qemu-kvm-block-gluster-15:6.0.0-31.el8s >  H a`o z뾂al z W$mPfUߺGɁ qt4zd22u*VmЭ 9mF7۴Uff#iBTtV?x(Xt|J[~udٝԴT)$$jB׈0C}Z+Fً,B" Kmk*{ASr8n3(WN,} "A+U^&Ǡꋖl~)]G aa8I]!+LZ{[Akׂ21b3540b79f334ce0e79d2b0928aede285950e983bb9e766bd020f2364a7d26548face2eda5fdbe9b959d6a66776b0d38d414775m,a`o z뾂alVr>i\bWb )OO$m(y?#ɡƃxʋ%:.- :A5EiCmMϝ]R&s,YnLSZ\(Xt U1LdAi +n nV6ͣM]yƕ73(! G x+ +[jl&HH>p=<`?Development/Toolshttp://www.qemu.org/linuxx86_64/PAAaW$DaW$DaW$DaW"0c7a12cbbd3d5a34bb73f4a87b68eecee1a6a4b2b936c995643e51a4cb811ebc../../../../usr/lib64/qemu-kvm/block-gluster.sorootrootrootrootrootrootrootrootqemu-kvm-6.0.0-31.el8s.src.rpmqemu-kvm-block-glusterqemu-kvm-block-gluster(x86-64)@@@@@@@    @libc.so.6()(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.4)(64bit)libgfapi.so.0()(64bit)libgfapi.so.0(GFAPI_3.4.0)(64bit)libgfapi.so.0(GFAPI_3.5.0)(64bit)libgfapi.so.0(GFAPI_6.0)(64bit)qemu-kvm-common(x86-64)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)rtld(GNU_HASH)15:6.0.0-31.el8s3.0.4-14.6.0-14.0-15.2-14.14.3aTU@a?=@a&0a@a @a@``t```"@`@`P@`!@``Jon Maloy - 6.0.0-31Danilo Cesar Lemes de Paula - 6.0.0-30Danilo Cesar Lemes de Paula - 6.0.0-29.el8Danilo Cesar Lemes de Paula - 6.0.0-28.el8Miroslav Rezanina - 6.0.0-27Miroslav Rezanina - 6.0.0-26Danilo Cesar Lemes de Paula - 6.0.0-25.el8Danilo Cesar Lemes de Paula - 6.0.0-24.el8Danilo Cesar Lemes de Paula - 6.0.0-23.el8Danilo Cesar Lemes de Paula - 6.0.0-22.el8Danilo Cesar Lemes de Paula - 6.0.0-21.el8Danilo Cesar Lemes de Paula - 6.0.0-20.el8Danilo Cesar Lemes de Paula - 6.0.0-19.el8Danilo Cesar Lemes de Paula - 6.0.0-18.el8Danilo Cesar Lemes de Paula - 6.0.0-17.el8Danilo Cesar Lemes de Paula - 6.0.0-16.el8- kvm-virtiofsd-Fix-fuse-setxattr-API-change-issue.patch [bz#1990697] - Resolves: bz#1990697 (virtiofsd: xattr remapping does not seem to work as expected)- kvm-usbredir-fix-free-call.patch [bz#1989928] - kvm-block-Fix-in_flight-leak-in-request-padding-error-pa.patch [bz#2002631] - Resolves: bz#1989928 (CVE-2021-3682 virt:av/qemu-kvm: QEMU: usbredir: free call on invalid pointer in bufp_alloc() [rhel-av-8.5.0]) - Resolves: bz#2002631 (Windows Installation blocked on 4k disk when using blk+raw+iothread)- kvm-file-posix-Cap-max_iov-at-IOV_MAX.patch [bz#1994494] - kvm-migration-Move-yank-outside-qemu_start_incoming_migr.patch [bz#1974366] - Resolves: bz#1994494 (VM remains in paused state when trying to write on a resized disk resides on iscsi) - Resolves: bz#1974366 (Fail to set migrate incoming for 2nd time after the first time failed)- kvm-iotests-Improve-and-rename-test-291-to-qemu-img-bitm.patch [bz#1946084] - kvm-qemu-img-Fail-fast-on-convert-bitmaps-with-inconsist.patch [bz#1946084] - kvm-qemu-img-Add-skip-broken-bitmaps-for-convert-bitmaps.patch [bz#1946084] - kvm-audio-Never-send-migration-section.patch [bz#1991671] - Resolves: bz#1946084 (qemu-img convert --bitmaps fail if a bitmap is inconsistent) - Resolves: bz#1991671 (vmstate differs between -audiodev and QEMU_AUDIO_DRV when no sound frontends devs present.)- kvm-migration-move-wait-unplug-loop-to-its-own-function.patch [bz#1976852] - kvm-migration-failover-continue-to-wait-card-unplug-on-e.patch [bz#1976852] - kvm-aarch64-Add-USB-storage-devices.patch [bz#1974579] - Resolves: bz#1976852 ([failover vf migration] The failover vf will be unregistered if canceling the migration whose status is "wait-unplug") - Resolves: bz#1974579 (It's not possible to start installation from a virtual USB device on aarch64)- kvm-acpi-pc-revert-back-to-v5.2-PCI-slot-enumeration.patch [bz#1977798] - kvm-migration-failover-reset-partially_hotplugged.patch [bz#1787194] - kvm-hmp-Fix-loadvm-to-resume-the-VM-on-success-instead-o.patch [bz#1959676] - kvm-migration-Move-bitmap_mutex-out-of-migration_bitmap_.patch [bz#1959729] - kvm-i386-cpu-Expose-AVX_VNNI-instruction-to-guest.patch [bz#1924822] - kvm-ratelimit-protect-with-a-mutex.patch [bz#1838221] - kvm-Update-Linux-headers-to-5.13-rc4.patch [bz#1838221] - kvm-i386-Add-ratelimit-for-bus-locks-acquired-in-guest.patch [bz#1838221] - kvm-iothread-generalize-iothread_set_param-iothread_get_.patch [bz#1930286] - kvm-iothread-add-aio-max-batch-parameter.patch [bz#1930286] - kvm-linux-aio-limit-the-batch-size-using-aio-max-batch-p.patch [bz#1930286] - kvm-block-nvme-Fix-VFIO_MAP_DMA-failed-No-space-left-on-.patch [bz#1848881] - Resolves: bz#1977798 (RHEL8.5 guest network interface name changed after upgrade to qemu-6.0) - Resolves: bz#1787194 (After canceling the migration of a vm with VF which enables failover, using "migrate -d tcp:invalid uri" to re-migrating the vm will cause the VF in vm to be hot-unplug.) - Resolves: bz#1959676 (guest status is paused after loadvm on rhel8.5.0) - Resolves: bz#1959729 (SAP/3TB VM migration slowness [idle db]) - Resolves: bz#1924822 ([Intel 8.5 FEAT] qemu-kvm AVX2 VNNI - Fast Train) - Resolves: bz#1838221 ([Intel 8.5 FEAT] qemu-kvm Bus Lock VM Exit - Fast Train) - Resolves: bz#1930286 (randread and randrw regression with virtio-blk multi-queue) - Resolves: bz#1848881 (nvme:// block driver can exhaust IOMMU DMAs, hanging the VM, possible data loss)- kvm-s390x-cpumodel-add-3931-and-3932.patch [bz#1976171] - kvm-file-posix-fix-max_iov-for-dev-sg-devices.patch [bz#1943653] - kvm-scsi-generic-pass-max_segments-via-max_iov-field-in-.patch [bz#1943653] - kvm-osdep-provide-ROUND_DOWN-macro.patch [bz#1943653] - kvm-block-backend-align-max_transfer-to-request-alignmen.patch [bz#1943653] - kvm-block-add-max_hw_transfer-to-BlockLimits.patch [bz#1943653] - kvm-file-posix-try-BLKSECTGET-on-block-devices-too-do-no.patch [bz#1943653] - Resolves: bz#1976171 ([IBM 8.5 FEAT] CPU Model for new IBM Z Hardware - qemu part) - Resolves: bz#1943653 (RHV VM pauses due to 'qemu-kvm' getting EINVAL on i/o to a direct lun with scsi passthrough enabled)- kvm-s390x-css-Introduce-an-ESW-struct.patch [bz#1968326] - kvm-s390x-css-Split-out-the-IRB-sense-data.patch [bz#1968326] - kvm-s390x-css-Refactor-IRB-construction.patch [bz#1968326] - kvm-s390x-css-Add-passthrough-IRB.patch [bz#1968326] - kvm-vhost-user-blk-Fail-gracefully-on-too-large-queue-si.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Make-sure-to-set-Error-on-realize-fai.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Don-t-reconnect-during-initialisation.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Improve-error-reporting-in-realize.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Get-more-feature-flags-from-vhost-dev.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-virtio-Fail-if-iommu_platform-is-requested-but-unsup.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-blk-Check-that-num-queues-is-supported-by.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - kvm-vhost-user-Fix-backends-without-multiqueue-support.patch [bz#1935014 bz#1935019 bz#1935020 bz#1935031] - Resolves: bz#1968326 ([vfio_ccw] I/O error when checking format - dasdfmt requires --force in quick mode when passed through) - Resolves: bz#1935014 (qemu crash when attach vhost-user-blk-pci with option queue-size=4096) - Resolves: bz#1935019 (qemu guest failed boot when attach vhost-user-blk-pci with option iommu_platform=on) - Resolves: bz#1935020 (qemu guest failed boot when attach vhost-user-blk-pci with option packed=on) - Resolves: bz#1935031 (qemu guest failed boot when attach vhost-user-blk-pci with unmatched num-queues with qsd)- kvm-Add-mtod_check.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-bootp-limit-vendor-specific-area-to-input-packet-mem.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-bootp-check-bootp_input-buffer-size.patch [bz#1970823] - kvm-upd6-check-udp6_input-buffer-size.patch [bz#1970842] - kvm-tftp-check-tftp_input-buffer-size.patch [bz#1970850] - kvm-tftp-introduce-a-header-structure.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-udp-check-upd_input-buffer-size.patch [bz#1970858] - kvm-Fix-DHCP-broken-in-libslirp-v4.6.0.patch [bz#1970823 bz#1970842 bz#1970850 bz#1970858] - kvm-redhat-use-the-standard-vhost-user-JSON-path.patch [bz#1804196] - Resolves: bz#1970823 (CVE-2021-3592 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (bootp) [rhel-av-8]) - Resolves: bz#1970842 (CVE-2021-3593 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp6) [rhel-av-8]) - Resolves: bz#1970850 (CVE-2021-3595 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (tftp) [rhel-av-8]) - Resolves: bz#1970858 (CVE-2021-3594 virt:av/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp) [rhel-av-8]) - Resolves: bz#1804196 (inconsistent paths for interop json files)- kvm-redhat-Expose-upstream-machines-pc-4.2-and-pc-2.11.patch [bz#1897923] - kvm-redhat-Enable-FDC-device-for-upstream-machines-too.patch [bz#1897923] - kvm-redhat-Add-hw_compat_4_2_extra-and-apply-to-upstream.patch [bz#1897923] - kvm-ppc-pef.c-initialize-cgs-ready-in-kvmppc_svm_init.patch [bz#1789757] - kvm-virtio-gpu-handle-partial-maps-properly.patch [bz#1932279] - kvm-redhat-Fix-unversioned-Obsoletes-warning.patch [bz#1950405 bz#1967330] - kvm-redhat-Move-qemu-kvm-docs-dependency-to-qemu-kvm.patch [bz#1950405 bz#1967330] - kvm-redhat-introducting-qemu-kvm-hw-usbredir.patch [bz#1950405 bz#1967330] - kvm-spapr-Fix-EEH-capability-issue-on-KVM-guest-for-PCI-.patch [bz#1976015] - Resolves: bz#1897923 (support Live Migration from Ubuntu 18.04 i440fx to RHEL) - Resolves: bz#1789757 ([IBM 8.5 FEAT] Add machine option to enable secure VM support) - Resolves: bz#1932279 ([aarch64] qemu core dumped when using smmuv3 and iommu_platform enabling at virtio-gpu-pci) - Resolves: bz#1950405 (review qemu-kvm-core dependencies) - Resolves: bz#1967330 (Make qemu-kvm use versioned obsoletes for qemu-kvm-ma and qemu-kvm-rhev) - Resolves: bz#1976015 (spapr: Fix EEH capability issue on KVM guest for PCI passthru)- kvm-block-backend-add-drained_poll.patch [bz#1960137] - kvm-nbd-server-Use-drained-block-ops-to-quiesce-the-serv.patch [bz#1960137] - kvm-disable-CONFIG_USB_STORAGE_BOT.patch [bz#1866133] - kvm-doc-Fix-some-mistakes-in-the-SEV-documentation.patch [bz#1954750] - kvm-docs-Add-SEV-ES-documentation-to-amd-memory-encrypti.patch [bz#1954750] - kvm-docs-interop-firmware.json-Add-SEV-ES-support.patch [bz#1954750] - Resolves: bz#1960137 ([incremental backup] qemu-kvm hangs when Rebooting the VM during full backup) - Resolves: bz#1866133 (Disable usb-bot device in QEMU (unsupported)) - Resolves: bz#1954750 (firmware scheme for sev-es)- kvm-x86-Add-x86-rhel8.5-machine-types.patch [bz#1957838] - kvm-redhat-x86-Enable-kvm-asyncpf-int-by-default.patch [bz#1967603] - kvm-yank-Unregister-function-when-using-TLS-migration.patch [bz#1964326] - Resolves: bz#1957838 (8.5 machine types for x86) - Resolves: bz#1967603 (Enable interrupt based asynchronous page fault mechanism by default) - Resolves: bz#1964326 (Qemu core dump when do tls migration via tcp protocol)- kvm-pc-bios-s390-ccw-don-t-try-to-read-the-next-block-if.patch [bz#1965626] - kvm-redhat-Install-the-s390-netboot.img-that-we-ve-built.patch [bz#1966463] - kvm-sockets-update-SOCKET_ADDRESS_TYPE_FD-listen-2-backl.patch [bz#1967177] - kvm-target-i386-sev-add-support-to-query-the-attestation.patch [bz#1957022] - kvm-spapr-Don-t-hijack-current_machine-boot_order.patch [bz#1960119] - kvm-target-i386-Add-CPU-model-versions-supporting-xsaves.patch [bz#1942914] - kvm-spapr-Remove-stale-comment-about-power-saving-LPCR-b.patch [bz#1940731] - kvm-spapr-Set-LPCR-to-current-AIL-mode-when-starting-a-n.patch [bz#1940731] - Resolves: bz#1965626 (RHEL8.2 - QEMU BIOS fails to read stage2 loader (kvm)) - Resolves: bz#1966463 (Rebuild the s390-netboot.img for downstream instead of shipping the upstream image) - Resolves: bz#1967177 (QEMU 6.0.0 socket_get_fd() fails with the error "socket_get_fd: too many connections") - Resolves: bz#1957022 (SEV: Add support to query the attestation report) - Resolves: bz#1960119 ([regression]Failed to reset guest) - Resolves: bz#1942914 ([Hyper-V][RHEL8.4]Nested Hyper-V on KVM: On Intel CPU L1 2016 can not start with cpu model Skylake-Server-noTSX-IBRS or Skylake-Client-noTSX-IBRS) - Resolves: bz#1940731 ([ppc64le] Hotplug vcpu device hit call trace:[qemu output] KVM: unknown exit, hardware reason 7fff9ce87ed8)- kvm-virtio-net-failover-add-missing-remove_migration_sta.patch [bz#1953045] - kvm-hw-arm-virt-Add-8.5-machine-type.patch [bz#1957667] - kvm-hw-arm-virt-Disable-PL011-clock-migration-through-hw.patch [bz#1957667] - kvm-arm-virt-Register-highmem-and-gic-version-as-class-p.patch [bz#1957667] - kvm-virtio-blk-Fix-rollback-path-in-virtio_blk_data_plan.patch [bz#1927108] - kvm-virtio-blk-Configure-all-host-notifiers-in-a-single-.patch [bz#1927108] - kvm-virtio-scsi-Set-host-notifiers-and-callbacks-separat.patch [bz#1927108] - kvm-virtio-scsi-Configure-all-host-notifiers-in-a-single.patch [bz#1927108] - kvm-hw-arm-smmuv3-Another-range-invalidation-fix.patch [bz#1929720] - Resolves: bz#1953045 (qemu-kvm NULL pointer de-reference during migration at migrate_fd_connect ->...-> notifier_list_notify) - Resolves: bz#1957667 ([aarch64] Add 8.5 machine type) - Resolves: bz#1927108 (It's too slow to load scsi disk when use 384 vcpus) - Resolves: bz#1929720 ([aarch64] Handle vsmmuv3 IOTLB invalidation with non power of 2 size)- kvm-redhat-s390x-add-rhel-8.5.0-compat-machine.patch [bz#1951476] - kvm-redhat-add-missing-entries-in-hw_compat_rhel_8_4.patch [bz#1957834] - kvm-redhat-Define-pseries-rhel8.5.0-machine-type.patch [bz#1957834] - Resolves: bz#1951476 ([s390x] RHEL AV 8.5 new machine type for s390x) - Resolves: bz#1957834 ([ppc64le] RHEL AV 8.5 new machine type for ppc64le)- Rebase to qemu-kvm 6.0.015:6.0.0-31.el8s15:6.0.0-31.el8s.build-id81250fa94ff14f6ef1f4674b4b9ce182125a5907block-gluster.so/usr/lib//usr/lib/.build-id//usr/lib/.build-id/81//usr/lib64/qemu-kvm/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fexceptions -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protectioncpioxz2x86_64-redhat-linux-gnudirectoryELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=81250fa94ff14f6ef1f4674b4b9ce182125a5907, strippedRRRRRRRR utf-8d7fd1ae841daa523a0edb3708bda5bec96e7c60c750d6a42c1d732b2340896e4?07zXZ !#,G,] b2u jӫ`(y-"3Xdn;v1e鉜hiI8{Rh5iߑ>M@҄b5zB6Iri6<^1~iOuL."^u9>[CZ-'q !xM ] b5n9.HV 7u= ()/oWkA|jY201NsTBMȘty.`%d ap8$0YVS)a@`Gg}wEM!ZyPoʼ _*RUʥKx]|Qj<=QXO~pXZh%cY4Et$'7i*,A}x!P@i gm$;%ty2L=J|^j}r7[ ~~ j3E~ۣ [ B*Y)e#g "AԔG{{?_~<4M K1gpAFrEInڟALgyCOt'jlM  (G=90BC@7/yD:* \#:A6v:2 ߡި Pek08*WȥbIǢ.nx5$`N=//Xdlt%[!)ؒL@c=(V l gΣ9˯?SRSY. YR,؋LԸ"~Șy 5RF  kJƪ$nDYn~5)L݂t&I 3H$ ɖAC+f1+{p&BRDV1`#BzbtyS bF"0hB+FScK*p*asjڈ`G!R2^L̜/}yoɎ$J0tky !|]MN`S&%eݬ$e35g7%4Ӿk?m.6R- {%̅z}rw"0q._yx71^akYi/hl@@p(E ϶: kK {\`/A(`(nx|⫝5SOx]3~oIcZׅm(}_[I-؄D۳7Olr&*̑B%+T)SXpRUI]6E[j>2wv1v[Xm*&%*\$a.XUipSBDsY!o u#Nz  P*k7q9vۦǣWAdH 'DrP\0qL(o 1OC\Z4ZCX}}:7 ?U oWK[v\3d }.m()&CKyHՃqzC,EŚ3m9OZRКZm:LiS@)&}}\ir; |Gu*\eB|Rx)ch7143H.RQ7@Y5 4@ا;}9Ta"K(C,W%UtY~"b\Jsڒݢc *:<ΚCNf[2jq/EB~O sܕ2zfI8 |# UĮ4K`8:]N }՞%X6ږ8Dz9 2n9Ew3!:)=LMwiJĿ/Q @ʔ^-D?kոp ]>j-۲k/TPUdJ] Ǣ-|,;='X,EnxA? .A 쬟 dV*N!۲E4"B>ql?让 /_x>ioecmn͙Iࡪ"w"<{@iꐄ?)mJ] ur06é4`41mF>1j^FT6>h1\?́8L?TTyLd {I'.aR npX [! M7S }Zw2kc:H۷(k̺Wnҡ"A7L*&)ןI5<%)'HZA4BF1Wld/A&WF-DlRdFH>dpO!}B\J)zۨ-Kc,if:8 .~$2z\Iha&w*F̭_*@x:g=k;,.jΖ|n/jjL 7ʶmf&GApwwOpMg>6=PdLEu F.Ҍ=: RڝqpmӺh2ֿ`r=]aO#w[6R3WJ]&nBuۆXY`ď9rGֱtL7A)Hi68s*II彖j% c0ܖݥ8J{fGmtpvm 34yz//hF0~--3ו3i" #=`*, #e3\<`_ ۛBbr3Q5?PR7NqdF_ zg\@ ,:ᯢЅ퉀v?֒yŽ>(X)jHPy}$Y{լXm*PoߊqjCNBR<qtZD}XS(' E#T;ϿP2Uʆ<dQw@(-)1Lhj'h;REeel Ł6HIC,AJښ=֗sП_X񰴂7ݻ홬M/!EdWv;Tvs7L&m\Woo^2ҽd49PLк>;+B/liGRz2n>*OY ~XMqRUR +ff\@%+꩏Ma0k̾wi⡋DӢ*77 \ǔ ǜ8,yId?W*-*1;c>%a'HP0Y0Qz57#V:aɣrίXZ&K3]Edؐ 8O(%h\G 6#ס}a%QAiJfb R§L~Hhm}j$ҴCb Qq.N~`Q VqC,҄Zvq$_]v<KЗG8mpz7F^|ys Klz!f1X5֎@/\?g `ɛjV7a sۇdXzKCֶ\wrKSkW8~#V- B!e)F1SGHAnJapMphYQ W9JLs4E(ų(5n1i$^}< L-01wzf|._A8©ƴulh.o"L1)Ұ8Q&z*,n}6}`#kk)WU K+ " *VN>}C} d=qT3mngtVхcJB|-4F×&P(8Ay> Q YgW+bޝl;1ߤ`H_dnQ#r>qM.agNAxWEDdX,fz_V#B=+-uqlK5b$p~;Б!WyB8~N#i2osӚ+Gx ɪ>; VHMX$i\~0!q_iZ뵵iKӂkb;%z8h[*h/-QXd߬J|" -_4 $ ڴ]''QLP6Ǚ@m S~xFVW`4UFX9aT>J*˜b k~D@HQy΍2HR% 櫁hYx~AG7SP,|8 (ϒU] T霳N:E"PqDw5=nzT‘RI @ے-S,44v[ެ܍Ĵ?Vl\t2pGX$g]~%hLRw}ĈV'7F𺄸̣w'ltn]f@qfTK3F'aߍ_{pԃ-~e}yri[;M5e.=KgGx9U>TКE^w(4^*oίoЈUV~;dR]֎1g8Wt]SE.-BjەJQ7  &Sn;܌.҆T_ EtіH]aRNg>V)k 63| ǤҹZTRso@sꞼE}6t\fG,@]xE \S~weCy]U+"r C 6{e 0<dOrEdn}HylQSgi#iq0JeO09)WIx(xMP`H",Wf7Lѹ d 7!"vfğCyEӬ{' `QD[" ѧyb:}H%8 ΣzYD%PfLdKf,ME('cRO*Cq &zL'WRW}:Ҷ7w?C0KFS4?Ϝnғ*$y_4yAL}GiLrɍ\.AF$ Ѱd~j)a=/ ): *gu1Qp2~(6Ue2S|'н_vSyFZ1G==Ƕ5ٿJ0# sHLvgoI,Ƃ*Gq/NݬPo[rO!zJk(d <ዦіW״-뇸$B#$6#L.(ƌ?%Vi,O*bsR)xd<[ǶJgWBg( :19H٦j] 6;`_kwc2G5K6Ɗ3(, Q+YWON0-.I9r[x CŸ}gP۱xCFĪ?3:MáZJ&13+܉Bp flcG-, 74-˓sH!MyΏ*f,@{1Xvҿz eC\et2ˈ˩vF j*ioh=PϞu-iŴ*Ó*g8LiN,2Q, Z hRm'BHtt9ov2Y &bo,dž}R[cj/C1 ,a9YG eC!j}+JDizZ m[j!hb2ąF_ۣSэ.k- 2}7ZY\=!lMHFS(0#϶:*NLqoU-/'kxQfe+KYKdu~gCmC Q+NE?+98ZJ`*WӵdATt[j, -a KP@oc~})~:Z!_z\&Nn?;G<3I}o\oYK)#Ó4Xv@ I+\7s*}\D+(<[fbOH iP9szaS5(~@V"6ȇ lᶶYbA&jŔpҠ+L*?,gn nCHSlڳՊ\4u/S3&wj(~7t:>jB|qB2 hSͪ# qvKt6 "2JϡJoOJS{=z߽\>+MO}$x<->KKC $?CzmӁy֡~XП.u6좈P~7ۀ'(WÖ:Kn6qs~1_y"{{z,ZX̏3y xE@B=">- ߨѴ7fe]&/3h6fXR[x|4< S ^tzebQ1r21.ا":p&7Q'J[ / HLEþYh钆#VӁze'p|U]FURT.~z3q>ыUHt.C`vry&i9t|`ui=ʼnKdW _ZhQP<~êrp8Li QxX^ƙCf04ʧs\n/X""LQz\EqGpP6&V' CQU(Q7PMDE&2xҥw[b&lGKR/cmU1}=XHi,U-mާUv7 Nc5V=G wi & 8{R4}kXP*%l]Wjެ]g%*r QYA.<쪌lNćO^-ujqgG<]JF<,UKj;?߻`"P1_סuWlT}I9'{ ٱChWRL|$ǰ[S><}2zi6O}[[L앰q}9aK4C #7qYեc;]<>m뮣?ƹ;&;)# Tȱ yפ3`rژ:+lPN$mJ-JI k^.ʳMo ۑ7f a7)jtfφQ#WЛm4^!Ǎ3//SYpUTfvei nIU-鄠Q|)k.>1]&L'M"-;, lΊ⸖`'y tpF 7^07xC,sU c=:,!{:P'p ?p+KIUJRƻ|D~r([2Ü%k z 7.$qK ?•t7ܙ$]rګ=Wv$Ĝ-6Yq܀4 ! ΢v埖%L_. 'J7޽91K@Vao%@yp۔%{hYGJ~u%ZvM4_ԋb b+ψ#_3swѝq`?&@y3 M#{Ho4&׮.1v+xճ˗+w1'-ah?J>㖆Pimsw ?'T26L@nj|L-~P;`s YV\ uhN@\M#GHcfO`3jOPgG./FDt_q1,=gOtk7gqh:g]LrHJY b'":twy%|לTP'aobE_ՌBұ/3UQCsɳo7,3*8/U^vM״>#ff8eZ?I BGZIIE{wzV~Cمl۝su?!_* V7',2dZMp7'# 4ٖr̖A>4z@ୠa̼o 0 1rNMٖ>H?r}֝r; ISÒqs8 qߕt+tR/>}yx] .vcZCbo ./\iת߸^#DנL!E2>н}_XN89hLk MC 8ӂnQtR򕋬C3_uL WY$-vuqREW`s E,ZeݛK;,׸'#3kd[! > :9 \*7] >(aݲhfjCn8n Y+/o\2QV̈ + ٝ1Be%E r*qMd#֩|B)'(./0zEWUrwوwUv䉩[ X̠3.'~[Ó=:OOr3,eGUe