/bin/sh/bin/sh/usr/bin/python3config(xen)iproutekpartxlibc.so.6()(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libc.so.6(GLIBC_2.7)(64bit)libpthread.so.0()(64bit)libpthread.so.0(GLIBC_2.2.5)(64bit)libpython3.7m.so.1.0()(64bit)libxenctrl.so.4.12()(64bit)libxenguest.so.4.12()(64bit)libxenstore.so.3.0()(64bit)python(abi)python3-lxmlrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PartialHardlinkSets)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsZstd)rtld(GNU_HASH)systemdsystemdxen-runtime4.12.2-2.fc313.73.0.4-14.6.0-14.0.4-14.0-15.4.18-14.12.2-2.fc314.15.1^@^!@]@]]ʞ]ʞ]]]Z@]M`@]<<] #]@\h\ڭ\C@\~d\eX@\V\[@[@[^[[[[~[v[r@[r@[GB[3|@[#@[@Z@ZZmZw@ZZZ@Z}@ZvMichael Young - 4.12.2-2Michael Young - 4.12.2-1Michael Young - 4.12.1-8Michael Young - 4.12.1-7Michael Young - 4.12.1-6Michael Young - 4.12.1-5Michael Young - 4.12.1-4Miro Hrončok - 4.12.1-3Miro Hrončok - 4.12.1-2Michael Young - 4.12.1-1Fedora Release Engineering - 4.12.0-5Michael Young - 4.12.0-4Zbigniew Jędrzejewski-Szmek Michael Young - 4.12.0-3Michael Young - 4.12.0-2Michael Young - 4.12.0-1Michael Young - 4.11.1-4Michael Young - 4.11.1-3Fedora Release Engineering - 4.11.1-2Michael Young - 4.11.1-1Michael Young - 4.11.0-10Michael Young - 4.11.0-9Michael Young - 4.11.0-8Michael Young - 4.11.0-7Michael Young - 4.11.0-6Michael Young Michael Young - 4.11.0-5Michael Young - 4.11.0-4Michael Young - 4.11.0-3Michael Young - 4.11.0-2Michael Young - 4.11.0-1Michael Young - 4.10.1-5Michael Young - 4.10.1-4Michael Young - 4.10.1-3Michael Young - 4.10.1-2Michael Young - 4.10.1-1Michael Young - 4.10.0-9Michael Young - 4.10.0-8Michael Young - 4.10.0-7Michael Young - 4.10.0-6Michael Young Igor Gnatenko - 4.10.0-5Igor Gnatenko - 4.10.0-4- arm: a CPU may speculate past the ERET instruction [XSA-312]- update to 4.12.2 remove patches for issues now fixed upstream- denial of service in find_next_bit() [XSA-307, CVE-2019-19581, CVE-2019-19582] (#1782211) - denial of service in HVM/PVH guest userspace code [XSA-308, CVE-2019-19583] (#1782206) - privilege escalation due to malicious PV guest [XSA-309, CVE-2019-19578] (#1782210) - Further issues with restartable PV type change operations [XSA-310, CVE-2019-19580] (#1782207) - vulnerability in dynamic height handling for AMD IOMMU pagetables [XSA-311, CVE-2019-19577] (#1782208) - add patches needed to apply XSA-311- Device quarantine for alternate pci assignment methods [XSA-306, CVE-2019-19579] (#1780559)- add missing XSA-299 patches- x86: Machine Check Error on Page Size Change DoS [XSA-304, CVE-2018-12207] - TSX Asynchronous Abort speculative side channel [XSA-305, CVE-2019-11135]- VCPUOP_initialise DoS [XSA-296, CVE-2019-18420] (#1771368) - missing descriptor table limit checking in x86 PV emulation [XSA-298, CVE-2019-18425] (#1771341) - Issues with restartable PV type change operations [XSA-299, CVE-2019-18421] (#1767726) - add-to-physmap can be abused to DoS Arm hosts [XSA-301, CVE-2019-18423] (#1771345) - passed through PCI devices may corrupt host memory after deassignment [XSA-302, CVE-2019-18424] (#1767731) - ARM: Interrupts are unconditionally unmasked in exception handlers [XSA-303, CVE-2019-18422] (#1771443)- Rebuilt for Python 3.8.0rc1 (#1748018)- Rebuilt for Python 3.8- update to 4.12.1 remove patches for issues now fixed upstream adjust xen.gcc9.fixes.patch- Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild- Unlimited Arm Atomics Operations [XSA-295, CVE-2019-17349, CVE-2019-17350] (#1720760) - some debug files are now properly packaged in debuginfo rpms- Fix build with python3.8 (#1704807)- fix HVM DomU boot on some chipsets - fix expected FTBFS with Python 3.8 (#1704807) - adjust grub2 workaround- Microarchitectural Data Sampling speculative side channel [XSA-297, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091] - additional patches so above applies cleanly - work around grub2 issues in dom0- update to 4.12.0 (#1694695) remove patches for issues now fixed upstream replace xen.use.fedora.ipxe.patch with --with-system-ipxe drop xen.glibcfix.patch xen.gcc8.temp.fix.patch which are no longer needed adjust xen.python.env.patch xen.gcc9.fixes.patch xen.hypervisor.config refresh kdd is now xen-kdd, xenmon.py is now xenmon, fsimage.so is now xenfsimage.so fs libdir is now xenfsimage libdir xen-ringwatch xen-bugtool have been dropped - remove remaining traces of efiming and efi_flags logic - switch from python2 to python3 - drop systemd_postun and renumber patches- xen: various flaws (#1685577) grant table transfer issues on large hosts [XSA-284, CVE-2019-17340] race with pass-through device hotplug [XSA-285, CVE-2019-17341] x86: steal_page violates page_struct access discipline [XSA-287, CVE-2019-17342] x86: Inconsistent PV IOMMU discipline [XSA-288, CVE-2019-17343] missing preemption in x86 PV page table unvalidation [XSA-290, CVE-2019-17344] x86/PV: page type reference counting issue with failed IOMMU update [XSA-291, CVE-2019-17345] x86: insufficient TLB flushing when using PCID [XSA-292, CVE-2019-17346] x86: PV kernel context switch corruption [XSA-293, CVE-2019-17347] x86 shadow: Insufficient TLB flushing when using PCID [XSA-294, CVE-2019-17348]- add gcc9 build fixes (#1676229)- Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild- update to 4.11.1 remove patches for issues now fixed upstream adjust xen.use.fedora.ipxe.patch - only include qemutrad build requirements for platforms that use it - construct ovmf.bin from edk2-ovmf package (#1656651)- insufficient TLB flushing / improper large page mappings with AMD IOMMUs [XSA-275, CVE-2018-19961, CVE-2018-19962] (#1651665) - x86: DoS from attempting to use INVPCID with a non-canonical addresses [XSA-279, CVE-2018-19965] (#1651970) - xen: various flaws (#1652251) resource accounting issues in x86 IOREQ server handling [XSA-276, CVE-2018-19963] x86: incorrect error handling for guest p2m page removals [XSA-277, CVE-2018-19964] Fix for XSA-240 conflicts with shadow paging [XSA-280, CVE-2018-19966]- guest use of HLE constructs may lock up host [XSA-282, CVE-2018-19967]- x86: Nested VT-x usable even when disabled [XSA-278, CVE-2018-18883] (#1643118)- set /usr/bin/python2 at the start of another python script- move pkgconfig files to xen-devel (#1629643)- set /usr/bin/python2 at the start of some python scripts- move creation of /usr/lib/xen symlink to posttrans to avoid rpm conflict- move files from /usr/lib/xen to /usr/libexec/xen - create symlink at /usr/lib/xen for compatibility- replace use of deprecated vwprintw- no longer need to set python_sitearch - L1 Terminal Fault speculative side channel patch bundle [XSA-273, CVE-2018-3620, CVE-2018-3646] also includes Use of v2 grant tables may cause crash on ARM [XSA-268, CVE-2018-15469] (#1616081) x86: Incorrect MSR_DEBUGCTL handling lets guests enable BTS [XSA-269, CVE-2018-15468] (#1616077) oxenstored does not apply quota-maxentity [XSA-272, CVE-2018-15470] (#1616080)- update to 4.11.0 (#1592976) remove patches for issues now fixed upstream adjust xen.use.fedora.ipxe.patch drop parts of xen.fedora.efi.build.patch & xen.gcc8.temp.fix.patch - replace use of deprecated brctl command (#1588712) - add gcc BuildRequires - adjustments now /usr/bin/python is in a separate package - update hypervisor configuration for arm - put back some gcc fixes needed for arm and i686 - work around a build issue with perl - i686 now want to build EFI hypervisor (actually x86_64) so let it- preemption checks bypassed in x86 PV MM handling [XSA-264, CVE-2018-12891] (#1595959) - x86: #DB exception safety check can be triggered by a guest [XSA-265, CVE-2018-12893] (#1595958) - libxl fails to honour readonly flag on HVM emulated SCSI disks [XSA-266, CVE-2018-12892] (#1595957)- Speculative register leakage from lazy FPU context switching [XSA-267, CVE-2018-3665] - fix for change in iasl output- Speculative Store Bypass [XSA-263, CVE-2018-3639] (with extra patches so it applies cleanly)- x86: mishandling of debug exceptions [XSA-260, CVE-2018-8897] - x86 vHPET interrupt injection errors [XSA-261, CVE-2018-10982] (#1576089) - qemu may drive Xen into unbounded loop [XSA-262, CVE-2018-10981] (#1576680)- update to xen-4.10.1 adjust xen.use.fedora.ipxe.patch and xen.fedora.efi.build.patch remove patches for issues now fixed upstream package /usr/lib/debug/usr/lib/xen/boot/xen-shim-syms- Information leak via crafted user-supplied CDROM [XSA-258, CVE-2018-10472] (#1571867) - x86: PV guest may crash Xen with XPTI [XSA-259, CVE-2018-10471] (#1571878)- fix safe-strings patch for OCaml 4.0.6- avoid building parts of xen twice - hypervisor built with -fcf-protection doesn't work on x86_64- update patch for XPTI mitigation for XSA-254 - add Branch Target Injection (BTI) mitigation for XSA-254 - DoS via non-preemptable L3/L4 pagetable freeing [XSA-252, CVE-2018-7540] (#1549568) - grant table v2 -> v1 transition may crash Xen [XSA-255, CVE-2018-7541] (#1549570) - x86 PVH guest without LAPIC may DoS the host [XSA-256, CVE-2018-7542] (#1549572) - further build issue fixes with gcc8 (some temporary workarounds) - -mcet and -fcf-protection aren't recognized in hypervisor build x86_64 on i686 either- fix some build issues with gcc8- Escape macros in %changelog- Switch to %ldconfig_scriptlets/bin/sh/bin/sh  ""$$&&((*+,-./01234.12.2-2.fc31334.12.2-2.fc314.12.2-2.fc31  xendomainsautoxencons.build-id4a288b77c634980d34ffd07eb88982c9966b723679a17aaea0b59fd7d0febab816b040cdf24350bbxendomains.servicexenxen-3.0-py3.7.egg-info__init__.py__pycache____init__.cpython-37.opt-1.pyc__init__.cpython-37.pyclowlevel__init__.py__pycache____init__.cpython-37.opt-1.pyc__init__.cpython-37.pycxc.cpython-37m-x86_64-linux-gnu.soxs.cpython-37m-x86_64-linux-gnu.somigration__init__.py__pycache____init__.cpython-37.opt-1.pyc__init__.cpython-37.pyclegacy.cpython-37.opt-1.pyclegacy.cpython-37.pyclibxc.cpython-37.opt-1.pyclibxc.cpython-37.pyclibxl.cpython-37.opt-1.pyclibxl.cpython-37.pycpublic.cpython-37.opt-1.pycpublic.cpython-37.pyctests.cpython-37.opt-1.pyctests.cpython-37.pycverify.cpython-37.opt-1.pycverify.cpython-37.pycxl.cpython-37.opt-1.pycxl.cpython-37.pyclegacy.pylibxc.pylibxl.pypublic.pytests.pyverify.pyxl.pyxenCOPYINGREADME/etc/sysconfig//etc/xen//usr/bin//usr/lib//usr/lib/.build-id//usr/lib/.build-id/4a//usr/lib/.build-id/79//usr/lib/systemd/system//usr/lib64/python3.7/site-packages//usr/lib64/python3.7/site-packages/xen//usr/lib64/python3.7/site-packages/xen/__pycache__//usr/lib64/python3.7/site-packages/xen/lowlevel//usr/lib64/python3.7/site-packages/xen/lowlevel/__pycache__//usr/lib64/python3.7/site-packages/xen/migration//usr/lib64/python3.7/site-packages/xen/migration/__pycache__//usr/share/doc//usr/share/doc/xen/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fexceptions -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protectiondrpmzstd19x86_64-redhat-linux-gnuASCII textdirectoryPython script, ASCII text executablepython 3.7 byte-compiledELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=79a17aaea0b59fd7d0febab816b040cdf24350bb, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=4a288b77c634980d34ffd07eb88982c9966b7236, strippedempty  !"#$%&'()*+,-./01234567 RPPRRRRRRRRR R RRRRR R RRRR R R RRRR R RRRRRRRRRRRRRRRRRRRRRRRRRRhttps://bugz.fedoraproject.org/xenutf-8edd99c94fa652cdea5f19a894509b630794f238ba03f4eb839001f6eda839971?(/h*oa[0Hx ~|@VP븻$PM=T|0y Ds e.eU$)8К}굻d&: VEyݪ>*=`O-(A"UB@0Y=3_JHMLL8p8L7Ψ ȢEsVTTZ)R$<{Ue5Lr"W d|Y֒phg\#2+b⟓$(u&8Vv!3[0BI1bs6 6Jf ګ<Em'+`!\-e̚[Qp1;1k+bÞ®98l$L8RuRqO . Q2D p7\O ]T慅rG5hJramN,DD%4<W&~4`×#:VHjځ]mcރc&&kJI:x iBrE7MW+w1wBTŠ2=!JEz+ `ʅ2SAI@(\2)ڍ!ɖJ\$SsrV7G=nz21B lIt*%h8v*gY=<<}~U0ҜBR-cȍєHrۭˎnHHv>b{1YRYݳGj$g3}i}tĴ4##u.juoIL㵯^$%&Rʹfc#$2RZrJI TP[}$dfh k5)&r|Spwڝ ˁO:0npHv4V_xB߿.ĩxUgA'xwLsbMHON69oPn^Q :!O"S8)"޶ֈ8d#[dmW CZTKgv)A6wٍxnIXM0#xN$qP/B T!Au@S.d/u|(rT`T\hVm7hP,<ԬחE]Yum\ T\p3R}yI.'ھiV84J=WLBy$q͞^' AGG,) (הQ!`eaZ0sa*`inƈ _Jkqp(R3Ivl61+ E7`ZpX<@u'瘘C : HQE7凔**sx@|=0ra9  C-wOI(< 4Ą*"N#!r8\#ApSt7@8|[/ S %P# 0pشj$|@з&5`KYyJd(D${<&1x m1yLTfy*AdN^?SFuRxУ-xPűf4`e14J`)nZ `,! "T aANn:%KF{s&fȂUA ĝfLd›0\&2 INY3IQ$WclyXS= U`H0qpGVU!"af^"eeC 1w`[ur18.IJ8o|&"'fumғ]9j`n xebݽ xR]/s'mOA1,"B)DjIn-98JF=FE#4}t, ^ ohc΁UAq#^! q, ' Wp_DƉsۅ@ )$HF 3ͿKAȒocbR$- EƩIoFx#g| }XS )/%Sg2#H V1- f$ 'b-솩xZH+X?&}3Yq))&29FM"+8reU)@;HT-rme|Zw69u,&Lj QHb~T b^Q.FSL( )'`:jh&z5lQe~IA~x-w|XD),( %>%݋&;UdHݨ &ssןfp8F\e,) i8Ի*`ZkdRfc5zf$Ȥ;Cj v;ف>#TCZ^(2 +cxz<4>LSXЀX{=+ yzb*fxVwgR{#b 3&4|1V`aRltbܚa\ULkw CnF1~2YȨHMw&K"|P\͒hAzzs^o\TҀb]>*H fngL7m|m:iM/{+h"UjOi` ̑}t&ଥ4|R+UyHAk 6ͻ,!.xBP)=Ǽ{kP,|i&, dިpa@2l22Ñz10yƼ9#H2 v 8|7(ysdxkC剧 qH41TNF.Dd~O{}KHnVJ[$)[DJY:"LE\"g`D<,}YPB\٧5~>Z 9V `ȈÖ*).Q4!(@+0 7* !wi{Kߌƴ fwC&,l\b~69HhZbzB*S5f <Y?e+tìl69v $`UPiKޅv `^xhgsY%ʚSBWLխUC!\@$b Dء#P%I0#/&PhU >l8=28s=PErGӎ؀ӛ]G/N9Pǡ܈~R'#0_In%={8$M#{ı {ӼH\B@xl%H ϝ/޽yǙ JӴ.- 'F^7~1[@[G$jiJ !X7J$V =Tqu! [Ǵ6QC\KHj < ~ddddTKJF6 +*L, &wi~!yl=t{\ݫV mlW\\\M}9MmB>.⃄pP|NBu''goq>unk@u7|B "o.p9}޻szcg-/wnr(_ֿ<|'>А.ԯԈ| >T^[_i*|޶AF@<=kӋw>kg=4ltx?z{f<V=~:Dp‚C}z?W6?4ToyMNMnvkm.lmއu8RaHf.*s<}ۭ'Sx^{7/Bu=Dgt|ÁZ\nܯou:WEGK[SZTbDA:m9qtN7_t伝yqg[v?.o{Wq=:/5vrQi^+ ]p|'nm,8]鼼ty7~^Yo{V&-.oEy_$4o JGrG3GCOaVuB2ߚ8TCrzN) eGrr5@(((>B3SXnz1}Ș=916 þ Zo֤=?* ,h`IdFdVbC^̹pCX!٥4_^Q ƖbA~W!9 eDDc`I16@j}6>ӲܺQV'Iix[˪Çp3䓘\wKSllRc(Jk췦Rkցb! H^6p%eX1\2HݕzOxOT!Ժb9$Mtw:Gb882{AX>θtr]aG hFgܡs+vyC<q*`yWBKe(Sj&7\%pKh4@^Hڧӕ !rEä5~YPӦ0"gmOfx4eMjqPV_C^F=**bn5=Q Z|1'NC=0TIr UǔpD)O$bĆPmxsHEVN^]@О.^U|| 'p)fd?x؂yS9{2XUmOlXdmM($9h}6IqMT4JoSLc+:ςv`(ȚـcGr-Y)FJ%ʌeԴ,Gw,iJhxA=NJ 싐Ю*j*/^#EO 7jǷsx]kO1 Oj0Ip!pV}DXH pu&R2>{"bcEuـBZWcU_2+/OZ6T~L?4 -eB-u)O/5GS*DN5tv->&k*2]M/?^'{qq0Diߠ 8bsVw_ QQ(as8 &:(R`T^?#YPZ(2<(;\Kx6ym l{eVl=ƈځ¯Bo81ee.|+*'