qemu-kvm-block-gluster-15:6.0.0-27.el8s >  H a/- z뾂alx-PIo6NhۓubUž|L.3'| #5XH2’-X@1m*ddUö0DKa'3tyg}%%4 UDU0McX{6CRc4UV&! >! L!3ϮʄPI.XDԎZ37h'lPv?1[z$;ͻrZ&7_~N.ua UϦnҴ^ſN'pcd9129ef637c63d868094db266ccdf2b5c24e80a86ef9285cf7fd8806d078c8f756f639485821d405deef1337ce1a08e500366cefa/- z뾂al.{oˆh uBpf}w =?wyQG1]AjAHۀ' JyvBSy"Ja?6trt JY㎋^xǥlXyE4J y-"W: /uUvޮ+T7~6} V E|+ҧ\Qmc{O/MKԩ^xcW !8uH>p=6?6 d( , F! 6H]cl|     $8Ll|  : (o8x 9 : G2`H2pI2X2Y2\2]2^3b3Od4e4f4l4t4u4v4w5|x5y55556Cqemu-kvm-block-gluster6.0.027.el8sQEMU Gluster block driverThis package provides the additional Gluster block driver for QEMU. Install this package if you want to access remote Gluster storage.a5Okojid-x86-01.rdu2.centos.orgPCentOSCentOSGPLv2 and GPLv2+ and CC-BYCBS Development/Toolshttp://www.qemu.org/linuxx86_64/PAAa5Fa5Fa5Fa3R080e6ec90faa5380a9c1ebd8b0840f95d915de281a0d1da02b94c4815183b48c../../../../usr/lib64/qemu-kvm/block-gluster.sorootrootrootrootrootrootrootrootqemu-kvm-6.0.0-27.el8s.src.rpmqemu-kvm-block-glusterqemu-kvm-block-gluster(x86-64)@@@@@@@    @libc.so.6()(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.4)(64bit)libgfapi.so.0()(64bit)libgfapi.so.0(GFAPI_3.4.0)(64bit)libgfapi.so.0(GFAPI_3.5.0)(64bit)libgfapi.so.0(GFAPI_6.0)(64bit)qemu-kvm-common(x86-64)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)rtld(GNU_HASH)15:6.0.0-27.el8s3.0.4-14.6.0-14.0-15.2-14.14.3a @a@``t```"@`@`P@`!@``Miroslav Rezanina - 6.0.0-27Miroslav Rezanina - 6.0.0-26Danilo Cesar Lemes de Paula - 6.0.0-25.el8Danilo Cesar Lemes de Paula - 6.0.0-24.el8Danilo Cesar Lemes de Paula - 6.0.0-23.el8Danilo Cesar Lemes de Paula - 6.0.0-22.el8Danilo Cesar Lemes de Paula - 6.0.0-21.el8Danilo Cesar Lemes de Paula - 6.0.0-20.el8Danilo Cesar Lemes de Paula - 6.0.0-19.el8Danilo Cesar Lemes de Paula - 6.0.0-18.el8Danilo Cesar Lemes de Paula - 6.0.0-17.el8Danilo Cesar Lemes de Paula - 6.0.0-16.el8- kvm-migration-move-wait-unplug-loop-to-its-own-function.patch [bz#1976852] - kvm-migration-failover-continue-to-wait-card-unplug-on-e.patch [bz#1976852] - kvm-aarch64-Add-USB-storage-devices.patch [bz#1974579] - Resolves: bz#1976852 ([failover vf migration] The failover vf will be unregistered if canceling the migration whose status is "wait-unplug") - Resolves: bz#1974579 (It's not possible to start installation from a virtual USB device on aarch64)- kvm-acpi-pc-revert-back-to-v5.2-PCI-slot-enumeration.patch [bz#1977798] - kvm-migration-failover-reset-partially_hotplugged.patch [bz#1787194] - kvm-hmp-Fix-loadvm-to-resume-the-VM-on-success-instead-o.patch [bz#1959676] - kvm-migration-Move-bitmap_mutex-out-of-migration_bitmap_.patch [bz#1959729] - kvm-i386-cpu-Expose-AVX_VNNI-instruction-to-guest.patch [bz#1924822] - kvm-ratelimit-protect-with-a-mutex.patch [bz#1838221] - kvm-Update-Linux-headers-to-5.13-rc4.patch [bz#1838221] - kvm-i386-Add-ratelimit-for-bus-locks-acquired-in-guest.patch [bz#1838221] - kvm-iothread-generalize-iothread_set_param-iothread_get_.patch [bz#1930286] - kvm-iothread-add-aio-max-batch-parameter.patch [bz#1930286] - kvm-linux-aio-limit-the-batch-size-using-aio-max-batch-p.patch [bz#1930286] - kvm-block-nvme-Fix-VFIO_MAP_DMA-failed-No-space-left-on-.patch [bz#1848881] - Resolves: bz#1977798 (RHEL8.5 guest network interface name changed after upgrade to qemu-6.0) - Resolves: bz#1787194 (After canceling the migration of a vm with VF which enables failover, using "migrate -d tcp:invalid uri" to re-migrating the vm will cause the VF in vm to be hot-unplug.) - Resolves: bz#1959676 (guest status is paused after loadvm on rhel8.5.0) - Resolves: bz#1959729 (SAP/3TB VM migration slowness [idle db]) - Resolves: bz#1924822 ([Intel 8.5 FEAT] qemu-kvm AVX2 VNNI - Fast Train) - Resolves: bz#1838221 ([Intel 8.5 FEAT] qemu-kvm Bus Lock VM Exit - Fast Train) - Resolves: bz#1930286 (randread and randrw regression with virtio-blk multi-queue) - Resolves: bz#1848881 (nvme:// block driver can exhaust IOMMU DMAs, hanging the VM, possible data loss)- kvm-s390x-cpumodel-add-3931-and-3932.patch [bz#1976171] - kvm-file-posix-fix-max_iov-for-dev-sg-devices.patch [bz#1943653] - kvm-scsi-generic-pass-max_segments-via-max_iov-field-in-.patch [bz#1943653] - kvm-osdep-provide-ROUND_DOWN-macro.patch [bz#1943653] - kvm-block-backend-align-max_transfer-to-request-alignmen.patch [bz#1943653] - kvm-block-add-max_hw_transfer-to-BlockLimits.patch [bz#1943653] - kvm-file-posix-try-BLKSECTGET-on-block-devices-too-do-no.patch [bz#1943653] - Resolves: bz#1976171 ([IBM 8.5 FEAT] CPU Model for new IBM Z Hardware - qemu part) - Resolves: bz#1943653 (RHV VM pauses due to 'qemu-kvm' getting EINVAL on i/o to a direct lun with scsi passthrough enabled)- kvm-s390x-css-Introduce-an-ESW-struct.patch [bz#1968326] - kvm-s390x-css-Split-out-the-IRB-sense-data.patch [bz#1968326] - kvm-s390x-css-Refactor-IRB-construction.patch [bz#1968326] - kvm-s390x-css-Add-passthrough-IRB.patch [bz#1968326] - kvm-vhost-user-blk-Fail-gracefully-on-too-large-queue-si.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Make-sure-to-set-Error-on-realize-fai.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Don-t-reconnect-during-initialisation.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Improve-error-reporting-in-realize.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Get-more-feature-flags-from-vhost-dev.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-virtio-Fail-if-iommu_platform-is-requested-but-unsup.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Check-that-num-queues-is-supported-by.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-Fix-backends-without-multiqueue-support.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - Resolves: bz#1968326 ([vfio_ccw] I/O error when checking format - dasdfmt requires --force in quick mode when passed through) - Resolves: bz#1935014 (qemu crash when attach vhost-user-blk-pci with option queue-size=4096) - Resolves: bz#1935019 (qemu guest failed boot when attach vhost-user-blk-pci with option iommu_platform=on) - Resolves: bz#1935020 (qemu guest failed boot when attach vhost-user-blk-pci with option packed=on) - Resolves: bz#1935031 (qemu guest failed boot when attach vhost-user-blk-pci with unmatched num-queues with qsd)- kvm-Add-mtod_check.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-bootp-limit-vendor-specific-area-to-input-packet-mem.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-bootp-check-bootp_input-buffer-size.patch [bz#1970823] - kvm-upd6-check-udp6_input-buffer-size.patch [bz#1970842] - kvm-tftp-check-tftp_input-buffer-size.patch [bz#1970850] - kvm-tftp-introduce-a-header-structure.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-udp-check-upd_input-buffer-size.patch [bz#1970858] - kvm-Fix-DHCP-broken-in-libslirp-v4.6.0.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-redhat-use-the-standard-vhost-user-JSON-path.patch [bz#1804196] - Resolves: bz#1970823 (CVE-2021-3592 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (bootp) [rhel-av-8]) - Resolves: bz#1970842 (CVE-2021-3593 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp6) [rhel-av-8]) - Resolves: bz#1970850 (CVE-2021-3595 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (tftp) [rhel-av-8]) - Resolves: bz#1970858 (CVE-2021-3594 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp) [rhel-av-8]) - Resolves: bz#1804196 (inconsistent paths for interop json files)- kvm-redhat-Expose-upstream-machines-pc-4.2-and-pc-2.11.patch [bz#1897923] - kvm-redhat-Enable-FDC-device-for-upstream-machines-too.patch [bz#1897923] - kvm-redhat-Add-hw_compat_4_2_extra-and-apply-to-upstream.patch [bz#1897923] - kvm-ppc-pef.c-initialize-cgs-ready-in-kvmppc_svm_init.patch [bz#1789757] - kvm-virtio-gpu-handle-partial-maps-properly.patch [bz#1932279] - kvm-redhat-Fix-unversioned-Obsoletes-warning.patch [bz#1950405 bz#1967330] - kvm-redhat-Move-qemu-kvm-docs-dependency-to-qemu-kvm.patch [bz#1950405 bz#1967330] - kvm-redhat-introducting-qemu-kvm-hw-usbredir.patch [bz#1950405 bz#1967330] - kvm-spapr-Fix-EEH-capability-issue-on-KVM-guest-for-PCI-.patch [bz#1976015] - Resolves: bz#1897923 (support Live Migration from Ubuntu 18.04 i440fx to RHEL) - Resolves: bz#1789757 ([IBM 8.5 FEAT] Add machine option to enable secure VM support) - Resolves: bz#1932279 ([aarch64] qemu core dumped when using smmuv3 and iommu_platform enabling at virtio-gpu-pci) - Resolves: bz#1950405 (review qemu-kvm-core dependencies) - Resolves: bz#1967330 (Make qemu-kvm use versioned obsoletes for qemu-kvm-ma and qemu-kvm-rhev) - Resolves: bz#1976015 (spapr: Fix EEH capability issue on KVM guest for PCI passthru)- kvm-block-backend-add-drained_poll.patch [bz#1960137] - kvm-nbd-server-Use-drained-block-ops-to-quiesce-the-serv.patch [bz#1960137] - kvm-disable-CONFIG_USB_STORAGE_BOT.patch [bz#1866133] - kvm-doc-Fix-some-mistakes-in-the-SEV-documentation.patch [bz#1954750] - kvm-docs-Add-SEV-ES-documentation-to-amd-memory-encrypti.patch [bz#1954750] - kvm-docs-interop-firmware.json-Add-SEV-ES-support.patch [bz#1954750] - Resolves: bz#1960137 ([incremental backup] qemu-kvm hangs when Rebooting the VM during full backup) - Resolves: bz#1866133 (Disable usb-bot device in QEMU (unsupported)) - Resolves: bz#1954750 (firmware scheme for sev-es)- kvm-x86-Add-x86-rhel8.5-machine-types.patch [bz#1957838] - kvm-redhat-x86-Enable-kvm-asyncpf-int-by-default.patch [bz#1967603] - kvm-yank-Unregister-function-when-using-TLS-migration.patch [bz#1964326] - Resolves: bz#1957838 (8.5 machine types for x86) - Resolves: bz#1967603 (Enable interrupt based asynchronous page fault mechanism by default) - Resolves: bz#1964326 (Qemu core dump when do tls migration via tcp protocol)- kvm-pc-bios-s390-ccw-don-t-try-to-read-the-next-block-if.patch [bz#1965626] - kvm-redhat-Install-the-s390-netboot.img-that-we-ve-built.patch [bz#1966463] - kvm-sockets-update-SOCKET_ADDRESS_TYPE_FD-listen-2-backl.patch [bz#1967177] - kvm-target-i386-sev-add-support-to-query-the-attestation.patch [bz#1957022] - kvm-spapr-Don-t-hijack-current_machine-boot_order.patch [bz#1960119] - kvm-target-i386-Add-CPU-model-versions-supporting-xsaves.patch [bz#1942914] - kvm-spapr-Remove-stale-comment-about-power-saving-LPCR-b.patch [bz#1940731] - kvm-spapr-Set-LPCR-to-current-AIL-mode-when-starting-a-n.patch [bz#1940731] - Resolves: bz#1965626 (RHEL8.2 - QEMU BIOS fails to read stage2 loader (kvm)) - Resolves: bz#1966463 (Rebuild the s390-netboot.img for downstream instead of shipping the upstream image) - Resolves: bz#1967177 (QEMU 6.0.0 socket_get_fd() fails with the error "socket_get_fd: too many connections") - Resolves: bz#1957022 (SEV: Add support to query the attestation report) - Resolves: bz#1960119 ([regression]Failed to reset guest) - Resolves: bz#1942914 ([Hyper-V][RHEL8.4]Nested Hyper-V on KVM: On Intel CPU L1 2016 can not start with cpu model Skylake-Server-noTSX-IBRS or Skylake-Client-noTSX-IBRS) - Resolves: bz#1940731 ([ppc64le] Hotplug vcpu device hit call trace:[qemu output] KVM: unknown exit, hardware reason 7fff9ce87ed8)- kvm-virtio-net-failover-add-missing-remove_migration_sta.patch [bz#1953045] - kvm-hw-arm-virt-Add-8.5-machine-type.patch [bz#1957667] - kvm-hw-arm-virt-Disable-PL011-clock-migration-through-hw.patch [bz#1957667] - kvm-arm-virt-Register-highmem-and-gic-version-as-class-p.patch [bz#1957667] - kvm-virtio-blk-Fix-rollback-path-in-virtio_blk_data_plan.patch [bz#1927108] - kvm-virtio-blk-Configure-all-host-notifiers-in-a-single-.patch [bz#1927108] - kvm-virtio-scsi-Set-host-notifiers-and-callbacks-separat.patch [bz#1927108] - kvm-virtio-scsi-Configure-all-host-notifiers-in-a-single.patch [bz#1927108] - kvm-hw-arm-smmuv3-Another-range-invalidation-fix.patch [bz#1929720] - Resolves: bz#1953045 (qemu-kvm NULL pointer de-reference during migration at migrate_fd_connect ->...-> notifier_list_notify) - Resolves: bz#1957667 ([aarch64] Add 8.5 machine type) - Resolves: bz#1927108 (It's too slow to load scsi disk when use 384 vcpus) - Resolves: bz#1929720 ([aarch64] Handle vsmmuv3 IOTLB invalidation with non power of 2 size)- kvm-redhat-s390x-add-rhel-8.5.0-compat-machine.patch [bz#1951476] - kvm-redhat-add-missing-entries-in-hw_compat_rhel_8_4.patch [bz#1957834] - kvm-redhat-Define-pseries-rhel8.5.0-machine-type.patch [bz#1957834] - Resolves: bz#1951476 ([s390x] RHEL AV 8.5 new machine type for s390x) - Resolves: bz#1957834 ([ppc64le] RHEL AV 8.5 new machine type for ppc64le)- Rebase to qemu-kvm 6.0.015:6.0.0-27.el8s15:6.0.0-27.el8s.build-ida788260e0182de0ea51a8b854d1fa78e0746cf29block-gluster.so/usr/lib//usr/lib/.build-id//usr/lib/.build-id/a7//usr/lib64/qemu-kvm/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fexceptions -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protectioncpioxz2x86_64-redhat-linux-gnudirectoryELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=a788260e0182de0ea51a8b854d1fa78e0746cf29, strippedRRRRRRRR utf-81aa6c1340c3ed276b61924bdf585c6ecf236acd42a16b03536191781f7f4f0d8?07zXZ !#,G,] b2u jӫ`(y-k `]hVO n Bd!$i|ope 8]y ,-0T@E-Xsyh(a ^=-p,%{Czg%ޏz&TV>'0'B4< i9xIo3zjM\8yjM7Cc^vʂkNIcIO:@Vz?5ꢢLeigLp4ΨR+BBg-fZ!ykPK &EQK7#"[܆xB ;n`VPx{7Jң\,gw?JLt0&^Kfb61#XBX% I63v>52a-5:I h6[v+]?6ľJg#9Yq=XDk,(X^zy1L. PE*z̴buݨsXkDSW\@m|/˓ގw,=P;d<:E kR;ЀD < M.Y`bf^S~/MliP`` !pӺlfrE|]I{|ʧ$֙]8Ѫ2ne2Bw؂'-Fa̟YэsQz*GwO+E'5#7i4ǁ|Gm G,932>@Hơ~@u7. Q@ds<&!6{E3ŐH=K,sdDrޛ@½`X:*L*ó0gp Y/+~J,yT1(Dfg6! "җp B yF\MlQ}&=W".TzcQ3:^8EzMv׆4 s/g E=8쯈.a,\Cx#Pr̝0OYE~*ۄ̟sJHGexa3KL crO赽kѷ+TW= x_YTо;>hdkxx|'R+mV4K<&a${nc4xTV!E6GCIWI0G,&$ KK 0x"GQ, 0HE9! )d HZ<.pa M4mS/4)&JdϪH*?k^lVoxE% Wod>(UyՑ Abic%O͚O_g*}{֙ݹWQ2˚fu:n푋Y2ɄNۼR=s-<ߚq"U95,N}@ Ks[,}#%Nyw)H%hK֊zNB( d3ܓ3bbn_}:d8#@jH;*I[S| KW~J-CQwbͅd928Ǣ ֯8Z BiӚCJ?}  hef,OGRpw@aA8Qz VВIWCA-ol $ ccsJCG+P %.Lؒ٧m"" v2)ԟXpZU3x &! zR/ٷyhL–?Z]D< BץYx9K%P?bxtBf~OZ{XgHt\^^=5fAQ"9t{& {9z G&Z/_ y8;YjĨ}3EOnvaa\Qw:nG#^~h2 +ػH$1ҋB \N@ghy-Ƅ"rQީŪ ژkjxn`I3(ٕa% EV.X`.:z]T2Y/:dfDkP-0"(1ڐNPv,Oܩƅo4[_ mmڿ^FcˉB{_7_ԘA;\,Rh" 9K< 4}jbD4NX"fc[dP !~bʪ 1BPtNQopަTAm#q`E$Ud6˿fm /;^*fOUF~:1f2ödץ lm3;rf 8Z>jCQ-) w:pVW~V gd9z'W }&ƈ:&5vh|"dǻy,_:Xfl/5E(eb9Q-uX b\6]V<_Z5I~;E2!Njy=cTuN*ˢ%UF8U@l&b*co\>ЇCxJ^V"#z>~C?%*Uu JNӈF3?_!LN4z1 `nWS hhfF h6c f<"Y-}8#7Cd_Vdby%QT?  ?-c;DPPZw.<<&q!T^gZFkj.ᕁ0L0KRV諁f1h#}e9͘aƐW U#c=]\S%N_ݫK /gi;DݮMеh+_/QzMA:QiB[́jyt( T6[qN Ҧ/?E5`1#"N<E NBo%TuD"]q^ahkꝰ< `*TwWb{^>(gsg13$5^7<} :vb኷ta\x{B@dt$ocML"sJBYu(҉׃ ^ E4H 7yA=9ӫ{U& .UL"*BsJ/(  \(ٓҴ3MUs p[(?rO*+%zb lẁ߶풭'w=n%(Dx @z!tbˆ(d[8m*+0f*}Pqgrإ X׆w~b53Y !8Q WcR {Hy(Eţ_.%61S}z)JyRƘG|sE"ӥ0aohmn A'4l _4iZy{O 9Ԍ S|LbP)DI%'oȡ :rh$@?p%Arٜ;ұ "KVW'!I0bZ\5 sm}7Vvd]Nʿ;:a M,y%;E::P ]*E9`sK^.ͷr7qZ&ȇ7Y.c8h8Fs9X4GNғ°d}L`2F, 0V!ByKo0RSS0rw}4?ߠ%=ӯJ#%`y'$!#@߷|\7c֍ט+8DwV0}Ab)Ԙ+{* hneiy?o Y4KZ? 97MC}iMZP!2CJqH5~:.lRק`iE04(C.!voɗ6sHי5_6`<8s>i@Tsh*X_='2Z" jDvC9 B,ZP=%p G9j,Y0O֘nJvx1r  b6R YI &BG1֕lu];iĠS-*MhSu%ΔcFfHWX1VAP q߁1ݴKӰ)(3c.n>1$n͹4:HF1Yx`EvQZ*;?hn1HV\;zO(oP_6tn;KKzwk[.Ksf#\T]P_CşlJ@Ohi3aŰ14M6eqSK5QA \[p)M@s|f?۹E^W14"rdA\Q#iG5e mZ+*&~@VI} ߢHG@veS,pfK0 6‰ I11|c%% ۘ HvO B!#sȿfX{fD撈i&0=OŢ9qK Ԫ6t)?NI!@BskD&Nf8BVEh d*(THZ쑶hcWoefJנ4kW1RX|7~g(|"TZDW.|B傖?WYm[?>"{@sb#z( /O靊82yk&5vZ{*]lۃyHbԭw/?:#d*H9ċ,7NDKy'R ]$}5W[wT`|kTKO_6GiW$9S!vF-yMwpoS\Q޹Ek?jB;ү:c񥁳EJ.cΉq5Ga+u& V^%D!:U@3^6bh#(r5Ԋ44; eCIlmNX=c;L]rta ZR^P \FyD]eꏳ]Ҽ8zK9WZQʁ܍ .&wRGIj~NJOp40s^럌91f [(l'X8@ᙦ)SrG{DoEčpʿu$+`EuVGݪ/q3XbX^T%]5Ƀ潓oľ3:T`LfkK@;eb8NQ67LF: HOx _ŗ6dTNѵ'2ҨG2<7 /A硰:: 2bM6k?䱦!TX'||HfZ쫅G0ycUQ8*8-5oa1%CZ`>V|b= q:Ve˚E2QmTum!;rx'V=&K,z[6)8Sjp7c@ܹ*{O'Y˕,,a keo3T̋8}Pb'֮)n(/^[FCUHùXZ4<^zkO0XZL&dS>ba-|ߕ&>۷>$E~B93leY[u,p(W/֑J6#4QYV ׼EmG6\qu*F*0-KJM㯠4;;Om fz]w A],nQKhb \':IT3*L?)2vQ2X:݁,_AAOymcNVee抲 qEy:Rk%]n38䂥1r\ޑŵoB@'aN4婢 ˩Z`y#-9te NwaQ@!>ۢ%: $Ec,t>"TDIZz%L%#]u7FkiL@(MھCDB¸qvI2!*J{GqF>PbE#7/|ym+} fo'`F/iRҗ"âEzFB}&#xt.0nI{h0`5g{v9:W;tfQpb+1|f5[L=jRvF oS["\x.Dx^U\o?iPѤsO6\VÙITi@*;%\gO_;ɛdҫp{&3M^mhHݸۃxgTx.cЎR }J9| mYs6)[\ZގTi7FHҠ4Y*[O[! ߄ W<,Ձ8R GkMU"Ј_SJe6~͛jot?Ye+ĔLaxtBa2u:'~րpy@MCB+:w s|luT$`yk&la|M|:r6@32fz"`#afK*ksU=l"U&yJGgv@k >Ƕ 7|)eteT%2S5TOo|#.xX{IEp{$Y.lQ]0վcZc70k{š{Xp^KþE%I3jǂoh|98dq۔|)CKp1*Tɘl*be(<$Þ2 y_C%ܳk-%剭ZsoH sWN MSM@{c';H62B Dؾ ꎪ%|r{Ux~;Ym8^NfA!f!+g1l#`/O S۽bꃲ˶i8*8P™933g?:;s&A;LRKHCBc,j2R^q%.(h=d4ȰKsj9T3f˓EOiA+m\J Π)w\ywS/'"WL=AP$iR67Q:4XZ|tp ]O6'7Y/ yq$**P|[r! =?lm< ʝ_ΉhaɲLU3CޢA$E 2(H=`9gTw mӇCh t1+eaXX#a&5)U' y ˮCa wz|4?Sֆ51;BV?UsS/bz#iIgfh|)) "dc8+.룈IGY R]qn`Q&4JDNWQ u<7!;^1TZ[e^̴5 o6s9#ʻ;23X\<rʑ'dѸx/^.XENۓ2湠Pc^oiWck! 㪵[Joz@׉JiRG8Ls:ws;ɪ ID<4 ,Ɖ dj<>B>-;Y&EKIt?غeԭ@OekKS֦aayKKy>ß|/iSi+'.֔W8C}!R.Dp"ת;B/bBlroZeL(ϹעY=f'#G8( ,YȬQ3 YZ