qemu-kvm-block-iscsi-15:6.0.0-33.el8s >  H aw3 z뾂alGFͫsJg [՞e\yiv@NRd8X8qcY'cw2z柽q<ͬwUt?5 (d'R""!ʭ`չMgh;CSWG(IVpy`vZ3`XȽ]%f҇ F-=\mIK5 08bhi_gՃKҊs+)ݴC973910fe3ed53f1a06c68b3519ca80391b550b97b56119ea119f268d6da22d32f7d47372b179cc9204cd6581d38d377a96463449xaw3 z뾂al?)1kp +6a9yW0ip< B tIТl'T,vN!^a5=" XuϑAFSX͎%pmѹf!Kz|fk _XsIou~_'^7 *ݖ K}'SB$>͏%զDW oLsV܉'wO^}d,ƬactNlP5Sې6>p=>?>d( , D &8MS\l t |   (<\lH(~89: G;TH;dI;tX;xY;\;];^;bPx>`y>p >>>>Cqemu-kvm-block-iscsi6.0.033.el8sQEMU iSCSI block driverThis package provides the additional iSCSI block driver for QEMU. Install this package if you want to access iSCSI volumes.arǥaarch64-03.rdu2.centos.orgCentOSCentOSGPLv2 and GPLv2+ and CC-BYCBS Development/Toolshttp://www.qemu.org/linuxaarch64-AAarLJarLJarLJarñ42876ecff93d1736dd6fe1588dfba3b16bcfd345d4434253ed8f5b85ca4c858d../../../../usr/lib64/qemu-kvm/block-iscsi.sorootrootrootrootrootrootrootrootqemu-kvm-6.0.0-33.el8s.src.rpmqemu-kvm-block-iscsiqemu-kvm-block-iscsi(aarch-64)@@@@@@@@    @ld-linux-aarch64.so.1()(64bit)ld-linux-aarch64.so.1(GLIBC_2.17)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libgcc_s.so.1()(64bit)libgcc_s.so.1(GCC_3.0)(64bit)libgcc_s.so.1(GCC_3.3.1)(64bit)libiscsi.so.8()(64bit)qemu-kvm-common(aarch-64)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)rtld(GNU_HASH)15:6.0.0-33.el8s3.0.4-14.6.0-14.0-15.2-14.14.3aqV@aexaTU@a?=@a&0a@a @a@``t```"@`@`P@`!@``Jon Maloy - 6.0.0-33.el8_5Jon Maloy - 6.0.0-32Jon Maloy - 6.0.0-31Danilo Cesar Lemes de Paula - 6.0.0-30Danilo Cesar Lemes de Paula - 6.0.0-29.el8Danilo Cesar Lemes de Paula - 6.0.0-28.el8Miroslav Rezanina - 6.0.0-27Miroslav Rezanina - 6.0.0-26Danilo Cesar Lemes de Paula - 6.0.0-25.el8Danilo Cesar Lemes de Paula - 6.0.0-24.el8Danilo Cesar Lemes de Paula - 6.0.0-23.el8Danilo Cesar Lemes de Paula - 6.0.0-22.el8Danilo Cesar Lemes de Paula - 6.0.0-21.el8Danilo Cesar Lemes de Paula - 6.0.0-20.el8Danilo Cesar Lemes de Paula - 6.0.0-19.el8Danilo Cesar Lemes de Paula - 6.0.0-18.el8Danilo Cesar Lemes de Paula - 6.0.0-17.el8Danilo Cesar Lemes de Paula - 6.0.0-16.el8- kvm-Fix-virtio-net-pci-vectors-compat.patch [bz#1999141] - Resolves: bz#1999141 (migration fails with: "qemu-kvm: get_pci_config_device: Bad config data: i=0x9a read: 3 device: 2 cmask: ff wmask: 0 w1cmask:0")- kvm-virtio-balloon-Fix-page-poison-subsection-name.patch [bz#2004535] - kvm-virtio-net-fix-use-after-unmap-free-for-sg.patch [bz#1999224] - Resolves: bz#2004535 (fails to revert snapshot of a VM [balloon/page-poison]) - Resolves: bz#1999224 (CVE-2021-3748 virt:av/qemu-kvm: QEMU: virtio-net: heap use-after-free in virtio_net_receive_rcu [rhel-av-8])- kvm-virtiofsd-Fix-fuse-setxattr-API-change-issue.patch [bz#1990697] - Resolves: bz#1990697 (virtiofsd: xattr remapping does not seem to work as expected)- kvm-usbredir-fix-free-call.patch [bz#1989928] - kvm-block-Fix-in_flight-leak-in-request-padding-error-pa.patch [bz#2002631] - Resolves: bz#1989928 (CVE-2021-3682 virt:av/qemu-kvm: QEMU: usbredir: free call on invalid pointer in bufp_alloc() [rhel-av-8.5.0]) - Resolves: bz#2002631 (Windows Installation blocked on 4k disk when using blk+raw+iothread)- kvm-file-posix-Cap-max_iov-at-IOV_MAX.patch [bz#1994494] - kvm-migration-Move-yank-outside-qemu_start_incoming_migr.patch [bz#1974366] - Resolves: bz#1994494 (VM remains in paused state when trying to write on a resized disk resides on iscsi) - Resolves: bz#1974366 (Fail to set migrate incoming for 2nd time after the first time failed)- kvm-iotests-Improve-and-rename-test-291-to-qemu-img-bitm.patch [bz#1946084] - kvm-qemu-img-Fail-fast-on-convert-bitmaps-with-inconsist.patch [bz#1946084] - kvm-qemu-img-Add-skip-broken-bitmaps-for-convert-bitmaps.patch [bz#1946084] - kvm-audio-Never-send-migration-section.patch [bz#1991671] - Resolves: bz#1946084 (qemu-img convert --bitmaps fail if a bitmap is inconsistent) - Resolves: bz#1991671 (vmstate differs between -audiodev and QEMU_AUDIO_DRV when no sound frontends devs present.)- kvm-migration-move-wait-unplug-loop-to-its-own-function.patch [bz#1976852] - kvm-migration-failover-continue-to-wait-card-unplug-on-e.patch [bz#1976852] - kvm-aarch64-Add-USB-storage-devices.patch [bz#1974579] - Resolves: bz#1976852 ([failover vf migration] The failover vf will be unregistered if canceling the migration whose status is "wait-unplug") - Resolves: bz#1974579 (It's not possible to start installation from a virtual USB device on aarch64)- kvm-acpi-pc-revert-back-to-v5.2-PCI-slot-enumeration.patch [bz#1977798] - kvm-migration-failover-reset-partially_hotplugged.patch [bz#1787194] - kvm-hmp-Fix-loadvm-to-resume-the-VM-on-success-instead-o.patch [bz#1959676] - kvm-migration-Move-bitmap_mutex-out-of-migration_bitmap_.patch [bz#1959729] - kvm-i386-cpu-Expose-AVX_VNNI-instruction-to-guest.patch [bz#1924822] - kvm-ratelimit-protect-with-a-mutex.patch [bz#1838221] - kvm-Update-Linux-headers-to-5.13-rc4.patch [bz#1838221] - kvm-i386-Add-ratelimit-for-bus-locks-acquired-in-guest.patch [bz#1838221] - kvm-iothread-generalize-iothread_set_param-iothread_get_.patch [bz#1930286] - kvm-iothread-add-aio-max-batch-parameter.patch [bz#1930286] - kvm-linux-aio-limit-the-batch-size-using-aio-max-batch-p.patch [bz#1930286] - kvm-block-nvme-Fix-VFIO_MAP_DMA-failed-No-space-left-on-.patch [bz#1848881] - Resolves: bz#1977798 (RHEL8.5 guest network interface name changed after upgrade to qemu-6.0) - Resolves: bz#1787194 (After canceling the migration of a vm with VF which enables failover, using "migrate -d tcp:invalid uri" to re-migrating the vm will cause the VF in vm to be hot-unplug.) - Resolves: bz#1959676 (guest status is paused after loadvm on rhel8.5.0) - Resolves: bz#1959729 (SAP/3TB VM migration slowness [idle db]) - Resolves: bz#1924822 ([Intel 8.5 FEAT] qemu-kvm AVX2 VNNI - Fast Train) - Resolves: bz#1838221 ([Intel 8.5 FEAT] qemu-kvm Bus Lock VM Exit - Fast Train) - Resolves: bz#1930286 (randread and randrw regression with virtio-blk multi-queue) - Resolves: bz#1848881 (nvme:// block driver can exhaust IOMMU DMAs, hanging the VM, possible data loss)- kvm-s390x-cpumodel-add-3931-and-3932.patch [bz#1976171] - kvm-file-posix-fix-max_iov-for-dev-sg-devices.patch [bz#1943653] - kvm-scsi-generic-pass-max_segments-via-max_iov-field-in-.patch [bz#1943653] - kvm-osdep-provide-ROUND_DOWN-macro.patch [bz#1943653] - kvm-block-backend-align-max_transfer-to-request-alignmen.patch [bz#1943653] - kvm-block-add-max_hw_transfer-to-BlockLimits.patch [bz#1943653] - kvm-file-posix-try-BLKSECTGET-on-block-devices-too-do-no.patch [bz#1943653] - Resolves: bz#1976171 ([IBM 8.5 FEAT] CPU Model for new IBM Z Hardware - qemu part) - Resolves: bz#1943653 (RHV VM pauses due to 'qemu-kvm' getting EINVAL on i/o to a direct lun with scsi passthrough enabled)- kvm-s390x-css-Introduce-an-ESW-struct.patch [bz#1968326] - kvm-s390x-css-Split-out-the-IRB-sense-data.patch [bz#1968326] - kvm-s390x-css-Refactor-IRB-construction.patch [bz#1968326] - kvm-s390x-css-Add-passthrough-IRB.patch [bz#1968326] - kvm-vhost-user-blk-Fail-gracefully-on-too-large-queue-si.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Make-sure-to-set-Error-on-realize-fai.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Don-t-reconnect-during-initialisation.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Improve-error-reporting-in-realize.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Get-more-feature-flags-from-vhost-dev.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-virtio-Fail-if-iommu_platform-is-requested-but-unsup.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Check-that-num-queues-is-supported-by.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-Fix-backends-without-multiqueue-support.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - Resolves: bz#1968326 ([vfio_ccw] I/O error when checking format - dasdfmt requires --force in quick mode when passed through) - Resolves: bz#1935014 (qemu crash when attach vhost-user-blk-pci with option queue-size=4096) - Resolves: bz#1935019 (qemu guest failed boot when attach vhost-user-blk-pci with option iommu_platform=on) - Resolves: bz#1935020 (qemu guest failed boot when attach vhost-user-blk-pci with option packed=on) - Resolves: bz#1935031 (qemu guest failed boot when attach vhost-user-blk-pci with unmatched num-queues with qsd)- kvm-Add-mtod_check.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-bootp-limit-vendor-specific-area-to-input-packet-mem.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-bootp-check-bootp_input-buffer-size.patch [bz#1970823] - kvm-upd6-check-udp6_input-buffer-size.patch [bz#1970842] - kvm-tftp-check-tftp_input-buffer-size.patch [bz#1970850] - kvm-tftp-introduce-a-header-structure.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-udp-check-upd_input-buffer-size.patch [bz#1970858] - kvm-Fix-DHCP-broken-in-libslirp-v4.6.0.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-redhat-use-the-standard-vhost-user-JSON-path.patch [bz#1804196] - Resolves: bz#1970823 (CVE-2021-3592 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (bootp) [rhel-av-8]) - Resolves: bz#1970842 (CVE-2021-3593 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp6) [rhel-av-8]) - Resolves: bz#1970850 (CVE-2021-3595 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (tftp) [rhel-av-8]) - Resolves: bz#1970858 (CVE-2021-3594 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp) [rhel-av-8]) - Resolves: bz#1804196 (inconsistent paths for interop json files)- kvm-redhat-Expose-upstream-machines-pc-4.2-and-pc-2.11.patch [bz#1897923] - kvm-redhat-Enable-FDC-device-for-upstream-machines-too.patch [bz#1897923] - kvm-redhat-Add-hw_compat_4_2_extra-and-apply-to-upstream.patch [bz#1897923] - kvm-ppc-pef.c-initialize-cgs-ready-in-kvmppc_svm_init.patch [bz#1789757] - kvm-virtio-gpu-handle-partial-maps-properly.patch [bz#1932279] - kvm-redhat-Fix-unversioned-Obsoletes-warning.patch [bz#1950405 bz#1967330] - kvm-redhat-Move-qemu-kvm-docs-dependency-to-qemu-kvm.patch [bz#1950405 bz#1967330] - kvm-redhat-introducting-qemu-kvm-hw-usbredir.patch [bz#1950405 bz#1967330] - kvm-spapr-Fix-EEH-capability-issue-on-KVM-guest-for-PCI-.patch [bz#1976015] - Resolves: bz#1897923 (support Live Migration from Ubuntu 18.04 i440fx to RHEL) - Resolves: bz#1789757 ([IBM 8.5 FEAT] Add machine option to enable secure VM support) - Resolves: bz#1932279 ([aarch64] qemu core dumped when using smmuv3 and iommu_platform enabling at virtio-gpu-pci) - Resolves: bz#1950405 (review qemu-kvm-core dependencies) - Resolves: bz#1967330 (Make qemu-kvm use versioned obsoletes for qemu-kvm-ma and qemu-kvm-rhev) - Resolves: bz#1976015 (spapr: Fix EEH capability issue on KVM guest for PCI passthru)- kvm-block-backend-add-drained_poll.patch [bz#1960137] - kvm-nbd-server-Use-drained-block-ops-to-quiesce-the-serv.patch [bz#1960137] - kvm-disable-CONFIG_USB_STORAGE_BOT.patch [bz#1866133] - kvm-doc-Fix-some-mistakes-in-the-SEV-documentation.patch [bz#1954750] - kvm-docs-Add-SEV-ES-documentation-to-amd-memory-encrypti.patch [bz#1954750] - kvm-docs-interop-firmware.json-Add-SEV-ES-support.patch [bz#1954750] - Resolves: bz#1960137 ([incremental backup] qemu-kvm hangs when Rebooting the VM during full backup) - Resolves: bz#1866133 (Disable usb-bot device in QEMU (unsupported)) - Resolves: bz#1954750 (firmware scheme for sev-es)- kvm-x86-Add-x86-rhel8.5-machine-types.patch [bz#1957838] - kvm-redhat-x86-Enable-kvm-asyncpf-int-by-default.patch [bz#1967603] - kvm-yank-Unregister-function-when-using-TLS-migration.patch [bz#1964326] - Resolves: bz#1957838 (8.5 machine types for x86) - Resolves: bz#1967603 (Enable interrupt based asynchronous page fault mechanism by default) - Resolves: bz#1964326 (Qemu core dump when do tls migration via tcp protocol)- kvm-pc-bios-s390-ccw-don-t-try-to-read-the-next-block-if.patch [bz#1965626] - kvm-redhat-Install-the-s390-netboot.img-that-we-ve-built.patch [bz#1966463] - kvm-sockets-update-SOCKET_ADDRESS_TYPE_FD-listen-2-backl.patch [bz#1967177] - kvm-target-i386-sev-add-support-to-query-the-attestation.patch [bz#1957022] - kvm-spapr-Don-t-hijack-current_machine-boot_order.patch [bz#1960119] - kvm-target-i386-Add-CPU-model-versions-supporting-xsaves.patch [bz#1942914] - kvm-spapr-Remove-stale-comment-about-power-saving-LPCR-b.patch [bz#1940731] - kvm-spapr-Set-LPCR-to-current-AIL-mode-when-starting-a-n.patch [bz#1940731] - Resolves: bz#1965626 (RHEL8.2 - QEMU BIOS fails to read stage2 loader (kvm)) - Resolves: bz#1966463 (Rebuild the s390-netboot.img for downstream instead of shipping the upstream image) - Resolves: bz#1967177 (QEMU 6.0.0 socket_get_fd() fails with the error "socket_get_fd: too many connections") - Resolves: bz#1957022 (SEV: Add support to query the attestation report) - Resolves: bz#1960119 ([regression]Failed to reset guest) - Resolves: bz#1942914 ([Hyper-V][RHEL8.4]Nested Hyper-V on KVM: On Intel CPU L1 2016 can not start with cpu model Skylake-Server-noTSX-IBRS or Skylake-Client-noTSX-IBRS) - Resolves: bz#1940731 ([ppc64le] Hotplug vcpu device hit call trace:[qemu output] KVM: unknown exit, hardware reason 7fff9ce87ed8)- kvm-virtio-net-failover-add-missing-remove_migration_sta.patch [bz#1953045] - kvm-hw-arm-virt-Add-8.5-machine-type.patch [bz#1957667] - kvm-hw-arm-virt-Disable-PL011-clock-migration-through-hw.patch [bz#1957667] - kvm-arm-virt-Register-highmem-and-gic-version-as-class-p.patch [bz#1957667] - kvm-virtio-blk-Fix-rollback-path-in-virtio_blk_data_plan.patch [bz#1927108] - kvm-virtio-blk-Configure-all-host-notifiers-in-a-single-.patch [bz#1927108] - kvm-virtio-scsi-Set-host-notifiers-and-callbacks-separat.patch [bz#1927108] - kvm-virtio-scsi-Configure-all-host-notifiers-in-a-single.patch [bz#1927108] - kvm-hw-arm-smmuv3-Another-range-invalidation-fix.patch [bz#1929720] - Resolves: bz#1953045 (qemu-kvm NULL pointer de-reference during migration at migrate_fd_connect ->...-> notifier_list_notify) - Resolves: bz#1957667 ([aarch64] Add 8.5 machine type) - Resolves: bz#1927108 (It's too slow to load scsi disk when use 384 vcpus) - Resolves: bz#1929720 ([aarch64] Handle vsmmuv3 IOTLB invalidation with non power of 2 size)- kvm-redhat-s390x-add-rhel-8.5.0-compat-machine.patch [bz#1951476] - kvm-redhat-add-missing-entries-in-hw_compat_rhel_8_4.patch [bz#1957834] - kvm-redhat-Define-pseries-rhel8.5.0-machine-type.patch [bz#1957834] - Resolves: bz#1951476 ([s390x] RHEL AV 8.5 new machine type for s390x) - Resolves: bz#1957834 ([ppc64le] RHEL AV 8.5 new machine type for ppc64le)- Rebase to qemu-kvm 6.0.015:6.0.0-33.el8s15:6.0.0-33.el8s.build-idcf3bf00374e4c2dbdce6c99bd384392b0be1014bblock-iscsi.so/usr/lib//usr/lib/.build-id//usr/lib/.build-id/cf//usr/lib64/qemu-kvm/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fexceptions -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -fasynchronous-unwind-tables -fstack-clash-protectioncpioxz2aarch64-redhat-linux-gnudirectoryELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, BuildID[sha1]=cf3bf00374e4c2dbdce6c99bd384392b0be1014b, stripped RRRRRRRRR utf-8bbfa783ffc99fe6c60ca6bebcd1eaed21379255d026f7a98faca0319fb0e0bca?07zXZ !#,AI] b2u jӫ`(y-#:NITV&Yu~>4~ɗX)4ˆqǘ|zZ·Ti9;7OOVl.iGT]k dxk@,>"uU 몟S&ԫVx LTNGa /EpRA/;^ިyulj2>*_w'f7ܻak`V v,!`fy͙/AU-.3;׆>Ʃ4.K !gNiz$;Uql\Y*, &Nd0_!We[5xSxchpVkt>8OL2xߑ^Lׄޝ"Ho5- \ aLIuOK?3'6J[ggP=Vtד;e1.,58R<@[ɐRGZY+J~C4,T)~"B#krJbZ6"ÃLz770 >h?BSn<'I1丳kO˺k]3}xZ*b)31!Z_1° 8e,֥#X3B88Qogh-RdZ*i|wcj!5訕tp'WFzo>զQec*5/̬< ʲ,5ǔ%*vu|ajz~@~ ;_Tiw؆¢\@M,PІ:`Oʩ^<ՠ]O/6u"8 SOLN_["ze }k!s7AhBp+}P* Hdn5Ⱥ~nY8XHb1SKT]q䚨d圪Z﷨!+?CM\1.MAX?MXn:cjCl4-!:iD=F-ԑ!_9XxJhJ:6[v,(ʎ)NɩJ~u%`rOiqJq5شbVcdcI唙M"1;Ȅo_]ʍn h79ҵTϞHe f2.HlݫpOTjmB[j8d[Q.aȹAQ̈pV/oߕxrĒ7 gm5؟spe>^};ɜc= о|{nCY+h.kb\86!Ŗ&rDդQD6Gѥ#hå zZ]#*n)"į`IC)VwXphFtdTǀo%%c1G;ؿ:%$ ɹ,|)%K|8_[fޞ)iBѴhVм]ҿ`@69nYficY(ʁԋViA:̊ïW|U i|O <Ϟܙ]jk j qSTK9NE7?ȝ} 414 36ƙ0;f2u)`PcVOO0#"NSrlPX %OaS+eQRٓka5ӭ߹BRz!-FBنTyiXwQT 򮣩Un0Wx4~a ÞMu$jcEl%w{j".\f2e[ǜ^҂k{(OK9ͨ~%.ja%"Xmr֫ 9rudS8&:J=^dXrޔ&(+;(?Jȋi$gP₈4U霻>C?֤Ha+{]\yO Q&&O_ȕ PCfp5i/D+kj!!*Q϶t Sih=!Nj+y%jeDَ\-+h 7<ՄTl}5*Brqn-W#/3UP@ _g !ڻ?&2+@هL ALt"Yd $G]'F.\ǎXY*sI ޒ,Xub]`wٟB;=R߇t1uFkg^㡊:/Vp!խh_ w&KWFYM0 k" Wh=^ ʍ'Q)x |F#G1(k Ȱ|aQsi\S[B(HzDa᪳13Qx e#|D :iri6ŋ.V5Or9Ħ,u^D jĚ6&! %$yKuq0ypY< <2Xo%LSoC뫪賉o} o&~8/}}SNfuLg4X^lhl۶txx-0tVf a,wo5Nؑ&:,T=",SaF- YNj={>d2Y6%BI5s=MGiُg[ROߛ1e_`ω,H1tr8LQtg)BE&,B@Pt|H@BVǗ*ثqaBqa*Vc'XRФp Z'ΗDdޖ5k.O9fK88 g%8gЩ->AӨtTs~B-"=lUu(jaeRi-&lW)X9A`/lw'ubpIJBб -t!pv>P lv6谯vvvszO![O-;J.eW"TO#3UOra Mg':AIę4tn޵7rܺe{;3T9<wohu?fQpybS'Gؑ++U *tبv QMȎ`L/z'O^ugP_+gfkPFlX᪉H¤,PQҰ^xO  SI赂; ZLIXoYX>薱\k(͛"2w+'SjHm9 m' ֪nE(;`"y%F f)I}OEF0ɴ kcFf9.I0.Z3\=1#̧.|w ^{qS='sϗc p>,;/Rf5~Lu*F\=o`CnUe/MTxC~]2ke65g5JlN*N(G9#õN<,hv}(.|]phRlʎRtfsB#!_E.*HJ(ׇ^Jp0rqjS7s@a^+R =hTkĒ]4{Ǟ}_/w5w9NLOXcS[Lږ}<1pt20oߐZ5$$YKHQ6Iʄ]|q^?SL:Qb2A5O+.s?RQLMr4&Mc-4:Ʒ5ΥʈYq5ɐ{ PضHH 9P$ jq@;zp;v0 Q\II$Zm+)1℺ßsVH B1TCvɪ< X01+\ ]lHIT}L/Z YC{0g@!!E8Ee5 ,疁|H,æ/ 4ZIw%n|7Jz`=iBtKzR5lá~96QY:$Uq"+֐13jYFyiaI4.&n[r(d2=űe 6/-qg=! .LN' |O6oDAa71_ރa>NlYCc[L]f{0Yޡd+&\dAxq.!Nm FLc|dxbsRr N;z7j.GcAgof+<B͊mթk?{=!2jf U/! kFKF*&ze|x <4(䊡`6gEEj 'i[mֵ[ erw>@1fњ꽽o D3(h ۟y;|0+L|q~#y:^a"1DK}LO9ϞjY p.U;1:4-"e]uEE fT jfO:8v;i?oXn ZyJ%~29 F)Ek7X+j4>0b[L2rU{sͷZ%Qm Tj*AGo+ަd 5&i 'eldxYӫ\Z2l#!t3 ܍&%L.Z@T] 97{^ .  ,?o= 'm c?md>9;&SĞdR#!-xtJ;O@WE6;?Z ?!rŸo$>AV'!W_;^XF a|sݪ=k0($73@8 l'.Gel _ص`ׁpwY3 >JC>HIQisH[*5%.i. U;K.dˇ@d|DpzŽ %Ťa?c /Cu-:mPd$ UBzZo?kYKBWT)ܾᄂ7܀~('Ϛ}ڲȪD PH㡁 GB?+mK Msu#b4$5ŠO{&57+7%Dc/8v,YJBk )od O9Kǹ.4O-Y_֫7b [9#_2.s8GmHN['xR~\'. 0~60yv^`vּ]2rd5(E nTZçϝ{v'=YˋA2a< 8f_pѳ|$wgGa?ٽ\P󾨣H(\$VyuƘ=iX: ⛙(*;3' O x: ;J,"gr/\yU] 16EƵc"I3b%|h\8jK[v/PhCEgQϢhH,ί _ѕPIVsJNqYBJ؜kB(cJ4L͔WD'c:|"=ϔҀ-7.R,~29;kR763#"ꐨW2_S0:ֽW>5$ʮ P7[=7̩EWz-,_$9O}9\x="ziKKMH|q d lT+tÛԍY= J:wbĄa!4W~=\OqnԷz6^2ŲpzU뼼L͹9\9$(}ҮNF cfsqXͷZ&{rm<5N|uh#.Զ'q`x$#pG Tt+xjKFhQ6[ tR찭:5 'ʒr-G(ae9ڙ`Jd1+=6a4+3}jrqkl{z'Hjxʆ oZPl^@@xEz BbK#LZb%Χ%fl'o˯=(΍73e ~Iq&\ǐ]*~xfOC$"mbLNxݾÏ&jeT=rY7Tz|T;(_ otï(C^N!r>@ u_@9x\"W?=pqm m:n{qĴճ9\Ϥ%I.WϒOW*x)UB -mD`]KYu3~fk%[ak]Rok %e+%/ĀKybmq[Qæy>_vP l~J$x0 \<@*aQ}xNk^GNӖ[eӱ Ċۮ{Iw3}|bX# bZs'6 1@nêID :L[t+U*TEli .RXNG&+@Nb mYϵK$C-Hm\;M2^)Uq;ѫ6'fCbnĺƤOGQf֣Z(+.N}> 5 ]p&sz&ǖMGH~n*M:ڿ'KlwxZ̅xj0#C@71jw:՟ F"O% c5 /Kq6zQˆّ ʽ_lJ9nUy$"2sT\ @Xnf #ШްKb֘c] anvzcPVI aBOJe;N=}aϯM"Jb*t%2DDbe#aS4NmͧH r,},O?;,^wDEOeuxJlRTpS*$ I7]MDi|-3'D.9q@k䁀5~1UJn[ދ9CH/)T|0l*9eO&Uz\ lk5,j5tYw#i3Kc/ OO$%0 RP>|&p ^=I!n\+)`+N=_iO ,]3"edmi,$* U5L%|4NMͿ]Vc5jȹ G'P " oi& Bm5bk%3( 2&^[RQt[@G|(j5j_~G9%G8(V:AАjhrvoe櫑f3{8uã2x2!q1f+1g c0V7s!+$9;{&q+O 5rJ?\ L.gӥ1aI)0_{!`NEQA{zHeAJ.wOiv%i(ЀXSzΰ%9 ekN~g{]Ve7hNm@ ʱNx[?V'}}e*7됙IGuhy"Cu %xܷ4n __ludWOmL8 H ;U嚡1: >/@m!"H]4E}iA@Xn;750?T^mщ،+c_&Z|g-WZ#zGoW]ga!>?W6JPMfXLD<_ Y31;霎/\[UW7?VwUŪ}LC]IET.Aw eÀ8}1#f-gߦfʐJQL@[ƌ=@(WzXpx۹;**6_J-.jU* dpm閝#5Tptހ+\wNe4I,4! CEqP~}xiLT$,L1"qA9\qY0;I_< ]Jm5j~8ݒe-$6=u{)"vm|w\;;H#Ju_+Ց߱ n sA.EP1严]}!.9|4U&)D+i 104*PBQwNvV^h1SapZ'ʮu+P>J 4НU{Tnz䖰TPFn"o͜-n`xis+a 3Ӈ@Fg1l:wfQ\Q#&GfMScBF\0Z@u$tXkZ8PjCԶMP{?KCV%YTsM0!Yr6ShEҝY\YZkG:NZM Ol7ߘ̴.3`>A}˞PXvHe<{ Ll(Sl/M*7GѸ'ɴ`exNRȦk\Z 9O)Z.>|uަ M3.c__iTa Δm0X ĥ*/.fg$,#|6eL ѷ^wb7"D 0AnrѫR1]B 7Z  `ITޓ[KAl#~؈osХYU٫.`hg;}!7,Y/J#ΙhFHّcJ?4XERc'Vt}4Q;\ϕ}(,2:SE-EVX!'ߛ:SQ5 7tXHTv95vw(hUtHOrMlSk0lv$ij0I0)1,f~ͳNY[a-IcBbbƖ%H#/W0XQ)NJ=Y 8Ft6r(c[;-?"aJ^(nwԮLEʳ3nT[Q}cx]BaN'ߩSK< ȷ?aAܑ/|7WR m!JS-Pa6խbv$Xhz~jM~ )T:tm#:-B;$3yMK6t}m-5%) k8{Pc٩kKU":IV]zl|J=EQf ۆW$f_nK hY\SAQ'BG/"ʞG[[G%d>Z5^#**MfmCNxZƔ>==Z.Xw'EF`lNXbV,htOfK~;WF7i(rv,EMPa ^ZFjKf-r7LU+86yJH}`UUN q;Gpю̱l}ƲlvE.>l>iSzbXu*Wdt(N]d7ɍBH92%;qĵpTSbķ"O?39:q~ǩ#ZpË*2G(m10=>,f6O%%۽|Gz.ťS tW z.r,h, |S4-]v: m 0_f%Zj JЦJ#rg| P_T葾5(<)"Pj1nv*Z j6*df$sC/qS/J)-ngE]ĭ !<<U#4Pb7#S8vti|:mB0gIDE 5 ;qdp8 ldcLG_{bμ7f; H~X/l2~kWUI"@w2=b Bc4"탷P 5lcczLU5чbT&ȚOE)K$\TɅvNĭ7cSk&T< X$A!Km):^ ko}I+ڭ8Dyޚi9nlrkwˑ $!l,M S݄_jbגp7t^N΄5m<~6@.|r?Q8 #gZ^ස T*̬.ajrZi%zRx>v,Oz\vkby:#'vU>chi 0Éw8F ?/!Z& YZ