qemu-kvm-block-rbd-15:6.0.0-33.el8s >  H awa z뾂alQNYqy<ÑM׎r&Lr(l'AVܰ< Xq+p'`'"3g2tM1`C8;"fWm 05Ӫaɾ\o JV?:YAFL1('WZ1خ"*IW9aqѦ\I ol?Cqf35ڒml4b5,]# Jx H;z508c1d3231ece867961c1671b540de5c13bfb6d8c7e98237041a483f11efbccfe34c03dce13028106de07046f8af3e6fcc36b484rTawa z뾂alK/[ISNaPY1I W2OT( lW~<-Uf%Tǣթ7)WTۥ #%#̜)[#Q8h]L;vg<\7)))ť!/&eɒ^:dwܼLmxlG/5s*@S9.t/ 1*گ(TY͖LT-<@-}Vvaem޳2r|A"\z+ ?۫J*#C?l=h>p=>x?>hd$ ( C) >Pekt     (<Pp   (89@:pG:H:I:X:Y:\;];$^;eb;d<e<f<l<t=u=$v=4w=x=y>>>>">dCqemu-kvm-block-rbd6.0.033.el8sQEMU Ceph/RBD block driverThis package provides the additional Ceph/RBD block driver for QEMU. Install this package if you want to access remote Ceph volumes using the rbd protocol.ar;p8le01.rdu2.centos.orgxCentOSCentOSGPLv2 and GPLv2+ and CC-BYCBS Development/Toolshttp://www.qemu.org/linuxppc64le+xAAar/ar/ar/arfb80bae9fa2d93e821315c13c8e5877102fdfd2b784f33d30c9a5ffddf14b148../../../../usr/lib64/qemu-kvm/block-rbd.sorootrootrootrootrootrootrootrootqemu-kvm-6.0.0-33.el8s.src.rpmqemu-kvm-block-rbdqemu-kvm-block-rbd(ppc-64)@@@@    @libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)librados.so.2()(64bit)librbd.so.1()(64bit)qemu-kvm-common(ppc-64)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)rtld(GNU_HASH)15:6.0.0-33.el8s3.0.4-14.6.0-14.0-15.2-14.14.3aqV@aexaTU@a?=@a&0a@a @a@``t```"@`@`P@`!@``Jon Maloy - 6.0.0-33.el8_5Jon Maloy - 6.0.0-32Jon Maloy - 6.0.0-31Danilo Cesar Lemes de Paula - 6.0.0-30Danilo Cesar Lemes de Paula - 6.0.0-29.el8Danilo Cesar Lemes de Paula - 6.0.0-28.el8Miroslav Rezanina - 6.0.0-27Miroslav Rezanina - 6.0.0-26Danilo Cesar Lemes de Paula - 6.0.0-25.el8Danilo Cesar Lemes de Paula - 6.0.0-24.el8Danilo Cesar Lemes de Paula - 6.0.0-23.el8Danilo Cesar Lemes de Paula - 6.0.0-22.el8Danilo Cesar Lemes de Paula - 6.0.0-21.el8Danilo Cesar Lemes de Paula - 6.0.0-20.el8Danilo Cesar Lemes de Paula - 6.0.0-19.el8Danilo Cesar Lemes de Paula - 6.0.0-18.el8Danilo Cesar Lemes de Paula - 6.0.0-17.el8Danilo Cesar Lemes de Paula - 6.0.0-16.el8- kvm-Fix-virtio-net-pci-vectors-compat.patch [bz#1999141] - Resolves: bz#1999141 (migration fails with: "qemu-kvm: get_pci_config_device: Bad config data: i=0x9a read: 3 device: 2 cmask: ff wmask: 0 w1cmask:0")- kvm-virtio-balloon-Fix-page-poison-subsection-name.patch [bz#2004535] - kvm-virtio-net-fix-use-after-unmap-free-for-sg.patch [bz#1999224] - Resolves: bz#2004535 (fails to revert snapshot of a VM [balloon/page-poison]) - Resolves: bz#1999224 (CVE-2021-3748 virt:av/qemu-kvm: QEMU: virtio-net: heap use-after-free in virtio_net_receive_rcu [rhel-av-8])- kvm-virtiofsd-Fix-fuse-setxattr-API-change-issue.patch [bz#1990697] - Resolves: bz#1990697 (virtiofsd: xattr remapping does not seem to work as expected)- kvm-usbredir-fix-free-call.patch [bz#1989928] - kvm-block-Fix-in_flight-leak-in-request-padding-error-pa.patch [bz#2002631] - Resolves: bz#1989928 (CVE-2021-3682 virt:av/qemu-kvm: QEMU: usbredir: free call on invalid pointer in bufp_alloc() [rhel-av-8.5.0]) - Resolves: bz#2002631 (Windows Installation blocked on 4k disk when using blk+raw+iothread)- kvm-file-posix-Cap-max_iov-at-IOV_MAX.patch [bz#1994494] - kvm-migration-Move-yank-outside-qemu_start_incoming_migr.patch [bz#1974366] - Resolves: bz#1994494 (VM remains in paused state when trying to write on a resized disk resides on iscsi) - Resolves: bz#1974366 (Fail to set migrate incoming for 2nd time after the first time failed)- kvm-iotests-Improve-and-rename-test-291-to-qemu-img-bitm.patch [bz#1946084] - kvm-qemu-img-Fail-fast-on-convert-bitmaps-with-inconsist.patch [bz#1946084] - kvm-qemu-img-Add-skip-broken-bitmaps-for-convert-bitmaps.patch [bz#1946084] - kvm-audio-Never-send-migration-section.patch [bz#1991671] - Resolves: bz#1946084 (qemu-img convert --bitmaps fail if a bitmap is inconsistent) - Resolves: bz#1991671 (vmstate differs between -audiodev and QEMU_AUDIO_DRV when no sound frontends devs present.)- kvm-migration-move-wait-unplug-loop-to-its-own-function.patch [bz#1976852] - kvm-migration-failover-continue-to-wait-card-unplug-on-e.patch [bz#1976852] - kvm-aarch64-Add-USB-storage-devices.patch [bz#1974579] - Resolves: bz#1976852 ([failover vf migration] The failover vf will be unregistered if canceling the migration whose status is "wait-unplug") - Resolves: bz#1974579 (It's not possible to start installation from a virtual USB device on aarch64)- kvm-acpi-pc-revert-back-to-v5.2-PCI-slot-enumeration.patch [bz#1977798] - kvm-migration-failover-reset-partially_hotplugged.patch [bz#1787194] - kvm-hmp-Fix-loadvm-to-resume-the-VM-on-success-instead-o.patch [bz#1959676] - kvm-migration-Move-bitmap_mutex-out-of-migration_bitmap_.patch [bz#1959729] - kvm-i386-cpu-Expose-AVX_VNNI-instruction-to-guest.patch [bz#1924822] - kvm-ratelimit-protect-with-a-mutex.patch [bz#1838221] - kvm-Update-Linux-headers-to-5.13-rc4.patch [bz#1838221] - kvm-i386-Add-ratelimit-for-bus-locks-acquired-in-guest.patch [bz#1838221] - kvm-iothread-generalize-iothread_set_param-iothread_get_.patch [bz#1930286] - kvm-iothread-add-aio-max-batch-parameter.patch [bz#1930286] - kvm-linux-aio-limit-the-batch-size-using-aio-max-batch-p.patch [bz#1930286] - kvm-block-nvme-Fix-VFIO_MAP_DMA-failed-No-space-left-on-.patch [bz#1848881] - Resolves: bz#1977798 (RHEL8.5 guest network interface name changed after upgrade to qemu-6.0) - Resolves: bz#1787194 (After canceling the migration of a vm with VF which enables failover, using "migrate -d tcp:invalid uri" to re-migrating the vm will cause the VF in vm to be hot-unplug.) - Resolves: bz#1959676 (guest status is paused after loadvm on rhel8.5.0) - Resolves: bz#1959729 (SAP/3TB VM migration slowness [idle db]) - Resolves: bz#1924822 ([Intel 8.5 FEAT] qemu-kvm AVX2 VNNI - Fast Train) - Resolves: bz#1838221 ([Intel 8.5 FEAT] qemu-kvm Bus Lock VM Exit - Fast Train) - Resolves: bz#1930286 (randread and randrw regression with virtio-blk multi-queue) - Resolves: bz#1848881 (nvme:// block driver can exhaust IOMMU DMAs, hanging the VM, possible data loss)- kvm-s390x-cpumodel-add-3931-and-3932.patch [bz#1976171] - kvm-file-posix-fix-max_iov-for-dev-sg-devices.patch [bz#1943653] - kvm-scsi-generic-pass-max_segments-via-max_iov-field-in-.patch [bz#1943653] - kvm-osdep-provide-ROUND_DOWN-macro.patch [bz#1943653] - kvm-block-backend-align-max_transfer-to-request-alignmen.patch [bz#1943653] - kvm-block-add-max_hw_transfer-to-BlockLimits.patch [bz#1943653] - kvm-file-posix-try-BLKSECTGET-on-block-devices-too-do-no.patch [bz#1943653] - Resolves: bz#1976171 ([IBM 8.5 FEAT] CPU Model for new IBM Z Hardware - qemu part) - Resolves: bz#1943653 (RHV VM pauses due to 'qemu-kvm' getting EINVAL on i/o to a direct lun with scsi passthrough enabled)- kvm-s390x-css-Introduce-an-ESW-struct.patch [bz#1968326] - kvm-s390x-css-Split-out-the-IRB-sense-data.patch [bz#1968326] - kvm-s390x-css-Refactor-IRB-construction.patch [bz#1968326] - kvm-s390x-css-Add-passthrough-IRB.patch [bz#1968326] - kvm-vhost-user-blk-Fail-gracefully-on-too-large-queue-si.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Make-sure-to-set-Error-on-realize-fai.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Don-t-reconnect-during-initialisation.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Improve-error-reporting-in-realize.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Get-more-feature-flags-from-vhost-dev.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-virtio-Fail-if-iommu_platform-is-requested-but-unsup.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Check-that-num-queues-is-supported-by.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-Fix-backends-without-multiqueue-support.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - Resolves: bz#1968326 ([vfio_ccw] I/O error when checking format - dasdfmt requires --force in quick mode when passed through) - Resolves: bz#1935014 (qemu crash when attach vhost-user-blk-pci with option queue-size=4096) - Resolves: bz#1935019 (qemu guest failed boot when attach vhost-user-blk-pci with option iommu_platform=on) - Resolves: bz#1935020 (qemu guest failed boot when attach vhost-user-blk-pci with option packed=on) - Resolves: bz#1935031 (qemu guest failed boot when attach vhost-user-blk-pci with unmatched num-queues with qsd)- kvm-Add-mtod_check.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-bootp-limit-vendor-specific-area-to-input-packet-mem.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-bootp-check-bootp_input-buffer-size.patch [bz#1970823] - kvm-upd6-check-udp6_input-buffer-size.patch [bz#1970842] - kvm-tftp-check-tftp_input-buffer-size.patch [bz#1970850] - kvm-tftp-introduce-a-header-structure.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-udp-check-upd_input-buffer-size.patch [bz#1970858] - kvm-Fix-DHCP-broken-in-libslirp-v4.6.0.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-redhat-use-the-standard-vhost-user-JSON-path.patch [bz#1804196] - Resolves: bz#1970823 (CVE-2021-3592 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (bootp) [rhel-av-8]) - Resolves: bz#1970842 (CVE-2021-3593 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp6) [rhel-av-8]) - Resolves: bz#1970850 (CVE-2021-3595 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (tftp) [rhel-av-8]) - Resolves: bz#1970858 (CVE-2021-3594 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp) [rhel-av-8]) - Resolves: bz#1804196 (inconsistent paths for interop json files)- kvm-redhat-Expose-upstream-machines-pc-4.2-and-pc-2.11.patch [bz#1897923] - kvm-redhat-Enable-FDC-device-for-upstream-machines-too.patch [bz#1897923] - kvm-redhat-Add-hw_compat_4_2_extra-and-apply-to-upstream.patch [bz#1897923] - kvm-ppc-pef.c-initialize-cgs-ready-in-kvmppc_svm_init.patch [bz#1789757] - kvm-virtio-gpu-handle-partial-maps-properly.patch [bz#1932279] - kvm-redhat-Fix-unversioned-Obsoletes-warning.patch [bz#1950405 bz#1967330] - kvm-redhat-Move-qemu-kvm-docs-dependency-to-qemu-kvm.patch [bz#1950405 bz#1967330] - kvm-redhat-introducting-qemu-kvm-hw-usbredir.patch [bz#1950405 bz#1967330] - kvm-spapr-Fix-EEH-capability-issue-on-KVM-guest-for-PCI-.patch [bz#1976015] - Resolves: bz#1897923 (support Live Migration from Ubuntu 18.04 i440fx to RHEL) - Resolves: bz#1789757 ([IBM 8.5 FEAT] Add machine option to enable secure VM support) - Resolves: bz#1932279 ([aarch64] qemu core dumped when using smmuv3 and iommu_platform enabling at virtio-gpu-pci) - Resolves: bz#1950405 (review qemu-kvm-core dependencies) - Resolves: bz#1967330 (Make qemu-kvm use versioned obsoletes for qemu-kvm-ma and qemu-kvm-rhev) - Resolves: bz#1976015 (spapr: Fix EEH capability issue on KVM guest for PCI passthru)- kvm-block-backend-add-drained_poll.patch [bz#1960137] - kvm-nbd-server-Use-drained-block-ops-to-quiesce-the-serv.patch [bz#1960137] - kvm-disable-CONFIG_USB_STORAGE_BOT.patch [bz#1866133] - kvm-doc-Fix-some-mistakes-in-the-SEV-documentation.patch [bz#1954750] - kvm-docs-Add-SEV-ES-documentation-to-amd-memory-encrypti.patch [bz#1954750] - kvm-docs-interop-firmware.json-Add-SEV-ES-support.patch [bz#1954750] - Resolves: bz#1960137 ([incremental backup] qemu-kvm hangs when Rebooting the VM during full backup) - Resolves: bz#1866133 (Disable usb-bot device in QEMU (unsupported)) - Resolves: bz#1954750 (firmware scheme for sev-es)- kvm-x86-Add-x86-rhel8.5-machine-types.patch [bz#1957838] - kvm-redhat-x86-Enable-kvm-asyncpf-int-by-default.patch [bz#1967603] - kvm-yank-Unregister-function-when-using-TLS-migration.patch [bz#1964326] - Resolves: bz#1957838 (8.5 machine types for x86) - Resolves: bz#1967603 (Enable interrupt based asynchronous page fault mechanism by default) - Resolves: bz#1964326 (Qemu core dump when do tls migration via tcp protocol)- kvm-pc-bios-s390-ccw-don-t-try-to-read-the-next-block-if.patch [bz#1965626] - kvm-redhat-Install-the-s390-netboot.img-that-we-ve-built.patch [bz#1966463] - kvm-sockets-update-SOCKET_ADDRESS_TYPE_FD-listen-2-backl.patch [bz#1967177] - kvm-target-i386-sev-add-support-to-query-the-attestation.patch [bz#1957022] - kvm-spapr-Don-t-hijack-current_machine-boot_order.patch [bz#1960119] - kvm-target-i386-Add-CPU-model-versions-supporting-xsaves.patch [bz#1942914] - kvm-spapr-Remove-stale-comment-about-power-saving-LPCR-b.patch [bz#1940731] - kvm-spapr-Set-LPCR-to-current-AIL-mode-when-starting-a-n.patch [bz#1940731] - Resolves: bz#1965626 (RHEL8.2 - QEMU BIOS fails to read stage2 loader (kvm)) - Resolves: bz#1966463 (Rebuild the s390-netboot.img for downstream instead of shipping the upstream image) - Resolves: bz#1967177 (QEMU 6.0.0 socket_get_fd() fails with the error "socket_get_fd: too many connections") - Resolves: bz#1957022 (SEV: Add support to query the attestation report) - Resolves: bz#1960119 ([regression]Failed to reset guest) - Resolves: bz#1942914 ([Hyper-V][RHEL8.4]Nested Hyper-V on KVM: On Intel CPU L1 2016 can not start with cpu model Skylake-Server-noTSX-IBRS or Skylake-Client-noTSX-IBRS) - Resolves: bz#1940731 ([ppc64le] Hotplug vcpu device hit call trace:[qemu output] KVM: unknown exit, hardware reason 7fff9ce87ed8)- kvm-virtio-net-failover-add-missing-remove_migration_sta.patch [bz#1953045] - kvm-hw-arm-virt-Add-8.5-machine-type.patch [bz#1957667] - kvm-hw-arm-virt-Disable-PL011-clock-migration-through-hw.patch [bz#1957667] - kvm-arm-virt-Register-highmem-and-gic-version-as-class-p.patch [bz#1957667] - kvm-virtio-blk-Fix-rollback-path-in-virtio_blk_data_plan.patch [bz#1927108] - kvm-virtio-blk-Configure-all-host-notifiers-in-a-single-.patch [bz#1927108] - kvm-virtio-scsi-Set-host-notifiers-and-callbacks-separat.patch [bz#1927108] - kvm-virtio-scsi-Configure-all-host-notifiers-in-a-single.patch [bz#1927108] - kvm-hw-arm-smmuv3-Another-range-invalidation-fix.patch [bz#1929720] - Resolves: bz#1953045 (qemu-kvm NULL pointer de-reference during migration at migrate_fd_connect ->...-> notifier_list_notify) - Resolves: bz#1957667 ([aarch64] Add 8.5 machine type) - Resolves: bz#1927108 (It's too slow to load scsi disk when use 384 vcpus) - Resolves: bz#1929720 ([aarch64] Handle vsmmuv3 IOTLB invalidation with non power of 2 size)- kvm-redhat-s390x-add-rhel-8.5.0-compat-machine.patch [bz#1951476] - kvm-redhat-add-missing-entries-in-hw_compat_rhel_8_4.patch [bz#1957834] - kvm-redhat-Define-pseries-rhel8.5.0-machine-type.patch [bz#1957834] - Resolves: bz#1951476 ([s390x] RHEL AV 8.5 new machine type for s390x) - Resolves: bz#1957834 ([ppc64le] RHEL AV 8.5 new machine type for ppc64le)- Rebase to qemu-kvm 6.0.015:6.0.0-33.el8s15:6.0.0-33.el8s.build-id2c5ee6e9b4010dc0515e9379e06e7d4ce37726eablock-rbd.so/usr/lib//usr/lib/.build-id//usr/lib/.build-id/2c//usr/lib64/qemu-kvm/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fexceptions -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -mcpu=power8 -mtune=power8 -funwind-tables -fstack-clash-protectioncpioxz2ppc64le-redhat-linux-gnudirectoryELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, BuildID[sha1]=2c5ee6e9b4010dc0515e9379e06e7d4ce37726ea, strippedRRRRRutf-889d22d3b46b9a06f96b0af66eb2fff7b22e369f5f8957812961755c793a95d6d?07zXZ !#,g/] b2u jӫ`(y-#;_t0Es κaH<6¬#\}mczbƮ*U jҼÍ_x۪|c:k{i zT_3)w5aʃT(3̗2McB-j+x:/-bHlҦEFLȥ6U`֏k}59V rZ߂̴c;lɒ͂PU%FW\+ ?cR5aNjb d#aB$}ϛpFeq涆GA6yat8wSlo6 2:0_p/!- R*:>-*jJf4RrqHD3jFAC# DŽMY&@>?8j4y*6XgjmuB^w!_ Hz%kOLg,V] .)+RH{- %VPb"b9]DZt-wڲ X4.tj#%&)>T BH[ K:*(~Z:go*;=dBDΛuY5 =[fOp]%l&26?v|49ޙ +Jm|,32 !6w<MIeCA܂ȅMqF¸=0r$(9Pϓ\8_"=δ$ +:(J-HU[,U~-{LSK DOϑթ">q=5{1b*d:ŜJ+mkQqO;ef>/ɢolz,ͧտ18Jn d{jŹ OQ1QgiA- _ORU;(a%+m6KyrZ̛V5*-\gaBn0`?8rlQX\b~>1rG$0ZʇLi@E?Z@$5T*Reo_q{ Q(Tǟo{gBFe#.(A/SHZ^]9i2QMǷS@V?zߘ9:zfkX-w. v#ʳM?7>Ub= $k[q_JBBgr]{tLg I廕:i|vWjz)hK>Tv;nmAQCCgD ~k= XےonET)EbۃTL)պ[\!M=a{n 2ؓ2$pI%F㧡ڧj{UHDMpmuRyfNU8g A"#1<6e MJ_JΓ|1c ‚ícV<`v]rn%ʖ"Ncr<'e1^·n:K^|$8=\Ow@7%pi2]y$4Z~32Fʏ!,ռSYЌg.H(8޲[>=B)жm;,Bؚ۳)!Q܍u{ V(~' /2|?g|ixC{Uڹja[bX)q!G> =c45R?Jlr  nrH(OE.V*}P6n{?o|q)>$=Tgi饝_b_Isvr$Zgǹ3ꎼ_<}og #Qh?)`B^.bmaEтMӠMn4GCxB(o>,a^TXܘ7&4uʹ^wS2٩v2?ۤD0ֳD:"o wӰ)[a3Fr|C@Otb<c FJ\{[B rT[0"" )FI̗ 3_1'6H"Y.} %z@Bfd>F{~vi;/Nphh&鹟'+t)bG f䈍]9&)SWQ\p/!uOo`*ogG14\V+(>zեnF$y wir^̨r!:wKpC|qPi}{_L̺4Ľdo=%SrPX:ѻD:FmC9S*0͖uSmIww=r?K6*sֿG Ukf3:m皀oJ\<$K91w*9%U6]ŵ_Fxq^ї_<$:'czTd+T"`O\Q0=R!%s$r`OZgnKUyKTI8997#gm  Z -xeQU]%gL teeTw"'~` ?v/ A/ (n%?+S^j c8)F%'.uܗJ.Xڕi\D” 44tUluk dd̀7Tn݁E %}'"l["VDD.O/[º]،WETUT6L䁯 /|.s?ukedG[ J䙓D 0`5@T_]'Ulp FgjNYBK Vs`BUBgc3KkFkhC1 3 ĵI(rq]6P<6s!L}>_68K2t%H/MKa%51ogͩx\f1\Jhe:v5}=cr*C\yRzRcsE%#JjEO_{/UO=LdRO㠥c-A=$VI~C*E&gjKa3AvO %zIU>ZQ"zXDEMRs[]g%&ͥSBu o/y P@,g 6^DJз4Uo2؂wSva/jѧtDtb:O^ KsO;w4_Y 2w xzaTqxNd~ΡV@*PkK2:>fWR8\VC^j` ^݊:ǓMpr49JuS9wG෥#iQ#h7?Iw|9K"DۂuUgL)KЖ4NpJ8jdO)KRyJ*$D߽)j4&s)7{y 1q6V˧@XpF>:}g?^Pґ++p_7RyE9hM ;=LQD+[-)k IUsݝ'wk+׫?ҝIMBWmv =}0:qJfV^Ɔ1r&5P >{Vf't*>)v0:Tq2E_@shk6=nr~;'nBpf"c>imi &ͅ8lYM)Ł3h!qO*@ m_bHC/s۞ǀ~;DV/íCƙ/gSӚ yMUw71˘ HlQEp+OxZ,My3:Ӫ/4!ڏyLAѹtt_/qzhFCfU&S?Uog)@.L!Yvxo$fk5ѼOIG'ejc]ala|{Do Yݖ-|u;eg,7w7QAy kp {^xb :wt|*,ueڨME'nzC1YXJ@J[@C+y `{}_pdJ ty&CdBIQ w> :i Dۤ޵q5Gy0!}[IDdKZx3cuLL>W..ͳ*xXG.v~${;ܜe^4s'{~>alwON*[R1`Cdͦ5]A^# T#~}v~\d7XxzsI5'?<{ n:6%[SV)Cqx~Q'Ѡ"Irp|=!xǤ>!lj jq&]cqIVF3۟ ^hu3U?%FhǨZ o>p;1Ub3VPwB4$PfW%߶Ҙװwei6t-.jZƏFA\7])}"73P q4* y\D0\苓ʷV *eL-o.tsM0(xz[l3om,JoUh6c{6^2Elt 7qlf@~!ǟtwv\M * :ڥa*G^ZFhp )T,3d(2*xtO`rijؓ:qq/I,7l)5#j:t*,g1vk1;ش!LuU9p1?DF)DŽGNS1}(cQen nBwj[^*.vHKh7%c؏F}Vd'+Z0Z<wjsæx$`NrJ*FL0̧ݳÃ{Sݡ͌3p$/&R!%c?aT@$uH( uT+XV3PFg]35iE5RƹM@|F$:JJ77dJ!Hw'LVF\;[9zo:@F+y%x52Igg"0'MusWhK5vӮr+ڐQqE$ |t,׮䆞*$~p\Y5M<v WC@h<@ռ ݐ+~㿳WB8 E,G@(C^꘎W817+Rl|1~A3~y7}Bu^/mY-CX`>?Qv&J3BOs^xUd%զ},MHߵbxЫHUiZ~ KA(D06m8ϭ?Cq7יDM5w hX Ї2%~hL8ʁ5WCH]ʫ1$45G#>I8qt-(<S-G1uz&oY!_U\7+Id`t{!I9͌UXiͪ[wopLB/# 2p+R-J'MLzi 4j8f+HEת0o%*Kŧrou^*܂mϔgfܸ&z[QmC,]׏Tu77Glg[[ܣ>ALysZT5B&C&*eթa9o;z0dFWozڌzMX8] *>3wYpf_=q,Ƈ@3)䳪I ¾j$WŮxmLqր;ыH.1t2j_b{Y( $Y9t+,q3,hWm<7x] 5uyYyݛBKh#Z8Ez>sIV*۳ڎqCJ ##1@[9 caRzw_ ? QuAϳ@ Eqrc{M$9 ?L`s9Q/aky&6306J=ao+-\^&ǂF('* .-,QtI, sۘrBAcmitT!N-d[@(hA yVEQՃ,,bQ+P .voS. 9Evr]=|_:86h{&p6k>߻QMijvj^7.]*dqai΢?, [Pڭgí* AD~q`&u(╂!)̕5cĹo2S|ʴ׹9ֹ=q1_M؄iGp]{P8*q{А^ ١X>iA PWCr59x |Jpd/SʋL"кNME9zޡ߱^0Fdq &'A3P 1lڢ!?òTlsօPEY+m8Ũ#^ 8;K&ZVRү(D`.\˴B[t%$\S1XS2̺pn@)%iI3#Ì =ZU*dQpON~N8ITx̍/\m.X⒉o3^ZLJpSgmd^!:y_fޯGys _$)]㸱vb+v?&umbRKƌ!#rDڧ K{+zp-ejuꖡRFE[mI<<2YY~Uy3>jYMҎ~6@n*xϢ_x&E"}YU7nSRV, au|2g=ۓ>+ULer¹<(\>.3X*ž35  .z9xeoYV2xgo<0a[[g褐*lRRyҸ7r[@9 a{$1)h!#wi{Bwp/ ]HW@D.A㥑\dP"W*`',4fF "}lmouse*ȴ-E[YK=mEj劁BviMF }_m@اY)gdV,lK[j6^9Vb] J^t nP,ZAaYyHʦM2OR;u8Q)OB(wQ<*{*Q҅e<{J`|ċ9!HCm 4ߩ-CXjS)H9Bm`Wڠ"ӣ@Z9IwNͳ~DU66Q* b;\Rr!W?ax9?cS?H=Ibc>:,yS6T@^|D;Jg% yysiAGLCr1Oup'[khhPܵĦ M\y3 I-%h&nJ^+5*' NB ^V;)d|'#&m#>{(cҕ:?s%p isEvGXI@ B)֩32mhɝN# .![cS׾f 1r2^ð4w J;*?\>BJN0yfUmQ9 N¥:vj%볺 f=JMu˔\8ISƺ؃Cyt`N+=ggtÆF/*n* `QT }q{u6]šde'O*ql1d_IwߵnDc_nJY~=4~ٺtÖFPtClT)+ dul㟪ȻN}nv @bZw%7iI8]D5qf' pְV!aOZ7c;>qmȴ'rfMF0 g7Иv rЭU錋ͩsqal7h'4k,ڍe)vYdӲB\`1 ByIᘂ%w *9^zP@(U[aGAՇ=(C]'Hڍ:im0*c<[vi宼iDl!,;`ދM^7)]Nm$~SPq1|ToX݄Y%We2juI>DCBp6{#N7ĩK}PkpD}=;G*eԥl,qU~dthP<C%R$j _cfxmW3P<)"M|g\gڍ5;uN=1rd>5G8}N|d 0i?]S0Tw#)6J@j9SYz6}_ ))hRdV\[|;c /Y*G%3(})L+L (4 'Nv3hy> i {>?qnǀyu힯 L0{ 0DJ_kقk_nj*hCISis=,6B0..~9\7gmN%?YWA5 sv hZNe2I&~ -R|1CZ <+}8`nU60Aєxaf~ꂁ‘e PИu*Rc$/uBG)֐Jq܏Άy:pC$'@|RNF{IJɩ9u)m߆5sPŏޡ v MMa9v l*Bku^:J!TT}1+8(܉;.7'yL[Zt T7WdP2sQȒ>ΔospwqIɹ ]q_@#,M &Ӻ"űwJh}Lϥ L(:`;ϯ0L_|9|u{PYb̥L{(fa3C AhG Z݋qG =)T/ton ~~4fgqj%eyh?z$I C{*cWDwh%BGy9n+|j@Jop{R\erh"LYcr1Ex!5|uuz0뺸B8E:^才JJ=16sQ%8T@3Zh{ M2<ULQ=2V0VC,`=an[hI_&GSeb^c'`|7vj2Lߤ2Cbrw:KZ-=b][ /E)*ON%;n)V{HG/#0BL; jw !!}",U*K^i K5ckM";`"zgk¿`s> 64<͇ˆ Apy|2,}L޻|EN#083T$BImؙ{!tϺͲ2?`kedC\Dp @$ap3 +\9vКAV^>K;o. 1bӳ} N'pq kw<|PG_."8cSB#L Awt*6UU-K:Wbk&tCb} gg ~Rgg苿@ҸMG8&xuߢX@jO`>O:ԳP [d7$ffrFϱC{sV2!tGHÁ|.[2LG (_7ڗΚ@$5Wp9"C72}(C4@q 堾qCRb,.:2ۡWOx!'\])op`P\4 ?)ϼT@l! 8.%3xPL´e;f)8 tNp{_N{S?o>sMqߵsHxMz|<:鬐CqwP}*Dv.#_  YZ